id
large_stringlengths
9
16
submitter
large_stringlengths
3
64
authors
large_stringlengths
5
20.2k
title
large_stringlengths
5
245
comments
large_stringlengths
1
482
journal-ref
large_stringlengths
4
382
doi
large_stringlengths
9
151
report-no
large_stringlengths
2
509
categories
large_stringlengths
5
78
license
large_stringclasses
9 values
abstract
large_stringlengths
83
3.55k
versions
large listlengths
1
21
update_date
timestamp[ms]date
2007-05-23 00:00:00
2025-05-30 00:00:00
authors_parsed
large listlengths
1
1.35k
prompt
large_stringlengths
166
3.64k
1310.3353
Gunnar W. Klau
Thomas Bellitto and Tobias Marschall and Alexander Sch\"onhuth and Gunnar W. Klau
Next Generation Cluster Editing
null
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This work aims at improving the quality of structural variant prediction from the mapped reads of a sequenced genome. We suggest a new model based on cluster editing in weighted graphs and introduce a new heuristic algorithm that allows to solve this problem quickly and with a good approximation on the huge graphs that arise from biological datasets.
[ { "version": "v1", "created": "Sat, 12 Oct 2013 09:34:30 GMT" } ]
2013-10-15T00:00:00
[ [ "Bellitto", "Thomas", "" ], [ "Marschall", "Tobias", "" ], [ "Schönhuth", "Alexander", "" ], [ "Klau", "Gunnar W.", "" ] ]
TITLE: Next Generation Cluster Editing ABSTRACT: This work aims at improving the quality of structural variant prediction from the mapped reads of a sequenced genome. We suggest a new model based on cluster editing in weighted graphs and introduce a new heuristic algorithm that allows to solve this problem quickly and with a good approximation on the huge graphs that arise from biological datasets.
1310.3498
Dirk Helbing
Dirk Helbing
New Ways to Promote Sustainability and Social Well-Being in a Complex, Strongly Interdependent World: The FuturICT Approach
For related work see http://www.soms.ethz.ch and http://www.futurict.eu
This is the Epilogue of the Booklet by P. Ball, Why Society is a Complex Matter (Springer, Berlin, 2012), pp. 55-60
null
null
cs.CY physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
FuturICT is one of six proposals currently being considered for support within the European Commission's Flagship Initiative (see Box 1). The vision of the FuturICT project is to develop new science and new information and communication systems that will promote social self-organization, self-regulation, well-being, sustainability, and resilience. One of the main aims of the approach is to increase individual opportunities for social, economic and political participation, combined with the creation of collective awareness of the impact that human actions have on our world. This requires us to mine large datasets ("Big Data") and to develop new methods and tools: a Planetary Nervous System (PNS) to answer "What is (the state of the world)..." questions, a Living Earth Simulator (LES) to study "What ... if ..." scenarios, and a Global Participatory Platform (GPP) for social exploration and interaction.
[ { "version": "v1", "created": "Sun, 13 Oct 2013 18:03:36 GMT" } ]
2013-10-15T00:00:00
[ [ "Helbing", "Dirk", "" ] ]
TITLE: New Ways to Promote Sustainability and Social Well-Being in a Complex, Strongly Interdependent World: The FuturICT Approach ABSTRACT: FuturICT is one of six proposals currently being considered for support within the European Commission's Flagship Initiative (see Box 1). The vision of the FuturICT project is to develop new science and new information and communication systems that will promote social self-organization, self-regulation, well-being, sustainability, and resilience. One of the main aims of the approach is to increase individual opportunities for social, economic and political participation, combined with the creation of collective awareness of the impact that human actions have on our world. This requires us to mine large datasets ("Big Data") and to develop new methods and tools: a Planetary Nervous System (PNS) to answer "What is (the state of the world)..." questions, a Living Earth Simulator (LES) to study "What ... if ..." scenarios, and a Global Participatory Platform (GPP) for social exploration and interaction.
1310.3805
Chiranjib Sur
Chiranjib Sur, Anupam Shukla
Green Heron Swarm Optimization Algorithm - State-of-the-Art of a New Nature Inspired Discrete Meta-Heuristics
20 pages, Pre-print copy, submitted to a peer reviewed journal
null
null
null
cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Many real world problems are NP-Hard problems are a very large part of them can be represented as graph based problems. This makes graph theory a very important and prevalent field of study. In this work a new bio-inspired meta-heuristics called Green Heron Swarm Optimization (GHOSA) Algorithm is being introduced which is inspired by the fishing skills of the bird. The algorithm basically suited for graph based problems like combinatorial optimization etc. However introduction of an adaptive mathematical variation operator called Location Based Neighbour Influenced Variation (LBNIV) makes it suitable for high dimensional continuous domain problems. The new algorithm is being operated on the traditional benchmark equations and the results are compared with Genetic Algorithm and Particle Swarm Optimization. The algorithm is also operated on Travelling Salesman Problem, Quadratic Assignment Problem, Knapsack Problem dataset. The procedure to operate the algorithm on the Resource Constraint Shortest Path and road network optimization is also discussed. The results clearly demarcates the GHOSA algorithm as an efficient algorithm specially considering that the number of algorithms for the discrete optimization is very low and robust and more explorative algorithm is required in this age of social networking and mostly graph based problem scenarios.
[ { "version": "v1", "created": "Mon, 14 Oct 2013 19:42:26 GMT" } ]
2013-10-15T00:00:00
[ [ "Sur", "Chiranjib", "" ], [ "Shukla", "Anupam", "" ] ]
TITLE: Green Heron Swarm Optimization Algorithm - State-of-the-Art of a New Nature Inspired Discrete Meta-Heuristics ABSTRACT: Many real world problems are NP-Hard problems are a very large part of them can be represented as graph based problems. This makes graph theory a very important and prevalent field of study. In this work a new bio-inspired meta-heuristics called Green Heron Swarm Optimization (GHOSA) Algorithm is being introduced which is inspired by the fishing skills of the bird. The algorithm basically suited for graph based problems like combinatorial optimization etc. However introduction of an adaptive mathematical variation operator called Location Based Neighbour Influenced Variation (LBNIV) makes it suitable for high dimensional continuous domain problems. The new algorithm is being operated on the traditional benchmark equations and the results are compared with Genetic Algorithm and Particle Swarm Optimization. The algorithm is also operated on Travelling Salesman Problem, Quadratic Assignment Problem, Knapsack Problem dataset. The procedure to operate the algorithm on the Resource Constraint Shortest Path and road network optimization is also discussed. The results clearly demarcates the GHOSA algorithm as an efficient algorithm specially considering that the number of algorithms for the discrete optimization is very low and robust and more explorative algorithm is required in this age of social networking and mostly graph based problem scenarios.
1310.3197
Yaniv Erlich
Yaniv Erlich and Arvind Narayanan
Routes for breaching and protecting genetic privacy
Draft for comments
null
null
null
q-bio.GN cs.CR stat.AP
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We are entering the era of ubiquitous genetic information for research, clinical care, and personal curiosity. Sharing these datasets is vital for rapid progress in understanding the genetic basis of human diseases. However, one growing concern is the ability to protect the genetic privacy of the data originators. Here, we technically map threats to genetic privacy and discuss potential mitigation strategies for privacy-preserving dissemination of genetic data.
[ { "version": "v1", "created": "Fri, 11 Oct 2013 17:02:54 GMT" } ]
2013-10-14T00:00:00
[ [ "Erlich", "Yaniv", "" ], [ "Narayanan", "Arvind", "" ] ]
TITLE: Routes for breaching and protecting genetic privacy ABSTRACT: We are entering the era of ubiquitous genetic information for research, clinical care, and personal curiosity. Sharing these datasets is vital for rapid progress in understanding the genetic basis of human diseases. However, one growing concern is the ability to protect the genetic privacy of the data originators. Here, we technically map threats to genetic privacy and discuss potential mitigation strategies for privacy-preserving dissemination of genetic data.
1310.3233
ANqi Qiu DR
Jia Du, Alvina Goh, Anqi Qiu
Bayesian Estimation of White Matter Atlas from High Angular Resolution Diffusion Imaging
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a Bayesian probabilistic model to estimate the brain white matter atlas from high angular resolution diffusion imaging (HARDI) data. This model incorporates a shape prior of the white matter anatomy and the likelihood of individual observed HARDI datasets. We first assume that the atlas is generated from a known hyperatlas through a flow of diffeomorphisms and its shape prior can be constructed based on the framework of large deformation diffeomorphic metric mapping (LDDMM). LDDMM characterizes a nonlinear diffeomorphic shape space in a linear space of initial momentum uniquely determining diffeomorphic geodesic flows from the hyperatlas. Therefore, the shape prior of the HARDI atlas can be modeled using a centered Gaussian random field (GRF) model of the initial momentum. In order to construct the likelihood of observed HARDI datasets, it is necessary to study the diffeomorphic transformation of individual observations relative to the atlas and the probabilistic distribution of orientation distribution functions (ODFs). To this end, we construct the likelihood related to the transformation using the same construction as discussed for the shape prior of the atlas. The probabilistic distribution of ODFs is then constructed based on the ODF Riemannian manifold. We assume that the observed ODFs are generated by an exponential map of random tangent vectors at the deformed atlas ODF. Hence, the likelihood of the ODFs can be modeled using a GRF of their tangent vectors in the ODF Riemannian manifold. We solve for the maximum a posteriori using the Expectation-Maximization algorithm and derive the corresponding update equations. Finally, we illustrate the HARDI atlas constructed based on a Chinese aging cohort of 94 adults and compare it with that generated by averaging the coefficients of spherical harmonics of the ODF across subjects.
[ { "version": "v1", "created": "Thu, 10 Oct 2013 00:32:01 GMT" } ]
2013-10-14T00:00:00
[ [ "Du", "Jia", "" ], [ "Goh", "Alvina", "" ], [ "Qiu", "Anqi", "" ] ]
TITLE: Bayesian Estimation of White Matter Atlas from High Angular Resolution Diffusion Imaging ABSTRACT: We present a Bayesian probabilistic model to estimate the brain white matter atlas from high angular resolution diffusion imaging (HARDI) data. This model incorporates a shape prior of the white matter anatomy and the likelihood of individual observed HARDI datasets. We first assume that the atlas is generated from a known hyperatlas through a flow of diffeomorphisms and its shape prior can be constructed based on the framework of large deformation diffeomorphic metric mapping (LDDMM). LDDMM characterizes a nonlinear diffeomorphic shape space in a linear space of initial momentum uniquely determining diffeomorphic geodesic flows from the hyperatlas. Therefore, the shape prior of the HARDI atlas can be modeled using a centered Gaussian random field (GRF) model of the initial momentum. In order to construct the likelihood of observed HARDI datasets, it is necessary to study the diffeomorphic transformation of individual observations relative to the atlas and the probabilistic distribution of orientation distribution functions (ODFs). To this end, we construct the likelihood related to the transformation using the same construction as discussed for the shape prior of the atlas. The probabilistic distribution of ODFs is then constructed based on the ODF Riemannian manifold. We assume that the observed ODFs are generated by an exponential map of random tangent vectors at the deformed atlas ODF. Hence, the likelihood of the ODFs can be modeled using a GRF of their tangent vectors in the ODF Riemannian manifold. We solve for the maximum a posteriori using the Expectation-Maximization algorithm and derive the corresponding update equations. Finally, we illustrate the HARDI atlas constructed based on a Chinese aging cohort of 94 adults and compare it with that generated by averaging the coefficients of spherical harmonics of the ODF across subjects.
1310.2646
Akshay Gadde
Sunil K. Narang, Akshay Gadde, Eduard Sanou and Antonio Ortega
Localized Iterative Methods for Interpolation in Graph Structured Data
null
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we present two localized graph filtering based methods for interpolating graph signals defined on the vertices of arbitrary graphs from only a partial set of samples. The first method is an extension of previous work on reconstructing bandlimited graph signals from partially observed samples. The iterative graph filtering approach very closely approximates the solution proposed in the that work, while being computationally more efficient. As an alternative, we propose a regularization based framework in which we define the cost of reconstruction to be a combination of smoothness of the graph signal and the reconstruction error with respect to the known samples, and find solutions that minimize this cost. We provide both a closed form solution and a computationally efficient iterative solution of the optimization problem. The experimental results on the recommendation system datasets demonstrate effectiveness of the proposed methods.
[ { "version": "v1", "created": "Wed, 9 Oct 2013 22:24:28 GMT" } ]
2013-10-11T00:00:00
[ [ "Narang", "Sunil K.", "" ], [ "Gadde", "Akshay", "" ], [ "Sanou", "Eduard", "" ], [ "Ortega", "Antonio", "" ] ]
TITLE: Localized Iterative Methods for Interpolation in Graph Structured Data ABSTRACT: In this paper, we present two localized graph filtering based methods for interpolating graph signals defined on the vertices of arbitrary graphs from only a partial set of samples. The first method is an extension of previous work on reconstructing bandlimited graph signals from partially observed samples. The iterative graph filtering approach very closely approximates the solution proposed in the that work, while being computationally more efficient. As an alternative, we propose a regularization based framework in which we define the cost of reconstruction to be a combination of smoothness of the graph signal and the reconstruction error with respect to the known samples, and find solutions that minimize this cost. We provide both a closed form solution and a computationally efficient iterative solution of the optimization problem. The experimental results on the recommendation system datasets demonstrate effectiveness of the proposed methods.
1310.2814
Suyash Gupta
Suyash Gupta, V. Krishna Nandivada
IMSuite: A Benchmark Suite for Simulating Distributed Algorithms
null
null
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Considering the diverse nature of real-world distributed applications that makes it hard to identify a representative subset of distributed benchmarks, we focus on their underlying distributed algorithms. We present and characterize a new kernel benchmark suite (named IMSuite) that simulates some of the classical distributed algorithms in task parallel languages. We present multiple variations of our kernels, broadly categorized under two heads: (a) varying synchronization primitives (with and without fine grain synchronization primitives); and (b) varying forms of parallelization (data parallel and recursive task parallel). Our characterization covers interesting aspects of distributed applications such as distribution of remote communication requests, number of synchronization, task creation, task termination and atomic operations. We study the behavior (execution time) of our kernels by varying the problem size, the number of compute threads, and the input configurations. We also present an involved set of input generators and output validators.
[ { "version": "v1", "created": "Thu, 10 Oct 2013 13:40:51 GMT" } ]
2013-10-11T00:00:00
[ [ "Gupta", "Suyash", "" ], [ "Nandivada", "V. Krishna", "" ] ]
TITLE: IMSuite: A Benchmark Suite for Simulating Distributed Algorithms ABSTRACT: Considering the diverse nature of real-world distributed applications that makes it hard to identify a representative subset of distributed benchmarks, we focus on their underlying distributed algorithms. We present and characterize a new kernel benchmark suite (named IMSuite) that simulates some of the classical distributed algorithms in task parallel languages. We present multiple variations of our kernels, broadly categorized under two heads: (a) varying synchronization primitives (with and without fine grain synchronization primitives); and (b) varying forms of parallelization (data parallel and recursive task parallel). Our characterization covers interesting aspects of distributed applications such as distribution of remote communication requests, number of synchronization, task creation, task termination and atomic operations. We study the behavior (execution time) of our kernels by varying the problem size, the number of compute threads, and the input configurations. We also present an involved set of input generators and output validators.
1310.2332
Heliang Huang
Heliang Huang, Wansu Bao
Middle-Solving F4 to Compute Grobner bases for Cryptanalysis over GF(2)
null
null
null
null
cs.SC cs.CR cs.NI math.AC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Algebraic cryptanalysis usually requires to recover the secret key by solving polynomial equations. Faugere's F4 is a well-known Grobner bases algorithm to solve this problem. However, a serious drawback exists in the Grobner bases based algebraic attacks, namely, any information won't be got if we couldn't work out the Grobner bases of the polynomial equations system. In this paper, we in-depth research the F4 algorithm over GF(2). By using S-polynomials to replace critical pairs and computing the normal form of the productions with respect to the field equations in certain steps, many "redundant" reductors are avoided during the computation process of the F4 algorithm. By slightly modifying the logic of F4 algorithm, we solve the univariate polynomials appeared in the algorithm and then back-substitute the values of the solved variables at each iteration of the algorithm. We call our improvements Middle-Solving F4. The heuristic strategy of Middle-Solving overcomes the drawback of algebraic attacks and well suits algebraic attacks. It has never been applied to the Grobner bases algorithm before. Experiments to some Hidden Field Equation instances and some classical benchmarks (Cyclic 6, Gonnet83) show that Middle-Solving F4 is faster and uses less memory than Faugere's F4.
[ { "version": "v1", "created": "Wed, 9 Oct 2013 03:14:27 GMT" } ]
2013-10-10T00:00:00
[ [ "Huang", "Heliang", "" ], [ "Bao", "Wansu", "" ] ]
TITLE: Middle-Solving F4 to Compute Grobner bases for Cryptanalysis over GF(2) ABSTRACT: Algebraic cryptanalysis usually requires to recover the secret key by solving polynomial equations. Faugere's F4 is a well-known Grobner bases algorithm to solve this problem. However, a serious drawback exists in the Grobner bases based algebraic attacks, namely, any information won't be got if we couldn't work out the Grobner bases of the polynomial equations system. In this paper, we in-depth research the F4 algorithm over GF(2). By using S-polynomials to replace critical pairs and computing the normal form of the productions with respect to the field equations in certain steps, many "redundant" reductors are avoided during the computation process of the F4 algorithm. By slightly modifying the logic of F4 algorithm, we solve the univariate polynomials appeared in the algorithm and then back-substitute the values of the solved variables at each iteration of the algorithm. We call our improvements Middle-Solving F4. The heuristic strategy of Middle-Solving overcomes the drawback of algebraic attacks and well suits algebraic attacks. It has never been applied to the Grobner bases algorithm before. Experiments to some Hidden Field Equation instances and some classical benchmarks (Cyclic 6, Gonnet83) show that Middle-Solving F4 is faster and uses less memory than Faugere's F4.
1310.2409
Ning Chen
Ning Chen, Jun Zhu, Fei Xia, Bo Zhang
Discriminative Relational Topic Models
null
null
null
null
cs.LG cs.IR stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Many scientific and engineering fields involve analyzing network data. For document networks, relational topic models (RTMs) provide a probabilistic generative process to describe both the link structure and document contents, and they have shown promise on predicting network structures and discovering latent topic representations. However, existing RTMs have limitations in both the restricted model expressiveness and incapability of dealing with imbalanced network data. To expand the scope and improve the inference accuracy of RTMs, this paper presents three extensions: 1) unlike the common link likelihood with a diagonal weight matrix that allows the-same-topic interactions only, we generalize it to use a full weight matrix that captures all pairwise topic interactions and is applicable to asymmetric networks; 2) instead of doing standard Bayesian inference, we perform regularized Bayesian inference (RegBayes) with a regularization parameter to deal with the imbalanced link structure issue in common real networks and improve the discriminative ability of learned latent representations; and 3) instead of doing variational approximation with strict mean-field assumptions, we present collapsed Gibbs sampling algorithms for the generalized relational topic models by exploring data augmentation without making restricting assumptions. Under the generic RegBayes framework, we carefully investigate two popular discriminative loss functions, namely, the logistic log-loss and the max-margin hinge loss. Experimental results on several real network datasets demonstrate the significance of these extensions on improving the prediction performance, and the time efficiency can be dramatically improved with a simple fast approximation method.
[ { "version": "v1", "created": "Wed, 9 Oct 2013 09:32:56 GMT" } ]
2013-10-10T00:00:00
[ [ "Chen", "Ning", "" ], [ "Zhu", "Jun", "" ], [ "Xia", "Fei", "" ], [ "Zhang", "Bo", "" ] ]
TITLE: Discriminative Relational Topic Models ABSTRACT: Many scientific and engineering fields involve analyzing network data. For document networks, relational topic models (RTMs) provide a probabilistic generative process to describe both the link structure and document contents, and they have shown promise on predicting network structures and discovering latent topic representations. However, existing RTMs have limitations in both the restricted model expressiveness and incapability of dealing with imbalanced network data. To expand the scope and improve the inference accuracy of RTMs, this paper presents three extensions: 1) unlike the common link likelihood with a diagonal weight matrix that allows the-same-topic interactions only, we generalize it to use a full weight matrix that captures all pairwise topic interactions and is applicable to asymmetric networks; 2) instead of doing standard Bayesian inference, we perform regularized Bayesian inference (RegBayes) with a regularization parameter to deal with the imbalanced link structure issue in common real networks and improve the discriminative ability of learned latent representations; and 3) instead of doing variational approximation with strict mean-field assumptions, we present collapsed Gibbs sampling algorithms for the generalized relational topic models by exploring data augmentation without making restricting assumptions. Under the generic RegBayes framework, we carefully investigate two popular discriminative loss functions, namely, the logistic log-loss and the max-margin hinge loss. Experimental results on several real network datasets demonstrate the significance of these extensions on improving the prediction performance, and the time efficiency can be dramatically improved with a simple fast approximation method.
1310.2441
Bartlomiej Blaszczyszyn
Kumar Gaurav (INRIA Paris-Rocquencourt, UPMC), Bartlomiej Blaszczyszyn (INRIA Paris-Rocquencourt), Holger Paul Keeler (INRIA Paris-Rocquencourt)
Pioneers of Influence Propagation in Social Networks
null
null
null
null
cs.SI cs.DM physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
With the growing importance of corporate viral marketing campaigns on online social networks, the interest in studies of influence propagation through networks is higher than ever. In a viral marketing campaign, a firm initially targets a small set of pioneers and hopes that they would influence a sizeable fraction of the population by diffusion of influence through the network. In general, any marketing campaign might fail to go viral in the first try. As such, it would be useful to have some guide to evaluate the effectiveness of the campaign and judge whether it is worthy of further resources, and in case the campaign has potential, how to hit upon a good pioneer who can make the campaign go viral. In this paper, we present a diffusion model developed by enriching the generalized random graph (a.k.a. configuration model) to provide insight into these questions. We offer the intuition behind the results on this model, rigorously proved in Blaszczyszyn & Gaurav(2013), and illustrate them here by taking examples of random networks having prototypical degree distributions - Poisson degree distribution, which is commonly used as a kind of benchmark, and Power Law degree distribution, which is normally used to approximate the real-world networks. On these networks, the members are assumed to have varying attitudes towards propagating the information. We analyze three cases, in particular - (1) Bernoulli transmissions, when a member influences each of its friend with probability p; (2) Node percolation, when a member influences all its friends with probability p and none with probability 1-p; (3) Coupon-collector transmissions, when a member randomly selects one of his friends K times with replacement. We assume that the configuration model is the closest approximation of a large online social network, when the information available about the network is very limited. The key insight offered by this study from a firm's perspective is regarding how to evaluate the effectiveness of a marketing campaign and do cost-benefit analysis by collecting relevant statistical data from the pioneers it selects. The campaign evaluation criterion is informed by the observation that if the parameters of the underlying network and the campaign effectiveness are such that the campaign can indeed reach a significant fraction of the population, then the set of good pioneers also forms a significant fraction of the population. Therefore, in such a case, the firms can even adopt the naive strategy of repeatedly picking and targeting some number of pioneers at random from the population. With this strategy, the probability of them picking a good pioneer will increase geometrically fast with the number of tries.
[ { "version": "v1", "created": "Wed, 9 Oct 2013 11:43:52 GMT" } ]
2013-10-10T00:00:00
[ [ "Gaurav", "Kumar", "", "INRIA Paris-Rocquencourt, UPMC" ], [ "Blaszczyszyn", "Bartlomiej", "", "INRIA Paris-Rocquencourt" ], [ "Keeler", "Holger Paul", "", "INRIA Paris-Rocquencourt" ] ]
TITLE: Pioneers of Influence Propagation in Social Networks ABSTRACT: With the growing importance of corporate viral marketing campaigns on online social networks, the interest in studies of influence propagation through networks is higher than ever. In a viral marketing campaign, a firm initially targets a small set of pioneers and hopes that they would influence a sizeable fraction of the population by diffusion of influence through the network. In general, any marketing campaign might fail to go viral in the first try. As such, it would be useful to have some guide to evaluate the effectiveness of the campaign and judge whether it is worthy of further resources, and in case the campaign has potential, how to hit upon a good pioneer who can make the campaign go viral. In this paper, we present a diffusion model developed by enriching the generalized random graph (a.k.a. configuration model) to provide insight into these questions. We offer the intuition behind the results on this model, rigorously proved in Blaszczyszyn & Gaurav(2013), and illustrate them here by taking examples of random networks having prototypical degree distributions - Poisson degree distribution, which is commonly used as a kind of benchmark, and Power Law degree distribution, which is normally used to approximate the real-world networks. On these networks, the members are assumed to have varying attitudes towards propagating the information. We analyze three cases, in particular - (1) Bernoulli transmissions, when a member influences each of its friend with probability p; (2) Node percolation, when a member influences all its friends with probability p and none with probability 1-p; (3) Coupon-collector transmissions, when a member randomly selects one of his friends K times with replacement. We assume that the configuration model is the closest approximation of a large online social network, when the information available about the network is very limited. The key insight offered by this study from a firm's perspective is regarding how to evaluate the effectiveness of a marketing campaign and do cost-benefit analysis by collecting relevant statistical data from the pioneers it selects. The campaign evaluation criterion is informed by the observation that if the parameters of the underlying network and the campaign effectiveness are such that the campaign can indeed reach a significant fraction of the population, then the set of good pioneers also forms a significant fraction of the population. Therefore, in such a case, the firms can even adopt the naive strategy of repeatedly picking and targeting some number of pioneers at random from the population. With this strategy, the probability of them picking a good pioneer will increase geometrically fast with the number of tries.
1310.2053
Kai Berger
Kai Berger
The role of RGB-D benchmark datasets: an overview
6 pages
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The advent of the Microsoft Kinect three years ago stimulated not only the computer vision community for new algorithms and setups to tackle well-known problems in the community but also sparked the launch of several new benchmark datasets to which future algorithms can be compared 019 to. This review of the literature and industry developments concludes that the current RGB-D benchmark datasets can be useful to determine the accuracy of a variety of applications of a single or multiple RGB-D sensors.
[ { "version": "v1", "created": "Tue, 8 Oct 2013 09:16:56 GMT" } ]
2013-10-09T00:00:00
[ [ "Berger", "Kai", "" ] ]
TITLE: The role of RGB-D benchmark datasets: an overview ABSTRACT: The advent of the Microsoft Kinect three years ago stimulated not only the computer vision community for new algorithms and setups to tackle well-known problems in the community but also sparked the launch of several new benchmark datasets to which future algorithms can be compared 019 to. This review of the literature and industry developments concludes that the current RGB-D benchmark datasets can be useful to determine the accuracy of a variety of applications of a single or multiple RGB-D sensors.
1303.3901
Pekka Malo
Ankur Sinha, Pekka Malo and Kalyanmoy Deb
Efficient Evolutionary Algorithm for Single-Objective Bilevel Optimization
null
null
null
null
cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Bilevel optimization problems are a class of challenging optimization problems, which contain two levels of optimization tasks. In these problems, the optimal solutions to the lower level problem become possible feasible candidates to the upper level problem. Such a requirement makes the optimization problem difficult to solve, and has kept the researchers busy towards devising methodologies, which can efficiently handle the problem. Despite the efforts, there hardly exists any effective methodology, which is capable of handling a complex bilevel problem. In this paper, we introduce bilevel evolutionary algorithm based on quadratic approximations (BLEAQ) of optimal lower level variables with respect to the upper level variables. The approach is capable of handling bilevel problems with different kinds of complexities in relatively smaller number of function evaluations. Ideas from classical optimization have been hybridized with evolutionary methods to generate an efficient optimization algorithm for generic bilevel problems. The efficacy of the algorithm has been shown on two sets of test problems. The first set is a recently proposed SMD test set, which contains problems with controllable complexities, and the second set contains standard test problems collected from the literature. The proposed method has been evaluated against two benchmarks, and the performance gain is observed to be significant.
[ { "version": "v1", "created": "Fri, 15 Mar 2013 20:30:57 GMT" }, { "version": "v2", "created": "Mon, 7 Oct 2013 01:07:57 GMT" } ]
2013-10-08T00:00:00
[ [ "Sinha", "Ankur", "" ], [ "Malo", "Pekka", "" ], [ "Deb", "Kalyanmoy", "" ] ]
TITLE: Efficient Evolutionary Algorithm for Single-Objective Bilevel Optimization ABSTRACT: Bilevel optimization problems are a class of challenging optimization problems, which contain two levels of optimization tasks. In these problems, the optimal solutions to the lower level problem become possible feasible candidates to the upper level problem. Such a requirement makes the optimization problem difficult to solve, and has kept the researchers busy towards devising methodologies, which can efficiently handle the problem. Despite the efforts, there hardly exists any effective methodology, which is capable of handling a complex bilevel problem. In this paper, we introduce bilevel evolutionary algorithm based on quadratic approximations (BLEAQ) of optimal lower level variables with respect to the upper level variables. The approach is capable of handling bilevel problems with different kinds of complexities in relatively smaller number of function evaluations. Ideas from classical optimization have been hybridized with evolutionary methods to generate an efficient optimization algorithm for generic bilevel problems. The efficacy of the algorithm has been shown on two sets of test problems. The first set is a recently proposed SMD test set, which contains problems with controllable complexities, and the second set contains standard test problems collected from the literature. The proposed method has been evaluated against two benchmarks, and the performance gain is observed to be significant.
1310.1485
Markus Rampp
Tilman Dannert and Andreas Marek and Markus Rampp
Porting Large HPC Applications to GPU Clusters: The Codes GENE and VERTEX
10 pages, accepted for publication in ParCo 2013
null
null
null
physics.comp-ph astro-ph.SR cs.DC physics.plasm-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We have developed GPU versions for two major high-performance-computing (HPC) applications originating from two different scientific domains. GENE is a plasma microturbulence code which is employed for simulations of nuclear fusion plasmas. VERTEX is a neutrino-radiation hydrodynamics code for "first principles"-simulations of core-collapse supernova explosions. The codes are considered state of the art in their respective scientific domains, both concerning their scientific scope and functionality as well as the achievable compute performance, in particular parallel scalability on all relevant HPC platforms. GENE and VERTEX were ported by us to HPC cluster architectures with two NVidia Kepler GPUs mounted in each node in addition to two Intel Xeon CPUs of the Sandy Bridge family. On such platforms we achieve up to twofold gains in the overall application performance in the sense of a reduction of the time to solution for a given setup with respect to a pure CPU cluster. The paper describes our basic porting strategies and benchmarking methodology, and details the main algorithmic and technical challenges we faced on the new, heterogeneous architecture.
[ { "version": "v1", "created": "Sat, 5 Oct 2013 15:12:58 GMT" } ]
2013-10-08T00:00:00
[ [ "Dannert", "Tilman", "" ], [ "Marek", "Andreas", "" ], [ "Rampp", "Markus", "" ] ]
TITLE: Porting Large HPC Applications to GPU Clusters: The Codes GENE and VERTEX ABSTRACT: We have developed GPU versions for two major high-performance-computing (HPC) applications originating from two different scientific domains. GENE is a plasma microturbulence code which is employed for simulations of nuclear fusion plasmas. VERTEX is a neutrino-radiation hydrodynamics code for "first principles"-simulations of core-collapse supernova explosions. The codes are considered state of the art in their respective scientific domains, both concerning their scientific scope and functionality as well as the achievable compute performance, in particular parallel scalability on all relevant HPC platforms. GENE and VERTEX were ported by us to HPC cluster architectures with two NVidia Kepler GPUs mounted in each node in addition to two Intel Xeon CPUs of the Sandy Bridge family. On such platforms we achieve up to twofold gains in the overall application performance in the sense of a reduction of the time to solution for a given setup with respect to a pure CPU cluster. The paper describes our basic porting strategies and benchmarking methodology, and details the main algorithmic and technical challenges we faced on the new, heterogeneous architecture.
1310.1498
Nikolas Landia
Nikolas Landia, Stephan Doerfel, Robert J\"aschke, Sarabjot Singh Anand, Andreas Hotho and Nathan Griffiths
Deeper Into the Folksonomy Graph: FolkRank Adaptations and Extensions for Improved Tag Recommendations
null
null
null
null
cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The information contained in social tagging systems is often modelled as a graph of connections between users, items and tags. Recommendation algorithms such as FolkRank, have the potential to leverage complex relationships in the data, corresponding to multiple hops in the graph. We present an in-depth analysis and evaluation of graph models for social tagging data and propose novel adaptations and extensions of FolkRank to improve tag recommendations. We highlight implicit assumptions made by the widely used folksonomy model, and propose an alternative and more accurate graph-representation of the data. Our extensions of FolkRank address the new item problem by incorporating content data into the algorithm, and significantly improve prediction results on unpruned datasets. Our adaptations address issues in the iterative weight spreading calculation that potentially hinder FolkRank's ability to leverage the deep graph as an information source. Moreover, we evaluate the benefit of considering each deeper level of the graph, and present important insights regarding the characteristics of social tagging data in general. Our results suggest that the base assumption made by conventional weight propagation methods, that closeness in the graph always implies a positive relationship, does not hold for the social tagging domain.
[ { "version": "v1", "created": "Sat, 5 Oct 2013 17:27:42 GMT" } ]
2013-10-08T00:00:00
[ [ "Landia", "Nikolas", "" ], [ "Doerfel", "Stephan", "" ], [ "Jäschke", "Robert", "" ], [ "Anand", "Sarabjot Singh", "" ], [ "Hotho", "Andreas", "" ], [ "Griffiths", "Nathan", "" ] ]
TITLE: Deeper Into the Folksonomy Graph: FolkRank Adaptations and Extensions for Improved Tag Recommendations ABSTRACT: The information contained in social tagging systems is often modelled as a graph of connections between users, items and tags. Recommendation algorithms such as FolkRank, have the potential to leverage complex relationships in the data, corresponding to multiple hops in the graph. We present an in-depth analysis and evaluation of graph models for social tagging data and propose novel adaptations and extensions of FolkRank to improve tag recommendations. We highlight implicit assumptions made by the widely used folksonomy model, and propose an alternative and more accurate graph-representation of the data. Our extensions of FolkRank address the new item problem by incorporating content data into the algorithm, and significantly improve prediction results on unpruned datasets. Our adaptations address issues in the iterative weight spreading calculation that potentially hinder FolkRank's ability to leverage the deep graph as an information source. Moreover, we evaluate the benefit of considering each deeper level of the graph, and present important insights regarding the characteristics of social tagging data in general. Our results suggest that the base assumption made by conventional weight propagation methods, that closeness in the graph always implies a positive relationship, does not hold for the social tagging domain.
1310.1545
Xuhui Fan
Xuhui Fan, Richard Yi Da Xu, Longbing Cao, Yin Song
Learning Hidden Structures with Relational Models by Adequately Involving Rich Information in A Network
null
null
null
null
cs.LG cs.SI stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Effectively modelling hidden structures in a network is very practical but theoretically challenging. Existing relational models only involve very limited information, namely the binary directional link data, embedded in a network to learn hidden networking structures. There is other rich and meaningful information (e.g., various attributes of entities and more granular information than binary elements such as "like" or "dislike") missed, which play a critical role in forming and understanding relations in a network. In this work, we propose an informative relational model (InfRM) framework to adequately involve rich information and its granularity in a network, including metadata information about each entity and various forms of link data. Firstly, an effective metadata information incorporation method is employed on the prior information from relational models MMSB and LFRM. This is to encourage the entities with similar metadata information to have similar hidden structures. Secondly, we propose various solutions to cater for alternative forms of link data. Substantial efforts have been made towards modelling appropriateness and efficiency, for example, using conjugate priors. We evaluate our framework and its inference algorithms in different datasets, which shows the generality and effectiveness of our models in capturing implicit structures in networks.
[ { "version": "v1", "created": "Sun, 6 Oct 2013 05:47:50 GMT" } ]
2013-10-08T00:00:00
[ [ "Fan", "Xuhui", "" ], [ "Da Xu", "Richard Yi", "" ], [ "Cao", "Longbing", "" ], [ "Song", "Yin", "" ] ]
TITLE: Learning Hidden Structures with Relational Models by Adequately Involving Rich Information in A Network ABSTRACT: Effectively modelling hidden structures in a network is very practical but theoretically challenging. Existing relational models only involve very limited information, namely the binary directional link data, embedded in a network to learn hidden networking structures. There is other rich and meaningful information (e.g., various attributes of entities and more granular information than binary elements such as "like" or "dislike") missed, which play a critical role in forming and understanding relations in a network. In this work, we propose an informative relational model (InfRM) framework to adequately involve rich information and its granularity in a network, including metadata information about each entity and various forms of link data. Firstly, an effective metadata information incorporation method is employed on the prior information from relational models MMSB and LFRM. This is to encourage the entities with similar metadata information to have similar hidden structures. Secondly, we propose various solutions to cater for alternative forms of link data. Substantial efforts have been made towards modelling appropriateness and efficiency, for example, using conjugate priors. We evaluate our framework and its inference algorithms in different datasets, which shows the generality and effectiveness of our models in capturing implicit structures in networks.
1310.1597
Mengqiu Wang
Mengqiu Wang and Christopher D. Manning
Cross-lingual Pseudo-Projected Expectation Regularization for Weakly Supervised Learning
null
null
null
null
cs.CL cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider a multilingual weakly supervised learning scenario where knowledge from annotated corpora in a resource-rich language is transferred via bitext to guide the learning in other languages. Past approaches project labels across bitext and use them as features or gold labels for training. We propose a new method that projects model expectations rather than labels, which facilities transfer of model uncertainty across language boundaries. We encode expectations as constraints and train a discriminative CRF model using Generalized Expectation Criteria (Mann and McCallum, 2010). Evaluated on standard Chinese-English and German-English NER datasets, our method demonstrates F1 scores of 64% and 60% when no labeled data is used. Attaining the same accuracy with supervised CRFs requires 12k and 1.5k labeled sentences. Furthermore, when combined with labeled examples, our method yields significant improvements over state-of-the-art supervised methods, achieving best reported numbers to date on Chinese OntoNotes and German CoNLL-03 datasets.
[ { "version": "v1", "created": "Sun, 6 Oct 2013 16:34:30 GMT" } ]
2013-10-08T00:00:00
[ [ "Wang", "Mengqiu", "" ], [ "Manning", "Christopher D.", "" ] ]
TITLE: Cross-lingual Pseudo-Projected Expectation Regularization for Weakly Supervised Learning ABSTRACT: We consider a multilingual weakly supervised learning scenario where knowledge from annotated corpora in a resource-rich language is transferred via bitext to guide the learning in other languages. Past approaches project labels across bitext and use them as features or gold labels for training. We propose a new method that projects model expectations rather than labels, which facilities transfer of model uncertainty across language boundaries. We encode expectations as constraints and train a discriminative CRF model using Generalized Expectation Criteria (Mann and McCallum, 2010). Evaluated on standard Chinese-English and German-English NER datasets, our method demonstrates F1 scores of 64% and 60% when no labeled data is used. Attaining the same accuracy with supervised CRFs requires 12k and 1.5k labeled sentences. Furthermore, when combined with labeled examples, our method yields significant improvements over state-of-the-art supervised methods, achieving best reported numbers to date on Chinese OntoNotes and German CoNLL-03 datasets.
1310.1811
Ouais Alsharif
Ouais Alsharif and Joelle Pineau
End-to-End Text Recognition with Hybrid HMM Maxout Models
9 pages, 7 figures
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The problem of detecting and recognizing text in natural scenes has proved to be more challenging than its counterpart in documents, with most of the previous work focusing on a single part of the problem. In this work, we propose new solutions to the character and word recognition problems and then show how to combine these solutions in an end-to-end text-recognition system. We do so by leveraging the recently introduced Maxout networks along with hybrid HMM models that have proven useful for voice recognition. Using these elements, we build a tunable and highly accurate recognition system that beats state-of-the-art results on all the sub-problems for both the ICDAR 2003 and SVT benchmark datasets.
[ { "version": "v1", "created": "Mon, 7 Oct 2013 15:08:53 GMT" } ]
2013-10-08T00:00:00
[ [ "Alsharif", "Ouais", "" ], [ "Pineau", "Joelle", "" ] ]
TITLE: End-to-End Text Recognition with Hybrid HMM Maxout Models ABSTRACT: The problem of detecting and recognizing text in natural scenes has proved to be more challenging than its counterpart in documents, with most of the previous work focusing on a single part of the problem. In this work, we propose new solutions to the character and word recognition problems and then show how to combine these solutions in an end-to-end text-recognition system. We do so by leveraging the recently introduced Maxout networks along with hybrid HMM models that have proven useful for voice recognition. Using these elements, we build a tunable and highly accurate recognition system that beats state-of-the-art results on all the sub-problems for both the ICDAR 2003 and SVT benchmark datasets.
1304.0786
Sameet Sreenivasan
Sameet Sreenivasan
Quantitative analysis of the evolution of novelty in cinema through crowdsourced keywords
23 pages, 12 figures (including supplementary material)
Scientific Reports 3, Article number: 2758 (2013)
10.1038/srep02758
null
physics.soc-ph cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The generation of novelty is central to any creative endeavor. Novelty generation and the relationship between novelty and individual hedonic value have long been subjects of study in social psychology. However, few studies have utilized large-scale datasets to quantitatively investigate these issues. Here we consider the domain of American cinema and explore these questions using a database of films spanning a 70 year period. We use crowdsourced keywords from the Internet Movie Database as a window into the contents of films, and prescribe novelty scores for each film based on occurrence probabilities of individual keywords and keyword-pairs. These scores provide revealing insights into the dynamics of novelty in cinema. We investigate how novelty influences the revenue generated by a film, and find a relationship that resembles the Wundt-Berlyne curve. We also study the statistics of keyword occurrence and the aggregate distribution of keywords over a 100 year period.
[ { "version": "v1", "created": "Tue, 2 Apr 2013 20:14:54 GMT" }, { "version": "v2", "created": "Fri, 5 Jul 2013 12:00:21 GMT" }, { "version": "v3", "created": "Fri, 4 Oct 2013 17:03:22 GMT" } ]
2013-10-07T00:00:00
[ [ "Sreenivasan", "Sameet", "" ] ]
TITLE: Quantitative analysis of the evolution of novelty in cinema through crowdsourced keywords ABSTRACT: The generation of novelty is central to any creative endeavor. Novelty generation and the relationship between novelty and individual hedonic value have long been subjects of study in social psychology. However, few studies have utilized large-scale datasets to quantitatively investigate these issues. Here we consider the domain of American cinema and explore these questions using a database of films spanning a 70 year period. We use crowdsourced keywords from the Internet Movie Database as a window into the contents of films, and prescribe novelty scores for each film based on occurrence probabilities of individual keywords and keyword-pairs. These scores provide revealing insights into the dynamics of novelty in cinema. We investigate how novelty influences the revenue generated by a film, and find a relationship that resembles the Wundt-Berlyne curve. We also study the statistics of keyword occurrence and the aggregate distribution of keywords over a 100 year period.
1310.1227
Om Pr
Anagha P. Khedkar, Shaila Subbaraman
The Novel Approach of Adaptive Twin Probability for Genetic Algorithm
7 pages, International Journal of Advanced Studies in Computer Science and Engineering (IJASCSE), Volume 2, Special Issue 2, 2013
null
null
null
cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The performance of GA is measured and analyzed in terms of its performance parameters against variations in its genetic operators and associated parameters. Since last four decades huge numbers of researchers have been working on the performance of GA and its enhancement. This earlier research work on analyzing the performance of GA enforces the need to further investigate the exploration and exploitation characteristics and observe its impact on the behavior and overall performance of GA. This paper introduces the novel approach of adaptive twin probability associated with the advanced twin operator that enhances the performance of GA. The design of the advanced twin operator is extrapolated from the twin offspring birth due to single ovulation in natural genetic systems as mentioned in the earlier works. The twin probability of this operator is adaptively varied based on the fitness of best individual thereby relieving the GA user from statically defining its value. This novel approach of adaptive twin probability is experimented and tested on the standard benchmark optimization test functions. The experimental results show the increased accuracy in terms of the best individual and reduced convergence time.
[ { "version": "v1", "created": "Fri, 4 Oct 2013 11:31:40 GMT" } ]
2013-10-07T00:00:00
[ [ "Khedkar", "Anagha P.", "" ], [ "Subbaraman", "Shaila", "" ] ]
TITLE: The Novel Approach of Adaptive Twin Probability for Genetic Algorithm ABSTRACT: The performance of GA is measured and analyzed in terms of its performance parameters against variations in its genetic operators and associated parameters. Since last four decades huge numbers of researchers have been working on the performance of GA and its enhancement. This earlier research work on analyzing the performance of GA enforces the need to further investigate the exploration and exploitation characteristics and observe its impact on the behavior and overall performance of GA. This paper introduces the novel approach of adaptive twin probability associated with the advanced twin operator that enhances the performance of GA. The design of the advanced twin operator is extrapolated from the twin offspring birth due to single ovulation in natural genetic systems as mentioned in the earlier works. The twin probability of this operator is adaptively varied based on the fitness of best individual thereby relieving the GA user from statically defining its value. This novel approach of adaptive twin probability is experimented and tested on the standard benchmark optimization test functions. The experimental results show the increased accuracy in terms of the best individual and reduced convergence time.
1309.7690
EPTCS
Andrea G. Citrolo (Universit\`a degli Studi di Milano-Bicocca), Giancarlo Mauri (Universit\`a degli Studi di Milano-Bicocca)
A Hybrid Monte Carlo Ant Colony Optimization Approach for Protein Structure Prediction in the HP Model
In Proceedings Wivace 2013, arXiv:1309.7122
EPTCS 130, 2013, pp. 61-69
10.4204/EPTCS.130.9
null
cs.NE cs.CE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The hydrophobic-polar (HP) model has been widely studied in the field of protein structure prediction (PSP) both for theoretical purposes and as a benchmark for new optimization strategies. In this work we introduce a new heuristics based on Ant Colony Optimization (ACO) and Markov Chain Monte Carlo (MCMC) that we called Hybrid Monte Carlo Ant Colony Optimization (HMCACO). We describe this method and compare results obtained on well known HP instances in the 3 dimensional cubic lattice to those obtained with standard ACO and Simulated Annealing (SA). All methods were implemented using an unconstrained neighborhood and a modified objective function to prevent the creation of overlapping walks. Results show that our methods perform better than the other heuristics in all benchmark instances.
[ { "version": "v1", "created": "Mon, 30 Sep 2013 01:05:51 GMT" } ]
2013-10-04T00:00:00
[ [ "Citrolo", "Andrea G.", "", "Università degli Studi di Milano-Bicocca" ], [ "Mauri", "Giancarlo", "", "Università degli Studi di Milano-Bicocca" ] ]
TITLE: A Hybrid Monte Carlo Ant Colony Optimization Approach for Protein Structure Prediction in the HP Model ABSTRACT: The hydrophobic-polar (HP) model has been widely studied in the field of protein structure prediction (PSP) both for theoretical purposes and as a benchmark for new optimization strategies. In this work we introduce a new heuristics based on Ant Colony Optimization (ACO) and Markov Chain Monte Carlo (MCMC) that we called Hybrid Monte Carlo Ant Colony Optimization (HMCACO). We describe this method and compare results obtained on well known HP instances in the 3 dimensional cubic lattice to those obtained with standard ACO and Simulated Annealing (SA). All methods were implemented using an unconstrained neighborhood and a modified objective function to prevent the creation of overlapping walks. Results show that our methods perform better than the other heuristics in all benchmark instances.
1310.0201
Moreno Coco MIC
Moreno I. Coco and Rick Dale
Cross-Recurrence Quantification Analysis of Categorical and Continuous Time Series: an R package
null
null
null
null
cs.CL stat.AP
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper describes the R package crqa to perform cross-recurrence quantification analysis of two time series of either a categorical or continuous nature. Streams of behavioral information, from eye movements to linguistic elements, unfold over time. When two people interact, such as in conversation, they often adapt to each other, leading these behavioral levels to exhibit recurrent states. In dialogue, for example, interlocutors adapt to each other by exchanging interactive cues: smiles, nods, gestures, choice of words, and so on. In order for us to capture closely the goings-on of dynamic interaction, and uncover the extent of coupling between two individuals, we need to quantify how much recurrence is taking place at these levels. Methods available in crqa would allow researchers in cognitive science to pose such questions as how much are two people recurrent at some level of analysis, what is the characteristic lag time for one person to maximally match another, or whether one person is leading another. First, we set the theoretical ground to understand the difference between 'correlation' and 'co-visitation' when comparing two time series, using an aggregative or cross-recurrence approach. Then, we describe more formally the principles of cross-recurrence, and show with the current package how to carry out analyses applying them. We end the paper by comparing computational efficiency, and results' consistency, of crqa R package, with the benchmark MATLAB toolbox crptoolbox. We show perfect comparability between the two libraries on both levels.
[ { "version": "v1", "created": "Tue, 1 Oct 2013 09:20:21 GMT" }, { "version": "v2", "created": "Thu, 3 Oct 2013 16:09:07 GMT" } ]
2013-10-04T00:00:00
[ [ "Coco", "Moreno I.", "" ], [ "Dale", "Rick", "" ] ]
TITLE: Cross-Recurrence Quantification Analysis of Categorical and Continuous Time Series: an R package ABSTRACT: This paper describes the R package crqa to perform cross-recurrence quantification analysis of two time series of either a categorical or continuous nature. Streams of behavioral information, from eye movements to linguistic elements, unfold over time. When two people interact, such as in conversation, they often adapt to each other, leading these behavioral levels to exhibit recurrent states. In dialogue, for example, interlocutors adapt to each other by exchanging interactive cues: smiles, nods, gestures, choice of words, and so on. In order for us to capture closely the goings-on of dynamic interaction, and uncover the extent of coupling between two individuals, we need to quantify how much recurrence is taking place at these levels. Methods available in crqa would allow researchers in cognitive science to pose such questions as how much are two people recurrent at some level of analysis, what is the characteristic lag time for one person to maximally match another, or whether one person is leading another. First, we set the theoretical ground to understand the difference between 'correlation' and 'co-visitation' when comparing two time series, using an aggregative or cross-recurrence approach. Then, we describe more formally the principles of cross-recurrence, and show with the current package how to carry out analyses applying them. We end the paper by comparing computational efficiency, and results' consistency, of crqa R package, with the benchmark MATLAB toolbox crptoolbox. We show perfect comparability between the two libraries on both levels.
1310.0883
Srikumar Venugopal
Freddie Sunarso, Srikumar Venugopal and Federico Lauro
Scalable Protein Sequence Similarity Search using Locality-Sensitive Hashing and MapReduce
null
null
null
UNSW CSE TR 201325
cs.DC cs.CE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Metagenomics is the study of environments through genetic sampling of their microbiota. Metagenomic studies produce large datasets that are estimated to grow at a faster rate than the available computational capacity. A key step in the study of metagenome data is sequence similarity searching which is computationally intensive over large datasets. Tools such as BLAST require large dedicated computing infrastructure to perform such analysis and may not be available to every researcher. In this paper, we propose a novel approach called ScalLoPS that performs searching on protein sequence datasets using LSH (Locality-Sensitive Hashing) that is implemented using the MapReduce distributed framework. ScalLoPS is designed to scale across computing resources sourced from cloud computing providers. We present the design and implementation of ScalLoPS followed by evaluation with datasets derived from both traditional as well as metagenomic studies. Our experiments show that with this method approximates the quality of BLAST results while improving the scalability of protein sequence search.
[ { "version": "v1", "created": "Thu, 3 Oct 2013 03:11:06 GMT" } ]
2013-10-04T00:00:00
[ [ "Sunarso", "Freddie", "" ], [ "Venugopal", "Srikumar", "" ], [ "Lauro", "Federico", "" ] ]
TITLE: Scalable Protein Sequence Similarity Search using Locality-Sensitive Hashing and MapReduce ABSTRACT: Metagenomics is the study of environments through genetic sampling of their microbiota. Metagenomic studies produce large datasets that are estimated to grow at a faster rate than the available computational capacity. A key step in the study of metagenome data is sequence similarity searching which is computationally intensive over large datasets. Tools such as BLAST require large dedicated computing infrastructure to perform such analysis and may not be available to every researcher. In this paper, we propose a novel approach called ScalLoPS that performs searching on protein sequence datasets using LSH (Locality-Sensitive Hashing) that is implemented using the MapReduce distributed framework. ScalLoPS is designed to scale across computing resources sourced from cloud computing providers. We present the design and implementation of ScalLoPS followed by evaluation with datasets derived from both traditional as well as metagenomic studies. Our experiments show that with this method approximates the quality of BLAST results while improving the scalability of protein sequence search.
1310.0894
Richard Chow
Richard Chow, Hongxia Jin, Bart Knijnenburg, Gokay Saldamli
Differential Data Analysis for Recommender Systems
Extended version of RecSys 2013 paper
null
null
null
cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present techniques to characterize which data is important to a recommender system and which is not. Important data is data that contributes most to the accuracy of the recommendation algorithm, while less important data contributes less to the accuracy or even decreases it. Characterizing the importance of data has two potential direct benefits: (1) increased privacy and (2) reduced data management costs, including storage. For privacy, we enable increased recommendation accuracy for comparable privacy levels using existing data obfuscation techniques. For storage, our results indicate that we can achieve large reductions in recommendation data and yet maintain recommendation accuracy. Our main technique is called differential data analysis. The name is inspired by other sorts of differential analysis, such as differential power analysis and differential cryptanalysis, where insight comes through analysis of slightly differing inputs. In differential data analysis we chunk the data and compare results in the presence or absence of each chunk. We present results applying differential data analysis to two datasets and three different kinds of attributes. The first attribute is called user hardship. This is a novel attribute, particularly relevant to location datasets, that indicates how burdensome a data point was to achieve. The second and third attributes are more standard: timestamp and user rating. For user rating, we confirm previous work concerning the increased importance to the recommender of data corresponding to high and low user ratings.
[ { "version": "v1", "created": "Thu, 3 Oct 2013 04:47:47 GMT" } ]
2013-10-04T00:00:00
[ [ "Chow", "Richard", "" ], [ "Jin", "Hongxia", "" ], [ "Knijnenburg", "Bart", "" ], [ "Saldamli", "Gokay", "" ] ]
TITLE: Differential Data Analysis for Recommender Systems ABSTRACT: We present techniques to characterize which data is important to a recommender system and which is not. Important data is data that contributes most to the accuracy of the recommendation algorithm, while less important data contributes less to the accuracy or even decreases it. Characterizing the importance of data has two potential direct benefits: (1) increased privacy and (2) reduced data management costs, including storage. For privacy, we enable increased recommendation accuracy for comparable privacy levels using existing data obfuscation techniques. For storage, our results indicate that we can achieve large reductions in recommendation data and yet maintain recommendation accuracy. Our main technique is called differential data analysis. The name is inspired by other sorts of differential analysis, such as differential power analysis and differential cryptanalysis, where insight comes through analysis of slightly differing inputs. In differential data analysis we chunk the data and compare results in the presence or absence of each chunk. We present results applying differential data analysis to two datasets and three different kinds of attributes. The first attribute is called user hardship. This is a novel attribute, particularly relevant to location datasets, that indicates how burdensome a data point was to achieve. The second and third attributes are more standard: timestamp and user rating. For user rating, we confirm previous work concerning the increased importance to the recommender of data corresponding to high and low user ratings.
1309.5275
Dan Stowell
Dan Stowell and Mark D. Plumbley
An open dataset for research on audio field recording archives: freefield1010
null
null
null
null
cs.SD cs.DL
http://creativecommons.org/licenses/by/3.0/
We introduce a free and open dataset of 7690 audio clips sampled from the field-recording tag in the Freesound audio archive. The dataset is designed for use in research related to data mining in audio archives of field recordings / soundscapes. Audio is standardised, and audio and metadata are Creative Commons licensed. We describe the data preparation process, characterise the dataset descriptively, and illustrate its use through an auto-tagging experiment.
[ { "version": "v1", "created": "Fri, 20 Sep 2013 14:12:04 GMT" }, { "version": "v2", "created": "Tue, 1 Oct 2013 21:29:13 GMT" } ]
2013-10-03T00:00:00
[ [ "Stowell", "Dan", "" ], [ "Plumbley", "Mark D.", "" ] ]
TITLE: An open dataset for research on audio field recording archives: freefield1010 ABSTRACT: We introduce a free and open dataset of 7690 audio clips sampled from the field-recording tag in the Freesound audio archive. The dataset is designed for use in research related to data mining in audio archives of field recordings / soundscapes. Audio is standardised, and audio and metadata are Creative Commons licensed. We describe the data preparation process, characterise the dataset descriptively, and illustrate its use through an auto-tagging experiment.
1310.0505
Haiyan Wang
Haiyan Wang, Feng Wang, Kuai Xu
Modeling Information Diffusion in Online Social Networks with Partial Differential Equations
null
null
null
null
cs.SI physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Online social networks such as Twitter and Facebook have gained tremendous popularity for information exchange. The availability of unprecedented amounts of digital data has accelerated research on information diffusion in online social networks. However, the mechanism of information spreading in online social networks remains elusive due to the complexity of social interactions and rapid change of online social networks. Much of prior work on information diffusion over online social networks has based on empirical and statistical approaches. The majority of dynamical models arising from information diffusion over online social networks involve ordinary differential equations which only depend on time. In a number of recent papers, the authors propose to use partial differential equations(PDEs) to characterize temporal and spatial patterns of information diffusion over online social networks. Built on intuitive cyber-distances such as friendship hops in online social networks, the reaction-diffusion equations take into account influences from various external out-of-network sources, such as the mainstream media, and provide a new analytic framework to study the interplay of structural and topical influences on information diffusion over online social networks. In this survey, we discuss a number of PDE-based models that are validated with real datasets collected from popular online social networks such as Digg and Twitter. Some new developments including the conservation law of information flow in online social networks and information propagation speeds based on traveling wave solutions are presented to solidify the foundation of the PDE models and highlight the new opportunities and challenges for mathematicians as well as computer scientists and researchers in online social networks.
[ { "version": "v1", "created": "Tue, 1 Oct 2013 22:17:30 GMT" } ]
2013-10-03T00:00:00
[ [ "Wang", "Haiyan", "" ], [ "Wang", "Feng", "" ], [ "Xu", "Kuai", "" ] ]
TITLE: Modeling Information Diffusion in Online Social Networks with Partial Differential Equations ABSTRACT: Online social networks such as Twitter and Facebook have gained tremendous popularity for information exchange. The availability of unprecedented amounts of digital data has accelerated research on information diffusion in online social networks. However, the mechanism of information spreading in online social networks remains elusive due to the complexity of social interactions and rapid change of online social networks. Much of prior work on information diffusion over online social networks has based on empirical and statistical approaches. The majority of dynamical models arising from information diffusion over online social networks involve ordinary differential equations which only depend on time. In a number of recent papers, the authors propose to use partial differential equations(PDEs) to characterize temporal and spatial patterns of information diffusion over online social networks. Built on intuitive cyber-distances such as friendship hops in online social networks, the reaction-diffusion equations take into account influences from various external out-of-network sources, such as the mainstream media, and provide a new analytic framework to study the interplay of structural and topical influences on information diffusion over online social networks. In this survey, we discuss a number of PDE-based models that are validated with real datasets collected from popular online social networks such as Digg and Twitter. Some new developments including the conservation law of information flow in online social networks and information propagation speeds based on traveling wave solutions are presented to solidify the foundation of the PDE models and highlight the new opportunities and challenges for mathematicians as well as computer scientists and researchers in online social networks.
1206.2038
Tien Tuan Anh Dinh
Dinh Tien Tuan Anh, Quach Vinh Thanh, Anwitaman Datta
CloudMine: Multi-Party Privacy-Preserving Data Analytics Service
null
null
null
null
cs.CR cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
An increasing number of businesses are replacing their data storage and computation infrastructure with cloud services. Likewise, there is an increased emphasis on performing analytics based on multiple datasets obtained from different data sources. While ensuring security of data and computation outsourced to a third party cloud is in itself challenging, supporting analytics using data distributed across multiple, independent clouds is even further from trivial. In this paper we present CloudMine, a cloud-based service which allows multiple data owners to perform privacy-preserved computation over the joint data using their clouds as delegates. CloudMine protects data privacy with respect to semi-honest data owners and semi-honest clouds. It furthermore ensures the privacy of the computation outputs from the curious clouds. It allows data owners to reliably detect if their cloud delegates have been lazy when carrying out the delegated computation. CloudMine can run as a centralized service on a single cloud, or as a distributed service over multiple, independent clouds. CloudMine supports a set of basic computations that can be used to construct a variety of highly complex, distributed privacy-preserving data analytics. We demonstrate how a simple instance of CloudMine (secure sum service) is used to implement three classical data mining tasks (classification, association rule mining and clustering) in a cloud environment. We experiment with a prototype of the service, the results of which suggest its practicality for supporting privacy-preserving data analytics as a (multi) cloud-based service.
[ { "version": "v1", "created": "Sun, 10 Jun 2012 16:27:48 GMT" }, { "version": "v2", "created": "Tue, 1 Oct 2013 05:14:19 GMT" } ]
2013-10-02T00:00:00
[ [ "Anh", "Dinh Tien Tuan", "" ], [ "Thanh", "Quach Vinh", "" ], [ "Datta", "Anwitaman", "" ] ]
TITLE: CloudMine: Multi-Party Privacy-Preserving Data Analytics Service ABSTRACT: An increasing number of businesses are replacing their data storage and computation infrastructure with cloud services. Likewise, there is an increased emphasis on performing analytics based on multiple datasets obtained from different data sources. While ensuring security of data and computation outsourced to a third party cloud is in itself challenging, supporting analytics using data distributed across multiple, independent clouds is even further from trivial. In this paper we present CloudMine, a cloud-based service which allows multiple data owners to perform privacy-preserved computation over the joint data using their clouds as delegates. CloudMine protects data privacy with respect to semi-honest data owners and semi-honest clouds. It furthermore ensures the privacy of the computation outputs from the curious clouds. It allows data owners to reliably detect if their cloud delegates have been lazy when carrying out the delegated computation. CloudMine can run as a centralized service on a single cloud, or as a distributed service over multiple, independent clouds. CloudMine supports a set of basic computations that can be used to construct a variety of highly complex, distributed privacy-preserving data analytics. We demonstrate how a simple instance of CloudMine (secure sum service) is used to implement three classical data mining tasks (classification, association rule mining and clustering) in a cloud environment. We experiment with a prototype of the service, the results of which suggest its practicality for supporting privacy-preserving data analytics as a (multi) cloud-based service.
1309.7512
Alexander Fix
Alexander Fix and Thorsten Joachims and Sam Park and Ramin Zabih
Structured learning of sum-of-submodular higher order energy functions
null
null
null
null
cs.CV cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Submodular functions can be exactly minimized in polynomial time, and the special case that graph cuts solve with max flow \cite{KZ:PAMI04} has had significant impact in computer vision \cite{BVZ:PAMI01,Kwatra:SIGGRAPH03,Rother:GrabCut04}. In this paper we address the important class of sum-of-submodular (SoS) functions \cite{Arora:ECCV12,Kolmogorov:DAM12}, which can be efficiently minimized via a variant of max flow called submodular flow \cite{Edmonds:ADM77}. SoS functions can naturally express higher order priors involving, e.g., local image patches; however, it is difficult to fully exploit their expressive power because they have so many parameters. Rather than trying to formulate existing higher order priors as an SoS function, we take a discriminative learning approach, effectively searching the space of SoS functions for a higher order prior that performs well on our training set. We adopt a structural SVM approach \cite{Joachims/etal/09a,Tsochantaridis/etal/04} and formulate the training problem in terms of quadratic programming; as a result we can efficiently search the space of SoS priors via an extended cutting-plane algorithm. We also show how the state-of-the-art max flow method for vision problems \cite{Goldberg:ESA11} can be modified to efficiently solve the submodular flow problem. Experimental comparisons are made against the OpenCV implementation of the GrabCut interactive segmentation technique \cite{Rother:GrabCut04}, which uses hand-tuned parameters instead of machine learning. On a standard dataset \cite{Gulshan:CVPR10} our method learns higher order priors with hundreds of parameter values, and produces significantly better segmentations. While our focus is on binary labeling problems, we show that our techniques can be naturally generalized to handle more than two labels.
[ { "version": "v1", "created": "Sat, 28 Sep 2013 23:55:01 GMT" }, { "version": "v2", "created": "Tue, 1 Oct 2013 02:45:20 GMT" } ]
2013-10-02T00:00:00
[ [ "Fix", "Alexander", "" ], [ "Joachims", "Thorsten", "" ], [ "Park", "Sam", "" ], [ "Zabih", "Ramin", "" ] ]
TITLE: Structured learning of sum-of-submodular higher order energy functions ABSTRACT: Submodular functions can be exactly minimized in polynomial time, and the special case that graph cuts solve with max flow \cite{KZ:PAMI04} has had significant impact in computer vision \cite{BVZ:PAMI01,Kwatra:SIGGRAPH03,Rother:GrabCut04}. In this paper we address the important class of sum-of-submodular (SoS) functions \cite{Arora:ECCV12,Kolmogorov:DAM12}, which can be efficiently minimized via a variant of max flow called submodular flow \cite{Edmonds:ADM77}. SoS functions can naturally express higher order priors involving, e.g., local image patches; however, it is difficult to fully exploit their expressive power because they have so many parameters. Rather than trying to formulate existing higher order priors as an SoS function, we take a discriminative learning approach, effectively searching the space of SoS functions for a higher order prior that performs well on our training set. We adopt a structural SVM approach \cite{Joachims/etal/09a,Tsochantaridis/etal/04} and formulate the training problem in terms of quadratic programming; as a result we can efficiently search the space of SoS priors via an extended cutting-plane algorithm. We also show how the state-of-the-art max flow method for vision problems \cite{Goldberg:ESA11} can be modified to efficiently solve the submodular flow problem. Experimental comparisons are made against the OpenCV implementation of the GrabCut interactive segmentation technique \cite{Rother:GrabCut04}, which uses hand-tuned parameters instead of machine learning. On a standard dataset \cite{Gulshan:CVPR10} our method learns higher order priors with hundreds of parameter values, and produces significantly better segmentations. While our focus is on binary labeling problems, we show that our techniques can be naturally generalized to handle more than two labels.
1310.0308
Tomislav Petkovi\'c
Karla Brki\'c, Sr{\dj}an Ra\v{s}i\'c, Axel Pinz, Sini\v{s}a \v{S}egvi\'c and Zoran Kalafati\'c
Combining Spatio-Temporal Appearance Descriptors and Optical Flow for Human Action Recognition in Video Data
Part of the Proceedings of the Croatian Computer Vision Workshop, CCVW 2013, Year 1
null
null
UniZg-CRV-CCVW/2013/0011
cs.CV
http://creativecommons.org/licenses/by-nc-sa/3.0/
This paper proposes combining spatio-temporal appearance (STA) descriptors with optical flow for human action recognition. The STA descriptors are local histogram-based descriptors of space-time, suitable for building a partial representation of arbitrary spatio-temporal phenomena. Because of the possibility of iterative refinement, they are interesting in the context of online human action recognition. We investigate the use of dense optical flow as the image function of the STA descriptor for human action recognition, using two different algorithms for computing the flow: the Farneb\"ack algorithm and the TVL1 algorithm. We provide a detailed analysis of the influencing optical flow algorithm parameters on the produced optical flow fields. An extensive experimental validation of optical flow-based STA descriptors in human action recognition is performed on the KTH human action dataset. The encouraging experimental results suggest the potential of our approach in online human action recognition.
[ { "version": "v1", "created": "Tue, 1 Oct 2013 14:13:40 GMT" } ]
2013-10-02T00:00:00
[ [ "Brkić", "Karla", "" ], [ "Rašić", "Srđan", "" ], [ "Pinz", "Axel", "" ], [ "Šegvić", "Siniša", "" ], [ "Kalafatić", "Zoran", "" ] ]
TITLE: Combining Spatio-Temporal Appearance Descriptors and Optical Flow for Human Action Recognition in Video Data ABSTRACT: This paper proposes combining spatio-temporal appearance (STA) descriptors with optical flow for human action recognition. The STA descriptors are local histogram-based descriptors of space-time, suitable for building a partial representation of arbitrary spatio-temporal phenomena. Because of the possibility of iterative refinement, they are interesting in the context of online human action recognition. We investigate the use of dense optical flow as the image function of the STA descriptor for human action recognition, using two different algorithms for computing the flow: the Farneb\"ack algorithm and the TVL1 algorithm. We provide a detailed analysis of the influencing optical flow algorithm parameters on the produced optical flow fields. An extensive experimental validation of optical flow-based STA descriptors in human action recognition is performed on the KTH human action dataset. The encouraging experimental results suggest the potential of our approach in online human action recognition.
1310.0310
Tomislav Petkovi\'c
Ivan Kre\v{s}o, Marko \v{S}evrovi\'c and Sini\v{s}a \v{S}egvi\'c
A Novel Georeferenced Dataset for Stereo Visual Odometry
Part of the Proceedings of the Croatian Computer Vision Workshop, CCVW 2013, Year 1
null
null
UniZg-CRV-CCVW/2013/0017
cs.CV
http://creativecommons.org/licenses/by-nc-sa/3.0/
In this work, we present a novel dataset for assessing the accuracy of stereo visual odometry. The dataset has been acquired by a small-baseline stereo rig mounted on the top of a moving car. The groundtruth is supplied by a consumer grade GPS device without IMU. Synchronization and alignment between GPS readings and stereo frames are recovered after the acquisition. We show that the attained groundtruth accuracy allows to draw useful conclusions in practice. The presented experiments address influence of camera calibration, baseline distance and zero-disparity features to the achieved reconstruction performance.
[ { "version": "v1", "created": "Tue, 1 Oct 2013 14:15:48 GMT" } ]
2013-10-02T00:00:00
[ [ "Krešo", "Ivan", "" ], [ "Ševrović", "Marko", "" ], [ "Šegvić", "Siniša", "" ] ]
TITLE: A Novel Georeferenced Dataset for Stereo Visual Odometry ABSTRACT: In this work, we present a novel dataset for assessing the accuracy of stereo visual odometry. The dataset has been acquired by a small-baseline stereo rig mounted on the top of a moving car. The groundtruth is supplied by a consumer grade GPS device without IMU. Synchronization and alignment between GPS readings and stereo frames are recovered after the acquisition. We show that the attained groundtruth accuracy allows to draw useful conclusions in practice. The presented experiments address influence of camera calibration, baseline distance and zero-disparity features to the achieved reconstruction performance.
1310.0316
Tomislav Petkovi\'c
Ivan Sikiri\'c, Karla Brki\'c and Sini\v{s}a \v{S}egvi\'c
Classifying Traffic Scenes Using The GIST Image Descriptor
Part of the Proceedings of the Croatian Computer Vision Workshop, CCVW 2013, Year 1
null
null
UniZg-CRV-CCVW/2013/0013
cs.CV
http://creativecommons.org/licenses/by-nc-sa/3.0/
This paper investigates classification of traffic scenes in a very low bandwidth scenario, where an image should be coded by a small number of features. We introduce a novel dataset, called the FM1 dataset, consisting of 5615 images of eight different traffic scenes: open highway, open road, settlement, tunnel, tunnel exit, toll booth, heavy traffic and the overpass. We evaluate the suitability of the GIST descriptor as a representation of these images, first by exploring the descriptor space using PCA and k-means clustering, and then by using an SVM classifier and recording its 10-fold cross-validation performance on the introduced FM1 dataset. The obtained recognition rates are very encouraging, indicating that the use of the GIST descriptor alone could be sufficiently descriptive even when very high performance is required.
[ { "version": "v1", "created": "Tue, 1 Oct 2013 14:19:26 GMT" } ]
2013-10-02T00:00:00
[ [ "Sikirić", "Ivan", "" ], [ "Brkić", "Karla", "" ], [ "Šegvić", "Siniša", "" ] ]
TITLE: Classifying Traffic Scenes Using The GIST Image Descriptor ABSTRACT: This paper investigates classification of traffic scenes in a very low bandwidth scenario, where an image should be coded by a small number of features. We introduce a novel dataset, called the FM1 dataset, consisting of 5615 images of eight different traffic scenes: open highway, open road, settlement, tunnel, tunnel exit, toll booth, heavy traffic and the overpass. We evaluate the suitability of the GIST descriptor as a representation of these images, first by exploring the descriptor space using PCA and k-means clustering, and then by using an SVM classifier and recording its 10-fold cross-validation performance on the introduced FM1 dataset. The obtained recognition rates are very encouraging, indicating that the use of the GIST descriptor alone could be sufficiently descriptive even when very high performance is required.
1211.4909
Benyuan Liu
Benyuan Liu, Zhilin Zhang, Hongqi Fan, Qiang Fu
Fast Marginalized Block Sparse Bayesian Learning Algorithm
null
null
null
null
cs.IT cs.LG math.IT stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The performance of sparse signal recovery from noise corrupted, underdetermined measurements can be improved if both sparsity and correlation structure of signals are exploited. One typical correlation structure is the intra-block correlation in block sparse signals. To exploit this structure, a framework, called block sparse Bayesian learning (BSBL), has been proposed recently. Algorithms derived from this framework showed superior performance but they are not very fast, which limits their applications. This work derives an efficient algorithm from this framework, using a marginalized likelihood maximization method. Compared to existing BSBL algorithms, it has close recovery performance but is much faster. Therefore, it is more suitable for large scale datasets and applications requiring real-time implementation.
[ { "version": "v1", "created": "Wed, 21 Nov 2012 01:06:49 GMT" }, { "version": "v2", "created": "Thu, 29 Nov 2012 01:24:49 GMT" }, { "version": "v3", "created": "Fri, 18 Jan 2013 02:28:09 GMT" }, { "version": "v4", "created": "Tue, 22 Jan 2013 01:51:17 GMT" }, { "version": "v5", "created": "Mon, 4 Mar 2013 02:07:31 GMT" }, { "version": "v6", "created": "Mon, 16 Sep 2013 22:58:17 GMT" }, { "version": "v7", "created": "Sun, 29 Sep 2013 15:56:47 GMT" } ]
2013-10-01T00:00:00
[ [ "Liu", "Benyuan", "" ], [ "Zhang", "Zhilin", "" ], [ "Fan", "Hongqi", "" ], [ "Fu", "Qiang", "" ] ]
TITLE: Fast Marginalized Block Sparse Bayesian Learning Algorithm ABSTRACT: The performance of sparse signal recovery from noise corrupted, underdetermined measurements can be improved if both sparsity and correlation structure of signals are exploited. One typical correlation structure is the intra-block correlation in block sparse signals. To exploit this structure, a framework, called block sparse Bayesian learning (BSBL), has been proposed recently. Algorithms derived from this framework showed superior performance but they are not very fast, which limits their applications. This work derives an efficient algorithm from this framework, using a marginalized likelihood maximization method. Compared to existing BSBL algorithms, it has close recovery performance but is much faster. Therefore, it is more suitable for large scale datasets and applications requiring real-time implementation.
1301.7619
Gonzalo Mateos
Juan Andres Bazerque, Gonzalo Mateos, and Georgios B. Giannakis
Rank regularization and Bayesian inference for tensor completion and extrapolation
12 pages, submitted to IEEE Transactions on Signal Processing
null
10.1109/TSP.2013.2278516
null
cs.IT cs.LG math.IT stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A novel regularizer of the PARAFAC decomposition factors capturing the tensor's rank is proposed in this paper, as the key enabler for completion of three-way data arrays with missing entries. Set in a Bayesian framework, the tensor completion method incorporates prior information to enhance its smoothing and prediction capabilities. This probabilistic approach can naturally accommodate general models for the data distribution, lending itself to various fitting criteria that yield optimum estimates in the maximum-a-posteriori sense. In particular, two algorithms are devised for Gaussian- and Poisson-distributed data, that minimize the rank-regularized least-squares error and Kullback-Leibler divergence, respectively. The proposed technique is able to recover the "ground-truth'' tensor rank when tested on synthetic data, and to complete brain imaging and yeast gene expression datasets with 50% and 15% of missing entries respectively, resulting in recovery errors at -10dB and -15dB.
[ { "version": "v1", "created": "Thu, 31 Jan 2013 14:17:28 GMT" } ]
2013-10-01T00:00:00
[ [ "Bazerque", "Juan Andres", "" ], [ "Mateos", "Gonzalo", "" ], [ "Giannakis", "Georgios B.", "" ] ]
TITLE: Rank regularization and Bayesian inference for tensor completion and extrapolation ABSTRACT: A novel regularizer of the PARAFAC decomposition factors capturing the tensor's rank is proposed in this paper, as the key enabler for completion of three-way data arrays with missing entries. Set in a Bayesian framework, the tensor completion method incorporates prior information to enhance its smoothing and prediction capabilities. This probabilistic approach can naturally accommodate general models for the data distribution, lending itself to various fitting criteria that yield optimum estimates in the maximum-a-posteriori sense. In particular, two algorithms are devised for Gaussian- and Poisson-distributed data, that minimize the rank-regularized least-squares error and Kullback-Leibler divergence, respectively. The proposed technique is able to recover the "ground-truth'' tensor rank when tested on synthetic data, and to complete brain imaging and yeast gene expression datasets with 50% and 15% of missing entries respectively, resulting in recovery errors at -10dB and -15dB.
1308.5174
James Pallister
James Pallister, Simon Hollis, Jeremy Bennett
BEEBS: Open Benchmarks for Energy Measurements on Embedded Platforms
null
null
null
null
cs.PF
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents and justifies an open benchmark suite named BEEBS, targeted at evaluating the energy consumption of embedded processors. We explore the possible sources of energy consumption, then select individual benchmarks from contemporary suites to cover these areas. Version one of BEEBS is presented here and contains 10 benchmarks that cover a wide range of typical embedded applications. The benchmark suite is portable across diverse architectures and is freely available. The benchmark suite is extensively evaluated, and the properties of its constituent programs are analysed. Using real hardware platforms we show case examples which illustrate the difference in power dissipation between three processor architectures and their related ISAs. We observe significant differences in the average instruction dissipation between the architectures of 4.4x, specifically 170uW/MHz (ARM Cortex-M0), 65uW/MHz (Adapteva Epiphany) and 88uW/MHz (XMOS XS1-L1).
[ { "version": "v1", "created": "Fri, 23 Aug 2013 16:29:27 GMT" }, { "version": "v2", "created": "Sat, 28 Sep 2013 16:16:03 GMT" } ]
2013-10-01T00:00:00
[ [ "Pallister", "James", "" ], [ "Hollis", "Simon", "" ], [ "Bennett", "Jeremy", "" ] ]
TITLE: BEEBS: Open Benchmarks for Energy Measurements on Embedded Platforms ABSTRACT: This paper presents and justifies an open benchmark suite named BEEBS, targeted at evaluating the energy consumption of embedded processors. We explore the possible sources of energy consumption, then select individual benchmarks from contemporary suites to cover these areas. Version one of BEEBS is presented here and contains 10 benchmarks that cover a wide range of typical embedded applications. The benchmark suite is portable across diverse architectures and is freely available. The benchmark suite is extensively evaluated, and the properties of its constituent programs are analysed. Using real hardware platforms we show case examples which illustrate the difference in power dissipation between three processor architectures and their related ISAs. We observe significant differences in the average instruction dissipation between the architectures of 4.4x, specifically 170uW/MHz (ARM Cortex-M0), 65uW/MHz (Adapteva Epiphany) and 88uW/MHz (XMOS XS1-L1).
1309.5594
Chunhua Shen
Fumin Shen and Chunhua Shen
Generic Image Classification Approaches Excel on Face Recognition
10 pages
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The main finding of this work is that the standard image classification pipeline, which consists of dictionary learning, feature encoding, spatial pyramid pooling and linear classification, outperforms all state-of-the-art face recognition methods on the tested benchmark datasets (we have tested on AR, Extended Yale B, the challenging FERET, and LFW-a datasets). This surprising and prominent result suggests that those advances in generic image classification can be directly applied to improve face recognition systems. In other words, face recognition may not need to be viewed as a separate object classification problem. While recently a large body of residual based face recognition methods focus on developing complex dictionary learning algorithms, in this work we show that a dictionary of randomly extracted patches (even from non-face images) can achieve very promising results using the image classification pipeline. That means, the choice of dictionary learning methods may not be important. Instead, we find that learning multiple dictionaries using different low-level image features often improve the final classification accuracy. Our proposed face recognition approach offers the best reported results on the widely-used face recognition benchmark datasets. In particular, on the challenging FERET and LFW-a datasets, we improve the best reported accuracies in the literature by about 20% and 30% respectively.
[ { "version": "v1", "created": "Sun, 22 Sep 2013 11:52:03 GMT" }, { "version": "v2", "created": "Mon, 30 Sep 2013 03:23:36 GMT" } ]
2013-10-01T00:00:00
[ [ "Shen", "Fumin", "" ], [ "Shen", "Chunhua", "" ] ]
TITLE: Generic Image Classification Approaches Excel on Face Recognition ABSTRACT: The main finding of this work is that the standard image classification pipeline, which consists of dictionary learning, feature encoding, spatial pyramid pooling and linear classification, outperforms all state-of-the-art face recognition methods on the tested benchmark datasets (we have tested on AR, Extended Yale B, the challenging FERET, and LFW-a datasets). This surprising and prominent result suggests that those advances in generic image classification can be directly applied to improve face recognition systems. In other words, face recognition may not need to be viewed as a separate object classification problem. While recently a large body of residual based face recognition methods focus on developing complex dictionary learning algorithms, in this work we show that a dictionary of randomly extracted patches (even from non-face images) can achieve very promising results using the image classification pipeline. That means, the choice of dictionary learning methods may not be important. Instead, we find that learning multiple dictionaries using different low-level image features often improve the final classification accuracy. Our proposed face recognition approach offers the best reported results on the widely-used face recognition benchmark datasets. In particular, on the challenging FERET and LFW-a datasets, we improve the best reported accuracies in the literature by about 20% and 30% respectively.
1309.7434
Omar Oreifej
Dong Zhang, Omar Oreifej, Mubarak Shah
Face Verification Using Boosted Cross-Image Features
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper proposes a new approach for face verification, where a pair of images needs to be classified as belonging to the same person or not. This problem is relatively new and not well-explored in the literature. Current methods mostly adopt techniques borrowed from face recognition, and process each of the images in the pair independently, which is counter intuitive. In contrast, we propose to extract cross-image features, i.e. features across the pair of images, which, as we demonstrate, is more discriminative to the similarity and the dissimilarity of faces. Our features are derived from the popular Haar-like features, however, extended to handle the face verification problem instead of face detection. We collect a large bank of cross-image features using filters of different sizes, locations, and orientations. Consequently, we use AdaBoost to select and weight the most discriminative features. We carried out extensive experiments on the proposed ideas using three standard face verification datasets, and obtained promising results outperforming state-of-the-art.
[ { "version": "v1", "created": "Sat, 28 Sep 2013 06:21:18 GMT" } ]
2013-10-01T00:00:00
[ [ "Zhang", "Dong", "" ], [ "Oreifej", "Omar", "" ], [ "Shah", "Mubarak", "" ] ]
TITLE: Face Verification Using Boosted Cross-Image Features ABSTRACT: This paper proposes a new approach for face verification, where a pair of images needs to be classified as belonging to the same person or not. This problem is relatively new and not well-explored in the literature. Current methods mostly adopt techniques borrowed from face recognition, and process each of the images in the pair independently, which is counter intuitive. In contrast, we propose to extract cross-image features, i.e. features across the pair of images, which, as we demonstrate, is more discriminative to the similarity and the dissimilarity of faces. Our features are derived from the popular Haar-like features, however, extended to handle the face verification problem instead of face detection. We collect a large bank of cross-image features using filters of different sizes, locations, and orientations. Consequently, we use AdaBoost to select and weight the most discriminative features. We carried out extensive experiments on the proposed ideas using three standard face verification datasets, and obtained promising results outperforming state-of-the-art.
1309.7484
Junzhou Chen
Chen Junzhou, Li Qing, Peng Qiang and Kin Hong Wong
CSIFT Based Locality-constrained Linear Coding for Image Classification
9 pages, 5 figures
null
null
null
cs.CV
http://creativecommons.org/licenses/by-nc-sa/3.0/
In the past decade, SIFT descriptor has been witnessed as one of the most robust local invariant feature descriptors and widely used in various vision tasks. Most traditional image classification systems depend on the luminance-based SIFT descriptors, which only analyze the gray level variations of the images. Misclassification may happen since their color contents are ignored. In this article, we concentrate on improving the performance of existing image classification algorithms by adding color information. To achieve this purpose, different kinds of colored SIFT descriptors are introduced and implemented. Locality-constrained Linear Coding (LLC), a state-of-the-art sparse coding technology, is employed to construct the image classification system for the evaluation. The real experiments are carried out on several benchmarks. With the enhancements of color SIFT, the proposed image classification system obtains approximate 3% improvement of classification accuracy on the Caltech-101 dataset and approximate 4% improvement of classification accuracy on the Caltech-256 dataset.
[ { "version": "v1", "created": "Sat, 28 Sep 2013 18:05:12 GMT" } ]
2013-10-01T00:00:00
[ [ "Junzhou", "Chen", "" ], [ "Qing", "Li", "" ], [ "Qiang", "Peng", "" ], [ "Wong", "Kin Hong", "" ] ]
TITLE: CSIFT Based Locality-constrained Linear Coding for Image Classification ABSTRACT: In the past decade, SIFT descriptor has been witnessed as one of the most robust local invariant feature descriptors and widely used in various vision tasks. Most traditional image classification systems depend on the luminance-based SIFT descriptors, which only analyze the gray level variations of the images. Misclassification may happen since their color contents are ignored. In this article, we concentrate on improving the performance of existing image classification algorithms by adding color information. To achieve this purpose, different kinds of colored SIFT descriptors are introduced and implemented. Locality-constrained Linear Coding (LLC), a state-of-the-art sparse coding technology, is employed to construct the image classification system for the evaluation. The real experiments are carried out on several benchmarks. With the enhancements of color SIFT, the proposed image classification system obtains approximate 3% improvement of classification accuracy on the Caltech-101 dataset and approximate 4% improvement of classification accuracy on the Caltech-256 dataset.
1309.7517
Modou Gueye M.
Modou Gueye and Talel Abdessalem and Hubert Naacke
Improving tag recommendation by folding in more consistency
14 pages
null
null
null
cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Tag recommendation is a major aspect of collaborative tagging systems. It aims to recommend tags to a user for tagging an item. In this paper we present a part of our work in progress which is a novel improvement of recommendations by re-ranking the output of a tag recommender. We mine association rules between candidates tags in order to determine a more consistent list of tags to recommend. Our method is an add-on one which leads to better recommendations as we show in this paper. It is easily parallelizable and morever it may be applied to a lot of tag recommenders. The experiments we did on five datasets with two kinds of tag recommender demonstrated the efficiency of our method.
[ { "version": "v1", "created": "Sun, 29 Sep 2013 01:43:40 GMT" } ]
2013-10-01T00:00:00
[ [ "Gueye", "Modou", "" ], [ "Abdessalem", "Talel", "" ], [ "Naacke", "Hubert", "" ] ]
TITLE: Improving tag recommendation by folding in more consistency ABSTRACT: Tag recommendation is a major aspect of collaborative tagging systems. It aims to recommend tags to a user for tagging an item. In this paper we present a part of our work in progress which is a novel improvement of recommendations by re-ranking the output of a tag recommender. We mine association rules between candidates tags in order to determine a more consistent list of tags to recommend. Our method is an add-on one which leads to better recommendations as we show in this paper. It is easily parallelizable and morever it may be applied to a lot of tag recommenders. The experiments we did on five datasets with two kinds of tag recommender demonstrated the efficiency of our method.
1309.7611
Bal\'azs Hidasi
Bal\'azs Hidasi, Domonkos Tikk
Context-aware recommendations from implicit data via scalable tensor factorization
Extended version of the ECML/PKDD 2012 paper of B. Hidasi & D. Tikk: Fast ALS-based tensor factorization for context-aware recommendation from implicit feedback [arXiv:1204.1259]
null
null
null
cs.LG cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Albeit the implicit feedback based recommendation problem - when only the user history is available but there are no ratings - is the most typical setting in real-world applications, it is much less researched than the explicit feedback case. State-of-the-art algorithms that are efficient on the explicit case cannot be automatically transformed to the implicit case if scalability should be maintained. There are few implicit feedback benchmark data sets, therefore new ideas are usually experimented on explicit benchmarks. In this paper, we propose a generic context-aware implicit feedback recommender algorithm, coined iTALS. iTALS applies a fast, ALS-based tensor factorization learning method that scales linearly with the number of non-zero elements in the tensor. We also present two approximate and faster variants of iTALS using coordinate descent and conjugate gradient methods at learning. The method also allows us to incorporate various contextual information into the model while maintaining its computational efficiency. We present two context-aware variants of iTALS incorporating seasonality and item purchase sequentiality into the model to distinguish user behavior at different time intervals, and product types with different repetitiveness. Experiments run on six data sets shows that iTALS clearly outperforms context-unaware models and context aware baselines, while it is on par with factorization machines (beats 7 times out of 12 cases) both in terms of recall and MAP.
[ { "version": "v1", "created": "Sun, 29 Sep 2013 15:50:45 GMT" } ]
2013-10-01T00:00:00
[ [ "Hidasi", "Balázs", "" ], [ "Tikk", "Domonkos", "" ] ]
TITLE: Context-aware recommendations from implicit data via scalable tensor factorization ABSTRACT: Albeit the implicit feedback based recommendation problem - when only the user history is available but there are no ratings - is the most typical setting in real-world applications, it is much less researched than the explicit feedback case. State-of-the-art algorithms that are efficient on the explicit case cannot be automatically transformed to the implicit case if scalability should be maintained. There are few implicit feedback benchmark data sets, therefore new ideas are usually experimented on explicit benchmarks. In this paper, we propose a generic context-aware implicit feedback recommender algorithm, coined iTALS. iTALS applies a fast, ALS-based tensor factorization learning method that scales linearly with the number of non-zero elements in the tensor. We also present two approximate and faster variants of iTALS using coordinate descent and conjugate gradient methods at learning. The method also allows us to incorporate various contextual information into the model while maintaining its computational efficiency. We present two context-aware variants of iTALS incorporating seasonality and item purchase sequentiality into the model to distinguish user behavior at different time intervals, and product types with different repetitiveness. Experiments run on six data sets shows that iTALS clearly outperforms context-unaware models and context aware baselines, while it is on par with factorization machines (beats 7 times out of 12 cases) both in terms of recall and MAP.
1309.7804
Michael I. Jordan
Michael I. Jordan
On statistics, computation and scalability
Published in at http://dx.doi.org/10.3150/12-BEJSP17 the Bernoulli (http://isi.cbs.nl/bernoulli/) by the International Statistical Institute/Bernoulli Society (http://isi.cbs.nl/BS/bshome.htm)
Bernoulli 2013, Vol. 19, No. 4, 1378-1390
10.3150/12-BEJSP17
IMS-BEJ-BEJSP17
stat.ML cs.LG math.ST stat.TH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
How should statistical procedures be designed so as to be scalable computationally to the massive datasets that are increasingly the norm? When coupled with the requirement that an answer to an inferential question be delivered within a certain time budget, this question has significant repercussions for the field of statistics. With the goal of identifying "time-data tradeoffs," we investigate some of the statistical consequences of computational perspectives on scability, in particular divide-and-conquer methodology and hierarchies of convex relaxations.
[ { "version": "v1", "created": "Mon, 30 Sep 2013 11:51:23 GMT" } ]
2013-10-01T00:00:00
[ [ "Jordan", "Michael I.", "" ] ]
TITLE: On statistics, computation and scalability ABSTRACT: How should statistical procedures be designed so as to be scalable computationally to the massive datasets that are increasingly the norm? When coupled with the requirement that an answer to an inferential question be delivered within a certain time budget, this question has significant repercussions for the field of statistics. With the goal of identifying "time-data tradeoffs," we investigate some of the statistical consequences of computational perspectives on scability, in particular divide-and-conquer methodology and hierarchies of convex relaxations.
1309.7912
Ricardo Fabbri
Mauro de Amorim, Ricardo Fabbri, Lucia Maria dos Santos Pinto and Francisco Duarte Moura Neto
An Image-Based Fluid Surface Pattern Model
a reduced version in Portuguese appears in proceedings of the XVI EMC - Computational Modeling Meeting (Encontro de Modelagem Computacional), 2013
null
null
null
cs.CV
http://creativecommons.org/licenses/by/3.0/
This work aims at generating a model of the ocean surface and its dynamics from one or more video cameras. The idea is to model wave patterns from video as a first step towards a larger system of photogrammetric monitoring of marine conditions for use in offshore oil drilling platforms. The first part of the proposed approach consists in reducing the dimensionality of sensor data made up of the many pixels of each frame of the input video streams. This enables finding a concise number of most relevant parameters to model the temporal dataset, yielding an efficient data-driven model of the evolution of the observed surface. The second part proposes stochastic modeling to better capture the patterns embedded in the data. One can then draw samples from the final model, which are expected to simulate the behavior of previously observed flow, in order to determine conditions that match new observations. In this paper we focus on proposing and discussing the overall approach and on comparing two different techniques for dimensionality reduction in the first stage: principal component analysis and diffusion maps. Work is underway on the second stage of constructing better stochastic models of fluid surface dynamics as proposed here.
[ { "version": "v1", "created": "Mon, 30 Sep 2013 16:39:21 GMT" } ]
2013-10-01T00:00:00
[ [ "de Amorim", "Mauro", "" ], [ "Fabbri", "Ricardo", "" ], [ "Pinto", "Lucia Maria dos Santos", "" ], [ "Neto", "Francisco Duarte Moura", "" ] ]
TITLE: An Image-Based Fluid Surface Pattern Model ABSTRACT: This work aims at generating a model of the ocean surface and its dynamics from one or more video cameras. The idea is to model wave patterns from video as a first step towards a larger system of photogrammetric monitoring of marine conditions for use in offshore oil drilling platforms. The first part of the proposed approach consists in reducing the dimensionality of sensor data made up of the many pixels of each frame of the input video streams. This enables finding a concise number of most relevant parameters to model the temporal dataset, yielding an efficient data-driven model of the evolution of the observed surface. The second part proposes stochastic modeling to better capture the patterns embedded in the data. One can then draw samples from the final model, which are expected to simulate the behavior of previously observed flow, in order to determine conditions that match new observations. In this paper we focus on proposing and discussing the overall approach and on comparing two different techniques for dimensionality reduction in the first stage: principal component analysis and diffusion maps. Work is underway on the second stage of constructing better stochastic models of fluid surface dynamics as proposed here.
1309.7982
Shou Chung Li scli
Zhung-Xun Liao, Shou-Chung Li, Wen-Chih Peng, Philip S Yu
On the Feature Discovery for App Usage Prediction in Smartphones
10 pages, 17 figures, ICDM 2013 short paper
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
With the increasing number of mobile Apps developed, they are now closely integrated into daily life. In this paper, we develop a framework to predict mobile Apps that are most likely to be used regarding the current device status of a smartphone. Such an Apps usage prediction framework is a crucial prerequisite for fast App launching, intelligent user experience, and power management of smartphones. By analyzing real App usage log data, we discover two kinds of features: The Explicit Feature (EF) from sensing readings of built-in sensors, and the Implicit Feature (IF) from App usage relations. The IF feature is derived by constructing the proposed App Usage Graph (abbreviated as AUG) that models App usage transitions. In light of AUG, we are able to discover usage relations among Apps. Since users may have different usage behaviors on their smartphones, we further propose one personalized feature selection algorithm. We explore minimum description length (MDL) from the training data and select those features which need less length to describe the training data. The personalized feature selection can successfully reduce the log size and the prediction time. Finally, we adopt the kNN classification model to predict Apps usage. Note that through the features selected by the proposed personalized feature selection algorithm, we only need to keep these features, which in turn reduces the prediction time and avoids the curse of dimensionality when using the kNN classifier. We conduct a comprehensive experimental study based on a real mobile App usage dataset. The results demonstrate the effectiveness of the proposed framework and show the predictive capability for App usage prediction.
[ { "version": "v1", "created": "Thu, 26 Sep 2013 14:44:10 GMT" } ]
2013-10-01T00:00:00
[ [ "Liao", "Zhung-Xun", "" ], [ "Li", "Shou-Chung", "" ], [ "Peng", "Wen-Chih", "" ], [ "Yu", "Philip S", "" ] ]
TITLE: On the Feature Discovery for App Usage Prediction in Smartphones ABSTRACT: With the increasing number of mobile Apps developed, they are now closely integrated into daily life. In this paper, we develop a framework to predict mobile Apps that are most likely to be used regarding the current device status of a smartphone. Such an Apps usage prediction framework is a crucial prerequisite for fast App launching, intelligent user experience, and power management of smartphones. By analyzing real App usage log data, we discover two kinds of features: The Explicit Feature (EF) from sensing readings of built-in sensors, and the Implicit Feature (IF) from App usage relations. The IF feature is derived by constructing the proposed App Usage Graph (abbreviated as AUG) that models App usage transitions. In light of AUG, we are able to discover usage relations among Apps. Since users may have different usage behaviors on their smartphones, we further propose one personalized feature selection algorithm. We explore minimum description length (MDL) from the training data and select those features which need less length to describe the training data. The personalized feature selection can successfully reduce the log size and the prediction time. Finally, we adopt the kNN classification model to predict Apps usage. Note that through the features selected by the proposed personalized feature selection algorithm, we only need to keep these features, which in turn reduces the prediction time and avoids the curse of dimensionality when using the kNN classifier. We conduct a comprehensive experimental study based on a real mobile App usage dataset. The results demonstrate the effectiveness of the proposed framework and show the predictive capability for App usage prediction.
1309.7082
Sparsh Mittal
Sparsh Mittal
A Cache Reconfiguration Approach for Saving Leakage and Refresh Energy in Embedded DRAM Caches
Embedded DRAM (eDRAM) caches
null
null
null
cs.AR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In recent years, the size and leakage energy consumption of large last level caches (LLCs) has increased. To address this, embedded DRAM (eDRAM) caches have been considered which have lower leakage energy consumption; however eDRAM caches consume a significant amount of energy in the form of refresh energy. In this paper, we present a technique for saving both leakage and refresh energy in eDRAM caches. We use dynamic cache reconfiguration approach to intelligently turn-off part of the cache to save leakage energy and refresh only valid data of the active (i.e. not turned-off) cache to save refresh energy. We evaluate our technique using an x86-64 simulator and SPEC2006 benchmarks and compare it with a recently proposed technique for saving refresh energy, named Refrint. The experiments have shown that our technique provides better performance and energy efficiency than Refrint. Using our technique, for a 2MB LLC and 40 micro-seconds eDRAM refresh period, the average saving in energy over eDRAM baseline (which periodically refreshes all cache lines) is 22.8%.
[ { "version": "v1", "created": "Thu, 26 Sep 2013 22:18:43 GMT" } ]
2013-09-30T00:00:00
[ [ "Mittal", "Sparsh", "" ] ]
TITLE: A Cache Reconfiguration Approach for Saving Leakage and Refresh Energy in Embedded DRAM Caches ABSTRACT: In recent years, the size and leakage energy consumption of large last level caches (LLCs) has increased. To address this, embedded DRAM (eDRAM) caches have been considered which have lower leakage energy consumption; however eDRAM caches consume a significant amount of energy in the form of refresh energy. In this paper, we present a technique for saving both leakage and refresh energy in eDRAM caches. We use dynamic cache reconfiguration approach to intelligently turn-off part of the cache to save leakage energy and refresh only valid data of the active (i.e. not turned-off) cache to save refresh energy. We evaluate our technique using an x86-64 simulator and SPEC2006 benchmarks and compare it with a recently proposed technique for saving refresh energy, named Refrint. The experiments have shown that our technique provides better performance and energy efficiency than Refrint. Using our technique, for a 2MB LLC and 40 micro-seconds eDRAM refresh period, the average saving in energy over eDRAM baseline (which periodically refreshes all cache lines) is 22.8%.
1309.7266
Ahmed Abbasi
Ahmed Abbasi, Siddharth Kaza and F. Mariam Zahedi
Evaluating Link-Based Techniques for Detecting Fake Pharmacy Websites
Abbasi, A., Kaza, S., and Zahedi, F. M. "Evaluating Link-Based Techniques for Detecting Fake Pharmacy Websites," In Proceedings of the 19th Annual Workshop on Information Technologies and Systems, Phoenix, Arizona, December 14-15, 2009
null
null
null
cs.CY cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Fake online pharmacies have become increasingly pervasive, constituting over 90% of online pharmacy websites. There is a need for fake website detection techniques capable of identifying fake online pharmacy websites with a high degree of accuracy. In this study, we compared several well-known link-based detection techniques on a large-scale test bed with the hyperlink graph encompassing over 80 million links between 15.5 million web pages, including 1.2 million known legitimate and fake pharmacy pages. We found that the QoC and QoL class propagation algorithms achieved an accuracy of over 90% on our dataset. The results revealed that algorithms that incorporate dual class propagation as well as inlink and outlink information, on page-level or site-level graphs, are better suited for detecting fake pharmacy websites. In addition, site-level analysis yielded significantly better results than page-level analysis for most algorithms evaluated.
[ { "version": "v1", "created": "Fri, 27 Sep 2013 15:09:24 GMT" } ]
2013-09-30T00:00:00
[ [ "Abbasi", "Ahmed", "" ], [ "Kaza", "Siddharth", "" ], [ "Zahedi", "F. Mariam", "" ] ]
TITLE: Evaluating Link-Based Techniques for Detecting Fake Pharmacy Websites ABSTRACT: Fake online pharmacies have become increasingly pervasive, constituting over 90% of online pharmacy websites. There is a need for fake website detection techniques capable of identifying fake online pharmacy websites with a high degree of accuracy. In this study, we compared several well-known link-based detection techniques on a large-scale test bed with the hyperlink graph encompassing over 80 million links between 15.5 million web pages, including 1.2 million known legitimate and fake pharmacy pages. We found that the QoC and QoL class propagation algorithms achieved an accuracy of over 90% on our dataset. The results revealed that algorithms that incorporate dual class propagation as well as inlink and outlink information, on page-level or site-level graphs, are better suited for detecting fake pharmacy websites. In addition, site-level analysis yielded significantly better results than page-level analysis for most algorithms evaluated.
1309.6691
Chunhua Shen
Yao Li, Wenjing Jia, Chunhua Shen, Anton van den Hengel
Characterness: An Indicator of Text in the Wild
11 pages; Appearing in IEEE Trans. on Image Processing
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Text in an image provides vital information for interpreting its contents, and text in a scene can aide with a variety of tasks from navigation, to obstacle avoidance, and odometry. Despite its value, however, identifying general text in images remains a challenging research problem. Motivated by the need to consider the widely varying forms of natural text, we propose a bottom-up approach to the problem which reflects the `characterness' of an image region. In this sense our approach mirrors the move from saliency detection methods to measures of `objectness'. In order to measure the characterness we develop three novel cues that are tailored for character detection, and a Bayesian method for their integration. Because text is made up of sets of characters, we then design a Markov random field (MRF) model so as to exploit the inherent dependencies between characters. We experimentally demonstrate the effectiveness of our characterness cues as well as the advantage of Bayesian multi-cue integration. The proposed text detector outperforms state-of-the-art methods on a few benchmark scene text detection datasets. We also show that our measurement of `characterness' is superior than state-of-the-art saliency detection models when applied to the same task.
[ { "version": "v1", "created": "Wed, 25 Sep 2013 23:30:18 GMT" } ]
2013-09-27T00:00:00
[ [ "Li", "Yao", "" ], [ "Jia", "Wenjing", "" ], [ "Shen", "Chunhua", "" ], [ "Hengel", "Anton van den", "" ] ]
TITLE: Characterness: An Indicator of Text in the Wild ABSTRACT: Text in an image provides vital information for interpreting its contents, and text in a scene can aide with a variety of tasks from navigation, to obstacle avoidance, and odometry. Despite its value, however, identifying general text in images remains a challenging research problem. Motivated by the need to consider the widely varying forms of natural text, we propose a bottom-up approach to the problem which reflects the `characterness' of an image region. In this sense our approach mirrors the move from saliency detection methods to measures of `objectness'. In order to measure the characterness we develop three novel cues that are tailored for character detection, and a Bayesian method for their integration. Because text is made up of sets of characters, we then design a Markov random field (MRF) model so as to exploit the inherent dependencies between characters. We experimentally demonstrate the effectiveness of our characterness cues as well as the advantage of Bayesian multi-cue integration. The proposed text detector outperforms state-of-the-art methods on a few benchmark scene text detection datasets. We also show that our measurement of `characterness' is superior than state-of-the-art saliency detection models when applied to the same task.
1309.6722
Duyu Tang
Tang Duyu, Qin Bing, Zhou LanJun, Wong KamFai, Zhao Yanyan, Liu Ting
Domain-Specific Sentiment Word Extraction by Seed Expansion and Pattern Generation
null
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper focuses on the automatic extraction of domain-specific sentiment word (DSSW), which is a fundamental subtask of sentiment analysis. Most previous work utilizes manual patterns for this task. However, the performance of those methods highly relies on the labelled patterns or selected seeds. In order to overcome the above problem, this paper presents an automatic framework to detect large-scale domain-specific patterns for DSSW extraction. To this end, sentiment seeds are extracted from massive dataset of user comments. Subsequently, these sentiment seeds are expanded by synonyms using a bootstrapping mechanism. Simultaneously, a synonymy graph is built and the graph propagation algorithm is applied on the built synonymy graph. Afterwards, syntactic and sequential relations between target words and high-ranked sentiment words are extracted automatically to construct large-scale patterns, which are further used to extracte DSSWs. The experimental results in three domains reveal the effectiveness of our method.
[ { "version": "v1", "created": "Thu, 26 Sep 2013 05:18:12 GMT" } ]
2013-09-27T00:00:00
[ [ "Duyu", "Tang", "" ], [ "Bing", "Qin", "" ], [ "LanJun", "Zhou", "" ], [ "KamFai", "Wong", "" ], [ "Yanyan", "Zhao", "" ], [ "Ting", "Liu", "" ] ]
TITLE: Domain-Specific Sentiment Word Extraction by Seed Expansion and Pattern Generation ABSTRACT: This paper focuses on the automatic extraction of domain-specific sentiment word (DSSW), which is a fundamental subtask of sentiment analysis. Most previous work utilizes manual patterns for this task. However, the performance of those methods highly relies on the labelled patterns or selected seeds. In order to overcome the above problem, this paper presents an automatic framework to detect large-scale domain-specific patterns for DSSW extraction. To this end, sentiment seeds are extracted from massive dataset of user comments. Subsequently, these sentiment seeds are expanded by synonyms using a bootstrapping mechanism. Simultaneously, a synonymy graph is built and the graph propagation algorithm is applied on the built synonymy graph. Afterwards, syntactic and sequential relations between target words and high-ranked sentiment words are extracted automatically to construct large-scale patterns, which are further used to extracte DSSWs. The experimental results in three domains reveal the effectiveness of our method.
1309.6811
Tameem Adel
Tameem Adel, Benn Smith, Ruth Urner, Daniel Stashuk, Daniel J. Lizotte
Generative Multiple-Instance Learning Models For Quantitative Electromyography
Appears in Proceedings of the Twenty-Ninth Conference on Uncertainty in Artificial Intelligence (UAI2013)
null
null
UAI-P-2013-PG-2-11
cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a comprehensive study of the use of generative modeling approaches for Multiple-Instance Learning (MIL) problems. In MIL a learner receives training instances grouped together into bags with labels for the bags only (which might not be correct for the comprised instances). Our work was motivated by the task of facilitating the diagnosis of neuromuscular disorders using sets of motor unit potential trains (MUPTs) detected within a muscle which can be cast as a MIL problem. Our approach leads to a state-of-the-art solution to the problem of muscle classification. By introducing and analyzing generative models for MIL in a general framework and examining a variety of model structures and components, our work also serves as a methodological guide to modelling MIL tasks. We evaluate our proposed methods both on MUPT datasets and on the MUSK1 dataset, one of the most widely used benchmarks for MIL.
[ { "version": "v1", "created": "Thu, 26 Sep 2013 12:26:53 GMT" } ]
2013-09-27T00:00:00
[ [ "Adel", "Tameem", "" ], [ "Smith", "Benn", "" ], [ "Urner", "Ruth", "" ], [ "Stashuk", "Daniel", "" ], [ "Lizotte", "Daniel J.", "" ] ]
TITLE: Generative Multiple-Instance Learning Models For Quantitative Electromyography ABSTRACT: We present a comprehensive study of the use of generative modeling approaches for Multiple-Instance Learning (MIL) problems. In MIL a learner receives training instances grouped together into bags with labels for the bags only (which might not be correct for the comprised instances). Our work was motivated by the task of facilitating the diagnosis of neuromuscular disorders using sets of motor unit potential trains (MUPTs) detected within a muscle which can be cast as a MIL problem. Our approach leads to a state-of-the-art solution to the problem of muscle classification. By introducing and analyzing generative models for MIL in a general framework and examining a variety of model structures and components, our work also serves as a methodological guide to modelling MIL tasks. We evaluate our proposed methods both on MUPT datasets and on the MUSK1 dataset, one of the most widely used benchmarks for MIL.
1309.6812
Saeed Amizadeh
Saeed Amizadeh, Bo Thiesson, Milos Hauskrecht
The Bregman Variational Dual-Tree Framework
Appears in Proceedings of the Twenty-Ninth Conference on Uncertainty in Artificial Intelligence (UAI2013)
null
null
UAI-P-2013-PG-22-31
cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Graph-based methods provide a powerful tool set for many non-parametric frameworks in Machine Learning. In general, the memory and computational complexity of these methods is quadratic in the number of examples in the data which makes them quickly infeasible for moderate to large scale datasets. A significant effort to find more efficient solutions to the problem has been made in the literature. One of the state-of-the-art methods that has been recently introduced is the Variational Dual-Tree (VDT) framework. Despite some of its unique features, VDT is currently restricted only to Euclidean spaces where the Euclidean distance quantifies the similarity. In this paper, we extend the VDT framework beyond the Euclidean distance to more general Bregman divergences that include the Euclidean distance as a special case. By exploiting the properties of the general Bregman divergence, we show how the new framework can maintain all the pivotal features of the VDT framework and yet significantly improve its performance in non-Euclidean domains. We apply the proposed framework to different text categorization problems and demonstrate its benefits over the original VDT.
[ { "version": "v1", "created": "Thu, 26 Sep 2013 12:28:35 GMT" } ]
2013-09-27T00:00:00
[ [ "Amizadeh", "Saeed", "" ], [ "Thiesson", "Bo", "" ], [ "Hauskrecht", "Milos", "" ] ]
TITLE: The Bregman Variational Dual-Tree Framework ABSTRACT: Graph-based methods provide a powerful tool set for many non-parametric frameworks in Machine Learning. In general, the memory and computational complexity of these methods is quadratic in the number of examples in the data which makes them quickly infeasible for moderate to large scale datasets. A significant effort to find more efficient solutions to the problem has been made in the literature. One of the state-of-the-art methods that has been recently introduced is the Variational Dual-Tree (VDT) framework. Despite some of its unique features, VDT is currently restricted only to Euclidean spaces where the Euclidean distance quantifies the similarity. In this paper, we extend the VDT framework beyond the Euclidean distance to more general Bregman divergences that include the Euclidean distance as a special case. By exploiting the properties of the general Bregman divergence, we show how the new framework can maintain all the pivotal features of the VDT framework and yet significantly improve its performance in non-Euclidean domains. We apply the proposed framework to different text categorization problems and demonstrate its benefits over the original VDT.
1309.6819
Byron Boots
Byron Boots, Geoffrey Gordon, Arthur Gretton
Hilbert Space Embeddings of Predictive State Representations
Appears in Proceedings of the Twenty-Ninth Conference on Uncertainty in Artificial Intelligence (UAI2013)
null
null
UAI-P-2013-PG-92-101
cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Predictive State Representations (PSRs) are an expressive class of models for controlled stochastic processes. PSRs represent state as a set of predictions of future observable events. Because PSRs are defined entirely in terms of observable data, statistically consistent estimates of PSR parameters can be learned efficiently by manipulating moments of observed training data. Most learning algorithms for PSRs have assumed that actions and observations are finite with low cardinality. In this paper, we generalize PSRs to infinite sets of observations and actions, using the recent concept of Hilbert space embeddings of distributions. The essence is to represent the state as a nonparametric conditional embedding operator in a Reproducing Kernel Hilbert Space (RKHS) and leverage recent work in kernel methods to estimate, predict, and update the representation. We show that these Hilbert space embeddings of PSRs are able to gracefully handle continuous actions and observations, and that our learned models outperform competing system identification algorithms on several prediction benchmarks.
[ { "version": "v1", "created": "Thu, 26 Sep 2013 12:35:19 GMT" } ]
2013-09-27T00:00:00
[ [ "Boots", "Byron", "" ], [ "Gordon", "Geoffrey", "" ], [ "Gretton", "Arthur", "" ] ]
TITLE: Hilbert Space Embeddings of Predictive State Representations ABSTRACT: Predictive State Representations (PSRs) are an expressive class of models for controlled stochastic processes. PSRs represent state as a set of predictions of future observable events. Because PSRs are defined entirely in terms of observable data, statistically consistent estimates of PSR parameters can be learned efficiently by manipulating moments of observed training data. Most learning algorithms for PSRs have assumed that actions and observations are finite with low cardinality. In this paper, we generalize PSRs to infinite sets of observations and actions, using the recent concept of Hilbert space embeddings of distributions. The essence is to represent the state as a nonparametric conditional embedding operator in a Reproducing Kernel Hilbert Space (RKHS) and leverage recent work in kernel methods to estimate, predict, and update the representation. We show that these Hilbert space embeddings of PSRs are able to gracefully handle continuous actions and observations, and that our learned models outperform competing system identification algorithms on several prediction benchmarks.
1309.6829
Qiang Fu
Qiang Fu, Huahua Wang, Arindam Banerjee
Bethe-ADMM for Tree Decomposition based Parallel MAP Inference
Appears in Proceedings of the Twenty-Ninth Conference on Uncertainty in Artificial Intelligence (UAI2013)
null
null
UAI-P-2013-PG-222-231
cs.AI cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the problem of maximum a posteriori (MAP) inference in discrete graphical models. We present a parallel MAP inference algorithm called Bethe-ADMM based on two ideas: tree-decomposition of the graph and the alternating direction method of multipliers (ADMM). However, unlike the standard ADMM, we use an inexact ADMM augmented with a Bethe-divergence based proximal function, which makes each subproblem in ADMM easy to solve in parallel using the sum-product algorithm. We rigorously prove global convergence of Bethe-ADMM. The proposed algorithm is extensively evaluated on both synthetic and real datasets to illustrate its effectiveness. Further, the parallel Bethe-ADMM is shown to scale almost linearly with increasing number of cores.
[ { "version": "v1", "created": "Thu, 26 Sep 2013 12:38:09 GMT" } ]
2013-09-27T00:00:00
[ [ "Fu", "Qiang", "" ], [ "Wang", "Huahua", "" ], [ "Banerjee", "Arindam", "" ] ]
TITLE: Bethe-ADMM for Tree Decomposition based Parallel MAP Inference ABSTRACT: We consider the problem of maximum a posteriori (MAP) inference in discrete graphical models. We present a parallel MAP inference algorithm called Bethe-ADMM based on two ideas: tree-decomposition of the graph and the alternating direction method of multipliers (ADMM). However, unlike the standard ADMM, we use an inexact ADMM augmented with a Bethe-divergence based proximal function, which makes each subproblem in ADMM easy to solve in parallel using the sum-product algorithm. We rigorously prove global convergence of Bethe-ADMM. The proposed algorithm is extensively evaluated on both synthetic and real datasets to illustrate its effectiveness. Further, the parallel Bethe-ADMM is shown to scale almost linearly with increasing number of cores.
1309.6830
Ravi Ganti
Ravi Ganti, Alexander G. Gray
Building Bridges: Viewing Active Learning from the Multi-Armed Bandit Lens
Appears in Proceedings of the Twenty-Ninth Conference on Uncertainty in Artificial Intelligence (UAI2013)
null
null
UAI-P-2013-PG-232-241
cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we propose a multi-armed bandit inspired, pool based active learning algorithm for the problem of binary classification. By carefully constructing an analogy between active learning and multi-armed bandits, we utilize ideas such as lower confidence bounds, and self-concordant regularization from the multi-armed bandit literature to design our proposed algorithm. Our algorithm is a sequential algorithm, which in each round assigns a sampling distribution on the pool, samples one point from this distribution, and queries the oracle for the label of this sampled point. The design of this sampling distribution is also inspired by the analogy between active learning and multi-armed bandits. We show how to derive lower confidence bounds required by our algorithm. Experimental comparisons to previously proposed active learning algorithms show superior performance on some standard UCI datasets.
[ { "version": "v1", "created": "Thu, 26 Sep 2013 12:39:01 GMT" } ]
2013-09-27T00:00:00
[ [ "Ganti", "Ravi", "" ], [ "Gray", "Alexander G.", "" ] ]
TITLE: Building Bridges: Viewing Active Learning from the Multi-Armed Bandit Lens ABSTRACT: In this paper we propose a multi-armed bandit inspired, pool based active learning algorithm for the problem of binary classification. By carefully constructing an analogy between active learning and multi-armed bandits, we utilize ideas such as lower confidence bounds, and self-concordant regularization from the multi-armed bandit literature to design our proposed algorithm. Our algorithm is a sequential algorithm, which in each round assigns a sampling distribution on the pool, samples one point from this distribution, and queries the oracle for the label of this sampled point. The design of this sampling distribution is also inspired by the analogy between active learning and multi-armed bandits. We show how to derive lower confidence bounds required by our algorithm. Experimental comparisons to previously proposed active learning algorithms show superior performance on some standard UCI datasets.
1309.6852
Shuzi Niu
Shuzi Niu, Yanyan Lan, Jiafeng Guo, Xueqi Cheng
Stochastic Rank Aggregation
Appears in Proceedings of the Twenty-Ninth Conference on Uncertainty in Artificial Intelligence (UAI2013)
null
null
UAI-P-2013-PG-478-487
cs.LG cs.IR stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper addresses the problem of rank aggregation, which aims to find a consensus ranking among multiple ranking inputs. Traditional rank aggregation methods are deterministic, and can be categorized into explicit and implicit methods depending on whether rank information is explicitly or implicitly utilized. Surprisingly, experimental results on real data sets show that explicit rank aggregation methods would not work as well as implicit methods, although rank information is critical for the task. Our analysis indicates that the major reason might be the unreliable rank information from incomplete ranking inputs. To solve this problem, we propose to incorporate uncertainty into rank aggregation and tackle the problem in both unsupervised and supervised scenario. We call this novel framework {stochastic rank aggregation} (St.Agg for short). Specifically, we introduce a prior distribution on ranks, and transform the ranking functions or objectives in traditional explicit methods to their expectations over this distribution. Our experiments on benchmark data sets show that the proposed St.Agg outperforms the baselines in both unsupervised and supervised scenarios.
[ { "version": "v1", "created": "Thu, 26 Sep 2013 12:46:39 GMT" } ]
2013-09-27T00:00:00
[ [ "Niu", "Shuzi", "" ], [ "Lan", "Yanyan", "" ], [ "Guo", "Jiafeng", "" ], [ "Cheng", "Xueqi", "" ] ]
TITLE: Stochastic Rank Aggregation ABSTRACT: This paper addresses the problem of rank aggregation, which aims to find a consensus ranking among multiple ranking inputs. Traditional rank aggregation methods are deterministic, and can be categorized into explicit and implicit methods depending on whether rank information is explicitly or implicitly utilized. Surprisingly, experimental results on real data sets show that explicit rank aggregation methods would not work as well as implicit methods, although rank information is critical for the task. Our analysis indicates that the major reason might be the unreliable rank information from incomplete ranking inputs. To solve this problem, we propose to incorporate uncertainty into rank aggregation and tackle the problem in both unsupervised and supervised scenario. We call this novel framework {stochastic rank aggregation} (St.Agg for short). Specifically, we introduce a prior distribution on ranks, and transform the ranking functions or objectives in traditional explicit methods to their expectations over this distribution. Our experiments on benchmark data sets show that the proposed St.Agg outperforms the baselines in both unsupervised and supervised scenarios.
1309.6867
Yaniv Tenzer
Yaniv Tenzer, Gal Elidan
Speedy Model Selection (SMS) for Copula Models
Appears in Proceedings of the Twenty-Ninth Conference on Uncertainty in Artificial Intelligence (UAI2013)
null
null
UAI-P-2013-PG-625-634
cs.LG stat.ME
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We tackle the challenge of efficiently learning the structure of expressive multivariate real-valued densities of copula graphical models. We start by theoretically substantiating the conjecture that for many copula families the magnitude of Spearman's rank correlation coefficient is monotone in the expected contribution of an edge in network, namely the negative copula entropy. We then build on this theory and suggest a novel Bayesian approach that makes use of a prior over values of Spearman's rho for learning copula-based models that involve a mix of copula families. We demonstrate the generalization effectiveness of our highly efficient approach on sizable and varied real-life datasets.
[ { "version": "v1", "created": "Thu, 26 Sep 2013 12:51:22 GMT" } ]
2013-09-27T00:00:00
[ [ "Tenzer", "Yaniv", "" ], [ "Elidan", "Gal", "" ] ]
TITLE: Speedy Model Selection (SMS) for Copula Models ABSTRACT: We tackle the challenge of efficiently learning the structure of expressive multivariate real-valued densities of copula graphical models. We start by theoretically substantiating the conjecture that for many copula families the magnitude of Spearman's rank correlation coefficient is monotone in the expected contribution of an edge in network, namely the negative copula entropy. We then build on this theory and suggest a novel Bayesian approach that makes use of a prior over values of Spearman's rho for learning copula-based models that involve a mix of copula families. We demonstrate the generalization effectiveness of our highly efficient approach on sizable and varied real-life datasets.
1309.6868
Charles Tripp
Charles Tripp, Ross D. Shachter
Approximate Kalman Filter Q-Learning for Continuous State-Space MDPs
Appears in Proceedings of the Twenty-Ninth Conference on Uncertainty in Artificial Intelligence (UAI2013)
null
null
UAI-P-2013-PG-644-653
cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We seek to learn an effective policy for a Markov Decision Process (MDP) with continuous states via Q-Learning. Given a set of basis functions over state action pairs we search for a corresponding set of linear weights that minimizes the mean Bellman residual. Our algorithm uses a Kalman filter model to estimate those weights and we have developed a simpler approximate Kalman filter model that outperforms the current state of the art projected TD-Learning methods on several standard benchmark problems.
[ { "version": "v1", "created": "Thu, 26 Sep 2013 12:51:47 GMT" } ]
2013-09-27T00:00:00
[ [ "Tripp", "Charles", "" ], [ "Shachter", "Ross D.", "" ] ]
TITLE: Approximate Kalman Filter Q-Learning for Continuous State-Space MDPs ABSTRACT: We seek to learn an effective policy for a Markov Decision Process (MDP) with continuous states via Q-Learning. Given a set of basis functions over state action pairs we search for a corresponding set of linear weights that minimizes the mean Bellman residual. Our algorithm uses a Kalman filter model to estimate those weights and we have developed a simpler approximate Kalman filter model that outperforms the current state of the art projected TD-Learning methods on several standard benchmark problems.
1309.6874
Pengtao Xie
Pengtao Xie, Eric P. Xing
Integrating Document Clustering and Topic Modeling
Appears in Proceedings of the Twenty-Ninth Conference on Uncertainty in Artificial Intelligence (UAI2013)
null
null
UAI-P-2013-PG-694-703
cs.LG cs.CL cs.IR stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Document clustering and topic modeling are two closely related tasks which can mutually benefit each other. Topic modeling can project documents into a topic space which facilitates effective document clustering. Cluster labels discovered by document clustering can be incorporated into topic models to extract local topics specific to each cluster and global topics shared by all clusters. In this paper, we propose a multi-grain clustering topic model (MGCTM) which integrates document clustering and topic modeling into a unified framework and jointly performs the two tasks to achieve the overall best performance. Our model tightly couples two components: a mixture component used for discovering latent groups in document collection and a topic model component used for mining multi-grain topics including local topics specific to each cluster and global topics shared across clusters.We employ variational inference to approximate the posterior of hidden variables and learn model parameters. Experiments on two datasets demonstrate the effectiveness of our model.
[ { "version": "v1", "created": "Thu, 26 Sep 2013 12:54:02 GMT" } ]
2013-09-27T00:00:00
[ [ "Xie", "Pengtao", "" ], [ "Xing", "Eric P.", "" ] ]
TITLE: Integrating Document Clustering and Topic Modeling ABSTRACT: Document clustering and topic modeling are two closely related tasks which can mutually benefit each other. Topic modeling can project documents into a topic space which facilitates effective document clustering. Cluster labels discovered by document clustering can be incorporated into topic models to extract local topics specific to each cluster and global topics shared by all clusters. In this paper, we propose a multi-grain clustering topic model (MGCTM) which integrates document clustering and topic modeling into a unified framework and jointly performs the two tasks to achieve the overall best performance. Our model tightly couples two components: a mixture component used for discovering latent groups in document collection and a topic model component used for mining multi-grain topics including local topics specific to each cluster and global topics shared across clusters.We employ variational inference to approximate the posterior of hidden variables and learn model parameters. Experiments on two datasets demonstrate the effectiveness of our model.
1309.6379
ANqi Qiu DR
Jia Du, A. Pasha Hosseinbor, Moo K. Chung, Barbara B. Bendlin, Gaurav Suryawanshi, Andrew L. Alexander, Anqi Qiu
Diffeomorphic Metric Mapping and Probabilistic Atlas Generation of Hybrid Diffusion Imaging based on BFOR Signal Basis
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a large deformation diffeomorphic metric mapping algorithm to align multiple b-value diffusion weighted imaging (mDWI) data, specifically acquired via hybrid diffusion imaging (HYDI), denoted as LDDMM-HYDI. We then propose a Bayesian model for estimating the white matter atlas from HYDIs. We adopt the work given in Hosseinbor et al. (2012) and represent the q-space diffusion signal with the Bessel Fourier orientation reconstruction (BFOR) signal basis. The BFOR framework provides the representation of mDWI in the q-space and thus reduces memory requirement. In addition, since the BFOR signal basis is orthonormal, the L2 norm that quantifies the differences in the q-space signals of any two mDWI datasets can be easily computed as the sum of the squared differences in the BFOR expansion coefficients. In this work, we show that the reorientation of the $q$-space signal due to spatial transformation can be easily defined on the BFOR signal basis. We incorporate the BFOR signal basis into the LDDMM framework and derive the gradient descent algorithm for LDDMM-HYDI with explicit orientation optimization. Additionally, we extend the previous Bayesian atlas estimation framework for scalar-valued images to HYDIs and derive the expectation-maximization algorithm for solving the HYDI atlas estimation problem. Using real HYDI datasets, we show the Bayesian model generates the white matter atlas with anatomical details. Moreover, we show that it is important to consider the variation of mDWI reorientation due to a small change in diffeomorphic transformation in the LDDMM-HYDI optimization and to incorporate the full information of HYDI for aligning mDWI.
[ { "version": "v1", "created": "Wed, 25 Sep 2013 01:57:50 GMT" } ]
2013-09-26T00:00:00
[ [ "Du", "Jia", "" ], [ "Hosseinbor", "A. Pasha", "" ], [ "Chung", "Moo K.", "" ], [ "Bendlin", "Barbara B.", "" ], [ "Suryawanshi", "Gaurav", "" ], [ "Alexander", "Andrew L.", "" ], [ "Qiu", "Anqi", "" ] ]
TITLE: Diffeomorphic Metric Mapping and Probabilistic Atlas Generation of Hybrid Diffusion Imaging based on BFOR Signal Basis ABSTRACT: We propose a large deformation diffeomorphic metric mapping algorithm to align multiple b-value diffusion weighted imaging (mDWI) data, specifically acquired via hybrid diffusion imaging (HYDI), denoted as LDDMM-HYDI. We then propose a Bayesian model for estimating the white matter atlas from HYDIs. We adopt the work given in Hosseinbor et al. (2012) and represent the q-space diffusion signal with the Bessel Fourier orientation reconstruction (BFOR) signal basis. The BFOR framework provides the representation of mDWI in the q-space and thus reduces memory requirement. In addition, since the BFOR signal basis is orthonormal, the L2 norm that quantifies the differences in the q-space signals of any two mDWI datasets can be easily computed as the sum of the squared differences in the BFOR expansion coefficients. In this work, we show that the reorientation of the $q$-space signal due to spatial transformation can be easily defined on the BFOR signal basis. We incorporate the BFOR signal basis into the LDDMM framework and derive the gradient descent algorithm for LDDMM-HYDI with explicit orientation optimization. Additionally, we extend the previous Bayesian atlas estimation framework for scalar-valued images to HYDIs and derive the expectation-maximization algorithm for solving the HYDI atlas estimation problem. Using real HYDI datasets, we show the Bayesian model generates the white matter atlas with anatomical details. Moreover, we show that it is important to consider the variation of mDWI reorientation due to a small change in diffeomorphic transformation in the LDDMM-HYDI optimization and to incorporate the full information of HYDI for aligning mDWI.
1211.6807
Sungmin Kim
Sungmin Kim and Tao Shi
Scalable Spectral Algorithms for Community Detection in Directed Networks
Single column, 40 pages, 6 figures and 7 tables
null
null
null
cs.SI physics.soc-ph stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Community detection has been one of the central problems in network studies and directed network is particularly challenging due to asymmetry among its links. In this paper, we found that incorporating the direction of links reveals new perspectives on communities regarding to two different roles, source and terminal, that a node plays in each community. Intriguingly, such communities appear to be connected with unique spectral property of the graph Laplacian of the adjacency matrix and we exploit this connection by using regularized SVD methods. We propose harvesting algorithms, coupled with regularized SVDs, that are linearly scalable for efficient identification of communities in huge directed networks. The proposed algorithm shows great performance and scalability on benchmark networks in simulations and successfully recovers communities in real network applications.
[ { "version": "v1", "created": "Thu, 29 Nov 2012 03:35:17 GMT" }, { "version": "v2", "created": "Mon, 23 Sep 2013 17:15:15 GMT" } ]
2013-09-24T00:00:00
[ [ "Kim", "Sungmin", "" ], [ "Shi", "Tao", "" ] ]
TITLE: Scalable Spectral Algorithms for Community Detection in Directed Networks ABSTRACT: Community detection has been one of the central problems in network studies and directed network is particularly challenging due to asymmetry among its links. In this paper, we found that incorporating the direction of links reveals new perspectives on communities regarding to two different roles, source and terminal, that a node plays in each community. Intriguingly, such communities appear to be connected with unique spectral property of the graph Laplacian of the adjacency matrix and we exploit this connection by using regularized SVD methods. We propose harvesting algorithms, coupled with regularized SVDs, that are linearly scalable for efficient identification of communities in huge directed networks. The proposed algorithm shows great performance and scalability on benchmark networks in simulations and successfully recovers communities in real network applications.
1212.2044
Gabriel Kronberger
Gabriel Kronberger, Stefan Fink, Michael Kommenda and Michael Affenzeller
Macro-Economic Time Series Modeling and Interaction Networks
The original publication is available at http://link.springer.com/chapter/10.1007/978-3-642-20520-0_11
Applications of Evolutionary Computation, LNCS 6625 (Springer Berlin Heidelberg), pp. 101-110 (2011)
10.1007/978-3-642-20520-0_11
null
cs.NE stat.AP
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Macro-economic models describe the dynamics of economic quantities. The estimations and forecasts produced by such models play a substantial role for financial and political decisions. In this contribution we describe an approach based on genetic programming and symbolic regression to identify variable interactions in large datasets. In the proposed approach multiple symbolic regression runs are executed for each variable of the dataset to find potentially interesting models. The result is a variable interaction network that describes which variables are most relevant for the approximation of each variable of the dataset. This approach is applied to a macro-economic dataset with monthly observations of important economic indicators in order to identify potentially interesting dependencies of these indicators. The resulting interaction network of macro-economic indicators is briefly discussed and two of the identified models are presented in detail. The two models approximate the help wanted index and the CPI inflation in the US.
[ { "version": "v1", "created": "Mon, 10 Dec 2012 12:04:58 GMT" }, { "version": "v2", "created": "Mon, 23 Sep 2013 16:58:12 GMT" } ]
2013-09-24T00:00:00
[ [ "Kronberger", "Gabriel", "" ], [ "Fink", "Stefan", "" ], [ "Kommenda", "Michael", "" ], [ "Affenzeller", "Michael", "" ] ]
TITLE: Macro-Economic Time Series Modeling and Interaction Networks ABSTRACT: Macro-economic models describe the dynamics of economic quantities. The estimations and forecasts produced by such models play a substantial role for financial and political decisions. In this contribution we describe an approach based on genetic programming and symbolic regression to identify variable interactions in large datasets. In the proposed approach multiple symbolic regression runs are executed for each variable of the dataset to find potentially interesting models. The result is a variable interaction network that describes which variables are most relevant for the approximation of each variable of the dataset. This approach is applied to a macro-economic dataset with monthly observations of important economic indicators in order to identify potentially interesting dependencies of these indicators. The resulting interaction network of macro-economic indicators is briefly discussed and two of the identified models are presented in detail. The two models approximate the help wanted index and the CPI inflation in the US.
1309.5427
Gang Chen
Gang Chen
Latent Fisher Discriminant Analysis
12 pages
null
null
null
cs.LG cs.CV stat.ML
http://creativecommons.org/licenses/by/3.0/
Linear Discriminant Analysis (LDA) is a well-known method for dimensionality reduction and classification. Previous studies have also extended the binary-class case into multi-classes. However, many applications, such as object detection and keyframe extraction cannot provide consistent instance-label pairs, while LDA requires labels on instance level for training. Thus it cannot be directly applied for semi-supervised classification problem. In this paper, we overcome this limitation and propose a latent variable Fisher discriminant analysis model. We relax the instance-level labeling into bag-level, is a kind of semi-supervised (video-level labels of event type are required for semantic frame extraction) and incorporates a data-driven prior over the latent variables. Hence, our method combines the latent variable inference and dimension reduction in an unified bayesian framework. We test our method on MUSK and Corel data sets and yield competitive results compared to the baseline approach. We also demonstrate its capacity on the challenging TRECVID MED11 dataset for semantic keyframe extraction and conduct a human-factors ranking-based experimental evaluation, which clearly demonstrates our proposed method consistently extracts more semantically meaningful keyframes than challenging baselines.
[ { "version": "v1", "created": "Sat, 21 Sep 2013 03:42:04 GMT" } ]
2013-09-24T00:00:00
[ [ "Chen", "Gang", "" ] ]
TITLE: Latent Fisher Discriminant Analysis ABSTRACT: Linear Discriminant Analysis (LDA) is a well-known method for dimensionality reduction and classification. Previous studies have also extended the binary-class case into multi-classes. However, many applications, such as object detection and keyframe extraction cannot provide consistent instance-label pairs, while LDA requires labels on instance level for training. Thus it cannot be directly applied for semi-supervised classification problem. In this paper, we overcome this limitation and propose a latent variable Fisher discriminant analysis model. We relax the instance-level labeling into bag-level, is a kind of semi-supervised (video-level labels of event type are required for semantic frame extraction) and incorporates a data-driven prior over the latent variables. Hence, our method combines the latent variable inference and dimension reduction in an unified bayesian framework. We test our method on MUSK and Corel data sets and yield competitive results compared to the baseline approach. We also demonstrate its capacity on the challenging TRECVID MED11 dataset for semantic keyframe extraction and conduct a human-factors ranking-based experimental evaluation, which clearly demonstrates our proposed method consistently extracts more semantically meaningful keyframes than challenging baselines.
1309.5657
Tarek El-Shishtawy Ahmed
T.El-Shishtawy
A Hybrid Algorithm for Matching Arabic Names
null
International Journal of Computational Linguistics Research Volume 4 Number 2 June 2013
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, a new hybrid algorithm which combines both of token-based and character-based approaches is presented. The basic Levenshtein approach has been extended to token-based distance metric. The distance metric is enhanced to set the proper granularity level behavior of the algorithm. It smoothly maps a threshold of misspellings differences at the character level, and the importance of token level errors in terms of token's position and frequency. Using a large Arabic dataset, the experimental results show that the proposed algorithm overcomes successfully many types of errors such as: typographical errors, omission or insertion of middle name components, omission of non-significant popular name components, and different writing styles character variations. When compared the results with other classical algorithms, using the same dataset, the proposed algorithm was found to increase the minimum success level of best tested algorithms, while achieving higher upper limits .
[ { "version": "v1", "created": "Sun, 22 Sep 2013 22:06:26 GMT" } ]
2013-09-24T00:00:00
[ [ "El-Shishtawy", "T.", "" ] ]
TITLE: A Hybrid Algorithm for Matching Arabic Names ABSTRACT: In this paper, a new hybrid algorithm which combines both of token-based and character-based approaches is presented. The basic Levenshtein approach has been extended to token-based distance metric. The distance metric is enhanced to set the proper granularity level behavior of the algorithm. It smoothly maps a threshold of misspellings differences at the character level, and the importance of token level errors in terms of token's position and frequency. Using a large Arabic dataset, the experimental results show that the proposed algorithm overcomes successfully many types of errors such as: typographical errors, omission or insertion of middle name components, omission of non-significant popular name components, and different writing styles character variations. When compared the results with other classical algorithms, using the same dataset, the proposed algorithm was found to increase the minimum success level of best tested algorithms, while achieving higher upper limits .
1309.5843
Marco Guerini
Marco Guerini, Lorenzo Gatti, Marco Turchi
Sentiment Analysis: How to Derive Prior Polarities from SentiWordNet
To appear in Proceedings of EMNLP 2013
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Assigning a positive or negative score to a word out of context (i.e. a word's prior polarity) is a challenging task for sentiment analysis. In the literature, various approaches based on SentiWordNet have been proposed. In this paper, we compare the most often used techniques together with newly proposed ones and incorporate all of them in a learning framework to see whether blending them can further improve the estimation of prior polarity scores. Using two different versions of SentiWordNet and testing regression and classification models across tasks and datasets, our learning approach consistently outperforms the single metrics, providing a new state-of-the-art approach in computing words' prior polarity for sentiment analysis. We conclude our investigation showing interesting biases in calculated prior polarity scores when word Part of Speech and annotator gender are considered.
[ { "version": "v1", "created": "Mon, 23 Sep 2013 15:26:09 GMT" } ]
2013-09-24T00:00:00
[ [ "Guerini", "Marco", "" ], [ "Gatti", "Lorenzo", "" ], [ "Turchi", "Marco", "" ] ]
TITLE: Sentiment Analysis: How to Derive Prior Polarities from SentiWordNet ABSTRACT: Assigning a positive or negative score to a word out of context (i.e. a word's prior polarity) is a challenging task for sentiment analysis. In the literature, various approaches based on SentiWordNet have been proposed. In this paper, we compare the most often used techniques together with newly proposed ones and incorporate all of them in a learning framework to see whether blending them can further improve the estimation of prior polarity scores. Using two different versions of SentiWordNet and testing regression and classification models across tasks and datasets, our learning approach consistently outperforms the single metrics, providing a new state-of-the-art approach in computing words' prior polarity for sentiment analysis. We conclude our investigation showing interesting biases in calculated prior polarity scores when word Part of Speech and annotator gender are considered.
1309.5896
Gabriel Kronberger
Gabriel Kronberger and Stephan Winkler and Michael Affenzeller and Andreas Beham and Stefan Wagner
On the Success Rate of Crossover Operators for Genetic Programming with Offspring Selection
The final publication is available at http://link.springer.com/chapter/10.1007/978-3-642-04772-5_102
Computer Aided Systems Theory - EUROCAST 2009, Lecture Notes in Computer Science Volume 5717, 2009, pp 793-800, Springer
10.1007/978-3-642-04772-5_102
null
cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Genetic programming is a powerful heuristic search technique that is used for a number of real world applications to solve among others regression, classification, and time-series forecasting problems. A lot of progress towards a theoretic description of genetic programming in form of schema theorems has been made, but the internal dynamics and success factors of genetic programming are still not fully understood. In particular, the effects of different crossover operators in combination with offspring selection are largely unknown. This contribution sheds light on the ability of well-known GP crossover operators to create better offspring when applied to benchmark problems. We conclude that standard (sub-tree swapping) crossover is a good default choice in combination with offspring selection, and that GP with offspring selection and random selection of crossover operators can improve the performance of the algorithm in terms of best solution quality when no solution size constraints are applied.
[ { "version": "v1", "created": "Mon, 23 Sep 2013 17:54:22 GMT" } ]
2013-09-24T00:00:00
[ [ "Kronberger", "Gabriel", "" ], [ "Winkler", "Stephan", "" ], [ "Affenzeller", "Michael", "" ], [ "Beham", "Andreas", "" ], [ "Wagner", "Stefan", "" ] ]
TITLE: On the Success Rate of Crossover Operators for Genetic Programming with Offspring Selection ABSTRACT: Genetic programming is a powerful heuristic search technique that is used for a number of real world applications to solve among others regression, classification, and time-series forecasting problems. A lot of progress towards a theoretic description of genetic programming in form of schema theorems has been made, but the internal dynamics and success factors of genetic programming are still not fully understood. In particular, the effects of different crossover operators in combination with offspring selection are largely unknown. This contribution sheds light on the ability of well-known GP crossover operators to create better offspring when applied to benchmark problems. We conclude that standard (sub-tree swapping) crossover is a good default choice in combination with offspring selection, and that GP with offspring selection and random selection of crossover operators can improve the performance of the algorithm in terms of best solution quality when no solution size constraints are applied.
1309.5931
Gabriel Kronberger
Michael Kommenda and Gabriel Kronberger and Christoph Feilmayr and Michael Affenzeller
Data Mining using Unguided Symbolic Regression on a Blast Furnace Dataset
Presented at Workshop for Heuristic Problem Solving, Computer Aided Systems Theory - EUROCAST 2011. The final publication is available at http://link.springer.com/chapter/10.1007/978-3-642-27549-4_51
Computer Aided Systems Theory - EUROCAST 2011, Lecture Notes in Computer Science Volume 6927, 2012, pp 400-407
10.1007/978-3-642-27549-4_51
null
cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper a data mining approach for variable selection and knowledge extraction from datasets is presented. The approach is based on unguided symbolic regression (every variable present in the dataset is treated as the target variable in multiple regression runs) and a novel variable relevance metric for genetic programming. The relevance of each input variable is calculated and a model approximating the target variable is created. The genetic programming configurations with different target variables are executed multiple times to reduce stochastic effects and the aggregated results are displayed as a variable interaction network. This interaction network highlights important system components and implicit relations between the variables. The whole approach is tested on a blast furnace dataset, because of the complexity of the blast furnace and the many interrelations between the variables. Finally the achieved results are discussed with respect to existing knowledge about the blast furnace process.
[ { "version": "v1", "created": "Mon, 23 Sep 2013 19:35:29 GMT" } ]
2013-09-24T00:00:00
[ [ "Kommenda", "Michael", "" ], [ "Kronberger", "Gabriel", "" ], [ "Feilmayr", "Christoph", "" ], [ "Affenzeller", "Michael", "" ] ]
TITLE: Data Mining using Unguided Symbolic Regression on a Blast Furnace Dataset ABSTRACT: In this paper a data mining approach for variable selection and knowledge extraction from datasets is presented. The approach is based on unguided symbolic regression (every variable present in the dataset is treated as the target variable in multiple regression runs) and a novel variable relevance metric for genetic programming. The relevance of each input variable is calculated and a model approximating the target variable is created. The genetic programming configurations with different target variables are executed multiple times to reduce stochastic effects and the aggregated results are displayed as a variable interaction network. This interaction network highlights important system components and implicit relations between the variables. The whole approach is tested on a blast furnace dataset, because of the complexity of the blast furnace and the many interrelations between the variables. Finally the achieved results are discussed with respect to existing knowledge about the blast furnace process.
1111.5062
Emiliano De Cristofaro
Carlo Blundo, Emiliano De Cristofaro, Paolo Gasti
EsPRESSo: Efficient Privacy-Preserving Evaluation of Sample Set Similarity
A preliminary version of this paper was published in the Proceedings of the 7th ESORICS International Workshop on Digital Privacy Management (DPM 2012). This is the full version, appearing in the Journal of Computer Security
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Electronic information is increasingly often shared among entities without complete mutual trust. To address related security and privacy issues, a few cryptographic techniques have emerged that support privacy-preserving information sharing and retrieval. One interesting open problem in this context involves two parties that need to assess the similarity of their datasets, but are reluctant to disclose their actual content. This paper presents an efficient and provably-secure construction supporting the privacy-preserving evaluation of sample set similarity, where similarity is measured as the Jaccard index. We present two protocols: the first securely computes the (Jaccard) similarity of two sets, and the second approximates it, using MinHash techniques, with lower complexities. We show that our novel protocols are attractive in many compelling applications, including document/multimedia similarity, biometric authentication, and genetic tests. In the process, we demonstrate that our constructions are appreciably more efficient than prior work.
[ { "version": "v1", "created": "Mon, 21 Nov 2011 23:35:47 GMT" }, { "version": "v2", "created": "Wed, 23 Nov 2011 21:51:04 GMT" }, { "version": "v3", "created": "Wed, 11 Apr 2012 02:09:27 GMT" }, { "version": "v4", "created": "Fri, 20 Jul 2012 19:36:07 GMT" }, { "version": "v5", "created": "Fri, 20 Sep 2013 00:43:44 GMT" } ]
2013-09-23T00:00:00
[ [ "Blundo", "Carlo", "" ], [ "De Cristofaro", "Emiliano", "" ], [ "Gasti", "Paolo", "" ] ]
TITLE: EsPRESSo: Efficient Privacy-Preserving Evaluation of Sample Set Similarity ABSTRACT: Electronic information is increasingly often shared among entities without complete mutual trust. To address related security and privacy issues, a few cryptographic techniques have emerged that support privacy-preserving information sharing and retrieval. One interesting open problem in this context involves two parties that need to assess the similarity of their datasets, but are reluctant to disclose their actual content. This paper presents an efficient and provably-secure construction supporting the privacy-preserving evaluation of sample set similarity, where similarity is measured as the Jaccard index. We present two protocols: the first securely computes the (Jaccard) similarity of two sets, and the second approximates it, using MinHash techniques, with lower complexities. We show that our novel protocols are attractive in many compelling applications, including document/multimedia similarity, biometric authentication, and genetic tests. In the process, we demonstrate that our constructions are appreciably more efficient than prior work.
1302.4389
Ian Goodfellow
Ian J. Goodfellow and David Warde-Farley and Mehdi Mirza and Aaron Courville and Yoshua Bengio
Maxout Networks
This is the version of the paper that appears in ICML 2013
JMLR WCP 28 (3): 1319-1327, 2013
null
null
stat.ML cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the problem of designing models to leverage a recently introduced approximate model averaging technique called dropout. We define a simple new model called maxout (so named because its output is the max of a set of inputs, and because it is a natural companion to dropout) designed to both facilitate optimization by dropout and improve the accuracy of dropout's fast approximate model averaging technique. We empirically verify that the model successfully accomplishes both of these tasks. We use maxout and dropout to demonstrate state of the art classification performance on four benchmark datasets: MNIST, CIFAR-10, CIFAR-100, and SVHN.
[ { "version": "v1", "created": "Mon, 18 Feb 2013 18:59:07 GMT" }, { "version": "v2", "created": "Tue, 19 Feb 2013 04:39:48 GMT" }, { "version": "v3", "created": "Wed, 20 Feb 2013 22:33:13 GMT" }, { "version": "v4", "created": "Fri, 20 Sep 2013 08:54:35 GMT" } ]
2013-09-23T00:00:00
[ [ "Goodfellow", "Ian J.", "" ], [ "Warde-Farley", "David", "" ], [ "Mirza", "Mehdi", "" ], [ "Courville", "Aaron", "" ], [ "Bengio", "Yoshua", "" ] ]
TITLE: Maxout Networks ABSTRACT: We consider the problem of designing models to leverage a recently introduced approximate model averaging technique called dropout. We define a simple new model called maxout (so named because its output is the max of a set of inputs, and because it is a natural companion to dropout) designed to both facilitate optimization by dropout and improve the accuracy of dropout's fast approximate model averaging technique. We empirically verify that the model successfully accomplishes both of these tasks. We use maxout and dropout to demonstrate state of the art classification performance on four benchmark datasets: MNIST, CIFAR-10, CIFAR-100, and SVHN.
1309.5137
EPTCS
Peter Sestoft (IT University of Copenhagen)
Online partial evaluation of sheet-defined functions
In Proceedings Festschrift for Dave Schmidt, arXiv:1309.4557
EPTCS 129, 2013, pp. 136-160
10.4204/EPTCS.129.10
null
cs.PL cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a spreadsheet implementation, extended with sheet-defined functions, that allows users to define functions using only standard spreadsheet concepts such as cells, formulas and references, requiring no new syntax. This implements an idea proposed by Peyton-Jones and others. As the main contribution of this paper, we then show how to add an online partial evaluator for such sheet-defined functions. The result is a higher-order functional language that is dynamically typed, in keeping with spreadsheet traditions, and an interactive platform for function definition and function specialization. We describe an implementation of these ideas, present some performance data from microbenchmarks, and outline desirable improvements and extensions.
[ { "version": "v1", "created": "Fri, 20 Sep 2013 01:44:04 GMT" } ]
2013-09-23T00:00:00
[ [ "Sestoft", "Peter", "", "IT University of Copenhagen" ] ]
TITLE: Online partial evaluation of sheet-defined functions ABSTRACT: We present a spreadsheet implementation, extended with sheet-defined functions, that allows users to define functions using only standard spreadsheet concepts such as cells, formulas and references, requiring no new syntax. This implements an idea proposed by Peyton-Jones and others. As the main contribution of this paper, we then show how to add an online partial evaluator for such sheet-defined functions. The result is a higher-order functional language that is dynamically typed, in keeping with spreadsheet traditions, and an interactive platform for function definition and function specialization. We describe an implementation of these ideas, present some performance data from microbenchmarks, and outline desirable improvements and extensions.
1309.5357
Vikas Dongre
Vikas J. Dongre and Vijay H.Mankar
Development of Comprehensive Devnagari Numeral and Character Database for Offline Handwritten Character Recognition
5 pages, 8 figures, journal paper
Vikas J. Dongre,Vijay H.Mankar, "Development of Comprehensive Devnagari Numeral and Character Database for Offline Handwritten Character Recognition", Applied Computational Intelligence and Soft Computing,Volume 2012
null
null
cs.CV
http://creativecommons.org/licenses/by/3.0/
In handwritten character recognition, benchmark database plays an important role in evaluating the performance of various algorithms and the results obtained by various researchers. In Devnagari script, there is lack of such official benchmark. This paper focuses on the generation of offline benchmark database for Devnagari handwritten numerals and characters. The present work generated 5137 and 20305 isolated samples for numeral and character database, respectively, from 750 writers of all ages, sex, education, and profession. The offline sample images are stored in TIFF image format as it occupies less memory. Also, the data is presented in binary level so that memory requirement is further reduced. It will facilitate research on handwriting recognition of Devnagari script through free access to the researchers.
[ { "version": "v1", "created": "Sat, 17 Aug 2013 03:09:50 GMT" } ]
2013-09-23T00:00:00
[ [ "Dongre", "Vikas J.", "" ], [ "Mankar", "Vijay H.", "" ] ]
TITLE: Development of Comprehensive Devnagari Numeral and Character Database for Offline Handwritten Character Recognition ABSTRACT: In handwritten character recognition, benchmark database plays an important role in evaluating the performance of various algorithms and the results obtained by various researchers. In Devnagari script, there is lack of such official benchmark. This paper focuses on the generation of offline benchmark database for Devnagari handwritten numerals and characters. The present work generated 5137 and 20305 isolated samples for numeral and character database, respectively, from 750 writers of all ages, sex, education, and profession. The offline sample images are stored in TIFF image format as it occupies less memory. Also, the data is presented in binary level so that memory requirement is further reduced. It will facilitate research on handwriting recognition of Devnagari script through free access to the researchers.
1206.5648
Carlo Alberto Furia
Marco Trudel, Carlo A. Furia, Martin Nordio, Bertrand Meyer, Manuel Oriol
C to O-O Translation: Beyond the Easy Stuff
null
Proceedings of the 19th Working Conference on Reverse Engineering (WCRE'12). Pgg. 19--28, IEEE Computer Society, October 2012
10.1109/WCRE.2012.12
null
cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Can we reuse some of the huge code-base developed in C to take advantage of modern programming language features such as type safety, object-orientation, and contracts? This paper presents a source-to-source translation of C code into Eiffel, a modern object-oriented programming language, and the supporting tool C2Eif. The translation is completely automatic and supports the entire C language (ANSI, as well as many GNU C Compiler extensions, through CIL) as used in practice, including its usage of native system libraries and inlined assembly code. Our experiments show that C2Eif can handle C applications and libraries of significant size (such as vim and libgsl), as well as challenging benchmarks such as the GCC torture tests. The produced Eiffel code is functionally equivalent to the original C code, and takes advantage of some of Eiffel's object-oriented features to produce safe and easy-to-debug translations.
[ { "version": "v1", "created": "Mon, 25 Jun 2012 11:20:33 GMT" }, { "version": "v2", "created": "Thu, 30 Aug 2012 11:56:05 GMT" }, { "version": "v3", "created": "Thu, 19 Sep 2013 15:23:12 GMT" } ]
2013-09-20T00:00:00
[ [ "Trudel", "Marco", "" ], [ "Furia", "Carlo A.", "" ], [ "Nordio", "Martin", "" ], [ "Meyer", "Bertrand", "" ], [ "Oriol", "Manuel", "" ] ]
TITLE: C to O-O Translation: Beyond the Easy Stuff ABSTRACT: Can we reuse some of the huge code-base developed in C to take advantage of modern programming language features such as type safety, object-orientation, and contracts? This paper presents a source-to-source translation of C code into Eiffel, a modern object-oriented programming language, and the supporting tool C2Eif. The translation is completely automatic and supports the entire C language (ANSI, as well as many GNU C Compiler extensions, through CIL) as used in practice, including its usage of native system libraries and inlined assembly code. Our experiments show that C2Eif can handle C applications and libraries of significant size (such as vim and libgsl), as well as challenging benchmarks such as the GCC torture tests. The produced Eiffel code is functionally equivalent to the original C code, and takes advantage of some of Eiffel's object-oriented features to produce safe and easy-to-debug translations.
1309.4887
Tilo Wettig
Nils Meyer, Manfred Ries, Stefan Solbrig, Tilo Wettig
iDataCool: HPC with Hot-Water Cooling and Energy Reuse
12 pages, 7 figures, proceedings of ISC 2013
Lecture Notes in Computer Science 7905 (2013) 383
10.1007/978-3-642-38750-0_29
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
iDataCool is an HPC architecture jointly developed by the University of Regensburg and the IBM Research and Development Lab B\"oblingen. It is based on IBM's iDataPlex platform, whose air-cooling solution was replaced by a custom water-cooling solution that allows for cooling water temperatures of 70C/158F. The system is coupled to an adsorption chiller by InvenSor that operates efficiently at these temperatures. Thus a significant portion of the energy spent on HPC can be recovered in the form of chilled water, which can then be used to cool other parts of the computing center. We describe the architecture of iDataCool and present benchmarks of the cooling performance and the energy (reuse) efficiency.
[ { "version": "v1", "created": "Thu, 19 Sep 2013 07:53:10 GMT" } ]
2013-09-20T00:00:00
[ [ "Meyer", "Nils", "" ], [ "Ries", "Manfred", "" ], [ "Solbrig", "Stefan", "" ], [ "Wettig", "Tilo", "" ] ]
TITLE: iDataCool: HPC with Hot-Water Cooling and Energy Reuse ABSTRACT: iDataCool is an HPC architecture jointly developed by the University of Regensburg and the IBM Research and Development Lab B\"oblingen. It is based on IBM's iDataPlex platform, whose air-cooling solution was replaced by a custom water-cooling solution that allows for cooling water temperatures of 70C/158F. The system is coupled to an adsorption chiller by InvenSor that operates efficiently at these temperatures. Thus a significant portion of the energy spent on HPC can be recovered in the form of chilled water, which can then be used to cool other parts of the computing center. We describe the architecture of iDataCool and present benchmarks of the cooling performance and the energy (reuse) efficiency.
1309.5047
Sean Whalen
Sean Whalen and Gaurav Pandey
A Comparative Analysis of Ensemble Classifiers: Case Studies in Genomics
10 pages, 3 figures, 8 tables, to appear in Proceedings of the 2013 International Conference on Data Mining
null
null
null
cs.LG q-bio.GN stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The combination of multiple classifiers using ensemble methods is increasingly important for making progress in a variety of difficult prediction problems. We present a comparative analysis of several ensemble methods through two case studies in genomics, namely the prediction of genetic interactions and protein functions, to demonstrate their efficacy on real-world datasets and draw useful conclusions about their behavior. These methods include simple aggregation, meta-learning, cluster-based meta-learning, and ensemble selection using heterogeneous classifiers trained on resampled data to improve the diversity of their predictions. We present a detailed analysis of these methods across 4 genomics datasets and find the best of these methods offer statistically significant improvements over the state of the art in their respective domains. In addition, we establish a novel connection between ensemble selection and meta-learning, demonstrating how both of these disparate methods establish a balance between ensemble diversity and performance.
[ { "version": "v1", "created": "Thu, 19 Sep 2013 16:45:18 GMT" } ]
2013-09-20T00:00:00
[ [ "Whalen", "Sean", "" ], [ "Pandey", "Gaurav", "" ] ]
TITLE: A Comparative Analysis of Ensemble Classifiers: Case Studies in Genomics ABSTRACT: The combination of multiple classifiers using ensemble methods is increasingly important for making progress in a variety of difficult prediction problems. We present a comparative analysis of several ensemble methods through two case studies in genomics, namely the prediction of genetic interactions and protein functions, to demonstrate their efficacy on real-world datasets and draw useful conclusions about their behavior. These methods include simple aggregation, meta-learning, cluster-based meta-learning, and ensemble selection using heterogeneous classifiers trained on resampled data to improve the diversity of their predictions. We present a detailed analysis of these methods across 4 genomics datasets and find the best of these methods offer statistically significant improvements over the state of the art in their respective domains. In addition, we establish a novel connection between ensemble selection and meta-learning, demonstrating how both of these disparate methods establish a balance between ensemble diversity and performance.
1103.3240
Ken Duffy
K. R. Duffy and C. Bordenave and D. J. Leith
Decentralized Constraint Satisfaction
null
IEEE/ACM Transactions on Networking, 21 (4), 1298-1308, 2013
10.1109/TNET.2012.2222923
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We show that several important resource allocation problems in wireless networks fit within the common framework of Constraint Satisfaction Problems (CSPs). Inspired by the requirements of these applications, where variables are located at distinct network devices that may not be able to communicate but may interfere, we define natural criteria that a CSP solver must possess in order to be practical. We term these algorithms decentralized CSP solvers. The best known CSP solvers were designed for centralized problems and do not meet these criteria. We introduce a stochastic decentralized CSP solver and prove that it will find a solution in almost surely finite time, should one exist, also showing it has many practically desirable properties. We benchmark the algorithm's performance on a well-studied class of CSPs, random k-SAT, illustrating that the time the algorithm takes to find a satisfying assignment is competitive with stochastic centralized solvers on problems with order a thousand variables despite its decentralized nature. We demonstrate the solver's practical utility for the problems that motivated its introduction by using it to find a non-interfering channel allocation for a network formed from data from downtown Manhattan.
[ { "version": "v1", "created": "Wed, 2 Mar 2011 15:00:09 GMT" }, { "version": "v2", "created": "Mon, 25 Jul 2011 14:44:16 GMT" }, { "version": "v3", "created": "Wed, 7 Sep 2011 11:00:47 GMT" }, { "version": "v4", "created": "Tue, 9 Oct 2012 07:46:22 GMT" } ]
2013-09-19T00:00:00
[ [ "Duffy", "K. R.", "" ], [ "Bordenave", "C.", "" ], [ "Leith", "D. J.", "" ] ]
TITLE: Decentralized Constraint Satisfaction ABSTRACT: We show that several important resource allocation problems in wireless networks fit within the common framework of Constraint Satisfaction Problems (CSPs). Inspired by the requirements of these applications, where variables are located at distinct network devices that may not be able to communicate but may interfere, we define natural criteria that a CSP solver must possess in order to be practical. We term these algorithms decentralized CSP solvers. The best known CSP solvers were designed for centralized problems and do not meet these criteria. We introduce a stochastic decentralized CSP solver and prove that it will find a solution in almost surely finite time, should one exist, also showing it has many practically desirable properties. We benchmark the algorithm's performance on a well-studied class of CSPs, random k-SAT, illustrating that the time the algorithm takes to find a satisfying assignment is competitive with stochastic centralized solvers on problems with order a thousand variables despite its decentralized nature. We demonstrate the solver's practical utility for the problems that motivated its introduction by using it to find a non-interfering channel allocation for a network formed from data from downtown Manhattan.
1301.6847
Zhilin Zhang
Taiyong Li, Zhilin Zhang
Robust Face Recognition via Block Sparse Bayesian Learning
Accepted by Mathematical Problems in Engineering in 2013
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Face recognition (FR) is an important task in pattern recognition and computer vision. Sparse representation (SR) has been demonstrated to be a powerful framework for FR. In general, an SR algorithm treats each face in a training dataset as a basis function, and tries to find a sparse representation of a test face under these basis functions. The sparse representation coefficients then provide a recognition hint. Early SR algorithms are based on a basic sparse model. Recently, it has been found that algorithms based on a block sparse model can achieve better recognition rates. Based on this model, in this study we use block sparse Bayesian learning (BSBL) to find a sparse representation of a test face for recognition. BSBL is a recently proposed framework, which has many advantages over existing block-sparse-model based algorithms. Experimental results on the Extended Yale B, the AR and the CMU PIE face databases show that using BSBL can achieve better recognition rates and higher robustness than state-of-the-art algorithms in most cases.
[ { "version": "v1", "created": "Tue, 29 Jan 2013 07:23:00 GMT" }, { "version": "v2", "created": "Wed, 18 Sep 2013 00:19:12 GMT" } ]
2013-09-19T00:00:00
[ [ "Li", "Taiyong", "" ], [ "Zhang", "Zhilin", "" ] ]
TITLE: Robust Face Recognition via Block Sparse Bayesian Learning ABSTRACT: Face recognition (FR) is an important task in pattern recognition and computer vision. Sparse representation (SR) has been demonstrated to be a powerful framework for FR. In general, an SR algorithm treats each face in a training dataset as a basis function, and tries to find a sparse representation of a test face under these basis functions. The sparse representation coefficients then provide a recognition hint. Early SR algorithms are based on a basic sparse model. Recently, it has been found that algorithms based on a block sparse model can achieve better recognition rates. Based on this model, in this study we use block sparse Bayesian learning (BSBL) to find a sparse representation of a test face for recognition. BSBL is a recently proposed framework, which has many advantages over existing block-sparse-model based algorithms. Experimental results on the Extended Yale B, the AR and the CMU PIE face databases show that using BSBL can achieve better recognition rates and higher robustness than state-of-the-art algorithms in most cases.
1309.4496
Thoralf Gutierrez
Thoralf Gutierrez, Gautier Krings, Vincent D. Blondel
Evaluating socio-economic state of a country analyzing airtime credit and mobile phone datasets
6 pages, 6 figures
null
null
null
cs.CY cs.SI physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Reliable statistical information is important to make political decisions on a sound basis and to help measure the impact of policies. Unfortunately, statistics offices in developing countries have scarce resources and statistical censuses are therefore conducted sporadically. Based on mobile phone communications and history of airtime credit purchases, we estimate the relative income of individuals, the diversity and inequality of income, and an indicator for socioeconomic segregation for fine-grained regions of an African country. Our study shows how to use mobile phone datasets as a starting point to understand the socio-economic state of a country, which can be especially useful in countries with few resources to conduct large surveys.
[ { "version": "v1", "created": "Tue, 17 Sep 2013 22:36:34 GMT" } ]
2013-09-19T00:00:00
[ [ "Gutierrez", "Thoralf", "" ], [ "Krings", "Gautier", "" ], [ "Blondel", "Vincent D.", "" ] ]
TITLE: Evaluating socio-economic state of a country analyzing airtime credit and mobile phone datasets ABSTRACT: Reliable statistical information is important to make political decisions on a sound basis and to help measure the impact of policies. Unfortunately, statistics offices in developing countries have scarce resources and statistical censuses are therefore conducted sporadically. Based on mobile phone communications and history of airtime credit purchases, we estimate the relative income of individuals, the diversity and inequality of income, and an indicator for socioeconomic segregation for fine-grained regions of an African country. Our study shows how to use mobile phone datasets as a starting point to understand the socio-economic state of a country, which can be especially useful in countries with few resources to conduct large surveys.
1309.4157
Rui Li
Rui Li and Kevin Chen-Chuan Chang
EgoNet-UIUC: A Dataset For Ego Network Research
DataSet Description
null
null
null
cs.SI physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this report, we introduce the version one of EgoNet-UIUC, which is a dataset for ego network research. The dataset contains about 230 ego networks in Linkedin, which have about 33K users (with their attributes) and 283K relationships (with their relationship types) in total. We name this dataset as EgoNet-UIUC, which stands for Ego Network Dataset from University of Illinois at Urbana-Champaign.
[ { "version": "v1", "created": "Tue, 17 Sep 2013 02:28:25 GMT" } ]
2013-09-18T00:00:00
[ [ "Li", "Rui", "" ], [ "Chang", "Kevin Chen-Chuan", "" ] ]
TITLE: EgoNet-UIUC: A Dataset For Ego Network Research ABSTRACT: In this report, we introduce the version one of EgoNet-UIUC, which is a dataset for ego network research. The dataset contains about 230 ego networks in Linkedin, which have about 33K users (with their attributes) and 283K relationships (with their relationship types) in total. We name this dataset as EgoNet-UIUC, which stands for Ego Network Dataset from University of Illinois at Urbana-Champaign.
1309.3809
Ishani Chakraborty
Ishani Chakraborty and Ahmed Elgammal
Visual-Semantic Scene Understanding by Sharing Labels in a Context Network
null
null
null
null
cs.CV cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the problem of naming objects in complex, natural scenes containing widely varying object appearance and subtly different names. Informed by cognitive research, we propose an approach based on sharing context based object hypotheses between visual and lexical spaces. To this end, we present the Visual Semantic Integration Model (VSIM) that represents object labels as entities shared between semantic and visual contexts and infers a new image by updating labels through context switching. At the core of VSIM is a semantic Pachinko Allocation Model and a visual nearest neighbor Latent Dirichlet Allocation Model. For inference, we derive an iterative Data Augmentation algorithm that pools the label probabilities and maximizes the joint label posterior of an image. Our model surpasses the performance of state-of-art methods in several visual tasks on the challenging SUN09 dataset.
[ { "version": "v1", "created": "Mon, 16 Sep 2013 00:22:01 GMT" } ]
2013-09-17T00:00:00
[ [ "Chakraborty", "Ishani", "" ], [ "Elgammal", "Ahmed", "" ] ]
TITLE: Visual-Semantic Scene Understanding by Sharing Labels in a Context Network ABSTRACT: We consider the problem of naming objects in complex, natural scenes containing widely varying object appearance and subtly different names. Informed by cognitive research, we propose an approach based on sharing context based object hypotheses between visual and lexical spaces. To this end, we present the Visual Semantic Integration Model (VSIM) that represents object labels as entities shared between semantic and visual contexts and infers a new image by updating labels through context switching. At the core of VSIM is a semantic Pachinko Allocation Model and a visual nearest neighbor Latent Dirichlet Allocation Model. For inference, we derive an iterative Data Augmentation algorithm that pools the label probabilities and maximizes the joint label posterior of an image. Our model surpasses the performance of state-of-art methods in several visual tasks on the challenging SUN09 dataset.
1309.3877
Huyen Do
Huyen Do and Alexandros Kalousis
A Metric-learning based framework for Support Vector Machines and Multiple Kernel Learning
null
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Most metric learning algorithms, as well as Fisher's Discriminant Analysis (FDA), optimize some cost function of different measures of within-and between-class distances. On the other hand, Support Vector Machines(SVMs) and several Multiple Kernel Learning (MKL) algorithms are based on the SVM large margin theory. Recently, SVMs have been analyzed from SVM and metric learning, and to develop new algorithms that build on the strengths of each. Inspired by the metric learning interpretation of SVM, we develop here a new metric-learning based SVM framework in which we incorporate metric learning concepts within SVM. We extend the optimization problem of SVM to include some measure of the within-class distance and along the way we develop a new within-class distance measure which is appropriate for SVM. In addition, we adopt the same approach for MKL and show that it can be also formulated as a Mahalanobis metric learning problem. Our end result is a number of SVM/MKL algorithms that incorporate metric learning concepts. We experiment with them on a set of benchmark datasets and observe important predictive performance improvements.
[ { "version": "v1", "created": "Mon, 16 Sep 2013 09:39:25 GMT" } ]
2013-09-17T00:00:00
[ [ "Do", "Huyen", "" ], [ "Kalousis", "Alexandros", "" ] ]
TITLE: A Metric-learning based framework for Support Vector Machines and Multiple Kernel Learning ABSTRACT: Most metric learning algorithms, as well as Fisher's Discriminant Analysis (FDA), optimize some cost function of different measures of within-and between-class distances. On the other hand, Support Vector Machines(SVMs) and several Multiple Kernel Learning (MKL) algorithms are based on the SVM large margin theory. Recently, SVMs have been analyzed from SVM and metric learning, and to develop new algorithms that build on the strengths of each. Inspired by the metric learning interpretation of SVM, we develop here a new metric-learning based SVM framework in which we incorporate metric learning concepts within SVM. We extend the optimization problem of SVM to include some measure of the within-class distance and along the way we develop a new within-class distance measure which is appropriate for SVM. In addition, we adopt the same approach for MKL and show that it can be also formulated as a Mahalanobis metric learning problem. Our end result is a number of SVM/MKL algorithms that incorporate metric learning concepts. We experiment with them on a set of benchmark datasets and observe important predictive performance improvements.
1309.3917
Gaetan Marceau
Ga\'etan Marceau (INRIA Saclay - Ile de France, LRI), Pierre Sav\'eant, Marc Schoenauer (INRIA Saclay - Ile de France, LRI)
Strategic Planning in Air Traffic Control as a Multi-objective Stochastic Optimization Problem
ATM Seminar 2013 (2013)
null
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
With the objective of handling the airspace sector congestion subject to continuously growing air traffic, we suggest to create a collaborative working plan during the strategic phase of air traffic control. The plan obtained via a new decision support tool presented in this article consists in a schedule for controllers, which specifies time of overflight on the different waypoints of the flight plans. In order to do it, we believe that the decision-support tool shall model directly the uncertainty at a trajectory level in order to propagate the uncertainty to the sector level. Then, the probability of congestion for any sector in the airspace can be computed. Since air traffic regulations and sector congestion are antagonist, we designed and implemented a multi-objective optimization algorithm for determining the best trade-off between these two criteria. The solution comes up as a set of alternatives for the multi-sector planner where the severity of the congestion cost is adjustable. In this paper, the Non-dominated Sorting Genetic Algorithm (NSGA-II) was used to solve an artificial benchmark problem involving 24 aircraft and 11 sectors, and is able to provide a good approximation of the Pareto front.
[ { "version": "v1", "created": "Mon, 16 Sep 2013 11:52:07 GMT" } ]
2013-09-17T00:00:00
[ [ "Marceau", "Gaétan", "", "INRIA Saclay - Ile de France, LRI" ], [ "Savéant", "Pierre", "", "INRIA Saclay - Ile de France, LRI" ], [ "Schoenauer", "Marc", "", "INRIA Saclay - Ile de France, LRI" ] ]
TITLE: Strategic Planning in Air Traffic Control as a Multi-objective Stochastic Optimization Problem ABSTRACT: With the objective of handling the airspace sector congestion subject to continuously growing air traffic, we suggest to create a collaborative working plan during the strategic phase of air traffic control. The plan obtained via a new decision support tool presented in this article consists in a schedule for controllers, which specifies time of overflight on the different waypoints of the flight plans. In order to do it, we believe that the decision-support tool shall model directly the uncertainty at a trajectory level in order to propagate the uncertainty to the sector level. Then, the probability of congestion for any sector in the airspace can be computed. Since air traffic regulations and sector congestion are antagonist, we designed and implemented a multi-objective optimization algorithm for determining the best trade-off between these two criteria. The solution comes up as a set of alternatives for the multi-sector planner where the severity of the congestion cost is adjustable. In this paper, the Non-dominated Sorting Genetic Algorithm (NSGA-II) was used to solve an artificial benchmark problem involving 24 aircraft and 11 sectors, and is able to provide a good approximation of the Pareto front.
1309.4067
Dima Kagan
Dima Kagan, Michael Fire, Aviad Elyashar, and Yuval Elovici
Facebook Applications' Installation and Removal: A Temporal Analysis
null
null
null
null
cs.SI physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Facebook applications are one of the reasons for Facebook attractiveness. Unfortunately, numerous users are not aware of the fact that many malicious Facebook applications exist. To educate users, to raise users' awareness and to improve Facebook users' security and privacy, we developed a Firefox add-on that alerts users to the number of installed applications on their Facebook profiles. In this study, we present the temporal analysis of the Facebook applications' installation and removal dataset collected by our add-on. This dataset consists of information from 2,945 users, collected during a period of over a year. We used linear regression to analyze our dataset and discovered the linear connection between the average percentage change of newly installed Facebook applications and the number of days passed since the user initially installed our add-on. Additionally, we found out that users who used our Firefox add-on become more aware of their security and privacy installing on average fewer new applications. Finally, we discovered that on average 86.4% of Facebook users install an additional application every 4.2 days.
[ { "version": "v1", "created": "Mon, 16 Sep 2013 18:56:45 GMT" } ]
2013-09-17T00:00:00
[ [ "Kagan", "Dima", "" ], [ "Fire", "Michael", "" ], [ "Elyashar", "Aviad", "" ], [ "Elovici", "Yuval", "" ] ]
TITLE: Facebook Applications' Installation and Removal: A Temporal Analysis ABSTRACT: Facebook applications are one of the reasons for Facebook attractiveness. Unfortunately, numerous users are not aware of the fact that many malicious Facebook applications exist. To educate users, to raise users' awareness and to improve Facebook users' security and privacy, we developed a Firefox add-on that alerts users to the number of installed applications on their Facebook profiles. In this study, we present the temporal analysis of the Facebook applications' installation and removal dataset collected by our add-on. This dataset consists of information from 2,945 users, collected during a period of over a year. We used linear regression to analyze our dataset and discovered the linear connection between the average percentage change of newly installed Facebook applications and the number of days passed since the user initially installed our add-on. Additionally, we found out that users who used our Firefox add-on become more aware of their security and privacy installing on average fewer new applications. Finally, we discovered that on average 86.4% of Facebook users install an additional application every 4.2 days.
1102.5046
Tamara Kolda
C. Seshadhri, Ali Pinar, Tamara G. Kolda
An In-Depth Analysis of Stochastic Kronecker Graphs
null
Journal of the ACM 60(2):13 (32 pages), April 2013
10.1145/2450142.2450149
null
cs.SI cs.DM physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Graph analysis is playing an increasingly important role in science and industry. Due to numerous limitations in sharing real-world graphs, models for generating massive graphs are critical for developing better algorithms. In this paper, we analyze the stochastic Kronecker graph model (SKG), which is the foundation of the Graph500 supercomputer benchmark due to its favorable properties and easy parallelization. Our goal is to provide a deeper understanding of the parameters and properties of this model so that its functionality as a benchmark is increased. We develop a rigorous mathematical analysis that shows this model cannot generate a power-law distribution or even a lognormal distribution. However, we formalize an enhanced version of the SKG model that uses random noise for smoothing. We prove both in theory and in practice that this enhancement leads to a lognormal distribution. Additionally, we provide a precise analysis of isolated vertices, showing that the graphs that are produced by SKG might be quite different than intended. For example, between 50% and 75% of the vertices in the Graph500 benchmarks will be isolated. Finally, we show that this model tends to produce extremely small core numbers (compared to most social networks and other real graphs) for common parameter choices.
[ { "version": "v1", "created": "Thu, 24 Feb 2011 17:36:57 GMT" }, { "version": "v2", "created": "Thu, 8 Sep 2011 18:34:32 GMT" }, { "version": "v3", "created": "Wed, 2 Jan 2013 23:59:15 GMT" } ]
2013-09-16T00:00:00
[ [ "Seshadhri", "C.", "" ], [ "Pinar", "Ali", "" ], [ "Kolda", "Tamara G.", "" ] ]
TITLE: An In-Depth Analysis of Stochastic Kronecker Graphs ABSTRACT: Graph analysis is playing an increasingly important role in science and industry. Due to numerous limitations in sharing real-world graphs, models for generating massive graphs are critical for developing better algorithms. In this paper, we analyze the stochastic Kronecker graph model (SKG), which is the foundation of the Graph500 supercomputer benchmark due to its favorable properties and easy parallelization. Our goal is to provide a deeper understanding of the parameters and properties of this model so that its functionality as a benchmark is increased. We develop a rigorous mathematical analysis that shows this model cannot generate a power-law distribution or even a lognormal distribution. However, we formalize an enhanced version of the SKG model that uses random noise for smoothing. We prove both in theory and in practice that this enhancement leads to a lognormal distribution. Additionally, we provide a precise analysis of isolated vertices, showing that the graphs that are produced by SKG might be quite different than intended. For example, between 50% and 75% of the vertices in the Graph500 benchmarks will be isolated. Finally, we show that this model tends to produce extremely small core numbers (compared to most social networks and other real graphs) for common parameter choices.
1309.3515
Olga Ohrimenko
Joshua Brown, Olga Ohrimenko, Roberto Tamassia
Haze: Privacy-Preserving Real-Time Traffic Statistics
null
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider traffic-update mobile applications that let users learn traffic conditions based on reports from other users. These applications are becoming increasingly popular (e.g., Waze reported 30 million users in 2013) since they aggregate real-time road traffic updates from actual users traveling on the roads. However, the providers of these mobile services have access to such sensitive information as timestamped locations and movements of its users. In this paper, we describe Haze, a protocol for traffic-update applications that supports the creation of traffic statistics from user reports while protecting the privacy of the users. Haze relies on a small subset of users to jointly aggregate encrypted speed and alert data and report the result to the service provider. We use jury-voting protocols based on threshold cryptosystem and differential privacy techniques to hide user data from anyone participating in the protocol while allowing only aggregate information to be extracted and sent to the service provider. We show that Haze is effective in practice by developing a prototype implementation and performing experiments on a real-world dataset of car trajectories.
[ { "version": "v1", "created": "Fri, 13 Sep 2013 17:17:29 GMT" } ]
2013-09-16T00:00:00
[ [ "Brown", "Joshua", "" ], [ "Ohrimenko", "Olga", "" ], [ "Tamassia", "Roberto", "" ] ]
TITLE: Haze: Privacy-Preserving Real-Time Traffic Statistics ABSTRACT: We consider traffic-update mobile applications that let users learn traffic conditions based on reports from other users. These applications are becoming increasingly popular (e.g., Waze reported 30 million users in 2013) since they aggregate real-time road traffic updates from actual users traveling on the roads. However, the providers of these mobile services have access to such sensitive information as timestamped locations and movements of its users. In this paper, we describe Haze, a protocol for traffic-update applications that supports the creation of traffic statistics from user reports while protecting the privacy of the users. Haze relies on a small subset of users to jointly aggregate encrypted speed and alert data and report the result to the service provider. We use jury-voting protocols based on threshold cryptosystem and differential privacy techniques to hide user data from anyone participating in the protocol while allowing only aggregate information to be extracted and sent to the service provider. We show that Haze is effective in practice by developing a prototype implementation and performing experiments on a real-world dataset of car trajectories.
1212.4522
Yunchao Gong
Yunchao Gong and Qifa Ke and Michael Isard and Svetlana Lazebnik
A Multi-View Embedding Space for Modeling Internet Images, Tags, and their Semantics
To Appear: International Journal of Computer Vision
null
null
null
cs.CV cs.IR cs.LG cs.MM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper investigates the problem of modeling Internet images and associated text or tags for tasks such as image-to-image search, tag-to-image search, and image-to-tag search (image annotation). We start with canonical correlation analysis (CCA), a popular and successful approach for mapping visual and textual features to the same latent space, and incorporate a third view capturing high-level image semantics, represented either by a single category or multiple non-mutually-exclusive concepts. We present two ways to train the three-view embedding: supervised, with the third view coming from ground-truth labels or search keywords; and unsupervised, with semantic themes automatically obtained by clustering the tags. To ensure high accuracy for retrieval tasks while keeping the learning process scalable, we combine multiple strong visual features and use explicit nonlinear kernel mappings to efficiently approximate kernel CCA. To perform retrieval, we use a specially designed similarity function in the embedded space, which substantially outperforms the Euclidean distance. The resulting system produces compelling qualitative results and outperforms a number of two-view baselines on retrieval tasks on three large-scale Internet image datasets.
[ { "version": "v1", "created": "Tue, 18 Dec 2012 22:02:43 GMT" }, { "version": "v2", "created": "Mon, 2 Sep 2013 19:14:58 GMT" } ]
2013-09-13T00:00:00
[ [ "Gong", "Yunchao", "" ], [ "Ke", "Qifa", "" ], [ "Isard", "Michael", "" ], [ "Lazebnik", "Svetlana", "" ] ]
TITLE: A Multi-View Embedding Space for Modeling Internet Images, Tags, and their Semantics ABSTRACT: This paper investigates the problem of modeling Internet images and associated text or tags for tasks such as image-to-image search, tag-to-image search, and image-to-tag search (image annotation). We start with canonical correlation analysis (CCA), a popular and successful approach for mapping visual and textual features to the same latent space, and incorporate a third view capturing high-level image semantics, represented either by a single category or multiple non-mutually-exclusive concepts. We present two ways to train the three-view embedding: supervised, with the third view coming from ground-truth labels or search keywords; and unsupervised, with semantic themes automatically obtained by clustering the tags. To ensure high accuracy for retrieval tasks while keeping the learning process scalable, we combine multiple strong visual features and use explicit nonlinear kernel mappings to efficiently approximate kernel CCA. To perform retrieval, we use a specially designed similarity function in the embedded space, which substantially outperforms the Euclidean distance. The resulting system produces compelling qualitative results and outperforms a number of two-view baselines on retrieval tasks on three large-scale Internet image datasets.
1309.3103
Alex Susemihl
Chris H\"ausler, Alex Susemihl, Martin P Nawrot, Manfred Opper
Temporal Autoencoding Improves Generative Models of Time Series
null
null
null
null
stat.ML cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Restricted Boltzmann Machines (RBMs) are generative models which can learn useful representations from samples of a dataset in an unsupervised fashion. They have been widely employed as an unsupervised pre-training method in machine learning. RBMs have been modified to model time series in two main ways: The Temporal RBM stacks a number of RBMs laterally and introduces temporal dependencies between the hidden layer units; The Conditional RBM, on the other hand, considers past samples of the dataset as a conditional bias and learns a representation which takes these into account. Here we propose a new training method for both the TRBM and the CRBM, which enforces the dynamic structure of temporal datasets. We do so by treating the temporal models as denoising autoencoders, considering past frames of the dataset as corrupted versions of the present frame and minimizing the reconstruction error of the present data by the model. We call this approach Temporal Autoencoding. This leads to a significant improvement in the performance of both models in a filling-in-frames task across a number of datasets. The error reduction for motion capture data is 56\% for the CRBM and 80\% for the TRBM. Taking the posterior mean prediction instead of single samples further improves the model's estimates, decreasing the error by as much as 91\% for the CRBM on motion capture data. We also trained the model to perform forecasting on a large number of datasets and have found TA pretraining to consistently improve the performance of the forecasts. Furthermore, by looking at the prediction error across time, we can see that this improvement reflects a better representation of the dynamics of the data as opposed to a bias towards reconstructing the observed data on a short time scale.
[ { "version": "v1", "created": "Thu, 12 Sep 2013 10:39:50 GMT" } ]
2013-09-13T00:00:00
[ [ "Häusler", "Chris", "" ], [ "Susemihl", "Alex", "" ], [ "Nawrot", "Martin P", "" ], [ "Opper", "Manfred", "" ] ]
TITLE: Temporal Autoencoding Improves Generative Models of Time Series ABSTRACT: Restricted Boltzmann Machines (RBMs) are generative models which can learn useful representations from samples of a dataset in an unsupervised fashion. They have been widely employed as an unsupervised pre-training method in machine learning. RBMs have been modified to model time series in two main ways: The Temporal RBM stacks a number of RBMs laterally and introduces temporal dependencies between the hidden layer units; The Conditional RBM, on the other hand, considers past samples of the dataset as a conditional bias and learns a representation which takes these into account. Here we propose a new training method for both the TRBM and the CRBM, which enforces the dynamic structure of temporal datasets. We do so by treating the temporal models as denoising autoencoders, considering past frames of the dataset as corrupted versions of the present frame and minimizing the reconstruction error of the present data by the model. We call this approach Temporal Autoencoding. This leads to a significant improvement in the performance of both models in a filling-in-frames task across a number of datasets. The error reduction for motion capture data is 56\% for the CRBM and 80\% for the TRBM. Taking the posterior mean prediction instead of single samples further improves the model's estimates, decreasing the error by as much as 91\% for the CRBM on motion capture data. We also trained the model to perform forecasting on a large number of datasets and have found TA pretraining to consistently improve the performance of the forecasts. Furthermore, by looking at the prediction error across time, we can see that this improvement reflects a better representation of the dynamics of the data as opposed to a bias towards reconstructing the observed data on a short time scale.
1307.4143
Krishnamurthy Dvijotham
Krishnamurthy Dvijotham, Scott Backhaus and Misha Chertkov
Storage Sizing and Placement through Operational and Uncertainty-Aware Simulations
To Appear in proceedings of Hawaii International Conference on System Sciences (HICSS-2014)
null
null
null
math.OC cs.SY physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
As the penetration level of transmission-scale time-intermittent renewable generation resources increases, control of flexible resources will become important to mitigating the fluctuations due to these new renewable resources. Flexible resources may include new or existing synchronous generators as well as new energy storage devices. Optimal placement and sizing of energy storage to minimize costs of integrating renewable resources is a difficult optimization problem. Further,optimal planning procedures typically do not consider the effect of the time dependence of operations and may lead to unsatisfactory results. Here, we use an optimal energy storage control algorithm to develop a heuristic procedure for energy storage placement and sizing. We perform operational simulation under various time profiles of intermittent generation, loads and interchanges (artificially generated or from historical data) and accumulate statistics of the usage of storage at each node under the optimal dispatch. We develop a greedy heuristic based on the accumulated statistics to obtain a minimal set of nodes for storage placement. The quality of the heuristic is explored by comparing our results to the obvious heuristic of placing storage at the renewables for IEEE benchmarks and real-world network topologies.
[ { "version": "v1", "created": "Tue, 16 Jul 2013 01:38:13 GMT" }, { "version": "v2", "created": "Wed, 11 Sep 2013 18:09:48 GMT" } ]
2013-09-12T00:00:00
[ [ "Dvijotham", "Krishnamurthy", "" ], [ "Backhaus", "Scott", "" ], [ "Chertkov", "Misha", "" ] ]
TITLE: Storage Sizing and Placement through Operational and Uncertainty-Aware Simulations ABSTRACT: As the penetration level of transmission-scale time-intermittent renewable generation resources increases, control of flexible resources will become important to mitigating the fluctuations due to these new renewable resources. Flexible resources may include new or existing synchronous generators as well as new energy storage devices. Optimal placement and sizing of energy storage to minimize costs of integrating renewable resources is a difficult optimization problem. Further,optimal planning procedures typically do not consider the effect of the time dependence of operations and may lead to unsatisfactory results. Here, we use an optimal energy storage control algorithm to develop a heuristic procedure for energy storage placement and sizing. We perform operational simulation under various time profiles of intermittent generation, loads and interchanges (artificially generated or from historical data) and accumulate statistics of the usage of storage at each node under the optimal dispatch. We develop a greedy heuristic based on the accumulated statistics to obtain a minimal set of nodes for storage placement. The quality of the heuristic is explored by comparing our results to the obvious heuristic of placing storage at the renewables for IEEE benchmarks and real-world network topologies.
1309.2648
Hany SalahEldeen
Hany M. SalahEldeen and Michael L. Nelson
Resurrecting My Revolution: Using Social Link Neighborhood in Bringing Context to the Disappearing Web
Published IN TPDL 2013
null
null
null
cs.IR cs.DL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In previous work we reported that resources linked in tweets disappeared at the rate of 11% in the first year followed by 7.3% each year afterwards. We also found that in the first year 6.7%, and 14.6% in each subsequent year, of the resources were archived in public web archives. In this paper we revisit the same dataset of tweets and find that our prior model still holds and the calculated error for estimating percentages missing was about 4%, but we found the rate of archiving produced a higher error of about 11.5%. We also discovered that resources have disappeared from the archives themselves (7.89%) as well as reappeared on the live web after being declared missing (6.54%). We have also tested the availability of the tweets themselves and found that 10.34% have disappeared from the live web. To mitigate the loss of resources on the live web, we propose the use of a "tweet signature". Using the Topsy API, we extract the top five most frequent terms from the union of all tweets about a resource, and use these five terms as a query to Google. We found that using tweet signatures results in discovering replacement resources with 70+% textual similarity to the missing resource 41% of the time.
[ { "version": "v1", "created": "Tue, 10 Sep 2013 20:00:55 GMT" } ]
2013-09-12T00:00:00
[ [ "SalahEldeen", "Hany M.", "" ], [ "Nelson", "Michael L.", "" ] ]
TITLE: Resurrecting My Revolution: Using Social Link Neighborhood in Bringing Context to the Disappearing Web ABSTRACT: In previous work we reported that resources linked in tweets disappeared at the rate of 11% in the first year followed by 7.3% each year afterwards. We also found that in the first year 6.7%, and 14.6% in each subsequent year, of the resources were archived in public web archives. In this paper we revisit the same dataset of tweets and find that our prior model still holds and the calculated error for estimating percentages missing was about 4%, but we found the rate of archiving produced a higher error of about 11.5%. We also discovered that resources have disappeared from the archives themselves (7.89%) as well as reappeared on the live web after being declared missing (6.54%). We have also tested the availability of the tweets themselves and found that 10.34% have disappeared from the live web. To mitigate the loss of resources on the live web, we propose the use of a "tweet signature". Using the Topsy API, we extract the top five most frequent terms from the union of all tweets about a resource, and use these five terms as a query to Google. We found that using tweet signatures results in discovering replacement resources with 70+% textual similarity to the missing resource 41% of the time.
1309.2675
Robert McColl
Rob McColl, David Ediger, Jason Poovey, Dan Campbell, David Bader
A Brief Study of Open Source Graph Databases
WSSSPE13, 4 Pages, 18 Pages with Appendix, 25 figures
null
null
null
cs.DB cs.DS cs.SE
http://creativecommons.org/licenses/by/3.0/
With the proliferation of large irregular sparse relational datasets, new storage and analysis platforms have arisen to fill gaps in performance and capability left by conventional approaches built on traditional database technologies and query languages. Many of these platforms apply graph structures and analysis techniques to enable users to ingest, update, query and compute on the topological structure of these relationships represented as set(s) of edges between set(s) of vertices. To store and process Facebook-scale datasets, they must be able to support data sources with billions of edges, update rates of millions of updates per second, and complex analysis kernels. These platforms must provide intuitive interfaces that enable graph experts and novice programmers to write implementations of common graph algorithms. In this paper, we explore a variety of graph analysis and storage platforms. We compare their capabil- ities, interfaces, and performance by implementing and computing a set of real-world graph algorithms on synthetic graphs with up to 256 million edges. In the spirit of full disclosure, several authors are affiliated with the development of STINGER.
[ { "version": "v1", "created": "Fri, 6 Sep 2013 18:36:33 GMT" } ]
2013-09-12T00:00:00
[ [ "McColl", "Rob", "" ], [ "Ediger", "David", "" ], [ "Poovey", "Jason", "" ], [ "Campbell", "Dan", "" ], [ "Bader", "David", "" ] ]
TITLE: A Brief Study of Open Source Graph Databases ABSTRACT: With the proliferation of large irregular sparse relational datasets, new storage and analysis platforms have arisen to fill gaps in performance and capability left by conventional approaches built on traditional database technologies and query languages. Many of these platforms apply graph structures and analysis techniques to enable users to ingest, update, query and compute on the topological structure of these relationships represented as set(s) of edges between set(s) of vertices. To store and process Facebook-scale datasets, they must be able to support data sources with billions of edges, update rates of millions of updates per second, and complex analysis kernels. These platforms must provide intuitive interfaces that enable graph experts and novice programmers to write implementations of common graph algorithms. In this paper, we explore a variety of graph analysis and storage platforms. We compare their capabil- ities, interfaces, and performance by implementing and computing a set of real-world graph algorithms on synthetic graphs with up to 256 million edges. In the spirit of full disclosure, several authors are affiliated with the development of STINGER.
1309.2199
Przemyslaw Grabowicz Mr
Przemyslaw A. Grabowicz, Luca Maria Aiello, V\'ictor M. Egu\'iluz, Alejandro Jaimes
Distinguishing Topical and Social Groups Based on Common Identity and Bond Theory
10 pages, 6 figures, 2 tables
2013. In Proceedings of the sixth ACM international conference on Web search and data mining (WSDM '13). ACM, New York, NY, USA, 627-636
10.1145/2433396.2433475
null
cs.SI cs.CY physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Social groups play a crucial role in social media platforms because they form the basis for user participation and engagement. Groups are created explicitly by members of the community, but also form organically as members interact. Due to their importance, they have been studied widely (e.g., community detection, evolution, activity, etc.). One of the key questions for understanding how such groups evolve is whether there are different types of groups and how they differ. In Sociology, theories have been proposed to help explain how such groups form. In particular, the common identity and common bond theory states that people join groups based on identity (i.e., interest in the topics discussed) or bond attachment (i.e., social relationships). The theory has been applied qualitatively to small groups to classify them as either topical or social. We use the identity and bond theory to define a set of features to classify groups into those two categories. Using a dataset from Flickr, we extract user-defined groups and automatically-detected groups, obtained from a community detection algorithm. We discuss the process of manual labeling of groups into social or topical and present results of predicting the group label based on the defined features. We directly validate the predictions of the theory showing that the metrics are able to forecast the group type with high accuracy. In addition, we present a comparison between declared and detected groups along topicality and sociality dimensions.
[ { "version": "v1", "created": "Mon, 9 Sep 2013 15:47:00 GMT" } ]
2013-09-10T00:00:00
[ [ "Grabowicz", "Przemyslaw A.", "" ], [ "Aiello", "Luca Maria", "" ], [ "Eguíluz", "Víctor M.", "" ], [ "Jaimes", "Alejandro", "" ] ]
TITLE: Distinguishing Topical and Social Groups Based on Common Identity and Bond Theory ABSTRACT: Social groups play a crucial role in social media platforms because they form the basis for user participation and engagement. Groups are created explicitly by members of the community, but also form organically as members interact. Due to their importance, they have been studied widely (e.g., community detection, evolution, activity, etc.). One of the key questions for understanding how such groups evolve is whether there are different types of groups and how they differ. In Sociology, theories have been proposed to help explain how such groups form. In particular, the common identity and common bond theory states that people join groups based on identity (i.e., interest in the topics discussed) or bond attachment (i.e., social relationships). The theory has been applied qualitatively to small groups to classify them as either topical or social. We use the identity and bond theory to define a set of features to classify groups into those two categories. Using a dataset from Flickr, we extract user-defined groups and automatically-detected groups, obtained from a community detection algorithm. We discuss the process of manual labeling of groups into social or topical and present results of predicting the group label based on the defined features. We directly validate the predictions of the theory showing that the metrics are able to forecast the group type with high accuracy. In addition, we present a comparison between declared and detected groups along topicality and sociality dimensions.
1208.3629
Hang Zhou
Marc Lelarge and Hang Zhou
Sublinear-Time Algorithms for Monomer-Dimer Systems on Bounded Degree Graphs
null
null
null
null
cs.DS cs.DM math.PR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
For a graph $G$, let $Z(G,\lambda)$ be the partition function of the monomer-dimer system defined by $\sum_k m_k(G)\lambda^k$, where $m_k(G)$ is the number of matchings of size $k$ in $G$. We consider graphs of bounded degree and develop a sublinear-time algorithm for estimating $\log Z(G,\lambda)$ at an arbitrary value $\lambda>0$ within additive error $\epsilon n$ with high probability. The query complexity of our algorithm does not depend on the size of $G$ and is polynomial in $1/\epsilon$, and we also provide a lower bound quadratic in $1/\epsilon$ for this problem. This is the first analysis of a sublinear-time approximation algorithm for a $# P$-complete problem. Our approach is based on the correlation decay of the Gibbs distribution associated with $Z(G,\lambda)$. We show that our algorithm approximates the probability for a vertex to be covered by a matching, sampled according to this Gibbs distribution, in a near-optimal sublinear time. We extend our results to approximate the average size and the entropy of such a matching within an additive error with high probability, where again the query complexity is polynomial in $1/\epsilon$ and the lower bound is quadratic in $1/\epsilon$. Our algorithms are simple to implement and of practical use when dealing with massive datasets. Our results extend to other systems where the correlation decay is known to hold as for the independent set problem up to the critical activity.
[ { "version": "v1", "created": "Fri, 17 Aug 2012 16:11:27 GMT" }, { "version": "v2", "created": "Sun, 23 Sep 2012 21:07:44 GMT" }, { "version": "v3", "created": "Mon, 22 Apr 2013 21:01:49 GMT" }, { "version": "v4", "created": "Tue, 18 Jun 2013 10:58:30 GMT" }, { "version": "v5", "created": "Wed, 4 Sep 2013 07:49:39 GMT" } ]
2013-09-05T00:00:00
[ [ "Lelarge", "Marc", "" ], [ "Zhou", "Hang", "" ] ]
TITLE: Sublinear-Time Algorithms for Monomer-Dimer Systems on Bounded Degree Graphs ABSTRACT: For a graph $G$, let $Z(G,\lambda)$ be the partition function of the monomer-dimer system defined by $\sum_k m_k(G)\lambda^k$, where $m_k(G)$ is the number of matchings of size $k$ in $G$. We consider graphs of bounded degree and develop a sublinear-time algorithm for estimating $\log Z(G,\lambda)$ at an arbitrary value $\lambda>0$ within additive error $\epsilon n$ with high probability. The query complexity of our algorithm does not depend on the size of $G$ and is polynomial in $1/\epsilon$, and we also provide a lower bound quadratic in $1/\epsilon$ for this problem. This is the first analysis of a sublinear-time approximation algorithm for a $# P$-complete problem. Our approach is based on the correlation decay of the Gibbs distribution associated with $Z(G,\lambda)$. We show that our algorithm approximates the probability for a vertex to be covered by a matching, sampled according to this Gibbs distribution, in a near-optimal sublinear time. We extend our results to approximate the average size and the entropy of such a matching within an additive error with high probability, where again the query complexity is polynomial in $1/\epsilon$ and the lower bound is quadratic in $1/\epsilon$. Our algorithms are simple to implement and of practical use when dealing with massive datasets. Our results extend to other systems where the correlation decay is known to hold as for the independent set problem up to the critical activity.
1309.1009
Suranjan Ganguly
Ayan Seal, Suranjan Ganguly, Debotosh Bhattacharjee, Mita Nasipuri, Dipak Kumar Basu
A Comparative Study of Human thermal face recognition based on Haar wavelet transform (HWT) and Local Binary Pattern (LBP)
17 pages Computational Intelligence and Neuroscience 2012
null
null
null
cs.CV
http://creativecommons.org/licenses/publicdomain/
Thermal infra-red (IR) images focus on changes of temperature distribution on facial muscles and blood vessels. These temperature changes can be regarded as texture features of images. A comparative study of face recognition methods working in thermal spectrum is carried out in this paper. In these study two local-matching methods based on Haar wavelet transform and Local Binary Pattern (LBP) are analyzed. Wavelet transform is a good tool to analyze multi-scale, multi-direction changes of texture. Local binary patterns (LBP) are a type of feature used for classification in computer vision. Firstly, human thermal IR face image is preprocessed and cropped the face region only from the entire image. Secondly, two different approaches are used to extract the features from the cropped face region. In the first approach, the training images and the test images are processed with Haar wavelet transform and the LL band and the average of LH/HL/HH bands sub-images are created for each face image. Then a total confidence matrix is formed for each face image by taking a weighted sum of the corresponding pixel values of the LL band and average band. For LBP feature extraction, each of the face images in training and test datasets is divided into 161 numbers of sub images, each of size 8X8 pixels. For each such sub images, LBP features are extracted which are concatenated in row wise manner. PCA is performed separately on the individual feature set for dimensionality reeducation. Finally two different classifiers are used to classify face images. One such classifier multi-layer feed forward neural network and another classifier is minimum distance classifier. The Experiments have been performed on the database created at our own laboratory and Terravic Facial IR Database.
[ { "version": "v1", "created": "Wed, 4 Sep 2013 12:41:48 GMT" } ]
2013-09-05T00:00:00
[ [ "Seal", "Ayan", "" ], [ "Ganguly", "Suranjan", "" ], [ "Bhattacharjee", "Debotosh", "" ], [ "Nasipuri", "Mita", "" ], [ "Basu", "Dipak Kumar", "" ] ]
TITLE: A Comparative Study of Human thermal face recognition based on Haar wavelet transform (HWT) and Local Binary Pattern (LBP) ABSTRACT: Thermal infra-red (IR) images focus on changes of temperature distribution on facial muscles and blood vessels. These temperature changes can be regarded as texture features of images. A comparative study of face recognition methods working in thermal spectrum is carried out in this paper. In these study two local-matching methods based on Haar wavelet transform and Local Binary Pattern (LBP) are analyzed. Wavelet transform is a good tool to analyze multi-scale, multi-direction changes of texture. Local binary patterns (LBP) are a type of feature used for classification in computer vision. Firstly, human thermal IR face image is preprocessed and cropped the face region only from the entire image. Secondly, two different approaches are used to extract the features from the cropped face region. In the first approach, the training images and the test images are processed with Haar wavelet transform and the LL band and the average of LH/HL/HH bands sub-images are created for each face image. Then a total confidence matrix is formed for each face image by taking a weighted sum of the corresponding pixel values of the LL band and average band. For LBP feature extraction, each of the face images in training and test datasets is divided into 161 numbers of sub images, each of size 8X8 pixels. For each such sub images, LBP features are extracted which are concatenated in row wise manner. PCA is performed separately on the individual feature set for dimensionality reeducation. Finally two different classifiers are used to classify face images. One such classifier multi-layer feed forward neural network and another classifier is minimum distance classifier. The Experiments have been performed on the database created at our own laboratory and Terravic Facial IR Database.
1304.3754
Jonathan Ullman
Karthekeyan Chandrasekaran, Justin Thaler, Jonathan Ullman, Andrew Wan
Faster Private Release of Marginals on Small Databases
null
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study the problem of answering \emph{$k$-way marginal} queries on a database $D \in (\{0,1\}^d)^n$, while preserving differential privacy. The answer to a $k$-way marginal query is the fraction of the database's records $x \in \{0,1\}^d$ with a given value in each of a given set of up to $k$ columns. Marginal queries enable a rich class of statistical analyses on a dataset, and designing efficient algorithms for privately answering marginal queries has been identified as an important open problem in private data analysis. For any $k$, we give a differentially private online algorithm that runs in time $$ \min{\exp(d^{1-\Omega(1/\sqrt{k})}), \exp(d / \log^{.99} d)\} $$ per query and answers any (possibly superpolynomially long and adaptively chosen) sequence of $k$-way marginal queries up to error at most $\pm .01$ on every query, provided $n \gtrsim d^{.51} $. To the best of our knowledge, this is the first algorithm capable of privately answering marginal queries with a non-trivial worst-case accuracy guarantee on a database of size $\poly(d, k)$ in time $\exp(o(d))$. Our algorithms are a variant of the private multiplicative weights algorithm (Hardt and Rothblum, FOCS '10), but using a different low-weight representation of the database. We derive our low-weight representation using approximations to the OR function by low-degree polynomials with coefficients of bounded $L_1$-norm. We also prove a strong limitation on our approach that is of independent approximation-theoretic interest. Specifically, we show that for any $k = o(\log d)$, any polynomial with coefficients of $L_1$-norm $poly(d)$ that pointwise approximates the $d$-variate OR function on all inputs of Hamming weight at most $k$ must have degree $d^{1-O(1/\sqrt{k})}$.
[ { "version": "v1", "created": "Sat, 13 Apr 2013 00:37:17 GMT" }, { "version": "v2", "created": "Tue, 3 Sep 2013 00:41:55 GMT" } ]
2013-09-04T00:00:00
[ [ "Chandrasekaran", "Karthekeyan", "" ], [ "Thaler", "Justin", "" ], [ "Ullman", "Jonathan", "" ], [ "Wan", "Andrew", "" ] ]
TITLE: Faster Private Release of Marginals on Small Databases ABSTRACT: We study the problem of answering \emph{$k$-way marginal} queries on a database $D \in (\{0,1\}^d)^n$, while preserving differential privacy. The answer to a $k$-way marginal query is the fraction of the database's records $x \in \{0,1\}^d$ with a given value in each of a given set of up to $k$ columns. Marginal queries enable a rich class of statistical analyses on a dataset, and designing efficient algorithms for privately answering marginal queries has been identified as an important open problem in private data analysis. For any $k$, we give a differentially private online algorithm that runs in time $$ \min{\exp(d^{1-\Omega(1/\sqrt{k})}), \exp(d / \log^{.99} d)\} $$ per query and answers any (possibly superpolynomially long and adaptively chosen) sequence of $k$-way marginal queries up to error at most $\pm .01$ on every query, provided $n \gtrsim d^{.51} $. To the best of our knowledge, this is the first algorithm capable of privately answering marginal queries with a non-trivial worst-case accuracy guarantee on a database of size $\poly(d, k)$ in time $\exp(o(d))$. Our algorithms are a variant of the private multiplicative weights algorithm (Hardt and Rothblum, FOCS '10), but using a different low-weight representation of the database. We derive our low-weight representation using approximations to the OR function by low-degree polynomials with coefficients of bounded $L_1$-norm. We also prove a strong limitation on our approach that is of independent approximation-theoretic interest. Specifically, we show that for any $k = o(\log d)$, any polynomial with coefficients of $L_1$-norm $poly(d)$ that pointwise approximates the $d$-variate OR function on all inputs of Hamming weight at most $k$ must have degree $d^{1-O(1/\sqrt{k})}$.
1309.0534
Raphael kena Poss
Raphael 'kena' Poss
Machines are benchmarked by code, not algorithms
34 pages, 11 figures, 11 listings, 17 tables
null
null
null
cs.SE cs.PF
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This article highlights how small modifications to either the source code of a benchmark program or the compilation options may impact its behavior on a specific machine. It argues that for evaluating machines, benchmark providers and users be careful to ensure reproducibility of results based on the machine code actually running on the hardware and not just source code. The article uses color to grayscale conversion of digital images as a running example.
[ { "version": "v1", "created": "Mon, 2 Sep 2013 20:34:09 GMT" } ]
2013-09-04T00:00:00
[ [ "Poss", "Raphael 'kena'", "" ] ]
TITLE: Machines are benchmarked by code, not algorithms ABSTRACT: This article highlights how small modifications to either the source code of a benchmark program or the compilation options may impact its behavior on a specific machine. It argues that for evaluating machines, benchmark providers and users be careful to ensure reproducibility of results based on the machine code actually running on the hardware and not just source code. The article uses color to grayscale conversion of digital images as a running example.
1309.0215
Mian Lu
Mian Lu, Lei Zhang, Huynh Phung Huynh, Zhongliang Ong, Yun Liang, Bingsheng He, Rick Siow Mong Goh, Richard Huynh
Optimizing the MapReduce Framework on Intel Xeon Phi Coprocessor
null
null
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
With the ease-of-programming, flexibility and yet efficiency, MapReduce has become one of the most popular frameworks for building big-data applications. MapReduce was originally designed for distributed-computing, and has been extended to various architectures, e,g, multi-core CPUs, GPUs and FPGAs. In this work, we focus on optimizing the MapReduce framework on Xeon Phi, which is the latest product released by Intel based on the Many Integrated Core Architecture. To the best of our knowledge, this is the first work to optimize the MapReduce framework on the Xeon Phi. In our work, we utilize advanced features of the Xeon Phi to achieve high performance. In order to take advantage of the SIMD vector processing units, we propose a vectorization friendly technique for the map phase to assist the auto-vectorization as well as develop SIMD hash computation algorithms. Furthermore, we utilize MIMD hyper-threading to pipeline the map and reduce to improve the resource utilization. We also eliminate multiple local arrays but use low cost atomic operations on the global array for some applications, which can improve the thread scalability and data locality due to the coherent L2 caches. Finally, for a given application, our framework can either automatically detect suitable techniques to apply or provide guideline for users at compilation time. We conduct comprehensive experiments to benchmark the Xeon Phi and compare our optimized MapReduce framework with a state-of-the-art multi-core based MapReduce framework (Phoenix++). By evaluating six real-world applications, the experimental results show that our optimized framework is 1.2X to 38X faster than Phoenix++ for various applications on the Xeon Phi.
[ { "version": "v1", "created": "Sun, 1 Sep 2013 12:39:30 GMT" } ]
2013-09-03T00:00:00
[ [ "Lu", "Mian", "" ], [ "Zhang", "Lei", "" ], [ "Huynh", "Huynh Phung", "" ], [ "Ong", "Zhongliang", "" ], [ "Liang", "Yun", "" ], [ "He", "Bingsheng", "" ], [ "Goh", "Rick Siow Mong", "" ], [ "Huynh", "Richard", "" ] ]
TITLE: Optimizing the MapReduce Framework on Intel Xeon Phi Coprocessor ABSTRACT: With the ease-of-programming, flexibility and yet efficiency, MapReduce has become one of the most popular frameworks for building big-data applications. MapReduce was originally designed for distributed-computing, and has been extended to various architectures, e,g, multi-core CPUs, GPUs and FPGAs. In this work, we focus on optimizing the MapReduce framework on Xeon Phi, which is the latest product released by Intel based on the Many Integrated Core Architecture. To the best of our knowledge, this is the first work to optimize the MapReduce framework on the Xeon Phi. In our work, we utilize advanced features of the Xeon Phi to achieve high performance. In order to take advantage of the SIMD vector processing units, we propose a vectorization friendly technique for the map phase to assist the auto-vectorization as well as develop SIMD hash computation algorithms. Furthermore, we utilize MIMD hyper-threading to pipeline the map and reduce to improve the resource utilization. We also eliminate multiple local arrays but use low cost atomic operations on the global array for some applications, which can improve the thread scalability and data locality due to the coherent L2 caches. Finally, for a given application, our framework can either automatically detect suitable techniques to apply or provide guideline for users at compilation time. We conduct comprehensive experiments to benchmark the Xeon Phi and compare our optimized MapReduce framework with a state-of-the-art multi-core based MapReduce framework (Phoenix++). By evaluating six real-world applications, the experimental results show that our optimized framework is 1.2X to 38X faster than Phoenix++ for various applications on the Xeon Phi.
1309.0309
Xiaojiang Peng
Xiaojiang Peng, Qiang Peng, Yu Qiao, Junzhou Chen, Mehtab Afzal
A Study on Unsupervised Dictionary Learning and Feature Encoding for Action Classification
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Many efforts have been devoted to develop alternative methods to traditional vector quantization in image domain such as sparse coding and soft-assignment. These approaches can be split into a dictionary learning phase and a feature encoding phase which are often closely connected. In this paper, we investigate the effects of these phases by separating them for video-based action classification. We compare several dictionary learning methods and feature encoding schemes through extensive experiments on KTH and HMDB51 datasets. Experimental results indicate that sparse coding performs consistently better than the other encoding methods in large complex dataset (i.e., HMDB51), and it is robust to different dictionaries. For small simple dataset (i.e., KTH) with less variation, however, all the encoding strategies perform competitively. In addition, we note that the strength of sophisticated encoding approaches comes not from their corresponding dictionaries but the encoding mechanisms, and we can just use randomly selected exemplars as dictionaries for video-based action classification.
[ { "version": "v1", "created": "Mon, 2 Sep 2013 07:06:05 GMT" } ]
2013-09-03T00:00:00
[ [ "Peng", "Xiaojiang", "" ], [ "Peng", "Qiang", "" ], [ "Qiao", "Yu", "" ], [ "Chen", "Junzhou", "" ], [ "Afzal", "Mehtab", "" ] ]
TITLE: A Study on Unsupervised Dictionary Learning and Feature Encoding for Action Classification ABSTRACT: Many efforts have been devoted to develop alternative methods to traditional vector quantization in image domain such as sparse coding and soft-assignment. These approaches can be split into a dictionary learning phase and a feature encoding phase which are often closely connected. In this paper, we investigate the effects of these phases by separating them for video-based action classification. We compare several dictionary learning methods and feature encoding schemes through extensive experiments on KTH and HMDB51 datasets. Experimental results indicate that sparse coding performs consistently better than the other encoding methods in large complex dataset (i.e., HMDB51), and it is robust to different dictionaries. For small simple dataset (i.e., KTH) with less variation, however, all the encoding strategies perform competitively. In addition, we note that the strength of sophisticated encoding approaches comes not from their corresponding dictionaries but the encoding mechanisms, and we can just use randomly selected exemplars as dictionaries for video-based action classification.
1309.0337
Neil Houlsby
Neil Houlsby, Massimiliano Ciaramita
Scalable Probabilistic Entity-Topic Modeling
null
null
null
null
stat.ML cs.IR cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present an LDA approach to entity disambiguation. Each topic is associated with a Wikipedia article and topics generate either content words or entity mentions. Training such models is challenging because of the topic and vocabulary size, both in the millions. We tackle these problems using a novel distributed inference and representation framework based on a parallel Gibbs sampler guided by the Wikipedia link graph, and pipelines of MapReduce allowing fast and memory-frugal processing of large datasets. We report state-of-the-art performance on a public dataset.
[ { "version": "v1", "created": "Mon, 2 Sep 2013 09:34:50 GMT" } ]
2013-09-03T00:00:00
[ [ "Houlsby", "Neil", "" ], [ "Ciaramita", "Massimiliano", "" ] ]
TITLE: Scalable Probabilistic Entity-Topic Modeling ABSTRACT: We present an LDA approach to entity disambiguation. Each topic is associated with a Wikipedia article and topics generate either content words or entity mentions. Training such models is challenging because of the topic and vocabulary size, both in the millions. We tackle these problems using a novel distributed inference and representation framework based on a parallel Gibbs sampler guided by the Wikipedia link graph, and pipelines of MapReduce allowing fast and memory-frugal processing of large datasets. We report state-of-the-art performance on a public dataset.
1309.0346
Alfredo Braunstein
Indaco Biazzo, Alfredo Braunstein, Riccardo Zecchina
On the performance of a cavity method based algorithm for the Prize-Collecting Steiner Tree Problem on graphs
null
Phys. Rev. E 86, 026706 (2012)
10.1103/PhysRevE.86.026706
null
cs.DS cond-mat.stat-mech
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study the behavior of an algorithm derived from the cavity method for the Prize-Collecting Steiner Tree (PCST) problem on graphs. The algorithm is based on the zero temperature limit of the cavity equations and as such is formally simple (a fixed point equation resolved by iteration) and distributed (parallelizable). We provide a detailed comparison with state-of-the-art algorithms on a wide range of existing benchmarks networks and random graphs. Specifically, we consider an enhanced derivative of the Goemans-Williamson heuristics and the DHEA solver, a Branch and Cut Linear/Integer Programming based approach. The comparison shows that the cavity algorithm outperforms the two algorithms in most large instances both in running time and quality of the solution. Finally we prove a few optimality properties of the solutions provided by our algorithm, including optimality under the two post-processing procedures defined in the Goemans-Williamson derivative and global optimality in some limit cases.
[ { "version": "v1", "created": "Mon, 2 Sep 2013 10:05:17 GMT" } ]
2013-09-03T00:00:00
[ [ "Biazzo", "Indaco", "" ], [ "Braunstein", "Alfredo", "" ], [ "Zecchina", "Riccardo", "" ] ]
TITLE: On the performance of a cavity method based algorithm for the Prize-Collecting Steiner Tree Problem on graphs ABSTRACT: We study the behavior of an algorithm derived from the cavity method for the Prize-Collecting Steiner Tree (PCST) problem on graphs. The algorithm is based on the zero temperature limit of the cavity equations and as such is formally simple (a fixed point equation resolved by iteration) and distributed (parallelizable). We provide a detailed comparison with state-of-the-art algorithms on a wide range of existing benchmarks networks and random graphs. Specifically, we consider an enhanced derivative of the Goemans-Williamson heuristics and the DHEA solver, a Branch and Cut Linear/Integer Programming based approach. The comparison shows that the cavity algorithm outperforms the two algorithms in most large instances both in running time and quality of the solution. Finally we prove a few optimality properties of the solutions provided by our algorithm, including optimality under the two post-processing procedures defined in the Goemans-Williamson derivative and global optimality in some limit cases.
1305.2949
Reza Farrahi Moghaddam
Reza Farrahi Moghaddam and Fereydoun Farrahi Moghaddam and Mohamed Cheriet
Unsupervised ensemble of experts (EoE) framework for automatic binarization of document images
6-page version, Accepted to be presented in ICDAR'13
ICDAR 2013, pp 703-707
10.1109/ICDAR.2013.144
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In recent years, a large number of binarization methods have been developed, with varying performance generalization and strength against different benchmarks. In this work, to leverage on these methods, an ensemble of experts (EoE) framework is introduced, to efficiently combine the outputs of various methods. The proposed framework offers a new selection process of the binarization methods, which are actually the experts in the ensemble, by introducing three concepts: confidentness, endorsement and schools of experts. The framework, which is highly objective, is built based on two general principles: (i) consolidation of saturated opinions and (ii) identification of schools of experts. After building the endorsement graph of the ensemble for an input document image based on the confidentness of the experts, the saturated opinions are consolidated, and then the schools of experts are identified by thresholding the consolidated endorsement graph. A variation of the framework, in which no selection is made, is also introduced that combines the outputs of all experts using endorsement-dependent weights. The EoE framework is evaluated on the set of participating methods in the H-DIBCO'12 contest and also on an ensemble generated from various instances of grid-based Sauvola method with promising performance.
[ { "version": "v1", "created": "Mon, 13 May 2013 20:37:29 GMT" }, { "version": "v2", "created": "Wed, 29 May 2013 14:36:35 GMT" } ]
2013-09-02T00:00:00
[ [ "Moghaddam", "Reza Farrahi", "" ], [ "Moghaddam", "Fereydoun Farrahi", "" ], [ "Cheriet", "Mohamed", "" ] ]
TITLE: Unsupervised ensemble of experts (EoE) framework for automatic binarization of document images ABSTRACT: In recent years, a large number of binarization methods have been developed, with varying performance generalization and strength against different benchmarks. In this work, to leverage on these methods, an ensemble of experts (EoE) framework is introduced, to efficiently combine the outputs of various methods. The proposed framework offers a new selection process of the binarization methods, which are actually the experts in the ensemble, by introducing three concepts: confidentness, endorsement and schools of experts. The framework, which is highly objective, is built based on two general principles: (i) consolidation of saturated opinions and (ii) identification of schools of experts. After building the endorsement graph of the ensemble for an input document image based on the confidentness of the experts, the saturated opinions are consolidated, and then the schools of experts are identified by thresholding the consolidated endorsement graph. A variation of the framework, in which no selection is made, is also introduced that combines the outputs of all experts using endorsement-dependent weights. The EoE framework is evaluated on the set of participating methods in the H-DIBCO'12 contest and also on an ensemble generated from various instances of grid-based Sauvola method with promising performance.
1308.6683
Jerome Darmont
Chantola Kit (ERIC), Marouane Hachicha (ERIC), J\'er\^ome Darmont (ERIC)
Benchmarking Summarizability Processing in XML Warehouses with Complex Hierarchies
15th International Workshop on Data Warehousing and OLAP (DOLAP 2012), Maui : United States (2012)
null
null
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Business Intelligence plays an important role in decision making. Based on data warehouses and Online Analytical Processing, a business intelligence tool can be used to analyze complex data. Still, summarizability issues in data warehouses cause ineffective analyses that may become critical problems to businesses. To settle this issue, many researchers have studied and proposed various solutions, both in relational and XML data warehouses. However, they find difficulty in evaluating the performance of their proposals since the available benchmarks lack complex hierarchies. In order to contribute to summarizability analysis, this paper proposes an extension to the XML warehouse benchmark (XWeB) with complex hierarchies. The benchmark enables us to generate XML data warehouses with scalable complex hierarchies as well as summarizability processing. We experimentally demonstrated that complex hierarchies can definitely be included into a benchmark dataset, and that our benchmark is able to compare two alternative approaches dealing with summarizability issues.
[ { "version": "v1", "created": "Fri, 30 Aug 2013 09:02:02 GMT" } ]
2013-09-02T00:00:00
[ [ "Kit", "Chantola", "", "ERIC" ], [ "Hachicha", "Marouane", "", "ERIC" ], [ "Darmont", "Jérôme", "", "ERIC" ] ]
TITLE: Benchmarking Summarizability Processing in XML Warehouses with Complex Hierarchies ABSTRACT: Business Intelligence plays an important role in decision making. Based on data warehouses and Online Analytical Processing, a business intelligence tool can be used to analyze complex data. Still, summarizability issues in data warehouses cause ineffective analyses that may become critical problems to businesses. To settle this issue, many researchers have studied and proposed various solutions, both in relational and XML data warehouses. However, they find difficulty in evaluating the performance of their proposals since the available benchmarks lack complex hierarchies. In order to contribute to summarizability analysis, this paper proposes an extension to the XML warehouse benchmark (XWeB) with complex hierarchies. The benchmark enables us to generate XML data warehouses with scalable complex hierarchies as well as summarizability processing. We experimentally demonstrated that complex hierarchies can definitely be included into a benchmark dataset, and that our benchmark is able to compare two alternative approaches dealing with summarizability issues.
1308.6721
Puneet Kumar
Pierre-Yves Baudin (INRIA Saclay - Ile de France), Danny Goodman, Puneet Kumar (INRIA Saclay - Ile de France, CVN), Noura Azzabou (MIRCEN, UPMC), Pierre G. Carlier (UPMC), Nikos Paragios (INRIA Saclay - Ile de France, MAS, LIGM, ENPC), M. Pawan Kumar (INRIA Saclay - Ile de France, CVN)
Discriminative Parameter Estimation for Random Walks Segmentation
Medical Image Computing and Computer Assisted Interventaion (2013)
null
null
null
cs.CV cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Random Walks (RW) algorithm is one of the most e - cient and easy-to-use probabilistic segmentation methods. By combining contrast terms with prior terms, it provides accurate segmentations of medical images in a fully automated manner. However, one of the main drawbacks of using the RW algorithm is that its parameters have to be hand-tuned. we propose a novel discriminative learning framework that estimates the parameters using a training dataset. The main challenge we face is that the training samples are not fully supervised. Speci cally, they provide a hard segmentation of the images, instead of a proba- bilistic segmentation. We overcome this challenge by treating the opti- mal probabilistic segmentation that is compatible with the given hard segmentation as a latent variable. This allows us to employ the latent support vector machine formulation for parameter estimation. We show that our approach signi cantly outperforms the baseline methods on a challenging dataset consisting of real clinical 3D MRI volumes of skeletal muscles.
[ { "version": "v1", "created": "Fri, 30 Aug 2013 12:13:11 GMT" } ]
2013-09-02T00:00:00
[ [ "Baudin", "Pierre-Yves", "", "INRIA Saclay - Ile de France" ], [ "Goodman", "Danny", "", "INRIA Saclay - Ile de France, CVN" ], [ "Kumar", "Puneet", "", "INRIA Saclay - Ile de France, CVN" ], [ "Azzabou", "Noura", "", "MIRCEN,\n UPMC" ], [ "Carlier", "Pierre G.", "", "UPMC" ], [ "Paragios", "Nikos", "", "INRIA Saclay - Ile de\n France, MAS, LIGM, ENPC" ], [ "Kumar", "M. Pawan", "", "INRIA Saclay - Ile de France, CVN" ] ]
TITLE: Discriminative Parameter Estimation for Random Walks Segmentation ABSTRACT: The Random Walks (RW) algorithm is one of the most e - cient and easy-to-use probabilistic segmentation methods. By combining contrast terms with prior terms, it provides accurate segmentations of medical images in a fully automated manner. However, one of the main drawbacks of using the RW algorithm is that its parameters have to be hand-tuned. we propose a novel discriminative learning framework that estimates the parameters using a training dataset. The main challenge we face is that the training samples are not fully supervised. Speci cally, they provide a hard segmentation of the images, instead of a proba- bilistic segmentation. We overcome this challenge by treating the opti- mal probabilistic segmentation that is compatible with the given hard segmentation as a latent variable. This allows us to employ the latent support vector machine formulation for parameter estimation. We show that our approach signi cantly outperforms the baseline methods on a challenging dataset consisting of real clinical 3D MRI volumes of skeletal muscles.
1110.5813
Jierui Xie
Jierui Xie, Stephen Kelley, Boleslaw K. Szymanski
Overlapping Community Detection in Networks: the State of the Art and Comparative Study
This paper (final version) is accepted in 2012. ACM Computing Surveys, vol. 45, no. 4, 2013 (In press) Contact: [email protected]
ACM Computing Surveys 45(4), Article 43 (August 2013)
10.1145/2501654.2501657
null
cs.SI cs.DS physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper reviews the state of the art in overlapping community detection algorithms, quality measures, and benchmarks. A thorough comparison of different algorithms (a total of fourteen) is provided. In addition to community level evaluation, we propose a framework for evaluating algorithms' ability to detect overlapping nodes, which helps to assess over-detection and under-detection. After considering community level detection performance measured by Normalized Mutual Information, the Omega index, and node level detection performance measured by F-score, we reached the following conclusions. For low overlapping density networks, SLPA, OSLOM, Game and COPRA offer better performance than the other tested algorithms. For networks with high overlapping density and high overlapping diversity, both SLPA and Game provide relatively stable performance. However, test results also suggest that the detection in such networks is still not yet fully resolved. A common feature observed by various algorithms in real-world networks is the relatively small fraction of overlapping nodes (typically less than 30%), each of which belongs to only 2 or 3 communities.
[ { "version": "v1", "created": "Wed, 26 Oct 2011 15:12:38 GMT" }, { "version": "v2", "created": "Thu, 27 Oct 2011 03:05:03 GMT" }, { "version": "v3", "created": "Tue, 8 Nov 2011 21:27:02 GMT" }, { "version": "v4", "created": "Tue, 3 Jul 2012 19:30:23 GMT" } ]
2013-08-30T00:00:00
[ [ "Xie", "Jierui", "" ], [ "Kelley", "Stephen", "" ], [ "Szymanski", "Boleslaw K.", "" ] ]
TITLE: Overlapping Community Detection in Networks: the State of the Art and Comparative Study ABSTRACT: This paper reviews the state of the art in overlapping community detection algorithms, quality measures, and benchmarks. A thorough comparison of different algorithms (a total of fourteen) is provided. In addition to community level evaluation, we propose a framework for evaluating algorithms' ability to detect overlapping nodes, which helps to assess over-detection and under-detection. After considering community level detection performance measured by Normalized Mutual Information, the Omega index, and node level detection performance measured by F-score, we reached the following conclusions. For low overlapping density networks, SLPA, OSLOM, Game and COPRA offer better performance than the other tested algorithms. For networks with high overlapping density and high overlapping diversity, both SLPA and Game provide relatively stable performance. However, test results also suggest that the detection in such networks is still not yet fully resolved. A common feature observed by various algorithms in real-world networks is the relatively small fraction of overlapping nodes (typically less than 30%), each of which belongs to only 2 or 3 communities.
1308.6276
Arnaud Browet
Arnaud Browet and P.-A. Absil and Paul Van Dooren
Fast community detection using local neighbourhood search
null
null
null
null
physics.soc-ph cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Communities play a crucial role to describe and analyse modern networks. However, the size of those networks has grown tremendously with the increase of computational power and data storage. While various methods have been developed to extract community structures, their computational cost or the difficulty to parallelize existing algorithms make partitioning real networks into communities a challenging problem. In this paper, we propose to alter an efficient algorithm, the Louvain method, such that communities are defined as the connected components of a tree-like assignment graph. Within this framework, we precisely describe the different steps of our algorithm and demonstrate its highly parallelizable nature. We then show that despite its simplicity, our algorithm has a partitioning quality similar to the original method on benchmark graphs and even outperforms other algorithms. We also show that, even on a single processor, our method is much faster and allows the analysis of very large networks.
[ { "version": "v1", "created": "Wed, 28 Aug 2013 13:53:18 GMT" } ]
2013-08-30T00:00:00
[ [ "Browet", "Arnaud", "" ], [ "Absil", "P. -A.", "" ], [ "Van Dooren", "Paul", "" ] ]
TITLE: Fast community detection using local neighbourhood search ABSTRACT: Communities play a crucial role to describe and analyse modern networks. However, the size of those networks has grown tremendously with the increase of computational power and data storage. While various methods have been developed to extract community structures, their computational cost or the difficulty to parallelize existing algorithms make partitioning real networks into communities a challenging problem. In this paper, we propose to alter an efficient algorithm, the Louvain method, such that communities are defined as the connected components of a tree-like assignment graph. Within this framework, we precisely describe the different steps of our algorithm and demonstrate its highly parallelizable nature. We then show that despite its simplicity, our algorithm has a partitioning quality similar to the original method on benchmark graphs and even outperforms other algorithms. We also show that, even on a single processor, our method is much faster and allows the analysis of very large networks.
1106.0785
Aiguo Xu Prof. Dr.
Feng Chen, Aiguo Xu, Guangcai Zhang, Yingjun Li
Prandtl number effects in MRT Lattice Boltzmann models for shocked and unshocked compressible fluids
17 pages, 8 figures
Theoretical and Applied Mechanics Letters 1, 052004 (2011)
null
null
cond-mat.soft cs.NA nlin.CG physics.comp-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
For compressible fluids under shock wave reaction, we have proposed two Multiple-Relaxation-Time (MRT) Lattice Boltzmann (LB) models [F. Chen, et al, EPL \textbf{90} (2010) 54003; Phys. Lett. A \textbf{375} (2011) 2129.]. In this paper, we construct a new MRT Lattice Boltzmann model which is not only for the shocked compressible fluids, but also for the unshocked compressible fluids. To make the model work for unshocked compressible fluids, a key step is to modify the collision operators of energy flux so that the viscous coefficient in momentum equation is consistent with that in energy equation even in the unshocked system. The unnecessity of the modification for systems under strong shock is analyzed. The model is validated by some well-known benchmark tests, including (i) thermal Couette flow, (ii) Riemann problem, (iii) Richtmyer-Meshkov instability. The first system is unshocked and the latter two are shocked. In all the three systems, the Prandtl numbers effects are checked. Satisfying agreements are obtained between new model results and analytical ones or other numerical results.
[ { "version": "v1", "created": "Sat, 4 Jun 2011 03:14:32 GMT" } ]
2013-08-29T00:00:00
[ [ "Chen", "Feng", "" ], [ "Xu", "Aiguo", "" ], [ "Zhang", "Guangcai", "" ], [ "Li", "Yingjun", "" ] ]
TITLE: Prandtl number effects in MRT Lattice Boltzmann models for shocked and unshocked compressible fluids ABSTRACT: For compressible fluids under shock wave reaction, we have proposed two Multiple-Relaxation-Time (MRT) Lattice Boltzmann (LB) models [F. Chen, et al, EPL \textbf{90} (2010) 54003; Phys. Lett. A \textbf{375} (2011) 2129.]. In this paper, we construct a new MRT Lattice Boltzmann model which is not only for the shocked compressible fluids, but also for the unshocked compressible fluids. To make the model work for unshocked compressible fluids, a key step is to modify the collision operators of energy flux so that the viscous coefficient in momentum equation is consistent with that in energy equation even in the unshocked system. The unnecessity of the modification for systems under strong shock is analyzed. The model is validated by some well-known benchmark tests, including (i) thermal Couette flow, (ii) Riemann problem, (iii) Richtmyer-Meshkov instability. The first system is unshocked and the latter two are shocked. In all the three systems, the Prandtl numbers effects are checked. Satisfying agreements are obtained between new model results and analytical ones or other numerical results.
1308.6181
Jesus Cerquides
Victor Bellon and Jesus Cerquides and Ivo Grosse
Bayesian Conditional Gaussian Network Classifiers with Applications to Mass Spectra Classification
null
null
null
null
cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Classifiers based on probabilistic graphical models are very effective. In continuous domains, maximum likelihood is usually used to assess the predictions of those classifiers. When data is scarce, this can easily lead to overfitting. In any probabilistic setting, Bayesian averaging (BA) provides theoretically optimal predictions and is known to be robust to overfitting. In this work we introduce Bayesian Conditional Gaussian Network Classifiers, which efficiently perform exact Bayesian averaging over the parameters. We evaluate the proposed classifiers against the maximum likelihood alternatives proposed so far over standard UCI datasets, concluding that performing BA improves the quality of the assessed probabilities (conditional log likelihood) whilst maintaining the error rate. Overfitting is more likely to occur in domains where the number of data items is small and the number of variables is large. These two conditions are met in the realm of bioinformatics, where the early diagnosis of cancer from mass spectra is a relevant task. We provide an application of our classification framework to that problem, comparing it with the standard maximum likelihood alternative, where the improvement of quality in the assessed probabilities is confirmed.
[ { "version": "v1", "created": "Wed, 28 Aug 2013 15:14:47 GMT" } ]
2013-08-29T00:00:00
[ [ "Bellon", "Victor", "" ], [ "Cerquides", "Jesus", "" ], [ "Grosse", "Ivo", "" ] ]
TITLE: Bayesian Conditional Gaussian Network Classifiers with Applications to Mass Spectra Classification ABSTRACT: Classifiers based on probabilistic graphical models are very effective. In continuous domains, maximum likelihood is usually used to assess the predictions of those classifiers. When data is scarce, this can easily lead to overfitting. In any probabilistic setting, Bayesian averaging (BA) provides theoretically optimal predictions and is known to be robust to overfitting. In this work we introduce Bayesian Conditional Gaussian Network Classifiers, which efficiently perform exact Bayesian averaging over the parameters. We evaluate the proposed classifiers against the maximum likelihood alternatives proposed so far over standard UCI datasets, concluding that performing BA improves the quality of the assessed probabilities (conditional log likelihood) whilst maintaining the error rate. Overfitting is more likely to occur in domains where the number of data items is small and the number of variables is large. These two conditions are met in the realm of bioinformatics, where the early diagnosis of cancer from mass spectra is a relevant task. We provide an application of our classification framework to that problem, comparing it with the standard maximum likelihood alternative, where the improvement of quality in the assessed probabilities is confirmed.