id
large_stringlengths 9
16
| submitter
large_stringlengths 3
64
⌀ | authors
large_stringlengths 5
20.2k
| title
large_stringlengths 5
245
| comments
large_stringlengths 1
482
⌀ | journal-ref
large_stringlengths 4
382
⌀ | doi
large_stringlengths 9
151
⌀ | report-no
large_stringlengths 2
509
⌀ | categories
large_stringlengths 5
78
| license
large_stringclasses 9
values | abstract
large_stringlengths 83
3.55k
| versions
large listlengths 1
21
| update_date
timestamp[ms]date 2007-05-23 00:00:00
2025-05-30 00:00:00
| authors_parsed
large listlengths 1
1.35k
| prompt
large_stringlengths 166
3.64k
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1310.3353 | Gunnar W. Klau | Thomas Bellitto and Tobias Marschall and Alexander Sch\"onhuth and
Gunnar W. Klau | Next Generation Cluster Editing | null | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This work aims at improving the quality of structural variant prediction from
the mapped reads of a sequenced genome. We suggest a new model based on cluster
editing in weighted graphs and introduce a new heuristic algorithm that allows
to solve this problem quickly and with a good approximation on the huge graphs
that arise from biological datasets.
| [
{
"version": "v1",
"created": "Sat, 12 Oct 2013 09:34:30 GMT"
}
] | 2013-10-15T00:00:00 | [
[
"Bellitto",
"Thomas",
""
],
[
"Marschall",
"Tobias",
""
],
[
"Schönhuth",
"Alexander",
""
],
[
"Klau",
"Gunnar W.",
""
]
] | TITLE: Next Generation Cluster Editing
ABSTRACT: This work aims at improving the quality of structural variant prediction from
the mapped reads of a sequenced genome. We suggest a new model based on cluster
editing in weighted graphs and introduce a new heuristic algorithm that allows
to solve this problem quickly and with a good approximation on the huge graphs
that arise from biological datasets.
|
1310.3498 | Dirk Helbing | Dirk Helbing | New Ways to Promote Sustainability and Social Well-Being in a Complex,
Strongly Interdependent World: The FuturICT Approach | For related work see http://www.soms.ethz.ch and
http://www.futurict.eu | This is the Epilogue of the Booklet by P. Ball, Why Society is a
Complex Matter (Springer, Berlin, 2012), pp. 55-60 | null | null | cs.CY physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | FuturICT is one of six proposals currently being considered for support
within the European Commission's Flagship Initiative (see Box 1). The vision of
the FuturICT project is to develop new science and new information and
communication systems that will promote social self-organization,
self-regulation, well-being, sustainability, and resilience. One of the main
aims of the approach is to increase individual opportunities for social,
economic and political participation, combined with the creation of collective
awareness of the impact that human actions have on our world. This requires us
to mine large datasets ("Big Data") and to develop new methods and tools: a
Planetary Nervous System (PNS) to answer "What is (the state of the world)..."
questions, a Living Earth Simulator (LES) to study "What ... if ..." scenarios,
and a Global Participatory Platform (GPP) for social exploration and
interaction.
| [
{
"version": "v1",
"created": "Sun, 13 Oct 2013 18:03:36 GMT"
}
] | 2013-10-15T00:00:00 | [
[
"Helbing",
"Dirk",
""
]
] | TITLE: New Ways to Promote Sustainability and Social Well-Being in a Complex,
Strongly Interdependent World: The FuturICT Approach
ABSTRACT: FuturICT is one of six proposals currently being considered for support
within the European Commission's Flagship Initiative (see Box 1). The vision of
the FuturICT project is to develop new science and new information and
communication systems that will promote social self-organization,
self-regulation, well-being, sustainability, and resilience. One of the main
aims of the approach is to increase individual opportunities for social,
economic and political participation, combined with the creation of collective
awareness of the impact that human actions have on our world. This requires us
to mine large datasets ("Big Data") and to develop new methods and tools: a
Planetary Nervous System (PNS) to answer "What is (the state of the world)..."
questions, a Living Earth Simulator (LES) to study "What ... if ..." scenarios,
and a Global Participatory Platform (GPP) for social exploration and
interaction.
|
1310.3805 | Chiranjib Sur | Chiranjib Sur, Anupam Shukla | Green Heron Swarm Optimization Algorithm - State-of-the-Art of a New
Nature Inspired Discrete Meta-Heuristics | 20 pages, Pre-print copy, submitted to a peer reviewed journal | null | null | null | cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Many real world problems are NP-Hard problems are a very large part of them
can be represented as graph based problems. This makes graph theory a very
important and prevalent field of study. In this work a new bio-inspired
meta-heuristics called Green Heron Swarm Optimization (GHOSA) Algorithm is
being introduced which is inspired by the fishing skills of the bird. The
algorithm basically suited for graph based problems like combinatorial
optimization etc. However introduction of an adaptive mathematical variation
operator called Location Based Neighbour Influenced Variation (LBNIV) makes it
suitable for high dimensional continuous domain problems. The new algorithm is
being operated on the traditional benchmark equations and the results are
compared with Genetic Algorithm and Particle Swarm Optimization. The algorithm
is also operated on Travelling Salesman Problem, Quadratic Assignment Problem,
Knapsack Problem dataset. The procedure to operate the algorithm on the
Resource Constraint Shortest Path and road network optimization is also
discussed. The results clearly demarcates the GHOSA algorithm as an efficient
algorithm specially considering that the number of algorithms for the discrete
optimization is very low and robust and more explorative algorithm is required
in this age of social networking and mostly graph based problem scenarios.
| [
{
"version": "v1",
"created": "Mon, 14 Oct 2013 19:42:26 GMT"
}
] | 2013-10-15T00:00:00 | [
[
"Sur",
"Chiranjib",
""
],
[
"Shukla",
"Anupam",
""
]
] | TITLE: Green Heron Swarm Optimization Algorithm - State-of-the-Art of a New
Nature Inspired Discrete Meta-Heuristics
ABSTRACT: Many real world problems are NP-Hard problems are a very large part of them
can be represented as graph based problems. This makes graph theory a very
important and prevalent field of study. In this work a new bio-inspired
meta-heuristics called Green Heron Swarm Optimization (GHOSA) Algorithm is
being introduced which is inspired by the fishing skills of the bird. The
algorithm basically suited for graph based problems like combinatorial
optimization etc. However introduction of an adaptive mathematical variation
operator called Location Based Neighbour Influenced Variation (LBNIV) makes it
suitable for high dimensional continuous domain problems. The new algorithm is
being operated on the traditional benchmark equations and the results are
compared with Genetic Algorithm and Particle Swarm Optimization. The algorithm
is also operated on Travelling Salesman Problem, Quadratic Assignment Problem,
Knapsack Problem dataset. The procedure to operate the algorithm on the
Resource Constraint Shortest Path and road network optimization is also
discussed. The results clearly demarcates the GHOSA algorithm as an efficient
algorithm specially considering that the number of algorithms for the discrete
optimization is very low and robust and more explorative algorithm is required
in this age of social networking and mostly graph based problem scenarios.
|
1310.3197 | Yaniv Erlich | Yaniv Erlich and Arvind Narayanan | Routes for breaching and protecting genetic privacy | Draft for comments | null | null | null | q-bio.GN cs.CR stat.AP | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We are entering the era of ubiquitous genetic information for research,
clinical care, and personal curiosity. Sharing these datasets is vital for
rapid progress in understanding the genetic basis of human diseases. However,
one growing concern is the ability to protect the genetic privacy of the data
originators. Here, we technically map threats to genetic privacy and discuss
potential mitigation strategies for privacy-preserving dissemination of genetic
data.
| [
{
"version": "v1",
"created": "Fri, 11 Oct 2013 17:02:54 GMT"
}
] | 2013-10-14T00:00:00 | [
[
"Erlich",
"Yaniv",
""
],
[
"Narayanan",
"Arvind",
""
]
] | TITLE: Routes for breaching and protecting genetic privacy
ABSTRACT: We are entering the era of ubiquitous genetic information for research,
clinical care, and personal curiosity. Sharing these datasets is vital for
rapid progress in understanding the genetic basis of human diseases. However,
one growing concern is the ability to protect the genetic privacy of the data
originators. Here, we technically map threats to genetic privacy and discuss
potential mitigation strategies for privacy-preserving dissemination of genetic
data.
|
1310.3233 | ANqi Qiu DR | Jia Du, Alvina Goh, Anqi Qiu | Bayesian Estimation of White Matter Atlas from High Angular Resolution
Diffusion Imaging | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present a Bayesian probabilistic model to estimate the brain white matter
atlas from high angular resolution diffusion imaging (HARDI) data. This model
incorporates a shape prior of the white matter anatomy and the likelihood of
individual observed HARDI datasets. We first assume that the atlas is generated
from a known hyperatlas through a flow of diffeomorphisms and its shape prior
can be constructed based on the framework of large deformation diffeomorphic
metric mapping (LDDMM). LDDMM characterizes a nonlinear diffeomorphic shape
space in a linear space of initial momentum uniquely determining diffeomorphic
geodesic flows from the hyperatlas. Therefore, the shape prior of the HARDI
atlas can be modeled using a centered Gaussian random field (GRF) model of the
initial momentum. In order to construct the likelihood of observed HARDI
datasets, it is necessary to study the diffeomorphic transformation of
individual observations relative to the atlas and the probabilistic
distribution of orientation distribution functions (ODFs). To this end, we
construct the likelihood related to the transformation using the same
construction as discussed for the shape prior of the atlas. The probabilistic
distribution of ODFs is then constructed based on the ODF Riemannian manifold.
We assume that the observed ODFs are generated by an exponential map of random
tangent vectors at the deformed atlas ODF. Hence, the likelihood of the ODFs
can be modeled using a GRF of their tangent vectors in the ODF Riemannian
manifold. We solve for the maximum a posteriori using the
Expectation-Maximization algorithm and derive the corresponding update
equations. Finally, we illustrate the HARDI atlas constructed based on a
Chinese aging cohort of 94 adults and compare it with that generated by
averaging the coefficients of spherical harmonics of the ODF across subjects.
| [
{
"version": "v1",
"created": "Thu, 10 Oct 2013 00:32:01 GMT"
}
] | 2013-10-14T00:00:00 | [
[
"Du",
"Jia",
""
],
[
"Goh",
"Alvina",
""
],
[
"Qiu",
"Anqi",
""
]
] | TITLE: Bayesian Estimation of White Matter Atlas from High Angular Resolution
Diffusion Imaging
ABSTRACT: We present a Bayesian probabilistic model to estimate the brain white matter
atlas from high angular resolution diffusion imaging (HARDI) data. This model
incorporates a shape prior of the white matter anatomy and the likelihood of
individual observed HARDI datasets. We first assume that the atlas is generated
from a known hyperatlas through a flow of diffeomorphisms and its shape prior
can be constructed based on the framework of large deformation diffeomorphic
metric mapping (LDDMM). LDDMM characterizes a nonlinear diffeomorphic shape
space in a linear space of initial momentum uniquely determining diffeomorphic
geodesic flows from the hyperatlas. Therefore, the shape prior of the HARDI
atlas can be modeled using a centered Gaussian random field (GRF) model of the
initial momentum. In order to construct the likelihood of observed HARDI
datasets, it is necessary to study the diffeomorphic transformation of
individual observations relative to the atlas and the probabilistic
distribution of orientation distribution functions (ODFs). To this end, we
construct the likelihood related to the transformation using the same
construction as discussed for the shape prior of the atlas. The probabilistic
distribution of ODFs is then constructed based on the ODF Riemannian manifold.
We assume that the observed ODFs are generated by an exponential map of random
tangent vectors at the deformed atlas ODF. Hence, the likelihood of the ODFs
can be modeled using a GRF of their tangent vectors in the ODF Riemannian
manifold. We solve for the maximum a posteriori using the
Expectation-Maximization algorithm and derive the corresponding update
equations. Finally, we illustrate the HARDI atlas constructed based on a
Chinese aging cohort of 94 adults and compare it with that generated by
averaging the coefficients of spherical harmonics of the ODF across subjects.
|
1310.2646 | Akshay Gadde | Sunil K. Narang, Akshay Gadde, Eduard Sanou and Antonio Ortega | Localized Iterative Methods for Interpolation in Graph Structured Data | null | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we present two localized graph filtering based methods for
interpolating graph signals defined on the vertices of arbitrary graphs from
only a partial set of samples. The first method is an extension of previous
work on reconstructing bandlimited graph signals from partially observed
samples. The iterative graph filtering approach very closely approximates the
solution proposed in the that work, while being computationally more efficient.
As an alternative, we propose a regularization based framework in which we
define the cost of reconstruction to be a combination of smoothness of the
graph signal and the reconstruction error with respect to the known samples,
and find solutions that minimize this cost. We provide both a closed form
solution and a computationally efficient iterative solution of the optimization
problem. The experimental results on the recommendation system datasets
demonstrate effectiveness of the proposed methods.
| [
{
"version": "v1",
"created": "Wed, 9 Oct 2013 22:24:28 GMT"
}
] | 2013-10-11T00:00:00 | [
[
"Narang",
"Sunil K.",
""
],
[
"Gadde",
"Akshay",
""
],
[
"Sanou",
"Eduard",
""
],
[
"Ortega",
"Antonio",
""
]
] | TITLE: Localized Iterative Methods for Interpolation in Graph Structured Data
ABSTRACT: In this paper, we present two localized graph filtering based methods for
interpolating graph signals defined on the vertices of arbitrary graphs from
only a partial set of samples. The first method is an extension of previous
work on reconstructing bandlimited graph signals from partially observed
samples. The iterative graph filtering approach very closely approximates the
solution proposed in the that work, while being computationally more efficient.
As an alternative, we propose a regularization based framework in which we
define the cost of reconstruction to be a combination of smoothness of the
graph signal and the reconstruction error with respect to the known samples,
and find solutions that minimize this cost. We provide both a closed form
solution and a computationally efficient iterative solution of the optimization
problem. The experimental results on the recommendation system datasets
demonstrate effectiveness of the proposed methods.
|
1310.2814 | Suyash Gupta | Suyash Gupta, V. Krishna Nandivada | IMSuite: A Benchmark Suite for Simulating Distributed Algorithms | null | null | null | null | cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Considering the diverse nature of real-world distributed applications that
makes it hard to identify a representative subset of distributed benchmarks, we
focus on their underlying distributed algorithms. We present and characterize a
new kernel benchmark suite (named IMSuite) that simulates some of the classical
distributed algorithms in task parallel languages. We present multiple
variations of our kernels, broadly categorized under two heads: (a) varying
synchronization primitives (with and without fine grain synchronization
primitives); and (b) varying forms of parallelization (data parallel and
recursive task parallel). Our characterization covers interesting aspects of
distributed applications such as distribution of remote communication requests,
number of synchronization, task creation, task termination and atomic
operations. We study the behavior (execution time) of our kernels by varying
the problem size, the number of compute threads, and the input configurations.
We also present an involved set of input generators and output validators.
| [
{
"version": "v1",
"created": "Thu, 10 Oct 2013 13:40:51 GMT"
}
] | 2013-10-11T00:00:00 | [
[
"Gupta",
"Suyash",
""
],
[
"Nandivada",
"V. Krishna",
""
]
] | TITLE: IMSuite: A Benchmark Suite for Simulating Distributed Algorithms
ABSTRACT: Considering the diverse nature of real-world distributed applications that
makes it hard to identify a representative subset of distributed benchmarks, we
focus on their underlying distributed algorithms. We present and characterize a
new kernel benchmark suite (named IMSuite) that simulates some of the classical
distributed algorithms in task parallel languages. We present multiple
variations of our kernels, broadly categorized under two heads: (a) varying
synchronization primitives (with and without fine grain synchronization
primitives); and (b) varying forms of parallelization (data parallel and
recursive task parallel). Our characterization covers interesting aspects of
distributed applications such as distribution of remote communication requests,
number of synchronization, task creation, task termination and atomic
operations. We study the behavior (execution time) of our kernels by varying
the problem size, the number of compute threads, and the input configurations.
We also present an involved set of input generators and output validators.
|
1310.2332 | Heliang Huang | Heliang Huang, Wansu Bao | Middle-Solving F4 to Compute Grobner bases for Cryptanalysis over GF(2) | null | null | null | null | cs.SC cs.CR cs.NI math.AC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Algebraic cryptanalysis usually requires to recover the secret key by solving
polynomial equations. Faugere's F4 is a well-known Grobner bases algorithm to
solve this problem. However, a serious drawback exists in the Grobner bases
based algebraic attacks, namely, any information won't be got if we couldn't
work out the Grobner bases of the polynomial equations system. In this paper,
we in-depth research the F4 algorithm over GF(2). By using S-polynomials to
replace critical pairs and computing the normal form of the productions with
respect to the field equations in certain steps, many "redundant" reductors are
avoided during the computation process of the F4 algorithm. By slightly
modifying the logic of F4 algorithm, we solve the univariate polynomials
appeared in the algorithm and then back-substitute the values of the solved
variables at each iteration of the algorithm. We call our improvements
Middle-Solving F4. The heuristic strategy of Middle-Solving overcomes the
drawback of algebraic attacks and well suits algebraic attacks. It has never
been applied to the Grobner bases algorithm before. Experiments to some Hidden
Field Equation instances and some classical benchmarks (Cyclic 6, Gonnet83)
show that Middle-Solving F4 is faster and uses less memory than Faugere's F4.
| [
{
"version": "v1",
"created": "Wed, 9 Oct 2013 03:14:27 GMT"
}
] | 2013-10-10T00:00:00 | [
[
"Huang",
"Heliang",
""
],
[
"Bao",
"Wansu",
""
]
] | TITLE: Middle-Solving F4 to Compute Grobner bases for Cryptanalysis over GF(2)
ABSTRACT: Algebraic cryptanalysis usually requires to recover the secret key by solving
polynomial equations. Faugere's F4 is a well-known Grobner bases algorithm to
solve this problem. However, a serious drawback exists in the Grobner bases
based algebraic attacks, namely, any information won't be got if we couldn't
work out the Grobner bases of the polynomial equations system. In this paper,
we in-depth research the F4 algorithm over GF(2). By using S-polynomials to
replace critical pairs and computing the normal form of the productions with
respect to the field equations in certain steps, many "redundant" reductors are
avoided during the computation process of the F4 algorithm. By slightly
modifying the logic of F4 algorithm, we solve the univariate polynomials
appeared in the algorithm and then back-substitute the values of the solved
variables at each iteration of the algorithm. We call our improvements
Middle-Solving F4. The heuristic strategy of Middle-Solving overcomes the
drawback of algebraic attacks and well suits algebraic attacks. It has never
been applied to the Grobner bases algorithm before. Experiments to some Hidden
Field Equation instances and some classical benchmarks (Cyclic 6, Gonnet83)
show that Middle-Solving F4 is faster and uses less memory than Faugere's F4.
|
1310.2409 | Ning Chen | Ning Chen, Jun Zhu, Fei Xia, Bo Zhang | Discriminative Relational Topic Models | null | null | null | null | cs.LG cs.IR stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Many scientific and engineering fields involve analyzing network data. For
document networks, relational topic models (RTMs) provide a probabilistic
generative process to describe both the link structure and document contents,
and they have shown promise on predicting network structures and discovering
latent topic representations. However, existing RTMs have limitations in both
the restricted model expressiveness and incapability of dealing with imbalanced
network data. To expand the scope and improve the inference accuracy of RTMs,
this paper presents three extensions: 1) unlike the common link likelihood with
a diagonal weight matrix that allows the-same-topic interactions only, we
generalize it to use a full weight matrix that captures all pairwise topic
interactions and is applicable to asymmetric networks; 2) instead of doing
standard Bayesian inference, we perform regularized Bayesian inference
(RegBayes) with a regularization parameter to deal with the imbalanced link
structure issue in common real networks and improve the discriminative ability
of learned latent representations; and 3) instead of doing variational
approximation with strict mean-field assumptions, we present collapsed Gibbs
sampling algorithms for the generalized relational topic models by exploring
data augmentation without making restricting assumptions. Under the generic
RegBayes framework, we carefully investigate two popular discriminative loss
functions, namely, the logistic log-loss and the max-margin hinge loss.
Experimental results on several real network datasets demonstrate the
significance of these extensions on improving the prediction performance, and
the time efficiency can be dramatically improved with a simple fast
approximation method.
| [
{
"version": "v1",
"created": "Wed, 9 Oct 2013 09:32:56 GMT"
}
] | 2013-10-10T00:00:00 | [
[
"Chen",
"Ning",
""
],
[
"Zhu",
"Jun",
""
],
[
"Xia",
"Fei",
""
],
[
"Zhang",
"Bo",
""
]
] | TITLE: Discriminative Relational Topic Models
ABSTRACT: Many scientific and engineering fields involve analyzing network data. For
document networks, relational topic models (RTMs) provide a probabilistic
generative process to describe both the link structure and document contents,
and they have shown promise on predicting network structures and discovering
latent topic representations. However, existing RTMs have limitations in both
the restricted model expressiveness and incapability of dealing with imbalanced
network data. To expand the scope and improve the inference accuracy of RTMs,
this paper presents three extensions: 1) unlike the common link likelihood with
a diagonal weight matrix that allows the-same-topic interactions only, we
generalize it to use a full weight matrix that captures all pairwise topic
interactions and is applicable to asymmetric networks; 2) instead of doing
standard Bayesian inference, we perform regularized Bayesian inference
(RegBayes) with a regularization parameter to deal with the imbalanced link
structure issue in common real networks and improve the discriminative ability
of learned latent representations; and 3) instead of doing variational
approximation with strict mean-field assumptions, we present collapsed Gibbs
sampling algorithms for the generalized relational topic models by exploring
data augmentation without making restricting assumptions. Under the generic
RegBayes framework, we carefully investigate two popular discriminative loss
functions, namely, the logistic log-loss and the max-margin hinge loss.
Experimental results on several real network datasets demonstrate the
significance of these extensions on improving the prediction performance, and
the time efficiency can be dramatically improved with a simple fast
approximation method.
|
1310.2441 | Bartlomiej Blaszczyszyn | Kumar Gaurav (INRIA Paris-Rocquencourt, UPMC), Bartlomiej Blaszczyszyn
(INRIA Paris-Rocquencourt), Holger Paul Keeler (INRIA Paris-Rocquencourt) | Pioneers of Influence Propagation in Social Networks | null | null | null | null | cs.SI cs.DM physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | With the growing importance of corporate viral marketing campaigns on online
social networks, the interest in studies of influence propagation through
networks is higher than ever. In a viral marketing campaign, a firm initially
targets a small set of pioneers and hopes that they would influence a sizeable
fraction of the population by diffusion of influence through the network. In
general, any marketing campaign might fail to go viral in the first try. As
such, it would be useful to have some guide to evaluate the effectiveness of
the campaign and judge whether it is worthy of further resources, and in case
the campaign has potential, how to hit upon a good pioneer who can make the
campaign go viral. In this paper, we present a diffusion model developed by
enriching the generalized random graph (a.k.a. configuration model) to provide
insight into these questions. We offer the intuition behind the results on this
model, rigorously proved in Blaszczyszyn & Gaurav(2013), and illustrate them
here by taking examples of random networks having prototypical degree
distributions - Poisson degree distribution, which is commonly used as a kind
of benchmark, and Power Law degree distribution, which is normally used to
approximate the real-world networks. On these networks, the members are assumed
to have varying attitudes towards propagating the information. We analyze three
cases, in particular - (1) Bernoulli transmissions, when a member influences
each of its friend with probability p; (2) Node percolation, when a member
influences all its friends with probability p and none with probability 1-p;
(3) Coupon-collector transmissions, when a member randomly selects one of his
friends K times with replacement. We assume that the configuration model is the
closest approximation of a large online social network, when the information
available about the network is very limited. The key insight offered by this
study from a firm's perspective is regarding how to evaluate the effectiveness
of a marketing campaign and do cost-benefit analysis by collecting relevant
statistical data from the pioneers it selects. The campaign evaluation
criterion is informed by the observation that if the parameters of the
underlying network and the campaign effectiveness are such that the campaign
can indeed reach a significant fraction of the population, then the set of good
pioneers also forms a significant fraction of the population. Therefore, in
such a case, the firms can even adopt the naive strategy of repeatedly picking
and targeting some number of pioneers at random from the population. With this
strategy, the probability of them picking a good pioneer will increase
geometrically fast with the number of tries.
| [
{
"version": "v1",
"created": "Wed, 9 Oct 2013 11:43:52 GMT"
}
] | 2013-10-10T00:00:00 | [
[
"Gaurav",
"Kumar",
"",
"INRIA Paris-Rocquencourt, UPMC"
],
[
"Blaszczyszyn",
"Bartlomiej",
"",
"INRIA Paris-Rocquencourt"
],
[
"Keeler",
"Holger Paul",
"",
"INRIA Paris-Rocquencourt"
]
] | TITLE: Pioneers of Influence Propagation in Social Networks
ABSTRACT: With the growing importance of corporate viral marketing campaigns on online
social networks, the interest in studies of influence propagation through
networks is higher than ever. In a viral marketing campaign, a firm initially
targets a small set of pioneers and hopes that they would influence a sizeable
fraction of the population by diffusion of influence through the network. In
general, any marketing campaign might fail to go viral in the first try. As
such, it would be useful to have some guide to evaluate the effectiveness of
the campaign and judge whether it is worthy of further resources, and in case
the campaign has potential, how to hit upon a good pioneer who can make the
campaign go viral. In this paper, we present a diffusion model developed by
enriching the generalized random graph (a.k.a. configuration model) to provide
insight into these questions. We offer the intuition behind the results on this
model, rigorously proved in Blaszczyszyn & Gaurav(2013), and illustrate them
here by taking examples of random networks having prototypical degree
distributions - Poisson degree distribution, which is commonly used as a kind
of benchmark, and Power Law degree distribution, which is normally used to
approximate the real-world networks. On these networks, the members are assumed
to have varying attitudes towards propagating the information. We analyze three
cases, in particular - (1) Bernoulli transmissions, when a member influences
each of its friend with probability p; (2) Node percolation, when a member
influences all its friends with probability p and none with probability 1-p;
(3) Coupon-collector transmissions, when a member randomly selects one of his
friends K times with replacement. We assume that the configuration model is the
closest approximation of a large online social network, when the information
available about the network is very limited. The key insight offered by this
study from a firm's perspective is regarding how to evaluate the effectiveness
of a marketing campaign and do cost-benefit analysis by collecting relevant
statistical data from the pioneers it selects. The campaign evaluation
criterion is informed by the observation that if the parameters of the
underlying network and the campaign effectiveness are such that the campaign
can indeed reach a significant fraction of the population, then the set of good
pioneers also forms a significant fraction of the population. Therefore, in
such a case, the firms can even adopt the naive strategy of repeatedly picking
and targeting some number of pioneers at random from the population. With this
strategy, the probability of them picking a good pioneer will increase
geometrically fast with the number of tries.
|
1310.2053 | Kai Berger | Kai Berger | The role of RGB-D benchmark datasets: an overview | 6 pages | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The advent of the Microsoft Kinect three years ago stimulated not only the
computer vision community for new algorithms and setups to tackle well-known
problems in the community but also sparked the launch of several new benchmark
datasets to which future algorithms can be compared 019 to. This review of the
literature and industry developments concludes that the current RGB-D benchmark
datasets can be useful to determine the accuracy of a variety of applications
of a single or multiple RGB-D sensors.
| [
{
"version": "v1",
"created": "Tue, 8 Oct 2013 09:16:56 GMT"
}
] | 2013-10-09T00:00:00 | [
[
"Berger",
"Kai",
""
]
] | TITLE: The role of RGB-D benchmark datasets: an overview
ABSTRACT: The advent of the Microsoft Kinect three years ago stimulated not only the
computer vision community for new algorithms and setups to tackle well-known
problems in the community but also sparked the launch of several new benchmark
datasets to which future algorithms can be compared 019 to. This review of the
literature and industry developments concludes that the current RGB-D benchmark
datasets can be useful to determine the accuracy of a variety of applications
of a single or multiple RGB-D sensors.
|
1303.3901 | Pekka Malo | Ankur Sinha, Pekka Malo and Kalyanmoy Deb | Efficient Evolutionary Algorithm for Single-Objective Bilevel
Optimization | null | null | null | null | cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Bilevel optimization problems are a class of challenging optimization
problems, which contain two levels of optimization tasks. In these problems,
the optimal solutions to the lower level problem become possible feasible
candidates to the upper level problem. Such a requirement makes the
optimization problem difficult to solve, and has kept the researchers busy
towards devising methodologies, which can efficiently handle the problem.
Despite the efforts, there hardly exists any effective methodology, which is
capable of handling a complex bilevel problem. In this paper, we introduce
bilevel evolutionary algorithm based on quadratic approximations (BLEAQ) of
optimal lower level variables with respect to the upper level variables. The
approach is capable of handling bilevel problems with different kinds of
complexities in relatively smaller number of function evaluations. Ideas from
classical optimization have been hybridized with evolutionary methods to
generate an efficient optimization algorithm for generic bilevel problems. The
efficacy of the algorithm has been shown on two sets of test problems. The
first set is a recently proposed SMD test set, which contains problems with
controllable complexities, and the second set contains standard test problems
collected from the literature. The proposed method has been evaluated against
two benchmarks, and the performance gain is observed to be significant.
| [
{
"version": "v1",
"created": "Fri, 15 Mar 2013 20:30:57 GMT"
},
{
"version": "v2",
"created": "Mon, 7 Oct 2013 01:07:57 GMT"
}
] | 2013-10-08T00:00:00 | [
[
"Sinha",
"Ankur",
""
],
[
"Malo",
"Pekka",
""
],
[
"Deb",
"Kalyanmoy",
""
]
] | TITLE: Efficient Evolutionary Algorithm for Single-Objective Bilevel
Optimization
ABSTRACT: Bilevel optimization problems are a class of challenging optimization
problems, which contain two levels of optimization tasks. In these problems,
the optimal solutions to the lower level problem become possible feasible
candidates to the upper level problem. Such a requirement makes the
optimization problem difficult to solve, and has kept the researchers busy
towards devising methodologies, which can efficiently handle the problem.
Despite the efforts, there hardly exists any effective methodology, which is
capable of handling a complex bilevel problem. In this paper, we introduce
bilevel evolutionary algorithm based on quadratic approximations (BLEAQ) of
optimal lower level variables with respect to the upper level variables. The
approach is capable of handling bilevel problems with different kinds of
complexities in relatively smaller number of function evaluations. Ideas from
classical optimization have been hybridized with evolutionary methods to
generate an efficient optimization algorithm for generic bilevel problems. The
efficacy of the algorithm has been shown on two sets of test problems. The
first set is a recently proposed SMD test set, which contains problems with
controllable complexities, and the second set contains standard test problems
collected from the literature. The proposed method has been evaluated against
two benchmarks, and the performance gain is observed to be significant.
|
1310.1485 | Markus Rampp | Tilman Dannert and Andreas Marek and Markus Rampp | Porting Large HPC Applications to GPU Clusters: The Codes GENE and
VERTEX | 10 pages, accepted for publication in ParCo 2013 | null | null | null | physics.comp-ph astro-ph.SR cs.DC physics.plasm-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We have developed GPU versions for two major high-performance-computing (HPC)
applications originating from two different scientific domains. GENE is a
plasma microturbulence code which is employed for simulations of nuclear fusion
plasmas. VERTEX is a neutrino-radiation hydrodynamics code for "first
principles"-simulations of core-collapse supernova explosions. The codes are
considered state of the art in their respective scientific domains, both
concerning their scientific scope and functionality as well as the achievable
compute performance, in particular parallel scalability on all relevant HPC
platforms. GENE and VERTEX were ported by us to HPC cluster architectures with
two NVidia Kepler GPUs mounted in each node in addition to two Intel Xeon CPUs
of the Sandy Bridge family. On such platforms we achieve up to twofold gains in
the overall application performance in the sense of a reduction of the time to
solution for a given setup with respect to a pure CPU cluster. The paper
describes our basic porting strategies and benchmarking methodology, and
details the main algorithmic and technical challenges we faced on the new,
heterogeneous architecture.
| [
{
"version": "v1",
"created": "Sat, 5 Oct 2013 15:12:58 GMT"
}
] | 2013-10-08T00:00:00 | [
[
"Dannert",
"Tilman",
""
],
[
"Marek",
"Andreas",
""
],
[
"Rampp",
"Markus",
""
]
] | TITLE: Porting Large HPC Applications to GPU Clusters: The Codes GENE and
VERTEX
ABSTRACT: We have developed GPU versions for two major high-performance-computing (HPC)
applications originating from two different scientific domains. GENE is a
plasma microturbulence code which is employed for simulations of nuclear fusion
plasmas. VERTEX is a neutrino-radiation hydrodynamics code for "first
principles"-simulations of core-collapse supernova explosions. The codes are
considered state of the art in their respective scientific domains, both
concerning their scientific scope and functionality as well as the achievable
compute performance, in particular parallel scalability on all relevant HPC
platforms. GENE and VERTEX were ported by us to HPC cluster architectures with
two NVidia Kepler GPUs mounted in each node in addition to two Intel Xeon CPUs
of the Sandy Bridge family. On such platforms we achieve up to twofold gains in
the overall application performance in the sense of a reduction of the time to
solution for a given setup with respect to a pure CPU cluster. The paper
describes our basic porting strategies and benchmarking methodology, and
details the main algorithmic and technical challenges we faced on the new,
heterogeneous architecture.
|
1310.1498 | Nikolas Landia | Nikolas Landia, Stephan Doerfel, Robert J\"aschke, Sarabjot Singh
Anand, Andreas Hotho and Nathan Griffiths | Deeper Into the Folksonomy Graph: FolkRank Adaptations and Extensions
for Improved Tag Recommendations | null | null | null | null | cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The information contained in social tagging systems is often modelled as a
graph of connections between users, items and tags. Recommendation algorithms
such as FolkRank, have the potential to leverage complex relationships in the
data, corresponding to multiple hops in the graph. We present an in-depth
analysis and evaluation of graph models for social tagging data and propose
novel adaptations and extensions of FolkRank to improve tag recommendations. We
highlight implicit assumptions made by the widely used folksonomy model, and
propose an alternative and more accurate graph-representation of the data. Our
extensions of FolkRank address the new item problem by incorporating content
data into the algorithm, and significantly improve prediction results on
unpruned datasets. Our adaptations address issues in the iterative weight
spreading calculation that potentially hinder FolkRank's ability to leverage
the deep graph as an information source. Moreover, we evaluate the benefit of
considering each deeper level of the graph, and present important insights
regarding the characteristics of social tagging data in general. Our results
suggest that the base assumption made by conventional weight propagation
methods, that closeness in the graph always implies a positive relationship,
does not hold for the social tagging domain.
| [
{
"version": "v1",
"created": "Sat, 5 Oct 2013 17:27:42 GMT"
}
] | 2013-10-08T00:00:00 | [
[
"Landia",
"Nikolas",
""
],
[
"Doerfel",
"Stephan",
""
],
[
"Jäschke",
"Robert",
""
],
[
"Anand",
"Sarabjot Singh",
""
],
[
"Hotho",
"Andreas",
""
],
[
"Griffiths",
"Nathan",
""
]
] | TITLE: Deeper Into the Folksonomy Graph: FolkRank Adaptations and Extensions
for Improved Tag Recommendations
ABSTRACT: The information contained in social tagging systems is often modelled as a
graph of connections between users, items and tags. Recommendation algorithms
such as FolkRank, have the potential to leverage complex relationships in the
data, corresponding to multiple hops in the graph. We present an in-depth
analysis and evaluation of graph models for social tagging data and propose
novel adaptations and extensions of FolkRank to improve tag recommendations. We
highlight implicit assumptions made by the widely used folksonomy model, and
propose an alternative and more accurate graph-representation of the data. Our
extensions of FolkRank address the new item problem by incorporating content
data into the algorithm, and significantly improve prediction results on
unpruned datasets. Our adaptations address issues in the iterative weight
spreading calculation that potentially hinder FolkRank's ability to leverage
the deep graph as an information source. Moreover, we evaluate the benefit of
considering each deeper level of the graph, and present important insights
regarding the characteristics of social tagging data in general. Our results
suggest that the base assumption made by conventional weight propagation
methods, that closeness in the graph always implies a positive relationship,
does not hold for the social tagging domain.
|
1310.1545 | Xuhui Fan | Xuhui Fan, Richard Yi Da Xu, Longbing Cao, Yin Song | Learning Hidden Structures with Relational Models by Adequately
Involving Rich Information in A Network | null | null | null | null | cs.LG cs.SI stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Effectively modelling hidden structures in a network is very practical but
theoretically challenging. Existing relational models only involve very limited
information, namely the binary directional link data, embedded in a network to
learn hidden networking structures. There is other rich and meaningful
information (e.g., various attributes of entities and more granular information
than binary elements such as "like" or "dislike") missed, which play a critical
role in forming and understanding relations in a network. In this work, we
propose an informative relational model (InfRM) framework to adequately involve
rich information and its granularity in a network, including metadata
information about each entity and various forms of link data. Firstly, an
effective metadata information incorporation method is employed on the prior
information from relational models MMSB and LFRM. This is to encourage the
entities with similar metadata information to have similar hidden structures.
Secondly, we propose various solutions to cater for alternative forms of link
data. Substantial efforts have been made towards modelling appropriateness and
efficiency, for example, using conjugate priors. We evaluate our framework and
its inference algorithms in different datasets, which shows the generality and
effectiveness of our models in capturing implicit structures in networks.
| [
{
"version": "v1",
"created": "Sun, 6 Oct 2013 05:47:50 GMT"
}
] | 2013-10-08T00:00:00 | [
[
"Fan",
"Xuhui",
""
],
[
"Da Xu",
"Richard Yi",
""
],
[
"Cao",
"Longbing",
""
],
[
"Song",
"Yin",
""
]
] | TITLE: Learning Hidden Structures with Relational Models by Adequately
Involving Rich Information in A Network
ABSTRACT: Effectively modelling hidden structures in a network is very practical but
theoretically challenging. Existing relational models only involve very limited
information, namely the binary directional link data, embedded in a network to
learn hidden networking structures. There is other rich and meaningful
information (e.g., various attributes of entities and more granular information
than binary elements such as "like" or "dislike") missed, which play a critical
role in forming and understanding relations in a network. In this work, we
propose an informative relational model (InfRM) framework to adequately involve
rich information and its granularity in a network, including metadata
information about each entity and various forms of link data. Firstly, an
effective metadata information incorporation method is employed on the prior
information from relational models MMSB and LFRM. This is to encourage the
entities with similar metadata information to have similar hidden structures.
Secondly, we propose various solutions to cater for alternative forms of link
data. Substantial efforts have been made towards modelling appropriateness and
efficiency, for example, using conjugate priors. We evaluate our framework and
its inference algorithms in different datasets, which shows the generality and
effectiveness of our models in capturing implicit structures in networks.
|
1310.1597 | Mengqiu Wang | Mengqiu Wang and Christopher D. Manning | Cross-lingual Pseudo-Projected Expectation Regularization for Weakly
Supervised Learning | null | null | null | null | cs.CL cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider a multilingual weakly supervised learning scenario where
knowledge from annotated corpora in a resource-rich language is transferred via
bitext to guide the learning in other languages. Past approaches project labels
across bitext and use them as features or gold labels for training. We propose
a new method that projects model expectations rather than labels, which
facilities transfer of model uncertainty across language boundaries. We encode
expectations as constraints and train a discriminative CRF model using
Generalized Expectation Criteria (Mann and McCallum, 2010). Evaluated on
standard Chinese-English and German-English NER datasets, our method
demonstrates F1 scores of 64% and 60% when no labeled data is used. Attaining
the same accuracy with supervised CRFs requires 12k and 1.5k labeled sentences.
Furthermore, when combined with labeled examples, our method yields significant
improvements over state-of-the-art supervised methods, achieving best reported
numbers to date on Chinese OntoNotes and German CoNLL-03 datasets.
| [
{
"version": "v1",
"created": "Sun, 6 Oct 2013 16:34:30 GMT"
}
] | 2013-10-08T00:00:00 | [
[
"Wang",
"Mengqiu",
""
],
[
"Manning",
"Christopher D.",
""
]
] | TITLE: Cross-lingual Pseudo-Projected Expectation Regularization for Weakly
Supervised Learning
ABSTRACT: We consider a multilingual weakly supervised learning scenario where
knowledge from annotated corpora in a resource-rich language is transferred via
bitext to guide the learning in other languages. Past approaches project labels
across bitext and use them as features or gold labels for training. We propose
a new method that projects model expectations rather than labels, which
facilities transfer of model uncertainty across language boundaries. We encode
expectations as constraints and train a discriminative CRF model using
Generalized Expectation Criteria (Mann and McCallum, 2010). Evaluated on
standard Chinese-English and German-English NER datasets, our method
demonstrates F1 scores of 64% and 60% when no labeled data is used. Attaining
the same accuracy with supervised CRFs requires 12k and 1.5k labeled sentences.
Furthermore, when combined with labeled examples, our method yields significant
improvements over state-of-the-art supervised methods, achieving best reported
numbers to date on Chinese OntoNotes and German CoNLL-03 datasets.
|
1310.1811 | Ouais Alsharif | Ouais Alsharif and Joelle Pineau | End-to-End Text Recognition with Hybrid HMM Maxout Models | 9 pages, 7 figures | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The problem of detecting and recognizing text in natural scenes has proved to
be more challenging than its counterpart in documents, with most of the
previous work focusing on a single part of the problem. In this work, we
propose new solutions to the character and word recognition problems and then
show how to combine these solutions in an end-to-end text-recognition system.
We do so by leveraging the recently introduced Maxout networks along with
hybrid HMM models that have proven useful for voice recognition. Using these
elements, we build a tunable and highly accurate recognition system that beats
state-of-the-art results on all the sub-problems for both the ICDAR 2003 and
SVT benchmark datasets.
| [
{
"version": "v1",
"created": "Mon, 7 Oct 2013 15:08:53 GMT"
}
] | 2013-10-08T00:00:00 | [
[
"Alsharif",
"Ouais",
""
],
[
"Pineau",
"Joelle",
""
]
] | TITLE: End-to-End Text Recognition with Hybrid HMM Maxout Models
ABSTRACT: The problem of detecting and recognizing text in natural scenes has proved to
be more challenging than its counterpart in documents, with most of the
previous work focusing on a single part of the problem. In this work, we
propose new solutions to the character and word recognition problems and then
show how to combine these solutions in an end-to-end text-recognition system.
We do so by leveraging the recently introduced Maxout networks along with
hybrid HMM models that have proven useful for voice recognition. Using these
elements, we build a tunable and highly accurate recognition system that beats
state-of-the-art results on all the sub-problems for both the ICDAR 2003 and
SVT benchmark datasets.
|
1304.0786 | Sameet Sreenivasan | Sameet Sreenivasan | Quantitative analysis of the evolution of novelty in cinema through
crowdsourced keywords | 23 pages, 12 figures (including supplementary material) | Scientific Reports 3, Article number: 2758 (2013) | 10.1038/srep02758 | null | physics.soc-ph cs.CY | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The generation of novelty is central to any creative endeavor. Novelty
generation and the relationship between novelty and individual hedonic value
have long been subjects of study in social psychology. However, few studies
have utilized large-scale datasets to quantitatively investigate these issues.
Here we consider the domain of American cinema and explore these questions
using a database of films spanning a 70 year period. We use crowdsourced
keywords from the Internet Movie Database as a window into the contents of
films, and prescribe novelty scores for each film based on occurrence
probabilities of individual keywords and keyword-pairs. These scores provide
revealing insights into the dynamics of novelty in cinema. We investigate how
novelty influences the revenue generated by a film, and find a relationship
that resembles the Wundt-Berlyne curve. We also study the statistics of keyword
occurrence and the aggregate distribution of keywords over a 100 year period.
| [
{
"version": "v1",
"created": "Tue, 2 Apr 2013 20:14:54 GMT"
},
{
"version": "v2",
"created": "Fri, 5 Jul 2013 12:00:21 GMT"
},
{
"version": "v3",
"created": "Fri, 4 Oct 2013 17:03:22 GMT"
}
] | 2013-10-07T00:00:00 | [
[
"Sreenivasan",
"Sameet",
""
]
] | TITLE: Quantitative analysis of the evolution of novelty in cinema through
crowdsourced keywords
ABSTRACT: The generation of novelty is central to any creative endeavor. Novelty
generation and the relationship between novelty and individual hedonic value
have long been subjects of study in social psychology. However, few studies
have utilized large-scale datasets to quantitatively investigate these issues.
Here we consider the domain of American cinema and explore these questions
using a database of films spanning a 70 year period. We use crowdsourced
keywords from the Internet Movie Database as a window into the contents of
films, and prescribe novelty scores for each film based on occurrence
probabilities of individual keywords and keyword-pairs. These scores provide
revealing insights into the dynamics of novelty in cinema. We investigate how
novelty influences the revenue generated by a film, and find a relationship
that resembles the Wundt-Berlyne curve. We also study the statistics of keyword
occurrence and the aggregate distribution of keywords over a 100 year period.
|
1310.1227 | Om Pr | Anagha P. Khedkar, Shaila Subbaraman | The Novel Approach of Adaptive Twin Probability for Genetic Algorithm | 7 pages, International Journal of Advanced Studies in Computer
Science and Engineering (IJASCSE), Volume 2, Special Issue 2, 2013 | null | null | null | cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The performance of GA is measured and analyzed in terms of its performance
parameters against variations in its genetic operators and associated
parameters. Since last four decades huge numbers of researchers have been
working on the performance of GA and its enhancement. This earlier research
work on analyzing the performance of GA enforces the need to further
investigate the exploration and exploitation characteristics and observe its
impact on the behavior and overall performance of GA. This paper introduces the
novel approach of adaptive twin probability associated with the advanced twin
operator that enhances the performance of GA. The design of the advanced twin
operator is extrapolated from the twin offspring birth due to single ovulation
in natural genetic systems as mentioned in the earlier works. The twin
probability of this operator is adaptively varied based on the fitness of best
individual thereby relieving the GA user from statically defining its value.
This novel approach of adaptive twin probability is experimented and tested on
the standard benchmark optimization test functions. The experimental results
show the increased accuracy in terms of the best individual and reduced
convergence time.
| [
{
"version": "v1",
"created": "Fri, 4 Oct 2013 11:31:40 GMT"
}
] | 2013-10-07T00:00:00 | [
[
"Khedkar",
"Anagha P.",
""
],
[
"Subbaraman",
"Shaila",
""
]
] | TITLE: The Novel Approach of Adaptive Twin Probability for Genetic Algorithm
ABSTRACT: The performance of GA is measured and analyzed in terms of its performance
parameters against variations in its genetic operators and associated
parameters. Since last four decades huge numbers of researchers have been
working on the performance of GA and its enhancement. This earlier research
work on analyzing the performance of GA enforces the need to further
investigate the exploration and exploitation characteristics and observe its
impact on the behavior and overall performance of GA. This paper introduces the
novel approach of adaptive twin probability associated with the advanced twin
operator that enhances the performance of GA. The design of the advanced twin
operator is extrapolated from the twin offspring birth due to single ovulation
in natural genetic systems as mentioned in the earlier works. The twin
probability of this operator is adaptively varied based on the fitness of best
individual thereby relieving the GA user from statically defining its value.
This novel approach of adaptive twin probability is experimented and tested on
the standard benchmark optimization test functions. The experimental results
show the increased accuracy in terms of the best individual and reduced
convergence time.
|
1309.7690 | EPTCS | Andrea G. Citrolo (Universit\`a degli Studi di Milano-Bicocca),
Giancarlo Mauri (Universit\`a degli Studi di Milano-Bicocca) | A Hybrid Monte Carlo Ant Colony Optimization Approach for Protein
Structure Prediction in the HP Model | In Proceedings Wivace 2013, arXiv:1309.7122 | EPTCS 130, 2013, pp. 61-69 | 10.4204/EPTCS.130.9 | null | cs.NE cs.CE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The hydrophobic-polar (HP) model has been widely studied in the field of
protein structure prediction (PSP) both for theoretical purposes and as a
benchmark for new optimization strategies. In this work we introduce a new
heuristics based on Ant Colony Optimization (ACO) and Markov Chain Monte Carlo
(MCMC) that we called Hybrid Monte Carlo Ant Colony Optimization (HMCACO). We
describe this method and compare results obtained on well known HP instances in
the 3 dimensional cubic lattice to those obtained with standard ACO and
Simulated Annealing (SA). All methods were implemented using an unconstrained
neighborhood and a modified objective function to prevent the creation of
overlapping walks. Results show that our methods perform better than the other
heuristics in all benchmark instances.
| [
{
"version": "v1",
"created": "Mon, 30 Sep 2013 01:05:51 GMT"
}
] | 2013-10-04T00:00:00 | [
[
"Citrolo",
"Andrea G.",
"",
"Università degli Studi di Milano-Bicocca"
],
[
"Mauri",
"Giancarlo",
"",
"Università degli Studi di Milano-Bicocca"
]
] | TITLE: A Hybrid Monte Carlo Ant Colony Optimization Approach for Protein
Structure Prediction in the HP Model
ABSTRACT: The hydrophobic-polar (HP) model has been widely studied in the field of
protein structure prediction (PSP) both for theoretical purposes and as a
benchmark for new optimization strategies. In this work we introduce a new
heuristics based on Ant Colony Optimization (ACO) and Markov Chain Monte Carlo
(MCMC) that we called Hybrid Monte Carlo Ant Colony Optimization (HMCACO). We
describe this method and compare results obtained on well known HP instances in
the 3 dimensional cubic lattice to those obtained with standard ACO and
Simulated Annealing (SA). All methods were implemented using an unconstrained
neighborhood and a modified objective function to prevent the creation of
overlapping walks. Results show that our methods perform better than the other
heuristics in all benchmark instances.
|
1310.0201 | Moreno Coco MIC | Moreno I. Coco and Rick Dale | Cross-Recurrence Quantification Analysis of Categorical and Continuous
Time Series: an R package | null | null | null | null | cs.CL stat.AP | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper describes the R package crqa to perform cross-recurrence
quantification analysis of two time series of either a categorical or
continuous nature. Streams of behavioral information, from eye movements to
linguistic elements, unfold over time. When two people interact, such as in
conversation, they often adapt to each other, leading these behavioral levels
to exhibit recurrent states. In dialogue, for example, interlocutors adapt to
each other by exchanging interactive cues: smiles, nods, gestures, choice of
words, and so on. In order for us to capture closely the goings-on of dynamic
interaction, and uncover the extent of coupling between two individuals, we
need to quantify how much recurrence is taking place at these levels. Methods
available in crqa would allow researchers in cognitive science to pose such
questions as how much are two people recurrent at some level of analysis, what
is the characteristic lag time for one person to maximally match another, or
whether one person is leading another. First, we set the theoretical ground to
understand the difference between 'correlation' and 'co-visitation' when
comparing two time series, using an aggregative or cross-recurrence approach.
Then, we describe more formally the principles of cross-recurrence, and show
with the current package how to carry out analyses applying them. We end the
paper by comparing computational efficiency, and results' consistency, of crqa
R package, with the benchmark MATLAB toolbox crptoolbox. We show perfect
comparability between the two libraries on both levels.
| [
{
"version": "v1",
"created": "Tue, 1 Oct 2013 09:20:21 GMT"
},
{
"version": "v2",
"created": "Thu, 3 Oct 2013 16:09:07 GMT"
}
] | 2013-10-04T00:00:00 | [
[
"Coco",
"Moreno I.",
""
],
[
"Dale",
"Rick",
""
]
] | TITLE: Cross-Recurrence Quantification Analysis of Categorical and Continuous
Time Series: an R package
ABSTRACT: This paper describes the R package crqa to perform cross-recurrence
quantification analysis of two time series of either a categorical or
continuous nature. Streams of behavioral information, from eye movements to
linguistic elements, unfold over time. When two people interact, such as in
conversation, they often adapt to each other, leading these behavioral levels
to exhibit recurrent states. In dialogue, for example, interlocutors adapt to
each other by exchanging interactive cues: smiles, nods, gestures, choice of
words, and so on. In order for us to capture closely the goings-on of dynamic
interaction, and uncover the extent of coupling between two individuals, we
need to quantify how much recurrence is taking place at these levels. Methods
available in crqa would allow researchers in cognitive science to pose such
questions as how much are two people recurrent at some level of analysis, what
is the characteristic lag time for one person to maximally match another, or
whether one person is leading another. First, we set the theoretical ground to
understand the difference between 'correlation' and 'co-visitation' when
comparing two time series, using an aggregative or cross-recurrence approach.
Then, we describe more formally the principles of cross-recurrence, and show
with the current package how to carry out analyses applying them. We end the
paper by comparing computational efficiency, and results' consistency, of crqa
R package, with the benchmark MATLAB toolbox crptoolbox. We show perfect
comparability between the two libraries on both levels.
|
1310.0883 | Srikumar Venugopal | Freddie Sunarso, Srikumar Venugopal and Federico Lauro | Scalable Protein Sequence Similarity Search using Locality-Sensitive
Hashing and MapReduce | null | null | null | UNSW CSE TR 201325 | cs.DC cs.CE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Metagenomics is the study of environments through genetic sampling of their
microbiota. Metagenomic studies produce large datasets that are estimated to
grow at a faster rate than the available computational capacity. A key step in
the study of metagenome data is sequence similarity searching which is
computationally intensive over large datasets. Tools such as BLAST require
large dedicated computing infrastructure to perform such analysis and may not
be available to every researcher.
In this paper, we propose a novel approach called ScalLoPS that performs
searching on protein sequence datasets using LSH (Locality-Sensitive Hashing)
that is implemented using the MapReduce distributed framework. ScalLoPS is
designed to scale across computing resources sourced from cloud computing
providers. We present the design and implementation of ScalLoPS followed by
evaluation with datasets derived from both traditional as well as metagenomic
studies. Our experiments show that with this method approximates the quality of
BLAST results while improving the scalability of protein sequence search.
| [
{
"version": "v1",
"created": "Thu, 3 Oct 2013 03:11:06 GMT"
}
] | 2013-10-04T00:00:00 | [
[
"Sunarso",
"Freddie",
""
],
[
"Venugopal",
"Srikumar",
""
],
[
"Lauro",
"Federico",
""
]
] | TITLE: Scalable Protein Sequence Similarity Search using Locality-Sensitive
Hashing and MapReduce
ABSTRACT: Metagenomics is the study of environments through genetic sampling of their
microbiota. Metagenomic studies produce large datasets that are estimated to
grow at a faster rate than the available computational capacity. A key step in
the study of metagenome data is sequence similarity searching which is
computationally intensive over large datasets. Tools such as BLAST require
large dedicated computing infrastructure to perform such analysis and may not
be available to every researcher.
In this paper, we propose a novel approach called ScalLoPS that performs
searching on protein sequence datasets using LSH (Locality-Sensitive Hashing)
that is implemented using the MapReduce distributed framework. ScalLoPS is
designed to scale across computing resources sourced from cloud computing
providers. We present the design and implementation of ScalLoPS followed by
evaluation with datasets derived from both traditional as well as metagenomic
studies. Our experiments show that with this method approximates the quality of
BLAST results while improving the scalability of protein sequence search.
|
1310.0894 | Richard Chow | Richard Chow, Hongxia Jin, Bart Knijnenburg, Gokay Saldamli | Differential Data Analysis for Recommender Systems | Extended version of RecSys 2013 paper | null | null | null | cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present techniques to characterize which data is important to a
recommender system and which is not. Important data is data that contributes
most to the accuracy of the recommendation algorithm, while less important data
contributes less to the accuracy or even decreases it. Characterizing the
importance of data has two potential direct benefits: (1) increased privacy and
(2) reduced data management costs, including storage. For privacy, we enable
increased recommendation accuracy for comparable privacy levels using existing
data obfuscation techniques. For storage, our results indicate that we can
achieve large reductions in recommendation data and yet maintain recommendation
accuracy.
Our main technique is called differential data analysis. The name is inspired
by other sorts of differential analysis, such as differential power analysis
and differential cryptanalysis, where insight comes through analysis of
slightly differing inputs. In differential data analysis we chunk the data and
compare results in the presence or absence of each chunk. We present results
applying differential data analysis to two datasets and three different kinds
of attributes. The first attribute is called user hardship. This is a novel
attribute, particularly relevant to location datasets, that indicates how
burdensome a data point was to achieve. The second and third attributes are
more standard: timestamp and user rating. For user rating, we confirm previous
work concerning the increased importance to the recommender of data
corresponding to high and low user ratings.
| [
{
"version": "v1",
"created": "Thu, 3 Oct 2013 04:47:47 GMT"
}
] | 2013-10-04T00:00:00 | [
[
"Chow",
"Richard",
""
],
[
"Jin",
"Hongxia",
""
],
[
"Knijnenburg",
"Bart",
""
],
[
"Saldamli",
"Gokay",
""
]
] | TITLE: Differential Data Analysis for Recommender Systems
ABSTRACT: We present techniques to characterize which data is important to a
recommender system and which is not. Important data is data that contributes
most to the accuracy of the recommendation algorithm, while less important data
contributes less to the accuracy or even decreases it. Characterizing the
importance of data has two potential direct benefits: (1) increased privacy and
(2) reduced data management costs, including storage. For privacy, we enable
increased recommendation accuracy for comparable privacy levels using existing
data obfuscation techniques. For storage, our results indicate that we can
achieve large reductions in recommendation data and yet maintain recommendation
accuracy.
Our main technique is called differential data analysis. The name is inspired
by other sorts of differential analysis, such as differential power analysis
and differential cryptanalysis, where insight comes through analysis of
slightly differing inputs. In differential data analysis we chunk the data and
compare results in the presence or absence of each chunk. We present results
applying differential data analysis to two datasets and three different kinds
of attributes. The first attribute is called user hardship. This is a novel
attribute, particularly relevant to location datasets, that indicates how
burdensome a data point was to achieve. The second and third attributes are
more standard: timestamp and user rating. For user rating, we confirm previous
work concerning the increased importance to the recommender of data
corresponding to high and low user ratings.
|
1309.5275 | Dan Stowell | Dan Stowell and Mark D. Plumbley | An open dataset for research on audio field recording archives:
freefield1010 | null | null | null | null | cs.SD cs.DL | http://creativecommons.org/licenses/by/3.0/ | We introduce a free and open dataset of 7690 audio clips sampled from the
field-recording tag in the Freesound audio archive. The dataset is designed for
use in research related to data mining in audio archives of field recordings /
soundscapes. Audio is standardised, and audio and metadata are Creative Commons
licensed. We describe the data preparation process, characterise the dataset
descriptively, and illustrate its use through an auto-tagging experiment.
| [
{
"version": "v1",
"created": "Fri, 20 Sep 2013 14:12:04 GMT"
},
{
"version": "v2",
"created": "Tue, 1 Oct 2013 21:29:13 GMT"
}
] | 2013-10-03T00:00:00 | [
[
"Stowell",
"Dan",
""
],
[
"Plumbley",
"Mark D.",
""
]
] | TITLE: An open dataset for research on audio field recording archives:
freefield1010
ABSTRACT: We introduce a free and open dataset of 7690 audio clips sampled from the
field-recording tag in the Freesound audio archive. The dataset is designed for
use in research related to data mining in audio archives of field recordings /
soundscapes. Audio is standardised, and audio and metadata are Creative Commons
licensed. We describe the data preparation process, characterise the dataset
descriptively, and illustrate its use through an auto-tagging experiment.
|
1310.0505 | Haiyan Wang | Haiyan Wang, Feng Wang, Kuai Xu | Modeling Information Diffusion in Online Social Networks with Partial
Differential Equations | null | null | null | null | cs.SI physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Online social networks such as Twitter and Facebook have gained tremendous
popularity for information exchange. The availability of unprecedented amounts
of digital data has accelerated research on information diffusion in online
social networks. However, the mechanism of information spreading in online
social networks remains elusive due to the complexity of social interactions
and rapid change of online social networks. Much of prior work on information
diffusion over online social networks has based on empirical and statistical
approaches. The majority of dynamical models arising from information diffusion
over online social networks involve ordinary differential equations which only
depend on time. In a number of recent papers, the authors propose to use
partial differential equations(PDEs) to characterize temporal and spatial
patterns of information diffusion over online social networks. Built on
intuitive cyber-distances such as friendship hops in online social networks,
the reaction-diffusion equations take into account influences from various
external out-of-network sources, such as the mainstream media, and provide a
new analytic framework to study the interplay of structural and topical
influences on information diffusion over online social networks. In this
survey, we discuss a number of PDE-based models that are validated with real
datasets collected from popular online social networks such as Digg and
Twitter. Some new developments including the conservation law of information
flow in online social networks and information propagation speeds based on
traveling wave solutions are presented to solidify the foundation of the PDE
models and highlight the new opportunities and challenges for mathematicians as
well as computer scientists and researchers in online social networks.
| [
{
"version": "v1",
"created": "Tue, 1 Oct 2013 22:17:30 GMT"
}
] | 2013-10-03T00:00:00 | [
[
"Wang",
"Haiyan",
""
],
[
"Wang",
"Feng",
""
],
[
"Xu",
"Kuai",
""
]
] | TITLE: Modeling Information Diffusion in Online Social Networks with Partial
Differential Equations
ABSTRACT: Online social networks such as Twitter and Facebook have gained tremendous
popularity for information exchange. The availability of unprecedented amounts
of digital data has accelerated research on information diffusion in online
social networks. However, the mechanism of information spreading in online
social networks remains elusive due to the complexity of social interactions
and rapid change of online social networks. Much of prior work on information
diffusion over online social networks has based on empirical and statistical
approaches. The majority of dynamical models arising from information diffusion
over online social networks involve ordinary differential equations which only
depend on time. In a number of recent papers, the authors propose to use
partial differential equations(PDEs) to characterize temporal and spatial
patterns of information diffusion over online social networks. Built on
intuitive cyber-distances such as friendship hops in online social networks,
the reaction-diffusion equations take into account influences from various
external out-of-network sources, such as the mainstream media, and provide a
new analytic framework to study the interplay of structural and topical
influences on information diffusion over online social networks. In this
survey, we discuss a number of PDE-based models that are validated with real
datasets collected from popular online social networks such as Digg and
Twitter. Some new developments including the conservation law of information
flow in online social networks and information propagation speeds based on
traveling wave solutions are presented to solidify the foundation of the PDE
models and highlight the new opportunities and challenges for mathematicians as
well as computer scientists and researchers in online social networks.
|
1206.2038 | Tien Tuan Anh Dinh | Dinh Tien Tuan Anh, Quach Vinh Thanh, Anwitaman Datta | CloudMine: Multi-Party Privacy-Preserving Data Analytics Service | null | null | null | null | cs.CR cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | An increasing number of businesses are replacing their data storage and
computation infrastructure with cloud services. Likewise, there is an increased
emphasis on performing analytics based on multiple datasets obtained from
different data sources. While ensuring security of data and computation
outsourced to a third party cloud is in itself challenging, supporting
analytics using data distributed across multiple, independent clouds is even
further from trivial. In this paper we present CloudMine, a cloud-based service
which allows multiple data owners to perform privacy-preserved computation over
the joint data using their clouds as delegates. CloudMine protects data privacy
with respect to semi-honest data owners and semi-honest clouds. It furthermore
ensures the privacy of the computation outputs from the curious clouds. It
allows data owners to reliably detect if their cloud delegates have been lazy
when carrying out the delegated computation. CloudMine can run as a centralized
service on a single cloud, or as a distributed service over multiple,
independent clouds. CloudMine supports a set of basic computations that can be
used to construct a variety of highly complex, distributed privacy-preserving
data analytics. We demonstrate how a simple instance of CloudMine (secure sum
service) is used to implement three classical data mining tasks
(classification, association rule mining and clustering) in a cloud
environment. We experiment with a prototype of the service, the results of
which suggest its practicality for supporting privacy-preserving data analytics
as a (multi) cloud-based service.
| [
{
"version": "v1",
"created": "Sun, 10 Jun 2012 16:27:48 GMT"
},
{
"version": "v2",
"created": "Tue, 1 Oct 2013 05:14:19 GMT"
}
] | 2013-10-02T00:00:00 | [
[
"Anh",
"Dinh Tien Tuan",
""
],
[
"Thanh",
"Quach Vinh",
""
],
[
"Datta",
"Anwitaman",
""
]
] | TITLE: CloudMine: Multi-Party Privacy-Preserving Data Analytics Service
ABSTRACT: An increasing number of businesses are replacing their data storage and
computation infrastructure with cloud services. Likewise, there is an increased
emphasis on performing analytics based on multiple datasets obtained from
different data sources. While ensuring security of data and computation
outsourced to a third party cloud is in itself challenging, supporting
analytics using data distributed across multiple, independent clouds is even
further from trivial. In this paper we present CloudMine, a cloud-based service
which allows multiple data owners to perform privacy-preserved computation over
the joint data using their clouds as delegates. CloudMine protects data privacy
with respect to semi-honest data owners and semi-honest clouds. It furthermore
ensures the privacy of the computation outputs from the curious clouds. It
allows data owners to reliably detect if their cloud delegates have been lazy
when carrying out the delegated computation. CloudMine can run as a centralized
service on a single cloud, or as a distributed service over multiple,
independent clouds. CloudMine supports a set of basic computations that can be
used to construct a variety of highly complex, distributed privacy-preserving
data analytics. We demonstrate how a simple instance of CloudMine (secure sum
service) is used to implement three classical data mining tasks
(classification, association rule mining and clustering) in a cloud
environment. We experiment with a prototype of the service, the results of
which suggest its practicality for supporting privacy-preserving data analytics
as a (multi) cloud-based service.
|
1309.7512 | Alexander Fix | Alexander Fix and Thorsten Joachims and Sam Park and Ramin Zabih | Structured learning of sum-of-submodular higher order energy functions | null | null | null | null | cs.CV cs.LG stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Submodular functions can be exactly minimized in polynomial time, and the
special case that graph cuts solve with max flow \cite{KZ:PAMI04} has had
significant impact in computer vision
\cite{BVZ:PAMI01,Kwatra:SIGGRAPH03,Rother:GrabCut04}. In this paper we address
the important class of sum-of-submodular (SoS) functions
\cite{Arora:ECCV12,Kolmogorov:DAM12}, which can be efficiently minimized via a
variant of max flow called submodular flow \cite{Edmonds:ADM77}. SoS functions
can naturally express higher order priors involving, e.g., local image patches;
however, it is difficult to fully exploit their expressive power because they
have so many parameters. Rather than trying to formulate existing higher order
priors as an SoS function, we take a discriminative learning approach,
effectively searching the space of SoS functions for a higher order prior that
performs well on our training set. We adopt a structural SVM approach
\cite{Joachims/etal/09a,Tsochantaridis/etal/04} and formulate the training
problem in terms of quadratic programming; as a result we can efficiently
search the space of SoS priors via an extended cutting-plane algorithm. We also
show how the state-of-the-art max flow method for vision problems
\cite{Goldberg:ESA11} can be modified to efficiently solve the submodular flow
problem. Experimental comparisons are made against the OpenCV implementation of
the GrabCut interactive segmentation technique \cite{Rother:GrabCut04}, which
uses hand-tuned parameters instead of machine learning. On a standard dataset
\cite{Gulshan:CVPR10} our method learns higher order priors with hundreds of
parameter values, and produces significantly better segmentations. While our
focus is on binary labeling problems, we show that our techniques can be
naturally generalized to handle more than two labels.
| [
{
"version": "v1",
"created": "Sat, 28 Sep 2013 23:55:01 GMT"
},
{
"version": "v2",
"created": "Tue, 1 Oct 2013 02:45:20 GMT"
}
] | 2013-10-02T00:00:00 | [
[
"Fix",
"Alexander",
""
],
[
"Joachims",
"Thorsten",
""
],
[
"Park",
"Sam",
""
],
[
"Zabih",
"Ramin",
""
]
] | TITLE: Structured learning of sum-of-submodular higher order energy functions
ABSTRACT: Submodular functions can be exactly minimized in polynomial time, and the
special case that graph cuts solve with max flow \cite{KZ:PAMI04} has had
significant impact in computer vision
\cite{BVZ:PAMI01,Kwatra:SIGGRAPH03,Rother:GrabCut04}. In this paper we address
the important class of sum-of-submodular (SoS) functions
\cite{Arora:ECCV12,Kolmogorov:DAM12}, which can be efficiently minimized via a
variant of max flow called submodular flow \cite{Edmonds:ADM77}. SoS functions
can naturally express higher order priors involving, e.g., local image patches;
however, it is difficult to fully exploit their expressive power because they
have so many parameters. Rather than trying to formulate existing higher order
priors as an SoS function, we take a discriminative learning approach,
effectively searching the space of SoS functions for a higher order prior that
performs well on our training set. We adopt a structural SVM approach
\cite{Joachims/etal/09a,Tsochantaridis/etal/04} and formulate the training
problem in terms of quadratic programming; as a result we can efficiently
search the space of SoS priors via an extended cutting-plane algorithm. We also
show how the state-of-the-art max flow method for vision problems
\cite{Goldberg:ESA11} can be modified to efficiently solve the submodular flow
problem. Experimental comparisons are made against the OpenCV implementation of
the GrabCut interactive segmentation technique \cite{Rother:GrabCut04}, which
uses hand-tuned parameters instead of machine learning. On a standard dataset
\cite{Gulshan:CVPR10} our method learns higher order priors with hundreds of
parameter values, and produces significantly better segmentations. While our
focus is on binary labeling problems, we show that our techniques can be
naturally generalized to handle more than two labels.
|
1310.0308 | Tomislav Petkovi\'c | Karla Brki\'c, Sr{\dj}an Ra\v{s}i\'c, Axel Pinz, Sini\v{s}a
\v{S}egvi\'c and Zoran Kalafati\'c | Combining Spatio-Temporal Appearance Descriptors and Optical Flow for
Human Action Recognition in Video Data | Part of the Proceedings of the Croatian Computer Vision Workshop,
CCVW 2013, Year 1 | null | null | UniZg-CRV-CCVW/2013/0011 | cs.CV | http://creativecommons.org/licenses/by-nc-sa/3.0/ | This paper proposes combining spatio-temporal appearance (STA) descriptors
with optical flow for human action recognition. The STA descriptors are local
histogram-based descriptors of space-time, suitable for building a partial
representation of arbitrary spatio-temporal phenomena. Because of the
possibility of iterative refinement, they are interesting in the context of
online human action recognition. We investigate the use of dense optical flow
as the image function of the STA descriptor for human action recognition, using
two different algorithms for computing the flow: the Farneb\"ack algorithm and
the TVL1 algorithm. We provide a detailed analysis of the influencing optical
flow algorithm parameters on the produced optical flow fields. An extensive
experimental validation of optical flow-based STA descriptors in human action
recognition is performed on the KTH human action dataset. The encouraging
experimental results suggest the potential of our approach in online human
action recognition.
| [
{
"version": "v1",
"created": "Tue, 1 Oct 2013 14:13:40 GMT"
}
] | 2013-10-02T00:00:00 | [
[
"Brkić",
"Karla",
""
],
[
"Rašić",
"Srđan",
""
],
[
"Pinz",
"Axel",
""
],
[
"Šegvić",
"Siniša",
""
],
[
"Kalafatić",
"Zoran",
""
]
] | TITLE: Combining Spatio-Temporal Appearance Descriptors and Optical Flow for
Human Action Recognition in Video Data
ABSTRACT: This paper proposes combining spatio-temporal appearance (STA) descriptors
with optical flow for human action recognition. The STA descriptors are local
histogram-based descriptors of space-time, suitable for building a partial
representation of arbitrary spatio-temporal phenomena. Because of the
possibility of iterative refinement, they are interesting in the context of
online human action recognition. We investigate the use of dense optical flow
as the image function of the STA descriptor for human action recognition, using
two different algorithms for computing the flow: the Farneb\"ack algorithm and
the TVL1 algorithm. We provide a detailed analysis of the influencing optical
flow algorithm parameters on the produced optical flow fields. An extensive
experimental validation of optical flow-based STA descriptors in human action
recognition is performed on the KTH human action dataset. The encouraging
experimental results suggest the potential of our approach in online human
action recognition.
|
1310.0310 | Tomislav Petkovi\'c | Ivan Kre\v{s}o, Marko \v{S}evrovi\'c and Sini\v{s}a \v{S}egvi\'c | A Novel Georeferenced Dataset for Stereo Visual Odometry | Part of the Proceedings of the Croatian Computer Vision Workshop,
CCVW 2013, Year 1 | null | null | UniZg-CRV-CCVW/2013/0017 | cs.CV | http://creativecommons.org/licenses/by-nc-sa/3.0/ | In this work, we present a novel dataset for assessing the accuracy of stereo
visual odometry. The dataset has been acquired by a small-baseline stereo rig
mounted on the top of a moving car. The groundtruth is supplied by a consumer
grade GPS device without IMU. Synchronization and alignment between GPS
readings and stereo frames are recovered after the acquisition. We show that
the attained groundtruth accuracy allows to draw useful conclusions in
practice. The presented experiments address influence of camera calibration,
baseline distance and zero-disparity features to the achieved reconstruction
performance.
| [
{
"version": "v1",
"created": "Tue, 1 Oct 2013 14:15:48 GMT"
}
] | 2013-10-02T00:00:00 | [
[
"Krešo",
"Ivan",
""
],
[
"Ševrović",
"Marko",
""
],
[
"Šegvić",
"Siniša",
""
]
] | TITLE: A Novel Georeferenced Dataset for Stereo Visual Odometry
ABSTRACT: In this work, we present a novel dataset for assessing the accuracy of stereo
visual odometry. The dataset has been acquired by a small-baseline stereo rig
mounted on the top of a moving car. The groundtruth is supplied by a consumer
grade GPS device without IMU. Synchronization and alignment between GPS
readings and stereo frames are recovered after the acquisition. We show that
the attained groundtruth accuracy allows to draw useful conclusions in
practice. The presented experiments address influence of camera calibration,
baseline distance and zero-disparity features to the achieved reconstruction
performance.
|
1310.0316 | Tomislav Petkovi\'c | Ivan Sikiri\'c, Karla Brki\'c and Sini\v{s}a \v{S}egvi\'c | Classifying Traffic Scenes Using The GIST Image Descriptor | Part of the Proceedings of the Croatian Computer Vision Workshop,
CCVW 2013, Year 1 | null | null | UniZg-CRV-CCVW/2013/0013 | cs.CV | http://creativecommons.org/licenses/by-nc-sa/3.0/ | This paper investigates classification of traffic scenes in a very low
bandwidth scenario, where an image should be coded by a small number of
features. We introduce a novel dataset, called the FM1 dataset, consisting of
5615 images of eight different traffic scenes: open highway, open road,
settlement, tunnel, tunnel exit, toll booth, heavy traffic and the overpass. We
evaluate the suitability of the GIST descriptor as a representation of these
images, first by exploring the descriptor space using PCA and k-means
clustering, and then by using an SVM classifier and recording its 10-fold
cross-validation performance on the introduced FM1 dataset. The obtained
recognition rates are very encouraging, indicating that the use of the GIST
descriptor alone could be sufficiently descriptive even when very high
performance is required.
| [
{
"version": "v1",
"created": "Tue, 1 Oct 2013 14:19:26 GMT"
}
] | 2013-10-02T00:00:00 | [
[
"Sikirić",
"Ivan",
""
],
[
"Brkić",
"Karla",
""
],
[
"Šegvić",
"Siniša",
""
]
] | TITLE: Classifying Traffic Scenes Using The GIST Image Descriptor
ABSTRACT: This paper investigates classification of traffic scenes in a very low
bandwidth scenario, where an image should be coded by a small number of
features. We introduce a novel dataset, called the FM1 dataset, consisting of
5615 images of eight different traffic scenes: open highway, open road,
settlement, tunnel, tunnel exit, toll booth, heavy traffic and the overpass. We
evaluate the suitability of the GIST descriptor as a representation of these
images, first by exploring the descriptor space using PCA and k-means
clustering, and then by using an SVM classifier and recording its 10-fold
cross-validation performance on the introduced FM1 dataset. The obtained
recognition rates are very encouraging, indicating that the use of the GIST
descriptor alone could be sufficiently descriptive even when very high
performance is required.
|
1211.4909 | Benyuan Liu | Benyuan Liu, Zhilin Zhang, Hongqi Fan, Qiang Fu | Fast Marginalized Block Sparse Bayesian Learning Algorithm | null | null | null | null | cs.IT cs.LG math.IT stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The performance of sparse signal recovery from noise corrupted,
underdetermined measurements can be improved if both sparsity and correlation
structure of signals are exploited. One typical correlation structure is the
intra-block correlation in block sparse signals. To exploit this structure, a
framework, called block sparse Bayesian learning (BSBL), has been proposed
recently. Algorithms derived from this framework showed superior performance
but they are not very fast, which limits their applications. This work derives
an efficient algorithm from this framework, using a marginalized likelihood
maximization method. Compared to existing BSBL algorithms, it has close
recovery performance but is much faster. Therefore, it is more suitable for
large scale datasets and applications requiring real-time implementation.
| [
{
"version": "v1",
"created": "Wed, 21 Nov 2012 01:06:49 GMT"
},
{
"version": "v2",
"created": "Thu, 29 Nov 2012 01:24:49 GMT"
},
{
"version": "v3",
"created": "Fri, 18 Jan 2013 02:28:09 GMT"
},
{
"version": "v4",
"created": "Tue, 22 Jan 2013 01:51:17 GMT"
},
{
"version": "v5",
"created": "Mon, 4 Mar 2013 02:07:31 GMT"
},
{
"version": "v6",
"created": "Mon, 16 Sep 2013 22:58:17 GMT"
},
{
"version": "v7",
"created": "Sun, 29 Sep 2013 15:56:47 GMT"
}
] | 2013-10-01T00:00:00 | [
[
"Liu",
"Benyuan",
""
],
[
"Zhang",
"Zhilin",
""
],
[
"Fan",
"Hongqi",
""
],
[
"Fu",
"Qiang",
""
]
] | TITLE: Fast Marginalized Block Sparse Bayesian Learning Algorithm
ABSTRACT: The performance of sparse signal recovery from noise corrupted,
underdetermined measurements can be improved if both sparsity and correlation
structure of signals are exploited. One typical correlation structure is the
intra-block correlation in block sparse signals. To exploit this structure, a
framework, called block sparse Bayesian learning (BSBL), has been proposed
recently. Algorithms derived from this framework showed superior performance
but they are not very fast, which limits their applications. This work derives
an efficient algorithm from this framework, using a marginalized likelihood
maximization method. Compared to existing BSBL algorithms, it has close
recovery performance but is much faster. Therefore, it is more suitable for
large scale datasets and applications requiring real-time implementation.
|
1301.7619 | Gonzalo Mateos | Juan Andres Bazerque, Gonzalo Mateos, and Georgios B. Giannakis | Rank regularization and Bayesian inference for tensor completion and
extrapolation | 12 pages, submitted to IEEE Transactions on Signal Processing | null | 10.1109/TSP.2013.2278516 | null | cs.IT cs.LG math.IT stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A novel regularizer of the PARAFAC decomposition factors capturing the
tensor's rank is proposed in this paper, as the key enabler for completion of
three-way data arrays with missing entries. Set in a Bayesian framework, the
tensor completion method incorporates prior information to enhance its
smoothing and prediction capabilities. This probabilistic approach can
naturally accommodate general models for the data distribution, lending itself
to various fitting criteria that yield optimum estimates in the
maximum-a-posteriori sense. In particular, two algorithms are devised for
Gaussian- and Poisson-distributed data, that minimize the rank-regularized
least-squares error and Kullback-Leibler divergence, respectively. The proposed
technique is able to recover the "ground-truth'' tensor rank when tested on
synthetic data, and to complete brain imaging and yeast gene expression
datasets with 50% and 15% of missing entries respectively, resulting in
recovery errors at -10dB and -15dB.
| [
{
"version": "v1",
"created": "Thu, 31 Jan 2013 14:17:28 GMT"
}
] | 2013-10-01T00:00:00 | [
[
"Bazerque",
"Juan Andres",
""
],
[
"Mateos",
"Gonzalo",
""
],
[
"Giannakis",
"Georgios B.",
""
]
] | TITLE: Rank regularization and Bayesian inference for tensor completion and
extrapolation
ABSTRACT: A novel regularizer of the PARAFAC decomposition factors capturing the
tensor's rank is proposed in this paper, as the key enabler for completion of
three-way data arrays with missing entries. Set in a Bayesian framework, the
tensor completion method incorporates prior information to enhance its
smoothing and prediction capabilities. This probabilistic approach can
naturally accommodate general models for the data distribution, lending itself
to various fitting criteria that yield optimum estimates in the
maximum-a-posteriori sense. In particular, two algorithms are devised for
Gaussian- and Poisson-distributed data, that minimize the rank-regularized
least-squares error and Kullback-Leibler divergence, respectively. The proposed
technique is able to recover the "ground-truth'' tensor rank when tested on
synthetic data, and to complete brain imaging and yeast gene expression
datasets with 50% and 15% of missing entries respectively, resulting in
recovery errors at -10dB and -15dB.
|
1308.5174 | James Pallister | James Pallister, Simon Hollis, Jeremy Bennett | BEEBS: Open Benchmarks for Energy Measurements on Embedded Platforms | null | null | null | null | cs.PF | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper presents and justifies an open benchmark suite named BEEBS,
targeted at evaluating the energy consumption of embedded processors.
We explore the possible sources of energy consumption, then select individual
benchmarks from contemporary suites to cover these areas. Version one of BEEBS
is presented here and contains 10 benchmarks that cover a wide range of typical
embedded applications. The benchmark suite is portable across diverse
architectures and is freely available.
The benchmark suite is extensively evaluated, and the properties of its
constituent programs are analysed. Using real hardware platforms we show case
examples which illustrate the difference in power dissipation between three
processor architectures and their related ISAs. We observe significant
differences in the average instruction dissipation between the architectures of
4.4x, specifically 170uW/MHz (ARM Cortex-M0), 65uW/MHz (Adapteva Epiphany) and
88uW/MHz (XMOS XS1-L1).
| [
{
"version": "v1",
"created": "Fri, 23 Aug 2013 16:29:27 GMT"
},
{
"version": "v2",
"created": "Sat, 28 Sep 2013 16:16:03 GMT"
}
] | 2013-10-01T00:00:00 | [
[
"Pallister",
"James",
""
],
[
"Hollis",
"Simon",
""
],
[
"Bennett",
"Jeremy",
""
]
] | TITLE: BEEBS: Open Benchmarks for Energy Measurements on Embedded Platforms
ABSTRACT: This paper presents and justifies an open benchmark suite named BEEBS,
targeted at evaluating the energy consumption of embedded processors.
We explore the possible sources of energy consumption, then select individual
benchmarks from contemporary suites to cover these areas. Version one of BEEBS
is presented here and contains 10 benchmarks that cover a wide range of typical
embedded applications. The benchmark suite is portable across diverse
architectures and is freely available.
The benchmark suite is extensively evaluated, and the properties of its
constituent programs are analysed. Using real hardware platforms we show case
examples which illustrate the difference in power dissipation between three
processor architectures and their related ISAs. We observe significant
differences in the average instruction dissipation between the architectures of
4.4x, specifically 170uW/MHz (ARM Cortex-M0), 65uW/MHz (Adapteva Epiphany) and
88uW/MHz (XMOS XS1-L1).
|
1309.5594 | Chunhua Shen | Fumin Shen and Chunhua Shen | Generic Image Classification Approaches Excel on Face Recognition | 10 pages | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The main finding of this work is that the standard image classification
pipeline, which consists of dictionary learning, feature encoding, spatial
pyramid pooling and linear classification, outperforms all state-of-the-art
face recognition methods on the tested benchmark datasets (we have tested on
AR, Extended Yale B, the challenging FERET, and LFW-a datasets). This
surprising and prominent result suggests that those advances in generic image
classification can be directly applied to improve face recognition systems. In
other words, face recognition may not need to be viewed as a separate object
classification problem.
While recently a large body of residual based face recognition methods focus
on developing complex dictionary learning algorithms, in this work we show that
a dictionary of randomly extracted patches (even from non-face images) can
achieve very promising results using the image classification pipeline. That
means, the choice of dictionary learning methods may not be important. Instead,
we find that learning multiple dictionaries using different low-level image
features often improve the final classification accuracy. Our proposed face
recognition approach offers the best reported results on the widely-used face
recognition benchmark datasets. In particular, on the challenging FERET and
LFW-a datasets, we improve the best reported accuracies in the literature by
about 20% and 30% respectively.
| [
{
"version": "v1",
"created": "Sun, 22 Sep 2013 11:52:03 GMT"
},
{
"version": "v2",
"created": "Mon, 30 Sep 2013 03:23:36 GMT"
}
] | 2013-10-01T00:00:00 | [
[
"Shen",
"Fumin",
""
],
[
"Shen",
"Chunhua",
""
]
] | TITLE: Generic Image Classification Approaches Excel on Face Recognition
ABSTRACT: The main finding of this work is that the standard image classification
pipeline, which consists of dictionary learning, feature encoding, spatial
pyramid pooling and linear classification, outperforms all state-of-the-art
face recognition methods on the tested benchmark datasets (we have tested on
AR, Extended Yale B, the challenging FERET, and LFW-a datasets). This
surprising and prominent result suggests that those advances in generic image
classification can be directly applied to improve face recognition systems. In
other words, face recognition may not need to be viewed as a separate object
classification problem.
While recently a large body of residual based face recognition methods focus
on developing complex dictionary learning algorithms, in this work we show that
a dictionary of randomly extracted patches (even from non-face images) can
achieve very promising results using the image classification pipeline. That
means, the choice of dictionary learning methods may not be important. Instead,
we find that learning multiple dictionaries using different low-level image
features often improve the final classification accuracy. Our proposed face
recognition approach offers the best reported results on the widely-used face
recognition benchmark datasets. In particular, on the challenging FERET and
LFW-a datasets, we improve the best reported accuracies in the literature by
about 20% and 30% respectively.
|
1309.7434 | Omar Oreifej | Dong Zhang, Omar Oreifej, Mubarak Shah | Face Verification Using Boosted Cross-Image Features | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper proposes a new approach for face verification, where a pair of
images needs to be classified as belonging to the same person or not. This
problem is relatively new and not well-explored in the literature. Current
methods mostly adopt techniques borrowed from face recognition, and process
each of the images in the pair independently, which is counter intuitive. In
contrast, we propose to extract cross-image features, i.e. features across the
pair of images, which, as we demonstrate, is more discriminative to the
similarity and the dissimilarity of faces. Our features are derived from the
popular Haar-like features, however, extended to handle the face verification
problem instead of face detection. We collect a large bank of cross-image
features using filters of different sizes, locations, and orientations.
Consequently, we use AdaBoost to select and weight the most discriminative
features. We carried out extensive experiments on the proposed ideas using
three standard face verification datasets, and obtained promising results
outperforming state-of-the-art.
| [
{
"version": "v1",
"created": "Sat, 28 Sep 2013 06:21:18 GMT"
}
] | 2013-10-01T00:00:00 | [
[
"Zhang",
"Dong",
""
],
[
"Oreifej",
"Omar",
""
],
[
"Shah",
"Mubarak",
""
]
] | TITLE: Face Verification Using Boosted Cross-Image Features
ABSTRACT: This paper proposes a new approach for face verification, where a pair of
images needs to be classified as belonging to the same person or not. This
problem is relatively new and not well-explored in the literature. Current
methods mostly adopt techniques borrowed from face recognition, and process
each of the images in the pair independently, which is counter intuitive. In
contrast, we propose to extract cross-image features, i.e. features across the
pair of images, which, as we demonstrate, is more discriminative to the
similarity and the dissimilarity of faces. Our features are derived from the
popular Haar-like features, however, extended to handle the face verification
problem instead of face detection. We collect a large bank of cross-image
features using filters of different sizes, locations, and orientations.
Consequently, we use AdaBoost to select and weight the most discriminative
features. We carried out extensive experiments on the proposed ideas using
three standard face verification datasets, and obtained promising results
outperforming state-of-the-art.
|
1309.7484 | Junzhou Chen | Chen Junzhou, Li Qing, Peng Qiang and Kin Hong Wong | CSIFT Based Locality-constrained Linear Coding for Image Classification | 9 pages, 5 figures | null | null | null | cs.CV | http://creativecommons.org/licenses/by-nc-sa/3.0/ | In the past decade, SIFT descriptor has been witnessed as one of the most
robust local invariant feature descriptors and widely used in various vision
tasks. Most traditional image classification systems depend on the
luminance-based SIFT descriptors, which only analyze the gray level variations
of the images. Misclassification may happen since their color contents are
ignored. In this article, we concentrate on improving the performance of
existing image classification algorithms by adding color information. To
achieve this purpose, different kinds of colored SIFT descriptors are
introduced and implemented. Locality-constrained Linear Coding (LLC), a
state-of-the-art sparse coding technology, is employed to construct the image
classification system for the evaluation. The real experiments are carried out
on several benchmarks. With the enhancements of color SIFT, the proposed image
classification system obtains approximate 3% improvement of classification
accuracy on the Caltech-101 dataset and approximate 4% improvement of
classification accuracy on the Caltech-256 dataset.
| [
{
"version": "v1",
"created": "Sat, 28 Sep 2013 18:05:12 GMT"
}
] | 2013-10-01T00:00:00 | [
[
"Junzhou",
"Chen",
""
],
[
"Qing",
"Li",
""
],
[
"Qiang",
"Peng",
""
],
[
"Wong",
"Kin Hong",
""
]
] | TITLE: CSIFT Based Locality-constrained Linear Coding for Image Classification
ABSTRACT: In the past decade, SIFT descriptor has been witnessed as one of the most
robust local invariant feature descriptors and widely used in various vision
tasks. Most traditional image classification systems depend on the
luminance-based SIFT descriptors, which only analyze the gray level variations
of the images. Misclassification may happen since their color contents are
ignored. In this article, we concentrate on improving the performance of
existing image classification algorithms by adding color information. To
achieve this purpose, different kinds of colored SIFT descriptors are
introduced and implemented. Locality-constrained Linear Coding (LLC), a
state-of-the-art sparse coding technology, is employed to construct the image
classification system for the evaluation. The real experiments are carried out
on several benchmarks. With the enhancements of color SIFT, the proposed image
classification system obtains approximate 3% improvement of classification
accuracy on the Caltech-101 dataset and approximate 4% improvement of
classification accuracy on the Caltech-256 dataset.
|
1309.7517 | Modou Gueye M. | Modou Gueye and Talel Abdessalem and Hubert Naacke | Improving tag recommendation by folding in more consistency | 14 pages | null | null | null | cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Tag recommendation is a major aspect of collaborative tagging systems. It
aims to recommend tags to a user for tagging an item. In this paper we present
a part of our work in progress which is a novel improvement of recommendations
by re-ranking the output of a tag recommender. We mine association rules
between candidates tags in order to determine a more consistent list of tags to
recommend.
Our method is an add-on one which leads to better recommendations as we show
in this paper. It is easily parallelizable and morever it may be applied to a
lot of tag recommenders. The experiments we did on five datasets with two kinds
of tag recommender demonstrated the efficiency of our method.
| [
{
"version": "v1",
"created": "Sun, 29 Sep 2013 01:43:40 GMT"
}
] | 2013-10-01T00:00:00 | [
[
"Gueye",
"Modou",
""
],
[
"Abdessalem",
"Talel",
""
],
[
"Naacke",
"Hubert",
""
]
] | TITLE: Improving tag recommendation by folding in more consistency
ABSTRACT: Tag recommendation is a major aspect of collaborative tagging systems. It
aims to recommend tags to a user for tagging an item. In this paper we present
a part of our work in progress which is a novel improvement of recommendations
by re-ranking the output of a tag recommender. We mine association rules
between candidates tags in order to determine a more consistent list of tags to
recommend.
Our method is an add-on one which leads to better recommendations as we show
in this paper. It is easily parallelizable and morever it may be applied to a
lot of tag recommenders. The experiments we did on five datasets with two kinds
of tag recommender demonstrated the efficiency of our method.
|
1309.7611 | Bal\'azs Hidasi | Bal\'azs Hidasi, Domonkos Tikk | Context-aware recommendations from implicit data via scalable tensor
factorization | Extended version of the ECML/PKDD 2012 paper of B. Hidasi & D. Tikk:
Fast ALS-based tensor factorization for context-aware recommendation from
implicit feedback [arXiv:1204.1259] | null | null | null | cs.LG cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Albeit the implicit feedback based recommendation problem - when only the
user history is available but there are no ratings - is the most typical
setting in real-world applications, it is much less researched than the
explicit feedback case. State-of-the-art algorithms that are efficient on the
explicit case cannot be automatically transformed to the implicit case if
scalability should be maintained. There are few implicit feedback benchmark
data sets, therefore new ideas are usually experimented on explicit benchmarks.
In this paper, we propose a generic context-aware implicit feedback recommender
algorithm, coined iTALS. iTALS applies a fast, ALS-based tensor factorization
learning method that scales linearly with the number of non-zero elements in
the tensor. We also present two approximate and faster variants of iTALS using
coordinate descent and conjugate gradient methods at learning. The method also
allows us to incorporate various contextual information into the model while
maintaining its computational efficiency. We present two context-aware variants
of iTALS incorporating seasonality and item purchase sequentiality into the
model to distinguish user behavior at different time intervals, and product
types with different repetitiveness. Experiments run on six data sets shows
that iTALS clearly outperforms context-unaware models and context aware
baselines, while it is on par with factorization machines (beats 7 times out of
12 cases) both in terms of recall and MAP.
| [
{
"version": "v1",
"created": "Sun, 29 Sep 2013 15:50:45 GMT"
}
] | 2013-10-01T00:00:00 | [
[
"Hidasi",
"Balázs",
""
],
[
"Tikk",
"Domonkos",
""
]
] | TITLE: Context-aware recommendations from implicit data via scalable tensor
factorization
ABSTRACT: Albeit the implicit feedback based recommendation problem - when only the
user history is available but there are no ratings - is the most typical
setting in real-world applications, it is much less researched than the
explicit feedback case. State-of-the-art algorithms that are efficient on the
explicit case cannot be automatically transformed to the implicit case if
scalability should be maintained. There are few implicit feedback benchmark
data sets, therefore new ideas are usually experimented on explicit benchmarks.
In this paper, we propose a generic context-aware implicit feedback recommender
algorithm, coined iTALS. iTALS applies a fast, ALS-based tensor factorization
learning method that scales linearly with the number of non-zero elements in
the tensor. We also present two approximate and faster variants of iTALS using
coordinate descent and conjugate gradient methods at learning. The method also
allows us to incorporate various contextual information into the model while
maintaining its computational efficiency. We present two context-aware variants
of iTALS incorporating seasonality and item purchase sequentiality into the
model to distinguish user behavior at different time intervals, and product
types with different repetitiveness. Experiments run on six data sets shows
that iTALS clearly outperforms context-unaware models and context aware
baselines, while it is on par with factorization machines (beats 7 times out of
12 cases) both in terms of recall and MAP.
|
1309.7804 | Michael I. Jordan | Michael I. Jordan | On statistics, computation and scalability | Published in at http://dx.doi.org/10.3150/12-BEJSP17 the Bernoulli
(http://isi.cbs.nl/bernoulli/) by the International Statistical
Institute/Bernoulli Society (http://isi.cbs.nl/BS/bshome.htm) | Bernoulli 2013, Vol. 19, No. 4, 1378-1390 | 10.3150/12-BEJSP17 | IMS-BEJ-BEJSP17 | stat.ML cs.LG math.ST stat.TH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | How should statistical procedures be designed so as to be scalable
computationally to the massive datasets that are increasingly the norm? When
coupled with the requirement that an answer to an inferential question be
delivered within a certain time budget, this question has significant
repercussions for the field of statistics. With the goal of identifying
"time-data tradeoffs," we investigate some of the statistical consequences of
computational perspectives on scability, in particular divide-and-conquer
methodology and hierarchies of convex relaxations.
| [
{
"version": "v1",
"created": "Mon, 30 Sep 2013 11:51:23 GMT"
}
] | 2013-10-01T00:00:00 | [
[
"Jordan",
"Michael I.",
""
]
] | TITLE: On statistics, computation and scalability
ABSTRACT: How should statistical procedures be designed so as to be scalable
computationally to the massive datasets that are increasingly the norm? When
coupled with the requirement that an answer to an inferential question be
delivered within a certain time budget, this question has significant
repercussions for the field of statistics. With the goal of identifying
"time-data tradeoffs," we investigate some of the statistical consequences of
computational perspectives on scability, in particular divide-and-conquer
methodology and hierarchies of convex relaxations.
|
1309.7912 | Ricardo Fabbri | Mauro de Amorim, Ricardo Fabbri, Lucia Maria dos Santos Pinto and
Francisco Duarte Moura Neto | An Image-Based Fluid Surface Pattern Model | a reduced version in Portuguese appears in proceedings of the XVI EMC
- Computational Modeling Meeting (Encontro de Modelagem Computacional), 2013 | null | null | null | cs.CV | http://creativecommons.org/licenses/by/3.0/ | This work aims at generating a model of the ocean surface and its dynamics
from one or more video cameras. The idea is to model wave patterns from video
as a first step towards a larger system of photogrammetric monitoring of marine
conditions for use in offshore oil drilling platforms. The first part of the
proposed approach consists in reducing the dimensionality of sensor data made
up of the many pixels of each frame of the input video streams. This enables
finding a concise number of most relevant parameters to model the temporal
dataset, yielding an efficient data-driven model of the evolution of the
observed surface. The second part proposes stochastic modeling to better
capture the patterns embedded in the data. One can then draw samples from the
final model, which are expected to simulate the behavior of previously observed
flow, in order to determine conditions that match new observations. In this
paper we focus on proposing and discussing the overall approach and on
comparing two different techniques for dimensionality reduction in the first
stage: principal component analysis and diffusion maps. Work is underway on the
second stage of constructing better stochastic models of fluid surface dynamics
as proposed here.
| [
{
"version": "v1",
"created": "Mon, 30 Sep 2013 16:39:21 GMT"
}
] | 2013-10-01T00:00:00 | [
[
"de Amorim",
"Mauro",
""
],
[
"Fabbri",
"Ricardo",
""
],
[
"Pinto",
"Lucia Maria dos Santos",
""
],
[
"Neto",
"Francisco Duarte Moura",
""
]
] | TITLE: An Image-Based Fluid Surface Pattern Model
ABSTRACT: This work aims at generating a model of the ocean surface and its dynamics
from one or more video cameras. The idea is to model wave patterns from video
as a first step towards a larger system of photogrammetric monitoring of marine
conditions for use in offshore oil drilling platforms. The first part of the
proposed approach consists in reducing the dimensionality of sensor data made
up of the many pixels of each frame of the input video streams. This enables
finding a concise number of most relevant parameters to model the temporal
dataset, yielding an efficient data-driven model of the evolution of the
observed surface. The second part proposes stochastic modeling to better
capture the patterns embedded in the data. One can then draw samples from the
final model, which are expected to simulate the behavior of previously observed
flow, in order to determine conditions that match new observations. In this
paper we focus on proposing and discussing the overall approach and on
comparing two different techniques for dimensionality reduction in the first
stage: principal component analysis and diffusion maps. Work is underway on the
second stage of constructing better stochastic models of fluid surface dynamics
as proposed here.
|
1309.7982 | Shou Chung Li scli | Zhung-Xun Liao, Shou-Chung Li, Wen-Chih Peng, Philip S Yu | On the Feature Discovery for App Usage Prediction in Smartphones | 10 pages, 17 figures, ICDM 2013 short paper | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | With the increasing number of mobile Apps developed, they are now closely
integrated into daily life. In this paper, we develop a framework to predict
mobile Apps that are most likely to be used regarding the current device status
of a smartphone. Such an Apps usage prediction framework is a crucial
prerequisite for fast App launching, intelligent user experience, and power
management of smartphones. By analyzing real App usage log data, we discover
two kinds of features: The Explicit Feature (EF) from sensing readings of
built-in sensors, and the Implicit Feature (IF) from App usage relations. The
IF feature is derived by constructing the proposed App Usage Graph (abbreviated
as AUG) that models App usage transitions. In light of AUG, we are able to
discover usage relations among Apps. Since users may have different usage
behaviors on their smartphones, we further propose one personalized feature
selection algorithm. We explore minimum description length (MDL) from the
training data and select those features which need less length to describe the
training data. The personalized feature selection can successfully reduce the
log size and the prediction time. Finally, we adopt the kNN classification
model to predict Apps usage. Note that through the features selected by the
proposed personalized feature selection algorithm, we only need to keep these
features, which in turn reduces the prediction time and avoids the curse of
dimensionality when using the kNN classifier. We conduct a comprehensive
experimental study based on a real mobile App usage dataset. The results
demonstrate the effectiveness of the proposed framework and show the predictive
capability for App usage prediction.
| [
{
"version": "v1",
"created": "Thu, 26 Sep 2013 14:44:10 GMT"
}
] | 2013-10-01T00:00:00 | [
[
"Liao",
"Zhung-Xun",
""
],
[
"Li",
"Shou-Chung",
""
],
[
"Peng",
"Wen-Chih",
""
],
[
"Yu",
"Philip S",
""
]
] | TITLE: On the Feature Discovery for App Usage Prediction in Smartphones
ABSTRACT: With the increasing number of mobile Apps developed, they are now closely
integrated into daily life. In this paper, we develop a framework to predict
mobile Apps that are most likely to be used regarding the current device status
of a smartphone. Such an Apps usage prediction framework is a crucial
prerequisite for fast App launching, intelligent user experience, and power
management of smartphones. By analyzing real App usage log data, we discover
two kinds of features: The Explicit Feature (EF) from sensing readings of
built-in sensors, and the Implicit Feature (IF) from App usage relations. The
IF feature is derived by constructing the proposed App Usage Graph (abbreviated
as AUG) that models App usage transitions. In light of AUG, we are able to
discover usage relations among Apps. Since users may have different usage
behaviors on their smartphones, we further propose one personalized feature
selection algorithm. We explore minimum description length (MDL) from the
training data and select those features which need less length to describe the
training data. The personalized feature selection can successfully reduce the
log size and the prediction time. Finally, we adopt the kNN classification
model to predict Apps usage. Note that through the features selected by the
proposed personalized feature selection algorithm, we only need to keep these
features, which in turn reduces the prediction time and avoids the curse of
dimensionality when using the kNN classifier. We conduct a comprehensive
experimental study based on a real mobile App usage dataset. The results
demonstrate the effectiveness of the proposed framework and show the predictive
capability for App usage prediction.
|
1309.7082 | Sparsh Mittal | Sparsh Mittal | A Cache Reconfiguration Approach for Saving Leakage and Refresh Energy
in Embedded DRAM Caches | Embedded DRAM (eDRAM) caches | null | null | null | cs.AR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In recent years, the size and leakage energy consumption of large last level
caches (LLCs) has increased. To address this, embedded DRAM (eDRAM) caches have
been considered which have lower leakage energy consumption; however eDRAM
caches consume a significant amount of energy in the form of refresh energy. In
this paper, we present a technique for saving both leakage and refresh energy
in eDRAM caches. We use dynamic cache reconfiguration approach to intelligently
turn-off part of the cache to save leakage energy and refresh only valid data
of the active (i.e. not turned-off) cache to save refresh energy. We evaluate
our technique using an x86-64 simulator and SPEC2006 benchmarks and compare it
with a recently proposed technique for saving refresh energy, named Refrint.
The experiments have shown that our technique provides better performance and
energy efficiency than Refrint. Using our technique, for a 2MB LLC and 40
micro-seconds eDRAM refresh period, the average saving in energy over eDRAM
baseline (which periodically refreshes all cache lines) is 22.8%.
| [
{
"version": "v1",
"created": "Thu, 26 Sep 2013 22:18:43 GMT"
}
] | 2013-09-30T00:00:00 | [
[
"Mittal",
"Sparsh",
""
]
] | TITLE: A Cache Reconfiguration Approach for Saving Leakage and Refresh Energy
in Embedded DRAM Caches
ABSTRACT: In recent years, the size and leakage energy consumption of large last level
caches (LLCs) has increased. To address this, embedded DRAM (eDRAM) caches have
been considered which have lower leakage energy consumption; however eDRAM
caches consume a significant amount of energy in the form of refresh energy. In
this paper, we present a technique for saving both leakage and refresh energy
in eDRAM caches. We use dynamic cache reconfiguration approach to intelligently
turn-off part of the cache to save leakage energy and refresh only valid data
of the active (i.e. not turned-off) cache to save refresh energy. We evaluate
our technique using an x86-64 simulator and SPEC2006 benchmarks and compare it
with a recently proposed technique for saving refresh energy, named Refrint.
The experiments have shown that our technique provides better performance and
energy efficiency than Refrint. Using our technique, for a 2MB LLC and 40
micro-seconds eDRAM refresh period, the average saving in energy over eDRAM
baseline (which periodically refreshes all cache lines) is 22.8%.
|
1309.7266 | Ahmed Abbasi | Ahmed Abbasi, Siddharth Kaza and F. Mariam Zahedi | Evaluating Link-Based Techniques for Detecting Fake Pharmacy Websites | Abbasi, A., Kaza, S., and Zahedi, F. M. "Evaluating Link-Based
Techniques for Detecting Fake Pharmacy Websites," In Proceedings of the 19th
Annual Workshop on Information Technologies and Systems, Phoenix, Arizona,
December 14-15, 2009 | null | null | null | cs.CY cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Fake online pharmacies have become increasingly pervasive, constituting over
90% of online pharmacy websites. There is a need for fake website detection
techniques capable of identifying fake online pharmacy websites with a high
degree of accuracy. In this study, we compared several well-known link-based
detection techniques on a large-scale test bed with the hyperlink graph
encompassing over 80 million links between 15.5 million web pages, including
1.2 million known legitimate and fake pharmacy pages. We found that the QoC and
QoL class propagation algorithms achieved an accuracy of over 90% on our
dataset. The results revealed that algorithms that incorporate dual class
propagation as well as inlink and outlink information, on page-level or
site-level graphs, are better suited for detecting fake pharmacy websites. In
addition, site-level analysis yielded significantly better results than
page-level analysis for most algorithms evaluated.
| [
{
"version": "v1",
"created": "Fri, 27 Sep 2013 15:09:24 GMT"
}
] | 2013-09-30T00:00:00 | [
[
"Abbasi",
"Ahmed",
""
],
[
"Kaza",
"Siddharth",
""
],
[
"Zahedi",
"F. Mariam",
""
]
] | TITLE: Evaluating Link-Based Techniques for Detecting Fake Pharmacy Websites
ABSTRACT: Fake online pharmacies have become increasingly pervasive, constituting over
90% of online pharmacy websites. There is a need for fake website detection
techniques capable of identifying fake online pharmacy websites with a high
degree of accuracy. In this study, we compared several well-known link-based
detection techniques on a large-scale test bed with the hyperlink graph
encompassing over 80 million links between 15.5 million web pages, including
1.2 million known legitimate and fake pharmacy pages. We found that the QoC and
QoL class propagation algorithms achieved an accuracy of over 90% on our
dataset. The results revealed that algorithms that incorporate dual class
propagation as well as inlink and outlink information, on page-level or
site-level graphs, are better suited for detecting fake pharmacy websites. In
addition, site-level analysis yielded significantly better results than
page-level analysis for most algorithms evaluated.
|
1309.6691 | Chunhua Shen | Yao Li, Wenjing Jia, Chunhua Shen, Anton van den Hengel | Characterness: An Indicator of Text in the Wild | 11 pages; Appearing in IEEE Trans. on Image Processing | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Text in an image provides vital information for interpreting its contents,
and text in a scene can aide with a variety of tasks from navigation, to
obstacle avoidance, and odometry. Despite its value, however, identifying
general text in images remains a challenging research problem. Motivated by the
need to consider the widely varying forms of natural text, we propose a
bottom-up approach to the problem which reflects the `characterness' of an
image region. In this sense our approach mirrors the move from saliency
detection methods to measures of `objectness'. In order to measure the
characterness we develop three novel cues that are tailored for character
detection, and a Bayesian method for their integration. Because text is made up
of sets of characters, we then design a Markov random field (MRF) model so as
to exploit the inherent dependencies between characters.
We experimentally demonstrate the effectiveness of our characterness cues as
well as the advantage of Bayesian multi-cue integration. The proposed text
detector outperforms state-of-the-art methods on a few benchmark scene text
detection datasets. We also show that our measurement of `characterness' is
superior than state-of-the-art saliency detection models when applied to the
same task.
| [
{
"version": "v1",
"created": "Wed, 25 Sep 2013 23:30:18 GMT"
}
] | 2013-09-27T00:00:00 | [
[
"Li",
"Yao",
""
],
[
"Jia",
"Wenjing",
""
],
[
"Shen",
"Chunhua",
""
],
[
"Hengel",
"Anton van den",
""
]
] | TITLE: Characterness: An Indicator of Text in the Wild
ABSTRACT: Text in an image provides vital information for interpreting its contents,
and text in a scene can aide with a variety of tasks from navigation, to
obstacle avoidance, and odometry. Despite its value, however, identifying
general text in images remains a challenging research problem. Motivated by the
need to consider the widely varying forms of natural text, we propose a
bottom-up approach to the problem which reflects the `characterness' of an
image region. In this sense our approach mirrors the move from saliency
detection methods to measures of `objectness'. In order to measure the
characterness we develop three novel cues that are tailored for character
detection, and a Bayesian method for their integration. Because text is made up
of sets of characters, we then design a Markov random field (MRF) model so as
to exploit the inherent dependencies between characters.
We experimentally demonstrate the effectiveness of our characterness cues as
well as the advantage of Bayesian multi-cue integration. The proposed text
detector outperforms state-of-the-art methods on a few benchmark scene text
detection datasets. We also show that our measurement of `characterness' is
superior than state-of-the-art saliency detection models when applied to the
same task.
|
1309.6722 | Duyu Tang | Tang Duyu, Qin Bing, Zhou LanJun, Wong KamFai, Zhao Yanyan, Liu Ting | Domain-Specific Sentiment Word Extraction by Seed Expansion and Pattern
Generation | null | null | null | null | cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper focuses on the automatic extraction of domain-specific sentiment
word (DSSW), which is a fundamental subtask of sentiment analysis. Most
previous work utilizes manual patterns for this task. However, the performance
of those methods highly relies on the labelled patterns or selected seeds. In
order to overcome the above problem, this paper presents an automatic framework
to detect large-scale domain-specific patterns for DSSW extraction. To this
end, sentiment seeds are extracted from massive dataset of user comments.
Subsequently, these sentiment seeds are expanded by synonyms using a
bootstrapping mechanism. Simultaneously, a synonymy graph is built and the
graph propagation algorithm is applied on the built synonymy graph. Afterwards,
syntactic and sequential relations between target words and high-ranked
sentiment words are extracted automatically to construct large-scale patterns,
which are further used to extracte DSSWs. The experimental results in three
domains reveal the effectiveness of our method.
| [
{
"version": "v1",
"created": "Thu, 26 Sep 2013 05:18:12 GMT"
}
] | 2013-09-27T00:00:00 | [
[
"Duyu",
"Tang",
""
],
[
"Bing",
"Qin",
""
],
[
"LanJun",
"Zhou",
""
],
[
"KamFai",
"Wong",
""
],
[
"Yanyan",
"Zhao",
""
],
[
"Ting",
"Liu",
""
]
] | TITLE: Domain-Specific Sentiment Word Extraction by Seed Expansion and Pattern
Generation
ABSTRACT: This paper focuses on the automatic extraction of domain-specific sentiment
word (DSSW), which is a fundamental subtask of sentiment analysis. Most
previous work utilizes manual patterns for this task. However, the performance
of those methods highly relies on the labelled patterns or selected seeds. In
order to overcome the above problem, this paper presents an automatic framework
to detect large-scale domain-specific patterns for DSSW extraction. To this
end, sentiment seeds are extracted from massive dataset of user comments.
Subsequently, these sentiment seeds are expanded by synonyms using a
bootstrapping mechanism. Simultaneously, a synonymy graph is built and the
graph propagation algorithm is applied on the built synonymy graph. Afterwards,
syntactic and sequential relations between target words and high-ranked
sentiment words are extracted automatically to construct large-scale patterns,
which are further used to extracte DSSWs. The experimental results in three
domains reveal the effectiveness of our method.
|
1309.6811 | Tameem Adel | Tameem Adel, Benn Smith, Ruth Urner, Daniel Stashuk, Daniel J. Lizotte | Generative Multiple-Instance Learning Models For Quantitative
Electromyography | Appears in Proceedings of the Twenty-Ninth Conference on Uncertainty
in Artificial Intelligence (UAI2013) | null | null | UAI-P-2013-PG-2-11 | cs.LG stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present a comprehensive study of the use of generative modeling approaches
for Multiple-Instance Learning (MIL) problems. In MIL a learner receives
training instances grouped together into bags with labels for the bags only
(which might not be correct for the comprised instances). Our work was
motivated by the task of facilitating the diagnosis of neuromuscular disorders
using sets of motor unit potential trains (MUPTs) detected within a muscle
which can be cast as a MIL problem. Our approach leads to a state-of-the-art
solution to the problem of muscle classification. By introducing and analyzing
generative models for MIL in a general framework and examining a variety of
model structures and components, our work also serves as a methodological guide
to modelling MIL tasks. We evaluate our proposed methods both on MUPT datasets
and on the MUSK1 dataset, one of the most widely used benchmarks for MIL.
| [
{
"version": "v1",
"created": "Thu, 26 Sep 2013 12:26:53 GMT"
}
] | 2013-09-27T00:00:00 | [
[
"Adel",
"Tameem",
""
],
[
"Smith",
"Benn",
""
],
[
"Urner",
"Ruth",
""
],
[
"Stashuk",
"Daniel",
""
],
[
"Lizotte",
"Daniel J.",
""
]
] | TITLE: Generative Multiple-Instance Learning Models For Quantitative
Electromyography
ABSTRACT: We present a comprehensive study of the use of generative modeling approaches
for Multiple-Instance Learning (MIL) problems. In MIL a learner receives
training instances grouped together into bags with labels for the bags only
(which might not be correct for the comprised instances). Our work was
motivated by the task of facilitating the diagnosis of neuromuscular disorders
using sets of motor unit potential trains (MUPTs) detected within a muscle
which can be cast as a MIL problem. Our approach leads to a state-of-the-art
solution to the problem of muscle classification. By introducing and analyzing
generative models for MIL in a general framework and examining a variety of
model structures and components, our work also serves as a methodological guide
to modelling MIL tasks. We evaluate our proposed methods both on MUPT datasets
and on the MUSK1 dataset, one of the most widely used benchmarks for MIL.
|
1309.6812 | Saeed Amizadeh | Saeed Amizadeh, Bo Thiesson, Milos Hauskrecht | The Bregman Variational Dual-Tree Framework | Appears in Proceedings of the Twenty-Ninth Conference on Uncertainty
in Artificial Intelligence (UAI2013) | null | null | UAI-P-2013-PG-22-31 | cs.LG stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Graph-based methods provide a powerful tool set for many non-parametric
frameworks in Machine Learning. In general, the memory and computational
complexity of these methods is quadratic in the number of examples in the data
which makes them quickly infeasible for moderate to large scale datasets. A
significant effort to find more efficient solutions to the problem has been
made in the literature. One of the state-of-the-art methods that has been
recently introduced is the Variational Dual-Tree (VDT) framework. Despite some
of its unique features, VDT is currently restricted only to Euclidean spaces
where the Euclidean distance quantifies the similarity. In this paper, we
extend the VDT framework beyond the Euclidean distance to more general Bregman
divergences that include the Euclidean distance as a special case. By
exploiting the properties of the general Bregman divergence, we show how the
new framework can maintain all the pivotal features of the VDT framework and
yet significantly improve its performance in non-Euclidean domains. We apply
the proposed framework to different text categorization problems and
demonstrate its benefits over the original VDT.
| [
{
"version": "v1",
"created": "Thu, 26 Sep 2013 12:28:35 GMT"
}
] | 2013-09-27T00:00:00 | [
[
"Amizadeh",
"Saeed",
""
],
[
"Thiesson",
"Bo",
""
],
[
"Hauskrecht",
"Milos",
""
]
] | TITLE: The Bregman Variational Dual-Tree Framework
ABSTRACT: Graph-based methods provide a powerful tool set for many non-parametric
frameworks in Machine Learning. In general, the memory and computational
complexity of these methods is quadratic in the number of examples in the data
which makes them quickly infeasible for moderate to large scale datasets. A
significant effort to find more efficient solutions to the problem has been
made in the literature. One of the state-of-the-art methods that has been
recently introduced is the Variational Dual-Tree (VDT) framework. Despite some
of its unique features, VDT is currently restricted only to Euclidean spaces
where the Euclidean distance quantifies the similarity. In this paper, we
extend the VDT framework beyond the Euclidean distance to more general Bregman
divergences that include the Euclidean distance as a special case. By
exploiting the properties of the general Bregman divergence, we show how the
new framework can maintain all the pivotal features of the VDT framework and
yet significantly improve its performance in non-Euclidean domains. We apply
the proposed framework to different text categorization problems and
demonstrate its benefits over the original VDT.
|
1309.6819 | Byron Boots | Byron Boots, Geoffrey Gordon, Arthur Gretton | Hilbert Space Embeddings of Predictive State Representations | Appears in Proceedings of the Twenty-Ninth Conference on Uncertainty
in Artificial Intelligence (UAI2013) | null | null | UAI-P-2013-PG-92-101 | cs.LG stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Predictive State Representations (PSRs) are an expressive class of models for
controlled stochastic processes. PSRs represent state as a set of predictions
of future observable events. Because PSRs are defined entirely in terms of
observable data, statistically consistent estimates of PSR parameters can be
learned efficiently by manipulating moments of observed training data. Most
learning algorithms for PSRs have assumed that actions and observations are
finite with low cardinality. In this paper, we generalize PSRs to infinite sets
of observations and actions, using the recent concept of Hilbert space
embeddings of distributions. The essence is to represent the state as a
nonparametric conditional embedding operator in a Reproducing Kernel Hilbert
Space (RKHS) and leverage recent work in kernel methods to estimate, predict,
and update the representation. We show that these Hilbert space embeddings of
PSRs are able to gracefully handle continuous actions and observations, and
that our learned models outperform competing system identification algorithms
on several prediction benchmarks.
| [
{
"version": "v1",
"created": "Thu, 26 Sep 2013 12:35:19 GMT"
}
] | 2013-09-27T00:00:00 | [
[
"Boots",
"Byron",
""
],
[
"Gordon",
"Geoffrey",
""
],
[
"Gretton",
"Arthur",
""
]
] | TITLE: Hilbert Space Embeddings of Predictive State Representations
ABSTRACT: Predictive State Representations (PSRs) are an expressive class of models for
controlled stochastic processes. PSRs represent state as a set of predictions
of future observable events. Because PSRs are defined entirely in terms of
observable data, statistically consistent estimates of PSR parameters can be
learned efficiently by manipulating moments of observed training data. Most
learning algorithms for PSRs have assumed that actions and observations are
finite with low cardinality. In this paper, we generalize PSRs to infinite sets
of observations and actions, using the recent concept of Hilbert space
embeddings of distributions. The essence is to represent the state as a
nonparametric conditional embedding operator in a Reproducing Kernel Hilbert
Space (RKHS) and leverage recent work in kernel methods to estimate, predict,
and update the representation. We show that these Hilbert space embeddings of
PSRs are able to gracefully handle continuous actions and observations, and
that our learned models outperform competing system identification algorithms
on several prediction benchmarks.
|
1309.6829 | Qiang Fu | Qiang Fu, Huahua Wang, Arindam Banerjee | Bethe-ADMM for Tree Decomposition based Parallel MAP Inference | Appears in Proceedings of the Twenty-Ninth Conference on Uncertainty
in Artificial Intelligence (UAI2013) | null | null | UAI-P-2013-PG-222-231 | cs.AI cs.LG stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider the problem of maximum a posteriori (MAP) inference in discrete
graphical models. We present a parallel MAP inference algorithm called
Bethe-ADMM based on two ideas: tree-decomposition of the graph and the
alternating direction method of multipliers (ADMM). However, unlike the
standard ADMM, we use an inexact ADMM augmented with a Bethe-divergence based
proximal function, which makes each subproblem in ADMM easy to solve in
parallel using the sum-product algorithm. We rigorously prove global
convergence of Bethe-ADMM. The proposed algorithm is extensively evaluated on
both synthetic and real datasets to illustrate its effectiveness. Further, the
parallel Bethe-ADMM is shown to scale almost linearly with increasing number of
cores.
| [
{
"version": "v1",
"created": "Thu, 26 Sep 2013 12:38:09 GMT"
}
] | 2013-09-27T00:00:00 | [
[
"Fu",
"Qiang",
""
],
[
"Wang",
"Huahua",
""
],
[
"Banerjee",
"Arindam",
""
]
] | TITLE: Bethe-ADMM for Tree Decomposition based Parallel MAP Inference
ABSTRACT: We consider the problem of maximum a posteriori (MAP) inference in discrete
graphical models. We present a parallel MAP inference algorithm called
Bethe-ADMM based on two ideas: tree-decomposition of the graph and the
alternating direction method of multipliers (ADMM). However, unlike the
standard ADMM, we use an inexact ADMM augmented with a Bethe-divergence based
proximal function, which makes each subproblem in ADMM easy to solve in
parallel using the sum-product algorithm. We rigorously prove global
convergence of Bethe-ADMM. The proposed algorithm is extensively evaluated on
both synthetic and real datasets to illustrate its effectiveness. Further, the
parallel Bethe-ADMM is shown to scale almost linearly with increasing number of
cores.
|
1309.6830 | Ravi Ganti | Ravi Ganti, Alexander G. Gray | Building Bridges: Viewing Active Learning from the Multi-Armed Bandit
Lens | Appears in Proceedings of the Twenty-Ninth Conference on Uncertainty
in Artificial Intelligence (UAI2013) | null | null | UAI-P-2013-PG-232-241 | cs.LG stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we propose a multi-armed bandit inspired, pool based active
learning algorithm for the problem of binary classification. By carefully
constructing an analogy between active learning and multi-armed bandits, we
utilize ideas such as lower confidence bounds, and self-concordant
regularization from the multi-armed bandit literature to design our proposed
algorithm. Our algorithm is a sequential algorithm, which in each round assigns
a sampling distribution on the pool, samples one point from this distribution,
and queries the oracle for the label of this sampled point. The design of this
sampling distribution is also inspired by the analogy between active learning
and multi-armed bandits. We show how to derive lower confidence bounds required
by our algorithm. Experimental comparisons to previously proposed active
learning algorithms show superior performance on some standard UCI datasets.
| [
{
"version": "v1",
"created": "Thu, 26 Sep 2013 12:39:01 GMT"
}
] | 2013-09-27T00:00:00 | [
[
"Ganti",
"Ravi",
""
],
[
"Gray",
"Alexander G.",
""
]
] | TITLE: Building Bridges: Viewing Active Learning from the Multi-Armed Bandit
Lens
ABSTRACT: In this paper we propose a multi-armed bandit inspired, pool based active
learning algorithm for the problem of binary classification. By carefully
constructing an analogy between active learning and multi-armed bandits, we
utilize ideas such as lower confidence bounds, and self-concordant
regularization from the multi-armed bandit literature to design our proposed
algorithm. Our algorithm is a sequential algorithm, which in each round assigns
a sampling distribution on the pool, samples one point from this distribution,
and queries the oracle for the label of this sampled point. The design of this
sampling distribution is also inspired by the analogy between active learning
and multi-armed bandits. We show how to derive lower confidence bounds required
by our algorithm. Experimental comparisons to previously proposed active
learning algorithms show superior performance on some standard UCI datasets.
|
1309.6852 | Shuzi Niu | Shuzi Niu, Yanyan Lan, Jiafeng Guo, Xueqi Cheng | Stochastic Rank Aggregation | Appears in Proceedings of the Twenty-Ninth Conference on Uncertainty
in Artificial Intelligence (UAI2013) | null | null | UAI-P-2013-PG-478-487 | cs.LG cs.IR stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper addresses the problem of rank aggregation, which aims to find a
consensus ranking among multiple ranking inputs. Traditional rank aggregation
methods are deterministic, and can be categorized into explicit and implicit
methods depending on whether rank information is explicitly or implicitly
utilized. Surprisingly, experimental results on real data sets show that
explicit rank aggregation methods would not work as well as implicit methods,
although rank information is critical for the task. Our analysis indicates that
the major reason might be the unreliable rank information from incomplete
ranking inputs. To solve this problem, we propose to incorporate uncertainty
into rank aggregation and tackle the problem in both unsupervised and
supervised scenario. We call this novel framework {stochastic rank aggregation}
(St.Agg for short). Specifically, we introduce a prior distribution on ranks,
and transform the ranking functions or objectives in traditional explicit
methods to their expectations over this distribution. Our experiments on
benchmark data sets show that the proposed St.Agg outperforms the baselines in
both unsupervised and supervised scenarios.
| [
{
"version": "v1",
"created": "Thu, 26 Sep 2013 12:46:39 GMT"
}
] | 2013-09-27T00:00:00 | [
[
"Niu",
"Shuzi",
""
],
[
"Lan",
"Yanyan",
""
],
[
"Guo",
"Jiafeng",
""
],
[
"Cheng",
"Xueqi",
""
]
] | TITLE: Stochastic Rank Aggregation
ABSTRACT: This paper addresses the problem of rank aggregation, which aims to find a
consensus ranking among multiple ranking inputs. Traditional rank aggregation
methods are deterministic, and can be categorized into explicit and implicit
methods depending on whether rank information is explicitly or implicitly
utilized. Surprisingly, experimental results on real data sets show that
explicit rank aggregation methods would not work as well as implicit methods,
although rank information is critical for the task. Our analysis indicates that
the major reason might be the unreliable rank information from incomplete
ranking inputs. To solve this problem, we propose to incorporate uncertainty
into rank aggregation and tackle the problem in both unsupervised and
supervised scenario. We call this novel framework {stochastic rank aggregation}
(St.Agg for short). Specifically, we introduce a prior distribution on ranks,
and transform the ranking functions or objectives in traditional explicit
methods to their expectations over this distribution. Our experiments on
benchmark data sets show that the proposed St.Agg outperforms the baselines in
both unsupervised and supervised scenarios.
|
1309.6867 | Yaniv Tenzer | Yaniv Tenzer, Gal Elidan | Speedy Model Selection (SMS) for Copula Models | Appears in Proceedings of the Twenty-Ninth Conference on Uncertainty
in Artificial Intelligence (UAI2013) | null | null | UAI-P-2013-PG-625-634 | cs.LG stat.ME | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We tackle the challenge of efficiently learning the structure of expressive
multivariate real-valued densities of copula graphical models. We start by
theoretically substantiating the conjecture that for many copula families the
magnitude of Spearman's rank correlation coefficient is monotone in the
expected contribution of an edge in network, namely the negative copula
entropy. We then build on this theory and suggest a novel Bayesian approach
that makes use of a prior over values of Spearman's rho for learning
copula-based models that involve a mix of copula families. We demonstrate the
generalization effectiveness of our highly efficient approach on sizable and
varied real-life datasets.
| [
{
"version": "v1",
"created": "Thu, 26 Sep 2013 12:51:22 GMT"
}
] | 2013-09-27T00:00:00 | [
[
"Tenzer",
"Yaniv",
""
],
[
"Elidan",
"Gal",
""
]
] | TITLE: Speedy Model Selection (SMS) for Copula Models
ABSTRACT: We tackle the challenge of efficiently learning the structure of expressive
multivariate real-valued densities of copula graphical models. We start by
theoretically substantiating the conjecture that for many copula families the
magnitude of Spearman's rank correlation coefficient is monotone in the
expected contribution of an edge in network, namely the negative copula
entropy. We then build on this theory and suggest a novel Bayesian approach
that makes use of a prior over values of Spearman's rho for learning
copula-based models that involve a mix of copula families. We demonstrate the
generalization effectiveness of our highly efficient approach on sizable and
varied real-life datasets.
|
1309.6868 | Charles Tripp | Charles Tripp, Ross D. Shachter | Approximate Kalman Filter Q-Learning for Continuous State-Space MDPs | Appears in Proceedings of the Twenty-Ninth Conference on Uncertainty
in Artificial Intelligence (UAI2013) | null | null | UAI-P-2013-PG-644-653 | cs.LG stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We seek to learn an effective policy for a Markov Decision Process (MDP) with
continuous states via Q-Learning. Given a set of basis functions over state
action pairs we search for a corresponding set of linear weights that minimizes
the mean Bellman residual. Our algorithm uses a Kalman filter model to estimate
those weights and we have developed a simpler approximate Kalman filter model
that outperforms the current state of the art projected TD-Learning methods on
several standard benchmark problems.
| [
{
"version": "v1",
"created": "Thu, 26 Sep 2013 12:51:47 GMT"
}
] | 2013-09-27T00:00:00 | [
[
"Tripp",
"Charles",
""
],
[
"Shachter",
"Ross D.",
""
]
] | TITLE: Approximate Kalman Filter Q-Learning for Continuous State-Space MDPs
ABSTRACT: We seek to learn an effective policy for a Markov Decision Process (MDP) with
continuous states via Q-Learning. Given a set of basis functions over state
action pairs we search for a corresponding set of linear weights that minimizes
the mean Bellman residual. Our algorithm uses a Kalman filter model to estimate
those weights and we have developed a simpler approximate Kalman filter model
that outperforms the current state of the art projected TD-Learning methods on
several standard benchmark problems.
|
1309.6874 | Pengtao Xie | Pengtao Xie, Eric P. Xing | Integrating Document Clustering and Topic Modeling | Appears in Proceedings of the Twenty-Ninth Conference on Uncertainty
in Artificial Intelligence (UAI2013) | null | null | UAI-P-2013-PG-694-703 | cs.LG cs.CL cs.IR stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Document clustering and topic modeling are two closely related tasks which
can mutually benefit each other. Topic modeling can project documents into a
topic space which facilitates effective document clustering. Cluster labels
discovered by document clustering can be incorporated into topic models to
extract local topics specific to each cluster and global topics shared by all
clusters. In this paper, we propose a multi-grain clustering topic model
(MGCTM) which integrates document clustering and topic modeling into a unified
framework and jointly performs the two tasks to achieve the overall best
performance. Our model tightly couples two components: a mixture component used
for discovering latent groups in document collection and a topic model
component used for mining multi-grain topics including local topics specific to
each cluster and global topics shared across clusters.We employ variational
inference to approximate the posterior of hidden variables and learn model
parameters. Experiments on two datasets demonstrate the effectiveness of our
model.
| [
{
"version": "v1",
"created": "Thu, 26 Sep 2013 12:54:02 GMT"
}
] | 2013-09-27T00:00:00 | [
[
"Xie",
"Pengtao",
""
],
[
"Xing",
"Eric P.",
""
]
] | TITLE: Integrating Document Clustering and Topic Modeling
ABSTRACT: Document clustering and topic modeling are two closely related tasks which
can mutually benefit each other. Topic modeling can project documents into a
topic space which facilitates effective document clustering. Cluster labels
discovered by document clustering can be incorporated into topic models to
extract local topics specific to each cluster and global topics shared by all
clusters. In this paper, we propose a multi-grain clustering topic model
(MGCTM) which integrates document clustering and topic modeling into a unified
framework and jointly performs the two tasks to achieve the overall best
performance. Our model tightly couples two components: a mixture component used
for discovering latent groups in document collection and a topic model
component used for mining multi-grain topics including local topics specific to
each cluster and global topics shared across clusters.We employ variational
inference to approximate the posterior of hidden variables and learn model
parameters. Experiments on two datasets demonstrate the effectiveness of our
model.
|
1309.6379 | ANqi Qiu DR | Jia Du, A. Pasha Hosseinbor, Moo K. Chung, Barbara B. Bendlin, Gaurav
Suryawanshi, Andrew L. Alexander, Anqi Qiu | Diffeomorphic Metric Mapping and Probabilistic Atlas Generation of
Hybrid Diffusion Imaging based on BFOR Signal Basis | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose a large deformation diffeomorphic metric mapping algorithm to
align multiple b-value diffusion weighted imaging (mDWI) data, specifically
acquired via hybrid diffusion imaging (HYDI), denoted as LDDMM-HYDI. We then
propose a Bayesian model for estimating the white matter atlas from HYDIs. We
adopt the work given in Hosseinbor et al. (2012) and represent the q-space
diffusion signal with the Bessel Fourier orientation reconstruction (BFOR)
signal basis. The BFOR framework provides the representation of mDWI in the
q-space and thus reduces memory requirement. In addition, since the BFOR signal
basis is orthonormal, the L2 norm that quantifies the differences in the
q-space signals of any two mDWI datasets can be easily computed as the sum of
the squared differences in the BFOR expansion coefficients. In this work, we
show that the reorientation of the $q$-space signal due to spatial
transformation can be easily defined on the BFOR signal basis. We incorporate
the BFOR signal basis into the LDDMM framework and derive the gradient descent
algorithm for LDDMM-HYDI with explicit orientation optimization. Additionally,
we extend the previous Bayesian atlas estimation framework for scalar-valued
images to HYDIs and derive the expectation-maximization algorithm for solving
the HYDI atlas estimation problem. Using real HYDI datasets, we show the
Bayesian model generates the white matter atlas with anatomical details.
Moreover, we show that it is important to consider the variation of mDWI
reorientation due to a small change in diffeomorphic transformation in the
LDDMM-HYDI optimization and to incorporate the full information of HYDI for
aligning mDWI.
| [
{
"version": "v1",
"created": "Wed, 25 Sep 2013 01:57:50 GMT"
}
] | 2013-09-26T00:00:00 | [
[
"Du",
"Jia",
""
],
[
"Hosseinbor",
"A. Pasha",
""
],
[
"Chung",
"Moo K.",
""
],
[
"Bendlin",
"Barbara B.",
""
],
[
"Suryawanshi",
"Gaurav",
""
],
[
"Alexander",
"Andrew L.",
""
],
[
"Qiu",
"Anqi",
""
]
] | TITLE: Diffeomorphic Metric Mapping and Probabilistic Atlas Generation of
Hybrid Diffusion Imaging based on BFOR Signal Basis
ABSTRACT: We propose a large deformation diffeomorphic metric mapping algorithm to
align multiple b-value diffusion weighted imaging (mDWI) data, specifically
acquired via hybrid diffusion imaging (HYDI), denoted as LDDMM-HYDI. We then
propose a Bayesian model for estimating the white matter atlas from HYDIs. We
adopt the work given in Hosseinbor et al. (2012) and represent the q-space
diffusion signal with the Bessel Fourier orientation reconstruction (BFOR)
signal basis. The BFOR framework provides the representation of mDWI in the
q-space and thus reduces memory requirement. In addition, since the BFOR signal
basis is orthonormal, the L2 norm that quantifies the differences in the
q-space signals of any two mDWI datasets can be easily computed as the sum of
the squared differences in the BFOR expansion coefficients. In this work, we
show that the reorientation of the $q$-space signal due to spatial
transformation can be easily defined on the BFOR signal basis. We incorporate
the BFOR signal basis into the LDDMM framework and derive the gradient descent
algorithm for LDDMM-HYDI with explicit orientation optimization. Additionally,
we extend the previous Bayesian atlas estimation framework for scalar-valued
images to HYDIs and derive the expectation-maximization algorithm for solving
the HYDI atlas estimation problem. Using real HYDI datasets, we show the
Bayesian model generates the white matter atlas with anatomical details.
Moreover, we show that it is important to consider the variation of mDWI
reorientation due to a small change in diffeomorphic transformation in the
LDDMM-HYDI optimization and to incorporate the full information of HYDI for
aligning mDWI.
|
1211.6807 | Sungmin Kim | Sungmin Kim and Tao Shi | Scalable Spectral Algorithms for Community Detection in Directed
Networks | Single column, 40 pages, 6 figures and 7 tables | null | null | null | cs.SI physics.soc-ph stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Community detection has been one of the central problems in network studies
and directed network is particularly challenging due to asymmetry among its
links. In this paper, we found that incorporating the direction of links
reveals new perspectives on communities regarding to two different roles,
source and terminal, that a node plays in each community. Intriguingly, such
communities appear to be connected with unique spectral property of the graph
Laplacian of the adjacency matrix and we exploit this connection by using
regularized SVD methods. We propose harvesting algorithms, coupled with
regularized SVDs, that are linearly scalable for efficient identification of
communities in huge directed networks. The proposed algorithm shows great
performance and scalability on benchmark networks in simulations and
successfully recovers communities in real network applications.
| [
{
"version": "v1",
"created": "Thu, 29 Nov 2012 03:35:17 GMT"
},
{
"version": "v2",
"created": "Mon, 23 Sep 2013 17:15:15 GMT"
}
] | 2013-09-24T00:00:00 | [
[
"Kim",
"Sungmin",
""
],
[
"Shi",
"Tao",
""
]
] | TITLE: Scalable Spectral Algorithms for Community Detection in Directed
Networks
ABSTRACT: Community detection has been one of the central problems in network studies
and directed network is particularly challenging due to asymmetry among its
links. In this paper, we found that incorporating the direction of links
reveals new perspectives on communities regarding to two different roles,
source and terminal, that a node plays in each community. Intriguingly, such
communities appear to be connected with unique spectral property of the graph
Laplacian of the adjacency matrix and we exploit this connection by using
regularized SVD methods. We propose harvesting algorithms, coupled with
regularized SVDs, that are linearly scalable for efficient identification of
communities in huge directed networks. The proposed algorithm shows great
performance and scalability on benchmark networks in simulations and
successfully recovers communities in real network applications.
|
1212.2044 | Gabriel Kronberger | Gabriel Kronberger, Stefan Fink, Michael Kommenda and Michael
Affenzeller | Macro-Economic Time Series Modeling and Interaction Networks | The original publication is available at
http://link.springer.com/chapter/10.1007/978-3-642-20520-0_11 | Applications of Evolutionary Computation, LNCS 6625 (Springer
Berlin Heidelberg), pp. 101-110 (2011) | 10.1007/978-3-642-20520-0_11 | null | cs.NE stat.AP | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Macro-economic models describe the dynamics of economic quantities. The
estimations and forecasts produced by such models play a substantial role for
financial and political decisions. In this contribution we describe an approach
based on genetic programming and symbolic regression to identify variable
interactions in large datasets. In the proposed approach multiple symbolic
regression runs are executed for each variable of the dataset to find
potentially interesting models. The result is a variable interaction network
that describes which variables are most relevant for the approximation of each
variable of the dataset. This approach is applied to a macro-economic dataset
with monthly observations of important economic indicators in order to identify
potentially interesting dependencies of these indicators. The resulting
interaction network of macro-economic indicators is briefly discussed and two
of the identified models are presented in detail. The two models approximate
the help wanted index and the CPI inflation in the US.
| [
{
"version": "v1",
"created": "Mon, 10 Dec 2012 12:04:58 GMT"
},
{
"version": "v2",
"created": "Mon, 23 Sep 2013 16:58:12 GMT"
}
] | 2013-09-24T00:00:00 | [
[
"Kronberger",
"Gabriel",
""
],
[
"Fink",
"Stefan",
""
],
[
"Kommenda",
"Michael",
""
],
[
"Affenzeller",
"Michael",
""
]
] | TITLE: Macro-Economic Time Series Modeling and Interaction Networks
ABSTRACT: Macro-economic models describe the dynamics of economic quantities. The
estimations and forecasts produced by such models play a substantial role for
financial and political decisions. In this contribution we describe an approach
based on genetic programming and symbolic regression to identify variable
interactions in large datasets. In the proposed approach multiple symbolic
regression runs are executed for each variable of the dataset to find
potentially interesting models. The result is a variable interaction network
that describes which variables are most relevant for the approximation of each
variable of the dataset. This approach is applied to a macro-economic dataset
with monthly observations of important economic indicators in order to identify
potentially interesting dependencies of these indicators. The resulting
interaction network of macro-economic indicators is briefly discussed and two
of the identified models are presented in detail. The two models approximate
the help wanted index and the CPI inflation in the US.
|
1309.5427 | Gang Chen | Gang Chen | Latent Fisher Discriminant Analysis | 12 pages | null | null | null | cs.LG cs.CV stat.ML | http://creativecommons.org/licenses/by/3.0/ | Linear Discriminant Analysis (LDA) is a well-known method for dimensionality
reduction and classification. Previous studies have also extended the
binary-class case into multi-classes. However, many applications, such as
object detection and keyframe extraction cannot provide consistent
instance-label pairs, while LDA requires labels on instance level for training.
Thus it cannot be directly applied for semi-supervised classification problem.
In this paper, we overcome this limitation and propose a latent variable Fisher
discriminant analysis model. We relax the instance-level labeling into
bag-level, is a kind of semi-supervised (video-level labels of event type are
required for semantic frame extraction) and incorporates a data-driven prior
over the latent variables. Hence, our method combines the latent variable
inference and dimension reduction in an unified bayesian framework. We test our
method on MUSK and Corel data sets and yield competitive results compared to
the baseline approach. We also demonstrate its capacity on the challenging
TRECVID MED11 dataset for semantic keyframe extraction and conduct a
human-factors ranking-based experimental evaluation, which clearly demonstrates
our proposed method consistently extracts more semantically meaningful
keyframes than challenging baselines.
| [
{
"version": "v1",
"created": "Sat, 21 Sep 2013 03:42:04 GMT"
}
] | 2013-09-24T00:00:00 | [
[
"Chen",
"Gang",
""
]
] | TITLE: Latent Fisher Discriminant Analysis
ABSTRACT: Linear Discriminant Analysis (LDA) is a well-known method for dimensionality
reduction and classification. Previous studies have also extended the
binary-class case into multi-classes. However, many applications, such as
object detection and keyframe extraction cannot provide consistent
instance-label pairs, while LDA requires labels on instance level for training.
Thus it cannot be directly applied for semi-supervised classification problem.
In this paper, we overcome this limitation and propose a latent variable Fisher
discriminant analysis model. We relax the instance-level labeling into
bag-level, is a kind of semi-supervised (video-level labels of event type are
required for semantic frame extraction) and incorporates a data-driven prior
over the latent variables. Hence, our method combines the latent variable
inference and dimension reduction in an unified bayesian framework. We test our
method on MUSK and Corel data sets and yield competitive results compared to
the baseline approach. We also demonstrate its capacity on the challenging
TRECVID MED11 dataset for semantic keyframe extraction and conduct a
human-factors ranking-based experimental evaluation, which clearly demonstrates
our proposed method consistently extracts more semantically meaningful
keyframes than challenging baselines.
|
1309.5657 | Tarek El-Shishtawy Ahmed | T.El-Shishtawy | A Hybrid Algorithm for Matching Arabic Names | null | International Journal of Computational Linguistics Research Volume
4 Number 2 June 2013 | null | null | cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, a new hybrid algorithm which combines both of token-based and
character-based approaches is presented. The basic Levenshtein approach has
been extended to token-based distance metric. The distance metric is enhanced
to set the proper granularity level behavior of the algorithm. It smoothly maps
a threshold of misspellings differences at the character level, and the
importance of token level errors in terms of token's position and frequency.
Using a large Arabic dataset, the experimental results show that the proposed
algorithm overcomes successfully many types of errors such as: typographical
errors, omission or insertion of middle name components, omission of
non-significant popular name components, and different writing styles character
variations. When compared the results with other classical algorithms, using
the same dataset, the proposed algorithm was found to increase the minimum
success level of best tested algorithms, while achieving higher upper limits .
| [
{
"version": "v1",
"created": "Sun, 22 Sep 2013 22:06:26 GMT"
}
] | 2013-09-24T00:00:00 | [
[
"El-Shishtawy",
"T.",
""
]
] | TITLE: A Hybrid Algorithm for Matching Arabic Names
ABSTRACT: In this paper, a new hybrid algorithm which combines both of token-based and
character-based approaches is presented. The basic Levenshtein approach has
been extended to token-based distance metric. The distance metric is enhanced
to set the proper granularity level behavior of the algorithm. It smoothly maps
a threshold of misspellings differences at the character level, and the
importance of token level errors in terms of token's position and frequency.
Using a large Arabic dataset, the experimental results show that the proposed
algorithm overcomes successfully many types of errors such as: typographical
errors, omission or insertion of middle name components, omission of
non-significant popular name components, and different writing styles character
variations. When compared the results with other classical algorithms, using
the same dataset, the proposed algorithm was found to increase the minimum
success level of best tested algorithms, while achieving higher upper limits .
|
1309.5843 | Marco Guerini | Marco Guerini, Lorenzo Gatti, Marco Turchi | Sentiment Analysis: How to Derive Prior Polarities from SentiWordNet | To appear in Proceedings of EMNLP 2013 | null | null | null | cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Assigning a positive or negative score to a word out of context (i.e. a
word's prior polarity) is a challenging task for sentiment analysis. In the
literature, various approaches based on SentiWordNet have been proposed. In
this paper, we compare the most often used techniques together with newly
proposed ones and incorporate all of them in a learning framework to see
whether blending them can further improve the estimation of prior polarity
scores. Using two different versions of SentiWordNet and testing regression and
classification models across tasks and datasets, our learning approach
consistently outperforms the single metrics, providing a new state-of-the-art
approach in computing words' prior polarity for sentiment analysis. We conclude
our investigation showing interesting biases in calculated prior polarity
scores when word Part of Speech and annotator gender are considered.
| [
{
"version": "v1",
"created": "Mon, 23 Sep 2013 15:26:09 GMT"
}
] | 2013-09-24T00:00:00 | [
[
"Guerini",
"Marco",
""
],
[
"Gatti",
"Lorenzo",
""
],
[
"Turchi",
"Marco",
""
]
] | TITLE: Sentiment Analysis: How to Derive Prior Polarities from SentiWordNet
ABSTRACT: Assigning a positive or negative score to a word out of context (i.e. a
word's prior polarity) is a challenging task for sentiment analysis. In the
literature, various approaches based on SentiWordNet have been proposed. In
this paper, we compare the most often used techniques together with newly
proposed ones and incorporate all of them in a learning framework to see
whether blending them can further improve the estimation of prior polarity
scores. Using two different versions of SentiWordNet and testing regression and
classification models across tasks and datasets, our learning approach
consistently outperforms the single metrics, providing a new state-of-the-art
approach in computing words' prior polarity for sentiment analysis. We conclude
our investigation showing interesting biases in calculated prior polarity
scores when word Part of Speech and annotator gender are considered.
|
1309.5896 | Gabriel Kronberger | Gabriel Kronberger and Stephan Winkler and Michael Affenzeller and
Andreas Beham and Stefan Wagner | On the Success Rate of Crossover Operators for Genetic Programming with
Offspring Selection | The final publication is available at
http://link.springer.com/chapter/10.1007/978-3-642-04772-5_102 | Computer Aided Systems Theory - EUROCAST 2009, Lecture Notes in
Computer Science Volume 5717, 2009, pp 793-800, Springer | 10.1007/978-3-642-04772-5_102 | null | cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Genetic programming is a powerful heuristic search technique that is used for
a number of real world applications to solve among others regression,
classification, and time-series forecasting problems. A lot of progress towards
a theoretic description of genetic programming in form of schema theorems has
been made, but the internal dynamics and success factors of genetic programming
are still not fully understood. In particular, the effects of different
crossover operators in combination with offspring selection are largely
unknown.
This contribution sheds light on the ability of well-known GP crossover
operators to create better offspring when applied to benchmark problems. We
conclude that standard (sub-tree swapping) crossover is a good default choice
in combination with offspring selection, and that GP with offspring selection
and random selection of crossover operators can improve the performance of the
algorithm in terms of best solution quality when no solution size constraints
are applied.
| [
{
"version": "v1",
"created": "Mon, 23 Sep 2013 17:54:22 GMT"
}
] | 2013-09-24T00:00:00 | [
[
"Kronberger",
"Gabriel",
""
],
[
"Winkler",
"Stephan",
""
],
[
"Affenzeller",
"Michael",
""
],
[
"Beham",
"Andreas",
""
],
[
"Wagner",
"Stefan",
""
]
] | TITLE: On the Success Rate of Crossover Operators for Genetic Programming with
Offspring Selection
ABSTRACT: Genetic programming is a powerful heuristic search technique that is used for
a number of real world applications to solve among others regression,
classification, and time-series forecasting problems. A lot of progress towards
a theoretic description of genetic programming in form of schema theorems has
been made, but the internal dynamics and success factors of genetic programming
are still not fully understood. In particular, the effects of different
crossover operators in combination with offspring selection are largely
unknown.
This contribution sheds light on the ability of well-known GP crossover
operators to create better offspring when applied to benchmark problems. We
conclude that standard (sub-tree swapping) crossover is a good default choice
in combination with offspring selection, and that GP with offspring selection
and random selection of crossover operators can improve the performance of the
algorithm in terms of best solution quality when no solution size constraints
are applied.
|
1309.5931 | Gabriel Kronberger | Michael Kommenda and Gabriel Kronberger and Christoph Feilmayr and
Michael Affenzeller | Data Mining using Unguided Symbolic Regression on a Blast Furnace
Dataset | Presented at Workshop for Heuristic Problem Solving, Computer Aided
Systems Theory - EUROCAST 2011. The final publication is available at
http://link.springer.com/chapter/10.1007/978-3-642-27549-4_51 | Computer Aided Systems Theory - EUROCAST 2011, Lecture Notes in
Computer Science Volume 6927, 2012, pp 400-407 | 10.1007/978-3-642-27549-4_51 | null | cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper a data mining approach for variable selection and knowledge
extraction from datasets is presented. The approach is based on unguided
symbolic regression (every variable present in the dataset is treated as the
target variable in multiple regression runs) and a novel variable relevance
metric for genetic programming. The relevance of each input variable is
calculated and a model approximating the target variable is created. The
genetic programming configurations with different target variables are executed
multiple times to reduce stochastic effects and the aggregated results are
displayed as a variable interaction network. This interaction network
highlights important system components and implicit relations between the
variables. The whole approach is tested on a blast furnace dataset, because of
the complexity of the blast furnace and the many interrelations between the
variables. Finally the achieved results are discussed with respect to existing
knowledge about the blast furnace process.
| [
{
"version": "v1",
"created": "Mon, 23 Sep 2013 19:35:29 GMT"
}
] | 2013-09-24T00:00:00 | [
[
"Kommenda",
"Michael",
""
],
[
"Kronberger",
"Gabriel",
""
],
[
"Feilmayr",
"Christoph",
""
],
[
"Affenzeller",
"Michael",
""
]
] | TITLE: Data Mining using Unguided Symbolic Regression on a Blast Furnace
Dataset
ABSTRACT: In this paper a data mining approach for variable selection and knowledge
extraction from datasets is presented. The approach is based on unguided
symbolic regression (every variable present in the dataset is treated as the
target variable in multiple regression runs) and a novel variable relevance
metric for genetic programming. The relevance of each input variable is
calculated and a model approximating the target variable is created. The
genetic programming configurations with different target variables are executed
multiple times to reduce stochastic effects and the aggregated results are
displayed as a variable interaction network. This interaction network
highlights important system components and implicit relations between the
variables. The whole approach is tested on a blast furnace dataset, because of
the complexity of the blast furnace and the many interrelations between the
variables. Finally the achieved results are discussed with respect to existing
knowledge about the blast furnace process.
|
1111.5062 | Emiliano De Cristofaro | Carlo Blundo, Emiliano De Cristofaro, Paolo Gasti | EsPRESSo: Efficient Privacy-Preserving Evaluation of Sample Set
Similarity | A preliminary version of this paper was published in the Proceedings
of the 7th ESORICS International Workshop on Digital Privacy Management (DPM
2012). This is the full version, appearing in the Journal of Computer
Security | null | null | null | cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Electronic information is increasingly often shared among entities without
complete mutual trust. To address related security and privacy issues, a few
cryptographic techniques have emerged that support privacy-preserving
information sharing and retrieval. One interesting open problem in this context
involves two parties that need to assess the similarity of their datasets, but
are reluctant to disclose their actual content. This paper presents an
efficient and provably-secure construction supporting the privacy-preserving
evaluation of sample set similarity, where similarity is measured as the
Jaccard index. We present two protocols: the first securely computes the
(Jaccard) similarity of two sets, and the second approximates it, using MinHash
techniques, with lower complexities. We show that our novel protocols are
attractive in many compelling applications, including document/multimedia
similarity, biometric authentication, and genetic tests. In the process, we
demonstrate that our constructions are appreciably more efficient than prior
work.
| [
{
"version": "v1",
"created": "Mon, 21 Nov 2011 23:35:47 GMT"
},
{
"version": "v2",
"created": "Wed, 23 Nov 2011 21:51:04 GMT"
},
{
"version": "v3",
"created": "Wed, 11 Apr 2012 02:09:27 GMT"
},
{
"version": "v4",
"created": "Fri, 20 Jul 2012 19:36:07 GMT"
},
{
"version": "v5",
"created": "Fri, 20 Sep 2013 00:43:44 GMT"
}
] | 2013-09-23T00:00:00 | [
[
"Blundo",
"Carlo",
""
],
[
"De Cristofaro",
"Emiliano",
""
],
[
"Gasti",
"Paolo",
""
]
] | TITLE: EsPRESSo: Efficient Privacy-Preserving Evaluation of Sample Set
Similarity
ABSTRACT: Electronic information is increasingly often shared among entities without
complete mutual trust. To address related security and privacy issues, a few
cryptographic techniques have emerged that support privacy-preserving
information sharing and retrieval. One interesting open problem in this context
involves two parties that need to assess the similarity of their datasets, but
are reluctant to disclose their actual content. This paper presents an
efficient and provably-secure construction supporting the privacy-preserving
evaluation of sample set similarity, where similarity is measured as the
Jaccard index. We present two protocols: the first securely computes the
(Jaccard) similarity of two sets, and the second approximates it, using MinHash
techniques, with lower complexities. We show that our novel protocols are
attractive in many compelling applications, including document/multimedia
similarity, biometric authentication, and genetic tests. In the process, we
demonstrate that our constructions are appreciably more efficient than prior
work.
|
1302.4389 | Ian Goodfellow | Ian J. Goodfellow and David Warde-Farley and Mehdi Mirza and Aaron
Courville and Yoshua Bengio | Maxout Networks | This is the version of the paper that appears in ICML 2013 | JMLR WCP 28 (3): 1319-1327, 2013 | null | null | stat.ML cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider the problem of designing models to leverage a recently introduced
approximate model averaging technique called dropout. We define a simple new
model called maxout (so named because its output is the max of a set of inputs,
and because it is a natural companion to dropout) designed to both facilitate
optimization by dropout and improve the accuracy of dropout's fast approximate
model averaging technique. We empirically verify that the model successfully
accomplishes both of these tasks. We use maxout and dropout to demonstrate
state of the art classification performance on four benchmark datasets: MNIST,
CIFAR-10, CIFAR-100, and SVHN.
| [
{
"version": "v1",
"created": "Mon, 18 Feb 2013 18:59:07 GMT"
},
{
"version": "v2",
"created": "Tue, 19 Feb 2013 04:39:48 GMT"
},
{
"version": "v3",
"created": "Wed, 20 Feb 2013 22:33:13 GMT"
},
{
"version": "v4",
"created": "Fri, 20 Sep 2013 08:54:35 GMT"
}
] | 2013-09-23T00:00:00 | [
[
"Goodfellow",
"Ian J.",
""
],
[
"Warde-Farley",
"David",
""
],
[
"Mirza",
"Mehdi",
""
],
[
"Courville",
"Aaron",
""
],
[
"Bengio",
"Yoshua",
""
]
] | TITLE: Maxout Networks
ABSTRACT: We consider the problem of designing models to leverage a recently introduced
approximate model averaging technique called dropout. We define a simple new
model called maxout (so named because its output is the max of a set of inputs,
and because it is a natural companion to dropout) designed to both facilitate
optimization by dropout and improve the accuracy of dropout's fast approximate
model averaging technique. We empirically verify that the model successfully
accomplishes both of these tasks. We use maxout and dropout to demonstrate
state of the art classification performance on four benchmark datasets: MNIST,
CIFAR-10, CIFAR-100, and SVHN.
|
1309.5137 | EPTCS | Peter Sestoft (IT University of Copenhagen) | Online partial evaluation of sheet-defined functions | In Proceedings Festschrift for Dave Schmidt, arXiv:1309.4557 | EPTCS 129, 2013, pp. 136-160 | 10.4204/EPTCS.129.10 | null | cs.PL cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present a spreadsheet implementation, extended with sheet-defined
functions, that allows users to define functions using only standard
spreadsheet concepts such as cells, formulas and references, requiring no new
syntax. This implements an idea proposed by Peyton-Jones and others.
As the main contribution of this paper, we then show how to add an online
partial evaluator for such sheet-defined functions. The result is a
higher-order functional language that is dynamically typed, in keeping with
spreadsheet traditions, and an interactive platform for function definition and
function specialization.
We describe an implementation of these ideas, present some performance data
from microbenchmarks, and outline desirable improvements and extensions.
| [
{
"version": "v1",
"created": "Fri, 20 Sep 2013 01:44:04 GMT"
}
] | 2013-09-23T00:00:00 | [
[
"Sestoft",
"Peter",
"",
"IT University of Copenhagen"
]
] | TITLE: Online partial evaluation of sheet-defined functions
ABSTRACT: We present a spreadsheet implementation, extended with sheet-defined
functions, that allows users to define functions using only standard
spreadsheet concepts such as cells, formulas and references, requiring no new
syntax. This implements an idea proposed by Peyton-Jones and others.
As the main contribution of this paper, we then show how to add an online
partial evaluator for such sheet-defined functions. The result is a
higher-order functional language that is dynamically typed, in keeping with
spreadsheet traditions, and an interactive platform for function definition and
function specialization.
We describe an implementation of these ideas, present some performance data
from microbenchmarks, and outline desirable improvements and extensions.
|
1309.5357 | Vikas Dongre | Vikas J. Dongre and Vijay H.Mankar | Development of Comprehensive Devnagari Numeral and Character Database
for Offline Handwritten Character Recognition | 5 pages, 8 figures, journal paper | Vikas J. Dongre,Vijay H.Mankar, "Development of Comprehensive
Devnagari Numeral and Character Database for Offline Handwritten Character
Recognition", Applied Computational Intelligence and Soft Computing,Volume
2012 | null | null | cs.CV | http://creativecommons.org/licenses/by/3.0/ | In handwritten character recognition, benchmark database plays an important
role in evaluating the performance of various algorithms and the results
obtained by various researchers. In Devnagari script, there is lack of such
official benchmark. This paper focuses on the generation of offline benchmark
database for Devnagari handwritten numerals and characters. The present work
generated 5137 and 20305 isolated samples for numeral and character database,
respectively, from 750 writers of all ages, sex, education, and profession. The
offline sample images are stored in TIFF image format as it occupies less
memory. Also, the data is presented in binary level so that memory requirement
is further reduced. It will facilitate research on handwriting recognition of
Devnagari script through free access to the researchers.
| [
{
"version": "v1",
"created": "Sat, 17 Aug 2013 03:09:50 GMT"
}
] | 2013-09-23T00:00:00 | [
[
"Dongre",
"Vikas J.",
""
],
[
"Mankar",
"Vijay H.",
""
]
] | TITLE: Development of Comprehensive Devnagari Numeral and Character Database
for Offline Handwritten Character Recognition
ABSTRACT: In handwritten character recognition, benchmark database plays an important
role in evaluating the performance of various algorithms and the results
obtained by various researchers. In Devnagari script, there is lack of such
official benchmark. This paper focuses on the generation of offline benchmark
database for Devnagari handwritten numerals and characters. The present work
generated 5137 and 20305 isolated samples for numeral and character database,
respectively, from 750 writers of all ages, sex, education, and profession. The
offline sample images are stored in TIFF image format as it occupies less
memory. Also, the data is presented in binary level so that memory requirement
is further reduced. It will facilitate research on handwriting recognition of
Devnagari script through free access to the researchers.
|
1206.5648 | Carlo Alberto Furia | Marco Trudel, Carlo A. Furia, Martin Nordio, Bertrand Meyer, Manuel
Oriol | C to O-O Translation: Beyond the Easy Stuff | null | Proceedings of the 19th Working Conference on Reverse Engineering
(WCRE'12). Pgg. 19--28, IEEE Computer Society, October 2012 | 10.1109/WCRE.2012.12 | null | cs.PL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Can we reuse some of the huge code-base developed in C to take advantage of
modern programming language features such as type safety, object-orientation,
and contracts? This paper presents a source-to-source translation of C code
into Eiffel, a modern object-oriented programming language, and the supporting
tool C2Eif. The translation is completely automatic and supports the entire C
language (ANSI, as well as many GNU C Compiler extensions, through CIL) as used
in practice, including its usage of native system libraries and inlined
assembly code. Our experiments show that C2Eif can handle C applications and
libraries of significant size (such as vim and libgsl), as well as challenging
benchmarks such as the GCC torture tests. The produced Eiffel code is
functionally equivalent to the original C code, and takes advantage of some of
Eiffel's object-oriented features to produce safe and easy-to-debug
translations.
| [
{
"version": "v1",
"created": "Mon, 25 Jun 2012 11:20:33 GMT"
},
{
"version": "v2",
"created": "Thu, 30 Aug 2012 11:56:05 GMT"
},
{
"version": "v3",
"created": "Thu, 19 Sep 2013 15:23:12 GMT"
}
] | 2013-09-20T00:00:00 | [
[
"Trudel",
"Marco",
""
],
[
"Furia",
"Carlo A.",
""
],
[
"Nordio",
"Martin",
""
],
[
"Meyer",
"Bertrand",
""
],
[
"Oriol",
"Manuel",
""
]
] | TITLE: C to O-O Translation: Beyond the Easy Stuff
ABSTRACT: Can we reuse some of the huge code-base developed in C to take advantage of
modern programming language features such as type safety, object-orientation,
and contracts? This paper presents a source-to-source translation of C code
into Eiffel, a modern object-oriented programming language, and the supporting
tool C2Eif. The translation is completely automatic and supports the entire C
language (ANSI, as well as many GNU C Compiler extensions, through CIL) as used
in practice, including its usage of native system libraries and inlined
assembly code. Our experiments show that C2Eif can handle C applications and
libraries of significant size (such as vim and libgsl), as well as challenging
benchmarks such as the GCC torture tests. The produced Eiffel code is
functionally equivalent to the original C code, and takes advantage of some of
Eiffel's object-oriented features to produce safe and easy-to-debug
translations.
|
1309.4887 | Tilo Wettig | Nils Meyer, Manfred Ries, Stefan Solbrig, Tilo Wettig | iDataCool: HPC with Hot-Water Cooling and Energy Reuse | 12 pages, 7 figures, proceedings of ISC 2013 | Lecture Notes in Computer Science 7905 (2013) 383 | 10.1007/978-3-642-38750-0_29 | null | cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | iDataCool is an HPC architecture jointly developed by the University of
Regensburg and the IBM Research and Development Lab B\"oblingen. It is based on
IBM's iDataPlex platform, whose air-cooling solution was replaced by a custom
water-cooling solution that allows for cooling water temperatures of 70C/158F.
The system is coupled to an adsorption chiller by InvenSor that operates
efficiently at these temperatures. Thus a significant portion of the energy
spent on HPC can be recovered in the form of chilled water, which can then be
used to cool other parts of the computing center. We describe the architecture
of iDataCool and present benchmarks of the cooling performance and the energy
(reuse) efficiency.
| [
{
"version": "v1",
"created": "Thu, 19 Sep 2013 07:53:10 GMT"
}
] | 2013-09-20T00:00:00 | [
[
"Meyer",
"Nils",
""
],
[
"Ries",
"Manfred",
""
],
[
"Solbrig",
"Stefan",
""
],
[
"Wettig",
"Tilo",
""
]
] | TITLE: iDataCool: HPC with Hot-Water Cooling and Energy Reuse
ABSTRACT: iDataCool is an HPC architecture jointly developed by the University of
Regensburg and the IBM Research and Development Lab B\"oblingen. It is based on
IBM's iDataPlex platform, whose air-cooling solution was replaced by a custom
water-cooling solution that allows for cooling water temperatures of 70C/158F.
The system is coupled to an adsorption chiller by InvenSor that operates
efficiently at these temperatures. Thus a significant portion of the energy
spent on HPC can be recovered in the form of chilled water, which can then be
used to cool other parts of the computing center. We describe the architecture
of iDataCool and present benchmarks of the cooling performance and the energy
(reuse) efficiency.
|
1309.5047 | Sean Whalen | Sean Whalen and Gaurav Pandey | A Comparative Analysis of Ensemble Classifiers: Case Studies in Genomics | 10 pages, 3 figures, 8 tables, to appear in Proceedings of the 2013
International Conference on Data Mining | null | null | null | cs.LG q-bio.GN stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The combination of multiple classifiers using ensemble methods is
increasingly important for making progress in a variety of difficult prediction
problems. We present a comparative analysis of several ensemble methods through
two case studies in genomics, namely the prediction of genetic interactions and
protein functions, to demonstrate their efficacy on real-world datasets and
draw useful conclusions about their behavior. These methods include simple
aggregation, meta-learning, cluster-based meta-learning, and ensemble selection
using heterogeneous classifiers trained on resampled data to improve the
diversity of their predictions. We present a detailed analysis of these methods
across 4 genomics datasets and find the best of these methods offer
statistically significant improvements over the state of the art in their
respective domains. In addition, we establish a novel connection between
ensemble selection and meta-learning, demonstrating how both of these disparate
methods establish a balance between ensemble diversity and performance.
| [
{
"version": "v1",
"created": "Thu, 19 Sep 2013 16:45:18 GMT"
}
] | 2013-09-20T00:00:00 | [
[
"Whalen",
"Sean",
""
],
[
"Pandey",
"Gaurav",
""
]
] | TITLE: A Comparative Analysis of Ensemble Classifiers: Case Studies in Genomics
ABSTRACT: The combination of multiple classifiers using ensemble methods is
increasingly important for making progress in a variety of difficult prediction
problems. We present a comparative analysis of several ensemble methods through
two case studies in genomics, namely the prediction of genetic interactions and
protein functions, to demonstrate their efficacy on real-world datasets and
draw useful conclusions about their behavior. These methods include simple
aggregation, meta-learning, cluster-based meta-learning, and ensemble selection
using heterogeneous classifiers trained on resampled data to improve the
diversity of their predictions. We present a detailed analysis of these methods
across 4 genomics datasets and find the best of these methods offer
statistically significant improvements over the state of the art in their
respective domains. In addition, we establish a novel connection between
ensemble selection and meta-learning, demonstrating how both of these disparate
methods establish a balance between ensemble diversity and performance.
|
1103.3240 | Ken Duffy | K. R. Duffy and C. Bordenave and D. J. Leith | Decentralized Constraint Satisfaction | null | IEEE/ACM Transactions on Networking, 21 (4), 1298-1308, 2013 | 10.1109/TNET.2012.2222923 | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We show that several important resource allocation problems in wireless
networks fit within the common framework of Constraint Satisfaction Problems
(CSPs). Inspired by the requirements of these applications, where variables are
located at distinct network devices that may not be able to communicate but may
interfere, we define natural criteria that a CSP solver must possess in order
to be practical. We term these algorithms decentralized CSP solvers. The best
known CSP solvers were designed for centralized problems and do not meet these
criteria. We introduce a stochastic decentralized CSP solver and prove that it
will find a solution in almost surely finite time, should one exist, also
showing it has many practically desirable properties. We benchmark the
algorithm's performance on a well-studied class of CSPs, random k-SAT,
illustrating that the time the algorithm takes to find a satisfying assignment
is competitive with stochastic centralized solvers on problems with order a
thousand variables despite its decentralized nature. We demonstrate the
solver's practical utility for the problems that motivated its introduction by
using it to find a non-interfering channel allocation for a network formed from
data from downtown Manhattan.
| [
{
"version": "v1",
"created": "Wed, 2 Mar 2011 15:00:09 GMT"
},
{
"version": "v2",
"created": "Mon, 25 Jul 2011 14:44:16 GMT"
},
{
"version": "v3",
"created": "Wed, 7 Sep 2011 11:00:47 GMT"
},
{
"version": "v4",
"created": "Tue, 9 Oct 2012 07:46:22 GMT"
}
] | 2013-09-19T00:00:00 | [
[
"Duffy",
"K. R.",
""
],
[
"Bordenave",
"C.",
""
],
[
"Leith",
"D. J.",
""
]
] | TITLE: Decentralized Constraint Satisfaction
ABSTRACT: We show that several important resource allocation problems in wireless
networks fit within the common framework of Constraint Satisfaction Problems
(CSPs). Inspired by the requirements of these applications, where variables are
located at distinct network devices that may not be able to communicate but may
interfere, we define natural criteria that a CSP solver must possess in order
to be practical. We term these algorithms decentralized CSP solvers. The best
known CSP solvers were designed for centralized problems and do not meet these
criteria. We introduce a stochastic decentralized CSP solver and prove that it
will find a solution in almost surely finite time, should one exist, also
showing it has many practically desirable properties. We benchmark the
algorithm's performance on a well-studied class of CSPs, random k-SAT,
illustrating that the time the algorithm takes to find a satisfying assignment
is competitive with stochastic centralized solvers on problems with order a
thousand variables despite its decentralized nature. We demonstrate the
solver's practical utility for the problems that motivated its introduction by
using it to find a non-interfering channel allocation for a network formed from
data from downtown Manhattan.
|
1301.6847 | Zhilin Zhang | Taiyong Li, Zhilin Zhang | Robust Face Recognition via Block Sparse Bayesian Learning | Accepted by Mathematical Problems in Engineering in 2013 | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Face recognition (FR) is an important task in pattern recognition and
computer vision. Sparse representation (SR) has been demonstrated to be a
powerful framework for FR. In general, an SR algorithm treats each face in a
training dataset as a basis function, and tries to find a sparse representation
of a test face under these basis functions. The sparse representation
coefficients then provide a recognition hint. Early SR algorithms are based on
a basic sparse model. Recently, it has been found that algorithms based on a
block sparse model can achieve better recognition rates. Based on this model,
in this study we use block sparse Bayesian learning (BSBL) to find a sparse
representation of a test face for recognition. BSBL is a recently proposed
framework, which has many advantages over existing block-sparse-model based
algorithms. Experimental results on the Extended Yale B, the AR and the CMU PIE
face databases show that using BSBL can achieve better recognition rates and
higher robustness than state-of-the-art algorithms in most cases.
| [
{
"version": "v1",
"created": "Tue, 29 Jan 2013 07:23:00 GMT"
},
{
"version": "v2",
"created": "Wed, 18 Sep 2013 00:19:12 GMT"
}
] | 2013-09-19T00:00:00 | [
[
"Li",
"Taiyong",
""
],
[
"Zhang",
"Zhilin",
""
]
] | TITLE: Robust Face Recognition via Block Sparse Bayesian Learning
ABSTRACT: Face recognition (FR) is an important task in pattern recognition and
computer vision. Sparse representation (SR) has been demonstrated to be a
powerful framework for FR. In general, an SR algorithm treats each face in a
training dataset as a basis function, and tries to find a sparse representation
of a test face under these basis functions. The sparse representation
coefficients then provide a recognition hint. Early SR algorithms are based on
a basic sparse model. Recently, it has been found that algorithms based on a
block sparse model can achieve better recognition rates. Based on this model,
in this study we use block sparse Bayesian learning (BSBL) to find a sparse
representation of a test face for recognition. BSBL is a recently proposed
framework, which has many advantages over existing block-sparse-model based
algorithms. Experimental results on the Extended Yale B, the AR and the CMU PIE
face databases show that using BSBL can achieve better recognition rates and
higher robustness than state-of-the-art algorithms in most cases.
|
1309.4496 | Thoralf Gutierrez | Thoralf Gutierrez, Gautier Krings, Vincent D. Blondel | Evaluating socio-economic state of a country analyzing airtime credit
and mobile phone datasets | 6 pages, 6 figures | null | null | null | cs.CY cs.SI physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Reliable statistical information is important to make political decisions on
a sound basis and to help measure the impact of policies. Unfortunately,
statistics offices in developing countries have scarce resources and
statistical censuses are therefore conducted sporadically. Based on mobile
phone communications and history of airtime credit purchases, we estimate the
relative income of individuals, the diversity and inequality of income, and an
indicator for socioeconomic segregation for fine-grained regions of an African
country. Our study shows how to use mobile phone datasets as a starting point
to understand the socio-economic state of a country, which can be especially
useful in countries with few resources to conduct large surveys.
| [
{
"version": "v1",
"created": "Tue, 17 Sep 2013 22:36:34 GMT"
}
] | 2013-09-19T00:00:00 | [
[
"Gutierrez",
"Thoralf",
""
],
[
"Krings",
"Gautier",
""
],
[
"Blondel",
"Vincent D.",
""
]
] | TITLE: Evaluating socio-economic state of a country analyzing airtime credit
and mobile phone datasets
ABSTRACT: Reliable statistical information is important to make political decisions on
a sound basis and to help measure the impact of policies. Unfortunately,
statistics offices in developing countries have scarce resources and
statistical censuses are therefore conducted sporadically. Based on mobile
phone communications and history of airtime credit purchases, we estimate the
relative income of individuals, the diversity and inequality of income, and an
indicator for socioeconomic segregation for fine-grained regions of an African
country. Our study shows how to use mobile phone datasets as a starting point
to understand the socio-economic state of a country, which can be especially
useful in countries with few resources to conduct large surveys.
|
1309.4157 | Rui Li | Rui Li and Kevin Chen-Chuan Chang | EgoNet-UIUC: A Dataset For Ego Network Research | DataSet Description | null | null | null | cs.SI physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this report, we introduce the version one of EgoNet-UIUC, which is a
dataset for ego network research. The dataset contains about 230 ego networks
in Linkedin, which have about 33K users (with their attributes) and 283K
relationships (with their relationship types) in total. We name this dataset as
EgoNet-UIUC, which stands for Ego Network Dataset from University of Illinois
at Urbana-Champaign.
| [
{
"version": "v1",
"created": "Tue, 17 Sep 2013 02:28:25 GMT"
}
] | 2013-09-18T00:00:00 | [
[
"Li",
"Rui",
""
],
[
"Chang",
"Kevin Chen-Chuan",
""
]
] | TITLE: EgoNet-UIUC: A Dataset For Ego Network Research
ABSTRACT: In this report, we introduce the version one of EgoNet-UIUC, which is a
dataset for ego network research. The dataset contains about 230 ego networks
in Linkedin, which have about 33K users (with their attributes) and 283K
relationships (with their relationship types) in total. We name this dataset as
EgoNet-UIUC, which stands for Ego Network Dataset from University of Illinois
at Urbana-Champaign.
|
1309.3809 | Ishani Chakraborty | Ishani Chakraborty and Ahmed Elgammal | Visual-Semantic Scene Understanding by Sharing Labels in a Context
Network | null | null | null | null | cs.CV cs.LG stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider the problem of naming objects in complex, natural scenes
containing widely varying object appearance and subtly different names.
Informed by cognitive research, we propose an approach based on sharing context
based object hypotheses between visual and lexical spaces. To this end, we
present the Visual Semantic Integration Model (VSIM) that represents object
labels as entities shared between semantic and visual contexts and infers a new
image by updating labels through context switching. At the core of VSIM is a
semantic Pachinko Allocation Model and a visual nearest neighbor Latent
Dirichlet Allocation Model. For inference, we derive an iterative Data
Augmentation algorithm that pools the label probabilities and maximizes the
joint label posterior of an image. Our model surpasses the performance of
state-of-art methods in several visual tasks on the challenging SUN09 dataset.
| [
{
"version": "v1",
"created": "Mon, 16 Sep 2013 00:22:01 GMT"
}
] | 2013-09-17T00:00:00 | [
[
"Chakraborty",
"Ishani",
""
],
[
"Elgammal",
"Ahmed",
""
]
] | TITLE: Visual-Semantic Scene Understanding by Sharing Labels in a Context
Network
ABSTRACT: We consider the problem of naming objects in complex, natural scenes
containing widely varying object appearance and subtly different names.
Informed by cognitive research, we propose an approach based on sharing context
based object hypotheses between visual and lexical spaces. To this end, we
present the Visual Semantic Integration Model (VSIM) that represents object
labels as entities shared between semantic and visual contexts and infers a new
image by updating labels through context switching. At the core of VSIM is a
semantic Pachinko Allocation Model and a visual nearest neighbor Latent
Dirichlet Allocation Model. For inference, we derive an iterative Data
Augmentation algorithm that pools the label probabilities and maximizes the
joint label posterior of an image. Our model surpasses the performance of
state-of-art methods in several visual tasks on the challenging SUN09 dataset.
|
1309.3877 | Huyen Do | Huyen Do and Alexandros Kalousis | A Metric-learning based framework for Support Vector Machines and
Multiple Kernel Learning | null | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Most metric learning algorithms, as well as Fisher's Discriminant Analysis
(FDA), optimize some cost function of different measures of within-and
between-class distances. On the other hand, Support Vector Machines(SVMs) and
several Multiple Kernel Learning (MKL) algorithms are based on the SVM large
margin theory. Recently, SVMs have been analyzed from SVM and metric learning,
and to develop new algorithms that build on the strengths of each. Inspired by
the metric learning interpretation of SVM, we develop here a new
metric-learning based SVM framework in which we incorporate metric learning
concepts within SVM. We extend the optimization problem of SVM to include some
measure of the within-class distance and along the way we develop a new
within-class distance measure which is appropriate for SVM. In addition, we
adopt the same approach for MKL and show that it can be also formulated as a
Mahalanobis metric learning problem. Our end result is a number of SVM/MKL
algorithms that incorporate metric learning concepts. We experiment with them
on a set of benchmark datasets and observe important predictive performance
improvements.
| [
{
"version": "v1",
"created": "Mon, 16 Sep 2013 09:39:25 GMT"
}
] | 2013-09-17T00:00:00 | [
[
"Do",
"Huyen",
""
],
[
"Kalousis",
"Alexandros",
""
]
] | TITLE: A Metric-learning based framework for Support Vector Machines and
Multiple Kernel Learning
ABSTRACT: Most metric learning algorithms, as well as Fisher's Discriminant Analysis
(FDA), optimize some cost function of different measures of within-and
between-class distances. On the other hand, Support Vector Machines(SVMs) and
several Multiple Kernel Learning (MKL) algorithms are based on the SVM large
margin theory. Recently, SVMs have been analyzed from SVM and metric learning,
and to develop new algorithms that build on the strengths of each. Inspired by
the metric learning interpretation of SVM, we develop here a new
metric-learning based SVM framework in which we incorporate metric learning
concepts within SVM. We extend the optimization problem of SVM to include some
measure of the within-class distance and along the way we develop a new
within-class distance measure which is appropriate for SVM. In addition, we
adopt the same approach for MKL and show that it can be also formulated as a
Mahalanobis metric learning problem. Our end result is a number of SVM/MKL
algorithms that incorporate metric learning concepts. We experiment with them
on a set of benchmark datasets and observe important predictive performance
improvements.
|
1309.3917 | Gaetan Marceau | Ga\'etan Marceau (INRIA Saclay - Ile de France, LRI), Pierre
Sav\'eant, Marc Schoenauer (INRIA Saclay - Ile de France, LRI) | Strategic Planning in Air Traffic Control as a Multi-objective
Stochastic Optimization Problem | ATM Seminar 2013 (2013) | null | null | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | With the objective of handling the airspace sector congestion subject to
continuously growing air traffic, we suggest to create a collaborative working
plan during the strategic phase of air traffic control. The plan obtained via a
new decision support tool presented in this article consists in a schedule for
controllers, which specifies time of overflight on the different waypoints of
the flight plans. In order to do it, we believe that the decision-support tool
shall model directly the uncertainty at a trajectory level in order to
propagate the uncertainty to the sector level. Then, the probability of
congestion for any sector in the airspace can be computed. Since air traffic
regulations and sector congestion are antagonist, we designed and implemented a
multi-objective optimization algorithm for determining the best trade-off
between these two criteria. The solution comes up as a set of alternatives for
the multi-sector planner where the severity of the congestion cost is
adjustable. In this paper, the Non-dominated Sorting Genetic Algorithm
(NSGA-II) was used to solve an artificial benchmark problem involving 24
aircraft and 11 sectors, and is able to provide a good approximation of the
Pareto front.
| [
{
"version": "v1",
"created": "Mon, 16 Sep 2013 11:52:07 GMT"
}
] | 2013-09-17T00:00:00 | [
[
"Marceau",
"Gaétan",
"",
"INRIA Saclay - Ile de France, LRI"
],
[
"Savéant",
"Pierre",
"",
"INRIA Saclay - Ile de France, LRI"
],
[
"Schoenauer",
"Marc",
"",
"INRIA Saclay - Ile de France, LRI"
]
] | TITLE: Strategic Planning in Air Traffic Control as a Multi-objective
Stochastic Optimization Problem
ABSTRACT: With the objective of handling the airspace sector congestion subject to
continuously growing air traffic, we suggest to create a collaborative working
plan during the strategic phase of air traffic control. The plan obtained via a
new decision support tool presented in this article consists in a schedule for
controllers, which specifies time of overflight on the different waypoints of
the flight plans. In order to do it, we believe that the decision-support tool
shall model directly the uncertainty at a trajectory level in order to
propagate the uncertainty to the sector level. Then, the probability of
congestion for any sector in the airspace can be computed. Since air traffic
regulations and sector congestion are antagonist, we designed and implemented a
multi-objective optimization algorithm for determining the best trade-off
between these two criteria. The solution comes up as a set of alternatives for
the multi-sector planner where the severity of the congestion cost is
adjustable. In this paper, the Non-dominated Sorting Genetic Algorithm
(NSGA-II) was used to solve an artificial benchmark problem involving 24
aircraft and 11 sectors, and is able to provide a good approximation of the
Pareto front.
|
1309.4067 | Dima Kagan | Dima Kagan, Michael Fire, Aviad Elyashar, and Yuval Elovici | Facebook Applications' Installation and Removal: A Temporal Analysis | null | null | null | null | cs.SI physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Facebook applications are one of the reasons for Facebook attractiveness.
Unfortunately, numerous users are not aware of the fact that many malicious
Facebook applications exist. To educate users, to raise users' awareness and to
improve Facebook users' security and privacy, we developed a Firefox add-on
that alerts users to the number of installed applications on their Facebook
profiles. In this study, we present the temporal analysis of the Facebook
applications' installation and removal dataset collected by our add-on. This
dataset consists of information from 2,945 users, collected during a period of
over a year. We used linear regression to analyze our dataset and discovered
the linear connection between the average percentage change of newly installed
Facebook applications and the number of days passed since the user initially
installed our add-on. Additionally, we found out that users who used our
Firefox add-on become more aware of their security and privacy installing on
average fewer new applications. Finally, we discovered that on average 86.4% of
Facebook users install an additional application every 4.2 days.
| [
{
"version": "v1",
"created": "Mon, 16 Sep 2013 18:56:45 GMT"
}
] | 2013-09-17T00:00:00 | [
[
"Kagan",
"Dima",
""
],
[
"Fire",
"Michael",
""
],
[
"Elyashar",
"Aviad",
""
],
[
"Elovici",
"Yuval",
""
]
] | TITLE: Facebook Applications' Installation and Removal: A Temporal Analysis
ABSTRACT: Facebook applications are one of the reasons for Facebook attractiveness.
Unfortunately, numerous users are not aware of the fact that many malicious
Facebook applications exist. To educate users, to raise users' awareness and to
improve Facebook users' security and privacy, we developed a Firefox add-on
that alerts users to the number of installed applications on their Facebook
profiles. In this study, we present the temporal analysis of the Facebook
applications' installation and removal dataset collected by our add-on. This
dataset consists of information from 2,945 users, collected during a period of
over a year. We used linear regression to analyze our dataset and discovered
the linear connection between the average percentage change of newly installed
Facebook applications and the number of days passed since the user initially
installed our add-on. Additionally, we found out that users who used our
Firefox add-on become more aware of their security and privacy installing on
average fewer new applications. Finally, we discovered that on average 86.4% of
Facebook users install an additional application every 4.2 days.
|
1102.5046 | Tamara Kolda | C. Seshadhri, Ali Pinar, Tamara G. Kolda | An In-Depth Analysis of Stochastic Kronecker Graphs | null | Journal of the ACM 60(2):13 (32 pages), April 2013 | 10.1145/2450142.2450149 | null | cs.SI cs.DM physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Graph analysis is playing an increasingly important role in science and
industry. Due to numerous limitations in sharing real-world graphs, models for
generating massive graphs are critical for developing better algorithms. In
this paper, we analyze the stochastic Kronecker graph model (SKG), which is the
foundation of the Graph500 supercomputer benchmark due to its favorable
properties and easy parallelization. Our goal is to provide a deeper
understanding of the parameters and properties of this model so that its
functionality as a benchmark is increased. We develop a rigorous mathematical
analysis that shows this model cannot generate a power-law distribution or even
a lognormal distribution. However, we formalize an enhanced version of the SKG
model that uses random noise for smoothing. We prove both in theory and in
practice that this enhancement leads to a lognormal distribution. Additionally,
we provide a precise analysis of isolated vertices, showing that the graphs
that are produced by SKG might be quite different than intended. For example,
between 50% and 75% of the vertices in the Graph500 benchmarks will be
isolated. Finally, we show that this model tends to produce extremely small
core numbers (compared to most social networks and other real graphs) for
common parameter choices.
| [
{
"version": "v1",
"created": "Thu, 24 Feb 2011 17:36:57 GMT"
},
{
"version": "v2",
"created": "Thu, 8 Sep 2011 18:34:32 GMT"
},
{
"version": "v3",
"created": "Wed, 2 Jan 2013 23:59:15 GMT"
}
] | 2013-09-16T00:00:00 | [
[
"Seshadhri",
"C.",
""
],
[
"Pinar",
"Ali",
""
],
[
"Kolda",
"Tamara G.",
""
]
] | TITLE: An In-Depth Analysis of Stochastic Kronecker Graphs
ABSTRACT: Graph analysis is playing an increasingly important role in science and
industry. Due to numerous limitations in sharing real-world graphs, models for
generating massive graphs are critical for developing better algorithms. In
this paper, we analyze the stochastic Kronecker graph model (SKG), which is the
foundation of the Graph500 supercomputer benchmark due to its favorable
properties and easy parallelization. Our goal is to provide a deeper
understanding of the parameters and properties of this model so that its
functionality as a benchmark is increased. We develop a rigorous mathematical
analysis that shows this model cannot generate a power-law distribution or even
a lognormal distribution. However, we formalize an enhanced version of the SKG
model that uses random noise for smoothing. We prove both in theory and in
practice that this enhancement leads to a lognormal distribution. Additionally,
we provide a precise analysis of isolated vertices, showing that the graphs
that are produced by SKG might be quite different than intended. For example,
between 50% and 75% of the vertices in the Graph500 benchmarks will be
isolated. Finally, we show that this model tends to produce extremely small
core numbers (compared to most social networks and other real graphs) for
common parameter choices.
|
1309.3515 | Olga Ohrimenko | Joshua Brown, Olga Ohrimenko, Roberto Tamassia | Haze: Privacy-Preserving Real-Time Traffic Statistics | null | null | null | null | cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider traffic-update mobile applications that let users learn traffic
conditions based on reports from other users. These applications are becoming
increasingly popular (e.g., Waze reported 30 million users in 2013) since they
aggregate real-time road traffic updates from actual users traveling on the
roads. However, the providers of these mobile services have access to such
sensitive information as timestamped locations and movements of its users. In
this paper, we describe Haze, a protocol for traffic-update applications that
supports the creation of traffic statistics from user reports while protecting
the privacy of the users. Haze relies on a small subset of users to jointly
aggregate encrypted speed and alert data and report the result to the service
provider. We use jury-voting protocols based on threshold cryptosystem and
differential privacy techniques to hide user data from anyone participating in
the protocol while allowing only aggregate information to be extracted and sent
to the service provider. We show that Haze is effective in practice by
developing a prototype implementation and performing experiments on a
real-world dataset of car trajectories.
| [
{
"version": "v1",
"created": "Fri, 13 Sep 2013 17:17:29 GMT"
}
] | 2013-09-16T00:00:00 | [
[
"Brown",
"Joshua",
""
],
[
"Ohrimenko",
"Olga",
""
],
[
"Tamassia",
"Roberto",
""
]
] | TITLE: Haze: Privacy-Preserving Real-Time Traffic Statistics
ABSTRACT: We consider traffic-update mobile applications that let users learn traffic
conditions based on reports from other users. These applications are becoming
increasingly popular (e.g., Waze reported 30 million users in 2013) since they
aggregate real-time road traffic updates from actual users traveling on the
roads. However, the providers of these mobile services have access to such
sensitive information as timestamped locations and movements of its users. In
this paper, we describe Haze, a protocol for traffic-update applications that
supports the creation of traffic statistics from user reports while protecting
the privacy of the users. Haze relies on a small subset of users to jointly
aggregate encrypted speed and alert data and report the result to the service
provider. We use jury-voting protocols based on threshold cryptosystem and
differential privacy techniques to hide user data from anyone participating in
the protocol while allowing only aggregate information to be extracted and sent
to the service provider. We show that Haze is effective in practice by
developing a prototype implementation and performing experiments on a
real-world dataset of car trajectories.
|
1212.4522 | Yunchao Gong | Yunchao Gong and Qifa Ke and Michael Isard and Svetlana Lazebnik | A Multi-View Embedding Space for Modeling Internet Images, Tags, and
their Semantics | To Appear: International Journal of Computer Vision | null | null | null | cs.CV cs.IR cs.LG cs.MM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper investigates the problem of modeling Internet images and
associated text or tags for tasks such as image-to-image search, tag-to-image
search, and image-to-tag search (image annotation). We start with canonical
correlation analysis (CCA), a popular and successful approach for mapping
visual and textual features to the same latent space, and incorporate a third
view capturing high-level image semantics, represented either by a single
category or multiple non-mutually-exclusive concepts. We present two ways to
train the three-view embedding: supervised, with the third view coming from
ground-truth labels or search keywords; and unsupervised, with semantic themes
automatically obtained by clustering the tags. To ensure high accuracy for
retrieval tasks while keeping the learning process scalable, we combine
multiple strong visual features and use explicit nonlinear kernel mappings to
efficiently approximate kernel CCA. To perform retrieval, we use a specially
designed similarity function in the embedded space, which substantially
outperforms the Euclidean distance. The resulting system produces compelling
qualitative results and outperforms a number of two-view baselines on retrieval
tasks on three large-scale Internet image datasets.
| [
{
"version": "v1",
"created": "Tue, 18 Dec 2012 22:02:43 GMT"
},
{
"version": "v2",
"created": "Mon, 2 Sep 2013 19:14:58 GMT"
}
] | 2013-09-13T00:00:00 | [
[
"Gong",
"Yunchao",
""
],
[
"Ke",
"Qifa",
""
],
[
"Isard",
"Michael",
""
],
[
"Lazebnik",
"Svetlana",
""
]
] | TITLE: A Multi-View Embedding Space for Modeling Internet Images, Tags, and
their Semantics
ABSTRACT: This paper investigates the problem of modeling Internet images and
associated text or tags for tasks such as image-to-image search, tag-to-image
search, and image-to-tag search (image annotation). We start with canonical
correlation analysis (CCA), a popular and successful approach for mapping
visual and textual features to the same latent space, and incorporate a third
view capturing high-level image semantics, represented either by a single
category or multiple non-mutually-exclusive concepts. We present two ways to
train the three-view embedding: supervised, with the third view coming from
ground-truth labels or search keywords; and unsupervised, with semantic themes
automatically obtained by clustering the tags. To ensure high accuracy for
retrieval tasks while keeping the learning process scalable, we combine
multiple strong visual features and use explicit nonlinear kernel mappings to
efficiently approximate kernel CCA. To perform retrieval, we use a specially
designed similarity function in the embedded space, which substantially
outperforms the Euclidean distance. The resulting system produces compelling
qualitative results and outperforms a number of two-view baselines on retrieval
tasks on three large-scale Internet image datasets.
|
1309.3103 | Alex Susemihl | Chris H\"ausler, Alex Susemihl, Martin P Nawrot, Manfred Opper | Temporal Autoencoding Improves Generative Models of Time Series | null | null | null | null | stat.ML cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Restricted Boltzmann Machines (RBMs) are generative models which can learn
useful representations from samples of a dataset in an unsupervised fashion.
They have been widely employed as an unsupervised pre-training method in
machine learning. RBMs have been modified to model time series in two main
ways: The Temporal RBM stacks a number of RBMs laterally and introduces
temporal dependencies between the hidden layer units; The Conditional RBM, on
the other hand, considers past samples of the dataset as a conditional bias and
learns a representation which takes these into account. Here we propose a new
training method for both the TRBM and the CRBM, which enforces the dynamic
structure of temporal datasets. We do so by treating the temporal models as
denoising autoencoders, considering past frames of the dataset as corrupted
versions of the present frame and minimizing the reconstruction error of the
present data by the model. We call this approach Temporal Autoencoding. This
leads to a significant improvement in the performance of both models in a
filling-in-frames task across a number of datasets. The error reduction for
motion capture data is 56\% for the CRBM and 80\% for the TRBM. Taking the
posterior mean prediction instead of single samples further improves the
model's estimates, decreasing the error by as much as 91\% for the CRBM on
motion capture data. We also trained the model to perform forecasting on a
large number of datasets and have found TA pretraining to consistently improve
the performance of the forecasts. Furthermore, by looking at the prediction
error across time, we can see that this improvement reflects a better
representation of the dynamics of the data as opposed to a bias towards
reconstructing the observed data on a short time scale.
| [
{
"version": "v1",
"created": "Thu, 12 Sep 2013 10:39:50 GMT"
}
] | 2013-09-13T00:00:00 | [
[
"Häusler",
"Chris",
""
],
[
"Susemihl",
"Alex",
""
],
[
"Nawrot",
"Martin P",
""
],
[
"Opper",
"Manfred",
""
]
] | TITLE: Temporal Autoencoding Improves Generative Models of Time Series
ABSTRACT: Restricted Boltzmann Machines (RBMs) are generative models which can learn
useful representations from samples of a dataset in an unsupervised fashion.
They have been widely employed as an unsupervised pre-training method in
machine learning. RBMs have been modified to model time series in two main
ways: The Temporal RBM stacks a number of RBMs laterally and introduces
temporal dependencies between the hidden layer units; The Conditional RBM, on
the other hand, considers past samples of the dataset as a conditional bias and
learns a representation which takes these into account. Here we propose a new
training method for both the TRBM and the CRBM, which enforces the dynamic
structure of temporal datasets. We do so by treating the temporal models as
denoising autoencoders, considering past frames of the dataset as corrupted
versions of the present frame and minimizing the reconstruction error of the
present data by the model. We call this approach Temporal Autoencoding. This
leads to a significant improvement in the performance of both models in a
filling-in-frames task across a number of datasets. The error reduction for
motion capture data is 56\% for the CRBM and 80\% for the TRBM. Taking the
posterior mean prediction instead of single samples further improves the
model's estimates, decreasing the error by as much as 91\% for the CRBM on
motion capture data. We also trained the model to perform forecasting on a
large number of datasets and have found TA pretraining to consistently improve
the performance of the forecasts. Furthermore, by looking at the prediction
error across time, we can see that this improvement reflects a better
representation of the dynamics of the data as opposed to a bias towards
reconstructing the observed data on a short time scale.
|
1307.4143 | Krishnamurthy Dvijotham | Krishnamurthy Dvijotham, Scott Backhaus and Misha Chertkov | Storage Sizing and Placement through Operational and Uncertainty-Aware
Simulations | To Appear in proceedings of Hawaii International Conference on System
Sciences (HICSS-2014) | null | null | null | math.OC cs.SY physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | As the penetration level of transmission-scale time-intermittent renewable
generation resources increases, control of flexible resources will become
important to mitigating the fluctuations due to these new renewable resources.
Flexible resources may include new or existing synchronous generators as well
as new energy storage devices. Optimal placement and sizing of energy storage
to minimize costs of integrating renewable resources is a difficult
optimization problem. Further,optimal planning procedures typically do not
consider the effect of the time dependence of operations and may lead to
unsatisfactory results. Here, we use an optimal energy storage control
algorithm to develop a heuristic procedure for energy storage placement and
sizing. We perform operational simulation under various time profiles of
intermittent generation, loads and interchanges (artificially generated or from
historical data) and accumulate statistics of the usage of storage at each node
under the optimal dispatch. We develop a greedy heuristic based on the
accumulated statistics to obtain a minimal set of nodes for storage placement.
The quality of the heuristic is explored by comparing our results to the
obvious heuristic of placing storage at the renewables for IEEE benchmarks and
real-world network topologies.
| [
{
"version": "v1",
"created": "Tue, 16 Jul 2013 01:38:13 GMT"
},
{
"version": "v2",
"created": "Wed, 11 Sep 2013 18:09:48 GMT"
}
] | 2013-09-12T00:00:00 | [
[
"Dvijotham",
"Krishnamurthy",
""
],
[
"Backhaus",
"Scott",
""
],
[
"Chertkov",
"Misha",
""
]
] | TITLE: Storage Sizing and Placement through Operational and Uncertainty-Aware
Simulations
ABSTRACT: As the penetration level of transmission-scale time-intermittent renewable
generation resources increases, control of flexible resources will become
important to mitigating the fluctuations due to these new renewable resources.
Flexible resources may include new or existing synchronous generators as well
as new energy storage devices. Optimal placement and sizing of energy storage
to minimize costs of integrating renewable resources is a difficult
optimization problem. Further,optimal planning procedures typically do not
consider the effect of the time dependence of operations and may lead to
unsatisfactory results. Here, we use an optimal energy storage control
algorithm to develop a heuristic procedure for energy storage placement and
sizing. We perform operational simulation under various time profiles of
intermittent generation, loads and interchanges (artificially generated or from
historical data) and accumulate statistics of the usage of storage at each node
under the optimal dispatch. We develop a greedy heuristic based on the
accumulated statistics to obtain a minimal set of nodes for storage placement.
The quality of the heuristic is explored by comparing our results to the
obvious heuristic of placing storage at the renewables for IEEE benchmarks and
real-world network topologies.
|
1309.2648 | Hany SalahEldeen | Hany M. SalahEldeen and Michael L. Nelson | Resurrecting My Revolution: Using Social Link Neighborhood in Bringing
Context to the Disappearing Web | Published IN TPDL 2013 | null | null | null | cs.IR cs.DL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In previous work we reported that resources linked in tweets disappeared at
the rate of 11% in the first year followed by 7.3% each year afterwards. We
also found that in the first year 6.7%, and 14.6% in each subsequent year, of
the resources were archived in public web archives. In this paper we revisit
the same dataset of tweets and find that our prior model still holds and the
calculated error for estimating percentages missing was about 4%, but we found
the rate of archiving produced a higher error of about 11.5%. We also
discovered that resources have disappeared from the archives themselves (7.89%)
as well as reappeared on the live web after being declared missing (6.54%). We
have also tested the availability of the tweets themselves and found that
10.34% have disappeared from the live web. To mitigate the loss of resources on
the live web, we propose the use of a "tweet signature". Using the Topsy API,
we extract the top five most frequent terms from the union of all tweets about
a resource, and use these five terms as a query to Google. We found that using
tweet signatures results in discovering replacement resources with 70+% textual
similarity to the missing resource 41% of the time.
| [
{
"version": "v1",
"created": "Tue, 10 Sep 2013 20:00:55 GMT"
}
] | 2013-09-12T00:00:00 | [
[
"SalahEldeen",
"Hany M.",
""
],
[
"Nelson",
"Michael L.",
""
]
] | TITLE: Resurrecting My Revolution: Using Social Link Neighborhood in Bringing
Context to the Disappearing Web
ABSTRACT: In previous work we reported that resources linked in tweets disappeared at
the rate of 11% in the first year followed by 7.3% each year afterwards. We
also found that in the first year 6.7%, and 14.6% in each subsequent year, of
the resources were archived in public web archives. In this paper we revisit
the same dataset of tweets and find that our prior model still holds and the
calculated error for estimating percentages missing was about 4%, but we found
the rate of archiving produced a higher error of about 11.5%. We also
discovered that resources have disappeared from the archives themselves (7.89%)
as well as reappeared on the live web after being declared missing (6.54%). We
have also tested the availability of the tweets themselves and found that
10.34% have disappeared from the live web. To mitigate the loss of resources on
the live web, we propose the use of a "tweet signature". Using the Topsy API,
we extract the top five most frequent terms from the union of all tweets about
a resource, and use these five terms as a query to Google. We found that using
tweet signatures results in discovering replacement resources with 70+% textual
similarity to the missing resource 41% of the time.
|
1309.2675 | Robert McColl | Rob McColl, David Ediger, Jason Poovey, Dan Campbell, David Bader | A Brief Study of Open Source Graph Databases | WSSSPE13, 4 Pages, 18 Pages with Appendix, 25 figures | null | null | null | cs.DB cs.DS cs.SE | http://creativecommons.org/licenses/by/3.0/ | With the proliferation of large irregular sparse relational datasets, new
storage and analysis platforms have arisen to fill gaps in performance and
capability left by conventional approaches built on traditional database
technologies and query languages. Many of these platforms apply graph
structures and analysis techniques to enable users to ingest, update, query and
compute on the topological structure of these relationships represented as
set(s) of edges between set(s) of vertices. To store and process Facebook-scale
datasets, they must be able to support data sources with billions of edges,
update rates of millions of updates per second, and complex analysis kernels.
These platforms must provide intuitive interfaces that enable graph experts and
novice programmers to write implementations of common graph algorithms. In this
paper, we explore a variety of graph analysis and storage platforms. We compare
their capabil- ities, interfaces, and performance by implementing and computing
a set of real-world graph algorithms on synthetic graphs with up to 256 million
edges. In the spirit of full disclosure, several authors are affiliated with
the development of STINGER.
| [
{
"version": "v1",
"created": "Fri, 6 Sep 2013 18:36:33 GMT"
}
] | 2013-09-12T00:00:00 | [
[
"McColl",
"Rob",
""
],
[
"Ediger",
"David",
""
],
[
"Poovey",
"Jason",
""
],
[
"Campbell",
"Dan",
""
],
[
"Bader",
"David",
""
]
] | TITLE: A Brief Study of Open Source Graph Databases
ABSTRACT: With the proliferation of large irregular sparse relational datasets, new
storage and analysis platforms have arisen to fill gaps in performance and
capability left by conventional approaches built on traditional database
technologies and query languages. Many of these platforms apply graph
structures and analysis techniques to enable users to ingest, update, query and
compute on the topological structure of these relationships represented as
set(s) of edges between set(s) of vertices. To store and process Facebook-scale
datasets, they must be able to support data sources with billions of edges,
update rates of millions of updates per second, and complex analysis kernels.
These platforms must provide intuitive interfaces that enable graph experts and
novice programmers to write implementations of common graph algorithms. In this
paper, we explore a variety of graph analysis and storage platforms. We compare
their capabil- ities, interfaces, and performance by implementing and computing
a set of real-world graph algorithms on synthetic graphs with up to 256 million
edges. In the spirit of full disclosure, several authors are affiliated with
the development of STINGER.
|
1309.2199 | Przemyslaw Grabowicz Mr | Przemyslaw A. Grabowicz, Luca Maria Aiello, V\'ictor M. Egu\'iluz,
Alejandro Jaimes | Distinguishing Topical and Social Groups Based on Common Identity and
Bond Theory | 10 pages, 6 figures, 2 tables | 2013. In Proceedings of the sixth ACM international conference on
Web search and data mining (WSDM '13). ACM, New York, NY, USA, 627-636 | 10.1145/2433396.2433475 | null | cs.SI cs.CY physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Social groups play a crucial role in social media platforms because they form
the basis for user participation and engagement. Groups are created explicitly
by members of the community, but also form organically as members interact. Due
to their importance, they have been studied widely (e.g., community detection,
evolution, activity, etc.). One of the key questions for understanding how such
groups evolve is whether there are different types of groups and how they
differ. In Sociology, theories have been proposed to help explain how such
groups form. In particular, the common identity and common bond theory states
that people join groups based on identity (i.e., interest in the topics
discussed) or bond attachment (i.e., social relationships). The theory has been
applied qualitatively to small groups to classify them as either topical or
social. We use the identity and bond theory to define a set of features to
classify groups into those two categories. Using a dataset from Flickr, we
extract user-defined groups and automatically-detected groups, obtained from a
community detection algorithm. We discuss the process of manual labeling of
groups into social or topical and present results of predicting the group label
based on the defined features. We directly validate the predictions of the
theory showing that the metrics are able to forecast the group type with high
accuracy. In addition, we present a comparison between declared and detected
groups along topicality and sociality dimensions.
| [
{
"version": "v1",
"created": "Mon, 9 Sep 2013 15:47:00 GMT"
}
] | 2013-09-10T00:00:00 | [
[
"Grabowicz",
"Przemyslaw A.",
""
],
[
"Aiello",
"Luca Maria",
""
],
[
"Eguíluz",
"Víctor M.",
""
],
[
"Jaimes",
"Alejandro",
""
]
] | TITLE: Distinguishing Topical and Social Groups Based on Common Identity and
Bond Theory
ABSTRACT: Social groups play a crucial role in social media platforms because they form
the basis for user participation and engagement. Groups are created explicitly
by members of the community, but also form organically as members interact. Due
to their importance, they have been studied widely (e.g., community detection,
evolution, activity, etc.). One of the key questions for understanding how such
groups evolve is whether there are different types of groups and how they
differ. In Sociology, theories have been proposed to help explain how such
groups form. In particular, the common identity and common bond theory states
that people join groups based on identity (i.e., interest in the topics
discussed) or bond attachment (i.e., social relationships). The theory has been
applied qualitatively to small groups to classify them as either topical or
social. We use the identity and bond theory to define a set of features to
classify groups into those two categories. Using a dataset from Flickr, we
extract user-defined groups and automatically-detected groups, obtained from a
community detection algorithm. We discuss the process of manual labeling of
groups into social or topical and present results of predicting the group label
based on the defined features. We directly validate the predictions of the
theory showing that the metrics are able to forecast the group type with high
accuracy. In addition, we present a comparison between declared and detected
groups along topicality and sociality dimensions.
|
1208.3629 | Hang Zhou | Marc Lelarge and Hang Zhou | Sublinear-Time Algorithms for Monomer-Dimer Systems on Bounded Degree
Graphs | null | null | null | null | cs.DS cs.DM math.PR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | For a graph $G$, let $Z(G,\lambda)$ be the partition function of the
monomer-dimer system defined by $\sum_k m_k(G)\lambda^k$, where $m_k(G)$ is the
number of matchings of size $k$ in $G$. We consider graphs of bounded degree
and develop a sublinear-time algorithm for estimating $\log Z(G,\lambda)$ at an
arbitrary value $\lambda>0$ within additive error $\epsilon n$ with high
probability. The query complexity of our algorithm does not depend on the size
of $G$ and is polynomial in $1/\epsilon$, and we also provide a lower bound
quadratic in $1/\epsilon$ for this problem. This is the first analysis of a
sublinear-time approximation algorithm for a $# P$-complete problem. Our
approach is based on the correlation decay of the Gibbs distribution associated
with $Z(G,\lambda)$. We show that our algorithm approximates the probability
for a vertex to be covered by a matching, sampled according to this Gibbs
distribution, in a near-optimal sublinear time. We extend our results to
approximate the average size and the entropy of such a matching within an
additive error with high probability, where again the query complexity is
polynomial in $1/\epsilon$ and the lower bound is quadratic in $1/\epsilon$.
Our algorithms are simple to implement and of practical use when dealing with
massive datasets. Our results extend to other systems where the correlation
decay is known to hold as for the independent set problem up to the critical
activity.
| [
{
"version": "v1",
"created": "Fri, 17 Aug 2012 16:11:27 GMT"
},
{
"version": "v2",
"created": "Sun, 23 Sep 2012 21:07:44 GMT"
},
{
"version": "v3",
"created": "Mon, 22 Apr 2013 21:01:49 GMT"
},
{
"version": "v4",
"created": "Tue, 18 Jun 2013 10:58:30 GMT"
},
{
"version": "v5",
"created": "Wed, 4 Sep 2013 07:49:39 GMT"
}
] | 2013-09-05T00:00:00 | [
[
"Lelarge",
"Marc",
""
],
[
"Zhou",
"Hang",
""
]
] | TITLE: Sublinear-Time Algorithms for Monomer-Dimer Systems on Bounded Degree
Graphs
ABSTRACT: For a graph $G$, let $Z(G,\lambda)$ be the partition function of the
monomer-dimer system defined by $\sum_k m_k(G)\lambda^k$, where $m_k(G)$ is the
number of matchings of size $k$ in $G$. We consider graphs of bounded degree
and develop a sublinear-time algorithm for estimating $\log Z(G,\lambda)$ at an
arbitrary value $\lambda>0$ within additive error $\epsilon n$ with high
probability. The query complexity of our algorithm does not depend on the size
of $G$ and is polynomial in $1/\epsilon$, and we also provide a lower bound
quadratic in $1/\epsilon$ for this problem. This is the first analysis of a
sublinear-time approximation algorithm for a $# P$-complete problem. Our
approach is based on the correlation decay of the Gibbs distribution associated
with $Z(G,\lambda)$. We show that our algorithm approximates the probability
for a vertex to be covered by a matching, sampled according to this Gibbs
distribution, in a near-optimal sublinear time. We extend our results to
approximate the average size and the entropy of such a matching within an
additive error with high probability, where again the query complexity is
polynomial in $1/\epsilon$ and the lower bound is quadratic in $1/\epsilon$.
Our algorithms are simple to implement and of practical use when dealing with
massive datasets. Our results extend to other systems where the correlation
decay is known to hold as for the independent set problem up to the critical
activity.
|
1309.1009 | Suranjan Ganguly | Ayan Seal, Suranjan Ganguly, Debotosh Bhattacharjee, Mita Nasipuri,
Dipak Kumar Basu | A Comparative Study of Human thermal face recognition based on Haar
wavelet transform (HWT) and Local Binary Pattern (LBP) | 17 pages Computational Intelligence and Neuroscience 2012 | null | null | null | cs.CV | http://creativecommons.org/licenses/publicdomain/ | Thermal infra-red (IR) images focus on changes of temperature distribution on
facial muscles and blood vessels. These temperature changes can be regarded as
texture features of images. A comparative study of face recognition methods
working in thermal spectrum is carried out in this paper. In these study two
local-matching methods based on Haar wavelet transform and Local Binary Pattern
(LBP) are analyzed. Wavelet transform is a good tool to analyze multi-scale,
multi-direction changes of texture. Local binary patterns (LBP) are a type of
feature used for classification in computer vision. Firstly, human thermal IR
face image is preprocessed and cropped the face region only from the entire
image. Secondly, two different approaches are used to extract the features from
the cropped face region. In the first approach, the training images and the
test images are processed with Haar wavelet transform and the LL band and the
average of LH/HL/HH bands sub-images are created for each face image. Then a
total confidence matrix is formed for each face image by taking a weighted sum
of the corresponding pixel values of the LL band and average band. For LBP
feature extraction, each of the face images in training and test datasets is
divided into 161 numbers of sub images, each of size 8X8 pixels. For each such
sub images, LBP features are extracted which are concatenated in row wise
manner. PCA is performed separately on the individual feature set for
dimensionality reeducation. Finally two different classifiers are used to
classify face images. One such classifier multi-layer feed forward neural
network and another classifier is minimum distance classifier. The Experiments
have been performed on the database created at our own laboratory and Terravic
Facial IR Database.
| [
{
"version": "v1",
"created": "Wed, 4 Sep 2013 12:41:48 GMT"
}
] | 2013-09-05T00:00:00 | [
[
"Seal",
"Ayan",
""
],
[
"Ganguly",
"Suranjan",
""
],
[
"Bhattacharjee",
"Debotosh",
""
],
[
"Nasipuri",
"Mita",
""
],
[
"Basu",
"Dipak Kumar",
""
]
] | TITLE: A Comparative Study of Human thermal face recognition based on Haar
wavelet transform (HWT) and Local Binary Pattern (LBP)
ABSTRACT: Thermal infra-red (IR) images focus on changes of temperature distribution on
facial muscles and blood vessels. These temperature changes can be regarded as
texture features of images. A comparative study of face recognition methods
working in thermal spectrum is carried out in this paper. In these study two
local-matching methods based on Haar wavelet transform and Local Binary Pattern
(LBP) are analyzed. Wavelet transform is a good tool to analyze multi-scale,
multi-direction changes of texture. Local binary patterns (LBP) are a type of
feature used for classification in computer vision. Firstly, human thermal IR
face image is preprocessed and cropped the face region only from the entire
image. Secondly, two different approaches are used to extract the features from
the cropped face region. In the first approach, the training images and the
test images are processed with Haar wavelet transform and the LL band and the
average of LH/HL/HH bands sub-images are created for each face image. Then a
total confidence matrix is formed for each face image by taking a weighted sum
of the corresponding pixel values of the LL band and average band. For LBP
feature extraction, each of the face images in training and test datasets is
divided into 161 numbers of sub images, each of size 8X8 pixels. For each such
sub images, LBP features are extracted which are concatenated in row wise
manner. PCA is performed separately on the individual feature set for
dimensionality reeducation. Finally two different classifiers are used to
classify face images. One such classifier multi-layer feed forward neural
network and another classifier is minimum distance classifier. The Experiments
have been performed on the database created at our own laboratory and Terravic
Facial IR Database.
|
1304.3754 | Jonathan Ullman | Karthekeyan Chandrasekaran, Justin Thaler, Jonathan Ullman, Andrew Wan | Faster Private Release of Marginals on Small Databases | null | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study the problem of answering \emph{$k$-way marginal} queries on a
database $D \in (\{0,1\}^d)^n$, while preserving differential privacy. The
answer to a $k$-way marginal query is the fraction of the database's records $x
\in \{0,1\}^d$ with a given value in each of a given set of up to $k$ columns.
Marginal queries enable a rich class of statistical analyses on a dataset, and
designing efficient algorithms for privately answering marginal queries has
been identified as an important open problem in private data analysis.
For any $k$, we give a differentially private online algorithm that runs in
time $$ \min{\exp(d^{1-\Omega(1/\sqrt{k})}), \exp(d / \log^{.99} d)\} $$ per
query and answers any (possibly superpolynomially long and adaptively chosen)
sequence of $k$-way marginal queries up to error at most $\pm .01$ on every
query, provided $n \gtrsim d^{.51} $. To the best of our knowledge, this is the
first algorithm capable of privately answering marginal queries with a
non-trivial worst-case accuracy guarantee on a database of size $\poly(d, k)$
in time $\exp(o(d))$.
Our algorithms are a variant of the private multiplicative weights algorithm
(Hardt and Rothblum, FOCS '10), but using a different low-weight representation
of the database. We derive our low-weight representation using approximations
to the OR function by low-degree polynomials with coefficients of bounded
$L_1$-norm. We also prove a strong limitation on our approach that is of
independent approximation-theoretic interest. Specifically, we show that for
any $k = o(\log d)$, any polynomial with coefficients of $L_1$-norm $poly(d)$
that pointwise approximates the $d$-variate OR function on all inputs of
Hamming weight at most $k$ must have degree $d^{1-O(1/\sqrt{k})}$.
| [
{
"version": "v1",
"created": "Sat, 13 Apr 2013 00:37:17 GMT"
},
{
"version": "v2",
"created": "Tue, 3 Sep 2013 00:41:55 GMT"
}
] | 2013-09-04T00:00:00 | [
[
"Chandrasekaran",
"Karthekeyan",
""
],
[
"Thaler",
"Justin",
""
],
[
"Ullman",
"Jonathan",
""
],
[
"Wan",
"Andrew",
""
]
] | TITLE: Faster Private Release of Marginals on Small Databases
ABSTRACT: We study the problem of answering \emph{$k$-way marginal} queries on a
database $D \in (\{0,1\}^d)^n$, while preserving differential privacy. The
answer to a $k$-way marginal query is the fraction of the database's records $x
\in \{0,1\}^d$ with a given value in each of a given set of up to $k$ columns.
Marginal queries enable a rich class of statistical analyses on a dataset, and
designing efficient algorithms for privately answering marginal queries has
been identified as an important open problem in private data analysis.
For any $k$, we give a differentially private online algorithm that runs in
time $$ \min{\exp(d^{1-\Omega(1/\sqrt{k})}), \exp(d / \log^{.99} d)\} $$ per
query and answers any (possibly superpolynomially long and adaptively chosen)
sequence of $k$-way marginal queries up to error at most $\pm .01$ on every
query, provided $n \gtrsim d^{.51} $. To the best of our knowledge, this is the
first algorithm capable of privately answering marginal queries with a
non-trivial worst-case accuracy guarantee on a database of size $\poly(d, k)$
in time $\exp(o(d))$.
Our algorithms are a variant of the private multiplicative weights algorithm
(Hardt and Rothblum, FOCS '10), but using a different low-weight representation
of the database. We derive our low-weight representation using approximations
to the OR function by low-degree polynomials with coefficients of bounded
$L_1$-norm. We also prove a strong limitation on our approach that is of
independent approximation-theoretic interest. Specifically, we show that for
any $k = o(\log d)$, any polynomial with coefficients of $L_1$-norm $poly(d)$
that pointwise approximates the $d$-variate OR function on all inputs of
Hamming weight at most $k$ must have degree $d^{1-O(1/\sqrt{k})}$.
|
1309.0534 | Raphael kena Poss | Raphael 'kena' Poss | Machines are benchmarked by code, not algorithms | 34 pages, 11 figures, 11 listings, 17 tables | null | null | null | cs.SE cs.PF | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This article highlights how small modifications to either the source code of
a benchmark program or the compilation options may impact its behavior on a
specific machine. It argues that for evaluating machines, benchmark providers
and users be careful to ensure reproducibility of results based on the machine
code actually running on the hardware and not just source code. The article
uses color to grayscale conversion of digital images as a running example.
| [
{
"version": "v1",
"created": "Mon, 2 Sep 2013 20:34:09 GMT"
}
] | 2013-09-04T00:00:00 | [
[
"Poss",
"Raphael 'kena'",
""
]
] | TITLE: Machines are benchmarked by code, not algorithms
ABSTRACT: This article highlights how small modifications to either the source code of
a benchmark program or the compilation options may impact its behavior on a
specific machine. It argues that for evaluating machines, benchmark providers
and users be careful to ensure reproducibility of results based on the machine
code actually running on the hardware and not just source code. The article
uses color to grayscale conversion of digital images as a running example.
|
1309.0215 | Mian Lu | Mian Lu, Lei Zhang, Huynh Phung Huynh, Zhongliang Ong, Yun Liang,
Bingsheng He, Rick Siow Mong Goh, Richard Huynh | Optimizing the MapReduce Framework on Intel Xeon Phi Coprocessor | null | null | null | null | cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | With the ease-of-programming, flexibility and yet efficiency, MapReduce has
become one of the most popular frameworks for building big-data applications.
MapReduce was originally designed for distributed-computing, and has been
extended to various architectures, e,g, multi-core CPUs, GPUs and FPGAs. In
this work, we focus on optimizing the MapReduce framework on Xeon Phi, which is
the latest product released by Intel based on the Many Integrated Core
Architecture. To the best of our knowledge, this is the first work to optimize
the MapReduce framework on the Xeon Phi.
In our work, we utilize advanced features of the Xeon Phi to achieve high
performance. In order to take advantage of the SIMD vector processing units, we
propose a vectorization friendly technique for the map phase to assist the
auto-vectorization as well as develop SIMD hash computation algorithms.
Furthermore, we utilize MIMD hyper-threading to pipeline the map and reduce to
improve the resource utilization. We also eliminate multiple local arrays but
use low cost atomic operations on the global array for some applications, which
can improve the thread scalability and data locality due to the coherent L2
caches. Finally, for a given application, our framework can either
automatically detect suitable techniques to apply or provide guideline for
users at compilation time. We conduct comprehensive experiments to benchmark
the Xeon Phi and compare our optimized MapReduce framework with a
state-of-the-art multi-core based MapReduce framework (Phoenix++). By
evaluating six real-world applications, the experimental results show that our
optimized framework is 1.2X to 38X faster than Phoenix++ for various
applications on the Xeon Phi.
| [
{
"version": "v1",
"created": "Sun, 1 Sep 2013 12:39:30 GMT"
}
] | 2013-09-03T00:00:00 | [
[
"Lu",
"Mian",
""
],
[
"Zhang",
"Lei",
""
],
[
"Huynh",
"Huynh Phung",
""
],
[
"Ong",
"Zhongliang",
""
],
[
"Liang",
"Yun",
""
],
[
"He",
"Bingsheng",
""
],
[
"Goh",
"Rick Siow Mong",
""
],
[
"Huynh",
"Richard",
""
]
] | TITLE: Optimizing the MapReduce Framework on Intel Xeon Phi Coprocessor
ABSTRACT: With the ease-of-programming, flexibility and yet efficiency, MapReduce has
become one of the most popular frameworks for building big-data applications.
MapReduce was originally designed for distributed-computing, and has been
extended to various architectures, e,g, multi-core CPUs, GPUs and FPGAs. In
this work, we focus on optimizing the MapReduce framework on Xeon Phi, which is
the latest product released by Intel based on the Many Integrated Core
Architecture. To the best of our knowledge, this is the first work to optimize
the MapReduce framework on the Xeon Phi.
In our work, we utilize advanced features of the Xeon Phi to achieve high
performance. In order to take advantage of the SIMD vector processing units, we
propose a vectorization friendly technique for the map phase to assist the
auto-vectorization as well as develop SIMD hash computation algorithms.
Furthermore, we utilize MIMD hyper-threading to pipeline the map and reduce to
improve the resource utilization. We also eliminate multiple local arrays but
use low cost atomic operations on the global array for some applications, which
can improve the thread scalability and data locality due to the coherent L2
caches. Finally, for a given application, our framework can either
automatically detect suitable techniques to apply or provide guideline for
users at compilation time. We conduct comprehensive experiments to benchmark
the Xeon Phi and compare our optimized MapReduce framework with a
state-of-the-art multi-core based MapReduce framework (Phoenix++). By
evaluating six real-world applications, the experimental results show that our
optimized framework is 1.2X to 38X faster than Phoenix++ for various
applications on the Xeon Phi.
|
1309.0309 | Xiaojiang Peng | Xiaojiang Peng, Qiang Peng, Yu Qiao, Junzhou Chen, Mehtab Afzal | A Study on Unsupervised Dictionary Learning and Feature Encoding for
Action Classification | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Many efforts have been devoted to develop alternative methods to traditional
vector quantization in image domain such as sparse coding and soft-assignment.
These approaches can be split into a dictionary learning phase and a feature
encoding phase which are often closely connected. In this paper, we investigate
the effects of these phases by separating them for video-based action
classification. We compare several dictionary learning methods and feature
encoding schemes through extensive experiments on KTH and HMDB51 datasets.
Experimental results indicate that sparse coding performs consistently better
than the other encoding methods in large complex dataset (i.e., HMDB51), and it
is robust to different dictionaries. For small simple dataset (i.e., KTH) with
less variation, however, all the encoding strategies perform competitively. In
addition, we note that the strength of sophisticated encoding approaches comes
not from their corresponding dictionaries but the encoding mechanisms, and we
can just use randomly selected exemplars as dictionaries for video-based action
classification.
| [
{
"version": "v1",
"created": "Mon, 2 Sep 2013 07:06:05 GMT"
}
] | 2013-09-03T00:00:00 | [
[
"Peng",
"Xiaojiang",
""
],
[
"Peng",
"Qiang",
""
],
[
"Qiao",
"Yu",
""
],
[
"Chen",
"Junzhou",
""
],
[
"Afzal",
"Mehtab",
""
]
] | TITLE: A Study on Unsupervised Dictionary Learning and Feature Encoding for
Action Classification
ABSTRACT: Many efforts have been devoted to develop alternative methods to traditional
vector quantization in image domain such as sparse coding and soft-assignment.
These approaches can be split into a dictionary learning phase and a feature
encoding phase which are often closely connected. In this paper, we investigate
the effects of these phases by separating them for video-based action
classification. We compare several dictionary learning methods and feature
encoding schemes through extensive experiments on KTH and HMDB51 datasets.
Experimental results indicate that sparse coding performs consistently better
than the other encoding methods in large complex dataset (i.e., HMDB51), and it
is robust to different dictionaries. For small simple dataset (i.e., KTH) with
less variation, however, all the encoding strategies perform competitively. In
addition, we note that the strength of sophisticated encoding approaches comes
not from their corresponding dictionaries but the encoding mechanisms, and we
can just use randomly selected exemplars as dictionaries for video-based action
classification.
|
1309.0337 | Neil Houlsby | Neil Houlsby, Massimiliano Ciaramita | Scalable Probabilistic Entity-Topic Modeling | null | null | null | null | stat.ML cs.IR cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present an LDA approach to entity disambiguation. Each topic is associated
with a Wikipedia article and topics generate either content words or entity
mentions. Training such models is challenging because of the topic and
vocabulary size, both in the millions. We tackle these problems using a novel
distributed inference and representation framework based on a parallel Gibbs
sampler guided by the Wikipedia link graph, and pipelines of MapReduce allowing
fast and memory-frugal processing of large datasets. We report state-of-the-art
performance on a public dataset.
| [
{
"version": "v1",
"created": "Mon, 2 Sep 2013 09:34:50 GMT"
}
] | 2013-09-03T00:00:00 | [
[
"Houlsby",
"Neil",
""
],
[
"Ciaramita",
"Massimiliano",
""
]
] | TITLE: Scalable Probabilistic Entity-Topic Modeling
ABSTRACT: We present an LDA approach to entity disambiguation. Each topic is associated
with a Wikipedia article and topics generate either content words or entity
mentions. Training such models is challenging because of the topic and
vocabulary size, both in the millions. We tackle these problems using a novel
distributed inference and representation framework based on a parallel Gibbs
sampler guided by the Wikipedia link graph, and pipelines of MapReduce allowing
fast and memory-frugal processing of large datasets. We report state-of-the-art
performance on a public dataset.
|
1309.0346 | Alfredo Braunstein | Indaco Biazzo, Alfredo Braunstein, Riccardo Zecchina | On the performance of a cavity method based algorithm for the
Prize-Collecting Steiner Tree Problem on graphs | null | Phys. Rev. E 86, 026706 (2012) | 10.1103/PhysRevE.86.026706 | null | cs.DS cond-mat.stat-mech | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study the behavior of an algorithm derived from the cavity method for the
Prize-Collecting Steiner Tree (PCST) problem on graphs. The algorithm is based
on the zero temperature limit of the cavity equations and as such is formally
simple (a fixed point equation resolved by iteration) and distributed
(parallelizable). We provide a detailed comparison with state-of-the-art
algorithms on a wide range of existing benchmarks networks and random graphs.
Specifically, we consider an enhanced derivative of the Goemans-Williamson
heuristics and the DHEA solver, a Branch and Cut Linear/Integer Programming
based approach. The comparison shows that the cavity algorithm outperforms the
two algorithms in most large instances both in running time and quality of the
solution. Finally we prove a few optimality properties of the solutions
provided by our algorithm, including optimality under the two post-processing
procedures defined in the Goemans-Williamson derivative and global optimality
in some limit cases.
| [
{
"version": "v1",
"created": "Mon, 2 Sep 2013 10:05:17 GMT"
}
] | 2013-09-03T00:00:00 | [
[
"Biazzo",
"Indaco",
""
],
[
"Braunstein",
"Alfredo",
""
],
[
"Zecchina",
"Riccardo",
""
]
] | TITLE: On the performance of a cavity method based algorithm for the
Prize-Collecting Steiner Tree Problem on graphs
ABSTRACT: We study the behavior of an algorithm derived from the cavity method for the
Prize-Collecting Steiner Tree (PCST) problem on graphs. The algorithm is based
on the zero temperature limit of the cavity equations and as such is formally
simple (a fixed point equation resolved by iteration) and distributed
(parallelizable). We provide a detailed comparison with state-of-the-art
algorithms on a wide range of existing benchmarks networks and random graphs.
Specifically, we consider an enhanced derivative of the Goemans-Williamson
heuristics and the DHEA solver, a Branch and Cut Linear/Integer Programming
based approach. The comparison shows that the cavity algorithm outperforms the
two algorithms in most large instances both in running time and quality of the
solution. Finally we prove a few optimality properties of the solutions
provided by our algorithm, including optimality under the two post-processing
procedures defined in the Goemans-Williamson derivative and global optimality
in some limit cases.
|
1305.2949 | Reza Farrahi Moghaddam | Reza Farrahi Moghaddam and Fereydoun Farrahi Moghaddam and Mohamed
Cheriet | Unsupervised ensemble of experts (EoE) framework for automatic
binarization of document images | 6-page version, Accepted to be presented in ICDAR'13 | ICDAR 2013, pp 703-707 | 10.1109/ICDAR.2013.144 | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In recent years, a large number of binarization methods have been developed,
with varying performance generalization and strength against different
benchmarks. In this work, to leverage on these methods, an ensemble of experts
(EoE) framework is introduced, to efficiently combine the outputs of various
methods. The proposed framework offers a new selection process of the
binarization methods, which are actually the experts in the ensemble, by
introducing three concepts: confidentness, endorsement and schools of experts.
The framework, which is highly objective, is built based on two general
principles: (i) consolidation of saturated opinions and (ii) identification of
schools of experts. After building the endorsement graph of the ensemble for an
input document image based on the confidentness of the experts, the saturated
opinions are consolidated, and then the schools of experts are identified by
thresholding the consolidated endorsement graph. A variation of the framework,
in which no selection is made, is also introduced that combines the outputs of
all experts using endorsement-dependent weights. The EoE framework is evaluated
on the set of participating methods in the H-DIBCO'12 contest and also on an
ensemble generated from various instances of grid-based Sauvola method with
promising performance.
| [
{
"version": "v1",
"created": "Mon, 13 May 2013 20:37:29 GMT"
},
{
"version": "v2",
"created": "Wed, 29 May 2013 14:36:35 GMT"
}
] | 2013-09-02T00:00:00 | [
[
"Moghaddam",
"Reza Farrahi",
""
],
[
"Moghaddam",
"Fereydoun Farrahi",
""
],
[
"Cheriet",
"Mohamed",
""
]
] | TITLE: Unsupervised ensemble of experts (EoE) framework for automatic
binarization of document images
ABSTRACT: In recent years, a large number of binarization methods have been developed,
with varying performance generalization and strength against different
benchmarks. In this work, to leverage on these methods, an ensemble of experts
(EoE) framework is introduced, to efficiently combine the outputs of various
methods. The proposed framework offers a new selection process of the
binarization methods, which are actually the experts in the ensemble, by
introducing three concepts: confidentness, endorsement and schools of experts.
The framework, which is highly objective, is built based on two general
principles: (i) consolidation of saturated opinions and (ii) identification of
schools of experts. After building the endorsement graph of the ensemble for an
input document image based on the confidentness of the experts, the saturated
opinions are consolidated, and then the schools of experts are identified by
thresholding the consolidated endorsement graph. A variation of the framework,
in which no selection is made, is also introduced that combines the outputs of
all experts using endorsement-dependent weights. The EoE framework is evaluated
on the set of participating methods in the H-DIBCO'12 contest and also on an
ensemble generated from various instances of grid-based Sauvola method with
promising performance.
|
1308.6683 | Jerome Darmont | Chantola Kit (ERIC), Marouane Hachicha (ERIC), J\'er\^ome Darmont
(ERIC) | Benchmarking Summarizability Processing in XML Warehouses with Complex
Hierarchies | 15th International Workshop on Data Warehousing and OLAP (DOLAP
2012), Maui : United States (2012) | null | null | null | cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Business Intelligence plays an important role in decision making. Based on
data warehouses and Online Analytical Processing, a business intelligence tool
can be used to analyze complex data. Still, summarizability issues in data
warehouses cause ineffective analyses that may become critical problems to
businesses. To settle this issue, many researchers have studied and proposed
various solutions, both in relational and XML data warehouses. However, they
find difficulty in evaluating the performance of their proposals since the
available benchmarks lack complex hierarchies. In order to contribute to
summarizability analysis, this paper proposes an extension to the XML warehouse
benchmark (XWeB) with complex hierarchies. The benchmark enables us to generate
XML data warehouses with scalable complex hierarchies as well as
summarizability processing. We experimentally demonstrated that complex
hierarchies can definitely be included into a benchmark dataset, and that our
benchmark is able to compare two alternative approaches dealing with
summarizability issues.
| [
{
"version": "v1",
"created": "Fri, 30 Aug 2013 09:02:02 GMT"
}
] | 2013-09-02T00:00:00 | [
[
"Kit",
"Chantola",
"",
"ERIC"
],
[
"Hachicha",
"Marouane",
"",
"ERIC"
],
[
"Darmont",
"Jérôme",
"",
"ERIC"
]
] | TITLE: Benchmarking Summarizability Processing in XML Warehouses with Complex
Hierarchies
ABSTRACT: Business Intelligence plays an important role in decision making. Based on
data warehouses and Online Analytical Processing, a business intelligence tool
can be used to analyze complex data. Still, summarizability issues in data
warehouses cause ineffective analyses that may become critical problems to
businesses. To settle this issue, many researchers have studied and proposed
various solutions, both in relational and XML data warehouses. However, they
find difficulty in evaluating the performance of their proposals since the
available benchmarks lack complex hierarchies. In order to contribute to
summarizability analysis, this paper proposes an extension to the XML warehouse
benchmark (XWeB) with complex hierarchies. The benchmark enables us to generate
XML data warehouses with scalable complex hierarchies as well as
summarizability processing. We experimentally demonstrated that complex
hierarchies can definitely be included into a benchmark dataset, and that our
benchmark is able to compare two alternative approaches dealing with
summarizability issues.
|
1308.6721 | Puneet Kumar | Pierre-Yves Baudin (INRIA Saclay - Ile de France), Danny Goodman,
Puneet Kumar (INRIA Saclay - Ile de France, CVN), Noura Azzabou (MIRCEN,
UPMC), Pierre G. Carlier (UPMC), Nikos Paragios (INRIA Saclay - Ile de
France, MAS, LIGM, ENPC), M. Pawan Kumar (INRIA Saclay - Ile de France, CVN) | Discriminative Parameter Estimation for Random Walks Segmentation | Medical Image Computing and Computer Assisted Interventaion (2013) | null | null | null | cs.CV cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The Random Walks (RW) algorithm is one of the most e - cient and easy-to-use
probabilistic segmentation methods. By combining contrast terms with prior
terms, it provides accurate segmentations of medical images in a fully
automated manner. However, one of the main drawbacks of using the RW algorithm
is that its parameters have to be hand-tuned. we propose a novel discriminative
learning framework that estimates the parameters using a training dataset. The
main challenge we face is that the training samples are not fully supervised.
Speci cally, they provide a hard segmentation of the images, instead of a
proba- bilistic segmentation. We overcome this challenge by treating the opti-
mal probabilistic segmentation that is compatible with the given hard
segmentation as a latent variable. This allows us to employ the latent support
vector machine formulation for parameter estimation. We show that our approach
signi cantly outperforms the baseline methods on a challenging dataset
consisting of real clinical 3D MRI volumes of skeletal muscles.
| [
{
"version": "v1",
"created": "Fri, 30 Aug 2013 12:13:11 GMT"
}
] | 2013-09-02T00:00:00 | [
[
"Baudin",
"Pierre-Yves",
"",
"INRIA Saclay - Ile de France"
],
[
"Goodman",
"Danny",
"",
"INRIA Saclay - Ile de France, CVN"
],
[
"Kumar",
"Puneet",
"",
"INRIA Saclay - Ile de France, CVN"
],
[
"Azzabou",
"Noura",
"",
"MIRCEN,\n UPMC"
],
[
"Carlier",
"Pierre G.",
"",
"UPMC"
],
[
"Paragios",
"Nikos",
"",
"INRIA Saclay - Ile de\n France, MAS, LIGM, ENPC"
],
[
"Kumar",
"M. Pawan",
"",
"INRIA Saclay - Ile de France, CVN"
]
] | TITLE: Discriminative Parameter Estimation for Random Walks Segmentation
ABSTRACT: The Random Walks (RW) algorithm is one of the most e - cient and easy-to-use
probabilistic segmentation methods. By combining contrast terms with prior
terms, it provides accurate segmentations of medical images in a fully
automated manner. However, one of the main drawbacks of using the RW algorithm
is that its parameters have to be hand-tuned. we propose a novel discriminative
learning framework that estimates the parameters using a training dataset. The
main challenge we face is that the training samples are not fully supervised.
Speci cally, they provide a hard segmentation of the images, instead of a
proba- bilistic segmentation. We overcome this challenge by treating the opti-
mal probabilistic segmentation that is compatible with the given hard
segmentation as a latent variable. This allows us to employ the latent support
vector machine formulation for parameter estimation. We show that our approach
signi cantly outperforms the baseline methods on a challenging dataset
consisting of real clinical 3D MRI volumes of skeletal muscles.
|
1110.5813 | Jierui Xie | Jierui Xie, Stephen Kelley, Boleslaw K. Szymanski | Overlapping Community Detection in Networks: the State of the Art and
Comparative Study | This paper (final version) is accepted in 2012. ACM Computing
Surveys, vol. 45, no. 4, 2013 (In press) Contact: [email protected] | ACM Computing Surveys 45(4), Article 43 (August 2013) | 10.1145/2501654.2501657 | null | cs.SI cs.DS physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper reviews the state of the art in overlapping community detection
algorithms, quality measures, and benchmarks. A thorough comparison of
different algorithms (a total of fourteen) is provided. In addition to
community level evaluation, we propose a framework for evaluating algorithms'
ability to detect overlapping nodes, which helps to assess over-detection and
under-detection. After considering community level detection performance
measured by Normalized Mutual Information, the Omega index, and node level
detection performance measured by F-score, we reached the following
conclusions. For low overlapping density networks, SLPA, OSLOM, Game and COPRA
offer better performance than the other tested algorithms. For networks with
high overlapping density and high overlapping diversity, both SLPA and Game
provide relatively stable performance. However, test results also suggest that
the detection in such networks is still not yet fully resolved. A common
feature observed by various algorithms in real-world networks is the relatively
small fraction of overlapping nodes (typically less than 30%), each of which
belongs to only 2 or 3 communities.
| [
{
"version": "v1",
"created": "Wed, 26 Oct 2011 15:12:38 GMT"
},
{
"version": "v2",
"created": "Thu, 27 Oct 2011 03:05:03 GMT"
},
{
"version": "v3",
"created": "Tue, 8 Nov 2011 21:27:02 GMT"
},
{
"version": "v4",
"created": "Tue, 3 Jul 2012 19:30:23 GMT"
}
] | 2013-08-30T00:00:00 | [
[
"Xie",
"Jierui",
""
],
[
"Kelley",
"Stephen",
""
],
[
"Szymanski",
"Boleslaw K.",
""
]
] | TITLE: Overlapping Community Detection in Networks: the State of the Art and
Comparative Study
ABSTRACT: This paper reviews the state of the art in overlapping community detection
algorithms, quality measures, and benchmarks. A thorough comparison of
different algorithms (a total of fourteen) is provided. In addition to
community level evaluation, we propose a framework for evaluating algorithms'
ability to detect overlapping nodes, which helps to assess over-detection and
under-detection. After considering community level detection performance
measured by Normalized Mutual Information, the Omega index, and node level
detection performance measured by F-score, we reached the following
conclusions. For low overlapping density networks, SLPA, OSLOM, Game and COPRA
offer better performance than the other tested algorithms. For networks with
high overlapping density and high overlapping diversity, both SLPA and Game
provide relatively stable performance. However, test results also suggest that
the detection in such networks is still not yet fully resolved. A common
feature observed by various algorithms in real-world networks is the relatively
small fraction of overlapping nodes (typically less than 30%), each of which
belongs to only 2 or 3 communities.
|
1308.6276 | Arnaud Browet | Arnaud Browet and P.-A. Absil and Paul Van Dooren | Fast community detection using local neighbourhood search | null | null | null | null | physics.soc-ph cs.SI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Communities play a crucial role to describe and analyse modern networks.
However, the size of those networks has grown tremendously with the increase of
computational power and data storage. While various methods have been developed
to extract community structures, their computational cost or the difficulty to
parallelize existing algorithms make partitioning real networks into
communities a challenging problem. In this paper, we propose to alter an
efficient algorithm, the Louvain method, such that communities are defined as
the connected components of a tree-like assignment graph. Within this
framework, we precisely describe the different steps of our algorithm and
demonstrate its highly parallelizable nature. We then show that despite its
simplicity, our algorithm has a partitioning quality similar to the original
method on benchmark graphs and even outperforms other algorithms. We also show
that, even on a single processor, our method is much faster and allows the
analysis of very large networks.
| [
{
"version": "v1",
"created": "Wed, 28 Aug 2013 13:53:18 GMT"
}
] | 2013-08-30T00:00:00 | [
[
"Browet",
"Arnaud",
""
],
[
"Absil",
"P. -A.",
""
],
[
"Van Dooren",
"Paul",
""
]
] | TITLE: Fast community detection using local neighbourhood search
ABSTRACT: Communities play a crucial role to describe and analyse modern networks.
However, the size of those networks has grown tremendously with the increase of
computational power and data storage. While various methods have been developed
to extract community structures, their computational cost or the difficulty to
parallelize existing algorithms make partitioning real networks into
communities a challenging problem. In this paper, we propose to alter an
efficient algorithm, the Louvain method, such that communities are defined as
the connected components of a tree-like assignment graph. Within this
framework, we precisely describe the different steps of our algorithm and
demonstrate its highly parallelizable nature. We then show that despite its
simplicity, our algorithm has a partitioning quality similar to the original
method on benchmark graphs and even outperforms other algorithms. We also show
that, even on a single processor, our method is much faster and allows the
analysis of very large networks.
|
1106.0785 | Aiguo Xu Prof. Dr. | Feng Chen, Aiguo Xu, Guangcai Zhang, Yingjun Li | Prandtl number effects in MRT Lattice Boltzmann models for shocked and
unshocked compressible fluids | 17 pages, 8 figures | Theoretical and Applied Mechanics Letters 1, 052004 (2011) | null | null | cond-mat.soft cs.NA nlin.CG physics.comp-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | For compressible fluids under shock wave reaction, we have proposed two
Multiple-Relaxation-Time (MRT) Lattice Boltzmann (LB) models [F. Chen, et al,
EPL \textbf{90} (2010) 54003; Phys. Lett. A \textbf{375} (2011) 2129.]. In this
paper, we construct a new MRT Lattice Boltzmann model which is not only for the
shocked compressible fluids, but also for the unshocked compressible fluids. To
make the model work for unshocked compressible fluids, a key step is to modify
the collision operators of energy flux so that the viscous coefficient in
momentum equation is consistent with that in energy equation even in the
unshocked system. The unnecessity of the modification for systems under strong
shock is analyzed. The model is validated by some well-known benchmark tests,
including (i) thermal Couette flow, (ii) Riemann problem, (iii)
Richtmyer-Meshkov instability. The first system is unshocked and the latter two
are shocked. In all the three systems, the Prandtl numbers effects are checked.
Satisfying agreements are obtained between new model results and analytical
ones or other numerical results.
| [
{
"version": "v1",
"created": "Sat, 4 Jun 2011 03:14:32 GMT"
}
] | 2013-08-29T00:00:00 | [
[
"Chen",
"Feng",
""
],
[
"Xu",
"Aiguo",
""
],
[
"Zhang",
"Guangcai",
""
],
[
"Li",
"Yingjun",
""
]
] | TITLE: Prandtl number effects in MRT Lattice Boltzmann models for shocked and
unshocked compressible fluids
ABSTRACT: For compressible fluids under shock wave reaction, we have proposed two
Multiple-Relaxation-Time (MRT) Lattice Boltzmann (LB) models [F. Chen, et al,
EPL \textbf{90} (2010) 54003; Phys. Lett. A \textbf{375} (2011) 2129.]. In this
paper, we construct a new MRT Lattice Boltzmann model which is not only for the
shocked compressible fluids, but also for the unshocked compressible fluids. To
make the model work for unshocked compressible fluids, a key step is to modify
the collision operators of energy flux so that the viscous coefficient in
momentum equation is consistent with that in energy equation even in the
unshocked system. The unnecessity of the modification for systems under strong
shock is analyzed. The model is validated by some well-known benchmark tests,
including (i) thermal Couette flow, (ii) Riemann problem, (iii)
Richtmyer-Meshkov instability. The first system is unshocked and the latter two
are shocked. In all the three systems, the Prandtl numbers effects are checked.
Satisfying agreements are obtained between new model results and analytical
ones or other numerical results.
|
1308.6181 | Jesus Cerquides | Victor Bellon and Jesus Cerquides and Ivo Grosse | Bayesian Conditional Gaussian Network Classifiers with Applications to
Mass Spectra Classification | null | null | null | null | cs.LG stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Classifiers based on probabilistic graphical models are very effective. In
continuous domains, maximum likelihood is usually used to assess the
predictions of those classifiers. When data is scarce, this can easily lead to
overfitting. In any probabilistic setting, Bayesian averaging (BA) provides
theoretically optimal predictions and is known to be robust to overfitting. In
this work we introduce Bayesian Conditional Gaussian Network Classifiers, which
efficiently perform exact Bayesian averaging over the parameters. We evaluate
the proposed classifiers against the maximum likelihood alternatives proposed
so far over standard UCI datasets, concluding that performing BA improves the
quality of the assessed probabilities (conditional log likelihood) whilst
maintaining the error rate.
Overfitting is more likely to occur in domains where the number of data items
is small and the number of variables is large. These two conditions are met in
the realm of bioinformatics, where the early diagnosis of cancer from mass
spectra is a relevant task. We provide an application of our classification
framework to that problem, comparing it with the standard maximum likelihood
alternative, where the improvement of quality in the assessed probabilities is
confirmed.
| [
{
"version": "v1",
"created": "Wed, 28 Aug 2013 15:14:47 GMT"
}
] | 2013-08-29T00:00:00 | [
[
"Bellon",
"Victor",
""
],
[
"Cerquides",
"Jesus",
""
],
[
"Grosse",
"Ivo",
""
]
] | TITLE: Bayesian Conditional Gaussian Network Classifiers with Applications to
Mass Spectra Classification
ABSTRACT: Classifiers based on probabilistic graphical models are very effective. In
continuous domains, maximum likelihood is usually used to assess the
predictions of those classifiers. When data is scarce, this can easily lead to
overfitting. In any probabilistic setting, Bayesian averaging (BA) provides
theoretically optimal predictions and is known to be robust to overfitting. In
this work we introduce Bayesian Conditional Gaussian Network Classifiers, which
efficiently perform exact Bayesian averaging over the parameters. We evaluate
the proposed classifiers against the maximum likelihood alternatives proposed
so far over standard UCI datasets, concluding that performing BA improves the
quality of the assessed probabilities (conditional log likelihood) whilst
maintaining the error rate.
Overfitting is more likely to occur in domains where the number of data items
is small and the number of variables is large. These two conditions are met in
the realm of bioinformatics, where the early diagnosis of cancer from mass
spectra is a relevant task. We provide an application of our classification
framework to that problem, comparing it with the standard maximum likelihood
alternative, where the improvement of quality in the assessed probabilities is
confirmed.
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.