id
large_stringlengths
9
16
submitter
large_stringlengths
3
64
authors
large_stringlengths
5
20.2k
title
large_stringlengths
5
245
comments
large_stringlengths
1
482
journal-ref
large_stringlengths
4
382
doi
large_stringlengths
9
151
report-no
large_stringlengths
2
509
categories
large_stringlengths
5
78
license
large_stringclasses
9 values
abstract
large_stringlengths
83
3.55k
versions
large listlengths
1
21
update_date
timestamp[ms]date
2007-05-23 00:00:00
2025-05-30 00:00:00
authors_parsed
large listlengths
1
1.35k
prompt
large_stringlengths
166
3.64k
1311.5290
Odemir Bruno PhD
Wesley Nunes Gon\c{c}alves, Bruno Brandoli Machado, Odemir Martinez Bruno
Texture descriptor combining fractal dimension and artificial crawlers
12 pages 9 figures. Paper in press: Physica A: Statistical Mechanics and its Applications
null
10.1016/j.physa.2013.10.011
null
physics.data-an cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Texture is an important visual attribute used to describe images. There are many methods available for texture analysis. However, they do not capture the details richness of the image surface. In this paper, we propose a new method to describe textures using the artificial crawler model. This model assumes that each agent can interact with the environment and each other. Since this swarm system alone does not achieve a good discrimination, we developed a new method to increase the discriminatory power of artificial crawlers, together with the fractal dimension theory. Here, we estimated the fractal dimension by the Bouligand-Minkowski method due to its precision in quantifying structural properties of images. We validate our method on two texture datasets and the experimental results reveal that our method leads to highly discriminative textural features. The results indicate that our method can be used in different texture applications.
[ { "version": "v1", "created": "Thu, 21 Nov 2013 01:51:03 GMT" } ]
2013-11-22T00:00:00
[ [ "Gonçalves", "Wesley Nunes", "" ], [ "Machado", "Bruno Brandoli", "" ], [ "Bruno", "Odemir Martinez", "" ] ]
TITLE: Texture descriptor combining fractal dimension and artificial crawlers ABSTRACT: Texture is an important visual attribute used to describe images. There are many methods available for texture analysis. However, they do not capture the details richness of the image surface. In this paper, we propose a new method to describe textures using the artificial crawler model. This model assumes that each agent can interact with the environment and each other. Since this swarm system alone does not achieve a good discrimination, we developed a new method to increase the discriminatory power of artificial crawlers, together with the fractal dimension theory. Here, we estimated the fractal dimension by the Bouligand-Minkowski method due to its precision in quantifying structural properties of images. We validate our method on two texture datasets and the experimental results reveal that our method leads to highly discriminative textural features. The results indicate that our method can be used in different texture applications.
1108.2283
Federico Schl\"uter
Federico Schl\"uter
A survey on independence-based Markov networks learning
35 pages, 1 figure
Schl\"uter, F. (2011). A survey on independence-based Markov networks learning. Artificial Intelligence Review, 1-25
10.1007/s10462-012-9346-y
null
cs.AI cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This work reports the most relevant technical aspects in the problem of learning the \emph{Markov network structure} from data. Such problem has become increasingly important in machine learning, and many other application fields of machine learning. Markov networks, together with Bayesian networks, are probabilistic graphical models, a widely used formalism for handling probability distributions in intelligent systems. Learning graphical models from data have been extensively applied for the case of Bayesian networks, but for Markov networks learning it is not tractable in practice. However, this situation is changing with time, given the exponential growth of computers capacity, the plethora of available digital data, and the researching on new learning technologies. This work stresses on a technology called independence-based learning, which allows the learning of the independence structure of those networks from data in an efficient and sound manner, whenever the dataset is sufficiently large, and data is a representative sampling of the target distribution. In the analysis of such technology, this work surveys the current state-of-the-art algorithms for learning Markov networks structure, discussing its current limitations, and proposing a series of open problems where future works may produce some advances in the area in terms of quality and efficiency. The paper concludes by opening a discussion about how to develop a general formalism for improving the quality of the structures learned, when data is scarce.
[ { "version": "v1", "created": "Wed, 10 Aug 2011 20:25:08 GMT" }, { "version": "v2", "created": "Wed, 20 Nov 2013 19:15:05 GMT" } ]
2013-11-21T00:00:00
[ [ "Schlüter", "Federico", "" ] ]
TITLE: A survey on independence-based Markov networks learning ABSTRACT: This work reports the most relevant technical aspects in the problem of learning the \emph{Markov network structure} from data. Such problem has become increasingly important in machine learning, and many other application fields of machine learning. Markov networks, together with Bayesian networks, are probabilistic graphical models, a widely used formalism for handling probability distributions in intelligent systems. Learning graphical models from data have been extensively applied for the case of Bayesian networks, but for Markov networks learning it is not tractable in practice. However, this situation is changing with time, given the exponential growth of computers capacity, the plethora of available digital data, and the researching on new learning technologies. This work stresses on a technology called independence-based learning, which allows the learning of the independence structure of those networks from data in an efficient and sound manner, whenever the dataset is sufficiently large, and data is a representative sampling of the target distribution. In the analysis of such technology, this work surveys the current state-of-the-art algorithms for learning Markov networks structure, discussing its current limitations, and proposing a series of open problems where future works may produce some advances in the area in terms of quality and efficiency. The paper concludes by opening a discussion about how to develop a general formalism for improving the quality of the structures learned, when data is scarce.
1311.5018
Teodor Cioaca
Teodor Cioaca and Horea Caramizaru
On the impact of explicit or semi-implicit integration methods over the stability of real-time numerical simulations
Submitted to the ROMAI Journal of Applied Mathematics. Presented at the CAIM 2013 Conference on Applied and Industrial Mathematics
null
null
null
cs.GR
http://creativecommons.org/licenses/by-nc-sa/3.0/
Physics-based animation of soft or rigid bodies for real-time applications often suffers from numerical instabilities. We analyse one of the most common sources of unwanted behaviour: the numerical integration strategy. To assess the impact of popular integration methods, we consider a scenario where soft and hard constraints are added to a custom designed deformable linear object. Since the goal for this class of simulation methods is to attain interactive frame-rates, we present the drawbacks of using explicit integration methods over inherently stable, implicit integrators. To help numerical solver designers better understand the impact of an integrator on a certain simulated world, we have conceived a method of benchmarking the efficiency of an integrator with respect to its speed, stability and symplecticity.
[ { "version": "v1", "created": "Wed, 20 Nov 2013 11:30:03 GMT" } ]
2013-11-21T00:00:00
[ [ "Cioaca", "Teodor", "" ], [ "Caramizaru", "Horea", "" ] ]
TITLE: On the impact of explicit or semi-implicit integration methods over the stability of real-time numerical simulations ABSTRACT: Physics-based animation of soft or rigid bodies for real-time applications often suffers from numerical instabilities. We analyse one of the most common sources of unwanted behaviour: the numerical integration strategy. To assess the impact of popular integration methods, we consider a scenario where soft and hard constraints are added to a custom designed deformable linear object. Since the goal for this class of simulation methods is to attain interactive frame-rates, we present the drawbacks of using explicit integration methods over inherently stable, implicit integrators. To help numerical solver designers better understand the impact of an integrator on a certain simulated world, we have conceived a method of benchmarking the efficiency of an integrator with respect to its speed, stability and symplecticity.
1107.3724
Yuri Pirola
Yuri Pirola, Gianluca Della Vedova, Stefano Biffani, Alessandra Stella and Paola Bonizzoni
Haplotype Inference on Pedigrees with Recombinations, Errors, and Missing Genotypes via SAT solvers
14 pages, 1 figure, 4 tables, the associated software reHCstar is available at http://www.algolab.eu/reHCstar
IEEE/ACM Trans. on Computational Biology and Bioinformatics 9.6 (2012) 1582-1594
10.1109/TCBB.2012.100
null
cs.DS q-bio.PE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Minimum-Recombinant Haplotype Configuration problem (MRHC) has been highly successful in providing a sound combinatorial formulation for the important problem of genotype phasing on pedigrees. Despite several algorithmic advances and refinements that led to some efficient algorithms, its applicability to real datasets has been limited by the absence of some important characteristics of these data in its formulation, such as mutations, genotyping errors, and missing data. In this work, we propose the Haplotype Configuration with Recombinations and Errors problem (HCRE), which generalizes the original MRHC formulation by incorporating the two most common characteristics of real data: errors and missing genotypes (including untyped individuals). Although HCRE is computationally hard, we propose an exact algorithm for the problem based on a reduction to the well-known Satisfiability problem. Our reduction exploits recent progresses in the constraint programming literature and, combined with the use of state-of-the-art SAT solvers, provides a practical solution for the HCRE problem. Biological soundness of the phasing model and effectiveness (on both accuracy and performance) of the algorithm are experimentally demonstrated under several simulated scenarios and on a real dairy cattle population.
[ { "version": "v1", "created": "Tue, 19 Jul 2011 14:25:10 GMT" } ]
2013-11-20T00:00:00
[ [ "Pirola", "Yuri", "" ], [ "Della Vedova", "Gianluca", "" ], [ "Biffani", "Stefano", "" ], [ "Stella", "Alessandra", "" ], [ "Bonizzoni", "Paola", "" ] ]
TITLE: Haplotype Inference on Pedigrees with Recombinations, Errors, and Missing Genotypes via SAT solvers ABSTRACT: The Minimum-Recombinant Haplotype Configuration problem (MRHC) has been highly successful in providing a sound combinatorial formulation for the important problem of genotype phasing on pedigrees. Despite several algorithmic advances and refinements that led to some efficient algorithms, its applicability to real datasets has been limited by the absence of some important characteristics of these data in its formulation, such as mutations, genotyping errors, and missing data. In this work, we propose the Haplotype Configuration with Recombinations and Errors problem (HCRE), which generalizes the original MRHC formulation by incorporating the two most common characteristics of real data: errors and missing genotypes (including untyped individuals). Although HCRE is computationally hard, we propose an exact algorithm for the problem based on a reduction to the well-known Satisfiability problem. Our reduction exploits recent progresses in the constraint programming literature and, combined with the use of state-of-the-art SAT solvers, provides a practical solution for the HCRE problem. Biological soundness of the phasing model and effectiveness (on both accuracy and performance) of the algorithm are experimentally demonstrated under several simulated scenarios and on a real dairy cattle population.
1305.4196
Ralf Meyer
R. Meyer
Efficient Parallelization of Short-Range Molecular Dynamics Simulations on Many-Core Systems
12 pages, 8 figures
Phys. Rev. E 88, 053309 (2013)
10.1103/PhysRevE.88.053309
null
physics.comp-ph cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This article introduces a highly parallel algorithm for molecular dynamics simulations with short-range forces on single node multi- and many-core systems. The algorithm is designed to achieve high parallel speedups for strongly inhomogeneous systems like nanodevices or nanostructured materials. In the proposed scheme the calculation of the forces and the generation of neighbor lists is divided into small tasks. The tasks are then executed by a thread pool according to a dependent task schedule. This schedule is constructed in such a way that a particle is never accessed by two threads at the same time.Benchmark simulations on a typical 12 core machine show that the described algorithm achieves excellent parallel efficiencies above 80 % for different kinds of systems and all numbers of cores. For inhomogeneous systems the speedups are strongly superior to those obtained with spatial decomposition. Further benchmarks were performed on an Intel Xeon Phi coprocessor. These simulations demonstrate that the algorithm scales well to large numbers of cores.
[ { "version": "v1", "created": "Fri, 17 May 2013 21:41:22 GMT" }, { "version": "v2", "created": "Sun, 22 Sep 2013 18:21:46 GMT" }, { "version": "v3", "created": "Mon, 18 Nov 2013 21:41:52 GMT" } ]
2013-11-20T00:00:00
[ [ "Meyer", "R.", "" ] ]
TITLE: Efficient Parallelization of Short-Range Molecular Dynamics Simulations on Many-Core Systems ABSTRACT: This article introduces a highly parallel algorithm for molecular dynamics simulations with short-range forces on single node multi- and many-core systems. The algorithm is designed to achieve high parallel speedups for strongly inhomogeneous systems like nanodevices or nanostructured materials. In the proposed scheme the calculation of the forces and the generation of neighbor lists is divided into small tasks. The tasks are then executed by a thread pool according to a dependent task schedule. This schedule is constructed in such a way that a particle is never accessed by two threads at the same time.Benchmark simulations on a typical 12 core machine show that the described algorithm achieves excellent parallel efficiencies above 80 % for different kinds of systems and all numbers of cores. For inhomogeneous systems the speedups are strongly superior to those obtained with spatial decomposition. Further benchmarks were performed on an Intel Xeon Phi coprocessor. These simulations demonstrate that the algorithm scales well to large numbers of cores.
1309.7340
Jiwei Li
Jiwei Li and Claire Cardie
Early Stage Influenza Detection from Twitter
null
null
null
null
cs.SI cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Influenza is an acute respiratory illness that occurs virtually every year and results in substantial disease, death and expense. Detection of Influenza in its earliest stage would facilitate timely action that could reduce the spread of the illness. Existing systems such as CDC and EISS which try to collect diagnosis data, are almost entirely manual, resulting in about two-week delays for clinical data acquisition. Twitter, a popular microblogging service, provides us with a perfect source for early-stage flu detection due to its real- time nature. For example, when a flu breaks out, people that get the flu may post related tweets which enables the detection of the flu breakout promptly. In this paper, we investigate the real-time flu detection problem on Twitter data by proposing Flu Markov Network (Flu-MN): a spatio-temporal unsupervised Bayesian algorithm based on a 4 phase Markov Network, trying to identify the flu breakout at the earliest stage. We test our model on real Twitter datasets from the United States along with baselines in multiple applications, such as real-time flu breakout detection, future epidemic phase prediction, or Influenza-like illness (ILI) physician visits. Experimental results show the robustness and effectiveness of our approach. We build up a real time flu reporting system based on the proposed approach, and we are hopeful that it would help government or health organizations in identifying flu outbreaks and facilitating timely actions to decrease unnecessary mortality.
[ { "version": "v1", "created": "Fri, 27 Sep 2013 19:47:11 GMT" }, { "version": "v2", "created": "Wed, 9 Oct 2013 18:01:47 GMT" }, { "version": "v3", "created": "Mon, 18 Nov 2013 21:09:39 GMT" } ]
2013-11-20T00:00:00
[ [ "Li", "Jiwei", "" ], [ "Cardie", "Claire", "" ] ]
TITLE: Early Stage Influenza Detection from Twitter ABSTRACT: Influenza is an acute respiratory illness that occurs virtually every year and results in substantial disease, death and expense. Detection of Influenza in its earliest stage would facilitate timely action that could reduce the spread of the illness. Existing systems such as CDC and EISS which try to collect diagnosis data, are almost entirely manual, resulting in about two-week delays for clinical data acquisition. Twitter, a popular microblogging service, provides us with a perfect source for early-stage flu detection due to its real- time nature. For example, when a flu breaks out, people that get the flu may post related tweets which enables the detection of the flu breakout promptly. In this paper, we investigate the real-time flu detection problem on Twitter data by proposing Flu Markov Network (Flu-MN): a spatio-temporal unsupervised Bayesian algorithm based on a 4 phase Markov Network, trying to identify the flu breakout at the earliest stage. We test our model on real Twitter datasets from the United States along with baselines in multiple applications, such as real-time flu breakout detection, future epidemic phase prediction, or Influenza-like illness (ILI) physician visits. Experimental results show the robustness and effectiveness of our approach. We build up a real time flu reporting system based on the proposed approach, and we are hopeful that it would help government or health organizations in identifying flu outbreaks and facilitating timely actions to decrease unnecessary mortality.
1311.4627
Andrey Vladimirov
Troy A. Porter, Andrey E. Vladimirov
Calculation of Stochastic Heating and Emissivity of Cosmic Dust Grains with Optimization for the Intel Many Integrated Core Architecture
23 pages. Submitted to Computer Physics Communications. Comments to a subsequent revision will indicate resources from which the source code of the HEATCODE library can be freely obtained
null
null
null
astro-ph.IM astro-ph.GA cs.DC physics.comp-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Cosmic dust particles effectively attenuate starlight. Their absorption of starlight produces emission spectra from the near- to far-infrared, which depends on the sizes and properties of the dust grains, and spectrum of the heating radiation field. The near- to mid-infrared is dominated by the emissions by very small grains. Modeling the absorption of starlight by these particles is, however, computationally expensive and a significant bottleneck for self-consistent radiation transport codes treating the heating of dust by stars. In this paper, we summarize the formalism for computing the stochastic emissivity of cosmic dust, which was developed in earlier works, and present a new library HEATCODE implementing this formalism for the calculation for arbitrary grain properties and heating radiation fields. Our library is highly optimized for general-purpose processors with multiple cores and vector instructions, with hierarchical memory cache structure. The HEATCODE library also efficiently runs on co-processor cards implementing the Intel Many Integrated Core (Intel MIC) architecture. We discuss in detail the optimization steps that we took in order to optimize for the Intel MIC architecture, which also significantly benefited the performance of the code on general-purpose processors, and provide code samples and performance benchmarks for each step. The HEATCODE library performance on a single Intel Xeon Phi coprocessor (Intel MIC architecture) is approximately 2 times a general-purpose two-socket multicore processor system with approximately the same nominal power consumption. The library supports heterogeneous calculations employing host processors simultaneously with multiple coprocessors, and can be easily incorporated into existing radiation transport codes.
[ { "version": "v1", "created": "Tue, 19 Nov 2013 06:11:07 GMT" } ]
2013-11-20T00:00:00
[ [ "Porter", "Troy A.", "" ], [ "Vladimirov", "Andrey E.", "" ] ]
TITLE: Calculation of Stochastic Heating and Emissivity of Cosmic Dust Grains with Optimization for the Intel Many Integrated Core Architecture ABSTRACT: Cosmic dust particles effectively attenuate starlight. Their absorption of starlight produces emission spectra from the near- to far-infrared, which depends on the sizes and properties of the dust grains, and spectrum of the heating radiation field. The near- to mid-infrared is dominated by the emissions by very small grains. Modeling the absorption of starlight by these particles is, however, computationally expensive and a significant bottleneck for self-consistent radiation transport codes treating the heating of dust by stars. In this paper, we summarize the formalism for computing the stochastic emissivity of cosmic dust, which was developed in earlier works, and present a new library HEATCODE implementing this formalism for the calculation for arbitrary grain properties and heating radiation fields. Our library is highly optimized for general-purpose processors with multiple cores and vector instructions, with hierarchical memory cache structure. The HEATCODE library also efficiently runs on co-processor cards implementing the Intel Many Integrated Core (Intel MIC) architecture. We discuss in detail the optimization steps that we took in order to optimize for the Intel MIC architecture, which also significantly benefited the performance of the code on general-purpose processors, and provide code samples and performance benchmarks for each step. The HEATCODE library performance on a single Intel Xeon Phi coprocessor (Intel MIC architecture) is approximately 2 times a general-purpose two-socket multicore processor system with approximately the same nominal power consumption. The library supports heterogeneous calculations employing host processors simultaneously with multiple coprocessors, and can be easily incorporated into existing radiation transport codes.
1311.4731
Lutz Bornmann Dr.
Lutz Bornmann, Loet Leydesdorff and Jian Wang
How to improve the prediction based on citation impact percentiles for years shortly after the publication date?
Accepted for publication in the Journal of Informetrics. arXiv admin note: text overlap with arXiv:1306.4454
null
null
null
cs.DL stat.AP
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The findings of Bornmann, Leydesdorff, and Wang (in press) revealed that the consideration of journal impact improves the prediction of long-term citation impact. This paper further explores the possibility of improving citation impact measurements on the base of a short citation window by the consideration of journal impact and other variables, such as the number of authors, the number of cited references, and the number of pages. The dataset contains 475,391 journal papers published in 1980 and indexed in Web of Science (WoS, Thomson Reuters), and all annual citation counts (from 1980 to 2010) for these papers. As an indicator of citation impact, we used percentiles of citations calculated using the approach of Hazen (1914). Our results show that citation impact measurement can really be improved: If factors generally influencing citation impact are considered in the statistical analysis, the explained variance in the long-term citation impact can be much increased. However, this increase is only visible when using the years shortly after publication but not when using later years.
[ { "version": "v1", "created": "Tue, 19 Nov 2013 13:27:14 GMT" } ]
2013-11-20T00:00:00
[ [ "Bornmann", "Lutz", "" ], [ "Leydesdorff", "Loet", "" ], [ "Wang", "Jian", "" ] ]
TITLE: How to improve the prediction based on citation impact percentiles for years shortly after the publication date? ABSTRACT: The findings of Bornmann, Leydesdorff, and Wang (in press) revealed that the consideration of journal impact improves the prediction of long-term citation impact. This paper further explores the possibility of improving citation impact measurements on the base of a short citation window by the consideration of journal impact and other variables, such as the number of authors, the number of cited references, and the number of pages. The dataset contains 475,391 journal papers published in 1980 and indexed in Web of Science (WoS, Thomson Reuters), and all annual citation counts (from 1980 to 2010) for these papers. As an indicator of citation impact, we used percentiles of citations calculated using the approach of Hazen (1914). Our results show that citation impact measurement can really be improved: If factors generally influencing citation impact are considered in the statistical analysis, the explained variance in the long-term citation impact can be much increased. However, this increase is only visible when using the years shortly after publication but not when using later years.
1307.0468
Aliaksei Sandryhaila
Aliaksei Sandryhaila, Jose M. F. Moura
Discrete Signal Processing on Graphs: Frequency Analysis
null
null
null
null
cs.SI math.SP
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Signals and datasets that arise in physical and engineering applications, as well as social, genetics, biomolecular, and many other domains, are becoming increasingly larger and more complex. In contrast to traditional time and image signals, data in these domains are supported by arbitrary graphs. Signal processing on graphs extends concepts and techniques from traditional signal processing to data indexed by generic graphs. This paper studies the concepts of low and high frequencies on graphs, and low-, high-, and band-pass graph filters. In traditional signal processing, there concepts are easily defined because of a natural frequency ordering that has a physical interpretation. For signals residing on graphs, in general, there is no obvious frequency ordering. We propose a definition of total variation for graph signals that naturally leads to a frequency ordering on graphs and defines low-, high-, and band-pass graph signals and filters. We study the design of graph filters with specified frequency response, and illustrate our approach with applications to sensor malfunction detection and data classification.
[ { "version": "v1", "created": "Mon, 1 Jul 2013 18:33:04 GMT" }, { "version": "v2", "created": "Mon, 18 Nov 2013 19:44:53 GMT" } ]
2013-11-19T00:00:00
[ [ "Sandryhaila", "Aliaksei", "" ], [ "Moura", "Jose M. F.", "" ] ]
TITLE: Discrete Signal Processing on Graphs: Frequency Analysis ABSTRACT: Signals and datasets that arise in physical and engineering applications, as well as social, genetics, biomolecular, and many other domains, are becoming increasingly larger and more complex. In contrast to traditional time and image signals, data in these domains are supported by arbitrary graphs. Signal processing on graphs extends concepts and techniques from traditional signal processing to data indexed by generic graphs. This paper studies the concepts of low and high frequencies on graphs, and low-, high-, and band-pass graph filters. In traditional signal processing, there concepts are easily defined because of a natural frequency ordering that has a physical interpretation. For signals residing on graphs, in general, there is no obvious frequency ordering. We propose a definition of total variation for graph signals that naturally leads to a frequency ordering on graphs and defines low-, high-, and band-pass graph signals and filters. We study the design of graph filters with specified frequency response, and illustrate our approach with applications to sensor malfunction detection and data classification.
1310.8428
Hongyu Su
Hongyu Su, Juho Rousu
Multilabel Classification through Random Graph Ensembles
15 Pages, 1 Figures
JMLR: Workshop and Conference Proceedings 29:404--418, 2013
null
null
cs.LG
http://creativecommons.org/licenses/by-nc-sa/3.0/
We present new methods for multilabel classification, relying on ensemble learning on a collection of random output graphs imposed on the multilabel and a kernel-based structured output learner as the base classifier. For ensemble learning, differences among the output graphs provide the required base classifier diversity and lead to improved performance in the increasing size of the ensemble. We study different methods of forming the ensemble prediction, including majority voting and two methods that perform inferences over the graph structures before or after combining the base models into the ensemble. We compare the methods against the state-of-the-art machine learning approaches on a set of heterogeneous multilabel benchmark problems, including multilabel AdaBoost, convex multitask feature learning, as well as single target learning approaches represented by Bagging and SVM. In our experiments, the random graph ensembles are very competitive and robust, ranking first or second on most of the datasets. Overall, our results show that random graph ensembles are viable alternatives to flat multilabel and multitask learners.
[ { "version": "v1", "created": "Thu, 31 Oct 2013 09:00:39 GMT" }, { "version": "v2", "created": "Sun, 17 Nov 2013 04:04:49 GMT" } ]
2013-11-19T00:00:00
[ [ "Su", "Hongyu", "" ], [ "Rousu", "Juho", "" ] ]
TITLE: Multilabel Classification through Random Graph Ensembles ABSTRACT: We present new methods for multilabel classification, relying on ensemble learning on a collection of random output graphs imposed on the multilabel and a kernel-based structured output learner as the base classifier. For ensemble learning, differences among the output graphs provide the required base classifier diversity and lead to improved performance in the increasing size of the ensemble. We study different methods of forming the ensemble prediction, including majority voting and two methods that perform inferences over the graph structures before or after combining the base models into the ensemble. We compare the methods against the state-of-the-art machine learning approaches on a set of heterogeneous multilabel benchmark problems, including multilabel AdaBoost, convex multitask feature learning, as well as single target learning approaches represented by Bagging and SVM. In our experiments, the random graph ensembles are very competitive and robust, ranking first or second on most of the datasets. Overall, our results show that random graph ensembles are viable alternatives to flat multilabel and multitask learners.
1311.0805
Nikolaos Korfiatis
Todor Ivanov, Nikolaos Korfiatis, Roberto V. Zicari
On the inequality of the 3V's of Big Data Architectural Paradigms: A case for heterogeneity
null
null
null
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The well-known 3V architectural paradigm for Big Data introduced by Laney (2011), provides a simplified framework for defining the architecture of a big data platform to be deployed in various scenarios tackling processing of massive datasets. While additional components such as Variability and Veracity have been discussed as an extension to the 3V model, the basic components (volume, variety, velocity) provide a quantitative framework while variability and veracity target a more qualitative approach. In this paper we argue why the basic 3V's are not equal due to the different requirements that need to be covered in case higher demands for a particular "V". Similar to other conjectures such as the CAP theorem 3V based architectures differ on their implementation. We call this paradigm heterogeneity and we provide a taxonomy of the existing tools (as of 2013) covering the Hadoop ecosystem from the perspective of heterogeneity. This paper contributes on the understanding of the Hadoop ecosystem from the perspective of different workloads and aims to help researchers and practitioners on the design of scalable platforms targeting different operational needs.
[ { "version": "v1", "created": "Mon, 4 Nov 2013 18:29:45 GMT" }, { "version": "v2", "created": "Sat, 16 Nov 2013 19:21:45 GMT" } ]
2013-11-19T00:00:00
[ [ "Ivanov", "Todor", "" ], [ "Korfiatis", "Nikolaos", "" ], [ "Zicari", "Roberto V.", "" ] ]
TITLE: On the inequality of the 3V's of Big Data Architectural Paradigms: A case for heterogeneity ABSTRACT: The well-known 3V architectural paradigm for Big Data introduced by Laney (2011), provides a simplified framework for defining the architecture of a big data platform to be deployed in various scenarios tackling processing of massive datasets. While additional components such as Variability and Veracity have been discussed as an extension to the 3V model, the basic components (volume, variety, velocity) provide a quantitative framework while variability and veracity target a more qualitative approach. In this paper we argue why the basic 3V's are not equal due to the different requirements that need to be covered in case higher demands for a particular "V". Similar to other conjectures such as the CAP theorem 3V based architectures differ on their implementation. We call this paradigm heterogeneity and we provide a taxonomy of the existing tools (as of 2013) covering the Hadoop ecosystem from the perspective of heterogeneity. This paper contributes on the understanding of the Hadoop ecosystem from the perspective of different workloads and aims to help researchers and practitioners on the design of scalable platforms targeting different operational needs.
1311.3982
Juston Moore
Aaron Schein, Juston Moore, Hanna Wallach
Inferring Multilateral Relations from Dynamic Pairwise Interactions
NIPS 2013 Workshop on Frontiers of Network Analysis
null
null
null
cs.AI cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Correlations between anomalous activity patterns can yield pertinent information about complex social processes: a significant deviation from normal behavior, exhibited simultaneously by multiple pairs of actors, provides evidence for some underlying relationship involving those pairs---i.e., a multilateral relation. We introduce a new nonparametric Bayesian latent variable model that explicitly captures correlations between anomalous interaction counts and uses these shared deviations from normal activity patterns to identify and characterize multilateral relations. We showcase our model's capabilities using the newly curated Global Database of Events, Location, and Tone, a dataset that has seen considerable interest in the social sciences and the popular press, but which has is largely unexplored by the machine learning community. We provide a detailed analysis of the latent structure inferred by our model and show that the multilateral relations correspond to major international events and long-term international relationships. These findings lead us to recommend our model for any data-driven analysis of interaction networks where dynamic interactions over the edges provide evidence for latent social structure.
[ { "version": "v1", "created": "Fri, 15 Nov 2013 21:22:37 GMT" } ]
2013-11-19T00:00:00
[ [ "Schein", "Aaron", "" ], [ "Moore", "Juston", "" ], [ "Wallach", "Hanna", "" ] ]
TITLE: Inferring Multilateral Relations from Dynamic Pairwise Interactions ABSTRACT: Correlations between anomalous activity patterns can yield pertinent information about complex social processes: a significant deviation from normal behavior, exhibited simultaneously by multiple pairs of actors, provides evidence for some underlying relationship involving those pairs---i.e., a multilateral relation. We introduce a new nonparametric Bayesian latent variable model that explicitly captures correlations between anomalous interaction counts and uses these shared deviations from normal activity patterns to identify and characterize multilateral relations. We showcase our model's capabilities using the newly curated Global Database of Events, Location, and Tone, a dataset that has seen considerable interest in the social sciences and the popular press, but which has is largely unexplored by the machine learning community. We provide a detailed analysis of the latent structure inferred by our model and show that the multilateral relations correspond to major international events and long-term international relationships. These findings lead us to recommend our model for any data-driven analysis of interaction networks where dynamic interactions over the edges provide evidence for latent social structure.
1311.3987
Seyed-Mehdi-Reza Beheshti
Seyed-Mehdi-Reza Beheshti and Srikumar Venugopal and Seung Hwan Ryu and Boualem Benatallah and Wei Wang
Big Data and Cross-Document Coreference Resolution: Current State and Future Opportunities
null
null
null
null
cs.CL cs.DC cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Information Extraction (IE) is the task of automatically extracting structured information from unstructured/semi-structured machine-readable documents. Among various IE tasks, extracting actionable intelligence from ever-increasing amount of data depends critically upon Cross-Document Coreference Resolution (CDCR) - the task of identifying entity mentions across multiple documents that refer to the same underlying entity. Recently, document datasets of the order of peta-/tera-bytes has raised many challenges for performing effective CDCR such as scaling to large numbers of mentions and limited representational power. The problem of analysing such datasets is called "big data". The aim of this paper is to provide readers with an understanding of the central concepts, subtasks, and the current state-of-the-art in CDCR process. We provide assessment of existing tools/techniques for CDCR subtasks and highlight big data challenges in each of them to help readers identify important and outstanding issues for further investigation. Finally, we provide concluding remarks and discuss possible directions for future work.
[ { "version": "v1", "created": "Thu, 14 Nov 2013 06:10:15 GMT" } ]
2013-11-19T00:00:00
[ [ "Beheshti", "Seyed-Mehdi-Reza", "" ], [ "Venugopal", "Srikumar", "" ], [ "Ryu", "Seung Hwan", "" ], [ "Benatallah", "Boualem", "" ], [ "Wang", "Wei", "" ] ]
TITLE: Big Data and Cross-Document Coreference Resolution: Current State and Future Opportunities ABSTRACT: Information Extraction (IE) is the task of automatically extracting structured information from unstructured/semi-structured machine-readable documents. Among various IE tasks, extracting actionable intelligence from ever-increasing amount of data depends critically upon Cross-Document Coreference Resolution (CDCR) - the task of identifying entity mentions across multiple documents that refer to the same underlying entity. Recently, document datasets of the order of peta-/tera-bytes has raised many challenges for performing effective CDCR such as scaling to large numbers of mentions and limited representational power. The problem of analysing such datasets is called "big data". The aim of this paper is to provide readers with an understanding of the central concepts, subtasks, and the current state-of-the-art in CDCR process. We provide assessment of existing tools/techniques for CDCR subtasks and highlight big data challenges in each of them to help readers identify important and outstanding issues for further investigation. Finally, we provide concluding remarks and discuss possible directions for future work.
1311.4040
Miklos Kalman
Miklos Kalman, Ferenc Havasi
Enhanced XML Validation using SRML
18 pages
International Journal of Web & Semantic Technology (IJWesT) Vol.4, No.4, October 2013
10.5121/ijwest.2013.4401
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Data validation is becoming more and more important with the ever-growing amount of data being consumed and transmitted by systems over the Internet. It is important to ensure that the data being sent is valid as it may contain entry errors, which may be consumed by different systems causing further errors. XML has become the defacto standard for data transfer. The XML Schema Definition language (XSD) was created to help XML structural validation and provide a schema for data type restrictions, however it does not allow for more complex situations. In this article we introduce a way to provide rule based XML validation and correction through the extension and improvement of our SRML metalanguage. We also explore the option of applying it in a database as a trigger for CRUD operations allowing more granular dataset validation on an atomic level allowing for more complex dataset record validation rules.
[ { "version": "v1", "created": "Sat, 16 Nov 2013 09:59:05 GMT" } ]
2013-11-19T00:00:00
[ [ "Kalman", "Miklos", "" ], [ "Havasi", "Ferenc", "" ] ]
TITLE: Enhanced XML Validation using SRML ABSTRACT: Data validation is becoming more and more important with the ever-growing amount of data being consumed and transmitted by systems over the Internet. It is important to ensure that the data being sent is valid as it may contain entry errors, which may be consumed by different systems causing further errors. XML has become the defacto standard for data transfer. The XML Schema Definition language (XSD) was created to help XML structural validation and provide a schema for data type restrictions, however it does not allow for more complex situations. In this article we introduce a way to provide rule based XML validation and correction through the extension and improvement of our SRML metalanguage. We also explore the option of applying it in a database as a trigger for CRUD operations allowing more granular dataset validation on an atomic level allowing for more complex dataset record validation rules.
1311.4252
Odemir Bruno PhD
Andr\'e Ricardo Backes, Dalcimar Casanova, Odemir Martinez Bruno
Contour polygonal approximation using shortest path in networks
12 pages, 12 figures
null
10.1142/S0129183113500903
null
physics.comp-ph cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Contour polygonal approximation is a simplified representation of a contour by line segments, so that the main characteristics of the contour remain in a small number of line segments. This paper presents a novel method for polygonal approximation based on the Complex Networks theory. We convert each point of the contour into a vertex, so that we model a regular network. Then we transform this network into a Small-World Complex Network by applying some transformations over its edges. By analyzing of network properties, especially the geodesic path, we compute the polygonal approximation. The paper presents the main characteristics of the method, as well as its functionality. We evaluate the proposed method using benchmark contours, and compare its results with other polygonal approximation methods.
[ { "version": "v1", "created": "Mon, 18 Nov 2013 03:16:55 GMT" } ]
2013-11-19T00:00:00
[ [ "Backes", "André Ricardo", "" ], [ "Casanova", "Dalcimar", "" ], [ "Bruno", "Odemir Martinez", "" ] ]
TITLE: Contour polygonal approximation using shortest path in networks ABSTRACT: Contour polygonal approximation is a simplified representation of a contour by line segments, so that the main characteristics of the contour remain in a small number of line segments. This paper presents a novel method for polygonal approximation based on the Complex Networks theory. We convert each point of the contour into a vertex, so that we model a regular network. Then we transform this network into a Small-World Complex Network by applying some transformations over its edges. By analyzing of network properties, especially the geodesic path, we compute the polygonal approximation. The paper presents the main characteristics of the method, as well as its functionality. We evaluate the proposed method using benchmark contours, and compare its results with other polygonal approximation methods.
1311.4305
Tomofumi Yuki
Tomofumi Yuki and Paul Feautrier and Sanjay Rajopadhye and Vijay Saraswat
Checking Race Freedom of Clocked X10 Programs
11 pages
null
null
null
cs.DC cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
One of many approaches to better take advantage of parallelism, which has now become mainstream, is the introduction of parallel programming languages. However, parallelism is by nature non-deterministic, and not all parallel bugs can be avoided by language design. This paper proposes a method for guaranteeing absence of data races in the polyhedral subset of clocked X10 programs. Clocks in X10 are similar to barriers, but are more dynamic; the subset of processes that participate in the synchronization can dynamically change at runtime. We construct the happens-before relation for clocked X10 programs, and show that the problem of race detection is undecidable. However, in many practical cases, modern tools are able to find solutions or disprove their existence. We present a set of benchmarks for which the analysis is possible and has an acceptable running time.
[ { "version": "v1", "created": "Mon, 18 Nov 2013 09:36:31 GMT" } ]
2013-11-19T00:00:00
[ [ "Yuki", "Tomofumi", "" ], [ "Feautrier", "Paul", "" ], [ "Rajopadhye", "Sanjay", "" ], [ "Saraswat", "Vijay", "" ] ]
TITLE: Checking Race Freedom of Clocked X10 Programs ABSTRACT: One of many approaches to better take advantage of parallelism, which has now become mainstream, is the introduction of parallel programming languages. However, parallelism is by nature non-deterministic, and not all parallel bugs can be avoided by language design. This paper proposes a method for guaranteeing absence of data races in the polyhedral subset of clocked X10 programs. Clocks in X10 are similar to barriers, but are more dynamic; the subset of processes that participate in the synchronization can dynamically change at runtime. We construct the happens-before relation for clocked X10 programs, and show that the problem of race detection is undecidable. However, in many practical cases, modern tools are able to find solutions or disprove their existence. We present a set of benchmarks for which the analysis is possible and has an acceptable running time.
1311.3618
Mircea Cimpoi
Mircea Cimpoi, Subhransu Maji, Iasonas Kokkinos, Sammy Mohamed, and Andrea Vedaldi
Describing Textures in the Wild
13 pages; 12 figures Fixed misplaced affiliation
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Patterns and textures are defining characteristics of many natural objects: a shirt can be striped, the wings of a butterfly can be veined, and the skin of an animal can be scaly. Aiming at supporting this analytical dimension in image understanding, we address the challenging problem of describing textures with semantic attributes. We identify a rich vocabulary of forty-seven texture terms and use them to describe a large dataset of patterns collected in the wild.The resulting Describable Textures Dataset (DTD) is the basis to seek for the best texture representation for recognizing describable texture attributes in images. We port from object recognition to texture recognition the Improved Fisher Vector (IFV) and show that, surprisingly, it outperforms specialized texture descriptors not only on our problem, but also in established material recognition datasets. We also show that the describable attributes are excellent texture descriptors, transferring between datasets and tasks; in particular, combined with IFV, they significantly outperform the state-of-the-art by more than 8 percent on both FMD and KTHTIPS-2b benchmarks. We also demonstrate that they produce intuitive descriptions of materials and Internet images.
[ { "version": "v1", "created": "Thu, 14 Nov 2013 19:28:35 GMT" }, { "version": "v2", "created": "Fri, 15 Nov 2013 16:14:12 GMT" } ]
2013-11-18T00:00:00
[ [ "Cimpoi", "Mircea", "" ], [ "Maji", "Subhransu", "" ], [ "Kokkinos", "Iasonas", "" ], [ "Mohamed", "Sammy", "" ], [ "Vedaldi", "Andrea", "" ] ]
TITLE: Describing Textures in the Wild ABSTRACT: Patterns and textures are defining characteristics of many natural objects: a shirt can be striped, the wings of a butterfly can be veined, and the skin of an animal can be scaly. Aiming at supporting this analytical dimension in image understanding, we address the challenging problem of describing textures with semantic attributes. We identify a rich vocabulary of forty-seven texture terms and use them to describe a large dataset of patterns collected in the wild.The resulting Describable Textures Dataset (DTD) is the basis to seek for the best texture representation for recognizing describable texture attributes in images. We port from object recognition to texture recognition the Improved Fisher Vector (IFV) and show that, surprisingly, it outperforms specialized texture descriptors not only on our problem, but also in established material recognition datasets. We also show that the describable attributes are excellent texture descriptors, transferring between datasets and tasks; in particular, combined with IFV, they significantly outperform the state-of-the-art by more than 8 percent on both FMD and KTHTIPS-2b benchmarks. We also demonstrate that they produce intuitive descriptions of materials and Internet images.
1311.3732
Kien Nguyen
Kien Duy Nguyen, Tuan Pham Minh, Quang Nhat Nguyen, Thanh Trung Nguyen
Exploiting Direct and Indirect Information for Friend Suggestion in ZingMe
NIPS workshop, 9 pages, 4 figures
null
null
null
cs.SI cs.IR physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Friend suggestion is a fundamental problem in social networks with the goal of assisting users in creating more relationships, and thereby enhances interest of users to the social networks. This problem is often considered to be the link prediction problem in the network. ZingMe is one of the largest social networks in Vietnam. In this paper, we analyze the current approach for the friend suggestion problem in ZingMe, showing its limitations and disadvantages. We propose a new efficient approach for friend suggestion that uses information from the network structure, attributes and interactions of users to create resources for the evaluation of friend connection amongst users. Friend connection is evaluated exploiting both direct communication between the users and information from other ones in the network. The proposed approach has been implemented in a new system version of ZingMe. We conducted experiments, exploiting a dataset derived from the users' real use of ZingMe, to compare the newly proposed approach to the current approach and some well-known ones for the accuracy of friend suggestion. The experimental results show that the newly proposed approach outperforms the current one, i.e., by an increase of 7% to 98% on average in the friend suggestion accuracy. The proposed approach also outperforms other ones for users who have a small number of friends with improvements from 20% to 85% on average. In this paper, we also discuss a number of open issues and possible improvements for the proposed approach.
[ { "version": "v1", "created": "Fri, 15 Nov 2013 05:56:48 GMT" } ]
2013-11-18T00:00:00
[ [ "Nguyen", "Kien Duy", "" ], [ "Minh", "Tuan Pham", "" ], [ "Nguyen", "Quang Nhat", "" ], [ "Nguyen", "Thanh Trung", "" ] ]
TITLE: Exploiting Direct and Indirect Information for Friend Suggestion in ZingMe ABSTRACT: Friend suggestion is a fundamental problem in social networks with the goal of assisting users in creating more relationships, and thereby enhances interest of users to the social networks. This problem is often considered to be the link prediction problem in the network. ZingMe is one of the largest social networks in Vietnam. In this paper, we analyze the current approach for the friend suggestion problem in ZingMe, showing its limitations and disadvantages. We propose a new efficient approach for friend suggestion that uses information from the network structure, attributes and interactions of users to create resources for the evaluation of friend connection amongst users. Friend connection is evaluated exploiting both direct communication between the users and information from other ones in the network. The proposed approach has been implemented in a new system version of ZingMe. We conducted experiments, exploiting a dataset derived from the users' real use of ZingMe, to compare the newly proposed approach to the current approach and some well-known ones for the accuracy of friend suggestion. The experimental results show that the newly proposed approach outperforms the current one, i.e., by an increase of 7% to 98% on average in the friend suggestion accuracy. The proposed approach also outperforms other ones for users who have a small number of friends with improvements from 20% to 85% on average. In this paper, we also discuss a number of open issues and possible improvements for the proposed approach.
1311.3735
Nicola Di Mauro
Nicola Di Mauro and Floriana Esposito
Ensemble Relational Learning based on Selective Propositionalization
10 pages. arXiv admin note: text overlap with arXiv:1006.5188
null
null
null
cs.LG cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Dealing with structured data needs the use of expressive representation formalisms that, however, puts the problem to deal with the computational complexity of the machine learning process. Furthermore, real world domains require tools able to manage their typical uncertainty. Many statistical relational learning approaches try to deal with these problems by combining the construction of relevant relational features with a probabilistic tool. When the combination is static (static propositionalization), the constructed features are considered as boolean features and used offline as input to a statistical learner; while, when the combination is dynamic (dynamic propositionalization), the feature construction and probabilistic tool are combined into a single process. In this paper we propose a selective propositionalization method that search the optimal set of relational features to be used by a probabilistic learner in order to minimize a loss function. The new propositionalization approach has been combined with the random subspace ensemble method. Experiments on real-world datasets shows the validity of the proposed method.
[ { "version": "v1", "created": "Fri, 15 Nov 2013 06:14:15 GMT" } ]
2013-11-18T00:00:00
[ [ "Di Mauro", "Nicola", "" ], [ "Esposito", "Floriana", "" ] ]
TITLE: Ensemble Relational Learning based on Selective Propositionalization ABSTRACT: Dealing with structured data needs the use of expressive representation formalisms that, however, puts the problem to deal with the computational complexity of the machine learning process. Furthermore, real world domains require tools able to manage their typical uncertainty. Many statistical relational learning approaches try to deal with these problems by combining the construction of relevant relational features with a probabilistic tool. When the combination is static (static propositionalization), the constructed features are considered as boolean features and used offline as input to a statistical learner; while, when the combination is dynamic (dynamic propositionalization), the feature construction and probabilistic tool are combined into a single process. In this paper we propose a selective propositionalization method that search the optimal set of relational features to be used by a probabilistic learner in order to minimize a loss function. The new propositionalization approach has been combined with the random subspace ensemble method. Experiments on real-world datasets shows the validity of the proposed method.
1311.3312
Thomas Cerqueus
Vanessa Ayala-Rivera, Patrick McDonagh, Thomas Cerqueus, Liam Murphy
Synthetic Data Generation using Benerator Tool
12 pages, 5 figures, 10 references
null
null
UCD-CSI-2013-03
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Datasets of different characteristics are needed by the research community for experimental purposes. However, real data may be difficult to obtain due to privacy concerns. Moreover, real data may not meet specific characteristics which are needed to verify new approaches under certain conditions. Given these limitations, the use of synthetic data is a viable alternative to complement the real data. In this report, we describe the process followed to generate synthetic data using Benerator, a publicly available tool. The results show that the synthetic data preserves a high level of accuracy compared to the original data. The generated datasets correspond to microdata containing records with social, economic and demographic data which mimics the distribution of aggregated statistics from the 2011 Irish Census data.
[ { "version": "v1", "created": "Wed, 13 Nov 2013 21:14:40 GMT" } ]
2013-11-15T00:00:00
[ [ "Ayala-Rivera", "Vanessa", "" ], [ "McDonagh", "Patrick", "" ], [ "Cerqueus", "Thomas", "" ], [ "Murphy", "Liam", "" ] ]
TITLE: Synthetic Data Generation using Benerator Tool ABSTRACT: Datasets of different characteristics are needed by the research community for experimental purposes. However, real data may be difficult to obtain due to privacy concerns. Moreover, real data may not meet specific characteristics which are needed to verify new approaches under certain conditions. Given these limitations, the use of synthetic data is a viable alternative to complement the real data. In this report, we describe the process followed to generate synthetic data using Benerator, a publicly available tool. The results show that the synthetic data preserves a high level of accuracy compared to the original data. The generated datasets correspond to microdata containing records with social, economic and demographic data which mimics the distribution of aggregated statistics from the 2011 Irish Census data.
1311.3508
Muhammad Qasim Pasta
Muhammad Qasim Pasta, Zohaib Jan, Faraz Zaidi, Celine Rozenblat
Demographic and Structural Characteristics to Rationalize Link Formation in Online Social Networks
Second International Workshop on Complex Networks and their Applications (10 pages, 8 figures)
null
null
null
cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recent years have seen tremendous growth of many online social networks such as Facebook, LinkedIn and MySpace. People connect to each other through these networks forming large social communities providing researchers rich datasets to understand, model and predict social interactions and behaviors. New contacts in these networks can be formed either due to an individual's demographic profile such as age group, gender, geographic location or due to network's structural dynamics such as triadic closure and preferential attachment, or a combination of both demographic and structural characteristics. A number of network generation models have been proposed in the last decade to explain the structure, evolution and processes taking place in different types of networks, and notably social networks. Network generation models studied in the literature primarily consider structural properties, and in some cases an individual's demographic profile in the formation of new social contacts. These models do not present a mechanism to combine both structural and demographic characteristics for the formation of new links. In this paper, we propose a new network generation algorithm which incorporates both these characteristics to model growth of a network.We use different publicly available Facebook datasets as benchmarks to demonstrate the correctness of the proposed network generation model.
[ { "version": "v1", "created": "Thu, 14 Nov 2013 14:04:09 GMT" } ]
2013-11-15T00:00:00
[ [ "Pasta", "Muhammad Qasim", "" ], [ "Jan", "Zohaib", "" ], [ "Zaidi", "Faraz", "" ], [ "Rozenblat", "Celine", "" ] ]
TITLE: Demographic and Structural Characteristics to Rationalize Link Formation in Online Social Networks ABSTRACT: Recent years have seen tremendous growth of many online social networks such as Facebook, LinkedIn and MySpace. People connect to each other through these networks forming large social communities providing researchers rich datasets to understand, model and predict social interactions and behaviors. New contacts in these networks can be formed either due to an individual's demographic profile such as age group, gender, geographic location or due to network's structural dynamics such as triadic closure and preferential attachment, or a combination of both demographic and structural characteristics. A number of network generation models have been proposed in the last decade to explain the structure, evolution and processes taking place in different types of networks, and notably social networks. Network generation models studied in the literature primarily consider structural properties, and in some cases an individual's demographic profile in the formation of new social contacts. These models do not present a mechanism to combine both structural and demographic characteristics for the formation of new links. In this paper, we propose a new network generation algorithm which incorporates both these characteristics to model growth of a network.We use different publicly available Facebook datasets as benchmarks to demonstrate the correctness of the proposed network generation model.
1311.3530
Robert Koenighofer
Roderick Bloem, Robert Koenighofer, Martina Seidl
SAT-Based Synthesis Methods for Safety Specs
Extended version of a paper at VMCAI'14
null
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Automatic synthesis of hardware components from declarative specifications is an ambitious endeavor in computer aided design. Existing synthesis algorithms are often implemented with Binary Decision Diagrams (BDDs), inheriting their scalability limitations. Instead of BDDs, we propose several new methods to synthesize finite-state systems from safety specifications using decision procedures for the satisfiability of quantified and unquantified Boolean formulas (SAT-, QBF- and EPR-solvers). The presented approaches are based on computational learning, templates, or reduction to first-order logic. We also present an efficient parallelization, and optimizations to utilize reachability information and incremental solving. Finally, we compare all methods in an extensive case study. Our new methods outperform BDDs and other existing work on some classes of benchmarks, and our parallelization achieves a super-linear speedup. This is an extended version of [5], featuring an additional appendix.
[ { "version": "v1", "created": "Thu, 14 Nov 2013 15:11:12 GMT" } ]
2013-11-15T00:00:00
[ [ "Bloem", "Roderick", "" ], [ "Koenighofer", "Robert", "" ], [ "Seidl", "Martina", "" ] ]
TITLE: SAT-Based Synthesis Methods for Safety Specs ABSTRACT: Automatic synthesis of hardware components from declarative specifications is an ambitious endeavor in computer aided design. Existing synthesis algorithms are often implemented with Binary Decision Diagrams (BDDs), inheriting their scalability limitations. Instead of BDDs, we propose several new methods to synthesize finite-state systems from safety specifications using decision procedures for the satisfiability of quantified and unquantified Boolean formulas (SAT-, QBF- and EPR-solvers). The presented approaches are based on computational learning, templates, or reduction to first-order logic. We also present an efficient parallelization, and optimizations to utilize reachability information and incremental solving. Finally, we compare all methods in an extensive case study. Our new methods outperform BDDs and other existing work on some classes of benchmarks, and our parallelization achieves a super-linear speedup. This is an extended version of [5], featuring an additional appendix.
1311.2978
Shibamouli Lahiri
Shibamouli Lahiri, Rada Mihalcea
Authorship Attribution Using Word Network Features
null
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we explore a set of novel features for authorship attribution of documents. These features are derived from a word network representation of natural language text. As has been noted in previous studies, natural language tends to show complex network structure at word level, with low degrees of separation and scale-free (power law) degree distribution. There has also been work on authorship attribution that incorporates ideas from complex networks. The goal of our paper is to explore properties of these complex networks that are suitable as features for machine-learning-based authorship attribution of documents. We performed experiments on three different datasets, and obtained promising results.
[ { "version": "v1", "created": "Tue, 12 Nov 2013 23:11:40 GMT" } ]
2013-11-14T00:00:00
[ [ "Lahiri", "Shibamouli", "" ], [ "Mihalcea", "Rada", "" ] ]
TITLE: Authorship Attribution Using Word Network Features ABSTRACT: In this paper, we explore a set of novel features for authorship attribution of documents. These features are derived from a word network representation of natural language text. As has been noted in previous studies, natural language tends to show complex network structure at word level, with low degrees of separation and scale-free (power law) degree distribution. There has also been work on authorship attribution that incorporates ideas from complex networks. The goal of our paper is to explore properties of these complex networks that are suitable as features for machine-learning-based authorship attribution of documents. We performed experiments on three different datasets, and obtained promising results.
1311.3037
Junzhou Zhao
Pinghui Wang, Bruno Ribeiro, Junzhou Zhao, John C.S. Lui, Don Towsley, Xiaohong Guan
Practical Characterization of Large Networks Using Neighborhood Information
null
null
null
null
cs.SI cs.CY physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Characterizing large online social networks (OSNs) through node querying is a challenging task. OSNs often impose severe constraints on the query rate, hence limiting the sample size to a small fraction of the total network. Various ad-hoc subgraph sampling methods have been proposed, but many of them give biased estimates and no theoretical basis on the accuracy. In this work, we focus on developing sampling methods for OSNs where querying a node also reveals partial structural information about its neighbors. Our methods are optimized for NoSQL graph databases (if the database can be accessed directly), or utilize Web API available on most major OSNs for graph sampling. We show that our sampling method has provable convergence guarantees on being an unbiased estimator, and it is more accurate than current state-of-the-art methods. We characterize metrics such as node label density estimation and edge label density estimation, two of the most fundamental network characteristics from which other network characteristics can be derived. We evaluate our methods on-the-fly over several live networks using their native APIs. Our simulation studies over a variety of offline datasets show that by including neighborhood information, our method drastically (4-fold) reduces the number of samples required to achieve the same estimation accuracy of state-of-the-art methods.
[ { "version": "v1", "created": "Wed, 13 Nov 2013 07:36:55 GMT" } ]
2013-11-14T00:00:00
[ [ "Wang", "Pinghui", "" ], [ "Ribeiro", "Bruno", "" ], [ "Zhao", "Junzhou", "" ], [ "Lui", "John C. S.", "" ], [ "Towsley", "Don", "" ], [ "Guan", "Xiaohong", "" ] ]
TITLE: Practical Characterization of Large Networks Using Neighborhood Information ABSTRACT: Characterizing large online social networks (OSNs) through node querying is a challenging task. OSNs often impose severe constraints on the query rate, hence limiting the sample size to a small fraction of the total network. Various ad-hoc subgraph sampling methods have been proposed, but many of them give biased estimates and no theoretical basis on the accuracy. In this work, we focus on developing sampling methods for OSNs where querying a node also reveals partial structural information about its neighbors. Our methods are optimized for NoSQL graph databases (if the database can be accessed directly), or utilize Web API available on most major OSNs for graph sampling. We show that our sampling method has provable convergence guarantees on being an unbiased estimator, and it is more accurate than current state-of-the-art methods. We characterize metrics such as node label density estimation and edge label density estimation, two of the most fundamental network characteristics from which other network characteristics can be derived. We evaluate our methods on-the-fly over several live networks using their native APIs. Our simulation studies over a variety of offline datasets show that by including neighborhood information, our method drastically (4-fold) reduces the number of samples required to achieve the same estimation accuracy of state-of-the-art methods.
1311.2677
Raman Singh Mr.
Raman Singh, Harish Kumar and R.K. Singla
Sampling Based Approaches to Handle Imbalances in Network Traffic Dataset for Machine Learning Techniques
12 pages
null
10.5121/csit.2013.3704
null
cs.NI cs.CR cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Network traffic data is huge, varying and imbalanced because various classes are not equally distributed. Machine learning (ML) algorithms for traffic analysis uses the samples from this data to recommend the actions to be taken by the network administrators as well as training. Due to imbalances in dataset, it is difficult to train machine learning algorithms for traffic analysis and these may give biased or false results leading to serious degradation in performance of these algorithms. Various techniques can be applied during sampling to minimize the effect of imbalanced instances. In this paper various sampling techniques have been analysed in order to compare the decrease in variation in imbalances of network traffic datasets sampled for these algorithms. Various parameters like missing classes in samples, probability of sampling of the different instances have been considered for comparison.
[ { "version": "v1", "created": "Tue, 12 Nov 2013 05:32:48 GMT" } ]
2013-11-13T00:00:00
[ [ "Singh", "Raman", "" ], [ "Kumar", "Harish", "" ], [ "Singla", "R. K.", "" ] ]
TITLE: Sampling Based Approaches to Handle Imbalances in Network Traffic Dataset for Machine Learning Techniques ABSTRACT: Network traffic data is huge, varying and imbalanced because various classes are not equally distributed. Machine learning (ML) algorithms for traffic analysis uses the samples from this data to recommend the actions to be taken by the network administrators as well as training. Due to imbalances in dataset, it is difficult to train machine learning algorithms for traffic analysis and these may give biased or false results leading to serious degradation in performance of these algorithms. Various techniques can be applied during sampling to minimize the effect of imbalanced instances. In this paper various sampling techniques have been analysed in order to compare the decrease in variation in imbalances of network traffic datasets sampled for these algorithms. Various parameters like missing classes in samples, probability of sampling of the different instances have been considered for comparison.
1311.2879
Abhishek Awasthi M.Sc.
Abhishek Awasthi, J\"org L\"assig and Oliver Kramer
Common Due-Date Problem: Exact Polynomial Algorithms for a Given Job Sequence
15th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing
null
null
null
cs.DS math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper considers the problem of scheduling jobs on single and parallel machines where all the jobs possess different processing times but a common due date. There is a penalty involved with each job if it is processed earlier or later than the due date. The objective of the problem is to find the assignment of jobs to machines, the processing sequence of jobs and the time at which they are processed, which minimizes the total penalty incurred due to tardiness or earliness of the jobs. This work presents exact polynomial algorithms for optimizing a given job sequence or single and parallel machines with the run-time complexities of $O(n \log n)$ and $O(mn^2 \log n)$ respectively, where $n$ is the number of jobs and $m$ the number of machines. The algorithms take a sequence consisting of all the jobs $(J_i, i=1,2,\dots,n)$ as input and distribute the jobs to machines (for $m>1$) along with their best completion times so as to get the least possible total penalty for this sequence. We prove the optimality for the single machine case and the runtime complexities of both. Henceforth, we present the results for the benchmark instances and compare with previous work for single and parallel machine cases, up to $200$ jobs.
[ { "version": "v1", "created": "Sat, 26 Oct 2013 14:33:44 GMT" } ]
2013-11-13T00:00:00
[ [ "Awasthi", "Abhishek", "" ], [ "Lässig", "Jörg", "" ], [ "Kramer", "Oliver", "" ] ]
TITLE: Common Due-Date Problem: Exact Polynomial Algorithms for a Given Job Sequence ABSTRACT: This paper considers the problem of scheduling jobs on single and parallel machines where all the jobs possess different processing times but a common due date. There is a penalty involved with each job if it is processed earlier or later than the due date. The objective of the problem is to find the assignment of jobs to machines, the processing sequence of jobs and the time at which they are processed, which minimizes the total penalty incurred due to tardiness or earliness of the jobs. This work presents exact polynomial algorithms for optimizing a given job sequence or single and parallel machines with the run-time complexities of $O(n \log n)$ and $O(mn^2 \log n)$ respectively, where $n$ is the number of jobs and $m$ the number of machines. The algorithms take a sequence consisting of all the jobs $(J_i, i=1,2,\dots,n)$ as input and distribute the jobs to machines (for $m>1$) along with their best completion times so as to get the least possible total penalty for this sequence. We prove the optimality for the single machine case and the runtime complexities of both. Henceforth, we present the results for the benchmark instances and compare with previous work for single and parallel machine cases, up to $200$ jobs.
1305.0810
Vadym Kliuchnikov
Vadym Kliuchnikov and Dmitri Maslov
Optimization of Clifford Circuits
7 pages, 5 figures
Phys. Rev. A 88, 052307 (2013)
10.1103/PhysRevA.88.052307
null
quant-ph cs.ET
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study optimal synthesis of Clifford circuits, and apply the results to peep-hole optimization of quantum circuits. We report optimal circuits for all Clifford operations with up to four inputs. We perform peep-hole optimization of Clifford circuits with up to 40 inputs found in the literature, and demonstrate the reduction in the number of gates by about 50%. We extend our methods to the optimal synthesis of linear reversible circuits, partially specified Clifford functions, and optimal Clifford circuits with five inputs up to input/output permutation. The results find their application in randomized benchmarking protocols, quantum error correction, and quantum circuit optimization.
[ { "version": "v1", "created": "Fri, 3 May 2013 19:36:34 GMT" }, { "version": "v2", "created": "Sun, 10 Nov 2013 23:19:24 GMT" } ]
2013-11-12T00:00:00
[ [ "Kliuchnikov", "Vadym", "" ], [ "Maslov", "Dmitri", "" ] ]
TITLE: Optimization of Clifford Circuits ABSTRACT: We study optimal synthesis of Clifford circuits, and apply the results to peep-hole optimization of quantum circuits. We report optimal circuits for all Clifford operations with up to four inputs. We perform peep-hole optimization of Clifford circuits with up to 40 inputs found in the literature, and demonstrate the reduction in the number of gates by about 50%. We extend our methods to the optimal synthesis of linear reversible circuits, partially specified Clifford functions, and optimal Clifford circuits with five inputs up to input/output permutation. The results find their application in randomized benchmarking protocols, quantum error correction, and quantum circuit optimization.
1311.1884
Saurabh Jha
Vijay Menon, Saurabh Jha
A Parallel Simulated Annealing Approach for the Mirrored Traveling Tournament Problem
null
null
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Traveling Tournament Problem (TTP) is a benchmark problem in sports scheduling and has been extensively studied in recent years. The Mirrored Traveling Tournament Problem (mTTP) is variation of the TTP that represents certain types of sports scheduling problems where the main objective is to minimize the total distance traveled by all the participating teams. In this paper we test a parallel simulated annealing approach for solving the mTTP using OpenMP on shared memory systems and we found that this approach is superior especially with respect to the number of solution instances that are probed per second. We also see that there is significant speed up of 1.5x - 2.2x in terms of number of solutions explored per unit time.
[ { "version": "v1", "created": "Fri, 8 Nov 2013 06:16:43 GMT" } ]
2013-11-12T00:00:00
[ [ "Menon", "Vijay", "" ], [ "Jha", "Saurabh", "" ] ]
TITLE: A Parallel Simulated Annealing Approach for the Mirrored Traveling Tournament Problem ABSTRACT: The Traveling Tournament Problem (TTP) is a benchmark problem in sports scheduling and has been extensively studied in recent years. The Mirrored Traveling Tournament Problem (mTTP) is variation of the TTP that represents certain types of sports scheduling problems where the main objective is to minimize the total distance traveled by all the participating teams. In this paper we test a parallel simulated annealing approach for solving the mTTP using OpenMP on shared memory systems and we found that this approach is superior especially with respect to the number of solution instances that are probed per second. We also see that there is significant speed up of 1.5x - 2.2x in terms of number of solutions explored per unit time.
1311.2100
Nandish Jayaram
Nandish Jayaram and Arijit Khan and Chengkai Li and Xifeng Yan and Ramez Elmasri
Querying Knowledge Graphs by Example Entity Tuples
null
null
null
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We witness an unprecedented proliferation of knowledge graphs that record millions of entities and their relationships. While knowledge graphs are structure-flexible and content rich, they are difficult to use. The challenge lies in the gap between their overwhelming complexity and the limited database knowledge of non-professional users. If writing structured queries over simple tables is difficult, complex graphs are only harder to query. As an initial step toward improving the usability of knowledge graphs, we propose to query such data by example entity tuples, without requiring users to form complex graph queries. Our system, GQBE (Graph Query By Example), automatically derives a weighted hidden maximal query graph based on input query tuples, to capture a user's query intent. It efficiently finds and ranks the top approximate answer tuples. For fast query processing, GQBE only partially evaluates query graphs. We conducted experiments and user studies on the large Freebase and DBpedia datasets and observed appealing accuracy and efficiency. Our system provides a complementary approach to the existing keyword-based methods, facilitating user-friendly graph querying. To the best of our knowledge, there was no such proposal in the past in the context of graphs.
[ { "version": "v1", "created": "Fri, 8 Nov 2013 22:47:39 GMT" } ]
2013-11-12T00:00:00
[ [ "Jayaram", "Nandish", "" ], [ "Khan", "Arijit", "" ], [ "Li", "Chengkai", "" ], [ "Yan", "Xifeng", "" ], [ "Elmasri", "Ramez", "" ] ]
TITLE: Querying Knowledge Graphs by Example Entity Tuples ABSTRACT: We witness an unprecedented proliferation of knowledge graphs that record millions of entities and their relationships. While knowledge graphs are structure-flexible and content rich, they are difficult to use. The challenge lies in the gap between their overwhelming complexity and the limited database knowledge of non-professional users. If writing structured queries over simple tables is difficult, complex graphs are only harder to query. As an initial step toward improving the usability of knowledge graphs, we propose to query such data by example entity tuples, without requiring users to form complex graph queries. Our system, GQBE (Graph Query By Example), automatically derives a weighted hidden maximal query graph based on input query tuples, to capture a user's query intent. It efficiently finds and ranks the top approximate answer tuples. For fast query processing, GQBE only partially evaluates query graphs. We conducted experiments and user studies on the large Freebase and DBpedia datasets and observed appealing accuracy and efficiency. Our system provides a complementary approach to the existing keyword-based methods, facilitating user-friendly graph querying. To the best of our knowledge, there was no such proposal in the past in the context of graphs.
1311.2139
Sundararajan Sellamanickam
P. Balamurugan, Shirish Shevade, Sundararajan Sellamanickam
Large Margin Semi-supervised Structured Output Learning
9 pages
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In structured output learning, obtaining labelled data for real-world applications is usually costly, while unlabelled examples are available in abundance. Semi-supervised structured classification has been developed to handle large amounts of unlabelled structured data. In this work, we consider semi-supervised structural SVMs with domain constraints. The optimization problem, which in general is not convex, contains the loss terms associated with the labelled and unlabelled examples along with the domain constraints. We propose a simple optimization approach, which alternates between solving a supervised learning problem and a constraint matching problem. Solving the constraint matching problem is difficult for structured prediction, and we propose an efficient and effective hill-climbing method to solve it. The alternating optimization is carried out within a deterministic annealing framework, which helps in effective constraint matching, and avoiding local minima which are not very useful. The algorithm is simple to implement and achieves comparable generalization performance on benchmark datasets.
[ { "version": "v1", "created": "Sat, 9 Nov 2013 06:47:22 GMT" } ]
2013-11-12T00:00:00
[ [ "Balamurugan", "P.", "" ], [ "Shevade", "Shirish", "" ], [ "Sellamanickam", "Sundararajan", "" ] ]
TITLE: Large Margin Semi-supervised Structured Output Learning ABSTRACT: In structured output learning, obtaining labelled data for real-world applications is usually costly, while unlabelled examples are available in abundance. Semi-supervised structured classification has been developed to handle large amounts of unlabelled structured data. In this work, we consider semi-supervised structural SVMs with domain constraints. The optimization problem, which in general is not convex, contains the loss terms associated with the labelled and unlabelled examples along with the domain constraints. We propose a simple optimization approach, which alternates between solving a supervised learning problem and a constraint matching problem. Solving the constraint matching problem is difficult for structured prediction, and we propose an efficient and effective hill-climbing method to solve it. The alternating optimization is carried out within a deterministic annealing framework, which helps in effective constraint matching, and avoiding local minima which are not very useful. The algorithm is simple to implement and achieves comparable generalization performance on benchmark datasets.
1311.2276
Sundararajan Sellamanickam
Vinod Nair, Rahul Kidambi, Sundararajan Sellamanickam, S. Sathiya Keerthi, Johannes Gehrke, Vijay Narayanan
A Quantitative Evaluation Framework for Missing Value Imputation Algorithms
9 pages
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the problem of quantitatively evaluating missing value imputation algorithms. Given a dataset with missing values and a choice of several imputation algorithms to fill them in, there is currently no principled way to rank the algorithms using a quantitative metric. We develop a framework based on treating imputation evaluation as a problem of comparing two distributions and show how it can be used to compute quantitative metrics. We present an efficient procedure for applying this framework to practical datasets, demonstrate several metrics derived from the existing literature on comparing distributions, and propose a new metric called Neighborhood-based Dissimilarity Score which is fast to compute and provides similar results. Results are shown on several datasets, metrics, and imputations algorithms.
[ { "version": "v1", "created": "Sun, 10 Nov 2013 14:17:47 GMT" } ]
2013-11-12T00:00:00
[ [ "Nair", "Vinod", "" ], [ "Kidambi", "Rahul", "" ], [ "Sellamanickam", "Sundararajan", "" ], [ "Keerthi", "S. Sathiya", "" ], [ "Gehrke", "Johannes", "" ], [ "Narayanan", "Vijay", "" ] ]
TITLE: A Quantitative Evaluation Framework for Missing Value Imputation Algorithms ABSTRACT: We consider the problem of quantitatively evaluating missing value imputation algorithms. Given a dataset with missing values and a choice of several imputation algorithms to fill them in, there is currently no principled way to rank the algorithms using a quantitative metric. We develop a framework based on treating imputation evaluation as a problem of comparing two distributions and show how it can be used to compute quantitative metrics. We present an efficient procedure for applying this framework to practical datasets, demonstrate several metrics derived from the existing literature on comparing distributions, and propose a new metric called Neighborhood-based Dissimilarity Score which is fast to compute and provides similar results. Results are shown on several datasets, metrics, and imputations algorithms.
1311.2378
Balamurugan Palaniappan
P. Balamurugan, Shirish Shevade, S. Sundararajan and S. S Keerthi
An Empirical Evaluation of Sequence-Tagging Trainers
18 pages, 5 figures ams.org
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The task of assigning label sequences to a set of observed sequences is common in computational linguistics. Several models for sequence labeling have been proposed over the last few years. Here, we focus on discriminative models for sequence labeling. Many batch and online (updating model parameters after visiting each example) learning algorithms have been proposed in the literature. On large datasets, online algorithms are preferred as batch learning methods are slow. These online algorithms were designed to solve either a primal or a dual problem. However, there has been no systematic comparison of these algorithms in terms of their speed, generalization performance (accuracy/likelihood) and their ability to achieve steady state generalization performance fast. With this aim, we compare different algorithms and make recommendations, useful for a practitioner. We conclude that the selection of an algorithm for sequence labeling depends on the evaluation criterion used and its implementation simplicity.
[ { "version": "v1", "created": "Mon, 11 Nov 2013 08:26:09 GMT" } ]
2013-11-12T00:00:00
[ [ "Balamurugan", "P.", "" ], [ "Shevade", "Shirish", "" ], [ "Sundararajan", "S.", "" ], [ "Keerthi", "S. S", "" ] ]
TITLE: An Empirical Evaluation of Sequence-Tagging Trainers ABSTRACT: The task of assigning label sequences to a set of observed sequences is common in computational linguistics. Several models for sequence labeling have been proposed over the last few years. Here, we focus on discriminative models for sequence labeling. Many batch and online (updating model parameters after visiting each example) learning algorithms have been proposed in the literature. On large datasets, online algorithms are preferred as batch learning methods are slow. These online algorithms were designed to solve either a primal or a dual problem. However, there has been no systematic comparison of these algorithms in terms of their speed, generalization performance (accuracy/likelihood) and their ability to achieve steady state generalization performance fast. With this aim, we compare different algorithms and make recommendations, useful for a practitioner. We conclude that the selection of an algorithm for sequence labeling depends on the evaluation criterion used and its implementation simplicity.
1212.0689
Nicolas Tremblay
Nicolas Tremblay, Pierre Borgnat
Multiscale Community Mining in Networks Using Spectral Graph Wavelets
Proceedings of the European Signal Processing Conference (EUSIPCO 2013)
null
null
null
physics.soc-ph cs.DM cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
For data represented by networks, the community structure of the underlying graph is of great interest. A classical clustering problem is to uncover the overall ``best'' partition of nodes in communities. Here, a more elaborate description is proposed in which community structures are identified at different scales. To this end, we take advantage of the local and scale-dependent information encoded in graph wavelets. After new developments for the practical use of graph wavelets, studying proper scale boundaries and parameters and introducing scaling functions, we propose a method to mine for communities in complex networks in a scale-dependent manner. It relies on classifying nodes according to their wavelets or scaling functions, using a scale-dependent modularity function. An example on a graph benchmark having hierarchical communities shows that we estimate successfully its multiscale structure.
[ { "version": "v1", "created": "Tue, 4 Dec 2012 11:52:17 GMT" }, { "version": "v2", "created": "Fri, 8 Nov 2013 12:17:03 GMT" } ]
2013-11-11T00:00:00
[ [ "Tremblay", "Nicolas", "" ], [ "Borgnat", "Pierre", "" ] ]
TITLE: Multiscale Community Mining in Networks Using Spectral Graph Wavelets ABSTRACT: For data represented by networks, the community structure of the underlying graph is of great interest. A classical clustering problem is to uncover the overall ``best'' partition of nodes in communities. Here, a more elaborate description is proposed in which community structures are identified at different scales. To this end, we take advantage of the local and scale-dependent information encoded in graph wavelets. After new developments for the practical use of graph wavelets, studying proper scale boundaries and parameters and introducing scaling functions, we propose a method to mine for communities in complex networks in a scale-dependent manner. It relies on classifying nodes according to their wavelets or scaling functions, using a scale-dependent modularity function. An example on a graph benchmark having hierarchical communities shows that we estimate successfully its multiscale structure.
1302.6557
Richard M Jiang
Richard M Jiang
Geodesic-based Salient Object Detection
The manuscript was submitted to a conference. Due to anonymous review policy by the conference, I'd like to withdraw it temporarily
This is a revised version of our submissions to CVPR 2012, SIGRAPH Asia 2012, and CVPR 2013;
null
null
cs.CV cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Saliency detection has been an intuitive way to provide useful cues for object detection and segmentation, as desired for many vision and graphics applications. In this paper, we provided a robust method for salient object detection and segmentation. Other than using various pixel-level contrast definitions, we exploited global image structures and proposed a new geodesic method dedicated for salient object detection. In the proposed approach, a new geodesic scheme, namely geodesic tunneling is proposed to tackle with textures and local chaotic structures. With our new geodesic approach, a geodesic saliency map is estimated in correspondence to spatial structures in an image. Experimental evaluation on a salient object benchmark dataset validated that our algorithm consistently outperformed a number of the state-of-art saliency methods, yielding higher precision and better recall rates. With the robust saliency estimation, we also present an unsupervised hierarchical salient object cut scheme simply using adaptive saliency thresholding, which attained the highest score in our F-measure test. We also applied our geodesic cut scheme to a number of image editing tasks as demonstrated in additional experiments.
[ { "version": "v1", "created": "Tue, 26 Feb 2013 19:52:02 GMT" }, { "version": "v2", "created": "Fri, 23 Aug 2013 18:41:55 GMT" } ]
2013-11-11T00:00:00
[ [ "Jiang", "Richard M", "" ] ]
TITLE: Geodesic-based Salient Object Detection ABSTRACT: Saliency detection has been an intuitive way to provide useful cues for object detection and segmentation, as desired for many vision and graphics applications. In this paper, we provided a robust method for salient object detection and segmentation. Other than using various pixel-level contrast definitions, we exploited global image structures and proposed a new geodesic method dedicated for salient object detection. In the proposed approach, a new geodesic scheme, namely geodesic tunneling is proposed to tackle with textures and local chaotic structures. With our new geodesic approach, a geodesic saliency map is estimated in correspondence to spatial structures in an image. Experimental evaluation on a salient object benchmark dataset validated that our algorithm consistently outperformed a number of the state-of-art saliency methods, yielding higher precision and better recall rates. With the robust saliency estimation, we also present an unsupervised hierarchical salient object cut scheme simply using adaptive saliency thresholding, which attained the highest score in our F-measure test. We also applied our geodesic cut scheme to a number of image editing tasks as demonstrated in additional experiments.
1302.3101
Matus Medo
An Zeng, Stanislao Gualdi, Matus Medo, Yi-Cheng Zhang
Trend prediction in temporal bipartite networks: the case of Movielens, Netflix, and Digg
9 pages, 1 table, 5 figures
Advances in Complex Systems 16, 1350024, 2013
10.1142/S0219525913500240
null
cs.SI physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Online systems where users purchase or collect items of some kind can be effectively represented by temporal bipartite networks where both nodes and links are added with time. We use this representation to predict which items might become popular in the near future. Various prediction methods are evaluated on three distinct datasets originating from popular online services (Movielens, Netflix, and Digg). We show that the prediction performance can be further enhanced if the user social network is known and centrality of individual users in this network is used to weight their actions.
[ { "version": "v1", "created": "Wed, 13 Feb 2013 14:09:33 GMT" } ]
2013-11-08T00:00:00
[ [ "Zeng", "An", "" ], [ "Gualdi", "Stanislao", "" ], [ "Medo", "Matus", "" ], [ "Zhang", "Yi-Cheng", "" ] ]
TITLE: Trend prediction in temporal bipartite networks: the case of Movielens, Netflix, and Digg ABSTRACT: Online systems where users purchase or collect items of some kind can be effectively represented by temporal bipartite networks where both nodes and links are added with time. We use this representation to predict which items might become popular in the near future. Various prediction methods are evaluated on three distinct datasets originating from popular online services (Movielens, Netflix, and Digg). We show that the prediction performance can be further enhanced if the user social network is known and centrality of individual users in this network is used to weight their actions.
1209.3129
Anteo Smerieri
Anteo Smerieri, Fran\c{c}ois Duport, Yvan Paquot, Benjamin Schrauwen, Marc Haelterman, Serge Massar
Analog readout for optical reservoir computers
to appear in NIPS 2012
Advances in Neural Information Processing Systems (NIPS) 25, 953-961 (2012)
null
null
cs.ET cs.LG cs.NE physics.optics
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Reservoir computing is a new, powerful and flexible machine learning technique that is easily implemented in hardware. Recently, by using a time-multiplexed architecture, hardware reservoir computers have reached performance comparable to digital implementations. Operating speeds allowing for real time information operation have been reached using optoelectronic systems. At present the main performance bottleneck is the readout layer which uses slow, digital postprocessing. We have designed an analog readout suitable for time-multiplexed optoelectronic reservoir computers, capable of working in real time. The readout has been built and tested experimentally on a standard benchmark task. Its performance is better than non-reservoir methods, with ample room for further improvement. The present work thereby overcomes one of the major limitations for the future development of hardware reservoir computers.
[ { "version": "v1", "created": "Fri, 14 Sep 2012 08:56:19 GMT" } ]
2013-11-07T00:00:00
[ [ "Smerieri", "Anteo", "" ], [ "Duport", "François", "" ], [ "Paquot", "Yvan", "" ], [ "Schrauwen", "Benjamin", "" ], [ "Haelterman", "Marc", "" ], [ "Massar", "Serge", "" ] ]
TITLE: Analog readout for optical reservoir computers ABSTRACT: Reservoir computing is a new, powerful and flexible machine learning technique that is easily implemented in hardware. Recently, by using a time-multiplexed architecture, hardware reservoir computers have reached performance comparable to digital implementations. Operating speeds allowing for real time information operation have been reached using optoelectronic systems. At present the main performance bottleneck is the readout layer which uses slow, digital postprocessing. We have designed an analog readout suitable for time-multiplexed optoelectronic reservoir computers, capable of working in real time. The readout has been built and tested experimentally on a standard benchmark task. Its performance is better than non-reservoir methods, with ample room for further improvement. The present work thereby overcomes one of the major limitations for the future development of hardware reservoir computers.
1311.1249
Simon Gog
Simon Gog and Timo Beller and Alistair Moffat and Matthias Petri
From Theory to Practice: Plug and Play with Succinct Data Structures
10 pages, 4 figures, 3 tables
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Engineering efficient implementations of compact and succinct structures is a time-consuming and challenging task, since there is no standard library of easy-to- use, highly optimized, and composable components. One consequence is that measuring the practical impact of new theoretical proposals is a difficult task, since older base- line implementations may not rely on the same basic components, and reimplementing from scratch can be very time-consuming. In this paper we present a framework for experimentation with succinct data structures, providing a large set of configurable components, together with tests, benchmarks, and tools to analyze resource requirements. We demonstrate the functionality of the framework by recomposing succinct solutions for document retrieval.
[ { "version": "v1", "created": "Tue, 5 Nov 2013 23:37:14 GMT" } ]
2013-11-07T00:00:00
[ [ "Gog", "Simon", "" ], [ "Beller", "Timo", "" ], [ "Moffat", "Alistair", "" ], [ "Petri", "Matthias", "" ] ]
TITLE: From Theory to Practice: Plug and Play with Succinct Data Structures ABSTRACT: Engineering efficient implementations of compact and succinct structures is a time-consuming and challenging task, since there is no standard library of easy-to- use, highly optimized, and composable components. One consequence is that measuring the practical impact of new theoretical proposals is a difficult task, since older base- line implementations may not rely on the same basic components, and reimplementing from scratch can be very time-consuming. In this paper we present a framework for experimentation with succinct data structures, providing a large set of configurable components, together with tests, benchmarks, and tools to analyze resource requirements. We demonstrate the functionality of the framework by recomposing succinct solutions for document retrieval.
1311.1338
Mario K\"oppen
Mario Koeppen and Kei Ohnishi
Significance Relations for the Benchmarking of Meta-Heuristic Algorithms
6 pages, 2 figures, 1 table
null
null
null
cs.DS cs.PF
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The experimental analysis of meta-heuristic algorithm performance is usually based on comparing average performance metric values over a set of algorithm instances. When algorithms getting tight in performance gains, the additional consideration of significance of a metric improvement comes into play. However, from this moment the comparison changes from an absolute to a relative mode. Here the implications of this paradigm shift are investigated. Significance relations are formally established. Based on this, a trade-off between increasing cycle-freeness of the relation and small maximum sets can be identified, allowing for the selection of a proper significance level and resulting ranking of a set of algorithms. The procedure is exemplified on the CEC'05 benchmark of real parameter single objective optimization problems. The significance relation here is based on awarding ranking points for relative performance gains, similar to the Borda count voting method or the Wilcoxon signed rank test. In the particular CEC'05 case, five ranks for algorithm performance can be clearly identified.
[ { "version": "v1", "created": "Wed, 6 Nov 2013 10:20:56 GMT" } ]
2013-11-07T00:00:00
[ [ "Koeppen", "Mario", "" ], [ "Ohnishi", "Kei", "" ] ]
TITLE: Significance Relations for the Benchmarking of Meta-Heuristic Algorithms ABSTRACT: The experimental analysis of meta-heuristic algorithm performance is usually based on comparing average performance metric values over a set of algorithm instances. When algorithms getting tight in performance gains, the additional consideration of significance of a metric improvement comes into play. However, from this moment the comparison changes from an absolute to a relative mode. Here the implications of this paradigm shift are investigated. Significance relations are formally established. Based on this, a trade-off between increasing cycle-freeness of the relation and small maximum sets can be identified, allowing for the selection of a proper significance level and resulting ranking of a set of algorithms. The procedure is exemplified on the CEC'05 benchmark of real parameter single objective optimization problems. The significance relation here is based on awarding ranking points for relative performance gains, similar to the Borda count voting method or the Wilcoxon signed rank test. In the particular CEC'05 case, five ranks for algorithm performance can be clearly identified.
1305.0258
Nathan Monnig
Nathan D. Monnig, Bengt Fornberg, and Francois G. Meyer
Inverting Nonlinear Dimensionality Reduction with Scale-Free Radial Basis Function Interpolation
Accepted for publication in Applied and Computational Harmonic Analysis
null
null
null
math.NA cs.NA physics.data-an stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Nonlinear dimensionality reduction embeddings computed from datasets do not provide a mechanism to compute the inverse map. In this paper, we address the problem of computing a stable inverse map to such a general bi-Lipschitz map. Our approach relies on radial basis functions (RBFs) to interpolate the inverse map everywhere on the low-dimensional image of the forward map. We demonstrate that the scale-free cubic RBF kernel performs better than the Gaussian kernel: it does not suffer from ill-conditioning, and does not require the choice of a scale. The proposed construction is shown to be similar to the Nystr\"om extension of the eigenvectors of the symmetric normalized graph Laplacian matrix. Based on this observation, we provide a new interpretation of the Nystr\"om extension with suggestions for improvement.
[ { "version": "v1", "created": "Wed, 1 May 2013 19:55:06 GMT" }, { "version": "v2", "created": "Tue, 5 Nov 2013 15:49:52 GMT" } ]
2013-11-06T00:00:00
[ [ "Monnig", "Nathan D.", "" ], [ "Fornberg", "Bengt", "" ], [ "Meyer", "Francois G.", "" ] ]
TITLE: Inverting Nonlinear Dimensionality Reduction with Scale-Free Radial Basis Function Interpolation ABSTRACT: Nonlinear dimensionality reduction embeddings computed from datasets do not provide a mechanism to compute the inverse map. In this paper, we address the problem of computing a stable inverse map to such a general bi-Lipschitz map. Our approach relies on radial basis functions (RBFs) to interpolate the inverse map everywhere on the low-dimensional image of the forward map. We demonstrate that the scale-free cubic RBF kernel performs better than the Gaussian kernel: it does not suffer from ill-conditioning, and does not require the choice of a scale. The proposed construction is shown to be similar to the Nystr\"om extension of the eigenvectors of the symmetric normalized graph Laplacian matrix. Based on this observation, we provide a new interpretation of the Nystr\"om extension with suggestions for improvement.
1306.5554
Brian McWilliams
Brian McWilliams, David Balduzzi and Joachim M. Buhmann
Correlated random features for fast semi-supervised learning
15 pages, 3 figures, 6 tables
null
null
null
stat.ML cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents Correlated Nystrom Views (XNV), a fast semi-supervised algorithm for regression and classification. The algorithm draws on two main ideas. First, it generates two views consisting of computationally inexpensive random features. Second, XNV applies multiview regression using Canonical Correlation Analysis (CCA) on unlabeled data to bias the regression towards useful features. It has been shown that, if the views contains accurate estimators, CCA regression can substantially reduce variance with a minimal increase in bias. Random views are justified by recent theoretical and empirical work showing that regression with random features closely approximates kernel regression, implying that random views can be expected to contain accurate estimators. We show that XNV consistently outperforms a state-of-the-art algorithm for semi-supervised learning: substantially improving predictive performance and reducing the variability of performance on a wide variety of real-world datasets, whilst also reducing runtime by orders of magnitude.
[ { "version": "v1", "created": "Mon, 24 Jun 2013 09:49:08 GMT" }, { "version": "v2", "created": "Tue, 5 Nov 2013 11:28:33 GMT" } ]
2013-11-06T00:00:00
[ [ "McWilliams", "Brian", "" ], [ "Balduzzi", "David", "" ], [ "Buhmann", "Joachim M.", "" ] ]
TITLE: Correlated random features for fast semi-supervised learning ABSTRACT: This paper presents Correlated Nystrom Views (XNV), a fast semi-supervised algorithm for regression and classification. The algorithm draws on two main ideas. First, it generates two views consisting of computationally inexpensive random features. Second, XNV applies multiview regression using Canonical Correlation Analysis (CCA) on unlabeled data to bias the regression towards useful features. It has been shown that, if the views contains accurate estimators, CCA regression can substantially reduce variance with a minimal increase in bias. Random views are justified by recent theoretical and empirical work showing that regression with random features closely approximates kernel regression, implying that random views can be expected to contain accurate estimators. We show that XNV consistently outperforms a state-of-the-art algorithm for semi-supervised learning: substantially improving predictive performance and reducing the variability of performance on a wide variety of real-world datasets, whilst also reducing runtime by orders of magnitude.
1311.0914
Cho-Jui Hsieh Cho-Jui Hsieh
Cho-Jui Hsieh and Si Si and Inderjit S. Dhillon
A Divide-and-Conquer Solver for Kernel Support Vector Machines
null
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The kernel support vector machine (SVM) is one of the most widely used classification methods; however, the amount of computation required becomes the bottleneck when facing millions of samples. In this paper, we propose and analyze a novel divide-and-conquer solver for kernel SVMs (DC-SVM). In the division step, we partition the kernel SVM problem into smaller subproblems by clustering the data, so that each subproblem can be solved independently and efficiently. We show theoretically that the support vectors identified by the subproblem solution are likely to be support vectors of the entire kernel SVM problem, provided that the problem is partitioned appropriately by kernel clustering. In the conquer step, the local solutions from the subproblems are used to initialize a global coordinate descent solver, which converges quickly as suggested by our analysis. By extending this idea, we develop a multilevel Divide-and-Conquer SVM algorithm with adaptive clustering and early prediction strategy, which outperforms state-of-the-art methods in terms of training speed, testing accuracy, and memory usage. As an example, on the covtype dataset with half-a-million samples, DC-SVM is 7 times faster than LIBSVM in obtaining the exact SVM solution (to within $10^{-6}$ relative error) which achieves 96.15% prediction accuracy. Moreover, with our proposed early prediction strategy, DC-SVM achieves about 96% accuracy in only 12 minutes, which is more than 100 times faster than LIBSVM.
[ { "version": "v1", "created": "Mon, 4 Nov 2013 22:06:40 GMT" } ]
2013-11-06T00:00:00
[ [ "Hsieh", "Cho-Jui", "" ], [ "Si", "Si", "" ], [ "Dhillon", "Inderjit S.", "" ] ]
TITLE: A Divide-and-Conquer Solver for Kernel Support Vector Machines ABSTRACT: The kernel support vector machine (SVM) is one of the most widely used classification methods; however, the amount of computation required becomes the bottleneck when facing millions of samples. In this paper, we propose and analyze a novel divide-and-conquer solver for kernel SVMs (DC-SVM). In the division step, we partition the kernel SVM problem into smaller subproblems by clustering the data, so that each subproblem can be solved independently and efficiently. We show theoretically that the support vectors identified by the subproblem solution are likely to be support vectors of the entire kernel SVM problem, provided that the problem is partitioned appropriately by kernel clustering. In the conquer step, the local solutions from the subproblems are used to initialize a global coordinate descent solver, which converges quickly as suggested by our analysis. By extending this idea, we develop a multilevel Divide-and-Conquer SVM algorithm with adaptive clustering and early prediction strategy, which outperforms state-of-the-art methods in terms of training speed, testing accuracy, and memory usage. As an example, on the covtype dataset with half-a-million samples, DC-SVM is 7 times faster than LIBSVM in obtaining the exact SVM solution (to within $10^{-6}$ relative error) which achieves 96.15% prediction accuracy. Moreover, with our proposed early prediction strategy, DC-SVM achieves about 96% accuracy in only 12 minutes, which is more than 100 times faster than LIBSVM.
1311.1169
D\'aniel Kondor Mr
D\'aniel Kondor, Istv\'an Csabai, L\'aszl\'o Dobos, J\'anos Sz\"ule, Norbert Barankai, Tam\'as Hanyecz, Tam\'as Seb\H{o}k, Zs\'ofia Kallus, G\'abor Vattay
Using Robust PCA to estimate regional characteristics of language use from geo-tagged Twitter messages
null
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Principal component analysis (PCA) and related techniques have been successfully employed in natural language processing. Text mining applications in the age of the online social media (OSM) face new challenges due to properties specific to these use cases (e.g. spelling issues specific to texts posted by users, the presence of spammers and bots, service announcements, etc.). In this paper, we employ a Robust PCA technique to separate typical outliers and highly localized topics from the low-dimensional structure present in language use in online social networks. Our focus is on identifying geospatial features among the messages posted by the users of the Twitter microblogging service. Using a dataset which consists of over 200 million geolocated tweets collected over the course of a year, we investigate whether the information present in word usage frequencies can be used to identify regional features of language use and topics of interest. Using the PCA pursuit method, we are able to identify important low-dimensional features, which constitute smoothly varying functions of the geographic location.
[ { "version": "v1", "created": "Tue, 5 Nov 2013 19:31:33 GMT" } ]
2013-11-06T00:00:00
[ [ "Kondor", "Dániel", "" ], [ "Csabai", "István", "" ], [ "Dobos", "László", "" ], [ "Szüle", "János", "" ], [ "Barankai", "Norbert", "" ], [ "Hanyecz", "Tamás", "" ], [ "Sebők", "Tamás", "" ], [ "Kallus", "Zsófia", "" ], [ "Vattay", "Gábor", "" ] ]
TITLE: Using Robust PCA to estimate regional characteristics of language use from geo-tagged Twitter messages ABSTRACT: Principal component analysis (PCA) and related techniques have been successfully employed in natural language processing. Text mining applications in the age of the online social media (OSM) face new challenges due to properties specific to these use cases (e.g. spelling issues specific to texts posted by users, the presence of spammers and bots, service announcements, etc.). In this paper, we employ a Robust PCA technique to separate typical outliers and highly localized topics from the low-dimensional structure present in language use in online social networks. Our focus is on identifying geospatial features among the messages posted by the users of the Twitter microblogging service. Using a dataset which consists of over 200 million geolocated tweets collected over the course of a year, we investigate whether the information present in word usage frequencies can be used to identify regional features of language use and topics of interest. Using the PCA pursuit method, we are able to identify important low-dimensional features, which constitute smoothly varying functions of the geographic location.
1311.1194
Saif Mohammad Dr.
Saif M. Mohammad, Svetlana Kiritchenko, and Joel Martin
Identifying Purpose Behind Electoral Tweets
null
In Proceedings of the KDD Workshop on Issues of Sentiment Discovery and Opinion Mining (WISDOM-2013), August 2013, Chicago, USA
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Tweets pertaining to a single event, such as a national election, can number in the hundreds of millions. Automatically analyzing them is beneficial in many downstream natural language applications such as question answering and summarization. In this paper, we propose a new task: identifying the purpose behind electoral tweets--why do people post election-oriented tweets? We show that identifying purpose is correlated with the related phenomenon of sentiment and emotion detection, but yet significantly different. Detecting purpose has a number of applications including detecting the mood of the electorate, estimating the popularity of policies, identifying key issues of contention, and predicting the course of events. We create a large dataset of electoral tweets and annotate a few thousand tweets for purpose. We develop a system that automatically classifies electoral tweets as per their purpose, obtaining an accuracy of 43.56% on an 11-class task and an accuracy of 73.91% on a 3-class task (both accuracies well above the most-frequent-class baseline). Finally, we show that resources developed for emotion detection are also helpful for detecting purpose.
[ { "version": "v1", "created": "Tue, 5 Nov 2013 20:55:23 GMT" } ]
2013-11-06T00:00:00
[ [ "Mohammad", "Saif M.", "" ], [ "Kiritchenko", "Svetlana", "" ], [ "Martin", "Joel", "" ] ]
TITLE: Identifying Purpose Behind Electoral Tweets ABSTRACT: Tweets pertaining to a single event, such as a national election, can number in the hundreds of millions. Automatically analyzing them is beneficial in many downstream natural language applications such as question answering and summarization. In this paper, we propose a new task: identifying the purpose behind electoral tweets--why do people post election-oriented tweets? We show that identifying purpose is correlated with the related phenomenon of sentiment and emotion detection, but yet significantly different. Detecting purpose has a number of applications including detecting the mood of the electorate, estimating the popularity of policies, identifying key issues of contention, and predicting the course of events. We create a large dataset of electoral tweets and annotate a few thousand tweets for purpose. We develop a system that automatically classifies electoral tweets as per their purpose, obtaining an accuracy of 43.56% on an 11-class task and an accuracy of 73.91% on a 3-class task (both accuracies well above the most-frequent-class baseline). Finally, we show that resources developed for emotion detection are also helpful for detecting purpose.
1210.3384
Shankar Vembu
Wei Jiao, Shankar Vembu, Amit G. Deshwar, Lincoln Stein, Quaid Morris
Inferring clonal evolution of tumors from single nucleotide somatic mutations
null
null
null
null
cs.LG q-bio.PE q-bio.QM stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
High-throughput sequencing allows the detection and quantification of frequencies of somatic single nucleotide variants (SNV) in heterogeneous tumor cell populations. In some cases, the evolutionary history and population frequency of the subclonal lineages of tumor cells present in the sample can be reconstructed from these SNV frequency measurements. However, automated methods to do this reconstruction are not available and the conditions under which reconstruction is possible have not been described. We describe the conditions under which the evolutionary history can be uniquely reconstructed from SNV frequencies from single or multiple samples from the tumor population and we introduce a new statistical model, PhyloSub, that infers the phylogeny and genotype of the major subclonal lineages represented in the population of cancer cells. It uses a Bayesian nonparametric prior over trees that groups SNVs into major subclonal lineages and automatically estimates the number of lineages and their ancestry. We sample from the joint posterior distribution over trees to identify evolutionary histories and cell population frequencies that have the highest probability of generating the observed SNV frequency data. When multiple phylogenies are consistent with a given set of SNV frequencies, PhyloSub represents the uncertainty in the tumor phylogeny using a partial order plot. Experiments on a simulated dataset and two real datasets comprising tumor samples from acute myeloid leukemia and chronic lymphocytic leukemia patients demonstrate that PhyloSub can infer both linear (or chain) and branching lineages and its inferences are in good agreement with ground truth, where it is available.
[ { "version": "v1", "created": "Thu, 11 Oct 2012 22:20:33 GMT" }, { "version": "v2", "created": "Mon, 15 Oct 2012 18:41:13 GMT" }, { "version": "v3", "created": "Sun, 16 Jun 2013 18:35:00 GMT" }, { "version": "v4", "created": "Sat, 2 Nov 2013 21:38:34 GMT" } ]
2013-11-05T00:00:00
[ [ "Jiao", "Wei", "" ], [ "Vembu", "Shankar", "" ], [ "Deshwar", "Amit G.", "" ], [ "Stein", "Lincoln", "" ], [ "Morris", "Quaid", "" ] ]
TITLE: Inferring clonal evolution of tumors from single nucleotide somatic mutations ABSTRACT: High-throughput sequencing allows the detection and quantification of frequencies of somatic single nucleotide variants (SNV) in heterogeneous tumor cell populations. In some cases, the evolutionary history and population frequency of the subclonal lineages of tumor cells present in the sample can be reconstructed from these SNV frequency measurements. However, automated methods to do this reconstruction are not available and the conditions under which reconstruction is possible have not been described. We describe the conditions under which the evolutionary history can be uniquely reconstructed from SNV frequencies from single or multiple samples from the tumor population and we introduce a new statistical model, PhyloSub, that infers the phylogeny and genotype of the major subclonal lineages represented in the population of cancer cells. It uses a Bayesian nonparametric prior over trees that groups SNVs into major subclonal lineages and automatically estimates the number of lineages and their ancestry. We sample from the joint posterior distribution over trees to identify evolutionary histories and cell population frequencies that have the highest probability of generating the observed SNV frequency data. When multiple phylogenies are consistent with a given set of SNV frequencies, PhyloSub represents the uncertainty in the tumor phylogeny using a partial order plot. Experiments on a simulated dataset and two real datasets comprising tumor samples from acute myeloid leukemia and chronic lymphocytic leukemia patients demonstrate that PhyloSub can infer both linear (or chain) and branching lineages and its inferences are in good agreement with ground truth, where it is available.
1305.4583
Xin Zhao
Xin Zhao
Parallel Coordinates Guided High Dimensional Transfer Function Design
6 pages, 5 figures. This paper has been withdrawn by the author due to publication
null
null
null
cs.GR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
High-dimensional transfer function design is widely used to provide appropriate data classification for direct volume rendering of various datasets. However, its design is a complicated task. Parallel coordinate plot (PCP), as a powerful visualization tool, can efficiently display high-dimensional geometry and accurately analyze multivariate data. In this paper, we propose to combine parallel coordinates with dimensional reduction methods to guide high-dimensional transfer function design. Our pipeline has two major advantages: (1) combine and display extracted high-dimensional features in parameter space; and (2) select appropriate high-dimensional parameters, with the help of dimensional reduction methods, to obtain sophisticated data classification as transfer function for volume rendering. In order to efficiently design high-dimensional transfer functions, the combination of both parallel coordinate components and dimension reduction results is necessary to generate final visualization results. We demonstrate the capability of our method for direct volume rendering using various CT and MRI datasets.
[ { "version": "v1", "created": "Mon, 20 May 2013 17:27:29 GMT" }, { "version": "v2", "created": "Sun, 3 Nov 2013 21:39:13 GMT" } ]
2013-11-05T00:00:00
[ [ "Zhao", "Xin", "" ] ]
TITLE: Parallel Coordinates Guided High Dimensional Transfer Function Design ABSTRACT: High-dimensional transfer function design is widely used to provide appropriate data classification for direct volume rendering of various datasets. However, its design is a complicated task. Parallel coordinate plot (PCP), as a powerful visualization tool, can efficiently display high-dimensional geometry and accurately analyze multivariate data. In this paper, we propose to combine parallel coordinates with dimensional reduction methods to guide high-dimensional transfer function design. Our pipeline has two major advantages: (1) combine and display extracted high-dimensional features in parameter space; and (2) select appropriate high-dimensional parameters, with the help of dimensional reduction methods, to obtain sophisticated data classification as transfer function for volume rendering. In order to efficiently design high-dimensional transfer functions, the combination of both parallel coordinate components and dimension reduction results is necessary to generate final visualization results. We demonstrate the capability of our method for direct volume rendering using various CT and MRI datasets.
1305.6143
Vivek Narayanan
Vivek Narayanan, Ishan Arora, Arjun Bhatia
Fast and accurate sentiment classification using an enhanced Naive Bayes model
8 pages, 2 figures
Intelligent Data Engineering and Automated Learning IDEAL 2013 Lecture Notes in Computer Science Volume 8206, 2013, pp 194-201
10.1007/978-3-642-41278-3_24
null
cs.CL cs.IR cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We have explored different methods of improving the accuracy of a Naive Bayes classifier for sentiment analysis. We observed that a combination of methods like negation handling, word n-grams and feature selection by mutual information results in a significant improvement in accuracy. This implies that a highly accurate and fast sentiment classifier can be built using a simple Naive Bayes model that has linear training and testing time complexities. We achieved an accuracy of 88.80% on the popular IMDB movie reviews dataset.
[ { "version": "v1", "created": "Mon, 27 May 2013 08:37:26 GMT" }, { "version": "v2", "created": "Mon, 16 Sep 2013 05:36:29 GMT" } ]
2013-11-05T00:00:00
[ [ "Narayanan", "Vivek", "" ], [ "Arora", "Ishan", "" ], [ "Bhatia", "Arjun", "" ] ]
TITLE: Fast and accurate sentiment classification using an enhanced Naive Bayes model ABSTRACT: We have explored different methods of improving the accuracy of a Naive Bayes classifier for sentiment analysis. We observed that a combination of methods like negation handling, word n-grams and feature selection by mutual information results in a significant improvement in accuracy. This implies that a highly accurate and fast sentiment classifier can be built using a simple Naive Bayes model that has linear training and testing time complexities. We achieved an accuracy of 88.80% on the popular IMDB movie reviews dataset.
1306.0811
Giovanni Zappella
Nicol\`o Cesa-Bianchi, Claudio Gentile and Giovanni Zappella
A Gang of Bandits
NIPS 2013
null
null
null
cs.LG cs.SI stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Multi-armed bandit problems are receiving a great deal of attention because they adequately formalize the exploration-exploitation trade-offs arising in several industrially relevant applications, such as online advertisement and, more generally, recommendation systems. In many cases, however, these applications have a strong social component, whose integration in the bandit algorithm could lead to a dramatic performance increase. For instance, we may want to serve content to a group of users by taking advantage of an underlying network of social relationships among them. In this paper, we introduce novel algorithmic approaches to the solution of such networked bandit problems. More specifically, we design and analyze a global strategy which allocates a bandit algorithm to each network node (user) and allows it to "share" signals (contexts and payoffs) with the neghboring nodes. We then derive two more scalable variants of this strategy based on different ways of clustering the graph nodes. We experimentally compare the algorithm and its variants to state-of-the-art methods for contextual bandits that do not use the relational information. Our experiments, carried out on synthetic and real-world datasets, show a marked increase in prediction performance obtained by exploiting the network structure.
[ { "version": "v1", "created": "Tue, 4 Jun 2013 14:24:31 GMT" }, { "version": "v2", "created": "Fri, 25 Oct 2013 16:32:25 GMT" }, { "version": "v3", "created": "Mon, 4 Nov 2013 10:07:42 GMT" } ]
2013-11-05T00:00:00
[ [ "Cesa-Bianchi", "Nicolò", "" ], [ "Gentile", "Claudio", "" ], [ "Zappella", "Giovanni", "" ] ]
TITLE: A Gang of Bandits ABSTRACT: Multi-armed bandit problems are receiving a great deal of attention because they adequately formalize the exploration-exploitation trade-offs arising in several industrially relevant applications, such as online advertisement and, more generally, recommendation systems. In many cases, however, these applications have a strong social component, whose integration in the bandit algorithm could lead to a dramatic performance increase. For instance, we may want to serve content to a group of users by taking advantage of an underlying network of social relationships among them. In this paper, we introduce novel algorithmic approaches to the solution of such networked bandit problems. More specifically, we design and analyze a global strategy which allocates a bandit algorithm to each network node (user) and allows it to "share" signals (contexts and payoffs) with the neghboring nodes. We then derive two more scalable variants of this strategy based on different ways of clustering the graph nodes. We experimentally compare the algorithm and its variants to state-of-the-art methods for contextual bandits that do not use the relational information. Our experiments, carried out on synthetic and real-world datasets, show a marked increase in prediction performance obtained by exploiting the network structure.
1306.1959
Xin Zhao
Xin Zhao and Bo Li
Pattern Recognition and Revealing using Parallel Coordinates Plot
8 pages and 6 figures. This paper has been withdrawn by the author due to publication
null
null
null
cs.GR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Parallel coordinates plot (PCP) is an excellent tool for multivariate visualization and analysis, but it may fail to reveal inherent structures for datasets with a large number of items. In this paper, we propose a suite of novel clustering, dimension ordering and visualization techniques based on PCP, to reveal and highlight hidden structures. First, we propose a continuous spline based polycurves design to extract and classify different cluster aspects of the data. Then, we provide an efficient and optimal correlation based sorting technique to reorder coordinates, as a helpful visualization tool for data analysis. Various results generated by our framework visually represent much structure, trend and correlation information to guide the user, and improve the efficacy of analysis, especially for complex and noisy datasets.
[ { "version": "v1", "created": "Sat, 8 Jun 2013 21:18:43 GMT" }, { "version": "v2", "created": "Sun, 3 Nov 2013 21:38:56 GMT" } ]
2013-11-05T00:00:00
[ [ "Zhao", "Xin", "" ], [ "Li", "Bo", "" ] ]
TITLE: Pattern Recognition and Revealing using Parallel Coordinates Plot ABSTRACT: Parallel coordinates plot (PCP) is an excellent tool for multivariate visualization and analysis, but it may fail to reveal inherent structures for datasets with a large number of items. In this paper, we propose a suite of novel clustering, dimension ordering and visualization techniques based on PCP, to reveal and highlight hidden structures. First, we propose a continuous spline based polycurves design to extract and classify different cluster aspects of the data. Then, we provide an efficient and optimal correlation based sorting technique to reorder coordinates, as a helpful visualization tool for data analysis. Various results generated by our framework visually represent much structure, trend and correlation information to guide the user, and improve the efficacy of analysis, especially for complex and noisy datasets.
1307.0147
Xin Zhao
Bo Li, Xin Zhao and Hong Qin
4-Dimensional Geometry Lens: A Novel Volumetric Magnification Approach
12 pages. In CGF 2013. This paper has been withdrawn by the author due to publication
null
null
null
cs.GR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a novel methodology that utilizes 4-Dimensional (4D) space deformation to simulate a magnification lens on versatile volume datasets and textured solid models. Compared with other magnification methods (e.g., geometric optics, mesh editing), 4D differential geometry theory and its practices are much more flexible and powerful for preserving shape features (i.e., minimizing angle distortion), and easier to adapt to versatile solid models. The primary advantage of 4D space lies at the following fact: we can now easily magnify the volume of regions of interest (ROIs) from the additional dimension, while keeping the rest region unchanged. To achieve this primary goal, we first embed a 3D volumetric input into 4D space and magnify ROIs in the 4th dimension. Then we flatten the 4D shape back into 3D space to accommodate other typical applications in the real 3D world. In order to enforce distortion minimization, in both steps we devise the high dimensional geometry techniques based on rigorous 4D geometry theory for 3D/4D mapping back and forth to amend the distortion. Our system can preserve not only focus region, but also context region and global shape. We demonstrate the effectiveness, robustness, and efficacy of our framework with a variety of models ranging from tetrahedral meshes to volume datasets.
[ { "version": "v1", "created": "Sat, 29 Jun 2013 20:20:37 GMT" }, { "version": "v2", "created": "Sun, 3 Nov 2013 21:38:37 GMT" } ]
2013-11-05T00:00:00
[ [ "Li", "Bo", "" ], [ "Zhao", "Xin", "" ], [ "Qin", "Hong", "" ] ]
TITLE: 4-Dimensional Geometry Lens: A Novel Volumetric Magnification Approach ABSTRACT: We present a novel methodology that utilizes 4-Dimensional (4D) space deformation to simulate a magnification lens on versatile volume datasets and textured solid models. Compared with other magnification methods (e.g., geometric optics, mesh editing), 4D differential geometry theory and its practices are much more flexible and powerful for preserving shape features (i.e., minimizing angle distortion), and easier to adapt to versatile solid models. The primary advantage of 4D space lies at the following fact: we can now easily magnify the volume of regions of interest (ROIs) from the additional dimension, while keeping the rest region unchanged. To achieve this primary goal, we first embed a 3D volumetric input into 4D space and magnify ROIs in the 4th dimension. Then we flatten the 4D shape back into 3D space to accommodate other typical applications in the real 3D world. In order to enforce distortion minimization, in both steps we devise the high dimensional geometry techniques based on rigorous 4D geometry theory for 3D/4D mapping back and forth to amend the distortion. Our system can preserve not only focus region, but also context region and global shape. We demonstrate the effectiveness, robustness, and efficacy of our framework with a variety of models ranging from tetrahedral meshes to volume datasets.
1307.1739
Xin Zhao
Xin Zhao and Arie Kaufman
Anatomical Feature-guided Volumeric Registration of Multimodal Prostate MRI
This paper has been withdrawn by the author due to publication
null
null
null
cs.CV cs.GR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Radiological imaging of prostate is becoming more popular among researchers and clinicians in searching for diseases, primarily cancer. Scans might be acquired at different times, with patient movement between scans, or with different equipment, resulting in multiple datasets that need to be registered. For this issue, we introduce a registration method using anatomical feature-guided mutual information. Prostate scans of the same patient taken in three different orientations are first aligned for the accurate detection of anatomical features in 3D. Then, our pipeline allows for multiple modalities registration through the use of anatomical features, such as the interior urethra of prostate and gland utricle, in a bijective way. The novelty of this approach is the application of anatomical features as the pre-specified corresponding landmarks for prostate registration. We evaluate the registration results through both artificial and clinical datasets. Registration accuracy is evaluated by performing statistical analysis of local intensity differences or spatial differences of anatomical landmarks between various MR datasets. Evaluation results demonstrate that our method statistics-significantly improves the quality of registration. Although this strategy is tested for MRI-guided brachytherapy, the preliminary results from these experiments suggest that it can be also applied to other settings such as transrectal ultrasound-guided or CT-guided therapy, where the integration of preoperative MRI may have a significant impact upon treatment planning and guidance.
[ { "version": "v1", "created": "Sat, 6 Jul 2013 00:30:40 GMT" }, { "version": "v2", "created": "Sun, 3 Nov 2013 21:38:08 GMT" } ]
2013-11-05T00:00:00
[ [ "Zhao", "Xin", "" ], [ "Kaufman", "Arie", "" ] ]
TITLE: Anatomical Feature-guided Volumeric Registration of Multimodal Prostate MRI ABSTRACT: Radiological imaging of prostate is becoming more popular among researchers and clinicians in searching for diseases, primarily cancer. Scans might be acquired at different times, with patient movement between scans, or with different equipment, resulting in multiple datasets that need to be registered. For this issue, we introduce a registration method using anatomical feature-guided mutual information. Prostate scans of the same patient taken in three different orientations are first aligned for the accurate detection of anatomical features in 3D. Then, our pipeline allows for multiple modalities registration through the use of anatomical features, such as the interior urethra of prostate and gland utricle, in a bijective way. The novelty of this approach is the application of anatomical features as the pre-specified corresponding landmarks for prostate registration. We evaluate the registration results through both artificial and clinical datasets. Registration accuracy is evaluated by performing statistical analysis of local intensity differences or spatial differences of anatomical landmarks between various MR datasets. Evaluation results demonstrate that our method statistics-significantly improves the quality of registration. Although this strategy is tested for MRI-guided brachytherapy, the preliminary results from these experiments suggest that it can be also applied to other settings such as transrectal ultrasound-guided or CT-guided therapy, where the integration of preoperative MRI may have a significant impact upon treatment planning and guidance.
1311.0378
George Teodoro
George Teodoro and Tahsin Kurc and Jun Kong and Lee Cooper and Joel Saltz
Comparative Performance Analysis of Intel Xeon Phi, GPU, and CPU
11 pages, 2 figures
null
null
null
cs.DC cs.PF
http://creativecommons.org/licenses/publicdomain/
We investigate and characterize the performance of an important class of operations on GPUs and Many Integrated Core (MIC) architectures. Our work is motivated by applications that analyze low-dimensional spatial datasets captured by high resolution sensors, such as image datasets obtained from whole slide tissue specimens using microscopy image scanners. We identify the data access and computation patterns of operations in object segmentation and feature computation categories. We systematically implement and evaluate the performance of these core operations on modern CPUs, GPUs, and MIC systems for a microscopy image analysis application. Our results show that (1) the data access pattern and parallelization strategy employed by the operations strongly affect their performance. While the performance on a MIC of operations that perform regular data access is comparable or sometimes better than that on a GPU; (2) GPUs are significantly more efficient than MICs for operations and algorithms that irregularly access data. This is a result of the low performance of the latter when it comes to random data access; (3) adequate coordinated execution on MICs and CPUs using a performance aware task scheduling strategy improves about 1.29x over a first-come-first-served strategy. The example application attained an efficiency of 84% in an execution with of 192 nodes (3072 CPU cores and 192 MICs).
[ { "version": "v1", "created": "Sat, 2 Nov 2013 14:00:40 GMT" } ]
2013-11-05T00:00:00
[ [ "Teodoro", "George", "" ], [ "Kurc", "Tahsin", "" ], [ "Kong", "Jun", "" ], [ "Cooper", "Lee", "" ], [ "Saltz", "Joel", "" ] ]
TITLE: Comparative Performance Analysis of Intel Xeon Phi, GPU, and CPU ABSTRACT: We investigate and characterize the performance of an important class of operations on GPUs and Many Integrated Core (MIC) architectures. Our work is motivated by applications that analyze low-dimensional spatial datasets captured by high resolution sensors, such as image datasets obtained from whole slide tissue specimens using microscopy image scanners. We identify the data access and computation patterns of operations in object segmentation and feature computation categories. We systematically implement and evaluate the performance of these core operations on modern CPUs, GPUs, and MIC systems for a microscopy image analysis application. Our results show that (1) the data access pattern and parallelization strategy employed by the operations strongly affect their performance. While the performance on a MIC of operations that perform regular data access is comparable or sometimes better than that on a GPU; (2) GPUs are significantly more efficient than MICs for operations and algorithms that irregularly access data. This is a result of the low performance of the latter when it comes to random data access; (3) adequate coordinated execution on MICs and CPUs using a performance aware task scheduling strategy improves about 1.29x over a first-come-first-served strategy. The example application attained an efficiency of 84% in an execution with of 192 nodes (3072 CPU cores and 192 MICs).
1311.0636
Dhruv Mahajan
Dhruv Mahajan, S. Sathiya Keerthi, S. Sundararajan, Leon Bottou
A Parallel SGD method with Strong Convergence
null
null
null
null
cs.LG cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper proposes a novel parallel stochastic gradient descent (SGD) method that is obtained by applying parallel sets of SGD iterations (each set operating on one node using the data residing in it) for finding the direction in each iteration of a batch descent method. The method has strong convergence properties. Experiments on datasets with high dimensional feature spaces show the value of this method.
[ { "version": "v1", "created": "Mon, 4 Nov 2013 10:31:11 GMT" } ]
2013-11-05T00:00:00
[ [ "Mahajan", "Dhruv", "" ], [ "Keerthi", "S. Sathiya", "" ], [ "Sundararajan", "S.", "" ], [ "Bottou", "Leon", "" ] ]
TITLE: A Parallel SGD method with Strong Convergence ABSTRACT: This paper proposes a novel parallel stochastic gradient descent (SGD) method that is obtained by applying parallel sets of SGD iterations (each set operating on one node using the data residing in it) for finding the direction in each iteration of a batch descent method. The method has strong convergence properties. Experiments on datasets with high dimensional feature spaces show the value of this method.
1311.0833
Zitao Liu
Zitao Liu
A Comparative Study on Linguistic Feature Selection in Sentiment Polarity Classification
arXiv admin note: text overlap with arXiv:cs/0205070 by other authors
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Sentiment polarity classification is perhaps the most widely studied topic. It classifies an opinionated document as expressing a positive or negative opinion. In this paper, using movie review dataset, we perform a comparative study with different single kind linguistic features and the combinations of these features. We find that the classic topic-based classifier(Naive Bayes and Support Vector Machine) do not perform as well on sentiment polarity classification. And we find that with some combination of different linguistic features, the classification accuracy can be boosted a lot. We give some reasonable explanations about these boosting outcomes.
[ { "version": "v1", "created": "Mon, 4 Nov 2013 20:11:35 GMT" } ]
2013-11-05T00:00:00
[ [ "Liu", "Zitao", "" ] ]
TITLE: A Comparative Study on Linguistic Feature Selection in Sentiment Polarity Classification ABSTRACT: Sentiment polarity classification is perhaps the most widely studied topic. It classifies an opinionated document as expressing a positive or negative opinion. In this paper, using movie review dataset, we perform a comparative study with different single kind linguistic features and the combinations of these features. We find that the classic topic-based classifier(Naive Bayes and Support Vector Machine) do not perform as well on sentiment polarity classification. And we find that with some combination of different linguistic features, the classification accuracy can be boosted a lot. We give some reasonable explanations about these boosting outcomes.
1305.6659
Trevor Campbell
Trevor Campbell, Miao Liu, Brian Kulis, Jonathan P. How, Lawrence Carin
Dynamic Clustering via Asymptotics of the Dependent Dirichlet Process Mixture
This paper is from NIPS 2013. Please use the following BibTeX citation: @inproceedings{Campbell13_NIPS, Author = {Trevor Campbell and Miao Liu and Brian Kulis and Jonathan P. How and Lawrence Carin}, Title = {Dynamic Clustering via Asymptotics of the Dependent Dirichlet Process}, Booktitle = {Advances in Neural Information Processing Systems (NIPS)}, Year = {2013}}
null
null
null
cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents a novel algorithm, based upon the dependent Dirichlet process mixture model (DDPMM), for clustering batch-sequential data containing an unknown number of evolving clusters. The algorithm is derived via a low-variance asymptotic analysis of the Gibbs sampling algorithm for the DDPMM, and provides a hard clustering with convergence guarantees similar to those of the k-means algorithm. Empirical results from a synthetic test with moving Gaussian clusters and a test with real ADS-B aircraft trajectory data demonstrate that the algorithm requires orders of magnitude less computational time than contemporary probabilistic and hard clustering algorithms, while providing higher accuracy on the examined datasets.
[ { "version": "v1", "created": "Tue, 28 May 2013 23:59:16 GMT" }, { "version": "v2", "created": "Fri, 1 Nov 2013 18:25:39 GMT" } ]
2013-11-04T00:00:00
[ [ "Campbell", "Trevor", "" ], [ "Liu", "Miao", "" ], [ "Kulis", "Brian", "" ], [ "How", "Jonathan P.", "" ], [ "Carin", "Lawrence", "" ] ]
TITLE: Dynamic Clustering via Asymptotics of the Dependent Dirichlet Process Mixture ABSTRACT: This paper presents a novel algorithm, based upon the dependent Dirichlet process mixture model (DDPMM), for clustering batch-sequential data containing an unknown number of evolving clusters. The algorithm is derived via a low-variance asymptotic analysis of the Gibbs sampling algorithm for the DDPMM, and provides a hard clustering with convergence guarantees similar to those of the k-means algorithm. Empirical results from a synthetic test with moving Gaussian clusters and a test with real ADS-B aircraft trajectory data demonstrate that the algorithm requires orders of magnitude less computational time than contemporary probabilistic and hard clustering algorithms, while providing higher accuracy on the examined datasets.
1307.1493
Stefan Wager
Stefan Wager, Sida Wang, and Percy Liang
Dropout Training as Adaptive Regularization
11 pages. Advances in Neural Information Processing Systems (NIPS), 2013
null
null
null
stat.ML cs.LG stat.ME
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Dropout and other feature noising schemes control overfitting by artificially corrupting the training data. For generalized linear models, dropout performs a form of adaptive regularization. Using this viewpoint, we show that the dropout regularizer is first-order equivalent to an L2 regularizer applied after scaling the features by an estimate of the inverse diagonal Fisher information matrix. We also establish a connection to AdaGrad, an online learning algorithm, and find that a close relative of AdaGrad operates by repeatedly solving linear dropout-regularized problems. By casting dropout as regularization, we develop a natural semi-supervised algorithm that uses unlabeled data to create a better adaptive regularizer. We apply this idea to document classification tasks, and show that it consistently boosts the performance of dropout training, improving on state-of-the-art results on the IMDB reviews dataset.
[ { "version": "v1", "created": "Thu, 4 Jul 2013 21:33:56 GMT" }, { "version": "v2", "created": "Fri, 1 Nov 2013 17:56:35 GMT" } ]
2013-11-04T00:00:00
[ [ "Wager", "Stefan", "" ], [ "Wang", "Sida", "" ], [ "Liang", "Percy", "" ] ]
TITLE: Dropout Training as Adaptive Regularization ABSTRACT: Dropout and other feature noising schemes control overfitting by artificially corrupting the training data. For generalized linear models, dropout performs a form of adaptive regularization. Using this viewpoint, we show that the dropout regularizer is first-order equivalent to an L2 regularizer applied after scaling the features by an estimate of the inverse diagonal Fisher information matrix. We also establish a connection to AdaGrad, an online learning algorithm, and find that a close relative of AdaGrad operates by repeatedly solving linear dropout-regularized problems. By casting dropout as regularization, we develop a natural semi-supervised algorithm that uses unlabeled data to create a better adaptive regularizer. We apply this idea to document classification tasks, and show that it consistently boosts the performance of dropout training, improving on state-of-the-art results on the IMDB reviews dataset.
1306.4626
Laetitia Gauvin
Laetitia Gauvin, Andr\'e Panisson, Ciro Cattuto and Alain Barrat
Activity clocks: spreading dynamics on temporal networks of human contact
null
Scientific Reports 3, 3099 (2013)
10.1038/srep03099
null
physics.soc-ph cs.SI nlin.AO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Dynamical processes on time-varying complex networks are key to understanding and modeling a broad variety of processes in socio-technical systems. Here we focus on empirical temporal networks of human proximity and we aim at understanding the factors that, in simulation, shape the arrival time distribution of simple spreading processes. Abandoning the notion of wall-clock time in favour of node-specific clocks based on activity exposes robust statistical patterns in the arrival times across different social contexts. Using randomization strategies and generative models constrained by data, we show that these patterns can be understood in terms of heterogeneous inter-event time distributions coupled with heterogeneous numbers of events per edge. We also show, both empirically and by using a synthetic dataset, that significant deviations from the above behavior can be caused by the presence of edge classes with strong activity correlations.
[ { "version": "v1", "created": "Wed, 19 Jun 2013 17:44:40 GMT" }, { "version": "v2", "created": "Thu, 31 Oct 2013 14:13:04 GMT" } ]
2013-11-01T00:00:00
[ [ "Gauvin", "Laetitia", "" ], [ "Panisson", "André", "" ], [ "Cattuto", "Ciro", "" ], [ "Barrat", "Alain", "" ] ]
TITLE: Activity clocks: spreading dynamics on temporal networks of human contact ABSTRACT: Dynamical processes on time-varying complex networks are key to understanding and modeling a broad variety of processes in socio-technical systems. Here we focus on empirical temporal networks of human proximity and we aim at understanding the factors that, in simulation, shape the arrival time distribution of simple spreading processes. Abandoning the notion of wall-clock time in favour of node-specific clocks based on activity exposes robust statistical patterns in the arrival times across different social contexts. Using randomization strategies and generative models constrained by data, we show that these patterns can be understood in terms of heterogeneous inter-event time distributions coupled with heterogeneous numbers of events per edge. We also show, both empirically and by using a synthetic dataset, that significant deviations from the above behavior can be caused by the presence of edge classes with strong activity correlations.
1310.8494
Sparsh Mittal
Sparsh Mittal
Using Cache-coloring to Mitigate Inter-set Write Variation in Non-volatile Caches
STT-RAM cache
null
null
null
cs.AR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In recent years, researchers have explored use of non-volatile devices such as STT-RAM (spin torque transfer RAM) for designing on-chip caches, since they provide high density and consume low leakage power. A common limitation of all non-volatile devices is their limited write endurance. Further, since existing cache management policies are write-variation unaware, excessive writes to a few blocks may lead to a quick failure of the whole cache. We propose an architectural technique for wear-leveling of non-volatile last level caches (LLCs). Our technique uses cache-coloring approach which adds a software-controlled mapping layer between groups of physical pages and cache sets. Periodically the mapping is altered to ensure that write-traffic can be spread uniformly to different sets of the cache to achieve wear-leveling. Simulations performed with an x86-64 simulator and SPEC2006 benchmarks show that our technique reduces the worst-case writes to cache blocks and thus improves the cache lifetime by 4.07X.
[ { "version": "v1", "created": "Thu, 31 Oct 2013 13:33:16 GMT" } ]
2013-11-01T00:00:00
[ [ "Mittal", "Sparsh", "" ] ]
TITLE: Using Cache-coloring to Mitigate Inter-set Write Variation in Non-volatile Caches ABSTRACT: In recent years, researchers have explored use of non-volatile devices such as STT-RAM (spin torque transfer RAM) for designing on-chip caches, since they provide high density and consume low leakage power. A common limitation of all non-volatile devices is their limited write endurance. Further, since existing cache management policies are write-variation unaware, excessive writes to a few blocks may lead to a quick failure of the whole cache. We propose an architectural technique for wear-leveling of non-volatile last level caches (LLCs). Our technique uses cache-coloring approach which adds a software-controlled mapping layer between groups of physical pages and cache sets. Periodically the mapping is altered to ensure that write-traffic can be spread uniformly to different sets of the cache to achieve wear-leveling. Simulations performed with an x86-64 simulator and SPEC2006 benchmarks show that our technique reduces the worst-case writes to cache blocks and thus improves the cache lifetime by 4.07X.
1310.8583
Swakkhar Shatabda
Swakkhar Shatabda, M.A. Hakim Newton, Duc Nghia Pham and Abdul Sattar
A Hybrid Local Search for Simplified Protein Structure Prediction
null
Proceedings of the International Conference on Bioinformatics Models, Methods and Algorithms, Barcelona, Spain, 11 - 14 February, 2013. SciTePress 2013 ISBN 978-989-8565-35-8 pages:158-163
null
null
cs.CE cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Protein structure prediction based on Hydrophobic-Polar energy model essentially becomes searching for a conformation having a compact hydrophobic core at the center. The hydrophobic core minimizes the interaction energy between the amino acids of the given protein. Local search algorithms can quickly find very good conformations by moving repeatedly from the current solution to its "best" neighbor. However, once such a compact hydrophobic core is found, the search stagnates and spends enormous effort in quest of an alternative core. In this paper, we attempt to restructure segments of a conformation with such compact core. We select one large segment or a number of small segments and apply exhaustive local search. We also apply a mix of heuristics so that one heuristic can help escape local minima of another. We evaluated our algorithm by using Face Centered Cubic (FCC) Lattice on a set of standard benchmark proteins and obtain significantly better results than that of the state-of-the-art methods.
[ { "version": "v1", "created": "Thu, 31 Oct 2013 16:41:44 GMT" } ]
2013-11-01T00:00:00
[ [ "Shatabda", "Swakkhar", "" ], [ "Newton", "M. A. Hakim", "" ], [ "Pham", "Duc Nghia", "" ], [ "Sattar", "Abdul", "" ] ]
TITLE: A Hybrid Local Search for Simplified Protein Structure Prediction ABSTRACT: Protein structure prediction based on Hydrophobic-Polar energy model essentially becomes searching for a conformation having a compact hydrophobic core at the center. The hydrophobic core minimizes the interaction energy between the amino acids of the given protein. Local search algorithms can quickly find very good conformations by moving repeatedly from the current solution to its "best" neighbor. However, once such a compact hydrophobic core is found, the search stagnates and spends enormous effort in quest of an alternative core. In this paper, we attempt to restructure segments of a conformation with such compact core. We select one large segment or a number of small segments and apply exhaustive local search. We also apply a mix of heuristics so that one heuristic can help escape local minima of another. We evaluated our algorithm by using Face Centered Cubic (FCC) Lattice on a set of standard benchmark proteins and obtain significantly better results than that of the state-of-the-art methods.
1308.6324
Jakub Tomczak Ph.D.
Jakub M. Tomczak
Prediction of breast cancer recurrence using Classification Restricted Boltzmann Machine with Dropping
technical report
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we apply Classification Restricted Boltzmann Machine (ClassRBM) to the problem of predicting breast cancer recurrence. According to the Polish National Cancer Registry, in 2010 only, the breast cancer caused almost 25% of all diagnosed cases of cancer in Poland. We propose how to use ClassRBM for predicting breast cancer return and discovering relevant inputs (symptoms) in illness reappearance. Next, we outline a general probabilistic framework for learning Boltzmann machines with masks, which we refer to as Dropping. The fashion of generating masks leads to different learning methods, i.e., DropOut, DropConnect. We propose a new method called DropPart which is a generalization of DropConnect. In DropPart the Beta distribution instead of Bernoulli distribution in DropConnect is used. At the end, we carry out an experiment using real-life dataset consisting of 949 cases, provided by the Institute of Oncology Ljubljana.
[ { "version": "v1", "created": "Wed, 28 Aug 2013 22:08:29 GMT" }, { "version": "v2", "created": "Wed, 30 Oct 2013 16:10:27 GMT" } ]
2013-10-31T00:00:00
[ [ "Tomczak", "Jakub M.", "" ] ]
TITLE: Prediction of breast cancer recurrence using Classification Restricted Boltzmann Machine with Dropping ABSTRACT: In this paper, we apply Classification Restricted Boltzmann Machine (ClassRBM) to the problem of predicting breast cancer recurrence. According to the Polish National Cancer Registry, in 2010 only, the breast cancer caused almost 25% of all diagnosed cases of cancer in Poland. We propose how to use ClassRBM for predicting breast cancer return and discovering relevant inputs (symptoms) in illness reappearance. Next, we outline a general probabilistic framework for learning Boltzmann machines with masks, which we refer to as Dropping. The fashion of generating masks leads to different learning methods, i.e., DropOut, DropConnect. We propose a new method called DropPart which is a generalization of DropConnect. In DropPart the Beta distribution instead of Bernoulli distribution in DropConnect is used. At the end, we carry out an experiment using real-life dataset consisting of 949 cases, provided by the Institute of Oncology Ljubljana.
1310.8004
Boyu Wang
Boyu Wang, Joelle Pineau
Online Ensemble Learning for Imbalanced Data Streams
null
null
null
null
cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
While both cost-sensitive learning and online learning have been studied extensively, the effort in simultaneously dealing with these two issues is limited. Aiming at this challenge task, a novel learning framework is proposed in this paper. The key idea is based on the fusion of online ensemble algorithms and the state of the art batch mode cost-sensitive bagging/boosting algorithms. Within this framework, two separately developed research areas are bridged together, and a batch of theoretically sound online cost-sensitive bagging and online cost-sensitive boosting algorithms are first proposed. Unlike other online cost-sensitive learning algorithms lacking theoretical analysis of asymptotic properties, the convergence of the proposed algorithms is guaranteed under certain conditions, and the experimental evidence with benchmark data sets also validates the effectiveness and efficiency of the proposed methods.
[ { "version": "v1", "created": "Wed, 30 Oct 2013 02:11:48 GMT" } ]
2013-10-31T00:00:00
[ [ "Wang", "Boyu", "" ], [ "Pineau", "Joelle", "" ] ]
TITLE: Online Ensemble Learning for Imbalanced Data Streams ABSTRACT: While both cost-sensitive learning and online learning have been studied extensively, the effort in simultaneously dealing with these two issues is limited. Aiming at this challenge task, a novel learning framework is proposed in this paper. The key idea is based on the fusion of online ensemble algorithms and the state of the art batch mode cost-sensitive bagging/boosting algorithms. Within this framework, two separately developed research areas are bridged together, and a batch of theoretically sound online cost-sensitive bagging and online cost-sensitive boosting algorithms are first proposed. Unlike other online cost-sensitive learning algorithms lacking theoretical analysis of asymptotic properties, the convergence of the proposed algorithms is guaranteed under certain conditions, and the experimental evidence with benchmark data sets also validates the effectiveness and efficiency of the proposed methods.
1310.8059
Thabet Slimani
Thabet Slimani
Description and Evaluation of Semantic Similarity Measures Approaches
10 pages
International Journal of Computer Applications 80(10):25-33, October 2013. Published by Foundation of Computer Science, New York, USA
10.5120/13897-1851
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In recent years, semantic similarity measure has a great interest in Semantic Web and Natural Language Processing (NLP). Several similarity measures have been developed, being given the existence of a structured knowledge representation offered by ontologies and corpus which enable semantic interpretation of terms. Semantic similarity measures compute the similarity between concepts/terms included in knowledge sources in order to perform estimations. This paper discusses the existing semantic similarity methods based on structure, information content and feature approaches. Additionally, we present a critical evaluation of several categories of semantic similarity approaches based on two standard benchmarks. The aim of this paper is to give an efficient evaluation of all these measures which help researcher and practitioners to select the measure that best fit for their requirements.
[ { "version": "v1", "created": "Wed, 30 Oct 2013 08:08:43 GMT" } ]
2013-10-31T00:00:00
[ [ "Slimani", "Thabet", "" ] ]
TITLE: Description and Evaluation of Semantic Similarity Measures Approaches ABSTRACT: In recent years, semantic similarity measure has a great interest in Semantic Web and Natural Language Processing (NLP). Several similarity measures have been developed, being given the existence of a structured knowledge representation offered by ontologies and corpus which enable semantic interpretation of terms. Semantic similarity measures compute the similarity between concepts/terms included in knowledge sources in order to perform estimations. This paper discusses the existing semantic similarity methods based on structure, information content and feature approaches. Additionally, we present a critical evaluation of several categories of semantic similarity approaches based on two standard benchmarks. The aim of this paper is to give an efficient evaluation of all these measures which help researcher and practitioners to select the measure that best fit for their requirements.
1310.8115
Marco Congedo
Marco Congedo, Alexandre Barachant and Anton Andreev
A New Generation of Brain-Computer Interface Based on Riemannian Geometry
33 pages, 9 Figures, 17 equations/algorithms
null
null
null
cs.HC math.DG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Based on the cumulated experience over the past 25 years in the field of Brain-Computer Interface (BCI) we can now envision a new generation of BCI. Such BCIs will not require training; instead they will be smartly initialized using remote massive databases and will adapt to the user fast and effectively in the first minute of use. They will be reliable, robust and will maintain good performances within and across sessions. A general classification framework based on recent advances in Riemannian geometry and possessing these characteristics is presented. It applies equally well to BCI based on event-related potentials (ERP), sensorimotor (mu) rhythms and steady-state evoked potential (SSEP). The framework is very simple, both algorithmically and computationally. Due to its simplicity, its ability to learn rapidly (with little training data) and its good across-subject and across-session generalization, this strategy a very good candidate for building a new generation of BCIs, thus we hereby propose it as a benchmark method for the field.
[ { "version": "v1", "created": "Wed, 30 Oct 2013 12:18:18 GMT" } ]
2013-10-31T00:00:00
[ [ "Congedo", "Marco", "" ], [ "Barachant", "Alexandre", "" ], [ "Andreev", "Anton", "" ] ]
TITLE: A New Generation of Brain-Computer Interface Based on Riemannian Geometry ABSTRACT: Based on the cumulated experience over the past 25 years in the field of Brain-Computer Interface (BCI) we can now envision a new generation of BCI. Such BCIs will not require training; instead they will be smartly initialized using remote massive databases and will adapt to the user fast and effectively in the first minute of use. They will be reliable, robust and will maintain good performances within and across sessions. A general classification framework based on recent advances in Riemannian geometry and possessing these characteristics is presented. It applies equally well to BCI based on event-related potentials (ERP), sensorimotor (mu) rhythms and steady-state evoked potential (SSEP). The framework is very simple, both algorithmically and computationally. Due to its simplicity, its ability to learn rapidly (with little training data) and its good across-subject and across-session generalization, this strategy a very good candidate for building a new generation of BCIs, thus we hereby propose it as a benchmark method for the field.
1310.8278
Sicun Gao
Sicun Gao, Soonho Kong, Edmund Clarke
Satisfiability Modulo ODEs
Published in FMCAD 2013
null
null
null
cs.LO cs.SY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study SMT problems over the reals containing ordinary differential equations. They are important for formal verification of realistic hybrid systems and embedded software. We develop delta-complete algorithms for SMT formulas that are purely existentially quantified, as well as exists-forall formulas whose universal quantification is restricted to the time variables. We demonstrate scalability of the algorithms, as implemented in our open-source solver dReal, on SMT benchmarks with several hundred nonlinear ODEs and variables.
[ { "version": "v1", "created": "Wed, 30 Oct 2013 19:24:34 GMT" } ]
2013-10-31T00:00:00
[ [ "Gao", "Sicun", "" ], [ "Kong", "Soonho", "" ], [ "Clarke", "Edmund", "" ] ]
TITLE: Satisfiability Modulo ODEs ABSTRACT: We study SMT problems over the reals containing ordinary differential equations. They are important for formal verification of realistic hybrid systems and embedded software. We develop delta-complete algorithms for SMT formulas that are purely existentially quantified, as well as exists-forall formulas whose universal quantification is restricted to the time variables. We demonstrate scalability of the algorithms, as implemented in our open-source solver dReal, on SMT benchmarks with several hundred nonlinear ODEs and variables.
1308.1995
Shuyang Lin
Shuyang Lin, Xiangnan Kong, Philip S. Yu
Predicting Trends in Social Networks via Dynamic Activeness Model
10 pages, a shorter version published in CIKM 2013
null
null
null
cs.SI physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
With the effect of word-of-the-mouth, trends in social networks are now playing a significant role in shaping people's lives. Predicting dynamic trends is an important problem with many useful applications. There are three dynamic characteristics of a trend that should be captured by a trend model: intensity, coverage and duration. However, existing approaches on the information diffusion are not capable of capturing these three characteristics. In this paper, we study the problem of predicting dynamic trends in social networks. We first define related concepts to quantify the dynamic characteristics of trends in social networks, and formalize the problem of trend prediction. We then propose a Dynamic Activeness (DA) model based on the novel concept of activeness, and design a trend prediction algorithm using the DA model. Due to the use of stacking principle, we are able to make the prediction algorithm very efficient. We examine the prediction algorithm on a number of real social network datasets, and show that it is more accurate than state-of-the-art approaches.
[ { "version": "v1", "created": "Thu, 8 Aug 2013 22:35:35 GMT" }, { "version": "v2", "created": "Tue, 29 Oct 2013 03:31:24 GMT" } ]
2013-10-30T00:00:00
[ [ "Lin", "Shuyang", "" ], [ "Kong", "Xiangnan", "" ], [ "Yu", "Philip S.", "" ] ]
TITLE: Predicting Trends in Social Networks via Dynamic Activeness Model ABSTRACT: With the effect of word-of-the-mouth, trends in social networks are now playing a significant role in shaping people's lives. Predicting dynamic trends is an important problem with many useful applications. There are three dynamic characteristics of a trend that should be captured by a trend model: intensity, coverage and duration. However, existing approaches on the information diffusion are not capable of capturing these three characteristics. In this paper, we study the problem of predicting dynamic trends in social networks. We first define related concepts to quantify the dynamic characteristics of trends in social networks, and formalize the problem of trend prediction. We then propose a Dynamic Activeness (DA) model based on the novel concept of activeness, and design a trend prediction algorithm using the DA model. Due to the use of stacking principle, we are able to make the prediction algorithm very efficient. We examine the prediction algorithm on a number of real social network datasets, and show that it is more accurate than state-of-the-art approaches.
1107.0789
Lester Mackey
Lester Mackey, Ameet Talwalkar, Michael I. Jordan
Distributed Matrix Completion and Robust Factorization
35 pages, 6 figures
null
null
null
cs.LG cs.DS cs.NA math.NA stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
If learning methods are to scale to the massive sizes of modern datasets, it is essential for the field of machine learning to embrace parallel and distributed computing. Inspired by the recent development of matrix factorization methods with rich theory but poor computational complexity and by the relative ease of mapping matrices onto distributed architectures, we introduce a scalable divide-and-conquer framework for noisy matrix factorization. We present a thorough theoretical analysis of this framework in which we characterize the statistical errors introduced by the "divide" step and control their magnitude in the "conquer" step, so that the overall algorithm enjoys high-probability estimation guarantees comparable to those of its base algorithm. We also present experiments in collaborative filtering and video background modeling that demonstrate the near-linear to superlinear speed-ups attainable with this approach.
[ { "version": "v1", "created": "Tue, 5 Jul 2011 06:03:44 GMT" }, { "version": "v2", "created": "Wed, 17 Aug 2011 00:59:30 GMT" }, { "version": "v3", "created": "Wed, 21 Sep 2011 01:38:14 GMT" }, { "version": "v4", "created": "Tue, 1 Nov 2011 05:37:48 GMT" }, { "version": "v5", "created": "Fri, 18 May 2012 09:28:27 GMT" }, { "version": "v6", "created": "Tue, 14 Aug 2012 17:33:30 GMT" }, { "version": "v7", "created": "Mon, 28 Oct 2013 06:02:12 GMT" } ]
2013-10-29T00:00:00
[ [ "Mackey", "Lester", "" ], [ "Talwalkar", "Ameet", "" ], [ "Jordan", "Michael I.", "" ] ]
TITLE: Distributed Matrix Completion and Robust Factorization ABSTRACT: If learning methods are to scale to the massive sizes of modern datasets, it is essential for the field of machine learning to embrace parallel and distributed computing. Inspired by the recent development of matrix factorization methods with rich theory but poor computational complexity and by the relative ease of mapping matrices onto distributed architectures, we introduce a scalable divide-and-conquer framework for noisy matrix factorization. We present a thorough theoretical analysis of this framework in which we characterize the statistical errors introduced by the "divide" step and control their magnitude in the "conquer" step, so that the overall algorithm enjoys high-probability estimation guarantees comparable to those of its base algorithm. We also present experiments in collaborative filtering and video background modeling that demonstrate the near-linear to superlinear speed-ups attainable with this approach.
1310.7262
Ian Manchester
Seunggyun Cheong and Ian R. Manchester
Input Design for Model Discrimination and Fault Detection via Convex Relaxation
Extended version of conference submission
null
null
null
cs.SY math.OC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper addresses the design of input signals for the purpose of discriminating among a finite set of models dynamic systems within a given finite time interval. A motivating application is fault detection and isolation. We propose several specific optimization problems, with objectives or constraints based on signal power, signal amplitude, and probability of successful model discrimination. Since these optimization problems are nonconvex, we suggest a suboptimal solution via a random search algorithm guided by the semidefinite relaxation (SDR) and analyze the accuracy of the suboptimal solution. We conclude with a simple example taken from a benchmark problem on fault detection for wind turbines.
[ { "version": "v1", "created": "Sun, 27 Oct 2013 22:35:24 GMT" } ]
2013-10-29T00:00:00
[ [ "Cheong", "Seunggyun", "" ], [ "Manchester", "Ian R.", "" ] ]
TITLE: Input Design for Model Discrimination and Fault Detection via Convex Relaxation ABSTRACT: This paper addresses the design of input signals for the purpose of discriminating among a finite set of models dynamic systems within a given finite time interval. A motivating application is fault detection and isolation. We propose several specific optimization problems, with objectives or constraints based on signal power, signal amplitude, and probability of successful model discrimination. Since these optimization problems are nonconvex, we suggest a suboptimal solution via a random search algorithm guided by the semidefinite relaxation (SDR) and analyze the accuracy of the suboptimal solution. We conclude with a simple example taken from a benchmark problem on fault detection for wind turbines.
1310.7297
Farhana Murtaza Choudhury
Farhana Murtaza Choudhury, Mohammed Eunus Ali, Sarah Masud, Suman Nath, Ishat E Rabban
Scalable Visibility Color Map Construction in Spatial Databases
12 pages, 14 figures
null
null
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recent advances in 3D modeling provide us with real 3D datasets to answer queries, such as "What is the best position for a new billboard?" and "Which hotel room has the best view?" in the presence of obstacles. These applications require measuring and differentiating the visibility of an object (target) from different viewpoints in a dataspace, e.g., a billboard may be seen from two viewpoints but is readable only from the viewpoint closer to the target. In this paper, we formulate the above problem of quantifying the visibility of (from) a target object from (of) the surrounding area with a visibility color map (VCM). A VCM is essentially defined as a surface color map of the space, where each viewpoint of the space is assigned a color value that denotes the visibility measure of the target from that viewpoint. Measuring the visibility of a target even from a single viewpoint is an expensive operation, as we need to consider factors such as distance, angle, and obstacles between the viewpoint and the target. Hence, a straightforward approach to construct the VCM that requires visibility computation for every viewpoint of the surrounding space of the target, is prohibitively expensive in terms of both I/Os and computation, especially for a real dataset comprising of thousands of obstacles. We propose an efficient approach to compute the VCM based on a key property of the human vision that eliminates the necessity of computing the visibility for a large number of viewpoints of the space. To further reduce the computational overhead, we propose two approximations; namely, minimum bounding rectangle and tangential approaches with guaranteed error bounds. Our extensive experiments demonstrate the effectiveness and efficiency of our solutions to construct the VCM for real 2D and 3D datasets.
[ { "version": "v1", "created": "Mon, 28 Oct 2013 02:38:26 GMT" } ]
2013-10-29T00:00:00
[ [ "Choudhury", "Farhana Murtaza", "" ], [ "Ali", "Mohammed Eunus", "" ], [ "Masud", "Sarah", "" ], [ "Nath", "Suman", "" ], [ "Rabban", "Ishat E", "" ] ]
TITLE: Scalable Visibility Color Map Construction in Spatial Databases ABSTRACT: Recent advances in 3D modeling provide us with real 3D datasets to answer queries, such as "What is the best position for a new billboard?" and "Which hotel room has the best view?" in the presence of obstacles. These applications require measuring and differentiating the visibility of an object (target) from different viewpoints in a dataspace, e.g., a billboard may be seen from two viewpoints but is readable only from the viewpoint closer to the target. In this paper, we formulate the above problem of quantifying the visibility of (from) a target object from (of) the surrounding area with a visibility color map (VCM). A VCM is essentially defined as a surface color map of the space, where each viewpoint of the space is assigned a color value that denotes the visibility measure of the target from that viewpoint. Measuring the visibility of a target even from a single viewpoint is an expensive operation, as we need to consider factors such as distance, angle, and obstacles between the viewpoint and the target. Hence, a straightforward approach to construct the VCM that requires visibility computation for every viewpoint of the surrounding space of the target, is prohibitively expensive in terms of both I/Os and computation, especially for a real dataset comprising of thousands of obstacles. We propose an efficient approach to compute the VCM based on a key property of the human vision that eliminates the necessity of computing the visibility for a large number of viewpoints of the space. To further reduce the computational overhead, we propose two approximations; namely, minimum bounding rectangle and tangential approaches with guaranteed error bounds. Our extensive experiments demonstrate the effectiveness and efficiency of our solutions to construct the VCM for real 2D and 3D datasets.
1310.6772
Ragib Hasan
Thamar Solorio and Ragib Hasan and Mainul Mizan
Sockpuppet Detection in Wikipedia: A Corpus of Real-World Deceptive Writing for Linking Identities
4 pages, under submission at LREC 2014
null
null
null
cs.CL cs.CR cs.CY
http://creativecommons.org/licenses/by/3.0/
This paper describes the corpus of sockpuppet cases we gathered from Wikipedia. A sockpuppet is an online user account created with a fake identity for the purpose of covering abusive behavior and/or subverting the editing regulation process. We used a semi-automated method for crawling and curating a dataset of real sockpuppet investigation cases. To the best of our knowledge, this is the first corpus available on real-world deceptive writing. We describe the process for crawling the data and some preliminary results that can be used as baseline for benchmarking research. The dataset will be released under a Creative Commons license from our project website: http://docsig.cis.uab.edu.
[ { "version": "v1", "created": "Thu, 24 Oct 2013 20:59:27 GMT" } ]
2013-10-28T00:00:00
[ [ "Solorio", "Thamar", "" ], [ "Hasan", "Ragib", "" ], [ "Mizan", "Mainul", "" ] ]
TITLE: Sockpuppet Detection in Wikipedia: A Corpus of Real-World Deceptive Writing for Linking Identities ABSTRACT: This paper describes the corpus of sockpuppet cases we gathered from Wikipedia. A sockpuppet is an online user account created with a fake identity for the purpose of covering abusive behavior and/or subverting the editing regulation process. We used a semi-automated method for crawling and curating a dataset of real sockpuppet investigation cases. To the best of our knowledge, this is the first corpus available on real-world deceptive writing. We describe the process for crawling the data and some preliminary results that can be used as baseline for benchmarking research. The dataset will be released under a Creative Commons license from our project website: http://docsig.cis.uab.edu.
1310.6998
Shiladitya Sinha
Shiladitya Sinha, Chris Dyer, Kevin Gimpel, and Noah A. Smith
Predicting the NFL using Twitter
Presented at ECML/PKDD 2013 Workshop on Machine Learning and Data Mining for Sports Analytics
null
null
null
cs.SI cs.LG physics.soc-ph stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study the relationship between social media output and National Football League (NFL) games, using a dataset containing messages from Twitter and NFL game statistics. Specifically, we consider tweets pertaining to specific teams and games in the NFL season and use them alongside statistical game data to build predictive models for future game outcomes (which team will win?) and sports betting outcomes (which team will win with the point spread? will the total points be over/under the line?). We experiment with several feature sets and find that simple features using large volumes of tweets can match or exceed the performance of more traditional features that use game statistics.
[ { "version": "v1", "created": "Fri, 25 Oct 2013 18:35:22 GMT" } ]
2013-10-28T00:00:00
[ [ "Sinha", "Shiladitya", "" ], [ "Dyer", "Chris", "" ], [ "Gimpel", "Kevin", "" ], [ "Smith", "Noah A.", "" ] ]
TITLE: Predicting the NFL using Twitter ABSTRACT: We study the relationship between social media output and National Football League (NFL) games, using a dataset containing messages from Twitter and NFL game statistics. Specifically, we consider tweets pertaining to specific teams and games in the NFL season and use them alongside statistical game data to build predictive models for future game outcomes (which team will win?) and sports betting outcomes (which team will win with the point spread? will the total points be over/under the line?). We experiment with several feature sets and find that simple features using large volumes of tweets can match or exceed the performance of more traditional features that use game statistics.
1310.6304
Nikos Karampatziakis
Nikos Karampatziakis, Paul Mineiro
Combining Structured and Unstructured Randomness in Large Scale PCA
null
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Principal Component Analysis (PCA) is a ubiquitous tool with many applications in machine learning including feature construction, subspace embedding, and outlier detection. In this paper, we present an algorithm for computing the top principal components of a dataset with a large number of rows (examples) and columns (features). Our algorithm leverages both structured and unstructured random projections to retain good accuracy while being computationally efficient. We demonstrate the technique on the winning submission the KDD 2010 Cup.
[ { "version": "v1", "created": "Wed, 23 Oct 2013 17:33:26 GMT" }, { "version": "v2", "created": "Thu, 24 Oct 2013 17:36:27 GMT" } ]
2013-10-25T00:00:00
[ [ "Karampatziakis", "Nikos", "" ], [ "Mineiro", "Paul", "" ] ]
TITLE: Combining Structured and Unstructured Randomness in Large Scale PCA ABSTRACT: Principal Component Analysis (PCA) is a ubiquitous tool with many applications in machine learning including feature construction, subspace embedding, and outlier detection. In this paper, we present an algorithm for computing the top principal components of a dataset with a large number of rows (examples) and columns (features). Our algorithm leverages both structured and unstructured random projections to retain good accuracy while being computationally efficient. We demonstrate the technique on the winning submission the KDD 2010 Cup.
1310.6654
Sahil Sikka
Sahil Sikka and Karan Sikka and M.K. Bhuyan and Yuji Iwahori
Pseudo vs. True Defect Classification in Printed Circuits Boards using Wavelet Features
6 pages, 8 figures
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In recent years, Printed Circuit Boards (PCB) have become the backbone of a large number of consumer electronic devices leading to a surge in their production. This has made it imperative to employ automatic inspection systems to identify manufacturing defects in PCB before they are installed in the respective systems. An important task in this regard is the classification of defects as either true or pseudo defects, which decides if the PCB is to be re-manufactured or not. This work proposes a novel approach to detect most common defects in the PCBs. The problem has been approached by employing highly discriminative features based on multi-scale wavelet transform, which are further boosted by using a kernalized version of the support vector machines (SVM). A real world printed circuit board dataset has been used for quantitative analysis. Experimental results demonstrated the efficacy of the proposed method.
[ { "version": "v1", "created": "Thu, 24 Oct 2013 16:11:28 GMT" } ]
2013-10-25T00:00:00
[ [ "Sikka", "Sahil", "" ], [ "Sikka", "Karan", "" ], [ "Bhuyan", "M. K.", "" ], [ "Iwahori", "Yuji", "" ] ]
TITLE: Pseudo vs. True Defect Classification in Printed Circuits Boards using Wavelet Features ABSTRACT: In recent years, Printed Circuit Boards (PCB) have become the backbone of a large number of consumer electronic devices leading to a surge in their production. This has made it imperative to employ automatic inspection systems to identify manufacturing defects in PCB before they are installed in the respective systems. An important task in this regard is the classification of defects as either true or pseudo defects, which decides if the PCB is to be re-manufactured or not. This work proposes a novel approach to detect most common defects in the PCBs. The problem has been approached by employing highly discriminative features based on multi-scale wavelet transform, which are further boosted by using a kernalized version of the support vector machines (SVM). A real world printed circuit board dataset has been used for quantitative analysis. Experimental results demonstrated the efficacy of the proposed method.
1211.7052
Andrea Baronchelli
Bruno Ribeiro, Nicola Perra, Andrea Baronchelli
Quantifying the effect of temporal resolution on time-varying networks
null
Scientific Reports 3, 3006 (2013)
10.1038/srep03006
null
cond-mat.stat-mech cs.SI physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Time-varying networks describe a wide array of systems whose constituents and interactions evolve over time. They are defined by an ordered stream of interactions between nodes, yet they are often represented in terms of a sequence of static networks, each aggregating all edges and nodes present in a time interval of size \Delta t. In this work we quantify the impact of an arbitrary \Delta t on the description of a dynamical process taking place upon a time-varying network. We focus on the elementary random walk, and put forth a simple mathematical framework that well describes the behavior observed on real datasets. The analytical description of the bias introduced by time integrating techniques represents a step forward in the correct characterization of dynamical processes on time-varying graphs.
[ { "version": "v1", "created": "Thu, 29 Nov 2012 20:56:13 GMT" }, { "version": "v2", "created": "Thu, 6 Dec 2012 17:21:53 GMT" }, { "version": "v3", "created": "Tue, 22 Oct 2013 10:50:42 GMT" } ]
2013-10-23T00:00:00
[ [ "Ribeiro", "Bruno", "" ], [ "Perra", "Nicola", "" ], [ "Baronchelli", "Andrea", "" ] ]
TITLE: Quantifying the effect of temporal resolution on time-varying networks ABSTRACT: Time-varying networks describe a wide array of systems whose constituents and interactions evolve over time. They are defined by an ordered stream of interactions between nodes, yet they are often represented in terms of a sequence of static networks, each aggregating all edges and nodes present in a time interval of size \Delta t. In this work we quantify the impact of an arbitrary \Delta t on the description of a dynamical process taking place upon a time-varying network. We focus on the elementary random walk, and put forth a simple mathematical framework that well describes the behavior observed on real datasets. The analytical description of the bias introduced by time integrating techniques represents a step forward in the correct characterization of dynamical processes on time-varying graphs.
1310.5767
Chunhua Shen
Xi Li, Yao Li, Chunhua Shen, Anthony Dick, Anton van den Hengel
Contextual Hypergraph Modelling for Salient Object Detection
Appearing in Proc. Int. Conf. Computer Vision 2013, Sydney, Australia
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Salient object detection aims to locate objects that capture human attention within images. Previous approaches often pose this as a problem of image contrast analysis. In this work, we model an image as a hypergraph that utilizes a set of hyperedges to capture the contextual properties of image pixels or regions. As a result, the problem of salient object detection becomes one of finding salient vertices and hyperedges in the hypergraph. The main advantage of hypergraph modeling is that it takes into account each pixel's (or region's) affinity with its neighborhood as well as its separation from image background. Furthermore, we propose an alternative approach based on center-versus-surround contextual contrast analysis, which performs salient object detection by optimizing a cost-sensitive support vector machine (SVM) objective function. Experimental results on four challenging datasets demonstrate the effectiveness of the proposed approaches against the state-of-the-art approaches to salient object detection.
[ { "version": "v1", "created": "Tue, 22 Oct 2013 00:38:59 GMT" } ]
2013-10-23T00:00:00
[ [ "Li", "Xi", "" ], [ "Li", "Yao", "" ], [ "Shen", "Chunhua", "" ], [ "Dick", "Anthony", "" ], [ "Hengel", "Anton van den", "" ] ]
TITLE: Contextual Hypergraph Modelling for Salient Object Detection ABSTRACT: Salient object detection aims to locate objects that capture human attention within images. Previous approaches often pose this as a problem of image contrast analysis. In this work, we model an image as a hypergraph that utilizes a set of hyperedges to capture the contextual properties of image pixels or regions. As a result, the problem of salient object detection becomes one of finding salient vertices and hyperedges in the hypergraph. The main advantage of hypergraph modeling is that it takes into account each pixel's (or region's) affinity with its neighborhood as well as its separation from image background. Furthermore, we propose an alternative approach based on center-versus-surround contextual contrast analysis, which performs salient object detection by optimizing a cost-sensitive support vector machine (SVM) objective function. Experimental results on four challenging datasets demonstrate the effectiveness of the proposed approaches against the state-of-the-art approaches to salient object detection.
1310.5965
Roozbeh Rajabi
Roozbeh Rajabi, Hassan Ghassemian
Fusion of Hyperspectral and Panchromatic Images using Spectral Uumixing Results
4 pages, conference
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Hyperspectral imaging, due to providing high spectral resolution images, is one of the most important tools in the remote sensing field. Because of technological restrictions hyperspectral sensors has a limited spatial resolution. On the other hand panchromatic image has a better spatial resolution. Combining this information together can provide a better understanding of the target scene. Spectral unmixing of mixed pixels in hyperspectral images results in spectral signature and abundance fractions of endmembers but gives no information about their location in a mixed pixel. In this paper we have used spectral unmixing results of hyperspectral images and segmentation results of panchromatic image for data fusion. The proposed method has been applied on simulated data using AVRIS Indian Pines datasets. Results show that this method can effectively combine information in hyperspectral and panchromatic images.
[ { "version": "v1", "created": "Tue, 22 Oct 2013 15:44:51 GMT" } ]
2013-10-23T00:00:00
[ [ "Rajabi", "Roozbeh", "" ], [ "Ghassemian", "Hassan", "" ] ]
TITLE: Fusion of Hyperspectral and Panchromatic Images using Spectral Uumixing Results ABSTRACT: Hyperspectral imaging, due to providing high spectral resolution images, is one of the most important tools in the remote sensing field. Because of technological restrictions hyperspectral sensors has a limited spatial resolution. On the other hand panchromatic image has a better spatial resolution. Combining this information together can provide a better understanding of the target scene. Spectral unmixing of mixed pixels in hyperspectral images results in spectral signature and abundance fractions of endmembers but gives no information about their location in a mixed pixel. In this paper we have used spectral unmixing results of hyperspectral images and segmentation results of panchromatic image for data fusion. The proposed method has been applied on simulated data using AVRIS Indian Pines datasets. Results show that this method can effectively combine information in hyperspectral and panchromatic images.
1310.6019
Andrea Kappes
Tobias Fleck, Andrea Kappes and Dorothea Wagner
Graph Clustering with Surprise: Complexity and Exact Solutions
null
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Clustering graphs based on a comparison of the number of links within clusters and the expected value of this quantity in a random graph has gained a lot of attention and popularity in the last decade. Recently, Aldecoa and Marin proposed a related, but slightly different approach leading to the quality measure surprise, and reported good behavior in the context of synthetic and real world benchmarks. We show that the problem of finding a clustering with optimum surprise is NP-hard. Moreover, a bicriterial view on the problem permits to compute optimum solutions for small instances by solving a small number of integer linear programs, and leads to a polynomial time algorithm on trees.
[ { "version": "v1", "created": "Mon, 21 Oct 2013 15:07:16 GMT" } ]
2013-10-23T00:00:00
[ [ "Fleck", "Tobias", "" ], [ "Kappes", "Andrea", "" ], [ "Wagner", "Dorothea", "" ] ]
TITLE: Graph Clustering with Surprise: Complexity and Exact Solutions ABSTRACT: Clustering graphs based on a comparison of the number of links within clusters and the expected value of this quantity in a random graph has gained a lot of attention and popularity in the last decade. Recently, Aldecoa and Marin proposed a related, but slightly different approach leading to the quality measure surprise, and reported good behavior in the context of synthetic and real world benchmarks. We show that the problem of finding a clustering with optimum surprise is NP-hard. Moreover, a bicriterial view on the problem permits to compute optimum solutions for small instances by solving a small number of integer linear programs, and leads to a polynomial time algorithm on trees.
1303.2130
Xiao-Lei Zhang
Xiao-Lei Zhang
Convex Discriminative Multitask Clustering
null
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Multitask clustering tries to improve the clustering performance of multiple tasks simultaneously by taking their relationship into account. Most existing multitask clustering algorithms fall into the type of generative clustering, and none are formulated as convex optimization problems. In this paper, we propose two convex Discriminative Multitask Clustering (DMTC) algorithms to address the problems. Specifically, we first propose a Bayesian DMTC framework. Then, we propose two convex DMTC objectives within the framework. The first one, which can be seen as a technical combination of the convex multitask feature learning and the convex Multiclass Maximum Margin Clustering (M3C), aims to learn a shared feature representation. The second one, which can be seen as a combination of the convex multitask relationship learning and M3C, aims to learn the task relationship. The two objectives are solved in a uniform procedure by the efficient cutting-plane algorithm. Experimental results on a toy problem and two benchmark datasets demonstrate the effectiveness of the proposed algorithms.
[ { "version": "v1", "created": "Fri, 8 Mar 2013 21:32:52 GMT" }, { "version": "v2", "created": "Mon, 21 Oct 2013 15:06:36 GMT" } ]
2013-10-22T00:00:00
[ [ "Zhang", "Xiao-Lei", "" ] ]
TITLE: Convex Discriminative Multitask Clustering ABSTRACT: Multitask clustering tries to improve the clustering performance of multiple tasks simultaneously by taking their relationship into account. Most existing multitask clustering algorithms fall into the type of generative clustering, and none are formulated as convex optimization problems. In this paper, we propose two convex Discriminative Multitask Clustering (DMTC) algorithms to address the problems. Specifically, we first propose a Bayesian DMTC framework. Then, we propose two convex DMTC objectives within the framework. The first one, which can be seen as a technical combination of the convex multitask feature learning and the convex Multiclass Maximum Margin Clustering (M3C), aims to learn a shared feature representation. The second one, which can be seen as a combination of the convex multitask relationship learning and M3C, aims to learn the task relationship. The two objectives are solved in a uniform procedure by the efficient cutting-plane algorithm. Experimental results on a toy problem and two benchmark datasets demonstrate the effectiveness of the proposed algorithms.
1310.1949
Nikos Karampatziakis
Alekh Agarwal, Sham M. Kakade, Nikos Karampatziakis, Le Song, Gregory Valiant
Least Squares Revisited: Scalable Approaches for Multi-class Prediction
null
null
null
null
cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This work provides simple algorithms for multi-class (and multi-label) prediction in settings where both the number of examples n and the data dimension d are relatively large. These robust and parameter free algorithms are essentially iterative least-squares updates and very versatile both in theory and in practice. On the theoretical front, we present several variants with convergence guarantees. Owing to their effective use of second-order structure, these algorithms are substantially better than first-order methods in many practical scenarios. On the empirical side, we present a scalable stagewise variant of our approach, which achieves dramatic computational speedups over popular optimization packages such as Liblinear and Vowpal Wabbit on standard datasets (MNIST and CIFAR-10), while attaining state-of-the-art accuracies.
[ { "version": "v1", "created": "Mon, 7 Oct 2013 20:48:58 GMT" }, { "version": "v2", "created": "Mon, 21 Oct 2013 15:18:37 GMT" } ]
2013-10-22T00:00:00
[ [ "Agarwal", "Alekh", "" ], [ "Kakade", "Sham M.", "" ], [ "Karampatziakis", "Nikos", "" ], [ "Song", "Le", "" ], [ "Valiant", "Gregory", "" ] ]
TITLE: Least Squares Revisited: Scalable Approaches for Multi-class Prediction ABSTRACT: This work provides simple algorithms for multi-class (and multi-label) prediction in settings where both the number of examples n and the data dimension d are relatively large. These robust and parameter free algorithms are essentially iterative least-squares updates and very versatile both in theory and in practice. On the theoretical front, we present several variants with convergence guarantees. Owing to their effective use of second-order structure, these algorithms are substantially better than first-order methods in many practical scenarios. On the empirical side, we present a scalable stagewise variant of our approach, which achieves dramatic computational speedups over popular optimization packages such as Liblinear and Vowpal Wabbit on standard datasets (MNIST and CIFAR-10), while attaining state-of-the-art accuracies.
1310.4954
Miguel A. Martinez-Prieto
Sandra \'Alvarez-Garc\'ia and Nieves R. Brisaboa and Javier D. Fern\'andez and Miguel A. Mart\'inez-Prieto and Gonzalo Navarro
Compressed Vertical Partitioning for Full-In-Memory RDF Management
null
null
null
null
cs.DB cs.DS cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Web of Data has been gaining momentum and this leads to increasingly publish more semi-structured datasets following the RDF model, based on atomic triple units of subject, predicate, and object. Although it is a simple model, compression methods become necessary because datasets are increasingly larger and various scalability issues arise around their organization and storage. This requirement is more restrictive in RDF stores because efficient SPARQL resolution on the compressed RDF datasets is also required. This article introduces a novel RDF indexing technique (called k2-triples) supporting efficient SPARQL resolution in compressed space. k2-triples, uses the predicate to vertically partition the dataset into disjoint subsets of pairs (subject, object), one per predicate. These subsets are represented as binary matrices in which 1-bits mean that the corresponding triple exists in the dataset. This model results in very sparse matrices, which are efficiently compressed using k2-trees. We enhance this model with two compact indexes listing the predicates related to each different subject and object, in order to address the specific weaknesses of vertically partitioned representations. The resulting technique not only achieves by far the most compressed representations, but also the best overall performance for RDF retrieval in our experiments. Our approach uses up to 10 times less space than a state of the art baseline, and outperforms its performance by several order of magnitude on the most basic query patterns. In addition, we optimize traditional join algorithms on k2-triples and define a novel one leveraging its specific features. Our experimental results show that our technique overcomes traditional vertical partitioning for join resolution, reporting the best numbers for joins in which the non-joined nodes are provided, and being competitive in the majority of the cases.
[ { "version": "v1", "created": "Fri, 18 Oct 2013 08:58:01 GMT" }, { "version": "v2", "created": "Mon, 21 Oct 2013 09:00:47 GMT" } ]
2013-10-22T00:00:00
[ [ "Álvarez-García", "Sandra", "" ], [ "Brisaboa", "Nieves R.", "" ], [ "Fernández", "Javier D.", "" ], [ "Martínez-Prieto", "Miguel A.", "" ], [ "Navarro", "Gonzalo", "" ] ]
TITLE: Compressed Vertical Partitioning for Full-In-Memory RDF Management ABSTRACT: The Web of Data has been gaining momentum and this leads to increasingly publish more semi-structured datasets following the RDF model, based on atomic triple units of subject, predicate, and object. Although it is a simple model, compression methods become necessary because datasets are increasingly larger and various scalability issues arise around their organization and storage. This requirement is more restrictive in RDF stores because efficient SPARQL resolution on the compressed RDF datasets is also required. This article introduces a novel RDF indexing technique (called k2-triples) supporting efficient SPARQL resolution in compressed space. k2-triples, uses the predicate to vertically partition the dataset into disjoint subsets of pairs (subject, object), one per predicate. These subsets are represented as binary matrices in which 1-bits mean that the corresponding triple exists in the dataset. This model results in very sparse matrices, which are efficiently compressed using k2-trees. We enhance this model with two compact indexes listing the predicates related to each different subject and object, in order to address the specific weaknesses of vertically partitioned representations. The resulting technique not only achieves by far the most compressed representations, but also the best overall performance for RDF retrieval in our experiments. Our approach uses up to 10 times less space than a state of the art baseline, and outperforms its performance by several order of magnitude on the most basic query patterns. In addition, we optimize traditional join algorithms on k2-triples and define a novel one leveraging its specific features. Our experimental results show that our technique overcomes traditional vertical partitioning for join resolution, reporting the best numbers for joins in which the non-joined nodes are provided, and being competitive in the majority of the cases.
1310.5142
Hyun Joon Jung
Hyun Joon Jung and Matthew Lease
Crowdsourced Task Routing via Matrix Factorization
10 pages, 7 figures
null
null
null
cs.CY cs.IR
http://creativecommons.org/licenses/by-nc-sa/3.0/
We describe methods to predict a crowd worker's accuracy on new tasks based on his accuracy on past tasks. Such prediction provides a foundation for identifying the best workers to route work to in order to maximize accuracy on the new task. Our key insight is to model similarity of past tasks to the target task such that past task accuracies can be optimally integrated to predict target task accuracy. We describe two matrix factorization (MF) approaches from collaborative filtering which not only exploit such task similarity, but are known to be robust to sparse data. Experiments on synthetic and real-world datasets provide feasibility assessment and comparative evaluation of MF approaches vs. two baseline methods. Across a range of data scales and task similarity conditions, we evaluate: 1) prediction error over all workers; and 2) how well each method predicts the best workers to use for each task. Results show the benefit of task routing over random assignment, the strength of probabilistic MF over baseline methods, and the robustness of methods under different conditions.
[ { "version": "v1", "created": "Fri, 18 Oct 2013 14:37:24 GMT" } ]
2013-10-22T00:00:00
[ [ "Jung", "Hyun Joon", "" ], [ "Lease", "Matthew", "" ] ]
TITLE: Crowdsourced Task Routing via Matrix Factorization ABSTRACT: We describe methods to predict a crowd worker's accuracy on new tasks based on his accuracy on past tasks. Such prediction provides a foundation for identifying the best workers to route work to in order to maximize accuracy on the new task. Our key insight is to model similarity of past tasks to the target task such that past task accuracies can be optimally integrated to predict target task accuracy. We describe two matrix factorization (MF) approaches from collaborative filtering which not only exploit such task similarity, but are known to be robust to sparse data. Experiments on synthetic and real-world datasets provide feasibility assessment and comparative evaluation of MF approaches vs. two baseline methods. Across a range of data scales and task similarity conditions, we evaluate: 1) prediction error over all workers; and 2) how well each method predicts the best workers to use for each task. Results show the benefit of task routing over random assignment, the strength of probabilistic MF over baseline methods, and the robustness of methods under different conditions.
1310.5221
Sumeet Kaur Sehra
Sumeet Kaur Sehra, Yadwinder Singh Brar, Navdeep Kaur
Soft computing techniques for software effort estimation
null
International Journal of Advanced Computer and Mathematical Sciences Vol.2(3), November, 2011. pp:10-17
null
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The effort invested in a software project is probably one of the most important and most analyzed variables in recent years in the process of project management. The limitation of algorithmic effort prediction models is their inability to cope with uncertainties and imprecision surrounding software projects at the early development stage. More recently attention has turned to a variety of machine learning methods, and soft computing in particular to predict software development effort. Soft computing is a consortium of methodologies centering in fuzzy logic, artificial neural networks, and evolutionary computation. It is important, to mention here, that these methodologies are complementary and synergistic, rather than competitive. They provide in one form or another flexible information processing capability for handling real life ambiguous situations. These methodologies are currently used for reliable and accurate estimate of software development effort, which has always been a challenge for both the software industry and academia. The aim of this study is to analyze soft computing techniques in the existing models and to provide in depth review of software and project estimation techniques existing in industry and literature based on the different test datasets along with their strength and weaknesses
[ { "version": "v1", "created": "Sat, 19 Oct 2013 12:25:00 GMT" } ]
2013-10-22T00:00:00
[ [ "Sehra", "Sumeet Kaur", "" ], [ "Brar", "Yadwinder Singh", "" ], [ "Kaur", "Navdeep", "" ] ]
TITLE: Soft computing techniques for software effort estimation ABSTRACT: The effort invested in a software project is probably one of the most important and most analyzed variables in recent years in the process of project management. The limitation of algorithmic effort prediction models is their inability to cope with uncertainties and imprecision surrounding software projects at the early development stage. More recently attention has turned to a variety of machine learning methods, and soft computing in particular to predict software development effort. Soft computing is a consortium of methodologies centering in fuzzy logic, artificial neural networks, and evolutionary computation. It is important, to mention here, that these methodologies are complementary and synergistic, rather than competitive. They provide in one form or another flexible information processing capability for handling real life ambiguous situations. These methodologies are currently used for reliable and accurate estimate of software development effort, which has always been a challenge for both the software industry and academia. The aim of this study is to analyze soft computing techniques in the existing models and to provide in depth review of software and project estimation techniques existing in industry and literature based on the different test datasets along with their strength and weaknesses
1310.5249
Fabrice Rossi
Mohamed Khalil El Mahrsi (LTCI, SAMM), Fabrice Rossi (SAMM)
Graph-Based Approaches to Clustering Network-Constrained Trajectory Data
null
New Frontiers in Mining Complex Patterns, Appice, Annalisa and Ceci, Michelangelo and Loglisci, Corrado and Manco, Giuseppe and Masciari, Elio and Ras, Zbigniew (Ed.) (2013) 124-137
10.1007/978-3-642-37382-4_9
NFMCP2013
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Clustering trajectory data attracted considerable attention in the last few years. Most of prior work assumed that moving objects can move freely in an euclidean space and did not consider the eventual presence of an underlying road network and its influence on evaluating the similarity between trajectories. In this paper, we present an approach to clustering such network-constrained trajectory data. More precisely we aim at discovering groups of road segments that are often travelled by the same trajectories. To achieve this end, we model the interactions between segments w.r.t. their similarity as a weighted graph to which we apply a community detection algorithm to discover meaningful clusters. We showcase our proposition through experimental results obtained on synthetic datasets.
[ { "version": "v1", "created": "Sat, 19 Oct 2013 17:24:39 GMT" } ]
2013-10-22T00:00:00
[ [ "Mahrsi", "Mohamed Khalil El", "", "LTCI, SAMM" ], [ "Rossi", "Fabrice", "", "SAMM" ] ]
TITLE: Graph-Based Approaches to Clustering Network-Constrained Trajectory Data ABSTRACT: Clustering trajectory data attracted considerable attention in the last few years. Most of prior work assumed that moving objects can move freely in an euclidean space and did not consider the eventual presence of an underlying road network and its influence on evaluating the similarity between trajectories. In this paper, we present an approach to clustering such network-constrained trajectory data. More precisely we aim at discovering groups of road segments that are often travelled by the same trajectories. To achieve this end, we model the interactions between segments w.r.t. their similarity as a weighted graph to which we apply a community detection algorithm to discover meaningful clusters. We showcase our proposition through experimental results obtained on synthetic datasets.
1310.5430
Amit Goyal
Glenn S. Bevilacqua and Shealen Clare and Amit Goyal and Laks V. S. Lakshmanan
Validating Network Value of Influencers by means of Explanations
null
null
null
null
cs.SI physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recently, there has been significant interest in social influence analysis. One of the central problems in this area is the problem of identifying influencers, such that by convincing these users to perform a certain action (like buying a new product), a large number of other users get influenced to follow the action. The client of such an application is a marketer who would target these influencers for marketing a given new product, say by providing free samples or discounts. It is natural that before committing resources for targeting an influencer the marketer would be interested in validating the influence (or network value) of influencers returned. This requires digging deeper into such analytical questions as: who are their followers, on what actions (or products) they are influential, etc. However, the current approaches to identifying influencers largely work as a black box in this respect. The goal of this paper is to open up the black box, address these questions and provide informative and crisp explanations for validating the network value of influencers. We formulate the problem of providing explanations (called PROXI) as a discrete optimization problem of feature selection. We show that PROXI is not only NP-hard to solve exactly, it is NP-hard to approximate within any reasonable factor. Nevertheless, we show interesting properties of the objective function and develop an intuitive greedy heuristic. We perform detailed experimental analysis on two real world datasets - Twitter and Flixster, and show that our approach is useful in generating concise and insightful explanations of the influence distribution of users and that our greedy algorithm is effective and efficient with respect to several baselines.
[ { "version": "v1", "created": "Mon, 21 Oct 2013 06:05:48 GMT" } ]
2013-10-22T00:00:00
[ [ "Bevilacqua", "Glenn S.", "" ], [ "Clare", "Shealen", "" ], [ "Goyal", "Amit", "" ], [ "Lakshmanan", "Laks V. S.", "" ] ]
TITLE: Validating Network Value of Influencers by means of Explanations ABSTRACT: Recently, there has been significant interest in social influence analysis. One of the central problems in this area is the problem of identifying influencers, such that by convincing these users to perform a certain action (like buying a new product), a large number of other users get influenced to follow the action. The client of such an application is a marketer who would target these influencers for marketing a given new product, say by providing free samples or discounts. It is natural that before committing resources for targeting an influencer the marketer would be interested in validating the influence (or network value) of influencers returned. This requires digging deeper into such analytical questions as: who are their followers, on what actions (or products) they are influential, etc. However, the current approaches to identifying influencers largely work as a black box in this respect. The goal of this paper is to open up the black box, address these questions and provide informative and crisp explanations for validating the network value of influencers. We formulate the problem of providing explanations (called PROXI) as a discrete optimization problem of feature selection. We show that PROXI is not only NP-hard to solve exactly, it is NP-hard to approximate within any reasonable factor. Nevertheless, we show interesting properties of the objective function and develop an intuitive greedy heuristic. We perform detailed experimental analysis on two real world datasets - Twitter and Flixster, and show that our approach is useful in generating concise and insightful explanations of the influence distribution of users and that our greedy algorithm is effective and efficient with respect to several baselines.
1310.5468
Hamed Mahmoudi
Hamed Mahmoudi, Georgios Rodolakis, Leonidas Georgiadis, David Saad
Message-Passing Algorithms for Optimal Utilization of Cognitive Radio Networks
null
null
null
null
cs.IT cond-mat.stat-mech cs.NI math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Cognitive Radio has been proposed as a key technology to significantly improve spectrum usage in wireless networks by enabling unlicensed users to access unused resource. We present new algorithms that are needed for the implementation of opportunistic scheduling policies that maximize the throughput utilization of resources by secondary users, under maximum interference constraints imposed by existing primary users. Our approach is based on the Belief Propagation (BP) algorithm, which is advantageous due to its simplicity and potential for distributed implementation. We examine convergence properties and evaluate the performance of the proposed BP algorithms via simulations and demonstrate that the results compare favorably with a benchmark greedy strategy.
[ { "version": "v1", "created": "Mon, 21 Oct 2013 08:55:46 GMT" } ]
2013-10-22T00:00:00
[ [ "Mahmoudi", "Hamed", "" ], [ "Rodolakis", "Georgios", "" ], [ "Georgiadis", "Leonidas", "" ], [ "Saad", "David", "" ] ]
TITLE: Message-Passing Algorithms for Optimal Utilization of Cognitive Radio Networks ABSTRACT: Cognitive Radio has been proposed as a key technology to significantly improve spectrum usage in wireless networks by enabling unlicensed users to access unused resource. We present new algorithms that are needed for the implementation of opportunistic scheduling policies that maximize the throughput utilization of resources by secondary users, under maximum interference constraints imposed by existing primary users. Our approach is based on the Belief Propagation (BP) algorithm, which is advantageous due to its simplicity and potential for distributed implementation. We examine convergence properties and evaluate the performance of the proposed BP algorithms via simulations and demonstrate that the results compare favorably with a benchmark greedy strategy.
1310.5551
Albert Heinle
Albert Heinle, Viktor Levandovskyy, Andreas Nareike
SymbolicData:SDEval - Benchmarking for Everyone
null
null
null
null
cs.SC cs.MS cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we will present SDeval, a software project that contains tools for creating and running benchmarks with a focus on problems in computer algebra. It is built on top of the Symbolic Data project, able to translate problems in the database into executable code for various computer algebra systems. The included tools are designed to be very flexible to use and to extend, such that they can be utilized even in contexts of other communities. With the presentation of SDEval, we will also address particularities of benchmarking in the field of computer algebra. Furthermore, with SDEval, we provide a feasible and automatizable way of reproducing benchmarks published in current research works, which appears to be a difficult task in general due to the customizability of the available programs. We will simultaneously present the current developments in the Symbolic Data project.
[ { "version": "v1", "created": "Fri, 18 Oct 2013 19:58:03 GMT" } ]
2013-10-22T00:00:00
[ [ "Heinle", "Albert", "" ], [ "Levandovskyy", "Viktor", "" ], [ "Nareike", "Andreas", "" ] ]
TITLE: SymbolicData:SDEval - Benchmarking for Everyone ABSTRACT: In this paper we will present SDeval, a software project that contains tools for creating and running benchmarks with a focus on problems in computer algebra. It is built on top of the Symbolic Data project, able to translate problems in the database into executable code for various computer algebra systems. The included tools are designed to be very flexible to use and to extend, such that they can be utilized even in contexts of other communities. With the presentation of SDEval, we will also address particularities of benchmarking in the field of computer algebra. Furthermore, with SDEval, we provide a feasible and automatizable way of reproducing benchmarks published in current research works, which appears to be a difficult task in general due to the customizability of the available programs. We will simultaneously present the current developments in the Symbolic Data project.
1310.5603
Jie Yan
Jie Yan, Guangming Tan, Ninghui Sun
GRE: A Graph Runtime Engine for Large-Scale Distributed Graph-Parallel Applications
12 pages, also submitted to PVLDB
null
null
null
cs.DC
http://creativecommons.org/licenses/by-nc-sa/3.0/
Large-scale distributed graph-parallel computing is challenging. On one hand, due to the irregular computation pattern and lack of locality, it is hard to express parallelism efficiently. On the other hand, due to the scale-free nature, real-world graphs are hard to partition in balance with low cut. To address these challenges, several graph-parallel frameworks including Pregel and GraphLab (PowerGraph) have been developed recently. In this paper, we present an alternative framework, Graph Runtime Engine (GRE). While retaining the vertex-centric programming model, GRE proposes two new abstractions: 1) a Scatter-Combine computation model based on active message to exploit massive fined-grained edge-level parallelism, and 2) a Agent-Graph data model based on vertex factorization to partition and represent directed graphs. GRE is implemented on commercial off-the-shelf multi-core cluster. We experimentally evaluate GRE with three benchmark programs (PageRank, Single Source Shortest Path and Connected Components) on real-world and synthetic graphs of millions billion of vertices. Compared to PowerGraph, GRE shows 2.5~17 times better performance on 8~16 machines (192 cores). Specifically, the PageRank in GRE is the fastest when comparing to counterparts of other frameworks (PowerGraph, Spark,Twister) reported in public literatures. Besides, GRE significantly optimizes memory usage so that it can process a large graph of 1 billion vertices and 17 billion edges on our cluster with totally 768GB memory, while PowerGraph can only process less than half of this graph scale.
[ { "version": "v1", "created": "Mon, 21 Oct 2013 15:32:16 GMT" } ]
2013-10-22T00:00:00
[ [ "Yan", "Jie", "" ], [ "Tan", "Guangming", "" ], [ "Sun", "Ninghui", "" ] ]
TITLE: GRE: A Graph Runtime Engine for Large-Scale Distributed Graph-Parallel Applications ABSTRACT: Large-scale distributed graph-parallel computing is challenging. On one hand, due to the irregular computation pattern and lack of locality, it is hard to express parallelism efficiently. On the other hand, due to the scale-free nature, real-world graphs are hard to partition in balance with low cut. To address these challenges, several graph-parallel frameworks including Pregel and GraphLab (PowerGraph) have been developed recently. In this paper, we present an alternative framework, Graph Runtime Engine (GRE). While retaining the vertex-centric programming model, GRE proposes two new abstractions: 1) a Scatter-Combine computation model based on active message to exploit massive fined-grained edge-level parallelism, and 2) a Agent-Graph data model based on vertex factorization to partition and represent directed graphs. GRE is implemented on commercial off-the-shelf multi-core cluster. We experimentally evaluate GRE with three benchmark programs (PageRank, Single Source Shortest Path and Connected Components) on real-world and synthetic graphs of millions billion of vertices. Compared to PowerGraph, GRE shows 2.5~17 times better performance on 8~16 machines (192 cores). Specifically, the PageRank in GRE is the fastest when comparing to counterparts of other frameworks (PowerGraph, Spark,Twister) reported in public literatures. Besides, GRE significantly optimizes memory usage so that it can process a large graph of 1 billion vertices and 17 billion edges on our cluster with totally 768GB memory, while PowerGraph can only process less than half of this graph scale.
1310.2700
Marvin Weinstein
M. Weinstein, F. Meirer, A. Hume, Ph. Sciau, G. Shaked, R. Hofstetter, E. Persi, A. Mehta, and D. Horn
Analyzing Big Data with Dynamic Quantum Clustering
37 pages, 22 figures, 1 Table
null
null
null
physics.data-an cs.LG physics.comp-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
How does one search for a needle in a multi-dimensional haystack without knowing what a needle is and without knowing if there is one in the haystack? This kind of problem requires a paradigm shift - away from hypothesis driven searches of the data - towards a methodology that lets the data speak for itself. Dynamic Quantum Clustering (DQC) is such a methodology. DQC is a powerful visual method that works with big, high-dimensional data. It exploits variations of the density of the data (in feature space) and unearths subsets of the data that exhibit correlations among all the measured variables. The outcome of a DQC analysis is a movie that shows how and why sets of data-points are eventually classified as members of simple clusters or as members of - what we call - extended structures. This allows DQC to be successfully used in a non-conventional exploratory mode where one searches data for unexpected information without the need to model the data. We show how this works for big, complex, real-world datasets that come from five distinct fields: i.e., x-ray nano-chemistry, condensed matter, biology, seismology and finance. These studies show how DQC excels at uncovering unexpected, small - but meaningful - subsets of the data that contain important information. We also establish an important new result: namely, that big, complex datasets often contain interesting structures that will be missed by many conventional clustering techniques. Experience shows that these structures appear frequently enough that it is crucial to know they can exist, and that when they do, they encode important hidden information. In short, we not only demonstrate that DQC can be flexibly applied to datasets that present significantly different challenges, we also show how a simple analysis can be used to look for the needle in the haystack, determine what it is, and find what this means.
[ { "version": "v1", "created": "Thu, 10 Oct 2013 04:00:03 GMT" }, { "version": "v2", "created": "Thu, 17 Oct 2013 21:06:22 GMT" } ]
2013-10-21T00:00:00
[ [ "Weinstein", "M.", "" ], [ "Meirer", "F.", "" ], [ "Hume", "A.", "" ], [ "Sciau", "Ph.", "" ], [ "Shaked", "G.", "" ], [ "Hofstetter", "R.", "" ], [ "Persi", "E.", "" ], [ "Mehta", "A.", "" ], [ "Horn", "D.", "" ] ]
TITLE: Analyzing Big Data with Dynamic Quantum Clustering ABSTRACT: How does one search for a needle in a multi-dimensional haystack without knowing what a needle is and without knowing if there is one in the haystack? This kind of problem requires a paradigm shift - away from hypothesis driven searches of the data - towards a methodology that lets the data speak for itself. Dynamic Quantum Clustering (DQC) is such a methodology. DQC is a powerful visual method that works with big, high-dimensional data. It exploits variations of the density of the data (in feature space) and unearths subsets of the data that exhibit correlations among all the measured variables. The outcome of a DQC analysis is a movie that shows how and why sets of data-points are eventually classified as members of simple clusters or as members of - what we call - extended structures. This allows DQC to be successfully used in a non-conventional exploratory mode where one searches data for unexpected information without the need to model the data. We show how this works for big, complex, real-world datasets that come from five distinct fields: i.e., x-ray nano-chemistry, condensed matter, biology, seismology and finance. These studies show how DQC excels at uncovering unexpected, small - but meaningful - subsets of the data that contain important information. We also establish an important new result: namely, that big, complex datasets often contain interesting structures that will be missed by many conventional clustering techniques. Experience shows that these structures appear frequently enough that it is crucial to know they can exist, and that when they do, they encode important hidden information. In short, we not only demonstrate that DQC can be flexibly applied to datasets that present significantly different challenges, we also show how a simple analysis can be used to look for the needle in the haystack, determine what it is, and find what this means.
1310.5089
Gustavo Camps-Valls
Jer\'onimo Arenas-Garc\'ia, Kaare Brandt Petersen, Gustavo Camps-Valls, Lars Kai Hansen
Kernel Multivariate Analysis Framework for Supervised Subspace Learning: A Tutorial on Linear and Kernel Multivariate Methods
null
IEEE Signal Processing Magazine, 30(4), 16-29, 2013
10.1109/MSP.2013.2250591
null
stat.ML cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Feature extraction and dimensionality reduction are important tasks in many fields of science dealing with signal processing and analysis. The relevance of these techniques is increasing as current sensory devices are developed with ever higher resolution, and problems involving multimodal data sources become more common. A plethora of feature extraction methods are available in the literature collectively grouped under the field of Multivariate Analysis (MVA). This paper provides a uniform treatment of several methods: Principal Component Analysis (PCA), Partial Least Squares (PLS), Canonical Correlation Analysis (CCA) and Orthonormalized PLS (OPLS), as well as their non-linear extensions derived by means of the theory of reproducing kernel Hilbert spaces. We also review their connections to other methods for classification and statistical dependence estimation, and introduce some recent developments to deal with the extreme cases of large-scale and low-sized problems. To illustrate the wide applicability of these methods in both classification and regression problems, we analyze their performance in a benchmark of publicly available data sets, and pay special attention to specific real applications involving audio processing for music genre prediction and hyperspectral satellite images for Earth and climate monitoring.
[ { "version": "v1", "created": "Fri, 18 Oct 2013 16:44:05 GMT" } ]
2013-10-21T00:00:00
[ [ "Arenas-García", "Jerónimo", "" ], [ "Petersen", "Kaare Brandt", "" ], [ "Camps-Valls", "Gustavo", "" ], [ "Hansen", "Lars Kai", "" ] ]
TITLE: Kernel Multivariate Analysis Framework for Supervised Subspace Learning: A Tutorial on Linear and Kernel Multivariate Methods ABSTRACT: Feature extraction and dimensionality reduction are important tasks in many fields of science dealing with signal processing and analysis. The relevance of these techniques is increasing as current sensory devices are developed with ever higher resolution, and problems involving multimodal data sources become more common. A plethora of feature extraction methods are available in the literature collectively grouped under the field of Multivariate Analysis (MVA). This paper provides a uniform treatment of several methods: Principal Component Analysis (PCA), Partial Least Squares (PLS), Canonical Correlation Analysis (CCA) and Orthonormalized PLS (OPLS), as well as their non-linear extensions derived by means of the theory of reproducing kernel Hilbert spaces. We also review their connections to other methods for classification and statistical dependence estimation, and introduce some recent developments to deal with the extreme cases of large-scale and low-sized problems. To illustrate the wide applicability of these methods in both classification and regression problems, we analyze their performance in a benchmark of publicly available data sets, and pay special attention to specific real applications involving audio processing for music genre prediction and hyperspectral satellite images for Earth and climate monitoring.
1308.6206
Erich Teppan
Erich Christian Teppan and Gerhard Friedrich
The Partner Units Configuration Problem: Completing the Picture
30 pages, 14 figures
null
null
null
cs.AI cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The partner units problem (PUP) is an acknowledged hard benchmark problem for the Logic Programming community with various industrial application fields like surveillance, electrical engineering, computer networks or railway safety systems. However, computational complexity remained widely unclear so far. In this paper we provide all missing complexity results making the PUP better exploitable for benchmark testing. Furthermore, we present QuickPup, a heuristic search algorithm for PUP instances which outperforms all state-of-the-art solving approaches and which is already in use in real world industrial configuration environments.
[ { "version": "v1", "created": "Wed, 28 Aug 2013 16:29:42 GMT" }, { "version": "v2", "created": "Fri, 11 Oct 2013 11:41:40 GMT" }, { "version": "v3", "created": "Thu, 17 Oct 2013 11:37:23 GMT" } ]
2013-10-18T00:00:00
[ [ "Teppan", "Erich Christian", "" ], [ "Friedrich", "Gerhard", "" ] ]
TITLE: The Partner Units Configuration Problem: Completing the Picture ABSTRACT: The partner units problem (PUP) is an acknowledged hard benchmark problem for the Logic Programming community with various industrial application fields like surveillance, electrical engineering, computer networks or railway safety systems. However, computational complexity remained widely unclear so far. In this paper we provide all missing complexity results making the PUP better exploitable for benchmark testing. Furthermore, we present QuickPup, a heuristic search algorithm for PUP instances which outperforms all state-of-the-art solving approaches and which is already in use in real world industrial configuration environments.
1310.4579
Abir De
Abir De, Niloy Ganguly, Soumen Chakrabarti
Discriminative Link Prediction using Local Links, Node Features and Community Structure
10 pages, 5 figures
null
null
null
cs.LG cs.SI physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A link prediction (LP) algorithm is given a graph, and has to rank, for each node, other nodes that are candidates for new linkage. LP is strongly motivated by social search and recommendation applications. LP techniques often focus on global properties (graph conductance, hitting or commute times, Katz score) or local properties (Adamic-Adar and many variations, or node feature vectors), but rarely combine these signals. Furthermore, neither of these extremes exploit link densities at the intermediate level of communities. In this paper we describe a discriminative LP algorithm that exploits two new signals. First, a co-clustering algorithm provides community level link density estimates, which are used to qualify observed links with a surprise value. Second, links in the immediate neighborhood of the link to be predicted are not interpreted at face value, but through a local model of node feature similarities. These signals are combined into a discriminative link predictor. We evaluate the new predictor using five diverse data sets that are standard in the literature. We report on significant accuracy boosts compared to standard LP methods (including Adamic-Adar and random walk). Apart from the new predictor, another contribution is a rigorous protocol for benchmarking and reporting LP algorithms, which reveals the regions of strengths and weaknesses of all the predictors studied here, and establishes the new proposal as the most robust.
[ { "version": "v1", "created": "Thu, 17 Oct 2013 04:21:37 GMT" } ]
2013-10-18T00:00:00
[ [ "De", "Abir", "" ], [ "Ganguly", "Niloy", "" ], [ "Chakrabarti", "Soumen", "" ] ]
TITLE: Discriminative Link Prediction using Local Links, Node Features and Community Structure ABSTRACT: A link prediction (LP) algorithm is given a graph, and has to rank, for each node, other nodes that are candidates for new linkage. LP is strongly motivated by social search and recommendation applications. LP techniques often focus on global properties (graph conductance, hitting or commute times, Katz score) or local properties (Adamic-Adar and many variations, or node feature vectors), but rarely combine these signals. Furthermore, neither of these extremes exploit link densities at the intermediate level of communities. In this paper we describe a discriminative LP algorithm that exploits two new signals. First, a co-clustering algorithm provides community level link density estimates, which are used to qualify observed links with a surprise value. Second, links in the immediate neighborhood of the link to be predicted are not interpreted at face value, but through a local model of node feature similarities. These signals are combined into a discriminative link predictor. We evaluate the new predictor using five diverse data sets that are standard in the literature. We report on significant accuracy boosts compared to standard LP methods (including Adamic-Adar and random walk). Apart from the new predictor, another contribution is a rigorous protocol for benchmarking and reporting LP algorithms, which reveals the regions of strengths and weaknesses of all the predictors studied here, and establishes the new proposal as the most robust.
1310.4759
Erik Rodner
Christoph G\"oring, Alexander Freytag, Erik Rodner, Joachim Denzler
Fine-grained Categorization -- Short Summary of our Entry for the ImageNet Challenge 2012
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we tackle the problem of visual categorization of dog breeds, which is a surprisingly challenging task due to simultaneously present low interclass distances and high intra-class variances. Our approach combines several techniques well known in our community but often not utilized for fine-grained recognition: (1) automatic segmentation, (2) efficient part detection, and (3) combination of multiple features. In particular, we demonstrate that a simple head detector embedded in an off-the-shelf recognition pipeline can improve recognition accuracy quite significantly, highlighting the importance of part features for fine-grained recognition tasks. Using our approach, we achieved a 24.59% mean average precision performance on the Stanford dog dataset.
[ { "version": "v1", "created": "Thu, 17 Oct 2013 16:11:53 GMT" } ]
2013-10-18T00:00:00
[ [ "Göring", "Christoph", "" ], [ "Freytag", "Alexander", "" ], [ "Rodner", "Erik", "" ], [ "Denzler", "Joachim", "" ] ]
TITLE: Fine-grained Categorization -- Short Summary of our Entry for the ImageNet Challenge 2012 ABSTRACT: In this paper, we tackle the problem of visual categorization of dog breeds, which is a surprisingly challenging task due to simultaneously present low interclass distances and high intra-class variances. Our approach combines several techniques well known in our community but often not utilized for fine-grained recognition: (1) automatic segmentation, (2) efficient part detection, and (3) combination of multiple features. In particular, we demonstrate that a simple head detector embedded in an off-the-shelf recognition pipeline can improve recognition accuracy quite significantly, highlighting the importance of part features for fine-grained recognition tasks. Using our approach, we achieved a 24.59% mean average precision performance on the Stanford dog dataset.
1302.0420
Francisco Couto
Francisco M Couto, Daniel Faria, Bruno Tavares, Pedro Gon\c{c}alves, Paulo Verissimo
Benchmarking some Portuguese S&T system research units: 2nd Edition
26 pages, 20 figures F. Couto, D. Faria, B. Tavares, P. Gon\c{c}alves, and P. Verissimo, Benchmarking some portuguese S\&T system research units: 2nd edition, DI/FCUL TR 13-03, Department of Informatics, University of Lisbon, February 2013
null
null
DI--FCUL--TR--2013--03
cs.DL cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The increasing use of productivity and impact metrics for evaluation and comparison, not only of individual researchers but also of institutions, universities and even countries, has prompted the development of bibliometrics. Currently, metrics are becoming widely accepted as an easy and balanced way to assist the peer review and evaluation of scientists and/or research units, provided they have adequate precision and recall. This paper presents a benchmarking study of a selected list of representative Portuguese research units, based on a fairly complete set of parameters: bibliometric parameters, number of competitive projects and number of PhDs produced. The study aimed at collecting productivity and impact data from the selected research units in comparable conditions i.e., using objective metrics based on public information, retrievable on-line and/or from official sources and thus verifiable and repeatable. The study has thus focused on the activity of the 2003-06 period, where such data was available from the latest official evaluation. The main advantage of our study was the application of automatic tools, achieving relevant results at a reduced cost. Moreover, the results over the selected units suggest that this kind of analyses will be very useful to benchmark scientific productivity and impact, and assist peer review.
[ { "version": "v1", "created": "Sat, 2 Feb 2013 19:36:14 GMT" }, { "version": "v2", "created": "Wed, 20 Feb 2013 15:29:56 GMT" }, { "version": "v3", "created": "Wed, 16 Oct 2013 16:13:25 GMT" } ]
2013-10-17T00:00:00
[ [ "Couto", "Francisco M", "" ], [ "Faria", "Daniel", "" ], [ "Tavares", "Bruno", "" ], [ "Gonçalves", "Pedro", "" ], [ "Verissimo", "Paulo", "" ] ]
TITLE: Benchmarking some Portuguese S&T system research units: 2nd Edition ABSTRACT: The increasing use of productivity and impact metrics for evaluation and comparison, not only of individual researchers but also of institutions, universities and even countries, has prompted the development of bibliometrics. Currently, metrics are becoming widely accepted as an easy and balanced way to assist the peer review and evaluation of scientists and/or research units, provided they have adequate precision and recall. This paper presents a benchmarking study of a selected list of representative Portuguese research units, based on a fairly complete set of parameters: bibliometric parameters, number of competitive projects and number of PhDs produced. The study aimed at collecting productivity and impact data from the selected research units in comparable conditions i.e., using objective metrics based on public information, retrievable on-line and/or from official sources and thus verifiable and repeatable. The study has thus focused on the activity of the 2003-06 period, where such data was available from the latest official evaluation. The main advantage of our study was the application of automatic tools, achieving relevant results at a reduced cost. Moreover, the results over the selected units suggest that this kind of analyses will be very useful to benchmark scientific productivity and impact, and assist peer review.
1304.5583
Ameet Talwalkar
Ameet Talwalkar, Lester Mackey, Yadong Mu, Shih-Fu Chang, Michael I. Jordan
Distributed Low-rank Subspace Segmentation
null
null
null
null
cs.CV cs.DC cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Vision problems ranging from image clustering to motion segmentation to semi-supervised learning can naturally be framed as subspace segmentation problems, in which one aims to recover multiple low-dimensional subspaces from noisy and corrupted input data. Low-Rank Representation (LRR), a convex formulation of the subspace segmentation problem, is provably and empirically accurate on small problems but does not scale to the massive sizes of modern vision datasets. Moreover, past work aimed at scaling up low-rank matrix factorization is not applicable to LRR given its non-decomposable constraints. In this work, we propose a novel divide-and-conquer algorithm for large-scale subspace segmentation that can cope with LRR's non-decomposable constraints and maintains LRR's strong recovery guarantees. This has immediate implications for the scalability of subspace segmentation, which we demonstrate on a benchmark face recognition dataset and in simulations. We then introduce novel applications of LRR-based subspace segmentation to large-scale semi-supervised learning for multimedia event detection, concept detection, and image tagging. In each case, we obtain state-of-the-art results and order-of-magnitude speed ups.
[ { "version": "v1", "created": "Sat, 20 Apr 2013 03:54:48 GMT" }, { "version": "v2", "created": "Wed, 16 Oct 2013 02:55:18 GMT" } ]
2013-10-17T00:00:00
[ [ "Talwalkar", "Ameet", "" ], [ "Mackey", "Lester", "" ], [ "Mu", "Yadong", "" ], [ "Chang", "Shih-Fu", "" ], [ "Jordan", "Michael I.", "" ] ]
TITLE: Distributed Low-rank Subspace Segmentation ABSTRACT: Vision problems ranging from image clustering to motion segmentation to semi-supervised learning can naturally be framed as subspace segmentation problems, in which one aims to recover multiple low-dimensional subspaces from noisy and corrupted input data. Low-Rank Representation (LRR), a convex formulation of the subspace segmentation problem, is provably and empirically accurate on small problems but does not scale to the massive sizes of modern vision datasets. Moreover, past work aimed at scaling up low-rank matrix factorization is not applicable to LRR given its non-decomposable constraints. In this work, we propose a novel divide-and-conquer algorithm for large-scale subspace segmentation that can cope with LRR's non-decomposable constraints and maintains LRR's strong recovery guarantees. This has immediate implications for the scalability of subspace segmentation, which we demonstrate on a benchmark face recognition dataset and in simulations. We then introduce novel applications of LRR-based subspace segmentation to large-scale semi-supervised learning for multimedia event detection, concept detection, and image tagging. In each case, we obtain state-of-the-art results and order-of-magnitude speed ups.
1304.7284
Zenglin Xu
Shandian Zhe, Zenglin Xu, and Yuan Qi
Supervised Heterogeneous Multiview Learning for Joint Association Study and Disease Diagnosis
null
null
null
null
cs.LG cs.CE stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Given genetic variations and various phenotypical traits, such as Magnetic Resonance Imaging (MRI) features, we consider two important and related tasks in biomedical research: i)to select genetic and phenotypical markers for disease diagnosis and ii) to identify associations between genetic and phenotypical data. These two tasks are tightly coupled because underlying associations between genetic variations and phenotypical features contain the biological basis for a disease. While a variety of sparse models have been applied for disease diagnosis and canonical correlation analysis and its extensions have bee widely used in association studies (e.g., eQTL analysis), these two tasks have been treated separately. To unify these two tasks, we present a new sparse Bayesian approach for joint association study and disease diagnosis. In this approach, common latent features are extracted from different data sources based on sparse projection matrices and used to predict multiple disease severity levels based on Gaussian process ordinal regression; in return, the disease status is used to guide the discovery of relationships between the data sources. The sparse projection matrices not only reveal interactions between data sources but also select groups of biomarkers related to the disease. To learn the model from data, we develop an efficient variational expectation maximization algorithm. Simulation results demonstrate that our approach achieves higher accuracy in both predicting ordinal labels and discovering associations between data sources than alternative methods. We apply our approach to an imaging genetics dataset for the study of Alzheimer's Disease (AD). Our method identifies biologically meaningful relationships between genetic variations, MRI features, and AD status, and achieves significantly higher accuracy for predicting ordinal AD stages than the competing methods.
[ { "version": "v1", "created": "Fri, 26 Apr 2013 20:47:46 GMT" }, { "version": "v2", "created": "Wed, 16 Oct 2013 07:04:04 GMT" } ]
2013-10-17T00:00:00
[ [ "Zhe", "Shandian", "" ], [ "Xu", "Zenglin", "" ], [ "Qi", "Yuan", "" ] ]
TITLE: Supervised Heterogeneous Multiview Learning for Joint Association Study and Disease Diagnosis ABSTRACT: Given genetic variations and various phenotypical traits, such as Magnetic Resonance Imaging (MRI) features, we consider two important and related tasks in biomedical research: i)to select genetic and phenotypical markers for disease diagnosis and ii) to identify associations between genetic and phenotypical data. These two tasks are tightly coupled because underlying associations between genetic variations and phenotypical features contain the biological basis for a disease. While a variety of sparse models have been applied for disease diagnosis and canonical correlation analysis and its extensions have bee widely used in association studies (e.g., eQTL analysis), these two tasks have been treated separately. To unify these two tasks, we present a new sparse Bayesian approach for joint association study and disease diagnosis. In this approach, common latent features are extracted from different data sources based on sparse projection matrices and used to predict multiple disease severity levels based on Gaussian process ordinal regression; in return, the disease status is used to guide the discovery of relationships between the data sources. The sparse projection matrices not only reveal interactions between data sources but also select groups of biomarkers related to the disease. To learn the model from data, we develop an efficient variational expectation maximization algorithm. Simulation results demonstrate that our approach achieves higher accuracy in both predicting ordinal labels and discovering associations between data sources than alternative methods. We apply our approach to an imaging genetics dataset for the study of Alzheimer's Disease (AD). Our method identifies biologically meaningful relationships between genetic variations, MRI features, and AD status, and achieves significantly higher accuracy for predicting ordinal AD stages than the competing methods.
1310.4217
Bingni Brunton
B. W. Brunton, S. L. Brunton, J. L. Proctor, and J. N. Kutz
Optimal Sensor Placement and Enhanced Sparsity for Classification
13 pages, 11 figures
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The goal of compressive sensing is efficient reconstruction of data from few measurements, sometimes leading to a categorical decision. If only classification is required, reconstruction can be circumvented and the measurements needed are orders-of-magnitude sparser still. We define enhanced sparsity as the reduction in number of measurements required for classification over reconstruction. In this work, we exploit enhanced sparsity and learn spatial sensor locations that optimally inform a categorical decision. The algorithm solves an l1-minimization to find the fewest entries of the full measurement vector that exactly reconstruct the discriminant vector in feature space. Once the sensor locations have been identified from the training data, subsequent test samples are classified with remarkable efficiency, achieving performance comparable to that obtained by discrimination using the full image. Sensor locations may be learned from full images, or from a random subsample of pixels. For classification between more than two categories, we introduce a coupling parameter whose value tunes the number of sensors selected, trading accuracy for economy. We demonstrate the algorithm on example datasets from image recognition using PCA for feature extraction and LDA for discrimination; however, the method can be broadly applied to non-image data and adapted to work with other methods for feature extraction and discrimination.
[ { "version": "v1", "created": "Tue, 15 Oct 2013 21:41:17 GMT" } ]
2013-10-17T00:00:00
[ [ "Brunton", "B. W.", "" ], [ "Brunton", "S. L.", "" ], [ "Proctor", "J. L.", "" ], [ "Kutz", "J. N.", "" ] ]
TITLE: Optimal Sensor Placement and Enhanced Sparsity for Classification ABSTRACT: The goal of compressive sensing is efficient reconstruction of data from few measurements, sometimes leading to a categorical decision. If only classification is required, reconstruction can be circumvented and the measurements needed are orders-of-magnitude sparser still. We define enhanced sparsity as the reduction in number of measurements required for classification over reconstruction. In this work, we exploit enhanced sparsity and learn spatial sensor locations that optimally inform a categorical decision. The algorithm solves an l1-minimization to find the fewest entries of the full measurement vector that exactly reconstruct the discriminant vector in feature space. Once the sensor locations have been identified from the training data, subsequent test samples are classified with remarkable efficiency, achieving performance comparable to that obtained by discrimination using the full image. Sensor locations may be learned from full images, or from a random subsample of pixels. For classification between more than two categories, we introduce a coupling parameter whose value tunes the number of sensors selected, trading accuracy for economy. We demonstrate the algorithm on example datasets from image recognition using PCA for feature extraction and LDA for discrimination; however, the method can be broadly applied to non-image data and adapted to work with other methods for feature extraction and discrimination.
1310.4485
Baochang Zhang
Juan Liu, Baochang Zhang, Linlin Shen, Jianzhuang Liu, Jason Zhao
The BeiHang Keystroke Dynamics Authentication System
25 pages,17 figures,5 tables
null
null
null
cs.CR cs.LG
http://creativecommons.org/licenses/by/3.0/
Keystroke Dynamics is an important biometric solution for person authentication. Based upon keystroke dynamics, this paper designs an embedded password protection device, develops an online system, collects two public databases for promoting the research on keystroke authentication, exploits the Gabor filter bank to characterize keystroke dynamics, and provides benchmark results of three popular classification algorithms, one-class support vector machine, Gaussian classifier, and nearest neighbour classifier.
[ { "version": "v1", "created": "Tue, 15 Oct 2013 12:12:44 GMT" } ]
2013-10-17T00:00:00
[ [ "Liu", "Juan", "" ], [ "Zhang", "Baochang", "" ], [ "Shen", "Linlin", "" ], [ "Liu", "Jianzhuang", "" ], [ "Zhao", "Jason", "" ] ]
TITLE: The BeiHang Keystroke Dynamics Authentication System ABSTRACT: Keystroke Dynamics is an important biometric solution for person authentication. Based upon keystroke dynamics, this paper designs an embedded password protection device, develops an online system, collects two public databases for promoting the research on keystroke authentication, exploits the Gabor filter bank to characterize keystroke dynamics, and provides benchmark results of three popular classification algorithms, one-class support vector machine, Gaussian classifier, and nearest neighbour classifier.
1310.3939
Domenico Sacca'
Domenico Sacca', Edoardo Serra, Pietro Dicosta, Antonio Piccolo
Multi-Sorted Inverse Frequent Itemsets Mining
14 pages
null
null
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The development of novel platforms and techniques for emerging "Big Data" applications requires the availability of real-life datasets for data-driven experiments, which are however out of reach for academic research in most cases as they are typically proprietary. A possible solution is to use synthesized datasets that reflect patterns of real ones in order to ensure high quality experimental findings. A first step in this direction is to use inverse mining techniques such as inverse frequent itemset mining (IFM) that consists of generating a transactional database satisfying given support constraints on the itemsets in an input set, that are typically the frequent ones. This paper introduces an extension of IFM, called many-sorted IFM, where the schemes for the datasets to be generated are those typical of Big Tables as required in emerging big data applications, e.g., social network analytics.
[ { "version": "v1", "created": "Tue, 15 Oct 2013 07:38:36 GMT" } ]
2013-10-16T00:00:00
[ [ "Sacca'", "Domenico", "" ], [ "Serra", "Edoardo", "" ], [ "Dicosta", "Pietro", "" ], [ "Piccolo", "Antonio", "" ] ]
TITLE: Multi-Sorted Inverse Frequent Itemsets Mining ABSTRACT: The development of novel platforms and techniques for emerging "Big Data" applications requires the availability of real-life datasets for data-driven experiments, which are however out of reach for academic research in most cases as they are typically proprietary. A possible solution is to use synthesized datasets that reflect patterns of real ones in order to ensure high quality experimental findings. A first step in this direction is to use inverse mining techniques such as inverse frequent itemset mining (IFM) that consists of generating a transactional database satisfying given support constraints on the itemsets in an input set, that are typically the frequent ones. This paper introduces an extension of IFM, called many-sorted IFM, where the schemes for the datasets to be generated are those typical of Big Tables as required in emerging big data applications, e.g., social network analytics.
1310.4136
Thiago S. F. X. Teixeira
Thiago S. F. X. Teixeira, George Teodoro, Eduardo Valle, Joel H. Saltz
Scalable Locality-Sensitive Hashing for Similarity Search in High-Dimensional, Large-Scale Multimedia Datasets
null
null
null
null
cs.DC cs.DB cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Similarity search is critical for many database applications, including the increasingly popular online services for Content-Based Multimedia Retrieval (CBMR). These services, which include image search engines, must handle an overwhelming volume of data, while keeping low response times. Thus, scalability is imperative for similarity search in Web-scale applications, but most existing methods are sequential and target shared-memory machines. Here we address these issues with a distributed, efficient, and scalable index based on Locality-Sensitive Hashing (LSH). LSH is one of the most efficient and popular techniques for similarity search, but its poor referential locality properties has made its implementation a challenging problem. Our solution is based on a widely asynchronous dataflow parallelization with a number of optimizations that include a hierarchical parallelization to decouple indexing and data storage, locality-aware data partition strategies to reduce message passing, and multi-probing to limit memory usage. The proposed parallelization attained an efficiency of 90% in a distributed system with about 800 CPU cores. In particular, the original locality-aware data partition reduced the number of messages exchanged in 30%. Our parallel LSH was evaluated using the largest public dataset for similarity search (to the best of our knowledge) with $10^9$ 128-d SIFT descriptors extracted from Web images. This is two orders of magnitude larger than datasets that previous LSH parallelizations could handle.
[ { "version": "v1", "created": "Tue, 15 Oct 2013 18:21:39 GMT" } ]
2013-10-16T00:00:00
[ [ "Teixeira", "Thiago S. F. X.", "" ], [ "Teodoro", "George", "" ], [ "Valle", "Eduardo", "" ], [ "Saltz", "Joel H.", "" ] ]
TITLE: Scalable Locality-Sensitive Hashing for Similarity Search in High-Dimensional, Large-Scale Multimedia Datasets ABSTRACT: Similarity search is critical for many database applications, including the increasingly popular online services for Content-Based Multimedia Retrieval (CBMR). These services, which include image search engines, must handle an overwhelming volume of data, while keeping low response times. Thus, scalability is imperative for similarity search in Web-scale applications, but most existing methods are sequential and target shared-memory machines. Here we address these issues with a distributed, efficient, and scalable index based on Locality-Sensitive Hashing (LSH). LSH is one of the most efficient and popular techniques for similarity search, but its poor referential locality properties has made its implementation a challenging problem. Our solution is based on a widely asynchronous dataflow parallelization with a number of optimizations that include a hierarchical parallelization to decouple indexing and data storage, locality-aware data partition strategies to reduce message passing, and multi-probing to limit memory usage. The proposed parallelization attained an efficiency of 90% in a distributed system with about 800 CPU cores. In particular, the original locality-aware data partition reduced the number of messages exchanged in 30%. Our parallel LSH was evaluated using the largest public dataset for similarity search (to the best of our knowledge) with $10^9$ 128-d SIFT descriptors extracted from Web images. This is two orders of magnitude larger than datasets that previous LSH parallelizations could handle.
1110.3717
Gunnar W. Klau
C. Staiger, S. Cadot, R. Kooter, M. Dittrich, T. Mueller, G. W. Klau, L. F. A. Wessels
A critical evaluation of network and pathway based classifiers for outcome prediction in breast cancer
null
null
10.1371/journal.pone.0034796
null
cs.LG q-bio.QM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recently, several classifiers that combine primary tumor data, like gene expression data, and secondary data sources, such as protein-protein interaction networks, have been proposed for predicting outcome in breast cancer. In these approaches, new composite features are typically constructed by aggregating the expression levels of several genes. The secondary data sources are employed to guide this aggregation. Although many studies claim that these approaches improve classification performance over single gene classifiers, the gain in performance is difficult to assess. This stems mainly from the fact that different breast cancer data sets and validation procedures are employed to assess the performance. Here we address these issues by employing a large cohort of six breast cancer data sets as benchmark set and by performing an unbiased evaluation of the classification accuracies of the different approaches. Contrary to previous claims, we find that composite feature classifiers do not outperform simple single gene classifiers. We investigate the effect of (1) the number of selected features; (2) the specific gene set from which features are selected; (3) the size of the training set and (4) the heterogeneity of the data set on the performance of composite feature and single gene classifiers. Strikingly, we find that randomization of secondary data sources, which destroys all biological information in these sources, does not result in a deterioration in performance of composite feature classifiers. Finally, we show that when a proper correction for gene set size is performed, the stability of single gene sets is similar to the stability of composite feature sets. Based on these results there is currently no reason to prefer prognostic classifiers based on composite features over single gene classifiers for predicting outcome in breast cancer.
[ { "version": "v1", "created": "Mon, 17 Oct 2011 16:13:15 GMT" }, { "version": "v2", "created": "Tue, 18 Oct 2011 06:29:11 GMT" } ]
2013-10-15T00:00:00
[ [ "Staiger", "C.", "" ], [ "Cadot", "S.", "" ], [ "Kooter", "R.", "" ], [ "Dittrich", "M.", "" ], [ "Mueller", "T.", "" ], [ "Klau", "G. W.", "" ], [ "Wessels", "L. F. A.", "" ] ]
TITLE: A critical evaluation of network and pathway based classifiers for outcome prediction in breast cancer ABSTRACT: Recently, several classifiers that combine primary tumor data, like gene expression data, and secondary data sources, such as protein-protein interaction networks, have been proposed for predicting outcome in breast cancer. In these approaches, new composite features are typically constructed by aggregating the expression levels of several genes. The secondary data sources are employed to guide this aggregation. Although many studies claim that these approaches improve classification performance over single gene classifiers, the gain in performance is difficult to assess. This stems mainly from the fact that different breast cancer data sets and validation procedures are employed to assess the performance. Here we address these issues by employing a large cohort of six breast cancer data sets as benchmark set and by performing an unbiased evaluation of the classification accuracies of the different approaches. Contrary to previous claims, we find that composite feature classifiers do not outperform simple single gene classifiers. We investigate the effect of (1) the number of selected features; (2) the specific gene set from which features are selected; (3) the size of the training set and (4) the heterogeneity of the data set on the performance of composite feature and single gene classifiers. Strikingly, we find that randomization of secondary data sources, which destroys all biological information in these sources, does not result in a deterioration in performance of composite feature classifiers. Finally, we show that when a proper correction for gene set size is performed, the stability of single gene sets is similar to the stability of composite feature sets. Based on these results there is currently no reason to prefer prognostic classifiers based on composite features over single gene classifiers for predicting outcome in breast cancer.
1306.3398
Vincent A Traag
V.A. Traag, G. Krings and P. Van Dooren
Significant Scales in Community Structure
To appear in Scientific Reports
Scientific Reports 3, 2930 (2013)
10.1038/srep02930
null
physics.soc-ph cs.DM cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Many complex networks show signs of modular structure, uncovered by community detection. Although many methods succeed in revealing various partitions, it remains difficult to detect at what scale some partition is significant. This problem shows foremost in multi-resolution methods. We here introduce an efficient method for scanning for resolutions in one such method. Additionally, we introduce the notion of "significance" of a partition, based on subgraph probabilities. Significance is independent of the exact method used, so could also be applied in other methods, and can be interpreted as the gain in encoding a graph by making use of a partition. Using significance, we can determine "good" resolution parameters, which we demonstrate on benchmark networks. Moreover, optimizing significance itself also shows excellent performance. We demonstrate our method on voting data from the European Parliament. Our analysis suggests the European Parliament has become increasingly ideologically divided and that nationality plays no role.
[ { "version": "v1", "created": "Fri, 14 Jun 2013 13:53:25 GMT" }, { "version": "v2", "created": "Fri, 11 Oct 2013 14:13:07 GMT" } ]
2013-10-15T00:00:00
[ [ "Traag", "V. A.", "" ], [ "Krings", "G.", "" ], [ "Van Dooren", "P.", "" ] ]
TITLE: Significant Scales in Community Structure ABSTRACT: Many complex networks show signs of modular structure, uncovered by community detection. Although many methods succeed in revealing various partitions, it remains difficult to detect at what scale some partition is significant. This problem shows foremost in multi-resolution methods. We here introduce an efficient method for scanning for resolutions in one such method. Additionally, we introduce the notion of "significance" of a partition, based on subgraph probabilities. Significance is independent of the exact method used, so could also be applied in other methods, and can be interpreted as the gain in encoding a graph by making use of a partition. Using significance, we can determine "good" resolution parameters, which we demonstrate on benchmark networks. Moreover, optimizing significance itself also shows excellent performance. We demonstrate our method on voting data from the European Parliament. Our analysis suggests the European Parliament has become increasingly ideologically divided and that nationality plays no role.
1310.3322
Mohamed Elhoseiny Mohamed Elhoseiny
Mohamed Elhoseiny, Hossam Faheem, Taymour Nazmy, and Eman Shaaban
GPU-Framework for Teamwork Action Recognition
7 pages
null
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Real time processing for teamwork action recognition is a challenge, due to complex computational models to achieve high system performance. Hence, this paper proposes a framework based on Graphical Processing Units (GPUs) to achieve a significant speed up in the performance of role based activity recognition of teamwork. The framework can be applied in various fields, especially athletic and military applications. Furthermore, the framework can be customized for many action recognition applications. The paper presents the stages of the framework where GPUs are the main tool for performance improvement. The speedup is achieved by performing video processing and Machine learning algorithms on GPU. Video processing and machine learning algorithms covers all computations involved in our framework. Video processing tasks on involves GPU implementation of Motion detection, segmentation and object tracking algorithms. In addition, our framework is integrated with GPUCV, a GPU version of OpenCV functions. Machine learning tasks are supported under our framework with GPU implementations of Support Vector Machine (SVM) for object classification and feature discretization, Hidden Marcov Model (HMM) for activity recognition phase, and ID3 algorithm for role recognition of team members. The system was tested against UC-Teamwork dataset and speedup of 20X has been achieved on NVidia 9500GT graphics card (32 500MHZ processors).
[ { "version": "v1", "created": "Sat, 12 Oct 2013 01:16:32 GMT" } ]
2013-10-15T00:00:00
[ [ "Elhoseiny", "Mohamed", "" ], [ "Faheem", "Hossam", "" ], [ "Nazmy", "Taymour", "" ], [ "Shaaban", "Eman", "" ] ]
TITLE: GPU-Framework for Teamwork Action Recognition ABSTRACT: Real time processing for teamwork action recognition is a challenge, due to complex computational models to achieve high system performance. Hence, this paper proposes a framework based on Graphical Processing Units (GPUs) to achieve a significant speed up in the performance of role based activity recognition of teamwork. The framework can be applied in various fields, especially athletic and military applications. Furthermore, the framework can be customized for many action recognition applications. The paper presents the stages of the framework where GPUs are the main tool for performance improvement. The speedup is achieved by performing video processing and Machine learning algorithms on GPU. Video processing and machine learning algorithms covers all computations involved in our framework. Video processing tasks on involves GPU implementation of Motion detection, segmentation and object tracking algorithms. In addition, our framework is integrated with GPUCV, a GPU version of OpenCV functions. Machine learning tasks are supported under our framework with GPU implementations of Support Vector Machine (SVM) for object classification and feature discretization, Hidden Marcov Model (HMM) for activity recognition phase, and ID3 algorithm for role recognition of team members. The system was tested against UC-Teamwork dataset and speedup of 20X has been achieved on NVidia 9500GT graphics card (32 500MHZ processors).