id
large_stringlengths 9
16
| submitter
large_stringlengths 3
64
⌀ | authors
large_stringlengths 5
20.7k
| title
large_stringlengths 5
245
| comments
large_stringlengths 1
482
⌀ | journal-ref
large_stringlengths 4
382
⌀ | doi
large_stringlengths 9
151
⌀ | report-no
large_stringlengths 2
509
⌀ | categories
large_stringlengths 5
78
| license
large_stringclasses 9
values | abstract
large_stringlengths 83
3.55k
| versions
large listlengths 1
21
| update_date
timestamp[ms]date 2007-05-23 00:00:00
2025-04-25 00:00:00
| authors_parsed
large listlengths 1
1.35k
| prompt
large_stringlengths 166
3.64k
| label
stringclasses 2
values | prob
float64 0.5
0.98
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1505.00862 | Shuangyong Song | Shuangyong Song and Yao Meng | Classifying and Ranking Microblogging Hashtags with News Categories | 2 pages, no figure, to be appeared on RCIS 2015 | null | null | null | cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In microblogging, hashtags are used to be topical markers, and they are
adopted by users that contribute similar content or express a related idea.
However, hashtags are created in a free style and there is no domain category
information about them, which make users hard to get access to organized
hashtag presentation. In this paper, we propose an approach that classifies
hashtags with news categories, and then carry out a domain-sensitive popularity
ranking to get hot hashtags in each domain. The proposed approach first trains
a domain classification model with news content and news category information,
then detects microblogs related to a hashtag to be its representative text,
based on which we can classify this hashtag with a domain. Finally, we
calculate the domain-sensitive popularity of each hashtag with multiple
factors, to get most hotly discussed hashtags in each domain. Preliminary
experimental results on a dataset from Sina Weibo, one of the largest Chinese
microblogging websites, show usefulness of the proposed approach on describing
hashtags.
| [
{
"version": "v1",
"created": "Tue, 5 May 2015 02:02:23 GMT"
}
] | 2015-05-06T00:00:00 | [
[
"Song",
"Shuangyong",
""
],
[
"Meng",
"Yao",
""
]
] | TITLE: Classifying and Ranking Microblogging Hashtags with News Categories
ABSTRACT: In microblogging, hashtags are used to be topical markers, and they are
adopted by users that contribute similar content or express a related idea.
However, hashtags are created in a free style and there is no domain category
information about them, which make users hard to get access to organized
hashtag presentation. In this paper, we propose an approach that classifies
hashtags with news categories, and then carry out a domain-sensitive popularity
ranking to get hot hashtags in each domain. The proposed approach first trains
a domain classification model with news content and news category information,
then detects microblogs related to a hashtag to be its representative text,
based on which we can classify this hashtag with a domain. Finally, we
calculate the domain-sensitive popularity of each hashtag with multiple
factors, to get most hotly discussed hashtags in each domain. Preliminary
experimental results on a dataset from Sina Weibo, one of the largest Chinese
microblogging websites, show usefulness of the proposed approach on describing
hashtags.
| no_new_dataset | 0.95511 |
1505.00914 | Jose Cadenas | Jos\'e O. Cadenas, Graham Megson | An Empirical Evaluation of Preconditioning Data for Accelerating Convex
Hull Computations | 20 pages, 11 figures | null | null | null | cs.CG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The convex hull describes the extent or shape of a set of data and is used
ubiquitously in computational geometry. Common algorithms to construct the
convex hull on a finite set of n points (x,y) range from O(nlogn) time to O(n)
time. However, it is often the case that a heuristic procedure is applied to
reduce the original set of n points to a set of s < n points which contains the
hull and so accelerates the final hull finding procedure. We present an
algorithm to precondition data before building a 2D convex hull with integer
coordinates, with three distinct advantages. First, for all practical purposes,
it is linear; second, no explicit sorting of data is required and third, the
reduced set of s points is constructed such that it forms an ordered set that
can be directly pipelined into an O(n) time convex hull algorithm. Under these
criteria a fast (or O(n)) pre-conditioner in principle creates a fast convex
hull (approximately O(n)) for an arbitrary set of points. The paper empirically
evaluates and quantifies the acceleration generated by the method against the
most common convex hull algorithms. An extra acceleration of at least four
times when compared to previous existing preconditioning methods is found from
experiments on a dataset.
| [
{
"version": "v1",
"created": "Tue, 5 May 2015 08:31:48 GMT"
}
] | 2015-05-06T00:00:00 | [
[
"Cadenas",
"José O.",
""
],
[
"Megson",
"Graham",
""
]
] | TITLE: An Empirical Evaluation of Preconditioning Data for Accelerating Convex
Hull Computations
ABSTRACT: The convex hull describes the extent or shape of a set of data and is used
ubiquitously in computational geometry. Common algorithms to construct the
convex hull on a finite set of n points (x,y) range from O(nlogn) time to O(n)
time. However, it is often the case that a heuristic procedure is applied to
reduce the original set of n points to a set of s < n points which contains the
hull and so accelerates the final hull finding procedure. We present an
algorithm to precondition data before building a 2D convex hull with integer
coordinates, with three distinct advantages. First, for all practical purposes,
it is linear; second, no explicit sorting of data is required and third, the
reduced set of s points is constructed such that it forms an ordered set that
can be directly pipelined into an O(n) time convex hull algorithm. Under these
criteria a fast (or O(n)) pre-conditioner in principle creates a fast convex
hull (approximately O(n)) for an arbitrary set of points. The paper empirically
evaluates and quantifies the acceleration generated by the method against the
most common convex hull algorithms. An extra acceleration of at least four
times when compared to previous existing preconditioning methods is found from
experiments on a dataset.
| no_new_dataset | 0.948965 |
1204.2310 | Yue Wu | Yue Wu, Yicong Zhou, Joseph P. Noonan, Sos Agaian, and C. L. Philip
Chen | A Novel Latin Square Image Cipher | 26 pages, 17 figures, and 7 tables | Information Sciences 264 (2014): 317-339 | 10.1016/j.ins.2013.11.027 | null | cs.CR cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we introduce a symmetric-key Latin square image cipher (LSIC)
for grayscale and color images. Our contributions to the image encryption
community include 1) we develop new Latin square image encryption primitives
including Latin Square Whitening, Latin Square S-box and Latin Square P-box ;
2) we provide a new way of integrating probabilistic encryption in image
encryption by embedding random noise in the least significant image bit-plane;
and 3) we construct LSIC with these Latin square image encryption primitives
all on one keyed Latin square in a new loom-like substitution-permutation
network. Consequently, the proposed LSIC achieve many desired properties of a
secure cipher including a large key space, high key sensitivities, uniformly
distributed ciphertext, excellent confusion and diffusion properties,
semantically secure, and robustness against channel noise. Theoretical analysis
show that the LSIC has good resistance to many attack models including
brute-force attacks, ciphertext-only attacks, known-plaintext attacks and
chosen-plaintext attacks. Experimental analysis under extensive simulation
results using the complete USC-SIPI Miscellaneous image dataset demonstrate
that LSIC outperforms or reach state of the art suggested by many peer
algorithms. All these analysis and results demonstrate that the LSIC is very
suitable for digital image encryption. Finally, we open source the LSIC MATLAB
code under webpage https://sites.google.com/site/tuftsyuewu/source-code.
| [
{
"version": "v1",
"created": "Wed, 11 Apr 2012 00:54:13 GMT"
}
] | 2015-05-05T00:00:00 | [
[
"Wu",
"Yue",
""
],
[
"Zhou",
"Yicong",
""
],
[
"Noonan",
"Joseph P.",
""
],
[
"Agaian",
"Sos",
""
],
[
"Chen",
"C. L. Philip",
""
]
] | TITLE: A Novel Latin Square Image Cipher
ABSTRACT: In this paper, we introduce a symmetric-key Latin square image cipher (LSIC)
for grayscale and color images. Our contributions to the image encryption
community include 1) we develop new Latin square image encryption primitives
including Latin Square Whitening, Latin Square S-box and Latin Square P-box ;
2) we provide a new way of integrating probabilistic encryption in image
encryption by embedding random noise in the least significant image bit-plane;
and 3) we construct LSIC with these Latin square image encryption primitives
all on one keyed Latin square in a new loom-like substitution-permutation
network. Consequently, the proposed LSIC achieve many desired properties of a
secure cipher including a large key space, high key sensitivities, uniformly
distributed ciphertext, excellent confusion and diffusion properties,
semantically secure, and robustness against channel noise. Theoretical analysis
show that the LSIC has good resistance to many attack models including
brute-force attacks, ciphertext-only attacks, known-plaintext attacks and
chosen-plaintext attacks. Experimental analysis under extensive simulation
results using the complete USC-SIPI Miscellaneous image dataset demonstrate
that LSIC outperforms or reach state of the art suggested by many peer
algorithms. All these analysis and results demonstrate that the LSIC is very
suitable for digital image encryption. Finally, we open source the LSIC MATLAB
code under webpage https://sites.google.com/site/tuftsyuewu/source-code.
| new_dataset | 0.965446 |
1404.5065 | Eleftherios Spyromitros-Xioufis | Grigorios Tsoumakas, Eleftherios Spyromitros-Xioufis, Aikaterini
Vrekou, Ioannis Vlahavas | Multi-Target Regression via Random Linear Target Combinations | null | ECML PKDD Proceedings, Part III (2014) 225-240 | 10.1007/978-3-662-44845-8_15 | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Multi-target regression is concerned with the simultaneous prediction of
multiple continuous target variables based on the same set of input variables.
It arises in several interesting industrial and environmental application
domains, such as ecological modelling and energy forecasting. This paper
presents an ensemble method for multi-target regression that constructs new
target variables via random linear combinations of existing targets. We discuss
the connection of our approach with multi-label classification algorithms, in
particular RA$k$EL, which originally inspired this work, and a family of recent
multi-label classification algorithms that involve output coding. Experimental
results on 12 multi-target datasets show that it performs significantly better
than a strong baseline that learns a single model for each target using
gradient boosting and compares favourably to multi-objective random forest
approach, which is a state-of-the-art approach. The experiments further show
that our approach improves more when stronger unconditional dependencies exist
among the targets.
| [
{
"version": "v1",
"created": "Sun, 20 Apr 2014 19:17:23 GMT"
}
] | 2015-05-05T00:00:00 | [
[
"Tsoumakas",
"Grigorios",
""
],
[
"Spyromitros-Xioufis",
"Eleftherios",
""
],
[
"Vrekou",
"Aikaterini",
""
],
[
"Vlahavas",
"Ioannis",
""
]
] | TITLE: Multi-Target Regression via Random Linear Target Combinations
ABSTRACT: Multi-target regression is concerned with the simultaneous prediction of
multiple continuous target variables based on the same set of input variables.
It arises in several interesting industrial and environmental application
domains, such as ecological modelling and energy forecasting. This paper
presents an ensemble method for multi-target regression that constructs new
target variables via random linear combinations of existing targets. We discuss
the connection of our approach with multi-label classification algorithms, in
particular RA$k$EL, which originally inspired this work, and a family of recent
multi-label classification algorithms that involve output coding. Experimental
results on 12 multi-target datasets show that it performs significantly better
than a strong baseline that learns a single model for each target using
gradient boosting and compares favourably to multi-objective random forest
approach, which is a state-of-the-art approach. The experiments further show
that our approach improves more when stronger unconditional dependencies exist
among the targets.
| no_new_dataset | 0.942507 |
1411.2861 | Xiaodan Liang | Xiaodan Liang, Si Liu, Yunchao Wei, Luoqi Liu, Liang Lin, Shuicheng
Yan | Computational Baby Learning | 9 pages | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Intuitive observations show that a baby may inherently possess the capability
of recognizing a new visual concept (e.g., chair, dog) by learning from only
very few positive instances taught by parent(s) or others, and this recognition
capability can be gradually further improved by exploring and/or interacting
with the real instances in the physical world. Inspired by these observations,
we propose a computational model for slightly-supervised object detection,
based on prior knowledge modelling, exemplar learning and learning with video
contexts. The prior knowledge is modeled with a pre-trained Convolutional
Neural Network (CNN). When very few instances of a new concept are given, an
initial concept detector is built by exemplar learning over the deep features
from the pre-trained CNN. Simulating the baby's interaction with physical
world, the well-designed tracking solution is then used to discover more
diverse instances from the massive online unlabeled videos. Once a positive
instance is detected/identified with high score in each video, more variable
instances possibly from different view-angles and/or different distances are
tracked and accumulated. Then the concept detector can be fine-tuned based on
these new instances. This process can be repeated again and again till we
obtain a very mature concept detector. Extensive experiments on Pascal
VOC-07/10/12 object detection datasets well demonstrate the effectiveness of
our framework. It can beat the state-of-the-art full-training based
performances by learning from very few samples for each object category, along
with about 20,000 unlabeled videos.
| [
{
"version": "v1",
"created": "Tue, 11 Nov 2014 16:00:59 GMT"
},
{
"version": "v2",
"created": "Wed, 12 Nov 2014 13:59:59 GMT"
},
{
"version": "v3",
"created": "Mon, 4 May 2015 02:33:26 GMT"
}
] | 2015-05-05T00:00:00 | [
[
"Liang",
"Xiaodan",
""
],
[
"Liu",
"Si",
""
],
[
"Wei",
"Yunchao",
""
],
[
"Liu",
"Luoqi",
""
],
[
"Lin",
"Liang",
""
],
[
"Yan",
"Shuicheng",
""
]
] | TITLE: Computational Baby Learning
ABSTRACT: Intuitive observations show that a baby may inherently possess the capability
of recognizing a new visual concept (e.g., chair, dog) by learning from only
very few positive instances taught by parent(s) or others, and this recognition
capability can be gradually further improved by exploring and/or interacting
with the real instances in the physical world. Inspired by these observations,
we propose a computational model for slightly-supervised object detection,
based on prior knowledge modelling, exemplar learning and learning with video
contexts. The prior knowledge is modeled with a pre-trained Convolutional
Neural Network (CNN). When very few instances of a new concept are given, an
initial concept detector is built by exemplar learning over the deep features
from the pre-trained CNN. Simulating the baby's interaction with physical
world, the well-designed tracking solution is then used to discover more
diverse instances from the massive online unlabeled videos. Once a positive
instance is detected/identified with high score in each video, more variable
instances possibly from different view-angles and/or different distances are
tracked and accumulated. Then the concept detector can be fine-tuned based on
these new instances. This process can be repeated again and again till we
obtain a very mature concept detector. Extensive experiments on Pascal
VOC-07/10/12 object detection datasets well demonstrate the effectiveness of
our framework. It can beat the state-of-the-art full-training based
performances by learning from very few samples for each object category, along
with about 20,000 unlabeled videos.
| no_new_dataset | 0.947478 |
1411.6718 | Mohamed Aly | Mahmoud Nabil, Mohamed Aly, Amir Atiya | LABR: A Large Scale Arabic Sentiment Analysis Benchmark | 10 pages | null | null | null | cs.CL cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We introduce LABR, the largest sentiment analysis dataset to-date for the
Arabic language. It consists of over 63,000 book reviews, each rated on a scale
of 1 to 5 stars. We investigate the properties of the dataset, and present its
statistics. We explore using the dataset for two tasks: (1) sentiment polarity
classification; and (2) ratings classification. Moreover, we provide standard
splits of the dataset into training, validation and testing, for both polarity
and ratings classification, in both balanced and unbalanced settings. We extend
our previous work by performing a comprehensive analysis on the dataset. In
particular, we perform an extended survey of the different classifiers
typically used for the sentiment polarity classification problem. We also
construct a sentiment lexicon from the dataset that contains both single and
compound sentiment words and we explore its effectiveness. We make the dataset
and experimental details publicly available.
| [
{
"version": "v1",
"created": "Tue, 25 Nov 2014 03:48:56 GMT"
},
{
"version": "v2",
"created": "Sun, 3 May 2015 08:35:59 GMT"
}
] | 2015-05-05T00:00:00 | [
[
"Nabil",
"Mahmoud",
""
],
[
"Aly",
"Mohamed",
""
],
[
"Atiya",
"Amir",
""
]
] | TITLE: LABR: A Large Scale Arabic Sentiment Analysis Benchmark
ABSTRACT: We introduce LABR, the largest sentiment analysis dataset to-date for the
Arabic language. It consists of over 63,000 book reviews, each rated on a scale
of 1 to 5 stars. We investigate the properties of the dataset, and present its
statistics. We explore using the dataset for two tasks: (1) sentiment polarity
classification; and (2) ratings classification. Moreover, we provide standard
splits of the dataset into training, validation and testing, for both polarity
and ratings classification, in both balanced and unbalanced settings. We extend
our previous work by performing a comprehensive analysis on the dataset. In
particular, we perform an extended survey of the different classifiers
typically used for the sentiment polarity classification problem. We also
construct a sentiment lexicon from the dataset that contains both single and
compound sentiment words and we explore its effectiveness. We make the dataset
and experimental details publicly available.
| new_dataset | 0.9601 |
1501.06170 | Minsu Cho | Minsu Cho, Suha Kwak, Cordelia Schmid, Jean Ponce | Unsupervised Object Discovery and Localization in the Wild: Part-based
Matching with Bottom-up Region Proposals | CVPR 2015 | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper addresses unsupervised discovery and localization of dominant
objects from a noisy image collection with multiple object classes. The setting
of this problem is fully unsupervised, without even image-level annotations or
any assumption of a single dominant class. This is far more general than
typical colocalization, cosegmentation, or weakly-supervised localization
tasks. We tackle the discovery and localization problem using a part-based
region matching approach: We use off-the-shelf region proposals to form a set
of candidate bounding boxes for objects and object parts. These regions are
efficiently matched across images using a probabilistic Hough transform that
evaluates the confidence for each candidate correspondence considering both
appearance and spatial consistency. Dominant objects are discovered and
localized by comparing the scores of candidate regions and selecting those that
stand out over other regions containing them. Extensive experimental
evaluations on standard benchmarks demonstrate that the proposed approach
significantly outperforms the current state of the art in colocalization, and
achieves robust object discovery in challenging mixed-class datasets.
| [
{
"version": "v1",
"created": "Sun, 25 Jan 2015 15:09:23 GMT"
},
{
"version": "v2",
"created": "Tue, 27 Jan 2015 17:36:52 GMT"
},
{
"version": "v3",
"created": "Mon, 4 May 2015 16:18:58 GMT"
}
] | 2015-05-05T00:00:00 | [
[
"Cho",
"Minsu",
""
],
[
"Kwak",
"Suha",
""
],
[
"Schmid",
"Cordelia",
""
],
[
"Ponce",
"Jean",
""
]
] | TITLE: Unsupervised Object Discovery and Localization in the Wild: Part-based
Matching with Bottom-up Region Proposals
ABSTRACT: This paper addresses unsupervised discovery and localization of dominant
objects from a noisy image collection with multiple object classes. The setting
of this problem is fully unsupervised, without even image-level annotations or
any assumption of a single dominant class. This is far more general than
typical colocalization, cosegmentation, or weakly-supervised localization
tasks. We tackle the discovery and localization problem using a part-based
region matching approach: We use off-the-shelf region proposals to form a set
of candidate bounding boxes for objects and object parts. These regions are
efficiently matched across images using a probabilistic Hough transform that
evaluates the confidence for each candidate correspondence considering both
appearance and spatial consistency. Dominant objects are discovered and
localized by comparing the scores of candidate regions and selecting those that
stand out over other regions containing them. Extensive experimental
evaluations on standard benchmarks demonstrate that the proposed approach
significantly outperforms the current state of the art in colocalization, and
achieves robust object discovery in challenging mixed-class datasets.
| no_new_dataset | 0.951006 |
1504.01044 | Heng Wang | Heng Wang and Zubin Abraham | Concept Drift Detection for Streaming Data | 9 pages, accepted in the International Joint Conference of Neural
Networks 2015 | null | null | null | stat.ML cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Common statistical prediction models often require and assume stationarity in
the data. However, in many practical applications, changes in the relationship
of the response and predictor variables are regularly observed over time,
resulting in the deterioration of the predictive performance of these models.
This paper presents Linear Four Rates (LFR), a framework for detecting these
concept drifts and subsequently identifying the data points that belong to the
new concept (for relearning the model). Unlike conventional concept drift
detection approaches, LFR can be applied to both batch and stream data; is not
limited by the distribution properties of the response variable (e.g., datasets
with imbalanced labels); is independent of the underlying statistical-model;
and uses user-specified parameters that are intuitively comprehensible. The
performance of LFR is compared to benchmark approaches using both simulated and
commonly used public datasets that span the gamut of concept drift types. The
results show LFR significantly outperforms benchmark approaches in terms of
recall, accuracy and delay in detection of concept drifts across datasets.
| [
{
"version": "v1",
"created": "Sat, 4 Apr 2015 19:55:35 GMT"
},
{
"version": "v2",
"created": "Sun, 3 May 2015 22:11:21 GMT"
}
] | 2015-05-05T00:00:00 | [
[
"Wang",
"Heng",
""
],
[
"Abraham",
"Zubin",
""
]
] | TITLE: Concept Drift Detection for Streaming Data
ABSTRACT: Common statistical prediction models often require and assume stationarity in
the data. However, in many practical applications, changes in the relationship
of the response and predictor variables are regularly observed over time,
resulting in the deterioration of the predictive performance of these models.
This paper presents Linear Four Rates (LFR), a framework for detecting these
concept drifts and subsequently identifying the data points that belong to the
new concept (for relearning the model). Unlike conventional concept drift
detection approaches, LFR can be applied to both batch and stream data; is not
limited by the distribution properties of the response variable (e.g., datasets
with imbalanced labels); is independent of the underlying statistical-model;
and uses user-specified parameters that are intuitively comprehensible. The
performance of LFR is compared to benchmark approaches using both simulated and
commonly used public datasets that span the gamut of concept drift types. The
results show LFR significantly outperforms benchmark approaches in terms of
recall, accuracy and delay in detection of concept drifts across datasets.
| no_new_dataset | 0.953319 |
1504.08168 | Jan \v{Z}egklitz | Jan \v{Z}egklitz and Petr Po\v{s}\'ik | Model Selection and Overfitting in Genetic Programming: Empirical Study
[Extended Version] | 8 pages, 12 figures, full paper for GECCO 2015 (accepted as poster,
this is the original paper submitted to the conference); added subtitle and
removed copyright text at the first page, fixed some typography | null | null | null | cs.NE cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Genetic Programming has been very successful in solving a large area of
problems but its use as a machine learning algorithm has been limited so far.
One of the reasons is the problem of overfitting which cannot be solved or
suppresed as easily as in more traditional approaches. Another problem, closely
related to overfitting, is the selection of the final model from the
population.
In this article we present our research that addresses both problems:
overfitting and model selection. We compare several ways of dealing with
ovefitting, based on Random Sampling Technique (RST) and on using a validation
set, all with an emphasis on model selection. We subject each approach to a
thorough testing on artificial and real--world datasets and compare them with
the standard approach, which uses the full training data, as a baseline.
| [
{
"version": "v1",
"created": "Thu, 30 Apr 2015 11:12:52 GMT"
},
{
"version": "v2",
"created": "Mon, 4 May 2015 14:29:34 GMT"
}
] | 2015-05-05T00:00:00 | [
[
"Žegklitz",
"Jan",
""
],
[
"Pošík",
"Petr",
""
]
] | TITLE: Model Selection and Overfitting in Genetic Programming: Empirical Study
[Extended Version]
ABSTRACT: Genetic Programming has been very successful in solving a large area of
problems but its use as a machine learning algorithm has been limited so far.
One of the reasons is the problem of overfitting which cannot be solved or
suppresed as easily as in more traditional approaches. Another problem, closely
related to overfitting, is the selection of the final model from the
population.
In this article we present our research that addresses both problems:
overfitting and model selection. We compare several ways of dealing with
ovefitting, based on Random Sampling Technique (RST) and on using a validation
set, all with an emphasis on model selection. We subject each approach to a
thorough testing on artificial and real--world datasets and compare them with
the standard approach, which uses the full training data, as a baseline.
| no_new_dataset | 0.947914 |
1505.00276 | Peng Wang | Peng Wang, Xiaohui Shen, Zhe Lin, Scott Cohen, Brian Price, Alan
Yuille | Joint Object and Part Segmentation using Deep Learned Potentials | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Segmenting semantic objects from images and parsing them into their
respective semantic parts are fundamental steps towards detailed object
understanding in computer vision. In this paper, we propose a joint solution
that tackles semantic object and part segmentation simultaneously, in which
higher object-level context is provided to guide part segmentation, and more
detailed part-level localization is utilized to refine object segmentation.
Specifically, we first introduce the concept of semantic compositional parts
(SCP) in which similar semantic parts are grouped and shared among different
objects. A two-channel fully convolutional network (FCN) is then trained to
provide the SCP and object potentials at each pixel. At the same time, a
compact set of segments can also be obtained from the SCP predictions of the
network. Given the potentials and the generated segments, in order to explore
long-range context, we finally construct an efficient fully connected
conditional random field (FCRF) to jointly predict the final object and part
labels. Extensive evaluation on three different datasets shows that our
approach can mutually enhance the performance of object and part segmentation,
and outperforms the current state-of-the-art on both tasks.
| [
{
"version": "v1",
"created": "Fri, 1 May 2015 20:35:24 GMT"
}
] | 2015-05-05T00:00:00 | [
[
"Wang",
"Peng",
""
],
[
"Shen",
"Xiaohui",
""
],
[
"Lin",
"Zhe",
""
],
[
"Cohen",
"Scott",
""
],
[
"Price",
"Brian",
""
],
[
"Yuille",
"Alan",
""
]
] | TITLE: Joint Object and Part Segmentation using Deep Learned Potentials
ABSTRACT: Segmenting semantic objects from images and parsing them into their
respective semantic parts are fundamental steps towards detailed object
understanding in computer vision. In this paper, we propose a joint solution
that tackles semantic object and part segmentation simultaneously, in which
higher object-level context is provided to guide part segmentation, and more
detailed part-level localization is utilized to refine object segmentation.
Specifically, we first introduce the concept of semantic compositional parts
(SCP) in which similar semantic parts are grouped and shared among different
objects. A two-channel fully convolutional network (FCN) is then trained to
provide the SCP and object potentials at each pixel. At the same time, a
compact set of segments can also be obtained from the SCP predictions of the
network. Given the potentials and the generated segments, in order to explore
long-range context, we finally construct an efficient fully connected
conditional random field (FCRF) to jointly predict the final object and part
labels. Extensive evaluation on three different datasets shows that our
approach can mutually enhance the performance of object and part segmentation,
and outperforms the current state-of-the-art on both tasks.
| no_new_dataset | 0.947332 |
1505.00277 | Dana Movshovitz-Attias | Dana Movshovitz-Attias, William W. Cohen | Grounded Discovery of Coordinate Term Relationships between Software
Entities | null | null | null | null | cs.CL cs.AI cs.LG cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present an approach for the detection of coordinate-term relationships
between entities from the software domain, that refer to Java classes. Usually,
relations are found by examining corpus statistics associated with text
entities. In some technical domains, however, we have access to additional
information about the real-world objects named by the entities, suggesting that
coupling information about the "grounded" entities with corpus statistics might
lead to improved methods for relation discovery. To this end, we develop a
similarity measure for Java classes using distributional information about how
they are used in software, which we combine with corpus statistics on the
distribution of contexts in which the classes appear in text. Using our
approach, cross-validation accuracy on this dataset can be improved
dramatically, from around 60% to 88%. Human labeling results show that our
classifier has an F1 score of 86% over the top 1000 predicted pairs.
| [
{
"version": "v1",
"created": "Fri, 1 May 2015 20:40:00 GMT"
}
] | 2015-05-05T00:00:00 | [
[
"Movshovitz-Attias",
"Dana",
""
],
[
"Cohen",
"William W.",
""
]
] | TITLE: Grounded Discovery of Coordinate Term Relationships between Software
Entities
ABSTRACT: We present an approach for the detection of coordinate-term relationships
between entities from the software domain, that refer to Java classes. Usually,
relations are found by examining corpus statistics associated with text
entities. In some technical domains, however, we have access to additional
information about the real-world objects named by the entities, suggesting that
coupling information about the "grounded" entities with corpus statistics might
lead to improved methods for relation discovery. To this end, we develop a
similarity measure for Java classes using distributional information about how
they are used in software, which we combine with corpus statistics on the
distribution of contexts in which the classes appear in text. Using our
approach, cross-validation accuracy on this dataset can be improved
dramatically, from around 60% to 88%. Human labeling results show that our
classifier has an F1 score of 86% over the top 1000 predicted pairs.
| no_new_dataset | 0.944125 |
1505.00308 | Tejaswi Nimmagadda | Tejaswi Nimmagadda and Anima Anandkumar | Multi-Object Classification and Unsupervised Scene Understanding Using
Deep Learning Features and Latent Tree Probabilistic Models | null | null | null | null | cs.CV cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Deep learning has shown state-of-art classification performance on datasets
such as ImageNet, which contain a single object in each image. However,
multi-object classification is far more challenging. We present a unified
framework which leverages the strengths of multiple machine learning methods,
viz deep learning, probabilistic models and kernel methods to obtain
state-of-art performance on Microsoft COCO, consisting of non-iconic images. We
incorporate contextual information in natural images through a conditional
latent tree probabilistic model (CLTM), where the object co-occurrences are
conditioned on the extracted fc7 features from pre-trained Imagenet CNN as
input. We learn the CLTM tree structure using conditional pairwise
probabilities for object co-occurrences, estimated through kernel methods, and
we learn its node and edge potentials by training a new 3-layer neural network,
which takes fc7 features as input. Object classification is carried out via
inference on the learnt conditional tree model, and we obtain significant gain
in precision-recall and F-measures on MS-COCO, especially for difficult object
categories. Moreover, the latent variables in the CLTM capture scene
information: the images with top activations for a latent node have common
themes such as being a grasslands or a food scene, and on on. In addition, we
show that a simple k-means clustering of the inferred latent nodes alone
significantly improves scene classification performance on the MIT-Indoor
dataset, without the need for any retraining, and without using scene labels
during training. Thus, we present a unified framework for multi-object
classification and unsupervised scene understanding.
| [
{
"version": "v1",
"created": "Sat, 2 May 2015 03:23:46 GMT"
}
] | 2015-05-05T00:00:00 | [
[
"Nimmagadda",
"Tejaswi",
""
],
[
"Anandkumar",
"Anima",
""
]
] | TITLE: Multi-Object Classification and Unsupervised Scene Understanding Using
Deep Learning Features and Latent Tree Probabilistic Models
ABSTRACT: Deep learning has shown state-of-art classification performance on datasets
such as ImageNet, which contain a single object in each image. However,
multi-object classification is far more challenging. We present a unified
framework which leverages the strengths of multiple machine learning methods,
viz deep learning, probabilistic models and kernel methods to obtain
state-of-art performance on Microsoft COCO, consisting of non-iconic images. We
incorporate contextual information in natural images through a conditional
latent tree probabilistic model (CLTM), where the object co-occurrences are
conditioned on the extracted fc7 features from pre-trained Imagenet CNN as
input. We learn the CLTM tree structure using conditional pairwise
probabilities for object co-occurrences, estimated through kernel methods, and
we learn its node and edge potentials by training a new 3-layer neural network,
which takes fc7 features as input. Object classification is carried out via
inference on the learnt conditional tree model, and we obtain significant gain
in precision-recall and F-measures on MS-COCO, especially for difficult object
categories. Moreover, the latent variables in the CLTM capture scene
information: the images with top activations for a latent node have common
themes such as being a grasslands or a food scene, and on on. In addition, we
show that a simple k-means clustering of the inferred latent nodes alone
significantly improves scene classification performance on the MIT-Indoor
dataset, without the need for any retraining, and without using scene labels
during training. Thus, we present a unified framework for multi-object
classification and unsupervised scene understanding.
| no_new_dataset | 0.954942 |
1505.00423 | Josif Grabocka | Josif Grabocka and Nicolas Schilling and Lars Schmidt-Thieme | Optimal Time-Series Motifs | Submitted to KDD2015 | null | null | null | cs.AI cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Motifs are the most repetitive/frequent patterns of a time-series. The
discovery of motifs is crucial for practitioners in order to understand and
interpret the phenomena occurring in sequential data. Currently, motifs are
searched among series sub-sequences, aiming at selecting the most frequently
occurring ones. Search-based methods, which try out series sub-sequence as
motif candidates, are currently believed to be the best methods in finding the
most frequent patterns.
However, this paper proposes an entirely new perspective in finding motifs.
We demonstrate that searching is non-optimal since the domain of motifs is
restricted, and instead we propose a principled optimization approach able to
find optimal motifs. We treat the occurrence frequency as a function and
time-series motifs as its parameters, therefore we \textit{learn} the optimal
motifs that maximize the frequency function. In contrast to searching, our
method is able to discover the most repetitive patterns (hence optimal), even
in cases where they do not explicitly occur as sub-sequences. Experiments on
several real-life time-series datasets show that the motifs found by our method
are highly more frequent than the ones found through searching, for exactly the
same distance threshold.
| [
{
"version": "v1",
"created": "Sun, 3 May 2015 12:11:43 GMT"
}
] | 2015-05-05T00:00:00 | [
[
"Grabocka",
"Josif",
""
],
[
"Schilling",
"Nicolas",
""
],
[
"Schmidt-Thieme",
"Lars",
""
]
] | TITLE: Optimal Time-Series Motifs
ABSTRACT: Motifs are the most repetitive/frequent patterns of a time-series. The
discovery of motifs is crucial for practitioners in order to understand and
interpret the phenomena occurring in sequential data. Currently, motifs are
searched among series sub-sequences, aiming at selecting the most frequently
occurring ones. Search-based methods, which try out series sub-sequence as
motif candidates, are currently believed to be the best methods in finding the
most frequent patterns.
However, this paper proposes an entirely new perspective in finding motifs.
We demonstrate that searching is non-optimal since the domain of motifs is
restricted, and instead we propose a principled optimization approach able to
find optimal motifs. We treat the occurrence frequency as a function and
time-series motifs as its parameters, therefore we \textit{learn} the optimal
motifs that maximize the frequency function. In contrast to searching, our
method is able to discover the most repetitive patterns (hence optimal), even
in cases where they do not explicitly occur as sub-sequences. Experiments on
several real-life time-series datasets show that the motifs found by our method
are highly more frequent than the ones found through searching, for exactly the
same distance threshold.
| no_new_dataset | 0.955651 |
1505.00519 | Cameron Summers | Cameron Summers and Phillip Popp | Large Scale Discovery of Seasonal Music From User Data | 4 pages, 1 figure | null | null | null | cs.IR cs.MM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The consumption history of online media content such as music and video
offers a rich source of data from which to mine information. Trends in this
data are of particular interest because they reflect user preferences as well
as associated cultural contexts that can be exploited in systems such as
recommendation or search. This paper classifies songs as seasonal using a
large, real-world dataset of user listening data. Results show strong
performance of classification of Christmas music with Gaussian Mixture Models.
| [
{
"version": "v1",
"created": "Mon, 4 May 2015 03:38:04 GMT"
}
] | 2015-05-05T00:00:00 | [
[
"Summers",
"Cameron",
""
],
[
"Popp",
"Phillip",
""
]
] | TITLE: Large Scale Discovery of Seasonal Music From User Data
ABSTRACT: The consumption history of online media content such as music and video
offers a rich source of data from which to mine information. Trends in this
data are of particular interest because they reflect user preferences as well
as associated cultural contexts that can be exploited in systems such as
recommendation or search. This paper classifies songs as seasonal using a
large, real-world dataset of user listening data. Results show strong
performance of classification of Christmas music with Gaussian Mixture Models.
| no_new_dataset | 0.91708 |
1505.00693 | Sebastian Schlag | Vitali Henne, Henning Meyerhenke, Peter Sanders, Sebastian Schlag,
Christian Schulz | n-Level Hypergraph Partitioning | null | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We develop a multilevel algorithm for hypergraph partitioning that contracts
the vertices one at a time and thus allows very high quality. This includes a
rating function that avoids nonuniform vertex weights, an efficient
"semi-dynamic" hypergraph data structure, a very fast coarsening algorithm, and
two new local search algorithms. One is a $k$-way hypergraph adaptation of
Fiduccia-Mattheyses local search and gives high quality at reasonable cost. The
other is an adaptation of size-constrained label propagation to hypergraphs.
Comparisons with hMetis and PaToH indicate that the new algorithm yields better
quality over several benchmark sets and has a running time that is comparable
to hMetis. Using label propagation local search is several times faster than
hMetis and gives better quality than PaToH for a VLSI benchmark set.
| [
{
"version": "v1",
"created": "Mon, 4 May 2015 16:13:11 GMT"
}
] | 2015-05-05T00:00:00 | [
[
"Henne",
"Vitali",
""
],
[
"Meyerhenke",
"Henning",
""
],
[
"Sanders",
"Peter",
""
],
[
"Schlag",
"Sebastian",
""
],
[
"Schulz",
"Christian",
""
]
] | TITLE: n-Level Hypergraph Partitioning
ABSTRACT: We develop a multilevel algorithm for hypergraph partitioning that contracts
the vertices one at a time and thus allows very high quality. This includes a
rating function that avoids nonuniform vertex weights, an efficient
"semi-dynamic" hypergraph data structure, a very fast coarsening algorithm, and
two new local search algorithms. One is a $k$-way hypergraph adaptation of
Fiduccia-Mattheyses local search and gives high quality at reasonable cost. The
other is an adaptation of size-constrained label propagation to hypergraphs.
Comparisons with hMetis and PaToH indicate that the new algorithm yields better
quality over several benchmark sets and has a running time that is comparable
to hMetis. Using label propagation local search is several times faster than
hMetis and gives better quality than PaToH for a VLSI benchmark set.
| no_new_dataset | 0.951818 |
1505.00720 | Vasilis Syrgkanis | Denis Nekipelov, Vasilis Syrgkanis, Eva Tardos | Econometrics for Learning Agents | null | null | null | null | cs.GT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The main goal of this paper is to develop a theory of inference of player
valuations from observed data in the generalized second price auction without
relying on the Nash equilibrium assumption. Existing work in Economics on
inferring agent values from data relies on the assumption that all participant
strategies are best responses of the observed play of other players, i.e. they
constitute a Nash equilibrium. In this paper, we show how to perform inference
relying on a weaker assumption instead: assuming that players are using some
form of no-regret learning. Learning outcomes emerged in recent years as an
attractive alternative to Nash equilibrium in analyzing game outcomes, modeling
players who haven't reached a stable equilibrium, but rather use algorithmic
learning, aiming to learn the best way to play from previous observations. In
this paper we show how to infer values of players who use algorithmic learning
strategies. Such inference is an important first step before we move to testing
any learning theoretic behavioral model on auction data. We apply our
techniques to a dataset from Microsoft's sponsored search ad auction system.
| [
{
"version": "v1",
"created": "Mon, 4 May 2015 17:28:47 GMT"
}
] | 2015-05-05T00:00:00 | [
[
"Nekipelov",
"Denis",
""
],
[
"Syrgkanis",
"Vasilis",
""
],
[
"Tardos",
"Eva",
""
]
] | TITLE: Econometrics for Learning Agents
ABSTRACT: The main goal of this paper is to develop a theory of inference of player
valuations from observed data in the generalized second price auction without
relying on the Nash equilibrium assumption. Existing work in Economics on
inferring agent values from data relies on the assumption that all participant
strategies are best responses of the observed play of other players, i.e. they
constitute a Nash equilibrium. In this paper, we show how to perform inference
relying on a weaker assumption instead: assuming that players are using some
form of no-regret learning. Learning outcomes emerged in recent years as an
attractive alternative to Nash equilibrium in analyzing game outcomes, modeling
players who haven't reached a stable equilibrium, but rather use algorithmic
learning, aiming to learn the best way to play from previous observations. In
this paper we show how to infer values of players who use algorithmic learning
strategies. Such inference is an important first step before we move to testing
any learning theoretic behavioral model on auction data. We apply our
techniques to a dataset from Microsoft's sponsored search ad auction system.
| no_new_dataset | 0.94868 |
1410.2834 | Ubiratam de Paula Junior | Ubiratam de Paula Junior, L\'ucia M. A. Drummond, Daniel de Oliveira,
Yuri Frota, Valmir C. Barbosa | Handling Flash-Crowd Events to Improve the Performance of Web
Applications | Submitted to the 30th Symposium On Applied Computing (2015) | Proceedings of the 30th ACM/SIGAPP Symposium on Applied Computing,
769-774, 2015 | 10.1145/2695664.2695839 | null | cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Cloud computing can offer a set of computing resources according to users'
demand. It is suitable to be used to handle flash-crowd events in Web
applications due to its elasticity and on-demand characteristics. Thus, when
Web applications need more computing or storage capacity, they just instantiate
new resources. However, providers have to estimate the amount of resources to
instantiate to handle with the flash-crowd event. This estimation is far from
trivial since each cloud environment provides several kinds of heterogeneous
resources, each one with its own characteristics such as bandwidth, CPU, memory
and financial cost. In this paper, the Flash Crowd Handling Problem (FCHP) is
precisely defined and formulated as an integer programming problem. A new
algorithm for handling with a flash crowd named FCHP-ILS is also proposed. With
FCHP-ILS the Web applications can replicate contents in the already
instantiated resources and define the types and amount of resources to
instantiate in the cloud during a flash crowd. Our approach is evaluated
considering real flash crowd traces obtained from the related literature. We
also present a case study, based on a synthetic dataset representing
flash-crowd events in small scenarios aiming at the comparison of the proposed
approach against Amazon's Auto-Scale mechanism.
| [
{
"version": "v1",
"created": "Fri, 10 Oct 2014 16:36:09 GMT"
}
] | 2015-05-04T00:00:00 | [
[
"Junior",
"Ubiratam de Paula",
""
],
[
"Drummond",
"Lúcia M. A.",
""
],
[
"de Oliveira",
"Daniel",
""
],
[
"Frota",
"Yuri",
""
],
[
"Barbosa",
"Valmir C.",
""
]
] | TITLE: Handling Flash-Crowd Events to Improve the Performance of Web
Applications
ABSTRACT: Cloud computing can offer a set of computing resources according to users'
demand. It is suitable to be used to handle flash-crowd events in Web
applications due to its elasticity and on-demand characteristics. Thus, when
Web applications need more computing or storage capacity, they just instantiate
new resources. However, providers have to estimate the amount of resources to
instantiate to handle with the flash-crowd event. This estimation is far from
trivial since each cloud environment provides several kinds of heterogeneous
resources, each one with its own characteristics such as bandwidth, CPU, memory
and financial cost. In this paper, the Flash Crowd Handling Problem (FCHP) is
precisely defined and formulated as an integer programming problem. A new
algorithm for handling with a flash crowd named FCHP-ILS is also proposed. With
FCHP-ILS the Web applications can replicate contents in the already
instantiated resources and define the types and amount of resources to
instantiate in the cloud during a flash crowd. Our approach is evaluated
considering real flash crowd traces obtained from the related literature. We
also present a case study, based on a synthetic dataset representing
flash-crowd events in small scenarios aiming at the comparison of the proposed
approach against Amazon's Auto-Scale mechanism.
| new_dataset | 0.712482 |
1412.6623 | Luke Vilnis | Luke Vilnis, Andrew McCallum | Word Representations via Gaussian Embedding | 12 pages, published as conference paper at ICLR 2015 | null | null | null | cs.CL cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Current work in lexical distributed representations maps each word to a point
vector in low-dimensional space. Mapping instead to a density provides many
interesting advantages, including better capturing uncertainty about a
representation and its relationships, expressing asymmetries more naturally
than dot product or cosine similarity, and enabling more expressive
parameterization of decision boundaries. This paper advocates for density-based
distributed embeddings and presents a method for learning representations in
the space of Gaussian distributions. We compare performance on various word
embedding benchmarks, investigate the ability of these embeddings to model
entailment and other asymmetric relationships, and explore novel properties of
the representation.
| [
{
"version": "v1",
"created": "Sat, 20 Dec 2014 07:42:40 GMT"
},
{
"version": "v2",
"created": "Tue, 10 Mar 2015 14:24:28 GMT"
},
{
"version": "v3",
"created": "Thu, 23 Apr 2015 18:19:11 GMT"
},
{
"version": "v4",
"created": "Fri, 1 May 2015 10:14:58 GMT"
}
] | 2015-05-04T00:00:00 | [
[
"Vilnis",
"Luke",
""
],
[
"McCallum",
"Andrew",
""
]
] | TITLE: Word Representations via Gaussian Embedding
ABSTRACT: Current work in lexical distributed representations maps each word to a point
vector in low-dimensional space. Mapping instead to a density provides many
interesting advantages, including better capturing uncertainty about a
representation and its relationships, expressing asymmetries more naturally
than dot product or cosine similarity, and enabling more expressive
parameterization of decision boundaries. This paper advocates for density-based
distributed embeddings and presents a method for learning representations in
the space of Gaussian distributions. We compare performance on various word
embedding benchmarks, investigate the ability of these embeddings to model
entailment and other asymmetric relationships, and explore novel properties of
the representation.
| no_new_dataset | 0.950088 |
1504.08175 | Jo\~ao Vinagre | Jo\~ao Vinagre, Al\'ipio M\'ario Jorge, Jo\~ao Gama | Evaluation of recommender systems in streaming environments | Workshop on 'Recommender Systems Evaluation: Dimensions and Design'
(REDD 2014), held in conjunction with RecSys 2014. October 10, 2014, Silicon
Valley, United States | null | 10.13140/2.1.4381.5367 | null | cs.IR | http://creativecommons.org/licenses/by-nc-sa/3.0/ | Evaluation of recommender systems is typically done with finite datasets.
This means that conventional evaluation methodologies are only applicable in
offline experiments, where data and models are stationary. However, in real
world systems, user feedback is continuously generated, at unpredictable rates.
Given this setting, one important issue is how to evaluate algorithms in such a
streaming data environment. In this paper we propose a prequential evaluation
protocol for recommender systems, suitable for streaming data environments, but
also applicable in stationary settings. Using this protocol we are able to
monitor the evolution of algorithms' accuracy over time. Furthermore, we are
able to perform reliable comparative assessments of algorithms by computing
significance tests over a sliding window. We argue that besides being suitable
for streaming data, prequential evaluation allows the detection of phenomena
that would otherwise remain unnoticed in the evaluation of both offline and
online recommender systems.
| [
{
"version": "v1",
"created": "Thu, 30 Apr 2015 11:41:49 GMT"
}
] | 2015-05-04T00:00:00 | [
[
"Vinagre",
"João",
""
],
[
"Jorge",
"Alípio Mário",
""
],
[
"Gama",
"João",
""
]
] | TITLE: Evaluation of recommender systems in streaming environments
ABSTRACT: Evaluation of recommender systems is typically done with finite datasets.
This means that conventional evaluation methodologies are only applicable in
offline experiments, where data and models are stationary. However, in real
world systems, user feedback is continuously generated, at unpredictable rates.
Given this setting, one important issue is how to evaluate algorithms in such a
streaming data environment. In this paper we propose a prequential evaluation
protocol for recommender systems, suitable for streaming data environments, but
also applicable in stationary settings. Using this protocol we are able to
monitor the evolution of algorithms' accuracy over time. Furthermore, we are
able to perform reliable comparative assessments of algorithms by computing
significance tests over a sliding window. We argue that besides being suitable
for streaming data, prequential evaluation allows the detection of phenomena
that would otherwise remain unnoticed in the evaluation of both offline and
online recommender systems.
| no_new_dataset | 0.94743 |
1505.00036 | Yair Zick Dr. | Amit Datta and Anupam Datta and Ariel D. Procaccia and Yair Zick | Influence in Classification via Cooperative Game Theory | accepted to IJCAI 2015 | null | null | null | cs.GT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A dataset has been classified by some unknown classifier into two types of
points. What were the most important factors in determining the classification
outcome? In this work, we employ an axiomatic approach in order to uniquely
characterize an influence measure: a function that, given a set of classified
points, outputs a value for each feature corresponding to its influence in
determining the classification outcome. We show that our influence measure
takes on an intuitive form when the unknown classifier is linear. Finally, we
employ our influence measure in order to analyze the effects of user profiling
on Google's online display advertising.
| [
{
"version": "v1",
"created": "Thu, 30 Apr 2015 21:22:36 GMT"
}
] | 2015-05-04T00:00:00 | [
[
"Datta",
"Amit",
""
],
[
"Datta",
"Anupam",
""
],
[
"Procaccia",
"Ariel D.",
""
],
[
"Zick",
"Yair",
""
]
] | TITLE: Influence in Classification via Cooperative Game Theory
ABSTRACT: A dataset has been classified by some unknown classifier into two types of
points. What were the most important factors in determining the classification
outcome? In this work, we employ an axiomatic approach in order to uniquely
characterize an influence measure: a function that, given a set of classified
points, outputs a value for each feature corresponding to its influence in
determining the classification outcome. We show that our influence measure
takes on an intuitive form when the unknown classifier is linear. Finally, we
employ our influence measure in order to analyze the effects of user profiling
on Google's online display advertising.
| no_new_dataset | 0.949201 |
1505.00043 | Yun Tian | Yun Tian, Bojian Xu, Yanqing Ji, Jesse Scholer | CloudTree: A Library to Extend Cloud Services for Trees | null | null | null | null | cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this work, we propose a library that enables on a cloud the creation and
management of tree data structures from a cloud client. As a proof of concept,
we implement a new cloud service CloudTree. With CloudTree, users are able to
organize big data into tree data structures of their choice that are physically
stored in a cloud. We use caching, prefetching, and aggregation techniques in
the design and implementation of CloudTree to enhance performance. We have
implemented the services of Binary Search Trees (BST) and Prefix Trees as
current members in CloudTree and have benchmarked their performance using the
Amazon Cloud. The idea and techniques in the design and implementation of a BST
and prefix tree is generic and thus can also be used for other types of trees
such as B-tree, and other link-based data structures such as linked lists and
graphs. Preliminary experimental results show that CloudTree is useful and
efficient for various big data applications.
| [
{
"version": "v1",
"created": "Thu, 30 Apr 2015 21:59:29 GMT"
}
] | 2015-05-04T00:00:00 | [
[
"Tian",
"Yun",
""
],
[
"Xu",
"Bojian",
""
],
[
"Ji",
"Yanqing",
""
],
[
"Scholer",
"Jesse",
""
]
] | TITLE: CloudTree: A Library to Extend Cloud Services for Trees
ABSTRACT: In this work, we propose a library that enables on a cloud the creation and
management of tree data structures from a cloud client. As a proof of concept,
we implement a new cloud service CloudTree. With CloudTree, users are able to
organize big data into tree data structures of their choice that are physically
stored in a cloud. We use caching, prefetching, and aggregation techniques in
the design and implementation of CloudTree to enhance performance. We have
implemented the services of Binary Search Trees (BST) and Prefix Trees as
current members in CloudTree and have benchmarked their performance using the
Amazon Cloud. The idea and techniques in the design and implementation of a BST
and prefix tree is generic and thus can also be used for other types of trees
such as B-tree, and other link-based data structures such as linked lists and
graphs. Preliminary experimental results show that CloudTree is useful and
efficient for various big data applications.
| no_new_dataset | 0.949576 |
1505.00075 | Shaoqiu Zheng | Shaoqiu Zheng, Junzhi Li, Andreas Janecek, Ying Tan | A Cooperative Framework for Fireworks Algorithm | null | null | null | null | cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper presents a cooperative framework for fireworks algorithm (CoFFWA).
A detailed analysis of existing fireworks algorithm (FWA) and its recently
developed variants has revealed that (i) the selection strategy lead to the
contribution of the firework with the best fitness (core firework) for the
optimization overwhelms the contributions of the rest of fireworks (non-core
fireworks) in the explosion operator, (ii) the Gaussian mutation operator is
not as effective as it is designed to be. To overcome these limitations, the
CoFFWA is proposed, which can greatly enhance the exploitation ability of
non-core fireworks by using independent selection operator and increase the
exploration capacity by crowdness-avoiding cooperative strategy among the
fireworks. Experimental results on the CEC2013 benchmark functions suggest that
CoFFWA outperforms the state-of-the-art FWA variants, artificial bee colony,
differential evolution, the standard particle swarm optimization (SPSO) in 2007
and the most recent SPSO in 2011 in term of convergence performance.
| [
{
"version": "v1",
"created": "Fri, 1 May 2015 02:56:42 GMT"
}
] | 2015-05-04T00:00:00 | [
[
"Zheng",
"Shaoqiu",
""
],
[
"Li",
"Junzhi",
""
],
[
"Janecek",
"Andreas",
""
],
[
"Tan",
"Ying",
""
]
] | TITLE: A Cooperative Framework for Fireworks Algorithm
ABSTRACT: This paper presents a cooperative framework for fireworks algorithm (CoFFWA).
A detailed analysis of existing fireworks algorithm (FWA) and its recently
developed variants has revealed that (i) the selection strategy lead to the
contribution of the firework with the best fitness (core firework) for the
optimization overwhelms the contributions of the rest of fireworks (non-core
fireworks) in the explosion operator, (ii) the Gaussian mutation operator is
not as effective as it is designed to be. To overcome these limitations, the
CoFFWA is proposed, which can greatly enhance the exploitation ability of
non-core fireworks by using independent selection operator and increase the
exploration capacity by crowdness-avoiding cooperative strategy among the
fireworks. Experimental results on the CEC2013 benchmark functions suggest that
CoFFWA outperforms the state-of-the-art FWA variants, artificial bee colony,
differential evolution, the standard particle swarm optimization (SPSO) in 2007
and the most recent SPSO in 2011 in term of convergence performance.
| no_new_dataset | 0.948058 |
1505.00110 | Peter Hall | Hongping Cai and Qi Wu and Tadeo Corradi and Peter Hall | The Cross-Depiction Problem: Computer Vision Algorithms for Recognising
Objects in Artwork and in Photographs | 12 pages, 6 figures | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The cross-depiction problem is that of recognising visual objects regardless
of whether they are photographed, painted, drawn, etc. It is a potentially
significant yet under-researched problem. Emulating the remarkable human
ability to recognise objects in an astonishingly wide variety of depictive
forms is likely to advance both the foundations and the applications of
Computer Vision.
In this paper we benchmark classification, domain adaptation, and deep
learning methods; demonstrating that none perform consistently well in the
cross-depiction problem. Given the current interest in deep learning, the fact
such methods exhibit the same behaviour as all but one other method: they show
a significant fall in performance over inhomogeneous databases compared to
their peak performance, which is always over data comprising photographs only.
Rather, we find the methods that have strong models of spatial relations
between parts tend to be more robust and therefore conclude that such
information is important in modelling object classes regardless of appearance
details.
| [
{
"version": "v1",
"created": "Fri, 1 May 2015 07:38:52 GMT"
}
] | 2015-05-04T00:00:00 | [
[
"Cai",
"Hongping",
""
],
[
"Wu",
"Qi",
""
],
[
"Corradi",
"Tadeo",
""
],
[
"Hall",
"Peter",
""
]
] | TITLE: The Cross-Depiction Problem: Computer Vision Algorithms for Recognising
Objects in Artwork and in Photographs
ABSTRACT: The cross-depiction problem is that of recognising visual objects regardless
of whether they are photographed, painted, drawn, etc. It is a potentially
significant yet under-researched problem. Emulating the remarkable human
ability to recognise objects in an astonishingly wide variety of depictive
forms is likely to advance both the foundations and the applications of
Computer Vision.
In this paper we benchmark classification, domain adaptation, and deep
learning methods; demonstrating that none perform consistently well in the
cross-depiction problem. Given the current interest in deep learning, the fact
such methods exhibit the same behaviour as all but one other method: they show
a significant fall in performance over inhomogeneous databases compared to
their peak performance, which is always over data comprising photographs only.
Rather, we find the methods that have strong models of spatial relations
between parts tend to be more robust and therefore conclude that such
information is important in modelling object classes regardless of appearance
details.
| no_new_dataset | 0.940572 |
1505.00161 | Danushka Bollegala | Danushka Bollegala, Takanori Maehara, Ken-ichi Kawarabayashi | Embedding Semantic Relations into Word Representations | International Joint Conferences in AI (IJCAI) 2015 | null | null | null | cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Learning representations for semantic relations is important for various
tasks such as analogy detection, relational search, and relation
classification. Although there have been several proposals for learning
representations for individual words, learning word representations that
explicitly capture the semantic relations between words remains under
developed. We propose an unsupervised method for learning vector
representations for words such that the learnt representations are sensitive to
the semantic relations that exist between two words. First, we extract lexical
patterns from the co-occurrence contexts of two words in a corpus to represent
the semantic relations that exist between those two words. Second, we represent
a lexical pattern as the weighted sum of the representations of the words that
co-occur with that lexical pattern. Third, we train a binary classifier to
detect relationally similar vs. non-similar lexical pattern pairs. The proposed
method is unsupervised in the sense that the lexical pattern pairs we use as
train data are automatically sampled from a corpus, without requiring any
manual intervention. Our proposed method statistically significantly
outperforms the current state-of-the-art word representations on three
benchmark datasets for proportional analogy detection, demonstrating its
ability to accurately capture the semantic relations among words.
| [
{
"version": "v1",
"created": "Fri, 1 May 2015 11:43:34 GMT"
}
] | 2015-05-04T00:00:00 | [
[
"Bollegala",
"Danushka",
""
],
[
"Maehara",
"Takanori",
""
],
[
"Kawarabayashi",
"Ken-ichi",
""
]
] | TITLE: Embedding Semantic Relations into Word Representations
ABSTRACT: Learning representations for semantic relations is important for various
tasks such as analogy detection, relational search, and relation
classification. Although there have been several proposals for learning
representations for individual words, learning word representations that
explicitly capture the semantic relations between words remains under
developed. We propose an unsupervised method for learning vector
representations for words such that the learnt representations are sensitive to
the semantic relations that exist between two words. First, we extract lexical
patterns from the co-occurrence contexts of two words in a corpus to represent
the semantic relations that exist between those two words. Second, we represent
a lexical pattern as the weighted sum of the representations of the words that
co-occur with that lexical pattern. Third, we train a binary classifier to
detect relationally similar vs. non-similar lexical pattern pairs. The proposed
method is unsupervised in the sense that the lexical pattern pairs we use as
train data are automatically sampled from a corpus, without requiring any
manual intervention. Our proposed method statistically significantly
outperforms the current state-of-the-art word representations on three
benchmark datasets for proportional analogy detection, demonstrating its
ability to accurately capture the semantic relations among words.
| no_new_dataset | 0.945197 |
1412.4729 | Subhashini Venugopalan | Subhashini Venugopalan, Huijuan Xu, Jeff Donahue, Marcus Rohrbach,
Raymond Mooney, Kate Saenko | Translating Videos to Natural Language Using Deep Recurrent Neural
Networks | NAACL-HLT 2015 camera ready | null | null | null | cs.CV cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Solving the visual symbol grounding problem has long been a goal of
artificial intelligence. The field appears to be advancing closer to this goal
with recent breakthroughs in deep learning for natural language grounding in
static images. In this paper, we propose to translate videos directly to
sentences using a unified deep neural network with both convolutional and
recurrent structure. Described video datasets are scarce, and most existing
methods have been applied to toy domains with a small vocabulary of possible
words. By transferring knowledge from 1.2M+ images with category labels and
100,000+ images with captions, our method is able to create sentence
descriptions of open-domain videos with large vocabularies. We compare our
approach with recent work using language generation metrics, subject, verb, and
object prediction accuracy, and a human evaluation.
| [
{
"version": "v1",
"created": "Mon, 15 Dec 2014 19:21:50 GMT"
},
{
"version": "v2",
"created": "Fri, 19 Dec 2014 00:58:38 GMT"
},
{
"version": "v3",
"created": "Thu, 30 Apr 2015 04:22:06 GMT"
}
] | 2015-05-01T00:00:00 | [
[
"Venugopalan",
"Subhashini",
""
],
[
"Xu",
"Huijuan",
""
],
[
"Donahue",
"Jeff",
""
],
[
"Rohrbach",
"Marcus",
""
],
[
"Mooney",
"Raymond",
""
],
[
"Saenko",
"Kate",
""
]
] | TITLE: Translating Videos to Natural Language Using Deep Recurrent Neural
Networks
ABSTRACT: Solving the visual symbol grounding problem has long been a goal of
artificial intelligence. The field appears to be advancing closer to this goal
with recent breakthroughs in deep learning for natural language grounding in
static images. In this paper, we propose to translate videos directly to
sentences using a unified deep neural network with both convolutional and
recurrent structure. Described video datasets are scarce, and most existing
methods have been applied to toy domains with a small vocabulary of possible
words. By transferring knowledge from 1.2M+ images with category labels and
100,000+ images with captions, our method is able to create sentence
descriptions of open-domain videos with large vocabularies. We compare our
approach with recent work using language generation metrics, subject, verb, and
object prediction accuracy, and a human evaluation.
| no_new_dataset | 0.951278 |
1504.05133 | Joe Yue-Hei Ng | Joe Yue-Hei Ng, Fan Yang, Larry S. Davis | Exploiting Local Features from Deep Networks for Image Retrieval | CVPR DeepVision Workshop 2015 | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Deep convolutional neural networks have been successfully applied to image
classification tasks. When these same networks have been applied to image
retrieval, the assumption has been made that the last layers would give the
best performance, as they do in classification. We show that for instance-level
image retrieval, lower layers often perform better than the last layers in
convolutional neural networks. We present an approach for extracting
convolutional features from different layers of the networks, and adopt VLAD
encoding to encode features into a single vector for each image. We investigate
the effect of different layers and scales of input images on the performance of
convolutional features using the recent deep networks OxfordNet and GoogLeNet.
Experiments demonstrate that intermediate layers or higher layers with finer
scales produce better results for image retrieval, compared to the last layer.
When using compressed 128-D VLAD descriptors, our method obtains
state-of-the-art results and outperforms other VLAD and CNN based approaches on
two out of three test datasets. Our work provides guidance for transferring
deep networks trained on image classification to image retrieval tasks.
| [
{
"version": "v1",
"created": "Mon, 20 Apr 2015 17:41:46 GMT"
},
{
"version": "v2",
"created": "Thu, 30 Apr 2015 03:36:25 GMT"
}
] | 2015-05-01T00:00:00 | [
[
"Ng",
"Joe Yue-Hei",
""
],
[
"Yang",
"Fan",
""
],
[
"Davis",
"Larry S.",
""
]
] | TITLE: Exploiting Local Features from Deep Networks for Image Retrieval
ABSTRACT: Deep convolutional neural networks have been successfully applied to image
classification tasks. When these same networks have been applied to image
retrieval, the assumption has been made that the last layers would give the
best performance, as they do in classification. We show that for instance-level
image retrieval, lower layers often perform better than the last layers in
convolutional neural networks. We present an approach for extracting
convolutional features from different layers of the networks, and adopt VLAD
encoding to encode features into a single vector for each image. We investigate
the effect of different layers and scales of input images on the performance of
convolutional features using the recent deep networks OxfordNet and GoogLeNet.
Experiments demonstrate that intermediate layers or higher layers with finer
scales produce better results for image retrieval, compared to the last layer.
When using compressed 128-D VLAD descriptors, our method obtains
state-of-the-art results and outperforms other VLAD and CNN based approaches on
two out of three test datasets. Our work provides guidance for transferring
deep networks trained on image classification to image retrieval tasks.
| no_new_dataset | 0.949389 |
1504.07575 | Oisin Mac Aodha | Edward Johns and Oisin Mac Aodha and Gabriel J. Brostow | Becoming the Expert - Interactive Multi-Class Machine Teaching | CVPR 2015 | null | null | null | cs.CV cs.LG stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Compared to machines, humans are extremely good at classifying images into
categories, especially when they possess prior knowledge of the categories at
hand. If this prior information is not available, supervision in the form of
teaching images is required. To learn categories more quickly, people should
see important and representative images first, followed by less important
images later - or not at all. However, image-importance is individual-specific,
i.e. a teaching image is important to a student if it changes their overall
ability to discriminate between classes. Further, students keep learning, so
while image-importance depends on their current knowledge, it also varies with
time.
In this work we propose an Interactive Machine Teaching algorithm that
enables a computer to teach challenging visual concepts to a human. Our
adaptive algorithm chooses, online, which labeled images from a teaching set
should be shown to the student as they learn. We show that a teaching strategy
that probabilistically models the student's ability and progress, based on
their correct and incorrect answers, produces better 'experts'. We present
results using real human participants across several varied and challenging
real-world datasets.
| [
{
"version": "v1",
"created": "Tue, 28 Apr 2015 17:22:29 GMT"
}
] | 2015-05-01T00:00:00 | [
[
"Johns",
"Edward",
""
],
[
"Mac Aodha",
"Oisin",
""
],
[
"Brostow",
"Gabriel J.",
""
]
] | TITLE: Becoming the Expert - Interactive Multi-Class Machine Teaching
ABSTRACT: Compared to machines, humans are extremely good at classifying images into
categories, especially when they possess prior knowledge of the categories at
hand. If this prior information is not available, supervision in the form of
teaching images is required. To learn categories more quickly, people should
see important and representative images first, followed by less important
images later - or not at all. However, image-importance is individual-specific,
i.e. a teaching image is important to a student if it changes their overall
ability to discriminate between classes. Further, students keep learning, so
while image-importance depends on their current knowledge, it also varies with
time.
In this work we propose an Interactive Machine Teaching algorithm that
enables a computer to teach challenging visual concepts to a human. Our
adaptive algorithm chooses, online, which labeled images from a teaching set
should be shown to the student as they learn. We show that a teaching strategy
that probabilistically models the student's ability and progress, based on
their correct and incorrect answers, produces better 'experts'. We present
results using real human participants across several varied and challenging
real-world datasets.
| no_new_dataset | 0.945147 |
1504.08022 | Hongyu Guo Ph.D | Hongyu Guo, Xiaodan Zhu, Martin Renqiang Min | A Deep Learning Model for Structured Outputs with High-order Interaction | null | null | null | null | cs.LG cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Many real-world applications are associated with structured data, where not
only input but also output has interplay. However, typical classification and
regression models often lack the ability of simultaneously exploring high-order
interaction within input and that within output. In this paper, we present a
deep learning model aiming to generate a powerful nonlinear functional mapping
from structured input to structured output. More specifically, we propose to
integrate high-order hidden units, guided discriminative pretraining, and
high-order auto-encoders for this purpose. We evaluate the model with three
datasets, and obtain state-of-the-art performances among competitive methods.
Our current work focuses on structured output regression, which is a less
explored area, although the model can be extended to handle structured label
classification.
| [
{
"version": "v1",
"created": "Wed, 29 Apr 2015 20:58:52 GMT"
}
] | 2015-05-01T00:00:00 | [
[
"Guo",
"Hongyu",
""
],
[
"Zhu",
"Xiaodan",
""
],
[
"Min",
"Martin Renqiang",
""
]
] | TITLE: A Deep Learning Model for Structured Outputs with High-order Interaction
ABSTRACT: Many real-world applications are associated with structured data, where not
only input but also output has interplay. However, typical classification and
regression models often lack the ability of simultaneously exploring high-order
interaction within input and that within output. In this paper, we present a
deep learning model aiming to generate a powerful nonlinear functional mapping
from structured input to structured output. More specifically, we propose to
integrate high-order hidden units, guided discriminative pretraining, and
high-order auto-encoders for this purpose. We evaluate the model with three
datasets, and obtain state-of-the-art performances among competitive methods.
Our current work focuses on structured output regression, which is a less
explored area, although the model can be extended to handle structured label
classification.
| no_new_dataset | 0.946745 |
1504.08035 | Elmar Peise | Elmar Peise (1), Paolo Bientinesi (1) ((1) AICES, RWTH Aachen) | The ELAPS Framework: Experimental Linear Algebra Performance Studies | Submitted to SC15 | null | null | null | cs.PF cs.MS cs.NA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Optimal use of computing resources requires extensive coding, tuning and
benchmarking. To boost developer productivity in these time consuming tasks, we
introduce the Experimental Linear Algebra Performance Studies framework
(ELAPS), a multi-platform open source environment for fast yet powerful
performance experimentation with dense linear algebra kernels, algorithms, and
libraries. ELAPS allows users to construct experiments to investigate how
performance and efficiency vary depending on factors such as caching,
algorithmic parameters, problem size, and parallelism. Experiments are designed
either through Python scripts or a specialized GUI, and run on the whole
spectrum of architectures, ranging from laptops to clusters, accelerators, and
supercomputers. The resulting experiment reports provide various metrics and
statistics that can be analyzed both numerically and visually. We demonstrate
the use of ELAPS in four concrete application scenarios and in as many
computing environments, illustrating its practical value in supporting critical
performance decisions.
| [
{
"version": "v1",
"created": "Wed, 29 Apr 2015 21:58:50 GMT"
}
] | 2015-05-01T00:00:00 | [
[
"Peise",
"Elmar",
"",
"AICES, RWTH Aachen"
],
[
"Bientinesi",
"Paolo",
"",
"AICES, RWTH Aachen"
]
] | TITLE: The ELAPS Framework: Experimental Linear Algebra Performance Studies
ABSTRACT: Optimal use of computing resources requires extensive coding, tuning and
benchmarking. To boost developer productivity in these time consuming tasks, we
introduce the Experimental Linear Algebra Performance Studies framework
(ELAPS), a multi-platform open source environment for fast yet powerful
performance experimentation with dense linear algebra kernels, algorithms, and
libraries. ELAPS allows users to construct experiments to investigate how
performance and efficiency vary depending on factors such as caching,
algorithmic parameters, problem size, and parallelism. Experiments are designed
either through Python scripts or a specialized GUI, and run on the whole
spectrum of architectures, ranging from laptops to clusters, accelerators, and
supercomputers. The resulting experiment reports provide various metrics and
statistics that can be analyzed both numerically and visually. We demonstrate
the use of ELAPS in four concrete application scenarios and in as many
computing environments, illustrating its practical value in supporting critical
performance decisions.
| no_new_dataset | 0.941654 |
1504.08050 | Shuangyong Song | Shuangyong Song and Yao Meng | Detecting Concept-level Emotion Cause in Microblogging | 2 pages, 2 figures, to appear on WWW 2015 | null | null | null | cs.CL cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we propose a Concept-level Emotion Cause Model (CECM), instead
of the mere word-level models, to discover causes of microblogging users'
diversified emotions on specific hot event. A modified topic-supervised biterm
topic model is utilized in CECM to detect emotion topics' in event-related
tweets, and then context-sensitive topical PageRank is utilized to detect
meaningful multiword expressions as emotion causes. Experimental results on a
dataset from Sina Weibo, one of the largest microblogging websites in China,
show CECM can better detect emotion causes than baseline methods.
| [
{
"version": "v1",
"created": "Thu, 30 Apr 2015 00:35:32 GMT"
}
] | 2015-05-01T00:00:00 | [
[
"Song",
"Shuangyong",
""
],
[
"Meng",
"Yao",
""
]
] | TITLE: Detecting Concept-level Emotion Cause in Microblogging
ABSTRACT: In this paper, we propose a Concept-level Emotion Cause Model (CECM), instead
of the mere word-level models, to discover causes of microblogging users'
diversified emotions on specific hot event. A modified topic-supervised biterm
topic model is utilized in CECM to detect emotion topics' in event-related
tweets, and then context-sensitive topical PageRank is utilized to detect
meaningful multiword expressions as emotion causes. Experimental results on a
dataset from Sina Weibo, one of the largest microblogging websites in China,
show CECM can better detect emotion causes than baseline methods.
| no_new_dataset | 0.952086 |
1504.08100 | Matthias Keil | Matthias Keil, Sankha Narayan Guria, Andreas Schlegel, Manuel Geffken,
and Peter Thiemann | Transparent Object Proxies for JavaScript | Technical Report | null | null | null | cs.PL | http://creativecommons.org/licenses/by/3.0/ | Proxies are the swiss army knives of object adaptation. They introduce a
level of indirection to intercept select operations on a target object and
divert them as method calls to a handler. Proxies have many uses like
implementing access control, enforcing contracts, virtualizing resources.
One important question in the design of a proxy API is whether a proxy object
should inherit the identity of its target. Apparently proxies should have their
own identity for security-related applications whereas other applications, in
particular contract systems, require transparent proxies that compare equal to
their target objects.
We examine the issue with transparency in various use cases for proxies,
discuss different approaches to obtain transparency, and propose two designs
that require modest modifications in the JavaScript engine and cannot be
bypassed by the programmer.
We implement our designs in the SpiderMonkey JavaScript interpreter and
bytecode compiler. Our evaluation shows that these modifications of have no
statistically significant impact on the benchmark performance of the JavaScript
engine. Furthermore, we demonstrate that contract systems based on wrappers
require transparent proxies to avoid interference with program execution in
realistic settings.
| [
{
"version": "v1",
"created": "Thu, 30 Apr 2015 07:20:13 GMT"
}
] | 2015-05-01T00:00:00 | [
[
"Keil",
"Matthias",
""
],
[
"Guria",
"Sankha Narayan",
""
],
[
"Schlegel",
"Andreas",
""
],
[
"Geffken",
"Manuel",
""
],
[
"Thiemann",
"Peter",
""
]
] | TITLE: Transparent Object Proxies for JavaScript
ABSTRACT: Proxies are the swiss army knives of object adaptation. They introduce a
level of indirection to intercept select operations on a target object and
divert them as method calls to a handler. Proxies have many uses like
implementing access control, enforcing contracts, virtualizing resources.
One important question in the design of a proxy API is whether a proxy object
should inherit the identity of its target. Apparently proxies should have their
own identity for security-related applications whereas other applications, in
particular contract systems, require transparent proxies that compare equal to
their target objects.
We examine the issue with transparency in various use cases for proxies,
discuss different approaches to obtain transparency, and propose two designs
that require modest modifications in the JavaScript engine and cannot be
bypassed by the programmer.
We implement our designs in the SpiderMonkey JavaScript interpreter and
bytecode compiler. Our evaluation shows that these modifications of have no
statistically significant impact on the benchmark performance of the JavaScript
engine. Furthermore, we demonstrate that contract systems based on wrappers
require transparent proxies to avoid interference with program execution in
realistic settings.
| no_new_dataset | 0.934932 |
1504.08110 | Matthias Keil | Matthias Keil and Peter Thiemann | TreatJS: Higher-Order Contracts for JavaScript | Technical Report | null | null | null | cs.PL | http://creativecommons.org/licenses/by/3.0/ | TreatJS is a language embedded, higher-order contract system for JavaScript
which enforces contracts by run-time monitoring. Beyond providing the standard
abstractions for building higher-order contracts (base, function, and object
contracts), TreatJS's novel contributions are its guarantee of non-interfering
contract execution, its systematic approach to blame assignment, its support
for contracts in the style of union and intersection types, and its notion of a
parameterized contract scope, which is the building block for composable
run-time generated contracts that generalize dependent function contracts.
TreatJS is implemented as a library so that all aspects of a contract can be
specified using the full JavaScript language. The library relies on JavaScript
proxies to guarantee full interposition for contracts. It further exploits
JavaScript's reflective features to run contracts in a sandbox environment,
which guarantees that the execution of contract code does not modify the
application state. No source code transformation or change in the JavaScript
run-time system is required.
The impact of contracts on execution speed is evaluated using the Google
Octane benchmark.
| [
{
"version": "v1",
"created": "Thu, 30 Apr 2015 08:18:29 GMT"
}
] | 2015-05-01T00:00:00 | [
[
"Keil",
"Matthias",
""
],
[
"Thiemann",
"Peter",
""
]
] | TITLE: TreatJS: Higher-Order Contracts for JavaScript
ABSTRACT: TreatJS is a language embedded, higher-order contract system for JavaScript
which enforces contracts by run-time monitoring. Beyond providing the standard
abstractions for building higher-order contracts (base, function, and object
contracts), TreatJS's novel contributions are its guarantee of non-interfering
contract execution, its systematic approach to blame assignment, its support
for contracts in the style of union and intersection types, and its notion of a
parameterized contract scope, which is the building block for composable
run-time generated contracts that generalize dependent function contracts.
TreatJS is implemented as a library so that all aspects of a contract can be
specified using the full JavaScript language. The library relies on JavaScript
proxies to guarantee full interposition for contracts. It further exploits
JavaScript's reflective features to run contracts in a sandbox environment,
which guarantees that the execution of contract code does not modify the
application state. No source code transformation or change in the JavaScript
run-time system is required.
The impact of contracts on execution speed is evaluated using the Google
Octane benchmark.
| no_new_dataset | 0.930078 |
1504.08219 | Oisin Mac Aodha | Oisin Mac Aodha and Neill D.F. Campbell and Jan Kautz and Gabriel J.
Brostow | Hierarchical Subquery Evaluation for Active Learning on a Graph | CVPR 2014 | null | null | null | cs.CV cs.LG stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | To train good supervised and semi-supervised object classifiers, it is
critical that we not waste the time of the human experts who are providing the
training labels. Existing active learning strategies can have uneven
performance, being efficient on some datasets but wasteful on others, or
inconsistent just between runs on the same dataset. We propose perplexity based
graph construction and a new hierarchical subquery evaluation algorithm to
combat this variability, and to release the potential of Expected Error
Reduction.
Under some specific circumstances, Expected Error Reduction has been one of
the strongest-performing informativeness criteria for active learning. Until
now, it has also been prohibitively costly to compute for sizeable datasets. We
demonstrate our highly practical algorithm, comparing it to other active
learning measures on classification datasets that vary in sparsity,
dimensionality, and size. Our algorithm is consistent over multiple runs and
achieves high accuracy, while querying the human expert for labels at a
frequency that matches their desired time budget.
| [
{
"version": "v1",
"created": "Thu, 30 Apr 2015 13:35:59 GMT"
}
] | 2015-05-01T00:00:00 | [
[
"Mac Aodha",
"Oisin",
""
],
[
"Campbell",
"Neill D. F.",
""
],
[
"Kautz",
"Jan",
""
],
[
"Brostow",
"Gabriel J.",
""
]
] | TITLE: Hierarchical Subquery Evaluation for Active Learning on a Graph
ABSTRACT: To train good supervised and semi-supervised object classifiers, it is
critical that we not waste the time of the human experts who are providing the
training labels. Existing active learning strategies can have uneven
performance, being efficient on some datasets but wasteful on others, or
inconsistent just between runs on the same dataset. We propose perplexity based
graph construction and a new hierarchical subquery evaluation algorithm to
combat this variability, and to release the potential of Expected Error
Reduction.
Under some specific circumstances, Expected Error Reduction has been one of
the strongest-performing informativeness criteria for active learning. Until
now, it has also been prohibitively costly to compute for sizeable datasets. We
demonstrate our highly practical algorithm, comparing it to other active
learning measures on classification datasets that vary in sparsity,
dimensionality, and size. Our algorithm is consistent over multiple runs and
achieves high accuracy, while querying the human expert for labels at a
frequency that matches their desired time budget.
| no_new_dataset | 0.946892 |
1504.08274 | Dimitrios Christopoulos | Symeon Chatzinotas, Dimitrios Christopoulos, Bjorn Ottersten | Cellular-Broadcast Service Convergence through Caching for CoMP Cloud
RANs | Submitted to IEEE PIMRC 2015 | null | null | null | cs.IT cs.NI math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Cellular and Broadcast services have been traditionally treated independently
due to the different market requirements, thus resulting in different business
models and orthogonal frequency allocations. However, with the advent of cheap
memory and smart caching, this traditional paradigm can converge into a single
system which can provide both services in an efficient manner. This paper
focuses on multimedia delivery through an integrated network, including both a
cellular (also known as unicast or broadband) and a broadcast last mile
operating over shared spectrum. The subscribers of the network are equipped
with a cache which can effectively create zero perceived latency for multimedia
delivery, assuming that the content has been proactively and intelligently
cached. The main objective of this work is to establish analytically the
optimal content popularity threshold, based on a intuitive cost function. In
other words, the aim is to derive which content should be broadcasted and which
content should be unicasted. To facilitate this, Cooperative Multi- Point
(CoMP) joint processing algorithms are employed for the uni and broad-cast PHY
transmissions. To practically implement this, the integrated network controller
is assumed to have access to traffic statistics in terms of content popularity.
Simulation results are provided to assess the gain in terms of total spectral
efficiency. A conventional system, where the two networks operate
independently, is used as benchmark.
| [
{
"version": "v1",
"created": "Thu, 30 Apr 2015 15:37:18 GMT"
}
] | 2015-05-01T00:00:00 | [
[
"Chatzinotas",
"Symeon",
""
],
[
"Christopoulos",
"Dimitrios",
""
],
[
"Ottersten",
"Bjorn",
""
]
] | TITLE: Cellular-Broadcast Service Convergence through Caching for CoMP Cloud
RANs
ABSTRACT: Cellular and Broadcast services have been traditionally treated independently
due to the different market requirements, thus resulting in different business
models and orthogonal frequency allocations. However, with the advent of cheap
memory and smart caching, this traditional paradigm can converge into a single
system which can provide both services in an efficient manner. This paper
focuses on multimedia delivery through an integrated network, including both a
cellular (also known as unicast or broadband) and a broadcast last mile
operating over shared spectrum. The subscribers of the network are equipped
with a cache which can effectively create zero perceived latency for multimedia
delivery, assuming that the content has been proactively and intelligently
cached. The main objective of this work is to establish analytically the
optimal content popularity threshold, based on a intuitive cost function. In
other words, the aim is to derive which content should be broadcasted and which
content should be unicasted. To facilitate this, Cooperative Multi- Point
(CoMP) joint processing algorithms are employed for the uni and broad-cast PHY
transmissions. To practically implement this, the integrated network controller
is assumed to have access to traffic statistics in terms of content popularity.
Simulation results are provided to assess the gain in terms of total spectral
efficiency. A conventional system, where the two networks operate
independently, is used as benchmark.
| no_new_dataset | 0.94545 |
1406.3496 | Hadi Fanaee-T | Hadi Fanaee-T and Jo\~ao Gama | EigenEvent: An Algorithm for Event Detection from Complex Data Streams
in Syndromic Surveillance | To appear in Intelligent Data Analysis Journal, vol. 19(3), 2015 | PP. 597-616, Vol. 19, No. 3, June 2015, Intelligent Data Analysis | 10.3233/IDA-150734 | null | cs.AI cs.LG stat.AP | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Syndromic surveillance systems continuously monitor multiple pre-diagnostic
daily streams of indicators from different regions with the aim of early
detection of disease outbreaks. The main objective of these systems is to
detect outbreaks hours or days before the clinical and laboratory confirmation.
The type of data that is being generated via these systems is usually
multivariate and seasonal with spatial and temporal dimensions. The algorithm
What's Strange About Recent Events (WSARE) is the state-of-the-art method for
such problems. It exhaustively searches for contrast sets in the multivariate
data and signals an alarm when find statistically significant rules. This
bottom-up approach presents a much lower detection delay comparing the existing
top-down approaches. However, WSARE is very sensitive to the small-scale
changes and subsequently comes with a relatively high rate of false alarms. We
propose a new approach called EigenEvent that is neither fully top-down nor
bottom-up. In this method, we instead of top-down or bottom-up search, track
changes in data correlation structure via eigenspace techniques. This new
methodology enables us to detect both overall changes (via eigenvalue) and
dimension-level changes (via eigenvectors). Experimental results on hundred
sets of benchmark data reveals that EigenEvent presents a better overall
performance comparing state-of-the-art, in particular in terms of the false
alarm rate.
| [
{
"version": "v1",
"created": "Fri, 13 Jun 2014 10:38:09 GMT"
}
] | 2015-04-30T00:00:00 | [
[
"Fanaee-T",
"Hadi",
""
],
[
"Gama",
"João",
""
]
] | TITLE: EigenEvent: An Algorithm for Event Detection from Complex Data Streams
in Syndromic Surveillance
ABSTRACT: Syndromic surveillance systems continuously monitor multiple pre-diagnostic
daily streams of indicators from different regions with the aim of early
detection of disease outbreaks. The main objective of these systems is to
detect outbreaks hours or days before the clinical and laboratory confirmation.
The type of data that is being generated via these systems is usually
multivariate and seasonal with spatial and temporal dimensions. The algorithm
What's Strange About Recent Events (WSARE) is the state-of-the-art method for
such problems. It exhaustively searches for contrast sets in the multivariate
data and signals an alarm when find statistically significant rules. This
bottom-up approach presents a much lower detection delay comparing the existing
top-down approaches. However, WSARE is very sensitive to the small-scale
changes and subsequently comes with a relatively high rate of false alarms. We
propose a new approach called EigenEvent that is neither fully top-down nor
bottom-up. In this method, we instead of top-down or bottom-up search, track
changes in data correlation structure via eigenspace techniques. This new
methodology enables us to detect both overall changes (via eigenvalue) and
dimension-level changes (via eigenvectors). Experimental results on hundred
sets of benchmark data reveals that EigenEvent presents a better overall
performance comparing state-of-the-art, in particular in terms of the false
alarm rate.
| no_new_dataset | 0.951142 |
1501.00901 | Yubin Deng | Yubin Deng, Ping Luo, Chen Change Loy, Xiaoou Tang | Learning to Recognize Pedestrian Attribute | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Learning to recognize pedestrian attributes at far distance is a challenging
problem in visual surveillance since face and body close-shots are hardly
available; instead, only far-view image frames of pedestrian are given. In this
study, we present an alternative approach that exploits the context of
neighboring pedestrian images for improved attribute inference compared to the
conventional SVM-based method. In addition, we conduct extensive experiments to
evaluate the informativeness of background and foreground features for
attribute recognition. Experiments are based on our newly released pedestrian
attribute dataset, which is by far the largest and most diverse of its kind.
| [
{
"version": "v1",
"created": "Mon, 5 Jan 2015 15:53:01 GMT"
},
{
"version": "v2",
"created": "Wed, 29 Apr 2015 06:35:50 GMT"
}
] | 2015-04-30T00:00:00 | [
[
"Deng",
"Yubin",
""
],
[
"Luo",
"Ping",
""
],
[
"Loy",
"Chen Change",
""
],
[
"Tang",
"Xiaoou",
""
]
] | TITLE: Learning to Recognize Pedestrian Attribute
ABSTRACT: Learning to recognize pedestrian attributes at far distance is a challenging
problem in visual surveillance since face and body close-shots are hardly
available; instead, only far-view image frames of pedestrian are given. In this
study, we present an alternative approach that exploits the context of
neighboring pedestrian images for improved attribute inference compared to the
conventional SVM-based method. In addition, we conduct extensive experiments to
evaluate the informativeness of background and foreground features for
attribute recognition. Experiments are based on our newly released pedestrian
attribute dataset, which is by far the largest and most diverse of its kind.
| new_dataset | 0.953665 |
1504.01777 | Junbin Gao Professor | Yanfeng Sun and Junbin Gao and Xia Hong and Bamdev Mishra and Baocai
Yin | Heterogeneous Tensor Decomposition for Clustering via Manifold
Optimization | 12 pages, 2 figures | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Tensors or multiarray data are generalizations of matrices. Tensor clustering
has become a very important research topic due to the intrinsically rich
structures in real-world multiarray datasets. Subspace clustering based on
vectorizing multiarray data has been extensively researched. However,
vectorization of tensorial data does not exploit complete structure
information. In this paper, we propose a subspace clustering algorithm without
adopting any vectorization process. Our approach is based on a novel
heterogeneous Tucker decomposition model. In contrast to existing techniques,
we propose a new clustering algorithm that alternates between different modes
of the proposed heterogeneous tensor model. All but the last mode have
closed-form updates. Updating the last mode reduces to optimizing over the
so-called multinomial manifold, for which we investigate second order
Riemannian geometry and propose a trust-region algorithm. Numerical experiments
show that our proposed algorithm compete effectively with state-of-the-art
clustering algorithms that are based on tensor factorization.
| [
{
"version": "v1",
"created": "Tue, 7 Apr 2015 23:18:34 GMT"
},
{
"version": "v2",
"created": "Wed, 29 Apr 2015 02:53:10 GMT"
}
] | 2015-04-30T00:00:00 | [
[
"Sun",
"Yanfeng",
""
],
[
"Gao",
"Junbin",
""
],
[
"Hong",
"Xia",
""
],
[
"Mishra",
"Bamdev",
""
],
[
"Yin",
"Baocai",
""
]
] | TITLE: Heterogeneous Tensor Decomposition for Clustering via Manifold
Optimization
ABSTRACT: Tensors or multiarray data are generalizations of matrices. Tensor clustering
has become a very important research topic due to the intrinsically rich
structures in real-world multiarray datasets. Subspace clustering based on
vectorizing multiarray data has been extensively researched. However,
vectorization of tensorial data does not exploit complete structure
information. In this paper, we propose a subspace clustering algorithm without
adopting any vectorization process. Our approach is based on a novel
heterogeneous Tucker decomposition model. In contrast to existing techniques,
we propose a new clustering algorithm that alternates between different modes
of the proposed heterogeneous tensor model. All but the last mode have
closed-form updates. Updating the last mode reduces to optimizing over the
so-called multinomial manifold, for which we investigate second order
Riemannian geometry and propose a trust-region algorithm. Numerical experiments
show that our proposed algorithm compete effectively with state-of-the-art
clustering algorithms that are based on tensor factorization.
| no_new_dataset | 0.949949 |
1504.07678 | Hongzhao Huang | Hongzhao Huang and Larry Heck and Heng Ji | Leveraging Deep Neural Networks and Knowledge Graphs for Entity
Disambiguation | null | null | null | null | cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Entity Disambiguation aims to link mentions of ambiguous entities to a
knowledge base (e.g., Wikipedia). Modeling topical coherence is crucial for
this task based on the assumption that information from the same semantic
context tends to belong to the same topic. This paper presents a novel deep
semantic relatedness model (DSRM) based on deep neural networks (DNN) and
semantic knowledge graphs (KGs) to measure entity semantic relatedness for
topical coherence modeling. The DSRM is directly trained on large-scale KGs and
it maps heterogeneous types of knowledge of an entity from KGs to numerical
feature vectors in a latent space such that the distance between two
semantically-related entities is minimized. Compared with the state-of-the-art
relatedness approach proposed by (Milne and Witten, 2008a), the DSRM obtains
19.4% and 24.5% reductions in entity disambiguation errors on two publicly
available datasets respectively.
| [
{
"version": "v1",
"created": "Tue, 28 Apr 2015 22:47:25 GMT"
}
] | 2015-04-30T00:00:00 | [
[
"Huang",
"Hongzhao",
""
],
[
"Heck",
"Larry",
""
],
[
"Ji",
"Heng",
""
]
] | TITLE: Leveraging Deep Neural Networks and Knowledge Graphs for Entity
Disambiguation
ABSTRACT: Entity Disambiguation aims to link mentions of ambiguous entities to a
knowledge base (e.g., Wikipedia). Modeling topical coherence is crucial for
this task based on the assumption that information from the same semantic
context tends to belong to the same topic. This paper presents a novel deep
semantic relatedness model (DSRM) based on deep neural networks (DNN) and
semantic knowledge graphs (KGs) to measure entity semantic relatedness for
topical coherence modeling. The DSRM is directly trained on large-scale KGs and
it maps heterogeneous types of knowledge of an entity from KGs to numerical
feature vectors in a latent space such that the distance between two
semantically-related entities is minimized. Compared with the state-of-the-art
relatedness approach proposed by (Milne and Witten, 2008a), the DSRM obtains
19.4% and 24.5% reductions in entity disambiguation errors on two publicly
available datasets respectively.
| no_new_dataset | 0.950686 |
1504.07758 | Jeremy Debattista | Jeremy Debattista, Christoph Lange, S\"oren Auer | Luzzu Quality Metric Language -- A DSL for Linked Data Quality
Assessment | arXiv admin note: text overlap with arXiv:1412.3750 | null | null | null | cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The steadily growing number of linked open datasets brought about a number of
reservations amongst data consumers with regard to the datasets' quality.
Quality assessment requires significant effort and consideration, including the
definition of data quality metrics and a process to assess datasets based on
these definitions. Luzzu is a quality assessment framework for linked data that
allows domain-specific metrics to be plugged in. LQML offers notations,
abstractions and expressive power, focusing on the representation of quality
metrics. It provides expressive power for defining sophisticated quality
metrics. Its integration with Luzzu enables their efficient processing and
execution and thus the comprehensive assessment of extremely large datasets in
a streaming way. We also describe a novel ontology that enables the reuse,
sharing and querying of such definitions. Finally, we evaluate the proposed DSL
against the cognitive dimensions of notation framework.
| [
{
"version": "v1",
"created": "Wed, 29 Apr 2015 08:17:20 GMT"
}
] | 2015-04-30T00:00:00 | [
[
"Debattista",
"Jeremy",
""
],
[
"Lange",
"Christoph",
""
],
[
"Auer",
"Sören",
""
]
] | TITLE: Luzzu Quality Metric Language -- A DSL for Linked Data Quality
Assessment
ABSTRACT: The steadily growing number of linked open datasets brought about a number of
reservations amongst data consumers with regard to the datasets' quality.
Quality assessment requires significant effort and consideration, including the
definition of data quality metrics and a process to assess datasets based on
these definitions. Luzzu is a quality assessment framework for linked data that
allows domain-specific metrics to be plugged in. LQML offers notations,
abstractions and expressive power, focusing on the representation of quality
metrics. It provides expressive power for defining sophisticated quality
metrics. Its integration with Luzzu enables their efficient processing and
execution and thus the comprehensive assessment of extremely large datasets in
a streaming way. We also describe a novel ontology that enables the reuse,
sharing and querying of such definitions. Finally, we evaluate the proposed DSL
against the cognitive dimensions of notation framework.
| no_new_dataset | 0.947962 |
1504.07862 | Marek Trt\'ik | Marek Trtik | Anonymous On-line Communication Between Program Analyses | Technical report / Specification, 50 pages | null | null | null | cs.PL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose a light-weight client-server model of communication between
existing implementations of different program analyses. The communication is
on-line and anonymous which means that all analyses simultaneously analyse the
same program and an analysis does not know what other analyses participate in
the communication. The anonymity and model's strong emphasis on independence of
analyses allow to preserve almost everything in existing implementations. An
analysis only has to add an implementation of a proposed communication
protocol, determine places in its code where information from others would
help, and then check whether there is no communication scenario, which would
corrupt its result. We demonstrate functionality and effectiveness of the
proposed communication model in a detailed case study with three analyses: two
abstract interpreters and the classic symbolic execution. Results of the
evaluation on SV-COMP benchmarks show impressive improvements in computed
invariants and increased counts of successfully analysed benchmarks.
| [
{
"version": "v1",
"created": "Wed, 29 Apr 2015 13:58:42 GMT"
}
] | 2015-04-30T00:00:00 | [
[
"Trtik",
"Marek",
""
]
] | TITLE: Anonymous On-line Communication Between Program Analyses
ABSTRACT: We propose a light-weight client-server model of communication between
existing implementations of different program analyses. The communication is
on-line and anonymous which means that all analyses simultaneously analyse the
same program and an analysis does not know what other analyses participate in
the communication. The anonymity and model's strong emphasis on independence of
analyses allow to preserve almost everything in existing implementations. An
analysis only has to add an implementation of a proposed communication
protocol, determine places in its code where information from others would
help, and then check whether there is no communication scenario, which would
corrupt its result. We demonstrate functionality and effectiveness of the
proposed communication model in a detailed case study with three analyses: two
abstract interpreters and the classic symbolic execution. Results of the
evaluation on SV-COMP benchmarks show impressive improvements in computed
invariants and increased counts of successfully analysed benchmarks.
| no_new_dataset | 0.945701 |
1504.07890 | Diego Fabregat-Traver | Alvaro Frank, Diego Fabregat-Traver and Paolo Bientinesi | Large-scale linear regression: Development of high-performance routines | null | null | null | null | cs.CE cs.MS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In statistics, series of ordinary least squares problems (OLS) are used to
study the linear correlation among sets of variables of interest; in many
studies, the number of such variables is at least in the millions, and the
corresponding datasets occupy terabytes of disk space. As the availability of
large-scale datasets increases regularly, so does the challenge in dealing with
them. Indeed, traditional solvers---which rely on the use of black-box"
routines optimized for one single OLS---are highly inefficient and fail to
provide a viable solution for big-data analyses. As a case study, in this paper
we consider a linear regression consisting of two-dimensional grids of related
OLS problems that arise in the context of genome-wide association analyses, and
give a careful walkthrough for the development of {\sc ols-grid}, a
high-performance routine for shared-memory architectures; analogous steps are
relevant for tailoring OLS solvers to other applications. In particular, we
first illustrate the design of efficient algorithms that exploit the structure
of the OLS problems and eliminate redundant computations; then, we show how to
effectively deal with datasets that do not fit in main memory; finally, we
discuss how to cast the computation in terms of efficient kernels and how to
achieve scalability. Importantly, each design decision along the way is
justified by simple performance models. {\sc ols-grid} enables the solution of
$10^{11}$ correlated OLS problems operating on terabytes of data in a matter of
hours.
| [
{
"version": "v1",
"created": "Wed, 29 Apr 2015 15:24:33 GMT"
}
] | 2015-04-30T00:00:00 | [
[
"Frank",
"Alvaro",
""
],
[
"Fabregat-Traver",
"Diego",
""
],
[
"Bientinesi",
"Paolo",
""
]
] | TITLE: Large-scale linear regression: Development of high-performance routines
ABSTRACT: In statistics, series of ordinary least squares problems (OLS) are used to
study the linear correlation among sets of variables of interest; in many
studies, the number of such variables is at least in the millions, and the
corresponding datasets occupy terabytes of disk space. As the availability of
large-scale datasets increases regularly, so does the challenge in dealing with
them. Indeed, traditional solvers---which rely on the use of black-box"
routines optimized for one single OLS---are highly inefficient and fail to
provide a viable solution for big-data analyses. As a case study, in this paper
we consider a linear regression consisting of two-dimensional grids of related
OLS problems that arise in the context of genome-wide association analyses, and
give a careful walkthrough for the development of {\sc ols-grid}, a
high-performance routine for shared-memory architectures; analogous steps are
relevant for tailoring OLS solvers to other applications. In particular, we
first illustrate the design of efficient algorithms that exploit the structure
of the OLS problems and eliminate redundant computations; then, we show how to
effectively deal with datasets that do not fit in main memory; finally, we
discuss how to cast the computation in terms of efficient kernels and how to
achieve scalability. Importantly, each design decision along the way is
justified by simple performance models. {\sc ols-grid} enables the solution of
$10^{11}$ correlated OLS problems operating on terabytes of data in a matter of
hours.
| no_new_dataset | 0.941385 |
1504.07912 | Adam Smith | Sofya Raskhodnikova, Adam Smith | Efficient Lipschitz Extensions for High-Dimensional Graph Statistics and
Node Private Degree Distributions | 23 pages, 2 figures | null | null | null | cs.CR cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Lipschitz extensions were recently proposed as a tool for designing node
differentially private algorithms. However, efficiently computable Lipschitz
extensions were known only for 1-dimensional functions (that is, functions that
output a single real value). In this paper, we study efficiently computable
Lipschitz extensions for multi-dimensional (that is, vector-valued) functions
on graphs. We show that, unlike for 1-dimensional functions, Lipschitz
extensions of higher-dimensional functions on graphs do not always exist, even
with a non-unit stretch. We design Lipschitz extensions with small stretch for
the sorted degree list and for the degree distribution of a graph. Crucially,
our extensions are efficiently computable.
We also develop new tools for employing Lipschitz extensions in the design of
differentially private algorithms. Specifically, we generalize the exponential
mechanism, a widely used tool in data privacy. The exponential mechanism is
given a collection of score functions that map datasets to real values. It
attempts to return the name of the function with nearly minimum value on the
data set. Our generalized exponential mechanism provides better accuracy when
the sensitivity of an optimal score function is much smaller than the maximum
sensitivity of score functions.
We use our Lipschitz extension and the generalized exponential mechanism to
design a node-differentially private algorithm for releasing an approximation
to the degree distribution of a graph. Our algorithm is much more accurate than
algorithms from previous work.
| [
{
"version": "v1",
"created": "Wed, 29 Apr 2015 16:08:57 GMT"
}
] | 2015-04-30T00:00:00 | [
[
"Raskhodnikova",
"Sofya",
""
],
[
"Smith",
"Adam",
""
]
] | TITLE: Efficient Lipschitz Extensions for High-Dimensional Graph Statistics and
Node Private Degree Distributions
ABSTRACT: Lipschitz extensions were recently proposed as a tool for designing node
differentially private algorithms. However, efficiently computable Lipschitz
extensions were known only for 1-dimensional functions (that is, functions that
output a single real value). In this paper, we study efficiently computable
Lipschitz extensions for multi-dimensional (that is, vector-valued) functions
on graphs. We show that, unlike for 1-dimensional functions, Lipschitz
extensions of higher-dimensional functions on graphs do not always exist, even
with a non-unit stretch. We design Lipschitz extensions with small stretch for
the sorted degree list and for the degree distribution of a graph. Crucially,
our extensions are efficiently computable.
We also develop new tools for employing Lipschitz extensions in the design of
differentially private algorithms. Specifically, we generalize the exponential
mechanism, a widely used tool in data privacy. The exponential mechanism is
given a collection of score functions that map datasets to real values. It
attempts to return the name of the function with nearly minimum value on the
data set. Our generalized exponential mechanism provides better accuracy when
the sensitivity of an optimal score function is much smaller than the maximum
sensitivity of score functions.
We use our Lipschitz extension and the generalized exponential mechanism to
design a node-differentially private algorithm for releasing an approximation
to the degree distribution of a graph. Our algorithm is much more accurate than
algorithms from previous work.
| no_new_dataset | 0.94801 |
1412.7272 | Maruan Al-Shedivat | Maruan Al-Shedivat, Emre Neftci and Gert Cauwenberghs | Learning Non-deterministic Representations with Energy-based Ensembles | 9 pages, 3 figures, ICLR-15 workshop contribution | null | null | null | cs.LG cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The goal of a generative model is to capture the distribution underlying the
data, typically through latent variables. After training, these variables are
often used as a new representation, more effective than the original features
in a variety of learning tasks. However, the representations constructed by
contemporary generative models are usually point-wise deterministic mappings
from the original feature space. Thus, even with representations robust to
class-specific transformations, statistically driven models trained on them
would not be able to generalize when the labeled data is scarce. Inspired by
the stochasticity of the synaptic connections in the brain, we introduce
Energy-based Stochastic Ensembles. These ensembles can learn non-deterministic
representations, i.e., mappings from the feature space to a family of
distributions in the latent space. These mappings are encoded in a distribution
over a (possibly infinite) collection of models. By conditionally sampling
models from the ensemble, we obtain multiple representations for every input
example and effectively augment the data. We propose an algorithm similar to
contrastive divergence for training restricted Boltzmann stochastic ensembles.
Finally, we demonstrate the concept of the stochastic representations on a
synthetic dataset as well as test them in the one-shot learning scenario on
MNIST.
| [
{
"version": "v1",
"created": "Tue, 23 Dec 2014 07:06:55 GMT"
},
{
"version": "v2",
"created": "Wed, 22 Apr 2015 10:04:49 GMT"
}
] | 2015-04-29T00:00:00 | [
[
"Al-Shedivat",
"Maruan",
""
],
[
"Neftci",
"Emre",
""
],
[
"Cauwenberghs",
"Gert",
""
]
] | TITLE: Learning Non-deterministic Representations with Energy-based Ensembles
ABSTRACT: The goal of a generative model is to capture the distribution underlying the
data, typically through latent variables. After training, these variables are
often used as a new representation, more effective than the original features
in a variety of learning tasks. However, the representations constructed by
contemporary generative models are usually point-wise deterministic mappings
from the original feature space. Thus, even with representations robust to
class-specific transformations, statistically driven models trained on them
would not be able to generalize when the labeled data is scarce. Inspired by
the stochasticity of the synaptic connections in the brain, we introduce
Energy-based Stochastic Ensembles. These ensembles can learn non-deterministic
representations, i.e., mappings from the feature space to a family of
distributions in the latent space. These mappings are encoded in a distribution
over a (possibly infinite) collection of models. By conditionally sampling
models from the ensemble, we obtain multiple representations for every input
example and effectively augment the data. We propose an algorithm similar to
contrastive divergence for training restricted Boltzmann stochastic ensembles.
Finally, we demonstrate the concept of the stochastic representations on a
synthetic dataset as well as test them in the one-shot learning scenario on
MNIST.
| no_new_dataset | 0.946646 |
1504.07235 | Ping Li | Ping Li | Sign Stable Random Projections for Large-Scale Learning | null | null | null | null | stat.ML cs.LG stat.CO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study the use of "sign $\alpha$-stable random projections" (where
$0<\alpha\leq 2$) for building basic data processing tools in the context of
large-scale machine learning applications (e.g., classification, regression,
clustering, and near-neighbor search). After the processing by sign stable
random projections, the inner products of the processed data approximate
various types of nonlinear kernels depending on the value of $\alpha$. Thus,
this approach provides an effective strategy for approximating nonlinear
learning algorithms essentially at the cost of linear learning. When $\alpha
=2$, it is known that the corresponding nonlinear kernel is the arc-cosine
kernel. When $\alpha=1$, the procedure approximates the arc-cos-$\chi^2$ kernel
(under certain condition). When $\alpha\rightarrow0+$, it corresponds to the
resemblance kernel.
From practitioners' perspective, the method of sign $\alpha$-stable random
projections is ready to be tested for large-scale learning applications, where
$\alpha$ can be simply viewed as a tuning parameter. What is missing in the
literature is an extensive empirical study to show the effectiveness of sign
stable random projections, especially for $\alpha\neq 2$ or 1. The paper
supplies such a study on a wide variety of classification datasets. In
particular, we compare shoulder-by-shoulder sign stable random projections with
the recently proposed "0-bit consistent weighted sampling (CWS)" (Li 2015).
| [
{
"version": "v1",
"created": "Mon, 27 Apr 2015 19:50:40 GMT"
}
] | 2015-04-29T00:00:00 | [
[
"Li",
"Ping",
""
]
] | TITLE: Sign Stable Random Projections for Large-Scale Learning
ABSTRACT: We study the use of "sign $\alpha$-stable random projections" (where
$0<\alpha\leq 2$) for building basic data processing tools in the context of
large-scale machine learning applications (e.g., classification, regression,
clustering, and near-neighbor search). After the processing by sign stable
random projections, the inner products of the processed data approximate
various types of nonlinear kernels depending on the value of $\alpha$. Thus,
this approach provides an effective strategy for approximating nonlinear
learning algorithms essentially at the cost of linear learning. When $\alpha
=2$, it is known that the corresponding nonlinear kernel is the arc-cosine
kernel. When $\alpha=1$, the procedure approximates the arc-cos-$\chi^2$ kernel
(under certain condition). When $\alpha\rightarrow0+$, it corresponds to the
resemblance kernel.
From practitioners' perspective, the method of sign $\alpha$-stable random
projections is ready to be tested for large-scale learning applications, where
$\alpha$ can be simply viewed as a tuning parameter. What is missing in the
literature is an extensive empirical study to show the effectiveness of sign
stable random projections, especially for $\alpha\neq 2$ or 1. The paper
supplies such a study on a wide variety of classification datasets. In
particular, we compare shoulder-by-shoulder sign stable random projections with
the recently proposed "0-bit consistent weighted sampling (CWS)" (Li 2015).
| no_new_dataset | 0.945851 |
1504.07269 | Narapureddy Dinesh Reddy | N. Dinesh Reddy, Prateek Singhal, Visesh Chari and K. Madhava Krishna | Dynamic Body VSLAM with Semantic Constraints | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Image based reconstruction of urban environments is a challenging problem
that deals with optimization of large number of variables, and has several
sources of errors like the presence of dynamic objects. Since most large scale
approaches make the assumption of observing static scenes, dynamic objects are
relegated to the noise modeling section of such systems. This is an approach of
convenience since the RANSAC based framework used to compute most multiview
geometric quantities for static scenes naturally confine dynamic objects to the
class of outlier measurements. However, reconstructing dynamic objects along
with the static environment helps us get a complete picture of an urban
environment. Such understanding can then be used for important robotic tasks
like path planning for autonomous navigation, obstacle tracking and avoidance,
and other areas. In this paper, we propose a system for robust SLAM that works
in both static and dynamic environments. To overcome the challenge of dynamic
objects in the scene, we propose a new model to incorporate semantic
constraints into the reconstruction algorithm. While some of these constraints
are based on multi-layered dense CRFs trained over appearance as well as motion
cues, other proposed constraints can be expressed as additional terms in the
bundle adjustment optimization process that does iterative refinement of 3D
structure and camera / object motion trajectories. We show results on the
challenging KITTI urban dataset for accuracy of motion segmentation and
reconstruction of the trajectory and shape of moving objects relative to ground
truth. We are able to show average relative error reduction by a significant
amount for moving object trajectory reconstruction relative to state-of-the-art
methods like VISO 2, as well as standard bundle adjustment algorithms.
| [
{
"version": "v1",
"created": "Mon, 27 Apr 2015 20:30:04 GMT"
}
] | 2015-04-29T00:00:00 | [
[
"Reddy",
"N. Dinesh",
""
],
[
"Singhal",
"Prateek",
""
],
[
"Chari",
"Visesh",
""
],
[
"Krishna",
"K. Madhava",
""
]
] | TITLE: Dynamic Body VSLAM with Semantic Constraints
ABSTRACT: Image based reconstruction of urban environments is a challenging problem
that deals with optimization of large number of variables, and has several
sources of errors like the presence of dynamic objects. Since most large scale
approaches make the assumption of observing static scenes, dynamic objects are
relegated to the noise modeling section of such systems. This is an approach of
convenience since the RANSAC based framework used to compute most multiview
geometric quantities for static scenes naturally confine dynamic objects to the
class of outlier measurements. However, reconstructing dynamic objects along
with the static environment helps us get a complete picture of an urban
environment. Such understanding can then be used for important robotic tasks
like path planning for autonomous navigation, obstacle tracking and avoidance,
and other areas. In this paper, we propose a system for robust SLAM that works
in both static and dynamic environments. To overcome the challenge of dynamic
objects in the scene, we propose a new model to incorporate semantic
constraints into the reconstruction algorithm. While some of these constraints
are based on multi-layered dense CRFs trained over appearance as well as motion
cues, other proposed constraints can be expressed as additional terms in the
bundle adjustment optimization process that does iterative refinement of 3D
structure and camera / object motion trajectories. We show results on the
challenging KITTI urban dataset for accuracy of motion segmentation and
reconstruction of the trajectory and shape of moving objects relative to ground
truth. We are able to show average relative error reduction by a significant
amount for moving object trajectory reconstruction relative to state-of-the-art
methods like VISO 2, as well as standard bundle adjustment algorithms.
| no_new_dataset | 0.945951 |
1504.07278 | Vipul Arora | Vipul Arora, Laxmidhar Behera and Ajay Pratap Yadav | Optimal Convergence Rate in Feed Forward Neural Networks using HJB
Equation | 9 pages, journal | null | null | null | cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A control theoretic approach is presented in this paper for both batch and
instantaneous updates of weights in feed-forward neural networks. The popular
Hamilton-Jacobi-Bellman (HJB) equation has been used to generate an optimal
weight update law. The remarkable contribution in this paper is that closed
form solutions for both optimal cost and weight update can be achieved for any
feed-forward network using HJB equation in a simple yet elegant manner. The
proposed approach has been compared with some of the existing best performing
learning algorithms. It is found as expected that the proposed approach is
faster in convergence in terms of computational time. Some of the benchmark
test data such as 8-bit parity, breast cancer and credit approval, as well as
2D Gabor function have been used to validate our claims. The paper also
discusses issues related to global optimization. The limitations of popular
deterministic weight update laws are critiqued and the possibility of global
optimization using HJB formulation is discussed. It is hoped that the proposed
algorithm will bring in a lot of interest in researchers working in developing
fast learning algorithms and global optimization.
| [
{
"version": "v1",
"created": "Mon, 27 Apr 2015 21:09:15 GMT"
}
] | 2015-04-29T00:00:00 | [
[
"Arora",
"Vipul",
""
],
[
"Behera",
"Laxmidhar",
""
],
[
"Yadav",
"Ajay Pratap",
""
]
] | TITLE: Optimal Convergence Rate in Feed Forward Neural Networks using HJB
Equation
ABSTRACT: A control theoretic approach is presented in this paper for both batch and
instantaneous updates of weights in feed-forward neural networks. The popular
Hamilton-Jacobi-Bellman (HJB) equation has been used to generate an optimal
weight update law. The remarkable contribution in this paper is that closed
form solutions for both optimal cost and weight update can be achieved for any
feed-forward network using HJB equation in a simple yet elegant manner. The
proposed approach has been compared with some of the existing best performing
learning algorithms. It is found as expected that the proposed approach is
faster in convergence in terms of computational time. Some of the benchmark
test data such as 8-bit parity, breast cancer and credit approval, as well as
2D Gabor function have been used to validate our claims. The paper also
discusses issues related to global optimization. The limitations of popular
deterministic weight update laws are critiqued and the possibility of global
optimization using HJB formulation is discussed. It is hoped that the proposed
algorithm will bring in a lot of interest in researchers working in developing
fast learning algorithms and global optimization.
| no_new_dataset | 0.949576 |
1504.07389 | Marc Claesen | Marc Claesen, Frank De Smet, Pieter Gillard, Chantal Mathieu, Bart De
Moor | Building Classifiers to Predict the Start of Glucose-Lowering
Pharmacotherapy Using Belgian Health Expenditure Data | 23 pages, 5 figures, submitted to JMLR special issue on Learning from
Electronic Health Data | null | null | null | stat.ML cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Early diagnosis is important for type 2 diabetes (T2D) to improve patient
prognosis, prevent complications and reduce long-term treatment costs. We
present a novel risk profiling approach based exclusively on health expenditure
data that is available to Belgian mutual health insurers. We used expenditure
data related to drug purchases and medical provisions to construct models that
predict whether a patient will start glucose-lowering pharmacotherapy in the
coming years, based on that patient's recent medical expenditure history. The
design and implementation of the modeling strategy are discussed in detail and
several learning methods are benchmarked for our application. Our best
performing model obtains between 74.9% and 76.8% area under the ROC curve,
which is comparable to state-of-the-art risk prediction approaches for T2D
based on questionnaires. In contrast to other methods, our approach can be
implemented on a population-wide scale at virtually no extra operational cost.
Possibly, our approach can be further improved by additional information about
some risk factors of T2D that is unavailable in health expenditure data.
| [
{
"version": "v1",
"created": "Tue, 28 Apr 2015 09:27:03 GMT"
}
] | 2015-04-29T00:00:00 | [
[
"Claesen",
"Marc",
""
],
[
"De Smet",
"Frank",
""
],
[
"Gillard",
"Pieter",
""
],
[
"Mathieu",
"Chantal",
""
],
[
"De Moor",
"Bart",
""
]
] | TITLE: Building Classifiers to Predict the Start of Glucose-Lowering
Pharmacotherapy Using Belgian Health Expenditure Data
ABSTRACT: Early diagnosis is important for type 2 diabetes (T2D) to improve patient
prognosis, prevent complications and reduce long-term treatment costs. We
present a novel risk profiling approach based exclusively on health expenditure
data that is available to Belgian mutual health insurers. We used expenditure
data related to drug purchases and medical provisions to construct models that
predict whether a patient will start glucose-lowering pharmacotherapy in the
coming years, based on that patient's recent medical expenditure history. The
design and implementation of the modeling strategy are discussed in detail and
several learning methods are benchmarked for our application. Our best
performing model obtains between 74.9% and 76.8% area under the ROC curve,
which is comparable to state-of-the-art risk prediction approaches for T2D
based on questionnaires. In contrast to other methods, our approach can be
implemented on a population-wide scale at virtually no extra operational cost.
Possibly, our approach can be further improved by additional information about
some risk factors of T2D that is unavailable in health expenditure data.
| no_new_dataset | 0.943764 |
1504.07459 | Marian-Andrei Rizoiu | Marian-Andrei Rizoiu, Adrien Guille and Julien Velcin | CommentWatcher: An Open Source Web-based platform for analyzing
discussions on web forums | null | null | null | null | cs.CL cs.SI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present CommentWatcher, an open source tool aimed at analyzing discussions
on web forums. Constructed as a web platform, CommentWatcher features automatic
mass fetching of user posts from forum on multiple sites, extracting topics,
visualizing the topics as an expression cloud and exploring their temporal
evolution. The underlying social network of users is simultaneously constructed
using the citation relations between users and visualized as a graph structure.
Our platform addresses the issues of the diversity and dynamics of structures
of webpages hosting the forums by implementing a parser architecture that is
independent of the HTML structure of webpages. This allows easy on-the-fly
adding of new websites. Two types of users are targeted: end users who seek to
study the discussed topics and their temporal evolution, and researchers in
need of establishing a forum benchmark dataset and comparing the performances
of analysis tools.
| [
{
"version": "v1",
"created": "Tue, 28 Apr 2015 13:18:00 GMT"
}
] | 2015-04-29T00:00:00 | [
[
"Rizoiu",
"Marian-Andrei",
""
],
[
"Guille",
"Adrien",
""
],
[
"Velcin",
"Julien",
""
]
] | TITLE: CommentWatcher: An Open Source Web-based platform for analyzing
discussions on web forums
ABSTRACT: We present CommentWatcher, an open source tool aimed at analyzing discussions
on web forums. Constructed as a web platform, CommentWatcher features automatic
mass fetching of user posts from forum on multiple sites, extracting topics,
visualizing the topics as an expression cloud and exploring their temporal
evolution. The underlying social network of users is simultaneously constructed
using the citation relations between users and visualized as a graph structure.
Our platform addresses the issues of the diversity and dynamics of structures
of webpages hosting the forums by implementing a parser architecture that is
independent of the HTML structure of webpages. This allows easy on-the-fly
adding of new websites. Two types of users are targeted: end users who seek to
study the discussed topics and their temporal evolution, and researchers in
need of establishing a forum benchmark dataset and comparing the performances
of analysis tools.
| no_new_dataset | 0.798108 |
1504.07460 | Alexander Kolesnikov | Alexander Kolesnikov and Christoph H. Lampert | Identifying Reliable Annotations for Large Scale Image Segmentation | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Challenging computer vision tasks, in particular semantic image segmentation,
require large training sets of annotated images. While obtaining the actual
images is often unproblematic, creating the necessary annotation is a tedious
and costly process. Therefore, one often has to work with unreliable annotation
sources, such as Amazon Mechanical Turk or (semi-)automatic algorithmic
techniques. In this work, we present a Gaussian process (GP) based technique
for simultaneously identifying which images of a training set have unreliable
annotation and learning a segmentation model in which the negative effect of
these images is suppressed. Alternatively, the model can also just be used to
identify the most reliably annotated images from the training set, which can
then be used for training any other segmentation method. By relying on "deep
features" in combination with a linear covariance function, our GP can be
learned and its hyperparameter determined efficiently using only matrix
operations and gradient-based optimization. This makes our method scalable even
to large datasets with several million training instances.
| [
{
"version": "v1",
"created": "Tue, 28 Apr 2015 13:19:21 GMT"
}
] | 2015-04-29T00:00:00 | [
[
"Kolesnikov",
"Alexander",
""
],
[
"Lampert",
"Christoph H.",
""
]
] | TITLE: Identifying Reliable Annotations for Large Scale Image Segmentation
ABSTRACT: Challenging computer vision tasks, in particular semantic image segmentation,
require large training sets of annotated images. While obtaining the actual
images is often unproblematic, creating the necessary annotation is a tedious
and costly process. Therefore, one often has to work with unreliable annotation
sources, such as Amazon Mechanical Turk or (semi-)automatic algorithmic
techniques. In this work, we present a Gaussian process (GP) based technique
for simultaneously identifying which images of a training set have unreliable
annotation and learning a segmentation model in which the negative effect of
these images is suppressed. Alternatively, the model can also just be used to
identify the most reliably annotated images from the training set, which can
then be used for training any other segmentation method. By relying on "deep
features" in combination with a linear covariance function, our GP can be
learned and its hyperparameter determined efficiently using only matrix
operations and gradient-based optimization. This makes our method scalable even
to large datasets with several million training instances.
| no_new_dataset | 0.949295 |
1502.00718 | Alireza Goudarzi | Alireza Goudarzi and Alireza Shabani and Darko Stefanovic | Product Reservoir Computing: Time-Series Computation with Multiplicative
Neurons | null | null | null | null | cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Echo state networks (ESN), a type of reservoir computing (RC) architecture,
are efficient and accurate artificial neural systems for time series processing
and learning. An ESN consists of a core of recurrent neural networks, called a
reservoir, with a small number of tunable parameters to generate a
high-dimensional representation of an input, and a readout layer which is
easily trained using regression to produce a desired output from the reservoir
states. Certain computational tasks involve real-time calculation of high-order
time correlations, which requires nonlinear transformation either in the
reservoir or the readout layer. Traditional ESN employs a reservoir with
sigmoid or tanh function neurons. In contrast, some types of biological neurons
obey response curves that can be described as a product unit rather than a sum
and threshold. Inspired by this class of neurons, we introduce a RC
architecture with a reservoir of product nodes for time series computation. We
find that the product RC shows many properties of standard ESN such as
short-term memory and nonlinear capacity. On standard benchmarks for chaotic
prediction tasks, the product RC maintains the performance of a standard
nonlinear ESN while being more amenable to mathematical analysis. Our study
provides evidence that such networks are powerful in highly nonlinear tasks
owing to high-order statistics generated by the recurrent product node
reservoir.
| [
{
"version": "v1",
"created": "Tue, 3 Feb 2015 03:04:33 GMT"
},
{
"version": "v2",
"created": "Sun, 26 Apr 2015 00:13:03 GMT"
}
] | 2015-04-28T00:00:00 | [
[
"Goudarzi",
"Alireza",
""
],
[
"Shabani",
"Alireza",
""
],
[
"Stefanovic",
"Darko",
""
]
] | TITLE: Product Reservoir Computing: Time-Series Computation with Multiplicative
Neurons
ABSTRACT: Echo state networks (ESN), a type of reservoir computing (RC) architecture,
are efficient and accurate artificial neural systems for time series processing
and learning. An ESN consists of a core of recurrent neural networks, called a
reservoir, with a small number of tunable parameters to generate a
high-dimensional representation of an input, and a readout layer which is
easily trained using regression to produce a desired output from the reservoir
states. Certain computational tasks involve real-time calculation of high-order
time correlations, which requires nonlinear transformation either in the
reservoir or the readout layer. Traditional ESN employs a reservoir with
sigmoid or tanh function neurons. In contrast, some types of biological neurons
obey response curves that can be described as a product unit rather than a sum
and threshold. Inspired by this class of neurons, we introduce a RC
architecture with a reservoir of product nodes for time series computation. We
find that the product RC shows many properties of standard ESN such as
short-term memory and nonlinear capacity. On standard benchmarks for chaotic
prediction tasks, the product RC maintains the performance of a standard
nonlinear ESN while being more amenable to mathematical analysis. Our study
provides evidence that such networks are powerful in highly nonlinear tasks
owing to high-order statistics generated by the recurrent product node
reservoir.
| no_new_dataset | 0.950824 |
1502.03455 | Reza Farrahi Moghaddam | Vahid Asghari, Reza Farrahi Moghaddam, Mohamed Cheriet | Dynamic Bandwidth-Efficient BCube Topologies for Virtualized Data Center
Networks | 16 pages, 4 figures, and 4 tables | null | null | null | cs.NI cs.PF | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Network virtualization enables computing networks and data center (DC)
providers to manage their networking resources in a flexible manner using
software running on physical computers. In this paper, we address the existing
issues with the classic DC network topologies in virtualized environment, and
investigate a set of DC network topologies with the capability of providing
dynamic structures according to the service-level required by the active
traffic in a virtual DC network. In particular, we propose three main
approaches to modify the structure of a classic BCube topology as a topology
benchmark, and investigate their associated structural features and maximum
achievable interconnected bandwidth for different routing scenarios. Finally,
we run an extensive simulation program to check the performance of the proposed
modified topologies in a simulation environment which considers failure
analysis and also traffic congestion. Our simulation experiments, which are
consistent to our design goals, show the efficiency of the proposed modified
topologies comparing to the classic BCube in terms of bandwidth availability
and failure resiliency.
| [
{
"version": "v1",
"created": "Wed, 11 Feb 2015 21:12:11 GMT"
},
{
"version": "v2",
"created": "Wed, 15 Apr 2015 16:52:18 GMT"
},
{
"version": "v3",
"created": "Mon, 27 Apr 2015 19:59:57 GMT"
}
] | 2015-04-28T00:00:00 | [
[
"Asghari",
"Vahid",
""
],
[
"Moghaddam",
"Reza Farrahi",
""
],
[
"Cheriet",
"Mohamed",
""
]
] | TITLE: Dynamic Bandwidth-Efficient BCube Topologies for Virtualized Data Center
Networks
ABSTRACT: Network virtualization enables computing networks and data center (DC)
providers to manage their networking resources in a flexible manner using
software running on physical computers. In this paper, we address the existing
issues with the classic DC network topologies in virtualized environment, and
investigate a set of DC network topologies with the capability of providing
dynamic structures according to the service-level required by the active
traffic in a virtual DC network. In particular, we propose three main
approaches to modify the structure of a classic BCube topology as a topology
benchmark, and investigate their associated structural features and maximum
achievable interconnected bandwidth for different routing scenarios. Finally,
we run an extensive simulation program to check the performance of the proposed
modified topologies in a simulation environment which considers failure
analysis and also traffic congestion. Our simulation experiments, which are
consistent to our design goals, show the efficiency of the proposed modified
topologies comparing to the classic BCube in terms of bandwidth availability
and failure resiliency.
| no_new_dataset | 0.950595 |
1504.05070 | Han Zhao | Han Zhao, Zhengdong Lu, Pascal Poupart | Self-Adaptive Hierarchical Sentence Model | 8 pages, 7 figures, accepted as a full paper at IJCAI 2015 | null | null | null | cs.CL cs.LG cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The ability to accurately model a sentence at varying stages (e.g.,
word-phrase-sentence) plays a central role in natural language processing. As
an effort towards this goal we propose a self-adaptive hierarchical sentence
model (AdaSent). AdaSent effectively forms a hierarchy of representations from
words to phrases and then to sentences through recursive gated local
composition of adjacent segments. We design a competitive mechanism (through
gating networks) to allow the representations of the same sentence to be
engaged in a particular learning task (e.g., classification), therefore
effectively mitigating the gradient vanishing problem persistent in other
recursive models. Both qualitative and quantitative analysis shows that AdaSent
can automatically form and select the representations suitable for the task at
hand during training, yielding superior classification performance over
competitor models on 5 benchmark data sets.
| [
{
"version": "v1",
"created": "Mon, 20 Apr 2015 14:26:41 GMT"
},
{
"version": "v2",
"created": "Mon, 27 Apr 2015 17:12:56 GMT"
}
] | 2015-04-28T00:00:00 | [
[
"Zhao",
"Han",
""
],
[
"Lu",
"Zhengdong",
""
],
[
"Poupart",
"Pascal",
""
]
] | TITLE: Self-Adaptive Hierarchical Sentence Model
ABSTRACT: The ability to accurately model a sentence at varying stages (e.g.,
word-phrase-sentence) plays a central role in natural language processing. As
an effort towards this goal we propose a self-adaptive hierarchical sentence
model (AdaSent). AdaSent effectively forms a hierarchy of representations from
words to phrases and then to sentences through recursive gated local
composition of adjacent segments. We design a competitive mechanism (through
gating networks) to allow the representations of the same sentence to be
engaged in a particular learning task (e.g., classification), therefore
effectively mitigating the gradient vanishing problem persistent in other
recursive models. Both qualitative and quantitative analysis shows that AdaSent
can automatically form and select the representations suitable for the task at
hand during training, yielding superior classification performance over
competitor models on 5 benchmark data sets.
| no_new_dataset | 0.949949 |
1504.06658 | Arvind Neelakantan | Arvind Neelakantan and Ming-Wei Chang | Inferring Missing Entity Type Instances for Knowledge Base Completion:
New Dataset and Methods | North American Chapter of the Association for Computational
Linguistics- Human Language Technologies, 2015 | null | null | null | cs.CL stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Most of previous work in knowledge base (KB) completion has focused on the
problem of relation extraction. In this work, we focus on the task of inferring
missing entity type instances in a KB, a fundamental task for KB competition
yet receives little attention. Due to the novelty of this task, we construct a
large-scale dataset and design an automatic evaluation methodology. Our
knowledge base completion method uses information within the existing KB and
external information from Wikipedia. We show that individual methods trained
with a global objective that considers unobserved cells from both the entity
and the type side gives consistently higher quality predictions compared to
baseline methods. We also perform manual evaluation on a small subset of the
data to verify the effectiveness of our knowledge base completion methods and
the correctness of our proposed automatic evaluation method.
| [
{
"version": "v1",
"created": "Fri, 24 Apr 2015 22:32:40 GMT"
}
] | 2015-04-28T00:00:00 | [
[
"Neelakantan",
"Arvind",
""
],
[
"Chang",
"Ming-Wei",
""
]
] | TITLE: Inferring Missing Entity Type Instances for Knowledge Base Completion:
New Dataset and Methods
ABSTRACT: Most of previous work in knowledge base (KB) completion has focused on the
problem of relation extraction. In this work, we focus on the task of inferring
missing entity type instances in a KB, a fundamental task for KB competition
yet receives little attention. Due to the novelty of this task, we construct a
large-scale dataset and design an automatic evaluation methodology. Our
knowledge base completion method uses information within the existing KB and
external information from Wikipedia. We show that individual methods trained
with a global objective that considers unobserved cells from both the entity
and the type side gives consistently higher quality predictions compared to
baseline methods. We also perform manual evaluation on a small subset of the
data to verify the effectiveness of our knowledge base completion methods and
the correctness of our proposed automatic evaluation method.
| new_dataset | 0.961606 |
1504.06678 | Guo-Jun Qi | Vivek Veeriah and Naifan Zhuang and Guo-Jun Qi | Differential Recurrent Neural Networks for Action Recognition | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The long short-term memory (LSTM) neural network is capable of processing
complex sequential information since it utilizes special gating schemes for
learning representations from long input sequences. It has the potential to
model any sequential time-series data, where the current hidden state has to be
considered in the context of the past hidden states. This property makes LSTM
an ideal choice to learn the complex dynamics of various actions.
Unfortunately, the conventional LSTMs do not consider the impact of
spatio-temporal dynamics corresponding to the given salient motion patterns,
when they gate the information that ought to be memorized through time. To
address this problem, we propose a differential gating scheme for the LSTM
neural network, which emphasizes on the change in information gain caused by
the salient motions between the successive frames. This change in information
gain is quantified by Derivative of States (DoS), and thus the proposed LSTM
model is termed as differential Recurrent Neural Network (dRNN). We demonstrate
the effectiveness of the proposed model by automatically recognizing actions
from the real-world 2D and 3D human action datasets. Our study is one of the
first works towards demonstrating the potential of learning complex time-series
representations via high-order derivatives of states.
| [
{
"version": "v1",
"created": "Sat, 25 Apr 2015 03:59:14 GMT"
}
] | 2015-04-28T00:00:00 | [
[
"Veeriah",
"Vivek",
""
],
[
"Zhuang",
"Naifan",
""
],
[
"Qi",
"Guo-Jun",
""
]
] | TITLE: Differential Recurrent Neural Networks for Action Recognition
ABSTRACT: The long short-term memory (LSTM) neural network is capable of processing
complex sequential information since it utilizes special gating schemes for
learning representations from long input sequences. It has the potential to
model any sequential time-series data, where the current hidden state has to be
considered in the context of the past hidden states. This property makes LSTM
an ideal choice to learn the complex dynamics of various actions.
Unfortunately, the conventional LSTMs do not consider the impact of
spatio-temporal dynamics corresponding to the given salient motion patterns,
when they gate the information that ought to be memorized through time. To
address this problem, we propose a differential gating scheme for the LSTM
neural network, which emphasizes on the change in information gain caused by
the salient motions between the successive frames. This change in information
gain is quantified by Derivative of States (DoS), and thus the proposed LSTM
model is termed as differential Recurrent Neural Network (dRNN). We demonstrate
the effectiveness of the proposed model by automatically recognizing actions
from the real-world 2D and 3D human action datasets. Our study is one of the
first works towards demonstrating the potential of learning complex time-series
representations via high-order derivatives of states.
| no_new_dataset | 0.944022 |
1504.06798 | Mark Kozdoba | Mark Kozdoba and Shie Mannor | Overlapping Community Detection by Online Cluster Aggregation | null | null | null | null | cs.LG cs.SI physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present a new online algorithm for detecting overlapping communities. The
main ingredients are a modification of an online k-means algorithm and a new
approach to modelling overlap in communities. An evaluation on large benchmark
graphs shows that the quality of discovered communities compares favorably to
several methods in the recent literature, while the running time is
significantly improved.
| [
{
"version": "v1",
"created": "Sun, 26 Apr 2015 10:18:09 GMT"
}
] | 2015-04-28T00:00:00 | [
[
"Kozdoba",
"Mark",
""
],
[
"Mannor",
"Shie",
""
]
] | TITLE: Overlapping Community Detection by Online Cluster Aggregation
ABSTRACT: We present a new online algorithm for detecting overlapping communities. The
main ingredients are a modification of an online k-means algorithm and a new
approach to modelling overlap in communities. An evaluation on large benchmark
graphs shows that the quality of discovered communities compares favorably to
several methods in the recent literature, while the running time is
significantly improved.
| no_new_dataset | 0.9455 |
1504.06825 | Patrick O. Glauner | Patrick O. Glauner | Comparison of Training Methods for Deep Neural Networks | 50 pages, 13 figures | null | null | null | cs.LG cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This report describes the difficulties of training neural networks and in
particular deep neural networks. It then provides a literature review of
training methods for deep neural networks, with a focus on pre-training. It
focuses on Deep Belief Networks composed of Restricted Boltzmann Machines and
Stacked Autoencoders and provides an outreach on further and alternative
approaches. It also includes related practical recommendations from the
literature on training them. In the second part, initial experiments using some
of the covered methods are performed on two databases. In particular,
experiments are performed on the MNIST hand-written digit dataset and on facial
emotion data from a Kaggle competition. The results are discussed in the
context of results reported in other research papers. An error rate lower than
the best contribution to the Kaggle competition is achieved using an optimized
Stacked Autoencoder.
| [
{
"version": "v1",
"created": "Sun, 26 Apr 2015 14:09:17 GMT"
}
] | 2015-04-28T00:00:00 | [
[
"Glauner",
"Patrick O.",
""
]
] | TITLE: Comparison of Training Methods for Deep Neural Networks
ABSTRACT: This report describes the difficulties of training neural networks and in
particular deep neural networks. It then provides a literature review of
training methods for deep neural networks, with a focus on pre-training. It
focuses on Deep Belief Networks composed of Restricted Boltzmann Machines and
Stacked Autoencoders and provides an outreach on further and alternative
approaches. It also includes related practical recommendations from the
literature on training them. In the second part, initial experiments using some
of the covered methods are performed on two databases. In particular,
experiments are performed on the MNIST hand-written digit dataset and on facial
emotion data from a Kaggle competition. The results are discussed in the
context of results reported in other research papers. An error rate lower than
the best contribution to the Kaggle competition is achieved using an optimized
Stacked Autoencoder.
| no_new_dataset | 0.950134 |
1504.06833 | Michael Brim | Joel Reed, Jeremy Archuleta, Michael J. Brim, Joshua Lothian | Evaluating Dynamic File Striping For Lustre | International Workshop on the Lustre Ecosystem: Challenges and
Opportunities, March 2015, Annapolis MD | null | null | null | cs.OS cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We define dynamic striping as the ability to assign different Lustre striping
characteristics to contiguous segments of a file as it grows. In this paper, we
evaluate the effects of dynamic striping using a watermark-based strategy where
the stripe count or width is increased once a file's size exceeds one of the
chosen watermarks. To measure the performance of this strategy we used a
modified version of the IOR benchmark, a netflow analysis workload, and the
blastn algorithm from NCBI BLAST. The results indicate that dynamic striping is
beneficial to tasks with unpredictable data file size and large sequential
reads, but are less conclusive for workloads with significant random read
phases.
| [
{
"version": "v1",
"created": "Sun, 26 Apr 2015 14:44:00 GMT"
}
] | 2015-04-28T00:00:00 | [
[
"Reed",
"Joel",
""
],
[
"Archuleta",
"Jeremy",
""
],
[
"Brim",
"Michael J.",
""
],
[
"Lothian",
"Joshua",
""
]
] | TITLE: Evaluating Dynamic File Striping For Lustre
ABSTRACT: We define dynamic striping as the ability to assign different Lustre striping
characteristics to contiguous segments of a file as it grows. In this paper, we
evaluate the effects of dynamic striping using a watermark-based strategy where
the stripe count or width is increased once a file's size exceeds one of the
chosen watermarks. To measure the performance of this strategy we used a
modified version of the IOR benchmark, a netflow analysis workload, and the
blastn algorithm from NCBI BLAST. The results indicate that dynamic striping is
beneficial to tasks with unpredictable data file size and large sequential
reads, but are less conclusive for workloads with significant random read
phases.
| no_new_dataset | 0.9463 |
1504.06868 | Gordon Cormack | Gordon V. Cormack and Maura R. Grossman | Autonomy and Reliability of Continuous Active Learning for
Technology-Assisted Review | null | null | null | null | cs.IR cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We enhance the autonomy of the continuous active learning method shown by
Cormack and Grossman (SIGIR 2014) to be effective for technology-assisted
review, in which documents from a collection are retrieved and reviewed, using
relevance feedback, until substantially all of the relevant documents have been
reviewed. Autonomy is enhanced through the elimination of topic-specific and
dataset-specific tuning parameters, so that the sole input required by the user
is, at the outset, a short query, topic description, or single relevant
document; and, throughout the review, ongoing relevance assessments of the
retrieved documents. We show that our enhancements consistently yield superior
results to Cormack and Grossman's version of continuous active learning, and
other methods, not only on average, but on the vast majority of topics from
four separate sets of tasks: the legal datasets examined by Cormack and
Grossman, the Reuters RCV1-v2 subject categories, the TREC 6 AdHoc task, and
the construction of the TREC 2002 filtering test collection.
| [
{
"version": "v1",
"created": "Sun, 26 Apr 2015 19:19:01 GMT"
}
] | 2015-04-28T00:00:00 | [
[
"Cormack",
"Gordon V.",
""
],
[
"Grossman",
"Maura R.",
""
]
] | TITLE: Autonomy and Reliability of Continuous Active Learning for
Technology-Assisted Review
ABSTRACT: We enhance the autonomy of the continuous active learning method shown by
Cormack and Grossman (SIGIR 2014) to be effective for technology-assisted
review, in which documents from a collection are retrieved and reviewed, using
relevance feedback, until substantially all of the relevant documents have been
reviewed. Autonomy is enhanced through the elimination of topic-specific and
dataset-specific tuning parameters, so that the sole input required by the user
is, at the outset, a short query, topic description, or single relevant
document; and, throughout the review, ongoing relevance assessments of the
retrieved documents. We show that our enhancements consistently yield superior
results to Cormack and Grossman's version of continuous active learning, and
other methods, not only on average, but on the vast majority of topics from
four separate sets of tasks: the legal datasets examined by Cormack and
Grossman, the Reuters RCV1-v2 subject categories, the TREC 6 AdHoc task, and
the construction of the TREC 2002 filtering test collection.
| no_new_dataset | 0.949342 |
1504.06993 | Chao Dong | Chao Dong and Yubin Deng and Chen Change Loy and Xiaoou Tang | Compression Artifacts Reduction by a Deep Convolutional Network | 9 pages, 12 figures, conference | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Lossy compression introduces complex compression artifacts, particularly the
blocking artifacts, ringing effects and blurring. Existing algorithms either
focus on removing blocking artifacts and produce blurred output, or restores
sharpened images that are accompanied with ringing effects. Inspired by the
deep convolutional networks (DCN) on super-resolution, we formulate a compact
and efficient network for seamless attenuation of different compression
artifacts. We also demonstrate that a deeper model can be effectively trained
with the features learned in a shallow network. Following a similar "easy to
hard" idea, we systematically investigate several practical transfer settings
and show the effectiveness of transfer learning in low-level vision problems.
Our method shows superior performance than the state-of-the-arts both on the
benchmark datasets and the real-world use case (i.e. Twitter). In addition, we
show that our method can be applied as pre-processing to facilitate other
low-level vision routines when they take compressed images as input.
| [
{
"version": "v1",
"created": "Mon, 27 Apr 2015 09:30:30 GMT"
}
] | 2015-04-28T00:00:00 | [
[
"Dong",
"Chao",
""
],
[
"Deng",
"Yubin",
""
],
[
"Loy",
"Chen Change",
""
],
[
"Tang",
"Xiaoou",
""
]
] | TITLE: Compression Artifacts Reduction by a Deep Convolutional Network
ABSTRACT: Lossy compression introduces complex compression artifacts, particularly the
blocking artifacts, ringing effects and blurring. Existing algorithms either
focus on removing blocking artifacts and produce blurred output, or restores
sharpened images that are accompanied with ringing effects. Inspired by the
deep convolutional networks (DCN) on super-resolution, we formulate a compact
and efficient network for seamless attenuation of different compression
artifacts. We also demonstrate that a deeper model can be effectively trained
with the features learned in a shallow network. Following a similar "easy to
hard" idea, we systematically investigate several practical transfer settings
and show the effectiveness of transfer learning in low-level vision problems.
Our method shows superior performance than the state-of-the-arts both on the
benchmark datasets and the real-world use case (i.e. Twitter). In addition, we
show that our method can be applied as pre-processing to facilitate other
low-level vision routines when they take compressed images as input.
| no_new_dataset | 0.949716 |
1504.06998 | Mohammad Alaggan | Mohammad Alaggan, S\'ebastien Gambs, Anne-Marie Kermarrec | Heterogeneous Differential Privacy | 27 pages, 3 figures, presented at the first workshop on theory and
practice of differential privacy (TPDP 2015) at London, UK | null | null | null | cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The massive collection of personal data by personalization systems has
rendered the preservation of privacy of individuals more and more difficult.
Most of the proposed approaches to preserve privacy in personalization systems
usually address this issue uniformly across users, thus ignoring the fact that
users have different privacy attitudes and expectations (even among their own
personal data). In this paper, we propose to account for this non-uniformity of
privacy expectations by introducing the concept of heterogeneous differential
privacy. This notion captures both the variation of privacy expectations among
users as well as across different pieces of information related to the same
user. We also describe an explicit mechanism achieving heterogeneous
differential privacy, which is a modification of the Laplacian mechanism by
Dwork, McSherry, Nissim, and Smith. In a nutshell, this mechanism achieves
heterogeneous differential privacy by manipulating the sensitivity of the
function using a linear transformation on the input domain. Finally, we
evaluate on real datasets the impact of the proposed mechanism with respect to
a semantic clustering task. The results of our experiments demonstrate that
heterogeneous differential privacy can account for different privacy attitudes
while sustaining a good level of utility as measured by the recall for the
semantic clustering task.
| [
{
"version": "v1",
"created": "Mon, 27 Apr 2015 09:35:46 GMT"
}
] | 2015-04-28T00:00:00 | [
[
"Alaggan",
"Mohammad",
""
],
[
"Gambs",
"Sébastien",
""
],
[
"Kermarrec",
"Anne-Marie",
""
]
] | TITLE: Heterogeneous Differential Privacy
ABSTRACT: The massive collection of personal data by personalization systems has
rendered the preservation of privacy of individuals more and more difficult.
Most of the proposed approaches to preserve privacy in personalization systems
usually address this issue uniformly across users, thus ignoring the fact that
users have different privacy attitudes and expectations (even among their own
personal data). In this paper, we propose to account for this non-uniformity of
privacy expectations by introducing the concept of heterogeneous differential
privacy. This notion captures both the variation of privacy expectations among
users as well as across different pieces of information related to the same
user. We also describe an explicit mechanism achieving heterogeneous
differential privacy, which is a modification of the Laplacian mechanism by
Dwork, McSherry, Nissim, and Smith. In a nutshell, this mechanism achieves
heterogeneous differential privacy by manipulating the sensitivity of the
function using a linear transformation on the input domain. Finally, we
evaluate on real datasets the impact of the proposed mechanism with respect to
a semantic clustering task. The results of our experiments demonstrate that
heterogeneous differential privacy can account for different privacy attitudes
while sustaining a good level of utility as measured by the recall for the
semantic clustering task.
| no_new_dataset | 0.949153 |
1504.07004 | Moitreya Chatterjee | Moitreya Chatterjee and Anton Leuski | An Active Learning Based Approach For Effective Video Annotation And
Retrieval | 5 pages, 3 figures, Compressed version published at ACM ICMR 2015 | null | null | null | cs.MM cs.IR cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Conventional multimedia annotation/retrieval systems such as Normalized
Continuous Relevance Model (NormCRM) [16] require a fully labeled training data
for a good performance. Active Learning, by determining an order for labeling
the training data, allows for a good performance even before the training data
is fully annotated. In this work we propose an active learning algorithm, which
combines a novel measure of sample uncertainty with a novel clustering-based
approach for determining sample density and diversity and integrate it with
NormCRM. The clusters are also iteratively refined to ensure both feature and
label-level agreement among samples. We show that our approach outperforms
multiple baselines both on a recent, open character animation dataset and on
the popular TRECVID corpus at both the tasks of annotation and text-based
retrieval of videos.
| [
{
"version": "v1",
"created": "Mon, 27 Apr 2015 09:44:30 GMT"
}
] | 2015-04-28T00:00:00 | [
[
"Chatterjee",
"Moitreya",
""
],
[
"Leuski",
"Anton",
""
]
] | TITLE: An Active Learning Based Approach For Effective Video Annotation And
Retrieval
ABSTRACT: Conventional multimedia annotation/retrieval systems such as Normalized
Continuous Relevance Model (NormCRM) [16] require a fully labeled training data
for a good performance. Active Learning, by determining an order for labeling
the training data, allows for a good performance even before the training data
is fully annotated. In this work we propose an active learning algorithm, which
combines a novel measure of sample uncertainty with a novel clustering-based
approach for determining sample density and diversity and integrate it with
NormCRM. The clusters are also iteratively refined to ensure both feature and
label-level agreement among samples. We show that our approach outperforms
multiple baselines both on a recent, open character animation dataset and on
the popular TRECVID corpus at both the tasks of annotation and text-based
retrieval of videos.
| no_new_dataset | 0.9455 |
1504.07082 | Bharathi Pilar | B.H.Shekar, Bharathi Pilar | Shape Representation and Classification through Pattern Spectrum and
Local Binary Pattern - A Decision Level Fusion Approach | Fifth International Conference on Signals and Image Processing
(ICSIP) 2014 | null | 10.1109/ICSIP.2014.41 | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we present a decision level fused local Morphological Pattern
Spectrum(PS) and Local Binary Pattern (LBP) approach for an efficient shape
representation and classification. This method makes use of Earth Movers
Distance(EMD) as the measure in feature matching and shape retrieval process.
The proposed approach has three major phases : Feature Extraction, Construction
of hybrid spectrum knowledge base and Classification. In the first phase,
feature extraction of the shape is done using pattern spectrum and local binary
pattern method. In the second phase, the histograms of both pattern spectrum
and local binary pattern are fused and stored in the knowledge base. In the
third phase, the comparison and matching of the features, which are represented
in the form of histograms, is done using Earth Movers Distance(EMD) as metric.
The top-n shapes are retrieved for each query shape. The accuracy is tested by
means of standard Bulls eye score method. The experiments are conducted on
publicly available shape datasets like Kimia-99, Kimia-216 and MPEG-7. The
comparative study is also provided with the well known approaches to exhibit
the retrieval accuracy of the proposed approach.
| [
{
"version": "v1",
"created": "Mon, 27 Apr 2015 13:38:20 GMT"
}
] | 2015-04-28T00:00:00 | [
[
"Shekar",
"B. H.",
""
],
[
"Pilar",
"Bharathi",
""
]
] | TITLE: Shape Representation and Classification through Pattern Spectrum and
Local Binary Pattern - A Decision Level Fusion Approach
ABSTRACT: In this paper, we present a decision level fused local Morphological Pattern
Spectrum(PS) and Local Binary Pattern (LBP) approach for an efficient shape
representation and classification. This method makes use of Earth Movers
Distance(EMD) as the measure in feature matching and shape retrieval process.
The proposed approach has three major phases : Feature Extraction, Construction
of hybrid spectrum knowledge base and Classification. In the first phase,
feature extraction of the shape is done using pattern spectrum and local binary
pattern method. In the second phase, the histograms of both pattern spectrum
and local binary pattern are fused and stored in the knowledge base. In the
third phase, the comparison and matching of the features, which are represented
in the form of histograms, is done using Earth Movers Distance(EMD) as metric.
The top-n shapes are retrieved for each query shape. The accuracy is tested by
means of standard Bulls eye score method. The experiments are conducted on
publicly available shape datasets like Kimia-99, Kimia-216 and MPEG-7. The
comparative study is also provided with the well known approaches to exhibit
the retrieval accuracy of the proposed approach.
| no_new_dataset | 0.953362 |
1411.6228 | Pedro O. Pinheiro | Pedro O. Pinheiro and Ronan Collobert | From Image-level to Pixel-level Labeling with Convolutional Networks | CVPR2015 | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We are interested in inferring object segmentation by leveraging only object
class information, and by considering only minimal priors on the object
segmentation task. This problem could be viewed as a kind of weakly supervised
segmentation task, and naturally fits the Multiple Instance Learning (MIL)
framework: every training image is known to have (or not) at least one pixel
corresponding to the image class label, and the segmentation task can be
rewritten as inferring the pixels belonging to the class of the object (given
one image, and its object class). We propose a Convolutional Neural
Network-based model, which is constrained during training to put more weight on
pixels which are important for classifying the image. We show that at test
time, the model has learned to discriminate the right pixels well enough, such
that it performs very well on an existing segmentation benchmark, by adding
only few smoothing priors. Our system is trained using a subset of the Imagenet
dataset and the segmentation experiments are performed on the challenging
Pascal VOC dataset (with no fine-tuning of the model on Pascal VOC). Our model
beats the state of the art results in weakly supervised object segmentation
task by a large margin. We also compare the performance of our model with state
of the art fully-supervised segmentation approaches.
| [
{
"version": "v1",
"created": "Sun, 23 Nov 2014 12:06:36 GMT"
},
{
"version": "v2",
"created": "Mon, 26 Jan 2015 13:11:43 GMT"
},
{
"version": "v3",
"created": "Fri, 24 Apr 2015 07:26:01 GMT"
}
] | 2015-04-27T00:00:00 | [
[
"Pinheiro",
"Pedro O.",
""
],
[
"Collobert",
"Ronan",
""
]
] | TITLE: From Image-level to Pixel-level Labeling with Convolutional Networks
ABSTRACT: We are interested in inferring object segmentation by leveraging only object
class information, and by considering only minimal priors on the object
segmentation task. This problem could be viewed as a kind of weakly supervised
segmentation task, and naturally fits the Multiple Instance Learning (MIL)
framework: every training image is known to have (or not) at least one pixel
corresponding to the image class label, and the segmentation task can be
rewritten as inferring the pixels belonging to the class of the object (given
one image, and its object class). We propose a Convolutional Neural
Network-based model, which is constrained during training to put more weight on
pixels which are important for classifying the image. We show that at test
time, the model has learned to discriminate the right pixels well enough, such
that it performs very well on an existing segmentation benchmark, by adding
only few smoothing priors. Our system is trained using a subset of the Imagenet
dataset and the segmentation experiments are performed on the challenging
Pascal VOC dataset (with no fine-tuning of the model on Pascal VOC). Our model
beats the state of the art results in weakly supervised object segmentation
task by a large margin. We also compare the performance of our model with state
of the art fully-supervised segmentation approaches.
| no_new_dataset | 0.946843 |
1411.7883 | Luca Del Pero | Luca Del Pero, Susanna Ricco, Rahul Sukthankar, Vittorio Ferrari | Articulated motion discovery using pairs of trajectories | 10 pages, 5 figures, 2 tables | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose an unsupervised approach for discovering characteristic motion
patterns in videos of highly articulated objects performing natural, unscripted
behaviors, such as tigers in the wild. We discover consistent patterns in a
bottom-up manner by analyzing the relative displacements of large numbers of
ordered trajectory pairs through time, such that each trajectory is attached to
a different moving part on the object. The pairs of trajectories descriptor
relies entirely on motion and is more discriminative than state-of-the-art
features that employ single trajectories. Our method generates temporal video
intervals, each automatically trimmed to one instance of the discovered
behavior, and clusters them by type (e.g., running, turning head, drinking
water). We present experiments on two datasets: dogs from YouTube-Objects and a
new dataset of National Geographic tiger videos. Results confirm that our
proposed descriptor outperforms existing appearance- and trajectory-based
descriptors (e.g., HOG and DTFs) on both datasets and enables us to segment
unconstrained animal video into intervals containing single behaviors.
| [
{
"version": "v1",
"created": "Fri, 28 Nov 2014 14:43:03 GMT"
},
{
"version": "v2",
"created": "Tue, 16 Dec 2014 13:56:07 GMT"
},
{
"version": "v3",
"created": "Fri, 24 Apr 2015 15:29:06 GMT"
}
] | 2015-04-27T00:00:00 | [
[
"Del Pero",
"Luca",
""
],
[
"Ricco",
"Susanna",
""
],
[
"Sukthankar",
"Rahul",
""
],
[
"Ferrari",
"Vittorio",
""
]
] | TITLE: Articulated motion discovery using pairs of trajectories
ABSTRACT: We propose an unsupervised approach for discovering characteristic motion
patterns in videos of highly articulated objects performing natural, unscripted
behaviors, such as tigers in the wild. We discover consistent patterns in a
bottom-up manner by analyzing the relative displacements of large numbers of
ordered trajectory pairs through time, such that each trajectory is attached to
a different moving part on the object. The pairs of trajectories descriptor
relies entirely on motion and is more discriminative than state-of-the-art
features that employ single trajectories. Our method generates temporal video
intervals, each automatically trimmed to one instance of the discovered
behavior, and clusters them by type (e.g., running, turning head, drinking
water). We present experiments on two datasets: dogs from YouTube-Objects and a
new dataset of National Geographic tiger videos. Results confirm that our
proposed descriptor outperforms existing appearance- and trajectory-based
descriptors (e.g., HOG and DTFs) on both datasets and enables us to segment
unconstrained animal video into intervals containing single behaviors.
| new_dataset | 0.95803 |
1501.06783 | Cl\'ement Canonne | Cl\'ement L. Canonne | Big Data on the Rise: Testing monotonicity of distributions | null | null | null | null | cs.DS cs.DM math.PR math.ST stat.TH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The field of property testing of probability distributions, or distribution
testing, aims to provide fast and (most likely) correct answers to questions
pertaining to specific aspects of very large datasets. In this work, we
consider a property of particular interest, monotonicity of distributions. We
focus on the complexity of monotonicity testing across different models of
access to the distributions; and obtain results in these new settings that
differ significantly from the known bounds in the standard sampling model.
| [
{
"version": "v1",
"created": "Tue, 27 Jan 2015 15:02:35 GMT"
},
{
"version": "v2",
"created": "Thu, 23 Apr 2015 20:58:39 GMT"
}
] | 2015-04-27T00:00:00 | [
[
"Canonne",
"Clément L.",
""
]
] | TITLE: Big Data on the Rise: Testing monotonicity of distributions
ABSTRACT: The field of property testing of probability distributions, or distribution
testing, aims to provide fast and (most likely) correct answers to questions
pertaining to specific aspects of very large datasets. In this work, we
consider a property of particular interest, monotonicity of distributions. We
focus on the complexity of monotonicity testing across different models of
access to the distributions; and obtain results in these new settings that
differ significantly from the known bounds in the standard sampling model.
| no_new_dataset | 0.948394 |
1503.00783 | Davide Modolo | Davide Modolo, Alexander Vezhnevets, Olga Russakovsky, Vittorio
Ferrari | Joint calibration of Ensemble of Exemplar SVMs | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present a method for calibrating the Ensemble of Exemplar SVMs model.
Unlike the standard approach, which calibrates each SVM independently, our
method optimizes their joint performance as an ensemble. We formulate joint
calibration as a constrained optimization problem and devise an efficient
optimization algorithm to find its global optimum. The algorithm dynamically
discards parts of the solution space that cannot contain the optimum early on,
making the optimization computationally feasible. We experiment with EE-SVM
trained on state-of-the-art CNN descriptors. Results on the ILSVRC 2014 and
PASCAL VOC 2007 datasets show that (i) our joint calibration procedure
outperforms independent calibration on the task of classifying windows as
belonging to an object class or not; and (ii) this improved window classifier
leads to better performance on the object detection task.
| [
{
"version": "v1",
"created": "Mon, 2 Mar 2015 23:59:50 GMT"
},
{
"version": "v2",
"created": "Fri, 24 Apr 2015 16:42:51 GMT"
}
] | 2015-04-27T00:00:00 | [
[
"Modolo",
"Davide",
""
],
[
"Vezhnevets",
"Alexander",
""
],
[
"Russakovsky",
"Olga",
""
],
[
"Ferrari",
"Vittorio",
""
]
] | TITLE: Joint calibration of Ensemble of Exemplar SVMs
ABSTRACT: We present a method for calibrating the Ensemble of Exemplar SVMs model.
Unlike the standard approach, which calibrates each SVM independently, our
method optimizes their joint performance as an ensemble. We formulate joint
calibration as a constrained optimization problem and devise an efficient
optimization algorithm to find its global optimum. The algorithm dynamically
discards parts of the solution space that cannot contain the optimum early on,
making the optimization computationally feasible. We experiment with EE-SVM
trained on state-of-the-art CNN descriptors. Results on the ILSVRC 2014 and
PASCAL VOC 2007 datasets show that (i) our joint calibration procedure
outperforms independent calibration on the task of classifying windows as
belonging to an object class or not; and (ii) this improved window classifier
leads to better performance on the object detection task.
| no_new_dataset | 0.949576 |
1504.06394 | Jing Wang | Jing Wang and Jie Shen and Huan Xu | Social Trust Prediction via Max-norm Constrained 1-bit Matrix Completion | null | null | null | null | cs.SI cs.LG stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Social trust prediction addresses the significant problem of exploring
interactions among users in social networks. Naturally, this problem can be
formulated in the matrix completion framework, with each entry indicating the
trustness or distrustness. However, there are two challenges for the social
trust problem: 1) the observed data are with sign (1-bit) measurements; 2) they
are typically sampled non-uniformly. Most of the previous matrix completion
methods do not well handle the two issues. Motivated by the recent progress of
max-norm, we propose to solve the problem with a 1-bit max-norm constrained
formulation. Since max-norm is not easy to optimize, we utilize a reformulation
of max-norm which facilitates an efficient projected gradient decent algorithm.
We demonstrate the superiority of our formulation on two benchmark datasets.
| [
{
"version": "v1",
"created": "Fri, 24 Apr 2015 05:01:12 GMT"
}
] | 2015-04-27T00:00:00 | [
[
"Wang",
"Jing",
""
],
[
"Shen",
"Jie",
""
],
[
"Xu",
"Huan",
""
]
] | TITLE: Social Trust Prediction via Max-norm Constrained 1-bit Matrix Completion
ABSTRACT: Social trust prediction addresses the significant problem of exploring
interactions among users in social networks. Naturally, this problem can be
formulated in the matrix completion framework, with each entry indicating the
trustness or distrustness. However, there are two challenges for the social
trust problem: 1) the observed data are with sign (1-bit) measurements; 2) they
are typically sampled non-uniformly. Most of the previous matrix completion
methods do not well handle the two issues. Motivated by the recent progress of
max-norm, we propose to solve the problem with a 1-bit max-norm constrained
formulation. Since max-norm is not easy to optimize, we utilize a reformulation
of max-norm which facilitates an efficient projected gradient decent algorithm.
We demonstrate the superiority of our formulation on two benchmark datasets.
| no_new_dataset | 0.944382 |
1504.06434 | Jasper Uijlings | Jasper Uijlings and Vittorio Ferrari | Situational Object Boundary Detection | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Intuitively, the appearance of true object boundaries varies from image to
image. Hence the usual monolithic approach of training a single boundary
predictor and applying it to all images regardless of their content is bound to
be suboptimal. In this paper we therefore propose situational object boundary
detection: We first define a variety of situations and train a specialized
object boundary detector for each of them using [Dollar and Zitnick 2013]. Then
given a test image, we classify it into these situations using its context,
which we model by global image appearance. We apply the corresponding
situational object boundary detectors, and fuse them based on the
classification probabilities. In experiments on ImageNet, Microsoft COCO, and
Pascal VOC 2012 segmentation we show that our situational object boundary
detection gives significant improvements over a monolithic approach.
Additionally, our method substantially outperforms [Hariharan et al. 2011] on
semantic contour detection on their SBD dataset.
| [
{
"version": "v1",
"created": "Fri, 24 Apr 2015 09:15:33 GMT"
}
] | 2015-04-27T00:00:00 | [
[
"Uijlings",
"Jasper",
""
],
[
"Ferrari",
"Vittorio",
""
]
] | TITLE: Situational Object Boundary Detection
ABSTRACT: Intuitively, the appearance of true object boundaries varies from image to
image. Hence the usual monolithic approach of training a single boundary
predictor and applying it to all images regardless of their content is bound to
be suboptimal. In this paper we therefore propose situational object boundary
detection: We first define a variety of situations and train a specialized
object boundary detector for each of them using [Dollar and Zitnick 2013]. Then
given a test image, we classify it into these situations using its context,
which we model by global image appearance. We apply the corresponding
situational object boundary detectors, and fuse them based on the
classification probabilities. In experiments on ImageNet, Microsoft COCO, and
Pascal VOC 2012 segmentation we show that our situational object boundary
detection gives significant improvements over a monolithic approach.
Additionally, our method substantially outperforms [Hariharan et al. 2011] on
semantic contour detection on their SBD dataset.
| no_new_dataset | 0.948202 |
1504.06494 | Konstantinos Georgatzis | Konstantinos Georgatzis, Christopher K. I. Williams | Discriminative Switching Linear Dynamical Systems applied to
Physiological Condition Monitoring | null | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present a Discriminative Switching Linear Dynamical System (DSLDS) applied
to patient monitoring in Intensive Care Units (ICUs). Our approach is based on
identifying the state-of-health of a patient given their observed vital signs
using a discriminative classifier, and then inferring their underlying
physiological values conditioned on this status. The work builds on the
Factorial Switching Linear Dynamical System (FSLDS) (Quinn et al., 2009) which
has been previously used in a similar setting. The FSLDS is a generative model,
whereas the DSLDS is a discriminative model. We demonstrate on two real-world
datasets that the DSLDS is able to outperform the FSLDS in most cases of
interest, and that an $\alpha$-mixture of the two models achieves higher
performance than either of the two models separately.
| [
{
"version": "v1",
"created": "Fri, 24 Apr 2015 13:23:40 GMT"
}
] | 2015-04-27T00:00:00 | [
[
"Georgatzis",
"Konstantinos",
""
],
[
"Williams",
"Christopher K. I.",
""
]
] | TITLE: Discriminative Switching Linear Dynamical Systems applied to
Physiological Condition Monitoring
ABSTRACT: We present a Discriminative Switching Linear Dynamical System (DSLDS) applied
to patient monitoring in Intensive Care Units (ICUs). Our approach is based on
identifying the state-of-health of a patient given their observed vital signs
using a discriminative classifier, and then inferring their underlying
physiological values conditioned on this status. The work builds on the
Factorial Switching Linear Dynamical System (FSLDS) (Quinn et al., 2009) which
has been previously used in a similar setting. The FSLDS is a generative model,
whereas the DSLDS is a discriminative model. We demonstrate on two real-world
datasets that the DSLDS is able to outperform the FSLDS in most cases of
interest, and that an $\alpha$-mixture of the two models achieves higher
performance than either of the two models separately.
| no_new_dataset | 0.951142 |
1504.06587 | Dinesh Reddy Narapureddy | N. Dinesh Reddy, Prateek Singhal, K. Madhava Krishna | Semantic Motion Segmentation Using Dense CRF Formulation | null | null | 10.1145/2683483.2683539 | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | While the literature has been fairly dense in the areas of scene
understanding and semantic labeling there have been few works that make use of
motion cues to embellish semantic performance and vice versa. In this paper, we
address the problem of semantic motion segmentation, and show how semantic and
motion priors augments performance. We pro- pose an algorithm that jointly
infers the semantic class and motion labels of an object. Integrating semantic,
geometric and optical ow based constraints into a dense CRF-model we infer both
the object class as well as motion class, for each pixel. We found improvement
in performance using a fully connected CRF as compared to a standard
clique-based CRFs. For inference, we use a Mean Field approximation based
algorithm. Our method outperforms recently pro- posed motion detection
algorithms and also improves the semantic labeling compared to the
state-of-the-art Automatic Labeling Environment algorithm on the challenging
KITTI dataset especially for object classes such as pedestrians and cars that
are critical to an outdoor robotic navigation scenario.
| [
{
"version": "v1",
"created": "Fri, 24 Apr 2015 18:06:50 GMT"
}
] | 2015-04-27T00:00:00 | [
[
"Reddy",
"N. Dinesh",
""
],
[
"Singhal",
"Prateek",
""
],
[
"Krishna",
"K. Madhava",
""
]
] | TITLE: Semantic Motion Segmentation Using Dense CRF Formulation
ABSTRACT: While the literature has been fairly dense in the areas of scene
understanding and semantic labeling there have been few works that make use of
motion cues to embellish semantic performance and vice versa. In this paper, we
address the problem of semantic motion segmentation, and show how semantic and
motion priors augments performance. We pro- pose an algorithm that jointly
infers the semantic class and motion labels of an object. Integrating semantic,
geometric and optical ow based constraints into a dense CRF-model we infer both
the object class as well as motion class, for each pixel. We found improvement
in performance using a fully connected CRF as compared to a standard
clique-based CRFs. For inference, we use a Mean Field approximation based
algorithm. Our method outperforms recently pro- posed motion detection
algorithms and also improves the semantic labeling compared to the
state-of-the-art Automatic Labeling Environment algorithm on the challenging
KITTI dataset especially for object classes such as pedestrians and cars that
are critical to an outdoor robotic navigation scenario.
| no_new_dataset | 0.948489 |
1504.06591 | Konda Reddy Mopuri | Konda Reddy Mopuri and R. Venkatesh Babu | Object Level Deep Feature Pooling for Compact Image Representation | Deep Vision 2015 | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Convolutional Neural Network (CNN) features have been successfully employed
in recent works as an image descriptor for various vision tasks. But the
inability of the deep CNN features to exhibit invariance to geometric
transformations and object compositions poses a great challenge for image
search. In this work, we demonstrate the effectiveness of the objectness prior
over the deep CNN features of image regions for obtaining an invariant image
representation. The proposed approach represents the image as a vector of
pooled CNN features describing the underlying objects. This representation
provides robustness to spatial layout of the objects in the scene and achieves
invariance to general geometric transformations, such as translation, rotation
and scaling. The proposed approach also leads to a compact representation of
the scene, making each image occupy a smaller memory footprint. Experiments
show that the proposed representation achieves state of the art retrieval
results on a set of challenging benchmark image datasets, while maintaining a
compact representation.
| [
{
"version": "v1",
"created": "Fri, 24 Apr 2015 18:27:25 GMT"
}
] | 2015-04-27T00:00:00 | [
[
"Mopuri",
"Konda Reddy",
""
],
[
"Babu",
"R. Venkatesh",
""
]
] | TITLE: Object Level Deep Feature Pooling for Compact Image Representation
ABSTRACT: Convolutional Neural Network (CNN) features have been successfully employed
in recent works as an image descriptor for various vision tasks. But the
inability of the deep CNN features to exhibit invariance to geometric
transformations and object compositions poses a great challenge for image
search. In this work, we demonstrate the effectiveness of the objectness prior
over the deep CNN features of image regions for obtaining an invariant image
representation. The proposed approach represents the image as a vector of
pooled CNN features describing the underlying objects. This representation
provides robustness to spatial layout of the objects in the scene and achieves
invariance to general geometric transformations, such as translation, rotation
and scaling. The proposed approach also leads to a compact representation of
the scene, making each image occupy a smaller memory footprint. Experiments
show that the proposed representation achieves state of the art retrieval
results on a set of challenging benchmark image datasets, while maintaining a
compact representation.
| no_new_dataset | 0.950134 |
1405.0425 | Manlio De Domenico | M. De Domenico, V. Nicosia, A. Arenas, V. Latora | Layer aggregation and reducibility of multilayer interconnected networks | 6 pages, 4 figures | Nature Communications 6, 6864 (2015) | 10.1038/ncomms7864 | null | physics.soc-ph cond-mat.dis-nn cs.SI physics.bio-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Many complex systems can be represented as networks composed by distinct
layers, interacting and depending on each others. For example, in biology, a
good description of the full protein-protein interactome requires, for some
organisms, up to seven distinct network layers, with thousands of
protein-protein interactions each. A fundamental open question is then how much
information is really necessary to accurately represent the structure of a
multilayer complex system, and if and when some of the layers can indeed be
aggregated. Here we introduce a method, based on information theory, to reduce
the number of layers in multilayer networks, while minimizing information loss.
We validate our approach on a set of synthetic benchmarks, and prove its
applicability to an extended data set of protein-genetic interactions, showing
cases where a strong reduction is possible and cases where it is not. Using
this method we can describe complex systems with an optimal trade--off between
accuracy and complexity.
| [
{
"version": "v1",
"created": "Fri, 2 May 2014 15:23:34 GMT"
}
] | 2015-04-24T00:00:00 | [
[
"De Domenico",
"M.",
""
],
[
"Nicosia",
"V.",
""
],
[
"Arenas",
"A.",
""
],
[
"Latora",
"V.",
""
]
] | TITLE: Layer aggregation and reducibility of multilayer interconnected networks
ABSTRACT: Many complex systems can be represented as networks composed by distinct
layers, interacting and depending on each others. For example, in biology, a
good description of the full protein-protein interactome requires, for some
organisms, up to seven distinct network layers, with thousands of
protein-protein interactions each. A fundamental open question is then how much
information is really necessary to accurately represent the structure of a
multilayer complex system, and if and when some of the layers can indeed be
aggregated. Here we introduce a method, based on information theory, to reduce
the number of layers in multilayer networks, while minimizing information loss.
We validate our approach on a set of synthetic benchmarks, and prove its
applicability to an extended data set of protein-genetic interactions, showing
cases where a strong reduction is possible and cases where it is not. Using
this method we can describe complex systems with an optimal trade--off between
accuracy and complexity.
| no_new_dataset | 0.947284 |
1501.04587 | Naiyan Wang | Naiyan Wang, Siyi Li, Abhinav Gupta, Dit-Yan Yeung | Transferring Rich Feature Hierarchies for Robust Visual Tracking | null | null | null | null | cs.CV cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Convolutional neural network (CNN) models have demonstrated great success in
various computer vision tasks including image classification and object
detection. However, some equally important tasks such as visual tracking remain
relatively unexplored. We believe that a major hurdle that hinders the
application of CNN to visual tracking is the lack of properly labeled training
data. While existing applications that liberate the power of CNN often need an
enormous amount of training data in the order of millions, visual tracking
applications typically have only one labeled example in the first frame of each
video. We address this research issue here by pre-training a CNN offline and
then transferring the rich feature hierarchies learned to online tracking. The
CNN is also fine-tuned during online tracking to adapt to the appearance of the
tracked target specified in the first video frame. To fit the characteristics
of object tracking, we first pre-train the CNN to recognize what is an object,
and then propose to generate a probability map instead of producing a simple
class label. Using two challenging open benchmarks for performance evaluation,
our proposed tracker has demonstrated substantial improvement over other
state-of-the-art trackers.
| [
{
"version": "v1",
"created": "Mon, 19 Jan 2015 18:54:34 GMT"
},
{
"version": "v2",
"created": "Thu, 23 Apr 2015 06:18:09 GMT"
}
] | 2015-04-24T00:00:00 | [
[
"Wang",
"Naiyan",
""
],
[
"Li",
"Siyi",
""
],
[
"Gupta",
"Abhinav",
""
],
[
"Yeung",
"Dit-Yan",
""
]
] | TITLE: Transferring Rich Feature Hierarchies for Robust Visual Tracking
ABSTRACT: Convolutional neural network (CNN) models have demonstrated great success in
various computer vision tasks including image classification and object
detection. However, some equally important tasks such as visual tracking remain
relatively unexplored. We believe that a major hurdle that hinders the
application of CNN to visual tracking is the lack of properly labeled training
data. While existing applications that liberate the power of CNN often need an
enormous amount of training data in the order of millions, visual tracking
applications typically have only one labeled example in the first frame of each
video. We address this research issue here by pre-training a CNN offline and
then transferring the rich feature hierarchies learned to online tracking. The
CNN is also fine-tuned during online tracking to adapt to the appearance of the
tracked target specified in the first video frame. To fit the characteristics
of object tracking, we first pre-train the CNN to recognize what is an object,
and then propose to generate a probability map instead of producing a simple
class label. Using two challenging open benchmarks for performance evaluation,
our proposed tracker has demonstrated substantial improvement over other
state-of-the-art trackers.
| no_new_dataset | 0.947137 |
1504.05277 | Jianxin Wu | Bin-Bin Gao and Xiu-Shen Wei and Jianxin Wu and Weiyao Lin | Deep Spatial Pyramid: The Devil is Once Again in the Details | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we show that by carefully making good choices for various
detailed but important factors in a visual recognition framework using deep
learning features, one can achieve a simple, efficient, yet highly accurate
image classification system. We first list 5 important factors, based on both
existing researches and ideas proposed in this paper. These important detailed
factors include: 1) $\ell_2$ matrix normalization is more effective than
unnormalized or $\ell_2$ vector normalization, 2) the proposed natural deep
spatial pyramid is very effective, and 3) a very small $K$ in Fisher Vectors
surprisingly achieves higher accuracy than normally used large $K$ values.
Along with other choices (convolutional activations and multiple scales), the
proposed DSP framework is not only intuitive and efficient, but also achieves
excellent classification accuracy on many benchmark datasets. For example,
DSP's accuracy on SUN397 is 59.78%, significantly higher than previous
state-of-the-art (53.86%).
| [
{
"version": "v1",
"created": "Tue, 21 Apr 2015 02:13:44 GMT"
},
{
"version": "v2",
"created": "Thu, 23 Apr 2015 02:20:26 GMT"
}
] | 2015-04-24T00:00:00 | [
[
"Gao",
"Bin-Bin",
""
],
[
"Wei",
"Xiu-Shen",
""
],
[
"Wu",
"Jianxin",
""
],
[
"Lin",
"Weiyao",
""
]
] | TITLE: Deep Spatial Pyramid: The Devil is Once Again in the Details
ABSTRACT: In this paper we show that by carefully making good choices for various
detailed but important factors in a visual recognition framework using deep
learning features, one can achieve a simple, efficient, yet highly accurate
image classification system. We first list 5 important factors, based on both
existing researches and ideas proposed in this paper. These important detailed
factors include: 1) $\ell_2$ matrix normalization is more effective than
unnormalized or $\ell_2$ vector normalization, 2) the proposed natural deep
spatial pyramid is very effective, and 3) a very small $K$ in Fisher Vectors
surprisingly achieves higher accuracy than normally used large $K$ values.
Along with other choices (convolutional activations and multiple scales), the
proposed DSP framework is not only intuitive and efficient, but also achieves
excellent classification accuracy on many benchmark datasets. For example,
DSP's accuracy on SUN397 is 59.78%, significantly higher than previous
state-of-the-art (53.86%).
| no_new_dataset | 0.949809 |
1504.05997 | Dong Su | Dong Su, Jianneng Cao, Ninghui Li | Differentially Private Projected Histograms of Multi-Attribute Data for
Classification | null | null | null | null | cs.CR | http://creativecommons.org/licenses/by/3.0/ | In this paper, we tackle the problem of constructing a differentially private
synopsis for the classification analyses. Several the state-of-the-art methods
follow the structure of existing classification algorithms and are all
iterative, which is suboptimal due to the locally optimal choices and the
over-divided privacy budget among many sequentially composed steps. Instead, we
propose a new approach, PrivPfC, a new differentially private method for
releasing data for classification. The key idea is to privately select an
optimal partition of the underlying dataset using the given privacy budget in
one step. Given one dataset and the privacy budget, PrivPfC constructs a pool
of candidate grids where the number of cells of each grid is under a data-aware
and privacy-budget-aware threshold. After that, PrivPfC selects an optimal grid
via the exponential mechanism by using a novel quality function which minimizes
the expected number of misclassified records on which a histogram classifier is
constructed using the published grid. Finally, PrivPfC injects noise into each
cell of the selected grid and releases the noisy grid as the private synopsis
of the data. If the size of the candidate grid pool is larger than the
processing capability threshold set by the data curator, we add a step in the
beginning of PrivPfC to prune the set of attributes privately. We introduce a
modified $\chi^2$ quality function with low sensitivity and use it to evaluate
an attribute's relevance to the classification label variable. Through
extensive experiments on real datasets, we demonstrate PrivPfC's superiority
over the state-of-the-art methods.
| [
{
"version": "v1",
"created": "Wed, 22 Apr 2015 22:20:26 GMT"
}
] | 2015-04-24T00:00:00 | [
[
"Su",
"Dong",
""
],
[
"Cao",
"Jianneng",
""
],
[
"Li",
"Ninghui",
""
]
] | TITLE: Differentially Private Projected Histograms of Multi-Attribute Data for
Classification
ABSTRACT: In this paper, we tackle the problem of constructing a differentially private
synopsis for the classification analyses. Several the state-of-the-art methods
follow the structure of existing classification algorithms and are all
iterative, which is suboptimal due to the locally optimal choices and the
over-divided privacy budget among many sequentially composed steps. Instead, we
propose a new approach, PrivPfC, a new differentially private method for
releasing data for classification. The key idea is to privately select an
optimal partition of the underlying dataset using the given privacy budget in
one step. Given one dataset and the privacy budget, PrivPfC constructs a pool
of candidate grids where the number of cells of each grid is under a data-aware
and privacy-budget-aware threshold. After that, PrivPfC selects an optimal grid
via the exponential mechanism by using a novel quality function which minimizes
the expected number of misclassified records on which a histogram classifier is
constructed using the published grid. Finally, PrivPfC injects noise into each
cell of the selected grid and releases the noisy grid as the private synopsis
of the data. If the size of the candidate grid pool is larger than the
processing capability threshold set by the data curator, we add a step in the
beginning of PrivPfC to prune the set of attributes privately. We introduce a
modified $\chi^2$ quality function with low sensitivity and use it to evaluate
an attribute's relevance to the classification label variable. Through
extensive experiments on real datasets, we demonstrate PrivPfC's superiority
over the state-of-the-art methods.
| no_new_dataset | 0.946695 |
1504.05998 | Dong Su | Dong Su, Jianneng Cao, Ninghui Li, Elisa Bertino, Hongxia Jin | Differentially Private $k$-Means Clustering | null | null | null | null | cs.CR | http://creativecommons.org/licenses/by/3.0/ | There are two broad approaches for differentially private data analysis. The
interactive approach aims at developing customized differentially private
algorithms for various data mining tasks. The non-interactive approach aims at
developing differentially private algorithms that can output a synopsis of the
input dataset, which can then be used to support various data mining tasks. In
this paper we study the tradeoff of interactive vs. non-interactive approaches
and propose a hybrid approach that combines interactive and non-interactive,
using $k$-means clustering as an example. In the hybrid approach to
differentially private $k$-means clustering, one first uses a non-interactive
mechanism to publish a synopsis of the input dataset, then applies the standard
$k$-means clustering algorithm to learn $k$ cluster centroids, and finally uses
an interactive approach to further improve these cluster centroids. We analyze
the error behavior of both non-interactive and interactive approaches and use
such analysis to decide how to allocate privacy budget between the
non-interactive step and the interactive step. Results from extensive
experiments support our analysis and demonstrate the effectiveness of our
approach.
| [
{
"version": "v1",
"created": "Wed, 22 Apr 2015 22:21:30 GMT"
}
] | 2015-04-24T00:00:00 | [
[
"Su",
"Dong",
""
],
[
"Cao",
"Jianneng",
""
],
[
"Li",
"Ninghui",
""
],
[
"Bertino",
"Elisa",
""
],
[
"Jin",
"Hongxia",
""
]
] | TITLE: Differentially Private $k$-Means Clustering
ABSTRACT: There are two broad approaches for differentially private data analysis. The
interactive approach aims at developing customized differentially private
algorithms for various data mining tasks. The non-interactive approach aims at
developing differentially private algorithms that can output a synopsis of the
input dataset, which can then be used to support various data mining tasks. In
this paper we study the tradeoff of interactive vs. non-interactive approaches
and propose a hybrid approach that combines interactive and non-interactive,
using $k$-means clustering as an example. In the hybrid approach to
differentially private $k$-means clustering, one first uses a non-interactive
mechanism to publish a synopsis of the input dataset, then applies the standard
$k$-means clustering algorithm to learn $k$ cluster centroids, and finally uses
an interactive approach to further improve these cluster centroids. We analyze
the error behavior of both non-interactive and interactive approaches and use
such analysis to decide how to allocate privacy budget between the
non-interactive step and the interactive step. Results from extensive
experiments support our analysis and demonstrate the effectiveness of our
approach.
| no_new_dataset | 0.947817 |
1504.06055 | Naiyan Wang | Naiyan Wang, Jianping Shi, Dit-Yan Yeung, Jiaya Jia | Understanding and Diagnosing Visual Tracking Systems | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Several benchmark datasets for visual tracking research have been proposed in
recent years. Despite their usefulness, whether they are sufficient for
understanding and diagnosing the strengths and weaknesses of different trackers
remains questionable. To address this issue, we propose a framework by breaking
a tracker down into five constituent parts, namely, motion model, feature
extractor, observation model, model updater, and ensemble post-processor. We
then conduct ablative experiments on each component to study how it affects the
overall result. Surprisingly, our findings are discrepant with some common
beliefs in the visual tracking research community. We find that the feature
extractor plays the most important role in a tracker. On the other hand,
although the observation model is the focus of many studies, we find that it
often brings no significant improvement. Moreover, the motion model and model
updater contain many details that could affect the result. Also, the ensemble
post-processor can improve the result substantially when the constituent
trackers have high diversity. Based on our findings, we put together some very
elementary building blocks to give a basic tracker which is competitive in
performance to the state-of-the-art trackers. We believe our framework can
provide a solid baseline when conducting controlled experiments for visual
tracking research.
| [
{
"version": "v1",
"created": "Thu, 23 Apr 2015 06:37:29 GMT"
}
] | 2015-04-24T00:00:00 | [
[
"Wang",
"Naiyan",
""
],
[
"Shi",
"Jianping",
""
],
[
"Yeung",
"Dit-Yan",
""
],
[
"Jia",
"Jiaya",
""
]
] | TITLE: Understanding and Diagnosing Visual Tracking Systems
ABSTRACT: Several benchmark datasets for visual tracking research have been proposed in
recent years. Despite their usefulness, whether they are sufficient for
understanding and diagnosing the strengths and weaknesses of different trackers
remains questionable. To address this issue, we propose a framework by breaking
a tracker down into five constituent parts, namely, motion model, feature
extractor, observation model, model updater, and ensemble post-processor. We
then conduct ablative experiments on each component to study how it affects the
overall result. Surprisingly, our findings are discrepant with some common
beliefs in the visual tracking research community. We find that the feature
extractor plays the most important role in a tracker. On the other hand,
although the observation model is the focus of many studies, we find that it
often brings no significant improvement. Moreover, the motion model and model
updater contain many details that could affect the result. Also, the ensemble
post-processor can improve the result substantially when the constituent
trackers have high diversity. Based on our findings, we put together some very
elementary building blocks to give a basic tracker which is competitive in
performance to the state-of-the-art trackers. We believe our framework can
provide a solid baseline when conducting controlled experiments for visual
tracking research.
| no_new_dataset | 0.943712 |
1504.06078 | Nicolas Turenne | Nicolas Turenne, Tien Phan | x.ent: R Package for Entities and Relations Extraction based on
Unsupervised Learning and Document Structure | null | null | null | null | cs.CL cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Relation extraction with accurate precision is still a challenge when
processing full text databases. We propose an approach based on cooccurrence
analysis in each document for which we used document organization to improve
accuracy of relation extraction. This approach is implemented in a R package
called \emph{x.ent}. Another facet of extraction relies on use of extracted
relation into a querying system for expert end-users. Two datasets had been
used. One of them gets interest from specialists of epidemiology in plant
health. For this dataset usage is dedicated to plant-disease exploration
through agricultural information news. An open-data platform exploits exports
from \emph{x.ent} and is publicly available.
| [
{
"version": "v1",
"created": "Thu, 23 Apr 2015 08:28:01 GMT"
}
] | 2015-04-24T00:00:00 | [
[
"Turenne",
"Nicolas",
""
],
[
"Phan",
"Tien",
""
]
] | TITLE: x.ent: R Package for Entities and Relations Extraction based on
Unsupervised Learning and Document Structure
ABSTRACT: Relation extraction with accurate precision is still a challenge when
processing full text databases. We propose an approach based on cooccurrence
analysis in each document for which we used document organization to improve
accuracy of relation extraction. This approach is implemented in a R package
called \emph{x.ent}. Another facet of extraction relies on use of extracted
relation into a querying system for expert end-users. Two datasets had been
used. One of them gets interest from specialists of epidemiology in plant
health. For this dataset usage is dedicated to plant-disease exploration
through agricultural information news. An open-data platform exploits exports
from \emph{x.ent} and is publicly available.
| no_new_dataset | 0.941007 |
1504.06133 | Anguelos Nicolaou | Anguelos Nicolaou, Andrew D. Bagdanov, Marcus Liwicki, Dimosthenis
Karatzas | Sparse Radial Sampling LBP for Writer Identification | Submitted to the 13th International Conference on Document Analysis
and Recognition (ICDAR 2015) | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we present the use of Sparse Radial Sampling Local Binary
Patterns, a variant of Local Binary Patterns (LBP) for text-as-texture
classification. By adapting and extending the standard LBP operator to the
particularities of text we get a generic text-as-texture classification scheme
and apply it to writer identification. In experiments on CVL and ICDAR 2013
datasets, the proposed feature-set demonstrates State-Of-the-Art (SOA)
performance. Among the SOA, the proposed method is the only one that is based
on dense extraction of a single local feature descriptor. This makes it fast
and applicable at the earliest stages in a DIA pipeline without the need for
segmentation, binarization, or extraction of multiple features.
| [
{
"version": "v1",
"created": "Thu, 23 Apr 2015 11:51:53 GMT"
}
] | 2015-04-24T00:00:00 | [
[
"Nicolaou",
"Anguelos",
""
],
[
"Bagdanov",
"Andrew D.",
""
],
[
"Liwicki",
"Marcus",
""
],
[
"Karatzas",
"Dimosthenis",
""
]
] | TITLE: Sparse Radial Sampling LBP for Writer Identification
ABSTRACT: In this paper we present the use of Sparse Radial Sampling Local Binary
Patterns, a variant of Local Binary Patterns (LBP) for text-as-texture
classification. By adapting and extending the standard LBP operator to the
particularities of text we get a generic text-as-texture classification scheme
and apply it to writer identification. In experiments on CVL and ICDAR 2013
datasets, the proposed feature-set demonstrates State-Of-the-Art (SOA)
performance. Among the SOA, the proposed method is the only one that is based
on dense extraction of a single local feature descriptor. This makes it fast
and applicable at the earliest stages in a DIA pipeline without the need for
segmentation, binarization, or extraction of multiple features.
| no_new_dataset | 0.953101 |
1504.06151 | Nauman Shahid | Nauman Shahid, Vassilis Kalofolias, Xavier Bresson, Michael Bronstein
and Pierre Vandergheynst | Robust Principal Component Analysis on Graphs | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Principal Component Analysis (PCA) is the most widely used tool for linear
dimensionality reduction and clustering. Still it is highly sensitive to
outliers and does not scale well with respect to the number of data samples.
Robust PCA solves the first issue with a sparse penalty term. The second issue
can be handled with the matrix factorization model, which is however
non-convex. Besides, PCA based clustering can also be enhanced by using a graph
of data similarity. In this article, we introduce a new model called "Robust
PCA on Graphs" which incorporates spectral graph regularization into the Robust
PCA framework. Our proposed model benefits from 1) the robustness of principal
components to occlusions and missing values, 2) enhanced low-rank recovery, 3)
improved clustering property due to the graph smoothness assumption on the
low-rank matrix, and 4) convexity of the resulting optimization problem.
Extensive experiments on 8 benchmark, 3 video and 2 artificial datasets with
corruptions clearly reveal that our model outperforms 10 other state-of-the-art
models in its clustering and low-rank recovery tasks.
| [
{
"version": "v1",
"created": "Thu, 23 Apr 2015 12:39:40 GMT"
}
] | 2015-04-24T00:00:00 | [
[
"Shahid",
"Nauman",
""
],
[
"Kalofolias",
"Vassilis",
""
],
[
"Bresson",
"Xavier",
""
],
[
"Bronstein",
"Michael",
""
],
[
"Vandergheynst",
"Pierre",
""
]
] | TITLE: Robust Principal Component Analysis on Graphs
ABSTRACT: Principal Component Analysis (PCA) is the most widely used tool for linear
dimensionality reduction and clustering. Still it is highly sensitive to
outliers and does not scale well with respect to the number of data samples.
Robust PCA solves the first issue with a sparse penalty term. The second issue
can be handled with the matrix factorization model, which is however
non-convex. Besides, PCA based clustering can also be enhanced by using a graph
of data similarity. In this article, we introduce a new model called "Robust
PCA on Graphs" which incorporates spectral graph regularization into the Robust
PCA framework. Our proposed model benefits from 1) the robustness of principal
components to occlusions and missing values, 2) enhanced low-rank recovery, 3)
improved clustering property due to the graph smoothness assumption on the
low-rank matrix, and 4) convexity of the resulting optimization problem.
Extensive experiments on 8 benchmark, 3 video and 2 artificial datasets with
corruptions clearly reveal that our model outperforms 10 other state-of-the-art
models in its clustering and low-rank recovery tasks.
| no_new_dataset | 0.951142 |
1504.06165 | Nitish Gupta | Nitish Gupta, Sameer Singh | Collectively Embedding Multi-Relational Data for Predicting User
Preferences | 10 pages, 5 figures | null | null | null | cs.LG cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Matrix factorization has found incredible success and widespread application
as a collaborative filtering based approach to recommendations. Unfortunately,
incorporating additional sources of evidence, especially ones that are
incomplete and noisy, is quite difficult to achieve in such models, however, is
often crucial for obtaining further gains in accuracy. For example, additional
information about businesses from reviews, categories, and attributes should be
leveraged for predicting user preferences, even though this information is
often inaccurate and partially-observed. Instead of creating customized methods
that are specific to each type of evidences, in this paper we present a generic
approach to factorization of relational data that collectively models all the
relations in the database. By learning a set of embeddings that are shared
across all the relations, the model is able to incorporate observed information
from all the relations, while also predicting all the relations of interest.
Our evaluation on multiple Amazon and Yelp datasets demonstrates effective
utilization of additional information for held-out preference prediction, but
further, we present accurate models even for the cold-starting businesses and
products for which we do not observe any ratings or reviews. We also illustrate
the capability of the model in imputing missing information and jointly
visualizing words, categories, and attribute factors.
| [
{
"version": "v1",
"created": "Thu, 23 Apr 2015 13:07:24 GMT"
}
] | 2015-04-24T00:00:00 | [
[
"Gupta",
"Nitish",
""
],
[
"Singh",
"Sameer",
""
]
] | TITLE: Collectively Embedding Multi-Relational Data for Predicting User
Preferences
ABSTRACT: Matrix factorization has found incredible success and widespread application
as a collaborative filtering based approach to recommendations. Unfortunately,
incorporating additional sources of evidence, especially ones that are
incomplete and noisy, is quite difficult to achieve in such models, however, is
often crucial for obtaining further gains in accuracy. For example, additional
information about businesses from reviews, categories, and attributes should be
leveraged for predicting user preferences, even though this information is
often inaccurate and partially-observed. Instead of creating customized methods
that are specific to each type of evidences, in this paper we present a generic
approach to factorization of relational data that collectively models all the
relations in the database. By learning a set of embeddings that are shared
across all the relations, the model is able to incorporate observed information
from all the relations, while also predicting all the relations of interest.
Our evaluation on multiple Amazon and Yelp datasets demonstrates effective
utilization of additional information for held-out preference prediction, but
further, we present accurate models even for the cold-starting businesses and
products for which we do not observe any ratings or reviews. We also illustrate
the capability of the model in imputing missing information and jointly
visualizing words, categories, and attribute factors.
| no_new_dataset | 0.9463 |
1504.06266 | Hamid Tizhoosh | Ahmed Othman, Hamid R. Tizhoosh, Farzad Khalvati | Evolving Fuzzy Image Segmentation with Self-Configuration | Benchmark data (35 breast ultrasound images with gold standard
segments) available; 11 pages, 4 algorithms, 6 figures, 5 tables; | null | null | null | cs.CV | http://creativecommons.org/licenses/by-nc-sa/3.0/ | Current image segmentation techniques usually require that the user tune
several parameters in order to obtain maximum segmentation accuracy, a
computationally inefficient approach, especially when a large number of images
must be processed sequentially in daily practice. The use of evolving fuzzy
systems for designing a method that automatically adjusts parameters to segment
medical images according to the quality expectation of expert users has been
proposed recently (Evolving fuzzy image segmentation EFIS). However, EFIS
suffers from a few limitations when used in practice mainly due to some fixed
parameters. For instance, EFIS depends on auto-detection of the object of
interest for feature calculation, a task that is highly application-dependent.
This shortcoming limits the applicability of EFIS, which was proposed with the
ultimate goal of offering a generic but adjustable segmentation scheme. In this
paper, a new version of EFIS is proposed to overcome these limitations. The new
EFIS, called self-configuring EFIS (SC-EFIS), uses available training data to
self-estimate the parameters that are fixed in EFIS. As well, the proposed
SC-EFIS relies on a feature selection process that does not require
auto-detection of an ROI. The proposed SC-EFIS was evaluated using the same
segmentation algorithms and the same dataset as for EFIS. The results show that
SC-EFIS can provide the same results as EFIS but with a higher level of
automation.
| [
{
"version": "v1",
"created": "Thu, 23 Apr 2015 17:23:09 GMT"
}
] | 2015-04-24T00:00:00 | [
[
"Othman",
"Ahmed",
""
],
[
"Tizhoosh",
"Hamid R.",
""
],
[
"Khalvati",
"Farzad",
""
]
] | TITLE: Evolving Fuzzy Image Segmentation with Self-Configuration
ABSTRACT: Current image segmentation techniques usually require that the user tune
several parameters in order to obtain maximum segmentation accuracy, a
computationally inefficient approach, especially when a large number of images
must be processed sequentially in daily practice. The use of evolving fuzzy
systems for designing a method that automatically adjusts parameters to segment
medical images according to the quality expectation of expert users has been
proposed recently (Evolving fuzzy image segmentation EFIS). However, EFIS
suffers from a few limitations when used in practice mainly due to some fixed
parameters. For instance, EFIS depends on auto-detection of the object of
interest for feature calculation, a task that is highly application-dependent.
This shortcoming limits the applicability of EFIS, which was proposed with the
ultimate goal of offering a generic but adjustable segmentation scheme. In this
paper, a new version of EFIS is proposed to overcome these limitations. The new
EFIS, called self-configuring EFIS (SC-EFIS), uses available training data to
self-estimate the parameters that are fixed in EFIS. As well, the proposed
SC-EFIS relies on a feature selection process that does not require
auto-detection of an ROI. The proposed SC-EFIS was evaluated using the same
segmentation algorithms and the same dataset as for EFIS. The results show that
SC-EFIS can provide the same results as EFIS but with a higher level of
automation.
| no_new_dataset | 0.950732 |
1504.05451 | Jing Yang | Qingshan Liu, Jing Yang, Kaihua Zhang, Yi Wu | Adaptive Compressive Tracking via Online Vector Boosting Feature
Selection | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Recently, the compressive tracking (CT) method has attracted much attention
due to its high efficiency, but it cannot well deal with the large scale target
appearance variations due to its data-independent random projection matrix that
results in less discriminative features. To address this issue, in this paper
we propose an adaptive CT approach, which selects the most discriminative
features to design an effective appearance model. Our method significantly
improves CT in three aspects: Firstly, the most discriminative features are
selected via an online vector boosting method. Secondly, the object
representation is updated in an effective online manner, which preserves the
stable features while filtering out the noisy ones. Finally, a simple and
effective trajectory rectification approach is adopted that can make the
estimated location more accurate. Extensive experiments on the CVPR2013
tracking benchmark demonstrate the superior performance of our algorithm
compared over state-of-the-art tracking algorithms.
| [
{
"version": "v1",
"created": "Tue, 21 Apr 2015 14:55:07 GMT"
},
{
"version": "v2",
"created": "Wed, 22 Apr 2015 01:27:08 GMT"
}
] | 2015-04-23T00:00:00 | [
[
"Liu",
"Qingshan",
""
],
[
"Yang",
"Jing",
""
],
[
"Zhang",
"Kaihua",
""
],
[
"Wu",
"Yi",
""
]
] | TITLE: Adaptive Compressive Tracking via Online Vector Boosting Feature
Selection
ABSTRACT: Recently, the compressive tracking (CT) method has attracted much attention
due to its high efficiency, but it cannot well deal with the large scale target
appearance variations due to its data-independent random projection matrix that
results in less discriminative features. To address this issue, in this paper
we propose an adaptive CT approach, which selects the most discriminative
features to design an effective appearance model. Our method significantly
improves CT in three aspects: Firstly, the most discriminative features are
selected via an online vector boosting method. Secondly, the object
representation is updated in an effective online manner, which preserves the
stable features while filtering out the noisy ones. Finally, a simple and
effective trajectory rectification approach is adopted that can make the
estimated location more accurate. Extensive experiments on the CVPR2013
tracking benchmark demonstrate the superior performance of our algorithm
compared over state-of-the-art tracking algorithms.
| no_new_dataset | 0.948632 |
1504.05766 | Muharrem D\"u\u{g}enci | Muharrem D\"u\u{g}enci | Honeybees-inspired heuristic algorithms for numerical optimisation | 17 pages, 3 Figures, 6 Tables | null | null | KU-IE-MD-001 | cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Swarm intelligence is all about developing collective behaviours to solve
complex, ill-structured and large-scale problems. Efficiency in collective
behaviours depends on how to harmonise the individual contributions so that a
complementary collective effort can be achieved to offer a useful solution. The
main points in organising the harmony remains as managing the diversification
and intensification actions appropriately, where the efficiency of collective
behaviours depends on blending these two actions appropriately. In this study,
two swarm intelligence algorithms inspired of natural honeybee colonies have
been overviewed with many respects and two new revisions and a hybrid version
have been studied to improve the efficiencies in solving numerical optimisation
problems, which are well-known hard benchmarks. Consequently, the revisions and
especially the hybrid algorithm proposed have outperformed the two original bee
algorithms in solving these very hard numerical optimisation benchmarks.
| [
{
"version": "v1",
"created": "Wed, 22 Apr 2015 12:46:07 GMT"
}
] | 2015-04-23T00:00:00 | [
[
"Düğenci",
"Muharrem",
""
]
] | TITLE: Honeybees-inspired heuristic algorithms for numerical optimisation
ABSTRACT: Swarm intelligence is all about developing collective behaviours to solve
complex, ill-structured and large-scale problems. Efficiency in collective
behaviours depends on how to harmonise the individual contributions so that a
complementary collective effort can be achieved to offer a useful solution. The
main points in organising the harmony remains as managing the diversification
and intensification actions appropriately, where the efficiency of collective
behaviours depends on blending these two actions appropriately. In this study,
two swarm intelligence algorithms inspired of natural honeybee colonies have
been overviewed with many respects and two new revisions and a hybrid version
have been studied to improve the efficiencies in solving numerical optimisation
problems, which are well-known hard benchmarks. Consequently, the revisions and
especially the hybrid algorithm proposed have outperformed the two original bee
algorithms in solving these very hard numerical optimisation benchmarks.
| no_new_dataset | 0.943919 |
1504.05809 | Xianbiao Qi | Xianbiao Qi, Guoying Zhao, Linlin Shen, Qingquan Li, Matti Pietikainen | LOAD: Local Orientation Adaptive Descriptor for Texture and Material
Classification | 13 pages, 7 figures | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we propose a novel local feature, called Local Orientation
Adaptive Descriptor (LOAD), to capture regional texture in an image. In LOAD,
we proposed to define point description on an Adaptive Coordinate System (ACS),
adopt a binary sequence descriptor to capture relationships between one point
and its neighbors and use multi-scale strategy to enhance the discriminative
power of the descriptor. The proposed LOAD enjoys not only discriminative power
to capture the texture information, but also has strong robustness to
illumination variation and image rotation. Extensive experiments on benchmark
data sets of texture classification and real-world material recognition show
that the proposed LOAD yields the state-of-the-art performance. It is worth to
mention that we achieve a 65.4\% classification accuracy-- which is, to the
best of our knowledge, the highest record by far --on Flickr Material Database
by using a single feature. Moreover, by combining LOAD with the feature
extracted by Convolutional Neural Networks (CNN), we obtain significantly
better performance than both the LOAD and CNN. This result confirms that the
LOAD is complementary to the learning-based features.
| [
{
"version": "v1",
"created": "Wed, 22 Apr 2015 13:59:49 GMT"
}
] | 2015-04-23T00:00:00 | [
[
"Qi",
"Xianbiao",
""
],
[
"Zhao",
"Guoying",
""
],
[
"Shen",
"Linlin",
""
],
[
"Li",
"Qingquan",
""
],
[
"Pietikainen",
"Matti",
""
]
] | TITLE: LOAD: Local Orientation Adaptive Descriptor for Texture and Material
Classification
ABSTRACT: In this paper, we propose a novel local feature, called Local Orientation
Adaptive Descriptor (LOAD), to capture regional texture in an image. In LOAD,
we proposed to define point description on an Adaptive Coordinate System (ACS),
adopt a binary sequence descriptor to capture relationships between one point
and its neighbors and use multi-scale strategy to enhance the discriminative
power of the descriptor. The proposed LOAD enjoys not only discriminative power
to capture the texture information, but also has strong robustness to
illumination variation and image rotation. Extensive experiments on benchmark
data sets of texture classification and real-world material recognition show
that the proposed LOAD yields the state-of-the-art performance. It is worth to
mention that we achieve a 65.4\% classification accuracy-- which is, to the
best of our knowledge, the highest record by far --on Flickr Material Database
by using a single feature. Moreover, by combining LOAD with the feature
extracted by Convolutional Neural Networks (CNN), we obtain significantly
better performance than both the LOAD and CNN. This result confirms that the
LOAD is complementary to the learning-based features.
| no_new_dataset | 0.952131 |
1504.05880 | Shiva Kasiviswanathan | Shiva Prasad Kasiviswanathan and Mark Rudelson | Spectral Norm of Random Kernel Matrices with Applications to Privacy | 16 pages, 1 Figure | null | null | null | stat.ML cs.CR cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Kernel methods are an extremely popular set of techniques used for many
important machine learning and data analysis applications. In addition to
having good practical performances, these methods are supported by a
well-developed theory. Kernel methods use an implicit mapping of the input data
into a high dimensional feature space defined by a kernel function, i.e., a
function returning the inner product between the images of two data points in
the feature space. Central to any kernel method is the kernel matrix, which is
built by evaluating the kernel function on a given sample dataset.
In this paper, we initiate the study of non-asymptotic spectral theory of
random kernel matrices. These are n x n random matrices whose (i,j)th entry is
obtained by evaluating the kernel function on $x_i$ and $x_j$, where
$x_1,...,x_n$ are a set of n independent random high-dimensional vectors. Our
main contribution is to obtain tight upper bounds on the spectral norm (largest
eigenvalue) of random kernel matrices constructed by commonly used kernel
functions based on polynomials and Gaussian radial basis.
As an application of these results, we provide lower bounds on the distortion
needed for releasing the coefficients of kernel ridge regression under
attribute privacy, a general privacy notion which captures a large class of
privacy definitions. Kernel ridge regression is standard method for performing
non-parametric regression that regularly outperforms traditional regression
approaches in various domains. Our privacy distortion lower bounds are the
first for any kernel technique, and our analysis assumes realistic scenarios
for the input, unlike all previous lower bounds for other release problems
which only hold under very restrictive input settings.
| [
{
"version": "v1",
"created": "Wed, 22 Apr 2015 16:54:48 GMT"
}
] | 2015-04-23T00:00:00 | [
[
"Kasiviswanathan",
"Shiva Prasad",
""
],
[
"Rudelson",
"Mark",
""
]
] | TITLE: Spectral Norm of Random Kernel Matrices with Applications to Privacy
ABSTRACT: Kernel methods are an extremely popular set of techniques used for many
important machine learning and data analysis applications. In addition to
having good practical performances, these methods are supported by a
well-developed theory. Kernel methods use an implicit mapping of the input data
into a high dimensional feature space defined by a kernel function, i.e., a
function returning the inner product between the images of two data points in
the feature space. Central to any kernel method is the kernel matrix, which is
built by evaluating the kernel function on a given sample dataset.
In this paper, we initiate the study of non-asymptotic spectral theory of
random kernel matrices. These are n x n random matrices whose (i,j)th entry is
obtained by evaluating the kernel function on $x_i$ and $x_j$, where
$x_1,...,x_n$ are a set of n independent random high-dimensional vectors. Our
main contribution is to obtain tight upper bounds on the spectral norm (largest
eigenvalue) of random kernel matrices constructed by commonly used kernel
functions based on polynomials and Gaussian radial basis.
As an application of these results, we provide lower bounds on the distortion
needed for releasing the coefficients of kernel ridge regression under
attribute privacy, a general privacy notion which captures a large class of
privacy definitions. Kernel ridge regression is standard method for performing
non-parametric regression that regularly outperforms traditional regression
approaches in various domains. Our privacy distortion lower bounds are the
first for any kernel technique, and our analysis assumes realistic scenarios
for the input, unlike all previous lower bounds for other release problems
which only hold under very restrictive input settings.
| no_new_dataset | 0.946745 |
1411.4555 | Samy Bengio | Oriol Vinyals, Alexander Toshev, Samy Bengio, Dumitru Erhan | Show and Tell: A Neural Image Caption Generator | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Automatically describing the content of an image is a fundamental problem in
artificial intelligence that connects computer vision and natural language
processing. In this paper, we present a generative model based on a deep
recurrent architecture that combines recent advances in computer vision and
machine translation and that can be used to generate natural sentences
describing an image. The model is trained to maximize the likelihood of the
target description sentence given the training image. Experiments on several
datasets show the accuracy of the model and the fluency of the language it
learns solely from image descriptions. Our model is often quite accurate, which
we verify both qualitatively and quantitatively. For instance, while the
current state-of-the-art BLEU-1 score (the higher the better) on the Pascal
dataset is 25, our approach yields 59, to be compared to human performance
around 69. We also show BLEU-1 score improvements on Flickr30k, from 56 to 66,
and on SBU, from 19 to 28. Lastly, on the newly released COCO dataset, we
achieve a BLEU-4 of 27.7, which is the current state-of-the-art.
| [
{
"version": "v1",
"created": "Mon, 17 Nov 2014 17:15:41 GMT"
},
{
"version": "v2",
"created": "Mon, 20 Apr 2015 22:26:11 GMT"
}
] | 2015-04-22T00:00:00 | [
[
"Vinyals",
"Oriol",
""
],
[
"Toshev",
"Alexander",
""
],
[
"Bengio",
"Samy",
""
],
[
"Erhan",
"Dumitru",
""
]
] | TITLE: Show and Tell: A Neural Image Caption Generator
ABSTRACT: Automatically describing the content of an image is a fundamental problem in
artificial intelligence that connects computer vision and natural language
processing. In this paper, we present a generative model based on a deep
recurrent architecture that combines recent advances in computer vision and
machine translation and that can be used to generate natural sentences
describing an image. The model is trained to maximize the likelihood of the
target description sentence given the training image. Experiments on several
datasets show the accuracy of the model and the fluency of the language it
learns solely from image descriptions. Our model is often quite accurate, which
we verify both qualitatively and quantitatively. For instance, while the
current state-of-the-art BLEU-1 score (the higher the better) on the Pascal
dataset is 25, our approach yields 59, to be compared to human performance
around 69. We also show BLEU-1 score improvements on Flickr30k, from 56 to 66,
and on SBU, from 19 to 28. Lastly, on the newly released COCO dataset, we
achieve a BLEU-4 of 27.7, which is the current state-of-the-art.
| no_new_dataset | 0.936401 |
1412.4480 | Long Zheng | Long Zheng, Xiaofei Liao, Bingsheng He, Song Wu, Hai Jin | On Performance Debugging of Unnecessary Lock Contentions on Multicore
Processors: A Replay-based Approach | 18 pages, 19 figures, 3 tables | null | null | null | cs.PL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Locks have been widely used as an effective synchronization mechanism among
processes and threads. However, we observe that a large number of false
inter-thread dependencies (i.e., unnecessary lock contentions) exist during the
program execution on multicore processors, thereby incurring significant
performance overhead. This paper presents a performance debugging framework,
PERFPLAY, to facilitate a comprehensive and in-depth understanding of the
performance impact of unnecessary lock contentions. The core technique of our
debugging framework is trace replay. Specifically, PERFPLAY records the program
execution trace, on the basis of which the unnecessary lock contentions can be
identified through trace analysis. We then propose a novel technique of trace
transformation to transform these identified unnecessary lock contentions in
the original trace into the correct pattern as a new trace free of unnecessary
lock contentions. Through replaying both traces, PERFPLAY can quantify the
performance impact of unnecessary lock contentions. To demonstrate the
effectiveness of our debugging framework, we study five real-world programs and
PARSEC benchmarks. Our experimental results demonstrate the significant
performance overhead of unnecessary lock contentions, and the effectiveness of
PERFPLAY in identifying the performance critical unnecessary lock contentions
in real applications.
| [
{
"version": "v1",
"created": "Mon, 15 Dec 2014 07:22:40 GMT"
},
{
"version": "v2",
"created": "Tue, 21 Apr 2015 09:28:21 GMT"
}
] | 2015-04-22T00:00:00 | [
[
"Zheng",
"Long",
""
],
[
"Liao",
"Xiaofei",
""
],
[
"He",
"Bingsheng",
""
],
[
"Wu",
"Song",
""
],
[
"Jin",
"Hai",
""
]
] | TITLE: On Performance Debugging of Unnecessary Lock Contentions on Multicore
Processors: A Replay-based Approach
ABSTRACT: Locks have been widely used as an effective synchronization mechanism among
processes and threads. However, we observe that a large number of false
inter-thread dependencies (i.e., unnecessary lock contentions) exist during the
program execution on multicore processors, thereby incurring significant
performance overhead. This paper presents a performance debugging framework,
PERFPLAY, to facilitate a comprehensive and in-depth understanding of the
performance impact of unnecessary lock contentions. The core technique of our
debugging framework is trace replay. Specifically, PERFPLAY records the program
execution trace, on the basis of which the unnecessary lock contentions can be
identified through trace analysis. We then propose a novel technique of trace
transformation to transform these identified unnecessary lock contentions in
the original trace into the correct pattern as a new trace free of unnecessary
lock contentions. Through replaying both traces, PERFPLAY can quantify the
performance impact of unnecessary lock contentions. To demonstrate the
effectiveness of our debugging framework, we study five real-world programs and
PARSEC benchmarks. Our experimental results demonstrate the significant
performance overhead of unnecessary lock contentions, and the effectiveness of
PERFPLAY in identifying the performance critical unnecessary lock contentions
in real applications.
| no_new_dataset | 0.9357 |
1412.6830 | Forest Agostinelli | Forest Agostinelli, Matthew Hoffman, Peter Sadowski, Pierre Baldi | Learning Activation Functions to Improve Deep Neural Networks | Accepted as a workshop paper contribution at the International
Conference on Learning Representations (ICLR) 2015 | null | null | null | cs.NE cs.CV cs.LG stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Artificial neural networks typically have a fixed, non-linear activation
function at each neuron. We have designed a novel form of piecewise linear
activation function that is learned independently for each neuron using
gradient descent. With this adaptive activation function, we are able to
improve upon deep neural network architectures composed of static rectified
linear units, achieving state-of-the-art performance on CIFAR-10 (7.51%),
CIFAR-100 (30.83%), and a benchmark from high-energy physics involving Higgs
boson decay modes.
| [
{
"version": "v1",
"created": "Sun, 21 Dec 2014 20:20:21 GMT"
},
{
"version": "v2",
"created": "Fri, 27 Feb 2015 21:44:41 GMT"
},
{
"version": "v3",
"created": "Tue, 21 Apr 2015 08:05:02 GMT"
}
] | 2015-04-22T00:00:00 | [
[
"Agostinelli",
"Forest",
""
],
[
"Hoffman",
"Matthew",
""
],
[
"Sadowski",
"Peter",
""
],
[
"Baldi",
"Pierre",
""
]
] | TITLE: Learning Activation Functions to Improve Deep Neural Networks
ABSTRACT: Artificial neural networks typically have a fixed, non-linear activation
function at each neuron. We have designed a novel form of piecewise linear
activation function that is learned independently for each neuron using
gradient descent. With this adaptive activation function, we are able to
improve upon deep neural network architectures composed of static rectified
linear units, achieving state-of-the-art performance on CIFAR-10 (7.51%),
CIFAR-100 (30.83%), and a benchmark from high-energy physics involving Higgs
boson decay modes.
| no_new_dataset | 0.947769 |
1502.02710 | Nikos Karampatziakis | Nikos Karampatziakis, Paul Mineiro | Scalable Multilabel Prediction via Randomized Methods | null | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Modeling the dependence between outputs is a fundamental challenge in
multilabel classification. In this work we show that a generic regularized
nonlinearity mapping independent predictions to joint predictions is sufficient
to achieve state-of-the-art performance on a variety of benchmark problems.
Crucially, we compute the joint predictions without ever obtaining any
independent predictions, while incorporating low-rank and smoothness
regularization. We achieve this by leveraging randomized algorithms for matrix
decomposition and kernel approximation. Furthermore, our techniques are
applicable to the multiclass setting. We apply our method to a variety of
multiclass and multilabel data sets, obtaining state-of-the-art results.
| [
{
"version": "v1",
"created": "Mon, 9 Feb 2015 22:18:26 GMT"
},
{
"version": "v2",
"created": "Mon, 20 Apr 2015 21:08:19 GMT"
}
] | 2015-04-22T00:00:00 | [
[
"Karampatziakis",
"Nikos",
""
],
[
"Mineiro",
"Paul",
""
]
] | TITLE: Scalable Multilabel Prediction via Randomized Methods
ABSTRACT: Modeling the dependence between outputs is a fundamental challenge in
multilabel classification. In this work we show that a generic regularized
nonlinearity mapping independent predictions to joint predictions is sufficient
to achieve state-of-the-art performance on a variety of benchmark problems.
Crucially, we compute the joint predictions without ever obtaining any
independent predictions, while incorporating low-rank and smoothness
regularization. We achieve this by leveraging randomized algorithms for matrix
decomposition and kernel approximation. Furthermore, our techniques are
applicable to the multiclass setting. We apply our method to a variety of
multiclass and multilabel data sets, obtaining state-of-the-art results.
| no_new_dataset | 0.94868 |
1502.02766 | Sachin Sudhakar Farfade | Sachin Sudhakar Farfade, Mohammad Saberian, Li-Jia Li | Multi-view Face Detection Using Deep Convolutional Neural Networks | in International Conference on Multimedia Retrieval 2015 (ICMR) | null | null | null | cs.CV | http://creativecommons.org/licenses/by-nc-sa/3.0/ | In this paper we consider the problem of multi-view face detection. While
there has been significant research on this problem, current state-of-the-art
approaches for this task require annotation of facial landmarks, e.g. TSM [25],
or annotation of face poses [28, 22]. They also require training dozens of
models to fully capture faces in all orientations, e.g. 22 models in HeadHunter
method [22]. In this paper we propose Deep Dense Face Detector (DDFD), a method
that does not require pose/landmark annotation and is able to detect faces in a
wide range of orientations using a single model based on deep convolutional
neural networks. The proposed method has minimal complexity; unlike other
recent deep learning object detection methods [9], it does not require
additional components such as segmentation, bounding-box regression, or SVM
classifiers. Furthermore, we analyzed scores of the proposed face detector for
faces in different orientations and found that 1) the proposed method is able
to detect faces from different angles and can handle occlusion to some extent,
2) there seems to be a correlation between dis- tribution of positive examples
in the training set and scores of the proposed face detector. The latter
suggests that the proposed methods performance can be further improved by using
better sampling strategies and more sophisticated data augmentation techniques.
Evaluations on popular face detection benchmark datasets show that our
single-model face detector algorithm has similar or better performance compared
to the previous methods, which are more complex and require annotations of
either different poses or facial landmarks.
| [
{
"version": "v1",
"created": "Tue, 10 Feb 2015 03:15:21 GMT"
},
{
"version": "v2",
"created": "Wed, 4 Mar 2015 10:07:20 GMT"
},
{
"version": "v3",
"created": "Mon, 20 Apr 2015 20:18:57 GMT"
}
] | 2015-04-22T00:00:00 | [
[
"Farfade",
"Sachin Sudhakar",
""
],
[
"Saberian",
"Mohammad",
""
],
[
"Li",
"Li-Jia",
""
]
] | TITLE: Multi-view Face Detection Using Deep Convolutional Neural Networks
ABSTRACT: In this paper we consider the problem of multi-view face detection. While
there has been significant research on this problem, current state-of-the-art
approaches for this task require annotation of facial landmarks, e.g. TSM [25],
or annotation of face poses [28, 22]. They also require training dozens of
models to fully capture faces in all orientations, e.g. 22 models in HeadHunter
method [22]. In this paper we propose Deep Dense Face Detector (DDFD), a method
that does not require pose/landmark annotation and is able to detect faces in a
wide range of orientations using a single model based on deep convolutional
neural networks. The proposed method has minimal complexity; unlike other
recent deep learning object detection methods [9], it does not require
additional components such as segmentation, bounding-box regression, or SVM
classifiers. Furthermore, we analyzed scores of the proposed face detector for
faces in different orientations and found that 1) the proposed method is able
to detect faces from different angles and can handle occlusion to some extent,
2) there seems to be a correlation between dis- tribution of positive examples
in the training set and scores of the proposed face detector. The latter
suggests that the proposed methods performance can be further improved by using
better sampling strategies and more sophisticated data augmentation techniques.
Evaluations on popular face detection benchmark datasets show that our
single-model face detector algorithm has similar or better performance compared
to the previous methods, which are more complex and require annotations of
either different poses or facial landmarks.
| no_new_dataset | 0.944022 |
1504.05150 | Mark Kaminski | Mark Kaminski, Bernardo Cuenca Grau | Computing Horn Rewritings of Description Logics Ontologies | 15 pages. To appear in IJCAI-15 | null | null | null | cs.AI cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study the problem of rewriting an ontology O1 expressed in a DL L1 into an
ontology O2 in a Horn DL L2 such that O1 and O2 are equisatisfiable when
extended with an arbitrary dataset. Ontologies that admit such rewritings are
amenable to reasoning techniques ensuring tractability in data complexity.
After showing undecidability whenever L1 extends ALCF, we focus on devising
efficiently checkable conditions that ensure existence of a Horn rewriting. By
lifting existing techniques for rewriting Disjunctive Datalog programs into
plain Datalog to the case of arbitrary first-order programs with function
symbols, we identify a class of ontologies that admit Horn rewritings of
polynomial size. Our experiments indicate that many real-world ontologies
satisfy our sufficient conditions and thus admit polynomial Horn rewritings.
| [
{
"version": "v1",
"created": "Mon, 20 Apr 2015 18:39:27 GMT"
},
{
"version": "v2",
"created": "Tue, 21 Apr 2015 10:59:25 GMT"
}
] | 2015-04-22T00:00:00 | [
[
"Kaminski",
"Mark",
""
],
[
"Grau",
"Bernardo Cuenca",
""
]
] | TITLE: Computing Horn Rewritings of Description Logics Ontologies
ABSTRACT: We study the problem of rewriting an ontology O1 expressed in a DL L1 into an
ontology O2 in a Horn DL L2 such that O1 and O2 are equisatisfiable when
extended with an arbitrary dataset. Ontologies that admit such rewritings are
amenable to reasoning techniques ensuring tractability in data complexity.
After showing undecidability whenever L1 extends ALCF, we focus on devising
efficiently checkable conditions that ensure existence of a Horn rewriting. By
lifting existing techniques for rewriting Disjunctive Datalog programs into
plain Datalog to the case of arbitrary first-order programs with function
symbols, we identify a class of ontologies that admit Horn rewritings of
polynomial size. Our experiments indicate that many real-world ontologies
satisfy our sufficient conditions and thus admit polynomial Horn rewritings.
| no_new_dataset | 0.947381 |
1504.05208 | Niclas Blomberg | Niclas Blomberg, Cristian R. Rojas and Bo Wahlberg | Approximate Regularization Paths for Nuclear Norm Minimization Using
Singular Value Bounds -- With Implementation and Extended Appendix | Also in conference version submitted to Signal Processing Education
Workshop 2015 | null | null | null | cs.SY | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The widely used nuclear norm heuristic for rank minimization problems
introduces a regularization parameter which is difficult to tune. We have
recently proposed a method to approximate the regularization path, i.e., the
optimal solution as a function of the parameter, which requires solving the
problem only for a sparse set of points. In this paper, we extend the algorithm
to provide error bounds for the singular values of the approximation. We
exemplify the algorithms on large scale benchmark examples in model order
reduction. Here, the order of a dynamical system is reduced by means of
constrained minimization of the nuclear norm of a Hankel matrix.
| [
{
"version": "v1",
"created": "Mon, 20 Apr 2015 20:07:07 GMT"
}
] | 2015-04-22T00:00:00 | [
[
"Blomberg",
"Niclas",
""
],
[
"Rojas",
"Cristian R.",
""
],
[
"Wahlberg",
"Bo",
""
]
] | TITLE: Approximate Regularization Paths for Nuclear Norm Minimization Using
Singular Value Bounds -- With Implementation and Extended Appendix
ABSTRACT: The widely used nuclear norm heuristic for rank minimization problems
introduces a regularization parameter which is difficult to tune. We have
recently proposed a method to approximate the regularization path, i.e., the
optimal solution as a function of the parameter, which requires solving the
problem only for a sparse set of points. In this paper, we extend the algorithm
to provide error bounds for the singular values of the approximation. We
exemplify the algorithms on large scale benchmark examples in model order
reduction. Here, the order of a dynamical system is reduced by means of
constrained minimization of the nuclear norm of a Hankel matrix.
| no_new_dataset | 0.948489 |
1504.05473 | Yury Kashnitsky | Yury Kashnitsky, Dmitry I. Ignatov | Can FCA-based Recommender System Suggest a Proper Classifier? | 10 pages, 1 figure, 4 tables, ECAI 2014, workshop "What FCA can do
for "Artifficial Intelligence" | CEUR Workshop Proceedings, 1257, pp. 17-26 (2014) | null | null | cs.IR cs.LG stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The paper briefly introduces multiple classifier systems and describes a new
algorithm, which improves classification accuracy by means of recommendation of
a proper algorithm to an object classification. This recommendation is done
assuming that a classifier is likely to predict the label of the object
correctly if it has correctly classified its neighbors. The process of
assigning a classifier to each object is based on Formal Concept Analysis. We
explain the idea of the algorithm with a toy example and describe our first
experiments with real-world datasets.
| [
{
"version": "v1",
"created": "Tue, 21 Apr 2015 15:38:23 GMT"
}
] | 2015-04-22T00:00:00 | [
[
"Kashnitsky",
"Yury",
""
],
[
"Ignatov",
"Dmitry I.",
""
]
] | TITLE: Can FCA-based Recommender System Suggest a Proper Classifier?
ABSTRACT: The paper briefly introduces multiple classifier systems and describes a new
algorithm, which improves classification accuracy by means of recommendation of
a proper algorithm to an object classification. This recommendation is done
assuming that a classifier is likely to predict the label of the object
correctly if it has correctly classified its neighbors. The process of
assigning a classifier to each object is based on Formal Concept Analysis. We
explain the idea of the algorithm with a toy example and describe our first
experiments with real-world datasets.
| no_new_dataset | 0.950273 |
1504.05524 | Dan Oneata | Heng Wang, Dan Oneata, Jakob Verbeek, Cordelia Schmid | A robust and efficient video representation for action recognition | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper introduces a state-of-the-art video representation and applies it
to efficient action recognition and detection. We first propose to improve the
popular dense trajectory features by explicit camera motion estimation. More
specifically, we extract feature point matches between frames using SURF
descriptors and dense optical flow. The matches are used to estimate a
homography with RANSAC. To improve the robustness of homography estimation, a
human detector is employed to remove outlier matches from the human body as
human motion is not constrained by the camera. Trajectories consistent with the
homography are considered as due to camera motion, and thus removed. We also
use the homography to cancel out camera motion from the optical flow. This
results in significant improvement on motion-based HOF and MBH descriptors. We
further explore the recent Fisher vector as an alternative feature encoding
approach to the standard bag-of-words histogram, and consider different ways to
include spatial layout information in these encodings. We present a large and
varied set of evaluations, considering (i) classification of short basic
actions on six datasets, (ii) localization of such actions in feature-length
movies, and (iii) large-scale recognition of complex events. We find that our
improved trajectory features significantly outperform previous dense
trajectories, and that Fisher vectors are superior to bag-of-words encodings
for video recognition tasks. In all three tasks, we show substantial
improvements over the state-of-the-art results.
| [
{
"version": "v1",
"created": "Tue, 21 Apr 2015 17:44:07 GMT"
}
] | 2015-04-22T00:00:00 | [
[
"Wang",
"Heng",
""
],
[
"Oneata",
"Dan",
""
],
[
"Verbeek",
"Jakob",
""
],
[
"Schmid",
"Cordelia",
""
]
] | TITLE: A robust and efficient video representation for action recognition
ABSTRACT: This paper introduces a state-of-the-art video representation and applies it
to efficient action recognition and detection. We first propose to improve the
popular dense trajectory features by explicit camera motion estimation. More
specifically, we extract feature point matches between frames using SURF
descriptors and dense optical flow. The matches are used to estimate a
homography with RANSAC. To improve the robustness of homography estimation, a
human detector is employed to remove outlier matches from the human body as
human motion is not constrained by the camera. Trajectories consistent with the
homography are considered as due to camera motion, and thus removed. We also
use the homography to cancel out camera motion from the optical flow. This
results in significant improvement on motion-based HOF and MBH descriptors. We
further explore the recent Fisher vector as an alternative feature encoding
approach to the standard bag-of-words histogram, and consider different ways to
include spatial layout information in these encodings. We present a large and
varied set of evaluations, considering (i) classification of short basic
actions on six datasets, (ii) localization of such actions in feature-length
movies, and (iii) large-scale recognition of complex events. We find that our
improved trajectory features significantly outperform previous dense
trajectories, and that Fisher vectors are superior to bag-of-words encodings
for video recognition tasks. In all three tasks, we show substantial
improvements over the state-of-the-art results.
| no_new_dataset | 0.948917 |
1406.3407 | Gang Chen | Gang Chen and Sargur H. Srihari | Restricted Boltzmann Machine for Classification with Hierarchical
Correlated Prior | 13 pages, 5 figures | null | null | null | cs.LG | http://creativecommons.org/licenses/by-nc-sa/3.0/ | Restricted Boltzmann machines (RBM) and its variants have become hot research
topics recently, and widely applied to many classification problems, such as
character recognition and document categorization. Often, classification RBM
ignores the interclass relationship or prior knowledge of sharing information
among classes. In this paper, we are interested in RBM with the hierarchical
prior over classes. We assume parameters for nearby nodes are correlated in the
hierarchical tree, and further the parameters at each node of the tree be
orthogonal to those at its ancestors. We propose a hierarchical correlated RBM
for classification problem, which generalizes the classification RBM with
sharing information among different classes. In order to reduce the redundancy
between node parameters in the hierarchy, we also introduce orthogonal
restrictions to our objective function. We test our method on challenge
datasets, and show promising results compared to competitive baselines.
| [
{
"version": "v1",
"created": "Fri, 13 Jun 2014 02:19:26 GMT"
},
{
"version": "v2",
"created": "Mon, 20 Apr 2015 18:39:18 GMT"
}
] | 2015-04-21T00:00:00 | [
[
"Chen",
"Gang",
""
],
[
"Srihari",
"Sargur H.",
""
]
] | TITLE: Restricted Boltzmann Machine for Classification with Hierarchical
Correlated Prior
ABSTRACT: Restricted Boltzmann machines (RBM) and its variants have become hot research
topics recently, and widely applied to many classification problems, such as
character recognition and document categorization. Often, classification RBM
ignores the interclass relationship or prior knowledge of sharing information
among classes. In this paper, we are interested in RBM with the hierarchical
prior over classes. We assume parameters for nearby nodes are correlated in the
hierarchical tree, and further the parameters at each node of the tree be
orthogonal to those at its ancestors. We propose a hierarchical correlated RBM
for classification problem, which generalizes the classification RBM with
sharing information among different classes. In order to reduce the redundancy
between node parameters in the hierarchy, we also introduce orthogonal
restrictions to our objective function. We test our method on challenge
datasets, and show promising results compared to competitive baselines.
| no_new_dataset | 0.952486 |
1406.5266 | Yaniv Taigman | Yaniv Taigman, Ming Yang, Marc'Aurelio Ranzato, Lior Wolf | Web-Scale Training for Face Identification | null | null | null | null | cs.CV | http://creativecommons.org/licenses/by-nc-sa/3.0/ | Scaling machine learning methods to very large datasets has attracted
considerable attention in recent years, thanks to easy access to ubiquitous
sensing and data from the web. We study face recognition and show that three
distinct properties have surprising effects on the transferability of deep
convolutional networks (CNN): (1) The bottleneck of the network serves as an
important transfer learning regularizer, and (2) in contrast to the common
wisdom, performance saturation may exist in CNN's (as the number of training
samples grows); we propose a solution for alleviating this by replacing the
naive random subsampling of the training set with a bootstrapping process.
Moreover, (3) we find a link between the representation norm and the ability to
discriminate in a target domain, which sheds lights on how such networks
represent faces. Based on these discoveries, we are able to improve face
recognition accuracy on the widely used LFW benchmark, both in the verification
(1:1) and identification (1:N) protocols, and directly compare, for the first
time, with the state of the art Commercially-Off-The-Shelf system and show a
sizable leap in performance.
| [
{
"version": "v1",
"created": "Fri, 20 Jun 2014 02:51:31 GMT"
},
{
"version": "v2",
"created": "Sat, 18 Apr 2015 09:18:19 GMT"
}
] | 2015-04-21T00:00:00 | [
[
"Taigman",
"Yaniv",
""
],
[
"Yang",
"Ming",
""
],
[
"Ranzato",
"Marc'Aurelio",
""
],
[
"Wolf",
"Lior",
""
]
] | TITLE: Web-Scale Training for Face Identification
ABSTRACT: Scaling machine learning methods to very large datasets has attracted
considerable attention in recent years, thanks to easy access to ubiquitous
sensing and data from the web. We study face recognition and show that three
distinct properties have surprising effects on the transferability of deep
convolutional networks (CNN): (1) The bottleneck of the network serves as an
important transfer learning regularizer, and (2) in contrast to the common
wisdom, performance saturation may exist in CNN's (as the number of training
samples grows); we propose a solution for alleviating this by replacing the
naive random subsampling of the training set with a bootstrapping process.
Moreover, (3) we find a link between the representation norm and the ability to
discriminate in a target domain, which sheds lights on how such networks
represent faces. Based on these discoveries, we are able to improve face
recognition accuracy on the widely used LFW benchmark, both in the verification
(1:1) and identification (1:N) protocols, and directly compare, for the first
time, with the state of the art Commercially-Off-The-Shelf system and show a
sizable leap in performance.
| no_new_dataset | 0.948346 |
1410.4355 | Erik Ferragut | Robert A. Bridges, John Collins, Erik M. Ferragut, Jason Laska, Blair
D. Sullivan | Multi-Level Anomaly Detection on Time-Varying Graph Data | 8 pages. Updated paper to address reviewer comments | null | null | null | cs.SI cs.LG stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This work presents a novel modeling and analysis framework for graph
sequences which addresses the challenge of detecting and contextualizing
anomalies in labelled, streaming graph data. We introduce a generalization of
the BTER model of Seshadhri et al. by adding flexibility to community
structure, and use this model to perform multi-scale graph anomaly detection.
Specifically, probability models describing coarse subgraphs are built by
aggregating probabilities at finer levels, and these closely related
hierarchical models simultaneously detect deviations from expectation. This
technique provides insight into a graph's structure and internal context that
may shed light on a detected event. Additionally, this multi-scale analysis
facilitates intuitive visualizations by allowing users to narrow focus from an
anomalous graph to particular subgraphs or nodes causing the anomaly.
For evaluation, two hierarchical anomaly detectors are tested against a
baseline Gaussian method on a series of sampled graphs. We demonstrate that our
graph statistics-based approach outperforms both a distribution-based detector
and the baseline in a labeled setting with community structure, and it
accurately detects anomalies in synthetic and real-world datasets at the node,
subgraph, and graph levels. To illustrate the accessibility of information made
possible via this technique, the anomaly detector and an associated interactive
visualization tool are tested on NCAA football data, where teams and
conferences that moved within the league are identified with perfect recall,
and precision greater than 0.786.
| [
{
"version": "v1",
"created": "Thu, 16 Oct 2014 09:57:20 GMT"
},
{
"version": "v2",
"created": "Fri, 17 Oct 2014 19:08:37 GMT"
},
{
"version": "v3",
"created": "Fri, 17 Apr 2015 16:58:08 GMT"
},
{
"version": "v4",
"created": "Mon, 20 Apr 2015 11:55:53 GMT"
}
] | 2015-04-21T00:00:00 | [
[
"Bridges",
"Robert A.",
""
],
[
"Collins",
"John",
""
],
[
"Ferragut",
"Erik M.",
""
],
[
"Laska",
"Jason",
""
],
[
"Sullivan",
"Blair D.",
""
]
] | TITLE: Multi-Level Anomaly Detection on Time-Varying Graph Data
ABSTRACT: This work presents a novel modeling and analysis framework for graph
sequences which addresses the challenge of detecting and contextualizing
anomalies in labelled, streaming graph data. We introduce a generalization of
the BTER model of Seshadhri et al. by adding flexibility to community
structure, and use this model to perform multi-scale graph anomaly detection.
Specifically, probability models describing coarse subgraphs are built by
aggregating probabilities at finer levels, and these closely related
hierarchical models simultaneously detect deviations from expectation. This
technique provides insight into a graph's structure and internal context that
may shed light on a detected event. Additionally, this multi-scale analysis
facilitates intuitive visualizations by allowing users to narrow focus from an
anomalous graph to particular subgraphs or nodes causing the anomaly.
For evaluation, two hierarchical anomaly detectors are tested against a
baseline Gaussian method on a series of sampled graphs. We demonstrate that our
graph statistics-based approach outperforms both a distribution-based detector
and the baseline in a labeled setting with community structure, and it
accurately detects anomalies in synthetic and real-world datasets at the node,
subgraph, and graph levels. To illustrate the accessibility of information made
possible via this technique, the anomaly detector and an associated interactive
visualization tool are tested on NCAA football data, where teams and
conferences that moved within the league are identified with perfect recall,
and precision greater than 0.786.
| no_new_dataset | 0.950503 |
1412.6645 | Gabriel Synnaeve | Gabriel Synnaeve, Emmanuel Dupoux | Weakly Supervised Multi-Embeddings Learning of Acoustic Models | 6 pages, 3 figures | null | null | null | cs.SD cs.CL cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We trained a Siamese network with multi-task same/different information on a
speech dataset, and found that it was possible to share a network for both
tasks without a loss in performance. The first task was to discriminate between
two same or different words, and the second was to discriminate between two
same or different talkers.
| [
{
"version": "v1",
"created": "Sat, 20 Dec 2014 11:54:41 GMT"
},
{
"version": "v2",
"created": "Tue, 24 Feb 2015 10:09:09 GMT"
},
{
"version": "v3",
"created": "Mon, 20 Apr 2015 12:35:32 GMT"
}
] | 2015-04-21T00:00:00 | [
[
"Synnaeve",
"Gabriel",
""
],
[
"Dupoux",
"Emmanuel",
""
]
] | TITLE: Weakly Supervised Multi-Embeddings Learning of Acoustic Models
ABSTRACT: We trained a Siamese network with multi-task same/different information on a
speech dataset, and found that it was possible to share a network for both
tasks without a loss in performance. The first task was to discriminate between
two same or different words, and the second was to discriminate between two
same or different talkers.
| no_new_dataset | 0.945096 |
1501.06272 | Fang Zhao | Fang Zhao, Yongzhen Huang, Liang Wang, Tieniu Tan | Deep Semantic Ranking Based Hashing for Multi-Label Image Retrieval | CVPR 2015 | null | null | null | cs.CV cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | With the rapid growth of web images, hashing has received increasing
interests in large scale image retrieval. Research efforts have been devoted to
learning compact binary codes that preserve semantic similarity based on
labels. However, most of these hashing methods are designed to handle simple
binary similarity. The complex multilevel semantic structure of images
associated with multiple labels have not yet been well explored. Here we
propose a deep semantic ranking based method for learning hash functions that
preserve multilevel semantic similarity between multi-label images. In our
approach, deep convolutional neural network is incorporated into hash functions
to jointly learn feature representations and mappings from them to hash codes,
which avoids the limitation of semantic representation power of hand-crafted
features. Meanwhile, a ranking list that encodes the multilevel similarity
information is employed to guide the learning of such deep hash functions. An
effective scheme based on surrogate loss is used to solve the intractable
optimization problem of nonsmooth and multivariate ranking measures involved in
the learning procedure. Experimental results show the superiority of our
proposed approach over several state-of-the-art hashing methods in term of
ranking evaluation metrics when tested on multi-label image datasets.
| [
{
"version": "v1",
"created": "Mon, 26 Jan 2015 07:33:40 GMT"
},
{
"version": "v2",
"created": "Sun, 19 Apr 2015 04:28:58 GMT"
}
] | 2015-04-21T00:00:00 | [
[
"Zhao",
"Fang",
""
],
[
"Huang",
"Yongzhen",
""
],
[
"Wang",
"Liang",
""
],
[
"Tan",
"Tieniu",
""
]
] | TITLE: Deep Semantic Ranking Based Hashing for Multi-Label Image Retrieval
ABSTRACT: With the rapid growth of web images, hashing has received increasing
interests in large scale image retrieval. Research efforts have been devoted to
learning compact binary codes that preserve semantic similarity based on
labels. However, most of these hashing methods are designed to handle simple
binary similarity. The complex multilevel semantic structure of images
associated with multiple labels have not yet been well explored. Here we
propose a deep semantic ranking based method for learning hash functions that
preserve multilevel semantic similarity between multi-label images. In our
approach, deep convolutional neural network is incorporated into hash functions
to jointly learn feature representations and mappings from them to hash codes,
which avoids the limitation of semantic representation power of hand-crafted
features. Meanwhile, a ranking list that encodes the multilevel similarity
information is employed to guide the learning of such deep hash functions. An
effective scheme based on surrogate loss is used to solve the intractable
optimization problem of nonsmooth and multivariate ranking measures involved in
the learning procedure. Experimental results show the superiority of our
proposed approach over several state-of-the-art hashing methods in term of
ranking evaluation metrics when tested on multi-label image datasets.
| no_new_dataset | 0.947235 |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.