id
large_stringlengths 9
16
| submitter
large_stringlengths 3
64
⌀ | authors
large_stringlengths 5
20.2k
| title
large_stringlengths 5
245
| comments
large_stringlengths 1
482
⌀ | journal-ref
large_stringlengths 4
382
⌀ | doi
large_stringlengths 9
151
⌀ | report-no
large_stringlengths 2
509
⌀ | categories
large_stringlengths 5
78
| license
large_stringclasses 9
values | abstract
large_stringlengths 83
3.55k
| versions
large listlengths 1
21
| update_date
timestamp[ms]date 2007-05-23 00:00:00
2025-05-30 00:00:00
| authors_parsed
large listlengths 1
1.35k
| prompt
large_stringlengths 166
3.64k
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1311.5290 | Odemir Bruno PhD | Wesley Nunes Gon\c{c}alves, Bruno Brandoli Machado, Odemir Martinez
Bruno | Texture descriptor combining fractal dimension and artificial crawlers | 12 pages 9 figures. Paper in press: Physica A: Statistical Mechanics
and its Applications | null | 10.1016/j.physa.2013.10.011 | null | physics.data-an cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Texture is an important visual attribute used to describe images. There are
many methods available for texture analysis. However, they do not capture the
details richness of the image surface. In this paper, we propose a new method
to describe textures using the artificial crawler model. This model assumes
that each agent can interact with the environment and each other. Since this
swarm system alone does not achieve a good discrimination, we developed a new
method to increase the discriminatory power of artificial crawlers, together
with the fractal dimension theory. Here, we estimated the fractal dimension by
the Bouligand-Minkowski method due to its precision in quantifying structural
properties of images. We validate our method on two texture datasets and the
experimental results reveal that our method leads to highly discriminative
textural features. The results indicate that our method can be used in
different texture applications.
| [
{
"version": "v1",
"created": "Thu, 21 Nov 2013 01:51:03 GMT"
}
] | 2013-11-22T00:00:00 | [
[
"Gonçalves",
"Wesley Nunes",
""
],
[
"Machado",
"Bruno Brandoli",
""
],
[
"Bruno",
"Odemir Martinez",
""
]
] | TITLE: Texture descriptor combining fractal dimension and artificial crawlers
ABSTRACT: Texture is an important visual attribute used to describe images. There are
many methods available for texture analysis. However, they do not capture the
details richness of the image surface. In this paper, we propose a new method
to describe textures using the artificial crawler model. This model assumes
that each agent can interact with the environment and each other. Since this
swarm system alone does not achieve a good discrimination, we developed a new
method to increase the discriminatory power of artificial crawlers, together
with the fractal dimension theory. Here, we estimated the fractal dimension by
the Bouligand-Minkowski method due to its precision in quantifying structural
properties of images. We validate our method on two texture datasets and the
experimental results reveal that our method leads to highly discriminative
textural features. The results indicate that our method can be used in
different texture applications.
|
1108.2283 | Federico Schl\"uter | Federico Schl\"uter | A survey on independence-based Markov networks learning | 35 pages, 1 figure | Schl\"uter, F. (2011). A survey on independence-based Markov
networks learning. Artificial Intelligence Review, 1-25 | 10.1007/s10462-012-9346-y | null | cs.AI cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This work reports the most relevant technical aspects in the problem of
learning the \emph{Markov network structure} from data. Such problem has become
increasingly important in machine learning, and many other application fields
of machine learning. Markov networks, together with Bayesian networks, are
probabilistic graphical models, a widely used formalism for handling
probability distributions in intelligent systems. Learning graphical models
from data have been extensively applied for the case of Bayesian networks, but
for Markov networks learning it is not tractable in practice. However, this
situation is changing with time, given the exponential growth of computers
capacity, the plethora of available digital data, and the researching on new
learning technologies. This work stresses on a technology called
independence-based learning, which allows the learning of the independence
structure of those networks from data in an efficient and sound manner,
whenever the dataset is sufficiently large, and data is a representative
sampling of the target distribution. In the analysis of such technology, this
work surveys the current state-of-the-art algorithms for learning Markov
networks structure, discussing its current limitations, and proposing a series
of open problems where future works may produce some advances in the area in
terms of quality and efficiency. The paper concludes by opening a discussion
about how to develop a general formalism for improving the quality of the
structures learned, when data is scarce.
| [
{
"version": "v1",
"created": "Wed, 10 Aug 2011 20:25:08 GMT"
},
{
"version": "v2",
"created": "Wed, 20 Nov 2013 19:15:05 GMT"
}
] | 2013-11-21T00:00:00 | [
[
"Schlüter",
"Federico",
""
]
] | TITLE: A survey on independence-based Markov networks learning
ABSTRACT: This work reports the most relevant technical aspects in the problem of
learning the \emph{Markov network structure} from data. Such problem has become
increasingly important in machine learning, and many other application fields
of machine learning. Markov networks, together with Bayesian networks, are
probabilistic graphical models, a widely used formalism for handling
probability distributions in intelligent systems. Learning graphical models
from data have been extensively applied for the case of Bayesian networks, but
for Markov networks learning it is not tractable in practice. However, this
situation is changing with time, given the exponential growth of computers
capacity, the plethora of available digital data, and the researching on new
learning technologies. This work stresses on a technology called
independence-based learning, which allows the learning of the independence
structure of those networks from data in an efficient and sound manner,
whenever the dataset is sufficiently large, and data is a representative
sampling of the target distribution. In the analysis of such technology, this
work surveys the current state-of-the-art algorithms for learning Markov
networks structure, discussing its current limitations, and proposing a series
of open problems where future works may produce some advances in the area in
terms of quality and efficiency. The paper concludes by opening a discussion
about how to develop a general formalism for improving the quality of the
structures learned, when data is scarce.
|
1311.5018 | Teodor Cioaca | Teodor Cioaca and Horea Caramizaru | On the impact of explicit or semi-implicit integration methods over the
stability of real-time numerical simulations | Submitted to the ROMAI Journal of Applied Mathematics. Presented at
the CAIM 2013 Conference on Applied and Industrial Mathematics | null | null | null | cs.GR | http://creativecommons.org/licenses/by-nc-sa/3.0/ | Physics-based animation of soft or rigid bodies for real-time applications
often suffers from numerical instabilities. We analyse one of the most common
sources of unwanted behaviour: the numerical integration strategy. To assess
the impact of popular integration methods, we consider a scenario where soft
and hard constraints are added to a custom designed deformable linear object.
Since the goal for this class of simulation methods is to attain interactive
frame-rates, we present the drawbacks of using explicit integration methods
over inherently stable, implicit integrators. To help numerical solver
designers better understand the impact of an integrator on a certain simulated
world, we have conceived a method of benchmarking the efficiency of an
integrator with respect to its speed, stability and symplecticity.
| [
{
"version": "v1",
"created": "Wed, 20 Nov 2013 11:30:03 GMT"
}
] | 2013-11-21T00:00:00 | [
[
"Cioaca",
"Teodor",
""
],
[
"Caramizaru",
"Horea",
""
]
] | TITLE: On the impact of explicit or semi-implicit integration methods over the
stability of real-time numerical simulations
ABSTRACT: Physics-based animation of soft or rigid bodies for real-time applications
often suffers from numerical instabilities. We analyse one of the most common
sources of unwanted behaviour: the numerical integration strategy. To assess
the impact of popular integration methods, we consider a scenario where soft
and hard constraints are added to a custom designed deformable linear object.
Since the goal for this class of simulation methods is to attain interactive
frame-rates, we present the drawbacks of using explicit integration methods
over inherently stable, implicit integrators. To help numerical solver
designers better understand the impact of an integrator on a certain simulated
world, we have conceived a method of benchmarking the efficiency of an
integrator with respect to its speed, stability and symplecticity.
|
1107.3724 | Yuri Pirola | Yuri Pirola, Gianluca Della Vedova, Stefano Biffani, Alessandra Stella
and Paola Bonizzoni | Haplotype Inference on Pedigrees with Recombinations, Errors, and
Missing Genotypes via SAT solvers | 14 pages, 1 figure, 4 tables, the associated software reHCstar is
available at http://www.algolab.eu/reHCstar | IEEE/ACM Trans. on Computational Biology and Bioinformatics 9.6
(2012) 1582-1594 | 10.1109/TCBB.2012.100 | null | cs.DS q-bio.PE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The Minimum-Recombinant Haplotype Configuration problem (MRHC) has been
highly successful in providing a sound combinatorial formulation for the
important problem of genotype phasing on pedigrees. Despite several algorithmic
advances and refinements that led to some efficient algorithms, its
applicability to real datasets has been limited by the absence of some
important characteristics of these data in its formulation, such as mutations,
genotyping errors, and missing data.
In this work, we propose the Haplotype Configuration with Recombinations and
Errors problem (HCRE), which generalizes the original MRHC formulation by
incorporating the two most common characteristics of real data: errors and
missing genotypes (including untyped individuals). Although HCRE is
computationally hard, we propose an exact algorithm for the problem based on a
reduction to the well-known Satisfiability problem. Our reduction exploits
recent progresses in the constraint programming literature and, combined with
the use of state-of-the-art SAT solvers, provides a practical solution for the
HCRE problem. Biological soundness of the phasing model and effectiveness (on
both accuracy and performance) of the algorithm are experimentally demonstrated
under several simulated scenarios and on a real dairy cattle population.
| [
{
"version": "v1",
"created": "Tue, 19 Jul 2011 14:25:10 GMT"
}
] | 2013-11-20T00:00:00 | [
[
"Pirola",
"Yuri",
""
],
[
"Della Vedova",
"Gianluca",
""
],
[
"Biffani",
"Stefano",
""
],
[
"Stella",
"Alessandra",
""
],
[
"Bonizzoni",
"Paola",
""
]
] | TITLE: Haplotype Inference on Pedigrees with Recombinations, Errors, and
Missing Genotypes via SAT solvers
ABSTRACT: The Minimum-Recombinant Haplotype Configuration problem (MRHC) has been
highly successful in providing a sound combinatorial formulation for the
important problem of genotype phasing on pedigrees. Despite several algorithmic
advances and refinements that led to some efficient algorithms, its
applicability to real datasets has been limited by the absence of some
important characteristics of these data in its formulation, such as mutations,
genotyping errors, and missing data.
In this work, we propose the Haplotype Configuration with Recombinations and
Errors problem (HCRE), which generalizes the original MRHC formulation by
incorporating the two most common characteristics of real data: errors and
missing genotypes (including untyped individuals). Although HCRE is
computationally hard, we propose an exact algorithm for the problem based on a
reduction to the well-known Satisfiability problem. Our reduction exploits
recent progresses in the constraint programming literature and, combined with
the use of state-of-the-art SAT solvers, provides a practical solution for the
HCRE problem. Biological soundness of the phasing model and effectiveness (on
both accuracy and performance) of the algorithm are experimentally demonstrated
under several simulated scenarios and on a real dairy cattle population.
|
1305.4196 | Ralf Meyer | R. Meyer | Efficient Parallelization of Short-Range Molecular Dynamics Simulations
on Many-Core Systems | 12 pages, 8 figures | Phys. Rev. E 88, 053309 (2013) | 10.1103/PhysRevE.88.053309 | null | physics.comp-ph cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This article introduces a highly parallel algorithm for molecular dynamics
simulations with short-range forces on single node multi- and many-core
systems. The algorithm is designed to achieve high parallel speedups for
strongly inhomogeneous systems like nanodevices or nanostructured materials. In
the proposed scheme the calculation of the forces and the generation of
neighbor lists is divided into small tasks. The tasks are then executed by a
thread pool according to a dependent task schedule. This schedule is
constructed in such a way that a particle is never accessed by two threads at
the same time.Benchmark simulations on a typical 12 core machine show that the
described algorithm achieves excellent parallel efficiencies above 80 % for
different kinds of systems and all numbers of cores. For inhomogeneous systems
the speedups are strongly superior to those obtained with spatial
decomposition. Further benchmarks were performed on an Intel Xeon Phi
coprocessor. These simulations demonstrate that the algorithm scales well to
large numbers of cores.
| [
{
"version": "v1",
"created": "Fri, 17 May 2013 21:41:22 GMT"
},
{
"version": "v2",
"created": "Sun, 22 Sep 2013 18:21:46 GMT"
},
{
"version": "v3",
"created": "Mon, 18 Nov 2013 21:41:52 GMT"
}
] | 2013-11-20T00:00:00 | [
[
"Meyer",
"R.",
""
]
] | TITLE: Efficient Parallelization of Short-Range Molecular Dynamics Simulations
on Many-Core Systems
ABSTRACT: This article introduces a highly parallel algorithm for molecular dynamics
simulations with short-range forces on single node multi- and many-core
systems. The algorithm is designed to achieve high parallel speedups for
strongly inhomogeneous systems like nanodevices or nanostructured materials. In
the proposed scheme the calculation of the forces and the generation of
neighbor lists is divided into small tasks. The tasks are then executed by a
thread pool according to a dependent task schedule. This schedule is
constructed in such a way that a particle is never accessed by two threads at
the same time.Benchmark simulations on a typical 12 core machine show that the
described algorithm achieves excellent parallel efficiencies above 80 % for
different kinds of systems and all numbers of cores. For inhomogeneous systems
the speedups are strongly superior to those obtained with spatial
decomposition. Further benchmarks were performed on an Intel Xeon Phi
coprocessor. These simulations demonstrate that the algorithm scales well to
large numbers of cores.
|
1309.7340 | Jiwei Li | Jiwei Li and Claire Cardie | Early Stage Influenza Detection from Twitter | null | null | null | null | cs.SI cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Influenza is an acute respiratory illness that occurs virtually every year
and results in substantial disease, death and expense. Detection of Influenza
in its earliest stage would facilitate timely action that could reduce the
spread of the illness. Existing systems such as CDC and EISS which try to
collect diagnosis data, are almost entirely manual, resulting in about two-week
delays for clinical data acquisition. Twitter, a popular microblogging service,
provides us with a perfect source for early-stage flu detection due to its
real- time nature. For example, when a flu breaks out, people that get the flu
may post related tweets which enables the detection of the flu breakout
promptly. In this paper, we investigate the real-time flu detection problem on
Twitter data by proposing Flu Markov Network (Flu-MN): a spatio-temporal
unsupervised Bayesian algorithm based on a 4 phase Markov Network, trying to
identify the flu breakout at the earliest stage. We test our model on real
Twitter datasets from the United States along with baselines in multiple
applications, such as real-time flu breakout detection, future epidemic phase
prediction, or Influenza-like illness (ILI) physician visits. Experimental
results show the robustness and effectiveness of our approach. We build up a
real time flu reporting system based on the proposed approach, and we are
hopeful that it would help government or health organizations in identifying
flu outbreaks and facilitating timely actions to decrease unnecessary
mortality.
| [
{
"version": "v1",
"created": "Fri, 27 Sep 2013 19:47:11 GMT"
},
{
"version": "v2",
"created": "Wed, 9 Oct 2013 18:01:47 GMT"
},
{
"version": "v3",
"created": "Mon, 18 Nov 2013 21:09:39 GMT"
}
] | 2013-11-20T00:00:00 | [
[
"Li",
"Jiwei",
""
],
[
"Cardie",
"Claire",
""
]
] | TITLE: Early Stage Influenza Detection from Twitter
ABSTRACT: Influenza is an acute respiratory illness that occurs virtually every year
and results in substantial disease, death and expense. Detection of Influenza
in its earliest stage would facilitate timely action that could reduce the
spread of the illness. Existing systems such as CDC and EISS which try to
collect diagnosis data, are almost entirely manual, resulting in about two-week
delays for clinical data acquisition. Twitter, a popular microblogging service,
provides us with a perfect source for early-stage flu detection due to its
real- time nature. For example, when a flu breaks out, people that get the flu
may post related tweets which enables the detection of the flu breakout
promptly. In this paper, we investigate the real-time flu detection problem on
Twitter data by proposing Flu Markov Network (Flu-MN): a spatio-temporal
unsupervised Bayesian algorithm based on a 4 phase Markov Network, trying to
identify the flu breakout at the earliest stage. We test our model on real
Twitter datasets from the United States along with baselines in multiple
applications, such as real-time flu breakout detection, future epidemic phase
prediction, or Influenza-like illness (ILI) physician visits. Experimental
results show the robustness and effectiveness of our approach. We build up a
real time flu reporting system based on the proposed approach, and we are
hopeful that it would help government or health organizations in identifying
flu outbreaks and facilitating timely actions to decrease unnecessary
mortality.
|
1311.4627 | Andrey Vladimirov | Troy A. Porter, Andrey E. Vladimirov | Calculation of Stochastic Heating and Emissivity of Cosmic Dust Grains
with Optimization for the Intel Many Integrated Core Architecture | 23 pages. Submitted to Computer Physics Communications. Comments to a
subsequent revision will indicate resources from which the source code of the
HEATCODE library can be freely obtained | null | null | null | astro-ph.IM astro-ph.GA cs.DC physics.comp-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Cosmic dust particles effectively attenuate starlight. Their absorption of
starlight produces emission spectra from the near- to far-infrared, which
depends on the sizes and properties of the dust grains, and spectrum of the
heating radiation field. The near- to mid-infrared is dominated by the
emissions by very small grains. Modeling the absorption of starlight by these
particles is, however, computationally expensive and a significant bottleneck
for self-consistent radiation transport codes treating the heating of dust by
stars. In this paper, we summarize the formalism for computing the stochastic
emissivity of cosmic dust, which was developed in earlier works, and present a
new library HEATCODE implementing this formalism for the calculation for
arbitrary grain properties and heating radiation fields. Our library is highly
optimized for general-purpose processors with multiple cores and vector
instructions, with hierarchical memory cache structure. The HEATCODE library
also efficiently runs on co-processor cards implementing the Intel Many
Integrated Core (Intel MIC) architecture. We discuss in detail the optimization
steps that we took in order to optimize for the Intel MIC architecture, which
also significantly benefited the performance of the code on general-purpose
processors, and provide code samples and performance benchmarks for each step.
The HEATCODE library performance on a single Intel Xeon Phi coprocessor (Intel
MIC architecture) is approximately 2 times a general-purpose two-socket
multicore processor system with approximately the same nominal power
consumption. The library supports heterogeneous calculations employing host
processors simultaneously with multiple coprocessors, and can be easily
incorporated into existing radiation transport codes.
| [
{
"version": "v1",
"created": "Tue, 19 Nov 2013 06:11:07 GMT"
}
] | 2013-11-20T00:00:00 | [
[
"Porter",
"Troy A.",
""
],
[
"Vladimirov",
"Andrey E.",
""
]
] | TITLE: Calculation of Stochastic Heating and Emissivity of Cosmic Dust Grains
with Optimization for the Intel Many Integrated Core Architecture
ABSTRACT: Cosmic dust particles effectively attenuate starlight. Their absorption of
starlight produces emission spectra from the near- to far-infrared, which
depends on the sizes and properties of the dust grains, and spectrum of the
heating radiation field. The near- to mid-infrared is dominated by the
emissions by very small grains. Modeling the absorption of starlight by these
particles is, however, computationally expensive and a significant bottleneck
for self-consistent radiation transport codes treating the heating of dust by
stars. In this paper, we summarize the formalism for computing the stochastic
emissivity of cosmic dust, which was developed in earlier works, and present a
new library HEATCODE implementing this formalism for the calculation for
arbitrary grain properties and heating radiation fields. Our library is highly
optimized for general-purpose processors with multiple cores and vector
instructions, with hierarchical memory cache structure. The HEATCODE library
also efficiently runs on co-processor cards implementing the Intel Many
Integrated Core (Intel MIC) architecture. We discuss in detail the optimization
steps that we took in order to optimize for the Intel MIC architecture, which
also significantly benefited the performance of the code on general-purpose
processors, and provide code samples and performance benchmarks for each step.
The HEATCODE library performance on a single Intel Xeon Phi coprocessor (Intel
MIC architecture) is approximately 2 times a general-purpose two-socket
multicore processor system with approximately the same nominal power
consumption. The library supports heterogeneous calculations employing host
processors simultaneously with multiple coprocessors, and can be easily
incorporated into existing radiation transport codes.
|
1311.4731 | Lutz Bornmann Dr. | Lutz Bornmann, Loet Leydesdorff and Jian Wang | How to improve the prediction based on citation impact percentiles for
years shortly after the publication date? | Accepted for publication in the Journal of Informetrics. arXiv admin
note: text overlap with arXiv:1306.4454 | null | null | null | cs.DL stat.AP | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The findings of Bornmann, Leydesdorff, and Wang (in press) revealed that the
consideration of journal impact improves the prediction of long-term citation
impact. This paper further explores the possibility of improving citation
impact measurements on the base of a short citation window by the consideration
of journal impact and other variables, such as the number of authors, the
number of cited references, and the number of pages. The dataset contains
475,391 journal papers published in 1980 and indexed in Web of Science (WoS,
Thomson Reuters), and all annual citation counts (from 1980 to 2010) for these
papers. As an indicator of citation impact, we used percentiles of citations
calculated using the approach of Hazen (1914). Our results show that citation
impact measurement can really be improved: If factors generally influencing
citation impact are considered in the statistical analysis, the explained
variance in the long-term citation impact can be much increased. However, this
increase is only visible when using the years shortly after publication but not
when using later years.
| [
{
"version": "v1",
"created": "Tue, 19 Nov 2013 13:27:14 GMT"
}
] | 2013-11-20T00:00:00 | [
[
"Bornmann",
"Lutz",
""
],
[
"Leydesdorff",
"Loet",
""
],
[
"Wang",
"Jian",
""
]
] | TITLE: How to improve the prediction based on citation impact percentiles for
years shortly after the publication date?
ABSTRACT: The findings of Bornmann, Leydesdorff, and Wang (in press) revealed that the
consideration of journal impact improves the prediction of long-term citation
impact. This paper further explores the possibility of improving citation
impact measurements on the base of a short citation window by the consideration
of journal impact and other variables, such as the number of authors, the
number of cited references, and the number of pages. The dataset contains
475,391 journal papers published in 1980 and indexed in Web of Science (WoS,
Thomson Reuters), and all annual citation counts (from 1980 to 2010) for these
papers. As an indicator of citation impact, we used percentiles of citations
calculated using the approach of Hazen (1914). Our results show that citation
impact measurement can really be improved: If factors generally influencing
citation impact are considered in the statistical analysis, the explained
variance in the long-term citation impact can be much increased. However, this
increase is only visible when using the years shortly after publication but not
when using later years.
|
1307.0468 | Aliaksei Sandryhaila | Aliaksei Sandryhaila, Jose M. F. Moura | Discrete Signal Processing on Graphs: Frequency Analysis | null | null | null | null | cs.SI math.SP | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Signals and datasets that arise in physical and engineering applications, as
well as social, genetics, biomolecular, and many other domains, are becoming
increasingly larger and more complex. In contrast to traditional time and image
signals, data in these domains are supported by arbitrary graphs. Signal
processing on graphs extends concepts and techniques from traditional signal
processing to data indexed by generic graphs. This paper studies the concepts
of low and high frequencies on graphs, and low-, high-, and band-pass graph
filters. In traditional signal processing, there concepts are easily defined
because of a natural frequency ordering that has a physical interpretation. For
signals residing on graphs, in general, there is no obvious frequency ordering.
We propose a definition of total variation for graph signals that naturally
leads to a frequency ordering on graphs and defines low-, high-, and band-pass
graph signals and filters. We study the design of graph filters with specified
frequency response, and illustrate our approach with applications to sensor
malfunction detection and data classification.
| [
{
"version": "v1",
"created": "Mon, 1 Jul 2013 18:33:04 GMT"
},
{
"version": "v2",
"created": "Mon, 18 Nov 2013 19:44:53 GMT"
}
] | 2013-11-19T00:00:00 | [
[
"Sandryhaila",
"Aliaksei",
""
],
[
"Moura",
"Jose M. F.",
""
]
] | TITLE: Discrete Signal Processing on Graphs: Frequency Analysis
ABSTRACT: Signals and datasets that arise in physical and engineering applications, as
well as social, genetics, biomolecular, and many other domains, are becoming
increasingly larger and more complex. In contrast to traditional time and image
signals, data in these domains are supported by arbitrary graphs. Signal
processing on graphs extends concepts and techniques from traditional signal
processing to data indexed by generic graphs. This paper studies the concepts
of low and high frequencies on graphs, and low-, high-, and band-pass graph
filters. In traditional signal processing, there concepts are easily defined
because of a natural frequency ordering that has a physical interpretation. For
signals residing on graphs, in general, there is no obvious frequency ordering.
We propose a definition of total variation for graph signals that naturally
leads to a frequency ordering on graphs and defines low-, high-, and band-pass
graph signals and filters. We study the design of graph filters with specified
frequency response, and illustrate our approach with applications to sensor
malfunction detection and data classification.
|
1310.8428 | Hongyu Su | Hongyu Su, Juho Rousu | Multilabel Classification through Random Graph Ensembles | 15 Pages, 1 Figures | JMLR: Workshop and Conference Proceedings 29:404--418, 2013 | null | null | cs.LG | http://creativecommons.org/licenses/by-nc-sa/3.0/ | We present new methods for multilabel classification, relying on ensemble
learning on a collection of random output graphs imposed on the multilabel and
a kernel-based structured output learner as the base classifier. For ensemble
learning, differences among the output graphs provide the required base
classifier diversity and lead to improved performance in the increasing size of
the ensemble. We study different methods of forming the ensemble prediction,
including majority voting and two methods that perform inferences over the
graph structures before or after combining the base models into the ensemble.
We compare the methods against the state-of-the-art machine learning approaches
on a set of heterogeneous multilabel benchmark problems, including multilabel
AdaBoost, convex multitask feature learning, as well as single target learning
approaches represented by Bagging and SVM. In our experiments, the random graph
ensembles are very competitive and robust, ranking first or second on most of
the datasets. Overall, our results show that random graph ensembles are viable
alternatives to flat multilabel and multitask learners.
| [
{
"version": "v1",
"created": "Thu, 31 Oct 2013 09:00:39 GMT"
},
{
"version": "v2",
"created": "Sun, 17 Nov 2013 04:04:49 GMT"
}
] | 2013-11-19T00:00:00 | [
[
"Su",
"Hongyu",
""
],
[
"Rousu",
"Juho",
""
]
] | TITLE: Multilabel Classification through Random Graph Ensembles
ABSTRACT: We present new methods for multilabel classification, relying on ensemble
learning on a collection of random output graphs imposed on the multilabel and
a kernel-based structured output learner as the base classifier. For ensemble
learning, differences among the output graphs provide the required base
classifier diversity and lead to improved performance in the increasing size of
the ensemble. We study different methods of forming the ensemble prediction,
including majority voting and two methods that perform inferences over the
graph structures before or after combining the base models into the ensemble.
We compare the methods against the state-of-the-art machine learning approaches
on a set of heterogeneous multilabel benchmark problems, including multilabel
AdaBoost, convex multitask feature learning, as well as single target learning
approaches represented by Bagging and SVM. In our experiments, the random graph
ensembles are very competitive and robust, ranking first or second on most of
the datasets. Overall, our results show that random graph ensembles are viable
alternatives to flat multilabel and multitask learners.
|
1311.0805 | Nikolaos Korfiatis | Todor Ivanov, Nikolaos Korfiatis, Roberto V. Zicari | On the inequality of the 3V's of Big Data Architectural Paradigms: A
case for heterogeneity | null | null | null | null | cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The well-known 3V architectural paradigm for Big Data introduced by Laney
(2011), provides a simplified framework for defining the architecture of a big
data platform to be deployed in various scenarios tackling processing of
massive datasets. While additional components such as Variability and Veracity
have been discussed as an extension to the 3V model, the basic components
(volume, variety, velocity) provide a quantitative framework while variability
and veracity target a more qualitative approach. In this paper we argue why the
basic 3V's are not equal due to the different requirements that need to be
covered in case higher demands for a particular "V". Similar to other
conjectures such as the CAP theorem 3V based architectures differ on their
implementation. We call this paradigm heterogeneity and we provide a taxonomy
of the existing tools (as of 2013) covering the Hadoop ecosystem from the
perspective of heterogeneity. This paper contributes on the understanding of
the Hadoop ecosystem from the perspective of different workloads and aims to
help researchers and practitioners on the design of scalable platforms
targeting different operational needs.
| [
{
"version": "v1",
"created": "Mon, 4 Nov 2013 18:29:45 GMT"
},
{
"version": "v2",
"created": "Sat, 16 Nov 2013 19:21:45 GMT"
}
] | 2013-11-19T00:00:00 | [
[
"Ivanov",
"Todor",
""
],
[
"Korfiatis",
"Nikolaos",
""
],
[
"Zicari",
"Roberto V.",
""
]
] | TITLE: On the inequality of the 3V's of Big Data Architectural Paradigms: A
case for heterogeneity
ABSTRACT: The well-known 3V architectural paradigm for Big Data introduced by Laney
(2011), provides a simplified framework for defining the architecture of a big
data platform to be deployed in various scenarios tackling processing of
massive datasets. While additional components such as Variability and Veracity
have been discussed as an extension to the 3V model, the basic components
(volume, variety, velocity) provide a quantitative framework while variability
and veracity target a more qualitative approach. In this paper we argue why the
basic 3V's are not equal due to the different requirements that need to be
covered in case higher demands for a particular "V". Similar to other
conjectures such as the CAP theorem 3V based architectures differ on their
implementation. We call this paradigm heterogeneity and we provide a taxonomy
of the existing tools (as of 2013) covering the Hadoop ecosystem from the
perspective of heterogeneity. This paper contributes on the understanding of
the Hadoop ecosystem from the perspective of different workloads and aims to
help researchers and practitioners on the design of scalable platforms
targeting different operational needs.
|
1311.3982 | Juston Moore | Aaron Schein, Juston Moore, Hanna Wallach | Inferring Multilateral Relations from Dynamic Pairwise Interactions | NIPS 2013 Workshop on Frontiers of Network Analysis | null | null | null | cs.AI cs.SI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Correlations between anomalous activity patterns can yield pertinent
information about complex social processes: a significant deviation from normal
behavior, exhibited simultaneously by multiple pairs of actors, provides
evidence for some underlying relationship involving those pairs---i.e., a
multilateral relation. We introduce a new nonparametric Bayesian latent
variable model that explicitly captures correlations between anomalous
interaction counts and uses these shared deviations from normal activity
patterns to identify and characterize multilateral relations. We showcase our
model's capabilities using the newly curated Global Database of Events,
Location, and Tone, a dataset that has seen considerable interest in the social
sciences and the popular press, but which has is largely unexplored by the
machine learning community. We provide a detailed analysis of the latent
structure inferred by our model and show that the multilateral relations
correspond to major international events and long-term international
relationships. These findings lead us to recommend our model for any
data-driven analysis of interaction networks where dynamic interactions over
the edges provide evidence for latent social structure.
| [
{
"version": "v1",
"created": "Fri, 15 Nov 2013 21:22:37 GMT"
}
] | 2013-11-19T00:00:00 | [
[
"Schein",
"Aaron",
""
],
[
"Moore",
"Juston",
""
],
[
"Wallach",
"Hanna",
""
]
] | TITLE: Inferring Multilateral Relations from Dynamic Pairwise Interactions
ABSTRACT: Correlations between anomalous activity patterns can yield pertinent
information about complex social processes: a significant deviation from normal
behavior, exhibited simultaneously by multiple pairs of actors, provides
evidence for some underlying relationship involving those pairs---i.e., a
multilateral relation. We introduce a new nonparametric Bayesian latent
variable model that explicitly captures correlations between anomalous
interaction counts and uses these shared deviations from normal activity
patterns to identify and characterize multilateral relations. We showcase our
model's capabilities using the newly curated Global Database of Events,
Location, and Tone, a dataset that has seen considerable interest in the social
sciences and the popular press, but which has is largely unexplored by the
machine learning community. We provide a detailed analysis of the latent
structure inferred by our model and show that the multilateral relations
correspond to major international events and long-term international
relationships. These findings lead us to recommend our model for any
data-driven analysis of interaction networks where dynamic interactions over
the edges provide evidence for latent social structure.
|
1311.3987 | Seyed-Mehdi-Reza Beheshti | Seyed-Mehdi-Reza Beheshti and Srikumar Venugopal and Seung Hwan Ryu
and Boualem Benatallah and Wei Wang | Big Data and Cross-Document Coreference Resolution: Current State and
Future Opportunities | null | null | null | null | cs.CL cs.DC cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Information Extraction (IE) is the task of automatically extracting
structured information from unstructured/semi-structured machine-readable
documents. Among various IE tasks, extracting actionable intelligence from
ever-increasing amount of data depends critically upon Cross-Document
Coreference Resolution (CDCR) - the task of identifying entity mentions across
multiple documents that refer to the same underlying entity. Recently, document
datasets of the order of peta-/tera-bytes has raised many challenges for
performing effective CDCR such as scaling to large numbers of mentions and
limited representational power. The problem of analysing such datasets is
called "big data". The aim of this paper is to provide readers with an
understanding of the central concepts, subtasks, and the current
state-of-the-art in CDCR process. We provide assessment of existing
tools/techniques for CDCR subtasks and highlight big data challenges in each of
them to help readers identify important and outstanding issues for further
investigation. Finally, we provide concluding remarks and discuss possible
directions for future work.
| [
{
"version": "v1",
"created": "Thu, 14 Nov 2013 06:10:15 GMT"
}
] | 2013-11-19T00:00:00 | [
[
"Beheshti",
"Seyed-Mehdi-Reza",
""
],
[
"Venugopal",
"Srikumar",
""
],
[
"Ryu",
"Seung Hwan",
""
],
[
"Benatallah",
"Boualem",
""
],
[
"Wang",
"Wei",
""
]
] | TITLE: Big Data and Cross-Document Coreference Resolution: Current State and
Future Opportunities
ABSTRACT: Information Extraction (IE) is the task of automatically extracting
structured information from unstructured/semi-structured machine-readable
documents. Among various IE tasks, extracting actionable intelligence from
ever-increasing amount of data depends critically upon Cross-Document
Coreference Resolution (CDCR) - the task of identifying entity mentions across
multiple documents that refer to the same underlying entity. Recently, document
datasets of the order of peta-/tera-bytes has raised many challenges for
performing effective CDCR such as scaling to large numbers of mentions and
limited representational power. The problem of analysing such datasets is
called "big data". The aim of this paper is to provide readers with an
understanding of the central concepts, subtasks, and the current
state-of-the-art in CDCR process. We provide assessment of existing
tools/techniques for CDCR subtasks and highlight big data challenges in each of
them to help readers identify important and outstanding issues for further
investigation. Finally, we provide concluding remarks and discuss possible
directions for future work.
|
1311.4040 | Miklos Kalman | Miklos Kalman, Ferenc Havasi | Enhanced XML Validation using SRML | 18 pages | International Journal of Web & Semantic Technology (IJWesT) Vol.4,
No.4, October 2013 | 10.5121/ijwest.2013.4401 | null | cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Data validation is becoming more and more important with the ever-growing
amount of data being consumed and transmitted by systems over the Internet. It
is important to ensure that the data being sent is valid as it may contain
entry errors, which may be consumed by different systems causing further
errors. XML has become the defacto standard for data transfer. The XML Schema
Definition language (XSD) was created to help XML structural validation and
provide a schema for data type restrictions, however it does not allow for more
complex situations. In this article we introduce a way to provide rule based
XML validation and correction through the extension and improvement of our SRML
metalanguage. We also explore the option of applying it in a database as a
trigger for CRUD operations allowing more granular dataset validation on an
atomic level allowing for more complex dataset record validation rules.
| [
{
"version": "v1",
"created": "Sat, 16 Nov 2013 09:59:05 GMT"
}
] | 2013-11-19T00:00:00 | [
[
"Kalman",
"Miklos",
""
],
[
"Havasi",
"Ferenc",
""
]
] | TITLE: Enhanced XML Validation using SRML
ABSTRACT: Data validation is becoming more and more important with the ever-growing
amount of data being consumed and transmitted by systems over the Internet. It
is important to ensure that the data being sent is valid as it may contain
entry errors, which may be consumed by different systems causing further
errors. XML has become the defacto standard for data transfer. The XML Schema
Definition language (XSD) was created to help XML structural validation and
provide a schema for data type restrictions, however it does not allow for more
complex situations. In this article we introduce a way to provide rule based
XML validation and correction through the extension and improvement of our SRML
metalanguage. We also explore the option of applying it in a database as a
trigger for CRUD operations allowing more granular dataset validation on an
atomic level allowing for more complex dataset record validation rules.
|
1311.4252 | Odemir Bruno PhD | Andr\'e Ricardo Backes, Dalcimar Casanova, Odemir Martinez Bruno | Contour polygonal approximation using shortest path in networks | 12 pages, 12 figures | null | 10.1142/S0129183113500903 | null | physics.comp-ph cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Contour polygonal approximation is a simplified representation of a contour
by line segments, so that the main characteristics of the contour remain in a
small number of line segments. This paper presents a novel method for polygonal
approximation based on the Complex Networks theory. We convert each point of
the contour into a vertex, so that we model a regular network. Then we
transform this network into a Small-World Complex Network by applying some
transformations over its edges. By analyzing of network properties, especially
the geodesic path, we compute the polygonal approximation. The paper presents
the main characteristics of the method, as well as its functionality. We
evaluate the proposed method using benchmark contours, and compare its results
with other polygonal approximation methods.
| [
{
"version": "v1",
"created": "Mon, 18 Nov 2013 03:16:55 GMT"
}
] | 2013-11-19T00:00:00 | [
[
"Backes",
"André Ricardo",
""
],
[
"Casanova",
"Dalcimar",
""
],
[
"Bruno",
"Odemir Martinez",
""
]
] | TITLE: Contour polygonal approximation using shortest path in networks
ABSTRACT: Contour polygonal approximation is a simplified representation of a contour
by line segments, so that the main characteristics of the contour remain in a
small number of line segments. This paper presents a novel method for polygonal
approximation based on the Complex Networks theory. We convert each point of
the contour into a vertex, so that we model a regular network. Then we
transform this network into a Small-World Complex Network by applying some
transformations over its edges. By analyzing of network properties, especially
the geodesic path, we compute the polygonal approximation. The paper presents
the main characteristics of the method, as well as its functionality. We
evaluate the proposed method using benchmark contours, and compare its results
with other polygonal approximation methods.
|
1311.4305 | Tomofumi Yuki | Tomofumi Yuki and Paul Feautrier and Sanjay Rajopadhye and Vijay
Saraswat | Checking Race Freedom of Clocked X10 Programs | 11 pages | null | null | null | cs.DC cs.PL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | One of many approaches to better take advantage of parallelism, which has now
become mainstream, is the introduction of parallel programming languages.
However, parallelism is by nature non-deterministic, and not all parallel bugs
can be avoided by language design. This paper proposes a method for
guaranteeing absence of data races in the polyhedral subset of clocked X10
programs.
Clocks in X10 are similar to barriers, but are more dynamic; the subset of
processes that participate in the synchronization can dynamically change at
runtime. We construct the happens-before relation for clocked X10 programs, and
show that the problem of race detection is undecidable. However, in many
practical cases, modern tools are able to find solutions or disprove their
existence. We present a set of benchmarks for which the analysis is possible
and has an acceptable running time.
| [
{
"version": "v1",
"created": "Mon, 18 Nov 2013 09:36:31 GMT"
}
] | 2013-11-19T00:00:00 | [
[
"Yuki",
"Tomofumi",
""
],
[
"Feautrier",
"Paul",
""
],
[
"Rajopadhye",
"Sanjay",
""
],
[
"Saraswat",
"Vijay",
""
]
] | TITLE: Checking Race Freedom of Clocked X10 Programs
ABSTRACT: One of many approaches to better take advantage of parallelism, which has now
become mainstream, is the introduction of parallel programming languages.
However, parallelism is by nature non-deterministic, and not all parallel bugs
can be avoided by language design. This paper proposes a method for
guaranteeing absence of data races in the polyhedral subset of clocked X10
programs.
Clocks in X10 are similar to barriers, but are more dynamic; the subset of
processes that participate in the synchronization can dynamically change at
runtime. We construct the happens-before relation for clocked X10 programs, and
show that the problem of race detection is undecidable. However, in many
practical cases, modern tools are able to find solutions or disprove their
existence. We present a set of benchmarks for which the analysis is possible
and has an acceptable running time.
|
1311.3618 | Mircea Cimpoi | Mircea Cimpoi, Subhransu Maji, Iasonas Kokkinos, Sammy Mohamed, and
Andrea Vedaldi | Describing Textures in the Wild | 13 pages; 12 figures Fixed misplaced affiliation | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Patterns and textures are defining characteristics of many natural objects: a
shirt can be striped, the wings of a butterfly can be veined, and the skin of
an animal can be scaly. Aiming at supporting this analytical dimension in image
understanding, we address the challenging problem of describing textures with
semantic attributes. We identify a rich vocabulary of forty-seven texture terms
and use them to describe a large dataset of patterns collected in the wild.The
resulting Describable Textures Dataset (DTD) is the basis to seek for the best
texture representation for recognizing describable texture attributes in
images. We port from object recognition to texture recognition the Improved
Fisher Vector (IFV) and show that, surprisingly, it outperforms specialized
texture descriptors not only on our problem, but also in established material
recognition datasets. We also show that the describable attributes are
excellent texture descriptors, transferring between datasets and tasks; in
particular, combined with IFV, they significantly outperform the
state-of-the-art by more than 8 percent on both FMD and KTHTIPS-2b benchmarks.
We also demonstrate that they produce intuitive descriptions of materials and
Internet images.
| [
{
"version": "v1",
"created": "Thu, 14 Nov 2013 19:28:35 GMT"
},
{
"version": "v2",
"created": "Fri, 15 Nov 2013 16:14:12 GMT"
}
] | 2013-11-18T00:00:00 | [
[
"Cimpoi",
"Mircea",
""
],
[
"Maji",
"Subhransu",
""
],
[
"Kokkinos",
"Iasonas",
""
],
[
"Mohamed",
"Sammy",
""
],
[
"Vedaldi",
"Andrea",
""
]
] | TITLE: Describing Textures in the Wild
ABSTRACT: Patterns and textures are defining characteristics of many natural objects: a
shirt can be striped, the wings of a butterfly can be veined, and the skin of
an animal can be scaly. Aiming at supporting this analytical dimension in image
understanding, we address the challenging problem of describing textures with
semantic attributes. We identify a rich vocabulary of forty-seven texture terms
and use them to describe a large dataset of patterns collected in the wild.The
resulting Describable Textures Dataset (DTD) is the basis to seek for the best
texture representation for recognizing describable texture attributes in
images. We port from object recognition to texture recognition the Improved
Fisher Vector (IFV) and show that, surprisingly, it outperforms specialized
texture descriptors not only on our problem, but also in established material
recognition datasets. We also show that the describable attributes are
excellent texture descriptors, transferring between datasets and tasks; in
particular, combined with IFV, they significantly outperform the
state-of-the-art by more than 8 percent on both FMD and KTHTIPS-2b benchmarks.
We also demonstrate that they produce intuitive descriptions of materials and
Internet images.
|
1311.3732 | Kien Nguyen | Kien Duy Nguyen, Tuan Pham Minh, Quang Nhat Nguyen, Thanh Trung Nguyen | Exploiting Direct and Indirect Information for Friend Suggestion in
ZingMe | NIPS workshop, 9 pages, 4 figures | null | null | null | cs.SI cs.IR physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Friend suggestion is a fundamental problem in social networks with the goal
of assisting users in creating more relationships, and thereby enhances
interest of users to the social networks. This problem is often considered to
be the link prediction problem in the network. ZingMe is one of the largest
social networks in Vietnam. In this paper, we analyze the current approach for
the friend suggestion problem in ZingMe, showing its limitations and
disadvantages. We propose a new efficient approach for friend suggestion that
uses information from the network structure, attributes and interactions of
users to create resources for the evaluation of friend connection amongst
users. Friend connection is evaluated exploiting both direct communication
between the users and information from other ones in the network. The proposed
approach has been implemented in a new system version of ZingMe. We conducted
experiments, exploiting a dataset derived from the users' real use of ZingMe,
to compare the newly proposed approach to the current approach and some
well-known ones for the accuracy of friend suggestion. The experimental results
show that the newly proposed approach outperforms the current one, i.e., by an
increase of 7% to 98% on average in the friend suggestion accuracy. The
proposed approach also outperforms other ones for users who have a small number
of friends with improvements from 20% to 85% on average. In this paper, we also
discuss a number of open issues and possible improvements for the proposed
approach.
| [
{
"version": "v1",
"created": "Fri, 15 Nov 2013 05:56:48 GMT"
}
] | 2013-11-18T00:00:00 | [
[
"Nguyen",
"Kien Duy",
""
],
[
"Minh",
"Tuan Pham",
""
],
[
"Nguyen",
"Quang Nhat",
""
],
[
"Nguyen",
"Thanh Trung",
""
]
] | TITLE: Exploiting Direct and Indirect Information for Friend Suggestion in
ZingMe
ABSTRACT: Friend suggestion is a fundamental problem in social networks with the goal
of assisting users in creating more relationships, and thereby enhances
interest of users to the social networks. This problem is often considered to
be the link prediction problem in the network. ZingMe is one of the largest
social networks in Vietnam. In this paper, we analyze the current approach for
the friend suggestion problem in ZingMe, showing its limitations and
disadvantages. We propose a new efficient approach for friend suggestion that
uses information from the network structure, attributes and interactions of
users to create resources for the evaluation of friend connection amongst
users. Friend connection is evaluated exploiting both direct communication
between the users and information from other ones in the network. The proposed
approach has been implemented in a new system version of ZingMe. We conducted
experiments, exploiting a dataset derived from the users' real use of ZingMe,
to compare the newly proposed approach to the current approach and some
well-known ones for the accuracy of friend suggestion. The experimental results
show that the newly proposed approach outperforms the current one, i.e., by an
increase of 7% to 98% on average in the friend suggestion accuracy. The
proposed approach also outperforms other ones for users who have a small number
of friends with improvements from 20% to 85% on average. In this paper, we also
discuss a number of open issues and possible improvements for the proposed
approach.
|
1311.3735 | Nicola Di Mauro | Nicola Di Mauro and Floriana Esposito | Ensemble Relational Learning based on Selective Propositionalization | 10 pages. arXiv admin note: text overlap with arXiv:1006.5188 | null | null | null | cs.LG cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Dealing with structured data needs the use of expressive representation
formalisms that, however, puts the problem to deal with the computational
complexity of the machine learning process. Furthermore, real world domains
require tools able to manage their typical uncertainty. Many statistical
relational learning approaches try to deal with these problems by combining the
construction of relevant relational features with a probabilistic tool. When
the combination is static (static propositionalization), the constructed
features are considered as boolean features and used offline as input to a
statistical learner; while, when the combination is dynamic (dynamic
propositionalization), the feature construction and probabilistic tool are
combined into a single process. In this paper we propose a selective
propositionalization method that search the optimal set of relational features
to be used by a probabilistic learner in order to minimize a loss function. The
new propositionalization approach has been combined with the random subspace
ensemble method. Experiments on real-world datasets shows the validity of the
proposed method.
| [
{
"version": "v1",
"created": "Fri, 15 Nov 2013 06:14:15 GMT"
}
] | 2013-11-18T00:00:00 | [
[
"Di Mauro",
"Nicola",
""
],
[
"Esposito",
"Floriana",
""
]
] | TITLE: Ensemble Relational Learning based on Selective Propositionalization
ABSTRACT: Dealing with structured data needs the use of expressive representation
formalisms that, however, puts the problem to deal with the computational
complexity of the machine learning process. Furthermore, real world domains
require tools able to manage their typical uncertainty. Many statistical
relational learning approaches try to deal with these problems by combining the
construction of relevant relational features with a probabilistic tool. When
the combination is static (static propositionalization), the constructed
features are considered as boolean features and used offline as input to a
statistical learner; while, when the combination is dynamic (dynamic
propositionalization), the feature construction and probabilistic tool are
combined into a single process. In this paper we propose a selective
propositionalization method that search the optimal set of relational features
to be used by a probabilistic learner in order to minimize a loss function. The
new propositionalization approach has been combined with the random subspace
ensemble method. Experiments on real-world datasets shows the validity of the
proposed method.
|
1311.3312 | Thomas Cerqueus | Vanessa Ayala-Rivera, Patrick McDonagh, Thomas Cerqueus, Liam Murphy | Synthetic Data Generation using Benerator Tool | 12 pages, 5 figures, 10 references | null | null | UCD-CSI-2013-03 | cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Datasets of different characteristics are needed by the research community
for experimental purposes. However, real data may be difficult to obtain due to
privacy concerns. Moreover, real data may not meet specific characteristics
which are needed to verify new approaches under certain conditions. Given these
limitations, the use of synthetic data is a viable alternative to complement
the real data. In this report, we describe the process followed to generate
synthetic data using Benerator, a publicly available tool. The results show
that the synthetic data preserves a high level of accuracy compared to the
original data. The generated datasets correspond to microdata containing
records with social, economic and demographic data which mimics the
distribution of aggregated statistics from the 2011 Irish Census data.
| [
{
"version": "v1",
"created": "Wed, 13 Nov 2013 21:14:40 GMT"
}
] | 2013-11-15T00:00:00 | [
[
"Ayala-Rivera",
"Vanessa",
""
],
[
"McDonagh",
"Patrick",
""
],
[
"Cerqueus",
"Thomas",
""
],
[
"Murphy",
"Liam",
""
]
] | TITLE: Synthetic Data Generation using Benerator Tool
ABSTRACT: Datasets of different characteristics are needed by the research community
for experimental purposes. However, real data may be difficult to obtain due to
privacy concerns. Moreover, real data may not meet specific characteristics
which are needed to verify new approaches under certain conditions. Given these
limitations, the use of synthetic data is a viable alternative to complement
the real data. In this report, we describe the process followed to generate
synthetic data using Benerator, a publicly available tool. The results show
that the synthetic data preserves a high level of accuracy compared to the
original data. The generated datasets correspond to microdata containing
records with social, economic and demographic data which mimics the
distribution of aggregated statistics from the 2011 Irish Census data.
|
1311.3508 | Muhammad Qasim Pasta | Muhammad Qasim Pasta, Zohaib Jan, Faraz Zaidi, Celine Rozenblat | Demographic and Structural Characteristics to Rationalize Link Formation
in Online Social Networks | Second International Workshop on Complex Networks and their
Applications (10 pages, 8 figures) | null | null | null | cs.SI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Recent years have seen tremendous growth of many online social networks such
as Facebook, LinkedIn and MySpace. People connect to each other through these
networks forming large social communities providing researchers rich datasets
to understand, model and predict social interactions and behaviors. New
contacts in these networks can be formed either due to an individual's
demographic profile such as age group, gender, geographic location or due to
network's structural dynamics such as triadic closure and preferential
attachment, or a combination of both demographic and structural
characteristics.
A number of network generation models have been proposed in the last decade
to explain the structure, evolution and processes taking place in different
types of networks, and notably social networks. Network generation models
studied in the literature primarily consider structural properties, and in some
cases an individual's demographic profile in the formation of new social
contacts. These models do not present a mechanism to combine both structural
and demographic characteristics for the formation of new links. In this paper,
we propose a new network generation algorithm which incorporates both these
characteristics to model growth of a network.We use different publicly
available Facebook datasets as benchmarks to demonstrate the correctness of the
proposed network generation model.
| [
{
"version": "v1",
"created": "Thu, 14 Nov 2013 14:04:09 GMT"
}
] | 2013-11-15T00:00:00 | [
[
"Pasta",
"Muhammad Qasim",
""
],
[
"Jan",
"Zohaib",
""
],
[
"Zaidi",
"Faraz",
""
],
[
"Rozenblat",
"Celine",
""
]
] | TITLE: Demographic and Structural Characteristics to Rationalize Link Formation
in Online Social Networks
ABSTRACT: Recent years have seen tremendous growth of many online social networks such
as Facebook, LinkedIn and MySpace. People connect to each other through these
networks forming large social communities providing researchers rich datasets
to understand, model and predict social interactions and behaviors. New
contacts in these networks can be formed either due to an individual's
demographic profile such as age group, gender, geographic location or due to
network's structural dynamics such as triadic closure and preferential
attachment, or a combination of both demographic and structural
characteristics.
A number of network generation models have been proposed in the last decade
to explain the structure, evolution and processes taking place in different
types of networks, and notably social networks. Network generation models
studied in the literature primarily consider structural properties, and in some
cases an individual's demographic profile in the formation of new social
contacts. These models do not present a mechanism to combine both structural
and demographic characteristics for the formation of new links. In this paper,
we propose a new network generation algorithm which incorporates both these
characteristics to model growth of a network.We use different publicly
available Facebook datasets as benchmarks to demonstrate the correctness of the
proposed network generation model.
|
1311.3530 | Robert Koenighofer | Roderick Bloem, Robert Koenighofer, Martina Seidl | SAT-Based Synthesis Methods for Safety Specs | Extended version of a paper at VMCAI'14 | null | null | null | cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Automatic synthesis of hardware components from declarative specifications is
an ambitious endeavor in computer aided design. Existing synthesis algorithms
are often implemented with Binary Decision Diagrams (BDDs), inheriting their
scalability limitations. Instead of BDDs, we propose several new methods to
synthesize finite-state systems from safety specifications using decision
procedures for the satisfiability of quantified and unquantified Boolean
formulas (SAT-, QBF- and EPR-solvers). The presented approaches are based on
computational learning, templates, or reduction to first-order logic. We also
present an efficient parallelization, and optimizations to utilize reachability
information and incremental solving. Finally, we compare all methods in an
extensive case study. Our new methods outperform BDDs and other existing work
on some classes of benchmarks, and our parallelization achieves a super-linear
speedup. This is an extended version of [5], featuring an additional appendix.
| [
{
"version": "v1",
"created": "Thu, 14 Nov 2013 15:11:12 GMT"
}
] | 2013-11-15T00:00:00 | [
[
"Bloem",
"Roderick",
""
],
[
"Koenighofer",
"Robert",
""
],
[
"Seidl",
"Martina",
""
]
] | TITLE: SAT-Based Synthesis Methods for Safety Specs
ABSTRACT: Automatic synthesis of hardware components from declarative specifications is
an ambitious endeavor in computer aided design. Existing synthesis algorithms
are often implemented with Binary Decision Diagrams (BDDs), inheriting their
scalability limitations. Instead of BDDs, we propose several new methods to
synthesize finite-state systems from safety specifications using decision
procedures for the satisfiability of quantified and unquantified Boolean
formulas (SAT-, QBF- and EPR-solvers). The presented approaches are based on
computational learning, templates, or reduction to first-order logic. We also
present an efficient parallelization, and optimizations to utilize reachability
information and incremental solving. Finally, we compare all methods in an
extensive case study. Our new methods outperform BDDs and other existing work
on some classes of benchmarks, and our parallelization achieves a super-linear
speedup. This is an extended version of [5], featuring an additional appendix.
|
1311.2978 | Shibamouli Lahiri | Shibamouli Lahiri, Rada Mihalcea | Authorship Attribution Using Word Network Features | null | null | null | null | cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we explore a set of novel features for authorship attribution
of documents. These features are derived from a word network representation of
natural language text. As has been noted in previous studies, natural language
tends to show complex network structure at word level, with low degrees of
separation and scale-free (power law) degree distribution. There has also been
work on authorship attribution that incorporates ideas from complex networks.
The goal of our paper is to explore properties of these complex networks that
are suitable as features for machine-learning-based authorship attribution of
documents. We performed experiments on three different datasets, and obtained
promising results.
| [
{
"version": "v1",
"created": "Tue, 12 Nov 2013 23:11:40 GMT"
}
] | 2013-11-14T00:00:00 | [
[
"Lahiri",
"Shibamouli",
""
],
[
"Mihalcea",
"Rada",
""
]
] | TITLE: Authorship Attribution Using Word Network Features
ABSTRACT: In this paper, we explore a set of novel features for authorship attribution
of documents. These features are derived from a word network representation of
natural language text. As has been noted in previous studies, natural language
tends to show complex network structure at word level, with low degrees of
separation and scale-free (power law) degree distribution. There has also been
work on authorship attribution that incorporates ideas from complex networks.
The goal of our paper is to explore properties of these complex networks that
are suitable as features for machine-learning-based authorship attribution of
documents. We performed experiments on three different datasets, and obtained
promising results.
|
1311.3037 | Junzhou Zhao | Pinghui Wang, Bruno Ribeiro, Junzhou Zhao, John C.S. Lui, Don Towsley,
Xiaohong Guan | Practical Characterization of Large Networks Using Neighborhood
Information | null | null | null | null | cs.SI cs.CY physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Characterizing large online social networks (OSNs) through node querying is a
challenging task. OSNs often impose severe constraints on the query rate, hence
limiting the sample size to a small fraction of the total network. Various
ad-hoc subgraph sampling methods have been proposed, but many of them give
biased estimates and no theoretical basis on the accuracy. In this work, we
focus on developing sampling methods for OSNs where querying a node also
reveals partial structural information about its neighbors. Our methods are
optimized for NoSQL graph databases (if the database can be accessed directly),
or utilize Web API available on most major OSNs for graph sampling. We show
that our sampling method has provable convergence guarantees on being an
unbiased estimator, and it is more accurate than current state-of-the-art
methods. We characterize metrics such as node label density estimation and edge
label density estimation, two of the most fundamental network characteristics
from which other network characteristics can be derived. We evaluate our
methods on-the-fly over several live networks using their native APIs. Our
simulation studies over a variety of offline datasets show that by including
neighborhood information, our method drastically (4-fold) reduces the number of
samples required to achieve the same estimation accuracy of state-of-the-art
methods.
| [
{
"version": "v1",
"created": "Wed, 13 Nov 2013 07:36:55 GMT"
}
] | 2013-11-14T00:00:00 | [
[
"Wang",
"Pinghui",
""
],
[
"Ribeiro",
"Bruno",
""
],
[
"Zhao",
"Junzhou",
""
],
[
"Lui",
"John C. S.",
""
],
[
"Towsley",
"Don",
""
],
[
"Guan",
"Xiaohong",
""
]
] | TITLE: Practical Characterization of Large Networks Using Neighborhood
Information
ABSTRACT: Characterizing large online social networks (OSNs) through node querying is a
challenging task. OSNs often impose severe constraints on the query rate, hence
limiting the sample size to a small fraction of the total network. Various
ad-hoc subgraph sampling methods have been proposed, but many of them give
biased estimates and no theoretical basis on the accuracy. In this work, we
focus on developing sampling methods for OSNs where querying a node also
reveals partial structural information about its neighbors. Our methods are
optimized for NoSQL graph databases (if the database can be accessed directly),
or utilize Web API available on most major OSNs for graph sampling. We show
that our sampling method has provable convergence guarantees on being an
unbiased estimator, and it is more accurate than current state-of-the-art
methods. We characterize metrics such as node label density estimation and edge
label density estimation, two of the most fundamental network characteristics
from which other network characteristics can be derived. We evaluate our
methods on-the-fly over several live networks using their native APIs. Our
simulation studies over a variety of offline datasets show that by including
neighborhood information, our method drastically (4-fold) reduces the number of
samples required to achieve the same estimation accuracy of state-of-the-art
methods.
|
1311.2677 | Raman Singh Mr. | Raman Singh, Harish Kumar and R.K. Singla | Sampling Based Approaches to Handle Imbalances in Network Traffic
Dataset for Machine Learning Techniques | 12 pages | null | 10.5121/csit.2013.3704 | null | cs.NI cs.CR cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Network traffic data is huge, varying and imbalanced because various classes
are not equally distributed. Machine learning (ML) algorithms for traffic
analysis uses the samples from this data to recommend the actions to be taken
by the network administrators as well as training. Due to imbalances in
dataset, it is difficult to train machine learning algorithms for traffic
analysis and these may give biased or false results leading to serious
degradation in performance of these algorithms. Various techniques can be
applied during sampling to minimize the effect of imbalanced instances. In this
paper various sampling techniques have been analysed in order to compare the
decrease in variation in imbalances of network traffic datasets sampled for
these algorithms. Various parameters like missing classes in samples,
probability of sampling of the different instances have been considered for
comparison.
| [
{
"version": "v1",
"created": "Tue, 12 Nov 2013 05:32:48 GMT"
}
] | 2013-11-13T00:00:00 | [
[
"Singh",
"Raman",
""
],
[
"Kumar",
"Harish",
""
],
[
"Singla",
"R. K.",
""
]
] | TITLE: Sampling Based Approaches to Handle Imbalances in Network Traffic
Dataset for Machine Learning Techniques
ABSTRACT: Network traffic data is huge, varying and imbalanced because various classes
are not equally distributed. Machine learning (ML) algorithms for traffic
analysis uses the samples from this data to recommend the actions to be taken
by the network administrators as well as training. Due to imbalances in
dataset, it is difficult to train machine learning algorithms for traffic
analysis and these may give biased or false results leading to serious
degradation in performance of these algorithms. Various techniques can be
applied during sampling to minimize the effect of imbalanced instances. In this
paper various sampling techniques have been analysed in order to compare the
decrease in variation in imbalances of network traffic datasets sampled for
these algorithms. Various parameters like missing classes in samples,
probability of sampling of the different instances have been considered for
comparison.
|
1311.2879 | Abhishek Awasthi M.Sc. | Abhishek Awasthi, J\"org L\"assig and Oliver Kramer | Common Due-Date Problem: Exact Polynomial Algorithms for a Given Job
Sequence | 15th International Symposium on Symbolic and Numeric Algorithms for
Scientific Computing | null | null | null | cs.DS math.CO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper considers the problem of scheduling jobs on single and parallel
machines where all the jobs possess different processing times but a common due
date. There is a penalty involved with each job if it is processed earlier or
later than the due date. The objective of the problem is to find the assignment
of jobs to machines, the processing sequence of jobs and the time at which they
are processed, which minimizes the total penalty incurred due to tardiness or
earliness of the jobs. This work presents exact polynomial algorithms for
optimizing a given job sequence or single and parallel machines with the
run-time complexities of $O(n \log n)$ and $O(mn^2 \log n)$ respectively, where
$n$ is the number of jobs and $m$ the number of machines. The algorithms take a
sequence consisting of all the jobs $(J_i, i=1,2,\dots,n)$ as input and
distribute the jobs to machines (for $m>1$) along with their best completion
times so as to get the least possible total penalty for this sequence. We prove
the optimality for the single machine case and the runtime complexities of
both. Henceforth, we present the results for the benchmark instances and
compare with previous work for single and parallel machine cases, up to $200$
jobs.
| [
{
"version": "v1",
"created": "Sat, 26 Oct 2013 14:33:44 GMT"
}
] | 2013-11-13T00:00:00 | [
[
"Awasthi",
"Abhishek",
""
],
[
"Lässig",
"Jörg",
""
],
[
"Kramer",
"Oliver",
""
]
] | TITLE: Common Due-Date Problem: Exact Polynomial Algorithms for a Given Job
Sequence
ABSTRACT: This paper considers the problem of scheduling jobs on single and parallel
machines where all the jobs possess different processing times but a common due
date. There is a penalty involved with each job if it is processed earlier or
later than the due date. The objective of the problem is to find the assignment
of jobs to machines, the processing sequence of jobs and the time at which they
are processed, which minimizes the total penalty incurred due to tardiness or
earliness of the jobs. This work presents exact polynomial algorithms for
optimizing a given job sequence or single and parallel machines with the
run-time complexities of $O(n \log n)$ and $O(mn^2 \log n)$ respectively, where
$n$ is the number of jobs and $m$ the number of machines. The algorithms take a
sequence consisting of all the jobs $(J_i, i=1,2,\dots,n)$ as input and
distribute the jobs to machines (for $m>1$) along with their best completion
times so as to get the least possible total penalty for this sequence. We prove
the optimality for the single machine case and the runtime complexities of
both. Henceforth, we present the results for the benchmark instances and
compare with previous work for single and parallel machine cases, up to $200$
jobs.
|
1305.0810 | Vadym Kliuchnikov | Vadym Kliuchnikov and Dmitri Maslov | Optimization of Clifford Circuits | 7 pages, 5 figures | Phys. Rev. A 88, 052307 (2013) | 10.1103/PhysRevA.88.052307 | null | quant-ph cs.ET | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study optimal synthesis of Clifford circuits, and apply the results to
peep-hole optimization of quantum circuits. We report optimal circuits for all
Clifford operations with up to four inputs. We perform peep-hole optimization
of Clifford circuits with up to 40 inputs found in the literature, and
demonstrate the reduction in the number of gates by about 50%. We extend our
methods to the optimal synthesis of linear reversible circuits, partially
specified Clifford functions, and optimal Clifford circuits with five inputs up
to input/output permutation. The results find their application in randomized
benchmarking protocols, quantum error correction, and quantum circuit
optimization.
| [
{
"version": "v1",
"created": "Fri, 3 May 2013 19:36:34 GMT"
},
{
"version": "v2",
"created": "Sun, 10 Nov 2013 23:19:24 GMT"
}
] | 2013-11-12T00:00:00 | [
[
"Kliuchnikov",
"Vadym",
""
],
[
"Maslov",
"Dmitri",
""
]
] | TITLE: Optimization of Clifford Circuits
ABSTRACT: We study optimal synthesis of Clifford circuits, and apply the results to
peep-hole optimization of quantum circuits. We report optimal circuits for all
Clifford operations with up to four inputs. We perform peep-hole optimization
of Clifford circuits with up to 40 inputs found in the literature, and
demonstrate the reduction in the number of gates by about 50%. We extend our
methods to the optimal synthesis of linear reversible circuits, partially
specified Clifford functions, and optimal Clifford circuits with five inputs up
to input/output permutation. The results find their application in randomized
benchmarking protocols, quantum error correction, and quantum circuit
optimization.
|
1311.1884 | Saurabh Jha | Vijay Menon, Saurabh Jha | A Parallel Simulated Annealing Approach for the Mirrored Traveling
Tournament Problem | null | null | null | null | cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The Traveling Tournament Problem (TTP) is a benchmark problem in sports
scheduling and has been extensively studied in recent years. The Mirrored
Traveling Tournament Problem (mTTP) is variation of the TTP that represents
certain types of sports scheduling problems where the main objective is to
minimize the total distance traveled by all the participating teams. In this
paper we test a parallel simulated annealing approach for solving the mTTP
using OpenMP on shared memory systems and we found that this approach is
superior especially with respect to the number of solution instances that are
probed per second. We also see that there is significant speed up of 1.5x -
2.2x in terms of number of solutions explored per unit time.
| [
{
"version": "v1",
"created": "Fri, 8 Nov 2013 06:16:43 GMT"
}
] | 2013-11-12T00:00:00 | [
[
"Menon",
"Vijay",
""
],
[
"Jha",
"Saurabh",
""
]
] | TITLE: A Parallel Simulated Annealing Approach for the Mirrored Traveling
Tournament Problem
ABSTRACT: The Traveling Tournament Problem (TTP) is a benchmark problem in sports
scheduling and has been extensively studied in recent years. The Mirrored
Traveling Tournament Problem (mTTP) is variation of the TTP that represents
certain types of sports scheduling problems where the main objective is to
minimize the total distance traveled by all the participating teams. In this
paper we test a parallel simulated annealing approach for solving the mTTP
using OpenMP on shared memory systems and we found that this approach is
superior especially with respect to the number of solution instances that are
probed per second. We also see that there is significant speed up of 1.5x -
2.2x in terms of number of solutions explored per unit time.
|
1311.2100 | Nandish Jayaram | Nandish Jayaram and Arijit Khan and Chengkai Li and Xifeng Yan and
Ramez Elmasri | Querying Knowledge Graphs by Example Entity Tuples | null | null | null | null | cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We witness an unprecedented proliferation of knowledge graphs that record
millions of entities and their relationships. While knowledge graphs are
structure-flexible and content rich, they are difficult to use. The challenge
lies in the gap between their overwhelming complexity and the limited database
knowledge of non-professional users. If writing structured queries over simple
tables is difficult, complex graphs are only harder to query. As an initial
step toward improving the usability of knowledge graphs, we propose to query
such data by example entity tuples, without requiring users to form complex
graph queries. Our system, GQBE (Graph Query By Example), automatically derives
a weighted hidden maximal query graph based on input query tuples, to capture a
user's query intent. It efficiently finds and ranks the top approximate answer
tuples. For fast query processing, GQBE only partially evaluates query graphs.
We conducted experiments and user studies on the large Freebase and DBpedia
datasets and observed appealing accuracy and efficiency. Our system provides a
complementary approach to the existing keyword-based methods, facilitating
user-friendly graph querying. To the best of our knowledge, there was no such
proposal in the past in the context of graphs.
| [
{
"version": "v1",
"created": "Fri, 8 Nov 2013 22:47:39 GMT"
}
] | 2013-11-12T00:00:00 | [
[
"Jayaram",
"Nandish",
""
],
[
"Khan",
"Arijit",
""
],
[
"Li",
"Chengkai",
""
],
[
"Yan",
"Xifeng",
""
],
[
"Elmasri",
"Ramez",
""
]
] | TITLE: Querying Knowledge Graphs by Example Entity Tuples
ABSTRACT: We witness an unprecedented proliferation of knowledge graphs that record
millions of entities and their relationships. While knowledge graphs are
structure-flexible and content rich, they are difficult to use. The challenge
lies in the gap between their overwhelming complexity and the limited database
knowledge of non-professional users. If writing structured queries over simple
tables is difficult, complex graphs are only harder to query. As an initial
step toward improving the usability of knowledge graphs, we propose to query
such data by example entity tuples, without requiring users to form complex
graph queries. Our system, GQBE (Graph Query By Example), automatically derives
a weighted hidden maximal query graph based on input query tuples, to capture a
user's query intent. It efficiently finds and ranks the top approximate answer
tuples. For fast query processing, GQBE only partially evaluates query graphs.
We conducted experiments and user studies on the large Freebase and DBpedia
datasets and observed appealing accuracy and efficiency. Our system provides a
complementary approach to the existing keyword-based methods, facilitating
user-friendly graph querying. To the best of our knowledge, there was no such
proposal in the past in the context of graphs.
|
1311.2139 | Sundararajan Sellamanickam | P. Balamurugan, Shirish Shevade, Sundararajan Sellamanickam | Large Margin Semi-supervised Structured Output Learning | 9 pages | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In structured output learning, obtaining labelled data for real-world
applications is usually costly, while unlabelled examples are available in
abundance. Semi-supervised structured classification has been developed to
handle large amounts of unlabelled structured data. In this work, we consider
semi-supervised structural SVMs with domain constraints. The optimization
problem, which in general is not convex, contains the loss terms associated
with the labelled and unlabelled examples along with the domain constraints. We
propose a simple optimization approach, which alternates between solving a
supervised learning problem and a constraint matching problem. Solving the
constraint matching problem is difficult for structured prediction, and we
propose an efficient and effective hill-climbing method to solve it. The
alternating optimization is carried out within a deterministic annealing
framework, which helps in effective constraint matching, and avoiding local
minima which are not very useful. The algorithm is simple to implement and
achieves comparable generalization performance on benchmark datasets.
| [
{
"version": "v1",
"created": "Sat, 9 Nov 2013 06:47:22 GMT"
}
] | 2013-11-12T00:00:00 | [
[
"Balamurugan",
"P.",
""
],
[
"Shevade",
"Shirish",
""
],
[
"Sellamanickam",
"Sundararajan",
""
]
] | TITLE: Large Margin Semi-supervised Structured Output Learning
ABSTRACT: In structured output learning, obtaining labelled data for real-world
applications is usually costly, while unlabelled examples are available in
abundance. Semi-supervised structured classification has been developed to
handle large amounts of unlabelled structured data. In this work, we consider
semi-supervised structural SVMs with domain constraints. The optimization
problem, which in general is not convex, contains the loss terms associated
with the labelled and unlabelled examples along with the domain constraints. We
propose a simple optimization approach, which alternates between solving a
supervised learning problem and a constraint matching problem. Solving the
constraint matching problem is difficult for structured prediction, and we
propose an efficient and effective hill-climbing method to solve it. The
alternating optimization is carried out within a deterministic annealing
framework, which helps in effective constraint matching, and avoiding local
minima which are not very useful. The algorithm is simple to implement and
achieves comparable generalization performance on benchmark datasets.
|
1311.2276 | Sundararajan Sellamanickam | Vinod Nair, Rahul Kidambi, Sundararajan Sellamanickam, S. Sathiya
Keerthi, Johannes Gehrke, Vijay Narayanan | A Quantitative Evaluation Framework for Missing Value Imputation
Algorithms | 9 pages | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider the problem of quantitatively evaluating missing value imputation
algorithms. Given a dataset with missing values and a choice of several
imputation algorithms to fill them in, there is currently no principled way to
rank the algorithms using a quantitative metric. We develop a framework based
on treating imputation evaluation as a problem of comparing two distributions
and show how it can be used to compute quantitative metrics. We present an
efficient procedure for applying this framework to practical datasets,
demonstrate several metrics derived from the existing literature on comparing
distributions, and propose a new metric called Neighborhood-based Dissimilarity
Score which is fast to compute and provides similar results. Results are shown
on several datasets, metrics, and imputations algorithms.
| [
{
"version": "v1",
"created": "Sun, 10 Nov 2013 14:17:47 GMT"
}
] | 2013-11-12T00:00:00 | [
[
"Nair",
"Vinod",
""
],
[
"Kidambi",
"Rahul",
""
],
[
"Sellamanickam",
"Sundararajan",
""
],
[
"Keerthi",
"S. Sathiya",
""
],
[
"Gehrke",
"Johannes",
""
],
[
"Narayanan",
"Vijay",
""
]
] | TITLE: A Quantitative Evaluation Framework for Missing Value Imputation
Algorithms
ABSTRACT: We consider the problem of quantitatively evaluating missing value imputation
algorithms. Given a dataset with missing values and a choice of several
imputation algorithms to fill them in, there is currently no principled way to
rank the algorithms using a quantitative metric. We develop a framework based
on treating imputation evaluation as a problem of comparing two distributions
and show how it can be used to compute quantitative metrics. We present an
efficient procedure for applying this framework to practical datasets,
demonstrate several metrics derived from the existing literature on comparing
distributions, and propose a new metric called Neighborhood-based Dissimilarity
Score which is fast to compute and provides similar results. Results are shown
on several datasets, metrics, and imputations algorithms.
|
1311.2378 | Balamurugan Palaniappan | P. Balamurugan, Shirish Shevade, S. Sundararajan and S. S Keerthi | An Empirical Evaluation of Sequence-Tagging Trainers | 18 pages, 5 figures ams.org | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The task of assigning label sequences to a set of observed sequences is
common in computational linguistics. Several models for sequence labeling have
been proposed over the last few years. Here, we focus on discriminative models
for sequence labeling. Many batch and online (updating model parameters after
visiting each example) learning algorithms have been proposed in the
literature. On large datasets, online algorithms are preferred as batch
learning methods are slow. These online algorithms were designed to solve
either a primal or a dual problem. However, there has been no systematic
comparison of these algorithms in terms of their speed, generalization
performance (accuracy/likelihood) and their ability to achieve steady state
generalization performance fast. With this aim, we compare different algorithms
and make recommendations, useful for a practitioner. We conclude that the
selection of an algorithm for sequence labeling depends on the evaluation
criterion used and its implementation simplicity.
| [
{
"version": "v1",
"created": "Mon, 11 Nov 2013 08:26:09 GMT"
}
] | 2013-11-12T00:00:00 | [
[
"Balamurugan",
"P.",
""
],
[
"Shevade",
"Shirish",
""
],
[
"Sundararajan",
"S.",
""
],
[
"Keerthi",
"S. S",
""
]
] | TITLE: An Empirical Evaluation of Sequence-Tagging Trainers
ABSTRACT: The task of assigning label sequences to a set of observed sequences is
common in computational linguistics. Several models for sequence labeling have
been proposed over the last few years. Here, we focus on discriminative models
for sequence labeling. Many batch and online (updating model parameters after
visiting each example) learning algorithms have been proposed in the
literature. On large datasets, online algorithms are preferred as batch
learning methods are slow. These online algorithms were designed to solve
either a primal or a dual problem. However, there has been no systematic
comparison of these algorithms in terms of their speed, generalization
performance (accuracy/likelihood) and their ability to achieve steady state
generalization performance fast. With this aim, we compare different algorithms
and make recommendations, useful for a practitioner. We conclude that the
selection of an algorithm for sequence labeling depends on the evaluation
criterion used and its implementation simplicity.
|
1212.0689 | Nicolas Tremblay | Nicolas Tremblay, Pierre Borgnat | Multiscale Community Mining in Networks Using Spectral Graph Wavelets | Proceedings of the European Signal Processing Conference (EUSIPCO
2013) | null | null | null | physics.soc-ph cs.DM cs.SI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | For data represented by networks, the community structure of the underlying
graph is of great interest. A classical clustering problem is to uncover the
overall ``best'' partition of nodes in communities. Here, a more elaborate
description is proposed in which community structures are identified at
different scales. To this end, we take advantage of the local and
scale-dependent information encoded in graph wavelets. After new developments
for the practical use of graph wavelets, studying proper scale boundaries and
parameters and introducing scaling functions, we propose a method to mine for
communities in complex networks in a scale-dependent manner. It relies on
classifying nodes according to their wavelets or scaling functions, using a
scale-dependent modularity function. An example on a graph benchmark having
hierarchical communities shows that we estimate successfully its multiscale
structure.
| [
{
"version": "v1",
"created": "Tue, 4 Dec 2012 11:52:17 GMT"
},
{
"version": "v2",
"created": "Fri, 8 Nov 2013 12:17:03 GMT"
}
] | 2013-11-11T00:00:00 | [
[
"Tremblay",
"Nicolas",
""
],
[
"Borgnat",
"Pierre",
""
]
] | TITLE: Multiscale Community Mining in Networks Using Spectral Graph Wavelets
ABSTRACT: For data represented by networks, the community structure of the underlying
graph is of great interest. A classical clustering problem is to uncover the
overall ``best'' partition of nodes in communities. Here, a more elaborate
description is proposed in which community structures are identified at
different scales. To this end, we take advantage of the local and
scale-dependent information encoded in graph wavelets. After new developments
for the practical use of graph wavelets, studying proper scale boundaries and
parameters and introducing scaling functions, we propose a method to mine for
communities in complex networks in a scale-dependent manner. It relies on
classifying nodes according to their wavelets or scaling functions, using a
scale-dependent modularity function. An example on a graph benchmark having
hierarchical communities shows that we estimate successfully its multiscale
structure.
|
1302.6557 | Richard M Jiang | Richard M Jiang | Geodesic-based Salient Object Detection | The manuscript was submitted to a conference. Due to anonymous review
policy by the conference, I'd like to withdraw it temporarily | This is a revised version of our submissions to CVPR 2012, SIGRAPH
Asia 2012, and CVPR 2013; | null | null | cs.CV cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Saliency detection has been an intuitive way to provide useful cues for
object detection and segmentation, as desired for many vision and graphics
applications. In this paper, we provided a robust method for salient object
detection and segmentation. Other than using various pixel-level contrast
definitions, we exploited global image structures and proposed a new geodesic
method dedicated for salient object detection. In the proposed approach, a new
geodesic scheme, namely geodesic tunneling is proposed to tackle with textures
and local chaotic structures. With our new geodesic approach, a geodesic
saliency map is estimated in correspondence to spatial structures in an image.
Experimental evaluation on a salient object benchmark dataset validated that
our algorithm consistently outperformed a number of the state-of-art saliency
methods, yielding higher precision and better recall rates. With the robust
saliency estimation, we also present an unsupervised hierarchical salient
object cut scheme simply using adaptive saliency thresholding, which attained
the highest score in our F-measure test. We also applied our geodesic cut
scheme to a number of image editing tasks as demonstrated in additional
experiments.
| [
{
"version": "v1",
"created": "Tue, 26 Feb 2013 19:52:02 GMT"
},
{
"version": "v2",
"created": "Fri, 23 Aug 2013 18:41:55 GMT"
}
] | 2013-11-11T00:00:00 | [
[
"Jiang",
"Richard M",
""
]
] | TITLE: Geodesic-based Salient Object Detection
ABSTRACT: Saliency detection has been an intuitive way to provide useful cues for
object detection and segmentation, as desired for many vision and graphics
applications. In this paper, we provided a robust method for salient object
detection and segmentation. Other than using various pixel-level contrast
definitions, we exploited global image structures and proposed a new geodesic
method dedicated for salient object detection. In the proposed approach, a new
geodesic scheme, namely geodesic tunneling is proposed to tackle with textures
and local chaotic structures. With our new geodesic approach, a geodesic
saliency map is estimated in correspondence to spatial structures in an image.
Experimental evaluation on a salient object benchmark dataset validated that
our algorithm consistently outperformed a number of the state-of-art saliency
methods, yielding higher precision and better recall rates. With the robust
saliency estimation, we also present an unsupervised hierarchical salient
object cut scheme simply using adaptive saliency thresholding, which attained
the highest score in our F-measure test. We also applied our geodesic cut
scheme to a number of image editing tasks as demonstrated in additional
experiments.
|
1302.3101 | Matus Medo | An Zeng, Stanislao Gualdi, Matus Medo, Yi-Cheng Zhang | Trend prediction in temporal bipartite networks: the case of Movielens,
Netflix, and Digg | 9 pages, 1 table, 5 figures | Advances in Complex Systems 16, 1350024, 2013 | 10.1142/S0219525913500240 | null | cs.SI physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Online systems where users purchase or collect items of some kind can be
effectively represented by temporal bipartite networks where both nodes and
links are added with time. We use this representation to predict which items
might become popular in the near future. Various prediction methods are
evaluated on three distinct datasets originating from popular online services
(Movielens, Netflix, and Digg). We show that the prediction performance can be
further enhanced if the user social network is known and centrality of
individual users in this network is used to weight their actions.
| [
{
"version": "v1",
"created": "Wed, 13 Feb 2013 14:09:33 GMT"
}
] | 2013-11-08T00:00:00 | [
[
"Zeng",
"An",
""
],
[
"Gualdi",
"Stanislao",
""
],
[
"Medo",
"Matus",
""
],
[
"Zhang",
"Yi-Cheng",
""
]
] | TITLE: Trend prediction in temporal bipartite networks: the case of Movielens,
Netflix, and Digg
ABSTRACT: Online systems where users purchase or collect items of some kind can be
effectively represented by temporal bipartite networks where both nodes and
links are added with time. We use this representation to predict which items
might become popular in the near future. Various prediction methods are
evaluated on three distinct datasets originating from popular online services
(Movielens, Netflix, and Digg). We show that the prediction performance can be
further enhanced if the user social network is known and centrality of
individual users in this network is used to weight their actions.
|
1209.3129 | Anteo Smerieri | Anteo Smerieri, Fran\c{c}ois Duport, Yvan Paquot, Benjamin Schrauwen,
Marc Haelterman, Serge Massar | Analog readout for optical reservoir computers | to appear in NIPS 2012 | Advances in Neural Information Processing Systems (NIPS) 25,
953-961 (2012) | null | null | cs.ET cs.LG cs.NE physics.optics | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Reservoir computing is a new, powerful and flexible machine learning
technique that is easily implemented in hardware. Recently, by using a
time-multiplexed architecture, hardware reservoir computers have reached
performance comparable to digital implementations. Operating speeds allowing
for real time information operation have been reached using optoelectronic
systems. At present the main performance bottleneck is the readout layer which
uses slow, digital postprocessing. We have designed an analog readout suitable
for time-multiplexed optoelectronic reservoir computers, capable of working in
real time. The readout has been built and tested experimentally on a standard
benchmark task. Its performance is better than non-reservoir methods, with
ample room for further improvement. The present work thereby overcomes one of
the major limitations for the future development of hardware reservoir
computers.
| [
{
"version": "v1",
"created": "Fri, 14 Sep 2012 08:56:19 GMT"
}
] | 2013-11-07T00:00:00 | [
[
"Smerieri",
"Anteo",
""
],
[
"Duport",
"François",
""
],
[
"Paquot",
"Yvan",
""
],
[
"Schrauwen",
"Benjamin",
""
],
[
"Haelterman",
"Marc",
""
],
[
"Massar",
"Serge",
""
]
] | TITLE: Analog readout for optical reservoir computers
ABSTRACT: Reservoir computing is a new, powerful and flexible machine learning
technique that is easily implemented in hardware. Recently, by using a
time-multiplexed architecture, hardware reservoir computers have reached
performance comparable to digital implementations. Operating speeds allowing
for real time information operation have been reached using optoelectronic
systems. At present the main performance bottleneck is the readout layer which
uses slow, digital postprocessing. We have designed an analog readout suitable
for time-multiplexed optoelectronic reservoir computers, capable of working in
real time. The readout has been built and tested experimentally on a standard
benchmark task. Its performance is better than non-reservoir methods, with
ample room for further improvement. The present work thereby overcomes one of
the major limitations for the future development of hardware reservoir
computers.
|
1311.1249 | Simon Gog | Simon Gog and Timo Beller and Alistair Moffat and Matthias Petri | From Theory to Practice: Plug and Play with Succinct Data Structures | 10 pages, 4 figures, 3 tables | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Engineering efficient implementations of compact and succinct structures is a
time-consuming and challenging task, since there is no standard library of
easy-to- use, highly optimized, and composable components. One consequence is
that measuring the practical impact of new theoretical proposals is a difficult
task, since older base- line implementations may not rely on the same basic
components, and reimplementing from scratch can be very time-consuming. In this
paper we present a framework for experimentation with succinct data structures,
providing a large set of configurable components, together with tests,
benchmarks, and tools to analyze resource requirements. We demonstrate the
functionality of the framework by recomposing succinct solutions for document
retrieval.
| [
{
"version": "v1",
"created": "Tue, 5 Nov 2013 23:37:14 GMT"
}
] | 2013-11-07T00:00:00 | [
[
"Gog",
"Simon",
""
],
[
"Beller",
"Timo",
""
],
[
"Moffat",
"Alistair",
""
],
[
"Petri",
"Matthias",
""
]
] | TITLE: From Theory to Practice: Plug and Play with Succinct Data Structures
ABSTRACT: Engineering efficient implementations of compact and succinct structures is a
time-consuming and challenging task, since there is no standard library of
easy-to- use, highly optimized, and composable components. One consequence is
that measuring the practical impact of new theoretical proposals is a difficult
task, since older base- line implementations may not rely on the same basic
components, and reimplementing from scratch can be very time-consuming. In this
paper we present a framework for experimentation with succinct data structures,
providing a large set of configurable components, together with tests,
benchmarks, and tools to analyze resource requirements. We demonstrate the
functionality of the framework by recomposing succinct solutions for document
retrieval.
|
1311.1338 | Mario K\"oppen | Mario Koeppen and Kei Ohnishi | Significance Relations for the Benchmarking of Meta-Heuristic Algorithms | 6 pages, 2 figures, 1 table | null | null | null | cs.DS cs.PF | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The experimental analysis of meta-heuristic algorithm performance is usually
based on comparing average performance metric values over a set of algorithm
instances. When algorithms getting tight in performance gains, the additional
consideration of significance of a metric improvement comes into play. However,
from this moment the comparison changes from an absolute to a relative mode.
Here the implications of this paradigm shift are investigated. Significance
relations are formally established. Based on this, a trade-off between
increasing cycle-freeness of the relation and small maximum sets can be
identified, allowing for the selection of a proper significance level and
resulting ranking of a set of algorithms. The procedure is exemplified on the
CEC'05 benchmark of real parameter single objective optimization problems. The
significance relation here is based on awarding ranking points for relative
performance gains, similar to the Borda count voting method or the Wilcoxon
signed rank test. In the particular CEC'05 case, five ranks for algorithm
performance can be clearly identified.
| [
{
"version": "v1",
"created": "Wed, 6 Nov 2013 10:20:56 GMT"
}
] | 2013-11-07T00:00:00 | [
[
"Koeppen",
"Mario",
""
],
[
"Ohnishi",
"Kei",
""
]
] | TITLE: Significance Relations for the Benchmarking of Meta-Heuristic Algorithms
ABSTRACT: The experimental analysis of meta-heuristic algorithm performance is usually
based on comparing average performance metric values over a set of algorithm
instances. When algorithms getting tight in performance gains, the additional
consideration of significance of a metric improvement comes into play. However,
from this moment the comparison changes from an absolute to a relative mode.
Here the implications of this paradigm shift are investigated. Significance
relations are formally established. Based on this, a trade-off between
increasing cycle-freeness of the relation and small maximum sets can be
identified, allowing for the selection of a proper significance level and
resulting ranking of a set of algorithms. The procedure is exemplified on the
CEC'05 benchmark of real parameter single objective optimization problems. The
significance relation here is based on awarding ranking points for relative
performance gains, similar to the Borda count voting method or the Wilcoxon
signed rank test. In the particular CEC'05 case, five ranks for algorithm
performance can be clearly identified.
|
1305.0258 | Nathan Monnig | Nathan D. Monnig, Bengt Fornberg, and Francois G. Meyer | Inverting Nonlinear Dimensionality Reduction with Scale-Free Radial
Basis Function Interpolation | Accepted for publication in Applied and Computational Harmonic
Analysis | null | null | null | math.NA cs.NA physics.data-an stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Nonlinear dimensionality reduction embeddings computed from datasets do not
provide a mechanism to compute the inverse map. In this paper, we address the
problem of computing a stable inverse map to such a general bi-Lipschitz map.
Our approach relies on radial basis functions (RBFs) to interpolate the inverse
map everywhere on the low-dimensional image of the forward map. We demonstrate
that the scale-free cubic RBF kernel performs better than the Gaussian kernel:
it does not suffer from ill-conditioning, and does not require the choice of a
scale. The proposed construction is shown to be similar to the Nystr\"om
extension of the eigenvectors of the symmetric normalized graph Laplacian
matrix. Based on this observation, we provide a new interpretation of the
Nystr\"om extension with suggestions for improvement.
| [
{
"version": "v1",
"created": "Wed, 1 May 2013 19:55:06 GMT"
},
{
"version": "v2",
"created": "Tue, 5 Nov 2013 15:49:52 GMT"
}
] | 2013-11-06T00:00:00 | [
[
"Monnig",
"Nathan D.",
""
],
[
"Fornberg",
"Bengt",
""
],
[
"Meyer",
"Francois G.",
""
]
] | TITLE: Inverting Nonlinear Dimensionality Reduction with Scale-Free Radial
Basis Function Interpolation
ABSTRACT: Nonlinear dimensionality reduction embeddings computed from datasets do not
provide a mechanism to compute the inverse map. In this paper, we address the
problem of computing a stable inverse map to such a general bi-Lipschitz map.
Our approach relies on radial basis functions (RBFs) to interpolate the inverse
map everywhere on the low-dimensional image of the forward map. We demonstrate
that the scale-free cubic RBF kernel performs better than the Gaussian kernel:
it does not suffer from ill-conditioning, and does not require the choice of a
scale. The proposed construction is shown to be similar to the Nystr\"om
extension of the eigenvectors of the symmetric normalized graph Laplacian
matrix. Based on this observation, we provide a new interpretation of the
Nystr\"om extension with suggestions for improvement.
|
1306.5554 | Brian McWilliams | Brian McWilliams, David Balduzzi and Joachim M. Buhmann | Correlated random features for fast semi-supervised learning | 15 pages, 3 figures, 6 tables | null | null | null | stat.ML cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper presents Correlated Nystrom Views (XNV), a fast semi-supervised
algorithm for regression and classification. The algorithm draws on two main
ideas. First, it generates two views consisting of computationally inexpensive
random features. Second, XNV applies multiview regression using Canonical
Correlation Analysis (CCA) on unlabeled data to bias the regression towards
useful features. It has been shown that, if the views contains accurate
estimators, CCA regression can substantially reduce variance with a minimal
increase in bias. Random views are justified by recent theoretical and
empirical work showing that regression with random features closely
approximates kernel regression, implying that random views can be expected to
contain accurate estimators. We show that XNV consistently outperforms a
state-of-the-art algorithm for semi-supervised learning: substantially
improving predictive performance and reducing the variability of performance on
a wide variety of real-world datasets, whilst also reducing runtime by orders
of magnitude.
| [
{
"version": "v1",
"created": "Mon, 24 Jun 2013 09:49:08 GMT"
},
{
"version": "v2",
"created": "Tue, 5 Nov 2013 11:28:33 GMT"
}
] | 2013-11-06T00:00:00 | [
[
"McWilliams",
"Brian",
""
],
[
"Balduzzi",
"David",
""
],
[
"Buhmann",
"Joachim M.",
""
]
] | TITLE: Correlated random features for fast semi-supervised learning
ABSTRACT: This paper presents Correlated Nystrom Views (XNV), a fast semi-supervised
algorithm for regression and classification. The algorithm draws on two main
ideas. First, it generates two views consisting of computationally inexpensive
random features. Second, XNV applies multiview regression using Canonical
Correlation Analysis (CCA) on unlabeled data to bias the regression towards
useful features. It has been shown that, if the views contains accurate
estimators, CCA regression can substantially reduce variance with a minimal
increase in bias. Random views are justified by recent theoretical and
empirical work showing that regression with random features closely
approximates kernel regression, implying that random views can be expected to
contain accurate estimators. We show that XNV consistently outperforms a
state-of-the-art algorithm for semi-supervised learning: substantially
improving predictive performance and reducing the variability of performance on
a wide variety of real-world datasets, whilst also reducing runtime by orders
of magnitude.
|
1311.0914 | Cho-Jui Hsieh Cho-Jui Hsieh | Cho-Jui Hsieh and Si Si and Inderjit S. Dhillon | A Divide-and-Conquer Solver for Kernel Support Vector Machines | null | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The kernel support vector machine (SVM) is one of the most widely used
classification methods; however, the amount of computation required becomes the
bottleneck when facing millions of samples. In this paper, we propose and
analyze a novel divide-and-conquer solver for kernel SVMs (DC-SVM). In the
division step, we partition the kernel SVM problem into smaller subproblems by
clustering the data, so that each subproblem can be solved independently and
efficiently. We show theoretically that the support vectors identified by the
subproblem solution are likely to be support vectors of the entire kernel SVM
problem, provided that the problem is partitioned appropriately by kernel
clustering. In the conquer step, the local solutions from the subproblems are
used to initialize a global coordinate descent solver, which converges quickly
as suggested by our analysis. By extending this idea, we develop a multilevel
Divide-and-Conquer SVM algorithm with adaptive clustering and early prediction
strategy, which outperforms state-of-the-art methods in terms of training
speed, testing accuracy, and memory usage. As an example, on the covtype
dataset with half-a-million samples, DC-SVM is 7 times faster than LIBSVM in
obtaining the exact SVM solution (to within $10^{-6}$ relative error) which
achieves 96.15% prediction accuracy. Moreover, with our proposed early
prediction strategy, DC-SVM achieves about 96% accuracy in only 12 minutes,
which is more than 100 times faster than LIBSVM.
| [
{
"version": "v1",
"created": "Mon, 4 Nov 2013 22:06:40 GMT"
}
] | 2013-11-06T00:00:00 | [
[
"Hsieh",
"Cho-Jui",
""
],
[
"Si",
"Si",
""
],
[
"Dhillon",
"Inderjit S.",
""
]
] | TITLE: A Divide-and-Conquer Solver for Kernel Support Vector Machines
ABSTRACT: The kernel support vector machine (SVM) is one of the most widely used
classification methods; however, the amount of computation required becomes the
bottleneck when facing millions of samples. In this paper, we propose and
analyze a novel divide-and-conquer solver for kernel SVMs (DC-SVM). In the
division step, we partition the kernel SVM problem into smaller subproblems by
clustering the data, so that each subproblem can be solved independently and
efficiently. We show theoretically that the support vectors identified by the
subproblem solution are likely to be support vectors of the entire kernel SVM
problem, provided that the problem is partitioned appropriately by kernel
clustering. In the conquer step, the local solutions from the subproblems are
used to initialize a global coordinate descent solver, which converges quickly
as suggested by our analysis. By extending this idea, we develop a multilevel
Divide-and-Conquer SVM algorithm with adaptive clustering and early prediction
strategy, which outperforms state-of-the-art methods in terms of training
speed, testing accuracy, and memory usage. As an example, on the covtype
dataset with half-a-million samples, DC-SVM is 7 times faster than LIBSVM in
obtaining the exact SVM solution (to within $10^{-6}$ relative error) which
achieves 96.15% prediction accuracy. Moreover, with our proposed early
prediction strategy, DC-SVM achieves about 96% accuracy in only 12 minutes,
which is more than 100 times faster than LIBSVM.
|
1311.1169 | D\'aniel Kondor Mr | D\'aniel Kondor, Istv\'an Csabai, L\'aszl\'o Dobos, J\'anos Sz\"ule,
Norbert Barankai, Tam\'as Hanyecz, Tam\'as Seb\H{o}k, Zs\'ofia Kallus,
G\'abor Vattay | Using Robust PCA to estimate regional characteristics of language use
from geo-tagged Twitter messages | null | null | null | null | cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Principal component analysis (PCA) and related techniques have been
successfully employed in natural language processing. Text mining applications
in the age of the online social media (OSM) face new challenges due to
properties specific to these use cases (e.g. spelling issues specific to texts
posted by users, the presence of spammers and bots, service announcements,
etc.). In this paper, we employ a Robust PCA technique to separate typical
outliers and highly localized topics from the low-dimensional structure present
in language use in online social networks. Our focus is on identifying
geospatial features among the messages posted by the users of the Twitter
microblogging service. Using a dataset which consists of over 200 million
geolocated tweets collected over the course of a year, we investigate whether
the information present in word usage frequencies can be used to identify
regional features of language use and topics of interest. Using the PCA pursuit
method, we are able to identify important low-dimensional features, which
constitute smoothly varying functions of the geographic location.
| [
{
"version": "v1",
"created": "Tue, 5 Nov 2013 19:31:33 GMT"
}
] | 2013-11-06T00:00:00 | [
[
"Kondor",
"Dániel",
""
],
[
"Csabai",
"István",
""
],
[
"Dobos",
"László",
""
],
[
"Szüle",
"János",
""
],
[
"Barankai",
"Norbert",
""
],
[
"Hanyecz",
"Tamás",
""
],
[
"Sebők",
"Tamás",
""
],
[
"Kallus",
"Zsófia",
""
],
[
"Vattay",
"Gábor",
""
]
] | TITLE: Using Robust PCA to estimate regional characteristics of language use
from geo-tagged Twitter messages
ABSTRACT: Principal component analysis (PCA) and related techniques have been
successfully employed in natural language processing. Text mining applications
in the age of the online social media (OSM) face new challenges due to
properties specific to these use cases (e.g. spelling issues specific to texts
posted by users, the presence of spammers and bots, service announcements,
etc.). In this paper, we employ a Robust PCA technique to separate typical
outliers and highly localized topics from the low-dimensional structure present
in language use in online social networks. Our focus is on identifying
geospatial features among the messages posted by the users of the Twitter
microblogging service. Using a dataset which consists of over 200 million
geolocated tweets collected over the course of a year, we investigate whether
the information present in word usage frequencies can be used to identify
regional features of language use and topics of interest. Using the PCA pursuit
method, we are able to identify important low-dimensional features, which
constitute smoothly varying functions of the geographic location.
|
1311.1194 | Saif Mohammad Dr. | Saif M. Mohammad, Svetlana Kiritchenko, and Joel Martin | Identifying Purpose Behind Electoral Tweets | null | In Proceedings of the KDD Workshop on Issues of Sentiment
Discovery and Opinion Mining (WISDOM-2013), August 2013, Chicago, USA | null | null | cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Tweets pertaining to a single event, such as a national election, can number
in the hundreds of millions. Automatically analyzing them is beneficial in many
downstream natural language applications such as question answering and
summarization. In this paper, we propose a new task: identifying the purpose
behind electoral tweets--why do people post election-oriented tweets? We show
that identifying purpose is correlated with the related phenomenon of sentiment
and emotion detection, but yet significantly different. Detecting purpose has a
number of applications including detecting the mood of the electorate,
estimating the popularity of policies, identifying key issues of contention,
and predicting the course of events. We create a large dataset of electoral
tweets and annotate a few thousand tweets for purpose. We develop a system that
automatically classifies electoral tweets as per their purpose, obtaining an
accuracy of 43.56% on an 11-class task and an accuracy of 73.91% on a 3-class
task (both accuracies well above the most-frequent-class baseline). Finally, we
show that resources developed for emotion detection are also helpful for
detecting purpose.
| [
{
"version": "v1",
"created": "Tue, 5 Nov 2013 20:55:23 GMT"
}
] | 2013-11-06T00:00:00 | [
[
"Mohammad",
"Saif M.",
""
],
[
"Kiritchenko",
"Svetlana",
""
],
[
"Martin",
"Joel",
""
]
] | TITLE: Identifying Purpose Behind Electoral Tweets
ABSTRACT: Tweets pertaining to a single event, such as a national election, can number
in the hundreds of millions. Automatically analyzing them is beneficial in many
downstream natural language applications such as question answering and
summarization. In this paper, we propose a new task: identifying the purpose
behind electoral tweets--why do people post election-oriented tweets? We show
that identifying purpose is correlated with the related phenomenon of sentiment
and emotion detection, but yet significantly different. Detecting purpose has a
number of applications including detecting the mood of the electorate,
estimating the popularity of policies, identifying key issues of contention,
and predicting the course of events. We create a large dataset of electoral
tweets and annotate a few thousand tweets for purpose. We develop a system that
automatically classifies electoral tweets as per their purpose, obtaining an
accuracy of 43.56% on an 11-class task and an accuracy of 73.91% on a 3-class
task (both accuracies well above the most-frequent-class baseline). Finally, we
show that resources developed for emotion detection are also helpful for
detecting purpose.
|
1210.3384 | Shankar Vembu | Wei Jiao, Shankar Vembu, Amit G. Deshwar, Lincoln Stein, Quaid Morris | Inferring clonal evolution of tumors from single nucleotide somatic
mutations | null | null | null | null | cs.LG q-bio.PE q-bio.QM stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | High-throughput sequencing allows the detection and quantification of
frequencies of somatic single nucleotide variants (SNV) in heterogeneous tumor
cell populations. In some cases, the evolutionary history and population
frequency of the subclonal lineages of tumor cells present in the sample can be
reconstructed from these SNV frequency measurements. However, automated methods
to do this reconstruction are not available and the conditions under which
reconstruction is possible have not been described.
We describe the conditions under which the evolutionary history can be
uniquely reconstructed from SNV frequencies from single or multiple samples
from the tumor population and we introduce a new statistical model, PhyloSub,
that infers the phylogeny and genotype of the major subclonal lineages
represented in the population of cancer cells. It uses a Bayesian nonparametric
prior over trees that groups SNVs into major subclonal lineages and
automatically estimates the number of lineages and their ancestry. We sample
from the joint posterior distribution over trees to identify evolutionary
histories and cell population frequencies that have the highest probability of
generating the observed SNV frequency data. When multiple phylogenies are
consistent with a given set of SNV frequencies, PhyloSub represents the
uncertainty in the tumor phylogeny using a partial order plot. Experiments on a
simulated dataset and two real datasets comprising tumor samples from acute
myeloid leukemia and chronic lymphocytic leukemia patients demonstrate that
PhyloSub can infer both linear (or chain) and branching lineages and its
inferences are in good agreement with ground truth, where it is available.
| [
{
"version": "v1",
"created": "Thu, 11 Oct 2012 22:20:33 GMT"
},
{
"version": "v2",
"created": "Mon, 15 Oct 2012 18:41:13 GMT"
},
{
"version": "v3",
"created": "Sun, 16 Jun 2013 18:35:00 GMT"
},
{
"version": "v4",
"created": "Sat, 2 Nov 2013 21:38:34 GMT"
}
] | 2013-11-05T00:00:00 | [
[
"Jiao",
"Wei",
""
],
[
"Vembu",
"Shankar",
""
],
[
"Deshwar",
"Amit G.",
""
],
[
"Stein",
"Lincoln",
""
],
[
"Morris",
"Quaid",
""
]
] | TITLE: Inferring clonal evolution of tumors from single nucleotide somatic
mutations
ABSTRACT: High-throughput sequencing allows the detection and quantification of
frequencies of somatic single nucleotide variants (SNV) in heterogeneous tumor
cell populations. In some cases, the evolutionary history and population
frequency of the subclonal lineages of tumor cells present in the sample can be
reconstructed from these SNV frequency measurements. However, automated methods
to do this reconstruction are not available and the conditions under which
reconstruction is possible have not been described.
We describe the conditions under which the evolutionary history can be
uniquely reconstructed from SNV frequencies from single or multiple samples
from the tumor population and we introduce a new statistical model, PhyloSub,
that infers the phylogeny and genotype of the major subclonal lineages
represented in the population of cancer cells. It uses a Bayesian nonparametric
prior over trees that groups SNVs into major subclonal lineages and
automatically estimates the number of lineages and their ancestry. We sample
from the joint posterior distribution over trees to identify evolutionary
histories and cell population frequencies that have the highest probability of
generating the observed SNV frequency data. When multiple phylogenies are
consistent with a given set of SNV frequencies, PhyloSub represents the
uncertainty in the tumor phylogeny using a partial order plot. Experiments on a
simulated dataset and two real datasets comprising tumor samples from acute
myeloid leukemia and chronic lymphocytic leukemia patients demonstrate that
PhyloSub can infer both linear (or chain) and branching lineages and its
inferences are in good agreement with ground truth, where it is available.
|
1305.4583 | Xin Zhao | Xin Zhao | Parallel Coordinates Guided High Dimensional Transfer Function Design | 6 pages, 5 figures. This paper has been withdrawn by the author due
to publication | null | null | null | cs.GR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | High-dimensional transfer function design is widely used to provide
appropriate data classification for direct volume rendering of various
datasets. However, its design is a complicated task. Parallel coordinate plot
(PCP), as a powerful visualization tool, can efficiently display
high-dimensional geometry and accurately analyze multivariate data. In this
paper, we propose to combine parallel coordinates with dimensional reduction
methods to guide high-dimensional transfer function design. Our pipeline has
two major advantages: (1) combine and display extracted high-dimensional
features in parameter space; and (2) select appropriate high-dimensional
parameters, with the help of dimensional reduction methods, to obtain
sophisticated data classification as transfer function for volume rendering. In
order to efficiently design high-dimensional transfer functions, the
combination of both parallel coordinate components and dimension reduction
results is necessary to generate final visualization results. We demonstrate
the capability of our method for direct volume rendering using various CT and
MRI datasets.
| [
{
"version": "v1",
"created": "Mon, 20 May 2013 17:27:29 GMT"
},
{
"version": "v2",
"created": "Sun, 3 Nov 2013 21:39:13 GMT"
}
] | 2013-11-05T00:00:00 | [
[
"Zhao",
"Xin",
""
]
] | TITLE: Parallel Coordinates Guided High Dimensional Transfer Function Design
ABSTRACT: High-dimensional transfer function design is widely used to provide
appropriate data classification for direct volume rendering of various
datasets. However, its design is a complicated task. Parallel coordinate plot
(PCP), as a powerful visualization tool, can efficiently display
high-dimensional geometry and accurately analyze multivariate data. In this
paper, we propose to combine parallel coordinates with dimensional reduction
methods to guide high-dimensional transfer function design. Our pipeline has
two major advantages: (1) combine and display extracted high-dimensional
features in parameter space; and (2) select appropriate high-dimensional
parameters, with the help of dimensional reduction methods, to obtain
sophisticated data classification as transfer function for volume rendering. In
order to efficiently design high-dimensional transfer functions, the
combination of both parallel coordinate components and dimension reduction
results is necessary to generate final visualization results. We demonstrate
the capability of our method for direct volume rendering using various CT and
MRI datasets.
|
1305.6143 | Vivek Narayanan | Vivek Narayanan, Ishan Arora, Arjun Bhatia | Fast and accurate sentiment classification using an enhanced Naive Bayes
model | 8 pages, 2 figures | Intelligent Data Engineering and Automated Learning IDEAL 2013
Lecture Notes in Computer Science Volume 8206, 2013, pp 194-201 | 10.1007/978-3-642-41278-3_24 | null | cs.CL cs.IR cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We have explored different methods of improving the accuracy of a Naive Bayes
classifier for sentiment analysis. We observed that a combination of methods
like negation handling, word n-grams and feature selection by mutual
information results in a significant improvement in accuracy. This implies that
a highly accurate and fast sentiment classifier can be built using a simple
Naive Bayes model that has linear training and testing time complexities. We
achieved an accuracy of 88.80% on the popular IMDB movie reviews dataset.
| [
{
"version": "v1",
"created": "Mon, 27 May 2013 08:37:26 GMT"
},
{
"version": "v2",
"created": "Mon, 16 Sep 2013 05:36:29 GMT"
}
] | 2013-11-05T00:00:00 | [
[
"Narayanan",
"Vivek",
""
],
[
"Arora",
"Ishan",
""
],
[
"Bhatia",
"Arjun",
""
]
] | TITLE: Fast and accurate sentiment classification using an enhanced Naive Bayes
model
ABSTRACT: We have explored different methods of improving the accuracy of a Naive Bayes
classifier for sentiment analysis. We observed that a combination of methods
like negation handling, word n-grams and feature selection by mutual
information results in a significant improvement in accuracy. This implies that
a highly accurate and fast sentiment classifier can be built using a simple
Naive Bayes model that has linear training and testing time complexities. We
achieved an accuracy of 88.80% on the popular IMDB movie reviews dataset.
|
1306.0811 | Giovanni Zappella | Nicol\`o Cesa-Bianchi, Claudio Gentile and Giovanni Zappella | A Gang of Bandits | NIPS 2013 | null | null | null | cs.LG cs.SI stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Multi-armed bandit problems are receiving a great deal of attention because
they adequately formalize the exploration-exploitation trade-offs arising in
several industrially relevant applications, such as online advertisement and,
more generally, recommendation systems. In many cases, however, these
applications have a strong social component, whose integration in the bandit
algorithm could lead to a dramatic performance increase. For instance, we may
want to serve content to a group of users by taking advantage of an underlying
network of social relationships among them. In this paper, we introduce novel
algorithmic approaches to the solution of such networked bandit problems. More
specifically, we design and analyze a global strategy which allocates a bandit
algorithm to each network node (user) and allows it to "share" signals
(contexts and payoffs) with the neghboring nodes. We then derive two more
scalable variants of this strategy based on different ways of clustering the
graph nodes. We experimentally compare the algorithm and its variants to
state-of-the-art methods for contextual bandits that do not use the relational
information. Our experiments, carried out on synthetic and real-world datasets,
show a marked increase in prediction performance obtained by exploiting the
network structure.
| [
{
"version": "v1",
"created": "Tue, 4 Jun 2013 14:24:31 GMT"
},
{
"version": "v2",
"created": "Fri, 25 Oct 2013 16:32:25 GMT"
},
{
"version": "v3",
"created": "Mon, 4 Nov 2013 10:07:42 GMT"
}
] | 2013-11-05T00:00:00 | [
[
"Cesa-Bianchi",
"Nicolò",
""
],
[
"Gentile",
"Claudio",
""
],
[
"Zappella",
"Giovanni",
""
]
] | TITLE: A Gang of Bandits
ABSTRACT: Multi-armed bandit problems are receiving a great deal of attention because
they adequately formalize the exploration-exploitation trade-offs arising in
several industrially relevant applications, such as online advertisement and,
more generally, recommendation systems. In many cases, however, these
applications have a strong social component, whose integration in the bandit
algorithm could lead to a dramatic performance increase. For instance, we may
want to serve content to a group of users by taking advantage of an underlying
network of social relationships among them. In this paper, we introduce novel
algorithmic approaches to the solution of such networked bandit problems. More
specifically, we design and analyze a global strategy which allocates a bandit
algorithm to each network node (user) and allows it to "share" signals
(contexts and payoffs) with the neghboring nodes. We then derive two more
scalable variants of this strategy based on different ways of clustering the
graph nodes. We experimentally compare the algorithm and its variants to
state-of-the-art methods for contextual bandits that do not use the relational
information. Our experiments, carried out on synthetic and real-world datasets,
show a marked increase in prediction performance obtained by exploiting the
network structure.
|
1306.1959 | Xin Zhao | Xin Zhao and Bo Li | Pattern Recognition and Revealing using Parallel Coordinates Plot | 8 pages and 6 figures. This paper has been withdrawn by the author
due to publication | null | null | null | cs.GR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Parallel coordinates plot (PCP) is an excellent tool for multivariate
visualization and analysis, but it may fail to reveal inherent structures for
datasets with a large number of items. In this paper, we propose a suite of
novel clustering, dimension ordering and visualization techniques based on PCP,
to reveal and highlight hidden structures. First, we propose a continuous
spline based polycurves design to extract and classify different cluster
aspects of the data. Then, we provide an efficient and optimal correlation
based sorting technique to reorder coordinates, as a helpful visualization tool
for data analysis. Various results generated by our framework visually
represent much structure, trend and correlation information to guide the user,
and improve the efficacy of analysis, especially for complex and noisy
datasets.
| [
{
"version": "v1",
"created": "Sat, 8 Jun 2013 21:18:43 GMT"
},
{
"version": "v2",
"created": "Sun, 3 Nov 2013 21:38:56 GMT"
}
] | 2013-11-05T00:00:00 | [
[
"Zhao",
"Xin",
""
],
[
"Li",
"Bo",
""
]
] | TITLE: Pattern Recognition and Revealing using Parallel Coordinates Plot
ABSTRACT: Parallel coordinates plot (PCP) is an excellent tool for multivariate
visualization and analysis, but it may fail to reveal inherent structures for
datasets with a large number of items. In this paper, we propose a suite of
novel clustering, dimension ordering and visualization techniques based on PCP,
to reveal and highlight hidden structures. First, we propose a continuous
spline based polycurves design to extract and classify different cluster
aspects of the data. Then, we provide an efficient and optimal correlation
based sorting technique to reorder coordinates, as a helpful visualization tool
for data analysis. Various results generated by our framework visually
represent much structure, trend and correlation information to guide the user,
and improve the efficacy of analysis, especially for complex and noisy
datasets.
|
1307.0147 | Xin Zhao | Bo Li, Xin Zhao and Hong Qin | 4-Dimensional Geometry Lens: A Novel Volumetric Magnification Approach | 12 pages. In CGF 2013. This paper has been withdrawn by the author
due to publication | null | null | null | cs.GR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present a novel methodology that utilizes 4-Dimensional (4D) space
deformation to simulate a magnification lens on versatile volume datasets and
textured solid models. Compared with other magnification methods (e.g.,
geometric optics, mesh editing), 4D differential geometry theory and its
practices are much more flexible and powerful for preserving shape features
(i.e., minimizing angle distortion), and easier to adapt to versatile solid
models. The primary advantage of 4D space lies at the following fact: we can
now easily magnify the volume of regions of interest (ROIs) from the additional
dimension, while keeping the rest region unchanged. To achieve this primary
goal, we first embed a 3D volumetric input into 4D space and magnify ROIs in
the 4th dimension. Then we flatten the 4D shape back into 3D space to
accommodate other typical applications in the real 3D world. In order to
enforce distortion minimization, in both steps we devise the high dimensional
geometry techniques based on rigorous 4D geometry theory for 3D/4D mapping back
and forth to amend the distortion. Our system can preserve not only focus
region, but also context region and global shape. We demonstrate the
effectiveness, robustness, and efficacy of our framework with a variety of
models ranging from tetrahedral meshes to volume datasets.
| [
{
"version": "v1",
"created": "Sat, 29 Jun 2013 20:20:37 GMT"
},
{
"version": "v2",
"created": "Sun, 3 Nov 2013 21:38:37 GMT"
}
] | 2013-11-05T00:00:00 | [
[
"Li",
"Bo",
""
],
[
"Zhao",
"Xin",
""
],
[
"Qin",
"Hong",
""
]
] | TITLE: 4-Dimensional Geometry Lens: A Novel Volumetric Magnification Approach
ABSTRACT: We present a novel methodology that utilizes 4-Dimensional (4D) space
deformation to simulate a magnification lens on versatile volume datasets and
textured solid models. Compared with other magnification methods (e.g.,
geometric optics, mesh editing), 4D differential geometry theory and its
practices are much more flexible and powerful for preserving shape features
(i.e., minimizing angle distortion), and easier to adapt to versatile solid
models. The primary advantage of 4D space lies at the following fact: we can
now easily magnify the volume of regions of interest (ROIs) from the additional
dimension, while keeping the rest region unchanged. To achieve this primary
goal, we first embed a 3D volumetric input into 4D space and magnify ROIs in
the 4th dimension. Then we flatten the 4D shape back into 3D space to
accommodate other typical applications in the real 3D world. In order to
enforce distortion minimization, in both steps we devise the high dimensional
geometry techniques based on rigorous 4D geometry theory for 3D/4D mapping back
and forth to amend the distortion. Our system can preserve not only focus
region, but also context region and global shape. We demonstrate the
effectiveness, robustness, and efficacy of our framework with a variety of
models ranging from tetrahedral meshes to volume datasets.
|
1307.1739 | Xin Zhao | Xin Zhao and Arie Kaufman | Anatomical Feature-guided Volumeric Registration of Multimodal Prostate
MRI | This paper has been withdrawn by the author due to publication | null | null | null | cs.CV cs.GR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Radiological imaging of prostate is becoming more popular among researchers
and clinicians in searching for diseases, primarily cancer. Scans might be
acquired at different times, with patient movement between scans, or with
different equipment, resulting in multiple datasets that need to be registered.
For this issue, we introduce a registration method using anatomical
feature-guided mutual information. Prostate scans of the same patient taken in
three different orientations are first aligned for the accurate detection of
anatomical features in 3D. Then, our pipeline allows for multiple modalities
registration through the use of anatomical features, such as the interior
urethra of prostate and gland utricle, in a bijective way. The novelty of this
approach is the application of anatomical features as the pre-specified
corresponding landmarks for prostate registration. We evaluate the registration
results through both artificial and clinical datasets. Registration accuracy is
evaluated by performing statistical analysis of local intensity differences or
spatial differences of anatomical landmarks between various MR datasets.
Evaluation results demonstrate that our method statistics-significantly
improves the quality of registration. Although this strategy is tested for
MRI-guided brachytherapy, the preliminary results from these experiments
suggest that it can be also applied to other settings such as transrectal
ultrasound-guided or CT-guided therapy, where the integration of preoperative
MRI may have a significant impact upon treatment planning and guidance.
| [
{
"version": "v1",
"created": "Sat, 6 Jul 2013 00:30:40 GMT"
},
{
"version": "v2",
"created": "Sun, 3 Nov 2013 21:38:08 GMT"
}
] | 2013-11-05T00:00:00 | [
[
"Zhao",
"Xin",
""
],
[
"Kaufman",
"Arie",
""
]
] | TITLE: Anatomical Feature-guided Volumeric Registration of Multimodal Prostate
MRI
ABSTRACT: Radiological imaging of prostate is becoming more popular among researchers
and clinicians in searching for diseases, primarily cancer. Scans might be
acquired at different times, with patient movement between scans, or with
different equipment, resulting in multiple datasets that need to be registered.
For this issue, we introduce a registration method using anatomical
feature-guided mutual information. Prostate scans of the same patient taken in
three different orientations are first aligned for the accurate detection of
anatomical features in 3D. Then, our pipeline allows for multiple modalities
registration through the use of anatomical features, such as the interior
urethra of prostate and gland utricle, in a bijective way. The novelty of this
approach is the application of anatomical features as the pre-specified
corresponding landmarks for prostate registration. We evaluate the registration
results through both artificial and clinical datasets. Registration accuracy is
evaluated by performing statistical analysis of local intensity differences or
spatial differences of anatomical landmarks between various MR datasets.
Evaluation results demonstrate that our method statistics-significantly
improves the quality of registration. Although this strategy is tested for
MRI-guided brachytherapy, the preliminary results from these experiments
suggest that it can be also applied to other settings such as transrectal
ultrasound-guided or CT-guided therapy, where the integration of preoperative
MRI may have a significant impact upon treatment planning and guidance.
|
1311.0378 | George Teodoro | George Teodoro and Tahsin Kurc and Jun Kong and Lee Cooper and Joel
Saltz | Comparative Performance Analysis of Intel Xeon Phi, GPU, and CPU | 11 pages, 2 figures | null | null | null | cs.DC cs.PF | http://creativecommons.org/licenses/publicdomain/ | We investigate and characterize the performance of an important class of
operations on GPUs and Many Integrated Core (MIC) architectures. Our work is
motivated by applications that analyze low-dimensional spatial datasets
captured by high resolution sensors, such as image datasets obtained from whole
slide tissue specimens using microscopy image scanners. We identify the data
access and computation patterns of operations in object segmentation and
feature computation categories. We systematically implement and evaluate the
performance of these core operations on modern CPUs, GPUs, and MIC systems for
a microscopy image analysis application. Our results show that (1) the data
access pattern and parallelization strategy employed by the operations strongly
affect their performance. While the performance on a MIC of operations that
perform regular data access is comparable or sometimes better than that on a
GPU; (2) GPUs are significantly more efficient than MICs for operations and
algorithms that irregularly access data. This is a result of the low
performance of the latter when it comes to random data access; (3) adequate
coordinated execution on MICs and CPUs using a performance aware task
scheduling strategy improves about 1.29x over a first-come-first-served
strategy. The example application attained an efficiency of 84% in an execution
with of 192 nodes (3072 CPU cores and 192 MICs).
| [
{
"version": "v1",
"created": "Sat, 2 Nov 2013 14:00:40 GMT"
}
] | 2013-11-05T00:00:00 | [
[
"Teodoro",
"George",
""
],
[
"Kurc",
"Tahsin",
""
],
[
"Kong",
"Jun",
""
],
[
"Cooper",
"Lee",
""
],
[
"Saltz",
"Joel",
""
]
] | TITLE: Comparative Performance Analysis of Intel Xeon Phi, GPU, and CPU
ABSTRACT: We investigate and characterize the performance of an important class of
operations on GPUs and Many Integrated Core (MIC) architectures. Our work is
motivated by applications that analyze low-dimensional spatial datasets
captured by high resolution sensors, such as image datasets obtained from whole
slide tissue specimens using microscopy image scanners. We identify the data
access and computation patterns of operations in object segmentation and
feature computation categories. We systematically implement and evaluate the
performance of these core operations on modern CPUs, GPUs, and MIC systems for
a microscopy image analysis application. Our results show that (1) the data
access pattern and parallelization strategy employed by the operations strongly
affect their performance. While the performance on a MIC of operations that
perform regular data access is comparable or sometimes better than that on a
GPU; (2) GPUs are significantly more efficient than MICs for operations and
algorithms that irregularly access data. This is a result of the low
performance of the latter when it comes to random data access; (3) adequate
coordinated execution on MICs and CPUs using a performance aware task
scheduling strategy improves about 1.29x over a first-come-first-served
strategy. The example application attained an efficiency of 84% in an execution
with of 192 nodes (3072 CPU cores and 192 MICs).
|
1311.0636 | Dhruv Mahajan | Dhruv Mahajan, S. Sathiya Keerthi, S. Sundararajan, Leon Bottou | A Parallel SGD method with Strong Convergence | null | null | null | null | cs.LG cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper proposes a novel parallel stochastic gradient descent (SGD) method
that is obtained by applying parallel sets of SGD iterations (each set
operating on one node using the data residing in it) for finding the direction
in each iteration of a batch descent method. The method has strong convergence
properties. Experiments on datasets with high dimensional feature spaces show
the value of this method.
| [
{
"version": "v1",
"created": "Mon, 4 Nov 2013 10:31:11 GMT"
}
] | 2013-11-05T00:00:00 | [
[
"Mahajan",
"Dhruv",
""
],
[
"Keerthi",
"S. Sathiya",
""
],
[
"Sundararajan",
"S.",
""
],
[
"Bottou",
"Leon",
""
]
] | TITLE: A Parallel SGD method with Strong Convergence
ABSTRACT: This paper proposes a novel parallel stochastic gradient descent (SGD) method
that is obtained by applying parallel sets of SGD iterations (each set
operating on one node using the data residing in it) for finding the direction
in each iteration of a batch descent method. The method has strong convergence
properties. Experiments on datasets with high dimensional feature spaces show
the value of this method.
|
1311.0833 | Zitao Liu | Zitao Liu | A Comparative Study on Linguistic Feature Selection in Sentiment
Polarity Classification | arXiv admin note: text overlap with arXiv:cs/0205070 by other authors | null | null | null | cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Sentiment polarity classification is perhaps the most widely studied topic.
It classifies an opinionated document as expressing a positive or negative
opinion. In this paper, using movie review dataset, we perform a comparative
study with different single kind linguistic features and the combinations of
these features. We find that the classic topic-based classifier(Naive Bayes and
Support Vector Machine) do not perform as well on sentiment polarity
classification. And we find that with some combination of different linguistic
features, the classification accuracy can be boosted a lot. We give some
reasonable explanations about these boosting outcomes.
| [
{
"version": "v1",
"created": "Mon, 4 Nov 2013 20:11:35 GMT"
}
] | 2013-11-05T00:00:00 | [
[
"Liu",
"Zitao",
""
]
] | TITLE: A Comparative Study on Linguistic Feature Selection in Sentiment
Polarity Classification
ABSTRACT: Sentiment polarity classification is perhaps the most widely studied topic.
It classifies an opinionated document as expressing a positive or negative
opinion. In this paper, using movie review dataset, we perform a comparative
study with different single kind linguistic features and the combinations of
these features. We find that the classic topic-based classifier(Naive Bayes and
Support Vector Machine) do not perform as well on sentiment polarity
classification. And we find that with some combination of different linguistic
features, the classification accuracy can be boosted a lot. We give some
reasonable explanations about these boosting outcomes.
|
1305.6659 | Trevor Campbell | Trevor Campbell, Miao Liu, Brian Kulis, Jonathan P. How, Lawrence
Carin | Dynamic Clustering via Asymptotics of the Dependent Dirichlet Process
Mixture | This paper is from NIPS 2013. Please use the following BibTeX
citation: @inproceedings{Campbell13_NIPS, Author = {Trevor Campbell and Miao
Liu and Brian Kulis and Jonathan P. How and Lawrence Carin}, Title = {Dynamic
Clustering via Asymptotics of the Dependent Dirichlet Process}, Booktitle =
{Advances in Neural Information Processing Systems (NIPS)}, Year = {2013}} | null | null | null | cs.LG stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper presents a novel algorithm, based upon the dependent Dirichlet
process mixture model (DDPMM), for clustering batch-sequential data containing
an unknown number of evolving clusters. The algorithm is derived via a
low-variance asymptotic analysis of the Gibbs sampling algorithm for the DDPMM,
and provides a hard clustering with convergence guarantees similar to those of
the k-means algorithm. Empirical results from a synthetic test with moving
Gaussian clusters and a test with real ADS-B aircraft trajectory data
demonstrate that the algorithm requires orders of magnitude less computational
time than contemporary probabilistic and hard clustering algorithms, while
providing higher accuracy on the examined datasets.
| [
{
"version": "v1",
"created": "Tue, 28 May 2013 23:59:16 GMT"
},
{
"version": "v2",
"created": "Fri, 1 Nov 2013 18:25:39 GMT"
}
] | 2013-11-04T00:00:00 | [
[
"Campbell",
"Trevor",
""
],
[
"Liu",
"Miao",
""
],
[
"Kulis",
"Brian",
""
],
[
"How",
"Jonathan P.",
""
],
[
"Carin",
"Lawrence",
""
]
] | TITLE: Dynamic Clustering via Asymptotics of the Dependent Dirichlet Process
Mixture
ABSTRACT: This paper presents a novel algorithm, based upon the dependent Dirichlet
process mixture model (DDPMM), for clustering batch-sequential data containing
an unknown number of evolving clusters. The algorithm is derived via a
low-variance asymptotic analysis of the Gibbs sampling algorithm for the DDPMM,
and provides a hard clustering with convergence guarantees similar to those of
the k-means algorithm. Empirical results from a synthetic test with moving
Gaussian clusters and a test with real ADS-B aircraft trajectory data
demonstrate that the algorithm requires orders of magnitude less computational
time than contemporary probabilistic and hard clustering algorithms, while
providing higher accuracy on the examined datasets.
|
1307.1493 | Stefan Wager | Stefan Wager, Sida Wang, and Percy Liang | Dropout Training as Adaptive Regularization | 11 pages. Advances in Neural Information Processing Systems (NIPS),
2013 | null | null | null | stat.ML cs.LG stat.ME | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Dropout and other feature noising schemes control overfitting by artificially
corrupting the training data. For generalized linear models, dropout performs a
form of adaptive regularization. Using this viewpoint, we show that the dropout
regularizer is first-order equivalent to an L2 regularizer applied after
scaling the features by an estimate of the inverse diagonal Fisher information
matrix. We also establish a connection to AdaGrad, an online learning
algorithm, and find that a close relative of AdaGrad operates by repeatedly
solving linear dropout-regularized problems. By casting dropout as
regularization, we develop a natural semi-supervised algorithm that uses
unlabeled data to create a better adaptive regularizer. We apply this idea to
document classification tasks, and show that it consistently boosts the
performance of dropout training, improving on state-of-the-art results on the
IMDB reviews dataset.
| [
{
"version": "v1",
"created": "Thu, 4 Jul 2013 21:33:56 GMT"
},
{
"version": "v2",
"created": "Fri, 1 Nov 2013 17:56:35 GMT"
}
] | 2013-11-04T00:00:00 | [
[
"Wager",
"Stefan",
""
],
[
"Wang",
"Sida",
""
],
[
"Liang",
"Percy",
""
]
] | TITLE: Dropout Training as Adaptive Regularization
ABSTRACT: Dropout and other feature noising schemes control overfitting by artificially
corrupting the training data. For generalized linear models, dropout performs a
form of adaptive regularization. Using this viewpoint, we show that the dropout
regularizer is first-order equivalent to an L2 regularizer applied after
scaling the features by an estimate of the inverse diagonal Fisher information
matrix. We also establish a connection to AdaGrad, an online learning
algorithm, and find that a close relative of AdaGrad operates by repeatedly
solving linear dropout-regularized problems. By casting dropout as
regularization, we develop a natural semi-supervised algorithm that uses
unlabeled data to create a better adaptive regularizer. We apply this idea to
document classification tasks, and show that it consistently boosts the
performance of dropout training, improving on state-of-the-art results on the
IMDB reviews dataset.
|
1306.4626 | Laetitia Gauvin | Laetitia Gauvin, Andr\'e Panisson, Ciro Cattuto and Alain Barrat | Activity clocks: spreading dynamics on temporal networks of human
contact | null | Scientific Reports 3, 3099 (2013) | 10.1038/srep03099 | null | physics.soc-ph cs.SI nlin.AO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Dynamical processes on time-varying complex networks are key to understanding
and modeling a broad variety of processes in socio-technical systems. Here we
focus on empirical temporal networks of human proximity and we aim at
understanding the factors that, in simulation, shape the arrival time
distribution of simple spreading processes. Abandoning the notion of wall-clock
time in favour of node-specific clocks based on activity exposes robust
statistical patterns in the arrival times across different social contexts.
Using randomization strategies and generative models constrained by data, we
show that these patterns can be understood in terms of heterogeneous
inter-event time distributions coupled with heterogeneous numbers of events per
edge. We also show, both empirically and by using a synthetic dataset, that
significant deviations from the above behavior can be caused by the presence of
edge classes with strong activity correlations.
| [
{
"version": "v1",
"created": "Wed, 19 Jun 2013 17:44:40 GMT"
},
{
"version": "v2",
"created": "Thu, 31 Oct 2013 14:13:04 GMT"
}
] | 2013-11-01T00:00:00 | [
[
"Gauvin",
"Laetitia",
""
],
[
"Panisson",
"André",
""
],
[
"Cattuto",
"Ciro",
""
],
[
"Barrat",
"Alain",
""
]
] | TITLE: Activity clocks: spreading dynamics on temporal networks of human
contact
ABSTRACT: Dynamical processes on time-varying complex networks are key to understanding
and modeling a broad variety of processes in socio-technical systems. Here we
focus on empirical temporal networks of human proximity and we aim at
understanding the factors that, in simulation, shape the arrival time
distribution of simple spreading processes. Abandoning the notion of wall-clock
time in favour of node-specific clocks based on activity exposes robust
statistical patterns in the arrival times across different social contexts.
Using randomization strategies and generative models constrained by data, we
show that these patterns can be understood in terms of heterogeneous
inter-event time distributions coupled with heterogeneous numbers of events per
edge. We also show, both empirically and by using a synthetic dataset, that
significant deviations from the above behavior can be caused by the presence of
edge classes with strong activity correlations.
|
1310.8494 | Sparsh Mittal | Sparsh Mittal | Using Cache-coloring to Mitigate Inter-set Write Variation in
Non-volatile Caches | STT-RAM cache | null | null | null | cs.AR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In recent years, researchers have explored use of non-volatile devices such
as STT-RAM (spin torque transfer RAM) for designing on-chip caches, since they
provide high density and consume low leakage power. A common limitation of all
non-volatile devices is their limited write endurance. Further, since existing
cache management policies are write-variation unaware, excessive writes to a
few blocks may lead to a quick failure of the whole cache. We propose an
architectural technique for wear-leveling of non-volatile last level caches
(LLCs). Our technique uses cache-coloring approach which adds a
software-controlled mapping layer between groups of physical pages and cache
sets. Periodically the mapping is altered to ensure that write-traffic can be
spread uniformly to different sets of the cache to achieve wear-leveling.
Simulations performed with an x86-64 simulator and SPEC2006 benchmarks show
that our technique reduces the worst-case writes to cache blocks and thus
improves the cache lifetime by 4.07X.
| [
{
"version": "v1",
"created": "Thu, 31 Oct 2013 13:33:16 GMT"
}
] | 2013-11-01T00:00:00 | [
[
"Mittal",
"Sparsh",
""
]
] | TITLE: Using Cache-coloring to Mitigate Inter-set Write Variation in
Non-volatile Caches
ABSTRACT: In recent years, researchers have explored use of non-volatile devices such
as STT-RAM (spin torque transfer RAM) for designing on-chip caches, since they
provide high density and consume low leakage power. A common limitation of all
non-volatile devices is their limited write endurance. Further, since existing
cache management policies are write-variation unaware, excessive writes to a
few blocks may lead to a quick failure of the whole cache. We propose an
architectural technique for wear-leveling of non-volatile last level caches
(LLCs). Our technique uses cache-coloring approach which adds a
software-controlled mapping layer between groups of physical pages and cache
sets. Periodically the mapping is altered to ensure that write-traffic can be
spread uniformly to different sets of the cache to achieve wear-leveling.
Simulations performed with an x86-64 simulator and SPEC2006 benchmarks show
that our technique reduces the worst-case writes to cache blocks and thus
improves the cache lifetime by 4.07X.
|
1310.8583 | Swakkhar Shatabda | Swakkhar Shatabda, M.A. Hakim Newton, Duc Nghia Pham and Abdul Sattar | A Hybrid Local Search for Simplified Protein Structure Prediction | null | Proceedings of the International Conference on Bioinformatics
Models, Methods and Algorithms, Barcelona, Spain, 11 - 14 February, 2013.
SciTePress 2013 ISBN 978-989-8565-35-8 pages:158-163 | null | null | cs.CE cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Protein structure prediction based on Hydrophobic-Polar energy model
essentially becomes searching for a conformation having a compact hydrophobic
core at the center. The hydrophobic core minimizes the interaction energy
between the amino acids of the given protein. Local search algorithms can
quickly find very good conformations by moving repeatedly from the current
solution to its "best" neighbor. However, once such a compact hydrophobic core
is found, the search stagnates and spends enormous effort in quest of an
alternative core. In this paper, we attempt to restructure segments of a
conformation with such compact core. We select one large segment or a number of
small segments and apply exhaustive local search. We also apply a mix of
heuristics so that one heuristic can help escape local minima of another. We
evaluated our algorithm by using Face Centered Cubic (FCC) Lattice on a set of
standard benchmark proteins and obtain significantly better results than that
of the state-of-the-art methods.
| [
{
"version": "v1",
"created": "Thu, 31 Oct 2013 16:41:44 GMT"
}
] | 2013-11-01T00:00:00 | [
[
"Shatabda",
"Swakkhar",
""
],
[
"Newton",
"M. A. Hakim",
""
],
[
"Pham",
"Duc Nghia",
""
],
[
"Sattar",
"Abdul",
""
]
] | TITLE: A Hybrid Local Search for Simplified Protein Structure Prediction
ABSTRACT: Protein structure prediction based on Hydrophobic-Polar energy model
essentially becomes searching for a conformation having a compact hydrophobic
core at the center. The hydrophobic core minimizes the interaction energy
between the amino acids of the given protein. Local search algorithms can
quickly find very good conformations by moving repeatedly from the current
solution to its "best" neighbor. However, once such a compact hydrophobic core
is found, the search stagnates and spends enormous effort in quest of an
alternative core. In this paper, we attempt to restructure segments of a
conformation with such compact core. We select one large segment or a number of
small segments and apply exhaustive local search. We also apply a mix of
heuristics so that one heuristic can help escape local minima of another. We
evaluated our algorithm by using Face Centered Cubic (FCC) Lattice on a set of
standard benchmark proteins and obtain significantly better results than that
of the state-of-the-art methods.
|
1308.6324 | Jakub Tomczak Ph.D. | Jakub M. Tomczak | Prediction of breast cancer recurrence using Classification Restricted
Boltzmann Machine with Dropping | technical report | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we apply Classification Restricted Boltzmann Machine
(ClassRBM) to the problem of predicting breast cancer recurrence. According to
the Polish National Cancer Registry, in 2010 only, the breast cancer caused
almost 25% of all diagnosed cases of cancer in Poland. We propose how to use
ClassRBM for predicting breast cancer return and discovering relevant inputs
(symptoms) in illness reappearance. Next, we outline a general probabilistic
framework for learning Boltzmann machines with masks, which we refer to as
Dropping. The fashion of generating masks leads to different learning methods,
i.e., DropOut, DropConnect. We propose a new method called DropPart which is a
generalization of DropConnect. In DropPart the Beta distribution instead of
Bernoulli distribution in DropConnect is used. At the end, we carry out an
experiment using real-life dataset consisting of 949 cases, provided by the
Institute of Oncology Ljubljana.
| [
{
"version": "v1",
"created": "Wed, 28 Aug 2013 22:08:29 GMT"
},
{
"version": "v2",
"created": "Wed, 30 Oct 2013 16:10:27 GMT"
}
] | 2013-10-31T00:00:00 | [
[
"Tomczak",
"Jakub M.",
""
]
] | TITLE: Prediction of breast cancer recurrence using Classification Restricted
Boltzmann Machine with Dropping
ABSTRACT: In this paper, we apply Classification Restricted Boltzmann Machine
(ClassRBM) to the problem of predicting breast cancer recurrence. According to
the Polish National Cancer Registry, in 2010 only, the breast cancer caused
almost 25% of all diagnosed cases of cancer in Poland. We propose how to use
ClassRBM for predicting breast cancer return and discovering relevant inputs
(symptoms) in illness reappearance. Next, we outline a general probabilistic
framework for learning Boltzmann machines with masks, which we refer to as
Dropping. The fashion of generating masks leads to different learning methods,
i.e., DropOut, DropConnect. We propose a new method called DropPart which is a
generalization of DropConnect. In DropPart the Beta distribution instead of
Bernoulli distribution in DropConnect is used. At the end, we carry out an
experiment using real-life dataset consisting of 949 cases, provided by the
Institute of Oncology Ljubljana.
|
1310.8004 | Boyu Wang | Boyu Wang, Joelle Pineau | Online Ensemble Learning for Imbalanced Data Streams | null | null | null | null | cs.LG stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | While both cost-sensitive learning and online learning have been studied
extensively, the effort in simultaneously dealing with these two issues is
limited. Aiming at this challenge task, a novel learning framework is proposed
in this paper. The key idea is based on the fusion of online ensemble
algorithms and the state of the art batch mode cost-sensitive bagging/boosting
algorithms. Within this framework, two separately developed research areas are
bridged together, and a batch of theoretically sound online cost-sensitive
bagging and online cost-sensitive boosting algorithms are first proposed.
Unlike other online cost-sensitive learning algorithms lacking theoretical
analysis of asymptotic properties, the convergence of the proposed algorithms
is guaranteed under certain conditions, and the experimental evidence with
benchmark data sets also validates the effectiveness and efficiency of the
proposed methods.
| [
{
"version": "v1",
"created": "Wed, 30 Oct 2013 02:11:48 GMT"
}
] | 2013-10-31T00:00:00 | [
[
"Wang",
"Boyu",
""
],
[
"Pineau",
"Joelle",
""
]
] | TITLE: Online Ensemble Learning for Imbalanced Data Streams
ABSTRACT: While both cost-sensitive learning and online learning have been studied
extensively, the effort in simultaneously dealing with these two issues is
limited. Aiming at this challenge task, a novel learning framework is proposed
in this paper. The key idea is based on the fusion of online ensemble
algorithms and the state of the art batch mode cost-sensitive bagging/boosting
algorithms. Within this framework, two separately developed research areas are
bridged together, and a batch of theoretically sound online cost-sensitive
bagging and online cost-sensitive boosting algorithms are first proposed.
Unlike other online cost-sensitive learning algorithms lacking theoretical
analysis of asymptotic properties, the convergence of the proposed algorithms
is guaranteed under certain conditions, and the experimental evidence with
benchmark data sets also validates the effectiveness and efficiency of the
proposed methods.
|
1310.8059 | Thabet Slimani | Thabet Slimani | Description and Evaluation of Semantic Similarity Measures Approaches | 10 pages | International Journal of Computer Applications 80(10):25-33,
October 2013. Published by Foundation of Computer Science, New York, USA | 10.5120/13897-1851 | null | cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In recent years, semantic similarity measure has a great interest in Semantic
Web and Natural Language Processing (NLP). Several similarity measures have
been developed, being given the existence of a structured knowledge
representation offered by ontologies and corpus which enable semantic
interpretation of terms. Semantic similarity measures compute the similarity
between concepts/terms included in knowledge sources in order to perform
estimations. This paper discusses the existing semantic similarity methods
based on structure, information content and feature approaches. Additionally,
we present a critical evaluation of several categories of semantic similarity
approaches based on two standard benchmarks. The aim of this paper is to give
an efficient evaluation of all these measures which help researcher and
practitioners to select the measure that best fit for their requirements.
| [
{
"version": "v1",
"created": "Wed, 30 Oct 2013 08:08:43 GMT"
}
] | 2013-10-31T00:00:00 | [
[
"Slimani",
"Thabet",
""
]
] | TITLE: Description and Evaluation of Semantic Similarity Measures Approaches
ABSTRACT: In recent years, semantic similarity measure has a great interest in Semantic
Web and Natural Language Processing (NLP). Several similarity measures have
been developed, being given the existence of a structured knowledge
representation offered by ontologies and corpus which enable semantic
interpretation of terms. Semantic similarity measures compute the similarity
between concepts/terms included in knowledge sources in order to perform
estimations. This paper discusses the existing semantic similarity methods
based on structure, information content and feature approaches. Additionally,
we present a critical evaluation of several categories of semantic similarity
approaches based on two standard benchmarks. The aim of this paper is to give
an efficient evaluation of all these measures which help researcher and
practitioners to select the measure that best fit for their requirements.
|
1310.8115 | Marco Congedo | Marco Congedo, Alexandre Barachant and Anton Andreev | A New Generation of Brain-Computer Interface Based on Riemannian
Geometry | 33 pages, 9 Figures, 17 equations/algorithms | null | null | null | cs.HC math.DG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Based on the cumulated experience over the past 25 years in the field of
Brain-Computer Interface (BCI) we can now envision a new generation of BCI.
Such BCIs will not require training; instead they will be smartly initialized
using remote massive databases and will adapt to the user fast and effectively
in the first minute of use. They will be reliable, robust and will maintain
good performances within and across sessions. A general classification
framework based on recent advances in Riemannian geometry and possessing these
characteristics is presented. It applies equally well to BCI based on
event-related potentials (ERP), sensorimotor (mu) rhythms and steady-state
evoked potential (SSEP). The framework is very simple, both algorithmically and
computationally. Due to its simplicity, its ability to learn rapidly (with
little training data) and its good across-subject and across-session
generalization, this strategy a very good candidate for building a new
generation of BCIs, thus we hereby propose it as a benchmark method for the
field.
| [
{
"version": "v1",
"created": "Wed, 30 Oct 2013 12:18:18 GMT"
}
] | 2013-10-31T00:00:00 | [
[
"Congedo",
"Marco",
""
],
[
"Barachant",
"Alexandre",
""
],
[
"Andreev",
"Anton",
""
]
] | TITLE: A New Generation of Brain-Computer Interface Based on Riemannian
Geometry
ABSTRACT: Based on the cumulated experience over the past 25 years in the field of
Brain-Computer Interface (BCI) we can now envision a new generation of BCI.
Such BCIs will not require training; instead they will be smartly initialized
using remote massive databases and will adapt to the user fast and effectively
in the first minute of use. They will be reliable, robust and will maintain
good performances within and across sessions. A general classification
framework based on recent advances in Riemannian geometry and possessing these
characteristics is presented. It applies equally well to BCI based on
event-related potentials (ERP), sensorimotor (mu) rhythms and steady-state
evoked potential (SSEP). The framework is very simple, both algorithmically and
computationally. Due to its simplicity, its ability to learn rapidly (with
little training data) and its good across-subject and across-session
generalization, this strategy a very good candidate for building a new
generation of BCIs, thus we hereby propose it as a benchmark method for the
field.
|
1310.8278 | Sicun Gao | Sicun Gao, Soonho Kong, Edmund Clarke | Satisfiability Modulo ODEs | Published in FMCAD 2013 | null | null | null | cs.LO cs.SY | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study SMT problems over the reals containing ordinary differential
equations. They are important for formal verification of realistic hybrid
systems and embedded software. We develop delta-complete algorithms for SMT
formulas that are purely existentially quantified, as well as exists-forall
formulas whose universal quantification is restricted to the time variables. We
demonstrate scalability of the algorithms, as implemented in our open-source
solver dReal, on SMT benchmarks with several hundred nonlinear ODEs and
variables.
| [
{
"version": "v1",
"created": "Wed, 30 Oct 2013 19:24:34 GMT"
}
] | 2013-10-31T00:00:00 | [
[
"Gao",
"Sicun",
""
],
[
"Kong",
"Soonho",
""
],
[
"Clarke",
"Edmund",
""
]
] | TITLE: Satisfiability Modulo ODEs
ABSTRACT: We study SMT problems over the reals containing ordinary differential
equations. They are important for formal verification of realistic hybrid
systems and embedded software. We develop delta-complete algorithms for SMT
formulas that are purely existentially quantified, as well as exists-forall
formulas whose universal quantification is restricted to the time variables. We
demonstrate scalability of the algorithms, as implemented in our open-source
solver dReal, on SMT benchmarks with several hundred nonlinear ODEs and
variables.
|
1308.1995 | Shuyang Lin | Shuyang Lin, Xiangnan Kong, Philip S. Yu | Predicting Trends in Social Networks via Dynamic Activeness Model | 10 pages, a shorter version published in CIKM 2013 | null | null | null | cs.SI physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | With the effect of word-of-the-mouth, trends in social networks are now
playing a significant role in shaping people's lives. Predicting dynamic trends
is an important problem with many useful applications. There are three dynamic
characteristics of a trend that should be captured by a trend model: intensity,
coverage and duration. However, existing approaches on the information
diffusion are not capable of capturing these three characteristics. In this
paper, we study the problem of predicting dynamic trends in social networks. We
first define related concepts to quantify the dynamic characteristics of trends
in social networks, and formalize the problem of trend prediction. We then
propose a Dynamic Activeness (DA) model based on the novel concept of
activeness, and design a trend prediction algorithm using the DA model. Due to
the use of stacking principle, we are able to make the prediction algorithm
very efficient. We examine the prediction algorithm on a number of real social
network datasets, and show that it is more accurate than state-of-the-art
approaches.
| [
{
"version": "v1",
"created": "Thu, 8 Aug 2013 22:35:35 GMT"
},
{
"version": "v2",
"created": "Tue, 29 Oct 2013 03:31:24 GMT"
}
] | 2013-10-30T00:00:00 | [
[
"Lin",
"Shuyang",
""
],
[
"Kong",
"Xiangnan",
""
],
[
"Yu",
"Philip S.",
""
]
] | TITLE: Predicting Trends in Social Networks via Dynamic Activeness Model
ABSTRACT: With the effect of word-of-the-mouth, trends in social networks are now
playing a significant role in shaping people's lives. Predicting dynamic trends
is an important problem with many useful applications. There are three dynamic
characteristics of a trend that should be captured by a trend model: intensity,
coverage and duration. However, existing approaches on the information
diffusion are not capable of capturing these three characteristics. In this
paper, we study the problem of predicting dynamic trends in social networks. We
first define related concepts to quantify the dynamic characteristics of trends
in social networks, and formalize the problem of trend prediction. We then
propose a Dynamic Activeness (DA) model based on the novel concept of
activeness, and design a trend prediction algorithm using the DA model. Due to
the use of stacking principle, we are able to make the prediction algorithm
very efficient. We examine the prediction algorithm on a number of real social
network datasets, and show that it is more accurate than state-of-the-art
approaches.
|
1107.0789 | Lester Mackey | Lester Mackey, Ameet Talwalkar, Michael I. Jordan | Distributed Matrix Completion and Robust Factorization | 35 pages, 6 figures | null | null | null | cs.LG cs.DS cs.NA math.NA stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | If learning methods are to scale to the massive sizes of modern datasets, it
is essential for the field of machine learning to embrace parallel and
distributed computing. Inspired by the recent development of matrix
factorization methods with rich theory but poor computational complexity and by
the relative ease of mapping matrices onto distributed architectures, we
introduce a scalable divide-and-conquer framework for noisy matrix
factorization. We present a thorough theoretical analysis of this framework in
which we characterize the statistical errors introduced by the "divide" step
and control their magnitude in the "conquer" step, so that the overall
algorithm enjoys high-probability estimation guarantees comparable to those of
its base algorithm. We also present experiments in collaborative filtering and
video background modeling that demonstrate the near-linear to superlinear
speed-ups attainable with this approach.
| [
{
"version": "v1",
"created": "Tue, 5 Jul 2011 06:03:44 GMT"
},
{
"version": "v2",
"created": "Wed, 17 Aug 2011 00:59:30 GMT"
},
{
"version": "v3",
"created": "Wed, 21 Sep 2011 01:38:14 GMT"
},
{
"version": "v4",
"created": "Tue, 1 Nov 2011 05:37:48 GMT"
},
{
"version": "v5",
"created": "Fri, 18 May 2012 09:28:27 GMT"
},
{
"version": "v6",
"created": "Tue, 14 Aug 2012 17:33:30 GMT"
},
{
"version": "v7",
"created": "Mon, 28 Oct 2013 06:02:12 GMT"
}
] | 2013-10-29T00:00:00 | [
[
"Mackey",
"Lester",
""
],
[
"Talwalkar",
"Ameet",
""
],
[
"Jordan",
"Michael I.",
""
]
] | TITLE: Distributed Matrix Completion and Robust Factorization
ABSTRACT: If learning methods are to scale to the massive sizes of modern datasets, it
is essential for the field of machine learning to embrace parallel and
distributed computing. Inspired by the recent development of matrix
factorization methods with rich theory but poor computational complexity and by
the relative ease of mapping matrices onto distributed architectures, we
introduce a scalable divide-and-conquer framework for noisy matrix
factorization. We present a thorough theoretical analysis of this framework in
which we characterize the statistical errors introduced by the "divide" step
and control their magnitude in the "conquer" step, so that the overall
algorithm enjoys high-probability estimation guarantees comparable to those of
its base algorithm. We also present experiments in collaborative filtering and
video background modeling that demonstrate the near-linear to superlinear
speed-ups attainable with this approach.
|
1310.7262 | Ian Manchester | Seunggyun Cheong and Ian R. Manchester | Input Design for Model Discrimination and Fault Detection via Convex
Relaxation | Extended version of conference submission | null | null | null | cs.SY math.OC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper addresses the design of input signals for the purpose of
discriminating among a finite set of models dynamic systems within a given
finite time interval. A motivating application is fault detection and
isolation. We propose several specific optimization problems, with objectives
or constraints based on signal power, signal amplitude, and probability of
successful model discrimination. Since these optimization problems are
nonconvex, we suggest a suboptimal solution via a random search algorithm
guided by the semidefinite relaxation (SDR) and analyze the accuracy of the
suboptimal solution. We conclude with a simple example taken from a benchmark
problem on fault detection for wind turbines.
| [
{
"version": "v1",
"created": "Sun, 27 Oct 2013 22:35:24 GMT"
}
] | 2013-10-29T00:00:00 | [
[
"Cheong",
"Seunggyun",
""
],
[
"Manchester",
"Ian R.",
""
]
] | TITLE: Input Design for Model Discrimination and Fault Detection via Convex
Relaxation
ABSTRACT: This paper addresses the design of input signals for the purpose of
discriminating among a finite set of models dynamic systems within a given
finite time interval. A motivating application is fault detection and
isolation. We propose several specific optimization problems, with objectives
or constraints based on signal power, signal amplitude, and probability of
successful model discrimination. Since these optimization problems are
nonconvex, we suggest a suboptimal solution via a random search algorithm
guided by the semidefinite relaxation (SDR) and analyze the accuracy of the
suboptimal solution. We conclude with a simple example taken from a benchmark
problem on fault detection for wind turbines.
|
1310.7297 | Farhana Murtaza Choudhury | Farhana Murtaza Choudhury, Mohammed Eunus Ali, Sarah Masud, Suman
Nath, Ishat E Rabban | Scalable Visibility Color Map Construction in Spatial Databases | 12 pages, 14 figures | null | null | null | cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Recent advances in 3D modeling provide us with real 3D datasets to answer
queries, such as "What is the best position for a new billboard?" and "Which
hotel room has the best view?" in the presence of obstacles. These applications
require measuring and differentiating the visibility of an object (target) from
different viewpoints in a dataspace, e.g., a billboard may be seen from two
viewpoints but is readable only from the viewpoint closer to the target. In
this paper, we formulate the above problem of quantifying the visibility of
(from) a target object from (of) the surrounding area with a visibility color
map (VCM). A VCM is essentially defined as a surface color map of the space,
where each viewpoint of the space is assigned a color value that denotes the
visibility measure of the target from that viewpoint. Measuring the visibility
of a target even from a single viewpoint is an expensive operation, as we need
to consider factors such as distance, angle, and obstacles between the
viewpoint and the target. Hence, a straightforward approach to construct the
VCM that requires visibility computation for every viewpoint of the surrounding
space of the target, is prohibitively expensive in terms of both I/Os and
computation, especially for a real dataset comprising of thousands of
obstacles. We propose an efficient approach to compute the VCM based on a key
property of the human vision that eliminates the necessity of computing the
visibility for a large number of viewpoints of the space. To further reduce the
computational overhead, we propose two approximations; namely, minimum bounding
rectangle and tangential approaches with guaranteed error bounds. Our extensive
experiments demonstrate the effectiveness and efficiency of our solutions to
construct the VCM for real 2D and 3D datasets.
| [
{
"version": "v1",
"created": "Mon, 28 Oct 2013 02:38:26 GMT"
}
] | 2013-10-29T00:00:00 | [
[
"Choudhury",
"Farhana Murtaza",
""
],
[
"Ali",
"Mohammed Eunus",
""
],
[
"Masud",
"Sarah",
""
],
[
"Nath",
"Suman",
""
],
[
"Rabban",
"Ishat E",
""
]
] | TITLE: Scalable Visibility Color Map Construction in Spatial Databases
ABSTRACT: Recent advances in 3D modeling provide us with real 3D datasets to answer
queries, such as "What is the best position for a new billboard?" and "Which
hotel room has the best view?" in the presence of obstacles. These applications
require measuring and differentiating the visibility of an object (target) from
different viewpoints in a dataspace, e.g., a billboard may be seen from two
viewpoints but is readable only from the viewpoint closer to the target. In
this paper, we formulate the above problem of quantifying the visibility of
(from) a target object from (of) the surrounding area with a visibility color
map (VCM). A VCM is essentially defined as a surface color map of the space,
where each viewpoint of the space is assigned a color value that denotes the
visibility measure of the target from that viewpoint. Measuring the visibility
of a target even from a single viewpoint is an expensive operation, as we need
to consider factors such as distance, angle, and obstacles between the
viewpoint and the target. Hence, a straightforward approach to construct the
VCM that requires visibility computation for every viewpoint of the surrounding
space of the target, is prohibitively expensive in terms of both I/Os and
computation, especially for a real dataset comprising of thousands of
obstacles. We propose an efficient approach to compute the VCM based on a key
property of the human vision that eliminates the necessity of computing the
visibility for a large number of viewpoints of the space. To further reduce the
computational overhead, we propose two approximations; namely, minimum bounding
rectangle and tangential approaches with guaranteed error bounds. Our extensive
experiments demonstrate the effectiveness and efficiency of our solutions to
construct the VCM for real 2D and 3D datasets.
|
1310.6772 | Ragib Hasan | Thamar Solorio and Ragib Hasan and Mainul Mizan | Sockpuppet Detection in Wikipedia: A Corpus of Real-World Deceptive
Writing for Linking Identities | 4 pages, under submission at LREC 2014 | null | null | null | cs.CL cs.CR cs.CY | http://creativecommons.org/licenses/by/3.0/ | This paper describes the corpus of sockpuppet cases we gathered from
Wikipedia. A sockpuppet is an online user account created with a fake identity
for the purpose of covering abusive behavior and/or subverting the editing
regulation process. We used a semi-automated method for crawling and curating a
dataset of real sockpuppet investigation cases. To the best of our knowledge,
this is the first corpus available on real-world deceptive writing. We describe
the process for crawling the data and some preliminary results that can be used
as baseline for benchmarking research. The dataset will be released under a
Creative Commons license from our project website: http://docsig.cis.uab.edu.
| [
{
"version": "v1",
"created": "Thu, 24 Oct 2013 20:59:27 GMT"
}
] | 2013-10-28T00:00:00 | [
[
"Solorio",
"Thamar",
""
],
[
"Hasan",
"Ragib",
""
],
[
"Mizan",
"Mainul",
""
]
] | TITLE: Sockpuppet Detection in Wikipedia: A Corpus of Real-World Deceptive
Writing for Linking Identities
ABSTRACT: This paper describes the corpus of sockpuppet cases we gathered from
Wikipedia. A sockpuppet is an online user account created with a fake identity
for the purpose of covering abusive behavior and/or subverting the editing
regulation process. We used a semi-automated method for crawling and curating a
dataset of real sockpuppet investigation cases. To the best of our knowledge,
this is the first corpus available on real-world deceptive writing. We describe
the process for crawling the data and some preliminary results that can be used
as baseline for benchmarking research. The dataset will be released under a
Creative Commons license from our project website: http://docsig.cis.uab.edu.
|
1310.6998 | Shiladitya Sinha | Shiladitya Sinha, Chris Dyer, Kevin Gimpel, and Noah A. Smith | Predicting the NFL using Twitter | Presented at ECML/PKDD 2013 Workshop on Machine Learning and Data
Mining for Sports Analytics | null | null | null | cs.SI cs.LG physics.soc-ph stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study the relationship between social media output and National Football
League (NFL) games, using a dataset containing messages from Twitter and NFL
game statistics. Specifically, we consider tweets pertaining to specific teams
and games in the NFL season and use them alongside statistical game data to
build predictive models for future game outcomes (which team will win?) and
sports betting outcomes (which team will win with the point spread? will the
total points be over/under the line?). We experiment with several feature sets
and find that simple features using large volumes of tweets can match or exceed
the performance of more traditional features that use game statistics.
| [
{
"version": "v1",
"created": "Fri, 25 Oct 2013 18:35:22 GMT"
}
] | 2013-10-28T00:00:00 | [
[
"Sinha",
"Shiladitya",
""
],
[
"Dyer",
"Chris",
""
],
[
"Gimpel",
"Kevin",
""
],
[
"Smith",
"Noah A.",
""
]
] | TITLE: Predicting the NFL using Twitter
ABSTRACT: We study the relationship between social media output and National Football
League (NFL) games, using a dataset containing messages from Twitter and NFL
game statistics. Specifically, we consider tweets pertaining to specific teams
and games in the NFL season and use them alongside statistical game data to
build predictive models for future game outcomes (which team will win?) and
sports betting outcomes (which team will win with the point spread? will the
total points be over/under the line?). We experiment with several feature sets
and find that simple features using large volumes of tweets can match or exceed
the performance of more traditional features that use game statistics.
|
1310.6304 | Nikos Karampatziakis | Nikos Karampatziakis, Paul Mineiro | Combining Structured and Unstructured Randomness in Large Scale PCA | null | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Principal Component Analysis (PCA) is a ubiquitous tool with many
applications in machine learning including feature construction, subspace
embedding, and outlier detection. In this paper, we present an algorithm for
computing the top principal components of a dataset with a large number of rows
(examples) and columns (features). Our algorithm leverages both structured and
unstructured random projections to retain good accuracy while being
computationally efficient. We demonstrate the technique on the winning
submission the KDD 2010 Cup.
| [
{
"version": "v1",
"created": "Wed, 23 Oct 2013 17:33:26 GMT"
},
{
"version": "v2",
"created": "Thu, 24 Oct 2013 17:36:27 GMT"
}
] | 2013-10-25T00:00:00 | [
[
"Karampatziakis",
"Nikos",
""
],
[
"Mineiro",
"Paul",
""
]
] | TITLE: Combining Structured and Unstructured Randomness in Large Scale PCA
ABSTRACT: Principal Component Analysis (PCA) is a ubiquitous tool with many
applications in machine learning including feature construction, subspace
embedding, and outlier detection. In this paper, we present an algorithm for
computing the top principal components of a dataset with a large number of rows
(examples) and columns (features). Our algorithm leverages both structured and
unstructured random projections to retain good accuracy while being
computationally efficient. We demonstrate the technique on the winning
submission the KDD 2010 Cup.
|
1310.6654 | Sahil Sikka | Sahil Sikka and Karan Sikka and M.K. Bhuyan and Yuji Iwahori | Pseudo vs. True Defect Classification in Printed Circuits Boards using
Wavelet Features | 6 pages, 8 figures | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In recent years, Printed Circuit Boards (PCB) have become the backbone of a
large number of consumer electronic devices leading to a surge in their
production. This has made it imperative to employ automatic inspection systems
to identify manufacturing defects in PCB before they are installed in the
respective systems. An important task in this regard is the classification of
defects as either true or pseudo defects, which decides if the PCB is to be
re-manufactured or not. This work proposes a novel approach to detect most
common defects in the PCBs. The problem has been approached by employing highly
discriminative features based on multi-scale wavelet transform, which are
further boosted by using a kernalized version of the support vector machines
(SVM). A real world printed circuit board dataset has been used for
quantitative analysis. Experimental results demonstrated the efficacy of the
proposed method.
| [
{
"version": "v1",
"created": "Thu, 24 Oct 2013 16:11:28 GMT"
}
] | 2013-10-25T00:00:00 | [
[
"Sikka",
"Sahil",
""
],
[
"Sikka",
"Karan",
""
],
[
"Bhuyan",
"M. K.",
""
],
[
"Iwahori",
"Yuji",
""
]
] | TITLE: Pseudo vs. True Defect Classification in Printed Circuits Boards using
Wavelet Features
ABSTRACT: In recent years, Printed Circuit Boards (PCB) have become the backbone of a
large number of consumer electronic devices leading to a surge in their
production. This has made it imperative to employ automatic inspection systems
to identify manufacturing defects in PCB before they are installed in the
respective systems. An important task in this regard is the classification of
defects as either true or pseudo defects, which decides if the PCB is to be
re-manufactured or not. This work proposes a novel approach to detect most
common defects in the PCBs. The problem has been approached by employing highly
discriminative features based on multi-scale wavelet transform, which are
further boosted by using a kernalized version of the support vector machines
(SVM). A real world printed circuit board dataset has been used for
quantitative analysis. Experimental results demonstrated the efficacy of the
proposed method.
|
1211.7052 | Andrea Baronchelli | Bruno Ribeiro, Nicola Perra, Andrea Baronchelli | Quantifying the effect of temporal resolution on time-varying networks | null | Scientific Reports 3, 3006 (2013) | 10.1038/srep03006 | null | cond-mat.stat-mech cs.SI physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Time-varying networks describe a wide array of systems whose constituents and
interactions evolve over time. They are defined by an ordered stream of
interactions between nodes, yet they are often represented in terms of a
sequence of static networks, each aggregating all edges and nodes present in a
time interval of size \Delta t. In this work we quantify the impact of an
arbitrary \Delta t on the description of a dynamical process taking place upon
a time-varying network. We focus on the elementary random walk, and put forth a
simple mathematical framework that well describes the behavior observed on real
datasets. The analytical description of the bias introduced by time integrating
techniques represents a step forward in the correct characterization of
dynamical processes on time-varying graphs.
| [
{
"version": "v1",
"created": "Thu, 29 Nov 2012 20:56:13 GMT"
},
{
"version": "v2",
"created": "Thu, 6 Dec 2012 17:21:53 GMT"
},
{
"version": "v3",
"created": "Tue, 22 Oct 2013 10:50:42 GMT"
}
] | 2013-10-23T00:00:00 | [
[
"Ribeiro",
"Bruno",
""
],
[
"Perra",
"Nicola",
""
],
[
"Baronchelli",
"Andrea",
""
]
] | TITLE: Quantifying the effect of temporal resolution on time-varying networks
ABSTRACT: Time-varying networks describe a wide array of systems whose constituents and
interactions evolve over time. They are defined by an ordered stream of
interactions between nodes, yet they are often represented in terms of a
sequence of static networks, each aggregating all edges and nodes present in a
time interval of size \Delta t. In this work we quantify the impact of an
arbitrary \Delta t on the description of a dynamical process taking place upon
a time-varying network. We focus on the elementary random walk, and put forth a
simple mathematical framework that well describes the behavior observed on real
datasets. The analytical description of the bias introduced by time integrating
techniques represents a step forward in the correct characterization of
dynamical processes on time-varying graphs.
|
1310.5767 | Chunhua Shen | Xi Li, Yao Li, Chunhua Shen, Anthony Dick, Anton van den Hengel | Contextual Hypergraph Modelling for Salient Object Detection | Appearing in Proc. Int. Conf. Computer Vision 2013, Sydney, Australia | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Salient object detection aims to locate objects that capture human attention
within images. Previous approaches often pose this as a problem of image
contrast analysis. In this work, we model an image as a hypergraph that
utilizes a set of hyperedges to capture the contextual properties of image
pixels or regions. As a result, the problem of salient object detection becomes
one of finding salient vertices and hyperedges in the hypergraph. The main
advantage of hypergraph modeling is that it takes into account each pixel's (or
region's) affinity with its neighborhood as well as its separation from image
background. Furthermore, we propose an alternative approach based on
center-versus-surround contextual contrast analysis, which performs salient
object detection by optimizing a cost-sensitive support vector machine (SVM)
objective function. Experimental results on four challenging datasets
demonstrate the effectiveness of the proposed approaches against the
state-of-the-art approaches to salient object detection.
| [
{
"version": "v1",
"created": "Tue, 22 Oct 2013 00:38:59 GMT"
}
] | 2013-10-23T00:00:00 | [
[
"Li",
"Xi",
""
],
[
"Li",
"Yao",
""
],
[
"Shen",
"Chunhua",
""
],
[
"Dick",
"Anthony",
""
],
[
"Hengel",
"Anton van den",
""
]
] | TITLE: Contextual Hypergraph Modelling for Salient Object Detection
ABSTRACT: Salient object detection aims to locate objects that capture human attention
within images. Previous approaches often pose this as a problem of image
contrast analysis. In this work, we model an image as a hypergraph that
utilizes a set of hyperedges to capture the contextual properties of image
pixels or regions. As a result, the problem of salient object detection becomes
one of finding salient vertices and hyperedges in the hypergraph. The main
advantage of hypergraph modeling is that it takes into account each pixel's (or
region's) affinity with its neighborhood as well as its separation from image
background. Furthermore, we propose an alternative approach based on
center-versus-surround contextual contrast analysis, which performs salient
object detection by optimizing a cost-sensitive support vector machine (SVM)
objective function. Experimental results on four challenging datasets
demonstrate the effectiveness of the proposed approaches against the
state-of-the-art approaches to salient object detection.
|
1310.5965 | Roozbeh Rajabi | Roozbeh Rajabi, Hassan Ghassemian | Fusion of Hyperspectral and Panchromatic Images using Spectral Uumixing
Results | 4 pages, conference | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Hyperspectral imaging, due to providing high spectral resolution images, is
one of the most important tools in the remote sensing field. Because of
technological restrictions hyperspectral sensors has a limited spatial
resolution. On the other hand panchromatic image has a better spatial
resolution. Combining this information together can provide a better
understanding of the target scene. Spectral unmixing of mixed pixels in
hyperspectral images results in spectral signature and abundance fractions of
endmembers but gives no information about their location in a mixed pixel. In
this paper we have used spectral unmixing results of hyperspectral images and
segmentation results of panchromatic image for data fusion. The proposed method
has been applied on simulated data using AVRIS Indian Pines datasets. Results
show that this method can effectively combine information in hyperspectral and
panchromatic images.
| [
{
"version": "v1",
"created": "Tue, 22 Oct 2013 15:44:51 GMT"
}
] | 2013-10-23T00:00:00 | [
[
"Rajabi",
"Roozbeh",
""
],
[
"Ghassemian",
"Hassan",
""
]
] | TITLE: Fusion of Hyperspectral and Panchromatic Images using Spectral Uumixing
Results
ABSTRACT: Hyperspectral imaging, due to providing high spectral resolution images, is
one of the most important tools in the remote sensing field. Because of
technological restrictions hyperspectral sensors has a limited spatial
resolution. On the other hand panchromatic image has a better spatial
resolution. Combining this information together can provide a better
understanding of the target scene. Spectral unmixing of mixed pixels in
hyperspectral images results in spectral signature and abundance fractions of
endmembers but gives no information about their location in a mixed pixel. In
this paper we have used spectral unmixing results of hyperspectral images and
segmentation results of panchromatic image for data fusion. The proposed method
has been applied on simulated data using AVRIS Indian Pines datasets. Results
show that this method can effectively combine information in hyperspectral and
panchromatic images.
|
1310.6019 | Andrea Kappes | Tobias Fleck, Andrea Kappes and Dorothea Wagner | Graph Clustering with Surprise: Complexity and Exact Solutions | null | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Clustering graphs based on a comparison of the number of links within
clusters and the expected value of this quantity in a random graph has gained a
lot of attention and popularity in the last decade. Recently, Aldecoa and Marin
proposed a related, but slightly different approach leading to the quality
measure surprise, and reported good behavior in the context of synthetic and
real world benchmarks. We show that the problem of finding a clustering with
optimum surprise is NP-hard. Moreover, a bicriterial view on the problem
permits to compute optimum solutions for small instances by solving a small
number of integer linear programs, and leads to a polynomial time algorithm on
trees.
| [
{
"version": "v1",
"created": "Mon, 21 Oct 2013 15:07:16 GMT"
}
] | 2013-10-23T00:00:00 | [
[
"Fleck",
"Tobias",
""
],
[
"Kappes",
"Andrea",
""
],
[
"Wagner",
"Dorothea",
""
]
] | TITLE: Graph Clustering with Surprise: Complexity and Exact Solutions
ABSTRACT: Clustering graphs based on a comparison of the number of links within
clusters and the expected value of this quantity in a random graph has gained a
lot of attention and popularity in the last decade. Recently, Aldecoa and Marin
proposed a related, but slightly different approach leading to the quality
measure surprise, and reported good behavior in the context of synthetic and
real world benchmarks. We show that the problem of finding a clustering with
optimum surprise is NP-hard. Moreover, a bicriterial view on the problem
permits to compute optimum solutions for small instances by solving a small
number of integer linear programs, and leads to a polynomial time algorithm on
trees.
|
1303.2130 | Xiao-Lei Zhang | Xiao-Lei Zhang | Convex Discriminative Multitask Clustering | null | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Multitask clustering tries to improve the clustering performance of multiple
tasks simultaneously by taking their relationship into account. Most existing
multitask clustering algorithms fall into the type of generative clustering,
and none are formulated as convex optimization problems. In this paper, we
propose two convex Discriminative Multitask Clustering (DMTC) algorithms to
address the problems. Specifically, we first propose a Bayesian DMTC framework.
Then, we propose two convex DMTC objectives within the framework. The first
one, which can be seen as a technical combination of the convex multitask
feature learning and the convex Multiclass Maximum Margin Clustering (M3C),
aims to learn a shared feature representation. The second one, which can be
seen as a combination of the convex multitask relationship learning and M3C,
aims to learn the task relationship. The two objectives are solved in a uniform
procedure by the efficient cutting-plane algorithm. Experimental results on a
toy problem and two benchmark datasets demonstrate the effectiveness of the
proposed algorithms.
| [
{
"version": "v1",
"created": "Fri, 8 Mar 2013 21:32:52 GMT"
},
{
"version": "v2",
"created": "Mon, 21 Oct 2013 15:06:36 GMT"
}
] | 2013-10-22T00:00:00 | [
[
"Zhang",
"Xiao-Lei",
""
]
] | TITLE: Convex Discriminative Multitask Clustering
ABSTRACT: Multitask clustering tries to improve the clustering performance of multiple
tasks simultaneously by taking their relationship into account. Most existing
multitask clustering algorithms fall into the type of generative clustering,
and none are formulated as convex optimization problems. In this paper, we
propose two convex Discriminative Multitask Clustering (DMTC) algorithms to
address the problems. Specifically, we first propose a Bayesian DMTC framework.
Then, we propose two convex DMTC objectives within the framework. The first
one, which can be seen as a technical combination of the convex multitask
feature learning and the convex Multiclass Maximum Margin Clustering (M3C),
aims to learn a shared feature representation. The second one, which can be
seen as a combination of the convex multitask relationship learning and M3C,
aims to learn the task relationship. The two objectives are solved in a uniform
procedure by the efficient cutting-plane algorithm. Experimental results on a
toy problem and two benchmark datasets demonstrate the effectiveness of the
proposed algorithms.
|
1310.1949 | Nikos Karampatziakis | Alekh Agarwal, Sham M. Kakade, Nikos Karampatziakis, Le Song, Gregory
Valiant | Least Squares Revisited: Scalable Approaches for Multi-class Prediction | null | null | null | null | cs.LG stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This work provides simple algorithms for multi-class (and multi-label)
prediction in settings where both the number of examples n and the data
dimension d are relatively large. These robust and parameter free algorithms
are essentially iterative least-squares updates and very versatile both in
theory and in practice. On the theoretical front, we present several variants
with convergence guarantees. Owing to their effective use of second-order
structure, these algorithms are substantially better than first-order methods
in many practical scenarios. On the empirical side, we present a scalable
stagewise variant of our approach, which achieves dramatic computational
speedups over popular optimization packages such as Liblinear and Vowpal Wabbit
on standard datasets (MNIST and CIFAR-10), while attaining state-of-the-art
accuracies.
| [
{
"version": "v1",
"created": "Mon, 7 Oct 2013 20:48:58 GMT"
},
{
"version": "v2",
"created": "Mon, 21 Oct 2013 15:18:37 GMT"
}
] | 2013-10-22T00:00:00 | [
[
"Agarwal",
"Alekh",
""
],
[
"Kakade",
"Sham M.",
""
],
[
"Karampatziakis",
"Nikos",
""
],
[
"Song",
"Le",
""
],
[
"Valiant",
"Gregory",
""
]
] | TITLE: Least Squares Revisited: Scalable Approaches for Multi-class Prediction
ABSTRACT: This work provides simple algorithms for multi-class (and multi-label)
prediction in settings where both the number of examples n and the data
dimension d are relatively large. These robust and parameter free algorithms
are essentially iterative least-squares updates and very versatile both in
theory and in practice. On the theoretical front, we present several variants
with convergence guarantees. Owing to their effective use of second-order
structure, these algorithms are substantially better than first-order methods
in many practical scenarios. On the empirical side, we present a scalable
stagewise variant of our approach, which achieves dramatic computational
speedups over popular optimization packages such as Liblinear and Vowpal Wabbit
on standard datasets (MNIST and CIFAR-10), while attaining state-of-the-art
accuracies.
|
1310.4954 | Miguel A. Martinez-Prieto | Sandra \'Alvarez-Garc\'ia and Nieves R. Brisaboa and Javier D.
Fern\'andez and Miguel A. Mart\'inez-Prieto and Gonzalo Navarro | Compressed Vertical Partitioning for Full-In-Memory RDF Management | null | null | null | null | cs.DB cs.DS cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The Web of Data has been gaining momentum and this leads to increasingly
publish more semi-structured datasets following the RDF model, based on atomic
triple units of subject, predicate, and object. Although it is a simple model,
compression methods become necessary because datasets are increasingly larger
and various scalability issues arise around their organization and storage.
This requirement is more restrictive in RDF stores because efficient SPARQL
resolution on the compressed RDF datasets is also required.
This article introduces a novel RDF indexing technique (called k2-triples)
supporting efficient SPARQL resolution in compressed space. k2-triples, uses
the predicate to vertically partition the dataset into disjoint subsets of
pairs (subject, object), one per predicate. These subsets are represented as
binary matrices in which 1-bits mean that the corresponding triple exists in
the dataset. This model results in very sparse matrices, which are efficiently
compressed using k2-trees. We enhance this model with two compact indexes
listing the predicates related to each different subject and object, in order
to address the specific weaknesses of vertically partitioned representations.
The resulting technique not only achieves by far the most compressed
representations, but also the best overall performance for RDF retrieval in our
experiments. Our approach uses up to 10 times less space than a state of the
art baseline, and outperforms its performance by several order of magnitude on
the most basic query patterns. In addition, we optimize traditional join
algorithms on k2-triples and define a novel one leveraging its specific
features. Our experimental results show that our technique overcomes
traditional vertical partitioning for join resolution, reporting the best
numbers for joins in which the non-joined nodes are provided, and being
competitive in the majority of the cases.
| [
{
"version": "v1",
"created": "Fri, 18 Oct 2013 08:58:01 GMT"
},
{
"version": "v2",
"created": "Mon, 21 Oct 2013 09:00:47 GMT"
}
] | 2013-10-22T00:00:00 | [
[
"Álvarez-García",
"Sandra",
""
],
[
"Brisaboa",
"Nieves R.",
""
],
[
"Fernández",
"Javier D.",
""
],
[
"Martínez-Prieto",
"Miguel A.",
""
],
[
"Navarro",
"Gonzalo",
""
]
] | TITLE: Compressed Vertical Partitioning for Full-In-Memory RDF Management
ABSTRACT: The Web of Data has been gaining momentum and this leads to increasingly
publish more semi-structured datasets following the RDF model, based on atomic
triple units of subject, predicate, and object. Although it is a simple model,
compression methods become necessary because datasets are increasingly larger
and various scalability issues arise around their organization and storage.
This requirement is more restrictive in RDF stores because efficient SPARQL
resolution on the compressed RDF datasets is also required.
This article introduces a novel RDF indexing technique (called k2-triples)
supporting efficient SPARQL resolution in compressed space. k2-triples, uses
the predicate to vertically partition the dataset into disjoint subsets of
pairs (subject, object), one per predicate. These subsets are represented as
binary matrices in which 1-bits mean that the corresponding triple exists in
the dataset. This model results in very sparse matrices, which are efficiently
compressed using k2-trees. We enhance this model with two compact indexes
listing the predicates related to each different subject and object, in order
to address the specific weaknesses of vertically partitioned representations.
The resulting technique not only achieves by far the most compressed
representations, but also the best overall performance for RDF retrieval in our
experiments. Our approach uses up to 10 times less space than a state of the
art baseline, and outperforms its performance by several order of magnitude on
the most basic query patterns. In addition, we optimize traditional join
algorithms on k2-triples and define a novel one leveraging its specific
features. Our experimental results show that our technique overcomes
traditional vertical partitioning for join resolution, reporting the best
numbers for joins in which the non-joined nodes are provided, and being
competitive in the majority of the cases.
|
1310.5142 | Hyun Joon Jung | Hyun Joon Jung and Matthew Lease | Crowdsourced Task Routing via Matrix Factorization | 10 pages, 7 figures | null | null | null | cs.CY cs.IR | http://creativecommons.org/licenses/by-nc-sa/3.0/ | We describe methods to predict a crowd worker's accuracy on new tasks based
on his accuracy on past tasks. Such prediction provides a foundation for
identifying the best workers to route work to in order to maximize accuracy on
the new task. Our key insight is to model similarity of past tasks to the
target task such that past task accuracies can be optimally integrated to
predict target task accuracy. We describe two matrix factorization (MF)
approaches from collaborative filtering which not only exploit such task
similarity, but are known to be robust to sparse data. Experiments on synthetic
and real-world datasets provide feasibility assessment and comparative
evaluation of MF approaches vs. two baseline methods. Across a range of data
scales and task similarity conditions, we evaluate: 1) prediction error over
all workers; and 2) how well each method predicts the best workers to use for
each task. Results show the benefit of task routing over random assignment, the
strength of probabilistic MF over baseline methods, and the robustness of
methods under different conditions.
| [
{
"version": "v1",
"created": "Fri, 18 Oct 2013 14:37:24 GMT"
}
] | 2013-10-22T00:00:00 | [
[
"Jung",
"Hyun Joon",
""
],
[
"Lease",
"Matthew",
""
]
] | TITLE: Crowdsourced Task Routing via Matrix Factorization
ABSTRACT: We describe methods to predict a crowd worker's accuracy on new tasks based
on his accuracy on past tasks. Such prediction provides a foundation for
identifying the best workers to route work to in order to maximize accuracy on
the new task. Our key insight is to model similarity of past tasks to the
target task such that past task accuracies can be optimally integrated to
predict target task accuracy. We describe two matrix factorization (MF)
approaches from collaborative filtering which not only exploit such task
similarity, but are known to be robust to sparse data. Experiments on synthetic
and real-world datasets provide feasibility assessment and comparative
evaluation of MF approaches vs. two baseline methods. Across a range of data
scales and task similarity conditions, we evaluate: 1) prediction error over
all workers; and 2) how well each method predicts the best workers to use for
each task. Results show the benefit of task routing over random assignment, the
strength of probabilistic MF over baseline methods, and the robustness of
methods under different conditions.
|
1310.5221 | Sumeet Kaur Sehra | Sumeet Kaur Sehra, Yadwinder Singh Brar, Navdeep Kaur | Soft computing techniques for software effort estimation | null | International Journal of Advanced Computer and Mathematical
Sciences Vol.2(3), November, 2011. pp:10-17 | null | null | cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The effort invested in a software project is probably one of the most
important and most analyzed variables in recent years in the process of project
management. The limitation of algorithmic effort prediction models is their
inability to cope with uncertainties and imprecision surrounding software
projects at the early development stage. More recently attention has turned to
a variety of machine learning methods, and soft computing in particular to
predict software development effort. Soft computing is a consortium of
methodologies centering in fuzzy logic, artificial neural networks, and
evolutionary computation. It is important, to mention here, that these
methodologies are complementary and synergistic, rather than competitive. They
provide in one form or another flexible information processing capability for
handling real life ambiguous situations. These methodologies are currently used
for reliable and accurate estimate of software development effort, which has
always been a challenge for both the software industry and academia. The aim of
this study is to analyze soft computing techniques in the existing models and
to provide in depth review of software and project estimation techniques
existing in industry and literature based on the different test datasets along
with their strength and weaknesses
| [
{
"version": "v1",
"created": "Sat, 19 Oct 2013 12:25:00 GMT"
}
] | 2013-10-22T00:00:00 | [
[
"Sehra",
"Sumeet Kaur",
""
],
[
"Brar",
"Yadwinder Singh",
""
],
[
"Kaur",
"Navdeep",
""
]
] | TITLE: Soft computing techniques for software effort estimation
ABSTRACT: The effort invested in a software project is probably one of the most
important and most analyzed variables in recent years in the process of project
management. The limitation of algorithmic effort prediction models is their
inability to cope with uncertainties and imprecision surrounding software
projects at the early development stage. More recently attention has turned to
a variety of machine learning methods, and soft computing in particular to
predict software development effort. Soft computing is a consortium of
methodologies centering in fuzzy logic, artificial neural networks, and
evolutionary computation. It is important, to mention here, that these
methodologies are complementary and synergistic, rather than competitive. They
provide in one form or another flexible information processing capability for
handling real life ambiguous situations. These methodologies are currently used
for reliable and accurate estimate of software development effort, which has
always been a challenge for both the software industry and academia. The aim of
this study is to analyze soft computing techniques in the existing models and
to provide in depth review of software and project estimation techniques
existing in industry and literature based on the different test datasets along
with their strength and weaknesses
|
1310.5249 | Fabrice Rossi | Mohamed Khalil El Mahrsi (LTCI, SAMM), Fabrice Rossi (SAMM) | Graph-Based Approaches to Clustering Network-Constrained Trajectory Data | null | New Frontiers in Mining Complex Patterns, Appice, Annalisa and
Ceci, Michelangelo and Loglisci, Corrado and Manco, Giuseppe and Masciari,
Elio and Ras, Zbigniew (Ed.) (2013) 124-137 | 10.1007/978-3-642-37382-4_9 | NFMCP2013 | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Clustering trajectory data attracted considerable attention in the last few
years. Most of prior work assumed that moving objects can move freely in an
euclidean space and did not consider the eventual presence of an underlying
road network and its influence on evaluating the similarity between
trajectories. In this paper, we present an approach to clustering such
network-constrained trajectory data. More precisely we aim at discovering
groups of road segments that are often travelled by the same trajectories. To
achieve this end, we model the interactions between segments w.r.t. their
similarity as a weighted graph to which we apply a community detection
algorithm to discover meaningful clusters. We showcase our proposition through
experimental results obtained on synthetic datasets.
| [
{
"version": "v1",
"created": "Sat, 19 Oct 2013 17:24:39 GMT"
}
] | 2013-10-22T00:00:00 | [
[
"Mahrsi",
"Mohamed Khalil El",
"",
"LTCI, SAMM"
],
[
"Rossi",
"Fabrice",
"",
"SAMM"
]
] | TITLE: Graph-Based Approaches to Clustering Network-Constrained Trajectory Data
ABSTRACT: Clustering trajectory data attracted considerable attention in the last few
years. Most of prior work assumed that moving objects can move freely in an
euclidean space and did not consider the eventual presence of an underlying
road network and its influence on evaluating the similarity between
trajectories. In this paper, we present an approach to clustering such
network-constrained trajectory data. More precisely we aim at discovering
groups of road segments that are often travelled by the same trajectories. To
achieve this end, we model the interactions between segments w.r.t. their
similarity as a weighted graph to which we apply a community detection
algorithm to discover meaningful clusters. We showcase our proposition through
experimental results obtained on synthetic datasets.
|
1310.5430 | Amit Goyal | Glenn S. Bevilacqua and Shealen Clare and Amit Goyal and Laks V. S.
Lakshmanan | Validating Network Value of Influencers by means of Explanations | null | null | null | null | cs.SI physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Recently, there has been significant interest in social influence analysis.
One of the central problems in this area is the problem of identifying
influencers, such that by convincing these users to perform a certain action
(like buying a new product), a large number of other users get influenced to
follow the action. The client of such an application is a marketer who would
target these influencers for marketing a given new product, say by providing
free samples or discounts. It is natural that before committing resources for
targeting an influencer the marketer would be interested in validating the
influence (or network value) of influencers returned. This requires digging
deeper into such analytical questions as: who are their followers, on what
actions (or products) they are influential, etc. However, the current
approaches to identifying influencers largely work as a black box in this
respect. The goal of this paper is to open up the black box, address these
questions and provide informative and crisp explanations for validating the
network value of influencers.
We formulate the problem of providing explanations (called PROXI) as a
discrete optimization problem of feature selection. We show that PROXI is not
only NP-hard to solve exactly, it is NP-hard to approximate within any
reasonable factor. Nevertheless, we show interesting properties of the
objective function and develop an intuitive greedy heuristic. We perform
detailed experimental analysis on two real world datasets - Twitter and
Flixster, and show that our approach is useful in generating concise and
insightful explanations of the influence distribution of users and that our
greedy algorithm is effective and efficient with respect to several baselines.
| [
{
"version": "v1",
"created": "Mon, 21 Oct 2013 06:05:48 GMT"
}
] | 2013-10-22T00:00:00 | [
[
"Bevilacqua",
"Glenn S.",
""
],
[
"Clare",
"Shealen",
""
],
[
"Goyal",
"Amit",
""
],
[
"Lakshmanan",
"Laks V. S.",
""
]
] | TITLE: Validating Network Value of Influencers by means of Explanations
ABSTRACT: Recently, there has been significant interest in social influence analysis.
One of the central problems in this area is the problem of identifying
influencers, such that by convincing these users to perform a certain action
(like buying a new product), a large number of other users get influenced to
follow the action. The client of such an application is a marketer who would
target these influencers for marketing a given new product, say by providing
free samples or discounts. It is natural that before committing resources for
targeting an influencer the marketer would be interested in validating the
influence (or network value) of influencers returned. This requires digging
deeper into such analytical questions as: who are their followers, on what
actions (or products) they are influential, etc. However, the current
approaches to identifying influencers largely work as a black box in this
respect. The goal of this paper is to open up the black box, address these
questions and provide informative and crisp explanations for validating the
network value of influencers.
We formulate the problem of providing explanations (called PROXI) as a
discrete optimization problem of feature selection. We show that PROXI is not
only NP-hard to solve exactly, it is NP-hard to approximate within any
reasonable factor. Nevertheless, we show interesting properties of the
objective function and develop an intuitive greedy heuristic. We perform
detailed experimental analysis on two real world datasets - Twitter and
Flixster, and show that our approach is useful in generating concise and
insightful explanations of the influence distribution of users and that our
greedy algorithm is effective and efficient with respect to several baselines.
|
1310.5468 | Hamed Mahmoudi | Hamed Mahmoudi, Georgios Rodolakis, Leonidas Georgiadis, David Saad | Message-Passing Algorithms for Optimal Utilization of Cognitive Radio
Networks | null | null | null | null | cs.IT cond-mat.stat-mech cs.NI math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Cognitive Radio has been proposed as a key technology to significantly
improve spectrum usage in wireless networks by enabling unlicensed users to
access unused resource. We present new algorithms that are needed for the
implementation of opportunistic scheduling policies that maximize the
throughput utilization of resources by secondary users, under maximum
interference constraints imposed by existing primary users. Our approach is
based on the Belief Propagation (BP) algorithm, which is advantageous due to
its simplicity and potential for distributed implementation. We examine
convergence properties and evaluate the performance of the proposed BP
algorithms via simulations and demonstrate that the results compare favorably
with a benchmark greedy strategy.
| [
{
"version": "v1",
"created": "Mon, 21 Oct 2013 08:55:46 GMT"
}
] | 2013-10-22T00:00:00 | [
[
"Mahmoudi",
"Hamed",
""
],
[
"Rodolakis",
"Georgios",
""
],
[
"Georgiadis",
"Leonidas",
""
],
[
"Saad",
"David",
""
]
] | TITLE: Message-Passing Algorithms for Optimal Utilization of Cognitive Radio
Networks
ABSTRACT: Cognitive Radio has been proposed as a key technology to significantly
improve spectrum usage in wireless networks by enabling unlicensed users to
access unused resource. We present new algorithms that are needed for the
implementation of opportunistic scheduling policies that maximize the
throughput utilization of resources by secondary users, under maximum
interference constraints imposed by existing primary users. Our approach is
based on the Belief Propagation (BP) algorithm, which is advantageous due to
its simplicity and potential for distributed implementation. We examine
convergence properties and evaluate the performance of the proposed BP
algorithms via simulations and demonstrate that the results compare favorably
with a benchmark greedy strategy.
|
1310.5551 | Albert Heinle | Albert Heinle, Viktor Levandovskyy, Andreas Nareike | SymbolicData:SDEval - Benchmarking for Everyone | null | null | null | null | cs.SC cs.MS cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we will present SDeval, a software project that contains tools
for creating and running benchmarks with a focus on problems in computer
algebra. It is built on top of the Symbolic Data project, able to translate
problems in the database into executable code for various computer algebra
systems. The included tools are designed to be very flexible to use and to
extend, such that they can be utilized even in contexts of other communities.
With the presentation of SDEval, we will also address particularities of
benchmarking in the field of computer algebra. Furthermore, with SDEval, we
provide a feasible and automatizable way of reproducing benchmarks published in
current research works, which appears to be a difficult task in general due to
the customizability of the available programs. We will simultaneously present
the current developments in the Symbolic Data project.
| [
{
"version": "v1",
"created": "Fri, 18 Oct 2013 19:58:03 GMT"
}
] | 2013-10-22T00:00:00 | [
[
"Heinle",
"Albert",
""
],
[
"Levandovskyy",
"Viktor",
""
],
[
"Nareike",
"Andreas",
""
]
] | TITLE: SymbolicData:SDEval - Benchmarking for Everyone
ABSTRACT: In this paper we will present SDeval, a software project that contains tools
for creating and running benchmarks with a focus on problems in computer
algebra. It is built on top of the Symbolic Data project, able to translate
problems in the database into executable code for various computer algebra
systems. The included tools are designed to be very flexible to use and to
extend, such that they can be utilized even in contexts of other communities.
With the presentation of SDEval, we will also address particularities of
benchmarking in the field of computer algebra. Furthermore, with SDEval, we
provide a feasible and automatizable way of reproducing benchmarks published in
current research works, which appears to be a difficult task in general due to
the customizability of the available programs. We will simultaneously present
the current developments in the Symbolic Data project.
|
1310.5603 | Jie Yan | Jie Yan, Guangming Tan, Ninghui Sun | GRE: A Graph Runtime Engine for Large-Scale Distributed Graph-Parallel
Applications | 12 pages, also submitted to PVLDB | null | null | null | cs.DC | http://creativecommons.org/licenses/by-nc-sa/3.0/ | Large-scale distributed graph-parallel computing is challenging. On one hand,
due to the irregular computation pattern and lack of locality, it is hard to
express parallelism efficiently. On the other hand, due to the scale-free
nature, real-world graphs are hard to partition in balance with low cut. To
address these challenges, several graph-parallel frameworks including Pregel
and GraphLab (PowerGraph) have been developed recently. In this paper, we
present an alternative framework, Graph Runtime Engine (GRE). While retaining
the vertex-centric programming model, GRE proposes two new abstractions: 1) a
Scatter-Combine computation model based on active message to exploit massive
fined-grained edge-level parallelism, and 2) a Agent-Graph data model based on
vertex factorization to partition and represent directed graphs. GRE is
implemented on commercial off-the-shelf multi-core cluster. We experimentally
evaluate GRE with three benchmark programs (PageRank, Single Source Shortest
Path and Connected Components) on real-world and synthetic graphs of millions
billion of vertices. Compared to PowerGraph, GRE shows 2.5~17 times better
performance on 8~16 machines (192 cores). Specifically, the PageRank in GRE is
the fastest when comparing to counterparts of other frameworks (PowerGraph,
Spark,Twister) reported in public literatures. Besides, GRE significantly
optimizes memory usage so that it can process a large graph of 1 billion
vertices and 17 billion edges on our cluster with totally 768GB memory, while
PowerGraph can only process less than half of this graph scale.
| [
{
"version": "v1",
"created": "Mon, 21 Oct 2013 15:32:16 GMT"
}
] | 2013-10-22T00:00:00 | [
[
"Yan",
"Jie",
""
],
[
"Tan",
"Guangming",
""
],
[
"Sun",
"Ninghui",
""
]
] | TITLE: GRE: A Graph Runtime Engine for Large-Scale Distributed Graph-Parallel
Applications
ABSTRACT: Large-scale distributed graph-parallel computing is challenging. On one hand,
due to the irregular computation pattern and lack of locality, it is hard to
express parallelism efficiently. On the other hand, due to the scale-free
nature, real-world graphs are hard to partition in balance with low cut. To
address these challenges, several graph-parallel frameworks including Pregel
and GraphLab (PowerGraph) have been developed recently. In this paper, we
present an alternative framework, Graph Runtime Engine (GRE). While retaining
the vertex-centric programming model, GRE proposes two new abstractions: 1) a
Scatter-Combine computation model based on active message to exploit massive
fined-grained edge-level parallelism, and 2) a Agent-Graph data model based on
vertex factorization to partition and represent directed graphs. GRE is
implemented on commercial off-the-shelf multi-core cluster. We experimentally
evaluate GRE with three benchmark programs (PageRank, Single Source Shortest
Path and Connected Components) on real-world and synthetic graphs of millions
billion of vertices. Compared to PowerGraph, GRE shows 2.5~17 times better
performance on 8~16 machines (192 cores). Specifically, the PageRank in GRE is
the fastest when comparing to counterparts of other frameworks (PowerGraph,
Spark,Twister) reported in public literatures. Besides, GRE significantly
optimizes memory usage so that it can process a large graph of 1 billion
vertices and 17 billion edges on our cluster with totally 768GB memory, while
PowerGraph can only process less than half of this graph scale.
|
1310.2700 | Marvin Weinstein | M. Weinstein, F. Meirer, A. Hume, Ph. Sciau, G. Shaked, R. Hofstetter,
E. Persi, A. Mehta, and D. Horn | Analyzing Big Data with Dynamic Quantum Clustering | 37 pages, 22 figures, 1 Table | null | null | null | physics.data-an cs.LG physics.comp-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | How does one search for a needle in a multi-dimensional haystack without
knowing what a needle is and without knowing if there is one in the haystack?
This kind of problem requires a paradigm shift - away from hypothesis driven
searches of the data - towards a methodology that lets the data speak for
itself. Dynamic Quantum Clustering (DQC) is such a methodology. DQC is a
powerful visual method that works with big, high-dimensional data. It exploits
variations of the density of the data (in feature space) and unearths subsets
of the data that exhibit correlations among all the measured variables. The
outcome of a DQC analysis is a movie that shows how and why sets of data-points
are eventually classified as members of simple clusters or as members of - what
we call - extended structures. This allows DQC to be successfully used in a
non-conventional exploratory mode where one searches data for unexpected
information without the need to model the data. We show how this works for big,
complex, real-world datasets that come from five distinct fields: i.e., x-ray
nano-chemistry, condensed matter, biology, seismology and finance. These
studies show how DQC excels at uncovering unexpected, small - but meaningful -
subsets of the data that contain important information. We also establish an
important new result: namely, that big, complex datasets often contain
interesting structures that will be missed by many conventional clustering
techniques. Experience shows that these structures appear frequently enough
that it is crucial to know they can exist, and that when they do, they encode
important hidden information. In short, we not only demonstrate that DQC can be
flexibly applied to datasets that present significantly different challenges,
we also show how a simple analysis can be used to look for the needle in the
haystack, determine what it is, and find what this means.
| [
{
"version": "v1",
"created": "Thu, 10 Oct 2013 04:00:03 GMT"
},
{
"version": "v2",
"created": "Thu, 17 Oct 2013 21:06:22 GMT"
}
] | 2013-10-21T00:00:00 | [
[
"Weinstein",
"M.",
""
],
[
"Meirer",
"F.",
""
],
[
"Hume",
"A.",
""
],
[
"Sciau",
"Ph.",
""
],
[
"Shaked",
"G.",
""
],
[
"Hofstetter",
"R.",
""
],
[
"Persi",
"E.",
""
],
[
"Mehta",
"A.",
""
],
[
"Horn",
"D.",
""
]
] | TITLE: Analyzing Big Data with Dynamic Quantum Clustering
ABSTRACT: How does one search for a needle in a multi-dimensional haystack without
knowing what a needle is and without knowing if there is one in the haystack?
This kind of problem requires a paradigm shift - away from hypothesis driven
searches of the data - towards a methodology that lets the data speak for
itself. Dynamic Quantum Clustering (DQC) is such a methodology. DQC is a
powerful visual method that works with big, high-dimensional data. It exploits
variations of the density of the data (in feature space) and unearths subsets
of the data that exhibit correlations among all the measured variables. The
outcome of a DQC analysis is a movie that shows how and why sets of data-points
are eventually classified as members of simple clusters or as members of - what
we call - extended structures. This allows DQC to be successfully used in a
non-conventional exploratory mode where one searches data for unexpected
information without the need to model the data. We show how this works for big,
complex, real-world datasets that come from five distinct fields: i.e., x-ray
nano-chemistry, condensed matter, biology, seismology and finance. These
studies show how DQC excels at uncovering unexpected, small - but meaningful -
subsets of the data that contain important information. We also establish an
important new result: namely, that big, complex datasets often contain
interesting structures that will be missed by many conventional clustering
techniques. Experience shows that these structures appear frequently enough
that it is crucial to know they can exist, and that when they do, they encode
important hidden information. In short, we not only demonstrate that DQC can be
flexibly applied to datasets that present significantly different challenges,
we also show how a simple analysis can be used to look for the needle in the
haystack, determine what it is, and find what this means.
|
1310.5089 | Gustavo Camps-Valls | Jer\'onimo Arenas-Garc\'ia, Kaare Brandt Petersen, Gustavo
Camps-Valls, Lars Kai Hansen | Kernel Multivariate Analysis Framework for Supervised Subspace Learning:
A Tutorial on Linear and Kernel Multivariate Methods | null | IEEE Signal Processing Magazine, 30(4), 16-29, 2013 | 10.1109/MSP.2013.2250591 | null | stat.ML cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Feature extraction and dimensionality reduction are important tasks in many
fields of science dealing with signal processing and analysis. The relevance of
these techniques is increasing as current sensory devices are developed with
ever higher resolution, and problems involving multimodal data sources become
more common. A plethora of feature extraction methods are available in the
literature collectively grouped under the field of Multivariate Analysis (MVA).
This paper provides a uniform treatment of several methods: Principal Component
Analysis (PCA), Partial Least Squares (PLS), Canonical Correlation Analysis
(CCA) and Orthonormalized PLS (OPLS), as well as their non-linear extensions
derived by means of the theory of reproducing kernel Hilbert spaces. We also
review their connections to other methods for classification and statistical
dependence estimation, and introduce some recent developments to deal with the
extreme cases of large-scale and low-sized problems. To illustrate the wide
applicability of these methods in both classification and regression problems,
we analyze their performance in a benchmark of publicly available data sets,
and pay special attention to specific real applications involving audio
processing for music genre prediction and hyperspectral satellite images for
Earth and climate monitoring.
| [
{
"version": "v1",
"created": "Fri, 18 Oct 2013 16:44:05 GMT"
}
] | 2013-10-21T00:00:00 | [
[
"Arenas-García",
"Jerónimo",
""
],
[
"Petersen",
"Kaare Brandt",
""
],
[
"Camps-Valls",
"Gustavo",
""
],
[
"Hansen",
"Lars Kai",
""
]
] | TITLE: Kernel Multivariate Analysis Framework for Supervised Subspace Learning:
A Tutorial on Linear and Kernel Multivariate Methods
ABSTRACT: Feature extraction and dimensionality reduction are important tasks in many
fields of science dealing with signal processing and analysis. The relevance of
these techniques is increasing as current sensory devices are developed with
ever higher resolution, and problems involving multimodal data sources become
more common. A plethora of feature extraction methods are available in the
literature collectively grouped under the field of Multivariate Analysis (MVA).
This paper provides a uniform treatment of several methods: Principal Component
Analysis (PCA), Partial Least Squares (PLS), Canonical Correlation Analysis
(CCA) and Orthonormalized PLS (OPLS), as well as their non-linear extensions
derived by means of the theory of reproducing kernel Hilbert spaces. We also
review their connections to other methods for classification and statistical
dependence estimation, and introduce some recent developments to deal with the
extreme cases of large-scale and low-sized problems. To illustrate the wide
applicability of these methods in both classification and regression problems,
we analyze their performance in a benchmark of publicly available data sets,
and pay special attention to specific real applications involving audio
processing for music genre prediction and hyperspectral satellite images for
Earth and climate monitoring.
|
1308.6206 | Erich Teppan | Erich Christian Teppan and Gerhard Friedrich | The Partner Units Configuration Problem: Completing the Picture | 30 pages, 14 figures | null | null | null | cs.AI cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The partner units problem (PUP) is an acknowledged hard benchmark problem for
the Logic Programming community with various industrial application fields like
surveillance, electrical engineering, computer networks or railway safety
systems. However, computational complexity remained widely unclear so far. In
this paper we provide all missing complexity results making the PUP better
exploitable for benchmark testing. Furthermore, we present QuickPup, a
heuristic search algorithm for PUP instances which outperforms all
state-of-the-art solving approaches and which is already in use in real world
industrial configuration environments.
| [
{
"version": "v1",
"created": "Wed, 28 Aug 2013 16:29:42 GMT"
},
{
"version": "v2",
"created": "Fri, 11 Oct 2013 11:41:40 GMT"
},
{
"version": "v3",
"created": "Thu, 17 Oct 2013 11:37:23 GMT"
}
] | 2013-10-18T00:00:00 | [
[
"Teppan",
"Erich Christian",
""
],
[
"Friedrich",
"Gerhard",
""
]
] | TITLE: The Partner Units Configuration Problem: Completing the Picture
ABSTRACT: The partner units problem (PUP) is an acknowledged hard benchmark problem for
the Logic Programming community with various industrial application fields like
surveillance, electrical engineering, computer networks or railway safety
systems. However, computational complexity remained widely unclear so far. In
this paper we provide all missing complexity results making the PUP better
exploitable for benchmark testing. Furthermore, we present QuickPup, a
heuristic search algorithm for PUP instances which outperforms all
state-of-the-art solving approaches and which is already in use in real world
industrial configuration environments.
|
1310.4579 | Abir De | Abir De, Niloy Ganguly, Soumen Chakrabarti | Discriminative Link Prediction using Local Links, Node Features and
Community Structure | 10 pages, 5 figures | null | null | null | cs.LG cs.SI physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A link prediction (LP) algorithm is given a graph, and has to rank, for each
node, other nodes that are candidates for new linkage. LP is strongly motivated
by social search and recommendation applications. LP techniques often focus on
global properties (graph conductance, hitting or commute times, Katz score) or
local properties (Adamic-Adar and many variations, or node feature vectors),
but rarely combine these signals. Furthermore, neither of these extremes
exploit link densities at the intermediate level of communities. In this paper
we describe a discriminative LP algorithm that exploits two new signals. First,
a co-clustering algorithm provides community level link density estimates,
which are used to qualify observed links with a surprise value. Second, links
in the immediate neighborhood of the link to be predicted are not interpreted
at face value, but through a local model of node feature similarities. These
signals are combined into a discriminative link predictor. We evaluate the new
predictor using five diverse data sets that are standard in the literature. We
report on significant accuracy boosts compared to standard LP methods
(including Adamic-Adar and random walk). Apart from the new predictor, another
contribution is a rigorous protocol for benchmarking and reporting LP
algorithms, which reveals the regions of strengths and weaknesses of all the
predictors studied here, and establishes the new proposal as the most robust.
| [
{
"version": "v1",
"created": "Thu, 17 Oct 2013 04:21:37 GMT"
}
] | 2013-10-18T00:00:00 | [
[
"De",
"Abir",
""
],
[
"Ganguly",
"Niloy",
""
],
[
"Chakrabarti",
"Soumen",
""
]
] | TITLE: Discriminative Link Prediction using Local Links, Node Features and
Community Structure
ABSTRACT: A link prediction (LP) algorithm is given a graph, and has to rank, for each
node, other nodes that are candidates for new linkage. LP is strongly motivated
by social search and recommendation applications. LP techniques often focus on
global properties (graph conductance, hitting or commute times, Katz score) or
local properties (Adamic-Adar and many variations, or node feature vectors),
but rarely combine these signals. Furthermore, neither of these extremes
exploit link densities at the intermediate level of communities. In this paper
we describe a discriminative LP algorithm that exploits two new signals. First,
a co-clustering algorithm provides community level link density estimates,
which are used to qualify observed links with a surprise value. Second, links
in the immediate neighborhood of the link to be predicted are not interpreted
at face value, but through a local model of node feature similarities. These
signals are combined into a discriminative link predictor. We evaluate the new
predictor using five diverse data sets that are standard in the literature. We
report on significant accuracy boosts compared to standard LP methods
(including Adamic-Adar and random walk). Apart from the new predictor, another
contribution is a rigorous protocol for benchmarking and reporting LP
algorithms, which reveals the regions of strengths and weaknesses of all the
predictors studied here, and establishes the new proposal as the most robust.
|
1310.4759 | Erik Rodner | Christoph G\"oring, Alexander Freytag, Erik Rodner, Joachim Denzler | Fine-grained Categorization -- Short Summary of our Entry for the
ImageNet Challenge 2012 | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we tackle the problem of visual categorization of dog breeds,
which is a surprisingly challenging task due to simultaneously present low
interclass distances and high intra-class variances. Our approach combines
several techniques well known in our community but often not utilized for
fine-grained recognition:
(1) automatic segmentation, (2) efficient part detection, and (3) combination
of multiple features. In particular, we demonstrate that a simple head detector
embedded in an off-the-shelf recognition pipeline can improve recognition
accuracy quite significantly, highlighting the importance of part features for
fine-grained recognition tasks. Using our approach, we achieved a 24.59% mean
average precision performance on the Stanford dog dataset.
| [
{
"version": "v1",
"created": "Thu, 17 Oct 2013 16:11:53 GMT"
}
] | 2013-10-18T00:00:00 | [
[
"Göring",
"Christoph",
""
],
[
"Freytag",
"Alexander",
""
],
[
"Rodner",
"Erik",
""
],
[
"Denzler",
"Joachim",
""
]
] | TITLE: Fine-grained Categorization -- Short Summary of our Entry for the
ImageNet Challenge 2012
ABSTRACT: In this paper, we tackle the problem of visual categorization of dog breeds,
which is a surprisingly challenging task due to simultaneously present low
interclass distances and high intra-class variances. Our approach combines
several techniques well known in our community but often not utilized for
fine-grained recognition:
(1) automatic segmentation, (2) efficient part detection, and (3) combination
of multiple features. In particular, we demonstrate that a simple head detector
embedded in an off-the-shelf recognition pipeline can improve recognition
accuracy quite significantly, highlighting the importance of part features for
fine-grained recognition tasks. Using our approach, we achieved a 24.59% mean
average precision performance on the Stanford dog dataset.
|
1302.0420 | Francisco Couto | Francisco M Couto, Daniel Faria, Bruno Tavares, Pedro Gon\c{c}alves,
Paulo Verissimo | Benchmarking some Portuguese S&T system research units: 2nd Edition | 26 pages, 20 figures F. Couto, D. Faria, B. Tavares, P.
Gon\c{c}alves, and P. Verissimo, Benchmarking some portuguese S\&T system
research units: 2nd edition, DI/FCUL TR 13-03, Department of Informatics,
University of Lisbon, February 2013 | null | null | DI--FCUL--TR--2013--03 | cs.DL cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The increasing use of productivity and impact metrics for evaluation and
comparison, not only of individual researchers but also of institutions,
universities and even countries, has prompted the development of bibliometrics.
Currently, metrics are becoming widely accepted as an easy and balanced way to
assist the peer review and evaluation of scientists and/or research units,
provided they have adequate precision and recall.
This paper presents a benchmarking study of a selected list of representative
Portuguese research units, based on a fairly complete set of parameters:
bibliometric parameters, number of competitive projects and number of PhDs
produced. The study aimed at collecting productivity and impact data from the
selected research units in comparable conditions i.e., using objective metrics
based on public information, retrievable on-line and/or from official sources
and thus verifiable and repeatable. The study has thus focused on the activity
of the 2003-06 period, where such data was available from the latest official
evaluation.
The main advantage of our study was the application of automatic tools,
achieving relevant results at a reduced cost. Moreover, the results over the
selected units suggest that this kind of analyses will be very useful to
benchmark scientific productivity and impact, and assist peer review.
| [
{
"version": "v1",
"created": "Sat, 2 Feb 2013 19:36:14 GMT"
},
{
"version": "v2",
"created": "Wed, 20 Feb 2013 15:29:56 GMT"
},
{
"version": "v3",
"created": "Wed, 16 Oct 2013 16:13:25 GMT"
}
] | 2013-10-17T00:00:00 | [
[
"Couto",
"Francisco M",
""
],
[
"Faria",
"Daniel",
""
],
[
"Tavares",
"Bruno",
""
],
[
"Gonçalves",
"Pedro",
""
],
[
"Verissimo",
"Paulo",
""
]
] | TITLE: Benchmarking some Portuguese S&T system research units: 2nd Edition
ABSTRACT: The increasing use of productivity and impact metrics for evaluation and
comparison, not only of individual researchers but also of institutions,
universities and even countries, has prompted the development of bibliometrics.
Currently, metrics are becoming widely accepted as an easy and balanced way to
assist the peer review and evaluation of scientists and/or research units,
provided they have adequate precision and recall.
This paper presents a benchmarking study of a selected list of representative
Portuguese research units, based on a fairly complete set of parameters:
bibliometric parameters, number of competitive projects and number of PhDs
produced. The study aimed at collecting productivity and impact data from the
selected research units in comparable conditions i.e., using objective metrics
based on public information, retrievable on-line and/or from official sources
and thus verifiable and repeatable. The study has thus focused on the activity
of the 2003-06 period, where such data was available from the latest official
evaluation.
The main advantage of our study was the application of automatic tools,
achieving relevant results at a reduced cost. Moreover, the results over the
selected units suggest that this kind of analyses will be very useful to
benchmark scientific productivity and impact, and assist peer review.
|
1304.5583 | Ameet Talwalkar | Ameet Talwalkar, Lester Mackey, Yadong Mu, Shih-Fu Chang, Michael I.
Jordan | Distributed Low-rank Subspace Segmentation | null | null | null | null | cs.CV cs.DC cs.LG stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Vision problems ranging from image clustering to motion segmentation to
semi-supervised learning can naturally be framed as subspace segmentation
problems, in which one aims to recover multiple low-dimensional subspaces from
noisy and corrupted input data. Low-Rank Representation (LRR), a convex
formulation of the subspace segmentation problem, is provably and empirically
accurate on small problems but does not scale to the massive sizes of modern
vision datasets. Moreover, past work aimed at scaling up low-rank matrix
factorization is not applicable to LRR given its non-decomposable constraints.
In this work, we propose a novel divide-and-conquer algorithm for large-scale
subspace segmentation that can cope with LRR's non-decomposable constraints and
maintains LRR's strong recovery guarantees. This has immediate implications for
the scalability of subspace segmentation, which we demonstrate on a benchmark
face recognition dataset and in simulations. We then introduce novel
applications of LRR-based subspace segmentation to large-scale semi-supervised
learning for multimedia event detection, concept detection, and image tagging.
In each case, we obtain state-of-the-art results and order-of-magnitude speed
ups.
| [
{
"version": "v1",
"created": "Sat, 20 Apr 2013 03:54:48 GMT"
},
{
"version": "v2",
"created": "Wed, 16 Oct 2013 02:55:18 GMT"
}
] | 2013-10-17T00:00:00 | [
[
"Talwalkar",
"Ameet",
""
],
[
"Mackey",
"Lester",
""
],
[
"Mu",
"Yadong",
""
],
[
"Chang",
"Shih-Fu",
""
],
[
"Jordan",
"Michael I.",
""
]
] | TITLE: Distributed Low-rank Subspace Segmentation
ABSTRACT: Vision problems ranging from image clustering to motion segmentation to
semi-supervised learning can naturally be framed as subspace segmentation
problems, in which one aims to recover multiple low-dimensional subspaces from
noisy and corrupted input data. Low-Rank Representation (LRR), a convex
formulation of the subspace segmentation problem, is provably and empirically
accurate on small problems but does not scale to the massive sizes of modern
vision datasets. Moreover, past work aimed at scaling up low-rank matrix
factorization is not applicable to LRR given its non-decomposable constraints.
In this work, we propose a novel divide-and-conquer algorithm for large-scale
subspace segmentation that can cope with LRR's non-decomposable constraints and
maintains LRR's strong recovery guarantees. This has immediate implications for
the scalability of subspace segmentation, which we demonstrate on a benchmark
face recognition dataset and in simulations. We then introduce novel
applications of LRR-based subspace segmentation to large-scale semi-supervised
learning for multimedia event detection, concept detection, and image tagging.
In each case, we obtain state-of-the-art results and order-of-magnitude speed
ups.
|
1304.7284 | Zenglin Xu | Shandian Zhe, Zenglin Xu, and Yuan Qi | Supervised Heterogeneous Multiview Learning for Joint Association Study
and Disease Diagnosis | null | null | null | null | cs.LG cs.CE stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Given genetic variations and various phenotypical traits, such as Magnetic
Resonance Imaging (MRI) features, we consider two important and related tasks
in biomedical research: i)to select genetic and phenotypical markers for
disease diagnosis and ii) to identify associations between genetic and
phenotypical data. These two tasks are tightly coupled because underlying
associations between genetic variations and phenotypical features contain the
biological basis for a disease. While a variety of sparse models have been
applied for disease diagnosis and canonical correlation analysis and its
extensions have bee widely used in association studies (e.g., eQTL analysis),
these two tasks have been treated separately. To unify these two tasks, we
present a new sparse Bayesian approach for joint association study and disease
diagnosis. In this approach, common latent features are extracted from
different data sources based on sparse projection matrices and used to predict
multiple disease severity levels based on Gaussian process ordinal regression;
in return, the disease status is used to guide the discovery of relationships
between the data sources. The sparse projection matrices not only reveal
interactions between data sources but also select groups of biomarkers related
to the disease. To learn the model from data, we develop an efficient
variational expectation maximization algorithm. Simulation results demonstrate
that our approach achieves higher accuracy in both predicting ordinal labels
and discovering associations between data sources than alternative methods. We
apply our approach to an imaging genetics dataset for the study of Alzheimer's
Disease (AD). Our method identifies biologically meaningful relationships
between genetic variations, MRI features, and AD status, and achieves
significantly higher accuracy for predicting ordinal AD stages than the
competing methods.
| [
{
"version": "v1",
"created": "Fri, 26 Apr 2013 20:47:46 GMT"
},
{
"version": "v2",
"created": "Wed, 16 Oct 2013 07:04:04 GMT"
}
] | 2013-10-17T00:00:00 | [
[
"Zhe",
"Shandian",
""
],
[
"Xu",
"Zenglin",
""
],
[
"Qi",
"Yuan",
""
]
] | TITLE: Supervised Heterogeneous Multiview Learning for Joint Association Study
and Disease Diagnosis
ABSTRACT: Given genetic variations and various phenotypical traits, such as Magnetic
Resonance Imaging (MRI) features, we consider two important and related tasks
in biomedical research: i)to select genetic and phenotypical markers for
disease diagnosis and ii) to identify associations between genetic and
phenotypical data. These two tasks are tightly coupled because underlying
associations between genetic variations and phenotypical features contain the
biological basis for a disease. While a variety of sparse models have been
applied for disease diagnosis and canonical correlation analysis and its
extensions have bee widely used in association studies (e.g., eQTL analysis),
these two tasks have been treated separately. To unify these two tasks, we
present a new sparse Bayesian approach for joint association study and disease
diagnosis. In this approach, common latent features are extracted from
different data sources based on sparse projection matrices and used to predict
multiple disease severity levels based on Gaussian process ordinal regression;
in return, the disease status is used to guide the discovery of relationships
between the data sources. The sparse projection matrices not only reveal
interactions between data sources but also select groups of biomarkers related
to the disease. To learn the model from data, we develop an efficient
variational expectation maximization algorithm. Simulation results demonstrate
that our approach achieves higher accuracy in both predicting ordinal labels
and discovering associations between data sources than alternative methods. We
apply our approach to an imaging genetics dataset for the study of Alzheimer's
Disease (AD). Our method identifies biologically meaningful relationships
between genetic variations, MRI features, and AD status, and achieves
significantly higher accuracy for predicting ordinal AD stages than the
competing methods.
|
1310.4217 | Bingni Brunton | B. W. Brunton, S. L. Brunton, J. L. Proctor, and J. N. Kutz | Optimal Sensor Placement and Enhanced Sparsity for Classification | 13 pages, 11 figures | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The goal of compressive sensing is efficient reconstruction of data from few
measurements, sometimes leading to a categorical decision. If only
classification is required, reconstruction can be circumvented and the
measurements needed are orders-of-magnitude sparser still. We define enhanced
sparsity as the reduction in number of measurements required for classification
over reconstruction. In this work, we exploit enhanced sparsity and learn
spatial sensor locations that optimally inform a categorical decision. The
algorithm solves an l1-minimization to find the fewest entries of the full
measurement vector that exactly reconstruct the discriminant vector in feature
space. Once the sensor locations have been identified from the training data,
subsequent test samples are classified with remarkable efficiency, achieving
performance comparable to that obtained by discrimination using the full image.
Sensor locations may be learned from full images, or from a random subsample of
pixels. For classification between more than two categories, we introduce a
coupling parameter whose value tunes the number of sensors selected, trading
accuracy for economy. We demonstrate the algorithm on example datasets from
image recognition using PCA for feature extraction and LDA for discrimination;
however, the method can be broadly applied to non-image data and adapted to
work with other methods for feature extraction and discrimination.
| [
{
"version": "v1",
"created": "Tue, 15 Oct 2013 21:41:17 GMT"
}
] | 2013-10-17T00:00:00 | [
[
"Brunton",
"B. W.",
""
],
[
"Brunton",
"S. L.",
""
],
[
"Proctor",
"J. L.",
""
],
[
"Kutz",
"J. N.",
""
]
] | TITLE: Optimal Sensor Placement and Enhanced Sparsity for Classification
ABSTRACT: The goal of compressive sensing is efficient reconstruction of data from few
measurements, sometimes leading to a categorical decision. If only
classification is required, reconstruction can be circumvented and the
measurements needed are orders-of-magnitude sparser still. We define enhanced
sparsity as the reduction in number of measurements required for classification
over reconstruction. In this work, we exploit enhanced sparsity and learn
spatial sensor locations that optimally inform a categorical decision. The
algorithm solves an l1-minimization to find the fewest entries of the full
measurement vector that exactly reconstruct the discriminant vector in feature
space. Once the sensor locations have been identified from the training data,
subsequent test samples are classified with remarkable efficiency, achieving
performance comparable to that obtained by discrimination using the full image.
Sensor locations may be learned from full images, or from a random subsample of
pixels. For classification between more than two categories, we introduce a
coupling parameter whose value tunes the number of sensors selected, trading
accuracy for economy. We demonstrate the algorithm on example datasets from
image recognition using PCA for feature extraction and LDA for discrimination;
however, the method can be broadly applied to non-image data and adapted to
work with other methods for feature extraction and discrimination.
|
1310.4485 | Baochang Zhang | Juan Liu, Baochang Zhang, Linlin Shen, Jianzhuang Liu, Jason Zhao | The BeiHang Keystroke Dynamics Authentication System | 25 pages,17 figures,5 tables | null | null | null | cs.CR cs.LG | http://creativecommons.org/licenses/by/3.0/ | Keystroke Dynamics is an important biometric solution for person
authentication. Based upon keystroke dynamics, this paper designs an embedded
password protection device, develops an online system, collects two public
databases for promoting the research on keystroke authentication, exploits the
Gabor filter bank to characterize keystroke dynamics, and provides benchmark
results of three popular classification algorithms, one-class support vector
machine, Gaussian classifier, and nearest neighbour classifier.
| [
{
"version": "v1",
"created": "Tue, 15 Oct 2013 12:12:44 GMT"
}
] | 2013-10-17T00:00:00 | [
[
"Liu",
"Juan",
""
],
[
"Zhang",
"Baochang",
""
],
[
"Shen",
"Linlin",
""
],
[
"Liu",
"Jianzhuang",
""
],
[
"Zhao",
"Jason",
""
]
] | TITLE: The BeiHang Keystroke Dynamics Authentication System
ABSTRACT: Keystroke Dynamics is an important biometric solution for person
authentication. Based upon keystroke dynamics, this paper designs an embedded
password protection device, develops an online system, collects two public
databases for promoting the research on keystroke authentication, exploits the
Gabor filter bank to characterize keystroke dynamics, and provides benchmark
results of three popular classification algorithms, one-class support vector
machine, Gaussian classifier, and nearest neighbour classifier.
|
1310.3939 | Domenico Sacca' | Domenico Sacca', Edoardo Serra, Pietro Dicosta, Antonio Piccolo | Multi-Sorted Inverse Frequent Itemsets Mining | 14 pages | null | null | null | cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The development of novel platforms and techniques for emerging "Big Data"
applications requires the availability of real-life datasets for data-driven
experiments, which are however out of reach for academic research in most cases
as they are typically proprietary. A possible solution is to use synthesized
datasets that reflect patterns of real ones in order to ensure high quality
experimental findings. A first step in this direction is to use inverse mining
techniques such as inverse frequent itemset mining (IFM) that consists of
generating a transactional database satisfying given support constraints on the
itemsets in an input set, that are typically the frequent ones. This paper
introduces an extension of IFM, called many-sorted IFM, where the schemes for
the datasets to be generated are those typical of Big Tables as required in
emerging big data applications, e.g., social network analytics.
| [
{
"version": "v1",
"created": "Tue, 15 Oct 2013 07:38:36 GMT"
}
] | 2013-10-16T00:00:00 | [
[
"Sacca'",
"Domenico",
""
],
[
"Serra",
"Edoardo",
""
],
[
"Dicosta",
"Pietro",
""
],
[
"Piccolo",
"Antonio",
""
]
] | TITLE: Multi-Sorted Inverse Frequent Itemsets Mining
ABSTRACT: The development of novel platforms and techniques for emerging "Big Data"
applications requires the availability of real-life datasets for data-driven
experiments, which are however out of reach for academic research in most cases
as they are typically proprietary. A possible solution is to use synthesized
datasets that reflect patterns of real ones in order to ensure high quality
experimental findings. A first step in this direction is to use inverse mining
techniques such as inverse frequent itemset mining (IFM) that consists of
generating a transactional database satisfying given support constraints on the
itemsets in an input set, that are typically the frequent ones. This paper
introduces an extension of IFM, called many-sorted IFM, where the schemes for
the datasets to be generated are those typical of Big Tables as required in
emerging big data applications, e.g., social network analytics.
|
1310.4136 | Thiago S. F. X. Teixeira | Thiago S. F. X. Teixeira, George Teodoro, Eduardo Valle, Joel H. Saltz | Scalable Locality-Sensitive Hashing for Similarity Search in
High-Dimensional, Large-Scale Multimedia Datasets | null | null | null | null | cs.DC cs.DB cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Similarity search is critical for many database applications, including the
increasingly popular online services for Content-Based Multimedia Retrieval
(CBMR). These services, which include image search engines, must handle an
overwhelming volume of data, while keeping low response times. Thus,
scalability is imperative for similarity search in Web-scale applications, but
most existing methods are sequential and target shared-memory machines. Here we
address these issues with a distributed, efficient, and scalable index based on
Locality-Sensitive Hashing (LSH). LSH is one of the most efficient and popular
techniques for similarity search, but its poor referential locality properties
has made its implementation a challenging problem. Our solution is based on a
widely asynchronous dataflow parallelization with a number of optimizations
that include a hierarchical parallelization to decouple indexing and data
storage, locality-aware data partition strategies to reduce message passing,
and multi-probing to limit memory usage. The proposed parallelization attained
an efficiency of 90% in a distributed system with about 800 CPU cores. In
particular, the original locality-aware data partition reduced the number of
messages exchanged in 30%. Our parallel LSH was evaluated using the largest
public dataset for similarity search (to the best of our knowledge) with $10^9$
128-d SIFT descriptors extracted from Web images. This is two orders of
magnitude larger than datasets that previous LSH parallelizations could handle.
| [
{
"version": "v1",
"created": "Tue, 15 Oct 2013 18:21:39 GMT"
}
] | 2013-10-16T00:00:00 | [
[
"Teixeira",
"Thiago S. F. X.",
""
],
[
"Teodoro",
"George",
""
],
[
"Valle",
"Eduardo",
""
],
[
"Saltz",
"Joel H.",
""
]
] | TITLE: Scalable Locality-Sensitive Hashing for Similarity Search in
High-Dimensional, Large-Scale Multimedia Datasets
ABSTRACT: Similarity search is critical for many database applications, including the
increasingly popular online services for Content-Based Multimedia Retrieval
(CBMR). These services, which include image search engines, must handle an
overwhelming volume of data, while keeping low response times. Thus,
scalability is imperative for similarity search in Web-scale applications, but
most existing methods are sequential and target shared-memory machines. Here we
address these issues with a distributed, efficient, and scalable index based on
Locality-Sensitive Hashing (LSH). LSH is one of the most efficient and popular
techniques for similarity search, but its poor referential locality properties
has made its implementation a challenging problem. Our solution is based on a
widely asynchronous dataflow parallelization with a number of optimizations
that include a hierarchical parallelization to decouple indexing and data
storage, locality-aware data partition strategies to reduce message passing,
and multi-probing to limit memory usage. The proposed parallelization attained
an efficiency of 90% in a distributed system with about 800 CPU cores. In
particular, the original locality-aware data partition reduced the number of
messages exchanged in 30%. Our parallel LSH was evaluated using the largest
public dataset for similarity search (to the best of our knowledge) with $10^9$
128-d SIFT descriptors extracted from Web images. This is two orders of
magnitude larger than datasets that previous LSH parallelizations could handle.
|
1110.3717 | Gunnar W. Klau | C. Staiger, S. Cadot, R. Kooter, M. Dittrich, T. Mueller, G. W. Klau,
L. F. A. Wessels | A critical evaluation of network and pathway based classifiers for
outcome prediction in breast cancer | null | null | 10.1371/journal.pone.0034796 | null | cs.LG q-bio.QM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Recently, several classifiers that combine primary tumor data, like gene
expression data, and secondary data sources, such as protein-protein
interaction networks, have been proposed for predicting outcome in breast
cancer. In these approaches, new composite features are typically constructed
by aggregating the expression levels of several genes. The secondary data
sources are employed to guide this aggregation. Although many studies claim
that these approaches improve classification performance over single gene
classifiers, the gain in performance is difficult to assess. This stems mainly
from the fact that different breast cancer data sets and validation procedures
are employed to assess the performance. Here we address these issues by
employing a large cohort of six breast cancer data sets as benchmark set and by
performing an unbiased evaluation of the classification accuracies of the
different approaches. Contrary to previous claims, we find that composite
feature classifiers do not outperform simple single gene classifiers. We
investigate the effect of (1) the number of selected features; (2) the specific
gene set from which features are selected; (3) the size of the training set and
(4) the heterogeneity of the data set on the performance of composite feature
and single gene classifiers. Strikingly, we find that randomization of
secondary data sources, which destroys all biological information in these
sources, does not result in a deterioration in performance of composite feature
classifiers. Finally, we show that when a proper correction for gene set size
is performed, the stability of single gene sets is similar to the stability of
composite feature sets. Based on these results there is currently no reason to
prefer prognostic classifiers based on composite features over single gene
classifiers for predicting outcome in breast cancer.
| [
{
"version": "v1",
"created": "Mon, 17 Oct 2011 16:13:15 GMT"
},
{
"version": "v2",
"created": "Tue, 18 Oct 2011 06:29:11 GMT"
}
] | 2013-10-15T00:00:00 | [
[
"Staiger",
"C.",
""
],
[
"Cadot",
"S.",
""
],
[
"Kooter",
"R.",
""
],
[
"Dittrich",
"M.",
""
],
[
"Mueller",
"T.",
""
],
[
"Klau",
"G. W.",
""
],
[
"Wessels",
"L. F. A.",
""
]
] | TITLE: A critical evaluation of network and pathway based classifiers for
outcome prediction in breast cancer
ABSTRACT: Recently, several classifiers that combine primary tumor data, like gene
expression data, and secondary data sources, such as protein-protein
interaction networks, have been proposed for predicting outcome in breast
cancer. In these approaches, new composite features are typically constructed
by aggregating the expression levels of several genes. The secondary data
sources are employed to guide this aggregation. Although many studies claim
that these approaches improve classification performance over single gene
classifiers, the gain in performance is difficult to assess. This stems mainly
from the fact that different breast cancer data sets and validation procedures
are employed to assess the performance. Here we address these issues by
employing a large cohort of six breast cancer data sets as benchmark set and by
performing an unbiased evaluation of the classification accuracies of the
different approaches. Contrary to previous claims, we find that composite
feature classifiers do not outperform simple single gene classifiers. We
investigate the effect of (1) the number of selected features; (2) the specific
gene set from which features are selected; (3) the size of the training set and
(4) the heterogeneity of the data set on the performance of composite feature
and single gene classifiers. Strikingly, we find that randomization of
secondary data sources, which destroys all biological information in these
sources, does not result in a deterioration in performance of composite feature
classifiers. Finally, we show that when a proper correction for gene set size
is performed, the stability of single gene sets is similar to the stability of
composite feature sets. Based on these results there is currently no reason to
prefer prognostic classifiers based on composite features over single gene
classifiers for predicting outcome in breast cancer.
|
1306.3398 | Vincent A Traag | V.A. Traag, G. Krings and P. Van Dooren | Significant Scales in Community Structure | To appear in Scientific Reports | Scientific Reports 3, 2930 (2013) | 10.1038/srep02930 | null | physics.soc-ph cs.DM cs.SI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Many complex networks show signs of modular structure, uncovered by community
detection. Although many methods succeed in revealing various partitions, it
remains difficult to detect at what scale some partition is significant. This
problem shows foremost in multi-resolution methods. We here introduce an
efficient method for scanning for resolutions in one such method. Additionally,
we introduce the notion of "significance" of a partition, based on subgraph
probabilities. Significance is independent of the exact method used, so could
also be applied in other methods, and can be interpreted as the gain in
encoding a graph by making use of a partition. Using significance, we can
determine "good" resolution parameters, which we demonstrate on benchmark
networks. Moreover, optimizing significance itself also shows excellent
performance. We demonstrate our method on voting data from the European
Parliament. Our analysis suggests the European Parliament has become
increasingly ideologically divided and that nationality plays no role.
| [
{
"version": "v1",
"created": "Fri, 14 Jun 2013 13:53:25 GMT"
},
{
"version": "v2",
"created": "Fri, 11 Oct 2013 14:13:07 GMT"
}
] | 2013-10-15T00:00:00 | [
[
"Traag",
"V. A.",
""
],
[
"Krings",
"G.",
""
],
[
"Van Dooren",
"P.",
""
]
] | TITLE: Significant Scales in Community Structure
ABSTRACT: Many complex networks show signs of modular structure, uncovered by community
detection. Although many methods succeed in revealing various partitions, it
remains difficult to detect at what scale some partition is significant. This
problem shows foremost in multi-resolution methods. We here introduce an
efficient method for scanning for resolutions in one such method. Additionally,
we introduce the notion of "significance" of a partition, based on subgraph
probabilities. Significance is independent of the exact method used, so could
also be applied in other methods, and can be interpreted as the gain in
encoding a graph by making use of a partition. Using significance, we can
determine "good" resolution parameters, which we demonstrate on benchmark
networks. Moreover, optimizing significance itself also shows excellent
performance. We demonstrate our method on voting data from the European
Parliament. Our analysis suggests the European Parliament has become
increasingly ideologically divided and that nationality plays no role.
|
1310.3322 | Mohamed Elhoseiny Mohamed Elhoseiny | Mohamed Elhoseiny, Hossam Faheem, Taymour Nazmy, and Eman Shaaban | GPU-Framework for Teamwork Action Recognition | 7 pages | null | null | null | cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Real time processing for teamwork action recognition is a challenge, due to
complex computational models to achieve high system performance. Hence, this
paper proposes a framework based on Graphical Processing Units (GPUs) to
achieve a significant speed up in the performance of role based activity
recognition of teamwork. The framework can be applied in various fields,
especially athletic and military applications. Furthermore, the framework can
be customized for many action recognition applications. The paper presents the
stages of the framework where GPUs are the main tool for performance
improvement. The speedup is achieved by performing video processing and Machine
learning algorithms on GPU. Video processing and machine learning algorithms
covers all computations involved in our framework. Video processing tasks on
involves GPU implementation of Motion detection, segmentation and object
tracking algorithms. In addition, our framework is integrated with GPUCV, a GPU
version of OpenCV functions. Machine learning tasks are supported under our
framework with GPU implementations of Support Vector Machine (SVM) for object
classification and feature discretization, Hidden Marcov Model (HMM) for
activity recognition phase, and ID3 algorithm for role recognition of team
members. The system was tested against UC-Teamwork dataset and speedup of 20X
has been achieved on NVidia 9500GT graphics card (32 500MHZ processors).
| [
{
"version": "v1",
"created": "Sat, 12 Oct 2013 01:16:32 GMT"
}
] | 2013-10-15T00:00:00 | [
[
"Elhoseiny",
"Mohamed",
""
],
[
"Faheem",
"Hossam",
""
],
[
"Nazmy",
"Taymour",
""
],
[
"Shaaban",
"Eman",
""
]
] | TITLE: GPU-Framework for Teamwork Action Recognition
ABSTRACT: Real time processing for teamwork action recognition is a challenge, due to
complex computational models to achieve high system performance. Hence, this
paper proposes a framework based on Graphical Processing Units (GPUs) to
achieve a significant speed up in the performance of role based activity
recognition of teamwork. The framework can be applied in various fields,
especially athletic and military applications. Furthermore, the framework can
be customized for many action recognition applications. The paper presents the
stages of the framework where GPUs are the main tool for performance
improvement. The speedup is achieved by performing video processing and Machine
learning algorithms on GPU. Video processing and machine learning algorithms
covers all computations involved in our framework. Video processing tasks on
involves GPU implementation of Motion detection, segmentation and object
tracking algorithms. In addition, our framework is integrated with GPUCV, a GPU
version of OpenCV functions. Machine learning tasks are supported under our
framework with GPU implementations of Support Vector Machine (SVM) for object
classification and feature discretization, Hidden Marcov Model (HMM) for
activity recognition phase, and ID3 algorithm for role recognition of team
members. The system was tested against UC-Teamwork dataset and speedup of 20X
has been achieved on NVidia 9500GT graphics card (32 500MHZ processors).
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.