id
large_stringlengths 9
16
| submitter
large_stringlengths 3
64
⌀ | authors
large_stringlengths 5
20.2k
| title
large_stringlengths 5
245
| comments
large_stringlengths 1
482
⌀ | journal-ref
large_stringlengths 4
382
⌀ | doi
large_stringlengths 9
151
⌀ | report-no
large_stringlengths 2
509
⌀ | categories
large_stringlengths 5
78
| license
large_stringclasses 9
values | abstract
large_stringlengths 83
3.55k
| versions
large listlengths 1
21
| update_date
timestamp[ms]date 2007-05-23 00:00:00
2025-05-30 00:00:00
| authors_parsed
large listlengths 1
1.35k
| prompt
large_stringlengths 166
3.64k
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1312.6838 | Ahmed Farahat | Ahmed K. Farahat, Ahmed Elgohary, Ali Ghodsi, Mohamed S. Kamel | Greedy Column Subset Selection for Large-scale Data Sets | Under consideration for publication in Knowledge and Information
Systems | null | null | null | cs.DS cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In today's information systems, the availability of massive amounts of data
necessitates the development of fast and accurate algorithms to summarize these
data and represent them in a succinct format. One crucial problem in big data
analytics is the selection of representative instances from large and
massively-distributed data, which is formally known as the Column Subset
Selection (CSS) problem. The solution to this problem enables data analysts to
understand the insights of the data and explore its hidden structure. The
selected instances can also be used for data preprocessing tasks such as
learning a low-dimensional embedding of the data points or computing a low-rank
approximation of the corresponding matrix. This paper presents a fast and
accurate greedy algorithm for large-scale column subset selection. The
algorithm minimizes an objective function which measures the reconstruction
error of the data matrix based on the subset of selected columns. The paper
first presents a centralized greedy algorithm for column subset selection which
depends on a novel recursive formula for calculating the reconstruction error
of the data matrix. The paper then presents a MapReduce algorithm which selects
a few representative columns from a matrix whose columns are massively
distributed across several commodity machines. The algorithm first learns a
concise representation of all columns using random projection, and it then
solves a generalized column subset selection problem at each machine in which a
subset of columns are selected from the sub-matrix on that machine such that
the reconstruction error of the concise representation is minimized. The paper
demonstrates the effectiveness and efficiency of the proposed algorithm through
an empirical evaluation on benchmark data sets.
| [
{
"version": "v1",
"created": "Tue, 24 Dec 2013 15:10:23 GMT"
}
] | 2013-12-27T00:00:00 | [
[
"Farahat",
"Ahmed K.",
""
],
[
"Elgohary",
"Ahmed",
""
],
[
"Ghodsi",
"Ali",
""
],
[
"Kamel",
"Mohamed S.",
""
]
] | TITLE: Greedy Column Subset Selection for Large-scale Data Sets
ABSTRACT: In today's information systems, the availability of massive amounts of data
necessitates the development of fast and accurate algorithms to summarize these
data and represent them in a succinct format. One crucial problem in big data
analytics is the selection of representative instances from large and
massively-distributed data, which is formally known as the Column Subset
Selection (CSS) problem. The solution to this problem enables data analysts to
understand the insights of the data and explore its hidden structure. The
selected instances can also be used for data preprocessing tasks such as
learning a low-dimensional embedding of the data points or computing a low-rank
approximation of the corresponding matrix. This paper presents a fast and
accurate greedy algorithm for large-scale column subset selection. The
algorithm minimizes an objective function which measures the reconstruction
error of the data matrix based on the subset of selected columns. The paper
first presents a centralized greedy algorithm for column subset selection which
depends on a novel recursive formula for calculating the reconstruction error
of the data matrix. The paper then presents a MapReduce algorithm which selects
a few representative columns from a matrix whose columns are massively
distributed across several commodity machines. The algorithm first learns a
concise representation of all columns using random projection, and it then
solves a generalized column subset selection problem at each machine in which a
subset of columns are selected from the sub-matrix on that machine such that
the reconstruction error of the concise representation is minimized. The paper
demonstrates the effectiveness and efficiency of the proposed algorithm through
an empirical evaluation on benchmark data sets.
|
1302.4888 | Yue Shi | Yue Shi, Martha Larson, Alan Hanjalic | Exploiting Social Tags for Cross-Domain Collaborative Filtering | Manuscript under review | null | null | null | cs.IR cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | One of the most challenging problems in recommender systems based on the
collaborative filtering (CF) concept is data sparseness, i.e., limited user
preference data is available for making recommendations. Cross-domain
collaborative filtering (CDCF) has been studied as an effective mechanism to
alleviate data sparseness of one domain using the knowledge about user
preferences from other domains. A key question to be answered in the context of
CDCF is what common characteristics can be deployed to link different domains
for effective knowledge transfer. In this paper, we assess the usefulness of
user-contributed (social) tags in this respect. We do so by means of the
Generalized Tag-induced Cross-domain Collaborative Filtering (GTagCDCF)
approach that we propose in this paper and that we developed based on the
general collective matrix factorization framework. Assessment is done by a
series of experiments, using publicly available CF datasets that represent
three cross-domain cases, i.e., two two-domain cases and one three-domain case.
A comparative analysis on two-domain cases involving GTagCDCF and several
state-of-the-art CDCF approaches indicates the increased benefit of using
social tags as representatives of explicit links between domains for CDCF as
compared to the implicit links deployed by the existing CDCF methods. In
addition, we show that users from different domains can already benefit from
GTagCDCF if they only share a few common tags. Finally, we use the three-domain
case to validate the robustness of GTagCDCF with respect to the scale of
datasets and the varying number of domains.
| [
{
"version": "v1",
"created": "Wed, 20 Feb 2013 12:37:33 GMT"
},
{
"version": "v2",
"created": "Tue, 24 Dec 2013 16:03:11 GMT"
}
] | 2013-12-25T00:00:00 | [
[
"Shi",
"Yue",
""
],
[
"Larson",
"Martha",
""
],
[
"Hanjalic",
"Alan",
""
]
] | TITLE: Exploiting Social Tags for Cross-Domain Collaborative Filtering
ABSTRACT: One of the most challenging problems in recommender systems based on the
collaborative filtering (CF) concept is data sparseness, i.e., limited user
preference data is available for making recommendations. Cross-domain
collaborative filtering (CDCF) has been studied as an effective mechanism to
alleviate data sparseness of one domain using the knowledge about user
preferences from other domains. A key question to be answered in the context of
CDCF is what common characteristics can be deployed to link different domains
for effective knowledge transfer. In this paper, we assess the usefulness of
user-contributed (social) tags in this respect. We do so by means of the
Generalized Tag-induced Cross-domain Collaborative Filtering (GTagCDCF)
approach that we propose in this paper and that we developed based on the
general collective matrix factorization framework. Assessment is done by a
series of experiments, using publicly available CF datasets that represent
three cross-domain cases, i.e., two two-domain cases and one three-domain case.
A comparative analysis on two-domain cases involving GTagCDCF and several
state-of-the-art CDCF approaches indicates the increased benefit of using
social tags as representatives of explicit links between domains for CDCF as
compared to the implicit links deployed by the existing CDCF methods. In
addition, we show that users from different domains can already benefit from
GTagCDCF if they only share a few common tags. Finally, we use the three-domain
case to validate the robustness of GTagCDCF with respect to the scale of
datasets and the varying number of domains.
|
1312.6488 | Zheng Li | Zheng Li and Liam O'Brien and Rajiv Ranjan and Miranda Zhang | Early Observations on Performance of Google Compute Engine for
Scientific Computing | Proceedings of the 5th International Conference on Cloud Computing
Technologies and Science (CloudCom 2013), pp. 1-8, Bristol, UK, December 2-5,
2013 | null | 10.1109/CloudCom.2013.7 | null | cs.DC cs.MS cs.NA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Although Cloud computing emerged for business applications in industry,
public Cloud services have been widely accepted and encouraged for scientific
computing in academia. The recently available Google Compute Engine (GCE) is
claimed to support high-performance and computationally intensive tasks, while
little evaluation studies can be found to reveal GCE's scientific capabilities.
Considering that fundamental performance benchmarking is the strategy of
early-stage evaluation of new Cloud services, we followed the Cloud Evaluation
Experiment Methodology (CEEM) to benchmark GCE and also compare it with Amazon
EC2, to help understand the elementary capability of GCE for dealing with
scientific problems. The experimental results and analyses show both potential
advantages of, and possible threats to applying GCE to scientific computing.
For example, compared to Amazon's EC2 service, GCE may better suit applications
that require frequent disk operations, while it may not be ready yet for single
VM-based parallel computing. Following the same evaluation methodology,
different evaluators can replicate and/or supplement this fundamental
evaluation of GCE. Based on the fundamental evaluation results, suitable GCE
environments can be further established for case studies of solving real
science problems.
| [
{
"version": "v1",
"created": "Mon, 23 Dec 2013 09:12:09 GMT"
}
] | 2013-12-25T00:00:00 | [
[
"Li",
"Zheng",
""
],
[
"O'Brien",
"Liam",
""
],
[
"Ranjan",
"Rajiv",
""
],
[
"Zhang",
"Miranda",
""
]
] | TITLE: Early Observations on Performance of Google Compute Engine for
Scientific Computing
ABSTRACT: Although Cloud computing emerged for business applications in industry,
public Cloud services have been widely accepted and encouraged for scientific
computing in academia. The recently available Google Compute Engine (GCE) is
claimed to support high-performance and computationally intensive tasks, while
little evaluation studies can be found to reveal GCE's scientific capabilities.
Considering that fundamental performance benchmarking is the strategy of
early-stage evaluation of new Cloud services, we followed the Cloud Evaluation
Experiment Methodology (CEEM) to benchmark GCE and also compare it with Amazon
EC2, to help understand the elementary capability of GCE for dealing with
scientific problems. The experimental results and analyses show both potential
advantages of, and possible threats to applying GCE to scientific computing.
For example, compared to Amazon's EC2 service, GCE may better suit applications
that require frequent disk operations, while it may not be ready yet for single
VM-based parallel computing. Following the same evaluation methodology,
different evaluators can replicate and/or supplement this fundamental
evaluation of GCE. Based on the fundamental evaluation results, suitable GCE
environments can be further established for case studies of solving real
science problems.
|
1312.6723 | Bruce Berriman | G. Bruce Berriman, Ewa Deelman, John Good, Gideon Juve, Jamie Kinney,
Ann Merrihew, and Mats Rynge | Creating A Galactic Plane Atlas With Amazon Web Services | 7 pages, 1 table, 2 figures. Submitted to IEEE Special Edition on
Computing in Astronomy | null | null | null | astro-ph.IM cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper describes by example how astronomers can use cloud-computing
resources offered by Amazon Web Services (AWS) to create new datasets at scale.
We have created from existing surveys an atlas of the Galactic Plane at 16
wavelengths from 1 {\mu}m to 24 {\mu}m with pixels co-registered at spatial
sampling of 1 arcsec. We explain how open source tools support management and
operation of a virtual cluster on AWS platforms to process data at scale, and
describe the technical issues that users will need to consider, such as
optimization of resources, resource costs, and management of virtual machine
instances.
| [
{
"version": "v1",
"created": "Tue, 24 Dec 2013 00:10:27 GMT"
}
] | 2013-12-25T00:00:00 | [
[
"Berriman",
"G. Bruce",
""
],
[
"Deelman",
"Ewa",
""
],
[
"Good",
"John",
""
],
[
"Juve",
"Gideon",
""
],
[
"Kinney",
"Jamie",
""
],
[
"Merrihew",
"Ann",
""
],
[
"Rynge",
"Mats",
""
]
] | TITLE: Creating A Galactic Plane Atlas With Amazon Web Services
ABSTRACT: This paper describes by example how astronomers can use cloud-computing
resources offered by Amazon Web Services (AWS) to create new datasets at scale.
We have created from existing surveys an atlas of the Galactic Plane at 16
wavelengths from 1 {\mu}m to 24 {\mu}m with pixels co-registered at spatial
sampling of 1 arcsec. We explain how open source tools support management and
operation of a virtual cluster on AWS platforms to process data at scale, and
describe the technical issues that users will need to consider, such as
optimization of resources, resource costs, and management of virtual machine
instances.
|
1312.6807 | Feng Xia | Fengqi Li, Chuang Yu, Nanhai Yang, Feng Xia, Guangming Li, Fatemeh
Kaveh-Yazdy | Iterative Nearest Neighborhood Oversampling in Semisupervised Learning
from Imbalanced Data | null | The Scientific World Journal, Volume 2013, Article ID 875450, 2013 | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Transductive graph-based semi-supervised learning methods usually build an
undirected graph utilizing both labeled and unlabeled samples as vertices.
Those methods propagate label information of labeled samples to neighbors
through their edges in order to get the predicted labels of unlabeled samples.
Most popular semi-supervised learning approaches are sensitive to initial label
distribution happened in imbalanced labeled datasets. The class boundary will
be severely skewed by the majority classes in an imbalanced classification. In
this paper, we proposed a simple and effective approach to alleviate the
unfavorable influence of imbalance problem by iteratively selecting a few
unlabeled samples and adding them into the minority classes to form a balanced
labeled dataset for the learning methods afterwards. The experiments on UCI
datasets and MNIST handwritten digits dataset showed that the proposed approach
outperforms other existing state-of-art methods.
| [
{
"version": "v1",
"created": "Tue, 24 Dec 2013 12:24:30 GMT"
}
] | 2013-12-25T00:00:00 | [
[
"Li",
"Fengqi",
""
],
[
"Yu",
"Chuang",
""
],
[
"Yang",
"Nanhai",
""
],
[
"Xia",
"Feng",
""
],
[
"Li",
"Guangming",
""
],
[
"Kaveh-Yazdy",
"Fatemeh",
""
]
] | TITLE: Iterative Nearest Neighborhood Oversampling in Semisupervised Learning
from Imbalanced Data
ABSTRACT: Transductive graph-based semi-supervised learning methods usually build an
undirected graph utilizing both labeled and unlabeled samples as vertices.
Those methods propagate label information of labeled samples to neighbors
through their edges in order to get the predicted labels of unlabeled samples.
Most popular semi-supervised learning approaches are sensitive to initial label
distribution happened in imbalanced labeled datasets. The class boundary will
be severely skewed by the majority classes in an imbalanced classification. In
this paper, we proposed a simple and effective approach to alleviate the
unfavorable influence of imbalance problem by iteratively selecting a few
unlabeled samples and adding them into the minority classes to form a balanced
labeled dataset for the learning methods afterwards. The experiments on UCI
datasets and MNIST handwritten digits dataset showed that the proposed approach
outperforms other existing state-of-art methods.
|
1312.6826 | Leizer Teran | Leizer Teran, Philippos Mordohai | 3D Interest Point Detection via Discriminative Learning | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The task of detecting the interest points in 3D meshes has typically been
handled by geometric methods. These methods, while greatly describing human
preference, can be ill-equipped for handling the variety and subjectivity in
human responses. Different tasks have different requirements for interest point
detection; some tasks may necessitate high precision while other tasks may
require high recall. Sometimes points with high curvature may be desirable,
while in other cases high curvature may be an indication of noise. Geometric
methods lack the required flexibility to adapt to such changes. As a
consequence, interest point detection seems to be well suited for machine
learning methods that can be trained to match the criteria applied on the
annotated training data. In this paper, we formulate interest point detection
as a supervised binary classification problem using a random forest as our
classifier. Among other challenges, we are faced with an imbalanced learning
problem due to the substantial difference in the priors between interest and
non-interest points. We address this by re-sampling the training set. We
validate the accuracy of our method and compare our results to those of five
state of the art methods on a new, standard benchmark.
| [
{
"version": "v1",
"created": "Tue, 24 Dec 2013 14:35:15 GMT"
}
] | 2013-12-25T00:00:00 | [
[
"Teran",
"Leizer",
""
],
[
"Mordohai",
"Philippos",
""
]
] | TITLE: 3D Interest Point Detection via Discriminative Learning
ABSTRACT: The task of detecting the interest points in 3D meshes has typically been
handled by geometric methods. These methods, while greatly describing human
preference, can be ill-equipped for handling the variety and subjectivity in
human responses. Different tasks have different requirements for interest point
detection; some tasks may necessitate high precision while other tasks may
require high recall. Sometimes points with high curvature may be desirable,
while in other cases high curvature may be an indication of noise. Geometric
methods lack the required flexibility to adapt to such changes. As a
consequence, interest point detection seems to be well suited for machine
learning methods that can be trained to match the criteria applied on the
annotated training data. In this paper, we formulate interest point detection
as a supervised binary classification problem using a random forest as our
classifier. Among other challenges, we are faced with an imbalanced learning
problem due to the substantial difference in the priors between interest and
non-interest points. We address this by re-sampling the training set. We
validate the accuracy of our method and compare our results to those of five
state of the art methods on a new, standard benchmark.
|
1307.3811 | Weifeng Liu | Weifeng Liu, Dacheng Tao, Jun Cheng, and Yuanyan Tang | Multiview Hessian Discriminative Sparse Coding for Image Annotation | 35 pages | Computer vision and image understanding,118(2014) 50-60 | null | null | cs.MM cs.CV cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Sparse coding represents a signal sparsely by using an overcomplete
dictionary, and obtains promising performance in practical computer vision
applications, especially for signal restoration tasks such as image denoising
and image inpainting. In recent years, many discriminative sparse coding
algorithms have been developed for classification problems, but they cannot
naturally handle visual data represented by multiview features. In addition,
existing sparse coding algorithms use graph Laplacian to model the local
geometry of the data distribution. It has been identified that Laplacian
regularization biases the solution towards a constant function which possibly
leads to poor extrapolating power. In this paper, we present multiview Hessian
discriminative sparse coding (mHDSC) which seamlessly integrates Hessian
regularization with discriminative sparse coding for multiview learning
problems. In particular, mHDSC exploits Hessian regularization to steer the
solution which varies smoothly along geodesics in the manifold, and treats the
label information as an additional view of feature for incorporating the
discriminative power for image annotation. We conduct extensive experiments on
PASCAL VOC'07 dataset and demonstrate the effectiveness of mHDSC for image
annotation.
| [
{
"version": "v1",
"created": "Mon, 15 Jul 2013 03:14:05 GMT"
}
] | 2013-12-24T00:00:00 | [
[
"Liu",
"Weifeng",
""
],
[
"Tao",
"Dacheng",
""
],
[
"Cheng",
"Jun",
""
],
[
"Tang",
"Yuanyan",
""
]
] | TITLE: Multiview Hessian Discriminative Sparse Coding for Image Annotation
ABSTRACT: Sparse coding represents a signal sparsely by using an overcomplete
dictionary, and obtains promising performance in practical computer vision
applications, especially for signal restoration tasks such as image denoising
and image inpainting. In recent years, many discriminative sparse coding
algorithms have been developed for classification problems, but they cannot
naturally handle visual data represented by multiview features. In addition,
existing sparse coding algorithms use graph Laplacian to model the local
geometry of the data distribution. It has been identified that Laplacian
regularization biases the solution towards a constant function which possibly
leads to poor extrapolating power. In this paper, we present multiview Hessian
discriminative sparse coding (mHDSC) which seamlessly integrates Hessian
regularization with discriminative sparse coding for multiview learning
problems. In particular, mHDSC exploits Hessian regularization to steer the
solution which varies smoothly along geodesics in the manifold, and treats the
label information as an additional view of feature for incorporating the
discriminative power for image annotation. We conduct extensive experiments on
PASCAL VOC'07 dataset and demonstrate the effectiveness of mHDSC for image
annotation.
|
1312.4740 | Yalong Bai | Yalong Bai, Kuiyuan Yang, Wei Yu, Wei-Ying Ma, Tiejun Zhao | Learning High-level Image Representation for Image Retrieval via
Multi-Task DNN using Clickthrough Data | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Image retrieval refers to finding relevant images from an image database for
a query, which is considered difficult for the gap between low-level
representation of images and high-level representation of queries. Recently
further developed Deep Neural Network sheds light on automatically learning
high-level image representation from raw pixels. In this paper, we proposed a
multi-task DNN learned for image retrieval, which contains two parts, i.e.,
query-sharing layers for image representation computation and query-specific
layers for relevance estimation. The weights of multi-task DNN are learned on
clickthrough data by Ring Training. Experimental results on both simulated and
real dataset show the effectiveness of the proposed method.
| [
{
"version": "v1",
"created": "Tue, 17 Dec 2013 12:11:04 GMT"
},
{
"version": "v2",
"created": "Sat, 21 Dec 2013 00:47:19 GMT"
}
] | 2013-12-24T00:00:00 | [
[
"Bai",
"Yalong",
""
],
[
"Yang",
"Kuiyuan",
""
],
[
"Yu",
"Wei",
""
],
[
"Ma",
"Wei-Ying",
""
],
[
"Zhao",
"Tiejun",
""
]
] | TITLE: Learning High-level Image Representation for Image Retrieval via
Multi-Task DNN using Clickthrough Data
ABSTRACT: Image retrieval refers to finding relevant images from an image database for
a query, which is considered difficult for the gap between low-level
representation of images and high-level representation of queries. Recently
further developed Deep Neural Network sheds light on automatically learning
high-level image representation from raw pixels. In this paper, we proposed a
multi-task DNN learned for image retrieval, which contains two parts, i.e.,
query-sharing layers for image representation computation and query-specific
layers for relevance estimation. The weights of multi-task DNN are learned on
clickthrough data by Ring Training. Experimental results on both simulated and
real dataset show the effectiveness of the proposed method.
|
1312.6122 | James Bagrow | James P. Bagrow, Suma Desu, Morgan R. Frank, Narine Manukyan, Lewis
Mitchell, Andrew Reagan, Eric E. Bloedorn, Lashon B. Booker, Luther K.
Branting, Michael J. Smith, Brian F. Tivnan, Christopher M. Danforth, Peter
S. Dodds, Joshua C. Bongard | Shadow networks: Discovering hidden nodes with models of information
flow | 12 pages, 3 figures | null | null | null | physics.soc-ph cond-mat.dis-nn cs.SI physics.data-an | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Complex, dynamic networks underlie many systems, and understanding these
networks is the concern of a great span of important scientific and engineering
problems. Quantitative description is crucial for this understanding yet, due
to a range of measurement problems, many real network datasets are incomplete.
Here we explore how accidentally missing or deliberately hidden nodes may be
detected in networks by the effect of their absence on predictions of the speed
with which information flows through the network. We use Symbolic Regression
(SR) to learn models relating information flow to network topology. These
models show localized, systematic, and non-random discrepancies when applied to
test networks with intentionally masked nodes, demonstrating the ability to
detect the presence of missing nodes and where in the network those nodes are
likely to reside.
| [
{
"version": "v1",
"created": "Fri, 20 Dec 2013 21:00:01 GMT"
}
] | 2013-12-24T00:00:00 | [
[
"Bagrow",
"James P.",
""
],
[
"Desu",
"Suma",
""
],
[
"Frank",
"Morgan R.",
""
],
[
"Manukyan",
"Narine",
""
],
[
"Mitchell",
"Lewis",
""
],
[
"Reagan",
"Andrew",
""
],
[
"Bloedorn",
"Eric E.",
""
],
[
"Booker",
"Lashon B.",
""
],
[
"Branting",
"Luther K.",
""
],
[
"Smith",
"Michael J.",
""
],
[
"Tivnan",
"Brian F.",
""
],
[
"Danforth",
"Christopher M.",
""
],
[
"Dodds",
"Peter S.",
""
],
[
"Bongard",
"Joshua C.",
""
]
] | TITLE: Shadow networks: Discovering hidden nodes with models of information
flow
ABSTRACT: Complex, dynamic networks underlie many systems, and understanding these
networks is the concern of a great span of important scientific and engineering
problems. Quantitative description is crucial for this understanding yet, due
to a range of measurement problems, many real network datasets are incomplete.
Here we explore how accidentally missing or deliberately hidden nodes may be
detected in networks by the effect of their absence on predictions of the speed
with which information flows through the network. We use Symbolic Regression
(SR) to learn models relating information flow to network topology. These
models show localized, systematic, and non-random discrepancies when applied to
test networks with intentionally masked nodes, demonstrating the ability to
detect the presence of missing nodes and where in the network those nodes are
likely to reside.
|
1312.6180 | Weifeng Liu | W. Liu, H. Liu, D.Tao, Y. Wang, K. Lu | Manifold regularized kernel logistic regression for web image annotation | submitted to Neurocomputing | null | null | null | cs.LG cs.MM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | With the rapid advance of Internet technology and smart devices, users often
need to manage large amounts of multimedia information using smart devices,
such as personal image and video accessing and browsing. These requirements
heavily rely on the success of image (video) annotation, and thus large scale
image annotation through innovative machine learning methods has attracted
intensive attention in recent years. One representative work is support vector
machine (SVM). Although it works well in binary classification, SVM has a
non-smooth loss function and can not naturally cover multi-class case. In this
paper, we propose manifold regularized kernel logistic regression (KLR) for web
image annotation. Compared to SVM, KLR has the following advantages: (1) the
KLR has a smooth loss function; (2) the KLR produces an explicit estimate of
the probability instead of class label; and (3) the KLR can naturally be
generalized to the multi-class case. We carefully conduct experiments on MIR
FLICKR dataset and demonstrate the effectiveness of manifold regularized kernel
logistic regression for image annotation.
| [
{
"version": "v1",
"created": "Sat, 21 Dec 2013 00:32:24 GMT"
}
] | 2013-12-24T00:00:00 | [
[
"Liu",
"W.",
""
],
[
"Liu",
"H.",
""
],
[
"Tao",
"D.",
""
],
[
"Wang",
"Y.",
""
],
[
"Lu",
"K.",
""
]
] | TITLE: Manifold regularized kernel logistic regression for web image annotation
ABSTRACT: With the rapid advance of Internet technology and smart devices, users often
need to manage large amounts of multimedia information using smart devices,
such as personal image and video accessing and browsing. These requirements
heavily rely on the success of image (video) annotation, and thus large scale
image annotation through innovative machine learning methods has attracted
intensive attention in recent years. One representative work is support vector
machine (SVM). Although it works well in binary classification, SVM has a
non-smooth loss function and can not naturally cover multi-class case. In this
paper, we propose manifold regularized kernel logistic regression (KLR) for web
image annotation. Compared to SVM, KLR has the following advantages: (1) the
KLR has a smooth loss function; (2) the KLR produces an explicit estimate of
the probability instead of class label; and (3) the KLR can naturally be
generalized to the multi-class case. We carefully conduct experiments on MIR
FLICKR dataset and demonstrate the effectiveness of manifold regularized kernel
logistic regression for image annotation.
|
1312.6182 | Weifeng Liu | W. Liu, H. Zhang, D. Tao, Y. Wang, K. Lu | Large-Scale Paralleled Sparse Principal Component Analysis | submitted to Multimedia Tools and Applications | null | null | null | cs.MS cs.LG cs.NA stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Principal component analysis (PCA) is a statistical technique commonly used
in multivariate data analysis. However, PCA can be difficult to interpret and
explain since the principal components (PCs) are linear combinations of the
original variables. Sparse PCA (SPCA) aims to balance statistical fidelity and
interpretability by approximating sparse PCs whose projections capture the
maximal variance of original data. In this paper we present an efficient and
paralleled method of SPCA using graphics processing units (GPUs), which can
process large blocks of data in parallel. Specifically, we construct parallel
implementations of the four optimization formulations of the generalized power
method of SPCA (GP-SPCA), one of the most efficient and effective SPCA
approaches, on a GPU. The parallel GPU implementation of GP-SPCA (using CUBLAS)
is up to eleven times faster than the corresponding CPU implementation (using
CBLAS), and up to 107 times faster than a MatLab implementation. Extensive
comparative experiments in several real-world datasets confirm that SPCA offers
a practical advantage.
| [
{
"version": "v1",
"created": "Sat, 21 Dec 2013 00:38:02 GMT"
}
] | 2013-12-24T00:00:00 | [
[
"Liu",
"W.",
""
],
[
"Zhang",
"H.",
""
],
[
"Tao",
"D.",
""
],
[
"Wang",
"Y.",
""
],
[
"Lu",
"K.",
""
]
] | TITLE: Large-Scale Paralleled Sparse Principal Component Analysis
ABSTRACT: Principal component analysis (PCA) is a statistical technique commonly used
in multivariate data analysis. However, PCA can be difficult to interpret and
explain since the principal components (PCs) are linear combinations of the
original variables. Sparse PCA (SPCA) aims to balance statistical fidelity and
interpretability by approximating sparse PCs whose projections capture the
maximal variance of original data. In this paper we present an efficient and
paralleled method of SPCA using graphics processing units (GPUs), which can
process large blocks of data in parallel. Specifically, we construct parallel
implementations of the four optimization formulations of the generalized power
method of SPCA (GP-SPCA), one of the most efficient and effective SPCA
approaches, on a GPU. The parallel GPU implementation of GP-SPCA (using CUBLAS)
is up to eleven times faster than the corresponding CPU implementation (using
CBLAS), and up to 107 times faster than a MatLab implementation. Extensive
comparative experiments in several real-world datasets confirm that SPCA offers
a practical advantage.
|
1312.6246 | John Levine | John Levine, Graeme Ritchie, Alastair Andrew and Simon Gates | New Results for the Heterogeneous Multi-Processor Scheduling Problem
using a Fast, Effective Local Search and Random Disruption | 6 pages. Proceedings of PlanSIG 2012, Teeside University, December
2012 | null | null | null | cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The efficient scheduling of independent computational tasks in a
heterogeneous computing environment is an important problem that occurs in
domains such as Grid and Cloud computing. Finding optimal schedules is an
NP-hard problem in general, so we have to rely on approximate algorithms to
come up schedules that are as near to optimal as possible. In our previous work
on this problem, we applied a fast, effective local search to generate
reasonably good schedules in a short amount of time and used ant colony
optimisation (ACO) to incrementally improve those schedules over a longer time
period. In this work, we replace the ACO component with a random disruption
algorithm and find that this produces results which are competitive with the
current state of the art over a 90 second execution time. We also ran our
algorithm for a longer time period on 12 well-known benchmark instances and as
a result provide new upper bounds for these instances.
| [
{
"version": "v1",
"created": "Sat, 21 Dec 2013 11:52:21 GMT"
}
] | 2013-12-24T00:00:00 | [
[
"Levine",
"John",
""
],
[
"Ritchie",
"Graeme",
""
],
[
"Andrew",
"Alastair",
""
],
[
"Gates",
"Simon",
""
]
] | TITLE: New Results for the Heterogeneous Multi-Processor Scheduling Problem
using a Fast, Effective Local Search and Random Disruption
ABSTRACT: The efficient scheduling of independent computational tasks in a
heterogeneous computing environment is an important problem that occurs in
domains such as Grid and Cloud computing. Finding optimal schedules is an
NP-hard problem in general, so we have to rely on approximate algorithms to
come up schedules that are as near to optimal as possible. In our previous work
on this problem, we applied a fast, effective local search to generate
reasonably good schedules in a short amount of time and used ant colony
optimisation (ACO) to incrementally improve those schedules over a longer time
period. In this work, we replace the ACO component with a random disruption
algorithm and find that this produces results which are competitive with the
current state of the art over a 90 second execution time. We also ran our
algorithm for a longer time period on 12 well-known benchmark instances and as
a result provide new upper bounds for these instances.
|
1312.6293 | Jerome Darmont | Jaume Ferrarons (ERIC), Mulu Adhana (ERIC), Carlos Colmenares (ERIC),
Sandra Pietrowska (ERIC), Fadila Bentayeb (ERIC), J\'er\^ome Darmont (ERIC) | PRIMEBALL: a Parallel Processing Framework Benchmark for Big Data
Applications in the Cloud | 5th TPC Technology Conference on Performance Evaluation and
Benchmarking (VLDB/TPCTC 13), Riva del Garda : Italy (2013) | null | null | null | cs.DC cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we draw the specifications of a novel benchmark for comparing
parallel processing frameworks in the context of big data applications hosted
in the cloud. We aim at filling several gaps in already existing cloud data
processing benchmarks, which lack a real-life context for their processes, thus
losing relevance when trying to assess performance for real applications.
Hence, we propose a fictitious news site hosted in the cloud that is to be
managed by the framework under analysis, together with several objective use
case scenarios and measures for evaluating system performance. The main
strengths of our benchmark are parallelization capabilities supporting cloud
features and big data properties.
| [
{
"version": "v1",
"created": "Sat, 21 Dec 2013 19:15:22 GMT"
}
] | 2013-12-24T00:00:00 | [
[
"Ferrarons",
"Jaume",
"",
"ERIC"
],
[
"Adhana",
"Mulu",
"",
"ERIC"
],
[
"Colmenares",
"Carlos",
"",
"ERIC"
],
[
"Pietrowska",
"Sandra",
"",
"ERIC"
],
[
"Bentayeb",
"Fadila",
"",
"ERIC"
],
[
"Darmont",
"Jérôme",
"",
"ERIC"
]
] | TITLE: PRIMEBALL: a Parallel Processing Framework Benchmark for Big Data
Applications in the Cloud
ABSTRACT: In this paper, we draw the specifications of a novel benchmark for comparing
parallel processing frameworks in the context of big data applications hosted
in the cloud. We aim at filling several gaps in already existing cloud data
processing benchmarks, which lack a real-life context for their processes, thus
losing relevance when trying to assess performance for real applications.
Hence, we propose a fictitious news site hosted in the cloud that is to be
managed by the framework under analysis, together with several objective use
case scenarios and measures for evaluating system performance. The main
strengths of our benchmark are parallelization capabilities supporting cloud
features and big data properties.
|
1312.6335 | Sen Pei | Sen Pei, Hernan A. Makse | Spreading dynamics in complex networks | 23 pages, 2 figures | Journal of Statistical Mechanics: Theory and Experiment 2013 (12),
P12002 | 10.1088/1742-5468/2013/12/P12002 | null | physics.soc-ph cs.SI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Searching for influential spreaders in complex networks is an issue of great
significance for applications across various domains, ranging from the epidemic
control, innovation diffusion, viral marketing, social movement to idea
propagation. In this paper, we first display some of the most important
theoretical models that describe spreading processes, and then discuss the
problem of locating both the individual and multiple influential spreaders
respectively. Recent approaches in these two topics are presented. For the
identification of privileged single spreaders, we summarize several widely used
centralities, such as degree, betweenness centrality, PageRank, k-shell, etc.
We investigate the empirical diffusion data in a large scale online social
community -- LiveJournal. With this extensive dataset, we find that various
measures can convey very distinct information of nodes. Of all the users in
LiveJournal social network, only a small fraction of them involve in spreading.
For the spreading processes in LiveJournal, while degree can locate nodes
participating in information diffusion with higher probability, k-shell is more
effective in finding nodes with large influence. Our results should provide
useful information for designing efficient spreading strategies in reality.
| [
{
"version": "v1",
"created": "Sun, 22 Dec 2013 02:55:36 GMT"
}
] | 2013-12-24T00:00:00 | [
[
"Pei",
"Sen",
""
],
[
"Makse",
"Hernan A.",
""
]
] | TITLE: Spreading dynamics in complex networks
ABSTRACT: Searching for influential spreaders in complex networks is an issue of great
significance for applications across various domains, ranging from the epidemic
control, innovation diffusion, viral marketing, social movement to idea
propagation. In this paper, we first display some of the most important
theoretical models that describe spreading processes, and then discuss the
problem of locating both the individual and multiple influential spreaders
respectively. Recent approaches in these two topics are presented. For the
identification of privileged single spreaders, we summarize several widely used
centralities, such as degree, betweenness centrality, PageRank, k-shell, etc.
We investigate the empirical diffusion data in a large scale online social
community -- LiveJournal. With this extensive dataset, we find that various
measures can convey very distinct information of nodes. Of all the users in
LiveJournal social network, only a small fraction of them involve in spreading.
For the spreading processes in LiveJournal, while degree can locate nodes
participating in information diffusion with higher probability, k-shell is more
effective in finding nodes with large influence. Our results should provide
useful information for designing efficient spreading strategies in reality.
|
1312.6635 | Hamed Haddadi | Shana Dacres, Hamed Haddadi, Matthew Purver | Topic and Sentiment Analysis on OSNs: a Case Study of Advertising
Strategies on Twitter | null | null | null | null | cs.SI physics.soc-ph | http://creativecommons.org/licenses/by/3.0/ | Social media have substantially altered the way brands and businesses
advertise: Online Social Networks provide brands with more versatile and
dynamic channels for advertisement than traditional media (e.g., TV and radio).
Levels of engagement in such media are usually measured in terms of content
adoption (e.g., likes and retweets) and sentiment, around a given topic.
However, sentiment analysis and topic identification are both non-trivial
tasks.
In this paper, using data collected from Twitter as a case study, we analyze
how engagement and sentiment in promoted content spread over a 10-day period.
We find that promoted tweets lead to higher positive sentiment than promoted
trends; although promoted trends pay off in response volume. We observe that
levels of engagement for the brand and promoted content are highest on the
first day of the campaign, and fall considerably thereafter. However, we show
that these insights depend on the use of robust machine learning and natural
language processing techniques to gather focused, relevant datasets, and to
accurately gauge sentiment, rather than relying on the simple keyword- or
frequency-based metrics sometimes used in social media research.
| [
{
"version": "v1",
"created": "Mon, 23 Dec 2013 18:32:06 GMT"
}
] | 2013-12-24T00:00:00 | [
[
"Dacres",
"Shana",
""
],
[
"Haddadi",
"Hamed",
""
],
[
"Purver",
"Matthew",
""
]
] | TITLE: Topic and Sentiment Analysis on OSNs: a Case Study of Advertising
Strategies on Twitter
ABSTRACT: Social media have substantially altered the way brands and businesses
advertise: Online Social Networks provide brands with more versatile and
dynamic channels for advertisement than traditional media (e.g., TV and radio).
Levels of engagement in such media are usually measured in terms of content
adoption (e.g., likes and retweets) and sentiment, around a given topic.
However, sentiment analysis and topic identification are both non-trivial
tasks.
In this paper, using data collected from Twitter as a case study, we analyze
how engagement and sentiment in promoted content spread over a 10-day period.
We find that promoted tweets lead to higher positive sentiment than promoted
trends; although promoted trends pay off in response volume. We observe that
levels of engagement for the brand and promoted content are highest on the
first day of the campaign, and fall considerably thereafter. However, we show
that these insights depend on the use of robust machine learning and natural
language processing techniques to gather focused, relevant datasets, and to
accurately gauge sentiment, rather than relying on the simple keyword- or
frequency-based metrics sometimes used in social media research.
|
1210.0481 | Todd Veldhuizen | Todd L. Veldhuizen | Leapfrog Triejoin: a worst-case optimal join algorithm | null | null | null | LB1201 | cs.DB cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Recent years have seen exciting developments in join algorithms. In 2008,
Atserias, Grohe and Marx (henceforth AGM) proved a tight bound on the maximum
result size of a full conjunctive query, given constraints on the input
relation sizes. In 2012, Ngo, Porat, R{\'e} and Rudra (henceforth NPRR) devised
a join algorithm with worst-case running time proportional to the AGM bound.
Our commercial Datalog system LogicBlox employs a novel join algorithm,
\emph{leapfrog triejoin}, which compared conspicuously well to the NPRR
algorithm in preliminary benchmarks. This spurred us to analyze the complexity
of leapfrog triejoin. In this paper we establish that leapfrog triejoin is also
worst-case optimal, up to a log factor, in the sense of NPRR. We improve on the
results of NPRR by proving that leapfrog triejoin achieves worst-case
optimality for finer-grained classes of database instances, such as those
defined by constraints on projection cardinalities. We show that NPRR is
\emph{not} worst-case optimal for such classes, giving a counterexample where
leapfrog triejoin runs in $O(n \log n)$ time, compared to $\Theta(n^{1.375})$
time for NPRR. On a practical note, leapfrog triejoin can be implemented using
conventional data structures such as B-trees, and extends naturally to
$\exists_1$ queries. We believe our algorithm offers a useful addition to the
existing toolbox of join algorithms, being easy to absorb, simple to implement,
and having a concise optimality proof.
| [
{
"version": "v1",
"created": "Mon, 1 Oct 2012 17:54:13 GMT"
},
{
"version": "v2",
"created": "Thu, 4 Oct 2012 14:12:27 GMT"
},
{
"version": "v3",
"created": "Fri, 22 Mar 2013 00:10:44 GMT"
},
{
"version": "v4",
"created": "Sat, 7 Sep 2013 13:43:24 GMT"
},
{
"version": "v5",
"created": "Fri, 20 Dec 2013 20:21:03 GMT"
}
] | 2013-12-23T00:00:00 | [
[
"Veldhuizen",
"Todd L.",
""
]
] | TITLE: Leapfrog Triejoin: a worst-case optimal join algorithm
ABSTRACT: Recent years have seen exciting developments in join algorithms. In 2008,
Atserias, Grohe and Marx (henceforth AGM) proved a tight bound on the maximum
result size of a full conjunctive query, given constraints on the input
relation sizes. In 2012, Ngo, Porat, R{\'e} and Rudra (henceforth NPRR) devised
a join algorithm with worst-case running time proportional to the AGM bound.
Our commercial Datalog system LogicBlox employs a novel join algorithm,
\emph{leapfrog triejoin}, which compared conspicuously well to the NPRR
algorithm in preliminary benchmarks. This spurred us to analyze the complexity
of leapfrog triejoin. In this paper we establish that leapfrog triejoin is also
worst-case optimal, up to a log factor, in the sense of NPRR. We improve on the
results of NPRR by proving that leapfrog triejoin achieves worst-case
optimality for finer-grained classes of database instances, such as those
defined by constraints on projection cardinalities. We show that NPRR is
\emph{not} worst-case optimal for such classes, giving a counterexample where
leapfrog triejoin runs in $O(n \log n)$ time, compared to $\Theta(n^{1.375})$
time for NPRR. On a practical note, leapfrog triejoin can be implemented using
conventional data structures such as B-trees, and extends naturally to
$\exists_1$ queries. We believe our algorithm offers a useful addition to the
existing toolbox of join algorithms, being easy to absorb, simple to implement,
and having a concise optimality proof.
|
1310.5842 | Jianbin Fang | Jianbin Fang, Ana Lucia Varbanescu, Henk Sips, Lilun Zhang, Yonggang
Che, Chuanfu Xu | An Empirical Study of Intel Xeon Phi | null | null | null | null | cs.DC cs.PF | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | With at least 50 cores, Intel Xeon Phi is a true many-core architecture.
Featuring fairly powerful cores, two cache levels, and very fast
interconnections, the Xeon Phi can get a theoretical peak of 1000 GFLOPs and
over 240 GB/s. These numbers, as well as its flexibility - it can be used both
as a coprocessor or as a stand-alone processor - are very tempting for parallel
applications looking for new performance records.
In this paper, we present an empirical study of Xeon Phi, stressing its
performance limits and relevant performance factors, ultimately aiming to
present a simplified view of the machine for regular programmers in search for
performance.
To do so, we have micro-benchmarked the main hardware components of the
processor - the cores, the memory hierarchies, the ring interconnect, and the
PCIe connection. We show that, in ideal microbenchmarking conditions, the
performance that can be achieved is very close to the theoretical peak, as
given in the official programmer's guide. We have also identified and
quantified several causes for significant performance penalties. Our findings
have been captured in four optimization guidelines, and used to build a
simplified programmer's view of Xeon Phi, eventually enable the design and
prototyping of applications on a functionality-based model of the architecture.
| [
{
"version": "v1",
"created": "Tue, 22 Oct 2013 08:53:15 GMT"
},
{
"version": "v2",
"created": "Fri, 20 Dec 2013 09:05:07 GMT"
}
] | 2013-12-23T00:00:00 | [
[
"Fang",
"Jianbin",
""
],
[
"Varbanescu",
"Ana Lucia",
""
],
[
"Sips",
"Henk",
""
],
[
"Zhang",
"Lilun",
""
],
[
"Che",
"Yonggang",
""
],
[
"Xu",
"Chuanfu",
""
]
] | TITLE: An Empirical Study of Intel Xeon Phi
ABSTRACT: With at least 50 cores, Intel Xeon Phi is a true many-core architecture.
Featuring fairly powerful cores, two cache levels, and very fast
interconnections, the Xeon Phi can get a theoretical peak of 1000 GFLOPs and
over 240 GB/s. These numbers, as well as its flexibility - it can be used both
as a coprocessor or as a stand-alone processor - are very tempting for parallel
applications looking for new performance records.
In this paper, we present an empirical study of Xeon Phi, stressing its
performance limits and relevant performance factors, ultimately aiming to
present a simplified view of the machine for regular programmers in search for
performance.
To do so, we have micro-benchmarked the main hardware components of the
processor - the cores, the memory hierarchies, the ring interconnect, and the
PCIe connection. We show that, in ideal microbenchmarking conditions, the
performance that can be achieved is very close to the theoretical peak, as
given in the official programmer's guide. We have also identified and
quantified several causes for significant performance penalties. Our findings
have been captured in four optimization guidelines, and used to build a
simplified programmer's view of Xeon Phi, eventually enable the design and
prototyping of applications on a functionality-based model of the architecture.
|
1312.5697 | Andrew Rabinovich | Samy Bengio, Jeff Dean, Dumitru Erhan, Eugene Ie, Quoc Le, Andrew
Rabinovich, Jonathon Shlens, Yoram Singer | Using Web Co-occurrence Statistics for Improving Image Categorization | null | null | null | null | cs.CV cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Object recognition and localization are important tasks in computer vision.
The focus of this work is the incorporation of contextual information in order
to improve object recognition and localization. For instance, it is natural to
expect not to see an elephant to appear in the middle of an ocean. We consider
a simple approach to encapsulate such common sense knowledge using
co-occurrence statistics from web documents. By merely counting the number of
times nouns (such as elephants, sharks, oceans, etc.) co-occur in web
documents, we obtain a good estimate of expected co-occurrences in visual data.
We then cast the problem of combining textual co-occurrence statistics with the
predictions of image-based classifiers as an optimization problem. The
resulting optimization problem serves as a surrogate for our inference
procedure. Albeit the simplicity of the resulting optimization problem, it is
effective in improving both recognition and localization accuracy. Concretely,
we observe significant improvements in recognition and localization rates for
both ImageNet Detection 2012 and Sun 2012 datasets.
| [
{
"version": "v1",
"created": "Thu, 19 Dec 2013 18:53:47 GMT"
},
{
"version": "v2",
"created": "Fri, 20 Dec 2013 18:12:16 GMT"
}
] | 2013-12-23T00:00:00 | [
[
"Bengio",
"Samy",
""
],
[
"Dean",
"Jeff",
""
],
[
"Erhan",
"Dumitru",
""
],
[
"Ie",
"Eugene",
""
],
[
"Le",
"Quoc",
""
],
[
"Rabinovich",
"Andrew",
""
],
[
"Shlens",
"Jonathon",
""
],
[
"Singer",
"Yoram",
""
]
] | TITLE: Using Web Co-occurrence Statistics for Improving Image Categorization
ABSTRACT: Object recognition and localization are important tasks in computer vision.
The focus of this work is the incorporation of contextual information in order
to improve object recognition and localization. For instance, it is natural to
expect not to see an elephant to appear in the middle of an ocean. We consider
a simple approach to encapsulate such common sense knowledge using
co-occurrence statistics from web documents. By merely counting the number of
times nouns (such as elephants, sharks, oceans, etc.) co-occur in web
documents, we obtain a good estimate of expected co-occurrences in visual data.
We then cast the problem of combining textual co-occurrence statistics with the
predictions of image-based classifiers as an optimization problem. The
resulting optimization problem serves as a surrogate for our inference
procedure. Albeit the simplicity of the resulting optimization problem, it is
effective in improving both recognition and localization accuracy. Concretely,
we observe significant improvements in recognition and localization rates for
both ImageNet Detection 2012 and Sun 2012 datasets.
|
1312.6024 | Yusuf Artan | Yusuf Artan, Peter Paul | Occupancy Detection in Vehicles Using Fisher Vector Image Representation | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Due to the high volume of traffic on modern roadways, transportation agencies
have proposed High Occupancy Vehicle (HOV) lanes and High Occupancy Tolling
(HOT) lanes to promote car pooling. However, enforcement of the rules of these
lanes is currently performed by roadside enforcement officers using visual
observation. Manual roadside enforcement is known to be inefficient, costly,
potentially dangerous, and ultimately ineffective. Violation rates up to
50%-80% have been reported, while manual enforcement rates of less than 10% are
typical. Therefore, there is a need for automated vehicle occupancy detection
to support HOV/HOT lane enforcement. A key component of determining vehicle
occupancy is to determine whether or not the vehicle's front passenger seat is
occupied. In this paper, we examine two methods of determining vehicle front
seat occupancy using a near infrared (NIR) camera system pointed at the
vehicle's front windshield. The first method examines a state-of-the-art
deformable part model (DPM) based face detection system that is robust to
facial pose. The second method examines state-of- the-art local aggregation
based image classification using bag-of-visual-words (BOW) and Fisher vectors
(FV). A dataset of 3000 images was collected on a public roadway and is used to
perform the comparison. From these experiments it is clear that the image
classification approach is superior for this problem.
| [
{
"version": "v1",
"created": "Fri, 20 Dec 2013 16:37:46 GMT"
}
] | 2013-12-23T00:00:00 | [
[
"Artan",
"Yusuf",
""
],
[
"Paul",
"Peter",
""
]
] | TITLE: Occupancy Detection in Vehicles Using Fisher Vector Image Representation
ABSTRACT: Due to the high volume of traffic on modern roadways, transportation agencies
have proposed High Occupancy Vehicle (HOV) lanes and High Occupancy Tolling
(HOT) lanes to promote car pooling. However, enforcement of the rules of these
lanes is currently performed by roadside enforcement officers using visual
observation. Manual roadside enforcement is known to be inefficient, costly,
potentially dangerous, and ultimately ineffective. Violation rates up to
50%-80% have been reported, while manual enforcement rates of less than 10% are
typical. Therefore, there is a need for automated vehicle occupancy detection
to support HOV/HOT lane enforcement. A key component of determining vehicle
occupancy is to determine whether or not the vehicle's front passenger seat is
occupied. In this paper, we examine two methods of determining vehicle front
seat occupancy using a near infrared (NIR) camera system pointed at the
vehicle's front windshield. The first method examines a state-of-the-art
deformable part model (DPM) based face detection system that is robust to
facial pose. The second method examines state-of- the-art local aggregation
based image classification using bag-of-visual-words (BOW) and Fisher vectors
(FV). A dataset of 3000 images was collected on a public roadway and is used to
perform the comparison. From these experiments it is clear that the image
classification approach is superior for this problem.
|
1312.6061 | Timoteo Carletti | Floriana Gargiulo and Timoteo Carletti | Driving forces in researchers mobility | null | null | null | null | physics.soc-ph cs.SI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Starting from the dataset of the publication corpus of the APS during the
period 1955-2009, we reconstruct the individual researchers trajectories,
namely the list of the consecutive affiliations for each scholar. Crossing this
information with different geographic datasets we embed these trajectories in a
spatial framework. Using methods from network theory and complex systems
analysis we characterise these patterns in terms of topological network
properties and we analyse the dependence of an academic path across different
dimensions: the distance between two subsequent positions, the relative
importance of the institutions (in terms of number of publications) and some
socio-cultural traits. We show that distance is not always a good predictor for
the next affiliation while other factors like "the previous steps" of the
career of the researchers (in particular the first position) or the linguistic
and historical similarity between two countries can have an important impact.
Finally we show that the dataset exhibit a memory effect, hence the fate of a
career strongly depends from the first two affiliations.
| [
{
"version": "v1",
"created": "Fri, 20 Dec 2013 18:07:10 GMT"
}
] | 2013-12-23T00:00:00 | [
[
"Gargiulo",
"Floriana",
""
],
[
"Carletti",
"Timoteo",
""
]
] | TITLE: Driving forces in researchers mobility
ABSTRACT: Starting from the dataset of the publication corpus of the APS during the
period 1955-2009, we reconstruct the individual researchers trajectories,
namely the list of the consecutive affiliations for each scholar. Crossing this
information with different geographic datasets we embed these trajectories in a
spatial framework. Using methods from network theory and complex systems
analysis we characterise these patterns in terms of topological network
properties and we analyse the dependence of an academic path across different
dimensions: the distance between two subsequent positions, the relative
importance of the institutions (in terms of number of publications) and some
socio-cultural traits. We show that distance is not always a good predictor for
the next affiliation while other factors like "the previous steps" of the
career of the researchers (in particular the first position) or the linguistic
and historical similarity between two countries can have an important impact.
Finally we show that the dataset exhibit a memory effect, hence the fate of a
career strongly depends from the first two affiliations.
|
1312.5394 | Michael S. Gashler Ph.D. | Michael S. Gashler, Michael R. Smith, Richard Morris, Tony Martinez | Missing Value Imputation With Unsupervised Backpropagation | null | null | null | null | cs.NE cs.LG stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Many data mining and data analysis techniques operate on dense matrices or
complete tables of data. Real-world data sets, however, often contain unknown
values. Even many classification algorithms that are designed to operate with
missing values still exhibit deteriorated accuracy. One approach to handling
missing values is to fill in (impute) the missing values. In this paper, we
present a technique for unsupervised learning called Unsupervised
Backpropagation (UBP), which trains a multi-layer perceptron to fit to the
manifold sampled by a set of observed point-vectors. We evaluate UBP with the
task of imputing missing values in datasets, and show that UBP is able to
predict missing values with significantly lower sum-squared error than other
collaborative filtering and imputation techniques. We also demonstrate with 24
datasets and 9 supervised learning algorithms that classification accuracy is
usually higher when randomly-withheld values are imputed using UBP, rather than
with other methods.
| [
{
"version": "v1",
"created": "Thu, 19 Dec 2013 02:38:40 GMT"
}
] | 2013-12-20T00:00:00 | [
[
"Gashler",
"Michael S.",
""
],
[
"Smith",
"Michael R.",
""
],
[
"Morris",
"Richard",
""
],
[
"Martinez",
"Tony",
""
]
] | TITLE: Missing Value Imputation With Unsupervised Backpropagation
ABSTRACT: Many data mining and data analysis techniques operate on dense matrices or
complete tables of data. Real-world data sets, however, often contain unknown
values. Even many classification algorithms that are designed to operate with
missing values still exhibit deteriorated accuracy. One approach to handling
missing values is to fill in (impute) the missing values. In this paper, we
present a technique for unsupervised learning called Unsupervised
Backpropagation (UBP), which trains a multi-layer perceptron to fit to the
manifold sampled by a set of observed point-vectors. We evaluate UBP with the
task of imputing missing values in datasets, and show that UBP is able to
predict missing values with significantly lower sum-squared error than other
collaborative filtering and imputation techniques. We also demonstrate with 24
datasets and 9 supervised learning algorithms that classification accuracy is
usually higher when randomly-withheld values are imputed using UBP, rather than
with other methods.
|
1312.5568 | Martin Kleinsteuber | Xian Wei, Hao Shen, Martin Kleinsteuber | An Adaptive Dictionary Learning Approach for Modeling Dynamical Textures | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Video representation is an important and challenging task in the computer
vision community. In this paper, we assume that image frames of a moving scene
can be modeled as a Linear Dynamical System. We propose a sparse coding
framework, named adaptive video dictionary learning (AVDL), to model a video
adaptively. The developed framework is able to capture the dynamics of a moving
scene by exploring both sparse properties and the temporal correlations of
consecutive video frames. The proposed method is compared with state of the art
video processing methods on several benchmark data sequences, which exhibit
appearance changes and heavy occlusions.
| [
{
"version": "v1",
"created": "Thu, 19 Dec 2013 14:41:29 GMT"
}
] | 2013-12-20T00:00:00 | [
[
"Wei",
"Xian",
""
],
[
"Shen",
"Hao",
""
],
[
"Kleinsteuber",
"Martin",
""
]
] | TITLE: An Adaptive Dictionary Learning Approach for Modeling Dynamical Textures
ABSTRACT: Video representation is an important and challenging task in the computer
vision community. In this paper, we assume that image frames of a moving scene
can be modeled as a Linear Dynamical System. We propose a sparse coding
framework, named adaptive video dictionary learning (AVDL), to model a video
adaptively. The developed framework is able to capture the dynamics of a moving
scene by exploring both sparse properties and the temporal correlations of
consecutive video frames. The proposed method is compared with state of the art
video processing methods on several benchmark data sequences, which exhibit
appearance changes and heavy occlusions.
|
1312.5670 | Tim Vines | Timothy Vines, Arianne Albert, Rose Andrew, Florence Debarr\'e, Dan
Bock, Michelle Franklin, Kimberley Gilbert, Jean-S\'ebastien Moore,
S\'ebastien Renaut, Diana J. Rennison | The availability of research data declines rapidly with article age | 14 pages, 2 figures | null | 10.1016/j.cub.2013.11.014 | null | cs.DL physics.soc-ph q-bio.PE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Policies ensuring that research data are available on public archives are
increasingly being implemented at the government [1], funding agency [2-4], and
journal [5,6] level. These policies are predicated on the idea that authors are
poor stewards of their data, particularly over the long term [7], and indeed
many studies have found that authors are often unable or unwilling to share
their data [8-11]. However, there are no systematic estimates of how the
availability of research data changes with time since publication. We therefore
requested datasets from a relatively homogenous set of 516 articles published
between 2 and 22 years ago, and found that availability of the data was
strongly affected by article age. For papers where the authors gave the status
of their data, the odds of a dataset being extant fell by 17% per year. In
addition, the odds that we could find a working email address for the first,
last or corresponding author fell by 7% per year. Our results reinforce the
notion that, in the long term, research data cannot be reliably preserved by
individual researchers, and further demonstrate the urgent need for policies
mandating data sharing via public archives.
| [
{
"version": "v1",
"created": "Thu, 19 Dec 2013 17:57:53 GMT"
}
] | 2013-12-20T00:00:00 | [
[
"Vines",
"Timothy",
""
],
[
"Albert",
"Arianne",
""
],
[
"Andrew",
"Rose",
""
],
[
"Debarré",
"Florence",
""
],
[
"Bock",
"Dan",
""
],
[
"Franklin",
"Michelle",
""
],
[
"Gilbert",
"Kimberley",
""
],
[
"Moore",
"Jean-Sébastien",
""
],
[
"Renaut",
"Sébastien",
""
],
[
"Rennison",
"Diana J.",
""
]
] | TITLE: The availability of research data declines rapidly with article age
ABSTRACT: Policies ensuring that research data are available on public archives are
increasingly being implemented at the government [1], funding agency [2-4], and
journal [5,6] level. These policies are predicated on the idea that authors are
poor stewards of their data, particularly over the long term [7], and indeed
many studies have found that authors are often unable or unwilling to share
their data [8-11]. However, there are no systematic estimates of how the
availability of research data changes with time since publication. We therefore
requested datasets from a relatively homogenous set of 516 articles published
between 2 and 22 years ago, and found that availability of the data was
strongly affected by article age. For papers where the authors gave the status
of their data, the odds of a dataset being extant fell by 17% per year. In
addition, the odds that we could find a working email address for the first,
last or corresponding author fell by 7% per year. Our results reinforce the
notion that, in the long term, research data cannot be reliably preserved by
individual researchers, and further demonstrate the urgent need for policies
mandating data sharing via public archives.
|
1312.5673 | Xin-She Yang | Xin-She Yang | Flower Pollination Algorithm for Global Optimization | 10 pages | Unconventional Computation and Natural Computation 2012, Lecture
Notes in Computer Science, Vol. 7445, pp. 240-249 (2012) | 10.1007/978-3-642-32894-7_27 | null | math.OC cs.NE nlin.AO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Flower pollination is an intriguing process in the natural world. Its
evolutionary characteristics can be used to design new optimization algorithms.
In this paper, we propose a new algorithm, namely, flower pollination
algorithm, inspired by the pollination process of flowers. We first use ten
test functions to validate the new algorithm, and compare its performance with
genetic algorithms and particle swarm optimization. Our simulation results show
the flower algorithm is more efficient than both GA and PSO. We also use the
flower algorithm to solve a nonlinear design benchmark, which shows the
convergence rate is almost exponential.
| [
{
"version": "v1",
"created": "Thu, 19 Dec 2013 18:02:39 GMT"
}
] | 2013-12-20T00:00:00 | [
[
"Yang",
"Xin-She",
""
]
] | TITLE: Flower Pollination Algorithm for Global Optimization
ABSTRACT: Flower pollination is an intriguing process in the natural world. Its
evolutionary characteristics can be used to design new optimization algorithms.
In this paper, we propose a new algorithm, namely, flower pollination
algorithm, inspired by the pollination process of flowers. We first use ten
test functions to validate the new algorithm, and compare its performance with
genetic algorithms and particle swarm optimization. Our simulation results show
the flower algorithm is more efficient than both GA and PSO. We also use the
flower algorithm to solve a nonlinear design benchmark, which shows the
convergence rate is almost exponential.
|
1312.5691 | Wei Zhang | Wei Zhang, Olivier Tardieu, David Grove, Benjamin Herta, Tomio Kamada,
Vijay Saraswat, Mikio Takeuchi | GLB: Lifeline-based Global Load Balancing library in X10 | null | null | null | null | cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present GLB, a programming model and an associated implementation that can
handle a wide range of irregular paral- lel programming problems running over
large-scale distributed systems. GLB is applicable both to problems that are
easily load-balanced via static scheduling and to problems that are hard to
statically load balance. GLB hides the intricate syn- chronizations (e.g.,
inter-node communication, initialization and startup, load balancing,
termination and result collection) from the users. GLB internally uses a
version of the lifeline graph based work-stealing algorithm proposed by
Saraswat et al. Users of GLB are simply required to write several pieces of
sequential code that comply with the GLB interface. GLB then schedules and
orchestrates the parallel execution of the code correctly and efficiently at
scale. We have applied GLB to two representative benchmarks: Betweenness
Centrality (BC) and Unbalanced Tree Search (UTS). Among them, BC can be
statically load-balanced whereas UTS cannot. In either case, GLB scales well--
achieving nearly linear speedup on different computer architectures (Power,
Blue Gene/Q, and K) -- up to 16K cores.
| [
{
"version": "v1",
"created": "Thu, 19 Dec 2013 18:46:00 GMT"
}
] | 2013-12-20T00:00:00 | [
[
"Zhang",
"Wei",
""
],
[
"Tardieu",
"Olivier",
""
],
[
"Grove",
"David",
""
],
[
"Herta",
"Benjamin",
""
],
[
"Kamada",
"Tomio",
""
],
[
"Saraswat",
"Vijay",
""
],
[
"Takeuchi",
"Mikio",
""
]
] | TITLE: GLB: Lifeline-based Global Load Balancing library in X10
ABSTRACT: We present GLB, a programming model and an associated implementation that can
handle a wide range of irregular paral- lel programming problems running over
large-scale distributed systems. GLB is applicable both to problems that are
easily load-balanced via static scheduling and to problems that are hard to
statically load balance. GLB hides the intricate syn- chronizations (e.g.,
inter-node communication, initialization and startup, load balancing,
termination and result collection) from the users. GLB internally uses a
version of the lifeline graph based work-stealing algorithm proposed by
Saraswat et al. Users of GLB are simply required to write several pieces of
sequential code that comply with the GLB interface. GLB then schedules and
orchestrates the parallel execution of the code correctly and efficiently at
scale. We have applied GLB to two representative benchmarks: Betweenness
Centrality (BC) and Unbalanced Tree Search (UTS). Among them, BC can be
statically load-balanced whereas UTS cannot. In either case, GLB scales well--
achieving nearly linear speedup on different computer architectures (Power,
Blue Gene/Q, and K) -- up to 16K cores.
|
1312.5734 | Andrew Lan | Andrew S. Lan, Christoph Studer and Richard G. Baraniuk | Time-varying Learning and Content Analytics via Sparse Factor Analysis | null | null | null | null | stat.ML cs.LG math.OC stat.AP | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose SPARFA-Trace, a new machine learning-based framework for
time-varying learning and content analytics for education applications. We
develop a novel message passing-based, blind, approximate Kalman filter for
sparse factor analysis (SPARFA), that jointly (i) traces learner concept
knowledge over time, (ii) analyzes learner concept knowledge state transitions
(induced by interacting with learning resources, such as textbook sections,
lecture videos, etc, or the forgetting effect), and (iii) estimates the content
organization and intrinsic difficulty of the assessment questions. These
quantities are estimated solely from binary-valued (correct/incorrect) graded
learner response data and a summary of the specific actions each learner
performs (e.g., answering a question or studying a learning resource) at each
time instance. Experimental results on two online course datasets demonstrate
that SPARFA-Trace is capable of tracing each learner's concept knowledge
evolution over time, as well as analyzing the quality and content organization
of learning resources, the question-concept associations, and the question
intrinsic difficulties. Moreover, we show that SPARFA-Trace achieves comparable
or better performance in predicting unobserved learner responses than existing
collaborative filtering and knowledge tracing approaches for personalized
education.
| [
{
"version": "v1",
"created": "Thu, 19 Dec 2013 20:44:44 GMT"
}
] | 2013-12-20T00:00:00 | [
[
"Lan",
"Andrew S.",
""
],
[
"Studer",
"Christoph",
""
],
[
"Baraniuk",
"Richard G.",
""
]
] | TITLE: Time-varying Learning and Content Analytics via Sparse Factor Analysis
ABSTRACT: We propose SPARFA-Trace, a new machine learning-based framework for
time-varying learning and content analytics for education applications. We
develop a novel message passing-based, blind, approximate Kalman filter for
sparse factor analysis (SPARFA), that jointly (i) traces learner concept
knowledge over time, (ii) analyzes learner concept knowledge state transitions
(induced by interacting with learning resources, such as textbook sections,
lecture videos, etc, or the forgetting effect), and (iii) estimates the content
organization and intrinsic difficulty of the assessment questions. These
quantities are estimated solely from binary-valued (correct/incorrect) graded
learner response data and a summary of the specific actions each learner
performs (e.g., answering a question or studying a learning resource) at each
time instance. Experimental results on two online course datasets demonstrate
that SPARFA-Trace is capable of tracing each learner's concept knowledge
evolution over time, as well as analyzing the quality and content organization
of learning resources, the question-concept associations, and the question
intrinsic difficulties. Moreover, we show that SPARFA-Trace achieves comparable
or better performance in predicting unobserved learner responses than existing
collaborative filtering and knowledge tracing approaches for personalized
education.
|
1312.5021 | Zhen Qin | Zhen Qin, Vaclav Petricek, Nikos Karampatziakis, Lihong Li, John
Langford | Efficient Online Bootstrapping for Large Scale Learning | 5 pages, appeared at Big Learning Workshop at Neural Information
Processing Systems 2013 | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Bootstrapping is a useful technique for estimating the uncertainty of a
predictor, for example, confidence intervals for prediction. It is typically
used on small to moderate sized datasets, due to its high computation cost.
This work describes a highly scalable online bootstrapping strategy,
implemented inside Vowpal Wabbit, that is several times faster than traditional
strategies. Our experiments indicate that, in addition to providing a black
box-like method for estimating uncertainty, our implementation of online
bootstrapping may also help to train models with better prediction performance
due to model averaging.
| [
{
"version": "v1",
"created": "Wed, 18 Dec 2013 02:10:21 GMT"
}
] | 2013-12-19T00:00:00 | [
[
"Qin",
"Zhen",
""
],
[
"Petricek",
"Vaclav",
""
],
[
"Karampatziakis",
"Nikos",
""
],
[
"Li",
"Lihong",
""
],
[
"Langford",
"John",
""
]
] | TITLE: Efficient Online Bootstrapping for Large Scale Learning
ABSTRACT: Bootstrapping is a useful technique for estimating the uncertainty of a
predictor, for example, confidence intervals for prediction. It is typically
used on small to moderate sized datasets, due to its high computation cost.
This work describes a highly scalable online bootstrapping strategy,
implemented inside Vowpal Wabbit, that is several times faster than traditional
strategies. Our experiments indicate that, in addition to providing a black
box-like method for estimating uncertainty, our implementation of online
bootstrapping may also help to train models with better prediction performance
due to model averaging.
|
1312.5105 | David Garcia Soriano | Francesco Bonchi, David Garc\'ia-Soriano, Konstantin Kutzkov | Local correlation clustering | null | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Correlation clustering is perhaps the most natural formulation of clustering.
Given $n$ objects and a pairwise similarity measure, the goal is to cluster the
objects so that, to the best possible extent, similar objects are put in the
same cluster and dissimilar objects are put in different clusters. Despite its
theoretical appeal, the practical relevance of correlation clustering still
remains largely unexplored, mainly due to the fact that correlation clustering
requires the $\Theta(n^2)$ pairwise similarities as input.
In this paper we initiate the investigation into \emph{local} algorithms for
correlation clustering. In \emph{local correlation clustering} we are given the
identifier of a single object and we want to return the cluster to which it
belongs in some globally consistent near-optimal clustering, using a small
number of similarity queries. Local algorithms for correlation clustering open
the door to \emph{sublinear-time} algorithms, which are particularly useful
when the similarity between items is costly to compute, as it is often the case
in many practical application domains. They also imply $(i)$ distributed and
streaming clustering algorithms, $(ii)$ constant-time estimators and testers
for cluster edit distance, and $(iii)$ property-preserving parallel
reconstruction algorithms for clusterability.
Specifically, we devise a local clustering algorithm attaining a $(3,
\varepsilon)$-approximation in time $O(1/\varepsilon^2)$ independently of the
dataset size. An explicit approximate clustering for all objects can be
produced in time $O(n/\varepsilon)$ (which is provably optimal). We also
provide a fully additive $(1,\varepsilon)$-approximation with local query
complexity $poly(1/\varepsilon)$ and time complexity $2^{poly(1/\varepsilon)}$.
The latter yields the fastest polynomial-time approximation scheme for
correlation clustering known to date.
| [
{
"version": "v1",
"created": "Wed, 18 Dec 2013 12:04:10 GMT"
}
] | 2013-12-19T00:00:00 | [
[
"Bonchi",
"Francesco",
""
],
[
"García-Soriano",
"David",
""
],
[
"Kutzkov",
"Konstantin",
""
]
] | TITLE: Local correlation clustering
ABSTRACT: Correlation clustering is perhaps the most natural formulation of clustering.
Given $n$ objects and a pairwise similarity measure, the goal is to cluster the
objects so that, to the best possible extent, similar objects are put in the
same cluster and dissimilar objects are put in different clusters. Despite its
theoretical appeal, the practical relevance of correlation clustering still
remains largely unexplored, mainly due to the fact that correlation clustering
requires the $\Theta(n^2)$ pairwise similarities as input.
In this paper we initiate the investigation into \emph{local} algorithms for
correlation clustering. In \emph{local correlation clustering} we are given the
identifier of a single object and we want to return the cluster to which it
belongs in some globally consistent near-optimal clustering, using a small
number of similarity queries. Local algorithms for correlation clustering open
the door to \emph{sublinear-time} algorithms, which are particularly useful
when the similarity between items is costly to compute, as it is often the case
in many practical application domains. They also imply $(i)$ distributed and
streaming clustering algorithms, $(ii)$ constant-time estimators and testers
for cluster edit distance, and $(iii)$ property-preserving parallel
reconstruction algorithms for clusterability.
Specifically, we devise a local clustering algorithm attaining a $(3,
\varepsilon)$-approximation in time $O(1/\varepsilon^2)$ independently of the
dataset size. An explicit approximate clustering for all objects can be
produced in time $O(n/\varepsilon)$ (which is provably optimal). We also
provide a fully additive $(1,\varepsilon)$-approximation with local query
complexity $poly(1/\varepsilon)$ and time complexity $2^{poly(1/\varepsilon)}$.
The latter yields the fastest polynomial-time approximation scheme for
correlation clustering known to date.
|
1312.5124 | Paul Fogel | Paul Fogel | Permuted NMF: A Simple Algorithm Intended to Minimize the Volume of the
Score Matrix | null | null | null | null | stat.AP cs.LG stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Non-Negative Matrix Factorization, NMF, attempts to find a number of
archetypal response profiles, or parts, such that any sample profile in the
dataset can be approximated by a close profile among these archetypes or a
linear combination of these profiles. The non-negativity constraint is imposed
while estimating archetypal profiles, due to the non-negative nature of the
observed signal. Apart from non negativity, a volume constraint can be applied
on the Score matrix W to enhance the ability of learning parts of NMF. In this
report, we describe a very simple algorithm, which in effect achieves volume
minimization, although indirectly.
| [
{
"version": "v1",
"created": "Wed, 18 Dec 2013 13:13:39 GMT"
}
] | 2013-12-19T00:00:00 | [
[
"Fogel",
"Paul",
""
]
] | TITLE: Permuted NMF: A Simple Algorithm Intended to Minimize the Volume of the
Score Matrix
ABSTRACT: Non-Negative Matrix Factorization, NMF, attempts to find a number of
archetypal response profiles, or parts, such that any sample profile in the
dataset can be approximated by a close profile among these archetypes or a
linear combination of these profiles. The non-negativity constraint is imposed
while estimating archetypal profiles, due to the non-negative nature of the
observed signal. Apart from non negativity, a volume constraint can be applied
on the Score matrix W to enhance the ability of learning parts of NMF. In this
report, we describe a very simple algorithm, which in effect achieves volume
minimization, although indirectly.
|
1204.3210 | Olivier Delestre | Olivier Delestre (JAD), St\'ephane Cordier (MAPMO), Fr\'ed\'eric
Darboux (USS), Mingxuan Du, Francois James (MAPMO), Christian Laguerre
(MAPMO), Carine Lucas (MAPMO), Olivier Planchon (IRD) | FullSWOF: A software for overland flow simulation / FullSWOF : un
logiciel pour la simulation du ruissellement | 9 pages | Advances in Hydroinformatics - SIMHYDRO 2012 - New Frontiers of
Simulation, Gourbesville, P.; Cunge, J. and Caignaert, G. (Ed.) (2014)
221-231 | 10.1007/978-981-4451-42-0_19 | null | math.NA cs.CE cs.NA math.AP | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Overland flow on agricultural fields may have some undesirable effects such
as soil erosion, flood and pollutant transport. To better understand this
phenomenon and limit its consequences, we developed a code using
state-of-the-art numerical methods: FullSWOF (Full Shallow Water equations for
Overland Flow), an object oriented code written in C++. It has been made
open-source and can be downloaded from
http://www.univ-orleans.fr/mapmo/soft/FullSWOF/. The model is based on the
classical system of Shallow Water (SW) (or Saint-Venant system). Numerical
difficulties come from the numerous dry/wet transitions and the highly-variable
topography encountered inside a field. It includes runon and rainfall inputs,
infiltration (modified Green-Ampt equation), friction (Darcy-Weisbach and
Manning formulas). First we present the numerical method for the resolution of
the Shallow Water equations integrated in FullSWOF_2D (the two-dimension
version). This method is based on hydrostatic reconstruction scheme, coupled
with a semi-implicit friction term treatment. FullSWOF_2D has been previously
validated using analytical solutions from the SWASHES library (Shallow Water
Analytic Solutions for Hydraulic and Environmental Studies). Finally,
FullSWOF_2D is run on a real topography measured on a runoff plot located in
Thies (Senegal). Simulation results are compared with measured data. This
experimental benchmark demonstrate the capabilities of FullSWOF to simulate
adequately overland flow. FullSWOF could also be used for other environmental
issues, such as river floods and dam-breaks.
| [
{
"version": "v1",
"created": "Sat, 14 Apr 2012 20:27:19 GMT"
},
{
"version": "v2",
"created": "Thu, 27 Sep 2012 19:36:01 GMT"
}
] | 2013-12-18T00:00:00 | [
[
"Delestre",
"Olivier",
"",
"JAD"
],
[
"Cordier",
"Stéphane",
"",
"MAPMO"
],
[
"Darboux",
"Frédéric",
"",
"USS"
],
[
"Du",
"Mingxuan",
"",
"MAPMO"
],
[
"James",
"Francois",
"",
"MAPMO"
],
[
"Laguerre",
"Christian",
"",
"MAPMO"
],
[
"Lucas",
"Carine",
"",
"MAPMO"
],
[
"Planchon",
"Olivier",
"",
"IRD"
]
] | TITLE: FullSWOF: A software for overland flow simulation / FullSWOF : un
logiciel pour la simulation du ruissellement
ABSTRACT: Overland flow on agricultural fields may have some undesirable effects such
as soil erosion, flood and pollutant transport. To better understand this
phenomenon and limit its consequences, we developed a code using
state-of-the-art numerical methods: FullSWOF (Full Shallow Water equations for
Overland Flow), an object oriented code written in C++. It has been made
open-source and can be downloaded from
http://www.univ-orleans.fr/mapmo/soft/FullSWOF/. The model is based on the
classical system of Shallow Water (SW) (or Saint-Venant system). Numerical
difficulties come from the numerous dry/wet transitions and the highly-variable
topography encountered inside a field. It includes runon and rainfall inputs,
infiltration (modified Green-Ampt equation), friction (Darcy-Weisbach and
Manning formulas). First we present the numerical method for the resolution of
the Shallow Water equations integrated in FullSWOF_2D (the two-dimension
version). This method is based on hydrostatic reconstruction scheme, coupled
with a semi-implicit friction term treatment. FullSWOF_2D has been previously
validated using analytical solutions from the SWASHES library (Shallow Water
Analytic Solutions for Hydraulic and Environmental Studies). Finally,
FullSWOF_2D is run on a real topography measured on a runoff plot located in
Thies (Senegal). Simulation results are compared with measured data. This
experimental benchmark demonstrate the capabilities of FullSWOF to simulate
adequately overland flow. FullSWOF could also be used for other environmental
issues, such as river floods and dam-breaks.
|
1312.3393 | Masrour Zoghi | Masrour Zoghi, Shimon Whiteson, Remi Munos, Maarten de Rijke | Relative Upper Confidence Bound for the K-Armed Dueling Bandit Problem | 13 pages, 6 figures | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper proposes a new method for the K-armed dueling bandit problem, a
variation on the regular K-armed bandit problem that offers only relative
feedback about pairs of arms. Our approach extends the Upper Confidence Bound
algorithm to the relative setting by using estimates of the pairwise
probabilities to select a promising arm and applying Upper Confidence Bound
with the winner as a benchmark. We prove a finite-time regret bound of order
O(log t). In addition, our empirical results using real data from an
information retrieval application show that it greatly outperforms the state of
the art.
| [
{
"version": "v1",
"created": "Thu, 12 Dec 2013 03:08:46 GMT"
},
{
"version": "v2",
"created": "Tue, 17 Dec 2013 10:30:42 GMT"
}
] | 2013-12-18T00:00:00 | [
[
"Zoghi",
"Masrour",
""
],
[
"Whiteson",
"Shimon",
""
],
[
"Munos",
"Remi",
""
],
[
"de Rijke",
"Maarten",
""
]
] | TITLE: Relative Upper Confidence Bound for the K-Armed Dueling Bandit Problem
ABSTRACT: This paper proposes a new method for the K-armed dueling bandit problem, a
variation on the regular K-armed bandit problem that offers only relative
feedback about pairs of arms. Our approach extends the Upper Confidence Bound
algorithm to the relative setting by using estimates of the pairwise
probabilities to select a promising arm and applying Upper Confidence Bound
with the winner as a benchmark. We prove a finite-time regret bound of order
O(log t). In addition, our empirical results using real data from an
information retrieval application show that it greatly outperforms the state of
the art.
|
1312.4800 | Thabet Slimani | Thabet Slimani | New Approach to Optimize the Time of Association Rules Extraction | 10 pages, 6 figures | IJCSI International Journal of Computer Science Issues, Vol. 10,
Issue 5, No 1, September 2013 | null | null | cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The knowledge discovery algorithms have become ineffective at the abundance
of data and the need for fast algorithms or optimizing methods is required. To
address this limitation, the objective of this work is to adapt a new method
for optimizing the time of association rules extractions from large databases.
Indeed, given a relational database (one relation) represented as a set of
tuples, also called set of attributes, we transform the original database as a
binary table (Bitmap table) containing binary numbers. Then, we use this Bitmap
table to construct a data structure called Peano Tree stored as a binary file
on which we apply a new algorithm called BF-ARM (extension of the well known
Apriori algorithm). Since the database is loaded into a binary file, our
proposed algorithm will traverse this file, and the processes of association
rules extractions will be based on the file stored on disk. The BF-ARM
algorithm is implemented and compared with Apriori, Apriori+ and RS-Rules+
algorithms. The evaluation process is based on three benchmarks (Mushroom, Car
Evaluation and Adult). Our preliminary experimental results showed that our
algorithm produces association rules with a minimum time compared to other
algorithms.
| [
{
"version": "v1",
"created": "Tue, 17 Dec 2013 14:30:38 GMT"
}
] | 2013-12-18T00:00:00 | [
[
"Slimani",
"Thabet",
""
]
] | TITLE: New Approach to Optimize the Time of Association Rules Extraction
ABSTRACT: The knowledge discovery algorithms have become ineffective at the abundance
of data and the need for fast algorithms or optimizing methods is required. To
address this limitation, the objective of this work is to adapt a new method
for optimizing the time of association rules extractions from large databases.
Indeed, given a relational database (one relation) represented as a set of
tuples, also called set of attributes, we transform the original database as a
binary table (Bitmap table) containing binary numbers. Then, we use this Bitmap
table to construct a data structure called Peano Tree stored as a binary file
on which we apply a new algorithm called BF-ARM (extension of the well known
Apriori algorithm). Since the database is loaded into a binary file, our
proposed algorithm will traverse this file, and the processes of association
rules extractions will be based on the file stored on disk. The BF-ARM
algorithm is implemented and compared with Apriori, Apriori+ and RS-Rules+
algorithms. The evaluation process is based on three benchmarks (Mushroom, Car
Evaluation and Adult). Our preliminary experimental results showed that our
algorithm produces association rules with a minimum time compared to other
algorithms.
|
1303.3990 | Vladimir Gligorijevi\'c | Vladimir Gligorijevic | Master thesis: Growth and Self-Organization Processes in Directed Social
Network | This paper has been withdrawn due to its incompleteness | null | null | null | physics.soc-ph cs.SI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Large dataset collected from Ubuntu chat channel is studied as a complex
dynamical system with emergent collective behaviour of users. With the
appropriate network mappings we examined wealthy topological structure of
Ubuntu network. The structure of this network is determined by computing
different topological measures. The directed, weighted network, which is a
suitable representation of the dataset from Ubuntu chat channel is
characterized with power law dependencies of various quantities, hierarchical
organization and disassortative mixing patterns. Beyond the topological
features, the emergent collective state is further quantified by analysis of
time series of users activities driven by emotions. Analysis of time series
reveals self-organized dynamics with long-range temporal correlations in user
actions.
| [
{
"version": "v1",
"created": "Sat, 16 Mar 2013 15:33:21 GMT"
},
{
"version": "v2",
"created": "Wed, 20 Mar 2013 11:25:59 GMT"
},
{
"version": "v3",
"created": "Sat, 14 Dec 2013 13:29:27 GMT"
}
] | 2013-12-17T00:00:00 | [
[
"Gligorijevic",
"Vladimir",
""
]
] | TITLE: Master thesis: Growth and Self-Organization Processes in Directed Social
Network
ABSTRACT: Large dataset collected from Ubuntu chat channel is studied as a complex
dynamical system with emergent collective behaviour of users. With the
appropriate network mappings we examined wealthy topological structure of
Ubuntu network. The structure of this network is determined by computing
different topological measures. The directed, weighted network, which is a
suitable representation of the dataset from Ubuntu chat channel is
characterized with power law dependencies of various quantities, hierarchical
organization and disassortative mixing patterns. Beyond the topological
features, the emergent collective state is further quantified by analysis of
time series of users activities driven by emotions. Analysis of time series
reveals self-organized dynamics with long-range temporal correlations in user
actions.
|
1312.0086 | Filomena Ferrucci | Filomena Ferrucci, M-Tahar Kechadi, Pasquale Salza, Federica Sarro | A Framework for Genetic Algorithms Based on Hadoop | null | null | null | null | cs.NE cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Genetic Algorithms (GAs) are powerful metaheuristic techniques mostly used in
many real-world applications. The sequential execution of GAs requires
considerable computational power both in time and resources. Nevertheless, GAs
are naturally parallel and accessing a parallel platform such as Cloud is easy
and cheap. Apache Hadoop is one of the common services that can be used for
parallel applications. However, using Hadoop to develop a parallel version of
GAs is not simple without facing its inner workings. Even though some
sequential frameworks for GAs already exist, there is no framework supporting
the development of GA applications that can be executed in parallel. In this
paper is described a framework for parallel GAs on the Hadoop platform,
following the paradigm of MapReduce. The main purpose of this framework is to
allow the user to focus on the aspects of GA that are specific to the problem
to be addressed, being sure that this task is going to be correctly executed on
the Cloud with a good performance. The framework has been also exploited to
develop an application for Feature Subset Selection problem. A preliminary
analysis of the performance of the developed GA application has been performed
using three datasets and shown very promising performance.
| [
{
"version": "v1",
"created": "Sat, 30 Nov 2013 10:41:29 GMT"
},
{
"version": "v2",
"created": "Sun, 15 Dec 2013 23:01:10 GMT"
}
] | 2013-12-17T00:00:00 | [
[
"Ferrucci",
"Filomena",
""
],
[
"Kechadi",
"M-Tahar",
""
],
[
"Salza",
"Pasquale",
""
],
[
"Sarro",
"Federica",
""
]
] | TITLE: A Framework for Genetic Algorithms Based on Hadoop
ABSTRACT: Genetic Algorithms (GAs) are powerful metaheuristic techniques mostly used in
many real-world applications. The sequential execution of GAs requires
considerable computational power both in time and resources. Nevertheless, GAs
are naturally parallel and accessing a parallel platform such as Cloud is easy
and cheap. Apache Hadoop is one of the common services that can be used for
parallel applications. However, using Hadoop to develop a parallel version of
GAs is not simple without facing its inner workings. Even though some
sequential frameworks for GAs already exist, there is no framework supporting
the development of GA applications that can be executed in parallel. In this
paper is described a framework for parallel GAs on the Hadoop platform,
following the paradigm of MapReduce. The main purpose of this framework is to
allow the user to focus on the aspects of GA that are specific to the problem
to be addressed, being sure that this task is going to be correctly executed on
the Cloud with a good performance. The framework has been also exploited to
develop an application for Feature Subset Selection problem. A preliminary
analysis of the performance of the developed GA application has been performed
using three datasets and shown very promising performance.
|
1312.3971 | Tommaso Urli | Tommaso Urli | Balancing bike sharing systems (BBSS): instance generation from the
CitiBike NYC data | null | null | null | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Bike sharing systems are a very popular means to provide bikes to citizens in
a simple and cheap way. The idea is to install bike stations at various points
in the city, from which a registered user can easily loan a bike by removing it
from a specialized rack. After the ride, the user may return the bike at any
station (if there is a free rack). Services of this kind are mainly public or
semi-public, often aimed at increasing the attractiveness of non-motorized
means of transportation, and are usually free, or almost free, of charge for
the users. Depending on their location, bike stations have specific patterns
regarding when they are empty or full. For instance, in cities where most jobs
are located near the city centre, the commuters cause certain peaks in the
morning: the central bike stations are filled, while the stations in the
outskirts are emptied. Furthermore, stations located on top of a hill are more
likely to be empty, since users are less keen on cycling uphill to return the
bike, and often leave their bike at a more reachable station. These issues
result in substantial user dissatisfaction which may eventually cause the users
to abandon the service. This is why nowadays most bike sharing system providers
take measures to rebalance them. Over the last few years, balancing bike
sharing systems (BBSS) has become increasingly studied in optimization. As
such, generating meaningful instance to serve as a benchmark for the proposed
approaches is an important task. In this technical report we describe the
procedure we used to generate BBSS problem instances from data of the CitiBike
NYC bike sharing system.
| [
{
"version": "v1",
"created": "Fri, 13 Dec 2013 22:10:54 GMT"
}
] | 2013-12-17T00:00:00 | [
[
"Urli",
"Tommaso",
""
]
] | TITLE: Balancing bike sharing systems (BBSS): instance generation from the
CitiBike NYC data
ABSTRACT: Bike sharing systems are a very popular means to provide bikes to citizens in
a simple and cheap way. The idea is to install bike stations at various points
in the city, from which a registered user can easily loan a bike by removing it
from a specialized rack. After the ride, the user may return the bike at any
station (if there is a free rack). Services of this kind are mainly public or
semi-public, often aimed at increasing the attractiveness of non-motorized
means of transportation, and are usually free, or almost free, of charge for
the users. Depending on their location, bike stations have specific patterns
regarding when they are empty or full. For instance, in cities where most jobs
are located near the city centre, the commuters cause certain peaks in the
morning: the central bike stations are filled, while the stations in the
outskirts are emptied. Furthermore, stations located on top of a hill are more
likely to be empty, since users are less keen on cycling uphill to return the
bike, and often leave their bike at a more reachable station. These issues
result in substantial user dissatisfaction which may eventually cause the users
to abandon the service. This is why nowadays most bike sharing system providers
take measures to rebalance them. Over the last few years, balancing bike
sharing systems (BBSS) has become increasingly studied in optimization. As
such, generating meaningful instance to serve as a benchmark for the proposed
approaches is an important task. In this technical report we describe the
procedure we used to generate BBSS problem instances from data of the CitiBike
NYC bike sharing system.
|
1312.4108 | F. Ozgur Catak | Ferhat \"Ozg\"ur \c{C}atak, Mehmet Erdal Balaban | A MapReduce based distributed SVM algorithm for binary classification | 19 Pages. arXiv admin note: text overlap with arXiv:1301.0082 | null | null | null | cs.LG cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Although Support Vector Machine (SVM) algorithm has a high generalization
property to classify for unseen examples after training phase and it has small
loss value, the algorithm is not suitable for real-life classification and
regression problems. SVMs cannot solve hundreds of thousands examples in
training dataset. In previous studies on distributed machine learning
algorithms, SVM is trained over a costly and preconfigured computer
environment. In this research, we present a MapReduce based distributed
parallel SVM training algorithm for binary classification problems. This work
shows how to distribute optimization problem over cloud computing systems with
MapReduce technique. In the second step of this work, we used statistical
learning theory to find the predictive hypothesis that minimize our empirical
risks from hypothesis spaces that created with reduce function of MapReduce.
The results of this research are important for training of big datasets for SVM
algorithm based classification problems. We provided that iterative training of
split dataset with MapReduce technique; accuracy of the classifier function
will converge to global optimal classifier function's accuracy in finite
iteration size. The algorithm performance was measured on samples from letter
recognition and pen-based recognition of handwritten digits dataset.
| [
{
"version": "v1",
"created": "Sun, 15 Dec 2013 05:42:51 GMT"
}
] | 2013-12-17T00:00:00 | [
[
"Çatak",
"Ferhat Özgür",
""
],
[
"Balaban",
"Mehmet Erdal",
""
]
] | TITLE: A MapReduce based distributed SVM algorithm for binary classification
ABSTRACT: Although Support Vector Machine (SVM) algorithm has a high generalization
property to classify for unseen examples after training phase and it has small
loss value, the algorithm is not suitable for real-life classification and
regression problems. SVMs cannot solve hundreds of thousands examples in
training dataset. In previous studies on distributed machine learning
algorithms, SVM is trained over a costly and preconfigured computer
environment. In this research, we present a MapReduce based distributed
parallel SVM training algorithm for binary classification problems. This work
shows how to distribute optimization problem over cloud computing systems with
MapReduce technique. In the second step of this work, we used statistical
learning theory to find the predictive hypothesis that minimize our empirical
risks from hypothesis spaces that created with reduce function of MapReduce.
The results of this research are important for training of big datasets for SVM
algorithm based classification problems. We provided that iterative training of
split dataset with MapReduce technique; accuracy of the classifier function
will converge to global optimal classifier function's accuracy in finite
iteration size. The algorithm performance was measured on samples from letter
recognition and pen-based recognition of handwritten digits dataset.
|
1312.4132 | Ahmad Mozaffari | Ahmad Mozaffari and Alireza Fathi | An introduction to synchronous self-learning Pareto strategy | 17 pages, 7 figure, 3 table | null | null | null | cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In last decades optimization and control of complex systems that possessed
various conflicted objectives simultaneously attracted an incremental interest
of scientists. This is because of the vast applications of these systems in
various fields of real life engineering phenomena that are generally multi
modal, non convex and multi criterion. Hence, many researchers utilized
versatile intelligent models such as Pareto based techniques, game theory
(cooperative and non cooperative games), neuro evolutionary systems, fuzzy
logic and advanced neural networks for handling these types of problems. In
this paper a novel method called Synchronous Self Learning Pareto Strategy
Algorithm (SSLPSA) is presented which utilizes Evolutionary Computing (EC),
Swarm Intelligence (SI) techniques and adaptive Classical Self Organizing Map
(CSOM) simultaneously incorporating with a data shuffling behavior.
Evolutionary Algorithms (EA) which attempt to simulate the phenomenon of
natural evolution are powerful numerical optimization algorithms that reach an
approximate global maximum of a complex multi variable function over a wide
search space and swarm base technique can improved the intensity and the
robustness in EA. CSOM is a neural network capable of learning and can improve
the quality of obtained optimal Pareto front. To prove the efficient
performance of proposed algorithm, authors utilized some well known benchmark
test functions. Obtained results indicate that the cited method is best suit in
the case of vector optimization.
| [
{
"version": "v1",
"created": "Sun, 15 Dec 2013 10:21:05 GMT"
}
] | 2013-12-17T00:00:00 | [
[
"Mozaffari",
"Ahmad",
""
],
[
"Fathi",
"Alireza",
""
]
] | TITLE: An introduction to synchronous self-learning Pareto strategy
ABSTRACT: In last decades optimization and control of complex systems that possessed
various conflicted objectives simultaneously attracted an incremental interest
of scientists. This is because of the vast applications of these systems in
various fields of real life engineering phenomena that are generally multi
modal, non convex and multi criterion. Hence, many researchers utilized
versatile intelligent models such as Pareto based techniques, game theory
(cooperative and non cooperative games), neuro evolutionary systems, fuzzy
logic and advanced neural networks for handling these types of problems. In
this paper a novel method called Synchronous Self Learning Pareto Strategy
Algorithm (SSLPSA) is presented which utilizes Evolutionary Computing (EC),
Swarm Intelligence (SI) techniques and adaptive Classical Self Organizing Map
(CSOM) simultaneously incorporating with a data shuffling behavior.
Evolutionary Algorithms (EA) which attempt to simulate the phenomenon of
natural evolution are powerful numerical optimization algorithms that reach an
approximate global maximum of a complex multi variable function over a wide
search space and swarm base technique can improved the intensity and the
robustness in EA. CSOM is a neural network capable of learning and can improve
the quality of obtained optimal Pareto front. To prove the efficient
performance of proposed algorithm, authors utilized some well known benchmark
test functions. Obtained results indicate that the cited method is best suit in
the case of vector optimization.
|
1312.4209 | Richard Davis | Richard Davis, Sanjay Chawla, Philip Leong | Feature Graph Architectures | 9 pages, with 5 pages of supplementary material (appendices) | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this article we propose feature graph architectures (FGA), which are deep
learning systems employing a structured initialisation and training method
based on a feature graph which facilitates improved generalisation performance
compared with a standard shallow architecture. The goal is to explore
alternative perspectives on the problem of deep network training. We evaluate
FGA performance for deep SVMs on some experimental datasets, and show how
generalisation and stability results may be derived for these models. We
describe the effect of permutations on the model accuracy, and give a criterion
for the optimal permutation in terms of feature correlations. The experimental
results show that the algorithm produces robust and significant test set
improvements over a standard shallow SVM training method for a range of
datasets. These gains are achieved with a moderate increase in time complexity.
| [
{
"version": "v1",
"created": "Sun, 15 Dec 2013 23:40:49 GMT"
}
] | 2013-12-17T00:00:00 | [
[
"Davis",
"Richard",
""
],
[
"Chawla",
"Sanjay",
""
],
[
"Leong",
"Philip",
""
]
] | TITLE: Feature Graph Architectures
ABSTRACT: In this article we propose feature graph architectures (FGA), which are deep
learning systems employing a structured initialisation and training method
based on a feature graph which facilitates improved generalisation performance
compared with a standard shallow architecture. The goal is to explore
alternative perspectives on the problem of deep network training. We evaluate
FGA performance for deep SVMs on some experimental datasets, and show how
generalisation and stability results may be derived for these models. We
describe the effect of permutations on the model accuracy, and give a criterion
for the optimal permutation in terms of feature correlations. The experimental
results show that the algorithm produces robust and significant test set
improvements over a standard shallow SVM training method for a range of
datasets. These gains are achieved with a moderate increase in time complexity.
|
1312.4384 | Eren Golge | Eren Golge and Pinar Duygulu | Rectifying Self Organizing Maps for Automatic Concept Learning from Web
Images | present CVPR2014 submission | null | null | null | cs.CV cs.LG cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We attack the problem of learning concepts automatically from noisy web image
search results. Going beyond low level attributes, such as colour and texture,
we explore weakly-labelled datasets for the learning of higher level concepts,
such as scene categories. The idea is based on discovering common
characteristics shared among subsets of images by posing a method that is able
to organise the data while eliminating irrelevant instances. We propose a novel
clustering and outlier detection method, namely Rectifying Self Organizing Maps
(RSOM). Given an image collection returned for a concept query, RSOM provides
clusters pruned from outliers. Each cluster is used to train a model
representing a different characteristics of the concept. The proposed method
outperforms the state-of-the-art studies on the task of learning low-level
concepts, and it is competitive in learning higher level concepts as well. It
is capable to work at large scale with no supervision through exploiting the
available sources.
| [
{
"version": "v1",
"created": "Mon, 16 Dec 2013 14:51:00 GMT"
}
] | 2013-12-17T00:00:00 | [
[
"Golge",
"Eren",
""
],
[
"Duygulu",
"Pinar",
""
]
] | TITLE: Rectifying Self Organizing Maps for Automatic Concept Learning from Web
Images
ABSTRACT: We attack the problem of learning concepts automatically from noisy web image
search results. Going beyond low level attributes, such as colour and texture,
we explore weakly-labelled datasets for the learning of higher level concepts,
such as scene categories. The idea is based on discovering common
characteristics shared among subsets of images by posing a method that is able
to organise the data while eliminating irrelevant instances. We propose a novel
clustering and outlier detection method, namely Rectifying Self Organizing Maps
(RSOM). Given an image collection returned for a concept query, RSOM provides
clusters pruned from outliers. Each cluster is used to train a model
representing a different characteristics of the concept. The proposed method
outperforms the state-of-the-art studies on the task of learning low-level
concepts, and it is competitive in learning higher level concepts as well. It
is capable to work at large scale with no supervision through exploiting the
available sources.
|
1312.4477 | Ghazi Al-Naymat | Ghazi Al-Naymat | GCG: Mining Maximal Complete Graph Patterns from Large Spatial Data | 11 | International Conference on Computer Systems and Applications
(AICCSA), pp.1,8. Fes, Morocco.27-30 May 2013 | 10.1109/AICCSA.2013.6616417 | null | cs.DB | http://creativecommons.org/licenses/by-nc-sa/3.0/ | Recent research on pattern discovery has progressed from mining frequent
patterns and sequences to mining structured patterns, such as trees and graphs.
Graphs as general data structure can model complex relations among data with
wide applications in web exploration and social networks. However, the process
of mining large graph patterns is a challenge due to the existence of large
number of subgraphs. In this paper, we aim to mine only frequent complete graph
patterns. A graph g in a database is complete if every pair of distinct
vertices is connected by a unique edge. Grid Complete Graph (GCG) is a mining
algorithm developed to explore interesting pruning techniques to extract
maximal complete graphs from large spatial dataset existing in Sloan Digital
Sky Survey (SDSS) data. Using a divide and conquer strategy, GCG shows high
efficiency especially in the presence of large number of patterns. In this
paper, we describe GCG that can mine not only simple co-location spatial
patterns but also complex ones. To the best of our knowledge, this is the first
algorithm used to exploit the extraction of maximal complete graphs in the
process of mining complex co-location patterns in large spatial dataset.
| [
{
"version": "v1",
"created": "Fri, 13 Dec 2013 15:00:50 GMT"
}
] | 2013-12-17T00:00:00 | [
[
"Al-Naymat",
"Ghazi",
""
]
] | TITLE: GCG: Mining Maximal Complete Graph Patterns from Large Spatial Data
ABSTRACT: Recent research on pattern discovery has progressed from mining frequent
patterns and sequences to mining structured patterns, such as trees and graphs.
Graphs as general data structure can model complex relations among data with
wide applications in web exploration and social networks. However, the process
of mining large graph patterns is a challenge due to the existence of large
number of subgraphs. In this paper, we aim to mine only frequent complete graph
patterns. A graph g in a database is complete if every pair of distinct
vertices is connected by a unique edge. Grid Complete Graph (GCG) is a mining
algorithm developed to explore interesting pruning techniques to extract
maximal complete graphs from large spatial dataset existing in Sloan Digital
Sky Survey (SDSS) data. Using a divide and conquer strategy, GCG shows high
efficiency especially in the presence of large number of patterns. In this
paper, we describe GCG that can mine not only simple co-location spatial
patterns but also complex ones. To the best of our knowledge, this is the first
algorithm used to exploit the extraction of maximal complete graphs in the
process of mining complex co-location patterns in large spatial dataset.
|
1306.2230 | Lucio Floretta | Lucio Floretta, Jonas Liechti, Alessandro Flammini and Paolo De Los
Rios | Stochastic fluctuations and the detectability limit of network
communities | 5 pages, 5 figures, correction of typos, improvement of the
bibliography and of the notation, general compression | Phys. Rev. E 88, 060801 (2013) | 10.1103/PhysRevE.88.060801 | null | physics.soc-ph cond-mat.stat-mech cs.SI q-bio.QM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We have analyzed the detectability limits of network communities in the
framework of the popular Girvan and Newman benchmark. By carefully taking into
account the inevitable stochastic fluctuations that affect the construction of
each and every instance of the benchmark, we come to the conclusions that the
native, putative partition of the network is completely lost even before the
in-degree/out-degree ratio becomes equal to the one of a structure-less
Erd\"os-R\'enyi network. We develop a simple iterative scheme, analytically
well described by an infinite branching-process, to provide an estimate of the
true detectability limit. Using various algorithms based on modularity
optimization, we show that all of them behave (semi-quantitatively) in the same
way, with the same functional form of the detectability threshold as a function
of the network parameters. Because the same behavior has also been found by
further modularity-optimization methods and for methods based on different
heuristics implementations, we conclude that indeed a correct definition of the
detectability limit must take into account the stochastic fluctuations of the
network construction.
| [
{
"version": "v1",
"created": "Mon, 10 Jun 2013 15:29:14 GMT"
},
{
"version": "v2",
"created": "Tue, 18 Jun 2013 16:10:31 GMT"
}
] | 2013-12-16T00:00:00 | [
[
"Floretta",
"Lucio",
""
],
[
"Liechti",
"Jonas",
""
],
[
"Flammini",
"Alessandro",
""
],
[
"Rios",
"Paolo De Los",
""
]
] | TITLE: Stochastic fluctuations and the detectability limit of network
communities
ABSTRACT: We have analyzed the detectability limits of network communities in the
framework of the popular Girvan and Newman benchmark. By carefully taking into
account the inevitable stochastic fluctuations that affect the construction of
each and every instance of the benchmark, we come to the conclusions that the
native, putative partition of the network is completely lost even before the
in-degree/out-degree ratio becomes equal to the one of a structure-less
Erd\"os-R\'enyi network. We develop a simple iterative scheme, analytically
well described by an infinite branching-process, to provide an estimate of the
true detectability limit. Using various algorithms based on modularity
optimization, we show that all of them behave (semi-quantitatively) in the same
way, with the same functional form of the detectability threshold as a function
of the network parameters. Because the same behavior has also been found by
further modularity-optimization methods and for methods based on different
heuristics implementations, we conclude that indeed a correct definition of the
detectability limit must take into account the stochastic fluctuations of the
network construction.
|
1312.0624 | Uri Shalit | Uri Shalit and Gal Chechik | Efficient coordinate-descent for orthogonal matrices through Givens
rotations | A shorter version of this paper will appear in the proceedings of the
31st International Conference for Machine Learning (ICML 2014) | null | null | null | cs.LG stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Optimizing over the set of orthogonal matrices is a central component in
problems like sparse-PCA or tensor decomposition. Unfortunately, such
optimization is hard since simple operations on orthogonal matrices easily
break orthogonality, and correcting orthogonality usually costs a large amount
of computation. Here we propose a framework for optimizing orthogonal matrices,
that is the parallel of coordinate-descent in Euclidean spaces. It is based on
{\em Givens-rotations}, a fast-to-compute operation that affects a small number
of entries in the learned matrix, and preserves orthogonality. We show two
applications of this approach: an algorithm for tensor decomposition that is
used in learning mixture models, and an algorithm for sparse-PCA. We study the
parameter regime where a Givens rotation approach converges faster and achieves
a superior model on a genome-wide brain-wide mRNA expression dataset.
| [
{
"version": "v1",
"created": "Mon, 2 Dec 2013 21:09:40 GMT"
},
{
"version": "v2",
"created": "Fri, 13 Dec 2013 18:47:20 GMT"
}
] | 2013-12-16T00:00:00 | [
[
"Shalit",
"Uri",
""
],
[
"Chechik",
"Gal",
""
]
] | TITLE: Efficient coordinate-descent for orthogonal matrices through Givens
rotations
ABSTRACT: Optimizing over the set of orthogonal matrices is a central component in
problems like sparse-PCA or tensor decomposition. Unfortunately, such
optimization is hard since simple operations on orthogonal matrices easily
break orthogonality, and correcting orthogonality usually costs a large amount
of computation. Here we propose a framework for optimizing orthogonal matrices,
that is the parallel of coordinate-descent in Euclidean spaces. It is based on
{\em Givens-rotations}, a fast-to-compute operation that affects a small number
of entries in the learned matrix, and preserves orthogonality. We show two
applications of this approach: an algorithm for tensor decomposition that is
used in learning mixture models, and an algorithm for sparse-PCA. We study the
parameter regime where a Givens rotation approach converges faster and achieves
a superior model on a genome-wide brain-wide mRNA expression dataset.
|
1312.2789 | Chanabasayya Vastrad M | Doreswamy and Chanabasayya .M. Vastrad | Performance Analysis Of Regularized Linear Regression Models For
Oxazolines And Oxazoles Derivitive Descriptor Dataset | null | published International Journal of Computational Science and
Information Technology (IJCSITY) Vol.1, No.4, November 2013 | 10.5121/ijcsity.2013.1408 | null | cs.LG | http://creativecommons.org/licenses/by-nc-sa/3.0/ | Regularized regression techniques for linear regression have been created the
last few ten years to reduce the flaws of ordinary least squares regression
with regard to prediction accuracy. In this paper, new methods for using
regularized regression in model choice are introduced, and we distinguish the
conditions in which regularized regression develops our ability to discriminate
models. We applied all the five methods that use penalty-based (regularization)
shrinkage to handle Oxazolines and Oxazoles derivatives descriptor dataset with
far more predictors than observations. The lasso, ridge, elasticnet, lars and
relaxed lasso further possess the desirable property that they simultaneously
select relevant predictive descriptors and optimally estimate their effects.
Here, we comparatively evaluate the performance of five regularized linear
regression methods The assessment of the performance of each model by means of
benchmark experiments is an established exercise. Cross-validation and
resampling methods are generally used to arrive point evaluates the
efficiencies which are compared to recognize methods with acceptable features.
Predictive accuracy was evaluated using the root mean squared error (RMSE) and
Square of usual correlation between predictors and observed mean inhibitory
concentration of antitubercular activity (R square). We found that all five
regularized regression models were able to produce feasible models and
efficient capturing the linearity in the data. The elastic net and lars had
similar accuracies as well as lasso and relaxed lasso had similar accuracies
but outperformed ridge regression in terms of the RMSE and R square metrics.
| [
{
"version": "v1",
"created": "Tue, 10 Dec 2013 13:16:02 GMT"
}
] | 2013-12-13T00:00:00 | [
[
"Doreswamy",
"",
""
],
[
"Vastrad",
"Chanabasayya . M.",
""
]
] | TITLE: Performance Analysis Of Regularized Linear Regression Models For
Oxazolines And Oxazoles Derivitive Descriptor Dataset
ABSTRACT: Regularized regression techniques for linear regression have been created the
last few ten years to reduce the flaws of ordinary least squares regression
with regard to prediction accuracy. In this paper, new methods for using
regularized regression in model choice are introduced, and we distinguish the
conditions in which regularized regression develops our ability to discriminate
models. We applied all the five methods that use penalty-based (regularization)
shrinkage to handle Oxazolines and Oxazoles derivatives descriptor dataset with
far more predictors than observations. The lasso, ridge, elasticnet, lars and
relaxed lasso further possess the desirable property that they simultaneously
select relevant predictive descriptors and optimally estimate their effects.
Here, we comparatively evaluate the performance of five regularized linear
regression methods The assessment of the performance of each model by means of
benchmark experiments is an established exercise. Cross-validation and
resampling methods are generally used to arrive point evaluates the
efficiencies which are compared to recognize methods with acceptable features.
Predictive accuracy was evaluated using the root mean squared error (RMSE) and
Square of usual correlation between predictors and observed mean inhibitory
concentration of antitubercular activity (R square). We found that all five
regularized regression models were able to produce feasible models and
efficient capturing the linearity in the data. The elastic net and lars had
similar accuracies as well as lasso and relaxed lasso had similar accuracies
but outperformed ridge regression in terms of the RMSE and R square metrics.
|
1312.2841 | Chanabasayya Vastrad M | Doreswamy and Chanabasayya .M. Vastrad | Predictive Comparative QSAR Analysis Of As 5-Nitofuran-2-YL Derivatives
Myco bacterium tuberculosis H37RV Inhibitors Bacterium Tuberculosis H37RV
Inhibitors | null | published Health Informatics- An International Journal (HIIJ)
Vol.2, No.4, November 2013 | 10.5121/hiij.2013.2404 | null | cs.CE | http://creativecommons.org/licenses/by-nc-sa/3.0/ | Antitubercular activity of 5-nitrofuran-2-yl Derivatives series were
subjected to Quantitative Structure Activity Relationship (QSAR) Analysis with
an effort to derive and understand a correlation between the biological
activity as response variable and different molecular descriptors as
independent variables. QSAR models are built using 40 molecular descriptor
dataset. Different statistical regression expressions were got using Partial
Least Squares (PLS),Multiple Linear Regression (MLR) and Principal Component
Regression (PCR) techniques. The among these technique, Partial Least Square
Regression (PLS) technique has shown very promising result as compared to MLR
technique A QSAR model was build by a training set of 30 molecules with
correlation coefficient ($r^2$) of 0.8484, significant cross validated
correlation coefficient ($q^2$) is 0.0939, F test is 48.5187, ($r^2$) for
external test set (pred$_r^2$) is -0.5604, coefficient of correlation of
predicted data set (pred$_r^2se$) is 0.7252 and degree of freedom is 26 by
Partial Least Squares Regression technique.
| [
{
"version": "v1",
"created": "Tue, 10 Dec 2013 15:50:39 GMT"
}
] | 2013-12-13T00:00:00 | [
[
"Doreswamy",
"",
""
],
[
"Vastrad",
"Chanabasayya . M.",
""
]
] | TITLE: Predictive Comparative QSAR Analysis Of As 5-Nitofuran-2-YL Derivatives
Myco bacterium tuberculosis H37RV Inhibitors Bacterium Tuberculosis H37RV
Inhibitors
ABSTRACT: Antitubercular activity of 5-nitrofuran-2-yl Derivatives series were
subjected to Quantitative Structure Activity Relationship (QSAR) Analysis with
an effort to derive and understand a correlation between the biological
activity as response variable and different molecular descriptors as
independent variables. QSAR models are built using 40 molecular descriptor
dataset. Different statistical regression expressions were got using Partial
Least Squares (PLS),Multiple Linear Regression (MLR) and Principal Component
Regression (PCR) techniques. The among these technique, Partial Least Square
Regression (PLS) technique has shown very promising result as compared to MLR
technique A QSAR model was build by a training set of 30 molecules with
correlation coefficient ($r^2$) of 0.8484, significant cross validated
correlation coefficient ($q^2$) is 0.0939, F test is 48.5187, ($r^2$) for
external test set (pred$_r^2$) is -0.5604, coefficient of correlation of
predicted data set (pred$_r^2se$) is 0.7252 and degree of freedom is 26 by
Partial Least Squares Regression technique.
|
1312.2853 | Chanabasayya Vastrad M | Doreswamy and Chanabasayya .M. Vastrad | Performance Analysis Of Neural Network Models For Oxazolines And
Oxazoles Derivatives Descriptor Dataset | null | published International Journal of Information Sciences and
Techniques (IJIST) Vol.3, No.6, November 2013 | 10.5121/ijist.2013.3601 | null | cs.CE cs.NE | http://creativecommons.org/licenses/by-nc-sa/3.0/ | Neural networks have been used successfully to a broad range of areas such as
business, data mining, drug discovery and biology. In medicine, neural networks
have been applied widely in medical diagnosis, detection and evaluation of new
drugs and treatment cost estimation. In addition, neural networks have begin
practice in data mining strategies for the aim of prediction, knowledge
discovery. This paper will present the application of neural networks for the
prediction and analysis of antitubercular activity of Oxazolines and Oxazoles
derivatives. This study presents techniques based on the development of Single
hidden layer neural network (SHLFFNN), Gradient Descent Back propagation neural
network (GDBPNN), Gradient Descent Back propagation with momentum neural
network (GDBPMNN), Back propagation with Weight decay neural network (BPWDNN)
and Quantile regression neural network (QRNN) of artificial neural network
(ANN) models Here, we comparatively evaluate the performance of five neural
network techniques. The evaluation of the efficiency of each model by ways of
benchmark experiments is an accepted application. Cross-validation and
resampling techniques are commonly used to derive point estimates of the
performances which are compared to identify methods with good properties.
Predictive accuracy was evaluated using the root mean squared error (RMSE),
Coefficient determination(???), mean absolute error(MAE), mean percentage
error(MPE) and relative square error(RSE). We found that all five neural
network models were able to produce feasible models. QRNN model is outperforms
with all statistical tests amongst other four models.
| [
{
"version": "v1",
"created": "Tue, 10 Dec 2013 16:15:48 GMT"
}
] | 2013-12-13T00:00:00 | [
[
"Doreswamy",
"",
""
],
[
"Vastrad",
"Chanabasayya . M.",
""
]
] | TITLE: Performance Analysis Of Neural Network Models For Oxazolines And
Oxazoles Derivatives Descriptor Dataset
ABSTRACT: Neural networks have been used successfully to a broad range of areas such as
business, data mining, drug discovery and biology. In medicine, neural networks
have been applied widely in medical diagnosis, detection and evaluation of new
drugs and treatment cost estimation. In addition, neural networks have begin
practice in data mining strategies for the aim of prediction, knowledge
discovery. This paper will present the application of neural networks for the
prediction and analysis of antitubercular activity of Oxazolines and Oxazoles
derivatives. This study presents techniques based on the development of Single
hidden layer neural network (SHLFFNN), Gradient Descent Back propagation neural
network (GDBPNN), Gradient Descent Back propagation with momentum neural
network (GDBPMNN), Back propagation with Weight decay neural network (BPWDNN)
and Quantile regression neural network (QRNN) of artificial neural network
(ANN) models Here, we comparatively evaluate the performance of five neural
network techniques. The evaluation of the efficiency of each model by ways of
benchmark experiments is an accepted application. Cross-validation and
resampling techniques are commonly used to derive point estimates of the
performances which are compared to identify methods with good properties.
Predictive accuracy was evaluated using the root mean squared error (RMSE),
Coefficient determination(???), mean absolute error(MAE), mean percentage
error(MPE) and relative square error(RSE). We found that all five neural
network models were able to produce feasible models. QRNN model is outperforms
with all statistical tests amongst other four models.
|
1312.2859 | Chanabasayya Vastrad M | Doreswamy and Chanabasayya .M. Vastrad | A Robust Missing Value Imputation Method MifImpute For Incomplete
Molecular Descriptor Data And Comparative Analysis With Other Missing Value
Imputation Methods | arXiv admin note: text overlap with arXiv:1105.0828 by other authors
without attribution | Published International Journal on Computational Sciences &
Applications (IJCSA) Vol.3, No4, August 2013 | 10.5121/ijcsa.2013.3406 | null | cs.CE | http://creativecommons.org/licenses/by-nc-sa/3.0/ | Missing data imputation is an important research topic in data mining.
Large-scale Molecular descriptor data may contains missing values (MVs).
However, some methods for downstream analyses, including some prediction tools,
require a complete descriptor data matrix. We propose and evaluate an iterative
imputation method MiFoImpute based on a random forest. By averaging over many
unpruned regression trees, random forest intrinsically constitutes a multiple
imputation scheme. Using the NRMSE and NMAE estimates of random forest, we are
able to estimate the imputation error. Evaluation is performed on two molecular
descriptor datasets generated from a diverse selection of pharmaceutical fields
with artificially introduced missing values ranging from 10% to 30%. The
experimental result demonstrates that missing values has a great impact on the
effectiveness of imputation techniques and our method MiFoImpute is more robust
to missing value than the other ten imputation methods used as benchmark.
Additionally, MiFoImpute exhibits attractive computational efficiency and can
cope with high-dimensional data.
| [
{
"version": "v1",
"created": "Tue, 10 Dec 2013 16:24:28 GMT"
}
] | 2013-12-13T00:00:00 | [
[
"Doreswamy",
"",
""
],
[
"Vastrad",
"Chanabasayya . M.",
""
]
] | TITLE: A Robust Missing Value Imputation Method MifImpute For Incomplete
Molecular Descriptor Data And Comparative Analysis With Other Missing Value
Imputation Methods
ABSTRACT: Missing data imputation is an important research topic in data mining.
Large-scale Molecular descriptor data may contains missing values (MVs).
However, some methods for downstream analyses, including some prediction tools,
require a complete descriptor data matrix. We propose and evaluate an iterative
imputation method MiFoImpute based on a random forest. By averaging over many
unpruned regression trees, random forest intrinsically constitutes a multiple
imputation scheme. Using the NRMSE and NMAE estimates of random forest, we are
able to estimate the imputation error. Evaluation is performed on two molecular
descriptor datasets generated from a diverse selection of pharmaceutical fields
with artificially introduced missing values ranging from 10% to 30%. The
experimental result demonstrates that missing values has a great impact on the
effectiveness of imputation techniques and our method MiFoImpute is more robust
to missing value than the other ten imputation methods used as benchmark.
Additionally, MiFoImpute exhibits attractive computational efficiency and can
cope with high-dimensional data.
|
1312.2861 | Chanabasayya Vastrad M | Doreswamy and Chanabasayya .M. Vastrad | Identification Of Outliers In Oxazolines AND Oxazoles High Dimension
Molecular Descriptor Dataset Using Principal Component Outlier Detection
Algorithm And Comparative Numerical Study Of Other Robust Estimators | null | Published International Journal of Data Mining & Knowledge
Management Process (IJDKP) Vol.3, No.4, July 2013 | 10.5121/ijdkp.2013.3405 | null | cs.CE | http://creativecommons.org/licenses/by-nc-sa/3.0/ | From the past decade outlier detection has been in use. Detection of outliers
is an emerging topic and is having robust applications in medical sciences and
pharmaceutical sciences. Outlier detection is used to detect anomalous
behaviour of data. Typical problems in Bioinformatics can be addressed by
outlier detection. A computationally fast method for detecting outliers is
shown, that is particularly effective in high dimensions. PrCmpOut algorithm
make use of simple properties of principal components to detect outliers in the
transformed space, leading to significant computational advantages for high
dimensional data. This procedure requires considerably less computational time
than existing methods for outlier detection. The properties of this estimator
(Outlier error rate (FN), Non-Outlier error rate(FP) and computational costs)
are analyzed and compared with those of other robust estimators described in
the literature through simulation studies. Numerical evidence based Oxazolines
and Oxazoles molecular descriptor dataset shows that the proposed method
performs well in a variety of situations of practical interest. It is thus a
valuable companion to the existing outlier detection methods.
| [
{
"version": "v1",
"created": "Tue, 10 Dec 2013 16:35:25 GMT"
}
] | 2013-12-13T00:00:00 | [
[
"Doreswamy",
"",
""
],
[
"Vastrad",
"Chanabasayya . M.",
""
]
] | TITLE: Identification Of Outliers In Oxazolines AND Oxazoles High Dimension
Molecular Descriptor Dataset Using Principal Component Outlier Detection
Algorithm And Comparative Numerical Study Of Other Robust Estimators
ABSTRACT: From the past decade outlier detection has been in use. Detection of outliers
is an emerging topic and is having robust applications in medical sciences and
pharmaceutical sciences. Outlier detection is used to detect anomalous
behaviour of data. Typical problems in Bioinformatics can be addressed by
outlier detection. A computationally fast method for detecting outliers is
shown, that is particularly effective in high dimensions. PrCmpOut algorithm
make use of simple properties of principal components to detect outliers in the
transformed space, leading to significant computational advantages for high
dimensional data. This procedure requires considerably less computational time
than existing methods for outlier detection. The properties of this estimator
(Outlier error rate (FN), Non-Outlier error rate(FP) and computational costs)
are analyzed and compared with those of other robust estimators described in
the literature through simulation studies. Numerical evidence based Oxazolines
and Oxazoles molecular descriptor dataset shows that the proposed method
performs well in a variety of situations of practical interest. It is thus a
valuable companion to the existing outlier detection methods.
|
1312.3388 | Tianlin Shi | Tianlin Shi and Jun Zhu | Online Bayesian Passive-Aggressive Learning | 10 Pages. ICML 2014, Beijing, China | null | null | null | cs.LG | http://creativecommons.org/licenses/by/3.0/ | Online Passive-Aggressive (PA) learning is an effective framework for
performing max-margin online learning. But the deterministic formulation and
estimated single large-margin model could limit its capability in discovering
descriptive structures underlying complex data. This pa- per presents online
Bayesian Passive-Aggressive (BayesPA) learning, which subsumes the online PA
and extends naturally to incorporate latent variables and perform nonparametric
Bayesian inference, thus providing great flexibility for explorative analysis.
We apply BayesPA to topic modeling and derive efficient online learning
algorithms for max-margin topic models. We further develop nonparametric
methods to resolve the number of topics. Experimental results on real datasets
show that our approaches significantly improve time efficiency while
maintaining comparable results with the batch counterparts.
| [
{
"version": "v1",
"created": "Thu, 12 Dec 2013 02:46:07 GMT"
}
] | 2013-12-13T00:00:00 | [
[
"Shi",
"Tianlin",
""
],
[
"Zhu",
"Jun",
""
]
] | TITLE: Online Bayesian Passive-Aggressive Learning
ABSTRACT: Online Passive-Aggressive (PA) learning is an effective framework for
performing max-margin online learning. But the deterministic formulation and
estimated single large-margin model could limit its capability in discovering
descriptive structures underlying complex data. This pa- per presents online
Bayesian Passive-Aggressive (BayesPA) learning, which subsumes the online PA
and extends naturally to incorporate latent variables and perform nonparametric
Bayesian inference, thus providing great flexibility for explorative analysis.
We apply BayesPA to topic modeling and derive efficient online learning
algorithms for max-margin topic models. We further develop nonparametric
methods to resolve the number of topics. Experimental results on real datasets
show that our approaches significantly improve time efficiency while
maintaining comparable results with the batch counterparts.
|
1310.4342 | Kiran Sree Pokkuluri Prof | Pokkuluri Kiran Sree, Inampudi Ramesh Babuhor, SSSN Usha Devi N3 | An Extensive Report on Cellular Automata Based Artificial Immune System
for Strengthening Automated Protein Prediction | arXiv admin note: text overlap with arXiv:0801.4312 by other authors | Advances in Biomedical Engineering Research (ABER) Volume 1 Issue
3, September 2013 | null | null | cs.AI cs.CE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Artificial Immune System (AIS-MACA) a novel computational intelligence
technique is can be used for strengthening the automated protein prediction
system with more adaptability and incorporating more parallelism to the system.
Most of the existing approaches are sequential which will classify the input
into four major classes and these are designed for similar sequences. AIS-MACA
is designed to identify ten classes from the sequences that share twilight zone
similarity and identity with the training sequences with mixed and hybrid
variations. This method also predicts three states (helix, strand, and coil)
for the secondary structure. Our comprehensive design considers 10 feature
selection methods and 4 classifiers to develop MACA (Multiple Attractor
Cellular Automata) based classifiers that are build for each of the ten
classes. We have tested the proposed classifier with twilight-zone and
1-high-similarity benchmark datasets with over three dozens of modern competing
predictors shows that AIS-MACA provides the best overall accuracy that ranges
between 80% and 89.8% depending on the dataset.
| [
{
"version": "v1",
"created": "Wed, 16 Oct 2013 12:14:48 GMT"
}
] | 2013-12-12T00:00:00 | [
[
"Sree",
"Pokkuluri Kiran",
""
],
[
"Babuhor",
"Inampudi Ramesh",
""
],
[
"N3",
"SSSN Usha Devi",
""
]
] | TITLE: An Extensive Report on Cellular Automata Based Artificial Immune System
for Strengthening Automated Protein Prediction
ABSTRACT: Artificial Immune System (AIS-MACA) a novel computational intelligence
technique is can be used for strengthening the automated protein prediction
system with more adaptability and incorporating more parallelism to the system.
Most of the existing approaches are sequential which will classify the input
into four major classes and these are designed for similar sequences. AIS-MACA
is designed to identify ten classes from the sequences that share twilight zone
similarity and identity with the training sequences with mixed and hybrid
variations. This method also predicts three states (helix, strand, and coil)
for the secondary structure. Our comprehensive design considers 10 feature
selection methods and 4 classifiers to develop MACA (Multiple Attractor
Cellular Automata) based classifiers that are build for each of the ten
classes. We have tested the proposed classifier with twilight-zone and
1-high-similarity benchmark datasets with over three dozens of modern competing
predictors shows that AIS-MACA provides the best overall accuracy that ranges
between 80% and 89.8% depending on the dataset.
|
1312.1558 | Tarek Hamrouni | Tarek Hamrouni and Sadok Ben Yahia and Engelbert Mephu Nguifo | Efficient construction of the lattice of frequent closed patterns and
simultaneous extraction of generic bases of rules | 50 pages, in French | Mathematics and Social Sciences, Volume 49, Number 195, 2011(3),
pages 5-54 | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In the last few years, the amount of collected data, in various computer
science applications, has grown considerably. These large volumes of data need
to be analyzed in order to extract useful hidden knowledge. This work focuses
on association rule extraction. This technique is one of the most popular in
data mining. Nevertheless, the number of extracted association rules is often
very high, and many of them are redundant. In this paper, we propose a new
algorithm, called PRINCE. Its main feature is the construction of a partially
ordered structure for extracting subsets of association rules, called generic
bases. Without loss of information these subsets form representation of the
whole association rule set. To reduce the cost of such a construction, the
partially ordered structure is built thanks to the minimal generators
associated to frequent closed patterns. The closed ones are simultaneously
derived with generic bases thanks to a simple bottom-up traversal of the
obtained structure. The experimentations we carried out in benchmark and "worst
case" contexts showed the efficiency of the proposed algorithm, compared to
algorithms like CLOSE, A-CLOSE and TITANIC.
| [
{
"version": "v1",
"created": "Thu, 5 Dec 2013 14:23:16 GMT"
},
{
"version": "v2",
"created": "Wed, 11 Dec 2013 11:51:11 GMT"
}
] | 2013-12-12T00:00:00 | [
[
"Hamrouni",
"Tarek",
""
],
[
"Yahia",
"Sadok Ben",
""
],
[
"Nguifo",
"Engelbert Mephu",
""
]
] | TITLE: Efficient construction of the lattice of frequent closed patterns and
simultaneous extraction of generic bases of rules
ABSTRACT: In the last few years, the amount of collected data, in various computer
science applications, has grown considerably. These large volumes of data need
to be analyzed in order to extract useful hidden knowledge. This work focuses
on association rule extraction. This technique is one of the most popular in
data mining. Nevertheless, the number of extracted association rules is often
very high, and many of them are redundant. In this paper, we propose a new
algorithm, called PRINCE. Its main feature is the construction of a partially
ordered structure for extracting subsets of association rules, called generic
bases. Without loss of information these subsets form representation of the
whole association rule set. To reduce the cost of such a construction, the
partially ordered structure is built thanks to the minimal generators
associated to frequent closed patterns. The closed ones are simultaneously
derived with generic bases thanks to a simple bottom-up traversal of the
obtained structure. The experimentations we carried out in benchmark and "worst
case" contexts showed the efficiency of the proposed algorithm, compared to
algorithms like CLOSE, A-CLOSE and TITANIC.
|
1312.3020 | Huasha Zhao Mr | Huasha Zhao, John Canny | Sparse Allreduce: Efficient Scalable Communication for Power-Law Data | null | null | null | null | cs.DC cs.AI cs.MS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Many large datasets exhibit power-law statistics: The web graph, social
networks, text data, click through data etc. Their adjacency graphs are termed
natural graphs, and are known to be difficult to partition. As a consequence
most distributed algorithms on these graphs are communication intensive. Many
algorithms on natural graphs involve an Allreduce: a sum or average of
partitioned data which is then shared back to the cluster nodes. Examples
include PageRank, spectral partitioning, and many machine learning algorithms
including regression, factor (topic) models, and clustering. In this paper we
describe an efficient and scalable Allreduce primitive for power-law data. We
point out scaling problems with existing butterfly and round-robin networks for
Sparse Allreduce, and show that a hybrid approach improves on both.
Furthermore, we show that Sparse Allreduce stages should be nested instead of
cascaded (as in the dense case). And that the optimum throughput Allreduce
network should be a butterfly of heterogeneous degree where degree decreases
with depth into the network. Finally, a simple replication scheme is introduced
to deal with node failures. We present experiments showing significant
improvements over existing systems such as PowerGraph and Hadoop.
| [
{
"version": "v1",
"created": "Wed, 11 Dec 2013 02:33:45 GMT"
}
] | 2013-12-12T00:00:00 | [
[
"Zhao",
"Huasha",
""
],
[
"Canny",
"John",
""
]
] | TITLE: Sparse Allreduce: Efficient Scalable Communication for Power-Law Data
ABSTRACT: Many large datasets exhibit power-law statistics: The web graph, social
networks, text data, click through data etc. Their adjacency graphs are termed
natural graphs, and are known to be difficult to partition. As a consequence
most distributed algorithms on these graphs are communication intensive. Many
algorithms on natural graphs involve an Allreduce: a sum or average of
partitioned data which is then shared back to the cluster nodes. Examples
include PageRank, spectral partitioning, and many machine learning algorithms
including regression, factor (topic) models, and clustering. In this paper we
describe an efficient and scalable Allreduce primitive for power-law data. We
point out scaling problems with existing butterfly and round-robin networks for
Sparse Allreduce, and show that a hybrid approach improves on both.
Furthermore, we show that Sparse Allreduce stages should be nested instead of
cascaded (as in the dense case). And that the optimum throughput Allreduce
network should be a butterfly of heterogeneous degree where degree decreases
with depth into the network. Finally, a simple replication scheme is introduced
to deal with node failures. We present experiments showing significant
improvements over existing systems such as PowerGraph and Hadoop.
|
1312.3062 | Jingdong Wang | Jingdong Wang, Jing Wang, Gang Zeng, Rui Gan, Shipeng Li, Baining Guo | Fast Neighborhood Graph Search using Cartesian Concatenation | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we propose a new data structure for approximate nearest
neighbor search. This structure augments the neighborhood graph with a bridge
graph. We propose to exploit Cartesian concatenation to produce a large set of
vectors, called bridge vectors, from several small sets of subvectors. Each
bridge vector is connected with a few reference vectors near to it, forming a
bridge graph. Our approach finds nearest neighbors by simultaneously traversing
the neighborhood graph and the bridge graph in the best-first strategy. The
success of our approach stems from two factors: the exact nearest neighbor
search over a large number of bridge vectors can be done quickly, and the
reference vectors connected to a bridge (reference) vector near the query are
also likely to be near the query. Experimental results on searching over large
scale datasets (SIFT, GIST and HOG) show that our approach outperforms
state-of-the-art ANN search algorithms in terms of efficiency and accuracy. The
combination of our approach with the IVFADC system also shows superior
performance over the BIGANN dataset of $1$ billion SIFT features compared with
the best previously published result.
| [
{
"version": "v1",
"created": "Wed, 11 Dec 2013 08:02:29 GMT"
}
] | 2013-12-12T00:00:00 | [
[
"Wang",
"Jingdong",
""
],
[
"Wang",
"Jing",
""
],
[
"Zeng",
"Gang",
""
],
[
"Gan",
"Rui",
""
],
[
"Li",
"Shipeng",
""
],
[
"Guo",
"Baining",
""
]
] | TITLE: Fast Neighborhood Graph Search using Cartesian Concatenation
ABSTRACT: In this paper, we propose a new data structure for approximate nearest
neighbor search. This structure augments the neighborhood graph with a bridge
graph. We propose to exploit Cartesian concatenation to produce a large set of
vectors, called bridge vectors, from several small sets of subvectors. Each
bridge vector is connected with a few reference vectors near to it, forming a
bridge graph. Our approach finds nearest neighbors by simultaneously traversing
the neighborhood graph and the bridge graph in the best-first strategy. The
success of our approach stems from two factors: the exact nearest neighbor
search over a large number of bridge vectors can be done quickly, and the
reference vectors connected to a bridge (reference) vector near the query are
also likely to be near the query. Experimental results on searching over large
scale datasets (SIFT, GIST and HOG) show that our approach outperforms
state-of-the-art ANN search algorithms in terms of efficiency and accuracy. The
combination of our approach with the IVFADC system also shows superior
performance over the BIGANN dataset of $1$ billion SIFT features compared with
the best previously published result.
|
1303.6609 | Jagan Sankaranarayanan | Jeff LeFevre, Jagan Sankaranarayanan, Hakan Hacigumus, Junichi
Tatemura, Neoklis Polyzotis, Michael J. Carey | Exploiting Opportunistic Physical Design in Large-scale Data Analytics | 15 pages | null | null | null | cs.DB cs.DC cs.DS | http://creativecommons.org/licenses/by-nc-sa/3.0/ | Large-scale systems, such as MapReduce and Hadoop, perform aggressive
materialization of intermediate job results in order to support fault
tolerance. When jobs correspond to exploratory queries submitted by data
analysts, these materializations yield a large set of materialized views that
typically capture common computation among successive queries from the same
analyst, or even across queries of different analysts who test similar
hypotheses. We propose to treat these views as an opportunistic physical design
and use them for the purpose of query optimization. We develop a novel
query-rewrite algorithm that addresses the two main challenges in this context:
how to search the large space of rewrites, and how to reason about views that
contain UDFs (a common feature in large-scale data analytics). The algorithm,
which provably finds the minimum-cost rewrite, is inspired by nearest-neighbor
searches in non-metric spaces. We present an extensive experimental study on
real-world datasets with a prototype data-analytics system based on Hive. The
results demonstrate that our approach can result in dramatic performance
improvements on complex data-analysis queries, reducing total execution time by
an average of 61% and up to two orders of magnitude.
| [
{
"version": "v1",
"created": "Tue, 26 Mar 2013 19:08:55 GMT"
},
{
"version": "v2",
"created": "Tue, 10 Dec 2013 17:35:09 GMT"
}
] | 2013-12-11T00:00:00 | [
[
"LeFevre",
"Jeff",
""
],
[
"Sankaranarayanan",
"Jagan",
""
],
[
"Hacigumus",
"Hakan",
""
],
[
"Tatemura",
"Junichi",
""
],
[
"Polyzotis",
"Neoklis",
""
],
[
"Carey",
"Michael J.",
""
]
] | TITLE: Exploiting Opportunistic Physical Design in Large-scale Data Analytics
ABSTRACT: Large-scale systems, such as MapReduce and Hadoop, perform aggressive
materialization of intermediate job results in order to support fault
tolerance. When jobs correspond to exploratory queries submitted by data
analysts, these materializations yield a large set of materialized views that
typically capture common computation among successive queries from the same
analyst, or even across queries of different analysts who test similar
hypotheses. We propose to treat these views as an opportunistic physical design
and use them for the purpose of query optimization. We develop a novel
query-rewrite algorithm that addresses the two main challenges in this context:
how to search the large space of rewrites, and how to reason about views that
contain UDFs (a common feature in large-scale data analytics). The algorithm,
which provably finds the minimum-cost rewrite, is inspired by nearest-neighbor
searches in non-metric spaces. We present an extensive experimental study on
real-world datasets with a prototype data-analytics system based on Hive. The
results demonstrate that our approach can result in dramatic performance
improvements on complex data-analysis queries, reducing total execution time by
an average of 61% and up to two orders of magnitude.
|
1312.2628 | Ibrahim Umar | Ibrahim Umar, Otto Anshus, Phuong Ha (University of Troms{\o}) | DeltaTree: A Practical Locality-aware Concurrent Search Tree | null | null | null | IFI-UIT Technical Report 2013-74 | cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | As other fundamental programming abstractions in energy-efficient computing,
search trees are expected to support both high parallelism and data locality.
However, existing highly-concurrent search trees such as red-black trees and
AVL trees do not consider data locality while existing locality-aware search
trees such as those based on the van Emde Boas layout (vEB-based trees), poorly
support concurrent (update) operations.
This paper presents DeltaTree, a practical locality-aware concurrent search
tree that combines both locality-optimisation techniques from vEB-based trees
and concurrency-optimisation techniques from non-blocking highly-concurrent
search trees. DeltaTree is a $k$-ary leaf-oriented tree of DeltaNodes in which
each DeltaNode is a size-fixed tree-container with the van Emde Boas layout.
The expected memory transfer costs of DeltaTree's Search, Insert, and Delete
operations are $O(\log_B N)$, where $N, B$ are the tree size and the unknown
memory block size in the ideal cache model, respectively. DeltaTree's Search
operation is wait-free, providing prioritised lanes for Search operations, the
dominant operation in search trees. Its Insert and {\em Delete} operations are
non-blocking to other Search, Insert, and Delete operations, but they may be
occasionally blocked by maintenance operations that are sometimes triggered to
keep DeltaTree in good shape. Our experimental evaluation using the latest
implementation of AVL, red-black, and speculation friendly trees from the
Synchrobench benchmark has shown that DeltaTree is up to 5 times faster than
all of the three concurrent search trees for searching operations and up to 1.6
times faster for update operations when the update contention is not too high.
| [
{
"version": "v1",
"created": "Mon, 9 Dec 2013 23:30:02 GMT"
}
] | 2013-12-11T00:00:00 | [
[
"Umar",
"Ibrahim",
"",
"University of Tromsø"
],
[
"Anshus",
"Otto",
"",
"University of Tromsø"
],
[
"Ha",
"Phuong",
"",
"University of Tromsø"
]
] | TITLE: DeltaTree: A Practical Locality-aware Concurrent Search Tree
ABSTRACT: As other fundamental programming abstractions in energy-efficient computing,
search trees are expected to support both high parallelism and data locality.
However, existing highly-concurrent search trees such as red-black trees and
AVL trees do not consider data locality while existing locality-aware search
trees such as those based on the van Emde Boas layout (vEB-based trees), poorly
support concurrent (update) operations.
This paper presents DeltaTree, a practical locality-aware concurrent search
tree that combines both locality-optimisation techniques from vEB-based trees
and concurrency-optimisation techniques from non-blocking highly-concurrent
search trees. DeltaTree is a $k$-ary leaf-oriented tree of DeltaNodes in which
each DeltaNode is a size-fixed tree-container with the van Emde Boas layout.
The expected memory transfer costs of DeltaTree's Search, Insert, and Delete
operations are $O(\log_B N)$, where $N, B$ are the tree size and the unknown
memory block size in the ideal cache model, respectively. DeltaTree's Search
operation is wait-free, providing prioritised lanes for Search operations, the
dominant operation in search trees. Its Insert and {\em Delete} operations are
non-blocking to other Search, Insert, and Delete operations, but they may be
occasionally blocked by maintenance operations that are sometimes triggered to
keep DeltaTree in good shape. Our experimental evaluation using the latest
implementation of AVL, red-black, and speculation friendly trees from the
Synchrobench benchmark has shown that DeltaTree is up to 5 times faster than
all of the three concurrent search trees for searching operations and up to 1.6
times faster for update operations when the update contention is not too high.
|
1312.2632 | Yongcai Wang | Yongcai Wang, Haoran Feng, Xiao Qi | SEED: Public Energy and Environment Dataset for Optimizing HVAC
Operation in Subway Stations | 5 pages, 14 figures | null | null | null | cs.SY | http://creativecommons.org/licenses/by/3.0/ | For sustainability and energy saving, the problem to optimize the control of
heating, ventilating, and air-conditioning (HVAC) systems has attracted great
attentions, but analyzing the signatures of thermal environments and HVAC
systems and the evaluation of the optimization policies has encountered
inefficiency and inconvenient problems due to the lack of public dataset. In
this paper, we present the Subway station Energy and Environment Dataset
(SEED), which was collected from a line of Beijing subway stations, providing
minute-resolution data regarding the environment dynamics (temperature,
humidity, CO2, etc.) working states and energy consumptions of the HVAC systems
(ventilators, refrigerators, pumps), and hour-resolution data of passenger
flows. We describe the sensor deployments and the HVAC systems for data
collection and for environment control, and also present initial investigation
for the energy disaggregation of HVAC system, the signatures of the thermal
load, cooling supply, and the passenger flow using the dataset.
| [
{
"version": "v1",
"created": "Tue, 10 Dec 2013 00:29:04 GMT"
}
] | 2013-12-11T00:00:00 | [
[
"Wang",
"Yongcai",
""
],
[
"Feng",
"Haoran",
""
],
[
"Qi",
"Xiao",
""
]
] | TITLE: SEED: Public Energy and Environment Dataset for Optimizing HVAC
Operation in Subway Stations
ABSTRACT: For sustainability and energy saving, the problem to optimize the control of
heating, ventilating, and air-conditioning (HVAC) systems has attracted great
attentions, but analyzing the signatures of thermal environments and HVAC
systems and the evaluation of the optimization policies has encountered
inefficiency and inconvenient problems due to the lack of public dataset. In
this paper, we present the Subway station Energy and Environment Dataset
(SEED), which was collected from a line of Beijing subway stations, providing
minute-resolution data regarding the environment dynamics (temperature,
humidity, CO2, etc.) working states and energy consumptions of the HVAC systems
(ventilators, refrigerators, pumps), and hour-resolution data of passenger
flows. We describe the sensor deployments and the HVAC systems for data
collection and for environment control, and also present initial investigation
for the energy disaggregation of HVAC system, the signatures of the thermal
load, cooling supply, and the passenger flow using the dataset.
|
1312.2704 | EPTCS | Rumyana Neykova (Imperial College) | Session Types Go Dynamic or How to Verify Your Python Conversations | In Proceedings PLACES 2013, arXiv:1312.2218 | EPTCS 137, 2013, pp. 95-102 | 10.4204/EPTCS.137.8 | null | cs.PL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper presents the first implementation of session types in a
dynamically-typed language - Python. Communication safety of the whole system
is guaranteed at runtime by monitors that check the execution traces comply
with an associated protocol. Protocols are written in Scribble, a choreography
description language based on multiparty session types, with addition of logic
formulas for more precise behaviour properties. The presented framework
overcomes the limitations of previous works on the session types where all
endpoints should be statically typed so that they do not permit
interoperability with untyped participants. The advantages, expressiveness and
performance of dynamic protocol checking are demonstrated through use case and
benchmarks.
| [
{
"version": "v1",
"created": "Tue, 10 Dec 2013 08:04:18 GMT"
}
] | 2013-12-11T00:00:00 | [
[
"Neykova",
"Rumyana",
"",
"Imperial College"
]
] | TITLE: Session Types Go Dynamic or How to Verify Your Python Conversations
ABSTRACT: This paper presents the first implementation of session types in a
dynamically-typed language - Python. Communication safety of the whole system
is guaranteed at runtime by monitors that check the execution traces comply
with an associated protocol. Protocols are written in Scribble, a choreography
description language based on multiparty session types, with addition of logic
formulas for more precise behaviour properties. The presented framework
overcomes the limitations of previous works on the session types where all
endpoints should be statically typed so that they do not permit
interoperability with untyped participants. The advantages, expressiveness and
performance of dynamic protocol checking are demonstrated through use case and
benchmarks.
|
1205.6548 | Xiaojun Zhou | Xiaojun Zhou, Chunhua Yang and Weihua Gui | State Transition Algorithm | 18 pages, 28 figures | Journal of Industrial and Management Optimization 8(4): 1039-1056,
2012 | 10.3934/jimo.2012.8.1039 | null | math.OC cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In terms of the concepts of state and state transition, a new heuristic
random search algorithm named state transition algorithm is proposed. For
continuous function optimization problems, four special transformation
operators called rotation, translation, expansion and axesion are designed.
Adjusting measures of the transformations are mainly studied to keep the
balance of exploration and exploitation. Convergence analysis is also discussed
about the algorithm based on random search theory. In the meanwhile, to
strengthen the search ability in high dimensional space, communication strategy
is introduced into the basic algorithm and intermittent exchange is presented
to prevent premature convergence. Finally, experiments are carried out for the
algorithms. With 10 common benchmark unconstrained continuous functions used to
test the performance, the results show that state transition algorithms are
promising algorithms due to their good global search capability and convergence
property when compared with some popular algorithms.
| [
{
"version": "v1",
"created": "Wed, 30 May 2012 05:53:58 GMT"
},
{
"version": "v2",
"created": "Wed, 12 Sep 2012 09:06:33 GMT"
},
{
"version": "v3",
"created": "Tue, 9 Oct 2012 04:19:39 GMT"
},
{
"version": "v4",
"created": "Mon, 9 Dec 2013 01:17:43 GMT"
}
] | 2013-12-10T00:00:00 | [
[
"Zhou",
"Xiaojun",
""
],
[
"Yang",
"Chunhua",
""
],
[
"Gui",
"Weihua",
""
]
] | TITLE: State Transition Algorithm
ABSTRACT: In terms of the concepts of state and state transition, a new heuristic
random search algorithm named state transition algorithm is proposed. For
continuous function optimization problems, four special transformation
operators called rotation, translation, expansion and axesion are designed.
Adjusting measures of the transformations are mainly studied to keep the
balance of exploration and exploitation. Convergence analysis is also discussed
about the algorithm based on random search theory. In the meanwhile, to
strengthen the search ability in high dimensional space, communication strategy
is introduced into the basic algorithm and intermittent exchange is presented
to prevent premature convergence. Finally, experiments are carried out for the
algorithms. With 10 common benchmark unconstrained continuous functions used to
test the performance, the results show that state transition algorithms are
promising algorithms due to their good global search capability and convergence
property when compared with some popular algorithms.
|
1312.2137 | Dimitri Palaz | Dimitri Palaz, Ronan Collobert, Mathew Magimai.-Doss | End-to-end Phoneme Sequence Recognition using Convolutional Neural
Networks | NIPS Deep Learning Workshop, 2013 | null | null | null | cs.LG cs.CL cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Most phoneme recognition state-of-the-art systems rely on a classical neural
network classifiers, fed with highly tuned features, such as MFCC or PLP
features. Recent advances in ``deep learning'' approaches questioned such
systems, but while some attempts were made with simpler features such as
spectrograms, state-of-the-art systems still rely on MFCCs. This might be
viewed as a kind of failure from deep learning approaches, which are often
claimed to have the ability to train with raw signals, alleviating the need of
hand-crafted features. In this paper, we investigate a convolutional neural
network approach for raw speech signals. While convolutional architectures got
tremendous success in computer vision or text processing, they seem to have
been let down in the past recent years in the speech processing field. We show
that it is possible to learn an end-to-end phoneme sequence classifier system
directly from raw signal, with similar performance on the TIMIT and WSJ
datasets than existing systems based on MFCC, questioning the need of complex
hand-crafted features on large datasets.
| [
{
"version": "v1",
"created": "Sat, 7 Dec 2013 19:55:02 GMT"
}
] | 2013-12-10T00:00:00 | [
[
"Palaz",
"Dimitri",
""
],
[
"Collobert",
"Ronan",
""
],
[
"-Doss",
"Mathew Magimai.",
""
]
] | TITLE: End-to-end Phoneme Sequence Recognition using Convolutional Neural
Networks
ABSTRACT: Most phoneme recognition state-of-the-art systems rely on a classical neural
network classifiers, fed with highly tuned features, such as MFCC or PLP
features. Recent advances in ``deep learning'' approaches questioned such
systems, but while some attempts were made with simpler features such as
spectrograms, state-of-the-art systems still rely on MFCCs. This might be
viewed as a kind of failure from deep learning approaches, which are often
claimed to have the ability to train with raw signals, alleviating the need of
hand-crafted features. In this paper, we investigate a convolutional neural
network approach for raw speech signals. While convolutional architectures got
tremendous success in computer vision or text processing, they seem to have
been let down in the past recent years in the speech processing field. We show
that it is possible to learn an end-to-end phoneme sequence classifier system
directly from raw signal, with similar performance on the TIMIT and WSJ
datasets than existing systems based on MFCC, questioning the need of complex
hand-crafted features on large datasets.
|
1312.2237 | Sugata Sanyal | Mustafa H.Hajeer, Alka Singh, Dipankar Dasgupta, Sugata Sanyal | Clustering online social network communities using genetic algorithms | 7 pages, 9 figures, 2 tables | null | null | null | cs.SI physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | To analyze the activities in an Online Social network (OSN), we introduce the
concept of "Node of Attraction" (NoA) which represents the most active node in
a network community. This NoA is identified as the origin/initiator of a
post/communication which attracted other nodes and formed a cluster at any
point in time. In this research, a genetic algorithm (GA) is used as a data
mining method where the main objective is to determine clusters of network
communities in a given OSN dataset. This approach is efficient in handling
different type of discussion topics in our studied OSN - comments, emails, chat
expressions, etc. and can form clusters according to one or more topics. We
believe that this work can be useful in finding the source for spread of this
GA-based clustering of online interactions and reports some results of
experiments with real-world data and demonstrates the performance of proposed
approach.
| [
{
"version": "v1",
"created": "Sun, 8 Dec 2013 17:37:24 GMT"
}
] | 2013-12-10T00:00:00 | [
[
"Hajeer",
"Mustafa H.",
""
],
[
"Singh",
"Alka",
""
],
[
"Dasgupta",
"Dipankar",
""
],
[
"Sanyal",
"Sugata",
""
]
] | TITLE: Clustering online social network communities using genetic algorithms
ABSTRACT: To analyze the activities in an Online Social network (OSN), we introduce the
concept of "Node of Attraction" (NoA) which represents the most active node in
a network community. This NoA is identified as the origin/initiator of a
post/communication which attracted other nodes and formed a cluster at any
point in time. In this research, a genetic algorithm (GA) is used as a data
mining method where the main objective is to determine clusters of network
communities in a given OSN dataset. This approach is efficient in handling
different type of discussion topics in our studied OSN - comments, emails, chat
expressions, etc. and can form clusters according to one or more topics. We
believe that this work can be useful in finding the source for spread of this
GA-based clustering of online interactions and reports some results of
experiments with real-world data and demonstrates the performance of proposed
approach.
|
1312.2249 | Dumitru Erhan | Dumitru Erhan, Christian Szegedy, Alexander Toshev, Dragomir Anguelov | Scalable Object Detection using Deep Neural Networks | null | null | null | null | cs.CV stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Deep convolutional neural networks have recently achieved state-of-the-art
performance on a number of image recognition benchmarks, including the ImageNet
Large-Scale Visual Recognition Challenge (ILSVRC-2012). The winning model on
the localization sub-task was a network that predicts a single bounding box and
a confidence score for each object category in the image. Such a model captures
the whole-image context around the objects but cannot handle multiple instances
of the same object in the image without naively replicating the number of
outputs for each instance. In this work, we propose a saliency-inspired neural
network model for detection, which predicts a set of class-agnostic bounding
boxes along with a single score for each box, corresponding to its likelihood
of containing any object of interest. The model naturally handles a variable
number of instances for each class and allows for cross-class generalization at
the highest levels of the network. We are able to obtain competitive
recognition performance on VOC2007 and ILSVRC2012, while using only the top few
predicted locations in each image and a small number of neural network
evaluations.
| [
{
"version": "v1",
"created": "Sun, 8 Dec 2013 19:40:51 GMT"
}
] | 2013-12-10T00:00:00 | [
[
"Erhan",
"Dumitru",
""
],
[
"Szegedy",
"Christian",
""
],
[
"Toshev",
"Alexander",
""
],
[
"Anguelov",
"Dragomir",
""
]
] | TITLE: Scalable Object Detection using Deep Neural Networks
ABSTRACT: Deep convolutional neural networks have recently achieved state-of-the-art
performance on a number of image recognition benchmarks, including the ImageNet
Large-Scale Visual Recognition Challenge (ILSVRC-2012). The winning model on
the localization sub-task was a network that predicts a single bounding box and
a confidence score for each object category in the image. Such a model captures
the whole-image context around the objects but cannot handle multiple instances
of the same object in the image without naively replicating the number of
outputs for each instance. In this work, we propose a saliency-inspired neural
network model for detection, which predicts a set of class-agnostic bounding
boxes along with a single score for each box, corresponding to its likelihood
of containing any object of interest. The model naturally handles a variable
number of instances for each class and allows for cross-class generalization at
the highest levels of the network. We are able to obtain competitive
recognition performance on VOC2007 and ILSVRC2012, while using only the top few
predicted locations in each image and a small number of neural network
evaluations.
|
1312.2306 | Rajendra Patel | Rajendra Patel, Arvind Rajawat | Dominant block guided optimal cache size estimation to maximize IPC of
embedded software | 10 Pages, 4 Figures, 5 Tables, International Journal of Embedded
Systems and Applications (IJESA).
http://airccse.org/journal/ijesa/current2013.html | null | 10.5121/ijesa.2013.3303 | null | cs.PF cs.AR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Embedded system software is highly constrained from performance, memory
footprint, energy consumption and implementing cost view point. It is always
desirable to obtain better Instructions per Cycle. Instruction cache has major
contribution in improving IPC. Cache memories are realized on the same chip
where the processor is running. This considerably increases the system cost as
well. Hence, it is required to maintain a trade off between cache sizes and
performance improvement offered. Determining the number of cache lines and size
of cache line are important parameters for cache designing. The design space
for cache is quite large. It is time taking to execute the given application
with different cache sizes on an instruction set simulator to figure out the
optimal cache size. In this paper, a technique is proposed to identify a number
of cache lines and cache line size for the L1 instruction cache that will offer
best or nearly best IPC. Cache size is derived, at a higher abstraction level,
from basic block analysis in the Low Level Virtual Machine environment. The
cache size estimated is cross validated by simulating the set of benchmark
applications with different cache sizes in simple scalar simulator. The
proposed method seems to be superior in terms of estimation accuracy and
estimation time as compared to the existing methods for estimation of optimal
cache size parameters like cache line size, number of cache lines.
| [
{
"version": "v1",
"created": "Mon, 9 Dec 2013 05:17:45 GMT"
}
] | 2013-12-10T00:00:00 | [
[
"Patel",
"Rajendra",
""
],
[
"Rajawat",
"Arvind",
""
]
] | TITLE: Dominant block guided optimal cache size estimation to maximize IPC of
embedded software
ABSTRACT: Embedded system software is highly constrained from performance, memory
footprint, energy consumption and implementing cost view point. It is always
desirable to obtain better Instructions per Cycle. Instruction cache has major
contribution in improving IPC. Cache memories are realized on the same chip
where the processor is running. This considerably increases the system cost as
well. Hence, it is required to maintain a trade off between cache sizes and
performance improvement offered. Determining the number of cache lines and size
of cache line are important parameters for cache designing. The design space
for cache is quite large. It is time taking to execute the given application
with different cache sizes on an instruction set simulator to figure out the
optimal cache size. In this paper, a technique is proposed to identify a number
of cache lines and cache line size for the L1 instruction cache that will offer
best or nearly best IPC. Cache size is derived, at a higher abstraction level,
from basic block analysis in the Low Level Virtual Machine environment. The
cache size estimated is cross validated by simulating the set of benchmark
applications with different cache sizes in simple scalar simulator. The
proposed method seems to be superior in terms of estimation accuracy and
estimation time as compared to the existing methods for estimation of optimal
cache size parameters like cache line size, number of cache lines.
|
1312.2375 | Ramachandra Rao Kurada Mr. | RamachandraRao Kurada, Dr. K Karteeka Pavan | Novel text categorization by amalgamation of augmented k-nearest
neighborhood classification and k-medoids clustering | 13 Pages | International Journal of Computational Science & Information
Technology(IJCSITY)Vol.1,No.4,Nov2013,ISSN: 2320-7442 | 10.5121/ijcsity.2013.1406 | null | cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Machine learning for text classification is the underpinning of document
cataloging, news filtering, document steering and exemplification. In text
mining realm, effective feature selection is significant to make the learning
task more accurate and competent. One of the traditional lazy text classifier
k-Nearest Neighborhood (kNN) has a major pitfall in calculating the similarity
between all the objects in training and testing sets, there by leads to
exaggeration of both computational complexity of the algorithm and massive
consumption of main memory. To diminish these shortcomings in viewpoint of a
data-mining practitioner an amalgamative technique is proposed in this paper
using a novel restructured version of kNN called AugmentedkNN(AkNN) and
k-Medoids(kMdd) clustering.The proposed work comprises preprocesses on the
initial training set by imposing attribute feature selection for reduction of
high dimensionality, also it detects and excludes the high-fliers samples in
the initial training set and restructures a constrictedtraining set. The kMdd
clustering algorithm generates the cluster centers (as interior objects) for
each category and restructures the constricted training set with centroids.
This technique is amalgamated with AkNNclassifier that was prearranged with
text mining similarity measures. Eventually, significantweights and ranks were
assigned to each object in the new training set based upon their accessory
towards the object in testing set. Experiments conducted on Reuters-21578 a UCI
benchmark text mining data set, and comparisons with traditional kNNclassifier
designates the referredmethod yieldspreeminentrecitalin both clustering and
classification.
| [
{
"version": "v1",
"created": "Mon, 9 Dec 2013 10:36:22 GMT"
}
] | 2013-12-10T00:00:00 | [
[
"Kurada",
"RamachandraRao",
""
],
[
"Pavan",
"Dr. K Karteeka",
""
]
] | TITLE: Novel text categorization by amalgamation of augmented k-nearest
neighborhood classification and k-medoids clustering
ABSTRACT: Machine learning for text classification is the underpinning of document
cataloging, news filtering, document steering and exemplification. In text
mining realm, effective feature selection is significant to make the learning
task more accurate and competent. One of the traditional lazy text classifier
k-Nearest Neighborhood (kNN) has a major pitfall in calculating the similarity
between all the objects in training and testing sets, there by leads to
exaggeration of both computational complexity of the algorithm and massive
consumption of main memory. To diminish these shortcomings in viewpoint of a
data-mining practitioner an amalgamative technique is proposed in this paper
using a novel restructured version of kNN called AugmentedkNN(AkNN) and
k-Medoids(kMdd) clustering.The proposed work comprises preprocesses on the
initial training set by imposing attribute feature selection for reduction of
high dimensionality, also it detects and excludes the high-fliers samples in
the initial training set and restructures a constrictedtraining set. The kMdd
clustering algorithm generates the cluster centers (as interior objects) for
each category and restructures the constricted training set with centroids.
This technique is amalgamated with AkNNclassifier that was prearranged with
text mining similarity measures. Eventually, significantweights and ranks were
assigned to each object in the new training set based upon their accessory
towards the object in testing set. Experiments conducted on Reuters-21578 a UCI
benchmark text mining data set, and comparisons with traditional kNNclassifier
designates the referredmethod yieldspreeminentrecitalin both clustering and
classification.
|
1312.2451 | Sarwat Nizamani | Sarwat Nizamani, Nasrullah Memon | CEAI: CCM based Email Authorship Identification Model | null | Egyptian Informatics Journal,Volume 14, Issue 3, November 2013 | null | null | cs.LG | http://creativecommons.org/licenses/by-nc-sa/3.0/ | In this paper we present a model for email authorship identification (EAI) by
employing a Cluster-based Classification (CCM) technique. Traditionally,
stylometric features have been successfully employed in various authorship
analysis tasks; we extend the traditional feature-set to include some more
interesting and effective features for email authorship identification (e.g.
the last punctuation mark used in an email, the tendency of an author to use
capitalization at the start of an email, or the punctuation after a greeting or
farewell). We also included Info Gain feature selection based content features.
It is observed that the use of such features in the authorship identification
process has a positive impact on the accuracy of the authorship identification
task. We performed experiments to justify our arguments and compared the
results with other base line models. Experimental results reveal that the
proposed CCM-based email authorship identification model, along with the
proposed feature set, outperforms the state-of-the-art support vector machine
(SVM)-based models, as well as the models proposed by Iqbal et al. [1, 2]. The
proposed model attains an accuracy rate of 94% for 10 authors, 89% for 25
authors, and 81% for 50 authors, respectively on Enron dataset, while 89.5%
accuracy has been achieved on authors' constructed real email dataset. The
results on Enron dataset have been achieved on quite a large number of authors
as compared to the models proposed by Iqbal et al. [1, 2].
| [
{
"version": "v1",
"created": "Fri, 6 Dec 2013 18:25:15 GMT"
}
] | 2013-12-10T00:00:00 | [
[
"Nizamani",
"Sarwat",
""
],
[
"Memon",
"Nasrullah",
""
]
] | TITLE: CEAI: CCM based Email Authorship Identification Model
ABSTRACT: In this paper we present a model for email authorship identification (EAI) by
employing a Cluster-based Classification (CCM) technique. Traditionally,
stylometric features have been successfully employed in various authorship
analysis tasks; we extend the traditional feature-set to include some more
interesting and effective features for email authorship identification (e.g.
the last punctuation mark used in an email, the tendency of an author to use
capitalization at the start of an email, or the punctuation after a greeting or
farewell). We also included Info Gain feature selection based content features.
It is observed that the use of such features in the authorship identification
process has a positive impact on the accuracy of the authorship identification
task. We performed experiments to justify our arguments and compared the
results with other base line models. Experimental results reveal that the
proposed CCM-based email authorship identification model, along with the
proposed feature set, outperforms the state-of-the-art support vector machine
(SVM)-based models, as well as the models proposed by Iqbal et al. [1, 2]. The
proposed model attains an accuracy rate of 94% for 10 authors, 89% for 25
authors, and 81% for 50 authors, respectively on Enron dataset, while 89.5%
accuracy has been achieved on authors' constructed real email dataset. The
results on Enron dataset have been achieved on quite a large number of authors
as compared to the models proposed by Iqbal et al. [1, 2].
|
1304.6108 | Nicolas Charon | Nicolas Charon, Alain Trouv\'e | The varifold representation of non-oriented shapes for diffeomorphic
registration | 33 pages, 10 figures | SIAM Journal on Imaging Sciences, 2013, Vol. 6, No. 4 : pp.
2547-2580 | 10.1137/130918885 | null | cs.CG cs.CV math.DG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we address the problem of orientation that naturally arises
when representing shapes like curves or surfaces as currents. In the field of
computational anatomy, the framework of currents has indeed proved very
efficient to model a wide variety of shapes. However, in such approaches,
orientation of shapes is a fundamental issue that can lead to several drawbacks
in treating certain kind of datasets. More specifically, problems occur with
structures like acute pikes because of canceling effects of currents or with
data that consists in many disconnected pieces like fiber bundles for which
currents require a consistent orientation of all pieces. As a promising
alternative to currents, varifolds, introduced in the context of geometric
measure theory by F. Almgren, allow the representation of any non-oriented
manifold (more generally any non-oriented rectifiable set). In particular, we
explain how varifolds can encode numerically non-oriented objects both from the
discrete and continuous point of view. We show various ways to build a Hilbert
space structure on the set of varifolds based on the theory of reproducing
kernels. We show that, unlike the currents' setting, these metrics are
consistent with shape volume (theorem 4.1) and we derive a formula for the
variation of metric with respect to the shape (theorem 4.2). Finally, we
propose a generalization to non-oriented shapes of registration algorithms in
the context of Large Deformations Metric Mapping (LDDMM), which we detail with
a few examples in the last part of the paper.
| [
{
"version": "v1",
"created": "Mon, 22 Apr 2013 21:03:45 GMT"
}
] | 2013-12-09T00:00:00 | [
[
"Charon",
"Nicolas",
""
],
[
"Trouvé",
"Alain",
""
]
] | TITLE: The varifold representation of non-oriented shapes for diffeomorphic
registration
ABSTRACT: In this paper, we address the problem of orientation that naturally arises
when representing shapes like curves or surfaces as currents. In the field of
computational anatomy, the framework of currents has indeed proved very
efficient to model a wide variety of shapes. However, in such approaches,
orientation of shapes is a fundamental issue that can lead to several drawbacks
in treating certain kind of datasets. More specifically, problems occur with
structures like acute pikes because of canceling effects of currents or with
data that consists in many disconnected pieces like fiber bundles for which
currents require a consistent orientation of all pieces. As a promising
alternative to currents, varifolds, introduced in the context of geometric
measure theory by F. Almgren, allow the representation of any non-oriented
manifold (more generally any non-oriented rectifiable set). In particular, we
explain how varifolds can encode numerically non-oriented objects both from the
discrete and continuous point of view. We show various ways to build a Hilbert
space structure on the set of varifolds based on the theory of reproducing
kernels. We show that, unlike the currents' setting, these metrics are
consistent with shape volume (theorem 4.1) and we derive a formula for the
variation of metric with respect to the shape (theorem 4.2). Finally, we
propose a generalization to non-oriented shapes of registration algorithms in
the context of Large Deformations Metric Mapping (LDDMM), which we detail with
a few examples in the last part of the paper.
|
1305.6489 | Junzhou Zhao | Junzhou Zhao and John C. S. Lui and Don Towsley and Xiaohong Guan and
Pinghui Wang | Social Sensor Placement in Large Scale Networks: A Graph Sampling
Perspective | 10 pages, 8 figures | null | null | null | cs.SI physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Sensor placement for the purpose of detecting/tracking news outbreak and
preventing rumor spreading is a challenging problem in a large scale online
social network (OSN). This problem is a kind of subset selection problem:
choosing a small set of items from a large population so to maximize some
prespecified set function. However, it is known to be NP-complete. Existing
heuristics are very costly especially for modern OSNs which usually contain
hundreds of millions of users. This paper aims to design methods to find
\emph{good solutions} that can well trade off efficiency and accuracy. We first
show that it is possible to obtain a high quality solution with a probabilistic
guarantee from a "{\em candidate set}" of the underlying social network. By
exploring this candidate set, one can increase the efficiency of placing social
sensors. We also present how this candidate set can be obtained using "{\em
graph sampling}", which has an advantage over previous methods of not requiring
the prior knowledge of the complete network topology. Experiments carried out
on two real datasets demonstrate not only the accuracy and efficiency of our
approach, but also effectiveness in detecting and predicting news outbreak.
| [
{
"version": "v1",
"created": "Tue, 28 May 2013 13:49:00 GMT"
},
{
"version": "v2",
"created": "Fri, 6 Dec 2013 09:19:57 GMT"
}
] | 2013-12-09T00:00:00 | [
[
"Zhao",
"Junzhou",
""
],
[
"Lui",
"John C. S.",
""
],
[
"Towsley",
"Don",
""
],
[
"Guan",
"Xiaohong",
""
],
[
"Wang",
"Pinghui",
""
]
] | TITLE: Social Sensor Placement in Large Scale Networks: A Graph Sampling
Perspective
ABSTRACT: Sensor placement for the purpose of detecting/tracking news outbreak and
preventing rumor spreading is a challenging problem in a large scale online
social network (OSN). This problem is a kind of subset selection problem:
choosing a small set of items from a large population so to maximize some
prespecified set function. However, it is known to be NP-complete. Existing
heuristics are very costly especially for modern OSNs which usually contain
hundreds of millions of users. This paper aims to design methods to find
\emph{good solutions} that can well trade off efficiency and accuracy. We first
show that it is possible to obtain a high quality solution with a probabilistic
guarantee from a "{\em candidate set}" of the underlying social network. By
exploring this candidate set, one can increase the efficiency of placing social
sensors. We also present how this candidate set can be obtained using "{\em
graph sampling}", which has an advantage over previous methods of not requiring
the prior knowledge of the complete network topology. Experiments carried out
on two real datasets demonstrate not only the accuracy and efficiency of our
approach, but also effectiveness in detecting and predicting news outbreak.
|
1310.0354 | Gary Huang | Gary B. Huang and Viren Jain | Deep and Wide Multiscale Recursive Networks for Robust Image Labeling | null | null | null | null | cs.CV cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Feedforward multilayer networks trained by supervised learning have recently
demonstrated state of the art performance on image labeling problems such as
boundary prediction and scene parsing. As even very low error rates can limit
practical usage of such systems, methods that perform closer to human accuracy
remain desirable. In this work, we propose a new type of network with the
following properties that address what we hypothesize to be limiting aspects of
existing methods: (1) a `wide' structure with thousands of features, (2) a
large field of view, (3) recursive iterations that exploit statistical
dependencies in label space, and (4) a parallelizable architecture that can be
trained in a fraction of the time compared to benchmark multilayer
convolutional networks. For the specific image labeling problem of boundary
prediction, we also introduce a novel example weighting algorithm that improves
segmentation accuracy. Experiments in the challenging domain of connectomic
reconstruction of neural circuity from 3d electron microscopy data show that
these "Deep And Wide Multiscale Recursive" (DAWMR) networks lead to new levels
of image labeling performance. The highest performing architecture has twelve
layers, interwoven supervised and unsupervised stages, and uses an input field
of view of 157,464 voxels ($54^3$) to make a prediction at each image location.
We present an associated open source software package that enables the simple
and flexible creation of DAWMR networks.
| [
{
"version": "v1",
"created": "Tue, 1 Oct 2013 15:42:54 GMT"
},
{
"version": "v2",
"created": "Wed, 30 Oct 2013 21:16:45 GMT"
},
{
"version": "v3",
"created": "Fri, 6 Dec 2013 17:00:03 GMT"
}
] | 2013-12-09T00:00:00 | [
[
"Huang",
"Gary B.",
""
],
[
"Jain",
"Viren",
""
]
] | TITLE: Deep and Wide Multiscale Recursive Networks for Robust Image Labeling
ABSTRACT: Feedforward multilayer networks trained by supervised learning have recently
demonstrated state of the art performance on image labeling problems such as
boundary prediction and scene parsing. As even very low error rates can limit
practical usage of such systems, methods that perform closer to human accuracy
remain desirable. In this work, we propose a new type of network with the
following properties that address what we hypothesize to be limiting aspects of
existing methods: (1) a `wide' structure with thousands of features, (2) a
large field of view, (3) recursive iterations that exploit statistical
dependencies in label space, and (4) a parallelizable architecture that can be
trained in a fraction of the time compared to benchmark multilayer
convolutional networks. For the specific image labeling problem of boundary
prediction, we also introduce a novel example weighting algorithm that improves
segmentation accuracy. Experiments in the challenging domain of connectomic
reconstruction of neural circuity from 3d electron microscopy data show that
these "Deep And Wide Multiscale Recursive" (DAWMR) networks lead to new levels
of image labeling performance. The highest performing architecture has twelve
layers, interwoven supervised and unsupervised stages, and uses an input field
of view of 157,464 voxels ($54^3$) to make a prediction at each image location.
We present an associated open source software package that enables the simple
and flexible creation of DAWMR networks.
|
1312.1685 | Suranjan Ganguly | Arindam Kar, Debotosh Bhattacharjee, Dipak Kumar Basu, Mita Nasipuri,
Mahantapas Kundu | Human Face Recognition using Gabor based Kernel Entropy Component
Analysis | October, 2012. International Journal of Computer Vision and Image
Processing : IGI Global(USA), 2012. arXiv admin note: substantial text
overlap with arXiv:1312.1517, arXiv:1312.1520 | null | null | null | cs.CV | http://creativecommons.org/licenses/publicdomain/ | In this paper, we present a novel Gabor wavelet based Kernel Entropy
Component Analysis (KECA) method by integrating the Gabor wavelet
transformation (GWT) of facial images with the KECA method for enhanced face
recognition performance. Firstly, from the Gabor wavelet transformed images the
most important discriminative desirable facial features characterized by
spatial frequency, spatial locality and orientation selectivity to cope with
the variations due to illumination and facial expression changes were derived.
After that KECA, relating to the Renyi entropy is extended to include cosine
kernel function. The KECA with the cosine kernels is then applied on the
extracted most important discriminating feature vectors of facial images to
obtain only those real kernel ECA eigenvectors that are associated with
eigenvalues having positive entropy contribution. Finally, these real KECA
features are used for image classification using the L1, L2 distance measures;
the Mahalanobis distance measure and the cosine similarity measure. The
feasibility of the Gabor based KECA method with the cosine kernel has been
successfully tested on both frontal and pose-angled face recognition, using
datasets from the ORL, FRAV2D and the FERET database.
| [
{
"version": "v1",
"created": "Thu, 5 Dec 2013 12:36:11 GMT"
}
] | 2013-12-09T00:00:00 | [
[
"Kar",
"Arindam",
""
],
[
"Bhattacharjee",
"Debotosh",
""
],
[
"Basu",
"Dipak Kumar",
""
],
[
"Nasipuri",
"Mita",
""
],
[
"Kundu",
"Mahantapas",
""
]
] | TITLE: Human Face Recognition using Gabor based Kernel Entropy Component
Analysis
ABSTRACT: In this paper, we present a novel Gabor wavelet based Kernel Entropy
Component Analysis (KECA) method by integrating the Gabor wavelet
transformation (GWT) of facial images with the KECA method for enhanced face
recognition performance. Firstly, from the Gabor wavelet transformed images the
most important discriminative desirable facial features characterized by
spatial frequency, spatial locality and orientation selectivity to cope with
the variations due to illumination and facial expression changes were derived.
After that KECA, relating to the Renyi entropy is extended to include cosine
kernel function. The KECA with the cosine kernels is then applied on the
extracted most important discriminating feature vectors of facial images to
obtain only those real kernel ECA eigenvectors that are associated with
eigenvalues having positive entropy contribution. Finally, these real KECA
features are used for image classification using the L1, L2 distance measures;
the Mahalanobis distance measure and the cosine similarity measure. The
feasibility of the Gabor based KECA method with the cosine kernel has been
successfully tested on both frontal and pose-angled face recognition, using
datasets from the ORL, FRAV2D and the FERET database.
|
1312.1752 | Muhammad Marwan Muhammad Fuad | Muhammad Marwan Muhammad Fuad | Particle Swarm Optimization of Information-Content Weighting of Symbolic
Aggregate Approximation | The 8th International Conference on Advanced Data Mining and
Applications (ADMA 2012) | null | null | null | cs.NE cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Bio-inspired optimization algorithms have been gaining more popularity
recently. One of the most important of these algorithms is particle swarm
optimization (PSO). PSO is based on the collective intelligence of a swam of
particles. Each particle explores a part of the search space looking for the
optimal position and adjusts its position according to two factors; the first
is its own experience and the second is the collective experience of the whole
swarm. PSO has been successfully used to solve many optimization problems. In
this work we use PSO to improve the performance of a well-known representation
method of time series data which is the symbolic aggregate approximation (SAX).
As with other time series representation methods, SAX results in loss of
information when applied to represent time series. In this paper we use PSO to
propose a new minimum distance WMD for SAX to remedy this problem. Unlike the
original minimum distance, the new distance sets different weights to different
segments of the time series according to their information content. This
weighted minimum distance enhances the performance of SAX as we show through
experiments using different time series datasets.
| [
{
"version": "v1",
"created": "Fri, 6 Dec 2013 02:22:59 GMT"
}
] | 2013-12-09T00:00:00 | [
[
"Fuad",
"Muhammad Marwan Muhammad",
""
]
] | TITLE: Particle Swarm Optimization of Information-Content Weighting of Symbolic
Aggregate Approximation
ABSTRACT: Bio-inspired optimization algorithms have been gaining more popularity
recently. One of the most important of these algorithms is particle swarm
optimization (PSO). PSO is based on the collective intelligence of a swam of
particles. Each particle explores a part of the search space looking for the
optimal position and adjusts its position according to two factors; the first
is its own experience and the second is the collective experience of the whole
swarm. PSO has been successfully used to solve many optimization problems. In
this work we use PSO to improve the performance of a well-known representation
method of time series data which is the symbolic aggregate approximation (SAX).
As with other time series representation methods, SAX results in loss of
information when applied to represent time series. In this paper we use PSO to
propose a new minimum distance WMD for SAX to remedy this problem. Unlike the
original minimum distance, the new distance sets different weights to different
segments of the time series according to their information content. This
weighted minimum distance enhances the performance of SAX as we show through
experiments using different time series datasets.
|
1312.1897 | Toni Gruetze | Toni Gruetze, Gjergji Kasneci, Zhe Zuo, Felix Naumann | Bootstrapped Grouping of Results to Ambiguous Person Name Queries | null | null | null | null | cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Some of the main ranking features of today's search engines reflect result
popularity and are based on ranking models, such as PageRank, implicit feedback
aggregation, and more. While such features yield satisfactory results for a
wide range of queries, they aggravate the problem of search for ambiguous
entities: Searching for a person yields satisfactory results only if the person
we are looking for is represented by a high-ranked Web page and all required
information are contained in this page. Otherwise, the user has to either
reformulate/refine the query or manually inspect low-ranked results to find the
person in question. A possible approach to solve this problem is to cluster the
results, so that each cluster represents one of the persons occurring in the
answer set. However clustering search results has proven to be a difficult
endeavor by itself, where the clusters are typically of moderate quality.
A wealth of useful information about persons occurs in Web 2.0 platforms,
such as LinkedIn, Wikipedia, Facebook, etc. Being human-generated, the
information on these platforms is clean, focused, and already disambiguated. We
show that when searching for ambiguous person names the information from such
platforms can be bootstrapped to group the results according to the individuals
occurring in them. We have evaluated our methods on a hand-labeled dataset of
around 5,000 Web pages retrieved from Google queries on 50 ambiguous person
names.
| [
{
"version": "v1",
"created": "Fri, 6 Dec 2013 15:50:54 GMT"
}
] | 2013-12-09T00:00:00 | [
[
"Gruetze",
"Toni",
""
],
[
"Kasneci",
"Gjergji",
""
],
[
"Zuo",
"Zhe",
""
],
[
"Naumann",
"Felix",
""
]
] | TITLE: Bootstrapped Grouping of Results to Ambiguous Person Name Queries
ABSTRACT: Some of the main ranking features of today's search engines reflect result
popularity and are based on ranking models, such as PageRank, implicit feedback
aggregation, and more. While such features yield satisfactory results for a
wide range of queries, they aggravate the problem of search for ambiguous
entities: Searching for a person yields satisfactory results only if the person
we are looking for is represented by a high-ranked Web page and all required
information are contained in this page. Otherwise, the user has to either
reformulate/refine the query or manually inspect low-ranked results to find the
person in question. A possible approach to solve this problem is to cluster the
results, so that each cluster represents one of the persons occurring in the
answer set. However clustering search results has proven to be a difficult
endeavor by itself, where the clusters are typically of moderate quality.
A wealth of useful information about persons occurs in Web 2.0 platforms,
such as LinkedIn, Wikipedia, Facebook, etc. Being human-generated, the
information on these platforms is clean, focused, and already disambiguated. We
show that when searching for ambiguous person names the information from such
platforms can be bootstrapped to group the results according to the individuals
occurring in them. We have evaluated our methods on a hand-labeled dataset of
around 5,000 Web pages retrieved from Google queries on 50 ambiguous person
names.
|
1312.1909 | Qi Wang | Qi Wang and Joseph JaJa | From Maxout to Channel-Out: Encoding Information on Sparse Pathways | 10 pages including the appendix, 9 figures | null | null | null | cs.NE cs.CV cs.LG stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Motivated by an important insight from neural science, we propose a new
framework for understanding the success of the recently proposed "maxout"
networks. The framework is based on encoding information on sparse pathways and
recognizing the correct pathway at inference time. Elaborating further on this
insight, we propose a novel deep network architecture, called "channel-out"
network, which takes a much better advantage of sparse pathway encoding. In
channel-out networks, pathways are not only formed a posteriori, but they are
also actively selected according to the inference outputs from the lower
layers. From a mathematical perspective, channel-out networks can represent a
wider class of piece-wise continuous functions, thereby endowing the network
with more expressive power than that of maxout networks. We test our
channel-out networks on several well-known image classification benchmarks,
setting new state-of-the-art performance on CIFAR-100 and STL-10, which
represent some of the "harder" image classification benchmarks.
| [
{
"version": "v1",
"created": "Mon, 18 Nov 2013 17:56:11 GMT"
}
] | 2013-12-09T00:00:00 | [
[
"Wang",
"Qi",
""
],
[
"JaJa",
"Joseph",
""
]
] | TITLE: From Maxout to Channel-Out: Encoding Information on Sparse Pathways
ABSTRACT: Motivated by an important insight from neural science, we propose a new
framework for understanding the success of the recently proposed "maxout"
networks. The framework is based on encoding information on sparse pathways and
recognizing the correct pathway at inference time. Elaborating further on this
insight, we propose a novel deep network architecture, called "channel-out"
network, which takes a much better advantage of sparse pathway encoding. In
channel-out networks, pathways are not only formed a posteriori, but they are
also actively selected according to the inference outputs from the lower
layers. From a mathematical perspective, channel-out networks can represent a
wider class of piece-wise continuous functions, thereby endowing the network
with more expressive power than that of maxout networks. We test our
channel-out networks on several well-known image classification benchmarks,
setting new state-of-the-art performance on CIFAR-100 and STL-10, which
represent some of the "harder" image classification benchmarks.
|
1312.1121 | Jan Palczewski | Anna Palczewska and Jan Palczewski and Richard Marchese Robinson and
Daniel Neagu | Interpreting random forest classification models using a feature
contribution method | null | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Model interpretation is one of the key aspects of the model evaluation
process. The explanation of the relationship between model variables and
outputs is relatively easy for statistical models, such as linear regressions,
thanks to the availability of model parameters and their statistical
significance. For "black box" models, such as random forest, this information
is hidden inside the model structure. This work presents an approach for
computing feature contributions for random forest classification models. It
allows for the determination of the influence of each variable on the model
prediction for an individual instance. By analysing feature contributions for a
training dataset, the most significant variables can be determined and their
typical contribution towards predictions made for individual classes, i.e.,
class-specific feature contribution "patterns", are discovered. These patterns
represent a standard behaviour of the model and allow for an additional
assessment of the model reliability for a new data. Interpretation of feature
contributions for two UCI benchmark datasets shows the potential of the
proposed methodology. The robustness of results is demonstrated through an
extensive analysis of feature contributions calculated for a large number of
generated random forest models.
| [
{
"version": "v1",
"created": "Wed, 4 Dec 2013 11:57:53 GMT"
}
] | 2013-12-05T00:00:00 | [
[
"Palczewska",
"Anna",
""
],
[
"Palczewski",
"Jan",
""
],
[
"Robinson",
"Richard Marchese",
""
],
[
"Neagu",
"Daniel",
""
]
] | TITLE: Interpreting random forest classification models using a feature
contribution method
ABSTRACT: Model interpretation is one of the key aspects of the model evaluation
process. The explanation of the relationship between model variables and
outputs is relatively easy for statistical models, such as linear regressions,
thanks to the availability of model parameters and their statistical
significance. For "black box" models, such as random forest, this information
is hidden inside the model structure. This work presents an approach for
computing feature contributions for random forest classification models. It
allows for the determination of the influence of each variable on the model
prediction for an individual instance. By analysing feature contributions for a
training dataset, the most significant variables can be determined and their
typical contribution towards predictions made for individual classes, i.e.,
class-specific feature contribution "patterns", are discovered. These patterns
represent a standard behaviour of the model and allow for an additional
assessment of the model reliability for a new data. Interpretation of feature
contributions for two UCI benchmark datasets shows the potential of the
proposed methodology. The robustness of results is demonstrated through an
extensive analysis of feature contributions calculated for a large number of
generated random forest models.
|
1310.0036 | Saptarshi Bhattacharjee | Saptarshi Bhattacharjee, S Arunkumar, Samir Kumar Bandyopadhyay | Personal Identification from Lip-Print Features using a Statistical
Model | 5 pages, 7 images, Published with International Journal of Computer
Applications (IJCA) | null | 10.5120/8817-2801 | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper presents a novel approach towards identification of human beings
from the statistical analysis of their lip prints. Lip features are extracted
by studying the spatial orientations of the grooves present in lip prints of
individuals using standard edge detection techniques. Horizontal, vertical and
diagonal groove features are analysed using connected-component analysis to
generate the region-specific edge datasets. Comparison between test and
reference sample datasets against a threshold value to define a match yield
satisfactory results. FAR, FRR and ROC metrics have been used to gauge the
performance of the algorithm for real-world deployment in unimodal and
multimodal biometric verification systems.
| [
{
"version": "v1",
"created": "Mon, 30 Sep 2013 20:12:02 GMT"
}
] | 2013-12-04T00:00:00 | [
[
"Bhattacharjee",
"Saptarshi",
""
],
[
"Arunkumar",
"S",
""
],
[
"Bandyopadhyay",
"Samir Kumar",
""
]
] | TITLE: Personal Identification from Lip-Print Features using a Statistical
Model
ABSTRACT: This paper presents a novel approach towards identification of human beings
from the statistical analysis of their lip prints. Lip features are extracted
by studying the spatial orientations of the grooves present in lip prints of
individuals using standard edge detection techniques. Horizontal, vertical and
diagonal groove features are analysed using connected-component analysis to
generate the region-specific edge datasets. Comparison between test and
reference sample datasets against a threshold value to define a match yield
satisfactory results. FAR, FRR and ROC metrics have been used to gauge the
performance of the algorithm for real-world deployment in unimodal and
multimodal biometric verification systems.
|
1311.7071 | Zitao Liu | Zitao Liu and Milos Hauskrecht | Sparse Linear Dynamical System with Its Application in Multivariate
Clinical Time Series | Appear in Neural Information Processing Systems(NIPS) Workshop on
Machine Learning for Clinical Data Analysis and Healthcare 2013 | null | null | null | cs.AI cs.LG stat.ML | http://creativecommons.org/licenses/by/3.0/ | Linear Dynamical System (LDS) is an elegant mathematical framework for
modeling and learning multivariate time series. However, in general, it is
difficult to set the dimension of its hidden state space. A small number of
hidden states may not be able to model the complexities of a time series, while
a large number of hidden states can lead to overfitting. In this paper, we
study methods that impose an $\ell_1$ regularization on the transition matrix
of an LDS model to alleviate the problem of choosing the optimal number of
hidden states. We incorporate a generalized gradient descent method into the
Maximum a Posteriori (MAP) framework and use Expectation Maximization (EM) to
iteratively achieve sparsity on the transition matrix of an LDS model. We show
that our Sparse Linear Dynamical System (SLDS) improves the predictive
performance when compared to ordinary LDS on a multivariate clinical time
series dataset.
| [
{
"version": "v1",
"created": "Wed, 27 Nov 2013 18:58:07 GMT"
},
{
"version": "v2",
"created": "Tue, 3 Dec 2013 20:08:28 GMT"
}
] | 2013-12-04T00:00:00 | [
[
"Liu",
"Zitao",
""
],
[
"Hauskrecht",
"Milos",
""
]
] | TITLE: Sparse Linear Dynamical System with Its Application in Multivariate
Clinical Time Series
ABSTRACT: Linear Dynamical System (LDS) is an elegant mathematical framework for
modeling and learning multivariate time series. However, in general, it is
difficult to set the dimension of its hidden state space. A small number of
hidden states may not be able to model the complexities of a time series, while
a large number of hidden states can lead to overfitting. In this paper, we
study methods that impose an $\ell_1$ regularization on the transition matrix
of an LDS model to alleviate the problem of choosing the optimal number of
hidden states. We incorporate a generalized gradient descent method into the
Maximum a Posteriori (MAP) framework and use Expectation Maximization (EM) to
iteratively achieve sparsity on the transition matrix of an LDS model. We show
that our Sparse Linear Dynamical System (SLDS) improves the predictive
performance when compared to ordinary LDS on a multivariate clinical time
series dataset.
|
1312.0860 | Zhiting Hu | Zhiting Hu, Chong Wang, Junjie Yao, Eric Xing, Hongzhi Yin, Bin Cui | Community Specific Temporal Topic Discovery from Social Media | 12 pages, 16 figures, submitted to VLDB 2014 | null | null | null | cs.SI physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Studying temporal dynamics of topics in social media is very useful to
understand online user behaviors. Most of the existing work on this subject
usually monitors the global trends, ignoring variation among communities. Since
users from different communities tend to have varying tastes and interests,
capturing community-level temporal change can improve the understanding and
management of social content. Additionally, it can further facilitate the
applications such as community discovery, temporal prediction and online
marketing. However, this kind of extraction becomes challenging due to the
intricate interactions between community and topic, and intractable
computational complexity.
In this paper, we take a unified solution towards the community-level topic
dynamic extraction. A probabilistic model, CosTot (Community Specific
Topics-over-Time) is proposed to uncover the hidden topics and communities, as
well as capture community-specific temporal dynamics. Specifically, CosTot
considers text, time, and network information simultaneously, and well
discovers the interactions between community and topic over time. We then
discuss the approximate inference implementation to enable scalable computation
of model parameters, especially for large social data. Based on this, the
application layer support for multi-scale temporal analysis and community
exploration is also investigated.
We conduct extensive experimental studies on a large real microblog dataset,
and demonstrate the superiority of proposed model on tasks of time stamp
prediction, link prediction and topic perplexity.
| [
{
"version": "v1",
"created": "Tue, 3 Dec 2013 15:42:19 GMT"
}
] | 2013-12-04T00:00:00 | [
[
"Hu",
"Zhiting",
""
],
[
"Wang",
"Chong",
""
],
[
"Yao",
"Junjie",
""
],
[
"Xing",
"Eric",
""
],
[
"Yin",
"Hongzhi",
""
],
[
"Cui",
"Bin",
""
]
] | TITLE: Community Specific Temporal Topic Discovery from Social Media
ABSTRACT: Studying temporal dynamics of topics in social media is very useful to
understand online user behaviors. Most of the existing work on this subject
usually monitors the global trends, ignoring variation among communities. Since
users from different communities tend to have varying tastes and interests,
capturing community-level temporal change can improve the understanding and
management of social content. Additionally, it can further facilitate the
applications such as community discovery, temporal prediction and online
marketing. However, this kind of extraction becomes challenging due to the
intricate interactions between community and topic, and intractable
computational complexity.
In this paper, we take a unified solution towards the community-level topic
dynamic extraction. A probabilistic model, CosTot (Community Specific
Topics-over-Time) is proposed to uncover the hidden topics and communities, as
well as capture community-specific temporal dynamics. Specifically, CosTot
considers text, time, and network information simultaneously, and well
discovers the interactions between community and topic over time. We then
discuss the approximate inference implementation to enable scalable computation
of model parameters, especially for large social data. Based on this, the
application layer support for multi-scale temporal analysis and community
exploration is also investigated.
We conduct extensive experimental studies on a large real microblog dataset,
and demonstrate the superiority of proposed model on tasks of time stamp
prediction, link prediction and topic perplexity.
|
1308.0371 | Benjamin Graham | Benjamin Graham | Sparse arrays of signatures for online character recognition | 10 pages, 2 figures | null | null | null | cs.CV cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In mathematics the signature of a path is a collection of iterated integrals,
commonly used for solving differential equations. We show that the path
signature, used as a set of features for consumption by a convolutional neural
network (CNN), improves the accuracy of online character recognition---that is
the task of reading characters represented as a collection of paths. Using
datasets of letters, numbers, Assamese and Chinese characters, we show that the
first, second, and even the third iterated integrals contain useful information
for consumption by a CNN.
On the CASIA-OLHWDB1.1 3755 Chinese character dataset, our approach gave a
test error of 3.58%, compared with 5.61% for a traditional CNN [Ciresan et
al.]. A CNN trained on the CASIA-OLHWDB1.0-1.2 datasets won the ICDAR2013
Online Isolated Chinese Character recognition competition.
Computationally, we have developed a sparse CNN implementation that make it
practical to train CNNs with many layers of max-pooling. Extending the MNIST
dataset by translations, our sparse CNN gets a test error of 0.31%.
| [
{
"version": "v1",
"created": "Thu, 1 Aug 2013 22:29:41 GMT"
},
{
"version": "v2",
"created": "Sun, 1 Dec 2013 17:17:06 GMT"
}
] | 2013-12-03T00:00:00 | [
[
"Graham",
"Benjamin",
""
]
] | TITLE: Sparse arrays of signatures for online character recognition
ABSTRACT: In mathematics the signature of a path is a collection of iterated integrals,
commonly used for solving differential equations. We show that the path
signature, used as a set of features for consumption by a convolutional neural
network (CNN), improves the accuracy of online character recognition---that is
the task of reading characters represented as a collection of paths. Using
datasets of letters, numbers, Assamese and Chinese characters, we show that the
first, second, and even the third iterated integrals contain useful information
for consumption by a CNN.
On the CASIA-OLHWDB1.1 3755 Chinese character dataset, our approach gave a
test error of 3.58%, compared with 5.61% for a traditional CNN [Ciresan et
al.]. A CNN trained on the CASIA-OLHWDB1.0-1.2 datasets won the ICDAR2013
Online Isolated Chinese Character recognition competition.
Computationally, we have developed a sparse CNN implementation that make it
practical to train CNNs with many layers of max-pooling. Extending the MNIST
dataset by translations, our sparse CNN gets a test error of 0.31%.
|
1309.6204 | Lei Jin | Lei Jin, Xuelian Long, James Joshi | A Friendship Privacy Attack on Friends and 2-Distant Neighbors in Social
Networks | This paper has been withdrawn by the authors | null | null | null | cs.SI cs.CR physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In an undirected social graph, a friendship link involves two users and the
friendship is visible in both the users' friend lists. Such a dual visibility
of the friendship may raise privacy threats. This is because both users can
separately control the visibility of a friendship link to other users and their
privacy policies for the link may not be consistent. Even if one of them
conceals the link from a third user, the third user may find such a friendship
link from another user's friend list. In addition, as most users allow their
friends to see their friend lists in most social network systems, an adversary
can exploit the inconsistent policies to launch privacy attacks to identify and
infer many of a targeted user's friends. In this paper, we propose, analyze and
evaluate such an attack which is called Friendship Identification and Inference
(FII) attack. In a FII attack scenario, we assume that an adversary can only
see his friend list and the friend lists of his friends who do not hide the
friend lists from him. Then, a FII attack contains two attack steps: 1) friend
identification and 2) friend inference. In the friend identification step, the
adversary tries to identify a target's friends based on his friend list and
those of his friends. In the friend inference step, the adversary attempts to
infer the target's friends by using the proposed random walk with restart
approach. We present experimental results using three real social network
datasets and show that FII attacks are generally efficient and effective when
adversaries and targets are friends or 2-distant neighbors. We also
comprehensively analyze the attack results in order to find what values of
parameters and network features could promote FII attacks. Currently, most
popular social network systems with an undirected friendship graph, such as
Facebook, LinkedIn and Foursquare, are susceptible to FII attacks.
| [
{
"version": "v1",
"created": "Tue, 24 Sep 2013 15:13:13 GMT"
},
{
"version": "v2",
"created": "Sun, 1 Dec 2013 14:00:52 GMT"
}
] | 2013-12-03T00:00:00 | [
[
"Jin",
"Lei",
""
],
[
"Long",
"Xuelian",
""
],
[
"Joshi",
"James",
""
]
] | TITLE: A Friendship Privacy Attack on Friends and 2-Distant Neighbors in Social
Networks
ABSTRACT: In an undirected social graph, a friendship link involves two users and the
friendship is visible in both the users' friend lists. Such a dual visibility
of the friendship may raise privacy threats. This is because both users can
separately control the visibility of a friendship link to other users and their
privacy policies for the link may not be consistent. Even if one of them
conceals the link from a third user, the third user may find such a friendship
link from another user's friend list. In addition, as most users allow their
friends to see their friend lists in most social network systems, an adversary
can exploit the inconsistent policies to launch privacy attacks to identify and
infer many of a targeted user's friends. In this paper, we propose, analyze and
evaluate such an attack which is called Friendship Identification and Inference
(FII) attack. In a FII attack scenario, we assume that an adversary can only
see his friend list and the friend lists of his friends who do not hide the
friend lists from him. Then, a FII attack contains two attack steps: 1) friend
identification and 2) friend inference. In the friend identification step, the
adversary tries to identify a target's friends based on his friend list and
those of his friends. In the friend inference step, the adversary attempts to
infer the target's friends by using the proposed random walk with restart
approach. We present experimental results using three real social network
datasets and show that FII attacks are generally efficient and effective when
adversaries and targets are friends or 2-distant neighbors. We also
comprehensively analyze the attack results in order to find what values of
parameters and network features could promote FII attacks. Currently, most
popular social network systems with an undirected friendship graph, such as
Facebook, LinkedIn and Foursquare, are susceptible to FII attacks.
|
1310.4366 | Dmitry Ignatov | Elena Nenova and Dmitry I. Ignatov and Andrey V. Konstantinov | An FCA-based Boolean Matrix Factorisation for Collaborative Filtering | http://ceur-ws.org/Vol-977/paper8.pdf | In: C. Carpineto, A. Napoli, S.O. Kuznetsov (eds), FCA Meets IR
2013, Vol. 977, CEUR Workshop Proceeding, 2013. P. 57-73 | null | null | cs.IR cs.DS stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose a new approach for Collaborative Filtering which is based on
Boolean Matrix Factorisation (BMF) and Formal Concept Analysis. In a series of
experiments on real data (Movielens dataset) we compare the approach with the
SVD- and NMF-based algorithms in terms of Mean Average Error (MAE). One of the
experimental consequences is that it is enough to have a binary-scaled rating
data to obtain almost the same quality in terms of MAE by BMF than for the
SVD-based algorithm in case of non-scaled data.
| [
{
"version": "v1",
"created": "Wed, 16 Oct 2013 13:17:37 GMT"
}
] | 2013-12-03T00:00:00 | [
[
"Nenova",
"Elena",
""
],
[
"Ignatov",
"Dmitry I.",
""
],
[
"Konstantinov",
"Andrey V.",
""
]
] | TITLE: An FCA-based Boolean Matrix Factorisation for Collaborative Filtering
ABSTRACT: We propose a new approach for Collaborative Filtering which is based on
Boolean Matrix Factorisation (BMF) and Formal Concept Analysis. In a series of
experiments on real data (Movielens dataset) we compare the approach with the
SVD- and NMF-based algorithms in terms of Mean Average Error (MAE). One of the
experimental consequences is that it is enough to have a binary-scaled rating
data to obtain almost the same quality in terms of MAE by BMF than for the
SVD-based algorithm in case of non-scaled data.
|
1312.0182 | Haocheng Wu | Haocheng Wu, Yunhua Hu, Hang Li, Enhong Chen | Query Segmentation for Relevance Ranking in Web Search | 25 pages, 3 figures | null | null | null | cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we try to answer the question of how to improve the
state-of-the-art methods for relevance ranking in web search by query
segmentation. Here, by query segmentation it is meant to segment the input
query into segments, typically natural language phrases, so that the
performance of relevance ranking in search is increased. We propose employing
the re-ranking approach in query segmentation, which first employs a generative
model to create top $k$ candidates and then employs a discriminative model to
re-rank the candidates to obtain the final segmentation result. The method has
been widely utilized for structure prediction in natural language processing,
but has not been applied to query segmentation, as far as we know. Furthermore,
we propose a new method for using the result of query segmentation in relevance
ranking, which takes both the original query words and the segmented query
phrases as units of query representation. We investigate whether our method can
improve three relevance models, namely BM25, key n-gram model, and dependency
model. Our experimental results on three large scale web search datasets show
that our method can indeed significantly improve relevance ranking in all the
three cases.
| [
{
"version": "v1",
"created": "Sun, 1 Dec 2013 07:23:12 GMT"
}
] | 2013-12-03T00:00:00 | [
[
"Wu",
"Haocheng",
""
],
[
"Hu",
"Yunhua",
""
],
[
"Li",
"Hang",
""
],
[
"Chen",
"Enhong",
""
]
] | TITLE: Query Segmentation for Relevance Ranking in Web Search
ABSTRACT: In this paper, we try to answer the question of how to improve the
state-of-the-art methods for relevance ranking in web search by query
segmentation. Here, by query segmentation it is meant to segment the input
query into segments, typically natural language phrases, so that the
performance of relevance ranking in search is increased. We propose employing
the re-ranking approach in query segmentation, which first employs a generative
model to create top $k$ candidates and then employs a discriminative model to
re-rank the candidates to obtain the final segmentation result. The method has
been widely utilized for structure prediction in natural language processing,
but has not been applied to query segmentation, as far as we know. Furthermore,
we propose a new method for using the result of query segmentation in relevance
ranking, which takes both the original query words and the segmented query
phrases as units of query representation. We investigate whether our method can
improve three relevance models, namely BM25, key n-gram model, and dependency
model. Our experimental results on three large scale web search datasets show
that our method can indeed significantly improve relevance ranking in all the
three cases.
|
1110.0543 | Kevin Jorissen | Kevin Jorissen, Fernando D. Vila, and John J. Rehr | A high performance scientific cloud computing environment for materials
simulations | null | null | 10.1016/j.cpc.2012.04.010 | null | physics.comp-ph cond-mat.mtrl-sci cs.CE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We describe the development of a scientific cloud computing (SCC) platform
that offers high performance computation capability. The platform consists of a
scientific virtual machine prototype containing a UNIX operating system and
several materials science codes, together with essential interface tools (an
SCC toolset) that offers functionality comparable to local compute clusters. In
particular, our SCC toolset provides automatic creation of virtual clusters for
parallel computing, including tools for execution and monitoring performance,
as well as efficient I/O utilities that enable seamless connections to and from
the cloud. Our SCC platform is optimized for the Amazon Elastic Compute Cloud
(EC2). We present benchmarks for prototypical scientific applications and
demonstrate performance comparable to local compute clusters. To facilitate
code execution and provide user-friendly access, we have also integrated cloud
computing capability in a JAVA-based GUI. Our SCC platform may be an
alternative to traditional HPC resources for materials science or quantum
chemistry applications.
| [
{
"version": "v1",
"created": "Mon, 3 Oct 2011 23:35:46 GMT"
}
] | 2013-12-02T00:00:00 | [
[
"Jorissen",
"Kevin",
""
],
[
"Vila",
"Fernando D.",
""
],
[
"Rehr",
"John J.",
""
]
] | TITLE: A high performance scientific cloud computing environment for materials
simulations
ABSTRACT: We describe the development of a scientific cloud computing (SCC) platform
that offers high performance computation capability. The platform consists of a
scientific virtual machine prototype containing a UNIX operating system and
several materials science codes, together with essential interface tools (an
SCC toolset) that offers functionality comparable to local compute clusters. In
particular, our SCC toolset provides automatic creation of virtual clusters for
parallel computing, including tools for execution and monitoring performance,
as well as efficient I/O utilities that enable seamless connections to and from
the cloud. Our SCC platform is optimized for the Amazon Elastic Compute Cloud
(EC2). We present benchmarks for prototypical scientific applications and
demonstrate performance comparable to local compute clusters. To facilitate
code execution and provide user-friendly access, we have also integrated cloud
computing capability in a JAVA-based GUI. Our SCC platform may be an
alternative to traditional HPC resources for materials science or quantum
chemistry applications.
|
1311.2901 | Rob Fergus | Matthew D Zeiler, Rob Fergus | Visualizing and Understanding Convolutional Networks | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Large Convolutional Network models have recently demonstrated impressive
classification performance on the ImageNet benchmark. However there is no clear
understanding of why they perform so well, or how they might be improved. In
this paper we address both issues. We introduce a novel visualization technique
that gives insight into the function of intermediate feature layers and the
operation of the classifier. We also perform an ablation study to discover the
performance contribution from different model layers. This enables us to find
model architectures that outperform Krizhevsky \etal on the ImageNet
classification benchmark. We show our ImageNet model generalizes well to other
datasets: when the softmax classifier is retrained, it convincingly beats the
current state-of-the-art results on Caltech-101 and Caltech-256 datasets.
| [
{
"version": "v1",
"created": "Tue, 12 Nov 2013 20:02:22 GMT"
},
{
"version": "v2",
"created": "Wed, 13 Nov 2013 01:48:56 GMT"
},
{
"version": "v3",
"created": "Thu, 28 Nov 2013 23:04:01 GMT"
}
] | 2013-12-02T00:00:00 | [
[
"Zeiler",
"Matthew D",
""
],
[
"Fergus",
"Rob",
""
]
] | TITLE: Visualizing and Understanding Convolutional Networks
ABSTRACT: Large Convolutional Network models have recently demonstrated impressive
classification performance on the ImageNet benchmark. However there is no clear
understanding of why they perform so well, or how they might be improved. In
this paper we address both issues. We introduce a novel visualization technique
that gives insight into the function of intermediate feature layers and the
operation of the classifier. We also perform an ablation study to discover the
performance contribution from different model layers. This enables us to find
model architectures that outperform Krizhevsky \etal on the ImageNet
classification benchmark. We show our ImageNet model generalizes well to other
datasets: when the softmax classifier is retrained, it convincingly beats the
current state-of-the-art results on Caltech-101 and Caltech-256 datasets.
|
1311.7213 | Alireza Rezvanian | Mohammad Soleimani-Pouri, Alireza Rezvanian, Mohammad Reza Meybodi | Finding a Maximum Clique using Ant Colony Optimization and Particle
Swarm Optimization in Social Networks | 4 pages, 3 figures, conference | null | 10.1109/ASONAM.2012.20 | null | cs.SI cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Interaction between users in online social networks plays a key role in
social network analysis. One on important types of social group is full
connected relation between some users, which known as clique structure.
Therefore finding a maximum clique is essential for some analysis. In this
paper, we proposed a new method using ant colony optimization algorithm and
particle swarm optimization algorithm. In the proposed method, in order to
attain better results, it is improved process of pheromone update by particle
swarm optimization. Simulation results on popular standard social network
benchmarks in comparison standard ant colony optimization algorithm are shown a
relative enhancement of proposed algorithm.
| [
{
"version": "v1",
"created": "Thu, 28 Nov 2013 05:43:32 GMT"
}
] | 2013-12-02T00:00:00 | [
[
"Soleimani-Pouri",
"Mohammad",
""
],
[
"Rezvanian",
"Alireza",
""
],
[
"Meybodi",
"Mohammad Reza",
""
]
] | TITLE: Finding a Maximum Clique using Ant Colony Optimization and Particle
Swarm Optimization in Social Networks
ABSTRACT: Interaction between users in online social networks plays a key role in
social network analysis. One on important types of social group is full
connected relation between some users, which known as clique structure.
Therefore finding a maximum clique is essential for some analysis. In this
paper, we proposed a new method using ant colony optimization algorithm and
particle swarm optimization algorithm. In the proposed method, in order to
attain better results, it is improved process of pheromone update by particle
swarm optimization. Simulation results on popular standard social network
benchmarks in comparison standard ant colony optimization algorithm are shown a
relative enhancement of proposed algorithm.
|
1311.7215 | Alireza Rezvanian | Aylin Mousavian, Alireza Rezvanian, Mohammad Reza Meybodi | Solving Minimum Vertex Cover Problem Using Learning Automata | 5 pages, 5 figures, conference | null | null | null | cs.AI cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Minimum vertex cover problem is an NP-Hard problem with the aim of finding
minimum number of vertices to cover graph. In this paper, a learning automaton
based algorithm is proposed to find minimum vertex cover in graph. In the
proposed algorithm, each vertex of graph is equipped with a learning automaton
that has two actions in the candidate or non-candidate of the corresponding
vertex cover set. Due to characteristics of learning automata, this algorithm
significantly reduces the number of covering vertices of graph. The proposed
algorithm based on learning automata iteratively minimize the candidate vertex
cover through the update its action probability. As the proposed algorithm
proceeds, a candidate solution nears to optimal solution of the minimum vertex
cover problem. In order to evaluate the proposed algorithm, several experiments
conducted on DIMACS dataset which compared to conventional methods.
Experimental results show the major superiority of the proposed algorithm over
the other methods.
| [
{
"version": "v1",
"created": "Thu, 28 Nov 2013 05:49:34 GMT"
}
] | 2013-12-02T00:00:00 | [
[
"Mousavian",
"Aylin",
""
],
[
"Rezvanian",
"Alireza",
""
],
[
"Meybodi",
"Mohammad Reza",
""
]
] | TITLE: Solving Minimum Vertex Cover Problem Using Learning Automata
ABSTRACT: Minimum vertex cover problem is an NP-Hard problem with the aim of finding
minimum number of vertices to cover graph. In this paper, a learning automaton
based algorithm is proposed to find minimum vertex cover in graph. In the
proposed algorithm, each vertex of graph is equipped with a learning automaton
that has two actions in the candidate or non-candidate of the corresponding
vertex cover set. Due to characteristics of learning automata, this algorithm
significantly reduces the number of covering vertices of graph. The proposed
algorithm based on learning automata iteratively minimize the candidate vertex
cover through the update its action probability. As the proposed algorithm
proceeds, a candidate solution nears to optimal solution of the minimum vertex
cover problem. In order to evaluate the proposed algorithm, several experiments
conducted on DIMACS dataset which compared to conventional methods.
Experimental results show the major superiority of the proposed algorithm over
the other methods.
|
1108.4142 | Aleksandrs Slivkins | Moshe Babaioff, Shaddin Dughmi, Robert Kleinberg and Aleksandrs
Slivkins | Dynamic Pricing with Limited Supply | null | null | null | null | cs.GT cs.DS cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider the problem of dynamic pricing with limited supply. A seller has
$k$ identical items for sale and is facing $n$ potential buyers ("agents") that
are arriving sequentially. Each agent is interested in buying one item. Each
agent's value for an item is an IID sample from some fixed distribution with
support $[0,1]$. The seller offers a take-it-or-leave-it price to each arriving
agent (possibly different for different agents), and aims to maximize his
expected revenue.
We focus on "prior-independent" mechanisms -- ones that do not use any
information about the distribution. They are desirable because knowing the
distribution is unrealistic in many practical scenarios. We study how the
revenue of such mechanisms compares to the revenue of the optimal offline
mechanism that knows the distribution ("offline benchmark").
We present a prior-independent dynamic pricing mechanism whose revenue is at
most $O((k \log n)^{2/3})$ less than the offline benchmark, for every
distribution that is regular. In fact, this guarantee holds without *any*
assumptions if the benchmark is relaxed to fixed-price mechanisms. Further, we
prove a matching lower bound. The performance guarantee for the same mechanism
can be improved to $O(\sqrt{k} \log n)$, with a distribution-dependent
constant, if $k/n$ is sufficiently small. We show that, in the worst case over
all demand distributions, this is essentially the best rate that can be
obtained with a distribution-specific constant.
On a technical level, we exploit the connection to multi-armed bandits (MAB).
While dynamic pricing with unlimited supply can easily be seen as an MAB
problem, the intuition behind MAB approaches breaks when applied to the setting
with limited supply. Our high-level conceptual contribution is that even the
limited supply setting can be fruitfully treated as a bandit problem.
| [
{
"version": "v1",
"created": "Sat, 20 Aug 2011 20:28:09 GMT"
},
{
"version": "v2",
"created": "Tue, 21 Feb 2012 18:42:22 GMT"
},
{
"version": "v3",
"created": "Tue, 26 Nov 2013 20:08:07 GMT"
}
] | 2013-11-27T00:00:00 | [
[
"Babaioff",
"Moshe",
""
],
[
"Dughmi",
"Shaddin",
""
],
[
"Kleinberg",
"Robert",
""
],
[
"Slivkins",
"Aleksandrs",
""
]
] | TITLE: Dynamic Pricing with Limited Supply
ABSTRACT: We consider the problem of dynamic pricing with limited supply. A seller has
$k$ identical items for sale and is facing $n$ potential buyers ("agents") that
are arriving sequentially. Each agent is interested in buying one item. Each
agent's value for an item is an IID sample from some fixed distribution with
support $[0,1]$. The seller offers a take-it-or-leave-it price to each arriving
agent (possibly different for different agents), and aims to maximize his
expected revenue.
We focus on "prior-independent" mechanisms -- ones that do not use any
information about the distribution. They are desirable because knowing the
distribution is unrealistic in many practical scenarios. We study how the
revenue of such mechanisms compares to the revenue of the optimal offline
mechanism that knows the distribution ("offline benchmark").
We present a prior-independent dynamic pricing mechanism whose revenue is at
most $O((k \log n)^{2/3})$ less than the offline benchmark, for every
distribution that is regular. In fact, this guarantee holds without *any*
assumptions if the benchmark is relaxed to fixed-price mechanisms. Further, we
prove a matching lower bound. The performance guarantee for the same mechanism
can be improved to $O(\sqrt{k} \log n)$, with a distribution-dependent
constant, if $k/n$ is sufficiently small. We show that, in the worst case over
all demand distributions, this is essentially the best rate that can be
obtained with a distribution-specific constant.
On a technical level, we exploit the connection to multi-armed bandits (MAB).
While dynamic pricing with unlimited supply can easily be seen as an MAB
problem, the intuition behind MAB approaches breaks when applied to the setting
with limited supply. Our high-level conceptual contribution is that even the
limited supply setting can be fruitfully treated as a bandit problem.
|
1212.3524 | Nicolas Tremblay | Nicolas Tremblay, Alain Barrat, Cary Forest, Mark Nornberg,
Jean-Fran\c{c}ois Pinton, Pierre Borgnat | Bootstrapping under constraint for the assessment of group behavior in
human contact networks | null | Phys. Rev. E 88, 052812 (2013) | 10.1103/PhysRevE.88.052812 | null | physics.soc-ph cs.SI math.ST stat.TH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The increasing availability of time --and space-- resolved data describing
human activities and interactions gives insights into both static and dynamic
properties of human behavior. In practice, nevertheless, real-world datasets
can often be considered as only one realisation of a particular event. This
highlights a key issue in social network analysis: the statistical significance
of estimated properties. In this context, we focus here on the assessment of
quantitative features of specific subset of nodes in empirical networks. We
present a method of statistical resampling based on bootstrapping groups of
nodes under constraints within the empirical network. The method enables us to
define acceptance intervals for various Null Hypotheses concerning relevant
properties of the subset of nodes under consideration, in order to characterize
by a statistical test its behavior as ``normal'' or not. We apply this method
to a high resolution dataset describing the face-to-face proximity of
individuals during two co-located scientific conferences. As a case study, we
show how to probe whether co-locating the two conferences succeeded in bringing
together the two corresponding groups of scientists.
| [
{
"version": "v1",
"created": "Fri, 14 Dec 2012 16:48:12 GMT"
},
{
"version": "v2",
"created": "Fri, 8 Nov 2013 12:06:21 GMT"
}
] | 2013-11-27T00:00:00 | [
[
"Tremblay",
"Nicolas",
""
],
[
"Barrat",
"Alain",
""
],
[
"Forest",
"Cary",
""
],
[
"Nornberg",
"Mark",
""
],
[
"Pinton",
"Jean-François",
""
],
[
"Borgnat",
"Pierre",
""
]
] | TITLE: Bootstrapping under constraint for the assessment of group behavior in
human contact networks
ABSTRACT: The increasing availability of time --and space-- resolved data describing
human activities and interactions gives insights into both static and dynamic
properties of human behavior. In practice, nevertheless, real-world datasets
can often be considered as only one realisation of a particular event. This
highlights a key issue in social network analysis: the statistical significance
of estimated properties. In this context, we focus here on the assessment of
quantitative features of specific subset of nodes in empirical networks. We
present a method of statistical resampling based on bootstrapping groups of
nodes under constraints within the empirical network. The method enables us to
define acceptance intervals for various Null Hypotheses concerning relevant
properties of the subset of nodes under consideration, in order to characterize
by a statistical test its behavior as ``normal'' or not. We apply this method
to a high resolution dataset describing the face-to-face proximity of
individuals during two co-located scientific conferences. As a case study, we
show how to probe whether co-locating the two conferences succeeded in bringing
together the two corresponding groups of scientists.
|
1212.5284 | Diego Perea Mr. | Diego Perea-Vega and Jean-Francois Frigon and Andre Girard | Dual-Based Bounds for Resource Allocation in Zero-forcing Beamforming
OFDMA-SDMA Systems | Accepted for publication in EURASIP Journal on Wireless
Communications and Networking. arXiv admin note: substantial text overlap
with arXiv:1110.1347 | EURASIP Journal on Wireless Communications and Networking 2013,
2013:51 | 10.1186/1687-1499-2013-51 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider multi-antenna base stations using orthogonal frequency division
multiple access and space division multiple access techniques to serve
single-antenna users. Some users, called real-time users, have minimum rate
requirements and must be served in the current time slot while others, called
non real-time users, do not have strict timing constraints and are served on a
best-effort basis. The resource allocation problem is to find the assignment of
users to subcarriers and the transmit beamforming vectors that maximize the
total user rates subject to power and minimum rate constraints. In general,
this is a nonlinear and non-convex program and the zero-forcing technique used
here makes it integer as well, exact optimal solutions cannot be computed in
reasonable time for realistic cases. For this reason, we present a technique to
compute both upper and lower bounds and show that these are quite close for
some realistic cases.
First, we formulate the dual problem whose optimum provides an upper bound to
all feasible solutions. We then use a simple method to get a primal-feasible
point starting from the dual optimal solution, which is a lower bound on the
primal optimal solution. Numerical results for several cases show that the two
bounds are close so that the dual method can be used to benchmark any heuristic
used to solve this problem. As an example, we provide numerical results showing
the performance gap of the well-known weight adjustment method and show that
there is considerable room for improvement.
| [
{
"version": "v1",
"created": "Thu, 20 Dec 2012 22:12:15 GMT"
}
] | 2013-11-27T00:00:00 | [
[
"Perea-Vega",
"Diego",
""
],
[
"Frigon",
"Jean-Francois",
""
],
[
"Girard",
"Andre",
""
]
] | TITLE: Dual-Based Bounds for Resource Allocation in Zero-forcing Beamforming
OFDMA-SDMA Systems
ABSTRACT: We consider multi-antenna base stations using orthogonal frequency division
multiple access and space division multiple access techniques to serve
single-antenna users. Some users, called real-time users, have minimum rate
requirements and must be served in the current time slot while others, called
non real-time users, do not have strict timing constraints and are served on a
best-effort basis. The resource allocation problem is to find the assignment of
users to subcarriers and the transmit beamforming vectors that maximize the
total user rates subject to power and minimum rate constraints. In general,
this is a nonlinear and non-convex program and the zero-forcing technique used
here makes it integer as well, exact optimal solutions cannot be computed in
reasonable time for realistic cases. For this reason, we present a technique to
compute both upper and lower bounds and show that these are quite close for
some realistic cases.
First, we formulate the dual problem whose optimum provides an upper bound to
all feasible solutions. We then use a simple method to get a primal-feasible
point starting from the dual optimal solution, which is a lower bound on the
primal optimal solution. Numerical results for several cases show that the two
bounds are close so that the dual method can be used to benchmark any heuristic
used to solve this problem. As an example, we provide numerical results showing
the performance gap of the well-known weight adjustment method and show that
there is considerable room for improvement.
|
1311.4486 | Yun-Qian Miao | Yun-Qian Miao, Ahmed K. Farahat, Mohamed S. Kamel | Discriminative Density-ratio Estimation | null | null | null | null | cs.LG | http://creativecommons.org/licenses/by-nc-sa/3.0/ | The covariate shift is a challenging problem in supervised learning that
results from the discrepancy between the training and test distributions. An
effective approach which recently drew a considerable attention in the research
community is to reweight the training samples to minimize that discrepancy. In
specific, many methods are based on developing Density-ratio (DR) estimation
techniques that apply to both regression and classification problems. Although
these methods work well for regression problems, their performance on
classification problems is not satisfactory. This is due to a key observation
that these methods focus on matching the sample marginal distributions without
paying attention to preserving the separation between classes in the reweighted
space. In this paper, we propose a novel method for Discriminative
Density-ratio (DDR) estimation that addresses the aforementioned problem and
aims at estimating the density-ratio of joint distributions in a class-wise
manner. The proposed algorithm is an iterative procedure that alternates
between estimating the class information for the test data and estimating new
density ratio for each class. To incorporate the estimated class information of
the test data, a soft matching technique is proposed. In addition, we employ an
effective criterion which adopts mutual information as an indicator to stop the
iterative procedure while resulting in a decision boundary that lies in a
sparse region. Experiments on synthetic and benchmark datasets demonstrate the
superiority of the proposed method in terms of both accuracy and robustness.
| [
{
"version": "v1",
"created": "Mon, 18 Nov 2013 18:41:20 GMT"
},
{
"version": "v2",
"created": "Tue, 26 Nov 2013 03:20:56 GMT"
}
] | 2013-11-27T00:00:00 | [
[
"Miao",
"Yun-Qian",
""
],
[
"Farahat",
"Ahmed K.",
""
],
[
"Kamel",
"Mohamed S.",
""
]
] | TITLE: Discriminative Density-ratio Estimation
ABSTRACT: The covariate shift is a challenging problem in supervised learning that
results from the discrepancy between the training and test distributions. An
effective approach which recently drew a considerable attention in the research
community is to reweight the training samples to minimize that discrepancy. In
specific, many methods are based on developing Density-ratio (DR) estimation
techniques that apply to both regression and classification problems. Although
these methods work well for regression problems, their performance on
classification problems is not satisfactory. This is due to a key observation
that these methods focus on matching the sample marginal distributions without
paying attention to preserving the separation between classes in the reweighted
space. In this paper, we propose a novel method for Discriminative
Density-ratio (DDR) estimation that addresses the aforementioned problem and
aims at estimating the density-ratio of joint distributions in a class-wise
manner. The proposed algorithm is an iterative procedure that alternates
between estimating the class information for the test data and estimating new
density ratio for each class. To incorporate the estimated class information of
the test data, a soft matching technique is proposed. In addition, we employ an
effective criterion which adopts mutual information as an indicator to stop the
iterative procedure while resulting in a decision boundary that lies in a
sparse region. Experiments on synthetic and benchmark datasets demonstrate the
superiority of the proposed method in terms of both accuracy and robustness.
|
1311.6510 | Agata Lapedriza | Agata Lapedriza and Hamed Pirsiavash and Zoya Bylinskii and Antonio
Torralba | Are all training examples equally valuable? | null | null | null | null | cs.CV cs.LG stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | When learning a new concept, not all training examples may prove equally
useful for training: some may have higher or lower training value than others.
The goal of this paper is to bring to the attention of the vision community the
following considerations: (1) some examples are better than others for training
detectors or classifiers, and (2) in the presence of better examples, some
examples may negatively impact performance and removing them may be beneficial.
In this paper, we propose an approach for measuring the training value of an
example, and use it for ranking and greedily sorting examples. We test our
methods on different vision tasks, models, datasets and classifiers. Our
experiments show that the performance of current state-of-the-art detectors and
classifiers can be improved when training on a subset, rather than the whole
training set.
| [
{
"version": "v1",
"created": "Mon, 25 Nov 2013 22:59:24 GMT"
}
] | 2013-11-27T00:00:00 | [
[
"Lapedriza",
"Agata",
""
],
[
"Pirsiavash",
"Hamed",
""
],
[
"Bylinskii",
"Zoya",
""
],
[
"Torralba",
"Antonio",
""
]
] | TITLE: Are all training examples equally valuable?
ABSTRACT: When learning a new concept, not all training examples may prove equally
useful for training: some may have higher or lower training value than others.
The goal of this paper is to bring to the attention of the vision community the
following considerations: (1) some examples are better than others for training
detectors or classifiers, and (2) in the presence of better examples, some
examples may negatively impact performance and removing them may be beneficial.
In this paper, we propose an approach for measuring the training value of an
example, and use it for ranking and greedily sorting examples. We test our
methods on different vision tasks, models, datasets and classifiers. Our
experiments show that the performance of current state-of-the-art detectors and
classifiers can be improved when training on a subset, rather than the whole
training set.
|
1311.6758 | Patrick Ott | Patrick Ott and Mark Everingham and Jiri Matas | Detection of Partially Visible Objects | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | An "elephant in the room" for most current object detection and localization
methods is the lack of explicit modelling of partial visibility due to
occlusion by other objects or truncation by the image boundary. Based on a
sliding window approach, we propose a detection method which explicitly models
partial visibility by treating it as a latent variable. A novel non-maximum
suppression scheme is proposed which takes into account the inferred partial
visibility of objects while providing a globally optimal solution. The method
gives more detailed scene interpretations than conventional detectors in that
we are able to identify the visible parts of an object. We report improved
average precision on the PASCAL VOC 2010 dataset compared to a baseline
detector.
| [
{
"version": "v1",
"created": "Sun, 24 Nov 2013 16:59:19 GMT"
}
] | 2013-11-27T00:00:00 | [
[
"Ott",
"Patrick",
""
],
[
"Everingham",
"Mark",
""
],
[
"Matas",
"Jiri",
""
]
] | TITLE: Detection of Partially Visible Objects
ABSTRACT: An "elephant in the room" for most current object detection and localization
methods is the lack of explicit modelling of partial visibility due to
occlusion by other objects or truncation by the image boundary. Based on a
sliding window approach, we propose a detection method which explicitly models
partial visibility by treating it as a latent variable. A novel non-maximum
suppression scheme is proposed which takes into account the inferred partial
visibility of objects while providing a globally optimal solution. The method
gives more detailed scene interpretations than conventional detectors in that
we are able to identify the visible parts of an object. We report improved
average precision on the PASCAL VOC 2010 dataset compared to a baseline
detector.
|
1204.0111 | Jack Poulson | Jack Poulson, Bj\"orn Engquist, Siwei Li, and Lexing Ying | A parallel sweeping preconditioner for heterogeneous 3D Helmholtz
equations | Final version of document | null | 10.1137/120871985 | null | cs.NA math.NA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A parallelization of a sweeping preconditioner for 3D Helmholtz equations
without large cavities is introduced and benchmarked for several challenging
velocity models. The setup and application costs of the sequential
preconditioner are shown to be O({\gamma}^2 N^{4/3}) and O({\gamma} N log N),
where {\gamma}({\omega}) denotes the modestly frequency-dependent number of
grid points per Perfectly Matched Layer. Several computational and memory
improvements are introduced relative to using black-box sparse-direct solvers
for the auxiliary problems, and competitive runtimes and iteration counts are
reported for high-frequency problems distributed over thousands of cores. Two
open-source packages are released along with this paper: "Parallel Sweeping
Preconditioner (PSP)" and the underlying distributed multifrontal solver,
"Clique".
| [
{
"version": "v1",
"created": "Sat, 31 Mar 2012 16:00:50 GMT"
},
{
"version": "v2",
"created": "Tue, 3 Apr 2012 02:42:16 GMT"
},
{
"version": "v3",
"created": "Wed, 12 Sep 2012 14:58:33 GMT"
},
{
"version": "v4",
"created": "Tue, 5 Feb 2013 23:01:44 GMT"
}
] | 2013-11-26T00:00:00 | [
[
"Poulson",
"Jack",
""
],
[
"Engquist",
"Björn",
""
],
[
"Li",
"Siwei",
""
],
[
"Ying",
"Lexing",
""
]
] | TITLE: A parallel sweeping preconditioner for heterogeneous 3D Helmholtz
equations
ABSTRACT: A parallelization of a sweeping preconditioner for 3D Helmholtz equations
without large cavities is introduced and benchmarked for several challenging
velocity models. The setup and application costs of the sequential
preconditioner are shown to be O({\gamma}^2 N^{4/3}) and O({\gamma} N log N),
where {\gamma}({\omega}) denotes the modestly frequency-dependent number of
grid points per Perfectly Matched Layer. Several computational and memory
improvements are introduced relative to using black-box sparse-direct solvers
for the auxiliary problems, and competitive runtimes and iteration counts are
reported for high-frequency problems distributed over thousands of cores. Two
open-source packages are released along with this paper: "Parallel Sweeping
Preconditioner (PSP)" and the underlying distributed multifrontal solver,
"Clique".
|
1307.5101 | Hsiang-Fu Yu | Hsiang-Fu Yu and Prateek Jain and Purushottam Kar and Inderjit S.
Dhillon | Large-scale Multi-label Learning with Missing Labels | null | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The multi-label classification problem has generated significant interest in
recent years. However, existing approaches do not adequately address two key
challenges: (a) the ability to tackle problems with a large number (say
millions) of labels, and (b) the ability to handle data with missing labels. In
this paper, we directly address both these problems by studying the multi-label
problem in a generic empirical risk minimization (ERM) framework. Our
framework, despite being simple, is surprisingly able to encompass several
recent label-compression based methods which can be derived as special cases of
our method. To optimize the ERM problem, we develop techniques that exploit the
structure of specific loss functions - such as the squared loss function - to
offer efficient algorithms. We further show that our learning framework admits
formal excess risk bounds even in the presence of missing labels. Our risk
bounds are tight and demonstrate better generalization performance for low-rank
promoting trace-norm regularization when compared to (rank insensitive)
Frobenius norm regularization. Finally, we present extensive empirical results
on a variety of benchmark datasets and show that our methods perform
significantly better than existing label compression based methods and can
scale up to very large datasets such as the Wikipedia dataset.
| [
{
"version": "v1",
"created": "Thu, 18 Jul 2013 23:55:55 GMT"
},
{
"version": "v2",
"created": "Mon, 14 Oct 2013 22:33:17 GMT"
},
{
"version": "v3",
"created": "Mon, 25 Nov 2013 16:57:43 GMT"
}
] | 2013-11-26T00:00:00 | [
[
"Yu",
"Hsiang-Fu",
""
],
[
"Jain",
"Prateek",
""
],
[
"Kar",
"Purushottam",
""
],
[
"Dhillon",
"Inderjit S.",
""
]
] | TITLE: Large-scale Multi-label Learning with Missing Labels
ABSTRACT: The multi-label classification problem has generated significant interest in
recent years. However, existing approaches do not adequately address two key
challenges: (a) the ability to tackle problems with a large number (say
millions) of labels, and (b) the ability to handle data with missing labels. In
this paper, we directly address both these problems by studying the multi-label
problem in a generic empirical risk minimization (ERM) framework. Our
framework, despite being simple, is surprisingly able to encompass several
recent label-compression based methods which can be derived as special cases of
our method. To optimize the ERM problem, we develop techniques that exploit the
structure of specific loss functions - such as the squared loss function - to
offer efficient algorithms. We further show that our learning framework admits
formal excess risk bounds even in the presence of missing labels. Our risk
bounds are tight and demonstrate better generalization performance for low-rank
promoting trace-norm regularization when compared to (rank insensitive)
Frobenius norm regularization. Finally, we present extensive empirical results
on a variety of benchmark datasets and show that our methods perform
significantly better than existing label compression based methods and can
scale up to very large datasets such as the Wikipedia dataset.
|
1310.0509 | Isik Baris Fidaner | I\c{s}{\i}k Bar{\i}\c{s} Fidaner and Ali Taylan Cemgil | Summary Statistics for Partitionings and Feature Allocations | Accepted to NIPS 2013:
https://nips.cc/Conferences/2013/Program/event.php?ID=3763 | null | null | null | cs.LG stat.ML | http://creativecommons.org/licenses/by-nc-sa/3.0/ | Infinite mixture models are commonly used for clustering. One can sample from
the posterior of mixture assignments by Monte Carlo methods or find its maximum
a posteriori solution by optimization. However, in some problems the posterior
is diffuse and it is hard to interpret the sampled partitionings. In this
paper, we introduce novel statistics based on block sizes for representing
sample sets of partitionings and feature allocations. We develop an
element-based definition of entropy to quantify segmentation among their
elements. Then we propose a simple algorithm called entropy agglomeration (EA)
to summarize and visualize this information. Experiments on various infinite
mixture posteriors as well as a feature allocation dataset demonstrate that the
proposed statistics are useful in practice.
| [
{
"version": "v1",
"created": "Tue, 1 Oct 2013 22:34:18 GMT"
},
{
"version": "v2",
"created": "Thu, 3 Oct 2013 06:28:18 GMT"
},
{
"version": "v3",
"created": "Sat, 5 Oct 2013 18:26:44 GMT"
},
{
"version": "v4",
"created": "Mon, 25 Nov 2013 08:43:59 GMT"
}
] | 2013-11-26T00:00:00 | [
[
"Fidaner",
"Işık Barış",
""
],
[
"Cemgil",
"Ali Taylan",
""
]
] | TITLE: Summary Statistics for Partitionings and Feature Allocations
ABSTRACT: Infinite mixture models are commonly used for clustering. One can sample from
the posterior of mixture assignments by Monte Carlo methods or find its maximum
a posteriori solution by optimization. However, in some problems the posterior
is diffuse and it is hard to interpret the sampled partitionings. In this
paper, we introduce novel statistics based on block sizes for representing
sample sets of partitionings and feature allocations. We develop an
element-based definition of entropy to quantify segmentation among their
elements. Then we propose a simple algorithm called entropy agglomeration (EA)
to summarize and visualize this information. Experiments on various infinite
mixture posteriors as well as a feature allocation dataset demonstrate that the
proposed statistics are useful in practice.
|
1311.5947 | Chunhua Shen | Guosheng Lin, Chunhua Shen, Anton van den Hengel, David Suter | Fast Training of Effective Multi-class Boosting Using Coordinate Descent
Optimization | Appeared in Proc. Asian Conf. Computer Vision 2012. Code can be
downloaded at http://goo.gl/WluhrQ | null | null | null | cs.CV cs.LG stat.CO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Wepresentanovelcolumngenerationbasedboostingmethod for multi-class
classification. Our multi-class boosting is formulated in a single optimization
problem as in Shen and Hao (2011). Different from most existing multi-class
boosting methods, which use the same set of weak learners for all the classes,
we train class specified weak learners (i.e., each class has a different set of
weak learners). We show that using separate weak learner sets for each class
leads to fast convergence, without introducing additional computational
overhead in the training procedure. To further make the training more efficient
and scalable, we also propose a fast co- ordinate descent method for solving
the optimization problem at each boosting iteration. The proposed coordinate
descent method is conceptually simple and easy to implement in that it is a
closed-form solution for each coordinate update. Experimental results on a
variety of datasets show that, compared to a range of existing multi-class
boosting meth- ods, the proposed method has much faster convergence rate and
better generalization performance in most cases. We also empirically show that
the proposed fast coordinate descent algorithm needs less training time than
the MultiBoost algorithm in Shen and Hao (2011).
| [
{
"version": "v1",
"created": "Sat, 23 Nov 2013 02:30:14 GMT"
}
] | 2013-11-26T00:00:00 | [
[
"Lin",
"Guosheng",
""
],
[
"Shen",
"Chunhua",
""
],
[
"Hengel",
"Anton van den",
""
],
[
"Suter",
"David",
""
]
] | TITLE: Fast Training of Effective Multi-class Boosting Using Coordinate Descent
Optimization
ABSTRACT: Wepresentanovelcolumngenerationbasedboostingmethod for multi-class
classification. Our multi-class boosting is formulated in a single optimization
problem as in Shen and Hao (2011). Different from most existing multi-class
boosting methods, which use the same set of weak learners for all the classes,
we train class specified weak learners (i.e., each class has a different set of
weak learners). We show that using separate weak learner sets for each class
leads to fast convergence, without introducing additional computational
overhead in the training procedure. To further make the training more efficient
and scalable, we also propose a fast co- ordinate descent method for solving
the optimization problem at each boosting iteration. The proposed coordinate
descent method is conceptually simple and easy to implement in that it is a
closed-form solution for each coordinate update. Experimental results on a
variety of datasets show that, compared to a range of existing multi-class
boosting meth- ods, the proposed method has much faster convergence rate and
better generalization performance in most cases. We also empirically show that
the proposed fast coordinate descent algorithm needs less training time than
the MultiBoost algorithm in Shen and Hao (2011).
|
1311.6048 | Stefano Soatto | Jingming Dong, Jonathan Balzer, Damek Davis, Joshua Hernandez, Stefano
Soatto | On the Design and Analysis of Multiple View Descriptors | null | null | null | UCLA CSD TR130024, Nov. 8, 2013 | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose an extension of popular descriptors based on gradient orientation
histograms (HOG, computed in a single image) to multiple views. It hinges on
interpreting HOG as a conditional density in the space of sampled images, where
the effects of nuisance factors such as viewpoint and illumination are
marginalized. However, such marginalization is performed with respect to a very
coarse approximation of the underlying distribution. Our extension leverages on
the fact that multiple views of the same scene allow separating intrinsic from
nuisance variability, and thus afford better marginalization of the latter. The
result is a descriptor that has the same complexity of single-view HOG, and can
be compared in the same manner, but exploits multiple views to better trade off
insensitivity to nuisance variability with specificity to intrinsic
variability. We also introduce a novel multi-view wide-baseline matching
dataset, consisting of a mixture of real and synthetic objects with ground
truthed camera motion and dense three-dimensional geometry.
| [
{
"version": "v1",
"created": "Sat, 23 Nov 2013 20:38:50 GMT"
}
] | 2013-11-26T00:00:00 | [
[
"Dong",
"Jingming",
""
],
[
"Balzer",
"Jonathan",
""
],
[
"Davis",
"Damek",
""
],
[
"Hernandez",
"Joshua",
""
],
[
"Soatto",
"Stefano",
""
]
] | TITLE: On the Design and Analysis of Multiple View Descriptors
ABSTRACT: We propose an extension of popular descriptors based on gradient orientation
histograms (HOG, computed in a single image) to multiple views. It hinges on
interpreting HOG as a conditional density in the space of sampled images, where
the effects of nuisance factors such as viewpoint and illumination are
marginalized. However, such marginalization is performed with respect to a very
coarse approximation of the underlying distribution. Our extension leverages on
the fact that multiple views of the same scene allow separating intrinsic from
nuisance variability, and thus afford better marginalization of the latter. The
result is a descriptor that has the same complexity of single-view HOG, and can
be compared in the same manner, but exploits multiple views to better trade off
insensitivity to nuisance variability with specificity to intrinsic
variability. We also introduce a novel multi-view wide-baseline matching
dataset, consisting of a mixture of real and synthetic objects with ground
truthed camera motion and dense three-dimensional geometry.
|
1311.6334 | Charanpal Dhanjal | Charanpal Dhanjal (LTCI), St\'ephan Cl\'emen\c{c}on (LTCI) | Learning Reputation in an Authorship Network | null | null | null | null | cs.SI cs.IR cs.LG stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The problem of searching for experts in a given academic field is hugely
important in both industry and academia. We study exactly this issue with
respect to a database of authors and their publications. The idea is to use
Latent Semantic Indexing (LSI) and Latent Dirichlet Allocation (LDA) to perform
topic modelling in order to find authors who have worked in a query field. We
then construct a coauthorship graph and motivate the use of influence
maximisation and a variety of graph centrality measures to obtain a ranked list
of experts. The ranked lists are further improved using a Markov Chain-based
rank aggregation approach. The complete method is readily scalable to large
datasets. To demonstrate the efficacy of the approach we report on an extensive
set of computational simulations using the Arnetminer dataset. An improvement
in mean average precision is demonstrated over the baseline case of simply
using the order of authors found by the topic models.
| [
{
"version": "v1",
"created": "Mon, 25 Nov 2013 15:25:28 GMT"
}
] | 2013-11-26T00:00:00 | [
[
"Dhanjal",
"Charanpal",
"",
"LTCI"
],
[
"Clémençon",
"Stéphan",
"",
"LTCI"
]
] | TITLE: Learning Reputation in an Authorship Network
ABSTRACT: The problem of searching for experts in a given academic field is hugely
important in both industry and academia. We study exactly this issue with
respect to a database of authors and their publications. The idea is to use
Latent Semantic Indexing (LSI) and Latent Dirichlet Allocation (LDA) to perform
topic modelling in order to find authors who have worked in a query field. We
then construct a coauthorship graph and motivate the use of influence
maximisation and a variety of graph centrality measures to obtain a ranked list
of experts. The ranked lists are further improved using a Markov Chain-based
rank aggregation approach. The complete method is readily scalable to large
datasets. To demonstrate the efficacy of the approach we report on an extensive
set of computational simulations using the Arnetminer dataset. An improvement
in mean average precision is demonstrated over the baseline case of simply
using the order of authors found by the topic models.
|
1311.5595 | Alon Shtern | Alon Shtern and Ron Kimmel | On Nonrigid Shape Similarity and Correspondence | null | null | null | null | cs.CV cs.GR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | An important operation in geometry processing is finding the correspondences
between pairs of shapes. The Gromov-Hausdorff distance, a measure of
dissimilarity between metric spaces, has been found to be highly useful for
nonrigid shape comparison. Here, we explore the applicability of related shape
similarity measures to the problem of shape correspondence, adopting spectral
type distances. We propose to evaluate the spectral kernel distance, the
spectral embedding distance and the novel spectral quasi-conformal distance,
comparing the manifolds from different viewpoints. By matching the shapes in
the spectral domain, important attributes of surface structure are being
aligned. For the purpose of testing our ideas, we introduce a fully automatic
framework for finding intrinsic correspondence between two shapes. The proposed
method achieves state-of-the-art results on the Princeton isometric shape
matching protocol applied, as usual, to the TOSCA and SCAPE benchmarks.
| [
{
"version": "v1",
"created": "Mon, 18 Nov 2013 22:08:02 GMT"
}
] | 2013-11-25T00:00:00 | [
[
"Shtern",
"Alon",
""
],
[
"Kimmel",
"Ron",
""
]
] | TITLE: On Nonrigid Shape Similarity and Correspondence
ABSTRACT: An important operation in geometry processing is finding the correspondences
between pairs of shapes. The Gromov-Hausdorff distance, a measure of
dissimilarity between metric spaces, has been found to be highly useful for
nonrigid shape comparison. Here, we explore the applicability of related shape
similarity measures to the problem of shape correspondence, adopting spectral
type distances. We propose to evaluate the spectral kernel distance, the
spectral embedding distance and the novel spectral quasi-conformal distance,
comparing the manifolds from different viewpoints. By matching the shapes in
the spectral domain, important attributes of surface structure are being
aligned. For the purpose of testing our ideas, we introduce a fully automatic
framework for finding intrinsic correspondence between two shapes. The proposed
method achieves state-of-the-art results on the Princeton isometric shape
matching protocol applied, as usual, to the TOSCA and SCAPE benchmarks.
|
1311.5636 | Dimitrios Athanasakis Mr | Dimitrios Athanasakis, John Shawe-Taylor, Delmiro Fernandez-Reyes | Learning Non-Linear Feature Maps | null | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Feature selection plays a pivotal role in learning, particularly in areas
were parsimonious features can provide insight into the underlying process,
such as biology. Recent approaches for non-linear feature selection employing
greedy optimisation of Centred Kernel Target Alignment(KTA), while exhibiting
strong results in terms of generalisation accuracy and sparsity, can become
computationally prohibitive for high-dimensional datasets. We propose randSel,
a randomised feature selection algorithm, with attractive scaling properties.
Our theoretical analysis of randSel provides strong probabilistic guarantees
for the correct identification of relevant features. Experimental results on
real and artificial data, show that the method successfully identifies
effective features, performing better than a number of competitive approaches.
| [
{
"version": "v1",
"created": "Fri, 22 Nov 2013 01:49:26 GMT"
}
] | 2013-11-25T00:00:00 | [
[
"Athanasakis",
"Dimitrios",
""
],
[
"Shawe-Taylor",
"John",
""
],
[
"Fernandez-Reyes",
"Delmiro",
""
]
] | TITLE: Learning Non-Linear Feature Maps
ABSTRACT: Feature selection plays a pivotal role in learning, particularly in areas
were parsimonious features can provide insight into the underlying process,
such as biology. Recent approaches for non-linear feature selection employing
greedy optimisation of Centred Kernel Target Alignment(KTA), while exhibiting
strong results in terms of generalisation accuracy and sparsity, can become
computationally prohibitive for high-dimensional datasets. We propose randSel,
a randomised feature selection algorithm, with attractive scaling properties.
Our theoretical analysis of randSel provides strong probabilistic guarantees
for the correct identification of relevant features. Experimental results on
real and artificial data, show that the method successfully identifies
effective features, performing better than a number of competitive approaches.
|
1311.5663 | Zhengkui Wang | Zhengkui Wang, Yan Chu, Kian-Lee Tan, Divyakant Agrawal, Amr EI
Abbadi, Xiaolong Xu | Scalable Data Cube Analysis over Big Data | null | null | null | null | cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Data cubes are widely used as a powerful tool to provide multidimensional
views in data warehousing and On-Line Analytical Processing (OLAP). However,
with increasing data sizes, it is becoming computationally expensive to perform
data cube analysis. The problem is exacerbated by the demand of supporting more
complicated aggregate functions (e.g. CORRELATION, Statistical Analysis) as
well as supporting frequent view updates in data cubes. This calls for new
scalable and efficient data cube analysis systems. In this paper, we introduce
HaCube, an extension of MapReduce, designed for efficient parallel data cube
analysis on large-scale data by taking advantages from both MapReduce (in terms
of scalability) and parallel DBMS (in terms of efficiency). We also provide a
general data cube materialization algorithm which is able to facilitate the
features in MapReduce-like systems towards an efficient data cube computation.
Furthermore, we demonstrate how HaCube supports view maintenance through either
incremental computation (e.g. used for SUM or COUNT) or recomputation (e.g.
used for MEDIAN or CORRELATION). We implement HaCube by extending Hadoop and
evaluate it based on the TPC-D benchmark over billions of tuples on a cluster
with over 320 cores. The experimental results demonstrate the efficiency,
scalability and practicality of HaCube for cube analysis over a large amount of
data in a distributed environment.
| [
{
"version": "v1",
"created": "Fri, 22 Nov 2013 07:48:25 GMT"
}
] | 2013-11-25T00:00:00 | [
[
"Wang",
"Zhengkui",
""
],
[
"Chu",
"Yan",
""
],
[
"Tan",
"Kian-Lee",
""
],
[
"Agrawal",
"Divyakant",
""
],
[
"Abbadi",
"Amr EI",
""
],
[
"Xu",
"Xiaolong",
""
]
] | TITLE: Scalable Data Cube Analysis over Big Data
ABSTRACT: Data cubes are widely used as a powerful tool to provide multidimensional
views in data warehousing and On-Line Analytical Processing (OLAP). However,
with increasing data sizes, it is becoming computationally expensive to perform
data cube analysis. The problem is exacerbated by the demand of supporting more
complicated aggregate functions (e.g. CORRELATION, Statistical Analysis) as
well as supporting frequent view updates in data cubes. This calls for new
scalable and efficient data cube analysis systems. In this paper, we introduce
HaCube, an extension of MapReduce, designed for efficient parallel data cube
analysis on large-scale data by taking advantages from both MapReduce (in terms
of scalability) and parallel DBMS (in terms of efficiency). We also provide a
general data cube materialization algorithm which is able to facilitate the
features in MapReduce-like systems towards an efficient data cube computation.
Furthermore, we demonstrate how HaCube supports view maintenance through either
incremental computation (e.g. used for SUM or COUNT) or recomputation (e.g.
used for MEDIAN or CORRELATION). We implement HaCube by extending Hadoop and
evaluate it based on the TPC-D benchmark over billions of tuples on a cluster
with over 320 cores. The experimental results demonstrate the efficiency,
scalability and practicality of HaCube for cube analysis over a large amount of
data in a distributed environment.
|
1311.5735 | Jose A. Egea | Jose A Egea, David Henriques, Thomas Cokelaer, Alejandro F Villaverde,
Julio R Banga, Julio Saez-Rodriguez | MEIGO: an open-source software suite based on metaheuristics for global
optimization in systems biology and bioinformatics | 12 pages, 7 figures, 1 table | null | null | null | math.OC cs.CE cs.MS q-bio.QM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Optimization is key to solve many problems in computational biology. Global
optimization methods provide a robust methodology, and metaheuristics in
particular have proven to be the most efficient methods for many applications.
Despite their utility, there is limited availability of metaheuristic tools. We
present MEIGO, an R and Matlab optimization toolbox (also available in Python
via a wrapper of the R version), that implements metaheuristics capable of
solving diverse problems arising in systems biology and bioinformatics:
enhanced scatter search method (eSS) for continuous nonlinear programming
(cNLP) and mixed-integer programming (MINLP) problems, and variable
neighborhood search (VNS) for Integer Programming (IP) problems. Both methods
can be run on a single-thread or in parallel using a cooperative strategy. The
code is supplied under GPLv3 and is available at
\url{http://www.iim.csic.es/~gingproc/meigo.html}. Documentation and examples
are included. The R package has been submitted to Bioconductor. We evaluate
MEIGO against optimization benchmarks, and illustrate its applicability to a
series of case studies in bioinformatics and systems biology, outperforming
other state-of-the-art methods. MEIGO provides a free, open-source platform for
optimization, that can be applied to multiple domains of systems biology and
bioinformatics. It includes efficient state of the art metaheuristics, and its
open and modular structure allows the addition of further methods.
| [
{
"version": "v1",
"created": "Fri, 22 Nov 2013 12:39:29 GMT"
}
] | 2013-11-25T00:00:00 | [
[
"Egea",
"Jose A",
""
],
[
"Henriques",
"David",
""
],
[
"Cokelaer",
"Thomas",
""
],
[
"Villaverde",
"Alejandro F",
""
],
[
"Banga",
"Julio R",
""
],
[
"Saez-Rodriguez",
"Julio",
""
]
] | TITLE: MEIGO: an open-source software suite based on metaheuristics for global
optimization in systems biology and bioinformatics
ABSTRACT: Optimization is key to solve many problems in computational biology. Global
optimization methods provide a robust methodology, and metaheuristics in
particular have proven to be the most efficient methods for many applications.
Despite their utility, there is limited availability of metaheuristic tools. We
present MEIGO, an R and Matlab optimization toolbox (also available in Python
via a wrapper of the R version), that implements metaheuristics capable of
solving diverse problems arising in systems biology and bioinformatics:
enhanced scatter search method (eSS) for continuous nonlinear programming
(cNLP) and mixed-integer programming (MINLP) problems, and variable
neighborhood search (VNS) for Integer Programming (IP) problems. Both methods
can be run on a single-thread or in parallel using a cooperative strategy. The
code is supplied under GPLv3 and is available at
\url{http://www.iim.csic.es/~gingproc/meigo.html}. Documentation and examples
are included. The R package has been submitted to Bioconductor. We evaluate
MEIGO against optimization benchmarks, and illustrate its applicability to a
series of case studies in bioinformatics and systems biology, outperforming
other state-of-the-art methods. MEIGO provides a free, open-source platform for
optimization, that can be applied to multiple domains of systems biology and
bioinformatics. It includes efficient state of the art metaheuristics, and its
open and modular structure allows the addition of further methods.
|
1311.5763 | Peter Sarlin | Peter Sarlin | Automated and Weighted Self-Organizing Time Maps | Preprint submitted to a journal | null | null | null | cs.NE cs.HC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper proposes schemes for automated and weighted Self-Organizing Time
Maps (SOTMs). The SOTM provides means for a visual approach to evolutionary
clustering, which aims at producing a sequence of clustering solutions. This
task we denote as visual dynamic clustering. The implication of an automated
SOTM is not only a data-driven parametrization of the SOTM, but also the
feature of adjusting the training to the characteristics of the data at each
time step. The aim of the weighted SOTM is to improve learning from more
trustworthy or important data with an instance-varying weight. The schemes for
automated and weighted SOTMs are illustrated on two real-world datasets: (i)
country-level risk indicators to measure the evolution of global imbalances,
and (ii) credit applicant data to measure the evolution of firm-level credit
risks.
| [
{
"version": "v1",
"created": "Fri, 22 Nov 2013 14:34:38 GMT"
}
] | 2013-11-25T00:00:00 | [
[
"Sarlin",
"Peter",
""
]
] | TITLE: Automated and Weighted Self-Organizing Time Maps
ABSTRACT: This paper proposes schemes for automated and weighted Self-Organizing Time
Maps (SOTMs). The SOTM provides means for a visual approach to evolutionary
clustering, which aims at producing a sequence of clustering solutions. This
task we denote as visual dynamic clustering. The implication of an automated
SOTM is not only a data-driven parametrization of the SOTM, but also the
feature of adjusting the training to the characteristics of the data at each
time step. The aim of the weighted SOTM is to improve learning from more
trustworthy or important data with an instance-varying weight. The schemes for
automated and weighted SOTMs are illustrated on two real-world datasets: (i)
country-level risk indicators to measure the evolution of global imbalances,
and (ii) credit applicant data to measure the evolution of firm-level credit
risks.
|
1311.5816 | Bryan Knowles | Bryan Knowles and Rong Yang | Sinkless: A Preliminary Study of Stress Propagation in Group Project
Social Networks using a Variant of the Abelian Sandpile Model | 11 pages, 8 figures | null | null | null | cs.SI physics.soc-ph | http://creativecommons.org/licenses/by-nc-sa/3.0/ | We perform social network analysis on 53 students split over three semesters
and 13 groups, using conventional measures like eigenvector centrality,
betweeness centrality, and degree centrality, as well as defining a variant of
the Abelian Sandpile Model (ASM) with the intention of modeling stress
propagation in the college classroom. We correlate the results of these
analyses with group project grades received; due to a small or poorly collected
dataset, we are unable to conclude that any of these network measures relates
to those grades. However, we are successful in using this dataset to define a
discrete, recursive, and more generalized variant of the ASM. Abelian Sandpile
Model, College Grades, Self-organized Criticality, Sinkless Sandpile Model,
Social Network Analysis, Stress Propagation
| [
{
"version": "v1",
"created": "Fri, 22 Nov 2013 17:08:43 GMT"
}
] | 2013-11-25T00:00:00 | [
[
"Knowles",
"Bryan",
""
],
[
"Yang",
"Rong",
""
]
] | TITLE: Sinkless: A Preliminary Study of Stress Propagation in Group Project
Social Networks using a Variant of the Abelian Sandpile Model
ABSTRACT: We perform social network analysis on 53 students split over three semesters
and 13 groups, using conventional measures like eigenvector centrality,
betweeness centrality, and degree centrality, as well as defining a variant of
the Abelian Sandpile Model (ASM) with the intention of modeling stress
propagation in the college classroom. We correlate the results of these
analyses with group project grades received; due to a small or poorly collected
dataset, we are unable to conclude that any of these network measures relates
to those grades. However, we are successful in using this dataset to define a
discrete, recursive, and more generalized variant of the ASM. Abelian Sandpile
Model, College Grades, Self-organized Criticality, Sinkless Sandpile Model,
Social Network Analysis, Stress Propagation
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.