id
large_stringlengths 9
16
| submitter
large_stringlengths 3
64
⌀ | authors
large_stringlengths 5
20.2k
| title
large_stringlengths 5
245
| comments
large_stringlengths 1
482
⌀ | journal-ref
large_stringlengths 4
382
⌀ | doi
large_stringlengths 9
151
⌀ | report-no
large_stringlengths 2
509
⌀ | categories
large_stringlengths 5
78
| license
large_stringclasses 9
values | abstract
large_stringlengths 83
3.55k
| versions
large listlengths 1
21
| update_date
timestamp[ms]date 2007-05-23 00:00:00
2025-05-30 00:00:00
| authors_parsed
large listlengths 1
1.35k
| prompt
large_stringlengths 166
3.64k
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1502.00141 | Mathieu Lagrange | Mathieu Lagrange, Gr\'egoire Lafay, Mathias Rossignol, Emmanouil
Benetos, Axel Roebel | An evaluation framework for event detection using a morphological model
of acoustic scenes | null | null | null | null | stat.ML cs.SD | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper introduces a model of environmental acoustic scenes which adopts a
morphological approach by ab-stracting temporal structures of acoustic scenes.
To demonstrate its potential, this model is employed to evaluate the
performance of a large set of acoustic events detection systems. This model
allows us to explicitly control key morphological aspects of the acoustic scene
and isolate their impact on the performance of the system under evaluation.
Thus, more information can be gained on the behavior of evaluated systems,
providing guidance for further improvements. The proposed model is validated
using submitted systems from the IEEE DCASE Challenge; results indicate that
the proposed scheme is able to successfully build datasets useful for
evaluating some aspects the performance of event detection systems, more
particularly their robustness to new listening conditions and the increasing
level of background sounds.
| [
{
"version": "v1",
"created": "Sat, 31 Jan 2015 18:12:34 GMT"
}
] | 2015-02-03T00:00:00 | [
[
"Lagrange",
"Mathieu",
""
],
[
"Lafay",
"Grégoire",
""
],
[
"Rossignol",
"Mathias",
""
],
[
"Benetos",
"Emmanouil",
""
],
[
"Roebel",
"Axel",
""
]
] | TITLE: An evaluation framework for event detection using a morphological model
of acoustic scenes
ABSTRACT: This paper introduces a model of environmental acoustic scenes which adopts a
morphological approach by ab-stracting temporal structures of acoustic scenes.
To demonstrate its potential, this model is employed to evaluate the
performance of a large set of acoustic events detection systems. This model
allows us to explicitly control key morphological aspects of the acoustic scene
and isolate their impact on the performance of the system under evaluation.
Thus, more information can be gained on the behavior of evaluated systems,
providing guidance for further improvements. The proposed model is validated
using submitted systems from the IEEE DCASE Challenge; results indicate that
the proposed scheme is able to successfully build datasets useful for
evaluating some aspects the performance of event detection systems, more
particularly their robustness to new listening conditions and the increasing
level of background sounds.
|
1502.00166 | Marijn ten Thij | Marijn ten Thij, Tanneke Ouboter, Daniel Worm, Nelly Litvak, Hans van
den Berg and Sandjai Bhulai | Modelling of trends in Twitter using retweet graph dynamics | 16 pages, 5 figures, presented at WAW 2014 | Algorithms and Models for the Web Graph, 11th International
Workshop, WAW 2014, Beijing, China, December 17-18, 2014, Proceedings pp
132-147, Lecture Notes in Computer Science, Springer | 10.1007/978-3-319-13123-8_11 | null | cs.SI physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we model user behaviour in Twitter to capture the emergence of
trending topics. For this purpose, we first extensively analyse tweet datasets
of several different events. In particular, for these datasets, we construct
and investigate the retweet graphs. We find that the retweet graph for a
trending topic has a relatively dense largest connected component (LCC). Next,
based on the insights obtained from the analyses of the datasets, we design a
mathematical model that describes the evolution of a retweet graph by three
main parameters. We then quantify, analytically and by simulation, the
influence of the model parameters on the basic characteristics of the retweet
graph, such as the density of edges and the size and density of the LCC.
Finally, we put the model in practice, estimate its parameters and compare the
resulting behavior of the model to our datasets.
| [
{
"version": "v1",
"created": "Sat, 31 Jan 2015 21:45:17 GMT"
}
] | 2015-02-03T00:00:00 | [
[
"Thij",
"Marijn ten",
""
],
[
"Ouboter",
"Tanneke",
""
],
[
"Worm",
"Daniel",
""
],
[
"Litvak",
"Nelly",
""
],
[
"Berg",
"Hans van den",
""
],
[
"Bhulai",
"Sandjai",
""
]
] | TITLE: Modelling of trends in Twitter using retweet graph dynamics
ABSTRACT: In this paper we model user behaviour in Twitter to capture the emergence of
trending topics. For this purpose, we first extensively analyse tweet datasets
of several different events. In particular, for these datasets, we construct
and investigate the retweet graphs. We find that the retweet graph for a
trending topic has a relatively dense largest connected component (LCC). Next,
based on the insights obtained from the analyses of the datasets, we design a
mathematical model that describes the evolution of a retweet graph by three
main parameters. We then quantify, analytically and by simulation, the
influence of the model parameters on the basic characteristics of the retweet
graph, such as the density of edges and the size and density of the LCC.
Finally, we put the model in practice, estimate its parameters and compare the
resulting behavior of the model to our datasets.
|
1502.00192 | Menglong Zhu | Menglong Zhu, Xiaowei Zhou, Kostas Daniilidis | Pose and Shape Estimation with Discriminatively Learned Parts | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We introduce a new approach for estimating the 3D pose and the 3D shape of an
object from a single image. Given a training set of view exemplars, we learn
and select appearance-based discriminative parts which are mapped onto the 3D
model from the training set through a facil- ity location optimization. The
training set of 3D models is summarized into a sparse set of shapes from which
we can generalize by linear combination. Given a test picture, we detect
hypotheses for each part. The main challenge is to select from these hypotheses
and compute the 3D pose and shape coefficients at the same time. To achieve
this, we optimize a function that minimizes simultaneously the geometric
reprojection error as well as the appearance matching of the parts. We apply
the alternating direction method of multipliers (ADMM) to minimize the
resulting convex function. We evaluate our approach on the Fine Grained 3D Car
dataset with superior performance in shape and pose errors. Our main and novel
contribution is the simultaneous solution for part localization, 3D pose and
shape by maximizing both geometric and appearance compatibility.
| [
{
"version": "v1",
"created": "Sun, 1 Feb 2015 04:09:23 GMT"
}
] | 2015-02-03T00:00:00 | [
[
"Zhu",
"Menglong",
""
],
[
"Zhou",
"Xiaowei",
""
],
[
"Daniilidis",
"Kostas",
""
]
] | TITLE: Pose and Shape Estimation with Discriminatively Learned Parts
ABSTRACT: We introduce a new approach for estimating the 3D pose and the 3D shape of an
object from a single image. Given a training set of view exemplars, we learn
and select appearance-based discriminative parts which are mapped onto the 3D
model from the training set through a facil- ity location optimization. The
training set of 3D models is summarized into a sparse set of shapes from which
we can generalize by linear combination. Given a test picture, we detect
hypotheses for each part. The main challenge is to select from these hypotheses
and compute the 3D pose and shape coefficients at the same time. To achieve
this, we optimize a function that minimizes simultaneously the geometric
reprojection error as well as the appearance matching of the parts. We apply
the alternating direction method of multipliers (ADMM) to minimize the
resulting convex function. We evaluate our approach on the Fine Grained 3D Car
dataset with superior performance in shape and pose errors. Our main and novel
contribution is the simultaneous solution for part localization, 3D pose and
shape by maximizing both geometric and appearance compatibility.
|
1502.00194 | James J.Q. Yu | James J.Q. Yu, Albert Y.S. Lam, Victor O.K. Li | Real-Coded Chemical Reaction Optimization with Different Perturbation
Functions | null | null | 10.1109/CEC.2012.6252925 | null | cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Chemical Reaction Optimization (CRO) is a powerful metaheuristic which mimics
the interactions of molecules in chemical reactions to search for the global
optimum. The perturbation function greatly influences the performance of CRO on
solving different continuous problems. In this paper, we study four different
probability distributions, namely, the Gaussian distribution, the Cauchy
distribution, the exponential distribution, and a modified Rayleigh
distribution, for the perturbation function of CRO. Different distributions
have different impacts on the solutions. The distributions are tested by a set
of well-known benchmark functions and simulation results show that problems
with different characteristics have different preference on the distribution
function. Our study gives guidelines to design CRO for different types of
optimization problems.
| [
{
"version": "v1",
"created": "Sun, 1 Feb 2015 04:45:43 GMT"
}
] | 2015-02-03T00:00:00 | [
[
"Yu",
"James J. Q.",
""
],
[
"Lam",
"Albert Y. S.",
""
],
[
"Li",
"Victor O. K.",
""
]
] | TITLE: Real-Coded Chemical Reaction Optimization with Different Perturbation
Functions
ABSTRACT: Chemical Reaction Optimization (CRO) is a powerful metaheuristic which mimics
the interactions of molecules in chemical reactions to search for the global
optimum. The perturbation function greatly influences the performance of CRO on
solving different continuous problems. In this paper, we study four different
probability distributions, namely, the Gaussian distribution, the Cauchy
distribution, the exponential distribution, and a modified Rayleigh
distribution, for the perturbation function of CRO. Different distributions
have different impacts on the solutions. The distributions are tested by a set
of well-known benchmark functions and simulation results show that problems
with different characteristics have different preference on the distribution
function. Our study gives guidelines to design CRO for different types of
optimization problems.
|
1502.00197 | James J.Q. Yu | James J.Q. Yu, Victor O.K. Li, Albert Y.S. Lam | An Inter-molecular Adaptive Collision Scheme for Chemical Reaction
Optimization | null | null | 10.1109/CEC.2014.6900234 | null | cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Optimization techniques are frequently applied in science and engineering
research and development. Evolutionary algorithms, as a kind of general-purpose
metaheuristic, have been shown to be very effective in solving a wide range of
optimization problems. A recently proposed chemical-reaction-inspired
metaheuristic, Chemical Reaction Optimization (CRO), has been applied to solve
many global optimization problems. However, the functionality of the
inter-molecular ineffective collision operator in the canonical CRO design
overlaps that of the on-wall ineffective collision operator, which can
potential impair the overall performance. In this paper we propose a new
inter-molecular ineffective collision operator for CRO for global optimization.
To fully utilize our newly proposed operator, we also design a scheme to adapt
the algorithm to optimization problems with different search space
characteristics. We analyze the performance of our proposed algorithm with a
number of widely used benchmark functions. The simulation results indicate that
the new algorithm has superior performance over the canonical CRO.
| [
{
"version": "v1",
"created": "Sun, 1 Feb 2015 04:53:48 GMT"
}
] | 2015-02-03T00:00:00 | [
[
"Yu",
"James J. Q.",
""
],
[
"Li",
"Victor O. K.",
""
],
[
"Lam",
"Albert Y. S.",
""
]
] | TITLE: An Inter-molecular Adaptive Collision Scheme for Chemical Reaction
Optimization
ABSTRACT: Optimization techniques are frequently applied in science and engineering
research and development. Evolutionary algorithms, as a kind of general-purpose
metaheuristic, have been shown to be very effective in solving a wide range of
optimization problems. A recently proposed chemical-reaction-inspired
metaheuristic, Chemical Reaction Optimization (CRO), has been applied to solve
many global optimization problems. However, the functionality of the
inter-molecular ineffective collision operator in the canonical CRO design
overlaps that of the on-wall ineffective collision operator, which can
potential impair the overall performance. In this paper we propose a new
inter-molecular ineffective collision operator for CRO for global optimization.
To fully utilize our newly proposed operator, we also design a scheme to adapt
the algorithm to optimization problems with different search space
characteristics. We analyze the performance of our proposed algorithm with a
number of widely used benchmark functions. The simulation results indicate that
the new algorithm has superior performance over the canonical CRO.
|
1502.00199 | James J.Q. Yu | James J.Q. Yu, Albert Y.S. Lam, Victor O.K. Li | Chemical Reaction Optimization for the Set Covering Problem | null | null | 10.1109/CEC.2014.6900233 | null | cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The set covering problem (SCP) is one of the representative combinatorial
optimization problems, having many practical applications. This paper
investigates the development of an algorithm to solve SCP by employing chemical
reaction optimization (CRO), a general-purpose metaheuristic. It is tested on a
wide range of benchmark instances of SCP. The simulation results indicate that
this algorithm gives outstanding performance compared with other heuristics and
metaheuristics in solving SCP.
| [
{
"version": "v1",
"created": "Sun, 1 Feb 2015 04:56:13 GMT"
}
] | 2015-02-03T00:00:00 | [
[
"Yu",
"James J. Q.",
""
],
[
"Lam",
"Albert Y. S.",
""
],
[
"Li",
"Victor O. K.",
""
]
] | TITLE: Chemical Reaction Optimization for the Set Covering Problem
ABSTRACT: The set covering problem (SCP) is one of the representative combinatorial
optimization problems, having many practical applications. This paper
investigates the development of an algorithm to solve SCP by employing chemical
reaction optimization (CRO), a general-purpose metaheuristic. It is tested on a
wide range of benchmark instances of SCP. The simulation results indicate that
this algorithm gives outstanding performance compared with other heuristics and
metaheuristics in solving SCP.
|
1502.00231 | Yishi Zhang | Zhijun Chen, Chaozhong Wu, Yishi Zhang, Zhen Huang, Bin Ran, Ming
Zhong, Nengchao Lyu | Feature Selection with Redundancy-complementariness Dispersion | 28 pages, 13 figures, 7 tables | null | null | null | cs.LG stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Feature selection has attracted significant attention in data mining and
machine learning in the past decades. Many existing feature selection methods
eliminate redundancy by measuring pairwise inter-correlation of features,
whereas the complementariness of features and higher inter-correlation among
more than two features are ignored. In this study, a modification item
concerning the complementariness of features is introduced in the evaluation
criterion of features. Additionally, in order to identify the interference
effect of already-selected False Positives (FPs), the
redundancy-complementariness dispersion is also taken into account to adjust
the measurement of pairwise inter-correlation of features. To illustrate the
effectiveness of proposed method, classification experiments are applied with
four frequently used classifiers on ten datasets. Classification results verify
the superiority of proposed method compared with five representative feature
selection methods.
| [
{
"version": "v1",
"created": "Sun, 1 Feb 2015 10:44:26 GMT"
}
] | 2015-02-03T00:00:00 | [
[
"Chen",
"Zhijun",
""
],
[
"Wu",
"Chaozhong",
""
],
[
"Zhang",
"Yishi",
""
],
[
"Huang",
"Zhen",
""
],
[
"Ran",
"Bin",
""
],
[
"Zhong",
"Ming",
""
],
[
"Lyu",
"Nengchao",
""
]
] | TITLE: Feature Selection with Redundancy-complementariness Dispersion
ABSTRACT: Feature selection has attracted significant attention in data mining and
machine learning in the past decades. Many existing feature selection methods
eliminate redundancy by measuring pairwise inter-correlation of features,
whereas the complementariness of features and higher inter-correlation among
more than two features are ignored. In this study, a modification item
concerning the complementariness of features is introduced in the evaluation
criterion of features. Additionally, in order to identify the interference
effect of already-selected False Positives (FPs), the
redundancy-complementariness dispersion is also taken into account to adjust
the measurement of pairwise inter-correlation of features. To illustrate the
effectiveness of proposed method, classification experiments are applied with
four frequently used classifiers on ten datasets. Classification results verify
the superiority of proposed method compared with five representative feature
selection methods.
|
1502.00303 | Xianbiao Qi | Xianbiao Qi, Chun-Guang Li, Guoying Zhao, Xiaopeng Hong, Matti
Pietik\"ainen | Dynamic texture and scene classification by transferring deep image
features | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Dynamic texture and scene classification are two fundamental problems in
understanding natural video content. Extracting robust and effective features
is a crucial step towards solving these problems. However the existing
approaches suffer from the sensitivity to either varying illumination, or
viewpoint changing, or even camera motion, and/or the lack of spatial
information. Inspired by the success of deep structures in image
classification, we attempt to leverage a deep structure to extract feature for
dynamic texture and scene classification. To tackle with the challenges in
training a deep structure, we propose to transfer some prior knowledge from
image domain to video domain. To be specific, we propose to apply a
well-trained Convolutional Neural Network (ConvNet) as a mid-level feature
extractor to extract features from each frame, and then form a representation
of a video by concatenating the first and the second order statistics over the
mid-level features. We term this two-level feature extraction scheme as a
Transferred ConvNet Feature (TCoF). Moreover we explore two different
implementations of the TCoF scheme, i.e., the \textit{spatial} TCoF and the
\textit{temporal} TCoF, in which the mean-removed frames and the difference
between two adjacent frames are used as the inputs of the ConvNet,
respectively. We evaluate systematically the proposed spatial TCoF and the
temporal TCoF schemes on three benchmark data sets, including DynTex, YUPENN,
and Maryland, and demonstrate that the proposed approach yields superior
performance.
| [
{
"version": "v1",
"created": "Sun, 1 Feb 2015 20:22:00 GMT"
}
] | 2015-02-03T00:00:00 | [
[
"Qi",
"Xianbiao",
""
],
[
"Li",
"Chun-Guang",
""
],
[
"Zhao",
"Guoying",
""
],
[
"Hong",
"Xiaopeng",
""
],
[
"Pietikäinen",
"Matti",
""
]
] | TITLE: Dynamic texture and scene classification by transferring deep image
features
ABSTRACT: Dynamic texture and scene classification are two fundamental problems in
understanding natural video content. Extracting robust and effective features
is a crucial step towards solving these problems. However the existing
approaches suffer from the sensitivity to either varying illumination, or
viewpoint changing, or even camera motion, and/or the lack of spatial
information. Inspired by the success of deep structures in image
classification, we attempt to leverage a deep structure to extract feature for
dynamic texture and scene classification. To tackle with the challenges in
training a deep structure, we propose to transfer some prior knowledge from
image domain to video domain. To be specific, we propose to apply a
well-trained Convolutional Neural Network (ConvNet) as a mid-level feature
extractor to extract features from each frame, and then form a representation
of a video by concatenating the first and the second order statistics over the
mid-level features. We term this two-level feature extraction scheme as a
Transferred ConvNet Feature (TCoF). Moreover we explore two different
implementations of the TCoF scheme, i.e., the \textit{spatial} TCoF and the
\textit{temporal} TCoF, in which the mean-removed frames and the difference
between two adjacent frames are used as the inputs of the ConvNet,
respectively. We evaluate systematically the proposed spatial TCoF and the
temporal TCoF schemes on three benchmark data sets, including DynTex, YUPENN,
and Maryland, and demonstrate that the proposed approach yields superior
performance.
|
1502.00341 | Liang Lin | Liang Lin, Xiaolong Wang, Wei Yang, Jian-Huang Lai | Discriminatively Trained And-Or Graph Models for Object Shape Detection | 15 pages, 14 figures, TPAMI 2014 | Pattern Analysis and Machine Intelligence, IEEE Transactions on ,
vol.PP, no.99, pp.1,1, 2014 | 10.1109/TPAMI.2014.2359888 | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we investigate a novel reconfigurable part-based model, namely
And-Or graph model, to recognize object shapes in images. Our proposed model
consists of four layers: leaf-nodes at the bottom are local classifiers for
detecting contour fragments; or-nodes above the leaf-nodes function as the
switches to activate their child leaf-nodes, making the model reconfigurable
during inference; and-nodes in a higher layer capture holistic shape
deformations; one root-node on the top, which is also an or-node, activates one
of its child and-nodes to deal with large global variations (e.g. different
poses and views). We propose a novel structural optimization algorithm to
discriminatively train the And-Or model from weakly annotated data. This
algorithm iteratively determines the model structures (e.g. the nodes and their
layouts) along with the parameter learning. On several challenging datasets,
our model demonstrates the effectiveness to perform robust shape-based object
detection against background clutter and outperforms the other state-of-the-art
approaches. We also release a new shape database with annotations, which
includes more than 1500 challenging shape instances, for recognition and
detection.
| [
{
"version": "v1",
"created": "Mon, 2 Feb 2015 02:04:01 GMT"
}
] | 2015-02-03T00:00:00 | [
[
"Lin",
"Liang",
""
],
[
"Wang",
"Xiaolong",
""
],
[
"Yang",
"Wei",
""
],
[
"Lai",
"Jian-Huang",
""
]
] | TITLE: Discriminatively Trained And-Or Graph Models for Object Shape Detection
ABSTRACT: In this paper, we investigate a novel reconfigurable part-based model, namely
And-Or graph model, to recognize object shapes in images. Our proposed model
consists of four layers: leaf-nodes at the bottom are local classifiers for
detecting contour fragments; or-nodes above the leaf-nodes function as the
switches to activate their child leaf-nodes, making the model reconfigurable
during inference; and-nodes in a higher layer capture holistic shape
deformations; one root-node on the top, which is also an or-node, activates one
of its child and-nodes to deal with large global variations (e.g. different
poses and views). We propose a novel structural optimization algorithm to
discriminatively train the And-Or model from weakly annotated data. This
algorithm iteratively determines the model structures (e.g. the nodes and their
layouts) along with the parameter learning. On several challenging datasets,
our model demonstrates the effectiveness to perform robust shape-based object
detection against background clutter and outperforms the other state-of-the-art
approaches. We also release a new shape database with annotations, which
includes more than 1500 challenging shape instances, for recognition and
detection.
|
1502.00363 | Wangmeng Zuo | Wangmeng Zuo, Faqiang Wang, David Zhang, Liang Lin, Yuchi Huang, Deyu
Meng, Lei Zhang | Iterated Support Vector Machines for Distance Metric Learning | 14 pages, 10 figures | null | null | null | cs.LG cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Distance metric learning aims to learn from the given training data a valid
distance metric, with which the similarity between data samples can be more
effectively evaluated for classification. Metric learning is often formulated
as a convex or nonconvex optimization problem, while many existing metric
learning algorithms become inefficient for large scale problems. In this paper,
we formulate metric learning as a kernel classification problem, and solve it
by iterated training of support vector machines (SVM). The new formulation is
easy to implement, efficient in training, and tractable for large-scale
problems. Two novel metric learning models, namely Positive-semidefinite
Constrained Metric Learning (PCML) and Nonnegative-coefficient Constrained
Metric Learning (NCML), are developed. Both PCML and NCML can guarantee the
global optimality of their solutions. Experimental results on UCI dataset
classification, handwritten digit recognition, face verification and person
re-identification demonstrate that the proposed metric learning methods achieve
higher classification accuracy than state-of-the-art methods and they are
significantly more efficient in training.
| [
{
"version": "v1",
"created": "Mon, 2 Feb 2015 05:30:44 GMT"
}
] | 2015-02-03T00:00:00 | [
[
"Zuo",
"Wangmeng",
""
],
[
"Wang",
"Faqiang",
""
],
[
"Zhang",
"David",
""
],
[
"Lin",
"Liang",
""
],
[
"Huang",
"Yuchi",
""
],
[
"Meng",
"Deyu",
""
],
[
"Zhang",
"Lei",
""
]
] | TITLE: Iterated Support Vector Machines for Distance Metric Learning
ABSTRACT: Distance metric learning aims to learn from the given training data a valid
distance metric, with which the similarity between data samples can be more
effectively evaluated for classification. Metric learning is often formulated
as a convex or nonconvex optimization problem, while many existing metric
learning algorithms become inefficient for large scale problems. In this paper,
we formulate metric learning as a kernel classification problem, and solve it
by iterated training of support vector machines (SVM). The new formulation is
easy to implement, efficient in training, and tractable for large-scale
problems. Two novel metric learning models, namely Positive-semidefinite
Constrained Metric Learning (PCML) and Nonnegative-coefficient Constrained
Metric Learning (NCML), are developed. Both PCML and NCML can guarantee the
global optimality of their solutions. Experimental results on UCI dataset
classification, handwritten digit recognition, face verification and person
re-identification demonstrate that the proposed metric learning methods achieve
higher classification accuracy than state-of-the-art methods and they are
significantly more efficient in training.
|
1502.00377 | Liang Lin | Liang Lin, Yongyi Lu, Yan Pan, Xiaowu Chen | Integrating Graph Partitioning and Matching for Trajectory Analysis in
Video Surveillance | 10 pages, 12 figures | Image Processing, IEEE Transactions on , vol.21, no.12,
pp.4844-4857, 2012 | 10.1109/TIP.2012.2211373 | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In order to track the moving objects in long range against occlusion,
interruption, and background clutter, this paper proposes a unified approach
for global trajectory analysis. Instead of the traditional frame-by-frame
tracking, our method recovers target trajectories based on a short sequence of
video frames, e.g. $15$ frames. We initially calculate a foreground map at each
frame, as obtained from a state-of-the-art background model. An attribute graph
is then extracted from the foreground map, where the graph vertices are image
primitives represented by the composite features. With this graph
representation, we pose trajectory analysis as a joint task of spatial graph
partitioning and temporal graph matching. The task can be formulated by
maximizing a posteriori under the Bayesian framework, in which we integrate the
spatio-temporal contexts and the appearance models. The probabilistic inference
is achieved by a data-driven Markov Chain Monte Carlo (MCMC) algorithm. Given a
peroid of observed frames, the algorithm simulates a ergodic and aperiodic
Markov Chain, and it visits a sequence of solution states in the joint space of
spatial graph partitioning and temporal graph matching. In the experiments, our
method is tested on several challenging videos from the public datasets of
visual surveillance, and it outperforms the state-of-the-art methods.
| [
{
"version": "v1",
"created": "Mon, 2 Feb 2015 06:52:47 GMT"
}
] | 2015-02-03T00:00:00 | [
[
"Lin",
"Liang",
""
],
[
"Lu",
"Yongyi",
""
],
[
"Pan",
"Yan",
""
],
[
"Chen",
"Xiaowu",
""
]
] | TITLE: Integrating Graph Partitioning and Matching for Trajectory Analysis in
Video Surveillance
ABSTRACT: In order to track the moving objects in long range against occlusion,
interruption, and background clutter, this paper proposes a unified approach
for global trajectory analysis. Instead of the traditional frame-by-frame
tracking, our method recovers target trajectories based on a short sequence of
video frames, e.g. $15$ frames. We initially calculate a foreground map at each
frame, as obtained from a state-of-the-art background model. An attribute graph
is then extracted from the foreground map, where the graph vertices are image
primitives represented by the composite features. With this graph
representation, we pose trajectory analysis as a joint task of spatial graph
partitioning and temporal graph matching. The task can be formulated by
maximizing a posteriori under the Bayesian framework, in which we integrate the
spatio-temporal contexts and the appearance models. The probabilistic inference
is achieved by a data-driven Markov Chain Monte Carlo (MCMC) algorithm. Given a
peroid of observed frames, the algorithm simulates a ergodic and aperiodic
Markov Chain, and it visits a sequence of solution states in the joint space of
spatial graph partitioning and temporal graph matching. In the experiments, our
method is tested on several challenging videos from the public datasets of
visual surveillance, and it outperforms the state-of-the-art methods.
|
1502.00416 | Liang Lin | Bo Jiang, Yongyi Lu, Xiying Li, Liang Lin | Towards a solid solution of real-time fire and flame detection | 14 pages, 6 figures | Multimedia Tools and Applications, pp. 1380-7501, 2014 | 10.1007/s11042-014-2106-z | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Although the object detection and recognition has received growing attention
for decades, a robust fire and flame detection method is rarely explored. This
paper presents an empirical study, towards a general and solid approach to fast
detect fire and flame in videos, with the applications in video surveillance
and event retrieval. Our system consists of three cascaded steps: (1) candidate
regions proposing by a background model, (2) fire region classifying with
color-texture features and a dictionary of visual words, and (3) temporal
verifying. The experimental evaluation and analysis are done for each step. We
believe that it is a useful service to both academic research and real-world
application. In addition, we release the software of the proposed system with
the source code, as well as a public benchmark and data set, including 64 video
clips covered both indoor and outdoor scenes under different conditions. We
achieve an 82% Recall with 93% Precision on the data set, and greatly improve
the performance by state-of-the-arts methods.
| [
{
"version": "v1",
"created": "Mon, 2 Feb 2015 09:34:01 GMT"
}
] | 2015-02-03T00:00:00 | [
[
"Jiang",
"Bo",
""
],
[
"Lu",
"Yongyi",
""
],
[
"Li",
"Xiying",
""
],
[
"Lin",
"Liang",
""
]
] | TITLE: Towards a solid solution of real-time fire and flame detection
ABSTRACT: Although the object detection and recognition has received growing attention
for decades, a robust fire and flame detection method is rarely explored. This
paper presents an empirical study, towards a general and solid approach to fast
detect fire and flame in videos, with the applications in video surveillance
and event retrieval. Our system consists of three cascaded steps: (1) candidate
regions proposing by a background model, (2) fire region classifying with
color-texture features and a dictionary of visual words, and (3) temporal
verifying. The experimental evaluation and analysis are done for each step. We
believe that it is a useful service to both academic research and real-world
application. In addition, we release the software of the proposed system with
the source code, as well as a public benchmark and data set, including 64 video
clips covered both indoor and outdoor scenes under different conditions. We
achieve an 82% Recall with 93% Precision on the data set, and greatly improve
the performance by state-of-the-arts methods.
|
1502.00512 | Will Williams | Will Williams, Niranjani Prasad, David Mrva, Tom Ash, Tony Robinson | Scaling Recurrent Neural Network Language Models | null | null | null | null | cs.CL cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper investigates the scaling properties of Recurrent Neural Network
Language Models (RNNLMs). We discuss how to train very large RNNs on GPUs and
address the questions of how RNNLMs scale with respect to model size,
training-set size, computational costs and memory. Our analysis shows that
despite being more costly to train, RNNLMs obtain much lower perplexities on
standard benchmarks than n-gram models. We train the largest known RNNs and
present relative word error rates gains of 18% on an ASR task. We also present
the new lowest perplexities on the recently released billion word language
modelling benchmark, 1 BLEU point gain on machine translation and a 17%
relative hit rate gain in word prediction.
| [
{
"version": "v1",
"created": "Mon, 2 Feb 2015 15:27:37 GMT"
}
] | 2015-02-03T00:00:00 | [
[
"Williams",
"Will",
""
],
[
"Prasad",
"Niranjani",
""
],
[
"Mrva",
"David",
""
],
[
"Ash",
"Tom",
""
],
[
"Robinson",
"Tony",
""
]
] | TITLE: Scaling Recurrent Neural Network Language Models
ABSTRACT: This paper investigates the scaling properties of Recurrent Neural Network
Language Models (RNNLMs). We discuss how to train very large RNNs on GPUs and
address the questions of how RNNLMs scale with respect to model size,
training-set size, computational costs and memory. Our analysis shows that
despite being more costly to train, RNNLMs obtain much lower perplexities on
standard benchmarks than n-gram models. We train the largest known RNNs and
present relative word error rates gains of 18% on an ASR task. We also present
the new lowest perplexities on the recently released billion word language
modelling benchmark, 1 BLEU point gain on machine translation and a 17%
relative hit rate gain in word prediction.
|
1407.0316 | Mahito Sugiyama | Mahito Sugiyama, Felipe Llinares L\'opez, Niklas Kasenburg, Karsten M.
Borgwardt | Significant Subgraph Mining with Multiple Testing Correction | 18 pages, 5 figure, accepted to the 2015 SIAM International
Conference on Data Mining (SDM15) | null | null | null | stat.ME cs.LG stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The problem of finding itemsets that are statistically significantly enriched
in a class of transactions is complicated by the need to correct for multiple
hypothesis testing. Pruning untestable hypotheses was recently proposed as a
strategy for this task of significant itemset mining. It was shown to lead to
greater statistical power, the discovery of more truly significant itemsets,
than the standard Bonferroni correction on real-world datasets. An open
question, however, is whether this strategy of excluding untestable hypotheses
also leads to greater statistical power in subgraph mining, in which the number
of hypotheses is much larger than in itemset mining. Here we answer this
question by an empirical investigation on eight popular graph benchmark
datasets. We propose a new efficient search strategy, which always returns the
same solution as the state-of-the-art approach and is approximately two orders
of magnitude faster. Moreover, we exploit the dependence between subgraphs by
considering the effective number of tests and thereby further increase the
statistical power.
| [
{
"version": "v1",
"created": "Tue, 1 Jul 2014 16:53:51 GMT"
},
{
"version": "v2",
"created": "Sun, 6 Jul 2014 13:39:21 GMT"
},
{
"version": "v3",
"created": "Fri, 30 Jan 2015 16:11:17 GMT"
}
] | 2015-02-02T00:00:00 | [
[
"Sugiyama",
"Mahito",
""
],
[
"López",
"Felipe Llinares",
""
],
[
"Kasenburg",
"Niklas",
""
],
[
"Borgwardt",
"Karsten M.",
""
]
] | TITLE: Significant Subgraph Mining with Multiple Testing Correction
ABSTRACT: The problem of finding itemsets that are statistically significantly enriched
in a class of transactions is complicated by the need to correct for multiple
hypothesis testing. Pruning untestable hypotheses was recently proposed as a
strategy for this task of significant itemset mining. It was shown to lead to
greater statistical power, the discovery of more truly significant itemsets,
than the standard Bonferroni correction on real-world datasets. An open
question, however, is whether this strategy of excluding untestable hypotheses
also leads to greater statistical power in subgraph mining, in which the number
of hypotheses is much larger than in itemset mining. Here we answer this
question by an empirical investigation on eight popular graph benchmark
datasets. We propose a new efficient search strategy, which always returns the
same solution as the state-of-the-art approach and is approximately two orders
of magnitude faster. Moreover, we exploit the dependence between subgraphs by
considering the effective number of tests and thereby further increase the
statistical power.
|
1409.0575 | Olga Russakovsky | Olga Russakovsky and Jia Deng and Hao Su and Jonathan Krause and
Sanjeev Satheesh and Sean Ma and Zhiheng Huang and Andrej Karpathy and Aditya
Khosla and Michael Bernstein and Alexander C. Berg and Li Fei-Fei | ImageNet Large Scale Visual Recognition Challenge | 43 pages, 16 figures. v3 includes additional comparisons with PASCAL
VOC (per-category comparisons in Table 3, distribution of localization
difficulty in Fig 16), a list of queries used for obtaining object detection
images (Appendix C), and some additional references | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The ImageNet Large Scale Visual Recognition Challenge is a benchmark in
object category classification and detection on hundreds of object categories
and millions of images. The challenge has been run annually from 2010 to
present, attracting participation from more than fifty institutions.
This paper describes the creation of this benchmark dataset and the advances
in object recognition that have been possible as a result. We discuss the
challenges of collecting large-scale ground truth annotation, highlight key
breakthroughs in categorical object recognition, provide a detailed analysis of
the current state of the field of large-scale image classification and object
detection, and compare the state-of-the-art computer vision accuracy with human
accuracy. We conclude with lessons learned in the five years of the challenge,
and propose future directions and improvements.
| [
{
"version": "v1",
"created": "Mon, 1 Sep 2014 22:29:38 GMT"
},
{
"version": "v2",
"created": "Mon, 1 Dec 2014 01:08:31 GMT"
},
{
"version": "v3",
"created": "Fri, 30 Jan 2015 01:23:59 GMT"
}
] | 2015-02-02T00:00:00 | [
[
"Russakovsky",
"Olga",
""
],
[
"Deng",
"Jia",
""
],
[
"Su",
"Hao",
""
],
[
"Krause",
"Jonathan",
""
],
[
"Satheesh",
"Sanjeev",
""
],
[
"Ma",
"Sean",
""
],
[
"Huang",
"Zhiheng",
""
],
[
"Karpathy",
"Andrej",
""
],
[
"Khosla",
"Aditya",
""
],
[
"Bernstein",
"Michael",
""
],
[
"Berg",
"Alexander C.",
""
],
[
"Fei-Fei",
"Li",
""
]
] | TITLE: ImageNet Large Scale Visual Recognition Challenge
ABSTRACT: The ImageNet Large Scale Visual Recognition Challenge is a benchmark in
object category classification and detection on hundreds of object categories
and millions of images. The challenge has been run annually from 2010 to
present, attracting participation from more than fifty institutions.
This paper describes the creation of this benchmark dataset and the advances
in object recognition that have been possible as a result. We discuss the
challenges of collecting large-scale ground truth annotation, highlight key
breakthroughs in categorical object recognition, provide a detailed analysis of
the current state of the field of large-scale image classification and object
detection, and compare the state-of-the-art computer vision accuracy with human
accuracy. We conclude with lessons learned in the five years of the challenge,
and propose future directions and improvements.
|
1411.6243 | Xu Sun | Xu Sun | Structure Regularization for Structured Prediction: Theories and
Experiments | null | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | While there are many studies on weight regularization, the study on structure
regularization is rare. Many existing systems on structured prediction focus on
increasing the level of structural dependencies within the model. However, this
trend could have been misdirected, because our study suggests that complex
structures are actually harmful to generalization ability in structured
prediction. To control structure-based overfitting, we propose a structure
regularization framework via \emph{structure decomposition}, which decomposes
training samples into mini-samples with simpler structures, deriving a model
with better generalization power. We show both theoretically and empirically
that structure regularization can effectively control overfitting risk and lead
to better accuracy. As a by-product, the proposed method can also substantially
accelerate the training speed. The method and the theoretical results can apply
to general graphical models with arbitrary structures. Experiments on
well-known tasks demonstrate that our method can easily beat the benchmark
systems on those highly-competitive tasks, achieving state-of-the-art
accuracies yet with substantially faster training speed.
| [
{
"version": "v1",
"created": "Sun, 23 Nov 2014 14:11:01 GMT"
},
{
"version": "v2",
"created": "Fri, 30 Jan 2015 07:41:21 GMT"
}
] | 2015-02-02T00:00:00 | [
[
"Sun",
"Xu",
""
]
] | TITLE: Structure Regularization for Structured Prediction: Theories and
Experiments
ABSTRACT: While there are many studies on weight regularization, the study on structure
regularization is rare. Many existing systems on structured prediction focus on
increasing the level of structural dependencies within the model. However, this
trend could have been misdirected, because our study suggests that complex
structures are actually harmful to generalization ability in structured
prediction. To control structure-based overfitting, we propose a structure
regularization framework via \emph{structure decomposition}, which decomposes
training samples into mini-samples with simpler structures, deriving a model
with better generalization power. We show both theoretically and empirically
that structure regularization can effectively control overfitting risk and lead
to better accuracy. As a by-product, the proposed method can also substantially
accelerate the training speed. The method and the theoretical results can apply
to general graphical models with arbitrary structures. Experiments on
well-known tasks demonstrate that our method can easily beat the benchmark
systems on those highly-competitive tasks, achieving state-of-the-art
accuracies yet with substantially faster training speed.
|
1501.05703 | Ning Zhang | Ning Zhang, Manohar Paluri, Yaniv Taigman, Rob Fergus, Lubomir Bourdev | Beyond Frontal Faces: Improving Person Recognition Using Multiple Cues | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We explore the task of recognizing peoples' identities in photo albums in an
unconstrained setting. To facilitate this, we introduce the new People In Photo
Albums (PIPA) dataset, consisting of over 60000 instances of 2000 individuals
collected from public Flickr photo albums. With only about half of the person
images containing a frontal face, the recognition task is very challenging due
to the large variations in pose, clothing, camera viewpoint, image resolution
and illumination. We propose the Pose Invariant PErson Recognition (PIPER)
method, which accumulates the cues of poselet-level person recognizers trained
by deep convolutional networks to discount for the pose variations, combined
with a face recognizer and a global recognizer. Experiments on three different
settings confirm that in our unconstrained setup PIPER significantly improves
on the performance of DeepFace, which is one of the best face recognizers as
measured on the LFW dataset.
| [
{
"version": "v1",
"created": "Fri, 23 Jan 2015 02:35:01 GMT"
},
{
"version": "v2",
"created": "Fri, 30 Jan 2015 18:48:27 GMT"
}
] | 2015-02-02T00:00:00 | [
[
"Zhang",
"Ning",
""
],
[
"Paluri",
"Manohar",
""
],
[
"Taigman",
"Yaniv",
""
],
[
"Fergus",
"Rob",
""
],
[
"Bourdev",
"Lubomir",
""
]
] | TITLE: Beyond Frontal Faces: Improving Person Recognition Using Multiple Cues
ABSTRACT: We explore the task of recognizing peoples' identities in photo albums in an
unconstrained setting. To facilitate this, we introduce the new People In Photo
Albums (PIPA) dataset, consisting of over 60000 instances of 2000 individuals
collected from public Flickr photo albums. With only about half of the person
images containing a frontal face, the recognition task is very challenging due
to the large variations in pose, clothing, camera viewpoint, image resolution
and illumination. We propose the Pose Invariant PErson Recognition (PIPER)
method, which accumulates the cues of poselet-level person recognizers trained
by deep convolutional networks to discount for the pose variations, combined
with a face recognizer and a global recognizer. Experiments on three different
settings confirm that in our unconstrained setup PIPER significantly improves
on the performance of DeepFace, which is one of the best face recognizers as
measured on the LFW dataset.
|
1501.07716 | Dominik Kowald | Paul Seitlinger, Dominik Kowald, Simone Kopeinik, Ilire
Hasani-Mavriqi, Tobias Ley, Elisabeth Lex | Attention Please! A Hybrid Resource Recommender Mimicking
Attention-Interpretation Dynamics | Submitted to WWW'15 WebScience Track | null | null | null | cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Classic resource recommenders like Collaborative Filtering (CF) treat users
as being just another entity, neglecting non-linear user-resource dynamics
shaping attention and interpretation. In this paper, we propose a novel hybrid
recommendation strategy that refines CF by capturing these dynamics. The
evaluation results reveal that our approach substantially improves CF and,
depending on the dataset, successfully competes with a computationally much
more expensive Matrix Factorization variant.
| [
{
"version": "v1",
"created": "Fri, 30 Jan 2015 09:55:24 GMT"
}
] | 2015-02-02T00:00:00 | [
[
"Seitlinger",
"Paul",
""
],
[
"Kowald",
"Dominik",
""
],
[
"Kopeinik",
"Simone",
""
],
[
"Hasani-Mavriqi",
"Ilire",
""
],
[
"Ley",
"Tobias",
""
],
[
"Lex",
"Elisabeth",
""
]
] | TITLE: Attention Please! A Hybrid Resource Recommender Mimicking
Attention-Interpretation Dynamics
ABSTRACT: Classic resource recommenders like Collaborative Filtering (CF) treat users
as being just another entity, neglecting non-linear user-resource dynamics
shaping attention and interpretation. In this paper, we propose a novel hybrid
recommendation strategy that refines CF by capturing these dynamics. The
evaluation results reveal that our approach substantially improves CF and,
depending on the dataset, successfully competes with a computationally much
more expensive Matrix Factorization variant.
|
1408.1987 | Hong Xing | Hong Xing, Liang Liu, Rui Zhang | Secrecy Wireless Information and Power Transfer in Fading Wiretap
Channel | to appear in IEEE Transactions on Vehicular Technology | null | 10.1109/TVT.2015.2395725 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Simultaneous wireless information and power transfer (SWIPT) has recently
drawn significant interests for its dual use of radio signals to provide
wireless data and energy access at the same time. However, a challenging
secrecy communication issue arises as the messages sent to the information
receivers (IRs) may be eavesdropped by the energy receivers (ERs), which are
presumed to harvest energy only from the received signals. To tackle this
problem, we propose in this paper an artificial noise (AN) aided transmission
scheme to facilitate the secrecy information transmission to IRs and yet meet
the energy harvesting requirement for ERs, under the assumption that the AN can
be cancelled at IRs but not at ERs. Specifically, the proposed scheme splits
the transmit power into two parts, to send the confidential message to the IR
and an AN to interfere with the ER, respectively. Under a simplified three-node
wiretap channel setup, the transmit power allocations and power splitting
ratios over fading channels are jointly optimized to minimize the outage
probability for delay-limited secrecy information transmission, or to maximize
the average rate for no-delay-limited secrecy information transmission, subject
to a combination of average and peak power constraints at the transmitter as
well as an average energy harvesting constraint at the ER. Both the secrecy
outage probability minimization and average rate maximization problems are
shown to be non-convex, for each of which we propose the optimal solution based
on the dual decomposition as well as suboptimal solution based on the
alternating optimization. Furthermore, two benchmark schemes are introduced for
comparison. Finally, the performances of proposed schemes are evaluated by
simulations in terms of various trade-offs for wireless (secrecy) information
versus energy transmissions.
| [
{
"version": "v1",
"created": "Fri, 8 Aug 2014 21:27:46 GMT"
},
{
"version": "v2",
"created": "Wed, 28 Jan 2015 23:40:41 GMT"
}
] | 2015-01-30T00:00:00 | [
[
"Xing",
"Hong",
""
],
[
"Liu",
"Liang",
""
],
[
"Zhang",
"Rui",
""
]
] | TITLE: Secrecy Wireless Information and Power Transfer in Fading Wiretap
Channel
ABSTRACT: Simultaneous wireless information and power transfer (SWIPT) has recently
drawn significant interests for its dual use of radio signals to provide
wireless data and energy access at the same time. However, a challenging
secrecy communication issue arises as the messages sent to the information
receivers (IRs) may be eavesdropped by the energy receivers (ERs), which are
presumed to harvest energy only from the received signals. To tackle this
problem, we propose in this paper an artificial noise (AN) aided transmission
scheme to facilitate the secrecy information transmission to IRs and yet meet
the energy harvesting requirement for ERs, under the assumption that the AN can
be cancelled at IRs but not at ERs. Specifically, the proposed scheme splits
the transmit power into two parts, to send the confidential message to the IR
and an AN to interfere with the ER, respectively. Under a simplified three-node
wiretap channel setup, the transmit power allocations and power splitting
ratios over fading channels are jointly optimized to minimize the outage
probability for delay-limited secrecy information transmission, or to maximize
the average rate for no-delay-limited secrecy information transmission, subject
to a combination of average and peak power constraints at the transmitter as
well as an average energy harvesting constraint at the ER. Both the secrecy
outage probability minimization and average rate maximization problems are
shown to be non-convex, for each of which we propose the optimal solution based
on the dual decomposition as well as suboptimal solution based on the
alternating optimization. Furthermore, two benchmark schemes are introduced for
comparison. Finally, the performances of proposed schemes are evaluated by
simulations in terms of various trade-offs for wireless (secrecy) information
versus energy transmissions.
|
1501.07250 | Alejandro Torre\~no | Alejandro Torre\~no, Eva Onaindia, \'Oscar Sapena | FMAP: Distributed Cooperative Multi-Agent Planning | 21 pages, 11 figures | Applied Intelligence, Volume 41, Issue 2, pp. 606-626, Year 2014 | 10.1007/s10489-014-0540-2 | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper proposes FMAP (Forward Multi-Agent Planning), a fully-distributed
multi-agent planning method that integrates planning and coordination. Although
FMAP is specifically aimed at solving problems that require cooperation among
agents, the flexibility of the domain-independent planning model allows FMAP to
tackle multi-agent planning tasks of any type. In FMAP, agents jointly explore
the plan space by building up refinement plans through a complete and flexible
forward-chaining partial-order planner. The search is guided by $h_{DTG}$, a
novel heuristic function that is based on the concepts of Domain Transition
Graph and frontier state and is optimized to evaluate plans in distributed
environments. Agents in FMAP apply an advanced privacy model that allows them
to adequately keep private information while communicating only the data of the
refinement plans that is relevant to each of the participating agents.
Experimental results show that FMAP is a general-purpose approach that
efficiently solves tightly-coupled domains that have specialized agents and
cooperative goals as well as loosely-coupled problems. Specifically, the
empirical evaluation shows that FMAP outperforms current MAP systems at solving
complex planning tasks that are adapted from the International Planning
Competition benchmarks.
| [
{
"version": "v1",
"created": "Wed, 28 Jan 2015 19:38:35 GMT"
}
] | 2015-01-30T00:00:00 | [
[
"Torreño",
"Alejandro",
""
],
[
"Onaindia",
"Eva",
""
],
[
"Sapena",
"Óscar",
""
]
] | TITLE: FMAP: Distributed Cooperative Multi-Agent Planning
ABSTRACT: This paper proposes FMAP (Forward Multi-Agent Planning), a fully-distributed
multi-agent planning method that integrates planning and coordination. Although
FMAP is specifically aimed at solving problems that require cooperation among
agents, the flexibility of the domain-independent planning model allows FMAP to
tackle multi-agent planning tasks of any type. In FMAP, agents jointly explore
the plan space by building up refinement plans through a complete and flexible
forward-chaining partial-order planner. The search is guided by $h_{DTG}$, a
novel heuristic function that is based on the concepts of Domain Transition
Graph and frontier state and is optimized to evaluate plans in distributed
environments. Agents in FMAP apply an advanced privacy model that allows them
to adequately keep private information while communicating only the data of the
refinement plans that is relevant to each of the participating agents.
Experimental results show that FMAP is a general-purpose approach that
efficiently solves tightly-coupled domains that have specialized agents and
cooperative goals as well as loosely-coupled problems. Specifically, the
empirical evaluation shows that FMAP outperforms current MAP systems at solving
complex planning tasks that are adapted from the International Planning
Competition benchmarks.
|
1501.07304 | Miriam Redi | Miriam Redi, Nikhil Rasiwasia, Gaurav Aggarwal, Alejandro Jaimes | The Beauty of Capturing Faces: Rating the Quality of Digital Portraits | FG 2015, 8 pages | null | null | null | cs.CV cs.CY cs.MM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Digital portrait photographs are everywhere, and while the number of face
pictures keeps growing, not much work has been done to on automatic portrait
beauty assessment. In this paper, we design a specific framework to
automatically evaluate the beauty of digital portraits. To this end, we procure
a large dataset of face images annotated not only with aesthetic scores but
also with information about the traits of the subject portrayed. We design a
set of visual features based on portrait photography literature, and
extensively analyze their relation with portrait beauty, exposing interesting
findings about what makes a portrait beautiful. We find that the beauty of a
portrait is linked to its artistic value, and independent from age, race and
gender of the subject. We also show that a classifier trained with our features
to separate beautiful portraits from non-beautiful portraits outperforms
generic aesthetic classifiers.
| [
{
"version": "v1",
"created": "Wed, 28 Jan 2015 22:51:23 GMT"
}
] | 2015-01-30T00:00:00 | [
[
"Redi",
"Miriam",
""
],
[
"Rasiwasia",
"Nikhil",
""
],
[
"Aggarwal",
"Gaurav",
""
],
[
"Jaimes",
"Alejandro",
""
]
] | TITLE: The Beauty of Capturing Faces: Rating the Quality of Digital Portraits
ABSTRACT: Digital portrait photographs are everywhere, and while the number of face
pictures keeps growing, not much work has been done to on automatic portrait
beauty assessment. In this paper, we design a specific framework to
automatically evaluate the beauty of digital portraits. To this end, we procure
a large dataset of face images annotated not only with aesthetic scores but
also with information about the traits of the subject portrayed. We design a
set of visual features based on portrait photography literature, and
extensively analyze their relation with portrait beauty, exposing interesting
findings about what makes a portrait beautiful. We find that the beauty of a
portrait is linked to its artistic value, and independent from age, race and
gender of the subject. We also show that a classifier trained with our features
to separate beautiful portraits from non-beautiful portraits outperforms
generic aesthetic classifiers.
|
1501.07323 | Peng Wang | Peng Wang, Guoqiang Mao, Zihuai Lin, Ming Ding, Weifa Liang, Xiaohu
Ge, and Zhiyun Lin | Performance Analysis of Raptor Codes under Maximum-Likelihood (ML)
Decoding | 28 pages and 5 figures | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Raptor codes have been widely used in many multimedia broadcast/multicast
applications. However, our understanding of Raptor codes is still incomplete
due to the insufficient amount of theoretical work on the performance analysis
of Raptor codes, particularly under maximum-likelihood (ML) decoding, which
provides an optimal benchmark on the system performance for the other decoding
schemes to compare against. For the first time, this paper provides an upper
bound and a lower bound, on the packet error performance of Raptor codes under
ML decoding, which is measured by the probability that all source packets can
be successfully decoded by a receiver with a given number of successfully
received coded packets. Simulations are conducted to validate the accuracy of
the analysis. More specifically, Raptor codes with different degree
distribution and pre-coders, are evaluated using the derived bounds with high
accuracy.
| [
{
"version": "v1",
"created": "Thu, 29 Jan 2015 01:16:46 GMT"
}
] | 2015-01-30T00:00:00 | [
[
"Wang",
"Peng",
""
],
[
"Mao",
"Guoqiang",
""
],
[
"Lin",
"Zihuai",
""
],
[
"Ding",
"Ming",
""
],
[
"Liang",
"Weifa",
""
],
[
"Ge",
"Xiaohu",
""
],
[
"Lin",
"Zhiyun",
""
]
] | TITLE: Performance Analysis of Raptor Codes under Maximum-Likelihood (ML)
Decoding
ABSTRACT: Raptor codes have been widely used in many multimedia broadcast/multicast
applications. However, our understanding of Raptor codes is still incomplete
due to the insufficient amount of theoretical work on the performance analysis
of Raptor codes, particularly under maximum-likelihood (ML) decoding, which
provides an optimal benchmark on the system performance for the other decoding
schemes to compare against. For the first time, this paper provides an upper
bound and a lower bound, on the packet error performance of Raptor codes under
ML decoding, which is measured by the probability that all source packets can
be successfully decoded by a receiver with a given number of successfully
received coded packets. Simulations are conducted to validate the accuracy of
the analysis. More specifically, Raptor codes with different degree
distribution and pre-coders, are evaluated using the derived bounds with high
accuracy.
|
1501.07420 | Smruti Ranjan Sarangi | Smruti R. Sarangi, Rajshekar Kalayappan, Prathmesh Kallurkar, Seep
Goel | Tejas Simulator : Validation against Hardware | 3 pages, 2 figures | null | null | null | cs.AR | http://creativecommons.org/licenses/by-nc-sa/3.0/ | In this report we show results that validate the Tejas architectural
simulator against native hardware. We report mean error rates of 11.45% and
18.77% for the SPEC2006 and Splash2 benchmark suites respectively. These error
rates are competitive and in most cases better than the numbers reported by
other contemporary simulators.
| [
{
"version": "v1",
"created": "Thu, 29 Jan 2015 11:44:47 GMT"
}
] | 2015-01-30T00:00:00 | [
[
"Sarangi",
"Smruti R.",
""
],
[
"Kalayappan",
"Rajshekar",
""
],
[
"Kallurkar",
"Prathmesh",
""
],
[
"Goel",
"Seep",
""
]
] | TITLE: Tejas Simulator : Validation against Hardware
ABSTRACT: In this report we show results that validate the Tejas architectural
simulator against native hardware. We report mean error rates of 11.45% and
18.77% for the SPEC2006 and Splash2 benchmark suites respectively. These error
rates are competitive and in most cases better than the numbers reported by
other contemporary simulators.
|
1501.07467 | Hamed Zamani | Hamed Zamani, Azadeh Shakery, Pooya Moradi | Regression and Learning to Rank Aggregation for User Engagement
Evaluation | In Proceedings of the 2014 ACM Recommender Systems Challenge,
RecSysChallenge '14 | null | 10.1145/2668067.2668077 | null | cs.IR cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | User engagement refers to the amount of interaction an instance (e.g., tweet,
news, and forum post) achieves. Ranking the items in social media websites
based on the amount of user participation in them, can be used in different
applications, such as recommender systems. In this paper, we consider a tweet
containing a rating for a movie as an instance and focus on ranking the
instances of each user based on their engagement, i.e., the total number of
retweets and favorites it will gain.
For this task, we define several features which can be extracted from the
meta-data of each tweet. The features are partitioned into three categories:
user-based, movie-based, and tweet-based. We show that in order to obtain good
results, features from all categories should be considered. We exploit
regression and learning to rank methods to rank the tweets and propose to
aggregate the results of regression and learning to rank methods to achieve
better performance. We have run our experiments on an extended version of
MovieTweeting dataset provided by ACM RecSys Challenge 2014. The results show
that learning to rank approach outperforms most of the regression models and
the combination can improve the performance significantly.
| [
{
"version": "v1",
"created": "Thu, 29 Jan 2015 14:54:12 GMT"
}
] | 2015-01-30T00:00:00 | [
[
"Zamani",
"Hamed",
""
],
[
"Shakery",
"Azadeh",
""
],
[
"Moradi",
"Pooya",
""
]
] | TITLE: Regression and Learning to Rank Aggregation for User Engagement
Evaluation
ABSTRACT: User engagement refers to the amount of interaction an instance (e.g., tweet,
news, and forum post) achieves. Ranking the items in social media websites
based on the amount of user participation in them, can be used in different
applications, such as recommender systems. In this paper, we consider a tweet
containing a rating for a movie as an instance and focus on ranking the
instances of each user based on their engagement, i.e., the total number of
retweets and favorites it will gain.
For this task, we define several features which can be extracted from the
meta-data of each tweet. The features are partitioned into three categories:
user-based, movie-based, and tweet-based. We show that in order to obtain good
results, features from all categories should be considered. We exploit
regression and learning to rank methods to rank the tweets and propose to
aggregate the results of regression and learning to rank methods to achieve
better performance. We have run our experiments on an extended version of
MovieTweeting dataset provided by ACM RecSys Challenge 2014. The results show
that learning to rank approach outperforms most of the regression models and
the combination can improve the performance significantly.
|
1501.05382 | Wenjuan Gong | Wenjuan Gong and Yongzhen Huang and Jordi Gonzalez and and Liang Wang | Enhanced Mixtures of Part Model for Human Pose Estimation | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Mixture of parts model has been successfully applied to 2D human pose
estimation problem either as explicitly trained body part model or as latent
variables for the whole human body model. Mixture of parts model usually
utilize tree structure for representing relations between body parts. Tree
structures facilitate training and referencing of the model but could not deal
with double counting problems, which hinder its applications in 3D pose
estimation. While most of work targeted to solve these problems tend to modify
the tree models or the optimization target. We incorporate other cues from
input features. For example, in surveillance environments, human silhouettes
can be extracted relative easily although not flawlessly. In this condition, we
can combine extracted human blobs with histogram of gradient feature, which is
commonly used in mixture of parts model for training body part templates. The
method can be easily extend to other candidate features under our generalized
framework. We show 2D body part detection results on a public available
dataset: HumanEva dataset. Furthermore, a 2D to 3D pose estimator is trained
with Gaussian process regression model and 2D body part detections from the
proposed method is fed to the estimator, thus 3D poses are predictable given
new 2D body part detections. We also show results of 3D pose estimation on
HumanEva dataset.
| [
{
"version": "v1",
"created": "Thu, 22 Jan 2015 03:54:15 GMT"
},
{
"version": "v2",
"created": "Wed, 28 Jan 2015 08:16:55 GMT"
}
] | 2015-01-29T00:00:00 | [
[
"Gong",
"Wenjuan",
""
],
[
"Huang",
"Yongzhen",
""
],
[
"Gonzalez",
"Jordi",
""
],
[
"Wang",
"and Liang",
""
]
] | TITLE: Enhanced Mixtures of Part Model for Human Pose Estimation
ABSTRACT: Mixture of parts model has been successfully applied to 2D human pose
estimation problem either as explicitly trained body part model or as latent
variables for the whole human body model. Mixture of parts model usually
utilize tree structure for representing relations between body parts. Tree
structures facilitate training and referencing of the model but could not deal
with double counting problems, which hinder its applications in 3D pose
estimation. While most of work targeted to solve these problems tend to modify
the tree models or the optimization target. We incorporate other cues from
input features. For example, in surveillance environments, human silhouettes
can be extracted relative easily although not flawlessly. In this condition, we
can combine extracted human blobs with histogram of gradient feature, which is
commonly used in mixture of parts model for training body part templates. The
method can be easily extend to other candidate features under our generalized
framework. We show 2D body part detection results on a public available
dataset: HumanEva dataset. Furthermore, a 2D to 3D pose estimator is trained
with Gaussian process regression model and 2D body part detections from the
proposed method is fed to the estimator, thus 3D poses are predictable given
new 2D body part detections. We also show results of 3D pose estimation on
HumanEva dataset.
|
1501.06993 | Youjie Zhou | Youjie Zhou and Hongkai Yu and Song Wang | Feature Sampling Strategies for Action Recognition | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Although dense local spatial-temporal features with bag-of-features
representation achieve state-of-the-art performance for action recognition, the
huge feature number and feature size prevent current methods from scaling up to
real size problems. In this work, we investigate different types of feature
sampling strategies for action recognition, namely dense sampling, uniformly
random sampling and selective sampling. We propose two effective selective
sampling methods using object proposal techniques. Experiments conducted on a
large video dataset show that we are able to achieve better average recognition
accuracy using 25% less features, through one of proposed selective sampling
methods, and even remain comparable accuracy while discarding 70% features.
| [
{
"version": "v1",
"created": "Wed, 28 Jan 2015 05:41:07 GMT"
}
] | 2015-01-29T00:00:00 | [
[
"Zhou",
"Youjie",
""
],
[
"Yu",
"Hongkai",
""
],
[
"Wang",
"Song",
""
]
] | TITLE: Feature Sampling Strategies for Action Recognition
ABSTRACT: Although dense local spatial-temporal features with bag-of-features
representation achieve state-of-the-art performance for action recognition, the
huge feature number and feature size prevent current methods from scaling up to
real size problems. In this work, we investigate different types of feature
sampling strategies for action recognition, namely dense sampling, uniformly
random sampling and selective sampling. We propose two effective selective
sampling methods using object proposal techniques. Experiments conducted on a
large video dataset show that we are able to achieve better average recognition
accuracy using 25% less features, through one of proposed selective sampling
methods, and even remain comparable accuracy while discarding 70% features.
|
1501.07020 | Alireza Khoshkbarforoushha | Alireza Khoshkbarforoushha, Rajiv Ranjan, Raj Gaire, Prem P.
Jayaraman, John Hosking, Ehsan Abbasnejad | Resource Usage Estimation of Data Stream Processing Workloads in
Datacenter Clouds | Working Paper | null | null | null | cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Real-time computation of data streams over affordable virtualized
infrastructure resources is an important form of data in motion processing
architecture. However, processing such data streams while ensuring strict
guarantees on quality of services is problematic due to: (i) uncertain stream
arrival pattern; (ii) need of processing different types of continuous queries;
and (iii) variable resource consumption behavior of continuous queries. Recent
work has explored the use of statistical techniques for resource estimation of
SQL queries and OLTP workloads. All these techniques approximate resource usage
for each query as a single point value. However, in data stream processing
workloads in which data flows through the graph of operators endlessly and
poses performance and resource demand fluctuations, the single point resource
estimation is inadequate. Because it is neither expressive enough nor does it
capture the multi-modal nature of the target data. To this end, we present a
novel technique which uses mixture density networks, a combined structure of
neural networks and mixture models, to estimate the whole spectrum of resource
usage as probability density functions. The proposed approach is a flexible and
convenient means of modeling unknown distribution models. We have validated the
models using both the linear road benchmark and the TPC-H, observing high
accuracy under a number of error metrics: mean-square error, continuous ranked
probability score, and negative log predictive density.
| [
{
"version": "v1",
"created": "Wed, 28 Jan 2015 08:11:10 GMT"
}
] | 2015-01-29T00:00:00 | [
[
"Khoshkbarforoushha",
"Alireza",
""
],
[
"Ranjan",
"Rajiv",
""
],
[
"Gaire",
"Raj",
""
],
[
"Jayaraman",
"Prem P.",
""
],
[
"Hosking",
"John",
""
],
[
"Abbasnejad",
"Ehsan",
""
]
] | TITLE: Resource Usage Estimation of Data Stream Processing Workloads in
Datacenter Clouds
ABSTRACT: Real-time computation of data streams over affordable virtualized
infrastructure resources is an important form of data in motion processing
architecture. However, processing such data streams while ensuring strict
guarantees on quality of services is problematic due to: (i) uncertain stream
arrival pattern; (ii) need of processing different types of continuous queries;
and (iii) variable resource consumption behavior of continuous queries. Recent
work has explored the use of statistical techniques for resource estimation of
SQL queries and OLTP workloads. All these techniques approximate resource usage
for each query as a single point value. However, in data stream processing
workloads in which data flows through the graph of operators endlessly and
poses performance and resource demand fluctuations, the single point resource
estimation is inadequate. Because it is neither expressive enough nor does it
capture the multi-modal nature of the target data. To this end, we present a
novel technique which uses mixture density networks, a combined structure of
neural networks and mixture models, to estimate the whole spectrum of resource
usage as probability density functions. The proposed approach is a flexible and
convenient means of modeling unknown distribution models. We have validated the
models using both the linear road benchmark and the TPC-H, observing high
accuracy under a number of error metrics: mean-square error, continuous ranked
probability score, and negative log predictive density.
|
1501.07184 | Zehra Meral Ozsoyoglu | Shi Qiao, Z. Meral Ozsoyoglu | One Size Does not Fit All: When to Use Signature-based Pruning to
Improve Template Matching for RDF graphs | null | null | null | null | cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Signature-based pruning is broadly accepted as an effective way to improve
query performance of graph template matching on general labeled graphs. Most
existing techniques which utilize signature-based pruning claim its benefits on
all datasets and queries. However, the effectiveness of signature-based pruning
varies greatly among different RDF datasets and highly related with their
dataset characteristics. We observe that the performance benefits from
signature-based pruning depend not only on the size of the RDF graphs, but also
the underlying graph structure and the complexity of queries. This motivates us
to propose a flexible RDF querying framework, called RDF-h, which selectively
utilizes signature-based pruning by evaluating the characteristics of RDF
datasets and query templates. Scalability and efficiency of RDF-h is
demonstrated in experimental results using both real and synthetic datasets.
Keywords: RDF, Graph Template Matching, Signature-based Pruning
| [
{
"version": "v1",
"created": "Wed, 28 Jan 2015 16:49:18 GMT"
}
] | 2015-01-29T00:00:00 | [
[
"Qiao",
"Shi",
""
],
[
"Ozsoyoglu",
"Z. Meral",
""
]
] | TITLE: One Size Does not Fit All: When to Use Signature-based Pruning to
Improve Template Matching for RDF graphs
ABSTRACT: Signature-based pruning is broadly accepted as an effective way to improve
query performance of graph template matching on general labeled graphs. Most
existing techniques which utilize signature-based pruning claim its benefits on
all datasets and queries. However, the effectiveness of signature-based pruning
varies greatly among different RDF datasets and highly related with their
dataset characteristics. We observe that the performance benefits from
signature-based pruning depend not only on the size of the RDF graphs, but also
the underlying graph structure and the complexity of queries. This motivates us
to propose a flexible RDF querying framework, called RDF-h, which selectively
utilizes signature-based pruning by evaluating the characteristics of RDF
datasets and query templates. Scalability and efficiency of RDF-h is
demonstrated in experimental results using both real and synthetic datasets.
Keywords: RDF, Graph Template Matching, Signature-based Pruning
|
1501.07203 | Walter Quattrociocchi | Michela Del Vicario, Qian Zhang, Alessandro Bessi, Fabiana Zollo,
Antonio Scala, Guido Caldarelli, Walter Quattrociocchi | Structural Patterns of the Occupy Movement on Facebook | null | null | null | null | cs.SI cs.HC physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this work we study a peculiar example of social organization on Facebook:
the Occupy Movement -- i.e., an international protest movement against social
and economic inequality organized online at a city level. We consider 179 US
Facebook public pages during the time period between September 2011 and
February 2013. The dataset includes 618K active users and 753K posts that
received about 5.2M likes and 1.1M comments. By labeling user according to
their interaction patterns on pages -- e.g., a user is considered to be
polarized if she has at least the 95% of her likes on a specific page -- we
find that activities are not locally coordinated by geographically close pages,
but are driven by pages linked to major US cities that act as hubs within the
various groups. Such a pattern is verified even by extracting the backbone
structure -- i.e., filtering statistically relevant weight heterogeneities --
for both the pages-reshares and the pages-common users networks.
| [
{
"version": "v1",
"created": "Wed, 28 Jan 2015 17:23:59 GMT"
}
] | 2015-01-29T00:00:00 | [
[
"Del Vicario",
"Michela",
""
],
[
"Zhang",
"Qian",
""
],
[
"Bessi",
"Alessandro",
""
],
[
"Zollo",
"Fabiana",
""
],
[
"Scala",
"Antonio",
""
],
[
"Caldarelli",
"Guido",
""
],
[
"Quattrociocchi",
"Walter",
""
]
] | TITLE: Structural Patterns of the Occupy Movement on Facebook
ABSTRACT: In this work we study a peculiar example of social organization on Facebook:
the Occupy Movement -- i.e., an international protest movement against social
and economic inequality organized online at a city level. We consider 179 US
Facebook public pages during the time period between September 2011 and
February 2013. The dataset includes 618K active users and 753K posts that
received about 5.2M likes and 1.1M comments. By labeling user according to
their interaction patterns on pages -- e.g., a user is considered to be
polarized if she has at least the 95% of her likes on a specific page -- we
find that activities are not locally coordinated by geographically close pages,
but are driven by pages linked to major US cities that act as hubs within the
various groups. Such a pattern is verified even by extracting the backbone
structure -- i.e., filtering statistically relevant weight heterogeneities --
for both the pages-reshares and the pages-common users networks.
|
1409.2080 | Pierre Bellec | P. Bellec and Y. Benhajali and F. Carbonell and C. Dansereau and G.
Albouy and M. Pelland and C. Craddock and O. Collignon and J. Doyon and E.
Stip and P. Orban | Multiscale statistical testing for connectome-wide association studies
in fMRI | 54 pages, 12 main figures, 1 main table, 10 supplementary figures, 1
supplementary table | null | null | null | q-bio.QM cs.CV stat.AP | http://creativecommons.org/licenses/by/3.0/ | Alterations in brain connectivity have been associated with a variety of
clinical disorders using functional magnetic resonance imaging (fMRI). We
investigated empirically how the number of brain parcels (or scale) impacted
the results of a mass univariate general linear model (GLM) on connectomes. The
brain parcels used as nodes in the connectome analysis were functionnally
defined by a group cluster analysis. We first validated that a classic
Benjamini-Hochberg procedure with parametric GLM tests did control
appropriately the false-discovery rate (FDR) at a given scale. We then observed
on realistic simulations that there was no substantial inflation of the FDR
across scales, as long as the FDR was controlled independently within each
scale, and the presence of true associations could be established using an
omnibus permutation test combining all scales. Second, we observed both on
simulations and on three real resting-state fMRI datasets (schizophrenia,
congenital blindness, motor practice) that the rate of discovery varied
markedly as a function of scales, and was relatively higher for low scales,
below 25. Despite the differences in discovery rate, the statistical maps
derived at different scales were generally very consistent in the three real
datasets. Some seeds still showed effects better observed around 50,
illustrating the potential benefits of multiscale analysis. On real data, the
statistical maps agreed well with the existing literature. Overall, our results
support that the multiscale GLM connectome analysis with FDR is statistically
valid and can capture biologically meaningful effects in a variety of
experimental conditions.
| [
{
"version": "v1",
"created": "Sun, 7 Sep 2014 04:07:22 GMT"
},
{
"version": "v2",
"created": "Mon, 26 Jan 2015 21:00:45 GMT"
}
] | 2015-01-28T00:00:00 | [
[
"Bellec",
"P.",
""
],
[
"Benhajali",
"Y.",
""
],
[
"Carbonell",
"F.",
""
],
[
"Dansereau",
"C.",
""
],
[
"Albouy",
"G.",
""
],
[
"Pelland",
"M.",
""
],
[
"Craddock",
"C.",
""
],
[
"Collignon",
"O.",
""
],
[
"Doyon",
"J.",
""
],
[
"Stip",
"E.",
""
],
[
"Orban",
"P.",
""
]
] | TITLE: Multiscale statistical testing for connectome-wide association studies
in fMRI
ABSTRACT: Alterations in brain connectivity have been associated with a variety of
clinical disorders using functional magnetic resonance imaging (fMRI). We
investigated empirically how the number of brain parcels (or scale) impacted
the results of a mass univariate general linear model (GLM) on connectomes. The
brain parcels used as nodes in the connectome analysis were functionnally
defined by a group cluster analysis. We first validated that a classic
Benjamini-Hochberg procedure with parametric GLM tests did control
appropriately the false-discovery rate (FDR) at a given scale. We then observed
on realistic simulations that there was no substantial inflation of the FDR
across scales, as long as the FDR was controlled independently within each
scale, and the presence of true associations could be established using an
omnibus permutation test combining all scales. Second, we observed both on
simulations and on three real resting-state fMRI datasets (schizophrenia,
congenital blindness, motor practice) that the rate of discovery varied
markedly as a function of scales, and was relatively higher for low scales,
below 25. Despite the differences in discovery rate, the statistical maps
derived at different scales were generally very consistent in the three real
datasets. Some seeds still showed effects better observed around 50,
illustrating the potential benefits of multiscale analysis. On real data, the
statistical maps agreed well with the existing literature. Overall, our results
support that the multiscale GLM connectome analysis with FDR is statistically
valid and can capture biologically meaningful effects in a variety of
experimental conditions.
|
1412.3409 | Christopher Clark | Christopher Clark and Amos Storkey | Teaching Deep Convolutional Neural Networks to Play Go | 9 pages, 8 figures, 5 tables. Corrected typos, minor adjustment to
table format | null | null | null | cs.AI cs.LG cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Mastering the game of Go has remained a long standing challenge to the field
of AI. Modern computer Go systems rely on processing millions of possible
future positions to play well, but intuitively a stronger and more 'humanlike'
way to play the game would be to rely on pattern recognition abilities rather
then brute force computation. Following this sentiment, we train deep
convolutional neural networks to play Go by training them to predict the moves
made by expert Go players. To solve this problem we introduce a number of novel
techniques, including a method of tying weights in the network to 'hard code'
symmetries that are expect to exist in the target function, and demonstrate in
an ablation study they considerably improve performance. Our final networks are
able to achieve move prediction accuracies of 41.1% and 44.4% on two different
Go datasets, surpassing previous state of the art on this task by significant
margins. Additionally, while previous move prediction programs have not yielded
strong Go playing programs, we show that the networks trained in this work
acquired high levels of skill. Our convolutional neural networks can
consistently defeat the well known Go program GNU Go, indicating it is state of
the art among programs that do not use Monte Carlo Tree Search. It is also able
to win some games against state of the art Go playing program Fuego while using
a fraction of the play time. This success at playing Go indicates high level
principles of the game were learned.
| [
{
"version": "v1",
"created": "Wed, 10 Dec 2014 18:59:43 GMT"
},
{
"version": "v2",
"created": "Tue, 27 Jan 2015 10:31:31 GMT"
}
] | 2015-01-28T00:00:00 | [
[
"Clark",
"Christopher",
""
],
[
"Storkey",
"Amos",
""
]
] | TITLE: Teaching Deep Convolutional Neural Networks to Play Go
ABSTRACT: Mastering the game of Go has remained a long standing challenge to the field
of AI. Modern computer Go systems rely on processing millions of possible
future positions to play well, but intuitively a stronger and more 'humanlike'
way to play the game would be to rely on pattern recognition abilities rather
then brute force computation. Following this sentiment, we train deep
convolutional neural networks to play Go by training them to predict the moves
made by expert Go players. To solve this problem we introduce a number of novel
techniques, including a method of tying weights in the network to 'hard code'
symmetries that are expect to exist in the target function, and demonstrate in
an ablation study they considerably improve performance. Our final networks are
able to achieve move prediction accuracies of 41.1% and 44.4% on two different
Go datasets, surpassing previous state of the art on this task by significant
margins. Additionally, while previous move prediction programs have not yielded
strong Go playing programs, we show that the networks trained in this work
acquired high levels of skill. Our convolutional neural networks can
consistently defeat the well known Go program GNU Go, indicating it is state of
the art among programs that do not use Monte Carlo Tree Search. It is also able
to win some games against state of the art Go playing program Fuego while using
a fraction of the play time. This success at playing Go indicates high level
principles of the game were learned.
|
1501.06247 | Peng Xia | Peng Xia, Benyuan Liu, Yizhou Sun and Cindy Chen | Reciprocal Recommendation System for Online Dating | null | null | null | null | cs.SI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Online dating sites have become popular platforms for people to look for
potential romantic partners. Different from traditional user-item
recommendations where the goal is to match items (e.g., books, videos, etc)
with a user's interests, a recommendation system for online dating aims to
match people who are mutually interested in and likely to communicate with each
other. We introduce similarity measures that capture the unique features and
characteristics of the online dating network, for example, the interest
similarity between two users if they send messages to same users, and
attractiveness similarity if they receive messages from same users. A
reciprocal score that measures the compatibility between a user and each
potential dating candidate is computed and the recommendation list is generated
to include users with top scores. The performance of our proposed
recommendation system is evaluated on a real-world dataset from a major online
dating site in China. The results show that our recommendation algorithms
significantly outperform previously proposed approaches, and the collaborative
filtering-based algorithms achieve much better performance than content-based
algorithms in both precision and recall. Our results also reveal interesting
behavioral difference between male and female users when it comes to looking
for potential dates. In particular, males tend to be focused on their own
interest and oblivious towards their attractiveness to potential dates, while
females are more conscientious to their own attractiveness to the other side of
the line.
| [
{
"version": "v1",
"created": "Mon, 26 Jan 2015 03:22:10 GMT"
},
{
"version": "v2",
"created": "Tue, 27 Jan 2015 13:10:25 GMT"
}
] | 2015-01-28T00:00:00 | [
[
"Xia",
"Peng",
""
],
[
"Liu",
"Benyuan",
""
],
[
"Sun",
"Yizhou",
""
],
[
"Chen",
"Cindy",
""
]
] | TITLE: Reciprocal Recommendation System for Online Dating
ABSTRACT: Online dating sites have become popular platforms for people to look for
potential romantic partners. Different from traditional user-item
recommendations where the goal is to match items (e.g., books, videos, etc)
with a user's interests, a recommendation system for online dating aims to
match people who are mutually interested in and likely to communicate with each
other. We introduce similarity measures that capture the unique features and
characteristics of the online dating network, for example, the interest
similarity between two users if they send messages to same users, and
attractiveness similarity if they receive messages from same users. A
reciprocal score that measures the compatibility between a user and each
potential dating candidate is computed and the recommendation list is generated
to include users with top scores. The performance of our proposed
recommendation system is evaluated on a real-world dataset from a major online
dating site in China. The results show that our recommendation algorithms
significantly outperform previously proposed approaches, and the collaborative
filtering-based algorithms achieve much better performance than content-based
algorithms in both precision and recall. Our results also reveal interesting
behavioral difference between male and female users when it comes to looking
for potential dates. In particular, males tend to be focused on their own
interest and oblivious towards their attractiveness to potential dates, while
females are more conscientious to their own attractiveness to the other side of
the line.
|
1501.06722 | Alin Popa | Alin-Ionut Popa and Cristian Sminchisescu | Parametric Image Segmentation of Humans with Structural Shape Priors | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The figure-ground segmentation of humans in images captured in natural
environments is an outstanding open problem due to the presence of complex
backgrounds, articulation, varying body proportions, partial views and
viewpoint changes. In this work we propose class-specific segmentation models
that leverage parametric max-flow image segmentation and a large dataset of
human shapes. Our contributions are as follows: (1) formulation of a
sub-modular energy model that combines class-specific structural constraints
and data-driven shape priors, within a parametric max-flow optimization
methodology that systematically computes all breakpoints of the model in
polynomial time; (2) design of a data-driven class-specific fusion methodology,
based on matching against a large training set of exemplar human shapes
(100,000 in our experiments), that allows the shape prior to be constructed
on-the-fly, for arbitrary viewpoints and partial views. (3) demonstration of
state of the art results, in two challenging datasets, H3D and MPII (where
figure-ground segmentation annotations have been added by us), where we
substantially improve on the first ranked hypothesis estimates of mid-level
segmentation methods, by 20%, with hypothesis set sizes that are up to one
order of magnitude smaller.
| [
{
"version": "v1",
"created": "Tue, 27 Jan 2015 10:03:45 GMT"
}
] | 2015-01-28T00:00:00 | [
[
"Popa",
"Alin-Ionut",
""
],
[
"Sminchisescu",
"Cristian",
""
]
] | TITLE: Parametric Image Segmentation of Humans with Structural Shape Priors
ABSTRACT: The figure-ground segmentation of humans in images captured in natural
environments is an outstanding open problem due to the presence of complex
backgrounds, articulation, varying body proportions, partial views and
viewpoint changes. In this work we propose class-specific segmentation models
that leverage parametric max-flow image segmentation and a large dataset of
human shapes. Our contributions are as follows: (1) formulation of a
sub-modular energy model that combines class-specific structural constraints
and data-driven shape priors, within a parametric max-flow optimization
methodology that systematically computes all breakpoints of the model in
polynomial time; (2) design of a data-driven class-specific fusion methodology,
based on matching against a large training set of exemplar human shapes
(100,000 in our experiments), that allows the shape prior to be constructed
on-the-fly, for arbitrary viewpoints and partial views. (3) demonstration of
state of the art results, in two challenging datasets, H3D and MPII (where
figure-ground segmentation annotations have been added by us), where we
substantially improve on the first ranked hypothesis estimates of mid-level
segmentation methods, by 20%, with hypothesis set sizes that are up to one
order of magnitude smaller.
|
1411.7399 | Lior Wolf | Benjamin Klein, Guy Lev, Gil Sadeh, Lior Wolf | Fisher Vectors Derived from Hybrid Gaussian-Laplacian Mixture Models for
Image Annotation | new version includes text synthesis by an RNN and experiments with
the COCO benchmark | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In the traditional object recognition pipeline, descriptors are densely
sampled over an image, pooled into a high dimensional non-linear representation
and then passed to a classifier. In recent years, Fisher Vectors have proven
empirically to be the leading representation for a large variety of
applications. The Fisher Vector is typically taken as the gradients of the
log-likelihood of descriptors, with respect to the parameters of a Gaussian
Mixture Model (GMM). Motivated by the assumption that different distributions
should be applied for different datasets, we present two other Mixture Models
and derive their Expectation-Maximization and Fisher Vector expressions. The
first is a Laplacian Mixture Model (LMM), which is based on the Laplacian
distribution. The second Mixture Model presented is a Hybrid Gaussian-Laplacian
Mixture Model (HGLMM) which is based on a weighted geometric mean of the
Gaussian and Laplacian distribution. An interesting property of the
Expectation-Maximization algorithm for the latter is that in the maximization
step, each dimension in each component is chosen to be either a Gaussian or a
Laplacian. Finally, by using the new Fisher Vectors derived from HGLMMs, we
achieve state-of-the-art results for both the image annotation and the image
search by a sentence tasks.
| [
{
"version": "v1",
"created": "Wed, 26 Nov 2014 21:21:51 GMT"
},
{
"version": "v2",
"created": "Sat, 24 Jan 2015 20:03:50 GMT"
}
] | 2015-01-27T00:00:00 | [
[
"Klein",
"Benjamin",
""
],
[
"Lev",
"Guy",
""
],
[
"Sadeh",
"Gil",
""
],
[
"Wolf",
"Lior",
""
]
] | TITLE: Fisher Vectors Derived from Hybrid Gaussian-Laplacian Mixture Models for
Image Annotation
ABSTRACT: In the traditional object recognition pipeline, descriptors are densely
sampled over an image, pooled into a high dimensional non-linear representation
and then passed to a classifier. In recent years, Fisher Vectors have proven
empirically to be the leading representation for a large variety of
applications. The Fisher Vector is typically taken as the gradients of the
log-likelihood of descriptors, with respect to the parameters of a Gaussian
Mixture Model (GMM). Motivated by the assumption that different distributions
should be applied for different datasets, we present two other Mixture Models
and derive their Expectation-Maximization and Fisher Vector expressions. The
first is a Laplacian Mixture Model (LMM), which is based on the Laplacian
distribution. The second Mixture Model presented is a Hybrid Gaussian-Laplacian
Mixture Model (HGLMM) which is based on a weighted geometric mean of the
Gaussian and Laplacian distribution. An interesting property of the
Expectation-Maximization algorithm for the latter is that in the maximization
step, each dimension in each component is chosen to be either a Gaussian or a
Laplacian. Finally, by using the new Fisher Vectors derived from HGLMMs, we
achieve state-of-the-art results for both the image annotation and the image
search by a sentence tasks.
|
1412.3705 | Weicong Ding | Weicong Ding, Prakash Ishwar, Venkatesh Saligrama | A Topic Modeling Approach to Ranking | null | null | null | null | cs.LG stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose a topic modeling approach to the prediction of preferences in
pairwise comparisons. We develop a new generative model for pairwise
comparisons that accounts for multiple shared latent rankings that are
prevalent in a population of users. This new model also captures inconsistent
user behavior in a natural way. We show how the estimation of latent rankings
in the new generative model can be formally reduced to the estimation of topics
in a statistically equivalent topic modeling problem. We leverage recent
advances in the topic modeling literature to develop an algorithm that can
learn shared latent rankings with provable consistency as well as sample and
computational complexity guarantees. We demonstrate that the new approach is
empirically competitive with the current state-of-the-art approaches in
predicting preferences on some semi-synthetic and real world datasets.
| [
{
"version": "v1",
"created": "Thu, 11 Dec 2014 16:15:53 GMT"
},
{
"version": "v2",
"created": "Fri, 12 Dec 2014 22:01:20 GMT"
},
{
"version": "v3",
"created": "Sun, 25 Jan 2015 22:32:10 GMT"
}
] | 2015-01-27T00:00:00 | [
[
"Ding",
"Weicong",
""
],
[
"Ishwar",
"Prakash",
""
],
[
"Saligrama",
"Venkatesh",
""
]
] | TITLE: A Topic Modeling Approach to Ranking
ABSTRACT: We propose a topic modeling approach to the prediction of preferences in
pairwise comparisons. We develop a new generative model for pairwise
comparisons that accounts for multiple shared latent rankings that are
prevalent in a population of users. This new model also captures inconsistent
user behavior in a natural way. We show how the estimation of latent rankings
in the new generative model can be formally reduced to the estimation of topics
in a statistically equivalent topic modeling problem. We leverage recent
advances in the topic modeling literature to develop an algorithm that can
learn shared latent rankings with provable consistency as well as sample and
computational complexity guarantees. We demonstrate that the new approach is
empirically competitive with the current state-of-the-art approaches in
predicting preferences on some semi-synthetic and real world datasets.
|
1501.06102 | Terrence Adams | Terrence Adams | Development of a Big Data Framework for Connectomic Research | 6 pages, 9 figures | null | null | null | cs.DC cs.CE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper outlines research and development of a new Hadoop-based
architecture for distributed processing and analysis of electron microscopy of
brains. We show development of a new C++ library for implementation of 3D image
analysis techniques, and deployment in a distributed map/reduce framework. We
demonstrate our new framework on a subset of the Kasthuri11 dataset from the
Open Connectome Project.
| [
{
"version": "v1",
"created": "Sun, 25 Jan 2015 01:42:09 GMT"
}
] | 2015-01-27T00:00:00 | [
[
"Adams",
"Terrence",
""
]
] | TITLE: Development of a Big Data Framework for Connectomic Research
ABSTRACT: This paper outlines research and development of a new Hadoop-based
architecture for distributed processing and analysis of electron microscopy of
brains. We show development of a new C++ library for implementation of 3D image
analysis techniques, and deployment in a distributed map/reduce framework. We
demonstrate our new framework on a subset of the Kasthuri11 dataset from the
Open Connectome Project.
|
1501.06129 | Swagat Kumar | Sourav Garg, Swagat Kumar, Rajesh Ratnakaram, Prithwijit Guha | An Occlusion Reasoning Scheme for Monocular Pedestrian Tracking in
Dynamic Scenes | 8 pages | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper looks into the problem of pedestrian tracking using a monocular,
potentially moving, uncalibrated camera. The pedestrians are located in each
frame using a standard human detector, which are then tracked in subsequent
frames. This is a challenging problem as one has to deal with complex
situations like changing background, partial or full occlusion and camera
motion. In order to carry out successful tracking, it is necessary to resolve
associations between the detected windows in the current frame with those
obtained from the previous frame. Compared to methods that use temporal windows
incorporating past as well as future information, we attempt to make decision
on a frame-by-frame basis. An occlusion reasoning scheme is proposed to resolve
the association problem between a pair of consecutive frames by using an
affinity matrix that defines the closeness between a pair of windows and then,
uses a binary integer programming to obtain unique association between them. A
second stage of verification based on SURF matching is used to deal with those
cases where the above optimization scheme might yield wrong associations. The
efficacy of the approach is demonstrated through experiments on several
standard pedestrian datasets.
| [
{
"version": "v1",
"created": "Sun, 25 Jan 2015 08:38:48 GMT"
}
] | 2015-01-27T00:00:00 | [
[
"Garg",
"Sourav",
""
],
[
"Kumar",
"Swagat",
""
],
[
"Ratnakaram",
"Rajesh",
""
],
[
"Guha",
"Prithwijit",
""
]
] | TITLE: An Occlusion Reasoning Scheme for Monocular Pedestrian Tracking in
Dynamic Scenes
ABSTRACT: This paper looks into the problem of pedestrian tracking using a monocular,
potentially moving, uncalibrated camera. The pedestrians are located in each
frame using a standard human detector, which are then tracked in subsequent
frames. This is a challenging problem as one has to deal with complex
situations like changing background, partial or full occlusion and camera
motion. In order to carry out successful tracking, it is necessary to resolve
associations between the detected windows in the current frame with those
obtained from the previous frame. Compared to methods that use temporal windows
incorporating past as well as future information, we attempt to make decision
on a frame-by-frame basis. An occlusion reasoning scheme is proposed to resolve
the association problem between a pair of consecutive frames by using an
affinity matrix that defines the closeness between a pair of windows and then,
uses a binary integer programming to obtain unique association between them. A
second stage of verification based on SURF matching is used to deal with those
cases where the above optimization scheme might yield wrong associations. The
efficacy of the approach is demonstrated through experiments on several
standard pedestrian datasets.
|
1501.06194 | Ilan Shomorony | Ilan Shomorony, Thomas Courtade, and David Tse | Do Read Errors Matter for Genome Assembly? | Submitted to ISIT 2015 | null | null | null | cs.IT math.IT q-bio.GN | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | While most current high-throughput DNA sequencing technologies generate short
reads with low error rates, emerging sequencing technologies generate long
reads with high error rates. A basic question of interest is the tradeoff
between read length and error rate in terms of the information needed for the
perfect assembly of the genome. Using an adversarial erasure error model, we
make progress on this problem by establishing a critical read length, as a
function of the genome and the error rate, above which perfect assembly is
guaranteed. For several real genomes, including those from the GAGE dataset, we
verify that this critical read length is not significantly greater than the
read length required for perfect assembly from reads without errors.
| [
{
"version": "v1",
"created": "Sun, 25 Jan 2015 18:40:19 GMT"
}
] | 2015-01-27T00:00:00 | [
[
"Shomorony",
"Ilan",
""
],
[
"Courtade",
"Thomas",
""
],
[
"Tse",
"David",
""
]
] | TITLE: Do Read Errors Matter for Genome Assembly?
ABSTRACT: While most current high-throughput DNA sequencing technologies generate short
reads with low error rates, emerging sequencing technologies generate long
reads with high error rates. A basic question of interest is the tradeoff
between read length and error rate in terms of the information needed for the
perfect assembly of the genome. Using an adversarial erasure error model, we
make progress on this problem by establishing a critical read length, as a
function of the genome and the error rate, above which perfect assembly is
guaranteed. For several real genomes, including those from the GAGE dataset, we
verify that this critical read length is not significantly greater than the
read length required for perfect assembly from reads without errors.
|
1501.06225 | Shahin Shahrampour | Ali Jadbabaie, Alexander Rakhlin, Shahin Shahrampour and Karthik
Sridharan | Online Optimization : Competing with Dynamic Comparators | 23 pages, To appear in International Conference on Artificial
Intelligence and Statistics (AISTATS) 2015 | null | null | null | cs.LG math.OC stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Recent literature on online learning has focused on developing adaptive
algorithms that take advantage of a regularity of the sequence of observations,
yet retain worst-case performance guarantees. A complementary direction is to
develop prediction methods that perform well against complex benchmarks. In
this paper, we address these two directions together. We present a fully
adaptive method that competes with dynamic benchmarks in which regret guarantee
scales with regularity of the sequence of cost functions and comparators.
Notably, the regret bound adapts to the smaller complexity measure in the
problem environment. Finally, we apply our results to drifting zero-sum,
two-player games where both players achieve no regret guarantees against best
sequences of actions in hindsight.
| [
{
"version": "v1",
"created": "Mon, 26 Jan 2015 00:40:08 GMT"
}
] | 2015-01-27T00:00:00 | [
[
"Jadbabaie",
"Ali",
""
],
[
"Rakhlin",
"Alexander",
""
],
[
"Shahrampour",
"Shahin",
""
],
[
"Sridharan",
"Karthik",
""
]
] | TITLE: Online Optimization : Competing with Dynamic Comparators
ABSTRACT: Recent literature on online learning has focused on developing adaptive
algorithms that take advantage of a regularity of the sequence of observations,
yet retain worst-case performance guarantees. A complementary direction is to
develop prediction methods that perform well against complex benchmarks. In
this paper, we address these two directions together. We present a fully
adaptive method that competes with dynamic benchmarks in which regret guarantee
scales with regularity of the sequence of cost functions and comparators.
Notably, the regret bound adapts to the smaller complexity measure in the
problem environment. Finally, we apply our results to drifting zero-sum,
two-player games where both players achieve no regret guarantees against best
sequences of actions in hindsight.
|
1501.06396 | Ben Teng | Ben Teng, Can Yang, Jiming Liu, Zhipeng Cai and Xiang Wan | Exploring the genetic patterns of complex diseases via the integrative
genome-wide approach | null | null | null | null | cs.CE q-bio.QM stat.ME | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Motivation: Genome-wide association studies (GWASs), which assay more than a
million single nucleotide polymorphisms (SNPs) in thousands of individuals,
have been widely used to identify genetic risk variants for complex diseases.
However, most of the variants that have been identified contribute relatively
small increments of risk and only explain a small portion of the genetic
variation in complex diseases. This is the so-called missing heritability
problem. Evidence has indicated that many complex diseases are genetically
related, meaning these diseases share common genetic risk variants. Therefore,
exploring the genetic correlations across multiple related studies could be a
promising strategy for removing spurious associations and identifying
underlying genetic risk variants, and thereby uncovering the mystery of missing
heritability in complex diseases. Results: We present a general and robust
method to identify genetic patterns from multiple large-scale genomic datasets.
We treat the summary statistics as a matrix and demonstrate that genetic
patterns will form a low-rank matrix plus a sparse component. Hence, we
formulate the problem as a matrix recovering problem, where we aim to discover
risk variants shared by multiple diseases/traits and those for each individual
disease/trait. We propose a convex formulation for matrix recovery and an
efficient algorithm to solve the problem. We demonstrate the advantages of our
method using both synthesized datasets and real datasets. The experimental
results show that our method can successfully reconstruct both the shared and
the individual genetic patterns from summary statistics and achieve better
performance compared with alternative methods under a wide range of scenarios.
| [
{
"version": "v1",
"created": "Mon, 26 Jan 2015 13:59:23 GMT"
}
] | 2015-01-27T00:00:00 | [
[
"Teng",
"Ben",
""
],
[
"Yang",
"Can",
""
],
[
"Liu",
"Jiming",
""
],
[
"Cai",
"Zhipeng",
""
],
[
"Wan",
"Xiang",
""
]
] | TITLE: Exploring the genetic patterns of complex diseases via the integrative
genome-wide approach
ABSTRACT: Motivation: Genome-wide association studies (GWASs), which assay more than a
million single nucleotide polymorphisms (SNPs) in thousands of individuals,
have been widely used to identify genetic risk variants for complex diseases.
However, most of the variants that have been identified contribute relatively
small increments of risk and only explain a small portion of the genetic
variation in complex diseases. This is the so-called missing heritability
problem. Evidence has indicated that many complex diseases are genetically
related, meaning these diseases share common genetic risk variants. Therefore,
exploring the genetic correlations across multiple related studies could be a
promising strategy for removing spurious associations and identifying
underlying genetic risk variants, and thereby uncovering the mystery of missing
heritability in complex diseases. Results: We present a general and robust
method to identify genetic patterns from multiple large-scale genomic datasets.
We treat the summary statistics as a matrix and demonstrate that genetic
patterns will form a low-rank matrix plus a sparse component. Hence, we
formulate the problem as a matrix recovering problem, where we aim to discover
risk variants shared by multiple diseases/traits and those for each individual
disease/trait. We propose a convex formulation for matrix recovery and an
efficient algorithm to solve the problem. We demonstrate the advantages of our
method using both synthesized datasets and real datasets. The experimental
results show that our method can successfully reconstruct both the shared and
the individual genetic patterns from summary statistics and achieve better
performance compared with alternative methods under a wide range of scenarios.
|
1501.06456 | Sanjay Chakraborty | Ratul Dey Sanjay Chakraborty Lopamudra Dey | Weather forecasting using Convex hull & K-Means Techniques An Approach | 1st International Science & Technology Congress(IEMCON-2015) Elsevier | null | null | null | cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Data mining is a popular concept of mined necessary data from a large set of
data. Data mining using clustering is a powerful way to analyze data and gives
prediction. In this paper non structural time series data is used to forecast
daily average temperature, humidity and overall weather conditions of Kolkata
city. The air pollution data have been taken from West Bengal Pollution Control
Board to build the original dataset on which the prediction approach of this
paper is studied and applied. This paper describes a new technique to predict
the weather conditions using convex hull which gives structural data and then
apply incremental K-means to define the appropriate clusters. It splits the
total database into four separate databases with respect to different weather
conditions. In the final step, the result will be calculated on the basis of
priority based protocol which is defined based on some mathematical deduction.
| [
{
"version": "v1",
"created": "Mon, 26 Jan 2015 16:12:01 GMT"
}
] | 2015-01-27T00:00:00 | [
[
"Dey",
"Ratul Dey Sanjay Chakraborty Lopamudra",
""
]
] | TITLE: Weather forecasting using Convex hull & K-Means Techniques An Approach
ABSTRACT: Data mining is a popular concept of mined necessary data from a large set of
data. Data mining using clustering is a powerful way to analyze data and gives
prediction. In this paper non structural time series data is used to forecast
daily average temperature, humidity and overall weather conditions of Kolkata
city. The air pollution data have been taken from West Bengal Pollution Control
Board to build the original dataset on which the prediction approach of this
paper is studied and applied. This paper describes a new technique to predict
the weather conditions using convex hull which gives structural data and then
apply incremental K-means to define the appropriate clusters. It splits the
total database into four separate databases with respect to different weather
conditions. In the final step, the result will be calculated on the basis of
priority based protocol which is defined based on some mathematical deduction.
|
1501.06561 | Mina Ghashami | Amey Desai, Mina Ghashami and Jeff M. Phillips | Improved Practical Matrix Sketching with Guarantees | 27 pages | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Matrices have become essential data representations for many large-scale
problems in data analytics, and hence matrix sketching is a critical task.
Although much research has focused on improving the error/size tradeoff under
various sketching paradigms, the many forms of error bounds make these
approaches hard to compare in theory and in practice. This paper attempts to
categorize and compare most known methods under row-wise streaming updates with
provable guarantees, and then to tweak some of these methods to gain practical
improvements while retaining guarantees.
For instance, we observe that a simple heuristic iSVD, with no guarantees,
tends to outperform all known approaches in terms of size/error trade-off. We
modify the best performing method with guarantees FrequentDirections under the
size/error trade-off to match the performance of iSVD and retain its
guarantees. We also demonstrate some adversarial datasets where iSVD performs
quite poorly. In comparing techniques in the time/error trade-off, techniques
based on hashing or sampling tend to perform better. In this setting we modify
the most studied sampling regime to retain error guarantee but obtain dramatic
improvements in the time/error trade-off.
Finally, we provide easy replication of our studies on APT, a new testbed
which makes available not only code and datasets, but also a computing platform
with fixed environmental settings.
| [
{
"version": "v1",
"created": "Mon, 26 Jan 2015 20:44:31 GMT"
}
] | 2015-01-27T00:00:00 | [
[
"Desai",
"Amey",
""
],
[
"Ghashami",
"Mina",
""
],
[
"Phillips",
"Jeff M.",
""
]
] | TITLE: Improved Practical Matrix Sketching with Guarantees
ABSTRACT: Matrices have become essential data representations for many large-scale
problems in data analytics, and hence matrix sketching is a critical task.
Although much research has focused on improving the error/size tradeoff under
various sketching paradigms, the many forms of error bounds make these
approaches hard to compare in theory and in practice. This paper attempts to
categorize and compare most known methods under row-wise streaming updates with
provable guarantees, and then to tweak some of these methods to gain practical
improvements while retaining guarantees.
For instance, we observe that a simple heuristic iSVD, with no guarantees,
tends to outperform all known approaches in terms of size/error trade-off. We
modify the best performing method with guarantees FrequentDirections under the
size/error trade-off to match the performance of iSVD and retain its
guarantees. We also demonstrate some adversarial datasets where iSVD performs
quite poorly. In comparing techniques in the time/error trade-off, techniques
based on hashing or sampling tend to perform better. In this setting we modify
the most studied sampling regime to retain error guarantee but obtain dramatic
improvements in the time/error trade-off.
Finally, we provide easy replication of our studies on APT, a new testbed
which makes available not only code and datasets, but also a computing platform
with fixed environmental settings.
|
1003.6059 | Satadal Saha | Satadal Saha, Subhadip Basu, Mita Nasipuri and Dipak Kumar Basu | A novel scheme for binarization of vehicle images using hierarchical
histogram equalization technique | International Conference on Computer, Communication, Control and
Information Technology (C3IT 2009) | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Automatic License Plate Recognition system is a challenging area of research
now-a-days and binarization is an integral and most important part of it. In
case of a real life scenario, most of existing methods fail to properly
binarize the image of a vehicle in a congested road, captured through a CCD
camera. In the current work we have applied histogram equalization technique
over the complete image and also over different hierarchy of image
partitioning. A novel scheme is formulated for giving the membership value to
each pixel for each hierarchy of histogram equalization. Then the image is
binarized depending on the net membership value of each pixel. The technique is
exhaustively evaluated on the vehicle image dataset as well as the license
plate dataset, giving satisfactory performances.
| [
{
"version": "v1",
"created": "Wed, 31 Mar 2010 14:00:16 GMT"
},
{
"version": "v2",
"created": "Thu, 22 Jan 2015 21:26:41 GMT"
}
] | 2015-01-26T00:00:00 | [
[
"Saha",
"Satadal",
""
],
[
"Basu",
"Subhadip",
""
],
[
"Nasipuri",
"Mita",
""
],
[
"Basu",
"Dipak Kumar",
""
]
] | TITLE: A novel scheme for binarization of vehicle images using hierarchical
histogram equalization technique
ABSTRACT: Automatic License Plate Recognition system is a challenging area of research
now-a-days and binarization is an integral and most important part of it. In
case of a real life scenario, most of existing methods fail to properly
binarize the image of a vehicle in a congested road, captured through a CCD
camera. In the current work we have applied histogram equalization technique
over the complete image and also over different hierarchy of image
partitioning. A novel scheme is formulated for giving the membership value to
each pixel for each hierarchy of histogram equalization. Then the image is
binarized depending on the net membership value of each pixel. The technique is
exhaustively evaluated on the vehicle image dataset as well as the license
plate dataset, giving satisfactory performances.
|
1404.5562 | Sai Zhang | Sai Zhang, Ke Xu, Xi Chen, Xue Liu | Characterizing Information Spreading in Online Social Networks | 17 pages, 8 figures | null | null | null | cs.SI physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Online social networks (OSNs) are changing the way in which the information
spreads throughout the Internet. A deep understanding of the information
spreading in OSNs leads to both social and commercial benefits. In this paper,
we characterize the dynamic of information spreading (e.g., how fast and widely
the information spreads against time) in OSNs by developing a general and
accurate model based on the Interactive Markov Chains (IMCs) and mean-field
theory. This model explicitly reveals the impacts of the network topology on
information spreading in OSNs. Further, we extend our model to feature the
time-varying user behaviors and the ever-changing information popularity. The
complicated dynamic patterns of information spreading are captured by our model
using six key parameters. Extensive tests based on Renren's dataset validate
the accuracy of our model, which demonstrate that it can characterize the
dynamic patterns of video sharing in Renren precisely and predict future
spreading tendency successfully.
| [
{
"version": "v1",
"created": "Tue, 22 Apr 2014 17:17:40 GMT"
},
{
"version": "v2",
"created": "Thu, 24 Apr 2014 05:29:52 GMT"
},
{
"version": "v3",
"created": "Fri, 23 Jan 2015 10:36:53 GMT"
}
] | 2015-01-26T00:00:00 | [
[
"Zhang",
"Sai",
""
],
[
"Xu",
"Ke",
""
],
[
"Chen",
"Xi",
""
],
[
"Liu",
"Xue",
""
]
] | TITLE: Characterizing Information Spreading in Online Social Networks
ABSTRACT: Online social networks (OSNs) are changing the way in which the information
spreads throughout the Internet. A deep understanding of the information
spreading in OSNs leads to both social and commercial benefits. In this paper,
we characterize the dynamic of information spreading (e.g., how fast and widely
the information spreads against time) in OSNs by developing a general and
accurate model based on the Interactive Markov Chains (IMCs) and mean-field
theory. This model explicitly reveals the impacts of the network topology on
information spreading in OSNs. Further, we extend our model to feature the
time-varying user behaviors and the ever-changing information popularity. The
complicated dynamic patterns of information spreading are captured by our model
using six key parameters. Extensive tests based on Renren's dataset validate
the accuracy of our model, which demonstrate that it can characterize the
dynamic patterns of video sharing in Renren precisely and predict future
spreading tendency successfully.
|
1501.05192 | Umit Rusen Aktas | Umit Rusen Aktas, Mete Ozay, Ales Leonardis, Jeremy L. Wyatt | A Graph Theoretic Approach for Object Shape Representation in
Compositional Hierarchies Using a Hybrid Generative-Descriptive Model | Paper : 17 pages. 13th European Conference on Computer Vision (ECCV
2014), Zurich, Switzerland, September 6-12, 2014, Proceedings, Part III, pp
566-581. Supplementary material can be downloaded from
http://link.springer.com/content/esm/chp:10.1007/978-3-319-10578-9_37/file/MediaObjects/978-3-319-10578-9_37_MOESM1_ESM.pdf | null | 10.1007/978-3-319-10578-9_37 | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A graph theoretic approach is proposed for object shape representation in a
hierarchical compositional architecture called Compositional Hierarchy of Parts
(CHOP). In the proposed approach, vocabulary learning is performed using a
hybrid generative-descriptive model. First, statistical relationships between
parts are learned using a Minimum Conditional Entropy Clustering algorithm.
Then, selection of descriptive parts is defined as a frequent subgraph
discovery problem, and solved using a Minimum Description Length (MDL)
principle. Finally, part compositions are constructed by compressing the
internal data representation with discovered substructures. Shape
representation and computational complexity properties of the proposed approach
and algorithms are examined using six benchmark two-dimensional shape image
datasets. Experiments show that CHOP can employ part shareability and indexing
mechanisms for fast inference of part compositions using learned shape
vocabularies. Additionally, CHOP provides better shape retrieval performance
than the state-of-the-art shape retrieval methods.
| [
{
"version": "v1",
"created": "Wed, 21 Jan 2015 15:19:09 GMT"
},
{
"version": "v2",
"created": "Fri, 23 Jan 2015 16:04:57 GMT"
}
] | 2015-01-26T00:00:00 | [
[
"Aktas",
"Umit Rusen",
""
],
[
"Ozay",
"Mete",
""
],
[
"Leonardis",
"Ales",
""
],
[
"Wyatt",
"Jeremy L.",
""
]
] | TITLE: A Graph Theoretic Approach for Object Shape Representation in
Compositional Hierarchies Using a Hybrid Generative-Descriptive Model
ABSTRACT: A graph theoretic approach is proposed for object shape representation in a
hierarchical compositional architecture called Compositional Hierarchy of Parts
(CHOP). In the proposed approach, vocabulary learning is performed using a
hybrid generative-descriptive model. First, statistical relationships between
parts are learned using a Minimum Conditional Entropy Clustering algorithm.
Then, selection of descriptive parts is defined as a frequent subgraph
discovery problem, and solved using a Minimum Description Length (MDL)
principle. Finally, part compositions are constructed by compressing the
internal data representation with discovered substructures. Shape
representation and computational complexity properties of the proposed approach
and algorithms are examined using six benchmark two-dimensional shape image
datasets. Experiments show that CHOP can employ part shareability and indexing
mechanisms for fast inference of part compositions using learned shape
vocabularies. Additionally, CHOP provides better shape retrieval performance
than the state-of-the-art shape retrieval methods.
|
1501.05759 | Rodrigo Benenson | Shanshan Zhang and Rodrigo Benenson and Bernt Schiele | Filtered Channel Features for Pedestrian Detection | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper starts from the observation that multiple top performing
pedestrian detectors can be modelled by using an intermediate layer filtering
low-level features in combination with a boosted decision forest. Based on this
observation we propose a unifying framework and experimentally explore
different filter families. We report extensive results enabling a systematic
analysis.
Using filtered channel features we obtain top performance on the challenging
Caltech and KITTI datasets, while using only HOG+LUV as low-level features.
When adding optical flow features we further improve detection quality and
report the best known results on the Caltech dataset, reaching 93% recall at 1
FPPI.
| [
{
"version": "v1",
"created": "Fri, 23 Jan 2015 10:19:33 GMT"
}
] | 2015-01-26T00:00:00 | [
[
"Zhang",
"Shanshan",
""
],
[
"Benenson",
"Rodrigo",
""
],
[
"Schiele",
"Bernt",
""
]
] | TITLE: Filtered Channel Features for Pedestrian Detection
ABSTRACT: This paper starts from the observation that multiple top performing
pedestrian detectors can be modelled by using an intermediate layer filtering
low-level features in combination with a boosted decision forest. Based on this
observation we propose a unifying framework and experimentally explore
different filter families. We report extensive results enabling a systematic
analysis.
Using filtered channel features we obtain top performance on the challenging
Caltech and KITTI datasets, while using only HOG+LUV as low-level features.
When adding optical flow features we further improve detection quality and
report the best known results on the Caltech dataset, reaching 93% recall at 1
FPPI.
|
1501.05790 | Rodrigo Benenson | Jan Hosang and Mohamed Omran and Rodrigo Benenson and Bernt Schiele | Taking a Deeper Look at Pedestrians | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we study the use of convolutional neural networks (convnets)
for the task of pedestrian detection. Despite their recent diverse successes,
convnets historically underperform compared to other pedestrian detectors. We
deliberately omit explicitly modelling the problem into the network (e.g. parts
or occlusion modelling) and show that we can reach competitive performance
without bells and whistles. In a wide range of experiments we analyse small and
big convnets, their architectural choices, parameters, and the influence of
different training data, including pre-training on surrogate tasks.
We present the best convnet detectors on the Caltech and KITTI dataset. On
Caltech our convnets reach top performance both for the Caltech1x and
Caltech10x training setup. Using additional data at training time our strongest
convnet model is competitive even to detectors that use additional data
(optical flow) at test time.
| [
{
"version": "v1",
"created": "Fri, 23 Jan 2015 13:07:56 GMT"
}
] | 2015-01-26T00:00:00 | [
[
"Hosang",
"Jan",
""
],
[
"Omran",
"Mohamed",
""
],
[
"Benenson",
"Rodrigo",
""
],
[
"Schiele",
"Bernt",
""
]
] | TITLE: Taking a Deeper Look at Pedestrians
ABSTRACT: In this paper we study the use of convolutional neural networks (convnets)
for the task of pedestrian detection. Despite their recent diverse successes,
convnets historically underperform compared to other pedestrian detectors. We
deliberately omit explicitly modelling the problem into the network (e.g. parts
or occlusion modelling) and show that we can reach competitive performance
without bells and whistles. In a wide range of experiments we analyse small and
big convnets, their architectural choices, parameters, and the influence of
different training data, including pre-training on surrogate tasks.
We present the best convnet detectors on the Caltech and KITTI dataset. On
Caltech our convnets reach top performance both for the Caltech1x and
Caltech10x training setup. Using additional data at training time our strongest
convnet model is competitive even to detectors that use additional data
(optical flow) at test time.
|
1501.05916 | Nafees Qamar | Nafees Qamar, Yilong Yang, Andras Nadas, Zhiming Liu, and Janos
Sztipanovits | Anonymously Analyzing Clinical Datasets | null | null | null | null | cs.SE cs.CR cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper takes on the problem of automatically identifying
clinically-relevant patterns in medical datasets without compromising patient
privacy. To achieve this goal, we treat datasets as a black box for both
internal and external users of data that lets us handle clinical data queries
directly and far more efficiently. The novelty of the approach lies in avoiding
the data de-identification process often used as a means of preserving patient
privacy. The implemented toolkit combines software engineering technologies
such as Java EE and RESTful web services, to allow exchanging medical data in
an unidentifiable XML format as well as restricting users to the need-to-know
principle. Our technique also inhibits retrospective processing of data, such
as attacks by an adversary on a medical dataset using advanced computational
methods to reveal Protected Health Information (PHI). The approach is validated
on an endoscopic reporting application based on openEHR and MST standards. From
the usability perspective, the approach can be used to query datasets by
clinical researchers, governmental or non-governmental organizations in
monitoring health care services to improve quality of care.
| [
{
"version": "v1",
"created": "Wed, 19 Nov 2014 07:53:34 GMT"
}
] | 2015-01-26T00:00:00 | [
[
"Qamar",
"Nafees",
""
],
[
"Yang",
"Yilong",
""
],
[
"Nadas",
"Andras",
""
],
[
"Liu",
"Zhiming",
""
],
[
"Sztipanovits",
"Janos",
""
]
] | TITLE: Anonymously Analyzing Clinical Datasets
ABSTRACT: This paper takes on the problem of automatically identifying
clinically-relevant patterns in medical datasets without compromising patient
privacy. To achieve this goal, we treat datasets as a black box for both
internal and external users of data that lets us handle clinical data queries
directly and far more efficiently. The novelty of the approach lies in avoiding
the data de-identification process often used as a means of preserving patient
privacy. The implemented toolkit combines software engineering technologies
such as Java EE and RESTful web services, to allow exchanging medical data in
an unidentifiable XML format as well as restricting users to the need-to-know
principle. Our technique also inhibits retrospective processing of data, such
as attacks by an adversary on a medical dataset using advanced computational
methods to reveal Protected Health Information (PHI). The approach is validated
on an endoscopic reporting application based on openEHR and MST standards. From
the usability perspective, the approach can be used to query datasets by
clinical researchers, governmental or non-governmental organizations in
monitoring health care services to improve quality of care.
|
1310.3911 | Yongqing Wang | Yongqing Wang and Hua-Wei Shen and Shenghua Liu and Xue-Qi Cheng | Learning user-specific latent influence and susceptibility from
information cascades | from The 29th AAAI Conference on Artificial Intelligence (AAAI-2015) | null | null | null | cs.SI physics.soc-ph | http://creativecommons.org/licenses/by-nc-sa/3.0/ | Predicting cascade dynamics has important implications for understanding
information propagation and launching viral marketing. Previous works mainly
adopt a pair-wise manner, modeling the propagation probability between pairs of
users using n^2 independent parameters for n users. Consequently, these models
suffer from severe overfitting problem, specially for pairs of users without
direct interactions, limiting their prediction accuracy. Here we propose to
model the cascade dynamics by learning two low-dimensional user-specific
vectors from observed cascades, capturing their influence and susceptibility
respectively. This model requires much less parameters and thus could combat
overfitting problem. Moreover, this model could naturally model
context-dependent factors like cumulative effect in information propagation.
Extensive experiments on synthetic dataset and a large-scale microblogging
dataset demonstrate that this model outperforms the existing pair-wise models
at predicting cascade dynamics, cascade size, and "who will be retweeted".
| [
{
"version": "v1",
"created": "Tue, 15 Oct 2013 03:45:58 GMT"
},
{
"version": "v2",
"created": "Wed, 26 Nov 2014 08:49:46 GMT"
},
{
"version": "v3",
"created": "Thu, 22 Jan 2015 10:03:19 GMT"
}
] | 2015-01-23T00:00:00 | [
[
"Wang",
"Yongqing",
""
],
[
"Shen",
"Hua-Wei",
""
],
[
"Liu",
"Shenghua",
""
],
[
"Cheng",
"Xue-Qi",
""
]
] | TITLE: Learning user-specific latent influence and susceptibility from
information cascades
ABSTRACT: Predicting cascade dynamics has important implications for understanding
information propagation and launching viral marketing. Previous works mainly
adopt a pair-wise manner, modeling the propagation probability between pairs of
users using n^2 independent parameters for n users. Consequently, these models
suffer from severe overfitting problem, specially for pairs of users without
direct interactions, limiting their prediction accuracy. Here we propose to
model the cascade dynamics by learning two low-dimensional user-specific
vectors from observed cascades, capturing their influence and susceptibility
respectively. This model requires much less parameters and thus could combat
overfitting problem. Moreover, this model could naturally model
context-dependent factors like cumulative effect in information propagation.
Extensive experiments on synthetic dataset and a large-scale microblogging
dataset demonstrate that this model outperforms the existing pair-wise models
at predicting cascade dynamics, cascade size, and "who will be retweeted".
|
1407.6297 | Marta Sarzynska | Marta Sarzynska, Elizabeth A. Leicht, Gerardo Chowell, Mason A. Porter | Null Models for Community Detection in Spatially-Embedded, Temporal
Networks | null | null | null | null | physics.soc-ph cs.SI nlin.AO physics.bio-ph q-bio.PE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In the study of networks, it is often insightful to use algorithms to
determine mesoscale features such as "community structure", in which densely
connected sets of nodes constitute "communities" that have sparse connections
to other communities. The most popular way of detecting communities
algorithmically is to optimize the quality function known as modularity. When
optimizing modularity, one compares the actual connections in a (static or
time-dependent) network to the connections obtained from a random-graph
ensemble that acts as a null model. The communities are then the sets of nodes
that are connected to each other densely relative to what is expected from the
null model. Clearly, the process of community detection depends fundamentally
on the choice of null model, so it is important to develop and analyze novel
null models that take into account appropriate features of the system under
study. In this paper, we investigate the effects of using null models that take
incorporate spatial information, and we propose a novel null model based on the
radiation model of population spread. We also develop novel synthetic spatial
benchmark networks in which the connections between entities are based on
distance or flux between nodes, and we compare the performance of both static
and time-dependent radiation null models to the standard ("Newman-Girvan") null
model for modularity optimization and a recently-proposed gravity null model.
In our comparisons, we use both the above synthetic benchmarks and
time-dependent correlation networks that we construct using countrywide dengue
fever incidence data for Peru. We also evaluate a recently-proposed correlation
null model, which was developed specifically for correlation networks that are
constructed from time series, on the epidemic-correlation data.
| [
{
"version": "v1",
"created": "Wed, 23 Jul 2014 17:05:07 GMT"
},
{
"version": "v2",
"created": "Thu, 22 Jan 2015 12:13:06 GMT"
}
] | 2015-01-23T00:00:00 | [
[
"Sarzynska",
"Marta",
""
],
[
"Leicht",
"Elizabeth A.",
""
],
[
"Chowell",
"Gerardo",
""
],
[
"Porter",
"Mason A.",
""
]
] | TITLE: Null Models for Community Detection in Spatially-Embedded, Temporal
Networks
ABSTRACT: In the study of networks, it is often insightful to use algorithms to
determine mesoscale features such as "community structure", in which densely
connected sets of nodes constitute "communities" that have sparse connections
to other communities. The most popular way of detecting communities
algorithmically is to optimize the quality function known as modularity. When
optimizing modularity, one compares the actual connections in a (static or
time-dependent) network to the connections obtained from a random-graph
ensemble that acts as a null model. The communities are then the sets of nodes
that are connected to each other densely relative to what is expected from the
null model. Clearly, the process of community detection depends fundamentally
on the choice of null model, so it is important to develop and analyze novel
null models that take into account appropriate features of the system under
study. In this paper, we investigate the effects of using null models that take
incorporate spatial information, and we propose a novel null model based on the
radiation model of population spread. We also develop novel synthetic spatial
benchmark networks in which the connections between entities are based on
distance or flux between nodes, and we compare the performance of both static
and time-dependent radiation null models to the standard ("Newman-Girvan") null
model for modularity optimization and a recently-proposed gravity null model.
In our comparisons, we use both the above synthetic benchmarks and
time-dependent correlation networks that we construct using countrywide dengue
fever incidence data for Peru. We also evaluate a recently-proposed correlation
null model, which was developed specifically for correlation networks that are
constructed from time series, on the epidemic-correlation data.
|
1408.4712 | Wen-Ze Shao | Wen-Ze Shao, Hai-Bo Li, Michael Elad | Bi-l0-l2-Norm Regularization for Blind Motion Deblurring | 32 pages, 16 figures | null | null | null | cs.CV | http://creativecommons.org/licenses/by-nc-sa/3.0/ | In blind motion deblurring, leading methods today tend towards highly
non-convex approximations of the l0-norm, especially in the image
regularization term. In this paper, we propose a simple, effective and fast
approach for the estimation of the motion blur-kernel, through a bi-l0-l2-norm
regularization imposed on both the intermediate sharp image and the
blur-kernel. Compared with existing methods, the proposed regularization is
shown to be more effective and robust, leading to a more accurate motion
blur-kernel and a better final restored image. A fast numerical scheme is
deployed for alternatingly computing the sharp image and the blur-kernel, by
coupling the operator splitting and augmented Lagrangian methods. Experimental
results on both a benchmark image dataset and real-world motion blurred images
show that the proposed approach is highly competitive with state-of-the- art
methods in both deblurring effectiveness and computational efficiency.
| [
{
"version": "v1",
"created": "Wed, 20 Aug 2014 16:18:13 GMT"
},
{
"version": "v2",
"created": "Tue, 20 Jan 2015 08:06:47 GMT"
},
{
"version": "v3",
"created": "Thu, 22 Jan 2015 14:02:38 GMT"
}
] | 2015-01-23T00:00:00 | [
[
"Shao",
"Wen-Ze",
""
],
[
"Li",
"Hai-Bo",
""
],
[
"Elad",
"Michael",
""
]
] | TITLE: Bi-l0-l2-Norm Regularization for Blind Motion Deblurring
ABSTRACT: In blind motion deblurring, leading methods today tend towards highly
non-convex approximations of the l0-norm, especially in the image
regularization term. In this paper, we propose a simple, effective and fast
approach for the estimation of the motion blur-kernel, through a bi-l0-l2-norm
regularization imposed on both the intermediate sharp image and the
blur-kernel. Compared with existing methods, the proposed regularization is
shown to be more effective and robust, leading to a more accurate motion
blur-kernel and a better final restored image. A fast numerical scheme is
deployed for alternatingly computing the sharp image and the blur-kernel, by
coupling the operator splitting and augmented Lagrangian methods. Experimental
results on both a benchmark image dataset and real-world motion blurred images
show that the proposed approach is highly competitive with state-of-the- art
methods in both deblurring effectiveness and computational efficiency.
|
1501.05396 | Youssef Mroueh | Youssef Mroueh, Etienne Marcheret, Vaibhava Goel | Deep Multimodal Learning for Audio-Visual Speech Recognition | ICASSP 2015 | null | null | null | cs.CL cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we present methods in deep multimodal learning for fusing
speech and visual modalities for Audio-Visual Automatic Speech Recognition
(AV-ASR). First, we study an approach where uni-modal deep networks are trained
separately and their final hidden layers fused to obtain a joint feature space
in which another deep network is built. While the audio network alone achieves
a phone error rate (PER) of $41\%$ under clean condition on the IBM large
vocabulary audio-visual studio dataset, this fusion model achieves a PER of
$35.83\%$ demonstrating the tremendous value of the visual channel in phone
classification even in audio with high signal to noise ratio. Second, we
present a new deep network architecture that uses a bilinear softmax layer to
account for class specific correlations between modalities. We show that
combining the posteriors from the bilinear networks with those from the fused
model mentioned above results in a further significant phone error rate
reduction, yielding a final PER of $34.03\%$.
| [
{
"version": "v1",
"created": "Thu, 22 Jan 2015 05:25:33 GMT"
}
] | 2015-01-23T00:00:00 | [
[
"Mroueh",
"Youssef",
""
],
[
"Marcheret",
"Etienne",
""
],
[
"Goel",
"Vaibhava",
""
]
] | TITLE: Deep Multimodal Learning for Audio-Visual Speech Recognition
ABSTRACT: In this paper, we present methods in deep multimodal learning for fusing
speech and visual modalities for Audio-Visual Automatic Speech Recognition
(AV-ASR). First, we study an approach where uni-modal deep networks are trained
separately and their final hidden layers fused to obtain a joint feature space
in which another deep network is built. While the audio network alone achieves
a phone error rate (PER) of $41\%$ under clean condition on the IBM large
vocabulary audio-visual studio dataset, this fusion model achieves a PER of
$35.83\%$ demonstrating the tremendous value of the visual channel in phone
classification even in audio with high signal to noise ratio. Second, we
present a new deep network architecture that uses a bilinear softmax layer to
account for class specific correlations between modalities. We show that
combining the posteriors from the bilinear networks with those from the fused
model mentioned above results in a further significant phone error rate
reduction, yielding a final PER of $34.03\%$.
|
1501.05472 | Subhadip Basu | Ram Sarkar, Bibhash Sen, Nibaran Das, Subhadip Basu | Handwritten Devanagari Script Segmentation: A non-linear Fuzzy Approach | In Proceedings of IEEE Conference on AI Tools and Engineering
(ICAITE-08), March 6-8, 2008, Pune | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The paper concentrates on improvement of segmentation accuracy by addressing
some of the key challenges of handwritten Devanagari word image segmentation
technique. In the present work, we have developed a new feature based approach
for identification of Matra pixels from a word image, design of a non-linear
fuzzy membership functions for headline estimation and finally design of a
non-linear fuzzy functions for identifying segmentation points on the Matra.
The segmentation accuracy achieved by the current technique is 94.8%. This
shows an improvement of performance by 1.8% over the previous technique [1] on
a 300-word dataset, used for the current experiment.
| [
{
"version": "v1",
"created": "Thu, 22 Jan 2015 12:05:25 GMT"
}
] | 2015-01-23T00:00:00 | [
[
"Sarkar",
"Ram",
""
],
[
"Sen",
"Bibhash",
""
],
[
"Das",
"Nibaran",
""
],
[
"Basu",
"Subhadip",
""
]
] | TITLE: Handwritten Devanagari Script Segmentation: A non-linear Fuzzy Approach
ABSTRACT: The paper concentrates on improvement of segmentation accuracy by addressing
some of the key challenges of handwritten Devanagari word image segmentation
technique. In the present work, we have developed a new feature based approach
for identification of Matra pixels from a word image, design of a non-linear
fuzzy membership functions for headline estimation and finally design of a
non-linear fuzzy functions for identifying segmentation points on the Matra.
The segmentation accuracy achieved by the current technique is 94.8%. This
shows an improvement of performance by 1.8% over the previous technique [1] on
a 300-word dataset, used for the current experiment.
|
1501.05497 | Subhadip Basu | Nibaran Das, Subhadip Basu, Ram Sarkar, Mahantapas Kundu, Mita
Nasipuri, Dipak kumar Basu | An Improved Feature Descriptor for Recognition of Handwritten Bangla
Alphabet | In proceedings of ICSIP 2009, pp. 451 to 454, August 2009, Mysore,
India. arXiv admin note: substantial text overlap with arXiv:1203.0882,
arXiv:1002.4040, arXiv:1410.0478 | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Appropriate feature set for representation of pattern classes is one of the
most important aspects of handwritten character recognition. The effectiveness
of features depends on the discriminating power of the features chosen to
represent patterns of different classes. However, discriminatory features are
not easily measurable. Investigative experimentation is necessary for
identifying discriminatory features. In the present work we have identified a
new variation of feature set which significantly outperforms on handwritten
Bangla alphabet from the previously used feature set. 132 number of features in
all viz. modified shadow features, octant and centroid features, distance based
features, quad tree based longest run features are used here. Using this
feature set the recognition performance increases sharply from the 75.05%
observed in our previous work [7], to 85.40% on 50 character classes with MLP
based classifier on the same dataset.
| [
{
"version": "v1",
"created": "Thu, 22 Jan 2015 13:50:25 GMT"
}
] | 2015-01-23T00:00:00 | [
[
"Das",
"Nibaran",
""
],
[
"Basu",
"Subhadip",
""
],
[
"Sarkar",
"Ram",
""
],
[
"Kundu",
"Mahantapas",
""
],
[
"Nasipuri",
"Mita",
""
],
[
"Basu",
"Dipak kumar",
""
]
] | TITLE: An Improved Feature Descriptor for Recognition of Handwritten Bangla
Alphabet
ABSTRACT: Appropriate feature set for representation of pattern classes is one of the
most important aspects of handwritten character recognition. The effectiveness
of features depends on the discriminating power of the features chosen to
represent patterns of different classes. However, discriminatory features are
not easily measurable. Investigative experimentation is necessary for
identifying discriminatory features. In the present work we have identified a
new variation of feature set which significantly outperforms on handwritten
Bangla alphabet from the previously used feature set. 132 number of features in
all viz. modified shadow features, octant and centroid features, distance based
features, quad tree based longest run features are used here. Using this
feature set the recognition performance increases sharply from the 75.05%
observed in our previous work [7], to 85.40% on 50 character classes with MLP
based classifier on the same dataset.
|
1501.05546 | Ashley Conard | Ashley Mae Conard, Stephanie Dodson, Jeremy Kepner, Darrell Ricke | Using a Big Data Database to Identify Pathogens in Protein Data Space | 2 pages, 3 figures | null | null | null | cs.DB q-bio.QM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Current metagenomic analysis algorithms require significant computing
resources, can report excessive false positives (type I errors), may miss
organisms (type II errors / false negatives), or scale poorly on large
datasets. This paper explores using big data database technologies to
characterize very large metagenomic DNA sequences in protein space, with the
ultimate goal of rapid pathogen identification in patient samples. Our approach
uses the abilities of a big data databases to hold large sparse associative
array representations of genetic data to extract statistical patterns about the
data that can be used in a variety of ways to improve identification
algorithms.
| [
{
"version": "v1",
"created": "Thu, 22 Jan 2015 15:58:42 GMT"
}
] | 2015-01-23T00:00:00 | [
[
"Conard",
"Ashley Mae",
""
],
[
"Dodson",
"Stephanie",
""
],
[
"Kepner",
"Jeremy",
""
],
[
"Ricke",
"Darrell",
""
]
] | TITLE: Using a Big Data Database to Identify Pathogens in Protein Data Space
ABSTRACT: Current metagenomic analysis algorithms require significant computing
resources, can report excessive false positives (type I errors), may miss
organisms (type II errors / false negatives), or scale poorly on large
datasets. This paper explores using big data database technologies to
characterize very large metagenomic DNA sequences in protein space, with the
ultimate goal of rapid pathogen identification in patient samples. Our approach
uses the abilities of a big data databases to hold large sparse associative
array representations of genetic data to extract statistical patterns about the
data that can be used in a variety of ways to improve identification
algorithms.
|
1501.05581 | Daniele Riboni | Daniele Riboni, Claudio Bettini, Gabriele Civitarese, Zaffar Haider
Janjua, Rim Helaoui | Extended Report: Fine-grained Recognition of Abnormal Behaviors for
Early Detection of Mild Cognitive Impairment | null | null | null | null | cs.OH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | According to the World Health Organization, the rate of people aged 60 or
more is growing faster than any other age group in almost every country, and
this trend is not going to change in a near future. Since senior citizens are
at high risk of non communicable diseases requiring long-term care, this trend
will challenge the sustainability of the entire health system. Pervasive
computing can provide innovative methods and tools for early detecting the
onset of health issues. In this paper we propose a novel method to detect
abnormal behaviors of elderly people living at home. The method relies on
medical models, provided by cognitive neuroscience researchers, describing
abnormal activity routines that may indicate the onset of early symptoms of
mild cognitive impairment. A non-intrusive sensor-based infrastructure acquires
low-level data about the interaction of the individual with home appliances and
furniture, as well as data from environmental sensors. Based on those data, a
novel hybrid statistical-symbolical technique is used to detect the abnormal
behaviors of the patient, which are communicated to the medical center.
Differently from related works, our method can detect abnormal behaviors at a
fine-grained level, thus providing an important tool to support the medical
diagnosis. In order to evaluate our method we have developed a prototype of the
system and acquired a large dataset of abnormal behaviors carried out in an
instrumented smart home. Experimental results show that our technique is able
to detect most anomalies while generating a small number of false positives.
| [
{
"version": "v1",
"created": "Thu, 22 Jan 2015 17:34:16 GMT"
}
] | 2015-01-23T00:00:00 | [
[
"Riboni",
"Daniele",
""
],
[
"Bettini",
"Claudio",
""
],
[
"Civitarese",
"Gabriele",
""
],
[
"Janjua",
"Zaffar Haider",
""
],
[
"Helaoui",
"Rim",
""
]
] | TITLE: Extended Report: Fine-grained Recognition of Abnormal Behaviors for
Early Detection of Mild Cognitive Impairment
ABSTRACT: According to the World Health Organization, the rate of people aged 60 or
more is growing faster than any other age group in almost every country, and
this trend is not going to change in a near future. Since senior citizens are
at high risk of non communicable diseases requiring long-term care, this trend
will challenge the sustainability of the entire health system. Pervasive
computing can provide innovative methods and tools for early detecting the
onset of health issues. In this paper we propose a novel method to detect
abnormal behaviors of elderly people living at home. The method relies on
medical models, provided by cognitive neuroscience researchers, describing
abnormal activity routines that may indicate the onset of early symptoms of
mild cognitive impairment. A non-intrusive sensor-based infrastructure acquires
low-level data about the interaction of the individual with home appliances and
furniture, as well as data from environmental sensors. Based on those data, a
novel hybrid statistical-symbolical technique is used to detect the abnormal
behaviors of the patient, which are communicated to the medical center.
Differently from related works, our method can detect abnormal behaviors at a
fine-grained level, thus providing an important tool to support the medical
diagnosis. In order to evaluate our method we have developed a prototype of the
system and acquired a large dataset of abnormal behaviors carried out in an
instrumented smart home. Experimental results show that our technique is able
to detect most anomalies while generating a small number of false positives.
|
1501.05624 | John Paisley | San Gultekin and John Paisley | A Collaborative Kalman Filter for Time-Evolving Dyadic Processes | Appeared at 2014 IEEE International Conference on Data Mining (ICDM) | null | null | null | stat.ML cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present the collaborative Kalman filter (CKF), a dynamic model for
collaborative filtering and related factorization models. Using the matrix
factorization approach to collaborative filtering, the CKF accounts for time
evolution by modeling each low-dimensional latent embedding as a
multidimensional Brownian motion. Each observation is a random variable whose
distribution is parameterized by the dot product of the relevant Brownian
motions at that moment in time. This is naturally interpreted as a Kalman
filter with multiple interacting state space vectors. We also present a method
for learning a dynamically evolving drift parameter for each location by
modeling it as a geometric Brownian motion. We handle posterior intractability
via a mean-field variational approximation, which also preserves tractability
for downstream calculations in a manner similar to the Kalman filter. We
evaluate the model on several large datasets, providing quantitative evaluation
on the 10 million Movielens and 100 million Netflix datasets and qualitative
evaluation on a set of 39 million stock returns divided across roughly 6,500
companies from the years 1962-2014.
| [
{
"version": "v1",
"created": "Thu, 22 Jan 2015 20:24:32 GMT"
}
] | 2015-01-23T00:00:00 | [
[
"Gultekin",
"San",
""
],
[
"Paisley",
"John",
""
]
] | TITLE: A Collaborative Kalman Filter for Time-Evolving Dyadic Processes
ABSTRACT: We present the collaborative Kalman filter (CKF), a dynamic model for
collaborative filtering and related factorization models. Using the matrix
factorization approach to collaborative filtering, the CKF accounts for time
evolution by modeling each low-dimensional latent embedding as a
multidimensional Brownian motion. Each observation is a random variable whose
distribution is parameterized by the dot product of the relevant Brownian
motions at that moment in time. This is naturally interpreted as a Kalman
filter with multiple interacting state space vectors. We also present a method
for learning a dynamically evolving drift parameter for each location by
modeling it as a geometric Brownian motion. We handle posterior intractability
via a mean-field variational approximation, which also preserves tractability
for downstream calculations in a manner similar to the Kalman filter. We
evaluate the model on several large datasets, providing quantitative evaluation
on the 10 million Movielens and 100 million Netflix datasets and qualitative
evaluation on a set of 39 million stock returns divided across roughly 6,500
companies from the years 1962-2014.
|
1501.04981 | Manuel Moussallam | Manuel Moussallam and Antoine Liutkus and Laurent Daudet | Listening to features | Technical Report | null | null | null | cs.SD | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This work explores nonparametric methods which aim at synthesizing audio from
low-dimensionnal acoustic features typically used in MIR frameworks. Several
issues prevent this task to be straightforwardly achieved. Such features are
designed for analysis and not for synthesis, thus favoring high-level
description over easily inverted acoustic representation. Whereas some previous
studies already considered the problem of synthesizing audio from features such
as Mel-Frequency Cepstral Coefficients, they mainly relied on the explicit
formula used to compute those features in order to inverse them. Here, we
instead adopt a simple blind approach, where arbitrary sets of features can be
used during synthesis and where reconstruction is exemplar-based. After testing
the approach on a speech synthesis from well known features problem, we apply
it to the more complex task of inverting songs from the Million Song Dataset.
What makes this task harder is twofold. First, that features are irregularly
spaced in the temporal domain according to an onset-based segmentation. Second
the exact method used to compute these features is unknown, although the
features for new audio can be computed using their API as a black-box. In this
paper, we detail these difficulties and present a framework to nonetheless
attempting such synthesis by concatenating audio samples from a training
dataset, whose features have been computed beforehand. Samples are selected at
the segment level, in the feature space with a simple nearest neighbor search.
Additionnal constraints can then be defined to enhance the synthesis
pertinence. Preliminary experiments are presented using RWC and GTZAN audio
datasets to synthesize tracks from the Million Song Dataset.
| [
{
"version": "v1",
"created": "Mon, 19 Jan 2015 19:41:35 GMT"
}
] | 2015-01-22T00:00:00 | [
[
"Moussallam",
"Manuel",
""
],
[
"Liutkus",
"Antoine",
""
],
[
"Daudet",
"Laurent",
""
]
] | TITLE: Listening to features
ABSTRACT: This work explores nonparametric methods which aim at synthesizing audio from
low-dimensionnal acoustic features typically used in MIR frameworks. Several
issues prevent this task to be straightforwardly achieved. Such features are
designed for analysis and not for synthesis, thus favoring high-level
description over easily inverted acoustic representation. Whereas some previous
studies already considered the problem of synthesizing audio from features such
as Mel-Frequency Cepstral Coefficients, they mainly relied on the explicit
formula used to compute those features in order to inverse them. Here, we
instead adopt a simple blind approach, where arbitrary sets of features can be
used during synthesis and where reconstruction is exemplar-based. After testing
the approach on a speech synthesis from well known features problem, we apply
it to the more complex task of inverting songs from the Million Song Dataset.
What makes this task harder is twofold. First, that features are irregularly
spaced in the temporal domain according to an onset-based segmentation. Second
the exact method used to compute these features is unknown, although the
features for new audio can be computed using their API as a black-box. In this
paper, we detail these difficulties and present a framework to nonetheless
attempting such synthesis by concatenating audio samples from a training
dataset, whose features have been computed beforehand. Samples are selected at
the segment level, in the feature space with a simple nearest neighbor search.
Additionnal constraints can then be defined to enhance the synthesis
pertinence. Preliminary experiments are presented using RWC and GTZAN audio
datasets to synthesize tracks from the Million Song Dataset.
|
1501.05132 | Catarina Moreira | Catarina Moreira and Bruno Martins and P\'avel Calado | Learning to Rank Academic Experts in the DBLP Dataset | Expert Systems, 2013. arXiv admin note: text overlap with
arXiv:1302.0413 | null | 10.1111/exsy.12062 | null | cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Expert finding is an information retrieval task that is concerned with the
search for the most knowledgeable people with respect to a specific topic, and
the search is based on documents that describe people's activities. The task
involves taking a user query as input and returning a list of people who are
sorted by their level of expertise with respect to the user query. Despite
recent interest in the area, the current state-of-the-art techniques lack in
principled approaches for optimally combining different sources of evidence.
This article proposes two frameworks for combining multiple estimators of
expertise. These estimators are derived from textual contents, from
graph-structure of the citation patterns for the community of experts, and from
profile information about the experts. More specifically, this article explores
the use of supervised learning to rank methods, as well as rank aggregation
approaches, for combing all of the estimators of expertise. Several supervised
learning algorithms, which are representative of the pointwise, pairwise and
listwise approaches, were tested, and various state-of-the-art data fusion
techniques were also explored for the rank aggregation framework. Experiments
that were performed on a dataset of academic publications from the Computer
Science domain attest the adequacy of the proposed approaches.
| [
{
"version": "v1",
"created": "Wed, 21 Jan 2015 11:25:33 GMT"
}
] | 2015-01-22T00:00:00 | [
[
"Moreira",
"Catarina",
""
],
[
"Martins",
"Bruno",
""
],
[
"Calado",
"Pável",
""
]
] | TITLE: Learning to Rank Academic Experts in the DBLP Dataset
ABSTRACT: Expert finding is an information retrieval task that is concerned with the
search for the most knowledgeable people with respect to a specific topic, and
the search is based on documents that describe people's activities. The task
involves taking a user query as input and returning a list of people who are
sorted by their level of expertise with respect to the user query. Despite
recent interest in the area, the current state-of-the-art techniques lack in
principled approaches for optimally combining different sources of evidence.
This article proposes two frameworks for combining multiple estimators of
expertise. These estimators are derived from textual contents, from
graph-structure of the citation patterns for the community of experts, and from
profile information about the experts. More specifically, this article explores
the use of supervised learning to rank methods, as well as rank aggregation
approaches, for combing all of the estimators of expertise. Several supervised
learning algorithms, which are representative of the pointwise, pairwise and
listwise approaches, were tested, and various state-of-the-art data fusion
techniques were also explored for the rank aggregation framework. Experiments
that were performed on a dataset of academic publications from the Computer
Science domain attest the adequacy of the proposed approaches.
|
1501.05279 | Wojciech Czarnecki | Wojciech Marian Czarnecki, Jacek Tabor | Extreme Entropy Machines: Robust information theoretic classification | null | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Most of the existing classification methods are aimed at minimization of
empirical risk (through some simple point-based error measured with loss
function) with added regularization. We propose to approach this problem in a
more information theoretic way by investigating applicability of entropy
measures as a classification model objective function. We focus on quadratic
Renyi's entropy and connected Cauchy-Schwarz Divergence which leads to the
construction of Extreme Entropy Machines (EEM).
The main contribution of this paper is proposing a model based on the
information theoretic concepts which on the one hand shows new, entropic
perspective on known linear classifiers and on the other leads to a
construction of very robust method competetitive with the state of the art
non-information theoretic ones (including Support Vector Machines and Extreme
Learning Machines).
Evaluation on numerous problems spanning from small, simple ones from UCI
repository to the large (hundreads of thousands of samples) extremely
unbalanced (up to 100:1 classes' ratios) datasets shows wide applicability of
the EEM in real life problems and that it scales well.
| [
{
"version": "v1",
"created": "Wed, 21 Jan 2015 19:54:26 GMT"
}
] | 2015-01-22T00:00:00 | [
[
"Czarnecki",
"Wojciech Marian",
""
],
[
"Tabor",
"Jacek",
""
]
] | TITLE: Extreme Entropy Machines: Robust information theoretic classification
ABSTRACT: Most of the existing classification methods are aimed at minimization of
empirical risk (through some simple point-based error measured with loss
function) with added regularization. We propose to approach this problem in a
more information theoretic way by investigating applicability of entropy
measures as a classification model objective function. We focus on quadratic
Renyi's entropy and connected Cauchy-Schwarz Divergence which leads to the
construction of Extreme Entropy Machines (EEM).
The main contribution of this paper is proposing a model based on the
information theoretic concepts which on the one hand shows new, entropic
perspective on known linear classifiers and on the other leads to a
construction of very robust method competetitive with the state of the art
non-information theoretic ones (including Support Vector Machines and Extreme
Learning Machines).
Evaluation on numerous problems spanning from small, simple ones from UCI
repository to the large (hundreads of thousands of samples) extremely
unbalanced (up to 100:1 classes' ratios) datasets shows wide applicability of
the EEM in real life problems and that it scales well.
|
1403.2307 | Sudip Roy Sudip Roy | Sudip Roy, Lucja Kot, Gabriel Bender, Bailu Ding, Hossein Hojjat,
Christoph Koch, Nate Foster, Johannes Gehrke | The Homeostasis Protocol: Avoiding Transaction Coordination Through
Program Analysis | null | null | null | null | cs.DB | http://creativecommons.org/licenses/by-nc-sa/3.0/ | Datastores today rely on distribution and replication to achieve improved
performance and fault-tolerance. But correctness of many applications depends
on strong consistency properties - something that can impose substantial
overheads, since it requires coordinating the behavior of multiple nodes. This
paper describes a new approach to achieving strong consistency in distributed
systems while minimizing communication between nodes. The key insight is to
allow the state of the system to be inconsistent during execution, as long as
this inconsistency is bounded and does not affect transaction correctness. In
contrast to previous work, our approach uses program analysis to extract
semantic information about permissible levels of inconsistency and is fully
automated. We then employ a novel homeostasis protocol to allow sites to
operate independently, without communicating, as long as any inconsistency is
governed by appropriate treaties between the nodes. We discuss mechanisms for
optimizing treaties based on workload characteristics to minimize
communication, as well as a prototype implementation and experiments that
demonstrate the benefits of our approach on common transactional benchmarks.
| [
{
"version": "v1",
"created": "Mon, 10 Mar 2014 17:12:09 GMT"
},
{
"version": "v2",
"created": "Tue, 20 Jan 2015 02:54:07 GMT"
}
] | 2015-01-21T00:00:00 | [
[
"Roy",
"Sudip",
""
],
[
"Kot",
"Lucja",
""
],
[
"Bender",
"Gabriel",
""
],
[
"Ding",
"Bailu",
""
],
[
"Hojjat",
"Hossein",
""
],
[
"Koch",
"Christoph",
""
],
[
"Foster",
"Nate",
""
],
[
"Gehrke",
"Johannes",
""
]
] | TITLE: The Homeostasis Protocol: Avoiding Transaction Coordination Through
Program Analysis
ABSTRACT: Datastores today rely on distribution and replication to achieve improved
performance and fault-tolerance. But correctness of many applications depends
on strong consistency properties - something that can impose substantial
overheads, since it requires coordinating the behavior of multiple nodes. This
paper describes a new approach to achieving strong consistency in distributed
systems while minimizing communication between nodes. The key insight is to
allow the state of the system to be inconsistent during execution, as long as
this inconsistency is bounded and does not affect transaction correctness. In
contrast to previous work, our approach uses program analysis to extract
semantic information about permissible levels of inconsistency and is fully
automated. We then employ a novel homeostasis protocol to allow sites to
operate independently, without communicating, as long as any inconsistency is
governed by appropriate treaties between the nodes. We discuss mechanisms for
optimizing treaties based on workload characteristics to minimize
communication, as well as a prototype implementation and experiments that
demonstrate the benefits of our approach on common transactional benchmarks.
|
1403.6888 | Nenad Marku\v{s} | Nenad Marku\v{s} and Miroslav Frljak and Igor S. Pand\v{z}i\'c and
J\"orgen Ahlberg and Robert Forchheimer | Fast Localization of Facial Landmark Points | null | Proceedings of the Croatian Compter Vision Workshop, 2014 | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Localization of salient facial landmark points, such as eye corners or the
tip of the nose, is still considered a challenging computer vision problem
despite recent efforts. This is especially evident in unconstrained
environments, i.e., in the presence of background clutter and large head pose
variations. Most methods that achieve state-of-the-art accuracy are slow, and,
thus, have limited applications. We describe a method that can accurately
estimate the positions of relevant facial landmarks in real-time even on
hardware with limited processing power, such as mobile devices. This is
achieved with a sequence of estimators based on ensembles of regression trees.
The trees use simple pixel intensity comparisons in their internal nodes and
this makes them able to process image regions very fast. We test the developed
system on several publicly available datasets and analyse its processing speed
on various devices. Experimental results show that our method has practical
value.
| [
{
"version": "v1",
"created": "Wed, 26 Mar 2014 23:12:08 GMT"
},
{
"version": "v2",
"created": "Tue, 20 Jan 2015 12:19:05 GMT"
}
] | 2015-01-21T00:00:00 | [
[
"Markuš",
"Nenad",
""
],
[
"Frljak",
"Miroslav",
""
],
[
"Pandžić",
"Igor S.",
""
],
[
"Ahlberg",
"Jörgen",
""
],
[
"Forchheimer",
"Robert",
""
]
] | TITLE: Fast Localization of Facial Landmark Points
ABSTRACT: Localization of salient facial landmark points, such as eye corners or the
tip of the nose, is still considered a challenging computer vision problem
despite recent efforts. This is especially evident in unconstrained
environments, i.e., in the presence of background clutter and large head pose
variations. Most methods that achieve state-of-the-art accuracy are slow, and,
thus, have limited applications. We describe a method that can accurately
estimate the positions of relevant facial landmarks in real-time even on
hardware with limited processing power, such as mobile devices. This is
achieved with a sequence of estimators based on ensembles of regression trees.
The trees use simple pixel intensity comparisons in their internal nodes and
this makes them able to process image regions very fast. We test the developed
system on several publicly available datasets and analyse its processing speed
on various devices. Experimental results show that our method has practical
value.
|
1406.7806 | Andrew Maas | Andrew L. Maas, Peng Qi, Ziang Xie, Awni Y. Hannun, Christopher T.
Lengerich, Daniel Jurafsky and Andrew Y. Ng | Building DNN Acoustic Models for Large Vocabulary Speech Recognition | null | null | null | null | cs.CL cs.LG cs.NE stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Deep neural networks (DNNs) are now a central component of nearly all
state-of-the-art speech recognition systems. Building neural network acoustic
models requires several design decisions including network architecture, size,
and training loss function. This paper offers an empirical investigation on
which aspects of DNN acoustic model design are most important for speech
recognition system performance. We report DNN classifier performance and final
speech recognizer word error rates, and compare DNNs using several metrics to
quantify factors influencing differences in task performance. Our first set of
experiments use the standard Switchboard benchmark corpus, which contains
approximately 300 hours of conversational telephone speech. We compare standard
DNNs to convolutional networks, and present the first experiments using
locally-connected, untied neural networks for acoustic modeling. We
additionally build systems on a corpus of 2,100 hours of training data by
combining the Switchboard and Fisher corpora. This larger corpus allows us to
more thoroughly examine performance of large DNN models -- with up to ten times
more parameters than those typically used in speech recognition systems. Our
results suggest that a relatively simple DNN architecture and optimization
technique produces strong results. These findings, along with previous work,
help establish a set of best practices for building DNN hybrid speech
recognition systems with maximum likelihood training. Our experiments in DNN
optimization additionally serve as a case study for training DNNs with
discriminative loss functions for speech tasks, as well as DNN classifiers more
generally.
| [
{
"version": "v1",
"created": "Mon, 30 Jun 2014 16:42:25 GMT"
},
{
"version": "v2",
"created": "Tue, 20 Jan 2015 07:44:15 GMT"
}
] | 2015-01-21T00:00:00 | [
[
"Maas",
"Andrew L.",
""
],
[
"Qi",
"Peng",
""
],
[
"Xie",
"Ziang",
""
],
[
"Hannun",
"Awni Y.",
""
],
[
"Lengerich",
"Christopher T.",
""
],
[
"Jurafsky",
"Daniel",
""
],
[
"Ng",
"Andrew Y.",
""
]
] | TITLE: Building DNN Acoustic Models for Large Vocabulary Speech Recognition
ABSTRACT: Deep neural networks (DNNs) are now a central component of nearly all
state-of-the-art speech recognition systems. Building neural network acoustic
models requires several design decisions including network architecture, size,
and training loss function. This paper offers an empirical investigation on
which aspects of DNN acoustic model design are most important for speech
recognition system performance. We report DNN classifier performance and final
speech recognizer word error rates, and compare DNNs using several metrics to
quantify factors influencing differences in task performance. Our first set of
experiments use the standard Switchboard benchmark corpus, which contains
approximately 300 hours of conversational telephone speech. We compare standard
DNNs to convolutional networks, and present the first experiments using
locally-connected, untied neural networks for acoustic modeling. We
additionally build systems on a corpus of 2,100 hours of training data by
combining the Switchboard and Fisher corpora. This larger corpus allows us to
more thoroughly examine performance of large DNN models -- with up to ten times
more parameters than those typically used in speech recognition systems. Our
results suggest that a relatively simple DNN architecture and optimization
technique produces strong results. These findings, along with previous work,
help establish a set of best practices for building DNN hybrid speech
recognition systems with maximum likelihood training. Our experiments in DNN
optimization additionally serve as a case study for training DNNs with
discriminative loss functions for speech tasks, as well as DNN classifiers more
generally.
|
1501.04675 | Zhi Liu | Zhi Liu, Yan Huang | Community Detection from Location-Tagged Networks | null | null | null | null | cs.SI physics.soc-ph | http://creativecommons.org/licenses/publicdomain/ | Many real world systems or web services can be represented as a network such
as social networks and transportation networks. In the past decade, many
algorithms have been developed to detect the communities in a network using
connections between nodes. However in many real world networks, the locations
of nodes have great influence on the community structure. For example, in a
social network, more connections are established between geographically
proximate users. The impact of locations on community has not been fully
investigated by the research literature. In this paper, we propose a community
detection method which takes locations of nodes into consideration. The goal is
to detect communities with both geographic proximity and network closeness. We
analyze the distribution of the distances between connected and unconnected
nodes to measure the influence of location on the network structure on two real
location-tagged social networks. We propose a method to determine if a
location-based community detection method is suitable for a given network. We
propose a new community detection algorithm that pushes the location
information into the community detection. We test our proposed method on both
synthetic data and real world network datasets. The results show that the
communities detected by our method distribute in a smaller area compared with
the traditional methods and have the similar or higher tightness on network
connections.
| [
{
"version": "v1",
"created": "Mon, 19 Jan 2015 23:37:40 GMT"
}
] | 2015-01-21T00:00:00 | [
[
"Liu",
"Zhi",
""
],
[
"Huang",
"Yan",
""
]
] | TITLE: Community Detection from Location-Tagged Networks
ABSTRACT: Many real world systems or web services can be represented as a network such
as social networks and transportation networks. In the past decade, many
algorithms have been developed to detect the communities in a network using
connections between nodes. However in many real world networks, the locations
of nodes have great influence on the community structure. For example, in a
social network, more connections are established between geographically
proximate users. The impact of locations on community has not been fully
investigated by the research literature. In this paper, we propose a community
detection method which takes locations of nodes into consideration. The goal is
to detect communities with both geographic proximity and network closeness. We
analyze the distribution of the distances between connected and unconnected
nodes to measure the influence of location on the network structure on two real
location-tagged social networks. We propose a method to determine if a
location-based community detection method is suitable for a given network. We
propose a new community detection algorithm that pushes the location
information into the community detection. We test our proposed method on both
synthetic data and real world network datasets. The results show that the
communities detected by our method distribute in a smaller area compared with
the traditional methods and have the similar or higher tightness on network
connections.
|
1501.04686 | Pichao Wang | Pichao Wang, Wanqing Li, Zhimin Gao, Jing Zhang, Chang Tang and Philip
Ogunbona | Deep Convolutional Neural Networks for Action Recognition Using Depth
Map Sequences | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Recently, deep learning approach has achieved promising results in various
fields of computer vision. In this paper, a new framework called Hierarchical
Depth Motion Maps (HDMM) + 3 Channel Deep Convolutional Neural Networks
(3ConvNets) is proposed for human action recognition using depth map sequences.
Firstly, we rotate the original depth data in 3D pointclouds to mimic the
rotation of cameras, so that our algorithms can handle view variant cases.
Secondly, in order to effectively extract the body shape and motion
information, we generate weighted depth motion maps (DMM) at several temporal
scales, referred to as Hierarchical Depth Motion Maps (HDMM). Then, three
channels of ConvNets are trained on the HDMMs from three projected orthogonal
planes separately. The proposed algorithms are evaluated on MSRAction3D,
MSRAction3DExt, UTKinect-Action and MSRDailyActivity3D datasets respectively.
We also combine the last three datasets into a larger one (called Combined
Dataset) and test the proposed method on it. The results show that our approach
can achieve state-of-the-art results on the individual datasets and without
dramatical performance degradation on the Combined Dataset.
| [
{
"version": "v1",
"created": "Tue, 20 Jan 2015 00:46:10 GMT"
}
] | 2015-01-21T00:00:00 | [
[
"Wang",
"Pichao",
""
],
[
"Li",
"Wanqing",
""
],
[
"Gao",
"Zhimin",
""
],
[
"Zhang",
"Jing",
""
],
[
"Tang",
"Chang",
""
],
[
"Ogunbona",
"Philip",
""
]
] | TITLE: Deep Convolutional Neural Networks for Action Recognition Using Depth
Map Sequences
ABSTRACT: Recently, deep learning approach has achieved promising results in various
fields of computer vision. In this paper, a new framework called Hierarchical
Depth Motion Maps (HDMM) + 3 Channel Deep Convolutional Neural Networks
(3ConvNets) is proposed for human action recognition using depth map sequences.
Firstly, we rotate the original depth data in 3D pointclouds to mimic the
rotation of cameras, so that our algorithms can handle view variant cases.
Secondly, in order to effectively extract the body shape and motion
information, we generate weighted depth motion maps (DMM) at several temporal
scales, referred to as Hierarchical Depth Motion Maps (HDMM). Then, three
channels of ConvNets are trained on the HDMMs from three projected orthogonal
planes separately. The proposed algorithms are evaluated on MSRAction3D,
MSRAction3DExt, UTKinect-Action and MSRDailyActivity3D datasets respectively.
We also combine the last three datasets into a larger one (called Combined
Dataset) and test the proposed method on it. The results show that our approach
can achieve state-of-the-art results on the individual datasets and without
dramatical performance degradation on the Combined Dataset.
|
1501.04690 | Erjin Zhou | Erjin Zhou, Zhimin Cao, Qi Yin | Naive-Deep Face Recognition: Touching the Limit of LFW Benchmark or Not? | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Face recognition performance improves rapidly with the recent deep learning
technique developing and underlying large training dataset accumulating. In
this paper, we report our observations on how big data impacts the recognition
performance. According to these observations, we build our Megvii Face
Recognition System, which achieves 99.50% accuracy on the LFW benchmark,
outperforming the previous state-of-the-art. Furthermore, we report the
performance in a real-world security certification scenario. There still exists
a clear gap between machine recognition and human performance. We summarize our
experiments and present three challenges lying ahead in recent face
recognition. And we indicate several possible solutions towards these
challenges. We hope our work will stimulate the community's discussion of the
difference between research benchmark and real-world applications.
| [
{
"version": "v1",
"created": "Tue, 20 Jan 2015 01:15:02 GMT"
}
] | 2015-01-21T00:00:00 | [
[
"Zhou",
"Erjin",
""
],
[
"Cao",
"Zhimin",
""
],
[
"Yin",
"Qi",
""
]
] | TITLE: Naive-Deep Face Recognition: Touching the Limit of LFW Benchmark or Not?
ABSTRACT: Face recognition performance improves rapidly with the recent deep learning
technique developing and underlying large training dataset accumulating. In
this paper, we report our observations on how big data impacts the recognition
performance. According to these observations, we build our Megvii Face
Recognition System, which achieves 99.50% accuracy on the LFW benchmark,
outperforming the previous state-of-the-art. Furthermore, we report the
performance in a real-world security certification scenario. There still exists
a clear gap between machine recognition and human performance. We summarize our
experiments and present three challenges lying ahead in recent face
recognition. And we indicate several possible solutions towards these
challenges. We hope our work will stimulate the community's discussion of the
difference between research benchmark and real-world applications.
|
1501.04717 | Yuting Zhang | Yuting Zhang, Kui Jia, Yueming Wang, Gang Pan, Tsung-Han Chan, Yi Ma | Robust Face Recognition by Constrained Part-based Alignment | null | null | null | null | cs.CV cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Developing a reliable and practical face recognition system is a
long-standing goal in computer vision research. Existing literature suggests
that pixel-wise face alignment is the key to achieve high-accuracy face
recognition. By assuming a human face as piece-wise planar surfaces, where each
surface corresponds to a facial part, we develop in this paper a Constrained
Part-based Alignment (CPA) algorithm for face recognition across pose and/or
expression. Our proposed algorithm is based on a trainable CPA model, which
learns appearance evidence of individual parts and a tree-structured shape
configuration among different parts. Given a probe face, CPA simultaneously
aligns all its parts by fitting them to the appearance evidence with
consideration of the constraint from the tree-structured shape configuration.
This objective is formulated as a norm minimization problem regularized by
graph likelihoods. CPA can be easily integrated with many existing classifiers
to perform part-based face recognition. Extensive experiments on benchmark face
datasets show that CPA outperforms or is on par with existing methods for
robust face recognition across pose, expression, and/or illumination changes.
| [
{
"version": "v1",
"created": "Tue, 20 Jan 2015 06:05:01 GMT"
}
] | 2015-01-21T00:00:00 | [
[
"Zhang",
"Yuting",
""
],
[
"Jia",
"Kui",
""
],
[
"Wang",
"Yueming",
""
],
[
"Pan",
"Gang",
""
],
[
"Chan",
"Tsung-Han",
""
],
[
"Ma",
"Yi",
""
]
] | TITLE: Robust Face Recognition by Constrained Part-based Alignment
ABSTRACT: Developing a reliable and practical face recognition system is a
long-standing goal in computer vision research. Existing literature suggests
that pixel-wise face alignment is the key to achieve high-accuracy face
recognition. By assuming a human face as piece-wise planar surfaces, where each
surface corresponds to a facial part, we develop in this paper a Constrained
Part-based Alignment (CPA) algorithm for face recognition across pose and/or
expression. Our proposed algorithm is based on a trainable CPA model, which
learns appearance evidence of individual parts and a tree-structured shape
configuration among different parts. Given a probe face, CPA simultaneously
aligns all its parts by fitting them to the appearance evidence with
consideration of the constraint from the tree-structured shape configuration.
This objective is formulated as a norm minimization problem regularized by
graph likelihoods. CPA can be easily integrated with many existing classifiers
to perform part-based face recognition. Extensive experiments on benchmark face
datasets show that CPA outperforms or is on par with existing methods for
robust face recognition across pose, expression, and/or illumination changes.
|
1501.04725 | Siddharth Krishna | Siddharth Krishna, Christian Puhrsch, Thomas Wies | Learning Invariants using Decision Trees | 15 pages, 2 figures | null | null | null | cs.PL cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The problem of inferring an inductive invariant for verifying program safety
can be formulated in terms of binary classification. This is a standard problem
in machine learning: given a sample of good and bad points, one is asked to
find a classifier that generalizes from the sample and separates the two sets.
Here, the good points are the reachable states of the program, and the bad
points are those that reach a safety property violation. Thus, a learned
classifier is a candidate invariant. In this paper, we propose a new algorithm
that uses decision trees to learn candidate invariants in the form of arbitrary
Boolean combinations of numerical inequalities. We have used our algorithm to
verify C programs taken from the literature. The algorithm is able to infer
safe invariants for a range of challenging benchmarks and compares favorably to
other ML-based invariant inference techniques. In particular, it scales well to
large sample sets.
| [
{
"version": "v1",
"created": "Tue, 20 Jan 2015 07:20:30 GMT"
}
] | 2015-01-21T00:00:00 | [
[
"Krishna",
"Siddharth",
""
],
[
"Puhrsch",
"Christian",
""
],
[
"Wies",
"Thomas",
""
]
] | TITLE: Learning Invariants using Decision Trees
ABSTRACT: The problem of inferring an inductive invariant for verifying program safety
can be formulated in terms of binary classification. This is a standard problem
in machine learning: given a sample of good and bad points, one is asked to
find a classifier that generalizes from the sample and separates the two sets.
Here, the good points are the reachable states of the program, and the bad
points are those that reach a safety property violation. Thus, a learned
classifier is a candidate invariant. In this paper, we propose a new algorithm
that uses decision trees to learn candidate invariants in the form of arbitrary
Boolean combinations of numerical inequalities. We have used our algorithm to
verify C programs taken from the literature. The algorithm is able to infer
safe invariants for a range of challenging benchmarks and compares favorably to
other ML-based invariant inference techniques. In particular, it scales well to
large sample sets.
|
1306.3284 | Edith Cohen | Edith Cohen | All-Distances Sketches, Revisited: HIP Estimators for Massive Graphs
Analysis | 16 pages, 3 figures, extended version of a PODS 2014 paper | null | null | null | cs.DS cs.SI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Graph datasets with billions of edges, such as social and Web graphs, are
prevalent, and scalable computation is critical. All-distances sketches (ADS)
[Cohen 1997], are a powerful tool for scalable approximation of statistics.
The sketch is a small size sample of the distance relation of a node which
emphasizes closer nodes. Sketches for all nodes are computed using a nearly
linear computation and estimators are applied to sketches of nodes to estimate
their properties.
We provide, for the first time, a unified exposition of ADS algorithms and
applications. We present the Historic Inverse Probability (HIP) estimators
which are applied to the ADS of a node to estimate a large natural class of
statistics. For the important special cases of neighborhood cardinalities (the
number of nodes within some query distance) and closeness centralities, HIP
estimators have at most half the variance of previous estimators and we show
that this is essentially optimal. Moreover, HIP obtains a polynomial
improvement for more general statistics and the estimators are simple,
flexible, unbiased, and elegant.
For approximate distinct counting on data streams, HIP outperforms the
original estimators for the HyperLogLog MinHash sketches (Flajolet et al.
2007), obtaining significantly improved estimation quality for this
state-of-the-art practical algorithm.
| [
{
"version": "v1",
"created": "Fri, 14 Jun 2013 03:33:05 GMT"
},
{
"version": "v2",
"created": "Fri, 19 Jul 2013 12:01:34 GMT"
},
{
"version": "v3",
"created": "Wed, 4 Dec 2013 00:54:09 GMT"
},
{
"version": "v4",
"created": "Wed, 11 Dec 2013 05:36:59 GMT"
},
{
"version": "v5",
"created": "Wed, 23 Apr 2014 23:09:46 GMT"
},
{
"version": "v6",
"created": "Wed, 5 Nov 2014 06:11:04 GMT"
},
{
"version": "v7",
"created": "Sat, 17 Jan 2015 07:55:41 GMT"
}
] | 2015-01-20T00:00:00 | [
[
"Cohen",
"Edith",
""
]
] | TITLE: All-Distances Sketches, Revisited: HIP Estimators for Massive Graphs
Analysis
ABSTRACT: Graph datasets with billions of edges, such as social and Web graphs, are
prevalent, and scalable computation is critical. All-distances sketches (ADS)
[Cohen 1997], are a powerful tool for scalable approximation of statistics.
The sketch is a small size sample of the distance relation of a node which
emphasizes closer nodes. Sketches for all nodes are computed using a nearly
linear computation and estimators are applied to sketches of nodes to estimate
their properties.
We provide, for the first time, a unified exposition of ADS algorithms and
applications. We present the Historic Inverse Probability (HIP) estimators
which are applied to the ADS of a node to estimate a large natural class of
statistics. For the important special cases of neighborhood cardinalities (the
number of nodes within some query distance) and closeness centralities, HIP
estimators have at most half the variance of previous estimators and we show
that this is essentially optimal. Moreover, HIP obtains a polynomial
improvement for more general statistics and the estimators are simple,
flexible, unbiased, and elegant.
For approximate distinct counting on data streams, HIP outperforms the
original estimators for the HyperLogLog MinHash sketches (Flajolet et al.
2007), obtaining significantly improved estimation quality for this
state-of-the-art practical algorithm.
|
1501.04277 | Canyi Lu | Canyi Lu, Jinhui Tang, Min Lin, Liang Lin, Shuicheng Yan, and Zhouchen
Lin | Correntropy Induced L2 Graph for Robust Subspace Clustering | International Conference on Computer Vision (ICCV), 2013 | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we study the robust subspace clustering problem, which aims to
cluster the given possibly noisy data points into their underlying subspaces. A
large pool of previous subspace clustering methods focus on the graph
construction by different regularization of the representation coefficient. We
instead focus on the robustness of the model to non-Gaussian noises. We propose
a new robust clustering method by using the correntropy induced metric, which
is robust for handling the non-Gaussian and impulsive noises. Also we further
extend the method for handling the data with outlier rows/features. The
multiplicative form of half-quadratic optimization is used to optimize the
non-convex correntropy objective function of the proposed models. Extensive
experiments on face datasets well demonstrate that the proposed methods are
more robust to corruptions and occlusions.
| [
{
"version": "v1",
"created": "Sun, 18 Jan 2015 10:06:55 GMT"
}
] | 2015-01-20T00:00:00 | [
[
"Lu",
"Canyi",
""
],
[
"Tang",
"Jinhui",
""
],
[
"Lin",
"Min",
""
],
[
"Lin",
"Liang",
""
],
[
"Yan",
"Shuicheng",
""
],
[
"Lin",
"Zhouchen",
""
]
] | TITLE: Correntropy Induced L2 Graph for Robust Subspace Clustering
ABSTRACT: In this paper, we study the robust subspace clustering problem, which aims to
cluster the given possibly noisy data points into their underlying subspaces. A
large pool of previous subspace clustering methods focus on the graph
construction by different regularization of the representation coefficient. We
instead focus on the robustness of the model to non-Gaussian noises. We propose
a new robust clustering method by using the correntropy induced metric, which
is robust for handling the non-Gaussian and impulsive noises. Also we further
extend the method for handling the data with outlier rows/features. The
multiplicative form of half-quadratic optimization is used to optimize the
non-convex correntropy objective function of the proposed models. Extensive
experiments on face datasets well demonstrate that the proposed methods are
more robust to corruptions and occlusions.
|
1501.04281 | Pankaj Pansari | Pankaj Pansari, C. Rajagopalan, Ramasubramanian Sundararajan | Grouping Entities in a Fleet by Community Detection in Network of
Regression Models | 8 pages, 4 figures | null | null | null | cs.SI physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper deals with grouping of entities in a fleet based on their
behavior. The behavior of each entity is characterized by its historical
dataset, which comprises a dependent variable, typically a performance measure,
and multiple independent variables, typically operating conditions. A
regression model built using this dataset is used as a proxy for the behavior
of an entity. The validation error of the model of one unit with respect to the
dataset of another unit is used as a measure of the difference in behavior
between two units. Grouping entities based on their behavior is posed as a
graph clustering problem with nodes representing regression models and edge
weights given by the validation errors. Specifically, we find communities in
this graph, having dense edge connections within and sparse connections
outside. A way to assess the goodness of grouping and finding the optimum
number of divisions is proposed. The algorithm and measures proposed are
illustrated with application to synthetic data.
| [
{
"version": "v1",
"created": "Sun, 18 Jan 2015 11:24:26 GMT"
}
] | 2015-01-20T00:00:00 | [
[
"Pansari",
"Pankaj",
""
],
[
"Rajagopalan",
"C.",
""
],
[
"Sundararajan",
"Ramasubramanian",
""
]
] | TITLE: Grouping Entities in a Fleet by Community Detection in Network of
Regression Models
ABSTRACT: This paper deals with grouping of entities in a fleet based on their
behavior. The behavior of each entity is characterized by its historical
dataset, which comprises a dependent variable, typically a performance measure,
and multiple independent variables, typically operating conditions. A
regression model built using this dataset is used as a proxy for the behavior
of an entity. The validation error of the model of one unit with respect to the
dataset of another unit is used as a measure of the difference in behavior
between two units. Grouping entities based on their behavior is posed as a
graph clustering problem with nodes representing regression models and edge
weights given by the validation errors. Specifically, we find communities in
this graph, having dense edge connections within and sparse connections
outside. A way to assess the goodness of grouping and finding the optimum
number of divisions is proposed. The algorithm and measures proposed are
illustrated with application to synthetic data.
|
1501.04325 | Lars Maaloe | Lars Maaloe and Morten Arngren and Ole Winther | Deep Belief Nets for Topic Modeling | Accepted to the ICML-2014 Workshop on Knowledge-Powered Deep Learning
for Text Mining | null | null | null | cs.CL cs.LG stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Applying traditional collaborative filtering to digital publishing is
challenging because user data is very sparse due to the high volume of
documents relative to the number of users. Content based approaches, on the
other hand, is attractive because textual content is often very informative. In
this paper we describe large-scale content based collaborative filtering for
digital publishing. To solve the digital publishing recommender problem we
compare two approaches: latent Dirichlet allocation (LDA) and deep belief nets
(DBN) that both find low-dimensional latent representations for documents.
Efficient retrieval can be carried out in the latent representation. We work
both on public benchmarks and digital media content provided by Issuu, an
online publishing platform. This article also comes with a newly developed deep
belief nets toolbox for topic modeling tailored towards performance evaluation
of the DBN model and comparisons to the LDA model.
| [
{
"version": "v1",
"created": "Sun, 18 Jan 2015 17:12:59 GMT"
}
] | 2015-01-20T00:00:00 | [
[
"Maaloe",
"Lars",
""
],
[
"Arngren",
"Morten",
""
],
[
"Winther",
"Ole",
""
]
] | TITLE: Deep Belief Nets for Topic Modeling
ABSTRACT: Applying traditional collaborative filtering to digital publishing is
challenging because user data is very sparse due to the high volume of
documents relative to the number of users. Content based approaches, on the
other hand, is attractive because textual content is often very informative. In
this paper we describe large-scale content based collaborative filtering for
digital publishing. To solve the digital publishing recommender problem we
compare two approaches: latent Dirichlet allocation (LDA) and deep belief nets
(DBN) that both find low-dimensional latent representations for documents.
Efficient retrieval can be carried out in the latent representation. We work
both on public benchmarks and digital media content provided by Issuu, an
online publishing platform. This article also comes with a newly developed deep
belief nets toolbox for topic modeling tailored towards performance evaluation
of the DBN model and comparisons to the LDA model.
|
1501.04552 | Benson Muite | S. Aseeri and O. Batra\v{s}ev and M. Icardi and B. Leu and A. Liu and
N. Li and B.K. Muite and E. M\"uller and B. Palen and M. Quell and H. Servat
and P. Sheth and R. Speck and M. Van Moer and J. Vienne | Solving the Klein-Gordon equation using Fourier spectral methods: A
benchmark test for computer performance | 10 pages | null | null | null | cs.PF cs.DC math.NA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The cubic Klein-Gordon equation is a simple but non-trivial partial
differential equation whose numerical solution has the main building blocks
required for the solution of many other partial differential equations. In this
study, the library 2DECOMP&FFT is used in a Fourier spectral scheme to solve
the Klein-Gordon equation and strong scaling of the code is examined on
thirteen different machines for a problem size of 512^3. The results are useful
in assessing likely performance of other parallel fast Fourier transform based
programs for solving partial differential equations. The problem is chosen to
be large enough to solve on a workstation, yet also of interest to solve
quickly on a supercomputer, in particular for parametric studies. Unlike other
high performance computing benchmarks, for this problem size, the time to
solution will not be improved by simply building a bigger supercomputer.
| [
{
"version": "v1",
"created": "Mon, 19 Jan 2015 16:48:00 GMT"
}
] | 2015-01-20T00:00:00 | [
[
"Aseeri",
"S.",
""
],
[
"Batrašev",
"O.",
""
],
[
"Icardi",
"M.",
""
],
[
"Leu",
"B.",
""
],
[
"Liu",
"A.",
""
],
[
"Li",
"N.",
""
],
[
"Muite",
"B. K.",
""
],
[
"Müller",
"E.",
""
],
[
"Palen",
"B.",
""
],
[
"Quell",
"M.",
""
],
[
"Servat",
"H.",
""
],
[
"Sheth",
"P.",
""
],
[
"Speck",
"R.",
""
],
[
"Van Moer",
"M.",
""
],
[
"Vienne",
"J.",
""
]
] | TITLE: Solving the Klein-Gordon equation using Fourier spectral methods: A
benchmark test for computer performance
ABSTRACT: The cubic Klein-Gordon equation is a simple but non-trivial partial
differential equation whose numerical solution has the main building blocks
required for the solution of many other partial differential equations. In this
study, the library 2DECOMP&FFT is used in a Fourier spectral scheme to solve
the Klein-Gordon equation and strong scaling of the code is examined on
thirteen different machines for a problem size of 512^3. The results are useful
in assessing likely performance of other parallel fast Fourier transform based
programs for solving partial differential equations. The problem is chosen to
be large enough to solve on a workstation, yet also of interest to solve
quickly on a supercomputer, in particular for parametric studies. Unlike other
high performance computing benchmarks, for this problem size, the time to
solution will not be improved by simply building a bigger supercomputer.
|
1407.3121 | Jeroen Keiren | Jeroen J.A. Keiren | Benchmarks for Parity Games (extended version) | The corresponding tool and benchmarks are available from
https://github.com/jkeiren/paritygame-generator. This is an extended version
of the paper that has been accepted for FSEN 2015 | null | null | null | cs.LO cs.GT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose a benchmark suite for parity games that includes all benchmarks
that have been used in the literature, and make it available online. We give an
overview of the parity games, including a description of how they have been
generated. We also describe structural properties of parity games, and using
these properties we show that our benchmarks are representative. With this work
we provide a starting point for further experimentation with parity games.
| [
{
"version": "v1",
"created": "Fri, 11 Jul 2014 11:45:25 GMT"
},
{
"version": "v2",
"created": "Fri, 16 Jan 2015 14:05:32 GMT"
}
] | 2015-01-19T00:00:00 | [
[
"Keiren",
"Jeroen J. A.",
""
]
] | TITLE: Benchmarks for Parity Games (extended version)
ABSTRACT: We propose a benchmark suite for parity games that includes all benchmarks
that have been used in the literature, and make it available online. We give an
overview of the parity games, including a description of how they have been
generated. We also describe structural properties of parity games, and using
these properties we show that our benchmarks are representative. With this work
we provide a starting point for further experimentation with parity games.
|
1207.1019 | Emilie Morvant | Emilie Morvant (LIF), Amaury Habrard (LAHC), St\'ephane Ayache (LIF) | PAC-Bayesian Majority Vote for Late Classifier Fusion | 7 pages, Research report | null | null | null | stat.ML cs.CV cs.LG cs.MM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A lot of attention has been devoted to multimedia indexing over the past few
years. In the literature, we often consider two kinds of fusion schemes: The
early fusion and the late fusion. In this paper we focus on late classifier
fusion, where one combines the scores of each modality at the decision level.
To tackle this problem, we investigate a recent and elegant well-founded
quadratic program named MinCq coming from the Machine Learning PAC-Bayes
theory. MinCq looks for the weighted combination, over a set of real-valued
functions seen as voters, leading to the lowest misclassification rate, while
making use of the voters' diversity. We provide evidence that this method is
naturally adapted to late fusion procedure. We propose an extension of MinCq by
adding an order- preserving pairwise loss for ranking, helping to improve Mean
Averaged Precision measure. We confirm the good behavior of the MinCq-based
fusion approaches with experiments on a real image benchmark.
| [
{
"version": "v1",
"created": "Wed, 4 Jul 2012 15:09:05 GMT"
}
] | 2015-01-16T00:00:00 | [
[
"Morvant",
"Emilie",
"",
"LIF"
],
[
"Habrard",
"Amaury",
"",
"LAHC"
],
[
"Ayache",
"Stéphane",
"",
"LIF"
]
] | TITLE: PAC-Bayesian Majority Vote for Late Classifier Fusion
ABSTRACT: A lot of attention has been devoted to multimedia indexing over the past few
years. In the literature, we often consider two kinds of fusion schemes: The
early fusion and the late fusion. In this paper we focus on late classifier
fusion, where one combines the scores of each modality at the decision level.
To tackle this problem, we investigate a recent and elegant well-founded
quadratic program named MinCq coming from the Machine Learning PAC-Bayes
theory. MinCq looks for the weighted combination, over a set of real-valued
functions seen as voters, leading to the lowest misclassification rate, while
making use of the voters' diversity. We provide evidence that this method is
naturally adapted to late fusion procedure. We propose an extension of MinCq by
adding an order- preserving pairwise loss for ranking, helping to improve Mean
Averaged Precision measure. We confirm the good behavior of the MinCq-based
fusion approaches with experiments on a real image benchmark.
|
1310.6119 | Christos Patsonakis | Christos Patsonakis and Mema Roussopoulos | Asynchronous Rumour Spreading in Social and Signed Topologies | 10 pages, 4 figures, 5 tables | null | null | null | cs.SI physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we present an experimental analysis of the asynchronous push &
pull rumour spreading protocol. This protocol is, to date, the best-performing
rumour spreading protocol for simple, scalable, and robust information
dissemination in distributed systems. We analyse the effect that multiple
parameters have on the protocol's performance, such as using memory to avoid
contacting the same neighbor twice in a row, varying the stopping criteria used
by nodes to decide when to stop spreading the rumour, employing more
sophisticated neighbor selection policies instead of the standard uniform
random choice, and others. Prior work has focused on either providing
theoretical upper bounds regarding the number of rounds needed to spread the
rumour to all nodes, or, proposes improvements by adjusting isolated
parameters. To our knowledge, our work is the first to study how multiple
parameters affect system behaviour both in isolation and combination and under
a wide range of values. Our analysis is based on experimental simulations using
real-world social network datasets, thus complementing prior theoretical work
to shed light on how the protocol behaves in practical, real-world systems. We
also study the behaviour of the protocol on a special type of social graph,
called signed networks (e.g., Slashdot and Epinions), whose links indicate
stronger trust relationships. Finally, through our detailed analysis, we
demonstrate how a few simple additions to the protocol can improve the total
time required to inform 100% of the nodes by a maximum of 99.69% and an average
of 82.37%.
| [
{
"version": "v1",
"created": "Wed, 23 Oct 2013 06:12:54 GMT"
},
{
"version": "v2",
"created": "Mon, 3 Feb 2014 07:37:04 GMT"
},
{
"version": "v3",
"created": "Thu, 15 Jan 2015 10:35:53 GMT"
}
] | 2015-01-16T00:00:00 | [
[
"Patsonakis",
"Christos",
""
],
[
"Roussopoulos",
"Mema",
""
]
] | TITLE: Asynchronous Rumour Spreading in Social and Signed Topologies
ABSTRACT: In this paper, we present an experimental analysis of the asynchronous push &
pull rumour spreading protocol. This protocol is, to date, the best-performing
rumour spreading protocol for simple, scalable, and robust information
dissemination in distributed systems. We analyse the effect that multiple
parameters have on the protocol's performance, such as using memory to avoid
contacting the same neighbor twice in a row, varying the stopping criteria used
by nodes to decide when to stop spreading the rumour, employing more
sophisticated neighbor selection policies instead of the standard uniform
random choice, and others. Prior work has focused on either providing
theoretical upper bounds regarding the number of rounds needed to spread the
rumour to all nodes, or, proposes improvements by adjusting isolated
parameters. To our knowledge, our work is the first to study how multiple
parameters affect system behaviour both in isolation and combination and under
a wide range of values. Our analysis is based on experimental simulations using
real-world social network datasets, thus complementing prior theoretical work
to shed light on how the protocol behaves in practical, real-world systems. We
also study the behaviour of the protocol on a special type of social graph,
called signed networks (e.g., Slashdot and Epinions), whose links indicate
stronger trust relationships. Finally, through our detailed analysis, we
demonstrate how a few simple additions to the protocol can improve the total
time required to inform 100% of the nodes by a maximum of 99.69% and an average
of 82.37%.
|
1501.03210 | Piyush Bansal | Piyush Bansal, Romil Bansal and Vasudeva Varma | Towards Deep Semantic Analysis Of Hashtags | To Appear in 37th European Conference on Information Retrieval | null | null | null | cs.IR cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Hashtags are semantico-syntactic constructs used across various social
networking and microblogging platforms to enable users to start a topic
specific discussion or classify a post into a desired category. Segmenting and
linking the entities present within the hashtags could therefore help in better
understanding and extraction of information shared across the social media.
However, due to lack of space delimiters in the hashtags (e.g #nsavssnowden),
the segmentation of hashtags into constituent entities ("NSA" and "Edward
Snowden" in this case) is not a trivial task. Most of the current
state-of-the-art social media analytics systems like Sentiment Analysis and
Entity Linking tend to either ignore hashtags, or treat them as a single word.
In this paper, we present a context aware approach to segment and link entities
in the hashtags to a knowledge base (KB) entry, based on the context within the
tweet. Our approach segments and links the entities in hashtags such that the
coherence between hashtag semantics and the tweet is maximized. To the best of
our knowledge, no existing study addresses the issue of linking entities in
hashtags for extracting semantic information. We evaluate our method on two
different datasets, and demonstrate the effectiveness of our technique in
improving the overall entity linking in tweets via additional semantic
information provided by segmenting and linking entities in a hashtag.
| [
{
"version": "v1",
"created": "Tue, 13 Jan 2015 23:51:29 GMT"
}
] | 2015-01-15T00:00:00 | [
[
"Bansal",
"Piyush",
""
],
[
"Bansal",
"Romil",
""
],
[
"Varma",
"Vasudeva",
""
]
] | TITLE: Towards Deep Semantic Analysis Of Hashtags
ABSTRACT: Hashtags are semantico-syntactic constructs used across various social
networking and microblogging platforms to enable users to start a topic
specific discussion or classify a post into a desired category. Segmenting and
linking the entities present within the hashtags could therefore help in better
understanding and extraction of information shared across the social media.
However, due to lack of space delimiters in the hashtags (e.g #nsavssnowden),
the segmentation of hashtags into constituent entities ("NSA" and "Edward
Snowden" in this case) is not a trivial task. Most of the current
state-of-the-art social media analytics systems like Sentiment Analysis and
Entity Linking tend to either ignore hashtags, or treat them as a single word.
In this paper, we present a context aware approach to segment and link entities
in the hashtags to a knowledge base (KB) entry, based on the context within the
tweet. Our approach segments and links the entities in hashtags such that the
coherence between hashtag semantics and the tweet is maximized. To the best of
our knowledge, no existing study addresses the issue of linking entities in
hashtags for extracting semantic information. We evaluate our method on two
different datasets, and demonstrate the effectiveness of our technique in
improving the overall entity linking in tweets via additional semantic
information provided by segmenting and linking entities in a hashtag.
|
1501.03341 | Nikica Hlupi\'c | Nikica Hlupic and Ivo Beros | Solving Polynomial Systems by Penetrating Gradient Algorithm Applying
Deepest Descent Strategy | null | null | null | null | math.OC cs.MS math.NA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | An algorithm and associated strategy for solving polynomial systems within
the optimization framework is presented. The algorithm and strategy are named,
respectively, the penetrating gradient algorithm and the deepest descent
strategy. The most prominent feature of penetrating gradient algorithm, after
which it was named, is its ability to see and penetrate through the obstacles
in error space along the line of search direction and to jump to the global
minimizer in a single step. The ability to find the deepest point in an
arbitrary direction, no matter how distant the point is and regardless of the
relief of error space between the current and the best point, motivates
movements in directions in which cost function can be maximally reduced, rather
than in directions that seem to be the best locally (like, for instance, the
steepest descent, i.e., negative gradient direction). Therefore, the strategy
is named the deepest descent, in contrast but alluding to the steepest descent.
Penetrating gradient algorithm is derived and its properties are proven
mathematically, while features of the deepest descent strategy are shown by
comparative simulations. Extensive benchmark tests confirm that the proposed
algorithm and strategy jointly form an effective solver of polynomial systems.
In addition, further theoretical considerations in Section 5 about solving
linear systems by the proposed method reveal a surprising and interesting
relation of proposed and Gauss-Seidel method.
| [
{
"version": "v1",
"created": "Wed, 14 Jan 2015 13:34:50 GMT"
}
] | 2015-01-15T00:00:00 | [
[
"Hlupic",
"Nikica",
""
],
[
"Beros",
"Ivo",
""
]
] | TITLE: Solving Polynomial Systems by Penetrating Gradient Algorithm Applying
Deepest Descent Strategy
ABSTRACT: An algorithm and associated strategy for solving polynomial systems within
the optimization framework is presented. The algorithm and strategy are named,
respectively, the penetrating gradient algorithm and the deepest descent
strategy. The most prominent feature of penetrating gradient algorithm, after
which it was named, is its ability to see and penetrate through the obstacles
in error space along the line of search direction and to jump to the global
minimizer in a single step. The ability to find the deepest point in an
arbitrary direction, no matter how distant the point is and regardless of the
relief of error space between the current and the best point, motivates
movements in directions in which cost function can be maximally reduced, rather
than in directions that seem to be the best locally (like, for instance, the
steepest descent, i.e., negative gradient direction). Therefore, the strategy
is named the deepest descent, in contrast but alluding to the steepest descent.
Penetrating gradient algorithm is derived and its properties are proven
mathematically, while features of the deepest descent strategy are shown by
comparative simulations. Extensive benchmark tests confirm that the proposed
algorithm and strategy jointly form an effective solver of polynomial systems.
In addition, further theoretical considerations in Section 5 about solving
linear systems by the proposed method reveal a surprising and interesting
relation of proposed and Gauss-Seidel method.
|
1407.0439 | Haixia Liu | Haixia Liu, Raymond H. Chan, and Yuan Yao | Geometric Tight Frame based Stylometry for Art Authentication of van
Gogh Paintings | 14 pages, 13 figures | null | null | null | cs.LG cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper is about authenticating genuine van Gogh paintings from forgeries.
The authentication process depends on two key steps: feature extraction and
outlier detection. In this paper, a geometric tight frame and some simple
statistics of the tight frame coefficients are used to extract features from
the paintings. Then a forward stage-wise rank boosting is used to select a
small set of features for more accurate classification so that van Gogh
paintings are highly concentrated towards some center point while forgeries are
spread out as outliers. Numerical results show that our method can achieve
86.08% classification accuracy under the leave-one-out cross-validation
procedure. Our method also identifies five features that are much more
predominant than other features. Using just these five features for
classification, our method can give 88.61% classification accuracy which is the
highest so far reported in literature. Evaluation of the five features is also
performed on two hundred datasets generated by bootstrap sampling with
replacement. The median and the mean are 88.61% and 87.77% respectively. Our
results show that a small set of statistics of the tight frame coefficients
along certain orientations can serve as discriminative features for van Gogh
paintings. It is more important to look at the tail distributions of such
directional coefficients than mean values and standard deviations. It reflects
a highly consistent style in van Gogh's brushstroke movements, where many
forgeries demonstrate a more diverse spread in these features.
| [
{
"version": "v1",
"created": "Wed, 2 Jul 2014 01:55:37 GMT"
},
{
"version": "v2",
"created": "Sat, 13 Sep 2014 00:53:16 GMT"
},
{
"version": "v3",
"created": "Tue, 13 Jan 2015 07:20:12 GMT"
}
] | 2015-01-14T00:00:00 | [
[
"Liu",
"Haixia",
""
],
[
"Chan",
"Raymond H.",
""
],
[
"Yao",
"Yuan",
""
]
] | TITLE: Geometric Tight Frame based Stylometry for Art Authentication of van
Gogh Paintings
ABSTRACT: This paper is about authenticating genuine van Gogh paintings from forgeries.
The authentication process depends on two key steps: feature extraction and
outlier detection. In this paper, a geometric tight frame and some simple
statistics of the tight frame coefficients are used to extract features from
the paintings. Then a forward stage-wise rank boosting is used to select a
small set of features for more accurate classification so that van Gogh
paintings are highly concentrated towards some center point while forgeries are
spread out as outliers. Numerical results show that our method can achieve
86.08% classification accuracy under the leave-one-out cross-validation
procedure. Our method also identifies five features that are much more
predominant than other features. Using just these five features for
classification, our method can give 88.61% classification accuracy which is the
highest so far reported in literature. Evaluation of the five features is also
performed on two hundred datasets generated by bootstrap sampling with
replacement. The median and the mean are 88.61% and 87.77% respectively. Our
results show that a small set of statistics of the tight frame coefficients
along certain orientations can serve as discriminative features for van Gogh
paintings. It is more important to look at the tail distributions of such
directional coefficients than mean values and standard deviations. It reflects
a highly consistent style in van Gogh's brushstroke movements, where many
forgeries demonstrate a more diverse spread in these features.
|
1410.5473 | Chang Liu | Chang Liu and Yi Xu | Feature Selection Based on Confidence Machine | 10 pages | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In machine learning and pattern recognition, feature selection has been a hot
topic in the literature. Unsupervised feature selection is challenging due to
the loss of labels which would supply the related information.How to define an
appropriate metric is the key for feature selection. We propose a filter method
for unsupervised feature selection which is based on the Confidence Machine.
Confidence Machine offers an estimation of confidence on a feature'reliability.
In this paper, we provide the math model of Confidence Machine in the context
of feature selection, which maximizes the relevance and minimizes the
redundancy of the selected feature. We compare our method against classic
feature selection methods Laplacian Score, Pearson Correlation and Principal
Component Analysis on benchmark data sets. The experimental results demonstrate
the efficiency and effectiveness of our method.
| [
{
"version": "v1",
"created": "Mon, 20 Oct 2014 21:32:05 GMT"
},
{
"version": "v2",
"created": "Tue, 13 Jan 2015 16:58:03 GMT"
}
] | 2015-01-14T00:00:00 | [
[
"Liu",
"Chang",
""
],
[
"Xu",
"Yi",
""
]
] | TITLE: Feature Selection Based on Confidence Machine
ABSTRACT: In machine learning and pattern recognition, feature selection has been a hot
topic in the literature. Unsupervised feature selection is challenging due to
the loss of labels which would supply the related information.How to define an
appropriate metric is the key for feature selection. We propose a filter method
for unsupervised feature selection which is based on the Confidence Machine.
Confidence Machine offers an estimation of confidence on a feature'reliability.
In this paper, we provide the math model of Confidence Machine in the context
of feature selection, which maximizes the relevance and minimizes the
redundancy of the selected feature. We compare our method against classic
feature selection methods Laplacian Score, Pearson Correlation and Principal
Component Analysis on benchmark data sets. The experimental results demonstrate
the efficiency and effectiveness of our method.
|
1411.3229 | Tian Cao | Tian Cao, Christopher Zach, Shannon Modla, Debbie Powell, Kirk Czymmek
and Marc Niethammer | Multi-modal Image Registration for Correlative Microscopy | 24 pages | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Correlative microscopy is a methodology combining the functionality of light
microscopy with the high resolution of electron microscopy and other microscopy
technologies. Image registration for correlative microscopy is quite
challenging because it is a multi-modal, multi-scale and multi-dimensional
registration problem. In this report, I introduce two methods of image
registration for correlative microscopy. The first method is based on fiducials
(beads). I generate landmarks from the fiducials and compute the similarity
transformation matrix based on three pairs of nearest corresponding landmarks.
A least-squares matching process is applied afterwards to further refine the
registration. The second method is inspired by the image analogies approach. I
introduce the sparse representation model into image analogies. I first train
representative image patches (dictionaries) for pre-registered datasets from
two different modalities, and then I use the sparse coding technique to
transfer a given image to a predicted image from one modality to another based
on the learned dictionaries. The final image registration is between the
predicted image and the original image corresponding to the given image in the
different modality. The method transforms a multi-modal registration problem to
a mono-modal one. I test my approaches on Transmission Electron Microscopy
(TEM) and confocal microscopy images. Experimental results of the methods are
also shown in this report.
| [
{
"version": "v1",
"created": "Wed, 12 Nov 2014 16:32:17 GMT"
},
{
"version": "v2",
"created": "Tue, 13 Jan 2015 15:44:08 GMT"
}
] | 2015-01-14T00:00:00 | [
[
"Cao",
"Tian",
""
],
[
"Zach",
"Christopher",
""
],
[
"Modla",
"Shannon",
""
],
[
"Powell",
"Debbie",
""
],
[
"Czymmek",
"Kirk",
""
],
[
"Niethammer",
"Marc",
""
]
] | TITLE: Multi-modal Image Registration for Correlative Microscopy
ABSTRACT: Correlative microscopy is a methodology combining the functionality of light
microscopy with the high resolution of electron microscopy and other microscopy
technologies. Image registration for correlative microscopy is quite
challenging because it is a multi-modal, multi-scale and multi-dimensional
registration problem. In this report, I introduce two methods of image
registration for correlative microscopy. The first method is based on fiducials
(beads). I generate landmarks from the fiducials and compute the similarity
transformation matrix based on three pairs of nearest corresponding landmarks.
A least-squares matching process is applied afterwards to further refine the
registration. The second method is inspired by the image analogies approach. I
introduce the sparse representation model into image analogies. I first train
representative image patches (dictionaries) for pre-registered datasets from
two different modalities, and then I use the sparse coding technique to
transfer a given image to a predicted image from one modality to another based
on the learned dictionaries. The final image registration is between the
predicted image and the original image corresponding to the given image in the
different modality. The method transforms a multi-modal registration problem to
a mono-modal one. I test my approaches on Transmission Electron Microscopy
(TEM) and confocal microscopy images. Experimental results of the methods are
also shown in this report.
|
1501.02825 | Sven Bambach | Sven Bambach | A Survey on Recent Advances of Computer Vision Algorithms for Egocentric
Video | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Recent technological advances have made lightweight, head mounted cameras
both practical and affordable and products like Google Glass show first
approaches to introduce the idea of egocentric (first-person) video to the
mainstream. Interestingly, the computer vision community has only recently
started to explore this new domain of egocentric vision, where research can
roughly be categorized into three areas: Object recognition, activity
detection/recognition, video summarization. In this paper, we try to give a
broad overview about the different problems that have been addressed and
collect and compare evaluation results. Moreover, along with the emergence of
this new domain came the introduction of numerous new and versatile benchmark
datasets, which we summarize and compare as well.
| [
{
"version": "v1",
"created": "Mon, 12 Jan 2015 21:14:56 GMT"
}
] | 2015-01-14T00:00:00 | [
[
"Bambach",
"Sven",
""
]
] | TITLE: A Survey on Recent Advances of Computer Vision Algorithms for Egocentric
Video
ABSTRACT: Recent technological advances have made lightweight, head mounted cameras
both practical and affordable and products like Google Glass show first
approaches to introduce the idea of egocentric (first-person) video to the
mainstream. Interestingly, the computer vision community has only recently
started to explore this new domain of egocentric vision, where research can
roughly be categorized into three areas: Object recognition, activity
detection/recognition, video summarization. In this paper, we try to give a
broad overview about the different problems that have been addressed and
collect and compare evaluation results. Moreover, along with the emergence of
this new domain came the introduction of numerous new and versatile benchmark
datasets, which we summarize and compare as well.
|
1501.02885 | Clark Thomborson | Clark Thomborson | Benchmarking Obfuscators of Functionality | 8 pp., submitted to SPRO 2015 (https://aspire-fp7.eu/spro) | null | null | null | cs.CR cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose a set of benchmarks for evaluating the practicality of software
obfuscators which rely on provably-secure methods for functional obfuscation.
| [
{
"version": "v1",
"created": "Tue, 13 Jan 2015 04:28:03 GMT"
}
] | 2015-01-14T00:00:00 | [
[
"Thomborson",
"Clark",
""
]
] | TITLE: Benchmarking Obfuscators of Functionality
ABSTRACT: We propose a set of benchmarks for evaluating the practicality of software
obfuscators which rely on provably-secure methods for functional obfuscation.
|
1501.02954 | Dominik Egarter | Dominik Egarter and Manfred P\"ochacker and Wilfried Elmenreich | Complexity of Power Draws for Load Disaggregation | null | null | null | null | cs.OH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Non-Intrusive Load Monitoring (NILM) is a technology offering methods to
identify appliances in homes based on their consumption characteristics and the
total household demand. Recently, many different novel NILM approaches were
introduced, tested on real-world data and evaluated with a common evaluation
metric. However, the fair comparison between different NILM approaches even
with the usage of the same evaluation metric is nearly impossible due to
incomplete or missing problem definitions. Each NILM approach typically is
evaluated under different test scenarios. Test results are thus influenced by
the considered appliances, the number of used appliances, the device type
representing the appliance and the pre-processing stages denoising the
consumption data. This paper introduces a novel complexity measure of
aggregated consumption data providing an assessment of the problem complexity
affected by the used appliances, the appliance characteristics and the
appliance usage over time. We test our load disaggregation complexity on
different real-world datasets and with a state-of-the-art NILM approach. The
introduced disaggregation complexity measure is able to classify the
disaggregation problem based on the used appliance set and the considered
measurement noise.
| [
{
"version": "v1",
"created": "Tue, 13 Jan 2015 11:09:51 GMT"
}
] | 2015-01-14T00:00:00 | [
[
"Egarter",
"Dominik",
""
],
[
"Pöchacker",
"Manfred",
""
],
[
"Elmenreich",
"Wilfried",
""
]
] | TITLE: Complexity of Power Draws for Load Disaggregation
ABSTRACT: Non-Intrusive Load Monitoring (NILM) is a technology offering methods to
identify appliances in homes based on their consumption characteristics and the
total household demand. Recently, many different novel NILM approaches were
introduced, tested on real-world data and evaluated with a common evaluation
metric. However, the fair comparison between different NILM approaches even
with the usage of the same evaluation metric is nearly impossible due to
incomplete or missing problem definitions. Each NILM approach typically is
evaluated under different test scenarios. Test results are thus influenced by
the considered appliances, the number of used appliances, the device type
representing the appliance and the pre-processing stages denoising the
consumption data. This paper introduces a novel complexity measure of
aggregated consumption data providing an assessment of the problem complexity
affected by the used appliances, the appliance characteristics and the
appliance usage over time. We test our load disaggregation complexity on
different real-world datasets and with a state-of-the-art NILM approach. The
introduced disaggregation complexity measure is able to classify the
disaggregation problem based on the used appliance set and the considered
measurement noise.
|
1501.03044 | Wei Lu | Wei Lu | Effects of Data Resolution and Human Behavior on Large Scale Evacuation
Simulations | PhD dissertation. UT Knoxville. 130 pages, 37 figures, 8 tables.
University of Tennessee, 2013. http://trace.tennessee.edu/utk_graddiss/2595 | null | null | null | physics.soc-ph cs.CE | http://creativecommons.org/licenses/publicdomain/ | Traffic Analysis Zones (TAZ) based macroscopic simulation studies are mostly
applied in evacuation planning and operation areas. The large size in TAZ and
aggregated information of macroscopic simulation underestimate the real
evacuation performance. To take advantage of the high resolution demographic
data LandScan USA (the zone size is much smaller than TAZ) and agent-based
microscopic traffic simulation models, many new problems appeared and novel
solutions are needed. A series of studies are conducted using LandScan USA
Population Cells (LPC) data for evacuation assignments with different network
configurations, travel demand models, and travelers compliance behavior.
First, a new Multiple Source Nearest Destination Shortest Path (MSNDSP)
problem is defined for generating Origin Destination matrix in evacuation
assignments when using LandScan dataset. Second, a new agent-based traffic
assignment framework using LandScan and TRANSIMS modules is proposed for
evacuation planning and operation study. Impact analysis on traffic analysis
area resolutions (TAZ vs LPC), evacuation start times (daytime vs nighttime),
and departure time choice models (normal S shape model vs location based model)
are studied. Third, based on the proposed framework, multi-scale network
configurations (two levels of road networks and two scales of zone sizes) and
three routing schemes (shortest network distance, highway biased, and shortest
straight-line distance routes) are implemented for the evacuation performance
comparison studies. Fourth, to study the impact of human behavior under
evacuation operations, travelers compliance behavior with compliance levels
from total complied to total non-complied are analyzed.
| [
{
"version": "v1",
"created": "Tue, 30 Dec 2014 19:49:52 GMT"
}
] | 2015-01-14T00:00:00 | [
[
"Lu",
"Wei",
""
]
] | TITLE: Effects of Data Resolution and Human Behavior on Large Scale Evacuation
Simulations
ABSTRACT: Traffic Analysis Zones (TAZ) based macroscopic simulation studies are mostly
applied in evacuation planning and operation areas. The large size in TAZ and
aggregated information of macroscopic simulation underestimate the real
evacuation performance. To take advantage of the high resolution demographic
data LandScan USA (the zone size is much smaller than TAZ) and agent-based
microscopic traffic simulation models, many new problems appeared and novel
solutions are needed. A series of studies are conducted using LandScan USA
Population Cells (LPC) data for evacuation assignments with different network
configurations, travel demand models, and travelers compliance behavior.
First, a new Multiple Source Nearest Destination Shortest Path (MSNDSP)
problem is defined for generating Origin Destination matrix in evacuation
assignments when using LandScan dataset. Second, a new agent-based traffic
assignment framework using LandScan and TRANSIMS modules is proposed for
evacuation planning and operation study. Impact analysis on traffic analysis
area resolutions (TAZ vs LPC), evacuation start times (daytime vs nighttime),
and departure time choice models (normal S shape model vs location based model)
are studied. Third, based on the proposed framework, multi-scale network
configurations (two levels of road networks and two scales of zone sizes) and
three routing schemes (shortest network distance, highway biased, and shortest
straight-line distance routes) are implemented for the evacuation performance
comparison studies. Fourth, to study the impact of human behavior under
evacuation operations, travelers compliance behavior with compliance levels
from total complied to total non-complied are analyzed.
|
1408.2292 | Jingwei Sun | Jingwei Sun, Guangzhong Sun | SPLZ: An Efficient Algorithm for Single Source Shortest Path Problem
Using Compression Method | 20 pages, 5 figures | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Efficient solution of the single source shortest path (SSSP) problem on road
networks is an important requirement for numerous real-world applications. This
paper introduces an algorithm for the SSSP problem using compression method.
Owning to precomputing and storing all-pairs shortest path (APSP), the process
of solving SSSP problem is a simple lookup of a little data from precomputed
APSP and decompression. APSP without compression needs at least 1TB memory for
a road network with one million vertices. Our algorithm can compress such an
APSP into several GB, and ensure a good performance of decompression. In our
experiment on a dataset about Northwest USA (with 1.2 millions vertices), our
method can achieve about three orders of magnitude faster than Dijkstra
algorithm based on binary heap.
| [
{
"version": "v1",
"created": "Mon, 11 Aug 2014 01:40:00 GMT"
},
{
"version": "v2",
"created": "Sun, 11 Jan 2015 11:57:32 GMT"
}
] | 2015-01-13T00:00:00 | [
[
"Sun",
"Jingwei",
""
],
[
"Sun",
"Guangzhong",
""
]
] | TITLE: SPLZ: An Efficient Algorithm for Single Source Shortest Path Problem
Using Compression Method
ABSTRACT: Efficient solution of the single source shortest path (SSSP) problem on road
networks is an important requirement for numerous real-world applications. This
paper introduces an algorithm for the SSSP problem using compression method.
Owning to precomputing and storing all-pairs shortest path (APSP), the process
of solving SSSP problem is a simple lookup of a little data from precomputed
APSP and decompression. APSP without compression needs at least 1TB memory for
a road network with one million vertices. Our algorithm can compress such an
APSP into several GB, and ensure a good performance of decompression. In our
experiment on a dataset about Northwest USA (with 1.2 millions vertices), our
method can achieve about three orders of magnitude faster than Dijkstra
algorithm based on binary heap.
|
1501.02282 | Miquel Moret\'o Dr | David Prat, Cristobal Ortega, Marc Casas, Miquel Moret\'o, Mateo
Valero | Adaptive and application dependent runtime guided hardware prefetcher
reconfiguration on the IBM POWER7 | Part of ADAPT Workshop proceedings, 2015 (arXiv:1412.2347) | null | null | ADAPT/2015/07 | cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Hardware data prefetcher engines have been extensively used to reduce the
impact of memory latency. However, microprocessors' hardware prefetcher engines
do not include any automatic hardware control able to dynamically tune their
operation. This lacking architectural feature causes systems to operate with
prefetchers in a fixed configuration, which in many cases harms performance and
energy consumption.
In this paper, a piece of software that solves the discussed problem in the
context of the IBM POWER7 microprocessor is presented. The proposed solution
involves using the runtime software as a bridge that is able to characterize
user applications' workload and dynamically reconfigure the prefetcher engine.
The proposed mechanisms has been deployed over OmpSs, a state-of-the-art
task-based programming model. The paper shows significant performance
improvements over a representative set of microbenchmarks and High Performance
Computing (HPC) applications.
| [
{
"version": "v1",
"created": "Fri, 9 Jan 2015 22:05:22 GMT"
}
] | 2015-01-13T00:00:00 | [
[
"Prat",
"David",
""
],
[
"Ortega",
"Cristobal",
""
],
[
"Casas",
"Marc",
""
],
[
"Moretó",
"Miquel",
""
],
[
"Valero",
"Mateo",
""
]
] | TITLE: Adaptive and application dependent runtime guided hardware prefetcher
reconfiguration on the IBM POWER7
ABSTRACT: Hardware data prefetcher engines have been extensively used to reduce the
impact of memory latency. However, microprocessors' hardware prefetcher engines
do not include any automatic hardware control able to dynamically tune their
operation. This lacking architectural feature causes systems to operate with
prefetchers in a fixed configuration, which in many cases harms performance and
energy consumption.
In this paper, a piece of software that solves the discussed problem in the
context of the IBM POWER7 microprocessor is presented. The proposed solution
involves using the runtime software as a bridge that is able to characterize
user applications' workload and dynamically reconfigure the prefetcher engine.
The proposed mechanisms has been deployed over OmpSs, a state-of-the-art
task-based programming model. The paper shows significant performance
improvements over a representative set of microbenchmarks and High Performance
Computing (HPC) applications.
|
1501.02431 | Rashmi Paithankar Ms | Rashmi Paithankar and Bharat Tidke | A H-K Clustering Algorithm For High Dimensional Data Using Ensemble
Learning | 9 pages, 1 table, 2 figures, International Journal of Information
Technology Convergence and Services (IJITCS) Vol.4, No.5/6, December 2014 | null | null | null | cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Advances made to the traditional clustering algorithms solves the various
problems such as curse of dimensionality and sparsity of data for multiple
attributes. The traditional H-K clustering algorithm can solve the randomness
and apriority of the initial centers of K-means clustering algorithm. But when
we apply it to high dimensional data it causes the dimensional disaster problem
due to high computational complexity. All the advanced clustering algorithms
like subspace and ensemble clustering algorithms improve the performance for
clustering high dimension dataset from different aspects in different extent.
Still these algorithms will improve the performance form a single perspective.
The objective of the proposed model is to improve the performance of
traditional H-K clustering and overcome the limitations such as high
computational complexity and poor accuracy for high dimensional data by
combining the three different approaches of clustering algorithm as subspace
clustering algorithm and ensemble clustering algorithm with H-K clustering
algorithm.
| [
{
"version": "v1",
"created": "Sun, 11 Jan 2015 08:30:15 GMT"
}
] | 2015-01-13T00:00:00 | [
[
"Paithankar",
"Rashmi",
""
],
[
"Tidke",
"Bharat",
""
]
] | TITLE: A H-K Clustering Algorithm For High Dimensional Data Using Ensemble
Learning
ABSTRACT: Advances made to the traditional clustering algorithms solves the various
problems such as curse of dimensionality and sparsity of data for multiple
attributes. The traditional H-K clustering algorithm can solve the randomness
and apriority of the initial centers of K-means clustering algorithm. But when
we apply it to high dimensional data it causes the dimensional disaster problem
due to high computational complexity. All the advanced clustering algorithms
like subspace and ensemble clustering algorithms improve the performance for
clustering high dimension dataset from different aspects in different extent.
Still these algorithms will improve the performance form a single perspective.
The objective of the proposed model is to improve the performance of
traditional H-K clustering and overcome the limitations such as high
computational complexity and poor accuracy for high dimensional data by
combining the three different approaches of clustering algorithm as subspace
clustering algorithm and ensemble clustering algorithm with H-K clustering
algorithm.
|
1501.02432 | Jayadeva | Jayadeva, Sanjit Singh Batra, and Siddarth Sabharwal | Learning a Fuzzy Hyperplane Fat Margin Classifier with Minimum VC
dimension | arXiv admin note: text overlap with arXiv:1410.4573 | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The Vapnik-Chervonenkis (VC) dimension measures the complexity of a learning
machine, and a low VC dimension leads to good generalization. The recently
proposed Minimal Complexity Machine (MCM) learns a hyperplane classifier by
minimizing an exact bound on the VC dimension. This paper extends the MCM
classifier to the fuzzy domain. The use of a fuzzy membership is known to
reduce the effect of outliers, and to reduce the effect of noise on learning.
Experimental results show, that on a number of benchmark datasets, the the
fuzzy MCM classifier outperforms SVMs and the conventional MCM in terms of
generalization, and that the fuzzy MCM uses fewer support vectors. On several
benchmark datasets, the fuzzy MCM classifier yields excellent test set
accuracies while using one-tenth the number of support vectors used by SVMs.
| [
{
"version": "v1",
"created": "Sun, 11 Jan 2015 09:29:05 GMT"
}
] | 2015-01-13T00:00:00 | [
[
"Jayadeva",
"",
""
],
[
"Batra",
"Sanjit Singh",
""
],
[
"Sabharwal",
"Siddarth",
""
]
] | TITLE: Learning a Fuzzy Hyperplane Fat Margin Classifier with Minimum VC
dimension
ABSTRACT: The Vapnik-Chervonenkis (VC) dimension measures the complexity of a learning
machine, and a low VC dimension leads to good generalization. The recently
proposed Minimal Complexity Machine (MCM) learns a hyperplane classifier by
minimizing an exact bound on the VC dimension. This paper extends the MCM
classifier to the fuzzy domain. The use of a fuzzy membership is known to
reduce the effect of outliers, and to reduce the effect of noise on learning.
Experimental results show, that on a number of benchmark datasets, the the
fuzzy MCM classifier outperforms SVMs and the conventional MCM in terms of
generalization, and that the fuzzy MCM uses fewer support vectors. On several
benchmark datasets, the fuzzy MCM classifier yields excellent test set
accuracies while using one-tenth the number of support vectors used by SVMs.
|
1501.02527 | Nicholas Locascio | Harini Suresh, Nicholas Locascio | Autodetection and Classification of Hidden Cultural City Districts from
Yelp Reviews | null | null | null | null | cs.CL cs.AI cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Topic models are a way to discover underlying themes in an otherwise
unstructured collection of documents. In this study, we specifically used the
Latent Dirichlet Allocation (LDA) topic model on a dataset of Yelp reviews to
classify restaurants based off of their reviews. Furthermore, we hypothesize
that within a city, restaurants can be grouped into similar "clusters" based on
both location and similarity. We used several different clustering methods,
including K-means Clustering and a Probabilistic Mixture Model, in order to
uncover and classify districts, both well-known and hidden (i.e. cultural areas
like Chinatown or hearsay like "the best street for Italian restaurants")
within a city. We use these models to display and label different clusters on a
map. We also introduce a topic similarity heatmap that displays the similarity
distribution in a city to a new restaurant.
| [
{
"version": "v1",
"created": "Mon, 12 Jan 2015 03:10:01 GMT"
}
] | 2015-01-13T00:00:00 | [
[
"Suresh",
"Harini",
""
],
[
"Locascio",
"Nicholas",
""
]
] | TITLE: Autodetection and Classification of Hidden Cultural City Districts from
Yelp Reviews
ABSTRACT: Topic models are a way to discover underlying themes in an otherwise
unstructured collection of documents. In this study, we specifically used the
Latent Dirichlet Allocation (LDA) topic model on a dataset of Yelp reviews to
classify restaurants based off of their reviews. Furthermore, we hypothesize
that within a city, restaurants can be grouped into similar "clusters" based on
both location and similarity. We used several different clustering methods,
including K-means Clustering and a Probabilistic Mixture Model, in order to
uncover and classify districts, both well-known and hidden (i.e. cultural areas
like Chinatown or hearsay like "the best street for Italian restaurants")
within a city. We use these models to display and label different clusters on a
map. We also introduce a topic similarity heatmap that displays the similarity
distribution in a city to a new restaurant.
|
1501.02530 | Anna Senina | Anna Rohrbach, Marcus Rohrbach, Niket Tandon, Bernt Schiele | A Dataset for Movie Description | null | null | null | null | cs.CV cs.CL cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Descriptive video service (DVS) provides linguistic descriptions of movies
and allows visually impaired people to follow a movie along with their peers.
Such descriptions are by design mainly visual and thus naturally form an
interesting data source for computer vision and computational linguistics. In
this work we propose a novel dataset which contains transcribed DVS, which is
temporally aligned to full length HD movies. In addition we also collected the
aligned movie scripts which have been used in prior work and compare the two
different sources of descriptions. In total the Movie Description dataset
contains a parallel corpus of over 54,000 sentences and video snippets from 72
HD movies. We characterize the dataset by benchmarking different approaches for
generating video descriptions. Comparing DVS to scripts, we find that DVS is
far more visual and describes precisely what is shown rather than what should
happen according to the scripts created prior to movie production.
| [
{
"version": "v1",
"created": "Mon, 12 Jan 2015 03:31:33 GMT"
}
] | 2015-01-13T00:00:00 | [
[
"Rohrbach",
"Anna",
""
],
[
"Rohrbach",
"Marcus",
""
],
[
"Tandon",
"Niket",
""
],
[
"Schiele",
"Bernt",
""
]
] | TITLE: A Dataset for Movie Description
ABSTRACT: Descriptive video service (DVS) provides linguistic descriptions of movies
and allows visually impaired people to follow a movie along with their peers.
Such descriptions are by design mainly visual and thus naturally form an
interesting data source for computer vision and computational linguistics. In
this work we propose a novel dataset which contains transcribed DVS, which is
temporally aligned to full length HD movies. In addition we also collected the
aligned movie scripts which have been used in prior work and compare the two
different sources of descriptions. In total the Movie Description dataset
contains a parallel corpus of over 54,000 sentences and video snippets from 72
HD movies. We characterize the dataset by benchmarking different approaches for
generating video descriptions. Comparing DVS to scripts, we find that DVS is
far more visual and describes precisely what is shown rather than what should
happen according to the scripts created prior to movie production.
|
1501.02652 | Kostas Stefanidis | Yannis Roussakis, Ioannis Chrysakis, Kostas Stefanidis, Giorgos
Flouris, Yannis Stavrakas | A Flexible Framework for Defining, Representing and Detecting Changes on
the Data Web | null | null | null | null | cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The dynamic nature of Web data gives rise to a multitude of problems related
to the identification, computation and management of the evolving versions and
the related changes. In this paper, we consider the problem of change
recognition in RDF datasets, i.e., the problem of identifying, and when
possible give semantics to, the changes that led from one version of an RDF
dataset to another. Despite our RDF focus, our approach is sufficiently general
to engulf different data models that can be encoded in RDF, such as relational
or multi-dimensional. In fact, we propose a flexible, extendible and
data-model-independent methodology of defining changes that can capture the
peculiarities and needs of different data models and applications, while being
formally robust due to the satisfaction of the properties of completeness and
unambiguity. Further, we propose an ontology of changes for storing the
detected changes that allows automated processing and analysis of changes,
cross-snapshot queries (spanning across different versions), as well as queries
involving both changes and data. To detect changes and populate said ontology,
we propose a customizable detection algorithm, which is applicable to different
data models and applications requiring the detection of custom, user-defined
changes. Finally, we provide a proof-of-concept application and evaluation of
our framework for different data models.
| [
{
"version": "v1",
"created": "Mon, 12 Jan 2015 14:15:35 GMT"
}
] | 2015-01-13T00:00:00 | [
[
"Roussakis",
"Yannis",
""
],
[
"Chrysakis",
"Ioannis",
""
],
[
"Stefanidis",
"Kostas",
""
],
[
"Flouris",
"Giorgos",
""
],
[
"Stavrakas",
"Yannis",
""
]
] | TITLE: A Flexible Framework for Defining, Representing and Detecting Changes on
the Data Web
ABSTRACT: The dynamic nature of Web data gives rise to a multitude of problems related
to the identification, computation and management of the evolving versions and
the related changes. In this paper, we consider the problem of change
recognition in RDF datasets, i.e., the problem of identifying, and when
possible give semantics to, the changes that led from one version of an RDF
dataset to another. Despite our RDF focus, our approach is sufficiently general
to engulf different data models that can be encoded in RDF, such as relational
or multi-dimensional. In fact, we propose a flexible, extendible and
data-model-independent methodology of defining changes that can capture the
peculiarities and needs of different data models and applications, while being
formally robust due to the satisfaction of the properties of completeness and
unambiguity. Further, we propose an ontology of changes for storing the
detected changes that allows automated processing and analysis of changes,
cross-snapshot queries (spanning across different versions), as well as queries
involving both changes and data. To detect changes and populate said ontology,
we propose a customizable detection algorithm, which is applicable to different
data models and applications requiring the detection of custom, user-defined
changes. Finally, we provide a proof-of-concept application and evaluation of
our framework for different data models.
|
1501.02702 | Feng Nan | Feng Nan, Joseph Wang, Venkatesh Saligrama | Max-Cost Discrete Function Evaluation Problem under a Budget | null | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose novel methods for max-cost Discrete Function Evaluation Problem
(DFEP) under budget constraints. We are motivated by applications such as
clinical diagnosis where a patient is subjected to a sequence of (possibly
expensive) tests before a decision is made. Our goal is to develop strategies
for minimizing max-costs. The problem is known to be NP hard and greedy methods
based on specialized impurity functions have been proposed. We develop a broad
class of \emph{admissible} impurity functions that admit monomials, classes of
polynomials, and hinge-loss functions that allow for flexible impurity design
with provably optimal approximation bounds. This flexibility is important for
datasets when max-cost can be overly sensitive to "outliers." Outliers bias
max-cost to a few examples that require a large number of tests for
classification. We design admissible functions that allow for accuracy-cost
trade-off and result in $O(\log n)$ guarantees of the optimal cost among trees
with corresponding classification accuracy levels.
| [
{
"version": "v1",
"created": "Mon, 12 Jan 2015 16:33:47 GMT"
}
] | 2015-01-13T00:00:00 | [
[
"Nan",
"Feng",
""
],
[
"Wang",
"Joseph",
""
],
[
"Saligrama",
"Venkatesh",
""
]
] | TITLE: Max-Cost Discrete Function Evaluation Problem under a Budget
ABSTRACT: We propose novel methods for max-cost Discrete Function Evaluation Problem
(DFEP) under budget constraints. We are motivated by applications such as
clinical diagnosis where a patient is subjected to a sequence of (possibly
expensive) tests before a decision is made. Our goal is to develop strategies
for minimizing max-costs. The problem is known to be NP hard and greedy methods
based on specialized impurity functions have been proposed. We develop a broad
class of \emph{admissible} impurity functions that admit monomials, classes of
polynomials, and hinge-loss functions that allow for flexible impurity design
with provably optimal approximation bounds. This flexibility is important for
datasets when max-cost can be overly sensitive to "outliers." Outliers bias
max-cost to a few examples that require a large number of tests for
classification. We design admissible functions that allow for accuracy-cost
trade-off and result in $O(\log n)$ guarantees of the optimal cost among trees
with corresponding classification accuracy levels.
|
1501.02724 | Balaji Subramaniam | Balaji Subramaniam and Wu-chun Feng | Towards Energy-Proportional Computing Using Subsystem-Level Power
Management | null | null | null | null | cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Massive data centers housing thousands of computing nodes have become
commonplace in enterprise computing, and the power consumption of such data
centers is growing at an unprecedented rate. Adding to the problem is the
inability of the servers to exhibit energy proportionality, i.e., provide
energy-efficient execution under all levels of utilization, which diminishes
the overall energy efficiency of the data center. It is imperative that we
realize effective strategies to control the power consumption of the server and
improve the energy efficiency of data centers. With the advent of Intel Sandy
Bridge processors, we have the ability to specify a limit on power consumption
during runtime, which creates opportunities to design new power-management
techniques for enterprise workloads and make the systems that they run on more
energy-proportional.
In this paper, we investigate whether it is possible to achieve energy
proportionality for enterprise-class server workloads, namely SPECpower_ssj2008
and SPECweb2009 benchmarks, by using Intel's Running Average Power Limit (RAPL)
interfaces. First, we analyze the average power consumption of the full system
as well as the subsystems and describe the energy proportionality of these
components. We then characterize the instantaneous power profile of these
benchmarks within different subsystems using the on-chip energy meters exposed
via the RAPL interfaces. Finally, we present the effects of power limiting on
the energy proportionality, performance, power and energy efficiency of
enterprise-class server workloads. Our observations and results shed light on
the efficacy of the RAPL interfaces and provide guidance for designing
power-management techniques for enterprise-class workloads.
| [
{
"version": "v1",
"created": "Mon, 12 Jan 2015 17:18:17 GMT"
}
] | 2015-01-13T00:00:00 | [
[
"Subramaniam",
"Balaji",
""
],
[
"Feng",
"Wu-chun",
""
]
] | TITLE: Towards Energy-Proportional Computing Using Subsystem-Level Power
Management
ABSTRACT: Massive data centers housing thousands of computing nodes have become
commonplace in enterprise computing, and the power consumption of such data
centers is growing at an unprecedented rate. Adding to the problem is the
inability of the servers to exhibit energy proportionality, i.e., provide
energy-efficient execution under all levels of utilization, which diminishes
the overall energy efficiency of the data center. It is imperative that we
realize effective strategies to control the power consumption of the server and
improve the energy efficiency of data centers. With the advent of Intel Sandy
Bridge processors, we have the ability to specify a limit on power consumption
during runtime, which creates opportunities to design new power-management
techniques for enterprise workloads and make the systems that they run on more
energy-proportional.
In this paper, we investigate whether it is possible to achieve energy
proportionality for enterprise-class server workloads, namely SPECpower_ssj2008
and SPECweb2009 benchmarks, by using Intel's Running Average Power Limit (RAPL)
interfaces. First, we analyze the average power consumption of the full system
as well as the subsystems and describe the energy proportionality of these
components. We then characterize the instantaneous power profile of these
benchmarks within different subsystems using the on-chip energy meters exposed
via the RAPL interfaces. Finally, we present the effects of power limiting on
the energy proportionality, performance, power and energy efficiency of
enterprise-class server workloads. Our observations and results shed light on
the efficacy of the RAPL interfaces and provide guidance for designing
power-management techniques for enterprise-class workloads.
|
1501.02732 | Ilya Goldin | April Galyardt and Ilya Goldin | Predicting Performance During Tutoring with Models of Recent Performance | null | null | null | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In educational technology and learning sciences, there are multiple uses for
a predictive model of whether a student will perform a task correctly or not.
For example, an intelligent tutoring system may use such a model to estimate
whether or not a student has mastered a skill. We analyze the significance of
data recency in making such predictions, i.e., asking whether relatively more
recent observations of a student's performance matter more than relatively
older observations. We develop a new Recent-Performance Factors Analysis model
that takes data recency into account. The new model significantly improves
predictive accuracy over both existing logistic-regression performance models
and over novel baseline models in evaluations on real-world and synthetic
datasets. As a secondary contribution, we demonstrate how the widely used
cross-validation with 0-1 loss is inferior to AIC and to cross-validation with
L1 prediction error loss as a measure of model performance.
| [
{
"version": "v1",
"created": "Mon, 12 Jan 2015 17:39:53 GMT"
}
] | 2015-01-13T00:00:00 | [
[
"Galyardt",
"April",
""
],
[
"Goldin",
"Ilya",
""
]
] | TITLE: Predicting Performance During Tutoring with Models of Recent Performance
ABSTRACT: In educational technology and learning sciences, there are multiple uses for
a predictive model of whether a student will perform a task correctly or not.
For example, an intelligent tutoring system may use such a model to estimate
whether or not a student has mastered a skill. We analyze the significance of
data recency in making such predictions, i.e., asking whether relatively more
recent observations of a student's performance matter more than relatively
older observations. We develop a new Recent-Performance Factors Analysis model
that takes data recency into account. The new model significantly improves
predictive accuracy over both existing logistic-regression performance models
and over novel baseline models in evaluations on real-world and synthetic
datasets. As a secondary contribution, we demonstrate how the widely used
cross-validation with 0-1 loss is inferior to AIC and to cross-validation with
L1 prediction error loss as a measure of model performance.
|
1501.01924 | Leman Akoglu | Shebuti Rayana and Leman Akoglu | Less is More: Building Selective Anomaly Ensembles | 14 pages, 5 pages Appendix, 10 Figures, 15 Tables, to appear at SDM
2015 | null | null | null | cs.DB cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Ensemble techniques for classification and clustering have long proven
effective, yet anomaly ensembles have been barely studied. In this work, we tap
into this gap and propose a new ensemble approach for anomaly mining, with
application to event detection in temporal graphs. Our method aims to combine
results from heterogeneous detectors with varying outputs, and leverage the
evidence from multiple sources to yield better performance. However, trusting
all the results may deteriorate the overall ensemble accuracy, as some
detectors may fall short and provide inaccurate results depending on the nature
of the data in hand. This suggests that being selective in which results to
combine is vital in building effective ensembles---hence "less is more".
In this paper we propose SELECT; an ensemble approach for anomaly mining that
employs novel techniques to automatically and systematically select the results
to assemble in a fully unsupervised fashion. We apply our method to event
detection in temporal graphs, where SELECT successfully utilizes five base
detectors and seven consensus methods under a unified ensemble framework. We
provide extensive quantitative evaluation of our approach on five real-world
datasets (four with ground truth), including Enron email communications, New
York Times news corpus, and World Cup 2014 Twitter news feed. Thanks to its
selection mechanism, SELECT yields superior performance compared to individual
detectors alone, the full ensemble (naively combining all results), and an
existing diversity-based ensemble.
| [
{
"version": "v1",
"created": "Thu, 8 Jan 2015 18:54:09 GMT"
}
] | 2015-01-12T00:00:00 | [
[
"Rayana",
"Shebuti",
""
],
[
"Akoglu",
"Leman",
""
]
] | TITLE: Less is More: Building Selective Anomaly Ensembles
ABSTRACT: Ensemble techniques for classification and clustering have long proven
effective, yet anomaly ensembles have been barely studied. In this work, we tap
into this gap and propose a new ensemble approach for anomaly mining, with
application to event detection in temporal graphs. Our method aims to combine
results from heterogeneous detectors with varying outputs, and leverage the
evidence from multiple sources to yield better performance. However, trusting
all the results may deteriorate the overall ensemble accuracy, as some
detectors may fall short and provide inaccurate results depending on the nature
of the data in hand. This suggests that being selective in which results to
combine is vital in building effective ensembles---hence "less is more".
In this paper we propose SELECT; an ensemble approach for anomaly mining that
employs novel techniques to automatically and systematically select the results
to assemble in a fully unsupervised fashion. We apply our method to event
detection in temporal graphs, where SELECT successfully utilizes five base
detectors and seven consensus methods under a unified ensemble framework. We
provide extensive quantitative evaluation of our approach on five real-world
datasets (four with ground truth), including Enron email communications, New
York Times news corpus, and World Cup 2014 Twitter news feed. Thanks to its
selection mechanism, SELECT yields superior performance compared to individual
detectors alone, the full ensemble (naively combining all results), and an
existing diversity-based ensemble.
|
1501.01996 | Amin Javari | Amin Javari, Mahdi Jalili | A probabilistic model to resolve diversity-accuracy challenge of
recommendation systems | 19 pages, 5 figures | Knowledge and Information Systems, 1-19 (2014) | 10.1007/s10115-014-0779-2 | null | cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Recommendation systems have wide-spread applications in both academia and
industry. Traditionally, performance of recommendation systems has been
measured by their precision. By introducing novelty and diversity as key
qualities in recommender systems, recently increasing attention has been
focused on this topic. Precision and novelty of recommendation are not in the
same direction, and practical systems should make a trade-off between these two
quantities. Thus, it is an important feature of a recommender system to make it
possible to adjust diversity and accuracy of the recommendations by tuning the
model. In this paper, we introduce a probabilistic structure to resolve the
diversity-accuracy dilemma in recommender systems. We propose a hybrid model
with adjustable level of diversity and precision such that one can perform this
by tuning a single parameter. The proposed recommendation model consists of two
models: one for maximization of the accuracy and the other one for
specification of the recommendation list to tastes of users. Our experiments on
two real datasets show the functionality of the model in resolving
accuracy-diversity dilemma and outperformance of the model over other classic
models. The proposed method could be extensively applied to real commercial
systems due to its low computational complexity and significant performance.
| [
{
"version": "v1",
"created": "Thu, 8 Jan 2015 22:42:39 GMT"
}
] | 2015-01-12T00:00:00 | [
[
"Javari",
"Amin",
""
],
[
"Jalili",
"Mahdi",
""
]
] | TITLE: A probabilistic model to resolve diversity-accuracy challenge of
recommendation systems
ABSTRACT: Recommendation systems have wide-spread applications in both academia and
industry. Traditionally, performance of recommendation systems has been
measured by their precision. By introducing novelty and diversity as key
qualities in recommender systems, recently increasing attention has been
focused on this topic. Precision and novelty of recommendation are not in the
same direction, and practical systems should make a trade-off between these two
quantities. Thus, it is an important feature of a recommender system to make it
possible to adjust diversity and accuracy of the recommendations by tuning the
model. In this paper, we introduce a probabilistic structure to resolve the
diversity-accuracy dilemma in recommender systems. We propose a hybrid model
with adjustable level of diversity and precision such that one can perform this
by tuning a single parameter. The proposed recommendation model consists of two
models: one for maximization of the accuracy and the other one for
specification of the recommendation list to tastes of users. Our experiments on
two real datasets show the functionality of the model in resolving
accuracy-diversity dilemma and outperformance of the model over other classic
models. The proposed method could be extensively applied to real commercial
systems due to its low computational complexity and significant performance.
|
1501.01694 | Mayank Kejriwal | Mayank Kejriwal, Daniel P. Miranker | A DNF Blocking Scheme Learner for Heterogeneous Datasets | null | null | null | null | cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Entity Resolution concerns identifying co-referent entity pairs across
datasets. A typical workflow comprises two steps. In the first step, a blocking
method uses a one-many function called a blocking scheme to map entities to
blocks. In the second step, entities sharing a block are paired and compared.
Current DNF blocking scheme learners (DNF-BSLs) apply only to structurally
homogeneous tables. We present an unsupervised algorithmic pipeline for
learning DNF blocking schemes on RDF graph datasets, as well as structurally
heterogeneous tables. Previous DNF-BSLs are admitted as special cases. We
evaluate the pipeline on six real-world dataset pairs. Unsupervised results are
shown to be competitive with supervised and semi-supervised baselines. To the
best of our knowledge, this is the first unsupervised DNF-BSL that admits RDF
graphs and structurally heterogeneous tables as inputs.
| [
{
"version": "v1",
"created": "Thu, 8 Jan 2015 00:37:09 GMT"
}
] | 2015-01-09T00:00:00 | [
[
"Kejriwal",
"Mayank",
""
],
[
"Miranker",
"Daniel P.",
""
]
] | TITLE: A DNF Blocking Scheme Learner for Heterogeneous Datasets
ABSTRACT: Entity Resolution concerns identifying co-referent entity pairs across
datasets. A typical workflow comprises two steps. In the first step, a blocking
method uses a one-many function called a blocking scheme to map entities to
blocks. In the second step, entities sharing a block are paired and compared.
Current DNF blocking scheme learners (DNF-BSLs) apply only to structurally
homogeneous tables. We present an unsupervised algorithmic pipeline for
learning DNF blocking schemes on RDF graph datasets, as well as structurally
heterogeneous tables. Previous DNF-BSLs are admitted as special cases. We
evaluate the pipeline on six real-world dataset pairs. Unsupervised results are
shown to be competitive with supervised and semi-supervised baselines. To the
best of our knowledge, this is the first unsupervised DNF-BSL that admits RDF
graphs and structurally heterogeneous tables as inputs.
|
1404.4208 | Konstantinos Sdrolias | Laszlo Gyarmati, Nikolaos Laoutaris, Kostas Sdrolias, Pablo Rodriguez,
Costas Courcoubetis | From advertising profits to bandwidth prices-A quantitative methodology
for negotiating premium peering | 16 pages, 8 figures | null | null | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We have developed a first of its kind methodology for deriving bandwidth
prices for premium direct peering between Access ISPs (A-ISPs) and Content and
Service Providers (CSPs) that want to deliver content and services in premium
quality. Our methodology establishes a direct link between service
profitability, e.g., from advertising, user- and subscriber-loyalty,
interconnection costs, and finally bandwidth price for peering. Unlike existing
work in both the networking and economics literature, our resulting
computational model built around Nash bargaining, can be used for deriving
quantitative results comparable to actual market prices. We analyze the US
market and derive prices for video that compare favorably with existing prices
for transit and paid peering. We also observe that the fair prices returned by
the model for high-profit/low-volume services such as search, are orders of
magnitude higher than current bandwidth prices. This implies that resolving
existing (fierce) interconnection tussles may require per service, instead of
wholesale, peering between A-ISPs and CSPs. Our model can be used for deriving
initial benchmark prices for such negotiations.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2014 11:23:05 GMT"
},
{
"version": "v2",
"created": "Tue, 22 Apr 2014 11:46:01 GMT"
},
{
"version": "v3",
"created": "Tue, 18 Nov 2014 12:14:39 GMT"
},
{
"version": "v4",
"created": "Wed, 7 Jan 2015 13:25:09 GMT"
}
] | 2015-01-08T00:00:00 | [
[
"Gyarmati",
"Laszlo",
""
],
[
"Laoutaris",
"Nikolaos",
""
],
[
"Sdrolias",
"Kostas",
""
],
[
"Rodriguez",
"Pablo",
""
],
[
"Courcoubetis",
"Costas",
""
]
] | TITLE: From advertising profits to bandwidth prices-A quantitative methodology
for negotiating premium peering
ABSTRACT: We have developed a first of its kind methodology for deriving bandwidth
prices for premium direct peering between Access ISPs (A-ISPs) and Content and
Service Providers (CSPs) that want to deliver content and services in premium
quality. Our methodology establishes a direct link between service
profitability, e.g., from advertising, user- and subscriber-loyalty,
interconnection costs, and finally bandwidth price for peering. Unlike existing
work in both the networking and economics literature, our resulting
computational model built around Nash bargaining, can be used for deriving
quantitative results comparable to actual market prices. We analyze the US
market and derive prices for video that compare favorably with existing prices
for transit and paid peering. We also observe that the fair prices returned by
the model for high-profit/low-volume services such as search, are orders of
magnitude higher than current bandwidth prices. This implies that resolving
existing (fierce) interconnection tussles may require per service, instead of
wholesale, peering between A-ISPs and CSPs. Our model can be used for deriving
initial benchmark prices for such negotiations.
|
1406.3332 | Julien Mairal | Julien Mairal (INRIA Grenoble Rh\^one-Alpes / LJK Laboratoire Jean
Kuntzmann), Piotr Koniusz (INRIA Grenoble Rh\^one-Alpes / LJK Laboratoire
Jean Kuntzmann), Zaid Harchaoui (INRIA Grenoble Rh\^one-Alpes / LJK
Laboratoire Jean Kuntzmann), Cordelia Schmid (INRIA Grenoble Rh\^one-Alpes /
LJK Laboratoire Jean Kuntzmann) | Convolutional Kernel Networks | appears in Advances in Neural Information Processing Systems (NIPS),
Dec 2014, Montreal, Canada, http://nips.cc | null | null | null | cs.CV cs.LG stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | An important goal in visual recognition is to devise image representations
that are invariant to particular transformations. In this paper, we address
this goal with a new type of convolutional neural network (CNN) whose
invariance is encoded by a reproducing kernel. Unlike traditional approaches
where neural networks are learned either to represent data or for solving a
classification task, our network learns to approximate the kernel feature map
on training data. Such an approach enjoys several benefits over classical ones.
First, by teaching CNNs to be invariant, we obtain simple network architectures
that achieve a similar accuracy to more complex ones, while being easy to train
and robust to overfitting. Second, we bridge a gap between the neural network
literature and kernels, which are natural tools to model invariance. We
evaluate our methodology on visual recognition tasks where CNNs have proven to
perform well, e.g., digit recognition with the MNIST dataset, and the more
challenging CIFAR-10 and STL-10 datasets, where our accuracy is competitive
with the state of the art.
| [
{
"version": "v1",
"created": "Thu, 12 Jun 2014 19:41:03 GMT"
},
{
"version": "v2",
"created": "Fri, 14 Nov 2014 16:58:48 GMT"
}
] | 2015-01-08T00:00:00 | [
[
"Mairal",
"Julien",
"",
"INRIA Grenoble Rhône-Alpes / LJK Laboratoire Jean\n Kuntzmann"
],
[
"Koniusz",
"Piotr",
"",
"INRIA Grenoble Rhône-Alpes / LJK Laboratoire\n Jean Kuntzmann"
],
[
"Harchaoui",
"Zaid",
"",
"INRIA Grenoble Rhône-Alpes / LJK\n Laboratoire Jean Kuntzmann"
],
[
"Schmid",
"Cordelia",
"",
"INRIA Grenoble Rhône-Alpes /\n LJK Laboratoire Jean Kuntzmann"
]
] | TITLE: Convolutional Kernel Networks
ABSTRACT: An important goal in visual recognition is to devise image representations
that are invariant to particular transformations. In this paper, we address
this goal with a new type of convolutional neural network (CNN) whose
invariance is encoded by a reproducing kernel. Unlike traditional approaches
where neural networks are learned either to represent data or for solving a
classification task, our network learns to approximate the kernel feature map
on training data. Such an approach enjoys several benefits over classical ones.
First, by teaching CNNs to be invariant, we obtain simple network architectures
that achieve a similar accuracy to more complex ones, while being easy to train
and robust to overfitting. Second, we bridge a gap between the neural network
literature and kernels, which are natural tools to model invariance. We
evaluate our methodology on visual recognition tasks where CNNs have proven to
perform well, e.g., digit recognition with the MNIST dataset, and the more
challenging CIFAR-10 and STL-10 datasets, where our accuracy is competitive
with the state of the art.
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.