id
large_stringlengths
9
16
submitter
large_stringlengths
3
64
authors
large_stringlengths
5
20.2k
title
large_stringlengths
5
245
comments
large_stringlengths
1
482
journal-ref
large_stringlengths
4
382
doi
large_stringlengths
9
151
report-no
large_stringlengths
2
509
categories
large_stringlengths
5
78
license
large_stringclasses
9 values
abstract
large_stringlengths
83
3.55k
versions
large listlengths
1
21
update_date
timestamp[ms]date
2007-05-23 00:00:00
2025-05-30 00:00:00
authors_parsed
large listlengths
1
1.35k
prompt
large_stringlengths
166
3.64k
1307.0253
Bhavana Dalvi
Bhavana Dalvi, William W. Cohen, Jamie Callan
Exploratory Learning
16 pages; European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases, 2013
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In multiclass semi-supervised learning (SSL), it is sometimes the case that the number of classes present in the data is not known, and hence no labeled examples are provided for some classes. In this paper we present variants of well-known semi-supervised multiclass learning methods that are robust when the data contains an unknown number of classes. In particular, we present an "exploratory" extension of expectation-maximization (EM) that explores different numbers of classes while learning. "Exploratory" SSL greatly improves performance on three datasets in terms of F1 on the classes with seed examples i.e., the classes which are expected to be in the data. Our Exploratory EM algorithm also outperforms a SSL method based non-parametric Bayesian clustering.
[ { "version": "v1", "created": "Mon, 1 Jul 2013 01:09:25 GMT" } ]
2013-07-02T00:00:00
[ [ "Dalvi", "Bhavana", "" ], [ "Cohen", "William W.", "" ], [ "Callan", "Jamie", "" ] ]
TITLE: Exploratory Learning ABSTRACT: In multiclass semi-supervised learning (SSL), it is sometimes the case that the number of classes present in the data is not known, and hence no labeled examples are provided for some classes. In this paper we present variants of well-known semi-supervised multiclass learning methods that are robust when the data contains an unknown number of classes. In particular, we present an "exploratory" extension of expectation-maximization (EM) that explores different numbers of classes while learning. "Exploratory" SSL greatly improves performance on three datasets in terms of F1 on the classes with seed examples i.e., the classes which are expected to be in the data. Our Exploratory EM algorithm also outperforms a SSL method based non-parametric Bayesian clustering.
1307.0261
Bhavana Dalvi
Bhavana Dalvi, William W. Cohen, and Jamie Callan
WebSets: Extracting Sets of Entities from the Web Using Unsupervised Information Extraction
10 pages; International Conference on Web Search and Data Mining 2012
null
null
null
cs.LG cs.CL cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We describe a open-domain information extraction method for extracting concept-instance pairs from an HTML corpus. Most earlier approaches to this problem rely on combining clusters of distributionally similar terms and concept-instance pairs obtained with Hearst patterns. In contrast, our method relies on a novel approach for clustering terms found in HTML tables, and then assigning concept names to these clusters using Hearst patterns. The method can be efficiently applied to a large corpus, and experimental results on several datasets show that our method can accurately extract large numbers of concept-instance pairs.
[ { "version": "v1", "created": "Mon, 1 Jul 2013 02:49:08 GMT" } ]
2013-07-02T00:00:00
[ [ "Dalvi", "Bhavana", "" ], [ "Cohen", "William W.", "" ], [ "Callan", "Jamie", "" ] ]
TITLE: WebSets: Extracting Sets of Entities from the Web Using Unsupervised Information Extraction ABSTRACT: We describe a open-domain information extraction method for extracting concept-instance pairs from an HTML corpus. Most earlier approaches to this problem rely on combining clusters of distributionally similar terms and concept-instance pairs obtained with Hearst patterns. In contrast, our method relies on a novel approach for clustering terms found in HTML tables, and then assigning concept names to these clusters using Hearst patterns. The method can be efficiently applied to a large corpus, and experimental results on several datasets show that our method can accurately extract large numbers of concept-instance pairs.
1307.0320
Wanling Gao
Wanling Gao, Yuqing Zhu, Zhen Jia, Chunjie Luo, Lei Wang, Zhiguo Li, Jianfeng Zhan, Yong Qi, Yongqiang He, Shiming Gong, Xiaona Li, Shujie Zhang, and Bizhu Qiu
BigDataBench: a Big Data Benchmark Suite from Web Search Engines
7 pages, 5 figures, The Third Workshop on Architectures and Systems for Big Data(ASBD 2013) in conjunction with The 40th International Symposium on Computer Architecture, May 2013
null
null
null
cs.IR cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents our joint research efforts on big data benchmarking with several industrial partners. Considering the complexity, diversity, workload churns, and rapid evolution of big data systems, we take an incremental approach in big data benchmarking. For the first step, we pay attention to search engines, which are the most important domain in Internet services in terms of the number of page views and daily visitors. However, search engine service providers treat data, applications, and web access logs as business confidentiality, which prevents us from building benchmarks. To overcome those difficulties, with several industry partners, we widely investigated the open source solutions in search engines, and obtained the permission of using anonymous Web access logs. Moreover, with two years' great efforts, we created a sematic search engine named ProfSearch (available from http://prof.ict.ac.cn). These efforts pave the path for our big data benchmark suite from search engines---BigDataBench, which is released on the web page (http://prof.ict.ac.cn/BigDataBench). We report our detailed analysis of search engine workloads, and present our benchmarking methodology. An innovative data generation methodology and tool are proposed to generate scalable volumes of big data from a small seed of real data, preserving semantics and locality of data. Also, we preliminarily report two case studies using BigDataBench for both system and architecture researches.
[ { "version": "v1", "created": "Mon, 1 Jul 2013 10:27:48 GMT" } ]
2013-07-02T00:00:00
[ [ "Gao", "Wanling", "" ], [ "Zhu", "Yuqing", "" ], [ "Jia", "Zhen", "" ], [ "Luo", "Chunjie", "" ], [ "Wang", "Lei", "" ], [ "Li", "Zhiguo", "" ], [ "Zhan", "Jianfeng", "" ], [ "Qi", "Yong", "" ], [ "He", "Yongqiang", "" ], [ "Gong", "Shiming", "" ], [ "Li", "Xiaona", "" ], [ "Zhang", "Shujie", "" ], [ "Qiu", "Bizhu", "" ] ]
TITLE: BigDataBench: a Big Data Benchmark Suite from Web Search Engines ABSTRACT: This paper presents our joint research efforts on big data benchmarking with several industrial partners. Considering the complexity, diversity, workload churns, and rapid evolution of big data systems, we take an incremental approach in big data benchmarking. For the first step, we pay attention to search engines, which are the most important domain in Internet services in terms of the number of page views and daily visitors. However, search engine service providers treat data, applications, and web access logs as business confidentiality, which prevents us from building benchmarks. To overcome those difficulties, with several industry partners, we widely investigated the open source solutions in search engines, and obtained the permission of using anonymous Web access logs. Moreover, with two years' great efforts, we created a sematic search engine named ProfSearch (available from http://prof.ict.ac.cn). These efforts pave the path for our big data benchmark suite from search engines---BigDataBench, which is released on the web page (http://prof.ict.ac.cn/BigDataBench). We report our detailed analysis of search engine workloads, and present our benchmarking methodology. An innovative data generation methodology and tool are proposed to generate scalable volumes of big data from a small seed of real data, preserving semantics and locality of data. Also, we preliminarily report two case studies using BigDataBench for both system and architecture researches.
1307.0414
Ian Goodfellow
Ian J. Goodfellow, Dumitru Erhan, Pierre Luc Carrier, Aaron Courville, Mehdi Mirza, Ben Hamner, Will Cukierski, Yichuan Tang, David Thaler, Dong-Hyun Lee, Yingbo Zhou, Chetan Ramaiah, Fangxiang Feng, Ruifan Li, Xiaojie Wang, Dimitris Athanasakis, John Shawe-Taylor, Maxim Milakov, John Park, Radu Ionescu, Marius Popescu, Cristian Grozea, James Bergstra, Jingjing Xie, Lukasz Romaszko, Bing Xu, Zhang Chuang, and Yoshua Bengio
Challenges in Representation Learning: A report on three machine learning contests
8 pages, 2 figures
null
null
null
stat.ML cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The ICML 2013 Workshop on Challenges in Representation Learning focused on three challenges: the black box learning challenge, the facial expression recognition challenge, and the multimodal learning challenge. We describe the datasets created for these challenges and summarize the results of the competitions. We provide suggestions for organizers of future challenges and some comments on what kind of knowledge can be gained from machine learning competitions.
[ { "version": "v1", "created": "Mon, 1 Jul 2013 15:53:22 GMT" } ]
2013-07-02T00:00:00
[ [ "Goodfellow", "Ian J.", "" ], [ "Erhan", "Dumitru", "" ], [ "Carrier", "Pierre Luc", "" ], [ "Courville", "Aaron", "" ], [ "Mirza", "Mehdi", "" ], [ "Hamner", "Ben", "" ], [ "Cukierski", "Will", "" ], [ "Tang", "Yichuan", "" ], [ "Thaler", "David", "" ], [ "Lee", "Dong-Hyun", "" ], [ "Zhou", "Yingbo", "" ], [ "Ramaiah", "Chetan", "" ], [ "Feng", "Fangxiang", "" ], [ "Li", "Ruifan", "" ], [ "Wang", "Xiaojie", "" ], [ "Athanasakis", "Dimitris", "" ], [ "Shawe-Taylor", "John", "" ], [ "Milakov", "Maxim", "" ], [ "Park", "John", "" ], [ "Ionescu", "Radu", "" ], [ "Popescu", "Marius", "" ], [ "Grozea", "Cristian", "" ], [ "Bergstra", "James", "" ], [ "Xie", "Jingjing", "" ], [ "Romaszko", "Lukasz", "" ], [ "Xu", "Bing", "" ], [ "Chuang", "Zhang", "" ], [ "Bengio", "Yoshua", "" ] ]
TITLE: Challenges in Representation Learning: A report on three machine learning contests ABSTRACT: The ICML 2013 Workshop on Challenges in Representation Learning focused on three challenges: the black box learning challenge, the facial expression recognition challenge, and the multimodal learning challenge. We describe the datasets created for these challenges and summarize the results of the competitions. We provide suggestions for organizers of future challenges and some comments on what kind of knowledge can be gained from machine learning competitions.
1307.0475
Faraz Ahmed
Faraz Ahmed, Rong Jin and Alex X. Liu
A Random Matrix Approach to Differential Privacy and Structure Preserved Social Network Graph Publishing
null
null
null
null
cs.CR cs.SI physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Online social networks are being increasingly used for analyzing various societal phenomena such as epidemiology, information dissemination, marketing and sentiment flow. Popular analysis techniques such as clustering and influential node analysis, require the computation of eigenvectors of the real graph's adjacency matrix. Recent de-anonymization attacks on Netflix and AOL datasets show that an open access to such graphs pose privacy threats. Among the various privacy preserving models, Differential privacy provides the strongest privacy guarantees. In this paper we propose a privacy preserving mechanism for publishing social network graph data, which satisfies differential privacy guarantees by utilizing a combination of theory of random matrix and that of differential privacy. The key idea is to project each row of an adjacency matrix to a low dimensional space using the random projection approach and then perturb the projected matrix with random noise. We show that as compared to existing approaches for differential private approximation of eigenvectors, our approach is computationally efficient, preserves the utility and satisfies differential privacy. We evaluate our approach on social network graphs of Facebook, Live Journal and Pokec. The results show that even for high values of noise variance sigma=1 the clustering quality given by normalized mutual information gain is as low as 0.74. For influential node discovery, the propose approach is able to correctly recover 80 of the most influential nodes. We also compare our results with an approach presented in [43], which directly perturbs the eigenvector of the original data by a Laplacian noise. The results show that this approach requires a large random perturbation in order to preserve the differential privacy, which leads to a poor estimation of eigenvectors for large social networks.
[ { "version": "v1", "created": "Mon, 1 Jul 2013 18:46:28 GMT" } ]
2013-07-02T00:00:00
[ [ "Ahmed", "Faraz", "" ], [ "Jin", "Rong", "" ], [ "Liu", "Alex X.", "" ] ]
TITLE: A Random Matrix Approach to Differential Privacy and Structure Preserved Social Network Graph Publishing ABSTRACT: Online social networks are being increasingly used for analyzing various societal phenomena such as epidemiology, information dissemination, marketing and sentiment flow. Popular analysis techniques such as clustering and influential node analysis, require the computation of eigenvectors of the real graph's adjacency matrix. Recent de-anonymization attacks on Netflix and AOL datasets show that an open access to such graphs pose privacy threats. Among the various privacy preserving models, Differential privacy provides the strongest privacy guarantees. In this paper we propose a privacy preserving mechanism for publishing social network graph data, which satisfies differential privacy guarantees by utilizing a combination of theory of random matrix and that of differential privacy. The key idea is to project each row of an adjacency matrix to a low dimensional space using the random projection approach and then perturb the projected matrix with random noise. We show that as compared to existing approaches for differential private approximation of eigenvectors, our approach is computationally efficient, preserves the utility and satisfies differential privacy. We evaluate our approach on social network graphs of Facebook, Live Journal and Pokec. The results show that even for high values of noise variance sigma=1 the clustering quality given by normalized mutual information gain is as low as 0.74. For influential node discovery, the propose approach is able to correctly recover 80 of the most influential nodes. We also compare our results with an approach presented in [43], which directly perturbs the eigenvector of the original data by a Laplacian noise. The results show that this approach requires a large random perturbation in order to preserve the differential privacy, which leads to a poor estimation of eigenvectors for large social networks.
1305.3250
Cristian Popescu
Marian Popescu, Peter J. Dugan, Mohammad Pourhomayoun, Denise Risch, Harold W. Lewis III, Christopher W. Clark
Bioacoustical Periodic Pulse Train Signal Detection and Classification using Spectrogram Intensity Binarization and Energy Projection
ICML 2013 Workshop on Machine Learning for Bioacoustics, 2013, 6 pages
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The following work outlines an approach for automatic detection and recognition of periodic pulse train signals using a multi-stage process based on spectrogram edge detection, energy projection and classification. The method has been implemented to automatically detect and recognize pulse train songs of minke whales. While the long term goal of this work is to properly identify and detect minke songs from large multi-year datasets, this effort was developed using sounds off the coast of Massachusetts, in the Stellwagen Bank National Marine Sanctuary. The detection methodology is presented and evaluated on 232 continuous hours of acoustic recordings and a qualitative analysis of machine learning classifiers and their performance is described. The trained automatic detection and classification system is applied to 120 continuous hours, comprised of various challenges such as broadband and narrowband noises, low SNR, and other pulse train signatures. This automatic system achieves a TPR of 63% for FPR of 0.6% (or 0.87 FP/h), at a Precision (PPV) of 84% and an F1 score of 71%.
[ { "version": "v1", "created": "Tue, 14 May 2013 18:49:52 GMT" }, { "version": "v2", "created": "Mon, 17 Jun 2013 20:09:07 GMT" }, { "version": "v3", "created": "Fri, 28 Jun 2013 17:33:59 GMT" } ]
2013-07-01T00:00:00
[ [ "Popescu", "Marian", "" ], [ "Dugan", "Peter J.", "" ], [ "Pourhomayoun", "Mohammad", "" ], [ "Risch", "Denise", "" ], [ "Lewis", "Harold W.", "III" ], [ "Clark", "Christopher W.", "" ] ]
TITLE: Bioacoustical Periodic Pulse Train Signal Detection and Classification using Spectrogram Intensity Binarization and Energy Projection ABSTRACT: The following work outlines an approach for automatic detection and recognition of periodic pulse train signals using a multi-stage process based on spectrogram edge detection, energy projection and classification. The method has been implemented to automatically detect and recognize pulse train songs of minke whales. While the long term goal of this work is to properly identify and detect minke songs from large multi-year datasets, this effort was developed using sounds off the coast of Massachusetts, in the Stellwagen Bank National Marine Sanctuary. The detection methodology is presented and evaluated on 232 continuous hours of acoustic recordings and a qualitative analysis of machine learning classifiers and their performance is described. The trained automatic detection and classification system is applied to 120 continuous hours, comprised of various challenges such as broadband and narrowband noises, low SNR, and other pulse train signatures. This automatic system achieves a TPR of 63% for FPR of 0.6% (or 0.87 FP/h), at a Precision (PPV) of 84% and an F1 score of 71%.
1306.6805
Sara Hajian
Sara Hajian
Simultaneous Discrimination Prevention and Privacy Protection in Data Publishing and Mining
PhD Thesis defended on June 10, 2013, at the Department of Computer Engineering and Mathematics of Universitat Rovira i Virgili. Advisors: Josep Domingo-Ferrer and Dino Pedreschi
null
null
null
cs.DB cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Data mining is an increasingly important technology for extracting useful knowledge hidden in large collections of data. There are, however, negative social perceptions about data mining, among which potential privacy violation and potential discrimination. Automated data collection and data mining techniques such as classification have paved the way to making automated decisions, like loan granting/denial, insurance premium computation. If the training datasets are biased in what regards discriminatory attributes like gender, race, religion, discriminatory decisions may ensue. In the first part of this thesis, we tackle discrimination prevention in data mining and propose new techniques applicable for direct or indirect discrimination prevention individually or both at the same time. We discuss how to clean training datasets and outsourced datasets in such a way that direct and/or indirect discriminatory decision rules are converted to legitimate (non-discriminatory) classification rules. In the second part of this thesis, we argue that privacy and discrimination risks should be tackled together. We explore the relationship between privacy preserving data mining and discrimination prevention in data mining to design holistic approaches capable of addressing both threats simultaneously during the knowledge discovery process. As part of this effort, we have investigated for the first time the problem of discrimination and privacy aware frequent pattern discovery, i.e. the sanitization of the collection of patterns mined from a transaction database in such a way that neither privacy-violating nor discriminatory inferences can be inferred on the released patterns. Moreover, we investigate the problem of discrimination and privacy aware data publishing, i.e. transforming the data, instead of patterns, in order to simultaneously fulfill privacy preservation and discrimination prevention.
[ { "version": "v1", "created": "Fri, 28 Jun 2013 12:00:56 GMT" } ]
2013-07-01T00:00:00
[ [ "Hajian", "Sara", "" ] ]
TITLE: Simultaneous Discrimination Prevention and Privacy Protection in Data Publishing and Mining ABSTRACT: Data mining is an increasingly important technology for extracting useful knowledge hidden in large collections of data. There are, however, negative social perceptions about data mining, among which potential privacy violation and potential discrimination. Automated data collection and data mining techniques such as classification have paved the way to making automated decisions, like loan granting/denial, insurance premium computation. If the training datasets are biased in what regards discriminatory attributes like gender, race, religion, discriminatory decisions may ensue. In the first part of this thesis, we tackle discrimination prevention in data mining and propose new techniques applicable for direct or indirect discrimination prevention individually or both at the same time. We discuss how to clean training datasets and outsourced datasets in such a way that direct and/or indirect discriminatory decision rules are converted to legitimate (non-discriminatory) classification rules. In the second part of this thesis, we argue that privacy and discrimination risks should be tackled together. We explore the relationship between privacy preserving data mining and discrimination prevention in data mining to design holistic approaches capable of addressing both threats simultaneously during the knowledge discovery process. As part of this effort, we have investigated for the first time the problem of discrimination and privacy aware frequent pattern discovery, i.e. the sanitization of the collection of patterns mined from a transaction database in such a way that neither privacy-violating nor discriminatory inferences can be inferred on the released patterns. Moreover, we investigate the problem of discrimination and privacy aware data publishing, i.e. transforming the data, instead of patterns, in order to simultaneously fulfill privacy preservation and discrimination prevention.
1306.6811
Vladimir P. Gerdt
Vladimir P. Gerdt, Amir Hashemi, Benyamin M.-Alizadeh
Involutive Bases Algorithm Incorporating F5 Criterion
24 pages, 2 figures
null
null
null
math.AC cs.SC math.RA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Faugere's F5 algorithm is the fastest known algorithm to compute Groebner bases. It has a signature-based and an incremental structure that allow to apply the F5 criterion for deletion of unnecessary reductions. In this paper, we present an involutive completion algorithm which outputs a minimal involutive basis. Our completion algorithm has a nonincremental structure and in addition to the involutive form of Buchberger's criteria it applies the F5 criterion whenever this criterion is applicable in the course of completion to involution. In doing so, we use the G2V form of the F5 criterion developed by Gao, Guan and Volny IV. To compare the proposed algorithm, via a set of benchmarks, with the Gerdt-Blinkov involutive algorithm (which does not apply the F5 criterion) we use implementations of both algorithms done on the same platform in Maple.
[ { "version": "v1", "created": "Fri, 28 Jun 2013 12:33:06 GMT" } ]
2013-07-01T00:00:00
[ [ "Gerdt", "Vladimir P.", "" ], [ "Hashemi", "Amir", "" ], [ "-Alizadeh", "Benyamin M.", "" ] ]
TITLE: Involutive Bases Algorithm Incorporating F5 Criterion ABSTRACT: Faugere's F5 algorithm is the fastest known algorithm to compute Groebner bases. It has a signature-based and an incremental structure that allow to apply the F5 criterion for deletion of unnecessary reductions. In this paper, we present an involutive completion algorithm which outputs a minimal involutive basis. Our completion algorithm has a nonincremental structure and in addition to the involutive form of Buchberger's criteria it applies the F5 criterion whenever this criterion is applicable in the course of completion to involution. In doing so, we use the G2V form of the F5 criterion developed by Gao, Guan and Volny IV. To compare the proposed algorithm, via a set of benchmarks, with the Gerdt-Blinkov involutive algorithm (which does not apply the F5 criterion) we use implementations of both algorithms done on the same platform in Maple.
1306.6842
Dimitris Arabadjis
Dimitris Arabadjis, Fotios Giannopoulos, Constantin Papaodysseus, Solomon Zannos, Panayiotis Rousopoulos, Michail Panagopoulos, Christopher Blackwell
New Mathematical and Algorithmic Schemes for Pattern Classification with Application to the Identification of Writers of Important Ancient Documents
null
Pattern Recognition, Volume 46, Issue 8, Pages 2278-2296, August 2013
10.1016/j.patcog.2013.01.019
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, a novel approach is introduced for classifying curves into proper families, according to their similarity. First, a mathematical quantity we call plane curvature is introduced and a number of propositions are stated and proved. Proper similarity measures of two curves are introduced and a subsequent statistical analysis is applied. First, the efficiency of the curve fitting process has been tested on 2 shapes datasets of reference. Next, the methodology has been applied to the very important problem of classifying 23 Byzantine codices and 46 Ancient inscriptions to their writers, thus achieving correct dating of their content. The inscriptions have been attributed to ten individual hands and the Byzantine codices to four writers.
[ { "version": "v1", "created": "Fri, 28 Jun 2013 13:51:18 GMT" } ]
2013-07-01T00:00:00
[ [ "Arabadjis", "Dimitris", "" ], [ "Giannopoulos", "Fotios", "" ], [ "Papaodysseus", "Constantin", "" ], [ "Zannos", "Solomon", "" ], [ "Rousopoulos", "Panayiotis", "" ], [ "Panagopoulos", "Michail", "" ], [ "Blackwell", "Christopher", "" ] ]
TITLE: New Mathematical and Algorithmic Schemes for Pattern Classification with Application to the Identification of Writers of Important Ancient Documents ABSTRACT: In this paper, a novel approach is introduced for classifying curves into proper families, according to their similarity. First, a mathematical quantity we call plane curvature is introduced and a number of propositions are stated and proved. Proper similarity measures of two curves are introduced and a subsequent statistical analysis is applied. First, the efficiency of the curve fitting process has been tested on 2 shapes datasets of reference. Next, the methodology has been applied to the very important problem of classifying 23 Byzantine codices and 46 Ancient inscriptions to their writers, thus achieving correct dating of their content. The inscriptions have been attributed to ten individual hands and the Byzantine codices to four writers.
1204.4224
Eric Schulte
Eric Schulte and Zachary P. Fry and Ethan Fast and Westley Weimer and Stephanie Forrest
Software Mutational Robustness
null
null
null
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Neutral landscapes and mutational robustness are believed to be important enablers of evolvability in biology. We apply these concepts to software, defining mutational robustness to be the fraction of random mutations that leave a program's behavior unchanged. Test cases are used to measure program behavior and mutation operators are taken from genetic programming. Although software is often viewed as brittle, with small changes leading to catastrophic changes in behavior, our results show surprising robustness in the face of random software mutations. The paper describes empirical studies of the mutational robustness of 22 programs, including 14 production software projects, the Siemens benchmarks, and 4 specially constructed programs. We find that over 30% of random mutations are neutral with respect to their test suite. The results hold across all classes of programs, for mutations at both the source code and assembly instruction levels, across various programming languages, and are only weakly related to test suite coverage. We conclude that mutational robustness is an inherent property of software, and that neutral variants (i.e., those that pass the test suite) often fulfill the program's original purpose or specification. Based on these results, we conjecture that neutral mutations can be leveraged as a mechanism for generating software diversity. We demonstrate this idea by generating a population of neutral program variants and showing that the variants automatically repair unknown bugs with high probability. Neutral landscapes also provide a partial explanation for recent results that use evolutionary computation to automatically repair software bugs.
[ { "version": "v1", "created": "Wed, 18 Apr 2012 23:28:43 GMT" }, { "version": "v2", "created": "Wed, 12 Dec 2012 21:57:16 GMT" }, { "version": "v3", "created": "Thu, 27 Jun 2013 19:20:01 GMT" } ]
2013-06-28T00:00:00
[ [ "Schulte", "Eric", "" ], [ "Fry", "Zachary P.", "" ], [ "Fast", "Ethan", "" ], [ "Weimer", "Westley", "" ], [ "Forrest", "Stephanie", "" ] ]
TITLE: Software Mutational Robustness ABSTRACT: Neutral landscapes and mutational robustness are believed to be important enablers of evolvability in biology. We apply these concepts to software, defining mutational robustness to be the fraction of random mutations that leave a program's behavior unchanged. Test cases are used to measure program behavior and mutation operators are taken from genetic programming. Although software is often viewed as brittle, with small changes leading to catastrophic changes in behavior, our results show surprising robustness in the face of random software mutations. The paper describes empirical studies of the mutational robustness of 22 programs, including 14 production software projects, the Siemens benchmarks, and 4 specially constructed programs. We find that over 30% of random mutations are neutral with respect to their test suite. The results hold across all classes of programs, for mutations at both the source code and assembly instruction levels, across various programming languages, and are only weakly related to test suite coverage. We conclude that mutational robustness is an inherent property of software, and that neutral variants (i.e., those that pass the test suite) often fulfill the program's original purpose or specification. Based on these results, we conjecture that neutral mutations can be leveraged as a mechanism for generating software diversity. We demonstrate this idea by generating a population of neutral program variants and showing that the variants automatically repair unknown bugs with high probability. Neutral landscapes also provide a partial explanation for recent results that use evolutionary computation to automatically repair software bugs.
1302.0621
Patrick P. C. Lee
Chun-Ho Ng and Patrick P. C. Lee
RevDedup: A Reverse Deduplication Storage System Optimized for Reads to Latest Backups
A 7-page version appeared in APSys'13
null
null
null
cs.DC cs.OS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Scaling up the backup storage for an ever-increasing volume of virtual machine (VM) images is a critical issue in virtualization environments. While deduplication is known to effectively eliminate duplicates for VM image storage, it also introduces fragmentation that will degrade read performance. We propose RevDedup, a deduplication system that optimizes reads to latest VM image backups using an idea called reverse deduplication. In contrast with conventional deduplication that removes duplicates from new data, RevDedup removes duplicates from old data, thereby shifting fragmentation to old data while keeping the layout of new data as sequential as possible. We evaluate our RevDedup prototype using microbenchmark and real-world workloads. For a 12-week span of real-world VM images from 160 users, RevDedup achieves high deduplication efficiency with around 97% of saving, and high backup and read throughput on the order of 1GB/s. RevDedup also incurs small metadata overhead in backup/read operations.
[ { "version": "v1", "created": "Mon, 4 Feb 2013 09:09:38 GMT" }, { "version": "v2", "created": "Wed, 6 Feb 2013 12:32:32 GMT" }, { "version": "v3", "created": "Thu, 27 Jun 2013 06:04:17 GMT" } ]
2013-06-28T00:00:00
[ [ "Ng", "Chun-Ho", "" ], [ "Lee", "Patrick P. C.", "" ] ]
TITLE: RevDedup: A Reverse Deduplication Storage System Optimized for Reads to Latest Backups ABSTRACT: Scaling up the backup storage for an ever-increasing volume of virtual machine (VM) images is a critical issue in virtualization environments. While deduplication is known to effectively eliminate duplicates for VM image storage, it also introduces fragmentation that will degrade read performance. We propose RevDedup, a deduplication system that optimizes reads to latest VM image backups using an idea called reverse deduplication. In contrast with conventional deduplication that removes duplicates from new data, RevDedup removes duplicates from old data, thereby shifting fragmentation to old data while keeping the layout of new data as sequential as possible. We evaluate our RevDedup prototype using microbenchmark and real-world workloads. For a 12-week span of real-world VM images from 160 users, RevDedup achieves high deduplication efficiency with around 97% of saving, and high backup and read throughput on the order of 1GB/s. RevDedup also incurs small metadata overhead in backup/read operations.
1304.1838
Jagan Sankaranarayanan
Jeff LeFevre, Jagan Sankaranarayanan, Hakan Hacigumus, Junichi Tatemura, Neoklis Polyzotis
Towards a Workload for Evolutionary Analytics
10 pages
DanaC: Workshop on Data analytics in the Cloud, June 2013, New York, NY
null
null
cs.DB cs.DC cs.PF
http://creativecommons.org/licenses/by-nc-sa/3.0/
Emerging data analysis involves the ingestion and exploration of new data sets, application of complex functions, and frequent query revisions based on observing prior query answers. We call this new type of analysis evolutionary analytics and identify its properties. This type of analysis is not well represented by current benchmark workloads. In this paper, we present a workload and identify several metrics to test system support for evolutionary analytics. Along with our metrics, we present methodologies for running the workload that capture this analytical scenario.
[ { "version": "v1", "created": "Sat, 6 Apr 2013 00:26:41 GMT" }, { "version": "v2", "created": "Fri, 12 Apr 2013 07:00:10 GMT" }, { "version": "v3", "created": "Thu, 27 Jun 2013 19:19:22 GMT" } ]
2013-06-28T00:00:00
[ [ "LeFevre", "Jeff", "" ], [ "Sankaranarayanan", "Jagan", "" ], [ "Hacigumus", "Hakan", "" ], [ "Tatemura", "Junichi", "" ], [ "Polyzotis", "Neoklis", "" ] ]
TITLE: Towards a Workload for Evolutionary Analytics ABSTRACT: Emerging data analysis involves the ingestion and exploration of new data sets, application of complex functions, and frequent query revisions based on observing prior query answers. We call this new type of analysis evolutionary analytics and identify its properties. This type of analysis is not well represented by current benchmark workloads. In this paper, we present a workload and identify several metrics to test system support for evolutionary analytics. Along with our metrics, we present methodologies for running the workload that capture this analytical scenario.
1302.5192
Kyumars Sheykh Esmaili
Kyumars Sheykh Esmaili, Lluis Pamies-Juarez, Anwitaman Datta
The CORE Storage Primitive: Cross-Object Redundancy for Efficient Data Repair & Access in Erasure Coded Storage
null
null
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Erasure codes are an integral part of many distributed storage systems aimed at Big Data, since they provide high fault-tolerance for low overheads. However, traditional erasure codes are inefficient on reading stored data in degraded environments (when nodes might be unavailable), and on replenishing lost data (vital for long term resilience). Consequently, novel codes optimized to cope with distributed storage system nuances are vigorously being researched. In this paper, we take an engineering alternative, exploring the use of simple and mature techniques -juxtaposing a standard erasure code with RAID-4 like parity. We carry out an analytical study to determine the efficacy of this approach over traditional as well as some novel codes. We build upon this study to design CORE, a general storage primitive that we integrate into HDFS. We benchmark this implementation in a proprietary cluster and in EC2. Our experiments show that compared to traditional erasure codes, CORE uses 50% less bandwidth and is up to 75% faster while recovering a single failed node, while the gains are respectively 15% and 60% for double node failures.
[ { "version": "v1", "created": "Thu, 21 Feb 2013 06:14:04 GMT" }, { "version": "v2", "created": "Tue, 18 Jun 2013 13:59:05 GMT" }, { "version": "v3", "created": "Wed, 19 Jun 2013 12:49:47 GMT" }, { "version": "v4", "created": "Wed, 26 Jun 2013 05:32:41 GMT" } ]
2013-06-27T00:00:00
[ [ "Esmaili", "Kyumars Sheykh", "" ], [ "Pamies-Juarez", "Lluis", "" ], [ "Datta", "Anwitaman", "" ] ]
TITLE: The CORE Storage Primitive: Cross-Object Redundancy for Efficient Data Repair & Access in Erasure Coded Storage ABSTRACT: Erasure codes are an integral part of many distributed storage systems aimed at Big Data, since they provide high fault-tolerance for low overheads. However, traditional erasure codes are inefficient on reading stored data in degraded environments (when nodes might be unavailable), and on replenishing lost data (vital for long term resilience). Consequently, novel codes optimized to cope with distributed storage system nuances are vigorously being researched. In this paper, we take an engineering alternative, exploring the use of simple and mature techniques -juxtaposing a standard erasure code with RAID-4 like parity. We carry out an analytical study to determine the efficacy of this approach over traditional as well as some novel codes. We build upon this study to design CORE, a general storage primitive that we integrate into HDFS. We benchmark this implementation in a proprietary cluster and in EC2. Our experiments show that compared to traditional erasure codes, CORE uses 50% less bandwidth and is up to 75% faster while recovering a single failed node, while the gains are respectively 15% and 60% for double node failures.
1306.6058
Reza Farrahi Moghaddam
Reza Farrahi Moghaddam, Shaohua Chen, Rachid Hedjam, Mohamed Cheriet
A maximal-information color to gray conversion method for document images: Toward an optimal grayscale representation for document image binarization
36 page, the uncompressed version is available on Synchromedia website
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A novel method to convert color/multi-spectral images to gray-level images is introduced to increase the performance of document binarization methods. The method uses the distribution of the pixel data of the input document image in a color space to find a transformation, called the dual transform, which balances the amount of information on all color channels. Furthermore, in order to reduce the intensity variations on the gray output, a color reduction preprocessing step is applied. Then, a channel is selected as the gray value representation of the document image based on the homogeneity criterion on the text regions. In this way, the proposed method can provide a luminance-independent contrast enhancement. The performance of the method is evaluated against various images from two databases, the ICDAR'03 Robust Reading, the KAIST and the DIBCO'09 datasets, subjectively and objectively with promising results. The ground truth images for the images from the ICDAR'03 Robust Reading dataset have been created manually by the authors.
[ { "version": "v1", "created": "Tue, 25 Jun 2013 18:41:04 GMT" }, { "version": "v2", "created": "Wed, 26 Jun 2013 12:20:20 GMT" } ]
2013-06-27T00:00:00
[ [ "Moghaddam", "Reza Farrahi", "" ], [ "Chen", "Shaohua", "" ], [ "Hedjam", "Rachid", "" ], [ "Cheriet", "Mohamed", "" ] ]
TITLE: A maximal-information color to gray conversion method for document images: Toward an optimal grayscale representation for document image binarization ABSTRACT: A novel method to convert color/multi-spectral images to gray-level images is introduced to increase the performance of document binarization methods. The method uses the distribution of the pixel data of the input document image in a color space to find a transformation, called the dual transform, which balances the amount of information on all color channels. Furthermore, in order to reduce the intensity variations on the gray output, a color reduction preprocessing step is applied. Then, a channel is selected as the gray value representation of the document image based on the homogeneity criterion on the text regions. In this way, the proposed method can provide a luminance-independent contrast enhancement. The performance of the method is evaluated against various images from two databases, the ICDAR'03 Robust Reading, the KAIST and the DIBCO'09 datasets, subjectively and objectively with promising results. The ground truth images for the images from the ICDAR'03 Robust Reading dataset have been created manually by the authors.
1306.3860
Samuel R\"onnqvist
Peter Sarlin and Samuel R\"onnqvist
Cluster coloring of the Self-Organizing Map: An information visualization perspective
Forthcoming in Proceedings of 17th International Conference Information Visualisation (2013)
null
null
null
cs.LG cs.HC
http://creativecommons.org/licenses/by-nc-sa/3.0/
This paper takes an information visualization perspective to visual representations in the general SOM paradigm. This involves viewing SOM-based visualizations through the eyes of Bertin's and Tufte's theories on data graphics. The regular grid shape of the Self-Organizing Map (SOM), while being a virtue for linking visualizations to it, restricts representation of cluster structures. From the viewpoint of information visualization, this paper provides a general, yet simple, solution to projection-based coloring of the SOM that reveals structures. First, the proposed color space is easy to construct and customize to the purpose of use, while aiming at being perceptually correct and informative through two separable dimensions. Second, the coloring method is not dependent on any specific method of projection, but is rather modular to fit any objective function suitable for the task at hand. The cluster coloring is illustrated on two datasets: the iris data, and welfare and poverty indicators.
[ { "version": "v1", "created": "Mon, 17 Jun 2013 13:57:00 GMT" } ]
2013-06-26T00:00:00
[ [ "Sarlin", "Peter", "" ], [ "Rönnqvist", "Samuel", "" ] ]
TITLE: Cluster coloring of the Self-Organizing Map: An information visualization perspective ABSTRACT: This paper takes an information visualization perspective to visual representations in the general SOM paradigm. This involves viewing SOM-based visualizations through the eyes of Bertin's and Tufte's theories on data graphics. The regular grid shape of the Self-Organizing Map (SOM), while being a virtue for linking visualizations to it, restricts representation of cluster structures. From the viewpoint of information visualization, this paper provides a general, yet simple, solution to projection-based coloring of the SOM that reveals structures. First, the proposed color space is easy to construct and customize to the purpose of use, while aiming at being perceptually correct and informative through two separable dimensions. Second, the coloring method is not dependent on any specific method of projection, but is rather modular to fit any objective function suitable for the task at hand. The cluster coloring is illustrated on two datasets: the iris data, and welfare and poverty indicators.
1306.1840
Paul Mineiro
Paul Mineiro, Nikos Karampatziakis
Loss-Proportional Subsampling for Subsequent ERM
Appears in the proceedings of the 30th International Conference on Machine Learning
null
null
null
cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a sampling scheme suitable for reducing a data set prior to selecting a hypothesis with minimum empirical risk. The sampling only considers a subset of the ultimate (unknown) hypothesis set, but can nonetheless guarantee that the final excess risk will compare favorably with utilizing the entire original data set. We demonstrate the practical benefits of our approach on a large dataset which we subsample and subsequently fit with boosted trees.
[ { "version": "v1", "created": "Fri, 7 Jun 2013 20:12:17 GMT" }, { "version": "v2", "created": "Sun, 23 Jun 2013 05:32:31 GMT" } ]
2013-06-25T00:00:00
[ [ "Mineiro", "Paul", "" ], [ "Karampatziakis", "Nikos", "" ] ]
TITLE: Loss-Proportional Subsampling for Subsequent ERM ABSTRACT: We propose a sampling scheme suitable for reducing a data set prior to selecting a hypothesis with minimum empirical risk. The sampling only considers a subset of the ultimate (unknown) hypothesis set, but can nonetheless guarantee that the final excess risk will compare favorably with utilizing the entire original data set. We demonstrate the practical benefits of our approach on a large dataset which we subsample and subsequently fit with boosted trees.
1306.5305
Gabor Fodor
Gabor Fodor, Marco Belleschi, Demia D. Penda, Aidilla Pradini, Mikael Johansson, Andrea Abrardo
Benchmarking Practical RRM Algorithms for D2D Communications in LTE Advanced
30 pages, submitted for review April-2013. See also: G. Fodor, M. Johansson, D. P. Demia, B. Marco, and A. Abrardo, A joint power control and resource allocation algorithm for D2D communications, KTH, Automatic Control, Tech. Rep., 2012, qC 20120910, http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-102057
null
null
null
cs.IT cs.NI math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Device-to-device (D2D) communication integrated into cellular networks is a means to take advantage of the proximity of devices and allow for reusing cellular resources and thereby to increase the user bitrates and the system capacity. However, when D2D (in the 3rd Generation Partnership Project also called Long Term Evolution (LTE) Direct) communication in cellular spectrum is supported, there is a need to revisit and modify the existing radio resource management (RRM) and power control (PC) techniques to realize the potential of the proximity and reuse gains and to limit the interference at the cellular layer. In this paper, we examine the performance of the flexible LTE PC tool box and benchmark it against a utility optimal iterative scheme. We find that the open loop PC scheme of LTE performs well for cellular users both in terms of the used transmit power levels and the achieved signal-to-interference-and-noise-ratio (SINR) distribution. However, the performance of the D2D users as well as the overall system throughput can be boosted by the utility optimal scheme, because the utility maximizing scheme takes better advantage of both the proximity and the reuse gains. Therefore, in this paper we propose a hybrid PC scheme, in which cellular users employ the open loop path compensation method of LTE, while D2D users use the utility optimizing distributed PC scheme. In order to protect the cellular layer, the hybrid scheme allows for limiting the interference caused by the D2D layer at the cost of having a small impact on the performance of the D2D layer. To ensure feasibility, we limit the number of iterations to a practically feasible level. We make the point that the hybrid scheme is not only near optimal, but it also allows for a distributed implementation for the D2D users, while preserving the LTE PC scheme for the cellular users.
[ { "version": "v1", "created": "Sat, 22 Jun 2013 10:20:45 GMT" } ]
2013-06-25T00:00:00
[ [ "Fodor", "Gabor", "" ], [ "Belleschi", "Marco", "" ], [ "Penda", "Demia D.", "" ], [ "Pradini", "Aidilla", "" ], [ "Johansson", "Mikael", "" ], [ "Abrardo", "Andrea", "" ] ]
TITLE: Benchmarking Practical RRM Algorithms for D2D Communications in LTE Advanced ABSTRACT: Device-to-device (D2D) communication integrated into cellular networks is a means to take advantage of the proximity of devices and allow for reusing cellular resources and thereby to increase the user bitrates and the system capacity. However, when D2D (in the 3rd Generation Partnership Project also called Long Term Evolution (LTE) Direct) communication in cellular spectrum is supported, there is a need to revisit and modify the existing radio resource management (RRM) and power control (PC) techniques to realize the potential of the proximity and reuse gains and to limit the interference at the cellular layer. In this paper, we examine the performance of the flexible LTE PC tool box and benchmark it against a utility optimal iterative scheme. We find that the open loop PC scheme of LTE performs well for cellular users both in terms of the used transmit power levels and the achieved signal-to-interference-and-noise-ratio (SINR) distribution. However, the performance of the D2D users as well as the overall system throughput can be boosted by the utility optimal scheme, because the utility maximizing scheme takes better advantage of both the proximity and the reuse gains. Therefore, in this paper we propose a hybrid PC scheme, in which cellular users employ the open loop path compensation method of LTE, while D2D users use the utility optimizing distributed PC scheme. In order to protect the cellular layer, the hybrid scheme allows for limiting the interference caused by the D2D layer at the cost of having a small impact on the performance of the D2D layer. To ensure feasibility, we limit the number of iterations to a practically feasible level. We make the point that the hybrid scheme is not only near optimal, but it also allows for a distributed implementation for the D2D users, while preserving the LTE PC scheme for the cellular users.
1207.4708
Marc G. Bellemare
Marc G. Bellemare, Yavar Naddaf, Joel Veness, Michael Bowling
The Arcade Learning Environment: An Evaluation Platform for General Agents
null
Journal of Artificial Intelligence Research 47, pages 253-279
10.1613/jair.3912
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this article we introduce the Arcade Learning Environment (ALE): both a challenge problem and a platform and methodology for evaluating the development of general, domain-independent AI technology. ALE provides an interface to hundreds of Atari 2600 game environments, each one different, interesting, and designed to be a challenge for human players. ALE presents significant research challenges for reinforcement learning, model learning, model-based planning, imitation learning, transfer learning, and intrinsic motivation. Most importantly, it provides a rigorous testbed for evaluating and comparing approaches to these problems. We illustrate the promise of ALE by developing and benchmarking domain-independent agents designed using well-established AI techniques for both reinforcement learning and planning. In doing so, we also propose an evaluation methodology made possible by ALE, reporting empirical results on over 55 different games. All of the software, including the benchmark agents, is publicly available.
[ { "version": "v1", "created": "Thu, 19 Jul 2012 15:33:25 GMT" }, { "version": "v2", "created": "Fri, 21 Jun 2013 18:07:06 GMT" } ]
2013-06-24T00:00:00
[ [ "Bellemare", "Marc G.", "" ], [ "Naddaf", "Yavar", "" ], [ "Veness", "Joel", "" ], [ "Bowling", "Michael", "" ] ]
TITLE: The Arcade Learning Environment: An Evaluation Platform for General Agents ABSTRACT: In this article we introduce the Arcade Learning Environment (ALE): both a challenge problem and a platform and methodology for evaluating the development of general, domain-independent AI technology. ALE provides an interface to hundreds of Atari 2600 game environments, each one different, interesting, and designed to be a challenge for human players. ALE presents significant research challenges for reinforcement learning, model learning, model-based planning, imitation learning, transfer learning, and intrinsic motivation. Most importantly, it provides a rigorous testbed for evaluating and comparing approaches to these problems. We illustrate the promise of ALE by developing and benchmarking domain-independent agents designed using well-established AI techniques for both reinforcement learning and planning. In doing so, we also propose an evaluation methodology made possible by ALE, reporting empirical results on over 55 different games. All of the software, including the benchmark agents, is publicly available.
1305.1459
Pier Stanislao Paolucci
Pier Stanislao Paolucci, Iuliana Bacivarov, Gert Goossens, Rainer Leupers, Fr\'ed\'eric Rousseau, Christoph Schumacher, Lothar Thiele, Piero Vicini
EURETILE 2010-2012 summary: first three years of activity of the European Reference Tiled Experiment
56 pages
null
10.12837/2013T01
null
cs.DC cs.AR cs.NE cs.OS cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This is the summary of first three years of activity of the EURETILE FP7 project 247846. EURETILE investigates and implements brain-inspired and fault-tolerant foundational innovations to the system architecture of massively parallel tiled computer architectures and the corresponding programming paradigm. The execution targets are a many-tile HW platform, and a many-tile simulator. A set of SW process - HW tile mapping candidates is generated by the holistic SW tool-chain using a combination of analytic and bio-inspired methods. The Hardware dependent Software is then generated, providing OS services with maximum efficiency/minimal overhead. The many-tile simulator collects profiling data, closing the loop of the SW tool chain. Fine-grain parallelism inside processes is exploited by optimized intra-tile compilation techniques, but the project focus is above the level of the elementary tile. The elementary HW tile is a multi-processor, which includes a fault tolerant Distributed Network Processor (for inter-tile communication) and ASIP accelerators. Furthermore, EURETILE investigates and implements the innovations for equipping the elementary HW tile with high-bandwidth, low-latency brain-like inter-tile communication emulating 3 levels of connection hierarchy, namely neural columns, cortical areas and cortex, and develops a dedicated cortical simulation benchmark: DPSNN-STDP (Distributed Polychronous Spiking Neural Net with synaptic Spiking Time Dependent Plasticity). EURETILE leverages on the multi-tile HW paradigm and SW tool-chain developed by the FET-ACA SHAPES Integrated Project (2006-2009).
[ { "version": "v1", "created": "Tue, 7 May 2013 10:22:31 GMT" } ]
2013-06-24T00:00:00
[ [ "Paolucci", "Pier Stanislao", "" ], [ "Bacivarov", "Iuliana", "" ], [ "Goossens", "Gert", "" ], [ "Leupers", "Rainer", "" ], [ "Rousseau", "Frédéric", "" ], [ "Schumacher", "Christoph", "" ], [ "Thiele", "Lothar", "" ], [ "Vicini", "Piero", "" ] ]
TITLE: EURETILE 2010-2012 summary: first three years of activity of the European Reference Tiled Experiment ABSTRACT: This is the summary of first three years of activity of the EURETILE FP7 project 247846. EURETILE investigates and implements brain-inspired and fault-tolerant foundational innovations to the system architecture of massively parallel tiled computer architectures and the corresponding programming paradigm. The execution targets are a many-tile HW platform, and a many-tile simulator. A set of SW process - HW tile mapping candidates is generated by the holistic SW tool-chain using a combination of analytic and bio-inspired methods. The Hardware dependent Software is then generated, providing OS services with maximum efficiency/minimal overhead. The many-tile simulator collects profiling data, closing the loop of the SW tool chain. Fine-grain parallelism inside processes is exploited by optimized intra-tile compilation techniques, but the project focus is above the level of the elementary tile. The elementary HW tile is a multi-processor, which includes a fault tolerant Distributed Network Processor (for inter-tile communication) and ASIP accelerators. Furthermore, EURETILE investigates and implements the innovations for equipping the elementary HW tile with high-bandwidth, low-latency brain-like inter-tile communication emulating 3 levels of connection hierarchy, namely neural columns, cortical areas and cortex, and develops a dedicated cortical simulation benchmark: DPSNN-STDP (Distributed Polychronous Spiking Neural Net with synaptic Spiking Time Dependent Plasticity). EURETILE leverages on the multi-tile HW paradigm and SW tool-chain developed by the FET-ACA SHAPES Integrated Project (2006-2009).
1306.5070
Mina Farmanbar Ms
Nasser Lotfi, Jamshid Tamouk, Mina Farmanbar
3-SAT Problem A New Memetic-PSO Algorithm
null
null
null
null
cs.AI cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
3-SAT problem is of great importance to many technical and scientific applications. This paper presents a new hybrid evolutionary algorithm for solving this satisfiability problem. 3-SAT problem has the huge search space and hence it is known as a NP-hard problem. So, deterministic approaches are not applicable in this context. Thereof, application of evolutionary processing approaches and especially PSO will be very effective for solving these kinds of problems. In this paper, we introduce a new evolutionary optimization technique based on PSO, Memetic algorithm and local search approaches. When some heuristics are mixed, their advantages are collected as well and we can reach to the better outcomes. Finally, we test our proposed algorithm over some benchmarks used by some another available algorithms. Obtained results show that our new method leads to the suitable results by the appropriate time. Thereby, it achieves a better result in compared with the existent approaches such as pure genetic algorithm and some verified types
[ { "version": "v1", "created": "Fri, 21 Jun 2013 08:10:44 GMT" } ]
2013-06-24T00:00:00
[ [ "Lotfi", "Nasser", "" ], [ "Tamouk", "Jamshid", "" ], [ "Farmanbar", "Mina", "" ] ]
TITLE: 3-SAT Problem A New Memetic-PSO Algorithm ABSTRACT: 3-SAT problem is of great importance to many technical and scientific applications. This paper presents a new hybrid evolutionary algorithm for solving this satisfiability problem. 3-SAT problem has the huge search space and hence it is known as a NP-hard problem. So, deterministic approaches are not applicable in this context. Thereof, application of evolutionary processing approaches and especially PSO will be very effective for solving these kinds of problems. In this paper, we introduce a new evolutionary optimization technique based on PSO, Memetic algorithm and local search approaches. When some heuristics are mixed, their advantages are collected as well and we can reach to the better outcomes. Finally, we test our proposed algorithm over some benchmarks used by some another available algorithms. Obtained results show that our new method leads to the suitable results by the appropriate time. Thereby, it achieves a better result in compared with the existent approaches such as pure genetic algorithm and some verified types
1306.5151
Andrea Vedaldi
Subhransu Maji and Esa Rahtu and Juho Kannala and Matthew Blaschko and Andrea Vedaldi
Fine-Grained Visual Classification of Aircraft
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper introduces FGVC-Aircraft, a new dataset containing 10,000 images of aircraft spanning 100 aircraft models, organised in a three-level hierarchy. At the finer level, differences between models are often subtle but always visually measurable, making visual recognition challenging but possible. A benchmark is obtained by defining corresponding classification tasks and evaluation protocols, and baseline results are presented. The construction of this dataset was made possible by the work of aircraft enthusiasts, a strategy that can extend to the study of number of other object classes. Compared to the domains usually considered in fine-grained visual classification (FGVC), for example animals, aircraft are rigid and hence less deformable. They, however, present other interesting modes of variation, including purpose, size, designation, structure, historical style, and branding.
[ { "version": "v1", "created": "Fri, 21 Jun 2013 14:31:57 GMT" } ]
2013-06-24T00:00:00
[ [ "Maji", "Subhransu", "" ], [ "Rahtu", "Esa", "" ], [ "Kannala", "Juho", "" ], [ "Blaschko", "Matthew", "" ], [ "Vedaldi", "Andrea", "" ] ]
TITLE: Fine-Grained Visual Classification of Aircraft ABSTRACT: This paper introduces FGVC-Aircraft, a new dataset containing 10,000 images of aircraft spanning 100 aircraft models, organised in a three-level hierarchy. At the finer level, differences between models are often subtle but always visually measurable, making visual recognition challenging but possible. A benchmark is obtained by defining corresponding classification tasks and evaluation protocols, and baseline results are presented. The construction of this dataset was made possible by the work of aircraft enthusiasts, a strategy that can extend to the study of number of other object classes. Compared to the domains usually considered in fine-grained visual classification (FGVC), for example animals, aircraft are rigid and hence less deformable. They, however, present other interesting modes of variation, including purpose, size, designation, structure, historical style, and branding.
1306.5204
Fred Morstatter
Fred Morstatter and J\"urgen Pfeffer and Huan Liu and Kathleen M. Carley
Is the Sample Good Enough? Comparing Data from Twitter's Streaming API with Twitter's Firehose
Published in ICWSM 2013
null
null
null
cs.SI physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Twitter is a social media giant famous for the exchange of short, 140-character messages called "tweets". In the scientific community, the microblogging site is known for openness in sharing its data. It provides a glance into its millions of users and billions of tweets through a "Streaming API" which provides a sample of all tweets matching some parameters preset by the API user. The API service has been used by many researchers, companies, and governmental institutions that want to extract knowledge in accordance with a diverse array of questions pertaining to social media. The essential drawback of the Twitter API is the lack of documentation concerning what and how much data users get. This leads researchers to question whether the sampled data is a valid representation of the overall activity on Twitter. In this work we embark on answering this question by comparing data collected using Twitter's sampled API service with data collected using the full, albeit costly, Firehose stream that includes every single published tweet. We compare both datasets using common statistical metrics as well as metrics that allow us to compare topics, networks, and locations of tweets. The results of our work will help researchers and practitioners understand the implications of using the Streaming API.
[ { "version": "v1", "created": "Fri, 21 Jun 2013 18:08:42 GMT" } ]
2013-06-24T00:00:00
[ [ "Morstatter", "Fred", "" ], [ "Pfeffer", "Jürgen", "" ], [ "Liu", "Huan", "" ], [ "Carley", "Kathleen M.", "" ] ]
TITLE: Is the Sample Good Enough? Comparing Data from Twitter's Streaming API with Twitter's Firehose ABSTRACT: Twitter is a social media giant famous for the exchange of short, 140-character messages called "tweets". In the scientific community, the microblogging site is known for openness in sharing its data. It provides a glance into its millions of users and billions of tweets through a "Streaming API" which provides a sample of all tweets matching some parameters preset by the API user. The API service has been used by many researchers, companies, and governmental institutions that want to extract knowledge in accordance with a diverse array of questions pertaining to social media. The essential drawback of the Twitter API is the lack of documentation concerning what and how much data users get. This leads researchers to question whether the sampled data is a valid representation of the overall activity on Twitter. In this work we embark on answering this question by comparing data collected using Twitter's sampled API service with data collected using the full, albeit costly, Firehose stream that includes every single published tweet. We compare both datasets using common statistical metrics as well as metrics that allow us to compare topics, networks, and locations of tweets. The results of our work will help researchers and practitioners understand the implications of using the Streaming API.
1301.5650
Marius Pachitariu
Marius Pachitariu and Maneesh Sahani
Regularization and nonlinearities for neural language models: when are they needed?
Added new experiments on large datasets and on the Microsoft Research Sentence Completion Challenge
null
null
null
stat.ML cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Neural language models (LMs) based on recurrent neural networks (RNN) are some of the most successful word and character-level LMs. Why do they work so well, in particular better than linear neural LMs? Possible explanations are that RNNs have an implicitly better regularization or that RNNs have a higher capacity for storing patterns due to their nonlinearities or both. Here we argue for the first explanation in the limit of little training data and the second explanation for large amounts of text data. We show state-of-the-art performance on the popular and small Penn dataset when RNN LMs are regularized with random dropout. Nonetheless, we show even better performance from a simplified, much less expressive linear RNN model without off-diagonal entries in the recurrent matrix. We call this model an impulse-response LM (IRLM). Using random dropout, column normalization and annealed learning rates, IRLMs develop neurons that keep a memory of up to 50 words in the past and achieve a perplexity of 102.5 on the Penn dataset. On two large datasets however, the same regularization methods are unsuccessful for both models and the RNN's expressivity allows it to overtake the IRLM by 10 and 20 percent perplexity, respectively. Despite the perplexity gap, IRLMs still outperform RNNs on the Microsoft Research Sentence Completion (MRSC) task. We develop a slightly modified IRLM that separates long-context units (LCUs) from short-context units and show that the LCUs alone achieve a state-of-the-art performance on the MRSC task of 60.8%. Our analysis indicates that a fruitful direction of research for neural LMs lies in developing more accessible internal representations, and suggests an optimization regime of very high momentum terms for effectively training such models.
[ { "version": "v1", "created": "Wed, 23 Jan 2013 21:18:07 GMT" }, { "version": "v2", "created": "Thu, 20 Jun 2013 14:30:04 GMT" } ]
2013-06-21T00:00:00
[ [ "Pachitariu", "Marius", "" ], [ "Sahani", "Maneesh", "" ] ]
TITLE: Regularization and nonlinearities for neural language models: when are they needed? ABSTRACT: Neural language models (LMs) based on recurrent neural networks (RNN) are some of the most successful word and character-level LMs. Why do they work so well, in particular better than linear neural LMs? Possible explanations are that RNNs have an implicitly better regularization or that RNNs have a higher capacity for storing patterns due to their nonlinearities or both. Here we argue for the first explanation in the limit of little training data and the second explanation for large amounts of text data. We show state-of-the-art performance on the popular and small Penn dataset when RNN LMs are regularized with random dropout. Nonetheless, we show even better performance from a simplified, much less expressive linear RNN model without off-diagonal entries in the recurrent matrix. We call this model an impulse-response LM (IRLM). Using random dropout, column normalization and annealed learning rates, IRLMs develop neurons that keep a memory of up to 50 words in the past and achieve a perplexity of 102.5 on the Penn dataset. On two large datasets however, the same regularization methods are unsuccessful for both models and the RNN's expressivity allows it to overtake the IRLM by 10 and 20 percent perplexity, respectively. Despite the perplexity gap, IRLMs still outperform RNNs on the Microsoft Research Sentence Completion (MRSC) task. We develop a slightly modified IRLM that separates long-context units (LCUs) from short-context units and show that the LCUs alone achieve a state-of-the-art performance on the MRSC task of 60.8%. Our analysis indicates that a fruitful direction of research for neural LMs lies in developing more accessible internal representations, and suggests an optimization regime of very high momentum terms for effectively training such models.
1306.4746
Daniel Barrett
Daniel Paul Barrett and Jeffrey Mark Siskind
Felzenszwalb-Baum-Welch: Event Detection by Changing Appearance
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a method which can detect events in videos by modeling the change in appearance of the event participants over time. This method makes it possible to detect events which are characterized not by motion, but by the changing state of the people or objects involved. This is accomplished by using object detectors as output models for the states of a hidden Markov model (HMM). The method allows an HMM to model the sequence of poses of the event participants over time, and is effective for poses of humans and inanimate objects. The ability to use existing object-detection methods as part of an event model makes it possible to leverage ongoing work in the object-detection community. A novel training method uses an EM loop to simultaneously learn the temporal structure and object models automatically, without the need to specify either the individual poses to be modeled or the frames in which they occur. The E-step estimates the latent assignment of video frames to HMM states, while the M-step estimates both the HMM transition probabilities and state output models, including the object detectors, which are trained on the weighted subset of frames assigned to their state. A new dataset was gathered because little work has been done on events characterized by changing object pose, and suitable datasets are not available. Our method produced results superior to that of comparison systems on this dataset.
[ { "version": "v1", "created": "Thu, 20 Jun 2013 03:22:19 GMT" } ]
2013-06-21T00:00:00
[ [ "Barrett", "Daniel Paul", "" ], [ "Siskind", "Jeffrey Mark", "" ] ]
TITLE: Felzenszwalb-Baum-Welch: Event Detection by Changing Appearance ABSTRACT: We propose a method which can detect events in videos by modeling the change in appearance of the event participants over time. This method makes it possible to detect events which are characterized not by motion, but by the changing state of the people or objects involved. This is accomplished by using object detectors as output models for the states of a hidden Markov model (HMM). The method allows an HMM to model the sequence of poses of the event participants over time, and is effective for poses of humans and inanimate objects. The ability to use existing object-detection methods as part of an event model makes it possible to leverage ongoing work in the object-detection community. A novel training method uses an EM loop to simultaneously learn the temporal structure and object models automatically, without the need to specify either the individual poses to be modeled or the frames in which they occur. The E-step estimates the latent assignment of video frames to HMM states, while the M-step estimates both the HMM transition probabilities and state output models, including the object detectors, which are trained on the weighted subset of frames assigned to their state. A new dataset was gathered because little work has been done on events characterized by changing object pose, and suitable datasets are not available. Our method produced results superior to that of comparison systems on this dataset.
1306.4534
Antonio Lima
Antonio Lima, Manlio De Domenico, Veljko Pejovic, Mirco Musolesi
Exploiting Cellular Data for Disease Containment and Information Campaigns Strategies in Country-Wide Epidemics
9 pages, 9 figures. Appeared in Proceedings of NetMob 2013. Boston, MA, USA. May 2013
null
null
School of Computer Science University of Birmingham Technical Report CSR-13-01
cs.SI physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Human mobility is one of the key factors at the basis of the spreading of diseases in a population. Containment strategies are usually devised on movement scenarios based on coarse-grained assumptions. Mobility phone data provide a unique opportunity for building models and defining strategies based on very precise information about the movement of people in a region or in a country. Another very important aspect is the underlying social structure of a population, which might play a fundamental role in devising information campaigns to promote vaccination and preventive measures, especially in countries with a strong family (or tribal) structure. In this paper we analyze a large-scale dataset describing the mobility and the call patterns of a large number of individuals in Ivory Coast. We present a model that describes how diseases spread across the country by exploiting mobility patterns of people extracted from the available data. Then, we simulate several epidemics scenarios and we evaluate mechanisms to contain the epidemic spreading of diseases, based on the information about people mobility and social ties, also gathered from the phone call data. More specifically, we find that restricting mobility does not delay the occurrence of an endemic state and that an information campaign based on one-to-one phone conversations among members of social groups might be an effective countermeasure.
[ { "version": "v1", "created": "Wed, 19 Jun 2013 13:22:11 GMT" } ]
2013-06-20T00:00:00
[ [ "Lima", "Antonio", "" ], [ "De Domenico", "Manlio", "" ], [ "Pejovic", "Veljko", "" ], [ "Musolesi", "Mirco", "" ] ]
TITLE: Exploiting Cellular Data for Disease Containment and Information Campaigns Strategies in Country-Wide Epidemics ABSTRACT: Human mobility is one of the key factors at the basis of the spreading of diseases in a population. Containment strategies are usually devised on movement scenarios based on coarse-grained assumptions. Mobility phone data provide a unique opportunity for building models and defining strategies based on very precise information about the movement of people in a region or in a country. Another very important aspect is the underlying social structure of a population, which might play a fundamental role in devising information campaigns to promote vaccination and preventive measures, especially in countries with a strong family (or tribal) structure. In this paper we analyze a large-scale dataset describing the mobility and the call patterns of a large number of individuals in Ivory Coast. We present a model that describes how diseases spread across the country by exploiting mobility patterns of people extracted from the available data. Then, we simulate several epidemics scenarios and we evaluate mechanisms to contain the epidemic spreading of diseases, based on the information about people mobility and social ties, also gathered from the phone call data. More specifically, we find that restricting mobility does not delay the occurrence of an endemic state and that an information campaign based on one-to-one phone conversations among members of social groups might be an effective countermeasure.
1305.3633
Mohammad Pourhomayoun
Mohammad Pourhomayoun, Peter Dugan, Marian Popescu, Denise Risch, Hal Lewis, Christopher Clark
Classification for Big Dataset of Bioacoustic Signals Based on Human Scoring System and Artificial Neural Network
To be Submitted to "ICML 2013 Workshop on Machine Learning for Bioacoustics", 6 pages, 4 figures
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we propose a method to improve sound classification performance by combining signal features, derived from the time-frequency spectrogram, with human perception. The method presented herein exploits an artificial neural network (ANN) and learns the signal features based on the human perception knowledge. The proposed method is applied to a large acoustic dataset containing 24 months of nearly continuous recordings. The results show a significant improvement in performance of the detection-classification system; yielding as much as 20% improvement in true positive rate for a given false positive rate.
[ { "version": "v1", "created": "Wed, 15 May 2013 20:53:39 GMT" }, { "version": "v2", "created": "Mon, 17 Jun 2013 20:29:14 GMT" } ]
2013-06-19T00:00:00
[ [ "Pourhomayoun", "Mohammad", "" ], [ "Dugan", "Peter", "" ], [ "Popescu", "Marian", "" ], [ "Risch", "Denise", "" ], [ "Lewis", "Hal", "" ], [ "Clark", "Christopher", "" ] ]
TITLE: Classification for Big Dataset of Bioacoustic Signals Based on Human Scoring System and Artificial Neural Network ABSTRACT: In this paper, we propose a method to improve sound classification performance by combining signal features, derived from the time-frequency spectrogram, with human perception. The method presented herein exploits an artificial neural network (ANN) and learns the signal features based on the human perception knowledge. The proposed method is applied to a large acoustic dataset containing 24 months of nearly continuous recordings. The results show a significant improvement in performance of the detection-classification system; yielding as much as 20% improvement in true positive rate for a given false positive rate.
1305.3635
Mohammad Pourhomayoun
Mohammad Pourhomayoun, Peter Dugan, Marian Popescu, Christopher Clark
Bioacoustic Signal Classification Based on Continuous Region Processing, Grid Masking and Artificial Neural Network
To be Submitted to "ICML 2013 Workshop on Machine Learning for Bioacoustics", 6 pages, 8 figures
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we develop a novel method based on machine-learning and image processing to identify North Atlantic right whale (NARW) up-calls in the presence of high levels of ambient and interfering noise. We apply a continuous region algorithm on the spectrogram to extract the regions of interest, and then use grid masking techniques to generate a small feature set that is then used in an artificial neural network classifier to identify the NARW up-calls. It is shown that the proposed technique is effective in detecting and capturing even very faint up-calls, in the presence of ambient and interfering noises. The method is evaluated on a dataset recorded in Massachusetts Bay, United States. The dataset includes 20000 sound clips for training, and 10000 sound clips for testing. The results show that the proposed technique can achieve an error rate of less than FPR = 4.5% for a 90% true positive rate.
[ { "version": "v1", "created": "Wed, 15 May 2013 20:59:03 GMT" }, { "version": "v2", "created": "Mon, 17 Jun 2013 20:28:33 GMT" } ]
2013-06-19T00:00:00
[ [ "Pourhomayoun", "Mohammad", "" ], [ "Dugan", "Peter", "" ], [ "Popescu", "Marian", "" ], [ "Clark", "Christopher", "" ] ]
TITLE: Bioacoustic Signal Classification Based on Continuous Region Processing, Grid Masking and Artificial Neural Network ABSTRACT: In this paper, we develop a novel method based on machine-learning and image processing to identify North Atlantic right whale (NARW) up-calls in the presence of high levels of ambient and interfering noise. We apply a continuous region algorithm on the spectrogram to extract the regions of interest, and then use grid masking techniques to generate a small feature set that is then used in an artificial neural network classifier to identify the NARW up-calls. It is shown that the proposed technique is effective in detecting and capturing even very faint up-calls, in the presence of ambient and interfering noises. The method is evaluated on a dataset recorded in Massachusetts Bay, United States. The dataset includes 20000 sound clips for training, and 10000 sound clips for testing. The results show that the proposed technique can achieve an error rate of less than FPR = 4.5% for a 90% true positive rate.
1306.4207
Ragesh Jaiswal
Ragesh Jaiswal and Prachi Jain and Saumya Yadav
A bad 2-dimensional instance for k-means++
null
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The k-means++ seeding algorithm is one of the most popular algorithms that is used for finding the initial $k$ centers when using the k-means heuristic. The algorithm is a simple sampling procedure and can be described as follows: {quote} Pick the first center randomly from among the given points. For $i > 1$, pick a point to be the $i^{th}$ center with probability proportional to the square of the Euclidean distance of this point to the previously $(i-1)$ chosen centers. {quote} The k-means++ seeding algorithm is not only simple and fast but gives an $O(\log{k})$ approximation in expectation as shown by Arthur and Vassilvitskii \cite{av07}. There are datasets \cite{av07,adk09} on which this seeding algorithm gives an approximation factor $\Omega(\log{k})$ in expectation. However, it is not clear from these results if the algorithm achieves good approximation factor with reasonably large probability (say $1/poly(k)$). Brunsch and R\"{o}glin \cite{br11} gave a dataset where the k-means++ seeding algorithm achieves an approximation ratio of $(2/3 - \epsilon)\cdot \log{k}$ only with probability that is exponentially small in $k$. However, this and all other known {\em lower-bound examples} \cite{av07,adk09} are high dimensional. So, an open problem is to understand the behavior of the algorithm on low dimensional datasets. In this work, we give a simple two dimensional dataset on which the seeding algorithm achieves an approximation ratio $c$ (for some universal constant $c$) only with probability exponentially small in $k$. This is the first step towards solving open problems posed by Mahajan et al \cite{mnv12} and by Brunsch and R\"{o}glin \cite{br11}.
[ { "version": "v1", "created": "Tue, 18 Jun 2013 14:22:12 GMT" } ]
2013-06-19T00:00:00
[ [ "Jaiswal", "Ragesh", "" ], [ "Jain", "Prachi", "" ], [ "Yadav", "Saumya", "" ] ]
TITLE: A bad 2-dimensional instance for k-means++ ABSTRACT: The k-means++ seeding algorithm is one of the most popular algorithms that is used for finding the initial $k$ centers when using the k-means heuristic. The algorithm is a simple sampling procedure and can be described as follows: {quote} Pick the first center randomly from among the given points. For $i > 1$, pick a point to be the $i^{th}$ center with probability proportional to the square of the Euclidean distance of this point to the previously $(i-1)$ chosen centers. {quote} The k-means++ seeding algorithm is not only simple and fast but gives an $O(\log{k})$ approximation in expectation as shown by Arthur and Vassilvitskii \cite{av07}. There are datasets \cite{av07,adk09} on which this seeding algorithm gives an approximation factor $\Omega(\log{k})$ in expectation. However, it is not clear from these results if the algorithm achieves good approximation factor with reasonably large probability (say $1/poly(k)$). Brunsch and R\"{o}glin \cite{br11} gave a dataset where the k-means++ seeding algorithm achieves an approximation ratio of $(2/3 - \epsilon)\cdot \log{k}$ only with probability that is exponentially small in $k$. However, this and all other known {\em lower-bound examples} \cite{av07,adk09} are high dimensional. So, an open problem is to understand the behavior of the algorithm on low dimensional datasets. In this work, we give a simple two dimensional dataset on which the seeding algorithm achieves an approximation ratio $c$ (for some universal constant $c$) only with probability exponentially small in $k$. This is the first step towards solving open problems posed by Mahajan et al \cite{mnv12} and by Brunsch and R\"{o}glin \cite{br11}.
1211.6014
Vincent A Traag
Bal\'azs Cs. Cs\'aji, Arnaud Browet, V.A. Traag, Jean-Charles Delvenne, Etienne Huens, Paul Van Dooren, Zbigniew Smoreda and Vincent D. Blondel
Exploring the Mobility of Mobile Phone Users
16 pages, 12 figures
Physica A 392(6), pp. 1459-1473 (2013)
10.1016/j.physa.2012.11.040
null
physics.soc-ph cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Mobile phone datasets allow for the analysis of human behavior on an unprecedented scale. The social network, temporal dynamics and mobile behavior of mobile phone users have often been analyzed independently from each other using mobile phone datasets. In this article, we explore the connections between various features of human behavior extracted from a large mobile phone dataset. Our observations are based on the analysis of communication data of 100000 anonymized and randomly chosen individuals in a dataset of communications in Portugal. We show that clustering and principal component analysis allow for a significant dimension reduction with limited loss of information. The most important features are related to geographical location. In particular, we observe that most people spend most of their time at only a few locations. With the help of clustering methods, we then robustly identify home and office locations and compare the results with official census data. Finally, we analyze the geographic spread of users' frequent locations and show that commuting distances can be reasonably well explained by a gravity model.
[ { "version": "v1", "created": "Mon, 26 Nov 2012 16:30:59 GMT" } ]
2013-06-17T00:00:00
[ [ "Csáji", "Balázs Cs.", "" ], [ "Browet", "Arnaud", "" ], [ "Traag", "V. A.", "" ], [ "Delvenne", "Jean-Charles", "" ], [ "Huens", "Etienne", "" ], [ "Van Dooren", "Paul", "" ], [ "Smoreda", "Zbigniew", "" ], [ "Blondel", "Vincent D.", "" ] ]
TITLE: Exploring the Mobility of Mobile Phone Users ABSTRACT: Mobile phone datasets allow for the analysis of human behavior on an unprecedented scale. The social network, temporal dynamics and mobile behavior of mobile phone users have often been analyzed independently from each other using mobile phone datasets. In this article, we explore the connections between various features of human behavior extracted from a large mobile phone dataset. Our observations are based on the analysis of communication data of 100000 anonymized and randomly chosen individuals in a dataset of communications in Portugal. We show that clustering and principal component analysis allow for a significant dimension reduction with limited loss of information. The most important features are related to geographical location. In particular, we observe that most people spend most of their time at only a few locations. With the help of clustering methods, we then robustly identify home and office locations and compare the results with official census data. Finally, we analyze the geographic spread of users' frequent locations and show that commuting distances can be reasonably well explained by a gravity model.
1306.3294
Quan Wang
Quan Wang, Kim L. Boyer
Feature Learning by Multidimensional Scaling and its Applications in Object Recognition
To appear in SIBGRAPI 2013
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present the MDS feature learning framework, in which multidimensional scaling (MDS) is applied on high-level pairwise image distances to learn fixed-length vector representations of images. The aspects of the images that are captured by the learned features, which we call MDS features, completely depend on what kind of image distance measurement is employed. With properly selected semantics-sensitive image distances, the MDS features provide rich semantic information about the images that is not captured by other feature extraction techniques. In our work, we introduce the iterated Levenberg-Marquardt algorithm for solving MDS, and study the MDS feature learning with IMage Euclidean Distance (IMED) and Spatial Pyramid Matching (SPM) distance. We present experiments on both synthetic data and real images --- the publicly accessible UIUC car image dataset. The MDS features based on SPM distance achieve exceptional performance for the car recognition task.
[ { "version": "v1", "created": "Fri, 14 Jun 2013 04:43:40 GMT" } ]
2013-06-17T00:00:00
[ [ "Wang", "Quan", "" ], [ "Boyer", "Kim L.", "" ] ]
TITLE: Feature Learning by Multidimensional Scaling and its Applications in Object Recognition ABSTRACT: We present the MDS feature learning framework, in which multidimensional scaling (MDS) is applied on high-level pairwise image distances to learn fixed-length vector representations of images. The aspects of the images that are captured by the learned features, which we call MDS features, completely depend on what kind of image distance measurement is employed. With properly selected semantics-sensitive image distances, the MDS features provide rich semantic information about the images that is not captured by other feature extraction techniques. In our work, we introduce the iterated Levenberg-Marquardt algorithm for solving MDS, and study the MDS feature learning with IMage Euclidean Distance (IMED) and Spatial Pyramid Matching (SPM) distance. We present experiments on both synthetic data and real images --- the publicly accessible UIUC car image dataset. The MDS features based on SPM distance achieve exceptional performance for the car recognition task.
1306.3474
Yijun Wang
Yijun Wang
Classifying Single-Trial EEG during Motor Imagery with a Small Training Set
13 pages, 3 figures
null
null
null
cs.LG cs.HC stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Before the operation of a motor imagery based brain-computer interface (BCI) adopting machine learning techniques, a cumbersome training procedure is unavoidable. The development of a practical BCI posed the challenge of classifying single-trial EEG with a small training set. In this letter, we addressed this problem by employing a series of signal processing and machine learning approaches to alleviate overfitting and obtained test accuracy similar to training accuracy on the datasets from BCI Competition III and our own experiments.
[ { "version": "v1", "created": "Fri, 14 Jun 2013 18:24:19 GMT" } ]
2013-06-17T00:00:00
[ [ "Wang", "Yijun", "" ] ]
TITLE: Classifying Single-Trial EEG during Motor Imagery with a Small Training Set ABSTRACT: Before the operation of a motor imagery based brain-computer interface (BCI) adopting machine learning techniques, a cumbersome training procedure is unavoidable. The development of a practical BCI posed the challenge of classifying single-trial EEG with a small training set. In this letter, we addressed this problem by employing a series of signal processing and machine learning approaches to alleviate overfitting and obtained test accuracy similar to training accuracy on the datasets from BCI Competition III and our own experiments.
1306.3476
James Bergstra
James Bergstra and David D. Cox
Hyperparameter Optimization and Boosting for Classifying Facial Expressions: How good can a "Null" Model be?
Presented at the Workshop on Representation and Learning, ICML 2013
null
null
null
cs.CV cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
One of the goals of the ICML workshop on representation and learning is to establish benchmark scores for a new data set of labeled facial expressions. This paper presents the performance of a "Null" model consisting of convolutions with random weights, PCA, pooling, normalization, and a linear readout. Our approach focused on hyperparameter optimization rather than novel model components. On the Facial Expression Recognition Challenge held by the Kaggle website, our hyperparameter optimization approach achieved a score of 60% accuracy on the test data. This paper also introduces a new ensemble construction variant that combines hyperparameter optimization with the construction of ensembles. This algorithm constructed an ensemble of four models that scored 65.5% accuracy. These scores rank 12th and 5th respectively among the 56 challenge participants. It is worth noting that our approach was developed prior to the release of the data set, and applied without modification; our strong competition performance suggests that the TPE hyperparameter optimization algorithm and domain expertise encoded in our Null model can generalize to new image classification data sets.
[ { "version": "v1", "created": "Fri, 14 Jun 2013 18:28:52 GMT" } ]
2013-06-17T00:00:00
[ [ "Bergstra", "James", "" ], [ "Cox", "David D.", "" ] ]
TITLE: Hyperparameter Optimization and Boosting for Classifying Facial Expressions: How good can a "Null" Model be? ABSTRACT: One of the goals of the ICML workshop on representation and learning is to establish benchmark scores for a new data set of labeled facial expressions. This paper presents the performance of a "Null" model consisting of convolutions with random weights, PCA, pooling, normalization, and a linear readout. Our approach focused on hyperparameter optimization rather than novel model components. On the Facial Expression Recognition Challenge held by the Kaggle website, our hyperparameter optimization approach achieved a score of 60% accuracy on the test data. This paper also introduces a new ensemble construction variant that combines hyperparameter optimization with the construction of ensembles. This algorithm constructed an ensemble of four models that scored 65.5% accuracy. These scores rank 12th and 5th respectively among the 56 challenge participants. It is worth noting that our approach was developed prior to the release of the data set, and applied without modification; our strong competition performance suggests that the TPE hyperparameter optimization algorithm and domain expertise encoded in our Null model can generalize to new image classification data sets.
1306.3003
Xuhui Fan
Xuhui Fan, Yiling Zeng, Longbing Cao
Non-parametric Power-law Data Clustering
null
null
null
null
cs.LG cs.CV stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
It has always been a great challenge for clustering algorithms to automatically determine the cluster numbers according to the distribution of datasets. Several approaches have been proposed to address this issue, including the recent promising work which incorporate Bayesian Nonparametrics into the $k$-means clustering procedure. This approach shows simplicity in implementation and solidity in theory, while it also provides a feasible way to inference in large scale datasets. However, several problems remains unsolved in this pioneering work, including the power-law data applicability, mechanism to merge centers to avoid the over-fitting problem, clustering order problem, e.t.c.. To address these issues, the Pitman-Yor Process based k-means (namely \emph{pyp-means}) is proposed in this paper. Taking advantage of the Pitman-Yor Process, \emph{pyp-means} treats clusters differently by dynamically and adaptively changing the threshold to guarantee the generation of power-law clustering results. Also, one center agglomeration procedure is integrated into the implementation to be able to merge small but close clusters and then adaptively determine the cluster number. With more discussion on the clustering order, the convergence proof, complexity analysis and extension to spectral clustering, our approach is compared with traditional clustering algorithm and variational inference methods. The advantages and properties of pyp-means are validated by experiments on both synthetic datasets and real world datasets.
[ { "version": "v1", "created": "Thu, 13 Jun 2013 01:20:50 GMT" } ]
2013-06-14T00:00:00
[ [ "Fan", "Xuhui", "" ], [ "Zeng", "Yiling", "" ], [ "Cao", "Longbing", "" ] ]
TITLE: Non-parametric Power-law Data Clustering ABSTRACT: It has always been a great challenge for clustering algorithms to automatically determine the cluster numbers according to the distribution of datasets. Several approaches have been proposed to address this issue, including the recent promising work which incorporate Bayesian Nonparametrics into the $k$-means clustering procedure. This approach shows simplicity in implementation and solidity in theory, while it also provides a feasible way to inference in large scale datasets. However, several problems remains unsolved in this pioneering work, including the power-law data applicability, mechanism to merge centers to avoid the over-fitting problem, clustering order problem, e.t.c.. To address these issues, the Pitman-Yor Process based k-means (namely \emph{pyp-means}) is proposed in this paper. Taking advantage of the Pitman-Yor Process, \emph{pyp-means} treats clusters differently by dynamically and adaptively changing the threshold to guarantee the generation of power-law clustering results. Also, one center agglomeration procedure is integrated into the implementation to be able to merge small but close clusters and then adaptively determine the cluster number. With more discussion on the clustering order, the convergence proof, complexity analysis and extension to spectral clustering, our approach is compared with traditional clustering algorithm and variational inference methods. The advantages and properties of pyp-means are validated by experiments on both synthetic datasets and real world datasets.
1306.3018
Vitorino Ramos Dr.
Vitorino Ramos, David M.S. Rodrigues, Jorge Lou\c{c}\~a
Second Order Swarm Intelligence
10 pages, 5 figures, accepted to International Conference on Hybrid Artificial Intelligence Systems (HAIS 2013), Lecture Notes in Artificial Intelligence, LNAI Springer Series
null
null
null
cs.NE
http://creativecommons.org/licenses/by-nc-sa/3.0/
An artificial Ant Colony System (ACS) algorithm to solve general-purpose combinatorial Optimization Problems (COP) that extends previous AC models [21] by the inclusion of a negative pheromone, is here described. Several Travelling Salesman Problem (TSP) were used as benchmark. We show that by using two different sets of pheromones, a second-order co-evolved compromise between positive and negative feedbacks achieves better results than single positive feedback systems. The algorithm was tested against known NP-complete combinatorial Optimization Problems, running on symmetrical TSP's. We show that the new algorithm compares favourably against these benchmarks, accordingly to recent biological findings by Robinson [26,27], and Gruter [28] where "No entry" signals and negative feedback allows a colony to quickly reallocate the majority of its foragers to superior food patches. This is the first time an extended ACS algorithm is implemented with these successful characteristics.
[ { "version": "v1", "created": "Thu, 13 Jun 2013 04:07:52 GMT" } ]
2013-06-14T00:00:00
[ [ "Ramos", "Vitorino", "" ], [ "Rodrigues", "David M. S.", "" ], [ "Louçã", "Jorge", "" ] ]
TITLE: Second Order Swarm Intelligence ABSTRACT: An artificial Ant Colony System (ACS) algorithm to solve general-purpose combinatorial Optimization Problems (COP) that extends previous AC models [21] by the inclusion of a negative pheromone, is here described. Several Travelling Salesman Problem (TSP) were used as benchmark. We show that by using two different sets of pheromones, a second-order co-evolved compromise between positive and negative feedbacks achieves better results than single positive feedback systems. The algorithm was tested against known NP-complete combinatorial Optimization Problems, running on symmetrical TSP's. We show that the new algorithm compares favourably against these benchmarks, accordingly to recent biological findings by Robinson [26,27], and Gruter [28] where "No entry" signals and negative feedback allows a colony to quickly reallocate the majority of its foragers to superior food patches. This is the first time an extended ACS algorithm is implemented with these successful characteristics.
1306.3058
Sebastien Paris
S\'ebastien Paris and Yann Doh and Herv\'e Glotin and Xanadu Halkias and Joseph Razik
Physeter catodon localization by sparse coding
6 pages, 6 figures, workshop ICML4B in ICML 2013 conference
null
null
null
cs.LG cs.CE stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents a spermwhale' localization architecture using jointly a bag-of-features (BoF) approach and machine learning framework. BoF methods are known, especially in computer vision, to produce from a collection of local features a global representation invariant to principal signal transformations. Our idea is to regress supervisely from these local features two rough estimates of the distance and azimuth thanks to some datasets where both acoustic events and ground-truth position are now available. Furthermore, these estimates can feed a particle filter system in order to obtain a precise spermwhale' position even in mono-hydrophone configuration. Anti-collision system and whale watching are considered applications of this work.
[ { "version": "v1", "created": "Thu, 13 Jun 2013 09:05:08 GMT" } ]
2013-06-14T00:00:00
[ [ "Paris", "Sébastien", "" ], [ "Doh", "Yann", "" ], [ "Glotin", "Hervé", "" ], [ "Halkias", "Xanadu", "" ], [ "Razik", "Joseph", "" ] ]
TITLE: Physeter catodon localization by sparse coding ABSTRACT: This paper presents a spermwhale' localization architecture using jointly a bag-of-features (BoF) approach and machine learning framework. BoF methods are known, especially in computer vision, to produce from a collection of local features a global representation invariant to principal signal transformations. Our idea is to regress supervisely from these local features two rough estimates of the distance and azimuth thanks to some datasets where both acoustic events and ground-truth position are now available. Furthermore, these estimates can feed a particle filter system in order to obtain a precise spermwhale' position even in mono-hydrophone configuration. Anti-collision system and whale watching are considered applications of this work.
1306.3084
Doriane Ibarra
Jorge Hernandez (CMM), Beatriz Marcotegui (CMM)
Segmentation et Interpr\'etation de Nuages de Points pour la Mod\'elisation d'Environnements Urbains
null
Revue fran\c{c}aise de photogrammetrie et de t\'el\'edection 191 (2008) 28-35
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Dans cet article, nous pr\'esentons une m\'ethode pour la d\'etection et la classification d'artefacts au niveau du sol, comme phase de filtrage pr\'ealable \`a la mod\'elisation d'environnements urbains. La m\'ethode de d\'etection est r\'ealis\'ee sur l'image profondeur, une projection de nuage de points sur un plan image o\`u la valeur du pixel correspond \`a la distance du point au plan. En faisant l'hypoth\`ese que les artefacts sont situ\'es au sol, ils sont d\'etect\'es par une transformation de chapeau haut de forme par remplissage de trous sur l'image de profondeur. Les composantes connexes ainsi obtenues, sont ensuite caract\'eris\'ees et une analyse des variables est utilis\'ee pour la s\'election des caract\'eristiques les plus discriminantes. Les composantes connexes sont donc classifi\'ees en quatre cat\'egories (lampadaires, pi\'etons, voitures et "Reste") \`a l'aide d'un algorithme d'apprentissage supervis\'e. La m\'ethode a \'et\'e test\'ee sur des nuages de points de la ville de Paris, en montrant de bons r\'esultats de d\'etection et de classification dans l'ensemble de donn\'ees.---In this article, we present a method for detection and classification of artifacts at the street level, in order to filter cloud point, facilitating the urban modeling process. Our approach exploits 3D information by using range image, a projection of 3D points onto an image plane where the pixel intensity is a function of the measured distance between 3D points and the plane. By assuming that the artifacts are on the ground, they are detected using a Top-Hat of the hole filling algorithm of range images. Then, several features are extracted from the detected connected components and a stepwise forward variable/model selection by using the Wilk's Lambda criterion is performed. Afterward, CCs are classified in four categories (lampposts, pedestrians, cars and others) by using a supervised machine learning method. The proposed method was tested on cloud points of Paris, and have shown satisfactory results on the whole dataset.
[ { "version": "v1", "created": "Thu, 13 Jun 2013 11:27:58 GMT" } ]
2013-06-14T00:00:00
[ [ "Hernandez", "Jorge", "", "CMM" ], [ "Marcotegui", "Beatriz", "", "CMM" ] ]
TITLE: Segmentation et Interpr\'etation de Nuages de Points pour la Mod\'elisation d'Environnements Urbains ABSTRACT: Dans cet article, nous pr\'esentons une m\'ethode pour la d\'etection et la classification d'artefacts au niveau du sol, comme phase de filtrage pr\'ealable \`a la mod\'elisation d'environnements urbains. La m\'ethode de d\'etection est r\'ealis\'ee sur l'image profondeur, une projection de nuage de points sur un plan image o\`u la valeur du pixel correspond \`a la distance du point au plan. En faisant l'hypoth\`ese que les artefacts sont situ\'es au sol, ils sont d\'etect\'es par une transformation de chapeau haut de forme par remplissage de trous sur l'image de profondeur. Les composantes connexes ainsi obtenues, sont ensuite caract\'eris\'ees et une analyse des variables est utilis\'ee pour la s\'election des caract\'eristiques les plus discriminantes. Les composantes connexes sont donc classifi\'ees en quatre cat\'egories (lampadaires, pi\'etons, voitures et "Reste") \`a l'aide d'un algorithme d'apprentissage supervis\'e. La m\'ethode a \'et\'e test\'ee sur des nuages de points de la ville de Paris, en montrant de bons r\'esultats de d\'etection et de classification dans l'ensemble de donn\'ees.---In this article, we present a method for detection and classification of artifacts at the street level, in order to filter cloud point, facilitating the urban modeling process. Our approach exploits 3D information by using range image, a projection of 3D points onto an image plane where the pixel intensity is a function of the measured distance between 3D points and the plane. By assuming that the artifacts are on the ground, they are detected using a Top-Hat of the hole filling algorithm of range images. Then, several features are extracted from the detected connected components and a stepwise forward variable/model selection by using the Wilk's Lambda criterion is performed. Afterward, CCs are classified in four categories (lampposts, pedestrians, cars and others) by using a supervised machine learning method. The proposed method was tested on cloud points of Paris, and have shown satisfactory results on the whole dataset.
1306.2863
Jun Sun
Jun Sun, Xiaojun Wu, Vasile Palade, Wei Fang, Yuhui Shi
Random Drift Particle Swarm Optimization
The paper is the work in progress on particle swarm optimization. It has 41 pages and 7 figures
null
null
null
cs.AI cs.NE math.OC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The random drift particle swarm optimization (RDPSO) algorithm, inspired by the free electron model in metal conductors placed in an external electric field, is presented, systematically analyzed and empirically studied in this paper. The free electron model considers that electrons have both a thermal and a drift motion in a conductor that is placed in an external electric field. The motivation of the RDPSO algorithm is described first, and the velocity equation of the particle is designed by simulating the thermal motion as well as the drift motion of the electrons, both of which lead the electrons to a location with minimum potential energy in the external electric field. Then, a comprehensive analysis of the algorithm is made, in order to provide a deep insight into how the RDPSO algorithm works. It involves a theoretical analysis and the simulation of the stochastic dynamical behavior of a single particle in the RDPSO algorithm. The search behavior of the algorithm itself is also investigated in detail, by analyzing the interaction between the particles. Some variants of the RDPSO algorithm are proposed by incorporating different random velocity components with different neighborhood topologies. Finally, empirical studies on the RDPSO algorithm are performed by using a set of benchmark functions from the CEC2005 benchmark suite. Based on the theoretical analysis of the particle's behavior, two methods of controlling the algorithmic parameters are employed, followed by an experimental analysis on how to select the parameter values, in order to obtain a good overall performance of the RDPSO algorithm and its variants in real-world applications. A further performance comparison between the RDPSO algorithms and other variants of PSO is made to prove the efficiency of the RDPSO algorithms.
[ { "version": "v1", "created": "Wed, 12 Jun 2013 15:34:51 GMT" } ]
2013-06-13T00:00:00
[ [ "Sun", "Jun", "" ], [ "Wu", "Xiaojun", "" ], [ "Palade", "Vasile", "" ], [ "Fang", "Wei", "" ], [ "Shi", "Yuhui", "" ] ]
TITLE: Random Drift Particle Swarm Optimization ABSTRACT: The random drift particle swarm optimization (RDPSO) algorithm, inspired by the free electron model in metal conductors placed in an external electric field, is presented, systematically analyzed and empirically studied in this paper. The free electron model considers that electrons have both a thermal and a drift motion in a conductor that is placed in an external electric field. The motivation of the RDPSO algorithm is described first, and the velocity equation of the particle is designed by simulating the thermal motion as well as the drift motion of the electrons, both of which lead the electrons to a location with minimum potential energy in the external electric field. Then, a comprehensive analysis of the algorithm is made, in order to provide a deep insight into how the RDPSO algorithm works. It involves a theoretical analysis and the simulation of the stochastic dynamical behavior of a single particle in the RDPSO algorithm. The search behavior of the algorithm itself is also investigated in detail, by analyzing the interaction between the particles. Some variants of the RDPSO algorithm are proposed by incorporating different random velocity components with different neighborhood topologies. Finally, empirical studies on the RDPSO algorithm are performed by using a set of benchmark functions from the CEC2005 benchmark suite. Based on the theoretical analysis of the particle's behavior, two methods of controlling the algorithmic parameters are employed, followed by an experimental analysis on how to select the parameter values, in order to obtain a good overall performance of the RDPSO algorithm and its variants in real-world applications. A further performance comparison between the RDPSO algorithms and other variants of PSO is made to prove the efficiency of the RDPSO algorithms.
1306.2864
Catarina Moreira
Catarina Moreira and Andreas Wichert
Finding Academic Experts on a MultiSensor Approach using Shannon's Entropy
null
Journal of Expert Systems with Applications, 2013, volume 40, issue 14
10.1016/j.eswa.2013.04.001
null
cs.AI cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Expert finding is an information retrieval task concerned with the search for the most knowledgeable people, in some topic, with basis on documents describing peoples activities. The task involves taking a user query as input and returning a list of people sorted by their level of expertise regarding the user query. This paper introduces a novel approach for combining multiple estimators of expertise based on a multisensor data fusion framework together with the Dempster-Shafer theory of evidence and Shannon's entropy. More specifically, we defined three sensors which detect heterogeneous information derived from the textual contents, from the graph structure of the citation patterns for the community of experts, and from profile information about the academic experts. Given the evidences collected, each sensor may define different candidates as experts and consequently do not agree in a final ranking decision. To deal with these conflicts, we applied the Dempster-Shafer theory of evidence combined with Shannon's Entropy formula to fuse this information and come up with a more accurate and reliable final ranking list. Experiments made over two datasets of academic publications from the Computer Science domain attest for the adequacy of the proposed approach over the traditional state of the art approaches. We also made experiments against representative supervised state of the art algorithms. Results revealed that the proposed method achieved a similar performance when compared to these supervised techniques, confirming the capabilities of the proposed framework.
[ { "version": "v1", "created": "Wed, 12 Jun 2013 15:35:57 GMT" } ]
2013-06-13T00:00:00
[ [ "Moreira", "Catarina", "" ], [ "Wichert", "Andreas", "" ] ]
TITLE: Finding Academic Experts on a MultiSensor Approach using Shannon's Entropy ABSTRACT: Expert finding is an information retrieval task concerned with the search for the most knowledgeable people, in some topic, with basis on documents describing peoples activities. The task involves taking a user query as input and returning a list of people sorted by their level of expertise regarding the user query. This paper introduces a novel approach for combining multiple estimators of expertise based on a multisensor data fusion framework together with the Dempster-Shafer theory of evidence and Shannon's entropy. More specifically, we defined three sensors which detect heterogeneous information derived from the textual contents, from the graph structure of the citation patterns for the community of experts, and from profile information about the academic experts. Given the evidences collected, each sensor may define different candidates as experts and consequently do not agree in a final ranking decision. To deal with these conflicts, we applied the Dempster-Shafer theory of evidence combined with Shannon's Entropy formula to fuse this information and come up with a more accurate and reliable final ranking list. Experiments made over two datasets of academic publications from the Computer Science domain attest for the adequacy of the proposed approach over the traditional state of the art approaches. We also made experiments against representative supervised state of the art algorithms. Results revealed that the proposed method achieved a similar performance when compared to these supervised techniques, confirming the capabilities of the proposed framework.
1306.2459
Sutanay Choudhury
Sutanay Choudhury, Lawrence Holder, George Chin, John Feo
Fast Search for Dynamic Multi-Relational Graphs
SIGMOD Workshop on Dynamic Networks Management and Mining (DyNetMM), 2013
null
null
null
cs.DB
http://creativecommons.org/licenses/publicdomain/
Acting on time-critical events by processing ever growing social media or news streams is a major technical challenge. Many of these data sources can be modeled as multi-relational graphs. Continuous queries or techniques to search for rare events that typically arise in monitoring applications have been studied extensively for relational databases. This work is dedicated to answer the question that emerges naturally: how can we efficiently execute a continuous query on a dynamic graph? This paper presents an exact subgraph search algorithm that exploits the temporal characteristics of representative queries for online news or social media monitoring. The algorithm is based on a novel data structure called the Subgraph Join Tree (SJ-Tree) that leverages the structural and semantic characteristics of the underlying multi-relational graph. The paper concludes with extensive experimentation on several real-world datasets that demonstrates the validity of this approach.
[ { "version": "v1", "created": "Tue, 11 Jun 2013 09:21:42 GMT" } ]
2013-06-12T00:00:00
[ [ "Choudhury", "Sutanay", "" ], [ "Holder", "Lawrence", "" ], [ "Chin", "George", "" ], [ "Feo", "John", "" ] ]
TITLE: Fast Search for Dynamic Multi-Relational Graphs ABSTRACT: Acting on time-critical events by processing ever growing social media or news streams is a major technical challenge. Many of these data sources can be modeled as multi-relational graphs. Continuous queries or techniques to search for rare events that typically arise in monitoring applications have been studied extensively for relational databases. This work is dedicated to answer the question that emerges naturally: how can we efficiently execute a continuous query on a dynamic graph? This paper presents an exact subgraph search algorithm that exploits the temporal characteristics of representative queries for online news or social media monitoring. The algorithm is based on a novel data structure called the Subgraph Join Tree (SJ-Tree) that leverages the structural and semantic characteristics of the underlying multi-relational graph. The paper concludes with extensive experimentation on several real-world datasets that demonstrates the validity of this approach.
1306.2597
Tao Qin Dr.
Tao Qin and Tie-Yan Liu
Introducing LETOR 4.0 Datasets
null
null
null
null
cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
LETOR is a package of benchmark data sets for research on LEarning TO Rank, which contains standard features, relevance judgments, data partitioning, evaluation tools, and several baselines. Version 1.0 was released in April 2007. Version 2.0 was released in Dec. 2007. Version 3.0 was released in Dec. 2008. This version, 4.0, was released in July 2009. Very different from previous versions (V3.0 is an update based on V2.0 and V2.0 is an update based on V1.0), LETOR4.0 is a totally new release. It uses the Gov2 web page collection (~25M pages) and two query sets from Million Query track of TREC 2007 and TREC 2008. We call the two query sets MQ2007 and MQ2008 for short. There are about 1700 queries in MQ2007 with labeled documents and about 800 queries in MQ2008 with labeled documents. If you have any questions or suggestions about the datasets, please kindly email us ([email protected]). Our goal is to make the dataset reliable and useful for the community.
[ { "version": "v1", "created": "Sun, 9 Jun 2013 09:58:00 GMT" } ]
2013-06-12T00:00:00
[ [ "Qin", "Tao", "" ], [ "Liu", "Tie-Yan", "" ] ]
TITLE: Introducing LETOR 4.0 Datasets ABSTRACT: LETOR is a package of benchmark data sets for research on LEarning TO Rank, which contains standard features, relevance judgments, data partitioning, evaluation tools, and several baselines. Version 1.0 was released in April 2007. Version 2.0 was released in Dec. 2007. Version 3.0 was released in Dec. 2008. This version, 4.0, was released in July 2009. Very different from previous versions (V3.0 is an update based on V2.0 and V2.0 is an update based on V1.0), LETOR4.0 is a totally new release. It uses the Gov2 web page collection (~25M pages) and two query sets from Million Query track of TREC 2007 and TREC 2008. We call the two query sets MQ2007 and MQ2008 for short. There are about 1700 queries in MQ2007 with labeled documents and about 800 queries in MQ2008 with labeled documents. If you have any questions or suggestions about the datasets, please kindly email us ([email protected]). Our goal is to make the dataset reliable and useful for the community.
1302.4760
Lauro Costa
Lauro Beltr\~ao Costa and Abmar Barros and Samer Al-Kiswany and Hao Yang and Emalayan Vairavanathan and Matei Ripeanu
Predicting Intermediate Storage Performance for Workflow Applications
null
null
null
NetSysLab - TR 2013/02
cs.DC cs.PF
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Configuring a storage system to better serve an application is a challenging task complicated by a multidimensional, discrete configuration space and the high cost of space exploration (e.g., by running the application with different storage configurations). To enable selecting the best configuration in a reasonable time, we design an end-to-end performance prediction mechanism that estimates the turn-around time of an application using storage system under a given configuration. This approach focuses on a generic object-based storage system design, supports exploring the impact of optimizations targeting workflow applications (e.g., various data placement schemes) in addition to other, more traditional, configuration knobs (e.g., stripe size or replication level), and models the system operation at data-chunk and control message level. This paper presents our experience to date with designing and using this prediction mechanism. We evaluate this mechanism using micro- as well as synthetic benchmarks mimicking real workflow applications, and a real application.. A preliminary evaluation shows that we are on a good track to meet our objectives: it can scale to model a workflow application run on an entire cluster while offering an over 200x speedup factor (normalized by resource) compared to running the actual application, and can achieve, in the limited number of scenarios we study, a prediction accuracy that enables identifying the best storage system configuration.
[ { "version": "v1", "created": "Tue, 19 Feb 2013 21:39:16 GMT" }, { "version": "v2", "created": "Mon, 10 Jun 2013 04:09:34 GMT" } ]
2013-06-11T00:00:00
[ [ "Costa", "Lauro Beltrão", "" ], [ "Barros", "Abmar", "" ], [ "Al-Kiswany", "Samer", "" ], [ "Yang", "Hao", "" ], [ "Vairavanathan", "Emalayan", "" ], [ "Ripeanu", "Matei", "" ] ]
TITLE: Predicting Intermediate Storage Performance for Workflow Applications ABSTRACT: Configuring a storage system to better serve an application is a challenging task complicated by a multidimensional, discrete configuration space and the high cost of space exploration (e.g., by running the application with different storage configurations). To enable selecting the best configuration in a reasonable time, we design an end-to-end performance prediction mechanism that estimates the turn-around time of an application using storage system under a given configuration. This approach focuses on a generic object-based storage system design, supports exploring the impact of optimizations targeting workflow applications (e.g., various data placement schemes) in addition to other, more traditional, configuration knobs (e.g., stripe size or replication level), and models the system operation at data-chunk and control message level. This paper presents our experience to date with designing and using this prediction mechanism. We evaluate this mechanism using micro- as well as synthetic benchmarks mimicking real workflow applications, and a real application.. A preliminary evaluation shows that we are on a good track to meet our objectives: it can scale to model a workflow application run on an entire cluster while offering an over 200x speedup factor (normalized by resource) compared to running the actual application, and can achieve, in the limited number of scenarios we study, a prediction accuracy that enables identifying the best storage system configuration.
1305.5486
John Scoville
John Scoville
Fast Autocorrelated Context Models for Data Compression
v2 includes bibliography
null
null
null
cs.IT cs.MM math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A method is presented to automatically generate context models of data by calculating the data's autocorrelation function. The largest values of the autocorrelation function occur at the offsets or lags in the bitstream which tend to be the most highly correlated to any particular location. These offsets are ideal for use in predictive coding, such as predictive partial match (PPM) or context-mixing algorithms for data compression, making such algorithms more efficient and more general by reducing or eliminating the need for ad-hoc models based on particular types of data. Instead of using the definition of the autocorrelation function, which considers the pairwise correlations of data requiring O(n^2) time, the Weiner-Khinchin theorem is applied, quickly obtaining the autocorrelation as the inverse Fast Fourier transform of the data's power spectrum in O(n log n) time, making the technique practical for the compression of large data objects. The method is shown to produce the highest levels of performance obtained to date on a lossless image compression benchmark.
[ { "version": "v1", "created": "Thu, 23 May 2013 17:11:39 GMT" }, { "version": "v2", "created": "Mon, 10 Jun 2013 06:24:43 GMT" } ]
2013-06-11T00:00:00
[ [ "Scoville", "John", "" ] ]
TITLE: Fast Autocorrelated Context Models for Data Compression ABSTRACT: A method is presented to automatically generate context models of data by calculating the data's autocorrelation function. The largest values of the autocorrelation function occur at the offsets or lags in the bitstream which tend to be the most highly correlated to any particular location. These offsets are ideal for use in predictive coding, such as predictive partial match (PPM) or context-mixing algorithms for data compression, making such algorithms more efficient and more general by reducing or eliminating the need for ad-hoc models based on particular types of data. Instead of using the definition of the autocorrelation function, which considers the pairwise correlations of data requiring O(n^2) time, the Weiner-Khinchin theorem is applied, quickly obtaining the autocorrelation as the inverse Fast Fourier transform of the data's power spectrum in O(n log n) time, making the technique practical for the compression of large data objects. The method is shown to produce the highest levels of performance obtained to date on a lossless image compression benchmark.
1306.1850
Ayad Ghany Ismaeel
Ayad Ghany Ismaeel, Anar Auda Ablahad
Enhancement of a Novel Method for Mutational Disease Prediction using Bioinformatics Techniques and Backpropagation Algorithm
5 pages, 8 figures, 1 Table, conference or other essential info
International Journal of Scientific & Engineering Research, Volume 4, Issue 6, June 2013 pages 1169-1173
null
null
cs.CE q-bio.QM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The noval method for mutational disease prediction using bioinformatics tools and datasets for diagnosis the malignant mutations with powerful Artificial Neural Network (Backpropagation Network) for classifying these malignant mutations are related to gene(s) (like BRCA1 and BRCA2) cause a disease (breast cancer). This noval method did not take in consideration just like adopted for dealing, analyzing and treat the gene sequences for extracting useful information from the sequence, also exceeded the environment factors which play important roles in deciding and calculating some of genes features in order to view its functional parts and relations to diseases. This paper is proposed an enhancement of a novel method as a first way for diagnosis and prediction the disease by mutations considering and introducing multi other features show the alternations, changes in the environment as well as genes, comparing sequences to gain information about the structure or function of a query sequence, also proposing optimal and more accurate system for classification and dealing with specific disorder using backpropagation with mean square rate 0.000000001. Index Terms (Homology sequence, GC content and AT content, Bioinformatics, Backpropagation Network, BLAST, DNA Sequence, Protein Sequence)
[ { "version": "v1", "created": "Fri, 7 Jun 2013 21:53:25 GMT" } ]
2013-06-11T00:00:00
[ [ "Ismaeel", "Ayad Ghany", "" ], [ "Ablahad", "Anar Auda", "" ] ]
TITLE: Enhancement of a Novel Method for Mutational Disease Prediction using Bioinformatics Techniques and Backpropagation Algorithm ABSTRACT: The noval method for mutational disease prediction using bioinformatics tools and datasets for diagnosis the malignant mutations with powerful Artificial Neural Network (Backpropagation Network) for classifying these malignant mutations are related to gene(s) (like BRCA1 and BRCA2) cause a disease (breast cancer). This noval method did not take in consideration just like adopted for dealing, analyzing and treat the gene sequences for extracting useful information from the sequence, also exceeded the environment factors which play important roles in deciding and calculating some of genes features in order to view its functional parts and relations to diseases. This paper is proposed an enhancement of a novel method as a first way for diagnosis and prediction the disease by mutations considering and introducing multi other features show the alternations, changes in the environment as well as genes, comparing sequences to gain information about the structure or function of a query sequence, also proposing optimal and more accurate system for classification and dealing with specific disorder using backpropagation with mean square rate 0.000000001. Index Terms (Homology sequence, GC content and AT content, Bioinformatics, Backpropagation Network, BLAST, DNA Sequence, Protein Sequence)
1306.1907
Mouhamed Abdulla
Mouhamed Abdulla and Yousef R. Shayan
Analytical Coexistence Benchmark for Assessing the Utmost Interference Tolerated by IEEE 802.20
null
Journal of Information Processing Systems, vol. 7, no. 1, pp. 43-52, Mar. 2011
10.3745/JIPS.2011.7.1.043
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Whether it is crosstalk, harmonics, or in-band operation of wireless technologies, interference between a reference system and a host of offenders is virtually unavoidable. In past contributions, a benchmark has been established and considered for coexistence analysis with a number of technologies including FWA, UMTS, and WiMAX. However, the previously presented model does not take into account the mobility factor of the reference node in addition to a number of interdependent requirements regarding the link direction, channel state, data rate and system factors; hence limiting its applicability for the MBWA (IEEE 802.20) standard. Thus, over diverse modes, in this correspondence we analytically derived the greatest aggregate interference level tolerated for high-fidelity transmission tailored specifically for the MBWA standard. Our results, in the form of benchmark indicators, should be of particular interest to peers analyzing and researching RF coexistence scenarios with this new protocol.
[ { "version": "v1", "created": "Sat, 8 Jun 2013 11:08:52 GMT" } ]
2013-06-11T00:00:00
[ [ "Abdulla", "Mouhamed", "" ], [ "Shayan", "Yousef R.", "" ] ]
TITLE: Analytical Coexistence Benchmark for Assessing the Utmost Interference Tolerated by IEEE 802.20 ABSTRACT: Whether it is crosstalk, harmonics, or in-band operation of wireless technologies, interference between a reference system and a host of offenders is virtually unavoidable. In past contributions, a benchmark has been established and considered for coexistence analysis with a number of technologies including FWA, UMTS, and WiMAX. However, the previously presented model does not take into account the mobility factor of the reference node in addition to a number of interdependent requirements regarding the link direction, channel state, data rate and system factors; hence limiting its applicability for the MBWA (IEEE 802.20) standard. Thus, over diverse modes, in this correspondence we analytically derived the greatest aggregate interference level tolerated for high-fidelity transmission tailored specifically for the MBWA standard. Our results, in the form of benchmark indicators, should be of particular interest to peers analyzing and researching RF coexistence scenarios with this new protocol.
1306.1945
Anvesh Komuravelli
Anvesh Komuravelli, Arie Gurfinkel, Sagar Chaki and Edmund M. Clarke
Automatic Abstraction in SMT-Based Unbounded Software Model Checking
Extended version of a paper in the proceedings of CAV 2013
null
null
null
cs.LO cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Software model checkers based on under-approximations and SMT solvers are very successful at verifying safety (i.e. reachability) properties. They combine two key ideas -- (a) "concreteness": a counterexample in an under-approximation is a counterexample in the original program as well, and (b) "generalization": a proof of safety of an under-approximation, produced by an SMT solver, are generalizable to proofs of safety of the original program. In this paper, we present a combination of "automatic abstraction" with the under-approximation-driven framework. We explore two iterative approaches for obtaining and refining abstractions -- "proof based" and "counterexample based" -- and show how they can be combined into a unified algorithm. To the best of our knowledge, this is the first application of Proof-Based Abstraction, primarily used to verify hardware, to Software Verification. We have implemented a prototype of the framework using Z3, and evaluate it on many benchmarks from the Software Verification Competition. We show experimentally that our combination is quite effective on hard instances.
[ { "version": "v1", "created": "Sat, 8 Jun 2013 18:41:28 GMT" } ]
2013-06-11T00:00:00
[ [ "Komuravelli", "Anvesh", "" ], [ "Gurfinkel", "Arie", "" ], [ "Chaki", "Sagar", "" ], [ "Clarke", "Edmund M.", "" ] ]
TITLE: Automatic Abstraction in SMT-Based Unbounded Software Model Checking ABSTRACT: Software model checkers based on under-approximations and SMT solvers are very successful at verifying safety (i.e. reachability) properties. They combine two key ideas -- (a) "concreteness": a counterexample in an under-approximation is a counterexample in the original program as well, and (b) "generalization": a proof of safety of an under-approximation, produced by an SMT solver, are generalizable to proofs of safety of the original program. In this paper, we present a combination of "automatic abstraction" with the under-approximation-driven framework. We explore two iterative approaches for obtaining and refining abstractions -- "proof based" and "counterexample based" -- and show how they can be combined into a unified algorithm. To the best of our knowledge, this is the first application of Proof-Based Abstraction, primarily used to verify hardware, to Software Verification. We have implemented a prototype of the framework using Z3, and evaluate it on many benchmarks from the Software Verification Competition. We show experimentally that our combination is quite effective on hard instances.
1306.2037
Maryam Yazdani
Maryam Yazdani, Morteza Saheb Zamani, Mehdi Sedighi
A Quantum Physical Design Flow Using ILP and Graph Drawing
17 figures, 12 tables, Quantum Information Processing Journal. arXiv admin note: text overlap with arXiv:0704.0268 by other authors
null
null
null
quant-ph cs.ET
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Implementing large-scale quantum circuits is one of the challenges of quantum computing. One of the central challenges of accurately modeling the architecture of these circuits is to schedule a quantum application and generate the layout while taking into account the cost of communications and classical resources as well as the maximum exploitable parallelism. In this paper, we present and evaluate a design flow for arbitrary quantum circuits in ion trap technology. Our design flow consists of two parts. First, a scheduler takes a description of a circuit and finds the best order for the execution of its quantum gates using integer linear programming (ILP) regarding the classical resources (qubits) and instruction dependencies. Then a layout generator receives the schedule produced by the scheduler and generates a layout for this circuit using a graph-drawing algorithm. Our experimental results show that the proposed flow decreases the average latency of quantum circuits by about 11% for a set of attempted benchmarks and by about 9% for another set of benchmarks compared with the best in literature.
[ { "version": "v1", "created": "Sun, 9 Jun 2013 16:44:15 GMT" } ]
2013-06-11T00:00:00
[ [ "Yazdani", "Maryam", "" ], [ "Zamani", "Morteza Saheb", "" ], [ "Sedighi", "Mehdi", "" ] ]
TITLE: A Quantum Physical Design Flow Using ILP and Graph Drawing ABSTRACT: Implementing large-scale quantum circuits is one of the challenges of quantum computing. One of the central challenges of accurately modeling the architecture of these circuits is to schedule a quantum application and generate the layout while taking into account the cost of communications and classical resources as well as the maximum exploitable parallelism. In this paper, we present and evaluate a design flow for arbitrary quantum circuits in ion trap technology. Our design flow consists of two parts. First, a scheduler takes a description of a circuit and finds the best order for the execution of its quantum gates using integer linear programming (ILP) regarding the classical resources (qubits) and instruction dependencies. Then a layout generator receives the schedule produced by the scheduler and generates a layout for this circuit using a graph-drawing algorithm. Our experimental results show that the proposed flow decreases the average latency of quantum circuits by about 11% for a set of attempted benchmarks and by about 9% for another set of benchmarks compared with the best in literature.
1306.2084
Maximilian Nickel
Maximilian Nickel, Volker Tresp
Logistic Tensor Factorization for Multi-Relational Data
Accepted at ICML 2013 Workshop "Structured Learning: Inferring Graphs from Structured and Unstructured Inputs" (SLG 2013)
null
null
null
stat.ML cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Tensor factorizations have become increasingly popular approaches for various learning tasks on structured data. In this work, we extend the RESCAL tensor factorization, which has shown state-of-the-art results for multi-relational learning, to account for the binary nature of adjacency tensors. We study the improvements that can be gained via this approach on various benchmark datasets and show that the logistic extension can improve the prediction results significantly.
[ { "version": "v1", "created": "Mon, 10 Jun 2013 01:45:49 GMT" } ]
2013-06-11T00:00:00
[ [ "Nickel", "Maximilian", "" ], [ "Tresp", "Volker", "" ] ]
TITLE: Logistic Tensor Factorization for Multi-Relational Data ABSTRACT: Tensor factorizations have become increasingly popular approaches for various learning tasks on structured data. In this work, we extend the RESCAL tensor factorization, which has shown state-of-the-art results for multi-relational learning, to account for the binary nature of adjacency tensors. We study the improvements that can be gained via this approach on various benchmark datasets and show that the logistic extension can improve the prediction results significantly.
1306.2118
E.N.Sathishkumar
E.N.Sathishkumar, K.Thangavel, T.Chandrasekhar
A Novel Approach for Single Gene Selection Using Clustering and Dimensionality Reduction
6 pages, 4 figures. arXiv admin note: text overlap with arXiv:1306.1323
International Journal of Scientific & Engineering Research, Volume 4, Issue 5, May-2013, page no 1540-1545
null
null
cs.CE cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We extend the standard rough set-based approach to deal with huge amounts of numeric attributes versus small amount of available objects. Here, a novel approach of clustering along with dimensionality reduction; Hybrid Fuzzy C Means-Quick Reduct (FCMQR) algorithm is proposed for single gene selection. Gene selection is a process to select genes which are more informative. It is one of the important steps in knowledge discovery. The problem is that all genes are not important in gene expression data. Some of the genes may be redundant, and others may be irrelevant and noisy. In this study, the entire dataset is divided in proper grouping of similar genes by applying Fuzzy C Means (FCM) algorithm. A high class discriminated genes has been selected based on their degree of dependence by applying Quick Reduct algorithm based on Rough Set Theory to all the resultant clusters. Average Correlation Value (ACV) is calculated for the high class discriminated genes. The clusters which have the ACV value a s 1 is determined as significant clusters, whose classification accuracy will be equal or high when comparing to the accuracy of the entire dataset. The proposed algorithm is evaluated using WEKA classifiers and compared. Finally, experimental results related to the leukemia cancer data confirm that our approach is quite promising, though it surely requires further research.
[ { "version": "v1", "created": "Mon, 10 Jun 2013 07:28:51 GMT" } ]
2013-06-11T00:00:00
[ [ "Sathishkumar", "E. N.", "" ], [ "Thangavel", "K.", "" ], [ "Chandrasekhar", "T.", "" ] ]
TITLE: A Novel Approach for Single Gene Selection Using Clustering and Dimensionality Reduction ABSTRACT: We extend the standard rough set-based approach to deal with huge amounts of numeric attributes versus small amount of available objects. Here, a novel approach of clustering along with dimensionality reduction; Hybrid Fuzzy C Means-Quick Reduct (FCMQR) algorithm is proposed for single gene selection. Gene selection is a process to select genes which are more informative. It is one of the important steps in knowledge discovery. The problem is that all genes are not important in gene expression data. Some of the genes may be redundant, and others may be irrelevant and noisy. In this study, the entire dataset is divided in proper grouping of similar genes by applying Fuzzy C Means (FCM) algorithm. A high class discriminated genes has been selected based on their degree of dependence by applying Quick Reduct algorithm based on Rough Set Theory to all the resultant clusters. Average Correlation Value (ACV) is calculated for the high class discriminated genes. The clusters which have the ACV value a s 1 is determined as significant clusters, whose classification accuracy will be equal or high when comparing to the accuracy of the entire dataset. The proposed algorithm is evaluated using WEKA classifiers and compared. Finally, experimental results related to the leukemia cancer data confirm that our approach is quite promising, though it surely requires further research.
1306.2119
Francis Bach
Francis Bach (INRIA Paris - Rocquencourt, LIENS), Eric Moulines (LTCI)
Non-strongly-convex smooth stochastic approximation with convergence rate O(1/n)
null
null
null
null
cs.LG math.OC stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the stochastic approximation problem where a convex function has to be minimized, given only the knowledge of unbiased estimates of its gradients at certain points, a framework which includes machine learning methods based on the minimization of the empirical risk. We focus on problems without strong convexity, for which all previously known algorithms achieve a convergence rate for function values of O(1/n^{1/2}). We consider and analyze two algorithms that achieve a rate of O(1/n) for classical supervised learning problems. For least-squares regression, we show that averaged stochastic gradient descent with constant step-size achieves the desired rate. For logistic regression, this is achieved by a simple novel stochastic gradient algorithm that (a) constructs successive local quadratic approximations of the loss functions, while (b) preserving the same running time complexity as stochastic gradient descent. For these algorithms, we provide a non-asymptotic analysis of the generalization error (in expectation, and also in high probability for least-squares), and run extensive experiments on standard machine learning benchmarks showing that they often outperform existing approaches.
[ { "version": "v1", "created": "Mon, 10 Jun 2013 07:31:10 GMT" } ]
2013-06-11T00:00:00
[ [ "Bach", "Francis", "", "INRIA Paris - Rocquencourt, LIENS" ], [ "Moulines", "Eric", "", "LTCI" ] ]
TITLE: Non-strongly-convex smooth stochastic approximation with convergence rate O(1/n) ABSTRACT: We consider the stochastic approximation problem where a convex function has to be minimized, given only the knowledge of unbiased estimates of its gradients at certain points, a framework which includes machine learning methods based on the minimization of the empirical risk. We focus on problems without strong convexity, for which all previously known algorithms achieve a convergence rate for function values of O(1/n^{1/2}). We consider and analyze two algorithms that achieve a rate of O(1/n) for classical supervised learning problems. For least-squares regression, we show that averaged stochastic gradient descent with constant step-size achieves the desired rate. For logistic regression, this is achieved by a simple novel stochastic gradient algorithm that (a) constructs successive local quadratic approximations of the loss functions, while (b) preserving the same running time complexity as stochastic gradient descent. For these algorithms, we provide a non-asymptotic analysis of the generalization error (in expectation, and also in high probability for least-squares), and run extensive experiments on standard machine learning benchmarks showing that they often outperform existing approaches.
1305.0445
Yoshua Bengio
Yoshua Bengio
Deep Learning of Representations: Looking Forward
null
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Deep learning research aims at discovering learning algorithms that discover multiple levels of distributed representations, with higher levels representing more abstract concepts. Although the study of deep learning has already led to impressive theoretical results, learning algorithms and breakthrough experiments, several challenges lie ahead. This paper proposes to examine some of these challenges, centering on the questions of scaling deep learning algorithms to much larger models and datasets, reducing optimization difficulties due to ill-conditioning or local minima, designing more efficient and powerful inference and sampling procedures, and learning to disentangle the factors of variation underlying the observed data. It also proposes a few forward-looking research directions aimed at overcoming these challenges.
[ { "version": "v1", "created": "Thu, 2 May 2013 14:33:28 GMT" }, { "version": "v2", "created": "Fri, 7 Jun 2013 02:35:21 GMT" } ]
2013-06-10T00:00:00
[ [ "Bengio", "Yoshua", "" ] ]
TITLE: Deep Learning of Representations: Looking Forward ABSTRACT: Deep learning research aims at discovering learning algorithms that discover multiple levels of distributed representations, with higher levels representing more abstract concepts. Although the study of deep learning has already led to impressive theoretical results, learning algorithms and breakthrough experiments, several challenges lie ahead. This paper proposes to examine some of these challenges, centering on the questions of scaling deep learning algorithms to much larger models and datasets, reducing optimization difficulties due to ill-conditioning or local minima, designing more efficient and powerful inference and sampling procedures, and learning to disentangle the factors of variation underlying the observed data. It also proposes a few forward-looking research directions aimed at overcoming these challenges.
1306.1630
Arunasalam Sambhanthan
Arunasalam Sambhanthan, Alice Good
Enhancing Tourism Destination Accessibility in Developing Countries through Virtual Worlds
Journal article corresponding to arXiv:1302.5199
null
null
null
cs.HC cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The problem of destination accessibility is a vital concern in the sustainable tourism development in the emerging regions due to the increasing numbers of tourism business growth in the recent times. Tourism is one of the potential foreign exchange earning sectors, which place sustainability as one of the main success metrics for benchmarking the overall development of the industry. On the other hand, there are several destinations, which are inaccessible to tourists due to several reasons. Underutilization of potential destinations in both pre purchase and consumption stages is a strategic disadvantage for emerging countries on leading their tourism industry towards sustainability. This research embarks on a content analysis of second life based tourism groups and places. Requirement of a virtual world model to increase the destination accessibility of tourism products has been outlined. The model has to be designed with visual and auditory experience to tourists. The model is expected to enhance the accessibility of destinations for users of different categories.
[ { "version": "v1", "created": "Fri, 7 Jun 2013 06:39:58 GMT" } ]
2013-06-10T00:00:00
[ [ "Sambhanthan", "Arunasalam", "" ], [ "Good", "Alice", "" ] ]
TITLE: Enhancing Tourism Destination Accessibility in Developing Countries through Virtual Worlds ABSTRACT: The problem of destination accessibility is a vital concern in the sustainable tourism development in the emerging regions due to the increasing numbers of tourism business growth in the recent times. Tourism is one of the potential foreign exchange earning sectors, which place sustainability as one of the main success metrics for benchmarking the overall development of the industry. On the other hand, there are several destinations, which are inaccessible to tourists due to several reasons. Underutilization of potential destinations in both pre purchase and consumption stages is a strategic disadvantage for emerging countries on leading their tourism industry towards sustainability. This research embarks on a content analysis of second life based tourism groups and places. Requirement of a virtual world model to increase the destination accessibility of tourism products has been outlined. The model has to be designed with visual and auditory experience to tourists. The model is expected to enhance the accessibility of destinations for users of different categories.
1306.1716
Alexander Petukhov
Alexander Petukhov and Inna Kozlov
Fast greedy algorithm for subspace clustering from corrupted and incomplete data
arXiv admin note: substantial text overlap with arXiv:1304.4282
null
null
null
cs.LG cs.DS math.NA stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We describe the Fast Greedy Sparse Subspace Clustering (FGSSC) algorithm providing an efficient method for clustering data belonging to a few low-dimensional linear or affine subspaces. The main difference of our algorithm from predecessors is its ability to work with noisy data having a high rate of erasures (missed entries with the known coordinates) and errors (corrupted entries with unknown coordinates). We discuss here how to implement the fast version of the greedy algorithm with the maximum efficiency whose greedy strategy is incorporated into iterations of the basic algorithm. We provide numerical evidences that, in the subspace clustering capability, the fast greedy algorithm outperforms not only the existing state-of-the art SSC algorithm taken by the authors as a basic algorithm but also the recent GSSC algorithm. At the same time, its computational cost is only slightly higher than the cost of SSC. The numerical evidence of the algorithm significant advantage is presented for a few synthetic models as well as for the Extended Yale B dataset of facial images. In particular, the face recognition misclassification rate turned out to be 6-20 times lower than for the SSC algorithm. We provide also the numerical evidence that the FGSSC algorithm is able to perform clustering of corrupted data efficiently even when the sum of subspace dimensions significantly exceeds the dimension of the ambient space.
[ { "version": "v1", "created": "Fri, 7 Jun 2013 13:14:50 GMT" } ]
2013-06-10T00:00:00
[ [ "Petukhov", "Alexander", "" ], [ "Kozlov", "Inna", "" ] ]
TITLE: Fast greedy algorithm for subspace clustering from corrupted and incomplete data ABSTRACT: We describe the Fast Greedy Sparse Subspace Clustering (FGSSC) algorithm providing an efficient method for clustering data belonging to a few low-dimensional linear or affine subspaces. The main difference of our algorithm from predecessors is its ability to work with noisy data having a high rate of erasures (missed entries with the known coordinates) and errors (corrupted entries with unknown coordinates). We discuss here how to implement the fast version of the greedy algorithm with the maximum efficiency whose greedy strategy is incorporated into iterations of the basic algorithm. We provide numerical evidences that, in the subspace clustering capability, the fast greedy algorithm outperforms not only the existing state-of-the art SSC algorithm taken by the authors as a basic algorithm but also the recent GSSC algorithm. At the same time, its computational cost is only slightly higher than the cost of SSC. The numerical evidence of the algorithm significant advantage is presented for a few synthetic models as well as for the Extended Yale B dataset of facial images. In particular, the face recognition misclassification rate turned out to be 6-20 times lower than for the SSC algorithm. We provide also the numerical evidence that the FGSSC algorithm is able to perform clustering of corrupted data efficiently even when the sum of subspace dimensions significantly exceeds the dimension of the ambient space.
1306.1773
Daniel Graziotin
Daniel Graziotin and Pekka Abrahamsson (Free University of Bozen-Bolzano)
Making Sense out of a Jungle of JavaScript Frameworks: towards a Practitioner-friendly Comparative Analysis
5 Pages, 1 Figure. The final publication is available at link.springer.com. Link: http://link.springer.com/chapter/10.1007/978-3-642-39259-7_28. DOI: 10.1007/978-3-642-39259-7_28
Proceedings of the 14th International Conference on Product-Focused Software Process Improvement (PROFES 2013), LNCS 7983, Springer-Verlag, pp. 334-337, 2013
10.1007/978-3-642-39259-7_28
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The field of Web development is entering the HTML5 and CSS3 era and JavaScript is becoming increasingly influential. A large number of JavaScript frameworks have been recently promoted. Practitioners applying the latest technologies need to choose a suitable JavaScript framework (JSF) in order to abstract the frustrating and complicated coding steps and to provide a cross-browser compatibility. Apart from benchmark suites and recommendation from experts, there is little research helping practitioners to select the most suitable JSF to a given situation. The few proposals employ software metrics on the JSF, but practitioners are driven by different concerns when choosing a JSF. As an answer to the critical needs, this paper is a call for action. It proposes a re-search design towards a comparative analysis framework of JSF, which merges researcher needs and practitioner needs.
[ { "version": "v1", "created": "Fri, 7 Jun 2013 16:53:24 GMT" } ]
2013-06-10T00:00:00
[ [ "Graziotin", "Daniel", "", "Free University of\n Bozen-Bolzano" ], [ "Abrahamsson", "Pekka", "", "Free University of\n Bozen-Bolzano" ] ]
TITLE: Making Sense out of a Jungle of JavaScript Frameworks: towards a Practitioner-friendly Comparative Analysis ABSTRACT: The field of Web development is entering the HTML5 and CSS3 era and JavaScript is becoming increasingly influential. A large number of JavaScript frameworks have been recently promoted. Practitioners applying the latest technologies need to choose a suitable JavaScript framework (JSF) in order to abstract the frustrating and complicated coding steps and to provide a cross-browser compatibility. Apart from benchmark suites and recommendation from experts, there is little research helping practitioners to select the most suitable JSF to a given situation. The few proposals employ software metrics on the JSF, but practitioners are driven by different concerns when choosing a JSF. As an answer to the critical needs, this paper is a call for action. It proposes a re-search design towards a comparative analysis framework of JSF, which merges researcher needs and practitioner needs.
1104.2930
Donghui Yan
Donghui Yan, Aiyou Chen, Michael I. Jordan
Cluster Forests
23 pages, 6 figures
Computational Statistics and Data Analysis 2013, Vol. 66, 178-192
10.1016/j.csda.2013.04.010
COMSTA5571
stat.ME cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
With inspiration from Random Forests (RF) in the context of classification, a new clustering ensemble method---Cluster Forests (CF) is proposed. Geometrically, CF randomly probes a high-dimensional data cloud to obtain "good local clusterings" and then aggregates via spectral clustering to obtain cluster assignments for the whole dataset. The search for good local clusterings is guided by a cluster quality measure kappa. CF progressively improves each local clustering in a fashion that resembles the tree growth in RF. Empirical studies on several real-world datasets under two different performance metrics show that CF compares favorably to its competitors. Theoretical analysis reveals that the kappa measure makes it possible to grow the local clustering in a desirable way---it is "noise-resistant". A closed-form expression is obtained for the mis-clustering rate of spectral clustering under a perturbation model, which yields new insights into some aspects of spectral clustering.
[ { "version": "v1", "created": "Thu, 14 Apr 2011 21:29:10 GMT" }, { "version": "v2", "created": "Mon, 18 Apr 2011 05:06:04 GMT" }, { "version": "v3", "created": "Thu, 23 May 2013 21:17:26 GMT" } ]
2013-06-07T00:00:00
[ [ "Yan", "Donghui", "" ], [ "Chen", "Aiyou", "" ], [ "Jordan", "Michael I.", "" ] ]
TITLE: Cluster Forests ABSTRACT: With inspiration from Random Forests (RF) in the context of classification, a new clustering ensemble method---Cluster Forests (CF) is proposed. Geometrically, CF randomly probes a high-dimensional data cloud to obtain "good local clusterings" and then aggregates via spectral clustering to obtain cluster assignments for the whole dataset. The search for good local clusterings is guided by a cluster quality measure kappa. CF progressively improves each local clustering in a fashion that resembles the tree growth in RF. Empirical studies on several real-world datasets under two different performance metrics show that CF compares favorably to its competitors. Theoretical analysis reveals that the kappa measure makes it possible to grow the local clustering in a desirable way---it is "noise-resistant". A closed-form expression is obtained for the mis-clustering rate of spectral clustering under a perturbation model, which yields new insights into some aspects of spectral clustering.
1306.0842
Krikamol Muandet
Krikamol Muandet, Kenji Fukumizu, Bharath Sriperumbudur, Arthur Gretton, Bernhard Sch\"olkopf
Kernel Mean Estimation and Stein's Effect
first draft
null
null
null
stat.ML cs.LG math.ST stat.TH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A mean function in reproducing kernel Hilbert space, or a kernel mean, is an important part of many applications ranging from kernel principal component analysis to Hilbert-space embedding of distributions. Given finite samples, an empirical average is the standard estimate for the true kernel mean. We show that this estimator can be improved via a well-known phenomenon in statistics called Stein's phenomenon. After consideration, our theoretical analysis reveals the existence of a wide class of estimators that are better than the standard. Focusing on a subset of this class, we propose efficient shrinkage estimators for the kernel mean. Empirical evaluations on several benchmark applications clearly demonstrate that the proposed estimators outperform the standard kernel mean estimator.
[ { "version": "v1", "created": "Tue, 4 Jun 2013 16:09:20 GMT" }, { "version": "v2", "created": "Thu, 6 Jun 2013 17:18:25 GMT" } ]
2013-06-07T00:00:00
[ [ "Muandet", "Krikamol", "" ], [ "Fukumizu", "Kenji", "" ], [ "Sriperumbudur", "Bharath", "" ], [ "Gretton", "Arthur", "" ], [ "Schölkopf", "Bernhard", "" ] ]
TITLE: Kernel Mean Estimation and Stein's Effect ABSTRACT: A mean function in reproducing kernel Hilbert space, or a kernel mean, is an important part of many applications ranging from kernel principal component analysis to Hilbert-space embedding of distributions. Given finite samples, an empirical average is the standard estimate for the true kernel mean. We show that this estimator can be improved via a well-known phenomenon in statistics called Stein's phenomenon. After consideration, our theoretical analysis reveals the existence of a wide class of estimators that are better than the standard. Focusing on a subset of this class, we propose efficient shrinkage estimators for the kernel mean. Empirical evaluations on several benchmark applications clearly demonstrate that the proposed estimators outperform the standard kernel mean estimator.
1306.1298
Allon G. Percus
Cristina Garcia-Cardona, Arjuna Flenner, Allon G. Percus
Multiclass Semi-Supervised Learning on Graphs using Ginzburg-Landau Functional Minimization
16 pages, to appear in Springer's Lecture Notes in Computer Science volume "Pattern Recognition Applications and Methods 2013", part of series on Advances in Intelligent and Soft Computing
null
null
null
stat.ML cs.LG math.ST physics.data-an stat.TH
http://creativecommons.org/licenses/publicdomain/
We present a graph-based variational algorithm for classification of high-dimensional data, generalizing the binary diffuse interface model to the case of multiple classes. Motivated by total variation techniques, the method involves minimizing an energy functional made up of three terms. The first two terms promote a stepwise continuous classification function with sharp transitions between classes, while preserving symmetry among the class labels. The third term is a data fidelity term, allowing us to incorporate prior information into the model in a semi-supervised framework. The performance of the algorithm on synthetic data, as well as on the COIL and MNIST benchmark datasets, is competitive with state-of-the-art graph-based multiclass segmentation methods.
[ { "version": "v1", "created": "Thu, 6 Jun 2013 05:32:00 GMT" } ]
2013-06-07T00:00:00
[ [ "Garcia-Cardona", "Cristina", "" ], [ "Flenner", "Arjuna", "" ], [ "Percus", "Allon G.", "" ] ]
TITLE: Multiclass Semi-Supervised Learning on Graphs using Ginzburg-Landau Functional Minimization ABSTRACT: We present a graph-based variational algorithm for classification of high-dimensional data, generalizing the binary diffuse interface model to the case of multiple classes. Motivated by total variation techniques, the method involves minimizing an energy functional made up of three terms. The first two terms promote a stepwise continuous classification function with sharp transitions between classes, while preserving symmetry among the class labels. The third term is a data fidelity term, allowing us to incorporate prior information into the model in a semi-supervised framework. The performance of the algorithm on synthetic data, as well as on the COIL and MNIST benchmark datasets, is competitive with state-of-the-art graph-based multiclass segmentation methods.
1209.1797
Eitan Menahem
Eitan Menahem, Alon Schclar, Lior Rokach, Yuval Elovici
Securing Your Transactions: Detecting Anomalous Patterns In XML Documents
Journal version (14 pages)
null
null
null
cs.CR cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
XML transactions are used in many information systems to store data and interact with other systems. Abnormal transactions, the result of either an on-going cyber attack or the actions of a benign user, can potentially harm the interacting systems and therefore they are regarded as a threat. In this paper we address the problem of anomaly detection and localization in XML transactions using machine learning techniques. We present a new XML anomaly detection framework, XML-AD. Within this framework, an automatic method for extracting features from XML transactions was developed as well as a practical method for transforming XML features into vectors of fixed dimensionality. With these two methods in place, the XML-AD framework makes it possible to utilize general learning algorithms for anomaly detection. Central to the functioning of the framework is a novel multi-univariate anomaly detection algorithm, ADIFA. The framework was evaluated on four XML transactions datasets, captured from real information systems, in which it achieved over 89% true positive detection rate with less than a 0.2% false positive rate.
[ { "version": "v1", "created": "Sun, 9 Sep 2012 13:02:49 GMT" }, { "version": "v2", "created": "Tue, 11 Sep 2012 05:48:34 GMT" }, { "version": "v3", "created": "Wed, 5 Jun 2013 13:19:42 GMT" } ]
2013-06-06T00:00:00
[ [ "Menahem", "Eitan", "" ], [ "Schclar", "Alon", "" ], [ "Rokach", "Lior", "" ], [ "Elovici", "Yuval", "" ] ]
TITLE: Securing Your Transactions: Detecting Anomalous Patterns In XML Documents ABSTRACT: XML transactions are used in many information systems to store data and interact with other systems. Abnormal transactions, the result of either an on-going cyber attack or the actions of a benign user, can potentially harm the interacting systems and therefore they are regarded as a threat. In this paper we address the problem of anomaly detection and localization in XML transactions using machine learning techniques. We present a new XML anomaly detection framework, XML-AD. Within this framework, an automatic method for extracting features from XML transactions was developed as well as a practical method for transforming XML features into vectors of fixed dimensionality. With these two methods in place, the XML-AD framework makes it possible to utilize general learning algorithms for anomaly detection. Central to the functioning of the framework is a novel multi-univariate anomaly detection algorithm, ADIFA. The framework was evaluated on four XML transactions datasets, captured from real information systems, in which it achieved over 89% true positive detection rate with less than a 0.2% false positive rate.
1303.6310
Iztok Fister
Iztok Fister Jr., Du\v{s}an Fister, Xin-She Yang
A hybrid bat algorithm
Electrotechnical review, 2013
null
null
null
cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Swarm intelligence is a very powerful technique to be used for optimization purposes. In this paper we present a new swarm intelligence algorithm, based on the bat algorithm. The Bat algorithm is hybridized with differential evolution strategies. Besides showing very promising results of the standard benchmark functions, this hybridization also significantly improves the original bat algorithm.
[ { "version": "v1", "created": "Mon, 25 Mar 2013 20:53:09 GMT" }, { "version": "v2", "created": "Mon, 29 Apr 2013 12:21:44 GMT" }, { "version": "v3", "created": "Wed, 5 Jun 2013 15:46:53 GMT" } ]
2013-06-06T00:00:00
[ [ "Fister", "Iztok", "Jr." ], [ "Fister", "Dušan", "" ], [ "Yang", "Xin-She", "" ] ]
TITLE: A hybrid bat algorithm ABSTRACT: Swarm intelligence is a very powerful technique to be used for optimization purposes. In this paper we present a new swarm intelligence algorithm, based on the bat algorithm. The Bat algorithm is hybridized with differential evolution strategies. Besides showing very promising results of the standard benchmark functions, this hybridization also significantly improves the original bat algorithm.
1306.0974
Jiuqing Wan
Jiuqing Wan, Li Liu
Distributed Bayesian inference for consistent labeling of tracked objects in non-overlapping camera networks
19 pages, 8 figures
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
One of the fundamental requirements for visual surveillance using non-overlapping camera networks is the correct labeling of tracked objects on each camera in a consistent way,in the sense that the captured tracklets, or observations in this paper, of the same object at different cameras should be assigned with the same label. In this paper, we formulate this task as a Bayesian inference problem and propose a distributed inference framework in which the posterior distribution of labeling variable corresponding to each observation, conditioned on all history appearance and spatio-temporal evidence made in the whole networks, is calculated based solely on local information processing on each camera and mutual information exchanging between neighboring cameras. In our framework, the number of objects presenting in the monitored region, i.e. the sampling space of labeling variables, does not need to be specified beforehand. Instead, it can be determined automatically on the fly. In addition, we make no assumption about the appearance distribution of a single object, but use similarity scores between appearance pairs, given by advanced object re-identification algorithm, as appearance likelihood for inference. This feature makes our method very flexible and competitive when observing condition undergoes large changes across camera views. To cope with the problem of missing detection, which is critical for distributed inference, we consider an enlarged neighborhood of each camera during inference and use a mixture model to describe the higher order spatio-temporal constraints. The robustness of the algorithm against missing detection is improved at the cost of slightly increased computation and communication burden at each camera node. Finally, we demonstrate the effectiveness of our method through experiments on an indoor Office Building dataset and an outdoor Campus Garden dataset.
[ { "version": "v1", "created": "Wed, 5 Jun 2013 03:50:58 GMT" } ]
2013-06-06T00:00:00
[ [ "Wan", "Jiuqing", "" ], [ "Liu", "Li", "" ] ]
TITLE: Distributed Bayesian inference for consistent labeling of tracked objects in non-overlapping camera networks ABSTRACT: One of the fundamental requirements for visual surveillance using non-overlapping camera networks is the correct labeling of tracked objects on each camera in a consistent way,in the sense that the captured tracklets, or observations in this paper, of the same object at different cameras should be assigned with the same label. In this paper, we formulate this task as a Bayesian inference problem and propose a distributed inference framework in which the posterior distribution of labeling variable corresponding to each observation, conditioned on all history appearance and spatio-temporal evidence made in the whole networks, is calculated based solely on local information processing on each camera and mutual information exchanging between neighboring cameras. In our framework, the number of objects presenting in the monitored region, i.e. the sampling space of labeling variables, does not need to be specified beforehand. Instead, it can be determined automatically on the fly. In addition, we make no assumption about the appearance distribution of a single object, but use similarity scores between appearance pairs, given by advanced object re-identification algorithm, as appearance likelihood for inference. This feature makes our method very flexible and competitive when observing condition undergoes large changes across camera views. To cope with the problem of missing detection, which is critical for distributed inference, we consider an enlarged neighborhood of each camera during inference and use a mixture model to describe the higher order spatio-temporal constraints. The robustness of the algorithm against missing detection is improved at the cost of slightly increased computation and communication burden at each camera node. Finally, we demonstrate the effectiveness of our method through experiments on an indoor Office Building dataset and an outdoor Campus Garden dataset.
1306.1034
Mehul Bhatt
Mehul Bhatt and Jakob Suchan and Christian Freksa
ROTUNDE - A Smart Meeting Cinematography Initiative: Tools, Datasets, and Benchmarks for Cognitive Interpretation and Control
Appears in AAAI-2013 Workshop on: Space, Time, and Ambient Intelligence (STAMI 2013)
null
null
null
cs.AI cs.CV cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We construe smart meeting cinematography with a focus on professional situations such as meetings and seminars, possibly conducted in a distributed manner across socio-spatially separated groups. The basic objective in smart meeting cinematography is to interpret professional interactions involving people, and automatically produce dynamic recordings of discussions, debates, presentations etc in the presence of multiple communication modalities. Typical modalities include gestures (e.g., raising one's hand for a question, applause), voice and interruption, electronic apparatus (e.g., pressing a button), movement (e.g., standing-up, moving around) etc. ROTUNDE, an instance of smart meeting cinematography concept, aims to: (a) develop functionality-driven benchmarks with respect to the interpretation and control capabilities of human-cinematographers, real-time video editors, surveillance personnel, and typical human performance in everyday situations; (b) Develop general tools for the commonsense cognitive interpretation of dynamic scenes from the viewpoint of visuo-spatial cognition centred perceptual narrativisation. Particular emphasis is placed on declarative representations and interfacing mechanisms that seamlessly integrate within large-scale cognitive (interaction) systems and companion technologies consisting of diverse AI sub-components. For instance, the envisaged tools would provide general capabilities for high-level commonsense reasoning about space, events, actions, change, and interaction.
[ { "version": "v1", "created": "Wed, 5 Jun 2013 09:40:24 GMT" } ]
2013-06-06T00:00:00
[ [ "Bhatt", "Mehul", "" ], [ "Suchan", "Jakob", "" ], [ "Freksa", "Christian", "" ] ]
TITLE: ROTUNDE - A Smart Meeting Cinematography Initiative: Tools, Datasets, and Benchmarks for Cognitive Interpretation and Control ABSTRACT: We construe smart meeting cinematography with a focus on professional situations such as meetings and seminars, possibly conducted in a distributed manner across socio-spatially separated groups. The basic objective in smart meeting cinematography is to interpret professional interactions involving people, and automatically produce dynamic recordings of discussions, debates, presentations etc in the presence of multiple communication modalities. Typical modalities include gestures (e.g., raising one's hand for a question, applause), voice and interruption, electronic apparatus (e.g., pressing a button), movement (e.g., standing-up, moving around) etc. ROTUNDE, an instance of smart meeting cinematography concept, aims to: (a) develop functionality-driven benchmarks with respect to the interpretation and control capabilities of human-cinematographers, real-time video editors, surveillance personnel, and typical human performance in everyday situations; (b) Develop general tools for the commonsense cognitive interpretation of dynamic scenes from the viewpoint of visuo-spatial cognition centred perceptual narrativisation. Particular emphasis is placed on declarative representations and interfacing mechanisms that seamlessly integrate within large-scale cognitive (interaction) systems and companion technologies consisting of diverse AI sub-components. For instance, the envisaged tools would provide general capabilities for high-level commonsense reasoning about space, events, actions, change, and interaction.
1306.1083
Puneet Kumar
Pierre-Yves Baudin (INRIA Saclay - Ile de France), Danny Goodman, Puneet Kumar (INRIA Saclay - Ile de France, CVN), Noura Azzabou (MIRCEN, UPMC), Pierre G. Carlier (UPMC), Nikos Paragios (INRIA Saclay - Ile de France, LIGM, ENPC, MAS), M. Pawan Kumar (INRIA Saclay - Ile de France, CVN)
Discriminative Parameter Estimation for Random Walks Segmentation: Technical Report
null
null
null
null
cs.CV cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Random Walks (RW) algorithm is one of the most e - cient and easy-to-use probabilistic segmentation methods. By combining contrast terms with prior terms, it provides accurate segmentations of medical images in a fully automated manner. However, one of the main drawbacks of using the RW algorithm is that its parameters have to be hand-tuned. we propose a novel discriminative learning framework that estimates the parameters using a training dataset. The main challenge we face is that the training samples are not fully supervised. Speci cally, they provide a hard segmentation of the images, instead of a proba-bilistic segmentation. We overcome this challenge by treating the optimal probabilistic segmentation that is compatible with the given hard segmentation as a latent variable. This allows us to employ the latent support vector machine formulation for parameter estimation. We show that our approach signi cantly outperforms the baseline methods on a challenging dataset consisting of real clinical 3D MRI volumes of skeletal muscles.
[ { "version": "v1", "created": "Wed, 5 Jun 2013 12:48:02 GMT" } ]
2013-06-06T00:00:00
[ [ "Baudin", "Pierre-Yves", "", "INRIA Saclay - Ile de France" ], [ "Goodman", "Danny", "", "INRIA Saclay - Ile de France, CVN" ], [ "Kumar", "Puneet", "", "INRIA Saclay - Ile de France, CVN" ], [ "Azzabou", "Noura", "", "MIRCEN,\n UPMC" ], [ "Carlier", "Pierre G.", "", "UPMC" ], [ "Paragios", "Nikos", "", "INRIA Saclay - Ile de\n France, LIGM, ENPC, MAS" ], [ "Kumar", "M. Pawan", "", "INRIA Saclay - Ile de France, CVN" ] ]
TITLE: Discriminative Parameter Estimation for Random Walks Segmentation: Technical Report ABSTRACT: The Random Walks (RW) algorithm is one of the most e - cient and easy-to-use probabilistic segmentation methods. By combining contrast terms with prior terms, it provides accurate segmentations of medical images in a fully automated manner. However, one of the main drawbacks of using the RW algorithm is that its parameters have to be hand-tuned. we propose a novel discriminative learning framework that estimates the parameters using a training dataset. The main challenge we face is that the training samples are not fully supervised. Speci cally, they provide a hard segmentation of the images, instead of a proba-bilistic segmentation. We overcome this challenge by treating the optimal probabilistic segmentation that is compatible with the given hard segmentation as a latent variable. This allows us to employ the latent support vector machine formulation for parameter estimation. We show that our approach signi cantly outperforms the baseline methods on a challenging dataset consisting of real clinical 3D MRI volumes of skeletal muscles.
0812.2291
Aleksandrs Slivkins
Moshe Babaioff, Yogeshwer Sharma, Aleksandrs Slivkins
Characterizing Truthful Multi-Armed Bandit Mechanisms
This is the full version of a conference paper published in ACM EC 2009. This revision is re-focused to emphasize the results that do not rely on the "IIA assumption" (see the paper for the definition)
null
null
null
cs.DS cs.GT cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider a multi-round auction setting motivated by pay-per-click auctions for Internet advertising. In each round the auctioneer selects an advertiser and shows her ad, which is then either clicked or not. An advertiser derives value from clicks; the value of a click is her private information. Initially, neither the auctioneer nor the advertisers have any information about the likelihood of clicks on the advertisements. The auctioneer's goal is to design a (dominant strategies) truthful mechanism that (approximately) maximizes the social welfare. If the advertisers bid their true private values, our problem is equivalent to the "multi-armed bandit problem", and thus can be viewed as a strategic version of the latter. In particular, for both problems the quality of an algorithm can be characterized by "regret", the difference in social welfare between the algorithm and the benchmark which always selects the same "best" advertisement. We investigate how the design of multi-armed bandit algorithms is affected by the restriction that the resulting mechanism must be truthful. We find that truthful mechanisms have certain strong structural properties -- essentially, they must separate exploration from exploitation -- and they incur much higher regret than the optimal multi-armed bandit algorithms. Moreover, we provide a truthful mechanism which (essentially) matches our lower bound on regret.
[ { "version": "v1", "created": "Fri, 12 Dec 2008 04:13:01 GMT" }, { "version": "v2", "created": "Thu, 15 Jan 2009 01:56:08 GMT" }, { "version": "v3", "created": "Fri, 20 Feb 2009 18:10:47 GMT" }, { "version": "v4", "created": "Tue, 23 Jun 2009 02:21:56 GMT" }, { "version": "v5", "created": "Fri, 18 Sep 2009 00:17:44 GMT" }, { "version": "v6", "created": "Tue, 15 May 2012 22:57:53 GMT" }, { "version": "v7", "created": "Mon, 3 Jun 2013 21:03:36 GMT" } ]
2013-06-05T00:00:00
[ [ "Babaioff", "Moshe", "" ], [ "Sharma", "Yogeshwer", "" ], [ "Slivkins", "Aleksandrs", "" ] ]
TITLE: Characterizing Truthful Multi-Armed Bandit Mechanisms ABSTRACT: We consider a multi-round auction setting motivated by pay-per-click auctions for Internet advertising. In each round the auctioneer selects an advertiser and shows her ad, which is then either clicked or not. An advertiser derives value from clicks; the value of a click is her private information. Initially, neither the auctioneer nor the advertisers have any information about the likelihood of clicks on the advertisements. The auctioneer's goal is to design a (dominant strategies) truthful mechanism that (approximately) maximizes the social welfare. If the advertisers bid their true private values, our problem is equivalent to the "multi-armed bandit problem", and thus can be viewed as a strategic version of the latter. In particular, for both problems the quality of an algorithm can be characterized by "regret", the difference in social welfare between the algorithm and the benchmark which always selects the same "best" advertisement. We investigate how the design of multi-armed bandit algorithms is affected by the restriction that the resulting mechanism must be truthful. We find that truthful mechanisms have certain strong structural properties -- essentially, they must separate exploration from exploitation -- and they incur much higher regret than the optimal multi-armed bandit algorithms. Moreover, we provide a truthful mechanism which (essentially) matches our lower bound on regret.
1306.0886
Felix X. Yu
Felix X. Yu, Dong Liu, Sanjiv Kumar, Tony Jebara, Shih-Fu Chang
$\propto$SVM for learning with label proportions
Appears in Proceedings of the 30th International Conference on Machine Learning (ICML 2013)
null
null
null
cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study the problem of learning with label proportions in which the training data is provided in groups and only the proportion of each class in each group is known. We propose a new method called proportion-SVM, or $\propto$SVM, which explicitly models the latent unknown instance labels together with the known group label proportions in a large-margin framework. Unlike the existing works, our approach avoids making restrictive assumptions about the data. The $\propto$SVM model leads to a non-convex integer programming problem. In order to solve it efficiently, we propose two algorithms: one based on simple alternating optimization and the other based on a convex relaxation. Extensive experiments on standard datasets show that $\propto$SVM outperforms the state-of-the-art, especially for larger group sizes.
[ { "version": "v1", "created": "Tue, 4 Jun 2013 19:35:31 GMT" } ]
2013-06-05T00:00:00
[ [ "Yu", "Felix X.", "" ], [ "Liu", "Dong", "" ], [ "Kumar", "Sanjiv", "" ], [ "Jebara", "Tony", "" ], [ "Chang", "Shih-Fu", "" ] ]
TITLE: $\propto$SVM for learning with label proportions ABSTRACT: We study the problem of learning with label proportions in which the training data is provided in groups and only the proportion of each class in each group is known. We propose a new method called proportion-SVM, or $\propto$SVM, which explicitly models the latent unknown instance labels together with the known group label proportions in a large-margin framework. Unlike the existing works, our approach avoids making restrictive assumptions about the data. The $\propto$SVM model leads to a non-convex integer programming problem. In order to solve it efficiently, we propose two algorithms: one based on simple alternating optimization and the other based on a convex relaxation. Extensive experiments on standard datasets show that $\propto$SVM outperforms the state-of-the-art, especially for larger group sizes.
1210.0091
Hong Zhao
Hong Zhao, Fan Min, William Zhu
Test-cost-sensitive attribute reduction of data with normal distribution measurement errors
This paper has been withdrawn by the author due to the error of the title
null
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The measurement error with normal distribution is universal in applications. Generally, smaller measurement error requires better instrument and higher test cost. In decision making based on attribute values of objects, we shall select an attribute subset with appropriate measurement error to minimize the total test cost. Recently, error-range-based covering rough set with uniform distribution error was proposed to investigate this issue. However, the measurement errors satisfy normal distribution instead of uniform distribution which is rather simple for most applications. In this paper, we introduce normal distribution measurement errors to covering-based rough set model, and deal with test-cost-sensitive attribute reduction problem in this new model. The major contributions of this paper are four-fold. First, we build a new data model based on normal distribution measurement errors. With the new data model, the error range is an ellipse in a two-dimension space. Second, the covering-based rough set with normal distribution measurement errors is constructed through the "3-sigma" rule. Third, the test-cost-sensitive attribute reduction problem is redefined on this covering-based rough set. Fourth, a heuristic algorithm is proposed to deal with this problem. The algorithm is tested on ten UCI (University of California - Irvine) datasets. The experimental results show that the algorithm is more effective and efficient than the existing one. This study is a step toward realistic applications of cost-sensitive learning.
[ { "version": "v1", "created": "Sat, 29 Sep 2012 10:22:55 GMT" }, { "version": "v2", "created": "Mon, 3 Jun 2013 03:15:51 GMT" } ]
2013-06-04T00:00:00
[ [ "Zhao", "Hong", "" ], [ "Min", "Fan", "" ], [ "Zhu", "William", "" ] ]
TITLE: Test-cost-sensitive attribute reduction of data with normal distribution measurement errors ABSTRACT: The measurement error with normal distribution is universal in applications. Generally, smaller measurement error requires better instrument and higher test cost. In decision making based on attribute values of objects, we shall select an attribute subset with appropriate measurement error to minimize the total test cost. Recently, error-range-based covering rough set with uniform distribution error was proposed to investigate this issue. However, the measurement errors satisfy normal distribution instead of uniform distribution which is rather simple for most applications. In this paper, we introduce normal distribution measurement errors to covering-based rough set model, and deal with test-cost-sensitive attribute reduction problem in this new model. The major contributions of this paper are four-fold. First, we build a new data model based on normal distribution measurement errors. With the new data model, the error range is an ellipse in a two-dimension space. Second, the covering-based rough set with normal distribution measurement errors is constructed through the "3-sigma" rule. Third, the test-cost-sensitive attribute reduction problem is redefined on this covering-based rough set. Fourth, a heuristic algorithm is proposed to deal with this problem. The algorithm is tested on ten UCI (University of California - Irvine) datasets. The experimental results show that the algorithm is more effective and efficient than the existing one. This study is a step toward realistic applications of cost-sensitive learning.
1303.0309
Krikamol Muandet
Krikamol Muandet and Bernhard Sch\"olkopf
One-Class Support Measure Machines for Group Anomaly Detection
Conference on Uncertainty in Artificial Intelligence (UAI2013)
null
null
null
stat.ML cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose one-class support measure machines (OCSMMs) for group anomaly detection which aims at recognizing anomalous aggregate behaviors of data points. The OCSMMs generalize well-known one-class support vector machines (OCSVMs) to a space of probability measures. By formulating the problem as quantile estimation on distributions, we can establish an interesting connection to the OCSVMs and variable kernel density estimators (VKDEs) over the input space on which the distributions are defined, bridging the gap between large-margin methods and kernel density estimators. In particular, we show that various types of VKDEs can be considered as solutions to a class of regularization problems studied in this paper. Experiments on Sloan Digital Sky Survey dataset and High Energy Particle Physics dataset demonstrate the benefits of the proposed framework in real-world applications.
[ { "version": "v1", "created": "Fri, 1 Mar 2013 21:50:09 GMT" }, { "version": "v2", "created": "Sat, 1 Jun 2013 13:42:46 GMT" } ]
2013-06-04T00:00:00
[ [ "Muandet", "Krikamol", "" ], [ "Schölkopf", "Bernhard", "" ] ]
TITLE: One-Class Support Measure Machines for Group Anomaly Detection ABSTRACT: We propose one-class support measure machines (OCSMMs) for group anomaly detection which aims at recognizing anomalous aggregate behaviors of data points. The OCSMMs generalize well-known one-class support vector machines (OCSVMs) to a space of probability measures. By formulating the problem as quantile estimation on distributions, we can establish an interesting connection to the OCSVMs and variable kernel density estimators (VKDEs) over the input space on which the distributions are defined, bridging the gap between large-margin methods and kernel density estimators. In particular, we show that various types of VKDEs can be considered as solutions to a class of regularization problems studied in this paper. Experiments on Sloan Digital Sky Survey dataset and High Energy Particle Physics dataset demonstrate the benefits of the proposed framework in real-world applications.
1306.0152
Eugenio Culurciello Eugenio Culurciello
Eugenio Culurciello, Jonghoon Jin, Aysegul Dundar, Jordan Bates
An Analysis of the Connections Between Layers of Deep Neural Networks
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present an analysis of different techniques for selecting the connection be- tween layers of deep neural networks. Traditional deep neural networks use ran- dom connection tables between layers to keep the number of connections small and tune to different image features. This kind of connection performs adequately in supervised deep networks because their values are refined during the training. On the other hand, in unsupervised learning, one cannot rely on back-propagation techniques to learn the connections between layers. In this work, we tested four different techniques for connecting the first layer of the network to the second layer on the CIFAR and SVHN datasets and showed that the accuracy can be im- proved up to 3% depending on the technique used. We also showed that learning the connections based on the co-occurrences of the features does not confer an advantage over a random connection table in small networks. This work is helpful to improve the efficiency of connections between the layers of unsupervised deep neural networks.
[ { "version": "v1", "created": "Sat, 1 Jun 2013 21:37:25 GMT" } ]
2013-06-04T00:00:00
[ [ "Culurciello", "Eugenio", "" ], [ "Jin", "Jonghoon", "" ], [ "Dundar", "Aysegul", "" ], [ "Bates", "Jordan", "" ] ]
TITLE: An Analysis of the Connections Between Layers of Deep Neural Networks ABSTRACT: We present an analysis of different techniques for selecting the connection be- tween layers of deep neural networks. Traditional deep neural networks use ran- dom connection tables between layers to keep the number of connections small and tune to different image features. This kind of connection performs adequately in supervised deep networks because their values are refined during the training. On the other hand, in unsupervised learning, one cannot rely on back-propagation techniques to learn the connections between layers. In this work, we tested four different techniques for connecting the first layer of the network to the second layer on the CIFAR and SVHN datasets and showed that the accuracy can be im- proved up to 3% depending on the technique used. We also showed that learning the connections based on the co-occurrences of the features does not confer an advantage over a random connection table in small networks. This work is helpful to improve the efficiency of connections between the layers of unsupervised deep neural networks.
1306.0326
Tomasz Kajdanowicz
Tomasz Kajdanowicz, Przemyslaw Kazienko, Wojciech Indyk
Parallel Processing of Large Graphs
Preprint submitted to Future Generation Computer Systems
null
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
More and more large data collections are gathered worldwide in various IT systems. Many of them possess the networked nature and need to be processed and analysed as graph structures. Due to their size they require very often usage of parallel paradigm for efficient computation. Three parallel techniques have been compared in the paper: MapReduce, its map-side join extension and Bulk Synchronous Parallel (BSP). They are implemented for two different graph problems: calculation of single source shortest paths (SSSP) and collective classification of graph nodes by means of relational influence propagation (RIP). The methods and algorithms are applied to several network datasets differing in size and structural profile, originating from three domains: telecommunication, multimedia and microblog. The results revealed that iterative graph processing with the BSP implementation always and significantly, even up to 10 times outperforms MapReduce, especially for algorithms with many iterations and sparse communication. Also MapReduce extension based on map-side join usually noticeably presents better efficiency, although not as much as BSP. Nevertheless, MapReduce still remains the good alternative for enormous networks, whose data structures do not fit in local memories.
[ { "version": "v1", "created": "Mon, 3 Jun 2013 08:44:32 GMT" } ]
2013-06-04T00:00:00
[ [ "Kajdanowicz", "Tomasz", "" ], [ "Kazienko", "Przemyslaw", "" ], [ "Indyk", "Wojciech", "" ] ]
TITLE: Parallel Processing of Large Graphs ABSTRACT: More and more large data collections are gathered worldwide in various IT systems. Many of them possess the networked nature and need to be processed and analysed as graph structures. Due to their size they require very often usage of parallel paradigm for efficient computation. Three parallel techniques have been compared in the paper: MapReduce, its map-side join extension and Bulk Synchronous Parallel (BSP). They are implemented for two different graph problems: calculation of single source shortest paths (SSSP) and collective classification of graph nodes by means of relational influence propagation (RIP). The methods and algorithms are applied to several network datasets differing in size and structural profile, originating from three domains: telecommunication, multimedia and microblog. The results revealed that iterative graph processing with the BSP implementation always and significantly, even up to 10 times outperforms MapReduce, especially for algorithms with many iterations and sparse communication. Also MapReduce extension based on map-side join usually noticeably presents better efficiency, although not as much as BSP. Nevertheless, MapReduce still remains the good alternative for enormous networks, whose data structures do not fit in local memories.
1306.0424
Lionel Tabourier
Abdelhamid Salah Brahim, Lionel Tabourier, B\'en\'edicte Le Grand
A data-driven analysis to question epidemic models for citation cascades on the blogosphere
18 pages, 9 figures, to be published in ICWSM-13 proceedings
null
null
null
cs.SI physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Citation cascades in blog networks are often considered as traces of information spreading on this social medium. In this work, we question this point of view using both a structural and semantic analysis of five months activity of the most representative blogs of the french-speaking community.Statistical measures reveal that our dataset shares many features with those that can be found in the literature, suggesting the existence of an identical underlying process. However, a closer analysis of the post content indicates that the popular epidemic-like descriptions of cascades are misleading in this context.A basic model, taking only into account the behavior of bloggers and their restricted social network, accounts for several important statistical features of the data.These arguments support the idea that citations primary goal may not be information spreading on the blogosphere.
[ { "version": "v1", "created": "Mon, 3 Jun 2013 14:17:54 GMT" } ]
2013-06-04T00:00:00
[ [ "Brahim", "Abdelhamid Salah", "" ], [ "Tabourier", "Lionel", "" ], [ "Grand", "Bénédicte Le", "" ] ]
TITLE: A data-driven analysis to question epidemic models for citation cascades on the blogosphere ABSTRACT: Citation cascades in blog networks are often considered as traces of information spreading on this social medium. In this work, we question this point of view using both a structural and semantic analysis of five months activity of the most representative blogs of the french-speaking community.Statistical measures reveal that our dataset shares many features with those that can be found in the literature, suggesting the existence of an identical underlying process. However, a closer analysis of the post content indicates that the popular epidemic-like descriptions of cascades are misleading in this context.A basic model, taking only into account the behavior of bloggers and their restricted social network, accounts for several important statistical features of the data.These arguments support the idea that citations primary goal may not be information spreading on the blogosphere.
1305.7438
Tian Qiu
Tian Qiu, Tian-Tian Wang, Zi-Ke Zhang, Li-Xin Zhong, Guang Chen
Heterogeneity Involved Network-based Algorithm Leads to Accurate and Personalized Recommendations
null
null
null
null
physics.soc-ph cs.IR cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Heterogeneity of both the source and target objects is taken into account in a network-based algorithm for the directional resource transformation between objects. Based on a biased heat conduction recommendation method (BHC) which considers the heterogeneity of the target object, we propose a heterogeneous heat conduction algorithm (HHC), by further taking the source object degree as the weight of diffusion. Tested on three real datasets, the Netflix, RYM and MovieLens, the HHC algorithm is found to present a better recommendation in both the accuracy and personalization than two excellent algorithms, i.e., the original BHC and a hybrid algorithm of heat conduction and mass diffusion (HHM), while not requiring any other accessorial information or parameter. Moreover, the HHC even elevates the recommendation accuracy on cold objects, referring to the so-called cold start problem, for effectively relieving the recommendation bias on objects with different level of popularity.
[ { "version": "v1", "created": "Fri, 31 May 2013 15:01:25 GMT" } ]
2013-06-03T00:00:00
[ [ "Qiu", "Tian", "" ], [ "Wang", "Tian-Tian", "" ], [ "Zhang", "Zi-Ke", "" ], [ "Zhong", "Li-Xin", "" ], [ "Chen", "Guang", "" ] ]
TITLE: Heterogeneity Involved Network-based Algorithm Leads to Accurate and Personalized Recommendations ABSTRACT: Heterogeneity of both the source and target objects is taken into account in a network-based algorithm for the directional resource transformation between objects. Based on a biased heat conduction recommendation method (BHC) which considers the heterogeneity of the target object, we propose a heterogeneous heat conduction algorithm (HHC), by further taking the source object degree as the weight of diffusion. Tested on three real datasets, the Netflix, RYM and MovieLens, the HHC algorithm is found to present a better recommendation in both the accuracy and personalization than two excellent algorithms, i.e., the original BHC and a hybrid algorithm of heat conduction and mass diffusion (HHM), while not requiring any other accessorial information or parameter. Moreover, the HHC even elevates the recommendation accuracy on cold objects, referring to the so-called cold start problem, for effectively relieving the recommendation bias on objects with different level of popularity.
1305.7454
Uwe Aickelin
Jan Feyereisl, Uwe Aickelin
Privileged Information for Data Clustering
Information Sciences 194, 4-23, 2012
null
null
null
cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Many machine learning algorithms assume that all input samples are independently and identically distributed from some common distribution on either the input space X, in the case of unsupervised learning, or the input and output space X x Y in the case of supervised and semi-supervised learning. In the last number of years the relaxation of this assumption has been explored and the importance of incorporation of additional information within machine learning algorithms became more apparent. Traditionally such fusion of information was the domain of semi-supervised learning. More recently the inclusion of knowledge from separate hypothetical spaces has been proposed by Vapnik as part of the supervised setting. In this work we are interested in exploring Vapnik's idea of master-class learning and the associated learning using privileged information, however within the unsupervised setting. Adoption of the advanced supervised learning paradigm for the unsupervised setting instigates investigation into the difference between privileged and technical data. By means of our proposed aRi-MAX method stability of the KMeans algorithm is improved and identification of the best clustering solution is achieved on an artificial dataset. Subsequently an information theoretic dot product based algorithm called P-Dot is proposed. This method has the ability to utilize a wide variety of clustering techniques, individually or in combination, while fusing privileged and technical data for improved clustering. Application of the P-Dot method to the task of digit recognition confirms our findings in a real-world scenario.
[ { "version": "v1", "created": "Fri, 31 May 2013 15:28:44 GMT" } ]
2013-06-03T00:00:00
[ [ "Feyereisl", "Jan", "" ], [ "Aickelin", "Uwe", "" ] ]
TITLE: Privileged Information for Data Clustering ABSTRACT: Many machine learning algorithms assume that all input samples are independently and identically distributed from some common distribution on either the input space X, in the case of unsupervised learning, or the input and output space X x Y in the case of supervised and semi-supervised learning. In the last number of years the relaxation of this assumption has been explored and the importance of incorporation of additional information within machine learning algorithms became more apparent. Traditionally such fusion of information was the domain of semi-supervised learning. More recently the inclusion of knowledge from separate hypothetical spaces has been proposed by Vapnik as part of the supervised setting. In this work we are interested in exploring Vapnik's idea of master-class learning and the associated learning using privileged information, however within the unsupervised setting. Adoption of the advanced supervised learning paradigm for the unsupervised setting instigates investigation into the difference between privileged and technical data. By means of our proposed aRi-MAX method stability of the KMeans algorithm is improved and identification of the best clustering solution is achieved on an artificial dataset. Subsequently an information theoretic dot product based algorithm called P-Dot is proposed. This method has the ability to utilize a wide variety of clustering techniques, individually or in combination, while fusing privileged and technical data for improved clustering. Application of the P-Dot method to the task of digit recognition confirms our findings in a real-world scenario.
1305.7465
Uwe Aickelin
Yihui Liu, Uwe Aickelin, Jan Feyereisl, Lindy G. Durrant
Wavelet feature extraction and genetic algorithm for biomarker detection in colorectal cancer data
null
Knowledge-Based Systems 37, 502-514, 2013
null
null
cs.NE cs.CE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Biomarkers which predict patient's survival can play an important role in medical diagnosis and treatment. How to select the significant biomarkers from hundreds of protein markers is a key step in survival analysis. In this paper a novel method is proposed to detect the prognostic biomarkers of survival in colorectal cancer patients using wavelet analysis, genetic algorithm, and Bayes classifier. One dimensional discrete wavelet transform (DWT) is normally used to reduce the dimensionality of biomedical data. In this study one dimensional continuous wavelet transform (CWT) was proposed to extract the features of colorectal cancer data. One dimensional CWT has no ability to reduce dimensionality of data, but captures the missing features of DWT, and is complementary part of DWT. Genetic algorithm was performed on extracted wavelet coefficients to select the optimized features, using Bayes classifier to build its fitness function. The corresponding protein markers were located based on the position of optimized features. Kaplan-Meier curve and Cox regression model were used to evaluate the performance of selected biomarkers. Experiments were conducted on colorectal cancer dataset and several significant biomarkers were detected. A new protein biomarker CD46 was found to significantly associate with survival time.
[ { "version": "v1", "created": "Fri, 31 May 2013 15:53:08 GMT" } ]
2013-06-03T00:00:00
[ [ "Liu", "Yihui", "" ], [ "Aickelin", "Uwe", "" ], [ "Feyereisl", "Jan", "" ], [ "Durrant", "Lindy G.", "" ] ]
TITLE: Wavelet feature extraction and genetic algorithm for biomarker detection in colorectal cancer data ABSTRACT: Biomarkers which predict patient's survival can play an important role in medical diagnosis and treatment. How to select the significant biomarkers from hundreds of protein markers is a key step in survival analysis. In this paper a novel method is proposed to detect the prognostic biomarkers of survival in colorectal cancer patients using wavelet analysis, genetic algorithm, and Bayes classifier. One dimensional discrete wavelet transform (DWT) is normally used to reduce the dimensionality of biomedical data. In this study one dimensional continuous wavelet transform (CWT) was proposed to extract the features of colorectal cancer data. One dimensional CWT has no ability to reduce dimensionality of data, but captures the missing features of DWT, and is complementary part of DWT. Genetic algorithm was performed on extracted wavelet coefficients to select the optimized features, using Bayes classifier to build its fitness function. The corresponding protein markers were located based on the position of optimized features. Kaplan-Meier curve and Cox regression model were used to evaluate the performance of selected biomarkers. Experiments were conducted on colorectal cancer dataset and several significant biomarkers were detected. A new protein biomarker CD46 was found to significantly associate with survival time.
1301.3226
Rami Al-Rfou'
Yanqing Chen, Bryan Perozzi, Rami Al-Rfou, Steven Skiena
The Expressive Power of Word Embeddings
submitted to ICML 2013, Deep Learning for Audio, Speech and Language Processing Workshop. 8 pages, 8 figures
null
null
null
cs.LG cs.CL stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We seek to better understand the difference in quality of the several publicly released embeddings. We propose several tasks that help to distinguish the characteristics of different embeddings. Our evaluation of sentiment polarity and synonym/antonym relations shows that embeddings are able to capture surprisingly nuanced semantics even in the absence of sentence structure. Moreover, benchmarking the embeddings shows great variance in quality and characteristics of the semantics captured by the tested embeddings. Finally, we show the impact of varying the number of dimensions and the resolution of each dimension on the effective useful features captured by the embedding space. Our contributions highlight the importance of embeddings for NLP tasks and the effect of their quality on the final results.
[ { "version": "v1", "created": "Tue, 15 Jan 2013 04:52:10 GMT" }, { "version": "v2", "created": "Sat, 2 Mar 2013 21:44:29 GMT" }, { "version": "v3", "created": "Wed, 13 Mar 2013 17:08:14 GMT" }, { "version": "v4", "created": "Wed, 29 May 2013 21:06:09 GMT" } ]
2013-05-31T00:00:00
[ [ "Chen", "Yanqing", "" ], [ "Perozzi", "Bryan", "" ], [ "Al-Rfou", "Rami", "" ], [ "Skiena", "Steven", "" ] ]
TITLE: The Expressive Power of Word Embeddings ABSTRACT: We seek to better understand the difference in quality of the several publicly released embeddings. We propose several tasks that help to distinguish the characteristics of different embeddings. Our evaluation of sentiment polarity and synonym/antonym relations shows that embeddings are able to capture surprisingly nuanced semantics even in the absence of sentence structure. Moreover, benchmarking the embeddings shows great variance in quality and characteristics of the semantics captured by the tested embeddings. Finally, we show the impact of varying the number of dimensions and the resolution of each dimension on the effective useful features captured by the embedding space. Our contributions highlight the importance of embeddings for NLP tasks and the effect of their quality on the final results.
1305.7145
Uwe Aickelin
Peer-Olaf Siebers, Uwe Aickelin, David Menachof, Galina Sherman, Peter Zimmerman
Modelling and Analysing Cargo Screening Processes: A Project Outline
Proceedings of the INFORMS Simulation Society Research Workshop, June 25-27, 2009, Warwick, UK, 44-47, 2009
null
null
null
cs.AI cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The efficiency of current cargo screening processes at sea and air ports is unknown as no benchmarks exists against which they could be measured. Some manufacturer benchmarks exist for individual sensors but we have not found any benchmarks that take a holistic view of the screening procedures assessing a combination of sensors and also taking operator variability into account. Just adding up resources and manpower used is not an effective way for assessing systems where human decision-making and operator compliance to rules play a vital role. For such systems more advanced assessment methods need to be used, taking into account that the cargo screening process is of a dynamic and stochastic nature. Our project aim is to develop a decision support tool (cargo-screening system simulator) that will map the right technology and manpower to the right commodity-threat combination in order to maximize detection rates. In this paper we present a project outline and highlight the research challenges we have identified so far. In addition we introduce our first case study, where we investigate the cargo screening process at the ferry port in Calais.
[ { "version": "v1", "created": "Thu, 30 May 2013 15:46:43 GMT" } ]
2013-05-31T00:00:00
[ [ "Siebers", "Peer-Olaf", "" ], [ "Aickelin", "Uwe", "" ], [ "Menachof", "David", "" ], [ "Sherman", "Galina", "" ], [ "Zimmerman", "Peter", "" ] ]
TITLE: Modelling and Analysing Cargo Screening Processes: A Project Outline ABSTRACT: The efficiency of current cargo screening processes at sea and air ports is unknown as no benchmarks exists against which they could be measured. Some manufacturer benchmarks exist for individual sensors but we have not found any benchmarks that take a holistic view of the screening procedures assessing a combination of sensors and also taking operator variability into account. Just adding up resources and manpower used is not an effective way for assessing systems where human decision-making and operator compliance to rules play a vital role. For such systems more advanced assessment methods need to be used, taking into account that the cargo screening process is of a dynamic and stochastic nature. Our project aim is to develop a decision support tool (cargo-screening system simulator) that will map the right technology and manpower to the right commodity-threat combination in order to maximize detection rates. In this paper we present a project outline and highlight the research challenges we have identified so far. In addition we introduce our first case study, where we investigate the cargo screening process at the ferry port in Calais.
1206.4229
Torsten Ensslin
Torsten A. En{\ss}lin
Information field dynamics for simulation scheme construction
19 pages, 3 color figures, accepted by Phys. Rev. E
null
10.1103/PhysRevE.87.013308
null
physics.comp-ph astro-ph.IM cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Information field dynamics (IFD) is introduced here as a framework to derive numerical schemes for the simulation of physical and other fields without assuming a particular sub-grid structure as many schemes do. IFD constructs an ensemble of non-parametric sub-grid field configurations from the combination of the data in computer memory, representing constraints on possible field configurations, and prior assumptions on the sub-grid field statistics. Each of these field configurations can formally be evolved to a later moment since any differential operator of the dynamics can act on fields living in continuous space. However, these virtually evolved fields need again a representation by data in computer memory. The maximum entropy principle of information theory guides the construction of updated datasets via entropic matching, optimally representing these field configurations at the later time. The field dynamics thereby become represented by a finite set of evolution equations for the data that can be solved numerically. The sub-grid dynamics is treated within an auxiliary analytic consideration and the resulting scheme acts solely on the data space. It should provide a more accurate description of the physical field dynamics than simulation schemes constructed ad-hoc, due to the more rigorous accounting of sub-grid physics and the space discretization process. Assimilation of measurement data into an IFD simulation is conceptually straightforward since measurement and simulation data can just be merged. The IFD approach is illustrated using the example of a coarsely discretized representation of a thermally excited classical Klein-Gordon field. This should pave the way towards the construction of schemes for more complex systems like turbulent hydrodynamics.
[ { "version": "v1", "created": "Tue, 19 Jun 2012 15:01:52 GMT" }, { "version": "v2", "created": "Fri, 5 Oct 2012 10:21:19 GMT" }, { "version": "v3", "created": "Sun, 16 Dec 2012 13:24:30 GMT" }, { "version": "v4", "created": "Fri, 28 Dec 2012 12:29:19 GMT" } ]
2013-05-30T00:00:00
[ [ "Enßlin", "Torsten A.", "" ] ]
TITLE: Information field dynamics for simulation scheme construction ABSTRACT: Information field dynamics (IFD) is introduced here as a framework to derive numerical schemes for the simulation of physical and other fields without assuming a particular sub-grid structure as many schemes do. IFD constructs an ensemble of non-parametric sub-grid field configurations from the combination of the data in computer memory, representing constraints on possible field configurations, and prior assumptions on the sub-grid field statistics. Each of these field configurations can formally be evolved to a later moment since any differential operator of the dynamics can act on fields living in continuous space. However, these virtually evolved fields need again a representation by data in computer memory. The maximum entropy principle of information theory guides the construction of updated datasets via entropic matching, optimally representing these field configurations at the later time. The field dynamics thereby become represented by a finite set of evolution equations for the data that can be solved numerically. The sub-grid dynamics is treated within an auxiliary analytic consideration and the resulting scheme acts solely on the data space. It should provide a more accurate description of the physical field dynamics than simulation schemes constructed ad-hoc, due to the more rigorous accounting of sub-grid physics and the space discretization process. Assimilation of measurement data into an IFD simulation is conceptually straightforward since measurement and simulation data can just be merged. The IFD approach is illustrated using the example of a coarsely discretized representation of a thermally excited classical Klein-Gordon field. This should pave the way towards the construction of schemes for more complex systems like turbulent hydrodynamics.
1304.5862
Forrest Briggs
Forrest Briggs, Xiaoli Z. Fern, Jed Irvine
Multi-Label Classifier Chains for Bird Sound
6 pages, 1 figure, submission to ICML 2013 workshop on bioacoustics. Note: this is a minor revision- the blind submission format has been replaced with one that shows author names, and a few corrections have been made
null
null
null
cs.LG cs.SD stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Bird sound data collected with unattended microphones for automatic surveys, or mobile devices for citizen science, typically contain multiple simultaneously vocalizing birds of different species. However, few works have considered the multi-label structure in birdsong. We propose to use an ensemble of classifier chains combined with a histogram-of-segments representation for multi-label classification of birdsong. The proposed method is compared with binary relevance and three multi-instance multi-label learning (MIML) algorithms from prior work (which focus more on structure in the sound, and less on structure in the label sets). Experiments are conducted on two real-world birdsong datasets, and show that the proposed method usually outperforms binary relevance (using the same features and base-classifier), and is better in some cases and worse in others compared to the MIML algorithms.
[ { "version": "v1", "created": "Mon, 22 Apr 2013 07:44:05 GMT" }, { "version": "v2", "created": "Wed, 29 May 2013 17:36:07 GMT" } ]
2013-05-30T00:00:00
[ [ "Briggs", "Forrest", "" ], [ "Fern", "Xiaoli Z.", "" ], [ "Irvine", "Jed", "" ] ]
TITLE: Multi-Label Classifier Chains for Bird Sound ABSTRACT: Bird sound data collected with unattended microphones for automatic surveys, or mobile devices for citizen science, typically contain multiple simultaneously vocalizing birds of different species. However, few works have considered the multi-label structure in birdsong. We propose to use an ensemble of classifier chains combined with a histogram-of-segments representation for multi-label classification of birdsong. The proposed method is compared with binary relevance and three multi-instance multi-label learning (MIML) algorithms from prior work (which focus more on structure in the sound, and less on structure in the label sets). Experiments are conducted on two real-world birdsong datasets, and show that the proposed method usually outperforms binary relevance (using the same features and base-classifier), and is better in some cases and worse in others compared to the MIML algorithms.
0910.1800
Cyril Furtlehner
Cyril Furtlehner, Michele Sebag and Xiangliang Zhang
Scaling Analysis of Affinity Propagation
28 pages, 14 figures, Inria research report
Phys. Rev. E 81,066102 (2010)
10.1103/PhysRevE.81.066102
7046
cs.AI cond-mat.stat-mech
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We analyze and exploit some scaling properties of the Affinity Propagation (AP) clustering algorithm proposed by Frey and Dueck (2007). First we observe that a divide and conquer strategy, used on a large data set hierarchically reduces the complexity ${\cal O}(N^2)$ to ${\cal O}(N^{(h+2)/(h+1)})$, for a data-set of size $N$ and a depth $h$ of the hierarchical strategy. For a data-set embedded in a $d$-dimensional space, we show that this is obtained without notably damaging the precision except in dimension $d=2$. In fact, for $d$ larger than 2 the relative loss in precision scales like $N^{(2-d)/(h+1)d}$. Finally, under some conditions we observe that there is a value $s^*$ of the penalty coefficient, a free parameter used to fix the number of clusters, which separates a fragmentation phase (for $s<s^*$) from a coalescent one (for $s>s^*$) of the underlying hidden cluster structure. At this precise point holds a self-similarity property which can be exploited by the hierarchical strategy to actually locate its position. From this observation, a strategy based on \AP can be defined to find out how many clusters are present in a given dataset.
[ { "version": "v1", "created": "Fri, 9 Oct 2009 17:43:35 GMT" } ]
2013-05-29T00:00:00
[ [ "Furtlehner", "Cyril", "" ], [ "Sebag", "Michele", "" ], [ "Zhang", "Xiangliang", "" ] ]
TITLE: Scaling Analysis of Affinity Propagation ABSTRACT: We analyze and exploit some scaling properties of the Affinity Propagation (AP) clustering algorithm proposed by Frey and Dueck (2007). First we observe that a divide and conquer strategy, used on a large data set hierarchically reduces the complexity ${\cal O}(N^2)$ to ${\cal O}(N^{(h+2)/(h+1)})$, for a data-set of size $N$ and a depth $h$ of the hierarchical strategy. For a data-set embedded in a $d$-dimensional space, we show that this is obtained without notably damaging the precision except in dimension $d=2$. In fact, for $d$ larger than 2 the relative loss in precision scales like $N^{(2-d)/(h+1)d}$. Finally, under some conditions we observe that there is a value $s^*$ of the penalty coefficient, a free parameter used to fix the number of clusters, which separates a fragmentation phase (for $s<s^*$) from a coalescent one (for $s>s^*$) of the underlying hidden cluster structure. At this precise point holds a self-similarity property which can be exploited by the hierarchical strategy to actually locate its position. From this observation, a strategy based on \AP can be defined to find out how many clusters are present in a given dataset.
1305.6474
Jesper Larsson Tr\"aff
Martin Wimmer, Daniel Cederman, Jesper Larsson Tr\"aff, and Philippas Tsigas
Configurable Strategies for Work-stealing
null
null
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Work-stealing systems are typically oblivious to the nature of the tasks they are scheduling. For instance, they do not know or take into account how long a task will take to execute or how many subtasks it will spawn. Moreover, the actual task execution order is typically determined by the underlying task storage data structure, and cannot be changed. There are thus possibilities for optimizing task parallel executions by providing information on specific tasks and their preferred execution order to the scheduling system. We introduce scheduling strategies to enable applications to dynamically provide hints to the task-scheduling system on the nature of specific tasks. Scheduling strategies can be used to independently control both local task execution order as well as steal order. In contrast to conventional scheduling policies that are normally global in scope, strategies allow the scheduler to apply optimizations on individual tasks. This flexibility greatly improves composability as it allows the scheduler to apply different, specific scheduling choices for different parts of applications simultaneously. We present a number of benchmarks that highlight diverse, beneficial effects that can be achieved with scheduling strategies. Some benchmarks (branch-and-bound, single-source shortest path) show that prioritization of tasks can reduce the total amount of work compared to standard work-stealing execution order. For other benchmarks (triangle strip generation) qualitatively better results can be achieved in shorter time. Other optimizations, such as dynamic merging of tasks or stealing of half the work, instead of half the tasks, are also shown to improve performance. Composability is demonstrated by examples that combine different strategies, both within the same kernel (prefix sum) as well as when scheduling multiple kernels (prefix sum and unbalanced tree search).
[ { "version": "v1", "created": "Tue, 28 May 2013 12:59:25 GMT" } ]
2013-05-29T00:00:00
[ [ "Wimmer", "Martin", "" ], [ "Cederman", "Daniel", "" ], [ "Träff", "Jesper Larsson", "" ], [ "Tsigas", "Philippas", "" ] ]
TITLE: Configurable Strategies for Work-stealing ABSTRACT: Work-stealing systems are typically oblivious to the nature of the tasks they are scheduling. For instance, they do not know or take into account how long a task will take to execute or how many subtasks it will spawn. Moreover, the actual task execution order is typically determined by the underlying task storage data structure, and cannot be changed. There are thus possibilities for optimizing task parallel executions by providing information on specific tasks and their preferred execution order to the scheduling system. We introduce scheduling strategies to enable applications to dynamically provide hints to the task-scheduling system on the nature of specific tasks. Scheduling strategies can be used to independently control both local task execution order as well as steal order. In contrast to conventional scheduling policies that are normally global in scope, strategies allow the scheduler to apply optimizations on individual tasks. This flexibility greatly improves composability as it allows the scheduler to apply different, specific scheduling choices for different parts of applications simultaneously. We present a number of benchmarks that highlight diverse, beneficial effects that can be achieved with scheduling strategies. Some benchmarks (branch-and-bound, single-source shortest path) show that prioritization of tasks can reduce the total amount of work compared to standard work-stealing execution order. For other benchmarks (triangle strip generation) qualitatively better results can be achieved in shorter time. Other optimizations, such as dynamic merging of tasks or stealing of half the work, instead of half the tasks, are also shown to improve performance. Composability is demonstrated by examples that combine different strategies, both within the same kernel (prefix sum) as well as when scheduling multiple kernels (prefix sum and unbalanced tree search).
1305.6046
Sidahmed Mokeddem
Sidahmed Mokeddem, Baghdad Atmani and Mostefa Mokaddem
Supervised Feature Selection for Diagnosis of Coronary Artery Disease Based on Genetic Algorithm
First International Conference on Computational Science and Engineering (CSE-2013), May 18 ~ 19, 2013, Dubai, UAE. Volume Editors: Sundarapandian Vaidyanathan, Dhinaharan Nagamalai
null
10.5121/csit.2013.3305
null
cs.LG cs.CE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Feature Selection (FS) has become the focus of much research on decision support systems areas for which data sets with tremendous number of variables are analyzed. In this paper we present a new method for the diagnosis of Coronary Artery Diseases (CAD) founded on Genetic Algorithm (GA) wrapped Bayes Naive (BN) based FS. Basically, CAD dataset contains two classes defined with 13 features. In GA BN algorithm, GA generates in each iteration a subset of attributes that will be evaluated using the BN in the second step of the selection procedure. The final set of attribute contains the most relevant feature model that increases the accuracy. The algorithm in this case produces 85.50% classification accuracy in the diagnosis of CAD. Thus, the asset of the Algorithm is then compared with the use of Support Vector Machine (SVM), MultiLayer Perceptron (MLP) and C4.5 decision tree Algorithm. The result of classification accuracy for those algorithms are respectively 83.5%, 83.16% and 80.85%. Consequently, the GA wrapped BN Algorithm is correspondingly compared with other FS algorithms. The Obtained results have shown very promising outcomes for the diagnosis of CAD.
[ { "version": "v1", "created": "Sun, 26 May 2013 18:16:52 GMT" } ]
2013-05-28T00:00:00
[ [ "Mokeddem", "Sidahmed", "" ], [ "Atmani", "Baghdad", "" ], [ "Mokaddem", "Mostefa", "" ] ]
TITLE: Supervised Feature Selection for Diagnosis of Coronary Artery Disease Based on Genetic Algorithm ABSTRACT: Feature Selection (FS) has become the focus of much research on decision support systems areas for which data sets with tremendous number of variables are analyzed. In this paper we present a new method for the diagnosis of Coronary Artery Diseases (CAD) founded on Genetic Algorithm (GA) wrapped Bayes Naive (BN) based FS. Basically, CAD dataset contains two classes defined with 13 features. In GA BN algorithm, GA generates in each iteration a subset of attributes that will be evaluated using the BN in the second step of the selection procedure. The final set of attribute contains the most relevant feature model that increases the accuracy. The algorithm in this case produces 85.50% classification accuracy in the diagnosis of CAD. Thus, the asset of the Algorithm is then compared with the use of Support Vector Machine (SVM), MultiLayer Perceptron (MLP) and C4.5 decision tree Algorithm. The result of classification accuracy for those algorithms are respectively 83.5%, 83.16% and 80.85%. Consequently, the GA wrapped BN Algorithm is correspondingly compared with other FS algorithms. The Obtained results have shown very promising outcomes for the diagnosis of CAD.
1305.5610
Tao Ye
Fred Glover and Tao Ye and Abraham P. Punnen and Gary Kochenberger
Integrating tabu search and VLSN search to develop enhanced algorithms: A case study using bipartite boolean quadratic programs
null
null
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The bipartite boolean quadratic programming problem (BBQP) is a generalization of the well studied boolean quadratic programming problem. The model has a variety of real life applications; however, empirical studies of the model are not available in the literature, except in a few isolated instances. In this paper, we develop efficient heuristic algorithms based on tabu search, very large scale neighborhood (VLSN) search, and a hybrid algorithm that integrates the two. The computational study establishes that effective integration of simple tabu search with VLSN search results in superior outcomes, and suggests the value of such an integration in other settings. Complexity analysis and implementation details are provided along with conclusions drawn from experimental analysis. In addition, we obtain solutions better than the best previously known for almost all medium and large size benchmark instances.
[ { "version": "v1", "created": "Fri, 24 May 2013 03:36:00 GMT" } ]
2013-05-27T00:00:00
[ [ "Glover", "Fred", "" ], [ "Ye", "Tao", "" ], [ "Punnen", "Abraham P.", "" ], [ "Kochenberger", "Gary", "" ] ]
TITLE: Integrating tabu search and VLSN search to develop enhanced algorithms: A case study using bipartite boolean quadratic programs ABSTRACT: The bipartite boolean quadratic programming problem (BBQP) is a generalization of the well studied boolean quadratic programming problem. The model has a variety of real life applications; however, empirical studies of the model are not available in the literature, except in a few isolated instances. In this paper, we develop efficient heuristic algorithms based on tabu search, very large scale neighborhood (VLSN) search, and a hybrid algorithm that integrates the two. The computational study establishes that effective integration of simple tabu search with VLSN search results in superior outcomes, and suggests the value of such an integration in other settings. Complexity analysis and implementation details are provided along with conclusions drawn from experimental analysis. In addition, we obtain solutions better than the best previously known for almost all medium and large size benchmark instances.
1305.5653
George Garbis
George Garbis, Kostis Kyzirakos, and Manolis Koubarakis
Geographica: A Benchmark for Geospatial RDF Stores
null
null
null
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Geospatial extensions of SPARQL like GeoSPARQL and stSPARQL have recently been defined and corresponding geospatial RDF stores have been implemented. However, there is no widely used benchmark for evaluating geospatial RDF stores which takes into account recent advances to the state of the art in this area. In this paper, we develop a benchmark, called Geographica, which uses both real-world and synthetic data to test the offered functionality and the performance of some prominent geospatial RDF stores.
[ { "version": "v1", "created": "Fri, 24 May 2013 08:54:46 GMT" } ]
2013-05-27T00:00:00
[ [ "Garbis", "George", "" ], [ "Kyzirakos", "Kostis", "" ], [ "Koubarakis", "Manolis", "" ] ]
TITLE: Geographica: A Benchmark for Geospatial RDF Stores ABSTRACT: Geospatial extensions of SPARQL like GeoSPARQL and stSPARQL have recently been defined and corresponding geospatial RDF stores have been implemented. However, there is no widely used benchmark for evaluating geospatial RDF stores which takes into account recent advances to the state of the art in this area. In this paper, we develop a benchmark, called Geographica, which uses both real-world and synthetic data to test the offered functionality and the performance of some prominent geospatial RDF stores.
1305.5824
Slim Bouker
Slim Bouker, Rabie Saidi, Sadok Ben Yahia, Engelbert Mephu Nguifo
Towards a semantic and statistical selection of association rules
null
null
null
null
cs.DB
http://creativecommons.org/licenses/by/3.0/
The increasing growth of databases raises an urgent need for more accurate methods to better understand the stored data. In this scope, association rules were extensively used for the analysis and the comprehension of huge amounts of data. However, the number of generated rules is too large to be efficiently analyzed and explored in any further process. Association rules selection is a classical topic to address this issue, yet, new innovated approaches are required in order to provide help to decision makers. Hence, many interesting- ness measures have been defined to statistically evaluate and filter the association rules. However, these measures present two major problems. On the one hand, they do not allow eliminating irrelevant rules, on the other hand, their abun- dance leads to the heterogeneity of the evaluation results which leads to confusion in decision making. In this paper, we propose a two-winged approach to select statistically in- teresting and semantically incomparable rules. Our statis- tical selection helps discovering interesting association rules without favoring or excluding any measure. The semantic comparability helps to decide if the considered association rules are semantically related i.e comparable. The outcomes of our experiments on real datasets show promising results in terms of reduction in the number of rules.
[ { "version": "v1", "created": "Fri, 24 May 2013 18:46:34 GMT" } ]
2013-05-27T00:00:00
[ [ "Bouker", "Slim", "" ], [ "Saidi", "Rabie", "" ], [ "Yahia", "Sadok Ben", "" ], [ "Nguifo", "Engelbert Mephu", "" ] ]
TITLE: Towards a semantic and statistical selection of association rules ABSTRACT: The increasing growth of databases raises an urgent need for more accurate methods to better understand the stored data. In this scope, association rules were extensively used for the analysis and the comprehension of huge amounts of data. However, the number of generated rules is too large to be efficiently analyzed and explored in any further process. Association rules selection is a classical topic to address this issue, yet, new innovated approaches are required in order to provide help to decision makers. Hence, many interesting- ness measures have been defined to statistically evaluate and filter the association rules. However, these measures present two major problems. On the one hand, they do not allow eliminating irrelevant rules, on the other hand, their abun- dance leads to the heterogeneity of the evaluation results which leads to confusion in decision making. In this paper, we propose a two-winged approach to select statistically in- teresting and semantically incomparable rules. Our statis- tical selection helps discovering interesting association rules without favoring or excluding any measure. The semantic comparability helps to decide if the considered association rules are semantically related i.e comparable. The outcomes of our experiments on real datasets show promising results in terms of reduction in the number of rules.
1305.5826
Kian Hsiang Low
Jie Chen, Nannan Cao, Kian Hsiang Low, Ruofei Ouyang, Colin Keng-Yan Tan, Patrick Jaillet
Parallel Gaussian Process Regression with Low-Rank Covariance Matrix Approximations
29th Conference on Uncertainty in Artificial Intelligence (UAI 2013), Extended version with proofs, 13 pages
null
null
null
stat.ML cs.DC cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Gaussian processes (GP) are Bayesian non-parametric models that are widely used for probabilistic regression. Unfortunately, it cannot scale well with large data nor perform real-time predictions due to its cubic time cost in the data size. This paper presents two parallel GP regression methods that exploit low-rank covariance matrix approximations for distributing the computational load among parallel machines to achieve time efficiency and scalability. We theoretically guarantee the predictive performances of our proposed parallel GPs to be equivalent to that of some centralized approximate GP regression methods: The computation of their centralized counterparts can be distributed among parallel machines, hence achieving greater time efficiency and scalability. We analytically compare the properties of our parallel GPs such as time, space, and communication complexity. Empirical evaluation on two real-world datasets in a cluster of 20 computing nodes shows that our parallel GPs are significantly more time-efficient and scalable than their centralized counterparts and exact/full GP while achieving predictive performances comparable to full GP.
[ { "version": "v1", "created": "Fri, 24 May 2013 19:00:28 GMT" } ]
2013-05-27T00:00:00
[ [ "Chen", "Jie", "" ], [ "Cao", "Nannan", "" ], [ "Low", "Kian Hsiang", "" ], [ "Ouyang", "Ruofei", "" ], [ "Tan", "Colin Keng-Yan", "" ], [ "Jaillet", "Patrick", "" ] ]
TITLE: Parallel Gaussian Process Regression with Low-Rank Covariance Matrix Approximations ABSTRACT: Gaussian processes (GP) are Bayesian non-parametric models that are widely used for probabilistic regression. Unfortunately, it cannot scale well with large data nor perform real-time predictions due to its cubic time cost in the data size. This paper presents two parallel GP regression methods that exploit low-rank covariance matrix approximations for distributing the computational load among parallel machines to achieve time efficiency and scalability. We theoretically guarantee the predictive performances of our proposed parallel GPs to be equivalent to that of some centralized approximate GP regression methods: The computation of their centralized counterparts can be distributed among parallel machines, hence achieving greater time efficiency and scalability. We analytically compare the properties of our parallel GPs such as time, space, and communication complexity. Empirical evaluation on two real-world datasets in a cluster of 20 computing nodes shows that our parallel GPs are significantly more time-efficient and scalable than their centralized counterparts and exact/full GP while achieving predictive performances comparable to full GP.
1305.5267
Bluma Gelley
Bluma S. Gelley
Investigating Deletion in Wikipedia
null
null
null
null
cs.CY cs.DL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Several hundred Wikipedia articles are deleted every day because they lack sufficient significance to be included in the encyclopedia. We collect a dataset of deleted articles and analyze them to determine whether or not the deletions were justified. We find evidence to support the hypothesis that many deletions are carried out correctly, but also find that a large number were done very quickly. Based on our conclusions, we make some recommendations to reduce the number of non-significant pages and simultaneously improve retention of new editors.
[ { "version": "v1", "created": "Wed, 22 May 2013 20:54:18 GMT" } ]
2013-05-24T00:00:00
[ [ "Gelley", "Bluma S.", "" ] ]
TITLE: Investigating Deletion in Wikipedia ABSTRACT: Several hundred Wikipedia articles are deleted every day because they lack sufficient significance to be included in the encyclopedia. We collect a dataset of deleted articles and analyze them to determine whether or not the deletions were justified. We find evidence to support the hypothesis that many deletions are carried out correctly, but also find that a large number were done very quickly. Based on our conclusions, we make some recommendations to reduce the number of non-significant pages and simultaneously improve retention of new editors.
1305.5306
Yin Zheng
Yin Zheng, Yu-Jin Zhang, Hugo Larochelle
A Supervised Neural Autoregressive Topic Model for Simultaneous Image Classification and Annotation
13 pages, 5 figures
null
null
null
cs.CV cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Topic modeling based on latent Dirichlet allocation (LDA) has been a framework of choice to perform scene recognition and annotation. Recently, a new type of topic model called the Document Neural Autoregressive Distribution Estimator (DocNADE) was proposed and demonstrated state-of-the-art performance for document modeling. In this work, we show how to successfully apply and extend this model to the context of visual scene modeling. Specifically, we propose SupDocNADE, a supervised extension of DocNADE, that increases the discriminative power of the hidden topic features by incorporating label information into the training objective of the model. We also describe how to leverage information about the spatial position of the visual words and how to embed additional image annotations, so as to simultaneously perform image classification and annotation. We test our model on the Scene15, LabelMe and UIUC-Sports datasets and show that it compares favorably to other topic models such as the supervised variant of LDA.
[ { "version": "v1", "created": "Thu, 23 May 2013 03:35:31 GMT" } ]
2013-05-24T00:00:00
[ [ "Zheng", "Yin", "" ], [ "Zhang", "Yu-Jin", "" ], [ "Larochelle", "Hugo", "" ] ]
TITLE: A Supervised Neural Autoregressive Topic Model for Simultaneous Image Classification and Annotation ABSTRACT: Topic modeling based on latent Dirichlet allocation (LDA) has been a framework of choice to perform scene recognition and annotation. Recently, a new type of topic model called the Document Neural Autoregressive Distribution Estimator (DocNADE) was proposed and demonstrated state-of-the-art performance for document modeling. In this work, we show how to successfully apply and extend this model to the context of visual scene modeling. Specifically, we propose SupDocNADE, a supervised extension of DocNADE, that increases the discriminative power of the hidden topic features by incorporating label information into the training objective of the model. We also describe how to leverage information about the spatial position of the visual words and how to embed additional image annotations, so as to simultaneously perform image classification and annotation. We test our model on the Scene15, LabelMe and UIUC-Sports datasets and show that it compares favorably to other topic models such as the supervised variant of LDA.
1304.1209
Ben Fulcher
Ben D. Fulcher, Max A. Little, Nick S. Jones
Highly comparative time-series analysis: The empirical structure of time series and their methods
null
J. R. Soc. Interface vol. 10 no. 83 20130048 (2013)
10.1098/rsif.2013.0048
null
physics.data-an cs.CV physics.bio-ph q-bio.QM stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The process of collecting and organizing sets of observations represents a common theme throughout the history of science. However, despite the ubiquity of scientists measuring, recording, and analyzing the dynamics of different processes, an extensive organization of scientific time-series data and analysis methods has never been performed. Addressing this, annotated collections of over 35 000 real-world and model-generated time series and over 9000 time-series analysis algorithms are analyzed in this work. We introduce reduced representations of both time series, in terms of their properties measured by diverse scientific methods, and of time-series analysis methods, in terms of their behaviour on empirical time series, and use them to organize these interdisciplinary resources. This new approach to comparing across diverse scientific data and methods allows us to organize time-series datasets automatically according to their properties, retrieve alternatives to particular analysis methods developed in other scientific disciplines, and automate the selection of useful methods for time-series classification and regression tasks. The broad scientific utility of these tools is demonstrated on datasets of electroencephalograms, self-affine time series, heart beat intervals, speech signals, and others, in each case contributing novel analysis techniques to the existing literature. Highly comparative techniques that compare across an interdisciplinary literature can thus be used to guide more focused research in time-series analysis for applications across the scientific disciplines.
[ { "version": "v1", "created": "Wed, 3 Apr 2013 23:24:02 GMT" } ]
2013-05-23T00:00:00
[ [ "Fulcher", "Ben D.", "" ], [ "Little", "Max A.", "" ], [ "Jones", "Nick S.", "" ] ]
TITLE: Highly comparative time-series analysis: The empirical structure of time series and their methods ABSTRACT: The process of collecting and organizing sets of observations represents a common theme throughout the history of science. However, despite the ubiquity of scientists measuring, recording, and analyzing the dynamics of different processes, an extensive organization of scientific time-series data and analysis methods has never been performed. Addressing this, annotated collections of over 35 000 real-world and model-generated time series and over 9000 time-series analysis algorithms are analyzed in this work. We introduce reduced representations of both time series, in terms of their properties measured by diverse scientific methods, and of time-series analysis methods, in terms of their behaviour on empirical time series, and use them to organize these interdisciplinary resources. This new approach to comparing across diverse scientific data and methods allows us to organize time-series datasets automatically according to their properties, retrieve alternatives to particular analysis methods developed in other scientific disciplines, and automate the selection of useful methods for time-series classification and regression tasks. The broad scientific utility of these tools is demonstrated on datasets of electroencephalograms, self-affine time series, heart beat intervals, speech signals, and others, in each case contributing novel analysis techniques to the existing literature. Highly comparative techniques that compare across an interdisciplinary literature can thus be used to guide more focused research in time-series analysis for applications across the scientific disciplines.
1305.5189
Neven Caplar
Neven Caplar, Mirko Suznjevic and Maja Matijasevic
Analysis of player's in-game performance vs rating: Case study of Heroes of Newerth
8 pages, 14 figures, to appear in proceedings of "Foundation of Digital Games 2013" conference (14-17 May 2013)
null
null
null
physics.soc-ph cs.SI physics.data-an physics.pop-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We evaluate the rating system of "Heroes of Newerth" (HoN), a multiplayer online action role-playing game, by using statistical analysis and comparison of a player's in-game performance metrics and the player rating assigned by the rating system. The datasets for the analysis have been extracted from the web sites that record the players' ratings and a number of empirical metrics. Results suggest that the HoN's Matchmaking rating algorithm, while generally capturing the skill level of the player well, also has weaknesses, which have been exploited by players to achieve a higher placement on the ranking ladder than deserved by actual skill. In addition, we also illustrate the effects of the choice of the business model (from pay-to-play to free-to-play) on player population.
[ { "version": "v1", "created": "Wed, 22 May 2013 16:45:47 GMT" } ]
2013-05-23T00:00:00
[ [ "Caplar", "Neven", "" ], [ "Suznjevic", "Mirko", "" ], [ "Matijasevic", "Maja", "" ] ]
TITLE: Analysis of player's in-game performance vs rating: Case study of Heroes of Newerth ABSTRACT: We evaluate the rating system of "Heroes of Newerth" (HoN), a multiplayer online action role-playing game, by using statistical analysis and comparison of a player's in-game performance metrics and the player rating assigned by the rating system. The datasets for the analysis have been extracted from the web sites that record the players' ratings and a number of empirical metrics. Results suggest that the HoN's Matchmaking rating algorithm, while generally capturing the skill level of the player well, also has weaknesses, which have been exploited by players to achieve a higher placement on the ranking ladder than deserved by actual skill. In addition, we also illustrate the effects of the choice of the business model (from pay-to-play to free-to-play) on player population.
1209.5601
Fan Min
Fan Min, Qinghua Hu, William Zhu
Feature selection with test cost constraint
23 pages
null
10.1016/j.ijar.2013.04.003
null
cs.AI cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Feature selection is an important preprocessing step in machine learning and data mining. In real-world applications, costs, including money, time and other resources, are required to acquire the features. In some cases, there is a test cost constraint due to limited resources. We shall deliberately select an informative and cheap feature subset for classification. This paper proposes the feature selection with test cost constraint problem for this issue. The new problem has a simple form while described as a constraint satisfaction problem (CSP). Backtracking is a general algorithm for CSP, and it is efficient in solving the new problem on medium-sized data. As the backtracking algorithm is not scalable to large datasets, a heuristic algorithm is also developed. Experimental results show that the heuristic algorithm can find the optimal solution in most cases. We also redefine some existing feature selection problems in rough sets, especially in decision-theoretic rough sets, from the viewpoint of CSP. These new definitions provide insight to some new research directions.
[ { "version": "v1", "created": "Tue, 25 Sep 2012 13:21:40 GMT" } ]
2013-05-22T00:00:00
[ [ "Min", "Fan", "" ], [ "Hu", "Qinghua", "" ], [ "Zhu", "William", "" ] ]
TITLE: Feature selection with test cost constraint ABSTRACT: Feature selection is an important preprocessing step in machine learning and data mining. In real-world applications, costs, including money, time and other resources, are required to acquire the features. In some cases, there is a test cost constraint due to limited resources. We shall deliberately select an informative and cheap feature subset for classification. This paper proposes the feature selection with test cost constraint problem for this issue. The new problem has a simple form while described as a constraint satisfaction problem (CSP). Backtracking is a general algorithm for CSP, and it is efficient in solving the new problem on medium-sized data. As the backtracking algorithm is not scalable to large datasets, a heuristic algorithm is also developed. Experimental results show that the heuristic algorithm can find the optimal solution in most cases. We also redefine some existing feature selection problems in rough sets, especially in decision-theoretic rough sets, from the viewpoint of CSP. These new definitions provide insight to some new research directions.
1302.7278
Gregory Kucherov
Kamil Salikhov, Gustavo Sacomoto, and Gregory Kucherov
Using cascading Bloom filters to improve the memory usage for de Brujin graphs
12 pages, submitted
null
null
null
cs.DS
http://creativecommons.org/licenses/by/3.0/
De Brujin graphs are widely used in bioinformatics for processing next-generation sequencing data. Due to a very large size of NGS datasets, it is essential to represent de Bruijn graphs compactly, and several approaches to this problem have been proposed recently. In this work, we show how to reduce the memory required by the algorithm of [3] that represents de Brujin graphs using Bloom filters. Our method requires 30% to 40% less memory with respect to the method of [3], with insignificant impact to construction time. At the same time, our experiments showed a better query time compared to [3]. This is, to our knowledge, the best practical representation for de Bruijn graphs.
[ { "version": "v1", "created": "Thu, 28 Feb 2013 18:35:21 GMT" }, { "version": "v2", "created": "Tue, 21 May 2013 15:25:19 GMT" } ]
2013-05-22T00:00:00
[ [ "Salikhov", "Kamil", "" ], [ "Sacomoto", "Gustavo", "" ], [ "Kucherov", "Gregory", "" ] ]
TITLE: Using cascading Bloom filters to improve the memory usage for de Brujin graphs ABSTRACT: De Brujin graphs are widely used in bioinformatics for processing next-generation sequencing data. Due to a very large size of NGS datasets, it is essential to represent de Bruijn graphs compactly, and several approaches to this problem have been proposed recently. In this work, we show how to reduce the memory required by the algorithm of [3] that represents de Brujin graphs using Bloom filters. Our method requires 30% to 40% less memory with respect to the method of [3], with insignificant impact to construction time. At the same time, our experiments showed a better query time compared to [3]. This is, to our knowledge, the best practical representation for de Bruijn graphs.
1305.4820
Nader Jelassi
Mohamed Nader Jelassi and Sadok Ben Yahia and Engelbert Mephu Nguifo
Nouvelle approche de recommandation personnalisee dans les folksonomies basee sur le profil des utilisateurs
7 pages
null
null
null
cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In folksonomies, users use to share objects (movies, books, bookmarks, etc.) by annotating them with a set of tags of their own choice. With the rise of the Web 2.0 age, users become the core of the system since they are both the contributors and the creators of the information. Yet, each user has its own profile and its own ideas making thereby the strength as well as the weakness of folksonomies. Indeed, it would be helpful to take account of users' profile when suggesting a list of tags and resources or even a list of friends, in order to make a personal recommandation, instead of suggesting the more used tags and resources in the folksonomy. In this paper, we consider users' profile as a new dimension of a folksonomy classically composed of three dimensions <users, tags, ressources> and we propose an approach to group users with equivalent profiles and equivalent interests as quadratic concepts. Then, we use such structures to propose our personalized recommendation system of users, tags and resources according to each user's profile. Carried out experiments on two real-world datasets, i.e., MovieLens and BookCrossing highlight encouraging results in terms of precision as well as a good social evaluation.
[ { "version": "v1", "created": "Tue, 21 May 2013 13:59:51 GMT" } ]
2013-05-22T00:00:00
[ [ "Jelassi", "Mohamed Nader", "" ], [ "Yahia", "Sadok Ben", "" ], [ "Nguifo", "Engelbert Mephu", "" ] ]
TITLE: Nouvelle approche de recommandation personnalisee dans les folksonomies basee sur le profil des utilisateurs ABSTRACT: In folksonomies, users use to share objects (movies, books, bookmarks, etc.) by annotating them with a set of tags of their own choice. With the rise of the Web 2.0 age, users become the core of the system since they are both the contributors and the creators of the information. Yet, each user has its own profile and its own ideas making thereby the strength as well as the weakness of folksonomies. Indeed, it would be helpful to take account of users' profile when suggesting a list of tags and resources or even a list of friends, in order to make a personal recommandation, instead of suggesting the more used tags and resources in the folksonomy. In this paper, we consider users' profile as a new dimension of a folksonomy classically composed of three dimensions <users, tags, ressources> and we propose an approach to group users with equivalent profiles and equivalent interests as quadratic concepts. Then, we use such structures to propose our personalized recommendation system of users, tags and resources according to each user's profile. Carried out experiments on two real-world datasets, i.e., MovieLens and BookCrossing highlight encouraging results in terms of precision as well as a good social evaluation.
1208.0787
Shang Shang
Shang Shang, Sanjeev R. Kulkarni, Paul W. Cuff and Pan Hui
A Random Walk Based Model Incorporating Social Information for Recommendations
2012 IEEE Machine Learning for Signal Processing Workshop (MLSP), 6 pages
null
null
null
cs.IR cs.LG
http://creativecommons.org/licenses/by-nc-sa/3.0/
Collaborative filtering (CF) is one of the most popular approaches to build a recommendation system. In this paper, we propose a hybrid collaborative filtering model based on a Makovian random walk to address the data sparsity and cold start problems in recommendation systems. More precisely, we construct a directed graph whose nodes consist of items and users, together with item content, user profile and social network information. We incorporate user's ratings into edge settings in the graph model. The model provides personalized recommendations and predictions to individuals and groups. The proposed algorithms are evaluated on MovieLens and Epinions datasets. Experimental results show that the proposed methods perform well compared with other graph-based methods, especially in the cold start case.
[ { "version": "v1", "created": "Fri, 3 Aug 2012 16:15:10 GMT" }, { "version": "v2", "created": "Fri, 17 May 2013 21:57:26 GMT" } ]
2013-05-21T00:00:00
[ [ "Shang", "Shang", "" ], [ "Kulkarni", "Sanjeev R.", "" ], [ "Cuff", "Paul W.", "" ], [ "Hui", "Pan", "" ] ]
TITLE: A Random Walk Based Model Incorporating Social Information for Recommendations ABSTRACT: Collaborative filtering (CF) is one of the most popular approaches to build a recommendation system. In this paper, we propose a hybrid collaborative filtering model based on a Makovian random walk to address the data sparsity and cold start problems in recommendation systems. More precisely, we construct a directed graph whose nodes consist of items and users, together with item content, user profile and social network information. We incorporate user's ratings into edge settings in the graph model. The model provides personalized recommendations and predictions to individuals and groups. The proposed algorithms are evaluated on MovieLens and Epinions datasets. Experimental results show that the proposed methods perform well compared with other graph-based methods, especially in the cold start case.
1212.2129
Bin Li
Bin Li and Steven C. H. Hoi
Online Portfolio Selection: A Survey
33 pages
null
null
null
q-fin.CP cs.AI cs.CE q-fin.PM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Online portfolio selection is a fundamental problem in computational finance, which has been extensively studied across several research communities, including finance, statistics, artificial intelligence, machine learning, and data mining, etc. This article aims to provide a comprehensive survey and a structural understanding of published online portfolio selection techniques. From an online machine learning perspective, we first formulate online portfolio selection as a sequential decision problem, and then survey a variety of state-of-the-art approaches, which are grouped into several major categories, including benchmarks, "Follow-the-Winner" approaches, "Follow-the-Loser" approaches, "Pattern-Matching" based approaches, and "Meta-Learning Algorithms". In addition to the problem formulation and related algorithms, we also discuss the relationship of these algorithms with the Capital Growth theory in order to better understand the similarities and differences of their underlying trading ideas. This article aims to provide a timely and comprehensive survey for both machine learning and data mining researchers in academia and quantitative portfolio managers in the financial industry to help them understand the state-of-the-art and facilitate their research and practical applications. We also discuss some open issues and evaluate some emerging new trends for future research directions.
[ { "version": "v1", "created": "Mon, 10 Dec 2012 16:49:54 GMT" }, { "version": "v2", "created": "Sun, 19 May 2013 12:08:21 GMT" } ]
2013-05-21T00:00:00
[ [ "Li", "Bin", "" ], [ "Hoi", "Steven C. H.", "" ] ]
TITLE: Online Portfolio Selection: A Survey ABSTRACT: Online portfolio selection is a fundamental problem in computational finance, which has been extensively studied across several research communities, including finance, statistics, artificial intelligence, machine learning, and data mining, etc. This article aims to provide a comprehensive survey and a structural understanding of published online portfolio selection techniques. From an online machine learning perspective, we first formulate online portfolio selection as a sequential decision problem, and then survey a variety of state-of-the-art approaches, which are grouped into several major categories, including benchmarks, "Follow-the-Winner" approaches, "Follow-the-Loser" approaches, "Pattern-Matching" based approaches, and "Meta-Learning Algorithms". In addition to the problem formulation and related algorithms, we also discuss the relationship of these algorithms with the Capital Growth theory in order to better understand the similarities and differences of their underlying trading ideas. This article aims to provide a timely and comprehensive survey for both machine learning and data mining researchers in academia and quantitative portfolio managers in the financial industry to help them understand the state-of-the-art and facilitate their research and practical applications. We also discuss some open issues and evaluate some emerging new trends for future research directions.
1305.4345
Alon Schclar
Alon Schclar and Lior Rokach and Amir Amit
Ensembles of Classifiers based on Dimensionality Reduction
31 pages, 4 figures, 4 tables, Submitted to Pattern Analysis and Applications
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a novel approach for the construction of ensemble classifiers based on dimensionality reduction. Dimensionality reduction methods represent datasets using a small number of attributes while preserving the information conveyed by the original dataset. The ensemble members are trained based on dimension-reduced versions of the training set. These versions are obtained by applying dimensionality reduction to the original training set using different values of the input parameters. This construction meets both the diversity and accuracy criteria which are required to construct an ensemble classifier where the former criterion is obtained by the various input parameter values and the latter is achieved due to the decorrelation and noise reduction properties of dimensionality reduction. In order to classify a test sample, it is first embedded into the dimension reduced space of each individual classifier by using an out-of-sample extension algorithm. Each classifier is then applied to the embedded sample and the classification is obtained via a voting scheme. We present three variations of the proposed approach based on the Random Projections, the Diffusion Maps and the Random Subspaces dimensionality reduction algorithms. We also present a multi-strategy ensemble which combines AdaBoost and Diffusion Maps. A comparison is made with the Bagging, AdaBoost, Rotation Forest ensemble classifiers and also with the base classifier which does not incorporate dimensionality reduction. Our experiments used seventeen benchmark datasets from the UCI repository. The results obtained by the proposed algorithms were superior in many cases to other algorithms.
[ { "version": "v1", "created": "Sun, 19 May 2013 10:24:06 GMT" } ]
2013-05-21T00:00:00
[ [ "Schclar", "Alon", "" ], [ "Rokach", "Lior", "" ], [ "Amit", "Amir", "" ] ]
TITLE: Ensembles of Classifiers based on Dimensionality Reduction ABSTRACT: We present a novel approach for the construction of ensemble classifiers based on dimensionality reduction. Dimensionality reduction methods represent datasets using a small number of attributes while preserving the information conveyed by the original dataset. The ensemble members are trained based on dimension-reduced versions of the training set. These versions are obtained by applying dimensionality reduction to the original training set using different values of the input parameters. This construction meets both the diversity and accuracy criteria which are required to construct an ensemble classifier where the former criterion is obtained by the various input parameter values and the latter is achieved due to the decorrelation and noise reduction properties of dimensionality reduction. In order to classify a test sample, it is first embedded into the dimension reduced space of each individual classifier by using an out-of-sample extension algorithm. Each classifier is then applied to the embedded sample and the classification is obtained via a voting scheme. We present three variations of the proposed approach based on the Random Projections, the Diffusion Maps and the Random Subspaces dimensionality reduction algorithms. We also present a multi-strategy ensemble which combines AdaBoost and Diffusion Maps. A comparison is made with the Bagging, AdaBoost, Rotation Forest ensemble classifiers and also with the base classifier which does not incorporate dimensionality reduction. Our experiments used seventeen benchmark datasets from the UCI repository. The results obtained by the proposed algorithms were superior in many cases to other algorithms.
1305.4429
Youfang Lin
Youfang Lin, Xuguang Jia, Mingjie Lin, Steve Gregory, Huaiyu Wan, Zhihao Wu
Inferring High Quality Co-Travel Networks
20 pages, 23 figures
null
null
null
cs.SI physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Social networks provide a new perspective for enterprises to better understand their customers and have attracted substantial attention in industry. However, inferring high quality customer social networks is a great challenge while there are no explicit customer relations in many traditional OLTP environments. In this paper, we study this issue in the field of passenger transport and introduce a new member to the family of social networks, which is named Co-Travel Networks, consisting of passengers connected by their co-travel behaviors. We propose a novel method to infer high quality co-travel networks of civil aviation passengers from their co-booking behaviors derived from the PNRs (Passenger Naming Records). In our method, to accurately evaluate the strength of ties, we present a measure of Co-Journey Times to count the co-travel times of complete journeys between passengers. We infer a high quality co-travel network based on a large encrypted PNR dataset and conduct a series of network analyses on it. The experimental results show the effectiveness of our inferring method, as well as some special characteristics of co-travel networks, such as the sparsity and high aggregation, compared with other kinds of social networks. It can be expected that such co-travel networks will greatly help the industry to better understand their passengers so as to improve their services. More importantly, we contribute a special kind of social networks with high strength of ties generated from very close and high cost travel behaviors, for further scientific researches on human travel behaviors, group travel patterns, high-end travel market evolution, etc., from the perspective of social networks.
[ { "version": "v1", "created": "Mon, 20 May 2013 03:04:23 GMT" } ]
2013-05-21T00:00:00
[ [ "Lin", "Youfang", "" ], [ "Jia", "Xuguang", "" ], [ "Lin", "Mingjie", "" ], [ "Gregory", "Steve", "" ], [ "Wan", "Huaiyu", "" ], [ "Wu", "Zhihao", "" ] ]
TITLE: Inferring High Quality Co-Travel Networks ABSTRACT: Social networks provide a new perspective for enterprises to better understand their customers and have attracted substantial attention in industry. However, inferring high quality customer social networks is a great challenge while there are no explicit customer relations in many traditional OLTP environments. In this paper, we study this issue in the field of passenger transport and introduce a new member to the family of social networks, which is named Co-Travel Networks, consisting of passengers connected by their co-travel behaviors. We propose a novel method to infer high quality co-travel networks of civil aviation passengers from their co-booking behaviors derived from the PNRs (Passenger Naming Records). In our method, to accurately evaluate the strength of ties, we present a measure of Co-Journey Times to count the co-travel times of complete journeys between passengers. We infer a high quality co-travel network based on a large encrypted PNR dataset and conduct a series of network analyses on it. The experimental results show the effectiveness of our inferring method, as well as some special characteristics of co-travel networks, such as the sparsity and high aggregation, compared with other kinds of social networks. It can be expected that such co-travel networks will greatly help the industry to better understand their passengers so as to improve their services. More importantly, we contribute a special kind of social networks with high strength of ties generated from very close and high cost travel behaviors, for further scientific researches on human travel behaviors, group travel patterns, high-end travel market evolution, etc., from the perspective of social networks.
1305.4455
Mark Wilkinson
Ben P Vandervalk, E Luke McCarthy, Mark D Wilkinson
SHARE: A Web Service Based Framework for Distributed Querying and Reasoning on the Semantic Web
Third Asian Semantic Web Conference, ASWC2008 Bangkok, Thailand December 2008, Workshops Proceedings (NEFORS2008), pp69-78
null
null
null
cs.DL cs.AI cs.SE
http://creativecommons.org/licenses/by/3.0/
Here we describe the SHARE system, a web service based framework for distributed querying and reasoning on the semantic web. The main innovations of SHARE are: (1) the extension of a SPARQL query engine to perform on-demand data retrieval from web services, and (2) the extension of an OWL reasoner to test property restrictions by means of web service invocations. In addition to enabling queries across distributed datasets, the system allows for a target dataset that is significantly larger than is possible under current, centralized approaches. Although the architecture is equally applicable to all types of data, the SHARE system targets bioinformatics, due to the large number of interoperable web services that are already available in this area. SHARE is built entirely on semantic web standards, and is the successor of the BioMOBY project.
[ { "version": "v1", "created": "Mon, 20 May 2013 07:54:09 GMT" } ]
2013-05-21T00:00:00
[ [ "Vandervalk", "Ben P", "" ], [ "McCarthy", "E Luke", "" ], [ "Wilkinson", "Mark D", "" ] ]
TITLE: SHARE: A Web Service Based Framework for Distributed Querying and Reasoning on the Semantic Web ABSTRACT: Here we describe the SHARE system, a web service based framework for distributed querying and reasoning on the semantic web. The main innovations of SHARE are: (1) the extension of a SPARQL query engine to perform on-demand data retrieval from web services, and (2) the extension of an OWL reasoner to test property restrictions by means of web service invocations. In addition to enabling queries across distributed datasets, the system allows for a target dataset that is significantly larger than is possible under current, centralized approaches. Although the architecture is equally applicable to all types of data, the SHARE system targets bioinformatics, due to the large number of interoperable web services that are already available in this area. SHARE is built entirely on semantic web standards, and is the successor of the BioMOBY project.
1210.5035
Xiaojun Zhou
Xiaojun Zhou
A Comparative Study of State Transition Algorithm with Harmony Search and Artificial Bee Colony
null
Advances in Intelligent Systems and Computing, Volume 212, 2013, pp 651-659
null
null
math.OC cs.IT math.IT math.PR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We focus on a comparative study of three recently developed nature-inspired optimization algorithms, including state transition algorithm, harmony search and artificial bee colony. Their core mechanisms are introduced and their similarities and differences are described. Then, a suit of 27 well-known benchmark problems are used to investigate the performance of these algorithms and finally we discuss their general applicability with respect to the structure of optimization problems.
[ { "version": "v1", "created": "Thu, 18 Oct 2012 07:17:29 GMT" } ]
2013-05-20T00:00:00
[ [ "Zhou", "Xiaojun", "" ] ]
TITLE: A Comparative Study of State Transition Algorithm with Harmony Search and Artificial Bee Colony ABSTRACT: We focus on a comparative study of three recently developed nature-inspired optimization algorithms, including state transition algorithm, harmony search and artificial bee colony. Their core mechanisms are introduced and their similarities and differences are described. Then, a suit of 27 well-known benchmark problems are used to investigate the performance of these algorithms and finally we discuss their general applicability with respect to the structure of optimization problems.
1305.3616
Manuel Gomez Rodriguez
Manuel Gomez Rodriguez, Jure Leskovec, Bernhard Schoelkopf
Modeling Information Propagation with Survival Theory
To appear at ICML '13
null
null
null
cs.SI cs.DS physics.soc-ph stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Networks provide a skeleton for the spread of contagions, like, information, ideas, behaviors and diseases. Many times networks over which contagions diffuse are unobserved and need to be inferred. Here we apply survival theory to develop general additive and multiplicative risk models under which the network inference problems can be solved efficiently by exploiting their convexity. Our additive risk model generalizes several existing network inference models. We show all these models are particular cases of our more general model. Our multiplicative model allows for modeling scenarios in which a node can either increase or decrease the risk of activation of another node, in contrast with previous approaches, which consider only positive risk increments. We evaluate the performance of our network inference algorithms on large synthetic and real cascade datasets, and show that our models are able to predict the length and duration of cascades in real data.
[ { "version": "v1", "created": "Wed, 15 May 2013 20:01:06 GMT" } ]
2013-05-17T00:00:00
[ [ "Rodriguez", "Manuel Gomez", "" ], [ "Leskovec", "Jure", "" ], [ "Schoelkopf", "Bernhard", "" ] ]
TITLE: Modeling Information Propagation with Survival Theory ABSTRACT: Networks provide a skeleton for the spread of contagions, like, information, ideas, behaviors and diseases. Many times networks over which contagions diffuse are unobserved and need to be inferred. Here we apply survival theory to develop general additive and multiplicative risk models under which the network inference problems can be solved efficiently by exploiting their convexity. Our additive risk model generalizes several existing network inference models. We show all these models are particular cases of our more general model. Our multiplicative model allows for modeling scenarios in which a node can either increase or decrease the risk of activation of another node, in contrast with previous approaches, which consider only positive risk increments. We evaluate the performance of our network inference algorithms on large synthetic and real cascade datasets, and show that our models are able to predict the length and duration of cascades in real data.
1305.3883
Sanjay Rawat
Sanjay Rawat and Dumitru Ceara and Laurent Mounier and Marie-Laure Potet
Combining Static and Dynamic Analysis for Vulnerability Detection
There are 15 pages with 1 figure
null
null
null
cs.CR
http://creativecommons.org/licenses/by/3.0/
In this paper, we present a hybrid approach for buffer overflow detection in C code. The approach makes use of static and dynamic analysis of the application under investigation. The static part consists in calculating taint dependency sequences (TDS) between user controlled inputs and vulnerable statements. This process is akin to program slice of interest to calculate tainted data- and control-flow path which exhibits the dependence between tainted program inputs and vulnerable statements in the code. The dynamic part consists of executing the program along TDSs to trigger the vulnerability by generating suitable inputs. We use genetic algorithm to generate inputs. We propose a fitness function that approximates the program behavior (control flow) based on the frequencies of the statements along TDSs. This runtime aspect makes the approach faster and accurate. We provide experimental results on the Verisec benchmark to validate our approach.
[ { "version": "v1", "created": "Thu, 16 May 2013 18:28:45 GMT" } ]
2013-05-17T00:00:00
[ [ "Rawat", "Sanjay", "" ], [ "Ceara", "Dumitru", "" ], [ "Mounier", "Laurent", "" ], [ "Potet", "Marie-Laure", "" ] ]
TITLE: Combining Static and Dynamic Analysis for Vulnerability Detection ABSTRACT: In this paper, we present a hybrid approach for buffer overflow detection in C code. The approach makes use of static and dynamic analysis of the application under investigation. The static part consists in calculating taint dependency sequences (TDS) between user controlled inputs and vulnerable statements. This process is akin to program slice of interest to calculate tainted data- and control-flow path which exhibits the dependence between tainted program inputs and vulnerable statements in the code. The dynamic part consists of executing the program along TDSs to trigger the vulnerability by generating suitable inputs. We use genetic algorithm to generate inputs. We propose a fitness function that approximates the program behavior (control flow) based on the frequencies of the statements along TDSs. This runtime aspect makes the approach faster and accurate. We provide experimental results on the Verisec benchmark to validate our approach.
1201.3804
Mads Kristensen
Mads Ruben Burgdorff Kristensen and Brian Vinter
Managing Communication Latency-Hiding at Runtime for Parallel Programming Languages and Libraries
PREPRINT
Proceeding HPCC '12 Proceedings of the 2012 IEEE 14th International Conference on High Performance Computing and Communication & 2012 IEEE 9th International Conference on Embedded Software and Systems
10.1109/HPCC.2012.80
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This work introduces a runtime model for managing communication with support for latency-hiding. The model enables non-computer science researchers to exploit communication latency-hiding techniques seamlessly. For compiled languages, it is often possible to create efficient schedules for communication, but this is not the case for interpreted languages. By maintaining data dependencies between scheduled operations, it is possible to aggressively initiate communication and lazily evaluate tasks to allow maximal time for the communication to finish before entering a wait state. We implement a heuristic of this model in DistNumPy, an auto-parallelizing version of numerical Python that allows sequential NumPy programs to run on distributed memory architectures. Furthermore, we present performance comparisons for eight benchmarks with and without automatic latency-hiding. The results shows that our model reduces the time spent on waiting for communication as much as 27 times, from a maximum of 54% to only 2% of the total execution time, in a stencil application.
[ { "version": "v1", "created": "Wed, 18 Jan 2012 14:43:43 GMT" } ]
2013-05-16T00:00:00
[ [ "Kristensen", "Mads Ruben Burgdorff", "" ], [ "Vinter", "Brian", "" ] ]
TITLE: Managing Communication Latency-Hiding at Runtime for Parallel Programming Languages and Libraries ABSTRACT: This work introduces a runtime model for managing communication with support for latency-hiding. The model enables non-computer science researchers to exploit communication latency-hiding techniques seamlessly. For compiled languages, it is often possible to create efficient schedules for communication, but this is not the case for interpreted languages. By maintaining data dependencies between scheduled operations, it is possible to aggressively initiate communication and lazily evaluate tasks to allow maximal time for the communication to finish before entering a wait state. We implement a heuristic of this model in DistNumPy, an auto-parallelizing version of numerical Python that allows sequential NumPy programs to run on distributed memory architectures. Furthermore, we present performance comparisons for eight benchmarks with and without automatic latency-hiding. The results shows that our model reduces the time spent on waiting for communication as much as 27 times, from a maximum of 54% to only 2% of the total execution time, in a stencil application.
1305.3384
Lior Rokach
Naseem Biadsy, Lior Rokach, Armin Shmilovici
Transfer Learning for Content-Based Recommender Systems using Tree Matching
null
null
null
null
cs.LG cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we present a new approach to content-based transfer learning for solving the data sparsity problem in cases when the users' preferences in the target domain are either scarce or unavailable, but the necessary information on the preferences exists in another domain. We show that training a system to use such information across domains can produce better performance. Specifically, we represent users' behavior patterns based on topological graph structures. Each behavior pattern represents the behavior of a set of users, when the users' behavior is defined as the items they rated and the items' rating values. In the next step we find a correlation between behavior patterns in the source domain and behavior patterns in the target domain. This mapping is considered a bridge between the two domains. Based on the correlation and content-attributes of the items, we train a machine learning model to predict users' ratings in the target domain. When we compare our approach to the popularity approach and KNN-cross-domain on a real world dataset, the results show that on an average of 83$%$ of the cases our approach outperforms both methods.
[ { "version": "v1", "created": "Wed, 15 May 2013 08:00:54 GMT" } ]
2013-05-16T00:00:00
[ [ "Biadsy", "Naseem", "" ], [ "Rokach", "Lior", "" ], [ "Shmilovici", "Armin", "" ] ]
TITLE: Transfer Learning for Content-Based Recommender Systems using Tree Matching ABSTRACT: In this paper we present a new approach to content-based transfer learning for solving the data sparsity problem in cases when the users' preferences in the target domain are either scarce or unavailable, but the necessary information on the preferences exists in another domain. We show that training a system to use such information across domains can produce better performance. Specifically, we represent users' behavior patterns based on topological graph structures. Each behavior pattern represents the behavior of a set of users, when the users' behavior is defined as the items they rated and the items' rating values. In the next step we find a correlation between behavior patterns in the source domain and behavior patterns in the target domain. This mapping is considered a bridge between the two domains. Based on the correlation and content-attributes of the items, we train a machine learning model to predict users' ratings in the target domain. When we compare our approach to the popularity approach and KNN-cross-domain on a real world dataset, the results show that on an average of 83$%$ of the cases our approach outperforms both methods.
1305.3568
Xin Jin
Xin Jin, Li Erran Li, Laurent Vanbever, Jennifer Rexford
SoftCell: Taking Control of Cellular Core Networks
null
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Existing cellular networks suffer from inflexible and expensive equipment, and complex control-plane protocols. To address these challenges, we present SoftCell, a scalable architecture for supporting fine-grained policies for mobile devices in cellular core networks. The SoftCell controller realizes high-level service polices by directing traffic over paths that traverse a sequence of middleboxes, optimized to the network conditions and user locations. To ensure scalability, the core switches forward traffic on hierarchical addresses (grouped by base station) and policy tags (identifying paths through middleboxes). This minimizes data-plane state in the core switches, and pushes all fine-grained state to software switches at the base stations. These access switches apply fine-grained rules, specified by the controller, to map all traffic to the appropriate addresses and tags. SoftCell guarantees that packets in the same connection traverse the same sequence of middleboxes in both directions, even in the presence of mobility. Our characterization of real LTE workloads, micro-benchmarks on our prototype controller, and large-scale simulations demonstrate that SoftCell improves the flexibility of cellular core networks, while enabling the use of inexpensive commodity switches and middleboxes.
[ { "version": "v1", "created": "Wed, 15 May 2013 18:00:02 GMT" } ]
2013-05-16T00:00:00
[ [ "Jin", "Xin", "" ], [ "Li", "Li Erran", "" ], [ "Vanbever", "Laurent", "" ], [ "Rexford", "Jennifer", "" ] ]
TITLE: SoftCell: Taking Control of Cellular Core Networks ABSTRACT: Existing cellular networks suffer from inflexible and expensive equipment, and complex control-plane protocols. To address these challenges, we present SoftCell, a scalable architecture for supporting fine-grained policies for mobile devices in cellular core networks. The SoftCell controller realizes high-level service polices by directing traffic over paths that traverse a sequence of middleboxes, optimized to the network conditions and user locations. To ensure scalability, the core switches forward traffic on hierarchical addresses (grouped by base station) and policy tags (identifying paths through middleboxes). This minimizes data-plane state in the core switches, and pushes all fine-grained state to software switches at the base stations. These access switches apply fine-grained rules, specified by the controller, to map all traffic to the appropriate addresses and tags. SoftCell guarantees that packets in the same connection traverse the same sequence of middleboxes in both directions, even in the presence of mobility. Our characterization of real LTE workloads, micro-benchmarks on our prototype controller, and large-scale simulations demonstrate that SoftCell improves the flexibility of cellular core networks, while enabling the use of inexpensive commodity switches and middleboxes.