id
large_stringlengths
9
16
submitter
large_stringlengths
3
64
authors
large_stringlengths
5
20.2k
title
large_stringlengths
5
245
comments
large_stringlengths
1
482
journal-ref
large_stringlengths
4
382
doi
large_stringlengths
9
151
report-no
large_stringlengths
2
509
categories
large_stringlengths
5
78
license
large_stringclasses
9 values
abstract
large_stringlengths
83
3.55k
versions
large listlengths
1
21
update_date
timestamp[ms]date
2007-05-23 00:00:00
2025-05-30 00:00:00
authors_parsed
large listlengths
1
1.35k
prompt
large_stringlengths
166
3.64k
1312.6838
Ahmed Farahat
Ahmed K. Farahat, Ahmed Elgohary, Ali Ghodsi, Mohamed S. Kamel
Greedy Column Subset Selection for Large-scale Data Sets
Under consideration for publication in Knowledge and Information Systems
null
null
null
cs.DS cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In today's information systems, the availability of massive amounts of data necessitates the development of fast and accurate algorithms to summarize these data and represent them in a succinct format. One crucial problem in big data analytics is the selection of representative instances from large and massively-distributed data, which is formally known as the Column Subset Selection (CSS) problem. The solution to this problem enables data analysts to understand the insights of the data and explore its hidden structure. The selected instances can also be used for data preprocessing tasks such as learning a low-dimensional embedding of the data points or computing a low-rank approximation of the corresponding matrix. This paper presents a fast and accurate greedy algorithm for large-scale column subset selection. The algorithm minimizes an objective function which measures the reconstruction error of the data matrix based on the subset of selected columns. The paper first presents a centralized greedy algorithm for column subset selection which depends on a novel recursive formula for calculating the reconstruction error of the data matrix. The paper then presents a MapReduce algorithm which selects a few representative columns from a matrix whose columns are massively distributed across several commodity machines. The algorithm first learns a concise representation of all columns using random projection, and it then solves a generalized column subset selection problem at each machine in which a subset of columns are selected from the sub-matrix on that machine such that the reconstruction error of the concise representation is minimized. The paper demonstrates the effectiveness and efficiency of the proposed algorithm through an empirical evaluation on benchmark data sets.
[ { "version": "v1", "created": "Tue, 24 Dec 2013 15:10:23 GMT" } ]
2013-12-27T00:00:00
[ [ "Farahat", "Ahmed K.", "" ], [ "Elgohary", "Ahmed", "" ], [ "Ghodsi", "Ali", "" ], [ "Kamel", "Mohamed S.", "" ] ]
TITLE: Greedy Column Subset Selection for Large-scale Data Sets ABSTRACT: In today's information systems, the availability of massive amounts of data necessitates the development of fast and accurate algorithms to summarize these data and represent them in a succinct format. One crucial problem in big data analytics is the selection of representative instances from large and massively-distributed data, which is formally known as the Column Subset Selection (CSS) problem. The solution to this problem enables data analysts to understand the insights of the data and explore its hidden structure. The selected instances can also be used for data preprocessing tasks such as learning a low-dimensional embedding of the data points or computing a low-rank approximation of the corresponding matrix. This paper presents a fast and accurate greedy algorithm for large-scale column subset selection. The algorithm minimizes an objective function which measures the reconstruction error of the data matrix based on the subset of selected columns. The paper first presents a centralized greedy algorithm for column subset selection which depends on a novel recursive formula for calculating the reconstruction error of the data matrix. The paper then presents a MapReduce algorithm which selects a few representative columns from a matrix whose columns are massively distributed across several commodity machines. The algorithm first learns a concise representation of all columns using random projection, and it then solves a generalized column subset selection problem at each machine in which a subset of columns are selected from the sub-matrix on that machine such that the reconstruction error of the concise representation is minimized. The paper demonstrates the effectiveness and efficiency of the proposed algorithm through an empirical evaluation on benchmark data sets.
1302.4888
Yue Shi
Yue Shi, Martha Larson, Alan Hanjalic
Exploiting Social Tags for Cross-Domain Collaborative Filtering
Manuscript under review
null
null
null
cs.IR cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
One of the most challenging problems in recommender systems based on the collaborative filtering (CF) concept is data sparseness, i.e., limited user preference data is available for making recommendations. Cross-domain collaborative filtering (CDCF) has been studied as an effective mechanism to alleviate data sparseness of one domain using the knowledge about user preferences from other domains. A key question to be answered in the context of CDCF is what common characteristics can be deployed to link different domains for effective knowledge transfer. In this paper, we assess the usefulness of user-contributed (social) tags in this respect. We do so by means of the Generalized Tag-induced Cross-domain Collaborative Filtering (GTagCDCF) approach that we propose in this paper and that we developed based on the general collective matrix factorization framework. Assessment is done by a series of experiments, using publicly available CF datasets that represent three cross-domain cases, i.e., two two-domain cases and one three-domain case. A comparative analysis on two-domain cases involving GTagCDCF and several state-of-the-art CDCF approaches indicates the increased benefit of using social tags as representatives of explicit links between domains for CDCF as compared to the implicit links deployed by the existing CDCF methods. In addition, we show that users from different domains can already benefit from GTagCDCF if they only share a few common tags. Finally, we use the three-domain case to validate the robustness of GTagCDCF with respect to the scale of datasets and the varying number of domains.
[ { "version": "v1", "created": "Wed, 20 Feb 2013 12:37:33 GMT" }, { "version": "v2", "created": "Tue, 24 Dec 2013 16:03:11 GMT" } ]
2013-12-25T00:00:00
[ [ "Shi", "Yue", "" ], [ "Larson", "Martha", "" ], [ "Hanjalic", "Alan", "" ] ]
TITLE: Exploiting Social Tags for Cross-Domain Collaborative Filtering ABSTRACT: One of the most challenging problems in recommender systems based on the collaborative filtering (CF) concept is data sparseness, i.e., limited user preference data is available for making recommendations. Cross-domain collaborative filtering (CDCF) has been studied as an effective mechanism to alleviate data sparseness of one domain using the knowledge about user preferences from other domains. A key question to be answered in the context of CDCF is what common characteristics can be deployed to link different domains for effective knowledge transfer. In this paper, we assess the usefulness of user-contributed (social) tags in this respect. We do so by means of the Generalized Tag-induced Cross-domain Collaborative Filtering (GTagCDCF) approach that we propose in this paper and that we developed based on the general collective matrix factorization framework. Assessment is done by a series of experiments, using publicly available CF datasets that represent three cross-domain cases, i.e., two two-domain cases and one three-domain case. A comparative analysis on two-domain cases involving GTagCDCF and several state-of-the-art CDCF approaches indicates the increased benefit of using social tags as representatives of explicit links between domains for CDCF as compared to the implicit links deployed by the existing CDCF methods. In addition, we show that users from different domains can already benefit from GTagCDCF if they only share a few common tags. Finally, we use the three-domain case to validate the robustness of GTagCDCF with respect to the scale of datasets and the varying number of domains.
1312.6488
Zheng Li
Zheng Li and Liam O'Brien and Rajiv Ranjan and Miranda Zhang
Early Observations on Performance of Google Compute Engine for Scientific Computing
Proceedings of the 5th International Conference on Cloud Computing Technologies and Science (CloudCom 2013), pp. 1-8, Bristol, UK, December 2-5, 2013
null
10.1109/CloudCom.2013.7
null
cs.DC cs.MS cs.NA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Although Cloud computing emerged for business applications in industry, public Cloud services have been widely accepted and encouraged for scientific computing in academia. The recently available Google Compute Engine (GCE) is claimed to support high-performance and computationally intensive tasks, while little evaluation studies can be found to reveal GCE's scientific capabilities. Considering that fundamental performance benchmarking is the strategy of early-stage evaluation of new Cloud services, we followed the Cloud Evaluation Experiment Methodology (CEEM) to benchmark GCE and also compare it with Amazon EC2, to help understand the elementary capability of GCE for dealing with scientific problems. The experimental results and analyses show both potential advantages of, and possible threats to applying GCE to scientific computing. For example, compared to Amazon's EC2 service, GCE may better suit applications that require frequent disk operations, while it may not be ready yet for single VM-based parallel computing. Following the same evaluation methodology, different evaluators can replicate and/or supplement this fundamental evaluation of GCE. Based on the fundamental evaluation results, suitable GCE environments can be further established for case studies of solving real science problems.
[ { "version": "v1", "created": "Mon, 23 Dec 2013 09:12:09 GMT" } ]
2013-12-25T00:00:00
[ [ "Li", "Zheng", "" ], [ "O'Brien", "Liam", "" ], [ "Ranjan", "Rajiv", "" ], [ "Zhang", "Miranda", "" ] ]
TITLE: Early Observations on Performance of Google Compute Engine for Scientific Computing ABSTRACT: Although Cloud computing emerged for business applications in industry, public Cloud services have been widely accepted and encouraged for scientific computing in academia. The recently available Google Compute Engine (GCE) is claimed to support high-performance and computationally intensive tasks, while little evaluation studies can be found to reveal GCE's scientific capabilities. Considering that fundamental performance benchmarking is the strategy of early-stage evaluation of new Cloud services, we followed the Cloud Evaluation Experiment Methodology (CEEM) to benchmark GCE and also compare it with Amazon EC2, to help understand the elementary capability of GCE for dealing with scientific problems. The experimental results and analyses show both potential advantages of, and possible threats to applying GCE to scientific computing. For example, compared to Amazon's EC2 service, GCE may better suit applications that require frequent disk operations, while it may not be ready yet for single VM-based parallel computing. Following the same evaluation methodology, different evaluators can replicate and/or supplement this fundamental evaluation of GCE. Based on the fundamental evaluation results, suitable GCE environments can be further established for case studies of solving real science problems.
1312.6723
Bruce Berriman
G. Bruce Berriman, Ewa Deelman, John Good, Gideon Juve, Jamie Kinney, Ann Merrihew, and Mats Rynge
Creating A Galactic Plane Atlas With Amazon Web Services
7 pages, 1 table, 2 figures. Submitted to IEEE Special Edition on Computing in Astronomy
null
null
null
astro-ph.IM cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper describes by example how astronomers can use cloud-computing resources offered by Amazon Web Services (AWS) to create new datasets at scale. We have created from existing surveys an atlas of the Galactic Plane at 16 wavelengths from 1 {\mu}m to 24 {\mu}m with pixels co-registered at spatial sampling of 1 arcsec. We explain how open source tools support management and operation of a virtual cluster on AWS platforms to process data at scale, and describe the technical issues that users will need to consider, such as optimization of resources, resource costs, and management of virtual machine instances.
[ { "version": "v1", "created": "Tue, 24 Dec 2013 00:10:27 GMT" } ]
2013-12-25T00:00:00
[ [ "Berriman", "G. Bruce", "" ], [ "Deelman", "Ewa", "" ], [ "Good", "John", "" ], [ "Juve", "Gideon", "" ], [ "Kinney", "Jamie", "" ], [ "Merrihew", "Ann", "" ], [ "Rynge", "Mats", "" ] ]
TITLE: Creating A Galactic Plane Atlas With Amazon Web Services ABSTRACT: This paper describes by example how astronomers can use cloud-computing resources offered by Amazon Web Services (AWS) to create new datasets at scale. We have created from existing surveys an atlas of the Galactic Plane at 16 wavelengths from 1 {\mu}m to 24 {\mu}m with pixels co-registered at spatial sampling of 1 arcsec. We explain how open source tools support management and operation of a virtual cluster on AWS platforms to process data at scale, and describe the technical issues that users will need to consider, such as optimization of resources, resource costs, and management of virtual machine instances.
1312.6807
Feng Xia
Fengqi Li, Chuang Yu, Nanhai Yang, Feng Xia, Guangming Li, Fatemeh Kaveh-Yazdy
Iterative Nearest Neighborhood Oversampling in Semisupervised Learning from Imbalanced Data
null
The Scientific World Journal, Volume 2013, Article ID 875450, 2013
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Transductive graph-based semi-supervised learning methods usually build an undirected graph utilizing both labeled and unlabeled samples as vertices. Those methods propagate label information of labeled samples to neighbors through their edges in order to get the predicted labels of unlabeled samples. Most popular semi-supervised learning approaches are sensitive to initial label distribution happened in imbalanced labeled datasets. The class boundary will be severely skewed by the majority classes in an imbalanced classification. In this paper, we proposed a simple and effective approach to alleviate the unfavorable influence of imbalance problem by iteratively selecting a few unlabeled samples and adding them into the minority classes to form a balanced labeled dataset for the learning methods afterwards. The experiments on UCI datasets and MNIST handwritten digits dataset showed that the proposed approach outperforms other existing state-of-art methods.
[ { "version": "v1", "created": "Tue, 24 Dec 2013 12:24:30 GMT" } ]
2013-12-25T00:00:00
[ [ "Li", "Fengqi", "" ], [ "Yu", "Chuang", "" ], [ "Yang", "Nanhai", "" ], [ "Xia", "Feng", "" ], [ "Li", "Guangming", "" ], [ "Kaveh-Yazdy", "Fatemeh", "" ] ]
TITLE: Iterative Nearest Neighborhood Oversampling in Semisupervised Learning from Imbalanced Data ABSTRACT: Transductive graph-based semi-supervised learning methods usually build an undirected graph utilizing both labeled and unlabeled samples as vertices. Those methods propagate label information of labeled samples to neighbors through their edges in order to get the predicted labels of unlabeled samples. Most popular semi-supervised learning approaches are sensitive to initial label distribution happened in imbalanced labeled datasets. The class boundary will be severely skewed by the majority classes in an imbalanced classification. In this paper, we proposed a simple and effective approach to alleviate the unfavorable influence of imbalance problem by iteratively selecting a few unlabeled samples and adding them into the minority classes to form a balanced labeled dataset for the learning methods afterwards. The experiments on UCI datasets and MNIST handwritten digits dataset showed that the proposed approach outperforms other existing state-of-art methods.
1312.6826
Leizer Teran
Leizer Teran, Philippos Mordohai
3D Interest Point Detection via Discriminative Learning
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The task of detecting the interest points in 3D meshes has typically been handled by geometric methods. These methods, while greatly describing human preference, can be ill-equipped for handling the variety and subjectivity in human responses. Different tasks have different requirements for interest point detection; some tasks may necessitate high precision while other tasks may require high recall. Sometimes points with high curvature may be desirable, while in other cases high curvature may be an indication of noise. Geometric methods lack the required flexibility to adapt to such changes. As a consequence, interest point detection seems to be well suited for machine learning methods that can be trained to match the criteria applied on the annotated training data. In this paper, we formulate interest point detection as a supervised binary classification problem using a random forest as our classifier. Among other challenges, we are faced with an imbalanced learning problem due to the substantial difference in the priors between interest and non-interest points. We address this by re-sampling the training set. We validate the accuracy of our method and compare our results to those of five state of the art methods on a new, standard benchmark.
[ { "version": "v1", "created": "Tue, 24 Dec 2013 14:35:15 GMT" } ]
2013-12-25T00:00:00
[ [ "Teran", "Leizer", "" ], [ "Mordohai", "Philippos", "" ] ]
TITLE: 3D Interest Point Detection via Discriminative Learning ABSTRACT: The task of detecting the interest points in 3D meshes has typically been handled by geometric methods. These methods, while greatly describing human preference, can be ill-equipped for handling the variety and subjectivity in human responses. Different tasks have different requirements for interest point detection; some tasks may necessitate high precision while other tasks may require high recall. Sometimes points with high curvature may be desirable, while in other cases high curvature may be an indication of noise. Geometric methods lack the required flexibility to adapt to such changes. As a consequence, interest point detection seems to be well suited for machine learning methods that can be trained to match the criteria applied on the annotated training data. In this paper, we formulate interest point detection as a supervised binary classification problem using a random forest as our classifier. Among other challenges, we are faced with an imbalanced learning problem due to the substantial difference in the priors between interest and non-interest points. We address this by re-sampling the training set. We validate the accuracy of our method and compare our results to those of five state of the art methods on a new, standard benchmark.
1307.3811
Weifeng Liu
Weifeng Liu, Dacheng Tao, Jun Cheng, and Yuanyan Tang
Multiview Hessian Discriminative Sparse Coding for Image Annotation
35 pages
Computer vision and image understanding,118(2014) 50-60
null
null
cs.MM cs.CV cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Sparse coding represents a signal sparsely by using an overcomplete dictionary, and obtains promising performance in practical computer vision applications, especially for signal restoration tasks such as image denoising and image inpainting. In recent years, many discriminative sparse coding algorithms have been developed for classification problems, but they cannot naturally handle visual data represented by multiview features. In addition, existing sparse coding algorithms use graph Laplacian to model the local geometry of the data distribution. It has been identified that Laplacian regularization biases the solution towards a constant function which possibly leads to poor extrapolating power. In this paper, we present multiview Hessian discriminative sparse coding (mHDSC) which seamlessly integrates Hessian regularization with discriminative sparse coding for multiview learning problems. In particular, mHDSC exploits Hessian regularization to steer the solution which varies smoothly along geodesics in the manifold, and treats the label information as an additional view of feature for incorporating the discriminative power for image annotation. We conduct extensive experiments on PASCAL VOC'07 dataset and demonstrate the effectiveness of mHDSC for image annotation.
[ { "version": "v1", "created": "Mon, 15 Jul 2013 03:14:05 GMT" } ]
2013-12-24T00:00:00
[ [ "Liu", "Weifeng", "" ], [ "Tao", "Dacheng", "" ], [ "Cheng", "Jun", "" ], [ "Tang", "Yuanyan", "" ] ]
TITLE: Multiview Hessian Discriminative Sparse Coding for Image Annotation ABSTRACT: Sparse coding represents a signal sparsely by using an overcomplete dictionary, and obtains promising performance in practical computer vision applications, especially for signal restoration tasks such as image denoising and image inpainting. In recent years, many discriminative sparse coding algorithms have been developed for classification problems, but they cannot naturally handle visual data represented by multiview features. In addition, existing sparse coding algorithms use graph Laplacian to model the local geometry of the data distribution. It has been identified that Laplacian regularization biases the solution towards a constant function which possibly leads to poor extrapolating power. In this paper, we present multiview Hessian discriminative sparse coding (mHDSC) which seamlessly integrates Hessian regularization with discriminative sparse coding for multiview learning problems. In particular, mHDSC exploits Hessian regularization to steer the solution which varies smoothly along geodesics in the manifold, and treats the label information as an additional view of feature for incorporating the discriminative power for image annotation. We conduct extensive experiments on PASCAL VOC'07 dataset and demonstrate the effectiveness of mHDSC for image annotation.
1312.4740
Yalong Bai
Yalong Bai, Kuiyuan Yang, Wei Yu, Wei-Ying Ma, Tiejun Zhao
Learning High-level Image Representation for Image Retrieval via Multi-Task DNN using Clickthrough Data
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Image retrieval refers to finding relevant images from an image database for a query, which is considered difficult for the gap between low-level representation of images and high-level representation of queries. Recently further developed Deep Neural Network sheds light on automatically learning high-level image representation from raw pixels. In this paper, we proposed a multi-task DNN learned for image retrieval, which contains two parts, i.e., query-sharing layers for image representation computation and query-specific layers for relevance estimation. The weights of multi-task DNN are learned on clickthrough data by Ring Training. Experimental results on both simulated and real dataset show the effectiveness of the proposed method.
[ { "version": "v1", "created": "Tue, 17 Dec 2013 12:11:04 GMT" }, { "version": "v2", "created": "Sat, 21 Dec 2013 00:47:19 GMT" } ]
2013-12-24T00:00:00
[ [ "Bai", "Yalong", "" ], [ "Yang", "Kuiyuan", "" ], [ "Yu", "Wei", "" ], [ "Ma", "Wei-Ying", "" ], [ "Zhao", "Tiejun", "" ] ]
TITLE: Learning High-level Image Representation for Image Retrieval via Multi-Task DNN using Clickthrough Data ABSTRACT: Image retrieval refers to finding relevant images from an image database for a query, which is considered difficult for the gap between low-level representation of images and high-level representation of queries. Recently further developed Deep Neural Network sheds light on automatically learning high-level image representation from raw pixels. In this paper, we proposed a multi-task DNN learned for image retrieval, which contains two parts, i.e., query-sharing layers for image representation computation and query-specific layers for relevance estimation. The weights of multi-task DNN are learned on clickthrough data by Ring Training. Experimental results on both simulated and real dataset show the effectiveness of the proposed method.
1312.6122
James Bagrow
James P. Bagrow, Suma Desu, Morgan R. Frank, Narine Manukyan, Lewis Mitchell, Andrew Reagan, Eric E. Bloedorn, Lashon B. Booker, Luther K. Branting, Michael J. Smith, Brian F. Tivnan, Christopher M. Danforth, Peter S. Dodds, Joshua C. Bongard
Shadow networks: Discovering hidden nodes with models of information flow
12 pages, 3 figures
null
null
null
physics.soc-ph cond-mat.dis-nn cs.SI physics.data-an
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Complex, dynamic networks underlie many systems, and understanding these networks is the concern of a great span of important scientific and engineering problems. Quantitative description is crucial for this understanding yet, due to a range of measurement problems, many real network datasets are incomplete. Here we explore how accidentally missing or deliberately hidden nodes may be detected in networks by the effect of their absence on predictions of the speed with which information flows through the network. We use Symbolic Regression (SR) to learn models relating information flow to network topology. These models show localized, systematic, and non-random discrepancies when applied to test networks with intentionally masked nodes, demonstrating the ability to detect the presence of missing nodes and where in the network those nodes are likely to reside.
[ { "version": "v1", "created": "Fri, 20 Dec 2013 21:00:01 GMT" } ]
2013-12-24T00:00:00
[ [ "Bagrow", "James P.", "" ], [ "Desu", "Suma", "" ], [ "Frank", "Morgan R.", "" ], [ "Manukyan", "Narine", "" ], [ "Mitchell", "Lewis", "" ], [ "Reagan", "Andrew", "" ], [ "Bloedorn", "Eric E.", "" ], [ "Booker", "Lashon B.", "" ], [ "Branting", "Luther K.", "" ], [ "Smith", "Michael J.", "" ], [ "Tivnan", "Brian F.", "" ], [ "Danforth", "Christopher M.", "" ], [ "Dodds", "Peter S.", "" ], [ "Bongard", "Joshua C.", "" ] ]
TITLE: Shadow networks: Discovering hidden nodes with models of information flow ABSTRACT: Complex, dynamic networks underlie many systems, and understanding these networks is the concern of a great span of important scientific and engineering problems. Quantitative description is crucial for this understanding yet, due to a range of measurement problems, many real network datasets are incomplete. Here we explore how accidentally missing or deliberately hidden nodes may be detected in networks by the effect of their absence on predictions of the speed with which information flows through the network. We use Symbolic Regression (SR) to learn models relating information flow to network topology. These models show localized, systematic, and non-random discrepancies when applied to test networks with intentionally masked nodes, demonstrating the ability to detect the presence of missing nodes and where in the network those nodes are likely to reside.
1312.6180
Weifeng Liu
W. Liu, H. Liu, D.Tao, Y. Wang, K. Lu
Manifold regularized kernel logistic regression for web image annotation
submitted to Neurocomputing
null
null
null
cs.LG cs.MM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
With the rapid advance of Internet technology and smart devices, users often need to manage large amounts of multimedia information using smart devices, such as personal image and video accessing and browsing. These requirements heavily rely on the success of image (video) annotation, and thus large scale image annotation through innovative machine learning methods has attracted intensive attention in recent years. One representative work is support vector machine (SVM). Although it works well in binary classification, SVM has a non-smooth loss function and can not naturally cover multi-class case. In this paper, we propose manifold regularized kernel logistic regression (KLR) for web image annotation. Compared to SVM, KLR has the following advantages: (1) the KLR has a smooth loss function; (2) the KLR produces an explicit estimate of the probability instead of class label; and (3) the KLR can naturally be generalized to the multi-class case. We carefully conduct experiments on MIR FLICKR dataset and demonstrate the effectiveness of manifold regularized kernel logistic regression for image annotation.
[ { "version": "v1", "created": "Sat, 21 Dec 2013 00:32:24 GMT" } ]
2013-12-24T00:00:00
[ [ "Liu", "W.", "" ], [ "Liu", "H.", "" ], [ "Tao", "D.", "" ], [ "Wang", "Y.", "" ], [ "Lu", "K.", "" ] ]
TITLE: Manifold regularized kernel logistic regression for web image annotation ABSTRACT: With the rapid advance of Internet technology and smart devices, users often need to manage large amounts of multimedia information using smart devices, such as personal image and video accessing and browsing. These requirements heavily rely on the success of image (video) annotation, and thus large scale image annotation through innovative machine learning methods has attracted intensive attention in recent years. One representative work is support vector machine (SVM). Although it works well in binary classification, SVM has a non-smooth loss function and can not naturally cover multi-class case. In this paper, we propose manifold regularized kernel logistic regression (KLR) for web image annotation. Compared to SVM, KLR has the following advantages: (1) the KLR has a smooth loss function; (2) the KLR produces an explicit estimate of the probability instead of class label; and (3) the KLR can naturally be generalized to the multi-class case. We carefully conduct experiments on MIR FLICKR dataset and demonstrate the effectiveness of manifold regularized kernel logistic regression for image annotation.
1312.6182
Weifeng Liu
W. Liu, H. Zhang, D. Tao, Y. Wang, K. Lu
Large-Scale Paralleled Sparse Principal Component Analysis
submitted to Multimedia Tools and Applications
null
null
null
cs.MS cs.LG cs.NA stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Principal component analysis (PCA) is a statistical technique commonly used in multivariate data analysis. However, PCA can be difficult to interpret and explain since the principal components (PCs) are linear combinations of the original variables. Sparse PCA (SPCA) aims to balance statistical fidelity and interpretability by approximating sparse PCs whose projections capture the maximal variance of original data. In this paper we present an efficient and paralleled method of SPCA using graphics processing units (GPUs), which can process large blocks of data in parallel. Specifically, we construct parallel implementations of the four optimization formulations of the generalized power method of SPCA (GP-SPCA), one of the most efficient and effective SPCA approaches, on a GPU. The parallel GPU implementation of GP-SPCA (using CUBLAS) is up to eleven times faster than the corresponding CPU implementation (using CBLAS), and up to 107 times faster than a MatLab implementation. Extensive comparative experiments in several real-world datasets confirm that SPCA offers a practical advantage.
[ { "version": "v1", "created": "Sat, 21 Dec 2013 00:38:02 GMT" } ]
2013-12-24T00:00:00
[ [ "Liu", "W.", "" ], [ "Zhang", "H.", "" ], [ "Tao", "D.", "" ], [ "Wang", "Y.", "" ], [ "Lu", "K.", "" ] ]
TITLE: Large-Scale Paralleled Sparse Principal Component Analysis ABSTRACT: Principal component analysis (PCA) is a statistical technique commonly used in multivariate data analysis. However, PCA can be difficult to interpret and explain since the principal components (PCs) are linear combinations of the original variables. Sparse PCA (SPCA) aims to balance statistical fidelity and interpretability by approximating sparse PCs whose projections capture the maximal variance of original data. In this paper we present an efficient and paralleled method of SPCA using graphics processing units (GPUs), which can process large blocks of data in parallel. Specifically, we construct parallel implementations of the four optimization formulations of the generalized power method of SPCA (GP-SPCA), one of the most efficient and effective SPCA approaches, on a GPU. The parallel GPU implementation of GP-SPCA (using CUBLAS) is up to eleven times faster than the corresponding CPU implementation (using CBLAS), and up to 107 times faster than a MatLab implementation. Extensive comparative experiments in several real-world datasets confirm that SPCA offers a practical advantage.
1312.6246
John Levine
John Levine, Graeme Ritchie, Alastair Andrew and Simon Gates
New Results for the Heterogeneous Multi-Processor Scheduling Problem using a Fast, Effective Local Search and Random Disruption
6 pages. Proceedings of PlanSIG 2012, Teeside University, December 2012
null
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The efficient scheduling of independent computational tasks in a heterogeneous computing environment is an important problem that occurs in domains such as Grid and Cloud computing. Finding optimal schedules is an NP-hard problem in general, so we have to rely on approximate algorithms to come up schedules that are as near to optimal as possible. In our previous work on this problem, we applied a fast, effective local search to generate reasonably good schedules in a short amount of time and used ant colony optimisation (ACO) to incrementally improve those schedules over a longer time period. In this work, we replace the ACO component with a random disruption algorithm and find that this produces results which are competitive with the current state of the art over a 90 second execution time. We also ran our algorithm for a longer time period on 12 well-known benchmark instances and as a result provide new upper bounds for these instances.
[ { "version": "v1", "created": "Sat, 21 Dec 2013 11:52:21 GMT" } ]
2013-12-24T00:00:00
[ [ "Levine", "John", "" ], [ "Ritchie", "Graeme", "" ], [ "Andrew", "Alastair", "" ], [ "Gates", "Simon", "" ] ]
TITLE: New Results for the Heterogeneous Multi-Processor Scheduling Problem using a Fast, Effective Local Search and Random Disruption ABSTRACT: The efficient scheduling of independent computational tasks in a heterogeneous computing environment is an important problem that occurs in domains such as Grid and Cloud computing. Finding optimal schedules is an NP-hard problem in general, so we have to rely on approximate algorithms to come up schedules that are as near to optimal as possible. In our previous work on this problem, we applied a fast, effective local search to generate reasonably good schedules in a short amount of time and used ant colony optimisation (ACO) to incrementally improve those schedules over a longer time period. In this work, we replace the ACO component with a random disruption algorithm and find that this produces results which are competitive with the current state of the art over a 90 second execution time. We also ran our algorithm for a longer time period on 12 well-known benchmark instances and as a result provide new upper bounds for these instances.
1312.6293
Jerome Darmont
Jaume Ferrarons (ERIC), Mulu Adhana (ERIC), Carlos Colmenares (ERIC), Sandra Pietrowska (ERIC), Fadila Bentayeb (ERIC), J\'er\^ome Darmont (ERIC)
PRIMEBALL: a Parallel Processing Framework Benchmark for Big Data Applications in the Cloud
5th TPC Technology Conference on Performance Evaluation and Benchmarking (VLDB/TPCTC 13), Riva del Garda : Italy (2013)
null
null
null
cs.DC cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we draw the specifications of a novel benchmark for comparing parallel processing frameworks in the context of big data applications hosted in the cloud. We aim at filling several gaps in already existing cloud data processing benchmarks, which lack a real-life context for their processes, thus losing relevance when trying to assess performance for real applications. Hence, we propose a fictitious news site hosted in the cloud that is to be managed by the framework under analysis, together with several objective use case scenarios and measures for evaluating system performance. The main strengths of our benchmark are parallelization capabilities supporting cloud features and big data properties.
[ { "version": "v1", "created": "Sat, 21 Dec 2013 19:15:22 GMT" } ]
2013-12-24T00:00:00
[ [ "Ferrarons", "Jaume", "", "ERIC" ], [ "Adhana", "Mulu", "", "ERIC" ], [ "Colmenares", "Carlos", "", "ERIC" ], [ "Pietrowska", "Sandra", "", "ERIC" ], [ "Bentayeb", "Fadila", "", "ERIC" ], [ "Darmont", "Jérôme", "", "ERIC" ] ]
TITLE: PRIMEBALL: a Parallel Processing Framework Benchmark for Big Data Applications in the Cloud ABSTRACT: In this paper, we draw the specifications of a novel benchmark for comparing parallel processing frameworks in the context of big data applications hosted in the cloud. We aim at filling several gaps in already existing cloud data processing benchmarks, which lack a real-life context for their processes, thus losing relevance when trying to assess performance for real applications. Hence, we propose a fictitious news site hosted in the cloud that is to be managed by the framework under analysis, together with several objective use case scenarios and measures for evaluating system performance. The main strengths of our benchmark are parallelization capabilities supporting cloud features and big data properties.
1312.6335
Sen Pei
Sen Pei, Hernan A. Makse
Spreading dynamics in complex networks
23 pages, 2 figures
Journal of Statistical Mechanics: Theory and Experiment 2013 (12), P12002
10.1088/1742-5468/2013/12/P12002
null
physics.soc-ph cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Searching for influential spreaders in complex networks is an issue of great significance for applications across various domains, ranging from the epidemic control, innovation diffusion, viral marketing, social movement to idea propagation. In this paper, we first display some of the most important theoretical models that describe spreading processes, and then discuss the problem of locating both the individual and multiple influential spreaders respectively. Recent approaches in these two topics are presented. For the identification of privileged single spreaders, we summarize several widely used centralities, such as degree, betweenness centrality, PageRank, k-shell, etc. We investigate the empirical diffusion data in a large scale online social community -- LiveJournal. With this extensive dataset, we find that various measures can convey very distinct information of nodes. Of all the users in LiveJournal social network, only a small fraction of them involve in spreading. For the spreading processes in LiveJournal, while degree can locate nodes participating in information diffusion with higher probability, k-shell is more effective in finding nodes with large influence. Our results should provide useful information for designing efficient spreading strategies in reality.
[ { "version": "v1", "created": "Sun, 22 Dec 2013 02:55:36 GMT" } ]
2013-12-24T00:00:00
[ [ "Pei", "Sen", "" ], [ "Makse", "Hernan A.", "" ] ]
TITLE: Spreading dynamics in complex networks ABSTRACT: Searching for influential spreaders in complex networks is an issue of great significance for applications across various domains, ranging from the epidemic control, innovation diffusion, viral marketing, social movement to idea propagation. In this paper, we first display some of the most important theoretical models that describe spreading processes, and then discuss the problem of locating both the individual and multiple influential spreaders respectively. Recent approaches in these two topics are presented. For the identification of privileged single spreaders, we summarize several widely used centralities, such as degree, betweenness centrality, PageRank, k-shell, etc. We investigate the empirical diffusion data in a large scale online social community -- LiveJournal. With this extensive dataset, we find that various measures can convey very distinct information of nodes. Of all the users in LiveJournal social network, only a small fraction of them involve in spreading. For the spreading processes in LiveJournal, while degree can locate nodes participating in information diffusion with higher probability, k-shell is more effective in finding nodes with large influence. Our results should provide useful information for designing efficient spreading strategies in reality.
1312.6635
Hamed Haddadi
Shana Dacres, Hamed Haddadi, Matthew Purver
Topic and Sentiment Analysis on OSNs: a Case Study of Advertising Strategies on Twitter
null
null
null
null
cs.SI physics.soc-ph
http://creativecommons.org/licenses/by/3.0/
Social media have substantially altered the way brands and businesses advertise: Online Social Networks provide brands with more versatile and dynamic channels for advertisement than traditional media (e.g., TV and radio). Levels of engagement in such media are usually measured in terms of content adoption (e.g., likes and retweets) and sentiment, around a given topic. However, sentiment analysis and topic identification are both non-trivial tasks. In this paper, using data collected from Twitter as a case study, we analyze how engagement and sentiment in promoted content spread over a 10-day period. We find that promoted tweets lead to higher positive sentiment than promoted trends; although promoted trends pay off in response volume. We observe that levels of engagement for the brand and promoted content are highest on the first day of the campaign, and fall considerably thereafter. However, we show that these insights depend on the use of robust machine learning and natural language processing techniques to gather focused, relevant datasets, and to accurately gauge sentiment, rather than relying on the simple keyword- or frequency-based metrics sometimes used in social media research.
[ { "version": "v1", "created": "Mon, 23 Dec 2013 18:32:06 GMT" } ]
2013-12-24T00:00:00
[ [ "Dacres", "Shana", "" ], [ "Haddadi", "Hamed", "" ], [ "Purver", "Matthew", "" ] ]
TITLE: Topic and Sentiment Analysis on OSNs: a Case Study of Advertising Strategies on Twitter ABSTRACT: Social media have substantially altered the way brands and businesses advertise: Online Social Networks provide brands with more versatile and dynamic channels for advertisement than traditional media (e.g., TV and radio). Levels of engagement in such media are usually measured in terms of content adoption (e.g., likes and retweets) and sentiment, around a given topic. However, sentiment analysis and topic identification are both non-trivial tasks. In this paper, using data collected from Twitter as a case study, we analyze how engagement and sentiment in promoted content spread over a 10-day period. We find that promoted tweets lead to higher positive sentiment than promoted trends; although promoted trends pay off in response volume. We observe that levels of engagement for the brand and promoted content are highest on the first day of the campaign, and fall considerably thereafter. However, we show that these insights depend on the use of robust machine learning and natural language processing techniques to gather focused, relevant datasets, and to accurately gauge sentiment, rather than relying on the simple keyword- or frequency-based metrics sometimes used in social media research.
1210.0481
Todd Veldhuizen
Todd L. Veldhuizen
Leapfrog Triejoin: a worst-case optimal join algorithm
null
null
null
LB1201
cs.DB cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recent years have seen exciting developments in join algorithms. In 2008, Atserias, Grohe and Marx (henceforth AGM) proved a tight bound on the maximum result size of a full conjunctive query, given constraints on the input relation sizes. In 2012, Ngo, Porat, R{\'e} and Rudra (henceforth NPRR) devised a join algorithm with worst-case running time proportional to the AGM bound. Our commercial Datalog system LogicBlox employs a novel join algorithm, \emph{leapfrog triejoin}, which compared conspicuously well to the NPRR algorithm in preliminary benchmarks. This spurred us to analyze the complexity of leapfrog triejoin. In this paper we establish that leapfrog triejoin is also worst-case optimal, up to a log factor, in the sense of NPRR. We improve on the results of NPRR by proving that leapfrog triejoin achieves worst-case optimality for finer-grained classes of database instances, such as those defined by constraints on projection cardinalities. We show that NPRR is \emph{not} worst-case optimal for such classes, giving a counterexample where leapfrog triejoin runs in $O(n \log n)$ time, compared to $\Theta(n^{1.375})$ time for NPRR. On a practical note, leapfrog triejoin can be implemented using conventional data structures such as B-trees, and extends naturally to $\exists_1$ queries. We believe our algorithm offers a useful addition to the existing toolbox of join algorithms, being easy to absorb, simple to implement, and having a concise optimality proof.
[ { "version": "v1", "created": "Mon, 1 Oct 2012 17:54:13 GMT" }, { "version": "v2", "created": "Thu, 4 Oct 2012 14:12:27 GMT" }, { "version": "v3", "created": "Fri, 22 Mar 2013 00:10:44 GMT" }, { "version": "v4", "created": "Sat, 7 Sep 2013 13:43:24 GMT" }, { "version": "v5", "created": "Fri, 20 Dec 2013 20:21:03 GMT" } ]
2013-12-23T00:00:00
[ [ "Veldhuizen", "Todd L.", "" ] ]
TITLE: Leapfrog Triejoin: a worst-case optimal join algorithm ABSTRACT: Recent years have seen exciting developments in join algorithms. In 2008, Atserias, Grohe and Marx (henceforth AGM) proved a tight bound on the maximum result size of a full conjunctive query, given constraints on the input relation sizes. In 2012, Ngo, Porat, R{\'e} and Rudra (henceforth NPRR) devised a join algorithm with worst-case running time proportional to the AGM bound. Our commercial Datalog system LogicBlox employs a novel join algorithm, \emph{leapfrog triejoin}, which compared conspicuously well to the NPRR algorithm in preliminary benchmarks. This spurred us to analyze the complexity of leapfrog triejoin. In this paper we establish that leapfrog triejoin is also worst-case optimal, up to a log factor, in the sense of NPRR. We improve on the results of NPRR by proving that leapfrog triejoin achieves worst-case optimality for finer-grained classes of database instances, such as those defined by constraints on projection cardinalities. We show that NPRR is \emph{not} worst-case optimal for such classes, giving a counterexample where leapfrog triejoin runs in $O(n \log n)$ time, compared to $\Theta(n^{1.375})$ time for NPRR. On a practical note, leapfrog triejoin can be implemented using conventional data structures such as B-trees, and extends naturally to $\exists_1$ queries. We believe our algorithm offers a useful addition to the existing toolbox of join algorithms, being easy to absorb, simple to implement, and having a concise optimality proof.
1310.5842
Jianbin Fang
Jianbin Fang, Ana Lucia Varbanescu, Henk Sips, Lilun Zhang, Yonggang Che, Chuanfu Xu
An Empirical Study of Intel Xeon Phi
null
null
null
null
cs.DC cs.PF
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
With at least 50 cores, Intel Xeon Phi is a true many-core architecture. Featuring fairly powerful cores, two cache levels, and very fast interconnections, the Xeon Phi can get a theoretical peak of 1000 GFLOPs and over 240 GB/s. These numbers, as well as its flexibility - it can be used both as a coprocessor or as a stand-alone processor - are very tempting for parallel applications looking for new performance records. In this paper, we present an empirical study of Xeon Phi, stressing its performance limits and relevant performance factors, ultimately aiming to present a simplified view of the machine for regular programmers in search for performance. To do so, we have micro-benchmarked the main hardware components of the processor - the cores, the memory hierarchies, the ring interconnect, and the PCIe connection. We show that, in ideal microbenchmarking conditions, the performance that can be achieved is very close to the theoretical peak, as given in the official programmer's guide. We have also identified and quantified several causes for significant performance penalties. Our findings have been captured in four optimization guidelines, and used to build a simplified programmer's view of Xeon Phi, eventually enable the design and prototyping of applications on a functionality-based model of the architecture.
[ { "version": "v1", "created": "Tue, 22 Oct 2013 08:53:15 GMT" }, { "version": "v2", "created": "Fri, 20 Dec 2013 09:05:07 GMT" } ]
2013-12-23T00:00:00
[ [ "Fang", "Jianbin", "" ], [ "Varbanescu", "Ana Lucia", "" ], [ "Sips", "Henk", "" ], [ "Zhang", "Lilun", "" ], [ "Che", "Yonggang", "" ], [ "Xu", "Chuanfu", "" ] ]
TITLE: An Empirical Study of Intel Xeon Phi ABSTRACT: With at least 50 cores, Intel Xeon Phi is a true many-core architecture. Featuring fairly powerful cores, two cache levels, and very fast interconnections, the Xeon Phi can get a theoretical peak of 1000 GFLOPs and over 240 GB/s. These numbers, as well as its flexibility - it can be used both as a coprocessor or as a stand-alone processor - are very tempting for parallel applications looking for new performance records. In this paper, we present an empirical study of Xeon Phi, stressing its performance limits and relevant performance factors, ultimately aiming to present a simplified view of the machine for regular programmers in search for performance. To do so, we have micro-benchmarked the main hardware components of the processor - the cores, the memory hierarchies, the ring interconnect, and the PCIe connection. We show that, in ideal microbenchmarking conditions, the performance that can be achieved is very close to the theoretical peak, as given in the official programmer's guide. We have also identified and quantified several causes for significant performance penalties. Our findings have been captured in four optimization guidelines, and used to build a simplified programmer's view of Xeon Phi, eventually enable the design and prototyping of applications on a functionality-based model of the architecture.
1312.5697
Andrew Rabinovich
Samy Bengio, Jeff Dean, Dumitru Erhan, Eugene Ie, Quoc Le, Andrew Rabinovich, Jonathon Shlens, Yoram Singer
Using Web Co-occurrence Statistics for Improving Image Categorization
null
null
null
null
cs.CV cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Object recognition and localization are important tasks in computer vision. The focus of this work is the incorporation of contextual information in order to improve object recognition and localization. For instance, it is natural to expect not to see an elephant to appear in the middle of an ocean. We consider a simple approach to encapsulate such common sense knowledge using co-occurrence statistics from web documents. By merely counting the number of times nouns (such as elephants, sharks, oceans, etc.) co-occur in web documents, we obtain a good estimate of expected co-occurrences in visual data. We then cast the problem of combining textual co-occurrence statistics with the predictions of image-based classifiers as an optimization problem. The resulting optimization problem serves as a surrogate for our inference procedure. Albeit the simplicity of the resulting optimization problem, it is effective in improving both recognition and localization accuracy. Concretely, we observe significant improvements in recognition and localization rates for both ImageNet Detection 2012 and Sun 2012 datasets.
[ { "version": "v1", "created": "Thu, 19 Dec 2013 18:53:47 GMT" }, { "version": "v2", "created": "Fri, 20 Dec 2013 18:12:16 GMT" } ]
2013-12-23T00:00:00
[ [ "Bengio", "Samy", "" ], [ "Dean", "Jeff", "" ], [ "Erhan", "Dumitru", "" ], [ "Ie", "Eugene", "" ], [ "Le", "Quoc", "" ], [ "Rabinovich", "Andrew", "" ], [ "Shlens", "Jonathon", "" ], [ "Singer", "Yoram", "" ] ]
TITLE: Using Web Co-occurrence Statistics for Improving Image Categorization ABSTRACT: Object recognition and localization are important tasks in computer vision. The focus of this work is the incorporation of contextual information in order to improve object recognition and localization. For instance, it is natural to expect not to see an elephant to appear in the middle of an ocean. We consider a simple approach to encapsulate such common sense knowledge using co-occurrence statistics from web documents. By merely counting the number of times nouns (such as elephants, sharks, oceans, etc.) co-occur in web documents, we obtain a good estimate of expected co-occurrences in visual data. We then cast the problem of combining textual co-occurrence statistics with the predictions of image-based classifiers as an optimization problem. The resulting optimization problem serves as a surrogate for our inference procedure. Albeit the simplicity of the resulting optimization problem, it is effective in improving both recognition and localization accuracy. Concretely, we observe significant improvements in recognition and localization rates for both ImageNet Detection 2012 and Sun 2012 datasets.
1312.6024
Yusuf Artan
Yusuf Artan, Peter Paul
Occupancy Detection in Vehicles Using Fisher Vector Image Representation
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Due to the high volume of traffic on modern roadways, transportation agencies have proposed High Occupancy Vehicle (HOV) lanes and High Occupancy Tolling (HOT) lanes to promote car pooling. However, enforcement of the rules of these lanes is currently performed by roadside enforcement officers using visual observation. Manual roadside enforcement is known to be inefficient, costly, potentially dangerous, and ultimately ineffective. Violation rates up to 50%-80% have been reported, while manual enforcement rates of less than 10% are typical. Therefore, there is a need for automated vehicle occupancy detection to support HOV/HOT lane enforcement. A key component of determining vehicle occupancy is to determine whether or not the vehicle's front passenger seat is occupied. In this paper, we examine two methods of determining vehicle front seat occupancy using a near infrared (NIR) camera system pointed at the vehicle's front windshield. The first method examines a state-of-the-art deformable part model (DPM) based face detection system that is robust to facial pose. The second method examines state-of- the-art local aggregation based image classification using bag-of-visual-words (BOW) and Fisher vectors (FV). A dataset of 3000 images was collected on a public roadway and is used to perform the comparison. From these experiments it is clear that the image classification approach is superior for this problem.
[ { "version": "v1", "created": "Fri, 20 Dec 2013 16:37:46 GMT" } ]
2013-12-23T00:00:00
[ [ "Artan", "Yusuf", "" ], [ "Paul", "Peter", "" ] ]
TITLE: Occupancy Detection in Vehicles Using Fisher Vector Image Representation ABSTRACT: Due to the high volume of traffic on modern roadways, transportation agencies have proposed High Occupancy Vehicle (HOV) lanes and High Occupancy Tolling (HOT) lanes to promote car pooling. However, enforcement of the rules of these lanes is currently performed by roadside enforcement officers using visual observation. Manual roadside enforcement is known to be inefficient, costly, potentially dangerous, and ultimately ineffective. Violation rates up to 50%-80% have been reported, while manual enforcement rates of less than 10% are typical. Therefore, there is a need for automated vehicle occupancy detection to support HOV/HOT lane enforcement. A key component of determining vehicle occupancy is to determine whether or not the vehicle's front passenger seat is occupied. In this paper, we examine two methods of determining vehicle front seat occupancy using a near infrared (NIR) camera system pointed at the vehicle's front windshield. The first method examines a state-of-the-art deformable part model (DPM) based face detection system that is robust to facial pose. The second method examines state-of- the-art local aggregation based image classification using bag-of-visual-words (BOW) and Fisher vectors (FV). A dataset of 3000 images was collected on a public roadway and is used to perform the comparison. From these experiments it is clear that the image classification approach is superior for this problem.
1312.6061
Timoteo Carletti
Floriana Gargiulo and Timoteo Carletti
Driving forces in researchers mobility
null
null
null
null
physics.soc-ph cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Starting from the dataset of the publication corpus of the APS during the period 1955-2009, we reconstruct the individual researchers trajectories, namely the list of the consecutive affiliations for each scholar. Crossing this information with different geographic datasets we embed these trajectories in a spatial framework. Using methods from network theory and complex systems analysis we characterise these patterns in terms of topological network properties and we analyse the dependence of an academic path across different dimensions: the distance between two subsequent positions, the relative importance of the institutions (in terms of number of publications) and some socio-cultural traits. We show that distance is not always a good predictor for the next affiliation while other factors like "the previous steps" of the career of the researchers (in particular the first position) or the linguistic and historical similarity between two countries can have an important impact. Finally we show that the dataset exhibit a memory effect, hence the fate of a career strongly depends from the first two affiliations.
[ { "version": "v1", "created": "Fri, 20 Dec 2013 18:07:10 GMT" } ]
2013-12-23T00:00:00
[ [ "Gargiulo", "Floriana", "" ], [ "Carletti", "Timoteo", "" ] ]
TITLE: Driving forces in researchers mobility ABSTRACT: Starting from the dataset of the publication corpus of the APS during the period 1955-2009, we reconstruct the individual researchers trajectories, namely the list of the consecutive affiliations for each scholar. Crossing this information with different geographic datasets we embed these trajectories in a spatial framework. Using methods from network theory and complex systems analysis we characterise these patterns in terms of topological network properties and we analyse the dependence of an academic path across different dimensions: the distance between two subsequent positions, the relative importance of the institutions (in terms of number of publications) and some socio-cultural traits. We show that distance is not always a good predictor for the next affiliation while other factors like "the previous steps" of the career of the researchers (in particular the first position) or the linguistic and historical similarity between two countries can have an important impact. Finally we show that the dataset exhibit a memory effect, hence the fate of a career strongly depends from the first two affiliations.
1312.5394
Michael S. Gashler Ph.D.
Michael S. Gashler, Michael R. Smith, Richard Morris, Tony Martinez
Missing Value Imputation With Unsupervised Backpropagation
null
null
null
null
cs.NE cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Many data mining and data analysis techniques operate on dense matrices or complete tables of data. Real-world data sets, however, often contain unknown values. Even many classification algorithms that are designed to operate with missing values still exhibit deteriorated accuracy. One approach to handling missing values is to fill in (impute) the missing values. In this paper, we present a technique for unsupervised learning called Unsupervised Backpropagation (UBP), which trains a multi-layer perceptron to fit to the manifold sampled by a set of observed point-vectors. We evaluate UBP with the task of imputing missing values in datasets, and show that UBP is able to predict missing values with significantly lower sum-squared error than other collaborative filtering and imputation techniques. We also demonstrate with 24 datasets and 9 supervised learning algorithms that classification accuracy is usually higher when randomly-withheld values are imputed using UBP, rather than with other methods.
[ { "version": "v1", "created": "Thu, 19 Dec 2013 02:38:40 GMT" } ]
2013-12-20T00:00:00
[ [ "Gashler", "Michael S.", "" ], [ "Smith", "Michael R.", "" ], [ "Morris", "Richard", "" ], [ "Martinez", "Tony", "" ] ]
TITLE: Missing Value Imputation With Unsupervised Backpropagation ABSTRACT: Many data mining and data analysis techniques operate on dense matrices or complete tables of data. Real-world data sets, however, often contain unknown values. Even many classification algorithms that are designed to operate with missing values still exhibit deteriorated accuracy. One approach to handling missing values is to fill in (impute) the missing values. In this paper, we present a technique for unsupervised learning called Unsupervised Backpropagation (UBP), which trains a multi-layer perceptron to fit to the manifold sampled by a set of observed point-vectors. We evaluate UBP with the task of imputing missing values in datasets, and show that UBP is able to predict missing values with significantly lower sum-squared error than other collaborative filtering and imputation techniques. We also demonstrate with 24 datasets and 9 supervised learning algorithms that classification accuracy is usually higher when randomly-withheld values are imputed using UBP, rather than with other methods.
1312.5568
Martin Kleinsteuber
Xian Wei, Hao Shen, Martin Kleinsteuber
An Adaptive Dictionary Learning Approach for Modeling Dynamical Textures
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Video representation is an important and challenging task in the computer vision community. In this paper, we assume that image frames of a moving scene can be modeled as a Linear Dynamical System. We propose a sparse coding framework, named adaptive video dictionary learning (AVDL), to model a video adaptively. The developed framework is able to capture the dynamics of a moving scene by exploring both sparse properties and the temporal correlations of consecutive video frames. The proposed method is compared with state of the art video processing methods on several benchmark data sequences, which exhibit appearance changes and heavy occlusions.
[ { "version": "v1", "created": "Thu, 19 Dec 2013 14:41:29 GMT" } ]
2013-12-20T00:00:00
[ [ "Wei", "Xian", "" ], [ "Shen", "Hao", "" ], [ "Kleinsteuber", "Martin", "" ] ]
TITLE: An Adaptive Dictionary Learning Approach for Modeling Dynamical Textures ABSTRACT: Video representation is an important and challenging task in the computer vision community. In this paper, we assume that image frames of a moving scene can be modeled as a Linear Dynamical System. We propose a sparse coding framework, named adaptive video dictionary learning (AVDL), to model a video adaptively. The developed framework is able to capture the dynamics of a moving scene by exploring both sparse properties and the temporal correlations of consecutive video frames. The proposed method is compared with state of the art video processing methods on several benchmark data sequences, which exhibit appearance changes and heavy occlusions.
1312.5670
Tim Vines
Timothy Vines, Arianne Albert, Rose Andrew, Florence Debarr\'e, Dan Bock, Michelle Franklin, Kimberley Gilbert, Jean-S\'ebastien Moore, S\'ebastien Renaut, Diana J. Rennison
The availability of research data declines rapidly with article age
14 pages, 2 figures
null
10.1016/j.cub.2013.11.014
null
cs.DL physics.soc-ph q-bio.PE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Policies ensuring that research data are available on public archives are increasingly being implemented at the government [1], funding agency [2-4], and journal [5,6] level. These policies are predicated on the idea that authors are poor stewards of their data, particularly over the long term [7], and indeed many studies have found that authors are often unable or unwilling to share their data [8-11]. However, there are no systematic estimates of how the availability of research data changes with time since publication. We therefore requested datasets from a relatively homogenous set of 516 articles published between 2 and 22 years ago, and found that availability of the data was strongly affected by article age. For papers where the authors gave the status of their data, the odds of a dataset being extant fell by 17% per year. In addition, the odds that we could find a working email address for the first, last or corresponding author fell by 7% per year. Our results reinforce the notion that, in the long term, research data cannot be reliably preserved by individual researchers, and further demonstrate the urgent need for policies mandating data sharing via public archives.
[ { "version": "v1", "created": "Thu, 19 Dec 2013 17:57:53 GMT" } ]
2013-12-20T00:00:00
[ [ "Vines", "Timothy", "" ], [ "Albert", "Arianne", "" ], [ "Andrew", "Rose", "" ], [ "Debarré", "Florence", "" ], [ "Bock", "Dan", "" ], [ "Franklin", "Michelle", "" ], [ "Gilbert", "Kimberley", "" ], [ "Moore", "Jean-Sébastien", "" ], [ "Renaut", "Sébastien", "" ], [ "Rennison", "Diana J.", "" ] ]
TITLE: The availability of research data declines rapidly with article age ABSTRACT: Policies ensuring that research data are available on public archives are increasingly being implemented at the government [1], funding agency [2-4], and journal [5,6] level. These policies are predicated on the idea that authors are poor stewards of their data, particularly over the long term [7], and indeed many studies have found that authors are often unable or unwilling to share their data [8-11]. However, there are no systematic estimates of how the availability of research data changes with time since publication. We therefore requested datasets from a relatively homogenous set of 516 articles published between 2 and 22 years ago, and found that availability of the data was strongly affected by article age. For papers where the authors gave the status of their data, the odds of a dataset being extant fell by 17% per year. In addition, the odds that we could find a working email address for the first, last or corresponding author fell by 7% per year. Our results reinforce the notion that, in the long term, research data cannot be reliably preserved by individual researchers, and further demonstrate the urgent need for policies mandating data sharing via public archives.
1312.5673
Xin-She Yang
Xin-She Yang
Flower Pollination Algorithm for Global Optimization
10 pages
Unconventional Computation and Natural Computation 2012, Lecture Notes in Computer Science, Vol. 7445, pp. 240-249 (2012)
10.1007/978-3-642-32894-7_27
null
math.OC cs.NE nlin.AO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Flower pollination is an intriguing process in the natural world. Its evolutionary characteristics can be used to design new optimization algorithms. In this paper, we propose a new algorithm, namely, flower pollination algorithm, inspired by the pollination process of flowers. We first use ten test functions to validate the new algorithm, and compare its performance with genetic algorithms and particle swarm optimization. Our simulation results show the flower algorithm is more efficient than both GA and PSO. We also use the flower algorithm to solve a nonlinear design benchmark, which shows the convergence rate is almost exponential.
[ { "version": "v1", "created": "Thu, 19 Dec 2013 18:02:39 GMT" } ]
2013-12-20T00:00:00
[ [ "Yang", "Xin-She", "" ] ]
TITLE: Flower Pollination Algorithm for Global Optimization ABSTRACT: Flower pollination is an intriguing process in the natural world. Its evolutionary characteristics can be used to design new optimization algorithms. In this paper, we propose a new algorithm, namely, flower pollination algorithm, inspired by the pollination process of flowers. We first use ten test functions to validate the new algorithm, and compare its performance with genetic algorithms and particle swarm optimization. Our simulation results show the flower algorithm is more efficient than both GA and PSO. We also use the flower algorithm to solve a nonlinear design benchmark, which shows the convergence rate is almost exponential.
1312.5691
Wei Zhang
Wei Zhang, Olivier Tardieu, David Grove, Benjamin Herta, Tomio Kamada, Vijay Saraswat, Mikio Takeuchi
GLB: Lifeline-based Global Load Balancing library in X10
null
null
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present GLB, a programming model and an associated implementation that can handle a wide range of irregular paral- lel programming problems running over large-scale distributed systems. GLB is applicable both to problems that are easily load-balanced via static scheduling and to problems that are hard to statically load balance. GLB hides the intricate syn- chronizations (e.g., inter-node communication, initialization and startup, load balancing, termination and result collection) from the users. GLB internally uses a version of the lifeline graph based work-stealing algorithm proposed by Saraswat et al. Users of GLB are simply required to write several pieces of sequential code that comply with the GLB interface. GLB then schedules and orchestrates the parallel execution of the code correctly and efficiently at scale. We have applied GLB to two representative benchmarks: Betweenness Centrality (BC) and Unbalanced Tree Search (UTS). Among them, BC can be statically load-balanced whereas UTS cannot. In either case, GLB scales well-- achieving nearly linear speedup on different computer architectures (Power, Blue Gene/Q, and K) -- up to 16K cores.
[ { "version": "v1", "created": "Thu, 19 Dec 2013 18:46:00 GMT" } ]
2013-12-20T00:00:00
[ [ "Zhang", "Wei", "" ], [ "Tardieu", "Olivier", "" ], [ "Grove", "David", "" ], [ "Herta", "Benjamin", "" ], [ "Kamada", "Tomio", "" ], [ "Saraswat", "Vijay", "" ], [ "Takeuchi", "Mikio", "" ] ]
TITLE: GLB: Lifeline-based Global Load Balancing library in X10 ABSTRACT: We present GLB, a programming model and an associated implementation that can handle a wide range of irregular paral- lel programming problems running over large-scale distributed systems. GLB is applicable both to problems that are easily load-balanced via static scheduling and to problems that are hard to statically load balance. GLB hides the intricate syn- chronizations (e.g., inter-node communication, initialization and startup, load balancing, termination and result collection) from the users. GLB internally uses a version of the lifeline graph based work-stealing algorithm proposed by Saraswat et al. Users of GLB are simply required to write several pieces of sequential code that comply with the GLB interface. GLB then schedules and orchestrates the parallel execution of the code correctly and efficiently at scale. We have applied GLB to two representative benchmarks: Betweenness Centrality (BC) and Unbalanced Tree Search (UTS). Among them, BC can be statically load-balanced whereas UTS cannot. In either case, GLB scales well-- achieving nearly linear speedup on different computer architectures (Power, Blue Gene/Q, and K) -- up to 16K cores.
1312.5734
Andrew Lan
Andrew S. Lan, Christoph Studer and Richard G. Baraniuk
Time-varying Learning and Content Analytics via Sparse Factor Analysis
null
null
null
null
stat.ML cs.LG math.OC stat.AP
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose SPARFA-Trace, a new machine learning-based framework for time-varying learning and content analytics for education applications. We develop a novel message passing-based, blind, approximate Kalman filter for sparse factor analysis (SPARFA), that jointly (i) traces learner concept knowledge over time, (ii) analyzes learner concept knowledge state transitions (induced by interacting with learning resources, such as textbook sections, lecture videos, etc, or the forgetting effect), and (iii) estimates the content organization and intrinsic difficulty of the assessment questions. These quantities are estimated solely from binary-valued (correct/incorrect) graded learner response data and a summary of the specific actions each learner performs (e.g., answering a question or studying a learning resource) at each time instance. Experimental results on two online course datasets demonstrate that SPARFA-Trace is capable of tracing each learner's concept knowledge evolution over time, as well as analyzing the quality and content organization of learning resources, the question-concept associations, and the question intrinsic difficulties. Moreover, we show that SPARFA-Trace achieves comparable or better performance in predicting unobserved learner responses than existing collaborative filtering and knowledge tracing approaches for personalized education.
[ { "version": "v1", "created": "Thu, 19 Dec 2013 20:44:44 GMT" } ]
2013-12-20T00:00:00
[ [ "Lan", "Andrew S.", "" ], [ "Studer", "Christoph", "" ], [ "Baraniuk", "Richard G.", "" ] ]
TITLE: Time-varying Learning and Content Analytics via Sparse Factor Analysis ABSTRACT: We propose SPARFA-Trace, a new machine learning-based framework for time-varying learning and content analytics for education applications. We develop a novel message passing-based, blind, approximate Kalman filter for sparse factor analysis (SPARFA), that jointly (i) traces learner concept knowledge over time, (ii) analyzes learner concept knowledge state transitions (induced by interacting with learning resources, such as textbook sections, lecture videos, etc, or the forgetting effect), and (iii) estimates the content organization and intrinsic difficulty of the assessment questions. These quantities are estimated solely from binary-valued (correct/incorrect) graded learner response data and a summary of the specific actions each learner performs (e.g., answering a question or studying a learning resource) at each time instance. Experimental results on two online course datasets demonstrate that SPARFA-Trace is capable of tracing each learner's concept knowledge evolution over time, as well as analyzing the quality and content organization of learning resources, the question-concept associations, and the question intrinsic difficulties. Moreover, we show that SPARFA-Trace achieves comparable or better performance in predicting unobserved learner responses than existing collaborative filtering and knowledge tracing approaches for personalized education.
1312.5021
Zhen Qin
Zhen Qin, Vaclav Petricek, Nikos Karampatziakis, Lihong Li, John Langford
Efficient Online Bootstrapping for Large Scale Learning
5 pages, appeared at Big Learning Workshop at Neural Information Processing Systems 2013
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Bootstrapping is a useful technique for estimating the uncertainty of a predictor, for example, confidence intervals for prediction. It is typically used on small to moderate sized datasets, due to its high computation cost. This work describes a highly scalable online bootstrapping strategy, implemented inside Vowpal Wabbit, that is several times faster than traditional strategies. Our experiments indicate that, in addition to providing a black box-like method for estimating uncertainty, our implementation of online bootstrapping may also help to train models with better prediction performance due to model averaging.
[ { "version": "v1", "created": "Wed, 18 Dec 2013 02:10:21 GMT" } ]
2013-12-19T00:00:00
[ [ "Qin", "Zhen", "" ], [ "Petricek", "Vaclav", "" ], [ "Karampatziakis", "Nikos", "" ], [ "Li", "Lihong", "" ], [ "Langford", "John", "" ] ]
TITLE: Efficient Online Bootstrapping for Large Scale Learning ABSTRACT: Bootstrapping is a useful technique for estimating the uncertainty of a predictor, for example, confidence intervals for prediction. It is typically used on small to moderate sized datasets, due to its high computation cost. This work describes a highly scalable online bootstrapping strategy, implemented inside Vowpal Wabbit, that is several times faster than traditional strategies. Our experiments indicate that, in addition to providing a black box-like method for estimating uncertainty, our implementation of online bootstrapping may also help to train models with better prediction performance due to model averaging.
1312.5105
David Garcia Soriano
Francesco Bonchi, David Garc\'ia-Soriano, Konstantin Kutzkov
Local correlation clustering
null
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Correlation clustering is perhaps the most natural formulation of clustering. Given $n$ objects and a pairwise similarity measure, the goal is to cluster the objects so that, to the best possible extent, similar objects are put in the same cluster and dissimilar objects are put in different clusters. Despite its theoretical appeal, the practical relevance of correlation clustering still remains largely unexplored, mainly due to the fact that correlation clustering requires the $\Theta(n^2)$ pairwise similarities as input. In this paper we initiate the investigation into \emph{local} algorithms for correlation clustering. In \emph{local correlation clustering} we are given the identifier of a single object and we want to return the cluster to which it belongs in some globally consistent near-optimal clustering, using a small number of similarity queries. Local algorithms for correlation clustering open the door to \emph{sublinear-time} algorithms, which are particularly useful when the similarity between items is costly to compute, as it is often the case in many practical application domains. They also imply $(i)$ distributed and streaming clustering algorithms, $(ii)$ constant-time estimators and testers for cluster edit distance, and $(iii)$ property-preserving parallel reconstruction algorithms for clusterability. Specifically, we devise a local clustering algorithm attaining a $(3, \varepsilon)$-approximation in time $O(1/\varepsilon^2)$ independently of the dataset size. An explicit approximate clustering for all objects can be produced in time $O(n/\varepsilon)$ (which is provably optimal). We also provide a fully additive $(1,\varepsilon)$-approximation with local query complexity $poly(1/\varepsilon)$ and time complexity $2^{poly(1/\varepsilon)}$. The latter yields the fastest polynomial-time approximation scheme for correlation clustering known to date.
[ { "version": "v1", "created": "Wed, 18 Dec 2013 12:04:10 GMT" } ]
2013-12-19T00:00:00
[ [ "Bonchi", "Francesco", "" ], [ "García-Soriano", "David", "" ], [ "Kutzkov", "Konstantin", "" ] ]
TITLE: Local correlation clustering ABSTRACT: Correlation clustering is perhaps the most natural formulation of clustering. Given $n$ objects and a pairwise similarity measure, the goal is to cluster the objects so that, to the best possible extent, similar objects are put in the same cluster and dissimilar objects are put in different clusters. Despite its theoretical appeal, the practical relevance of correlation clustering still remains largely unexplored, mainly due to the fact that correlation clustering requires the $\Theta(n^2)$ pairwise similarities as input. In this paper we initiate the investigation into \emph{local} algorithms for correlation clustering. In \emph{local correlation clustering} we are given the identifier of a single object and we want to return the cluster to which it belongs in some globally consistent near-optimal clustering, using a small number of similarity queries. Local algorithms for correlation clustering open the door to \emph{sublinear-time} algorithms, which are particularly useful when the similarity between items is costly to compute, as it is often the case in many practical application domains. They also imply $(i)$ distributed and streaming clustering algorithms, $(ii)$ constant-time estimators and testers for cluster edit distance, and $(iii)$ property-preserving parallel reconstruction algorithms for clusterability. Specifically, we devise a local clustering algorithm attaining a $(3, \varepsilon)$-approximation in time $O(1/\varepsilon^2)$ independently of the dataset size. An explicit approximate clustering for all objects can be produced in time $O(n/\varepsilon)$ (which is provably optimal). We also provide a fully additive $(1,\varepsilon)$-approximation with local query complexity $poly(1/\varepsilon)$ and time complexity $2^{poly(1/\varepsilon)}$. The latter yields the fastest polynomial-time approximation scheme for correlation clustering known to date.
1312.5124
Paul Fogel
Paul Fogel
Permuted NMF: A Simple Algorithm Intended to Minimize the Volume of the Score Matrix
null
null
null
null
stat.AP cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Non-Negative Matrix Factorization, NMF, attempts to find a number of archetypal response profiles, or parts, such that any sample profile in the dataset can be approximated by a close profile among these archetypes or a linear combination of these profiles. The non-negativity constraint is imposed while estimating archetypal profiles, due to the non-negative nature of the observed signal. Apart from non negativity, a volume constraint can be applied on the Score matrix W to enhance the ability of learning parts of NMF. In this report, we describe a very simple algorithm, which in effect achieves volume minimization, although indirectly.
[ { "version": "v1", "created": "Wed, 18 Dec 2013 13:13:39 GMT" } ]
2013-12-19T00:00:00
[ [ "Fogel", "Paul", "" ] ]
TITLE: Permuted NMF: A Simple Algorithm Intended to Minimize the Volume of the Score Matrix ABSTRACT: Non-Negative Matrix Factorization, NMF, attempts to find a number of archetypal response profiles, or parts, such that any sample profile in the dataset can be approximated by a close profile among these archetypes or a linear combination of these profiles. The non-negativity constraint is imposed while estimating archetypal profiles, due to the non-negative nature of the observed signal. Apart from non negativity, a volume constraint can be applied on the Score matrix W to enhance the ability of learning parts of NMF. In this report, we describe a very simple algorithm, which in effect achieves volume minimization, although indirectly.
1204.3210
Olivier Delestre
Olivier Delestre (JAD), St\'ephane Cordier (MAPMO), Fr\'ed\'eric Darboux (USS), Mingxuan Du, Francois James (MAPMO), Christian Laguerre (MAPMO), Carine Lucas (MAPMO), Olivier Planchon (IRD)
FullSWOF: A software for overland flow simulation / FullSWOF : un logiciel pour la simulation du ruissellement
9 pages
Advances in Hydroinformatics - SIMHYDRO 2012 - New Frontiers of Simulation, Gourbesville, P.; Cunge, J. and Caignaert, G. (Ed.) (2014) 221-231
10.1007/978-981-4451-42-0_19
null
math.NA cs.CE cs.NA math.AP
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Overland flow on agricultural fields may have some undesirable effects such as soil erosion, flood and pollutant transport. To better understand this phenomenon and limit its consequences, we developed a code using state-of-the-art numerical methods: FullSWOF (Full Shallow Water equations for Overland Flow), an object oriented code written in C++. It has been made open-source and can be downloaded from http://www.univ-orleans.fr/mapmo/soft/FullSWOF/. The model is based on the classical system of Shallow Water (SW) (or Saint-Venant system). Numerical difficulties come from the numerous dry/wet transitions and the highly-variable topography encountered inside a field. It includes runon and rainfall inputs, infiltration (modified Green-Ampt equation), friction (Darcy-Weisbach and Manning formulas). First we present the numerical method for the resolution of the Shallow Water equations integrated in FullSWOF_2D (the two-dimension version). This method is based on hydrostatic reconstruction scheme, coupled with a semi-implicit friction term treatment. FullSWOF_2D has been previously validated using analytical solutions from the SWASHES library (Shallow Water Analytic Solutions for Hydraulic and Environmental Studies). Finally, FullSWOF_2D is run on a real topography measured on a runoff plot located in Thies (Senegal). Simulation results are compared with measured data. This experimental benchmark demonstrate the capabilities of FullSWOF to simulate adequately overland flow. FullSWOF could also be used for other environmental issues, such as river floods and dam-breaks.
[ { "version": "v1", "created": "Sat, 14 Apr 2012 20:27:19 GMT" }, { "version": "v2", "created": "Thu, 27 Sep 2012 19:36:01 GMT" } ]
2013-12-18T00:00:00
[ [ "Delestre", "Olivier", "", "JAD" ], [ "Cordier", "Stéphane", "", "MAPMO" ], [ "Darboux", "Frédéric", "", "USS" ], [ "Du", "Mingxuan", "", "MAPMO" ], [ "James", "Francois", "", "MAPMO" ], [ "Laguerre", "Christian", "", "MAPMO" ], [ "Lucas", "Carine", "", "MAPMO" ], [ "Planchon", "Olivier", "", "IRD" ] ]
TITLE: FullSWOF: A software for overland flow simulation / FullSWOF : un logiciel pour la simulation du ruissellement ABSTRACT: Overland flow on agricultural fields may have some undesirable effects such as soil erosion, flood and pollutant transport. To better understand this phenomenon and limit its consequences, we developed a code using state-of-the-art numerical methods: FullSWOF (Full Shallow Water equations for Overland Flow), an object oriented code written in C++. It has been made open-source and can be downloaded from http://www.univ-orleans.fr/mapmo/soft/FullSWOF/. The model is based on the classical system of Shallow Water (SW) (or Saint-Venant system). Numerical difficulties come from the numerous dry/wet transitions and the highly-variable topography encountered inside a field. It includes runon and rainfall inputs, infiltration (modified Green-Ampt equation), friction (Darcy-Weisbach and Manning formulas). First we present the numerical method for the resolution of the Shallow Water equations integrated in FullSWOF_2D (the two-dimension version). This method is based on hydrostatic reconstruction scheme, coupled with a semi-implicit friction term treatment. FullSWOF_2D has been previously validated using analytical solutions from the SWASHES library (Shallow Water Analytic Solutions for Hydraulic and Environmental Studies). Finally, FullSWOF_2D is run on a real topography measured on a runoff plot located in Thies (Senegal). Simulation results are compared with measured data. This experimental benchmark demonstrate the capabilities of FullSWOF to simulate adequately overland flow. FullSWOF could also be used for other environmental issues, such as river floods and dam-breaks.
1312.3393
Masrour Zoghi
Masrour Zoghi, Shimon Whiteson, Remi Munos, Maarten de Rijke
Relative Upper Confidence Bound for the K-Armed Dueling Bandit Problem
13 pages, 6 figures
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper proposes a new method for the K-armed dueling bandit problem, a variation on the regular K-armed bandit problem that offers only relative feedback about pairs of arms. Our approach extends the Upper Confidence Bound algorithm to the relative setting by using estimates of the pairwise probabilities to select a promising arm and applying Upper Confidence Bound with the winner as a benchmark. We prove a finite-time regret bound of order O(log t). In addition, our empirical results using real data from an information retrieval application show that it greatly outperforms the state of the art.
[ { "version": "v1", "created": "Thu, 12 Dec 2013 03:08:46 GMT" }, { "version": "v2", "created": "Tue, 17 Dec 2013 10:30:42 GMT" } ]
2013-12-18T00:00:00
[ [ "Zoghi", "Masrour", "" ], [ "Whiteson", "Shimon", "" ], [ "Munos", "Remi", "" ], [ "de Rijke", "Maarten", "" ] ]
TITLE: Relative Upper Confidence Bound for the K-Armed Dueling Bandit Problem ABSTRACT: This paper proposes a new method for the K-armed dueling bandit problem, a variation on the regular K-armed bandit problem that offers only relative feedback about pairs of arms. Our approach extends the Upper Confidence Bound algorithm to the relative setting by using estimates of the pairwise probabilities to select a promising arm and applying Upper Confidence Bound with the winner as a benchmark. We prove a finite-time regret bound of order O(log t). In addition, our empirical results using real data from an information retrieval application show that it greatly outperforms the state of the art.
1312.4800
Thabet Slimani
Thabet Slimani
New Approach to Optimize the Time of Association Rules Extraction
10 pages, 6 figures
IJCSI International Journal of Computer Science Issues, Vol. 10, Issue 5, No 1, September 2013
null
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The knowledge discovery algorithms have become ineffective at the abundance of data and the need for fast algorithms or optimizing methods is required. To address this limitation, the objective of this work is to adapt a new method for optimizing the time of association rules extractions from large databases. Indeed, given a relational database (one relation) represented as a set of tuples, also called set of attributes, we transform the original database as a binary table (Bitmap table) containing binary numbers. Then, we use this Bitmap table to construct a data structure called Peano Tree stored as a binary file on which we apply a new algorithm called BF-ARM (extension of the well known Apriori algorithm). Since the database is loaded into a binary file, our proposed algorithm will traverse this file, and the processes of association rules extractions will be based on the file stored on disk. The BF-ARM algorithm is implemented and compared with Apriori, Apriori+ and RS-Rules+ algorithms. The evaluation process is based on three benchmarks (Mushroom, Car Evaluation and Adult). Our preliminary experimental results showed that our algorithm produces association rules with a minimum time compared to other algorithms.
[ { "version": "v1", "created": "Tue, 17 Dec 2013 14:30:38 GMT" } ]
2013-12-18T00:00:00
[ [ "Slimani", "Thabet", "" ] ]
TITLE: New Approach to Optimize the Time of Association Rules Extraction ABSTRACT: The knowledge discovery algorithms have become ineffective at the abundance of data and the need for fast algorithms or optimizing methods is required. To address this limitation, the objective of this work is to adapt a new method for optimizing the time of association rules extractions from large databases. Indeed, given a relational database (one relation) represented as a set of tuples, also called set of attributes, we transform the original database as a binary table (Bitmap table) containing binary numbers. Then, we use this Bitmap table to construct a data structure called Peano Tree stored as a binary file on which we apply a new algorithm called BF-ARM (extension of the well known Apriori algorithm). Since the database is loaded into a binary file, our proposed algorithm will traverse this file, and the processes of association rules extractions will be based on the file stored on disk. The BF-ARM algorithm is implemented and compared with Apriori, Apriori+ and RS-Rules+ algorithms. The evaluation process is based on three benchmarks (Mushroom, Car Evaluation and Adult). Our preliminary experimental results showed that our algorithm produces association rules with a minimum time compared to other algorithms.
1303.3990
Vladimir Gligorijevi\'c
Vladimir Gligorijevic
Master thesis: Growth and Self-Organization Processes in Directed Social Network
This paper has been withdrawn due to its incompleteness
null
null
null
physics.soc-ph cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Large dataset collected from Ubuntu chat channel is studied as a complex dynamical system with emergent collective behaviour of users. With the appropriate network mappings we examined wealthy topological structure of Ubuntu network. The structure of this network is determined by computing different topological measures. The directed, weighted network, which is a suitable representation of the dataset from Ubuntu chat channel is characterized with power law dependencies of various quantities, hierarchical organization and disassortative mixing patterns. Beyond the topological features, the emergent collective state is further quantified by analysis of time series of users activities driven by emotions. Analysis of time series reveals self-organized dynamics with long-range temporal correlations in user actions.
[ { "version": "v1", "created": "Sat, 16 Mar 2013 15:33:21 GMT" }, { "version": "v2", "created": "Wed, 20 Mar 2013 11:25:59 GMT" }, { "version": "v3", "created": "Sat, 14 Dec 2013 13:29:27 GMT" } ]
2013-12-17T00:00:00
[ [ "Gligorijevic", "Vladimir", "" ] ]
TITLE: Master thesis: Growth and Self-Organization Processes in Directed Social Network ABSTRACT: Large dataset collected from Ubuntu chat channel is studied as a complex dynamical system with emergent collective behaviour of users. With the appropriate network mappings we examined wealthy topological structure of Ubuntu network. The structure of this network is determined by computing different topological measures. The directed, weighted network, which is a suitable representation of the dataset from Ubuntu chat channel is characterized with power law dependencies of various quantities, hierarchical organization and disassortative mixing patterns. Beyond the topological features, the emergent collective state is further quantified by analysis of time series of users activities driven by emotions. Analysis of time series reveals self-organized dynamics with long-range temporal correlations in user actions.
1312.0086
Filomena Ferrucci
Filomena Ferrucci, M-Tahar Kechadi, Pasquale Salza, Federica Sarro
A Framework for Genetic Algorithms Based on Hadoop
null
null
null
null
cs.NE cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Genetic Algorithms (GAs) are powerful metaheuristic techniques mostly used in many real-world applications. The sequential execution of GAs requires considerable computational power both in time and resources. Nevertheless, GAs are naturally parallel and accessing a parallel platform such as Cloud is easy and cheap. Apache Hadoop is one of the common services that can be used for parallel applications. However, using Hadoop to develop a parallel version of GAs is not simple without facing its inner workings. Even though some sequential frameworks for GAs already exist, there is no framework supporting the development of GA applications that can be executed in parallel. In this paper is described a framework for parallel GAs on the Hadoop platform, following the paradigm of MapReduce. The main purpose of this framework is to allow the user to focus on the aspects of GA that are specific to the problem to be addressed, being sure that this task is going to be correctly executed on the Cloud with a good performance. The framework has been also exploited to develop an application for Feature Subset Selection problem. A preliminary analysis of the performance of the developed GA application has been performed using three datasets and shown very promising performance.
[ { "version": "v1", "created": "Sat, 30 Nov 2013 10:41:29 GMT" }, { "version": "v2", "created": "Sun, 15 Dec 2013 23:01:10 GMT" } ]
2013-12-17T00:00:00
[ [ "Ferrucci", "Filomena", "" ], [ "Kechadi", "M-Tahar", "" ], [ "Salza", "Pasquale", "" ], [ "Sarro", "Federica", "" ] ]
TITLE: A Framework for Genetic Algorithms Based on Hadoop ABSTRACT: Genetic Algorithms (GAs) are powerful metaheuristic techniques mostly used in many real-world applications. The sequential execution of GAs requires considerable computational power both in time and resources. Nevertheless, GAs are naturally parallel and accessing a parallel platform such as Cloud is easy and cheap. Apache Hadoop is one of the common services that can be used for parallel applications. However, using Hadoop to develop a parallel version of GAs is not simple without facing its inner workings. Even though some sequential frameworks for GAs already exist, there is no framework supporting the development of GA applications that can be executed in parallel. In this paper is described a framework for parallel GAs on the Hadoop platform, following the paradigm of MapReduce. The main purpose of this framework is to allow the user to focus on the aspects of GA that are specific to the problem to be addressed, being sure that this task is going to be correctly executed on the Cloud with a good performance. The framework has been also exploited to develop an application for Feature Subset Selection problem. A preliminary analysis of the performance of the developed GA application has been performed using three datasets and shown very promising performance.
1312.3971
Tommaso Urli
Tommaso Urli
Balancing bike sharing systems (BBSS): instance generation from the CitiBike NYC data
null
null
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Bike sharing systems are a very popular means to provide bikes to citizens in a simple and cheap way. The idea is to install bike stations at various points in the city, from which a registered user can easily loan a bike by removing it from a specialized rack. After the ride, the user may return the bike at any station (if there is a free rack). Services of this kind are mainly public or semi-public, often aimed at increasing the attractiveness of non-motorized means of transportation, and are usually free, or almost free, of charge for the users. Depending on their location, bike stations have specific patterns regarding when they are empty or full. For instance, in cities where most jobs are located near the city centre, the commuters cause certain peaks in the morning: the central bike stations are filled, while the stations in the outskirts are emptied. Furthermore, stations located on top of a hill are more likely to be empty, since users are less keen on cycling uphill to return the bike, and often leave their bike at a more reachable station. These issues result in substantial user dissatisfaction which may eventually cause the users to abandon the service. This is why nowadays most bike sharing system providers take measures to rebalance them. Over the last few years, balancing bike sharing systems (BBSS) has become increasingly studied in optimization. As such, generating meaningful instance to serve as a benchmark for the proposed approaches is an important task. In this technical report we describe the procedure we used to generate BBSS problem instances from data of the CitiBike NYC bike sharing system.
[ { "version": "v1", "created": "Fri, 13 Dec 2013 22:10:54 GMT" } ]
2013-12-17T00:00:00
[ [ "Urli", "Tommaso", "" ] ]
TITLE: Balancing bike sharing systems (BBSS): instance generation from the CitiBike NYC data ABSTRACT: Bike sharing systems are a very popular means to provide bikes to citizens in a simple and cheap way. The idea is to install bike stations at various points in the city, from which a registered user can easily loan a bike by removing it from a specialized rack. After the ride, the user may return the bike at any station (if there is a free rack). Services of this kind are mainly public or semi-public, often aimed at increasing the attractiveness of non-motorized means of transportation, and are usually free, or almost free, of charge for the users. Depending on their location, bike stations have specific patterns regarding when they are empty or full. For instance, in cities where most jobs are located near the city centre, the commuters cause certain peaks in the morning: the central bike stations are filled, while the stations in the outskirts are emptied. Furthermore, stations located on top of a hill are more likely to be empty, since users are less keen on cycling uphill to return the bike, and often leave their bike at a more reachable station. These issues result in substantial user dissatisfaction which may eventually cause the users to abandon the service. This is why nowadays most bike sharing system providers take measures to rebalance them. Over the last few years, balancing bike sharing systems (BBSS) has become increasingly studied in optimization. As such, generating meaningful instance to serve as a benchmark for the proposed approaches is an important task. In this technical report we describe the procedure we used to generate BBSS problem instances from data of the CitiBike NYC bike sharing system.
1312.4108
F. Ozgur Catak
Ferhat \"Ozg\"ur \c{C}atak, Mehmet Erdal Balaban
A MapReduce based distributed SVM algorithm for binary classification
19 Pages. arXiv admin note: text overlap with arXiv:1301.0082
null
null
null
cs.LG cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Although Support Vector Machine (SVM) algorithm has a high generalization property to classify for unseen examples after training phase and it has small loss value, the algorithm is not suitable for real-life classification and regression problems. SVMs cannot solve hundreds of thousands examples in training dataset. In previous studies on distributed machine learning algorithms, SVM is trained over a costly and preconfigured computer environment. In this research, we present a MapReduce based distributed parallel SVM training algorithm for binary classification problems. This work shows how to distribute optimization problem over cloud computing systems with MapReduce technique. In the second step of this work, we used statistical learning theory to find the predictive hypothesis that minimize our empirical risks from hypothesis spaces that created with reduce function of MapReduce. The results of this research are important for training of big datasets for SVM algorithm based classification problems. We provided that iterative training of split dataset with MapReduce technique; accuracy of the classifier function will converge to global optimal classifier function's accuracy in finite iteration size. The algorithm performance was measured on samples from letter recognition and pen-based recognition of handwritten digits dataset.
[ { "version": "v1", "created": "Sun, 15 Dec 2013 05:42:51 GMT" } ]
2013-12-17T00:00:00
[ [ "Çatak", "Ferhat Özgür", "" ], [ "Balaban", "Mehmet Erdal", "" ] ]
TITLE: A MapReduce based distributed SVM algorithm for binary classification ABSTRACT: Although Support Vector Machine (SVM) algorithm has a high generalization property to classify for unseen examples after training phase and it has small loss value, the algorithm is not suitable for real-life classification and regression problems. SVMs cannot solve hundreds of thousands examples in training dataset. In previous studies on distributed machine learning algorithms, SVM is trained over a costly and preconfigured computer environment. In this research, we present a MapReduce based distributed parallel SVM training algorithm for binary classification problems. This work shows how to distribute optimization problem over cloud computing systems with MapReduce technique. In the second step of this work, we used statistical learning theory to find the predictive hypothesis that minimize our empirical risks from hypothesis spaces that created with reduce function of MapReduce. The results of this research are important for training of big datasets for SVM algorithm based classification problems. We provided that iterative training of split dataset with MapReduce technique; accuracy of the classifier function will converge to global optimal classifier function's accuracy in finite iteration size. The algorithm performance was measured on samples from letter recognition and pen-based recognition of handwritten digits dataset.
1312.4132
Ahmad Mozaffari
Ahmad Mozaffari and Alireza Fathi
An introduction to synchronous self-learning Pareto strategy
17 pages, 7 figure, 3 table
null
null
null
cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In last decades optimization and control of complex systems that possessed various conflicted objectives simultaneously attracted an incremental interest of scientists. This is because of the vast applications of these systems in various fields of real life engineering phenomena that are generally multi modal, non convex and multi criterion. Hence, many researchers utilized versatile intelligent models such as Pareto based techniques, game theory (cooperative and non cooperative games), neuro evolutionary systems, fuzzy logic and advanced neural networks for handling these types of problems. In this paper a novel method called Synchronous Self Learning Pareto Strategy Algorithm (SSLPSA) is presented which utilizes Evolutionary Computing (EC), Swarm Intelligence (SI) techniques and adaptive Classical Self Organizing Map (CSOM) simultaneously incorporating with a data shuffling behavior. Evolutionary Algorithms (EA) which attempt to simulate the phenomenon of natural evolution are powerful numerical optimization algorithms that reach an approximate global maximum of a complex multi variable function over a wide search space and swarm base technique can improved the intensity and the robustness in EA. CSOM is a neural network capable of learning and can improve the quality of obtained optimal Pareto front. To prove the efficient performance of proposed algorithm, authors utilized some well known benchmark test functions. Obtained results indicate that the cited method is best suit in the case of vector optimization.
[ { "version": "v1", "created": "Sun, 15 Dec 2013 10:21:05 GMT" } ]
2013-12-17T00:00:00
[ [ "Mozaffari", "Ahmad", "" ], [ "Fathi", "Alireza", "" ] ]
TITLE: An introduction to synchronous self-learning Pareto strategy ABSTRACT: In last decades optimization and control of complex systems that possessed various conflicted objectives simultaneously attracted an incremental interest of scientists. This is because of the vast applications of these systems in various fields of real life engineering phenomena that are generally multi modal, non convex and multi criterion. Hence, many researchers utilized versatile intelligent models such as Pareto based techniques, game theory (cooperative and non cooperative games), neuro evolutionary systems, fuzzy logic and advanced neural networks for handling these types of problems. In this paper a novel method called Synchronous Self Learning Pareto Strategy Algorithm (SSLPSA) is presented which utilizes Evolutionary Computing (EC), Swarm Intelligence (SI) techniques and adaptive Classical Self Organizing Map (CSOM) simultaneously incorporating with a data shuffling behavior. Evolutionary Algorithms (EA) which attempt to simulate the phenomenon of natural evolution are powerful numerical optimization algorithms that reach an approximate global maximum of a complex multi variable function over a wide search space and swarm base technique can improved the intensity and the robustness in EA. CSOM is a neural network capable of learning and can improve the quality of obtained optimal Pareto front. To prove the efficient performance of proposed algorithm, authors utilized some well known benchmark test functions. Obtained results indicate that the cited method is best suit in the case of vector optimization.
1312.4209
Richard Davis
Richard Davis, Sanjay Chawla, Philip Leong
Feature Graph Architectures
9 pages, with 5 pages of supplementary material (appendices)
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this article we propose feature graph architectures (FGA), which are deep learning systems employing a structured initialisation and training method based on a feature graph which facilitates improved generalisation performance compared with a standard shallow architecture. The goal is to explore alternative perspectives on the problem of deep network training. We evaluate FGA performance for deep SVMs on some experimental datasets, and show how generalisation and stability results may be derived for these models. We describe the effect of permutations on the model accuracy, and give a criterion for the optimal permutation in terms of feature correlations. The experimental results show that the algorithm produces robust and significant test set improvements over a standard shallow SVM training method for a range of datasets. These gains are achieved with a moderate increase in time complexity.
[ { "version": "v1", "created": "Sun, 15 Dec 2013 23:40:49 GMT" } ]
2013-12-17T00:00:00
[ [ "Davis", "Richard", "" ], [ "Chawla", "Sanjay", "" ], [ "Leong", "Philip", "" ] ]
TITLE: Feature Graph Architectures ABSTRACT: In this article we propose feature graph architectures (FGA), which are deep learning systems employing a structured initialisation and training method based on a feature graph which facilitates improved generalisation performance compared with a standard shallow architecture. The goal is to explore alternative perspectives on the problem of deep network training. We evaluate FGA performance for deep SVMs on some experimental datasets, and show how generalisation and stability results may be derived for these models. We describe the effect of permutations on the model accuracy, and give a criterion for the optimal permutation in terms of feature correlations. The experimental results show that the algorithm produces robust and significant test set improvements over a standard shallow SVM training method for a range of datasets. These gains are achieved with a moderate increase in time complexity.
1312.4384
Eren Golge
Eren Golge and Pinar Duygulu
Rectifying Self Organizing Maps for Automatic Concept Learning from Web Images
present CVPR2014 submission
null
null
null
cs.CV cs.LG cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We attack the problem of learning concepts automatically from noisy web image search results. Going beyond low level attributes, such as colour and texture, we explore weakly-labelled datasets for the learning of higher level concepts, such as scene categories. The idea is based on discovering common characteristics shared among subsets of images by posing a method that is able to organise the data while eliminating irrelevant instances. We propose a novel clustering and outlier detection method, namely Rectifying Self Organizing Maps (RSOM). Given an image collection returned for a concept query, RSOM provides clusters pruned from outliers. Each cluster is used to train a model representing a different characteristics of the concept. The proposed method outperforms the state-of-the-art studies on the task of learning low-level concepts, and it is competitive in learning higher level concepts as well. It is capable to work at large scale with no supervision through exploiting the available sources.
[ { "version": "v1", "created": "Mon, 16 Dec 2013 14:51:00 GMT" } ]
2013-12-17T00:00:00
[ [ "Golge", "Eren", "" ], [ "Duygulu", "Pinar", "" ] ]
TITLE: Rectifying Self Organizing Maps for Automatic Concept Learning from Web Images ABSTRACT: We attack the problem of learning concepts automatically from noisy web image search results. Going beyond low level attributes, such as colour and texture, we explore weakly-labelled datasets for the learning of higher level concepts, such as scene categories. The idea is based on discovering common characteristics shared among subsets of images by posing a method that is able to organise the data while eliminating irrelevant instances. We propose a novel clustering and outlier detection method, namely Rectifying Self Organizing Maps (RSOM). Given an image collection returned for a concept query, RSOM provides clusters pruned from outliers. Each cluster is used to train a model representing a different characteristics of the concept. The proposed method outperforms the state-of-the-art studies on the task of learning low-level concepts, and it is competitive in learning higher level concepts as well. It is capable to work at large scale with no supervision through exploiting the available sources.
1312.4477
Ghazi Al-Naymat
Ghazi Al-Naymat
GCG: Mining Maximal Complete Graph Patterns from Large Spatial Data
11
International Conference on Computer Systems and Applications (AICCSA), pp.1,8. Fes, Morocco.27-30 May 2013
10.1109/AICCSA.2013.6616417
null
cs.DB
http://creativecommons.org/licenses/by-nc-sa/3.0/
Recent research on pattern discovery has progressed from mining frequent patterns and sequences to mining structured patterns, such as trees and graphs. Graphs as general data structure can model complex relations among data with wide applications in web exploration and social networks. However, the process of mining large graph patterns is a challenge due to the existence of large number of subgraphs. In this paper, we aim to mine only frequent complete graph patterns. A graph g in a database is complete if every pair of distinct vertices is connected by a unique edge. Grid Complete Graph (GCG) is a mining algorithm developed to explore interesting pruning techniques to extract maximal complete graphs from large spatial dataset existing in Sloan Digital Sky Survey (SDSS) data. Using a divide and conquer strategy, GCG shows high efficiency especially in the presence of large number of patterns. In this paper, we describe GCG that can mine not only simple co-location spatial patterns but also complex ones. To the best of our knowledge, this is the first algorithm used to exploit the extraction of maximal complete graphs in the process of mining complex co-location patterns in large spatial dataset.
[ { "version": "v1", "created": "Fri, 13 Dec 2013 15:00:50 GMT" } ]
2013-12-17T00:00:00
[ [ "Al-Naymat", "Ghazi", "" ] ]
TITLE: GCG: Mining Maximal Complete Graph Patterns from Large Spatial Data ABSTRACT: Recent research on pattern discovery has progressed from mining frequent patterns and sequences to mining structured patterns, such as trees and graphs. Graphs as general data structure can model complex relations among data with wide applications in web exploration and social networks. However, the process of mining large graph patterns is a challenge due to the existence of large number of subgraphs. In this paper, we aim to mine only frequent complete graph patterns. A graph g in a database is complete if every pair of distinct vertices is connected by a unique edge. Grid Complete Graph (GCG) is a mining algorithm developed to explore interesting pruning techniques to extract maximal complete graphs from large spatial dataset existing in Sloan Digital Sky Survey (SDSS) data. Using a divide and conquer strategy, GCG shows high efficiency especially in the presence of large number of patterns. In this paper, we describe GCG that can mine not only simple co-location spatial patterns but also complex ones. To the best of our knowledge, this is the first algorithm used to exploit the extraction of maximal complete graphs in the process of mining complex co-location patterns in large spatial dataset.
1306.2230
Lucio Floretta
Lucio Floretta, Jonas Liechti, Alessandro Flammini and Paolo De Los Rios
Stochastic fluctuations and the detectability limit of network communities
5 pages, 5 figures, correction of typos, improvement of the bibliography and of the notation, general compression
Phys. Rev. E 88, 060801 (2013)
10.1103/PhysRevE.88.060801
null
physics.soc-ph cond-mat.stat-mech cs.SI q-bio.QM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We have analyzed the detectability limits of network communities in the framework of the popular Girvan and Newman benchmark. By carefully taking into account the inevitable stochastic fluctuations that affect the construction of each and every instance of the benchmark, we come to the conclusions that the native, putative partition of the network is completely lost even before the in-degree/out-degree ratio becomes equal to the one of a structure-less Erd\"os-R\'enyi network. We develop a simple iterative scheme, analytically well described by an infinite branching-process, to provide an estimate of the true detectability limit. Using various algorithms based on modularity optimization, we show that all of them behave (semi-quantitatively) in the same way, with the same functional form of the detectability threshold as a function of the network parameters. Because the same behavior has also been found by further modularity-optimization methods and for methods based on different heuristics implementations, we conclude that indeed a correct definition of the detectability limit must take into account the stochastic fluctuations of the network construction.
[ { "version": "v1", "created": "Mon, 10 Jun 2013 15:29:14 GMT" }, { "version": "v2", "created": "Tue, 18 Jun 2013 16:10:31 GMT" } ]
2013-12-16T00:00:00
[ [ "Floretta", "Lucio", "" ], [ "Liechti", "Jonas", "" ], [ "Flammini", "Alessandro", "" ], [ "Rios", "Paolo De Los", "" ] ]
TITLE: Stochastic fluctuations and the detectability limit of network communities ABSTRACT: We have analyzed the detectability limits of network communities in the framework of the popular Girvan and Newman benchmark. By carefully taking into account the inevitable stochastic fluctuations that affect the construction of each and every instance of the benchmark, we come to the conclusions that the native, putative partition of the network is completely lost even before the in-degree/out-degree ratio becomes equal to the one of a structure-less Erd\"os-R\'enyi network. We develop a simple iterative scheme, analytically well described by an infinite branching-process, to provide an estimate of the true detectability limit. Using various algorithms based on modularity optimization, we show that all of them behave (semi-quantitatively) in the same way, with the same functional form of the detectability threshold as a function of the network parameters. Because the same behavior has also been found by further modularity-optimization methods and for methods based on different heuristics implementations, we conclude that indeed a correct definition of the detectability limit must take into account the stochastic fluctuations of the network construction.
1312.0624
Uri Shalit
Uri Shalit and Gal Chechik
Efficient coordinate-descent for orthogonal matrices through Givens rotations
A shorter version of this paper will appear in the proceedings of the 31st International Conference for Machine Learning (ICML 2014)
null
null
null
cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Optimizing over the set of orthogonal matrices is a central component in problems like sparse-PCA or tensor decomposition. Unfortunately, such optimization is hard since simple operations on orthogonal matrices easily break orthogonality, and correcting orthogonality usually costs a large amount of computation. Here we propose a framework for optimizing orthogonal matrices, that is the parallel of coordinate-descent in Euclidean spaces. It is based on {\em Givens-rotations}, a fast-to-compute operation that affects a small number of entries in the learned matrix, and preserves orthogonality. We show two applications of this approach: an algorithm for tensor decomposition that is used in learning mixture models, and an algorithm for sparse-PCA. We study the parameter regime where a Givens rotation approach converges faster and achieves a superior model on a genome-wide brain-wide mRNA expression dataset.
[ { "version": "v1", "created": "Mon, 2 Dec 2013 21:09:40 GMT" }, { "version": "v2", "created": "Fri, 13 Dec 2013 18:47:20 GMT" } ]
2013-12-16T00:00:00
[ [ "Shalit", "Uri", "" ], [ "Chechik", "Gal", "" ] ]
TITLE: Efficient coordinate-descent for orthogonal matrices through Givens rotations ABSTRACT: Optimizing over the set of orthogonal matrices is a central component in problems like sparse-PCA or tensor decomposition. Unfortunately, such optimization is hard since simple operations on orthogonal matrices easily break orthogonality, and correcting orthogonality usually costs a large amount of computation. Here we propose a framework for optimizing orthogonal matrices, that is the parallel of coordinate-descent in Euclidean spaces. It is based on {\em Givens-rotations}, a fast-to-compute operation that affects a small number of entries in the learned matrix, and preserves orthogonality. We show two applications of this approach: an algorithm for tensor decomposition that is used in learning mixture models, and an algorithm for sparse-PCA. We study the parameter regime where a Givens rotation approach converges faster and achieves a superior model on a genome-wide brain-wide mRNA expression dataset.
1312.2789
Chanabasayya Vastrad M
Doreswamy and Chanabasayya .M. Vastrad
Performance Analysis Of Regularized Linear Regression Models For Oxazolines And Oxazoles Derivitive Descriptor Dataset
null
published International Journal of Computational Science and Information Technology (IJCSITY) Vol.1, No.4, November 2013
10.5121/ijcsity.2013.1408
null
cs.LG
http://creativecommons.org/licenses/by-nc-sa/3.0/
Regularized regression techniques for linear regression have been created the last few ten years to reduce the flaws of ordinary least squares regression with regard to prediction accuracy. In this paper, new methods for using regularized regression in model choice are introduced, and we distinguish the conditions in which regularized regression develops our ability to discriminate models. We applied all the five methods that use penalty-based (regularization) shrinkage to handle Oxazolines and Oxazoles derivatives descriptor dataset with far more predictors than observations. The lasso, ridge, elasticnet, lars and relaxed lasso further possess the desirable property that they simultaneously select relevant predictive descriptors and optimally estimate their effects. Here, we comparatively evaluate the performance of five regularized linear regression methods The assessment of the performance of each model by means of benchmark experiments is an established exercise. Cross-validation and resampling methods are generally used to arrive point evaluates the efficiencies which are compared to recognize methods with acceptable features. Predictive accuracy was evaluated using the root mean squared error (RMSE) and Square of usual correlation between predictors and observed mean inhibitory concentration of antitubercular activity (R square). We found that all five regularized regression models were able to produce feasible models and efficient capturing the linearity in the data. The elastic net and lars had similar accuracies as well as lasso and relaxed lasso had similar accuracies but outperformed ridge regression in terms of the RMSE and R square metrics.
[ { "version": "v1", "created": "Tue, 10 Dec 2013 13:16:02 GMT" } ]
2013-12-13T00:00:00
[ [ "Doreswamy", "", "" ], [ "Vastrad", "Chanabasayya . M.", "" ] ]
TITLE: Performance Analysis Of Regularized Linear Regression Models For Oxazolines And Oxazoles Derivitive Descriptor Dataset ABSTRACT: Regularized regression techniques for linear regression have been created the last few ten years to reduce the flaws of ordinary least squares regression with regard to prediction accuracy. In this paper, new methods for using regularized regression in model choice are introduced, and we distinguish the conditions in which regularized regression develops our ability to discriminate models. We applied all the five methods that use penalty-based (regularization) shrinkage to handle Oxazolines and Oxazoles derivatives descriptor dataset with far more predictors than observations. The lasso, ridge, elasticnet, lars and relaxed lasso further possess the desirable property that they simultaneously select relevant predictive descriptors and optimally estimate their effects. Here, we comparatively evaluate the performance of five regularized linear regression methods The assessment of the performance of each model by means of benchmark experiments is an established exercise. Cross-validation and resampling methods are generally used to arrive point evaluates the efficiencies which are compared to recognize methods with acceptable features. Predictive accuracy was evaluated using the root mean squared error (RMSE) and Square of usual correlation between predictors and observed mean inhibitory concentration of antitubercular activity (R square). We found that all five regularized regression models were able to produce feasible models and efficient capturing the linearity in the data. The elastic net and lars had similar accuracies as well as lasso and relaxed lasso had similar accuracies but outperformed ridge regression in terms of the RMSE and R square metrics.
1312.2841
Chanabasayya Vastrad M
Doreswamy and Chanabasayya .M. Vastrad
Predictive Comparative QSAR Analysis Of As 5-Nitofuran-2-YL Derivatives Myco bacterium tuberculosis H37RV Inhibitors Bacterium Tuberculosis H37RV Inhibitors
null
published Health Informatics- An International Journal (HIIJ) Vol.2, No.4, November 2013
10.5121/hiij.2013.2404
null
cs.CE
http://creativecommons.org/licenses/by-nc-sa/3.0/
Antitubercular activity of 5-nitrofuran-2-yl Derivatives series were subjected to Quantitative Structure Activity Relationship (QSAR) Analysis with an effort to derive and understand a correlation between the biological activity as response variable and different molecular descriptors as independent variables. QSAR models are built using 40 molecular descriptor dataset. Different statistical regression expressions were got using Partial Least Squares (PLS),Multiple Linear Regression (MLR) and Principal Component Regression (PCR) techniques. The among these technique, Partial Least Square Regression (PLS) technique has shown very promising result as compared to MLR technique A QSAR model was build by a training set of 30 molecules with correlation coefficient ($r^2$) of 0.8484, significant cross validated correlation coefficient ($q^2$) is 0.0939, F test is 48.5187, ($r^2$) for external test set (pred$_r^2$) is -0.5604, coefficient of correlation of predicted data set (pred$_r^2se$) is 0.7252 and degree of freedom is 26 by Partial Least Squares Regression technique.
[ { "version": "v1", "created": "Tue, 10 Dec 2013 15:50:39 GMT" } ]
2013-12-13T00:00:00
[ [ "Doreswamy", "", "" ], [ "Vastrad", "Chanabasayya . M.", "" ] ]
TITLE: Predictive Comparative QSAR Analysis Of As 5-Nitofuran-2-YL Derivatives Myco bacterium tuberculosis H37RV Inhibitors Bacterium Tuberculosis H37RV Inhibitors ABSTRACT: Antitubercular activity of 5-nitrofuran-2-yl Derivatives series were subjected to Quantitative Structure Activity Relationship (QSAR) Analysis with an effort to derive and understand a correlation between the biological activity as response variable and different molecular descriptors as independent variables. QSAR models are built using 40 molecular descriptor dataset. Different statistical regression expressions were got using Partial Least Squares (PLS),Multiple Linear Regression (MLR) and Principal Component Regression (PCR) techniques. The among these technique, Partial Least Square Regression (PLS) technique has shown very promising result as compared to MLR technique A QSAR model was build by a training set of 30 molecules with correlation coefficient ($r^2$) of 0.8484, significant cross validated correlation coefficient ($q^2$) is 0.0939, F test is 48.5187, ($r^2$) for external test set (pred$_r^2$) is -0.5604, coefficient of correlation of predicted data set (pred$_r^2se$) is 0.7252 and degree of freedom is 26 by Partial Least Squares Regression technique.
1312.2853
Chanabasayya Vastrad M
Doreswamy and Chanabasayya .M. Vastrad
Performance Analysis Of Neural Network Models For Oxazolines And Oxazoles Derivatives Descriptor Dataset
null
published International Journal of Information Sciences and Techniques (IJIST) Vol.3, No.6, November 2013
10.5121/ijist.2013.3601
null
cs.CE cs.NE
http://creativecommons.org/licenses/by-nc-sa/3.0/
Neural networks have been used successfully to a broad range of areas such as business, data mining, drug discovery and biology. In medicine, neural networks have been applied widely in medical diagnosis, detection and evaluation of new drugs and treatment cost estimation. In addition, neural networks have begin practice in data mining strategies for the aim of prediction, knowledge discovery. This paper will present the application of neural networks for the prediction and analysis of antitubercular activity of Oxazolines and Oxazoles derivatives. This study presents techniques based on the development of Single hidden layer neural network (SHLFFNN), Gradient Descent Back propagation neural network (GDBPNN), Gradient Descent Back propagation with momentum neural network (GDBPMNN), Back propagation with Weight decay neural network (BPWDNN) and Quantile regression neural network (QRNN) of artificial neural network (ANN) models Here, we comparatively evaluate the performance of five neural network techniques. The evaluation of the efficiency of each model by ways of benchmark experiments is an accepted application. Cross-validation and resampling techniques are commonly used to derive point estimates of the performances which are compared to identify methods with good properties. Predictive accuracy was evaluated using the root mean squared error (RMSE), Coefficient determination(???), mean absolute error(MAE), mean percentage error(MPE) and relative square error(RSE). We found that all five neural network models were able to produce feasible models. QRNN model is outperforms with all statistical tests amongst other four models.
[ { "version": "v1", "created": "Tue, 10 Dec 2013 16:15:48 GMT" } ]
2013-12-13T00:00:00
[ [ "Doreswamy", "", "" ], [ "Vastrad", "Chanabasayya . M.", "" ] ]
TITLE: Performance Analysis Of Neural Network Models For Oxazolines And Oxazoles Derivatives Descriptor Dataset ABSTRACT: Neural networks have been used successfully to a broad range of areas such as business, data mining, drug discovery and biology. In medicine, neural networks have been applied widely in medical diagnosis, detection and evaluation of new drugs and treatment cost estimation. In addition, neural networks have begin practice in data mining strategies for the aim of prediction, knowledge discovery. This paper will present the application of neural networks for the prediction and analysis of antitubercular activity of Oxazolines and Oxazoles derivatives. This study presents techniques based on the development of Single hidden layer neural network (SHLFFNN), Gradient Descent Back propagation neural network (GDBPNN), Gradient Descent Back propagation with momentum neural network (GDBPMNN), Back propagation with Weight decay neural network (BPWDNN) and Quantile regression neural network (QRNN) of artificial neural network (ANN) models Here, we comparatively evaluate the performance of five neural network techniques. The evaluation of the efficiency of each model by ways of benchmark experiments is an accepted application. Cross-validation and resampling techniques are commonly used to derive point estimates of the performances which are compared to identify methods with good properties. Predictive accuracy was evaluated using the root mean squared error (RMSE), Coefficient determination(???), mean absolute error(MAE), mean percentage error(MPE) and relative square error(RSE). We found that all five neural network models were able to produce feasible models. QRNN model is outperforms with all statistical tests amongst other four models.
1312.2859
Chanabasayya Vastrad M
Doreswamy and Chanabasayya .M. Vastrad
A Robust Missing Value Imputation Method MifImpute For Incomplete Molecular Descriptor Data And Comparative Analysis With Other Missing Value Imputation Methods
arXiv admin note: text overlap with arXiv:1105.0828 by other authors without attribution
Published International Journal on Computational Sciences & Applications (IJCSA) Vol.3, No4, August 2013
10.5121/ijcsa.2013.3406
null
cs.CE
http://creativecommons.org/licenses/by-nc-sa/3.0/
Missing data imputation is an important research topic in data mining. Large-scale Molecular descriptor data may contains missing values (MVs). However, some methods for downstream analyses, including some prediction tools, require a complete descriptor data matrix. We propose and evaluate an iterative imputation method MiFoImpute based on a random forest. By averaging over many unpruned regression trees, random forest intrinsically constitutes a multiple imputation scheme. Using the NRMSE and NMAE estimates of random forest, we are able to estimate the imputation error. Evaluation is performed on two molecular descriptor datasets generated from a diverse selection of pharmaceutical fields with artificially introduced missing values ranging from 10% to 30%. The experimental result demonstrates that missing values has a great impact on the effectiveness of imputation techniques and our method MiFoImpute is more robust to missing value than the other ten imputation methods used as benchmark. Additionally, MiFoImpute exhibits attractive computational efficiency and can cope with high-dimensional data.
[ { "version": "v1", "created": "Tue, 10 Dec 2013 16:24:28 GMT" } ]
2013-12-13T00:00:00
[ [ "Doreswamy", "", "" ], [ "Vastrad", "Chanabasayya . M.", "" ] ]
TITLE: A Robust Missing Value Imputation Method MifImpute For Incomplete Molecular Descriptor Data And Comparative Analysis With Other Missing Value Imputation Methods ABSTRACT: Missing data imputation is an important research topic in data mining. Large-scale Molecular descriptor data may contains missing values (MVs). However, some methods for downstream analyses, including some prediction tools, require a complete descriptor data matrix. We propose and evaluate an iterative imputation method MiFoImpute based on a random forest. By averaging over many unpruned regression trees, random forest intrinsically constitutes a multiple imputation scheme. Using the NRMSE and NMAE estimates of random forest, we are able to estimate the imputation error. Evaluation is performed on two molecular descriptor datasets generated from a diverse selection of pharmaceutical fields with artificially introduced missing values ranging from 10% to 30%. The experimental result demonstrates that missing values has a great impact on the effectiveness of imputation techniques and our method MiFoImpute is more robust to missing value than the other ten imputation methods used as benchmark. Additionally, MiFoImpute exhibits attractive computational efficiency and can cope with high-dimensional data.
1312.2861
Chanabasayya Vastrad M
Doreswamy and Chanabasayya .M. Vastrad
Identification Of Outliers In Oxazolines AND Oxazoles High Dimension Molecular Descriptor Dataset Using Principal Component Outlier Detection Algorithm And Comparative Numerical Study Of Other Robust Estimators
null
Published International Journal of Data Mining & Knowledge Management Process (IJDKP) Vol.3, No.4, July 2013
10.5121/ijdkp.2013.3405
null
cs.CE
http://creativecommons.org/licenses/by-nc-sa/3.0/
From the past decade outlier detection has been in use. Detection of outliers is an emerging topic and is having robust applications in medical sciences and pharmaceutical sciences. Outlier detection is used to detect anomalous behaviour of data. Typical problems in Bioinformatics can be addressed by outlier detection. A computationally fast method for detecting outliers is shown, that is particularly effective in high dimensions. PrCmpOut algorithm make use of simple properties of principal components to detect outliers in the transformed space, leading to significant computational advantages for high dimensional data. This procedure requires considerably less computational time than existing methods for outlier detection. The properties of this estimator (Outlier error rate (FN), Non-Outlier error rate(FP) and computational costs) are analyzed and compared with those of other robust estimators described in the literature through simulation studies. Numerical evidence based Oxazolines and Oxazoles molecular descriptor dataset shows that the proposed method performs well in a variety of situations of practical interest. It is thus a valuable companion to the existing outlier detection methods.
[ { "version": "v1", "created": "Tue, 10 Dec 2013 16:35:25 GMT" } ]
2013-12-13T00:00:00
[ [ "Doreswamy", "", "" ], [ "Vastrad", "Chanabasayya . M.", "" ] ]
TITLE: Identification Of Outliers In Oxazolines AND Oxazoles High Dimension Molecular Descriptor Dataset Using Principal Component Outlier Detection Algorithm And Comparative Numerical Study Of Other Robust Estimators ABSTRACT: From the past decade outlier detection has been in use. Detection of outliers is an emerging topic and is having robust applications in medical sciences and pharmaceutical sciences. Outlier detection is used to detect anomalous behaviour of data. Typical problems in Bioinformatics can be addressed by outlier detection. A computationally fast method for detecting outliers is shown, that is particularly effective in high dimensions. PrCmpOut algorithm make use of simple properties of principal components to detect outliers in the transformed space, leading to significant computational advantages for high dimensional data. This procedure requires considerably less computational time than existing methods for outlier detection. The properties of this estimator (Outlier error rate (FN), Non-Outlier error rate(FP) and computational costs) are analyzed and compared with those of other robust estimators described in the literature through simulation studies. Numerical evidence based Oxazolines and Oxazoles molecular descriptor dataset shows that the proposed method performs well in a variety of situations of practical interest. It is thus a valuable companion to the existing outlier detection methods.
1312.3388
Tianlin Shi
Tianlin Shi and Jun Zhu
Online Bayesian Passive-Aggressive Learning
10 Pages. ICML 2014, Beijing, China
null
null
null
cs.LG
http://creativecommons.org/licenses/by/3.0/
Online Passive-Aggressive (PA) learning is an effective framework for performing max-margin online learning. But the deterministic formulation and estimated single large-margin model could limit its capability in discovering descriptive structures underlying complex data. This pa- per presents online Bayesian Passive-Aggressive (BayesPA) learning, which subsumes the online PA and extends naturally to incorporate latent variables and perform nonparametric Bayesian inference, thus providing great flexibility for explorative analysis. We apply BayesPA to topic modeling and derive efficient online learning algorithms for max-margin topic models. We further develop nonparametric methods to resolve the number of topics. Experimental results on real datasets show that our approaches significantly improve time efficiency while maintaining comparable results with the batch counterparts.
[ { "version": "v1", "created": "Thu, 12 Dec 2013 02:46:07 GMT" } ]
2013-12-13T00:00:00
[ [ "Shi", "Tianlin", "" ], [ "Zhu", "Jun", "" ] ]
TITLE: Online Bayesian Passive-Aggressive Learning ABSTRACT: Online Passive-Aggressive (PA) learning is an effective framework for performing max-margin online learning. But the deterministic formulation and estimated single large-margin model could limit its capability in discovering descriptive structures underlying complex data. This pa- per presents online Bayesian Passive-Aggressive (BayesPA) learning, which subsumes the online PA and extends naturally to incorporate latent variables and perform nonparametric Bayesian inference, thus providing great flexibility for explorative analysis. We apply BayesPA to topic modeling and derive efficient online learning algorithms for max-margin topic models. We further develop nonparametric methods to resolve the number of topics. Experimental results on real datasets show that our approaches significantly improve time efficiency while maintaining comparable results with the batch counterparts.
1310.4342
Kiran Sree Pokkuluri Prof
Pokkuluri Kiran Sree, Inampudi Ramesh Babuhor, SSSN Usha Devi N3
An Extensive Report on Cellular Automata Based Artificial Immune System for Strengthening Automated Protein Prediction
arXiv admin note: text overlap with arXiv:0801.4312 by other authors
Advances in Biomedical Engineering Research (ABER) Volume 1 Issue 3, September 2013
null
null
cs.AI cs.CE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Artificial Immune System (AIS-MACA) a novel computational intelligence technique is can be used for strengthening the automated protein prediction system with more adaptability and incorporating more parallelism to the system. Most of the existing approaches are sequential which will classify the input into four major classes and these are designed for similar sequences. AIS-MACA is designed to identify ten classes from the sequences that share twilight zone similarity and identity with the training sequences with mixed and hybrid variations. This method also predicts three states (helix, strand, and coil) for the secondary structure. Our comprehensive design considers 10 feature selection methods and 4 classifiers to develop MACA (Multiple Attractor Cellular Automata) based classifiers that are build for each of the ten classes. We have tested the proposed classifier with twilight-zone and 1-high-similarity benchmark datasets with over three dozens of modern competing predictors shows that AIS-MACA provides the best overall accuracy that ranges between 80% and 89.8% depending on the dataset.
[ { "version": "v1", "created": "Wed, 16 Oct 2013 12:14:48 GMT" } ]
2013-12-12T00:00:00
[ [ "Sree", "Pokkuluri Kiran", "" ], [ "Babuhor", "Inampudi Ramesh", "" ], [ "N3", "SSSN Usha Devi", "" ] ]
TITLE: An Extensive Report on Cellular Automata Based Artificial Immune System for Strengthening Automated Protein Prediction ABSTRACT: Artificial Immune System (AIS-MACA) a novel computational intelligence technique is can be used for strengthening the automated protein prediction system with more adaptability and incorporating more parallelism to the system. Most of the existing approaches are sequential which will classify the input into four major classes and these are designed for similar sequences. AIS-MACA is designed to identify ten classes from the sequences that share twilight zone similarity and identity with the training sequences with mixed and hybrid variations. This method also predicts three states (helix, strand, and coil) for the secondary structure. Our comprehensive design considers 10 feature selection methods and 4 classifiers to develop MACA (Multiple Attractor Cellular Automata) based classifiers that are build for each of the ten classes. We have tested the proposed classifier with twilight-zone and 1-high-similarity benchmark datasets with over three dozens of modern competing predictors shows that AIS-MACA provides the best overall accuracy that ranges between 80% and 89.8% depending on the dataset.
1312.1558
Tarek Hamrouni
Tarek Hamrouni and Sadok Ben Yahia and Engelbert Mephu Nguifo
Efficient construction of the lattice of frequent closed patterns and simultaneous extraction of generic bases of rules
50 pages, in French
Mathematics and Social Sciences, Volume 49, Number 195, 2011(3), pages 5-54
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In the last few years, the amount of collected data, in various computer science applications, has grown considerably. These large volumes of data need to be analyzed in order to extract useful hidden knowledge. This work focuses on association rule extraction. This technique is one of the most popular in data mining. Nevertheless, the number of extracted association rules is often very high, and many of them are redundant. In this paper, we propose a new algorithm, called PRINCE. Its main feature is the construction of a partially ordered structure for extracting subsets of association rules, called generic bases. Without loss of information these subsets form representation of the whole association rule set. To reduce the cost of such a construction, the partially ordered structure is built thanks to the minimal generators associated to frequent closed patterns. The closed ones are simultaneously derived with generic bases thanks to a simple bottom-up traversal of the obtained structure. The experimentations we carried out in benchmark and "worst case" contexts showed the efficiency of the proposed algorithm, compared to algorithms like CLOSE, A-CLOSE and TITANIC.
[ { "version": "v1", "created": "Thu, 5 Dec 2013 14:23:16 GMT" }, { "version": "v2", "created": "Wed, 11 Dec 2013 11:51:11 GMT" } ]
2013-12-12T00:00:00
[ [ "Hamrouni", "Tarek", "" ], [ "Yahia", "Sadok Ben", "" ], [ "Nguifo", "Engelbert Mephu", "" ] ]
TITLE: Efficient construction of the lattice of frequent closed patterns and simultaneous extraction of generic bases of rules ABSTRACT: In the last few years, the amount of collected data, in various computer science applications, has grown considerably. These large volumes of data need to be analyzed in order to extract useful hidden knowledge. This work focuses on association rule extraction. This technique is one of the most popular in data mining. Nevertheless, the number of extracted association rules is often very high, and many of them are redundant. In this paper, we propose a new algorithm, called PRINCE. Its main feature is the construction of a partially ordered structure for extracting subsets of association rules, called generic bases. Without loss of information these subsets form representation of the whole association rule set. To reduce the cost of such a construction, the partially ordered structure is built thanks to the minimal generators associated to frequent closed patterns. The closed ones are simultaneously derived with generic bases thanks to a simple bottom-up traversal of the obtained structure. The experimentations we carried out in benchmark and "worst case" contexts showed the efficiency of the proposed algorithm, compared to algorithms like CLOSE, A-CLOSE and TITANIC.
1312.3020
Huasha Zhao Mr
Huasha Zhao, John Canny
Sparse Allreduce: Efficient Scalable Communication for Power-Law Data
null
null
null
null
cs.DC cs.AI cs.MS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Many large datasets exhibit power-law statistics: The web graph, social networks, text data, click through data etc. Their adjacency graphs are termed natural graphs, and are known to be difficult to partition. As a consequence most distributed algorithms on these graphs are communication intensive. Many algorithms on natural graphs involve an Allreduce: a sum or average of partitioned data which is then shared back to the cluster nodes. Examples include PageRank, spectral partitioning, and many machine learning algorithms including regression, factor (topic) models, and clustering. In this paper we describe an efficient and scalable Allreduce primitive for power-law data. We point out scaling problems with existing butterfly and round-robin networks for Sparse Allreduce, and show that a hybrid approach improves on both. Furthermore, we show that Sparse Allreduce stages should be nested instead of cascaded (as in the dense case). And that the optimum throughput Allreduce network should be a butterfly of heterogeneous degree where degree decreases with depth into the network. Finally, a simple replication scheme is introduced to deal with node failures. We present experiments showing significant improvements over existing systems such as PowerGraph and Hadoop.
[ { "version": "v1", "created": "Wed, 11 Dec 2013 02:33:45 GMT" } ]
2013-12-12T00:00:00
[ [ "Zhao", "Huasha", "" ], [ "Canny", "John", "" ] ]
TITLE: Sparse Allreduce: Efficient Scalable Communication for Power-Law Data ABSTRACT: Many large datasets exhibit power-law statistics: The web graph, social networks, text data, click through data etc. Their adjacency graphs are termed natural graphs, and are known to be difficult to partition. As a consequence most distributed algorithms on these graphs are communication intensive. Many algorithms on natural graphs involve an Allreduce: a sum or average of partitioned data which is then shared back to the cluster nodes. Examples include PageRank, spectral partitioning, and many machine learning algorithms including regression, factor (topic) models, and clustering. In this paper we describe an efficient and scalable Allreduce primitive for power-law data. We point out scaling problems with existing butterfly and round-robin networks for Sparse Allreduce, and show that a hybrid approach improves on both. Furthermore, we show that Sparse Allreduce stages should be nested instead of cascaded (as in the dense case). And that the optimum throughput Allreduce network should be a butterfly of heterogeneous degree where degree decreases with depth into the network. Finally, a simple replication scheme is introduced to deal with node failures. We present experiments showing significant improvements over existing systems such as PowerGraph and Hadoop.
1312.3062
Jingdong Wang
Jingdong Wang, Jing Wang, Gang Zeng, Rui Gan, Shipeng Li, Baining Guo
Fast Neighborhood Graph Search using Cartesian Concatenation
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we propose a new data structure for approximate nearest neighbor search. This structure augments the neighborhood graph with a bridge graph. We propose to exploit Cartesian concatenation to produce a large set of vectors, called bridge vectors, from several small sets of subvectors. Each bridge vector is connected with a few reference vectors near to it, forming a bridge graph. Our approach finds nearest neighbors by simultaneously traversing the neighborhood graph and the bridge graph in the best-first strategy. The success of our approach stems from two factors: the exact nearest neighbor search over a large number of bridge vectors can be done quickly, and the reference vectors connected to a bridge (reference) vector near the query are also likely to be near the query. Experimental results on searching over large scale datasets (SIFT, GIST and HOG) show that our approach outperforms state-of-the-art ANN search algorithms in terms of efficiency and accuracy. The combination of our approach with the IVFADC system also shows superior performance over the BIGANN dataset of $1$ billion SIFT features compared with the best previously published result.
[ { "version": "v1", "created": "Wed, 11 Dec 2013 08:02:29 GMT" } ]
2013-12-12T00:00:00
[ [ "Wang", "Jingdong", "" ], [ "Wang", "Jing", "" ], [ "Zeng", "Gang", "" ], [ "Gan", "Rui", "" ], [ "Li", "Shipeng", "" ], [ "Guo", "Baining", "" ] ]
TITLE: Fast Neighborhood Graph Search using Cartesian Concatenation ABSTRACT: In this paper, we propose a new data structure for approximate nearest neighbor search. This structure augments the neighborhood graph with a bridge graph. We propose to exploit Cartesian concatenation to produce a large set of vectors, called bridge vectors, from several small sets of subvectors. Each bridge vector is connected with a few reference vectors near to it, forming a bridge graph. Our approach finds nearest neighbors by simultaneously traversing the neighborhood graph and the bridge graph in the best-first strategy. The success of our approach stems from two factors: the exact nearest neighbor search over a large number of bridge vectors can be done quickly, and the reference vectors connected to a bridge (reference) vector near the query are also likely to be near the query. Experimental results on searching over large scale datasets (SIFT, GIST and HOG) show that our approach outperforms state-of-the-art ANN search algorithms in terms of efficiency and accuracy. The combination of our approach with the IVFADC system also shows superior performance over the BIGANN dataset of $1$ billion SIFT features compared with the best previously published result.
1303.6609
Jagan Sankaranarayanan
Jeff LeFevre, Jagan Sankaranarayanan, Hakan Hacigumus, Junichi Tatemura, Neoklis Polyzotis, Michael J. Carey
Exploiting Opportunistic Physical Design in Large-scale Data Analytics
15 pages
null
null
null
cs.DB cs.DC cs.DS
http://creativecommons.org/licenses/by-nc-sa/3.0/
Large-scale systems, such as MapReduce and Hadoop, perform aggressive materialization of intermediate job results in order to support fault tolerance. When jobs correspond to exploratory queries submitted by data analysts, these materializations yield a large set of materialized views that typically capture common computation among successive queries from the same analyst, or even across queries of different analysts who test similar hypotheses. We propose to treat these views as an opportunistic physical design and use them for the purpose of query optimization. We develop a novel query-rewrite algorithm that addresses the two main challenges in this context: how to search the large space of rewrites, and how to reason about views that contain UDFs (a common feature in large-scale data analytics). The algorithm, which provably finds the minimum-cost rewrite, is inspired by nearest-neighbor searches in non-metric spaces. We present an extensive experimental study on real-world datasets with a prototype data-analytics system based on Hive. The results demonstrate that our approach can result in dramatic performance improvements on complex data-analysis queries, reducing total execution time by an average of 61% and up to two orders of magnitude.
[ { "version": "v1", "created": "Tue, 26 Mar 2013 19:08:55 GMT" }, { "version": "v2", "created": "Tue, 10 Dec 2013 17:35:09 GMT" } ]
2013-12-11T00:00:00
[ [ "LeFevre", "Jeff", "" ], [ "Sankaranarayanan", "Jagan", "" ], [ "Hacigumus", "Hakan", "" ], [ "Tatemura", "Junichi", "" ], [ "Polyzotis", "Neoklis", "" ], [ "Carey", "Michael J.", "" ] ]
TITLE: Exploiting Opportunistic Physical Design in Large-scale Data Analytics ABSTRACT: Large-scale systems, such as MapReduce and Hadoop, perform aggressive materialization of intermediate job results in order to support fault tolerance. When jobs correspond to exploratory queries submitted by data analysts, these materializations yield a large set of materialized views that typically capture common computation among successive queries from the same analyst, or even across queries of different analysts who test similar hypotheses. We propose to treat these views as an opportunistic physical design and use them for the purpose of query optimization. We develop a novel query-rewrite algorithm that addresses the two main challenges in this context: how to search the large space of rewrites, and how to reason about views that contain UDFs (a common feature in large-scale data analytics). The algorithm, which provably finds the minimum-cost rewrite, is inspired by nearest-neighbor searches in non-metric spaces. We present an extensive experimental study on real-world datasets with a prototype data-analytics system based on Hive. The results demonstrate that our approach can result in dramatic performance improvements on complex data-analysis queries, reducing total execution time by an average of 61% and up to two orders of magnitude.
1312.2628
Ibrahim Umar
Ibrahim Umar, Otto Anshus, Phuong Ha (University of Troms{\o})
DeltaTree: A Practical Locality-aware Concurrent Search Tree
null
null
null
IFI-UIT Technical Report 2013-74
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
As other fundamental programming abstractions in energy-efficient computing, search trees are expected to support both high parallelism and data locality. However, existing highly-concurrent search trees such as red-black trees and AVL trees do not consider data locality while existing locality-aware search trees such as those based on the van Emde Boas layout (vEB-based trees), poorly support concurrent (update) operations. This paper presents DeltaTree, a practical locality-aware concurrent search tree that combines both locality-optimisation techniques from vEB-based trees and concurrency-optimisation techniques from non-blocking highly-concurrent search trees. DeltaTree is a $k$-ary leaf-oriented tree of DeltaNodes in which each DeltaNode is a size-fixed tree-container with the van Emde Boas layout. The expected memory transfer costs of DeltaTree's Search, Insert, and Delete operations are $O(\log_B N)$, where $N, B$ are the tree size and the unknown memory block size in the ideal cache model, respectively. DeltaTree's Search operation is wait-free, providing prioritised lanes for Search operations, the dominant operation in search trees. Its Insert and {\em Delete} operations are non-blocking to other Search, Insert, and Delete operations, but they may be occasionally blocked by maintenance operations that are sometimes triggered to keep DeltaTree in good shape. Our experimental evaluation using the latest implementation of AVL, red-black, and speculation friendly trees from the Synchrobench benchmark has shown that DeltaTree is up to 5 times faster than all of the three concurrent search trees for searching operations and up to 1.6 times faster for update operations when the update contention is not too high.
[ { "version": "v1", "created": "Mon, 9 Dec 2013 23:30:02 GMT" } ]
2013-12-11T00:00:00
[ [ "Umar", "Ibrahim", "", "University of Tromsø" ], [ "Anshus", "Otto", "", "University of Tromsø" ], [ "Ha", "Phuong", "", "University of Tromsø" ] ]
TITLE: DeltaTree: A Practical Locality-aware Concurrent Search Tree ABSTRACT: As other fundamental programming abstractions in energy-efficient computing, search trees are expected to support both high parallelism and data locality. However, existing highly-concurrent search trees such as red-black trees and AVL trees do not consider data locality while existing locality-aware search trees such as those based on the van Emde Boas layout (vEB-based trees), poorly support concurrent (update) operations. This paper presents DeltaTree, a practical locality-aware concurrent search tree that combines both locality-optimisation techniques from vEB-based trees and concurrency-optimisation techniques from non-blocking highly-concurrent search trees. DeltaTree is a $k$-ary leaf-oriented tree of DeltaNodes in which each DeltaNode is a size-fixed tree-container with the van Emde Boas layout. The expected memory transfer costs of DeltaTree's Search, Insert, and Delete operations are $O(\log_B N)$, where $N, B$ are the tree size and the unknown memory block size in the ideal cache model, respectively. DeltaTree's Search operation is wait-free, providing prioritised lanes for Search operations, the dominant operation in search trees. Its Insert and {\em Delete} operations are non-blocking to other Search, Insert, and Delete operations, but they may be occasionally blocked by maintenance operations that are sometimes triggered to keep DeltaTree in good shape. Our experimental evaluation using the latest implementation of AVL, red-black, and speculation friendly trees from the Synchrobench benchmark has shown that DeltaTree is up to 5 times faster than all of the three concurrent search trees for searching operations and up to 1.6 times faster for update operations when the update contention is not too high.
1312.2632
Yongcai Wang
Yongcai Wang, Haoran Feng, Xiao Qi
SEED: Public Energy and Environment Dataset for Optimizing HVAC Operation in Subway Stations
5 pages, 14 figures
null
null
null
cs.SY
http://creativecommons.org/licenses/by/3.0/
For sustainability and energy saving, the problem to optimize the control of heating, ventilating, and air-conditioning (HVAC) systems has attracted great attentions, but analyzing the signatures of thermal environments and HVAC systems and the evaluation of the optimization policies has encountered inefficiency and inconvenient problems due to the lack of public dataset. In this paper, we present the Subway station Energy and Environment Dataset (SEED), which was collected from a line of Beijing subway stations, providing minute-resolution data regarding the environment dynamics (temperature, humidity, CO2, etc.) working states and energy consumptions of the HVAC systems (ventilators, refrigerators, pumps), and hour-resolution data of passenger flows. We describe the sensor deployments and the HVAC systems for data collection and for environment control, and also present initial investigation for the energy disaggregation of HVAC system, the signatures of the thermal load, cooling supply, and the passenger flow using the dataset.
[ { "version": "v1", "created": "Tue, 10 Dec 2013 00:29:04 GMT" } ]
2013-12-11T00:00:00
[ [ "Wang", "Yongcai", "" ], [ "Feng", "Haoran", "" ], [ "Qi", "Xiao", "" ] ]
TITLE: SEED: Public Energy and Environment Dataset for Optimizing HVAC Operation in Subway Stations ABSTRACT: For sustainability and energy saving, the problem to optimize the control of heating, ventilating, and air-conditioning (HVAC) systems has attracted great attentions, but analyzing the signatures of thermal environments and HVAC systems and the evaluation of the optimization policies has encountered inefficiency and inconvenient problems due to the lack of public dataset. In this paper, we present the Subway station Energy and Environment Dataset (SEED), which was collected from a line of Beijing subway stations, providing minute-resolution data regarding the environment dynamics (temperature, humidity, CO2, etc.) working states and energy consumptions of the HVAC systems (ventilators, refrigerators, pumps), and hour-resolution data of passenger flows. We describe the sensor deployments and the HVAC systems for data collection and for environment control, and also present initial investigation for the energy disaggregation of HVAC system, the signatures of the thermal load, cooling supply, and the passenger flow using the dataset.
1312.2704
EPTCS
Rumyana Neykova (Imperial College)
Session Types Go Dynamic or How to Verify Your Python Conversations
In Proceedings PLACES 2013, arXiv:1312.2218
EPTCS 137, 2013, pp. 95-102
10.4204/EPTCS.137.8
null
cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents the first implementation of session types in a dynamically-typed language - Python. Communication safety of the whole system is guaranteed at runtime by monitors that check the execution traces comply with an associated protocol. Protocols are written in Scribble, a choreography description language based on multiparty session types, with addition of logic formulas for more precise behaviour properties. The presented framework overcomes the limitations of previous works on the session types where all endpoints should be statically typed so that they do not permit interoperability with untyped participants. The advantages, expressiveness and performance of dynamic protocol checking are demonstrated through use case and benchmarks.
[ { "version": "v1", "created": "Tue, 10 Dec 2013 08:04:18 GMT" } ]
2013-12-11T00:00:00
[ [ "Neykova", "Rumyana", "", "Imperial College" ] ]
TITLE: Session Types Go Dynamic or How to Verify Your Python Conversations ABSTRACT: This paper presents the first implementation of session types in a dynamically-typed language - Python. Communication safety of the whole system is guaranteed at runtime by monitors that check the execution traces comply with an associated protocol. Protocols are written in Scribble, a choreography description language based on multiparty session types, with addition of logic formulas for more precise behaviour properties. The presented framework overcomes the limitations of previous works on the session types where all endpoints should be statically typed so that they do not permit interoperability with untyped participants. The advantages, expressiveness and performance of dynamic protocol checking are demonstrated through use case and benchmarks.
1205.6548
Xiaojun Zhou
Xiaojun Zhou, Chunhua Yang and Weihua Gui
State Transition Algorithm
18 pages, 28 figures
Journal of Industrial and Management Optimization 8(4): 1039-1056, 2012
10.3934/jimo.2012.8.1039
null
math.OC cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In terms of the concepts of state and state transition, a new heuristic random search algorithm named state transition algorithm is proposed. For continuous function optimization problems, four special transformation operators called rotation, translation, expansion and axesion are designed. Adjusting measures of the transformations are mainly studied to keep the balance of exploration and exploitation. Convergence analysis is also discussed about the algorithm based on random search theory. In the meanwhile, to strengthen the search ability in high dimensional space, communication strategy is introduced into the basic algorithm and intermittent exchange is presented to prevent premature convergence. Finally, experiments are carried out for the algorithms. With 10 common benchmark unconstrained continuous functions used to test the performance, the results show that state transition algorithms are promising algorithms due to their good global search capability and convergence property when compared with some popular algorithms.
[ { "version": "v1", "created": "Wed, 30 May 2012 05:53:58 GMT" }, { "version": "v2", "created": "Wed, 12 Sep 2012 09:06:33 GMT" }, { "version": "v3", "created": "Tue, 9 Oct 2012 04:19:39 GMT" }, { "version": "v4", "created": "Mon, 9 Dec 2013 01:17:43 GMT" } ]
2013-12-10T00:00:00
[ [ "Zhou", "Xiaojun", "" ], [ "Yang", "Chunhua", "" ], [ "Gui", "Weihua", "" ] ]
TITLE: State Transition Algorithm ABSTRACT: In terms of the concepts of state and state transition, a new heuristic random search algorithm named state transition algorithm is proposed. For continuous function optimization problems, four special transformation operators called rotation, translation, expansion and axesion are designed. Adjusting measures of the transformations are mainly studied to keep the balance of exploration and exploitation. Convergence analysis is also discussed about the algorithm based on random search theory. In the meanwhile, to strengthen the search ability in high dimensional space, communication strategy is introduced into the basic algorithm and intermittent exchange is presented to prevent premature convergence. Finally, experiments are carried out for the algorithms. With 10 common benchmark unconstrained continuous functions used to test the performance, the results show that state transition algorithms are promising algorithms due to their good global search capability and convergence property when compared with some popular algorithms.
1312.2137
Dimitri Palaz
Dimitri Palaz, Ronan Collobert, Mathew Magimai.-Doss
End-to-end Phoneme Sequence Recognition using Convolutional Neural Networks
NIPS Deep Learning Workshop, 2013
null
null
null
cs.LG cs.CL cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Most phoneme recognition state-of-the-art systems rely on a classical neural network classifiers, fed with highly tuned features, such as MFCC or PLP features. Recent advances in ``deep learning'' approaches questioned such systems, but while some attempts were made with simpler features such as spectrograms, state-of-the-art systems still rely on MFCCs. This might be viewed as a kind of failure from deep learning approaches, which are often claimed to have the ability to train with raw signals, alleviating the need of hand-crafted features. In this paper, we investigate a convolutional neural network approach for raw speech signals. While convolutional architectures got tremendous success in computer vision or text processing, they seem to have been let down in the past recent years in the speech processing field. We show that it is possible to learn an end-to-end phoneme sequence classifier system directly from raw signal, with similar performance on the TIMIT and WSJ datasets than existing systems based on MFCC, questioning the need of complex hand-crafted features on large datasets.
[ { "version": "v1", "created": "Sat, 7 Dec 2013 19:55:02 GMT" } ]
2013-12-10T00:00:00
[ [ "Palaz", "Dimitri", "" ], [ "Collobert", "Ronan", "" ], [ "-Doss", "Mathew Magimai.", "" ] ]
TITLE: End-to-end Phoneme Sequence Recognition using Convolutional Neural Networks ABSTRACT: Most phoneme recognition state-of-the-art systems rely on a classical neural network classifiers, fed with highly tuned features, such as MFCC or PLP features. Recent advances in ``deep learning'' approaches questioned such systems, but while some attempts were made with simpler features such as spectrograms, state-of-the-art systems still rely on MFCCs. This might be viewed as a kind of failure from deep learning approaches, which are often claimed to have the ability to train with raw signals, alleviating the need of hand-crafted features. In this paper, we investigate a convolutional neural network approach for raw speech signals. While convolutional architectures got tremendous success in computer vision or text processing, they seem to have been let down in the past recent years in the speech processing field. We show that it is possible to learn an end-to-end phoneme sequence classifier system directly from raw signal, with similar performance on the TIMIT and WSJ datasets than existing systems based on MFCC, questioning the need of complex hand-crafted features on large datasets.
1312.2237
Sugata Sanyal
Mustafa H.Hajeer, Alka Singh, Dipankar Dasgupta, Sugata Sanyal
Clustering online social network communities using genetic algorithms
7 pages, 9 figures, 2 tables
null
null
null
cs.SI physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
To analyze the activities in an Online Social network (OSN), we introduce the concept of "Node of Attraction" (NoA) which represents the most active node in a network community. This NoA is identified as the origin/initiator of a post/communication which attracted other nodes and formed a cluster at any point in time. In this research, a genetic algorithm (GA) is used as a data mining method where the main objective is to determine clusters of network communities in a given OSN dataset. This approach is efficient in handling different type of discussion topics in our studied OSN - comments, emails, chat expressions, etc. and can form clusters according to one or more topics. We believe that this work can be useful in finding the source for spread of this GA-based clustering of online interactions and reports some results of experiments with real-world data and demonstrates the performance of proposed approach.
[ { "version": "v1", "created": "Sun, 8 Dec 2013 17:37:24 GMT" } ]
2013-12-10T00:00:00
[ [ "Hajeer", "Mustafa H.", "" ], [ "Singh", "Alka", "" ], [ "Dasgupta", "Dipankar", "" ], [ "Sanyal", "Sugata", "" ] ]
TITLE: Clustering online social network communities using genetic algorithms ABSTRACT: To analyze the activities in an Online Social network (OSN), we introduce the concept of "Node of Attraction" (NoA) which represents the most active node in a network community. This NoA is identified as the origin/initiator of a post/communication which attracted other nodes and formed a cluster at any point in time. In this research, a genetic algorithm (GA) is used as a data mining method where the main objective is to determine clusters of network communities in a given OSN dataset. This approach is efficient in handling different type of discussion topics in our studied OSN - comments, emails, chat expressions, etc. and can form clusters according to one or more topics. We believe that this work can be useful in finding the source for spread of this GA-based clustering of online interactions and reports some results of experiments with real-world data and demonstrates the performance of proposed approach.
1312.2249
Dumitru Erhan
Dumitru Erhan, Christian Szegedy, Alexander Toshev, Dragomir Anguelov
Scalable Object Detection using Deep Neural Networks
null
null
null
null
cs.CV stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Deep convolutional neural networks have recently achieved state-of-the-art performance on a number of image recognition benchmarks, including the ImageNet Large-Scale Visual Recognition Challenge (ILSVRC-2012). The winning model on the localization sub-task was a network that predicts a single bounding box and a confidence score for each object category in the image. Such a model captures the whole-image context around the objects but cannot handle multiple instances of the same object in the image without naively replicating the number of outputs for each instance. In this work, we propose a saliency-inspired neural network model for detection, which predicts a set of class-agnostic bounding boxes along with a single score for each box, corresponding to its likelihood of containing any object of interest. The model naturally handles a variable number of instances for each class and allows for cross-class generalization at the highest levels of the network. We are able to obtain competitive recognition performance on VOC2007 and ILSVRC2012, while using only the top few predicted locations in each image and a small number of neural network evaluations.
[ { "version": "v1", "created": "Sun, 8 Dec 2013 19:40:51 GMT" } ]
2013-12-10T00:00:00
[ [ "Erhan", "Dumitru", "" ], [ "Szegedy", "Christian", "" ], [ "Toshev", "Alexander", "" ], [ "Anguelov", "Dragomir", "" ] ]
TITLE: Scalable Object Detection using Deep Neural Networks ABSTRACT: Deep convolutional neural networks have recently achieved state-of-the-art performance on a number of image recognition benchmarks, including the ImageNet Large-Scale Visual Recognition Challenge (ILSVRC-2012). The winning model on the localization sub-task was a network that predicts a single bounding box and a confidence score for each object category in the image. Such a model captures the whole-image context around the objects but cannot handle multiple instances of the same object in the image without naively replicating the number of outputs for each instance. In this work, we propose a saliency-inspired neural network model for detection, which predicts a set of class-agnostic bounding boxes along with a single score for each box, corresponding to its likelihood of containing any object of interest. The model naturally handles a variable number of instances for each class and allows for cross-class generalization at the highest levels of the network. We are able to obtain competitive recognition performance on VOC2007 and ILSVRC2012, while using only the top few predicted locations in each image and a small number of neural network evaluations.
1312.2306
Rajendra Patel
Rajendra Patel, Arvind Rajawat
Dominant block guided optimal cache size estimation to maximize IPC of embedded software
10 Pages, 4 Figures, 5 Tables, International Journal of Embedded Systems and Applications (IJESA). http://airccse.org/journal/ijesa/current2013.html
null
10.5121/ijesa.2013.3303
null
cs.PF cs.AR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Embedded system software is highly constrained from performance, memory footprint, energy consumption and implementing cost view point. It is always desirable to obtain better Instructions per Cycle. Instruction cache has major contribution in improving IPC. Cache memories are realized on the same chip where the processor is running. This considerably increases the system cost as well. Hence, it is required to maintain a trade off between cache sizes and performance improvement offered. Determining the number of cache lines and size of cache line are important parameters for cache designing. The design space for cache is quite large. It is time taking to execute the given application with different cache sizes on an instruction set simulator to figure out the optimal cache size. In this paper, a technique is proposed to identify a number of cache lines and cache line size for the L1 instruction cache that will offer best or nearly best IPC. Cache size is derived, at a higher abstraction level, from basic block analysis in the Low Level Virtual Machine environment. The cache size estimated is cross validated by simulating the set of benchmark applications with different cache sizes in simple scalar simulator. The proposed method seems to be superior in terms of estimation accuracy and estimation time as compared to the existing methods for estimation of optimal cache size parameters like cache line size, number of cache lines.
[ { "version": "v1", "created": "Mon, 9 Dec 2013 05:17:45 GMT" } ]
2013-12-10T00:00:00
[ [ "Patel", "Rajendra", "" ], [ "Rajawat", "Arvind", "" ] ]
TITLE: Dominant block guided optimal cache size estimation to maximize IPC of embedded software ABSTRACT: Embedded system software is highly constrained from performance, memory footprint, energy consumption and implementing cost view point. It is always desirable to obtain better Instructions per Cycle. Instruction cache has major contribution in improving IPC. Cache memories are realized on the same chip where the processor is running. This considerably increases the system cost as well. Hence, it is required to maintain a trade off between cache sizes and performance improvement offered. Determining the number of cache lines and size of cache line are important parameters for cache designing. The design space for cache is quite large. It is time taking to execute the given application with different cache sizes on an instruction set simulator to figure out the optimal cache size. In this paper, a technique is proposed to identify a number of cache lines and cache line size for the L1 instruction cache that will offer best or nearly best IPC. Cache size is derived, at a higher abstraction level, from basic block analysis in the Low Level Virtual Machine environment. The cache size estimated is cross validated by simulating the set of benchmark applications with different cache sizes in simple scalar simulator. The proposed method seems to be superior in terms of estimation accuracy and estimation time as compared to the existing methods for estimation of optimal cache size parameters like cache line size, number of cache lines.
1312.2375
Ramachandra Rao Kurada Mr.
RamachandraRao Kurada, Dr. K Karteeka Pavan
Novel text categorization by amalgamation of augmented k-nearest neighborhood classification and k-medoids clustering
13 Pages
International Journal of Computational Science & Information Technology(IJCSITY)Vol.1,No.4,Nov2013,ISSN: 2320-7442
10.5121/ijcsity.2013.1406
null
cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Machine learning for text classification is the underpinning of document cataloging, news filtering, document steering and exemplification. In text mining realm, effective feature selection is significant to make the learning task more accurate and competent. One of the traditional lazy text classifier k-Nearest Neighborhood (kNN) has a major pitfall in calculating the similarity between all the objects in training and testing sets, there by leads to exaggeration of both computational complexity of the algorithm and massive consumption of main memory. To diminish these shortcomings in viewpoint of a data-mining practitioner an amalgamative technique is proposed in this paper using a novel restructured version of kNN called AugmentedkNN(AkNN) and k-Medoids(kMdd) clustering.The proposed work comprises preprocesses on the initial training set by imposing attribute feature selection for reduction of high dimensionality, also it detects and excludes the high-fliers samples in the initial training set and restructures a constrictedtraining set. The kMdd clustering algorithm generates the cluster centers (as interior objects) for each category and restructures the constricted training set with centroids. This technique is amalgamated with AkNNclassifier that was prearranged with text mining similarity measures. Eventually, significantweights and ranks were assigned to each object in the new training set based upon their accessory towards the object in testing set. Experiments conducted on Reuters-21578 a UCI benchmark text mining data set, and comparisons with traditional kNNclassifier designates the referredmethod yieldspreeminentrecitalin both clustering and classification.
[ { "version": "v1", "created": "Mon, 9 Dec 2013 10:36:22 GMT" } ]
2013-12-10T00:00:00
[ [ "Kurada", "RamachandraRao", "" ], [ "Pavan", "Dr. K Karteeka", "" ] ]
TITLE: Novel text categorization by amalgamation of augmented k-nearest neighborhood classification and k-medoids clustering ABSTRACT: Machine learning for text classification is the underpinning of document cataloging, news filtering, document steering and exemplification. In text mining realm, effective feature selection is significant to make the learning task more accurate and competent. One of the traditional lazy text classifier k-Nearest Neighborhood (kNN) has a major pitfall in calculating the similarity between all the objects in training and testing sets, there by leads to exaggeration of both computational complexity of the algorithm and massive consumption of main memory. To diminish these shortcomings in viewpoint of a data-mining practitioner an amalgamative technique is proposed in this paper using a novel restructured version of kNN called AugmentedkNN(AkNN) and k-Medoids(kMdd) clustering.The proposed work comprises preprocesses on the initial training set by imposing attribute feature selection for reduction of high dimensionality, also it detects and excludes the high-fliers samples in the initial training set and restructures a constrictedtraining set. The kMdd clustering algorithm generates the cluster centers (as interior objects) for each category and restructures the constricted training set with centroids. This technique is amalgamated with AkNNclassifier that was prearranged with text mining similarity measures. Eventually, significantweights and ranks were assigned to each object in the new training set based upon their accessory towards the object in testing set. Experiments conducted on Reuters-21578 a UCI benchmark text mining data set, and comparisons with traditional kNNclassifier designates the referredmethod yieldspreeminentrecitalin both clustering and classification.
1312.2451
Sarwat Nizamani
Sarwat Nizamani, Nasrullah Memon
CEAI: CCM based Email Authorship Identification Model
null
Egyptian Informatics Journal,Volume 14, Issue 3, November 2013
null
null
cs.LG
http://creativecommons.org/licenses/by-nc-sa/3.0/
In this paper we present a model for email authorship identification (EAI) by employing a Cluster-based Classification (CCM) technique. Traditionally, stylometric features have been successfully employed in various authorship analysis tasks; we extend the traditional feature-set to include some more interesting and effective features for email authorship identification (e.g. the last punctuation mark used in an email, the tendency of an author to use capitalization at the start of an email, or the punctuation after a greeting or farewell). We also included Info Gain feature selection based content features. It is observed that the use of such features in the authorship identification process has a positive impact on the accuracy of the authorship identification task. We performed experiments to justify our arguments and compared the results with other base line models. Experimental results reveal that the proposed CCM-based email authorship identification model, along with the proposed feature set, outperforms the state-of-the-art support vector machine (SVM)-based models, as well as the models proposed by Iqbal et al. [1, 2]. The proposed model attains an accuracy rate of 94% for 10 authors, 89% for 25 authors, and 81% for 50 authors, respectively on Enron dataset, while 89.5% accuracy has been achieved on authors' constructed real email dataset. The results on Enron dataset have been achieved on quite a large number of authors as compared to the models proposed by Iqbal et al. [1, 2].
[ { "version": "v1", "created": "Fri, 6 Dec 2013 18:25:15 GMT" } ]
2013-12-10T00:00:00
[ [ "Nizamani", "Sarwat", "" ], [ "Memon", "Nasrullah", "" ] ]
TITLE: CEAI: CCM based Email Authorship Identification Model ABSTRACT: In this paper we present a model for email authorship identification (EAI) by employing a Cluster-based Classification (CCM) technique. Traditionally, stylometric features have been successfully employed in various authorship analysis tasks; we extend the traditional feature-set to include some more interesting and effective features for email authorship identification (e.g. the last punctuation mark used in an email, the tendency of an author to use capitalization at the start of an email, or the punctuation after a greeting or farewell). We also included Info Gain feature selection based content features. It is observed that the use of such features in the authorship identification process has a positive impact on the accuracy of the authorship identification task. We performed experiments to justify our arguments and compared the results with other base line models. Experimental results reveal that the proposed CCM-based email authorship identification model, along with the proposed feature set, outperforms the state-of-the-art support vector machine (SVM)-based models, as well as the models proposed by Iqbal et al. [1, 2]. The proposed model attains an accuracy rate of 94% for 10 authors, 89% for 25 authors, and 81% for 50 authors, respectively on Enron dataset, while 89.5% accuracy has been achieved on authors' constructed real email dataset. The results on Enron dataset have been achieved on quite a large number of authors as compared to the models proposed by Iqbal et al. [1, 2].
1304.6108
Nicolas Charon
Nicolas Charon, Alain Trouv\'e
The varifold representation of non-oriented shapes for diffeomorphic registration
33 pages, 10 figures
SIAM Journal on Imaging Sciences, 2013, Vol. 6, No. 4 : pp. 2547-2580
10.1137/130918885
null
cs.CG cs.CV math.DG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we address the problem of orientation that naturally arises when representing shapes like curves or surfaces as currents. In the field of computational anatomy, the framework of currents has indeed proved very efficient to model a wide variety of shapes. However, in such approaches, orientation of shapes is a fundamental issue that can lead to several drawbacks in treating certain kind of datasets. More specifically, problems occur with structures like acute pikes because of canceling effects of currents or with data that consists in many disconnected pieces like fiber bundles for which currents require a consistent orientation of all pieces. As a promising alternative to currents, varifolds, introduced in the context of geometric measure theory by F. Almgren, allow the representation of any non-oriented manifold (more generally any non-oriented rectifiable set). In particular, we explain how varifolds can encode numerically non-oriented objects both from the discrete and continuous point of view. We show various ways to build a Hilbert space structure on the set of varifolds based on the theory of reproducing kernels. We show that, unlike the currents' setting, these metrics are consistent with shape volume (theorem 4.1) and we derive a formula for the variation of metric with respect to the shape (theorem 4.2). Finally, we propose a generalization to non-oriented shapes of registration algorithms in the context of Large Deformations Metric Mapping (LDDMM), which we detail with a few examples in the last part of the paper.
[ { "version": "v1", "created": "Mon, 22 Apr 2013 21:03:45 GMT" } ]
2013-12-09T00:00:00
[ [ "Charon", "Nicolas", "" ], [ "Trouvé", "Alain", "" ] ]
TITLE: The varifold representation of non-oriented shapes for diffeomorphic registration ABSTRACT: In this paper, we address the problem of orientation that naturally arises when representing shapes like curves or surfaces as currents. In the field of computational anatomy, the framework of currents has indeed proved very efficient to model a wide variety of shapes. However, in such approaches, orientation of shapes is a fundamental issue that can lead to several drawbacks in treating certain kind of datasets. More specifically, problems occur with structures like acute pikes because of canceling effects of currents or with data that consists in many disconnected pieces like fiber bundles for which currents require a consistent orientation of all pieces. As a promising alternative to currents, varifolds, introduced in the context of geometric measure theory by F. Almgren, allow the representation of any non-oriented manifold (more generally any non-oriented rectifiable set). In particular, we explain how varifolds can encode numerically non-oriented objects both from the discrete and continuous point of view. We show various ways to build a Hilbert space structure on the set of varifolds based on the theory of reproducing kernels. We show that, unlike the currents' setting, these metrics are consistent with shape volume (theorem 4.1) and we derive a formula for the variation of metric with respect to the shape (theorem 4.2). Finally, we propose a generalization to non-oriented shapes of registration algorithms in the context of Large Deformations Metric Mapping (LDDMM), which we detail with a few examples in the last part of the paper.
1305.6489
Junzhou Zhao
Junzhou Zhao and John C. S. Lui and Don Towsley and Xiaohong Guan and Pinghui Wang
Social Sensor Placement in Large Scale Networks: A Graph Sampling Perspective
10 pages, 8 figures
null
null
null
cs.SI physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Sensor placement for the purpose of detecting/tracking news outbreak and preventing rumor spreading is a challenging problem in a large scale online social network (OSN). This problem is a kind of subset selection problem: choosing a small set of items from a large population so to maximize some prespecified set function. However, it is known to be NP-complete. Existing heuristics are very costly especially for modern OSNs which usually contain hundreds of millions of users. This paper aims to design methods to find \emph{good solutions} that can well trade off efficiency and accuracy. We first show that it is possible to obtain a high quality solution with a probabilistic guarantee from a "{\em candidate set}" of the underlying social network. By exploring this candidate set, one can increase the efficiency of placing social sensors. We also present how this candidate set can be obtained using "{\em graph sampling}", which has an advantage over previous methods of not requiring the prior knowledge of the complete network topology. Experiments carried out on two real datasets demonstrate not only the accuracy and efficiency of our approach, but also effectiveness in detecting and predicting news outbreak.
[ { "version": "v1", "created": "Tue, 28 May 2013 13:49:00 GMT" }, { "version": "v2", "created": "Fri, 6 Dec 2013 09:19:57 GMT" } ]
2013-12-09T00:00:00
[ [ "Zhao", "Junzhou", "" ], [ "Lui", "John C. S.", "" ], [ "Towsley", "Don", "" ], [ "Guan", "Xiaohong", "" ], [ "Wang", "Pinghui", "" ] ]
TITLE: Social Sensor Placement in Large Scale Networks: A Graph Sampling Perspective ABSTRACT: Sensor placement for the purpose of detecting/tracking news outbreak and preventing rumor spreading is a challenging problem in a large scale online social network (OSN). This problem is a kind of subset selection problem: choosing a small set of items from a large population so to maximize some prespecified set function. However, it is known to be NP-complete. Existing heuristics are very costly especially for modern OSNs which usually contain hundreds of millions of users. This paper aims to design methods to find \emph{good solutions} that can well trade off efficiency and accuracy. We first show that it is possible to obtain a high quality solution with a probabilistic guarantee from a "{\em candidate set}" of the underlying social network. By exploring this candidate set, one can increase the efficiency of placing social sensors. We also present how this candidate set can be obtained using "{\em graph sampling}", which has an advantage over previous methods of not requiring the prior knowledge of the complete network topology. Experiments carried out on two real datasets demonstrate not only the accuracy and efficiency of our approach, but also effectiveness in detecting and predicting news outbreak.
1310.0354
Gary Huang
Gary B. Huang and Viren Jain
Deep and Wide Multiscale Recursive Networks for Robust Image Labeling
null
null
null
null
cs.CV cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Feedforward multilayer networks trained by supervised learning have recently demonstrated state of the art performance on image labeling problems such as boundary prediction and scene parsing. As even very low error rates can limit practical usage of such systems, methods that perform closer to human accuracy remain desirable. In this work, we propose a new type of network with the following properties that address what we hypothesize to be limiting aspects of existing methods: (1) a `wide' structure with thousands of features, (2) a large field of view, (3) recursive iterations that exploit statistical dependencies in label space, and (4) a parallelizable architecture that can be trained in a fraction of the time compared to benchmark multilayer convolutional networks. For the specific image labeling problem of boundary prediction, we also introduce a novel example weighting algorithm that improves segmentation accuracy. Experiments in the challenging domain of connectomic reconstruction of neural circuity from 3d electron microscopy data show that these "Deep And Wide Multiscale Recursive" (DAWMR) networks lead to new levels of image labeling performance. The highest performing architecture has twelve layers, interwoven supervised and unsupervised stages, and uses an input field of view of 157,464 voxels ($54^3$) to make a prediction at each image location. We present an associated open source software package that enables the simple and flexible creation of DAWMR networks.
[ { "version": "v1", "created": "Tue, 1 Oct 2013 15:42:54 GMT" }, { "version": "v2", "created": "Wed, 30 Oct 2013 21:16:45 GMT" }, { "version": "v3", "created": "Fri, 6 Dec 2013 17:00:03 GMT" } ]
2013-12-09T00:00:00
[ [ "Huang", "Gary B.", "" ], [ "Jain", "Viren", "" ] ]
TITLE: Deep and Wide Multiscale Recursive Networks for Robust Image Labeling ABSTRACT: Feedforward multilayer networks trained by supervised learning have recently demonstrated state of the art performance on image labeling problems such as boundary prediction and scene parsing. As even very low error rates can limit practical usage of such systems, methods that perform closer to human accuracy remain desirable. In this work, we propose a new type of network with the following properties that address what we hypothesize to be limiting aspects of existing methods: (1) a `wide' structure with thousands of features, (2) a large field of view, (3) recursive iterations that exploit statistical dependencies in label space, and (4) a parallelizable architecture that can be trained in a fraction of the time compared to benchmark multilayer convolutional networks. For the specific image labeling problem of boundary prediction, we also introduce a novel example weighting algorithm that improves segmentation accuracy. Experiments in the challenging domain of connectomic reconstruction of neural circuity from 3d electron microscopy data show that these "Deep And Wide Multiscale Recursive" (DAWMR) networks lead to new levels of image labeling performance. The highest performing architecture has twelve layers, interwoven supervised and unsupervised stages, and uses an input field of view of 157,464 voxels ($54^3$) to make a prediction at each image location. We present an associated open source software package that enables the simple and flexible creation of DAWMR networks.
1312.1685
Suranjan Ganguly
Arindam Kar, Debotosh Bhattacharjee, Dipak Kumar Basu, Mita Nasipuri, Mahantapas Kundu
Human Face Recognition using Gabor based Kernel Entropy Component Analysis
October, 2012. International Journal of Computer Vision and Image Processing : IGI Global(USA), 2012. arXiv admin note: substantial text overlap with arXiv:1312.1517, arXiv:1312.1520
null
null
null
cs.CV
http://creativecommons.org/licenses/publicdomain/
In this paper, we present a novel Gabor wavelet based Kernel Entropy Component Analysis (KECA) method by integrating the Gabor wavelet transformation (GWT) of facial images with the KECA method for enhanced face recognition performance. Firstly, from the Gabor wavelet transformed images the most important discriminative desirable facial features characterized by spatial frequency, spatial locality and orientation selectivity to cope with the variations due to illumination and facial expression changes were derived. After that KECA, relating to the Renyi entropy is extended to include cosine kernel function. The KECA with the cosine kernels is then applied on the extracted most important discriminating feature vectors of facial images to obtain only those real kernel ECA eigenvectors that are associated with eigenvalues having positive entropy contribution. Finally, these real KECA features are used for image classification using the L1, L2 distance measures; the Mahalanobis distance measure and the cosine similarity measure. The feasibility of the Gabor based KECA method with the cosine kernel has been successfully tested on both frontal and pose-angled face recognition, using datasets from the ORL, FRAV2D and the FERET database.
[ { "version": "v1", "created": "Thu, 5 Dec 2013 12:36:11 GMT" } ]
2013-12-09T00:00:00
[ [ "Kar", "Arindam", "" ], [ "Bhattacharjee", "Debotosh", "" ], [ "Basu", "Dipak Kumar", "" ], [ "Nasipuri", "Mita", "" ], [ "Kundu", "Mahantapas", "" ] ]
TITLE: Human Face Recognition using Gabor based Kernel Entropy Component Analysis ABSTRACT: In this paper, we present a novel Gabor wavelet based Kernel Entropy Component Analysis (KECA) method by integrating the Gabor wavelet transformation (GWT) of facial images with the KECA method for enhanced face recognition performance. Firstly, from the Gabor wavelet transformed images the most important discriminative desirable facial features characterized by spatial frequency, spatial locality and orientation selectivity to cope with the variations due to illumination and facial expression changes were derived. After that KECA, relating to the Renyi entropy is extended to include cosine kernel function. The KECA with the cosine kernels is then applied on the extracted most important discriminating feature vectors of facial images to obtain only those real kernel ECA eigenvectors that are associated with eigenvalues having positive entropy contribution. Finally, these real KECA features are used for image classification using the L1, L2 distance measures; the Mahalanobis distance measure and the cosine similarity measure. The feasibility of the Gabor based KECA method with the cosine kernel has been successfully tested on both frontal and pose-angled face recognition, using datasets from the ORL, FRAV2D and the FERET database.
1312.1752
Muhammad Marwan Muhammad Fuad
Muhammad Marwan Muhammad Fuad
Particle Swarm Optimization of Information-Content Weighting of Symbolic Aggregate Approximation
The 8th International Conference on Advanced Data Mining and Applications (ADMA 2012)
null
null
null
cs.NE cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Bio-inspired optimization algorithms have been gaining more popularity recently. One of the most important of these algorithms is particle swarm optimization (PSO). PSO is based on the collective intelligence of a swam of particles. Each particle explores a part of the search space looking for the optimal position and adjusts its position according to two factors; the first is its own experience and the second is the collective experience of the whole swarm. PSO has been successfully used to solve many optimization problems. In this work we use PSO to improve the performance of a well-known representation method of time series data which is the symbolic aggregate approximation (SAX). As with other time series representation methods, SAX results in loss of information when applied to represent time series. In this paper we use PSO to propose a new minimum distance WMD for SAX to remedy this problem. Unlike the original minimum distance, the new distance sets different weights to different segments of the time series according to their information content. This weighted minimum distance enhances the performance of SAX as we show through experiments using different time series datasets.
[ { "version": "v1", "created": "Fri, 6 Dec 2013 02:22:59 GMT" } ]
2013-12-09T00:00:00
[ [ "Fuad", "Muhammad Marwan Muhammad", "" ] ]
TITLE: Particle Swarm Optimization of Information-Content Weighting of Symbolic Aggregate Approximation ABSTRACT: Bio-inspired optimization algorithms have been gaining more popularity recently. One of the most important of these algorithms is particle swarm optimization (PSO). PSO is based on the collective intelligence of a swam of particles. Each particle explores a part of the search space looking for the optimal position and adjusts its position according to two factors; the first is its own experience and the second is the collective experience of the whole swarm. PSO has been successfully used to solve many optimization problems. In this work we use PSO to improve the performance of a well-known representation method of time series data which is the symbolic aggregate approximation (SAX). As with other time series representation methods, SAX results in loss of information when applied to represent time series. In this paper we use PSO to propose a new minimum distance WMD for SAX to remedy this problem. Unlike the original minimum distance, the new distance sets different weights to different segments of the time series according to their information content. This weighted minimum distance enhances the performance of SAX as we show through experiments using different time series datasets.
1312.1897
Toni Gruetze
Toni Gruetze, Gjergji Kasneci, Zhe Zuo, Felix Naumann
Bootstrapped Grouping of Results to Ambiguous Person Name Queries
null
null
null
null
cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Some of the main ranking features of today's search engines reflect result popularity and are based on ranking models, such as PageRank, implicit feedback aggregation, and more. While such features yield satisfactory results for a wide range of queries, they aggravate the problem of search for ambiguous entities: Searching for a person yields satisfactory results only if the person we are looking for is represented by a high-ranked Web page and all required information are contained in this page. Otherwise, the user has to either reformulate/refine the query or manually inspect low-ranked results to find the person in question. A possible approach to solve this problem is to cluster the results, so that each cluster represents one of the persons occurring in the answer set. However clustering search results has proven to be a difficult endeavor by itself, where the clusters are typically of moderate quality. A wealth of useful information about persons occurs in Web 2.0 platforms, such as LinkedIn, Wikipedia, Facebook, etc. Being human-generated, the information on these platforms is clean, focused, and already disambiguated. We show that when searching for ambiguous person names the information from such platforms can be bootstrapped to group the results according to the individuals occurring in them. We have evaluated our methods on a hand-labeled dataset of around 5,000 Web pages retrieved from Google queries on 50 ambiguous person names.
[ { "version": "v1", "created": "Fri, 6 Dec 2013 15:50:54 GMT" } ]
2013-12-09T00:00:00
[ [ "Gruetze", "Toni", "" ], [ "Kasneci", "Gjergji", "" ], [ "Zuo", "Zhe", "" ], [ "Naumann", "Felix", "" ] ]
TITLE: Bootstrapped Grouping of Results to Ambiguous Person Name Queries ABSTRACT: Some of the main ranking features of today's search engines reflect result popularity and are based on ranking models, such as PageRank, implicit feedback aggregation, and more. While such features yield satisfactory results for a wide range of queries, they aggravate the problem of search for ambiguous entities: Searching for a person yields satisfactory results only if the person we are looking for is represented by a high-ranked Web page and all required information are contained in this page. Otherwise, the user has to either reformulate/refine the query or manually inspect low-ranked results to find the person in question. A possible approach to solve this problem is to cluster the results, so that each cluster represents one of the persons occurring in the answer set. However clustering search results has proven to be a difficult endeavor by itself, where the clusters are typically of moderate quality. A wealth of useful information about persons occurs in Web 2.0 platforms, such as LinkedIn, Wikipedia, Facebook, etc. Being human-generated, the information on these platforms is clean, focused, and already disambiguated. We show that when searching for ambiguous person names the information from such platforms can be bootstrapped to group the results according to the individuals occurring in them. We have evaluated our methods on a hand-labeled dataset of around 5,000 Web pages retrieved from Google queries on 50 ambiguous person names.
1312.1909
Qi Wang
Qi Wang and Joseph JaJa
From Maxout to Channel-Out: Encoding Information on Sparse Pathways
10 pages including the appendix, 9 figures
null
null
null
cs.NE cs.CV cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Motivated by an important insight from neural science, we propose a new framework for understanding the success of the recently proposed "maxout" networks. The framework is based on encoding information on sparse pathways and recognizing the correct pathway at inference time. Elaborating further on this insight, we propose a novel deep network architecture, called "channel-out" network, which takes a much better advantage of sparse pathway encoding. In channel-out networks, pathways are not only formed a posteriori, but they are also actively selected according to the inference outputs from the lower layers. From a mathematical perspective, channel-out networks can represent a wider class of piece-wise continuous functions, thereby endowing the network with more expressive power than that of maxout networks. We test our channel-out networks on several well-known image classification benchmarks, setting new state-of-the-art performance on CIFAR-100 and STL-10, which represent some of the "harder" image classification benchmarks.
[ { "version": "v1", "created": "Mon, 18 Nov 2013 17:56:11 GMT" } ]
2013-12-09T00:00:00
[ [ "Wang", "Qi", "" ], [ "JaJa", "Joseph", "" ] ]
TITLE: From Maxout to Channel-Out: Encoding Information on Sparse Pathways ABSTRACT: Motivated by an important insight from neural science, we propose a new framework for understanding the success of the recently proposed "maxout" networks. The framework is based on encoding information on sparse pathways and recognizing the correct pathway at inference time. Elaborating further on this insight, we propose a novel deep network architecture, called "channel-out" network, which takes a much better advantage of sparse pathway encoding. In channel-out networks, pathways are not only formed a posteriori, but they are also actively selected according to the inference outputs from the lower layers. From a mathematical perspective, channel-out networks can represent a wider class of piece-wise continuous functions, thereby endowing the network with more expressive power than that of maxout networks. We test our channel-out networks on several well-known image classification benchmarks, setting new state-of-the-art performance on CIFAR-100 and STL-10, which represent some of the "harder" image classification benchmarks.
1312.1121
Jan Palczewski
Anna Palczewska and Jan Palczewski and Richard Marchese Robinson and Daniel Neagu
Interpreting random forest classification models using a feature contribution method
null
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Model interpretation is one of the key aspects of the model evaluation process. The explanation of the relationship between model variables and outputs is relatively easy for statistical models, such as linear regressions, thanks to the availability of model parameters and their statistical significance. For "black box" models, such as random forest, this information is hidden inside the model structure. This work presents an approach for computing feature contributions for random forest classification models. It allows for the determination of the influence of each variable on the model prediction for an individual instance. By analysing feature contributions for a training dataset, the most significant variables can be determined and their typical contribution towards predictions made for individual classes, i.e., class-specific feature contribution "patterns", are discovered. These patterns represent a standard behaviour of the model and allow for an additional assessment of the model reliability for a new data. Interpretation of feature contributions for two UCI benchmark datasets shows the potential of the proposed methodology. The robustness of results is demonstrated through an extensive analysis of feature contributions calculated for a large number of generated random forest models.
[ { "version": "v1", "created": "Wed, 4 Dec 2013 11:57:53 GMT" } ]
2013-12-05T00:00:00
[ [ "Palczewska", "Anna", "" ], [ "Palczewski", "Jan", "" ], [ "Robinson", "Richard Marchese", "" ], [ "Neagu", "Daniel", "" ] ]
TITLE: Interpreting random forest classification models using a feature contribution method ABSTRACT: Model interpretation is one of the key aspects of the model evaluation process. The explanation of the relationship between model variables and outputs is relatively easy for statistical models, such as linear regressions, thanks to the availability of model parameters and their statistical significance. For "black box" models, such as random forest, this information is hidden inside the model structure. This work presents an approach for computing feature contributions for random forest classification models. It allows for the determination of the influence of each variable on the model prediction for an individual instance. By analysing feature contributions for a training dataset, the most significant variables can be determined and their typical contribution towards predictions made for individual classes, i.e., class-specific feature contribution "patterns", are discovered. These patterns represent a standard behaviour of the model and allow for an additional assessment of the model reliability for a new data. Interpretation of feature contributions for two UCI benchmark datasets shows the potential of the proposed methodology. The robustness of results is demonstrated through an extensive analysis of feature contributions calculated for a large number of generated random forest models.
1310.0036
Saptarshi Bhattacharjee
Saptarshi Bhattacharjee, S Arunkumar, Samir Kumar Bandyopadhyay
Personal Identification from Lip-Print Features using a Statistical Model
5 pages, 7 images, Published with International Journal of Computer Applications (IJCA)
null
10.5120/8817-2801
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents a novel approach towards identification of human beings from the statistical analysis of their lip prints. Lip features are extracted by studying the spatial orientations of the grooves present in lip prints of individuals using standard edge detection techniques. Horizontal, vertical and diagonal groove features are analysed using connected-component analysis to generate the region-specific edge datasets. Comparison between test and reference sample datasets against a threshold value to define a match yield satisfactory results. FAR, FRR and ROC metrics have been used to gauge the performance of the algorithm for real-world deployment in unimodal and multimodal biometric verification systems.
[ { "version": "v1", "created": "Mon, 30 Sep 2013 20:12:02 GMT" } ]
2013-12-04T00:00:00
[ [ "Bhattacharjee", "Saptarshi", "" ], [ "Arunkumar", "S", "" ], [ "Bandyopadhyay", "Samir Kumar", "" ] ]
TITLE: Personal Identification from Lip-Print Features using a Statistical Model ABSTRACT: This paper presents a novel approach towards identification of human beings from the statistical analysis of their lip prints. Lip features are extracted by studying the spatial orientations of the grooves present in lip prints of individuals using standard edge detection techniques. Horizontal, vertical and diagonal groove features are analysed using connected-component analysis to generate the region-specific edge datasets. Comparison between test and reference sample datasets against a threshold value to define a match yield satisfactory results. FAR, FRR and ROC metrics have been used to gauge the performance of the algorithm for real-world deployment in unimodal and multimodal biometric verification systems.
1311.7071
Zitao Liu
Zitao Liu and Milos Hauskrecht
Sparse Linear Dynamical System with Its Application in Multivariate Clinical Time Series
Appear in Neural Information Processing Systems(NIPS) Workshop on Machine Learning for Clinical Data Analysis and Healthcare 2013
null
null
null
cs.AI cs.LG stat.ML
http://creativecommons.org/licenses/by/3.0/
Linear Dynamical System (LDS) is an elegant mathematical framework for modeling and learning multivariate time series. However, in general, it is difficult to set the dimension of its hidden state space. A small number of hidden states may not be able to model the complexities of a time series, while a large number of hidden states can lead to overfitting. In this paper, we study methods that impose an $\ell_1$ regularization on the transition matrix of an LDS model to alleviate the problem of choosing the optimal number of hidden states. We incorporate a generalized gradient descent method into the Maximum a Posteriori (MAP) framework and use Expectation Maximization (EM) to iteratively achieve sparsity on the transition matrix of an LDS model. We show that our Sparse Linear Dynamical System (SLDS) improves the predictive performance when compared to ordinary LDS on a multivariate clinical time series dataset.
[ { "version": "v1", "created": "Wed, 27 Nov 2013 18:58:07 GMT" }, { "version": "v2", "created": "Tue, 3 Dec 2013 20:08:28 GMT" } ]
2013-12-04T00:00:00
[ [ "Liu", "Zitao", "" ], [ "Hauskrecht", "Milos", "" ] ]
TITLE: Sparse Linear Dynamical System with Its Application in Multivariate Clinical Time Series ABSTRACT: Linear Dynamical System (LDS) is an elegant mathematical framework for modeling and learning multivariate time series. However, in general, it is difficult to set the dimension of its hidden state space. A small number of hidden states may not be able to model the complexities of a time series, while a large number of hidden states can lead to overfitting. In this paper, we study methods that impose an $\ell_1$ regularization on the transition matrix of an LDS model to alleviate the problem of choosing the optimal number of hidden states. We incorporate a generalized gradient descent method into the Maximum a Posteriori (MAP) framework and use Expectation Maximization (EM) to iteratively achieve sparsity on the transition matrix of an LDS model. We show that our Sparse Linear Dynamical System (SLDS) improves the predictive performance when compared to ordinary LDS on a multivariate clinical time series dataset.
1312.0860
Zhiting Hu
Zhiting Hu, Chong Wang, Junjie Yao, Eric Xing, Hongzhi Yin, Bin Cui
Community Specific Temporal Topic Discovery from Social Media
12 pages, 16 figures, submitted to VLDB 2014
null
null
null
cs.SI physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Studying temporal dynamics of topics in social media is very useful to understand online user behaviors. Most of the existing work on this subject usually monitors the global trends, ignoring variation among communities. Since users from different communities tend to have varying tastes and interests, capturing community-level temporal change can improve the understanding and management of social content. Additionally, it can further facilitate the applications such as community discovery, temporal prediction and online marketing. However, this kind of extraction becomes challenging due to the intricate interactions between community and topic, and intractable computational complexity. In this paper, we take a unified solution towards the community-level topic dynamic extraction. A probabilistic model, CosTot (Community Specific Topics-over-Time) is proposed to uncover the hidden topics and communities, as well as capture community-specific temporal dynamics. Specifically, CosTot considers text, time, and network information simultaneously, and well discovers the interactions between community and topic over time. We then discuss the approximate inference implementation to enable scalable computation of model parameters, especially for large social data. Based on this, the application layer support for multi-scale temporal analysis and community exploration is also investigated. We conduct extensive experimental studies on a large real microblog dataset, and demonstrate the superiority of proposed model on tasks of time stamp prediction, link prediction and topic perplexity.
[ { "version": "v1", "created": "Tue, 3 Dec 2013 15:42:19 GMT" } ]
2013-12-04T00:00:00
[ [ "Hu", "Zhiting", "" ], [ "Wang", "Chong", "" ], [ "Yao", "Junjie", "" ], [ "Xing", "Eric", "" ], [ "Yin", "Hongzhi", "" ], [ "Cui", "Bin", "" ] ]
TITLE: Community Specific Temporal Topic Discovery from Social Media ABSTRACT: Studying temporal dynamics of topics in social media is very useful to understand online user behaviors. Most of the existing work on this subject usually monitors the global trends, ignoring variation among communities. Since users from different communities tend to have varying tastes and interests, capturing community-level temporal change can improve the understanding and management of social content. Additionally, it can further facilitate the applications such as community discovery, temporal prediction and online marketing. However, this kind of extraction becomes challenging due to the intricate interactions between community and topic, and intractable computational complexity. In this paper, we take a unified solution towards the community-level topic dynamic extraction. A probabilistic model, CosTot (Community Specific Topics-over-Time) is proposed to uncover the hidden topics and communities, as well as capture community-specific temporal dynamics. Specifically, CosTot considers text, time, and network information simultaneously, and well discovers the interactions between community and topic over time. We then discuss the approximate inference implementation to enable scalable computation of model parameters, especially for large social data. Based on this, the application layer support for multi-scale temporal analysis and community exploration is also investigated. We conduct extensive experimental studies on a large real microblog dataset, and demonstrate the superiority of proposed model on tasks of time stamp prediction, link prediction and topic perplexity.
1308.0371
Benjamin Graham
Benjamin Graham
Sparse arrays of signatures for online character recognition
10 pages, 2 figures
null
null
null
cs.CV cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In mathematics the signature of a path is a collection of iterated integrals, commonly used for solving differential equations. We show that the path signature, used as a set of features for consumption by a convolutional neural network (CNN), improves the accuracy of online character recognition---that is the task of reading characters represented as a collection of paths. Using datasets of letters, numbers, Assamese and Chinese characters, we show that the first, second, and even the third iterated integrals contain useful information for consumption by a CNN. On the CASIA-OLHWDB1.1 3755 Chinese character dataset, our approach gave a test error of 3.58%, compared with 5.61% for a traditional CNN [Ciresan et al.]. A CNN trained on the CASIA-OLHWDB1.0-1.2 datasets won the ICDAR2013 Online Isolated Chinese Character recognition competition. Computationally, we have developed a sparse CNN implementation that make it practical to train CNNs with many layers of max-pooling. Extending the MNIST dataset by translations, our sparse CNN gets a test error of 0.31%.
[ { "version": "v1", "created": "Thu, 1 Aug 2013 22:29:41 GMT" }, { "version": "v2", "created": "Sun, 1 Dec 2013 17:17:06 GMT" } ]
2013-12-03T00:00:00
[ [ "Graham", "Benjamin", "" ] ]
TITLE: Sparse arrays of signatures for online character recognition ABSTRACT: In mathematics the signature of a path is a collection of iterated integrals, commonly used for solving differential equations. We show that the path signature, used as a set of features for consumption by a convolutional neural network (CNN), improves the accuracy of online character recognition---that is the task of reading characters represented as a collection of paths. Using datasets of letters, numbers, Assamese and Chinese characters, we show that the first, second, and even the third iterated integrals contain useful information for consumption by a CNN. On the CASIA-OLHWDB1.1 3755 Chinese character dataset, our approach gave a test error of 3.58%, compared with 5.61% for a traditional CNN [Ciresan et al.]. A CNN trained on the CASIA-OLHWDB1.0-1.2 datasets won the ICDAR2013 Online Isolated Chinese Character recognition competition. Computationally, we have developed a sparse CNN implementation that make it practical to train CNNs with many layers of max-pooling. Extending the MNIST dataset by translations, our sparse CNN gets a test error of 0.31%.
1309.6204
Lei Jin
Lei Jin, Xuelian Long, James Joshi
A Friendship Privacy Attack on Friends and 2-Distant Neighbors in Social Networks
This paper has been withdrawn by the authors
null
null
null
cs.SI cs.CR physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In an undirected social graph, a friendship link involves two users and the friendship is visible in both the users' friend lists. Such a dual visibility of the friendship may raise privacy threats. This is because both users can separately control the visibility of a friendship link to other users and their privacy policies for the link may not be consistent. Even if one of them conceals the link from a third user, the third user may find such a friendship link from another user's friend list. In addition, as most users allow their friends to see their friend lists in most social network systems, an adversary can exploit the inconsistent policies to launch privacy attacks to identify and infer many of a targeted user's friends. In this paper, we propose, analyze and evaluate such an attack which is called Friendship Identification and Inference (FII) attack. In a FII attack scenario, we assume that an adversary can only see his friend list and the friend lists of his friends who do not hide the friend lists from him. Then, a FII attack contains two attack steps: 1) friend identification and 2) friend inference. In the friend identification step, the adversary tries to identify a target's friends based on his friend list and those of his friends. In the friend inference step, the adversary attempts to infer the target's friends by using the proposed random walk with restart approach. We present experimental results using three real social network datasets and show that FII attacks are generally efficient and effective when adversaries and targets are friends or 2-distant neighbors. We also comprehensively analyze the attack results in order to find what values of parameters and network features could promote FII attacks. Currently, most popular social network systems with an undirected friendship graph, such as Facebook, LinkedIn and Foursquare, are susceptible to FII attacks.
[ { "version": "v1", "created": "Tue, 24 Sep 2013 15:13:13 GMT" }, { "version": "v2", "created": "Sun, 1 Dec 2013 14:00:52 GMT" } ]
2013-12-03T00:00:00
[ [ "Jin", "Lei", "" ], [ "Long", "Xuelian", "" ], [ "Joshi", "James", "" ] ]
TITLE: A Friendship Privacy Attack on Friends and 2-Distant Neighbors in Social Networks ABSTRACT: In an undirected social graph, a friendship link involves two users and the friendship is visible in both the users' friend lists. Such a dual visibility of the friendship may raise privacy threats. This is because both users can separately control the visibility of a friendship link to other users and their privacy policies for the link may not be consistent. Even if one of them conceals the link from a third user, the third user may find such a friendship link from another user's friend list. In addition, as most users allow their friends to see their friend lists in most social network systems, an adversary can exploit the inconsistent policies to launch privacy attacks to identify and infer many of a targeted user's friends. In this paper, we propose, analyze and evaluate such an attack which is called Friendship Identification and Inference (FII) attack. In a FII attack scenario, we assume that an adversary can only see his friend list and the friend lists of his friends who do not hide the friend lists from him. Then, a FII attack contains two attack steps: 1) friend identification and 2) friend inference. In the friend identification step, the adversary tries to identify a target's friends based on his friend list and those of his friends. In the friend inference step, the adversary attempts to infer the target's friends by using the proposed random walk with restart approach. We present experimental results using three real social network datasets and show that FII attacks are generally efficient and effective when adversaries and targets are friends or 2-distant neighbors. We also comprehensively analyze the attack results in order to find what values of parameters and network features could promote FII attacks. Currently, most popular social network systems with an undirected friendship graph, such as Facebook, LinkedIn and Foursquare, are susceptible to FII attacks.
1310.4366
Dmitry Ignatov
Elena Nenova and Dmitry I. Ignatov and Andrey V. Konstantinov
An FCA-based Boolean Matrix Factorisation for Collaborative Filtering
http://ceur-ws.org/Vol-977/paper8.pdf
In: C. Carpineto, A. Napoli, S.O. Kuznetsov (eds), FCA Meets IR 2013, Vol. 977, CEUR Workshop Proceeding, 2013. P. 57-73
null
null
cs.IR cs.DS stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a new approach for Collaborative Filtering which is based on Boolean Matrix Factorisation (BMF) and Formal Concept Analysis. In a series of experiments on real data (Movielens dataset) we compare the approach with the SVD- and NMF-based algorithms in terms of Mean Average Error (MAE). One of the experimental consequences is that it is enough to have a binary-scaled rating data to obtain almost the same quality in terms of MAE by BMF than for the SVD-based algorithm in case of non-scaled data.
[ { "version": "v1", "created": "Wed, 16 Oct 2013 13:17:37 GMT" } ]
2013-12-03T00:00:00
[ [ "Nenova", "Elena", "" ], [ "Ignatov", "Dmitry I.", "" ], [ "Konstantinov", "Andrey V.", "" ] ]
TITLE: An FCA-based Boolean Matrix Factorisation for Collaborative Filtering ABSTRACT: We propose a new approach for Collaborative Filtering which is based on Boolean Matrix Factorisation (BMF) and Formal Concept Analysis. In a series of experiments on real data (Movielens dataset) we compare the approach with the SVD- and NMF-based algorithms in terms of Mean Average Error (MAE). One of the experimental consequences is that it is enough to have a binary-scaled rating data to obtain almost the same quality in terms of MAE by BMF than for the SVD-based algorithm in case of non-scaled data.
1312.0182
Haocheng Wu
Haocheng Wu, Yunhua Hu, Hang Li, Enhong Chen
Query Segmentation for Relevance Ranking in Web Search
25 pages, 3 figures
null
null
null
cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we try to answer the question of how to improve the state-of-the-art methods for relevance ranking in web search by query segmentation. Here, by query segmentation it is meant to segment the input query into segments, typically natural language phrases, so that the performance of relevance ranking in search is increased. We propose employing the re-ranking approach in query segmentation, which first employs a generative model to create top $k$ candidates and then employs a discriminative model to re-rank the candidates to obtain the final segmentation result. The method has been widely utilized for structure prediction in natural language processing, but has not been applied to query segmentation, as far as we know. Furthermore, we propose a new method for using the result of query segmentation in relevance ranking, which takes both the original query words and the segmented query phrases as units of query representation. We investigate whether our method can improve three relevance models, namely BM25, key n-gram model, and dependency model. Our experimental results on three large scale web search datasets show that our method can indeed significantly improve relevance ranking in all the three cases.
[ { "version": "v1", "created": "Sun, 1 Dec 2013 07:23:12 GMT" } ]
2013-12-03T00:00:00
[ [ "Wu", "Haocheng", "" ], [ "Hu", "Yunhua", "" ], [ "Li", "Hang", "" ], [ "Chen", "Enhong", "" ] ]
TITLE: Query Segmentation for Relevance Ranking in Web Search ABSTRACT: In this paper, we try to answer the question of how to improve the state-of-the-art methods for relevance ranking in web search by query segmentation. Here, by query segmentation it is meant to segment the input query into segments, typically natural language phrases, so that the performance of relevance ranking in search is increased. We propose employing the re-ranking approach in query segmentation, which first employs a generative model to create top $k$ candidates and then employs a discriminative model to re-rank the candidates to obtain the final segmentation result. The method has been widely utilized for structure prediction in natural language processing, but has not been applied to query segmentation, as far as we know. Furthermore, we propose a new method for using the result of query segmentation in relevance ranking, which takes both the original query words and the segmented query phrases as units of query representation. We investigate whether our method can improve three relevance models, namely BM25, key n-gram model, and dependency model. Our experimental results on three large scale web search datasets show that our method can indeed significantly improve relevance ranking in all the three cases.
1110.0543
Kevin Jorissen
Kevin Jorissen, Fernando D. Vila, and John J. Rehr
A high performance scientific cloud computing environment for materials simulations
null
null
10.1016/j.cpc.2012.04.010
null
physics.comp-ph cond-mat.mtrl-sci cs.CE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We describe the development of a scientific cloud computing (SCC) platform that offers high performance computation capability. The platform consists of a scientific virtual machine prototype containing a UNIX operating system and several materials science codes, together with essential interface tools (an SCC toolset) that offers functionality comparable to local compute clusters. In particular, our SCC toolset provides automatic creation of virtual clusters for parallel computing, including tools for execution and monitoring performance, as well as efficient I/O utilities that enable seamless connections to and from the cloud. Our SCC platform is optimized for the Amazon Elastic Compute Cloud (EC2). We present benchmarks for prototypical scientific applications and demonstrate performance comparable to local compute clusters. To facilitate code execution and provide user-friendly access, we have also integrated cloud computing capability in a JAVA-based GUI. Our SCC platform may be an alternative to traditional HPC resources for materials science or quantum chemistry applications.
[ { "version": "v1", "created": "Mon, 3 Oct 2011 23:35:46 GMT" } ]
2013-12-02T00:00:00
[ [ "Jorissen", "Kevin", "" ], [ "Vila", "Fernando D.", "" ], [ "Rehr", "John J.", "" ] ]
TITLE: A high performance scientific cloud computing environment for materials simulations ABSTRACT: We describe the development of a scientific cloud computing (SCC) platform that offers high performance computation capability. The platform consists of a scientific virtual machine prototype containing a UNIX operating system and several materials science codes, together with essential interface tools (an SCC toolset) that offers functionality comparable to local compute clusters. In particular, our SCC toolset provides automatic creation of virtual clusters for parallel computing, including tools for execution and monitoring performance, as well as efficient I/O utilities that enable seamless connections to and from the cloud. Our SCC platform is optimized for the Amazon Elastic Compute Cloud (EC2). We present benchmarks for prototypical scientific applications and demonstrate performance comparable to local compute clusters. To facilitate code execution and provide user-friendly access, we have also integrated cloud computing capability in a JAVA-based GUI. Our SCC platform may be an alternative to traditional HPC resources for materials science or quantum chemistry applications.
1311.2901
Rob Fergus
Matthew D Zeiler, Rob Fergus
Visualizing and Understanding Convolutional Networks
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Large Convolutional Network models have recently demonstrated impressive classification performance on the ImageNet benchmark. However there is no clear understanding of why they perform so well, or how they might be improved. In this paper we address both issues. We introduce a novel visualization technique that gives insight into the function of intermediate feature layers and the operation of the classifier. We also perform an ablation study to discover the performance contribution from different model layers. This enables us to find model architectures that outperform Krizhevsky \etal on the ImageNet classification benchmark. We show our ImageNet model generalizes well to other datasets: when the softmax classifier is retrained, it convincingly beats the current state-of-the-art results on Caltech-101 and Caltech-256 datasets.
[ { "version": "v1", "created": "Tue, 12 Nov 2013 20:02:22 GMT" }, { "version": "v2", "created": "Wed, 13 Nov 2013 01:48:56 GMT" }, { "version": "v3", "created": "Thu, 28 Nov 2013 23:04:01 GMT" } ]
2013-12-02T00:00:00
[ [ "Zeiler", "Matthew D", "" ], [ "Fergus", "Rob", "" ] ]
TITLE: Visualizing and Understanding Convolutional Networks ABSTRACT: Large Convolutional Network models have recently demonstrated impressive classification performance on the ImageNet benchmark. However there is no clear understanding of why they perform so well, or how they might be improved. In this paper we address both issues. We introduce a novel visualization technique that gives insight into the function of intermediate feature layers and the operation of the classifier. We also perform an ablation study to discover the performance contribution from different model layers. This enables us to find model architectures that outperform Krizhevsky \etal on the ImageNet classification benchmark. We show our ImageNet model generalizes well to other datasets: when the softmax classifier is retrained, it convincingly beats the current state-of-the-art results on Caltech-101 and Caltech-256 datasets.
1311.7213
Alireza Rezvanian
Mohammad Soleimani-Pouri, Alireza Rezvanian, Mohammad Reza Meybodi
Finding a Maximum Clique using Ant Colony Optimization and Particle Swarm Optimization in Social Networks
4 pages, 3 figures, conference
null
10.1109/ASONAM.2012.20
null
cs.SI cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Interaction between users in online social networks plays a key role in social network analysis. One on important types of social group is full connected relation between some users, which known as clique structure. Therefore finding a maximum clique is essential for some analysis. In this paper, we proposed a new method using ant colony optimization algorithm and particle swarm optimization algorithm. In the proposed method, in order to attain better results, it is improved process of pheromone update by particle swarm optimization. Simulation results on popular standard social network benchmarks in comparison standard ant colony optimization algorithm are shown a relative enhancement of proposed algorithm.
[ { "version": "v1", "created": "Thu, 28 Nov 2013 05:43:32 GMT" } ]
2013-12-02T00:00:00
[ [ "Soleimani-Pouri", "Mohammad", "" ], [ "Rezvanian", "Alireza", "" ], [ "Meybodi", "Mohammad Reza", "" ] ]
TITLE: Finding a Maximum Clique using Ant Colony Optimization and Particle Swarm Optimization in Social Networks ABSTRACT: Interaction between users in online social networks plays a key role in social network analysis. One on important types of social group is full connected relation between some users, which known as clique structure. Therefore finding a maximum clique is essential for some analysis. In this paper, we proposed a new method using ant colony optimization algorithm and particle swarm optimization algorithm. In the proposed method, in order to attain better results, it is improved process of pheromone update by particle swarm optimization. Simulation results on popular standard social network benchmarks in comparison standard ant colony optimization algorithm are shown a relative enhancement of proposed algorithm.
1311.7215
Alireza Rezvanian
Aylin Mousavian, Alireza Rezvanian, Mohammad Reza Meybodi
Solving Minimum Vertex Cover Problem Using Learning Automata
5 pages, 5 figures, conference
null
null
null
cs.AI cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Minimum vertex cover problem is an NP-Hard problem with the aim of finding minimum number of vertices to cover graph. In this paper, a learning automaton based algorithm is proposed to find minimum vertex cover in graph. In the proposed algorithm, each vertex of graph is equipped with a learning automaton that has two actions in the candidate or non-candidate of the corresponding vertex cover set. Due to characteristics of learning automata, this algorithm significantly reduces the number of covering vertices of graph. The proposed algorithm based on learning automata iteratively minimize the candidate vertex cover through the update its action probability. As the proposed algorithm proceeds, a candidate solution nears to optimal solution of the minimum vertex cover problem. In order to evaluate the proposed algorithm, several experiments conducted on DIMACS dataset which compared to conventional methods. Experimental results show the major superiority of the proposed algorithm over the other methods.
[ { "version": "v1", "created": "Thu, 28 Nov 2013 05:49:34 GMT" } ]
2013-12-02T00:00:00
[ [ "Mousavian", "Aylin", "" ], [ "Rezvanian", "Alireza", "" ], [ "Meybodi", "Mohammad Reza", "" ] ]
TITLE: Solving Minimum Vertex Cover Problem Using Learning Automata ABSTRACT: Minimum vertex cover problem is an NP-Hard problem with the aim of finding minimum number of vertices to cover graph. In this paper, a learning automaton based algorithm is proposed to find minimum vertex cover in graph. In the proposed algorithm, each vertex of graph is equipped with a learning automaton that has two actions in the candidate or non-candidate of the corresponding vertex cover set. Due to characteristics of learning automata, this algorithm significantly reduces the number of covering vertices of graph. The proposed algorithm based on learning automata iteratively minimize the candidate vertex cover through the update its action probability. As the proposed algorithm proceeds, a candidate solution nears to optimal solution of the minimum vertex cover problem. In order to evaluate the proposed algorithm, several experiments conducted on DIMACS dataset which compared to conventional methods. Experimental results show the major superiority of the proposed algorithm over the other methods.
1108.4142
Aleksandrs Slivkins
Moshe Babaioff, Shaddin Dughmi, Robert Kleinberg and Aleksandrs Slivkins
Dynamic Pricing with Limited Supply
null
null
null
null
cs.GT cs.DS cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the problem of dynamic pricing with limited supply. A seller has $k$ identical items for sale and is facing $n$ potential buyers ("agents") that are arriving sequentially. Each agent is interested in buying one item. Each agent's value for an item is an IID sample from some fixed distribution with support $[0,1]$. The seller offers a take-it-or-leave-it price to each arriving agent (possibly different for different agents), and aims to maximize his expected revenue. We focus on "prior-independent" mechanisms -- ones that do not use any information about the distribution. They are desirable because knowing the distribution is unrealistic in many practical scenarios. We study how the revenue of such mechanisms compares to the revenue of the optimal offline mechanism that knows the distribution ("offline benchmark"). We present a prior-independent dynamic pricing mechanism whose revenue is at most $O((k \log n)^{2/3})$ less than the offline benchmark, for every distribution that is regular. In fact, this guarantee holds without *any* assumptions if the benchmark is relaxed to fixed-price mechanisms. Further, we prove a matching lower bound. The performance guarantee for the same mechanism can be improved to $O(\sqrt{k} \log n)$, with a distribution-dependent constant, if $k/n$ is sufficiently small. We show that, in the worst case over all demand distributions, this is essentially the best rate that can be obtained with a distribution-specific constant. On a technical level, we exploit the connection to multi-armed bandits (MAB). While dynamic pricing with unlimited supply can easily be seen as an MAB problem, the intuition behind MAB approaches breaks when applied to the setting with limited supply. Our high-level conceptual contribution is that even the limited supply setting can be fruitfully treated as a bandit problem.
[ { "version": "v1", "created": "Sat, 20 Aug 2011 20:28:09 GMT" }, { "version": "v2", "created": "Tue, 21 Feb 2012 18:42:22 GMT" }, { "version": "v3", "created": "Tue, 26 Nov 2013 20:08:07 GMT" } ]
2013-11-27T00:00:00
[ [ "Babaioff", "Moshe", "" ], [ "Dughmi", "Shaddin", "" ], [ "Kleinberg", "Robert", "" ], [ "Slivkins", "Aleksandrs", "" ] ]
TITLE: Dynamic Pricing with Limited Supply ABSTRACT: We consider the problem of dynamic pricing with limited supply. A seller has $k$ identical items for sale and is facing $n$ potential buyers ("agents") that are arriving sequentially. Each agent is interested in buying one item. Each agent's value for an item is an IID sample from some fixed distribution with support $[0,1]$. The seller offers a take-it-or-leave-it price to each arriving agent (possibly different for different agents), and aims to maximize his expected revenue. We focus on "prior-independent" mechanisms -- ones that do not use any information about the distribution. They are desirable because knowing the distribution is unrealistic in many practical scenarios. We study how the revenue of such mechanisms compares to the revenue of the optimal offline mechanism that knows the distribution ("offline benchmark"). We present a prior-independent dynamic pricing mechanism whose revenue is at most $O((k \log n)^{2/3})$ less than the offline benchmark, for every distribution that is regular. In fact, this guarantee holds without *any* assumptions if the benchmark is relaxed to fixed-price mechanisms. Further, we prove a matching lower bound. The performance guarantee for the same mechanism can be improved to $O(\sqrt{k} \log n)$, with a distribution-dependent constant, if $k/n$ is sufficiently small. We show that, in the worst case over all demand distributions, this is essentially the best rate that can be obtained with a distribution-specific constant. On a technical level, we exploit the connection to multi-armed bandits (MAB). While dynamic pricing with unlimited supply can easily be seen as an MAB problem, the intuition behind MAB approaches breaks when applied to the setting with limited supply. Our high-level conceptual contribution is that even the limited supply setting can be fruitfully treated as a bandit problem.
1212.3524
Nicolas Tremblay
Nicolas Tremblay, Alain Barrat, Cary Forest, Mark Nornberg, Jean-Fran\c{c}ois Pinton, Pierre Borgnat
Bootstrapping under constraint for the assessment of group behavior in human contact networks
null
Phys. Rev. E 88, 052812 (2013)
10.1103/PhysRevE.88.052812
null
physics.soc-ph cs.SI math.ST stat.TH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The increasing availability of time --and space-- resolved data describing human activities and interactions gives insights into both static and dynamic properties of human behavior. In practice, nevertheless, real-world datasets can often be considered as only one realisation of a particular event. This highlights a key issue in social network analysis: the statistical significance of estimated properties. In this context, we focus here on the assessment of quantitative features of specific subset of nodes in empirical networks. We present a method of statistical resampling based on bootstrapping groups of nodes under constraints within the empirical network. The method enables us to define acceptance intervals for various Null Hypotheses concerning relevant properties of the subset of nodes under consideration, in order to characterize by a statistical test its behavior as ``normal'' or not. We apply this method to a high resolution dataset describing the face-to-face proximity of individuals during two co-located scientific conferences. As a case study, we show how to probe whether co-locating the two conferences succeeded in bringing together the two corresponding groups of scientists.
[ { "version": "v1", "created": "Fri, 14 Dec 2012 16:48:12 GMT" }, { "version": "v2", "created": "Fri, 8 Nov 2013 12:06:21 GMT" } ]
2013-11-27T00:00:00
[ [ "Tremblay", "Nicolas", "" ], [ "Barrat", "Alain", "" ], [ "Forest", "Cary", "" ], [ "Nornberg", "Mark", "" ], [ "Pinton", "Jean-François", "" ], [ "Borgnat", "Pierre", "" ] ]
TITLE: Bootstrapping under constraint for the assessment of group behavior in human contact networks ABSTRACT: The increasing availability of time --and space-- resolved data describing human activities and interactions gives insights into both static and dynamic properties of human behavior. In practice, nevertheless, real-world datasets can often be considered as only one realisation of a particular event. This highlights a key issue in social network analysis: the statistical significance of estimated properties. In this context, we focus here on the assessment of quantitative features of specific subset of nodes in empirical networks. We present a method of statistical resampling based on bootstrapping groups of nodes under constraints within the empirical network. The method enables us to define acceptance intervals for various Null Hypotheses concerning relevant properties of the subset of nodes under consideration, in order to characterize by a statistical test its behavior as ``normal'' or not. We apply this method to a high resolution dataset describing the face-to-face proximity of individuals during two co-located scientific conferences. As a case study, we show how to probe whether co-locating the two conferences succeeded in bringing together the two corresponding groups of scientists.
1212.5284
Diego Perea Mr.
Diego Perea-Vega and Jean-Francois Frigon and Andre Girard
Dual-Based Bounds for Resource Allocation in Zero-forcing Beamforming OFDMA-SDMA Systems
Accepted for publication in EURASIP Journal on Wireless Communications and Networking. arXiv admin note: substantial text overlap with arXiv:1110.1347
EURASIP Journal on Wireless Communications and Networking 2013, 2013:51
10.1186/1687-1499-2013-51
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider multi-antenna base stations using orthogonal frequency division multiple access and space division multiple access techniques to serve single-antenna users. Some users, called real-time users, have minimum rate requirements and must be served in the current time slot while others, called non real-time users, do not have strict timing constraints and are served on a best-effort basis. The resource allocation problem is to find the assignment of users to subcarriers and the transmit beamforming vectors that maximize the total user rates subject to power and minimum rate constraints. In general, this is a nonlinear and non-convex program and the zero-forcing technique used here makes it integer as well, exact optimal solutions cannot be computed in reasonable time for realistic cases. For this reason, we present a technique to compute both upper and lower bounds and show that these are quite close for some realistic cases. First, we formulate the dual problem whose optimum provides an upper bound to all feasible solutions. We then use a simple method to get a primal-feasible point starting from the dual optimal solution, which is a lower bound on the primal optimal solution. Numerical results for several cases show that the two bounds are close so that the dual method can be used to benchmark any heuristic used to solve this problem. As an example, we provide numerical results showing the performance gap of the well-known weight adjustment method and show that there is considerable room for improvement.
[ { "version": "v1", "created": "Thu, 20 Dec 2012 22:12:15 GMT" } ]
2013-11-27T00:00:00
[ [ "Perea-Vega", "Diego", "" ], [ "Frigon", "Jean-Francois", "" ], [ "Girard", "Andre", "" ] ]
TITLE: Dual-Based Bounds for Resource Allocation in Zero-forcing Beamforming OFDMA-SDMA Systems ABSTRACT: We consider multi-antenna base stations using orthogonal frequency division multiple access and space division multiple access techniques to serve single-antenna users. Some users, called real-time users, have minimum rate requirements and must be served in the current time slot while others, called non real-time users, do not have strict timing constraints and are served on a best-effort basis. The resource allocation problem is to find the assignment of users to subcarriers and the transmit beamforming vectors that maximize the total user rates subject to power and minimum rate constraints. In general, this is a nonlinear and non-convex program and the zero-forcing technique used here makes it integer as well, exact optimal solutions cannot be computed in reasonable time for realistic cases. For this reason, we present a technique to compute both upper and lower bounds and show that these are quite close for some realistic cases. First, we formulate the dual problem whose optimum provides an upper bound to all feasible solutions. We then use a simple method to get a primal-feasible point starting from the dual optimal solution, which is a lower bound on the primal optimal solution. Numerical results for several cases show that the two bounds are close so that the dual method can be used to benchmark any heuristic used to solve this problem. As an example, we provide numerical results showing the performance gap of the well-known weight adjustment method and show that there is considerable room for improvement.
1311.4486
Yun-Qian Miao
Yun-Qian Miao, Ahmed K. Farahat, Mohamed S. Kamel
Discriminative Density-ratio Estimation
null
null
null
null
cs.LG
http://creativecommons.org/licenses/by-nc-sa/3.0/
The covariate shift is a challenging problem in supervised learning that results from the discrepancy between the training and test distributions. An effective approach which recently drew a considerable attention in the research community is to reweight the training samples to minimize that discrepancy. In specific, many methods are based on developing Density-ratio (DR) estimation techniques that apply to both regression and classification problems. Although these methods work well for regression problems, their performance on classification problems is not satisfactory. This is due to a key observation that these methods focus on matching the sample marginal distributions without paying attention to preserving the separation between classes in the reweighted space. In this paper, we propose a novel method for Discriminative Density-ratio (DDR) estimation that addresses the aforementioned problem and aims at estimating the density-ratio of joint distributions in a class-wise manner. The proposed algorithm is an iterative procedure that alternates between estimating the class information for the test data and estimating new density ratio for each class. To incorporate the estimated class information of the test data, a soft matching technique is proposed. In addition, we employ an effective criterion which adopts mutual information as an indicator to stop the iterative procedure while resulting in a decision boundary that lies in a sparse region. Experiments on synthetic and benchmark datasets demonstrate the superiority of the proposed method in terms of both accuracy and robustness.
[ { "version": "v1", "created": "Mon, 18 Nov 2013 18:41:20 GMT" }, { "version": "v2", "created": "Tue, 26 Nov 2013 03:20:56 GMT" } ]
2013-11-27T00:00:00
[ [ "Miao", "Yun-Qian", "" ], [ "Farahat", "Ahmed K.", "" ], [ "Kamel", "Mohamed S.", "" ] ]
TITLE: Discriminative Density-ratio Estimation ABSTRACT: The covariate shift is a challenging problem in supervised learning that results from the discrepancy between the training and test distributions. An effective approach which recently drew a considerable attention in the research community is to reweight the training samples to minimize that discrepancy. In specific, many methods are based on developing Density-ratio (DR) estimation techniques that apply to both regression and classification problems. Although these methods work well for regression problems, their performance on classification problems is not satisfactory. This is due to a key observation that these methods focus on matching the sample marginal distributions without paying attention to preserving the separation between classes in the reweighted space. In this paper, we propose a novel method for Discriminative Density-ratio (DDR) estimation that addresses the aforementioned problem and aims at estimating the density-ratio of joint distributions in a class-wise manner. The proposed algorithm is an iterative procedure that alternates between estimating the class information for the test data and estimating new density ratio for each class. To incorporate the estimated class information of the test data, a soft matching technique is proposed. In addition, we employ an effective criterion which adopts mutual information as an indicator to stop the iterative procedure while resulting in a decision boundary that lies in a sparse region. Experiments on synthetic and benchmark datasets demonstrate the superiority of the proposed method in terms of both accuracy and robustness.
1311.6510
Agata Lapedriza
Agata Lapedriza and Hamed Pirsiavash and Zoya Bylinskii and Antonio Torralba
Are all training examples equally valuable?
null
null
null
null
cs.CV cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
When learning a new concept, not all training examples may prove equally useful for training: some may have higher or lower training value than others. The goal of this paper is to bring to the attention of the vision community the following considerations: (1) some examples are better than others for training detectors or classifiers, and (2) in the presence of better examples, some examples may negatively impact performance and removing them may be beneficial. In this paper, we propose an approach for measuring the training value of an example, and use it for ranking and greedily sorting examples. We test our methods on different vision tasks, models, datasets and classifiers. Our experiments show that the performance of current state-of-the-art detectors and classifiers can be improved when training on a subset, rather than the whole training set.
[ { "version": "v1", "created": "Mon, 25 Nov 2013 22:59:24 GMT" } ]
2013-11-27T00:00:00
[ [ "Lapedriza", "Agata", "" ], [ "Pirsiavash", "Hamed", "" ], [ "Bylinskii", "Zoya", "" ], [ "Torralba", "Antonio", "" ] ]
TITLE: Are all training examples equally valuable? ABSTRACT: When learning a new concept, not all training examples may prove equally useful for training: some may have higher or lower training value than others. The goal of this paper is to bring to the attention of the vision community the following considerations: (1) some examples are better than others for training detectors or classifiers, and (2) in the presence of better examples, some examples may negatively impact performance and removing them may be beneficial. In this paper, we propose an approach for measuring the training value of an example, and use it for ranking and greedily sorting examples. We test our methods on different vision tasks, models, datasets and classifiers. Our experiments show that the performance of current state-of-the-art detectors and classifiers can be improved when training on a subset, rather than the whole training set.
1311.6758
Patrick Ott
Patrick Ott and Mark Everingham and Jiri Matas
Detection of Partially Visible Objects
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
An "elephant in the room" for most current object detection and localization methods is the lack of explicit modelling of partial visibility due to occlusion by other objects or truncation by the image boundary. Based on a sliding window approach, we propose a detection method which explicitly models partial visibility by treating it as a latent variable. A novel non-maximum suppression scheme is proposed which takes into account the inferred partial visibility of objects while providing a globally optimal solution. The method gives more detailed scene interpretations than conventional detectors in that we are able to identify the visible parts of an object. We report improved average precision on the PASCAL VOC 2010 dataset compared to a baseline detector.
[ { "version": "v1", "created": "Sun, 24 Nov 2013 16:59:19 GMT" } ]
2013-11-27T00:00:00
[ [ "Ott", "Patrick", "" ], [ "Everingham", "Mark", "" ], [ "Matas", "Jiri", "" ] ]
TITLE: Detection of Partially Visible Objects ABSTRACT: An "elephant in the room" for most current object detection and localization methods is the lack of explicit modelling of partial visibility due to occlusion by other objects or truncation by the image boundary. Based on a sliding window approach, we propose a detection method which explicitly models partial visibility by treating it as a latent variable. A novel non-maximum suppression scheme is proposed which takes into account the inferred partial visibility of objects while providing a globally optimal solution. The method gives more detailed scene interpretations than conventional detectors in that we are able to identify the visible parts of an object. We report improved average precision on the PASCAL VOC 2010 dataset compared to a baseline detector.
1204.0111
Jack Poulson
Jack Poulson, Bj\"orn Engquist, Siwei Li, and Lexing Ying
A parallel sweeping preconditioner for heterogeneous 3D Helmholtz equations
Final version of document
null
10.1137/120871985
null
cs.NA math.NA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A parallelization of a sweeping preconditioner for 3D Helmholtz equations without large cavities is introduced and benchmarked for several challenging velocity models. The setup and application costs of the sequential preconditioner are shown to be O({\gamma}^2 N^{4/3}) and O({\gamma} N log N), where {\gamma}({\omega}) denotes the modestly frequency-dependent number of grid points per Perfectly Matched Layer. Several computational and memory improvements are introduced relative to using black-box sparse-direct solvers for the auxiliary problems, and competitive runtimes and iteration counts are reported for high-frequency problems distributed over thousands of cores. Two open-source packages are released along with this paper: "Parallel Sweeping Preconditioner (PSP)" and the underlying distributed multifrontal solver, "Clique".
[ { "version": "v1", "created": "Sat, 31 Mar 2012 16:00:50 GMT" }, { "version": "v2", "created": "Tue, 3 Apr 2012 02:42:16 GMT" }, { "version": "v3", "created": "Wed, 12 Sep 2012 14:58:33 GMT" }, { "version": "v4", "created": "Tue, 5 Feb 2013 23:01:44 GMT" } ]
2013-11-26T00:00:00
[ [ "Poulson", "Jack", "" ], [ "Engquist", "Björn", "" ], [ "Li", "Siwei", "" ], [ "Ying", "Lexing", "" ] ]
TITLE: A parallel sweeping preconditioner for heterogeneous 3D Helmholtz equations ABSTRACT: A parallelization of a sweeping preconditioner for 3D Helmholtz equations without large cavities is introduced and benchmarked for several challenging velocity models. The setup and application costs of the sequential preconditioner are shown to be O({\gamma}^2 N^{4/3}) and O({\gamma} N log N), where {\gamma}({\omega}) denotes the modestly frequency-dependent number of grid points per Perfectly Matched Layer. Several computational and memory improvements are introduced relative to using black-box sparse-direct solvers for the auxiliary problems, and competitive runtimes and iteration counts are reported for high-frequency problems distributed over thousands of cores. Two open-source packages are released along with this paper: "Parallel Sweeping Preconditioner (PSP)" and the underlying distributed multifrontal solver, "Clique".
1307.5101
Hsiang-Fu Yu
Hsiang-Fu Yu and Prateek Jain and Purushottam Kar and Inderjit S. Dhillon
Large-scale Multi-label Learning with Missing Labels
null
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The multi-label classification problem has generated significant interest in recent years. However, existing approaches do not adequately address two key challenges: (a) the ability to tackle problems with a large number (say millions) of labels, and (b) the ability to handle data with missing labels. In this paper, we directly address both these problems by studying the multi-label problem in a generic empirical risk minimization (ERM) framework. Our framework, despite being simple, is surprisingly able to encompass several recent label-compression based methods which can be derived as special cases of our method. To optimize the ERM problem, we develop techniques that exploit the structure of specific loss functions - such as the squared loss function - to offer efficient algorithms. We further show that our learning framework admits formal excess risk bounds even in the presence of missing labels. Our risk bounds are tight and demonstrate better generalization performance for low-rank promoting trace-norm regularization when compared to (rank insensitive) Frobenius norm regularization. Finally, we present extensive empirical results on a variety of benchmark datasets and show that our methods perform significantly better than existing label compression based methods and can scale up to very large datasets such as the Wikipedia dataset.
[ { "version": "v1", "created": "Thu, 18 Jul 2013 23:55:55 GMT" }, { "version": "v2", "created": "Mon, 14 Oct 2013 22:33:17 GMT" }, { "version": "v3", "created": "Mon, 25 Nov 2013 16:57:43 GMT" } ]
2013-11-26T00:00:00
[ [ "Yu", "Hsiang-Fu", "" ], [ "Jain", "Prateek", "" ], [ "Kar", "Purushottam", "" ], [ "Dhillon", "Inderjit S.", "" ] ]
TITLE: Large-scale Multi-label Learning with Missing Labels ABSTRACT: The multi-label classification problem has generated significant interest in recent years. However, existing approaches do not adequately address two key challenges: (a) the ability to tackle problems with a large number (say millions) of labels, and (b) the ability to handle data with missing labels. In this paper, we directly address both these problems by studying the multi-label problem in a generic empirical risk minimization (ERM) framework. Our framework, despite being simple, is surprisingly able to encompass several recent label-compression based methods which can be derived as special cases of our method. To optimize the ERM problem, we develop techniques that exploit the structure of specific loss functions - such as the squared loss function - to offer efficient algorithms. We further show that our learning framework admits formal excess risk bounds even in the presence of missing labels. Our risk bounds are tight and demonstrate better generalization performance for low-rank promoting trace-norm regularization when compared to (rank insensitive) Frobenius norm regularization. Finally, we present extensive empirical results on a variety of benchmark datasets and show that our methods perform significantly better than existing label compression based methods and can scale up to very large datasets such as the Wikipedia dataset.
1310.0509
Isik Baris Fidaner
I\c{s}{\i}k Bar{\i}\c{s} Fidaner and Ali Taylan Cemgil
Summary Statistics for Partitionings and Feature Allocations
Accepted to NIPS 2013: https://nips.cc/Conferences/2013/Program/event.php?ID=3763
null
null
null
cs.LG stat.ML
http://creativecommons.org/licenses/by-nc-sa/3.0/
Infinite mixture models are commonly used for clustering. One can sample from the posterior of mixture assignments by Monte Carlo methods or find its maximum a posteriori solution by optimization. However, in some problems the posterior is diffuse and it is hard to interpret the sampled partitionings. In this paper, we introduce novel statistics based on block sizes for representing sample sets of partitionings and feature allocations. We develop an element-based definition of entropy to quantify segmentation among their elements. Then we propose a simple algorithm called entropy agglomeration (EA) to summarize and visualize this information. Experiments on various infinite mixture posteriors as well as a feature allocation dataset demonstrate that the proposed statistics are useful in practice.
[ { "version": "v1", "created": "Tue, 1 Oct 2013 22:34:18 GMT" }, { "version": "v2", "created": "Thu, 3 Oct 2013 06:28:18 GMT" }, { "version": "v3", "created": "Sat, 5 Oct 2013 18:26:44 GMT" }, { "version": "v4", "created": "Mon, 25 Nov 2013 08:43:59 GMT" } ]
2013-11-26T00:00:00
[ [ "Fidaner", "Işık Barış", "" ], [ "Cemgil", "Ali Taylan", "" ] ]
TITLE: Summary Statistics for Partitionings and Feature Allocations ABSTRACT: Infinite mixture models are commonly used for clustering. One can sample from the posterior of mixture assignments by Monte Carlo methods or find its maximum a posteriori solution by optimization. However, in some problems the posterior is diffuse and it is hard to interpret the sampled partitionings. In this paper, we introduce novel statistics based on block sizes for representing sample sets of partitionings and feature allocations. We develop an element-based definition of entropy to quantify segmentation among their elements. Then we propose a simple algorithm called entropy agglomeration (EA) to summarize and visualize this information. Experiments on various infinite mixture posteriors as well as a feature allocation dataset demonstrate that the proposed statistics are useful in practice.
1311.5947
Chunhua Shen
Guosheng Lin, Chunhua Shen, Anton van den Hengel, David Suter
Fast Training of Effective Multi-class Boosting Using Coordinate Descent Optimization
Appeared in Proc. Asian Conf. Computer Vision 2012. Code can be downloaded at http://goo.gl/WluhrQ
null
null
null
cs.CV cs.LG stat.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Wepresentanovelcolumngenerationbasedboostingmethod for multi-class classification. Our multi-class boosting is formulated in a single optimization problem as in Shen and Hao (2011). Different from most existing multi-class boosting methods, which use the same set of weak learners for all the classes, we train class specified weak learners (i.e., each class has a different set of weak learners). We show that using separate weak learner sets for each class leads to fast convergence, without introducing additional computational overhead in the training procedure. To further make the training more efficient and scalable, we also propose a fast co- ordinate descent method for solving the optimization problem at each boosting iteration. The proposed coordinate descent method is conceptually simple and easy to implement in that it is a closed-form solution for each coordinate update. Experimental results on a variety of datasets show that, compared to a range of existing multi-class boosting meth- ods, the proposed method has much faster convergence rate and better generalization performance in most cases. We also empirically show that the proposed fast coordinate descent algorithm needs less training time than the MultiBoost algorithm in Shen and Hao (2011).
[ { "version": "v1", "created": "Sat, 23 Nov 2013 02:30:14 GMT" } ]
2013-11-26T00:00:00
[ [ "Lin", "Guosheng", "" ], [ "Shen", "Chunhua", "" ], [ "Hengel", "Anton van den", "" ], [ "Suter", "David", "" ] ]
TITLE: Fast Training of Effective Multi-class Boosting Using Coordinate Descent Optimization ABSTRACT: Wepresentanovelcolumngenerationbasedboostingmethod for multi-class classification. Our multi-class boosting is formulated in a single optimization problem as in Shen and Hao (2011). Different from most existing multi-class boosting methods, which use the same set of weak learners for all the classes, we train class specified weak learners (i.e., each class has a different set of weak learners). We show that using separate weak learner sets for each class leads to fast convergence, without introducing additional computational overhead in the training procedure. To further make the training more efficient and scalable, we also propose a fast co- ordinate descent method for solving the optimization problem at each boosting iteration. The proposed coordinate descent method is conceptually simple and easy to implement in that it is a closed-form solution for each coordinate update. Experimental results on a variety of datasets show that, compared to a range of existing multi-class boosting meth- ods, the proposed method has much faster convergence rate and better generalization performance in most cases. We also empirically show that the proposed fast coordinate descent algorithm needs less training time than the MultiBoost algorithm in Shen and Hao (2011).
1311.6048
Stefano Soatto
Jingming Dong, Jonathan Balzer, Damek Davis, Joshua Hernandez, Stefano Soatto
On the Design and Analysis of Multiple View Descriptors
null
null
null
UCLA CSD TR130024, Nov. 8, 2013
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose an extension of popular descriptors based on gradient orientation histograms (HOG, computed in a single image) to multiple views. It hinges on interpreting HOG as a conditional density in the space of sampled images, where the effects of nuisance factors such as viewpoint and illumination are marginalized. However, such marginalization is performed with respect to a very coarse approximation of the underlying distribution. Our extension leverages on the fact that multiple views of the same scene allow separating intrinsic from nuisance variability, and thus afford better marginalization of the latter. The result is a descriptor that has the same complexity of single-view HOG, and can be compared in the same manner, but exploits multiple views to better trade off insensitivity to nuisance variability with specificity to intrinsic variability. We also introduce a novel multi-view wide-baseline matching dataset, consisting of a mixture of real and synthetic objects with ground truthed camera motion and dense three-dimensional geometry.
[ { "version": "v1", "created": "Sat, 23 Nov 2013 20:38:50 GMT" } ]
2013-11-26T00:00:00
[ [ "Dong", "Jingming", "" ], [ "Balzer", "Jonathan", "" ], [ "Davis", "Damek", "" ], [ "Hernandez", "Joshua", "" ], [ "Soatto", "Stefano", "" ] ]
TITLE: On the Design and Analysis of Multiple View Descriptors ABSTRACT: We propose an extension of popular descriptors based on gradient orientation histograms (HOG, computed in a single image) to multiple views. It hinges on interpreting HOG as a conditional density in the space of sampled images, where the effects of nuisance factors such as viewpoint and illumination are marginalized. However, such marginalization is performed with respect to a very coarse approximation of the underlying distribution. Our extension leverages on the fact that multiple views of the same scene allow separating intrinsic from nuisance variability, and thus afford better marginalization of the latter. The result is a descriptor that has the same complexity of single-view HOG, and can be compared in the same manner, but exploits multiple views to better trade off insensitivity to nuisance variability with specificity to intrinsic variability. We also introduce a novel multi-view wide-baseline matching dataset, consisting of a mixture of real and synthetic objects with ground truthed camera motion and dense three-dimensional geometry.
1311.6334
Charanpal Dhanjal
Charanpal Dhanjal (LTCI), St\'ephan Cl\'emen\c{c}on (LTCI)
Learning Reputation in an Authorship Network
null
null
null
null
cs.SI cs.IR cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The problem of searching for experts in a given academic field is hugely important in both industry and academia. We study exactly this issue with respect to a database of authors and their publications. The idea is to use Latent Semantic Indexing (LSI) and Latent Dirichlet Allocation (LDA) to perform topic modelling in order to find authors who have worked in a query field. We then construct a coauthorship graph and motivate the use of influence maximisation and a variety of graph centrality measures to obtain a ranked list of experts. The ranked lists are further improved using a Markov Chain-based rank aggregation approach. The complete method is readily scalable to large datasets. To demonstrate the efficacy of the approach we report on an extensive set of computational simulations using the Arnetminer dataset. An improvement in mean average precision is demonstrated over the baseline case of simply using the order of authors found by the topic models.
[ { "version": "v1", "created": "Mon, 25 Nov 2013 15:25:28 GMT" } ]
2013-11-26T00:00:00
[ [ "Dhanjal", "Charanpal", "", "LTCI" ], [ "Clémençon", "Stéphan", "", "LTCI" ] ]
TITLE: Learning Reputation in an Authorship Network ABSTRACT: The problem of searching for experts in a given academic field is hugely important in both industry and academia. We study exactly this issue with respect to a database of authors and their publications. The idea is to use Latent Semantic Indexing (LSI) and Latent Dirichlet Allocation (LDA) to perform topic modelling in order to find authors who have worked in a query field. We then construct a coauthorship graph and motivate the use of influence maximisation and a variety of graph centrality measures to obtain a ranked list of experts. The ranked lists are further improved using a Markov Chain-based rank aggregation approach. The complete method is readily scalable to large datasets. To demonstrate the efficacy of the approach we report on an extensive set of computational simulations using the Arnetminer dataset. An improvement in mean average precision is demonstrated over the baseline case of simply using the order of authors found by the topic models.
1311.5595
Alon Shtern
Alon Shtern and Ron Kimmel
On Nonrigid Shape Similarity and Correspondence
null
null
null
null
cs.CV cs.GR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
An important operation in geometry processing is finding the correspondences between pairs of shapes. The Gromov-Hausdorff distance, a measure of dissimilarity between metric spaces, has been found to be highly useful for nonrigid shape comparison. Here, we explore the applicability of related shape similarity measures to the problem of shape correspondence, adopting spectral type distances. We propose to evaluate the spectral kernel distance, the spectral embedding distance and the novel spectral quasi-conformal distance, comparing the manifolds from different viewpoints. By matching the shapes in the spectral domain, important attributes of surface structure are being aligned. For the purpose of testing our ideas, we introduce a fully automatic framework for finding intrinsic correspondence between two shapes. The proposed method achieves state-of-the-art results on the Princeton isometric shape matching protocol applied, as usual, to the TOSCA and SCAPE benchmarks.
[ { "version": "v1", "created": "Mon, 18 Nov 2013 22:08:02 GMT" } ]
2013-11-25T00:00:00
[ [ "Shtern", "Alon", "" ], [ "Kimmel", "Ron", "" ] ]
TITLE: On Nonrigid Shape Similarity and Correspondence ABSTRACT: An important operation in geometry processing is finding the correspondences between pairs of shapes. The Gromov-Hausdorff distance, a measure of dissimilarity between metric spaces, has been found to be highly useful for nonrigid shape comparison. Here, we explore the applicability of related shape similarity measures to the problem of shape correspondence, adopting spectral type distances. We propose to evaluate the spectral kernel distance, the spectral embedding distance and the novel spectral quasi-conformal distance, comparing the manifolds from different viewpoints. By matching the shapes in the spectral domain, important attributes of surface structure are being aligned. For the purpose of testing our ideas, we introduce a fully automatic framework for finding intrinsic correspondence between two shapes. The proposed method achieves state-of-the-art results on the Princeton isometric shape matching protocol applied, as usual, to the TOSCA and SCAPE benchmarks.
1311.5636
Dimitrios Athanasakis Mr
Dimitrios Athanasakis, John Shawe-Taylor, Delmiro Fernandez-Reyes
Learning Non-Linear Feature Maps
null
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Feature selection plays a pivotal role in learning, particularly in areas were parsimonious features can provide insight into the underlying process, such as biology. Recent approaches for non-linear feature selection employing greedy optimisation of Centred Kernel Target Alignment(KTA), while exhibiting strong results in terms of generalisation accuracy and sparsity, can become computationally prohibitive for high-dimensional datasets. We propose randSel, a randomised feature selection algorithm, with attractive scaling properties. Our theoretical analysis of randSel provides strong probabilistic guarantees for the correct identification of relevant features. Experimental results on real and artificial data, show that the method successfully identifies effective features, performing better than a number of competitive approaches.
[ { "version": "v1", "created": "Fri, 22 Nov 2013 01:49:26 GMT" } ]
2013-11-25T00:00:00
[ [ "Athanasakis", "Dimitrios", "" ], [ "Shawe-Taylor", "John", "" ], [ "Fernandez-Reyes", "Delmiro", "" ] ]
TITLE: Learning Non-Linear Feature Maps ABSTRACT: Feature selection plays a pivotal role in learning, particularly in areas were parsimonious features can provide insight into the underlying process, such as biology. Recent approaches for non-linear feature selection employing greedy optimisation of Centred Kernel Target Alignment(KTA), while exhibiting strong results in terms of generalisation accuracy and sparsity, can become computationally prohibitive for high-dimensional datasets. We propose randSel, a randomised feature selection algorithm, with attractive scaling properties. Our theoretical analysis of randSel provides strong probabilistic guarantees for the correct identification of relevant features. Experimental results on real and artificial data, show that the method successfully identifies effective features, performing better than a number of competitive approaches.
1311.5663
Zhengkui Wang
Zhengkui Wang, Yan Chu, Kian-Lee Tan, Divyakant Agrawal, Amr EI Abbadi, Xiaolong Xu
Scalable Data Cube Analysis over Big Data
null
null
null
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Data cubes are widely used as a powerful tool to provide multidimensional views in data warehousing and On-Line Analytical Processing (OLAP). However, with increasing data sizes, it is becoming computationally expensive to perform data cube analysis. The problem is exacerbated by the demand of supporting more complicated aggregate functions (e.g. CORRELATION, Statistical Analysis) as well as supporting frequent view updates in data cubes. This calls for new scalable and efficient data cube analysis systems. In this paper, we introduce HaCube, an extension of MapReduce, designed for efficient parallel data cube analysis on large-scale data by taking advantages from both MapReduce (in terms of scalability) and parallel DBMS (in terms of efficiency). We also provide a general data cube materialization algorithm which is able to facilitate the features in MapReduce-like systems towards an efficient data cube computation. Furthermore, we demonstrate how HaCube supports view maintenance through either incremental computation (e.g. used for SUM or COUNT) or recomputation (e.g. used for MEDIAN or CORRELATION). We implement HaCube by extending Hadoop and evaluate it based on the TPC-D benchmark over billions of tuples on a cluster with over 320 cores. The experimental results demonstrate the efficiency, scalability and practicality of HaCube for cube analysis over a large amount of data in a distributed environment.
[ { "version": "v1", "created": "Fri, 22 Nov 2013 07:48:25 GMT" } ]
2013-11-25T00:00:00
[ [ "Wang", "Zhengkui", "" ], [ "Chu", "Yan", "" ], [ "Tan", "Kian-Lee", "" ], [ "Agrawal", "Divyakant", "" ], [ "Abbadi", "Amr EI", "" ], [ "Xu", "Xiaolong", "" ] ]
TITLE: Scalable Data Cube Analysis over Big Data ABSTRACT: Data cubes are widely used as a powerful tool to provide multidimensional views in data warehousing and On-Line Analytical Processing (OLAP). However, with increasing data sizes, it is becoming computationally expensive to perform data cube analysis. The problem is exacerbated by the demand of supporting more complicated aggregate functions (e.g. CORRELATION, Statistical Analysis) as well as supporting frequent view updates in data cubes. This calls for new scalable and efficient data cube analysis systems. In this paper, we introduce HaCube, an extension of MapReduce, designed for efficient parallel data cube analysis on large-scale data by taking advantages from both MapReduce (in terms of scalability) and parallel DBMS (in terms of efficiency). We also provide a general data cube materialization algorithm which is able to facilitate the features in MapReduce-like systems towards an efficient data cube computation. Furthermore, we demonstrate how HaCube supports view maintenance through either incremental computation (e.g. used for SUM or COUNT) or recomputation (e.g. used for MEDIAN or CORRELATION). We implement HaCube by extending Hadoop and evaluate it based on the TPC-D benchmark over billions of tuples on a cluster with over 320 cores. The experimental results demonstrate the efficiency, scalability and practicality of HaCube for cube analysis over a large amount of data in a distributed environment.
1311.5735
Jose A. Egea
Jose A Egea, David Henriques, Thomas Cokelaer, Alejandro F Villaverde, Julio R Banga, Julio Saez-Rodriguez
MEIGO: an open-source software suite based on metaheuristics for global optimization in systems biology and bioinformatics
12 pages, 7 figures, 1 table
null
null
null
math.OC cs.CE cs.MS q-bio.QM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Optimization is key to solve many problems in computational biology. Global optimization methods provide a robust methodology, and metaheuristics in particular have proven to be the most efficient methods for many applications. Despite their utility, there is limited availability of metaheuristic tools. We present MEIGO, an R and Matlab optimization toolbox (also available in Python via a wrapper of the R version), that implements metaheuristics capable of solving diverse problems arising in systems biology and bioinformatics: enhanced scatter search method (eSS) for continuous nonlinear programming (cNLP) and mixed-integer programming (MINLP) problems, and variable neighborhood search (VNS) for Integer Programming (IP) problems. Both methods can be run on a single-thread or in parallel using a cooperative strategy. The code is supplied under GPLv3 and is available at \url{http://www.iim.csic.es/~gingproc/meigo.html}. Documentation and examples are included. The R package has been submitted to Bioconductor. We evaluate MEIGO against optimization benchmarks, and illustrate its applicability to a series of case studies in bioinformatics and systems biology, outperforming other state-of-the-art methods. MEIGO provides a free, open-source platform for optimization, that can be applied to multiple domains of systems biology and bioinformatics. It includes efficient state of the art metaheuristics, and its open and modular structure allows the addition of further methods.
[ { "version": "v1", "created": "Fri, 22 Nov 2013 12:39:29 GMT" } ]
2013-11-25T00:00:00
[ [ "Egea", "Jose A", "" ], [ "Henriques", "David", "" ], [ "Cokelaer", "Thomas", "" ], [ "Villaverde", "Alejandro F", "" ], [ "Banga", "Julio R", "" ], [ "Saez-Rodriguez", "Julio", "" ] ]
TITLE: MEIGO: an open-source software suite based on metaheuristics for global optimization in systems biology and bioinformatics ABSTRACT: Optimization is key to solve many problems in computational biology. Global optimization methods provide a robust methodology, and metaheuristics in particular have proven to be the most efficient methods for many applications. Despite their utility, there is limited availability of metaheuristic tools. We present MEIGO, an R and Matlab optimization toolbox (also available in Python via a wrapper of the R version), that implements metaheuristics capable of solving diverse problems arising in systems biology and bioinformatics: enhanced scatter search method (eSS) for continuous nonlinear programming (cNLP) and mixed-integer programming (MINLP) problems, and variable neighborhood search (VNS) for Integer Programming (IP) problems. Both methods can be run on a single-thread or in parallel using a cooperative strategy. The code is supplied under GPLv3 and is available at \url{http://www.iim.csic.es/~gingproc/meigo.html}. Documentation and examples are included. The R package has been submitted to Bioconductor. We evaluate MEIGO against optimization benchmarks, and illustrate its applicability to a series of case studies in bioinformatics and systems biology, outperforming other state-of-the-art methods. MEIGO provides a free, open-source platform for optimization, that can be applied to multiple domains of systems biology and bioinformatics. It includes efficient state of the art metaheuristics, and its open and modular structure allows the addition of further methods.
1311.5763
Peter Sarlin
Peter Sarlin
Automated and Weighted Self-Organizing Time Maps
Preprint submitted to a journal
null
null
null
cs.NE cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper proposes schemes for automated and weighted Self-Organizing Time Maps (SOTMs). The SOTM provides means for a visual approach to evolutionary clustering, which aims at producing a sequence of clustering solutions. This task we denote as visual dynamic clustering. The implication of an automated SOTM is not only a data-driven parametrization of the SOTM, but also the feature of adjusting the training to the characteristics of the data at each time step. The aim of the weighted SOTM is to improve learning from more trustworthy or important data with an instance-varying weight. The schemes for automated and weighted SOTMs are illustrated on two real-world datasets: (i) country-level risk indicators to measure the evolution of global imbalances, and (ii) credit applicant data to measure the evolution of firm-level credit risks.
[ { "version": "v1", "created": "Fri, 22 Nov 2013 14:34:38 GMT" } ]
2013-11-25T00:00:00
[ [ "Sarlin", "Peter", "" ] ]
TITLE: Automated and Weighted Self-Organizing Time Maps ABSTRACT: This paper proposes schemes for automated and weighted Self-Organizing Time Maps (SOTMs). The SOTM provides means for a visual approach to evolutionary clustering, which aims at producing a sequence of clustering solutions. This task we denote as visual dynamic clustering. The implication of an automated SOTM is not only a data-driven parametrization of the SOTM, but also the feature of adjusting the training to the characteristics of the data at each time step. The aim of the weighted SOTM is to improve learning from more trustworthy or important data with an instance-varying weight. The schemes for automated and weighted SOTMs are illustrated on two real-world datasets: (i) country-level risk indicators to measure the evolution of global imbalances, and (ii) credit applicant data to measure the evolution of firm-level credit risks.
1311.5816
Bryan Knowles
Bryan Knowles and Rong Yang
Sinkless: A Preliminary Study of Stress Propagation in Group Project Social Networks using a Variant of the Abelian Sandpile Model
11 pages, 8 figures
null
null
null
cs.SI physics.soc-ph
http://creativecommons.org/licenses/by-nc-sa/3.0/
We perform social network analysis on 53 students split over three semesters and 13 groups, using conventional measures like eigenvector centrality, betweeness centrality, and degree centrality, as well as defining a variant of the Abelian Sandpile Model (ASM) with the intention of modeling stress propagation in the college classroom. We correlate the results of these analyses with group project grades received; due to a small or poorly collected dataset, we are unable to conclude that any of these network measures relates to those grades. However, we are successful in using this dataset to define a discrete, recursive, and more generalized variant of the ASM. Abelian Sandpile Model, College Grades, Self-organized Criticality, Sinkless Sandpile Model, Social Network Analysis, Stress Propagation
[ { "version": "v1", "created": "Fri, 22 Nov 2013 17:08:43 GMT" } ]
2013-11-25T00:00:00
[ [ "Knowles", "Bryan", "" ], [ "Yang", "Rong", "" ] ]
TITLE: Sinkless: A Preliminary Study of Stress Propagation in Group Project Social Networks using a Variant of the Abelian Sandpile Model ABSTRACT: We perform social network analysis on 53 students split over three semesters and 13 groups, using conventional measures like eigenvector centrality, betweeness centrality, and degree centrality, as well as defining a variant of the Abelian Sandpile Model (ASM) with the intention of modeling stress propagation in the college classroom. We correlate the results of these analyses with group project grades received; due to a small or poorly collected dataset, we are unable to conclude that any of these network measures relates to those grades. However, we are successful in using this dataset to define a discrete, recursive, and more generalized variant of the ASM. Abelian Sandpile Model, College Grades, Self-organized Criticality, Sinkless Sandpile Model, Social Network Analysis, Stress Propagation