id
large_stringlengths
9
16
submitter
large_stringlengths
3
64
authors
large_stringlengths
5
20.2k
title
large_stringlengths
5
245
comments
large_stringlengths
1
482
journal-ref
large_stringlengths
4
382
doi
large_stringlengths
9
151
report-no
large_stringlengths
2
509
categories
large_stringlengths
5
78
license
large_stringclasses
9 values
abstract
large_stringlengths
83
3.55k
versions
large listlengths
1
21
update_date
timestamp[ms]date
2007-05-23 00:00:00
2025-05-30 00:00:00
authors_parsed
large listlengths
1
1.35k
prompt
large_stringlengths
166
3.64k
1308.5752
Alexander Petersen
Alexander M. Petersen and Sauro Succi
The Z-index: A geometric representation of productivity and impact which accounts for information in the entire rank-citation profile
9 pages, 5 figures
J. of Informetrics 7, 823-832 (2013)
10.1016/j.joi.2013.07.003
null
physics.soc-ph cs.DL physics.data-an
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a simple generalization of Hirsch's h-index, Z = \sqrt{h^{2}+C}/\sqrt{5}, where C is the total number of citations. Z is aimed at correcting the potentially excessive penalty made by h on a scientist's highly cited papers, because for the majority of scientists analyzed, we find the excess citation fraction (C-h^{2})/C to be distributed closely around the value 0.75, meaning that 75 percent of the author's impact is neglected. Additionally, Z is less sensitive to local changes in a scientist's citation profile, namely perturbations which increase h while only marginally affecting C. Using real career data for 476 physicists careers and 488 biologist careers, we analyze both the distribution of $Z$ and the rank stability of Z with respect to the Hirsch index h and the Egghe index g. We analyze careers distributed across a wide range of total impact, including top-cited physicists and biologists for benchmark comparison. In practice, the Z-index requires the same information needed to calculate h and could be effortlessly incorporated within career profile databases, such as Google Scholar and ResearcherID. Because Z incorporates information from the entire publication profile while being more robust than h and g to local perturbations, we argue that Z is better suited for ranking comparisons in academic decision-making scenarios comprising a large number of scientists.
[ { "version": "v1", "created": "Tue, 27 Aug 2013 04:45:52 GMT" } ]
2013-08-28T00:00:00
[ [ "Petersen", "Alexander M.", "" ], [ "Succi", "Sauro", "" ] ]
TITLE: The Z-index: A geometric representation of productivity and impact which accounts for information in the entire rank-citation profile ABSTRACT: We present a simple generalization of Hirsch's h-index, Z = \sqrt{h^{2}+C}/\sqrt{5}, where C is the total number of citations. Z is aimed at correcting the potentially excessive penalty made by h on a scientist's highly cited papers, because for the majority of scientists analyzed, we find the excess citation fraction (C-h^{2})/C to be distributed closely around the value 0.75, meaning that 75 percent of the author's impact is neglected. Additionally, Z is less sensitive to local changes in a scientist's citation profile, namely perturbations which increase h while only marginally affecting C. Using real career data for 476 physicists careers and 488 biologist careers, we analyze both the distribution of $Z$ and the rank stability of Z with respect to the Hirsch index h and the Egghe index g. We analyze careers distributed across a wide range of total impact, including top-cited physicists and biologists for benchmark comparison. In practice, the Z-index requires the same information needed to calculate h and could be effortlessly incorporated within career profile databases, such as Google Scholar and ResearcherID. Because Z incorporates information from the entire publication profile while being more robust than h and g to local perturbations, we argue that Z is better suited for ranking comparisons in academic decision-making scenarios comprising a large number of scientists.
1308.5846
Matthew Knepley
Brad T. Aagaard and Matthew G. Knepley and Charles A. Williams
A Domain Decomposition Approach to Implementing Fault Slip in Finite-Element Models of Quasi-static and Dynamic Crustal Deformation
14 pages, 15 figures
Journal of Geophysical Research, 118(6), pp.3059-3079, 2013
10.1002/jgrb.50217
null
physics.geo-ph cs.CE cs.MS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We employ a domain decomposition approach with Lagrange multipliers to implement fault slip in a finite-element code, PyLith, for use in both quasi-static and dynamic crustal deformation applications. This integrated approach to solving both quasi-static and dynamic simulations leverages common finite-element data structures and implementations of various boundary conditions, discretization schemes, and bulk and fault rheologies. We have developed a custom preconditioner for the Lagrange multiplier portion of the system of equations that provides excellent scalability with problem size compared to conventional additive Schwarz methods. We demonstrate application of this approach using benchmarks for both quasi-static viscoelastic deformation and dynamic spontaneous rupture propagation that verify the numerical implementation in PyLith.
[ { "version": "v1", "created": "Tue, 27 Aug 2013 12:46:37 GMT" } ]
2013-08-28T00:00:00
[ [ "Aagaard", "Brad T.", "" ], [ "Knepley", "Matthew G.", "" ], [ "Williams", "Charles A.", "" ] ]
TITLE: A Domain Decomposition Approach to Implementing Fault Slip in Finite-Element Models of Quasi-static and Dynamic Crustal Deformation ABSTRACT: We employ a domain decomposition approach with Lagrange multipliers to implement fault slip in a finite-element code, PyLith, for use in both quasi-static and dynamic crustal deformation applications. This integrated approach to solving both quasi-static and dynamic simulations leverages common finite-element data structures and implementations of various boundary conditions, discretization schemes, and bulk and fault rheologies. We have developed a custom preconditioner for the Lagrange multiplier portion of the system of equations that provides excellent scalability with problem size compared to conventional additive Schwarz methods. We demonstrate application of this approach using benchmarks for both quasi-static viscoelastic deformation and dynamic spontaneous rupture propagation that verify the numerical implementation in PyLith.
1308.5421
Nils Ulltveit-Moe
Nils Ulltveit-Moe and Vladimir Oleshchuk
Measuring Privacy Leakage for IDS Rules
22 pages, 16 figures
null
null
null
cs.CR cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper proposes a measurement approach for estimating the privacy leakage from Intrusion Detection System (IDS) alarms. Quantitative information flow analysis is used to build a theoretical model of privacy leakage from IDS rules, based on information entropy. This theoretical model is subsequently verified empirically both based on simulations and in an experimental study. The analysis shows that the metric is able to distinguish between IDS rules that have no or low expected privacy leakage and IDS rules with a significant risk of leaking sensitive information, for example on user behaviour. The analysis is based on measurements of number of IDS alarms, data length and data entropy for relevant parts of IDS rules (for example payload). This is a promising approach that opens up for privacy benchmarking of Managed Security Service providers.
[ { "version": "v1", "created": "Sun, 25 Aug 2013 16:16:54 GMT" } ]
2013-08-27T00:00:00
[ [ "Ulltveit-Moe", "Nils", "" ], [ "Oleshchuk", "Vladimir", "" ] ]
TITLE: Measuring Privacy Leakage for IDS Rules ABSTRACT: This paper proposes a measurement approach for estimating the privacy leakage from Intrusion Detection System (IDS) alarms. Quantitative information flow analysis is used to build a theoretical model of privacy leakage from IDS rules, based on information entropy. This theoretical model is subsequently verified empirically both based on simulations and in an experimental study. The analysis shows that the metric is able to distinguish between IDS rules that have no or low expected privacy leakage and IDS rules with a significant risk of leaking sensitive information, for example on user behaviour. The analysis is based on measurements of number of IDS alarms, data length and data entropy for relevant parts of IDS rules (for example payload). This is a promising approach that opens up for privacy benchmarking of Managed Security Service providers.
1308.5033
Guanghui Huang
Guanghui Huang, Zhifeng Pan
A hybrid evolutionary algorithm with importance sampling for multi-dimensional optimization
13 pages,5 tables, 9 figures
null
null
null
cs.NE
http://creativecommons.org/licenses/by/3.0/
A hybrid evolutionary algorithm with importance sampling method is proposed for multi-dimensional optimization problems in this paper. In order to make use of the information provided in the search process, a set of visited solutions is selected to give scores for intervals in each dimension, and they are updated as algorithm proceeds. Those intervals with higher scores are regarded as good intervals, which are used to estimate the joint distribution of optimal solutions through an interaction between the pool of good genetics, which are the individuals with smaller fitness values. And the sampling probabilities for good genetics are determined through an interaction between those estimated good intervals. It is a cross validation mechanism which determines the sampling probabilities for good intervals and genetics, and the resulted probabilities are used to design crossover, mutation and other stochastic operators with importance sampling method. As the selection of genetics and intervals is not directly dependent on the values of fitness, the resulted offsprings may avoid the trap of local optima. And a purely random EA is also combined into the proposed algorithm to maintain the diversity of population. 30 benchmark test functions are used to evaluate the performance of the proposed algorithm, and it is found that the proposed hybrid algorithm is an efficient algorithm for multi-dimensional optimization problems considered in this paper.
[ { "version": "v1", "created": "Fri, 23 Aug 2013 03:11:54 GMT" } ]
2013-08-26T00:00:00
[ [ "Huang", "Guanghui", "" ], [ "Pan", "Zhifeng", "" ] ]
TITLE: A hybrid evolutionary algorithm with importance sampling for multi-dimensional optimization ABSTRACT: A hybrid evolutionary algorithm with importance sampling method is proposed for multi-dimensional optimization problems in this paper. In order to make use of the information provided in the search process, a set of visited solutions is selected to give scores for intervals in each dimension, and they are updated as algorithm proceeds. Those intervals with higher scores are regarded as good intervals, which are used to estimate the joint distribution of optimal solutions through an interaction between the pool of good genetics, which are the individuals with smaller fitness values. And the sampling probabilities for good genetics are determined through an interaction between those estimated good intervals. It is a cross validation mechanism which determines the sampling probabilities for good intervals and genetics, and the resulted probabilities are used to design crossover, mutation and other stochastic operators with importance sampling method. As the selection of genetics and intervals is not directly dependent on the values of fitness, the resulted offsprings may avoid the trap of local optima. And a purely random EA is also combined into the proposed algorithm to maintain the diversity of population. 30 benchmark test functions are used to evaluate the performance of the proposed algorithm, and it is found that the proposed hybrid algorithm is an efficient algorithm for multi-dimensional optimization problems considered in this paper.
1308.5137
Uwe Aickelin
Josie McCulloch, Christian Wagner, Uwe Aickelin
Measuring the Directional Distance Between Fuzzy Sets
UKCI 2013, the 13th Annual Workshop on Computational Intelligence, Surrey University
null
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The measure of distance between two fuzzy sets is a fundamental tool within fuzzy set theory. However, current distance measures within the literature do not account for the direction of change between fuzzy sets; a useful concept in a variety of applications, such as Computing With Words. In this paper, we highlight this utility and introduce a distance measure which takes the direction between sets into account. We provide details of its application for normal and non-normal, as well as convex and non-convex fuzzy sets. We demonstrate the new distance measure using real data from the MovieLens dataset and establish the benefits of measuring the direction between fuzzy sets.
[ { "version": "v1", "created": "Fri, 23 Aug 2013 14:31:10 GMT" } ]
2013-08-26T00:00:00
[ [ "McCulloch", "Josie", "" ], [ "Wagner", "Christian", "" ], [ "Aickelin", "Uwe", "" ] ]
TITLE: Measuring the Directional Distance Between Fuzzy Sets ABSTRACT: The measure of distance between two fuzzy sets is a fundamental tool within fuzzy set theory. However, current distance measures within the literature do not account for the direction of change between fuzzy sets; a useful concept in a variety of applications, such as Computing With Words. In this paper, we highlight this utility and introduce a distance measure which takes the direction between sets into account. We provide details of its application for normal and non-normal, as well as convex and non-convex fuzzy sets. We demonstrate the new distance measure using real data from the MovieLens dataset and establish the benefits of measuring the direction between fuzzy sets.
1307.1372
Kishore Kumar Gajula
G.Kishore Kumar and V.K.Jayaraman
Clustering of Complex Networks and Community Detection Using Group Search Optimization
7 pages, 2 figures
null
null
null
cs.NE cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Group Search Optimizer(GSO) is one of the best algorithms, is very new in the field of Evolutionary Computing. It is very robust and efficient algorithm, which is inspired by animal searching behaviour. The paper describes an application of GSO to clustering of networks. We have tested GSO against five standard benchmark datasets, GSO algorithm is proved very competitive in terms of accuracy and convergence speed.
[ { "version": "v1", "created": "Thu, 4 Jul 2013 15:22:35 GMT" }, { "version": "v2", "created": "Mon, 19 Aug 2013 09:11:13 GMT" } ]
2013-08-20T00:00:00
[ [ "Kumar", "G. Kishore", "" ], [ "Jayaraman", "V. K.", "" ] ]
TITLE: Clustering of Complex Networks and Community Detection Using Group Search Optimization ABSTRACT: Group Search Optimizer(GSO) is one of the best algorithms, is very new in the field of Evolutionary Computing. It is very robust and efficient algorithm, which is inspired by animal searching behaviour. The paper describes an application of GSO to clustering of networks. We have tested GSO against five standard benchmark datasets, GSO algorithm is proved very competitive in terms of accuracy and convergence speed.
1308.2655
Loshchilov Ilya
Ilya Loshchilov (LIS), Marc Schoenauer (INRIA Saclay - Ile de France, LRI), Mich\`ele Sebag (LRI)
KL-based Control of the Learning Schedule for Surrogate Black-Box Optimization
null
Conf\'erence sur l'Apprentissage Automatique (2013)
null
null
cs.LG cs.AI stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper investigates the control of an ML component within the Covariance Matrix Adaptation Evolution Strategy (CMA-ES) devoted to black-box optimization. The known CMA-ES weakness is its sample complexity, the number of evaluations of the objective function needed to approximate the global optimum. This weakness is commonly addressed through surrogate optimization, learning an estimate of the objective function a.k.a. surrogate model, and replacing most evaluations of the true objective function with the (inexpensive) evaluation of the surrogate model. This paper presents a principled control of the learning schedule (when to relearn the surrogate model), based on the Kullback-Leibler divergence of the current search distribution and the training distribution of the former surrogate model. The experimental validation of the proposed approach shows significant performance gains on a comprehensive set of ill-conditioned benchmark problems, compared to the best state of the art including the quasi-Newton high-precision BFGS method.
[ { "version": "v1", "created": "Mon, 12 Aug 2013 19:31:59 GMT" }, { "version": "v2", "created": "Sun, 18 Aug 2013 19:30:19 GMT" } ]
2013-08-20T00:00:00
[ [ "Loshchilov", "Ilya", "", "LIS" ], [ "Schoenauer", "Marc", "", "INRIA Saclay - Ile de France,\n LRI" ], [ "Sebag", "Michèle", "", "LRI" ] ]
TITLE: KL-based Control of the Learning Schedule for Surrogate Black-Box Optimization ABSTRACT: This paper investigates the control of an ML component within the Covariance Matrix Adaptation Evolution Strategy (CMA-ES) devoted to black-box optimization. The known CMA-ES weakness is its sample complexity, the number of evaluations of the objective function needed to approximate the global optimum. This weakness is commonly addressed through surrogate optimization, learning an estimate of the objective function a.k.a. surrogate model, and replacing most evaluations of the true objective function with the (inexpensive) evaluation of the surrogate model. This paper presents a principled control of the learning schedule (when to relearn the surrogate model), based on the Kullback-Leibler divergence of the current search distribution and the training distribution of the former surrogate model. The experimental validation of the proposed approach shows significant performance gains on a comprehensive set of ill-conditioned benchmark problems, compared to the best state of the art including the quasi-Newton high-precision BFGS method.
1308.3784
Hojjat Emami
Hojjat Emami and Shahriar Lotfi
Graph Colouring Problem Based on Discrete Imperialist Competitive Algorithm
12 pages
International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.4, July 2013, pp. 1-12
10.5121/ijfcst.2013.3401
null
cs.AI cs.NE
http://creativecommons.org/licenses/by/3.0/
In graph theory, Graph Colouring Problem (GCP) is an assignment of colours to vertices of any given graph such that the colours on adjacent vertices are different. The GCP is known to be an optimization and NP-hard problem. Imperialist Competitive Algorithm (ICA) is a meta-heuristic optimization and stochastic search strategy which is inspired from socio-political phenomenon of imperialistic competition. The ICA contains two main operators: the assimilation and the imperialistic competition. The ICA has excellent capabilities such as high convergence rate and better global optimum achievement. In this research, a discrete version of ICA is proposed to deal with the solution of GCP. We call this algorithm as the DICA. The performance of the proposed method is compared with Genetic Algorithm (GA) on seven well-known graph colouring benchmarks. Experimental results demonstrate the superiority of the DICA for the benchmarks. This means DICA can produce optimal and valid solutions for different GCP instances.
[ { "version": "v1", "created": "Sat, 17 Aug 2013 14:02:36 GMT" } ]
2013-08-20T00:00:00
[ [ "Emami", "Hojjat", "" ], [ "Lotfi", "Shahriar", "" ] ]
TITLE: Graph Colouring Problem Based on Discrete Imperialist Competitive Algorithm ABSTRACT: In graph theory, Graph Colouring Problem (GCP) is an assignment of colours to vertices of any given graph such that the colours on adjacent vertices are different. The GCP is known to be an optimization and NP-hard problem. Imperialist Competitive Algorithm (ICA) is a meta-heuristic optimization and stochastic search strategy which is inspired from socio-political phenomenon of imperialistic competition. The ICA contains two main operators: the assimilation and the imperialistic competition. The ICA has excellent capabilities such as high convergence rate and better global optimum achievement. In this research, a discrete version of ICA is proposed to deal with the solution of GCP. We call this algorithm as the DICA. The performance of the proposed method is compared with Genetic Algorithm (GA) on seven well-known graph colouring benchmarks. Experimental results demonstrate the superiority of the DICA for the benchmarks. This means DICA can produce optimal and valid solutions for different GCP instances.
1308.3872
Jian Sun
Jian Sun and Wei Chen and Junhui Deng and Jie Gao and Xianfeng Gu and Feng Luo
A Variational Principle for Improving 2D Triangle Meshes based on Hyperbolic Volume
null
null
null
null
cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we consider the problem of improving 2D triangle meshes tessellating planar regions. We propose a new variational principle for improving 2D triangle meshes where the energy functional is a convex function over the angle structures whose maximizer is unique and consists only of equilateral triangles. This energy functional is related to hyperbolic volume of ideal 3-simplex. Even with extra constraints on the angles for embedding the mesh into the plane and preserving the boundary, the energy functional remains well-behaved. We devise an efficient algorithm for maximizing the energy functional over these extra constraints. We apply our algorithm to various datasets and compare its performance with that of CVT. The experimental results show that our algorithm produces the meshes with both the angles and the aspect ratios of triangles lying in tighter intervals.
[ { "version": "v1", "created": "Sun, 18 Aug 2013 16:40:31 GMT" } ]
2013-08-20T00:00:00
[ [ "Sun", "Jian", "" ], [ "Chen", "Wei", "" ], [ "Deng", "Junhui", "" ], [ "Gao", "Jie", "" ], [ "Gu", "Xianfeng", "" ], [ "Luo", "Feng", "" ] ]
TITLE: A Variational Principle for Improving 2D Triangle Meshes based on Hyperbolic Volume ABSTRACT: In this paper, we consider the problem of improving 2D triangle meshes tessellating planar regions. We propose a new variational principle for improving 2D triangle meshes where the energy functional is a convex function over the angle structures whose maximizer is unique and consists only of equilateral triangles. This energy functional is related to hyperbolic volume of ideal 3-simplex. Even with extra constraints on the angles for embedding the mesh into the plane and preserving the boundary, the energy functional remains well-behaved. We devise an efficient algorithm for maximizing the energy functional over these extra constraints. We apply our algorithm to various datasets and compare its performance with that of CVT. The experimental results show that our algorithm produces the meshes with both the angles and the aspect ratios of triangles lying in tighter intervals.
1308.4008
Xin-She Yang
Momin Jamil and Xin-She Yang
A Literature Survey of Benchmark Functions For Global Optimization Problems
47 pages
Momin Jamil and Xin-She Yang, A literature survey of benchmark functions for global optimization problems, Int. Journal of Mathematical Modelling and Numerical Optimisation}, Vol. 4, No. 2, pp. 150--194 (2013)
10.1504/IJMMNO.2013.055204
null
cs.AI math.OC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Test functions are important to validate and compare the performance of optimization algorithms. There have been many test or benchmark functions reported in the literature; however, there is no standard list or set of benchmark functions. Ideally, test functions should have diverse properties so that can be truly useful to test new algorithms in an unbiased way. For this purpose, we have reviewed and compiled a rich set of 175 benchmark functions for unconstrained optimization problems with diverse properties in terms of modality, separability, and valley landscape. This is by far the most complete set of functions so far in the literature, and tt can be expected this complete set of functions can be used for validation of new optimization in the future.
[ { "version": "v1", "created": "Mon, 19 Aug 2013 13:01:17 GMT" } ]
2013-08-20T00:00:00
[ [ "Jamil", "Momin", "" ], [ "Yang", "Xin-She", "" ] ]
TITLE: A Literature Survey of Benchmark Functions For Global Optimization Problems ABSTRACT: Test functions are important to validate and compare the performance of optimization algorithms. There have been many test or benchmark functions reported in the literature; however, there is no standard list or set of benchmark functions. Ideally, test functions should have diverse properties so that can be truly useful to test new algorithms in an unbiased way. For this purpose, we have reviewed and compiled a rich set of 175 benchmark functions for unconstrained optimization problems with diverse properties in terms of modality, separability, and valley landscape. This is by far the most complete set of functions so far in the literature, and tt can be expected this complete set of functions can be used for validation of new optimization in the future.
1211.6687
Nicolas Gillis
Nicolas Gillis
Robustness Analysis of Hottopixx, a Linear Programming Model for Factoring Nonnegative Matrices
23 pages; new numerical results; Comparison with Arora et al.; Accepted in SIAM J. Mat. Anal. Appl
SIAM J. Matrix Anal. & Appl. 34 (3), pp. 1189-1212, 2013
10.1137/120900629
null
stat.ML cs.LG cs.NA math.OC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Although nonnegative matrix factorization (NMF) is NP-hard in general, it has been shown very recently that it is tractable under the assumption that the input nonnegative data matrix is close to being separable (separability requires that all columns of the input matrix belongs to the cone spanned by a small subset of these columns). Since then, several algorithms have been designed to handle this subclass of NMF problems. In particular, Bittorf, Recht, R\'e and Tropp (`Factoring nonnegative matrices with linear programs', NIPS 2012) proposed a linear programming model, referred to as Hottopixx. In this paper, we provide a new and more general robustness analysis of their method. In particular, we design a provably more robust variant using a post-processing strategy which allows us to deal with duplicates and near duplicates in the dataset.
[ { "version": "v1", "created": "Wed, 28 Nov 2012 18:05:56 GMT" }, { "version": "v2", "created": "Tue, 4 Dec 2012 16:06:55 GMT" }, { "version": "v3", "created": "Sun, 17 Feb 2013 08:53:06 GMT" }, { "version": "v4", "created": "Fri, 31 May 2013 15:06:57 GMT" } ]
2013-08-19T00:00:00
[ [ "Gillis", "Nicolas", "" ] ]
TITLE: Robustness Analysis of Hottopixx, a Linear Programming Model for Factoring Nonnegative Matrices ABSTRACT: Although nonnegative matrix factorization (NMF) is NP-hard in general, it has been shown very recently that it is tractable under the assumption that the input nonnegative data matrix is close to being separable (separability requires that all columns of the input matrix belongs to the cone spanned by a small subset of these columns). Since then, several algorithms have been designed to handle this subclass of NMF problems. In particular, Bittorf, Recht, R\'e and Tropp (`Factoring nonnegative matrices with linear programs', NIPS 2012) proposed a linear programming model, referred to as Hottopixx. In this paper, we provide a new and more general robustness analysis of their method. In particular, we design a provably more robust variant using a post-processing strategy which allows us to deal with duplicates and near duplicates in the dataset.
1207.3270
Anastasios Skarlatidis
Anastasios Skarlatidis, Georgios Paliouras, Alexander Artikis, George A. Vouros
Probabilistic Event Calculus for Event Recognition
null
null
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Symbolic event recognition systems have been successfully applied to a variety of application domains, extracting useful information in the form of events, allowing experts or other systems to monitor and respond when significant events are recognised. In a typical event recognition application, however, these systems often have to deal with a significant amount of uncertainty. In this paper, we address the issue of uncertainty in logic-based event recognition by extending the Event Calculus with probabilistic reasoning. Markov Logic Networks are a natural candidate for our logic-based formalism. However, the temporal semantics of the Event Calculus introduce a number of challenges for the proposed model. We show how and under what assumptions we can overcome these problems. Additionally, we study how probabilistic modelling changes the behaviour of the formalism, affecting its key property, the inertia of fluents. Furthermore, we demonstrate the advantages of the probabilistic Event Calculus through examples and experiments in the domain of activity recognition, using a publicly available dataset for video surveillance.
[ { "version": "v1", "created": "Fri, 13 Jul 2012 14:57:35 GMT" }, { "version": "v2", "created": "Thu, 15 Aug 2013 11:13:05 GMT" } ]
2013-08-16T00:00:00
[ [ "Skarlatidis", "Anastasios", "" ], [ "Paliouras", "Georgios", "" ], [ "Artikis", "Alexander", "" ], [ "Vouros", "George A.", "" ] ]
TITLE: Probabilistic Event Calculus for Event Recognition ABSTRACT: Symbolic event recognition systems have been successfully applied to a variety of application domains, extracting useful information in the form of events, allowing experts or other systems to monitor and respond when significant events are recognised. In a typical event recognition application, however, these systems often have to deal with a significant amount of uncertainty. In this paper, we address the issue of uncertainty in logic-based event recognition by extending the Event Calculus with probabilistic reasoning. Markov Logic Networks are a natural candidate for our logic-based formalism. However, the temporal semantics of the Event Calculus introduce a number of challenges for the proposed model. We show how and under what assumptions we can overcome these problems. Additionally, we study how probabilistic modelling changes the behaviour of the formalism, affecting its key property, the inertia of fluents. Furthermore, we demonstrate the advantages of the probabilistic Event Calculus through examples and experiments in the domain of activity recognition, using a publicly available dataset for video surveillance.
1301.6314
Yakir Reshef
David Reshef (1), Yakir Reshef (1), Michael Mitzenmacher (2), Pardis Sabeti (2) (1, 2 - contributed equally)
Equitability Analysis of the Maximal Information Coefficient, with Comparisons
22 pages, 9 figures
null
null
null
cs.LG q-bio.QM stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A measure of dependence is said to be equitable if it gives similar scores to equally noisy relationships of different types. Equitability is important in data exploration when the goal is to identify a relatively small set of strongest associations within a dataset as opposed to finding as many non-zero associations as possible, which often are too many to sift through. Thus an equitable statistic, such as the maximal information coefficient (MIC), can be useful for analyzing high-dimensional data sets. Here, we explore both equitability and the properties of MIC, and discuss several aspects of the theory and practice of MIC. We begin by presenting an intuition behind the equitability of MIC through the exploration of the maximization and normalization steps in its definition. We then examine the speed and optimality of the approximation algorithm used to compute MIC, and suggest some directions for improving both. Finally, we demonstrate in a range of noise models and sample sizes that MIC is more equitable than natural alternatives, such as mutual information estimation and distance correlation.
[ { "version": "v1", "created": "Sun, 27 Jan 2013 03:45:30 GMT" }, { "version": "v2", "created": "Wed, 14 Aug 2013 20:51:50 GMT" } ]
2013-08-16T00:00:00
[ [ "Reshef", "David", "" ], [ "Reshef", "Yakir", "" ], [ "Mitzenmacher", "Michael", "" ], [ "Sabeti", "Pardis", "" ] ]
TITLE: Equitability Analysis of the Maximal Information Coefficient, with Comparisons ABSTRACT: A measure of dependence is said to be equitable if it gives similar scores to equally noisy relationships of different types. Equitability is important in data exploration when the goal is to identify a relatively small set of strongest associations within a dataset as opposed to finding as many non-zero associations as possible, which often are too many to sift through. Thus an equitable statistic, such as the maximal information coefficient (MIC), can be useful for analyzing high-dimensional data sets. Here, we explore both equitability and the properties of MIC, and discuss several aspects of the theory and practice of MIC. We begin by presenting an intuition behind the equitability of MIC through the exploration of the maximization and normalization steps in its definition. We then examine the speed and optimality of the approximation algorithm used to compute MIC, and suggest some directions for improving both. Finally, we demonstrate in a range of noise models and sample sizes that MIC is more equitable than natural alternatives, such as mutual information estimation and distance correlation.
1305.0596
Taha Hasan
Taha Hassan, Fahad Javed and Naveed Arshad
An Empirical Investigation of V-I Trajectory based Load Signatures for Non-Intrusive Load Monitoring
11 pages, 11 figures. Under review for IEEE Transactions on Smart Grid
null
10.1109/TSG.2013.2271282
null
cs.CE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Choice of load signature or feature space is one of the most fundamental design choices for non-intrusive load monitoring or energy disaggregation problem. Electrical power quantities, harmonic load characteristics, canonical transient and steady-state waveforms are some of the typical choices of load signature or load signature basis for current research addressing appliance classification and prediction. This paper expands and evaluates appliance load signatures based on V-I trajectory - the mutual locus of instantaneous voltage and current waveforms - for precision and robustness of prediction in classification algorithms used to disaggregate residential overall energy use and predict constituent appliance profiles. We also demonstrate the use of variants of differential evolution as a novel strategy for selection of optimal load models in context of energy disaggregation. A publicly available benchmark dataset REDD is employed for evaluation purposes. Our experimental evaluations indicate that these load signatures, in conjunction with a number of popular classification algorithms, offer better or generally comparable overall precision of prediction, robustness and reliability against dynamic, noisy and highly similar load signatures with reference to electrical power quantities and harmonic content. Herein, wave-shape features are found to be an effective new basis of classification and prediction for semi-automated energy disaggregation and monitoring.
[ { "version": "v1", "created": "Thu, 2 May 2013 23:32:00 GMT" } ]
2013-08-16T00:00:00
[ [ "Hassan", "Taha", "" ], [ "Javed", "Fahad", "" ], [ "Arshad", "Naveed", "" ] ]
TITLE: An Empirical Investigation of V-I Trajectory based Load Signatures for Non-Intrusive Load Monitoring ABSTRACT: Choice of load signature or feature space is one of the most fundamental design choices for non-intrusive load monitoring or energy disaggregation problem. Electrical power quantities, harmonic load characteristics, canonical transient and steady-state waveforms are some of the typical choices of load signature or load signature basis for current research addressing appliance classification and prediction. This paper expands and evaluates appliance load signatures based on V-I trajectory - the mutual locus of instantaneous voltage and current waveforms - for precision and robustness of prediction in classification algorithms used to disaggregate residential overall energy use and predict constituent appliance profiles. We also demonstrate the use of variants of differential evolution as a novel strategy for selection of optimal load models in context of energy disaggregation. A publicly available benchmark dataset REDD is employed for evaluation purposes. Our experimental evaluations indicate that these load signatures, in conjunction with a number of popular classification algorithms, offer better or generally comparable overall precision of prediction, robustness and reliability against dynamic, noisy and highly similar load signatures with reference to electrical power quantities and harmonic content. Herein, wave-shape features are found to be an effective new basis of classification and prediction for semi-automated energy disaggregation and monitoring.
1307.7411
Wajdi Dhifli Wajdi DHIFLI
Wajdi Dhifli, Mohamed Moussaoui, Rabie Saidi, Engelbert Mephu Nguifo
Towards an Efficient Discovery of the Topological Representative Subgraphs
null
null
null
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
With the emergence of graph databases, the task of frequent subgraph discovery has been extensively addressed. Although the proposed approaches in the literature have made this task feasible, the number of discovered frequent subgraphs is still very high to be efficiently used in any further exploration. Feature selection for graph data is a way to reduce the high number of frequent subgraphs based on exact or approximate structural similarity. However, current structural similarity strategies are not efficient enough in many real-world applications, besides, the combinatorial nature of graphs makes it computationally very costly. In order to select a smaller yet structurally irredundant set of subgraphs, we propose a novel approach that mines the top-k topological representative subgraphs among the frequent ones. Our approach allows detecting hidden structural similarities that existing approaches are unable to detect such as the density or the diameter of the subgraph. In addition, it can be easily extended using any user defined structural or topological attributes depending on the sought properties. Empirical studies on real and synthetic graph datasets show that our approach is fast and scalable.
[ { "version": "v1", "created": "Sun, 28 Jul 2013 22:17:40 GMT" }, { "version": "v2", "created": "Tue, 13 Aug 2013 21:52:44 GMT" }, { "version": "v3", "created": "Thu, 15 Aug 2013 00:28:30 GMT" } ]
2013-08-16T00:00:00
[ [ "Dhifli", "Wajdi", "" ], [ "Moussaoui", "Mohamed", "" ], [ "Saidi", "Rabie", "" ], [ "Nguifo", "Engelbert Mephu", "" ] ]
TITLE: Towards an Efficient Discovery of the Topological Representative Subgraphs ABSTRACT: With the emergence of graph databases, the task of frequent subgraph discovery has been extensively addressed. Although the proposed approaches in the literature have made this task feasible, the number of discovered frequent subgraphs is still very high to be efficiently used in any further exploration. Feature selection for graph data is a way to reduce the high number of frequent subgraphs based on exact or approximate structural similarity. However, current structural similarity strategies are not efficient enough in many real-world applications, besides, the combinatorial nature of graphs makes it computationally very costly. In order to select a smaller yet structurally irredundant set of subgraphs, we propose a novel approach that mines the top-k topological representative subgraphs among the frequent ones. Our approach allows detecting hidden structural similarities that existing approaches are unable to detect such as the density or the diameter of the subgraph. In addition, it can be easily extended using any user defined structural or topological attributes depending on the sought properties. Empirical studies on real and synthetic graph datasets show that our approach is fast and scalable.
1306.6047
Alex Rubinsteyn
Russell Power and Alex Rubinsteyn
How fast can we make interpreted Python?
Tech Report
null
null
null
cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Python is a popular dynamic language with a large part of its appeal coming from powerful libraries and extension modules. These augment the language and make it a productive environment for a wide variety of tasks, ranging from web development (Django) to numerical analysis (NumPy). Unfortunately, Python's performance is quite poor when compared to modern implementations of languages such as Lua and JavaScript. Why does Python lag so far behind these other languages? As we show, the very same API and extension libraries that make Python a powerful language also make it very difficult to efficiently execute. Given that we want to retain access to the great extension libraries that already exist for Python, how fast can we make it? To evaluate this, we designed and implemented Falcon, a high-performance bytecode interpreter fully compatible with the standard CPython interpreter. Falcon applies a number of well known optimizations and introduces several new techniques to speed up execution of Python bytecode. In our evaluation, we found Falcon an average of 25% faster than the standard Python interpreter on most benchmarks and in some cases about 2.5X faster.
[ { "version": "v1", "created": "Tue, 25 Jun 2013 17:57:00 GMT" }, { "version": "v2", "created": "Tue, 13 Aug 2013 20:29:34 GMT" } ]
2013-08-15T00:00:00
[ [ "Power", "Russell", "" ], [ "Rubinsteyn", "Alex", "" ] ]
TITLE: How fast can we make interpreted Python? ABSTRACT: Python is a popular dynamic language with a large part of its appeal coming from powerful libraries and extension modules. These augment the language and make it a productive environment for a wide variety of tasks, ranging from web development (Django) to numerical analysis (NumPy). Unfortunately, Python's performance is quite poor when compared to modern implementations of languages such as Lua and JavaScript. Why does Python lag so far behind these other languages? As we show, the very same API and extension libraries that make Python a powerful language also make it very difficult to efficiently execute. Given that we want to retain access to the great extension libraries that already exist for Python, how fast can we make it? To evaluate this, we designed and implemented Falcon, a high-performance bytecode interpreter fully compatible with the standard CPython interpreter. Falcon applies a number of well known optimizations and introduces several new techniques to speed up execution of Python bytecode. In our evaluation, we found Falcon an average of 25% faster than the standard Python interpreter on most benchmarks and in some cases about 2.5X faster.
1204.0171
Mete Ozay
Mete Ozay, Fatos T. Yarman Vural
A New Fuzzy Stacked Generalization Technique and Analysis of its Performance
null
null
null
null
cs.LG cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this study, a new Stacked Generalization technique called Fuzzy Stacked Generalization (FSG) is proposed to minimize the difference between N -sample and large-sample classification error of the Nearest Neighbor classifier. The proposed FSG employs a new hierarchical distance learning strategy to minimize the error difference. For this purpose, we first construct an ensemble of base-layer fuzzy k- Nearest Neighbor (k-NN) classifiers, each of which receives a different feature set extracted from the same sample set. The fuzzy membership values computed at the decision space of each fuzzy k-NN classifier are concatenated to form the feature vectors of a fusion space. Finally, the feature vectors are fed to a meta-layer classifier to learn the degree of accuracy of the decisions of the base-layer classifiers for meta-layer classification. Rather than the power of the individual base layer-classifiers, diversity and cooperation of the classifiers become an important issue to improve the overall performance of the proposed FSG. A weak base-layer classifier may boost the overall performance more than a strong classifier, if it is capable of recognizing the samples, which are not recognized by the rest of the classifiers, in its own feature space. The experiments explore the type of the collaboration among the individual classifiers required for an improved performance of the suggested architecture. Experiments on multiple feature real-world datasets show that the proposed FSG performs better than the state of the art ensemble learning algorithms such as Adaboost, Random Subspace and Rotation Forest. On the other hand, compatible performances are observed in the experiments on single feature multi-attribute datasets.
[ { "version": "v1", "created": "Sun, 1 Apr 2012 07:16:47 GMT" }, { "version": "v2", "created": "Sun, 28 Oct 2012 19:32:21 GMT" }, { "version": "v3", "created": "Tue, 30 Oct 2012 06:39:31 GMT" }, { "version": "v4", "created": "Thu, 1 Nov 2012 14:53:55 GMT" }, { "version": "v5", "created": "Mon, 12 Aug 2013 21:13:37 GMT" } ]
2013-08-14T00:00:00
[ [ "Ozay", "Mete", "" ], [ "Vural", "Fatos T. Yarman", "" ] ]
TITLE: A New Fuzzy Stacked Generalization Technique and Analysis of its Performance ABSTRACT: In this study, a new Stacked Generalization technique called Fuzzy Stacked Generalization (FSG) is proposed to minimize the difference between N -sample and large-sample classification error of the Nearest Neighbor classifier. The proposed FSG employs a new hierarchical distance learning strategy to minimize the error difference. For this purpose, we first construct an ensemble of base-layer fuzzy k- Nearest Neighbor (k-NN) classifiers, each of which receives a different feature set extracted from the same sample set. The fuzzy membership values computed at the decision space of each fuzzy k-NN classifier are concatenated to form the feature vectors of a fusion space. Finally, the feature vectors are fed to a meta-layer classifier to learn the degree of accuracy of the decisions of the base-layer classifiers for meta-layer classification. Rather than the power of the individual base layer-classifiers, diversity and cooperation of the classifiers become an important issue to improve the overall performance of the proposed FSG. A weak base-layer classifier may boost the overall performance more than a strong classifier, if it is capable of recognizing the samples, which are not recognized by the rest of the classifiers, in its own feature space. The experiments explore the type of the collaboration among the individual classifiers required for an improved performance of the suggested architecture. Experiments on multiple feature real-world datasets show that the proposed FSG performs better than the state of the art ensemble learning algorithms such as Adaboost, Random Subspace and Rotation Forest. On the other hand, compatible performances are observed in the experiments on single feature multi-attribute datasets.
1308.2166
Kanat Tangwongsan
Kanat Tangwongsan, A. Pavan, and Srikanta Tirthapura
Parallel Triangle Counting in Massive Streaming Graphs
null
null
null
null
cs.DB cs.DC cs.DS cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The number of triangles in a graph is a fundamental metric, used in social network analysis, link classification and recommendation, and more. Driven by these applications and the trend that modern graph datasets are both large and dynamic, we present the design and implementation of a fast and cache-efficient parallel algorithm for estimating the number of triangles in a massive undirected graph whose edges arrive as a stream. It brings together the benefits of streaming algorithms and parallel algorithms. By building on the streaming algorithms framework, the algorithm has a small memory footprint. By leveraging the paralell cache-oblivious framework, it makes efficient use of the memory hierarchy of modern multicore machines without needing to know its specific parameters. We prove theoretical bounds on accuracy, memory access cost, and parallel runtime complexity, as well as showing empirically that the algorithm yields accurate results and substantial speedups compared to an optimized sequential implementation. (This is an expanded version of a CIKM'13 paper of the same title.)
[ { "version": "v1", "created": "Fri, 9 Aug 2013 15:54:22 GMT" } ]
2013-08-12T00:00:00
[ [ "Tangwongsan", "Kanat", "" ], [ "Pavan", "A.", "" ], [ "Tirthapura", "Srikanta", "" ] ]
TITLE: Parallel Triangle Counting in Massive Streaming Graphs ABSTRACT: The number of triangles in a graph is a fundamental metric, used in social network analysis, link classification and recommendation, and more. Driven by these applications and the trend that modern graph datasets are both large and dynamic, we present the design and implementation of a fast and cache-efficient parallel algorithm for estimating the number of triangles in a massive undirected graph whose edges arrive as a stream. It brings together the benefits of streaming algorithms and parallel algorithms. By building on the streaming algorithms framework, the algorithm has a small memory footprint. By leveraging the paralell cache-oblivious framework, it makes efficient use of the memory hierarchy of modern multicore machines without needing to know its specific parameters. We prove theoretical bounds on accuracy, memory access cost, and parallel runtime complexity, as well as showing empirically that the algorithm yields accurate results and substantial speedups compared to an optimized sequential implementation. (This is an expanded version of a CIKM'13 paper of the same title.)
1206.3614
Carleton Coffrin
Carleton Coffrin, Pascal Van Hentenryck
A Linear-Programming Approximation of AC Power Flows
13 pages
null
null
null
cs.AI math.OC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Linear active-power-only DC power flow approximations are pervasive in the planning and control of power systems. However, these approximations fail to capture reactive power and voltage magnitudes, both of which are necessary in many applications to ensure voltage stability and AC power flow feasibility. This paper proposes linear-programming models (the LPAC models) that incorporate reactive power and voltage magnitudes in a linear power flow approximation. The LPAC models are built on a convex approximation of the cosine terms in the AC equations, as well as Taylor approximations of the remaining nonlinear terms. Experimental comparisons with AC solutions on a variety of standard IEEE and MatPower benchmarks show that the LPAC models produce accurate values for active and reactive power, phase angles, and voltage magnitudes. The potential benefits of the LPAC models are illustrated on two "proof-of-concept" studies in power restoration and capacitor placement.
[ { "version": "v1", "created": "Sat, 16 Jun 2012 00:10:07 GMT" }, { "version": "v2", "created": "Tue, 11 Dec 2012 06:00:22 GMT" }, { "version": "v3", "created": "Tue, 6 Aug 2013 04:29:35 GMT" } ]
2013-08-07T00:00:00
[ [ "Coffrin", "Carleton", "" ], [ "Van Hentenryck", "Pascal", "" ] ]
TITLE: A Linear-Programming Approximation of AC Power Flows ABSTRACT: Linear active-power-only DC power flow approximations are pervasive in the planning and control of power systems. However, these approximations fail to capture reactive power and voltage magnitudes, both of which are necessary in many applications to ensure voltage stability and AC power flow feasibility. This paper proposes linear-programming models (the LPAC models) that incorporate reactive power and voltage magnitudes in a linear power flow approximation. The LPAC models are built on a convex approximation of the cosine terms in the AC equations, as well as Taylor approximations of the remaining nonlinear terms. Experimental comparisons with AC solutions on a variety of standard IEEE and MatPower benchmarks show that the LPAC models produce accurate values for active and reactive power, phase angles, and voltage magnitudes. The potential benefits of the LPAC models are illustrated on two "proof-of-concept" studies in power restoration and capacitor placement.
1301.5979
Lijun Sun Mr
Lijun Sun, Kay W. Axhausen, Der-Horng Lee, Xianfeng Huang
Understanding metropolitan patterns of daily encounters
7 pages, 3 figures
null
10.1073/pnas.1306440110
null
physics.soc-ph cs.SI physics.data-an
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Understanding of the mechanisms driving our daily face-to-face encounters is still limited; the field lacks large-scale datasets describing both individual behaviors and their collective interactions. However, here, with the help of travel smart card data, we uncover such encounter mechanisms and structures by constructing a time-resolved in-vehicle social encounter network on public buses in a city (about 5 million residents). This is the first time that such a large network of encounters has been identified and analyzed. Using a population scale dataset, we find physical encounters display reproducible temporal patterns, indicating that repeated encounters are regular and identical. On an individual scale, we find that collective regularities dominate distinct encounters' bounded nature. An individual's encounter capability is rooted in his/her daily behavioral regularity, explaining the emergence of "familiar strangers" in daily life. Strikingly, we find individuals with repeated encounters are not grouped into small communities, but become strongly connected over time, resulting in a large, but imperceptible, small-world contact network or "structure of co-presence" across the whole metropolitan area. Revealing the encounter pattern and identifying this large-scale contact network are crucial to understanding the dynamics in patterns of social acquaintances, collective human behaviors, and -- particularly -- disclosing the impact of human behavior on various diffusion/spreading processes.
[ { "version": "v1", "created": "Fri, 25 Jan 2013 08:25:14 GMT" }, { "version": "v2", "created": "Wed, 27 Feb 2013 13:16:35 GMT" }, { "version": "v3", "created": "Thu, 4 Jul 2013 05:35:07 GMT" } ]
2013-08-07T00:00:00
[ [ "Sun", "Lijun", "" ], [ "Axhausen", "Kay W.", "" ], [ "Lee", "Der-Horng", "" ], [ "Huang", "Xianfeng", "" ] ]
TITLE: Understanding metropolitan patterns of daily encounters ABSTRACT: Understanding of the mechanisms driving our daily face-to-face encounters is still limited; the field lacks large-scale datasets describing both individual behaviors and their collective interactions. However, here, with the help of travel smart card data, we uncover such encounter mechanisms and structures by constructing a time-resolved in-vehicle social encounter network on public buses in a city (about 5 million residents). This is the first time that such a large network of encounters has been identified and analyzed. Using a population scale dataset, we find physical encounters display reproducible temporal patterns, indicating that repeated encounters are regular and identical. On an individual scale, we find that collective regularities dominate distinct encounters' bounded nature. An individual's encounter capability is rooted in his/her daily behavioral regularity, explaining the emergence of "familiar strangers" in daily life. Strikingly, we find individuals with repeated encounters are not grouped into small communities, but become strongly connected over time, resulting in a large, but imperceptible, small-world contact network or "structure of co-presence" across the whole metropolitan area. Revealing the encounter pattern and identifying this large-scale contact network are crucial to understanding the dynamics in patterns of social acquaintances, collective human behaviors, and -- particularly -- disclosing the impact of human behavior on various diffusion/spreading processes.
1308.1118
Guoqiong Liao
Guoqiong Liao, Yuchen Zhao, Sihong Xie, Philip S. Yu
Latent Networks Fusion based Model for Event Recommendation in Offline Ephemeral Social Networks
Full version of ACM CIKM2013 paper
null
null
null
cs.SI physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
With the growing amount of mobile social media, offline ephemeral social networks (OffESNs) are receiving more and more attentions. Offline ephemeral social networks (OffESNs) are the networks created ad-hoc at a specific location for a specific purpose and lasting for short period of time, relying on mobile social media such as Radio Frequency Identification (RFID) and Bluetooth devices. The primary purpose of people in the OffESNs is to acquire and share information via attending prescheduled events. Event Recommendation over this kind of networks can facilitate attendees on selecting the prescheduled events and organizers on making resource planning. However, because of lack of users preference and rating information, as well as explicit social relations, both rating based traditional recommendation methods and social-trust based recommendation methods can no longer work well to recommend events in the OffESNs. To address the challenges such as how to derive users latent preferences and social relations and how to fuse the latent information in a unified model, we first construct two heterogeneous interaction social networks, an event participation network and a physical proximity network. Then, we use them to derive users latent preferences and latent networks on social relations, including like-minded peers, co-attendees and friends. Finally, we propose an LNF (Latent Networks Fusion) model under a pairwise factor graph to infer event attendance probabilities for recommendation. Experiments on an RFID-based real conference dataset have demonstrated the effectiveness of the proposed model compared with typical solutions.
[ { "version": "v1", "created": "Mon, 5 Aug 2013 21:00:08 GMT" } ]
2013-08-07T00:00:00
[ [ "Liao", "Guoqiong", "" ], [ "Zhao", "Yuchen", "" ], [ "Xie", "Sihong", "" ], [ "Yu", "Philip S.", "" ] ]
TITLE: Latent Networks Fusion based Model for Event Recommendation in Offline Ephemeral Social Networks ABSTRACT: With the growing amount of mobile social media, offline ephemeral social networks (OffESNs) are receiving more and more attentions. Offline ephemeral social networks (OffESNs) are the networks created ad-hoc at a specific location for a specific purpose and lasting for short period of time, relying on mobile social media such as Radio Frequency Identification (RFID) and Bluetooth devices. The primary purpose of people in the OffESNs is to acquire and share information via attending prescheduled events. Event Recommendation over this kind of networks can facilitate attendees on selecting the prescheduled events and organizers on making resource planning. However, because of lack of users preference and rating information, as well as explicit social relations, both rating based traditional recommendation methods and social-trust based recommendation methods can no longer work well to recommend events in the OffESNs. To address the challenges such as how to derive users latent preferences and social relations and how to fuse the latent information in a unified model, we first construct two heterogeneous interaction social networks, an event participation network and a physical proximity network. Then, we use them to derive users latent preferences and latent networks on social relations, including like-minded peers, co-attendees and friends. Finally, we propose an LNF (Latent Networks Fusion) model under a pairwise factor graph to infer event attendance probabilities for recommendation. Experiments on an RFID-based real conference dataset have demonstrated the effectiveness of the proposed model compared with typical solutions.
1308.1126
Wang-Q Lim
H. Lakshman, W.-Q Lim, H. Schwarz, D. Marpe, G. Kutyniok, and T. Wiegand
Image interpolation using Shearlet based iterative refinement
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper proposes an image interpolation algorithm exploiting sparse representation for natural images. It involves three main steps: (a) obtaining an initial estimate of the high resolution image using linear methods like FIR filtering, (b) promoting sparsity in a selected dictionary through iterative thresholding, and (c) extracting high frequency information from the approximation to refine the initial estimate. For the sparse modeling, a shearlet dictionary is chosen to yield a multiscale directional representation. The proposed algorithm is compared to several state-of-the-art methods to assess its objective as well as subjective performance. Compared to the cubic spline interpolation method, an average PSNR gain of around 0.8 dB is observed over a dataset of 200 images.
[ { "version": "v1", "created": "Mon, 5 Aug 2013 21:33:06 GMT" } ]
2013-08-07T00:00:00
[ [ "Lakshman", "H.", "" ], [ "Lim", "W. -Q", "" ], [ "Schwarz", "H.", "" ], [ "Marpe", "D.", "" ], [ "Kutyniok", "G.", "" ], [ "Wiegand", "T.", "" ] ]
TITLE: Image interpolation using Shearlet based iterative refinement ABSTRACT: This paper proposes an image interpolation algorithm exploiting sparse representation for natural images. It involves three main steps: (a) obtaining an initial estimate of the high resolution image using linear methods like FIR filtering, (b) promoting sparsity in a selected dictionary through iterative thresholding, and (c) extracting high frequency information from the approximation to refine the initial estimate. For the sparse modeling, a shearlet dictionary is chosen to yield a multiscale directional representation. The proposed algorithm is compared to several state-of-the-art methods to assess its objective as well as subjective performance. Compared to the cubic spline interpolation method, an average PSNR gain of around 0.8 dB is observed over a dataset of 200 images.
1308.1150
Ali Wali
Ali Wali and Adel M. Alimi
Multimodal Approach for Video Surveillance Indexing and Retrieval
7 pages
Journal of Intelligent Computing, Volume: 1, Issue: 4 (December 2010), Page: 165-175
null
null
cs.MM cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we present an overview of a multimodal system to indexing and searching video sequence by the content that has been developed within the REGIMVid project. A large part of our system has been developed as part of TRECVideo evaluation. The MAVSIR platform provides High-level feature extraction from audio-visual content and concept/event-based video retrieval. We illustrate the architecture of the system as well as provide an overview of the descriptors supported to date. Then we demonstrate the usefulness of the toolbox in the context of feature extraction, concepts/events learning and retrieval in large collections of video surveillance dataset. The results are encouraging as we are able to get good results on several event categories, while for all events we have gained valuable insights and experience.
[ { "version": "v1", "created": "Tue, 6 Aug 2013 01:21:35 GMT" } ]
2013-08-07T00:00:00
[ [ "Wali", "Ali", "" ], [ "Alimi", "Adel M.", "" ] ]
TITLE: Multimodal Approach for Video Surveillance Indexing and Retrieval ABSTRACT: In this paper, we present an overview of a multimodal system to indexing and searching video sequence by the content that has been developed within the REGIMVid project. A large part of our system has been developed as part of TRECVideo evaluation. The MAVSIR platform provides High-level feature extraction from audio-visual content and concept/event-based video retrieval. We illustrate the architecture of the system as well as provide an overview of the descriptors supported to date. Then we demonstrate the usefulness of the toolbox in the context of feature extraction, concepts/events learning and retrieval in large collections of video surveillance dataset. The results are encouraging as we are able to get good results on several event categories, while for all events we have gained valuable insights and experience.
1308.1224
Aleksandar Stupar
Aleksandar Stupar and Sebastian Michel
Benchmarking Soundtrack Recommendation Systems with SRBench
Extended version of the CIKM 2013 paper: SRbench-A Benchmark for Soundtrack Recommendation Systems
null
null
null
cs.IR cs.MM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this work, a benchmark to evaluate the retrieval performance of soundtrack recommendation systems is proposed. Such systems aim at finding songs that are played as background music for a given set of images. The proposed benchmark is based on preference judgments, where relevance is considered a continuous ordinal variable and judgments are collected for pairs of songs with respect to a query (i.e., set of images). To capture a wide variety of songs and images, we use a large space of possible music genres, different emotions expressed through music, and various query-image themes. The benchmark consists of two types of relevance assessments: (i) judgments obtained from a user study, that serve as a "gold standard" for (ii) relevance judgments gathered through Amazon's Mechanical Turk. We report on an analysis of relevance judgments based on different levels of user agreement and investigate the performance of two state-of-the-art soundtrack recommendation systems using the proposed benchmark.
[ { "version": "v1", "created": "Tue, 6 Aug 2013 10:10:22 GMT" } ]
2013-08-07T00:00:00
[ [ "Stupar", "Aleksandar", "" ], [ "Michel", "Sebastian", "" ] ]
TITLE: Benchmarking Soundtrack Recommendation Systems with SRBench ABSTRACT: In this work, a benchmark to evaluate the retrieval performance of soundtrack recommendation systems is proposed. Such systems aim at finding songs that are played as background music for a given set of images. The proposed benchmark is based on preference judgments, where relevance is considered a continuous ordinal variable and judgments are collected for pairs of songs with respect to a query (i.e., set of images). To capture a wide variety of songs and images, we use a large space of possible music genres, different emotions expressed through music, and various query-image themes. The benchmark consists of two types of relevance assessments: (i) judgments obtained from a user study, that serve as a "gold standard" for (ii) relevance judgments gathered through Amazon's Mechanical Turk. We report on an analysis of relevance judgments based on different levels of user agreement and investigate the performance of two state-of-the-art soundtrack recommendation systems using the proposed benchmark.
1308.0701
Meisam Booshehri
Meisam Booshehri, Abbas Malekpour, Peter Luksch, Kamran Zamanifar, Shahdad Shariatmadari
Ontology Enrichment by Extracting Hidden Assertional Knowledge from Text
9 pages, International Journal of Computer Science and Information Security
IJCSIS, 11(5), 64-72
null
null
cs.IR cs.CL
http://creativecommons.org/licenses/by-nc-sa/3.0/
In this position paper we present a new approach for discovering some special classes of assertional knowledge in the text by using large RDF repositories, resulting in the extraction of new non-taxonomic ontological relations. Also we use inductive reasoning beside our approach to make it outperform. Then, we prepare a case study by applying our approach on sample data and illustrate the soundness of our proposed approach. Moreover in our point of view current LOD cloud is not a suitable base for our proposal in all informational domains. Therefore we figure out some directions based on prior works to enrich datasets of Linked Data by using web mining. The result of such enrichment can be reused for further relation extraction and ontology enrichment from unstructured free text documents.
[ { "version": "v1", "created": "Sat, 3 Aug 2013 14:30:55 GMT" } ]
2013-08-06T00:00:00
[ [ "Booshehri", "Meisam", "" ], [ "Malekpour", "Abbas", "" ], [ "Luksch", "Peter", "" ], [ "Zamanifar", "Kamran", "" ], [ "Shariatmadari", "Shahdad", "" ] ]
TITLE: Ontology Enrichment by Extracting Hidden Assertional Knowledge from Text ABSTRACT: In this position paper we present a new approach for discovering some special classes of assertional knowledge in the text by using large RDF repositories, resulting in the extraction of new non-taxonomic ontological relations. Also we use inductive reasoning beside our approach to make it outperform. Then, we prepare a case study by applying our approach on sample data and illustrate the soundness of our proposed approach. Moreover in our point of view current LOD cloud is not a suitable base for our proposal in all informational domains. Therefore we figure out some directions based on prior works to enrich datasets of Linked Data by using web mining. The result of such enrichment can be reused for further relation extraction and ontology enrichment from unstructured free text documents.
1308.0749
Sta\v{s}a Milojevi\'c
Sta\v{s}a Milojevi\'c
Accuracy of simple, initials-based methods for author name disambiguation
In press in Journal of Informetrics
null
10.1016/j.joi.2013.06.006
null
cs.DL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
There are a number of solutions that perform unsupervised name disambiguation based on the similarity of bibliographic records or common co-authorship patterns. Whether the use of these advanced methods, which are often difficult to implement, is warranted depends on whether the accuracy of the most basic disambiguation methods, which only use the author's last name and initials, is sufficient for a particular purpose. We derive realistic estimates for the accuracy of simple, initials-based methods using simulated bibliographic datasets in which the true identities of authors are known. Based on the simulations in five diverse disciplines we find that the first initial method already correctly identifies 97% of authors. An alternative simple method, which takes all initials into account, is typically two times less accurate, except in certain datasets that can be identified by applying a simple criterion. Finally, we introduce a new name-based method that combines the features of first initial and all initials methods by implicitly taking into account the last name frequency and the size of the dataset. This hybrid method reduces the fraction of incorrectly identified authors by 10-30% over the first initial method.
[ { "version": "v1", "created": "Sat, 3 Aug 2013 21:52:12 GMT" } ]
2013-08-06T00:00:00
[ [ "Milojević", "Staša", "" ] ]
TITLE: Accuracy of simple, initials-based methods for author name disambiguation ABSTRACT: There are a number of solutions that perform unsupervised name disambiguation based on the similarity of bibliographic records or common co-authorship patterns. Whether the use of these advanced methods, which are often difficult to implement, is warranted depends on whether the accuracy of the most basic disambiguation methods, which only use the author's last name and initials, is sufficient for a particular purpose. We derive realistic estimates for the accuracy of simple, initials-based methods using simulated bibliographic datasets in which the true identities of authors are known. Based on the simulations in five diverse disciplines we find that the first initial method already correctly identifies 97% of authors. An alternative simple method, which takes all initials into account, is typically two times less accurate, except in certain datasets that can be identified by applying a simple criterion. Finally, we introduce a new name-based method that combines the features of first initial and all initials methods by implicitly taking into account the last name frequency and the size of the dataset. This hybrid method reduces the fraction of incorrectly identified authors by 10-30% over the first initial method.
1308.1056
Tiancheng Li
Tiancheng Li
A Gap between Simulation and Practice for Recursive Filters: On the State Transition Noise
This is a short technical note pointing out a common unfair treatment of the transition noise in the discrete simulation modeling for recursive filters
null
null
null
cs.DM cs.SY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In order to evaluate and compare different recursive filters, simulation is a common tool and numerous simulation models are widely used as 'benchmark'. In the simulation, the continuous time dynamic system is converted into a discrete-time recursive system. As a result of this, the state indeed evolves by Markov transitions in the simulation rather than in continuous time. One significant issue involved with modeling of the system from practice to simulation is that the simulation parameter, particularly e.g. the state Markov transition noise, needs to match the iteration period of the filter. Otherwise, the simulation performance may be far from the truth. Unfortunately, quite commonly different-speed filters are evaluated and compared under the same simulation model with the same state transition noise for simplicity regardless of their real sampling periods. Here the note primarily aims at clarifying this problem and point out that it is very necessary to use a proper simulation noise that matches the filter's speed for evaluation and comparison under the same simulation model.
[ { "version": "v1", "created": "Mon, 5 Aug 2013 18:23:18 GMT" } ]
2013-08-06T00:00:00
[ [ "Li", "Tiancheng", "" ] ]
TITLE: A Gap between Simulation and Practice for Recursive Filters: On the State Transition Noise ABSTRACT: In order to evaluate and compare different recursive filters, simulation is a common tool and numerous simulation models are widely used as 'benchmark'. In the simulation, the continuous time dynamic system is converted into a discrete-time recursive system. As a result of this, the state indeed evolves by Markov transitions in the simulation rather than in continuous time. One significant issue involved with modeling of the system from practice to simulation is that the simulation parameter, particularly e.g. the state Markov transition noise, needs to match the iteration period of the filter. Otherwise, the simulation performance may be far from the truth. Unfortunately, quite commonly different-speed filters are evaluated and compared under the same simulation model with the same state transition noise for simplicity regardless of their real sampling periods. Here the note primarily aims at clarifying this problem and point out that it is very necessary to use a proper simulation noise that matches the filter's speed for evaluation and comparison under the same simulation model.
1301.6659
Nima Mirbakhsh
Nima Mirbakhsh and Charles X. Ling
Clustering-Based Matrix Factorization
This paper has been withdrawn by the author due to crucial typo and the poor grammatical text
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recommender systems are emerging technologies that nowadays can be found in many applications such as Amazon, Netflix, and so on. These systems help users to find relevant information, recommendations, and their preferred items. Slightly improvement of the accuracy of these recommenders can highly affect the quality of recommendations. Matrix Factorization is a popular method in Recommendation Systems showing promising results in accuracy and complexity. In this paper we propose an extension of matrix factorization which adds general neighborhood information on the recommendation model. Users and items are clustered into different categories to see how these categories share preferences. We then employ these shared interests of categories in a fusion by Biased Matrix Factorization to achieve more accurate recommendations. This is a complement for the current neighborhood aware matrix factorization models which rely on using direct neighborhood information of users and items. The proposed model is tested on two well-known recommendation system datasets: Movielens100k and Netflix. Our experiment shows applying the general latent features of categories into factorized recommender models improves the accuracy of recommendations. The current neighborhood-aware models need a great number of neighbors to acheive good accuracies. To the best of our knowledge, the proposed model is better than or comparable with the current neighborhood-aware models when they consider fewer number of neighbors.
[ { "version": "v1", "created": "Mon, 28 Jan 2013 20:01:57 GMT" }, { "version": "v2", "created": "Fri, 8 Feb 2013 22:16:44 GMT" }, { "version": "v3", "created": "Wed, 27 Feb 2013 01:04:55 GMT" }, { "version": "v4", "created": "Thu, 1 Aug 2013 22:06:49 GMT" } ]
2013-08-05T00:00:00
[ [ "Mirbakhsh", "Nima", "" ], [ "Ling", "Charles X.", "" ] ]
TITLE: Clustering-Based Matrix Factorization ABSTRACT: Recommender systems are emerging technologies that nowadays can be found in many applications such as Amazon, Netflix, and so on. These systems help users to find relevant information, recommendations, and their preferred items. Slightly improvement of the accuracy of these recommenders can highly affect the quality of recommendations. Matrix Factorization is a popular method in Recommendation Systems showing promising results in accuracy and complexity. In this paper we propose an extension of matrix factorization which adds general neighborhood information on the recommendation model. Users and items are clustered into different categories to see how these categories share preferences. We then employ these shared interests of categories in a fusion by Biased Matrix Factorization to achieve more accurate recommendations. This is a complement for the current neighborhood aware matrix factorization models which rely on using direct neighborhood information of users and items. The proposed model is tested on two well-known recommendation system datasets: Movielens100k and Netflix. Our experiment shows applying the general latent features of categories into factorized recommender models improves the accuracy of recommendations. The current neighborhood-aware models need a great number of neighbors to acheive good accuracies. To the best of our knowledge, the proposed model is better than or comparable with the current neighborhood-aware models when they consider fewer number of neighbors.
1308.0577
Vincent Labatut
G\"unce Keziban Orman and Vincent Labatut and Hocine Cherifi
Towards realistic artificial benchmark for community detection algorithms evaluation
null
International Journal of Web Based Communities, 9(3):349-370, 2013
10.1504/IJWBC.2013.054908
null
cs.SI physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Assessing the partitioning performance of community detection algorithms is one of the most important issues in complex network analysis. Artificially generated networks are often used as benchmarks for this purpose. However, previous studies showed their level of realism have a significant effect on the algorithms performance. In this study, we adopt a thorough experimental approach to tackle this problem and investigate this effect. To assess the level of realism, we use consensual network topological properties. Based on the LFR method, the most realistic generative method to date, we propose two alternative random models to replace the Configuration Model originally used in this algorithm, in order to increase its realism. Experimental results show both modifications allow generating collections of community-structured artificial networks whose topological properties are closer to those encountered in real-world networks. Moreover, the results obtained with eleven popular community identification algorithms on these benchmarks show their performance decrease on more realistic networks.
[ { "version": "v1", "created": "Fri, 2 Aug 2013 18:48:17 GMT" } ]
2013-08-05T00:00:00
[ [ "Orman", "Günce Keziban", "" ], [ "Labatut", "Vincent", "" ], [ "Cherifi", "Hocine", "" ] ]
TITLE: Towards realistic artificial benchmark for community detection algorithms evaluation ABSTRACT: Assessing the partitioning performance of community detection algorithms is one of the most important issues in complex network analysis. Artificially generated networks are often used as benchmarks for this purpose. However, previous studies showed their level of realism have a significant effect on the algorithms performance. In this study, we adopt a thorough experimental approach to tackle this problem and investigate this effect. To assess the level of realism, we use consensual network topological properties. Based on the LFR method, the most realistic generative method to date, we propose two alternative random models to replace the Configuration Model originally used in this algorithm, in order to increase its realism. Experimental results show both modifications allow generating collections of community-structured artificial networks whose topological properties are closer to those encountered in real-world networks. Moreover, the results obtained with eleven popular community identification algorithms on these benchmarks show their performance decrease on more realistic networks.
1202.2564
Christoforos Anagnostopoulos Dr
David J. Hand, Christoforos Anagnostopoulos
A better Beta for the H measure of classification performance
Preprint. Keywords: supervised classification, classifier performance, AUC, ROC curve, H measure
null
null
null
stat.ME cs.CV stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The area under the ROC curve is widely used as a measure of performance of classification rules. However, it has recently been shown that the measure is fundamentally incoherent, in the sense that it treats the relative severities of misclassifications differently when different classifiers are used. To overcome this, Hand (2009) proposed the $H$ measure, which allows a given researcher to fix the distribution of relative severities to a classifier-independent setting on a given problem. This note extends the discussion, and proposes a modified standard distribution for the $H$ measure, which better matches the requirements of researchers, in particular those faced with heavily unbalanced datasets, the $Beta(\pi_1+1,\pi_0+1)$ distribution. [Preprint submitted at Pattern Recognition Letters]
[ { "version": "v1", "created": "Sun, 12 Feb 2012 20:32:15 GMT" }, { "version": "v2", "created": "Thu, 1 Aug 2013 11:44:54 GMT" } ]
2013-08-02T00:00:00
[ [ "Hand", "David J.", "" ], [ "Anagnostopoulos", "Christoforos", "" ] ]
TITLE: A better Beta for the H measure of classification performance ABSTRACT: The area under the ROC curve is widely used as a measure of performance of classification rules. However, it has recently been shown that the measure is fundamentally incoherent, in the sense that it treats the relative severities of misclassifications differently when different classifiers are used. To overcome this, Hand (2009) proposed the $H$ measure, which allows a given researcher to fix the distribution of relative severities to a classifier-independent setting on a given problem. This note extends the discussion, and proposes a modified standard distribution for the $H$ measure, which better matches the requirements of researchers, in particular those faced with heavily unbalanced datasets, the $Beta(\pi_1+1,\pi_0+1)$ distribution. [Preprint submitted at Pattern Recognition Letters]
1306.4149
Rodrigo Aldecoa
Rodrigo Aldecoa and Ignacio Mar\'in
Exploring the limits of community detection strategies in complex networks
13 pages, 8 figures, 1 table. Scientific Reports (in press)
Scientific Reports 3, 2216 (2013)
10.1038/srep02216
null
physics.soc-ph cond-mat.stat-mech cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The characterization of network community structure has profound implications in several scientific areas. Therefore, testing the algorithms developed to establish the optimal division of a network into communities is a fundamental problem in the field. We performed here a highly detailed evaluation of community detection algorithms, which has two main novelties: 1) using complex closed benchmarks, which provide precise ways to assess whether the solutions generated by the algorithms are optimal; and, 2) A novel type of analysis, based on hierarchically clustering the solutions suggested by multiple community detection algorithms, which allows to easily visualize how different are those solutions. Surprise, a global parameter that evaluates the quality of a partition, confirms the power of these analyses. We show that none of the community detection algorithms tested provide consistently optimal results in all networks and that Surprise maximization, obtained by combining multiple algorithms, obtains quasi-optimal performances in these difficult benchmarks.
[ { "version": "v1", "created": "Tue, 18 Jun 2013 11:34:39 GMT" } ]
2013-08-02T00:00:00
[ [ "Aldecoa", "Rodrigo", "" ], [ "Marín", "Ignacio", "" ] ]
TITLE: Exploring the limits of community detection strategies in complex networks ABSTRACT: The characterization of network community structure has profound implications in several scientific areas. Therefore, testing the algorithms developed to establish the optimal division of a network into communities is a fundamental problem in the field. We performed here a highly detailed evaluation of community detection algorithms, which has two main novelties: 1) using complex closed benchmarks, which provide precise ways to assess whether the solutions generated by the algorithms are optimal; and, 2) A novel type of analysis, based on hierarchically clustering the solutions suggested by multiple community detection algorithms, which allows to easily visualize how different are those solutions. Surprise, a global parameter that evaluates the quality of a partition, confirms the power of these analyses. We show that none of the community detection algorithms tested provide consistently optimal results in all networks and that Surprise maximization, obtained by combining multiple algorithms, obtains quasi-optimal performances in these difficult benchmarks.
1307.7795
Aaron Darling
Ramanuja Simha and Hagit Shatkay
Protein (Multi-)Location Prediction: Using Location Inter-Dependencies in a Probabilistic Framework
Peer-reviewed and presented as part of the 13th Workshop on Algorithms in Bioinformatics (WABI2013)
null
null
null
q-bio.QM cs.CE cs.LG q-bio.GN
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Knowing the location of a protein within the cell is important for understanding its function, role in biological processes, and potential use as a drug target. Much progress has been made in developing computational methods that predict single locations for proteins, assuming that proteins localize to a single location. However, it has been shown that proteins localize to multiple locations. While a few recent systems have attempted to predict multiple locations of proteins, they typically treat locations as independent or capture inter-dependencies by treating each locations-combination present in the training set as an individual location-class. We present a new method and a preliminary system we have developed that directly incorporates inter-dependencies among locations into the multiple-location-prediction process, using a collection of Bayesian network classifiers. We evaluate our system on a dataset of single- and multi-localized proteins. Our results, obtained by incorporating inter-dependencies are significantly higher than those obtained by classifiers that do not use inter-dependencies. The performance of our system on multi-localized proteins is comparable to a top performing system (YLoc+), without restricting predictions to be based only on location-combinations present in the training set.
[ { "version": "v1", "created": "Tue, 30 Jul 2013 03:19:05 GMT" } ]
2013-08-02T00:00:00
[ [ "Simha", "Ramanuja", "" ], [ "Shatkay", "Hagit", "" ] ]
TITLE: Protein (Multi-)Location Prediction: Using Location Inter-Dependencies in a Probabilistic Framework ABSTRACT: Knowing the location of a protein within the cell is important for understanding its function, role in biological processes, and potential use as a drug target. Much progress has been made in developing computational methods that predict single locations for proteins, assuming that proteins localize to a single location. However, it has been shown that proteins localize to multiple locations. While a few recent systems have attempted to predict multiple locations of proteins, they typically treat locations as independent or capture inter-dependencies by treating each locations-combination present in the training set as an individual location-class. We present a new method and a preliminary system we have developed that directly incorporates inter-dependencies among locations into the multiple-location-prediction process, using a collection of Bayesian network classifiers. We evaluate our system on a dataset of single- and multi-localized proteins. Our results, obtained by incorporating inter-dependencies are significantly higher than those obtained by classifiers that do not use inter-dependencies. The performance of our system on multi-localized proteins is comparable to a top performing system (YLoc+), without restricting predictions to be based only on location-combinations present in the training set.
1307.7824
Aaron Darling
Sebastian B\"ocker, Stefan Canzar, and Gunnar W. Klau
The generalized Robinson-Foulds metric
Peer-reviewed and presented as part of the 13th Workshop on Algorithms in Bioinformatics (WABI2013)
null
null
null
cs.DS cs.CE q-bio.QM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Robinson-Foulds (RF) metric is arguably the most widely used measure of phylogenetic tree similarity, despite its well-known shortcomings: For example, moving a single taxon in a tree can result in a tree that has maximum distance to the original one; but the two trees are identical if we remove the single taxon. To this end, we propose a natural extension of the RF metric that does not simply count identical clades but instead, also takes similar clades into consideration. In contrast to previous approaches, our model requires the matching between clades to respect the structure of the two trees, a property that the classical RF metric exhibits, too. We show that computing this generalized RF metric is, unfortunately, NP-hard. We then present a simple Integer Linear Program for its computation, and evaluate it by an all-against-all comparison of 100 trees from a benchmark data set. We find that matchings that respect the tree structure differ significantly from those that do not, underlining the importance of this natural condition.
[ { "version": "v1", "created": "Tue, 30 Jul 2013 05:29:55 GMT" } ]
2013-08-02T00:00:00
[ [ "Böcker", "Sebastian", "" ], [ "Canzar", "Stefan", "" ], [ "Klau", "Gunnar W.", "" ] ]
TITLE: The generalized Robinson-Foulds metric ABSTRACT: The Robinson-Foulds (RF) metric is arguably the most widely used measure of phylogenetic tree similarity, despite its well-known shortcomings: For example, moving a single taxon in a tree can result in a tree that has maximum distance to the original one; but the two trees are identical if we remove the single taxon. To this end, we propose a natural extension of the RF metric that does not simply count identical clades but instead, also takes similar clades into consideration. In contrast to previous approaches, our model requires the matching between clades to respect the structure of the two trees, a property that the classical RF metric exhibits, too. We show that computing this generalized RF metric is, unfortunately, NP-hard. We then present a simple Integer Linear Program for its computation, and evaluate it by an all-against-all comparison of 100 trees from a benchmark data set. We find that matchings that respect the tree structure differ significantly from those that do not, underlining the importance of this natural condition.
1308.0148
\"Omer Demirel
Omer Demirel and Ivo F. Sbalzarini
Balancing indivisible real-valued loads in arbitrary networks
22 pages, 5 figures
null
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In parallel computing, a problem is divided into a set of smaller tasks that are distributed across multiple processing elements. Balancing the load of the processing elements is key to achieving good performance and scalability. If the computational costs of the individual tasks vary over time in an unpredictable way, dynamic load balancing aims at migrating them between processing elements so as to maintain load balance. During dynamic load balancing, the tasks amount to indivisible work packets with a real-valued cost. For this case of indivisible, real- valued loads, we analyze the balancing circuit model, a local dynamic load-balancing scheme that does not require global communication. We extend previous analyses to the present case and provide a probabilistic bound for the achievable load balance. Based on an analogy with the offline balls-into-bins problem, we further propose a novel algorithm for dynamic balancing of indivisible, real-valued loads. We benchmark the proposed algorithm in numerical experiments and compare it with the classical greedy algorithm, both in terms of solution quality and communication cost. We find that the increased communication cost of the proposed algorithm is compensated by a higher solution quality, leading on average to about an order of magnitude gain in overall performance.
[ { "version": "v1", "created": "Thu, 1 Aug 2013 10:32:33 GMT" } ]
2013-08-02T00:00:00
[ [ "Demirel", "Omer", "" ], [ "Sbalzarini", "Ivo F.", "" ] ]
TITLE: Balancing indivisible real-valued loads in arbitrary networks ABSTRACT: In parallel computing, a problem is divided into a set of smaller tasks that are distributed across multiple processing elements. Balancing the load of the processing elements is key to achieving good performance and scalability. If the computational costs of the individual tasks vary over time in an unpredictable way, dynamic load balancing aims at migrating them between processing elements so as to maintain load balance. During dynamic load balancing, the tasks amount to indivisible work packets with a real-valued cost. For this case of indivisible, real- valued loads, we analyze the balancing circuit model, a local dynamic load-balancing scheme that does not require global communication. We extend previous analyses to the present case and provide a probabilistic bound for the achievable load balance. Based on an analogy with the offline balls-into-bins problem, we further propose a novel algorithm for dynamic balancing of indivisible, real-valued loads. We benchmark the proposed algorithm in numerical experiments and compare it with the classical greedy algorithm, both in terms of solution quality and communication cost. We find that the increased communication cost of the proposed algorithm is compensated by a higher solution quality, leading on average to about an order of magnitude gain in overall performance.
1308.0273
Qiang Qiu
Qiang Qiu, Guillermo Sapiro
Learning Robust Subspace Clustering
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a low-rank transformation-learning framework to robustify subspace clustering. Many high-dimensional data, such as face images and motion sequences, lie in a union of low-dimensional subspaces. The subspace clustering problem has been extensively studied in the literature to partition such high-dimensional data into clusters corresponding to their underlying low-dimensional subspaces. However, low-dimensional intrinsic structures are often violated for real-world observations, as they can be corrupted by errors or deviate from ideal models. We propose to address this by learning a linear transformation on subspaces using matrix rank, via its convex surrogate nuclear norm, as the optimization criteria. The learned linear transformation restores a low-rank structure for data from the same subspace, and, at the same time, forces a high-rank structure for data from different subspaces. In this way, we reduce variations within the subspaces, and increase separations between the subspaces for more accurate subspace clustering. This proposed learned robust subspace clustering framework significantly enhances the performance of existing subspace clustering methods. To exploit the low-rank structures of the transformed subspaces, we further introduce a subspace clustering technique, called Robust Sparse Subspace Clustering, which efficiently combines robust PCA with sparse modeling. We also discuss the online learning of the transformation, and learning of the transformation while simultaneously reducing the data dimensionality. Extensive experiments using public datasets are presented, showing that the proposed approach significantly outperforms state-of-the-art subspace clustering methods.
[ { "version": "v1", "created": "Thu, 1 Aug 2013 17:31:37 GMT" } ]
2013-08-02T00:00:00
[ [ "Qiu", "Qiang", "" ], [ "Sapiro", "Guillermo", "" ] ]
TITLE: Learning Robust Subspace Clustering ABSTRACT: We propose a low-rank transformation-learning framework to robustify subspace clustering. Many high-dimensional data, such as face images and motion sequences, lie in a union of low-dimensional subspaces. The subspace clustering problem has been extensively studied in the literature to partition such high-dimensional data into clusters corresponding to their underlying low-dimensional subspaces. However, low-dimensional intrinsic structures are often violated for real-world observations, as they can be corrupted by errors or deviate from ideal models. We propose to address this by learning a linear transformation on subspaces using matrix rank, via its convex surrogate nuclear norm, as the optimization criteria. The learned linear transformation restores a low-rank structure for data from the same subspace, and, at the same time, forces a high-rank structure for data from different subspaces. In this way, we reduce variations within the subspaces, and increase separations between the subspaces for more accurate subspace clustering. This proposed learned robust subspace clustering framework significantly enhances the performance of existing subspace clustering methods. To exploit the low-rank structures of the transformed subspaces, we further introduce a subspace clustering technique, called Robust Sparse Subspace Clustering, which efficiently combines robust PCA with sparse modeling. We also discuss the online learning of the transformation, and learning of the transformation while simultaneously reducing the data dimensionality. Extensive experiments using public datasets are presented, showing that the proposed approach significantly outperforms state-of-the-art subspace clustering methods.
1308.0275
Qiang Qiu
Qiang Qiu, Guillermo Sapiro, Ching-Hui Chen
Domain-invariant Face Recognition using Learned Low-rank Transformation
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a low-rank transformation approach to compensate for face variations due to changes in visual domains, such as pose and illumination. The key idea is to learn discriminative linear transformations for face images using matrix rank as the optimization criteria. The learned linear transformations restore a shared low-rank structure for faces from the same subject, and, at the same time, force a high-rank structure for faces from different subjects. In this way, among the transformed faces, we reduce variations caused by domain changes within the classes, and increase separations between the classes for better face recognition across domains. Extensive experiments using public datasets are presented to demonstrate the effectiveness of our approach for face recognition across domains. The potential of the approach for feature extraction in generic object recognition and coded aperture design are discussed as well.
[ { "version": "v1", "created": "Thu, 1 Aug 2013 17:34:36 GMT" } ]
2013-08-02T00:00:00
[ [ "Qiu", "Qiang", "" ], [ "Sapiro", "Guillermo", "" ], [ "Chen", "Ching-Hui", "" ] ]
TITLE: Domain-invariant Face Recognition using Learned Low-rank Transformation ABSTRACT: We present a low-rank transformation approach to compensate for face variations due to changes in visual domains, such as pose and illumination. The key idea is to learn discriminative linear transformations for face images using matrix rank as the optimization criteria. The learned linear transformations restore a shared low-rank structure for faces from the same subject, and, at the same time, force a high-rank structure for faces from different subjects. In this way, among the transformed faces, we reduce variations caused by domain changes within the classes, and increase separations between the classes for better face recognition across domains. Extensive experiments using public datasets are presented to demonstrate the effectiveness of our approach for face recognition across domains. The potential of the approach for feature extraction in generic object recognition and coded aperture design are discussed as well.
1302.0971
Leon Abdillah
Leon Andretti Abdillah
Validasi data dengan menggunakan objek lookup pada borland delphi 7.0
16 pages
MATRIK. 7 (2005) 1-16
null
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Developing an application with some tables must concern the validation of input (specially in Table Child). In order to maximize the accuracy and data input validation. Its called lookup (took data from other dataset). There are two ways to look up data from Table Parent: 1) Using Objects (DBLookupComboBox and DBookupListBox), or 2) Arranging the properties of data types fields (shown by using DBGrid). In this article is using Borland Delphi software (Inprise product). The method is offered using 5 (five) practise steps: 1) Relational Database Scheme, 2) Form Design, 3) Object DatabasesRelationships Scheme, 4) Properties and Field Type Arrangement, and 5) Procedures. The result of this paper are: 1) The relationship that using lookup objects are valid, and 2) Delphi Lookup Objects can be used for 1-1, 1-N, and M-N relationship.
[ { "version": "v1", "created": "Tue, 5 Feb 2013 09:32:54 GMT" } ]
2013-08-01T00:00:00
[ [ "Abdillah", "Leon Andretti", "" ] ]
TITLE: Validasi data dengan menggunakan objek lookup pada borland delphi 7.0 ABSTRACT: Developing an application with some tables must concern the validation of input (specially in Table Child). In order to maximize the accuracy and data input validation. Its called lookup (took data from other dataset). There are two ways to look up data from Table Parent: 1) Using Objects (DBLookupComboBox and DBookupListBox), or 2) Arranging the properties of data types fields (shown by using DBGrid). In this article is using Borland Delphi software (Inprise product). The method is offered using 5 (five) practise steps: 1) Relational Database Scheme, 2) Form Design, 3) Object DatabasesRelationships Scheme, 4) Properties and Field Type Arrangement, and 5) Procedures. The result of this paper are: 1) The relationship that using lookup objects are valid, and 2) Delphi Lookup Objects can be used for 1-1, 1-N, and M-N relationship.
1307.8136
Brian Kent
Brian P. Kent, Alessandro Rinaldo, Timothy Verstynen
DeBaCl: A Python Package for Interactive DEnsity-BAsed CLustering
28 pages, 9 figures, for associated software see https://github.com/CoAxLab/DeBaCl
null
null
null
stat.ME cs.LG stat.ML
http://creativecommons.org/licenses/by/3.0/
The level set tree approach of Hartigan (1975) provides a probabilistically based and highly interpretable encoding of the clustering behavior of a dataset. By representing the hierarchy of data modes as a dendrogram of the level sets of a density estimator, this approach offers many advantages for exploratory analysis and clustering, especially for complex and high-dimensional data. Several R packages exist for level set tree estimation, but their practical usefulness is limited by computational inefficiency, absence of interactive graphical capabilities and, from a theoretical perspective, reliance on asymptotic approximations. To make it easier for practitioners to capture the advantages of level set trees, we have written the Python package DeBaCl for DEnsity-BAsed CLustering. In this article we illustrate how DeBaCl's level set tree estimates can be used for difficult clustering tasks and interactive graphical data analysis. The package is intended to promote the practical use of level set trees through improvements in computational efficiency and a high degree of user customization. In addition, the flexible algorithms implemented in DeBaCl enjoy finite sample accuracy, as demonstrated in recent literature on density clustering. Finally, we show the level set tree framework can be easily extended to deal with functional data.
[ { "version": "v1", "created": "Tue, 30 Jul 2013 20:19:26 GMT" } ]
2013-08-01T00:00:00
[ [ "Kent", "Brian P.", "" ], [ "Rinaldo", "Alessandro", "" ], [ "Verstynen", "Timothy", "" ] ]
TITLE: DeBaCl: A Python Package for Interactive DEnsity-BAsed CLustering ABSTRACT: The level set tree approach of Hartigan (1975) provides a probabilistically based and highly interpretable encoding of the clustering behavior of a dataset. By representing the hierarchy of data modes as a dendrogram of the level sets of a density estimator, this approach offers many advantages for exploratory analysis and clustering, especially for complex and high-dimensional data. Several R packages exist for level set tree estimation, but their practical usefulness is limited by computational inefficiency, absence of interactive graphical capabilities and, from a theoretical perspective, reliance on asymptotic approximations. To make it easier for practitioners to capture the advantages of level set trees, we have written the Python package DeBaCl for DEnsity-BAsed CLustering. In this article we illustrate how DeBaCl's level set tree estimates can be used for difficult clustering tasks and interactive graphical data analysis. The package is intended to promote the practical use of level set trees through improvements in computational efficiency and a high degree of user customization. In addition, the flexible algorithms implemented in DeBaCl enjoy finite sample accuracy, as demonstrated in recent literature on density clustering. Finally, we show the level set tree framework can be easily extended to deal with functional data.
1307.8276
Francesca Lo Cicero
Roberto Ammendola, Massimo Bernaschi, Andrea Biagioni, Mauro Bisson, Massimiliano Fatica, Ottorino Frezza, Francesca Lo Cicero, Alessandro Lonardo, Enrico Mastrostefano, Pier Stanislao Paolucci, Davide Rossetti, Francesco Simula, Laura Tosoratto and Piero Vicini
GPU peer-to-peer techniques applied to a cluster interconnect
paper accepted to CASS 2013
null
null
null
physics.comp-ph cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Modern GPUs support special protocols to exchange data directly across the PCI Express bus. While these protocols could be used to reduce GPU data transmission times, basically by avoiding staging to host memory, they require specific hardware features which are not available on current generation network adapters. In this paper we describe the architectural modifications required to implement peer-to-peer access to NVIDIA Fermi- and Kepler-class GPUs on an FPGA-based cluster interconnect. Besides, the current software implementation, which integrates this feature by minimally extending the RDMA programming model, is discussed, as well as some issues raised while employing it in a higher level API like MPI. Finally, the current limits of the technique are studied by analyzing the performance improvements on low-level benchmarks and on two GPU-accelerated applications, showing when and how they seem to benefit from the GPU peer-to-peer method.
[ { "version": "v1", "created": "Wed, 31 Jul 2013 10:46:17 GMT" } ]
2013-08-01T00:00:00
[ [ "Ammendola", "Roberto", "" ], [ "Bernaschi", "Massimo", "" ], [ "Biagioni", "Andrea", "" ], [ "Bisson", "Mauro", "" ], [ "Fatica", "Massimiliano", "" ], [ "Frezza", "Ottorino", "" ], [ "Cicero", "Francesca Lo", "" ], [ "Lonardo", "Alessandro", "" ], [ "Mastrostefano", "Enrico", "" ], [ "Paolucci", "Pier Stanislao", "" ], [ "Rossetti", "Davide", "" ], [ "Simula", "Francesco", "" ], [ "Tosoratto", "Laura", "" ], [ "Vicini", "Piero", "" ] ]
TITLE: GPU peer-to-peer techniques applied to a cluster interconnect ABSTRACT: Modern GPUs support special protocols to exchange data directly across the PCI Express bus. While these protocols could be used to reduce GPU data transmission times, basically by avoiding staging to host memory, they require specific hardware features which are not available on current generation network adapters. In this paper we describe the architectural modifications required to implement peer-to-peer access to NVIDIA Fermi- and Kepler-class GPUs on an FPGA-based cluster interconnect. Besides, the current software implementation, which integrates this feature by minimally extending the RDMA programming model, is discussed, as well as some issues raised while employing it in a higher level API like MPI. Finally, the current limits of the technique are studied by analyzing the performance improvements on low-level benchmarks and on two GPU-accelerated applications, showing when and how they seem to benefit from the GPU peer-to-peer method.
1307.8279
Alireza Rezvanian
Somayeh Nabizadeh, Alireza Rezvanian, Mohammad Reza Meybodi
Tracking Extrema in Dynamic Environment using Multi-Swarm Cellular PSO with Local Search
8 pages, 3 figures
int j electron inform 1 (2012) 29-37
null
null
cs.AI cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Many real-world phenomena can be modelled as dynamic optimization problems. In such cases, the environment problem changes dynamically and therefore, conventional methods are not capable of dealing with such problems. In this paper, a novel multi-swarm cellular particle swarm optimization algorithm is proposed by clustering and local search. In the proposed algorithm, the search space is partitioned into cells, while the particles identify changes in the search space and form clusters to create sub-swarms. Then a local search is applied to improve the solutions in the each cell. Simulation results for static standard benchmarks and dynamic environments show superiority of the proposed method over other alternative approaches.
[ { "version": "v1", "created": "Wed, 31 Jul 2013 10:57:47 GMT" } ]
2013-08-01T00:00:00
[ [ "Nabizadeh", "Somayeh", "" ], [ "Rezvanian", "Alireza", "" ], [ "Meybodi", "Mohammad Reza", "" ] ]
TITLE: Tracking Extrema in Dynamic Environment using Multi-Swarm Cellular PSO with Local Search ABSTRACT: Many real-world phenomena can be modelled as dynamic optimization problems. In such cases, the environment problem changes dynamically and therefore, conventional methods are not capable of dealing with such problems. In this paper, a novel multi-swarm cellular particle swarm optimization algorithm is proposed by clustering and local search. In the proposed algorithm, the search space is partitioned into cells, while the particles identify changes in the search space and form clusters to create sub-swarms. Then a local search is applied to improve the solutions in the each cell. Simulation results for static standard benchmarks and dynamic environments show superiority of the proposed method over other alternative approaches.
1307.8305
Tobias Glasmachers
Tobias Glasmachers
The Planning-ahead SMO Algorithm
null
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The sequential minimal optimization (SMO) algorithm and variants thereof are the de facto standard method for solving large quadratic programs for support vector machine (SVM) training. In this paper we propose a simple yet powerful modification. The main emphasis is on an algorithm improving the SMO step size by planning-ahead. The theoretical analysis ensures its convergence to the optimum. Experiments involving a large number of datasets were carried out to demonstrate the superiority of the new algorithm.
[ { "version": "v1", "created": "Wed, 31 Jul 2013 12:38:20 GMT" } ]
2013-08-01T00:00:00
[ [ "Glasmachers", "Tobias", "" ] ]
TITLE: The Planning-ahead SMO Algorithm ABSTRACT: The sequential minimal optimization (SMO) algorithm and variants thereof are the de facto standard method for solving large quadratic programs for support vector machine (SVM) training. In this paper we propose a simple yet powerful modification. The main emphasis is on an algorithm improving the SMO step size by planning-ahead. The theoretical analysis ensures its convergence to the optimum. Experiments involving a large number of datasets were carried out to demonstrate the superiority of the new algorithm.
1307.8405
Jinyun Yan
Zixuan Wang, Jinyun Yan
Who and Where: People and Location Co-Clustering
2013 IEEE International Conference on Image Processing
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we consider the clustering problem on images where each image contains patches in people and location domains. We exploit the correlation between people and location domains, and proposed a semi-supervised co-clustering algorithm to cluster images. Our algorithm updates the correlation links at the runtime, and produces clustering in both domains simultaneously. We conduct experiments in a manually collected dataset and a Flickr dataset. The result shows that the such correlation improves the clustering performance.
[ { "version": "v1", "created": "Wed, 31 Jul 2013 17:53:10 GMT" } ]
2013-08-01T00:00:00
[ [ "Wang", "Zixuan", "" ], [ "Yan", "Jinyun", "" ] ]
TITLE: Who and Where: People and Location Co-Clustering ABSTRACT: In this paper, we consider the clustering problem on images where each image contains patches in people and location domains. We exploit the correlation between people and location domains, and proposed a semi-supervised co-clustering algorithm to cluster images. Our algorithm updates the correlation links at the runtime, and produces clustering in both domains simultaneously. We conduct experiments in a manually collected dataset and a Flickr dataset. The result shows that the such correlation improves the clustering performance.
1307.8430
Bryan Conroy
Bryan R. Conroy, Jennifer M. Walz, Brian Cheung, Paul Sajda
Fast Simultaneous Training of Generalized Linear Models (FaSTGLZ)
null
null
null
null
cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present an efficient algorithm for simultaneously training sparse generalized linear models across many related problems, which may arise from bootstrapping, cross-validation and nonparametric permutation testing. Our approach leverages the redundancies across problems to obtain significant computational improvements relative to solving the problems sequentially by a conventional algorithm. We demonstrate our fast simultaneous training of generalized linear models (FaSTGLZ) algorithm on a number of real-world datasets, and we run otherwise computationally intensive bootstrapping and permutation test analyses that are typically necessary for obtaining statistically rigorous classification results and meaningful interpretation. Code is freely available at http://liinc.bme.columbia.edu/fastglz.
[ { "version": "v1", "created": "Wed, 31 Jul 2013 19:18:11 GMT" } ]
2013-08-01T00:00:00
[ [ "Conroy", "Bryan R.", "" ], [ "Walz", "Jennifer M.", "" ], [ "Cheung", "Brian", "" ], [ "Sajda", "Paul", "" ] ]
TITLE: Fast Simultaneous Training of Generalized Linear Models (FaSTGLZ) ABSTRACT: We present an efficient algorithm for simultaneously training sparse generalized linear models across many related problems, which may arise from bootstrapping, cross-validation and nonparametric permutation testing. Our approach leverages the redundancies across problems to obtain significant computational improvements relative to solving the problems sequentially by a conventional algorithm. We demonstrate our fast simultaneous training of generalized linear models (FaSTGLZ) algorithm on a number of real-world datasets, and we run otherwise computationally intensive bootstrapping and permutation test analyses that are typically necessary for obtaining statistically rigorous classification results and meaningful interpretation. Code is freely available at http://liinc.bme.columbia.edu/fastglz.
1307.6716
Sadegh Esmaeil Zadeh Soudjani
Sadegh Esmaeil Zadeh Soudjani and Alessandro Abate
Aggregation and Control of Populations of Thermostatically Controlled Loads by Formal Abstractions
40 pages, 21 figures; the paper generalizes the result of conference publication: S. Esmaeil Zadeh Soudjani and A. Abate, "Aggregation of Thermostatically Controlled Loads by Formal Abstractions," Proceedings of the European Control Conference 2013, pp. 4232-4237. version 2: added references for section 1
null
null
null
cs.SY math.OC math.PR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This work discusses a two-step procedure, based on formal abstractions, to generate a finite-space stochastic dynamical model as an aggregation of the continuous temperature dynamics of a homogeneous population of Thermostatically Controlled Loads (TCL). The temperature of a single TCL is described by a stochastic difference equation and the TCL status (ON, OFF) by a deterministic switching mechanism. The procedure is formal as it allows the exact quantification of the error introduced by the abstraction -- as such it builds and improves on a known, earlier approximation technique in the literature. Further, the contribution discusses the extension to the case of a heterogeneous population of TCL by means of two approaches resulting in the notion of approximate abstractions. It moreover investigates the problem of global (population-level) regulation and load balancing for the case of TCL that are dependent on a control input. The procedure is tested on a case study and benchmarked against the mentioned alternative approach in the literature.
[ { "version": "v1", "created": "Thu, 25 Jul 2013 12:25:29 GMT" }, { "version": "v2", "created": "Tue, 30 Jul 2013 09:27:38 GMT" } ]
2013-07-31T00:00:00
[ [ "Soudjani", "Sadegh Esmaeil Zadeh", "" ], [ "Abate", "Alessandro", "" ] ]
TITLE: Aggregation and Control of Populations of Thermostatically Controlled Loads by Formal Abstractions ABSTRACT: This work discusses a two-step procedure, based on formal abstractions, to generate a finite-space stochastic dynamical model as an aggregation of the continuous temperature dynamics of a homogeneous population of Thermostatically Controlled Loads (TCL). The temperature of a single TCL is described by a stochastic difference equation and the TCL status (ON, OFF) by a deterministic switching mechanism. The procedure is formal as it allows the exact quantification of the error introduced by the abstraction -- as such it builds and improves on a known, earlier approximation technique in the literature. Further, the contribution discusses the extension to the case of a heterogeneous population of TCL by means of two approaches resulting in the notion of approximate abstractions. It moreover investigates the problem of global (population-level) regulation and load balancing for the case of TCL that are dependent on a control input. The procedure is tested on a case study and benchmarked against the mentioned alternative approach in the literature.
1307.7943
Zhen Jia
Zhen Jia, Runlin Zhou, Chunge Zhu, Lei Wang, Wanling Gao, Yingjie Shi, Jianfeng Zhan, Lixin Zhang
The Implications of Diverse Applications and Scalable Data Sets in Benchmarking Big Data Systems
16 pages, 3 figures
null
null
null
cs.PF
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Now we live in an era of big data, and big data applications are becoming more and more pervasive. How to benchmark data center computer systems running big data applications (in short big data systems) is a hot topic. In this paper, we focus on measuring the performance impacts of diverse applications and scalable volumes of data sets on big data systems. For four typical data analysis applications---an important class of big data applications, we find two major results through experiments: first, the data scale has a significant impact on the performance of big data systems, so we must provide scalable volumes of data sets in big data benchmarks. Second, for the four applications, even all of them use the simple algorithms, the performance trends are different with increasing data scales, and hence we must consider not only variety of data sets but also variety of applications in benchmarking big data systems.
[ { "version": "v1", "created": "Tue, 30 Jul 2013 12:34:49 GMT" } ]
2013-07-31T00:00:00
[ [ "Jia", "Zhen", "" ], [ "Zhou", "Runlin", "" ], [ "Zhu", "Chunge", "" ], [ "Wang", "Lei", "" ], [ "Gao", "Wanling", "" ], [ "Shi", "Yingjie", "" ], [ "Zhan", "Jianfeng", "" ], [ "Zhang", "Lixin", "" ] ]
TITLE: The Implications of Diverse Applications and Scalable Data Sets in Benchmarking Big Data Systems ABSTRACT: Now we live in an era of big data, and big data applications are becoming more and more pervasive. How to benchmark data center computer systems running big data applications (in short big data systems) is a hot topic. In this paper, we focus on measuring the performance impacts of diverse applications and scalable volumes of data sets on big data systems. For four typical data analysis applications---an important class of big data applications, we find two major results through experiments: first, the data scale has a significant impact on the performance of big data systems, so we must provide scalable volumes of data sets in big data benchmarks. Second, for the four applications, even all of them use the simple algorithms, the performance trends are different with increasing data scales, and hence we must consider not only variety of data sets but also variety of applications in benchmarking big data systems.
1307.8013
Zhen Jia
Zhen Jia, Lei Wang, Jianfeng Zhan, Lixin Zhang, Chunjie Luo
Characterizing Data Analysis Workloads in Data Centers
11 pages, 12 figures, IISWC2013
null
null
null
cs.PF
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
As the amount of data explodes rapidly, more and more corporations are using data centers to make effective decisions and gain a competitive edge. Data analysis applications play a significant role in data centers, and hence it has became increasingly important to understand their behaviors in order to further improve the performance of data center computer systems. In this paper, after investigating three most important application domains in terms of page views and daily visitors, we choose eleven representative data analysis workloads and characterize their micro-architectural characteristics by using hardware performance counters, in order to understand the impacts and implications of data analysis workloads on the systems equipped with modern superscalar out-of-order processors. Our study on the workloads reveals that data analysis applications share many inherent characteristics, which place them in a different class from desktop (SPEC CPU2006), HPC (HPCC), and service workloads, including traditional server workloads (SPECweb2005) and scale-out service workloads (four among six benchmarks in CloudSuite), and accordingly we give several recommendations for architecture and system optimizations. On the basis of our workload characterization work, we released a benchmark suite named DCBench for typical datacenter workloads, including data analysis and service workloads, with an open-source license on our project home page on http://prof.ict.ac.cn/DCBench. We hope that DCBench is helpful for performing architecture and small-to-medium scale system researches for datacenter computing.
[ { "version": "v1", "created": "Tue, 30 Jul 2013 15:23:25 GMT" } ]
2013-07-31T00:00:00
[ [ "Jia", "Zhen", "" ], [ "Wang", "Lei", "" ], [ "Zhan", "Jianfeng", "" ], [ "Zhang", "Lixin", "" ], [ "Luo", "Chunjie", "" ] ]
TITLE: Characterizing Data Analysis Workloads in Data Centers ABSTRACT: As the amount of data explodes rapidly, more and more corporations are using data centers to make effective decisions and gain a competitive edge. Data analysis applications play a significant role in data centers, and hence it has became increasingly important to understand their behaviors in order to further improve the performance of data center computer systems. In this paper, after investigating three most important application domains in terms of page views and daily visitors, we choose eleven representative data analysis workloads and characterize their micro-architectural characteristics by using hardware performance counters, in order to understand the impacts and implications of data analysis workloads on the systems equipped with modern superscalar out-of-order processors. Our study on the workloads reveals that data analysis applications share many inherent characteristics, which place them in a different class from desktop (SPEC CPU2006), HPC (HPCC), and service workloads, including traditional server workloads (SPECweb2005) and scale-out service workloads (four among six benchmarks in CloudSuite), and accordingly we give several recommendations for architecture and system optimizations. On the basis of our workload characterization work, we released a benchmark suite named DCBench for typical datacenter workloads, including data analysis and service workloads, with an open-source license on our project home page on http://prof.ict.ac.cn/DCBench. We hope that DCBench is helpful for performing architecture and small-to-medium scale system researches for datacenter computing.
1304.3138
Fran\c{c}ois-Michel De Rainville
Fran\c{c}ois-Michel De Rainville, Mich\`ele Sebag, Christian Gagn\'e, Marc Schoenauer, Denis Laurendeau
Sustainable Cooperative Coevolution with a Multi-Armed Bandit
Accepted at GECCO 2013
null
10.1145/2463372.2463556
null
cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper proposes a self-adaptation mechanism to manage the resources allocated to the different species comprising a cooperative coevolutionary algorithm. The proposed approach relies on a dynamic extension to the well-known multi-armed bandit framework. At each iteration, the dynamic multi-armed bandit makes a decision on which species to evolve for a generation, using the history of progress made by the different species to guide the decisions. We show experimentally, on a benchmark and a real-world problem, that evolving the different populations at different paces allows not only to identify solutions more rapidly, but also improves the capacity of cooperative coevolution to solve more complex problems.
[ { "version": "v1", "created": "Wed, 10 Apr 2013 20:24:31 GMT" } ]
2013-07-30T00:00:00
[ [ "De Rainville", "François-Michel", "" ], [ "Sebag", "Michèle", "" ], [ "Gagné", "Christian", "" ], [ "Schoenauer", "Marc", "" ], [ "Laurendeau", "Denis", "" ] ]
TITLE: Sustainable Cooperative Coevolution with a Multi-Armed Bandit ABSTRACT: This paper proposes a self-adaptation mechanism to manage the resources allocated to the different species comprising a cooperative coevolutionary algorithm. The proposed approach relies on a dynamic extension to the well-known multi-armed bandit framework. At each iteration, the dynamic multi-armed bandit makes a decision on which species to evolve for a generation, using the history of progress made by the different species to guide the decisions. We show experimentally, on a benchmark and a real-world problem, that evolving the different populations at different paces allows not only to identify solutions more rapidly, but also improves the capacity of cooperative coevolution to solve more complex problems.
1306.0573
Navtej Singh
Navtej Singh, Lisa-Marie Browne, Ray Butler
Parallel Astronomical Data Processing with Python: Recipes for multicore machines
15 pages, 7 figures, 1 table, "for associated test code, see http://astro.nuigalway.ie/staff/navtejs", Accepted for publication in Astronomy and Computing
null
10.1016/j.ascom.2013.04.002
null
astro-ph.IM cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
High performance computing has been used in various fields of astrophysical research. But most of it is implemented on massively parallel systems (supercomputers) or graphical processing unit clusters. With the advent of multicore processors in the last decade, many serial software codes have been re-implemented in parallel mode to utilize the full potential of these processors. In this paper, we propose parallel processing recipes for multicore machines for astronomical data processing. The target audience are astronomers who are using Python as their preferred scripting language and who may be using PyRAF/IRAF for data processing. Three problems of varied complexity were benchmarked on three different types of multicore processors to demonstrate the benefits, in terms of execution time, of parallelizing data processing tasks. The native multiprocessing module available in Python makes it a relatively trivial task to implement the parallel code. We have also compared the three multiprocessing approaches - Pool/Map, Process/Queue, and Parallel Python. Our test codes are freely available and can be downloaded from our website.
[ { "version": "v1", "created": "Mon, 3 Jun 2013 20:00:04 GMT" } ]
2013-07-30T00:00:00
[ [ "Singh", "Navtej", "" ], [ "Browne", "Lisa-Marie", "" ], [ "Butler", "Ray", "" ] ]
TITLE: Parallel Astronomical Data Processing with Python: Recipes for multicore machines ABSTRACT: High performance computing has been used in various fields of astrophysical research. But most of it is implemented on massively parallel systems (supercomputers) or graphical processing unit clusters. With the advent of multicore processors in the last decade, many serial software codes have been re-implemented in parallel mode to utilize the full potential of these processors. In this paper, we propose parallel processing recipes for multicore machines for astronomical data processing. The target audience are astronomers who are using Python as their preferred scripting language and who may be using PyRAF/IRAF for data processing. Three problems of varied complexity were benchmarked on three different types of multicore processors to demonstrate the benefits, in terms of execution time, of parallelizing data processing tasks. The native multiprocessing module available in Python makes it a relatively trivial task to implement the parallel code. We have also compared the three multiprocessing approaches - Pool/Map, Process/Queue, and Parallel Python. Our test codes are freely available and can be downloaded from our website.
1307.7464
Sharath Chandra Guntuku
Sharath Chandra Guntuku, Pratik Narang, Chittaranjan Hota
Real-time Peer-to-Peer Botnet Detection Framework based on Bayesian Regularized Neural Network
null
null
null
null
cs.NI cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Over the past decade, the Cyberspace has seen an increasing number of attacks coming from botnets using the Peer-to-Peer (P2P) architecture. Peer-to-Peer botnets use a decentralized Command & Control architecture. Moreover, a large number of such botnets already exist, and newer versions- which significantly differ from their parent bot- are also discovered practically every year. In this work, the authors propose and implement a novel hybrid framework for detecting P2P botnets in live network traffic by integrating Neural Networks with Bayesian Regularization. Bayesian Regularization helps in achieving better generalization of the dataset, thereby enabling the detection of botnet activity even of those bots which were never used in training the Neural Network. Hence such a framework is suitable for detection of newer and unseen botnets in live traffic of a network. This was verified by testing the Framework on test data unseen to the Detection module (using untrained botnet dataset), and the authors were successful in detecting this activity with an accuracy of 99.2 %.
[ { "version": "v1", "created": "Mon, 29 Jul 2013 05:21:37 GMT" } ]
2013-07-30T00:00:00
[ [ "Guntuku", "Sharath Chandra", "" ], [ "Narang", "Pratik", "" ], [ "Hota", "Chittaranjan", "" ] ]
TITLE: Real-time Peer-to-Peer Botnet Detection Framework based on Bayesian Regularized Neural Network ABSTRACT: Over the past decade, the Cyberspace has seen an increasing number of attacks coming from botnets using the Peer-to-Peer (P2P) architecture. Peer-to-Peer botnets use a decentralized Command & Control architecture. Moreover, a large number of such botnets already exist, and newer versions- which significantly differ from their parent bot- are also discovered practically every year. In this work, the authors propose and implement a novel hybrid framework for detecting P2P botnets in live network traffic by integrating Neural Networks with Bayesian Regularization. Bayesian Regularization helps in achieving better generalization of the dataset, thereby enabling the detection of botnet activity even of those bots which were never used in training the Neural Network. Hence such a framework is suitable for detection of newer and unseen botnets in live traffic of a network. This was verified by testing the Framework on test data unseen to the Detection module (using untrained botnet dataset), and the authors were successful in detecting this activity with an accuracy of 99.2 %.
1307.6889
Nicholas Magliocca
N. R. Magliocca (1), E. C. Ellis (1), T. Oates (2) and M. Schmill (2) ((1) Department of Geography and Environmental Systems, University of Maryland, Baltimore County, Baltimore, Maryland, USA,(2) Department of Computer Science and Electrical Engineering, University of Maryland, Baltimore County, Baltimore, Maryland, USA)
Contextualizing the global relevance of local land change observations
5 pages, 4 figures, white paper
null
null
null
stat.AP cs.CY physics.ao-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
To understand global changes in the Earth system, scientists must generalize globally from observations made locally and regionally. In land change science (LCS), local field-based observations are costly and time consuming, and generally obtained by researchers working at disparate local and regional case-study sites chosen for different reasons. As a result, global synthesis efforts in LCS tend to be based on non-statistical inferences subject to geographic biases stemming from data limitations and fragmentation. Thus, a fundamental challenge is the production of generalized knowledge that links evidence of the causes and consequences of local land change to global patterns and vice versa. The GLOBE system was designed to meet this challenge. GLOBE aims to transform global change science by enabling new scientific workflows based on statistically robust, globally relevant integration of local and regional observations using an online social-computational and geovisualization system. Consistent with the goals of Digital Earth, GLOBE has the capability to assess the global relevance of local case-study findings within the context of over 50 global biophysical, land-use, climate, and socio-economic datasets. We demonstrate the implementation of one such assessment - a representativeness analysis - with a recently published meta-study of changes in swidden agriculture in tropical forests. The analysis provides a standardized indicator to judge the global representativeness of the trends reported in the meta-study, and a geovisualization is presented that highlights areas for which sampling efforts can be reduced and those in need of further study. GLOBE will enable researchers and institutions to rapidly share, compare, and synthesize local and regional studies within the global context, as well as contributing to the larger goal of creating a Digital Earth.
[ { "version": "v1", "created": "Thu, 25 Jul 2013 22:40:04 GMT" } ]
2013-07-29T00:00:00
[ [ "Magliocca", "N. R.", "" ], [ "Ellis", "E. C.", "" ], [ "Oates", "T.", "" ], [ "Schmill", "M.", "" ] ]
TITLE: Contextualizing the global relevance of local land change observations ABSTRACT: To understand global changes in the Earth system, scientists must generalize globally from observations made locally and regionally. In land change science (LCS), local field-based observations are costly and time consuming, and generally obtained by researchers working at disparate local and regional case-study sites chosen for different reasons. As a result, global synthesis efforts in LCS tend to be based on non-statistical inferences subject to geographic biases stemming from data limitations and fragmentation. Thus, a fundamental challenge is the production of generalized knowledge that links evidence of the causes and consequences of local land change to global patterns and vice versa. The GLOBE system was designed to meet this challenge. GLOBE aims to transform global change science by enabling new scientific workflows based on statistically robust, globally relevant integration of local and regional observations using an online social-computational and geovisualization system. Consistent with the goals of Digital Earth, GLOBE has the capability to assess the global relevance of local case-study findings within the context of over 50 global biophysical, land-use, climate, and socio-economic datasets. We demonstrate the implementation of one such assessment - a representativeness analysis - with a recently published meta-study of changes in swidden agriculture in tropical forests. The analysis provides a standardized indicator to judge the global representativeness of the trends reported in the meta-study, and a geovisualization is presented that highlights areas for which sampling efforts can be reduced and those in need of further study. GLOBE will enable researchers and institutions to rapidly share, compare, and synthesize local and regional studies within the global context, as well as contributing to the larger goal of creating a Digital Earth.
1307.6923
Rajib Rana
Rajib Rana, Mingrui Yang, Tim Wark, Chun Tung Chou, Wen Hu
A Deterministic Construction of Projection matrix for Adaptive Trajectory Compression
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Compressive Sensing, which offers exact reconstruction of sparse signal from a small number of measurements, has tremendous potential for trajectory compression. In order to optimize the compression, trajectory compression algorithms need to adapt compression ratio subject to the compressibility of the trajectory. Intuitively, the trajectory of an object moving in starlight road is more compressible compared to the trajectory of a object moving in winding roads, therefore, higher compression is achievable in the former case compared to the later. We propose an in-situ compression technique underpinning the support vector regression theory, which accurately predicts the compressibility of a trajectory given the mean speed of the object and then apply compressive sensing to adapt the compression to the compressibility of the trajectory. The conventional encoding and decoding process of compressive sensing uses predefined dictionary and measurement (or projection) matrix pairs. However, the selection of an optimal pair is nontrivial and exhaustive, and random selection of a pair does not guarantee the best compression performance. In this paper, we propose a deterministic and data driven construction for the projection matrix which is obtained by applying singular value decomposition to a sparsifying dictionary learned from the dataset. We analyze case studies of pedestrian and animal trajectory datasets including GPS trajectory data from 127 subjects. The experimental results suggest that the proposed adaptive compression algorithm, incorporating the deterministic construction of projection matrix, offers significantly better compression performance compared to the state-of-the-art alternatives.
[ { "version": "v1", "created": "Fri, 26 Jul 2013 04:59:26 GMT" } ]
2013-07-29T00:00:00
[ [ "Rana", "Rajib", "" ], [ "Yang", "Mingrui", "" ], [ "Wark", "Tim", "" ], [ "Chou", "Chun Tung", "" ], [ "Hu", "Wen", "" ] ]
TITLE: A Deterministic Construction of Projection matrix for Adaptive Trajectory Compression ABSTRACT: Compressive Sensing, which offers exact reconstruction of sparse signal from a small number of measurements, has tremendous potential for trajectory compression. In order to optimize the compression, trajectory compression algorithms need to adapt compression ratio subject to the compressibility of the trajectory. Intuitively, the trajectory of an object moving in starlight road is more compressible compared to the trajectory of a object moving in winding roads, therefore, higher compression is achievable in the former case compared to the later. We propose an in-situ compression technique underpinning the support vector regression theory, which accurately predicts the compressibility of a trajectory given the mean speed of the object and then apply compressive sensing to adapt the compression to the compressibility of the trajectory. The conventional encoding and decoding process of compressive sensing uses predefined dictionary and measurement (or projection) matrix pairs. However, the selection of an optimal pair is nontrivial and exhaustive, and random selection of a pair does not guarantee the best compression performance. In this paper, we propose a deterministic and data driven construction for the projection matrix which is obtained by applying singular value decomposition to a sparsifying dictionary learned from the dataset. We analyze case studies of pedestrian and animal trajectory datasets including GPS trajectory data from 127 subjects. The experimental results suggest that the proposed adaptive compression algorithm, incorporating the deterministic construction of projection matrix, offers significantly better compression performance compared to the state-of-the-art alternatives.
1307.7035
Nadine Rons
Nadine Rons, Lucy Amez
Impact vitality: an indicator based on citing publications in search of excellent scientists
12 pages
Research Evaluation, 18(3), 233-241, 2009
10.3152/095820209X470563
null
cs.DL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper contributes to the quest for an operational definition of 'research excellence' and proposes a translation of the excellence concept into a bibliometric indicator. Starting from a textual analysis of funding program calls aimed at individual researchers and from the challenges for an indicator at this level in particular, a new type of indicator is proposed. The Impact Vitality indicator [RONS & AMEZ, 2008] reflects the vitality of the impact of a researcher's publication output, based on the change in volume over time of the citing publications. The introduced metric is shown to posses attractive operational characteristics and meets a number of criteria which are desirable when comparing individual researchers. The validity of one of the possible indicator variants is tested using a small dataset of applicants for a senior full time Research Fellowship. Options for further research involve testing various indicator variants on larger samples linked to different kinds of evaluations.
[ { "version": "v1", "created": "Fri, 26 Jul 2013 13:48:36 GMT" } ]
2013-07-29T00:00:00
[ [ "Rons", "Nadine", "" ], [ "Amez", "Lucy", "" ] ]
TITLE: Impact vitality: an indicator based on citing publications in search of excellent scientists ABSTRACT: This paper contributes to the quest for an operational definition of 'research excellence' and proposes a translation of the excellence concept into a bibliometric indicator. Starting from a textual analysis of funding program calls aimed at individual researchers and from the challenges for an indicator at this level in particular, a new type of indicator is proposed. The Impact Vitality indicator [RONS & AMEZ, 2008] reflects the vitality of the impact of a researcher's publication output, based on the change in volume over time of the citing publications. The introduced metric is shown to posses attractive operational characteristics and meets a number of criteria which are desirable when comparing individual researchers. The validity of one of the possible indicator variants is tested using a small dataset of applicants for a senior full time Research Fellowship. Options for further research involve testing various indicator variants on larger samples linked to different kinds of evaluations.
1305.3082
Jialong Han
Jialong Han, Ji-Rong Wen
Mining Frequent Neighborhood Patterns in Large Labeled Graphs
9 pages
null
10.1145/2505515.2505530
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Over the years, frequent subgraphs have been an important sort of targeted patterns in the pattern mining literatures, where most works deal with databases holding a number of graph transactions, e.g., chemical structures of compounds. These methods rely heavily on the downward-closure property (DCP) of the support measure to ensure an efficient pruning of the candidate patterns. When switching to the emerging scenario of single-graph databases such as Google Knowledge Graph and Facebook social graph, the traditional support measure turns out to be trivial (either 0 or 1). However, to the best of our knowledge, all attempts to redefine a single-graph support resulted in measures that either lose DCP, or are no longer semantically intuitive. This paper targets mining patterns in the single-graph setting. We resolve the "DCP-intuitiveness" dilemma by shifting the mining target from frequent subgraphs to frequent neighborhoods. A neighborhood is a specific topological pattern where a vertex is embedded, and the pattern is frequent if it is shared by a large portion (above a given threshold) of vertices. We show that the new patterns not only maintain DCP, but also have equally significant semantics as subgraph patterns. Experiments on real-life datasets display the feasibility of our algorithms on relatively large graphs, as well as the capability of mining interesting knowledge that is not discovered in prior works.
[ { "version": "v1", "created": "Tue, 14 May 2013 09:46:17 GMT" } ]
2013-07-26T00:00:00
[ [ "Han", "Jialong", "" ], [ "Wen", "Ji-Rong", "" ] ]
TITLE: Mining Frequent Neighborhood Patterns in Large Labeled Graphs ABSTRACT: Over the years, frequent subgraphs have been an important sort of targeted patterns in the pattern mining literatures, where most works deal with databases holding a number of graph transactions, e.g., chemical structures of compounds. These methods rely heavily on the downward-closure property (DCP) of the support measure to ensure an efficient pruning of the candidate patterns. When switching to the emerging scenario of single-graph databases such as Google Knowledge Graph and Facebook social graph, the traditional support measure turns out to be trivial (either 0 or 1). However, to the best of our knowledge, all attempts to redefine a single-graph support resulted in measures that either lose DCP, or are no longer semantically intuitive. This paper targets mining patterns in the single-graph setting. We resolve the "DCP-intuitiveness" dilemma by shifting the mining target from frequent subgraphs to frequent neighborhoods. A neighborhood is a specific topological pattern where a vertex is embedded, and the pattern is frequent if it is shared by a large portion (above a given threshold) of vertices. We show that the new patterns not only maintain DCP, but also have equally significant semantics as subgraph patterns. Experiments on real-life datasets display the feasibility of our algorithms on relatively large graphs, as well as the capability of mining interesting knowledge that is not discovered in prior works.
1304.3285
Colorado Reed
Colorado Reed and Zoubin Ghahramani
Scaling the Indian Buffet Process via Submodular Maximization
13 pages, 8 figures
In ICML 2013: JMLR W&CP 28 (3): 1013-1021, 2013
null
null
stat.ML cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Inference for latent feature models is inherently difficult as the inference space grows exponentially with the size of the input data and number of latent features. In this work, we use Kurihara & Welling (2008)'s maximization-expectation framework to perform approximate MAP inference for linear-Gaussian latent feature models with an Indian Buffet Process (IBP) prior. This formulation yields a submodular function of the features that corresponds to a lower bound on the model evidence. By adding a constant to this function, we obtain a nonnegative submodular function that can be maximized via a greedy algorithm that obtains at least a one-third approximation to the optimal solution. Our inference method scales linearly with the size of the input data, and we show the efficacy of our method on the largest datasets currently analyzed using an IBP model.
[ { "version": "v1", "created": "Thu, 11 Apr 2013 13:20:51 GMT" }, { "version": "v2", "created": "Wed, 8 May 2013 20:15:08 GMT" }, { "version": "v3", "created": "Tue, 18 Jun 2013 14:24:58 GMT" }, { "version": "v4", "created": "Wed, 24 Jul 2013 19:20:15 GMT" } ]
2013-07-25T00:00:00
[ [ "Reed", "Colorado", "" ], [ "Ghahramani", "Zoubin", "" ] ]
TITLE: Scaling the Indian Buffet Process via Submodular Maximization ABSTRACT: Inference for latent feature models is inherently difficult as the inference space grows exponentially with the size of the input data and number of latent features. In this work, we use Kurihara & Welling (2008)'s maximization-expectation framework to perform approximate MAP inference for linear-Gaussian latent feature models with an Indian Buffet Process (IBP) prior. This formulation yields a submodular function of the features that corresponds to a lower bound on the model evidence. By adding a constant to this function, we obtain a nonnegative submodular function that can be maximized via a greedy algorithm that obtains at least a one-third approximation to the optimal solution. Our inference method scales linearly with the size of the input data, and we show the efficacy of our method on the largest datasets currently analyzed using an IBP model.
1307.6462
Travis Gagie
Hector Ferrada, Travis Gagie, Tommi Hirvola, Simon J. Puglisi
AliBI: An Alignment-Based Index for Genomic Datasets
null
null
null
null
cs.DS cs.CE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
With current hardware and software, a standard computer can now hold in RAM an index for approximate pattern matching on about half a dozen human genomes. Sequencing technologies have improved so quickly, however, that scientists will soon demand indexes for thousands of genomes. Whereas most researchers who have addressed this problem have proposed completely new kinds of indexes, we recently described a simple technique that scales standard indexes to work on more genomes. Our main idea was to filter the dataset with LZ77, build a standard index for the filtered file, and then create a hybrid of that standard index and an LZ77-based index. In this paper we describe how to our technique to use alignments instead of LZ77, in order to simplify and speed up both preprocessing and random access.
[ { "version": "v1", "created": "Wed, 24 Jul 2013 15:42:23 GMT" } ]
2013-07-25T00:00:00
[ [ "Ferrada", "Hector", "" ], [ "Gagie", "Travis", "" ], [ "Hirvola", "Tommi", "" ], [ "Puglisi", "Simon J.", "" ] ]
TITLE: AliBI: An Alignment-Based Index for Genomic Datasets ABSTRACT: With current hardware and software, a standard computer can now hold in RAM an index for approximate pattern matching on about half a dozen human genomes. Sequencing technologies have improved so quickly, however, that scientists will soon demand indexes for thousands of genomes. Whereas most researchers who have addressed this problem have proposed completely new kinds of indexes, we recently described a simple technique that scales standard indexes to work on more genomes. Our main idea was to filter the dataset with LZ77, build a standard index for the filtered file, and then create a hybrid of that standard index and an LZ77-based index. In this paper we describe how to our technique to use alignments instead of LZ77, in order to simplify and speed up both preprocessing and random access.
1307.6476
Sundeep Prabhakar Chepuri
Sundeep Prabhakar Chepuri and Geert Leus and Alle-Jan van der Veen
Rigid Body Localization Using Sensor Networks: Position and Orientation Estimation
30 pages, draft submitted to IEEE Trans. on Signal Processing, 10 figures
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we propose a novel framework called rigid body localization for joint position and orientation estimation of a rigid body. We consider a setup in which a few sensors are mounted on a rigid body. The absolute position of the sensors on the rigid body, or the absolute position of the rigid body itself is not known. However, we know how the sensors are mounted on the rigid body, i.e., the sensor topology is known. Using range-only measurements between the sensors and a few anchors (nodes with known absolute positions), and without using any inertial measurements (e.g., accelerometers), we estimate the position and orientation of the rigid body. For this purpose, the absolute position of the sensors is expressed as an affine function of the Stiefel manifold. In other words, we represent the orientation as a rotation matrix, and absolute position as a translation vector. We propose a least-squares (LS), simplified unitarily constrained LS (SUC-LS), and optimal unitarily constrained least-squares (OUC-LS) estimator, where the latter is based on Newton's method. As a benchmark, we derive a unitarily constrained Cram\'er-Rao bound (UC-CRB). The known topology of the sensors can sometimes be perturbed during fabrication. To take these perturbations into account, a simplified unitarily constrained total-least-squares (SUC-TLS), and an optimal unitarily constrained total-least-squares (OUC-TLS) estimator are also proposed.
[ { "version": "v1", "created": "Wed, 24 Jul 2013 16:09:07 GMT" } ]
2013-07-25T00:00:00
[ [ "Chepuri", "Sundeep Prabhakar", "" ], [ "Leus", "Geert", "" ], [ "van der Veen", "Alle-Jan", "" ] ]
TITLE: Rigid Body Localization Using Sensor Networks: Position and Orientation Estimation ABSTRACT: In this paper, we propose a novel framework called rigid body localization for joint position and orientation estimation of a rigid body. We consider a setup in which a few sensors are mounted on a rigid body. The absolute position of the sensors on the rigid body, or the absolute position of the rigid body itself is not known. However, we know how the sensors are mounted on the rigid body, i.e., the sensor topology is known. Using range-only measurements between the sensors and a few anchors (nodes with known absolute positions), and without using any inertial measurements (e.g., accelerometers), we estimate the position and orientation of the rigid body. For this purpose, the absolute position of the sensors is expressed as an affine function of the Stiefel manifold. In other words, we represent the orientation as a rotation matrix, and absolute position as a translation vector. We propose a least-squares (LS), simplified unitarily constrained LS (SUC-LS), and optimal unitarily constrained least-squares (OUC-LS) estimator, where the latter is based on Newton's method. As a benchmark, we derive a unitarily constrained Cram\'er-Rao bound (UC-CRB). The known topology of the sensors can sometimes be perturbed during fabrication. To take these perturbations into account, a simplified unitarily constrained total-least-squares (SUC-TLS), and an optimal unitarily constrained total-least-squares (OUC-TLS) estimator are also proposed.
1303.6088
Anna Zygmunt
Bogdan Gliwa, Anna Zygmunt, Aleksander Byrski
Graphical Analysis of Social Group Dynamics
Fourth International Conference on Computational Aspects of Social Networks, CASoN 2012, Sao Carlos, Brazil, November 21-23, 2012, pp. 41-46; IEEE Computer Society, 2012
null
10.1109/CASoN.2012.6412375
null
cs.SI physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Identifying communities in social networks becomes an increasingly important research problem. Several methods for identifying such groups have been developed, however, qualitative analysis (taking into account the scale of the problem) still poses serious problems. This paper describes a tool for facilitating such an analysis, allowing to visualize the dynamics and supporting localization of different events (such as creation or merging of groups). In the final part of the paper, the experimental results performed using the benchmark data (Enron emails) provide an insight into usefulness of the proposed tool.
[ { "version": "v1", "created": "Mon, 25 Mar 2013 11:15:21 GMT" }, { "version": "v2", "created": "Tue, 23 Jul 2013 10:40:56 GMT" } ]
2013-07-24T00:00:00
[ [ "Gliwa", "Bogdan", "" ], [ "Zygmunt", "Anna", "" ], [ "Byrski", "Aleksander", "" ] ]
TITLE: Graphical Analysis of Social Group Dynamics ABSTRACT: Identifying communities in social networks becomes an increasingly important research problem. Several methods for identifying such groups have been developed, however, qualitative analysis (taking into account the scale of the problem) still poses serious problems. This paper describes a tool for facilitating such an analysis, allowing to visualize the dynamics and supporting localization of different events (such as creation or merging of groups). In the final part of the paper, the experimental results performed using the benchmark data (Enron emails) provide an insight into usefulness of the proposed tool.
1307.5336
Pekka Malo
Pekka Malo, Ankur Sinha, Pyry Takala, Pekka Korhonen, Jyrki Wallenius
Good Debt or Bad Debt: Detecting Semantic Orientations in Economic Texts
To be published in Journal of the American Society for Information Science and Technology
null
null
null
cs.CL cs.IR q-fin.CP
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The use of robo-readers to analyze news texts is an emerging technology trend in computational finance. In recent research, a substantial effort has been invested to develop sophisticated financial polarity-lexicons that can be used to investigate how financial sentiments relate to future company performance. However, based on experience from other fields, where sentiment analysis is commonly applied, it is well-known that the overall semantic orientation of a sentence may differ from the prior polarity of individual words. The objective of this article is to investigate how semantic orientations can be better detected in financial and economic news by accommodating the overall phrase-structure information and domain-specific use of language. Our three main contributions are: (1) establishment of a human-annotated finance phrase-bank, which can be used as benchmark for training and evaluating alternative models; (2) presentation of a technique to enhance financial lexicons with attributes that help to identify expected direction of events that affect overall sentiment; (3) development of a linearized phrase-structure model for detecting contextual semantic orientations in financial and economic news texts. The relevance of the newly added lexicon features and the benefit of using the proposed learning-algorithm are demonstrated in a comparative study against previously used general sentiment models as well as the popular word frequency models used in recent financial studies. The proposed framework is parsimonious and avoids the explosion in feature-space caused by the use of conventional n-gram features.
[ { "version": "v1", "created": "Fri, 19 Jul 2013 20:49:06 GMT" }, { "version": "v2", "created": "Tue, 23 Jul 2013 19:56:38 GMT" } ]
2013-07-24T00:00:00
[ [ "Malo", "Pekka", "" ], [ "Sinha", "Ankur", "" ], [ "Takala", "Pyry", "" ], [ "Korhonen", "Pekka", "" ], [ "Wallenius", "Jyrki", "" ] ]
TITLE: Good Debt or Bad Debt: Detecting Semantic Orientations in Economic Texts ABSTRACT: The use of robo-readers to analyze news texts is an emerging technology trend in computational finance. In recent research, a substantial effort has been invested to develop sophisticated financial polarity-lexicons that can be used to investigate how financial sentiments relate to future company performance. However, based on experience from other fields, where sentiment analysis is commonly applied, it is well-known that the overall semantic orientation of a sentence may differ from the prior polarity of individual words. The objective of this article is to investigate how semantic orientations can be better detected in financial and economic news by accommodating the overall phrase-structure information and domain-specific use of language. Our three main contributions are: (1) establishment of a human-annotated finance phrase-bank, which can be used as benchmark for training and evaluating alternative models; (2) presentation of a technique to enhance financial lexicons with attributes that help to identify expected direction of events that affect overall sentiment; (3) development of a linearized phrase-structure model for detecting contextual semantic orientations in financial and economic news texts. The relevance of the newly added lexicon features and the benefit of using the proposed learning-algorithm are demonstrated in a comparative study against previously used general sentiment models as well as the popular word frequency models used in recent financial studies. The proposed framework is parsimonious and avoids the explosion in feature-space caused by the use of conventional n-gram features.
1307.5894
Md Mansurul Bhuiyan
Mansurul A Bhuiyan and Mohammad Al Hasan
MIRAGE: An Iterative MapReduce based FrequentSubgraph Mining Algorithm
null
null
null
null
cs.DB cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Frequent subgraph mining (FSM) is an important task for exploratory data analysis on graph data. Over the years, many algorithms have been proposed to solve this task. These algorithms assume that the data structure of the mining task is small enough to fit in the main memory of a computer. However, as the real-world graph data grows, both in size and quantity, such an assumption does not hold any longer. To overcome this, some graph database-centric methods have been proposed in recent years for solving FSM; however, a distributed solution using MapReduce paradigm has not been explored extensively. Since, MapReduce is becoming the de- facto paradigm for computation on massive data, an efficient FSM algorithm on this paradigm is of huge demand. In this work, we propose a frequent subgraph mining algorithm called MIRAGE which uses an iterative MapReduce based framework. MIRAGE is complete as it returns all the frequent subgraphs for a given user-defined support, and it is efficient as it applies all the optimizations that the latest FSM algorithms adopt. Our experiments with real life and large synthetic datasets validate the effectiveness of MIRAGE for mining frequent subgraphs from large graph datasets. The source code of MIRAGE is available from www.cs.iupui.edu/alhasan/software/
[ { "version": "v1", "created": "Mon, 22 Jul 2013 21:26:00 GMT" } ]
2013-07-24T00:00:00
[ [ "Bhuiyan", "Mansurul A", "" ], [ "Hasan", "Mohammad Al", "" ] ]
TITLE: MIRAGE: An Iterative MapReduce based FrequentSubgraph Mining Algorithm ABSTRACT: Frequent subgraph mining (FSM) is an important task for exploratory data analysis on graph data. Over the years, many algorithms have been proposed to solve this task. These algorithms assume that the data structure of the mining task is small enough to fit in the main memory of a computer. However, as the real-world graph data grows, both in size and quantity, such an assumption does not hold any longer. To overcome this, some graph database-centric methods have been proposed in recent years for solving FSM; however, a distributed solution using MapReduce paradigm has not been explored extensively. Since, MapReduce is becoming the de- facto paradigm for computation on massive data, an efficient FSM algorithm on this paradigm is of huge demand. In this work, we propose a frequent subgraph mining algorithm called MIRAGE which uses an iterative MapReduce based framework. MIRAGE is complete as it returns all the frequent subgraphs for a given user-defined support, and it is efficient as it applies all the optimizations that the latest FSM algorithms adopt. Our experiments with real life and large synthetic datasets validate the effectiveness of MIRAGE for mining frequent subgraphs from large graph datasets. The source code of MIRAGE is available from www.cs.iupui.edu/alhasan/software/
1307.6023
Najla Al-Saati
Dr. Najla Akram AL-Saati and Marwa Abd-AlKareem
The Use of Cuckoo Search in Estimating the Parameters of Software Reliability Growth Models
null
(IJCSIS) International Journal of Computer Science and Information Security, Vol. 11, No. 6, June 2013
null
null
cs.AI cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This work aims to investigate the reliability of software products as an important attribute of computer programs; it helps to decide the degree of trustworthiness a program has in accomplishing its specific functions. This is done using the Software Reliability Growth Models (SRGMs) through the estimation of their parameters. The parameters are estimated in this work based on the available failure data and with the search techniques of Swarm Intelligence, namely, the Cuckoo Search (CS) due to its efficiency, effectiveness and robustness. A number of SRGMs is studied, and the results are compared to Particle Swarm Optimization (PSO), Ant Colony Optimization (ACO) and extended ACO. Results show that CS outperformed both PSO and ACO in finding better parameters tested using identical datasets. It was sometimes outperformed by the extended ACO. Also in this work, the percentages of training data to testing data are investigated to show their impact on the results.
[ { "version": "v1", "created": "Tue, 23 Jul 2013 11:22:31 GMT" } ]
2013-07-24T00:00:00
[ [ "AL-Saati", "Dr. Najla Akram", "" ], [ "Abd-AlKareem", "Marwa", "" ] ]
TITLE: The Use of Cuckoo Search in Estimating the Parameters of Software Reliability Growth Models ABSTRACT: This work aims to investigate the reliability of software products as an important attribute of computer programs; it helps to decide the degree of trustworthiness a program has in accomplishing its specific functions. This is done using the Software Reliability Growth Models (SRGMs) through the estimation of their parameters. The parameters are estimated in this work based on the available failure data and with the search techniques of Swarm Intelligence, namely, the Cuckoo Search (CS) due to its efficiency, effectiveness and robustness. A number of SRGMs is studied, and the results are compared to Particle Swarm Optimization (PSO), Ant Colony Optimization (ACO) and extended ACO. Results show that CS outperformed both PSO and ACO in finding better parameters tested using identical datasets. It was sometimes outperformed by the extended ACO. Also in this work, the percentages of training data to testing data are investigated to show their impact on the results.
1210.5093
Yousun Ko
Yousun Ko, Minyoung Jung, Yo-Sub Han and Bernd Burgstaller
A Speculative Parallel DFA Membership Test for Multicore, SIMD and Cloud Computing Environments
null
null
10.1007/s10766-013-0258-5
null
cs.DC cs.FL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present techniques to parallelize membership tests for Deterministic Finite Automata (DFAs). Our method searches arbitrary regular expressions by matching multiple bytes in parallel using speculation. We partition the input string into chunks, match chunks in parallel, and combine the matching results. Our parallel matching algorithm exploits structural DFA properties to minimize the speculative overhead. Unlike previous approaches, our speculation is failure-free, i.e., (1) sequential semantics are maintained, and (2) speed-downs are avoided altogether. On architectures with a SIMD gather-operation for indexed memory loads, our matching operation is fully vectorized. The proposed load-balancing scheme uses an off-line profiling step to determine the matching capacity of each par- ticipating processor. Based on matching capacities, DFA matches are load-balanced on inhomogeneous parallel architectures such as cloud computing environments. We evaluated our speculative DFA membership test for a representative set of benchmarks from the Perl-compatible Regular Expression (PCRE) library and the PROSITE protein database. Evaluation was conducted on a 4 CPU (40 cores) shared-memory node of the Intel Manycore Testing Lab (Intel MTL), on the Intel AVX2 SDE simulator for 8-way fully vectorized SIMD execution, and on a 20-node (288 cores) cluster on the Amazon EC2 computing cloud.
[ { "version": "v1", "created": "Thu, 18 Oct 2012 11:17:23 GMT" }, { "version": "v2", "created": "Mon, 22 Jul 2013 15:32:29 GMT" } ]
2013-07-23T00:00:00
[ [ "Ko", "Yousun", "" ], [ "Jung", "Minyoung", "" ], [ "Han", "Yo-Sub", "" ], [ "Burgstaller", "Bernd", "" ] ]
TITLE: A Speculative Parallel DFA Membership Test for Multicore, SIMD and Cloud Computing Environments ABSTRACT: We present techniques to parallelize membership tests for Deterministic Finite Automata (DFAs). Our method searches arbitrary regular expressions by matching multiple bytes in parallel using speculation. We partition the input string into chunks, match chunks in parallel, and combine the matching results. Our parallel matching algorithm exploits structural DFA properties to minimize the speculative overhead. Unlike previous approaches, our speculation is failure-free, i.e., (1) sequential semantics are maintained, and (2) speed-downs are avoided altogether. On architectures with a SIMD gather-operation for indexed memory loads, our matching operation is fully vectorized. The proposed load-balancing scheme uses an off-line profiling step to determine the matching capacity of each par- ticipating processor. Based on matching capacities, DFA matches are load-balanced on inhomogeneous parallel architectures such as cloud computing environments. We evaluated our speculative DFA membership test for a representative set of benchmarks from the Perl-compatible Regular Expression (PCRE) library and the PROSITE protein database. Evaluation was conducted on a 4 CPU (40 cores) shared-memory node of the Intel Manycore Testing Lab (Intel MTL), on the Intel AVX2 SDE simulator for 8-way fully vectorized SIMD execution, and on a 20-node (288 cores) cluster on the Amazon EC2 computing cloud.
1307.5322
Emanuel Santos ES
Emanuel Santos, Daniel Faria, C\'atia Pesquita and Francisco Couto
Ontology alignment repair through modularization and confidence-based heuristics
null
null
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Ontology Matching aims to find a set of semantic correspondences, called an alignment, between related ontologies. In recent years, there has been a growing interest in efficient and effective matching methods for large ontologies. However, most of the alignments produced for large ontologies are logically incoherent. It was only recently that the use of repair techniques to improve the quality of ontology alignments has been explored. In this paper we present a novel technique for detecting incoherent concepts based on ontology modularization, and a new repair algorithm that minimizes the incoherence of the resulting alignment and the number of matches removed from the input alignment. An implementation was done as part of a lightweight version of AgreementMaker system, a successful ontology matching platform, and evaluated using a set of four benchmark biomedical ontology matching tasks. Our results show that our implementation is efficient and produces better alignments with respect to their coherence and f-measure than the state of the art repairing tools. They also show that our implementation is a better alternative for producing coherent silver standard alignments.
[ { "version": "v1", "created": "Fri, 19 Jul 2013 16:15:41 GMT" } ]
2013-07-23T00:00:00
[ [ "Santos", "Emanuel", "" ], [ "Faria", "Daniel", "" ], [ "Pesquita", "Cátia", "" ], [ "Couto", "Francisco", "" ] ]
TITLE: Ontology alignment repair through modularization and confidence-based heuristics ABSTRACT: Ontology Matching aims to find a set of semantic correspondences, called an alignment, between related ontologies. In recent years, there has been a growing interest in efficient and effective matching methods for large ontologies. However, most of the alignments produced for large ontologies are logically incoherent. It was only recently that the use of repair techniques to improve the quality of ontology alignments has been explored. In this paper we present a novel technique for detecting incoherent concepts based on ontology modularization, and a new repair algorithm that minimizes the incoherence of the resulting alignment and the number of matches removed from the input alignment. An implementation was done as part of a lightweight version of AgreementMaker system, a successful ontology matching platform, and evaluated using a set of four benchmark biomedical ontology matching tasks. Our results show that our implementation is efficient and produces better alignments with respect to their coherence and f-measure than the state of the art repairing tools. They also show that our implementation is a better alternative for producing coherent silver standard alignments.
1307.5591
Subra Mukherjee
Subra Mukherjee, Karen Das
A Novel Equation based Classifier for Detecting Human in Images
published with international journal of Computer Applications (IJCA)
International Journal of Computer Applications 72(6):9-16, June 2013
10.5120/12496-7272
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Shape based classification is one of the most challenging tasks in the field of computer vision. Shapes play a vital role in object recognition. The basic shapes in an image can occur in varying scale, position and orientation. And specially when detecting human, the task becomes more challenging owing to the largely varying size, shape, posture and clothing of human. So, in our work we detect human, based on the head-shoulder shape as it is the most unvarying part of human body. Here, firstly a new and a novel equation named as the Omega Equation that describes the shape of human head-shoulder is developed and based on this equation, a classifier is designed particularly for detecting human presence in a scene. The classifier detects human by analyzing some of the discriminative features of the values of the parameters obtained from the Omega equation. The proposed method has been tested on a variety of shape dataset taking into consideration the complexities of human head-shoulder shape. In all the experiments the proposed method demonstrated satisfactory results.
[ { "version": "v1", "created": "Mon, 22 Jul 2013 05:13:03 GMT" } ]
2013-07-23T00:00:00
[ [ "Mukherjee", "Subra", "" ], [ "Das", "Karen", "" ] ]
TITLE: A Novel Equation based Classifier for Detecting Human in Images ABSTRACT: Shape based classification is one of the most challenging tasks in the field of computer vision. Shapes play a vital role in object recognition. The basic shapes in an image can occur in varying scale, position and orientation. And specially when detecting human, the task becomes more challenging owing to the largely varying size, shape, posture and clothing of human. So, in our work we detect human, based on the head-shoulder shape as it is the most unvarying part of human body. Here, firstly a new and a novel equation named as the Omega Equation that describes the shape of human head-shoulder is developed and based on this equation, a classifier is designed particularly for detecting human presence in a scene. The classifier detects human by analyzing some of the discriminative features of the values of the parameters obtained from the Omega equation. The proposed method has been tested on a variety of shape dataset taking into consideration the complexities of human head-shoulder shape. In all the experiments the proposed method demonstrated satisfactory results.
1307.5599
Naresh Kumar Mallenahalli Prof. Dr.
M. Naresh Kumar
Performance comparison of State-of-the-art Missing Value Imputation Algorithms on Some Bench mark Datasets
17 pages, 6 figures
null
null
null
cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Decision making from data involves identifying a set of attributes that contribute to effective decision making through computational intelligence. The presence of missing values greatly influences the selection of right set of attributes and this renders degradation in classification accuracies of the classifiers. As missing values are quite common in data collection phase during field experiments or clinical trails appropriate handling would improve the classifier performance. In this paper we present a review of recently developed missing value imputation algorithms and compare their performance on some bench mark datasets.
[ { "version": "v1", "created": "Mon, 22 Jul 2013 06:50:21 GMT" } ]
2013-07-23T00:00:00
[ [ "Kumar", "M. Naresh", "" ] ]
TITLE: Performance comparison of State-of-the-art Missing Value Imputation Algorithms on Some Bench mark Datasets ABSTRACT: Decision making from data involves identifying a set of attributes that contribute to effective decision making through computational intelligence. The presence of missing values greatly influences the selection of right set of attributes and this renders degradation in classification accuracies of the classifiers. As missing values are quite common in data collection phase during field experiments or clinical trails appropriate handling would improve the classifier performance. In this paper we present a review of recently developed missing value imputation algorithms and compare their performance on some bench mark datasets.
1307.5702
Lucas Paletta
Samuel F. Dodge and Lina J. Karam
Is Bottom-Up Attention Useful for Scene Recognition?
null
null
null
ISACS/2013/04
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The human visual system employs a selective attention mechanism to understand the visual world in an eficient manner. In this paper, we show how computational models of this mechanism can be exploited for the computer vision application of scene recognition. First, we consider saliency weighting and saliency pruning, and provide a comparison of the performance of different attention models in these approaches in terms of classification accuracy. Pruning can achieve a high degree of computational savings without significantly sacrificing classification accuracy. In saliency weighting, however, we found that classification performance does not improve. In addition, we present a new method to incorporate salient and non-salient regions for improved classification accuracy. We treat the salient and non-salient regions separately and combine them using Multiple Kernel Learning. We evaluate our approach using the UIUC sports dataset and find that with a small training size, our method improves upon the classification accuracy of the baseline bag of features approach.
[ { "version": "v1", "created": "Mon, 22 Jul 2013 13:38:16 GMT" } ]
2013-07-23T00:00:00
[ [ "Dodge", "Samuel F.", "" ], [ "Karam", "Lina J.", "" ] ]
TITLE: Is Bottom-Up Attention Useful for Scene Recognition? ABSTRACT: The human visual system employs a selective attention mechanism to understand the visual world in an eficient manner. In this paper, we show how computational models of this mechanism can be exploited for the computer vision application of scene recognition. First, we consider saliency weighting and saliency pruning, and provide a comparison of the performance of different attention models in these approaches in terms of classification accuracy. Pruning can achieve a high degree of computational savings without significantly sacrificing classification accuracy. In saliency weighting, however, we found that classification performance does not improve. In addition, we present a new method to incorporate salient and non-salient regions for improved classification accuracy. We treat the salient and non-salient regions separately and combine them using Multiple Kernel Learning. We evaluate our approach using the UIUC sports dataset and find that with a small training size, our method improves upon the classification accuracy of the baseline bag of features approach.
1307.5730
Baogang Hu
Xiaowan Zhang and Bao-Gang Hu
A New Strategy of Cost-Free Learning in the Class Imbalance Problem
Classification, class imbalance, cost-free learning, cost-sensitive learning, abstaining, mutual information, ROC
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this work, we define cost-free learning (CFL) formally in comparison with cost-sensitive learning (CSL). The main difference between them is that a CFL approach seeks optimal classification results without requiring any cost information, even in the class imbalance problem. In fact, several CFL approaches exist in the related studies, such as sampling and some criteria-based pproaches. However, to our best knowledge, none of the existing CFL and CSL approaches are able to process the abstaining classifications properly when no information is given about errors and rejects. Based on information theory, we propose a novel CFL which seeks to maximize normalized mutual information of the targets and the decision outputs of classifiers. Using the strategy, we can deal with binary/multi-class classifications with/without abstaining. Significant features are observed from the new strategy. While the degree of class imbalance is changing, the proposed strategy is able to balance the errors and rejects accordingly and automatically. Another advantage of the strategy is its ability of deriving optimal rejection thresholds for abstaining classifications and the "equivalent" costs in binary classifications. The connection between rejection thresholds and ROC curve is explored. Empirical investigation is made on several benchmark data sets in comparison with other existing approaches. The classification results demonstrate a promising perspective of the strategy in machine learning.
[ { "version": "v1", "created": "Mon, 22 Jul 2013 14:36:03 GMT" } ]
2013-07-23T00:00:00
[ [ "Zhang", "Xiaowan", "" ], [ "Hu", "Bao-Gang", "" ] ]
TITLE: A New Strategy of Cost-Free Learning in the Class Imbalance Problem ABSTRACT: In this work, we define cost-free learning (CFL) formally in comparison with cost-sensitive learning (CSL). The main difference between them is that a CFL approach seeks optimal classification results without requiring any cost information, even in the class imbalance problem. In fact, several CFL approaches exist in the related studies, such as sampling and some criteria-based pproaches. However, to our best knowledge, none of the existing CFL and CSL approaches are able to process the abstaining classifications properly when no information is given about errors and rejects. Based on information theory, we propose a novel CFL which seeks to maximize normalized mutual information of the targets and the decision outputs of classifiers. Using the strategy, we can deal with binary/multi-class classifications with/without abstaining. Significant features are observed from the new strategy. While the degree of class imbalance is changing, the proposed strategy is able to balance the errors and rejects accordingly and automatically. Another advantage of the strategy is its ability of deriving optimal rejection thresholds for abstaining classifications and the "equivalent" costs in binary classifications. The connection between rejection thresholds and ROC curve is explored. Empirical investigation is made on several benchmark data sets in comparison with other existing approaches. The classification results demonstrate a promising perspective of the strategy in machine learning.
1303.7093
Aravind Kota Gopalakrishna
Aravind Kota Gopalakrishna, Tanir Ozcelebi, Antonio Liotta, Johan J. Lukkien
Relevance As a Metric for Evaluating Machine Learning Algorithms
To Appear at International Conference on Machine Learning and Data Mining (MLDM 2013), 14 pages, 6 figures
null
10.1007/978-3-642-39712-7_15
null
stat.ML cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In machine learning, the choice of a learning algorithm that is suitable for the application domain is critical. The performance metric used to compare different algorithms must also reflect the concerns of users in the application domain under consideration. In this work, we propose a novel probability-based performance metric called Relevance Score for evaluating supervised learning algorithms. We evaluate the proposed metric through empirical analysis on a dataset gathered from an intelligent lighting pilot installation. In comparison to the commonly used Classification Accuracy metric, the Relevance Score proves to be more appropriate for a certain class of applications.
[ { "version": "v1", "created": "Thu, 28 Mar 2013 11:01:53 GMT" }, { "version": "v2", "created": "Fri, 5 Apr 2013 19:12:06 GMT" }, { "version": "v3", "created": "Mon, 8 Apr 2013 14:26:49 GMT" } ]
2013-07-19T00:00:00
[ [ "Gopalakrishna", "Aravind Kota", "" ], [ "Ozcelebi", "Tanir", "" ], [ "Liotta", "Antonio", "" ], [ "Lukkien", "Johan J.", "" ] ]
TITLE: Relevance As a Metric for Evaluating Machine Learning Algorithms ABSTRACT: In machine learning, the choice of a learning algorithm that is suitable for the application domain is critical. The performance metric used to compare different algorithms must also reflect the concerns of users in the application domain under consideration. In this work, we propose a novel probability-based performance metric called Relevance Score for evaluating supervised learning algorithms. We evaluate the proposed metric through empirical analysis on a dataset gathered from an intelligent lighting pilot installation. In comparison to the commonly used Classification Accuracy metric, the Relevance Score proves to be more appropriate for a certain class of applications.
1307.4567
Michael Lange
Michael Lange and Gerard Gorman and Michele Weiland and Lawrence Mitchell and Xiaohu Guo and James Southern
Benchmarking mixed-mode PETSc performance on high-performance architectures
arXiv admin note: substantial text overlap with arXiv:1303.5275
null
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The trend towards highly parallel multi-processing is ubiquitous in all modern computer architectures, ranging from handheld devices to large-scale HPC systems; yet many applications are struggling to fully utilise the multiple levels of parallelism exposed in modern high-performance platforms. In order to realise the full potential of recent hardware advances, a mixed-mode between shared-memory programming techniques and inter-node message passing can be adopted which provides high-levels of parallelism with minimal overheads. For scientific applications this entails that not only the simulation code itself, but the whole software stack needs to evolve. In this paper, we evaluate the mixed-mode performance of PETSc, a widely used scientific library for the scalable solution of partial differential equations. We describe the addition of OpenMP threaded functionality to the library, focusing on sparse matrix-vector multiplication. We highlight key challenges in achieving good parallel performance, such as explicit communication overlap using task-based parallelism, and show how to further improve performance by explicitly load balancing threads within MPI processes. Using a set of matrices extracted from Fluidity, a CFD application code which uses the library as its linear solver engine, we then benchmark the parallel performance of mixed-mode PETSc across multiple nodes on several modern HPC architectures. We evaluate the parallel scalability on Uniform Memory Access (UMA) systems, such as the Fujitsu PRIMEHPC FX10 and IBM BlueGene/Q, as well as a Non-Uniform Memory Access (NUMA) Cray XE6 platform. A detailed comparison is performed which highlights the characteristics of each particular architecture, before demonstrating efficient strong scalability of sparse matrix-vector multiplication with significant speedups over the pure-MPI mode.
[ { "version": "v1", "created": "Wed, 17 Jul 2013 10:36:35 GMT" } ]
2013-07-19T00:00:00
[ [ "Lange", "Michael", "" ], [ "Gorman", "Gerard", "" ], [ "Weiland", "Michele", "" ], [ "Mitchell", "Lawrence", "" ], [ "Guo", "Xiaohu", "" ], [ "Southern", "James", "" ] ]
TITLE: Benchmarking mixed-mode PETSc performance on high-performance architectures ABSTRACT: The trend towards highly parallel multi-processing is ubiquitous in all modern computer architectures, ranging from handheld devices to large-scale HPC systems; yet many applications are struggling to fully utilise the multiple levels of parallelism exposed in modern high-performance platforms. In order to realise the full potential of recent hardware advances, a mixed-mode between shared-memory programming techniques and inter-node message passing can be adopted which provides high-levels of parallelism with minimal overheads. For scientific applications this entails that not only the simulation code itself, but the whole software stack needs to evolve. In this paper, we evaluate the mixed-mode performance of PETSc, a widely used scientific library for the scalable solution of partial differential equations. We describe the addition of OpenMP threaded functionality to the library, focusing on sparse matrix-vector multiplication. We highlight key challenges in achieving good parallel performance, such as explicit communication overlap using task-based parallelism, and show how to further improve performance by explicitly load balancing threads within MPI processes. Using a set of matrices extracted from Fluidity, a CFD application code which uses the library as its linear solver engine, we then benchmark the parallel performance of mixed-mode PETSc across multiple nodes on several modern HPC architectures. We evaluate the parallel scalability on Uniform Memory Access (UMA) systems, such as the Fujitsu PRIMEHPC FX10 and IBM BlueGene/Q, as well as a Non-Uniform Memory Access (NUMA) Cray XE6 platform. A detailed comparison is performed which highlights the characteristics of each particular architecture, before demonstrating efficient strong scalability of sparse matrix-vector multiplication with significant speedups over the pure-MPI mode.
1307.4531
Jakub Mikians
Jakub Mikians, L\'aszl\'o Gyarmati, Vijay Erramilli, Nikolaos Laoutaris
Crowd-assisted Search for Price Discrimination in E-Commerce: First results
null
null
null
null
cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
After years of speculation, price discrimination in e-commerce driven by the personal information that users leave (involuntarily) online, has started attracting the attention of privacy researchers, regulators, and the press. In our previous work we demonstrated instances of products whose prices varied online depending on the location and the characteristics of perspective online buyers. In an effort to scale up our study we have turned to crowd-sourcing. Using a browser extension we have collected the prices obtained by an initial set of 340 test users as they surf the web for products of their interest. This initial dataset has permitted us to identify a set of online stores where price variation is more pronounced. We have focused on this subset, and performed a systematic crawl of their products and logged the prices obtained from different vantage points and browser configurations. By analyzing this dataset we see that there exist several retailers that return prices for the same product that vary by 10%-30% whereas there also exist isolated cases that may vary up to a multiplicative factor, e.g., x2. To the best of our efforts we could not attribute the observed price gaps to currency, shipping, or taxation differences.
[ { "version": "v1", "created": "Wed, 17 Jul 2013 08:24:40 GMT" } ]
2013-07-18T00:00:00
[ [ "Mikians", "Jakub", "" ], [ "Gyarmati", "László", "" ], [ "Erramilli", "Vijay", "" ], [ "Laoutaris", "Nikolaos", "" ] ]
TITLE: Crowd-assisted Search for Price Discrimination in E-Commerce: First results ABSTRACT: After years of speculation, price discrimination in e-commerce driven by the personal information that users leave (involuntarily) online, has started attracting the attention of privacy researchers, regulators, and the press. In our previous work we demonstrated instances of products whose prices varied online depending on the location and the characteristics of perspective online buyers. In an effort to scale up our study we have turned to crowd-sourcing. Using a browser extension we have collected the prices obtained by an initial set of 340 test users as they surf the web for products of their interest. This initial dataset has permitted us to identify a set of online stores where price variation is more pronounced. We have focused on this subset, and performed a systematic crawl of their products and logged the prices obtained from different vantage points and browser configurations. By analyzing this dataset we see that there exist several retailers that return prices for the same product that vary by 10%-30% whereas there also exist isolated cases that may vary up to a multiplicative factor, e.g., x2. To the best of our efforts we could not attribute the observed price gaps to currency, shipping, or taxation differences.
1307.4641
Ricardo Rocha
Danny Munera and Daniel Diaz and Salvador Abreu
Experimenting with X10 for Parallel Constraint-Based Local Search
Proceedings of the 13th International Colloquium on Implementation of Constraint LOgic Programming Systems (CICLOPS 2013), Istanbul, Turkey, August 25, 2013
null
null
null
cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this study, we have investigated the adequacy of the PGAS parallel language X10 to implement a Constraint-Based Local Search solver. We decided to code in this language to benefit from the ease of use and architectural independence from parallel resources which it offers. We present the implementation strategy, in search of different sources of parallelism in the context of an implementation of the Adaptive Search algorithm. We extensively discuss the algorithm and its implementation. The performance evaluation on a representative set of benchmarks shows close to linear speed-ups, in all the problems treated.
[ { "version": "v1", "created": "Wed, 17 Jul 2013 14:13:50 GMT" } ]
2013-07-18T00:00:00
[ [ "Munera", "Danny", "" ], [ "Diaz", "Daniel", "" ], [ "Abreu", "Salvador", "" ] ]
TITLE: Experimenting with X10 for Parallel Constraint-Based Local Search ABSTRACT: In this study, we have investigated the adequacy of the PGAS parallel language X10 to implement a Constraint-Based Local Search solver. We decided to code in this language to benefit from the ease of use and architectural independence from parallel resources which it offers. We present the implementation strategy, in search of different sources of parallelism in the context of an implementation of the Adaptive Search algorithm. We extensively discuss the algorithm and its implementation. The performance evaluation on a representative set of benchmarks shows close to linear speed-ups, in all the problems treated.
1307.4653
Massimiliano Pontil
Bernardino Romera-Paredes and Massimiliano Pontil
A New Convex Relaxation for Tensor Completion
null
null
null
null
cs.LG math.OC stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study the problem of learning a tensor from a set of linear measurements. A prominent methodology for this problem is based on a generalization of trace norm regularization, which has been used extensively for learning low rank matrices, to the tensor setting. In this paper, we highlight some limitations of this approach and propose an alternative convex relaxation on the Euclidean ball. We then describe a technique to solve the associated regularization problem, which builds upon the alternating direction method of multipliers. Experiments on one synthetic dataset and two real datasets indicate that the proposed method improves significantly over tensor trace norm regularization in terms of estimation error, while remaining computationally tractable.
[ { "version": "v1", "created": "Wed, 17 Jul 2013 14:38:47 GMT" } ]
2013-07-18T00:00:00
[ [ "Romera-Paredes", "Bernardino", "" ], [ "Pontil", "Massimiliano", "" ] ]
TITLE: A New Convex Relaxation for Tensor Completion ABSTRACT: We study the problem of learning a tensor from a set of linear measurements. A prominent methodology for this problem is based on a generalization of trace norm regularization, which has been used extensively for learning low rank matrices, to the tensor setting. In this paper, we highlight some limitations of this approach and propose an alternative convex relaxation on the Euclidean ball. We then describe a technique to solve the associated regularization problem, which builds upon the alternating direction method of multipliers. Experiments on one synthetic dataset and two real datasets indicate that the proposed method improves significantly over tensor trace norm regularization in terms of estimation error, while remaining computationally tractable.
1210.2376
Manlio De Domenico
Manlio De Domenico, Antonio Lima, Mirco Musolesi
Interdependence and Predictability of Human Mobility and Social Interactions
21 pages, 9 figures
null
null
null
physics.soc-ph cs.SI nlin.CD
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Previous studies have shown that human movement is predictable to a certain extent at different geographic scales. Existing prediction techniques exploit only the past history of the person taken into consideration as input of the predictors. In this paper, we show that by means of multivariate nonlinear time series prediction techniques it is possible to increase the forecasting accuracy by considering movements of friends, people, or more in general entities, with correlated mobility patterns (i.e., characterised by high mutual information) as inputs. Finally, we evaluate the proposed techniques on the Nokia Mobile Data Challenge and Cabspotting datasets.
[ { "version": "v1", "created": "Mon, 8 Oct 2012 18:44:59 GMT" }, { "version": "v2", "created": "Tue, 16 Jul 2013 17:24:05 GMT" } ]
2013-07-17T00:00:00
[ [ "De Domenico", "Manlio", "" ], [ "Lima", "Antonio", "" ], [ "Musolesi", "Mirco", "" ] ]
TITLE: Interdependence and Predictability of Human Mobility and Social Interactions ABSTRACT: Previous studies have shown that human movement is predictable to a certain extent at different geographic scales. Existing prediction techniques exploit only the past history of the person taken into consideration as input of the predictors. In this paper, we show that by means of multivariate nonlinear time series prediction techniques it is possible to increase the forecasting accuracy by considering movements of friends, people, or more in general entities, with correlated mobility patterns (i.e., characterised by high mutual information) as inputs. Finally, we evaluate the proposed techniques on the Nokia Mobile Data Challenge and Cabspotting datasets.
1307.4264
Rong Zheng
Huy Nguyen and Rong Zheng
A Data-driven Study of Influences in Twitter Communities
11 pages
null
null
null
cs.SI physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents a quantitative study of Twitter, one of the most popular micro-blogging services, from the perspective of user influence. We crawl several datasets from the most active communities on Twitter and obtain 20.5 million user profiles, along with 420.2 million directed relations and 105 million tweets among the users. User influence scores are obtained from influence measurement services, Klout and PeerIndex. Our analysis reveals interesting findings, including non-power-law influence distribution, strong reciprocity among users in a community, the existence of homophily and hierarchical relationships in social influences. Most importantly, we observe that whether a user retweets a message is strongly influenced by the first of his followees who posted that message. To capture such an effect, we propose the first influencer (FI) information diffusion model and show through extensive evaluation that compared to the widely adopted independent cascade model, the FI model is more stable and more accurate in predicting influence spreads in Twitter communities.
[ { "version": "v1", "created": "Tue, 16 Jul 2013 13:07:24 GMT" } ]
2013-07-17T00:00:00
[ [ "Nguyen", "Huy", "" ], [ "Zheng", "Rong", "" ] ]
TITLE: A Data-driven Study of Influences in Twitter Communities ABSTRACT: This paper presents a quantitative study of Twitter, one of the most popular micro-blogging services, from the perspective of user influence. We crawl several datasets from the most active communities on Twitter and obtain 20.5 million user profiles, along with 420.2 million directed relations and 105 million tweets among the users. User influence scores are obtained from influence measurement services, Klout and PeerIndex. Our analysis reveals interesting findings, including non-power-law influence distribution, strong reciprocity among users in a community, the existence of homophily and hierarchical relationships in social influences. Most importantly, we observe that whether a user retweets a message is strongly influenced by the first of his followees who posted that message. To capture such an effect, we propose the first influencer (FI) information diffusion model and show through extensive evaluation that compared to the widely adopted independent cascade model, the FI model is more stable and more accurate in predicting influence spreads in Twitter communities.
1301.4083
\c{C}a\u{g}lar G\"ul\c{c}ehre
\c{C}a\u{g}lar G\"ul\c{c}ehre and Yoshua Bengio
Knowledge Matters: Importance of Prior Information for Optimization
37 Pages, 5 figures, 5 tables JMLR Special Topics on Representation Learning Submission
null
null
null
cs.LG cs.CV cs.NE stat.ML
http://creativecommons.org/licenses/by-nc-sa/3.0/
We explore the effect of introducing prior information into the intermediate level of neural networks for a learning task on which all the state-of-the-art machine learning algorithms tested failed to learn. We motivate our work from the hypothesis that humans learn such intermediate concepts from other individuals via a form of supervision or guidance using a curriculum. The experiments we have conducted provide positive evidence in favor of this hypothesis. In our experiments, a two-tiered MLP architecture is trained on a dataset with 64x64 binary inputs images, each image with three sprites. The final task is to decide whether all the sprites are the same or one of them is different. Sprites are pentomino tetris shapes and they are placed in an image with different locations using scaling and rotation transformations. The first part of the two-tiered MLP is pre-trained with intermediate-level targets being the presence of sprites at each location, while the second part takes the output of the first part as input and predicts the final task's target binary event. The two-tiered MLP architecture, with a few tens of thousand examples, was able to learn the task perfectly, whereas all other algorithms (include unsupervised pre-training, but also traditional algorithms like SVMs, decision trees and boosting) all perform no better than chance. We hypothesize that the optimization difficulty involved when the intermediate pre-training is not performed is due to the {\em composition} of two highly non-linear tasks. Our findings are also consistent with hypotheses on cultural learning inspired by the observations of optimization problems with deep learning, presumably because of effective local minima.
[ { "version": "v1", "created": "Thu, 17 Jan 2013 13:06:52 GMT" }, { "version": "v2", "created": "Sun, 20 Jan 2013 05:43:57 GMT" }, { "version": "v3", "created": "Wed, 30 Jan 2013 17:11:19 GMT" }, { "version": "v4", "created": "Wed, 13 Mar 2013 20:13:08 GMT" }, { "version": "v5", "created": "Fri, 15 Mar 2013 05:41:47 GMT" }, { "version": "v6", "created": "Sat, 13 Jul 2013 16:38:36 GMT" } ]
2013-07-16T00:00:00
[ [ "Gülçehre", "Çağlar", "" ], [ "Bengio", "Yoshua", "" ] ]
TITLE: Knowledge Matters: Importance of Prior Information for Optimization ABSTRACT: We explore the effect of introducing prior information into the intermediate level of neural networks for a learning task on which all the state-of-the-art machine learning algorithms tested failed to learn. We motivate our work from the hypothesis that humans learn such intermediate concepts from other individuals via a form of supervision or guidance using a curriculum. The experiments we have conducted provide positive evidence in favor of this hypothesis. In our experiments, a two-tiered MLP architecture is trained on a dataset with 64x64 binary inputs images, each image with three sprites. The final task is to decide whether all the sprites are the same or one of them is different. Sprites are pentomino tetris shapes and they are placed in an image with different locations using scaling and rotation transformations. The first part of the two-tiered MLP is pre-trained with intermediate-level targets being the presence of sprites at each location, while the second part takes the output of the first part as input and predicts the final task's target binary event. The two-tiered MLP architecture, with a few tens of thousand examples, was able to learn the task perfectly, whereas all other algorithms (include unsupervised pre-training, but also traditional algorithms like SVMs, decision trees and boosting) all perform no better than chance. We hypothesize that the optimization difficulty involved when the intermediate pre-training is not performed is due to the {\em composition} of two highly non-linear tasks. Our findings are also consistent with hypotheses on cultural learning inspired by the observations of optimization problems with deep learning, presumably because of effective local minima.
1307.3626
Sadegh Aliakbary
Sadegh Aliakbary, Sadegh Motallebi, Jafar Habibi, Ali Movaghar
Learning an Integrated Distance Metric for Comparing Structure of Complex Networks
null
null
null
null
cs.SI cs.AI physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Graph comparison plays a major role in many network applications. We often need a similarity metric for comparing networks according to their structural properties. Various network features - such as degree distribution and clustering coefficient - provide measurements for comparing networks from different points of view, but a global and integrated distance metric is still missing. In this paper, we employ distance metric learning algorithms in order to construct an integrated distance metric for comparing structural properties of complex networks. According to natural witnesses of network similarities (such as network categories) the distance metric is learned by the means of a dataset of some labeled real networks. For evaluating our proposed method which is called NetDistance, we applied it as the distance metric in K-nearest-neighbors classification. Empirical results show that NetDistance outperforms previous methods, at least 20 percent, with respect to precision.
[ { "version": "v1", "created": "Sat, 13 Jul 2013 07:53:19 GMT" } ]
2013-07-16T00:00:00
[ [ "Aliakbary", "Sadegh", "" ], [ "Motallebi", "Sadegh", "" ], [ "Habibi", "Jafar", "" ], [ "Movaghar", "Ali", "" ] ]
TITLE: Learning an Integrated Distance Metric for Comparing Structure of Complex Networks ABSTRACT: Graph comparison plays a major role in many network applications. We often need a similarity metric for comparing networks according to their structural properties. Various network features - such as degree distribution and clustering coefficient - provide measurements for comparing networks from different points of view, but a global and integrated distance metric is still missing. In this paper, we employ distance metric learning algorithms in order to construct an integrated distance metric for comparing structural properties of complex networks. According to natural witnesses of network similarities (such as network categories) the distance metric is learned by the means of a dataset of some labeled real networks. For evaluating our proposed method which is called NetDistance, we applied it as the distance metric in K-nearest-neighbors classification. Empirical results show that NetDistance outperforms previous methods, at least 20 percent, with respect to precision.
1307.3673
Omar Alonso
Alexandros Ntoulas, Omar Alonso, Vasilis Kandylas
A Data Management Approach for Dataset Selection Using Human Computation
null
null
null
null
cs.LG cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
As the number of applications that use machine learning algorithms increases, the need for labeled data useful for training such algorithms intensifies. Getting labels typically involves employing humans to do the annotation, which directly translates to training and working costs. Crowdsourcing platforms have made labeling cheaper and faster, but they still involve significant costs, especially for the cases where the potential set of candidate data to be labeled is large. In this paper we describe a methodology and a prototype system aiming at addressing this challenge for Web-scale problems in an industrial setting. We discuss ideas on how to efficiently select the data to use for training of machine learning algorithms in an attempt to reduce cost. We show results achieving good performance with reduced cost by carefully selecting which instances to label. Our proposed algorithm is presented as part of a framework for managing and generating training datasets, which includes, among other components, a human computation element.
[ { "version": "v1", "created": "Sat, 13 Jul 2013 19:29:33 GMT" } ]
2013-07-16T00:00:00
[ [ "Ntoulas", "Alexandros", "" ], [ "Alonso", "Omar", "" ], [ "Kandylas", "Vasilis", "" ] ]
TITLE: A Data Management Approach for Dataset Selection Using Human Computation ABSTRACT: As the number of applications that use machine learning algorithms increases, the need for labeled data useful for training such algorithms intensifies. Getting labels typically involves employing humans to do the annotation, which directly translates to training and working costs. Crowdsourcing platforms have made labeling cheaper and faster, but they still involve significant costs, especially for the cases where the potential set of candidate data to be labeled is large. In this paper we describe a methodology and a prototype system aiming at addressing this challenge for Web-scale problems in an industrial setting. We discuss ideas on how to efficiently select the data to use for training of machine learning algorithms in an attempt to reduce cost. We show results achieving good performance with reduced cost by carefully selecting which instances to label. Our proposed algorithm is presented as part of a framework for managing and generating training datasets, which includes, among other components, a human computation element.
1307.3755
Nikesh Dattani
Lila Kari (1), Kathleen A. Hill (2), Abu Sadat Sayem (1), Nathaniel Bryans (3), Katelyn Davis (2), Nikesh S. Dattani (4), ((1) Department of Computer Science, University of Western Ontario, Canada, (2) Department of Biology, University of Western Ontario, Canada, (3) Microsoft Corporation, (4) Department of Chemistry, Oxford University, UK)
Map of Life: Measuring and Visualizing Species' Relatedness with "Molecular Distance Maps"
13 pages, 8 figures. Funded by: NSERC/CRSNG (Natural Science & Engineering Research Council of Canada / Conseil de recherches en sciences naturelles et en g\'enie du Canada), and the Oxford University Press. Acknowledgements: Ronghai Tu, Tao Tao, Steffen Kopecki, Andre Lachance, Jeremy McNeil, Greg Thorn, Oxford University Mathematical Institute
null
null
null
q-bio.GN cs.CV q-bio.PE q-bio.QM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a novel combination of methods that (i) portrays quantitative characteristics of a DNA sequence as an image, (ii) computes distances between these images, and (iii) uses these distances to output a map wherein each sequence is a point in a common Euclidean space. In the resulting "Molecular Distance Map" each point signifies a DNA sequence, and the geometric distance between any two points reflects the degree of relatedness between the corresponding sequences and species. Molecular Distance Maps present compelling visual representations of relationships between species and could be used for taxonomic clarifications, for species identification, and for studies of evolutionary history. One of the advantages of this method is its general applicability since, as sequence alignment is not required, the DNA sequences chosen for comparison can be completely different regions in different genomes. In fact, this method can be used to compare any two DNA sequences. For example, in our dataset of 3,176 mitochondrial DNA sequences, it correctly finds the mtDNA sequences most closely related to that of the anatomically modern human (the Neanderthal, the Denisovan, and the chimp), and it finds that the sequence most different from it belongs to a cucumber. Furthermore, our method can be used to compare real sequences to artificial, computer-generated, DNA sequences. For example, it is used to determine that the distances between a Homo sapiens sapiens mtDNA and artificial sequences of the same length and same trinucleotide frequencies can be larger than the distance between the same human mtDNA and the mtDNA of a fruit-fly. We demonstrate this method's promising potential for taxonomical clarifications by applying it to a diverse variety of cases that have been historically controversial, such as the genus Polypterus, the family Tarsiidae, and the vast (super)kingdom Protista.
[ { "version": "v1", "created": "Sun, 14 Jul 2013 17:16:57 GMT" } ]
2013-07-16T00:00:00
[ [ "Kari", "Lila", "" ], [ "Hill", "Kathleen A.", "" ], [ "Sayem", "Abu Sadat", "" ], [ "Bryans", "Nathaniel", "" ], [ "Davis", "Katelyn", "" ], [ "Dattani", "Nikesh S.", "" ] ]
TITLE: Map of Life: Measuring and Visualizing Species' Relatedness with "Molecular Distance Maps" ABSTRACT: We propose a novel combination of methods that (i) portrays quantitative characteristics of a DNA sequence as an image, (ii) computes distances between these images, and (iii) uses these distances to output a map wherein each sequence is a point in a common Euclidean space. In the resulting "Molecular Distance Map" each point signifies a DNA sequence, and the geometric distance between any two points reflects the degree of relatedness between the corresponding sequences and species. Molecular Distance Maps present compelling visual representations of relationships between species and could be used for taxonomic clarifications, for species identification, and for studies of evolutionary history. One of the advantages of this method is its general applicability since, as sequence alignment is not required, the DNA sequences chosen for comparison can be completely different regions in different genomes. In fact, this method can be used to compare any two DNA sequences. For example, in our dataset of 3,176 mitochondrial DNA sequences, it correctly finds the mtDNA sequences most closely related to that of the anatomically modern human (the Neanderthal, the Denisovan, and the chimp), and it finds that the sequence most different from it belongs to a cucumber. Furthermore, our method can be used to compare real sequences to artificial, computer-generated, DNA sequences. For example, it is used to determine that the distances between a Homo sapiens sapiens mtDNA and artificial sequences of the same length and same trinucleotide frequencies can be larger than the distance between the same human mtDNA and the mtDNA of a fruit-fly. We demonstrate this method's promising potential for taxonomical clarifications by applying it to a diverse variety of cases that have been historically controversial, such as the genus Polypterus, the family Tarsiidae, and the vast (super)kingdom Protista.
1307.3846
S\'ebastien Brati\`eres
Sebastien Bratieres, Novi Quadrianto, Zoubin Ghahramani
Bayesian Structured Prediction Using Gaussian Processes
8 pages with figures
null
null
null
stat.ML cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce a conceptually novel structured prediction model, GPstruct, which is kernelized, non-parametric and Bayesian, by design. We motivate the model with respect to existing approaches, among others, conditional random fields (CRFs), maximum margin Markov networks (M3N), and structured support vector machines (SVMstruct), which embody only a subset of its properties. We present an inference procedure based on Markov Chain Monte Carlo. The framework can be instantiated for a wide range of structured objects such as linear chains, trees, grids, and other general graphs. As a proof of concept, the model is benchmarked on several natural language processing tasks and a video gesture segmentation task involving a linear chain structure. We show prediction accuracies for GPstruct which are comparable to or exceeding those of CRFs and SVMstruct.
[ { "version": "v1", "created": "Mon, 15 Jul 2013 07:57:56 GMT" } ]
2013-07-16T00:00:00
[ [ "Bratieres", "Sebastien", "" ], [ "Quadrianto", "Novi", "" ], [ "Ghahramani", "Zoubin", "" ] ]
TITLE: Bayesian Structured Prediction Using Gaussian Processes ABSTRACT: We introduce a conceptually novel structured prediction model, GPstruct, which is kernelized, non-parametric and Bayesian, by design. We motivate the model with respect to existing approaches, among others, conditional random fields (CRFs), maximum margin Markov networks (M3N), and structured support vector machines (SVMstruct), which embody only a subset of its properties. We present an inference procedure based on Markov Chain Monte Carlo. The framework can be instantiated for a wide range of structured objects such as linear chains, trees, grids, and other general graphs. As a proof of concept, the model is benchmarked on several natural language processing tasks and a video gesture segmentation task involving a linear chain structure. We show prediction accuracies for GPstruct which are comparable to or exceeding those of CRFs and SVMstruct.
1307.3872
Andrea Farruggia
Andrea Farruggia, Paolo Ferragina, Antonio Frangioni, Rossano Venturini
Bicriteria data compression
null
null
null
null
cs.IT cs.DS math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The advent of massive datasets (and the consequent design of high-performing distributed storage systems) have reignited the interest of the scientific and engineering community towards the design of lossless data compressors which achieve effective compression ratio and very efficient decompression speed. Lempel-Ziv's LZ77 algorithm is the de facto choice in this scenario because of its decompression speed and its flexibility in trading decompression speed versus compressed-space efficiency. Each of the existing implementations offers a trade-off between space occupancy and decompression speed, so software engineers have to content themselves by picking the one which comes closer to the requirements of the application in their hands. Starting from these premises, and for the first time in the literature, we address in this paper the problem of trading optimally, and in a principled way, the consumption of these two resources by introducing the Bicriteria LZ77-Parsing problem, which formalizes in a principled way what data-compressors have traditionally approached by means of heuristics. The goal is to determine an LZ77 parsing which minimizes the space occupancy in bits of the compressed file, provided that the decompression time is bounded by a fixed amount (or vice-versa). This way, the software engineer can set its space (or time) requirements and then derive the LZ77 parsing which optimizes the decompression speed (or the space occupancy, respectively). We solve this problem efficiently in O(n log^2 n) time and optimal linear space within a small, additive approximation, by proving and deploying some specific structural properties of the weighted graph derived from the possible LZ77-parsings of the input file. The preliminary set of experiments shows that our novel proposal dominates all the highly engineered competitors, hence offering a win-win situation in theory&practice.
[ { "version": "v1", "created": "Mon, 15 Jul 2013 10:14:56 GMT" } ]
2013-07-16T00:00:00
[ [ "Farruggia", "Andrea", "" ], [ "Ferragina", "Paolo", "" ], [ "Frangioni", "Antonio", "" ], [ "Venturini", "Rossano", "" ] ]
TITLE: Bicriteria data compression ABSTRACT: The advent of massive datasets (and the consequent design of high-performing distributed storage systems) have reignited the interest of the scientific and engineering community towards the design of lossless data compressors which achieve effective compression ratio and very efficient decompression speed. Lempel-Ziv's LZ77 algorithm is the de facto choice in this scenario because of its decompression speed and its flexibility in trading decompression speed versus compressed-space efficiency. Each of the existing implementations offers a trade-off between space occupancy and decompression speed, so software engineers have to content themselves by picking the one which comes closer to the requirements of the application in their hands. Starting from these premises, and for the first time in the literature, we address in this paper the problem of trading optimally, and in a principled way, the consumption of these two resources by introducing the Bicriteria LZ77-Parsing problem, which formalizes in a principled way what data-compressors have traditionally approached by means of heuristics. The goal is to determine an LZ77 parsing which minimizes the space occupancy in bits of the compressed file, provided that the decompression time is bounded by a fixed amount (or vice-versa). This way, the software engineer can set its space (or time) requirements and then derive the LZ77 parsing which optimizes the decompression speed (or the space occupancy, respectively). We solve this problem efficiently in O(n log^2 n) time and optimal linear space within a small, additive approximation, by proving and deploying some specific structural properties of the weighted graph derived from the possible LZ77-parsings of the input file. The preliminary set of experiments shows that our novel proposal dominates all the highly engineered competitors, hence offering a win-win situation in theory&practice.
1110.4198
Alekh Agarwal
Alekh Agarwal, Olivier Chapelle, Miroslav Dudik, John Langford
A Reliable Effective Terascale Linear Learning System
null
null
null
null
cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a system and a set of techniques for learning linear predictors with convex losses on terascale datasets, with trillions of features, {The number of features here refers to the number of non-zero entries in the data matrix.} billions of training examples and millions of parameters in an hour using a cluster of 1000 machines. Individually none of the component techniques are new, but the careful synthesis required to obtain an efficient implementation is. The result is, up to our knowledge, the most scalable and efficient linear learning system reported in the literature (as of 2011 when our experiments were conducted). We describe and thoroughly evaluate the components of the system, showing the importance of the various design choices.
[ { "version": "v1", "created": "Wed, 19 Oct 2011 07:34:19 GMT" }, { "version": "v2", "created": "Sun, 12 Feb 2012 18:31:21 GMT" }, { "version": "v3", "created": "Fri, 12 Jul 2013 03:28:17 GMT" } ]
2013-07-15T00:00:00
[ [ "Agarwal", "Alekh", "" ], [ "Chapelle", "Olivier", "" ], [ "Dudik", "Miroslav", "" ], [ "Langford", "John", "" ] ]
TITLE: A Reliable Effective Terascale Linear Learning System ABSTRACT: We present a system and a set of techniques for learning linear predictors with convex losses on terascale datasets, with trillions of features, {The number of features here refers to the number of non-zero entries in the data matrix.} billions of training examples and millions of parameters in an hour using a cluster of 1000 machines. Individually none of the component techniques are new, but the careful synthesis required to obtain an efficient implementation is. The result is, up to our knowledge, the most scalable and efficient linear learning system reported in the literature (as of 2011 when our experiments were conducted). We describe and thoroughly evaluate the components of the system, showing the importance of the various design choices.
1307.3284
Shuai Yuan
Shuai Yuan, Jun Wang
Sequential Selection of Correlated Ads by POMDPs
null
Proceedings of the ACM CIKM '12. 515-524
10.1145/2396761.2396828
null
cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Online advertising has become a key source of revenue for both web search engines and online publishers. For them, the ability of allocating right ads to right webpages is critical because any mismatched ads would not only harm web users' satisfactions but also lower the ad income. In this paper, we study how online publishers could optimally select ads to maximize their ad incomes over time. The conventional offline, content-based matching between webpages and ads is a fine start but cannot solve the problem completely because good matching does not necessarily lead to good payoff. Moreover, with the limited display impressions, we need to balance the need of selecting ads to learn true ad payoffs (exploration) with that of allocating ads to generate high immediate payoffs based on the current belief (exploitation). In this paper, we address the problem by employing Partially observable Markov decision processes (POMDPs) and discuss how to utilize the correlation of ads to improve the efficiency of the exploration and increase ad incomes in a long run. Our mathematical derivation shows that the belief states of correlated ads can be naturally updated using a formula similar to collaborative filtering. To test our model, a real world ad dataset from a major search engine is collected and categorized. Experimenting over the data, we provide an analyse of the effect of the underlying parameters, and demonstrate that our algorithms significantly outperform other strong baselines.
[ { "version": "v1", "created": "Thu, 11 Jul 2013 22:20:32 GMT" } ]
2013-07-15T00:00:00
[ [ "Yuan", "Shuai", "" ], [ "Wang", "Jun", "" ] ]
TITLE: Sequential Selection of Correlated Ads by POMDPs ABSTRACT: Online advertising has become a key source of revenue for both web search engines and online publishers. For them, the ability of allocating right ads to right webpages is critical because any mismatched ads would not only harm web users' satisfactions but also lower the ad income. In this paper, we study how online publishers could optimally select ads to maximize their ad incomes over time. The conventional offline, content-based matching between webpages and ads is a fine start but cannot solve the problem completely because good matching does not necessarily lead to good payoff. Moreover, with the limited display impressions, we need to balance the need of selecting ads to learn true ad payoffs (exploration) with that of allocating ads to generate high immediate payoffs based on the current belief (exploitation). In this paper, we address the problem by employing Partially observable Markov decision processes (POMDPs) and discuss how to utilize the correlation of ads to improve the efficiency of the exploration and increase ad incomes in a long run. Our mathematical derivation shows that the belief states of correlated ads can be naturally updated using a formula similar to collaborative filtering. To test our model, a real world ad dataset from a major search engine is collected and categorized. Experimenting over the data, we provide an analyse of the effect of the underlying parameters, and demonstrate that our algorithms significantly outperform other strong baselines.
1307.2669
Haoyang (Hubert) Duan
Hubert Haoyang Duan, Vladimir Pestov, and Varun Singla
Text Categorization via Similarity Search: An Efficient and Effective Novel Algorithm
12 pages, 5 tables, accepted for the 6th International Conference on Similarity Search and Applications (SISAP 2013)
null
null
null
cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a supervised learning algorithm for text categorization which has brought the team of authors the 2nd place in the text categorization division of the 2012 Cybersecurity Data Mining Competition (CDMC'2012) and a 3rd prize overall. The algorithm is quite different from existing approaches in that it is based on similarity search in the metric space of measure distributions on the dictionary. At the preprocessing stage, given a labeled learning sample of texts, we associate to every class label (document category) a point in the space of question. Unlike it is usual in clustering, this point is not a centroid of the category but rather an outlier, a uniform measure distribution on a selection of domain-specific words. At the execution stage, an unlabeled text is assigned a text category as defined by the closest labeled neighbour to the point representing the frequency distribution of the words in the text. The algorithm is both effective and efficient, as further confirmed by experiments on the Reuters 21578 dataset.
[ { "version": "v1", "created": "Wed, 10 Jul 2013 04:41:19 GMT" } ]
2013-07-11T00:00:00
[ [ "Duan", "Hubert Haoyang", "" ], [ "Pestov", "Vladimir", "" ], [ "Singla", "Varun", "" ] ]
TITLE: Text Categorization via Similarity Search: An Efficient and Effective Novel Algorithm ABSTRACT: We present a supervised learning algorithm for text categorization which has brought the team of authors the 2nd place in the text categorization division of the 2012 Cybersecurity Data Mining Competition (CDMC'2012) and a 3rd prize overall. The algorithm is quite different from existing approaches in that it is based on similarity search in the metric space of measure distributions on the dictionary. At the preprocessing stage, given a labeled learning sample of texts, we associate to every class label (document category) a point in the space of question. Unlike it is usual in clustering, this point is not a centroid of the category but rather an outlier, a uniform measure distribution on a selection of domain-specific words. At the execution stage, an unlabeled text is assigned a text category as defined by the closest labeled neighbour to the point representing the frequency distribution of the words in the text. The algorithm is both effective and efficient, as further confirmed by experiments on the Reuters 21578 dataset.
1205.4683
Michael Szell
Michael Szell and Stefan Thurner
How women organize social networks different from men
8 pages, 3 figures
Scientific Reports 3, 1214 (2013)
10.1038/srep01214
null
physics.soc-ph cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Superpositions of social networks, such as communication, friendship, or trade networks, are called multiplex networks, forming the structural backbone of human societies. Novel datasets now allow quantification and exploration of multiplex networks. Here we study gender-specific differences of a multiplex network from a complete behavioral dataset of an online-game society of about 300,000 players. On the individual level females perform better economically and are less risk-taking than males. Males reciprocate friendship requests from females faster than vice versa and hesitate to reciprocate hostile actions of females. On the network level females have more communication partners, who are less connected than partners of males. We find a strong homophily effect for females and higher clustering coefficients of females in trade and attack networks. Cooperative links between males are under-represented, reflecting competition for resources among males. These results confirm quantitatively that females and males manage their social networks in substantially different ways.
[ { "version": "v1", "created": "Mon, 21 May 2012 18:44:27 GMT" }, { "version": "v2", "created": "Mon, 8 Jul 2013 20:17:56 GMT" } ]
2013-07-10T00:00:00
[ [ "Szell", "Michael", "" ], [ "Thurner", "Stefan", "" ] ]
TITLE: How women organize social networks different from men ABSTRACT: Superpositions of social networks, such as communication, friendship, or trade networks, are called multiplex networks, forming the structural backbone of human societies. Novel datasets now allow quantification and exploration of multiplex networks. Here we study gender-specific differences of a multiplex network from a complete behavioral dataset of an online-game society of about 300,000 players. On the individual level females perform better economically and are less risk-taking than males. Males reciprocate friendship requests from females faster than vice versa and hesitate to reciprocate hostile actions of females. On the network level females have more communication partners, who are less connected than partners of males. We find a strong homophily effect for females and higher clustering coefficients of females in trade and attack networks. Cooperative links between males are under-represented, reflecting competition for resources among males. These results confirm quantitatively that females and males manage their social networks in substantially different ways.
1307.0220
Richard Formato
Richard A. Formato
Dipole-Loaded Monopole Optimized Using VSO, v.3
arXiv admin note: substantial text overlap with arXiv:1107.1437, arXiv:1103.5629, arXiv:1108.0901, arXiv:1003.1039. Version 2, 02 Jul 2013: minor typos corrected; hill climber material added; source code listing updated. Version 3, 06 Jul 2013: replaces VSO diagram/pseudocode to clarify algorithm's elitist nature; other minor changes
null
null
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A dipole-loaded monopole antenna is optimized for uniform hemispherical coverage using VSO, a new global search design and optimization algorithm. The antenna's performance is compared to genetic algorithm and hill-climber optimized loaded monopoles, and VSO is tested against two suites of benchmark functions and several other algorithms.
[ { "version": "v1", "created": "Sun, 30 Jun 2013 16:54:24 GMT" }, { "version": "v2", "created": "Tue, 2 Jul 2013 13:16:51 GMT" }, { "version": "v3", "created": "Sat, 6 Jul 2013 13:55:47 GMT" } ]
2013-07-09T00:00:00
[ [ "Formato", "Richard A.", "" ] ]
TITLE: Dipole-Loaded Monopole Optimized Using VSO, v.3 ABSTRACT: A dipole-loaded monopole antenna is optimized for uniform hemispherical coverage using VSO, a new global search design and optimization algorithm. The antenna's performance is compared to genetic algorithm and hill-climber optimized loaded monopoles, and VSO is tested against two suites of benchmark functions and several other algorithms.
1307.1370
Latanya Sweeney
Latanya Sweeney
Matching Known Patients to Health Records in Washington State Data
13 pages
null
null
null
cs.CY cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The State of Washington sells patient-level health data for $50. This publicly available dataset has virtually all hospitalizations occurring in the State in a given year, including patient demographics, diagnoses, procedures, attending physician, hospital, a summary of charges, and how the bill was paid. It does not contain patient names or addresses (only ZIPs). Newspaper stories printed in the State for the same year that contain the word "hospitalized" often include a patient's name and residential information and explain why the person was hospitalized, such as vehicle accident or assault. News information uniquely and exactly matched medical records in the State database for 35 of the 81 cases (or 43 percent) found in 2011, thereby putting names to patient records. A news reporter verified matches by contacting patients. Employers, financial organizations and others know the same kind of information as reported in news stories making it just as easy for them to identify the medical records of employees, debtors, and others.
[ { "version": "v1", "created": "Thu, 4 Jul 2013 15:21:34 GMT" }, { "version": "v2", "created": "Fri, 5 Jul 2013 23:04:48 GMT" } ]
2013-07-09T00:00:00
[ [ "Sweeney", "Latanya", "" ] ]
TITLE: Matching Known Patients to Health Records in Washington State Data ABSTRACT: The State of Washington sells patient-level health data for $50. This publicly available dataset has virtually all hospitalizations occurring in the State in a given year, including patient demographics, diagnoses, procedures, attending physician, hospital, a summary of charges, and how the bill was paid. It does not contain patient names or addresses (only ZIPs). Newspaper stories printed in the State for the same year that contain the word "hospitalized" often include a patient's name and residential information and explain why the person was hospitalized, such as vehicle accident or assault. News information uniquely and exactly matched medical records in the State database for 35 of the 81 cases (or 43 percent) found in 2011, thereby putting names to patient records. A news reporter verified matches by contacting patients. Employers, financial organizations and others know the same kind of information as reported in news stories making it just as easy for them to identify the medical records of employees, debtors, and others.
1307.1769
Lior Rokach
Lior Rokach, Alon Schclar, Ehud Itach
Ensemble Methods for Multi-label Classification
null
null
null
null
stat.ML cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Ensemble methods have been shown to be an effective tool for solving multi-label classification tasks. In the RAndom k-labELsets (RAKEL) algorithm, each member of the ensemble is associated with a small randomly-selected subset of k labels. Then, a single label classifier is trained according to each combination of elements in the subset. In this paper we adopt a similar approach, however, instead of randomly choosing subsets, we select the minimum required subsets of k labels that cover all labels and meet additional constraints such as coverage of inter-label correlations. Construction of the cover is achieved by formulating the subset selection as a minimum set covering problem (SCP) and solving it by using approximation algorithms. Every cover needs only to be prepared once by offline algorithms. Once prepared, a cover may be applied to the classification of any given multi-label dataset whose properties conform with those of the cover. The contribution of this paper is two-fold. First, we introduce SCP as a general framework for constructing label covers while allowing the user to incorporate cover construction constraints. We demonstrate the effectiveness of this framework by proposing two construction constraints whose enforcement produces covers that improve the prediction performance of random selection. Second, we provide theoretical bounds that quantify the probabilities of random selection to produce covers that meet the proposed construction criteria. The experimental results indicate that the proposed methods improve multi-label classification accuracy and stability compared with the RAKEL algorithm and to other state-of-the-art algorithms.
[ { "version": "v1", "created": "Sat, 6 Jul 2013 10:17:44 GMT" } ]
2013-07-09T00:00:00
[ [ "Rokach", "Lior", "" ], [ "Schclar", "Alon", "" ], [ "Itach", "Ehud", "" ] ]
TITLE: Ensemble Methods for Multi-label Classification ABSTRACT: Ensemble methods have been shown to be an effective tool for solving multi-label classification tasks. In the RAndom k-labELsets (RAKEL) algorithm, each member of the ensemble is associated with a small randomly-selected subset of k labels. Then, a single label classifier is trained according to each combination of elements in the subset. In this paper we adopt a similar approach, however, instead of randomly choosing subsets, we select the minimum required subsets of k labels that cover all labels and meet additional constraints such as coverage of inter-label correlations. Construction of the cover is achieved by formulating the subset selection as a minimum set covering problem (SCP) and solving it by using approximation algorithms. Every cover needs only to be prepared once by offline algorithms. Once prepared, a cover may be applied to the classification of any given multi-label dataset whose properties conform with those of the cover. The contribution of this paper is two-fold. First, we introduce SCP as a general framework for constructing label covers while allowing the user to incorporate cover construction constraints. We demonstrate the effectiveness of this framework by proposing two construction constraints whose enforcement produces covers that improve the prediction performance of random selection. Second, we provide theoretical bounds that quantify the probabilities of random selection to produce covers that meet the proposed construction criteria. The experimental results indicate that the proposed methods improve multi-label classification accuracy and stability compared with the RAKEL algorithm and to other state-of-the-art algorithms.
1307.1900
Arindam Chaudhuri AC
Arindam Chaudhuri, Kajal De
Fuzzy Integer Linear Programming Mathematical Models for Examination Timetable Problem
International Journal of Innovative Computing, Information and Control (Special Issue), Volume 7, Number 5, 2011
null
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
ETP is NP Hard combinatorial optimization problem. It has received tremendous research attention during the past few years given its wide use in universities. In this Paper, we develop three mathematical models for NSOU, Kolkata, India using FILP technique. To deal with impreciseness and vagueness we model various allocation variables through fuzzy numbers. The solution to the problem is obtained using Fuzzy number ranking method. Each feasible solution has fuzzy number obtained by Fuzzy objective function. The different FILP technique performance are demonstrated by experimental data generated through extensive simulation from NSOU, Kolkata, India in terms of its execution times. The proposed FILP models are compared with commonly used heuristic viz. ILP approach on experimental data which gives an idea about quality of heuristic. The techniques are also compared with different Artificial Intelligence based heuristics for ETP with respect to best and mean cost as well as execution time measures on Carter benchmark datasets to illustrate its effectiveness. FILP takes an appreciable amount of time to generate satisfactory solution in comparison to other heuristics. The formulation thus serves as good benchmark for other heuristics. The experimental study presented here focuses on producing a methodology that generalizes well over spectrum of techniques that generates significant results for one or more datasets. The performance of FILP model is finally compared to the best results cited in literature for Carter benchmarks to assess its potential. The problem can be further reduced by formulating with lesser number of allocation variables it without affecting optimality of solution obtained. FLIP model for ETP can also be adapted to solve other ETP as well as combinatorial optimization problems.
[ { "version": "v1", "created": "Sun, 7 Jul 2013 19:09:03 GMT" } ]
2013-07-09T00:00:00
[ [ "Chaudhuri", "Arindam", "" ], [ "De", "Kajal", "" ] ]
TITLE: Fuzzy Integer Linear Programming Mathematical Models for Examination Timetable Problem ABSTRACT: ETP is NP Hard combinatorial optimization problem. It has received tremendous research attention during the past few years given its wide use in universities. In this Paper, we develop three mathematical models for NSOU, Kolkata, India using FILP technique. To deal with impreciseness and vagueness we model various allocation variables through fuzzy numbers. The solution to the problem is obtained using Fuzzy number ranking method. Each feasible solution has fuzzy number obtained by Fuzzy objective function. The different FILP technique performance are demonstrated by experimental data generated through extensive simulation from NSOU, Kolkata, India in terms of its execution times. The proposed FILP models are compared with commonly used heuristic viz. ILP approach on experimental data which gives an idea about quality of heuristic. The techniques are also compared with different Artificial Intelligence based heuristics for ETP with respect to best and mean cost as well as execution time measures on Carter benchmark datasets to illustrate its effectiveness. FILP takes an appreciable amount of time to generate satisfactory solution in comparison to other heuristics. The formulation thus serves as good benchmark for other heuristics. The experimental study presented here focuses on producing a methodology that generalizes well over spectrum of techniques that generates significant results for one or more datasets. The performance of FILP model is finally compared to the best results cited in literature for Carter benchmarks to assess its potential. The problem can be further reduced by formulating with lesser number of allocation variables it without affecting optimality of solution obtained. FLIP model for ETP can also be adapted to solve other ETP as well as combinatorial optimization problems.
1307.2084
Lucas Maystre
Mohamed Kafsi, Ehsan Kazemi, Lucas Maystre, Lyudmila Yartseva, Matthias Grossglauser, Patrick Thiran
Mitigating Epidemics through Mobile Micro-measures
Presented at NetMob 2013, Boston
null
null
null
cs.SI cs.CY physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Epidemics of infectious diseases are among the largest threats to the quality of life and the economic and social well-being of developing countries. The arsenal of measures against such epidemics is well-established, but costly and insufficient to mitigate their impact. In this paper, we argue that mobile technology adds a powerful weapon to this arsenal, because (a) mobile devices endow us with the unprecedented ability to measure and model the detailed behavioral patterns of the affected population, and (b) they enable the delivery of personalized behavioral recommendations to individuals in real time. We combine these two ideas and propose several strategies to generate such recommendations from mobility patterns. The goal of each strategy is a large reduction in infections, with a small impact on the normal course of daily life. We evaluate these strategies over the Orange D4D dataset and show the benefit of mobile micro-measures, even if only a fraction of the population participates. These preliminary results demonstrate the potential of mobile technology to complement other measures like vaccination and quarantines against disease epidemics.
[ { "version": "v1", "created": "Mon, 8 Jul 2013 13:15:12 GMT" } ]
2013-07-09T00:00:00
[ [ "Kafsi", "Mohamed", "" ], [ "Kazemi", "Ehsan", "" ], [ "Maystre", "Lucas", "" ], [ "Yartseva", "Lyudmila", "" ], [ "Grossglauser", "Matthias", "" ], [ "Thiran", "Patrick", "" ] ]
TITLE: Mitigating Epidemics through Mobile Micro-measures ABSTRACT: Epidemics of infectious diseases are among the largest threats to the quality of life and the economic and social well-being of developing countries. The arsenal of measures against such epidemics is well-established, but costly and insufficient to mitigate their impact. In this paper, we argue that mobile technology adds a powerful weapon to this arsenal, because (a) mobile devices endow us with the unprecedented ability to measure and model the detailed behavioral patterns of the affected population, and (b) they enable the delivery of personalized behavioral recommendations to individuals in real time. We combine these two ideas and propose several strategies to generate such recommendations from mobility patterns. The goal of each strategy is a large reduction in infections, with a small impact on the normal course of daily life. We evaluate these strategies over the Orange D4D dataset and show the benefit of mobile micro-measures, even if only a fraction of the population participates. These preliminary results demonstrate the potential of mobile technology to complement other measures like vaccination and quarantines against disease epidemics.
1307.1482
Lavindra de Silva
Lavindra de Silva and Amit Kumar Pandey and Mamoun Gharbi and Rachid Alami
Towards Combining HTN Planning and Geometric Task Planning
RSS Workshop on Combined Robot Motion Planning and AI Planning for Practical Applications, June 2013
null
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we present an interface between a symbolic planner and a geometric task planner, which is different to a standard trajectory planner in that the former is able to perform geometric reasoning on abstract entities---tasks. We believe that this approach facilitates a more principled interface to symbolic planning, while also leaving more room for the geometric planner to make independent decisions. We show how the two planners could be interfaced, and how their planning and backtracking could be interleaved. We also provide insights for a methodology for using the combined system, and experimental results to use as a benchmark with future extensions to both the combined system, as well as to the geometric task planner.
[ { "version": "v1", "created": "Thu, 4 Jul 2013 20:28:40 GMT" } ]
2013-07-08T00:00:00
[ [ "de Silva", "Lavindra", "" ], [ "Pandey", "Amit Kumar", "" ], [ "Gharbi", "Mamoun", "" ], [ "Alami", "Rachid", "" ] ]
TITLE: Towards Combining HTN Planning and Geometric Task Planning ABSTRACT: In this paper we present an interface between a symbolic planner and a geometric task planner, which is different to a standard trajectory planner in that the former is able to perform geometric reasoning on abstract entities---tasks. We believe that this approach facilitates a more principled interface to symbolic planning, while also leaving more room for the geometric planner to make independent decisions. We show how the two planners could be interfaced, and how their planning and backtracking could be interleaved. We also provide insights for a methodology for using the combined system, and experimental results to use as a benchmark with future extensions to both the combined system, as well as to the geometric task planner.
1307.1542
Christian von der Weth
Christian von der Weth and Manfred Hauswirth
DOBBS: Towards a Comprehensive Dataset to Study the Browsing Behavior of Online Users
null
null
null
null
cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The investigation of the browsing behavior of users provides useful information to optimize web site design, web browser design, search engines offerings, and online advertisement. This has been a topic of active research since the Web started and a large body of work exists. However, new online services as well as advances in Web and mobile technologies clearly changed the meaning behind "browsing the Web" and require a fresh look at the problem and research, specifically in respect to whether the used models are still appropriate. Platforms such as YouTube, Netflix or last.fm have started to replace the traditional media channels (cinema, television, radio) and media distribution formats (CD, DVD, Blu-ray). Social networks (e.g., Facebook) and platforms for browser games attracted whole new, particularly less tech-savvy audiences. Furthermore, advances in mobile technologies and devices made browsing "on-the-move" the norm and changed the user behavior as in the mobile case browsing is often being influenced by the user's location and context in the physical world. Commonly used datasets, such as web server access logs or search engines transaction logs, are inherently not capable of capturing the browsing behavior of users in all these facets. DOBBS (DERI Online Behavior Study) is an effort to create such a dataset in a non-intrusive, completely anonymous and privacy-preserving way. To this end, DOBBS provides a browser add-on that users can install, which keeps track of their browsing behavior (e.g., how much time they spent on the Web, how long they stay on a website, how often they visit a website, how they use their browser, etc.). In this paper, we outline the motivation behind DOBBS, describe the add-on and captured data in detail, and present some first results to highlight the strengths of DOBBS.
[ { "version": "v1", "created": "Fri, 5 Jul 2013 08:10:11 GMT" } ]
2013-07-08T00:00:00
[ [ "von der Weth", "Christian", "" ], [ "Hauswirth", "Manfred", "" ] ]
TITLE: DOBBS: Towards a Comprehensive Dataset to Study the Browsing Behavior of Online Users ABSTRACT: The investigation of the browsing behavior of users provides useful information to optimize web site design, web browser design, search engines offerings, and online advertisement. This has been a topic of active research since the Web started and a large body of work exists. However, new online services as well as advances in Web and mobile technologies clearly changed the meaning behind "browsing the Web" and require a fresh look at the problem and research, specifically in respect to whether the used models are still appropriate. Platforms such as YouTube, Netflix or last.fm have started to replace the traditional media channels (cinema, television, radio) and media distribution formats (CD, DVD, Blu-ray). Social networks (e.g., Facebook) and platforms for browser games attracted whole new, particularly less tech-savvy audiences. Furthermore, advances in mobile technologies and devices made browsing "on-the-move" the norm and changed the user behavior as in the mobile case browsing is often being influenced by the user's location and context in the physical world. Commonly used datasets, such as web server access logs or search engines transaction logs, are inherently not capable of capturing the browsing behavior of users in all these facets. DOBBS (DERI Online Behavior Study) is an effort to create such a dataset in a non-intrusive, completely anonymous and privacy-preserving way. To this end, DOBBS provides a browser add-on that users can install, which keeps track of their browsing behavior (e.g., how much time they spent on the Web, how long they stay on a website, how often they visit a website, how they use their browser, etc.). In this paper, we outline the motivation behind DOBBS, describe the add-on and captured data in detail, and present some first results to highlight the strengths of DOBBS.
1307.1601
Uwe Aickelin
Chris Roadknight, Uwe Aickelin, Alex Ladas, Daniele Soria, John Scholefield and Lindy Durrant
Biomarker Clustering of Colorectal Cancer Data to Complement Clinical Classification
Federated Conference on Computer Science and Information Systems (FedCSIS), pp 187-191, 2012
null
null
null
cs.LG cs.CE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we describe a dataset relating to cellular and physical conditions of patients who are operated upon to remove colorectal tumours. This data provides a unique insight into immunological status at the point of tumour removal, tumour classification and post-operative survival. Attempts are made to cluster this dataset and important subsets of it in an effort to characterize the data and validate existing standards for tumour classification. It is apparent from optimal clustering that existing tumour classification is largely unrelated to immunological factors within a patient and that there may be scope for re-evaluating treatment options and survival estimates based on a combination of tumour physiology and patient histochemistry.
[ { "version": "v1", "created": "Fri, 5 Jul 2013 12:56:24 GMT" } ]
2013-07-08T00:00:00
[ [ "Roadknight", "Chris", "" ], [ "Aickelin", "Uwe", "" ], [ "Ladas", "Alex", "" ], [ "Soria", "Daniele", "" ], [ "Scholefield", "John", "" ], [ "Durrant", "Lindy", "" ] ]
TITLE: Biomarker Clustering of Colorectal Cancer Data to Complement Clinical Classification ABSTRACT: In this paper, we describe a dataset relating to cellular and physical conditions of patients who are operated upon to remove colorectal tumours. This data provides a unique insight into immunological status at the point of tumour removal, tumour classification and post-operative survival. Attempts are made to cluster this dataset and important subsets of it in an effort to characterize the data and validate existing standards for tumour classification. It is apparent from optimal clustering that existing tumour classification is largely unrelated to immunological factors within a patient and that there may be scope for re-evaluating treatment options and survival estimates based on a combination of tumour physiology and patient histochemistry.
1307.1275
Ruifan Li
Fangxiang Feng and Ruifan Li and Xiaojie Wang
Constructing Hierarchical Image-tags Bimodal Representations for Word Tags Alternative Choice
6 pages, 1 figure, Presented at the Workshop on Representation Learning, ICML 2013
null
null
null
cs.LG cs.NE
http://creativecommons.org/licenses/by/3.0/
This paper describes our solution to the multi-modal learning challenge of ICML. This solution comprises constructing three-level representations in three consecutive stages and choosing correct tag words with a data-specific strategy. Firstly, we use typical methods to obtain level-1 representations. Each image is represented using MPEG-7 and gist descriptors with additional features released by the contest organizers. And the corresponding word tags are represented by bag-of-words model with a dictionary of 4000 words. Secondly, we learn the level-2 representations using two stacked RBMs for each modality. Thirdly, we propose a bimodal auto-encoder to learn the similarities/dissimilarities between the pairwise image-tags as level-3 representations. Finally, during the test phase, based on one observation of the dataset, we come up with a data-specific strategy to choose the correct tag words leading to a leap of an improved overall performance. Our final average accuracy on the private test set is 100%, which ranks the first place in this challenge.
[ { "version": "v1", "created": "Thu, 4 Jul 2013 11:10:45 GMT" } ]
2013-07-05T00:00:00
[ [ "Feng", "Fangxiang", "" ], [ "Li", "Ruifan", "" ], [ "Wang", "Xiaojie", "" ] ]
TITLE: Constructing Hierarchical Image-tags Bimodal Representations for Word Tags Alternative Choice ABSTRACT: This paper describes our solution to the multi-modal learning challenge of ICML. This solution comprises constructing three-level representations in three consecutive stages and choosing correct tag words with a data-specific strategy. Firstly, we use typical methods to obtain level-1 representations. Each image is represented using MPEG-7 and gist descriptors with additional features released by the contest organizers. And the corresponding word tags are represented by bag-of-words model with a dictionary of 4000 words. Secondly, we learn the level-2 representations using two stacked RBMs for each modality. Thirdly, we propose a bimodal auto-encoder to learn the similarities/dissimilarities between the pairwise image-tags as level-3 representations. Finally, during the test phase, based on one observation of the dataset, we come up with a data-specific strategy to choose the correct tag words leading to a leap of an improved overall performance. Our final average accuracy on the private test set is 100%, which ranks the first place in this challenge.
1307.1391
Uwe Aickelin
Feng Gu, Jan Feyereisl, Robert Oates, Jenna Reps, Julie Greensmith, Uwe Aickelin
Quiet in Class: Classification, Noise and the Dendritic Cell Algorithm
Proceedings of the 10th International Conference on Artificial Immune Systems (ICARIS 2011), LNCS Volume 6825, Cambridge, UK, pp 173-186, 2011
null
null
null
cs.LG cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Theoretical analyses of the Dendritic Cell Algorithm (DCA) have yielded several criticisms about its underlying structure and operation. As a result, several alterations and fixes have been suggested in the literature to correct for these findings. A contribution of this work is to investigate the effects of replacing the classification stage of the DCA (which is known to be flawed) with a traditional machine learning technique. This work goes on to question the merits of those unique properties of the DCA that are yet to be thoroughly analysed. If none of these properties can be found to have a benefit over traditional approaches, then "fixing" the DCA is arguably less efficient than simply creating a new algorithm. This work examines the dynamic filtering property of the DCA and questions the utility of this unique feature for the anomaly detection problem. It is found that this feature, while advantageous for noisy, time-ordered classification, is not as useful as a traditional static filter for processing a synthetic dataset. It is concluded that there are still unique features of the DCA left to investigate. Areas that may be of benefit to the Artificial Immune Systems community are suggested.
[ { "version": "v1", "created": "Thu, 4 Jul 2013 16:19:21 GMT" } ]
2013-07-05T00:00:00
[ [ "Gu", "Feng", "" ], [ "Feyereisl", "Jan", "" ], [ "Oates", "Robert", "" ], [ "Reps", "Jenna", "" ], [ "Greensmith", "Julie", "" ], [ "Aickelin", "Uwe", "" ] ]
TITLE: Quiet in Class: Classification, Noise and the Dendritic Cell Algorithm ABSTRACT: Theoretical analyses of the Dendritic Cell Algorithm (DCA) have yielded several criticisms about its underlying structure and operation. As a result, several alterations and fixes have been suggested in the literature to correct for these findings. A contribution of this work is to investigate the effects of replacing the classification stage of the DCA (which is known to be flawed) with a traditional machine learning technique. This work goes on to question the merits of those unique properties of the DCA that are yet to be thoroughly analysed. If none of these properties can be found to have a benefit over traditional approaches, then "fixing" the DCA is arguably less efficient than simply creating a new algorithm. This work examines the dynamic filtering property of the DCA and questions the utility of this unique feature for the anomaly detection problem. It is found that this feature, while advantageous for noisy, time-ordered classification, is not as useful as a traditional static filter for processing a synthetic dataset. It is concluded that there are still unique features of the DCA left to investigate. Areas that may be of benefit to the Artificial Immune Systems community are suggested.
1307.1417
Marius Nicolae
Sanguthevar Rajasekaran and Marius Nicolae
An Elegant Algorithm for the Construction of Suffix Arrays
null
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The suffix array is a data structure that finds numerous applications in string processing problems for both linguistic texts and biological data. It has been introduced as a memory efficient alternative for suffix trees. The suffix array consists of the sorted suffixes of a string. There are several linear time suffix array construction algorithms (SACAs) known in the literature. However, one of the fastest algorithms in practice has a worst case run time of $O(n^2)$. The problem of designing practically and theoretically efficient techniques remains open. In this paper we present an elegant algorithm for suffix array construction which takes linear time with high probability; the probability is on the space of all possible inputs. Our algorithm is one of the simplest of the known SACAs and it opens up a new dimension of suffix array construction that has not been explored until now. Our algorithm is easily parallelizable. We offer parallel implementations on various parallel models of computing. We prove a lemma on the $\ell$-mers of a random string which might find independent applications. We also present another algorithm that utilizes the above algorithm. This algorithm is called RadixSA and has a worst case run time of $O(n\log{n})$. RadixSA introduces an idea that may find independent applications as a speedup technique for other SACAs. An empirical comparison of RadixSA with other algorithms on various datasets reveals that our algorithm is one of the fastest algorithms to date. The C++ source code is freely available at http://www.engr.uconn.edu/~man09004/radixSA.zip
[ { "version": "v1", "created": "Thu, 4 Jul 2013 17:10:08 GMT" } ]
2013-07-05T00:00:00
[ [ "Rajasekaran", "Sanguthevar", "" ], [ "Nicolae", "Marius", "" ] ]
TITLE: An Elegant Algorithm for the Construction of Suffix Arrays ABSTRACT: The suffix array is a data structure that finds numerous applications in string processing problems for both linguistic texts and biological data. It has been introduced as a memory efficient alternative for suffix trees. The suffix array consists of the sorted suffixes of a string. There are several linear time suffix array construction algorithms (SACAs) known in the literature. However, one of the fastest algorithms in practice has a worst case run time of $O(n^2)$. The problem of designing practically and theoretically efficient techniques remains open. In this paper we present an elegant algorithm for suffix array construction which takes linear time with high probability; the probability is on the space of all possible inputs. Our algorithm is one of the simplest of the known SACAs and it opens up a new dimension of suffix array construction that has not been explored until now. Our algorithm is easily parallelizable. We offer parallel implementations on various parallel models of computing. We prove a lemma on the $\ell$-mers of a random string which might find independent applications. We also present another algorithm that utilizes the above algorithm. This algorithm is called RadixSA and has a worst case run time of $O(n\log{n})$. RadixSA introduces an idea that may find independent applications as a speedup technique for other SACAs. An empirical comparison of RadixSA with other algorithms on various datasets reveals that our algorithm is one of the fastest algorithms to date. The C++ source code is freely available at http://www.engr.uconn.edu/~man09004/radixSA.zip
1307.0596
Om Damani
Om P. Damani
Improving Pointwise Mutual Information (PMI) by Incorporating Significant Co-occurrence
To appear in the proceedings of 17th Conference on Computational Natural Language Learning, CoNLL 2013
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We design a new co-occurrence based word association measure by incorporating the concept of significant cooccurrence in the popular word association measure Pointwise Mutual Information (PMI). By extensive experiments with a large number of publicly available datasets we show that the newly introduced measure performs better than other co-occurrence based measures and despite being resource-light, compares well with the best known resource-heavy distributional similarity and knowledge based word association measures. We investigate the source of this performance improvement and find that of the two types of significant co-occurrence - corpus-level and document-level, the concept of corpus level significance combined with the use of document counts in place of word counts is responsible for all the performance gains observed. The concept of document level significance is not helpful for PMI adaptation.
[ { "version": "v1", "created": "Tue, 2 Jul 2013 06:25:51 GMT" } ]
2013-07-03T00:00:00
[ [ "Damani", "Om P.", "" ] ]
TITLE: Improving Pointwise Mutual Information (PMI) by Incorporating Significant Co-occurrence ABSTRACT: We design a new co-occurrence based word association measure by incorporating the concept of significant cooccurrence in the popular word association measure Pointwise Mutual Information (PMI). By extensive experiments with a large number of publicly available datasets we show that the newly introduced measure performs better than other co-occurrence based measures and despite being resource-light, compares well with the best known resource-heavy distributional similarity and knowledge based word association measures. We investigate the source of this performance improvement and find that of the two types of significant co-occurrence - corpus-level and document-level, the concept of corpus level significance combined with the use of document counts in place of word counts is responsible for all the performance gains observed. The concept of document level significance is not helpful for PMI adaptation.
1307.0747
Uwe Aickelin
Stephanie Foan, Andrew Jackson, Ian Spendlove, Uwe Aickelin
Simulating the Dynamics of T Cell Subsets Throughout the Lifetime
Proceedings of the 10th International Conference on Artificial Immune Systems (ICARIS 2011), LNCS Volume 6825, Cambridge, UK, pp 71-76
null
null
null
cs.CE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
It is widely accepted that the immune system undergoes age-related changes correlating with increased disease in the elderly. T cell subsets have been implicated. The aim of this work is firstly to implement and validate a simulation of T regulatory cell (Treg) dynamics throughout the lifetime, based on a model by Baltcheva. We show that our initial simulation produces an inversion between precursor and mature Treys at around 20 years of age, though the output differs significantly from the original laboratory dataset. Secondly, this report discusses development of the model to incorporate new data from a cross-sectional study of healthy blood donors addressing balance between Treys and Th17 cells with novel markers for Treg. The potential for simulation to add insight into immune aging is discussed.
[ { "version": "v1", "created": "Tue, 2 Jul 2013 16:19:54 GMT" } ]
2013-07-03T00:00:00
[ [ "Foan", "Stephanie", "" ], [ "Jackson", "Andrew", "" ], [ "Spendlove", "Ian", "" ], [ "Aickelin", "Uwe", "" ] ]
TITLE: Simulating the Dynamics of T Cell Subsets Throughout the Lifetime ABSTRACT: It is widely accepted that the immune system undergoes age-related changes correlating with increased disease in the elderly. T cell subsets have been implicated. The aim of this work is firstly to implement and validate a simulation of T regulatory cell (Treg) dynamics throughout the lifetime, based on a model by Baltcheva. We show that our initial simulation produces an inversion between precursor and mature Treys at around 20 years of age, though the output differs significantly from the original laboratory dataset. Secondly, this report discusses development of the model to incorporate new data from a cross-sectional study of healthy blood donors addressing balance between Treys and Th17 cells with novel markers for Treg. The potential for simulation to add insight into immune aging is discussed.
0812.4235
Francesco Dinuzzo
Francesco Dinuzzo, Gianluigi Pillonetto, Giuseppe De Nicolao
Client-server multi-task learning from distributed datasets
null
null
10.1109/TNN.2010.2095882
null
cs.LG cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A client-server architecture to simultaneously solve multiple learning tasks from distributed datasets is described. In such architecture, each client is associated with an individual learning task and the associated dataset of examples. The goal of the architecture is to perform information fusion from multiple datasets while preserving privacy of individual data. The role of the server is to collect data in real-time from the clients and codify the information in a common database. The information coded in this database can be used by all the clients to solve their individual learning task, so that each client can exploit the informative content of all the datasets without actually having access to private data of others. The proposed algorithmic framework, based on regularization theory and kernel methods, uses a suitable class of mixed effect kernels. The new method is illustrated through a simulated music recommendation system.
[ { "version": "v1", "created": "Mon, 22 Dec 2008 16:34:39 GMT" }, { "version": "v2", "created": "Mon, 11 Jan 2010 15:37:43 GMT" } ]
2013-07-02T00:00:00
[ [ "Dinuzzo", "Francesco", "" ], [ "Pillonetto", "Gianluigi", "" ], [ "De Nicolao", "Giuseppe", "" ] ]
TITLE: Client-server multi-task learning from distributed datasets ABSTRACT: A client-server architecture to simultaneously solve multiple learning tasks from distributed datasets is described. In such architecture, each client is associated with an individual learning task and the associated dataset of examples. The goal of the architecture is to perform information fusion from multiple datasets while preserving privacy of individual data. The role of the server is to collect data in real-time from the clients and codify the information in a common database. The information coded in this database can be used by all the clients to solve their individual learning task, so that each client can exploit the informative content of all the datasets without actually having access to private data of others. The proposed algorithmic framework, based on regularization theory and kernel methods, uses a suitable class of mixed effect kernels. The new method is illustrated through a simulated music recommendation system.
1111.4541
Lu Dang Khoa Nguyen
Nguyen Lu Dang Khoa and Sanjay Chawla
Large Scale Spectral Clustering Using Approximate Commute Time Embedding
null
null
10.1007/978-3-642-33492-4_4
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Spectral clustering is a novel clustering method which can detect complex shapes of data clusters. However, it requires the eigen decomposition of the graph Laplacian matrix, which is proportion to $O(n^3)$ and thus is not suitable for large scale systems. Recently, many methods have been proposed to accelerate the computational time of spectral clustering. These approximate methods usually involve sampling techniques by which a lot information of the original data may be lost. In this work, we propose a fast and accurate spectral clustering approach using an approximate commute time embedding, which is similar to the spectral embedding. The method does not require using any sampling technique and computing any eigenvector at all. Instead it uses random projection and a linear time solver to find the approximate embedding. The experiments in several synthetic and real datasets show that the proposed approach has better clustering quality and is faster than the state-of-the-art approximate spectral clustering methods.
[ { "version": "v1", "created": "Sat, 19 Nov 2011 08:39:34 GMT" }, { "version": "v2", "created": "Wed, 29 Feb 2012 04:19:56 GMT" } ]
2013-07-02T00:00:00
[ [ "Khoa", "Nguyen Lu Dang", "" ], [ "Chawla", "Sanjay", "" ] ]
TITLE: Large Scale Spectral Clustering Using Approximate Commute Time Embedding ABSTRACT: Spectral clustering is a novel clustering method which can detect complex shapes of data clusters. However, it requires the eigen decomposition of the graph Laplacian matrix, which is proportion to $O(n^3)$ and thus is not suitable for large scale systems. Recently, many methods have been proposed to accelerate the computational time of spectral clustering. These approximate methods usually involve sampling techniques by which a lot information of the original data may be lost. In this work, we propose a fast and accurate spectral clustering approach using an approximate commute time embedding, which is similar to the spectral embedding. The method does not require using any sampling technique and computing any eigenvector at all. Instead it uses random projection and a linear time solver to find the approximate embedding. The experiments in several synthetic and real datasets show that the proposed approach has better clustering quality and is faster than the state-of-the-art approximate spectral clustering methods.
1306.5390
Tejaswi Agarwal
Tejaswi Agarwal, Saurabh Jha and B. Rajesh Kanna
P-HGRMS: A Parallel Hypergraph Based Root Mean Square Algorithm for Image Denoising
2 pages, 2 figures. Published as poster at the 22nd ACM International Symposium on High Performance Parallel and Distributed Systems, HPDC 2013, New York, USA. Won the Best Poster Award at HPDC 2013
null
null
null
cs.DC cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents a parallel Salt and Pepper (SP) noise removal algorithm in a grey level digital image based on the Hypergraph Based Root Mean Square (HGRMS) approach. HGRMS is generic algorithm for identifying noisy pixels in any digital image using a two level hierarchical serial approach. However, for SP noise removal, we reduce this algorithm to a parallel model by introducing a cardinality matrix and an iteration factor, k, which helps us reduce the dependencies in the existing approach. We also observe that the performance of the serial implementation is better on smaller images, but once the threshold is achieved in terms of image resolution, its computational complexity increases drastically. We test P-HGRMS using standard images from the Berkeley Segmentation dataset on NVIDIAs Compute Unified Device Architecture (CUDA) for noise identification and attenuation. We also compare the noise removal efficiency of the proposed algorithm using Peak Signal to Noise Ratio (PSNR) to the existing approach. P-HGRMS maintains the noise removal efficiency and outperforms its sequential counterpart by 6 to 18 times (6x - 18x) in computational efficiency.
[ { "version": "v1", "created": "Sun, 23 Jun 2013 09:36:08 GMT" }, { "version": "v2", "created": "Sat, 29 Jun 2013 01:32:41 GMT" } ]
2013-07-02T00:00:00
[ [ "Agarwal", "Tejaswi", "" ], [ "Jha", "Saurabh", "" ], [ "Kanna", "B. Rajesh", "" ] ]
TITLE: P-HGRMS: A Parallel Hypergraph Based Root Mean Square Algorithm for Image Denoising ABSTRACT: This paper presents a parallel Salt and Pepper (SP) noise removal algorithm in a grey level digital image based on the Hypergraph Based Root Mean Square (HGRMS) approach. HGRMS is generic algorithm for identifying noisy pixels in any digital image using a two level hierarchical serial approach. However, for SP noise removal, we reduce this algorithm to a parallel model by introducing a cardinality matrix and an iteration factor, k, which helps us reduce the dependencies in the existing approach. We also observe that the performance of the serial implementation is better on smaller images, but once the threshold is achieved in terms of image resolution, its computational complexity increases drastically. We test P-HGRMS using standard images from the Berkeley Segmentation dataset on NVIDIAs Compute Unified Device Architecture (CUDA) for noise identification and attenuation. We also compare the noise removal efficiency of the proposed algorithm using Peak Signal to Noise Ratio (PSNR) to the existing approach. P-HGRMS maintains the noise removal efficiency and outperforms its sequential counterpart by 6 to 18 times (6x - 18x) in computational efficiency.
1307.0129
Roozbeh Rajabi
Roozbeh Rajabi, Hassan Ghassemian
Hyperspectral Data Unmixing Using GNMF Method and Sparseness Constraint
4 pages, conference
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Hyperspectral images contain mixed pixels due to low spatial resolution of hyperspectral sensors. Mixed pixels are pixels containing more than one distinct material called endmembers. The presence percentages of endmembers in mixed pixels are called abundance fractions. Spectral unmixing problem refers to decomposing these pixels into a set of endmembers and abundance fractions. Due to nonnegativity constraint on abundance fractions, nonnegative matrix factorization methods (NMF) have been widely used for solving spectral unmixing problem. In this paper we have used graph regularized (GNMF) method with sparseness constraint to unmix hyperspectral data. This method applied on simulated data using AVIRIS Indian Pines dataset and USGS library and results are quantified based on AAD and SAD measures. Results in comparison with other methods show that the proposed method can unmix data more effectively.
[ { "version": "v1", "created": "Sat, 29 Jun 2013 16:57:44 GMT" } ]
2013-07-02T00:00:00
[ [ "Rajabi", "Roozbeh", "" ], [ "Ghassemian", "Hassan", "" ] ]
TITLE: Hyperspectral Data Unmixing Using GNMF Method and Sparseness Constraint ABSTRACT: Hyperspectral images contain mixed pixels due to low spatial resolution of hyperspectral sensors. Mixed pixels are pixels containing more than one distinct material called endmembers. The presence percentages of endmembers in mixed pixels are called abundance fractions. Spectral unmixing problem refers to decomposing these pixels into a set of endmembers and abundance fractions. Due to nonnegativity constraint on abundance fractions, nonnegative matrix factorization methods (NMF) have been widely used for solving spectral unmixing problem. In this paper we have used graph regularized (GNMF) method with sparseness constraint to unmix hyperspectral data. This method applied on simulated data using AVIRIS Indian Pines dataset and USGS library and results are quantified based on AAD and SAD measures. Results in comparison with other methods show that the proposed method can unmix data more effectively.