id
large_stringlengths
9
16
submitter
large_stringlengths
3
64
authors
large_stringlengths
5
20.7k
title
large_stringlengths
5
245
comments
large_stringlengths
1
482
journal-ref
large_stringlengths
4
382
doi
large_stringlengths
9
151
report-no
large_stringlengths
2
509
categories
large_stringlengths
5
78
license
large_stringclasses
9 values
abstract
large_stringlengths
83
3.55k
versions
large listlengths
1
21
update_date
timestamp[ms]date
2007-05-23 00:00:00
2025-04-25 00:00:00
authors_parsed
large listlengths
1
1.35k
prompt
large_stringlengths
166
3.64k
label
stringclasses
2 values
prob
float64
0.5
0.98
1504.00736
Liang Du
Liang Du, Yi-Dong Shen
Unsupervised Feature Selection with Adaptive Structure Learning
null
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The problem of feature selection has raised considerable interests in the past decade. Traditional unsupervised methods select the features which can faithfully preserve the intrinsic structures of data, where the intrinsic structures are estimated using all the input features of data. However, the estimated intrinsic structures are unreliable/inaccurate when the redundant and noisy features are not removed. Therefore, we face a dilemma here: one need the true structures of data to identify the informative features, and one need the informative features to accurately estimate the true structures of data. To address this, we propose a unified learning framework which performs structure learning and feature selection simultaneously. The structures are adaptively learned from the results of feature selection, and the informative features are reselected to preserve the refined structures of data. By leveraging the interactions between these two essential tasks, we are able to capture accurate structures and select more informative features. Experimental results on many benchmark data sets demonstrate that the proposed method outperforms many state of the art unsupervised feature selection methods.
[ { "version": "v1", "created": "Fri, 3 Apr 2015 03:21:15 GMT" } ]
2015-04-06T00:00:00
[ [ "Du", "Liang", "" ], [ "Shen", "Yi-Dong", "" ] ]
TITLE: Unsupervised Feature Selection with Adaptive Structure Learning ABSTRACT: The problem of feature selection has raised considerable interests in the past decade. Traditional unsupervised methods select the features which can faithfully preserve the intrinsic structures of data, where the intrinsic structures are estimated using all the input features of data. However, the estimated intrinsic structures are unreliable/inaccurate when the redundant and noisy features are not removed. Therefore, we face a dilemma here: one need the true structures of data to identify the informative features, and one need the informative features to accurately estimate the true structures of data. To address this, we propose a unified learning framework which performs structure learning and feature selection simultaneously. The structures are adaptively learned from the results of feature selection, and the informative features are reselected to preserve the refined structures of data. By leveraging the interactions between these two essential tasks, we are able to capture accurate structures and select more informative features. Experimental results on many benchmark data sets demonstrate that the proposed method outperforms many state of the art unsupervised feature selection methods.
no_new_dataset
0.942242
1412.5758
Zhangyang Wang
Zhangyang Wang, Jianchao Yang, Hailin Jin, Eli Shechtman, Aseem Agarwala, Jonathan Brandt, Thomas S. Huang
Decomposition-Based Domain Adaptation for Real-World Font Recognition
This paper has been withdrawn by the author due to project concerns
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a domain adaption framework to address a domain mismatch between synthetic training and real-world testing data. We demonstrate our method on a challenging fine-grain classification problem: recognizing a font style from an image of text. In this task, it is very easy to generate lots of rendered font examples but very hard to obtain real-world labeled images. This real-to-synthetic domain gap caused poor generalization to new real data in previous font recognition methods (Chen et al. (2014)). In this paper, we introduce a Convolutional Neural Network decomposition approach, leveraging a large training corpus of synthetic data to obtain effective features for classification. This is done using an adaptation technique based on a Stacked Convolutional Auto-Encoder that exploits a large collection of unlabeled real-world text images combined with synthetic data preprocessed in a specific way. The proposed DeepFont method achieves an accuracy of higher than 80% (top-5) on a new large labeled real-world dataset we collected.
[ { "version": "v1", "created": "Thu, 18 Dec 2014 08:51:15 GMT" }, { "version": "v2", "created": "Fri, 19 Dec 2014 02:45:35 GMT" }, { "version": "v3", "created": "Sun, 25 Jan 2015 22:41:40 GMT" }, { "version": "v4", "created": "Wed, 1 Apr 2015 22:02:59 GMT" } ]
2015-04-03T00:00:00
[ [ "Wang", "Zhangyang", "" ], [ "Yang", "Jianchao", "" ], [ "Jin", "Hailin", "" ], [ "Shechtman", "Eli", "" ], [ "Agarwala", "Aseem", "" ], [ "Brandt", "Jonathan", "" ], [ "Huang", "Thomas S.", "" ] ]
TITLE: Decomposition-Based Domain Adaptation for Real-World Font Recognition ABSTRACT: We present a domain adaption framework to address a domain mismatch between synthetic training and real-world testing data. We demonstrate our method on a challenging fine-grain classification problem: recognizing a font style from an image of text. In this task, it is very easy to generate lots of rendered font examples but very hard to obtain real-world labeled images. This real-to-synthetic domain gap caused poor generalization to new real data in previous font recognition methods (Chen et al. (2014)). In this paper, we introduce a Convolutional Neural Network decomposition approach, leveraging a large training corpus of synthetic data to obtain effective features for classification. This is done using an adaptation technique based on a Stacked Convolutional Auto-Encoder that exploits a large collection of unlabeled real-world text images combined with synthetic data preprocessed in a specific way. The proposed DeepFont method achieves an accuracy of higher than 80% (top-5) on a new large labeled real-world dataset we collected.
new_dataset
0.950686
1502.06306
Jinseok Kim
Jinseok Kim and Jana Diesner
Distortive Effects of Initial-Based Name Disambiguation on Measurements of Large-Scale Coauthorship Networks
This is a preprint of an article accepted for publication in Journal of the Association for Information Science and Technology
null
10.1002/asi.23489
null
cs.DL cs.SI physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Scholars have often relied on name initials to resolve name ambiguities in large-scale coauthorship network research. This approach bears the risk of incorrectly merging or splitting author identities. The use of initial-based disambiguation has been justified by the assumption that such errors would not affect research findings too much. This paper tests this assumption by analyzing coauthorship networks from five academic fields - biology, computer science, nanoscience, neuroscience, and physics - and an interdisciplinary journal, PNAS. Name instances in datasets of this study were disambiguated based on heuristics gained from previous algorithmic disambiguation solutions. We use disambiguated data as a proxy of ground-truth to test the performance of three types of initial-based disambiguation. Our results show that initial-based disambiguation can misrepresent statistical properties of coauthorship networks: it deflates the number of unique authors, number of component, average shortest paths, clustering coefficient, and assortativity, while it inflates average productivity, density, average coauthor number per author, and largest component size. Also, on average, more than half of top 10 productive or collaborative authors drop off the lists. Asian names were found to account for the majority of misidentification by initial-based disambiguation due to their common surname and given name initials.
[ { "version": "v1", "created": "Mon, 23 Feb 2015 02:56:05 GMT" } ]
2015-04-03T00:00:00
[ [ "Kim", "Jinseok", "" ], [ "Diesner", "Jana", "" ] ]
TITLE: Distortive Effects of Initial-Based Name Disambiguation on Measurements of Large-Scale Coauthorship Networks ABSTRACT: Scholars have often relied on name initials to resolve name ambiguities in large-scale coauthorship network research. This approach bears the risk of incorrectly merging or splitting author identities. The use of initial-based disambiguation has been justified by the assumption that such errors would not affect research findings too much. This paper tests this assumption by analyzing coauthorship networks from five academic fields - biology, computer science, nanoscience, neuroscience, and physics - and an interdisciplinary journal, PNAS. Name instances in datasets of this study were disambiguated based on heuristics gained from previous algorithmic disambiguation solutions. We use disambiguated data as a proxy of ground-truth to test the performance of three types of initial-based disambiguation. Our results show that initial-based disambiguation can misrepresent statistical properties of coauthorship networks: it deflates the number of unique authors, number of component, average shortest paths, clustering coefficient, and assortativity, while it inflates average productivity, density, average coauthor number per author, and largest component size. Also, on average, more than half of top 10 productive or collaborative authors drop off the lists. Asian names were found to account for the majority of misidentification by initial-based disambiguation due to their common surname and given name initials.
no_new_dataset
0.950227
1503.09062
Emilio Coppa
Emilio Coppa, Irene Finocchi
On data skewness, stragglers, and MapReduce progress indicators
null
null
null
null
cs.DC cs.PF cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We tackle the problem of predicting the performance of MapReduce applications, designing accurate progress indicators that keep programmers informed on the percentage of completed computation time during the execution of a job. Through extensive experiments, we show that state-of-the-art progress indicators (including the one provided by Hadoop) can be seriously harmed by data skewness, load unbalancing, and straggling tasks. This is mainly due to their implicit assumption that the running time depends linearly on the input size. We thus design a novel profile-guided progress indicator, called NearestFit, that operates without the linear hypothesis assumption and exploits a careful combination of nearest neighbor regression and statistical curve fitting techniques. Our theoretical progress model requires fine-grained profile data, that can be very difficult to manage in practice. To overcome this issue, we resort to computing accurate approximations for some of the quantities used in our model through space- and time-efficient data streaming algorithms. We implemented NearestFit on top of Hadoop 2.6.0. An extensive empirical assessment over the Amazon EC2 platform on a variety of real-world benchmarks shows that NearestFit is practical w.r.t. space and time overheads and that its accuracy is generally very good, even in scenarios where competitors incur non-negligible errors and wide prediction fluctuations. Overall, NearestFit significantly improves the current state-of-art on progress analysis for MapReduce.
[ { "version": "v1", "created": "Tue, 31 Mar 2015 14:29:13 GMT" }, { "version": "v2", "created": "Thu, 2 Apr 2015 15:55:15 GMT" } ]
2015-04-03T00:00:00
[ [ "Coppa", "Emilio", "" ], [ "Finocchi", "Irene", "" ] ]
TITLE: On data skewness, stragglers, and MapReduce progress indicators ABSTRACT: We tackle the problem of predicting the performance of MapReduce applications, designing accurate progress indicators that keep programmers informed on the percentage of completed computation time during the execution of a job. Through extensive experiments, we show that state-of-the-art progress indicators (including the one provided by Hadoop) can be seriously harmed by data skewness, load unbalancing, and straggling tasks. This is mainly due to their implicit assumption that the running time depends linearly on the input size. We thus design a novel profile-guided progress indicator, called NearestFit, that operates without the linear hypothesis assumption and exploits a careful combination of nearest neighbor regression and statistical curve fitting techniques. Our theoretical progress model requires fine-grained profile data, that can be very difficult to manage in practice. To overcome this issue, we resort to computing accurate approximations for some of the quantities used in our model through space- and time-efficient data streaming algorithms. We implemented NearestFit on top of Hadoop 2.6.0. An extensive empirical assessment over the Amazon EC2 platform on a variety of real-world benchmarks shows that NearestFit is practical w.r.t. space and time overheads and that its accuracy is generally very good, even in scenarios where competitors incur non-negligible errors and wide prediction fluctuations. Overall, NearestFit significantly improves the current state-of-art on progress analysis for MapReduce.
no_new_dataset
0.94625
1504.00430
Hanyang Peng
Hanyang Peng, Yong Fan
Direct l_(2,p)-Norm Learning for Feature Selection
null
null
null
null
cs.LG cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we propose a novel sparse learning based feature selection method that directly optimizes a large margin linear classification model sparsity with l_(2,p)-norm (0 < p < 1)subject to data-fitting constraints, rather than using the sparsity as a regularization term. To solve the direct sparsity optimization problem that is non-smooth and non-convex when 0<p<1, we provide an efficient iterative algorithm with proved convergence by converting it to a convex and smooth optimization problem at every iteration step. The proposed algorithm has been evaluated based on publicly available datasets, and extensive comparison experiments have demonstrated that our algorithm could achieve feature selection performance competitive to state-of-the-art algorithms.
[ { "version": "v1", "created": "Thu, 2 Apr 2015 02:16:39 GMT" } ]
2015-04-03T00:00:00
[ [ "Peng", "Hanyang", "" ], [ "Fan", "Yong", "" ] ]
TITLE: Direct l_(2,p)-Norm Learning for Feature Selection ABSTRACT: In this paper, we propose a novel sparse learning based feature selection method that directly optimizes a large margin linear classification model sparsity with l_(2,p)-norm (0 < p < 1)subject to data-fitting constraints, rather than using the sparsity as a regularization term. To solve the direct sparsity optimization problem that is non-smooth and non-convex when 0<p<1, we provide an efficient iterative algorithm with proved convergence by converting it to a convex and smooth optimization problem at every iteration step. The proposed algorithm has been evaluated based on publicly available datasets, and extensive comparison experiments have demonstrated that our algorithm could achieve feature selection performance competitive to state-of-the-art algorithms.
no_new_dataset
0.949809
1504.00545
Timo Bingmann
Timo Bingmann, Thomas Keh, Peter Sanders
A Bulk-Parallel Priority Queue in External Memory with STXXL
extended version of SEA'15 conference paper
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose the design and an implementation of a bulk-parallel external memory priority queue to take advantage of both shared-memory parallelism and high external memory transfer speeds to parallel disks. To achieve higher performance by decoupling item insertions and extractions, we offer two parallelization interfaces: one using "bulk" sequences, the other by defining "limit" items. In the design, we discuss how to parallelize insertions using multiple heaps, and how to calculate a dynamic prediction sequence to prefetch blocks and apply parallel multiway merge for extraction. Our experimental results show that in the selected benchmarks the priority queue reaches 75% of the full parallel I/O bandwidth of rotational disks and and 65% of SSDs, or the speed of sorting in external memory when bounded by computation.
[ { "version": "v1", "created": "Thu, 2 Apr 2015 13:23:20 GMT" } ]
2015-04-03T00:00:00
[ [ "Bingmann", "Timo", "" ], [ "Keh", "Thomas", "" ], [ "Sanders", "Peter", "" ] ]
TITLE: A Bulk-Parallel Priority Queue in External Memory with STXXL ABSTRACT: We propose the design and an implementation of a bulk-parallel external memory priority queue to take advantage of both shared-memory parallelism and high external memory transfer speeds to parallel disks. To achieve higher performance by decoupling item insertions and extractions, we offer two parallelization interfaces: one using "bulk" sequences, the other by defining "limit" items. In the design, we discuss how to parallelize insertions using multiple heaps, and how to calculate a dynamic prediction sequence to prefetch blocks and apply parallel multiway merge for extraction. Our experimental results show that in the selected benchmarks the priority queue reaches 75% of the full parallel I/O bandwidth of rotational disks and and 65% of SSDs, or the speed of sorting in external memory when bounded by computation.
no_new_dataset
0.946349
1302.5374
Quan Yuan
Quan Yuan, Zhixin Yang
A Weight-coded Evolutionary Algorithm for the Multidimensional Knapsack Problem
Submitted to Applied Mathematics and Computation on April 8, 2014
null
null
null
cs.NE math.OC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A revised weight-coded evolutionary algorithm (RWCEA) is proposed for solving multidimensional knapsack problems. This RWCEA uses a new decoding method and incorporates a heuristic method in initialization. Computational results show that the RWCEA performs better than a weight-coded evolutionary algorithm proposed by Raidl (1999) and to some existing benchmarks, it can yield better results than the ones reported in the OR-library.
[ { "version": "v1", "created": "Thu, 21 Feb 2013 18:57:09 GMT" }, { "version": "v2", "created": "Wed, 9 Apr 2014 00:09:36 GMT" }, { "version": "v3", "created": "Sun, 28 Dec 2014 19:40:20 GMT" }, { "version": "v4", "created": "Wed, 1 Apr 2015 05:59:58 GMT" } ]
2015-04-02T00:00:00
[ [ "Yuan", "Quan", "" ], [ "Yang", "Zhixin", "" ] ]
TITLE: A Weight-coded Evolutionary Algorithm for the Multidimensional Knapsack Problem ABSTRACT: A revised weight-coded evolutionary algorithm (RWCEA) is proposed for solving multidimensional knapsack problems. This RWCEA uses a new decoding method and incorporates a heuristic method in initialization. Computational results show that the RWCEA performs better than a weight-coded evolutionary algorithm proposed by Raidl (1999) and to some existing benchmarks, it can yield better results than the ones reported in the OR-library.
no_new_dataset
0.946001
1404.0284
Jack Kelly
Jack Kelly and William Knottenbelt
The UK-DALE dataset, domestic appliance-level electricity demand and whole-house demand from five UK homes
null
Scientific Data 2 (2015) Article number: 150007 (2015)
10.1038/sdata.2015.7
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Many countries are rolling out smart electricity meters. These measure a home's total power demand. However, research into consumer behaviour suggests that consumers are best able to improve their energy efficiency when provided with itemised, appliance-by-appliance consumption information. Energy disaggregation is a computational technique for estimating appliance-by-appliance energy consumption from a whole-house meter signal. To conduct research on disaggregation algorithms, researchers require data describing not just the aggregate demand per building but also the `ground truth' demand of individual appliances. In this context, we present UK-DALE: an open-access dataset from the UK recording Domestic Appliance-Level Electricity at a sample rate of 16 kHz for the whole-house and at 1/6 Hz for individual appliances. This is the first open access UK dataset at this temporal resolution. We recorded from five houses, one of which was recorded for 655 days, the longest duration we are aware of for any energy dataset at this sample rate. We also describe the low-cost, open-source, wireless system we built for collecting our dataset.
[ { "version": "v1", "created": "Tue, 1 Apr 2014 15:49:00 GMT" }, { "version": "v2", "created": "Mon, 12 Jan 2015 14:29:00 GMT" }, { "version": "v3", "created": "Thu, 19 Mar 2015 10:45:57 GMT" } ]
2015-04-02T00:00:00
[ [ "Kelly", "Jack", "" ], [ "Knottenbelt", "William", "" ] ]
TITLE: The UK-DALE dataset, domestic appliance-level electricity demand and whole-house demand from five UK homes ABSTRACT: Many countries are rolling out smart electricity meters. These measure a home's total power demand. However, research into consumer behaviour suggests that consumers are best able to improve their energy efficiency when provided with itemised, appliance-by-appliance consumption information. Energy disaggregation is a computational technique for estimating appliance-by-appliance energy consumption from a whole-house meter signal. To conduct research on disaggregation algorithms, researchers require data describing not just the aggregate demand per building but also the `ground truth' demand of individual appliances. In this context, we present UK-DALE: an open-access dataset from the UK recording Domestic Appliance-Level Electricity at a sample rate of 16 kHz for the whole-house and at 1/6 Hz for individual appliances. This is the first open access UK dataset at this temporal resolution. We recorded from five houses, one of which was recorded for 655 days, the longest duration we are aware of for any energy dataset at this sample rate. We also describe the low-cost, open-source, wireless system we built for collecting our dataset.
new_dataset
0.963643
1503.02445
Muhammad Uzair
Muhammad Uzair, Faisal Shafait, Bernard Ghanem, Ajmal Mian
Representation Learning with Deep Extreme Learning Machines for Efficient Image Set Classification
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Efficient and accurate joint representation of a collection of images, that belong to the same class, is a major research challenge for practical image set classification. Existing methods either make prior assumptions about the data structure, or perform heavy computations to learn structure from the data itself. In this paper, we propose an efficient image set representation that does not make any prior assumptions about the structure of the underlying data. We learn the non-linear structure of image sets with Deep Extreme Learning Machines (DELM) that are very efficient and generalize well even on a limited number of training samples. Extensive experiments on a broad range of public datasets for image set classification (Honda/UCSD, CMU Mobo, YouTube Celebrities, Celebrity-1000, ETH-80) show that the proposed algorithm consistently outperforms state-of-the-art image set classification methods both in terms of speed and accuracy.
[ { "version": "v1", "created": "Mon, 9 Mar 2015 12:14:42 GMT" }, { "version": "v2", "created": "Mon, 16 Mar 2015 05:29:31 GMT" }, { "version": "v3", "created": "Wed, 1 Apr 2015 10:29:09 GMT" } ]
2015-04-02T00:00:00
[ [ "Uzair", "Muhammad", "" ], [ "Shafait", "Faisal", "" ], [ "Ghanem", "Bernard", "" ], [ "Mian", "Ajmal", "" ] ]
TITLE: Representation Learning with Deep Extreme Learning Machines for Efficient Image Set Classification ABSTRACT: Efficient and accurate joint representation of a collection of images, that belong to the same class, is a major research challenge for practical image set classification. Existing methods either make prior assumptions about the data structure, or perform heavy computations to learn structure from the data itself. In this paper, we propose an efficient image set representation that does not make any prior assumptions about the structure of the underlying data. We learn the non-linear structure of image sets with Deep Extreme Learning Machines (DELM) that are very efficient and generalize well even on a limited number of training samples. Extensive experiments on a broad range of public datasets for image set classification (Honda/UCSD, CMU Mobo, YouTube Celebrities, Celebrity-1000, ETH-80) show that the proposed algorithm consistently outperforms state-of-the-art image set classification methods both in terms of speed and accuracy.
no_new_dataset
0.950915
1504.00028
Zhangyang Wang
Zhangyang Wang, Jianchao Yang, Hailin Jin, Eli Shechtman, Aseem Agarwala, Jonathan Brandt, Thomas S. Huang
Real-World Font Recognition Using Deep Network and Domain Adaptation
null
null
null
null
cs.CV cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We address a challenging fine-grain classification problem: recognizing a font style from an image of text. In this task, it is very easy to generate lots of rendered font examples but very hard to obtain real-world labeled images. This real-to-synthetic domain gap caused poor generalization to new real data in previous methods (Chen et al. (2014)). In this paper, we refer to Convolutional Neural Networks, and use an adaptation technique based on a Stacked Convolutional Auto-Encoder that exploits unlabeled real-world images combined with synthetic data. The proposed method achieves an accuracy of higher than 80% (top-5) on a real-world dataset.
[ { "version": "v1", "created": "Tue, 31 Mar 2015 20:30:00 GMT" } ]
2015-04-02T00:00:00
[ [ "Wang", "Zhangyang", "" ], [ "Yang", "Jianchao", "" ], [ "Jin", "Hailin", "" ], [ "Shechtman", "Eli", "" ], [ "Agarwala", "Aseem", "" ], [ "Brandt", "Jonathan", "" ], [ "Huang", "Thomas S.", "" ] ]
TITLE: Real-World Font Recognition Using Deep Network and Domain Adaptation ABSTRACT: We address a challenging fine-grain classification problem: recognizing a font style from an image of text. In this task, it is very easy to generate lots of rendered font examples but very hard to obtain real-world labeled images. This real-to-synthetic domain gap caused poor generalization to new real data in previous methods (Chen et al. (2014)). In this paper, we refer to Convolutional Neural Networks, and use an adaptation technique based on a Stacked Convolutional Auto-Encoder that exploits unlabeled real-world images combined with synthetic data. The proposed method achieves an accuracy of higher than 80% (top-5) on a real-world dataset.
no_new_dataset
0.954774
1504.00045
Yongxin Yang
Zhiyuan Shi, Yongxin Yang, Timothy M. Hospedales and Tao Xiang
Weakly Supervised Learning of Objects, Attributes and their Associations
14 pages, Accepted to ECCV 2014
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
When humans describe images they tend to use combinations of nouns and adjectives, corresponding to objects and their associated attributes respectively. To generate such a description automatically, one needs to model objects, attributes and their associations. Conventional methods require strong annotation of object and attribute locations, making them less scalable. In this paper, we model object-attribute associations from weakly labelled images, such as those widely available on media sharing sites (e.g. Flickr), where only image-level labels (either object or attributes) are given, without their locations and associations. This is achieved by introducing a novel weakly supervised non-parametric Bayesian model. Once learned, given a new image, our model can describe the image, including objects, attributes and their associations, as well as their locations and segmentation. Extensive experiments on benchmark datasets demonstrate that our weakly supervised model performs at par with strongly supervised models on tasks such as image description and retrieval based on object-attribute associations.
[ { "version": "v1", "created": "Tue, 31 Mar 2015 21:18:18 GMT" } ]
2015-04-02T00:00:00
[ [ "Shi", "Zhiyuan", "" ], [ "Yang", "Yongxin", "" ], [ "Hospedales", "Timothy M.", "" ], [ "Xiang", "Tao", "" ] ]
TITLE: Weakly Supervised Learning of Objects, Attributes and their Associations ABSTRACT: When humans describe images they tend to use combinations of nouns and adjectives, corresponding to objects and their associated attributes respectively. To generate such a description automatically, one needs to model objects, attributes and their associations. Conventional methods require strong annotation of object and attribute locations, making them less scalable. In this paper, we model object-attribute associations from weakly labelled images, such as those widely available on media sharing sites (e.g. Flickr), where only image-level labels (either object or attributes) are given, without their locations and associations. This is achieved by introducing a novel weakly supervised non-parametric Bayesian model. Once learned, given a new image, our model can describe the image, including objects, attributes and their associations, as well as their locations and segmentation. Extensive experiments on benchmark datasets demonstrate that our weakly supervised model performs at par with strongly supervised models on tasks such as image description and retrieval based on object-attribute associations.
no_new_dataset
0.953188
1504.00154
Wenji Li
Zhun Fan, Wenji Li, Xinye Cai, Huibiao Lin, Shuxiang Xie, Erik Goodman
A New Repair Operator for Multi-objective Evolutionary Algorithm in Constrained Optimization Problems
8 pages
null
null
null
cs.NE
http://creativecommons.org/licenses/by-nc-sa/3.0/
In this paper, we design a set of multi-objective constrained optimization problems (MCOPs) and propose a new repair operator to address them. The proposed repair operator is used to fix the solutions that violate the box constraints. More specifically, it employs a reversed correction strategy that can effectively avoid the population falling into local optimum. In addition, we integrate the proposed repair operator into two classical multi-objective evolutionary algorithms MOEA/D and NSGA-II. The proposed repair operator is compared with other two kinds of commonly used repair operators on benchmark problems CTPs and MCOPs. The experiment results demonstrate that our proposed approach is very effective in terms of convergence and diversity.
[ { "version": "v1", "created": "Wed, 1 Apr 2015 09:07:13 GMT" } ]
2015-04-02T00:00:00
[ [ "Fan", "Zhun", "" ], [ "Li", "Wenji", "" ], [ "Cai", "Xinye", "" ], [ "Lin", "Huibiao", "" ], [ "Xie", "Shuxiang", "" ], [ "Goodman", "Erik", "" ] ]
TITLE: A New Repair Operator for Multi-objective Evolutionary Algorithm in Constrained Optimization Problems ABSTRACT: In this paper, we design a set of multi-objective constrained optimization problems (MCOPs) and propose a new repair operator to address them. The proposed repair operator is used to fix the solutions that violate the box constraints. More specifically, it employs a reversed correction strategy that can effectively avoid the population falling into local optimum. In addition, we integrate the proposed repair operator into two classical multi-objective evolutionary algorithms MOEA/D and NSGA-II. The proposed repair operator is compared with other two kinds of commonly used repair operators on benchmark problems CTPs and MCOPs. The experiment results demonstrate that our proposed approach is very effective in terms of convergence and diversity.
no_new_dataset
0.946843
1504.00191
Sanjay Sahay
Rajendra Kumar Roul, Shubham Rohan Asthana, Sanjay Kumar Sahay
Automated Document Indexing via Intelligent Hierarchical Clustering: A Novel Approach
6 Pages, 3 Figures. IEEE Xplore, ICHPCA-2014
null
10.1109/ICHPCA.2014.7045347
null
cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
With the rising quantity of textual data available in electronic format, the need to organize it become a highly challenging task. In the present paper, we explore a document organization framework that exploits an intelligent hierarchical clustering algorithm to generate an index over a set of documents. The framework has been designed to be scalable and accurate even with large corpora. The advantage of the proposed algorithm lies in the need for minimal inputs, with much of the hierarchy attributes being decided in an automated manner using statistical methods. The use of topic modeling in a pre-processing stage ensures robustness to a range of variations in the input data. For experimental work 20-Newsgroups dataset has been used. The F- measure of the proposed approach has been compared with the traditional K-Means and K-Medoids clustering algorithms. Test results demonstrate the applicability, efficiency and effectiveness of our proposed approach. After extensive experimentation, we conclude that the framework shows promise for further research and specialized commercial applications.
[ { "version": "v1", "created": "Wed, 1 Apr 2015 12:08:36 GMT" } ]
2015-04-02T00:00:00
[ [ "Roul", "Rajendra Kumar", "" ], [ "Asthana", "Shubham Rohan", "" ], [ "Sahay", "Sanjay Kumar", "" ] ]
TITLE: Automated Document Indexing via Intelligent Hierarchical Clustering: A Novel Approach ABSTRACT: With the rising quantity of textual data available in electronic format, the need to organize it become a highly challenging task. In the present paper, we explore a document organization framework that exploits an intelligent hierarchical clustering algorithm to generate an index over a set of documents. The framework has been designed to be scalable and accurate even with large corpora. The advantage of the proposed algorithm lies in the need for minimal inputs, with much of the hierarchy attributes being decided in an automated manner using statistical methods. The use of topic modeling in a pre-processing stage ensures robustness to a range of variations in the input data. For experimental work 20-Newsgroups dataset has been used. The F- measure of the proposed approach has been compared with the traditional K-Means and K-Medoids clustering algorithms. Test results demonstrate the applicability, efficiency and effectiveness of our proposed approach. After extensive experimentation, we conclude that the framework shows promise for further research and specialized commercial applications.
no_new_dataset
0.949435
1504.00331
Eldon Carman Jr
E. Preston Carman Jr. (1), Till Westmann (2), Vinayak R. Borkar (3), Michael J. Carey (3) and Vassilis J. Tsotras (1) ((1) UC Riverside, (2) Oracle Labs, (3) UC Irvine)
Apache VXQuery: A Scalable XQuery Implementation
null
null
null
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The wide use of XML for document management and data exchange has created the need to query large repositories of XML data. To efficiently query such large data collections and take advantage of parallelism, we have implemented Apache VXQuery, an open-source scalable XQuery processor. The system builds upon two other open-source frameworks -- Hyracks, a parallel execution engine, and Algebricks, a language agnostic compiler toolbox. Apache VXQuery extends these two frameworks and provides an implementation of the XQuery specifics (data model, data-model dependent functions and optimizations, and a parser). We describe the architecture of Apache VXQuery, its integration with Hyracks and Algebricks, and the XQuery optimization rules applied to the query plan to improve path expression efficiency and to enable query parallelism. An experimental evaluation using a real 500GB dataset with various selection, aggregation and join XML queries shows that Apache VXQuery performs well both in terms of scale-up and speed-up. Our experiments show that it is about 3x faster than Saxon (an open-source and commercial XQuery processor) on a 4-core, single node implementation, and around 2.5x faster than Apache MRQL (a MapReduce-based parallel query processor) on an eight (4-core) node cluster.
[ { "version": "v1", "created": "Wed, 1 Apr 2015 18:27:23 GMT" } ]
2015-04-02T00:00:00
[ [ "Carman", "E. Preston", "Jr." ], [ "Westmann", "Till", "" ], [ "Borkar", "Vinayak R.", "" ], [ "Carey", "Michael J.", "" ], [ "Tsotras", "Vassilis J.", "" ] ]
TITLE: Apache VXQuery: A Scalable XQuery Implementation ABSTRACT: The wide use of XML for document management and data exchange has created the need to query large repositories of XML data. To efficiently query such large data collections and take advantage of parallelism, we have implemented Apache VXQuery, an open-source scalable XQuery processor. The system builds upon two other open-source frameworks -- Hyracks, a parallel execution engine, and Algebricks, a language agnostic compiler toolbox. Apache VXQuery extends these two frameworks and provides an implementation of the XQuery specifics (data model, data-model dependent functions and optimizations, and a parser). We describe the architecture of Apache VXQuery, its integration with Hyracks and Algebricks, and the XQuery optimization rules applied to the query plan to improve path expression efficiency and to enable query parallelism. An experimental evaluation using a real 500GB dataset with various selection, aggregation and join XML queries shows that Apache VXQuery performs well both in terms of scale-up and speed-up. Our experiments show that it is about 3x faster than Saxon (an open-source and commercial XQuery processor) on a 4-core, single node implementation, and around 2.5x faster than Apache MRQL (a MapReduce-based parallel query processor) on an eight (4-core) node cluster.
no_new_dataset
0.941761
1306.6802
Aris Kosmopoulos
Aris Kosmopoulos, Ioannis Partalas, Eric Gaussier, Georgios Paliouras, Ion Androutsopoulos
Evaluation Measures for Hierarchical Classification: a unified view and novel approaches
Submitted to journal
null
10.1007/s10618-014-0382-x
null
cs.AI cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Hierarchical classification addresses the problem of classifying items into a hierarchy of classes. An important issue in hierarchical classification is the evaluation of different classification algorithms, which is complicated by the hierarchical relations among the classes. Several evaluation measures have been proposed for hierarchical classification using the hierarchy in different ways. This paper studies the problem of evaluation in hierarchical classification by analyzing and abstracting the key components of the existing performance measures. It also proposes two alternative generic views of hierarchical evaluation and introduces two corresponding novel measures. The proposed measures, along with the state-of-the art ones, are empirically tested on three large datasets from the domain of text classification. The empirical results illustrate the undesirable behavior of existing approaches and how the proposed methods overcome most of these methods across a range of cases.
[ { "version": "v1", "created": "Fri, 28 Jun 2013 11:49:53 GMT" }, { "version": "v2", "created": "Mon, 1 Jul 2013 17:33:58 GMT" } ]
2015-04-01T00:00:00
[ [ "Kosmopoulos", "Aris", "" ], [ "Partalas", "Ioannis", "" ], [ "Gaussier", "Eric", "" ], [ "Paliouras", "Georgios", "" ], [ "Androutsopoulos", "Ion", "" ] ]
TITLE: Evaluation Measures for Hierarchical Classification: a unified view and novel approaches ABSTRACT: Hierarchical classification addresses the problem of classifying items into a hierarchy of classes. An important issue in hierarchical classification is the evaluation of different classification algorithms, which is complicated by the hierarchical relations among the classes. Several evaluation measures have been proposed for hierarchical classification using the hierarchy in different ways. This paper studies the problem of evaluation in hierarchical classification by analyzing and abstracting the key components of the existing performance measures. It also proposes two alternative generic views of hierarchical evaluation and introduces two corresponding novel measures. The proposed measures, along with the state-of-the art ones, are empirically tested on three large datasets from the domain of text classification. The empirical results illustrate the undesirable behavior of existing approaches and how the proposed methods overcome most of these methods across a range of cases.
no_new_dataset
0.947624
1503.02725
Abhishek Sharma
Abhishek Sharma and Oncel Tuzel and David W. Jacobs
Deep Hierarchical Parsing for Semantic Segmentation
IEEE CVPR 2015
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper proposes a learning-based approach to scene parsing inspired by the deep Recursive Context Propagation Network (RCPN). RCPN is a deep feed-forward neural network that utilizes the contextual information from the entire image, through bottom-up followed by top-down context propagation via random binary parse trees. This improves the feature representation of every super-pixel in the image for better classification into semantic categories. We analyze RCPN and propose two novel contributions to further improve the model. We first analyze the learning of RCPN parameters and discover the presence of bypass error paths in the computation graph of RCPN that can hinder contextual propagation. We propose to tackle this problem by including the classification loss of the internal nodes of the random parse trees in the original RCPN loss function. Secondly, we use an MRF on the parse tree nodes to model the hierarchical dependency present in the output. Both modifications provide performance boosts over the original RCPN and the new system achieves state-of-the-art performance on Stanford Background, SIFT-Flow and Daimler urban datasets.
[ { "version": "v1", "created": "Mon, 9 Mar 2015 23:05:26 GMT" }, { "version": "v2", "created": "Mon, 30 Mar 2015 20:03:01 GMT" } ]
2015-04-01T00:00:00
[ [ "Sharma", "Abhishek", "" ], [ "Tuzel", "Oncel", "" ], [ "Jacobs", "David W.", "" ] ]
TITLE: Deep Hierarchical Parsing for Semantic Segmentation ABSTRACT: This paper proposes a learning-based approach to scene parsing inspired by the deep Recursive Context Propagation Network (RCPN). RCPN is a deep feed-forward neural network that utilizes the contextual information from the entire image, through bottom-up followed by top-down context propagation via random binary parse trees. This improves the feature representation of every super-pixel in the image for better classification into semantic categories. We analyze RCPN and propose two novel contributions to further improve the model. We first analyze the learning of RCPN parameters and discover the presence of bypass error paths in the computation graph of RCPN that can hinder contextual propagation. We propose to tackle this problem by including the classification loss of the internal nodes of the random parse trees in the original RCPN loss function. Secondly, we use an MRF on the parse tree nodes to model the hierarchical dependency present in the output. Both modifications provide performance boosts over the original RCPN and the new system achieves state-of-the-art performance on Stanford Background, SIFT-Flow and Daimler urban datasets.
no_new_dataset
0.948489
1503.08843
Peng Sun
Peng Sun, James K. Min, Guanglei Xiong
Globally Tuned Cascade Pose Regression via Back Propagation with Application in 2D Face Pose Estimation and Heart Segmentation in 3D CT Images
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recently, a successful pose estimation algorithm, called Cascade Pose Regression (CPR), was proposed in the literature. Trained over Pose Index Feature, CPR is a regressor ensemble that is similar to Boosting. In this paper we show how CPR can be represented as a Neural Network. Specifically, we adopt a Graph Transformer Network (GTN) representation and accordingly train CPR with Back Propagation (BP) that permits globally tuning. In contrast, previous CPR literature only took a layer wise training without any post fine tuning. We empirically show that global training with BP outperforms layer-wise (pre-)training. Our CPR-GTN adopts a Multi Layer Percetron as the regressor, which utilized sparse connection to learn local image feature representation. We tested the proposed CPR-GTN on 2D face pose estimation problem as in previous CPR literature. Besides, we also investigated the possibility of extending CPR-GTN to 3D pose estimation by doing experiments using 3D Computed Tomography dataset for heart segmentation.
[ { "version": "v1", "created": "Mon, 30 Mar 2015 20:17:23 GMT" } ]
2015-04-01T00:00:00
[ [ "Sun", "Peng", "" ], [ "Min", "James K.", "" ], [ "Xiong", "Guanglei", "" ] ]
TITLE: Globally Tuned Cascade Pose Regression via Back Propagation with Application in 2D Face Pose Estimation and Heart Segmentation in 3D CT Images ABSTRACT: Recently, a successful pose estimation algorithm, called Cascade Pose Regression (CPR), was proposed in the literature. Trained over Pose Index Feature, CPR is a regressor ensemble that is similar to Boosting. In this paper we show how CPR can be represented as a Neural Network. Specifically, we adopt a Graph Transformer Network (GTN) representation and accordingly train CPR with Back Propagation (BP) that permits globally tuning. In contrast, previous CPR literature only took a layer wise training without any post fine tuning. We empirically show that global training with BP outperforms layer-wise (pre-)training. Our CPR-GTN adopts a Multi Layer Percetron as the regressor, which utilized sparse connection to learn local image feature representation. We tested the proposed CPR-GTN on 2D face pose estimation problem as in previous CPR literature. Besides, we also investigated the possibility of extending CPR-GTN to 3D pose estimation by doing experiments using 3D Computed Tomography dataset for heart segmentation.
no_new_dataset
0.947624
1503.08853
Ali Borji
Ali Borji and James Tanner
Reconciling saliency and object center-bias hypotheses in explaining free-viewing fixations
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Predicting where people look in natural scenes has attracted a lot of interest in computer vision and computational neuroscience over the past two decades. Two seemingly contrasting categories of cues have been proposed to influence where people look: \textit{low-level image saliency} and \textit{high-level semantic information}. Our first contribution is to take a detailed look at these cues to confirm the hypothesis proposed by Henderson~\cite{henderson1993eye} and Nuthmann \& Henderson~\cite{nuthmann2010object} that observers tend to look at the center of objects. We analyzed fixation data for scene free-viewing over 17 observers on 60 fully annotated images with various types of objects. Images contained different types of scenes, such as natural scenes, line drawings, and 3D rendered scenes. Our second contribution is to propose a simple combined model of low-level saliency and object center-bias that outperforms each individual component significantly over our data, as well as on the OSIE dataset by Xu et al.~\cite{xu2014predicting}. The results reconcile saliency with object center-bias hypotheses and highlight that both types of cues are important in guiding fixations. Our work opens new directions to understand strategies that humans use in observing scenes and objects, and demonstrates the construction of combined models of low-level saliency and high-level object-based information.
[ { "version": "v1", "created": "Mon, 30 Mar 2015 21:07:53 GMT" } ]
2015-04-01T00:00:00
[ [ "Borji", "Ali", "" ], [ "Tanner", "James", "" ] ]
TITLE: Reconciling saliency and object center-bias hypotheses in explaining free-viewing fixations ABSTRACT: Predicting where people look in natural scenes has attracted a lot of interest in computer vision and computational neuroscience over the past two decades. Two seemingly contrasting categories of cues have been proposed to influence where people look: \textit{low-level image saliency} and \textit{high-level semantic information}. Our first contribution is to take a detailed look at these cues to confirm the hypothesis proposed by Henderson~\cite{henderson1993eye} and Nuthmann \& Henderson~\cite{nuthmann2010object} that observers tend to look at the center of objects. We analyzed fixation data for scene free-viewing over 17 observers on 60 fully annotated images with various types of objects. Images contained different types of scenes, such as natural scenes, line drawings, and 3D rendered scenes. Our second contribution is to propose a simple combined model of low-level saliency and object center-bias that outperforms each individual component significantly over our data, as well as on the OSIE dataset by Xu et al.~\cite{xu2014predicting}. The results reconcile saliency with object center-bias hypotheses and highlight that both types of cues are important in guiding fixations. Our work opens new directions to understand strategies that humans use in observing scenes and objects, and demonstrates the construction of combined models of low-level saliency and high-level object-based information.
no_new_dataset
0.953579
1503.08873
Paul Mineiro
Paul Mineiro and Nikos Karampatziakis
Fast Label Embeddings for Extremely Large Output Spaces
Accepted as a workshop contribution at ICLR 2015
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Many modern multiclass and multilabel problems are characterized by increasingly large output spaces. For these problems, label embeddings have been shown to be a useful primitive that can improve computational and statistical efficiency. In this work we utilize a correspondence between rank constrained estimation and low dimensional label embeddings that uncovers a fast label embedding algorithm which works in both the multiclass and multilabel settings. The result is a randomized algorithm for partial least squares, whose running time is exponentially faster than naive algorithms. We demonstrate our techniques on two large-scale public datasets, from the Large Scale Hierarchical Text Challenge and the Open Directory Project, where we obtain state of the art results.
[ { "version": "v1", "created": "Mon, 30 Mar 2015 23:29:46 GMT" } ]
2015-04-01T00:00:00
[ [ "Mineiro", "Paul", "" ], [ "Karampatziakis", "Nikos", "" ] ]
TITLE: Fast Label Embeddings for Extremely Large Output Spaces ABSTRACT: Many modern multiclass and multilabel problems are characterized by increasingly large output spaces. For these problems, label embeddings have been shown to be a useful primitive that can improve computational and statistical efficiency. In this work we utilize a correspondence between rank constrained estimation and low dimensional label embeddings that uncovers a fast label embedding algorithm which works in both the multiclass and multilabel settings. The result is a randomized algorithm for partial least squares, whose running time is exponentially faster than naive algorithms. We demonstrate our techniques on two large-scale public datasets, from the Large Scale Hierarchical Text Challenge and the Open Directory Project, where we obtain state of the art results.
no_new_dataset
0.948537
1503.08913
Chris Winstead
Tasnuva Tithi, Chris Winstead, Gopalakrishnan Sundararajan
Decoding LDPC codes via Noisy Gradient Descent Bit-Flipping with Re-Decoding
4 pages, 8 figures
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we consider the performance of the Noisy Gradient Descent Bit Flipping (NGDBF) algorithm under re-decoding of failed frames. NGDBF is a recent algorithm that uses a non-deterministic gradient descent search to decode low-density parity check (LDPC) codes. The proposed re-decode procedure obtains improved performance because the perturbations are independent at each re-decoding phase, therefore increasing the likelihood of successful decoding. We examine the benefits of re-decoding for an LDPC code from the IEEE 802.3an standard, and find that only a small fraction of re-decoded frames are needed to obtain significant performance benefits. When re-decoding is used, the NGDBF performance is very close to a benchmark offset min-sum decoder for the 802.3an code.
[ { "version": "v1", "created": "Tue, 31 Mar 2015 04:44:32 GMT" } ]
2015-04-01T00:00:00
[ [ "Tithi", "Tasnuva", "" ], [ "Winstead", "Chris", "" ], [ "Sundararajan", "Gopalakrishnan", "" ] ]
TITLE: Decoding LDPC codes via Noisy Gradient Descent Bit-Flipping with Re-Decoding ABSTRACT: In this paper, we consider the performance of the Noisy Gradient Descent Bit Flipping (NGDBF) algorithm under re-decoding of failed frames. NGDBF is a recent algorithm that uses a non-deterministic gradient descent search to decode low-density parity check (LDPC) codes. The proposed re-decode procedure obtains improved performance because the perturbations are independent at each re-decoding phase, therefore increasing the likelihood of successful decoding. We examine the benefits of re-decoding for an LDPC code from the IEEE 802.3an standard, and find that only a small fraction of re-decoded frames are needed to obtain significant performance benefits. When re-decoding is used, the NGDBF performance is very close to a benchmark offset min-sum decoder for the 802.3an code.
no_new_dataset
0.951142
1407.7556
Lorenzo Livi
Lorenzo Livi, Alireza Sadeghian, Witold Pedrycz
Entropic one-class classifiers
To appear in IEEE-TNNLS
null
10.1109/TNNLS.2015.2418332
null
cs.CV cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The one-class classification problem is a well-known research endeavor in pattern recognition. The problem is also known under different names, such as outlier and novelty/anomaly detection. The core of the problem consists in modeling and recognizing patterns belonging only to a so-called target class. All other patterns are termed non-target, and therefore they should be recognized as such. In this paper, we propose a novel one-class classification system that is based on an interplay of different techniques. Primarily, we follow a dissimilarity representation based approach; we embed the input data into the dissimilarity space by means of an appropriate parametric dissimilarity measure. This step allows us to process virtually any type of data. The dissimilarity vectors are then represented through a weighted Euclidean graphs, which we use to (i) determine the entropy of the data distribution in the dissimilarity space, and at the same time (ii) derive effective decision regions that are modeled as clusters of vertices. Since the dissimilarity measure for the input data is parametric, we optimize its parameters by means of a global optimization scheme, which considers both mesoscopic and structural characteristics of the data represented through the graphs. The proposed one-class classifier is designed to provide both hard (Boolean) and soft decisions about the recognition of test patterns, allowing an accurate description of the classification process. We evaluate the performance of the system on different benchmarking datasets, containing either feature-based or structured patterns. Experimental results demonstrate the effectiveness of the proposed technique.
[ { "version": "v1", "created": "Mon, 28 Jul 2014 20:26:24 GMT" }, { "version": "v2", "created": "Tue, 16 Dec 2014 20:46:21 GMT" }, { "version": "v3", "created": "Sun, 11 Jan 2015 16:27:23 GMT" } ]
2015-03-31T00:00:00
[ [ "Livi", "Lorenzo", "" ], [ "Sadeghian", "Alireza", "" ], [ "Pedrycz", "Witold", "" ] ]
TITLE: Entropic one-class classifiers ABSTRACT: The one-class classification problem is a well-known research endeavor in pattern recognition. The problem is also known under different names, such as outlier and novelty/anomaly detection. The core of the problem consists in modeling and recognizing patterns belonging only to a so-called target class. All other patterns are termed non-target, and therefore they should be recognized as such. In this paper, we propose a novel one-class classification system that is based on an interplay of different techniques. Primarily, we follow a dissimilarity representation based approach; we embed the input data into the dissimilarity space by means of an appropriate parametric dissimilarity measure. This step allows us to process virtually any type of data. The dissimilarity vectors are then represented through a weighted Euclidean graphs, which we use to (i) determine the entropy of the data distribution in the dissimilarity space, and at the same time (ii) derive effective decision regions that are modeled as clusters of vertices. Since the dissimilarity measure for the input data is parametric, we optimize its parameters by means of a global optimization scheme, which considers both mesoscopic and structural characteristics of the data represented through the graphs. The proposed one-class classifier is designed to provide both hard (Boolean) and soft decisions about the recognition of test patterns, allowing an accurate description of the classification process. We evaluate the performance of the system on different benchmarking datasets, containing either feature-based or structured patterns. Experimental results demonstrate the effectiveness of the proposed technique.
no_new_dataset
0.946498
1410.0760
Chih-Hang Wang
Chih-Hang Wang, De-Nian Yang, Wen-Tsuen Chen
Scheduling for Multi-Camera Surveillance in LTE Networks
9 pages, 10 figures
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Wireless surveillance in cellular networks has become increasingly important, while commercial LTE surveillance cameras are also available nowadays. Nevertheless, most scheduling algorithms in the literature are throughput, fairness, or profit-based approaches, which are not suitable for wireless surveillance. In this paper, therefore, we explore the resource allocation problem for a multi-camera surveillance system in 3GPP Long Term Evolution (LTE) uplink (UL) networks. We minimize the number of allocated resource blocks (RBs) while guaranteeing the coverage requirement for surveillance systems in LTE UL networks. Specifically, we formulate the Camera Set Resource Allocation Problem (CSRAP) and prove that the problem is NP-Hard. We then propose an Integer Linear Programming formulation for general cases to find the optimal solution. Moreover, we present a baseline algorithm and devise an approximation algorithm to solve the problem. Simulation results based on a real surveillance map and synthetic datasets manifest that the number of allocated RBs can be effectively reduced compared to the existing approach for LTE networks.
[ { "version": "v1", "created": "Fri, 3 Oct 2014 06:17:20 GMT" }, { "version": "v2", "created": "Mon, 6 Oct 2014 08:33:46 GMT" }, { "version": "v3", "created": "Mon, 27 Oct 2014 04:24:11 GMT" }, { "version": "v4", "created": "Sat, 28 Mar 2015 13:58:08 GMT" } ]
2015-03-31T00:00:00
[ [ "Wang", "Chih-Hang", "" ], [ "Yang", "De-Nian", "" ], [ "Chen", "Wen-Tsuen", "" ] ]
TITLE: Scheduling for Multi-Camera Surveillance in LTE Networks ABSTRACT: Wireless surveillance in cellular networks has become increasingly important, while commercial LTE surveillance cameras are also available nowadays. Nevertheless, most scheduling algorithms in the literature are throughput, fairness, or profit-based approaches, which are not suitable for wireless surveillance. In this paper, therefore, we explore the resource allocation problem for a multi-camera surveillance system in 3GPP Long Term Evolution (LTE) uplink (UL) networks. We minimize the number of allocated resource blocks (RBs) while guaranteeing the coverage requirement for surveillance systems in LTE UL networks. Specifically, we formulate the Camera Set Resource Allocation Problem (CSRAP) and prove that the problem is NP-Hard. We then propose an Integer Linear Programming formulation for general cases to find the optimal solution. Moreover, we present a baseline algorithm and devise an approximation algorithm to solve the problem. Simulation results based on a real surveillance map and synthetic datasets manifest that the number of allocated RBs can be effectively reduced compared to the existing approach for LTE networks.
no_new_dataset
0.952926
1410.4985
Danesh Tarapore
Danesh Tarapore and Jean-Baptiste Mouret
Evolvability signatures of generative encodings: beyond standard performance benchmarks
24 pages with 12 figures in the main text, and 4 supplementary figures. Accepted at Information Sciences journal (in press). Supplemental videos are available online at, see http://goo.gl/uyY1RX
null
null
null
cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Evolutionary robotics is a promising approach to autonomously synthesize machines with abilities that resemble those of animals, but the field suffers from a lack of strong foundations. In particular, evolutionary systems are currently assessed solely by the fitness score their evolved artifacts can achieve for a specific task, whereas such fitness-based comparisons provide limited insights about how the same system would evaluate on different tasks, and its adaptive capabilities to respond to changes in fitness (e.g., from damages to the machine, or in new situations). To counter these limitations, we introduce the concept of "evolvability signatures", which picture the post-mutation statistical distribution of both behavior diversity (how different are the robot behaviors after a mutation?) and fitness values (how different is the fitness after a mutation?). We tested the relevance of this concept by evolving controllers for hexapod robot locomotion using five different genotype-to-phenotype mappings (direct encoding, generative encoding of open-loop and closed-loop central pattern generators, generative encoding of neural networks, and single-unit pattern generators (SUPG)). We observed a predictive relationship between the evolvability signature of each encoding and the number of generations required by hexapods to adapt from incurred damages. Our study also reveals that, across the five investigated encodings, the SUPG scheme achieved the best evolvability signature, and was always foremost in recovering an effective gait following robot damages. Overall, our evolvability signatures neatly complement existing task-performance benchmarks, and pave the way for stronger foundations for research in evolutionary robotics.
[ { "version": "v1", "created": "Sat, 18 Oct 2014 18:16:26 GMT" }, { "version": "v2", "created": "Sat, 28 Mar 2015 13:16:20 GMT" } ]
2015-03-31T00:00:00
[ [ "Tarapore", "Danesh", "" ], [ "Mouret", "Jean-Baptiste", "" ] ]
TITLE: Evolvability signatures of generative encodings: beyond standard performance benchmarks ABSTRACT: Evolutionary robotics is a promising approach to autonomously synthesize machines with abilities that resemble those of animals, but the field suffers from a lack of strong foundations. In particular, evolutionary systems are currently assessed solely by the fitness score their evolved artifacts can achieve for a specific task, whereas such fitness-based comparisons provide limited insights about how the same system would evaluate on different tasks, and its adaptive capabilities to respond to changes in fitness (e.g., from damages to the machine, or in new situations). To counter these limitations, we introduce the concept of "evolvability signatures", which picture the post-mutation statistical distribution of both behavior diversity (how different are the robot behaviors after a mutation?) and fitness values (how different is the fitness after a mutation?). We tested the relevance of this concept by evolving controllers for hexapod robot locomotion using five different genotype-to-phenotype mappings (direct encoding, generative encoding of open-loop and closed-loop central pattern generators, generative encoding of neural networks, and single-unit pattern generators (SUPG)). We observed a predictive relationship between the evolvability signature of each encoding and the number of generations required by hexapods to adapt from incurred damages. Our study also reveals that, across the five investigated encodings, the SUPG scheme achieved the best evolvability signature, and was always foremost in recovering an effective gait following robot damages. Overall, our evolvability signatures neatly complement existing task-performance benchmarks, and pave the way for stronger foundations for research in evolutionary robotics.
no_new_dataset
0.945349
1411.6400
Min Wei
Min Wei, Tommy W. S. Chow, Rosa H. M. Chan
Mutual Information-Based Unsupervised Feature Transformation for Heterogeneous Feature Subset Selection
This paper has been withdrawn by the author due to the number of datasets and classifiers are not sufficient to support the claim. Need more simulation work
null
null
null
stat.ML cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Conventional mutual information (MI) based feature selection (FS) methods are unable to handle heterogeneous feature subset selection properly because of data format differences or estimation methods of MI between feature subset and class label. A way to solve this problem is feature transformation (FT). In this study, a novel unsupervised feature transformation (UFT) which can transform non-numerical features into numerical features is developed and tested. The UFT process is MI-based and independent of class label. MI-based FS algorithms, such as Parzen window feature selector (PWFS), minimum redundancy maximum relevance feature selection (mRMR), and normalized MI feature selection (NMIFS), can all adopt UFT for pre-processing of non-numerical features. Unlike traditional FT methods, the proposed UFT is unbiased while PWFS is utilized to its full advantage. Simulations and analyses of large-scale datasets showed that feature subset selected by the integrated method, UFT-PWFS, outperformed other FT-FS integrated methods in classification accuracy.
[ { "version": "v1", "created": "Mon, 24 Nov 2014 10:15:17 GMT" }, { "version": "v2", "created": "Sun, 29 Mar 2015 05:32:50 GMT" } ]
2015-03-31T00:00:00
[ [ "Wei", "Min", "" ], [ "Chow", "Tommy W. S.", "" ], [ "Chan", "Rosa H. M.", "" ] ]
TITLE: Mutual Information-Based Unsupervised Feature Transformation for Heterogeneous Feature Subset Selection ABSTRACT: Conventional mutual information (MI) based feature selection (FS) methods are unable to handle heterogeneous feature subset selection properly because of data format differences or estimation methods of MI between feature subset and class label. A way to solve this problem is feature transformation (FT). In this study, a novel unsupervised feature transformation (UFT) which can transform non-numerical features into numerical features is developed and tested. The UFT process is MI-based and independent of class label. MI-based FS algorithms, such as Parzen window feature selector (PWFS), minimum redundancy maximum relevance feature selection (mRMR), and normalized MI feature selection (NMIFS), can all adopt UFT for pre-processing of non-numerical features. Unlike traditional FT methods, the proposed UFT is unbiased while PWFS is utilized to its full advantage. Simulations and analyses of large-scale datasets showed that feature subset selected by the integrated method, UFT-PWFS, outperformed other FT-FS integrated methods in classification accuracy.
no_new_dataset
0.948775
1412.6286
Wendelin B\"ohmer
Wendelin B\"ohmer and Klaus Obermayer
Regression with Linear Factored Functions
Under review as conference paper at ECML/PKDD 2015
null
null
null
cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Many applications that use empirically estimated functions face a curse of dimensionality, because the integrals over most function classes must be approximated by sampling. This paper introduces a novel regression-algorithm that learns linear factored functions (LFF). This class of functions has structural properties that allow to analytically solve certain integrals and to calculate point-wise products. Applications like belief propagation and reinforcement learning can exploit these properties to break the curse and speed up computation. We derive a regularized greedy optimization scheme, that learns factored basis functions during training. The novel regression algorithm performs competitively to Gaussian processes on benchmark tasks, and the learned LFF functions are with 4-9 factored basis functions on average very compact.
[ { "version": "v1", "created": "Fri, 19 Dec 2014 11:01:21 GMT" }, { "version": "v2", "created": "Fri, 27 Feb 2015 14:53:35 GMT" }, { "version": "v3", "created": "Mon, 30 Mar 2015 15:14:20 GMT" } ]
2015-03-31T00:00:00
[ [ "Böhmer", "Wendelin", "" ], [ "Obermayer", "Klaus", "" ] ]
TITLE: Regression with Linear Factored Functions ABSTRACT: Many applications that use empirically estimated functions face a curse of dimensionality, because the integrals over most function classes must be approximated by sampling. This paper introduces a novel regression-algorithm that learns linear factored functions (LFF). This class of functions has structural properties that allow to analytically solve certain integrals and to calculate point-wise products. Applications like belief propagation and reinforcement learning can exploit these properties to break the curse and speed up computation. We derive a regularized greedy optimization scheme, that learns factored basis functions during training. The novel regression algorithm performs competitively to Gaussian processes on benchmark tasks, and the learned LFF functions are with 4-9 factored basis functions on average very compact.
no_new_dataset
0.947914
1503.01800
Samira Ebrahimi Kahou
Samira Ebrahimi Kahou, Xavier Bouthillier, Pascal Lamblin, Caglar Gulcehre, Vincent Michalski, Kishore Konda, S\'ebastien Jean, Pierre Froumenty, Yann Dauphin, Nicolas Boulanger-Lewandowski, Raul Chandias Ferrari, Mehdi Mirza, David Warde-Farley, Aaron Courville, Pascal Vincent, Roland Memisevic, Christopher Pal, Yoshua Bengio
EmoNets: Multimodal deep learning approaches for emotion recognition in video
null
null
null
null
cs.LG cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The task of the emotion recognition in the wild (EmotiW) Challenge is to assign one of seven emotions to short video clips extracted from Hollywood style movies. The videos depict acted-out emotions under realistic conditions with a large degree of variation in attributes such as pose and illumination, making it worthwhile to explore approaches which consider combinations of features from multiple modalities for label assignment. In this paper we present our approach to learning several specialist models using deep learning techniques, each focusing on one modality. Among these are a convolutional neural network, focusing on capturing visual information in detected faces, a deep belief net focusing on the representation of the audio stream, a K-Means based "bag-of-mouths" model, which extracts visual features around the mouth region and a relational autoencoder, which addresses spatio-temporal aspects of videos. We explore multiple methods for the combination of cues from these modalities into one common classifier. This achieves a considerably greater accuracy than predictions from our strongest single-modality classifier. Our method was the winning submission in the 2013 EmotiW challenge and achieved a test set accuracy of 47.67% on the 2014 dataset.
[ { "version": "v1", "created": "Thu, 5 Mar 2015 22:03:26 GMT" }, { "version": "v2", "created": "Mon, 30 Mar 2015 00:55:02 GMT" } ]
2015-03-31T00:00:00
[ [ "Kahou", "Samira Ebrahimi", "" ], [ "Bouthillier", "Xavier", "" ], [ "Lamblin", "Pascal", "" ], [ "Gulcehre", "Caglar", "" ], [ "Michalski", "Vincent", "" ], [ "Konda", "Kishore", "" ], [ "Jean", "Sébastien", "" ], [ "Froumenty", "Pierre", "" ], [ "Dauphin", "Yann", "" ], [ "Boulanger-Lewandowski", "Nicolas", "" ], [ "Ferrari", "Raul Chandias", "" ], [ "Mirza", "Mehdi", "" ], [ "Warde-Farley", "David", "" ], [ "Courville", "Aaron", "" ], [ "Vincent", "Pascal", "" ], [ "Memisevic", "Roland", "" ], [ "Pal", "Christopher", "" ], [ "Bengio", "Yoshua", "" ] ]
TITLE: EmoNets: Multimodal deep learning approaches for emotion recognition in video ABSTRACT: The task of the emotion recognition in the wild (EmotiW) Challenge is to assign one of seven emotions to short video clips extracted from Hollywood style movies. The videos depict acted-out emotions under realistic conditions with a large degree of variation in attributes such as pose and illumination, making it worthwhile to explore approaches which consider combinations of features from multiple modalities for label assignment. In this paper we present our approach to learning several specialist models using deep learning techniques, each focusing on one modality. Among these are a convolutional neural network, focusing on capturing visual information in detected faces, a deep belief net focusing on the representation of the audio stream, a K-Means based "bag-of-mouths" model, which extracts visual features around the mouth region and a relational autoencoder, which addresses spatio-temporal aspects of videos. We explore multiple methods for the combination of cues from these modalities into one common classifier. This achieves a considerably greater accuracy than predictions from our strongest single-modality classifier. Our method was the winning submission in the 2013 EmotiW challenge and achieved a test set accuracy of 47.67% on the 2014 dataset.
no_new_dataset
0.948585
1503.08263
Chunhua Shen
Fayao Liu, Guosheng Lin, Chunhua Shen
CRF Learning with CNN Features for Image Segmentation
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Conditional Random Rields (CRF) have been widely applied in image segmentations. While most studies rely on hand-crafted features, we here propose to exploit a pre-trained large convolutional neural network (CNN) to generate deep features for CRF learning. The deep CNN is trained on the ImageNet dataset and transferred to image segmentations here for constructing potentials of superpixels. Then the CRF parameters are learnt using a structured support vector machine (SSVM). To fully exploit context information in inference, we construct spatially related co-occurrence pairwise potentials and incorporate them into the energy function. This prefers labelling of object pairs that frequently co-occur in a certain spatial layout and at the same time avoids implausible labellings during the inference. Extensive experiments on binary and multi-class segmentation benchmarks demonstrate the promise of the proposed method. We thus provide new baselines for the segmentation performance on the Weizmann horse, Graz-02, MSRC-21, Stanford Background and PASCAL VOC 2011 datasets.
[ { "version": "v1", "created": "Sat, 28 Mar 2015 04:05:09 GMT" } ]
2015-03-31T00:00:00
[ [ "Liu", "Fayao", "" ], [ "Lin", "Guosheng", "" ], [ "Shen", "Chunhua", "" ] ]
TITLE: CRF Learning with CNN Features for Image Segmentation ABSTRACT: Conditional Random Rields (CRF) have been widely applied in image segmentations. While most studies rely on hand-crafted features, we here propose to exploit a pre-trained large convolutional neural network (CNN) to generate deep features for CRF learning. The deep CNN is trained on the ImageNet dataset and transferred to image segmentations here for constructing potentials of superpixels. Then the CRF parameters are learnt using a structured support vector machine (SSVM). To fully exploit context information in inference, we construct spatially related co-occurrence pairwise potentials and incorporate them into the energy function. This prefers labelling of object pairs that frequently co-occur in a certain spatial layout and at the same time avoids implausible labellings during the inference. Extensive experiments on binary and multi-class segmentation benchmarks demonstrate the promise of the proposed method. We thus provide new baselines for the segmentation performance on the Weizmann horse, Graz-02, MSRC-21, Stanford Background and PASCAL VOC 2011 datasets.
no_new_dataset
0.949059
1503.08275
Rosemarie Velik
Rosemarie Velik, Pascal Nicolay
Energy Management in Storage-Augmented, Grid-Connected Prosumer Buildings and Neighbourhoods Using a Modified Simulated Annealing Optimization
Computers & Operations Research, 2015
null
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This article introduces a modified simulated annealing optimization approach for automatically determining optimal energy management strategies in grid-connected, storage-augmented, photovoltaics-supplied prosumer buildings and neighbourhoods based on user-specific goals. For evaluating the modified simulated annealing optimizer, a number of test scenarios in the field of energy self-consumption maximization are defined and results are compared to a gradient descent and a total state space search approach. The benchmarking against these two reference methods demonstrates that the modified simulated annealing approach is able to find significantly better solutions than the gradient descent algorithm - being equal or very close to the global optimum - with significantly less computational effort and processing time than the total state space search approach.
[ { "version": "v1", "created": "Sat, 28 Mar 2015 07:16:22 GMT" } ]
2015-03-31T00:00:00
[ [ "Velik", "Rosemarie", "" ], [ "Nicolay", "Pascal", "" ] ]
TITLE: Energy Management in Storage-Augmented, Grid-Connected Prosumer Buildings and Neighbourhoods Using a Modified Simulated Annealing Optimization ABSTRACT: This article introduces a modified simulated annealing optimization approach for automatically determining optimal energy management strategies in grid-connected, storage-augmented, photovoltaics-supplied prosumer buildings and neighbourhoods based on user-specific goals. For evaluating the modified simulated annealing optimizer, a number of test scenarios in the field of energy self-consumption maximization are defined and results are compared to a gradient descent and a total state space search approach. The benchmarking against these two reference methods demonstrates that the modified simulated annealing approach is able to find significantly better solutions than the gradient descent algorithm - being equal or very close to the global optimum - with significantly less computational effort and processing time than the total state space search approach.
no_new_dataset
0.950411
1503.08348
Ravi Ganti
Ravi Ganti and Rebecca M. Willett
Sparse Linear Regression With Missing Data
14 pages, 7 figures
null
null
null
stat.ML cs.LG stat.ME
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper proposes a fast and accurate method for sparse regression in the presence of missing data. The underlying statistical model encapsulates the low-dimensional structure of the incomplete data matrix and the sparsity of the regression coefficients, and the proposed algorithm jointly learns the low-dimensional structure of the data and a linear regressor with sparse coefficients. The proposed stochastic optimization method, Sparse Linear Regression with Missing Data (SLRM), performs an alternating minimization procedure and scales well with the problem size. Large deviation inequalities shed light on the impact of the various problem-dependent parameters on the expected squared loss of the learned regressor. Extensive simulations on both synthetic and real datasets show that SLRM performs better than competing algorithms in a variety of contexts.
[ { "version": "v1", "created": "Sat, 28 Mar 2015 21:03:32 GMT" } ]
2015-03-31T00:00:00
[ [ "Ganti", "Ravi", "" ], [ "Willett", "Rebecca M.", "" ] ]
TITLE: Sparse Linear Regression With Missing Data ABSTRACT: This paper proposes a fast and accurate method for sparse regression in the presence of missing data. The underlying statistical model encapsulates the low-dimensional structure of the incomplete data matrix and the sparsity of the regression coefficients, and the proposed algorithm jointly learns the low-dimensional structure of the data and a linear regressor with sparse coefficients. The proposed stochastic optimization method, Sparse Linear Regression with Missing Data (SLRM), performs an alternating minimization procedure and scales well with the problem size. Large deviation inequalities shed light on the impact of the various problem-dependent parameters on the expected squared loss of the learned regressor. Extensive simulations on both synthetic and real datasets show that SLRM performs better than competing algorithms in a variety of contexts.
no_new_dataset
0.947527
1503.08407
Zimu Yuan
Zimu Yuan, Zhiwei Xu
CIUV: Collaborating Information Against Unreliable Views
null
null
null
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In many real world applications, the information of an object can be obtained from multiple sources. The sources may provide different point of views based on their own origin. As a consequence, conflicting pieces of information are inevitable, which gives rise to a crucial problem: how to find the truth from these conflicts. Many truth-finding methods have been proposed to resolve conflicts based on information trustworthy (i.e. more appearance means more trustworthy) as well as source reliability. However, the factor of men's involvement, i.e., information may be falsified by men with malicious intension, is more or less ignored in existing methods. Collaborating the possible relationship between information's origins and men's participation are still not studied in research. To deal with this challenge, we propose a method -- Collaborating Information against Unreliable Views (CIUV) --- in dealing with men's involvement for finding the truth. CIUV contains 3 stages for interactively mitigating the impact of unreliable views, and calculate the truth by weighting possible biases between sources. We theoretically analyze the error bound of CIUV, and conduct intensive experiments on real dataset for evaluation. The experimental results show that CIUV is feasible and has the smallest error compared with other methods.
[ { "version": "v1", "created": "Sun, 29 Mar 2015 09:30:58 GMT" } ]
2015-03-31T00:00:00
[ [ "Yuan", "Zimu", "" ], [ "Xu", "Zhiwei", "" ] ]
TITLE: CIUV: Collaborating Information Against Unreliable Views ABSTRACT: In many real world applications, the information of an object can be obtained from multiple sources. The sources may provide different point of views based on their own origin. As a consequence, conflicting pieces of information are inevitable, which gives rise to a crucial problem: how to find the truth from these conflicts. Many truth-finding methods have been proposed to resolve conflicts based on information trustworthy (i.e. more appearance means more trustworthy) as well as source reliability. However, the factor of men's involvement, i.e., information may be falsified by men with malicious intension, is more or less ignored in existing methods. Collaborating the possible relationship between information's origins and men's participation are still not studied in research. To deal with this challenge, we propose a method -- Collaborating Information against Unreliable Views (CIUV) --- in dealing with men's involvement for finding the truth. CIUV contains 3 stages for interactively mitigating the impact of unreliable views, and calculate the truth by weighting possible biases between sources. We theoretically analyze the error bound of CIUV, and conduct intensive experiments on real dataset for evaluation. The experimental results show that CIUV is feasible and has the smallest error compared with other methods.
no_new_dataset
0.946349
1503.08463
S. K. Sahay
Rajendra Kumar Roul, Saransh Varshneya, Ashu Kalra, Sanjay Kumar Sahay
A Novel Modified Apriori Approach for Web Document Clustering
11 Pages, 5 Figures
Springer, Smart Innovation Systems and Technologies, Vol. 33, 2015, p. 159-171; Proceedings of the ICCIDM, Dec. 2014
null
null
cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The traditional apriori algorithm can be used for clustering the web documents based on the association technique of data mining. But this algorithm has several limitations due to repeated database scans and its weak association rule analysis. In modern world of large databases, efficiency of traditional apriori algorithm would reduce manifolds. In this paper, we proposed a new modified apriori approach by cutting down the repeated database scans and improving association analysis of traditional apriori algorithm to cluster the web documents. Further we improve those clusters by applying Fuzzy C-Means (FCM), K-Means and Vector Space Model (VSM) techniques separately. For experimental purpose, we use Classic3 and Classic4 datasets of Cornell University having more than 10,000 documents and run both traditional apriori and our modified apriori approach on it. Experimental results show that our approach outperforms the traditional apriori algorithm in terms of database scan and improvement on association of analysis. We found out that FCM is better than K-Means and VSM in terms of F-measure of clusters of different sizes.
[ { "version": "v1", "created": "Sun, 29 Mar 2015 17:40:18 GMT" } ]
2015-03-31T00:00:00
[ [ "Roul", "Rajendra Kumar", "" ], [ "Varshneya", "Saransh", "" ], [ "Kalra", "Ashu", "" ], [ "Sahay", "Sanjay Kumar", "" ] ]
TITLE: A Novel Modified Apriori Approach for Web Document Clustering ABSTRACT: The traditional apriori algorithm can be used for clustering the web documents based on the association technique of data mining. But this algorithm has several limitations due to repeated database scans and its weak association rule analysis. In modern world of large databases, efficiency of traditional apriori algorithm would reduce manifolds. In this paper, we proposed a new modified apriori approach by cutting down the repeated database scans and improving association analysis of traditional apriori algorithm to cluster the web documents. Further we improve those clusters by applying Fuzzy C-Means (FCM), K-Means and Vector Space Model (VSM) techniques separately. For experimental purpose, we use Classic3 and Classic4 datasets of Cornell University having more than 10,000 documents and run both traditional apriori and our modified apriori approach on it. Experimental results show that our approach outperforms the traditional apriori algorithm in terms of database scan and improvement on association of analysis. We found out that FCM is better than K-Means and VSM in terms of F-measure of clusters of different sizes.
no_new_dataset
0.948822
1503.08482
Spyros Blanas
Spyros Blanas and Surendra Byna
Towards Exascale Scientific Metadata Management
null
null
null
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Advances in technology and computing hardware are enabling scientists from all areas of science to produce massive amounts of data using large-scale simulations or observational facilities. In this era of data deluge, effective coordination between the data production and the analysis phases hinges on the availability of metadata that describe the scientific datasets. Existing workflow engines have been capturing a limited form of metadata to provide provenance information about the identity and lineage of the data. However, much of the data produced by simulations, experiments, and analyses still need to be annotated manually in an ad hoc manner by domain scientists. Systematic and transparent acquisition of rich metadata becomes a crucial prerequisite to sustain and accelerate the pace of scientific innovation. Yet, ubiquitous and domain-agnostic metadata management infrastructure that can meet the demands of extreme-scale science is notable by its absence. To address this gap in scientific data management research and practice, we present our vision for an integrated approach that (1) automatically captures and manipulates information-rich metadata while the data is being produced or analyzed and (2) stores metadata within each dataset to permeate metadata-oblivious processes and to query metadata through established and standardized data access interfaces. We motivate the need for the proposed integrated approach using applications from plasma physics, climate modeling and neuroscience, and then discuss research challenges and possible solutions.
[ { "version": "v1", "created": "Sun, 29 Mar 2015 19:13:18 GMT" } ]
2015-03-31T00:00:00
[ [ "Blanas", "Spyros", "" ], [ "Byna", "Surendra", "" ] ]
TITLE: Towards Exascale Scientific Metadata Management ABSTRACT: Advances in technology and computing hardware are enabling scientists from all areas of science to produce massive amounts of data using large-scale simulations or observational facilities. In this era of data deluge, effective coordination between the data production and the analysis phases hinges on the availability of metadata that describe the scientific datasets. Existing workflow engines have been capturing a limited form of metadata to provide provenance information about the identity and lineage of the data. However, much of the data produced by simulations, experiments, and analyses still need to be annotated manually in an ad hoc manner by domain scientists. Systematic and transparent acquisition of rich metadata becomes a crucial prerequisite to sustain and accelerate the pace of scientific innovation. Yet, ubiquitous and domain-agnostic metadata management infrastructure that can meet the demands of extreme-scale science is notable by its absence. To address this gap in scientific data management research and practice, we present our vision for an integrated approach that (1) automatically captures and manipulates information-rich metadata while the data is being produced or analyzed and (2) stores metadata within each dataset to permeate metadata-oblivious processes and to query metadata through established and standardized data access interfaces. We motivate the need for the proposed integrated approach using applications from plasma physics, climate modeling and neuroscience, and then discuss research challenges and possible solutions.
no_new_dataset
0.946448
1503.08535
Junyu Xuan
Junyu Xuan, Jie Lu, Guangquan Zhang, Richard Yi Da Xu, Xiangfeng Luo
Infinite Author Topic Model based on Mixed Gamma-Negative Binomial Process
10 pages, 5 figures, submitted to KDD conference
null
null
null
stat.ML cs.IR cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Incorporating the side information of text corpus, i.e., authors, time stamps, and emotional tags, into the traditional text mining models has gained significant interests in the area of information retrieval, statistical natural language processing, and machine learning. One branch of these works is the so-called Author Topic Model (ATM), which incorporates the authors's interests as side information into the classical topic model. However, the existing ATM needs to predefine the number of topics, which is difficult and inappropriate in many real-world settings. In this paper, we propose an Infinite Author Topic (IAT) model to resolve this issue. Instead of assigning a discrete probability on fixed number of topics, we use a stochastic process to determine the number of topics from the data itself. To be specific, we extend a gamma-negative binomial process to three levels in order to capture the author-document-keyword hierarchical structure. Furthermore, each document is assigned a mixed gamma process that accounts for the multi-author's contribution towards this document. An efficient Gibbs sampling inference algorithm with each conditional distribution being closed-form is developed for the IAT model. Experiments on several real-world datasets show the capabilities of our IAT model to learn the hidden topics, authors' interests on these topics and the number of topics simultaneously.
[ { "version": "v1", "created": "Mon, 30 Mar 2015 05:03:37 GMT" } ]
2015-03-31T00:00:00
[ [ "Xuan", "Junyu", "" ], [ "Lu", "Jie", "" ], [ "Zhang", "Guangquan", "" ], [ "Da Xu", "Richard Yi", "" ], [ "Luo", "Xiangfeng", "" ] ]
TITLE: Infinite Author Topic Model based on Mixed Gamma-Negative Binomial Process ABSTRACT: Incorporating the side information of text corpus, i.e., authors, time stamps, and emotional tags, into the traditional text mining models has gained significant interests in the area of information retrieval, statistical natural language processing, and machine learning. One branch of these works is the so-called Author Topic Model (ATM), which incorporates the authors's interests as side information into the classical topic model. However, the existing ATM needs to predefine the number of topics, which is difficult and inappropriate in many real-world settings. In this paper, we propose an Infinite Author Topic (IAT) model to resolve this issue. Instead of assigning a discrete probability on fixed number of topics, we use a stochastic process to determine the number of topics from the data itself. To be specific, we extend a gamma-negative binomial process to three levels in order to capture the author-document-keyword hierarchical structure. Furthermore, each document is assigned a mixed gamma process that accounts for the multi-author's contribution towards this document. An efficient Gibbs sampling inference algorithm with each conditional distribution being closed-form is developed for the IAT model. Experiments on several real-world datasets show the capabilities of our IAT model to learn the hidden topics, authors' interests on these topics and the number of topics simultaneously.
no_new_dataset
0.951233
1503.08542
Junyu Xuan
Junyu Xuan, Jie Lu, Guangquan Zhang, Richard Yi Da Xu, Xiangfeng Luo
Nonparametric Relational Topic Models through Dependent Gamma Processes
null
null
null
null
stat.ML cs.CL cs.IR cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Traditional Relational Topic Models provide a way to discover the hidden topics from a document network. Many theoretical and practical tasks, such as dimensional reduction, document clustering, link prediction, benefit from this revealed knowledge. However, existing relational topic models are based on an assumption that the number of hidden topics is known in advance, and this is impractical in many real-world applications. Therefore, in order to relax this assumption, we propose a nonparametric relational topic model in this paper. Instead of using fixed-dimensional probability distributions in its generative model, we use stochastic processes. Specifically, a gamma process is assigned to each document, which represents the topic interest of this document. Although this method provides an elegant solution, it brings additional challenges when mathematically modeling the inherent network structure of typical document network, i.e., two spatially closer documents tend to have more similar topics. Furthermore, we require that the topics are shared by all the documents. In order to resolve these challenges, we use a subsampling strategy to assign each document a different gamma process from the global gamma process, and the subsampling probabilities of documents are assigned with a Markov Random Field constraint that inherits the document network structure. Through the designed posterior inference algorithm, we can discover the hidden topics and its number simultaneously. Experimental results on both synthetic and real-world network datasets demonstrate the capabilities of learning the hidden topics and, more importantly, the number of topics.
[ { "version": "v1", "created": "Mon, 30 Mar 2015 05:40:41 GMT" } ]
2015-03-31T00:00:00
[ [ "Xuan", "Junyu", "" ], [ "Lu", "Jie", "" ], [ "Zhang", "Guangquan", "" ], [ "Da Xu", "Richard Yi", "" ], [ "Luo", "Xiangfeng", "" ] ]
TITLE: Nonparametric Relational Topic Models through Dependent Gamma Processes ABSTRACT: Traditional Relational Topic Models provide a way to discover the hidden topics from a document network. Many theoretical and practical tasks, such as dimensional reduction, document clustering, link prediction, benefit from this revealed knowledge. However, existing relational topic models are based on an assumption that the number of hidden topics is known in advance, and this is impractical in many real-world applications. Therefore, in order to relax this assumption, we propose a nonparametric relational topic model in this paper. Instead of using fixed-dimensional probability distributions in its generative model, we use stochastic processes. Specifically, a gamma process is assigned to each document, which represents the topic interest of this document. Although this method provides an elegant solution, it brings additional challenges when mathematically modeling the inherent network structure of typical document network, i.e., two spatially closer documents tend to have more similar topics. Furthermore, we require that the topics are shared by all the documents. In order to resolve these challenges, we use a subsampling strategy to assign each document a different gamma process from the global gamma process, and the subsampling probabilities of documents are assigned with a Markov Random Field constraint that inherits the document network structure. Through the designed posterior inference algorithm, we can discover the hidden topics and its number simultaneously. Experimental results on both synthetic and real-world network datasets demonstrate the capabilities of learning the hidden topics and, more importantly, the number of topics.
no_new_dataset
0.951953
1503.08581
Ioannis Partalas
Ioannis Partalas, Aris Kosmopoulos, Nicolas Baskiotis, Thierry Artieres, George Paliouras, Eric Gaussier, Ion Androutsopoulos, Massih-Reza Amini, Patrick Galinari
LSHTC: A Benchmark for Large-Scale Text Classification
null
null
null
null
cs.IR cs.CL cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
LSHTC is a series of challenges which aims to assess the performance of classification systems in large-scale classification in a a large number of classes (up to hundreds of thousands). This paper describes the dataset that have been released along the LSHTC series. The paper details the construction of the datsets and the design of the tracks as well as the evaluation measures that we implemented and a quick overview of the results. All of these datasets are available online and runs may still be submitted on the online server of the challenges.
[ { "version": "v1", "created": "Mon, 30 Mar 2015 08:03:47 GMT" } ]
2015-03-31T00:00:00
[ [ "Partalas", "Ioannis", "" ], [ "Kosmopoulos", "Aris", "" ], [ "Baskiotis", "Nicolas", "" ], [ "Artieres", "Thierry", "" ], [ "Paliouras", "George", "" ], [ "Gaussier", "Eric", "" ], [ "Androutsopoulos", "Ion", "" ], [ "Amini", "Massih-Reza", "" ], [ "Galinari", "Patrick", "" ] ]
TITLE: LSHTC: A Benchmark for Large-Scale Text Classification ABSTRACT: LSHTC is a series of challenges which aims to assess the performance of classification systems in large-scale classification in a a large number of classes (up to hundreds of thousands). This paper describes the dataset that have been released along the LSHTC series. The paper details the construction of the datsets and the design of the tracks as well as the evaluation measures that we implemented and a quick overview of the results. All of these datasets are available online and runs may still be submitted on the online server of the challenges.
no_new_dataset
0.849222
1503.08639
Rapha\"el Li\'egeois
Rapha\"el Li\'egeois, Bamdev Mishra, Mattia Zorzi, Rodolphe Sepulchre
Sparse plus low-rank autoregressive identification in neuroimaging time series
6 pages paper submitted to CDC 2015
null
null
null
cs.LG cs.SY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper considers the problem of identifying multivariate autoregressive (AR) sparse plus low-rank graphical models. Based on the corresponding problem formulation recently presented, we use the alternating direction method of multipliers (ADMM) to efficiently solve it and scale it to sizes encountered in neuroimaging applications. We apply this decomposition on synthetic and real neuroimaging datasets with a specific focus on the information encoded in the low-rank structure of our model. In particular, we illustrate that this information captures the spatio-temporal structure of the original data, generalizing classical component analysis approaches.
[ { "version": "v1", "created": "Mon, 30 Mar 2015 11:11:57 GMT" } ]
2015-03-31T00:00:00
[ [ "Liégeois", "Raphaël", "" ], [ "Mishra", "Bamdev", "" ], [ "Zorzi", "Mattia", "" ], [ "Sepulchre", "Rodolphe", "" ] ]
TITLE: Sparse plus low-rank autoregressive identification in neuroimaging time series ABSTRACT: This paper considers the problem of identifying multivariate autoregressive (AR) sparse plus low-rank graphical models. Based on the corresponding problem formulation recently presented, we use the alternating direction method of multipliers (ADMM) to efficiently solve it and scale it to sizes encountered in neuroimaging applications. We apply this decomposition on synthetic and real neuroimaging datasets with a specific focus on the information encoded in the low-rank structure of our model. In particular, we illustrate that this information captures the spatio-temporal structure of the original data, generalizing classical component analysis approaches.
no_new_dataset
0.948632
1406.0288
Radu Horaud P
Kaustubh Kulkarni, Georgios Evangelidis, Jan Cech and Radu Horaud
Continuous Action Recognition Based on Sequence Alignment
null
International Journal of Computer Vision 112(1), 90-114, 2015
10.1007/s11263-014-0758-9
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Continuous action recognition is more challenging than isolated recognition because classification and segmentation must be simultaneously carried out. We build on the well known dynamic time warping (DTW) framework and devise a novel visual alignment technique, namely dynamic frame warping (DFW), which performs isolated recognition based on per-frame representation of videos, and on aligning a test sequence with a model sequence. Moreover, we propose two extensions which enable to perform recognition concomitant with segmentation, namely one-pass DFW and two-pass DFW. These two methods have their roots in the domain of continuous recognition of speech and, to the best of our knowledge, their extension to continuous visual action recognition has been overlooked. We test and illustrate the proposed techniques with a recently released dataset (RAVEL) and with two public-domain datasets widely used in action recognition (Hollywood-1 and Hollywood-2). We also compare the performances of the proposed isolated and continuous recognition algorithms with several recently published methods.
[ { "version": "v1", "created": "Mon, 2 Jun 2014 08:21:27 GMT" } ]
2015-03-30T00:00:00
[ [ "Kulkarni", "Kaustubh", "" ], [ "Evangelidis", "Georgios", "" ], [ "Cech", "Jan", "" ], [ "Horaud", "Radu", "" ] ]
TITLE: Continuous Action Recognition Based on Sequence Alignment ABSTRACT: Continuous action recognition is more challenging than isolated recognition because classification and segmentation must be simultaneously carried out. We build on the well known dynamic time warping (DTW) framework and devise a novel visual alignment technique, namely dynamic frame warping (DFW), which performs isolated recognition based on per-frame representation of videos, and on aligning a test sequence with a model sequence. Moreover, we propose two extensions which enable to perform recognition concomitant with segmentation, namely one-pass DFW and two-pass DFW. These two methods have their roots in the domain of continuous recognition of speech and, to the best of our knowledge, their extension to continuous visual action recognition has been overlooked. We test and illustrate the proposed techniques with a recently released dataset (RAVEL) and with two public-domain datasets widely used in action recognition (Hollywood-1 and Hollywood-2). We also compare the performances of the proposed isolated and continuous recognition algorithms with several recently published methods.
new_dataset
0.964855
1503.07884
Yongxin Yang
Yanwei Fu, Yongxin Yang, Timothy M. Hospedales, Tao Xiang and Shaogang Gong
Transductive Multi-class and Multi-label Zero-shot Learning
4 pages, 4 figures, ECCV 2014 Workshop on Parts and Attributes
null
null
null
cs.LG cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recently, zero-shot learning (ZSL) has received increasing interest. The key idea underpinning existing ZSL approaches is to exploit knowledge transfer via an intermediate-level semantic representation which is assumed to be shared between the auxiliary and target datasets, and is used to bridge between these domains for knowledge transfer. The semantic representation used in existing approaches varies from visual attributes to semantic word vectors and semantic relatedness. However, the overall pipeline is similar: a projection mapping low-level features to the semantic representation is learned from the auxiliary dataset by either classification or regression models and applied directly to map each instance into the same semantic representation space where a zero-shot classifier is used to recognise the unseen target class instances with a single known 'prototype' of each target class. In this paper we discuss two related lines of work improving the conventional approach: exploiting transductive learning ZSL, and generalising ZSL to the multi-label case.
[ { "version": "v1", "created": "Thu, 26 Mar 2015 20:07:37 GMT" } ]
2015-03-30T00:00:00
[ [ "Fu", "Yanwei", "" ], [ "Yang", "Yongxin", "" ], [ "Hospedales", "Timothy M.", "" ], [ "Xiang", "Tao", "" ], [ "Gong", "Shaogang", "" ] ]
TITLE: Transductive Multi-class and Multi-label Zero-shot Learning ABSTRACT: Recently, zero-shot learning (ZSL) has received increasing interest. The key idea underpinning existing ZSL approaches is to exploit knowledge transfer via an intermediate-level semantic representation which is assumed to be shared between the auxiliary and target datasets, and is used to bridge between these domains for knowledge transfer. The semantic representation used in existing approaches varies from visual attributes to semantic word vectors and semantic relatedness. However, the overall pipeline is similar: a projection mapping low-level features to the semantic representation is learned from the auxiliary dataset by either classification or regression models and applied directly to map each instance into the same semantic representation space where a zero-shot classifier is used to recognise the unseen target class instances with a single known 'prototype' of each target class. In this paper we discuss two related lines of work improving the conventional approach: exploiting transductive learning ZSL, and generalising ZSL to the multi-label case.
no_new_dataset
0.942082
1503.07939
Raktim Bhattacharya
Raktim Bhattacharya
Robust State Feedback Control Design with Probabilistic System Parameters
Published in CDC 2014
null
null
null
cs.SY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, a new polynomial chaos based framework for analyzing linear systems with probabilistic parameters is presented. Stability analysis and synthesis of optimal quadratically stabilizing controllers for such systems are presented as convex optimization problems, with exponential mean square stability guarantees. A Monte-Carlo approach for analysis and synthesis is also presented, which is used to benchmark the polynomial chaos based approach. The computational advantage of the polynomial chaos approach is shown with an example based on the design of an optimal EMS-stabilizing controller, for an F-16 aircraft model.
[ { "version": "v1", "created": "Fri, 27 Mar 2015 01:40:36 GMT" } ]
2015-03-30T00:00:00
[ [ "Bhattacharya", "Raktim", "" ] ]
TITLE: Robust State Feedback Control Design with Probabilistic System Parameters ABSTRACT: In this paper, a new polynomial chaos based framework for analyzing linear systems with probabilistic parameters is presented. Stability analysis and synthesis of optimal quadratically stabilizing controllers for such systems are presented as convex optimization problems, with exponential mean square stability guarantees. A Monte-Carlo approach for analysis and synthesis is also presented, which is used to benchmark the polynomial chaos based approach. The computational advantage of the polynomial chaos approach is shown with an example based on the design of an optimal EMS-stabilizing controller, for an F-16 aircraft model.
no_new_dataset
0.94801
1503.07989
Naveed Akhtar Mr.
Naveed Akhtar, Faisal Shafait, Ajmal Mian
Discriminative Bayesian Dictionary Learning for Classification
15 pages
null
null
null
cs.CV cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a Bayesian approach to learn discriminative dictionaries for sparse representation of data. The proposed approach infers probability distributions over the atoms of a discriminative dictionary using a Beta Process. It also computes sets of Bernoulli distributions that associate class labels to the learned dictionary atoms. This association signifies the selection probabilities of the dictionary atoms in the expansion of class-specific data. Furthermore, the non-parametric character of the proposed approach allows it to infer the correct size of the dictionary. We exploit the aforementioned Bernoulli distributions in separately learning a linear classifier. The classifier uses the same hierarchical Bayesian model as the dictionary, which we present along the analytical inference solution for Gibbs sampling. For classification, a test instance is first sparsely encoded over the learned dictionary and the codes are fed to the classifier. We performed experiments for face and action recognition; and object and scene-category classification using five public datasets and compared the results with state-of-the-art discriminative sparse representation approaches. Experiments show that the proposed Bayesian approach consistently outperforms the existing approaches.
[ { "version": "v1", "created": "Fri, 27 Mar 2015 08:36:15 GMT" } ]
2015-03-30T00:00:00
[ [ "Akhtar", "Naveed", "" ], [ "Shafait", "Faisal", "" ], [ "Mian", "Ajmal", "" ] ]
TITLE: Discriminative Bayesian Dictionary Learning for Classification ABSTRACT: We propose a Bayesian approach to learn discriminative dictionaries for sparse representation of data. The proposed approach infers probability distributions over the atoms of a discriminative dictionary using a Beta Process. It also computes sets of Bernoulli distributions that associate class labels to the learned dictionary atoms. This association signifies the selection probabilities of the dictionary atoms in the expansion of class-specific data. Furthermore, the non-parametric character of the proposed approach allows it to infer the correct size of the dictionary. We exploit the aforementioned Bernoulli distributions in separately learning a linear classifier. The classifier uses the same hierarchical Bayesian model as the dictionary, which we present along the analytical inference solution for Gibbs sampling. For classification, a test instance is first sparsely encoded over the learned dictionary and the codes are fed to the classifier. We performed experiments for face and action recognition; and object and scene-category classification using five public datasets and compared the results with state-of-the-art discriminative sparse representation approaches. Experiments show that the proposed Bayesian approach consistently outperforms the existing approaches.
no_new_dataset
0.947235
1503.08081
Manfred Poechacker DI
Manfred P\"ochacker, Dominik Egarter, Wilfried Elmenreich
Proficiency of Power Values for Load Disaggregation
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Load disaggregation techniques infer the operation of different power consuming devices from a single measurement point that records the total power draw over time. Thus, a device consuming power at the moment can be understood as information encoded in the power draw. However, similar power draws or similar combinations of power draws limit the ability to detect the currently active device set. We present an information coding perspective of load disaggregation to enable a better understanding of this process and to support its future improvement. In typical cases of quantity and type of devices and their respective power consumption, not all possible device configurations can be mapped to distinguishable power values. We introduce the term of proficiency to describe the suitability of a device set for load disaggregation. We provide the notion and calculation of entropy of initial device states, mutual information of power values and the resulting uncertainty coefficient or proficiency. We show that the proficiency is highly dependent from the device running probability especially for devices with multiple states of power consumption. The application of the concept is demonstrated by exemplary artificial data as well as with actual power consumption data from real-world power draw datasets.
[ { "version": "v1", "created": "Fri, 27 Mar 2015 14:01:07 GMT" } ]
2015-03-30T00:00:00
[ [ "Pöchacker", "Manfred", "" ], [ "Egarter", "Dominik", "" ], [ "Elmenreich", "Wilfried", "" ] ]
TITLE: Proficiency of Power Values for Load Disaggregation ABSTRACT: Load disaggregation techniques infer the operation of different power consuming devices from a single measurement point that records the total power draw over time. Thus, a device consuming power at the moment can be understood as information encoded in the power draw. However, similar power draws or similar combinations of power draws limit the ability to detect the currently active device set. We present an information coding perspective of load disaggregation to enable a better understanding of this process and to support its future improvement. In typical cases of quantity and type of devices and their respective power consumption, not all possible device configurations can be mapped to distinguishable power values. We introduce the term of proficiency to describe the suitability of a device set for load disaggregation. We provide the notion and calculation of entropy of initial device states, mutual information of power values and the resulting uncertainty coefficient or proficiency. We show that the proficiency is highly dependent from the device running probability especially for devices with multiple states of power consumption. The application of the concept is demonstrated by exemplary artificial data as well as with actual power consumption data from real-world power draw datasets.
no_new_dataset
0.946646
1503.05571
Guillaume Alain
Guillaume Alain, Yoshua Bengio, Li Yao, Jason Yosinski, Eric Thibodeau-Laufer, Saizheng Zhang, Pascal Vincent
GSNs : Generative Stochastic Networks
arXiv admin note: substantial text overlap with arXiv:1306.1091
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce a novel training principle for probabilistic models that is an alternative to maximum likelihood. The proposed Generative Stochastic Networks (GSN) framework is based on learning the transition operator of a Markov chain whose stationary distribution estimates the data distribution. Because the transition distribution is a conditional distribution generally involving a small move, it has fewer dominant modes, being unimodal in the limit of small moves. Thus, it is easier to learn, more like learning to perform supervised function approximation, with gradients that can be obtained by back-propagation. The theorems provided here generalize recent work on the probabilistic interpretation of denoising auto-encoders and provide an interesting justification for dependency networks and generalized pseudolikelihood (along with defining an appropriate joint distribution and sampling mechanism, even when the conditionals are not consistent). We study how GSNs can be used with missing inputs and can be used to sample subsets of variables given the rest. Successful experiments are conducted, validating these theoretical results, on two image datasets and with a particular architecture that mimics the Deep Boltzmann Machine Gibbs sampler but allows training to proceed with backprop, without the need for layerwise pretraining.
[ { "version": "v1", "created": "Wed, 18 Mar 2015 20:06:07 GMT" }, { "version": "v2", "created": "Mon, 23 Mar 2015 16:44:52 GMT" } ]
2015-03-29T00:00:00
[ [ "Alain", "Guillaume", "" ], [ "Bengio", "Yoshua", "" ], [ "Yao", "Li", "" ], [ "Yosinski", "Jason", "" ], [ "Thibodeau-Laufer", "Eric", "" ], [ "Zhang", "Saizheng", "" ], [ "Vincent", "Pascal", "" ] ]
TITLE: GSNs : Generative Stochastic Networks ABSTRACT: We introduce a novel training principle for probabilistic models that is an alternative to maximum likelihood. The proposed Generative Stochastic Networks (GSN) framework is based on learning the transition operator of a Markov chain whose stationary distribution estimates the data distribution. Because the transition distribution is a conditional distribution generally involving a small move, it has fewer dominant modes, being unimodal in the limit of small moves. Thus, it is easier to learn, more like learning to perform supervised function approximation, with gradients that can be obtained by back-propagation. The theorems provided here generalize recent work on the probabilistic interpretation of denoising auto-encoders and provide an interesting justification for dependency networks and generalized pseudolikelihood (along with defining an appropriate joint distribution and sampling mechanism, even when the conditionals are not consistent). We study how GSNs can be used with missing inputs and can be used to sample subsets of variables given the rest. Successful experiments are conducted, validating these theoretical results, on two image datasets and with a particular architecture that mimics the Deep Boltzmann Machine Gibbs sampler but allows training to proceed with backprop, without the need for layerwise pretraining.
no_new_dataset
0.948202
1503.06268
Tanmoy Chakraborty
Tanmoy Chakraborty, Suhansanu Kumar, Pawan Goyal, Niloy Ganguly, Animesh Mukherjee
On the categorization of scientific citation profiles in computer sciences
11 pages, 10 figures, Accepted in Communications of the ACM (CACM), 2015. arXiv admin note: text overlap with arXiv:1206.0108 by other authors
null
null
null
cs.DL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A common consensus in the literature is that the citation profile of published articles in general follows a universal pattern - an initial growth in the number of citations within the first two to three years after publication followed by a steady peak of one to two years and then a final decline over the rest of the lifetime of the article. This observation has long been the underlying heuristic in determining major bibliometric factors such as the quality of a publication, the growth of scientific communities, impact factor of publication venues etc. In this paper, we gather and analyze a massive dataset of scientific papers from the computer science domain and notice that the citation count of the articles over the years follows a remarkably diverse set of patterns - a profile with an initial peak (PeakInit), with distinct multiple peaks (PeakMul), with a peak late in time (PeakLate), that is monotonically decreasing (MonDec), that is monotonically increasing (MonIncr) and that can not be categorized into any of the above (Oth). We conduct a thorough experiment to investigate several important characteristics of these categories such as how individual categories attract citations, how the categorization is influenced by the year and the venue of publication of papers, how each category is affected by self-citations, the stability of the categories over time, and how much each of these categories contribute to the core of the network. Further, we show that the traditional preferential attachment models fail to explain these citation profiles. Therefore, we propose a novel dynamic growth model that takes both the preferential attachment and the aging factor into account in order to replicate the real-world behavior of various citation profiles. We believe that this paper opens the scope for a serious re-investigation of the existing bibliometric indices for scientific research.
[ { "version": "v1", "created": "Sat, 21 Mar 2015 06:03:44 GMT" } ]
2015-03-29T00:00:00
[ [ "Chakraborty", "Tanmoy", "" ], [ "Kumar", "Suhansanu", "" ], [ "Goyal", "Pawan", "" ], [ "Ganguly", "Niloy", "" ], [ "Mukherjee", "Animesh", "" ] ]
TITLE: On the categorization of scientific citation profiles in computer sciences ABSTRACT: A common consensus in the literature is that the citation profile of published articles in general follows a universal pattern - an initial growth in the number of citations within the first two to three years after publication followed by a steady peak of one to two years and then a final decline over the rest of the lifetime of the article. This observation has long been the underlying heuristic in determining major bibliometric factors such as the quality of a publication, the growth of scientific communities, impact factor of publication venues etc. In this paper, we gather and analyze a massive dataset of scientific papers from the computer science domain and notice that the citation count of the articles over the years follows a remarkably diverse set of patterns - a profile with an initial peak (PeakInit), with distinct multiple peaks (PeakMul), with a peak late in time (PeakLate), that is monotonically decreasing (MonDec), that is monotonically increasing (MonIncr) and that can not be categorized into any of the above (Oth). We conduct a thorough experiment to investigate several important characteristics of these categories such as how individual categories attract citations, how the categorization is influenced by the year and the venue of publication of papers, how each category is affected by self-citations, the stability of the categories over time, and how much each of these categories contribute to the core of the network. Further, we show that the traditional preferential attachment models fail to explain these citation profiles. Therefore, we propose a novel dynamic growth model that takes both the preferential attachment and the aging factor into account in order to replicate the real-world behavior of various citation profiles. We believe that this paper opens the scope for a serious re-investigation of the existing bibliometric indices for scientific research.
no_new_dataset
0.944587
1503.06608
Lakshmi Devasena C
Lakshmi Devasena C
Proficiency Comparison of LADTree and REPTree Classifiers for Credit Risk Forecast
arXiv admin note: text overlap with arXiv:1310.5963 by other authors
International Journal on Computational Sciences & Applications (IJCSA) Vol.5, No.1, February 2015, pp. 39 - 50
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Predicting the Credit Defaulter is a perilous task of Financial Industries like Banks. Ascertaining non-payer before giving loan is a significant and conflict-ridden task of the Banker. Classification techniques are the better choice for predictive analysis like finding the claimant, whether he/she is an unpretentious customer or a cheat. Defining the outstanding classifier is a risky assignment for any industrialist like a banker. This allow computer science researchers to drill down efficient research works through evaluating different classifiers and finding out the best classifier for such predictive problems. This research work investigates the productivity of LADTree Classifier and REPTree Classifier for the credit risk prediction and compares their fitness through various measures. German credit dataset has been taken and used to predict the credit risk with a help of open source machine learning tool.
[ { "version": "v1", "created": "Mon, 23 Mar 2015 11:47:05 GMT" } ]
2015-03-29T00:00:00
[ [ "C", "Lakshmi Devasena", "" ] ]
TITLE: Proficiency Comparison of LADTree and REPTree Classifiers for Credit Risk Forecast ABSTRACT: Predicting the Credit Defaulter is a perilous task of Financial Industries like Banks. Ascertaining non-payer before giving loan is a significant and conflict-ridden task of the Banker. Classification techniques are the better choice for predictive analysis like finding the claimant, whether he/she is an unpretentious customer or a cheat. Defining the outstanding classifier is a risky assignment for any industrialist like a banker. This allow computer science researchers to drill down efficient research works through evaluating different classifiers and finding out the best classifier for such predictive problems. This research work investigates the productivity of LADTree Classifier and REPTree Classifier for the credit risk prediction and compares their fitness through various measures. German credit dataset has been taken and used to predict the credit risk with a help of open source machine learning tool.
no_new_dataset
0.948775
1403.4597
Zheng Nan
Zheng Nan, Tianyi Chen, Xin Wang, and Wei Ni
Energy-Efficient Transmission Schedule for Delay-Limited Bursty Data Arrivals under Non-Ideal Circuit Power Consumption
30 pages, 7 figures
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper develops a novel approach to obtaining energy-efficient transmission schedules for delay-limited bursty data arrivals under non-ideal circuit power consumption. Assuming a-prior knowledge of packet arrivals, deadlines and channel realizations, we show that the problem can be formulated as a convex program. For both time-invariant and time-varying fading channels, it is revealed that the optimal transmission between any two consecutive channel or data state changing instants, termed epoch, can only take one of the three strategies: (i) no transmission, (ii) transmission with an energy-efficiency (EE) maximizing rate over part of the epoch, or (iii) transmission with a rate greater than the EE-maximizing rate over the whole epoch. Based on this specific structure, efficient algorithms are then developed to find the optimal policies that minimize the total energy consumption with a low computational complexity. The proposed approach can provide the optimal benchmarks for practical schemes designed for transmissions of delay-limited data arrivals, and can be employed to develop efficient online scheduling schemes which require only causal knowledge of data arrivals and deadline requirements.
[ { "version": "v1", "created": "Tue, 18 Mar 2014 02:28:59 GMT" }, { "version": "v2", "created": "Thu, 26 Mar 2015 01:51:42 GMT" } ]
2015-03-27T00:00:00
[ [ "Nan", "Zheng", "" ], [ "Chen", "Tianyi", "" ], [ "Wang", "Xin", "" ], [ "Ni", "Wei", "" ] ]
TITLE: Energy-Efficient Transmission Schedule for Delay-Limited Bursty Data Arrivals under Non-Ideal Circuit Power Consumption ABSTRACT: This paper develops a novel approach to obtaining energy-efficient transmission schedules for delay-limited bursty data arrivals under non-ideal circuit power consumption. Assuming a-prior knowledge of packet arrivals, deadlines and channel realizations, we show that the problem can be formulated as a convex program. For both time-invariant and time-varying fading channels, it is revealed that the optimal transmission between any two consecutive channel or data state changing instants, termed epoch, can only take one of the three strategies: (i) no transmission, (ii) transmission with an energy-efficiency (EE) maximizing rate over part of the epoch, or (iii) transmission with a rate greater than the EE-maximizing rate over the whole epoch. Based on this specific structure, efficient algorithms are then developed to find the optimal policies that minimize the total energy consumption with a low computational complexity. The proposed approach can provide the optimal benchmarks for practical schemes designed for transmissions of delay-limited data arrivals, and can be employed to develop efficient online scheduling schemes which require only causal knowledge of data arrivals and deadline requirements.
no_new_dataset
0.95018
1503.07783
Faraz Saeedan
Faraz Saeedan, Barbara Caputo
Towards Learning free Naive Bayes Nearest Neighbor-based Domain Adaptation
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
As of today, object categorization algorithms are not able to achieve the level of robustness and generality necessary to work reliably in the real world. Even the most powerful convolutional neural network we can train fails to perform satisfactorily when trained and tested on data from different databases. This issue, known as domain adaptation and/or dataset bias in the literature, is due to a distribution mismatch between data collections. Methods addressing it go from max-margin classifiers to learning how to modify the features and obtain a more robust representation. Recent work showed that by casting the problem into the image-to-class recognition framework, the domain adaptation problem is significantly alleviated \cite{danbnn}. Here we follow this approach, and show how a very simple, learning free Naive Bayes Nearest Neighbor (NBNN)-based domain adaptation algorithm can significantly alleviate the distribution mismatch among source and target data, especially when the number of classes and the number of sources grow. Experiments on standard benchmarks used in the literature show that our approach (a) is competitive with the current state of the art on small scale problems, and (b) achieves the current state of the art as the number of classes and sources grows, with minimal computational requirements.
[ { "version": "v1", "created": "Thu, 26 Mar 2015 16:55:19 GMT" } ]
2015-03-27T00:00:00
[ [ "Saeedan", "Faraz", "" ], [ "Caputo", "Barbara", "" ] ]
TITLE: Towards Learning free Naive Bayes Nearest Neighbor-based Domain Adaptation ABSTRACT: As of today, object categorization algorithms are not able to achieve the level of robustness and generality necessary to work reliably in the real world. Even the most powerful convolutional neural network we can train fails to perform satisfactorily when trained and tested on data from different databases. This issue, known as domain adaptation and/or dataset bias in the literature, is due to a distribution mismatch between data collections. Methods addressing it go from max-margin classifiers to learning how to modify the features and obtain a more robust representation. Recent work showed that by casting the problem into the image-to-class recognition framework, the domain adaptation problem is significantly alleviated \cite{danbnn}. Here we follow this approach, and show how a very simple, learning free Naive Bayes Nearest Neighbor (NBNN)-based domain adaptation algorithm can significantly alleviate the distribution mismatch among source and target data, especially when the number of classes and the number of sources grow. Experiments on standard benchmarks used in the literature show that our approach (a) is competitive with the current state of the art on small scale problems, and (b) achieves the current state of the art as the number of classes and sources grows, with minimal computational requirements.
no_new_dataset
0.949949
1503.07790
Yongxin Yang
Yanwei Fu, Yongxin Yang, Tim Hospedales, Tao Xiang and Shaogang Gong
Transductive Multi-label Zero-shot Learning
12 pages, 6 figures, Accepted to BMVC 2014 (oral)
null
null
null
cs.LG cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Zero-shot learning has received increasing interest as a means to alleviate the often prohibitive expense of annotating training data for large scale recognition problems. These methods have achieved great success via learning intermediate semantic representations in the form of attributes and more recently, semantic word vectors. However, they have thus far been constrained to the single-label case, in contrast to the growing popularity and importance of more realistic multi-label data. In this paper, for the first time, we investigate and formalise a general framework for multi-label zero-shot learning, addressing the unique challenge therein: how to exploit multi-label correlation at test time with no training data for those classes? In particular, we propose (1) a multi-output deep regression model to project an image into a semantic word space, which explicitly exploits the correlations in the intermediate semantic layer of word vectors; (2) a novel zero-shot learning algorithm for multi-label data that exploits the unique compositionality property of semantic word vector representations; and (3) a transductive learning strategy to enable the regression model learned from seen classes to generalise well to unseen classes. Our zero-shot learning experiments on a number of standard multi-label datasets demonstrate that our method outperforms a variety of baselines.
[ { "version": "v1", "created": "Thu, 26 Mar 2015 17:12:34 GMT" } ]
2015-03-27T00:00:00
[ [ "Fu", "Yanwei", "" ], [ "Yang", "Yongxin", "" ], [ "Hospedales", "Tim", "" ], [ "Xiang", "Tao", "" ], [ "Gong", "Shaogang", "" ] ]
TITLE: Transductive Multi-label Zero-shot Learning ABSTRACT: Zero-shot learning has received increasing interest as a means to alleviate the often prohibitive expense of annotating training data for large scale recognition problems. These methods have achieved great success via learning intermediate semantic representations in the form of attributes and more recently, semantic word vectors. However, they have thus far been constrained to the single-label case, in contrast to the growing popularity and importance of more realistic multi-label data. In this paper, for the first time, we investigate and formalise a general framework for multi-label zero-shot learning, addressing the unique challenge therein: how to exploit multi-label correlation at test time with no training data for those classes? In particular, we propose (1) a multi-output deep regression model to project an image into a semantic word space, which explicitly exploits the correlations in the intermediate semantic layer of word vectors; (2) a novel zero-shot learning algorithm for multi-label data that exploits the unique compositionality property of semantic word vector representations; and (3) a transductive learning strategy to enable the regression model learned from seen classes to generalise well to unseen classes. Our zero-shot learning experiments on a number of standard multi-label datasets demonstrate that our method outperforms a variety of baselines.
no_new_dataset
0.946597
1503.07828
Graham Pulford
Graham W. Pulford
A Survey of Manoeuvring Target Tracking Methods
38 pages, 6 figures. Original manuscript dated 23/12/1998. Submitted to IEEE Transactions on Aerospace & Electronic Systems. Withdrawn following a review process lasting 3 years. By the end of this period, this survey paper was out of date
null
10.13140/2.1.4994.3846
null
cs.SY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A comprehensive review of the literature on manoeuvring target tracking for both uncluttered and cluttered measurements is presented. Various discrete-time dynamical models including non-random input, random-input and switching or hybrid system manoeuvre models are presented. The problem of manoeuvre detection is covered. Classical and current filtering methods for manoeuvre tracking are presented including multi-level process noise, input estimation, variable dimension filtering, two-stage filter, the interacting multiple model algorithm, and generalised pseudo-Bayesian algorithms. Various extensions of these algorithms to the case of cluttered measurements are also described and these include: joint manoeuvre and measurement association, probabilistic data association and multi-hypothesis tracking. Smoothing schemes, including IMM smoothing and batch expectation-maximisation using the Viterbi algorithm, are also described. The use of amplitude information for target measurement discrimination is discussed. It is noted that although many manoeuvre tacking techniques exist, the literature contains surprisingly few performance comparisons to guide the design engineer although a performance benchmark has recently been introduced.
[ { "version": "v1", "created": "Fri, 6 Mar 2015 01:35:12 GMT" } ]
2015-03-27T00:00:00
[ [ "Pulford", "Graham W.", "" ] ]
TITLE: A Survey of Manoeuvring Target Tracking Methods ABSTRACT: A comprehensive review of the literature on manoeuvring target tracking for both uncluttered and cluttered measurements is presented. Various discrete-time dynamical models including non-random input, random-input and switching or hybrid system manoeuvre models are presented. The problem of manoeuvre detection is covered. Classical and current filtering methods for manoeuvre tracking are presented including multi-level process noise, input estimation, variable dimension filtering, two-stage filter, the interacting multiple model algorithm, and generalised pseudo-Bayesian algorithms. Various extensions of these algorithms to the case of cluttered measurements are also described and these include: joint manoeuvre and measurement association, probabilistic data association and multi-hypothesis tracking. Smoothing schemes, including IMM smoothing and batch expectation-maximisation using the Viterbi algorithm, are also described. The use of amplitude information for target measurement discrimination is discussed. It is noted that although many manoeuvre tacking techniques exist, the literature contains surprisingly few performance comparisons to guide the design engineer although a performance benchmark has recently been introduced.
no_new_dataset
0.9455
1503.05768
Yunjin Chen
Yunjin Chen, Wei Yu, Thomas Pock
On learning optimized reaction diffusion processes for effective image restoration
9 pages, 3 figures, 3 tables. CVPR2015 oral presentation together with the supplemental material of 13 pages, 8 pages (Notes on diffusion networks)
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
For several decades, image restoration remains an active research topic in low-level computer vision and hence new approaches are constantly emerging. However, many recently proposed algorithms achieve state-of-the-art performance only at the expense of very high computation time, which clearly limits their practical relevance. In this work, we propose a simple but effective approach with both high computational efficiency and high restoration quality. We extend conventional nonlinear reaction diffusion models by several parametrized linear filters as well as several parametrized influence functions. We propose to train the parameters of the filters and the influence functions through a loss based approach. Experiments show that our trained nonlinear reaction diffusion models largely benefit from the training of the parameters and finally lead to the best reported performance on common test datasets for image restoration. Due to their structural simplicity, our trained models are highly efficient and are also well-suited for parallel computation on GPUs.
[ { "version": "v1", "created": "Thu, 19 Mar 2015 14:01:42 GMT" }, { "version": "v2", "created": "Wed, 25 Mar 2015 19:59:44 GMT" } ]
2015-03-26T00:00:00
[ [ "Chen", "Yunjin", "" ], [ "Yu", "Wei", "" ], [ "Pock", "Thomas", "" ] ]
TITLE: On learning optimized reaction diffusion processes for effective image restoration ABSTRACT: For several decades, image restoration remains an active research topic in low-level computer vision and hence new approaches are constantly emerging. However, many recently proposed algorithms achieve state-of-the-art performance only at the expense of very high computation time, which clearly limits their practical relevance. In this work, we propose a simple but effective approach with both high computational efficiency and high restoration quality. We extend conventional nonlinear reaction diffusion models by several parametrized linear filters as well as several parametrized influence functions. We propose to train the parameters of the filters and the influence functions through a loss based approach. Experiments show that our trained nonlinear reaction diffusion models largely benefit from the training of the parameters and finally lead to the best reported performance on common test datasets for image restoration. Due to their structural simplicity, our trained models are highly efficient and are also well-suited for parallel computation on GPUs.
no_new_dataset
0.951369
1503.07240
Dengyong Zhou
Dengyong Zhou, Qiang Liu, John C. Platt, Christopher Meek, Nihar B. Shah
Regularized Minimax Conditional Entropy for Crowdsourcing
31 pages
null
null
null
cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
There is a rapidly increasing interest in crowdsourcing for data labeling. By crowdsourcing, a large number of labels can be often quickly gathered at low cost. However, the labels provided by the crowdsourcing workers are usually not of high quality. In this paper, we propose a minimax conditional entropy principle to infer ground truth from noisy crowdsourced labels. Under this principle, we derive a unique probabilistic labeling model jointly parameterized by worker ability and item difficulty. We also propose an objective measurement principle, and show that our method is the only method which satisfies this objective measurement principle. We validate our method through a variety of real crowdsourcing datasets with binary, multiclass or ordinal labels.
[ { "version": "v1", "created": "Wed, 25 Mar 2015 00:10:11 GMT" } ]
2015-03-26T00:00:00
[ [ "Zhou", "Dengyong", "" ], [ "Liu", "Qiang", "" ], [ "Platt", "John C.", "" ], [ "Meek", "Christopher", "" ], [ "Shah", "Nihar B.", "" ] ]
TITLE: Regularized Minimax Conditional Entropy for Crowdsourcing ABSTRACT: There is a rapidly increasing interest in crowdsourcing for data labeling. By crowdsourcing, a large number of labels can be often quickly gathered at low cost. However, the labels provided by the crowdsourcing workers are usually not of high quality. In this paper, we propose a minimax conditional entropy principle to infer ground truth from noisy crowdsourced labels. Under this principle, we derive a unique probabilistic labeling model jointly parameterized by worker ability and item difficulty. We also propose an objective measurement principle, and show that our method is the only method which satisfies this objective measurement principle. We validate our method through a variety of real crowdsourcing datasets with binary, multiclass or ordinal labels.
no_new_dataset
0.955277
1503.07274
Elman Mansimov
Elman Mansimov, Nitish Srivastava, Ruslan Salakhutdinov
Initialization Strategies of Spatio-Temporal Convolutional Neural Networks
Technical Report
null
null
null
cs.CV cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a new way of incorporating temporal information present in videos into Spatial Convolutional Neural Networks (ConvNets) trained on images, that avoids training Spatio-Temporal ConvNets from scratch. We describe several initializations of weights in 3D Convolutional Layers of Spatio-Temporal ConvNet using 2D Convolutional Weights learned from ImageNet. We show that it is important to initialize 3D Convolutional Weights judiciously in order to learn temporal representations of videos. We evaluate our methods on the UCF-101 dataset and demonstrate improvement over Spatial ConvNets.
[ { "version": "v1", "created": "Wed, 25 Mar 2015 03:41:47 GMT" } ]
2015-03-26T00:00:00
[ [ "Mansimov", "Elman", "" ], [ "Srivastava", "Nitish", "" ], [ "Salakhutdinov", "Ruslan", "" ] ]
TITLE: Initialization Strategies of Spatio-Temporal Convolutional Neural Networks ABSTRACT: We propose a new way of incorporating temporal information present in videos into Spatial Convolutional Neural Networks (ConvNets) trained on images, that avoids training Spatio-Temporal ConvNets from scratch. We describe several initializations of weights in 3D Convolutional Layers of Spatio-Temporal ConvNet using 2D Convolutional Weights learned from ImageNet. We show that it is important to initialize 3D Convolutional Weights judiciously in order to learn temporal representations of videos. We evaluate our methods on the UCF-101 dataset and demonstrate improvement over Spatial ConvNets.
no_new_dataset
0.950869
1503.07405
Arkaitz Zubiaga
Bo Wang, Arkaitz Zubiaga, Maria Liakata, Rob Procter
Making the Most of Tweet-Inherent Features for Social Spam Detection on Twitter
null
null
null
null
cs.IR cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Social spam produces a great amount of noise on social media services such as Twitter, which reduces the signal-to-noise ratio that both end users and data mining applications observe. Existing techniques on social spam detection have focused primarily on the identification of spam accounts by using extensive historical and network-based data. In this paper we focus on the detection of spam tweets, which optimises the amount of data that needs to be gathered by relying only on tweet-inherent features. This enables the application of the spam detection system to a large set of tweets in a timely fashion, potentially applicable in a real-time or near real-time setting. Using two large hand-labelled datasets of tweets containing spam, we study the suitability of five classification algorithms and four different feature sets to the social spam detection task. Our results show that, by using the limited set of features readily available in a tweet, we can achieve encouraging results which are competitive when compared against existing spammer detection systems that make use of additional, costly user features. Our study is the first that attempts at generalising conclusions on the optimal classifiers and sets of features for social spam detection over different datasets.
[ { "version": "v1", "created": "Wed, 25 Mar 2015 14:58:59 GMT" } ]
2015-03-26T00:00:00
[ [ "Wang", "Bo", "" ], [ "Zubiaga", "Arkaitz", "" ], [ "Liakata", "Maria", "" ], [ "Procter", "Rob", "" ] ]
TITLE: Making the Most of Tweet-Inherent Features for Social Spam Detection on Twitter ABSTRACT: Social spam produces a great amount of noise on social media services such as Twitter, which reduces the signal-to-noise ratio that both end users and data mining applications observe. Existing techniques on social spam detection have focused primarily on the identification of spam accounts by using extensive historical and network-based data. In this paper we focus on the detection of spam tweets, which optimises the amount of data that needs to be gathered by relying only on tweet-inherent features. This enables the application of the spam detection system to a large set of tweets in a timely fashion, potentially applicable in a real-time or near real-time setting. Using two large hand-labelled datasets of tweets containing spam, we study the suitability of five classification algorithms and four different feature sets to the social spam detection task. Our results show that, by using the limited set of features readily available in a tweet, we can achieve encouraging results which are competitive when compared against existing spammer detection systems that make use of additional, costly user features. Our study is the first that attempts at generalising conclusions on the optimal classifiers and sets of features for social spam detection over different datasets.
no_new_dataset
0.944893
1503.07477
Debajyoti Mukhopadhyay Prof.
Praful Koturwar, Sheetal Girase, Debajyoti Mukhopadhyay
A Survey of Classification Techniques in the Area of Big Data
7 pages, 3 figures, 2 tables in IJAFRC, Vol.1, Issue 11, November 2014, ISSN: 2348-4853
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Big Data concern large-volume, growing data sets that are complex and have multiple autonomous sources. Earlier technologies were not able to handle storage and processing of huge data thus Big Data concept comes into existence. This is a tedious job for users unstructured data. So, there should be some mechanism which classify unstructured data into organized form which helps user to easily access required data. Classification techniques over big transactional database provide required data to the users from large datasets more simple way. There are two main classification techniques, supervised and unsupervised. In this paper we focused on to study of different supervised classification techniques. Further this paper shows a advantages and limitations.
[ { "version": "v1", "created": "Wed, 25 Mar 2015 17:56:19 GMT" } ]
2015-03-26T00:00:00
[ [ "Koturwar", "Praful", "" ], [ "Girase", "Sheetal", "" ], [ "Mukhopadhyay", "Debajyoti", "" ] ]
TITLE: A Survey of Classification Techniques in the Area of Big Data ABSTRACT: Big Data concern large-volume, growing data sets that are complex and have multiple autonomous sources. Earlier technologies were not able to handle storage and processing of huge data thus Big Data concept comes into existence. This is a tedious job for users unstructured data. So, there should be some mechanism which classify unstructured data into organized form which helps user to easily access required data. Classification techniques over big transactional database provide required data to the users from large datasets more simple way. There are two main classification techniques, supervised and unsupervised. In this paper we focused on to study of different supervised classification techniques. Further this paper shows a advantages and limitations.
no_new_dataset
0.941277
1410.3469
Daniel Whiteson
Pierre Baldi, Peter Sadowski, Daniel Whiteson
Enhanced Higgs to $\tau^+\tau^-$ Searches with Deep Learning
For submission to PRL
Phys. Rev. Lett. 114, 111801 (2015)
10.1103/PhysRevLett.114.111801
null
hep-ph cs.LG hep-ex
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Higgs boson is thought to provide the interaction that imparts mass to the fundamental fermions, but while measurements at the Large Hadron Collider (LHC) are consistent with this hypothesis, current analysis techniques lack the statistical power to cross the traditional 5$\sigma$ significance barrier without more data. \emph{Deep learning} techniques have the potential to increase the statistical power of this analysis by \emph{automatically} learning complex, high-level data representations. In this work, deep neural networks are used to detect the decay of the Higgs to a pair of tau leptons. A Bayesian optimization algorithm is used to tune the network architecture and training algorithm hyperparameters, resulting in a deep network of eight non-linear processing layers that improves upon the performance of shallow classifiers even without the use of features specifically engineered by physicists for this application. The improvement in discovery significance is equivalent to an increase in the accumulated dataset of 25\%.
[ { "version": "v1", "created": "Mon, 13 Oct 2014 20:00:03 GMT" } ]
2015-03-25T00:00:00
[ [ "Baldi", "Pierre", "" ], [ "Sadowski", "Peter", "" ], [ "Whiteson", "Daniel", "" ] ]
TITLE: Enhanced Higgs to $\tau^+\tau^-$ Searches with Deep Learning ABSTRACT: The Higgs boson is thought to provide the interaction that imparts mass to the fundamental fermions, but while measurements at the Large Hadron Collider (LHC) are consistent with this hypothesis, current analysis techniques lack the statistical power to cross the traditional 5$\sigma$ significance barrier without more data. \emph{Deep learning} techniques have the potential to increase the statistical power of this analysis by \emph{automatically} learning complex, high-level data representations. In this work, deep neural networks are used to detect the decay of the Higgs to a pair of tau leptons. A Bayesian optimization algorithm is used to tune the network architecture and training algorithm hyperparameters, resulting in a deep network of eight non-linear processing layers that improves upon the performance of shallow classifiers even without the use of features specifically engineered by physicists for this application. The improvement in discovery significance is equivalent to an increase in the accumulated dataset of 25\%.
no_new_dataset
0.950319
1502.08040
Mayank Kumar
Mayank Kumar, Ashok Veeraraghavan, Ashutosh Sabharval
DistancePPG: Robust non-contact vital signs monitoring using a camera
24 pages, 11 figures
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Vital signs such as pulse rate and breathing rate are currently measured using contact probes. But, non-contact methods for measuring vital signs are desirable both in hospital settings (e.g. in NICU) and for ubiquitous in-situ health tracking (e.g. on mobile phone and computers with webcams). Recently, camera-based non-contact vital sign monitoring have been shown to be feasible. However, camera-based vital sign monitoring is challenging for people with darker skin tone, under low lighting conditions, and/or during movement of an individual in front of the camera. In this paper, we propose distancePPG, a new camera-based vital sign estimation algorithm which addresses these challenges. DistancePPG proposes a new method of combining skin-color change signals from different tracked regions of the face using a weighted average, where the weights depend on the blood perfusion and incident light intensity in the region, to improve the signal-to-noise ratio (SNR) of camera-based estimate. One of our key contributions is a new automatic method for determining the weights based only on the video recording of the subject. The gains in SNR of camera-based PPG estimated using distancePPG translate into reduction of the error in vital sign estimation, and thus expand the scope of camera-based vital sign monitoring to potentially challenging scenarios. Further, a dataset will be released, comprising of synchronized video recordings of face and pulse oximeter based ground truth recordings from the earlobe for people with different skin tones, under different lighting conditions and for various motion scenarios.
[ { "version": "v1", "created": "Fri, 27 Feb 2015 20:03:06 GMT" }, { "version": "v2", "created": "Tue, 24 Mar 2015 02:31:18 GMT" } ]
2015-03-25T00:00:00
[ [ "Kumar", "Mayank", "" ], [ "Veeraraghavan", "Ashok", "" ], [ "Sabharval", "Ashutosh", "" ] ]
TITLE: DistancePPG: Robust non-contact vital signs monitoring using a camera ABSTRACT: Vital signs such as pulse rate and breathing rate are currently measured using contact probes. But, non-contact methods for measuring vital signs are desirable both in hospital settings (e.g. in NICU) and for ubiquitous in-situ health tracking (e.g. on mobile phone and computers with webcams). Recently, camera-based non-contact vital sign monitoring have been shown to be feasible. However, camera-based vital sign monitoring is challenging for people with darker skin tone, under low lighting conditions, and/or during movement of an individual in front of the camera. In this paper, we propose distancePPG, a new camera-based vital sign estimation algorithm which addresses these challenges. DistancePPG proposes a new method of combining skin-color change signals from different tracked regions of the face using a weighted average, where the weights depend on the blood perfusion and incident light intensity in the region, to improve the signal-to-noise ratio (SNR) of camera-based estimate. One of our key contributions is a new automatic method for determining the weights based only on the video recording of the subject. The gains in SNR of camera-based PPG estimated using distancePPG translate into reduction of the error in vital sign estimation, and thus expand the scope of camera-based vital sign monitoring to potentially challenging scenarios. Further, a dataset will be released, comprising of synchronized video recordings of face and pulse oximeter based ground truth recordings from the earlobe for people with different skin tones, under different lighting conditions and for various motion scenarios.
new_dataset
0.969382
1503.06917
Yilin Wang
Qiang Zhang, Yilin Wang, Baoxin Li
Unsupervised Video Analysis Based on a Spatiotemporal Saliency Detector
21 pages
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Visual saliency, which predicts regions in the field of view that draw the most visual attention, has attracted a lot of interest from researchers. It has already been used in several vision tasks, e.g., image classification, object detection, foreground segmentation. Recently, the spectrum analysis based visual saliency approach has attracted a lot of interest due to its simplicity and good performance, where the phase information of the image is used to construct the saliency map. In this paper, we propose a new approach for detecting spatiotemporal visual saliency based on the phase spectrum of the videos, which is easy to implement and computationally efficient. With the proposed algorithm, we also study how the spatiotemporal saliency can be used in two important vision task, abnormality detection and spatiotemporal interest point detection. The proposed algorithm is evaluated on several commonly used datasets with comparison to the state-of-art methods from the literature. The experiments demonstrate the effectiveness of the proposed approach to spatiotemporal visual saliency detection and its application to the above vision tasks
[ { "version": "v1", "created": "Tue, 24 Mar 2015 05:25:45 GMT" } ]
2015-03-25T00:00:00
[ [ "Zhang", "Qiang", "" ], [ "Wang", "Yilin", "" ], [ "Li", "Baoxin", "" ] ]
TITLE: Unsupervised Video Analysis Based on a Spatiotemporal Saliency Detector ABSTRACT: Visual saliency, which predicts regions in the field of view that draw the most visual attention, has attracted a lot of interest from researchers. It has already been used in several vision tasks, e.g., image classification, object detection, foreground segmentation. Recently, the spectrum analysis based visual saliency approach has attracted a lot of interest due to its simplicity and good performance, where the phase information of the image is used to construct the saliency map. In this paper, we propose a new approach for detecting spatiotemporal visual saliency based on the phase spectrum of the videos, which is easy to implement and computationally efficient. With the proposed algorithm, we also study how the spatiotemporal saliency can be used in two important vision task, abnormality detection and spatiotemporal interest point detection. The proposed algorithm is evaluated on several commonly used datasets with comparison to the state-of-art methods from the literature. The experiments demonstrate the effectiveness of the proposed approach to spatiotemporal visual saliency detection and its application to the above vision tasks
no_new_dataset
0.953622
1503.06952
Maria-Carolina Monard MC
Jean Metz and Newton Spola\^or and Everton A. Cherman and Maria C. Monard
Comparing published multi-label classifier performance measures to the ones obtained by a simple multi-label baseline classifier
19 pages, 8 figures, 7 tables
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In supervised learning, simple baseline classifiers can be constructed by only looking at the class, i.e., ignoring any other information from the dataset. The single-label learning community frequently uses as a reference the one which always predicts the majority class. Although a classifier might perform worse than this simple baseline classifier, this behaviour requires a special explanation. Aiming to motivate the community to compare experimental results with the ones provided by a multi-label baseline classifier, calling the attention about the need of special explanations related to classifiers which perform worse than the baseline, in this work we propose the use of General_B, a multi-label baseline classifier. General_B was evaluated in contrast to results published in the literature which were carefully selected using a systematic review process. It was found that a considerable number of published results on 10 frequently used datasets are worse than or equal to the ones obtained by General_B, and for one dataset it reaches up to 43% of the dataset published results. Moreover, although a simple baseline classifier was not considered in these publications, it was observed that even for very poor results no special explanations were provided in most of them. We hope that the findings of this work would encourage the multi-label community to consider the idea of using a simple baseline classifier, such that further explanations are provided when a classifiers performs worse than a baseline.
[ { "version": "v1", "created": "Tue, 24 Mar 2015 08:57:25 GMT" } ]
2015-03-25T00:00:00
[ [ "Metz", "Jean", "" ], [ "Spolaôr", "Newton", "" ], [ "Cherman", "Everton A.", "" ], [ "Monard", "Maria C.", "" ] ]
TITLE: Comparing published multi-label classifier performance measures to the ones obtained by a simple multi-label baseline classifier ABSTRACT: In supervised learning, simple baseline classifiers can be constructed by only looking at the class, i.e., ignoring any other information from the dataset. The single-label learning community frequently uses as a reference the one which always predicts the majority class. Although a classifier might perform worse than this simple baseline classifier, this behaviour requires a special explanation. Aiming to motivate the community to compare experimental results with the ones provided by a multi-label baseline classifier, calling the attention about the need of special explanations related to classifiers which perform worse than the baseline, in this work we propose the use of General_B, a multi-label baseline classifier. General_B was evaluated in contrast to results published in the literature which were carefully selected using a systematic review process. It was found that a considerable number of published results on 10 frequently used datasets are worse than or equal to the ones obtained by General_B, and for one dataset it reaches up to 43% of the dataset published results. Moreover, although a simple baseline classifier was not considered in these publications, it was observed that even for very poor results no special explanations were provided in most of them. We hope that the findings of this work would encourage the multi-label community to consider the idea of using a simple baseline classifier, such that further explanations are provided when a classifiers performs worse than a baseline.
no_new_dataset
0.949482
1503.06962
Andrew Simpson
Andrew J.R. Simpson
Probabilistic Binary-Mask Cocktail-Party Source Separation in a Convolutional Deep Neural Network
null
null
null
null
cs.SD cs.LG cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Separation of competing speech is a key challenge in signal processing and a feat routinely performed by the human auditory brain. A long standing benchmark of the spectrogram approach to source separation is known as the ideal binary mask. Here, we train a convolutional deep neural network, on a two-speaker cocktail party problem, to make probabilistic predictions about binary masks. Our results approach ideal binary mask performance, illustrating that relatively simple deep neural networks are capable of robust binary mask prediction. We also illustrate the trade-off between prediction statistics and separation quality.
[ { "version": "v1", "created": "Tue, 24 Mar 2015 09:34:51 GMT" } ]
2015-03-25T00:00:00
[ [ "Simpson", "Andrew J. R.", "" ] ]
TITLE: Probabilistic Binary-Mask Cocktail-Party Source Separation in a Convolutional Deep Neural Network ABSTRACT: Separation of competing speech is a key challenge in signal processing and a feat routinely performed by the human auditory brain. A long standing benchmark of the spectrogram approach to source separation is known as the ideal binary mask. Here, we train a convolutional deep neural network, on a two-speaker cocktail party problem, to make probabilistic predictions about binary masks. Our results approach ideal binary mask performance, illustrating that relatively simple deep neural networks are capable of robust binary mask prediction. We also illustrate the trade-off between prediction statistics and separation quality.
no_new_dataset
0.945197
1308.4568
Cem Tekin
Cem Tekin and Mihaela van der Schaar
Distributed Online Learning via Cooperative Contextual Bandits
null
null
null
null
cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we propose a novel framework for decentralized, online learning by many learners. At each moment of time, an instance characterized by a certain context may arrive to each learner; based on the context, the learner can select one of its own actions (which gives a reward and provides information) or request assistance from another learner. In the latter case, the requester pays a cost and receives the reward but the provider learns the information. In our framework, learners are modeled as cooperative contextual bandits. Each learner seeks to maximize the expected reward from its arrivals, which involves trading off the reward received from its own actions, the information learned from its own actions, the reward received from the actions requested of others and the cost paid for these actions - taking into account what it has learned about the value of assistance from each other learner. We develop distributed online learning algorithms and provide analytic bounds to compare the efficiency of these with algorithms with the complete knowledge (oracle) benchmark (in which the expected reward of every action in every context is known by every learner). Our estimates show that regret - the loss incurred by the algorithm - is sublinear in time. Our theoretical framework can be used in many practical applications including Big Data mining, event detection in surveillance sensor networks and distributed online recommendation systems.
[ { "version": "v1", "created": "Wed, 21 Aug 2013 13:28:43 GMT" }, { "version": "v2", "created": "Sun, 25 Aug 2013 14:19:28 GMT" }, { "version": "v3", "created": "Sat, 19 Apr 2014 09:40:06 GMT" }, { "version": "v4", "created": "Mon, 23 Mar 2015 14:06:27 GMT" } ]
2015-03-24T00:00:00
[ [ "Tekin", "Cem", "" ], [ "van der Schaar", "Mihaela", "" ] ]
TITLE: Distributed Online Learning via Cooperative Contextual Bandits ABSTRACT: In this paper we propose a novel framework for decentralized, online learning by many learners. At each moment of time, an instance characterized by a certain context may arrive to each learner; based on the context, the learner can select one of its own actions (which gives a reward and provides information) or request assistance from another learner. In the latter case, the requester pays a cost and receives the reward but the provider learns the information. In our framework, learners are modeled as cooperative contextual bandits. Each learner seeks to maximize the expected reward from its arrivals, which involves trading off the reward received from its own actions, the information learned from its own actions, the reward received from the actions requested of others and the cost paid for these actions - taking into account what it has learned about the value of assistance from each other learner. We develop distributed online learning algorithms and provide analytic bounds to compare the efficiency of these with algorithms with the complete knowledge (oracle) benchmark (in which the expected reward of every action in every context is known by every learner). Our estimates show that regret - the loss incurred by the algorithm - is sublinear in time. Our theoretical framework can be used in many practical applications including Big Data mining, event detection in surveillance sensor networks and distributed online recommendation systems.
no_new_dataset
0.948822
1406.4877
David Martins de Matos
Francisco Raposo, Ricardo Ribeiro, David Martins de Matos
On the Application of Generic Summarization Algorithms to Music
12 pages, 1 table; Submitted to IEEE Signal Processing Letters
IEEE Signal Processing Letters, IEEE, vol. 22, n. 1, January 2015
10.1109/LSP.2014.2347582
null
cs.IR cs.LG cs.SD
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Several generic summarization algorithms were developed in the past and successfully applied in fields such as text and speech summarization. In this paper, we review and apply these algorithms to music. To evaluate this summarization's performance, we adopt an extrinsic approach: we compare a Fado Genre Classifier's performance using truncated contiguous clips against the summaries extracted with those algorithms on 2 different datasets. We show that Maximal Marginal Relevance (MMR), LexRank and Latent Semantic Analysis (LSA) all improve classification performance in both datasets used for testing.
[ { "version": "v1", "created": "Wed, 18 Jun 2014 20:10:22 GMT" } ]
2015-03-24T00:00:00
[ [ "Raposo", "Francisco", "" ], [ "Ribeiro", "Ricardo", "" ], [ "de Matos", "David Martins", "" ] ]
TITLE: On the Application of Generic Summarization Algorithms to Music ABSTRACT: Several generic summarization algorithms were developed in the past and successfully applied in fields such as text and speech summarization. In this paper, we review and apply these algorithms to music. To evaluate this summarization's performance, we adopt an extrinsic approach: we compare a Fado Genre Classifier's performance using truncated contiguous clips against the summaries extracted with those algorithms on 2 different datasets. We show that Maximal Marginal Relevance (MMR), LexRank and Latent Semantic Analysis (LSA) all improve classification performance in both datasets used for testing.
no_new_dataset
0.950824
1412.6572
Ian Goodfellow
Ian J. Goodfellow, Jonathon Shlens, Christian Szegedy
Explaining and Harnessing Adversarial Examples
null
null
null
null
stat.ML cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Several machine learning models, including neural networks, consistently misclassify adversarial examples---inputs formed by applying small but intentionally worst-case perturbations to examples from the dataset, such that the perturbed input results in the model outputting an incorrect answer with high confidence. Early attempts at explaining this phenomenon focused on nonlinearity and overfitting. We argue instead that the primary cause of neural networks' vulnerability to adversarial perturbation is their linear nature. This explanation is supported by new quantitative results while giving the first explanation of the most intriguing fact about them: their generalization across architectures and training sets. Moreover, this view yields a simple and fast method of generating adversarial examples. Using this approach to provide examples for adversarial training, we reduce the test set error of a maxout network on the MNIST dataset.
[ { "version": "v1", "created": "Sat, 20 Dec 2014 01:17:12 GMT" }, { "version": "v2", "created": "Wed, 25 Feb 2015 17:25:05 GMT" }, { "version": "v3", "created": "Fri, 20 Mar 2015 20:19:16 GMT" } ]
2015-03-24T00:00:00
[ [ "Goodfellow", "Ian J.", "" ], [ "Shlens", "Jonathon", "" ], [ "Szegedy", "Christian", "" ] ]
TITLE: Explaining and Harnessing Adversarial Examples ABSTRACT: Several machine learning models, including neural networks, consistently misclassify adversarial examples---inputs formed by applying small but intentionally worst-case perturbations to examples from the dataset, such that the perturbed input results in the model outputting an incorrect answer with high confidence. Early attempts at explaining this phenomenon focused on nonlinearity and overfitting. We argue instead that the primary cause of neural networks' vulnerability to adversarial perturbation is their linear nature. This explanation is supported by new quantitative results while giving the first explanation of the most intriguing fact about them: their generalization across architectures and training sets. Moreover, this view yields a simple and fast method of generating adversarial examples. Using this approach to provide examples for adversarial training, we reduce the test set error of a maxout network on the MNIST dataset.
no_new_dataset
0.951278
1503.03562
Zhiyong Cheng
Zhiyong Cheng, Daniel Soudry, Zexi Mao, Zhenzhong Lan
Training Binary Multilayer Neural Networks for Image Classification using Expectation Backpropagation
8 pages with 1 figures and 4 tables
null
null
null
cs.NE cs.CV cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Compared to Multilayer Neural Networks with real weights, Binary Multilayer Neural Networks (BMNNs) can be implemented more efficiently on dedicated hardware. BMNNs have been demonstrated to be effective on binary classification tasks with Expectation BackPropagation (EBP) algorithm on high dimensional text datasets. In this paper, we investigate the capability of BMNNs using the EBP algorithm on multiclass image classification tasks. The performances of binary neural networks with multiple hidden layers and different numbers of hidden units are examined on MNIST. We also explore the effectiveness of image spatial filters and the dropout technique in BMNNs. Experimental results on MNIST dataset show that EBP can obtain 2.12% test error with binary weights and 1.66% test error with real weights, which is comparable to the results of standard BackPropagation algorithm on fully connected MNNs.
[ { "version": "v1", "created": "Thu, 12 Mar 2015 02:24:31 GMT" }, { "version": "v2", "created": "Fri, 13 Mar 2015 01:32:15 GMT" }, { "version": "v3", "created": "Sun, 22 Mar 2015 21:47:56 GMT" } ]
2015-03-24T00:00:00
[ [ "Cheng", "Zhiyong", "" ], [ "Soudry", "Daniel", "" ], [ "Mao", "Zexi", "" ], [ "Lan", "Zhenzhong", "" ] ]
TITLE: Training Binary Multilayer Neural Networks for Image Classification using Expectation Backpropagation ABSTRACT: Compared to Multilayer Neural Networks with real weights, Binary Multilayer Neural Networks (BMNNs) can be implemented more efficiently on dedicated hardware. BMNNs have been demonstrated to be effective on binary classification tasks with Expectation BackPropagation (EBP) algorithm on high dimensional text datasets. In this paper, we investigate the capability of BMNNs using the EBP algorithm on multiclass image classification tasks. The performances of binary neural networks with multiple hidden layers and different numbers of hidden units are examined on MNIST. We also explore the effectiveness of image spatial filters and the dropout technique in BMNNs. Experimental results on MNIST dataset show that EBP can obtain 2.12% test error with binary weights and 1.66% test error with real weights, which is comparable to the results of standard BackPropagation algorithm on fully connected MNNs.
no_new_dataset
0.950595
1503.06239
Jinye Zhang
Jinye Zhang, Zhijian Ou
Block-Wise MAP Inference for Determinantal Point Processes with Application to Change-Point Detection
null
null
null
null
cs.LG cs.AI stat.ME stat.ML
http://creativecommons.org/licenses/by/3.0/
Existing MAP inference algorithms for determinantal point processes (DPPs) need to calculate determinants or conduct eigenvalue decomposition generally at the scale of the full kernel, which presents a great challenge for real-world applications. In this paper, we introduce a class of DPPs, called BwDPPs, that are characterized by an almost block diagonal kernel matrix and thus can allow efficient block-wise MAP inference. Furthermore, BwDPPs are successfully applied to address the difficulty of selecting change-points in the problem of change-point detection (CPD), which results in a new BwDPP-based CPD method, named BwDppCpd. In BwDppCpd, a preliminary set of change-point candidates is first created based on existing well-studied metrics. Then, these change-point candidates are treated as DPP items, and DPP-based subset selection is conducted to give the final estimate of the change-points that favours both quality and diversity. The effectiveness of BwDppCpd is demonstrated through extensive experiments on five real-world datasets.
[ { "version": "v1", "created": "Fri, 20 Mar 2015 22:01:45 GMT" } ]
2015-03-24T00:00:00
[ [ "Zhang", "Jinye", "" ], [ "Ou", "Zhijian", "" ] ]
TITLE: Block-Wise MAP Inference for Determinantal Point Processes with Application to Change-Point Detection ABSTRACT: Existing MAP inference algorithms for determinantal point processes (DPPs) need to calculate determinants or conduct eigenvalue decomposition generally at the scale of the full kernel, which presents a great challenge for real-world applications. In this paper, we introduce a class of DPPs, called BwDPPs, that are characterized by an almost block diagonal kernel matrix and thus can allow efficient block-wise MAP inference. Furthermore, BwDPPs are successfully applied to address the difficulty of selecting change-points in the problem of change-point detection (CPD), which results in a new BwDPP-based CPD method, named BwDppCpd. In BwDppCpd, a preliminary set of change-point candidates is first created based on existing well-studied metrics. Then, these change-point candidates are treated as DPP items, and DPP-based subset selection is conducted to give the final estimate of the change-points that favours both quality and diversity. The effectiveness of BwDppCpd is demonstrated through extensive experiments on five real-world datasets.
no_new_dataset
0.941385
1503.06250
Ilya Safro
Talayeh Razzaghi and Oleg Roderick and Ilya Safro and Nick Marko
Fast Imbalanced Classification of Healthcare Data with Missing Values
null
null
null
null
stat.ML cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In medical domain, data features often contain missing values. This can create serious bias in the predictive modeling. Typical standard data mining methods often produce poor performance measures. In this paper, we propose a new method to simultaneously classify large datasets and reduce the effects of missing values. The proposed method is based on a multilevel framework of the cost-sensitive SVM and the expected maximization imputation method for missing values, which relies on iterated regression analyses. We compare classification results of multilevel SVM-based algorithms on public benchmark datasets with imbalanced classes and missing values as well as real data in health applications, and show that our multilevel SVM-based method produces fast, and more accurate and robust classification results.
[ { "version": "v1", "created": "Sat, 21 Mar 2015 00:13:54 GMT" } ]
2015-03-24T00:00:00
[ [ "Razzaghi", "Talayeh", "" ], [ "Roderick", "Oleg", "" ], [ "Safro", "Ilya", "" ], [ "Marko", "Nick", "" ] ]
TITLE: Fast Imbalanced Classification of Healthcare Data with Missing Values ABSTRACT: In medical domain, data features often contain missing values. This can create serious bias in the predictive modeling. Typical standard data mining methods often produce poor performance measures. In this paper, we propose a new method to simultaneously classify large datasets and reduce the effects of missing values. The proposed method is based on a multilevel framework of the cost-sensitive SVM and the expected maximization imputation method for missing values, which relies on iterated regression analyses. We compare classification results of multilevel SVM-based algorithms on public benchmark datasets with imbalanced classes and missing values as well as real data in health applications, and show that our multilevel SVM-based method produces fast, and more accurate and robust classification results.
no_new_dataset
0.950641
1503.06271
Mina Ghashami
Mina Ghashami and Amirali Abdullah
Binary Coding in Stream
5 figures, 9 pages
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Big data is becoming ever more ubiquitous, ranging over massive video repositories, document corpuses, image sets and Internet routing history. Proximity search and clustering are two algorithmic primitives fundamental to data analysis, but suffer from the "curse of dimensionality" on these gigantic datasets. A popular attack for this problem is to convert object representations into short binary codewords, while approximately preserving near neighbor structure. However, there has been limited research on constructing codewords in the "streaming" or "online" settings often applicable to this scale of data, where one may only make a single pass over data too massive to fit in local memory. In this paper, we apply recent advances in matrix sketching techniques to construct binary codewords in both streaming and online setting. Our experimental results compete outperform several of the most popularly used algorithms, and we prove theoretical guarantees on performance in the streaming setting under mild assumptions on the data and randomness of the training set.
[ { "version": "v1", "created": "Sat, 21 Mar 2015 06:25:02 GMT" } ]
2015-03-24T00:00:00
[ [ "Ghashami", "Mina", "" ], [ "Abdullah", "Amirali", "" ] ]
TITLE: Binary Coding in Stream ABSTRACT: Big data is becoming ever more ubiquitous, ranging over massive video repositories, document corpuses, image sets and Internet routing history. Proximity search and clustering are two algorithmic primitives fundamental to data analysis, but suffer from the "curse of dimensionality" on these gigantic datasets. A popular attack for this problem is to convert object representations into short binary codewords, while approximately preserving near neighbor structure. However, there has been limited research on constructing codewords in the "streaming" or "online" settings often applicable to this scale of data, where one may only make a single pass over data too massive to fit in local memory. In this paper, we apply recent advances in matrix sketching techniques to construct binary codewords in both streaming and online setting. Our experimental results compete outperform several of the most popularly used algorithms, and we prove theoretical guarantees on performance in the streaming setting under mild assumptions on the data and randomness of the training set.
no_new_dataset
0.943504
1503.06301
Kamalakar Karlapalem
Yash Gupta and Kamalakar Karlapalem
Effective Handling of Urgent Jobs - Speed Up Scheduling for Computing Applications
Paper covering main contributions from MS Thesis of Yash Gupta http://web2py.iiit.ac.in/research_centres/publications/view_publication/mastersthesis/247 - presented in ACM format
null
null
MS Thesis Number IIIT/TH/2014/7
cs.PF
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A queue is required when a service provider is not able to handle jobs arriving over the time. In a highly flexible and dynamic environment, some jobs might demand for faster execution at run-time especially when the resources are limited and the jobs are competing for acquiring resources. A user might demand for speed up (reduced wait time) for some of the jobs present in the queue at run time. In such cases, it is required to accelerate (directly sending the job to the server) urgent jobs (requesting for speed up) ahead of other jobs present in the queue for an earlier completion of urgent jobs. Under the assumption of no additional resources, such acceleration of jobs would result in slowing down of other jobs present in the queue. In this paper, we formulate the problem of Speed Up Scheduling without acquiring any additional resources for the scheduling of on-line speed up requests posed by a user at run-time and present algorithms for the same. We apply the idea of Speed Up Scheduling to two different domains -Web Scheduling and CPU Scheduling. We demonstrate our results with a simulation based model using trace driven workload and synthetic datasets to show the usefulness of Speed Up scheduling. Speed Up provides a new way of addressing urgent jobs, provides a different evaluation criteria for comparing scheduling algorithms and has practical applications.
[ { "version": "v1", "created": "Sat, 21 Mar 2015 13:51:48 GMT" } ]
2015-03-24T00:00:00
[ [ "Gupta", "Yash", "" ], [ "Karlapalem", "Kamalakar", "" ] ]
TITLE: Effective Handling of Urgent Jobs - Speed Up Scheduling for Computing Applications ABSTRACT: A queue is required when a service provider is not able to handle jobs arriving over the time. In a highly flexible and dynamic environment, some jobs might demand for faster execution at run-time especially when the resources are limited and the jobs are competing for acquiring resources. A user might demand for speed up (reduced wait time) for some of the jobs present in the queue at run time. In such cases, it is required to accelerate (directly sending the job to the server) urgent jobs (requesting for speed up) ahead of other jobs present in the queue for an earlier completion of urgent jobs. Under the assumption of no additional resources, such acceleration of jobs would result in slowing down of other jobs present in the queue. In this paper, we formulate the problem of Speed Up Scheduling without acquiring any additional resources for the scheduling of on-line speed up requests posed by a user at run-time and present algorithms for the same. We apply the idea of Speed Up Scheduling to two different domains -Web Scheduling and CPU Scheduling. We demonstrate our results with a simulation based model using trace driven workload and synthetic datasets to show the usefulness of Speed Up scheduling. Speed Up provides a new way of addressing urgent jobs, provides a different evaluation criteria for comparing scheduling algorithms and has practical applications.
no_new_dataset
0.949623
1503.06350
Nikolaos Karianakis
Nikolaos Karianakis, Thomas J. Fuchs and Stefano Soatto
Boosting Convolutional Features for Robust Object Proposals
9 pages, 4 figures, 2 tables, 42 references
null
null
null
cs.CV cs.AI cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Deep Convolutional Neural Networks (CNNs) have demonstrated excellent performance in image classification, but still show room for improvement in object-detection tasks with many categories, in particular for cluttered scenes and occlusion. Modern detection algorithms like Regions with CNNs (Girshick et al., 2014) rely on Selective Search (Uijlings et al., 2013) to propose regions which with high probability represent objects, where in turn CNNs are deployed for classification. Selective Search represents a family of sophisticated algorithms that are engineered with multiple segmentation, appearance and saliency cues, typically coming with a significant run-time overhead. Furthermore, (Hosang et al., 2014) have shown that most methods suffer from low reproducibility due to unstable superpixels, even for slight image perturbations. Although CNNs are subsequently used for classification in top-performing object-detection pipelines, current proposal methods are agnostic to how these models parse objects and their rich learned representations. As a result they may propose regions which may not resemble high-level objects or totally miss some of them. To overcome these drawbacks we propose a boosting approach which directly takes advantage of hierarchical CNN features for detecting regions of interest fast. We demonstrate its performance on ImageNet 2013 detection benchmark and compare it with state-of-the-art methods.
[ { "version": "v1", "created": "Sat, 21 Mar 2015 20:54:39 GMT" } ]
2015-03-24T00:00:00
[ [ "Karianakis", "Nikolaos", "" ], [ "Fuchs", "Thomas J.", "" ], [ "Soatto", "Stefano", "" ] ]
TITLE: Boosting Convolutional Features for Robust Object Proposals ABSTRACT: Deep Convolutional Neural Networks (CNNs) have demonstrated excellent performance in image classification, but still show room for improvement in object-detection tasks with many categories, in particular for cluttered scenes and occlusion. Modern detection algorithms like Regions with CNNs (Girshick et al., 2014) rely on Selective Search (Uijlings et al., 2013) to propose regions which with high probability represent objects, where in turn CNNs are deployed for classification. Selective Search represents a family of sophisticated algorithms that are engineered with multiple segmentation, appearance and saliency cues, typically coming with a significant run-time overhead. Furthermore, (Hosang et al., 2014) have shown that most methods suffer from low reproducibility due to unstable superpixels, even for slight image perturbations. Although CNNs are subsequently used for classification in top-performing object-detection pipelines, current proposal methods are agnostic to how these models parse objects and their rich learned representations. As a result they may propose regions which may not resemble high-level objects or totally miss some of them. To overcome these drawbacks we propose a boosting approach which directly takes advantage of hierarchical CNN features for detecting regions of interest fast. We demonstrate its performance on ImageNet 2013 detection benchmark and compare it with state-of-the-art methods.
no_new_dataset
0.944944
1503.06424
Juan Juli\'an Merelo-Guerv\'os Pr.
Juan Juli\'an Merelo-Guerv\'os, Pablo Garc\'ia-S\'anchez
Modeling browser-based distributed evolutionary computation systems
Technical report
null
null
null
cs.DC cs.NE cs.NI
http://creativecommons.org/licenses/by-nc-sa/3.0/
From the era of big science we are back to the "do it yourself", where you do not have any money to buy clusters or subscribe to grids but still have algorithms that crave many computing nodes and need them to measure scalability. Fortunately, this coincides with the era of big data, cloud computing, and browsers that include JavaScript virtual machines. Those are the reasons why this paper will focus on two different aspects of volunteer or freeriding computing: first, the pragmatic: where to find those resources, which ones can be used, what kind of support you have to give them; and then, the theoretical: how evolutionary algorithms can be adapted to an environment in which nodes come and go, have different computing capabilities and operate in complete asynchrony of each other. We will examine the setup needed to create a very simple distributed evolutionary algorithm using JavaScript and then find a model of how users react to it by collecting data from several experiments featuring different classical benchmark functions.
[ { "version": "v1", "created": "Sun, 22 Mar 2015 13:20:57 GMT" } ]
2015-03-24T00:00:00
[ [ "Merelo-Guervós", "Juan Julián", "" ], [ "García-Sánchez", "Pablo", "" ] ]
TITLE: Modeling browser-based distributed evolutionary computation systems ABSTRACT: From the era of big science we are back to the "do it yourself", where you do not have any money to buy clusters or subscribe to grids but still have algorithms that crave many computing nodes and need them to measure scalability. Fortunately, this coincides with the era of big data, cloud computing, and browsers that include JavaScript virtual machines. Those are the reasons why this paper will focus on two different aspects of volunteer or freeriding computing: first, the pragmatic: where to find those resources, which ones can be used, what kind of support you have to give them; and then, the theoretical: how evolutionary algorithms can be adapted to an environment in which nodes come and go, have different computing capabilities and operate in complete asynchrony of each other. We will examine the setup needed to create a very simple distributed evolutionary algorithm using JavaScript and then find a model of how users react to it by collecting data from several experiments featuring different classical benchmark functions.
no_new_dataset
0.939192
1503.06549
Lydia Fischer
Lydia Fischer, Barbara Hammer and Heiko Wersing
Optimum Reject Options for Prototype-based Classification
19 pages
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We analyse optimum reject strategies for prototype-based classifiers and real-valued rejection measures, using the distance of a data point to the closest prototype or probabilistic counterparts. We compare reject schemes with global thresholds, and local thresholds for the Voronoi cells of the classifier. For the latter, we develop a polynomial-time algorithm to compute optimum thresholds based on a dynamic programming scheme, and we propose an intuitive linear time, memory efficient approximation thereof with competitive accuracy. Evaluating the performance in various benchmarks, we conclude that local reject options are beneficial in particular for simple prototype-based classifiers, while the improvement is less pronounced for advanced models. For the latter, an accuracy-reject curve which is comparable to support vector machine classifiers with state of the art reject options can be reached.
[ { "version": "v1", "created": "Mon, 23 Mar 2015 08:19:17 GMT" } ]
2015-03-24T00:00:00
[ [ "Fischer", "Lydia", "" ], [ "Hammer", "Barbara", "" ], [ "Wersing", "Heiko", "" ] ]
TITLE: Optimum Reject Options for Prototype-based Classification ABSTRACT: We analyse optimum reject strategies for prototype-based classifiers and real-valued rejection measures, using the distance of a data point to the closest prototype or probabilistic counterparts. We compare reject schemes with global thresholds, and local thresholds for the Voronoi cells of the classifier. For the latter, we develop a polynomial-time algorithm to compute optimum thresholds based on a dynamic programming scheme, and we propose an intuitive linear time, memory efficient approximation thereof with competitive accuracy. Evaluating the performance in various benchmarks, we conclude that local reject options are beneficial in particular for simple prototype-based classifiers, while the improvement is less pronounced for advanced models. For the latter, an accuracy-reject curve which is comparable to support vector machine classifiers with state of the art reject options can be reached.
no_new_dataset
0.949763
1503.06555
Debajyoti Mukhopadhyay Prof.
Sumitkumar Kanoje, Sheetal Girase, Debajyoti Mukhopadhyay
User Profiling for Recommendation System
5 pages, 5 figures, 5 tables
null
null
null
cs.IR cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recommendation system is a type of information filtering systems that recommend various objects from a vast variety and quantity of items which are of the user interest. This results in guiding an individual in personalized way to interesting or useful objects in a large space of possible options. Such systems also help many businesses to achieve more profits to sustain in their filed against their rivals. But looking at the amount of information which a business holds it becomes difficult to identify the items of user interest. Therefore personalization or user profiling is one of the challenging tasks that give access to user relevant information which can be used in solving the difficult task of classification and ranking items according to an individuals interest. Profiling can be done in various ways such assupervised or unsupervised, individual or group profiling, distributive or and non distributive profiling. Our focus in this paper will be on the dataset which we will use, we identify some interesting facts by using Weka Tool that can be used for recommending the items from dataset. Our aim is to present a novel technique to achieve user profiling in recommendation system.
[ { "version": "v1", "created": "Mon, 23 Mar 2015 08:47:35 GMT" } ]
2015-03-24T00:00:00
[ [ "Kanoje", "Sumitkumar", "" ], [ "Girase", "Sheetal", "" ], [ "Mukhopadhyay", "Debajyoti", "" ] ]
TITLE: User Profiling for Recommendation System ABSTRACT: Recommendation system is a type of information filtering systems that recommend various objects from a vast variety and quantity of items which are of the user interest. This results in guiding an individual in personalized way to interesting or useful objects in a large space of possible options. Such systems also help many businesses to achieve more profits to sustain in their filed against their rivals. But looking at the amount of information which a business holds it becomes difficult to identify the items of user interest. Therefore personalization or user profiling is one of the challenging tasks that give access to user relevant information which can be used in solving the difficult task of classification and ranking items according to an individuals interest. Profiling can be done in various ways such assupervised or unsupervised, individual or group profiling, distributive or and non distributive profiling. Our focus in this paper will be on the dataset which we will use, we identify some interesting facts by using Weka Tool that can be used for recommending the items from dataset. Our aim is to present a novel technique to achieve user profiling in recommendation system.
no_new_dataset
0.955651
1503.06562
Debajyoti Mukhopadhyay Prof.
Dheeraj kumar Bokde, Sheetal Girase, Debajyoti Mukhopadhyay
An Item-Based Collaborative Filtering using Dimensionality Reduction Techniques on Mahout Framework
6 pages, 4 figures, 3 tables
null
null
null
cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Collaborative Filtering is the most widely used prediction technique in Recommendation System. Most of the current CF recommender systems maintains single criteria user rating in user item matrix. However, recent studies indicate that recommender system depending on multi criteria can improve prediction and accuracy levels of recommendation by considering the user preferences in multi aspects of items. This gives birth to Multi Criteria Collaborative Filtering. In MC CF users provide the rating on multiple aspects of an item in new dimensions,thereby increasing the size of rating matrix, sparsity and scalability problem. Appropriate dimensionality reduction techniques are thus needed to take care of these challenges to reduce the dimension of user item rating matrix to improve the prediction accuracy and efficiency of CF recommender system. The process of dimensionality reduction maps the high dimensional input space into lower dimensional space. Thus, the objective of this paper is to propose an efficient MC CF algorithm using dimensionality reduction technique to improve the recommendation quality and prediction accuracy. Dimensionality reduction techniques such as Singular Value Decomposition and Principal Component Analysis are used to solve the scalability and alleviate the sparsity problems in overall rating. The proposed MC CF approach will be implemented using Apache Mahout, which allows processing of massive dataset stored in distributed/non-distributed file system.
[ { "version": "v1", "created": "Mon, 23 Mar 2015 09:09:07 GMT" } ]
2015-03-24T00:00:00
[ [ "Bokde", "Dheeraj kumar", "" ], [ "Girase", "Sheetal", "" ], [ "Mukhopadhyay", "Debajyoti", "" ] ]
TITLE: An Item-Based Collaborative Filtering using Dimensionality Reduction Techniques on Mahout Framework ABSTRACT: Collaborative Filtering is the most widely used prediction technique in Recommendation System. Most of the current CF recommender systems maintains single criteria user rating in user item matrix. However, recent studies indicate that recommender system depending on multi criteria can improve prediction and accuracy levels of recommendation by considering the user preferences in multi aspects of items. This gives birth to Multi Criteria Collaborative Filtering. In MC CF users provide the rating on multiple aspects of an item in new dimensions,thereby increasing the size of rating matrix, sparsity and scalability problem. Appropriate dimensionality reduction techniques are thus needed to take care of these challenges to reduce the dimension of user item rating matrix to improve the prediction accuracy and efficiency of CF recommender system. The process of dimensionality reduction maps the high dimensional input space into lower dimensional space. Thus, the objective of this paper is to propose an efficient MC CF algorithm using dimensionality reduction technique to improve the recommendation quality and prediction accuracy. Dimensionality reduction techniques such as Singular Value Decomposition and Principal Component Analysis are used to solve the scalability and alleviate the sparsity problems in overall rating. The proposed MC CF approach will be implemented using Apache Mahout, which allows processing of massive dataset stored in distributed/non-distributed file system.
no_new_dataset
0.950732
1503.06575
Sanja Brdar
Sanja Brdar, Katarina Gavric, Dubravko Culibrk, Vladimir Crnojevic
Unveiling Spatial Epidemiology of HIV with Mobile Phone Data
13 pages, 4 figures, 2 tables
null
null
null
stat.AP cs.CY cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
An increasing amount of geo-referenced mobile phone data enables the identification of behavioral patterns, habits and movements of people. With this data, we can extract the knowledge potentially useful for many applications including the one tackled in this study - understanding spatial variation of epidemics. We explored the datasets collected by a cell phone service provider and linked them to spatial HIV prevalence rates estimated from publicly available surveys. For that purpose, 224 features were extracted from mobility and connectivity traces and related to the level of HIV epidemic in 50 Ivory Coast departments. By means of regression models, we evaluated predictive ability of extracted features. Several models predicted HIV prevalence that are highly correlated (>0.7) with actual values. Through contribution analysis we identified key elements that impact the rate of infections. Our findings indicate that night connectivity and activity, spatial area covered by users and overall migrations are strongly linked to HIV. By visualizing the communication and mobility flows, we strived to explain the spatial structure of epidemics. We discovered that strong ties and hubs in communication and mobility align with HIV hot spots.
[ { "version": "v1", "created": "Mon, 23 Mar 2015 09:47:16 GMT" } ]
2015-03-24T00:00:00
[ [ "Brdar", "Sanja", "" ], [ "Gavric", "Katarina", "" ], [ "Culibrk", "Dubravko", "" ], [ "Crnojevic", "Vladimir", "" ] ]
TITLE: Unveiling Spatial Epidemiology of HIV with Mobile Phone Data ABSTRACT: An increasing amount of geo-referenced mobile phone data enables the identification of behavioral patterns, habits and movements of people. With this data, we can extract the knowledge potentially useful for many applications including the one tackled in this study - understanding spatial variation of epidemics. We explored the datasets collected by a cell phone service provider and linked them to spatial HIV prevalence rates estimated from publicly available surveys. For that purpose, 224 features were extracted from mobility and connectivity traces and related to the level of HIV epidemic in 50 Ivory Coast departments. By means of regression models, we evaluated predictive ability of extracted features. Several models predicted HIV prevalence that are highly correlated (>0.7) with actual values. Through contribution analysis we identified key elements that impact the rate of infections. Our findings indicate that night connectivity and activity, spatial area covered by users and overall migrations are strongly linked to HIV. By visualizing the communication and mobility flows, we strived to explain the spatial structure of epidemics. We discovered that strong ties and hubs in communication and mobility align with HIV hot spots.
no_new_dataset
0.942823
1503.06643
Mrinal Haloi
Mrinal Haloi
A novel pLSA based Traffic Signs Classification System
APMediaCast-2015, Bali, Indonesia
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this work we developed a novel and fast traffic sign recognition system, a very important part for advanced driver assistance system and for autonomous driving. Traffic signs play a very vital role in safe driving and avoiding accident. We have used image processing and topic discovery model pLSA to tackle this challenging multiclass classification problem. Our algorithm is consist of two parts, shape classification and sign classification for improved accuracy. For processing and representation of image we have used bag of features model with SIFT local descriptor. Where a visual vocabulary of size 300 words are formed using k-means codebook formation algorithm. We exploited the concept that every image is a collection of visual topics and images having same topics will belong to same category. Our algorithm is tested on German traffic sign recognition benchmark (GTSRB) and gives very promising result near to existing state of the art techniques.
[ { "version": "v1", "created": "Mon, 23 Mar 2015 14:10:44 GMT" } ]
2015-03-24T00:00:00
[ [ "Haloi", "Mrinal", "" ] ]
TITLE: A novel pLSA based Traffic Signs Classification System ABSTRACT: In this work we developed a novel and fast traffic sign recognition system, a very important part for advanced driver assistance system and for autonomous driving. Traffic signs play a very vital role in safe driving and avoiding accident. We have used image processing and topic discovery model pLSA to tackle this challenging multiclass classification problem. Our algorithm is consist of two parts, shape classification and sign classification for improved accuracy. For processing and representation of image we have used bag of features model with SIFT local descriptor. Where a visual vocabulary of size 300 words are formed using k-means codebook formation algorithm. We exploited the concept that every image is a collection of visual topics and images having same topics will belong to same category. Our algorithm is tested on German traffic sign recognition benchmark (GTSRB) and gives very promising result near to existing state of the art techniques.
no_new_dataset
0.949389
1503.05947
Yanlai Chen
Yanlai Chen
Reduced Basis Decomposition: a Certified and Fast Lossy Data Compression Algorithm
null
null
null
null
math.NA cs.AI cs.CV cs.NA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Dimension reduction is often needed in the area of data mining. The goal of these methods is to map the given high-dimensional data into a low-dimensional space preserving certain properties of the initial data. There are two kinds of techniques for this purpose. The first, projective methods, builds an explicit linear projection from the high-dimensional space to the low-dimensional one. On the other hand, the nonlinear methods utilizes nonlinear and implicit mapping between the two spaces. In both cases, the methods considered in literature have usually relied on computationally very intensive matrix factorizations, frequently the Singular Value Decomposition (SVD). The computational burden of SVD quickly renders these dimension reduction methods infeasible thanks to the ever-increasing sizes of the practical datasets. In this paper, we present a new decomposition strategy, Reduced Basis Decomposition (RBD), which is inspired by the Reduced Basis Method (RBM). Given $X$ the high-dimensional data, the method approximates it by $Y \, T (\approx X)$ with $Y$ being the low-dimensional surrogate and $T$ the transformation matrix. $Y$ is obtained through a greedy algorithm thus extremely efficient. In fact, it is significantly faster than SVD with comparable accuracy. $T$ can be computed on the fly. Moreover, unlike many compression algorithms, it easily finds the mapping for an arbitrary ``out-of-sample'' vector and it comes with an ``error indicator'' certifying the accuracy of the compression. Numerical results are shown validating these claims.
[ { "version": "v1", "created": "Thu, 19 Mar 2015 21:10:57 GMT" } ]
2015-03-23T00:00:00
[ [ "Chen", "Yanlai", "" ] ]
TITLE: Reduced Basis Decomposition: a Certified and Fast Lossy Data Compression Algorithm ABSTRACT: Dimension reduction is often needed in the area of data mining. The goal of these methods is to map the given high-dimensional data into a low-dimensional space preserving certain properties of the initial data. There are two kinds of techniques for this purpose. The first, projective methods, builds an explicit linear projection from the high-dimensional space to the low-dimensional one. On the other hand, the nonlinear methods utilizes nonlinear and implicit mapping between the two spaces. In both cases, the methods considered in literature have usually relied on computationally very intensive matrix factorizations, frequently the Singular Value Decomposition (SVD). The computational burden of SVD quickly renders these dimension reduction methods infeasible thanks to the ever-increasing sizes of the practical datasets. In this paper, we present a new decomposition strategy, Reduced Basis Decomposition (RBD), which is inspired by the Reduced Basis Method (RBM). Given $X$ the high-dimensional data, the method approximates it by $Y \, T (\approx X)$ with $Y$ being the low-dimensional surrogate and $T$ the transformation matrix. $Y$ is obtained through a greedy algorithm thus extremely efficient. In fact, it is significantly faster than SVD with comparable accuracy. $T$ can be computed on the fly. Moreover, unlike many compression algorithms, it easily finds the mapping for an arbitrary ``out-of-sample'' vector and it comes with an ``error indicator'' certifying the accuracy of the compression. Numerical results are shown validating these claims.
no_new_dataset
0.947332
1503.06007
Man Hon Cheung
Man Hon Cheung, Richard Southwell, Fen Hou, and Jianwei Huang
Distributed Time-Sensitive Task Selection in Mobile Crowdsensing
null
null
null
null
cs.GT cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
With the rich set of embedded sensors installed in smartphones and the large number of mobile users, we witness the emergence of many innovative commercial mobile crowdsensing applications that combine the power of mobile technology with crowdsourcing to deliver time-sensitive and location-dependent information to their customers. Motivated by these real-world applications, we consider the task selection problem for heterogeneous users with different initial locations, movement costs, movement speeds, and reputation levels. Computing the social surplus maximization task allocation turns out to be an NP-hard problem. Hence we focus on the distributed case, and propose an asynchronous and distributed task selection (ADTS) algorithm to help the users plan their task selections on their own. We prove the convergence of the algorithm, and further characterize the computation time for users' updates in the algorithm. Simulation results suggest that the ADTS scheme achieves the highest Jain's fairness index and coverage comparing with several benchmark algorithms, while yielding similar user payoff to a greedy centralized benchmark. Finally, we illustrate how mobile users coordinate under the ADTS scheme based on some practical movement time data derived from Google Maps.
[ { "version": "v1", "created": "Fri, 20 Mar 2015 07:05:31 GMT" } ]
2015-03-23T00:00:00
[ [ "Cheung", "Man Hon", "" ], [ "Southwell", "Richard", "" ], [ "Hou", "Fen", "" ], [ "Huang", "Jianwei", "" ] ]
TITLE: Distributed Time-Sensitive Task Selection in Mobile Crowdsensing ABSTRACT: With the rich set of embedded sensors installed in smartphones and the large number of mobile users, we witness the emergence of many innovative commercial mobile crowdsensing applications that combine the power of mobile technology with crowdsourcing to deliver time-sensitive and location-dependent information to their customers. Motivated by these real-world applications, we consider the task selection problem for heterogeneous users with different initial locations, movement costs, movement speeds, and reputation levels. Computing the social surplus maximization task allocation turns out to be an NP-hard problem. Hence we focus on the distributed case, and propose an asynchronous and distributed task selection (ADTS) algorithm to help the users plan their task selections on their own. We prove the convergence of the algorithm, and further characterize the computation time for users' updates in the algorithm. Simulation results suggest that the ADTS scheme achieves the highest Jain's fairness index and coverage comparing with several benchmark algorithms, while yielding similar user payoff to a greedy centralized benchmark. Finally, we illustrate how mobile users coordinate under the ADTS scheme based on some practical movement time data derived from Google Maps.
no_new_dataset
0.947381
1503.06095
Amy Felty
Amy P. Felty, Alberto Momigliano and Brigitte Pientka
The Next 700 Challenge Problems for Reasoning with Higher-Order Abstract Syntax Representations: Part 1-A Common Infrastructure for Benchmarks
42 pages, 5 figures
null
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A variety of logical frameworks support the use of higher-order abstract syntax (HOAS) in representing formal systems. Although these systems seem superficially the same, they differ in a variety of ways; for example, how they handle a context of assumptions and which theorems about a given formal system can be concisely expressed and proved. Our contributions in this paper are three-fold: 1) we develop a common infrastructure for representing benchmarks for systems supporting reasoning with binders, 2) we present several concrete benchmarks, which highlight a variety of different aspects of reasoning within a context of assumptions, and 3) we design an open repository ORBI, (Open challenge problem Repository for systems supporting reasoning with BInders). Our work sets the stage for providing a basis for qualitative comparison of different systems. This allows us to review and survey the state of the art, which we do in great detail for four systems in Part 2 of this paper (Felty et al, 2015). It also allows us to outline future fundamental research questions regarding the design and implementation of meta-reasoning systems.
[ { "version": "v1", "created": "Fri, 20 Mar 2015 14:54:15 GMT" } ]
2015-03-23T00:00:00
[ [ "Felty", "Amy P.", "" ], [ "Momigliano", "Alberto", "" ], [ "Pientka", "Brigitte", "" ] ]
TITLE: The Next 700 Challenge Problems for Reasoning with Higher-Order Abstract Syntax Representations: Part 1-A Common Infrastructure for Benchmarks ABSTRACT: A variety of logical frameworks support the use of higher-order abstract syntax (HOAS) in representing formal systems. Although these systems seem superficially the same, they differ in a variety of ways; for example, how they handle a context of assumptions and which theorems about a given formal system can be concisely expressed and proved. Our contributions in this paper are three-fold: 1) we develop a common infrastructure for representing benchmarks for systems supporting reasoning with binders, 2) we present several concrete benchmarks, which highlight a variety of different aspects of reasoning within a context of assumptions, and 3) we design an open repository ORBI, (Open challenge problem Repository for systems supporting reasoning with BInders). Our work sets the stage for providing a basis for qualitative comparison of different systems. This allows us to review and survey the state of the art, which we do in great detail for four systems in Part 2 of this paper (Felty et al, 2015). It also allows us to outline future fundamental research questions regarding the design and implementation of meta-reasoning systems.
no_new_dataset
0.942612
1201.4219
Zhengfeng Yang
Zhengfeng Yang and Min Wu and Wang Lin
Exact Safety Verification of Hybrid Systems Based on Bilinear SOS Representation
arXiv admin note: substantial text overlap with arXiv:1112.2328
null
null
null
cs.SE cs.SC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we address the problem of safety verification of nonlinear hybrid systems. A hybrid symbolic-numeric method is presented to compute exact inequality invariants of hybrid systems efficiently. Some numerical invariants of a hybrid system can be obtained by solving a bilinear SOS programming via PENBMI solver or iterative method, then the modified Newton refinement and rational vector recovery techniques are applied to obtain exact polynomial invariants with rational coefficients, which {\it exactly} satisfy the conditions of invariants. Experiments on some benchmarks are given to illustrate the efficiency of our algorithm.
[ { "version": "v1", "created": "Fri, 20 Jan 2012 07:09:20 GMT" }, { "version": "v2", "created": "Tue, 25 Sep 2012 05:29:48 GMT" } ]
2015-03-20T00:00:00
[ [ "Yang", "Zhengfeng", "" ], [ "Wu", "Min", "" ], [ "Lin", "Wang", "" ] ]
TITLE: Exact Safety Verification of Hybrid Systems Based on Bilinear SOS Representation ABSTRACT: In this paper, we address the problem of safety verification of nonlinear hybrid systems. A hybrid symbolic-numeric method is presented to compute exact inequality invariants of hybrid systems efficiently. Some numerical invariants of a hybrid system can be obtained by solving a bilinear SOS programming via PENBMI solver or iterative method, then the modified Newton refinement and rational vector recovery techniques are applied to obtain exact polynomial invariants with rational coefficients, which {\it exactly} satisfy the conditions of invariants. Experiments on some benchmarks are given to illustrate the efficiency of our algorithm.
no_new_dataset
0.945751
1202.2369
Georgios Zervas
John W. Byers, Michael Mitzenmacher, Georgios Zervas
The Groupon Effect on Yelp Ratings: A Root Cause Analysis
Submitted to ACM EC 2012
null
null
null
cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Daily deals sites such as Groupon offer deeply discounted goods and services to tens of millions of customers through geographically targeted daily e-mail marketing campaigns. In our prior work we observed that a negative side effect for merchants using Groupons is that, on average, their Yelp ratings decline significantly. However, this previous work was essentially observational, rather than explanatory. In this work, we rigorously consider and evaluate various hypotheses about underlying consumer and merchant behavior in order to understand this phenomenon, which we dub the Groupon effect. We use statistical analysis and mathematical modeling, leveraging a dataset we collected spanning tens of thousands of daily deals and over 7 million Yelp reviews. In particular, we investigate hypotheses such as whether Groupon subscribers are more critical than their peers, or whether some fraction of Groupon merchants provide significantly worse service to customers using Groupons. We suggest an additional novel hypothesis: reviews from Groupon subscribers are lower on average because such reviews correspond to real, unbiased customers, while the body of reviews on Yelp contain some fraction of reviews from biased or even potentially fake sources. Although we focus on a specific question, our work provides broad insights into both consumer and merchant behavior within the daily deals marketplace.
[ { "version": "v1", "created": "Fri, 10 Feb 2012 21:03:11 GMT" } ]
2015-03-20T00:00:00
[ [ "Byers", "John W.", "" ], [ "Mitzenmacher", "Michael", "" ], [ "Zervas", "Georgios", "" ] ]
TITLE: The Groupon Effect on Yelp Ratings: A Root Cause Analysis ABSTRACT: Daily deals sites such as Groupon offer deeply discounted goods and services to tens of millions of customers through geographically targeted daily e-mail marketing campaigns. In our prior work we observed that a negative side effect for merchants using Groupons is that, on average, their Yelp ratings decline significantly. However, this previous work was essentially observational, rather than explanatory. In this work, we rigorously consider and evaluate various hypotheses about underlying consumer and merchant behavior in order to understand this phenomenon, which we dub the Groupon effect. We use statistical analysis and mathematical modeling, leveraging a dataset we collected spanning tens of thousands of daily deals and over 7 million Yelp reviews. In particular, we investigate hypotheses such as whether Groupon subscribers are more critical than their peers, or whether some fraction of Groupon merchants provide significantly worse service to customers using Groupons. We suggest an additional novel hypothesis: reviews from Groupon subscribers are lower on average because such reviews correspond to real, unbiased customers, while the body of reviews on Yelp contain some fraction of reviews from biased or even potentially fake sources. Although we focus on a specific question, our work provides broad insights into both consumer and merchant behavior within the daily deals marketplace.
new_dataset
0.958963
1203.0059
Prasang Upadhyaya
Prasang Upadhyaya, Magdalena Balazinska, Dan Suciu
How to Price Shared Optimizations in the Cloud
VLDB2012
Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 6, pp. 562-573 (2012)
null
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Data-management-as-a-service systems are increasingly being used in collaborative settings, where multiple users access common datasets. Cloud providers have the choice to implement various optimizations, such as indexing or materialized views, to accelerate queries over these datasets. Each optimization carries a cost and may benefit multiple users. This creates a major challenge: how to select which optimizations to perform and how to share their cost among users. The problem is especially challenging when users are selfish and will only report their true values for different optimizations if doing so maximizes their utility. In this paper, we present a new approach for selecting and pricing shared optimizations by using Mechanism Design. We first show how to apply the Shapley Value Mechanism to the simple case of selecting and pricing additive optimizations, assuming an offline game where all users access the service for the same time-period. Second, we extend the approach to online scenarios where users come and go. Finally, we consider the case of substitutive optimizations. We show analytically that our mechanisms induce truth- fulness and recover the optimization costs. We also show experimentally that our mechanisms yield higher utility than the state-of-the-art approach based on regret accumulation.
[ { "version": "v1", "created": "Thu, 1 Mar 2012 00:17:40 GMT" } ]
2015-03-20T00:00:00
[ [ "Upadhyaya", "Prasang", "" ], [ "Balazinska", "Magdalena", "" ], [ "Suciu", "Dan", "" ] ]
TITLE: How to Price Shared Optimizations in the Cloud ABSTRACT: Data-management-as-a-service systems are increasingly being used in collaborative settings, where multiple users access common datasets. Cloud providers have the choice to implement various optimizations, such as indexing or materialized views, to accelerate queries over these datasets. Each optimization carries a cost and may benefit multiple users. This creates a major challenge: how to select which optimizations to perform and how to share their cost among users. The problem is especially challenging when users are selfish and will only report their true values for different optimizations if doing so maximizes their utility. In this paper, we present a new approach for selecting and pricing shared optimizations by using Mechanism Design. We first show how to apply the Shapley Value Mechanism to the simple case of selecting and pricing additive optimizations, assuming an offline game where all users access the service for the same time-period. Second, we extend the approach to online scenarios where users come and go. Finally, we consider the case of substitutive optimizations. We show analytically that our mechanisms induce truth- fulness and recover the optimization costs. We also show experimentally that our mechanisms yield higher utility than the state-of-the-art approach based on regret accumulation.
no_new_dataset
0.946151
1203.0453
Song Liu Mr
Song Liu, Makoto Yamada, Nigel Collier, Masashi Sugiyama
Change-Point Detection in Time-Series Data by Relative Density-Ratio Estimation
null
null
10.1016/j.neunet.2013.01.012
null
stat.ML cs.LG stat.ME
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The objective of change-point detection is to discover abrupt property changes lying behind time-series data. In this paper, we present a novel statistical change-point detection algorithm based on non-parametric divergence estimation between time-series samples from two retrospective segments. Our method uses the relative Pearson divergence as a divergence measure, and it is accurately and efficiently estimated by a method of direct density-ratio estimation. Through experiments on artificial and real-world datasets including human-activity sensing, speech, and Twitter messages, we demonstrate the usefulness of the proposed method.
[ { "version": "v1", "created": "Fri, 2 Mar 2012 13:12:03 GMT" }, { "version": "v2", "created": "Wed, 16 Jan 2013 06:44:58 GMT" } ]
2015-03-20T00:00:00
[ [ "Liu", "Song", "" ], [ "Yamada", "Makoto", "" ], [ "Collier", "Nigel", "" ], [ "Sugiyama", "Masashi", "" ] ]
TITLE: Change-Point Detection in Time-Series Data by Relative Density-Ratio Estimation ABSTRACT: The objective of change-point detection is to discover abrupt property changes lying behind time-series data. In this paper, we present a novel statistical change-point detection algorithm based on non-parametric divergence estimation between time-series samples from two retrospective segments. Our method uses the relative Pearson divergence as a divergence measure, and it is accurately and efficiently estimated by a method of direct density-ratio estimation. Through experiments on artificial and real-world datasets including human-activity sensing, speech, and Twitter messages, we demonstrate the usefulness of the proposed method.
no_new_dataset
0.953144
1203.3453
Davide Proserpio
Davide Proserpio, Sharon Goldberg and Frank McSherry
Calibrating Data to Sensitivity in Private Data Analysis
17 pages
Calibrating Data to Sensitivity in Private Data Analysis Proserpio, Davide, Sharon Goldberg, and Frank McSherry. "Calibrating Data to Sensitivity in Private Data Analysis." Proceedings of the VLDB Endowment 7.8 (2014)
null
null
cs.CR cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present an approach to differentially private computation in which one does not scale up the magnitude of noise for challenging queries, but rather scales down the contributions of challenging records. While scaling down all records uniformly is equivalent to scaling up the noise magnitude, we show that scaling records non-uniformly can result in substantially higher accuracy by bypassing the worst-case requirements of differential privacy for the noise magnitudes. This paper details the data analysis platform wPINQ, which generalizes the Privacy Integrated Query (PINQ) to weighted datasets. Using a few simple operators (including a non-uniformly scaling Join operator) wPINQ can reproduce (and improve) several recent results on graph analysis and introduce new generalizations (e.g., counting triangles with given degrees). We also show how to integrate probabilistic inference techniques to synthesize datasets respecting more complicated (and less easily interpreted) measurements.
[ { "version": "v1", "created": "Thu, 15 Mar 2012 19:45:04 GMT" }, { "version": "v2", "created": "Fri, 10 May 2013 19:17:28 GMT" }, { "version": "v3", "created": "Mon, 13 May 2013 02:36:12 GMT" }, { "version": "v4", "created": "Thu, 13 Feb 2014 20:04:56 GMT" }, { "version": "v5", "created": "Sun, 4 May 2014 20:20:24 GMT" } ]
2015-03-20T00:00:00
[ [ "Proserpio", "Davide", "" ], [ "Goldberg", "Sharon", "" ], [ "McSherry", "Frank", "" ] ]
TITLE: Calibrating Data to Sensitivity in Private Data Analysis ABSTRACT: We present an approach to differentially private computation in which one does not scale up the magnitude of noise for challenging queries, but rather scales down the contributions of challenging records. While scaling down all records uniformly is equivalent to scaling up the noise magnitude, we show that scaling records non-uniformly can result in substantially higher accuracy by bypassing the worst-case requirements of differential privacy for the noise magnitudes. This paper details the data analysis platform wPINQ, which generalizes the Privacy Integrated Query (PINQ) to weighted datasets. Using a few simple operators (including a non-uniformly scaling Join operator) wPINQ can reproduce (and improve) several recent results on graph analysis and introduce new generalizations (e.g., counting triangles with given degrees). We also show how to integrate probabilistic inference techniques to synthesize datasets respecting more complicated (and less easily interpreted) measurements.
no_new_dataset
0.947381
1203.3744
Stelvio Cimato
Carlo Blundo and Stelvio Cimato
Constrained Role Mining
null
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Role Based Access Control (RBAC) is a very popular access control model, for long time investigated and widely deployed in the security architecture of different enterprises. To implement RBAC, roles have to be firstly identified within the considered organization. Usually the process of (automatically) defining the roles in a bottom up way, starting from the permissions assigned to each user, is called {\it role mining}. In literature, the role mining problem has been formally analyzed and several techniques have been proposed in order to obtain a set of valid roles. Recently, the problem of defining different kind of constraints on the number and the size of the roles included in the resulting role set has been addressed. In this paper we provide a formal definition of the role mining problem under the cardinality constraint, i.e. restricting the maximum number of permissions that can be included in a role. We discuss formally the computational complexity of the problem and propose a novel heuristic. Furthermore we present experimental results obtained after the application of the proposed heuristic on both real and synthetic datasets, and compare the resulting performance to previous proposals
[ { "version": "v1", "created": "Fri, 16 Mar 2012 15:46:06 GMT" } ]
2015-03-20T00:00:00
[ [ "Blundo", "Carlo", "" ], [ "Cimato", "Stelvio", "" ] ]
TITLE: Constrained Role Mining ABSTRACT: Role Based Access Control (RBAC) is a very popular access control model, for long time investigated and widely deployed in the security architecture of different enterprises. To implement RBAC, roles have to be firstly identified within the considered organization. Usually the process of (automatically) defining the roles in a bottom up way, starting from the permissions assigned to each user, is called {\it role mining}. In literature, the role mining problem has been formally analyzed and several techniques have been proposed in order to obtain a set of valid roles. Recently, the problem of defining different kind of constraints on the number and the size of the roles included in the resulting role set has been addressed. In this paper we provide a formal definition of the role mining problem under the cardinality constraint, i.e. restricting the maximum number of permissions that can be included in a role. We discuss formally the computational complexity of the problem and propose a novel heuristic. Furthermore we present experimental results obtained after the application of the proposed heuristic on both real and synthetic datasets, and compare the resulting performance to previous proposals
no_new_dataset
0.948298
1203.4903
Edith Cohen
Edith Cohen
Distance Queries from Sampled Data: Accurate and Efficient
13 pages; This is a full version of a KDD 2014 paper
null
null
null
cs.DS cs.DB math.ST stat.TH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Distance queries are a basic tool in data analysis. They are used for detection and localization of change for the purpose of anomaly detection, monitoring, or planning. Distance queries are particularly useful when data sets such as measurements, snapshots of a system, content, traffic matrices, and activity logs are collected repeatedly. Random sampling, which can be efficiently performed over streamed or distributed data, is an important tool for scalable data analysis. The sample constitutes an extremely flexible summary, which naturally supports domain queries and scalable estimation of statistics, which can be specified after the sample is generated. The effectiveness of a sample as a summary, however, hinges on the estimators we have. We derive novel estimators for estimating $L_p$ distance from sampled data. Our estimators apply with the most common weighted sampling schemes: Poisson Probability Proportional to Size (PPS) and its fixed sample size variants. They also apply when the samples of different data sets are independent or coordinated. Our estimators are admissible (Pareto optimal in terms of variance) and have compelling properties. We study the performance of our Manhattan and Euclidean distance ($p=1,2$) estimators on diverse datasets, demonstrating scalability and accuracy even when a small fraction of the data is sampled. Our work, for the first time, facilitates effective distance estimation over sampled data.
[ { "version": "v1", "created": "Thu, 22 Mar 2012 08:06:09 GMT" }, { "version": "v2", "created": "Fri, 15 Feb 2013 20:10:58 GMT" }, { "version": "v3", "created": "Sun, 8 Jun 2014 13:06:42 GMT" } ]
2015-03-20T00:00:00
[ [ "Cohen", "Edith", "" ] ]
TITLE: Distance Queries from Sampled Data: Accurate and Efficient ABSTRACT: Distance queries are a basic tool in data analysis. They are used for detection and localization of change for the purpose of anomaly detection, monitoring, or planning. Distance queries are particularly useful when data sets such as measurements, snapshots of a system, content, traffic matrices, and activity logs are collected repeatedly. Random sampling, which can be efficiently performed over streamed or distributed data, is an important tool for scalable data analysis. The sample constitutes an extremely flexible summary, which naturally supports domain queries and scalable estimation of statistics, which can be specified after the sample is generated. The effectiveness of a sample as a summary, however, hinges on the estimators we have. We derive novel estimators for estimating $L_p$ distance from sampled data. Our estimators apply with the most common weighted sampling schemes: Poisson Probability Proportional to Size (PPS) and its fixed sample size variants. They also apply when the samples of different data sets are independent or coordinated. Our estimators are admissible (Pareto optimal in terms of variance) and have compelling properties. We study the performance of our Manhattan and Euclidean distance ($p=1,2$) estimators on diverse datasets, demonstrating scalability and accuracy even when a small fraction of the data is sampled. Our work, for the first time, facilitates effective distance estimation over sampled data.
no_new_dataset
0.939471
1203.5126
VIkas Kawadia
Vikas Kawadia and Sameet Sreenivasan
Online detection of temporal communities in evolving networks by estrangement confinement
null
Scientific Reports 2, Article number: 794, Mar 2012
10.1038/srep00794
null
cs.SI cond-mat.stat-mech physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Temporal communities result from a consistent partitioning of nodes across multiple snapshots of an evolving complex network that can help uncover how dense clusters in a network emerge, combine, split and decay with time. Current methods for finding communities in a single snapshot are not straightforwardly generalizable to finding temporal communities since the quality functions used for finding static communities have highly degenerate landscapes, and the eventual partition chosen among the many partitions of similar quality is highly sensitive to small changes in the network. To reliably detect temporal communities we need not only to find a good community partition in a given snapshot but also ensure that it bears some similarity to the partition(s) found in immediately preceding snapshots. We present a new measure of partition distance called "estrangement" motivated by the inertia of inter-node relationships which, when incorporated into the measurement of partition quality, facilitates the detection of meaningful temporal communities. Specifically, we propose the estrangement confinement method, which postulates that neighboring nodes in a community prefer to continue to share community affiliation as the network evolves. Constraining estrangement enables us to find meaningful temporal communities at various degrees of temporal smoothness in diverse real-world datasets. Specifically, we study the evolution of voting behavior of senators in the United States Congress, the evolution of proximity in human mobility datasets, and the detection of evolving communities in synthetic networks that are otherwise hard to find. Estrangement confinement thus provides a principled approach to uncovering temporal communities in evolving networks.
[ { "version": "v1", "created": "Thu, 22 Mar 2012 21:03:28 GMT" } ]
2015-03-20T00:00:00
[ [ "Kawadia", "Vikas", "" ], [ "Sreenivasan", "Sameet", "" ] ]
TITLE: Online detection of temporal communities in evolving networks by estrangement confinement ABSTRACT: Temporal communities result from a consistent partitioning of nodes across multiple snapshots of an evolving complex network that can help uncover how dense clusters in a network emerge, combine, split and decay with time. Current methods for finding communities in a single snapshot are not straightforwardly generalizable to finding temporal communities since the quality functions used for finding static communities have highly degenerate landscapes, and the eventual partition chosen among the many partitions of similar quality is highly sensitive to small changes in the network. To reliably detect temporal communities we need not only to find a good community partition in a given snapshot but also ensure that it bears some similarity to the partition(s) found in immediately preceding snapshots. We present a new measure of partition distance called "estrangement" motivated by the inertia of inter-node relationships which, when incorporated into the measurement of partition quality, facilitates the detection of meaningful temporal communities. Specifically, we propose the estrangement confinement method, which postulates that neighboring nodes in a community prefer to continue to share community affiliation as the network evolves. Constraining estrangement enables us to find meaningful temporal communities at various degrees of temporal smoothness in diverse real-world datasets. Specifically, we study the evolution of voting behavior of senators in the United States Congress, the evolution of proximity in human mobility datasets, and the detection of evolving communities in synthetic networks that are otherwise hard to find. Estrangement confinement thus provides a principled approach to uncovering temporal communities in evolving networks.
no_new_dataset
0.94801
1203.6744
Matteo Zignani
Sabrina Gaito, Matteo Zignani, Gian Paolo Rossi, Alessandra Sala, Xiao Wang, Haitao Zheng and Ben Y. Zhao
On the Bursty Evolution of Online Social Networks
13 pages, 7 figures
null
null
null
cs.SI physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The high level of dynamics in today's online social networks (OSNs) creates new challenges for their infrastructures and providers. In particular, dynamics involving edge creation has direct implications on strategies for resource allocation, data partitioning and replication. Understanding network dynamics in the context of physical time is a critical first step towards a predictive approach towards infrastructure management in OSNs. Despite increasing efforts to study social network dynamics, current analyses mainly focus on change over time of static metrics computed on snapshots of social graphs. The limited prior work models network dynamics with respect to a logical clock. In this paper, we present results of analyzing a large timestamped dataset describing the initial growth and evolution of Renren, the leading social network in China. We analyze and model the burstiness of link creation process, using the second derivative, i.e. the acceleration of the degree. This allows us to detect bursts, and to characterize the social activity of a OSN user as one of four phases: acceleration at the beginning of an activity burst, where link creation rate is increasing; deceleration when burst is ending and link creation process is slowing; cruising, when node activity is in a steady state, and complete inactivity.
[ { "version": "v1", "created": "Fri, 30 Mar 2012 08:49:22 GMT" }, { "version": "v2", "created": "Fri, 25 May 2012 12:21:48 GMT" } ]
2015-03-20T00:00:00
[ [ "Gaito", "Sabrina", "" ], [ "Zignani", "Matteo", "" ], [ "Rossi", "Gian Paolo", "" ], [ "Sala", "Alessandra", "" ], [ "Wang", "Xiao", "" ], [ "Zheng", "Haitao", "" ], [ "Zhao", "Ben Y.", "" ] ]
TITLE: On the Bursty Evolution of Online Social Networks ABSTRACT: The high level of dynamics in today's online social networks (OSNs) creates new challenges for their infrastructures and providers. In particular, dynamics involving edge creation has direct implications on strategies for resource allocation, data partitioning and replication. Understanding network dynamics in the context of physical time is a critical first step towards a predictive approach towards infrastructure management in OSNs. Despite increasing efforts to study social network dynamics, current analyses mainly focus on change over time of static metrics computed on snapshots of social graphs. The limited prior work models network dynamics with respect to a logical clock. In this paper, we present results of analyzing a large timestamped dataset describing the initial growth and evolution of Renren, the leading social network in China. We analyze and model the burstiness of link creation process, using the second derivative, i.e. the acceleration of the degree. This allows us to detect bursts, and to characterize the social activity of a OSN user as one of four phases: acceleration at the beginning of an activity burst, where link creation rate is increasing; deceleration when burst is ending and link creation process is slowing; cruising, when node activity is in a steady state, and complete inactivity.
no_new_dataset
0.95275
1205.0042
Mateusz Ujma
Mateusz Ujma, Nastaran Shafiei
jpf-concurrent: An extension of Java PathFinder for java.util.concurrent
null
null
null
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
One of the main challenges when verifying multi-threaded Java applications is the state space explosion problem. Due to thread interleavings, the number of states that the model checker has to verify can grow rapidly and impede the feasibility of verification. In the Java language, the source of thread interleavings can be the system under test as well as the Java Development Kit (JDK) itself. In our paper, we propose a method to minimize the state space explosion problem for applications verified under the Java PathFinder (JPF) model checker. Our method is based on abstracting the state of the application to a smaller domain and implementing application behavior using the Model Java Interface (MJI) of JPF. To show the capabilities of our approach, we have created a JPF extension called jpf-concurrent which abstracts classes from the Java Concurrency Utilities. Several benchmarks proved the usefulness of our approach. In all cases, our implementation was faster than the JDK implementation when running under the JPF model checker. Moreover, our implementation led to significantly smaller state spaces.
[ { "version": "v1", "created": "Mon, 30 Apr 2012 22:08:39 GMT" } ]
2015-03-20T00:00:00
[ [ "Ujma", "Mateusz", "" ], [ "Shafiei", "Nastaran", "" ] ]
TITLE: jpf-concurrent: An extension of Java PathFinder for java.util.concurrent ABSTRACT: One of the main challenges when verifying multi-threaded Java applications is the state space explosion problem. Due to thread interleavings, the number of states that the model checker has to verify can grow rapidly and impede the feasibility of verification. In the Java language, the source of thread interleavings can be the system under test as well as the Java Development Kit (JDK) itself. In our paper, we propose a method to minimize the state space explosion problem for applications verified under the Java PathFinder (JPF) model checker. Our method is based on abstracting the state of the application to a smaller domain and implementing application behavior using the Model Java Interface (MJI) of JPF. To show the capabilities of our approach, we have created a JPF extension called jpf-concurrent which abstracts classes from the Java Concurrency Utilities. Several benchmarks proved the usefulness of our approach. In all cases, our implementation was faster than the JDK implementation when running under the JPF model checker. Moreover, our implementation led to significantly smaller state spaces.
no_new_dataset
0.932515
1205.0192
Anthony J Cox
Anthony J. Cox, Markus J. Bauer, Tobias Jakobi and Giovanna Rosone
Large-scale compression of genomic sequence databases with the Burrows-Wheeler transform
Version here is as submitted to Bioinformatics and is same as the previously archived version. This submission registers the fact that the advanced access version is now available at http://bioinformatics.oxfordjournals.org/content/early/2012/05/02/bioinformatics.bts173.abstract . Bioinformatics should be considered as the original place of publication of this article, please cite accordingly
null
10.1093/bioinformatics/bts173
null
cs.DS q-bio.GN
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Motivation The Burrows-Wheeler transform (BWT) is the foundation of many algorithms for compression and indexing of text data, but the cost of computing the BWT of very large string collections has prevented these techniques from being widely applied to the large sets of sequences often encountered as the outcome of DNA sequencing experiments. In previous work, we presented a novel algorithm that allows the BWT of human genome scale data to be computed on very moderate hardware, thus enabling us to investigate the BWT as a tool for the compression of such datasets. Results We first used simulated reads to explore the relationship between the level of compression and the error rate, the length of the reads and the level of sampling of the underlying genome and compare choices of second-stage compression algorithm. We demonstrate that compression may be greatly improved by a particular reordering of the sequences in the collection and give a novel `implicit sorting' strategy that enables these benefits to be realised without the overhead of sorting the reads. With these techniques, a 45x coverage of real human genome sequence data compresses losslessly to under 0.5 bits per base, allowing the 135.3Gbp of sequence to fit into only 8.2Gbytes of space (trimming a small proportion of low-quality bases from the reads improves the compression still further). This is more than 4 times smaller than the size achieved by a standard BWT-based compressor (bzip2) on the untrimmed reads, but an important further advantage of our approach is that it facilitates the building of compressed full text indexes such as the FM-index on large-scale DNA sequence collections.
[ { "version": "v1", "created": "Tue, 1 May 2012 15:39:50 GMT" }, { "version": "v2", "created": "Fri, 11 May 2012 11:22:55 GMT" } ]
2015-03-20T00:00:00
[ [ "Cox", "Anthony J.", "" ], [ "Bauer", "Markus J.", "" ], [ "Jakobi", "Tobias", "" ], [ "Rosone", "Giovanna", "" ] ]
TITLE: Large-scale compression of genomic sequence databases with the Burrows-Wheeler transform ABSTRACT: Motivation The Burrows-Wheeler transform (BWT) is the foundation of many algorithms for compression and indexing of text data, but the cost of computing the BWT of very large string collections has prevented these techniques from being widely applied to the large sets of sequences often encountered as the outcome of DNA sequencing experiments. In previous work, we presented a novel algorithm that allows the BWT of human genome scale data to be computed on very moderate hardware, thus enabling us to investigate the BWT as a tool for the compression of such datasets. Results We first used simulated reads to explore the relationship between the level of compression and the error rate, the length of the reads and the level of sampling of the underlying genome and compare choices of second-stage compression algorithm. We demonstrate that compression may be greatly improved by a particular reordering of the sequences in the collection and give a novel `implicit sorting' strategy that enables these benefits to be realised without the overhead of sorting the reads. With these techniques, a 45x coverage of real human genome sequence data compresses losslessly to under 0.5 bits per base, allowing the 135.3Gbp of sequence to fit into only 8.2Gbytes of space (trimming a small proportion of low-quality bases from the reads improves the compression still further). This is more than 4 times smaller than the size achieved by a standard BWT-based compressor (bzip2) on the untrimmed reads, but an important further advantage of our approach is that it facilitates the building of compressed full text indexes such as the FM-index on large-scale DNA sequence collections.
no_new_dataset
0.940298
1205.2584
Anh Huy Phan
Anh Huy Phan and Petr Tichavsk\'y and Andrzej Cichocki
Low Complexity Damped Gauss-Newton Algorithms for CANDECOMP/PARAFAC
null
null
null
null
cs.NA cs.LG math.OC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The damped Gauss-Newton (dGN) algorithm for CANDECOMP/PARAFAC (CP) decomposition can handle the challenges of collinearity of factors and different magnitudes of factors; nevertheless, for factorization of an $N$-D tensor of size $I_1\times I_N$ with rank $R$, the algorithm is computationally demanding due to construction of large approximate Hessian of size $(RT \times RT)$ and its inversion where $T = \sum_n I_n$. In this paper, we propose a fast implementation of the dGN algorithm which is based on novel expressions of the inverse approximate Hessian in block form. The new implementation has lower computational complexity, besides computation of the gradient (this part is common to both methods), requiring the inversion of a matrix of size $NR^2\times NR^2$, which is much smaller than the whole approximate Hessian, if $T \gg NR$. In addition, the implementation has lower memory requirements, because neither the Hessian nor its inverse never need to be stored in their entirety. A variant of the algorithm working with complex valued data is proposed as well. Complexity and performance of the proposed algorithm is compared with those of dGN and ALS with line search on examples of difficult benchmark tensors.
[ { "version": "v1", "created": "Fri, 11 May 2012 17:26:21 GMT" }, { "version": "v2", "created": "Thu, 13 Sep 2012 03:14:12 GMT" } ]
2015-03-20T00:00:00
[ [ "Phan", "Anh Huy", "" ], [ "Tichavský", "Petr", "" ], [ "Cichocki", "Andrzej", "" ] ]
TITLE: Low Complexity Damped Gauss-Newton Algorithms for CANDECOMP/PARAFAC ABSTRACT: The damped Gauss-Newton (dGN) algorithm for CANDECOMP/PARAFAC (CP) decomposition can handle the challenges of collinearity of factors and different magnitudes of factors; nevertheless, for factorization of an $N$-D tensor of size $I_1\times I_N$ with rank $R$, the algorithm is computationally demanding due to construction of large approximate Hessian of size $(RT \times RT)$ and its inversion where $T = \sum_n I_n$. In this paper, we propose a fast implementation of the dGN algorithm which is based on novel expressions of the inverse approximate Hessian in block form. The new implementation has lower computational complexity, besides computation of the gradient (this part is common to both methods), requiring the inversion of a matrix of size $NR^2\times NR^2$, which is much smaller than the whole approximate Hessian, if $T \gg NR$. In addition, the implementation has lower memory requirements, because neither the Hessian nor its inverse never need to be stored in their entirety. A variant of the algorithm working with complex valued data is proposed as well. Complexity and performance of the proposed algorithm is compared with those of dGN and ALS with line search on examples of difficult benchmark tensors.
no_new_dataset
0.938576
1205.2663
Ot\'avio Penatti
Otavio A. B. Penatti, Eduardo Valle, Ricardo da S. Torres
Are visual dictionaries generalizable?
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Mid-level features based on visual dictionaries are today a cornerstone of systems for classification and retrieval of images. Those state-of-the-art representations depend crucially on the choice of a codebook (visual dictionary), which is usually derived from the dataset. In general-purpose, dynamic image collections (e.g., the Web), one cannot have the entire collection in order to extract a representative dictionary. However, based on the hypothesis that the dictionary reflects only the diversity of low-level appearances and does not capture semantics, we argue that a dictionary based on a small subset of the data, or even on an entirely different dataset, is able to produce a good representation, provided that the chosen images span a diverse enough portion of the low-level feature space. Our experiments confirm that hypothesis, opening the opportunity to greatly alleviate the burden in generating the codebook, and confirming the feasibility of employing visual dictionaries in large-scale dynamic environments.
[ { "version": "v1", "created": "Fri, 11 May 2012 18:54:12 GMT" } ]
2015-03-20T00:00:00
[ [ "Penatti", "Otavio A. B.", "" ], [ "Valle", "Eduardo", "" ], [ "Torres", "Ricardo da S.", "" ] ]
TITLE: Are visual dictionaries generalizable? ABSTRACT: Mid-level features based on visual dictionaries are today a cornerstone of systems for classification and retrieval of images. Those state-of-the-art representations depend crucially on the choice of a codebook (visual dictionary), which is usually derived from the dataset. In general-purpose, dynamic image collections (e.g., the Web), one cannot have the entire collection in order to extract a representative dictionary. However, based on the hypothesis that the dictionary reflects only the diversity of low-level appearances and does not capture semantics, we argue that a dictionary based on a small subset of the data, or even on an entirely different dataset, is able to produce a good representation, provided that the chosen images span a diverse enough portion of the low-level feature space. Our experiments confirm that hypothesis, opening the opportunity to greatly alleviate the burden in generating the codebook, and confirming the feasibility of employing visual dictionaries in large-scale dynamic environments.
no_new_dataset
0.948251
1205.3109
Arthur Guez
Arthur Guez and David Silver and Peter Dayan
Efficient Bayes-Adaptive Reinforcement Learning using Sample-Based Search
14 pages, 7 figures, includes supplementary material. Advances in Neural Information Processing Systems (NIPS) 2012
(2012) Advances in Neural Information Processing Systems 25, pages 1034-1042
null
null
cs.LG cs.AI stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Bayesian model-based reinforcement learning is a formally elegant approach to learning optimal behaviour under model uncertainty, trading off exploration and exploitation in an ideal way. Unfortunately, finding the resulting Bayes-optimal policies is notoriously taxing, since the search space becomes enormous. In this paper we introduce a tractable, sample-based method for approximate Bayes-optimal planning which exploits Monte-Carlo tree search. Our approach outperformed prior Bayesian model-based RL algorithms by a significant margin on several well-known benchmark problems -- because it avoids expensive applications of Bayes rule within the search tree by lazily sampling models from the current beliefs. We illustrate the advantages of our approach by showing it working in an infinite state space domain which is qualitatively out of reach of almost all previous work in Bayesian exploration.
[ { "version": "v1", "created": "Mon, 14 May 2012 17:20:29 GMT" }, { "version": "v2", "created": "Sat, 13 Oct 2012 15:19:09 GMT" }, { "version": "v3", "created": "Thu, 3 Jan 2013 14:44:59 GMT" }, { "version": "v4", "created": "Wed, 18 Dec 2013 11:45:49 GMT" } ]
2015-03-20T00:00:00
[ [ "Guez", "Arthur", "" ], [ "Silver", "David", "" ], [ "Dayan", "Peter", "" ] ]
TITLE: Efficient Bayes-Adaptive Reinforcement Learning using Sample-Based Search ABSTRACT: Bayesian model-based reinforcement learning is a formally elegant approach to learning optimal behaviour under model uncertainty, trading off exploration and exploitation in an ideal way. Unfortunately, finding the resulting Bayes-optimal policies is notoriously taxing, since the search space becomes enormous. In this paper we introduce a tractable, sample-based method for approximate Bayes-optimal planning which exploits Monte-Carlo tree search. Our approach outperformed prior Bayesian model-based RL algorithms by a significant margin on several well-known benchmark problems -- because it avoids expensive applications of Bayes rule within the search tree by lazily sampling models from the current beliefs. We illustrate the advantages of our approach by showing it working in an infinite state space domain which is qualitatively out of reach of almost all previous work in Bayesian exploration.
no_new_dataset
0.94868
1205.4776
Ilknur Icke
Ilknur Icke and Andrew Rosenberg
Visual and semantic interpretability of projections of high dimensional data for classification tasks
Longer version of the VAST 2011 poster. http://dx.doi.org/10.1109/VAST.2011.6102474
null
10.1109/VAST.2011.6102474
null
cs.HC cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A number of visual quality measures have been introduced in visual analytics literature in order to automatically select the best views of high dimensional data from a large number of candidate data projections. These methods generally concentrate on the interpretability of the visualization and pay little attention to the interpretability of the projection axes. In this paper, we argue that interpretability of the visualizations and the feature transformation functions are both crucial for visual exploration of high dimensional labeled data. We present a two-part user study to examine these two related but orthogonal aspects of interpretability. We first study how humans judge the quality of 2D scatterplots of various datasets with varying number of classes and provide comparisons with ten automated measures, including a number of visual quality measures and related measures from various machine learning fields. We then investigate how the user perception on interpretability of mathematical expressions relate to various automated measures of complexity that can be used to characterize data projection functions. We conclude with a discussion of how automated measures of visual and semantic interpretability of data projections can be used together for exploratory analysis in classification tasks.
[ { "version": "v1", "created": "Tue, 22 May 2012 00:10:45 GMT" } ]
2015-03-20T00:00:00
[ [ "Icke", "Ilknur", "" ], [ "Rosenberg", "Andrew", "" ] ]
TITLE: Visual and semantic interpretability of projections of high dimensional data for classification tasks ABSTRACT: A number of visual quality measures have been introduced in visual analytics literature in order to automatically select the best views of high dimensional data from a large number of candidate data projections. These methods generally concentrate on the interpretability of the visualization and pay little attention to the interpretability of the projection axes. In this paper, we argue that interpretability of the visualizations and the feature transformation functions are both crucial for visual exploration of high dimensional labeled data. We present a two-part user study to examine these two related but orthogonal aspects of interpretability. We first study how humans judge the quality of 2D scatterplots of various datasets with varying number of classes and provide comparisons with ten automated measures, including a number of visual quality measures and related measures from various machine learning fields. We then investigate how the user perception on interpretability of mathematical expressions relate to various automated measures of complexity that can be used to characterize data projection functions. We conclude with a discussion of how automated measures of visual and semantic interpretability of data projections can be used together for exploratory analysis in classification tasks.
no_new_dataset
0.937783
1205.4839
Thomas Degris
Thomas Degris, Martha White, Richard S. Sutton
Off-Policy Actor-Critic
Full version of the paper, appendix and errata included; Proceedings of the 2012 International Conference on Machine Learning
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents the first actor-critic algorithm for off-policy reinforcement learning. Our algorithm is online and incremental, and its per-time-step complexity scales linearly with the number of learned weights. Previous work on actor-critic algorithms is limited to the on-policy setting and does not take advantage of the recent advances in off-policy gradient temporal-difference learning. Off-policy techniques, such as Greedy-GQ, enable a target policy to be learned while following and obtaining data from another (behavior) policy. For many problems, however, actor-critic methods are more practical than action value methods (like Greedy-GQ) because they explicitly represent the policy; consequently, the policy can be stochastic and utilize a large action space. In this paper, we illustrate how to practically combine the generality and learning potential of off-policy learning with the flexibility in action selection given by actor-critic methods. We derive an incremental, linear time and space complexity algorithm that includes eligibility traces, prove convergence under assumptions similar to previous off-policy algorithms, and empirically show better or comparable performance to existing algorithms on standard reinforcement-learning benchmark problems.
[ { "version": "v1", "created": "Tue, 22 May 2012 08:36:41 GMT" }, { "version": "v2", "created": "Wed, 23 May 2012 14:36:42 GMT" }, { "version": "v3", "created": "Tue, 17 Jul 2012 20:40:47 GMT" }, { "version": "v4", "created": "Tue, 14 Aug 2012 07:08:17 GMT" }, { "version": "v5", "created": "Thu, 20 Jun 2013 10:53:42 GMT" } ]
2015-03-20T00:00:00
[ [ "Degris", "Thomas", "" ], [ "White", "Martha", "" ], [ "Sutton", "Richard S.", "" ] ]
TITLE: Off-Policy Actor-Critic ABSTRACT: This paper presents the first actor-critic algorithm for off-policy reinforcement learning. Our algorithm is online and incremental, and its per-time-step complexity scales linearly with the number of learned weights. Previous work on actor-critic algorithms is limited to the on-policy setting and does not take advantage of the recent advances in off-policy gradient temporal-difference learning. Off-policy techniques, such as Greedy-GQ, enable a target policy to be learned while following and obtaining data from another (behavior) policy. For many problems, however, actor-critic methods are more practical than action value methods (like Greedy-GQ) because they explicitly represent the policy; consequently, the policy can be stochastic and utilize a large action space. In this paper, we illustrate how to practically combine the generality and learning potential of off-policy learning with the flexibility in action selection given by actor-critic methods. We derive an incremental, linear time and space complexity algorithm that includes eligibility traces, prove convergence under assumptions similar to previous off-policy algorithms, and empirically show better or comparable performance to existing algorithms on standard reinforcement-learning benchmark problems.
no_new_dataset
0.943556
1206.4074
Fuxin Li
Fuxin Li, Guy Lebanon, Cristian Sminchisescu
A Linear Approximation to the chi^2 Kernel with Geometric Convergence
null
null
null
null
cs.LG cs.CV stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a new analytical approximation to the $\chi^2$ kernel that converges geometrically. The analytical approximation is derived with elementary methods and adapts to the input distribution for optimal convergence rate. Experiments show the new approximation leads to improved performance in image classification and semantic segmentation tasks using a random Fourier feature approximation of the $\exp-\chi^2$ kernel. Besides, out-of-core principal component analysis (PCA) methods are introduced to reduce the dimensionality of the approximation and achieve better performance at the expense of only an additional constant factor to the time complexity. Moreover, when PCA is performed jointly on the training and unlabeled testing data, further performance improvements can be obtained. Experiments conducted on the PASCAL VOC 2010 segmentation and the ImageNet ILSVRC 2010 datasets show statistically significant improvements over alternative approximation methods.
[ { "version": "v1", "created": "Mon, 18 Jun 2012 21:05:16 GMT" }, { "version": "v2", "created": "Thu, 18 Apr 2013 18:38:28 GMT" }, { "version": "v3", "created": "Wed, 12 Jun 2013 19:29:18 GMT" } ]
2015-03-20T00:00:00
[ [ "Li", "Fuxin", "" ], [ "Lebanon", "Guy", "" ], [ "Sminchisescu", "Cristian", "" ] ]
TITLE: A Linear Approximation to the chi^2 Kernel with Geometric Convergence ABSTRACT: We propose a new analytical approximation to the $\chi^2$ kernel that converges geometrically. The analytical approximation is derived with elementary methods and adapts to the input distribution for optimal convergence rate. Experiments show the new approximation leads to improved performance in image classification and semantic segmentation tasks using a random Fourier feature approximation of the $\exp-\chi^2$ kernel. Besides, out-of-core principal component analysis (PCA) methods are introduced to reduce the dimensionality of the approximation and achieve better performance at the expense of only an additional constant factor to the time complexity. Moreover, when PCA is performed jointly on the training and unlabeled testing data, further performance improvements can be obtained. Experiments conducted on the PASCAL VOC 2010 segmentation and the ImageNet ILSVRC 2010 datasets show statistically significant improvements over alternative approximation methods.
no_new_dataset
0.947817
1206.4094
Jeremi K. Ochab
J. K. Ochab
Maximal-entropy random walk unifies centrality measures
7 pages, 2 figures
Phys. Rev. E 86, 066109 (2012)
10.1103/PhysRevE.86.066109
null
physics.soc-ph cond-mat.dis-nn cond-mat.stat-mech cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper analogies between different (dis)similarity matrices are derived. These matrices, which are connected to path enumeration and random walks, are used in community detection methods or in computation of centrality measures for complex networks. The focus is on a number of known centrality measures, which inherit the connections established for similarity matrices. These measures are based on the principal eigenvector of the adjacency matrix, path enumeration, as well as on the stationary state, stochastic matrix or mean first-passage times of a random walk. Particular attention is paid to the maximal-entropy random walk, which serves as a very distinct alternative to the ordinary random walk used in network analysis. The various importance measures, defined both with the use of ordinary random walk and the maximal-entropy random walk, are compared numerically on a set of benchmark graphs. It is shown that groups of centrality measures defined with the two random walks cluster into two separate families. In particular, the group of centralities for the maximal-entropy random walk, connected to the eigenvector centrality and path enumeration, is strongly distinct from all the other measures and produces largely equivalent results.
[ { "version": "v1", "created": "Mon, 18 Jun 2012 22:39:29 GMT" }, { "version": "v2", "created": "Thu, 30 Aug 2012 11:07:23 GMT" } ]
2015-03-20T00:00:00
[ [ "Ochab", "J. K.", "" ] ]
TITLE: Maximal-entropy random walk unifies centrality measures ABSTRACT: In this paper analogies between different (dis)similarity matrices are derived. These matrices, which are connected to path enumeration and random walks, are used in community detection methods or in computation of centrality measures for complex networks. The focus is on a number of known centrality measures, which inherit the connections established for similarity matrices. These measures are based on the principal eigenvector of the adjacency matrix, path enumeration, as well as on the stationary state, stochastic matrix or mean first-passage times of a random walk. Particular attention is paid to the maximal-entropy random walk, which serves as a very distinct alternative to the ordinary random walk used in network analysis. The various importance measures, defined both with the use of ordinary random walk and the maximal-entropy random walk, are compared numerically on a set of benchmark graphs. It is shown that groups of centrality measures defined with the two random walks cluster into two separate families. In particular, the group of centralities for the maximal-entropy random walk, connected to the eigenvector centrality and path enumeration, is strongly distinct from all the other measures and produces largely equivalent results.
no_new_dataset
0.946399
1206.6295
Vojtech Forejt
Vojtech Forejt, Marta Kwiatkowska and David Parker
Pareto Curves for Probabilistic Model Checking
null
null
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Multi-objective probabilistic model checking provides a way to verify several, possibly conflicting, quantitative properties of a stochastic system. It has useful applications in controller synthesis and compositional probabilistic verification. However, existing methods are based on linear programming, which limits the scale of systems that can be analysed and makes verification of time-bounded properties very difficult. We present a novel approach that addresses both of these shortcomings, based on the generation of successive approximations of the Pareto curve for a multi-objective model checking problem. We illustrate dramatic improvements in efficiency on a large set of benchmarks and show how the ability to visualise Pareto curves significantly enhances the quality of results obtained from current probabilistic verification tools.
[ { "version": "v1", "created": "Sun, 24 Jun 2012 15:09:09 GMT" } ]
2015-03-20T00:00:00
[ [ "Forejt", "Vojtech", "" ], [ "Kwiatkowska", "Marta", "" ], [ "Parker", "David", "" ] ]
TITLE: Pareto Curves for Probabilistic Model Checking ABSTRACT: Multi-objective probabilistic model checking provides a way to verify several, possibly conflicting, quantitative properties of a stochastic system. It has useful applications in controller synthesis and compositional probabilistic verification. However, existing methods are based on linear programming, which limits the scale of systems that can be analysed and makes verification of time-bounded properties very difficult. We present a novel approach that addresses both of these shortcomings, based on the generation of successive approximations of the Pareto curve for a multi-objective model checking problem. We illustrate dramatic improvements in efficiency on a large set of benchmarks and show how the ability to visualise Pareto curves significantly enhances the quality of results obtained from current probabilistic verification tools.
no_new_dataset
0.947866
1207.0141
Beng Chin Ooi
Wei Lu, Yanyan Shen, Su Chen, Beng Chin Ooi
Efficient Processing of k Nearest Neighbor Joins using MapReduce
VLDB2012
Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 10, pp. 1016-1027 (2012)
null
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
k nearest neighbor join (kNN join), designed to find k nearest neighbors from a dataset S for every object in another dataset R, is a primitive operation widely adopted by many data mining applications. As a combination of the k nearest neighbor query and the join operation, kNN join is an expensive operation. Given the increasing volume of data, it is difficult to perform a kNN join on a centralized machine efficiently. In this paper, we investigate how to perform kNN join using MapReduce which is a well-accepted framework for data-intensive applications over clusters of computers. In brief, the mappers cluster objects into groups; the reducers perform the kNN join on each group of objects separately. We design an effective mapping mechanism that exploits pruning rules for distance filtering, and hence reduces both the shuffling and computational costs. To reduce the shuffling cost, we propose two approximate algorithms to minimize the number of replicas. Extensive experiments on our in-house cluster demonstrate that our proposed methods are efficient, robust and scalable.
[ { "version": "v1", "created": "Sat, 30 Jun 2012 20:20:31 GMT" } ]
2015-03-20T00:00:00
[ [ "Lu", "Wei", "" ], [ "Shen", "Yanyan", "" ], [ "Chen", "Su", "" ], [ "Ooi", "Beng Chin", "" ] ]
TITLE: Efficient Processing of k Nearest Neighbor Joins using MapReduce ABSTRACT: k nearest neighbor join (kNN join), designed to find k nearest neighbors from a dataset S for every object in another dataset R, is a primitive operation widely adopted by many data mining applications. As a combination of the k nearest neighbor query and the join operation, kNN join is an expensive operation. Given the increasing volume of data, it is difficult to perform a kNN join on a centralized machine efficiently. In this paper, we investigate how to perform kNN join using MapReduce which is a well-accepted framework for data-intensive applications over clusters of computers. In brief, the mappers cluster objects into groups; the reducers perform the kNN join on each group of objects separately. We design an effective mapping mechanism that exploits pruning rules for distance filtering, and hence reduces both the shuffling and computational costs. To reduce the shuffling cost, we propose two approximate algorithms to minimize the number of replicas. Extensive experiments on our in-house cluster demonstrate that our proposed methods are efficient, robust and scalable.
no_new_dataset
0.942029
1207.1524
Vasanthan Raghavan
Vasanthan Raghavan and Venugopal V. Veeravalli
Ensemble Properties of RVQ-Based Limited-Feedback Beamforming Codebooks
47 pages, 6 figures, submitted to IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The ensemble properties of Random Vector Quantization (RVQ) codebooks for limited-feedback beamforming in multi-input multi-output (MIMO) systems are studied with the metrics of interest being the received SNR loss and mutual information loss, both relative to a perfect channel state information (CSI) benchmark. The simplest case of unskewed codebooks is studied in the correlated MIMO setting and these loss metrics are computed as a function of the number of bits of feedback ($B$), transmit antenna dimension ($N_t$), and spatial correlation. In particular, it is established that: i) the loss metrics are a product of two components -- a quantization component and a channel-dependent component; ii) the quantization component, which is also common to analysis of channels with independent and identically distributed (i.i.d.) fading, decays as $B$ increases at the rate $2^{-B/(N_t-1)}$; iii) the channel-dependent component reflects the condition number of the channel. Further, the precise connection between the received SNR loss and the squared singular values of the channel is shown to be a Schur-convex majorization relationship. Finally, the ensemble properties of skewed codebooks that are generated by skewing RVQ codebooks with an appropriately designed fixed skewing matrix are studied. Based on an estimate of the loss expression for skewed codebooks, it is established that the optimal skewing matrix is critically dependent on the condition numbers of the effective channel (product of the true channel and the skewing matrix) and the skewing matrix.
[ { "version": "v1", "created": "Fri, 6 Jul 2012 05:41:00 GMT" } ]
2015-03-20T00:00:00
[ [ "Raghavan", "Vasanthan", "" ], [ "Veeravalli", "Venugopal V.", "" ] ]
TITLE: Ensemble Properties of RVQ-Based Limited-Feedback Beamforming Codebooks ABSTRACT: The ensemble properties of Random Vector Quantization (RVQ) codebooks for limited-feedback beamforming in multi-input multi-output (MIMO) systems are studied with the metrics of interest being the received SNR loss and mutual information loss, both relative to a perfect channel state information (CSI) benchmark. The simplest case of unskewed codebooks is studied in the correlated MIMO setting and these loss metrics are computed as a function of the number of bits of feedback ($B$), transmit antenna dimension ($N_t$), and spatial correlation. In particular, it is established that: i) the loss metrics are a product of two components -- a quantization component and a channel-dependent component; ii) the quantization component, which is also common to analysis of channels with independent and identically distributed (i.i.d.) fading, decays as $B$ increases at the rate $2^{-B/(N_t-1)}$; iii) the channel-dependent component reflects the condition number of the channel. Further, the precise connection between the received SNR loss and the squared singular values of the channel is shown to be a Schur-convex majorization relationship. Finally, the ensemble properties of skewed codebooks that are generated by skewing RVQ codebooks with an appropriately designed fixed skewing matrix are studied. Based on an estimate of the loss expression for skewed codebooks, it is established that the optimal skewing matrix is critically dependent on the condition numbers of the effective channel (product of the true channel and the skewing matrix) and the skewing matrix.
no_new_dataset
0.947478
1207.6600
Rama Badrinath
Rama Badrinath, C. E. Veni Madhavan
Diversity in Ranking using Negative Reinforcement
null
null
null
null
cs.IR cs.AI cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we consider the problem of diversity in ranking of the nodes in a graph. The task is to pick the top-k nodes in the graph which are both 'central' and 'diverse'. Many graph-based models of NLP like text summarization, opinion summarization involve the concept of diversity in generating the summaries. We develop a novel method which works in an iterative fashion based on random walks to achieve diversity. Specifically, we use negative reinforcement as a main tool to introduce diversity in the Personalized PageRank framework. Experiments on two benchmark datasets show that our algorithm is competitive to the existing methods.
[ { "version": "v1", "created": "Fri, 27 Jul 2012 17:16:59 GMT" } ]
2015-03-20T00:00:00
[ [ "Badrinath", "Rama", "" ], [ "Madhavan", "C. E. Veni", "" ] ]
TITLE: Diversity in Ranking using Negative Reinforcement ABSTRACT: In this paper, we consider the problem of diversity in ranking of the nodes in a graph. The task is to pick the top-k nodes in the graph which are both 'central' and 'diverse'. Many graph-based models of NLP like text summarization, opinion summarization involve the concept of diversity in generating the summaries. We develop a novel method which works in an iterative fashion based on random walks to achieve diversity. Specifically, we use negative reinforcement as a main tool to introduce diversity in the Personalized PageRank framework. Experiments on two benchmark datasets show that our algorithm is competitive to the existing methods.
no_new_dataset
0.951997
1208.1231
Sebastian Michel
Foteini Alvanaki and Sebastian Michel and Aleksandar Stupar
Building and Maintaining Halls of Fame over a Database
null
null
null
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Halls of Fame are fascinating constructs. They represent the elite of an often very large amount of entities---persons, companies, products, countries etc. Beyond their practical use as static rankings, changes to them are particularly interesting---for decision making processes, as input to common media or novel narrative science applications, or simply consumed by users. In this work, we aim at detecting events that can be characterized by changes to a Hall of Fame ranking in an automated way. We describe how the schema and data of a database can be used to generate Halls of Fame. In this database scenario, by Hall of Fame we refer to distinguished tuples; entities, whose characteristics set them apart from the majority. We define every Hall of Fame as one specific instance of an SQL query, such that a change in its result is considered a noteworthy event. Identified changes (i.e., events) are ranked using lexicographic tradeoffs over event and query properties and presented to users or fed in higher-level applications. We have implemented a full-fledged prototype system that uses either database triggers or a Java based middleware for event identification. We report on an experimental evaluation using a real-world dataset of basketball statistics.
[ { "version": "v1", "created": "Mon, 6 Aug 2012 18:26:17 GMT" } ]
2015-03-20T00:00:00
[ [ "Alvanaki", "Foteini", "" ], [ "Michel", "Sebastian", "" ], [ "Stupar", "Aleksandar", "" ] ]
TITLE: Building and Maintaining Halls of Fame over a Database ABSTRACT: Halls of Fame are fascinating constructs. They represent the elite of an often very large amount of entities---persons, companies, products, countries etc. Beyond their practical use as static rankings, changes to them are particularly interesting---for decision making processes, as input to common media or novel narrative science applications, or simply consumed by users. In this work, we aim at detecting events that can be characterized by changes to a Hall of Fame ranking in an automated way. We describe how the schema and data of a database can be used to generate Halls of Fame. In this database scenario, by Hall of Fame we refer to distinguished tuples; entities, whose characteristics set them apart from the majority. We define every Hall of Fame as one specific instance of an SQL query, such that a change in its result is considered a noteworthy event. Identified changes (i.e., events) are ranked using lexicographic tradeoffs over event and query properties and presented to users or fed in higher-level applications. We have implemented a full-fledged prototype system that uses either database triggers or a Java based middleware for event identification. We report on an experimental evaluation using a real-world dataset of basketball statistics.
no_new_dataset
0.952397
1208.1931
Michele Dallachiesa
Michele Dallachiesa, Besmira Nushi, Katsiaryna Mirylenka, Themis Palpanas
Uncertain Time-Series Similarity: Return to the Basics
VLDB2012
Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 11, pp. 1662-1673 (2012)
null
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In the last years there has been a considerable increase in the availability of continuous sensor measurements in a wide range of application domains, such as Location-Based Services (LBS), medical monitoring systems, manufacturing plants and engineering facilities to ensure efficiency, product quality and safety, hydrologic and geologic observing systems, pollution management, and others. Due to the inherent imprecision of sensor observations, many investigations have recently turned into querying, mining and storing uncertain data. Uncertainty can also be due to data aggregation, privacy-preserving transforms, and error-prone mining algorithms. In this study, we survey the techniques that have been proposed specifically for modeling and processing uncertain time series, an important model for temporal data. We provide an analytical evaluation of the alternatives that have been proposed in the literature, highlighting the advantages and disadvantages of each approach, and further compare these alternatives with two additional techniques that were carefully studied before. We conduct an extensive experimental evaluation with 17 real datasets, and discuss some surprising results, which suggest that a fruitful research direction is to take into account the temporal correlations in the time series. Based on our evaluations, we also provide guidelines useful for the practitioners in the field.
[ { "version": "v1", "created": "Thu, 9 Aug 2012 14:52:01 GMT" } ]
2015-03-20T00:00:00
[ [ "Dallachiesa", "Michele", "" ], [ "Nushi", "Besmira", "" ], [ "Mirylenka", "Katsiaryna", "" ], [ "Palpanas", "Themis", "" ] ]
TITLE: Uncertain Time-Series Similarity: Return to the Basics ABSTRACT: In the last years there has been a considerable increase in the availability of continuous sensor measurements in a wide range of application domains, such as Location-Based Services (LBS), medical monitoring systems, manufacturing plants and engineering facilities to ensure efficiency, product quality and safety, hydrologic and geologic observing systems, pollution management, and others. Due to the inherent imprecision of sensor observations, many investigations have recently turned into querying, mining and storing uncertain data. Uncertainty can also be due to data aggregation, privacy-preserving transforms, and error-prone mining algorithms. In this study, we survey the techniques that have been proposed specifically for modeling and processing uncertain time series, an important model for temporal data. We provide an analytical evaluation of the alternatives that have been proposed in the literature, highlighting the advantages and disadvantages of each approach, and further compare these alternatives with two additional techniques that were carefully studied before. We conduct an extensive experimental evaluation with 17 real datasets, and discuss some surprising results, which suggest that a fruitful research direction is to take into account the temporal correlations in the time series. Based on our evaluations, we also provide guidelines useful for the practitioners in the field.
no_new_dataset
0.947817