id
large_stringlengths 9
16
| submitter
large_stringlengths 3
64
⌀ | authors
large_stringlengths 5
20.2k
| title
large_stringlengths 5
245
| comments
large_stringlengths 1
482
⌀ | journal-ref
large_stringlengths 4
382
⌀ | doi
large_stringlengths 9
151
⌀ | report-no
large_stringlengths 2
509
⌀ | categories
large_stringlengths 5
78
| license
large_stringclasses 9
values | abstract
large_stringlengths 83
3.55k
| versions
large listlengths 1
21
| update_date
timestamp[ms]date 2007-05-23 00:00:00
2025-05-30 00:00:00
| authors_parsed
large listlengths 1
1.35k
| prompt
large_stringlengths 166
3.64k
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1307.0253 | Bhavana Dalvi | Bhavana Dalvi, William W. Cohen, Jamie Callan | Exploratory Learning | 16 pages; European Conference on Machine Learning and Principles and
Practice of Knowledge Discovery in Databases, 2013 | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In multiclass semi-supervised learning (SSL), it is sometimes the case that
the number of classes present in the data is not known, and hence no labeled
examples are provided for some classes. In this paper we present variants of
well-known semi-supervised multiclass learning methods that are robust when the
data contains an unknown number of classes. In particular, we present an
"exploratory" extension of expectation-maximization (EM) that explores
different numbers of classes while learning. "Exploratory" SSL greatly improves
performance on three datasets in terms of F1 on the classes with seed examples
i.e., the classes which are expected to be in the data. Our Exploratory EM
algorithm also outperforms a SSL method based non-parametric Bayesian
clustering.
| [
{
"version": "v1",
"created": "Mon, 1 Jul 2013 01:09:25 GMT"
}
] | 2013-07-02T00:00:00 | [
[
"Dalvi",
"Bhavana",
""
],
[
"Cohen",
"William W.",
""
],
[
"Callan",
"Jamie",
""
]
] | TITLE: Exploratory Learning
ABSTRACT: In multiclass semi-supervised learning (SSL), it is sometimes the case that
the number of classes present in the data is not known, and hence no labeled
examples are provided for some classes. In this paper we present variants of
well-known semi-supervised multiclass learning methods that are robust when the
data contains an unknown number of classes. In particular, we present an
"exploratory" extension of expectation-maximization (EM) that explores
different numbers of classes while learning. "Exploratory" SSL greatly improves
performance on three datasets in terms of F1 on the classes with seed examples
i.e., the classes which are expected to be in the data. Our Exploratory EM
algorithm also outperforms a SSL method based non-parametric Bayesian
clustering.
|
1307.0261 | Bhavana Dalvi | Bhavana Dalvi, William W. Cohen, and Jamie Callan | WebSets: Extracting Sets of Entities from the Web Using Unsupervised
Information Extraction | 10 pages; International Conference on Web Search and Data Mining 2012 | null | null | null | cs.LG cs.CL cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We describe a open-domain information extraction method for extracting
concept-instance pairs from an HTML corpus. Most earlier approaches to this
problem rely on combining clusters of distributionally similar terms and
concept-instance pairs obtained with Hearst patterns. In contrast, our method
relies on a novel approach for clustering terms found in HTML tables, and then
assigning concept names to these clusters using Hearst patterns. The method can
be efficiently applied to a large corpus, and experimental results on several
datasets show that our method can accurately extract large numbers of
concept-instance pairs.
| [
{
"version": "v1",
"created": "Mon, 1 Jul 2013 02:49:08 GMT"
}
] | 2013-07-02T00:00:00 | [
[
"Dalvi",
"Bhavana",
""
],
[
"Cohen",
"William W.",
""
],
[
"Callan",
"Jamie",
""
]
] | TITLE: WebSets: Extracting Sets of Entities from the Web Using Unsupervised
Information Extraction
ABSTRACT: We describe a open-domain information extraction method for extracting
concept-instance pairs from an HTML corpus. Most earlier approaches to this
problem rely on combining clusters of distributionally similar terms and
concept-instance pairs obtained with Hearst patterns. In contrast, our method
relies on a novel approach for clustering terms found in HTML tables, and then
assigning concept names to these clusters using Hearst patterns. The method can
be efficiently applied to a large corpus, and experimental results on several
datasets show that our method can accurately extract large numbers of
concept-instance pairs.
|
1307.0320 | Wanling Gao | Wanling Gao, Yuqing Zhu, Zhen Jia, Chunjie Luo, Lei Wang, Zhiguo Li,
Jianfeng Zhan, Yong Qi, Yongqiang He, Shiming Gong, Xiaona Li, Shujie Zhang,
and Bizhu Qiu | BigDataBench: a Big Data Benchmark Suite from Web Search Engines | 7 pages, 5 figures, The Third Workshop on Architectures and Systems
for Big Data(ASBD 2013) in conjunction with The 40th International Symposium
on Computer Architecture, May 2013 | null | null | null | cs.IR cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper presents our joint research efforts on big data benchmarking with
several industrial partners. Considering the complexity, diversity, workload
churns, and rapid evolution of big data systems, we take an incremental
approach in big data benchmarking. For the first step, we pay attention to
search engines, which are the most important domain in Internet services in
terms of the number of page views and daily visitors. However, search engine
service providers treat data, applications, and web access logs as business
confidentiality, which prevents us from building benchmarks. To overcome those
difficulties, with several industry partners, we widely investigated the open
source solutions in search engines, and obtained the permission of using
anonymous Web access logs. Moreover, with two years' great efforts, we created
a sematic search engine named ProfSearch (available from
http://prof.ict.ac.cn). These efforts pave the path for our big data benchmark
suite from search engines---BigDataBench, which is released on the web page
(http://prof.ict.ac.cn/BigDataBench). We report our detailed analysis of search
engine workloads, and present our benchmarking methodology. An innovative data
generation methodology and tool are proposed to generate scalable volumes of
big data from a small seed of real data, preserving semantics and locality of
data. Also, we preliminarily report two case studies using BigDataBench for
both system and architecture researches.
| [
{
"version": "v1",
"created": "Mon, 1 Jul 2013 10:27:48 GMT"
}
] | 2013-07-02T00:00:00 | [
[
"Gao",
"Wanling",
""
],
[
"Zhu",
"Yuqing",
""
],
[
"Jia",
"Zhen",
""
],
[
"Luo",
"Chunjie",
""
],
[
"Wang",
"Lei",
""
],
[
"Li",
"Zhiguo",
""
],
[
"Zhan",
"Jianfeng",
""
],
[
"Qi",
"Yong",
""
],
[
"He",
"Yongqiang",
""
],
[
"Gong",
"Shiming",
""
],
[
"Li",
"Xiaona",
""
],
[
"Zhang",
"Shujie",
""
],
[
"Qiu",
"Bizhu",
""
]
] | TITLE: BigDataBench: a Big Data Benchmark Suite from Web Search Engines
ABSTRACT: This paper presents our joint research efforts on big data benchmarking with
several industrial partners. Considering the complexity, diversity, workload
churns, and rapid evolution of big data systems, we take an incremental
approach in big data benchmarking. For the first step, we pay attention to
search engines, which are the most important domain in Internet services in
terms of the number of page views and daily visitors. However, search engine
service providers treat data, applications, and web access logs as business
confidentiality, which prevents us from building benchmarks. To overcome those
difficulties, with several industry partners, we widely investigated the open
source solutions in search engines, and obtained the permission of using
anonymous Web access logs. Moreover, with two years' great efforts, we created
a sematic search engine named ProfSearch (available from
http://prof.ict.ac.cn). These efforts pave the path for our big data benchmark
suite from search engines---BigDataBench, which is released on the web page
(http://prof.ict.ac.cn/BigDataBench). We report our detailed analysis of search
engine workloads, and present our benchmarking methodology. An innovative data
generation methodology and tool are proposed to generate scalable volumes of
big data from a small seed of real data, preserving semantics and locality of
data. Also, we preliminarily report two case studies using BigDataBench for
both system and architecture researches.
|
1307.0414 | Ian Goodfellow | Ian J. Goodfellow, Dumitru Erhan, Pierre Luc Carrier, Aaron Courville,
Mehdi Mirza, Ben Hamner, Will Cukierski, Yichuan Tang, David Thaler,
Dong-Hyun Lee, Yingbo Zhou, Chetan Ramaiah, Fangxiang Feng, Ruifan Li,
Xiaojie Wang, Dimitris Athanasakis, John Shawe-Taylor, Maxim Milakov, John
Park, Radu Ionescu, Marius Popescu, Cristian Grozea, James Bergstra, Jingjing
Xie, Lukasz Romaszko, Bing Xu, Zhang Chuang, and Yoshua Bengio | Challenges in Representation Learning: A report on three machine
learning contests | 8 pages, 2 figures | null | null | null | stat.ML cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The ICML 2013 Workshop on Challenges in Representation Learning focused on
three challenges: the black box learning challenge, the facial expression
recognition challenge, and the multimodal learning challenge. We describe the
datasets created for these challenges and summarize the results of the
competitions. We provide suggestions for organizers of future challenges and
some comments on what kind of knowledge can be gained from machine learning
competitions.
| [
{
"version": "v1",
"created": "Mon, 1 Jul 2013 15:53:22 GMT"
}
] | 2013-07-02T00:00:00 | [
[
"Goodfellow",
"Ian J.",
""
],
[
"Erhan",
"Dumitru",
""
],
[
"Carrier",
"Pierre Luc",
""
],
[
"Courville",
"Aaron",
""
],
[
"Mirza",
"Mehdi",
""
],
[
"Hamner",
"Ben",
""
],
[
"Cukierski",
"Will",
""
],
[
"Tang",
"Yichuan",
""
],
[
"Thaler",
"David",
""
],
[
"Lee",
"Dong-Hyun",
""
],
[
"Zhou",
"Yingbo",
""
],
[
"Ramaiah",
"Chetan",
""
],
[
"Feng",
"Fangxiang",
""
],
[
"Li",
"Ruifan",
""
],
[
"Wang",
"Xiaojie",
""
],
[
"Athanasakis",
"Dimitris",
""
],
[
"Shawe-Taylor",
"John",
""
],
[
"Milakov",
"Maxim",
""
],
[
"Park",
"John",
""
],
[
"Ionescu",
"Radu",
""
],
[
"Popescu",
"Marius",
""
],
[
"Grozea",
"Cristian",
""
],
[
"Bergstra",
"James",
""
],
[
"Xie",
"Jingjing",
""
],
[
"Romaszko",
"Lukasz",
""
],
[
"Xu",
"Bing",
""
],
[
"Chuang",
"Zhang",
""
],
[
"Bengio",
"Yoshua",
""
]
] | TITLE: Challenges in Representation Learning: A report on three machine
learning contests
ABSTRACT: The ICML 2013 Workshop on Challenges in Representation Learning focused on
three challenges: the black box learning challenge, the facial expression
recognition challenge, and the multimodal learning challenge. We describe the
datasets created for these challenges and summarize the results of the
competitions. We provide suggestions for organizers of future challenges and
some comments on what kind of knowledge can be gained from machine learning
competitions.
|
1307.0475 | Faraz Ahmed | Faraz Ahmed, Rong Jin and Alex X. Liu | A Random Matrix Approach to Differential Privacy and Structure Preserved
Social Network Graph Publishing | null | null | null | null | cs.CR cs.SI physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Online social networks are being increasingly used for analyzing various
societal phenomena such as epidemiology, information dissemination, marketing
and sentiment flow. Popular analysis techniques such as clustering and
influential node analysis, require the computation of eigenvectors of the real
graph's adjacency matrix. Recent de-anonymization attacks on Netflix and AOL
datasets show that an open access to such graphs pose privacy threats. Among
the various privacy preserving models, Differential privacy provides the
strongest privacy guarantees.
In this paper we propose a privacy preserving mechanism for publishing social
network graph data, which satisfies differential privacy guarantees by
utilizing a combination of theory of random matrix and that of differential
privacy. The key idea is to project each row of an adjacency matrix to a low
dimensional space using the random projection approach and then perturb the
projected matrix with random noise. We show that as compared to existing
approaches for differential private approximation of eigenvectors, our approach
is computationally efficient, preserves the utility and satisfies differential
privacy. We evaluate our approach on social network graphs of Facebook, Live
Journal and Pokec. The results show that even for high values of noise variance
sigma=1 the clustering quality given by normalized mutual information gain is
as low as 0.74. For influential node discovery, the propose approach is able to
correctly recover 80 of the most influential nodes. We also compare our results
with an approach presented in [43], which directly perturbs the eigenvector of
the original data by a Laplacian noise. The results show that this approach
requires a large random perturbation in order to preserve the differential
privacy, which leads to a poor estimation of eigenvectors for large social
networks.
| [
{
"version": "v1",
"created": "Mon, 1 Jul 2013 18:46:28 GMT"
}
] | 2013-07-02T00:00:00 | [
[
"Ahmed",
"Faraz",
""
],
[
"Jin",
"Rong",
""
],
[
"Liu",
"Alex X.",
""
]
] | TITLE: A Random Matrix Approach to Differential Privacy and Structure Preserved
Social Network Graph Publishing
ABSTRACT: Online social networks are being increasingly used for analyzing various
societal phenomena such as epidemiology, information dissemination, marketing
and sentiment flow. Popular analysis techniques such as clustering and
influential node analysis, require the computation of eigenvectors of the real
graph's adjacency matrix. Recent de-anonymization attacks on Netflix and AOL
datasets show that an open access to such graphs pose privacy threats. Among
the various privacy preserving models, Differential privacy provides the
strongest privacy guarantees.
In this paper we propose a privacy preserving mechanism for publishing social
network graph data, which satisfies differential privacy guarantees by
utilizing a combination of theory of random matrix and that of differential
privacy. The key idea is to project each row of an adjacency matrix to a low
dimensional space using the random projection approach and then perturb the
projected matrix with random noise. We show that as compared to existing
approaches for differential private approximation of eigenvectors, our approach
is computationally efficient, preserves the utility and satisfies differential
privacy. We evaluate our approach on social network graphs of Facebook, Live
Journal and Pokec. The results show that even for high values of noise variance
sigma=1 the clustering quality given by normalized mutual information gain is
as low as 0.74. For influential node discovery, the propose approach is able to
correctly recover 80 of the most influential nodes. We also compare our results
with an approach presented in [43], which directly perturbs the eigenvector of
the original data by a Laplacian noise. The results show that this approach
requires a large random perturbation in order to preserve the differential
privacy, which leads to a poor estimation of eigenvectors for large social
networks.
|
1305.3250 | Cristian Popescu | Marian Popescu, Peter J. Dugan, Mohammad Pourhomayoun, Denise Risch,
Harold W. Lewis III, Christopher W. Clark | Bioacoustical Periodic Pulse Train Signal Detection and Classification
using Spectrogram Intensity Binarization and Energy Projection | ICML 2013 Workshop on Machine Learning for Bioacoustics, 2013, 6
pages | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The following work outlines an approach for automatic detection and
recognition of periodic pulse train signals using a multi-stage process based
on spectrogram edge detection, energy projection and classification. The method
has been implemented to automatically detect and recognize pulse train songs of
minke whales. While the long term goal of this work is to properly identify and
detect minke songs from large multi-year datasets, this effort was developed
using sounds off the coast of Massachusetts, in the Stellwagen Bank National
Marine Sanctuary. The detection methodology is presented and evaluated on 232
continuous hours of acoustic recordings and a qualitative analysis of machine
learning classifiers and their performance is described. The trained automatic
detection and classification system is applied to 120 continuous hours,
comprised of various challenges such as broadband and narrowband noises, low
SNR, and other pulse train signatures. This automatic system achieves a TPR of
63% for FPR of 0.6% (or 0.87 FP/h), at a Precision (PPV) of 84% and an F1 score
of 71%.
| [
{
"version": "v1",
"created": "Tue, 14 May 2013 18:49:52 GMT"
},
{
"version": "v2",
"created": "Mon, 17 Jun 2013 20:09:07 GMT"
},
{
"version": "v3",
"created": "Fri, 28 Jun 2013 17:33:59 GMT"
}
] | 2013-07-01T00:00:00 | [
[
"Popescu",
"Marian",
""
],
[
"Dugan",
"Peter J.",
""
],
[
"Pourhomayoun",
"Mohammad",
""
],
[
"Risch",
"Denise",
""
],
[
"Lewis",
"Harold W.",
"III"
],
[
"Clark",
"Christopher W.",
""
]
] | TITLE: Bioacoustical Periodic Pulse Train Signal Detection and Classification
using Spectrogram Intensity Binarization and Energy Projection
ABSTRACT: The following work outlines an approach for automatic detection and
recognition of periodic pulse train signals using a multi-stage process based
on spectrogram edge detection, energy projection and classification. The method
has been implemented to automatically detect and recognize pulse train songs of
minke whales. While the long term goal of this work is to properly identify and
detect minke songs from large multi-year datasets, this effort was developed
using sounds off the coast of Massachusetts, in the Stellwagen Bank National
Marine Sanctuary. The detection methodology is presented and evaluated on 232
continuous hours of acoustic recordings and a qualitative analysis of machine
learning classifiers and their performance is described. The trained automatic
detection and classification system is applied to 120 continuous hours,
comprised of various challenges such as broadband and narrowband noises, low
SNR, and other pulse train signatures. This automatic system achieves a TPR of
63% for FPR of 0.6% (or 0.87 FP/h), at a Precision (PPV) of 84% and an F1 score
of 71%.
|
1306.6805 | Sara Hajian | Sara Hajian | Simultaneous Discrimination Prevention and Privacy Protection in Data
Publishing and Mining | PhD Thesis defended on June 10, 2013, at the Department of Computer
Engineering and Mathematics of Universitat Rovira i Virgili. Advisors: Josep
Domingo-Ferrer and Dino Pedreschi | null | null | null | cs.DB cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Data mining is an increasingly important technology for extracting useful
knowledge hidden in large collections of data. There are, however, negative
social perceptions about data mining, among which potential privacy violation
and potential discrimination. Automated data collection and data mining
techniques such as classification have paved the way to making automated
decisions, like loan granting/denial, insurance premium computation. If the
training datasets are biased in what regards discriminatory attributes like
gender, race, religion, discriminatory decisions may ensue. In the first part
of this thesis, we tackle discrimination prevention in data mining and propose
new techniques applicable for direct or indirect discrimination prevention
individually or both at the same time. We discuss how to clean training
datasets and outsourced datasets in such a way that direct and/or indirect
discriminatory decision rules are converted to legitimate (non-discriminatory)
classification rules. In the second part of this thesis, we argue that privacy
and discrimination risks should be tackled together. We explore the
relationship between privacy preserving data mining and discrimination
prevention in data mining to design holistic approaches capable of addressing
both threats simultaneously during the knowledge discovery process. As part of
this effort, we have investigated for the first time the problem of
discrimination and privacy aware frequent pattern discovery, i.e. the
sanitization of the collection of patterns mined from a transaction database in
such a way that neither privacy-violating nor discriminatory inferences can be
inferred on the released patterns. Moreover, we investigate the problem of
discrimination and privacy aware data publishing, i.e. transforming the data,
instead of patterns, in order to simultaneously fulfill privacy preservation
and discrimination prevention.
| [
{
"version": "v1",
"created": "Fri, 28 Jun 2013 12:00:56 GMT"
}
] | 2013-07-01T00:00:00 | [
[
"Hajian",
"Sara",
""
]
] | TITLE: Simultaneous Discrimination Prevention and Privacy Protection in Data
Publishing and Mining
ABSTRACT: Data mining is an increasingly important technology for extracting useful
knowledge hidden in large collections of data. There are, however, negative
social perceptions about data mining, among which potential privacy violation
and potential discrimination. Automated data collection and data mining
techniques such as classification have paved the way to making automated
decisions, like loan granting/denial, insurance premium computation. If the
training datasets are biased in what regards discriminatory attributes like
gender, race, religion, discriminatory decisions may ensue. In the first part
of this thesis, we tackle discrimination prevention in data mining and propose
new techniques applicable for direct or indirect discrimination prevention
individually or both at the same time. We discuss how to clean training
datasets and outsourced datasets in such a way that direct and/or indirect
discriminatory decision rules are converted to legitimate (non-discriminatory)
classification rules. In the second part of this thesis, we argue that privacy
and discrimination risks should be tackled together. We explore the
relationship between privacy preserving data mining and discrimination
prevention in data mining to design holistic approaches capable of addressing
both threats simultaneously during the knowledge discovery process. As part of
this effort, we have investigated for the first time the problem of
discrimination and privacy aware frequent pattern discovery, i.e. the
sanitization of the collection of patterns mined from a transaction database in
such a way that neither privacy-violating nor discriminatory inferences can be
inferred on the released patterns. Moreover, we investigate the problem of
discrimination and privacy aware data publishing, i.e. transforming the data,
instead of patterns, in order to simultaneously fulfill privacy preservation
and discrimination prevention.
|
1306.6811 | Vladimir P. Gerdt | Vladimir P. Gerdt, Amir Hashemi, Benyamin M.-Alizadeh | Involutive Bases Algorithm Incorporating F5 Criterion | 24 pages, 2 figures | null | null | null | math.AC cs.SC math.RA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Faugere's F5 algorithm is the fastest known algorithm to compute Groebner
bases. It has a signature-based and an incremental structure that allow to
apply the F5 criterion for deletion of unnecessary reductions. In this paper,
we present an involutive completion algorithm which outputs a minimal
involutive basis. Our completion algorithm has a nonincremental structure and
in addition to the involutive form of Buchberger's criteria it applies the F5
criterion whenever this criterion is applicable in the course of completion to
involution. In doing so, we use the G2V form of the F5 criterion developed by
Gao, Guan and Volny IV. To compare the proposed algorithm, via a set of
benchmarks, with the Gerdt-Blinkov involutive algorithm (which does not apply
the F5 criterion) we use implementations of both algorithms done on the same
platform in Maple.
| [
{
"version": "v1",
"created": "Fri, 28 Jun 2013 12:33:06 GMT"
}
] | 2013-07-01T00:00:00 | [
[
"Gerdt",
"Vladimir P.",
""
],
[
"Hashemi",
"Amir",
""
],
[
"-Alizadeh",
"Benyamin M.",
""
]
] | TITLE: Involutive Bases Algorithm Incorporating F5 Criterion
ABSTRACT: Faugere's F5 algorithm is the fastest known algorithm to compute Groebner
bases. It has a signature-based and an incremental structure that allow to
apply the F5 criterion for deletion of unnecessary reductions. In this paper,
we present an involutive completion algorithm which outputs a minimal
involutive basis. Our completion algorithm has a nonincremental structure and
in addition to the involutive form of Buchberger's criteria it applies the F5
criterion whenever this criterion is applicable in the course of completion to
involution. In doing so, we use the G2V form of the F5 criterion developed by
Gao, Guan and Volny IV. To compare the proposed algorithm, via a set of
benchmarks, with the Gerdt-Blinkov involutive algorithm (which does not apply
the F5 criterion) we use implementations of both algorithms done on the same
platform in Maple.
|
1306.6842 | Dimitris Arabadjis | Dimitris Arabadjis, Fotios Giannopoulos, Constantin Papaodysseus,
Solomon Zannos, Panayiotis Rousopoulos, Michail Panagopoulos, Christopher
Blackwell | New Mathematical and Algorithmic Schemes for Pattern Classification with
Application to the Identification of Writers of Important Ancient Documents | null | Pattern Recognition, Volume 46, Issue 8, Pages 2278-2296, August
2013 | 10.1016/j.patcog.2013.01.019 | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, a novel approach is introduced for classifying curves into
proper families, according to their similarity. First, a mathematical quantity
we call plane curvature is introduced and a number of propositions are stated
and proved. Proper similarity measures of two curves are introduced and a
subsequent statistical analysis is applied. First, the efficiency of the curve
fitting process has been tested on 2 shapes datasets of reference. Next, the
methodology has been applied to the very important problem of classifying 23
Byzantine codices and 46 Ancient inscriptions to their writers, thus achieving
correct dating of their content. The inscriptions have been attributed to ten
individual hands and the Byzantine codices to four writers.
| [
{
"version": "v1",
"created": "Fri, 28 Jun 2013 13:51:18 GMT"
}
] | 2013-07-01T00:00:00 | [
[
"Arabadjis",
"Dimitris",
""
],
[
"Giannopoulos",
"Fotios",
""
],
[
"Papaodysseus",
"Constantin",
""
],
[
"Zannos",
"Solomon",
""
],
[
"Rousopoulos",
"Panayiotis",
""
],
[
"Panagopoulos",
"Michail",
""
],
[
"Blackwell",
"Christopher",
""
]
] | TITLE: New Mathematical and Algorithmic Schemes for Pattern Classification with
Application to the Identification of Writers of Important Ancient Documents
ABSTRACT: In this paper, a novel approach is introduced for classifying curves into
proper families, according to their similarity. First, a mathematical quantity
we call plane curvature is introduced and a number of propositions are stated
and proved. Proper similarity measures of two curves are introduced and a
subsequent statistical analysis is applied. First, the efficiency of the curve
fitting process has been tested on 2 shapes datasets of reference. Next, the
methodology has been applied to the very important problem of classifying 23
Byzantine codices and 46 Ancient inscriptions to their writers, thus achieving
correct dating of their content. The inscriptions have been attributed to ten
individual hands and the Byzantine codices to four writers.
|
1204.4224 | Eric Schulte | Eric Schulte and Zachary P. Fry and Ethan Fast and Westley Weimer and
Stephanie Forrest | Software Mutational Robustness | null | null | null | null | cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Neutral landscapes and mutational robustness are believed to be important
enablers of evolvability in biology. We apply these concepts to software,
defining mutational robustness to be the fraction of random mutations that
leave a program's behavior unchanged. Test cases are used to measure program
behavior and mutation operators are taken from genetic programming. Although
software is often viewed as brittle, with small changes leading to catastrophic
changes in behavior, our results show surprising robustness in the face of
random software mutations.
The paper describes empirical studies of the mutational robustness of 22
programs, including 14 production software projects, the Siemens benchmarks,
and 4 specially constructed programs. We find that over 30% of random mutations
are neutral with respect to their test suite. The results hold across all
classes of programs, for mutations at both the source code and assembly
instruction levels, across various programming languages, and are only weakly
related to test suite coverage. We conclude that mutational robustness is an
inherent property of software, and that neutral variants (i.e., those that pass
the test suite) often fulfill the program's original purpose or specification.
Based on these results, we conjecture that neutral mutations can be leveraged
as a mechanism for generating software diversity. We demonstrate this idea by
generating a population of neutral program variants and showing that the
variants automatically repair unknown bugs with high probability. Neutral
landscapes also provide a partial explanation for recent results that use
evolutionary computation to automatically repair software bugs.
| [
{
"version": "v1",
"created": "Wed, 18 Apr 2012 23:28:43 GMT"
},
{
"version": "v2",
"created": "Wed, 12 Dec 2012 21:57:16 GMT"
},
{
"version": "v3",
"created": "Thu, 27 Jun 2013 19:20:01 GMT"
}
] | 2013-06-28T00:00:00 | [
[
"Schulte",
"Eric",
""
],
[
"Fry",
"Zachary P.",
""
],
[
"Fast",
"Ethan",
""
],
[
"Weimer",
"Westley",
""
],
[
"Forrest",
"Stephanie",
""
]
] | TITLE: Software Mutational Robustness
ABSTRACT: Neutral landscapes and mutational robustness are believed to be important
enablers of evolvability in biology. We apply these concepts to software,
defining mutational robustness to be the fraction of random mutations that
leave a program's behavior unchanged. Test cases are used to measure program
behavior and mutation operators are taken from genetic programming. Although
software is often viewed as brittle, with small changes leading to catastrophic
changes in behavior, our results show surprising robustness in the face of
random software mutations.
The paper describes empirical studies of the mutational robustness of 22
programs, including 14 production software projects, the Siemens benchmarks,
and 4 specially constructed programs. We find that over 30% of random mutations
are neutral with respect to their test suite. The results hold across all
classes of programs, for mutations at both the source code and assembly
instruction levels, across various programming languages, and are only weakly
related to test suite coverage. We conclude that mutational robustness is an
inherent property of software, and that neutral variants (i.e., those that pass
the test suite) often fulfill the program's original purpose or specification.
Based on these results, we conjecture that neutral mutations can be leveraged
as a mechanism for generating software diversity. We demonstrate this idea by
generating a population of neutral program variants and showing that the
variants automatically repair unknown bugs with high probability. Neutral
landscapes also provide a partial explanation for recent results that use
evolutionary computation to automatically repair software bugs.
|
1302.0621 | Patrick P. C. Lee | Chun-Ho Ng and Patrick P. C. Lee | RevDedup: A Reverse Deduplication Storage System Optimized for Reads to
Latest Backups | A 7-page version appeared in APSys'13 | null | null | null | cs.DC cs.OS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Scaling up the backup storage for an ever-increasing volume of virtual
machine (VM) images is a critical issue in virtualization environments. While
deduplication is known to effectively eliminate duplicates for VM image
storage, it also introduces fragmentation that will degrade read performance.
We propose RevDedup, a deduplication system that optimizes reads to latest VM
image backups using an idea called reverse deduplication. In contrast with
conventional deduplication that removes duplicates from new data, RevDedup
removes duplicates from old data, thereby shifting fragmentation to old data
while keeping the layout of new data as sequential as possible. We evaluate our
RevDedup prototype using microbenchmark and real-world workloads. For a 12-week
span of real-world VM images from 160 users, RevDedup achieves high
deduplication efficiency with around 97% of saving, and high backup and read
throughput on the order of 1GB/s. RevDedup also incurs small metadata overhead
in backup/read operations.
| [
{
"version": "v1",
"created": "Mon, 4 Feb 2013 09:09:38 GMT"
},
{
"version": "v2",
"created": "Wed, 6 Feb 2013 12:32:32 GMT"
},
{
"version": "v3",
"created": "Thu, 27 Jun 2013 06:04:17 GMT"
}
] | 2013-06-28T00:00:00 | [
[
"Ng",
"Chun-Ho",
""
],
[
"Lee",
"Patrick P. C.",
""
]
] | TITLE: RevDedup: A Reverse Deduplication Storage System Optimized for Reads to
Latest Backups
ABSTRACT: Scaling up the backup storage for an ever-increasing volume of virtual
machine (VM) images is a critical issue in virtualization environments. While
deduplication is known to effectively eliminate duplicates for VM image
storage, it also introduces fragmentation that will degrade read performance.
We propose RevDedup, a deduplication system that optimizes reads to latest VM
image backups using an idea called reverse deduplication. In contrast with
conventional deduplication that removes duplicates from new data, RevDedup
removes duplicates from old data, thereby shifting fragmentation to old data
while keeping the layout of new data as sequential as possible. We evaluate our
RevDedup prototype using microbenchmark and real-world workloads. For a 12-week
span of real-world VM images from 160 users, RevDedup achieves high
deduplication efficiency with around 97% of saving, and high backup and read
throughput on the order of 1GB/s. RevDedup also incurs small metadata overhead
in backup/read operations.
|
1304.1838 | Jagan Sankaranarayanan | Jeff LeFevre, Jagan Sankaranarayanan, Hakan Hacigumus, Junichi
Tatemura, Neoklis Polyzotis | Towards a Workload for Evolutionary Analytics | 10 pages | DanaC: Workshop on Data analytics in the Cloud, June 2013, New
York, NY | null | null | cs.DB cs.DC cs.PF | http://creativecommons.org/licenses/by-nc-sa/3.0/ | Emerging data analysis involves the ingestion and exploration of new data
sets, application of complex functions, and frequent query revisions based on
observing prior query answers. We call this new type of analysis evolutionary
analytics and identify its properties. This type of analysis is not well
represented by current benchmark workloads. In this paper, we present a
workload and identify several metrics to test system support for evolutionary
analytics. Along with our metrics, we present methodologies for running the
workload that capture this analytical scenario.
| [
{
"version": "v1",
"created": "Sat, 6 Apr 2013 00:26:41 GMT"
},
{
"version": "v2",
"created": "Fri, 12 Apr 2013 07:00:10 GMT"
},
{
"version": "v3",
"created": "Thu, 27 Jun 2013 19:19:22 GMT"
}
] | 2013-06-28T00:00:00 | [
[
"LeFevre",
"Jeff",
""
],
[
"Sankaranarayanan",
"Jagan",
""
],
[
"Hacigumus",
"Hakan",
""
],
[
"Tatemura",
"Junichi",
""
],
[
"Polyzotis",
"Neoklis",
""
]
] | TITLE: Towards a Workload for Evolutionary Analytics
ABSTRACT: Emerging data analysis involves the ingestion and exploration of new data
sets, application of complex functions, and frequent query revisions based on
observing prior query answers. We call this new type of analysis evolutionary
analytics and identify its properties. This type of analysis is not well
represented by current benchmark workloads. In this paper, we present a
workload and identify several metrics to test system support for evolutionary
analytics. Along with our metrics, we present methodologies for running the
workload that capture this analytical scenario.
|
1302.5192 | Kyumars Sheykh Esmaili | Kyumars Sheykh Esmaili, Lluis Pamies-Juarez, Anwitaman Datta | The CORE Storage Primitive: Cross-Object Redundancy for Efficient Data
Repair & Access in Erasure Coded Storage | null | null | null | null | cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Erasure codes are an integral part of many distributed storage systems aimed
at Big Data, since they provide high fault-tolerance for low overheads.
However, traditional erasure codes are inefficient on reading stored data in
degraded environments (when nodes might be unavailable), and on replenishing
lost data (vital for long term resilience). Consequently, novel codes optimized
to cope with distributed storage system nuances are vigorously being
researched. In this paper, we take an engineering alternative, exploring the
use of simple and mature techniques -juxtaposing a standard erasure code with
RAID-4 like parity. We carry out an analytical study to determine the efficacy
of this approach over traditional as well as some novel codes. We build upon
this study to design CORE, a general storage primitive that we integrate into
HDFS. We benchmark this implementation in a proprietary cluster and in EC2. Our
experiments show that compared to traditional erasure codes, CORE uses 50% less
bandwidth and is up to 75% faster while recovering a single failed node, while
the gains are respectively 15% and 60% for double node failures.
| [
{
"version": "v1",
"created": "Thu, 21 Feb 2013 06:14:04 GMT"
},
{
"version": "v2",
"created": "Tue, 18 Jun 2013 13:59:05 GMT"
},
{
"version": "v3",
"created": "Wed, 19 Jun 2013 12:49:47 GMT"
},
{
"version": "v4",
"created": "Wed, 26 Jun 2013 05:32:41 GMT"
}
] | 2013-06-27T00:00:00 | [
[
"Esmaili",
"Kyumars Sheykh",
""
],
[
"Pamies-Juarez",
"Lluis",
""
],
[
"Datta",
"Anwitaman",
""
]
] | TITLE: The CORE Storage Primitive: Cross-Object Redundancy for Efficient Data
Repair & Access in Erasure Coded Storage
ABSTRACT: Erasure codes are an integral part of many distributed storage systems aimed
at Big Data, since they provide high fault-tolerance for low overheads.
However, traditional erasure codes are inefficient on reading stored data in
degraded environments (when nodes might be unavailable), and on replenishing
lost data (vital for long term resilience). Consequently, novel codes optimized
to cope with distributed storage system nuances are vigorously being
researched. In this paper, we take an engineering alternative, exploring the
use of simple and mature techniques -juxtaposing a standard erasure code with
RAID-4 like parity. We carry out an analytical study to determine the efficacy
of this approach over traditional as well as some novel codes. We build upon
this study to design CORE, a general storage primitive that we integrate into
HDFS. We benchmark this implementation in a proprietary cluster and in EC2. Our
experiments show that compared to traditional erasure codes, CORE uses 50% less
bandwidth and is up to 75% faster while recovering a single failed node, while
the gains are respectively 15% and 60% for double node failures.
|
1306.6058 | Reza Farrahi Moghaddam | Reza Farrahi Moghaddam, Shaohua Chen, Rachid Hedjam, Mohamed Cheriet | A maximal-information color to gray conversion method for document
images: Toward an optimal grayscale representation for document image
binarization | 36 page, the uncompressed version is available on Synchromedia
website | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A novel method to convert color/multi-spectral images to gray-level images is
introduced to increase the performance of document binarization methods. The
method uses the distribution of the pixel data of the input document image in a
color space to find a transformation, called the dual transform, which balances
the amount of information on all color channels. Furthermore, in order to
reduce the intensity variations on the gray output, a color reduction
preprocessing step is applied. Then, a channel is selected as the gray value
representation of the document image based on the homogeneity criterion on the
text regions. In this way, the proposed method can provide a
luminance-independent contrast enhancement. The performance of the method is
evaluated against various images from two databases, the ICDAR'03 Robust
Reading, the KAIST and the DIBCO'09 datasets, subjectively and objectively with
promising results. The ground truth images for the images from the ICDAR'03
Robust Reading dataset have been created manually by the authors.
| [
{
"version": "v1",
"created": "Tue, 25 Jun 2013 18:41:04 GMT"
},
{
"version": "v2",
"created": "Wed, 26 Jun 2013 12:20:20 GMT"
}
] | 2013-06-27T00:00:00 | [
[
"Moghaddam",
"Reza Farrahi",
""
],
[
"Chen",
"Shaohua",
""
],
[
"Hedjam",
"Rachid",
""
],
[
"Cheriet",
"Mohamed",
""
]
] | TITLE: A maximal-information color to gray conversion method for document
images: Toward an optimal grayscale representation for document image
binarization
ABSTRACT: A novel method to convert color/multi-spectral images to gray-level images is
introduced to increase the performance of document binarization methods. The
method uses the distribution of the pixel data of the input document image in a
color space to find a transformation, called the dual transform, which balances
the amount of information on all color channels. Furthermore, in order to
reduce the intensity variations on the gray output, a color reduction
preprocessing step is applied. Then, a channel is selected as the gray value
representation of the document image based on the homogeneity criterion on the
text regions. In this way, the proposed method can provide a
luminance-independent contrast enhancement. The performance of the method is
evaluated against various images from two databases, the ICDAR'03 Robust
Reading, the KAIST and the DIBCO'09 datasets, subjectively and objectively with
promising results. The ground truth images for the images from the ICDAR'03
Robust Reading dataset have been created manually by the authors.
|
1306.3860 | Samuel R\"onnqvist | Peter Sarlin and Samuel R\"onnqvist | Cluster coloring of the Self-Organizing Map: An information
visualization perspective | Forthcoming in Proceedings of 17th International Conference
Information Visualisation (2013) | null | null | null | cs.LG cs.HC | http://creativecommons.org/licenses/by-nc-sa/3.0/ | This paper takes an information visualization perspective to visual
representations in the general SOM paradigm. This involves viewing SOM-based
visualizations through the eyes of Bertin's and Tufte's theories on data
graphics. The regular grid shape of the Self-Organizing Map (SOM), while being
a virtue for linking visualizations to it, restricts representation of cluster
structures. From the viewpoint of information visualization, this paper
provides a general, yet simple, solution to projection-based coloring of the
SOM that reveals structures. First, the proposed color space is easy to
construct and customize to the purpose of use, while aiming at being
perceptually correct and informative through two separable dimensions. Second,
the coloring method is not dependent on any specific method of projection, but
is rather modular to fit any objective function suitable for the task at hand.
The cluster coloring is illustrated on two datasets: the iris data, and welfare
and poverty indicators.
| [
{
"version": "v1",
"created": "Mon, 17 Jun 2013 13:57:00 GMT"
}
] | 2013-06-26T00:00:00 | [
[
"Sarlin",
"Peter",
""
],
[
"Rönnqvist",
"Samuel",
""
]
] | TITLE: Cluster coloring of the Self-Organizing Map: An information
visualization perspective
ABSTRACT: This paper takes an information visualization perspective to visual
representations in the general SOM paradigm. This involves viewing SOM-based
visualizations through the eyes of Bertin's and Tufte's theories on data
graphics. The regular grid shape of the Self-Organizing Map (SOM), while being
a virtue for linking visualizations to it, restricts representation of cluster
structures. From the viewpoint of information visualization, this paper
provides a general, yet simple, solution to projection-based coloring of the
SOM that reveals structures. First, the proposed color space is easy to
construct and customize to the purpose of use, while aiming at being
perceptually correct and informative through two separable dimensions. Second,
the coloring method is not dependent on any specific method of projection, but
is rather modular to fit any objective function suitable for the task at hand.
The cluster coloring is illustrated on two datasets: the iris data, and welfare
and poverty indicators.
|
1306.1840 | Paul Mineiro | Paul Mineiro, Nikos Karampatziakis | Loss-Proportional Subsampling for Subsequent ERM | Appears in the proceedings of the 30th International Conference on
Machine Learning | null | null | null | cs.LG stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose a sampling scheme suitable for reducing a data set prior to
selecting a hypothesis with minimum empirical risk. The sampling only considers
a subset of the ultimate (unknown) hypothesis set, but can nonetheless
guarantee that the final excess risk will compare favorably with utilizing the
entire original data set. We demonstrate the practical benefits of our approach
on a large dataset which we subsample and subsequently fit with boosted trees.
| [
{
"version": "v1",
"created": "Fri, 7 Jun 2013 20:12:17 GMT"
},
{
"version": "v2",
"created": "Sun, 23 Jun 2013 05:32:31 GMT"
}
] | 2013-06-25T00:00:00 | [
[
"Mineiro",
"Paul",
""
],
[
"Karampatziakis",
"Nikos",
""
]
] | TITLE: Loss-Proportional Subsampling for Subsequent ERM
ABSTRACT: We propose a sampling scheme suitable for reducing a data set prior to
selecting a hypothesis with minimum empirical risk. The sampling only considers
a subset of the ultimate (unknown) hypothesis set, but can nonetheless
guarantee that the final excess risk will compare favorably with utilizing the
entire original data set. We demonstrate the practical benefits of our approach
on a large dataset which we subsample and subsequently fit with boosted trees.
|
1306.5305 | Gabor Fodor | Gabor Fodor, Marco Belleschi, Demia D. Penda, Aidilla Pradini, Mikael
Johansson, Andrea Abrardo | Benchmarking Practical RRM Algorithms for D2D Communications in LTE
Advanced | 30 pages, submitted for review April-2013. See also: G. Fodor, M.
Johansson, D. P. Demia, B. Marco, and A. Abrardo, A joint power control and
resource allocation algorithm for D2D communications, KTH, Automatic Control,
Tech. Rep., 2012, qC 20120910,
http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-102057 | null | null | null | cs.IT cs.NI math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Device-to-device (D2D) communication integrated into cellular networks is a
means to take advantage of the proximity of devices and allow for reusing
cellular resources and thereby to increase the user bitrates and the system
capacity. However, when D2D (in the 3rd Generation Partnership Project also
called Long Term Evolution (LTE) Direct) communication in cellular spectrum is
supported, there is a need to revisit and modify the existing radio resource
management (RRM) and power control (PC) techniques to realize the potential of
the proximity and reuse gains and to limit the interference at the cellular
layer. In this paper, we examine the performance of the flexible LTE PC tool
box and benchmark it against a utility optimal iterative scheme. We find that
the open loop PC scheme of LTE performs well for cellular users both in terms
of the used transmit power levels and the achieved
signal-to-interference-and-noise-ratio (SINR) distribution. However, the
performance of the D2D users as well as the overall system throughput can be
boosted by the utility optimal scheme, because the utility maximizing scheme
takes better advantage of both the proximity and the reuse gains. Therefore, in
this paper we propose a hybrid PC scheme, in which cellular users employ the
open loop path compensation method of LTE, while D2D users use the utility
optimizing distributed PC scheme. In order to protect the cellular layer, the
hybrid scheme allows for limiting the interference caused by the D2D layer at
the cost of having a small impact on the performance of the D2D layer. To
ensure feasibility, we limit the number of iterations to a practically feasible
level. We make the point that the hybrid scheme is not only near optimal, but
it also allows for a distributed implementation for the D2D users, while
preserving the LTE PC scheme for the cellular users.
| [
{
"version": "v1",
"created": "Sat, 22 Jun 2013 10:20:45 GMT"
}
] | 2013-06-25T00:00:00 | [
[
"Fodor",
"Gabor",
""
],
[
"Belleschi",
"Marco",
""
],
[
"Penda",
"Demia D.",
""
],
[
"Pradini",
"Aidilla",
""
],
[
"Johansson",
"Mikael",
""
],
[
"Abrardo",
"Andrea",
""
]
] | TITLE: Benchmarking Practical RRM Algorithms for D2D Communications in LTE
Advanced
ABSTRACT: Device-to-device (D2D) communication integrated into cellular networks is a
means to take advantage of the proximity of devices and allow for reusing
cellular resources and thereby to increase the user bitrates and the system
capacity. However, when D2D (in the 3rd Generation Partnership Project also
called Long Term Evolution (LTE) Direct) communication in cellular spectrum is
supported, there is a need to revisit and modify the existing radio resource
management (RRM) and power control (PC) techniques to realize the potential of
the proximity and reuse gains and to limit the interference at the cellular
layer. In this paper, we examine the performance of the flexible LTE PC tool
box and benchmark it against a utility optimal iterative scheme. We find that
the open loop PC scheme of LTE performs well for cellular users both in terms
of the used transmit power levels and the achieved
signal-to-interference-and-noise-ratio (SINR) distribution. However, the
performance of the D2D users as well as the overall system throughput can be
boosted by the utility optimal scheme, because the utility maximizing scheme
takes better advantage of both the proximity and the reuse gains. Therefore, in
this paper we propose a hybrid PC scheme, in which cellular users employ the
open loop path compensation method of LTE, while D2D users use the utility
optimizing distributed PC scheme. In order to protect the cellular layer, the
hybrid scheme allows for limiting the interference caused by the D2D layer at
the cost of having a small impact on the performance of the D2D layer. To
ensure feasibility, we limit the number of iterations to a practically feasible
level. We make the point that the hybrid scheme is not only near optimal, but
it also allows for a distributed implementation for the D2D users, while
preserving the LTE PC scheme for the cellular users.
|
1207.4708 | Marc G. Bellemare | Marc G. Bellemare, Yavar Naddaf, Joel Veness, Michael Bowling | The Arcade Learning Environment: An Evaluation Platform for General
Agents | null | Journal of Artificial Intelligence Research 47, pages 253-279 | 10.1613/jair.3912 | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this article we introduce the Arcade Learning Environment (ALE): both a
challenge problem and a platform and methodology for evaluating the development
of general, domain-independent AI technology. ALE provides an interface to
hundreds of Atari 2600 game environments, each one different, interesting, and
designed to be a challenge for human players. ALE presents significant research
challenges for reinforcement learning, model learning, model-based planning,
imitation learning, transfer learning, and intrinsic motivation. Most
importantly, it provides a rigorous testbed for evaluating and comparing
approaches to these problems. We illustrate the promise of ALE by developing
and benchmarking domain-independent agents designed using well-established AI
techniques for both reinforcement learning and planning. In doing so, we also
propose an evaluation methodology made possible by ALE, reporting empirical
results on over 55 different games. All of the software, including the
benchmark agents, is publicly available.
| [
{
"version": "v1",
"created": "Thu, 19 Jul 2012 15:33:25 GMT"
},
{
"version": "v2",
"created": "Fri, 21 Jun 2013 18:07:06 GMT"
}
] | 2013-06-24T00:00:00 | [
[
"Bellemare",
"Marc G.",
""
],
[
"Naddaf",
"Yavar",
""
],
[
"Veness",
"Joel",
""
],
[
"Bowling",
"Michael",
""
]
] | TITLE: The Arcade Learning Environment: An Evaluation Platform for General
Agents
ABSTRACT: In this article we introduce the Arcade Learning Environment (ALE): both a
challenge problem and a platform and methodology for evaluating the development
of general, domain-independent AI technology. ALE provides an interface to
hundreds of Atari 2600 game environments, each one different, interesting, and
designed to be a challenge for human players. ALE presents significant research
challenges for reinforcement learning, model learning, model-based planning,
imitation learning, transfer learning, and intrinsic motivation. Most
importantly, it provides a rigorous testbed for evaluating and comparing
approaches to these problems. We illustrate the promise of ALE by developing
and benchmarking domain-independent agents designed using well-established AI
techniques for both reinforcement learning and planning. In doing so, we also
propose an evaluation methodology made possible by ALE, reporting empirical
results on over 55 different games. All of the software, including the
benchmark agents, is publicly available.
|
1305.1459 | Pier Stanislao Paolucci | Pier Stanislao Paolucci, Iuliana Bacivarov, Gert Goossens, Rainer
Leupers, Fr\'ed\'eric Rousseau, Christoph Schumacher, Lothar Thiele, Piero
Vicini | EURETILE 2010-2012 summary: first three years of activity of the
European Reference Tiled Experiment | 56 pages | null | 10.12837/2013T01 | null | cs.DC cs.AR cs.NE cs.OS cs.PL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This is the summary of first three years of activity of the EURETILE FP7
project 247846. EURETILE investigates and implements brain-inspired and
fault-tolerant foundational innovations to the system architecture of massively
parallel tiled computer architectures and the corresponding programming
paradigm. The execution targets are a many-tile HW platform, and a many-tile
simulator. A set of SW process - HW tile mapping candidates is generated by the
holistic SW tool-chain using a combination of analytic and bio-inspired
methods. The Hardware dependent Software is then generated, providing OS
services with maximum efficiency/minimal overhead. The many-tile simulator
collects profiling data, closing the loop of the SW tool chain. Fine-grain
parallelism inside processes is exploited by optimized intra-tile compilation
techniques, but the project focus is above the level of the elementary tile.
The elementary HW tile is a multi-processor, which includes a fault tolerant
Distributed Network Processor (for inter-tile communication) and ASIP
accelerators. Furthermore, EURETILE investigates and implements the innovations
for equipping the elementary HW tile with high-bandwidth, low-latency
brain-like inter-tile communication emulating 3 levels of connection hierarchy,
namely neural columns, cortical areas and cortex, and develops a dedicated
cortical simulation benchmark: DPSNN-STDP (Distributed Polychronous Spiking
Neural Net with synaptic Spiking Time Dependent Plasticity). EURETILE leverages
on the multi-tile HW paradigm and SW tool-chain developed by the FET-ACA SHAPES
Integrated Project (2006-2009).
| [
{
"version": "v1",
"created": "Tue, 7 May 2013 10:22:31 GMT"
}
] | 2013-06-24T00:00:00 | [
[
"Paolucci",
"Pier Stanislao",
""
],
[
"Bacivarov",
"Iuliana",
""
],
[
"Goossens",
"Gert",
""
],
[
"Leupers",
"Rainer",
""
],
[
"Rousseau",
"Frédéric",
""
],
[
"Schumacher",
"Christoph",
""
],
[
"Thiele",
"Lothar",
""
],
[
"Vicini",
"Piero",
""
]
] | TITLE: EURETILE 2010-2012 summary: first three years of activity of the
European Reference Tiled Experiment
ABSTRACT: This is the summary of first three years of activity of the EURETILE FP7
project 247846. EURETILE investigates and implements brain-inspired and
fault-tolerant foundational innovations to the system architecture of massively
parallel tiled computer architectures and the corresponding programming
paradigm. The execution targets are a many-tile HW platform, and a many-tile
simulator. A set of SW process - HW tile mapping candidates is generated by the
holistic SW tool-chain using a combination of analytic and bio-inspired
methods. The Hardware dependent Software is then generated, providing OS
services with maximum efficiency/minimal overhead. The many-tile simulator
collects profiling data, closing the loop of the SW tool chain. Fine-grain
parallelism inside processes is exploited by optimized intra-tile compilation
techniques, but the project focus is above the level of the elementary tile.
The elementary HW tile is a multi-processor, which includes a fault tolerant
Distributed Network Processor (for inter-tile communication) and ASIP
accelerators. Furthermore, EURETILE investigates and implements the innovations
for equipping the elementary HW tile with high-bandwidth, low-latency
brain-like inter-tile communication emulating 3 levels of connection hierarchy,
namely neural columns, cortical areas and cortex, and develops a dedicated
cortical simulation benchmark: DPSNN-STDP (Distributed Polychronous Spiking
Neural Net with synaptic Spiking Time Dependent Plasticity). EURETILE leverages
on the multi-tile HW paradigm and SW tool-chain developed by the FET-ACA SHAPES
Integrated Project (2006-2009).
|
1306.5070 | Mina Farmanbar Ms | Nasser Lotfi, Jamshid Tamouk, Mina Farmanbar | 3-SAT Problem A New Memetic-PSO Algorithm | null | null | null | null | cs.AI cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | 3-SAT problem is of great importance to many technical and scientific
applications. This paper presents a new hybrid evolutionary algorithm for
solving this satisfiability problem. 3-SAT problem has the huge search space
and hence it is known as a NP-hard problem. So, deterministic approaches are
not applicable in this context. Thereof, application of evolutionary processing
approaches and especially PSO will be very effective for solving these kinds of
problems. In this paper, we introduce a new evolutionary optimization technique
based on PSO, Memetic algorithm and local search approaches. When some
heuristics are mixed, their advantages are collected as well and we can reach
to the better outcomes. Finally, we test our proposed algorithm over some
benchmarks used by some another available algorithms. Obtained results show
that our new method leads to the suitable results by the appropriate time.
Thereby, it achieves a better result in compared with the existent approaches
such as pure genetic algorithm and some verified types
| [
{
"version": "v1",
"created": "Fri, 21 Jun 2013 08:10:44 GMT"
}
] | 2013-06-24T00:00:00 | [
[
"Lotfi",
"Nasser",
""
],
[
"Tamouk",
"Jamshid",
""
],
[
"Farmanbar",
"Mina",
""
]
] | TITLE: 3-SAT Problem A New Memetic-PSO Algorithm
ABSTRACT: 3-SAT problem is of great importance to many technical and scientific
applications. This paper presents a new hybrid evolutionary algorithm for
solving this satisfiability problem. 3-SAT problem has the huge search space
and hence it is known as a NP-hard problem. So, deterministic approaches are
not applicable in this context. Thereof, application of evolutionary processing
approaches and especially PSO will be very effective for solving these kinds of
problems. In this paper, we introduce a new evolutionary optimization technique
based on PSO, Memetic algorithm and local search approaches. When some
heuristics are mixed, their advantages are collected as well and we can reach
to the better outcomes. Finally, we test our proposed algorithm over some
benchmarks used by some another available algorithms. Obtained results show
that our new method leads to the suitable results by the appropriate time.
Thereby, it achieves a better result in compared with the existent approaches
such as pure genetic algorithm and some verified types
|
1306.5151 | Andrea Vedaldi | Subhransu Maji and Esa Rahtu and Juho Kannala and Matthew Blaschko and
Andrea Vedaldi | Fine-Grained Visual Classification of Aircraft | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper introduces FGVC-Aircraft, a new dataset containing 10,000 images
of aircraft spanning 100 aircraft models, organised in a three-level hierarchy.
At the finer level, differences between models are often subtle but always
visually measurable, making visual recognition challenging but possible. A
benchmark is obtained by defining corresponding classification tasks and
evaluation protocols, and baseline results are presented. The construction of
this dataset was made possible by the work of aircraft enthusiasts, a strategy
that can extend to the study of number of other object classes. Compared to the
domains usually considered in fine-grained visual classification (FGVC), for
example animals, aircraft are rigid and hence less deformable. They, however,
present other interesting modes of variation, including purpose, size,
designation, structure, historical style, and branding.
| [
{
"version": "v1",
"created": "Fri, 21 Jun 2013 14:31:57 GMT"
}
] | 2013-06-24T00:00:00 | [
[
"Maji",
"Subhransu",
""
],
[
"Rahtu",
"Esa",
""
],
[
"Kannala",
"Juho",
""
],
[
"Blaschko",
"Matthew",
""
],
[
"Vedaldi",
"Andrea",
""
]
] | TITLE: Fine-Grained Visual Classification of Aircraft
ABSTRACT: This paper introduces FGVC-Aircraft, a new dataset containing 10,000 images
of aircraft spanning 100 aircraft models, organised in a three-level hierarchy.
At the finer level, differences between models are often subtle but always
visually measurable, making visual recognition challenging but possible. A
benchmark is obtained by defining corresponding classification tasks and
evaluation protocols, and baseline results are presented. The construction of
this dataset was made possible by the work of aircraft enthusiasts, a strategy
that can extend to the study of number of other object classes. Compared to the
domains usually considered in fine-grained visual classification (FGVC), for
example animals, aircraft are rigid and hence less deformable. They, however,
present other interesting modes of variation, including purpose, size,
designation, structure, historical style, and branding.
|
1306.5204 | Fred Morstatter | Fred Morstatter and J\"urgen Pfeffer and Huan Liu and Kathleen M.
Carley | Is the Sample Good Enough? Comparing Data from Twitter's Streaming API
with Twitter's Firehose | Published in ICWSM 2013 | null | null | null | cs.SI physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Twitter is a social media giant famous for the exchange of short,
140-character messages called "tweets". In the scientific community, the
microblogging site is known for openness in sharing its data. It provides a
glance into its millions of users and billions of tweets through a "Streaming
API" which provides a sample of all tweets matching some parameters preset by
the API user. The API service has been used by many researchers, companies, and
governmental institutions that want to extract knowledge in accordance with a
diverse array of questions pertaining to social media. The essential drawback
of the Twitter API is the lack of documentation concerning what and how much
data users get. This leads researchers to question whether the sampled data is
a valid representation of the overall activity on Twitter. In this work we
embark on answering this question by comparing data collected using Twitter's
sampled API service with data collected using the full, albeit costly, Firehose
stream that includes every single published tweet. We compare both datasets
using common statistical metrics as well as metrics that allow us to compare
topics, networks, and locations of tweets. The results of our work will help
researchers and practitioners understand the implications of using the
Streaming API.
| [
{
"version": "v1",
"created": "Fri, 21 Jun 2013 18:08:42 GMT"
}
] | 2013-06-24T00:00:00 | [
[
"Morstatter",
"Fred",
""
],
[
"Pfeffer",
"Jürgen",
""
],
[
"Liu",
"Huan",
""
],
[
"Carley",
"Kathleen M.",
""
]
] | TITLE: Is the Sample Good Enough? Comparing Data from Twitter's Streaming API
with Twitter's Firehose
ABSTRACT: Twitter is a social media giant famous for the exchange of short,
140-character messages called "tweets". In the scientific community, the
microblogging site is known for openness in sharing its data. It provides a
glance into its millions of users and billions of tweets through a "Streaming
API" which provides a sample of all tweets matching some parameters preset by
the API user. The API service has been used by many researchers, companies, and
governmental institutions that want to extract knowledge in accordance with a
diverse array of questions pertaining to social media. The essential drawback
of the Twitter API is the lack of documentation concerning what and how much
data users get. This leads researchers to question whether the sampled data is
a valid representation of the overall activity on Twitter. In this work we
embark on answering this question by comparing data collected using Twitter's
sampled API service with data collected using the full, albeit costly, Firehose
stream that includes every single published tweet. We compare both datasets
using common statistical metrics as well as metrics that allow us to compare
topics, networks, and locations of tweets. The results of our work will help
researchers and practitioners understand the implications of using the
Streaming API.
|
1301.5650 | Marius Pachitariu | Marius Pachitariu and Maneesh Sahani | Regularization and nonlinearities for neural language models: when are
they needed? | Added new experiments on large datasets and on the Microsoft Research
Sentence Completion Challenge | null | null | null | stat.ML cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Neural language models (LMs) based on recurrent neural networks (RNN) are
some of the most successful word and character-level LMs. Why do they work so
well, in particular better than linear neural LMs? Possible explanations are
that RNNs have an implicitly better regularization or that RNNs have a higher
capacity for storing patterns due to their nonlinearities or both. Here we
argue for the first explanation in the limit of little training data and the
second explanation for large amounts of text data. We show state-of-the-art
performance on the popular and small Penn dataset when RNN LMs are regularized
with random dropout. Nonetheless, we show even better performance from a
simplified, much less expressive linear RNN model without off-diagonal entries
in the recurrent matrix. We call this model an impulse-response LM (IRLM).
Using random dropout, column normalization and annealed learning rates, IRLMs
develop neurons that keep a memory of up to 50 words in the past and achieve a
perplexity of 102.5 on the Penn dataset. On two large datasets however, the
same regularization methods are unsuccessful for both models and the RNN's
expressivity allows it to overtake the IRLM by 10 and 20 percent perplexity,
respectively. Despite the perplexity gap, IRLMs still outperform RNNs on the
Microsoft Research Sentence Completion (MRSC) task. We develop a slightly
modified IRLM that separates long-context units (LCUs) from short-context units
and show that the LCUs alone achieve a state-of-the-art performance on the MRSC
task of 60.8%. Our analysis indicates that a fruitful direction of research for
neural LMs lies in developing more accessible internal representations, and
suggests an optimization regime of very high momentum terms for effectively
training such models.
| [
{
"version": "v1",
"created": "Wed, 23 Jan 2013 21:18:07 GMT"
},
{
"version": "v2",
"created": "Thu, 20 Jun 2013 14:30:04 GMT"
}
] | 2013-06-21T00:00:00 | [
[
"Pachitariu",
"Marius",
""
],
[
"Sahani",
"Maneesh",
""
]
] | TITLE: Regularization and nonlinearities for neural language models: when are
they needed?
ABSTRACT: Neural language models (LMs) based on recurrent neural networks (RNN) are
some of the most successful word and character-level LMs. Why do they work so
well, in particular better than linear neural LMs? Possible explanations are
that RNNs have an implicitly better regularization or that RNNs have a higher
capacity for storing patterns due to their nonlinearities or both. Here we
argue for the first explanation in the limit of little training data and the
second explanation for large amounts of text data. We show state-of-the-art
performance on the popular and small Penn dataset when RNN LMs are regularized
with random dropout. Nonetheless, we show even better performance from a
simplified, much less expressive linear RNN model without off-diagonal entries
in the recurrent matrix. We call this model an impulse-response LM (IRLM).
Using random dropout, column normalization and annealed learning rates, IRLMs
develop neurons that keep a memory of up to 50 words in the past and achieve a
perplexity of 102.5 on the Penn dataset. On two large datasets however, the
same regularization methods are unsuccessful for both models and the RNN's
expressivity allows it to overtake the IRLM by 10 and 20 percent perplexity,
respectively. Despite the perplexity gap, IRLMs still outperform RNNs on the
Microsoft Research Sentence Completion (MRSC) task. We develop a slightly
modified IRLM that separates long-context units (LCUs) from short-context units
and show that the LCUs alone achieve a state-of-the-art performance on the MRSC
task of 60.8%. Our analysis indicates that a fruitful direction of research for
neural LMs lies in developing more accessible internal representations, and
suggests an optimization regime of very high momentum terms for effectively
training such models.
|
1306.4746 | Daniel Barrett | Daniel Paul Barrett and Jeffrey Mark Siskind | Felzenszwalb-Baum-Welch: Event Detection by Changing Appearance | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose a method which can detect events in videos by modeling the change
in appearance of the event participants over time. This method makes it
possible to detect events which are characterized not by motion, but by the
changing state of the people or objects involved. This is accomplished by using
object detectors as output models for the states of a hidden Markov model
(HMM). The method allows an HMM to model the sequence of poses of the event
participants over time, and is effective for poses of humans and inanimate
objects. The ability to use existing object-detection methods as part of an
event model makes it possible to leverage ongoing work in the object-detection
community. A novel training method uses an EM loop to simultaneously learn the
temporal structure and object models automatically, without the need to specify
either the individual poses to be modeled or the frames in which they occur.
The E-step estimates the latent assignment of video frames to HMM states, while
the M-step estimates both the HMM transition probabilities and state output
models, including the object detectors, which are trained on the weighted
subset of frames assigned to their state. A new dataset was gathered because
little work has been done on events characterized by changing object pose, and
suitable datasets are not available. Our method produced results superior to
that of comparison systems on this dataset.
| [
{
"version": "v1",
"created": "Thu, 20 Jun 2013 03:22:19 GMT"
}
] | 2013-06-21T00:00:00 | [
[
"Barrett",
"Daniel Paul",
""
],
[
"Siskind",
"Jeffrey Mark",
""
]
] | TITLE: Felzenszwalb-Baum-Welch: Event Detection by Changing Appearance
ABSTRACT: We propose a method which can detect events in videos by modeling the change
in appearance of the event participants over time. This method makes it
possible to detect events which are characterized not by motion, but by the
changing state of the people or objects involved. This is accomplished by using
object detectors as output models for the states of a hidden Markov model
(HMM). The method allows an HMM to model the sequence of poses of the event
participants over time, and is effective for poses of humans and inanimate
objects. The ability to use existing object-detection methods as part of an
event model makes it possible to leverage ongoing work in the object-detection
community. A novel training method uses an EM loop to simultaneously learn the
temporal structure and object models automatically, without the need to specify
either the individual poses to be modeled or the frames in which they occur.
The E-step estimates the latent assignment of video frames to HMM states, while
the M-step estimates both the HMM transition probabilities and state output
models, including the object detectors, which are trained on the weighted
subset of frames assigned to their state. A new dataset was gathered because
little work has been done on events characterized by changing object pose, and
suitable datasets are not available. Our method produced results superior to
that of comparison systems on this dataset.
|
1306.4534 | Antonio Lima | Antonio Lima, Manlio De Domenico, Veljko Pejovic, Mirco Musolesi | Exploiting Cellular Data for Disease Containment and Information
Campaigns Strategies in Country-Wide Epidemics | 9 pages, 9 figures. Appeared in Proceedings of NetMob 2013. Boston,
MA, USA. May 2013 | null | null | School of Computer Science University of Birmingham Technical Report
CSR-13-01 | cs.SI physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Human mobility is one of the key factors at the basis of the spreading of
diseases in a population. Containment strategies are usually devised on
movement scenarios based on coarse-grained assumptions. Mobility phone data
provide a unique opportunity for building models and defining strategies based
on very precise information about the movement of people in a region or in a
country. Another very important aspect is the underlying social structure of a
population, which might play a fundamental role in devising information
campaigns to promote vaccination and preventive measures, especially in
countries with a strong family (or tribal) structure.
In this paper we analyze a large-scale dataset describing the mobility and
the call patterns of a large number of individuals in Ivory Coast. We present a
model that describes how diseases spread across the country by exploiting
mobility patterns of people extracted from the available data. Then, we
simulate several epidemics scenarios and we evaluate mechanisms to contain the
epidemic spreading of diseases, based on the information about people mobility
and social ties, also gathered from the phone call data. More specifically, we
find that restricting mobility does not delay the occurrence of an endemic
state and that an information campaign based on one-to-one phone conversations
among members of social groups might be an effective countermeasure.
| [
{
"version": "v1",
"created": "Wed, 19 Jun 2013 13:22:11 GMT"
}
] | 2013-06-20T00:00:00 | [
[
"Lima",
"Antonio",
""
],
[
"De Domenico",
"Manlio",
""
],
[
"Pejovic",
"Veljko",
""
],
[
"Musolesi",
"Mirco",
""
]
] | TITLE: Exploiting Cellular Data for Disease Containment and Information
Campaigns Strategies in Country-Wide Epidemics
ABSTRACT: Human mobility is one of the key factors at the basis of the spreading of
diseases in a population. Containment strategies are usually devised on
movement scenarios based on coarse-grained assumptions. Mobility phone data
provide a unique opportunity for building models and defining strategies based
on very precise information about the movement of people in a region or in a
country. Another very important aspect is the underlying social structure of a
population, which might play a fundamental role in devising information
campaigns to promote vaccination and preventive measures, especially in
countries with a strong family (or tribal) structure.
In this paper we analyze a large-scale dataset describing the mobility and
the call patterns of a large number of individuals in Ivory Coast. We present a
model that describes how diseases spread across the country by exploiting
mobility patterns of people extracted from the available data. Then, we
simulate several epidemics scenarios and we evaluate mechanisms to contain the
epidemic spreading of diseases, based on the information about people mobility
and social ties, also gathered from the phone call data. More specifically, we
find that restricting mobility does not delay the occurrence of an endemic
state and that an information campaign based on one-to-one phone conversations
among members of social groups might be an effective countermeasure.
|
1305.3633 | Mohammad Pourhomayoun | Mohammad Pourhomayoun, Peter Dugan, Marian Popescu, Denise Risch, Hal
Lewis, Christopher Clark | Classification for Big Dataset of Bioacoustic Signals Based on Human
Scoring System and Artificial Neural Network | To be Submitted to "ICML 2013 Workshop on Machine Learning for
Bioacoustics", 6 pages, 4 figures | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we propose a method to improve sound classification
performance by combining signal features, derived from the time-frequency
spectrogram, with human perception. The method presented herein exploits an
artificial neural network (ANN) and learns the signal features based on the
human perception knowledge. The proposed method is applied to a large acoustic
dataset containing 24 months of nearly continuous recordings. The results show
a significant improvement in performance of the detection-classification
system; yielding as much as 20% improvement in true positive rate for a given
false positive rate.
| [
{
"version": "v1",
"created": "Wed, 15 May 2013 20:53:39 GMT"
},
{
"version": "v2",
"created": "Mon, 17 Jun 2013 20:29:14 GMT"
}
] | 2013-06-19T00:00:00 | [
[
"Pourhomayoun",
"Mohammad",
""
],
[
"Dugan",
"Peter",
""
],
[
"Popescu",
"Marian",
""
],
[
"Risch",
"Denise",
""
],
[
"Lewis",
"Hal",
""
],
[
"Clark",
"Christopher",
""
]
] | TITLE: Classification for Big Dataset of Bioacoustic Signals Based on Human
Scoring System and Artificial Neural Network
ABSTRACT: In this paper, we propose a method to improve sound classification
performance by combining signal features, derived from the time-frequency
spectrogram, with human perception. The method presented herein exploits an
artificial neural network (ANN) and learns the signal features based on the
human perception knowledge. The proposed method is applied to a large acoustic
dataset containing 24 months of nearly continuous recordings. The results show
a significant improvement in performance of the detection-classification
system; yielding as much as 20% improvement in true positive rate for a given
false positive rate.
|
1305.3635 | Mohammad Pourhomayoun | Mohammad Pourhomayoun, Peter Dugan, Marian Popescu, Christopher Clark | Bioacoustic Signal Classification Based on Continuous Region Processing,
Grid Masking and Artificial Neural Network | To be Submitted to "ICML 2013 Workshop on Machine Learning for
Bioacoustics", 6 pages, 8 figures | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we develop a novel method based on machine-learning and image
processing to identify North Atlantic right whale (NARW) up-calls in the
presence of high levels of ambient and interfering noise. We apply a continuous
region algorithm on the spectrogram to extract the regions of interest, and
then use grid masking techniques to generate a small feature set that is then
used in an artificial neural network classifier to identify the NARW up-calls.
It is shown that the proposed technique is effective in detecting and capturing
even very faint up-calls, in the presence of ambient and interfering noises.
The method is evaluated on a dataset recorded in Massachusetts Bay, United
States. The dataset includes 20000 sound clips for training, and 10000 sound
clips for testing. The results show that the proposed technique can achieve an
error rate of less than FPR = 4.5% for a 90% true positive rate.
| [
{
"version": "v1",
"created": "Wed, 15 May 2013 20:59:03 GMT"
},
{
"version": "v2",
"created": "Mon, 17 Jun 2013 20:28:33 GMT"
}
] | 2013-06-19T00:00:00 | [
[
"Pourhomayoun",
"Mohammad",
""
],
[
"Dugan",
"Peter",
""
],
[
"Popescu",
"Marian",
""
],
[
"Clark",
"Christopher",
""
]
] | TITLE: Bioacoustic Signal Classification Based on Continuous Region Processing,
Grid Masking and Artificial Neural Network
ABSTRACT: In this paper, we develop a novel method based on machine-learning and image
processing to identify North Atlantic right whale (NARW) up-calls in the
presence of high levels of ambient and interfering noise. We apply a continuous
region algorithm on the spectrogram to extract the regions of interest, and
then use grid masking techniques to generate a small feature set that is then
used in an artificial neural network classifier to identify the NARW up-calls.
It is shown that the proposed technique is effective in detecting and capturing
even very faint up-calls, in the presence of ambient and interfering noises.
The method is evaluated on a dataset recorded in Massachusetts Bay, United
States. The dataset includes 20000 sound clips for training, and 10000 sound
clips for testing. The results show that the proposed technique can achieve an
error rate of less than FPR = 4.5% for a 90% true positive rate.
|
1306.4207 | Ragesh Jaiswal | Ragesh Jaiswal and Prachi Jain and Saumya Yadav | A bad 2-dimensional instance for k-means++ | null | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The k-means++ seeding algorithm is one of the most popular algorithms that is
used for finding the initial $k$ centers when using the k-means heuristic. The
algorithm is a simple sampling procedure and can be described as follows:
{quote} Pick the first center randomly from among the given points. For $i >
1$, pick a point to be the $i^{th}$ center with probability proportional to the
square of the Euclidean distance of this point to the previously $(i-1)$ chosen
centers. {quote} The k-means++ seeding algorithm is not only simple and fast
but gives an $O(\log{k})$ approximation in expectation as shown by Arthur and
Vassilvitskii \cite{av07}. There are datasets \cite{av07,adk09} on which this
seeding algorithm gives an approximation factor $\Omega(\log{k})$ in
expectation. However, it is not clear from these results if the algorithm
achieves good approximation factor with reasonably large probability (say
$1/poly(k)$). Brunsch and R\"{o}glin \cite{br11} gave a dataset where the
k-means++ seeding algorithm achieves an approximation ratio of $(2/3 -
\epsilon)\cdot \log{k}$ only with probability that is exponentially small in
$k$. However, this and all other known {\em lower-bound examples}
\cite{av07,adk09} are high dimensional. So, an open problem is to understand
the behavior of the algorithm on low dimensional datasets. In this work, we
give a simple two dimensional dataset on which the seeding algorithm achieves
an approximation ratio $c$ (for some universal constant $c$) only with
probability exponentially small in $k$. This is the first step towards solving
open problems posed by Mahajan et al \cite{mnv12} and by Brunsch and R\"{o}glin
\cite{br11}.
| [
{
"version": "v1",
"created": "Tue, 18 Jun 2013 14:22:12 GMT"
}
] | 2013-06-19T00:00:00 | [
[
"Jaiswal",
"Ragesh",
""
],
[
"Jain",
"Prachi",
""
],
[
"Yadav",
"Saumya",
""
]
] | TITLE: A bad 2-dimensional instance for k-means++
ABSTRACT: The k-means++ seeding algorithm is one of the most popular algorithms that is
used for finding the initial $k$ centers when using the k-means heuristic. The
algorithm is a simple sampling procedure and can be described as follows:
{quote} Pick the first center randomly from among the given points. For $i >
1$, pick a point to be the $i^{th}$ center with probability proportional to the
square of the Euclidean distance of this point to the previously $(i-1)$ chosen
centers. {quote} The k-means++ seeding algorithm is not only simple and fast
but gives an $O(\log{k})$ approximation in expectation as shown by Arthur and
Vassilvitskii \cite{av07}. There are datasets \cite{av07,adk09} on which this
seeding algorithm gives an approximation factor $\Omega(\log{k})$ in
expectation. However, it is not clear from these results if the algorithm
achieves good approximation factor with reasonably large probability (say
$1/poly(k)$). Brunsch and R\"{o}glin \cite{br11} gave a dataset where the
k-means++ seeding algorithm achieves an approximation ratio of $(2/3 -
\epsilon)\cdot \log{k}$ only with probability that is exponentially small in
$k$. However, this and all other known {\em lower-bound examples}
\cite{av07,adk09} are high dimensional. So, an open problem is to understand
the behavior of the algorithm on low dimensional datasets. In this work, we
give a simple two dimensional dataset on which the seeding algorithm achieves
an approximation ratio $c$ (for some universal constant $c$) only with
probability exponentially small in $k$. This is the first step towards solving
open problems posed by Mahajan et al \cite{mnv12} and by Brunsch and R\"{o}glin
\cite{br11}.
|
1211.6014 | Vincent A Traag | Bal\'azs Cs. Cs\'aji, Arnaud Browet, V.A. Traag, Jean-Charles
Delvenne, Etienne Huens, Paul Van Dooren, Zbigniew Smoreda and Vincent D.
Blondel | Exploring the Mobility of Mobile Phone Users | 16 pages, 12 figures | Physica A 392(6), pp. 1459-1473 (2013) | 10.1016/j.physa.2012.11.040 | null | physics.soc-ph cs.SI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Mobile phone datasets allow for the analysis of human behavior on an
unprecedented scale. The social network, temporal dynamics and mobile behavior
of mobile phone users have often been analyzed independently from each other
using mobile phone datasets. In this article, we explore the connections
between various features of human behavior extracted from a large mobile phone
dataset. Our observations are based on the analysis of communication data of
100000 anonymized and randomly chosen individuals in a dataset of
communications in Portugal. We show that clustering and principal component
analysis allow for a significant dimension reduction with limited loss of
information. The most important features are related to geographical location.
In particular, we observe that most people spend most of their time at only a
few locations. With the help of clustering methods, we then robustly identify
home and office locations and compare the results with official census data.
Finally, we analyze the geographic spread of users' frequent locations and show
that commuting distances can be reasonably well explained by a gravity model.
| [
{
"version": "v1",
"created": "Mon, 26 Nov 2012 16:30:59 GMT"
}
] | 2013-06-17T00:00:00 | [
[
"Csáji",
"Balázs Cs.",
""
],
[
"Browet",
"Arnaud",
""
],
[
"Traag",
"V. A.",
""
],
[
"Delvenne",
"Jean-Charles",
""
],
[
"Huens",
"Etienne",
""
],
[
"Van Dooren",
"Paul",
""
],
[
"Smoreda",
"Zbigniew",
""
],
[
"Blondel",
"Vincent D.",
""
]
] | TITLE: Exploring the Mobility of Mobile Phone Users
ABSTRACT: Mobile phone datasets allow for the analysis of human behavior on an
unprecedented scale. The social network, temporal dynamics and mobile behavior
of mobile phone users have often been analyzed independently from each other
using mobile phone datasets. In this article, we explore the connections
between various features of human behavior extracted from a large mobile phone
dataset. Our observations are based on the analysis of communication data of
100000 anonymized and randomly chosen individuals in a dataset of
communications in Portugal. We show that clustering and principal component
analysis allow for a significant dimension reduction with limited loss of
information. The most important features are related to geographical location.
In particular, we observe that most people spend most of their time at only a
few locations. With the help of clustering methods, we then robustly identify
home and office locations and compare the results with official census data.
Finally, we analyze the geographic spread of users' frequent locations and show
that commuting distances can be reasonably well explained by a gravity model.
|
1306.3294 | Quan Wang | Quan Wang, Kim L. Boyer | Feature Learning by Multidimensional Scaling and its Applications in
Object Recognition | To appear in SIBGRAPI 2013 | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present the MDS feature learning framework, in which multidimensional
scaling (MDS) is applied on high-level pairwise image distances to learn
fixed-length vector representations of images. The aspects of the images that
are captured by the learned features, which we call MDS features, completely
depend on what kind of image distance measurement is employed. With properly
selected semantics-sensitive image distances, the MDS features provide rich
semantic information about the images that is not captured by other feature
extraction techniques. In our work, we introduce the iterated
Levenberg-Marquardt algorithm for solving MDS, and study the MDS feature
learning with IMage Euclidean Distance (IMED) and Spatial Pyramid Matching
(SPM) distance. We present experiments on both synthetic data and real images
--- the publicly accessible UIUC car image dataset. The MDS features based on
SPM distance achieve exceptional performance for the car recognition task.
| [
{
"version": "v1",
"created": "Fri, 14 Jun 2013 04:43:40 GMT"
}
] | 2013-06-17T00:00:00 | [
[
"Wang",
"Quan",
""
],
[
"Boyer",
"Kim L.",
""
]
] | TITLE: Feature Learning by Multidimensional Scaling and its Applications in
Object Recognition
ABSTRACT: We present the MDS feature learning framework, in which multidimensional
scaling (MDS) is applied on high-level pairwise image distances to learn
fixed-length vector representations of images. The aspects of the images that
are captured by the learned features, which we call MDS features, completely
depend on what kind of image distance measurement is employed. With properly
selected semantics-sensitive image distances, the MDS features provide rich
semantic information about the images that is not captured by other feature
extraction techniques. In our work, we introduce the iterated
Levenberg-Marquardt algorithm for solving MDS, and study the MDS feature
learning with IMage Euclidean Distance (IMED) and Spatial Pyramid Matching
(SPM) distance. We present experiments on both synthetic data and real images
--- the publicly accessible UIUC car image dataset. The MDS features based on
SPM distance achieve exceptional performance for the car recognition task.
|
1306.3474 | Yijun Wang | Yijun Wang | Classifying Single-Trial EEG during Motor Imagery with a Small Training
Set | 13 pages, 3 figures | null | null | null | cs.LG cs.HC stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Before the operation of a motor imagery based brain-computer interface (BCI)
adopting machine learning techniques, a cumbersome training procedure is
unavoidable. The development of a practical BCI posed the challenge of
classifying single-trial EEG with a small training set. In this letter, we
addressed this problem by employing a series of signal processing and machine
learning approaches to alleviate overfitting and obtained test accuracy similar
to training accuracy on the datasets from BCI Competition III and our own
experiments.
| [
{
"version": "v1",
"created": "Fri, 14 Jun 2013 18:24:19 GMT"
}
] | 2013-06-17T00:00:00 | [
[
"Wang",
"Yijun",
""
]
] | TITLE: Classifying Single-Trial EEG during Motor Imagery with a Small Training
Set
ABSTRACT: Before the operation of a motor imagery based brain-computer interface (BCI)
adopting machine learning techniques, a cumbersome training procedure is
unavoidable. The development of a practical BCI posed the challenge of
classifying single-trial EEG with a small training set. In this letter, we
addressed this problem by employing a series of signal processing and machine
learning approaches to alleviate overfitting and obtained test accuracy similar
to training accuracy on the datasets from BCI Competition III and our own
experiments.
|
1306.3476 | James Bergstra | James Bergstra and David D. Cox | Hyperparameter Optimization and Boosting for Classifying Facial
Expressions: How good can a "Null" Model be? | Presented at the Workshop on Representation and Learning, ICML 2013 | null | null | null | cs.CV cs.LG stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | One of the goals of the ICML workshop on representation and learning is to
establish benchmark scores for a new data set of labeled facial expressions.
This paper presents the performance of a "Null" model consisting of
convolutions with random weights, PCA, pooling, normalization, and a linear
readout. Our approach focused on hyperparameter optimization rather than novel
model components. On the Facial Expression Recognition Challenge held by the
Kaggle website, our hyperparameter optimization approach achieved a score of
60% accuracy on the test data. This paper also introduces a new ensemble
construction variant that combines hyperparameter optimization with the
construction of ensembles. This algorithm constructed an ensemble of four
models that scored 65.5% accuracy. These scores rank 12th and 5th respectively
among the 56 challenge participants. It is worth noting that our approach was
developed prior to the release of the data set, and applied without
modification; our strong competition performance suggests that the TPE
hyperparameter optimization algorithm and domain expertise encoded in our Null
model can generalize to new image classification data sets.
| [
{
"version": "v1",
"created": "Fri, 14 Jun 2013 18:28:52 GMT"
}
] | 2013-06-17T00:00:00 | [
[
"Bergstra",
"James",
""
],
[
"Cox",
"David D.",
""
]
] | TITLE: Hyperparameter Optimization and Boosting for Classifying Facial
Expressions: How good can a "Null" Model be?
ABSTRACT: One of the goals of the ICML workshop on representation and learning is to
establish benchmark scores for a new data set of labeled facial expressions.
This paper presents the performance of a "Null" model consisting of
convolutions with random weights, PCA, pooling, normalization, and a linear
readout. Our approach focused on hyperparameter optimization rather than novel
model components. On the Facial Expression Recognition Challenge held by the
Kaggle website, our hyperparameter optimization approach achieved a score of
60% accuracy on the test data. This paper also introduces a new ensemble
construction variant that combines hyperparameter optimization with the
construction of ensembles. This algorithm constructed an ensemble of four
models that scored 65.5% accuracy. These scores rank 12th and 5th respectively
among the 56 challenge participants. It is worth noting that our approach was
developed prior to the release of the data set, and applied without
modification; our strong competition performance suggests that the TPE
hyperparameter optimization algorithm and domain expertise encoded in our Null
model can generalize to new image classification data sets.
|
1306.3003 | Xuhui Fan | Xuhui Fan, Yiling Zeng, Longbing Cao | Non-parametric Power-law Data Clustering | null | null | null | null | cs.LG cs.CV stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | It has always been a great challenge for clustering algorithms to
automatically determine the cluster numbers according to the distribution of
datasets. Several approaches have been proposed to address this issue,
including the recent promising work which incorporate Bayesian Nonparametrics
into the $k$-means clustering procedure. This approach shows simplicity in
implementation and solidity in theory, while it also provides a feasible way to
inference in large scale datasets. However, several problems remains unsolved
in this pioneering work, including the power-law data applicability, mechanism
to merge centers to avoid the over-fitting problem, clustering order problem,
e.t.c.. To address these issues, the Pitman-Yor Process based k-means (namely
\emph{pyp-means}) is proposed in this paper. Taking advantage of the Pitman-Yor
Process, \emph{pyp-means} treats clusters differently by dynamically and
adaptively changing the threshold to guarantee the generation of power-law
clustering results. Also, one center agglomeration procedure is integrated into
the implementation to be able to merge small but close clusters and then
adaptively determine the cluster number. With more discussion on the clustering
order, the convergence proof, complexity analysis and extension to spectral
clustering, our approach is compared with traditional clustering algorithm and
variational inference methods. The advantages and properties of pyp-means are
validated by experiments on both synthetic datasets and real world datasets.
| [
{
"version": "v1",
"created": "Thu, 13 Jun 2013 01:20:50 GMT"
}
] | 2013-06-14T00:00:00 | [
[
"Fan",
"Xuhui",
""
],
[
"Zeng",
"Yiling",
""
],
[
"Cao",
"Longbing",
""
]
] | TITLE: Non-parametric Power-law Data Clustering
ABSTRACT: It has always been a great challenge for clustering algorithms to
automatically determine the cluster numbers according to the distribution of
datasets. Several approaches have been proposed to address this issue,
including the recent promising work which incorporate Bayesian Nonparametrics
into the $k$-means clustering procedure. This approach shows simplicity in
implementation and solidity in theory, while it also provides a feasible way to
inference in large scale datasets. However, several problems remains unsolved
in this pioneering work, including the power-law data applicability, mechanism
to merge centers to avoid the over-fitting problem, clustering order problem,
e.t.c.. To address these issues, the Pitman-Yor Process based k-means (namely
\emph{pyp-means}) is proposed in this paper. Taking advantage of the Pitman-Yor
Process, \emph{pyp-means} treats clusters differently by dynamically and
adaptively changing the threshold to guarantee the generation of power-law
clustering results. Also, one center agglomeration procedure is integrated into
the implementation to be able to merge small but close clusters and then
adaptively determine the cluster number. With more discussion on the clustering
order, the convergence proof, complexity analysis and extension to spectral
clustering, our approach is compared with traditional clustering algorithm and
variational inference methods. The advantages and properties of pyp-means are
validated by experiments on both synthetic datasets and real world datasets.
|
1306.3018 | Vitorino Ramos Dr. | Vitorino Ramos, David M.S. Rodrigues, Jorge Lou\c{c}\~a | Second Order Swarm Intelligence | 10 pages, 5 figures, accepted to International Conference on Hybrid
Artificial Intelligence Systems (HAIS 2013), Lecture Notes in Artificial
Intelligence, LNAI Springer Series | null | null | null | cs.NE | http://creativecommons.org/licenses/by-nc-sa/3.0/ | An artificial Ant Colony System (ACS) algorithm to solve general-purpose
combinatorial Optimization Problems (COP) that extends previous AC models [21]
by the inclusion of a negative pheromone, is here described. Several Travelling
Salesman Problem (TSP) were used as benchmark. We show that by using two
different sets of pheromones, a second-order co-evolved compromise between
positive and negative feedbacks achieves better results than single positive
feedback systems. The algorithm was tested against known NP-complete
combinatorial Optimization Problems, running on symmetrical TSP's. We show that
the new algorithm compares favourably against these benchmarks, accordingly to
recent biological findings by Robinson [26,27], and Gruter [28] where "No
entry" signals and negative feedback allows a colony to quickly reallocate the
majority of its foragers to superior food patches. This is the first time an
extended ACS algorithm is implemented with these successful characteristics.
| [
{
"version": "v1",
"created": "Thu, 13 Jun 2013 04:07:52 GMT"
}
] | 2013-06-14T00:00:00 | [
[
"Ramos",
"Vitorino",
""
],
[
"Rodrigues",
"David M. S.",
""
],
[
"Louçã",
"Jorge",
""
]
] | TITLE: Second Order Swarm Intelligence
ABSTRACT: An artificial Ant Colony System (ACS) algorithm to solve general-purpose
combinatorial Optimization Problems (COP) that extends previous AC models [21]
by the inclusion of a negative pheromone, is here described. Several Travelling
Salesman Problem (TSP) were used as benchmark. We show that by using two
different sets of pheromones, a second-order co-evolved compromise between
positive and negative feedbacks achieves better results than single positive
feedback systems. The algorithm was tested against known NP-complete
combinatorial Optimization Problems, running on symmetrical TSP's. We show that
the new algorithm compares favourably against these benchmarks, accordingly to
recent biological findings by Robinson [26,27], and Gruter [28] where "No
entry" signals and negative feedback allows a colony to quickly reallocate the
majority of its foragers to superior food patches. This is the first time an
extended ACS algorithm is implemented with these successful characteristics.
|
1306.3058 | Sebastien Paris | S\'ebastien Paris and Yann Doh and Herv\'e Glotin and Xanadu Halkias
and Joseph Razik | Physeter catodon localization by sparse coding | 6 pages, 6 figures, workshop ICML4B in ICML 2013 conference | null | null | null | cs.LG cs.CE stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper presents a spermwhale' localization architecture using jointly a
bag-of-features (BoF) approach and machine learning framework. BoF methods are
known, especially in computer vision, to produce from a collection of local
features a global representation invariant to principal signal transformations.
Our idea is to regress supervisely from these local features two rough
estimates of the distance and azimuth thanks to some datasets where both
acoustic events and ground-truth position are now available. Furthermore, these
estimates can feed a particle filter system in order to obtain a precise
spermwhale' position even in mono-hydrophone configuration. Anti-collision
system and whale watching are considered applications of this work.
| [
{
"version": "v1",
"created": "Thu, 13 Jun 2013 09:05:08 GMT"
}
] | 2013-06-14T00:00:00 | [
[
"Paris",
"Sébastien",
""
],
[
"Doh",
"Yann",
""
],
[
"Glotin",
"Hervé",
""
],
[
"Halkias",
"Xanadu",
""
],
[
"Razik",
"Joseph",
""
]
] | TITLE: Physeter catodon localization by sparse coding
ABSTRACT: This paper presents a spermwhale' localization architecture using jointly a
bag-of-features (BoF) approach and machine learning framework. BoF methods are
known, especially in computer vision, to produce from a collection of local
features a global representation invariant to principal signal transformations.
Our idea is to regress supervisely from these local features two rough
estimates of the distance and azimuth thanks to some datasets where both
acoustic events and ground-truth position are now available. Furthermore, these
estimates can feed a particle filter system in order to obtain a precise
spermwhale' position even in mono-hydrophone configuration. Anti-collision
system and whale watching are considered applications of this work.
|
1306.3084 | Doriane Ibarra | Jorge Hernandez (CMM), Beatriz Marcotegui (CMM) | Segmentation et Interpr\'etation de Nuages de Points pour la
Mod\'elisation d'Environnements Urbains | null | Revue fran\c{c}aise de photogrammetrie et de t\'el\'edection 191
(2008) 28-35 | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Dans cet article, nous pr\'esentons une m\'ethode pour la d\'etection et la
classification d'artefacts au niveau du sol, comme phase de filtrage
pr\'ealable \`a la mod\'elisation d'environnements urbains. La m\'ethode de
d\'etection est r\'ealis\'ee sur l'image profondeur, une projection de nuage de
points sur un plan image o\`u la valeur du pixel correspond \`a la distance du
point au plan. En faisant l'hypoth\`ese que les artefacts sont situ\'es au sol,
ils sont d\'etect\'es par une transformation de chapeau haut de forme par
remplissage de trous sur l'image de profondeur. Les composantes connexes ainsi
obtenues, sont ensuite caract\'eris\'ees et une analyse des variables est
utilis\'ee pour la s\'election des caract\'eristiques les plus discriminantes.
Les composantes connexes sont donc classifi\'ees en quatre cat\'egories
(lampadaires, pi\'etons, voitures et "Reste") \`a l'aide d'un algorithme
d'apprentissage supervis\'e. La m\'ethode a \'et\'e test\'ee sur des nuages de
points de la ville de Paris, en montrant de bons r\'esultats de d\'etection et
de classification dans l'ensemble de donn\'ees.---In this article, we present a
method for detection and classification of artifacts at the street level, in
order to filter cloud point, facilitating the urban modeling process. Our
approach exploits 3D information by using range image, a projection of 3D
points onto an image plane where the pixel intensity is a function of the
measured distance between 3D points and the plane. By assuming that the
artifacts are on the ground, they are detected using a Top-Hat of the hole
filling algorithm of range images. Then, several features are extracted from
the detected connected components and a stepwise forward variable/model
selection by using the Wilk's Lambda criterion is performed. Afterward, CCs are
classified in four categories (lampposts, pedestrians, cars and others) by
using a supervised machine learning method. The proposed method was tested on
cloud points of Paris, and have shown satisfactory results on the whole
dataset.
| [
{
"version": "v1",
"created": "Thu, 13 Jun 2013 11:27:58 GMT"
}
] | 2013-06-14T00:00:00 | [
[
"Hernandez",
"Jorge",
"",
"CMM"
],
[
"Marcotegui",
"Beatriz",
"",
"CMM"
]
] | TITLE: Segmentation et Interpr\'etation de Nuages de Points pour la
Mod\'elisation d'Environnements Urbains
ABSTRACT: Dans cet article, nous pr\'esentons une m\'ethode pour la d\'etection et la
classification d'artefacts au niveau du sol, comme phase de filtrage
pr\'ealable \`a la mod\'elisation d'environnements urbains. La m\'ethode de
d\'etection est r\'ealis\'ee sur l'image profondeur, une projection de nuage de
points sur un plan image o\`u la valeur du pixel correspond \`a la distance du
point au plan. En faisant l'hypoth\`ese que les artefacts sont situ\'es au sol,
ils sont d\'etect\'es par une transformation de chapeau haut de forme par
remplissage de trous sur l'image de profondeur. Les composantes connexes ainsi
obtenues, sont ensuite caract\'eris\'ees et une analyse des variables est
utilis\'ee pour la s\'election des caract\'eristiques les plus discriminantes.
Les composantes connexes sont donc classifi\'ees en quatre cat\'egories
(lampadaires, pi\'etons, voitures et "Reste") \`a l'aide d'un algorithme
d'apprentissage supervis\'e. La m\'ethode a \'et\'e test\'ee sur des nuages de
points de la ville de Paris, en montrant de bons r\'esultats de d\'etection et
de classification dans l'ensemble de donn\'ees.---In this article, we present a
method for detection and classification of artifacts at the street level, in
order to filter cloud point, facilitating the urban modeling process. Our
approach exploits 3D information by using range image, a projection of 3D
points onto an image plane where the pixel intensity is a function of the
measured distance between 3D points and the plane. By assuming that the
artifacts are on the ground, they are detected using a Top-Hat of the hole
filling algorithm of range images. Then, several features are extracted from
the detected connected components and a stepwise forward variable/model
selection by using the Wilk's Lambda criterion is performed. Afterward, CCs are
classified in four categories (lampposts, pedestrians, cars and others) by
using a supervised machine learning method. The proposed method was tested on
cloud points of Paris, and have shown satisfactory results on the whole
dataset.
|
1306.2863 | Jun Sun | Jun Sun, Xiaojun Wu, Vasile Palade, Wei Fang, Yuhui Shi | Random Drift Particle Swarm Optimization | The paper is the work in progress on particle swarm optimization. It
has 41 pages and 7 figures | null | null | null | cs.AI cs.NE math.OC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The random drift particle swarm optimization (RDPSO) algorithm, inspired by
the free electron model in metal conductors placed in an external electric
field, is presented, systematically analyzed and empirically studied in this
paper. The free electron model considers that electrons have both a thermal and
a drift motion in a conductor that is placed in an external electric field. The
motivation of the RDPSO algorithm is described first, and the velocity equation
of the particle is designed by simulating the thermal motion as well as the
drift motion of the electrons, both of which lead the electrons to a location
with minimum potential energy in the external electric field. Then, a
comprehensive analysis of the algorithm is made, in order to provide a deep
insight into how the RDPSO algorithm works. It involves a theoretical analysis
and the simulation of the stochastic dynamical behavior of a single particle in
the RDPSO algorithm. The search behavior of the algorithm itself is also
investigated in detail, by analyzing the interaction between the particles.
Some variants of the RDPSO algorithm are proposed by incorporating different
random velocity components with different neighborhood topologies. Finally,
empirical studies on the RDPSO algorithm are performed by using a set of
benchmark functions from the CEC2005 benchmark suite. Based on the theoretical
analysis of the particle's behavior, two methods of controlling the algorithmic
parameters are employed, followed by an experimental analysis on how to select
the parameter values, in order to obtain a good overall performance of the
RDPSO algorithm and its variants in real-world applications. A further
performance comparison between the RDPSO algorithms and other variants of PSO
is made to prove the efficiency of the RDPSO algorithms.
| [
{
"version": "v1",
"created": "Wed, 12 Jun 2013 15:34:51 GMT"
}
] | 2013-06-13T00:00:00 | [
[
"Sun",
"Jun",
""
],
[
"Wu",
"Xiaojun",
""
],
[
"Palade",
"Vasile",
""
],
[
"Fang",
"Wei",
""
],
[
"Shi",
"Yuhui",
""
]
] | TITLE: Random Drift Particle Swarm Optimization
ABSTRACT: The random drift particle swarm optimization (RDPSO) algorithm, inspired by
the free electron model in metal conductors placed in an external electric
field, is presented, systematically analyzed and empirically studied in this
paper. The free electron model considers that electrons have both a thermal and
a drift motion in a conductor that is placed in an external electric field. The
motivation of the RDPSO algorithm is described first, and the velocity equation
of the particle is designed by simulating the thermal motion as well as the
drift motion of the electrons, both of which lead the electrons to a location
with minimum potential energy in the external electric field. Then, a
comprehensive analysis of the algorithm is made, in order to provide a deep
insight into how the RDPSO algorithm works. It involves a theoretical analysis
and the simulation of the stochastic dynamical behavior of a single particle in
the RDPSO algorithm. The search behavior of the algorithm itself is also
investigated in detail, by analyzing the interaction between the particles.
Some variants of the RDPSO algorithm are proposed by incorporating different
random velocity components with different neighborhood topologies. Finally,
empirical studies on the RDPSO algorithm are performed by using a set of
benchmark functions from the CEC2005 benchmark suite. Based on the theoretical
analysis of the particle's behavior, two methods of controlling the algorithmic
parameters are employed, followed by an experimental analysis on how to select
the parameter values, in order to obtain a good overall performance of the
RDPSO algorithm and its variants in real-world applications. A further
performance comparison between the RDPSO algorithms and other variants of PSO
is made to prove the efficiency of the RDPSO algorithms.
|
1306.2864 | Catarina Moreira | Catarina Moreira and Andreas Wichert | Finding Academic Experts on a MultiSensor Approach using Shannon's
Entropy | null | Journal of Expert Systems with Applications, 2013, volume 40,
issue 14 | 10.1016/j.eswa.2013.04.001 | null | cs.AI cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Expert finding is an information retrieval task concerned with the search for
the most knowledgeable people, in some topic, with basis on documents
describing peoples activities. The task involves taking a user query as input
and returning a list of people sorted by their level of expertise regarding the
user query. This paper introduces a novel approach for combining multiple
estimators of expertise based on a multisensor data fusion framework together
with the Dempster-Shafer theory of evidence and Shannon's entropy. More
specifically, we defined three sensors which detect heterogeneous information
derived from the textual contents, from the graph structure of the citation
patterns for the community of experts, and from profile information about the
academic experts. Given the evidences collected, each sensor may define
different candidates as experts and consequently do not agree in a final
ranking decision. To deal with these conflicts, we applied the Dempster-Shafer
theory of evidence combined with Shannon's Entropy formula to fuse this
information and come up with a more accurate and reliable final ranking list.
Experiments made over two datasets of academic publications from the Computer
Science domain attest for the adequacy of the proposed approach over the
traditional state of the art approaches. We also made experiments against
representative supervised state of the art algorithms. Results revealed that
the proposed method achieved a similar performance when compared to these
supervised techniques, confirming the capabilities of the proposed framework.
| [
{
"version": "v1",
"created": "Wed, 12 Jun 2013 15:35:57 GMT"
}
] | 2013-06-13T00:00:00 | [
[
"Moreira",
"Catarina",
""
],
[
"Wichert",
"Andreas",
""
]
] | TITLE: Finding Academic Experts on a MultiSensor Approach using Shannon's
Entropy
ABSTRACT: Expert finding is an information retrieval task concerned with the search for
the most knowledgeable people, in some topic, with basis on documents
describing peoples activities. The task involves taking a user query as input
and returning a list of people sorted by their level of expertise regarding the
user query. This paper introduces a novel approach for combining multiple
estimators of expertise based on a multisensor data fusion framework together
with the Dempster-Shafer theory of evidence and Shannon's entropy. More
specifically, we defined three sensors which detect heterogeneous information
derived from the textual contents, from the graph structure of the citation
patterns for the community of experts, and from profile information about the
academic experts. Given the evidences collected, each sensor may define
different candidates as experts and consequently do not agree in a final
ranking decision. To deal with these conflicts, we applied the Dempster-Shafer
theory of evidence combined with Shannon's Entropy formula to fuse this
information and come up with a more accurate and reliable final ranking list.
Experiments made over two datasets of academic publications from the Computer
Science domain attest for the adequacy of the proposed approach over the
traditional state of the art approaches. We also made experiments against
representative supervised state of the art algorithms. Results revealed that
the proposed method achieved a similar performance when compared to these
supervised techniques, confirming the capabilities of the proposed framework.
|
1306.2459 | Sutanay Choudhury | Sutanay Choudhury, Lawrence Holder, George Chin, John Feo | Fast Search for Dynamic Multi-Relational Graphs | SIGMOD Workshop on Dynamic Networks Management and Mining (DyNetMM),
2013 | null | null | null | cs.DB | http://creativecommons.org/licenses/publicdomain/ | Acting on time-critical events by processing ever growing social media or
news streams is a major technical challenge. Many of these data sources can be
modeled as multi-relational graphs. Continuous queries or techniques to search
for rare events that typically arise in monitoring applications have been
studied extensively for relational databases. This work is dedicated to answer
the question that emerges naturally: how can we efficiently execute a
continuous query on a dynamic graph? This paper presents an exact subgraph
search algorithm that exploits the temporal characteristics of representative
queries for online news or social media monitoring. The algorithm is based on a
novel data structure called the Subgraph Join Tree (SJ-Tree) that leverages the
structural and semantic characteristics of the underlying multi-relational
graph. The paper concludes with extensive experimentation on several real-world
datasets that demonstrates the validity of this approach.
| [
{
"version": "v1",
"created": "Tue, 11 Jun 2013 09:21:42 GMT"
}
] | 2013-06-12T00:00:00 | [
[
"Choudhury",
"Sutanay",
""
],
[
"Holder",
"Lawrence",
""
],
[
"Chin",
"George",
""
],
[
"Feo",
"John",
""
]
] | TITLE: Fast Search for Dynamic Multi-Relational Graphs
ABSTRACT: Acting on time-critical events by processing ever growing social media or
news streams is a major technical challenge. Many of these data sources can be
modeled as multi-relational graphs. Continuous queries or techniques to search
for rare events that typically arise in monitoring applications have been
studied extensively for relational databases. This work is dedicated to answer
the question that emerges naturally: how can we efficiently execute a
continuous query on a dynamic graph? This paper presents an exact subgraph
search algorithm that exploits the temporal characteristics of representative
queries for online news or social media monitoring. The algorithm is based on a
novel data structure called the Subgraph Join Tree (SJ-Tree) that leverages the
structural and semantic characteristics of the underlying multi-relational
graph. The paper concludes with extensive experimentation on several real-world
datasets that demonstrates the validity of this approach.
|
1306.2597 | Tao Qin Dr. | Tao Qin and Tie-Yan Liu | Introducing LETOR 4.0 Datasets | null | null | null | null | cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | LETOR is a package of benchmark data sets for research on LEarning TO Rank,
which contains standard features, relevance judgments, data partitioning,
evaluation tools, and several baselines. Version 1.0 was released in April
2007. Version 2.0 was released in Dec. 2007. Version 3.0 was released in Dec.
2008. This version, 4.0, was released in July 2009. Very different from
previous versions (V3.0 is an update based on V2.0 and V2.0 is an update based
on V1.0), LETOR4.0 is a totally new release. It uses the Gov2 web page
collection (~25M pages) and two query sets from Million Query track of TREC
2007 and TREC 2008. We call the two query sets MQ2007 and MQ2008 for short.
There are about 1700 queries in MQ2007 with labeled documents and about 800
queries in MQ2008 with labeled documents. If you have any questions or
suggestions about the datasets, please kindly email us ([email protected]).
Our goal is to make the dataset reliable and useful for the community.
| [
{
"version": "v1",
"created": "Sun, 9 Jun 2013 09:58:00 GMT"
}
] | 2013-06-12T00:00:00 | [
[
"Qin",
"Tao",
""
],
[
"Liu",
"Tie-Yan",
""
]
] | TITLE: Introducing LETOR 4.0 Datasets
ABSTRACT: LETOR is a package of benchmark data sets for research on LEarning TO Rank,
which contains standard features, relevance judgments, data partitioning,
evaluation tools, and several baselines. Version 1.0 was released in April
2007. Version 2.0 was released in Dec. 2007. Version 3.0 was released in Dec.
2008. This version, 4.0, was released in July 2009. Very different from
previous versions (V3.0 is an update based on V2.0 and V2.0 is an update based
on V1.0), LETOR4.0 is a totally new release. It uses the Gov2 web page
collection (~25M pages) and two query sets from Million Query track of TREC
2007 and TREC 2008. We call the two query sets MQ2007 and MQ2008 for short.
There are about 1700 queries in MQ2007 with labeled documents and about 800
queries in MQ2008 with labeled documents. If you have any questions or
suggestions about the datasets, please kindly email us ([email protected]).
Our goal is to make the dataset reliable and useful for the community.
|
1302.4760 | Lauro Costa | Lauro Beltr\~ao Costa and Abmar Barros and Samer Al-Kiswany and Hao
Yang and Emalayan Vairavanathan and Matei Ripeanu | Predicting Intermediate Storage Performance for Workflow Applications | null | null | null | NetSysLab - TR 2013/02 | cs.DC cs.PF | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Configuring a storage system to better serve an application is a challenging
task complicated by a multidimensional, discrete configuration space and the
high cost of space exploration (e.g., by running the application with different
storage configurations). To enable selecting the best configuration in a
reasonable time, we design an end-to-end performance prediction mechanism that
estimates the turn-around time of an application using storage system under a
given configuration. This approach focuses on a generic object-based storage
system design, supports exploring the impact of optimizations targeting
workflow applications (e.g., various data placement schemes) in addition to
other, more traditional, configuration knobs (e.g., stripe size or replication
level), and models the system operation at data-chunk and control message
level.
This paper presents our experience to date with designing and using this
prediction mechanism. We evaluate this mechanism using micro- as well as
synthetic benchmarks mimicking real workflow applications, and a real
application.. A preliminary evaluation shows that we are on a good track to
meet our objectives: it can scale to model a workflow application run on an
entire cluster while offering an over 200x speedup factor (normalized by
resource) compared to running the actual application, and can achieve, in the
limited number of scenarios we study, a prediction accuracy that enables
identifying the best storage system configuration.
| [
{
"version": "v1",
"created": "Tue, 19 Feb 2013 21:39:16 GMT"
},
{
"version": "v2",
"created": "Mon, 10 Jun 2013 04:09:34 GMT"
}
] | 2013-06-11T00:00:00 | [
[
"Costa",
"Lauro Beltrão",
""
],
[
"Barros",
"Abmar",
""
],
[
"Al-Kiswany",
"Samer",
""
],
[
"Yang",
"Hao",
""
],
[
"Vairavanathan",
"Emalayan",
""
],
[
"Ripeanu",
"Matei",
""
]
] | TITLE: Predicting Intermediate Storage Performance for Workflow Applications
ABSTRACT: Configuring a storage system to better serve an application is a challenging
task complicated by a multidimensional, discrete configuration space and the
high cost of space exploration (e.g., by running the application with different
storage configurations). To enable selecting the best configuration in a
reasonable time, we design an end-to-end performance prediction mechanism that
estimates the turn-around time of an application using storage system under a
given configuration. This approach focuses on a generic object-based storage
system design, supports exploring the impact of optimizations targeting
workflow applications (e.g., various data placement schemes) in addition to
other, more traditional, configuration knobs (e.g., stripe size or replication
level), and models the system operation at data-chunk and control message
level.
This paper presents our experience to date with designing and using this
prediction mechanism. We evaluate this mechanism using micro- as well as
synthetic benchmarks mimicking real workflow applications, and a real
application.. A preliminary evaluation shows that we are on a good track to
meet our objectives: it can scale to model a workflow application run on an
entire cluster while offering an over 200x speedup factor (normalized by
resource) compared to running the actual application, and can achieve, in the
limited number of scenarios we study, a prediction accuracy that enables
identifying the best storage system configuration.
|
1305.5486 | John Scoville | John Scoville | Fast Autocorrelated Context Models for Data Compression | v2 includes bibliography | null | null | null | cs.IT cs.MM math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A method is presented to automatically generate context models of data by
calculating the data's autocorrelation function. The largest values of the
autocorrelation function occur at the offsets or lags in the bitstream which
tend to be the most highly correlated to any particular location. These offsets
are ideal for use in predictive coding, such as predictive partial match (PPM)
or context-mixing algorithms for data compression, making such algorithms more
efficient and more general by reducing or eliminating the need for ad-hoc
models based on particular types of data. Instead of using the definition of
the autocorrelation function, which considers the pairwise correlations of data
requiring O(n^2) time, the Weiner-Khinchin theorem is applied, quickly
obtaining the autocorrelation as the inverse Fast Fourier transform of the
data's power spectrum in O(n log n) time, making the technique practical for
the compression of large data objects. The method is shown to produce the
highest levels of performance obtained to date on a lossless image compression
benchmark.
| [
{
"version": "v1",
"created": "Thu, 23 May 2013 17:11:39 GMT"
},
{
"version": "v2",
"created": "Mon, 10 Jun 2013 06:24:43 GMT"
}
] | 2013-06-11T00:00:00 | [
[
"Scoville",
"John",
""
]
] | TITLE: Fast Autocorrelated Context Models for Data Compression
ABSTRACT: A method is presented to automatically generate context models of data by
calculating the data's autocorrelation function. The largest values of the
autocorrelation function occur at the offsets or lags in the bitstream which
tend to be the most highly correlated to any particular location. These offsets
are ideal for use in predictive coding, such as predictive partial match (PPM)
or context-mixing algorithms for data compression, making such algorithms more
efficient and more general by reducing or eliminating the need for ad-hoc
models based on particular types of data. Instead of using the definition of
the autocorrelation function, which considers the pairwise correlations of data
requiring O(n^2) time, the Weiner-Khinchin theorem is applied, quickly
obtaining the autocorrelation as the inverse Fast Fourier transform of the
data's power spectrum in O(n log n) time, making the technique practical for
the compression of large data objects. The method is shown to produce the
highest levels of performance obtained to date on a lossless image compression
benchmark.
|
1306.1850 | Ayad Ghany Ismaeel | Ayad Ghany Ismaeel, Anar Auda Ablahad | Enhancement of a Novel Method for Mutational Disease Prediction using
Bioinformatics Techniques and Backpropagation Algorithm | 5 pages, 8 figures, 1 Table, conference or other essential info | International Journal of Scientific & Engineering Research, Volume
4, Issue 6, June 2013 pages 1169-1173 | null | null | cs.CE q-bio.QM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The noval method for mutational disease prediction using bioinformatics tools
and datasets for diagnosis the malignant mutations with powerful Artificial
Neural Network (Backpropagation Network) for classifying these malignant
mutations are related to gene(s) (like BRCA1 and BRCA2) cause a disease (breast
cancer). This noval method did not take in consideration just like adopted for
dealing, analyzing and treat the gene sequences for extracting useful
information from the sequence, also exceeded the environment factors which play
important roles in deciding and calculating some of genes features in order to
view its functional parts and relations to diseases. This paper is proposed an
enhancement of a novel method as a first way for diagnosis and prediction the
disease by mutations considering and introducing multi other features show the
alternations, changes in the environment as well as genes, comparing sequences
to gain information about the structure or function of a query sequence, also
proposing optimal and more accurate system for classification and dealing with
specific disorder using backpropagation with mean square rate 0.000000001.
Index Terms (Homology sequence, GC content and AT content, Bioinformatics,
Backpropagation Network, BLAST, DNA Sequence, Protein Sequence)
| [
{
"version": "v1",
"created": "Fri, 7 Jun 2013 21:53:25 GMT"
}
] | 2013-06-11T00:00:00 | [
[
"Ismaeel",
"Ayad Ghany",
""
],
[
"Ablahad",
"Anar Auda",
""
]
] | TITLE: Enhancement of a Novel Method for Mutational Disease Prediction using
Bioinformatics Techniques and Backpropagation Algorithm
ABSTRACT: The noval method for mutational disease prediction using bioinformatics tools
and datasets for diagnosis the malignant mutations with powerful Artificial
Neural Network (Backpropagation Network) for classifying these malignant
mutations are related to gene(s) (like BRCA1 and BRCA2) cause a disease (breast
cancer). This noval method did not take in consideration just like adopted for
dealing, analyzing and treat the gene sequences for extracting useful
information from the sequence, also exceeded the environment factors which play
important roles in deciding and calculating some of genes features in order to
view its functional parts and relations to diseases. This paper is proposed an
enhancement of a novel method as a first way for diagnosis and prediction the
disease by mutations considering and introducing multi other features show the
alternations, changes in the environment as well as genes, comparing sequences
to gain information about the structure or function of a query sequence, also
proposing optimal and more accurate system for classification and dealing with
specific disorder using backpropagation with mean square rate 0.000000001.
Index Terms (Homology sequence, GC content and AT content, Bioinformatics,
Backpropagation Network, BLAST, DNA Sequence, Protein Sequence)
|
1306.1907 | Mouhamed Abdulla | Mouhamed Abdulla and Yousef R. Shayan | Analytical Coexistence Benchmark for Assessing the Utmost Interference
Tolerated by IEEE 802.20 | null | Journal of Information Processing Systems, vol. 7, no. 1, pp.
43-52, Mar. 2011 | 10.3745/JIPS.2011.7.1.043 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Whether it is crosstalk, harmonics, or in-band operation of wireless
technologies, interference between a reference system and a host of offenders
is virtually unavoidable. In past contributions, a benchmark has been
established and considered for coexistence analysis with a number of
technologies including FWA, UMTS, and WiMAX. However, the previously presented
model does not take into account the mobility factor of the reference node in
addition to a number of interdependent requirements regarding the link
direction, channel state, data rate and system factors; hence limiting its
applicability for the MBWA (IEEE 802.20) standard. Thus, over diverse modes, in
this correspondence we analytically derived the greatest aggregate interference
level tolerated for high-fidelity transmission tailored specifically for the
MBWA standard. Our results, in the form of benchmark indicators, should be of
particular interest to peers analyzing and researching RF coexistence scenarios
with this new protocol.
| [
{
"version": "v1",
"created": "Sat, 8 Jun 2013 11:08:52 GMT"
}
] | 2013-06-11T00:00:00 | [
[
"Abdulla",
"Mouhamed",
""
],
[
"Shayan",
"Yousef R.",
""
]
] | TITLE: Analytical Coexistence Benchmark for Assessing the Utmost Interference
Tolerated by IEEE 802.20
ABSTRACT: Whether it is crosstalk, harmonics, or in-band operation of wireless
technologies, interference between a reference system and a host of offenders
is virtually unavoidable. In past contributions, a benchmark has been
established and considered for coexistence analysis with a number of
technologies including FWA, UMTS, and WiMAX. However, the previously presented
model does not take into account the mobility factor of the reference node in
addition to a number of interdependent requirements regarding the link
direction, channel state, data rate and system factors; hence limiting its
applicability for the MBWA (IEEE 802.20) standard. Thus, over diverse modes, in
this correspondence we analytically derived the greatest aggregate interference
level tolerated for high-fidelity transmission tailored specifically for the
MBWA standard. Our results, in the form of benchmark indicators, should be of
particular interest to peers analyzing and researching RF coexistence scenarios
with this new protocol.
|
1306.1945 | Anvesh Komuravelli | Anvesh Komuravelli, Arie Gurfinkel, Sagar Chaki and Edmund M. Clarke | Automatic Abstraction in SMT-Based Unbounded Software Model Checking | Extended version of a paper in the proceedings of CAV 2013 | null | null | null | cs.LO cs.PL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Software model checkers based on under-approximations and SMT solvers are
very successful at verifying safety (i.e. reachability) properties. They
combine two key ideas -- (a) "concreteness": a counterexample in an
under-approximation is a counterexample in the original program as well, and
(b) "generalization": a proof of safety of an under-approximation, produced by
an SMT solver, are generalizable to proofs of safety of the original program.
In this paper, we present a combination of "automatic abstraction" with the
under-approximation-driven framework. We explore two iterative approaches for
obtaining and refining abstractions -- "proof based" and "counterexample based"
-- and show how they can be combined into a unified algorithm. To the best of
our knowledge, this is the first application of Proof-Based Abstraction,
primarily used to verify hardware, to Software Verification. We have
implemented a prototype of the framework using Z3, and evaluate it on many
benchmarks from the Software Verification Competition. We show experimentally
that our combination is quite effective on hard instances.
| [
{
"version": "v1",
"created": "Sat, 8 Jun 2013 18:41:28 GMT"
}
] | 2013-06-11T00:00:00 | [
[
"Komuravelli",
"Anvesh",
""
],
[
"Gurfinkel",
"Arie",
""
],
[
"Chaki",
"Sagar",
""
],
[
"Clarke",
"Edmund M.",
""
]
] | TITLE: Automatic Abstraction in SMT-Based Unbounded Software Model Checking
ABSTRACT: Software model checkers based on under-approximations and SMT solvers are
very successful at verifying safety (i.e. reachability) properties. They
combine two key ideas -- (a) "concreteness": a counterexample in an
under-approximation is a counterexample in the original program as well, and
(b) "generalization": a proof of safety of an under-approximation, produced by
an SMT solver, are generalizable to proofs of safety of the original program.
In this paper, we present a combination of "automatic abstraction" with the
under-approximation-driven framework. We explore two iterative approaches for
obtaining and refining abstractions -- "proof based" and "counterexample based"
-- and show how they can be combined into a unified algorithm. To the best of
our knowledge, this is the first application of Proof-Based Abstraction,
primarily used to verify hardware, to Software Verification. We have
implemented a prototype of the framework using Z3, and evaluate it on many
benchmarks from the Software Verification Competition. We show experimentally
that our combination is quite effective on hard instances.
|
1306.2037 | Maryam Yazdani | Maryam Yazdani, Morteza Saheb Zamani, Mehdi Sedighi | A Quantum Physical Design Flow Using ILP and Graph Drawing | 17 figures, 12 tables, Quantum Information Processing Journal. arXiv
admin note: text overlap with arXiv:0704.0268 by other authors | null | null | null | quant-ph cs.ET | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Implementing large-scale quantum circuits is one of the challenges of quantum
computing. One of the central challenges of accurately modeling the
architecture of these circuits is to schedule a quantum application and
generate the layout while taking into account the cost of communications and
classical resources as well as the maximum exploitable parallelism. In this
paper, we present and evaluate a design flow for arbitrary quantum circuits in
ion trap technology. Our design flow consists of two parts. First, a scheduler
takes a description of a circuit and finds the best order for the execution of
its quantum gates using integer linear programming (ILP) regarding the
classical resources (qubits) and instruction dependencies. Then a layout
generator receives the schedule produced by the scheduler and generates a
layout for this circuit using a graph-drawing algorithm. Our experimental
results show that the proposed flow decreases the average latency of quantum
circuits by about 11% for a set of attempted benchmarks and by about 9% for
another set of benchmarks compared with the best in literature.
| [
{
"version": "v1",
"created": "Sun, 9 Jun 2013 16:44:15 GMT"
}
] | 2013-06-11T00:00:00 | [
[
"Yazdani",
"Maryam",
""
],
[
"Zamani",
"Morteza Saheb",
""
],
[
"Sedighi",
"Mehdi",
""
]
] | TITLE: A Quantum Physical Design Flow Using ILP and Graph Drawing
ABSTRACT: Implementing large-scale quantum circuits is one of the challenges of quantum
computing. One of the central challenges of accurately modeling the
architecture of these circuits is to schedule a quantum application and
generate the layout while taking into account the cost of communications and
classical resources as well as the maximum exploitable parallelism. In this
paper, we present and evaluate a design flow for arbitrary quantum circuits in
ion trap technology. Our design flow consists of two parts. First, a scheduler
takes a description of a circuit and finds the best order for the execution of
its quantum gates using integer linear programming (ILP) regarding the
classical resources (qubits) and instruction dependencies. Then a layout
generator receives the schedule produced by the scheduler and generates a
layout for this circuit using a graph-drawing algorithm. Our experimental
results show that the proposed flow decreases the average latency of quantum
circuits by about 11% for a set of attempted benchmarks and by about 9% for
another set of benchmarks compared with the best in literature.
|
1306.2084 | Maximilian Nickel | Maximilian Nickel, Volker Tresp | Logistic Tensor Factorization for Multi-Relational Data | Accepted at ICML 2013 Workshop "Structured Learning: Inferring Graphs
from Structured and Unstructured Inputs" (SLG 2013) | null | null | null | stat.ML cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Tensor factorizations have become increasingly popular approaches for various
learning tasks on structured data. In this work, we extend the RESCAL tensor
factorization, which has shown state-of-the-art results for multi-relational
learning, to account for the binary nature of adjacency tensors. We study the
improvements that can be gained via this approach on various benchmark datasets
and show that the logistic extension can improve the prediction results
significantly.
| [
{
"version": "v1",
"created": "Mon, 10 Jun 2013 01:45:49 GMT"
}
] | 2013-06-11T00:00:00 | [
[
"Nickel",
"Maximilian",
""
],
[
"Tresp",
"Volker",
""
]
] | TITLE: Logistic Tensor Factorization for Multi-Relational Data
ABSTRACT: Tensor factorizations have become increasingly popular approaches for various
learning tasks on structured data. In this work, we extend the RESCAL tensor
factorization, which has shown state-of-the-art results for multi-relational
learning, to account for the binary nature of adjacency tensors. We study the
improvements that can be gained via this approach on various benchmark datasets
and show that the logistic extension can improve the prediction results
significantly.
|
1306.2118 | E.N.Sathishkumar | E.N.Sathishkumar, K.Thangavel, T.Chandrasekhar | A Novel Approach for Single Gene Selection Using Clustering and
Dimensionality Reduction | 6 pages, 4 figures. arXiv admin note: text overlap with
arXiv:1306.1323 | International Journal of Scientific & Engineering Research, Volume
4, Issue 5, May-2013, page no 1540-1545 | null | null | cs.CE cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We extend the standard rough set-based approach to deal with huge amounts of
numeric attributes versus small amount of available objects. Here, a novel
approach of clustering along with dimensionality reduction; Hybrid Fuzzy C
Means-Quick Reduct (FCMQR) algorithm is proposed for single gene selection.
Gene selection is a process to select genes which are more informative. It is
one of the important steps in knowledge discovery. The problem is that all
genes are not important in gene expression data. Some of the genes may be
redundant, and others may be irrelevant and noisy. In this study, the entire
dataset is divided in proper grouping of similar genes by applying Fuzzy C
Means (FCM) algorithm. A high class discriminated genes has been selected based
on their degree of dependence by applying Quick Reduct algorithm based on Rough
Set Theory to all the resultant clusters. Average Correlation Value (ACV) is
calculated for the high class discriminated genes. The clusters which have the
ACV value a s 1 is determined as significant clusters, whose classification
accuracy will be equal or high when comparing to the accuracy of the entire
dataset. The proposed algorithm is evaluated using WEKA classifiers and
compared. Finally, experimental results related to the leukemia cancer data
confirm that our approach is quite promising, though it surely requires further
research.
| [
{
"version": "v1",
"created": "Mon, 10 Jun 2013 07:28:51 GMT"
}
] | 2013-06-11T00:00:00 | [
[
"Sathishkumar",
"E. N.",
""
],
[
"Thangavel",
"K.",
""
],
[
"Chandrasekhar",
"T.",
""
]
] | TITLE: A Novel Approach for Single Gene Selection Using Clustering and
Dimensionality Reduction
ABSTRACT: We extend the standard rough set-based approach to deal with huge amounts of
numeric attributes versus small amount of available objects. Here, a novel
approach of clustering along with dimensionality reduction; Hybrid Fuzzy C
Means-Quick Reduct (FCMQR) algorithm is proposed for single gene selection.
Gene selection is a process to select genes which are more informative. It is
one of the important steps in knowledge discovery. The problem is that all
genes are not important in gene expression data. Some of the genes may be
redundant, and others may be irrelevant and noisy. In this study, the entire
dataset is divided in proper grouping of similar genes by applying Fuzzy C
Means (FCM) algorithm. A high class discriminated genes has been selected based
on their degree of dependence by applying Quick Reduct algorithm based on Rough
Set Theory to all the resultant clusters. Average Correlation Value (ACV) is
calculated for the high class discriminated genes. The clusters which have the
ACV value a s 1 is determined as significant clusters, whose classification
accuracy will be equal or high when comparing to the accuracy of the entire
dataset. The proposed algorithm is evaluated using WEKA classifiers and
compared. Finally, experimental results related to the leukemia cancer data
confirm that our approach is quite promising, though it surely requires further
research.
|
1306.2119 | Francis Bach | Francis Bach (INRIA Paris - Rocquencourt, LIENS), Eric Moulines (LTCI) | Non-strongly-convex smooth stochastic approximation with convergence
rate O(1/n) | null | null | null | null | cs.LG math.OC stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider the stochastic approximation problem where a convex function has
to be minimized, given only the knowledge of unbiased estimates of its
gradients at certain points, a framework which includes machine learning
methods based on the minimization of the empirical risk. We focus on problems
without strong convexity, for which all previously known algorithms achieve a
convergence rate for function values of O(1/n^{1/2}). We consider and analyze
two algorithms that achieve a rate of O(1/n) for classical supervised learning
problems. For least-squares regression, we show that averaged stochastic
gradient descent with constant step-size achieves the desired rate. For
logistic regression, this is achieved by a simple novel stochastic gradient
algorithm that (a) constructs successive local quadratic approximations of the
loss functions, while (b) preserving the same running time complexity as
stochastic gradient descent. For these algorithms, we provide a non-asymptotic
analysis of the generalization error (in expectation, and also in high
probability for least-squares), and run extensive experiments on standard
machine learning benchmarks showing that they often outperform existing
approaches.
| [
{
"version": "v1",
"created": "Mon, 10 Jun 2013 07:31:10 GMT"
}
] | 2013-06-11T00:00:00 | [
[
"Bach",
"Francis",
"",
"INRIA Paris - Rocquencourt, LIENS"
],
[
"Moulines",
"Eric",
"",
"LTCI"
]
] | TITLE: Non-strongly-convex smooth stochastic approximation with convergence
rate O(1/n)
ABSTRACT: We consider the stochastic approximation problem where a convex function has
to be minimized, given only the knowledge of unbiased estimates of its
gradients at certain points, a framework which includes machine learning
methods based on the minimization of the empirical risk. We focus on problems
without strong convexity, for which all previously known algorithms achieve a
convergence rate for function values of O(1/n^{1/2}). We consider and analyze
two algorithms that achieve a rate of O(1/n) for classical supervised learning
problems. For least-squares regression, we show that averaged stochastic
gradient descent with constant step-size achieves the desired rate. For
logistic regression, this is achieved by a simple novel stochastic gradient
algorithm that (a) constructs successive local quadratic approximations of the
loss functions, while (b) preserving the same running time complexity as
stochastic gradient descent. For these algorithms, we provide a non-asymptotic
analysis of the generalization error (in expectation, and also in high
probability for least-squares), and run extensive experiments on standard
machine learning benchmarks showing that they often outperform existing
approaches.
|
1305.0445 | Yoshua Bengio | Yoshua Bengio | Deep Learning of Representations: Looking Forward | null | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Deep learning research aims at discovering learning algorithms that discover
multiple levels of distributed representations, with higher levels representing
more abstract concepts. Although the study of deep learning has already led to
impressive theoretical results, learning algorithms and breakthrough
experiments, several challenges lie ahead. This paper proposes to examine some
of these challenges, centering on the questions of scaling deep learning
algorithms to much larger models and datasets, reducing optimization
difficulties due to ill-conditioning or local minima, designing more efficient
and powerful inference and sampling procedures, and learning to disentangle the
factors of variation underlying the observed data. It also proposes a few
forward-looking research directions aimed at overcoming these challenges.
| [
{
"version": "v1",
"created": "Thu, 2 May 2013 14:33:28 GMT"
},
{
"version": "v2",
"created": "Fri, 7 Jun 2013 02:35:21 GMT"
}
] | 2013-06-10T00:00:00 | [
[
"Bengio",
"Yoshua",
""
]
] | TITLE: Deep Learning of Representations: Looking Forward
ABSTRACT: Deep learning research aims at discovering learning algorithms that discover
multiple levels of distributed representations, with higher levels representing
more abstract concepts. Although the study of deep learning has already led to
impressive theoretical results, learning algorithms and breakthrough
experiments, several challenges lie ahead. This paper proposes to examine some
of these challenges, centering on the questions of scaling deep learning
algorithms to much larger models and datasets, reducing optimization
difficulties due to ill-conditioning or local minima, designing more efficient
and powerful inference and sampling procedures, and learning to disentangle the
factors of variation underlying the observed data. It also proposes a few
forward-looking research directions aimed at overcoming these challenges.
|
1306.1630 | Arunasalam Sambhanthan | Arunasalam Sambhanthan, Alice Good | Enhancing Tourism Destination Accessibility in Developing Countries
through Virtual Worlds | Journal article corresponding to arXiv:1302.5199 | null | null | null | cs.HC cs.CY | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The problem of destination accessibility is a vital concern in the
sustainable tourism development in the emerging regions due to the increasing
numbers of tourism business growth in the recent times. Tourism is one of the
potential foreign exchange earning sectors, which place sustainability as one
of the main success metrics for benchmarking the overall development of the
industry. On the other hand, there are several destinations, which are
inaccessible to tourists due to several reasons. Underutilization of potential
destinations in both pre purchase and consumption stages is a strategic
disadvantage for emerging countries on leading their tourism industry towards
sustainability. This research embarks on a content analysis of second life
based tourism groups and places. Requirement of a virtual world model to
increase the destination accessibility of tourism products has been outlined.
The model has to be designed with visual and auditory experience to tourists.
The model is expected to enhance the accessibility of destinations for users of
different categories.
| [
{
"version": "v1",
"created": "Fri, 7 Jun 2013 06:39:58 GMT"
}
] | 2013-06-10T00:00:00 | [
[
"Sambhanthan",
"Arunasalam",
""
],
[
"Good",
"Alice",
""
]
] | TITLE: Enhancing Tourism Destination Accessibility in Developing Countries
through Virtual Worlds
ABSTRACT: The problem of destination accessibility is a vital concern in the
sustainable tourism development in the emerging regions due to the increasing
numbers of tourism business growth in the recent times. Tourism is one of the
potential foreign exchange earning sectors, which place sustainability as one
of the main success metrics for benchmarking the overall development of the
industry. On the other hand, there are several destinations, which are
inaccessible to tourists due to several reasons. Underutilization of potential
destinations in both pre purchase and consumption stages is a strategic
disadvantage for emerging countries on leading their tourism industry towards
sustainability. This research embarks on a content analysis of second life
based tourism groups and places. Requirement of a virtual world model to
increase the destination accessibility of tourism products has been outlined.
The model has to be designed with visual and auditory experience to tourists.
The model is expected to enhance the accessibility of destinations for users of
different categories.
|
1306.1716 | Alexander Petukhov | Alexander Petukhov and Inna Kozlov | Fast greedy algorithm for subspace clustering from corrupted and
incomplete data | arXiv admin note: substantial text overlap with arXiv:1304.4282 | null | null | null | cs.LG cs.DS math.NA stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We describe the Fast Greedy Sparse Subspace Clustering (FGSSC) algorithm
providing an efficient method for clustering data belonging to a few
low-dimensional linear or affine subspaces. The main difference of our
algorithm from predecessors is its ability to work with noisy data having a
high rate of erasures (missed entries with the known coordinates) and errors
(corrupted entries with unknown coordinates). We discuss here how to implement
the fast version of the greedy algorithm with the maximum efficiency whose
greedy strategy is incorporated into iterations of the basic algorithm.
We provide numerical evidences that, in the subspace clustering capability,
the fast greedy algorithm outperforms not only the existing state-of-the art
SSC algorithm taken by the authors as a basic algorithm but also the recent
GSSC algorithm. At the same time, its computational cost is only slightly
higher than the cost of SSC.
The numerical evidence of the algorithm significant advantage is presented
for a few synthetic models as well as for the Extended Yale B dataset of facial
images. In particular, the face recognition misclassification rate turned out
to be 6-20 times lower than for the SSC algorithm. We provide also the
numerical evidence that the FGSSC algorithm is able to perform clustering of
corrupted data efficiently even when the sum of subspace dimensions
significantly exceeds the dimension of the ambient space.
| [
{
"version": "v1",
"created": "Fri, 7 Jun 2013 13:14:50 GMT"
}
] | 2013-06-10T00:00:00 | [
[
"Petukhov",
"Alexander",
""
],
[
"Kozlov",
"Inna",
""
]
] | TITLE: Fast greedy algorithm for subspace clustering from corrupted and
incomplete data
ABSTRACT: We describe the Fast Greedy Sparse Subspace Clustering (FGSSC) algorithm
providing an efficient method for clustering data belonging to a few
low-dimensional linear or affine subspaces. The main difference of our
algorithm from predecessors is its ability to work with noisy data having a
high rate of erasures (missed entries with the known coordinates) and errors
(corrupted entries with unknown coordinates). We discuss here how to implement
the fast version of the greedy algorithm with the maximum efficiency whose
greedy strategy is incorporated into iterations of the basic algorithm.
We provide numerical evidences that, in the subspace clustering capability,
the fast greedy algorithm outperforms not only the existing state-of-the art
SSC algorithm taken by the authors as a basic algorithm but also the recent
GSSC algorithm. At the same time, its computational cost is only slightly
higher than the cost of SSC.
The numerical evidence of the algorithm significant advantage is presented
for a few synthetic models as well as for the Extended Yale B dataset of facial
images. In particular, the face recognition misclassification rate turned out
to be 6-20 times lower than for the SSC algorithm. We provide also the
numerical evidence that the FGSSC algorithm is able to perform clustering of
corrupted data efficiently even when the sum of subspace dimensions
significantly exceeds the dimension of the ambient space.
|
1306.1773 | Daniel Graziotin | Daniel Graziotin and Pekka Abrahamsson (Free University of
Bozen-Bolzano) | Making Sense out of a Jungle of JavaScript Frameworks: towards a
Practitioner-friendly Comparative Analysis | 5 Pages, 1 Figure. The final publication is available at
link.springer.com. Link:
http://link.springer.com/chapter/10.1007/978-3-642-39259-7_28. DOI:
10.1007/978-3-642-39259-7_28 | Proceedings of the 14th International Conference on
Product-Focused Software Process Improvement (PROFES 2013), LNCS 7983,
Springer-Verlag, pp. 334-337, 2013 | 10.1007/978-3-642-39259-7_28 | null | cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The field of Web development is entering the HTML5 and CSS3 era and
JavaScript is becoming increasingly influential. A large number of JavaScript
frameworks have been recently promoted. Practitioners applying the latest
technologies need to choose a suitable JavaScript framework (JSF) in order to
abstract the frustrating and complicated coding steps and to provide a
cross-browser compatibility. Apart from benchmark suites and recommendation
from experts, there is little research helping practitioners to select the most
suitable JSF to a given situation. The few proposals employ software metrics on
the JSF, but practitioners are driven by different concerns when choosing a
JSF. As an answer to the critical needs, this paper is a call for action. It
proposes a re-search design towards a comparative analysis framework of JSF,
which merges researcher needs and practitioner needs.
| [
{
"version": "v1",
"created": "Fri, 7 Jun 2013 16:53:24 GMT"
}
] | 2013-06-10T00:00:00 | [
[
"Graziotin",
"Daniel",
"",
"Free University of\n Bozen-Bolzano"
],
[
"Abrahamsson",
"Pekka",
"",
"Free University of\n Bozen-Bolzano"
]
] | TITLE: Making Sense out of a Jungle of JavaScript Frameworks: towards a
Practitioner-friendly Comparative Analysis
ABSTRACT: The field of Web development is entering the HTML5 and CSS3 era and
JavaScript is becoming increasingly influential. A large number of JavaScript
frameworks have been recently promoted. Practitioners applying the latest
technologies need to choose a suitable JavaScript framework (JSF) in order to
abstract the frustrating and complicated coding steps and to provide a
cross-browser compatibility. Apart from benchmark suites and recommendation
from experts, there is little research helping practitioners to select the most
suitable JSF to a given situation. The few proposals employ software metrics on
the JSF, but practitioners are driven by different concerns when choosing a
JSF. As an answer to the critical needs, this paper is a call for action. It
proposes a re-search design towards a comparative analysis framework of JSF,
which merges researcher needs and practitioner needs.
|
1104.2930 | Donghui Yan | Donghui Yan, Aiyou Chen, Michael I. Jordan | Cluster Forests | 23 pages, 6 figures | Computational Statistics and Data Analysis 2013, Vol. 66, 178-192 | 10.1016/j.csda.2013.04.010 | COMSTA5571 | stat.ME cs.LG stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | With inspiration from Random Forests (RF) in the context of classification, a
new clustering ensemble method---Cluster Forests (CF) is proposed.
Geometrically, CF randomly probes a high-dimensional data cloud to obtain "good
local clusterings" and then aggregates via spectral clustering to obtain
cluster assignments for the whole dataset. The search for good local
clusterings is guided by a cluster quality measure kappa. CF progressively
improves each local clustering in a fashion that resembles the tree growth in
RF. Empirical studies on several real-world datasets under two different
performance metrics show that CF compares favorably to its competitors.
Theoretical analysis reveals that the kappa measure makes it possible to grow
the local clustering in a desirable way---it is "noise-resistant". A
closed-form expression is obtained for the mis-clustering rate of spectral
clustering under a perturbation model, which yields new insights into some
aspects of spectral clustering.
| [
{
"version": "v1",
"created": "Thu, 14 Apr 2011 21:29:10 GMT"
},
{
"version": "v2",
"created": "Mon, 18 Apr 2011 05:06:04 GMT"
},
{
"version": "v3",
"created": "Thu, 23 May 2013 21:17:26 GMT"
}
] | 2013-06-07T00:00:00 | [
[
"Yan",
"Donghui",
""
],
[
"Chen",
"Aiyou",
""
],
[
"Jordan",
"Michael I.",
""
]
] | TITLE: Cluster Forests
ABSTRACT: With inspiration from Random Forests (RF) in the context of classification, a
new clustering ensemble method---Cluster Forests (CF) is proposed.
Geometrically, CF randomly probes a high-dimensional data cloud to obtain "good
local clusterings" and then aggregates via spectral clustering to obtain
cluster assignments for the whole dataset. The search for good local
clusterings is guided by a cluster quality measure kappa. CF progressively
improves each local clustering in a fashion that resembles the tree growth in
RF. Empirical studies on several real-world datasets under two different
performance metrics show that CF compares favorably to its competitors.
Theoretical analysis reveals that the kappa measure makes it possible to grow
the local clustering in a desirable way---it is "noise-resistant". A
closed-form expression is obtained for the mis-clustering rate of spectral
clustering under a perturbation model, which yields new insights into some
aspects of spectral clustering.
|
1306.0842 | Krikamol Muandet | Krikamol Muandet, Kenji Fukumizu, Bharath Sriperumbudur, Arthur
Gretton, Bernhard Sch\"olkopf | Kernel Mean Estimation and Stein's Effect | first draft | null | null | null | stat.ML cs.LG math.ST stat.TH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A mean function in reproducing kernel Hilbert space, or a kernel mean, is an
important part of many applications ranging from kernel principal component
analysis to Hilbert-space embedding of distributions. Given finite samples, an
empirical average is the standard estimate for the true kernel mean. We show
that this estimator can be improved via a well-known phenomenon in statistics
called Stein's phenomenon. After consideration, our theoretical analysis
reveals the existence of a wide class of estimators that are better than the
standard. Focusing on a subset of this class, we propose efficient shrinkage
estimators for the kernel mean. Empirical evaluations on several benchmark
applications clearly demonstrate that the proposed estimators outperform the
standard kernel mean estimator.
| [
{
"version": "v1",
"created": "Tue, 4 Jun 2013 16:09:20 GMT"
},
{
"version": "v2",
"created": "Thu, 6 Jun 2013 17:18:25 GMT"
}
] | 2013-06-07T00:00:00 | [
[
"Muandet",
"Krikamol",
""
],
[
"Fukumizu",
"Kenji",
""
],
[
"Sriperumbudur",
"Bharath",
""
],
[
"Gretton",
"Arthur",
""
],
[
"Schölkopf",
"Bernhard",
""
]
] | TITLE: Kernel Mean Estimation and Stein's Effect
ABSTRACT: A mean function in reproducing kernel Hilbert space, or a kernel mean, is an
important part of many applications ranging from kernel principal component
analysis to Hilbert-space embedding of distributions. Given finite samples, an
empirical average is the standard estimate for the true kernel mean. We show
that this estimator can be improved via a well-known phenomenon in statistics
called Stein's phenomenon. After consideration, our theoretical analysis
reveals the existence of a wide class of estimators that are better than the
standard. Focusing on a subset of this class, we propose efficient shrinkage
estimators for the kernel mean. Empirical evaluations on several benchmark
applications clearly demonstrate that the proposed estimators outperform the
standard kernel mean estimator.
|
1306.1298 | Allon G. Percus | Cristina Garcia-Cardona, Arjuna Flenner, Allon G. Percus | Multiclass Semi-Supervised Learning on Graphs using Ginzburg-Landau
Functional Minimization | 16 pages, to appear in Springer's Lecture Notes in Computer Science
volume "Pattern Recognition Applications and Methods 2013", part of series on
Advances in Intelligent and Soft Computing | null | null | null | stat.ML cs.LG math.ST physics.data-an stat.TH | http://creativecommons.org/licenses/publicdomain/ | We present a graph-based variational algorithm for classification of
high-dimensional data, generalizing the binary diffuse interface model to the
case of multiple classes. Motivated by total variation techniques, the method
involves minimizing an energy functional made up of three terms. The first two
terms promote a stepwise continuous classification function with sharp
transitions between classes, while preserving symmetry among the class labels.
The third term is a data fidelity term, allowing us to incorporate prior
information into the model in a semi-supervised framework. The performance of
the algorithm on synthetic data, as well as on the COIL and MNIST benchmark
datasets, is competitive with state-of-the-art graph-based multiclass
segmentation methods.
| [
{
"version": "v1",
"created": "Thu, 6 Jun 2013 05:32:00 GMT"
}
] | 2013-06-07T00:00:00 | [
[
"Garcia-Cardona",
"Cristina",
""
],
[
"Flenner",
"Arjuna",
""
],
[
"Percus",
"Allon G.",
""
]
] | TITLE: Multiclass Semi-Supervised Learning on Graphs using Ginzburg-Landau
Functional Minimization
ABSTRACT: We present a graph-based variational algorithm for classification of
high-dimensional data, generalizing the binary diffuse interface model to the
case of multiple classes. Motivated by total variation techniques, the method
involves minimizing an energy functional made up of three terms. The first two
terms promote a stepwise continuous classification function with sharp
transitions between classes, while preserving symmetry among the class labels.
The third term is a data fidelity term, allowing us to incorporate prior
information into the model in a semi-supervised framework. The performance of
the algorithm on synthetic data, as well as on the COIL and MNIST benchmark
datasets, is competitive with state-of-the-art graph-based multiclass
segmentation methods.
|
1209.1797 | Eitan Menahem | Eitan Menahem, Alon Schclar, Lior Rokach, Yuval Elovici | Securing Your Transactions: Detecting Anomalous Patterns In XML
Documents | Journal version (14 pages) | null | null | null | cs.CR cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | XML transactions are used in many information systems to store data and
interact with other systems. Abnormal transactions, the result of either an
on-going cyber attack or the actions of a benign user, can potentially harm the
interacting systems and therefore they are regarded as a threat. In this paper
we address the problem of anomaly detection and localization in XML
transactions using machine learning techniques. We present a new XML anomaly
detection framework, XML-AD. Within this framework, an automatic method for
extracting features from XML transactions was developed as well as a practical
method for transforming XML features into vectors of fixed dimensionality. With
these two methods in place, the XML-AD framework makes it possible to utilize
general learning algorithms for anomaly detection. Central to the functioning
of the framework is a novel multi-univariate anomaly detection algorithm,
ADIFA. The framework was evaluated on four XML transactions datasets, captured
from real information systems, in which it achieved over 89% true positive
detection rate with less than a 0.2% false positive rate.
| [
{
"version": "v1",
"created": "Sun, 9 Sep 2012 13:02:49 GMT"
},
{
"version": "v2",
"created": "Tue, 11 Sep 2012 05:48:34 GMT"
},
{
"version": "v3",
"created": "Wed, 5 Jun 2013 13:19:42 GMT"
}
] | 2013-06-06T00:00:00 | [
[
"Menahem",
"Eitan",
""
],
[
"Schclar",
"Alon",
""
],
[
"Rokach",
"Lior",
""
],
[
"Elovici",
"Yuval",
""
]
] | TITLE: Securing Your Transactions: Detecting Anomalous Patterns In XML
Documents
ABSTRACT: XML transactions are used in many information systems to store data and
interact with other systems. Abnormal transactions, the result of either an
on-going cyber attack or the actions of a benign user, can potentially harm the
interacting systems and therefore they are regarded as a threat. In this paper
we address the problem of anomaly detection and localization in XML
transactions using machine learning techniques. We present a new XML anomaly
detection framework, XML-AD. Within this framework, an automatic method for
extracting features from XML transactions was developed as well as a practical
method for transforming XML features into vectors of fixed dimensionality. With
these two methods in place, the XML-AD framework makes it possible to utilize
general learning algorithms for anomaly detection. Central to the functioning
of the framework is a novel multi-univariate anomaly detection algorithm,
ADIFA. The framework was evaluated on four XML transactions datasets, captured
from real information systems, in which it achieved over 89% true positive
detection rate with less than a 0.2% false positive rate.
|
1303.6310 | Iztok Fister | Iztok Fister Jr., Du\v{s}an Fister, Xin-She Yang | A hybrid bat algorithm | Electrotechnical review, 2013 | null | null | null | cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Swarm intelligence is a very powerful technique to be used for optimization
purposes. In this paper we present a new swarm intelligence algorithm, based on
the bat algorithm. The Bat algorithm is hybridized with differential evolution
strategies. Besides showing very promising results of the standard benchmark
functions, this hybridization also significantly improves the original bat
algorithm.
| [
{
"version": "v1",
"created": "Mon, 25 Mar 2013 20:53:09 GMT"
},
{
"version": "v2",
"created": "Mon, 29 Apr 2013 12:21:44 GMT"
},
{
"version": "v3",
"created": "Wed, 5 Jun 2013 15:46:53 GMT"
}
] | 2013-06-06T00:00:00 | [
[
"Fister",
"Iztok",
"Jr."
],
[
"Fister",
"Dušan",
""
],
[
"Yang",
"Xin-She",
""
]
] | TITLE: A hybrid bat algorithm
ABSTRACT: Swarm intelligence is a very powerful technique to be used for optimization
purposes. In this paper we present a new swarm intelligence algorithm, based on
the bat algorithm. The Bat algorithm is hybridized with differential evolution
strategies. Besides showing very promising results of the standard benchmark
functions, this hybridization also significantly improves the original bat
algorithm.
|
1306.0974 | Jiuqing Wan | Jiuqing Wan, Li Liu | Distributed Bayesian inference for consistent labeling of tracked
objects in non-overlapping camera networks | 19 pages, 8 figures | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | One of the fundamental requirements for visual surveillance using
non-overlapping camera networks is the correct labeling of tracked objects on
each camera in a consistent way,in the sense that the captured tracklets, or
observations in this paper, of the same object at different cameras should be
assigned with the same label. In this paper, we formulate this task as a
Bayesian inference problem and propose a distributed inference framework in
which the posterior distribution of labeling variable corresponding to each
observation, conditioned on all history appearance and spatio-temporal evidence
made in the whole networks, is calculated based solely on local information
processing on each camera and mutual information exchanging between neighboring
cameras. In our framework, the number of objects presenting in the monitored
region, i.e. the sampling space of labeling variables, does not need to be
specified beforehand. Instead, it can be determined automatically on the fly.
In addition, we make no assumption about the appearance distribution of a
single object, but use similarity scores between appearance pairs, given by
advanced object re-identification algorithm, as appearance likelihood for
inference. This feature makes our method very flexible and competitive when
observing condition undergoes large changes across camera views. To cope with
the problem of missing detection, which is critical for distributed inference,
we consider an enlarged neighborhood of each camera during inference and use a
mixture model to describe the higher order spatio-temporal constraints. The
robustness of the algorithm against missing detection is improved at the cost
of slightly increased computation and communication burden at each camera node.
Finally, we demonstrate the effectiveness of our method through experiments on
an indoor Office Building dataset and an outdoor Campus Garden dataset.
| [
{
"version": "v1",
"created": "Wed, 5 Jun 2013 03:50:58 GMT"
}
] | 2013-06-06T00:00:00 | [
[
"Wan",
"Jiuqing",
""
],
[
"Liu",
"Li",
""
]
] | TITLE: Distributed Bayesian inference for consistent labeling of tracked
objects in non-overlapping camera networks
ABSTRACT: One of the fundamental requirements for visual surveillance using
non-overlapping camera networks is the correct labeling of tracked objects on
each camera in a consistent way,in the sense that the captured tracklets, or
observations in this paper, of the same object at different cameras should be
assigned with the same label. In this paper, we formulate this task as a
Bayesian inference problem and propose a distributed inference framework in
which the posterior distribution of labeling variable corresponding to each
observation, conditioned on all history appearance and spatio-temporal evidence
made in the whole networks, is calculated based solely on local information
processing on each camera and mutual information exchanging between neighboring
cameras. In our framework, the number of objects presenting in the monitored
region, i.e. the sampling space of labeling variables, does not need to be
specified beforehand. Instead, it can be determined automatically on the fly.
In addition, we make no assumption about the appearance distribution of a
single object, but use similarity scores between appearance pairs, given by
advanced object re-identification algorithm, as appearance likelihood for
inference. This feature makes our method very flexible and competitive when
observing condition undergoes large changes across camera views. To cope with
the problem of missing detection, which is critical for distributed inference,
we consider an enlarged neighborhood of each camera during inference and use a
mixture model to describe the higher order spatio-temporal constraints. The
robustness of the algorithm against missing detection is improved at the cost
of slightly increased computation and communication burden at each camera node.
Finally, we demonstrate the effectiveness of our method through experiments on
an indoor Office Building dataset and an outdoor Campus Garden dataset.
|
1306.1034 | Mehul Bhatt | Mehul Bhatt and Jakob Suchan and Christian Freksa | ROTUNDE - A Smart Meeting Cinematography Initiative: Tools, Datasets,
and Benchmarks for Cognitive Interpretation and Control | Appears in AAAI-2013 Workshop on: Space, Time, and Ambient
Intelligence (STAMI 2013) | null | null | null | cs.AI cs.CV cs.HC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We construe smart meeting cinematography with a focus on professional
situations such as meetings and seminars, possibly conducted in a distributed
manner across socio-spatially separated groups. The basic objective in smart
meeting cinematography is to interpret professional interactions involving
people, and automatically produce dynamic recordings of discussions, debates,
presentations etc in the presence of multiple communication modalities. Typical
modalities include gestures (e.g., raising one's hand for a question,
applause), voice and interruption, electronic apparatus (e.g., pressing a
button), movement (e.g., standing-up, moving around) etc. ROTUNDE, an instance
of smart meeting cinematography concept, aims to: (a) develop
functionality-driven benchmarks with respect to the interpretation and control
capabilities of human-cinematographers, real-time video editors, surveillance
personnel, and typical human performance in everyday situations; (b) Develop
general tools for the commonsense cognitive interpretation of dynamic scenes
from the viewpoint of visuo-spatial cognition centred perceptual
narrativisation. Particular emphasis is placed on declarative representations
and interfacing mechanisms that seamlessly integrate within large-scale
cognitive (interaction) systems and companion technologies consisting of
diverse AI sub-components. For instance, the envisaged tools would provide
general capabilities for high-level commonsense reasoning about space, events,
actions, change, and interaction.
| [
{
"version": "v1",
"created": "Wed, 5 Jun 2013 09:40:24 GMT"
}
] | 2013-06-06T00:00:00 | [
[
"Bhatt",
"Mehul",
""
],
[
"Suchan",
"Jakob",
""
],
[
"Freksa",
"Christian",
""
]
] | TITLE: ROTUNDE - A Smart Meeting Cinematography Initiative: Tools, Datasets,
and Benchmarks for Cognitive Interpretation and Control
ABSTRACT: We construe smart meeting cinematography with a focus on professional
situations such as meetings and seminars, possibly conducted in a distributed
manner across socio-spatially separated groups. The basic objective in smart
meeting cinematography is to interpret professional interactions involving
people, and automatically produce dynamic recordings of discussions, debates,
presentations etc in the presence of multiple communication modalities. Typical
modalities include gestures (e.g., raising one's hand for a question,
applause), voice and interruption, electronic apparatus (e.g., pressing a
button), movement (e.g., standing-up, moving around) etc. ROTUNDE, an instance
of smart meeting cinematography concept, aims to: (a) develop
functionality-driven benchmarks with respect to the interpretation and control
capabilities of human-cinematographers, real-time video editors, surveillance
personnel, and typical human performance in everyday situations; (b) Develop
general tools for the commonsense cognitive interpretation of dynamic scenes
from the viewpoint of visuo-spatial cognition centred perceptual
narrativisation. Particular emphasis is placed on declarative representations
and interfacing mechanisms that seamlessly integrate within large-scale
cognitive (interaction) systems and companion technologies consisting of
diverse AI sub-components. For instance, the envisaged tools would provide
general capabilities for high-level commonsense reasoning about space, events,
actions, change, and interaction.
|
1306.1083 | Puneet Kumar | Pierre-Yves Baudin (INRIA Saclay - Ile de France), Danny Goodman,
Puneet Kumar (INRIA Saclay - Ile de France, CVN), Noura Azzabou (MIRCEN,
UPMC), Pierre G. Carlier (UPMC), Nikos Paragios (INRIA Saclay - Ile de
France, LIGM, ENPC, MAS), M. Pawan Kumar (INRIA Saclay - Ile de France, CVN) | Discriminative Parameter Estimation for Random Walks Segmentation:
Technical Report | null | null | null | null | cs.CV cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The Random Walks (RW) algorithm is one of the most e - cient and easy-to-use
probabilistic segmentation methods. By combining contrast terms with prior
terms, it provides accurate segmentations of medical images in a fully
automated manner. However, one of the main drawbacks of using the RW algorithm
is that its parameters have to be hand-tuned. we propose a novel discriminative
learning framework that estimates the parameters using a training dataset. The
main challenge we face is that the training samples are not fully supervised.
Speci cally, they provide a hard segmentation of the images, instead of a
proba-bilistic segmentation. We overcome this challenge by treating the optimal
probabilistic segmentation that is compatible with the given hard segmentation
as a latent variable. This allows us to employ the latent support vector
machine formulation for parameter estimation. We show that our approach signi
cantly outperforms the baseline methods on a challenging dataset consisting of
real clinical 3D MRI volumes of skeletal muscles.
| [
{
"version": "v1",
"created": "Wed, 5 Jun 2013 12:48:02 GMT"
}
] | 2013-06-06T00:00:00 | [
[
"Baudin",
"Pierre-Yves",
"",
"INRIA Saclay - Ile de France"
],
[
"Goodman",
"Danny",
"",
"INRIA Saclay - Ile de France, CVN"
],
[
"Kumar",
"Puneet",
"",
"INRIA Saclay - Ile de France, CVN"
],
[
"Azzabou",
"Noura",
"",
"MIRCEN,\n UPMC"
],
[
"Carlier",
"Pierre G.",
"",
"UPMC"
],
[
"Paragios",
"Nikos",
"",
"INRIA Saclay - Ile de\n France, LIGM, ENPC, MAS"
],
[
"Kumar",
"M. Pawan",
"",
"INRIA Saclay - Ile de France, CVN"
]
] | TITLE: Discriminative Parameter Estimation for Random Walks Segmentation:
Technical Report
ABSTRACT: The Random Walks (RW) algorithm is one of the most e - cient and easy-to-use
probabilistic segmentation methods. By combining contrast terms with prior
terms, it provides accurate segmentations of medical images in a fully
automated manner. However, one of the main drawbacks of using the RW algorithm
is that its parameters have to be hand-tuned. we propose a novel discriminative
learning framework that estimates the parameters using a training dataset. The
main challenge we face is that the training samples are not fully supervised.
Speci cally, they provide a hard segmentation of the images, instead of a
proba-bilistic segmentation. We overcome this challenge by treating the optimal
probabilistic segmentation that is compatible with the given hard segmentation
as a latent variable. This allows us to employ the latent support vector
machine formulation for parameter estimation. We show that our approach signi
cantly outperforms the baseline methods on a challenging dataset consisting of
real clinical 3D MRI volumes of skeletal muscles.
|
0812.2291 | Aleksandrs Slivkins | Moshe Babaioff, Yogeshwer Sharma, Aleksandrs Slivkins | Characterizing Truthful Multi-Armed Bandit Mechanisms | This is the full version of a conference paper published in ACM EC
2009. This revision is re-focused to emphasize the results that do not rely
on the "IIA assumption" (see the paper for the definition) | null | null | null | cs.DS cs.GT cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider a multi-round auction setting motivated by pay-per-click auctions
for Internet advertising. In each round the auctioneer selects an advertiser
and shows her ad, which is then either clicked or not. An advertiser derives
value from clicks; the value of a click is her private information. Initially,
neither the auctioneer nor the advertisers have any information about the
likelihood of clicks on the advertisements. The auctioneer's goal is to design
a (dominant strategies) truthful mechanism that (approximately) maximizes the
social welfare.
If the advertisers bid their true private values, our problem is equivalent
to the "multi-armed bandit problem", and thus can be viewed as a strategic
version of the latter. In particular, for both problems the quality of an
algorithm can be characterized by "regret", the difference in social welfare
between the algorithm and the benchmark which always selects the same "best"
advertisement. We investigate how the design of multi-armed bandit algorithms
is affected by the restriction that the resulting mechanism must be truthful.
We find that truthful mechanisms have certain strong structural properties --
essentially, they must separate exploration from exploitation -- and they incur
much higher regret than the optimal multi-armed bandit algorithms. Moreover, we
provide a truthful mechanism which (essentially) matches our lower bound on
regret.
| [
{
"version": "v1",
"created": "Fri, 12 Dec 2008 04:13:01 GMT"
},
{
"version": "v2",
"created": "Thu, 15 Jan 2009 01:56:08 GMT"
},
{
"version": "v3",
"created": "Fri, 20 Feb 2009 18:10:47 GMT"
},
{
"version": "v4",
"created": "Tue, 23 Jun 2009 02:21:56 GMT"
},
{
"version": "v5",
"created": "Fri, 18 Sep 2009 00:17:44 GMT"
},
{
"version": "v6",
"created": "Tue, 15 May 2012 22:57:53 GMT"
},
{
"version": "v7",
"created": "Mon, 3 Jun 2013 21:03:36 GMT"
}
] | 2013-06-05T00:00:00 | [
[
"Babaioff",
"Moshe",
""
],
[
"Sharma",
"Yogeshwer",
""
],
[
"Slivkins",
"Aleksandrs",
""
]
] | TITLE: Characterizing Truthful Multi-Armed Bandit Mechanisms
ABSTRACT: We consider a multi-round auction setting motivated by pay-per-click auctions
for Internet advertising. In each round the auctioneer selects an advertiser
and shows her ad, which is then either clicked or not. An advertiser derives
value from clicks; the value of a click is her private information. Initially,
neither the auctioneer nor the advertisers have any information about the
likelihood of clicks on the advertisements. The auctioneer's goal is to design
a (dominant strategies) truthful mechanism that (approximately) maximizes the
social welfare.
If the advertisers bid their true private values, our problem is equivalent
to the "multi-armed bandit problem", and thus can be viewed as a strategic
version of the latter. In particular, for both problems the quality of an
algorithm can be characterized by "regret", the difference in social welfare
between the algorithm and the benchmark which always selects the same "best"
advertisement. We investigate how the design of multi-armed bandit algorithms
is affected by the restriction that the resulting mechanism must be truthful.
We find that truthful mechanisms have certain strong structural properties --
essentially, they must separate exploration from exploitation -- and they incur
much higher regret than the optimal multi-armed bandit algorithms. Moreover, we
provide a truthful mechanism which (essentially) matches our lower bound on
regret.
|
1306.0886 | Felix X. Yu | Felix X. Yu, Dong Liu, Sanjiv Kumar, Tony Jebara, Shih-Fu Chang | $\propto$SVM for learning with label proportions | Appears in Proceedings of the 30th International Conference on
Machine Learning (ICML 2013) | null | null | null | cs.LG stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study the problem of learning with label proportions in which the training
data is provided in groups and only the proportion of each class in each group
is known. We propose a new method called proportion-SVM, or $\propto$SVM, which
explicitly models the latent unknown instance labels together with the known
group label proportions in a large-margin framework. Unlike the existing works,
our approach avoids making restrictive assumptions about the data. The
$\propto$SVM model leads to a non-convex integer programming problem. In order
to solve it efficiently, we propose two algorithms: one based on simple
alternating optimization and the other based on a convex relaxation. Extensive
experiments on standard datasets show that $\propto$SVM outperforms the
state-of-the-art, especially for larger group sizes.
| [
{
"version": "v1",
"created": "Tue, 4 Jun 2013 19:35:31 GMT"
}
] | 2013-06-05T00:00:00 | [
[
"Yu",
"Felix X.",
""
],
[
"Liu",
"Dong",
""
],
[
"Kumar",
"Sanjiv",
""
],
[
"Jebara",
"Tony",
""
],
[
"Chang",
"Shih-Fu",
""
]
] | TITLE: $\propto$SVM for learning with label proportions
ABSTRACT: We study the problem of learning with label proportions in which the training
data is provided in groups and only the proportion of each class in each group
is known. We propose a new method called proportion-SVM, or $\propto$SVM, which
explicitly models the latent unknown instance labels together with the known
group label proportions in a large-margin framework. Unlike the existing works,
our approach avoids making restrictive assumptions about the data. The
$\propto$SVM model leads to a non-convex integer programming problem. In order
to solve it efficiently, we propose two algorithms: one based on simple
alternating optimization and the other based on a convex relaxation. Extensive
experiments on standard datasets show that $\propto$SVM outperforms the
state-of-the-art, especially for larger group sizes.
|
1210.0091 | Hong Zhao | Hong Zhao, Fan Min, William Zhu | Test-cost-sensitive attribute reduction of data with normal distribution
measurement errors | This paper has been withdrawn by the author due to the error of the
title | null | null | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The measurement error with normal distribution is universal in applications.
Generally, smaller measurement error requires better instrument and higher test
cost. In decision making based on attribute values of objects, we shall select
an attribute subset with appropriate measurement error to minimize the total
test cost. Recently, error-range-based covering rough set with uniform
distribution error was proposed to investigate this issue. However, the
measurement errors satisfy normal distribution instead of uniform distribution
which is rather simple for most applications. In this paper, we introduce
normal distribution measurement errors to covering-based rough set model, and
deal with test-cost-sensitive attribute reduction problem in this new model.
The major contributions of this paper are four-fold. First, we build a new data
model based on normal distribution measurement errors. With the new data model,
the error range is an ellipse in a two-dimension space. Second, the
covering-based rough set with normal distribution measurement errors is
constructed through the "3-sigma" rule. Third, the test-cost-sensitive
attribute reduction problem is redefined on this covering-based rough set.
Fourth, a heuristic algorithm is proposed to deal with this problem. The
algorithm is tested on ten UCI (University of California - Irvine) datasets.
The experimental results show that the algorithm is more effective and
efficient than the existing one. This study is a step toward realistic
applications of cost-sensitive learning.
| [
{
"version": "v1",
"created": "Sat, 29 Sep 2012 10:22:55 GMT"
},
{
"version": "v2",
"created": "Mon, 3 Jun 2013 03:15:51 GMT"
}
] | 2013-06-04T00:00:00 | [
[
"Zhao",
"Hong",
""
],
[
"Min",
"Fan",
""
],
[
"Zhu",
"William",
""
]
] | TITLE: Test-cost-sensitive attribute reduction of data with normal distribution
measurement errors
ABSTRACT: The measurement error with normal distribution is universal in applications.
Generally, smaller measurement error requires better instrument and higher test
cost. In decision making based on attribute values of objects, we shall select
an attribute subset with appropriate measurement error to minimize the total
test cost. Recently, error-range-based covering rough set with uniform
distribution error was proposed to investigate this issue. However, the
measurement errors satisfy normal distribution instead of uniform distribution
which is rather simple for most applications. In this paper, we introduce
normal distribution measurement errors to covering-based rough set model, and
deal with test-cost-sensitive attribute reduction problem in this new model.
The major contributions of this paper are four-fold. First, we build a new data
model based on normal distribution measurement errors. With the new data model,
the error range is an ellipse in a two-dimension space. Second, the
covering-based rough set with normal distribution measurement errors is
constructed through the "3-sigma" rule. Third, the test-cost-sensitive
attribute reduction problem is redefined on this covering-based rough set.
Fourth, a heuristic algorithm is proposed to deal with this problem. The
algorithm is tested on ten UCI (University of California - Irvine) datasets.
The experimental results show that the algorithm is more effective and
efficient than the existing one. This study is a step toward realistic
applications of cost-sensitive learning.
|
1303.0309 | Krikamol Muandet | Krikamol Muandet and Bernhard Sch\"olkopf | One-Class Support Measure Machines for Group Anomaly Detection | Conference on Uncertainty in Artificial Intelligence (UAI2013) | null | null | null | stat.ML cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose one-class support measure machines (OCSMMs) for group anomaly
detection which aims at recognizing anomalous aggregate behaviors of data
points. The OCSMMs generalize well-known one-class support vector machines
(OCSVMs) to a space of probability measures. By formulating the problem as
quantile estimation on distributions, we can establish an interesting
connection to the OCSVMs and variable kernel density estimators (VKDEs) over
the input space on which the distributions are defined, bridging the gap
between large-margin methods and kernel density estimators. In particular, we
show that various types of VKDEs can be considered as solutions to a class of
regularization problems studied in this paper. Experiments on Sloan Digital Sky
Survey dataset and High Energy Particle Physics dataset demonstrate the
benefits of the proposed framework in real-world applications.
| [
{
"version": "v1",
"created": "Fri, 1 Mar 2013 21:50:09 GMT"
},
{
"version": "v2",
"created": "Sat, 1 Jun 2013 13:42:46 GMT"
}
] | 2013-06-04T00:00:00 | [
[
"Muandet",
"Krikamol",
""
],
[
"Schölkopf",
"Bernhard",
""
]
] | TITLE: One-Class Support Measure Machines for Group Anomaly Detection
ABSTRACT: We propose one-class support measure machines (OCSMMs) for group anomaly
detection which aims at recognizing anomalous aggregate behaviors of data
points. The OCSMMs generalize well-known one-class support vector machines
(OCSVMs) to a space of probability measures. By formulating the problem as
quantile estimation on distributions, we can establish an interesting
connection to the OCSVMs and variable kernel density estimators (VKDEs) over
the input space on which the distributions are defined, bridging the gap
between large-margin methods and kernel density estimators. In particular, we
show that various types of VKDEs can be considered as solutions to a class of
regularization problems studied in this paper. Experiments on Sloan Digital Sky
Survey dataset and High Energy Particle Physics dataset demonstrate the
benefits of the proposed framework in real-world applications.
|
1306.0152 | Eugenio Culurciello Eugenio Culurciello | Eugenio Culurciello, Jonghoon Jin, Aysegul Dundar, Jordan Bates | An Analysis of the Connections Between Layers of Deep Neural Networks | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present an analysis of different techniques for selecting the connection
be- tween layers of deep neural networks. Traditional deep neural networks use
ran- dom connection tables between layers to keep the number of connections
small and tune to different image features. This kind of connection performs
adequately in supervised deep networks because their values are refined during
the training. On the other hand, in unsupervised learning, one cannot rely on
back-propagation techniques to learn the connections between layers. In this
work, we tested four different techniques for connecting the first layer of the
network to the second layer on the CIFAR and SVHN datasets and showed that the
accuracy can be im- proved up to 3% depending on the technique used. We also
showed that learning the connections based on the co-occurrences of the
features does not confer an advantage over a random connection table in small
networks. This work is helpful to improve the efficiency of connections between
the layers of unsupervised deep neural networks.
| [
{
"version": "v1",
"created": "Sat, 1 Jun 2013 21:37:25 GMT"
}
] | 2013-06-04T00:00:00 | [
[
"Culurciello",
"Eugenio",
""
],
[
"Jin",
"Jonghoon",
""
],
[
"Dundar",
"Aysegul",
""
],
[
"Bates",
"Jordan",
""
]
] | TITLE: An Analysis of the Connections Between Layers of Deep Neural Networks
ABSTRACT: We present an analysis of different techniques for selecting the connection
be- tween layers of deep neural networks. Traditional deep neural networks use
ran- dom connection tables between layers to keep the number of connections
small and tune to different image features. This kind of connection performs
adequately in supervised deep networks because their values are refined during
the training. On the other hand, in unsupervised learning, one cannot rely on
back-propagation techniques to learn the connections between layers. In this
work, we tested four different techniques for connecting the first layer of the
network to the second layer on the CIFAR and SVHN datasets and showed that the
accuracy can be im- proved up to 3% depending on the technique used. We also
showed that learning the connections based on the co-occurrences of the
features does not confer an advantage over a random connection table in small
networks. This work is helpful to improve the efficiency of connections between
the layers of unsupervised deep neural networks.
|
1306.0326 | Tomasz Kajdanowicz | Tomasz Kajdanowicz, Przemyslaw Kazienko, Wojciech Indyk | Parallel Processing of Large Graphs | Preprint submitted to Future Generation Computer Systems | null | null | null | cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | More and more large data collections are gathered worldwide in various IT
systems. Many of them possess the networked nature and need to be processed and
analysed as graph structures. Due to their size they require very often usage
of parallel paradigm for efficient computation. Three parallel techniques have
been compared in the paper: MapReduce, its map-side join extension and Bulk
Synchronous Parallel (BSP). They are implemented for two different graph
problems: calculation of single source shortest paths (SSSP) and collective
classification of graph nodes by means of relational influence propagation
(RIP). The methods and algorithms are applied to several network datasets
differing in size and structural profile, originating from three domains:
telecommunication, multimedia and microblog. The results revealed that
iterative graph processing with the BSP implementation always and
significantly, even up to 10 times outperforms MapReduce, especially for
algorithms with many iterations and sparse communication. Also MapReduce
extension based on map-side join usually noticeably presents better efficiency,
although not as much as BSP. Nevertheless, MapReduce still remains the good
alternative for enormous networks, whose data structures do not fit in local
memories.
| [
{
"version": "v1",
"created": "Mon, 3 Jun 2013 08:44:32 GMT"
}
] | 2013-06-04T00:00:00 | [
[
"Kajdanowicz",
"Tomasz",
""
],
[
"Kazienko",
"Przemyslaw",
""
],
[
"Indyk",
"Wojciech",
""
]
] | TITLE: Parallel Processing of Large Graphs
ABSTRACT: More and more large data collections are gathered worldwide in various IT
systems. Many of them possess the networked nature and need to be processed and
analysed as graph structures. Due to their size they require very often usage
of parallel paradigm for efficient computation. Three parallel techniques have
been compared in the paper: MapReduce, its map-side join extension and Bulk
Synchronous Parallel (BSP). They are implemented for two different graph
problems: calculation of single source shortest paths (SSSP) and collective
classification of graph nodes by means of relational influence propagation
(RIP). The methods and algorithms are applied to several network datasets
differing in size and structural profile, originating from three domains:
telecommunication, multimedia and microblog. The results revealed that
iterative graph processing with the BSP implementation always and
significantly, even up to 10 times outperforms MapReduce, especially for
algorithms with many iterations and sparse communication. Also MapReduce
extension based on map-side join usually noticeably presents better efficiency,
although not as much as BSP. Nevertheless, MapReduce still remains the good
alternative for enormous networks, whose data structures do not fit in local
memories.
|
1306.0424 | Lionel Tabourier | Abdelhamid Salah Brahim, Lionel Tabourier, B\'en\'edicte Le Grand | A data-driven analysis to question epidemic models for citation cascades
on the blogosphere | 18 pages, 9 figures, to be published in ICWSM-13 proceedings | null | null | null | cs.SI physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Citation cascades in blog networks are often considered as traces of
information spreading on this social medium. In this work, we question this
point of view using both a structural and semantic analysis of five months
activity of the most representative blogs of the french-speaking
community.Statistical measures reveal that our dataset shares many features
with those that can be found in the literature, suggesting the existence of an
identical underlying process. However, a closer analysis of the post content
indicates that the popular epidemic-like descriptions of cascades are
misleading in this context.A basic model, taking only into account the behavior
of bloggers and their restricted social network, accounts for several important
statistical features of the data.These arguments support the idea that
citations primary goal may not be information spreading on the blogosphere.
| [
{
"version": "v1",
"created": "Mon, 3 Jun 2013 14:17:54 GMT"
}
] | 2013-06-04T00:00:00 | [
[
"Brahim",
"Abdelhamid Salah",
""
],
[
"Tabourier",
"Lionel",
""
],
[
"Grand",
"Bénédicte Le",
""
]
] | TITLE: A data-driven analysis to question epidemic models for citation cascades
on the blogosphere
ABSTRACT: Citation cascades in blog networks are often considered as traces of
information spreading on this social medium. In this work, we question this
point of view using both a structural and semantic analysis of five months
activity of the most representative blogs of the french-speaking
community.Statistical measures reveal that our dataset shares many features
with those that can be found in the literature, suggesting the existence of an
identical underlying process. However, a closer analysis of the post content
indicates that the popular epidemic-like descriptions of cascades are
misleading in this context.A basic model, taking only into account the behavior
of bloggers and their restricted social network, accounts for several important
statistical features of the data.These arguments support the idea that
citations primary goal may not be information spreading on the blogosphere.
|
1305.7438 | Tian Qiu | Tian Qiu, Tian-Tian Wang, Zi-Ke Zhang, Li-Xin Zhong, Guang Chen | Heterogeneity Involved Network-based Algorithm Leads to Accurate and
Personalized Recommendations | null | null | null | null | physics.soc-ph cs.IR cs.SI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Heterogeneity of both the source and target objects is taken into account in
a network-based algorithm for the directional resource transformation between
objects. Based on a biased heat conduction recommendation method (BHC) which
considers the heterogeneity of the target object, we propose a heterogeneous
heat conduction algorithm (HHC), by further taking the source object degree as
the weight of diffusion. Tested on three real datasets, the Netflix, RYM and
MovieLens, the HHC algorithm is found to present a better recommendation in
both the accuracy and personalization than two excellent algorithms, i.e., the
original BHC and a hybrid algorithm of heat conduction and mass diffusion
(HHM), while not requiring any other accessorial information or parameter.
Moreover, the HHC even elevates the recommendation accuracy on cold objects,
referring to the so-called cold start problem, for effectively relieving the
recommendation bias on objects with different level of popularity.
| [
{
"version": "v1",
"created": "Fri, 31 May 2013 15:01:25 GMT"
}
] | 2013-06-03T00:00:00 | [
[
"Qiu",
"Tian",
""
],
[
"Wang",
"Tian-Tian",
""
],
[
"Zhang",
"Zi-Ke",
""
],
[
"Zhong",
"Li-Xin",
""
],
[
"Chen",
"Guang",
""
]
] | TITLE: Heterogeneity Involved Network-based Algorithm Leads to Accurate and
Personalized Recommendations
ABSTRACT: Heterogeneity of both the source and target objects is taken into account in
a network-based algorithm for the directional resource transformation between
objects. Based on a biased heat conduction recommendation method (BHC) which
considers the heterogeneity of the target object, we propose a heterogeneous
heat conduction algorithm (HHC), by further taking the source object degree as
the weight of diffusion. Tested on three real datasets, the Netflix, RYM and
MovieLens, the HHC algorithm is found to present a better recommendation in
both the accuracy and personalization than two excellent algorithms, i.e., the
original BHC and a hybrid algorithm of heat conduction and mass diffusion
(HHM), while not requiring any other accessorial information or parameter.
Moreover, the HHC even elevates the recommendation accuracy on cold objects,
referring to the so-called cold start problem, for effectively relieving the
recommendation bias on objects with different level of popularity.
|
1305.7454 | Uwe Aickelin | Jan Feyereisl, Uwe Aickelin | Privileged Information for Data Clustering | Information Sciences 194, 4-23, 2012 | null | null | null | cs.LG stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Many machine learning algorithms assume that all input samples are
independently and identically distributed from some common distribution on
either the input space X, in the case of unsupervised learning, or the input
and output space X x Y in the case of supervised and semi-supervised learning.
In the last number of years the relaxation of this assumption has been explored
and the importance of incorporation of additional information within machine
learning algorithms became more apparent. Traditionally such fusion of
information was the domain of semi-supervised learning. More recently the
inclusion of knowledge from separate hypothetical spaces has been proposed by
Vapnik as part of the supervised setting. In this work we are interested in
exploring Vapnik's idea of master-class learning and the associated learning
using privileged information, however within the unsupervised setting. Adoption
of the advanced supervised learning paradigm for the unsupervised setting
instigates investigation into the difference between privileged and technical
data. By means of our proposed aRi-MAX method stability of the KMeans algorithm
is improved and identification of the best clustering solution is achieved on
an artificial dataset. Subsequently an information theoretic dot product based
algorithm called P-Dot is proposed. This method has the ability to utilize a
wide variety of clustering techniques, individually or in combination, while
fusing privileged and technical data for improved clustering. Application of
the P-Dot method to the task of digit recognition confirms our findings in a
real-world scenario.
| [
{
"version": "v1",
"created": "Fri, 31 May 2013 15:28:44 GMT"
}
] | 2013-06-03T00:00:00 | [
[
"Feyereisl",
"Jan",
""
],
[
"Aickelin",
"Uwe",
""
]
] | TITLE: Privileged Information for Data Clustering
ABSTRACT: Many machine learning algorithms assume that all input samples are
independently and identically distributed from some common distribution on
either the input space X, in the case of unsupervised learning, or the input
and output space X x Y in the case of supervised and semi-supervised learning.
In the last number of years the relaxation of this assumption has been explored
and the importance of incorporation of additional information within machine
learning algorithms became more apparent. Traditionally such fusion of
information was the domain of semi-supervised learning. More recently the
inclusion of knowledge from separate hypothetical spaces has been proposed by
Vapnik as part of the supervised setting. In this work we are interested in
exploring Vapnik's idea of master-class learning and the associated learning
using privileged information, however within the unsupervised setting. Adoption
of the advanced supervised learning paradigm for the unsupervised setting
instigates investigation into the difference between privileged and technical
data. By means of our proposed aRi-MAX method stability of the KMeans algorithm
is improved and identification of the best clustering solution is achieved on
an artificial dataset. Subsequently an information theoretic dot product based
algorithm called P-Dot is proposed. This method has the ability to utilize a
wide variety of clustering techniques, individually or in combination, while
fusing privileged and technical data for improved clustering. Application of
the P-Dot method to the task of digit recognition confirms our findings in a
real-world scenario.
|
1305.7465 | Uwe Aickelin | Yihui Liu, Uwe Aickelin, Jan Feyereisl, Lindy G. Durrant | Wavelet feature extraction and genetic algorithm for biomarker detection
in colorectal cancer data | null | Knowledge-Based Systems 37, 502-514, 2013 | null | null | cs.NE cs.CE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Biomarkers which predict patient's survival can play an important role in
medical diagnosis and treatment. How to select the significant biomarkers from
hundreds of protein markers is a key step in survival analysis. In this paper a
novel method is proposed to detect the prognostic biomarkers of survival in
colorectal cancer patients using wavelet analysis, genetic algorithm, and Bayes
classifier. One dimensional discrete wavelet transform (DWT) is normally used
to reduce the dimensionality of biomedical data. In this study one dimensional
continuous wavelet transform (CWT) was proposed to extract the features of
colorectal cancer data. One dimensional CWT has no ability to reduce
dimensionality of data, but captures the missing features of DWT, and is
complementary part of DWT. Genetic algorithm was performed on extracted wavelet
coefficients to select the optimized features, using Bayes classifier to build
its fitness function. The corresponding protein markers were located based on
the position of optimized features. Kaplan-Meier curve and Cox regression model
were used to evaluate the performance of selected biomarkers. Experiments were
conducted on colorectal cancer dataset and several significant biomarkers were
detected. A new protein biomarker CD46 was found to significantly associate
with survival time.
| [
{
"version": "v1",
"created": "Fri, 31 May 2013 15:53:08 GMT"
}
] | 2013-06-03T00:00:00 | [
[
"Liu",
"Yihui",
""
],
[
"Aickelin",
"Uwe",
""
],
[
"Feyereisl",
"Jan",
""
],
[
"Durrant",
"Lindy G.",
""
]
] | TITLE: Wavelet feature extraction and genetic algorithm for biomarker detection
in colorectal cancer data
ABSTRACT: Biomarkers which predict patient's survival can play an important role in
medical diagnosis and treatment. How to select the significant biomarkers from
hundreds of protein markers is a key step in survival analysis. In this paper a
novel method is proposed to detect the prognostic biomarkers of survival in
colorectal cancer patients using wavelet analysis, genetic algorithm, and Bayes
classifier. One dimensional discrete wavelet transform (DWT) is normally used
to reduce the dimensionality of biomedical data. In this study one dimensional
continuous wavelet transform (CWT) was proposed to extract the features of
colorectal cancer data. One dimensional CWT has no ability to reduce
dimensionality of data, but captures the missing features of DWT, and is
complementary part of DWT. Genetic algorithm was performed on extracted wavelet
coefficients to select the optimized features, using Bayes classifier to build
its fitness function. The corresponding protein markers were located based on
the position of optimized features. Kaplan-Meier curve and Cox regression model
were used to evaluate the performance of selected biomarkers. Experiments were
conducted on colorectal cancer dataset and several significant biomarkers were
detected. A new protein biomarker CD46 was found to significantly associate
with survival time.
|
1301.3226 | Rami Al-Rfou' | Yanqing Chen, Bryan Perozzi, Rami Al-Rfou, Steven Skiena | The Expressive Power of Word Embeddings | submitted to ICML 2013, Deep Learning for Audio, Speech and Language
Processing Workshop. 8 pages, 8 figures | null | null | null | cs.LG cs.CL stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We seek to better understand the difference in quality of the several
publicly released embeddings. We propose several tasks that help to distinguish
the characteristics of different embeddings. Our evaluation of sentiment
polarity and synonym/antonym relations shows that embeddings are able to
capture surprisingly nuanced semantics even in the absence of sentence
structure. Moreover, benchmarking the embeddings shows great variance in
quality and characteristics of the semantics captured by the tested embeddings.
Finally, we show the impact of varying the number of dimensions and the
resolution of each dimension on the effective useful features captured by the
embedding space. Our contributions highlight the importance of embeddings for
NLP tasks and the effect of their quality on the final results.
| [
{
"version": "v1",
"created": "Tue, 15 Jan 2013 04:52:10 GMT"
},
{
"version": "v2",
"created": "Sat, 2 Mar 2013 21:44:29 GMT"
},
{
"version": "v3",
"created": "Wed, 13 Mar 2013 17:08:14 GMT"
},
{
"version": "v4",
"created": "Wed, 29 May 2013 21:06:09 GMT"
}
] | 2013-05-31T00:00:00 | [
[
"Chen",
"Yanqing",
""
],
[
"Perozzi",
"Bryan",
""
],
[
"Al-Rfou",
"Rami",
""
],
[
"Skiena",
"Steven",
""
]
] | TITLE: The Expressive Power of Word Embeddings
ABSTRACT: We seek to better understand the difference in quality of the several
publicly released embeddings. We propose several tasks that help to distinguish
the characteristics of different embeddings. Our evaluation of sentiment
polarity and synonym/antonym relations shows that embeddings are able to
capture surprisingly nuanced semantics even in the absence of sentence
structure. Moreover, benchmarking the embeddings shows great variance in
quality and characteristics of the semantics captured by the tested embeddings.
Finally, we show the impact of varying the number of dimensions and the
resolution of each dimension on the effective useful features captured by the
embedding space. Our contributions highlight the importance of embeddings for
NLP tasks and the effect of their quality on the final results.
|
1305.7145 | Uwe Aickelin | Peer-Olaf Siebers, Uwe Aickelin, David Menachof, Galina Sherman, Peter
Zimmerman | Modelling and Analysing Cargo Screening Processes: A Project Outline | Proceedings of the INFORMS Simulation Society Research Workshop, June
25-27, 2009, Warwick, UK, 44-47, 2009 | null | null | null | cs.AI cs.CY | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The efficiency of current cargo screening processes at sea and air ports is
unknown as no benchmarks exists against which they could be measured. Some
manufacturer benchmarks exist for individual sensors but we have not found any
benchmarks that take a holistic view of the screening procedures assessing a
combination of sensors and also taking operator variability into account. Just
adding up resources and manpower used is not an effective way for assessing
systems where human decision-making and operator compliance to rules play a
vital role. For such systems more advanced assessment methods need to be used,
taking into account that the cargo screening process is of a dynamic and
stochastic nature. Our project aim is to develop a decision support tool
(cargo-screening system simulator) that will map the right technology and
manpower to the right commodity-threat combination in order to maximize
detection rates. In this paper we present a project outline and highlight the
research challenges we have identified so far. In addition we introduce our
first case study, where we investigate the cargo screening process at the ferry
port in Calais.
| [
{
"version": "v1",
"created": "Thu, 30 May 2013 15:46:43 GMT"
}
] | 2013-05-31T00:00:00 | [
[
"Siebers",
"Peer-Olaf",
""
],
[
"Aickelin",
"Uwe",
""
],
[
"Menachof",
"David",
""
],
[
"Sherman",
"Galina",
""
],
[
"Zimmerman",
"Peter",
""
]
] | TITLE: Modelling and Analysing Cargo Screening Processes: A Project Outline
ABSTRACT: The efficiency of current cargo screening processes at sea and air ports is
unknown as no benchmarks exists against which they could be measured. Some
manufacturer benchmarks exist for individual sensors but we have not found any
benchmarks that take a holistic view of the screening procedures assessing a
combination of sensors and also taking operator variability into account. Just
adding up resources and manpower used is not an effective way for assessing
systems where human decision-making and operator compliance to rules play a
vital role. For such systems more advanced assessment methods need to be used,
taking into account that the cargo screening process is of a dynamic and
stochastic nature. Our project aim is to develop a decision support tool
(cargo-screening system simulator) that will map the right technology and
manpower to the right commodity-threat combination in order to maximize
detection rates. In this paper we present a project outline and highlight the
research challenges we have identified so far. In addition we introduce our
first case study, where we investigate the cargo screening process at the ferry
port in Calais.
|
1206.4229 | Torsten Ensslin | Torsten A. En{\ss}lin | Information field dynamics for simulation scheme construction | 19 pages, 3 color figures, accepted by Phys. Rev. E | null | 10.1103/PhysRevE.87.013308 | null | physics.comp-ph astro-ph.IM cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Information field dynamics (IFD) is introduced here as a framework to derive
numerical schemes for the simulation of physical and other fields without
assuming a particular sub-grid structure as many schemes do. IFD constructs an
ensemble of non-parametric sub-grid field configurations from the combination
of the data in computer memory, representing constraints on possible field
configurations, and prior assumptions on the sub-grid field statistics. Each of
these field configurations can formally be evolved to a later moment since any
differential operator of the dynamics can act on fields living in continuous
space. However, these virtually evolved fields need again a representation by
data in computer memory. The maximum entropy principle of information theory
guides the construction of updated datasets via entropic matching, optimally
representing these field configurations at the later time. The field dynamics
thereby become represented by a finite set of evolution equations for the data
that can be solved numerically. The sub-grid dynamics is treated within an
auxiliary analytic consideration and the resulting scheme acts solely on the
data space. It should provide a more accurate description of the physical field
dynamics than simulation schemes constructed ad-hoc, due to the more rigorous
accounting of sub-grid physics and the space discretization process.
Assimilation of measurement data into an IFD simulation is conceptually
straightforward since measurement and simulation data can just be merged. The
IFD approach is illustrated using the example of a coarsely discretized
representation of a thermally excited classical Klein-Gordon field. This should
pave the way towards the construction of schemes for more complex systems like
turbulent hydrodynamics.
| [
{
"version": "v1",
"created": "Tue, 19 Jun 2012 15:01:52 GMT"
},
{
"version": "v2",
"created": "Fri, 5 Oct 2012 10:21:19 GMT"
},
{
"version": "v3",
"created": "Sun, 16 Dec 2012 13:24:30 GMT"
},
{
"version": "v4",
"created": "Fri, 28 Dec 2012 12:29:19 GMT"
}
] | 2013-05-30T00:00:00 | [
[
"Enßlin",
"Torsten A.",
""
]
] | TITLE: Information field dynamics for simulation scheme construction
ABSTRACT: Information field dynamics (IFD) is introduced here as a framework to derive
numerical schemes for the simulation of physical and other fields without
assuming a particular sub-grid structure as many schemes do. IFD constructs an
ensemble of non-parametric sub-grid field configurations from the combination
of the data in computer memory, representing constraints on possible field
configurations, and prior assumptions on the sub-grid field statistics. Each of
these field configurations can formally be evolved to a later moment since any
differential operator of the dynamics can act on fields living in continuous
space. However, these virtually evolved fields need again a representation by
data in computer memory. The maximum entropy principle of information theory
guides the construction of updated datasets via entropic matching, optimally
representing these field configurations at the later time. The field dynamics
thereby become represented by a finite set of evolution equations for the data
that can be solved numerically. The sub-grid dynamics is treated within an
auxiliary analytic consideration and the resulting scheme acts solely on the
data space. It should provide a more accurate description of the physical field
dynamics than simulation schemes constructed ad-hoc, due to the more rigorous
accounting of sub-grid physics and the space discretization process.
Assimilation of measurement data into an IFD simulation is conceptually
straightforward since measurement and simulation data can just be merged. The
IFD approach is illustrated using the example of a coarsely discretized
representation of a thermally excited classical Klein-Gordon field. This should
pave the way towards the construction of schemes for more complex systems like
turbulent hydrodynamics.
|
1304.5862 | Forrest Briggs | Forrest Briggs, Xiaoli Z. Fern, Jed Irvine | Multi-Label Classifier Chains for Bird Sound | 6 pages, 1 figure, submission to ICML 2013 workshop on bioacoustics.
Note: this is a minor revision- the blind submission format has been replaced
with one that shows author names, and a few corrections have been made | null | null | null | cs.LG cs.SD stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Bird sound data collected with unattended microphones for automatic surveys,
or mobile devices for citizen science, typically contain multiple
simultaneously vocalizing birds of different species. However, few works have
considered the multi-label structure in birdsong. We propose to use an ensemble
of classifier chains combined with a histogram-of-segments representation for
multi-label classification of birdsong. The proposed method is compared with
binary relevance and three multi-instance multi-label learning (MIML)
algorithms from prior work (which focus more on structure in the sound, and
less on structure in the label sets). Experiments are conducted on two
real-world birdsong datasets, and show that the proposed method usually
outperforms binary relevance (using the same features and base-classifier), and
is better in some cases and worse in others compared to the MIML algorithms.
| [
{
"version": "v1",
"created": "Mon, 22 Apr 2013 07:44:05 GMT"
},
{
"version": "v2",
"created": "Wed, 29 May 2013 17:36:07 GMT"
}
] | 2013-05-30T00:00:00 | [
[
"Briggs",
"Forrest",
""
],
[
"Fern",
"Xiaoli Z.",
""
],
[
"Irvine",
"Jed",
""
]
] | TITLE: Multi-Label Classifier Chains for Bird Sound
ABSTRACT: Bird sound data collected with unattended microphones for automatic surveys,
or mobile devices for citizen science, typically contain multiple
simultaneously vocalizing birds of different species. However, few works have
considered the multi-label structure in birdsong. We propose to use an ensemble
of classifier chains combined with a histogram-of-segments representation for
multi-label classification of birdsong. The proposed method is compared with
binary relevance and three multi-instance multi-label learning (MIML)
algorithms from prior work (which focus more on structure in the sound, and
less on structure in the label sets). Experiments are conducted on two
real-world birdsong datasets, and show that the proposed method usually
outperforms binary relevance (using the same features and base-classifier), and
is better in some cases and worse in others compared to the MIML algorithms.
|
0910.1800 | Cyril Furtlehner | Cyril Furtlehner, Michele Sebag and Xiangliang Zhang | Scaling Analysis of Affinity Propagation | 28 pages, 14 figures, Inria research report | Phys. Rev. E 81,066102 (2010) | 10.1103/PhysRevE.81.066102 | 7046 | cs.AI cond-mat.stat-mech | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We analyze and exploit some scaling properties of the Affinity Propagation
(AP) clustering algorithm proposed by Frey and Dueck (2007). First we observe
that a divide and conquer strategy, used on a large data set hierarchically
reduces the complexity ${\cal O}(N^2)$ to ${\cal O}(N^{(h+2)/(h+1)})$, for a
data-set of size $N$ and a depth $h$ of the hierarchical strategy. For a
data-set embedded in a $d$-dimensional space, we show that this is obtained
without notably damaging the precision except in dimension $d=2$. In fact, for
$d$ larger than 2 the relative loss in precision scales like
$N^{(2-d)/(h+1)d}$. Finally, under some conditions we observe that there is a
value $s^*$ of the penalty coefficient, a free parameter used to fix the number
of clusters, which separates a fragmentation phase (for $s<s^*$) from a
coalescent one (for $s>s^*$) of the underlying hidden cluster structure. At
this precise point holds a self-similarity property which can be exploited by
the hierarchical strategy to actually locate its position. From this
observation, a strategy based on \AP can be defined to find out how many
clusters are present in a given dataset.
| [
{
"version": "v1",
"created": "Fri, 9 Oct 2009 17:43:35 GMT"
}
] | 2013-05-29T00:00:00 | [
[
"Furtlehner",
"Cyril",
""
],
[
"Sebag",
"Michele",
""
],
[
"Zhang",
"Xiangliang",
""
]
] | TITLE: Scaling Analysis of Affinity Propagation
ABSTRACT: We analyze and exploit some scaling properties of the Affinity Propagation
(AP) clustering algorithm proposed by Frey and Dueck (2007). First we observe
that a divide and conquer strategy, used on a large data set hierarchically
reduces the complexity ${\cal O}(N^2)$ to ${\cal O}(N^{(h+2)/(h+1)})$, for a
data-set of size $N$ and a depth $h$ of the hierarchical strategy. For a
data-set embedded in a $d$-dimensional space, we show that this is obtained
without notably damaging the precision except in dimension $d=2$. In fact, for
$d$ larger than 2 the relative loss in precision scales like
$N^{(2-d)/(h+1)d}$. Finally, under some conditions we observe that there is a
value $s^*$ of the penalty coefficient, a free parameter used to fix the number
of clusters, which separates a fragmentation phase (for $s<s^*$) from a
coalescent one (for $s>s^*$) of the underlying hidden cluster structure. At
this precise point holds a self-similarity property which can be exploited by
the hierarchical strategy to actually locate its position. From this
observation, a strategy based on \AP can be defined to find out how many
clusters are present in a given dataset.
|
1305.6474 | Jesper Larsson Tr\"aff | Martin Wimmer, Daniel Cederman, Jesper Larsson Tr\"aff, and Philippas
Tsigas | Configurable Strategies for Work-stealing | null | null | null | null | cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Work-stealing systems are typically oblivious to the nature of the tasks they
are scheduling. For instance, they do not know or take into account how long a
task will take to execute or how many subtasks it will spawn. Moreover, the
actual task execution order is typically determined by the underlying task
storage data structure, and cannot be changed. There are thus possibilities for
optimizing task parallel executions by providing information on specific tasks
and their preferred execution order to the scheduling system.
We introduce scheduling strategies to enable applications to dynamically
provide hints to the task-scheduling system on the nature of specific tasks.
Scheduling strategies can be used to independently control both local task
execution order as well as steal order. In contrast to conventional scheduling
policies that are normally global in scope, strategies allow the scheduler to
apply optimizations on individual tasks. This flexibility greatly improves
composability as it allows the scheduler to apply different, specific
scheduling choices for different parts of applications simultaneously. We
present a number of benchmarks that highlight diverse, beneficial effects that
can be achieved with scheduling strategies. Some benchmarks (branch-and-bound,
single-source shortest path) show that prioritization of tasks can reduce the
total amount of work compared to standard work-stealing execution order. For
other benchmarks (triangle strip generation) qualitatively better results can
be achieved in shorter time. Other optimizations, such as dynamic merging of
tasks or stealing of half the work, instead of half the tasks, are also shown
to improve performance. Composability is demonstrated by examples that combine
different strategies, both within the same kernel (prefix sum) as well as when
scheduling multiple kernels (prefix sum and unbalanced tree search).
| [
{
"version": "v1",
"created": "Tue, 28 May 2013 12:59:25 GMT"
}
] | 2013-05-29T00:00:00 | [
[
"Wimmer",
"Martin",
""
],
[
"Cederman",
"Daniel",
""
],
[
"Träff",
"Jesper Larsson",
""
],
[
"Tsigas",
"Philippas",
""
]
] | TITLE: Configurable Strategies for Work-stealing
ABSTRACT: Work-stealing systems are typically oblivious to the nature of the tasks they
are scheduling. For instance, they do not know or take into account how long a
task will take to execute or how many subtasks it will spawn. Moreover, the
actual task execution order is typically determined by the underlying task
storage data structure, and cannot be changed. There are thus possibilities for
optimizing task parallel executions by providing information on specific tasks
and their preferred execution order to the scheduling system.
We introduce scheduling strategies to enable applications to dynamically
provide hints to the task-scheduling system on the nature of specific tasks.
Scheduling strategies can be used to independently control both local task
execution order as well as steal order. In contrast to conventional scheduling
policies that are normally global in scope, strategies allow the scheduler to
apply optimizations on individual tasks. This flexibility greatly improves
composability as it allows the scheduler to apply different, specific
scheduling choices for different parts of applications simultaneously. We
present a number of benchmarks that highlight diverse, beneficial effects that
can be achieved with scheduling strategies. Some benchmarks (branch-and-bound,
single-source shortest path) show that prioritization of tasks can reduce the
total amount of work compared to standard work-stealing execution order. For
other benchmarks (triangle strip generation) qualitatively better results can
be achieved in shorter time. Other optimizations, such as dynamic merging of
tasks or stealing of half the work, instead of half the tasks, are also shown
to improve performance. Composability is demonstrated by examples that combine
different strategies, both within the same kernel (prefix sum) as well as when
scheduling multiple kernels (prefix sum and unbalanced tree search).
|
1305.6046 | Sidahmed Mokeddem | Sidahmed Mokeddem, Baghdad Atmani and Mostefa Mokaddem | Supervised Feature Selection for Diagnosis of Coronary Artery Disease
Based on Genetic Algorithm | First International Conference on Computational Science and
Engineering (CSE-2013), May 18 ~ 19, 2013, Dubai, UAE. Volume Editors:
Sundarapandian Vaidyanathan, Dhinaharan Nagamalai | null | 10.5121/csit.2013.3305 | null | cs.LG cs.CE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Feature Selection (FS) has become the focus of much research on decision
support systems areas for which data sets with tremendous number of variables
are analyzed. In this paper we present a new method for the diagnosis of
Coronary Artery Diseases (CAD) founded on Genetic Algorithm (GA) wrapped Bayes
Naive (BN) based FS. Basically, CAD dataset contains two classes defined with
13 features. In GA BN algorithm, GA generates in each iteration a subset of
attributes that will be evaluated using the BN in the second step of the
selection procedure. The final set of attribute contains the most relevant
feature model that increases the accuracy. The algorithm in this case produces
85.50% classification accuracy in the diagnosis of CAD. Thus, the asset of the
Algorithm is then compared with the use of Support Vector Machine (SVM),
MultiLayer Perceptron (MLP) and C4.5 decision tree Algorithm. The result of
classification accuracy for those algorithms are respectively 83.5%, 83.16% and
80.85%. Consequently, the GA wrapped BN Algorithm is correspondingly compared
with other FS algorithms. The Obtained results have shown very promising
outcomes for the diagnosis of CAD.
| [
{
"version": "v1",
"created": "Sun, 26 May 2013 18:16:52 GMT"
}
] | 2013-05-28T00:00:00 | [
[
"Mokeddem",
"Sidahmed",
""
],
[
"Atmani",
"Baghdad",
""
],
[
"Mokaddem",
"Mostefa",
""
]
] | TITLE: Supervised Feature Selection for Diagnosis of Coronary Artery Disease
Based on Genetic Algorithm
ABSTRACT: Feature Selection (FS) has become the focus of much research on decision
support systems areas for which data sets with tremendous number of variables
are analyzed. In this paper we present a new method for the diagnosis of
Coronary Artery Diseases (CAD) founded on Genetic Algorithm (GA) wrapped Bayes
Naive (BN) based FS. Basically, CAD dataset contains two classes defined with
13 features. In GA BN algorithm, GA generates in each iteration a subset of
attributes that will be evaluated using the BN in the second step of the
selection procedure. The final set of attribute contains the most relevant
feature model that increases the accuracy. The algorithm in this case produces
85.50% classification accuracy in the diagnosis of CAD. Thus, the asset of the
Algorithm is then compared with the use of Support Vector Machine (SVM),
MultiLayer Perceptron (MLP) and C4.5 decision tree Algorithm. The result of
classification accuracy for those algorithms are respectively 83.5%, 83.16% and
80.85%. Consequently, the GA wrapped BN Algorithm is correspondingly compared
with other FS algorithms. The Obtained results have shown very promising
outcomes for the diagnosis of CAD.
|
1305.5610 | Tao Ye | Fred Glover and Tao Ye and Abraham P. Punnen and Gary Kochenberger | Integrating tabu search and VLSN search to develop enhanced algorithms:
A case study using bipartite boolean quadratic programs | null | null | null | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The bipartite boolean quadratic programming problem (BBQP) is a
generalization of the well studied boolean quadratic programming problem. The
model has a variety of real life applications; however, empirical studies of
the model are not available in the literature, except in a few isolated
instances. In this paper, we develop efficient heuristic algorithms based on
tabu search, very large scale neighborhood (VLSN) search, and a hybrid
algorithm that integrates the two. The computational study establishes that
effective integration of simple tabu search with VLSN search results in
superior outcomes, and suggests the value of such an integration in other
settings. Complexity analysis and implementation details are provided along
with conclusions drawn from experimental analysis. In addition, we obtain
solutions better than the best previously known for almost all medium and large
size benchmark instances.
| [
{
"version": "v1",
"created": "Fri, 24 May 2013 03:36:00 GMT"
}
] | 2013-05-27T00:00:00 | [
[
"Glover",
"Fred",
""
],
[
"Ye",
"Tao",
""
],
[
"Punnen",
"Abraham P.",
""
],
[
"Kochenberger",
"Gary",
""
]
] | TITLE: Integrating tabu search and VLSN search to develop enhanced algorithms:
A case study using bipartite boolean quadratic programs
ABSTRACT: The bipartite boolean quadratic programming problem (BBQP) is a
generalization of the well studied boolean quadratic programming problem. The
model has a variety of real life applications; however, empirical studies of
the model are not available in the literature, except in a few isolated
instances. In this paper, we develop efficient heuristic algorithms based on
tabu search, very large scale neighborhood (VLSN) search, and a hybrid
algorithm that integrates the two. The computational study establishes that
effective integration of simple tabu search with VLSN search results in
superior outcomes, and suggests the value of such an integration in other
settings. Complexity analysis and implementation details are provided along
with conclusions drawn from experimental analysis. In addition, we obtain
solutions better than the best previously known for almost all medium and large
size benchmark instances.
|
1305.5653 | George Garbis | George Garbis, Kostis Kyzirakos, and Manolis Koubarakis | Geographica: A Benchmark for Geospatial RDF Stores | null | null | null | null | cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Geospatial extensions of SPARQL like GeoSPARQL and stSPARQL have recently
been defined and corresponding geospatial RDF stores have been implemented.
However, there is no widely used benchmark for evaluating geospatial RDF stores
which takes into account recent advances to the state of the art in this area.
In this paper, we develop a benchmark, called Geographica, which uses both
real-world and synthetic data to test the offered functionality and the
performance of some prominent geospatial RDF stores.
| [
{
"version": "v1",
"created": "Fri, 24 May 2013 08:54:46 GMT"
}
] | 2013-05-27T00:00:00 | [
[
"Garbis",
"George",
""
],
[
"Kyzirakos",
"Kostis",
""
],
[
"Koubarakis",
"Manolis",
""
]
] | TITLE: Geographica: A Benchmark for Geospatial RDF Stores
ABSTRACT: Geospatial extensions of SPARQL like GeoSPARQL and stSPARQL have recently
been defined and corresponding geospatial RDF stores have been implemented.
However, there is no widely used benchmark for evaluating geospatial RDF stores
which takes into account recent advances to the state of the art in this area.
In this paper, we develop a benchmark, called Geographica, which uses both
real-world and synthetic data to test the offered functionality and the
performance of some prominent geospatial RDF stores.
|
1305.5824 | Slim Bouker | Slim Bouker, Rabie Saidi, Sadok Ben Yahia, Engelbert Mephu Nguifo | Towards a semantic and statistical selection of association rules | null | null | null | null | cs.DB | http://creativecommons.org/licenses/by/3.0/ | The increasing growth of databases raises an urgent need for more accurate
methods to better understand the stored data. In this scope, association rules
were extensively used for the analysis and the comprehension of huge amounts of
data. However, the number of generated rules is too large to be efficiently
analyzed and explored in any further process. Association rules selection is a
classical topic to address this issue, yet, new innovated approaches are
required in order to provide help to decision makers. Hence, many interesting-
ness measures have been defined to statistically evaluate and filter the
association rules. However, these measures present two major problems. On the
one hand, they do not allow eliminating irrelevant rules, on the other hand,
their abun- dance leads to the heterogeneity of the evaluation results which
leads to confusion in decision making. In this paper, we propose a two-winged
approach to select statistically in- teresting and semantically incomparable
rules. Our statis- tical selection helps discovering interesting association
rules without favoring or excluding any measure. The semantic comparability
helps to decide if the considered association rules are semantically related
i.e comparable. The outcomes of our experiments on real datasets show promising
results in terms of reduction in the number of rules.
| [
{
"version": "v1",
"created": "Fri, 24 May 2013 18:46:34 GMT"
}
] | 2013-05-27T00:00:00 | [
[
"Bouker",
"Slim",
""
],
[
"Saidi",
"Rabie",
""
],
[
"Yahia",
"Sadok Ben",
""
],
[
"Nguifo",
"Engelbert Mephu",
""
]
] | TITLE: Towards a semantic and statistical selection of association rules
ABSTRACT: The increasing growth of databases raises an urgent need for more accurate
methods to better understand the stored data. In this scope, association rules
were extensively used for the analysis and the comprehension of huge amounts of
data. However, the number of generated rules is too large to be efficiently
analyzed and explored in any further process. Association rules selection is a
classical topic to address this issue, yet, new innovated approaches are
required in order to provide help to decision makers. Hence, many interesting-
ness measures have been defined to statistically evaluate and filter the
association rules. However, these measures present two major problems. On the
one hand, they do not allow eliminating irrelevant rules, on the other hand,
their abun- dance leads to the heterogeneity of the evaluation results which
leads to confusion in decision making. In this paper, we propose a two-winged
approach to select statistically in- teresting and semantically incomparable
rules. Our statis- tical selection helps discovering interesting association
rules without favoring or excluding any measure. The semantic comparability
helps to decide if the considered association rules are semantically related
i.e comparable. The outcomes of our experiments on real datasets show promising
results in terms of reduction in the number of rules.
|
1305.5826 | Kian Hsiang Low | Jie Chen, Nannan Cao, Kian Hsiang Low, Ruofei Ouyang, Colin Keng-Yan
Tan, Patrick Jaillet | Parallel Gaussian Process Regression with Low-Rank Covariance Matrix
Approximations | 29th Conference on Uncertainty in Artificial Intelligence (UAI 2013),
Extended version with proofs, 13 pages | null | null | null | stat.ML cs.DC cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Gaussian processes (GP) are Bayesian non-parametric models that are widely
used for probabilistic regression. Unfortunately, it cannot scale well with
large data nor perform real-time predictions due to its cubic time cost in the
data size. This paper presents two parallel GP regression methods that exploit
low-rank covariance matrix approximations for distributing the computational
load among parallel machines to achieve time efficiency and scalability. We
theoretically guarantee the predictive performances of our proposed parallel
GPs to be equivalent to that of some centralized approximate GP regression
methods: The computation of their centralized counterparts can be distributed
among parallel machines, hence achieving greater time efficiency and
scalability. We analytically compare the properties of our parallel GPs such as
time, space, and communication complexity. Empirical evaluation on two
real-world datasets in a cluster of 20 computing nodes shows that our parallel
GPs are significantly more time-efficient and scalable than their centralized
counterparts and exact/full GP while achieving predictive performances
comparable to full GP.
| [
{
"version": "v1",
"created": "Fri, 24 May 2013 19:00:28 GMT"
}
] | 2013-05-27T00:00:00 | [
[
"Chen",
"Jie",
""
],
[
"Cao",
"Nannan",
""
],
[
"Low",
"Kian Hsiang",
""
],
[
"Ouyang",
"Ruofei",
""
],
[
"Tan",
"Colin Keng-Yan",
""
],
[
"Jaillet",
"Patrick",
""
]
] | TITLE: Parallel Gaussian Process Regression with Low-Rank Covariance Matrix
Approximations
ABSTRACT: Gaussian processes (GP) are Bayesian non-parametric models that are widely
used for probabilistic regression. Unfortunately, it cannot scale well with
large data nor perform real-time predictions due to its cubic time cost in the
data size. This paper presents two parallel GP regression methods that exploit
low-rank covariance matrix approximations for distributing the computational
load among parallel machines to achieve time efficiency and scalability. We
theoretically guarantee the predictive performances of our proposed parallel
GPs to be equivalent to that of some centralized approximate GP regression
methods: The computation of their centralized counterparts can be distributed
among parallel machines, hence achieving greater time efficiency and
scalability. We analytically compare the properties of our parallel GPs such as
time, space, and communication complexity. Empirical evaluation on two
real-world datasets in a cluster of 20 computing nodes shows that our parallel
GPs are significantly more time-efficient and scalable than their centralized
counterparts and exact/full GP while achieving predictive performances
comparable to full GP.
|
1305.5267 | Bluma Gelley | Bluma S. Gelley | Investigating Deletion in Wikipedia | null | null | null | null | cs.CY cs.DL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Several hundred Wikipedia articles are deleted every day because they lack
sufficient significance to be included in the encyclopedia. We collect a
dataset of deleted articles and analyze them to determine whether or not the
deletions were justified. We find evidence to support the hypothesis that many
deletions are carried out correctly, but also find that a large number were
done very quickly. Based on our conclusions, we make some recommendations to
reduce the number of non-significant pages and simultaneously improve retention
of new editors.
| [
{
"version": "v1",
"created": "Wed, 22 May 2013 20:54:18 GMT"
}
] | 2013-05-24T00:00:00 | [
[
"Gelley",
"Bluma S.",
""
]
] | TITLE: Investigating Deletion in Wikipedia
ABSTRACT: Several hundred Wikipedia articles are deleted every day because they lack
sufficient significance to be included in the encyclopedia. We collect a
dataset of deleted articles and analyze them to determine whether or not the
deletions were justified. We find evidence to support the hypothesis that many
deletions are carried out correctly, but also find that a large number were
done very quickly. Based on our conclusions, we make some recommendations to
reduce the number of non-significant pages and simultaneously improve retention
of new editors.
|
1305.5306 | Yin Zheng | Yin Zheng, Yu-Jin Zhang, Hugo Larochelle | A Supervised Neural Autoregressive Topic Model for Simultaneous Image
Classification and Annotation | 13 pages, 5 figures | null | null | null | cs.CV cs.LG stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Topic modeling based on latent Dirichlet allocation (LDA) has been a
framework of choice to perform scene recognition and annotation. Recently, a
new type of topic model called the Document Neural Autoregressive Distribution
Estimator (DocNADE) was proposed and demonstrated state-of-the-art performance
for document modeling. In this work, we show how to successfully apply and
extend this model to the context of visual scene modeling. Specifically, we
propose SupDocNADE, a supervised extension of DocNADE, that increases the
discriminative power of the hidden topic features by incorporating label
information into the training objective of the model. We also describe how to
leverage information about the spatial position of the visual words and how to
embed additional image annotations, so as to simultaneously perform image
classification and annotation. We test our model on the Scene15, LabelMe and
UIUC-Sports datasets and show that it compares favorably to other topic models
such as the supervised variant of LDA.
| [
{
"version": "v1",
"created": "Thu, 23 May 2013 03:35:31 GMT"
}
] | 2013-05-24T00:00:00 | [
[
"Zheng",
"Yin",
""
],
[
"Zhang",
"Yu-Jin",
""
],
[
"Larochelle",
"Hugo",
""
]
] | TITLE: A Supervised Neural Autoregressive Topic Model for Simultaneous Image
Classification and Annotation
ABSTRACT: Topic modeling based on latent Dirichlet allocation (LDA) has been a
framework of choice to perform scene recognition and annotation. Recently, a
new type of topic model called the Document Neural Autoregressive Distribution
Estimator (DocNADE) was proposed and demonstrated state-of-the-art performance
for document modeling. In this work, we show how to successfully apply and
extend this model to the context of visual scene modeling. Specifically, we
propose SupDocNADE, a supervised extension of DocNADE, that increases the
discriminative power of the hidden topic features by incorporating label
information into the training objective of the model. We also describe how to
leverage information about the spatial position of the visual words and how to
embed additional image annotations, so as to simultaneously perform image
classification and annotation. We test our model on the Scene15, LabelMe and
UIUC-Sports datasets and show that it compares favorably to other topic models
such as the supervised variant of LDA.
|
1304.1209 | Ben Fulcher | Ben D. Fulcher, Max A. Little, Nick S. Jones | Highly comparative time-series analysis: The empirical structure of time
series and their methods | null | J. R. Soc. Interface vol. 10 no. 83 20130048 (2013) | 10.1098/rsif.2013.0048 | null | physics.data-an cs.CV physics.bio-ph q-bio.QM stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The process of collecting and organizing sets of observations represents a
common theme throughout the history of science. However, despite the ubiquity
of scientists measuring, recording, and analyzing the dynamics of different
processes, an extensive organization of scientific time-series data and
analysis methods has never been performed. Addressing this, annotated
collections of over 35 000 real-world and model-generated time series and over
9000 time-series analysis algorithms are analyzed in this work. We introduce
reduced representations of both time series, in terms of their properties
measured by diverse scientific methods, and of time-series analysis methods, in
terms of their behaviour on empirical time series, and use them to organize
these interdisciplinary resources. This new approach to comparing across
diverse scientific data and methods allows us to organize time-series datasets
automatically according to their properties, retrieve alternatives to
particular analysis methods developed in other scientific disciplines, and
automate the selection of useful methods for time-series classification and
regression tasks. The broad scientific utility of these tools is demonstrated
on datasets of electroencephalograms, self-affine time series, heart beat
intervals, speech signals, and others, in each case contributing novel analysis
techniques to the existing literature. Highly comparative techniques that
compare across an interdisciplinary literature can thus be used to guide more
focused research in time-series analysis for applications across the scientific
disciplines.
| [
{
"version": "v1",
"created": "Wed, 3 Apr 2013 23:24:02 GMT"
}
] | 2013-05-23T00:00:00 | [
[
"Fulcher",
"Ben D.",
""
],
[
"Little",
"Max A.",
""
],
[
"Jones",
"Nick S.",
""
]
] | TITLE: Highly comparative time-series analysis: The empirical structure of time
series and their methods
ABSTRACT: The process of collecting and organizing sets of observations represents a
common theme throughout the history of science. However, despite the ubiquity
of scientists measuring, recording, and analyzing the dynamics of different
processes, an extensive organization of scientific time-series data and
analysis methods has never been performed. Addressing this, annotated
collections of over 35 000 real-world and model-generated time series and over
9000 time-series analysis algorithms are analyzed in this work. We introduce
reduced representations of both time series, in terms of their properties
measured by diverse scientific methods, and of time-series analysis methods, in
terms of their behaviour on empirical time series, and use them to organize
these interdisciplinary resources. This new approach to comparing across
diverse scientific data and methods allows us to organize time-series datasets
automatically according to their properties, retrieve alternatives to
particular analysis methods developed in other scientific disciplines, and
automate the selection of useful methods for time-series classification and
regression tasks. The broad scientific utility of these tools is demonstrated
on datasets of electroencephalograms, self-affine time series, heart beat
intervals, speech signals, and others, in each case contributing novel analysis
techniques to the existing literature. Highly comparative techniques that
compare across an interdisciplinary literature can thus be used to guide more
focused research in time-series analysis for applications across the scientific
disciplines.
|
1305.5189 | Neven Caplar | Neven Caplar, Mirko Suznjevic and Maja Matijasevic | Analysis of player's in-game performance vs rating: Case study of Heroes
of Newerth | 8 pages, 14 figures, to appear in proceedings of "Foundation of
Digital Games 2013" conference (14-17 May 2013) | null | null | null | physics.soc-ph cs.SI physics.data-an physics.pop-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We evaluate the rating system of "Heroes of Newerth" (HoN), a multiplayer
online action role-playing game, by using statistical analysis and comparison
of a player's in-game performance metrics and the player rating assigned by the
rating system. The datasets for the analysis have been extracted from the web
sites that record the players' ratings and a number of empirical metrics.
Results suggest that the HoN's Matchmaking rating algorithm, while generally
capturing the skill level of the player well, also has weaknesses, which have
been exploited by players to achieve a higher placement on the ranking ladder
than deserved by actual skill. In addition, we also illustrate the effects of
the choice of the business model (from pay-to-play to free-to-play) on player
population.
| [
{
"version": "v1",
"created": "Wed, 22 May 2013 16:45:47 GMT"
}
] | 2013-05-23T00:00:00 | [
[
"Caplar",
"Neven",
""
],
[
"Suznjevic",
"Mirko",
""
],
[
"Matijasevic",
"Maja",
""
]
] | TITLE: Analysis of player's in-game performance vs rating: Case study of Heroes
of Newerth
ABSTRACT: We evaluate the rating system of "Heroes of Newerth" (HoN), a multiplayer
online action role-playing game, by using statistical analysis and comparison
of a player's in-game performance metrics and the player rating assigned by the
rating system. The datasets for the analysis have been extracted from the web
sites that record the players' ratings and a number of empirical metrics.
Results suggest that the HoN's Matchmaking rating algorithm, while generally
capturing the skill level of the player well, also has weaknesses, which have
been exploited by players to achieve a higher placement on the ranking ladder
than deserved by actual skill. In addition, we also illustrate the effects of
the choice of the business model (from pay-to-play to free-to-play) on player
population.
|
1209.5601 | Fan Min | Fan Min, Qinghua Hu, William Zhu | Feature selection with test cost constraint | 23 pages | null | 10.1016/j.ijar.2013.04.003 | null | cs.AI cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Feature selection is an important preprocessing step in machine learning and
data mining. In real-world applications, costs, including money, time and other
resources, are required to acquire the features. In some cases, there is a test
cost constraint due to limited resources. We shall deliberately select an
informative and cheap feature subset for classification. This paper proposes
the feature selection with test cost constraint problem for this issue. The new
problem has a simple form while described as a constraint satisfaction problem
(CSP). Backtracking is a general algorithm for CSP, and it is efficient in
solving the new problem on medium-sized data. As the backtracking algorithm is
not scalable to large datasets, a heuristic algorithm is also developed.
Experimental results show that the heuristic algorithm can find the optimal
solution in most cases. We also redefine some existing feature selection
problems in rough sets, especially in decision-theoretic rough sets, from the
viewpoint of CSP. These new definitions provide insight to some new research
directions.
| [
{
"version": "v1",
"created": "Tue, 25 Sep 2012 13:21:40 GMT"
}
] | 2013-05-22T00:00:00 | [
[
"Min",
"Fan",
""
],
[
"Hu",
"Qinghua",
""
],
[
"Zhu",
"William",
""
]
] | TITLE: Feature selection with test cost constraint
ABSTRACT: Feature selection is an important preprocessing step in machine learning and
data mining. In real-world applications, costs, including money, time and other
resources, are required to acquire the features. In some cases, there is a test
cost constraint due to limited resources. We shall deliberately select an
informative and cheap feature subset for classification. This paper proposes
the feature selection with test cost constraint problem for this issue. The new
problem has a simple form while described as a constraint satisfaction problem
(CSP). Backtracking is a general algorithm for CSP, and it is efficient in
solving the new problem on medium-sized data. As the backtracking algorithm is
not scalable to large datasets, a heuristic algorithm is also developed.
Experimental results show that the heuristic algorithm can find the optimal
solution in most cases. We also redefine some existing feature selection
problems in rough sets, especially in decision-theoretic rough sets, from the
viewpoint of CSP. These new definitions provide insight to some new research
directions.
|
1302.7278 | Gregory Kucherov | Kamil Salikhov, Gustavo Sacomoto, and Gregory Kucherov | Using cascading Bloom filters to improve the memory usage for de Brujin
graphs | 12 pages, submitted | null | null | null | cs.DS | http://creativecommons.org/licenses/by/3.0/ | De Brujin graphs are widely used in bioinformatics for processing
next-generation sequencing data. Due to a very large size of NGS datasets, it
is essential to represent de Bruijn graphs compactly, and several approaches to
this problem have been proposed recently. In this work, we show how to reduce
the memory required by the algorithm of [3] that represents de Brujin graphs
using Bloom filters. Our method requires 30% to 40% less memory with respect to
the method of [3], with insignificant impact to construction time. At the same
time, our experiments showed a better query time compared to [3]. This is, to
our knowledge, the best practical representation for de Bruijn graphs.
| [
{
"version": "v1",
"created": "Thu, 28 Feb 2013 18:35:21 GMT"
},
{
"version": "v2",
"created": "Tue, 21 May 2013 15:25:19 GMT"
}
] | 2013-05-22T00:00:00 | [
[
"Salikhov",
"Kamil",
""
],
[
"Sacomoto",
"Gustavo",
""
],
[
"Kucherov",
"Gregory",
""
]
] | TITLE: Using cascading Bloom filters to improve the memory usage for de Brujin
graphs
ABSTRACT: De Brujin graphs are widely used in bioinformatics for processing
next-generation sequencing data. Due to a very large size of NGS datasets, it
is essential to represent de Bruijn graphs compactly, and several approaches to
this problem have been proposed recently. In this work, we show how to reduce
the memory required by the algorithm of [3] that represents de Brujin graphs
using Bloom filters. Our method requires 30% to 40% less memory with respect to
the method of [3], with insignificant impact to construction time. At the same
time, our experiments showed a better query time compared to [3]. This is, to
our knowledge, the best practical representation for de Bruijn graphs.
|
1305.4820 | Nader Jelassi | Mohamed Nader Jelassi and Sadok Ben Yahia and Engelbert Mephu Nguifo | Nouvelle approche de recommandation personnalisee dans les folksonomies
basee sur le profil des utilisateurs | 7 pages | null | null | null | cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In folksonomies, users use to share objects (movies, books, bookmarks, etc.)
by annotating them with a set of tags of their own choice. With the rise of the
Web 2.0 age, users become the core of the system since they are both the
contributors and the creators of the information. Yet, each user has its own
profile and its own ideas making thereby the strength as well as the weakness
of folksonomies. Indeed, it would be helpful to take account of users' profile
when suggesting a list of tags and resources or even a list of friends, in
order to make a personal recommandation, instead of suggesting the more used
tags and resources in the folksonomy. In this paper, we consider users' profile
as a new dimension of a folksonomy classically composed of three dimensions
<users, tags, ressources> and we propose an approach to group users with
equivalent profiles and equivalent interests as quadratic concepts. Then, we
use such structures to propose our personalized recommendation system of users,
tags and resources according to each user's profile. Carried out experiments on
two real-world datasets, i.e., MovieLens and BookCrossing highlight encouraging
results in terms of precision as well as a good social evaluation.
| [
{
"version": "v1",
"created": "Tue, 21 May 2013 13:59:51 GMT"
}
] | 2013-05-22T00:00:00 | [
[
"Jelassi",
"Mohamed Nader",
""
],
[
"Yahia",
"Sadok Ben",
""
],
[
"Nguifo",
"Engelbert Mephu",
""
]
] | TITLE: Nouvelle approche de recommandation personnalisee dans les folksonomies
basee sur le profil des utilisateurs
ABSTRACT: In folksonomies, users use to share objects (movies, books, bookmarks, etc.)
by annotating them with a set of tags of their own choice. With the rise of the
Web 2.0 age, users become the core of the system since they are both the
contributors and the creators of the information. Yet, each user has its own
profile and its own ideas making thereby the strength as well as the weakness
of folksonomies. Indeed, it would be helpful to take account of users' profile
when suggesting a list of tags and resources or even a list of friends, in
order to make a personal recommandation, instead of suggesting the more used
tags and resources in the folksonomy. In this paper, we consider users' profile
as a new dimension of a folksonomy classically composed of three dimensions
<users, tags, ressources> and we propose an approach to group users with
equivalent profiles and equivalent interests as quadratic concepts. Then, we
use such structures to propose our personalized recommendation system of users,
tags and resources according to each user's profile. Carried out experiments on
two real-world datasets, i.e., MovieLens and BookCrossing highlight encouraging
results in terms of precision as well as a good social evaluation.
|
1208.0787 | Shang Shang | Shang Shang, Sanjeev R. Kulkarni, Paul W. Cuff and Pan Hui | A Random Walk Based Model Incorporating Social Information for
Recommendations | 2012 IEEE Machine Learning for Signal Processing Workshop (MLSP), 6
pages | null | null | null | cs.IR cs.LG | http://creativecommons.org/licenses/by-nc-sa/3.0/ | Collaborative filtering (CF) is one of the most popular approaches to build a
recommendation system. In this paper, we propose a hybrid collaborative
filtering model based on a Makovian random walk to address the data sparsity
and cold start problems in recommendation systems. More precisely, we construct
a directed graph whose nodes consist of items and users, together with item
content, user profile and social network information. We incorporate user's
ratings into edge settings in the graph model. The model provides personalized
recommendations and predictions to individuals and groups. The proposed
algorithms are evaluated on MovieLens and Epinions datasets. Experimental
results show that the proposed methods perform well compared with other
graph-based methods, especially in the cold start case.
| [
{
"version": "v1",
"created": "Fri, 3 Aug 2012 16:15:10 GMT"
},
{
"version": "v2",
"created": "Fri, 17 May 2013 21:57:26 GMT"
}
] | 2013-05-21T00:00:00 | [
[
"Shang",
"Shang",
""
],
[
"Kulkarni",
"Sanjeev R.",
""
],
[
"Cuff",
"Paul W.",
""
],
[
"Hui",
"Pan",
""
]
] | TITLE: A Random Walk Based Model Incorporating Social Information for
Recommendations
ABSTRACT: Collaborative filtering (CF) is one of the most popular approaches to build a
recommendation system. In this paper, we propose a hybrid collaborative
filtering model based on a Makovian random walk to address the data sparsity
and cold start problems in recommendation systems. More precisely, we construct
a directed graph whose nodes consist of items and users, together with item
content, user profile and social network information. We incorporate user's
ratings into edge settings in the graph model. The model provides personalized
recommendations and predictions to individuals and groups. The proposed
algorithms are evaluated on MovieLens and Epinions datasets. Experimental
results show that the proposed methods perform well compared with other
graph-based methods, especially in the cold start case.
|
1212.2129 | Bin Li | Bin Li and Steven C. H. Hoi | Online Portfolio Selection: A Survey | 33 pages | null | null | null | q-fin.CP cs.AI cs.CE q-fin.PM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Online portfolio selection is a fundamental problem in computational finance,
which has been extensively studied across several research communities,
including finance, statistics, artificial intelligence, machine learning, and
data mining, etc. This article aims to provide a comprehensive survey and a
structural understanding of published online portfolio selection techniques.
From an online machine learning perspective, we first formulate online
portfolio selection as a sequential decision problem, and then survey a variety
of state-of-the-art approaches, which are grouped into several major
categories, including benchmarks, "Follow-the-Winner" approaches,
"Follow-the-Loser" approaches, "Pattern-Matching" based approaches, and
"Meta-Learning Algorithms". In addition to the problem formulation and related
algorithms, we also discuss the relationship of these algorithms with the
Capital Growth theory in order to better understand the similarities and
differences of their underlying trading ideas. This article aims to provide a
timely and comprehensive survey for both machine learning and data mining
researchers in academia and quantitative portfolio managers in the financial
industry to help them understand the state-of-the-art and facilitate their
research and practical applications. We also discuss some open issues and
evaluate some emerging new trends for future research directions.
| [
{
"version": "v1",
"created": "Mon, 10 Dec 2012 16:49:54 GMT"
},
{
"version": "v2",
"created": "Sun, 19 May 2013 12:08:21 GMT"
}
] | 2013-05-21T00:00:00 | [
[
"Li",
"Bin",
""
],
[
"Hoi",
"Steven C. H.",
""
]
] | TITLE: Online Portfolio Selection: A Survey
ABSTRACT: Online portfolio selection is a fundamental problem in computational finance,
which has been extensively studied across several research communities,
including finance, statistics, artificial intelligence, machine learning, and
data mining, etc. This article aims to provide a comprehensive survey and a
structural understanding of published online portfolio selection techniques.
From an online machine learning perspective, we first formulate online
portfolio selection as a sequential decision problem, and then survey a variety
of state-of-the-art approaches, which are grouped into several major
categories, including benchmarks, "Follow-the-Winner" approaches,
"Follow-the-Loser" approaches, "Pattern-Matching" based approaches, and
"Meta-Learning Algorithms". In addition to the problem formulation and related
algorithms, we also discuss the relationship of these algorithms with the
Capital Growth theory in order to better understand the similarities and
differences of their underlying trading ideas. This article aims to provide a
timely and comprehensive survey for both machine learning and data mining
researchers in academia and quantitative portfolio managers in the financial
industry to help them understand the state-of-the-art and facilitate their
research and practical applications. We also discuss some open issues and
evaluate some emerging new trends for future research directions.
|
1305.4345 | Alon Schclar | Alon Schclar and Lior Rokach and Amir Amit | Ensembles of Classifiers based on Dimensionality Reduction | 31 pages, 4 figures, 4 tables, Submitted to Pattern Analysis and
Applications | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present a novel approach for the construction of ensemble classifiers
based on dimensionality reduction. Dimensionality reduction methods represent
datasets using a small number of attributes while preserving the information
conveyed by the original dataset. The ensemble members are trained based on
dimension-reduced versions of the training set. These versions are obtained by
applying dimensionality reduction to the original training set using different
values of the input parameters. This construction meets both the diversity and
accuracy criteria which are required to construct an ensemble classifier where
the former criterion is obtained by the various input parameter values and the
latter is achieved due to the decorrelation and noise reduction properties of
dimensionality reduction. In order to classify a test sample, it is first
embedded into the dimension reduced space of each individual classifier by
using an out-of-sample extension algorithm. Each classifier is then applied to
the embedded sample and the classification is obtained via a voting scheme. We
present three variations of the proposed approach based on the Random
Projections, the Diffusion Maps and the Random Subspaces dimensionality
reduction algorithms. We also present a multi-strategy ensemble which combines
AdaBoost and Diffusion Maps. A comparison is made with the Bagging, AdaBoost,
Rotation Forest ensemble classifiers and also with the base classifier which
does not incorporate dimensionality reduction. Our experiments used seventeen
benchmark datasets from the UCI repository. The results obtained by the
proposed algorithms were superior in many cases to other algorithms.
| [
{
"version": "v1",
"created": "Sun, 19 May 2013 10:24:06 GMT"
}
] | 2013-05-21T00:00:00 | [
[
"Schclar",
"Alon",
""
],
[
"Rokach",
"Lior",
""
],
[
"Amit",
"Amir",
""
]
] | TITLE: Ensembles of Classifiers based on Dimensionality Reduction
ABSTRACT: We present a novel approach for the construction of ensemble classifiers
based on dimensionality reduction. Dimensionality reduction methods represent
datasets using a small number of attributes while preserving the information
conveyed by the original dataset. The ensemble members are trained based on
dimension-reduced versions of the training set. These versions are obtained by
applying dimensionality reduction to the original training set using different
values of the input parameters. This construction meets both the diversity and
accuracy criteria which are required to construct an ensemble classifier where
the former criterion is obtained by the various input parameter values and the
latter is achieved due to the decorrelation and noise reduction properties of
dimensionality reduction. In order to classify a test sample, it is first
embedded into the dimension reduced space of each individual classifier by
using an out-of-sample extension algorithm. Each classifier is then applied to
the embedded sample and the classification is obtained via a voting scheme. We
present three variations of the proposed approach based on the Random
Projections, the Diffusion Maps and the Random Subspaces dimensionality
reduction algorithms. We also present a multi-strategy ensemble which combines
AdaBoost and Diffusion Maps. A comparison is made with the Bagging, AdaBoost,
Rotation Forest ensemble classifiers and also with the base classifier which
does not incorporate dimensionality reduction. Our experiments used seventeen
benchmark datasets from the UCI repository. The results obtained by the
proposed algorithms were superior in many cases to other algorithms.
|
1305.4429 | Youfang Lin | Youfang Lin, Xuguang Jia, Mingjie Lin, Steve Gregory, Huaiyu Wan,
Zhihao Wu | Inferring High Quality Co-Travel Networks | 20 pages, 23 figures | null | null | null | cs.SI physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Social networks provide a new perspective for enterprises to better
understand their customers and have attracted substantial attention in
industry. However, inferring high quality customer social networks is a great
challenge while there are no explicit customer relations in many traditional
OLTP environments. In this paper, we study this issue in the field of passenger
transport and introduce a new member to the family of social networks, which is
named Co-Travel Networks, consisting of passengers connected by their co-travel
behaviors. We propose a novel method to infer high quality co-travel networks
of civil aviation passengers from their co-booking behaviors derived from the
PNRs (Passenger Naming Records). In our method, to accurately evaluate the
strength of ties, we present a measure of Co-Journey Times to count the
co-travel times of complete journeys between passengers. We infer a high
quality co-travel network based on a large encrypted PNR dataset and conduct a
series of network analyses on it. The experimental results show the
effectiveness of our inferring method, as well as some special characteristics
of co-travel networks, such as the sparsity and high aggregation, compared with
other kinds of social networks. It can be expected that such co-travel networks
will greatly help the industry to better understand their passengers so as to
improve their services. More importantly, we contribute a special kind of
social networks with high strength of ties generated from very close and high
cost travel behaviors, for further scientific researches on human travel
behaviors, group travel patterns, high-end travel market evolution, etc., from
the perspective of social networks.
| [
{
"version": "v1",
"created": "Mon, 20 May 2013 03:04:23 GMT"
}
] | 2013-05-21T00:00:00 | [
[
"Lin",
"Youfang",
""
],
[
"Jia",
"Xuguang",
""
],
[
"Lin",
"Mingjie",
""
],
[
"Gregory",
"Steve",
""
],
[
"Wan",
"Huaiyu",
""
],
[
"Wu",
"Zhihao",
""
]
] | TITLE: Inferring High Quality Co-Travel Networks
ABSTRACT: Social networks provide a new perspective for enterprises to better
understand their customers and have attracted substantial attention in
industry. However, inferring high quality customer social networks is a great
challenge while there are no explicit customer relations in many traditional
OLTP environments. In this paper, we study this issue in the field of passenger
transport and introduce a new member to the family of social networks, which is
named Co-Travel Networks, consisting of passengers connected by their co-travel
behaviors. We propose a novel method to infer high quality co-travel networks
of civil aviation passengers from their co-booking behaviors derived from the
PNRs (Passenger Naming Records). In our method, to accurately evaluate the
strength of ties, we present a measure of Co-Journey Times to count the
co-travel times of complete journeys between passengers. We infer a high
quality co-travel network based on a large encrypted PNR dataset and conduct a
series of network analyses on it. The experimental results show the
effectiveness of our inferring method, as well as some special characteristics
of co-travel networks, such as the sparsity and high aggregation, compared with
other kinds of social networks. It can be expected that such co-travel networks
will greatly help the industry to better understand their passengers so as to
improve their services. More importantly, we contribute a special kind of
social networks with high strength of ties generated from very close and high
cost travel behaviors, for further scientific researches on human travel
behaviors, group travel patterns, high-end travel market evolution, etc., from
the perspective of social networks.
|
1305.4455 | Mark Wilkinson | Ben P Vandervalk, E Luke McCarthy, Mark D Wilkinson | SHARE: A Web Service Based Framework for Distributed Querying and
Reasoning on the Semantic Web | Third Asian Semantic Web Conference, ASWC2008 Bangkok, Thailand
December 2008, Workshops Proceedings (NEFORS2008), pp69-78 | null | null | null | cs.DL cs.AI cs.SE | http://creativecommons.org/licenses/by/3.0/ | Here we describe the SHARE system, a web service based framework for
distributed querying and reasoning on the semantic web. The main innovations of
SHARE are: (1) the extension of a SPARQL query engine to perform on-demand data
retrieval from web services, and (2) the extension of an OWL reasoner to test
property restrictions by means of web service invocations. In addition to
enabling queries across distributed datasets, the system allows for a target
dataset that is significantly larger than is possible under current,
centralized approaches. Although the architecture is equally applicable to all
types of data, the SHARE system targets bioinformatics, due to the large number
of interoperable web services that are already available in this area. SHARE is
built entirely on semantic web standards, and is the successor of the BioMOBY
project.
| [
{
"version": "v1",
"created": "Mon, 20 May 2013 07:54:09 GMT"
}
] | 2013-05-21T00:00:00 | [
[
"Vandervalk",
"Ben P",
""
],
[
"McCarthy",
"E Luke",
""
],
[
"Wilkinson",
"Mark D",
""
]
] | TITLE: SHARE: A Web Service Based Framework for Distributed Querying and
Reasoning on the Semantic Web
ABSTRACT: Here we describe the SHARE system, a web service based framework for
distributed querying and reasoning on the semantic web. The main innovations of
SHARE are: (1) the extension of a SPARQL query engine to perform on-demand data
retrieval from web services, and (2) the extension of an OWL reasoner to test
property restrictions by means of web service invocations. In addition to
enabling queries across distributed datasets, the system allows for a target
dataset that is significantly larger than is possible under current,
centralized approaches. Although the architecture is equally applicable to all
types of data, the SHARE system targets bioinformatics, due to the large number
of interoperable web services that are already available in this area. SHARE is
built entirely on semantic web standards, and is the successor of the BioMOBY
project.
|
1210.5035 | Xiaojun Zhou | Xiaojun Zhou | A Comparative Study of State Transition Algorithm with Harmony Search
and Artificial Bee Colony | null | Advances in Intelligent Systems and Computing, Volume 212, 2013,
pp 651-659 | null | null | math.OC cs.IT math.IT math.PR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We focus on a comparative study of three recently developed nature-inspired
optimization algorithms, including state transition algorithm, harmony search
and artificial bee colony. Their core mechanisms are introduced and their
similarities and differences are described. Then, a suit of 27 well-known
benchmark problems are used to investigate the performance of these algorithms
and finally we discuss their general applicability with respect to the
structure of optimization problems.
| [
{
"version": "v1",
"created": "Thu, 18 Oct 2012 07:17:29 GMT"
}
] | 2013-05-20T00:00:00 | [
[
"Zhou",
"Xiaojun",
""
]
] | TITLE: A Comparative Study of State Transition Algorithm with Harmony Search
and Artificial Bee Colony
ABSTRACT: We focus on a comparative study of three recently developed nature-inspired
optimization algorithms, including state transition algorithm, harmony search
and artificial bee colony. Their core mechanisms are introduced and their
similarities and differences are described. Then, a suit of 27 well-known
benchmark problems are used to investigate the performance of these algorithms
and finally we discuss their general applicability with respect to the
structure of optimization problems.
|
1305.3616 | Manuel Gomez Rodriguez | Manuel Gomez Rodriguez, Jure Leskovec, Bernhard Schoelkopf | Modeling Information Propagation with Survival Theory | To appear at ICML '13 | null | null | null | cs.SI cs.DS physics.soc-ph stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Networks provide a skeleton for the spread of contagions, like, information,
ideas, behaviors and diseases. Many times networks over which contagions
diffuse are unobserved and need to be inferred. Here we apply survival theory
to develop general additive and multiplicative risk models under which the
network inference problems can be solved efficiently by exploiting their
convexity. Our additive risk model generalizes several existing network
inference models. We show all these models are particular cases of our more
general model. Our multiplicative model allows for modeling scenarios in which
a node can either increase or decrease the risk of activation of another node,
in contrast with previous approaches, which consider only positive risk
increments. We evaluate the performance of our network inference algorithms on
large synthetic and real cascade datasets, and show that our models are able to
predict the length and duration of cascades in real data.
| [
{
"version": "v1",
"created": "Wed, 15 May 2013 20:01:06 GMT"
}
] | 2013-05-17T00:00:00 | [
[
"Rodriguez",
"Manuel Gomez",
""
],
[
"Leskovec",
"Jure",
""
],
[
"Schoelkopf",
"Bernhard",
""
]
] | TITLE: Modeling Information Propagation with Survival Theory
ABSTRACT: Networks provide a skeleton for the spread of contagions, like, information,
ideas, behaviors and diseases. Many times networks over which contagions
diffuse are unobserved and need to be inferred. Here we apply survival theory
to develop general additive and multiplicative risk models under which the
network inference problems can be solved efficiently by exploiting their
convexity. Our additive risk model generalizes several existing network
inference models. We show all these models are particular cases of our more
general model. Our multiplicative model allows for modeling scenarios in which
a node can either increase or decrease the risk of activation of another node,
in contrast with previous approaches, which consider only positive risk
increments. We evaluate the performance of our network inference algorithms on
large synthetic and real cascade datasets, and show that our models are able to
predict the length and duration of cascades in real data.
|
1305.3883 | Sanjay Rawat | Sanjay Rawat and Dumitru Ceara and Laurent Mounier and Marie-Laure
Potet | Combining Static and Dynamic Analysis for Vulnerability Detection | There are 15 pages with 1 figure | null | null | null | cs.CR | http://creativecommons.org/licenses/by/3.0/ | In this paper, we present a hybrid approach for buffer overflow detection in
C code. The approach makes use of static and dynamic analysis of the
application under investigation. The static part consists in calculating taint
dependency sequences (TDS) between user controlled inputs and vulnerable
statements. This process is akin to program slice of interest to calculate
tainted data- and control-flow path which exhibits the dependence between
tainted program inputs and vulnerable statements in the code. The dynamic part
consists of executing the program along TDSs to trigger the vulnerability by
generating suitable inputs. We use genetic algorithm to generate inputs. We
propose a fitness function that approximates the program behavior (control
flow) based on the frequencies of the statements along TDSs. This runtime
aspect makes the approach faster and accurate. We provide experimental results
on the Verisec benchmark to validate our approach.
| [
{
"version": "v1",
"created": "Thu, 16 May 2013 18:28:45 GMT"
}
] | 2013-05-17T00:00:00 | [
[
"Rawat",
"Sanjay",
""
],
[
"Ceara",
"Dumitru",
""
],
[
"Mounier",
"Laurent",
""
],
[
"Potet",
"Marie-Laure",
""
]
] | TITLE: Combining Static and Dynamic Analysis for Vulnerability Detection
ABSTRACT: In this paper, we present a hybrid approach for buffer overflow detection in
C code. The approach makes use of static and dynamic analysis of the
application under investigation. The static part consists in calculating taint
dependency sequences (TDS) between user controlled inputs and vulnerable
statements. This process is akin to program slice of interest to calculate
tainted data- and control-flow path which exhibits the dependence between
tainted program inputs and vulnerable statements in the code. The dynamic part
consists of executing the program along TDSs to trigger the vulnerability by
generating suitable inputs. We use genetic algorithm to generate inputs. We
propose a fitness function that approximates the program behavior (control
flow) based on the frequencies of the statements along TDSs. This runtime
aspect makes the approach faster and accurate. We provide experimental results
on the Verisec benchmark to validate our approach.
|
1201.3804 | Mads Kristensen | Mads Ruben Burgdorff Kristensen and Brian Vinter | Managing Communication Latency-Hiding at Runtime for Parallel
Programming Languages and Libraries | PREPRINT | Proceeding HPCC '12 Proceedings of the 2012 IEEE 14th
International Conference on High Performance Computing and Communication &
2012 IEEE 9th International Conference on Embedded Software and Systems | 10.1109/HPCC.2012.80 | null | cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This work introduces a runtime model for managing communication with support
for latency-hiding. The model enables non-computer science researchers to
exploit communication latency-hiding techniques seamlessly. For compiled
languages, it is often possible to create efficient schedules for
communication, but this is not the case for interpreted languages. By
maintaining data dependencies between scheduled operations, it is possible to
aggressively initiate communication and lazily evaluate tasks to allow maximal
time for the communication to finish before entering a wait state. We implement
a heuristic of this model in DistNumPy, an auto-parallelizing version of
numerical Python that allows sequential NumPy programs to run on distributed
memory architectures. Furthermore, we present performance comparisons for eight
benchmarks with and without automatic latency-hiding. The results shows that
our model reduces the time spent on waiting for communication as much as 27
times, from a maximum of 54% to only 2% of the total execution time, in a
stencil application.
| [
{
"version": "v1",
"created": "Wed, 18 Jan 2012 14:43:43 GMT"
}
] | 2013-05-16T00:00:00 | [
[
"Kristensen",
"Mads Ruben Burgdorff",
""
],
[
"Vinter",
"Brian",
""
]
] | TITLE: Managing Communication Latency-Hiding at Runtime for Parallel
Programming Languages and Libraries
ABSTRACT: This work introduces a runtime model for managing communication with support
for latency-hiding. The model enables non-computer science researchers to
exploit communication latency-hiding techniques seamlessly. For compiled
languages, it is often possible to create efficient schedules for
communication, but this is not the case for interpreted languages. By
maintaining data dependencies between scheduled operations, it is possible to
aggressively initiate communication and lazily evaluate tasks to allow maximal
time for the communication to finish before entering a wait state. We implement
a heuristic of this model in DistNumPy, an auto-parallelizing version of
numerical Python that allows sequential NumPy programs to run on distributed
memory architectures. Furthermore, we present performance comparisons for eight
benchmarks with and without automatic latency-hiding. The results shows that
our model reduces the time spent on waiting for communication as much as 27
times, from a maximum of 54% to only 2% of the total execution time, in a
stencil application.
|
1305.3384 | Lior Rokach | Naseem Biadsy, Lior Rokach, Armin Shmilovici | Transfer Learning for Content-Based Recommender Systems using Tree
Matching | null | null | null | null | cs.LG cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we present a new approach to content-based transfer learning
for solving the data sparsity problem in cases when the users' preferences in
the target domain are either scarce or unavailable, but the necessary
information on the preferences exists in another domain. We show that training
a system to use such information across domains can produce better performance.
Specifically, we represent users' behavior patterns based on topological graph
structures. Each behavior pattern represents the behavior of a set of users,
when the users' behavior is defined as the items they rated and the items'
rating values. In the next step we find a correlation between behavior patterns
in the source domain and behavior patterns in the target domain. This mapping
is considered a bridge between the two domains. Based on the correlation and
content-attributes of the items, we train a machine learning model to predict
users' ratings in the target domain. When we compare our approach to the
popularity approach and KNN-cross-domain on a real world dataset, the results
show that on an average of 83$%$ of the cases our approach outperforms both
methods.
| [
{
"version": "v1",
"created": "Wed, 15 May 2013 08:00:54 GMT"
}
] | 2013-05-16T00:00:00 | [
[
"Biadsy",
"Naseem",
""
],
[
"Rokach",
"Lior",
""
],
[
"Shmilovici",
"Armin",
""
]
] | TITLE: Transfer Learning for Content-Based Recommender Systems using Tree
Matching
ABSTRACT: In this paper we present a new approach to content-based transfer learning
for solving the data sparsity problem in cases when the users' preferences in
the target domain are either scarce or unavailable, but the necessary
information on the preferences exists in another domain. We show that training
a system to use such information across domains can produce better performance.
Specifically, we represent users' behavior patterns based on topological graph
structures. Each behavior pattern represents the behavior of a set of users,
when the users' behavior is defined as the items they rated and the items'
rating values. In the next step we find a correlation between behavior patterns
in the source domain and behavior patterns in the target domain. This mapping
is considered a bridge between the two domains. Based on the correlation and
content-attributes of the items, we train a machine learning model to predict
users' ratings in the target domain. When we compare our approach to the
popularity approach and KNN-cross-domain on a real world dataset, the results
show that on an average of 83$%$ of the cases our approach outperforms both
methods.
|
1305.3568 | Xin Jin | Xin Jin, Li Erran Li, Laurent Vanbever, Jennifer Rexford | SoftCell: Taking Control of Cellular Core Networks | null | null | null | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Existing cellular networks suffer from inflexible and expensive equipment,
and complex control-plane protocols. To address these challenges, we present
SoftCell, a scalable architecture for supporting fine-grained policies for
mobile devices in cellular core networks. The SoftCell controller realizes
high-level service polices by directing traffic over paths that traverse a
sequence of middleboxes, optimized to the network conditions and user
locations. To ensure scalability, the core switches forward traffic on
hierarchical addresses (grouped by base station) and policy tags (identifying
paths through middleboxes). This minimizes data-plane state in the core
switches, and pushes all fine-grained state to software switches at the base
stations. These access switches apply fine-grained rules, specified by the
controller, to map all traffic to the appropriate addresses and tags. SoftCell
guarantees that packets in the same connection traverse the same sequence of
middleboxes in both directions, even in the presence of mobility. Our
characterization of real LTE workloads, micro-benchmarks on our prototype
controller, and large-scale simulations demonstrate that SoftCell improves the
flexibility of cellular core networks, while enabling the use of inexpensive
commodity switches and middleboxes.
| [
{
"version": "v1",
"created": "Wed, 15 May 2013 18:00:02 GMT"
}
] | 2013-05-16T00:00:00 | [
[
"Jin",
"Xin",
""
],
[
"Li",
"Li Erran",
""
],
[
"Vanbever",
"Laurent",
""
],
[
"Rexford",
"Jennifer",
""
]
] | TITLE: SoftCell: Taking Control of Cellular Core Networks
ABSTRACT: Existing cellular networks suffer from inflexible and expensive equipment,
and complex control-plane protocols. To address these challenges, we present
SoftCell, a scalable architecture for supporting fine-grained policies for
mobile devices in cellular core networks. The SoftCell controller realizes
high-level service polices by directing traffic over paths that traverse a
sequence of middleboxes, optimized to the network conditions and user
locations. To ensure scalability, the core switches forward traffic on
hierarchical addresses (grouped by base station) and policy tags (identifying
paths through middleboxes). This minimizes data-plane state in the core
switches, and pushes all fine-grained state to software switches at the base
stations. These access switches apply fine-grained rules, specified by the
controller, to map all traffic to the appropriate addresses and tags. SoftCell
guarantees that packets in the same connection traverse the same sequence of
middleboxes in both directions, even in the presence of mobility. Our
characterization of real LTE workloads, micro-benchmarks on our prototype
controller, and large-scale simulations demonstrate that SoftCell improves the
flexibility of cellular core networks, while enabling the use of inexpensive
commodity switches and middleboxes.
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.