id
large_stringlengths 9
16
| submitter
large_stringlengths 3
64
⌀ | authors
large_stringlengths 5
20.2k
| title
large_stringlengths 5
245
| comments
large_stringlengths 1
482
⌀ | journal-ref
large_stringlengths 4
382
⌀ | doi
large_stringlengths 9
151
⌀ | report-no
large_stringlengths 2
509
⌀ | categories
large_stringlengths 5
78
| license
large_stringclasses 9
values | abstract
large_stringlengths 83
3.55k
| versions
large listlengths 1
21
| update_date
timestamp[ms]date 2007-05-23 00:00:00
2025-05-30 00:00:00
| authors_parsed
large listlengths 1
1.35k
| prompt
large_stringlengths 166
3.64k
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1308.5752 | Alexander Petersen | Alexander M. Petersen and Sauro Succi | The Z-index: A geometric representation of productivity and impact which
accounts for information in the entire rank-citation profile | 9 pages, 5 figures | J. of Informetrics 7, 823-832 (2013) | 10.1016/j.joi.2013.07.003 | null | physics.soc-ph cs.DL physics.data-an | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present a simple generalization of Hirsch's h-index, Z =
\sqrt{h^{2}+C}/\sqrt{5}, where C is the total number of citations. Z is aimed
at correcting the potentially excessive penalty made by h on a scientist's
highly cited papers, because for the majority of scientists analyzed, we find
the excess citation fraction (C-h^{2})/C to be distributed closely around the
value 0.75, meaning that 75 percent of the author's impact is neglected.
Additionally, Z is less sensitive to local changes in a scientist's citation
profile, namely perturbations which increase h while only marginally affecting
C. Using real career data for 476 physicists careers and 488 biologist careers,
we analyze both the distribution of $Z$ and the rank stability of Z with
respect to the Hirsch index h and the Egghe index g. We analyze careers
distributed across a wide range of total impact, including top-cited physicists
and biologists for benchmark comparison. In practice, the Z-index requires the
same information needed to calculate h and could be effortlessly incorporated
within career profile databases, such as Google Scholar and ResearcherID.
Because Z incorporates information from the entire publication profile while
being more robust than h and g to local perturbations, we argue that Z is
better suited for ranking comparisons in academic decision-making scenarios
comprising a large number of scientists.
| [
{
"version": "v1",
"created": "Tue, 27 Aug 2013 04:45:52 GMT"
}
] | 2013-08-28T00:00:00 | [
[
"Petersen",
"Alexander M.",
""
],
[
"Succi",
"Sauro",
""
]
] | TITLE: The Z-index: A geometric representation of productivity and impact which
accounts for information in the entire rank-citation profile
ABSTRACT: We present a simple generalization of Hirsch's h-index, Z =
\sqrt{h^{2}+C}/\sqrt{5}, where C is the total number of citations. Z is aimed
at correcting the potentially excessive penalty made by h on a scientist's
highly cited papers, because for the majority of scientists analyzed, we find
the excess citation fraction (C-h^{2})/C to be distributed closely around the
value 0.75, meaning that 75 percent of the author's impact is neglected.
Additionally, Z is less sensitive to local changes in a scientist's citation
profile, namely perturbations which increase h while only marginally affecting
C. Using real career data for 476 physicists careers and 488 biologist careers,
we analyze both the distribution of $Z$ and the rank stability of Z with
respect to the Hirsch index h and the Egghe index g. We analyze careers
distributed across a wide range of total impact, including top-cited physicists
and biologists for benchmark comparison. In practice, the Z-index requires the
same information needed to calculate h and could be effortlessly incorporated
within career profile databases, such as Google Scholar and ResearcherID.
Because Z incorporates information from the entire publication profile while
being more robust than h and g to local perturbations, we argue that Z is
better suited for ranking comparisons in academic decision-making scenarios
comprising a large number of scientists.
|
1308.5846 | Matthew Knepley | Brad T. Aagaard and Matthew G. Knepley and Charles A. Williams | A Domain Decomposition Approach to Implementing Fault Slip in
Finite-Element Models of Quasi-static and Dynamic Crustal Deformation | 14 pages, 15 figures | Journal of Geophysical Research, 118(6), pp.3059-3079, 2013 | 10.1002/jgrb.50217 | null | physics.geo-ph cs.CE cs.MS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We employ a domain decomposition approach with Lagrange multipliers to
implement fault slip in a finite-element code, PyLith, for use in both
quasi-static and dynamic crustal deformation applications. This integrated
approach to solving both quasi-static and dynamic simulations leverages common
finite-element data structures and implementations of various boundary
conditions, discretization schemes, and bulk and fault rheologies. We have
developed a custom preconditioner for the Lagrange multiplier portion of the
system of equations that provides excellent scalability with problem size
compared to conventional additive Schwarz methods. We demonstrate application
of this approach using benchmarks for both quasi-static viscoelastic
deformation and dynamic spontaneous rupture propagation that verify the
numerical implementation in PyLith.
| [
{
"version": "v1",
"created": "Tue, 27 Aug 2013 12:46:37 GMT"
}
] | 2013-08-28T00:00:00 | [
[
"Aagaard",
"Brad T.",
""
],
[
"Knepley",
"Matthew G.",
""
],
[
"Williams",
"Charles A.",
""
]
] | TITLE: A Domain Decomposition Approach to Implementing Fault Slip in
Finite-Element Models of Quasi-static and Dynamic Crustal Deformation
ABSTRACT: We employ a domain decomposition approach with Lagrange multipliers to
implement fault slip in a finite-element code, PyLith, for use in both
quasi-static and dynamic crustal deformation applications. This integrated
approach to solving both quasi-static and dynamic simulations leverages common
finite-element data structures and implementations of various boundary
conditions, discretization schemes, and bulk and fault rheologies. We have
developed a custom preconditioner for the Lagrange multiplier portion of the
system of equations that provides excellent scalability with problem size
compared to conventional additive Schwarz methods. We demonstrate application
of this approach using benchmarks for both quasi-static viscoelastic
deformation and dynamic spontaneous rupture propagation that verify the
numerical implementation in PyLith.
|
1308.5421 | Nils Ulltveit-Moe | Nils Ulltveit-Moe and Vladimir Oleshchuk | Measuring Privacy Leakage for IDS Rules | 22 pages, 16 figures | null | null | null | cs.CR cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper proposes a measurement approach for estimating the privacy leakage
from Intrusion Detection System (IDS) alarms. Quantitative information flow
analysis is used to build a theoretical model of privacy leakage from IDS
rules, based on information entropy. This theoretical model is subsequently
verified empirically both based on simulations and in an experimental study.
The analysis shows that the metric is able to distinguish between IDS rules
that have no or low expected privacy leakage and IDS rules with a significant
risk of leaking sensitive information, for example on user behaviour. The
analysis is based on measurements of number of IDS alarms, data length and data
entropy for relevant parts of IDS rules (for example payload). This is a
promising approach that opens up for privacy benchmarking of Managed Security
Service providers.
| [
{
"version": "v1",
"created": "Sun, 25 Aug 2013 16:16:54 GMT"
}
] | 2013-08-27T00:00:00 | [
[
"Ulltveit-Moe",
"Nils",
""
],
[
"Oleshchuk",
"Vladimir",
""
]
] | TITLE: Measuring Privacy Leakage for IDS Rules
ABSTRACT: This paper proposes a measurement approach for estimating the privacy leakage
from Intrusion Detection System (IDS) alarms. Quantitative information flow
analysis is used to build a theoretical model of privacy leakage from IDS
rules, based on information entropy. This theoretical model is subsequently
verified empirically both based on simulations and in an experimental study.
The analysis shows that the metric is able to distinguish between IDS rules
that have no or low expected privacy leakage and IDS rules with a significant
risk of leaking sensitive information, for example on user behaviour. The
analysis is based on measurements of number of IDS alarms, data length and data
entropy for relevant parts of IDS rules (for example payload). This is a
promising approach that opens up for privacy benchmarking of Managed Security
Service providers.
|
1308.5033 | Guanghui Huang | Guanghui Huang, Zhifeng Pan | A hybrid evolutionary algorithm with importance sampling for
multi-dimensional optimization | 13 pages,5 tables, 9 figures | null | null | null | cs.NE | http://creativecommons.org/licenses/by/3.0/ | A hybrid evolutionary algorithm with importance sampling method is proposed
for multi-dimensional optimization problems in this paper. In order to make use
of the information provided in the search process, a set of visited solutions
is selected to give scores for intervals in each dimension, and they are
updated as algorithm proceeds. Those intervals with higher scores are regarded
as good intervals, which are used to estimate the joint distribution of optimal
solutions through an interaction between the pool of good genetics, which are
the individuals with smaller fitness values. And the sampling probabilities for
good genetics are determined through an interaction between those estimated
good intervals. It is a cross validation mechanism which determines the
sampling probabilities for good intervals and genetics, and the resulted
probabilities are used to design crossover, mutation and other stochastic
operators with importance sampling method. As the selection of genetics and
intervals is not directly dependent on the values of fitness, the resulted
offsprings may avoid the trap of local optima. And a purely random EA is also
combined into the proposed algorithm to maintain the diversity of population.
30 benchmark test functions are used to evaluate the performance of the
proposed algorithm, and it is found that the proposed hybrid algorithm is an
efficient algorithm for multi-dimensional optimization problems considered in
this paper.
| [
{
"version": "v1",
"created": "Fri, 23 Aug 2013 03:11:54 GMT"
}
] | 2013-08-26T00:00:00 | [
[
"Huang",
"Guanghui",
""
],
[
"Pan",
"Zhifeng",
""
]
] | TITLE: A hybrid evolutionary algorithm with importance sampling for
multi-dimensional optimization
ABSTRACT: A hybrid evolutionary algorithm with importance sampling method is proposed
for multi-dimensional optimization problems in this paper. In order to make use
of the information provided in the search process, a set of visited solutions
is selected to give scores for intervals in each dimension, and they are
updated as algorithm proceeds. Those intervals with higher scores are regarded
as good intervals, which are used to estimate the joint distribution of optimal
solutions through an interaction between the pool of good genetics, which are
the individuals with smaller fitness values. And the sampling probabilities for
good genetics are determined through an interaction between those estimated
good intervals. It is a cross validation mechanism which determines the
sampling probabilities for good intervals and genetics, and the resulted
probabilities are used to design crossover, mutation and other stochastic
operators with importance sampling method. As the selection of genetics and
intervals is not directly dependent on the values of fitness, the resulted
offsprings may avoid the trap of local optima. And a purely random EA is also
combined into the proposed algorithm to maintain the diversity of population.
30 benchmark test functions are used to evaluate the performance of the
proposed algorithm, and it is found that the proposed hybrid algorithm is an
efficient algorithm for multi-dimensional optimization problems considered in
this paper.
|
1308.5137 | Uwe Aickelin | Josie McCulloch, Christian Wagner, Uwe Aickelin | Measuring the Directional Distance Between Fuzzy Sets | UKCI 2013, the 13th Annual Workshop on Computational Intelligence,
Surrey University | null | null | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The measure of distance between two fuzzy sets is a fundamental tool within
fuzzy set theory. However, current distance measures within the literature do
not account for the direction of change between fuzzy sets; a useful concept in
a variety of applications, such as Computing With Words. In this paper, we
highlight this utility and introduce a distance measure which takes the
direction between sets into account. We provide details of its application for
normal and non-normal, as well as convex and non-convex fuzzy sets. We
demonstrate the new distance measure using real data from the MovieLens dataset
and establish the benefits of measuring the direction between fuzzy sets.
| [
{
"version": "v1",
"created": "Fri, 23 Aug 2013 14:31:10 GMT"
}
] | 2013-08-26T00:00:00 | [
[
"McCulloch",
"Josie",
""
],
[
"Wagner",
"Christian",
""
],
[
"Aickelin",
"Uwe",
""
]
] | TITLE: Measuring the Directional Distance Between Fuzzy Sets
ABSTRACT: The measure of distance between two fuzzy sets is a fundamental tool within
fuzzy set theory. However, current distance measures within the literature do
not account for the direction of change between fuzzy sets; a useful concept in
a variety of applications, such as Computing With Words. In this paper, we
highlight this utility and introduce a distance measure which takes the
direction between sets into account. We provide details of its application for
normal and non-normal, as well as convex and non-convex fuzzy sets. We
demonstrate the new distance measure using real data from the MovieLens dataset
and establish the benefits of measuring the direction between fuzzy sets.
|
1307.1372 | Kishore Kumar Gajula | G.Kishore Kumar and V.K.Jayaraman | Clustering of Complex Networks and Community Detection Using Group
Search Optimization | 7 pages, 2 figures | null | null | null | cs.NE cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Group Search Optimizer(GSO) is one of the best algorithms, is very new in the
field of Evolutionary Computing. It is very robust and efficient algorithm,
which is inspired by animal searching behaviour. The paper describes an
application of GSO to clustering of networks. We have tested GSO against five
standard benchmark datasets, GSO algorithm is proved very competitive in terms
of accuracy and convergence speed.
| [
{
"version": "v1",
"created": "Thu, 4 Jul 2013 15:22:35 GMT"
},
{
"version": "v2",
"created": "Mon, 19 Aug 2013 09:11:13 GMT"
}
] | 2013-08-20T00:00:00 | [
[
"Kumar",
"G. Kishore",
""
],
[
"Jayaraman",
"V. K.",
""
]
] | TITLE: Clustering of Complex Networks and Community Detection Using Group
Search Optimization
ABSTRACT: Group Search Optimizer(GSO) is one of the best algorithms, is very new in the
field of Evolutionary Computing. It is very robust and efficient algorithm,
which is inspired by animal searching behaviour. The paper describes an
application of GSO to clustering of networks. We have tested GSO against five
standard benchmark datasets, GSO algorithm is proved very competitive in terms
of accuracy and convergence speed.
|
1308.2655 | Loshchilov Ilya | Ilya Loshchilov (LIS), Marc Schoenauer (INRIA Saclay - Ile de France,
LRI), Mich\`ele Sebag (LRI) | KL-based Control of the Learning Schedule for Surrogate Black-Box
Optimization | null | Conf\'erence sur l'Apprentissage Automatique (2013) | null | null | cs.LG cs.AI stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper investigates the control of an ML component within the Covariance
Matrix Adaptation Evolution Strategy (CMA-ES) devoted to black-box
optimization. The known CMA-ES weakness is its sample complexity, the number of
evaluations of the objective function needed to approximate the global optimum.
This weakness is commonly addressed through surrogate optimization, learning an
estimate of the objective function a.k.a. surrogate model, and replacing most
evaluations of the true objective function with the (inexpensive) evaluation of
the surrogate model. This paper presents a principled control of the learning
schedule (when to relearn the surrogate model), based on the Kullback-Leibler
divergence of the current search distribution and the training distribution of
the former surrogate model. The experimental validation of the proposed
approach shows significant performance gains on a comprehensive set of
ill-conditioned benchmark problems, compared to the best state of the art
including the quasi-Newton high-precision BFGS method.
| [
{
"version": "v1",
"created": "Mon, 12 Aug 2013 19:31:59 GMT"
},
{
"version": "v2",
"created": "Sun, 18 Aug 2013 19:30:19 GMT"
}
] | 2013-08-20T00:00:00 | [
[
"Loshchilov",
"Ilya",
"",
"LIS"
],
[
"Schoenauer",
"Marc",
"",
"INRIA Saclay - Ile de France,\n LRI"
],
[
"Sebag",
"Michèle",
"",
"LRI"
]
] | TITLE: KL-based Control of the Learning Schedule for Surrogate Black-Box
Optimization
ABSTRACT: This paper investigates the control of an ML component within the Covariance
Matrix Adaptation Evolution Strategy (CMA-ES) devoted to black-box
optimization. The known CMA-ES weakness is its sample complexity, the number of
evaluations of the objective function needed to approximate the global optimum.
This weakness is commonly addressed through surrogate optimization, learning an
estimate of the objective function a.k.a. surrogate model, and replacing most
evaluations of the true objective function with the (inexpensive) evaluation of
the surrogate model. This paper presents a principled control of the learning
schedule (when to relearn the surrogate model), based on the Kullback-Leibler
divergence of the current search distribution and the training distribution of
the former surrogate model. The experimental validation of the proposed
approach shows significant performance gains on a comprehensive set of
ill-conditioned benchmark problems, compared to the best state of the art
including the quasi-Newton high-precision BFGS method.
|
1308.3784 | Hojjat Emami | Hojjat Emami and Shahriar Lotfi | Graph Colouring Problem Based on Discrete Imperialist Competitive
Algorithm | 12 pages | International Journal in Foundations of Computer Science &
Technology (IJFCST), Vol. 3, No.4, July 2013, pp. 1-12 | 10.5121/ijfcst.2013.3401 | null | cs.AI cs.NE | http://creativecommons.org/licenses/by/3.0/ | In graph theory, Graph Colouring Problem (GCP) is an assignment of colours to
vertices of any given graph such that the colours on adjacent vertices are
different. The GCP is known to be an optimization and NP-hard problem.
Imperialist Competitive Algorithm (ICA) is a meta-heuristic optimization and
stochastic search strategy which is inspired from socio-political phenomenon of
imperialistic competition. The ICA contains two main operators: the
assimilation and the imperialistic competition. The ICA has excellent
capabilities such as high convergence rate and better global optimum
achievement. In this research, a discrete version of ICA is proposed to deal
with the solution of GCP. We call this algorithm as the DICA. The performance
of the proposed method is compared with Genetic Algorithm (GA) on seven
well-known graph colouring benchmarks. Experimental results demonstrate the
superiority of the DICA for the benchmarks. This means DICA can produce optimal
and valid solutions for different GCP instances.
| [
{
"version": "v1",
"created": "Sat, 17 Aug 2013 14:02:36 GMT"
}
] | 2013-08-20T00:00:00 | [
[
"Emami",
"Hojjat",
""
],
[
"Lotfi",
"Shahriar",
""
]
] | TITLE: Graph Colouring Problem Based on Discrete Imperialist Competitive
Algorithm
ABSTRACT: In graph theory, Graph Colouring Problem (GCP) is an assignment of colours to
vertices of any given graph such that the colours on adjacent vertices are
different. The GCP is known to be an optimization and NP-hard problem.
Imperialist Competitive Algorithm (ICA) is a meta-heuristic optimization and
stochastic search strategy which is inspired from socio-political phenomenon of
imperialistic competition. The ICA contains two main operators: the
assimilation and the imperialistic competition. The ICA has excellent
capabilities such as high convergence rate and better global optimum
achievement. In this research, a discrete version of ICA is proposed to deal
with the solution of GCP. We call this algorithm as the DICA. The performance
of the proposed method is compared with Genetic Algorithm (GA) on seven
well-known graph colouring benchmarks. Experimental results demonstrate the
superiority of the DICA for the benchmarks. This means DICA can produce optimal
and valid solutions for different GCP instances.
|
1308.3872 | Jian Sun | Jian Sun and Wei Chen and Junhui Deng and Jie Gao and Xianfeng Gu and
Feng Luo | A Variational Principle for Improving 2D Triangle Meshes based on
Hyperbolic Volume | null | null | null | null | cs.CG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we consider the problem of improving 2D triangle meshes
tessellating planar regions. We propose a new variational principle for
improving 2D triangle meshes where the energy functional is a convex function
over the angle structures whose maximizer is unique and consists only of
equilateral triangles. This energy functional is related to hyperbolic volume
of ideal 3-simplex. Even with extra constraints on the angles for embedding the
mesh into the plane and preserving the boundary, the energy functional remains
well-behaved. We devise an efficient algorithm for maximizing the energy
functional over these extra constraints. We apply our algorithm to various
datasets and compare its performance with that of CVT. The experimental results
show that our algorithm produces the meshes with both the angles and the aspect
ratios of triangles lying in tighter intervals.
| [
{
"version": "v1",
"created": "Sun, 18 Aug 2013 16:40:31 GMT"
}
] | 2013-08-20T00:00:00 | [
[
"Sun",
"Jian",
""
],
[
"Chen",
"Wei",
""
],
[
"Deng",
"Junhui",
""
],
[
"Gao",
"Jie",
""
],
[
"Gu",
"Xianfeng",
""
],
[
"Luo",
"Feng",
""
]
] | TITLE: A Variational Principle for Improving 2D Triangle Meshes based on
Hyperbolic Volume
ABSTRACT: In this paper, we consider the problem of improving 2D triangle meshes
tessellating planar regions. We propose a new variational principle for
improving 2D triangle meshes where the energy functional is a convex function
over the angle structures whose maximizer is unique and consists only of
equilateral triangles. This energy functional is related to hyperbolic volume
of ideal 3-simplex. Even with extra constraints on the angles for embedding the
mesh into the plane and preserving the boundary, the energy functional remains
well-behaved. We devise an efficient algorithm for maximizing the energy
functional over these extra constraints. We apply our algorithm to various
datasets and compare its performance with that of CVT. The experimental results
show that our algorithm produces the meshes with both the angles and the aspect
ratios of triangles lying in tighter intervals.
|
1308.4008 | Xin-She Yang | Momin Jamil and Xin-She Yang | A Literature Survey of Benchmark Functions For Global Optimization
Problems | 47 pages | Momin Jamil and Xin-She Yang, A literature survey of benchmark
functions for global optimization problems, Int. Journal of Mathematical
Modelling and Numerical Optimisation}, Vol. 4, No. 2, pp. 150--194 (2013) | 10.1504/IJMMNO.2013.055204 | null | cs.AI math.OC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Test functions are important to validate and compare the performance of
optimization algorithms. There have been many test or benchmark functions
reported in the literature; however, there is no standard list or set of
benchmark functions. Ideally, test functions should have diverse properties so
that can be truly useful to test new algorithms in an unbiased way. For this
purpose, we have reviewed and compiled a rich set of 175 benchmark functions
for unconstrained optimization problems with diverse properties in terms of
modality, separability, and valley landscape. This is by far the most complete
set of functions so far in the literature, and tt can be expected this complete
set of functions can be used for validation of new optimization in the future.
| [
{
"version": "v1",
"created": "Mon, 19 Aug 2013 13:01:17 GMT"
}
] | 2013-08-20T00:00:00 | [
[
"Jamil",
"Momin",
""
],
[
"Yang",
"Xin-She",
""
]
] | TITLE: A Literature Survey of Benchmark Functions For Global Optimization
Problems
ABSTRACT: Test functions are important to validate and compare the performance of
optimization algorithms. There have been many test or benchmark functions
reported in the literature; however, there is no standard list or set of
benchmark functions. Ideally, test functions should have diverse properties so
that can be truly useful to test new algorithms in an unbiased way. For this
purpose, we have reviewed and compiled a rich set of 175 benchmark functions
for unconstrained optimization problems with diverse properties in terms of
modality, separability, and valley landscape. This is by far the most complete
set of functions so far in the literature, and tt can be expected this complete
set of functions can be used for validation of new optimization in the future.
|
1211.6687 | Nicolas Gillis | Nicolas Gillis | Robustness Analysis of Hottopixx, a Linear Programming Model for
Factoring Nonnegative Matrices | 23 pages; new numerical results; Comparison with Arora et al.;
Accepted in SIAM J. Mat. Anal. Appl | SIAM J. Matrix Anal. & Appl. 34 (3), pp. 1189-1212, 2013 | 10.1137/120900629 | null | stat.ML cs.LG cs.NA math.OC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Although nonnegative matrix factorization (NMF) is NP-hard in general, it has
been shown very recently that it is tractable under the assumption that the
input nonnegative data matrix is close to being separable (separability
requires that all columns of the input matrix belongs to the cone spanned by a
small subset of these columns). Since then, several algorithms have been
designed to handle this subclass of NMF problems. In particular, Bittorf,
Recht, R\'e and Tropp (`Factoring nonnegative matrices with linear programs',
NIPS 2012) proposed a linear programming model, referred to as Hottopixx. In
this paper, we provide a new and more general robustness analysis of their
method. In particular, we design a provably more robust variant using a
post-processing strategy which allows us to deal with duplicates and near
duplicates in the dataset.
| [
{
"version": "v1",
"created": "Wed, 28 Nov 2012 18:05:56 GMT"
},
{
"version": "v2",
"created": "Tue, 4 Dec 2012 16:06:55 GMT"
},
{
"version": "v3",
"created": "Sun, 17 Feb 2013 08:53:06 GMT"
},
{
"version": "v4",
"created": "Fri, 31 May 2013 15:06:57 GMT"
}
] | 2013-08-19T00:00:00 | [
[
"Gillis",
"Nicolas",
""
]
] | TITLE: Robustness Analysis of Hottopixx, a Linear Programming Model for
Factoring Nonnegative Matrices
ABSTRACT: Although nonnegative matrix factorization (NMF) is NP-hard in general, it has
been shown very recently that it is tractable under the assumption that the
input nonnegative data matrix is close to being separable (separability
requires that all columns of the input matrix belongs to the cone spanned by a
small subset of these columns). Since then, several algorithms have been
designed to handle this subclass of NMF problems. In particular, Bittorf,
Recht, R\'e and Tropp (`Factoring nonnegative matrices with linear programs',
NIPS 2012) proposed a linear programming model, referred to as Hottopixx. In
this paper, we provide a new and more general robustness analysis of their
method. In particular, we design a provably more robust variant using a
post-processing strategy which allows us to deal with duplicates and near
duplicates in the dataset.
|
1207.3270 | Anastasios Skarlatidis | Anastasios Skarlatidis, Georgios Paliouras, Alexander Artikis, George
A. Vouros | Probabilistic Event Calculus for Event Recognition | null | null | null | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Symbolic event recognition systems have been successfully applied to a
variety of application domains, extracting useful information in the form of
events, allowing experts or other systems to monitor and respond when
significant events are recognised. In a typical event recognition application,
however, these systems often have to deal with a significant amount of
uncertainty. In this paper, we address the issue of uncertainty in logic-based
event recognition by extending the Event Calculus with probabilistic reasoning.
Markov Logic Networks are a natural candidate for our logic-based formalism.
However, the temporal semantics of the Event Calculus introduce a number of
challenges for the proposed model. We show how and under what assumptions we
can overcome these problems. Additionally, we study how probabilistic modelling
changes the behaviour of the formalism, affecting its key property, the inertia
of fluents. Furthermore, we demonstrate the advantages of the probabilistic
Event Calculus through examples and experiments in the domain of activity
recognition, using a publicly available dataset for video surveillance.
| [
{
"version": "v1",
"created": "Fri, 13 Jul 2012 14:57:35 GMT"
},
{
"version": "v2",
"created": "Thu, 15 Aug 2013 11:13:05 GMT"
}
] | 2013-08-16T00:00:00 | [
[
"Skarlatidis",
"Anastasios",
""
],
[
"Paliouras",
"Georgios",
""
],
[
"Artikis",
"Alexander",
""
],
[
"Vouros",
"George A.",
""
]
] | TITLE: Probabilistic Event Calculus for Event Recognition
ABSTRACT: Symbolic event recognition systems have been successfully applied to a
variety of application domains, extracting useful information in the form of
events, allowing experts or other systems to monitor and respond when
significant events are recognised. In a typical event recognition application,
however, these systems often have to deal with a significant amount of
uncertainty. In this paper, we address the issue of uncertainty in logic-based
event recognition by extending the Event Calculus with probabilistic reasoning.
Markov Logic Networks are a natural candidate for our logic-based formalism.
However, the temporal semantics of the Event Calculus introduce a number of
challenges for the proposed model. We show how and under what assumptions we
can overcome these problems. Additionally, we study how probabilistic modelling
changes the behaviour of the formalism, affecting its key property, the inertia
of fluents. Furthermore, we demonstrate the advantages of the probabilistic
Event Calculus through examples and experiments in the domain of activity
recognition, using a publicly available dataset for video surveillance.
|
1301.6314 | Yakir Reshef | David Reshef (1), Yakir Reshef (1), Michael Mitzenmacher (2), Pardis
Sabeti (2) (1, 2 - contributed equally) | Equitability Analysis of the Maximal Information Coefficient, with
Comparisons | 22 pages, 9 figures | null | null | null | cs.LG q-bio.QM stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A measure of dependence is said to be equitable if it gives similar scores to
equally noisy relationships of different types. Equitability is important in
data exploration when the goal is to identify a relatively small set of
strongest associations within a dataset as opposed to finding as many non-zero
associations as possible, which often are too many to sift through. Thus an
equitable statistic, such as the maximal information coefficient (MIC), can be
useful for analyzing high-dimensional data sets. Here, we explore both
equitability and the properties of MIC, and discuss several aspects of the
theory and practice of MIC. We begin by presenting an intuition behind the
equitability of MIC through the exploration of the maximization and
normalization steps in its definition. We then examine the speed and optimality
of the approximation algorithm used to compute MIC, and suggest some directions
for improving both. Finally, we demonstrate in a range of noise models and
sample sizes that MIC is more equitable than natural alternatives, such as
mutual information estimation and distance correlation.
| [
{
"version": "v1",
"created": "Sun, 27 Jan 2013 03:45:30 GMT"
},
{
"version": "v2",
"created": "Wed, 14 Aug 2013 20:51:50 GMT"
}
] | 2013-08-16T00:00:00 | [
[
"Reshef",
"David",
""
],
[
"Reshef",
"Yakir",
""
],
[
"Mitzenmacher",
"Michael",
""
],
[
"Sabeti",
"Pardis",
""
]
] | TITLE: Equitability Analysis of the Maximal Information Coefficient, with
Comparisons
ABSTRACT: A measure of dependence is said to be equitable if it gives similar scores to
equally noisy relationships of different types. Equitability is important in
data exploration when the goal is to identify a relatively small set of
strongest associations within a dataset as opposed to finding as many non-zero
associations as possible, which often are too many to sift through. Thus an
equitable statistic, such as the maximal information coefficient (MIC), can be
useful for analyzing high-dimensional data sets. Here, we explore both
equitability and the properties of MIC, and discuss several aspects of the
theory and practice of MIC. We begin by presenting an intuition behind the
equitability of MIC through the exploration of the maximization and
normalization steps in its definition. We then examine the speed and optimality
of the approximation algorithm used to compute MIC, and suggest some directions
for improving both. Finally, we demonstrate in a range of noise models and
sample sizes that MIC is more equitable than natural alternatives, such as
mutual information estimation and distance correlation.
|
1305.0596 | Taha Hasan | Taha Hassan, Fahad Javed and Naveed Arshad | An Empirical Investigation of V-I Trajectory based Load Signatures for
Non-Intrusive Load Monitoring | 11 pages, 11 figures. Under review for IEEE Transactions on Smart
Grid | null | 10.1109/TSG.2013.2271282 | null | cs.CE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Choice of load signature or feature space is one of the most fundamental
design choices for non-intrusive load monitoring or energy disaggregation
problem. Electrical power quantities, harmonic load characteristics, canonical
transient and steady-state waveforms are some of the typical choices of load
signature or load signature basis for current research addressing appliance
classification and prediction. This paper expands and evaluates appliance load
signatures based on V-I trajectory - the mutual locus of instantaneous voltage
and current waveforms - for precision and robustness of prediction in
classification algorithms used to disaggregate residential overall energy use
and predict constituent appliance profiles. We also demonstrate the use of
variants of differential evolution as a novel strategy for selection of optimal
load models in context of energy disaggregation. A publicly available benchmark
dataset REDD is employed for evaluation purposes. Our experimental evaluations
indicate that these load signatures, in conjunction with a number of popular
classification algorithms, offer better or generally comparable overall
precision of prediction, robustness and reliability against dynamic, noisy and
highly similar load signatures with reference to electrical power quantities
and harmonic content. Herein, wave-shape features are found to be an effective
new basis of classification and prediction for semi-automated energy
disaggregation and monitoring.
| [
{
"version": "v1",
"created": "Thu, 2 May 2013 23:32:00 GMT"
}
] | 2013-08-16T00:00:00 | [
[
"Hassan",
"Taha",
""
],
[
"Javed",
"Fahad",
""
],
[
"Arshad",
"Naveed",
""
]
] | TITLE: An Empirical Investigation of V-I Trajectory based Load Signatures for
Non-Intrusive Load Monitoring
ABSTRACT: Choice of load signature or feature space is one of the most fundamental
design choices for non-intrusive load monitoring or energy disaggregation
problem. Electrical power quantities, harmonic load characteristics, canonical
transient and steady-state waveforms are some of the typical choices of load
signature or load signature basis for current research addressing appliance
classification and prediction. This paper expands and evaluates appliance load
signatures based on V-I trajectory - the mutual locus of instantaneous voltage
and current waveforms - for precision and robustness of prediction in
classification algorithms used to disaggregate residential overall energy use
and predict constituent appliance profiles. We also demonstrate the use of
variants of differential evolution as a novel strategy for selection of optimal
load models in context of energy disaggregation. A publicly available benchmark
dataset REDD is employed for evaluation purposes. Our experimental evaluations
indicate that these load signatures, in conjunction with a number of popular
classification algorithms, offer better or generally comparable overall
precision of prediction, robustness and reliability against dynamic, noisy and
highly similar load signatures with reference to electrical power quantities
and harmonic content. Herein, wave-shape features are found to be an effective
new basis of classification and prediction for semi-automated energy
disaggregation and monitoring.
|
1307.7411 | Wajdi Dhifli Wajdi DHIFLI | Wajdi Dhifli, Mohamed Moussaoui, Rabie Saidi, Engelbert Mephu Nguifo | Towards an Efficient Discovery of the Topological Representative
Subgraphs | null | null | null | null | cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | With the emergence of graph databases, the task of frequent subgraph
discovery has been extensively addressed. Although the proposed approaches in
the literature have made this task feasible, the number of discovered frequent
subgraphs is still very high to be efficiently used in any further exploration.
Feature selection for graph data is a way to reduce the high number of frequent
subgraphs based on exact or approximate structural similarity. However, current
structural similarity strategies are not efficient enough in many real-world
applications, besides, the combinatorial nature of graphs makes it
computationally very costly. In order to select a smaller yet structurally
irredundant set of subgraphs, we propose a novel approach that mines the top-k
topological representative subgraphs among the frequent ones. Our approach
allows detecting hidden structural similarities that existing approaches are
unable to detect such as the density or the diameter of the subgraph. In
addition, it can be easily extended using any user defined structural or
topological attributes depending on the sought properties. Empirical studies on
real and synthetic graph datasets show that our approach is fast and scalable.
| [
{
"version": "v1",
"created": "Sun, 28 Jul 2013 22:17:40 GMT"
},
{
"version": "v2",
"created": "Tue, 13 Aug 2013 21:52:44 GMT"
},
{
"version": "v3",
"created": "Thu, 15 Aug 2013 00:28:30 GMT"
}
] | 2013-08-16T00:00:00 | [
[
"Dhifli",
"Wajdi",
""
],
[
"Moussaoui",
"Mohamed",
""
],
[
"Saidi",
"Rabie",
""
],
[
"Nguifo",
"Engelbert Mephu",
""
]
] | TITLE: Towards an Efficient Discovery of the Topological Representative
Subgraphs
ABSTRACT: With the emergence of graph databases, the task of frequent subgraph
discovery has been extensively addressed. Although the proposed approaches in
the literature have made this task feasible, the number of discovered frequent
subgraphs is still very high to be efficiently used in any further exploration.
Feature selection for graph data is a way to reduce the high number of frequent
subgraphs based on exact or approximate structural similarity. However, current
structural similarity strategies are not efficient enough in many real-world
applications, besides, the combinatorial nature of graphs makes it
computationally very costly. In order to select a smaller yet structurally
irredundant set of subgraphs, we propose a novel approach that mines the top-k
topological representative subgraphs among the frequent ones. Our approach
allows detecting hidden structural similarities that existing approaches are
unable to detect such as the density or the diameter of the subgraph. In
addition, it can be easily extended using any user defined structural or
topological attributes depending on the sought properties. Empirical studies on
real and synthetic graph datasets show that our approach is fast and scalable.
|
1306.6047 | Alex Rubinsteyn | Russell Power and Alex Rubinsteyn | How fast can we make interpreted Python? | Tech Report | null | null | null | cs.PL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Python is a popular dynamic language with a large part of its appeal coming
from powerful libraries and extension modules. These augment the language and
make it a productive environment for a wide variety of tasks, ranging from web
development (Django) to numerical analysis (NumPy). Unfortunately, Python's
performance is quite poor when compared to modern implementations of languages
such as Lua and JavaScript.
Why does Python lag so far behind these other languages? As we show, the very
same API and extension libraries that make Python a powerful language also make
it very difficult to efficiently execute. Given that we want to retain access
to the great extension libraries that already exist for Python, how fast can we
make it?
To evaluate this, we designed and implemented Falcon, a high-performance
bytecode interpreter fully compatible with the standard CPython interpreter.
Falcon applies a number of well known optimizations and introduces several new
techniques to speed up execution of Python bytecode. In our evaluation, we
found Falcon an average of 25% faster than the standard Python interpreter on
most benchmarks and in some cases about 2.5X faster.
| [
{
"version": "v1",
"created": "Tue, 25 Jun 2013 17:57:00 GMT"
},
{
"version": "v2",
"created": "Tue, 13 Aug 2013 20:29:34 GMT"
}
] | 2013-08-15T00:00:00 | [
[
"Power",
"Russell",
""
],
[
"Rubinsteyn",
"Alex",
""
]
] | TITLE: How fast can we make interpreted Python?
ABSTRACT: Python is a popular dynamic language with a large part of its appeal coming
from powerful libraries and extension modules. These augment the language and
make it a productive environment for a wide variety of tasks, ranging from web
development (Django) to numerical analysis (NumPy). Unfortunately, Python's
performance is quite poor when compared to modern implementations of languages
such as Lua and JavaScript.
Why does Python lag so far behind these other languages? As we show, the very
same API and extension libraries that make Python a powerful language also make
it very difficult to efficiently execute. Given that we want to retain access
to the great extension libraries that already exist for Python, how fast can we
make it?
To evaluate this, we designed and implemented Falcon, a high-performance
bytecode interpreter fully compatible with the standard CPython interpreter.
Falcon applies a number of well known optimizations and introduces several new
techniques to speed up execution of Python bytecode. In our evaluation, we
found Falcon an average of 25% faster than the standard Python interpreter on
most benchmarks and in some cases about 2.5X faster.
|
1204.0171 | Mete Ozay | Mete Ozay, Fatos T. Yarman Vural | A New Fuzzy Stacked Generalization Technique and Analysis of its
Performance | null | null | null | null | cs.LG cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this study, a new Stacked Generalization technique called Fuzzy Stacked
Generalization (FSG) is proposed to minimize the difference between N -sample
and large-sample classification error of the Nearest Neighbor classifier. The
proposed FSG employs a new hierarchical distance learning strategy to minimize
the error difference. For this purpose, we first construct an ensemble of
base-layer fuzzy k- Nearest Neighbor (k-NN) classifiers, each of which receives
a different feature set extracted from the same sample set. The fuzzy
membership values computed at the decision space of each fuzzy k-NN classifier
are concatenated to form the feature vectors of a fusion space. Finally, the
feature vectors are fed to a meta-layer classifier to learn the degree of
accuracy of the decisions of the base-layer classifiers for meta-layer
classification. Rather than the power of the individual base layer-classifiers,
diversity and cooperation of the classifiers become an important issue to
improve the overall performance of the proposed FSG. A weak base-layer
classifier may boost the overall performance more than a strong classifier, if
it is capable of recognizing the samples, which are not recognized by the rest
of the classifiers, in its own feature space. The experiments explore the type
of the collaboration among the individual classifiers required for an improved
performance of the suggested architecture. Experiments on multiple feature
real-world datasets show that the proposed FSG performs better than the state
of the art ensemble learning algorithms such as Adaboost, Random Subspace and
Rotation Forest. On the other hand, compatible performances are observed in the
experiments on single feature multi-attribute datasets.
| [
{
"version": "v1",
"created": "Sun, 1 Apr 2012 07:16:47 GMT"
},
{
"version": "v2",
"created": "Sun, 28 Oct 2012 19:32:21 GMT"
},
{
"version": "v3",
"created": "Tue, 30 Oct 2012 06:39:31 GMT"
},
{
"version": "v4",
"created": "Thu, 1 Nov 2012 14:53:55 GMT"
},
{
"version": "v5",
"created": "Mon, 12 Aug 2013 21:13:37 GMT"
}
] | 2013-08-14T00:00:00 | [
[
"Ozay",
"Mete",
""
],
[
"Vural",
"Fatos T. Yarman",
""
]
] | TITLE: A New Fuzzy Stacked Generalization Technique and Analysis of its
Performance
ABSTRACT: In this study, a new Stacked Generalization technique called Fuzzy Stacked
Generalization (FSG) is proposed to minimize the difference between N -sample
and large-sample classification error of the Nearest Neighbor classifier. The
proposed FSG employs a new hierarchical distance learning strategy to minimize
the error difference. For this purpose, we first construct an ensemble of
base-layer fuzzy k- Nearest Neighbor (k-NN) classifiers, each of which receives
a different feature set extracted from the same sample set. The fuzzy
membership values computed at the decision space of each fuzzy k-NN classifier
are concatenated to form the feature vectors of a fusion space. Finally, the
feature vectors are fed to a meta-layer classifier to learn the degree of
accuracy of the decisions of the base-layer classifiers for meta-layer
classification. Rather than the power of the individual base layer-classifiers,
diversity and cooperation of the classifiers become an important issue to
improve the overall performance of the proposed FSG. A weak base-layer
classifier may boost the overall performance more than a strong classifier, if
it is capable of recognizing the samples, which are not recognized by the rest
of the classifiers, in its own feature space. The experiments explore the type
of the collaboration among the individual classifiers required for an improved
performance of the suggested architecture. Experiments on multiple feature
real-world datasets show that the proposed FSG performs better than the state
of the art ensemble learning algorithms such as Adaboost, Random Subspace and
Rotation Forest. On the other hand, compatible performances are observed in the
experiments on single feature multi-attribute datasets.
|
1308.2166 | Kanat Tangwongsan | Kanat Tangwongsan, A. Pavan, and Srikanta Tirthapura | Parallel Triangle Counting in Massive Streaming Graphs | null | null | null | null | cs.DB cs.DC cs.DS cs.SI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The number of triangles in a graph is a fundamental metric, used in social
network analysis, link classification and recommendation, and more. Driven by
these applications and the trend that modern graph datasets are both large and
dynamic, we present the design and implementation of a fast and cache-efficient
parallel algorithm for estimating the number of triangles in a massive
undirected graph whose edges arrive as a stream. It brings together the
benefits of streaming algorithms and parallel algorithms. By building on the
streaming algorithms framework, the algorithm has a small memory footprint. By
leveraging the paralell cache-oblivious framework, it makes efficient use of
the memory hierarchy of modern multicore machines without needing to know its
specific parameters. We prove theoretical bounds on accuracy, memory access
cost, and parallel runtime complexity, as well as showing empirically that the
algorithm yields accurate results and substantial speedups compared to an
optimized sequential implementation.
(This is an expanded version of a CIKM'13 paper of the same title.)
| [
{
"version": "v1",
"created": "Fri, 9 Aug 2013 15:54:22 GMT"
}
] | 2013-08-12T00:00:00 | [
[
"Tangwongsan",
"Kanat",
""
],
[
"Pavan",
"A.",
""
],
[
"Tirthapura",
"Srikanta",
""
]
] | TITLE: Parallel Triangle Counting in Massive Streaming Graphs
ABSTRACT: The number of triangles in a graph is a fundamental metric, used in social
network analysis, link classification and recommendation, and more. Driven by
these applications and the trend that modern graph datasets are both large and
dynamic, we present the design and implementation of a fast and cache-efficient
parallel algorithm for estimating the number of triangles in a massive
undirected graph whose edges arrive as a stream. It brings together the
benefits of streaming algorithms and parallel algorithms. By building on the
streaming algorithms framework, the algorithm has a small memory footprint. By
leveraging the paralell cache-oblivious framework, it makes efficient use of
the memory hierarchy of modern multicore machines without needing to know its
specific parameters. We prove theoretical bounds on accuracy, memory access
cost, and parallel runtime complexity, as well as showing empirically that the
algorithm yields accurate results and substantial speedups compared to an
optimized sequential implementation.
(This is an expanded version of a CIKM'13 paper of the same title.)
|
1206.3614 | Carleton Coffrin | Carleton Coffrin, Pascal Van Hentenryck | A Linear-Programming Approximation of AC Power Flows | 13 pages | null | null | null | cs.AI math.OC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Linear active-power-only DC power flow approximations are pervasive in the
planning and control of power systems. However, these approximations fail to
capture reactive power and voltage magnitudes, both of which are necessary in
many applications to ensure voltage stability and AC power flow feasibility.
This paper proposes linear-programming models (the LPAC models) that
incorporate reactive power and voltage magnitudes in a linear power flow
approximation. The LPAC models are built on a convex approximation of the
cosine terms in the AC equations, as well as Taylor approximations of the
remaining nonlinear terms. Experimental comparisons with AC solutions on a
variety of standard IEEE and MatPower benchmarks show that the LPAC models
produce accurate values for active and reactive power, phase angles, and
voltage magnitudes. The potential benefits of the LPAC models are illustrated
on two "proof-of-concept" studies in power restoration and capacitor placement.
| [
{
"version": "v1",
"created": "Sat, 16 Jun 2012 00:10:07 GMT"
},
{
"version": "v2",
"created": "Tue, 11 Dec 2012 06:00:22 GMT"
},
{
"version": "v3",
"created": "Tue, 6 Aug 2013 04:29:35 GMT"
}
] | 2013-08-07T00:00:00 | [
[
"Coffrin",
"Carleton",
""
],
[
"Van Hentenryck",
"Pascal",
""
]
] | TITLE: A Linear-Programming Approximation of AC Power Flows
ABSTRACT: Linear active-power-only DC power flow approximations are pervasive in the
planning and control of power systems. However, these approximations fail to
capture reactive power and voltage magnitudes, both of which are necessary in
many applications to ensure voltage stability and AC power flow feasibility.
This paper proposes linear-programming models (the LPAC models) that
incorporate reactive power and voltage magnitudes in a linear power flow
approximation. The LPAC models are built on a convex approximation of the
cosine terms in the AC equations, as well as Taylor approximations of the
remaining nonlinear terms. Experimental comparisons with AC solutions on a
variety of standard IEEE and MatPower benchmarks show that the LPAC models
produce accurate values for active and reactive power, phase angles, and
voltage magnitudes. The potential benefits of the LPAC models are illustrated
on two "proof-of-concept" studies in power restoration and capacitor placement.
|
1301.5979 | Lijun Sun Mr | Lijun Sun, Kay W. Axhausen, Der-Horng Lee, Xianfeng Huang | Understanding metropolitan patterns of daily encounters | 7 pages, 3 figures | null | 10.1073/pnas.1306440110 | null | physics.soc-ph cs.SI physics.data-an | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Understanding of the mechanisms driving our daily face-to-face encounters is
still limited; the field lacks large-scale datasets describing both individual
behaviors and their collective interactions. However, here, with the help of
travel smart card data, we uncover such encounter mechanisms and structures by
constructing a time-resolved in-vehicle social encounter network on public
buses in a city (about 5 million residents). This is the first time that such a
large network of encounters has been identified and analyzed. Using a
population scale dataset, we find physical encounters display reproducible
temporal patterns, indicating that repeated encounters are regular and
identical. On an individual scale, we find that collective regularities
dominate distinct encounters' bounded nature. An individual's encounter
capability is rooted in his/her daily behavioral regularity, explaining the
emergence of "familiar strangers" in daily life. Strikingly, we find
individuals with repeated encounters are not grouped into small communities,
but become strongly connected over time, resulting in a large, but
imperceptible, small-world contact network or "structure of co-presence" across
the whole metropolitan area. Revealing the encounter pattern and identifying
this large-scale contact network are crucial to understanding the dynamics in
patterns of social acquaintances, collective human behaviors, and --
particularly -- disclosing the impact of human behavior on various
diffusion/spreading processes.
| [
{
"version": "v1",
"created": "Fri, 25 Jan 2013 08:25:14 GMT"
},
{
"version": "v2",
"created": "Wed, 27 Feb 2013 13:16:35 GMT"
},
{
"version": "v3",
"created": "Thu, 4 Jul 2013 05:35:07 GMT"
}
] | 2013-08-07T00:00:00 | [
[
"Sun",
"Lijun",
""
],
[
"Axhausen",
"Kay W.",
""
],
[
"Lee",
"Der-Horng",
""
],
[
"Huang",
"Xianfeng",
""
]
] | TITLE: Understanding metropolitan patterns of daily encounters
ABSTRACT: Understanding of the mechanisms driving our daily face-to-face encounters is
still limited; the field lacks large-scale datasets describing both individual
behaviors and their collective interactions. However, here, with the help of
travel smart card data, we uncover such encounter mechanisms and structures by
constructing a time-resolved in-vehicle social encounter network on public
buses in a city (about 5 million residents). This is the first time that such a
large network of encounters has been identified and analyzed. Using a
population scale dataset, we find physical encounters display reproducible
temporal patterns, indicating that repeated encounters are regular and
identical. On an individual scale, we find that collective regularities
dominate distinct encounters' bounded nature. An individual's encounter
capability is rooted in his/her daily behavioral regularity, explaining the
emergence of "familiar strangers" in daily life. Strikingly, we find
individuals with repeated encounters are not grouped into small communities,
but become strongly connected over time, resulting in a large, but
imperceptible, small-world contact network or "structure of co-presence" across
the whole metropolitan area. Revealing the encounter pattern and identifying
this large-scale contact network are crucial to understanding the dynamics in
patterns of social acquaintances, collective human behaviors, and --
particularly -- disclosing the impact of human behavior on various
diffusion/spreading processes.
|
1308.1118 | Guoqiong Liao | Guoqiong Liao, Yuchen Zhao, Sihong Xie, Philip S. Yu | Latent Networks Fusion based Model for Event Recommendation in Offline
Ephemeral Social Networks | Full version of ACM CIKM2013 paper | null | null | null | cs.SI physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | With the growing amount of mobile social media, offline ephemeral social
networks (OffESNs) are receiving more and more attentions. Offline ephemeral
social networks (OffESNs) are the networks created ad-hoc at a specific
location for a specific purpose and lasting for short period of time, relying
on mobile social media such as Radio Frequency Identification (RFID) and
Bluetooth devices. The primary purpose of people in the OffESNs is to acquire
and share information via attending prescheduled events. Event Recommendation
over this kind of networks can facilitate attendees on selecting the
prescheduled events and organizers on making resource planning. However,
because of lack of users preference and rating information, as well as explicit
social relations, both rating based traditional recommendation methods and
social-trust based recommendation methods can no longer work well to recommend
events in the OffESNs. To address the challenges such as how to derive users
latent preferences and social relations and how to fuse the latent information
in a unified model, we first construct two heterogeneous interaction social
networks, an event participation network and a physical proximity network.
Then, we use them to derive users latent preferences and latent networks on
social relations, including like-minded peers, co-attendees and friends.
Finally, we propose an LNF (Latent Networks Fusion) model under a pairwise
factor graph to infer event attendance probabilities for recommendation.
Experiments on an RFID-based real conference dataset have demonstrated the
effectiveness of the proposed model compared with typical solutions.
| [
{
"version": "v1",
"created": "Mon, 5 Aug 2013 21:00:08 GMT"
}
] | 2013-08-07T00:00:00 | [
[
"Liao",
"Guoqiong",
""
],
[
"Zhao",
"Yuchen",
""
],
[
"Xie",
"Sihong",
""
],
[
"Yu",
"Philip S.",
""
]
] | TITLE: Latent Networks Fusion based Model for Event Recommendation in Offline
Ephemeral Social Networks
ABSTRACT: With the growing amount of mobile social media, offline ephemeral social
networks (OffESNs) are receiving more and more attentions. Offline ephemeral
social networks (OffESNs) are the networks created ad-hoc at a specific
location for a specific purpose and lasting for short period of time, relying
on mobile social media such as Radio Frequency Identification (RFID) and
Bluetooth devices. The primary purpose of people in the OffESNs is to acquire
and share information via attending prescheduled events. Event Recommendation
over this kind of networks can facilitate attendees on selecting the
prescheduled events and organizers on making resource planning. However,
because of lack of users preference and rating information, as well as explicit
social relations, both rating based traditional recommendation methods and
social-trust based recommendation methods can no longer work well to recommend
events in the OffESNs. To address the challenges such as how to derive users
latent preferences and social relations and how to fuse the latent information
in a unified model, we first construct two heterogeneous interaction social
networks, an event participation network and a physical proximity network.
Then, we use them to derive users latent preferences and latent networks on
social relations, including like-minded peers, co-attendees and friends.
Finally, we propose an LNF (Latent Networks Fusion) model under a pairwise
factor graph to infer event attendance probabilities for recommendation.
Experiments on an RFID-based real conference dataset have demonstrated the
effectiveness of the proposed model compared with typical solutions.
|
1308.1126 | Wang-Q Lim | H. Lakshman, W.-Q Lim, H. Schwarz, D. Marpe, G. Kutyniok, and T.
Wiegand | Image interpolation using Shearlet based iterative refinement | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper proposes an image interpolation algorithm exploiting sparse
representation for natural images. It involves three main steps: (a) obtaining
an initial estimate of the high resolution image using linear methods like FIR
filtering, (b) promoting sparsity in a selected dictionary through iterative
thresholding, and (c) extracting high frequency information from the
approximation to refine the initial estimate. For the sparse modeling, a
shearlet dictionary is chosen to yield a multiscale directional representation.
The proposed algorithm is compared to several state-of-the-art methods to
assess its objective as well as subjective performance. Compared to the cubic
spline interpolation method, an average PSNR gain of around 0.8 dB is observed
over a dataset of 200 images.
| [
{
"version": "v1",
"created": "Mon, 5 Aug 2013 21:33:06 GMT"
}
] | 2013-08-07T00:00:00 | [
[
"Lakshman",
"H.",
""
],
[
"Lim",
"W. -Q",
""
],
[
"Schwarz",
"H.",
""
],
[
"Marpe",
"D.",
""
],
[
"Kutyniok",
"G.",
""
],
[
"Wiegand",
"T.",
""
]
] | TITLE: Image interpolation using Shearlet based iterative refinement
ABSTRACT: This paper proposes an image interpolation algorithm exploiting sparse
representation for natural images. It involves three main steps: (a) obtaining
an initial estimate of the high resolution image using linear methods like FIR
filtering, (b) promoting sparsity in a selected dictionary through iterative
thresholding, and (c) extracting high frequency information from the
approximation to refine the initial estimate. For the sparse modeling, a
shearlet dictionary is chosen to yield a multiscale directional representation.
The proposed algorithm is compared to several state-of-the-art methods to
assess its objective as well as subjective performance. Compared to the cubic
spline interpolation method, an average PSNR gain of around 0.8 dB is observed
over a dataset of 200 images.
|
1308.1150 | Ali Wali | Ali Wali and Adel M. Alimi | Multimodal Approach for Video Surveillance Indexing and Retrieval | 7 pages | Journal of Intelligent Computing, Volume: 1, Issue: 4 (December
2010), Page: 165-175 | null | null | cs.MM cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we present an overview of a multimodal system to indexing and
searching video sequence by the content that has been developed within the
REGIMVid project. A large part of our system has been developed as part of
TRECVideo evaluation. The MAVSIR platform provides High-level feature
extraction from audio-visual content and concept/event-based video retrieval.
We illustrate the architecture of the system as well as provide an overview of
the descriptors supported to date. Then we demonstrate the usefulness of the
toolbox in the context of feature extraction, concepts/events learning and
retrieval in large collections of video surveillance dataset. The results are
encouraging as we are able to get good results on several event categories,
while for all events we have gained valuable insights and experience.
| [
{
"version": "v1",
"created": "Tue, 6 Aug 2013 01:21:35 GMT"
}
] | 2013-08-07T00:00:00 | [
[
"Wali",
"Ali",
""
],
[
"Alimi",
"Adel M.",
""
]
] | TITLE: Multimodal Approach for Video Surveillance Indexing and Retrieval
ABSTRACT: In this paper, we present an overview of a multimodal system to indexing and
searching video sequence by the content that has been developed within the
REGIMVid project. A large part of our system has been developed as part of
TRECVideo evaluation. The MAVSIR platform provides High-level feature
extraction from audio-visual content and concept/event-based video retrieval.
We illustrate the architecture of the system as well as provide an overview of
the descriptors supported to date. Then we demonstrate the usefulness of the
toolbox in the context of feature extraction, concepts/events learning and
retrieval in large collections of video surveillance dataset. The results are
encouraging as we are able to get good results on several event categories,
while for all events we have gained valuable insights and experience.
|
1308.1224 | Aleksandar Stupar | Aleksandar Stupar and Sebastian Michel | Benchmarking Soundtrack Recommendation Systems with SRBench | Extended version of the CIKM 2013 paper: SRbench-A Benchmark for
Soundtrack Recommendation Systems | null | null | null | cs.IR cs.MM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this work, a benchmark to evaluate the retrieval performance of soundtrack
recommendation systems is proposed. Such systems aim at finding songs that are
played as background music for a given set of images. The proposed benchmark is
based on preference judgments, where relevance is considered a continuous
ordinal variable and judgments are collected for pairs of songs with respect to
a query (i.e., set of images). To capture a wide variety of songs and images,
we use a large space of possible music genres, different emotions expressed
through music, and various query-image themes. The benchmark consists of two
types of relevance assessments: (i) judgments obtained from a user study, that
serve as a "gold standard" for (ii) relevance judgments gathered through
Amazon's Mechanical Turk. We report on an analysis of relevance judgments based
on different levels of user agreement and investigate the performance of two
state-of-the-art soundtrack recommendation systems using the proposed
benchmark.
| [
{
"version": "v1",
"created": "Tue, 6 Aug 2013 10:10:22 GMT"
}
] | 2013-08-07T00:00:00 | [
[
"Stupar",
"Aleksandar",
""
],
[
"Michel",
"Sebastian",
""
]
] | TITLE: Benchmarking Soundtrack Recommendation Systems with SRBench
ABSTRACT: In this work, a benchmark to evaluate the retrieval performance of soundtrack
recommendation systems is proposed. Such systems aim at finding songs that are
played as background music for a given set of images. The proposed benchmark is
based on preference judgments, where relevance is considered a continuous
ordinal variable and judgments are collected for pairs of songs with respect to
a query (i.e., set of images). To capture a wide variety of songs and images,
we use a large space of possible music genres, different emotions expressed
through music, and various query-image themes. The benchmark consists of two
types of relevance assessments: (i) judgments obtained from a user study, that
serve as a "gold standard" for (ii) relevance judgments gathered through
Amazon's Mechanical Turk. We report on an analysis of relevance judgments based
on different levels of user agreement and investigate the performance of two
state-of-the-art soundtrack recommendation systems using the proposed
benchmark.
|
1308.0701 | Meisam Booshehri | Meisam Booshehri, Abbas Malekpour, Peter Luksch, Kamran Zamanifar,
Shahdad Shariatmadari | Ontology Enrichment by Extracting Hidden Assertional Knowledge from Text | 9 pages, International Journal of Computer Science and Information
Security | IJCSIS, 11(5), 64-72 | null | null | cs.IR cs.CL | http://creativecommons.org/licenses/by-nc-sa/3.0/ | In this position paper we present a new approach for discovering some special
classes of assertional knowledge in the text by using large RDF repositories,
resulting in the extraction of new non-taxonomic ontological relations. Also we
use inductive reasoning beside our approach to make it outperform. Then, we
prepare a case study by applying our approach on sample data and illustrate the
soundness of our proposed approach. Moreover in our point of view current LOD
cloud is not a suitable base for our proposal in all informational domains.
Therefore we figure out some directions based on prior works to enrich datasets
of Linked Data by using web mining. The result of such enrichment can be reused
for further relation extraction and ontology enrichment from unstructured free
text documents.
| [
{
"version": "v1",
"created": "Sat, 3 Aug 2013 14:30:55 GMT"
}
] | 2013-08-06T00:00:00 | [
[
"Booshehri",
"Meisam",
""
],
[
"Malekpour",
"Abbas",
""
],
[
"Luksch",
"Peter",
""
],
[
"Zamanifar",
"Kamran",
""
],
[
"Shariatmadari",
"Shahdad",
""
]
] | TITLE: Ontology Enrichment by Extracting Hidden Assertional Knowledge from Text
ABSTRACT: In this position paper we present a new approach for discovering some special
classes of assertional knowledge in the text by using large RDF repositories,
resulting in the extraction of new non-taxonomic ontological relations. Also we
use inductive reasoning beside our approach to make it outperform. Then, we
prepare a case study by applying our approach on sample data and illustrate the
soundness of our proposed approach. Moreover in our point of view current LOD
cloud is not a suitable base for our proposal in all informational domains.
Therefore we figure out some directions based on prior works to enrich datasets
of Linked Data by using web mining. The result of such enrichment can be reused
for further relation extraction and ontology enrichment from unstructured free
text documents.
|
1308.0749 | Sta\v{s}a Milojevi\'c | Sta\v{s}a Milojevi\'c | Accuracy of simple, initials-based methods for author name
disambiguation | In press in Journal of Informetrics | null | 10.1016/j.joi.2013.06.006 | null | cs.DL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | There are a number of solutions that perform unsupervised name disambiguation
based on the similarity of bibliographic records or common co-authorship
patterns. Whether the use of these advanced methods, which are often difficult
to implement, is warranted depends on whether the accuracy of the most basic
disambiguation methods, which only use the author's last name and initials, is
sufficient for a particular purpose. We derive realistic estimates for the
accuracy of simple, initials-based methods using simulated bibliographic
datasets in which the true identities of authors are known. Based on the
simulations in five diverse disciplines we find that the first initial method
already correctly identifies 97% of authors. An alternative simple method,
which takes all initials into account, is typically two times less accurate,
except in certain datasets that can be identified by applying a simple
criterion. Finally, we introduce a new name-based method that combines the
features of first initial and all initials methods by implicitly taking into
account the last name frequency and the size of the dataset. This hybrid method
reduces the fraction of incorrectly identified authors by 10-30% over the first
initial method.
| [
{
"version": "v1",
"created": "Sat, 3 Aug 2013 21:52:12 GMT"
}
] | 2013-08-06T00:00:00 | [
[
"Milojević",
"Staša",
""
]
] | TITLE: Accuracy of simple, initials-based methods for author name
disambiguation
ABSTRACT: There are a number of solutions that perform unsupervised name disambiguation
based on the similarity of bibliographic records or common co-authorship
patterns. Whether the use of these advanced methods, which are often difficult
to implement, is warranted depends on whether the accuracy of the most basic
disambiguation methods, which only use the author's last name and initials, is
sufficient for a particular purpose. We derive realistic estimates for the
accuracy of simple, initials-based methods using simulated bibliographic
datasets in which the true identities of authors are known. Based on the
simulations in five diverse disciplines we find that the first initial method
already correctly identifies 97% of authors. An alternative simple method,
which takes all initials into account, is typically two times less accurate,
except in certain datasets that can be identified by applying a simple
criterion. Finally, we introduce a new name-based method that combines the
features of first initial and all initials methods by implicitly taking into
account the last name frequency and the size of the dataset. This hybrid method
reduces the fraction of incorrectly identified authors by 10-30% over the first
initial method.
|
1308.1056 | Tiancheng Li | Tiancheng Li | A Gap between Simulation and Practice for Recursive Filters: On the
State Transition Noise | This is a short technical note pointing out a common unfair treatment
of the transition noise in the discrete simulation modeling for recursive
filters | null | null | null | cs.DM cs.SY | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In order to evaluate and compare different recursive filters, simulation is a
common tool and numerous simulation models are widely used as 'benchmark'. In
the simulation, the continuous time dynamic system is converted into a
discrete-time recursive system. As a result of this, the state indeed evolves
by Markov transitions in the simulation rather than in continuous time. One
significant issue involved with modeling of the system from practice to
simulation is that the simulation parameter, particularly e.g. the state Markov
transition noise, needs to match the iteration period of the filter. Otherwise,
the simulation performance may be far from the truth. Unfortunately, quite
commonly different-speed filters are evaluated and compared under the same
simulation model with the same state transition noise for simplicity regardless
of their real sampling periods. Here the note primarily aims at clarifying this
problem and point out that it is very necessary to use a proper simulation
noise that matches the filter's speed for evaluation and comparison under the
same simulation model.
| [
{
"version": "v1",
"created": "Mon, 5 Aug 2013 18:23:18 GMT"
}
] | 2013-08-06T00:00:00 | [
[
"Li",
"Tiancheng",
""
]
] | TITLE: A Gap between Simulation and Practice for Recursive Filters: On the
State Transition Noise
ABSTRACT: In order to evaluate and compare different recursive filters, simulation is a
common tool and numerous simulation models are widely used as 'benchmark'. In
the simulation, the continuous time dynamic system is converted into a
discrete-time recursive system. As a result of this, the state indeed evolves
by Markov transitions in the simulation rather than in continuous time. One
significant issue involved with modeling of the system from practice to
simulation is that the simulation parameter, particularly e.g. the state Markov
transition noise, needs to match the iteration period of the filter. Otherwise,
the simulation performance may be far from the truth. Unfortunately, quite
commonly different-speed filters are evaluated and compared under the same
simulation model with the same state transition noise for simplicity regardless
of their real sampling periods. Here the note primarily aims at clarifying this
problem and point out that it is very necessary to use a proper simulation
noise that matches the filter's speed for evaluation and comparison under the
same simulation model.
|
1301.6659 | Nima Mirbakhsh | Nima Mirbakhsh and Charles X. Ling | Clustering-Based Matrix Factorization | This paper has been withdrawn by the author due to crucial typo and
the poor grammatical text | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Recommender systems are emerging technologies that nowadays can be found in
many applications such as Amazon, Netflix, and so on. These systems help users
to find relevant information, recommendations, and their preferred items.
Slightly improvement of the accuracy of these recommenders can highly affect
the quality of recommendations. Matrix Factorization is a popular method in
Recommendation Systems showing promising results in accuracy and complexity. In
this paper we propose an extension of matrix factorization which adds general
neighborhood information on the recommendation model. Users and items are
clustered into different categories to see how these categories share
preferences. We then employ these shared interests of categories in a fusion by
Biased Matrix Factorization to achieve more accurate recommendations. This is a
complement for the current neighborhood aware matrix factorization models which
rely on using direct neighborhood information of users and items. The proposed
model is tested on two well-known recommendation system datasets: Movielens100k
and Netflix. Our experiment shows applying the general latent features of
categories into factorized recommender models improves the accuracy of
recommendations. The current neighborhood-aware models need a great number of
neighbors to acheive good accuracies. To the best of our knowledge, the
proposed model is better than or comparable with the current neighborhood-aware
models when they consider fewer number of neighbors.
| [
{
"version": "v1",
"created": "Mon, 28 Jan 2013 20:01:57 GMT"
},
{
"version": "v2",
"created": "Fri, 8 Feb 2013 22:16:44 GMT"
},
{
"version": "v3",
"created": "Wed, 27 Feb 2013 01:04:55 GMT"
},
{
"version": "v4",
"created": "Thu, 1 Aug 2013 22:06:49 GMT"
}
] | 2013-08-05T00:00:00 | [
[
"Mirbakhsh",
"Nima",
""
],
[
"Ling",
"Charles X.",
""
]
] | TITLE: Clustering-Based Matrix Factorization
ABSTRACT: Recommender systems are emerging technologies that nowadays can be found in
many applications such as Amazon, Netflix, and so on. These systems help users
to find relevant information, recommendations, and their preferred items.
Slightly improvement of the accuracy of these recommenders can highly affect
the quality of recommendations. Matrix Factorization is a popular method in
Recommendation Systems showing promising results in accuracy and complexity. In
this paper we propose an extension of matrix factorization which adds general
neighborhood information on the recommendation model. Users and items are
clustered into different categories to see how these categories share
preferences. We then employ these shared interests of categories in a fusion by
Biased Matrix Factorization to achieve more accurate recommendations. This is a
complement for the current neighborhood aware matrix factorization models which
rely on using direct neighborhood information of users and items. The proposed
model is tested on two well-known recommendation system datasets: Movielens100k
and Netflix. Our experiment shows applying the general latent features of
categories into factorized recommender models improves the accuracy of
recommendations. The current neighborhood-aware models need a great number of
neighbors to acheive good accuracies. To the best of our knowledge, the
proposed model is better than or comparable with the current neighborhood-aware
models when they consider fewer number of neighbors.
|
1308.0577 | Vincent Labatut | G\"unce Keziban Orman and Vincent Labatut and Hocine Cherifi | Towards realistic artificial benchmark for community detection
algorithms evaluation | null | International Journal of Web Based Communities, 9(3):349-370, 2013 | 10.1504/IJWBC.2013.054908 | null | cs.SI physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Assessing the partitioning performance of community detection algorithms is
one of the most important issues in complex network analysis. Artificially
generated networks are often used as benchmarks for this purpose. However,
previous studies showed their level of realism have a significant effect on the
algorithms performance. In this study, we adopt a thorough experimental
approach to tackle this problem and investigate this effect. To assess the
level of realism, we use consensual network topological properties. Based on
the LFR method, the most realistic generative method to date, we propose two
alternative random models to replace the Configuration Model originally used in
this algorithm, in order to increase its realism. Experimental results show
both modifications allow generating collections of community-structured
artificial networks whose topological properties are closer to those
encountered in real-world networks. Moreover, the results obtained with eleven
popular community identification algorithms on these benchmarks show their
performance decrease on more realistic networks.
| [
{
"version": "v1",
"created": "Fri, 2 Aug 2013 18:48:17 GMT"
}
] | 2013-08-05T00:00:00 | [
[
"Orman",
"Günce Keziban",
""
],
[
"Labatut",
"Vincent",
""
],
[
"Cherifi",
"Hocine",
""
]
] | TITLE: Towards realistic artificial benchmark for community detection
algorithms evaluation
ABSTRACT: Assessing the partitioning performance of community detection algorithms is
one of the most important issues in complex network analysis. Artificially
generated networks are often used as benchmarks for this purpose. However,
previous studies showed their level of realism have a significant effect on the
algorithms performance. In this study, we adopt a thorough experimental
approach to tackle this problem and investigate this effect. To assess the
level of realism, we use consensual network topological properties. Based on
the LFR method, the most realistic generative method to date, we propose two
alternative random models to replace the Configuration Model originally used in
this algorithm, in order to increase its realism. Experimental results show
both modifications allow generating collections of community-structured
artificial networks whose topological properties are closer to those
encountered in real-world networks. Moreover, the results obtained with eleven
popular community identification algorithms on these benchmarks show their
performance decrease on more realistic networks.
|
1202.2564 | Christoforos Anagnostopoulos Dr | David J. Hand, Christoforos Anagnostopoulos | A better Beta for the H measure of classification performance | Preprint. Keywords: supervised classification, classifier
performance, AUC, ROC curve, H measure | null | null | null | stat.ME cs.CV stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The area under the ROC curve is widely used as a measure of performance of
classification rules. However, it has recently been shown that the measure is
fundamentally incoherent, in the sense that it treats the relative severities
of misclassifications differently when different classifiers are used. To
overcome this, Hand (2009) proposed the $H$ measure, which allows a given
researcher to fix the distribution of relative severities to a
classifier-independent setting on a given problem. This note extends the
discussion, and proposes a modified standard distribution for the $H$ measure,
which better matches the requirements of researchers, in particular those faced
with heavily unbalanced datasets, the $Beta(\pi_1+1,\pi_0+1)$ distribution.
[Preprint submitted at Pattern Recognition Letters]
| [
{
"version": "v1",
"created": "Sun, 12 Feb 2012 20:32:15 GMT"
},
{
"version": "v2",
"created": "Thu, 1 Aug 2013 11:44:54 GMT"
}
] | 2013-08-02T00:00:00 | [
[
"Hand",
"David J.",
""
],
[
"Anagnostopoulos",
"Christoforos",
""
]
] | TITLE: A better Beta for the H measure of classification performance
ABSTRACT: The area under the ROC curve is widely used as a measure of performance of
classification rules. However, it has recently been shown that the measure is
fundamentally incoherent, in the sense that it treats the relative severities
of misclassifications differently when different classifiers are used. To
overcome this, Hand (2009) proposed the $H$ measure, which allows a given
researcher to fix the distribution of relative severities to a
classifier-independent setting on a given problem. This note extends the
discussion, and proposes a modified standard distribution for the $H$ measure,
which better matches the requirements of researchers, in particular those faced
with heavily unbalanced datasets, the $Beta(\pi_1+1,\pi_0+1)$ distribution.
[Preprint submitted at Pattern Recognition Letters]
|
1306.4149 | Rodrigo Aldecoa | Rodrigo Aldecoa and Ignacio Mar\'in | Exploring the limits of community detection strategies in complex
networks | 13 pages, 8 figures, 1 table. Scientific Reports (in press) | Scientific Reports 3, 2216 (2013) | 10.1038/srep02216 | null | physics.soc-ph cond-mat.stat-mech cs.SI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The characterization of network community structure has profound implications
in several scientific areas. Therefore, testing the algorithms developed to
establish the optimal division of a network into communities is a fundamental
problem in the field. We performed here a highly detailed evaluation of
community detection algorithms, which has two main novelties: 1) using complex
closed benchmarks, which provide precise ways to assess whether the solutions
generated by the algorithms are optimal; and, 2) A novel type of analysis,
based on hierarchically clustering the solutions suggested by multiple
community detection algorithms, which allows to easily visualize how different
are those solutions. Surprise, a global parameter that evaluates the quality of
a partition, confirms the power of these analyses. We show that none of the
community detection algorithms tested provide consistently optimal results in
all networks and that Surprise maximization, obtained by combining multiple
algorithms, obtains quasi-optimal performances in these difficult benchmarks.
| [
{
"version": "v1",
"created": "Tue, 18 Jun 2013 11:34:39 GMT"
}
] | 2013-08-02T00:00:00 | [
[
"Aldecoa",
"Rodrigo",
""
],
[
"Marín",
"Ignacio",
""
]
] | TITLE: Exploring the limits of community detection strategies in complex
networks
ABSTRACT: The characterization of network community structure has profound implications
in several scientific areas. Therefore, testing the algorithms developed to
establish the optimal division of a network into communities is a fundamental
problem in the field. We performed here a highly detailed evaluation of
community detection algorithms, which has two main novelties: 1) using complex
closed benchmarks, which provide precise ways to assess whether the solutions
generated by the algorithms are optimal; and, 2) A novel type of analysis,
based on hierarchically clustering the solutions suggested by multiple
community detection algorithms, which allows to easily visualize how different
are those solutions. Surprise, a global parameter that evaluates the quality of
a partition, confirms the power of these analyses. We show that none of the
community detection algorithms tested provide consistently optimal results in
all networks and that Surprise maximization, obtained by combining multiple
algorithms, obtains quasi-optimal performances in these difficult benchmarks.
|
1307.7795 | Aaron Darling | Ramanuja Simha and Hagit Shatkay | Protein (Multi-)Location Prediction: Using Location Inter-Dependencies
in a Probabilistic Framework | Peer-reviewed and presented as part of the 13th Workshop on
Algorithms in Bioinformatics (WABI2013) | null | null | null | q-bio.QM cs.CE cs.LG q-bio.GN | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Knowing the location of a protein within the cell is important for
understanding its function, role in biological processes, and potential use as
a drug target. Much progress has been made in developing computational methods
that predict single locations for proteins, assuming that proteins localize to
a single location. However, it has been shown that proteins localize to
multiple locations. While a few recent systems have attempted to predict
multiple locations of proteins, they typically treat locations as independent
or capture inter-dependencies by treating each locations-combination present in
the training set as an individual location-class. We present a new method and a
preliminary system we have developed that directly incorporates
inter-dependencies among locations into the multiple-location-prediction
process, using a collection of Bayesian network classifiers. We evaluate our
system on a dataset of single- and multi-localized proteins. Our results,
obtained by incorporating inter-dependencies are significantly higher than
those obtained by classifiers that do not use inter-dependencies. The
performance of our system on multi-localized proteins is comparable to a top
performing system (YLoc+), without restricting predictions to be based only on
location-combinations present in the training set.
| [
{
"version": "v1",
"created": "Tue, 30 Jul 2013 03:19:05 GMT"
}
] | 2013-08-02T00:00:00 | [
[
"Simha",
"Ramanuja",
""
],
[
"Shatkay",
"Hagit",
""
]
] | TITLE: Protein (Multi-)Location Prediction: Using Location Inter-Dependencies
in a Probabilistic Framework
ABSTRACT: Knowing the location of a protein within the cell is important for
understanding its function, role in biological processes, and potential use as
a drug target. Much progress has been made in developing computational methods
that predict single locations for proteins, assuming that proteins localize to
a single location. However, it has been shown that proteins localize to
multiple locations. While a few recent systems have attempted to predict
multiple locations of proteins, they typically treat locations as independent
or capture inter-dependencies by treating each locations-combination present in
the training set as an individual location-class. We present a new method and a
preliminary system we have developed that directly incorporates
inter-dependencies among locations into the multiple-location-prediction
process, using a collection of Bayesian network classifiers. We evaluate our
system on a dataset of single- and multi-localized proteins. Our results,
obtained by incorporating inter-dependencies are significantly higher than
those obtained by classifiers that do not use inter-dependencies. The
performance of our system on multi-localized proteins is comparable to a top
performing system (YLoc+), without restricting predictions to be based only on
location-combinations present in the training set.
|
1307.7824 | Aaron Darling | Sebastian B\"ocker, Stefan Canzar, and Gunnar W. Klau | The generalized Robinson-Foulds metric | Peer-reviewed and presented as part of the 13th Workshop on
Algorithms in Bioinformatics (WABI2013) | null | null | null | cs.DS cs.CE q-bio.QM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The Robinson-Foulds (RF) metric is arguably the most widely used measure of
phylogenetic tree similarity, despite its well-known shortcomings: For example,
moving a single taxon in a tree can result in a tree that has maximum distance
to the original one; but the two trees are identical if we remove the single
taxon. To this end, we propose a natural extension of the RF metric that does
not simply count identical clades but instead, also takes similar clades into
consideration. In contrast to previous approaches, our model requires the
matching between clades to respect the structure of the two trees, a property
that the classical RF metric exhibits, too. We show that computing this
generalized RF metric is, unfortunately, NP-hard. We then present a simple
Integer Linear Program for its computation, and evaluate it by an
all-against-all comparison of 100 trees from a benchmark data set. We find that
matchings that respect the tree structure differ significantly from those that
do not, underlining the importance of this natural condition.
| [
{
"version": "v1",
"created": "Tue, 30 Jul 2013 05:29:55 GMT"
}
] | 2013-08-02T00:00:00 | [
[
"Böcker",
"Sebastian",
""
],
[
"Canzar",
"Stefan",
""
],
[
"Klau",
"Gunnar W.",
""
]
] | TITLE: The generalized Robinson-Foulds metric
ABSTRACT: The Robinson-Foulds (RF) metric is arguably the most widely used measure of
phylogenetic tree similarity, despite its well-known shortcomings: For example,
moving a single taxon in a tree can result in a tree that has maximum distance
to the original one; but the two trees are identical if we remove the single
taxon. To this end, we propose a natural extension of the RF metric that does
not simply count identical clades but instead, also takes similar clades into
consideration. In contrast to previous approaches, our model requires the
matching between clades to respect the structure of the two trees, a property
that the classical RF metric exhibits, too. We show that computing this
generalized RF metric is, unfortunately, NP-hard. We then present a simple
Integer Linear Program for its computation, and evaluate it by an
all-against-all comparison of 100 trees from a benchmark data set. We find that
matchings that respect the tree structure differ significantly from those that
do not, underlining the importance of this natural condition.
|
1308.0148 | \"Omer Demirel | Omer Demirel and Ivo F. Sbalzarini | Balancing indivisible real-valued loads in arbitrary networks | 22 pages, 5 figures | null | null | null | cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In parallel computing, a problem is divided into a set of smaller tasks that
are distributed across multiple processing elements. Balancing the load of the
processing elements is key to achieving good performance and scalability. If
the computational costs of the individual tasks vary over time in an
unpredictable way, dynamic load balancing aims at migrating them between
processing elements so as to maintain load balance. During dynamic load
balancing, the tasks amount to indivisible work packets with a real-valued
cost. For this case of indivisible, real- valued loads, we analyze the
balancing circuit model, a local dynamic load-balancing scheme that does not
require global communication. We extend previous analyses to the present case
and provide a probabilistic bound for the achievable load balance. Based on an
analogy with the offline balls-into-bins problem, we further propose a novel
algorithm for dynamic balancing of indivisible, real-valued loads. We benchmark
the proposed algorithm in numerical experiments and compare it with the
classical greedy algorithm, both in terms of solution quality and communication
cost. We find that the increased communication cost of the proposed algorithm
is compensated by a higher solution quality, leading on average to about an
order of magnitude gain in overall performance.
| [
{
"version": "v1",
"created": "Thu, 1 Aug 2013 10:32:33 GMT"
}
] | 2013-08-02T00:00:00 | [
[
"Demirel",
"Omer",
""
],
[
"Sbalzarini",
"Ivo F.",
""
]
] | TITLE: Balancing indivisible real-valued loads in arbitrary networks
ABSTRACT: In parallel computing, a problem is divided into a set of smaller tasks that
are distributed across multiple processing elements. Balancing the load of the
processing elements is key to achieving good performance and scalability. If
the computational costs of the individual tasks vary over time in an
unpredictable way, dynamic load balancing aims at migrating them between
processing elements so as to maintain load balance. During dynamic load
balancing, the tasks amount to indivisible work packets with a real-valued
cost. For this case of indivisible, real- valued loads, we analyze the
balancing circuit model, a local dynamic load-balancing scheme that does not
require global communication. We extend previous analyses to the present case
and provide a probabilistic bound for the achievable load balance. Based on an
analogy with the offline balls-into-bins problem, we further propose a novel
algorithm for dynamic balancing of indivisible, real-valued loads. We benchmark
the proposed algorithm in numerical experiments and compare it with the
classical greedy algorithm, both in terms of solution quality and communication
cost. We find that the increased communication cost of the proposed algorithm
is compensated by a higher solution quality, leading on average to about an
order of magnitude gain in overall performance.
|
1308.0273 | Qiang Qiu | Qiang Qiu, Guillermo Sapiro | Learning Robust Subspace Clustering | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose a low-rank transformation-learning framework to robustify subspace
clustering. Many high-dimensional data, such as face images and motion
sequences, lie in a union of low-dimensional subspaces. The subspace clustering
problem has been extensively studied in the literature to partition such
high-dimensional data into clusters corresponding to their underlying
low-dimensional subspaces. However, low-dimensional intrinsic structures are
often violated for real-world observations, as they can be corrupted by errors
or deviate from ideal models. We propose to address this by learning a linear
transformation on subspaces using matrix rank, via its convex surrogate nuclear
norm, as the optimization criteria. The learned linear transformation restores
a low-rank structure for data from the same subspace, and, at the same time,
forces a high-rank structure for data from different subspaces. In this way, we
reduce variations within the subspaces, and increase separations between the
subspaces for more accurate subspace clustering. This proposed learned robust
subspace clustering framework significantly enhances the performance of
existing subspace clustering methods. To exploit the low-rank structures of the
transformed subspaces, we further introduce a subspace clustering technique,
called Robust Sparse Subspace Clustering, which efficiently combines robust PCA
with sparse modeling. We also discuss the online learning of the
transformation, and learning of the transformation while simultaneously
reducing the data dimensionality. Extensive experiments using public datasets
are presented, showing that the proposed approach significantly outperforms
state-of-the-art subspace clustering methods.
| [
{
"version": "v1",
"created": "Thu, 1 Aug 2013 17:31:37 GMT"
}
] | 2013-08-02T00:00:00 | [
[
"Qiu",
"Qiang",
""
],
[
"Sapiro",
"Guillermo",
""
]
] | TITLE: Learning Robust Subspace Clustering
ABSTRACT: We propose a low-rank transformation-learning framework to robustify subspace
clustering. Many high-dimensional data, such as face images and motion
sequences, lie in a union of low-dimensional subspaces. The subspace clustering
problem has been extensively studied in the literature to partition such
high-dimensional data into clusters corresponding to their underlying
low-dimensional subspaces. However, low-dimensional intrinsic structures are
often violated for real-world observations, as they can be corrupted by errors
or deviate from ideal models. We propose to address this by learning a linear
transformation on subspaces using matrix rank, via its convex surrogate nuclear
norm, as the optimization criteria. The learned linear transformation restores
a low-rank structure for data from the same subspace, and, at the same time,
forces a high-rank structure for data from different subspaces. In this way, we
reduce variations within the subspaces, and increase separations between the
subspaces for more accurate subspace clustering. This proposed learned robust
subspace clustering framework significantly enhances the performance of
existing subspace clustering methods. To exploit the low-rank structures of the
transformed subspaces, we further introduce a subspace clustering technique,
called Robust Sparse Subspace Clustering, which efficiently combines robust PCA
with sparse modeling. We also discuss the online learning of the
transformation, and learning of the transformation while simultaneously
reducing the data dimensionality. Extensive experiments using public datasets
are presented, showing that the proposed approach significantly outperforms
state-of-the-art subspace clustering methods.
|
1308.0275 | Qiang Qiu | Qiang Qiu, Guillermo Sapiro, Ching-Hui Chen | Domain-invariant Face Recognition using Learned Low-rank Transformation | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present a low-rank transformation approach to compensate for face
variations due to changes in visual domains, such as pose and illumination. The
key idea is to learn discriminative linear transformations for face images
using matrix rank as the optimization criteria. The learned linear
transformations restore a shared low-rank structure for faces from the same
subject, and, at the same time, force a high-rank structure for faces from
different subjects. In this way, among the transformed faces, we reduce
variations caused by domain changes within the classes, and increase
separations between the classes for better face recognition across domains.
Extensive experiments using public datasets are presented to demonstrate the
effectiveness of our approach for face recognition across domains. The
potential of the approach for feature extraction in generic object recognition
and coded aperture design are discussed as well.
| [
{
"version": "v1",
"created": "Thu, 1 Aug 2013 17:34:36 GMT"
}
] | 2013-08-02T00:00:00 | [
[
"Qiu",
"Qiang",
""
],
[
"Sapiro",
"Guillermo",
""
],
[
"Chen",
"Ching-Hui",
""
]
] | TITLE: Domain-invariant Face Recognition using Learned Low-rank Transformation
ABSTRACT: We present a low-rank transformation approach to compensate for face
variations due to changes in visual domains, such as pose and illumination. The
key idea is to learn discriminative linear transformations for face images
using matrix rank as the optimization criteria. The learned linear
transformations restore a shared low-rank structure for faces from the same
subject, and, at the same time, force a high-rank structure for faces from
different subjects. In this way, among the transformed faces, we reduce
variations caused by domain changes within the classes, and increase
separations between the classes for better face recognition across domains.
Extensive experiments using public datasets are presented to demonstrate the
effectiveness of our approach for face recognition across domains. The
potential of the approach for feature extraction in generic object recognition
and coded aperture design are discussed as well.
|
1302.0971 | Leon Abdillah | Leon Andretti Abdillah | Validasi data dengan menggunakan objek lookup pada borland delphi 7.0 | 16 pages | MATRIK. 7 (2005) 1-16 | null | null | cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Developing an application with some tables must concern the validation of
input (specially in Table Child). In order to maximize the accuracy and data
input validation. Its called lookup (took data from other dataset). There are
two ways to look up data from Table Parent: 1) Using Objects (DBLookupComboBox
and DBookupListBox), or 2) Arranging the properties of data types fields (shown
by using DBGrid). In this article is using Borland Delphi software (Inprise
product). The method is offered using 5 (five) practise steps: 1) Relational
Database Scheme, 2) Form Design, 3) Object DatabasesRelationships Scheme, 4)
Properties and Field Type Arrangement, and 5) Procedures. The result of this
paper are: 1) The relationship that using lookup objects are valid, and 2)
Delphi Lookup Objects can be used for 1-1, 1-N, and M-N relationship.
| [
{
"version": "v1",
"created": "Tue, 5 Feb 2013 09:32:54 GMT"
}
] | 2013-08-01T00:00:00 | [
[
"Abdillah",
"Leon Andretti",
""
]
] | TITLE: Validasi data dengan menggunakan objek lookup pada borland delphi 7.0
ABSTRACT: Developing an application with some tables must concern the validation of
input (specially in Table Child). In order to maximize the accuracy and data
input validation. Its called lookup (took data from other dataset). There are
two ways to look up data from Table Parent: 1) Using Objects (DBLookupComboBox
and DBookupListBox), or 2) Arranging the properties of data types fields (shown
by using DBGrid). In this article is using Borland Delphi software (Inprise
product). The method is offered using 5 (five) practise steps: 1) Relational
Database Scheme, 2) Form Design, 3) Object DatabasesRelationships Scheme, 4)
Properties and Field Type Arrangement, and 5) Procedures. The result of this
paper are: 1) The relationship that using lookup objects are valid, and 2)
Delphi Lookup Objects can be used for 1-1, 1-N, and M-N relationship.
|
1307.8136 | Brian Kent | Brian P. Kent, Alessandro Rinaldo, Timothy Verstynen | DeBaCl: A Python Package for Interactive DEnsity-BAsed CLustering | 28 pages, 9 figures, for associated software see
https://github.com/CoAxLab/DeBaCl | null | null | null | stat.ME cs.LG stat.ML | http://creativecommons.org/licenses/by/3.0/ | The level set tree approach of Hartigan (1975) provides a probabilistically
based and highly interpretable encoding of the clustering behavior of a
dataset. By representing the hierarchy of data modes as a dendrogram of the
level sets of a density estimator, this approach offers many advantages for
exploratory analysis and clustering, especially for complex and
high-dimensional data. Several R packages exist for level set tree estimation,
but their practical usefulness is limited by computational inefficiency,
absence of interactive graphical capabilities and, from a theoretical
perspective, reliance on asymptotic approximations. To make it easier for
practitioners to capture the advantages of level set trees, we have written the
Python package DeBaCl for DEnsity-BAsed CLustering. In this article we
illustrate how DeBaCl's level set tree estimates can be used for difficult
clustering tasks and interactive graphical data analysis. The package is
intended to promote the practical use of level set trees through improvements
in computational efficiency and a high degree of user customization. In
addition, the flexible algorithms implemented in DeBaCl enjoy finite sample
accuracy, as demonstrated in recent literature on density clustering. Finally,
we show the level set tree framework can be easily extended to deal with
functional data.
| [
{
"version": "v1",
"created": "Tue, 30 Jul 2013 20:19:26 GMT"
}
] | 2013-08-01T00:00:00 | [
[
"Kent",
"Brian P.",
""
],
[
"Rinaldo",
"Alessandro",
""
],
[
"Verstynen",
"Timothy",
""
]
] | TITLE: DeBaCl: A Python Package for Interactive DEnsity-BAsed CLustering
ABSTRACT: The level set tree approach of Hartigan (1975) provides a probabilistically
based and highly interpretable encoding of the clustering behavior of a
dataset. By representing the hierarchy of data modes as a dendrogram of the
level sets of a density estimator, this approach offers many advantages for
exploratory analysis and clustering, especially for complex and
high-dimensional data. Several R packages exist for level set tree estimation,
but their practical usefulness is limited by computational inefficiency,
absence of interactive graphical capabilities and, from a theoretical
perspective, reliance on asymptotic approximations. To make it easier for
practitioners to capture the advantages of level set trees, we have written the
Python package DeBaCl for DEnsity-BAsed CLustering. In this article we
illustrate how DeBaCl's level set tree estimates can be used for difficult
clustering tasks and interactive graphical data analysis. The package is
intended to promote the practical use of level set trees through improvements
in computational efficiency and a high degree of user customization. In
addition, the flexible algorithms implemented in DeBaCl enjoy finite sample
accuracy, as demonstrated in recent literature on density clustering. Finally,
we show the level set tree framework can be easily extended to deal with
functional data.
|
1307.8276 | Francesca Lo Cicero | Roberto Ammendola, Massimo Bernaschi, Andrea Biagioni, Mauro Bisson,
Massimiliano Fatica, Ottorino Frezza, Francesca Lo Cicero, Alessandro
Lonardo, Enrico Mastrostefano, Pier Stanislao Paolucci, Davide Rossetti,
Francesco Simula, Laura Tosoratto and Piero Vicini | GPU peer-to-peer techniques applied to a cluster interconnect | paper accepted to CASS 2013 | null | null | null | physics.comp-ph cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Modern GPUs support special protocols to exchange data directly across the
PCI Express bus. While these protocols could be used to reduce GPU data
transmission times, basically by avoiding staging to host memory, they require
specific hardware features which are not available on current generation
network adapters. In this paper we describe the architectural modifications
required to implement peer-to-peer access to NVIDIA Fermi- and Kepler-class
GPUs on an FPGA-based cluster interconnect. Besides, the current software
implementation, which integrates this feature by minimally extending the RDMA
programming model, is discussed, as well as some issues raised while employing
it in a higher level API like MPI. Finally, the current limits of the technique
are studied by analyzing the performance improvements on low-level benchmarks
and on two GPU-accelerated applications, showing when and how they seem to
benefit from the GPU peer-to-peer method.
| [
{
"version": "v1",
"created": "Wed, 31 Jul 2013 10:46:17 GMT"
}
] | 2013-08-01T00:00:00 | [
[
"Ammendola",
"Roberto",
""
],
[
"Bernaschi",
"Massimo",
""
],
[
"Biagioni",
"Andrea",
""
],
[
"Bisson",
"Mauro",
""
],
[
"Fatica",
"Massimiliano",
""
],
[
"Frezza",
"Ottorino",
""
],
[
"Cicero",
"Francesca Lo",
""
],
[
"Lonardo",
"Alessandro",
""
],
[
"Mastrostefano",
"Enrico",
""
],
[
"Paolucci",
"Pier Stanislao",
""
],
[
"Rossetti",
"Davide",
""
],
[
"Simula",
"Francesco",
""
],
[
"Tosoratto",
"Laura",
""
],
[
"Vicini",
"Piero",
""
]
] | TITLE: GPU peer-to-peer techniques applied to a cluster interconnect
ABSTRACT: Modern GPUs support special protocols to exchange data directly across the
PCI Express bus. While these protocols could be used to reduce GPU data
transmission times, basically by avoiding staging to host memory, they require
specific hardware features which are not available on current generation
network adapters. In this paper we describe the architectural modifications
required to implement peer-to-peer access to NVIDIA Fermi- and Kepler-class
GPUs on an FPGA-based cluster interconnect. Besides, the current software
implementation, which integrates this feature by minimally extending the RDMA
programming model, is discussed, as well as some issues raised while employing
it in a higher level API like MPI. Finally, the current limits of the technique
are studied by analyzing the performance improvements on low-level benchmarks
and on two GPU-accelerated applications, showing when and how they seem to
benefit from the GPU peer-to-peer method.
|
1307.8279 | Alireza Rezvanian | Somayeh Nabizadeh, Alireza Rezvanian, Mohammad Reza Meybodi | Tracking Extrema in Dynamic Environment using Multi-Swarm Cellular PSO
with Local Search | 8 pages, 3 figures | int j electron inform 1 (2012) 29-37 | null | null | cs.AI cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Many real-world phenomena can be modelled as dynamic optimization problems.
In such cases, the environment problem changes dynamically and therefore,
conventional methods are not capable of dealing with such problems. In this
paper, a novel multi-swarm cellular particle swarm optimization algorithm is
proposed by clustering and local search. In the proposed algorithm, the search
space is partitioned into cells, while the particles identify changes in the
search space and form clusters to create sub-swarms. Then a local search is
applied to improve the solutions in the each cell. Simulation results for
static standard benchmarks and dynamic environments show superiority of the
proposed method over other alternative approaches.
| [
{
"version": "v1",
"created": "Wed, 31 Jul 2013 10:57:47 GMT"
}
] | 2013-08-01T00:00:00 | [
[
"Nabizadeh",
"Somayeh",
""
],
[
"Rezvanian",
"Alireza",
""
],
[
"Meybodi",
"Mohammad Reza",
""
]
] | TITLE: Tracking Extrema in Dynamic Environment using Multi-Swarm Cellular PSO
with Local Search
ABSTRACT: Many real-world phenomena can be modelled as dynamic optimization problems.
In such cases, the environment problem changes dynamically and therefore,
conventional methods are not capable of dealing with such problems. In this
paper, a novel multi-swarm cellular particle swarm optimization algorithm is
proposed by clustering and local search. In the proposed algorithm, the search
space is partitioned into cells, while the particles identify changes in the
search space and form clusters to create sub-swarms. Then a local search is
applied to improve the solutions in the each cell. Simulation results for
static standard benchmarks and dynamic environments show superiority of the
proposed method over other alternative approaches.
|
1307.8305 | Tobias Glasmachers | Tobias Glasmachers | The Planning-ahead SMO Algorithm | null | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The sequential minimal optimization (SMO) algorithm and variants thereof are
the de facto standard method for solving large quadratic programs for support
vector machine (SVM) training. In this paper we propose a simple yet powerful
modification. The main emphasis is on an algorithm improving the SMO step size
by planning-ahead. The theoretical analysis ensures its convergence to the
optimum. Experiments involving a large number of datasets were carried out to
demonstrate the superiority of the new algorithm.
| [
{
"version": "v1",
"created": "Wed, 31 Jul 2013 12:38:20 GMT"
}
] | 2013-08-01T00:00:00 | [
[
"Glasmachers",
"Tobias",
""
]
] | TITLE: The Planning-ahead SMO Algorithm
ABSTRACT: The sequential minimal optimization (SMO) algorithm and variants thereof are
the de facto standard method for solving large quadratic programs for support
vector machine (SVM) training. In this paper we propose a simple yet powerful
modification. The main emphasis is on an algorithm improving the SMO step size
by planning-ahead. The theoretical analysis ensures its convergence to the
optimum. Experiments involving a large number of datasets were carried out to
demonstrate the superiority of the new algorithm.
|
1307.8405 | Jinyun Yan | Zixuan Wang, Jinyun Yan | Who and Where: People and Location Co-Clustering | 2013 IEEE International Conference on Image Processing | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we consider the clustering problem on images where each image
contains patches in people and location domains. We exploit the correlation
between people and location domains, and proposed a semi-supervised
co-clustering algorithm to cluster images. Our algorithm updates the
correlation links at the runtime, and produces clustering in both domains
simultaneously. We conduct experiments in a manually collected dataset and a
Flickr dataset. The result shows that the such correlation improves the
clustering performance.
| [
{
"version": "v1",
"created": "Wed, 31 Jul 2013 17:53:10 GMT"
}
] | 2013-08-01T00:00:00 | [
[
"Wang",
"Zixuan",
""
],
[
"Yan",
"Jinyun",
""
]
] | TITLE: Who and Where: People and Location Co-Clustering
ABSTRACT: In this paper, we consider the clustering problem on images where each image
contains patches in people and location domains. We exploit the correlation
between people and location domains, and proposed a semi-supervised
co-clustering algorithm to cluster images. Our algorithm updates the
correlation links at the runtime, and produces clustering in both domains
simultaneously. We conduct experiments in a manually collected dataset and a
Flickr dataset. The result shows that the such correlation improves the
clustering performance.
|
1307.8430 | Bryan Conroy | Bryan R. Conroy, Jennifer M. Walz, Brian Cheung, Paul Sajda | Fast Simultaneous Training of Generalized Linear Models (FaSTGLZ) | null | null | null | null | cs.LG stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present an efficient algorithm for simultaneously training sparse
generalized linear models across many related problems, which may arise from
bootstrapping, cross-validation and nonparametric permutation testing. Our
approach leverages the redundancies across problems to obtain significant
computational improvements relative to solving the problems sequentially by a
conventional algorithm. We demonstrate our fast simultaneous training of
generalized linear models (FaSTGLZ) algorithm on a number of real-world
datasets, and we run otherwise computationally intensive bootstrapping and
permutation test analyses that are typically necessary for obtaining
statistically rigorous classification results and meaningful interpretation.
Code is freely available at http://liinc.bme.columbia.edu/fastglz.
| [
{
"version": "v1",
"created": "Wed, 31 Jul 2013 19:18:11 GMT"
}
] | 2013-08-01T00:00:00 | [
[
"Conroy",
"Bryan R.",
""
],
[
"Walz",
"Jennifer M.",
""
],
[
"Cheung",
"Brian",
""
],
[
"Sajda",
"Paul",
""
]
] | TITLE: Fast Simultaneous Training of Generalized Linear Models (FaSTGLZ)
ABSTRACT: We present an efficient algorithm for simultaneously training sparse
generalized linear models across many related problems, which may arise from
bootstrapping, cross-validation and nonparametric permutation testing. Our
approach leverages the redundancies across problems to obtain significant
computational improvements relative to solving the problems sequentially by a
conventional algorithm. We demonstrate our fast simultaneous training of
generalized linear models (FaSTGLZ) algorithm on a number of real-world
datasets, and we run otherwise computationally intensive bootstrapping and
permutation test analyses that are typically necessary for obtaining
statistically rigorous classification results and meaningful interpretation.
Code is freely available at http://liinc.bme.columbia.edu/fastglz.
|
1307.6716 | Sadegh Esmaeil Zadeh Soudjani | Sadegh Esmaeil Zadeh Soudjani and Alessandro Abate | Aggregation and Control of Populations of Thermostatically Controlled
Loads by Formal Abstractions | 40 pages, 21 figures; the paper generalizes the result of conference
publication: S. Esmaeil Zadeh Soudjani and A. Abate, "Aggregation of
Thermostatically Controlled Loads by Formal Abstractions," Proceedings of the
European Control Conference 2013, pp. 4232-4237. version 2: added references
for section 1 | null | null | null | cs.SY math.OC math.PR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This work discusses a two-step procedure, based on formal abstractions, to
generate a finite-space stochastic dynamical model as an aggregation of the
continuous temperature dynamics of a homogeneous population of Thermostatically
Controlled Loads (TCL). The temperature of a single TCL is described by a
stochastic difference equation and the TCL status (ON, OFF) by a deterministic
switching mechanism. The procedure is formal as it allows the exact
quantification of the error introduced by the abstraction -- as such it builds
and improves on a known, earlier approximation technique in the literature.
Further, the contribution discusses the extension to the case of a
heterogeneous population of TCL by means of two approaches resulting in the
notion of approximate abstractions. It moreover investigates the problem of
global (population-level) regulation and load balancing for the case of TCL
that are dependent on a control input. The procedure is tested on a case study
and benchmarked against the mentioned alternative approach in the literature.
| [
{
"version": "v1",
"created": "Thu, 25 Jul 2013 12:25:29 GMT"
},
{
"version": "v2",
"created": "Tue, 30 Jul 2013 09:27:38 GMT"
}
] | 2013-07-31T00:00:00 | [
[
"Soudjani",
"Sadegh Esmaeil Zadeh",
""
],
[
"Abate",
"Alessandro",
""
]
] | TITLE: Aggregation and Control of Populations of Thermostatically Controlled
Loads by Formal Abstractions
ABSTRACT: This work discusses a two-step procedure, based on formal abstractions, to
generate a finite-space stochastic dynamical model as an aggregation of the
continuous temperature dynamics of a homogeneous population of Thermostatically
Controlled Loads (TCL). The temperature of a single TCL is described by a
stochastic difference equation and the TCL status (ON, OFF) by a deterministic
switching mechanism. The procedure is formal as it allows the exact
quantification of the error introduced by the abstraction -- as such it builds
and improves on a known, earlier approximation technique in the literature.
Further, the contribution discusses the extension to the case of a
heterogeneous population of TCL by means of two approaches resulting in the
notion of approximate abstractions. It moreover investigates the problem of
global (population-level) regulation and load balancing for the case of TCL
that are dependent on a control input. The procedure is tested on a case study
and benchmarked against the mentioned alternative approach in the literature.
|
1307.7943 | Zhen Jia | Zhen Jia, Runlin Zhou, Chunge Zhu, Lei Wang, Wanling Gao, Yingjie Shi,
Jianfeng Zhan, Lixin Zhang | The Implications of Diverse Applications and Scalable Data Sets in
Benchmarking Big Data Systems | 16 pages, 3 figures | null | null | null | cs.PF | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Now we live in an era of big data, and big data applications are becoming
more and more pervasive. How to benchmark data center computer systems running
big data applications (in short big data systems) is a hot topic. In this
paper, we focus on measuring the performance impacts of diverse applications
and scalable volumes of data sets on big data systems. For four typical data
analysis applications---an important class of big data applications, we find
two major results through experiments: first, the data scale has a significant
impact on the performance of big data systems, so we must provide scalable
volumes of data sets in big data benchmarks. Second, for the four applications,
even all of them use the simple algorithms, the performance trends are
different with increasing data scales, and hence we must consider not only
variety of data sets but also variety of applications in benchmarking big data
systems.
| [
{
"version": "v1",
"created": "Tue, 30 Jul 2013 12:34:49 GMT"
}
] | 2013-07-31T00:00:00 | [
[
"Jia",
"Zhen",
""
],
[
"Zhou",
"Runlin",
""
],
[
"Zhu",
"Chunge",
""
],
[
"Wang",
"Lei",
""
],
[
"Gao",
"Wanling",
""
],
[
"Shi",
"Yingjie",
""
],
[
"Zhan",
"Jianfeng",
""
],
[
"Zhang",
"Lixin",
""
]
] | TITLE: The Implications of Diverse Applications and Scalable Data Sets in
Benchmarking Big Data Systems
ABSTRACT: Now we live in an era of big data, and big data applications are becoming
more and more pervasive. How to benchmark data center computer systems running
big data applications (in short big data systems) is a hot topic. In this
paper, we focus on measuring the performance impacts of diverse applications
and scalable volumes of data sets on big data systems. For four typical data
analysis applications---an important class of big data applications, we find
two major results through experiments: first, the data scale has a significant
impact on the performance of big data systems, so we must provide scalable
volumes of data sets in big data benchmarks. Second, for the four applications,
even all of them use the simple algorithms, the performance trends are
different with increasing data scales, and hence we must consider not only
variety of data sets but also variety of applications in benchmarking big data
systems.
|
1307.8013 | Zhen Jia | Zhen Jia, Lei Wang, Jianfeng Zhan, Lixin Zhang, Chunjie Luo | Characterizing Data Analysis Workloads in Data Centers | 11 pages, 12 figures, IISWC2013 | null | null | null | cs.PF | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | As the amount of data explodes rapidly, more and more corporations are using
data centers to make effective decisions and gain a competitive edge. Data
analysis applications play a significant role in data centers, and hence it has
became increasingly important to understand their behaviors in order to further
improve the performance of data center computer systems. In this paper, after
investigating three most important application domains in terms of page views
and daily visitors, we choose eleven representative data analysis workloads and
characterize their micro-architectural characteristics by using hardware
performance counters, in order to understand the impacts and implications of
data analysis workloads on the systems equipped with modern superscalar
out-of-order processors. Our study on the workloads reveals that data analysis
applications share many inherent characteristics, which place them in a
different class from desktop (SPEC CPU2006), HPC (HPCC), and service workloads,
including traditional server workloads (SPECweb2005) and scale-out service
workloads (four among six benchmarks in CloudSuite), and accordingly we give
several recommendations for architecture and system optimizations. On the basis
of our workload characterization work, we released a benchmark suite named
DCBench for typical datacenter workloads, including data analysis and service
workloads, with an open-source license on our project home page on
http://prof.ict.ac.cn/DCBench. We hope that DCBench is helpful for performing
architecture and small-to-medium scale system researches for datacenter
computing.
| [
{
"version": "v1",
"created": "Tue, 30 Jul 2013 15:23:25 GMT"
}
] | 2013-07-31T00:00:00 | [
[
"Jia",
"Zhen",
""
],
[
"Wang",
"Lei",
""
],
[
"Zhan",
"Jianfeng",
""
],
[
"Zhang",
"Lixin",
""
],
[
"Luo",
"Chunjie",
""
]
] | TITLE: Characterizing Data Analysis Workloads in Data Centers
ABSTRACT: As the amount of data explodes rapidly, more and more corporations are using
data centers to make effective decisions and gain a competitive edge. Data
analysis applications play a significant role in data centers, and hence it has
became increasingly important to understand their behaviors in order to further
improve the performance of data center computer systems. In this paper, after
investigating three most important application domains in terms of page views
and daily visitors, we choose eleven representative data analysis workloads and
characterize their micro-architectural characteristics by using hardware
performance counters, in order to understand the impacts and implications of
data analysis workloads on the systems equipped with modern superscalar
out-of-order processors. Our study on the workloads reveals that data analysis
applications share many inherent characteristics, which place them in a
different class from desktop (SPEC CPU2006), HPC (HPCC), and service workloads,
including traditional server workloads (SPECweb2005) and scale-out service
workloads (four among six benchmarks in CloudSuite), and accordingly we give
several recommendations for architecture and system optimizations. On the basis
of our workload characterization work, we released a benchmark suite named
DCBench for typical datacenter workloads, including data analysis and service
workloads, with an open-source license on our project home page on
http://prof.ict.ac.cn/DCBench. We hope that DCBench is helpful for performing
architecture and small-to-medium scale system researches for datacenter
computing.
|
1304.3138 | Fran\c{c}ois-Michel De Rainville | Fran\c{c}ois-Michel De Rainville, Mich\`ele Sebag, Christian Gagn\'e,
Marc Schoenauer, Denis Laurendeau | Sustainable Cooperative Coevolution with a Multi-Armed Bandit | Accepted at GECCO 2013 | null | 10.1145/2463372.2463556 | null | cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper proposes a self-adaptation mechanism to manage the resources
allocated to the different species comprising a cooperative coevolutionary
algorithm. The proposed approach relies on a dynamic extension to the
well-known multi-armed bandit framework. At each iteration, the dynamic
multi-armed bandit makes a decision on which species to evolve for a
generation, using the history of progress made by the different species to
guide the decisions. We show experimentally, on a benchmark and a real-world
problem, that evolving the different populations at different paces allows not
only to identify solutions more rapidly, but also improves the capacity of
cooperative coevolution to solve more complex problems.
| [
{
"version": "v1",
"created": "Wed, 10 Apr 2013 20:24:31 GMT"
}
] | 2013-07-30T00:00:00 | [
[
"De Rainville",
"François-Michel",
""
],
[
"Sebag",
"Michèle",
""
],
[
"Gagné",
"Christian",
""
],
[
"Schoenauer",
"Marc",
""
],
[
"Laurendeau",
"Denis",
""
]
] | TITLE: Sustainable Cooperative Coevolution with a Multi-Armed Bandit
ABSTRACT: This paper proposes a self-adaptation mechanism to manage the resources
allocated to the different species comprising a cooperative coevolutionary
algorithm. The proposed approach relies on a dynamic extension to the
well-known multi-armed bandit framework. At each iteration, the dynamic
multi-armed bandit makes a decision on which species to evolve for a
generation, using the history of progress made by the different species to
guide the decisions. We show experimentally, on a benchmark and a real-world
problem, that evolving the different populations at different paces allows not
only to identify solutions more rapidly, but also improves the capacity of
cooperative coevolution to solve more complex problems.
|
1306.0573 | Navtej Singh | Navtej Singh, Lisa-Marie Browne, Ray Butler | Parallel Astronomical Data Processing with Python: Recipes for multicore
machines | 15 pages, 7 figures, 1 table, "for associated test code, see
http://astro.nuigalway.ie/staff/navtejs", Accepted for publication in
Astronomy and Computing | null | 10.1016/j.ascom.2013.04.002 | null | astro-ph.IM cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | High performance computing has been used in various fields of astrophysical
research. But most of it is implemented on massively parallel systems
(supercomputers) or graphical processing unit clusters. With the advent of
multicore processors in the last decade, many serial software codes have been
re-implemented in parallel mode to utilize the full potential of these
processors. In this paper, we propose parallel processing recipes for multicore
machines for astronomical data processing. The target audience are astronomers
who are using Python as their preferred scripting language and who may be using
PyRAF/IRAF for data processing. Three problems of varied complexity were
benchmarked on three different types of multicore processors to demonstrate the
benefits, in terms of execution time, of parallelizing data processing tasks.
The native multiprocessing module available in Python makes it a relatively
trivial task to implement the parallel code. We have also compared the three
multiprocessing approaches - Pool/Map, Process/Queue, and Parallel Python. Our
test codes are freely available and can be downloaded from our website.
| [
{
"version": "v1",
"created": "Mon, 3 Jun 2013 20:00:04 GMT"
}
] | 2013-07-30T00:00:00 | [
[
"Singh",
"Navtej",
""
],
[
"Browne",
"Lisa-Marie",
""
],
[
"Butler",
"Ray",
""
]
] | TITLE: Parallel Astronomical Data Processing with Python: Recipes for multicore
machines
ABSTRACT: High performance computing has been used in various fields of astrophysical
research. But most of it is implemented on massively parallel systems
(supercomputers) or graphical processing unit clusters. With the advent of
multicore processors in the last decade, many serial software codes have been
re-implemented in parallel mode to utilize the full potential of these
processors. In this paper, we propose parallel processing recipes for multicore
machines for astronomical data processing. The target audience are astronomers
who are using Python as their preferred scripting language and who may be using
PyRAF/IRAF for data processing. Three problems of varied complexity were
benchmarked on three different types of multicore processors to demonstrate the
benefits, in terms of execution time, of parallelizing data processing tasks.
The native multiprocessing module available in Python makes it a relatively
trivial task to implement the parallel code. We have also compared the three
multiprocessing approaches - Pool/Map, Process/Queue, and Parallel Python. Our
test codes are freely available and can be downloaded from our website.
|
1307.7464 | Sharath Chandra Guntuku | Sharath Chandra Guntuku, Pratik Narang, Chittaranjan Hota | Real-time Peer-to-Peer Botnet Detection Framework based on Bayesian
Regularized Neural Network | null | null | null | null | cs.NI cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Over the past decade, the Cyberspace has seen an increasing number of attacks
coming from botnets using the Peer-to-Peer (P2P) architecture. Peer-to-Peer
botnets use a decentralized Command & Control architecture. Moreover, a large
number of such botnets already exist, and newer versions- which significantly
differ from their parent bot- are also discovered practically every year. In
this work, the authors propose and implement a novel hybrid framework for
detecting P2P botnets in live network traffic by integrating Neural Networks
with Bayesian Regularization. Bayesian Regularization helps in achieving better
generalization of the dataset, thereby enabling the detection of botnet
activity even of those bots which were never used in training the Neural
Network. Hence such a framework is suitable for detection of newer and unseen
botnets in live traffic of a network. This was verified by testing the
Framework on test data unseen to the Detection module (using untrained botnet
dataset), and the authors were successful in detecting this activity with an
accuracy of 99.2 %.
| [
{
"version": "v1",
"created": "Mon, 29 Jul 2013 05:21:37 GMT"
}
] | 2013-07-30T00:00:00 | [
[
"Guntuku",
"Sharath Chandra",
""
],
[
"Narang",
"Pratik",
""
],
[
"Hota",
"Chittaranjan",
""
]
] | TITLE: Real-time Peer-to-Peer Botnet Detection Framework based on Bayesian
Regularized Neural Network
ABSTRACT: Over the past decade, the Cyberspace has seen an increasing number of attacks
coming from botnets using the Peer-to-Peer (P2P) architecture. Peer-to-Peer
botnets use a decentralized Command & Control architecture. Moreover, a large
number of such botnets already exist, and newer versions- which significantly
differ from their parent bot- are also discovered practically every year. In
this work, the authors propose and implement a novel hybrid framework for
detecting P2P botnets in live network traffic by integrating Neural Networks
with Bayesian Regularization. Bayesian Regularization helps in achieving better
generalization of the dataset, thereby enabling the detection of botnet
activity even of those bots which were never used in training the Neural
Network. Hence such a framework is suitable for detection of newer and unseen
botnets in live traffic of a network. This was verified by testing the
Framework on test data unseen to the Detection module (using untrained botnet
dataset), and the authors were successful in detecting this activity with an
accuracy of 99.2 %.
|
1307.6889 | Nicholas Magliocca | N. R. Magliocca (1), E. C. Ellis (1), T. Oates (2) and M. Schmill (2)
((1) Department of Geography and Environmental Systems, University of
Maryland, Baltimore County, Baltimore, Maryland, USA,(2) Department of
Computer Science and Electrical Engineering, University of Maryland,
Baltimore County, Baltimore, Maryland, USA) | Contextualizing the global relevance of local land change observations | 5 pages, 4 figures, white paper | null | null | null | stat.AP cs.CY physics.ao-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | To understand global changes in the Earth system, scientists must generalize
globally from observations made locally and regionally. In land change science
(LCS), local field-based observations are costly and time consuming, and
generally obtained by researchers working at disparate local and regional
case-study sites chosen for different reasons. As a result, global synthesis
efforts in LCS tend to be based on non-statistical inferences subject to
geographic biases stemming from data limitations and fragmentation. Thus, a
fundamental challenge is the production of generalized knowledge that links
evidence of the causes and consequences of local land change to global patterns
and vice versa. The GLOBE system was designed to meet this challenge. GLOBE
aims to transform global change science by enabling new scientific workflows
based on statistically robust, globally relevant integration of local and
regional observations using an online social-computational and geovisualization
system. Consistent with the goals of Digital Earth, GLOBE has the capability to
assess the global relevance of local case-study findings within the context of
over 50 global biophysical, land-use, climate, and socio-economic datasets. We
demonstrate the implementation of one such assessment - a representativeness
analysis - with a recently published meta-study of changes in swidden
agriculture in tropical forests. The analysis provides a standardized indicator
to judge the global representativeness of the trends reported in the
meta-study, and a geovisualization is presented that highlights areas for which
sampling efforts can be reduced and those in need of further study. GLOBE will
enable researchers and institutions to rapidly share, compare, and synthesize
local and regional studies within the global context, as well as contributing
to the larger goal of creating a Digital Earth.
| [
{
"version": "v1",
"created": "Thu, 25 Jul 2013 22:40:04 GMT"
}
] | 2013-07-29T00:00:00 | [
[
"Magliocca",
"N. R.",
""
],
[
"Ellis",
"E. C.",
""
],
[
"Oates",
"T.",
""
],
[
"Schmill",
"M.",
""
]
] | TITLE: Contextualizing the global relevance of local land change observations
ABSTRACT: To understand global changes in the Earth system, scientists must generalize
globally from observations made locally and regionally. In land change science
(LCS), local field-based observations are costly and time consuming, and
generally obtained by researchers working at disparate local and regional
case-study sites chosen for different reasons. As a result, global synthesis
efforts in LCS tend to be based on non-statistical inferences subject to
geographic biases stemming from data limitations and fragmentation. Thus, a
fundamental challenge is the production of generalized knowledge that links
evidence of the causes and consequences of local land change to global patterns
and vice versa. The GLOBE system was designed to meet this challenge. GLOBE
aims to transform global change science by enabling new scientific workflows
based on statistically robust, globally relevant integration of local and
regional observations using an online social-computational and geovisualization
system. Consistent with the goals of Digital Earth, GLOBE has the capability to
assess the global relevance of local case-study findings within the context of
over 50 global biophysical, land-use, climate, and socio-economic datasets. We
demonstrate the implementation of one such assessment - a representativeness
analysis - with a recently published meta-study of changes in swidden
agriculture in tropical forests. The analysis provides a standardized indicator
to judge the global representativeness of the trends reported in the
meta-study, and a geovisualization is presented that highlights areas for which
sampling efforts can be reduced and those in need of further study. GLOBE will
enable researchers and institutions to rapidly share, compare, and synthesize
local and regional studies within the global context, as well as contributing
to the larger goal of creating a Digital Earth.
|
1307.6923 | Rajib Rana | Rajib Rana, Mingrui Yang, Tim Wark, Chun Tung Chou, Wen Hu | A Deterministic Construction of Projection matrix for Adaptive
Trajectory Compression | null | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Compressive Sensing, which offers exact reconstruction of sparse signal from
a small number of measurements, has tremendous potential for trajectory
compression. In order to optimize the compression, trajectory compression
algorithms need to adapt compression ratio subject to the compressibility of
the trajectory. Intuitively, the trajectory of an object moving in starlight
road is more compressible compared to the trajectory of a object moving in
winding roads, therefore, higher compression is achievable in the former case
compared to the later. We propose an in-situ compression technique underpinning
the support vector regression theory, which accurately predicts the
compressibility of a trajectory given the mean speed of the object and then
apply compressive sensing to adapt the compression to the compressibility of
the trajectory. The conventional encoding and decoding process of compressive
sensing uses predefined dictionary and measurement (or projection) matrix
pairs. However, the selection of an optimal pair is nontrivial and exhaustive,
and random selection of a pair does not guarantee the best compression
performance. In this paper, we propose a deterministic and data driven
construction for the projection matrix which is obtained by applying singular
value decomposition to a sparsifying dictionary learned from the dataset. We
analyze case studies of pedestrian and animal trajectory datasets including GPS
trajectory data from 127 subjects. The experimental results suggest that the
proposed adaptive compression algorithm, incorporating the deterministic
construction of projection matrix, offers significantly better compression
performance compared to the state-of-the-art alternatives.
| [
{
"version": "v1",
"created": "Fri, 26 Jul 2013 04:59:26 GMT"
}
] | 2013-07-29T00:00:00 | [
[
"Rana",
"Rajib",
""
],
[
"Yang",
"Mingrui",
""
],
[
"Wark",
"Tim",
""
],
[
"Chou",
"Chun Tung",
""
],
[
"Hu",
"Wen",
""
]
] | TITLE: A Deterministic Construction of Projection matrix for Adaptive
Trajectory Compression
ABSTRACT: Compressive Sensing, which offers exact reconstruction of sparse signal from
a small number of measurements, has tremendous potential for trajectory
compression. In order to optimize the compression, trajectory compression
algorithms need to adapt compression ratio subject to the compressibility of
the trajectory. Intuitively, the trajectory of an object moving in starlight
road is more compressible compared to the trajectory of a object moving in
winding roads, therefore, higher compression is achievable in the former case
compared to the later. We propose an in-situ compression technique underpinning
the support vector regression theory, which accurately predicts the
compressibility of a trajectory given the mean speed of the object and then
apply compressive sensing to adapt the compression to the compressibility of
the trajectory. The conventional encoding and decoding process of compressive
sensing uses predefined dictionary and measurement (or projection) matrix
pairs. However, the selection of an optimal pair is nontrivial and exhaustive,
and random selection of a pair does not guarantee the best compression
performance. In this paper, we propose a deterministic and data driven
construction for the projection matrix which is obtained by applying singular
value decomposition to a sparsifying dictionary learned from the dataset. We
analyze case studies of pedestrian and animal trajectory datasets including GPS
trajectory data from 127 subjects. The experimental results suggest that the
proposed adaptive compression algorithm, incorporating the deterministic
construction of projection matrix, offers significantly better compression
performance compared to the state-of-the-art alternatives.
|
1307.7035 | Nadine Rons | Nadine Rons, Lucy Amez | Impact vitality: an indicator based on citing publications in search of
excellent scientists | 12 pages | Research Evaluation, 18(3), 233-241, 2009 | 10.3152/095820209X470563 | null | cs.DL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper contributes to the quest for an operational definition of
'research excellence' and proposes a translation of the excellence concept into
a bibliometric indicator. Starting from a textual analysis of funding program
calls aimed at individual researchers and from the challenges for an indicator
at this level in particular, a new type of indicator is proposed. The Impact
Vitality indicator [RONS & AMEZ, 2008] reflects the vitality of the impact of a
researcher's publication output, based on the change in volume over time of the
citing publications. The introduced metric is shown to posses attractive
operational characteristics and meets a number of criteria which are desirable
when comparing individual researchers. The validity of one of the possible
indicator variants is tested using a small dataset of applicants for a senior
full time Research Fellowship. Options for further research involve testing
various indicator variants on larger samples linked to different kinds of
evaluations.
| [
{
"version": "v1",
"created": "Fri, 26 Jul 2013 13:48:36 GMT"
}
] | 2013-07-29T00:00:00 | [
[
"Rons",
"Nadine",
""
],
[
"Amez",
"Lucy",
""
]
] | TITLE: Impact vitality: an indicator based on citing publications in search of
excellent scientists
ABSTRACT: This paper contributes to the quest for an operational definition of
'research excellence' and proposes a translation of the excellence concept into
a bibliometric indicator. Starting from a textual analysis of funding program
calls aimed at individual researchers and from the challenges for an indicator
at this level in particular, a new type of indicator is proposed. The Impact
Vitality indicator [RONS & AMEZ, 2008] reflects the vitality of the impact of a
researcher's publication output, based on the change in volume over time of the
citing publications. The introduced metric is shown to posses attractive
operational characteristics and meets a number of criteria which are desirable
when comparing individual researchers. The validity of one of the possible
indicator variants is tested using a small dataset of applicants for a senior
full time Research Fellowship. Options for further research involve testing
various indicator variants on larger samples linked to different kinds of
evaluations.
|
1305.3082 | Jialong Han | Jialong Han, Ji-Rong Wen | Mining Frequent Neighborhood Patterns in Large Labeled Graphs | 9 pages | null | 10.1145/2505515.2505530 | null | cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Over the years, frequent subgraphs have been an important sort of targeted
patterns in the pattern mining literatures, where most works deal with
databases holding a number of graph transactions, e.g., chemical structures of
compounds. These methods rely heavily on the downward-closure property (DCP) of
the support measure to ensure an efficient pruning of the candidate patterns.
When switching to the emerging scenario of single-graph databases such as
Google Knowledge Graph and Facebook social graph, the traditional support
measure turns out to be trivial (either 0 or 1). However, to the best of our
knowledge, all attempts to redefine a single-graph support resulted in measures
that either lose DCP, or are no longer semantically intuitive.
This paper targets mining patterns in the single-graph setting. We resolve
the "DCP-intuitiveness" dilemma by shifting the mining target from frequent
subgraphs to frequent neighborhoods. A neighborhood is a specific topological
pattern where a vertex is embedded, and the pattern is frequent if it is shared
by a large portion (above a given threshold) of vertices. We show that the new
patterns not only maintain DCP, but also have equally significant semantics as
subgraph patterns. Experiments on real-life datasets display the feasibility of
our algorithms on relatively large graphs, as well as the capability of mining
interesting knowledge that is not discovered in prior works.
| [
{
"version": "v1",
"created": "Tue, 14 May 2013 09:46:17 GMT"
}
] | 2013-07-26T00:00:00 | [
[
"Han",
"Jialong",
""
],
[
"Wen",
"Ji-Rong",
""
]
] | TITLE: Mining Frequent Neighborhood Patterns in Large Labeled Graphs
ABSTRACT: Over the years, frequent subgraphs have been an important sort of targeted
patterns in the pattern mining literatures, where most works deal with
databases holding a number of graph transactions, e.g., chemical structures of
compounds. These methods rely heavily on the downward-closure property (DCP) of
the support measure to ensure an efficient pruning of the candidate patterns.
When switching to the emerging scenario of single-graph databases such as
Google Knowledge Graph and Facebook social graph, the traditional support
measure turns out to be trivial (either 0 or 1). However, to the best of our
knowledge, all attempts to redefine a single-graph support resulted in measures
that either lose DCP, or are no longer semantically intuitive.
This paper targets mining patterns in the single-graph setting. We resolve
the "DCP-intuitiveness" dilemma by shifting the mining target from frequent
subgraphs to frequent neighborhoods. A neighborhood is a specific topological
pattern where a vertex is embedded, and the pattern is frequent if it is shared
by a large portion (above a given threshold) of vertices. We show that the new
patterns not only maintain DCP, but also have equally significant semantics as
subgraph patterns. Experiments on real-life datasets display the feasibility of
our algorithms on relatively large graphs, as well as the capability of mining
interesting knowledge that is not discovered in prior works.
|
1304.3285 | Colorado Reed | Colorado Reed and Zoubin Ghahramani | Scaling the Indian Buffet Process via Submodular Maximization | 13 pages, 8 figures | In ICML 2013: JMLR W&CP 28 (3): 1013-1021, 2013 | null | null | stat.ML cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Inference for latent feature models is inherently difficult as the inference
space grows exponentially with the size of the input data and number of latent
features. In this work, we use Kurihara & Welling (2008)'s
maximization-expectation framework to perform approximate MAP inference for
linear-Gaussian latent feature models with an Indian Buffet Process (IBP)
prior. This formulation yields a submodular function of the features that
corresponds to a lower bound on the model evidence. By adding a constant to
this function, we obtain a nonnegative submodular function that can be
maximized via a greedy algorithm that obtains at least a one-third
approximation to the optimal solution. Our inference method scales linearly
with the size of the input data, and we show the efficacy of our method on the
largest datasets currently analyzed using an IBP model.
| [
{
"version": "v1",
"created": "Thu, 11 Apr 2013 13:20:51 GMT"
},
{
"version": "v2",
"created": "Wed, 8 May 2013 20:15:08 GMT"
},
{
"version": "v3",
"created": "Tue, 18 Jun 2013 14:24:58 GMT"
},
{
"version": "v4",
"created": "Wed, 24 Jul 2013 19:20:15 GMT"
}
] | 2013-07-25T00:00:00 | [
[
"Reed",
"Colorado",
""
],
[
"Ghahramani",
"Zoubin",
""
]
] | TITLE: Scaling the Indian Buffet Process via Submodular Maximization
ABSTRACT: Inference for latent feature models is inherently difficult as the inference
space grows exponentially with the size of the input data and number of latent
features. In this work, we use Kurihara & Welling (2008)'s
maximization-expectation framework to perform approximate MAP inference for
linear-Gaussian latent feature models with an Indian Buffet Process (IBP)
prior. This formulation yields a submodular function of the features that
corresponds to a lower bound on the model evidence. By adding a constant to
this function, we obtain a nonnegative submodular function that can be
maximized via a greedy algorithm that obtains at least a one-third
approximation to the optimal solution. Our inference method scales linearly
with the size of the input data, and we show the efficacy of our method on the
largest datasets currently analyzed using an IBP model.
|
1307.6462 | Travis Gagie | Hector Ferrada, Travis Gagie, Tommi Hirvola, Simon J. Puglisi | AliBI: An Alignment-Based Index for Genomic Datasets | null | null | null | null | cs.DS cs.CE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | With current hardware and software, a standard computer can now hold in RAM
an index for approximate pattern matching on about half a dozen human genomes.
Sequencing technologies have improved so quickly, however, that scientists will
soon demand indexes for thousands of genomes. Whereas most researchers who have
addressed this problem have proposed completely new kinds of indexes, we
recently described a simple technique that scales standard indexes to work on
more genomes. Our main idea was to filter the dataset with LZ77, build a
standard index for the filtered file, and then create a hybrid of that standard
index and an LZ77-based index. In this paper we describe how to our technique
to use alignments instead of LZ77, in order to simplify and speed up both
preprocessing and random access.
| [
{
"version": "v1",
"created": "Wed, 24 Jul 2013 15:42:23 GMT"
}
] | 2013-07-25T00:00:00 | [
[
"Ferrada",
"Hector",
""
],
[
"Gagie",
"Travis",
""
],
[
"Hirvola",
"Tommi",
""
],
[
"Puglisi",
"Simon J.",
""
]
] | TITLE: AliBI: An Alignment-Based Index for Genomic Datasets
ABSTRACT: With current hardware and software, a standard computer can now hold in RAM
an index for approximate pattern matching on about half a dozen human genomes.
Sequencing technologies have improved so quickly, however, that scientists will
soon demand indexes for thousands of genomes. Whereas most researchers who have
addressed this problem have proposed completely new kinds of indexes, we
recently described a simple technique that scales standard indexes to work on
more genomes. Our main idea was to filter the dataset with LZ77, build a
standard index for the filtered file, and then create a hybrid of that standard
index and an LZ77-based index. In this paper we describe how to our technique
to use alignments instead of LZ77, in order to simplify and speed up both
preprocessing and random access.
|
1307.6476 | Sundeep Prabhakar Chepuri | Sundeep Prabhakar Chepuri and Geert Leus and Alle-Jan van der Veen | Rigid Body Localization Using Sensor Networks: Position and Orientation
Estimation | 30 pages, draft submitted to IEEE Trans. on Signal Processing, 10
figures | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we propose a novel framework called rigid body localization
for joint position and orientation estimation of a rigid body. We consider a
setup in which a few sensors are mounted on a rigid body. The absolute position
of the sensors on the rigid body, or the absolute position of the rigid body
itself is not known. However, we know how the sensors are mounted on the rigid
body, i.e., the sensor topology is known. Using range-only measurements between
the sensors and a few anchors (nodes with known absolute positions), and
without using any inertial measurements (e.g., accelerometers), we estimate the
position and orientation of the rigid body. For this purpose, the absolute
position of the sensors is expressed as an affine function of the Stiefel
manifold. In other words, we represent the orientation as a rotation matrix,
and absolute position as a translation vector. We propose a least-squares (LS),
simplified unitarily constrained LS (SUC-LS), and optimal unitarily constrained
least-squares (OUC-LS) estimator, where the latter is based on Newton's method.
As a benchmark, we derive a unitarily constrained Cram\'er-Rao bound (UC-CRB).
The known topology of the sensors can sometimes be perturbed during
fabrication. To take these perturbations into account, a simplified unitarily
constrained total-least-squares (SUC-TLS), and an optimal unitarily constrained
total-least-squares (OUC-TLS) estimator are also proposed.
| [
{
"version": "v1",
"created": "Wed, 24 Jul 2013 16:09:07 GMT"
}
] | 2013-07-25T00:00:00 | [
[
"Chepuri",
"Sundeep Prabhakar",
""
],
[
"Leus",
"Geert",
""
],
[
"van der Veen",
"Alle-Jan",
""
]
] | TITLE: Rigid Body Localization Using Sensor Networks: Position and Orientation
Estimation
ABSTRACT: In this paper, we propose a novel framework called rigid body localization
for joint position and orientation estimation of a rigid body. We consider a
setup in which a few sensors are mounted on a rigid body. The absolute position
of the sensors on the rigid body, or the absolute position of the rigid body
itself is not known. However, we know how the sensors are mounted on the rigid
body, i.e., the sensor topology is known. Using range-only measurements between
the sensors and a few anchors (nodes with known absolute positions), and
without using any inertial measurements (e.g., accelerometers), we estimate the
position and orientation of the rigid body. For this purpose, the absolute
position of the sensors is expressed as an affine function of the Stiefel
manifold. In other words, we represent the orientation as a rotation matrix,
and absolute position as a translation vector. We propose a least-squares (LS),
simplified unitarily constrained LS (SUC-LS), and optimal unitarily constrained
least-squares (OUC-LS) estimator, where the latter is based on Newton's method.
As a benchmark, we derive a unitarily constrained Cram\'er-Rao bound (UC-CRB).
The known topology of the sensors can sometimes be perturbed during
fabrication. To take these perturbations into account, a simplified unitarily
constrained total-least-squares (SUC-TLS), and an optimal unitarily constrained
total-least-squares (OUC-TLS) estimator are also proposed.
|
1303.6088 | Anna Zygmunt | Bogdan Gliwa, Anna Zygmunt, Aleksander Byrski | Graphical Analysis of Social Group Dynamics | Fourth International Conference on Computational Aspects of Social
Networks, CASoN 2012, Sao Carlos, Brazil, November 21-23, 2012, pp. 41-46;
IEEE Computer Society, 2012 | null | 10.1109/CASoN.2012.6412375 | null | cs.SI physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Identifying communities in social networks becomes an increasingly important
research problem. Several methods for identifying such groups have been
developed, however, qualitative analysis (taking into account the scale of the
problem) still poses serious problems. This paper describes a tool for
facilitating such an analysis, allowing to visualize the dynamics and
supporting localization of different events (such as creation or merging of
groups). In the final part of the paper, the experimental results performed
using the benchmark data (Enron emails) provide an insight into usefulness of
the proposed tool.
| [
{
"version": "v1",
"created": "Mon, 25 Mar 2013 11:15:21 GMT"
},
{
"version": "v2",
"created": "Tue, 23 Jul 2013 10:40:56 GMT"
}
] | 2013-07-24T00:00:00 | [
[
"Gliwa",
"Bogdan",
""
],
[
"Zygmunt",
"Anna",
""
],
[
"Byrski",
"Aleksander",
""
]
] | TITLE: Graphical Analysis of Social Group Dynamics
ABSTRACT: Identifying communities in social networks becomes an increasingly important
research problem. Several methods for identifying such groups have been
developed, however, qualitative analysis (taking into account the scale of the
problem) still poses serious problems. This paper describes a tool for
facilitating such an analysis, allowing to visualize the dynamics and
supporting localization of different events (such as creation or merging of
groups). In the final part of the paper, the experimental results performed
using the benchmark data (Enron emails) provide an insight into usefulness of
the proposed tool.
|
1307.5336 | Pekka Malo | Pekka Malo, Ankur Sinha, Pyry Takala, Pekka Korhonen, Jyrki Wallenius | Good Debt or Bad Debt: Detecting Semantic Orientations in Economic Texts | To be published in Journal of the American Society for Information
Science and Technology | null | null | null | cs.CL cs.IR q-fin.CP | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The use of robo-readers to analyze news texts is an emerging technology trend
in computational finance. In recent research, a substantial effort has been
invested to develop sophisticated financial polarity-lexicons that can be used
to investigate how financial sentiments relate to future company performance.
However, based on experience from other fields, where sentiment analysis is
commonly applied, it is well-known that the overall semantic orientation of a
sentence may differ from the prior polarity of individual words. The objective
of this article is to investigate how semantic orientations can be better
detected in financial and economic news by accommodating the overall
phrase-structure information and domain-specific use of language. Our three
main contributions are: (1) establishment of a human-annotated finance
phrase-bank, which can be used as benchmark for training and evaluating
alternative models; (2) presentation of a technique to enhance financial
lexicons with attributes that help to identify expected direction of events
that affect overall sentiment; (3) development of a linearized phrase-structure
model for detecting contextual semantic orientations in financial and economic
news texts. The relevance of the newly added lexicon features and the benefit
of using the proposed learning-algorithm are demonstrated in a comparative
study against previously used general sentiment models as well as the popular
word frequency models used in recent financial studies. The proposed framework
is parsimonious and avoids the explosion in feature-space caused by the use of
conventional n-gram features.
| [
{
"version": "v1",
"created": "Fri, 19 Jul 2013 20:49:06 GMT"
},
{
"version": "v2",
"created": "Tue, 23 Jul 2013 19:56:38 GMT"
}
] | 2013-07-24T00:00:00 | [
[
"Malo",
"Pekka",
""
],
[
"Sinha",
"Ankur",
""
],
[
"Takala",
"Pyry",
""
],
[
"Korhonen",
"Pekka",
""
],
[
"Wallenius",
"Jyrki",
""
]
] | TITLE: Good Debt or Bad Debt: Detecting Semantic Orientations in Economic Texts
ABSTRACT: The use of robo-readers to analyze news texts is an emerging technology trend
in computational finance. In recent research, a substantial effort has been
invested to develop sophisticated financial polarity-lexicons that can be used
to investigate how financial sentiments relate to future company performance.
However, based on experience from other fields, where sentiment analysis is
commonly applied, it is well-known that the overall semantic orientation of a
sentence may differ from the prior polarity of individual words. The objective
of this article is to investigate how semantic orientations can be better
detected in financial and economic news by accommodating the overall
phrase-structure information and domain-specific use of language. Our three
main contributions are: (1) establishment of a human-annotated finance
phrase-bank, which can be used as benchmark for training and evaluating
alternative models; (2) presentation of a technique to enhance financial
lexicons with attributes that help to identify expected direction of events
that affect overall sentiment; (3) development of a linearized phrase-structure
model for detecting contextual semantic orientations in financial and economic
news texts. The relevance of the newly added lexicon features and the benefit
of using the proposed learning-algorithm are demonstrated in a comparative
study against previously used general sentiment models as well as the popular
word frequency models used in recent financial studies. The proposed framework
is parsimonious and avoids the explosion in feature-space caused by the use of
conventional n-gram features.
|
1307.5894 | Md Mansurul Bhuiyan | Mansurul A Bhuiyan and Mohammad Al Hasan | MIRAGE: An Iterative MapReduce based FrequentSubgraph Mining Algorithm | null | null | null | null | cs.DB cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Frequent subgraph mining (FSM) is an important task for exploratory data
analysis on graph data. Over the years, many algorithms have been proposed to
solve this task. These algorithms assume that the data structure of the mining
task is small enough to fit in the main memory of a computer. However, as the
real-world graph data grows, both in size and quantity, such an assumption does
not hold any longer. To overcome this, some graph database-centric methods have
been proposed in recent years for solving FSM; however, a distributed solution
using MapReduce paradigm has not been explored extensively. Since, MapReduce is
becoming the de- facto paradigm for computation on massive data, an efficient
FSM algorithm on this paradigm is of huge demand. In this work, we propose a
frequent subgraph mining algorithm called MIRAGE which uses an iterative
MapReduce based framework. MIRAGE is complete as it returns all the frequent
subgraphs for a given user-defined support, and it is efficient as it applies
all the optimizations that the latest FSM algorithms adopt. Our experiments
with real life and large synthetic datasets validate the effectiveness of
MIRAGE for mining frequent subgraphs from large graph datasets. The source code
of MIRAGE is available from www.cs.iupui.edu/alhasan/software/
| [
{
"version": "v1",
"created": "Mon, 22 Jul 2013 21:26:00 GMT"
}
] | 2013-07-24T00:00:00 | [
[
"Bhuiyan",
"Mansurul A",
""
],
[
"Hasan",
"Mohammad Al",
""
]
] | TITLE: MIRAGE: An Iterative MapReduce based FrequentSubgraph Mining Algorithm
ABSTRACT: Frequent subgraph mining (FSM) is an important task for exploratory data
analysis on graph data. Over the years, many algorithms have been proposed to
solve this task. These algorithms assume that the data structure of the mining
task is small enough to fit in the main memory of a computer. However, as the
real-world graph data grows, both in size and quantity, such an assumption does
not hold any longer. To overcome this, some graph database-centric methods have
been proposed in recent years for solving FSM; however, a distributed solution
using MapReduce paradigm has not been explored extensively. Since, MapReduce is
becoming the de- facto paradigm for computation on massive data, an efficient
FSM algorithm on this paradigm is of huge demand. In this work, we propose a
frequent subgraph mining algorithm called MIRAGE which uses an iterative
MapReduce based framework. MIRAGE is complete as it returns all the frequent
subgraphs for a given user-defined support, and it is efficient as it applies
all the optimizations that the latest FSM algorithms adopt. Our experiments
with real life and large synthetic datasets validate the effectiveness of
MIRAGE for mining frequent subgraphs from large graph datasets. The source code
of MIRAGE is available from www.cs.iupui.edu/alhasan/software/
|
1307.6023 | Najla Al-Saati | Dr. Najla Akram AL-Saati and Marwa Abd-AlKareem | The Use of Cuckoo Search in Estimating the Parameters of Software
Reliability Growth Models | null | (IJCSIS) International Journal of Computer Science and Information
Security, Vol. 11, No. 6, June 2013 | null | null | cs.AI cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This work aims to investigate the reliability of software products as an
important attribute of computer programs; it helps to decide the degree of
trustworthiness a program has in accomplishing its specific functions. This is
done using the Software Reliability Growth Models (SRGMs) through the
estimation of their parameters. The parameters are estimated in this work based
on the available failure data and with the search techniques of Swarm
Intelligence, namely, the Cuckoo Search (CS) due to its efficiency,
effectiveness and robustness. A number of SRGMs is studied, and the results are
compared to Particle Swarm Optimization (PSO), Ant Colony Optimization (ACO)
and extended ACO. Results show that CS outperformed both PSO and ACO in finding
better parameters tested using identical datasets. It was sometimes
outperformed by the extended ACO. Also in this work, the percentages of
training data to testing data are investigated to show their impact on the
results.
| [
{
"version": "v1",
"created": "Tue, 23 Jul 2013 11:22:31 GMT"
}
] | 2013-07-24T00:00:00 | [
[
"AL-Saati",
"Dr. Najla Akram",
""
],
[
"Abd-AlKareem",
"Marwa",
""
]
] | TITLE: The Use of Cuckoo Search in Estimating the Parameters of Software
Reliability Growth Models
ABSTRACT: This work aims to investigate the reliability of software products as an
important attribute of computer programs; it helps to decide the degree of
trustworthiness a program has in accomplishing its specific functions. This is
done using the Software Reliability Growth Models (SRGMs) through the
estimation of their parameters. The parameters are estimated in this work based
on the available failure data and with the search techniques of Swarm
Intelligence, namely, the Cuckoo Search (CS) due to its efficiency,
effectiveness and robustness. A number of SRGMs is studied, and the results are
compared to Particle Swarm Optimization (PSO), Ant Colony Optimization (ACO)
and extended ACO. Results show that CS outperformed both PSO and ACO in finding
better parameters tested using identical datasets. It was sometimes
outperformed by the extended ACO. Also in this work, the percentages of
training data to testing data are investigated to show their impact on the
results.
|
1210.5093 | Yousun Ko | Yousun Ko, Minyoung Jung, Yo-Sub Han and Bernd Burgstaller | A Speculative Parallel DFA Membership Test for Multicore, SIMD and Cloud
Computing Environments | null | null | 10.1007/s10766-013-0258-5 | null | cs.DC cs.FL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present techniques to parallelize membership tests for Deterministic
Finite Automata (DFAs). Our method searches arbitrary regular expressions by
matching multiple bytes in parallel using speculation. We partition the input
string into chunks, match chunks in parallel, and combine the matching results.
Our parallel matching algorithm exploits structural DFA properties to minimize
the speculative overhead. Unlike previous approaches, our speculation is
failure-free, i.e., (1) sequential semantics are maintained, and (2)
speed-downs are avoided altogether. On architectures with a SIMD
gather-operation for indexed memory loads, our matching operation is fully
vectorized. The proposed load-balancing scheme uses an off-line profiling step
to determine the matching capacity of each par- ticipating processor. Based on
matching capacities, DFA matches are load-balanced on inhomogeneous parallel
architectures such as cloud computing environments. We evaluated our
speculative DFA membership test for a representative set of benchmarks from the
Perl-compatible Regular Expression (PCRE) library and the PROSITE protein
database. Evaluation was conducted on a 4 CPU (40 cores) shared-memory node of
the Intel Manycore Testing Lab (Intel MTL), on the Intel AVX2 SDE simulator for
8-way fully vectorized SIMD execution, and on a 20-node (288 cores) cluster on
the Amazon EC2 computing cloud.
| [
{
"version": "v1",
"created": "Thu, 18 Oct 2012 11:17:23 GMT"
},
{
"version": "v2",
"created": "Mon, 22 Jul 2013 15:32:29 GMT"
}
] | 2013-07-23T00:00:00 | [
[
"Ko",
"Yousun",
""
],
[
"Jung",
"Minyoung",
""
],
[
"Han",
"Yo-Sub",
""
],
[
"Burgstaller",
"Bernd",
""
]
] | TITLE: A Speculative Parallel DFA Membership Test for Multicore, SIMD and Cloud
Computing Environments
ABSTRACT: We present techniques to parallelize membership tests for Deterministic
Finite Automata (DFAs). Our method searches arbitrary regular expressions by
matching multiple bytes in parallel using speculation. We partition the input
string into chunks, match chunks in parallel, and combine the matching results.
Our parallel matching algorithm exploits structural DFA properties to minimize
the speculative overhead. Unlike previous approaches, our speculation is
failure-free, i.e., (1) sequential semantics are maintained, and (2)
speed-downs are avoided altogether. On architectures with a SIMD
gather-operation for indexed memory loads, our matching operation is fully
vectorized. The proposed load-balancing scheme uses an off-line profiling step
to determine the matching capacity of each par- ticipating processor. Based on
matching capacities, DFA matches are load-balanced on inhomogeneous parallel
architectures such as cloud computing environments. We evaluated our
speculative DFA membership test for a representative set of benchmarks from the
Perl-compatible Regular Expression (PCRE) library and the PROSITE protein
database. Evaluation was conducted on a 4 CPU (40 cores) shared-memory node of
the Intel Manycore Testing Lab (Intel MTL), on the Intel AVX2 SDE simulator for
8-way fully vectorized SIMD execution, and on a 20-node (288 cores) cluster on
the Amazon EC2 computing cloud.
|
1307.5322 | Emanuel Santos ES | Emanuel Santos, Daniel Faria, C\'atia Pesquita and Francisco Couto | Ontology alignment repair through modularization and confidence-based
heuristics | null | null | null | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Ontology Matching aims to find a set of semantic correspondences, called an
alignment, between related ontologies. In recent years, there has been a
growing interest in efficient and effective matching methods for large
ontologies. However, most of the alignments produced for large ontologies are
logically incoherent. It was only recently that the use of repair techniques to
improve the quality of ontology alignments has been explored. In this paper we
present a novel technique for detecting incoherent concepts based on ontology
modularization, and a new repair algorithm that minimizes the incoherence of
the resulting alignment and the number of matches removed from the input
alignment. An implementation was done as part of a lightweight version of
AgreementMaker system, a successful ontology matching platform, and evaluated
using a set of four benchmark biomedical ontology matching tasks. Our results
show that our implementation is efficient and produces better alignments with
respect to their coherence and f-measure than the state of the art repairing
tools. They also show that our implementation is a better alternative for
producing coherent silver standard alignments.
| [
{
"version": "v1",
"created": "Fri, 19 Jul 2013 16:15:41 GMT"
}
] | 2013-07-23T00:00:00 | [
[
"Santos",
"Emanuel",
""
],
[
"Faria",
"Daniel",
""
],
[
"Pesquita",
"Cátia",
""
],
[
"Couto",
"Francisco",
""
]
] | TITLE: Ontology alignment repair through modularization and confidence-based
heuristics
ABSTRACT: Ontology Matching aims to find a set of semantic correspondences, called an
alignment, between related ontologies. In recent years, there has been a
growing interest in efficient and effective matching methods for large
ontologies. However, most of the alignments produced for large ontologies are
logically incoherent. It was only recently that the use of repair techniques to
improve the quality of ontology alignments has been explored. In this paper we
present a novel technique for detecting incoherent concepts based on ontology
modularization, and a new repair algorithm that minimizes the incoherence of
the resulting alignment and the number of matches removed from the input
alignment. An implementation was done as part of a lightweight version of
AgreementMaker system, a successful ontology matching platform, and evaluated
using a set of four benchmark biomedical ontology matching tasks. Our results
show that our implementation is efficient and produces better alignments with
respect to their coherence and f-measure than the state of the art repairing
tools. They also show that our implementation is a better alternative for
producing coherent silver standard alignments.
|
1307.5591 | Subra Mukherjee | Subra Mukherjee, Karen Das | A Novel Equation based Classifier for Detecting Human in Images | published with international journal of Computer Applications (IJCA) | International Journal of Computer Applications 72(6):9-16, June
2013 | 10.5120/12496-7272 | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Shape based classification is one of the most challenging tasks in the field
of computer vision. Shapes play a vital role in object recognition. The basic
shapes in an image can occur in varying scale, position and orientation. And
specially when detecting human, the task becomes more challenging owing to the
largely varying size, shape, posture and clothing of human. So, in our work we
detect human, based on the head-shoulder shape as it is the most unvarying part
of human body. Here, firstly a new and a novel equation named as the Omega
Equation that describes the shape of human head-shoulder is developed and based
on this equation, a classifier is designed particularly for detecting human
presence in a scene. The classifier detects human by analyzing some of the
discriminative features of the values of the parameters obtained from the Omega
equation. The proposed method has been tested on a variety of shape dataset
taking into consideration the complexities of human head-shoulder shape. In all
the experiments the proposed method demonstrated satisfactory results.
| [
{
"version": "v1",
"created": "Mon, 22 Jul 2013 05:13:03 GMT"
}
] | 2013-07-23T00:00:00 | [
[
"Mukherjee",
"Subra",
""
],
[
"Das",
"Karen",
""
]
] | TITLE: A Novel Equation based Classifier for Detecting Human in Images
ABSTRACT: Shape based classification is one of the most challenging tasks in the field
of computer vision. Shapes play a vital role in object recognition. The basic
shapes in an image can occur in varying scale, position and orientation. And
specially when detecting human, the task becomes more challenging owing to the
largely varying size, shape, posture and clothing of human. So, in our work we
detect human, based on the head-shoulder shape as it is the most unvarying part
of human body. Here, firstly a new and a novel equation named as the Omega
Equation that describes the shape of human head-shoulder is developed and based
on this equation, a classifier is designed particularly for detecting human
presence in a scene. The classifier detects human by analyzing some of the
discriminative features of the values of the parameters obtained from the Omega
equation. The proposed method has been tested on a variety of shape dataset
taking into consideration the complexities of human head-shoulder shape. In all
the experiments the proposed method demonstrated satisfactory results.
|
1307.5599 | Naresh Kumar Mallenahalli Prof. Dr. | M. Naresh Kumar | Performance comparison of State-of-the-art Missing Value Imputation
Algorithms on Some Bench mark Datasets | 17 pages, 6 figures | null | null | null | cs.LG stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Decision making from data involves identifying a set of attributes that
contribute to effective decision making through computational intelligence. The
presence of missing values greatly influences the selection of right set of
attributes and this renders degradation in classification accuracies of the
classifiers. As missing values are quite common in data collection phase during
field experiments or clinical trails appropriate handling would improve the
classifier performance. In this paper we present a review of recently developed
missing value imputation algorithms and compare their performance on some bench
mark datasets.
| [
{
"version": "v1",
"created": "Mon, 22 Jul 2013 06:50:21 GMT"
}
] | 2013-07-23T00:00:00 | [
[
"Kumar",
"M. Naresh",
""
]
] | TITLE: Performance comparison of State-of-the-art Missing Value Imputation
Algorithms on Some Bench mark Datasets
ABSTRACT: Decision making from data involves identifying a set of attributes that
contribute to effective decision making through computational intelligence. The
presence of missing values greatly influences the selection of right set of
attributes and this renders degradation in classification accuracies of the
classifiers. As missing values are quite common in data collection phase during
field experiments or clinical trails appropriate handling would improve the
classifier performance. In this paper we present a review of recently developed
missing value imputation algorithms and compare their performance on some bench
mark datasets.
|
1307.5702 | Lucas Paletta | Samuel F. Dodge and Lina J. Karam | Is Bottom-Up Attention Useful for Scene Recognition? | null | null | null | ISACS/2013/04 | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The human visual system employs a selective attention mechanism to understand
the visual world in an eficient manner. In this paper, we show how
computational models of this mechanism can be exploited for the computer vision
application of scene recognition. First, we consider saliency weighting and
saliency pruning, and provide a comparison of the performance of different
attention models in these approaches in terms of classification accuracy.
Pruning can achieve a high degree of computational savings without
significantly sacrificing classification accuracy. In saliency weighting,
however, we found that classification performance does not improve. In
addition, we present a new method to incorporate salient and non-salient
regions for improved classification accuracy. We treat the salient and
non-salient regions separately and combine them using Multiple Kernel Learning.
We evaluate our approach using the UIUC sports dataset and find that with a
small training size, our method improves upon the classification accuracy of
the baseline bag of features approach.
| [
{
"version": "v1",
"created": "Mon, 22 Jul 2013 13:38:16 GMT"
}
] | 2013-07-23T00:00:00 | [
[
"Dodge",
"Samuel F.",
""
],
[
"Karam",
"Lina J.",
""
]
] | TITLE: Is Bottom-Up Attention Useful for Scene Recognition?
ABSTRACT: The human visual system employs a selective attention mechanism to understand
the visual world in an eficient manner. In this paper, we show how
computational models of this mechanism can be exploited for the computer vision
application of scene recognition. First, we consider saliency weighting and
saliency pruning, and provide a comparison of the performance of different
attention models in these approaches in terms of classification accuracy.
Pruning can achieve a high degree of computational savings without
significantly sacrificing classification accuracy. In saliency weighting,
however, we found that classification performance does not improve. In
addition, we present a new method to incorporate salient and non-salient
regions for improved classification accuracy. We treat the salient and
non-salient regions separately and combine them using Multiple Kernel Learning.
We evaluate our approach using the UIUC sports dataset and find that with a
small training size, our method improves upon the classification accuracy of
the baseline bag of features approach.
|
1307.5730 | Baogang Hu | Xiaowan Zhang and Bao-Gang Hu | A New Strategy of Cost-Free Learning in the Class Imbalance Problem | Classification, class imbalance, cost-free learning, cost-sensitive
learning, abstaining, mutual information, ROC | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this work, we define cost-free learning (CFL) formally in comparison with
cost-sensitive learning (CSL). The main difference between them is that a CFL
approach seeks optimal classification results without requiring any cost
information, even in the class imbalance problem. In fact, several CFL
approaches exist in the related studies, such as sampling and some
criteria-based pproaches. However, to our best knowledge, none of the existing
CFL and CSL approaches are able to process the abstaining classifications
properly when no information is given about errors and rejects. Based on
information theory, we propose a novel CFL which seeks to maximize normalized
mutual information of the targets and the decision outputs of classifiers.
Using the strategy, we can deal with binary/multi-class classifications
with/without abstaining. Significant features are observed from the new
strategy. While the degree of class imbalance is changing, the proposed
strategy is able to balance the errors and rejects accordingly and
automatically. Another advantage of the strategy is its ability of deriving
optimal rejection thresholds for abstaining classifications and the
"equivalent" costs in binary classifications. The connection between rejection
thresholds and ROC curve is explored. Empirical investigation is made on
several benchmark data sets in comparison with other existing approaches. The
classification results demonstrate a promising perspective of the strategy in
machine learning.
| [
{
"version": "v1",
"created": "Mon, 22 Jul 2013 14:36:03 GMT"
}
] | 2013-07-23T00:00:00 | [
[
"Zhang",
"Xiaowan",
""
],
[
"Hu",
"Bao-Gang",
""
]
] | TITLE: A New Strategy of Cost-Free Learning in the Class Imbalance Problem
ABSTRACT: In this work, we define cost-free learning (CFL) formally in comparison with
cost-sensitive learning (CSL). The main difference between them is that a CFL
approach seeks optimal classification results without requiring any cost
information, even in the class imbalance problem. In fact, several CFL
approaches exist in the related studies, such as sampling and some
criteria-based pproaches. However, to our best knowledge, none of the existing
CFL and CSL approaches are able to process the abstaining classifications
properly when no information is given about errors and rejects. Based on
information theory, we propose a novel CFL which seeks to maximize normalized
mutual information of the targets and the decision outputs of classifiers.
Using the strategy, we can deal with binary/multi-class classifications
with/without abstaining. Significant features are observed from the new
strategy. While the degree of class imbalance is changing, the proposed
strategy is able to balance the errors and rejects accordingly and
automatically. Another advantage of the strategy is its ability of deriving
optimal rejection thresholds for abstaining classifications and the
"equivalent" costs in binary classifications. The connection between rejection
thresholds and ROC curve is explored. Empirical investigation is made on
several benchmark data sets in comparison with other existing approaches. The
classification results demonstrate a promising perspective of the strategy in
machine learning.
|
1303.7093 | Aravind Kota Gopalakrishna | Aravind Kota Gopalakrishna, Tanir Ozcelebi, Antonio Liotta, Johan J.
Lukkien | Relevance As a Metric for Evaluating Machine Learning Algorithms | To Appear at International Conference on Machine Learning and Data
Mining (MLDM 2013), 14 pages, 6 figures | null | 10.1007/978-3-642-39712-7_15 | null | stat.ML cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In machine learning, the choice of a learning algorithm that is suitable for
the application domain is critical. The performance metric used to compare
different algorithms must also reflect the concerns of users in the application
domain under consideration. In this work, we propose a novel probability-based
performance metric called Relevance Score for evaluating supervised learning
algorithms. We evaluate the proposed metric through empirical analysis on a
dataset gathered from an intelligent lighting pilot installation. In comparison
to the commonly used Classification Accuracy metric, the Relevance Score proves
to be more appropriate for a certain class of applications.
| [
{
"version": "v1",
"created": "Thu, 28 Mar 2013 11:01:53 GMT"
},
{
"version": "v2",
"created": "Fri, 5 Apr 2013 19:12:06 GMT"
},
{
"version": "v3",
"created": "Mon, 8 Apr 2013 14:26:49 GMT"
}
] | 2013-07-19T00:00:00 | [
[
"Gopalakrishna",
"Aravind Kota",
""
],
[
"Ozcelebi",
"Tanir",
""
],
[
"Liotta",
"Antonio",
""
],
[
"Lukkien",
"Johan J.",
""
]
] | TITLE: Relevance As a Metric for Evaluating Machine Learning Algorithms
ABSTRACT: In machine learning, the choice of a learning algorithm that is suitable for
the application domain is critical. The performance metric used to compare
different algorithms must also reflect the concerns of users in the application
domain under consideration. In this work, we propose a novel probability-based
performance metric called Relevance Score for evaluating supervised learning
algorithms. We evaluate the proposed metric through empirical analysis on a
dataset gathered from an intelligent lighting pilot installation. In comparison
to the commonly used Classification Accuracy metric, the Relevance Score proves
to be more appropriate for a certain class of applications.
|
1307.4567 | Michael Lange | Michael Lange and Gerard Gorman and Michele Weiland and Lawrence
Mitchell and Xiaohu Guo and James Southern | Benchmarking mixed-mode PETSc performance on high-performance
architectures | arXiv admin note: substantial text overlap with arXiv:1303.5275 | null | null | null | cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The trend towards highly parallel multi-processing is ubiquitous in all
modern computer architectures, ranging from handheld devices to large-scale HPC
systems; yet many applications are struggling to fully utilise the multiple
levels of parallelism exposed in modern high-performance platforms. In order to
realise the full potential of recent hardware advances, a mixed-mode between
shared-memory programming techniques and inter-node message passing can be
adopted which provides high-levels of parallelism with minimal overheads. For
scientific applications this entails that not only the simulation code itself,
but the whole software stack needs to evolve. In this paper, we evaluate the
mixed-mode performance of PETSc, a widely used scientific library for the
scalable solution of partial differential equations. We describe the addition
of OpenMP threaded functionality to the library, focusing on sparse
matrix-vector multiplication. We highlight key challenges in achieving good
parallel performance, such as explicit communication overlap using task-based
parallelism, and show how to further improve performance by explicitly load
balancing threads within MPI processes. Using a set of matrices extracted from
Fluidity, a CFD application code which uses the library as its linear solver
engine, we then benchmark the parallel performance of mixed-mode PETSc across
multiple nodes on several modern HPC architectures. We evaluate the parallel
scalability on Uniform Memory Access (UMA) systems, such as the Fujitsu
PRIMEHPC FX10 and IBM BlueGene/Q, as well as a Non-Uniform Memory Access (NUMA)
Cray XE6 platform. A detailed comparison is performed which highlights the
characteristics of each particular architecture, before demonstrating efficient
strong scalability of sparse matrix-vector multiplication with significant
speedups over the pure-MPI mode.
| [
{
"version": "v1",
"created": "Wed, 17 Jul 2013 10:36:35 GMT"
}
] | 2013-07-19T00:00:00 | [
[
"Lange",
"Michael",
""
],
[
"Gorman",
"Gerard",
""
],
[
"Weiland",
"Michele",
""
],
[
"Mitchell",
"Lawrence",
""
],
[
"Guo",
"Xiaohu",
""
],
[
"Southern",
"James",
""
]
] | TITLE: Benchmarking mixed-mode PETSc performance on high-performance
architectures
ABSTRACT: The trend towards highly parallel multi-processing is ubiquitous in all
modern computer architectures, ranging from handheld devices to large-scale HPC
systems; yet many applications are struggling to fully utilise the multiple
levels of parallelism exposed in modern high-performance platforms. In order to
realise the full potential of recent hardware advances, a mixed-mode between
shared-memory programming techniques and inter-node message passing can be
adopted which provides high-levels of parallelism with minimal overheads. For
scientific applications this entails that not only the simulation code itself,
but the whole software stack needs to evolve. In this paper, we evaluate the
mixed-mode performance of PETSc, a widely used scientific library for the
scalable solution of partial differential equations. We describe the addition
of OpenMP threaded functionality to the library, focusing on sparse
matrix-vector multiplication. We highlight key challenges in achieving good
parallel performance, such as explicit communication overlap using task-based
parallelism, and show how to further improve performance by explicitly load
balancing threads within MPI processes. Using a set of matrices extracted from
Fluidity, a CFD application code which uses the library as its linear solver
engine, we then benchmark the parallel performance of mixed-mode PETSc across
multiple nodes on several modern HPC architectures. We evaluate the parallel
scalability on Uniform Memory Access (UMA) systems, such as the Fujitsu
PRIMEHPC FX10 and IBM BlueGene/Q, as well as a Non-Uniform Memory Access (NUMA)
Cray XE6 platform. A detailed comparison is performed which highlights the
characteristics of each particular architecture, before demonstrating efficient
strong scalability of sparse matrix-vector multiplication with significant
speedups over the pure-MPI mode.
|
1307.4531 | Jakub Mikians | Jakub Mikians, L\'aszl\'o Gyarmati, Vijay Erramilli, Nikolaos
Laoutaris | Crowd-assisted Search for Price Discrimination in E-Commerce: First
results | null | null | null | null | cs.CY | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | After years of speculation, price discrimination in e-commerce driven by the
personal information that users leave (involuntarily) online, has started
attracting the attention of privacy researchers, regulators, and the press. In
our previous work we demonstrated instances of products whose prices varied
online depending on the location and the characteristics of perspective online
buyers. In an effort to scale up our study we have turned to crowd-sourcing.
Using a browser extension we have collected the prices obtained by an initial
set of 340 test users as they surf the web for products of their interest. This
initial dataset has permitted us to identify a set of online stores where price
variation is more pronounced. We have focused on this subset, and performed a
systematic crawl of their products and logged the prices obtained from
different vantage points and browser configurations. By analyzing this dataset
we see that there exist several retailers that return prices for the same
product that vary by 10%-30% whereas there also exist isolated cases that may
vary up to a multiplicative factor, e.g., x2. To the best of our efforts we
could not attribute the observed price gaps to currency, shipping, or taxation
differences.
| [
{
"version": "v1",
"created": "Wed, 17 Jul 2013 08:24:40 GMT"
}
] | 2013-07-18T00:00:00 | [
[
"Mikians",
"Jakub",
""
],
[
"Gyarmati",
"László",
""
],
[
"Erramilli",
"Vijay",
""
],
[
"Laoutaris",
"Nikolaos",
""
]
] | TITLE: Crowd-assisted Search for Price Discrimination in E-Commerce: First
results
ABSTRACT: After years of speculation, price discrimination in e-commerce driven by the
personal information that users leave (involuntarily) online, has started
attracting the attention of privacy researchers, regulators, and the press. In
our previous work we demonstrated instances of products whose prices varied
online depending on the location and the characteristics of perspective online
buyers. In an effort to scale up our study we have turned to crowd-sourcing.
Using a browser extension we have collected the prices obtained by an initial
set of 340 test users as they surf the web for products of their interest. This
initial dataset has permitted us to identify a set of online stores where price
variation is more pronounced. We have focused on this subset, and performed a
systematic crawl of their products and logged the prices obtained from
different vantage points and browser configurations. By analyzing this dataset
we see that there exist several retailers that return prices for the same
product that vary by 10%-30% whereas there also exist isolated cases that may
vary up to a multiplicative factor, e.g., x2. To the best of our efforts we
could not attribute the observed price gaps to currency, shipping, or taxation
differences.
|
1307.4641 | Ricardo Rocha | Danny Munera and Daniel Diaz and Salvador Abreu | Experimenting with X10 for Parallel Constraint-Based Local Search | Proceedings of the 13th International Colloquium on Implementation of
Constraint LOgic Programming Systems (CICLOPS 2013), Istanbul, Turkey, August
25, 2013 | null | null | null | cs.PL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this study, we have investigated the adequacy of the PGAS parallel
language X10 to implement a Constraint-Based Local Search solver. We decided to
code in this language to benefit from the ease of use and architectural
independence from parallel resources which it offers. We present the
implementation strategy, in search of different sources of parallelism in the
context of an implementation of the Adaptive Search algorithm. We extensively
discuss the algorithm and its implementation. The performance evaluation on a
representative set of benchmarks shows close to linear speed-ups, in all the
problems treated.
| [
{
"version": "v1",
"created": "Wed, 17 Jul 2013 14:13:50 GMT"
}
] | 2013-07-18T00:00:00 | [
[
"Munera",
"Danny",
""
],
[
"Diaz",
"Daniel",
""
],
[
"Abreu",
"Salvador",
""
]
] | TITLE: Experimenting with X10 for Parallel Constraint-Based Local Search
ABSTRACT: In this study, we have investigated the adequacy of the PGAS parallel
language X10 to implement a Constraint-Based Local Search solver. We decided to
code in this language to benefit from the ease of use and architectural
independence from parallel resources which it offers. We present the
implementation strategy, in search of different sources of parallelism in the
context of an implementation of the Adaptive Search algorithm. We extensively
discuss the algorithm and its implementation. The performance evaluation on a
representative set of benchmarks shows close to linear speed-ups, in all the
problems treated.
|
1307.4653 | Massimiliano Pontil | Bernardino Romera-Paredes and Massimiliano Pontil | A New Convex Relaxation for Tensor Completion | null | null | null | null | cs.LG math.OC stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study the problem of learning a tensor from a set of linear measurements.
A prominent methodology for this problem is based on a generalization of trace
norm regularization, which has been used extensively for learning low rank
matrices, to the tensor setting. In this paper, we highlight some limitations
of this approach and propose an alternative convex relaxation on the Euclidean
ball. We then describe a technique to solve the associated regularization
problem, which builds upon the alternating direction method of multipliers.
Experiments on one synthetic dataset and two real datasets indicate that the
proposed method improves significantly over tensor trace norm regularization in
terms of estimation error, while remaining computationally tractable.
| [
{
"version": "v1",
"created": "Wed, 17 Jul 2013 14:38:47 GMT"
}
] | 2013-07-18T00:00:00 | [
[
"Romera-Paredes",
"Bernardino",
""
],
[
"Pontil",
"Massimiliano",
""
]
] | TITLE: A New Convex Relaxation for Tensor Completion
ABSTRACT: We study the problem of learning a tensor from a set of linear measurements.
A prominent methodology for this problem is based on a generalization of trace
norm regularization, which has been used extensively for learning low rank
matrices, to the tensor setting. In this paper, we highlight some limitations
of this approach and propose an alternative convex relaxation on the Euclidean
ball. We then describe a technique to solve the associated regularization
problem, which builds upon the alternating direction method of multipliers.
Experiments on one synthetic dataset and two real datasets indicate that the
proposed method improves significantly over tensor trace norm regularization in
terms of estimation error, while remaining computationally tractable.
|
1210.2376 | Manlio De Domenico | Manlio De Domenico, Antonio Lima, Mirco Musolesi | Interdependence and Predictability of Human Mobility and Social
Interactions | 21 pages, 9 figures | null | null | null | physics.soc-ph cs.SI nlin.CD | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Previous studies have shown that human movement is predictable to a certain
extent at different geographic scales. Existing prediction techniques exploit
only the past history of the person taken into consideration as input of the
predictors. In this paper, we show that by means of multivariate nonlinear time
series prediction techniques it is possible to increase the forecasting
accuracy by considering movements of friends, people, or more in general
entities, with correlated mobility patterns (i.e., characterised by high mutual
information) as inputs. Finally, we evaluate the proposed techniques on the
Nokia Mobile Data Challenge and Cabspotting datasets.
| [
{
"version": "v1",
"created": "Mon, 8 Oct 2012 18:44:59 GMT"
},
{
"version": "v2",
"created": "Tue, 16 Jul 2013 17:24:05 GMT"
}
] | 2013-07-17T00:00:00 | [
[
"De Domenico",
"Manlio",
""
],
[
"Lima",
"Antonio",
""
],
[
"Musolesi",
"Mirco",
""
]
] | TITLE: Interdependence and Predictability of Human Mobility and Social
Interactions
ABSTRACT: Previous studies have shown that human movement is predictable to a certain
extent at different geographic scales. Existing prediction techniques exploit
only the past history of the person taken into consideration as input of the
predictors. In this paper, we show that by means of multivariate nonlinear time
series prediction techniques it is possible to increase the forecasting
accuracy by considering movements of friends, people, or more in general
entities, with correlated mobility patterns (i.e., characterised by high mutual
information) as inputs. Finally, we evaluate the proposed techniques on the
Nokia Mobile Data Challenge and Cabspotting datasets.
|
1307.4264 | Rong Zheng | Huy Nguyen and Rong Zheng | A Data-driven Study of Influences in Twitter Communities | 11 pages | null | null | null | cs.SI physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper presents a quantitative study of Twitter, one of the most popular
micro-blogging services, from the perspective of user influence. We crawl
several datasets from the most active communities on Twitter and obtain 20.5
million user profiles, along with 420.2 million directed relations and 105
million tweets among the users. User influence scores are obtained from
influence measurement services, Klout and PeerIndex. Our analysis reveals
interesting findings, including non-power-law influence distribution, strong
reciprocity among users in a community, the existence of homophily and
hierarchical relationships in social influences. Most importantly, we observe
that whether a user retweets a message is strongly influenced by the first of
his followees who posted that message. To capture such an effect, we propose
the first influencer (FI) information diffusion model and show through
extensive evaluation that compared to the widely adopted independent cascade
model, the FI model is more stable and more accurate in predicting influence
spreads in Twitter communities.
| [
{
"version": "v1",
"created": "Tue, 16 Jul 2013 13:07:24 GMT"
}
] | 2013-07-17T00:00:00 | [
[
"Nguyen",
"Huy",
""
],
[
"Zheng",
"Rong",
""
]
] | TITLE: A Data-driven Study of Influences in Twitter Communities
ABSTRACT: This paper presents a quantitative study of Twitter, one of the most popular
micro-blogging services, from the perspective of user influence. We crawl
several datasets from the most active communities on Twitter and obtain 20.5
million user profiles, along with 420.2 million directed relations and 105
million tweets among the users. User influence scores are obtained from
influence measurement services, Klout and PeerIndex. Our analysis reveals
interesting findings, including non-power-law influence distribution, strong
reciprocity among users in a community, the existence of homophily and
hierarchical relationships in social influences. Most importantly, we observe
that whether a user retweets a message is strongly influenced by the first of
his followees who posted that message. To capture such an effect, we propose
the first influencer (FI) information diffusion model and show through
extensive evaluation that compared to the widely adopted independent cascade
model, the FI model is more stable and more accurate in predicting influence
spreads in Twitter communities.
|
1301.4083 | \c{C}a\u{g}lar G\"ul\c{c}ehre | \c{C}a\u{g}lar G\"ul\c{c}ehre and Yoshua Bengio | Knowledge Matters: Importance of Prior Information for Optimization | 37 Pages, 5 figures, 5 tables JMLR Special Topics on Representation
Learning Submission | null | null | null | cs.LG cs.CV cs.NE stat.ML | http://creativecommons.org/licenses/by-nc-sa/3.0/ | We explore the effect of introducing prior information into the intermediate
level of neural networks for a learning task on which all the state-of-the-art
machine learning algorithms tested failed to learn. We motivate our work from
the hypothesis that humans learn such intermediate concepts from other
individuals via a form of supervision or guidance using a curriculum. The
experiments we have conducted provide positive evidence in favor of this
hypothesis. In our experiments, a two-tiered MLP architecture is trained on a
dataset with 64x64 binary inputs images, each image with three sprites. The
final task is to decide whether all the sprites are the same or one of them is
different. Sprites are pentomino tetris shapes and they are placed in an image
with different locations using scaling and rotation transformations. The first
part of the two-tiered MLP is pre-trained with intermediate-level targets being
the presence of sprites at each location, while the second part takes the
output of the first part as input and predicts the final task's target binary
event. The two-tiered MLP architecture, with a few tens of thousand examples,
was able to learn the task perfectly, whereas all other algorithms (include
unsupervised pre-training, but also traditional algorithms like SVMs, decision
trees and boosting) all perform no better than chance. We hypothesize that the
optimization difficulty involved when the intermediate pre-training is not
performed is due to the {\em composition} of two highly non-linear tasks. Our
findings are also consistent with hypotheses on cultural learning inspired by
the observations of optimization problems with deep learning, presumably
because of effective local minima.
| [
{
"version": "v1",
"created": "Thu, 17 Jan 2013 13:06:52 GMT"
},
{
"version": "v2",
"created": "Sun, 20 Jan 2013 05:43:57 GMT"
},
{
"version": "v3",
"created": "Wed, 30 Jan 2013 17:11:19 GMT"
},
{
"version": "v4",
"created": "Wed, 13 Mar 2013 20:13:08 GMT"
},
{
"version": "v5",
"created": "Fri, 15 Mar 2013 05:41:47 GMT"
},
{
"version": "v6",
"created": "Sat, 13 Jul 2013 16:38:36 GMT"
}
] | 2013-07-16T00:00:00 | [
[
"Gülçehre",
"Çağlar",
""
],
[
"Bengio",
"Yoshua",
""
]
] | TITLE: Knowledge Matters: Importance of Prior Information for Optimization
ABSTRACT: We explore the effect of introducing prior information into the intermediate
level of neural networks for a learning task on which all the state-of-the-art
machine learning algorithms tested failed to learn. We motivate our work from
the hypothesis that humans learn such intermediate concepts from other
individuals via a form of supervision or guidance using a curriculum. The
experiments we have conducted provide positive evidence in favor of this
hypothesis. In our experiments, a two-tiered MLP architecture is trained on a
dataset with 64x64 binary inputs images, each image with three sprites. The
final task is to decide whether all the sprites are the same or one of them is
different. Sprites are pentomino tetris shapes and they are placed in an image
with different locations using scaling and rotation transformations. The first
part of the two-tiered MLP is pre-trained with intermediate-level targets being
the presence of sprites at each location, while the second part takes the
output of the first part as input and predicts the final task's target binary
event. The two-tiered MLP architecture, with a few tens of thousand examples,
was able to learn the task perfectly, whereas all other algorithms (include
unsupervised pre-training, but also traditional algorithms like SVMs, decision
trees and boosting) all perform no better than chance. We hypothesize that the
optimization difficulty involved when the intermediate pre-training is not
performed is due to the {\em composition} of two highly non-linear tasks. Our
findings are also consistent with hypotheses on cultural learning inspired by
the observations of optimization problems with deep learning, presumably
because of effective local minima.
|
1307.3626 | Sadegh Aliakbary | Sadegh Aliakbary, Sadegh Motallebi, Jafar Habibi, Ali Movaghar | Learning an Integrated Distance Metric for Comparing Structure of
Complex Networks | null | null | null | null | cs.SI cs.AI physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Graph comparison plays a major role in many network applications. We often
need a similarity metric for comparing networks according to their structural
properties. Various network features - such as degree distribution and
clustering coefficient - provide measurements for comparing networks from
different points of view, but a global and integrated distance metric is still
missing. In this paper, we employ distance metric learning algorithms in order
to construct an integrated distance metric for comparing structural properties
of complex networks. According to natural witnesses of network similarities
(such as network categories) the distance metric is learned by the means of a
dataset of some labeled real networks. For evaluating our proposed method which
is called NetDistance, we applied it as the distance metric in
K-nearest-neighbors classification. Empirical results show that NetDistance
outperforms previous methods, at least 20 percent, with respect to precision.
| [
{
"version": "v1",
"created": "Sat, 13 Jul 2013 07:53:19 GMT"
}
] | 2013-07-16T00:00:00 | [
[
"Aliakbary",
"Sadegh",
""
],
[
"Motallebi",
"Sadegh",
""
],
[
"Habibi",
"Jafar",
""
],
[
"Movaghar",
"Ali",
""
]
] | TITLE: Learning an Integrated Distance Metric for Comparing Structure of
Complex Networks
ABSTRACT: Graph comparison plays a major role in many network applications. We often
need a similarity metric for comparing networks according to their structural
properties. Various network features - such as degree distribution and
clustering coefficient - provide measurements for comparing networks from
different points of view, but a global and integrated distance metric is still
missing. In this paper, we employ distance metric learning algorithms in order
to construct an integrated distance metric for comparing structural properties
of complex networks. According to natural witnesses of network similarities
(such as network categories) the distance metric is learned by the means of a
dataset of some labeled real networks. For evaluating our proposed method which
is called NetDistance, we applied it as the distance metric in
K-nearest-neighbors classification. Empirical results show that NetDistance
outperforms previous methods, at least 20 percent, with respect to precision.
|
1307.3673 | Omar Alonso | Alexandros Ntoulas, Omar Alonso, Vasilis Kandylas | A Data Management Approach for Dataset Selection Using Human Computation | null | null | null | null | cs.LG cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | As the number of applications that use machine learning algorithms increases,
the need for labeled data useful for training such algorithms intensifies.
Getting labels typically involves employing humans to do the annotation,
which directly translates to training and working costs. Crowdsourcing
platforms have made labeling cheaper and faster, but they still involve
significant costs, especially for the cases where the potential set of
candidate data to be labeled is large. In this paper we describe a methodology
and a prototype system aiming at addressing this challenge for Web-scale
problems in an industrial setting. We discuss ideas on how to efficiently
select the data to use for training of machine learning algorithms in an
attempt to reduce cost. We show results achieving good performance with reduced
cost by carefully selecting which instances to label. Our proposed algorithm is
presented as part of a framework for managing and generating training datasets,
which includes, among other components, a human computation element.
| [
{
"version": "v1",
"created": "Sat, 13 Jul 2013 19:29:33 GMT"
}
] | 2013-07-16T00:00:00 | [
[
"Ntoulas",
"Alexandros",
""
],
[
"Alonso",
"Omar",
""
],
[
"Kandylas",
"Vasilis",
""
]
] | TITLE: A Data Management Approach for Dataset Selection Using Human Computation
ABSTRACT: As the number of applications that use machine learning algorithms increases,
the need for labeled data useful for training such algorithms intensifies.
Getting labels typically involves employing humans to do the annotation,
which directly translates to training and working costs. Crowdsourcing
platforms have made labeling cheaper and faster, but they still involve
significant costs, especially for the cases where the potential set of
candidate data to be labeled is large. In this paper we describe a methodology
and a prototype system aiming at addressing this challenge for Web-scale
problems in an industrial setting. We discuss ideas on how to efficiently
select the data to use for training of machine learning algorithms in an
attempt to reduce cost. We show results achieving good performance with reduced
cost by carefully selecting which instances to label. Our proposed algorithm is
presented as part of a framework for managing and generating training datasets,
which includes, among other components, a human computation element.
|
1307.3755 | Nikesh Dattani | Lila Kari (1), Kathleen A. Hill (2), Abu Sadat Sayem (1), Nathaniel
Bryans (3), Katelyn Davis (2), Nikesh S. Dattani (4), ((1) Department of
Computer Science, University of Western Ontario, Canada, (2) Department of
Biology, University of Western Ontario, Canada, (3) Microsoft Corporation,
(4) Department of Chemistry, Oxford University, UK) | Map of Life: Measuring and Visualizing Species' Relatedness with
"Molecular Distance Maps" | 13 pages, 8 figures. Funded by: NSERC/CRSNG (Natural Science &
Engineering Research Council of Canada / Conseil de recherches en sciences
naturelles et en g\'enie du Canada), and the Oxford University Press.
Acknowledgements: Ronghai Tu, Tao Tao, Steffen Kopecki, Andre Lachance,
Jeremy McNeil, Greg Thorn, Oxford University Mathematical Institute | null | null | null | q-bio.GN cs.CV q-bio.PE q-bio.QM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose a novel combination of methods that (i) portrays quantitative
characteristics of a DNA sequence as an image, (ii) computes distances between
these images, and (iii) uses these distances to output a map wherein each
sequence is a point in a common Euclidean space. In the resulting "Molecular
Distance Map" each point signifies a DNA sequence, and the geometric distance
between any two points reflects the degree of relatedness between the
corresponding sequences and species.
Molecular Distance Maps present compelling visual representations of
relationships between species and could be used for taxonomic clarifications,
for species identification, and for studies of evolutionary history. One of the
advantages of this method is its general applicability since, as sequence
alignment is not required, the DNA sequences chosen for comparison can be
completely different regions in different genomes. In fact, this method can be
used to compare any two DNA sequences. For example, in our dataset of 3,176
mitochondrial DNA sequences, it correctly finds the mtDNA sequences most
closely related to that of the anatomically modern human (the Neanderthal, the
Denisovan, and the chimp), and it finds that the sequence most different from
it belongs to a cucumber. Furthermore, our method can be used to compare real
sequences to artificial, computer-generated, DNA sequences. For example, it is
used to determine that the distances between a Homo sapiens sapiens mtDNA and
artificial sequences of the same length and same trinucleotide frequencies can
be larger than the distance between the same human mtDNA and the mtDNA of a
fruit-fly.
We demonstrate this method's promising potential for taxonomical
clarifications by applying it to a diverse variety of cases that have been
historically controversial, such as the genus Polypterus, the family Tarsiidae,
and the vast (super)kingdom Protista.
| [
{
"version": "v1",
"created": "Sun, 14 Jul 2013 17:16:57 GMT"
}
] | 2013-07-16T00:00:00 | [
[
"Kari",
"Lila",
""
],
[
"Hill",
"Kathleen A.",
""
],
[
"Sayem",
"Abu Sadat",
""
],
[
"Bryans",
"Nathaniel",
""
],
[
"Davis",
"Katelyn",
""
],
[
"Dattani",
"Nikesh S.",
""
]
] | TITLE: Map of Life: Measuring and Visualizing Species' Relatedness with
"Molecular Distance Maps"
ABSTRACT: We propose a novel combination of methods that (i) portrays quantitative
characteristics of a DNA sequence as an image, (ii) computes distances between
these images, and (iii) uses these distances to output a map wherein each
sequence is a point in a common Euclidean space. In the resulting "Molecular
Distance Map" each point signifies a DNA sequence, and the geometric distance
between any two points reflects the degree of relatedness between the
corresponding sequences and species.
Molecular Distance Maps present compelling visual representations of
relationships between species and could be used for taxonomic clarifications,
for species identification, and for studies of evolutionary history. One of the
advantages of this method is its general applicability since, as sequence
alignment is not required, the DNA sequences chosen for comparison can be
completely different regions in different genomes. In fact, this method can be
used to compare any two DNA sequences. For example, in our dataset of 3,176
mitochondrial DNA sequences, it correctly finds the mtDNA sequences most
closely related to that of the anatomically modern human (the Neanderthal, the
Denisovan, and the chimp), and it finds that the sequence most different from
it belongs to a cucumber. Furthermore, our method can be used to compare real
sequences to artificial, computer-generated, DNA sequences. For example, it is
used to determine that the distances between a Homo sapiens sapiens mtDNA and
artificial sequences of the same length and same trinucleotide frequencies can
be larger than the distance between the same human mtDNA and the mtDNA of a
fruit-fly.
We demonstrate this method's promising potential for taxonomical
clarifications by applying it to a diverse variety of cases that have been
historically controversial, such as the genus Polypterus, the family Tarsiidae,
and the vast (super)kingdom Protista.
|
1307.3846 | S\'ebastien Brati\`eres | Sebastien Bratieres, Novi Quadrianto, Zoubin Ghahramani | Bayesian Structured Prediction Using Gaussian Processes | 8 pages with figures | null | null | null | stat.ML cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We introduce a conceptually novel structured prediction model, GPstruct,
which is kernelized, non-parametric and Bayesian, by design. We motivate the
model with respect to existing approaches, among others, conditional random
fields (CRFs), maximum margin Markov networks (M3N), and structured support
vector machines (SVMstruct), which embody only a subset of its properties. We
present an inference procedure based on Markov Chain Monte Carlo. The framework
can be instantiated for a wide range of structured objects such as linear
chains, trees, grids, and other general graphs. As a proof of concept, the
model is benchmarked on several natural language processing tasks and a video
gesture segmentation task involving a linear chain structure. We show
prediction accuracies for GPstruct which are comparable to or exceeding those
of CRFs and SVMstruct.
| [
{
"version": "v1",
"created": "Mon, 15 Jul 2013 07:57:56 GMT"
}
] | 2013-07-16T00:00:00 | [
[
"Bratieres",
"Sebastien",
""
],
[
"Quadrianto",
"Novi",
""
],
[
"Ghahramani",
"Zoubin",
""
]
] | TITLE: Bayesian Structured Prediction Using Gaussian Processes
ABSTRACT: We introduce a conceptually novel structured prediction model, GPstruct,
which is kernelized, non-parametric and Bayesian, by design. We motivate the
model with respect to existing approaches, among others, conditional random
fields (CRFs), maximum margin Markov networks (M3N), and structured support
vector machines (SVMstruct), which embody only a subset of its properties. We
present an inference procedure based on Markov Chain Monte Carlo. The framework
can be instantiated for a wide range of structured objects such as linear
chains, trees, grids, and other general graphs. As a proof of concept, the
model is benchmarked on several natural language processing tasks and a video
gesture segmentation task involving a linear chain structure. We show
prediction accuracies for GPstruct which are comparable to or exceeding those
of CRFs and SVMstruct.
|
1307.3872 | Andrea Farruggia | Andrea Farruggia, Paolo Ferragina, Antonio Frangioni, Rossano
Venturini | Bicriteria data compression | null | null | null | null | cs.IT cs.DS math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The advent of massive datasets (and the consequent design of high-performing
distributed storage systems) have reignited the interest of the scientific and
engineering community towards the design of lossless data compressors which
achieve effective compression ratio and very efficient decompression speed.
Lempel-Ziv's LZ77 algorithm is the de facto choice in this scenario because of
its decompression speed and its flexibility in trading decompression speed
versus compressed-space efficiency. Each of the existing implementations offers
a trade-off between space occupancy and decompression speed, so software
engineers have to content themselves by picking the one which comes closer to
the requirements of the application in their hands. Starting from these
premises, and for the first time in the literature, we address in this paper
the problem of trading optimally, and in a principled way, the consumption of
these two resources by introducing the Bicriteria LZ77-Parsing problem, which
formalizes in a principled way what data-compressors have traditionally
approached by means of heuristics. The goal is to determine an LZ77 parsing
which minimizes the space occupancy in bits of the compressed file, provided
that the decompression time is bounded by a fixed amount (or vice-versa). This
way, the software engineer can set its space (or time) requirements and then
derive the LZ77 parsing which optimizes the decompression speed (or the space
occupancy, respectively). We solve this problem efficiently in O(n log^2 n)
time and optimal linear space within a small, additive approximation, by
proving and deploying some specific structural properties of the weighted graph
derived from the possible LZ77-parsings of the input file. The preliminary set
of experiments shows that our novel proposal dominates all the highly
engineered competitors, hence offering a win-win situation in theory&practice.
| [
{
"version": "v1",
"created": "Mon, 15 Jul 2013 10:14:56 GMT"
}
] | 2013-07-16T00:00:00 | [
[
"Farruggia",
"Andrea",
""
],
[
"Ferragina",
"Paolo",
""
],
[
"Frangioni",
"Antonio",
""
],
[
"Venturini",
"Rossano",
""
]
] | TITLE: Bicriteria data compression
ABSTRACT: The advent of massive datasets (and the consequent design of high-performing
distributed storage systems) have reignited the interest of the scientific and
engineering community towards the design of lossless data compressors which
achieve effective compression ratio and very efficient decompression speed.
Lempel-Ziv's LZ77 algorithm is the de facto choice in this scenario because of
its decompression speed and its flexibility in trading decompression speed
versus compressed-space efficiency. Each of the existing implementations offers
a trade-off between space occupancy and decompression speed, so software
engineers have to content themselves by picking the one which comes closer to
the requirements of the application in their hands. Starting from these
premises, and for the first time in the literature, we address in this paper
the problem of trading optimally, and in a principled way, the consumption of
these two resources by introducing the Bicriteria LZ77-Parsing problem, which
formalizes in a principled way what data-compressors have traditionally
approached by means of heuristics. The goal is to determine an LZ77 parsing
which minimizes the space occupancy in bits of the compressed file, provided
that the decompression time is bounded by a fixed amount (or vice-versa). This
way, the software engineer can set its space (or time) requirements and then
derive the LZ77 parsing which optimizes the decompression speed (or the space
occupancy, respectively). We solve this problem efficiently in O(n log^2 n)
time and optimal linear space within a small, additive approximation, by
proving and deploying some specific structural properties of the weighted graph
derived from the possible LZ77-parsings of the input file. The preliminary set
of experiments shows that our novel proposal dominates all the highly
engineered competitors, hence offering a win-win situation in theory&practice.
|
1110.4198 | Alekh Agarwal | Alekh Agarwal, Olivier Chapelle, Miroslav Dudik, John Langford | A Reliable Effective Terascale Linear Learning System | null | null | null | null | cs.LG stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present a system and a set of techniques for learning linear predictors
with convex losses on terascale datasets, with trillions of features, {The
number of features here refers to the number of non-zero entries in the data
matrix.} billions of training examples and millions of parameters in an hour
using a cluster of 1000 machines. Individually none of the component techniques
are new, but the careful synthesis required to obtain an efficient
implementation is. The result is, up to our knowledge, the most scalable and
efficient linear learning system reported in the literature (as of 2011 when
our experiments were conducted). We describe and thoroughly evaluate the
components of the system, showing the importance of the various design choices.
| [
{
"version": "v1",
"created": "Wed, 19 Oct 2011 07:34:19 GMT"
},
{
"version": "v2",
"created": "Sun, 12 Feb 2012 18:31:21 GMT"
},
{
"version": "v3",
"created": "Fri, 12 Jul 2013 03:28:17 GMT"
}
] | 2013-07-15T00:00:00 | [
[
"Agarwal",
"Alekh",
""
],
[
"Chapelle",
"Olivier",
""
],
[
"Dudik",
"Miroslav",
""
],
[
"Langford",
"John",
""
]
] | TITLE: A Reliable Effective Terascale Linear Learning System
ABSTRACT: We present a system and a set of techniques for learning linear predictors
with convex losses on terascale datasets, with trillions of features, {The
number of features here refers to the number of non-zero entries in the data
matrix.} billions of training examples and millions of parameters in an hour
using a cluster of 1000 machines. Individually none of the component techniques
are new, but the careful synthesis required to obtain an efficient
implementation is. The result is, up to our knowledge, the most scalable and
efficient linear learning system reported in the literature (as of 2011 when
our experiments were conducted). We describe and thoroughly evaluate the
components of the system, showing the importance of the various design choices.
|
1307.3284 | Shuai Yuan | Shuai Yuan, Jun Wang | Sequential Selection of Correlated Ads by POMDPs | null | Proceedings of the ACM CIKM '12. 515-524 | 10.1145/2396761.2396828 | null | cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Online advertising has become a key source of revenue for both web search
engines and online publishers. For them, the ability of allocating right ads to
right webpages is critical because any mismatched ads would not only harm web
users' satisfactions but also lower the ad income. In this paper, we study how
online publishers could optimally select ads to maximize their ad incomes over
time. The conventional offline, content-based matching between webpages and ads
is a fine start but cannot solve the problem completely because good matching
does not necessarily lead to good payoff. Moreover, with the limited display
impressions, we need to balance the need of selecting ads to learn true ad
payoffs (exploration) with that of allocating ads to generate high immediate
payoffs based on the current belief (exploitation). In this paper, we address
the problem by employing Partially observable Markov decision processes
(POMDPs) and discuss how to utilize the correlation of ads to improve the
efficiency of the exploration and increase ad incomes in a long run. Our
mathematical derivation shows that the belief states of correlated ads can be
naturally updated using a formula similar to collaborative filtering. To test
our model, a real world ad dataset from a major search engine is collected and
categorized. Experimenting over the data, we provide an analyse of the effect
of the underlying parameters, and demonstrate that our algorithms significantly
outperform other strong baselines.
| [
{
"version": "v1",
"created": "Thu, 11 Jul 2013 22:20:32 GMT"
}
] | 2013-07-15T00:00:00 | [
[
"Yuan",
"Shuai",
""
],
[
"Wang",
"Jun",
""
]
] | TITLE: Sequential Selection of Correlated Ads by POMDPs
ABSTRACT: Online advertising has become a key source of revenue for both web search
engines and online publishers. For them, the ability of allocating right ads to
right webpages is critical because any mismatched ads would not only harm web
users' satisfactions but also lower the ad income. In this paper, we study how
online publishers could optimally select ads to maximize their ad incomes over
time. The conventional offline, content-based matching between webpages and ads
is a fine start but cannot solve the problem completely because good matching
does not necessarily lead to good payoff. Moreover, with the limited display
impressions, we need to balance the need of selecting ads to learn true ad
payoffs (exploration) with that of allocating ads to generate high immediate
payoffs based on the current belief (exploitation). In this paper, we address
the problem by employing Partially observable Markov decision processes
(POMDPs) and discuss how to utilize the correlation of ads to improve the
efficiency of the exploration and increase ad incomes in a long run. Our
mathematical derivation shows that the belief states of correlated ads can be
naturally updated using a formula similar to collaborative filtering. To test
our model, a real world ad dataset from a major search engine is collected and
categorized. Experimenting over the data, we provide an analyse of the effect
of the underlying parameters, and demonstrate that our algorithms significantly
outperform other strong baselines.
|
1307.2669 | Haoyang (Hubert) Duan | Hubert Haoyang Duan, Vladimir Pestov, and Varun Singla | Text Categorization via Similarity Search: An Efficient and Effective
Novel Algorithm | 12 pages, 5 tables, accepted for the 6th International Conference on
Similarity Search and Applications (SISAP 2013) | null | null | null | cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present a supervised learning algorithm for text categorization which has
brought the team of authors the 2nd place in the text categorization division
of the 2012 Cybersecurity Data Mining Competition (CDMC'2012) and a 3rd prize
overall. The algorithm is quite different from existing approaches in that it
is based on similarity search in the metric space of measure distributions on
the dictionary. At the preprocessing stage, given a labeled learning sample of
texts, we associate to every class label (document category) a point in the
space of question. Unlike it is usual in clustering, this point is not a
centroid of the category but rather an outlier, a uniform measure distribution
on a selection of domain-specific words. At the execution stage, an unlabeled
text is assigned a text category as defined by the closest labeled neighbour to
the point representing the frequency distribution of the words in the text. The
algorithm is both effective and efficient, as further confirmed by experiments
on the Reuters 21578 dataset.
| [
{
"version": "v1",
"created": "Wed, 10 Jul 2013 04:41:19 GMT"
}
] | 2013-07-11T00:00:00 | [
[
"Duan",
"Hubert Haoyang",
""
],
[
"Pestov",
"Vladimir",
""
],
[
"Singla",
"Varun",
""
]
] | TITLE: Text Categorization via Similarity Search: An Efficient and Effective
Novel Algorithm
ABSTRACT: We present a supervised learning algorithm for text categorization which has
brought the team of authors the 2nd place in the text categorization division
of the 2012 Cybersecurity Data Mining Competition (CDMC'2012) and a 3rd prize
overall. The algorithm is quite different from existing approaches in that it
is based on similarity search in the metric space of measure distributions on
the dictionary. At the preprocessing stage, given a labeled learning sample of
texts, we associate to every class label (document category) a point in the
space of question. Unlike it is usual in clustering, this point is not a
centroid of the category but rather an outlier, a uniform measure distribution
on a selection of domain-specific words. At the execution stage, an unlabeled
text is assigned a text category as defined by the closest labeled neighbour to
the point representing the frequency distribution of the words in the text. The
algorithm is both effective and efficient, as further confirmed by experiments
on the Reuters 21578 dataset.
|
1205.4683 | Michael Szell | Michael Szell and Stefan Thurner | How women organize social networks different from men | 8 pages, 3 figures | Scientific Reports 3, 1214 (2013) | 10.1038/srep01214 | null | physics.soc-ph cs.SI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Superpositions of social networks, such as communication, friendship, or
trade networks, are called multiplex networks, forming the structural backbone
of human societies. Novel datasets now allow quantification and exploration of
multiplex networks. Here we study gender-specific differences of a multiplex
network from a complete behavioral dataset of an online-game society of about
300,000 players. On the individual level females perform better economically
and are less risk-taking than males. Males reciprocate friendship requests from
females faster than vice versa and hesitate to reciprocate hostile actions of
females. On the network level females have more communication partners, who are
less connected than partners of males. We find a strong homophily effect for
females and higher clustering coefficients of females in trade and attack
networks. Cooperative links between males are under-represented, reflecting
competition for resources among males. These results confirm quantitatively
that females and males manage their social networks in substantially different
ways.
| [
{
"version": "v1",
"created": "Mon, 21 May 2012 18:44:27 GMT"
},
{
"version": "v2",
"created": "Mon, 8 Jul 2013 20:17:56 GMT"
}
] | 2013-07-10T00:00:00 | [
[
"Szell",
"Michael",
""
],
[
"Thurner",
"Stefan",
""
]
] | TITLE: How women organize social networks different from men
ABSTRACT: Superpositions of social networks, such as communication, friendship, or
trade networks, are called multiplex networks, forming the structural backbone
of human societies. Novel datasets now allow quantification and exploration of
multiplex networks. Here we study gender-specific differences of a multiplex
network from a complete behavioral dataset of an online-game society of about
300,000 players. On the individual level females perform better economically
and are less risk-taking than males. Males reciprocate friendship requests from
females faster than vice versa and hesitate to reciprocate hostile actions of
females. On the network level females have more communication partners, who are
less connected than partners of males. We find a strong homophily effect for
females and higher clustering coefficients of females in trade and attack
networks. Cooperative links between males are under-represented, reflecting
competition for resources among males. These results confirm quantitatively
that females and males manage their social networks in substantially different
ways.
|
1307.0220 | Richard Formato | Richard A. Formato | Dipole-Loaded Monopole Optimized Using VSO, v.3 | arXiv admin note: substantial text overlap with arXiv:1107.1437,
arXiv:1103.5629, arXiv:1108.0901, arXiv:1003.1039. Version 2, 02 Jul 2013:
minor typos corrected; hill climber material added; source code listing
updated. Version 3, 06 Jul 2013: replaces VSO diagram/pseudocode to clarify
algorithm's elitist nature; other minor changes | null | null | null | cs.OH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A dipole-loaded monopole antenna is optimized for uniform hemispherical
coverage using VSO, a new global search design and optimization algorithm. The
antenna's performance is compared to genetic algorithm and hill-climber
optimized loaded monopoles, and VSO is tested against two suites of benchmark
functions and several other algorithms.
| [
{
"version": "v1",
"created": "Sun, 30 Jun 2013 16:54:24 GMT"
},
{
"version": "v2",
"created": "Tue, 2 Jul 2013 13:16:51 GMT"
},
{
"version": "v3",
"created": "Sat, 6 Jul 2013 13:55:47 GMT"
}
] | 2013-07-09T00:00:00 | [
[
"Formato",
"Richard A.",
""
]
] | TITLE: Dipole-Loaded Monopole Optimized Using VSO, v.3
ABSTRACT: A dipole-loaded monopole antenna is optimized for uniform hemispherical
coverage using VSO, a new global search design and optimization algorithm. The
antenna's performance is compared to genetic algorithm and hill-climber
optimized loaded monopoles, and VSO is tested against two suites of benchmark
functions and several other algorithms.
|
1307.1370 | Latanya Sweeney | Latanya Sweeney | Matching Known Patients to Health Records in Washington State Data | 13 pages | null | null | null | cs.CY cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The State of Washington sells patient-level health data for $50. This
publicly available dataset has virtually all hospitalizations occurring in the
State in a given year, including patient demographics, diagnoses, procedures,
attending physician, hospital, a summary of charges, and how the bill was paid.
It does not contain patient names or addresses (only ZIPs). Newspaper stories
printed in the State for the same year that contain the word "hospitalized"
often include a patient's name and residential information and explain why the
person was hospitalized, such as vehicle accident or assault. News information
uniquely and exactly matched medical records in the State database for 35 of
the 81 cases (or 43 percent) found in 2011, thereby putting names to patient
records. A news reporter verified matches by contacting patients. Employers,
financial organizations and others know the same kind of information as
reported in news stories making it just as easy for them to identify the
medical records of employees, debtors, and others.
| [
{
"version": "v1",
"created": "Thu, 4 Jul 2013 15:21:34 GMT"
},
{
"version": "v2",
"created": "Fri, 5 Jul 2013 23:04:48 GMT"
}
] | 2013-07-09T00:00:00 | [
[
"Sweeney",
"Latanya",
""
]
] | TITLE: Matching Known Patients to Health Records in Washington State Data
ABSTRACT: The State of Washington sells patient-level health data for $50. This
publicly available dataset has virtually all hospitalizations occurring in the
State in a given year, including patient demographics, diagnoses, procedures,
attending physician, hospital, a summary of charges, and how the bill was paid.
It does not contain patient names or addresses (only ZIPs). Newspaper stories
printed in the State for the same year that contain the word "hospitalized"
often include a patient's name and residential information and explain why the
person was hospitalized, such as vehicle accident or assault. News information
uniquely and exactly matched medical records in the State database for 35 of
the 81 cases (or 43 percent) found in 2011, thereby putting names to patient
records. A news reporter verified matches by contacting patients. Employers,
financial organizations and others know the same kind of information as
reported in news stories making it just as easy for them to identify the
medical records of employees, debtors, and others.
|
1307.1769 | Lior Rokach | Lior Rokach, Alon Schclar, Ehud Itach | Ensemble Methods for Multi-label Classification | null | null | null | null | stat.ML cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Ensemble methods have been shown to be an effective tool for solving
multi-label classification tasks. In the RAndom k-labELsets (RAKEL) algorithm,
each member of the ensemble is associated with a small randomly-selected subset
of k labels. Then, a single label classifier is trained according to each
combination of elements in the subset. In this paper we adopt a similar
approach, however, instead of randomly choosing subsets, we select the minimum
required subsets of k labels that cover all labels and meet additional
constraints such as coverage of inter-label correlations. Construction of the
cover is achieved by formulating the subset selection as a minimum set covering
problem (SCP) and solving it by using approximation algorithms. Every cover
needs only to be prepared once by offline algorithms. Once prepared, a cover
may be applied to the classification of any given multi-label dataset whose
properties conform with those of the cover. The contribution of this paper is
two-fold. First, we introduce SCP as a general framework for constructing label
covers while allowing the user to incorporate cover construction constraints.
We demonstrate the effectiveness of this framework by proposing two
construction constraints whose enforcement produces covers that improve the
prediction performance of random selection. Second, we provide theoretical
bounds that quantify the probabilities of random selection to produce covers
that meet the proposed construction criteria. The experimental results indicate
that the proposed methods improve multi-label classification accuracy and
stability compared with the RAKEL algorithm and to other state-of-the-art
algorithms.
| [
{
"version": "v1",
"created": "Sat, 6 Jul 2013 10:17:44 GMT"
}
] | 2013-07-09T00:00:00 | [
[
"Rokach",
"Lior",
""
],
[
"Schclar",
"Alon",
""
],
[
"Itach",
"Ehud",
""
]
] | TITLE: Ensemble Methods for Multi-label Classification
ABSTRACT: Ensemble methods have been shown to be an effective tool for solving
multi-label classification tasks. In the RAndom k-labELsets (RAKEL) algorithm,
each member of the ensemble is associated with a small randomly-selected subset
of k labels. Then, a single label classifier is trained according to each
combination of elements in the subset. In this paper we adopt a similar
approach, however, instead of randomly choosing subsets, we select the minimum
required subsets of k labels that cover all labels and meet additional
constraints such as coverage of inter-label correlations. Construction of the
cover is achieved by formulating the subset selection as a minimum set covering
problem (SCP) and solving it by using approximation algorithms. Every cover
needs only to be prepared once by offline algorithms. Once prepared, a cover
may be applied to the classification of any given multi-label dataset whose
properties conform with those of the cover. The contribution of this paper is
two-fold. First, we introduce SCP as a general framework for constructing label
covers while allowing the user to incorporate cover construction constraints.
We demonstrate the effectiveness of this framework by proposing two
construction constraints whose enforcement produces covers that improve the
prediction performance of random selection. Second, we provide theoretical
bounds that quantify the probabilities of random selection to produce covers
that meet the proposed construction criteria. The experimental results indicate
that the proposed methods improve multi-label classification accuracy and
stability compared with the RAKEL algorithm and to other state-of-the-art
algorithms.
|
1307.1900 | Arindam Chaudhuri AC | Arindam Chaudhuri, Kajal De | Fuzzy Integer Linear Programming Mathematical Models for Examination
Timetable Problem | International Journal of Innovative Computing, Information and
Control (Special Issue), Volume 7, Number 5, 2011 | null | null | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | ETP is NP Hard combinatorial optimization problem. It has received tremendous
research attention during the past few years given its wide use in
universities. In this Paper, we develop three mathematical models for NSOU,
Kolkata, India using FILP technique. To deal with impreciseness and vagueness
we model various allocation variables through fuzzy numbers. The solution to
the problem is obtained using Fuzzy number ranking method. Each feasible
solution has fuzzy number obtained by Fuzzy objective function. The different
FILP technique performance are demonstrated by experimental data generated
through extensive simulation from NSOU, Kolkata, India in terms of its
execution times. The proposed FILP models are compared with commonly used
heuristic viz. ILP approach on experimental data which gives an idea about
quality of heuristic. The techniques are also compared with different
Artificial Intelligence based heuristics for ETP with respect to best and mean
cost as well as execution time measures on Carter benchmark datasets to
illustrate its effectiveness. FILP takes an appreciable amount of time to
generate satisfactory solution in comparison to other heuristics. The
formulation thus serves as good benchmark for other heuristics. The
experimental study presented here focuses on producing a methodology that
generalizes well over spectrum of techniques that generates significant results
for one or more datasets. The performance of FILP model is finally compared to
the best results cited in literature for Carter benchmarks to assess its
potential. The problem can be further reduced by formulating with lesser number
of allocation variables it without affecting optimality of solution obtained.
FLIP model for ETP can also be adapted to solve other ETP as well as
combinatorial optimization problems.
| [
{
"version": "v1",
"created": "Sun, 7 Jul 2013 19:09:03 GMT"
}
] | 2013-07-09T00:00:00 | [
[
"Chaudhuri",
"Arindam",
""
],
[
"De",
"Kajal",
""
]
] | TITLE: Fuzzy Integer Linear Programming Mathematical Models for Examination
Timetable Problem
ABSTRACT: ETP is NP Hard combinatorial optimization problem. It has received tremendous
research attention during the past few years given its wide use in
universities. In this Paper, we develop three mathematical models for NSOU,
Kolkata, India using FILP technique. To deal with impreciseness and vagueness
we model various allocation variables through fuzzy numbers. The solution to
the problem is obtained using Fuzzy number ranking method. Each feasible
solution has fuzzy number obtained by Fuzzy objective function. The different
FILP technique performance are demonstrated by experimental data generated
through extensive simulation from NSOU, Kolkata, India in terms of its
execution times. The proposed FILP models are compared with commonly used
heuristic viz. ILP approach on experimental data which gives an idea about
quality of heuristic. The techniques are also compared with different
Artificial Intelligence based heuristics for ETP with respect to best and mean
cost as well as execution time measures on Carter benchmark datasets to
illustrate its effectiveness. FILP takes an appreciable amount of time to
generate satisfactory solution in comparison to other heuristics. The
formulation thus serves as good benchmark for other heuristics. The
experimental study presented here focuses on producing a methodology that
generalizes well over spectrum of techniques that generates significant results
for one or more datasets. The performance of FILP model is finally compared to
the best results cited in literature for Carter benchmarks to assess its
potential. The problem can be further reduced by formulating with lesser number
of allocation variables it without affecting optimality of solution obtained.
FLIP model for ETP can also be adapted to solve other ETP as well as
combinatorial optimization problems.
|
1307.2084 | Lucas Maystre | Mohamed Kafsi, Ehsan Kazemi, Lucas Maystre, Lyudmila Yartseva,
Matthias Grossglauser, Patrick Thiran | Mitigating Epidemics through Mobile Micro-measures | Presented at NetMob 2013, Boston | null | null | null | cs.SI cs.CY physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Epidemics of infectious diseases are among the largest threats to the quality
of life and the economic and social well-being of developing countries. The
arsenal of measures against such epidemics is well-established, but costly and
insufficient to mitigate their impact. In this paper, we argue that mobile
technology adds a powerful weapon to this arsenal, because (a) mobile devices
endow us with the unprecedented ability to measure and model the detailed
behavioral patterns of the affected population, and (b) they enable the
delivery of personalized behavioral recommendations to individuals in real
time. We combine these two ideas and propose several strategies to generate
such recommendations from mobility patterns. The goal of each strategy is a
large reduction in infections, with a small impact on the normal course of
daily life. We evaluate these strategies over the Orange D4D dataset and show
the benefit of mobile micro-measures, even if only a fraction of the population
participates. These preliminary results demonstrate the potential of mobile
technology to complement other measures like vaccination and quarantines
against disease epidemics.
| [
{
"version": "v1",
"created": "Mon, 8 Jul 2013 13:15:12 GMT"
}
] | 2013-07-09T00:00:00 | [
[
"Kafsi",
"Mohamed",
""
],
[
"Kazemi",
"Ehsan",
""
],
[
"Maystre",
"Lucas",
""
],
[
"Yartseva",
"Lyudmila",
""
],
[
"Grossglauser",
"Matthias",
""
],
[
"Thiran",
"Patrick",
""
]
] | TITLE: Mitigating Epidemics through Mobile Micro-measures
ABSTRACT: Epidemics of infectious diseases are among the largest threats to the quality
of life and the economic and social well-being of developing countries. The
arsenal of measures against such epidemics is well-established, but costly and
insufficient to mitigate their impact. In this paper, we argue that mobile
technology adds a powerful weapon to this arsenal, because (a) mobile devices
endow us with the unprecedented ability to measure and model the detailed
behavioral patterns of the affected population, and (b) they enable the
delivery of personalized behavioral recommendations to individuals in real
time. We combine these two ideas and propose several strategies to generate
such recommendations from mobility patterns. The goal of each strategy is a
large reduction in infections, with a small impact on the normal course of
daily life. We evaluate these strategies over the Orange D4D dataset and show
the benefit of mobile micro-measures, even if only a fraction of the population
participates. These preliminary results demonstrate the potential of mobile
technology to complement other measures like vaccination and quarantines
against disease epidemics.
|
1307.1482 | Lavindra de Silva | Lavindra de Silva and Amit Kumar Pandey and Mamoun Gharbi and Rachid
Alami | Towards Combining HTN Planning and Geometric Task Planning | RSS Workshop on Combined Robot Motion Planning and AI Planning for
Practical Applications, June 2013 | null | null | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we present an interface between a symbolic planner and a
geometric task planner, which is different to a standard trajectory planner in
that the former is able to perform geometric reasoning on abstract
entities---tasks. We believe that this approach facilitates a more principled
interface to symbolic planning, while also leaving more room for the geometric
planner to make independent decisions. We show how the two planners could be
interfaced, and how their planning and backtracking could be interleaved. We
also provide insights for a methodology for using the combined system, and
experimental results to use as a benchmark with future extensions to both the
combined system, as well as to the geometric task planner.
| [
{
"version": "v1",
"created": "Thu, 4 Jul 2013 20:28:40 GMT"
}
] | 2013-07-08T00:00:00 | [
[
"de Silva",
"Lavindra",
""
],
[
"Pandey",
"Amit Kumar",
""
],
[
"Gharbi",
"Mamoun",
""
],
[
"Alami",
"Rachid",
""
]
] | TITLE: Towards Combining HTN Planning and Geometric Task Planning
ABSTRACT: In this paper we present an interface between a symbolic planner and a
geometric task planner, which is different to a standard trajectory planner in
that the former is able to perform geometric reasoning on abstract
entities---tasks. We believe that this approach facilitates a more principled
interface to symbolic planning, while also leaving more room for the geometric
planner to make independent decisions. We show how the two planners could be
interfaced, and how their planning and backtracking could be interleaved. We
also provide insights for a methodology for using the combined system, and
experimental results to use as a benchmark with future extensions to both the
combined system, as well as to the geometric task planner.
|
1307.1542 | Christian von der Weth | Christian von der Weth and Manfred Hauswirth | DOBBS: Towards a Comprehensive Dataset to Study the Browsing Behavior of
Online Users | null | null | null | null | cs.HC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The investigation of the browsing behavior of users provides useful
information to optimize web site design, web browser design, search engines
offerings, and online advertisement. This has been a topic of active research
since the Web started and a large body of work exists. However, new online
services as well as advances in Web and mobile technologies clearly changed the
meaning behind "browsing the Web" and require a fresh look at the problem and
research, specifically in respect to whether the used models are still
appropriate. Platforms such as YouTube, Netflix or last.fm have started to
replace the traditional media channels (cinema, television, radio) and media
distribution formats (CD, DVD, Blu-ray). Social networks (e.g., Facebook) and
platforms for browser games attracted whole new, particularly less tech-savvy
audiences. Furthermore, advances in mobile technologies and devices made
browsing "on-the-move" the norm and changed the user behavior as in the mobile
case browsing is often being influenced by the user's location and context in
the physical world. Commonly used datasets, such as web server access logs or
search engines transaction logs, are inherently not capable of capturing the
browsing behavior of users in all these facets. DOBBS (DERI Online Behavior
Study) is an effort to create such a dataset in a non-intrusive, completely
anonymous and privacy-preserving way. To this end, DOBBS provides a browser
add-on that users can install, which keeps track of their browsing behavior
(e.g., how much time they spent on the Web, how long they stay on a website,
how often they visit a website, how they use their browser, etc.). In this
paper, we outline the motivation behind DOBBS, describe the add-on and captured
data in detail, and present some first results to highlight the strengths of
DOBBS.
| [
{
"version": "v1",
"created": "Fri, 5 Jul 2013 08:10:11 GMT"
}
] | 2013-07-08T00:00:00 | [
[
"von der Weth",
"Christian",
""
],
[
"Hauswirth",
"Manfred",
""
]
] | TITLE: DOBBS: Towards a Comprehensive Dataset to Study the Browsing Behavior of
Online Users
ABSTRACT: The investigation of the browsing behavior of users provides useful
information to optimize web site design, web browser design, search engines
offerings, and online advertisement. This has been a topic of active research
since the Web started and a large body of work exists. However, new online
services as well as advances in Web and mobile technologies clearly changed the
meaning behind "browsing the Web" and require a fresh look at the problem and
research, specifically in respect to whether the used models are still
appropriate. Platforms such as YouTube, Netflix or last.fm have started to
replace the traditional media channels (cinema, television, radio) and media
distribution formats (CD, DVD, Blu-ray). Social networks (e.g., Facebook) and
platforms for browser games attracted whole new, particularly less tech-savvy
audiences. Furthermore, advances in mobile technologies and devices made
browsing "on-the-move" the norm and changed the user behavior as in the mobile
case browsing is often being influenced by the user's location and context in
the physical world. Commonly used datasets, such as web server access logs or
search engines transaction logs, are inherently not capable of capturing the
browsing behavior of users in all these facets. DOBBS (DERI Online Behavior
Study) is an effort to create such a dataset in a non-intrusive, completely
anonymous and privacy-preserving way. To this end, DOBBS provides a browser
add-on that users can install, which keeps track of their browsing behavior
(e.g., how much time they spent on the Web, how long they stay on a website,
how often they visit a website, how they use their browser, etc.). In this
paper, we outline the motivation behind DOBBS, describe the add-on and captured
data in detail, and present some first results to highlight the strengths of
DOBBS.
|
1307.1601 | Uwe Aickelin | Chris Roadknight, Uwe Aickelin, Alex Ladas, Daniele Soria, John
Scholefield and Lindy Durrant | Biomarker Clustering of Colorectal Cancer Data to Complement Clinical
Classification | Federated Conference on Computer Science and Information Systems
(FedCSIS), pp 187-191, 2012 | null | null | null | cs.LG cs.CE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we describe a dataset relating to cellular and physical
conditions of patients who are operated upon to remove colorectal tumours. This
data provides a unique insight into immunological status at the point of tumour
removal, tumour classification and post-operative survival. Attempts are made
to cluster this dataset and important subsets of it in an effort to
characterize the data and validate existing standards for tumour
classification. It is apparent from optimal clustering that existing tumour
classification is largely unrelated to immunological factors within a patient
and that there may be scope for re-evaluating treatment options and survival
estimates based on a combination of tumour physiology and patient
histochemistry.
| [
{
"version": "v1",
"created": "Fri, 5 Jul 2013 12:56:24 GMT"
}
] | 2013-07-08T00:00:00 | [
[
"Roadknight",
"Chris",
""
],
[
"Aickelin",
"Uwe",
""
],
[
"Ladas",
"Alex",
""
],
[
"Soria",
"Daniele",
""
],
[
"Scholefield",
"John",
""
],
[
"Durrant",
"Lindy",
""
]
] | TITLE: Biomarker Clustering of Colorectal Cancer Data to Complement Clinical
Classification
ABSTRACT: In this paper, we describe a dataset relating to cellular and physical
conditions of patients who are operated upon to remove colorectal tumours. This
data provides a unique insight into immunological status at the point of tumour
removal, tumour classification and post-operative survival. Attempts are made
to cluster this dataset and important subsets of it in an effort to
characterize the data and validate existing standards for tumour
classification. It is apparent from optimal clustering that existing tumour
classification is largely unrelated to immunological factors within a patient
and that there may be scope for re-evaluating treatment options and survival
estimates based on a combination of tumour physiology and patient
histochemistry.
|
1307.1275 | Ruifan Li | Fangxiang Feng and Ruifan Li and Xiaojie Wang | Constructing Hierarchical Image-tags Bimodal Representations for Word
Tags Alternative Choice | 6 pages, 1 figure, Presented at the Workshop on Representation
Learning, ICML 2013 | null | null | null | cs.LG cs.NE | http://creativecommons.org/licenses/by/3.0/ | This paper describes our solution to the multi-modal learning challenge of
ICML. This solution comprises constructing three-level representations in three
consecutive stages and choosing correct tag words with a data-specific
strategy. Firstly, we use typical methods to obtain level-1 representations.
Each image is represented using MPEG-7 and gist descriptors with additional
features released by the contest organizers. And the corresponding word tags
are represented by bag-of-words model with a dictionary of 4000 words.
Secondly, we learn the level-2 representations using two stacked RBMs for each
modality. Thirdly, we propose a bimodal auto-encoder to learn the
similarities/dissimilarities between the pairwise image-tags as level-3
representations. Finally, during the test phase, based on one observation of
the dataset, we come up with a data-specific strategy to choose the correct tag
words leading to a leap of an improved overall performance. Our final average
accuracy on the private test set is 100%, which ranks the first place in this
challenge.
| [
{
"version": "v1",
"created": "Thu, 4 Jul 2013 11:10:45 GMT"
}
] | 2013-07-05T00:00:00 | [
[
"Feng",
"Fangxiang",
""
],
[
"Li",
"Ruifan",
""
],
[
"Wang",
"Xiaojie",
""
]
] | TITLE: Constructing Hierarchical Image-tags Bimodal Representations for Word
Tags Alternative Choice
ABSTRACT: This paper describes our solution to the multi-modal learning challenge of
ICML. This solution comprises constructing three-level representations in three
consecutive stages and choosing correct tag words with a data-specific
strategy. Firstly, we use typical methods to obtain level-1 representations.
Each image is represented using MPEG-7 and gist descriptors with additional
features released by the contest organizers. And the corresponding word tags
are represented by bag-of-words model with a dictionary of 4000 words.
Secondly, we learn the level-2 representations using two stacked RBMs for each
modality. Thirdly, we propose a bimodal auto-encoder to learn the
similarities/dissimilarities between the pairwise image-tags as level-3
representations. Finally, during the test phase, based on one observation of
the dataset, we come up with a data-specific strategy to choose the correct tag
words leading to a leap of an improved overall performance. Our final average
accuracy on the private test set is 100%, which ranks the first place in this
challenge.
|
1307.1391 | Uwe Aickelin | Feng Gu, Jan Feyereisl, Robert Oates, Jenna Reps, Julie Greensmith,
Uwe Aickelin | Quiet in Class: Classification, Noise and the Dendritic Cell Algorithm | Proceedings of the 10th International Conference on Artificial Immune
Systems (ICARIS 2011), LNCS Volume 6825, Cambridge, UK, pp 173-186, 2011 | null | null | null | cs.LG cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Theoretical analyses of the Dendritic Cell Algorithm (DCA) have yielded
several criticisms about its underlying structure and operation. As a result,
several alterations and fixes have been suggested in the literature to correct
for these findings. A contribution of this work is to investigate the effects
of replacing the classification stage of the DCA (which is known to be flawed)
with a traditional machine learning technique. This work goes on to question
the merits of those unique properties of the DCA that are yet to be thoroughly
analysed. If none of these properties can be found to have a benefit over
traditional approaches, then "fixing" the DCA is arguably less efficient than
simply creating a new algorithm. This work examines the dynamic filtering
property of the DCA and questions the utility of this unique feature for the
anomaly detection problem. It is found that this feature, while advantageous
for noisy, time-ordered classification, is not as useful as a traditional
static filter for processing a synthetic dataset. It is concluded that there
are still unique features of the DCA left to investigate. Areas that may be of
benefit to the Artificial Immune Systems community are suggested.
| [
{
"version": "v1",
"created": "Thu, 4 Jul 2013 16:19:21 GMT"
}
] | 2013-07-05T00:00:00 | [
[
"Gu",
"Feng",
""
],
[
"Feyereisl",
"Jan",
""
],
[
"Oates",
"Robert",
""
],
[
"Reps",
"Jenna",
""
],
[
"Greensmith",
"Julie",
""
],
[
"Aickelin",
"Uwe",
""
]
] | TITLE: Quiet in Class: Classification, Noise and the Dendritic Cell Algorithm
ABSTRACT: Theoretical analyses of the Dendritic Cell Algorithm (DCA) have yielded
several criticisms about its underlying structure and operation. As a result,
several alterations and fixes have been suggested in the literature to correct
for these findings. A contribution of this work is to investigate the effects
of replacing the classification stage of the DCA (which is known to be flawed)
with a traditional machine learning technique. This work goes on to question
the merits of those unique properties of the DCA that are yet to be thoroughly
analysed. If none of these properties can be found to have a benefit over
traditional approaches, then "fixing" the DCA is arguably less efficient than
simply creating a new algorithm. This work examines the dynamic filtering
property of the DCA and questions the utility of this unique feature for the
anomaly detection problem. It is found that this feature, while advantageous
for noisy, time-ordered classification, is not as useful as a traditional
static filter for processing a synthetic dataset. It is concluded that there
are still unique features of the DCA left to investigate. Areas that may be of
benefit to the Artificial Immune Systems community are suggested.
|
1307.1417 | Marius Nicolae | Sanguthevar Rajasekaran and Marius Nicolae | An Elegant Algorithm for the Construction of Suffix Arrays | null | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The suffix array is a data structure that finds numerous applications in
string processing problems for both linguistic texts and biological data. It
has been introduced as a memory efficient alternative for suffix trees. The
suffix array consists of the sorted suffixes of a string. There are several
linear time suffix array construction algorithms (SACAs) known in the
literature. However, one of the fastest algorithms in practice has a worst case
run time of $O(n^2)$. The problem of designing practically and theoretically
efficient techniques remains open. In this paper we present an elegant
algorithm for suffix array construction which takes linear time with high
probability; the probability is on the space of all possible inputs. Our
algorithm is one of the simplest of the known SACAs and it opens up a new
dimension of suffix array construction that has not been explored until now.
Our algorithm is easily parallelizable. We offer parallel implementations on
various parallel models of computing. We prove a lemma on the $\ell$-mers of a
random string which might find independent applications. We also present
another algorithm that utilizes the above algorithm. This algorithm is called
RadixSA and has a worst case run time of $O(n\log{n})$. RadixSA introduces an
idea that may find independent applications as a speedup technique for other
SACAs. An empirical comparison of RadixSA with other algorithms on various
datasets reveals that our algorithm is one of the fastest algorithms to date.
The C++ source code is freely available at
http://www.engr.uconn.edu/~man09004/radixSA.zip
| [
{
"version": "v1",
"created": "Thu, 4 Jul 2013 17:10:08 GMT"
}
] | 2013-07-05T00:00:00 | [
[
"Rajasekaran",
"Sanguthevar",
""
],
[
"Nicolae",
"Marius",
""
]
] | TITLE: An Elegant Algorithm for the Construction of Suffix Arrays
ABSTRACT: The suffix array is a data structure that finds numerous applications in
string processing problems for both linguistic texts and biological data. It
has been introduced as a memory efficient alternative for suffix trees. The
suffix array consists of the sorted suffixes of a string. There are several
linear time suffix array construction algorithms (SACAs) known in the
literature. However, one of the fastest algorithms in practice has a worst case
run time of $O(n^2)$. The problem of designing practically and theoretically
efficient techniques remains open. In this paper we present an elegant
algorithm for suffix array construction which takes linear time with high
probability; the probability is on the space of all possible inputs. Our
algorithm is one of the simplest of the known SACAs and it opens up a new
dimension of suffix array construction that has not been explored until now.
Our algorithm is easily parallelizable. We offer parallel implementations on
various parallel models of computing. We prove a lemma on the $\ell$-mers of a
random string which might find independent applications. We also present
another algorithm that utilizes the above algorithm. This algorithm is called
RadixSA and has a worst case run time of $O(n\log{n})$. RadixSA introduces an
idea that may find independent applications as a speedup technique for other
SACAs. An empirical comparison of RadixSA with other algorithms on various
datasets reveals that our algorithm is one of the fastest algorithms to date.
The C++ source code is freely available at
http://www.engr.uconn.edu/~man09004/radixSA.zip
|
1307.0596 | Om Damani | Om P. Damani | Improving Pointwise Mutual Information (PMI) by Incorporating
Significant Co-occurrence | To appear in the proceedings of 17th Conference on Computational
Natural Language Learning, CoNLL 2013 | null | null | null | cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We design a new co-occurrence based word association measure by incorporating
the concept of significant cooccurrence in the popular word association measure
Pointwise Mutual Information (PMI). By extensive experiments with a large
number of publicly available datasets we show that the newly introduced measure
performs better than other co-occurrence based measures and despite being
resource-light, compares well with the best known resource-heavy distributional
similarity and knowledge based word association measures. We investigate the
source of this performance improvement and find that of the two types of
significant co-occurrence - corpus-level and document-level, the concept of
corpus level significance combined with the use of document counts in place of
word counts is responsible for all the performance gains observed. The concept
of document level significance is not helpful for PMI adaptation.
| [
{
"version": "v1",
"created": "Tue, 2 Jul 2013 06:25:51 GMT"
}
] | 2013-07-03T00:00:00 | [
[
"Damani",
"Om P.",
""
]
] | TITLE: Improving Pointwise Mutual Information (PMI) by Incorporating
Significant Co-occurrence
ABSTRACT: We design a new co-occurrence based word association measure by incorporating
the concept of significant cooccurrence in the popular word association measure
Pointwise Mutual Information (PMI). By extensive experiments with a large
number of publicly available datasets we show that the newly introduced measure
performs better than other co-occurrence based measures and despite being
resource-light, compares well with the best known resource-heavy distributional
similarity and knowledge based word association measures. We investigate the
source of this performance improvement and find that of the two types of
significant co-occurrence - corpus-level and document-level, the concept of
corpus level significance combined with the use of document counts in place of
word counts is responsible for all the performance gains observed. The concept
of document level significance is not helpful for PMI adaptation.
|
1307.0747 | Uwe Aickelin | Stephanie Foan, Andrew Jackson, Ian Spendlove, Uwe Aickelin | Simulating the Dynamics of T Cell Subsets Throughout the Lifetime | Proceedings of the 10th International Conference on Artificial Immune
Systems (ICARIS 2011), LNCS Volume 6825, Cambridge, UK, pp 71-76 | null | null | null | cs.CE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | It is widely accepted that the immune system undergoes age-related changes
correlating with increased disease in the elderly. T cell subsets have been
implicated. The aim of this work is firstly to implement and validate a
simulation of T regulatory cell (Treg) dynamics throughout the lifetime, based
on a model by Baltcheva. We show that our initial simulation produces an
inversion between precursor and mature Treys at around 20 years of age, though
the output differs significantly from the original laboratory dataset.
Secondly, this report discusses development of the model to incorporate new
data from a cross-sectional study of healthy blood donors addressing balance
between Treys and Th17 cells with novel markers for Treg. The potential for
simulation to add insight into immune aging is discussed.
| [
{
"version": "v1",
"created": "Tue, 2 Jul 2013 16:19:54 GMT"
}
] | 2013-07-03T00:00:00 | [
[
"Foan",
"Stephanie",
""
],
[
"Jackson",
"Andrew",
""
],
[
"Spendlove",
"Ian",
""
],
[
"Aickelin",
"Uwe",
""
]
] | TITLE: Simulating the Dynamics of T Cell Subsets Throughout the Lifetime
ABSTRACT: It is widely accepted that the immune system undergoes age-related changes
correlating with increased disease in the elderly. T cell subsets have been
implicated. The aim of this work is firstly to implement and validate a
simulation of T regulatory cell (Treg) dynamics throughout the lifetime, based
on a model by Baltcheva. We show that our initial simulation produces an
inversion between precursor and mature Treys at around 20 years of age, though
the output differs significantly from the original laboratory dataset.
Secondly, this report discusses development of the model to incorporate new
data from a cross-sectional study of healthy blood donors addressing balance
between Treys and Th17 cells with novel markers for Treg. The potential for
simulation to add insight into immune aging is discussed.
|
0812.4235 | Francesco Dinuzzo | Francesco Dinuzzo, Gianluigi Pillonetto, Giuseppe De Nicolao | Client-server multi-task learning from distributed datasets | null | null | 10.1109/TNN.2010.2095882 | null | cs.LG cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A client-server architecture to simultaneously solve multiple learning tasks
from distributed datasets is described. In such architecture, each client is
associated with an individual learning task and the associated dataset of
examples. The goal of the architecture is to perform information fusion from
multiple datasets while preserving privacy of individual data. The role of the
server is to collect data in real-time from the clients and codify the
information in a common database. The information coded in this database can be
used by all the clients to solve their individual learning task, so that each
client can exploit the informative content of all the datasets without actually
having access to private data of others. The proposed algorithmic framework,
based on regularization theory and kernel methods, uses a suitable class of
mixed effect kernels. The new method is illustrated through a simulated music
recommendation system.
| [
{
"version": "v1",
"created": "Mon, 22 Dec 2008 16:34:39 GMT"
},
{
"version": "v2",
"created": "Mon, 11 Jan 2010 15:37:43 GMT"
}
] | 2013-07-02T00:00:00 | [
[
"Dinuzzo",
"Francesco",
""
],
[
"Pillonetto",
"Gianluigi",
""
],
[
"De Nicolao",
"Giuseppe",
""
]
] | TITLE: Client-server multi-task learning from distributed datasets
ABSTRACT: A client-server architecture to simultaneously solve multiple learning tasks
from distributed datasets is described. In such architecture, each client is
associated with an individual learning task and the associated dataset of
examples. The goal of the architecture is to perform information fusion from
multiple datasets while preserving privacy of individual data. The role of the
server is to collect data in real-time from the clients and codify the
information in a common database. The information coded in this database can be
used by all the clients to solve their individual learning task, so that each
client can exploit the informative content of all the datasets without actually
having access to private data of others. The proposed algorithmic framework,
based on regularization theory and kernel methods, uses a suitable class of
mixed effect kernels. The new method is illustrated through a simulated music
recommendation system.
|
1111.4541 | Lu Dang Khoa Nguyen | Nguyen Lu Dang Khoa and Sanjay Chawla | Large Scale Spectral Clustering Using Approximate Commute Time Embedding | null | null | 10.1007/978-3-642-33492-4_4 | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Spectral clustering is a novel clustering method which can detect complex
shapes of data clusters. However, it requires the eigen decomposition of the
graph Laplacian matrix, which is proportion to $O(n^3)$ and thus is not
suitable for large scale systems. Recently, many methods have been proposed to
accelerate the computational time of spectral clustering. These approximate
methods usually involve sampling techniques by which a lot information of the
original data may be lost. In this work, we propose a fast and accurate
spectral clustering approach using an approximate commute time embedding, which
is similar to the spectral embedding. The method does not require using any
sampling technique and computing any eigenvector at all. Instead it uses random
projection and a linear time solver to find the approximate embedding. The
experiments in several synthetic and real datasets show that the proposed
approach has better clustering quality and is faster than the state-of-the-art
approximate spectral clustering methods.
| [
{
"version": "v1",
"created": "Sat, 19 Nov 2011 08:39:34 GMT"
},
{
"version": "v2",
"created": "Wed, 29 Feb 2012 04:19:56 GMT"
}
] | 2013-07-02T00:00:00 | [
[
"Khoa",
"Nguyen Lu Dang",
""
],
[
"Chawla",
"Sanjay",
""
]
] | TITLE: Large Scale Spectral Clustering Using Approximate Commute Time Embedding
ABSTRACT: Spectral clustering is a novel clustering method which can detect complex
shapes of data clusters. However, it requires the eigen decomposition of the
graph Laplacian matrix, which is proportion to $O(n^3)$ and thus is not
suitable for large scale systems. Recently, many methods have been proposed to
accelerate the computational time of spectral clustering. These approximate
methods usually involve sampling techniques by which a lot information of the
original data may be lost. In this work, we propose a fast and accurate
spectral clustering approach using an approximate commute time embedding, which
is similar to the spectral embedding. The method does not require using any
sampling technique and computing any eigenvector at all. Instead it uses random
projection and a linear time solver to find the approximate embedding. The
experiments in several synthetic and real datasets show that the proposed
approach has better clustering quality and is faster than the state-of-the-art
approximate spectral clustering methods.
|
1306.5390 | Tejaswi Agarwal | Tejaswi Agarwal, Saurabh Jha and B. Rajesh Kanna | P-HGRMS: A Parallel Hypergraph Based Root Mean Square Algorithm for
Image Denoising | 2 pages, 2 figures. Published as poster at the 22nd ACM International
Symposium on High Performance Parallel and Distributed Systems, HPDC 2013,
New York, USA. Won the Best Poster Award at HPDC 2013 | null | null | null | cs.DC cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper presents a parallel Salt and Pepper (SP) noise removal algorithm
in a grey level digital image based on the Hypergraph Based Root Mean Square
(HGRMS) approach. HGRMS is generic algorithm for identifying noisy pixels in
any digital image using a two level hierarchical serial approach. However, for
SP noise removal, we reduce this algorithm to a parallel model by introducing a
cardinality matrix and an iteration factor, k, which helps us reduce the
dependencies in the existing approach. We also observe that the performance of
the serial implementation is better on smaller images, but once the threshold
is achieved in terms of image resolution, its computational complexity
increases drastically. We test P-HGRMS using standard images from the Berkeley
Segmentation dataset on NVIDIAs Compute Unified Device Architecture (CUDA) for
noise identification and attenuation. We also compare the noise removal
efficiency of the proposed algorithm using Peak Signal to Noise Ratio (PSNR) to
the existing approach. P-HGRMS maintains the noise removal efficiency and
outperforms its sequential counterpart by 6 to 18 times (6x - 18x) in
computational efficiency.
| [
{
"version": "v1",
"created": "Sun, 23 Jun 2013 09:36:08 GMT"
},
{
"version": "v2",
"created": "Sat, 29 Jun 2013 01:32:41 GMT"
}
] | 2013-07-02T00:00:00 | [
[
"Agarwal",
"Tejaswi",
""
],
[
"Jha",
"Saurabh",
""
],
[
"Kanna",
"B. Rajesh",
""
]
] | TITLE: P-HGRMS: A Parallel Hypergraph Based Root Mean Square Algorithm for
Image Denoising
ABSTRACT: This paper presents a parallel Salt and Pepper (SP) noise removal algorithm
in a grey level digital image based on the Hypergraph Based Root Mean Square
(HGRMS) approach. HGRMS is generic algorithm for identifying noisy pixels in
any digital image using a two level hierarchical serial approach. However, for
SP noise removal, we reduce this algorithm to a parallel model by introducing a
cardinality matrix and an iteration factor, k, which helps us reduce the
dependencies in the existing approach. We also observe that the performance of
the serial implementation is better on smaller images, but once the threshold
is achieved in terms of image resolution, its computational complexity
increases drastically. We test P-HGRMS using standard images from the Berkeley
Segmentation dataset on NVIDIAs Compute Unified Device Architecture (CUDA) for
noise identification and attenuation. We also compare the noise removal
efficiency of the proposed algorithm using Peak Signal to Noise Ratio (PSNR) to
the existing approach. P-HGRMS maintains the noise removal efficiency and
outperforms its sequential counterpart by 6 to 18 times (6x - 18x) in
computational efficiency.
|
1307.0129 | Roozbeh Rajabi | Roozbeh Rajabi, Hassan Ghassemian | Hyperspectral Data Unmixing Using GNMF Method and Sparseness Constraint | 4 pages, conference | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Hyperspectral images contain mixed pixels due to low spatial resolution of
hyperspectral sensors. Mixed pixels are pixels containing more than one
distinct material called endmembers. The presence percentages of endmembers in
mixed pixels are called abundance fractions. Spectral unmixing problem refers
to decomposing these pixels into a set of endmembers and abundance fractions.
Due to nonnegativity constraint on abundance fractions, nonnegative matrix
factorization methods (NMF) have been widely used for solving spectral unmixing
problem. In this paper we have used graph regularized (GNMF) method with
sparseness constraint to unmix hyperspectral data. This method applied on
simulated data using AVIRIS Indian Pines dataset and USGS library and results
are quantified based on AAD and SAD measures. Results in comparison with other
methods show that the proposed method can unmix data more effectively.
| [
{
"version": "v1",
"created": "Sat, 29 Jun 2013 16:57:44 GMT"
}
] | 2013-07-02T00:00:00 | [
[
"Rajabi",
"Roozbeh",
""
],
[
"Ghassemian",
"Hassan",
""
]
] | TITLE: Hyperspectral Data Unmixing Using GNMF Method and Sparseness Constraint
ABSTRACT: Hyperspectral images contain mixed pixels due to low spatial resolution of
hyperspectral sensors. Mixed pixels are pixels containing more than one
distinct material called endmembers. The presence percentages of endmembers in
mixed pixels are called abundance fractions. Spectral unmixing problem refers
to decomposing these pixels into a set of endmembers and abundance fractions.
Due to nonnegativity constraint on abundance fractions, nonnegative matrix
factorization methods (NMF) have been widely used for solving spectral unmixing
problem. In this paper we have used graph regularized (GNMF) method with
sparseness constraint to unmix hyperspectral data. This method applied on
simulated data using AVIRIS Indian Pines dataset and USGS library and results
are quantified based on AAD and SAD measures. Results in comparison with other
methods show that the proposed method can unmix data more effectively.
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.