id
large_stringlengths
9
16
submitter
large_stringlengths
3
64
authors
large_stringlengths
5
20.2k
title
large_stringlengths
5
245
comments
large_stringlengths
1
482
journal-ref
large_stringlengths
4
382
doi
large_stringlengths
9
151
report-no
large_stringlengths
2
509
categories
large_stringlengths
5
78
license
large_stringclasses
9 values
abstract
large_stringlengths
83
3.55k
versions
large listlengths
1
21
update_date
timestamp[ms]date
2007-05-23 00:00:00
2025-05-30 00:00:00
authors_parsed
large listlengths
1
1.35k
prompt
large_stringlengths
166
3.64k
1502.00141
Mathieu Lagrange
Mathieu Lagrange, Gr\'egoire Lafay, Mathias Rossignol, Emmanouil Benetos, Axel Roebel
An evaluation framework for event detection using a morphological model of acoustic scenes
null
null
null
null
stat.ML cs.SD
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper introduces a model of environmental acoustic scenes which adopts a morphological approach by ab-stracting temporal structures of acoustic scenes. To demonstrate its potential, this model is employed to evaluate the performance of a large set of acoustic events detection systems. This model allows us to explicitly control key morphological aspects of the acoustic scene and isolate their impact on the performance of the system under evaluation. Thus, more information can be gained on the behavior of evaluated systems, providing guidance for further improvements. The proposed model is validated using submitted systems from the IEEE DCASE Challenge; results indicate that the proposed scheme is able to successfully build datasets useful for evaluating some aspects the performance of event detection systems, more particularly their robustness to new listening conditions and the increasing level of background sounds.
[ { "version": "v1", "created": "Sat, 31 Jan 2015 18:12:34 GMT" } ]
2015-02-03T00:00:00
[ [ "Lagrange", "Mathieu", "" ], [ "Lafay", "Grégoire", "" ], [ "Rossignol", "Mathias", "" ], [ "Benetos", "Emmanouil", "" ], [ "Roebel", "Axel", "" ] ]
TITLE: An evaluation framework for event detection using a morphological model of acoustic scenes ABSTRACT: This paper introduces a model of environmental acoustic scenes which adopts a morphological approach by ab-stracting temporal structures of acoustic scenes. To demonstrate its potential, this model is employed to evaluate the performance of a large set of acoustic events detection systems. This model allows us to explicitly control key morphological aspects of the acoustic scene and isolate their impact on the performance of the system under evaluation. Thus, more information can be gained on the behavior of evaluated systems, providing guidance for further improvements. The proposed model is validated using submitted systems from the IEEE DCASE Challenge; results indicate that the proposed scheme is able to successfully build datasets useful for evaluating some aspects the performance of event detection systems, more particularly their robustness to new listening conditions and the increasing level of background sounds.
1502.00166
Marijn ten Thij
Marijn ten Thij, Tanneke Ouboter, Daniel Worm, Nelly Litvak, Hans van den Berg and Sandjai Bhulai
Modelling of trends in Twitter using retweet graph dynamics
16 pages, 5 figures, presented at WAW 2014
Algorithms and Models for the Web Graph, 11th International Workshop, WAW 2014, Beijing, China, December 17-18, 2014, Proceedings pp 132-147, Lecture Notes in Computer Science, Springer
10.1007/978-3-319-13123-8_11
null
cs.SI physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we model user behaviour in Twitter to capture the emergence of trending topics. For this purpose, we first extensively analyse tweet datasets of several different events. In particular, for these datasets, we construct and investigate the retweet graphs. We find that the retweet graph for a trending topic has a relatively dense largest connected component (LCC). Next, based on the insights obtained from the analyses of the datasets, we design a mathematical model that describes the evolution of a retweet graph by three main parameters. We then quantify, analytically and by simulation, the influence of the model parameters on the basic characteristics of the retweet graph, such as the density of edges and the size and density of the LCC. Finally, we put the model in practice, estimate its parameters and compare the resulting behavior of the model to our datasets.
[ { "version": "v1", "created": "Sat, 31 Jan 2015 21:45:17 GMT" } ]
2015-02-03T00:00:00
[ [ "Thij", "Marijn ten", "" ], [ "Ouboter", "Tanneke", "" ], [ "Worm", "Daniel", "" ], [ "Litvak", "Nelly", "" ], [ "Berg", "Hans van den", "" ], [ "Bhulai", "Sandjai", "" ] ]
TITLE: Modelling of trends in Twitter using retweet graph dynamics ABSTRACT: In this paper we model user behaviour in Twitter to capture the emergence of trending topics. For this purpose, we first extensively analyse tweet datasets of several different events. In particular, for these datasets, we construct and investigate the retweet graphs. We find that the retweet graph for a trending topic has a relatively dense largest connected component (LCC). Next, based on the insights obtained from the analyses of the datasets, we design a mathematical model that describes the evolution of a retweet graph by three main parameters. We then quantify, analytically and by simulation, the influence of the model parameters on the basic characteristics of the retweet graph, such as the density of edges and the size and density of the LCC. Finally, we put the model in practice, estimate its parameters and compare the resulting behavior of the model to our datasets.
1502.00192
Menglong Zhu
Menglong Zhu, Xiaowei Zhou, Kostas Daniilidis
Pose and Shape Estimation with Discriminatively Learned Parts
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce a new approach for estimating the 3D pose and the 3D shape of an object from a single image. Given a training set of view exemplars, we learn and select appearance-based discriminative parts which are mapped onto the 3D model from the training set through a facil- ity location optimization. The training set of 3D models is summarized into a sparse set of shapes from which we can generalize by linear combination. Given a test picture, we detect hypotheses for each part. The main challenge is to select from these hypotheses and compute the 3D pose and shape coefficients at the same time. To achieve this, we optimize a function that minimizes simultaneously the geometric reprojection error as well as the appearance matching of the parts. We apply the alternating direction method of multipliers (ADMM) to minimize the resulting convex function. We evaluate our approach on the Fine Grained 3D Car dataset with superior performance in shape and pose errors. Our main and novel contribution is the simultaneous solution for part localization, 3D pose and shape by maximizing both geometric and appearance compatibility.
[ { "version": "v1", "created": "Sun, 1 Feb 2015 04:09:23 GMT" } ]
2015-02-03T00:00:00
[ [ "Zhu", "Menglong", "" ], [ "Zhou", "Xiaowei", "" ], [ "Daniilidis", "Kostas", "" ] ]
TITLE: Pose and Shape Estimation with Discriminatively Learned Parts ABSTRACT: We introduce a new approach for estimating the 3D pose and the 3D shape of an object from a single image. Given a training set of view exemplars, we learn and select appearance-based discriminative parts which are mapped onto the 3D model from the training set through a facil- ity location optimization. The training set of 3D models is summarized into a sparse set of shapes from which we can generalize by linear combination. Given a test picture, we detect hypotheses for each part. The main challenge is to select from these hypotheses and compute the 3D pose and shape coefficients at the same time. To achieve this, we optimize a function that minimizes simultaneously the geometric reprojection error as well as the appearance matching of the parts. We apply the alternating direction method of multipliers (ADMM) to minimize the resulting convex function. We evaluate our approach on the Fine Grained 3D Car dataset with superior performance in shape and pose errors. Our main and novel contribution is the simultaneous solution for part localization, 3D pose and shape by maximizing both geometric and appearance compatibility.
1502.00194
James J.Q. Yu
James J.Q. Yu, Albert Y.S. Lam, Victor O.K. Li
Real-Coded Chemical Reaction Optimization with Different Perturbation Functions
null
null
10.1109/CEC.2012.6252925
null
cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Chemical Reaction Optimization (CRO) is a powerful metaheuristic which mimics the interactions of molecules in chemical reactions to search for the global optimum. The perturbation function greatly influences the performance of CRO on solving different continuous problems. In this paper, we study four different probability distributions, namely, the Gaussian distribution, the Cauchy distribution, the exponential distribution, and a modified Rayleigh distribution, for the perturbation function of CRO. Different distributions have different impacts on the solutions. The distributions are tested by a set of well-known benchmark functions and simulation results show that problems with different characteristics have different preference on the distribution function. Our study gives guidelines to design CRO for different types of optimization problems.
[ { "version": "v1", "created": "Sun, 1 Feb 2015 04:45:43 GMT" } ]
2015-02-03T00:00:00
[ [ "Yu", "James J. Q.", "" ], [ "Lam", "Albert Y. S.", "" ], [ "Li", "Victor O. K.", "" ] ]
TITLE: Real-Coded Chemical Reaction Optimization with Different Perturbation Functions ABSTRACT: Chemical Reaction Optimization (CRO) is a powerful metaheuristic which mimics the interactions of molecules in chemical reactions to search for the global optimum. The perturbation function greatly influences the performance of CRO on solving different continuous problems. In this paper, we study four different probability distributions, namely, the Gaussian distribution, the Cauchy distribution, the exponential distribution, and a modified Rayleigh distribution, for the perturbation function of CRO. Different distributions have different impacts on the solutions. The distributions are tested by a set of well-known benchmark functions and simulation results show that problems with different characteristics have different preference on the distribution function. Our study gives guidelines to design CRO for different types of optimization problems.
1502.00197
James J.Q. Yu
James J.Q. Yu, Victor O.K. Li, Albert Y.S. Lam
An Inter-molecular Adaptive Collision Scheme for Chemical Reaction Optimization
null
null
10.1109/CEC.2014.6900234
null
cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Optimization techniques are frequently applied in science and engineering research and development. Evolutionary algorithms, as a kind of general-purpose metaheuristic, have been shown to be very effective in solving a wide range of optimization problems. A recently proposed chemical-reaction-inspired metaheuristic, Chemical Reaction Optimization (CRO), has been applied to solve many global optimization problems. However, the functionality of the inter-molecular ineffective collision operator in the canonical CRO design overlaps that of the on-wall ineffective collision operator, which can potential impair the overall performance. In this paper we propose a new inter-molecular ineffective collision operator for CRO for global optimization. To fully utilize our newly proposed operator, we also design a scheme to adapt the algorithm to optimization problems with different search space characteristics. We analyze the performance of our proposed algorithm with a number of widely used benchmark functions. The simulation results indicate that the new algorithm has superior performance over the canonical CRO.
[ { "version": "v1", "created": "Sun, 1 Feb 2015 04:53:48 GMT" } ]
2015-02-03T00:00:00
[ [ "Yu", "James J. Q.", "" ], [ "Li", "Victor O. K.", "" ], [ "Lam", "Albert Y. S.", "" ] ]
TITLE: An Inter-molecular Adaptive Collision Scheme for Chemical Reaction Optimization ABSTRACT: Optimization techniques are frequently applied in science and engineering research and development. Evolutionary algorithms, as a kind of general-purpose metaheuristic, have been shown to be very effective in solving a wide range of optimization problems. A recently proposed chemical-reaction-inspired metaheuristic, Chemical Reaction Optimization (CRO), has been applied to solve many global optimization problems. However, the functionality of the inter-molecular ineffective collision operator in the canonical CRO design overlaps that of the on-wall ineffective collision operator, which can potential impair the overall performance. In this paper we propose a new inter-molecular ineffective collision operator for CRO for global optimization. To fully utilize our newly proposed operator, we also design a scheme to adapt the algorithm to optimization problems with different search space characteristics. We analyze the performance of our proposed algorithm with a number of widely used benchmark functions. The simulation results indicate that the new algorithm has superior performance over the canonical CRO.
1502.00199
James J.Q. Yu
James J.Q. Yu, Albert Y.S. Lam, Victor O.K. Li
Chemical Reaction Optimization for the Set Covering Problem
null
null
10.1109/CEC.2014.6900233
null
cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The set covering problem (SCP) is one of the representative combinatorial optimization problems, having many practical applications. This paper investigates the development of an algorithm to solve SCP by employing chemical reaction optimization (CRO), a general-purpose metaheuristic. It is tested on a wide range of benchmark instances of SCP. The simulation results indicate that this algorithm gives outstanding performance compared with other heuristics and metaheuristics in solving SCP.
[ { "version": "v1", "created": "Sun, 1 Feb 2015 04:56:13 GMT" } ]
2015-02-03T00:00:00
[ [ "Yu", "James J. Q.", "" ], [ "Lam", "Albert Y. S.", "" ], [ "Li", "Victor O. K.", "" ] ]
TITLE: Chemical Reaction Optimization for the Set Covering Problem ABSTRACT: The set covering problem (SCP) is one of the representative combinatorial optimization problems, having many practical applications. This paper investigates the development of an algorithm to solve SCP by employing chemical reaction optimization (CRO), a general-purpose metaheuristic. It is tested on a wide range of benchmark instances of SCP. The simulation results indicate that this algorithm gives outstanding performance compared with other heuristics and metaheuristics in solving SCP.
1502.00231
Yishi Zhang
Zhijun Chen, Chaozhong Wu, Yishi Zhang, Zhen Huang, Bin Ran, Ming Zhong, Nengchao Lyu
Feature Selection with Redundancy-complementariness Dispersion
28 pages, 13 figures, 7 tables
null
null
null
cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Feature selection has attracted significant attention in data mining and machine learning in the past decades. Many existing feature selection methods eliminate redundancy by measuring pairwise inter-correlation of features, whereas the complementariness of features and higher inter-correlation among more than two features are ignored. In this study, a modification item concerning the complementariness of features is introduced in the evaluation criterion of features. Additionally, in order to identify the interference effect of already-selected False Positives (FPs), the redundancy-complementariness dispersion is also taken into account to adjust the measurement of pairwise inter-correlation of features. To illustrate the effectiveness of proposed method, classification experiments are applied with four frequently used classifiers on ten datasets. Classification results verify the superiority of proposed method compared with five representative feature selection methods.
[ { "version": "v1", "created": "Sun, 1 Feb 2015 10:44:26 GMT" } ]
2015-02-03T00:00:00
[ [ "Chen", "Zhijun", "" ], [ "Wu", "Chaozhong", "" ], [ "Zhang", "Yishi", "" ], [ "Huang", "Zhen", "" ], [ "Ran", "Bin", "" ], [ "Zhong", "Ming", "" ], [ "Lyu", "Nengchao", "" ] ]
TITLE: Feature Selection with Redundancy-complementariness Dispersion ABSTRACT: Feature selection has attracted significant attention in data mining and machine learning in the past decades. Many existing feature selection methods eliminate redundancy by measuring pairwise inter-correlation of features, whereas the complementariness of features and higher inter-correlation among more than two features are ignored. In this study, a modification item concerning the complementariness of features is introduced in the evaluation criterion of features. Additionally, in order to identify the interference effect of already-selected False Positives (FPs), the redundancy-complementariness dispersion is also taken into account to adjust the measurement of pairwise inter-correlation of features. To illustrate the effectiveness of proposed method, classification experiments are applied with four frequently used classifiers on ten datasets. Classification results verify the superiority of proposed method compared with five representative feature selection methods.
1502.00303
Xianbiao Qi
Xianbiao Qi, Chun-Guang Li, Guoying Zhao, Xiaopeng Hong, Matti Pietik\"ainen
Dynamic texture and scene classification by transferring deep image features
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Dynamic texture and scene classification are two fundamental problems in understanding natural video content. Extracting robust and effective features is a crucial step towards solving these problems. However the existing approaches suffer from the sensitivity to either varying illumination, or viewpoint changing, or even camera motion, and/or the lack of spatial information. Inspired by the success of deep structures in image classification, we attempt to leverage a deep structure to extract feature for dynamic texture and scene classification. To tackle with the challenges in training a deep structure, we propose to transfer some prior knowledge from image domain to video domain. To be specific, we propose to apply a well-trained Convolutional Neural Network (ConvNet) as a mid-level feature extractor to extract features from each frame, and then form a representation of a video by concatenating the first and the second order statistics over the mid-level features. We term this two-level feature extraction scheme as a Transferred ConvNet Feature (TCoF). Moreover we explore two different implementations of the TCoF scheme, i.e., the \textit{spatial} TCoF and the \textit{temporal} TCoF, in which the mean-removed frames and the difference between two adjacent frames are used as the inputs of the ConvNet, respectively. We evaluate systematically the proposed spatial TCoF and the temporal TCoF schemes on three benchmark data sets, including DynTex, YUPENN, and Maryland, and demonstrate that the proposed approach yields superior performance.
[ { "version": "v1", "created": "Sun, 1 Feb 2015 20:22:00 GMT" } ]
2015-02-03T00:00:00
[ [ "Qi", "Xianbiao", "" ], [ "Li", "Chun-Guang", "" ], [ "Zhao", "Guoying", "" ], [ "Hong", "Xiaopeng", "" ], [ "Pietikäinen", "Matti", "" ] ]
TITLE: Dynamic texture and scene classification by transferring deep image features ABSTRACT: Dynamic texture and scene classification are two fundamental problems in understanding natural video content. Extracting robust and effective features is a crucial step towards solving these problems. However the existing approaches suffer from the sensitivity to either varying illumination, or viewpoint changing, or even camera motion, and/or the lack of spatial information. Inspired by the success of deep structures in image classification, we attempt to leverage a deep structure to extract feature for dynamic texture and scene classification. To tackle with the challenges in training a deep structure, we propose to transfer some prior knowledge from image domain to video domain. To be specific, we propose to apply a well-trained Convolutional Neural Network (ConvNet) as a mid-level feature extractor to extract features from each frame, and then form a representation of a video by concatenating the first and the second order statistics over the mid-level features. We term this two-level feature extraction scheme as a Transferred ConvNet Feature (TCoF). Moreover we explore two different implementations of the TCoF scheme, i.e., the \textit{spatial} TCoF and the \textit{temporal} TCoF, in which the mean-removed frames and the difference between two adjacent frames are used as the inputs of the ConvNet, respectively. We evaluate systematically the proposed spatial TCoF and the temporal TCoF schemes on three benchmark data sets, including DynTex, YUPENN, and Maryland, and demonstrate that the proposed approach yields superior performance.
1502.00341
Liang Lin
Liang Lin, Xiaolong Wang, Wei Yang, Jian-Huang Lai
Discriminatively Trained And-Or Graph Models for Object Shape Detection
15 pages, 14 figures, TPAMI 2014
Pattern Analysis and Machine Intelligence, IEEE Transactions on , vol.PP, no.99, pp.1,1, 2014
10.1109/TPAMI.2014.2359888
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we investigate a novel reconfigurable part-based model, namely And-Or graph model, to recognize object shapes in images. Our proposed model consists of four layers: leaf-nodes at the bottom are local classifiers for detecting contour fragments; or-nodes above the leaf-nodes function as the switches to activate their child leaf-nodes, making the model reconfigurable during inference; and-nodes in a higher layer capture holistic shape deformations; one root-node on the top, which is also an or-node, activates one of its child and-nodes to deal with large global variations (e.g. different poses and views). We propose a novel structural optimization algorithm to discriminatively train the And-Or model from weakly annotated data. This algorithm iteratively determines the model structures (e.g. the nodes and their layouts) along with the parameter learning. On several challenging datasets, our model demonstrates the effectiveness to perform robust shape-based object detection against background clutter and outperforms the other state-of-the-art approaches. We also release a new shape database with annotations, which includes more than 1500 challenging shape instances, for recognition and detection.
[ { "version": "v1", "created": "Mon, 2 Feb 2015 02:04:01 GMT" } ]
2015-02-03T00:00:00
[ [ "Lin", "Liang", "" ], [ "Wang", "Xiaolong", "" ], [ "Yang", "Wei", "" ], [ "Lai", "Jian-Huang", "" ] ]
TITLE: Discriminatively Trained And-Or Graph Models for Object Shape Detection ABSTRACT: In this paper, we investigate a novel reconfigurable part-based model, namely And-Or graph model, to recognize object shapes in images. Our proposed model consists of four layers: leaf-nodes at the bottom are local classifiers for detecting contour fragments; or-nodes above the leaf-nodes function as the switches to activate their child leaf-nodes, making the model reconfigurable during inference; and-nodes in a higher layer capture holistic shape deformations; one root-node on the top, which is also an or-node, activates one of its child and-nodes to deal with large global variations (e.g. different poses and views). We propose a novel structural optimization algorithm to discriminatively train the And-Or model from weakly annotated data. This algorithm iteratively determines the model structures (e.g. the nodes and their layouts) along with the parameter learning. On several challenging datasets, our model demonstrates the effectiveness to perform robust shape-based object detection against background clutter and outperforms the other state-of-the-art approaches. We also release a new shape database with annotations, which includes more than 1500 challenging shape instances, for recognition and detection.
1502.00363
Wangmeng Zuo
Wangmeng Zuo, Faqiang Wang, David Zhang, Liang Lin, Yuchi Huang, Deyu Meng, Lei Zhang
Iterated Support Vector Machines for Distance Metric Learning
14 pages, 10 figures
null
null
null
cs.LG cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Distance metric learning aims to learn from the given training data a valid distance metric, with which the similarity between data samples can be more effectively evaluated for classification. Metric learning is often formulated as a convex or nonconvex optimization problem, while many existing metric learning algorithms become inefficient for large scale problems. In this paper, we formulate metric learning as a kernel classification problem, and solve it by iterated training of support vector machines (SVM). The new formulation is easy to implement, efficient in training, and tractable for large-scale problems. Two novel metric learning models, namely Positive-semidefinite Constrained Metric Learning (PCML) and Nonnegative-coefficient Constrained Metric Learning (NCML), are developed. Both PCML and NCML can guarantee the global optimality of their solutions. Experimental results on UCI dataset classification, handwritten digit recognition, face verification and person re-identification demonstrate that the proposed metric learning methods achieve higher classification accuracy than state-of-the-art methods and they are significantly more efficient in training.
[ { "version": "v1", "created": "Mon, 2 Feb 2015 05:30:44 GMT" } ]
2015-02-03T00:00:00
[ [ "Zuo", "Wangmeng", "" ], [ "Wang", "Faqiang", "" ], [ "Zhang", "David", "" ], [ "Lin", "Liang", "" ], [ "Huang", "Yuchi", "" ], [ "Meng", "Deyu", "" ], [ "Zhang", "Lei", "" ] ]
TITLE: Iterated Support Vector Machines for Distance Metric Learning ABSTRACT: Distance metric learning aims to learn from the given training data a valid distance metric, with which the similarity between data samples can be more effectively evaluated for classification. Metric learning is often formulated as a convex or nonconvex optimization problem, while many existing metric learning algorithms become inefficient for large scale problems. In this paper, we formulate metric learning as a kernel classification problem, and solve it by iterated training of support vector machines (SVM). The new formulation is easy to implement, efficient in training, and tractable for large-scale problems. Two novel metric learning models, namely Positive-semidefinite Constrained Metric Learning (PCML) and Nonnegative-coefficient Constrained Metric Learning (NCML), are developed. Both PCML and NCML can guarantee the global optimality of their solutions. Experimental results on UCI dataset classification, handwritten digit recognition, face verification and person re-identification demonstrate that the proposed metric learning methods achieve higher classification accuracy than state-of-the-art methods and they are significantly more efficient in training.
1502.00377
Liang Lin
Liang Lin, Yongyi Lu, Yan Pan, Xiaowu Chen
Integrating Graph Partitioning and Matching for Trajectory Analysis in Video Surveillance
10 pages, 12 figures
Image Processing, IEEE Transactions on , vol.21, no.12, pp.4844-4857, 2012
10.1109/TIP.2012.2211373
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In order to track the moving objects in long range against occlusion, interruption, and background clutter, this paper proposes a unified approach for global trajectory analysis. Instead of the traditional frame-by-frame tracking, our method recovers target trajectories based on a short sequence of video frames, e.g. $15$ frames. We initially calculate a foreground map at each frame, as obtained from a state-of-the-art background model. An attribute graph is then extracted from the foreground map, where the graph vertices are image primitives represented by the composite features. With this graph representation, we pose trajectory analysis as a joint task of spatial graph partitioning and temporal graph matching. The task can be formulated by maximizing a posteriori under the Bayesian framework, in which we integrate the spatio-temporal contexts and the appearance models. The probabilistic inference is achieved by a data-driven Markov Chain Monte Carlo (MCMC) algorithm. Given a peroid of observed frames, the algorithm simulates a ergodic and aperiodic Markov Chain, and it visits a sequence of solution states in the joint space of spatial graph partitioning and temporal graph matching. In the experiments, our method is tested on several challenging videos from the public datasets of visual surveillance, and it outperforms the state-of-the-art methods.
[ { "version": "v1", "created": "Mon, 2 Feb 2015 06:52:47 GMT" } ]
2015-02-03T00:00:00
[ [ "Lin", "Liang", "" ], [ "Lu", "Yongyi", "" ], [ "Pan", "Yan", "" ], [ "Chen", "Xiaowu", "" ] ]
TITLE: Integrating Graph Partitioning and Matching for Trajectory Analysis in Video Surveillance ABSTRACT: In order to track the moving objects in long range against occlusion, interruption, and background clutter, this paper proposes a unified approach for global trajectory analysis. Instead of the traditional frame-by-frame tracking, our method recovers target trajectories based on a short sequence of video frames, e.g. $15$ frames. We initially calculate a foreground map at each frame, as obtained from a state-of-the-art background model. An attribute graph is then extracted from the foreground map, where the graph vertices are image primitives represented by the composite features. With this graph representation, we pose trajectory analysis as a joint task of spatial graph partitioning and temporal graph matching. The task can be formulated by maximizing a posteriori under the Bayesian framework, in which we integrate the spatio-temporal contexts and the appearance models. The probabilistic inference is achieved by a data-driven Markov Chain Monte Carlo (MCMC) algorithm. Given a peroid of observed frames, the algorithm simulates a ergodic and aperiodic Markov Chain, and it visits a sequence of solution states in the joint space of spatial graph partitioning and temporal graph matching. In the experiments, our method is tested on several challenging videos from the public datasets of visual surveillance, and it outperforms the state-of-the-art methods.
1502.00416
Liang Lin
Bo Jiang, Yongyi Lu, Xiying Li, Liang Lin
Towards a solid solution of real-time fire and flame detection
14 pages, 6 figures
Multimedia Tools and Applications, pp. 1380-7501, 2014
10.1007/s11042-014-2106-z
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Although the object detection and recognition has received growing attention for decades, a robust fire and flame detection method is rarely explored. This paper presents an empirical study, towards a general and solid approach to fast detect fire and flame in videos, with the applications in video surveillance and event retrieval. Our system consists of three cascaded steps: (1) candidate regions proposing by a background model, (2) fire region classifying with color-texture features and a dictionary of visual words, and (3) temporal verifying. The experimental evaluation and analysis are done for each step. We believe that it is a useful service to both academic research and real-world application. In addition, we release the software of the proposed system with the source code, as well as a public benchmark and data set, including 64 video clips covered both indoor and outdoor scenes under different conditions. We achieve an 82% Recall with 93% Precision on the data set, and greatly improve the performance by state-of-the-arts methods.
[ { "version": "v1", "created": "Mon, 2 Feb 2015 09:34:01 GMT" } ]
2015-02-03T00:00:00
[ [ "Jiang", "Bo", "" ], [ "Lu", "Yongyi", "" ], [ "Li", "Xiying", "" ], [ "Lin", "Liang", "" ] ]
TITLE: Towards a solid solution of real-time fire and flame detection ABSTRACT: Although the object detection and recognition has received growing attention for decades, a robust fire and flame detection method is rarely explored. This paper presents an empirical study, towards a general and solid approach to fast detect fire and flame in videos, with the applications in video surveillance and event retrieval. Our system consists of three cascaded steps: (1) candidate regions proposing by a background model, (2) fire region classifying with color-texture features and a dictionary of visual words, and (3) temporal verifying. The experimental evaluation and analysis are done for each step. We believe that it is a useful service to both academic research and real-world application. In addition, we release the software of the proposed system with the source code, as well as a public benchmark and data set, including 64 video clips covered both indoor and outdoor scenes under different conditions. We achieve an 82% Recall with 93% Precision on the data set, and greatly improve the performance by state-of-the-arts methods.
1502.00512
Will Williams
Will Williams, Niranjani Prasad, David Mrva, Tom Ash, Tony Robinson
Scaling Recurrent Neural Network Language Models
null
null
null
null
cs.CL cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper investigates the scaling properties of Recurrent Neural Network Language Models (RNNLMs). We discuss how to train very large RNNs on GPUs and address the questions of how RNNLMs scale with respect to model size, training-set size, computational costs and memory. Our analysis shows that despite being more costly to train, RNNLMs obtain much lower perplexities on standard benchmarks than n-gram models. We train the largest known RNNs and present relative word error rates gains of 18% on an ASR task. We also present the new lowest perplexities on the recently released billion word language modelling benchmark, 1 BLEU point gain on machine translation and a 17% relative hit rate gain in word prediction.
[ { "version": "v1", "created": "Mon, 2 Feb 2015 15:27:37 GMT" } ]
2015-02-03T00:00:00
[ [ "Williams", "Will", "" ], [ "Prasad", "Niranjani", "" ], [ "Mrva", "David", "" ], [ "Ash", "Tom", "" ], [ "Robinson", "Tony", "" ] ]
TITLE: Scaling Recurrent Neural Network Language Models ABSTRACT: This paper investigates the scaling properties of Recurrent Neural Network Language Models (RNNLMs). We discuss how to train very large RNNs on GPUs and address the questions of how RNNLMs scale with respect to model size, training-set size, computational costs and memory. Our analysis shows that despite being more costly to train, RNNLMs obtain much lower perplexities on standard benchmarks than n-gram models. We train the largest known RNNs and present relative word error rates gains of 18% on an ASR task. We also present the new lowest perplexities on the recently released billion word language modelling benchmark, 1 BLEU point gain on machine translation and a 17% relative hit rate gain in word prediction.
1407.0316
Mahito Sugiyama
Mahito Sugiyama, Felipe Llinares L\'opez, Niklas Kasenburg, Karsten M. Borgwardt
Significant Subgraph Mining with Multiple Testing Correction
18 pages, 5 figure, accepted to the 2015 SIAM International Conference on Data Mining (SDM15)
null
null
null
stat.ME cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The problem of finding itemsets that are statistically significantly enriched in a class of transactions is complicated by the need to correct for multiple hypothesis testing. Pruning untestable hypotheses was recently proposed as a strategy for this task of significant itemset mining. It was shown to lead to greater statistical power, the discovery of more truly significant itemsets, than the standard Bonferroni correction on real-world datasets. An open question, however, is whether this strategy of excluding untestable hypotheses also leads to greater statistical power in subgraph mining, in which the number of hypotheses is much larger than in itemset mining. Here we answer this question by an empirical investigation on eight popular graph benchmark datasets. We propose a new efficient search strategy, which always returns the same solution as the state-of-the-art approach and is approximately two orders of magnitude faster. Moreover, we exploit the dependence between subgraphs by considering the effective number of tests and thereby further increase the statistical power.
[ { "version": "v1", "created": "Tue, 1 Jul 2014 16:53:51 GMT" }, { "version": "v2", "created": "Sun, 6 Jul 2014 13:39:21 GMT" }, { "version": "v3", "created": "Fri, 30 Jan 2015 16:11:17 GMT" } ]
2015-02-02T00:00:00
[ [ "Sugiyama", "Mahito", "" ], [ "López", "Felipe Llinares", "" ], [ "Kasenburg", "Niklas", "" ], [ "Borgwardt", "Karsten M.", "" ] ]
TITLE: Significant Subgraph Mining with Multiple Testing Correction ABSTRACT: The problem of finding itemsets that are statistically significantly enriched in a class of transactions is complicated by the need to correct for multiple hypothesis testing. Pruning untestable hypotheses was recently proposed as a strategy for this task of significant itemset mining. It was shown to lead to greater statistical power, the discovery of more truly significant itemsets, than the standard Bonferroni correction on real-world datasets. An open question, however, is whether this strategy of excluding untestable hypotheses also leads to greater statistical power in subgraph mining, in which the number of hypotheses is much larger than in itemset mining. Here we answer this question by an empirical investigation on eight popular graph benchmark datasets. We propose a new efficient search strategy, which always returns the same solution as the state-of-the-art approach and is approximately two orders of magnitude faster. Moreover, we exploit the dependence between subgraphs by considering the effective number of tests and thereby further increase the statistical power.
1409.0575
Olga Russakovsky
Olga Russakovsky and Jia Deng and Hao Su and Jonathan Krause and Sanjeev Satheesh and Sean Ma and Zhiheng Huang and Andrej Karpathy and Aditya Khosla and Michael Bernstein and Alexander C. Berg and Li Fei-Fei
ImageNet Large Scale Visual Recognition Challenge
43 pages, 16 figures. v3 includes additional comparisons with PASCAL VOC (per-category comparisons in Table 3, distribution of localization difficulty in Fig 16), a list of queries used for obtaining object detection images (Appendix C), and some additional references
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The ImageNet Large Scale Visual Recognition Challenge is a benchmark in object category classification and detection on hundreds of object categories and millions of images. The challenge has been run annually from 2010 to present, attracting participation from more than fifty institutions. This paper describes the creation of this benchmark dataset and the advances in object recognition that have been possible as a result. We discuss the challenges of collecting large-scale ground truth annotation, highlight key breakthroughs in categorical object recognition, provide a detailed analysis of the current state of the field of large-scale image classification and object detection, and compare the state-of-the-art computer vision accuracy with human accuracy. We conclude with lessons learned in the five years of the challenge, and propose future directions and improvements.
[ { "version": "v1", "created": "Mon, 1 Sep 2014 22:29:38 GMT" }, { "version": "v2", "created": "Mon, 1 Dec 2014 01:08:31 GMT" }, { "version": "v3", "created": "Fri, 30 Jan 2015 01:23:59 GMT" } ]
2015-02-02T00:00:00
[ [ "Russakovsky", "Olga", "" ], [ "Deng", "Jia", "" ], [ "Su", "Hao", "" ], [ "Krause", "Jonathan", "" ], [ "Satheesh", "Sanjeev", "" ], [ "Ma", "Sean", "" ], [ "Huang", "Zhiheng", "" ], [ "Karpathy", "Andrej", "" ], [ "Khosla", "Aditya", "" ], [ "Bernstein", "Michael", "" ], [ "Berg", "Alexander C.", "" ], [ "Fei-Fei", "Li", "" ] ]
TITLE: ImageNet Large Scale Visual Recognition Challenge ABSTRACT: The ImageNet Large Scale Visual Recognition Challenge is a benchmark in object category classification and detection on hundreds of object categories and millions of images. The challenge has been run annually from 2010 to present, attracting participation from more than fifty institutions. This paper describes the creation of this benchmark dataset and the advances in object recognition that have been possible as a result. We discuss the challenges of collecting large-scale ground truth annotation, highlight key breakthroughs in categorical object recognition, provide a detailed analysis of the current state of the field of large-scale image classification and object detection, and compare the state-of-the-art computer vision accuracy with human accuracy. We conclude with lessons learned in the five years of the challenge, and propose future directions and improvements.
1411.6243
Xu Sun
Xu Sun
Structure Regularization for Structured Prediction: Theories and Experiments
null
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
While there are many studies on weight regularization, the study on structure regularization is rare. Many existing systems on structured prediction focus on increasing the level of structural dependencies within the model. However, this trend could have been misdirected, because our study suggests that complex structures are actually harmful to generalization ability in structured prediction. To control structure-based overfitting, we propose a structure regularization framework via \emph{structure decomposition}, which decomposes training samples into mini-samples with simpler structures, deriving a model with better generalization power. We show both theoretically and empirically that structure regularization can effectively control overfitting risk and lead to better accuracy. As a by-product, the proposed method can also substantially accelerate the training speed. The method and the theoretical results can apply to general graphical models with arbitrary structures. Experiments on well-known tasks demonstrate that our method can easily beat the benchmark systems on those highly-competitive tasks, achieving state-of-the-art accuracies yet with substantially faster training speed.
[ { "version": "v1", "created": "Sun, 23 Nov 2014 14:11:01 GMT" }, { "version": "v2", "created": "Fri, 30 Jan 2015 07:41:21 GMT" } ]
2015-02-02T00:00:00
[ [ "Sun", "Xu", "" ] ]
TITLE: Structure Regularization for Structured Prediction: Theories and Experiments ABSTRACT: While there are many studies on weight regularization, the study on structure regularization is rare. Many existing systems on structured prediction focus on increasing the level of structural dependencies within the model. However, this trend could have been misdirected, because our study suggests that complex structures are actually harmful to generalization ability in structured prediction. To control structure-based overfitting, we propose a structure regularization framework via \emph{structure decomposition}, which decomposes training samples into mini-samples with simpler structures, deriving a model with better generalization power. We show both theoretically and empirically that structure regularization can effectively control overfitting risk and lead to better accuracy. As a by-product, the proposed method can also substantially accelerate the training speed. The method and the theoretical results can apply to general graphical models with arbitrary structures. Experiments on well-known tasks demonstrate that our method can easily beat the benchmark systems on those highly-competitive tasks, achieving state-of-the-art accuracies yet with substantially faster training speed.
1501.05703
Ning Zhang
Ning Zhang, Manohar Paluri, Yaniv Taigman, Rob Fergus, Lubomir Bourdev
Beyond Frontal Faces: Improving Person Recognition Using Multiple Cues
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We explore the task of recognizing peoples' identities in photo albums in an unconstrained setting. To facilitate this, we introduce the new People In Photo Albums (PIPA) dataset, consisting of over 60000 instances of 2000 individuals collected from public Flickr photo albums. With only about half of the person images containing a frontal face, the recognition task is very challenging due to the large variations in pose, clothing, camera viewpoint, image resolution and illumination. We propose the Pose Invariant PErson Recognition (PIPER) method, which accumulates the cues of poselet-level person recognizers trained by deep convolutional networks to discount for the pose variations, combined with a face recognizer and a global recognizer. Experiments on three different settings confirm that in our unconstrained setup PIPER significantly improves on the performance of DeepFace, which is one of the best face recognizers as measured on the LFW dataset.
[ { "version": "v1", "created": "Fri, 23 Jan 2015 02:35:01 GMT" }, { "version": "v2", "created": "Fri, 30 Jan 2015 18:48:27 GMT" } ]
2015-02-02T00:00:00
[ [ "Zhang", "Ning", "" ], [ "Paluri", "Manohar", "" ], [ "Taigman", "Yaniv", "" ], [ "Fergus", "Rob", "" ], [ "Bourdev", "Lubomir", "" ] ]
TITLE: Beyond Frontal Faces: Improving Person Recognition Using Multiple Cues ABSTRACT: We explore the task of recognizing peoples' identities in photo albums in an unconstrained setting. To facilitate this, we introduce the new People In Photo Albums (PIPA) dataset, consisting of over 60000 instances of 2000 individuals collected from public Flickr photo albums. With only about half of the person images containing a frontal face, the recognition task is very challenging due to the large variations in pose, clothing, camera viewpoint, image resolution and illumination. We propose the Pose Invariant PErson Recognition (PIPER) method, which accumulates the cues of poselet-level person recognizers trained by deep convolutional networks to discount for the pose variations, combined with a face recognizer and a global recognizer. Experiments on three different settings confirm that in our unconstrained setup PIPER significantly improves on the performance of DeepFace, which is one of the best face recognizers as measured on the LFW dataset.
1501.07716
Dominik Kowald
Paul Seitlinger, Dominik Kowald, Simone Kopeinik, Ilire Hasani-Mavriqi, Tobias Ley, Elisabeth Lex
Attention Please! A Hybrid Resource Recommender Mimicking Attention-Interpretation Dynamics
Submitted to WWW'15 WebScience Track
null
null
null
cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Classic resource recommenders like Collaborative Filtering (CF) treat users as being just another entity, neglecting non-linear user-resource dynamics shaping attention and interpretation. In this paper, we propose a novel hybrid recommendation strategy that refines CF by capturing these dynamics. The evaluation results reveal that our approach substantially improves CF and, depending on the dataset, successfully competes with a computationally much more expensive Matrix Factorization variant.
[ { "version": "v1", "created": "Fri, 30 Jan 2015 09:55:24 GMT" } ]
2015-02-02T00:00:00
[ [ "Seitlinger", "Paul", "" ], [ "Kowald", "Dominik", "" ], [ "Kopeinik", "Simone", "" ], [ "Hasani-Mavriqi", "Ilire", "" ], [ "Ley", "Tobias", "" ], [ "Lex", "Elisabeth", "" ] ]
TITLE: Attention Please! A Hybrid Resource Recommender Mimicking Attention-Interpretation Dynamics ABSTRACT: Classic resource recommenders like Collaborative Filtering (CF) treat users as being just another entity, neglecting non-linear user-resource dynamics shaping attention and interpretation. In this paper, we propose a novel hybrid recommendation strategy that refines CF by capturing these dynamics. The evaluation results reveal that our approach substantially improves CF and, depending on the dataset, successfully competes with a computationally much more expensive Matrix Factorization variant.
1408.1987
Hong Xing
Hong Xing, Liang Liu, Rui Zhang
Secrecy Wireless Information and Power Transfer in Fading Wiretap Channel
to appear in IEEE Transactions on Vehicular Technology
null
10.1109/TVT.2015.2395725
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Simultaneous wireless information and power transfer (SWIPT) has recently drawn significant interests for its dual use of radio signals to provide wireless data and energy access at the same time. However, a challenging secrecy communication issue arises as the messages sent to the information receivers (IRs) may be eavesdropped by the energy receivers (ERs), which are presumed to harvest energy only from the received signals. To tackle this problem, we propose in this paper an artificial noise (AN) aided transmission scheme to facilitate the secrecy information transmission to IRs and yet meet the energy harvesting requirement for ERs, under the assumption that the AN can be cancelled at IRs but not at ERs. Specifically, the proposed scheme splits the transmit power into two parts, to send the confidential message to the IR and an AN to interfere with the ER, respectively. Under a simplified three-node wiretap channel setup, the transmit power allocations and power splitting ratios over fading channels are jointly optimized to minimize the outage probability for delay-limited secrecy information transmission, or to maximize the average rate for no-delay-limited secrecy information transmission, subject to a combination of average and peak power constraints at the transmitter as well as an average energy harvesting constraint at the ER. Both the secrecy outage probability minimization and average rate maximization problems are shown to be non-convex, for each of which we propose the optimal solution based on the dual decomposition as well as suboptimal solution based on the alternating optimization. Furthermore, two benchmark schemes are introduced for comparison. Finally, the performances of proposed schemes are evaluated by simulations in terms of various trade-offs for wireless (secrecy) information versus energy transmissions.
[ { "version": "v1", "created": "Fri, 8 Aug 2014 21:27:46 GMT" }, { "version": "v2", "created": "Wed, 28 Jan 2015 23:40:41 GMT" } ]
2015-01-30T00:00:00
[ [ "Xing", "Hong", "" ], [ "Liu", "Liang", "" ], [ "Zhang", "Rui", "" ] ]
TITLE: Secrecy Wireless Information and Power Transfer in Fading Wiretap Channel ABSTRACT: Simultaneous wireless information and power transfer (SWIPT) has recently drawn significant interests for its dual use of radio signals to provide wireless data and energy access at the same time. However, a challenging secrecy communication issue arises as the messages sent to the information receivers (IRs) may be eavesdropped by the energy receivers (ERs), which are presumed to harvest energy only from the received signals. To tackle this problem, we propose in this paper an artificial noise (AN) aided transmission scheme to facilitate the secrecy information transmission to IRs and yet meet the energy harvesting requirement for ERs, under the assumption that the AN can be cancelled at IRs but not at ERs. Specifically, the proposed scheme splits the transmit power into two parts, to send the confidential message to the IR and an AN to interfere with the ER, respectively. Under a simplified three-node wiretap channel setup, the transmit power allocations and power splitting ratios over fading channels are jointly optimized to minimize the outage probability for delay-limited secrecy information transmission, or to maximize the average rate for no-delay-limited secrecy information transmission, subject to a combination of average and peak power constraints at the transmitter as well as an average energy harvesting constraint at the ER. Both the secrecy outage probability minimization and average rate maximization problems are shown to be non-convex, for each of which we propose the optimal solution based on the dual decomposition as well as suboptimal solution based on the alternating optimization. Furthermore, two benchmark schemes are introduced for comparison. Finally, the performances of proposed schemes are evaluated by simulations in terms of various trade-offs for wireless (secrecy) information versus energy transmissions.
1501.07250
Alejandro Torre\~no
Alejandro Torre\~no, Eva Onaindia, \'Oscar Sapena
FMAP: Distributed Cooperative Multi-Agent Planning
21 pages, 11 figures
Applied Intelligence, Volume 41, Issue 2, pp. 606-626, Year 2014
10.1007/s10489-014-0540-2
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper proposes FMAP (Forward Multi-Agent Planning), a fully-distributed multi-agent planning method that integrates planning and coordination. Although FMAP is specifically aimed at solving problems that require cooperation among agents, the flexibility of the domain-independent planning model allows FMAP to tackle multi-agent planning tasks of any type. In FMAP, agents jointly explore the plan space by building up refinement plans through a complete and flexible forward-chaining partial-order planner. The search is guided by $h_{DTG}$, a novel heuristic function that is based on the concepts of Domain Transition Graph and frontier state and is optimized to evaluate plans in distributed environments. Agents in FMAP apply an advanced privacy model that allows them to adequately keep private information while communicating only the data of the refinement plans that is relevant to each of the participating agents. Experimental results show that FMAP is a general-purpose approach that efficiently solves tightly-coupled domains that have specialized agents and cooperative goals as well as loosely-coupled problems. Specifically, the empirical evaluation shows that FMAP outperforms current MAP systems at solving complex planning tasks that are adapted from the International Planning Competition benchmarks.
[ { "version": "v1", "created": "Wed, 28 Jan 2015 19:38:35 GMT" } ]
2015-01-30T00:00:00
[ [ "Torreño", "Alejandro", "" ], [ "Onaindia", "Eva", "" ], [ "Sapena", "Óscar", "" ] ]
TITLE: FMAP: Distributed Cooperative Multi-Agent Planning ABSTRACT: This paper proposes FMAP (Forward Multi-Agent Planning), a fully-distributed multi-agent planning method that integrates planning and coordination. Although FMAP is specifically aimed at solving problems that require cooperation among agents, the flexibility of the domain-independent planning model allows FMAP to tackle multi-agent planning tasks of any type. In FMAP, agents jointly explore the plan space by building up refinement plans through a complete and flexible forward-chaining partial-order planner. The search is guided by $h_{DTG}$, a novel heuristic function that is based on the concepts of Domain Transition Graph and frontier state and is optimized to evaluate plans in distributed environments. Agents in FMAP apply an advanced privacy model that allows them to adequately keep private information while communicating only the data of the refinement plans that is relevant to each of the participating agents. Experimental results show that FMAP is a general-purpose approach that efficiently solves tightly-coupled domains that have specialized agents and cooperative goals as well as loosely-coupled problems. Specifically, the empirical evaluation shows that FMAP outperforms current MAP systems at solving complex planning tasks that are adapted from the International Planning Competition benchmarks.
1501.07304
Miriam Redi
Miriam Redi, Nikhil Rasiwasia, Gaurav Aggarwal, Alejandro Jaimes
The Beauty of Capturing Faces: Rating the Quality of Digital Portraits
FG 2015, 8 pages
null
null
null
cs.CV cs.CY cs.MM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Digital portrait photographs are everywhere, and while the number of face pictures keeps growing, not much work has been done to on automatic portrait beauty assessment. In this paper, we design a specific framework to automatically evaluate the beauty of digital portraits. To this end, we procure a large dataset of face images annotated not only with aesthetic scores but also with information about the traits of the subject portrayed. We design a set of visual features based on portrait photography literature, and extensively analyze their relation with portrait beauty, exposing interesting findings about what makes a portrait beautiful. We find that the beauty of a portrait is linked to its artistic value, and independent from age, race and gender of the subject. We also show that a classifier trained with our features to separate beautiful portraits from non-beautiful portraits outperforms generic aesthetic classifiers.
[ { "version": "v1", "created": "Wed, 28 Jan 2015 22:51:23 GMT" } ]
2015-01-30T00:00:00
[ [ "Redi", "Miriam", "" ], [ "Rasiwasia", "Nikhil", "" ], [ "Aggarwal", "Gaurav", "" ], [ "Jaimes", "Alejandro", "" ] ]
TITLE: The Beauty of Capturing Faces: Rating the Quality of Digital Portraits ABSTRACT: Digital portrait photographs are everywhere, and while the number of face pictures keeps growing, not much work has been done to on automatic portrait beauty assessment. In this paper, we design a specific framework to automatically evaluate the beauty of digital portraits. To this end, we procure a large dataset of face images annotated not only with aesthetic scores but also with information about the traits of the subject portrayed. We design a set of visual features based on portrait photography literature, and extensively analyze their relation with portrait beauty, exposing interesting findings about what makes a portrait beautiful. We find that the beauty of a portrait is linked to its artistic value, and independent from age, race and gender of the subject. We also show that a classifier trained with our features to separate beautiful portraits from non-beautiful portraits outperforms generic aesthetic classifiers.
1501.07323
Peng Wang
Peng Wang, Guoqiang Mao, Zihuai Lin, Ming Ding, Weifa Liang, Xiaohu Ge, and Zhiyun Lin
Performance Analysis of Raptor Codes under Maximum-Likelihood (ML) Decoding
28 pages and 5 figures
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Raptor codes have been widely used in many multimedia broadcast/multicast applications. However, our understanding of Raptor codes is still incomplete due to the insufficient amount of theoretical work on the performance analysis of Raptor codes, particularly under maximum-likelihood (ML) decoding, which provides an optimal benchmark on the system performance for the other decoding schemes to compare against. For the first time, this paper provides an upper bound and a lower bound, on the packet error performance of Raptor codes under ML decoding, which is measured by the probability that all source packets can be successfully decoded by a receiver with a given number of successfully received coded packets. Simulations are conducted to validate the accuracy of the analysis. More specifically, Raptor codes with different degree distribution and pre-coders, are evaluated using the derived bounds with high accuracy.
[ { "version": "v1", "created": "Thu, 29 Jan 2015 01:16:46 GMT" } ]
2015-01-30T00:00:00
[ [ "Wang", "Peng", "" ], [ "Mao", "Guoqiang", "" ], [ "Lin", "Zihuai", "" ], [ "Ding", "Ming", "" ], [ "Liang", "Weifa", "" ], [ "Ge", "Xiaohu", "" ], [ "Lin", "Zhiyun", "" ] ]
TITLE: Performance Analysis of Raptor Codes under Maximum-Likelihood (ML) Decoding ABSTRACT: Raptor codes have been widely used in many multimedia broadcast/multicast applications. However, our understanding of Raptor codes is still incomplete due to the insufficient amount of theoretical work on the performance analysis of Raptor codes, particularly under maximum-likelihood (ML) decoding, which provides an optimal benchmark on the system performance for the other decoding schemes to compare against. For the first time, this paper provides an upper bound and a lower bound, on the packet error performance of Raptor codes under ML decoding, which is measured by the probability that all source packets can be successfully decoded by a receiver with a given number of successfully received coded packets. Simulations are conducted to validate the accuracy of the analysis. More specifically, Raptor codes with different degree distribution and pre-coders, are evaluated using the derived bounds with high accuracy.
1501.07420
Smruti Ranjan Sarangi
Smruti R. Sarangi, Rajshekar Kalayappan, Prathmesh Kallurkar, Seep Goel
Tejas Simulator : Validation against Hardware
3 pages, 2 figures
null
null
null
cs.AR
http://creativecommons.org/licenses/by-nc-sa/3.0/
In this report we show results that validate the Tejas architectural simulator against native hardware. We report mean error rates of 11.45% and 18.77% for the SPEC2006 and Splash2 benchmark suites respectively. These error rates are competitive and in most cases better than the numbers reported by other contemporary simulators.
[ { "version": "v1", "created": "Thu, 29 Jan 2015 11:44:47 GMT" } ]
2015-01-30T00:00:00
[ [ "Sarangi", "Smruti R.", "" ], [ "Kalayappan", "Rajshekar", "" ], [ "Kallurkar", "Prathmesh", "" ], [ "Goel", "Seep", "" ] ]
TITLE: Tejas Simulator : Validation against Hardware ABSTRACT: In this report we show results that validate the Tejas architectural simulator against native hardware. We report mean error rates of 11.45% and 18.77% for the SPEC2006 and Splash2 benchmark suites respectively. These error rates are competitive and in most cases better than the numbers reported by other contemporary simulators.
1501.07467
Hamed Zamani
Hamed Zamani, Azadeh Shakery, Pooya Moradi
Regression and Learning to Rank Aggregation for User Engagement Evaluation
In Proceedings of the 2014 ACM Recommender Systems Challenge, RecSysChallenge '14
null
10.1145/2668067.2668077
null
cs.IR cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
User engagement refers to the amount of interaction an instance (e.g., tweet, news, and forum post) achieves. Ranking the items in social media websites based on the amount of user participation in them, can be used in different applications, such as recommender systems. In this paper, we consider a tweet containing a rating for a movie as an instance and focus on ranking the instances of each user based on their engagement, i.e., the total number of retweets and favorites it will gain. For this task, we define several features which can be extracted from the meta-data of each tweet. The features are partitioned into three categories: user-based, movie-based, and tweet-based. We show that in order to obtain good results, features from all categories should be considered. We exploit regression and learning to rank methods to rank the tweets and propose to aggregate the results of regression and learning to rank methods to achieve better performance. We have run our experiments on an extended version of MovieTweeting dataset provided by ACM RecSys Challenge 2014. The results show that learning to rank approach outperforms most of the regression models and the combination can improve the performance significantly.
[ { "version": "v1", "created": "Thu, 29 Jan 2015 14:54:12 GMT" } ]
2015-01-30T00:00:00
[ [ "Zamani", "Hamed", "" ], [ "Shakery", "Azadeh", "" ], [ "Moradi", "Pooya", "" ] ]
TITLE: Regression and Learning to Rank Aggregation for User Engagement Evaluation ABSTRACT: User engagement refers to the amount of interaction an instance (e.g., tweet, news, and forum post) achieves. Ranking the items in social media websites based on the amount of user participation in them, can be used in different applications, such as recommender systems. In this paper, we consider a tweet containing a rating for a movie as an instance and focus on ranking the instances of each user based on their engagement, i.e., the total number of retweets and favorites it will gain. For this task, we define several features which can be extracted from the meta-data of each tweet. The features are partitioned into three categories: user-based, movie-based, and tweet-based. We show that in order to obtain good results, features from all categories should be considered. We exploit regression and learning to rank methods to rank the tweets and propose to aggregate the results of regression and learning to rank methods to achieve better performance. We have run our experiments on an extended version of MovieTweeting dataset provided by ACM RecSys Challenge 2014. The results show that learning to rank approach outperforms most of the regression models and the combination can improve the performance significantly.
1501.05382
Wenjuan Gong
Wenjuan Gong and Yongzhen Huang and Jordi Gonzalez and and Liang Wang
Enhanced Mixtures of Part Model for Human Pose Estimation
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Mixture of parts model has been successfully applied to 2D human pose estimation problem either as explicitly trained body part model or as latent variables for the whole human body model. Mixture of parts model usually utilize tree structure for representing relations between body parts. Tree structures facilitate training and referencing of the model but could not deal with double counting problems, which hinder its applications in 3D pose estimation. While most of work targeted to solve these problems tend to modify the tree models or the optimization target. We incorporate other cues from input features. For example, in surveillance environments, human silhouettes can be extracted relative easily although not flawlessly. In this condition, we can combine extracted human blobs with histogram of gradient feature, which is commonly used in mixture of parts model for training body part templates. The method can be easily extend to other candidate features under our generalized framework. We show 2D body part detection results on a public available dataset: HumanEva dataset. Furthermore, a 2D to 3D pose estimator is trained with Gaussian process regression model and 2D body part detections from the proposed method is fed to the estimator, thus 3D poses are predictable given new 2D body part detections. We also show results of 3D pose estimation on HumanEva dataset.
[ { "version": "v1", "created": "Thu, 22 Jan 2015 03:54:15 GMT" }, { "version": "v2", "created": "Wed, 28 Jan 2015 08:16:55 GMT" } ]
2015-01-29T00:00:00
[ [ "Gong", "Wenjuan", "" ], [ "Huang", "Yongzhen", "" ], [ "Gonzalez", "Jordi", "" ], [ "Wang", "and Liang", "" ] ]
TITLE: Enhanced Mixtures of Part Model for Human Pose Estimation ABSTRACT: Mixture of parts model has been successfully applied to 2D human pose estimation problem either as explicitly trained body part model or as latent variables for the whole human body model. Mixture of parts model usually utilize tree structure for representing relations between body parts. Tree structures facilitate training and referencing of the model but could not deal with double counting problems, which hinder its applications in 3D pose estimation. While most of work targeted to solve these problems tend to modify the tree models or the optimization target. We incorporate other cues from input features. For example, in surveillance environments, human silhouettes can be extracted relative easily although not flawlessly. In this condition, we can combine extracted human blobs with histogram of gradient feature, which is commonly used in mixture of parts model for training body part templates. The method can be easily extend to other candidate features under our generalized framework. We show 2D body part detection results on a public available dataset: HumanEva dataset. Furthermore, a 2D to 3D pose estimator is trained with Gaussian process regression model and 2D body part detections from the proposed method is fed to the estimator, thus 3D poses are predictable given new 2D body part detections. We also show results of 3D pose estimation on HumanEva dataset.
1501.06993
Youjie Zhou
Youjie Zhou and Hongkai Yu and Song Wang
Feature Sampling Strategies for Action Recognition
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Although dense local spatial-temporal features with bag-of-features representation achieve state-of-the-art performance for action recognition, the huge feature number and feature size prevent current methods from scaling up to real size problems. In this work, we investigate different types of feature sampling strategies for action recognition, namely dense sampling, uniformly random sampling and selective sampling. We propose two effective selective sampling methods using object proposal techniques. Experiments conducted on a large video dataset show that we are able to achieve better average recognition accuracy using 25% less features, through one of proposed selective sampling methods, and even remain comparable accuracy while discarding 70% features.
[ { "version": "v1", "created": "Wed, 28 Jan 2015 05:41:07 GMT" } ]
2015-01-29T00:00:00
[ [ "Zhou", "Youjie", "" ], [ "Yu", "Hongkai", "" ], [ "Wang", "Song", "" ] ]
TITLE: Feature Sampling Strategies for Action Recognition ABSTRACT: Although dense local spatial-temporal features with bag-of-features representation achieve state-of-the-art performance for action recognition, the huge feature number and feature size prevent current methods from scaling up to real size problems. In this work, we investigate different types of feature sampling strategies for action recognition, namely dense sampling, uniformly random sampling and selective sampling. We propose two effective selective sampling methods using object proposal techniques. Experiments conducted on a large video dataset show that we are able to achieve better average recognition accuracy using 25% less features, through one of proposed selective sampling methods, and even remain comparable accuracy while discarding 70% features.
1501.07020
Alireza Khoshkbarforoushha
Alireza Khoshkbarforoushha, Rajiv Ranjan, Raj Gaire, Prem P. Jayaraman, John Hosking, Ehsan Abbasnejad
Resource Usage Estimation of Data Stream Processing Workloads in Datacenter Clouds
Working Paper
null
null
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Real-time computation of data streams over affordable virtualized infrastructure resources is an important form of data in motion processing architecture. However, processing such data streams while ensuring strict guarantees on quality of services is problematic due to: (i) uncertain stream arrival pattern; (ii) need of processing different types of continuous queries; and (iii) variable resource consumption behavior of continuous queries. Recent work has explored the use of statistical techniques for resource estimation of SQL queries and OLTP workloads. All these techniques approximate resource usage for each query as a single point value. However, in data stream processing workloads in which data flows through the graph of operators endlessly and poses performance and resource demand fluctuations, the single point resource estimation is inadequate. Because it is neither expressive enough nor does it capture the multi-modal nature of the target data. To this end, we present a novel technique which uses mixture density networks, a combined structure of neural networks and mixture models, to estimate the whole spectrum of resource usage as probability density functions. The proposed approach is a flexible and convenient means of modeling unknown distribution models. We have validated the models using both the linear road benchmark and the TPC-H, observing high accuracy under a number of error metrics: mean-square error, continuous ranked probability score, and negative log predictive density.
[ { "version": "v1", "created": "Wed, 28 Jan 2015 08:11:10 GMT" } ]
2015-01-29T00:00:00
[ [ "Khoshkbarforoushha", "Alireza", "" ], [ "Ranjan", "Rajiv", "" ], [ "Gaire", "Raj", "" ], [ "Jayaraman", "Prem P.", "" ], [ "Hosking", "John", "" ], [ "Abbasnejad", "Ehsan", "" ] ]
TITLE: Resource Usage Estimation of Data Stream Processing Workloads in Datacenter Clouds ABSTRACT: Real-time computation of data streams over affordable virtualized infrastructure resources is an important form of data in motion processing architecture. However, processing such data streams while ensuring strict guarantees on quality of services is problematic due to: (i) uncertain stream arrival pattern; (ii) need of processing different types of continuous queries; and (iii) variable resource consumption behavior of continuous queries. Recent work has explored the use of statistical techniques for resource estimation of SQL queries and OLTP workloads. All these techniques approximate resource usage for each query as a single point value. However, in data stream processing workloads in which data flows through the graph of operators endlessly and poses performance and resource demand fluctuations, the single point resource estimation is inadequate. Because it is neither expressive enough nor does it capture the multi-modal nature of the target data. To this end, we present a novel technique which uses mixture density networks, a combined structure of neural networks and mixture models, to estimate the whole spectrum of resource usage as probability density functions. The proposed approach is a flexible and convenient means of modeling unknown distribution models. We have validated the models using both the linear road benchmark and the TPC-H, observing high accuracy under a number of error metrics: mean-square error, continuous ranked probability score, and negative log predictive density.
1501.07184
Zehra Meral Ozsoyoglu
Shi Qiao, Z. Meral Ozsoyoglu
One Size Does not Fit All: When to Use Signature-based Pruning to Improve Template Matching for RDF graphs
null
null
null
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Signature-based pruning is broadly accepted as an effective way to improve query performance of graph template matching on general labeled graphs. Most existing techniques which utilize signature-based pruning claim its benefits on all datasets and queries. However, the effectiveness of signature-based pruning varies greatly among different RDF datasets and highly related with their dataset characteristics. We observe that the performance benefits from signature-based pruning depend not only on the size of the RDF graphs, but also the underlying graph structure and the complexity of queries. This motivates us to propose a flexible RDF querying framework, called RDF-h, which selectively utilizes signature-based pruning by evaluating the characteristics of RDF datasets and query templates. Scalability and efficiency of RDF-h is demonstrated in experimental results using both real and synthetic datasets. Keywords: RDF, Graph Template Matching, Signature-based Pruning
[ { "version": "v1", "created": "Wed, 28 Jan 2015 16:49:18 GMT" } ]
2015-01-29T00:00:00
[ [ "Qiao", "Shi", "" ], [ "Ozsoyoglu", "Z. Meral", "" ] ]
TITLE: One Size Does not Fit All: When to Use Signature-based Pruning to Improve Template Matching for RDF graphs ABSTRACT: Signature-based pruning is broadly accepted as an effective way to improve query performance of graph template matching on general labeled graphs. Most existing techniques which utilize signature-based pruning claim its benefits on all datasets and queries. However, the effectiveness of signature-based pruning varies greatly among different RDF datasets and highly related with their dataset characteristics. We observe that the performance benefits from signature-based pruning depend not only on the size of the RDF graphs, but also the underlying graph structure and the complexity of queries. This motivates us to propose a flexible RDF querying framework, called RDF-h, which selectively utilizes signature-based pruning by evaluating the characteristics of RDF datasets and query templates. Scalability and efficiency of RDF-h is demonstrated in experimental results using both real and synthetic datasets. Keywords: RDF, Graph Template Matching, Signature-based Pruning
1501.07203
Walter Quattrociocchi
Michela Del Vicario, Qian Zhang, Alessandro Bessi, Fabiana Zollo, Antonio Scala, Guido Caldarelli, Walter Quattrociocchi
Structural Patterns of the Occupy Movement on Facebook
null
null
null
null
cs.SI cs.HC physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this work we study a peculiar example of social organization on Facebook: the Occupy Movement -- i.e., an international protest movement against social and economic inequality organized online at a city level. We consider 179 US Facebook public pages during the time period between September 2011 and February 2013. The dataset includes 618K active users and 753K posts that received about 5.2M likes and 1.1M comments. By labeling user according to their interaction patterns on pages -- e.g., a user is considered to be polarized if she has at least the 95% of her likes on a specific page -- we find that activities are not locally coordinated by geographically close pages, but are driven by pages linked to major US cities that act as hubs within the various groups. Such a pattern is verified even by extracting the backbone structure -- i.e., filtering statistically relevant weight heterogeneities -- for both the pages-reshares and the pages-common users networks.
[ { "version": "v1", "created": "Wed, 28 Jan 2015 17:23:59 GMT" } ]
2015-01-29T00:00:00
[ [ "Del Vicario", "Michela", "" ], [ "Zhang", "Qian", "" ], [ "Bessi", "Alessandro", "" ], [ "Zollo", "Fabiana", "" ], [ "Scala", "Antonio", "" ], [ "Caldarelli", "Guido", "" ], [ "Quattrociocchi", "Walter", "" ] ]
TITLE: Structural Patterns of the Occupy Movement on Facebook ABSTRACT: In this work we study a peculiar example of social organization on Facebook: the Occupy Movement -- i.e., an international protest movement against social and economic inequality organized online at a city level. We consider 179 US Facebook public pages during the time period between September 2011 and February 2013. The dataset includes 618K active users and 753K posts that received about 5.2M likes and 1.1M comments. By labeling user according to their interaction patterns on pages -- e.g., a user is considered to be polarized if she has at least the 95% of her likes on a specific page -- we find that activities are not locally coordinated by geographically close pages, but are driven by pages linked to major US cities that act as hubs within the various groups. Such a pattern is verified even by extracting the backbone structure -- i.e., filtering statistically relevant weight heterogeneities -- for both the pages-reshares and the pages-common users networks.
1409.2080
Pierre Bellec
P. Bellec and Y. Benhajali and F. Carbonell and C. Dansereau and G. Albouy and M. Pelland and C. Craddock and O. Collignon and J. Doyon and E. Stip and P. Orban
Multiscale statistical testing for connectome-wide association studies in fMRI
54 pages, 12 main figures, 1 main table, 10 supplementary figures, 1 supplementary table
null
null
null
q-bio.QM cs.CV stat.AP
http://creativecommons.org/licenses/by/3.0/
Alterations in brain connectivity have been associated with a variety of clinical disorders using functional magnetic resonance imaging (fMRI). We investigated empirically how the number of brain parcels (or scale) impacted the results of a mass univariate general linear model (GLM) on connectomes. The brain parcels used as nodes in the connectome analysis were functionnally defined by a group cluster analysis. We first validated that a classic Benjamini-Hochberg procedure with parametric GLM tests did control appropriately the false-discovery rate (FDR) at a given scale. We then observed on realistic simulations that there was no substantial inflation of the FDR across scales, as long as the FDR was controlled independently within each scale, and the presence of true associations could be established using an omnibus permutation test combining all scales. Second, we observed both on simulations and on three real resting-state fMRI datasets (schizophrenia, congenital blindness, motor practice) that the rate of discovery varied markedly as a function of scales, and was relatively higher for low scales, below 25. Despite the differences in discovery rate, the statistical maps derived at different scales were generally very consistent in the three real datasets. Some seeds still showed effects better observed around 50, illustrating the potential benefits of multiscale analysis. On real data, the statistical maps agreed well with the existing literature. Overall, our results support that the multiscale GLM connectome analysis with FDR is statistically valid and can capture biologically meaningful effects in a variety of experimental conditions.
[ { "version": "v1", "created": "Sun, 7 Sep 2014 04:07:22 GMT" }, { "version": "v2", "created": "Mon, 26 Jan 2015 21:00:45 GMT" } ]
2015-01-28T00:00:00
[ [ "Bellec", "P.", "" ], [ "Benhajali", "Y.", "" ], [ "Carbonell", "F.", "" ], [ "Dansereau", "C.", "" ], [ "Albouy", "G.", "" ], [ "Pelland", "M.", "" ], [ "Craddock", "C.", "" ], [ "Collignon", "O.", "" ], [ "Doyon", "J.", "" ], [ "Stip", "E.", "" ], [ "Orban", "P.", "" ] ]
TITLE: Multiscale statistical testing for connectome-wide association studies in fMRI ABSTRACT: Alterations in brain connectivity have been associated with a variety of clinical disorders using functional magnetic resonance imaging (fMRI). We investigated empirically how the number of brain parcels (or scale) impacted the results of a mass univariate general linear model (GLM) on connectomes. The brain parcels used as nodes in the connectome analysis were functionnally defined by a group cluster analysis. We first validated that a classic Benjamini-Hochberg procedure with parametric GLM tests did control appropriately the false-discovery rate (FDR) at a given scale. We then observed on realistic simulations that there was no substantial inflation of the FDR across scales, as long as the FDR was controlled independently within each scale, and the presence of true associations could be established using an omnibus permutation test combining all scales. Second, we observed both on simulations and on three real resting-state fMRI datasets (schizophrenia, congenital blindness, motor practice) that the rate of discovery varied markedly as a function of scales, and was relatively higher for low scales, below 25. Despite the differences in discovery rate, the statistical maps derived at different scales were generally very consistent in the three real datasets. Some seeds still showed effects better observed around 50, illustrating the potential benefits of multiscale analysis. On real data, the statistical maps agreed well with the existing literature. Overall, our results support that the multiscale GLM connectome analysis with FDR is statistically valid and can capture biologically meaningful effects in a variety of experimental conditions.
1412.3409
Christopher Clark
Christopher Clark and Amos Storkey
Teaching Deep Convolutional Neural Networks to Play Go
9 pages, 8 figures, 5 tables. Corrected typos, minor adjustment to table format
null
null
null
cs.AI cs.LG cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Mastering the game of Go has remained a long standing challenge to the field of AI. Modern computer Go systems rely on processing millions of possible future positions to play well, but intuitively a stronger and more 'humanlike' way to play the game would be to rely on pattern recognition abilities rather then brute force computation. Following this sentiment, we train deep convolutional neural networks to play Go by training them to predict the moves made by expert Go players. To solve this problem we introduce a number of novel techniques, including a method of tying weights in the network to 'hard code' symmetries that are expect to exist in the target function, and demonstrate in an ablation study they considerably improve performance. Our final networks are able to achieve move prediction accuracies of 41.1% and 44.4% on two different Go datasets, surpassing previous state of the art on this task by significant margins. Additionally, while previous move prediction programs have not yielded strong Go playing programs, we show that the networks trained in this work acquired high levels of skill. Our convolutional neural networks can consistently defeat the well known Go program GNU Go, indicating it is state of the art among programs that do not use Monte Carlo Tree Search. It is also able to win some games against state of the art Go playing program Fuego while using a fraction of the play time. This success at playing Go indicates high level principles of the game were learned.
[ { "version": "v1", "created": "Wed, 10 Dec 2014 18:59:43 GMT" }, { "version": "v2", "created": "Tue, 27 Jan 2015 10:31:31 GMT" } ]
2015-01-28T00:00:00
[ [ "Clark", "Christopher", "" ], [ "Storkey", "Amos", "" ] ]
TITLE: Teaching Deep Convolutional Neural Networks to Play Go ABSTRACT: Mastering the game of Go has remained a long standing challenge to the field of AI. Modern computer Go systems rely on processing millions of possible future positions to play well, but intuitively a stronger and more 'humanlike' way to play the game would be to rely on pattern recognition abilities rather then brute force computation. Following this sentiment, we train deep convolutional neural networks to play Go by training them to predict the moves made by expert Go players. To solve this problem we introduce a number of novel techniques, including a method of tying weights in the network to 'hard code' symmetries that are expect to exist in the target function, and demonstrate in an ablation study they considerably improve performance. Our final networks are able to achieve move prediction accuracies of 41.1% and 44.4% on two different Go datasets, surpassing previous state of the art on this task by significant margins. Additionally, while previous move prediction programs have not yielded strong Go playing programs, we show that the networks trained in this work acquired high levels of skill. Our convolutional neural networks can consistently defeat the well known Go program GNU Go, indicating it is state of the art among programs that do not use Monte Carlo Tree Search. It is also able to win some games against state of the art Go playing program Fuego while using a fraction of the play time. This success at playing Go indicates high level principles of the game were learned.
1501.06247
Peng Xia
Peng Xia, Benyuan Liu, Yizhou Sun and Cindy Chen
Reciprocal Recommendation System for Online Dating
null
null
null
null
cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Online dating sites have become popular platforms for people to look for potential romantic partners. Different from traditional user-item recommendations where the goal is to match items (e.g., books, videos, etc) with a user's interests, a recommendation system for online dating aims to match people who are mutually interested in and likely to communicate with each other. We introduce similarity measures that capture the unique features and characteristics of the online dating network, for example, the interest similarity between two users if they send messages to same users, and attractiveness similarity if they receive messages from same users. A reciprocal score that measures the compatibility between a user and each potential dating candidate is computed and the recommendation list is generated to include users with top scores. The performance of our proposed recommendation system is evaluated on a real-world dataset from a major online dating site in China. The results show that our recommendation algorithms significantly outperform previously proposed approaches, and the collaborative filtering-based algorithms achieve much better performance than content-based algorithms in both precision and recall. Our results also reveal interesting behavioral difference between male and female users when it comes to looking for potential dates. In particular, males tend to be focused on their own interest and oblivious towards their attractiveness to potential dates, while females are more conscientious to their own attractiveness to the other side of the line.
[ { "version": "v1", "created": "Mon, 26 Jan 2015 03:22:10 GMT" }, { "version": "v2", "created": "Tue, 27 Jan 2015 13:10:25 GMT" } ]
2015-01-28T00:00:00
[ [ "Xia", "Peng", "" ], [ "Liu", "Benyuan", "" ], [ "Sun", "Yizhou", "" ], [ "Chen", "Cindy", "" ] ]
TITLE: Reciprocal Recommendation System for Online Dating ABSTRACT: Online dating sites have become popular platforms for people to look for potential romantic partners. Different from traditional user-item recommendations where the goal is to match items (e.g., books, videos, etc) with a user's interests, a recommendation system for online dating aims to match people who are mutually interested in and likely to communicate with each other. We introduce similarity measures that capture the unique features and characteristics of the online dating network, for example, the interest similarity between two users if they send messages to same users, and attractiveness similarity if they receive messages from same users. A reciprocal score that measures the compatibility between a user and each potential dating candidate is computed and the recommendation list is generated to include users with top scores. The performance of our proposed recommendation system is evaluated on a real-world dataset from a major online dating site in China. The results show that our recommendation algorithms significantly outperform previously proposed approaches, and the collaborative filtering-based algorithms achieve much better performance than content-based algorithms in both precision and recall. Our results also reveal interesting behavioral difference between male and female users when it comes to looking for potential dates. In particular, males tend to be focused on their own interest and oblivious towards their attractiveness to potential dates, while females are more conscientious to their own attractiveness to the other side of the line.
1501.06722
Alin Popa
Alin-Ionut Popa and Cristian Sminchisescu
Parametric Image Segmentation of Humans with Structural Shape Priors
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The figure-ground segmentation of humans in images captured in natural environments is an outstanding open problem due to the presence of complex backgrounds, articulation, varying body proportions, partial views and viewpoint changes. In this work we propose class-specific segmentation models that leverage parametric max-flow image segmentation and a large dataset of human shapes. Our contributions are as follows: (1) formulation of a sub-modular energy model that combines class-specific structural constraints and data-driven shape priors, within a parametric max-flow optimization methodology that systematically computes all breakpoints of the model in polynomial time; (2) design of a data-driven class-specific fusion methodology, based on matching against a large training set of exemplar human shapes (100,000 in our experiments), that allows the shape prior to be constructed on-the-fly, for arbitrary viewpoints and partial views. (3) demonstration of state of the art results, in two challenging datasets, H3D and MPII (where figure-ground segmentation annotations have been added by us), where we substantially improve on the first ranked hypothesis estimates of mid-level segmentation methods, by 20%, with hypothesis set sizes that are up to one order of magnitude smaller.
[ { "version": "v1", "created": "Tue, 27 Jan 2015 10:03:45 GMT" } ]
2015-01-28T00:00:00
[ [ "Popa", "Alin-Ionut", "" ], [ "Sminchisescu", "Cristian", "" ] ]
TITLE: Parametric Image Segmentation of Humans with Structural Shape Priors ABSTRACT: The figure-ground segmentation of humans in images captured in natural environments is an outstanding open problem due to the presence of complex backgrounds, articulation, varying body proportions, partial views and viewpoint changes. In this work we propose class-specific segmentation models that leverage parametric max-flow image segmentation and a large dataset of human shapes. Our contributions are as follows: (1) formulation of a sub-modular energy model that combines class-specific structural constraints and data-driven shape priors, within a parametric max-flow optimization methodology that systematically computes all breakpoints of the model in polynomial time; (2) design of a data-driven class-specific fusion methodology, based on matching against a large training set of exemplar human shapes (100,000 in our experiments), that allows the shape prior to be constructed on-the-fly, for arbitrary viewpoints and partial views. (3) demonstration of state of the art results, in two challenging datasets, H3D and MPII (where figure-ground segmentation annotations have been added by us), where we substantially improve on the first ranked hypothesis estimates of mid-level segmentation methods, by 20%, with hypothesis set sizes that are up to one order of magnitude smaller.
1411.7399
Lior Wolf
Benjamin Klein, Guy Lev, Gil Sadeh, Lior Wolf
Fisher Vectors Derived from Hybrid Gaussian-Laplacian Mixture Models for Image Annotation
new version includes text synthesis by an RNN and experiments with the COCO benchmark
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In the traditional object recognition pipeline, descriptors are densely sampled over an image, pooled into a high dimensional non-linear representation and then passed to a classifier. In recent years, Fisher Vectors have proven empirically to be the leading representation for a large variety of applications. The Fisher Vector is typically taken as the gradients of the log-likelihood of descriptors, with respect to the parameters of a Gaussian Mixture Model (GMM). Motivated by the assumption that different distributions should be applied for different datasets, we present two other Mixture Models and derive their Expectation-Maximization and Fisher Vector expressions. The first is a Laplacian Mixture Model (LMM), which is based on the Laplacian distribution. The second Mixture Model presented is a Hybrid Gaussian-Laplacian Mixture Model (HGLMM) which is based on a weighted geometric mean of the Gaussian and Laplacian distribution. An interesting property of the Expectation-Maximization algorithm for the latter is that in the maximization step, each dimension in each component is chosen to be either a Gaussian or a Laplacian. Finally, by using the new Fisher Vectors derived from HGLMMs, we achieve state-of-the-art results for both the image annotation and the image search by a sentence tasks.
[ { "version": "v1", "created": "Wed, 26 Nov 2014 21:21:51 GMT" }, { "version": "v2", "created": "Sat, 24 Jan 2015 20:03:50 GMT" } ]
2015-01-27T00:00:00
[ [ "Klein", "Benjamin", "" ], [ "Lev", "Guy", "" ], [ "Sadeh", "Gil", "" ], [ "Wolf", "Lior", "" ] ]
TITLE: Fisher Vectors Derived from Hybrid Gaussian-Laplacian Mixture Models for Image Annotation ABSTRACT: In the traditional object recognition pipeline, descriptors are densely sampled over an image, pooled into a high dimensional non-linear representation and then passed to a classifier. In recent years, Fisher Vectors have proven empirically to be the leading representation for a large variety of applications. The Fisher Vector is typically taken as the gradients of the log-likelihood of descriptors, with respect to the parameters of a Gaussian Mixture Model (GMM). Motivated by the assumption that different distributions should be applied for different datasets, we present two other Mixture Models and derive their Expectation-Maximization and Fisher Vector expressions. The first is a Laplacian Mixture Model (LMM), which is based on the Laplacian distribution. The second Mixture Model presented is a Hybrid Gaussian-Laplacian Mixture Model (HGLMM) which is based on a weighted geometric mean of the Gaussian and Laplacian distribution. An interesting property of the Expectation-Maximization algorithm for the latter is that in the maximization step, each dimension in each component is chosen to be either a Gaussian or a Laplacian. Finally, by using the new Fisher Vectors derived from HGLMMs, we achieve state-of-the-art results for both the image annotation and the image search by a sentence tasks.
1412.3705
Weicong Ding
Weicong Ding, Prakash Ishwar, Venkatesh Saligrama
A Topic Modeling Approach to Ranking
null
null
null
null
cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a topic modeling approach to the prediction of preferences in pairwise comparisons. We develop a new generative model for pairwise comparisons that accounts for multiple shared latent rankings that are prevalent in a population of users. This new model also captures inconsistent user behavior in a natural way. We show how the estimation of latent rankings in the new generative model can be formally reduced to the estimation of topics in a statistically equivalent topic modeling problem. We leverage recent advances in the topic modeling literature to develop an algorithm that can learn shared latent rankings with provable consistency as well as sample and computational complexity guarantees. We demonstrate that the new approach is empirically competitive with the current state-of-the-art approaches in predicting preferences on some semi-synthetic and real world datasets.
[ { "version": "v1", "created": "Thu, 11 Dec 2014 16:15:53 GMT" }, { "version": "v2", "created": "Fri, 12 Dec 2014 22:01:20 GMT" }, { "version": "v3", "created": "Sun, 25 Jan 2015 22:32:10 GMT" } ]
2015-01-27T00:00:00
[ [ "Ding", "Weicong", "" ], [ "Ishwar", "Prakash", "" ], [ "Saligrama", "Venkatesh", "" ] ]
TITLE: A Topic Modeling Approach to Ranking ABSTRACT: We propose a topic modeling approach to the prediction of preferences in pairwise comparisons. We develop a new generative model for pairwise comparisons that accounts for multiple shared latent rankings that are prevalent in a population of users. This new model also captures inconsistent user behavior in a natural way. We show how the estimation of latent rankings in the new generative model can be formally reduced to the estimation of topics in a statistically equivalent topic modeling problem. We leverage recent advances in the topic modeling literature to develop an algorithm that can learn shared latent rankings with provable consistency as well as sample and computational complexity guarantees. We demonstrate that the new approach is empirically competitive with the current state-of-the-art approaches in predicting preferences on some semi-synthetic and real world datasets.
1501.06102
Terrence Adams
Terrence Adams
Development of a Big Data Framework for Connectomic Research
6 pages, 9 figures
null
null
null
cs.DC cs.CE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper outlines research and development of a new Hadoop-based architecture for distributed processing and analysis of electron microscopy of brains. We show development of a new C++ library for implementation of 3D image analysis techniques, and deployment in a distributed map/reduce framework. We demonstrate our new framework on a subset of the Kasthuri11 dataset from the Open Connectome Project.
[ { "version": "v1", "created": "Sun, 25 Jan 2015 01:42:09 GMT" } ]
2015-01-27T00:00:00
[ [ "Adams", "Terrence", "" ] ]
TITLE: Development of a Big Data Framework for Connectomic Research ABSTRACT: This paper outlines research and development of a new Hadoop-based architecture for distributed processing and analysis of electron microscopy of brains. We show development of a new C++ library for implementation of 3D image analysis techniques, and deployment in a distributed map/reduce framework. We demonstrate our new framework on a subset of the Kasthuri11 dataset from the Open Connectome Project.
1501.06129
Swagat Kumar
Sourav Garg, Swagat Kumar, Rajesh Ratnakaram, Prithwijit Guha
An Occlusion Reasoning Scheme for Monocular Pedestrian Tracking in Dynamic Scenes
8 pages
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper looks into the problem of pedestrian tracking using a monocular, potentially moving, uncalibrated camera. The pedestrians are located in each frame using a standard human detector, which are then tracked in subsequent frames. This is a challenging problem as one has to deal with complex situations like changing background, partial or full occlusion and camera motion. In order to carry out successful tracking, it is necessary to resolve associations between the detected windows in the current frame with those obtained from the previous frame. Compared to methods that use temporal windows incorporating past as well as future information, we attempt to make decision on a frame-by-frame basis. An occlusion reasoning scheme is proposed to resolve the association problem between a pair of consecutive frames by using an affinity matrix that defines the closeness between a pair of windows and then, uses a binary integer programming to obtain unique association between them. A second stage of verification based on SURF matching is used to deal with those cases where the above optimization scheme might yield wrong associations. The efficacy of the approach is demonstrated through experiments on several standard pedestrian datasets.
[ { "version": "v1", "created": "Sun, 25 Jan 2015 08:38:48 GMT" } ]
2015-01-27T00:00:00
[ [ "Garg", "Sourav", "" ], [ "Kumar", "Swagat", "" ], [ "Ratnakaram", "Rajesh", "" ], [ "Guha", "Prithwijit", "" ] ]
TITLE: An Occlusion Reasoning Scheme for Monocular Pedestrian Tracking in Dynamic Scenes ABSTRACT: This paper looks into the problem of pedestrian tracking using a monocular, potentially moving, uncalibrated camera. The pedestrians are located in each frame using a standard human detector, which are then tracked in subsequent frames. This is a challenging problem as one has to deal with complex situations like changing background, partial or full occlusion and camera motion. In order to carry out successful tracking, it is necessary to resolve associations between the detected windows in the current frame with those obtained from the previous frame. Compared to methods that use temporal windows incorporating past as well as future information, we attempt to make decision on a frame-by-frame basis. An occlusion reasoning scheme is proposed to resolve the association problem between a pair of consecutive frames by using an affinity matrix that defines the closeness between a pair of windows and then, uses a binary integer programming to obtain unique association between them. A second stage of verification based on SURF matching is used to deal with those cases where the above optimization scheme might yield wrong associations. The efficacy of the approach is demonstrated through experiments on several standard pedestrian datasets.
1501.06194
Ilan Shomorony
Ilan Shomorony, Thomas Courtade, and David Tse
Do Read Errors Matter for Genome Assembly?
Submitted to ISIT 2015
null
null
null
cs.IT math.IT q-bio.GN
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
While most current high-throughput DNA sequencing technologies generate short reads with low error rates, emerging sequencing technologies generate long reads with high error rates. A basic question of interest is the tradeoff between read length and error rate in terms of the information needed for the perfect assembly of the genome. Using an adversarial erasure error model, we make progress on this problem by establishing a critical read length, as a function of the genome and the error rate, above which perfect assembly is guaranteed. For several real genomes, including those from the GAGE dataset, we verify that this critical read length is not significantly greater than the read length required for perfect assembly from reads without errors.
[ { "version": "v1", "created": "Sun, 25 Jan 2015 18:40:19 GMT" } ]
2015-01-27T00:00:00
[ [ "Shomorony", "Ilan", "" ], [ "Courtade", "Thomas", "" ], [ "Tse", "David", "" ] ]
TITLE: Do Read Errors Matter for Genome Assembly? ABSTRACT: While most current high-throughput DNA sequencing technologies generate short reads with low error rates, emerging sequencing technologies generate long reads with high error rates. A basic question of interest is the tradeoff between read length and error rate in terms of the information needed for the perfect assembly of the genome. Using an adversarial erasure error model, we make progress on this problem by establishing a critical read length, as a function of the genome and the error rate, above which perfect assembly is guaranteed. For several real genomes, including those from the GAGE dataset, we verify that this critical read length is not significantly greater than the read length required for perfect assembly from reads without errors.
1501.06225
Shahin Shahrampour
Ali Jadbabaie, Alexander Rakhlin, Shahin Shahrampour and Karthik Sridharan
Online Optimization : Competing with Dynamic Comparators
23 pages, To appear in International Conference on Artificial Intelligence and Statistics (AISTATS) 2015
null
null
null
cs.LG math.OC stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recent literature on online learning has focused on developing adaptive algorithms that take advantage of a regularity of the sequence of observations, yet retain worst-case performance guarantees. A complementary direction is to develop prediction methods that perform well against complex benchmarks. In this paper, we address these two directions together. We present a fully adaptive method that competes with dynamic benchmarks in which regret guarantee scales with regularity of the sequence of cost functions and comparators. Notably, the regret bound adapts to the smaller complexity measure in the problem environment. Finally, we apply our results to drifting zero-sum, two-player games where both players achieve no regret guarantees against best sequences of actions in hindsight.
[ { "version": "v1", "created": "Mon, 26 Jan 2015 00:40:08 GMT" } ]
2015-01-27T00:00:00
[ [ "Jadbabaie", "Ali", "" ], [ "Rakhlin", "Alexander", "" ], [ "Shahrampour", "Shahin", "" ], [ "Sridharan", "Karthik", "" ] ]
TITLE: Online Optimization : Competing with Dynamic Comparators ABSTRACT: Recent literature on online learning has focused on developing adaptive algorithms that take advantage of a regularity of the sequence of observations, yet retain worst-case performance guarantees. A complementary direction is to develop prediction methods that perform well against complex benchmarks. In this paper, we address these two directions together. We present a fully adaptive method that competes with dynamic benchmarks in which regret guarantee scales with regularity of the sequence of cost functions and comparators. Notably, the regret bound adapts to the smaller complexity measure in the problem environment. Finally, we apply our results to drifting zero-sum, two-player games where both players achieve no regret guarantees against best sequences of actions in hindsight.
1501.06396
Ben Teng
Ben Teng, Can Yang, Jiming Liu, Zhipeng Cai and Xiang Wan
Exploring the genetic patterns of complex diseases via the integrative genome-wide approach
null
null
null
null
cs.CE q-bio.QM stat.ME
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Motivation: Genome-wide association studies (GWASs), which assay more than a million single nucleotide polymorphisms (SNPs) in thousands of individuals, have been widely used to identify genetic risk variants for complex diseases. However, most of the variants that have been identified contribute relatively small increments of risk and only explain a small portion of the genetic variation in complex diseases. This is the so-called missing heritability problem. Evidence has indicated that many complex diseases are genetically related, meaning these diseases share common genetic risk variants. Therefore, exploring the genetic correlations across multiple related studies could be a promising strategy for removing spurious associations and identifying underlying genetic risk variants, and thereby uncovering the mystery of missing heritability in complex diseases. Results: We present a general and robust method to identify genetic patterns from multiple large-scale genomic datasets. We treat the summary statistics as a matrix and demonstrate that genetic patterns will form a low-rank matrix plus a sparse component. Hence, we formulate the problem as a matrix recovering problem, where we aim to discover risk variants shared by multiple diseases/traits and those for each individual disease/trait. We propose a convex formulation for matrix recovery and an efficient algorithm to solve the problem. We demonstrate the advantages of our method using both synthesized datasets and real datasets. The experimental results show that our method can successfully reconstruct both the shared and the individual genetic patterns from summary statistics and achieve better performance compared with alternative methods under a wide range of scenarios.
[ { "version": "v1", "created": "Mon, 26 Jan 2015 13:59:23 GMT" } ]
2015-01-27T00:00:00
[ [ "Teng", "Ben", "" ], [ "Yang", "Can", "" ], [ "Liu", "Jiming", "" ], [ "Cai", "Zhipeng", "" ], [ "Wan", "Xiang", "" ] ]
TITLE: Exploring the genetic patterns of complex diseases via the integrative genome-wide approach ABSTRACT: Motivation: Genome-wide association studies (GWASs), which assay more than a million single nucleotide polymorphisms (SNPs) in thousands of individuals, have been widely used to identify genetic risk variants for complex diseases. However, most of the variants that have been identified contribute relatively small increments of risk and only explain a small portion of the genetic variation in complex diseases. This is the so-called missing heritability problem. Evidence has indicated that many complex diseases are genetically related, meaning these diseases share common genetic risk variants. Therefore, exploring the genetic correlations across multiple related studies could be a promising strategy for removing spurious associations and identifying underlying genetic risk variants, and thereby uncovering the mystery of missing heritability in complex diseases. Results: We present a general and robust method to identify genetic patterns from multiple large-scale genomic datasets. We treat the summary statistics as a matrix and demonstrate that genetic patterns will form a low-rank matrix plus a sparse component. Hence, we formulate the problem as a matrix recovering problem, where we aim to discover risk variants shared by multiple diseases/traits and those for each individual disease/trait. We propose a convex formulation for matrix recovery and an efficient algorithm to solve the problem. We demonstrate the advantages of our method using both synthesized datasets and real datasets. The experimental results show that our method can successfully reconstruct both the shared and the individual genetic patterns from summary statistics and achieve better performance compared with alternative methods under a wide range of scenarios.
1501.06456
Sanjay Chakraborty
Ratul Dey Sanjay Chakraborty Lopamudra Dey
Weather forecasting using Convex hull & K-Means Techniques An Approach
1st International Science & Technology Congress(IEMCON-2015) Elsevier
null
null
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Data mining is a popular concept of mined necessary data from a large set of data. Data mining using clustering is a powerful way to analyze data and gives prediction. In this paper non structural time series data is used to forecast daily average temperature, humidity and overall weather conditions of Kolkata city. The air pollution data have been taken from West Bengal Pollution Control Board to build the original dataset on which the prediction approach of this paper is studied and applied. This paper describes a new technique to predict the weather conditions using convex hull which gives structural data and then apply incremental K-means to define the appropriate clusters. It splits the total database into four separate databases with respect to different weather conditions. In the final step, the result will be calculated on the basis of priority based protocol which is defined based on some mathematical deduction.
[ { "version": "v1", "created": "Mon, 26 Jan 2015 16:12:01 GMT" } ]
2015-01-27T00:00:00
[ [ "Dey", "Ratul Dey Sanjay Chakraborty Lopamudra", "" ] ]
TITLE: Weather forecasting using Convex hull & K-Means Techniques An Approach ABSTRACT: Data mining is a popular concept of mined necessary data from a large set of data. Data mining using clustering is a powerful way to analyze data and gives prediction. In this paper non structural time series data is used to forecast daily average temperature, humidity and overall weather conditions of Kolkata city. The air pollution data have been taken from West Bengal Pollution Control Board to build the original dataset on which the prediction approach of this paper is studied and applied. This paper describes a new technique to predict the weather conditions using convex hull which gives structural data and then apply incremental K-means to define the appropriate clusters. It splits the total database into four separate databases with respect to different weather conditions. In the final step, the result will be calculated on the basis of priority based protocol which is defined based on some mathematical deduction.
1501.06561
Mina Ghashami
Amey Desai, Mina Ghashami and Jeff M. Phillips
Improved Practical Matrix Sketching with Guarantees
27 pages
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Matrices have become essential data representations for many large-scale problems in data analytics, and hence matrix sketching is a critical task. Although much research has focused on improving the error/size tradeoff under various sketching paradigms, the many forms of error bounds make these approaches hard to compare in theory and in practice. This paper attempts to categorize and compare most known methods under row-wise streaming updates with provable guarantees, and then to tweak some of these methods to gain practical improvements while retaining guarantees. For instance, we observe that a simple heuristic iSVD, with no guarantees, tends to outperform all known approaches in terms of size/error trade-off. We modify the best performing method with guarantees FrequentDirections under the size/error trade-off to match the performance of iSVD and retain its guarantees. We also demonstrate some adversarial datasets where iSVD performs quite poorly. In comparing techniques in the time/error trade-off, techniques based on hashing or sampling tend to perform better. In this setting we modify the most studied sampling regime to retain error guarantee but obtain dramatic improvements in the time/error trade-off. Finally, we provide easy replication of our studies on APT, a new testbed which makes available not only code and datasets, but also a computing platform with fixed environmental settings.
[ { "version": "v1", "created": "Mon, 26 Jan 2015 20:44:31 GMT" } ]
2015-01-27T00:00:00
[ [ "Desai", "Amey", "" ], [ "Ghashami", "Mina", "" ], [ "Phillips", "Jeff M.", "" ] ]
TITLE: Improved Practical Matrix Sketching with Guarantees ABSTRACT: Matrices have become essential data representations for many large-scale problems in data analytics, and hence matrix sketching is a critical task. Although much research has focused on improving the error/size tradeoff under various sketching paradigms, the many forms of error bounds make these approaches hard to compare in theory and in practice. This paper attempts to categorize and compare most known methods under row-wise streaming updates with provable guarantees, and then to tweak some of these methods to gain practical improvements while retaining guarantees. For instance, we observe that a simple heuristic iSVD, with no guarantees, tends to outperform all known approaches in terms of size/error trade-off. We modify the best performing method with guarantees FrequentDirections under the size/error trade-off to match the performance of iSVD and retain its guarantees. We also demonstrate some adversarial datasets where iSVD performs quite poorly. In comparing techniques in the time/error trade-off, techniques based on hashing or sampling tend to perform better. In this setting we modify the most studied sampling regime to retain error guarantee but obtain dramatic improvements in the time/error trade-off. Finally, we provide easy replication of our studies on APT, a new testbed which makes available not only code and datasets, but also a computing platform with fixed environmental settings.
1003.6059
Satadal Saha
Satadal Saha, Subhadip Basu, Mita Nasipuri and Dipak Kumar Basu
A novel scheme for binarization of vehicle images using hierarchical histogram equalization technique
International Conference on Computer, Communication, Control and Information Technology (C3IT 2009)
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Automatic License Plate Recognition system is a challenging area of research now-a-days and binarization is an integral and most important part of it. In case of a real life scenario, most of existing methods fail to properly binarize the image of a vehicle in a congested road, captured through a CCD camera. In the current work we have applied histogram equalization technique over the complete image and also over different hierarchy of image partitioning. A novel scheme is formulated for giving the membership value to each pixel for each hierarchy of histogram equalization. Then the image is binarized depending on the net membership value of each pixel. The technique is exhaustively evaluated on the vehicle image dataset as well as the license plate dataset, giving satisfactory performances.
[ { "version": "v1", "created": "Wed, 31 Mar 2010 14:00:16 GMT" }, { "version": "v2", "created": "Thu, 22 Jan 2015 21:26:41 GMT" } ]
2015-01-26T00:00:00
[ [ "Saha", "Satadal", "" ], [ "Basu", "Subhadip", "" ], [ "Nasipuri", "Mita", "" ], [ "Basu", "Dipak Kumar", "" ] ]
TITLE: A novel scheme for binarization of vehicle images using hierarchical histogram equalization technique ABSTRACT: Automatic License Plate Recognition system is a challenging area of research now-a-days and binarization is an integral and most important part of it. In case of a real life scenario, most of existing methods fail to properly binarize the image of a vehicle in a congested road, captured through a CCD camera. In the current work we have applied histogram equalization technique over the complete image and also over different hierarchy of image partitioning. A novel scheme is formulated for giving the membership value to each pixel for each hierarchy of histogram equalization. Then the image is binarized depending on the net membership value of each pixel. The technique is exhaustively evaluated on the vehicle image dataset as well as the license plate dataset, giving satisfactory performances.
1404.5562
Sai Zhang
Sai Zhang, Ke Xu, Xi Chen, Xue Liu
Characterizing Information Spreading in Online Social Networks
17 pages, 8 figures
null
null
null
cs.SI physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Online social networks (OSNs) are changing the way in which the information spreads throughout the Internet. A deep understanding of the information spreading in OSNs leads to both social and commercial benefits. In this paper, we characterize the dynamic of information spreading (e.g., how fast and widely the information spreads against time) in OSNs by developing a general and accurate model based on the Interactive Markov Chains (IMCs) and mean-field theory. This model explicitly reveals the impacts of the network topology on information spreading in OSNs. Further, we extend our model to feature the time-varying user behaviors and the ever-changing information popularity. The complicated dynamic patterns of information spreading are captured by our model using six key parameters. Extensive tests based on Renren's dataset validate the accuracy of our model, which demonstrate that it can characterize the dynamic patterns of video sharing in Renren precisely and predict future spreading tendency successfully.
[ { "version": "v1", "created": "Tue, 22 Apr 2014 17:17:40 GMT" }, { "version": "v2", "created": "Thu, 24 Apr 2014 05:29:52 GMT" }, { "version": "v3", "created": "Fri, 23 Jan 2015 10:36:53 GMT" } ]
2015-01-26T00:00:00
[ [ "Zhang", "Sai", "" ], [ "Xu", "Ke", "" ], [ "Chen", "Xi", "" ], [ "Liu", "Xue", "" ] ]
TITLE: Characterizing Information Spreading in Online Social Networks ABSTRACT: Online social networks (OSNs) are changing the way in which the information spreads throughout the Internet. A deep understanding of the information spreading in OSNs leads to both social and commercial benefits. In this paper, we characterize the dynamic of information spreading (e.g., how fast and widely the information spreads against time) in OSNs by developing a general and accurate model based on the Interactive Markov Chains (IMCs) and mean-field theory. This model explicitly reveals the impacts of the network topology on information spreading in OSNs. Further, we extend our model to feature the time-varying user behaviors and the ever-changing information popularity. The complicated dynamic patterns of information spreading are captured by our model using six key parameters. Extensive tests based on Renren's dataset validate the accuracy of our model, which demonstrate that it can characterize the dynamic patterns of video sharing in Renren precisely and predict future spreading tendency successfully.
1501.05192
Umit Rusen Aktas
Umit Rusen Aktas, Mete Ozay, Ales Leonardis, Jeremy L. Wyatt
A Graph Theoretic Approach for Object Shape Representation in Compositional Hierarchies Using a Hybrid Generative-Descriptive Model
Paper : 17 pages. 13th European Conference on Computer Vision (ECCV 2014), Zurich, Switzerland, September 6-12, 2014, Proceedings, Part III, pp 566-581. Supplementary material can be downloaded from http://link.springer.com/content/esm/chp:10.1007/978-3-319-10578-9_37/file/MediaObjects/978-3-319-10578-9_37_MOESM1_ESM.pdf
null
10.1007/978-3-319-10578-9_37
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A graph theoretic approach is proposed for object shape representation in a hierarchical compositional architecture called Compositional Hierarchy of Parts (CHOP). In the proposed approach, vocabulary learning is performed using a hybrid generative-descriptive model. First, statistical relationships between parts are learned using a Minimum Conditional Entropy Clustering algorithm. Then, selection of descriptive parts is defined as a frequent subgraph discovery problem, and solved using a Minimum Description Length (MDL) principle. Finally, part compositions are constructed by compressing the internal data representation with discovered substructures. Shape representation and computational complexity properties of the proposed approach and algorithms are examined using six benchmark two-dimensional shape image datasets. Experiments show that CHOP can employ part shareability and indexing mechanisms for fast inference of part compositions using learned shape vocabularies. Additionally, CHOP provides better shape retrieval performance than the state-of-the-art shape retrieval methods.
[ { "version": "v1", "created": "Wed, 21 Jan 2015 15:19:09 GMT" }, { "version": "v2", "created": "Fri, 23 Jan 2015 16:04:57 GMT" } ]
2015-01-26T00:00:00
[ [ "Aktas", "Umit Rusen", "" ], [ "Ozay", "Mete", "" ], [ "Leonardis", "Ales", "" ], [ "Wyatt", "Jeremy L.", "" ] ]
TITLE: A Graph Theoretic Approach for Object Shape Representation in Compositional Hierarchies Using a Hybrid Generative-Descriptive Model ABSTRACT: A graph theoretic approach is proposed for object shape representation in a hierarchical compositional architecture called Compositional Hierarchy of Parts (CHOP). In the proposed approach, vocabulary learning is performed using a hybrid generative-descriptive model. First, statistical relationships between parts are learned using a Minimum Conditional Entropy Clustering algorithm. Then, selection of descriptive parts is defined as a frequent subgraph discovery problem, and solved using a Minimum Description Length (MDL) principle. Finally, part compositions are constructed by compressing the internal data representation with discovered substructures. Shape representation and computational complexity properties of the proposed approach and algorithms are examined using six benchmark two-dimensional shape image datasets. Experiments show that CHOP can employ part shareability and indexing mechanisms for fast inference of part compositions using learned shape vocabularies. Additionally, CHOP provides better shape retrieval performance than the state-of-the-art shape retrieval methods.
1501.05759
Rodrigo Benenson
Shanshan Zhang and Rodrigo Benenson and Bernt Schiele
Filtered Channel Features for Pedestrian Detection
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper starts from the observation that multiple top performing pedestrian detectors can be modelled by using an intermediate layer filtering low-level features in combination with a boosted decision forest. Based on this observation we propose a unifying framework and experimentally explore different filter families. We report extensive results enabling a systematic analysis. Using filtered channel features we obtain top performance on the challenging Caltech and KITTI datasets, while using only HOG+LUV as low-level features. When adding optical flow features we further improve detection quality and report the best known results on the Caltech dataset, reaching 93% recall at 1 FPPI.
[ { "version": "v1", "created": "Fri, 23 Jan 2015 10:19:33 GMT" } ]
2015-01-26T00:00:00
[ [ "Zhang", "Shanshan", "" ], [ "Benenson", "Rodrigo", "" ], [ "Schiele", "Bernt", "" ] ]
TITLE: Filtered Channel Features for Pedestrian Detection ABSTRACT: This paper starts from the observation that multiple top performing pedestrian detectors can be modelled by using an intermediate layer filtering low-level features in combination with a boosted decision forest. Based on this observation we propose a unifying framework and experimentally explore different filter families. We report extensive results enabling a systematic analysis. Using filtered channel features we obtain top performance on the challenging Caltech and KITTI datasets, while using only HOG+LUV as low-level features. When adding optical flow features we further improve detection quality and report the best known results on the Caltech dataset, reaching 93% recall at 1 FPPI.
1501.05790
Rodrigo Benenson
Jan Hosang and Mohamed Omran and Rodrigo Benenson and Bernt Schiele
Taking a Deeper Look at Pedestrians
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we study the use of convolutional neural networks (convnets) for the task of pedestrian detection. Despite their recent diverse successes, convnets historically underperform compared to other pedestrian detectors. We deliberately omit explicitly modelling the problem into the network (e.g. parts or occlusion modelling) and show that we can reach competitive performance without bells and whistles. In a wide range of experiments we analyse small and big convnets, their architectural choices, parameters, and the influence of different training data, including pre-training on surrogate tasks. We present the best convnet detectors on the Caltech and KITTI dataset. On Caltech our convnets reach top performance both for the Caltech1x and Caltech10x training setup. Using additional data at training time our strongest convnet model is competitive even to detectors that use additional data (optical flow) at test time.
[ { "version": "v1", "created": "Fri, 23 Jan 2015 13:07:56 GMT" } ]
2015-01-26T00:00:00
[ [ "Hosang", "Jan", "" ], [ "Omran", "Mohamed", "" ], [ "Benenson", "Rodrigo", "" ], [ "Schiele", "Bernt", "" ] ]
TITLE: Taking a Deeper Look at Pedestrians ABSTRACT: In this paper we study the use of convolutional neural networks (convnets) for the task of pedestrian detection. Despite their recent diverse successes, convnets historically underperform compared to other pedestrian detectors. We deliberately omit explicitly modelling the problem into the network (e.g. parts or occlusion modelling) and show that we can reach competitive performance without bells and whistles. In a wide range of experiments we analyse small and big convnets, their architectural choices, parameters, and the influence of different training data, including pre-training on surrogate tasks. We present the best convnet detectors on the Caltech and KITTI dataset. On Caltech our convnets reach top performance both for the Caltech1x and Caltech10x training setup. Using additional data at training time our strongest convnet model is competitive even to detectors that use additional data (optical flow) at test time.
1501.05916
Nafees Qamar
Nafees Qamar, Yilong Yang, Andras Nadas, Zhiming Liu, and Janos Sztipanovits
Anonymously Analyzing Clinical Datasets
null
null
null
null
cs.SE cs.CR cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper takes on the problem of automatically identifying clinically-relevant patterns in medical datasets without compromising patient privacy. To achieve this goal, we treat datasets as a black box for both internal and external users of data that lets us handle clinical data queries directly and far more efficiently. The novelty of the approach lies in avoiding the data de-identification process often used as a means of preserving patient privacy. The implemented toolkit combines software engineering technologies such as Java EE and RESTful web services, to allow exchanging medical data in an unidentifiable XML format as well as restricting users to the need-to-know principle. Our technique also inhibits retrospective processing of data, such as attacks by an adversary on a medical dataset using advanced computational methods to reveal Protected Health Information (PHI). The approach is validated on an endoscopic reporting application based on openEHR and MST standards. From the usability perspective, the approach can be used to query datasets by clinical researchers, governmental or non-governmental organizations in monitoring health care services to improve quality of care.
[ { "version": "v1", "created": "Wed, 19 Nov 2014 07:53:34 GMT" } ]
2015-01-26T00:00:00
[ [ "Qamar", "Nafees", "" ], [ "Yang", "Yilong", "" ], [ "Nadas", "Andras", "" ], [ "Liu", "Zhiming", "" ], [ "Sztipanovits", "Janos", "" ] ]
TITLE: Anonymously Analyzing Clinical Datasets ABSTRACT: This paper takes on the problem of automatically identifying clinically-relevant patterns in medical datasets without compromising patient privacy. To achieve this goal, we treat datasets as a black box for both internal and external users of data that lets us handle clinical data queries directly and far more efficiently. The novelty of the approach lies in avoiding the data de-identification process often used as a means of preserving patient privacy. The implemented toolkit combines software engineering technologies such as Java EE and RESTful web services, to allow exchanging medical data in an unidentifiable XML format as well as restricting users to the need-to-know principle. Our technique also inhibits retrospective processing of data, such as attacks by an adversary on a medical dataset using advanced computational methods to reveal Protected Health Information (PHI). The approach is validated on an endoscopic reporting application based on openEHR and MST standards. From the usability perspective, the approach can be used to query datasets by clinical researchers, governmental or non-governmental organizations in monitoring health care services to improve quality of care.
1310.3911
Yongqing Wang
Yongqing Wang and Hua-Wei Shen and Shenghua Liu and Xue-Qi Cheng
Learning user-specific latent influence and susceptibility from information cascades
from The 29th AAAI Conference on Artificial Intelligence (AAAI-2015)
null
null
null
cs.SI physics.soc-ph
http://creativecommons.org/licenses/by-nc-sa/3.0/
Predicting cascade dynamics has important implications for understanding information propagation and launching viral marketing. Previous works mainly adopt a pair-wise manner, modeling the propagation probability between pairs of users using n^2 independent parameters for n users. Consequently, these models suffer from severe overfitting problem, specially for pairs of users without direct interactions, limiting their prediction accuracy. Here we propose to model the cascade dynamics by learning two low-dimensional user-specific vectors from observed cascades, capturing their influence and susceptibility respectively. This model requires much less parameters and thus could combat overfitting problem. Moreover, this model could naturally model context-dependent factors like cumulative effect in information propagation. Extensive experiments on synthetic dataset and a large-scale microblogging dataset demonstrate that this model outperforms the existing pair-wise models at predicting cascade dynamics, cascade size, and "who will be retweeted".
[ { "version": "v1", "created": "Tue, 15 Oct 2013 03:45:58 GMT" }, { "version": "v2", "created": "Wed, 26 Nov 2014 08:49:46 GMT" }, { "version": "v3", "created": "Thu, 22 Jan 2015 10:03:19 GMT" } ]
2015-01-23T00:00:00
[ [ "Wang", "Yongqing", "" ], [ "Shen", "Hua-Wei", "" ], [ "Liu", "Shenghua", "" ], [ "Cheng", "Xue-Qi", "" ] ]
TITLE: Learning user-specific latent influence and susceptibility from information cascades ABSTRACT: Predicting cascade dynamics has important implications for understanding information propagation and launching viral marketing. Previous works mainly adopt a pair-wise manner, modeling the propagation probability between pairs of users using n^2 independent parameters for n users. Consequently, these models suffer from severe overfitting problem, specially for pairs of users without direct interactions, limiting their prediction accuracy. Here we propose to model the cascade dynamics by learning two low-dimensional user-specific vectors from observed cascades, capturing their influence and susceptibility respectively. This model requires much less parameters and thus could combat overfitting problem. Moreover, this model could naturally model context-dependent factors like cumulative effect in information propagation. Extensive experiments on synthetic dataset and a large-scale microblogging dataset demonstrate that this model outperforms the existing pair-wise models at predicting cascade dynamics, cascade size, and "who will be retweeted".
1407.6297
Marta Sarzynska
Marta Sarzynska, Elizabeth A. Leicht, Gerardo Chowell, Mason A. Porter
Null Models for Community Detection in Spatially-Embedded, Temporal Networks
null
null
null
null
physics.soc-ph cs.SI nlin.AO physics.bio-ph q-bio.PE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In the study of networks, it is often insightful to use algorithms to determine mesoscale features such as "community structure", in which densely connected sets of nodes constitute "communities" that have sparse connections to other communities. The most popular way of detecting communities algorithmically is to optimize the quality function known as modularity. When optimizing modularity, one compares the actual connections in a (static or time-dependent) network to the connections obtained from a random-graph ensemble that acts as a null model. The communities are then the sets of nodes that are connected to each other densely relative to what is expected from the null model. Clearly, the process of community detection depends fundamentally on the choice of null model, so it is important to develop and analyze novel null models that take into account appropriate features of the system under study. In this paper, we investigate the effects of using null models that take incorporate spatial information, and we propose a novel null model based on the radiation model of population spread. We also develop novel synthetic spatial benchmark networks in which the connections between entities are based on distance or flux between nodes, and we compare the performance of both static and time-dependent radiation null models to the standard ("Newman-Girvan") null model for modularity optimization and a recently-proposed gravity null model. In our comparisons, we use both the above synthetic benchmarks and time-dependent correlation networks that we construct using countrywide dengue fever incidence data for Peru. We also evaluate a recently-proposed correlation null model, which was developed specifically for correlation networks that are constructed from time series, on the epidemic-correlation data.
[ { "version": "v1", "created": "Wed, 23 Jul 2014 17:05:07 GMT" }, { "version": "v2", "created": "Thu, 22 Jan 2015 12:13:06 GMT" } ]
2015-01-23T00:00:00
[ [ "Sarzynska", "Marta", "" ], [ "Leicht", "Elizabeth A.", "" ], [ "Chowell", "Gerardo", "" ], [ "Porter", "Mason A.", "" ] ]
TITLE: Null Models for Community Detection in Spatially-Embedded, Temporal Networks ABSTRACT: In the study of networks, it is often insightful to use algorithms to determine mesoscale features such as "community structure", in which densely connected sets of nodes constitute "communities" that have sparse connections to other communities. The most popular way of detecting communities algorithmically is to optimize the quality function known as modularity. When optimizing modularity, one compares the actual connections in a (static or time-dependent) network to the connections obtained from a random-graph ensemble that acts as a null model. The communities are then the sets of nodes that are connected to each other densely relative to what is expected from the null model. Clearly, the process of community detection depends fundamentally on the choice of null model, so it is important to develop and analyze novel null models that take into account appropriate features of the system under study. In this paper, we investigate the effects of using null models that take incorporate spatial information, and we propose a novel null model based on the radiation model of population spread. We also develop novel synthetic spatial benchmark networks in which the connections between entities are based on distance or flux between nodes, and we compare the performance of both static and time-dependent radiation null models to the standard ("Newman-Girvan") null model for modularity optimization and a recently-proposed gravity null model. In our comparisons, we use both the above synthetic benchmarks and time-dependent correlation networks that we construct using countrywide dengue fever incidence data for Peru. We also evaluate a recently-proposed correlation null model, which was developed specifically for correlation networks that are constructed from time series, on the epidemic-correlation data.
1408.4712
Wen-Ze Shao
Wen-Ze Shao, Hai-Bo Li, Michael Elad
Bi-l0-l2-Norm Regularization for Blind Motion Deblurring
32 pages, 16 figures
null
null
null
cs.CV
http://creativecommons.org/licenses/by-nc-sa/3.0/
In blind motion deblurring, leading methods today tend towards highly non-convex approximations of the l0-norm, especially in the image regularization term. In this paper, we propose a simple, effective and fast approach for the estimation of the motion blur-kernel, through a bi-l0-l2-norm regularization imposed on both the intermediate sharp image and the blur-kernel. Compared with existing methods, the proposed regularization is shown to be more effective and robust, leading to a more accurate motion blur-kernel and a better final restored image. A fast numerical scheme is deployed for alternatingly computing the sharp image and the blur-kernel, by coupling the operator splitting and augmented Lagrangian methods. Experimental results on both a benchmark image dataset and real-world motion blurred images show that the proposed approach is highly competitive with state-of-the- art methods in both deblurring effectiveness and computational efficiency.
[ { "version": "v1", "created": "Wed, 20 Aug 2014 16:18:13 GMT" }, { "version": "v2", "created": "Tue, 20 Jan 2015 08:06:47 GMT" }, { "version": "v3", "created": "Thu, 22 Jan 2015 14:02:38 GMT" } ]
2015-01-23T00:00:00
[ [ "Shao", "Wen-Ze", "" ], [ "Li", "Hai-Bo", "" ], [ "Elad", "Michael", "" ] ]
TITLE: Bi-l0-l2-Norm Regularization for Blind Motion Deblurring ABSTRACT: In blind motion deblurring, leading methods today tend towards highly non-convex approximations of the l0-norm, especially in the image regularization term. In this paper, we propose a simple, effective and fast approach for the estimation of the motion blur-kernel, through a bi-l0-l2-norm regularization imposed on both the intermediate sharp image and the blur-kernel. Compared with existing methods, the proposed regularization is shown to be more effective and robust, leading to a more accurate motion blur-kernel and a better final restored image. A fast numerical scheme is deployed for alternatingly computing the sharp image and the blur-kernel, by coupling the operator splitting and augmented Lagrangian methods. Experimental results on both a benchmark image dataset and real-world motion blurred images show that the proposed approach is highly competitive with state-of-the- art methods in both deblurring effectiveness and computational efficiency.
1501.05396
Youssef Mroueh
Youssef Mroueh, Etienne Marcheret, Vaibhava Goel
Deep Multimodal Learning for Audio-Visual Speech Recognition
ICASSP 2015
null
null
null
cs.CL cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we present methods in deep multimodal learning for fusing speech and visual modalities for Audio-Visual Automatic Speech Recognition (AV-ASR). First, we study an approach where uni-modal deep networks are trained separately and their final hidden layers fused to obtain a joint feature space in which another deep network is built. While the audio network alone achieves a phone error rate (PER) of $41\%$ under clean condition on the IBM large vocabulary audio-visual studio dataset, this fusion model achieves a PER of $35.83\%$ demonstrating the tremendous value of the visual channel in phone classification even in audio with high signal to noise ratio. Second, we present a new deep network architecture that uses a bilinear softmax layer to account for class specific correlations between modalities. We show that combining the posteriors from the bilinear networks with those from the fused model mentioned above results in a further significant phone error rate reduction, yielding a final PER of $34.03\%$.
[ { "version": "v1", "created": "Thu, 22 Jan 2015 05:25:33 GMT" } ]
2015-01-23T00:00:00
[ [ "Mroueh", "Youssef", "" ], [ "Marcheret", "Etienne", "" ], [ "Goel", "Vaibhava", "" ] ]
TITLE: Deep Multimodal Learning for Audio-Visual Speech Recognition ABSTRACT: In this paper, we present methods in deep multimodal learning for fusing speech and visual modalities for Audio-Visual Automatic Speech Recognition (AV-ASR). First, we study an approach where uni-modal deep networks are trained separately and their final hidden layers fused to obtain a joint feature space in which another deep network is built. While the audio network alone achieves a phone error rate (PER) of $41\%$ under clean condition on the IBM large vocabulary audio-visual studio dataset, this fusion model achieves a PER of $35.83\%$ demonstrating the tremendous value of the visual channel in phone classification even in audio with high signal to noise ratio. Second, we present a new deep network architecture that uses a bilinear softmax layer to account for class specific correlations between modalities. We show that combining the posteriors from the bilinear networks with those from the fused model mentioned above results in a further significant phone error rate reduction, yielding a final PER of $34.03\%$.
1501.05472
Subhadip Basu
Ram Sarkar, Bibhash Sen, Nibaran Das, Subhadip Basu
Handwritten Devanagari Script Segmentation: A non-linear Fuzzy Approach
In Proceedings of IEEE Conference on AI Tools and Engineering (ICAITE-08), March 6-8, 2008, Pune
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The paper concentrates on improvement of segmentation accuracy by addressing some of the key challenges of handwritten Devanagari word image segmentation technique. In the present work, we have developed a new feature based approach for identification of Matra pixels from a word image, design of a non-linear fuzzy membership functions for headline estimation and finally design of a non-linear fuzzy functions for identifying segmentation points on the Matra. The segmentation accuracy achieved by the current technique is 94.8%. This shows an improvement of performance by 1.8% over the previous technique [1] on a 300-word dataset, used for the current experiment.
[ { "version": "v1", "created": "Thu, 22 Jan 2015 12:05:25 GMT" } ]
2015-01-23T00:00:00
[ [ "Sarkar", "Ram", "" ], [ "Sen", "Bibhash", "" ], [ "Das", "Nibaran", "" ], [ "Basu", "Subhadip", "" ] ]
TITLE: Handwritten Devanagari Script Segmentation: A non-linear Fuzzy Approach ABSTRACT: The paper concentrates on improvement of segmentation accuracy by addressing some of the key challenges of handwritten Devanagari word image segmentation technique. In the present work, we have developed a new feature based approach for identification of Matra pixels from a word image, design of a non-linear fuzzy membership functions for headline estimation and finally design of a non-linear fuzzy functions for identifying segmentation points on the Matra. The segmentation accuracy achieved by the current technique is 94.8%. This shows an improvement of performance by 1.8% over the previous technique [1] on a 300-word dataset, used for the current experiment.
1501.05497
Subhadip Basu
Nibaran Das, Subhadip Basu, Ram Sarkar, Mahantapas Kundu, Mita Nasipuri, Dipak kumar Basu
An Improved Feature Descriptor for Recognition of Handwritten Bangla Alphabet
In proceedings of ICSIP 2009, pp. 451 to 454, August 2009, Mysore, India. arXiv admin note: substantial text overlap with arXiv:1203.0882, arXiv:1002.4040, arXiv:1410.0478
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Appropriate feature set for representation of pattern classes is one of the most important aspects of handwritten character recognition. The effectiveness of features depends on the discriminating power of the features chosen to represent patterns of different classes. However, discriminatory features are not easily measurable. Investigative experimentation is necessary for identifying discriminatory features. In the present work we have identified a new variation of feature set which significantly outperforms on handwritten Bangla alphabet from the previously used feature set. 132 number of features in all viz. modified shadow features, octant and centroid features, distance based features, quad tree based longest run features are used here. Using this feature set the recognition performance increases sharply from the 75.05% observed in our previous work [7], to 85.40% on 50 character classes with MLP based classifier on the same dataset.
[ { "version": "v1", "created": "Thu, 22 Jan 2015 13:50:25 GMT" } ]
2015-01-23T00:00:00
[ [ "Das", "Nibaran", "" ], [ "Basu", "Subhadip", "" ], [ "Sarkar", "Ram", "" ], [ "Kundu", "Mahantapas", "" ], [ "Nasipuri", "Mita", "" ], [ "Basu", "Dipak kumar", "" ] ]
TITLE: An Improved Feature Descriptor for Recognition of Handwritten Bangla Alphabet ABSTRACT: Appropriate feature set for representation of pattern classes is one of the most important aspects of handwritten character recognition. The effectiveness of features depends on the discriminating power of the features chosen to represent patterns of different classes. However, discriminatory features are not easily measurable. Investigative experimentation is necessary for identifying discriminatory features. In the present work we have identified a new variation of feature set which significantly outperforms on handwritten Bangla alphabet from the previously used feature set. 132 number of features in all viz. modified shadow features, octant and centroid features, distance based features, quad tree based longest run features are used here. Using this feature set the recognition performance increases sharply from the 75.05% observed in our previous work [7], to 85.40% on 50 character classes with MLP based classifier on the same dataset.
1501.05546
Ashley Conard
Ashley Mae Conard, Stephanie Dodson, Jeremy Kepner, Darrell Ricke
Using a Big Data Database to Identify Pathogens in Protein Data Space
2 pages, 3 figures
null
null
null
cs.DB q-bio.QM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Current metagenomic analysis algorithms require significant computing resources, can report excessive false positives (type I errors), may miss organisms (type II errors / false negatives), or scale poorly on large datasets. This paper explores using big data database technologies to characterize very large metagenomic DNA sequences in protein space, with the ultimate goal of rapid pathogen identification in patient samples. Our approach uses the abilities of a big data databases to hold large sparse associative array representations of genetic data to extract statistical patterns about the data that can be used in a variety of ways to improve identification algorithms.
[ { "version": "v1", "created": "Thu, 22 Jan 2015 15:58:42 GMT" } ]
2015-01-23T00:00:00
[ [ "Conard", "Ashley Mae", "" ], [ "Dodson", "Stephanie", "" ], [ "Kepner", "Jeremy", "" ], [ "Ricke", "Darrell", "" ] ]
TITLE: Using a Big Data Database to Identify Pathogens in Protein Data Space ABSTRACT: Current metagenomic analysis algorithms require significant computing resources, can report excessive false positives (type I errors), may miss organisms (type II errors / false negatives), or scale poorly on large datasets. This paper explores using big data database technologies to characterize very large metagenomic DNA sequences in protein space, with the ultimate goal of rapid pathogen identification in patient samples. Our approach uses the abilities of a big data databases to hold large sparse associative array representations of genetic data to extract statistical patterns about the data that can be used in a variety of ways to improve identification algorithms.
1501.05581
Daniele Riboni
Daniele Riboni, Claudio Bettini, Gabriele Civitarese, Zaffar Haider Janjua, Rim Helaoui
Extended Report: Fine-grained Recognition of Abnormal Behaviors for Early Detection of Mild Cognitive Impairment
null
null
null
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
According to the World Health Organization, the rate of people aged 60 or more is growing faster than any other age group in almost every country, and this trend is not going to change in a near future. Since senior citizens are at high risk of non communicable diseases requiring long-term care, this trend will challenge the sustainability of the entire health system. Pervasive computing can provide innovative methods and tools for early detecting the onset of health issues. In this paper we propose a novel method to detect abnormal behaviors of elderly people living at home. The method relies on medical models, provided by cognitive neuroscience researchers, describing abnormal activity routines that may indicate the onset of early symptoms of mild cognitive impairment. A non-intrusive sensor-based infrastructure acquires low-level data about the interaction of the individual with home appliances and furniture, as well as data from environmental sensors. Based on those data, a novel hybrid statistical-symbolical technique is used to detect the abnormal behaviors of the patient, which are communicated to the medical center. Differently from related works, our method can detect abnormal behaviors at a fine-grained level, thus providing an important tool to support the medical diagnosis. In order to evaluate our method we have developed a prototype of the system and acquired a large dataset of abnormal behaviors carried out in an instrumented smart home. Experimental results show that our technique is able to detect most anomalies while generating a small number of false positives.
[ { "version": "v1", "created": "Thu, 22 Jan 2015 17:34:16 GMT" } ]
2015-01-23T00:00:00
[ [ "Riboni", "Daniele", "" ], [ "Bettini", "Claudio", "" ], [ "Civitarese", "Gabriele", "" ], [ "Janjua", "Zaffar Haider", "" ], [ "Helaoui", "Rim", "" ] ]
TITLE: Extended Report: Fine-grained Recognition of Abnormal Behaviors for Early Detection of Mild Cognitive Impairment ABSTRACT: According to the World Health Organization, the rate of people aged 60 or more is growing faster than any other age group in almost every country, and this trend is not going to change in a near future. Since senior citizens are at high risk of non communicable diseases requiring long-term care, this trend will challenge the sustainability of the entire health system. Pervasive computing can provide innovative methods and tools for early detecting the onset of health issues. In this paper we propose a novel method to detect abnormal behaviors of elderly people living at home. The method relies on medical models, provided by cognitive neuroscience researchers, describing abnormal activity routines that may indicate the onset of early symptoms of mild cognitive impairment. A non-intrusive sensor-based infrastructure acquires low-level data about the interaction of the individual with home appliances and furniture, as well as data from environmental sensors. Based on those data, a novel hybrid statistical-symbolical technique is used to detect the abnormal behaviors of the patient, which are communicated to the medical center. Differently from related works, our method can detect abnormal behaviors at a fine-grained level, thus providing an important tool to support the medical diagnosis. In order to evaluate our method we have developed a prototype of the system and acquired a large dataset of abnormal behaviors carried out in an instrumented smart home. Experimental results show that our technique is able to detect most anomalies while generating a small number of false positives.
1501.05624
John Paisley
San Gultekin and John Paisley
A Collaborative Kalman Filter for Time-Evolving Dyadic Processes
Appeared at 2014 IEEE International Conference on Data Mining (ICDM)
null
null
null
stat.ML cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present the collaborative Kalman filter (CKF), a dynamic model for collaborative filtering and related factorization models. Using the matrix factorization approach to collaborative filtering, the CKF accounts for time evolution by modeling each low-dimensional latent embedding as a multidimensional Brownian motion. Each observation is a random variable whose distribution is parameterized by the dot product of the relevant Brownian motions at that moment in time. This is naturally interpreted as a Kalman filter with multiple interacting state space vectors. We also present a method for learning a dynamically evolving drift parameter for each location by modeling it as a geometric Brownian motion. We handle posterior intractability via a mean-field variational approximation, which also preserves tractability for downstream calculations in a manner similar to the Kalman filter. We evaluate the model on several large datasets, providing quantitative evaluation on the 10 million Movielens and 100 million Netflix datasets and qualitative evaluation on a set of 39 million stock returns divided across roughly 6,500 companies from the years 1962-2014.
[ { "version": "v1", "created": "Thu, 22 Jan 2015 20:24:32 GMT" } ]
2015-01-23T00:00:00
[ [ "Gultekin", "San", "" ], [ "Paisley", "John", "" ] ]
TITLE: A Collaborative Kalman Filter for Time-Evolving Dyadic Processes ABSTRACT: We present the collaborative Kalman filter (CKF), a dynamic model for collaborative filtering and related factorization models. Using the matrix factorization approach to collaborative filtering, the CKF accounts for time evolution by modeling each low-dimensional latent embedding as a multidimensional Brownian motion. Each observation is a random variable whose distribution is parameterized by the dot product of the relevant Brownian motions at that moment in time. This is naturally interpreted as a Kalman filter with multiple interacting state space vectors. We also present a method for learning a dynamically evolving drift parameter for each location by modeling it as a geometric Brownian motion. We handle posterior intractability via a mean-field variational approximation, which also preserves tractability for downstream calculations in a manner similar to the Kalman filter. We evaluate the model on several large datasets, providing quantitative evaluation on the 10 million Movielens and 100 million Netflix datasets and qualitative evaluation on a set of 39 million stock returns divided across roughly 6,500 companies from the years 1962-2014.
1501.04981
Manuel Moussallam
Manuel Moussallam and Antoine Liutkus and Laurent Daudet
Listening to features
Technical Report
null
null
null
cs.SD
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This work explores nonparametric methods which aim at synthesizing audio from low-dimensionnal acoustic features typically used in MIR frameworks. Several issues prevent this task to be straightforwardly achieved. Such features are designed for analysis and not for synthesis, thus favoring high-level description over easily inverted acoustic representation. Whereas some previous studies already considered the problem of synthesizing audio from features such as Mel-Frequency Cepstral Coefficients, they mainly relied on the explicit formula used to compute those features in order to inverse them. Here, we instead adopt a simple blind approach, where arbitrary sets of features can be used during synthesis and where reconstruction is exemplar-based. After testing the approach on a speech synthesis from well known features problem, we apply it to the more complex task of inverting songs from the Million Song Dataset. What makes this task harder is twofold. First, that features are irregularly spaced in the temporal domain according to an onset-based segmentation. Second the exact method used to compute these features is unknown, although the features for new audio can be computed using their API as a black-box. In this paper, we detail these difficulties and present a framework to nonetheless attempting such synthesis by concatenating audio samples from a training dataset, whose features have been computed beforehand. Samples are selected at the segment level, in the feature space with a simple nearest neighbor search. Additionnal constraints can then be defined to enhance the synthesis pertinence. Preliminary experiments are presented using RWC and GTZAN audio datasets to synthesize tracks from the Million Song Dataset.
[ { "version": "v1", "created": "Mon, 19 Jan 2015 19:41:35 GMT" } ]
2015-01-22T00:00:00
[ [ "Moussallam", "Manuel", "" ], [ "Liutkus", "Antoine", "" ], [ "Daudet", "Laurent", "" ] ]
TITLE: Listening to features ABSTRACT: This work explores nonparametric methods which aim at synthesizing audio from low-dimensionnal acoustic features typically used in MIR frameworks. Several issues prevent this task to be straightforwardly achieved. Such features are designed for analysis and not for synthesis, thus favoring high-level description over easily inverted acoustic representation. Whereas some previous studies already considered the problem of synthesizing audio from features such as Mel-Frequency Cepstral Coefficients, they mainly relied on the explicit formula used to compute those features in order to inverse them. Here, we instead adopt a simple blind approach, where arbitrary sets of features can be used during synthesis and where reconstruction is exemplar-based. After testing the approach on a speech synthesis from well known features problem, we apply it to the more complex task of inverting songs from the Million Song Dataset. What makes this task harder is twofold. First, that features are irregularly spaced in the temporal domain according to an onset-based segmentation. Second the exact method used to compute these features is unknown, although the features for new audio can be computed using their API as a black-box. In this paper, we detail these difficulties and present a framework to nonetheless attempting such synthesis by concatenating audio samples from a training dataset, whose features have been computed beforehand. Samples are selected at the segment level, in the feature space with a simple nearest neighbor search. Additionnal constraints can then be defined to enhance the synthesis pertinence. Preliminary experiments are presented using RWC and GTZAN audio datasets to synthesize tracks from the Million Song Dataset.
1501.05132
Catarina Moreira
Catarina Moreira and Bruno Martins and P\'avel Calado
Learning to Rank Academic Experts in the DBLP Dataset
Expert Systems, 2013. arXiv admin note: text overlap with arXiv:1302.0413
null
10.1111/exsy.12062
null
cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Expert finding is an information retrieval task that is concerned with the search for the most knowledgeable people with respect to a specific topic, and the search is based on documents that describe people's activities. The task involves taking a user query as input and returning a list of people who are sorted by their level of expertise with respect to the user query. Despite recent interest in the area, the current state-of-the-art techniques lack in principled approaches for optimally combining different sources of evidence. This article proposes two frameworks for combining multiple estimators of expertise. These estimators are derived from textual contents, from graph-structure of the citation patterns for the community of experts, and from profile information about the experts. More specifically, this article explores the use of supervised learning to rank methods, as well as rank aggregation approaches, for combing all of the estimators of expertise. Several supervised learning algorithms, which are representative of the pointwise, pairwise and listwise approaches, were tested, and various state-of-the-art data fusion techniques were also explored for the rank aggregation framework. Experiments that were performed on a dataset of academic publications from the Computer Science domain attest the adequacy of the proposed approaches.
[ { "version": "v1", "created": "Wed, 21 Jan 2015 11:25:33 GMT" } ]
2015-01-22T00:00:00
[ [ "Moreira", "Catarina", "" ], [ "Martins", "Bruno", "" ], [ "Calado", "Pável", "" ] ]
TITLE: Learning to Rank Academic Experts in the DBLP Dataset ABSTRACT: Expert finding is an information retrieval task that is concerned with the search for the most knowledgeable people with respect to a specific topic, and the search is based on documents that describe people's activities. The task involves taking a user query as input and returning a list of people who are sorted by their level of expertise with respect to the user query. Despite recent interest in the area, the current state-of-the-art techniques lack in principled approaches for optimally combining different sources of evidence. This article proposes two frameworks for combining multiple estimators of expertise. These estimators are derived from textual contents, from graph-structure of the citation patterns for the community of experts, and from profile information about the experts. More specifically, this article explores the use of supervised learning to rank methods, as well as rank aggregation approaches, for combing all of the estimators of expertise. Several supervised learning algorithms, which are representative of the pointwise, pairwise and listwise approaches, were tested, and various state-of-the-art data fusion techniques were also explored for the rank aggregation framework. Experiments that were performed on a dataset of academic publications from the Computer Science domain attest the adequacy of the proposed approaches.
1501.05279
Wojciech Czarnecki
Wojciech Marian Czarnecki, Jacek Tabor
Extreme Entropy Machines: Robust information theoretic classification
null
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Most of the existing classification methods are aimed at minimization of empirical risk (through some simple point-based error measured with loss function) with added regularization. We propose to approach this problem in a more information theoretic way by investigating applicability of entropy measures as a classification model objective function. We focus on quadratic Renyi's entropy and connected Cauchy-Schwarz Divergence which leads to the construction of Extreme Entropy Machines (EEM). The main contribution of this paper is proposing a model based on the information theoretic concepts which on the one hand shows new, entropic perspective on known linear classifiers and on the other leads to a construction of very robust method competetitive with the state of the art non-information theoretic ones (including Support Vector Machines and Extreme Learning Machines). Evaluation on numerous problems spanning from small, simple ones from UCI repository to the large (hundreads of thousands of samples) extremely unbalanced (up to 100:1 classes' ratios) datasets shows wide applicability of the EEM in real life problems and that it scales well.
[ { "version": "v1", "created": "Wed, 21 Jan 2015 19:54:26 GMT" } ]
2015-01-22T00:00:00
[ [ "Czarnecki", "Wojciech Marian", "" ], [ "Tabor", "Jacek", "" ] ]
TITLE: Extreme Entropy Machines: Robust information theoretic classification ABSTRACT: Most of the existing classification methods are aimed at minimization of empirical risk (through some simple point-based error measured with loss function) with added regularization. We propose to approach this problem in a more information theoretic way by investigating applicability of entropy measures as a classification model objective function. We focus on quadratic Renyi's entropy and connected Cauchy-Schwarz Divergence which leads to the construction of Extreme Entropy Machines (EEM). The main contribution of this paper is proposing a model based on the information theoretic concepts which on the one hand shows new, entropic perspective on known linear classifiers and on the other leads to a construction of very robust method competetitive with the state of the art non-information theoretic ones (including Support Vector Machines and Extreme Learning Machines). Evaluation on numerous problems spanning from small, simple ones from UCI repository to the large (hundreads of thousands of samples) extremely unbalanced (up to 100:1 classes' ratios) datasets shows wide applicability of the EEM in real life problems and that it scales well.
1403.2307
Sudip Roy Sudip Roy
Sudip Roy, Lucja Kot, Gabriel Bender, Bailu Ding, Hossein Hojjat, Christoph Koch, Nate Foster, Johannes Gehrke
The Homeostasis Protocol: Avoiding Transaction Coordination Through Program Analysis
null
null
null
null
cs.DB
http://creativecommons.org/licenses/by-nc-sa/3.0/
Datastores today rely on distribution and replication to achieve improved performance and fault-tolerance. But correctness of many applications depends on strong consistency properties - something that can impose substantial overheads, since it requires coordinating the behavior of multiple nodes. This paper describes a new approach to achieving strong consistency in distributed systems while minimizing communication between nodes. The key insight is to allow the state of the system to be inconsistent during execution, as long as this inconsistency is bounded and does not affect transaction correctness. In contrast to previous work, our approach uses program analysis to extract semantic information about permissible levels of inconsistency and is fully automated. We then employ a novel homeostasis protocol to allow sites to operate independently, without communicating, as long as any inconsistency is governed by appropriate treaties between the nodes. We discuss mechanisms for optimizing treaties based on workload characteristics to minimize communication, as well as a prototype implementation and experiments that demonstrate the benefits of our approach on common transactional benchmarks.
[ { "version": "v1", "created": "Mon, 10 Mar 2014 17:12:09 GMT" }, { "version": "v2", "created": "Tue, 20 Jan 2015 02:54:07 GMT" } ]
2015-01-21T00:00:00
[ [ "Roy", "Sudip", "" ], [ "Kot", "Lucja", "" ], [ "Bender", "Gabriel", "" ], [ "Ding", "Bailu", "" ], [ "Hojjat", "Hossein", "" ], [ "Koch", "Christoph", "" ], [ "Foster", "Nate", "" ], [ "Gehrke", "Johannes", "" ] ]
TITLE: The Homeostasis Protocol: Avoiding Transaction Coordination Through Program Analysis ABSTRACT: Datastores today rely on distribution and replication to achieve improved performance and fault-tolerance. But correctness of many applications depends on strong consistency properties - something that can impose substantial overheads, since it requires coordinating the behavior of multiple nodes. This paper describes a new approach to achieving strong consistency in distributed systems while minimizing communication between nodes. The key insight is to allow the state of the system to be inconsistent during execution, as long as this inconsistency is bounded and does not affect transaction correctness. In contrast to previous work, our approach uses program analysis to extract semantic information about permissible levels of inconsistency and is fully automated. We then employ a novel homeostasis protocol to allow sites to operate independently, without communicating, as long as any inconsistency is governed by appropriate treaties between the nodes. We discuss mechanisms for optimizing treaties based on workload characteristics to minimize communication, as well as a prototype implementation and experiments that demonstrate the benefits of our approach on common transactional benchmarks.
1403.6888
Nenad Marku\v{s}
Nenad Marku\v{s} and Miroslav Frljak and Igor S. Pand\v{z}i\'c and J\"orgen Ahlberg and Robert Forchheimer
Fast Localization of Facial Landmark Points
null
Proceedings of the Croatian Compter Vision Workshop, 2014
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Localization of salient facial landmark points, such as eye corners or the tip of the nose, is still considered a challenging computer vision problem despite recent efforts. This is especially evident in unconstrained environments, i.e., in the presence of background clutter and large head pose variations. Most methods that achieve state-of-the-art accuracy are slow, and, thus, have limited applications. We describe a method that can accurately estimate the positions of relevant facial landmarks in real-time even on hardware with limited processing power, such as mobile devices. This is achieved with a sequence of estimators based on ensembles of regression trees. The trees use simple pixel intensity comparisons in their internal nodes and this makes them able to process image regions very fast. We test the developed system on several publicly available datasets and analyse its processing speed on various devices. Experimental results show that our method has practical value.
[ { "version": "v1", "created": "Wed, 26 Mar 2014 23:12:08 GMT" }, { "version": "v2", "created": "Tue, 20 Jan 2015 12:19:05 GMT" } ]
2015-01-21T00:00:00
[ [ "Markuš", "Nenad", "" ], [ "Frljak", "Miroslav", "" ], [ "Pandžić", "Igor S.", "" ], [ "Ahlberg", "Jörgen", "" ], [ "Forchheimer", "Robert", "" ] ]
TITLE: Fast Localization of Facial Landmark Points ABSTRACT: Localization of salient facial landmark points, such as eye corners or the tip of the nose, is still considered a challenging computer vision problem despite recent efforts. This is especially evident in unconstrained environments, i.e., in the presence of background clutter and large head pose variations. Most methods that achieve state-of-the-art accuracy are slow, and, thus, have limited applications. We describe a method that can accurately estimate the positions of relevant facial landmarks in real-time even on hardware with limited processing power, such as mobile devices. This is achieved with a sequence of estimators based on ensembles of regression trees. The trees use simple pixel intensity comparisons in their internal nodes and this makes them able to process image regions very fast. We test the developed system on several publicly available datasets and analyse its processing speed on various devices. Experimental results show that our method has practical value.
1406.7806
Andrew Maas
Andrew L. Maas, Peng Qi, Ziang Xie, Awni Y. Hannun, Christopher T. Lengerich, Daniel Jurafsky and Andrew Y. Ng
Building DNN Acoustic Models for Large Vocabulary Speech Recognition
null
null
null
null
cs.CL cs.LG cs.NE stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Deep neural networks (DNNs) are now a central component of nearly all state-of-the-art speech recognition systems. Building neural network acoustic models requires several design decisions including network architecture, size, and training loss function. This paper offers an empirical investigation on which aspects of DNN acoustic model design are most important for speech recognition system performance. We report DNN classifier performance and final speech recognizer word error rates, and compare DNNs using several metrics to quantify factors influencing differences in task performance. Our first set of experiments use the standard Switchboard benchmark corpus, which contains approximately 300 hours of conversational telephone speech. We compare standard DNNs to convolutional networks, and present the first experiments using locally-connected, untied neural networks for acoustic modeling. We additionally build systems on a corpus of 2,100 hours of training data by combining the Switchboard and Fisher corpora. This larger corpus allows us to more thoroughly examine performance of large DNN models -- with up to ten times more parameters than those typically used in speech recognition systems. Our results suggest that a relatively simple DNN architecture and optimization technique produces strong results. These findings, along with previous work, help establish a set of best practices for building DNN hybrid speech recognition systems with maximum likelihood training. Our experiments in DNN optimization additionally serve as a case study for training DNNs with discriminative loss functions for speech tasks, as well as DNN classifiers more generally.
[ { "version": "v1", "created": "Mon, 30 Jun 2014 16:42:25 GMT" }, { "version": "v2", "created": "Tue, 20 Jan 2015 07:44:15 GMT" } ]
2015-01-21T00:00:00
[ [ "Maas", "Andrew L.", "" ], [ "Qi", "Peng", "" ], [ "Xie", "Ziang", "" ], [ "Hannun", "Awni Y.", "" ], [ "Lengerich", "Christopher T.", "" ], [ "Jurafsky", "Daniel", "" ], [ "Ng", "Andrew Y.", "" ] ]
TITLE: Building DNN Acoustic Models for Large Vocabulary Speech Recognition ABSTRACT: Deep neural networks (DNNs) are now a central component of nearly all state-of-the-art speech recognition systems. Building neural network acoustic models requires several design decisions including network architecture, size, and training loss function. This paper offers an empirical investigation on which aspects of DNN acoustic model design are most important for speech recognition system performance. We report DNN classifier performance and final speech recognizer word error rates, and compare DNNs using several metrics to quantify factors influencing differences in task performance. Our first set of experiments use the standard Switchboard benchmark corpus, which contains approximately 300 hours of conversational telephone speech. We compare standard DNNs to convolutional networks, and present the first experiments using locally-connected, untied neural networks for acoustic modeling. We additionally build systems on a corpus of 2,100 hours of training data by combining the Switchboard and Fisher corpora. This larger corpus allows us to more thoroughly examine performance of large DNN models -- with up to ten times more parameters than those typically used in speech recognition systems. Our results suggest that a relatively simple DNN architecture and optimization technique produces strong results. These findings, along with previous work, help establish a set of best practices for building DNN hybrid speech recognition systems with maximum likelihood training. Our experiments in DNN optimization additionally serve as a case study for training DNNs with discriminative loss functions for speech tasks, as well as DNN classifiers more generally.
1501.04675
Zhi Liu
Zhi Liu, Yan Huang
Community Detection from Location-Tagged Networks
null
null
null
null
cs.SI physics.soc-ph
http://creativecommons.org/licenses/publicdomain/
Many real world systems or web services can be represented as a network such as social networks and transportation networks. In the past decade, many algorithms have been developed to detect the communities in a network using connections between nodes. However in many real world networks, the locations of nodes have great influence on the community structure. For example, in a social network, more connections are established between geographically proximate users. The impact of locations on community has not been fully investigated by the research literature. In this paper, we propose a community detection method which takes locations of nodes into consideration. The goal is to detect communities with both geographic proximity and network closeness. We analyze the distribution of the distances between connected and unconnected nodes to measure the influence of location on the network structure on two real location-tagged social networks. We propose a method to determine if a location-based community detection method is suitable for a given network. We propose a new community detection algorithm that pushes the location information into the community detection. We test our proposed method on both synthetic data and real world network datasets. The results show that the communities detected by our method distribute in a smaller area compared with the traditional methods and have the similar or higher tightness on network connections.
[ { "version": "v1", "created": "Mon, 19 Jan 2015 23:37:40 GMT" } ]
2015-01-21T00:00:00
[ [ "Liu", "Zhi", "" ], [ "Huang", "Yan", "" ] ]
TITLE: Community Detection from Location-Tagged Networks ABSTRACT: Many real world systems or web services can be represented as a network such as social networks and transportation networks. In the past decade, many algorithms have been developed to detect the communities in a network using connections between nodes. However in many real world networks, the locations of nodes have great influence on the community structure. For example, in a social network, more connections are established between geographically proximate users. The impact of locations on community has not been fully investigated by the research literature. In this paper, we propose a community detection method which takes locations of nodes into consideration. The goal is to detect communities with both geographic proximity and network closeness. We analyze the distribution of the distances between connected and unconnected nodes to measure the influence of location on the network structure on two real location-tagged social networks. We propose a method to determine if a location-based community detection method is suitable for a given network. We propose a new community detection algorithm that pushes the location information into the community detection. We test our proposed method on both synthetic data and real world network datasets. The results show that the communities detected by our method distribute in a smaller area compared with the traditional methods and have the similar or higher tightness on network connections.
1501.04686
Pichao Wang
Pichao Wang, Wanqing Li, Zhimin Gao, Jing Zhang, Chang Tang and Philip Ogunbona
Deep Convolutional Neural Networks for Action Recognition Using Depth Map Sequences
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recently, deep learning approach has achieved promising results in various fields of computer vision. In this paper, a new framework called Hierarchical Depth Motion Maps (HDMM) + 3 Channel Deep Convolutional Neural Networks (3ConvNets) is proposed for human action recognition using depth map sequences. Firstly, we rotate the original depth data in 3D pointclouds to mimic the rotation of cameras, so that our algorithms can handle view variant cases. Secondly, in order to effectively extract the body shape and motion information, we generate weighted depth motion maps (DMM) at several temporal scales, referred to as Hierarchical Depth Motion Maps (HDMM). Then, three channels of ConvNets are trained on the HDMMs from three projected orthogonal planes separately. The proposed algorithms are evaluated on MSRAction3D, MSRAction3DExt, UTKinect-Action and MSRDailyActivity3D datasets respectively. We also combine the last three datasets into a larger one (called Combined Dataset) and test the proposed method on it. The results show that our approach can achieve state-of-the-art results on the individual datasets and without dramatical performance degradation on the Combined Dataset.
[ { "version": "v1", "created": "Tue, 20 Jan 2015 00:46:10 GMT" } ]
2015-01-21T00:00:00
[ [ "Wang", "Pichao", "" ], [ "Li", "Wanqing", "" ], [ "Gao", "Zhimin", "" ], [ "Zhang", "Jing", "" ], [ "Tang", "Chang", "" ], [ "Ogunbona", "Philip", "" ] ]
TITLE: Deep Convolutional Neural Networks for Action Recognition Using Depth Map Sequences ABSTRACT: Recently, deep learning approach has achieved promising results in various fields of computer vision. In this paper, a new framework called Hierarchical Depth Motion Maps (HDMM) + 3 Channel Deep Convolutional Neural Networks (3ConvNets) is proposed for human action recognition using depth map sequences. Firstly, we rotate the original depth data in 3D pointclouds to mimic the rotation of cameras, so that our algorithms can handle view variant cases. Secondly, in order to effectively extract the body shape and motion information, we generate weighted depth motion maps (DMM) at several temporal scales, referred to as Hierarchical Depth Motion Maps (HDMM). Then, three channels of ConvNets are trained on the HDMMs from three projected orthogonal planes separately. The proposed algorithms are evaluated on MSRAction3D, MSRAction3DExt, UTKinect-Action and MSRDailyActivity3D datasets respectively. We also combine the last three datasets into a larger one (called Combined Dataset) and test the proposed method on it. The results show that our approach can achieve state-of-the-art results on the individual datasets and without dramatical performance degradation on the Combined Dataset.
1501.04690
Erjin Zhou
Erjin Zhou, Zhimin Cao, Qi Yin
Naive-Deep Face Recognition: Touching the Limit of LFW Benchmark or Not?
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Face recognition performance improves rapidly with the recent deep learning technique developing and underlying large training dataset accumulating. In this paper, we report our observations on how big data impacts the recognition performance. According to these observations, we build our Megvii Face Recognition System, which achieves 99.50% accuracy on the LFW benchmark, outperforming the previous state-of-the-art. Furthermore, we report the performance in a real-world security certification scenario. There still exists a clear gap between machine recognition and human performance. We summarize our experiments and present three challenges lying ahead in recent face recognition. And we indicate several possible solutions towards these challenges. We hope our work will stimulate the community's discussion of the difference between research benchmark and real-world applications.
[ { "version": "v1", "created": "Tue, 20 Jan 2015 01:15:02 GMT" } ]
2015-01-21T00:00:00
[ [ "Zhou", "Erjin", "" ], [ "Cao", "Zhimin", "" ], [ "Yin", "Qi", "" ] ]
TITLE: Naive-Deep Face Recognition: Touching the Limit of LFW Benchmark or Not? ABSTRACT: Face recognition performance improves rapidly with the recent deep learning technique developing and underlying large training dataset accumulating. In this paper, we report our observations on how big data impacts the recognition performance. According to these observations, we build our Megvii Face Recognition System, which achieves 99.50% accuracy on the LFW benchmark, outperforming the previous state-of-the-art. Furthermore, we report the performance in a real-world security certification scenario. There still exists a clear gap between machine recognition and human performance. We summarize our experiments and present three challenges lying ahead in recent face recognition. And we indicate several possible solutions towards these challenges. We hope our work will stimulate the community's discussion of the difference between research benchmark and real-world applications.
1501.04717
Yuting Zhang
Yuting Zhang, Kui Jia, Yueming Wang, Gang Pan, Tsung-Han Chan, Yi Ma
Robust Face Recognition by Constrained Part-based Alignment
null
null
null
null
cs.CV cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Developing a reliable and practical face recognition system is a long-standing goal in computer vision research. Existing literature suggests that pixel-wise face alignment is the key to achieve high-accuracy face recognition. By assuming a human face as piece-wise planar surfaces, where each surface corresponds to a facial part, we develop in this paper a Constrained Part-based Alignment (CPA) algorithm for face recognition across pose and/or expression. Our proposed algorithm is based on a trainable CPA model, which learns appearance evidence of individual parts and a tree-structured shape configuration among different parts. Given a probe face, CPA simultaneously aligns all its parts by fitting them to the appearance evidence with consideration of the constraint from the tree-structured shape configuration. This objective is formulated as a norm minimization problem regularized by graph likelihoods. CPA can be easily integrated with many existing classifiers to perform part-based face recognition. Extensive experiments on benchmark face datasets show that CPA outperforms or is on par with existing methods for robust face recognition across pose, expression, and/or illumination changes.
[ { "version": "v1", "created": "Tue, 20 Jan 2015 06:05:01 GMT" } ]
2015-01-21T00:00:00
[ [ "Zhang", "Yuting", "" ], [ "Jia", "Kui", "" ], [ "Wang", "Yueming", "" ], [ "Pan", "Gang", "" ], [ "Chan", "Tsung-Han", "" ], [ "Ma", "Yi", "" ] ]
TITLE: Robust Face Recognition by Constrained Part-based Alignment ABSTRACT: Developing a reliable and practical face recognition system is a long-standing goal in computer vision research. Existing literature suggests that pixel-wise face alignment is the key to achieve high-accuracy face recognition. By assuming a human face as piece-wise planar surfaces, where each surface corresponds to a facial part, we develop in this paper a Constrained Part-based Alignment (CPA) algorithm for face recognition across pose and/or expression. Our proposed algorithm is based on a trainable CPA model, which learns appearance evidence of individual parts and a tree-structured shape configuration among different parts. Given a probe face, CPA simultaneously aligns all its parts by fitting them to the appearance evidence with consideration of the constraint from the tree-structured shape configuration. This objective is formulated as a norm minimization problem regularized by graph likelihoods. CPA can be easily integrated with many existing classifiers to perform part-based face recognition. Extensive experiments on benchmark face datasets show that CPA outperforms or is on par with existing methods for robust face recognition across pose, expression, and/or illumination changes.
1501.04725
Siddharth Krishna
Siddharth Krishna, Christian Puhrsch, Thomas Wies
Learning Invariants using Decision Trees
15 pages, 2 figures
null
null
null
cs.PL cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The problem of inferring an inductive invariant for verifying program safety can be formulated in terms of binary classification. This is a standard problem in machine learning: given a sample of good and bad points, one is asked to find a classifier that generalizes from the sample and separates the two sets. Here, the good points are the reachable states of the program, and the bad points are those that reach a safety property violation. Thus, a learned classifier is a candidate invariant. In this paper, we propose a new algorithm that uses decision trees to learn candidate invariants in the form of arbitrary Boolean combinations of numerical inequalities. We have used our algorithm to verify C programs taken from the literature. The algorithm is able to infer safe invariants for a range of challenging benchmarks and compares favorably to other ML-based invariant inference techniques. In particular, it scales well to large sample sets.
[ { "version": "v1", "created": "Tue, 20 Jan 2015 07:20:30 GMT" } ]
2015-01-21T00:00:00
[ [ "Krishna", "Siddharth", "" ], [ "Puhrsch", "Christian", "" ], [ "Wies", "Thomas", "" ] ]
TITLE: Learning Invariants using Decision Trees ABSTRACT: The problem of inferring an inductive invariant for verifying program safety can be formulated in terms of binary classification. This is a standard problem in machine learning: given a sample of good and bad points, one is asked to find a classifier that generalizes from the sample and separates the two sets. Here, the good points are the reachable states of the program, and the bad points are those that reach a safety property violation. Thus, a learned classifier is a candidate invariant. In this paper, we propose a new algorithm that uses decision trees to learn candidate invariants in the form of arbitrary Boolean combinations of numerical inequalities. We have used our algorithm to verify C programs taken from the literature. The algorithm is able to infer safe invariants for a range of challenging benchmarks and compares favorably to other ML-based invariant inference techniques. In particular, it scales well to large sample sets.
1306.3284
Edith Cohen
Edith Cohen
All-Distances Sketches, Revisited: HIP Estimators for Massive Graphs Analysis
16 pages, 3 figures, extended version of a PODS 2014 paper
null
null
null
cs.DS cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Graph datasets with billions of edges, such as social and Web graphs, are prevalent, and scalable computation is critical. All-distances sketches (ADS) [Cohen 1997], are a powerful tool for scalable approximation of statistics. The sketch is a small size sample of the distance relation of a node which emphasizes closer nodes. Sketches for all nodes are computed using a nearly linear computation and estimators are applied to sketches of nodes to estimate their properties. We provide, for the first time, a unified exposition of ADS algorithms and applications. We present the Historic Inverse Probability (HIP) estimators which are applied to the ADS of a node to estimate a large natural class of statistics. For the important special cases of neighborhood cardinalities (the number of nodes within some query distance) and closeness centralities, HIP estimators have at most half the variance of previous estimators and we show that this is essentially optimal. Moreover, HIP obtains a polynomial improvement for more general statistics and the estimators are simple, flexible, unbiased, and elegant. For approximate distinct counting on data streams, HIP outperforms the original estimators for the HyperLogLog MinHash sketches (Flajolet et al. 2007), obtaining significantly improved estimation quality for this state-of-the-art practical algorithm.
[ { "version": "v1", "created": "Fri, 14 Jun 2013 03:33:05 GMT" }, { "version": "v2", "created": "Fri, 19 Jul 2013 12:01:34 GMT" }, { "version": "v3", "created": "Wed, 4 Dec 2013 00:54:09 GMT" }, { "version": "v4", "created": "Wed, 11 Dec 2013 05:36:59 GMT" }, { "version": "v5", "created": "Wed, 23 Apr 2014 23:09:46 GMT" }, { "version": "v6", "created": "Wed, 5 Nov 2014 06:11:04 GMT" }, { "version": "v7", "created": "Sat, 17 Jan 2015 07:55:41 GMT" } ]
2015-01-20T00:00:00
[ [ "Cohen", "Edith", "" ] ]
TITLE: All-Distances Sketches, Revisited: HIP Estimators for Massive Graphs Analysis ABSTRACT: Graph datasets with billions of edges, such as social and Web graphs, are prevalent, and scalable computation is critical. All-distances sketches (ADS) [Cohen 1997], are a powerful tool for scalable approximation of statistics. The sketch is a small size sample of the distance relation of a node which emphasizes closer nodes. Sketches for all nodes are computed using a nearly linear computation and estimators are applied to sketches of nodes to estimate their properties. We provide, for the first time, a unified exposition of ADS algorithms and applications. We present the Historic Inverse Probability (HIP) estimators which are applied to the ADS of a node to estimate a large natural class of statistics. For the important special cases of neighborhood cardinalities (the number of nodes within some query distance) and closeness centralities, HIP estimators have at most half the variance of previous estimators and we show that this is essentially optimal. Moreover, HIP obtains a polynomial improvement for more general statistics and the estimators are simple, flexible, unbiased, and elegant. For approximate distinct counting on data streams, HIP outperforms the original estimators for the HyperLogLog MinHash sketches (Flajolet et al. 2007), obtaining significantly improved estimation quality for this state-of-the-art practical algorithm.
1501.04277
Canyi Lu
Canyi Lu, Jinhui Tang, Min Lin, Liang Lin, Shuicheng Yan, and Zhouchen Lin
Correntropy Induced L2 Graph for Robust Subspace Clustering
International Conference on Computer Vision (ICCV), 2013
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we study the robust subspace clustering problem, which aims to cluster the given possibly noisy data points into their underlying subspaces. A large pool of previous subspace clustering methods focus on the graph construction by different regularization of the representation coefficient. We instead focus on the robustness of the model to non-Gaussian noises. We propose a new robust clustering method by using the correntropy induced metric, which is robust for handling the non-Gaussian and impulsive noises. Also we further extend the method for handling the data with outlier rows/features. The multiplicative form of half-quadratic optimization is used to optimize the non-convex correntropy objective function of the proposed models. Extensive experiments on face datasets well demonstrate that the proposed methods are more robust to corruptions and occlusions.
[ { "version": "v1", "created": "Sun, 18 Jan 2015 10:06:55 GMT" } ]
2015-01-20T00:00:00
[ [ "Lu", "Canyi", "" ], [ "Tang", "Jinhui", "" ], [ "Lin", "Min", "" ], [ "Lin", "Liang", "" ], [ "Yan", "Shuicheng", "" ], [ "Lin", "Zhouchen", "" ] ]
TITLE: Correntropy Induced L2 Graph for Robust Subspace Clustering ABSTRACT: In this paper, we study the robust subspace clustering problem, which aims to cluster the given possibly noisy data points into their underlying subspaces. A large pool of previous subspace clustering methods focus on the graph construction by different regularization of the representation coefficient. We instead focus on the robustness of the model to non-Gaussian noises. We propose a new robust clustering method by using the correntropy induced metric, which is robust for handling the non-Gaussian and impulsive noises. Also we further extend the method for handling the data with outlier rows/features. The multiplicative form of half-quadratic optimization is used to optimize the non-convex correntropy objective function of the proposed models. Extensive experiments on face datasets well demonstrate that the proposed methods are more robust to corruptions and occlusions.
1501.04281
Pankaj Pansari
Pankaj Pansari, C. Rajagopalan, Ramasubramanian Sundararajan
Grouping Entities in a Fleet by Community Detection in Network of Regression Models
8 pages, 4 figures
null
null
null
cs.SI physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper deals with grouping of entities in a fleet based on their behavior. The behavior of each entity is characterized by its historical dataset, which comprises a dependent variable, typically a performance measure, and multiple independent variables, typically operating conditions. A regression model built using this dataset is used as a proxy for the behavior of an entity. The validation error of the model of one unit with respect to the dataset of another unit is used as a measure of the difference in behavior between two units. Grouping entities based on their behavior is posed as a graph clustering problem with nodes representing regression models and edge weights given by the validation errors. Specifically, we find communities in this graph, having dense edge connections within and sparse connections outside. A way to assess the goodness of grouping and finding the optimum number of divisions is proposed. The algorithm and measures proposed are illustrated with application to synthetic data.
[ { "version": "v1", "created": "Sun, 18 Jan 2015 11:24:26 GMT" } ]
2015-01-20T00:00:00
[ [ "Pansari", "Pankaj", "" ], [ "Rajagopalan", "C.", "" ], [ "Sundararajan", "Ramasubramanian", "" ] ]
TITLE: Grouping Entities in a Fleet by Community Detection in Network of Regression Models ABSTRACT: This paper deals with grouping of entities in a fleet based on their behavior. The behavior of each entity is characterized by its historical dataset, which comprises a dependent variable, typically a performance measure, and multiple independent variables, typically operating conditions. A regression model built using this dataset is used as a proxy for the behavior of an entity. The validation error of the model of one unit with respect to the dataset of another unit is used as a measure of the difference in behavior between two units. Grouping entities based on their behavior is posed as a graph clustering problem with nodes representing regression models and edge weights given by the validation errors. Specifically, we find communities in this graph, having dense edge connections within and sparse connections outside. A way to assess the goodness of grouping and finding the optimum number of divisions is proposed. The algorithm and measures proposed are illustrated with application to synthetic data.
1501.04325
Lars Maaloe
Lars Maaloe and Morten Arngren and Ole Winther
Deep Belief Nets for Topic Modeling
Accepted to the ICML-2014 Workshop on Knowledge-Powered Deep Learning for Text Mining
null
null
null
cs.CL cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Applying traditional collaborative filtering to digital publishing is challenging because user data is very sparse due to the high volume of documents relative to the number of users. Content based approaches, on the other hand, is attractive because textual content is often very informative. In this paper we describe large-scale content based collaborative filtering for digital publishing. To solve the digital publishing recommender problem we compare two approaches: latent Dirichlet allocation (LDA) and deep belief nets (DBN) that both find low-dimensional latent representations for documents. Efficient retrieval can be carried out in the latent representation. We work both on public benchmarks and digital media content provided by Issuu, an online publishing platform. This article also comes with a newly developed deep belief nets toolbox for topic modeling tailored towards performance evaluation of the DBN model and comparisons to the LDA model.
[ { "version": "v1", "created": "Sun, 18 Jan 2015 17:12:59 GMT" } ]
2015-01-20T00:00:00
[ [ "Maaloe", "Lars", "" ], [ "Arngren", "Morten", "" ], [ "Winther", "Ole", "" ] ]
TITLE: Deep Belief Nets for Topic Modeling ABSTRACT: Applying traditional collaborative filtering to digital publishing is challenging because user data is very sparse due to the high volume of documents relative to the number of users. Content based approaches, on the other hand, is attractive because textual content is often very informative. In this paper we describe large-scale content based collaborative filtering for digital publishing. To solve the digital publishing recommender problem we compare two approaches: latent Dirichlet allocation (LDA) and deep belief nets (DBN) that both find low-dimensional latent representations for documents. Efficient retrieval can be carried out in the latent representation. We work both on public benchmarks and digital media content provided by Issuu, an online publishing platform. This article also comes with a newly developed deep belief nets toolbox for topic modeling tailored towards performance evaluation of the DBN model and comparisons to the LDA model.
1501.04552
Benson Muite
S. Aseeri and O. Batra\v{s}ev and M. Icardi and B. Leu and A. Liu and N. Li and B.K. Muite and E. M\"uller and B. Palen and M. Quell and H. Servat and P. Sheth and R. Speck and M. Van Moer and J. Vienne
Solving the Klein-Gordon equation using Fourier spectral methods: A benchmark test for computer performance
10 pages
null
null
null
cs.PF cs.DC math.NA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The cubic Klein-Gordon equation is a simple but non-trivial partial differential equation whose numerical solution has the main building blocks required for the solution of many other partial differential equations. In this study, the library 2DECOMP&FFT is used in a Fourier spectral scheme to solve the Klein-Gordon equation and strong scaling of the code is examined on thirteen different machines for a problem size of 512^3. The results are useful in assessing likely performance of other parallel fast Fourier transform based programs for solving partial differential equations. The problem is chosen to be large enough to solve on a workstation, yet also of interest to solve quickly on a supercomputer, in particular for parametric studies. Unlike other high performance computing benchmarks, for this problem size, the time to solution will not be improved by simply building a bigger supercomputer.
[ { "version": "v1", "created": "Mon, 19 Jan 2015 16:48:00 GMT" } ]
2015-01-20T00:00:00
[ [ "Aseeri", "S.", "" ], [ "Batrašev", "O.", "" ], [ "Icardi", "M.", "" ], [ "Leu", "B.", "" ], [ "Liu", "A.", "" ], [ "Li", "N.", "" ], [ "Muite", "B. K.", "" ], [ "Müller", "E.", "" ], [ "Palen", "B.", "" ], [ "Quell", "M.", "" ], [ "Servat", "H.", "" ], [ "Sheth", "P.", "" ], [ "Speck", "R.", "" ], [ "Van Moer", "M.", "" ], [ "Vienne", "J.", "" ] ]
TITLE: Solving the Klein-Gordon equation using Fourier spectral methods: A benchmark test for computer performance ABSTRACT: The cubic Klein-Gordon equation is a simple but non-trivial partial differential equation whose numerical solution has the main building blocks required for the solution of many other partial differential equations. In this study, the library 2DECOMP&FFT is used in a Fourier spectral scheme to solve the Klein-Gordon equation and strong scaling of the code is examined on thirteen different machines for a problem size of 512^3. The results are useful in assessing likely performance of other parallel fast Fourier transform based programs for solving partial differential equations. The problem is chosen to be large enough to solve on a workstation, yet also of interest to solve quickly on a supercomputer, in particular for parametric studies. Unlike other high performance computing benchmarks, for this problem size, the time to solution will not be improved by simply building a bigger supercomputer.
1407.3121
Jeroen Keiren
Jeroen J.A. Keiren
Benchmarks for Parity Games (extended version)
The corresponding tool and benchmarks are available from https://github.com/jkeiren/paritygame-generator. This is an extended version of the paper that has been accepted for FSEN 2015
null
null
null
cs.LO cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a benchmark suite for parity games that includes all benchmarks that have been used in the literature, and make it available online. We give an overview of the parity games, including a description of how they have been generated. We also describe structural properties of parity games, and using these properties we show that our benchmarks are representative. With this work we provide a starting point for further experimentation with parity games.
[ { "version": "v1", "created": "Fri, 11 Jul 2014 11:45:25 GMT" }, { "version": "v2", "created": "Fri, 16 Jan 2015 14:05:32 GMT" } ]
2015-01-19T00:00:00
[ [ "Keiren", "Jeroen J. A.", "" ] ]
TITLE: Benchmarks for Parity Games (extended version) ABSTRACT: We propose a benchmark suite for parity games that includes all benchmarks that have been used in the literature, and make it available online. We give an overview of the parity games, including a description of how they have been generated. We also describe structural properties of parity games, and using these properties we show that our benchmarks are representative. With this work we provide a starting point for further experimentation with parity games.
1207.1019
Emilie Morvant
Emilie Morvant (LIF), Amaury Habrard (LAHC), St\'ephane Ayache (LIF)
PAC-Bayesian Majority Vote for Late Classifier Fusion
7 pages, Research report
null
null
null
stat.ML cs.CV cs.LG cs.MM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A lot of attention has been devoted to multimedia indexing over the past few years. In the literature, we often consider two kinds of fusion schemes: The early fusion and the late fusion. In this paper we focus on late classifier fusion, where one combines the scores of each modality at the decision level. To tackle this problem, we investigate a recent and elegant well-founded quadratic program named MinCq coming from the Machine Learning PAC-Bayes theory. MinCq looks for the weighted combination, over a set of real-valued functions seen as voters, leading to the lowest misclassification rate, while making use of the voters' diversity. We provide evidence that this method is naturally adapted to late fusion procedure. We propose an extension of MinCq by adding an order- preserving pairwise loss for ranking, helping to improve Mean Averaged Precision measure. We confirm the good behavior of the MinCq-based fusion approaches with experiments on a real image benchmark.
[ { "version": "v1", "created": "Wed, 4 Jul 2012 15:09:05 GMT" } ]
2015-01-16T00:00:00
[ [ "Morvant", "Emilie", "", "LIF" ], [ "Habrard", "Amaury", "", "LAHC" ], [ "Ayache", "Stéphane", "", "LIF" ] ]
TITLE: PAC-Bayesian Majority Vote for Late Classifier Fusion ABSTRACT: A lot of attention has been devoted to multimedia indexing over the past few years. In the literature, we often consider two kinds of fusion schemes: The early fusion and the late fusion. In this paper we focus on late classifier fusion, where one combines the scores of each modality at the decision level. To tackle this problem, we investigate a recent and elegant well-founded quadratic program named MinCq coming from the Machine Learning PAC-Bayes theory. MinCq looks for the weighted combination, over a set of real-valued functions seen as voters, leading to the lowest misclassification rate, while making use of the voters' diversity. We provide evidence that this method is naturally adapted to late fusion procedure. We propose an extension of MinCq by adding an order- preserving pairwise loss for ranking, helping to improve Mean Averaged Precision measure. We confirm the good behavior of the MinCq-based fusion approaches with experiments on a real image benchmark.
1310.6119
Christos Patsonakis
Christos Patsonakis and Mema Roussopoulos
Asynchronous Rumour Spreading in Social and Signed Topologies
10 pages, 4 figures, 5 tables
null
null
null
cs.SI physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we present an experimental analysis of the asynchronous push & pull rumour spreading protocol. This protocol is, to date, the best-performing rumour spreading protocol for simple, scalable, and robust information dissemination in distributed systems. We analyse the effect that multiple parameters have on the protocol's performance, such as using memory to avoid contacting the same neighbor twice in a row, varying the stopping criteria used by nodes to decide when to stop spreading the rumour, employing more sophisticated neighbor selection policies instead of the standard uniform random choice, and others. Prior work has focused on either providing theoretical upper bounds regarding the number of rounds needed to spread the rumour to all nodes, or, proposes improvements by adjusting isolated parameters. To our knowledge, our work is the first to study how multiple parameters affect system behaviour both in isolation and combination and under a wide range of values. Our analysis is based on experimental simulations using real-world social network datasets, thus complementing prior theoretical work to shed light on how the protocol behaves in practical, real-world systems. We also study the behaviour of the protocol on a special type of social graph, called signed networks (e.g., Slashdot and Epinions), whose links indicate stronger trust relationships. Finally, through our detailed analysis, we demonstrate how a few simple additions to the protocol can improve the total time required to inform 100% of the nodes by a maximum of 99.69% and an average of 82.37%.
[ { "version": "v1", "created": "Wed, 23 Oct 2013 06:12:54 GMT" }, { "version": "v2", "created": "Mon, 3 Feb 2014 07:37:04 GMT" }, { "version": "v3", "created": "Thu, 15 Jan 2015 10:35:53 GMT" } ]
2015-01-16T00:00:00
[ [ "Patsonakis", "Christos", "" ], [ "Roussopoulos", "Mema", "" ] ]
TITLE: Asynchronous Rumour Spreading in Social and Signed Topologies ABSTRACT: In this paper, we present an experimental analysis of the asynchronous push & pull rumour spreading protocol. This protocol is, to date, the best-performing rumour spreading protocol for simple, scalable, and robust information dissemination in distributed systems. We analyse the effect that multiple parameters have on the protocol's performance, such as using memory to avoid contacting the same neighbor twice in a row, varying the stopping criteria used by nodes to decide when to stop spreading the rumour, employing more sophisticated neighbor selection policies instead of the standard uniform random choice, and others. Prior work has focused on either providing theoretical upper bounds regarding the number of rounds needed to spread the rumour to all nodes, or, proposes improvements by adjusting isolated parameters. To our knowledge, our work is the first to study how multiple parameters affect system behaviour both in isolation and combination and under a wide range of values. Our analysis is based on experimental simulations using real-world social network datasets, thus complementing prior theoretical work to shed light on how the protocol behaves in practical, real-world systems. We also study the behaviour of the protocol on a special type of social graph, called signed networks (e.g., Slashdot and Epinions), whose links indicate stronger trust relationships. Finally, through our detailed analysis, we demonstrate how a few simple additions to the protocol can improve the total time required to inform 100% of the nodes by a maximum of 99.69% and an average of 82.37%.
1501.03210
Piyush Bansal
Piyush Bansal, Romil Bansal and Vasudeva Varma
Towards Deep Semantic Analysis Of Hashtags
To Appear in 37th European Conference on Information Retrieval
null
null
null
cs.IR cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Hashtags are semantico-syntactic constructs used across various social networking and microblogging platforms to enable users to start a topic specific discussion or classify a post into a desired category. Segmenting and linking the entities present within the hashtags could therefore help in better understanding and extraction of information shared across the social media. However, due to lack of space delimiters in the hashtags (e.g #nsavssnowden), the segmentation of hashtags into constituent entities ("NSA" and "Edward Snowden" in this case) is not a trivial task. Most of the current state-of-the-art social media analytics systems like Sentiment Analysis and Entity Linking tend to either ignore hashtags, or treat them as a single word. In this paper, we present a context aware approach to segment and link entities in the hashtags to a knowledge base (KB) entry, based on the context within the tweet. Our approach segments and links the entities in hashtags such that the coherence between hashtag semantics and the tweet is maximized. To the best of our knowledge, no existing study addresses the issue of linking entities in hashtags for extracting semantic information. We evaluate our method on two different datasets, and demonstrate the effectiveness of our technique in improving the overall entity linking in tweets via additional semantic information provided by segmenting and linking entities in a hashtag.
[ { "version": "v1", "created": "Tue, 13 Jan 2015 23:51:29 GMT" } ]
2015-01-15T00:00:00
[ [ "Bansal", "Piyush", "" ], [ "Bansal", "Romil", "" ], [ "Varma", "Vasudeva", "" ] ]
TITLE: Towards Deep Semantic Analysis Of Hashtags ABSTRACT: Hashtags are semantico-syntactic constructs used across various social networking and microblogging platforms to enable users to start a topic specific discussion or classify a post into a desired category. Segmenting and linking the entities present within the hashtags could therefore help in better understanding and extraction of information shared across the social media. However, due to lack of space delimiters in the hashtags (e.g #nsavssnowden), the segmentation of hashtags into constituent entities ("NSA" and "Edward Snowden" in this case) is not a trivial task. Most of the current state-of-the-art social media analytics systems like Sentiment Analysis and Entity Linking tend to either ignore hashtags, or treat them as a single word. In this paper, we present a context aware approach to segment and link entities in the hashtags to a knowledge base (KB) entry, based on the context within the tweet. Our approach segments and links the entities in hashtags such that the coherence between hashtag semantics and the tweet is maximized. To the best of our knowledge, no existing study addresses the issue of linking entities in hashtags for extracting semantic information. We evaluate our method on two different datasets, and demonstrate the effectiveness of our technique in improving the overall entity linking in tweets via additional semantic information provided by segmenting and linking entities in a hashtag.
1501.03341
Nikica Hlupi\'c
Nikica Hlupic and Ivo Beros
Solving Polynomial Systems by Penetrating Gradient Algorithm Applying Deepest Descent Strategy
null
null
null
null
math.OC cs.MS math.NA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
An algorithm and associated strategy for solving polynomial systems within the optimization framework is presented. The algorithm and strategy are named, respectively, the penetrating gradient algorithm and the deepest descent strategy. The most prominent feature of penetrating gradient algorithm, after which it was named, is its ability to see and penetrate through the obstacles in error space along the line of search direction and to jump to the global minimizer in a single step. The ability to find the deepest point in an arbitrary direction, no matter how distant the point is and regardless of the relief of error space between the current and the best point, motivates movements in directions in which cost function can be maximally reduced, rather than in directions that seem to be the best locally (like, for instance, the steepest descent, i.e., negative gradient direction). Therefore, the strategy is named the deepest descent, in contrast but alluding to the steepest descent. Penetrating gradient algorithm is derived and its properties are proven mathematically, while features of the deepest descent strategy are shown by comparative simulations. Extensive benchmark tests confirm that the proposed algorithm and strategy jointly form an effective solver of polynomial systems. In addition, further theoretical considerations in Section 5 about solving linear systems by the proposed method reveal a surprising and interesting relation of proposed and Gauss-Seidel method.
[ { "version": "v1", "created": "Wed, 14 Jan 2015 13:34:50 GMT" } ]
2015-01-15T00:00:00
[ [ "Hlupic", "Nikica", "" ], [ "Beros", "Ivo", "" ] ]
TITLE: Solving Polynomial Systems by Penetrating Gradient Algorithm Applying Deepest Descent Strategy ABSTRACT: An algorithm and associated strategy for solving polynomial systems within the optimization framework is presented. The algorithm and strategy are named, respectively, the penetrating gradient algorithm and the deepest descent strategy. The most prominent feature of penetrating gradient algorithm, after which it was named, is its ability to see and penetrate through the obstacles in error space along the line of search direction and to jump to the global minimizer in a single step. The ability to find the deepest point in an arbitrary direction, no matter how distant the point is and regardless of the relief of error space between the current and the best point, motivates movements in directions in which cost function can be maximally reduced, rather than in directions that seem to be the best locally (like, for instance, the steepest descent, i.e., negative gradient direction). Therefore, the strategy is named the deepest descent, in contrast but alluding to the steepest descent. Penetrating gradient algorithm is derived and its properties are proven mathematically, while features of the deepest descent strategy are shown by comparative simulations. Extensive benchmark tests confirm that the proposed algorithm and strategy jointly form an effective solver of polynomial systems. In addition, further theoretical considerations in Section 5 about solving linear systems by the proposed method reveal a surprising and interesting relation of proposed and Gauss-Seidel method.
1407.0439
Haixia Liu
Haixia Liu, Raymond H. Chan, and Yuan Yao
Geometric Tight Frame based Stylometry for Art Authentication of van Gogh Paintings
14 pages, 13 figures
null
null
null
cs.LG cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper is about authenticating genuine van Gogh paintings from forgeries. The authentication process depends on two key steps: feature extraction and outlier detection. In this paper, a geometric tight frame and some simple statistics of the tight frame coefficients are used to extract features from the paintings. Then a forward stage-wise rank boosting is used to select a small set of features for more accurate classification so that van Gogh paintings are highly concentrated towards some center point while forgeries are spread out as outliers. Numerical results show that our method can achieve 86.08% classification accuracy under the leave-one-out cross-validation procedure. Our method also identifies five features that are much more predominant than other features. Using just these five features for classification, our method can give 88.61% classification accuracy which is the highest so far reported in literature. Evaluation of the five features is also performed on two hundred datasets generated by bootstrap sampling with replacement. The median and the mean are 88.61% and 87.77% respectively. Our results show that a small set of statistics of the tight frame coefficients along certain orientations can serve as discriminative features for van Gogh paintings. It is more important to look at the tail distributions of such directional coefficients than mean values and standard deviations. It reflects a highly consistent style in van Gogh's brushstroke movements, where many forgeries demonstrate a more diverse spread in these features.
[ { "version": "v1", "created": "Wed, 2 Jul 2014 01:55:37 GMT" }, { "version": "v2", "created": "Sat, 13 Sep 2014 00:53:16 GMT" }, { "version": "v3", "created": "Tue, 13 Jan 2015 07:20:12 GMT" } ]
2015-01-14T00:00:00
[ [ "Liu", "Haixia", "" ], [ "Chan", "Raymond H.", "" ], [ "Yao", "Yuan", "" ] ]
TITLE: Geometric Tight Frame based Stylometry for Art Authentication of van Gogh Paintings ABSTRACT: This paper is about authenticating genuine van Gogh paintings from forgeries. The authentication process depends on two key steps: feature extraction and outlier detection. In this paper, a geometric tight frame and some simple statistics of the tight frame coefficients are used to extract features from the paintings. Then a forward stage-wise rank boosting is used to select a small set of features for more accurate classification so that van Gogh paintings are highly concentrated towards some center point while forgeries are spread out as outliers. Numerical results show that our method can achieve 86.08% classification accuracy under the leave-one-out cross-validation procedure. Our method also identifies five features that are much more predominant than other features. Using just these five features for classification, our method can give 88.61% classification accuracy which is the highest so far reported in literature. Evaluation of the five features is also performed on two hundred datasets generated by bootstrap sampling with replacement. The median and the mean are 88.61% and 87.77% respectively. Our results show that a small set of statistics of the tight frame coefficients along certain orientations can serve as discriminative features for van Gogh paintings. It is more important to look at the tail distributions of such directional coefficients than mean values and standard deviations. It reflects a highly consistent style in van Gogh's brushstroke movements, where many forgeries demonstrate a more diverse spread in these features.
1410.5473
Chang Liu
Chang Liu and Yi Xu
Feature Selection Based on Confidence Machine
10 pages
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In machine learning and pattern recognition, feature selection has been a hot topic in the literature. Unsupervised feature selection is challenging due to the loss of labels which would supply the related information.How to define an appropriate metric is the key for feature selection. We propose a filter method for unsupervised feature selection which is based on the Confidence Machine. Confidence Machine offers an estimation of confidence on a feature'reliability. In this paper, we provide the math model of Confidence Machine in the context of feature selection, which maximizes the relevance and minimizes the redundancy of the selected feature. We compare our method against classic feature selection methods Laplacian Score, Pearson Correlation and Principal Component Analysis on benchmark data sets. The experimental results demonstrate the efficiency and effectiveness of our method.
[ { "version": "v1", "created": "Mon, 20 Oct 2014 21:32:05 GMT" }, { "version": "v2", "created": "Tue, 13 Jan 2015 16:58:03 GMT" } ]
2015-01-14T00:00:00
[ [ "Liu", "Chang", "" ], [ "Xu", "Yi", "" ] ]
TITLE: Feature Selection Based on Confidence Machine ABSTRACT: In machine learning and pattern recognition, feature selection has been a hot topic in the literature. Unsupervised feature selection is challenging due to the loss of labels which would supply the related information.How to define an appropriate metric is the key for feature selection. We propose a filter method for unsupervised feature selection which is based on the Confidence Machine. Confidence Machine offers an estimation of confidence on a feature'reliability. In this paper, we provide the math model of Confidence Machine in the context of feature selection, which maximizes the relevance and minimizes the redundancy of the selected feature. We compare our method against classic feature selection methods Laplacian Score, Pearson Correlation and Principal Component Analysis on benchmark data sets. The experimental results demonstrate the efficiency and effectiveness of our method.
1411.3229
Tian Cao
Tian Cao, Christopher Zach, Shannon Modla, Debbie Powell, Kirk Czymmek and Marc Niethammer
Multi-modal Image Registration for Correlative Microscopy
24 pages
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Correlative microscopy is a methodology combining the functionality of light microscopy with the high resolution of electron microscopy and other microscopy technologies. Image registration for correlative microscopy is quite challenging because it is a multi-modal, multi-scale and multi-dimensional registration problem. In this report, I introduce two methods of image registration for correlative microscopy. The first method is based on fiducials (beads). I generate landmarks from the fiducials and compute the similarity transformation matrix based on three pairs of nearest corresponding landmarks. A least-squares matching process is applied afterwards to further refine the registration. The second method is inspired by the image analogies approach. I introduce the sparse representation model into image analogies. I first train representative image patches (dictionaries) for pre-registered datasets from two different modalities, and then I use the sparse coding technique to transfer a given image to a predicted image from one modality to another based on the learned dictionaries. The final image registration is between the predicted image and the original image corresponding to the given image in the different modality. The method transforms a multi-modal registration problem to a mono-modal one. I test my approaches on Transmission Electron Microscopy (TEM) and confocal microscopy images. Experimental results of the methods are also shown in this report.
[ { "version": "v1", "created": "Wed, 12 Nov 2014 16:32:17 GMT" }, { "version": "v2", "created": "Tue, 13 Jan 2015 15:44:08 GMT" } ]
2015-01-14T00:00:00
[ [ "Cao", "Tian", "" ], [ "Zach", "Christopher", "" ], [ "Modla", "Shannon", "" ], [ "Powell", "Debbie", "" ], [ "Czymmek", "Kirk", "" ], [ "Niethammer", "Marc", "" ] ]
TITLE: Multi-modal Image Registration for Correlative Microscopy ABSTRACT: Correlative microscopy is a methodology combining the functionality of light microscopy with the high resolution of electron microscopy and other microscopy technologies. Image registration for correlative microscopy is quite challenging because it is a multi-modal, multi-scale and multi-dimensional registration problem. In this report, I introduce two methods of image registration for correlative microscopy. The first method is based on fiducials (beads). I generate landmarks from the fiducials and compute the similarity transformation matrix based on three pairs of nearest corresponding landmarks. A least-squares matching process is applied afterwards to further refine the registration. The second method is inspired by the image analogies approach. I introduce the sparse representation model into image analogies. I first train representative image patches (dictionaries) for pre-registered datasets from two different modalities, and then I use the sparse coding technique to transfer a given image to a predicted image from one modality to another based on the learned dictionaries. The final image registration is between the predicted image and the original image corresponding to the given image in the different modality. The method transforms a multi-modal registration problem to a mono-modal one. I test my approaches on Transmission Electron Microscopy (TEM) and confocal microscopy images. Experimental results of the methods are also shown in this report.
1501.02825
Sven Bambach
Sven Bambach
A Survey on Recent Advances of Computer Vision Algorithms for Egocentric Video
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recent technological advances have made lightweight, head mounted cameras both practical and affordable and products like Google Glass show first approaches to introduce the idea of egocentric (first-person) video to the mainstream. Interestingly, the computer vision community has only recently started to explore this new domain of egocentric vision, where research can roughly be categorized into three areas: Object recognition, activity detection/recognition, video summarization. In this paper, we try to give a broad overview about the different problems that have been addressed and collect and compare evaluation results. Moreover, along with the emergence of this new domain came the introduction of numerous new and versatile benchmark datasets, which we summarize and compare as well.
[ { "version": "v1", "created": "Mon, 12 Jan 2015 21:14:56 GMT" } ]
2015-01-14T00:00:00
[ [ "Bambach", "Sven", "" ] ]
TITLE: A Survey on Recent Advances of Computer Vision Algorithms for Egocentric Video ABSTRACT: Recent technological advances have made lightweight, head mounted cameras both practical and affordable and products like Google Glass show first approaches to introduce the idea of egocentric (first-person) video to the mainstream. Interestingly, the computer vision community has only recently started to explore this new domain of egocentric vision, where research can roughly be categorized into three areas: Object recognition, activity detection/recognition, video summarization. In this paper, we try to give a broad overview about the different problems that have been addressed and collect and compare evaluation results. Moreover, along with the emergence of this new domain came the introduction of numerous new and versatile benchmark datasets, which we summarize and compare as well.
1501.02885
Clark Thomborson
Clark Thomborson
Benchmarking Obfuscators of Functionality
8 pp., submitted to SPRO 2015 (https://aspire-fp7.eu/spro)
null
null
null
cs.CR cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a set of benchmarks for evaluating the practicality of software obfuscators which rely on provably-secure methods for functional obfuscation.
[ { "version": "v1", "created": "Tue, 13 Jan 2015 04:28:03 GMT" } ]
2015-01-14T00:00:00
[ [ "Thomborson", "Clark", "" ] ]
TITLE: Benchmarking Obfuscators of Functionality ABSTRACT: We propose a set of benchmarks for evaluating the practicality of software obfuscators which rely on provably-secure methods for functional obfuscation.
1501.02954
Dominik Egarter
Dominik Egarter and Manfred P\"ochacker and Wilfried Elmenreich
Complexity of Power Draws for Load Disaggregation
null
null
null
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Non-Intrusive Load Monitoring (NILM) is a technology offering methods to identify appliances in homes based on their consumption characteristics and the total household demand. Recently, many different novel NILM approaches were introduced, tested on real-world data and evaluated with a common evaluation metric. However, the fair comparison between different NILM approaches even with the usage of the same evaluation metric is nearly impossible due to incomplete or missing problem definitions. Each NILM approach typically is evaluated under different test scenarios. Test results are thus influenced by the considered appliances, the number of used appliances, the device type representing the appliance and the pre-processing stages denoising the consumption data. This paper introduces a novel complexity measure of aggregated consumption data providing an assessment of the problem complexity affected by the used appliances, the appliance characteristics and the appliance usage over time. We test our load disaggregation complexity on different real-world datasets and with a state-of-the-art NILM approach. The introduced disaggregation complexity measure is able to classify the disaggregation problem based on the used appliance set and the considered measurement noise.
[ { "version": "v1", "created": "Tue, 13 Jan 2015 11:09:51 GMT" } ]
2015-01-14T00:00:00
[ [ "Egarter", "Dominik", "" ], [ "Pöchacker", "Manfred", "" ], [ "Elmenreich", "Wilfried", "" ] ]
TITLE: Complexity of Power Draws for Load Disaggregation ABSTRACT: Non-Intrusive Load Monitoring (NILM) is a technology offering methods to identify appliances in homes based on their consumption characteristics and the total household demand. Recently, many different novel NILM approaches were introduced, tested on real-world data and evaluated with a common evaluation metric. However, the fair comparison between different NILM approaches even with the usage of the same evaluation metric is nearly impossible due to incomplete or missing problem definitions. Each NILM approach typically is evaluated under different test scenarios. Test results are thus influenced by the considered appliances, the number of used appliances, the device type representing the appliance and the pre-processing stages denoising the consumption data. This paper introduces a novel complexity measure of aggregated consumption data providing an assessment of the problem complexity affected by the used appliances, the appliance characteristics and the appliance usage over time. We test our load disaggregation complexity on different real-world datasets and with a state-of-the-art NILM approach. The introduced disaggregation complexity measure is able to classify the disaggregation problem based on the used appliance set and the considered measurement noise.
1501.03044
Wei Lu
Wei Lu
Effects of Data Resolution and Human Behavior on Large Scale Evacuation Simulations
PhD dissertation. UT Knoxville. 130 pages, 37 figures, 8 tables. University of Tennessee, 2013. http://trace.tennessee.edu/utk_graddiss/2595
null
null
null
physics.soc-ph cs.CE
http://creativecommons.org/licenses/publicdomain/
Traffic Analysis Zones (TAZ) based macroscopic simulation studies are mostly applied in evacuation planning and operation areas. The large size in TAZ and aggregated information of macroscopic simulation underestimate the real evacuation performance. To take advantage of the high resolution demographic data LandScan USA (the zone size is much smaller than TAZ) and agent-based microscopic traffic simulation models, many new problems appeared and novel solutions are needed. A series of studies are conducted using LandScan USA Population Cells (LPC) data for evacuation assignments with different network configurations, travel demand models, and travelers compliance behavior. First, a new Multiple Source Nearest Destination Shortest Path (MSNDSP) problem is defined for generating Origin Destination matrix in evacuation assignments when using LandScan dataset. Second, a new agent-based traffic assignment framework using LandScan and TRANSIMS modules is proposed for evacuation planning and operation study. Impact analysis on traffic analysis area resolutions (TAZ vs LPC), evacuation start times (daytime vs nighttime), and departure time choice models (normal S shape model vs location based model) are studied. Third, based on the proposed framework, multi-scale network configurations (two levels of road networks and two scales of zone sizes) and three routing schemes (shortest network distance, highway biased, and shortest straight-line distance routes) are implemented for the evacuation performance comparison studies. Fourth, to study the impact of human behavior under evacuation operations, travelers compliance behavior with compliance levels from total complied to total non-complied are analyzed.
[ { "version": "v1", "created": "Tue, 30 Dec 2014 19:49:52 GMT" } ]
2015-01-14T00:00:00
[ [ "Lu", "Wei", "" ] ]
TITLE: Effects of Data Resolution and Human Behavior on Large Scale Evacuation Simulations ABSTRACT: Traffic Analysis Zones (TAZ) based macroscopic simulation studies are mostly applied in evacuation planning and operation areas. The large size in TAZ and aggregated information of macroscopic simulation underestimate the real evacuation performance. To take advantage of the high resolution demographic data LandScan USA (the zone size is much smaller than TAZ) and agent-based microscopic traffic simulation models, many new problems appeared and novel solutions are needed. A series of studies are conducted using LandScan USA Population Cells (LPC) data for evacuation assignments with different network configurations, travel demand models, and travelers compliance behavior. First, a new Multiple Source Nearest Destination Shortest Path (MSNDSP) problem is defined for generating Origin Destination matrix in evacuation assignments when using LandScan dataset. Second, a new agent-based traffic assignment framework using LandScan and TRANSIMS modules is proposed for evacuation planning and operation study. Impact analysis on traffic analysis area resolutions (TAZ vs LPC), evacuation start times (daytime vs nighttime), and departure time choice models (normal S shape model vs location based model) are studied. Third, based on the proposed framework, multi-scale network configurations (two levels of road networks and two scales of zone sizes) and three routing schemes (shortest network distance, highway biased, and shortest straight-line distance routes) are implemented for the evacuation performance comparison studies. Fourth, to study the impact of human behavior under evacuation operations, travelers compliance behavior with compliance levels from total complied to total non-complied are analyzed.
1408.2292
Jingwei Sun
Jingwei Sun, Guangzhong Sun
SPLZ: An Efficient Algorithm for Single Source Shortest Path Problem Using Compression Method
20 pages, 5 figures
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Efficient solution of the single source shortest path (SSSP) problem on road networks is an important requirement for numerous real-world applications. This paper introduces an algorithm for the SSSP problem using compression method. Owning to precomputing and storing all-pairs shortest path (APSP), the process of solving SSSP problem is a simple lookup of a little data from precomputed APSP and decompression. APSP without compression needs at least 1TB memory for a road network with one million vertices. Our algorithm can compress such an APSP into several GB, and ensure a good performance of decompression. In our experiment on a dataset about Northwest USA (with 1.2 millions vertices), our method can achieve about three orders of magnitude faster than Dijkstra algorithm based on binary heap.
[ { "version": "v1", "created": "Mon, 11 Aug 2014 01:40:00 GMT" }, { "version": "v2", "created": "Sun, 11 Jan 2015 11:57:32 GMT" } ]
2015-01-13T00:00:00
[ [ "Sun", "Jingwei", "" ], [ "Sun", "Guangzhong", "" ] ]
TITLE: SPLZ: An Efficient Algorithm for Single Source Shortest Path Problem Using Compression Method ABSTRACT: Efficient solution of the single source shortest path (SSSP) problem on road networks is an important requirement for numerous real-world applications. This paper introduces an algorithm for the SSSP problem using compression method. Owning to precomputing and storing all-pairs shortest path (APSP), the process of solving SSSP problem is a simple lookup of a little data from precomputed APSP and decompression. APSP without compression needs at least 1TB memory for a road network with one million vertices. Our algorithm can compress such an APSP into several GB, and ensure a good performance of decompression. In our experiment on a dataset about Northwest USA (with 1.2 millions vertices), our method can achieve about three orders of magnitude faster than Dijkstra algorithm based on binary heap.
1501.02282
Miquel Moret\'o Dr
David Prat, Cristobal Ortega, Marc Casas, Miquel Moret\'o, Mateo Valero
Adaptive and application dependent runtime guided hardware prefetcher reconfiguration on the IBM POWER7
Part of ADAPT Workshop proceedings, 2015 (arXiv:1412.2347)
null
null
ADAPT/2015/07
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Hardware data prefetcher engines have been extensively used to reduce the impact of memory latency. However, microprocessors' hardware prefetcher engines do not include any automatic hardware control able to dynamically tune their operation. This lacking architectural feature causes systems to operate with prefetchers in a fixed configuration, which in many cases harms performance and energy consumption. In this paper, a piece of software that solves the discussed problem in the context of the IBM POWER7 microprocessor is presented. The proposed solution involves using the runtime software as a bridge that is able to characterize user applications' workload and dynamically reconfigure the prefetcher engine. The proposed mechanisms has been deployed over OmpSs, a state-of-the-art task-based programming model. The paper shows significant performance improvements over a representative set of microbenchmarks and High Performance Computing (HPC) applications.
[ { "version": "v1", "created": "Fri, 9 Jan 2015 22:05:22 GMT" } ]
2015-01-13T00:00:00
[ [ "Prat", "David", "" ], [ "Ortega", "Cristobal", "" ], [ "Casas", "Marc", "" ], [ "Moretó", "Miquel", "" ], [ "Valero", "Mateo", "" ] ]
TITLE: Adaptive and application dependent runtime guided hardware prefetcher reconfiguration on the IBM POWER7 ABSTRACT: Hardware data prefetcher engines have been extensively used to reduce the impact of memory latency. However, microprocessors' hardware prefetcher engines do not include any automatic hardware control able to dynamically tune their operation. This lacking architectural feature causes systems to operate with prefetchers in a fixed configuration, which in many cases harms performance and energy consumption. In this paper, a piece of software that solves the discussed problem in the context of the IBM POWER7 microprocessor is presented. The proposed solution involves using the runtime software as a bridge that is able to characterize user applications' workload and dynamically reconfigure the prefetcher engine. The proposed mechanisms has been deployed over OmpSs, a state-of-the-art task-based programming model. The paper shows significant performance improvements over a representative set of microbenchmarks and High Performance Computing (HPC) applications.
1501.02431
Rashmi Paithankar Ms
Rashmi Paithankar and Bharat Tidke
A H-K Clustering Algorithm For High Dimensional Data Using Ensemble Learning
9 pages, 1 table, 2 figures, International Journal of Information Technology Convergence and Services (IJITCS) Vol.4, No.5/6, December 2014
null
null
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Advances made to the traditional clustering algorithms solves the various problems such as curse of dimensionality and sparsity of data for multiple attributes. The traditional H-K clustering algorithm can solve the randomness and apriority of the initial centers of K-means clustering algorithm. But when we apply it to high dimensional data it causes the dimensional disaster problem due to high computational complexity. All the advanced clustering algorithms like subspace and ensemble clustering algorithms improve the performance for clustering high dimension dataset from different aspects in different extent. Still these algorithms will improve the performance form a single perspective. The objective of the proposed model is to improve the performance of traditional H-K clustering and overcome the limitations such as high computational complexity and poor accuracy for high dimensional data by combining the three different approaches of clustering algorithm as subspace clustering algorithm and ensemble clustering algorithm with H-K clustering algorithm.
[ { "version": "v1", "created": "Sun, 11 Jan 2015 08:30:15 GMT" } ]
2015-01-13T00:00:00
[ [ "Paithankar", "Rashmi", "" ], [ "Tidke", "Bharat", "" ] ]
TITLE: A H-K Clustering Algorithm For High Dimensional Data Using Ensemble Learning ABSTRACT: Advances made to the traditional clustering algorithms solves the various problems such as curse of dimensionality and sparsity of data for multiple attributes. The traditional H-K clustering algorithm can solve the randomness and apriority of the initial centers of K-means clustering algorithm. But when we apply it to high dimensional data it causes the dimensional disaster problem due to high computational complexity. All the advanced clustering algorithms like subspace and ensemble clustering algorithms improve the performance for clustering high dimension dataset from different aspects in different extent. Still these algorithms will improve the performance form a single perspective. The objective of the proposed model is to improve the performance of traditional H-K clustering and overcome the limitations such as high computational complexity and poor accuracy for high dimensional data by combining the three different approaches of clustering algorithm as subspace clustering algorithm and ensemble clustering algorithm with H-K clustering algorithm.
1501.02432
Jayadeva
Jayadeva, Sanjit Singh Batra, and Siddarth Sabharwal
Learning a Fuzzy Hyperplane Fat Margin Classifier with Minimum VC dimension
arXiv admin note: text overlap with arXiv:1410.4573
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Vapnik-Chervonenkis (VC) dimension measures the complexity of a learning machine, and a low VC dimension leads to good generalization. The recently proposed Minimal Complexity Machine (MCM) learns a hyperplane classifier by minimizing an exact bound on the VC dimension. This paper extends the MCM classifier to the fuzzy domain. The use of a fuzzy membership is known to reduce the effect of outliers, and to reduce the effect of noise on learning. Experimental results show, that on a number of benchmark datasets, the the fuzzy MCM classifier outperforms SVMs and the conventional MCM in terms of generalization, and that the fuzzy MCM uses fewer support vectors. On several benchmark datasets, the fuzzy MCM classifier yields excellent test set accuracies while using one-tenth the number of support vectors used by SVMs.
[ { "version": "v1", "created": "Sun, 11 Jan 2015 09:29:05 GMT" } ]
2015-01-13T00:00:00
[ [ "Jayadeva", "", "" ], [ "Batra", "Sanjit Singh", "" ], [ "Sabharwal", "Siddarth", "" ] ]
TITLE: Learning a Fuzzy Hyperplane Fat Margin Classifier with Minimum VC dimension ABSTRACT: The Vapnik-Chervonenkis (VC) dimension measures the complexity of a learning machine, and a low VC dimension leads to good generalization. The recently proposed Minimal Complexity Machine (MCM) learns a hyperplane classifier by minimizing an exact bound on the VC dimension. This paper extends the MCM classifier to the fuzzy domain. The use of a fuzzy membership is known to reduce the effect of outliers, and to reduce the effect of noise on learning. Experimental results show, that on a number of benchmark datasets, the the fuzzy MCM classifier outperforms SVMs and the conventional MCM in terms of generalization, and that the fuzzy MCM uses fewer support vectors. On several benchmark datasets, the fuzzy MCM classifier yields excellent test set accuracies while using one-tenth the number of support vectors used by SVMs.
1501.02527
Nicholas Locascio
Harini Suresh, Nicholas Locascio
Autodetection and Classification of Hidden Cultural City Districts from Yelp Reviews
null
null
null
null
cs.CL cs.AI cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Topic models are a way to discover underlying themes in an otherwise unstructured collection of documents. In this study, we specifically used the Latent Dirichlet Allocation (LDA) topic model on a dataset of Yelp reviews to classify restaurants based off of their reviews. Furthermore, we hypothesize that within a city, restaurants can be grouped into similar "clusters" based on both location and similarity. We used several different clustering methods, including K-means Clustering and a Probabilistic Mixture Model, in order to uncover and classify districts, both well-known and hidden (i.e. cultural areas like Chinatown or hearsay like "the best street for Italian restaurants") within a city. We use these models to display and label different clusters on a map. We also introduce a topic similarity heatmap that displays the similarity distribution in a city to a new restaurant.
[ { "version": "v1", "created": "Mon, 12 Jan 2015 03:10:01 GMT" } ]
2015-01-13T00:00:00
[ [ "Suresh", "Harini", "" ], [ "Locascio", "Nicholas", "" ] ]
TITLE: Autodetection and Classification of Hidden Cultural City Districts from Yelp Reviews ABSTRACT: Topic models are a way to discover underlying themes in an otherwise unstructured collection of documents. In this study, we specifically used the Latent Dirichlet Allocation (LDA) topic model on a dataset of Yelp reviews to classify restaurants based off of their reviews. Furthermore, we hypothesize that within a city, restaurants can be grouped into similar "clusters" based on both location and similarity. We used several different clustering methods, including K-means Clustering and a Probabilistic Mixture Model, in order to uncover and classify districts, both well-known and hidden (i.e. cultural areas like Chinatown or hearsay like "the best street for Italian restaurants") within a city. We use these models to display and label different clusters on a map. We also introduce a topic similarity heatmap that displays the similarity distribution in a city to a new restaurant.
1501.02530
Anna Senina
Anna Rohrbach, Marcus Rohrbach, Niket Tandon, Bernt Schiele
A Dataset for Movie Description
null
null
null
null
cs.CV cs.CL cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Descriptive video service (DVS) provides linguistic descriptions of movies and allows visually impaired people to follow a movie along with their peers. Such descriptions are by design mainly visual and thus naturally form an interesting data source for computer vision and computational linguistics. In this work we propose a novel dataset which contains transcribed DVS, which is temporally aligned to full length HD movies. In addition we also collected the aligned movie scripts which have been used in prior work and compare the two different sources of descriptions. In total the Movie Description dataset contains a parallel corpus of over 54,000 sentences and video snippets from 72 HD movies. We characterize the dataset by benchmarking different approaches for generating video descriptions. Comparing DVS to scripts, we find that DVS is far more visual and describes precisely what is shown rather than what should happen according to the scripts created prior to movie production.
[ { "version": "v1", "created": "Mon, 12 Jan 2015 03:31:33 GMT" } ]
2015-01-13T00:00:00
[ [ "Rohrbach", "Anna", "" ], [ "Rohrbach", "Marcus", "" ], [ "Tandon", "Niket", "" ], [ "Schiele", "Bernt", "" ] ]
TITLE: A Dataset for Movie Description ABSTRACT: Descriptive video service (DVS) provides linguistic descriptions of movies and allows visually impaired people to follow a movie along with their peers. Such descriptions are by design mainly visual and thus naturally form an interesting data source for computer vision and computational linguistics. In this work we propose a novel dataset which contains transcribed DVS, which is temporally aligned to full length HD movies. In addition we also collected the aligned movie scripts which have been used in prior work and compare the two different sources of descriptions. In total the Movie Description dataset contains a parallel corpus of over 54,000 sentences and video snippets from 72 HD movies. We characterize the dataset by benchmarking different approaches for generating video descriptions. Comparing DVS to scripts, we find that DVS is far more visual and describes precisely what is shown rather than what should happen according to the scripts created prior to movie production.
1501.02652
Kostas Stefanidis
Yannis Roussakis, Ioannis Chrysakis, Kostas Stefanidis, Giorgos Flouris, Yannis Stavrakas
A Flexible Framework for Defining, Representing and Detecting Changes on the Data Web
null
null
null
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The dynamic nature of Web data gives rise to a multitude of problems related to the identification, computation and management of the evolving versions and the related changes. In this paper, we consider the problem of change recognition in RDF datasets, i.e., the problem of identifying, and when possible give semantics to, the changes that led from one version of an RDF dataset to another. Despite our RDF focus, our approach is sufficiently general to engulf different data models that can be encoded in RDF, such as relational or multi-dimensional. In fact, we propose a flexible, extendible and data-model-independent methodology of defining changes that can capture the peculiarities and needs of different data models and applications, while being formally robust due to the satisfaction of the properties of completeness and unambiguity. Further, we propose an ontology of changes for storing the detected changes that allows automated processing and analysis of changes, cross-snapshot queries (spanning across different versions), as well as queries involving both changes and data. To detect changes and populate said ontology, we propose a customizable detection algorithm, which is applicable to different data models and applications requiring the detection of custom, user-defined changes. Finally, we provide a proof-of-concept application and evaluation of our framework for different data models.
[ { "version": "v1", "created": "Mon, 12 Jan 2015 14:15:35 GMT" } ]
2015-01-13T00:00:00
[ [ "Roussakis", "Yannis", "" ], [ "Chrysakis", "Ioannis", "" ], [ "Stefanidis", "Kostas", "" ], [ "Flouris", "Giorgos", "" ], [ "Stavrakas", "Yannis", "" ] ]
TITLE: A Flexible Framework for Defining, Representing and Detecting Changes on the Data Web ABSTRACT: The dynamic nature of Web data gives rise to a multitude of problems related to the identification, computation and management of the evolving versions and the related changes. In this paper, we consider the problem of change recognition in RDF datasets, i.e., the problem of identifying, and when possible give semantics to, the changes that led from one version of an RDF dataset to another. Despite our RDF focus, our approach is sufficiently general to engulf different data models that can be encoded in RDF, such as relational or multi-dimensional. In fact, we propose a flexible, extendible and data-model-independent methodology of defining changes that can capture the peculiarities and needs of different data models and applications, while being formally robust due to the satisfaction of the properties of completeness and unambiguity. Further, we propose an ontology of changes for storing the detected changes that allows automated processing and analysis of changes, cross-snapshot queries (spanning across different versions), as well as queries involving both changes and data. To detect changes and populate said ontology, we propose a customizable detection algorithm, which is applicable to different data models and applications requiring the detection of custom, user-defined changes. Finally, we provide a proof-of-concept application and evaluation of our framework for different data models.
1501.02702
Feng Nan
Feng Nan, Joseph Wang, Venkatesh Saligrama
Max-Cost Discrete Function Evaluation Problem under a Budget
null
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose novel methods for max-cost Discrete Function Evaluation Problem (DFEP) under budget constraints. We are motivated by applications such as clinical diagnosis where a patient is subjected to a sequence of (possibly expensive) tests before a decision is made. Our goal is to develop strategies for minimizing max-costs. The problem is known to be NP hard and greedy methods based on specialized impurity functions have been proposed. We develop a broad class of \emph{admissible} impurity functions that admit monomials, classes of polynomials, and hinge-loss functions that allow for flexible impurity design with provably optimal approximation bounds. This flexibility is important for datasets when max-cost can be overly sensitive to "outliers." Outliers bias max-cost to a few examples that require a large number of tests for classification. We design admissible functions that allow for accuracy-cost trade-off and result in $O(\log n)$ guarantees of the optimal cost among trees with corresponding classification accuracy levels.
[ { "version": "v1", "created": "Mon, 12 Jan 2015 16:33:47 GMT" } ]
2015-01-13T00:00:00
[ [ "Nan", "Feng", "" ], [ "Wang", "Joseph", "" ], [ "Saligrama", "Venkatesh", "" ] ]
TITLE: Max-Cost Discrete Function Evaluation Problem under a Budget ABSTRACT: We propose novel methods for max-cost Discrete Function Evaluation Problem (DFEP) under budget constraints. We are motivated by applications such as clinical diagnosis where a patient is subjected to a sequence of (possibly expensive) tests before a decision is made. Our goal is to develop strategies for minimizing max-costs. The problem is known to be NP hard and greedy methods based on specialized impurity functions have been proposed. We develop a broad class of \emph{admissible} impurity functions that admit monomials, classes of polynomials, and hinge-loss functions that allow for flexible impurity design with provably optimal approximation bounds. This flexibility is important for datasets when max-cost can be overly sensitive to "outliers." Outliers bias max-cost to a few examples that require a large number of tests for classification. We design admissible functions that allow for accuracy-cost trade-off and result in $O(\log n)$ guarantees of the optimal cost among trees with corresponding classification accuracy levels.
1501.02724
Balaji Subramaniam
Balaji Subramaniam and Wu-chun Feng
Towards Energy-Proportional Computing Using Subsystem-Level Power Management
null
null
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Massive data centers housing thousands of computing nodes have become commonplace in enterprise computing, and the power consumption of such data centers is growing at an unprecedented rate. Adding to the problem is the inability of the servers to exhibit energy proportionality, i.e., provide energy-efficient execution under all levels of utilization, which diminishes the overall energy efficiency of the data center. It is imperative that we realize effective strategies to control the power consumption of the server and improve the energy efficiency of data centers. With the advent of Intel Sandy Bridge processors, we have the ability to specify a limit on power consumption during runtime, which creates opportunities to design new power-management techniques for enterprise workloads and make the systems that they run on more energy-proportional. In this paper, we investigate whether it is possible to achieve energy proportionality for enterprise-class server workloads, namely SPECpower_ssj2008 and SPECweb2009 benchmarks, by using Intel's Running Average Power Limit (RAPL) interfaces. First, we analyze the average power consumption of the full system as well as the subsystems and describe the energy proportionality of these components. We then characterize the instantaneous power profile of these benchmarks within different subsystems using the on-chip energy meters exposed via the RAPL interfaces. Finally, we present the effects of power limiting on the energy proportionality, performance, power and energy efficiency of enterprise-class server workloads. Our observations and results shed light on the efficacy of the RAPL interfaces and provide guidance for designing power-management techniques for enterprise-class workloads.
[ { "version": "v1", "created": "Mon, 12 Jan 2015 17:18:17 GMT" } ]
2015-01-13T00:00:00
[ [ "Subramaniam", "Balaji", "" ], [ "Feng", "Wu-chun", "" ] ]
TITLE: Towards Energy-Proportional Computing Using Subsystem-Level Power Management ABSTRACT: Massive data centers housing thousands of computing nodes have become commonplace in enterprise computing, and the power consumption of such data centers is growing at an unprecedented rate. Adding to the problem is the inability of the servers to exhibit energy proportionality, i.e., provide energy-efficient execution under all levels of utilization, which diminishes the overall energy efficiency of the data center. It is imperative that we realize effective strategies to control the power consumption of the server and improve the energy efficiency of data centers. With the advent of Intel Sandy Bridge processors, we have the ability to specify a limit on power consumption during runtime, which creates opportunities to design new power-management techniques for enterprise workloads and make the systems that they run on more energy-proportional. In this paper, we investigate whether it is possible to achieve energy proportionality for enterprise-class server workloads, namely SPECpower_ssj2008 and SPECweb2009 benchmarks, by using Intel's Running Average Power Limit (RAPL) interfaces. First, we analyze the average power consumption of the full system as well as the subsystems and describe the energy proportionality of these components. We then characterize the instantaneous power profile of these benchmarks within different subsystems using the on-chip energy meters exposed via the RAPL interfaces. Finally, we present the effects of power limiting on the energy proportionality, performance, power and energy efficiency of enterprise-class server workloads. Our observations and results shed light on the efficacy of the RAPL interfaces and provide guidance for designing power-management techniques for enterprise-class workloads.
1501.02732
Ilya Goldin
April Galyardt and Ilya Goldin
Predicting Performance During Tutoring with Models of Recent Performance
null
null
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In educational technology and learning sciences, there are multiple uses for a predictive model of whether a student will perform a task correctly or not. For example, an intelligent tutoring system may use such a model to estimate whether or not a student has mastered a skill. We analyze the significance of data recency in making such predictions, i.e., asking whether relatively more recent observations of a student's performance matter more than relatively older observations. We develop a new Recent-Performance Factors Analysis model that takes data recency into account. The new model significantly improves predictive accuracy over both existing logistic-regression performance models and over novel baseline models in evaluations on real-world and synthetic datasets. As a secondary contribution, we demonstrate how the widely used cross-validation with 0-1 loss is inferior to AIC and to cross-validation with L1 prediction error loss as a measure of model performance.
[ { "version": "v1", "created": "Mon, 12 Jan 2015 17:39:53 GMT" } ]
2015-01-13T00:00:00
[ [ "Galyardt", "April", "" ], [ "Goldin", "Ilya", "" ] ]
TITLE: Predicting Performance During Tutoring with Models of Recent Performance ABSTRACT: In educational technology and learning sciences, there are multiple uses for a predictive model of whether a student will perform a task correctly or not. For example, an intelligent tutoring system may use such a model to estimate whether or not a student has mastered a skill. We analyze the significance of data recency in making such predictions, i.e., asking whether relatively more recent observations of a student's performance matter more than relatively older observations. We develop a new Recent-Performance Factors Analysis model that takes data recency into account. The new model significantly improves predictive accuracy over both existing logistic-regression performance models and over novel baseline models in evaluations on real-world and synthetic datasets. As a secondary contribution, we demonstrate how the widely used cross-validation with 0-1 loss is inferior to AIC and to cross-validation with L1 prediction error loss as a measure of model performance.
1501.01924
Leman Akoglu
Shebuti Rayana and Leman Akoglu
Less is More: Building Selective Anomaly Ensembles
14 pages, 5 pages Appendix, 10 Figures, 15 Tables, to appear at SDM 2015
null
null
null
cs.DB cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Ensemble techniques for classification and clustering have long proven effective, yet anomaly ensembles have been barely studied. In this work, we tap into this gap and propose a new ensemble approach for anomaly mining, with application to event detection in temporal graphs. Our method aims to combine results from heterogeneous detectors with varying outputs, and leverage the evidence from multiple sources to yield better performance. However, trusting all the results may deteriorate the overall ensemble accuracy, as some detectors may fall short and provide inaccurate results depending on the nature of the data in hand. This suggests that being selective in which results to combine is vital in building effective ensembles---hence "less is more". In this paper we propose SELECT; an ensemble approach for anomaly mining that employs novel techniques to automatically and systematically select the results to assemble in a fully unsupervised fashion. We apply our method to event detection in temporal graphs, where SELECT successfully utilizes five base detectors and seven consensus methods under a unified ensemble framework. We provide extensive quantitative evaluation of our approach on five real-world datasets (four with ground truth), including Enron email communications, New York Times news corpus, and World Cup 2014 Twitter news feed. Thanks to its selection mechanism, SELECT yields superior performance compared to individual detectors alone, the full ensemble (naively combining all results), and an existing diversity-based ensemble.
[ { "version": "v1", "created": "Thu, 8 Jan 2015 18:54:09 GMT" } ]
2015-01-12T00:00:00
[ [ "Rayana", "Shebuti", "" ], [ "Akoglu", "Leman", "" ] ]
TITLE: Less is More: Building Selective Anomaly Ensembles ABSTRACT: Ensemble techniques for classification and clustering have long proven effective, yet anomaly ensembles have been barely studied. In this work, we tap into this gap and propose a new ensemble approach for anomaly mining, with application to event detection in temporal graphs. Our method aims to combine results from heterogeneous detectors with varying outputs, and leverage the evidence from multiple sources to yield better performance. However, trusting all the results may deteriorate the overall ensemble accuracy, as some detectors may fall short and provide inaccurate results depending on the nature of the data in hand. This suggests that being selective in which results to combine is vital in building effective ensembles---hence "less is more". In this paper we propose SELECT; an ensemble approach for anomaly mining that employs novel techniques to automatically and systematically select the results to assemble in a fully unsupervised fashion. We apply our method to event detection in temporal graphs, where SELECT successfully utilizes five base detectors and seven consensus methods under a unified ensemble framework. We provide extensive quantitative evaluation of our approach on five real-world datasets (four with ground truth), including Enron email communications, New York Times news corpus, and World Cup 2014 Twitter news feed. Thanks to its selection mechanism, SELECT yields superior performance compared to individual detectors alone, the full ensemble (naively combining all results), and an existing diversity-based ensemble.
1501.01996
Amin Javari
Amin Javari, Mahdi Jalili
A probabilistic model to resolve diversity-accuracy challenge of recommendation systems
19 pages, 5 figures
Knowledge and Information Systems, 1-19 (2014)
10.1007/s10115-014-0779-2
null
cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recommendation systems have wide-spread applications in both academia and industry. Traditionally, performance of recommendation systems has been measured by their precision. By introducing novelty and diversity as key qualities in recommender systems, recently increasing attention has been focused on this topic. Precision and novelty of recommendation are not in the same direction, and practical systems should make a trade-off between these two quantities. Thus, it is an important feature of a recommender system to make it possible to adjust diversity and accuracy of the recommendations by tuning the model. In this paper, we introduce a probabilistic structure to resolve the diversity-accuracy dilemma in recommender systems. We propose a hybrid model with adjustable level of diversity and precision such that one can perform this by tuning a single parameter. The proposed recommendation model consists of two models: one for maximization of the accuracy and the other one for specification of the recommendation list to tastes of users. Our experiments on two real datasets show the functionality of the model in resolving accuracy-diversity dilemma and outperformance of the model over other classic models. The proposed method could be extensively applied to real commercial systems due to its low computational complexity and significant performance.
[ { "version": "v1", "created": "Thu, 8 Jan 2015 22:42:39 GMT" } ]
2015-01-12T00:00:00
[ [ "Javari", "Amin", "" ], [ "Jalili", "Mahdi", "" ] ]
TITLE: A probabilistic model to resolve diversity-accuracy challenge of recommendation systems ABSTRACT: Recommendation systems have wide-spread applications in both academia and industry. Traditionally, performance of recommendation systems has been measured by their precision. By introducing novelty and diversity as key qualities in recommender systems, recently increasing attention has been focused on this topic. Precision and novelty of recommendation are not in the same direction, and practical systems should make a trade-off between these two quantities. Thus, it is an important feature of a recommender system to make it possible to adjust diversity and accuracy of the recommendations by tuning the model. In this paper, we introduce a probabilistic structure to resolve the diversity-accuracy dilemma in recommender systems. We propose a hybrid model with adjustable level of diversity and precision such that one can perform this by tuning a single parameter. The proposed recommendation model consists of two models: one for maximization of the accuracy and the other one for specification of the recommendation list to tastes of users. Our experiments on two real datasets show the functionality of the model in resolving accuracy-diversity dilemma and outperformance of the model over other classic models. The proposed method could be extensively applied to real commercial systems due to its low computational complexity and significant performance.
1501.01694
Mayank Kejriwal
Mayank Kejriwal, Daniel P. Miranker
A DNF Blocking Scheme Learner for Heterogeneous Datasets
null
null
null
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Entity Resolution concerns identifying co-referent entity pairs across datasets. A typical workflow comprises two steps. In the first step, a blocking method uses a one-many function called a blocking scheme to map entities to blocks. In the second step, entities sharing a block are paired and compared. Current DNF blocking scheme learners (DNF-BSLs) apply only to structurally homogeneous tables. We present an unsupervised algorithmic pipeline for learning DNF blocking schemes on RDF graph datasets, as well as structurally heterogeneous tables. Previous DNF-BSLs are admitted as special cases. We evaluate the pipeline on six real-world dataset pairs. Unsupervised results are shown to be competitive with supervised and semi-supervised baselines. To the best of our knowledge, this is the first unsupervised DNF-BSL that admits RDF graphs and structurally heterogeneous tables as inputs.
[ { "version": "v1", "created": "Thu, 8 Jan 2015 00:37:09 GMT" } ]
2015-01-09T00:00:00
[ [ "Kejriwal", "Mayank", "" ], [ "Miranker", "Daniel P.", "" ] ]
TITLE: A DNF Blocking Scheme Learner for Heterogeneous Datasets ABSTRACT: Entity Resolution concerns identifying co-referent entity pairs across datasets. A typical workflow comprises two steps. In the first step, a blocking method uses a one-many function called a blocking scheme to map entities to blocks. In the second step, entities sharing a block are paired and compared. Current DNF blocking scheme learners (DNF-BSLs) apply only to structurally homogeneous tables. We present an unsupervised algorithmic pipeline for learning DNF blocking schemes on RDF graph datasets, as well as structurally heterogeneous tables. Previous DNF-BSLs are admitted as special cases. We evaluate the pipeline on six real-world dataset pairs. Unsupervised results are shown to be competitive with supervised and semi-supervised baselines. To the best of our knowledge, this is the first unsupervised DNF-BSL that admits RDF graphs and structurally heterogeneous tables as inputs.
1404.4208
Konstantinos Sdrolias
Laszlo Gyarmati, Nikolaos Laoutaris, Kostas Sdrolias, Pablo Rodriguez, Costas Courcoubetis
From advertising profits to bandwidth prices-A quantitative methodology for negotiating premium peering
16 pages, 8 figures
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We have developed a first of its kind methodology for deriving bandwidth prices for premium direct peering between Access ISPs (A-ISPs) and Content and Service Providers (CSPs) that want to deliver content and services in premium quality. Our methodology establishes a direct link between service profitability, e.g., from advertising, user- and subscriber-loyalty, interconnection costs, and finally bandwidth price for peering. Unlike existing work in both the networking and economics literature, our resulting computational model built around Nash bargaining, can be used for deriving quantitative results comparable to actual market prices. We analyze the US market and derive prices for video that compare favorably with existing prices for transit and paid peering. We also observe that the fair prices returned by the model for high-profit/low-volume services such as search, are orders of magnitude higher than current bandwidth prices. This implies that resolving existing (fierce) interconnection tussles may require per service, instead of wholesale, peering between A-ISPs and CSPs. Our model can be used for deriving initial benchmark prices for such negotiations.
[ { "version": "v1", "created": "Wed, 16 Apr 2014 11:23:05 GMT" }, { "version": "v2", "created": "Tue, 22 Apr 2014 11:46:01 GMT" }, { "version": "v3", "created": "Tue, 18 Nov 2014 12:14:39 GMT" }, { "version": "v4", "created": "Wed, 7 Jan 2015 13:25:09 GMT" } ]
2015-01-08T00:00:00
[ [ "Gyarmati", "Laszlo", "" ], [ "Laoutaris", "Nikolaos", "" ], [ "Sdrolias", "Kostas", "" ], [ "Rodriguez", "Pablo", "" ], [ "Courcoubetis", "Costas", "" ] ]
TITLE: From advertising profits to bandwidth prices-A quantitative methodology for negotiating premium peering ABSTRACT: We have developed a first of its kind methodology for deriving bandwidth prices for premium direct peering between Access ISPs (A-ISPs) and Content and Service Providers (CSPs) that want to deliver content and services in premium quality. Our methodology establishes a direct link between service profitability, e.g., from advertising, user- and subscriber-loyalty, interconnection costs, and finally bandwidth price for peering. Unlike existing work in both the networking and economics literature, our resulting computational model built around Nash bargaining, can be used for deriving quantitative results comparable to actual market prices. We analyze the US market and derive prices for video that compare favorably with existing prices for transit and paid peering. We also observe that the fair prices returned by the model for high-profit/low-volume services such as search, are orders of magnitude higher than current bandwidth prices. This implies that resolving existing (fierce) interconnection tussles may require per service, instead of wholesale, peering between A-ISPs and CSPs. Our model can be used for deriving initial benchmark prices for such negotiations.
1406.3332
Julien Mairal
Julien Mairal (INRIA Grenoble Rh\^one-Alpes / LJK Laboratoire Jean Kuntzmann), Piotr Koniusz (INRIA Grenoble Rh\^one-Alpes / LJK Laboratoire Jean Kuntzmann), Zaid Harchaoui (INRIA Grenoble Rh\^one-Alpes / LJK Laboratoire Jean Kuntzmann), Cordelia Schmid (INRIA Grenoble Rh\^one-Alpes / LJK Laboratoire Jean Kuntzmann)
Convolutional Kernel Networks
appears in Advances in Neural Information Processing Systems (NIPS), Dec 2014, Montreal, Canada, http://nips.cc
null
null
null
cs.CV cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
An important goal in visual recognition is to devise image representations that are invariant to particular transformations. In this paper, we address this goal with a new type of convolutional neural network (CNN) whose invariance is encoded by a reproducing kernel. Unlike traditional approaches where neural networks are learned either to represent data or for solving a classification task, our network learns to approximate the kernel feature map on training data. Such an approach enjoys several benefits over classical ones. First, by teaching CNNs to be invariant, we obtain simple network architectures that achieve a similar accuracy to more complex ones, while being easy to train and robust to overfitting. Second, we bridge a gap between the neural network literature and kernels, which are natural tools to model invariance. We evaluate our methodology on visual recognition tasks where CNNs have proven to perform well, e.g., digit recognition with the MNIST dataset, and the more challenging CIFAR-10 and STL-10 datasets, where our accuracy is competitive with the state of the art.
[ { "version": "v1", "created": "Thu, 12 Jun 2014 19:41:03 GMT" }, { "version": "v2", "created": "Fri, 14 Nov 2014 16:58:48 GMT" } ]
2015-01-08T00:00:00
[ [ "Mairal", "Julien", "", "INRIA Grenoble Rhône-Alpes / LJK Laboratoire Jean\n Kuntzmann" ], [ "Koniusz", "Piotr", "", "INRIA Grenoble Rhône-Alpes / LJK Laboratoire\n Jean Kuntzmann" ], [ "Harchaoui", "Zaid", "", "INRIA Grenoble Rhône-Alpes / LJK\n Laboratoire Jean Kuntzmann" ], [ "Schmid", "Cordelia", "", "INRIA Grenoble Rhône-Alpes /\n LJK Laboratoire Jean Kuntzmann" ] ]
TITLE: Convolutional Kernel Networks ABSTRACT: An important goal in visual recognition is to devise image representations that are invariant to particular transformations. In this paper, we address this goal with a new type of convolutional neural network (CNN) whose invariance is encoded by a reproducing kernel. Unlike traditional approaches where neural networks are learned either to represent data or for solving a classification task, our network learns to approximate the kernel feature map on training data. Such an approach enjoys several benefits over classical ones. First, by teaching CNNs to be invariant, we obtain simple network architectures that achieve a similar accuracy to more complex ones, while being easy to train and robust to overfitting. Second, we bridge a gap between the neural network literature and kernels, which are natural tools to model invariance. We evaluate our methodology on visual recognition tasks where CNNs have proven to perform well, e.g., digit recognition with the MNIST dataset, and the more challenging CIFAR-10 and STL-10 datasets, where our accuracy is competitive with the state of the art.