id
large_stringlengths 9
16
| submitter
large_stringlengths 3
64
⌀ | authors
large_stringlengths 5
20.7k
| title
large_stringlengths 5
245
| comments
large_stringlengths 1
482
⌀ | journal-ref
large_stringlengths 4
382
⌀ | doi
large_stringlengths 9
151
⌀ | report-no
large_stringlengths 2
509
⌀ | categories
large_stringlengths 5
78
| license
large_stringclasses 9
values | abstract
large_stringlengths 83
3.55k
| versions
large listlengths 1
21
| update_date
timestamp[ms]date 2007-05-23 00:00:00
2025-04-25 00:00:00
| authors_parsed
large listlengths 1
1.35k
| prompt
large_stringlengths 166
3.64k
| label
stringclasses 2
values | prob
float64 0.5
0.98
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1504.00736 | Liang Du | Liang Du, Yi-Dong Shen | Unsupervised Feature Selection with Adaptive Structure Learning | null | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The problem of feature selection has raised considerable interests in the
past decade. Traditional unsupervised methods select the features which can
faithfully preserve the intrinsic structures of data, where the intrinsic
structures are estimated using all the input features of data. However, the
estimated intrinsic structures are unreliable/inaccurate when the redundant and
noisy features are not removed. Therefore, we face a dilemma here: one need the
true structures of data to identify the informative features, and one need the
informative features to accurately estimate the true structures of data. To
address this, we propose a unified learning framework which performs structure
learning and feature selection simultaneously. The structures are adaptively
learned from the results of feature selection, and the informative features are
reselected to preserve the refined structures of data. By leveraging the
interactions between these two essential tasks, we are able to capture accurate
structures and select more informative features. Experimental results on many
benchmark data sets demonstrate that the proposed method outperforms many state
of the art unsupervised feature selection methods.
| [
{
"version": "v1",
"created": "Fri, 3 Apr 2015 03:21:15 GMT"
}
] | 2015-04-06T00:00:00 | [
[
"Du",
"Liang",
""
],
[
"Shen",
"Yi-Dong",
""
]
] | TITLE: Unsupervised Feature Selection with Adaptive Structure Learning
ABSTRACT: The problem of feature selection has raised considerable interests in the
past decade. Traditional unsupervised methods select the features which can
faithfully preserve the intrinsic structures of data, where the intrinsic
structures are estimated using all the input features of data. However, the
estimated intrinsic structures are unreliable/inaccurate when the redundant and
noisy features are not removed. Therefore, we face a dilemma here: one need the
true structures of data to identify the informative features, and one need the
informative features to accurately estimate the true structures of data. To
address this, we propose a unified learning framework which performs structure
learning and feature selection simultaneously. The structures are adaptively
learned from the results of feature selection, and the informative features are
reselected to preserve the refined structures of data. By leveraging the
interactions between these two essential tasks, we are able to capture accurate
structures and select more informative features. Experimental results on many
benchmark data sets demonstrate that the proposed method outperforms many state
of the art unsupervised feature selection methods.
| no_new_dataset | 0.942242 |
1412.5758 | Zhangyang Wang | Zhangyang Wang, Jianchao Yang, Hailin Jin, Eli Shechtman, Aseem
Agarwala, Jonathan Brandt, Thomas S. Huang | Decomposition-Based Domain Adaptation for Real-World Font Recognition | This paper has been withdrawn by the author due to project concerns | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present a domain adaption framework to address a domain mismatch between
synthetic training and real-world testing data. We demonstrate our method on a
challenging fine-grain classification problem: recognizing a font style from an
image of text. In this task, it is very easy to generate lots of rendered font
examples but very hard to obtain real-world labeled images. This
real-to-synthetic domain gap caused poor generalization to new real data in
previous font recognition methods (Chen et al. (2014)). In this paper, we
introduce a Convolutional Neural Network decomposition approach, leveraging a
large training corpus of synthetic data to obtain effective features for
classification. This is done using an adaptation technique based on a Stacked
Convolutional Auto-Encoder that exploits a large collection of unlabeled
real-world text images combined with synthetic data preprocessed in a specific
way. The proposed DeepFont method achieves an accuracy of higher than 80%
(top-5) on a new large labeled real-world dataset we collected.
| [
{
"version": "v1",
"created": "Thu, 18 Dec 2014 08:51:15 GMT"
},
{
"version": "v2",
"created": "Fri, 19 Dec 2014 02:45:35 GMT"
},
{
"version": "v3",
"created": "Sun, 25 Jan 2015 22:41:40 GMT"
},
{
"version": "v4",
"created": "Wed, 1 Apr 2015 22:02:59 GMT"
}
] | 2015-04-03T00:00:00 | [
[
"Wang",
"Zhangyang",
""
],
[
"Yang",
"Jianchao",
""
],
[
"Jin",
"Hailin",
""
],
[
"Shechtman",
"Eli",
""
],
[
"Agarwala",
"Aseem",
""
],
[
"Brandt",
"Jonathan",
""
],
[
"Huang",
"Thomas S.",
""
]
] | TITLE: Decomposition-Based Domain Adaptation for Real-World Font Recognition
ABSTRACT: We present a domain adaption framework to address a domain mismatch between
synthetic training and real-world testing data. We demonstrate our method on a
challenging fine-grain classification problem: recognizing a font style from an
image of text. In this task, it is very easy to generate lots of rendered font
examples but very hard to obtain real-world labeled images. This
real-to-synthetic domain gap caused poor generalization to new real data in
previous font recognition methods (Chen et al. (2014)). In this paper, we
introduce a Convolutional Neural Network decomposition approach, leveraging a
large training corpus of synthetic data to obtain effective features for
classification. This is done using an adaptation technique based on a Stacked
Convolutional Auto-Encoder that exploits a large collection of unlabeled
real-world text images combined with synthetic data preprocessed in a specific
way. The proposed DeepFont method achieves an accuracy of higher than 80%
(top-5) on a new large labeled real-world dataset we collected.
| new_dataset | 0.950686 |
1502.06306 | Jinseok Kim | Jinseok Kim and Jana Diesner | Distortive Effects of Initial-Based Name Disambiguation on Measurements
of Large-Scale Coauthorship Networks | This is a preprint of an article accepted for publication in Journal
of the Association for Information Science and Technology | null | 10.1002/asi.23489 | null | cs.DL cs.SI physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Scholars have often relied on name initials to resolve name ambiguities in
large-scale coauthorship network research. This approach bears the risk of
incorrectly merging or splitting author identities. The use of initial-based
disambiguation has been justified by the assumption that such errors would not
affect research findings too much. This paper tests this assumption by
analyzing coauthorship networks from five academic fields - biology, computer
science, nanoscience, neuroscience, and physics - and an interdisciplinary
journal, PNAS. Name instances in datasets of this study were disambiguated
based on heuristics gained from previous algorithmic disambiguation solutions.
We use disambiguated data as a proxy of ground-truth to test the performance of
three types of initial-based disambiguation. Our results show that
initial-based disambiguation can misrepresent statistical properties of
coauthorship networks: it deflates the number of unique authors, number of
component, average shortest paths, clustering coefficient, and assortativity,
while it inflates average productivity, density, average coauthor number per
author, and largest component size. Also, on average, more than half of top 10
productive or collaborative authors drop off the lists. Asian names were found
to account for the majority of misidentification by initial-based
disambiguation due to their common surname and given name initials.
| [
{
"version": "v1",
"created": "Mon, 23 Feb 2015 02:56:05 GMT"
}
] | 2015-04-03T00:00:00 | [
[
"Kim",
"Jinseok",
""
],
[
"Diesner",
"Jana",
""
]
] | TITLE: Distortive Effects of Initial-Based Name Disambiguation on Measurements
of Large-Scale Coauthorship Networks
ABSTRACT: Scholars have often relied on name initials to resolve name ambiguities in
large-scale coauthorship network research. This approach bears the risk of
incorrectly merging or splitting author identities. The use of initial-based
disambiguation has been justified by the assumption that such errors would not
affect research findings too much. This paper tests this assumption by
analyzing coauthorship networks from five academic fields - biology, computer
science, nanoscience, neuroscience, and physics - and an interdisciplinary
journal, PNAS. Name instances in datasets of this study were disambiguated
based on heuristics gained from previous algorithmic disambiguation solutions.
We use disambiguated data as a proxy of ground-truth to test the performance of
three types of initial-based disambiguation. Our results show that
initial-based disambiguation can misrepresent statistical properties of
coauthorship networks: it deflates the number of unique authors, number of
component, average shortest paths, clustering coefficient, and assortativity,
while it inflates average productivity, density, average coauthor number per
author, and largest component size. Also, on average, more than half of top 10
productive or collaborative authors drop off the lists. Asian names were found
to account for the majority of misidentification by initial-based
disambiguation due to their common surname and given name initials.
| no_new_dataset | 0.950227 |
1503.09062 | Emilio Coppa | Emilio Coppa, Irene Finocchi | On data skewness, stragglers, and MapReduce progress indicators | null | null | null | null | cs.DC cs.PF cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We tackle the problem of predicting the performance of MapReduce
applications, designing accurate progress indicators that keep programmers
informed on the percentage of completed computation time during the execution
of a job. Through extensive experiments, we show that state-of-the-art progress
indicators (including the one provided by Hadoop) can be seriously harmed by
data skewness, load unbalancing, and straggling tasks. This is mainly due to
their implicit assumption that the running time depends linearly on the input
size. We thus design a novel profile-guided progress indicator, called
NearestFit, that operates without the linear hypothesis assumption and exploits
a careful combination of nearest neighbor regression and statistical curve
fitting techniques. Our theoretical progress model requires fine-grained
profile data, that can be very difficult to manage in practice. To overcome
this issue, we resort to computing accurate approximations for some of the
quantities used in our model through space- and time-efficient data streaming
algorithms. We implemented NearestFit on top of Hadoop 2.6.0. An extensive
empirical assessment over the Amazon EC2 platform on a variety of real-world
benchmarks shows that NearestFit is practical w.r.t. space and time overheads
and that its accuracy is generally very good, even in scenarios where
competitors incur non-negligible errors and wide prediction fluctuations.
Overall, NearestFit significantly improves the current state-of-art on progress
analysis for MapReduce.
| [
{
"version": "v1",
"created": "Tue, 31 Mar 2015 14:29:13 GMT"
},
{
"version": "v2",
"created": "Thu, 2 Apr 2015 15:55:15 GMT"
}
] | 2015-04-03T00:00:00 | [
[
"Coppa",
"Emilio",
""
],
[
"Finocchi",
"Irene",
""
]
] | TITLE: On data skewness, stragglers, and MapReduce progress indicators
ABSTRACT: We tackle the problem of predicting the performance of MapReduce
applications, designing accurate progress indicators that keep programmers
informed on the percentage of completed computation time during the execution
of a job. Through extensive experiments, we show that state-of-the-art progress
indicators (including the one provided by Hadoop) can be seriously harmed by
data skewness, load unbalancing, and straggling tasks. This is mainly due to
their implicit assumption that the running time depends linearly on the input
size. We thus design a novel profile-guided progress indicator, called
NearestFit, that operates without the linear hypothesis assumption and exploits
a careful combination of nearest neighbor regression and statistical curve
fitting techniques. Our theoretical progress model requires fine-grained
profile data, that can be very difficult to manage in practice. To overcome
this issue, we resort to computing accurate approximations for some of the
quantities used in our model through space- and time-efficient data streaming
algorithms. We implemented NearestFit on top of Hadoop 2.6.0. An extensive
empirical assessment over the Amazon EC2 platform on a variety of real-world
benchmarks shows that NearestFit is practical w.r.t. space and time overheads
and that its accuracy is generally very good, even in scenarios where
competitors incur non-negligible errors and wide prediction fluctuations.
Overall, NearestFit significantly improves the current state-of-art on progress
analysis for MapReduce.
| no_new_dataset | 0.94625 |
1504.00430 | Hanyang Peng | Hanyang Peng, Yong Fan | Direct l_(2,p)-Norm Learning for Feature Selection | null | null | null | null | cs.LG cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we propose a novel sparse learning based feature selection
method that directly optimizes a large margin linear classification model
sparsity with l_(2,p)-norm (0 < p < 1)subject to data-fitting constraints,
rather than using the sparsity as a regularization term. To solve the direct
sparsity optimization problem that is non-smooth and non-convex when 0<p<1, we
provide an efficient iterative algorithm with proved convergence by converting
it to a convex and smooth optimization problem at every iteration step. The
proposed algorithm has been evaluated based on publicly available datasets, and
extensive comparison experiments have demonstrated that our algorithm could
achieve feature selection performance competitive to state-of-the-art
algorithms.
| [
{
"version": "v1",
"created": "Thu, 2 Apr 2015 02:16:39 GMT"
}
] | 2015-04-03T00:00:00 | [
[
"Peng",
"Hanyang",
""
],
[
"Fan",
"Yong",
""
]
] | TITLE: Direct l_(2,p)-Norm Learning for Feature Selection
ABSTRACT: In this paper, we propose a novel sparse learning based feature selection
method that directly optimizes a large margin linear classification model
sparsity with l_(2,p)-norm (0 < p < 1)subject to data-fitting constraints,
rather than using the sparsity as a regularization term. To solve the direct
sparsity optimization problem that is non-smooth and non-convex when 0<p<1, we
provide an efficient iterative algorithm with proved convergence by converting
it to a convex and smooth optimization problem at every iteration step. The
proposed algorithm has been evaluated based on publicly available datasets, and
extensive comparison experiments have demonstrated that our algorithm could
achieve feature selection performance competitive to state-of-the-art
algorithms.
| no_new_dataset | 0.949809 |
1504.00545 | Timo Bingmann | Timo Bingmann, Thomas Keh, Peter Sanders | A Bulk-Parallel Priority Queue in External Memory with STXXL | extended version of SEA'15 conference paper | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose the design and an implementation of a bulk-parallel external
memory priority queue to take advantage of both shared-memory parallelism and
high external memory transfer speeds to parallel disks. To achieve higher
performance by decoupling item insertions and extractions, we offer two
parallelization interfaces: one using "bulk" sequences, the other by defining
"limit" items. In the design, we discuss how to parallelize insertions using
multiple heaps, and how to calculate a dynamic prediction sequence to prefetch
blocks and apply parallel multiway merge for extraction. Our experimental
results show that in the selected benchmarks the priority queue reaches 75% of
the full parallel I/O bandwidth of rotational disks and and 65% of SSDs, or the
speed of sorting in external memory when bounded by computation.
| [
{
"version": "v1",
"created": "Thu, 2 Apr 2015 13:23:20 GMT"
}
] | 2015-04-03T00:00:00 | [
[
"Bingmann",
"Timo",
""
],
[
"Keh",
"Thomas",
""
],
[
"Sanders",
"Peter",
""
]
] | TITLE: A Bulk-Parallel Priority Queue in External Memory with STXXL
ABSTRACT: We propose the design and an implementation of a bulk-parallel external
memory priority queue to take advantage of both shared-memory parallelism and
high external memory transfer speeds to parallel disks. To achieve higher
performance by decoupling item insertions and extractions, we offer two
parallelization interfaces: one using "bulk" sequences, the other by defining
"limit" items. In the design, we discuss how to parallelize insertions using
multiple heaps, and how to calculate a dynamic prediction sequence to prefetch
blocks and apply parallel multiway merge for extraction. Our experimental
results show that in the selected benchmarks the priority queue reaches 75% of
the full parallel I/O bandwidth of rotational disks and and 65% of SSDs, or the
speed of sorting in external memory when bounded by computation.
| no_new_dataset | 0.946349 |
1302.5374 | Quan Yuan | Quan Yuan, Zhixin Yang | A Weight-coded Evolutionary Algorithm for the Multidimensional Knapsack
Problem | Submitted to Applied Mathematics and Computation on April 8, 2014 | null | null | null | cs.NE math.OC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A revised weight-coded evolutionary algorithm (RWCEA) is proposed for solving
multidimensional knapsack problems. This RWCEA uses a new decoding method and
incorporates a heuristic method in initialization. Computational results show
that the RWCEA performs better than a weight-coded evolutionary algorithm
proposed by Raidl (1999) and to some existing benchmarks, it can yield better
results than the ones reported in the OR-library.
| [
{
"version": "v1",
"created": "Thu, 21 Feb 2013 18:57:09 GMT"
},
{
"version": "v2",
"created": "Wed, 9 Apr 2014 00:09:36 GMT"
},
{
"version": "v3",
"created": "Sun, 28 Dec 2014 19:40:20 GMT"
},
{
"version": "v4",
"created": "Wed, 1 Apr 2015 05:59:58 GMT"
}
] | 2015-04-02T00:00:00 | [
[
"Yuan",
"Quan",
""
],
[
"Yang",
"Zhixin",
""
]
] | TITLE: A Weight-coded Evolutionary Algorithm for the Multidimensional Knapsack
Problem
ABSTRACT: A revised weight-coded evolutionary algorithm (RWCEA) is proposed for solving
multidimensional knapsack problems. This RWCEA uses a new decoding method and
incorporates a heuristic method in initialization. Computational results show
that the RWCEA performs better than a weight-coded evolutionary algorithm
proposed by Raidl (1999) and to some existing benchmarks, it can yield better
results than the ones reported in the OR-library.
| no_new_dataset | 0.946001 |
1404.0284 | Jack Kelly | Jack Kelly and William Knottenbelt | The UK-DALE dataset, domestic appliance-level electricity demand and
whole-house demand from five UK homes | null | Scientific Data 2 (2015) Article number: 150007 (2015) | 10.1038/sdata.2015.7 | null | cs.OH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Many countries are rolling out smart electricity meters. These measure a
home's total power demand. However, research into consumer behaviour suggests
that consumers are best able to improve their energy efficiency when provided
with itemised, appliance-by-appliance consumption information. Energy
disaggregation is a computational technique for estimating
appliance-by-appliance energy consumption from a whole-house meter signal.
To conduct research on disaggregation algorithms, researchers require data
describing not just the aggregate demand per building but also the `ground
truth' demand of individual appliances. In this context, we present UK-DALE: an
open-access dataset from the UK recording Domestic Appliance-Level Electricity
at a sample rate of 16 kHz for the whole-house and at 1/6 Hz for individual
appliances. This is the first open access UK dataset at this temporal
resolution. We recorded from five houses, one of which was recorded for 655
days, the longest duration we are aware of for any energy dataset at this
sample rate. We also describe the low-cost, open-source, wireless system we
built for collecting our dataset.
| [
{
"version": "v1",
"created": "Tue, 1 Apr 2014 15:49:00 GMT"
},
{
"version": "v2",
"created": "Mon, 12 Jan 2015 14:29:00 GMT"
},
{
"version": "v3",
"created": "Thu, 19 Mar 2015 10:45:57 GMT"
}
] | 2015-04-02T00:00:00 | [
[
"Kelly",
"Jack",
""
],
[
"Knottenbelt",
"William",
""
]
] | TITLE: The UK-DALE dataset, domestic appliance-level electricity demand and
whole-house demand from five UK homes
ABSTRACT: Many countries are rolling out smart electricity meters. These measure a
home's total power demand. However, research into consumer behaviour suggests
that consumers are best able to improve their energy efficiency when provided
with itemised, appliance-by-appliance consumption information. Energy
disaggregation is a computational technique for estimating
appliance-by-appliance energy consumption from a whole-house meter signal.
To conduct research on disaggregation algorithms, researchers require data
describing not just the aggregate demand per building but also the `ground
truth' demand of individual appliances. In this context, we present UK-DALE: an
open-access dataset from the UK recording Domestic Appliance-Level Electricity
at a sample rate of 16 kHz for the whole-house and at 1/6 Hz for individual
appliances. This is the first open access UK dataset at this temporal
resolution. We recorded from five houses, one of which was recorded for 655
days, the longest duration we are aware of for any energy dataset at this
sample rate. We also describe the low-cost, open-source, wireless system we
built for collecting our dataset.
| new_dataset | 0.963643 |
1503.02445 | Muhammad Uzair | Muhammad Uzair, Faisal Shafait, Bernard Ghanem, Ajmal Mian | Representation Learning with Deep Extreme Learning Machines for
Efficient Image Set Classification | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Efficient and accurate joint representation of a collection of images, that
belong to the same class, is a major research challenge for practical image set
classification. Existing methods either make prior assumptions about the data
structure, or perform heavy computations to learn structure from the data
itself. In this paper, we propose an efficient image set representation that
does not make any prior assumptions about the structure of the underlying data.
We learn the non-linear structure of image sets with Deep Extreme Learning
Machines (DELM) that are very efficient and generalize well even on a limited
number of training samples. Extensive experiments on a broad range of public
datasets for image set classification (Honda/UCSD, CMU Mobo, YouTube
Celebrities, Celebrity-1000, ETH-80) show that the proposed algorithm
consistently outperforms state-of-the-art image set classification methods both
in terms of speed and accuracy.
| [
{
"version": "v1",
"created": "Mon, 9 Mar 2015 12:14:42 GMT"
},
{
"version": "v2",
"created": "Mon, 16 Mar 2015 05:29:31 GMT"
},
{
"version": "v3",
"created": "Wed, 1 Apr 2015 10:29:09 GMT"
}
] | 2015-04-02T00:00:00 | [
[
"Uzair",
"Muhammad",
""
],
[
"Shafait",
"Faisal",
""
],
[
"Ghanem",
"Bernard",
""
],
[
"Mian",
"Ajmal",
""
]
] | TITLE: Representation Learning with Deep Extreme Learning Machines for
Efficient Image Set Classification
ABSTRACT: Efficient and accurate joint representation of a collection of images, that
belong to the same class, is a major research challenge for practical image set
classification. Existing methods either make prior assumptions about the data
structure, or perform heavy computations to learn structure from the data
itself. In this paper, we propose an efficient image set representation that
does not make any prior assumptions about the structure of the underlying data.
We learn the non-linear structure of image sets with Deep Extreme Learning
Machines (DELM) that are very efficient and generalize well even on a limited
number of training samples. Extensive experiments on a broad range of public
datasets for image set classification (Honda/UCSD, CMU Mobo, YouTube
Celebrities, Celebrity-1000, ETH-80) show that the proposed algorithm
consistently outperforms state-of-the-art image set classification methods both
in terms of speed and accuracy.
| no_new_dataset | 0.950915 |
1504.00028 | Zhangyang Wang | Zhangyang Wang, Jianchao Yang, Hailin Jin, Eli Shechtman, Aseem
Agarwala, Jonathan Brandt, Thomas S. Huang | Real-World Font Recognition Using Deep Network and Domain Adaptation | null | null | null | null | cs.CV cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We address a challenging fine-grain classification problem: recognizing a
font style from an image of text. In this task, it is very easy to generate
lots of rendered font examples but very hard to obtain real-world labeled
images. This real-to-synthetic domain gap caused poor generalization to new
real data in previous methods (Chen et al. (2014)). In this paper, we refer to
Convolutional Neural Networks, and use an adaptation technique based on a
Stacked Convolutional Auto-Encoder that exploits unlabeled real-world images
combined with synthetic data. The proposed method achieves an accuracy of
higher than 80% (top-5) on a real-world dataset.
| [
{
"version": "v1",
"created": "Tue, 31 Mar 2015 20:30:00 GMT"
}
] | 2015-04-02T00:00:00 | [
[
"Wang",
"Zhangyang",
""
],
[
"Yang",
"Jianchao",
""
],
[
"Jin",
"Hailin",
""
],
[
"Shechtman",
"Eli",
""
],
[
"Agarwala",
"Aseem",
""
],
[
"Brandt",
"Jonathan",
""
],
[
"Huang",
"Thomas S.",
""
]
] | TITLE: Real-World Font Recognition Using Deep Network and Domain Adaptation
ABSTRACT: We address a challenging fine-grain classification problem: recognizing a
font style from an image of text. In this task, it is very easy to generate
lots of rendered font examples but very hard to obtain real-world labeled
images. This real-to-synthetic domain gap caused poor generalization to new
real data in previous methods (Chen et al. (2014)). In this paper, we refer to
Convolutional Neural Networks, and use an adaptation technique based on a
Stacked Convolutional Auto-Encoder that exploits unlabeled real-world images
combined with synthetic data. The proposed method achieves an accuracy of
higher than 80% (top-5) on a real-world dataset.
| no_new_dataset | 0.954774 |
1504.00045 | Yongxin Yang | Zhiyuan Shi, Yongxin Yang, Timothy M. Hospedales and Tao Xiang | Weakly Supervised Learning of Objects, Attributes and their Associations | 14 pages, Accepted to ECCV 2014 | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | When humans describe images they tend to use combinations of nouns and
adjectives, corresponding to objects and their associated attributes
respectively. To generate such a description automatically, one needs to model
objects, attributes and their associations. Conventional methods require strong
annotation of object and attribute locations, making them less scalable. In
this paper, we model object-attribute associations from weakly labelled images,
such as those widely available on media sharing sites (e.g. Flickr), where only
image-level labels (either object or attributes) are given, without their
locations and associations. This is achieved by introducing a novel weakly
supervised non-parametric Bayesian model. Once learned, given a new image, our
model can describe the image, including objects, attributes and their
associations, as well as their locations and segmentation. Extensive
experiments on benchmark datasets demonstrate that our weakly supervised model
performs at par with strongly supervised models on tasks such as image
description and retrieval based on object-attribute associations.
| [
{
"version": "v1",
"created": "Tue, 31 Mar 2015 21:18:18 GMT"
}
] | 2015-04-02T00:00:00 | [
[
"Shi",
"Zhiyuan",
""
],
[
"Yang",
"Yongxin",
""
],
[
"Hospedales",
"Timothy M.",
""
],
[
"Xiang",
"Tao",
""
]
] | TITLE: Weakly Supervised Learning of Objects, Attributes and their Associations
ABSTRACT: When humans describe images they tend to use combinations of nouns and
adjectives, corresponding to objects and their associated attributes
respectively. To generate such a description automatically, one needs to model
objects, attributes and their associations. Conventional methods require strong
annotation of object and attribute locations, making them less scalable. In
this paper, we model object-attribute associations from weakly labelled images,
such as those widely available on media sharing sites (e.g. Flickr), where only
image-level labels (either object or attributes) are given, without their
locations and associations. This is achieved by introducing a novel weakly
supervised non-parametric Bayesian model. Once learned, given a new image, our
model can describe the image, including objects, attributes and their
associations, as well as their locations and segmentation. Extensive
experiments on benchmark datasets demonstrate that our weakly supervised model
performs at par with strongly supervised models on tasks such as image
description and retrieval based on object-attribute associations.
| no_new_dataset | 0.953188 |
1504.00154 | Wenji Li | Zhun Fan, Wenji Li, Xinye Cai, Huibiao Lin, Shuxiang Xie, Erik Goodman | A New Repair Operator for Multi-objective Evolutionary Algorithm in
Constrained Optimization Problems | 8 pages | null | null | null | cs.NE | http://creativecommons.org/licenses/by-nc-sa/3.0/ | In this paper, we design a set of multi-objective constrained optimization
problems (MCOPs) and propose a new repair operator to address them. The
proposed repair operator is used to fix the solutions that violate the box
constraints. More specifically, it employs a reversed correction strategy that
can effectively avoid the population falling into local optimum. In addition,
we integrate the proposed repair operator into two classical multi-objective
evolutionary algorithms MOEA/D and NSGA-II. The proposed repair operator is
compared with other two kinds of commonly used repair operators on benchmark
problems CTPs and MCOPs. The experiment results demonstrate that our proposed
approach is very effective in terms of convergence and diversity.
| [
{
"version": "v1",
"created": "Wed, 1 Apr 2015 09:07:13 GMT"
}
] | 2015-04-02T00:00:00 | [
[
"Fan",
"Zhun",
""
],
[
"Li",
"Wenji",
""
],
[
"Cai",
"Xinye",
""
],
[
"Lin",
"Huibiao",
""
],
[
"Xie",
"Shuxiang",
""
],
[
"Goodman",
"Erik",
""
]
] | TITLE: A New Repair Operator for Multi-objective Evolutionary Algorithm in
Constrained Optimization Problems
ABSTRACT: In this paper, we design a set of multi-objective constrained optimization
problems (MCOPs) and propose a new repair operator to address them. The
proposed repair operator is used to fix the solutions that violate the box
constraints. More specifically, it employs a reversed correction strategy that
can effectively avoid the population falling into local optimum. In addition,
we integrate the proposed repair operator into two classical multi-objective
evolutionary algorithms MOEA/D and NSGA-II. The proposed repair operator is
compared with other two kinds of commonly used repair operators on benchmark
problems CTPs and MCOPs. The experiment results demonstrate that our proposed
approach is very effective in terms of convergence and diversity.
| no_new_dataset | 0.946843 |
1504.00191 | Sanjay Sahay | Rajendra Kumar Roul, Shubham Rohan Asthana, Sanjay Kumar Sahay | Automated Document Indexing via Intelligent Hierarchical Clustering: A
Novel Approach | 6 Pages, 3 Figures. IEEE Xplore, ICHPCA-2014 | null | 10.1109/ICHPCA.2014.7045347 | null | cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | With the rising quantity of textual data available in electronic format, the
need to organize it become a highly challenging task. In the present paper, we
explore a document organization framework that exploits an intelligent
hierarchical clustering algorithm to generate an index over a set of documents.
The framework has been designed to be scalable and accurate even with large
corpora. The advantage of the proposed algorithm lies in the need for minimal
inputs, with much of the hierarchy attributes being decided in an automated
manner using statistical methods. The use of topic modeling in a pre-processing
stage ensures robustness to a range of variations in the input data. For
experimental work 20-Newsgroups dataset has been used. The F- measure of the
proposed approach has been compared with the traditional K-Means and K-Medoids
clustering algorithms. Test results demonstrate the applicability, efficiency
and effectiveness of our proposed approach. After extensive experimentation, we
conclude that the framework shows promise for further research and specialized
commercial applications.
| [
{
"version": "v1",
"created": "Wed, 1 Apr 2015 12:08:36 GMT"
}
] | 2015-04-02T00:00:00 | [
[
"Roul",
"Rajendra Kumar",
""
],
[
"Asthana",
"Shubham Rohan",
""
],
[
"Sahay",
"Sanjay Kumar",
""
]
] | TITLE: Automated Document Indexing via Intelligent Hierarchical Clustering: A
Novel Approach
ABSTRACT: With the rising quantity of textual data available in electronic format, the
need to organize it become a highly challenging task. In the present paper, we
explore a document organization framework that exploits an intelligent
hierarchical clustering algorithm to generate an index over a set of documents.
The framework has been designed to be scalable and accurate even with large
corpora. The advantage of the proposed algorithm lies in the need for minimal
inputs, with much of the hierarchy attributes being decided in an automated
manner using statistical methods. The use of topic modeling in a pre-processing
stage ensures robustness to a range of variations in the input data. For
experimental work 20-Newsgroups dataset has been used. The F- measure of the
proposed approach has been compared with the traditional K-Means and K-Medoids
clustering algorithms. Test results demonstrate the applicability, efficiency
and effectiveness of our proposed approach. After extensive experimentation, we
conclude that the framework shows promise for further research and specialized
commercial applications.
| no_new_dataset | 0.949435 |
1504.00331 | Eldon Carman Jr | E. Preston Carman Jr. (1), Till Westmann (2), Vinayak R. Borkar (3),
Michael J. Carey (3) and Vassilis J. Tsotras (1) ((1) UC Riverside, (2)
Oracle Labs, (3) UC Irvine) | Apache VXQuery: A Scalable XQuery Implementation | null | null | null | null | cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The wide use of XML for document management and data exchange has created the
need to query large repositories of XML data. To efficiently query such large
data collections and take advantage of parallelism, we have implemented Apache
VXQuery, an open-source scalable XQuery processor. The system builds upon two
other open-source frameworks -- Hyracks, a parallel execution engine, and
Algebricks, a language agnostic compiler toolbox. Apache VXQuery extends these
two frameworks and provides an implementation of the XQuery specifics (data
model, data-model dependent functions and optimizations, and a parser). We
describe the architecture of Apache VXQuery, its integration with Hyracks and
Algebricks, and the XQuery optimization rules applied to the query plan to
improve path expression efficiency and to enable query parallelism. An
experimental evaluation using a real 500GB dataset with various selection,
aggregation and join XML queries shows that Apache VXQuery performs well both
in terms of scale-up and speed-up. Our experiments show that it is about 3x
faster than Saxon (an open-source and commercial XQuery processor) on a 4-core,
single node implementation, and around 2.5x faster than Apache MRQL (a
MapReduce-based parallel query processor) on an eight (4-core) node cluster.
| [
{
"version": "v1",
"created": "Wed, 1 Apr 2015 18:27:23 GMT"
}
] | 2015-04-02T00:00:00 | [
[
"Carman",
"E. Preston",
"Jr."
],
[
"Westmann",
"Till",
""
],
[
"Borkar",
"Vinayak R.",
""
],
[
"Carey",
"Michael J.",
""
],
[
"Tsotras",
"Vassilis J.",
""
]
] | TITLE: Apache VXQuery: A Scalable XQuery Implementation
ABSTRACT: The wide use of XML for document management and data exchange has created the
need to query large repositories of XML data. To efficiently query such large
data collections and take advantage of parallelism, we have implemented Apache
VXQuery, an open-source scalable XQuery processor. The system builds upon two
other open-source frameworks -- Hyracks, a parallel execution engine, and
Algebricks, a language agnostic compiler toolbox. Apache VXQuery extends these
two frameworks and provides an implementation of the XQuery specifics (data
model, data-model dependent functions and optimizations, and a parser). We
describe the architecture of Apache VXQuery, its integration with Hyracks and
Algebricks, and the XQuery optimization rules applied to the query plan to
improve path expression efficiency and to enable query parallelism. An
experimental evaluation using a real 500GB dataset with various selection,
aggregation and join XML queries shows that Apache VXQuery performs well both
in terms of scale-up and speed-up. Our experiments show that it is about 3x
faster than Saxon (an open-source and commercial XQuery processor) on a 4-core,
single node implementation, and around 2.5x faster than Apache MRQL (a
MapReduce-based parallel query processor) on an eight (4-core) node cluster.
| no_new_dataset | 0.941761 |
1306.6802 | Aris Kosmopoulos | Aris Kosmopoulos, Ioannis Partalas, Eric Gaussier, Georgios Paliouras,
Ion Androutsopoulos | Evaluation Measures for Hierarchical Classification: a unified view and
novel approaches | Submitted to journal | null | 10.1007/s10618-014-0382-x | null | cs.AI cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Hierarchical classification addresses the problem of classifying items into a
hierarchy of classes. An important issue in hierarchical classification is the
evaluation of different classification algorithms, which is complicated by the
hierarchical relations among the classes. Several evaluation measures have been
proposed for hierarchical classification using the hierarchy in different ways.
This paper studies the problem of evaluation in hierarchical classification by
analyzing and abstracting the key components of the existing performance
measures. It also proposes two alternative generic views of hierarchical
evaluation and introduces two corresponding novel measures. The proposed
measures, along with the state-of-the art ones, are empirically tested on three
large datasets from the domain of text classification. The empirical results
illustrate the undesirable behavior of existing approaches and how the proposed
methods overcome most of these methods across a range of cases.
| [
{
"version": "v1",
"created": "Fri, 28 Jun 2013 11:49:53 GMT"
},
{
"version": "v2",
"created": "Mon, 1 Jul 2013 17:33:58 GMT"
}
] | 2015-04-01T00:00:00 | [
[
"Kosmopoulos",
"Aris",
""
],
[
"Partalas",
"Ioannis",
""
],
[
"Gaussier",
"Eric",
""
],
[
"Paliouras",
"Georgios",
""
],
[
"Androutsopoulos",
"Ion",
""
]
] | TITLE: Evaluation Measures for Hierarchical Classification: a unified view and
novel approaches
ABSTRACT: Hierarchical classification addresses the problem of classifying items into a
hierarchy of classes. An important issue in hierarchical classification is the
evaluation of different classification algorithms, which is complicated by the
hierarchical relations among the classes. Several evaluation measures have been
proposed for hierarchical classification using the hierarchy in different ways.
This paper studies the problem of evaluation in hierarchical classification by
analyzing and abstracting the key components of the existing performance
measures. It also proposes two alternative generic views of hierarchical
evaluation and introduces two corresponding novel measures. The proposed
measures, along with the state-of-the art ones, are empirically tested on three
large datasets from the domain of text classification. The empirical results
illustrate the undesirable behavior of existing approaches and how the proposed
methods overcome most of these methods across a range of cases.
| no_new_dataset | 0.947624 |
1503.02725 | Abhishek Sharma | Abhishek Sharma and Oncel Tuzel and David W. Jacobs | Deep Hierarchical Parsing for Semantic Segmentation | IEEE CVPR 2015 | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper proposes a learning-based approach to scene parsing inspired by
the deep Recursive Context Propagation Network (RCPN). RCPN is a deep
feed-forward neural network that utilizes the contextual information from the
entire image, through bottom-up followed by top-down context propagation via
random binary parse trees. This improves the feature representation of every
super-pixel in the image for better classification into semantic categories. We
analyze RCPN and propose two novel contributions to further improve the model.
We first analyze the learning of RCPN parameters and discover the presence of
bypass error paths in the computation graph of RCPN that can hinder contextual
propagation. We propose to tackle this problem by including the classification
loss of the internal nodes of the random parse trees in the original RCPN loss
function. Secondly, we use an MRF on the parse tree nodes to model the
hierarchical dependency present in the output. Both modifications provide
performance boosts over the original RCPN and the new system achieves
state-of-the-art performance on Stanford Background, SIFT-Flow and Daimler
urban datasets.
| [
{
"version": "v1",
"created": "Mon, 9 Mar 2015 23:05:26 GMT"
},
{
"version": "v2",
"created": "Mon, 30 Mar 2015 20:03:01 GMT"
}
] | 2015-04-01T00:00:00 | [
[
"Sharma",
"Abhishek",
""
],
[
"Tuzel",
"Oncel",
""
],
[
"Jacobs",
"David W.",
""
]
] | TITLE: Deep Hierarchical Parsing for Semantic Segmentation
ABSTRACT: This paper proposes a learning-based approach to scene parsing inspired by
the deep Recursive Context Propagation Network (RCPN). RCPN is a deep
feed-forward neural network that utilizes the contextual information from the
entire image, through bottom-up followed by top-down context propagation via
random binary parse trees. This improves the feature representation of every
super-pixel in the image for better classification into semantic categories. We
analyze RCPN and propose two novel contributions to further improve the model.
We first analyze the learning of RCPN parameters and discover the presence of
bypass error paths in the computation graph of RCPN that can hinder contextual
propagation. We propose to tackle this problem by including the classification
loss of the internal nodes of the random parse trees in the original RCPN loss
function. Secondly, we use an MRF on the parse tree nodes to model the
hierarchical dependency present in the output. Both modifications provide
performance boosts over the original RCPN and the new system achieves
state-of-the-art performance on Stanford Background, SIFT-Flow and Daimler
urban datasets.
| no_new_dataset | 0.948489 |
1503.08843 | Peng Sun | Peng Sun, James K. Min, Guanglei Xiong | Globally Tuned Cascade Pose Regression via Back Propagation with
Application in 2D Face Pose Estimation and Heart Segmentation in 3D CT Images | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Recently, a successful pose estimation algorithm, called Cascade Pose
Regression (CPR), was proposed in the literature. Trained over Pose Index
Feature, CPR is a regressor ensemble that is similar to Boosting. In this paper
we show how CPR can be represented as a Neural Network. Specifically, we adopt
a Graph Transformer Network (GTN) representation and accordingly train CPR with
Back Propagation (BP) that permits globally tuning. In contrast, previous CPR
literature only took a layer wise training without any post fine tuning. We
empirically show that global training with BP outperforms layer-wise
(pre-)training. Our CPR-GTN adopts a Multi Layer Percetron as the regressor,
which utilized sparse connection to learn local image feature representation.
We tested the proposed CPR-GTN on 2D face pose estimation problem as in
previous CPR literature. Besides, we also investigated the possibility of
extending CPR-GTN to 3D pose estimation by doing experiments using 3D Computed
Tomography dataset for heart segmentation.
| [
{
"version": "v1",
"created": "Mon, 30 Mar 2015 20:17:23 GMT"
}
] | 2015-04-01T00:00:00 | [
[
"Sun",
"Peng",
""
],
[
"Min",
"James K.",
""
],
[
"Xiong",
"Guanglei",
""
]
] | TITLE: Globally Tuned Cascade Pose Regression via Back Propagation with
Application in 2D Face Pose Estimation and Heart Segmentation in 3D CT Images
ABSTRACT: Recently, a successful pose estimation algorithm, called Cascade Pose
Regression (CPR), was proposed in the literature. Trained over Pose Index
Feature, CPR is a regressor ensemble that is similar to Boosting. In this paper
we show how CPR can be represented as a Neural Network. Specifically, we adopt
a Graph Transformer Network (GTN) representation and accordingly train CPR with
Back Propagation (BP) that permits globally tuning. In contrast, previous CPR
literature only took a layer wise training without any post fine tuning. We
empirically show that global training with BP outperforms layer-wise
(pre-)training. Our CPR-GTN adopts a Multi Layer Percetron as the regressor,
which utilized sparse connection to learn local image feature representation.
We tested the proposed CPR-GTN on 2D face pose estimation problem as in
previous CPR literature. Besides, we also investigated the possibility of
extending CPR-GTN to 3D pose estimation by doing experiments using 3D Computed
Tomography dataset for heart segmentation.
| no_new_dataset | 0.947624 |
1503.08853 | Ali Borji | Ali Borji and James Tanner | Reconciling saliency and object center-bias hypotheses in explaining
free-viewing fixations | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Predicting where people look in natural scenes has attracted a lot of
interest in computer vision and computational neuroscience over the past two
decades. Two seemingly contrasting categories of cues have been proposed to
influence where people look: \textit{low-level image saliency} and
\textit{high-level semantic information}. Our first contribution is to take a
detailed look at these cues to confirm the hypothesis proposed by
Henderson~\cite{henderson1993eye} and Nuthmann \&
Henderson~\cite{nuthmann2010object} that observers tend to look at the center
of objects. We analyzed fixation data for scene free-viewing over 17 observers
on 60 fully annotated images with various types of objects. Images contained
different types of scenes, such as natural scenes, line drawings, and 3D
rendered scenes. Our second contribution is to propose a simple combined model
of low-level saliency and object center-bias that outperforms each individual
component significantly over our data, as well as on the OSIE dataset by Xu et
al.~\cite{xu2014predicting}. The results reconcile saliency with object
center-bias hypotheses and highlight that both types of cues are important in
guiding fixations. Our work opens new directions to understand strategies that
humans use in observing scenes and objects, and demonstrates the construction
of combined models of low-level saliency and high-level object-based
information.
| [
{
"version": "v1",
"created": "Mon, 30 Mar 2015 21:07:53 GMT"
}
] | 2015-04-01T00:00:00 | [
[
"Borji",
"Ali",
""
],
[
"Tanner",
"James",
""
]
] | TITLE: Reconciling saliency and object center-bias hypotheses in explaining
free-viewing fixations
ABSTRACT: Predicting where people look in natural scenes has attracted a lot of
interest in computer vision and computational neuroscience over the past two
decades. Two seemingly contrasting categories of cues have been proposed to
influence where people look: \textit{low-level image saliency} and
\textit{high-level semantic information}. Our first contribution is to take a
detailed look at these cues to confirm the hypothesis proposed by
Henderson~\cite{henderson1993eye} and Nuthmann \&
Henderson~\cite{nuthmann2010object} that observers tend to look at the center
of objects. We analyzed fixation data for scene free-viewing over 17 observers
on 60 fully annotated images with various types of objects. Images contained
different types of scenes, such as natural scenes, line drawings, and 3D
rendered scenes. Our second contribution is to propose a simple combined model
of low-level saliency and object center-bias that outperforms each individual
component significantly over our data, as well as on the OSIE dataset by Xu et
al.~\cite{xu2014predicting}. The results reconcile saliency with object
center-bias hypotheses and highlight that both types of cues are important in
guiding fixations. Our work opens new directions to understand strategies that
humans use in observing scenes and objects, and demonstrates the construction
of combined models of low-level saliency and high-level object-based
information.
| no_new_dataset | 0.953579 |
1503.08873 | Paul Mineiro | Paul Mineiro and Nikos Karampatziakis | Fast Label Embeddings for Extremely Large Output Spaces | Accepted as a workshop contribution at ICLR 2015 | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Many modern multiclass and multilabel problems are characterized by
increasingly large output spaces. For these problems, label embeddings have
been shown to be a useful primitive that can improve computational and
statistical efficiency. In this work we utilize a correspondence between rank
constrained estimation and low dimensional label embeddings that uncovers a
fast label embedding algorithm which works in both the multiclass and
multilabel settings. The result is a randomized algorithm for partial least
squares, whose running time is exponentially faster than naive algorithms. We
demonstrate our techniques on two large-scale public datasets, from the Large
Scale Hierarchical Text Challenge and the Open Directory Project, where we
obtain state of the art results.
| [
{
"version": "v1",
"created": "Mon, 30 Mar 2015 23:29:46 GMT"
}
] | 2015-04-01T00:00:00 | [
[
"Mineiro",
"Paul",
""
],
[
"Karampatziakis",
"Nikos",
""
]
] | TITLE: Fast Label Embeddings for Extremely Large Output Spaces
ABSTRACT: Many modern multiclass and multilabel problems are characterized by
increasingly large output spaces. For these problems, label embeddings have
been shown to be a useful primitive that can improve computational and
statistical efficiency. In this work we utilize a correspondence between rank
constrained estimation and low dimensional label embeddings that uncovers a
fast label embedding algorithm which works in both the multiclass and
multilabel settings. The result is a randomized algorithm for partial least
squares, whose running time is exponentially faster than naive algorithms. We
demonstrate our techniques on two large-scale public datasets, from the Large
Scale Hierarchical Text Challenge and the Open Directory Project, where we
obtain state of the art results.
| no_new_dataset | 0.948537 |
1503.08913 | Chris Winstead | Tasnuva Tithi, Chris Winstead, Gopalakrishnan Sundararajan | Decoding LDPC codes via Noisy Gradient Descent Bit-Flipping with
Re-Decoding | 4 pages, 8 figures | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we consider the performance of the Noisy Gradient Descent Bit
Flipping (NGDBF) algorithm under re-decoding of failed frames. NGDBF is a
recent algorithm that uses a non-deterministic gradient descent search to
decode low-density parity check (LDPC) codes. The proposed re-decode procedure
obtains improved performance because the perturbations are independent at each
re-decoding phase, therefore increasing the likelihood of successful decoding.
We examine the benefits of re-decoding for an LDPC code from the IEEE 802.3an
standard, and find that only a small fraction of re-decoded frames are needed
to obtain significant performance benefits. When re-decoding is used, the NGDBF
performance is very close to a benchmark offset min-sum decoder for the 802.3an
code.
| [
{
"version": "v1",
"created": "Tue, 31 Mar 2015 04:44:32 GMT"
}
] | 2015-04-01T00:00:00 | [
[
"Tithi",
"Tasnuva",
""
],
[
"Winstead",
"Chris",
""
],
[
"Sundararajan",
"Gopalakrishnan",
""
]
] | TITLE: Decoding LDPC codes via Noisy Gradient Descent Bit-Flipping with
Re-Decoding
ABSTRACT: In this paper, we consider the performance of the Noisy Gradient Descent Bit
Flipping (NGDBF) algorithm under re-decoding of failed frames. NGDBF is a
recent algorithm that uses a non-deterministic gradient descent search to
decode low-density parity check (LDPC) codes. The proposed re-decode procedure
obtains improved performance because the perturbations are independent at each
re-decoding phase, therefore increasing the likelihood of successful decoding.
We examine the benefits of re-decoding for an LDPC code from the IEEE 802.3an
standard, and find that only a small fraction of re-decoded frames are needed
to obtain significant performance benefits. When re-decoding is used, the NGDBF
performance is very close to a benchmark offset min-sum decoder for the 802.3an
code.
| no_new_dataset | 0.951142 |
1407.7556 | Lorenzo Livi | Lorenzo Livi, Alireza Sadeghian, Witold Pedrycz | Entropic one-class classifiers | To appear in IEEE-TNNLS | null | 10.1109/TNNLS.2015.2418332 | null | cs.CV cs.LG stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The one-class classification problem is a well-known research endeavor in
pattern recognition. The problem is also known under different names, such as
outlier and novelty/anomaly detection. The core of the problem consists in
modeling and recognizing patterns belonging only to a so-called target class.
All other patterns are termed non-target, and therefore they should be
recognized as such. In this paper, we propose a novel one-class classification
system that is based on an interplay of different techniques. Primarily, we
follow a dissimilarity representation based approach; we embed the input data
into the dissimilarity space by means of an appropriate parametric
dissimilarity measure. This step allows us to process virtually any type of
data. The dissimilarity vectors are then represented through a weighted
Euclidean graphs, which we use to (i) determine the entropy of the data
distribution in the dissimilarity space, and at the same time (ii) derive
effective decision regions that are modeled as clusters of vertices. Since the
dissimilarity measure for the input data is parametric, we optimize its
parameters by means of a global optimization scheme, which considers both
mesoscopic and structural characteristics of the data represented through the
graphs. The proposed one-class classifier is designed to provide both hard
(Boolean) and soft decisions about the recognition of test patterns, allowing
an accurate description of the classification process. We evaluate the
performance of the system on different benchmarking datasets, containing either
feature-based or structured patterns. Experimental results demonstrate the
effectiveness of the proposed technique.
| [
{
"version": "v1",
"created": "Mon, 28 Jul 2014 20:26:24 GMT"
},
{
"version": "v2",
"created": "Tue, 16 Dec 2014 20:46:21 GMT"
},
{
"version": "v3",
"created": "Sun, 11 Jan 2015 16:27:23 GMT"
}
] | 2015-03-31T00:00:00 | [
[
"Livi",
"Lorenzo",
""
],
[
"Sadeghian",
"Alireza",
""
],
[
"Pedrycz",
"Witold",
""
]
] | TITLE: Entropic one-class classifiers
ABSTRACT: The one-class classification problem is a well-known research endeavor in
pattern recognition. The problem is also known under different names, such as
outlier and novelty/anomaly detection. The core of the problem consists in
modeling and recognizing patterns belonging only to a so-called target class.
All other patterns are termed non-target, and therefore they should be
recognized as such. In this paper, we propose a novel one-class classification
system that is based on an interplay of different techniques. Primarily, we
follow a dissimilarity representation based approach; we embed the input data
into the dissimilarity space by means of an appropriate parametric
dissimilarity measure. This step allows us to process virtually any type of
data. The dissimilarity vectors are then represented through a weighted
Euclidean graphs, which we use to (i) determine the entropy of the data
distribution in the dissimilarity space, and at the same time (ii) derive
effective decision regions that are modeled as clusters of vertices. Since the
dissimilarity measure for the input data is parametric, we optimize its
parameters by means of a global optimization scheme, which considers both
mesoscopic and structural characteristics of the data represented through the
graphs. The proposed one-class classifier is designed to provide both hard
(Boolean) and soft decisions about the recognition of test patterns, allowing
an accurate description of the classification process. We evaluate the
performance of the system on different benchmarking datasets, containing either
feature-based or structured patterns. Experimental results demonstrate the
effectiveness of the proposed technique.
| no_new_dataset | 0.946498 |
1410.0760 | Chih-Hang Wang | Chih-Hang Wang, De-Nian Yang, Wen-Tsuen Chen | Scheduling for Multi-Camera Surveillance in LTE Networks | 9 pages, 10 figures | null | null | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Wireless surveillance in cellular networks has become increasingly important,
while commercial LTE surveillance cameras are also available nowadays.
Nevertheless, most scheduling algorithms in the literature are throughput,
fairness, or profit-based approaches, which are not suitable for wireless
surveillance. In this paper, therefore, we explore the resource allocation
problem for a multi-camera surveillance system in 3GPP Long Term Evolution
(LTE) uplink (UL) networks. We minimize the number of allocated resource blocks
(RBs) while guaranteeing the coverage requirement for surveillance systems in
LTE UL networks. Specifically, we formulate the Camera Set Resource Allocation
Problem (CSRAP) and prove that the problem is NP-Hard. We then propose an
Integer Linear Programming formulation for general cases to find the optimal
solution. Moreover, we present a baseline algorithm and devise an approximation
algorithm to solve the problem. Simulation results based on a real surveillance
map and synthetic datasets manifest that the number of allocated RBs can be
effectively reduced compared to the existing approach for LTE networks.
| [
{
"version": "v1",
"created": "Fri, 3 Oct 2014 06:17:20 GMT"
},
{
"version": "v2",
"created": "Mon, 6 Oct 2014 08:33:46 GMT"
},
{
"version": "v3",
"created": "Mon, 27 Oct 2014 04:24:11 GMT"
},
{
"version": "v4",
"created": "Sat, 28 Mar 2015 13:58:08 GMT"
}
] | 2015-03-31T00:00:00 | [
[
"Wang",
"Chih-Hang",
""
],
[
"Yang",
"De-Nian",
""
],
[
"Chen",
"Wen-Tsuen",
""
]
] | TITLE: Scheduling for Multi-Camera Surveillance in LTE Networks
ABSTRACT: Wireless surveillance in cellular networks has become increasingly important,
while commercial LTE surveillance cameras are also available nowadays.
Nevertheless, most scheduling algorithms in the literature are throughput,
fairness, or profit-based approaches, which are not suitable for wireless
surveillance. In this paper, therefore, we explore the resource allocation
problem for a multi-camera surveillance system in 3GPP Long Term Evolution
(LTE) uplink (UL) networks. We minimize the number of allocated resource blocks
(RBs) while guaranteeing the coverage requirement for surveillance systems in
LTE UL networks. Specifically, we formulate the Camera Set Resource Allocation
Problem (CSRAP) and prove that the problem is NP-Hard. We then propose an
Integer Linear Programming formulation for general cases to find the optimal
solution. Moreover, we present a baseline algorithm and devise an approximation
algorithm to solve the problem. Simulation results based on a real surveillance
map and synthetic datasets manifest that the number of allocated RBs can be
effectively reduced compared to the existing approach for LTE networks.
| no_new_dataset | 0.952926 |
1410.4985 | Danesh Tarapore | Danesh Tarapore and Jean-Baptiste Mouret | Evolvability signatures of generative encodings: beyond standard
performance benchmarks | 24 pages with 12 figures in the main text, and 4 supplementary
figures. Accepted at Information Sciences journal (in press). Supplemental
videos are available online at, see http://goo.gl/uyY1RX | null | null | null | cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Evolutionary robotics is a promising approach to autonomously synthesize
machines with abilities that resemble those of animals, but the field suffers
from a lack of strong foundations. In particular, evolutionary systems are
currently assessed solely by the fitness score their evolved artifacts can
achieve for a specific task, whereas such fitness-based comparisons provide
limited insights about how the same system would evaluate on different tasks,
and its adaptive capabilities to respond to changes in fitness (e.g., from
damages to the machine, or in new situations). To counter these limitations, we
introduce the concept of "evolvability signatures", which picture the
post-mutation statistical distribution of both behavior diversity (how
different are the robot behaviors after a mutation?) and fitness values (how
different is the fitness after a mutation?). We tested the relevance of this
concept by evolving controllers for hexapod robot locomotion using five
different genotype-to-phenotype mappings (direct encoding, generative encoding
of open-loop and closed-loop central pattern generators, generative encoding of
neural networks, and single-unit pattern generators (SUPG)). We observed a
predictive relationship between the evolvability signature of each encoding and
the number of generations required by hexapods to adapt from incurred damages.
Our study also reveals that, across the five investigated encodings, the SUPG
scheme achieved the best evolvability signature, and was always foremost in
recovering an effective gait following robot damages. Overall, our evolvability
signatures neatly complement existing task-performance benchmarks, and pave the
way for stronger foundations for research in evolutionary robotics.
| [
{
"version": "v1",
"created": "Sat, 18 Oct 2014 18:16:26 GMT"
},
{
"version": "v2",
"created": "Sat, 28 Mar 2015 13:16:20 GMT"
}
] | 2015-03-31T00:00:00 | [
[
"Tarapore",
"Danesh",
""
],
[
"Mouret",
"Jean-Baptiste",
""
]
] | TITLE: Evolvability signatures of generative encodings: beyond standard
performance benchmarks
ABSTRACT: Evolutionary robotics is a promising approach to autonomously synthesize
machines with abilities that resemble those of animals, but the field suffers
from a lack of strong foundations. In particular, evolutionary systems are
currently assessed solely by the fitness score their evolved artifacts can
achieve for a specific task, whereas such fitness-based comparisons provide
limited insights about how the same system would evaluate on different tasks,
and its adaptive capabilities to respond to changes in fitness (e.g., from
damages to the machine, or in new situations). To counter these limitations, we
introduce the concept of "evolvability signatures", which picture the
post-mutation statistical distribution of both behavior diversity (how
different are the robot behaviors after a mutation?) and fitness values (how
different is the fitness after a mutation?). We tested the relevance of this
concept by evolving controllers for hexapod robot locomotion using five
different genotype-to-phenotype mappings (direct encoding, generative encoding
of open-loop and closed-loop central pattern generators, generative encoding of
neural networks, and single-unit pattern generators (SUPG)). We observed a
predictive relationship between the evolvability signature of each encoding and
the number of generations required by hexapods to adapt from incurred damages.
Our study also reveals that, across the five investigated encodings, the SUPG
scheme achieved the best evolvability signature, and was always foremost in
recovering an effective gait following robot damages. Overall, our evolvability
signatures neatly complement existing task-performance benchmarks, and pave the
way for stronger foundations for research in evolutionary robotics.
| no_new_dataset | 0.945349 |
1411.6400 | Min Wei | Min Wei, Tommy W. S. Chow, Rosa H. M. Chan | Mutual Information-Based Unsupervised Feature Transformation for
Heterogeneous Feature Subset Selection | This paper has been withdrawn by the author due to the number of
datasets and classifiers are not sufficient to support the claim. Need more
simulation work | null | null | null | stat.ML cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Conventional mutual information (MI) based feature selection (FS) methods are
unable to handle heterogeneous feature subset selection properly because of
data format differences or estimation methods of MI between feature subset and
class label. A way to solve this problem is feature transformation (FT). In
this study, a novel unsupervised feature transformation (UFT) which can
transform non-numerical features into numerical features is developed and
tested. The UFT process is MI-based and independent of class label. MI-based FS
algorithms, such as Parzen window feature selector (PWFS), minimum redundancy
maximum relevance feature selection (mRMR), and normalized MI feature selection
(NMIFS), can all adopt UFT for pre-processing of non-numerical features. Unlike
traditional FT methods, the proposed UFT is unbiased while PWFS is utilized to
its full advantage. Simulations and analyses of large-scale datasets showed
that feature subset selected by the integrated method, UFT-PWFS, outperformed
other FT-FS integrated methods in classification accuracy.
| [
{
"version": "v1",
"created": "Mon, 24 Nov 2014 10:15:17 GMT"
},
{
"version": "v2",
"created": "Sun, 29 Mar 2015 05:32:50 GMT"
}
] | 2015-03-31T00:00:00 | [
[
"Wei",
"Min",
""
],
[
"Chow",
"Tommy W. S.",
""
],
[
"Chan",
"Rosa H. M.",
""
]
] | TITLE: Mutual Information-Based Unsupervised Feature Transformation for
Heterogeneous Feature Subset Selection
ABSTRACT: Conventional mutual information (MI) based feature selection (FS) methods are
unable to handle heterogeneous feature subset selection properly because of
data format differences or estimation methods of MI between feature subset and
class label. A way to solve this problem is feature transformation (FT). In
this study, a novel unsupervised feature transformation (UFT) which can
transform non-numerical features into numerical features is developed and
tested. The UFT process is MI-based and independent of class label. MI-based FS
algorithms, such as Parzen window feature selector (PWFS), minimum redundancy
maximum relevance feature selection (mRMR), and normalized MI feature selection
(NMIFS), can all adopt UFT for pre-processing of non-numerical features. Unlike
traditional FT methods, the proposed UFT is unbiased while PWFS is utilized to
its full advantage. Simulations and analyses of large-scale datasets showed
that feature subset selected by the integrated method, UFT-PWFS, outperformed
other FT-FS integrated methods in classification accuracy.
| no_new_dataset | 0.948775 |
1412.6286 | Wendelin B\"ohmer | Wendelin B\"ohmer and Klaus Obermayer | Regression with Linear Factored Functions | Under review as conference paper at ECML/PKDD 2015 | null | null | null | cs.LG stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Many applications that use empirically estimated functions face a curse of
dimensionality, because the integrals over most function classes must be
approximated by sampling. This paper introduces a novel regression-algorithm
that learns linear factored functions (LFF). This class of functions has
structural properties that allow to analytically solve certain integrals and to
calculate point-wise products. Applications like belief propagation and
reinforcement learning can exploit these properties to break the curse and
speed up computation. We derive a regularized greedy optimization scheme, that
learns factored basis functions during training. The novel regression algorithm
performs competitively to Gaussian processes on benchmark tasks, and the
learned LFF functions are with 4-9 factored basis functions on average very
compact.
| [
{
"version": "v1",
"created": "Fri, 19 Dec 2014 11:01:21 GMT"
},
{
"version": "v2",
"created": "Fri, 27 Feb 2015 14:53:35 GMT"
},
{
"version": "v3",
"created": "Mon, 30 Mar 2015 15:14:20 GMT"
}
] | 2015-03-31T00:00:00 | [
[
"Böhmer",
"Wendelin",
""
],
[
"Obermayer",
"Klaus",
""
]
] | TITLE: Regression with Linear Factored Functions
ABSTRACT: Many applications that use empirically estimated functions face a curse of
dimensionality, because the integrals over most function classes must be
approximated by sampling. This paper introduces a novel regression-algorithm
that learns linear factored functions (LFF). This class of functions has
structural properties that allow to analytically solve certain integrals and to
calculate point-wise products. Applications like belief propagation and
reinforcement learning can exploit these properties to break the curse and
speed up computation. We derive a regularized greedy optimization scheme, that
learns factored basis functions during training. The novel regression algorithm
performs competitively to Gaussian processes on benchmark tasks, and the
learned LFF functions are with 4-9 factored basis functions on average very
compact.
| no_new_dataset | 0.947914 |
1503.01800 | Samira Ebrahimi Kahou | Samira Ebrahimi Kahou, Xavier Bouthillier, Pascal Lamblin, Caglar
Gulcehre, Vincent Michalski, Kishore Konda, S\'ebastien Jean, Pierre
Froumenty, Yann Dauphin, Nicolas Boulanger-Lewandowski, Raul Chandias
Ferrari, Mehdi Mirza, David Warde-Farley, Aaron Courville, Pascal Vincent,
Roland Memisevic, Christopher Pal, Yoshua Bengio | EmoNets: Multimodal deep learning approaches for emotion recognition in
video | null | null | null | null | cs.LG cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The task of the emotion recognition in the wild (EmotiW) Challenge is to
assign one of seven emotions to short video clips extracted from Hollywood
style movies. The videos depict acted-out emotions under realistic conditions
with a large degree of variation in attributes such as pose and illumination,
making it worthwhile to explore approaches which consider combinations of
features from multiple modalities for label assignment. In this paper we
present our approach to learning several specialist models using deep learning
techniques, each focusing on one modality. Among these are a convolutional
neural network, focusing on capturing visual information in detected faces, a
deep belief net focusing on the representation of the audio stream, a K-Means
based "bag-of-mouths" model, which extracts visual features around the mouth
region and a relational autoencoder, which addresses spatio-temporal aspects of
videos. We explore multiple methods for the combination of cues from these
modalities into one common classifier. This achieves a considerably greater
accuracy than predictions from our strongest single-modality classifier. Our
method was the winning submission in the 2013 EmotiW challenge and achieved a
test set accuracy of 47.67% on the 2014 dataset.
| [
{
"version": "v1",
"created": "Thu, 5 Mar 2015 22:03:26 GMT"
},
{
"version": "v2",
"created": "Mon, 30 Mar 2015 00:55:02 GMT"
}
] | 2015-03-31T00:00:00 | [
[
"Kahou",
"Samira Ebrahimi",
""
],
[
"Bouthillier",
"Xavier",
""
],
[
"Lamblin",
"Pascal",
""
],
[
"Gulcehre",
"Caglar",
""
],
[
"Michalski",
"Vincent",
""
],
[
"Konda",
"Kishore",
""
],
[
"Jean",
"Sébastien",
""
],
[
"Froumenty",
"Pierre",
""
],
[
"Dauphin",
"Yann",
""
],
[
"Boulanger-Lewandowski",
"Nicolas",
""
],
[
"Ferrari",
"Raul Chandias",
""
],
[
"Mirza",
"Mehdi",
""
],
[
"Warde-Farley",
"David",
""
],
[
"Courville",
"Aaron",
""
],
[
"Vincent",
"Pascal",
""
],
[
"Memisevic",
"Roland",
""
],
[
"Pal",
"Christopher",
""
],
[
"Bengio",
"Yoshua",
""
]
] | TITLE: EmoNets: Multimodal deep learning approaches for emotion recognition in
video
ABSTRACT: The task of the emotion recognition in the wild (EmotiW) Challenge is to
assign one of seven emotions to short video clips extracted from Hollywood
style movies. The videos depict acted-out emotions under realistic conditions
with a large degree of variation in attributes such as pose and illumination,
making it worthwhile to explore approaches which consider combinations of
features from multiple modalities for label assignment. In this paper we
present our approach to learning several specialist models using deep learning
techniques, each focusing on one modality. Among these are a convolutional
neural network, focusing on capturing visual information in detected faces, a
deep belief net focusing on the representation of the audio stream, a K-Means
based "bag-of-mouths" model, which extracts visual features around the mouth
region and a relational autoencoder, which addresses spatio-temporal aspects of
videos. We explore multiple methods for the combination of cues from these
modalities into one common classifier. This achieves a considerably greater
accuracy than predictions from our strongest single-modality classifier. Our
method was the winning submission in the 2013 EmotiW challenge and achieved a
test set accuracy of 47.67% on the 2014 dataset.
| no_new_dataset | 0.948585 |
1503.08263 | Chunhua Shen | Fayao Liu, Guosheng Lin, Chunhua Shen | CRF Learning with CNN Features for Image Segmentation | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Conditional Random Rields (CRF) have been widely applied in image
segmentations. While most studies rely on hand-crafted features, we here
propose to exploit a pre-trained large convolutional neural network (CNN) to
generate deep features for CRF learning. The deep CNN is trained on the
ImageNet dataset and transferred to image segmentations here for constructing
potentials of superpixels. Then the CRF parameters are learnt using a
structured support vector machine (SSVM). To fully exploit context information
in inference, we construct spatially related co-occurrence pairwise potentials
and incorporate them into the energy function. This prefers labelling of object
pairs that frequently co-occur in a certain spatial layout and at the same time
avoids implausible labellings during the inference. Extensive experiments on
binary and multi-class segmentation benchmarks demonstrate the promise of the
proposed method. We thus provide new baselines for the segmentation performance
on the Weizmann horse, Graz-02, MSRC-21, Stanford Background and PASCAL VOC
2011 datasets.
| [
{
"version": "v1",
"created": "Sat, 28 Mar 2015 04:05:09 GMT"
}
] | 2015-03-31T00:00:00 | [
[
"Liu",
"Fayao",
""
],
[
"Lin",
"Guosheng",
""
],
[
"Shen",
"Chunhua",
""
]
] | TITLE: CRF Learning with CNN Features for Image Segmentation
ABSTRACT: Conditional Random Rields (CRF) have been widely applied in image
segmentations. While most studies rely on hand-crafted features, we here
propose to exploit a pre-trained large convolutional neural network (CNN) to
generate deep features for CRF learning. The deep CNN is trained on the
ImageNet dataset and transferred to image segmentations here for constructing
potentials of superpixels. Then the CRF parameters are learnt using a
structured support vector machine (SSVM). To fully exploit context information
in inference, we construct spatially related co-occurrence pairwise potentials
and incorporate them into the energy function. This prefers labelling of object
pairs that frequently co-occur in a certain spatial layout and at the same time
avoids implausible labellings during the inference. Extensive experiments on
binary and multi-class segmentation benchmarks demonstrate the promise of the
proposed method. We thus provide new baselines for the segmentation performance
on the Weizmann horse, Graz-02, MSRC-21, Stanford Background and PASCAL VOC
2011 datasets.
| no_new_dataset | 0.949059 |
1503.08275 | Rosemarie Velik | Rosemarie Velik, Pascal Nicolay | Energy Management in Storage-Augmented, Grid-Connected Prosumer
Buildings and Neighbourhoods Using a Modified Simulated Annealing
Optimization | Computers & Operations Research, 2015 | null | null | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This article introduces a modified simulated annealing optimization approach
for automatically determining optimal energy management strategies in
grid-connected, storage-augmented, photovoltaics-supplied prosumer buildings
and neighbourhoods based on user-specific goals. For evaluating the modified
simulated annealing optimizer, a number of test scenarios in the field of
energy self-consumption maximization are defined and results are compared to a
gradient descent and a total state space search approach. The benchmarking
against these two reference methods demonstrates that the modified simulated
annealing approach is able to find significantly better solutions than the
gradient descent algorithm - being equal or very close to the global optimum -
with significantly less computational effort and processing time than the total
state space search approach.
| [
{
"version": "v1",
"created": "Sat, 28 Mar 2015 07:16:22 GMT"
}
] | 2015-03-31T00:00:00 | [
[
"Velik",
"Rosemarie",
""
],
[
"Nicolay",
"Pascal",
""
]
] | TITLE: Energy Management in Storage-Augmented, Grid-Connected Prosumer
Buildings and Neighbourhoods Using a Modified Simulated Annealing
Optimization
ABSTRACT: This article introduces a modified simulated annealing optimization approach
for automatically determining optimal energy management strategies in
grid-connected, storage-augmented, photovoltaics-supplied prosumer buildings
and neighbourhoods based on user-specific goals. For evaluating the modified
simulated annealing optimizer, a number of test scenarios in the field of
energy self-consumption maximization are defined and results are compared to a
gradient descent and a total state space search approach. The benchmarking
against these two reference methods demonstrates that the modified simulated
annealing approach is able to find significantly better solutions than the
gradient descent algorithm - being equal or very close to the global optimum -
with significantly less computational effort and processing time than the total
state space search approach.
| no_new_dataset | 0.950411 |
1503.08348 | Ravi Ganti | Ravi Ganti and Rebecca M. Willett | Sparse Linear Regression With Missing Data | 14 pages, 7 figures | null | null | null | stat.ML cs.LG stat.ME | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper proposes a fast and accurate method for sparse regression in the
presence of missing data. The underlying statistical model encapsulates the
low-dimensional structure of the incomplete data matrix and the sparsity of the
regression coefficients, and the proposed algorithm jointly learns the
low-dimensional structure of the data and a linear regressor with sparse
coefficients. The proposed stochastic optimization method, Sparse Linear
Regression with Missing Data (SLRM), performs an alternating minimization
procedure and scales well with the problem size. Large deviation inequalities
shed light on the impact of the various problem-dependent parameters on the
expected squared loss of the learned regressor. Extensive simulations on both
synthetic and real datasets show that SLRM performs better than competing
algorithms in a variety of contexts.
| [
{
"version": "v1",
"created": "Sat, 28 Mar 2015 21:03:32 GMT"
}
] | 2015-03-31T00:00:00 | [
[
"Ganti",
"Ravi",
""
],
[
"Willett",
"Rebecca M.",
""
]
] | TITLE: Sparse Linear Regression With Missing Data
ABSTRACT: This paper proposes a fast and accurate method for sparse regression in the
presence of missing data. The underlying statistical model encapsulates the
low-dimensional structure of the incomplete data matrix and the sparsity of the
regression coefficients, and the proposed algorithm jointly learns the
low-dimensional structure of the data and a linear regressor with sparse
coefficients. The proposed stochastic optimization method, Sparse Linear
Regression with Missing Data (SLRM), performs an alternating minimization
procedure and scales well with the problem size. Large deviation inequalities
shed light on the impact of the various problem-dependent parameters on the
expected squared loss of the learned regressor. Extensive simulations on both
synthetic and real datasets show that SLRM performs better than competing
algorithms in a variety of contexts.
| no_new_dataset | 0.947527 |
1503.08407 | Zimu Yuan | Zimu Yuan, Zhiwei Xu | CIUV: Collaborating Information Against Unreliable Views | null | null | null | null | cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In many real world applications, the information of an object can be obtained
from multiple sources. The sources may provide different point of views based
on their own origin. As a consequence, conflicting pieces of information are
inevitable, which gives rise to a crucial problem: how to find the truth from
these conflicts. Many truth-finding methods have been proposed to resolve
conflicts based on information trustworthy (i.e. more appearance means more
trustworthy) as well as source reliability. However, the factor of men's
involvement, i.e., information may be falsified by men with malicious
intension, is more or less ignored in existing methods. Collaborating the
possible relationship between information's origins and men's participation are
still not studied in research. To deal with this challenge, we propose a method
-- Collaborating Information against Unreliable Views (CIUV) --- in dealing
with men's involvement for finding the truth. CIUV contains 3 stages for
interactively mitigating the impact of unreliable views, and calculate the
truth by weighting possible biases between sources. We theoretically analyze
the error bound of CIUV, and conduct intensive experiments on real dataset for
evaluation. The experimental results show that CIUV is feasible and has the
smallest error compared with other methods.
| [
{
"version": "v1",
"created": "Sun, 29 Mar 2015 09:30:58 GMT"
}
] | 2015-03-31T00:00:00 | [
[
"Yuan",
"Zimu",
""
],
[
"Xu",
"Zhiwei",
""
]
] | TITLE: CIUV: Collaborating Information Against Unreliable Views
ABSTRACT: In many real world applications, the information of an object can be obtained
from multiple sources. The sources may provide different point of views based
on their own origin. As a consequence, conflicting pieces of information are
inevitable, which gives rise to a crucial problem: how to find the truth from
these conflicts. Many truth-finding methods have been proposed to resolve
conflicts based on information trustworthy (i.e. more appearance means more
trustworthy) as well as source reliability. However, the factor of men's
involvement, i.e., information may be falsified by men with malicious
intension, is more or less ignored in existing methods. Collaborating the
possible relationship between information's origins and men's participation are
still not studied in research. To deal with this challenge, we propose a method
-- Collaborating Information against Unreliable Views (CIUV) --- in dealing
with men's involvement for finding the truth. CIUV contains 3 stages for
interactively mitigating the impact of unreliable views, and calculate the
truth by weighting possible biases between sources. We theoretically analyze
the error bound of CIUV, and conduct intensive experiments on real dataset for
evaluation. The experimental results show that CIUV is feasible and has the
smallest error compared with other methods.
| no_new_dataset | 0.946349 |
1503.08463 | S. K. Sahay | Rajendra Kumar Roul, Saransh Varshneya, Ashu Kalra, Sanjay Kumar Sahay | A Novel Modified Apriori Approach for Web Document Clustering | 11 Pages, 5 Figures | Springer, Smart Innovation Systems and Technologies, Vol. 33,
2015, p. 159-171; Proceedings of the ICCIDM, Dec. 2014 | null | null | cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The traditional apriori algorithm can be used for clustering the web
documents based on the association technique of data mining. But this algorithm
has several limitations due to repeated database scans and its weak association
rule analysis. In modern world of large databases, efficiency of traditional
apriori algorithm would reduce manifolds. In this paper, we proposed a new
modified apriori approach by cutting down the repeated database scans and
improving association analysis of traditional apriori algorithm to cluster the
web documents. Further we improve those clusters by applying Fuzzy C-Means
(FCM), K-Means and Vector Space Model (VSM) techniques separately. For
experimental purpose, we use Classic3 and Classic4 datasets of Cornell
University having more than 10,000 documents and run both traditional apriori
and our modified apriori approach on it. Experimental results show that our
approach outperforms the traditional apriori algorithm in terms of database
scan and improvement on association of analysis. We found out that FCM is
better than K-Means and VSM in terms of F-measure of clusters of different
sizes.
| [
{
"version": "v1",
"created": "Sun, 29 Mar 2015 17:40:18 GMT"
}
] | 2015-03-31T00:00:00 | [
[
"Roul",
"Rajendra Kumar",
""
],
[
"Varshneya",
"Saransh",
""
],
[
"Kalra",
"Ashu",
""
],
[
"Sahay",
"Sanjay Kumar",
""
]
] | TITLE: A Novel Modified Apriori Approach for Web Document Clustering
ABSTRACT: The traditional apriori algorithm can be used for clustering the web
documents based on the association technique of data mining. But this algorithm
has several limitations due to repeated database scans and its weak association
rule analysis. In modern world of large databases, efficiency of traditional
apriori algorithm would reduce manifolds. In this paper, we proposed a new
modified apriori approach by cutting down the repeated database scans and
improving association analysis of traditional apriori algorithm to cluster the
web documents. Further we improve those clusters by applying Fuzzy C-Means
(FCM), K-Means and Vector Space Model (VSM) techniques separately. For
experimental purpose, we use Classic3 and Classic4 datasets of Cornell
University having more than 10,000 documents and run both traditional apriori
and our modified apriori approach on it. Experimental results show that our
approach outperforms the traditional apriori algorithm in terms of database
scan and improvement on association of analysis. We found out that FCM is
better than K-Means and VSM in terms of F-measure of clusters of different
sizes.
| no_new_dataset | 0.948822 |
1503.08482 | Spyros Blanas | Spyros Blanas and Surendra Byna | Towards Exascale Scientific Metadata Management | null | null | null | null | cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Advances in technology and computing hardware are enabling scientists from
all areas of science to produce massive amounts of data using large-scale
simulations or observational facilities. In this era of data deluge, effective
coordination between the data production and the analysis phases hinges on the
availability of metadata that describe the scientific datasets. Existing
workflow engines have been capturing a limited form of metadata to provide
provenance information about the identity and lineage of the data. However,
much of the data produced by simulations, experiments, and analyses still need
to be annotated manually in an ad hoc manner by domain scientists. Systematic
and transparent acquisition of rich metadata becomes a crucial prerequisite to
sustain and accelerate the pace of scientific innovation. Yet, ubiquitous and
domain-agnostic metadata management infrastructure that can meet the demands of
extreme-scale science is notable by its absence.
To address this gap in scientific data management research and practice, we
present our vision for an integrated approach that (1) automatically captures
and manipulates information-rich metadata while the data is being produced or
analyzed and (2) stores metadata within each dataset to permeate
metadata-oblivious processes and to query metadata through established and
standardized data access interfaces. We motivate the need for the proposed
integrated approach using applications from plasma physics, climate modeling
and neuroscience, and then discuss research challenges and possible solutions.
| [
{
"version": "v1",
"created": "Sun, 29 Mar 2015 19:13:18 GMT"
}
] | 2015-03-31T00:00:00 | [
[
"Blanas",
"Spyros",
""
],
[
"Byna",
"Surendra",
""
]
] | TITLE: Towards Exascale Scientific Metadata Management
ABSTRACT: Advances in technology and computing hardware are enabling scientists from
all areas of science to produce massive amounts of data using large-scale
simulations or observational facilities. In this era of data deluge, effective
coordination between the data production and the analysis phases hinges on the
availability of metadata that describe the scientific datasets. Existing
workflow engines have been capturing a limited form of metadata to provide
provenance information about the identity and lineage of the data. However,
much of the data produced by simulations, experiments, and analyses still need
to be annotated manually in an ad hoc manner by domain scientists. Systematic
and transparent acquisition of rich metadata becomes a crucial prerequisite to
sustain and accelerate the pace of scientific innovation. Yet, ubiquitous and
domain-agnostic metadata management infrastructure that can meet the demands of
extreme-scale science is notable by its absence.
To address this gap in scientific data management research and practice, we
present our vision for an integrated approach that (1) automatically captures
and manipulates information-rich metadata while the data is being produced or
analyzed and (2) stores metadata within each dataset to permeate
metadata-oblivious processes and to query metadata through established and
standardized data access interfaces. We motivate the need for the proposed
integrated approach using applications from plasma physics, climate modeling
and neuroscience, and then discuss research challenges and possible solutions.
| no_new_dataset | 0.946448 |
1503.08535 | Junyu Xuan | Junyu Xuan, Jie Lu, Guangquan Zhang, Richard Yi Da Xu, Xiangfeng Luo | Infinite Author Topic Model based on Mixed Gamma-Negative Binomial
Process | 10 pages, 5 figures, submitted to KDD conference | null | null | null | stat.ML cs.IR cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Incorporating the side information of text corpus, i.e., authors, time
stamps, and emotional tags, into the traditional text mining models has gained
significant interests in the area of information retrieval, statistical natural
language processing, and machine learning. One branch of these works is the
so-called Author Topic Model (ATM), which incorporates the authors's interests
as side information into the classical topic model. However, the existing ATM
needs to predefine the number of topics, which is difficult and inappropriate
in many real-world settings. In this paper, we propose an Infinite Author Topic
(IAT) model to resolve this issue. Instead of assigning a discrete probability
on fixed number of topics, we use a stochastic process to determine the number
of topics from the data itself. To be specific, we extend a gamma-negative
binomial process to three levels in order to capture the
author-document-keyword hierarchical structure. Furthermore, each document is
assigned a mixed gamma process that accounts for the multi-author's
contribution towards this document. An efficient Gibbs sampling inference
algorithm with each conditional distribution being closed-form is developed for
the IAT model. Experiments on several real-world datasets show the capabilities
of our IAT model to learn the hidden topics, authors' interests on these topics
and the number of topics simultaneously.
| [
{
"version": "v1",
"created": "Mon, 30 Mar 2015 05:03:37 GMT"
}
] | 2015-03-31T00:00:00 | [
[
"Xuan",
"Junyu",
""
],
[
"Lu",
"Jie",
""
],
[
"Zhang",
"Guangquan",
""
],
[
"Da Xu",
"Richard Yi",
""
],
[
"Luo",
"Xiangfeng",
""
]
] | TITLE: Infinite Author Topic Model based on Mixed Gamma-Negative Binomial
Process
ABSTRACT: Incorporating the side information of text corpus, i.e., authors, time
stamps, and emotional tags, into the traditional text mining models has gained
significant interests in the area of information retrieval, statistical natural
language processing, and machine learning. One branch of these works is the
so-called Author Topic Model (ATM), which incorporates the authors's interests
as side information into the classical topic model. However, the existing ATM
needs to predefine the number of topics, which is difficult and inappropriate
in many real-world settings. In this paper, we propose an Infinite Author Topic
(IAT) model to resolve this issue. Instead of assigning a discrete probability
on fixed number of topics, we use a stochastic process to determine the number
of topics from the data itself. To be specific, we extend a gamma-negative
binomial process to three levels in order to capture the
author-document-keyword hierarchical structure. Furthermore, each document is
assigned a mixed gamma process that accounts for the multi-author's
contribution towards this document. An efficient Gibbs sampling inference
algorithm with each conditional distribution being closed-form is developed for
the IAT model. Experiments on several real-world datasets show the capabilities
of our IAT model to learn the hidden topics, authors' interests on these topics
and the number of topics simultaneously.
| no_new_dataset | 0.951233 |
1503.08542 | Junyu Xuan | Junyu Xuan, Jie Lu, Guangquan Zhang, Richard Yi Da Xu, Xiangfeng Luo | Nonparametric Relational Topic Models through Dependent Gamma Processes | null | null | null | null | stat.ML cs.CL cs.IR cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Traditional Relational Topic Models provide a way to discover the hidden
topics from a document network. Many theoretical and practical tasks, such as
dimensional reduction, document clustering, link prediction, benefit from this
revealed knowledge. However, existing relational topic models are based on an
assumption that the number of hidden topics is known in advance, and this is
impractical in many real-world applications. Therefore, in order to relax this
assumption, we propose a nonparametric relational topic model in this paper.
Instead of using fixed-dimensional probability distributions in its generative
model, we use stochastic processes. Specifically, a gamma process is assigned
to each document, which represents the topic interest of this document.
Although this method provides an elegant solution, it brings additional
challenges when mathematically modeling the inherent network structure of
typical document network, i.e., two spatially closer documents tend to have
more similar topics. Furthermore, we require that the topics are shared by all
the documents. In order to resolve these challenges, we use a subsampling
strategy to assign each document a different gamma process from the global
gamma process, and the subsampling probabilities of documents are assigned with
a Markov Random Field constraint that inherits the document network structure.
Through the designed posterior inference algorithm, we can discover the hidden
topics and its number simultaneously. Experimental results on both synthetic
and real-world network datasets demonstrate the capabilities of learning the
hidden topics and, more importantly, the number of topics.
| [
{
"version": "v1",
"created": "Mon, 30 Mar 2015 05:40:41 GMT"
}
] | 2015-03-31T00:00:00 | [
[
"Xuan",
"Junyu",
""
],
[
"Lu",
"Jie",
""
],
[
"Zhang",
"Guangquan",
""
],
[
"Da Xu",
"Richard Yi",
""
],
[
"Luo",
"Xiangfeng",
""
]
] | TITLE: Nonparametric Relational Topic Models through Dependent Gamma Processes
ABSTRACT: Traditional Relational Topic Models provide a way to discover the hidden
topics from a document network. Many theoretical and practical tasks, such as
dimensional reduction, document clustering, link prediction, benefit from this
revealed knowledge. However, existing relational topic models are based on an
assumption that the number of hidden topics is known in advance, and this is
impractical in many real-world applications. Therefore, in order to relax this
assumption, we propose a nonparametric relational topic model in this paper.
Instead of using fixed-dimensional probability distributions in its generative
model, we use stochastic processes. Specifically, a gamma process is assigned
to each document, which represents the topic interest of this document.
Although this method provides an elegant solution, it brings additional
challenges when mathematically modeling the inherent network structure of
typical document network, i.e., two spatially closer documents tend to have
more similar topics. Furthermore, we require that the topics are shared by all
the documents. In order to resolve these challenges, we use a subsampling
strategy to assign each document a different gamma process from the global
gamma process, and the subsampling probabilities of documents are assigned with
a Markov Random Field constraint that inherits the document network structure.
Through the designed posterior inference algorithm, we can discover the hidden
topics and its number simultaneously. Experimental results on both synthetic
and real-world network datasets demonstrate the capabilities of learning the
hidden topics and, more importantly, the number of topics.
| no_new_dataset | 0.951953 |
1503.08581 | Ioannis Partalas | Ioannis Partalas, Aris Kosmopoulos, Nicolas Baskiotis, Thierry
Artieres, George Paliouras, Eric Gaussier, Ion Androutsopoulos, Massih-Reza
Amini, Patrick Galinari | LSHTC: A Benchmark for Large-Scale Text Classification | null | null | null | null | cs.IR cs.CL cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | LSHTC is a series of challenges which aims to assess the performance of
classification systems in large-scale classification in a a large number of
classes (up to hundreds of thousands). This paper describes the dataset that
have been released along the LSHTC series. The paper details the construction
of the datsets and the design of the tracks as well as the evaluation measures
that we implemented and a quick overview of the results. All of these datasets
are available online and runs may still be submitted on the online server of
the challenges.
| [
{
"version": "v1",
"created": "Mon, 30 Mar 2015 08:03:47 GMT"
}
] | 2015-03-31T00:00:00 | [
[
"Partalas",
"Ioannis",
""
],
[
"Kosmopoulos",
"Aris",
""
],
[
"Baskiotis",
"Nicolas",
""
],
[
"Artieres",
"Thierry",
""
],
[
"Paliouras",
"George",
""
],
[
"Gaussier",
"Eric",
""
],
[
"Androutsopoulos",
"Ion",
""
],
[
"Amini",
"Massih-Reza",
""
],
[
"Galinari",
"Patrick",
""
]
] | TITLE: LSHTC: A Benchmark for Large-Scale Text Classification
ABSTRACT: LSHTC is a series of challenges which aims to assess the performance of
classification systems in large-scale classification in a a large number of
classes (up to hundreds of thousands). This paper describes the dataset that
have been released along the LSHTC series. The paper details the construction
of the datsets and the design of the tracks as well as the evaluation measures
that we implemented and a quick overview of the results. All of these datasets
are available online and runs may still be submitted on the online server of
the challenges.
| no_new_dataset | 0.849222 |
1503.08639 | Rapha\"el Li\'egeois | Rapha\"el Li\'egeois, Bamdev Mishra, Mattia Zorzi, Rodolphe Sepulchre | Sparse plus low-rank autoregressive identification in neuroimaging time
series | 6 pages paper submitted to CDC 2015 | null | null | null | cs.LG cs.SY | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper considers the problem of identifying multivariate autoregressive
(AR) sparse plus low-rank graphical models. Based on the corresponding problem
formulation recently presented, we use the alternating direction method of
multipliers (ADMM) to efficiently solve it and scale it to sizes encountered in
neuroimaging applications. We apply this decomposition on synthetic and real
neuroimaging datasets with a specific focus on the information encoded in the
low-rank structure of our model. In particular, we illustrate that this
information captures the spatio-temporal structure of the original data,
generalizing classical component analysis approaches.
| [
{
"version": "v1",
"created": "Mon, 30 Mar 2015 11:11:57 GMT"
}
] | 2015-03-31T00:00:00 | [
[
"Liégeois",
"Raphaël",
""
],
[
"Mishra",
"Bamdev",
""
],
[
"Zorzi",
"Mattia",
""
],
[
"Sepulchre",
"Rodolphe",
""
]
] | TITLE: Sparse plus low-rank autoregressive identification in neuroimaging time
series
ABSTRACT: This paper considers the problem of identifying multivariate autoregressive
(AR) sparse plus low-rank graphical models. Based on the corresponding problem
formulation recently presented, we use the alternating direction method of
multipliers (ADMM) to efficiently solve it and scale it to sizes encountered in
neuroimaging applications. We apply this decomposition on synthetic and real
neuroimaging datasets with a specific focus on the information encoded in the
low-rank structure of our model. In particular, we illustrate that this
information captures the spatio-temporal structure of the original data,
generalizing classical component analysis approaches.
| no_new_dataset | 0.948632 |
1406.0288 | Radu Horaud P | Kaustubh Kulkarni, Georgios Evangelidis, Jan Cech and Radu Horaud | Continuous Action Recognition Based on Sequence Alignment | null | International Journal of Computer Vision 112(1), 90-114, 2015 | 10.1007/s11263-014-0758-9 | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Continuous action recognition is more challenging than isolated recognition
because classification and segmentation must be simultaneously carried out. We
build on the well known dynamic time warping (DTW) framework and devise a novel
visual alignment technique, namely dynamic frame warping (DFW), which performs
isolated recognition based on per-frame representation of videos, and on
aligning a test sequence with a model sequence. Moreover, we propose two
extensions which enable to perform recognition concomitant with segmentation,
namely one-pass DFW and two-pass DFW. These two methods have their roots in the
domain of continuous recognition of speech and, to the best of our knowledge,
their extension to continuous visual action recognition has been overlooked. We
test and illustrate the proposed techniques with a recently released dataset
(RAVEL) and with two public-domain datasets widely used in action recognition
(Hollywood-1 and Hollywood-2). We also compare the performances of the proposed
isolated and continuous recognition algorithms with several recently published
methods.
| [
{
"version": "v1",
"created": "Mon, 2 Jun 2014 08:21:27 GMT"
}
] | 2015-03-30T00:00:00 | [
[
"Kulkarni",
"Kaustubh",
""
],
[
"Evangelidis",
"Georgios",
""
],
[
"Cech",
"Jan",
""
],
[
"Horaud",
"Radu",
""
]
] | TITLE: Continuous Action Recognition Based on Sequence Alignment
ABSTRACT: Continuous action recognition is more challenging than isolated recognition
because classification and segmentation must be simultaneously carried out. We
build on the well known dynamic time warping (DTW) framework and devise a novel
visual alignment technique, namely dynamic frame warping (DFW), which performs
isolated recognition based on per-frame representation of videos, and on
aligning a test sequence with a model sequence. Moreover, we propose two
extensions which enable to perform recognition concomitant with segmentation,
namely one-pass DFW and two-pass DFW. These two methods have their roots in the
domain of continuous recognition of speech and, to the best of our knowledge,
their extension to continuous visual action recognition has been overlooked. We
test and illustrate the proposed techniques with a recently released dataset
(RAVEL) and with two public-domain datasets widely used in action recognition
(Hollywood-1 and Hollywood-2). We also compare the performances of the proposed
isolated and continuous recognition algorithms with several recently published
methods.
| new_dataset | 0.964855 |
1503.07884 | Yongxin Yang | Yanwei Fu, Yongxin Yang, Timothy M. Hospedales, Tao Xiang and Shaogang
Gong | Transductive Multi-class and Multi-label Zero-shot Learning | 4 pages, 4 figures, ECCV 2014 Workshop on Parts and Attributes | null | null | null | cs.LG cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Recently, zero-shot learning (ZSL) has received increasing interest. The key
idea underpinning existing ZSL approaches is to exploit knowledge transfer via
an intermediate-level semantic representation which is assumed to be shared
between the auxiliary and target datasets, and is used to bridge between these
domains for knowledge transfer. The semantic representation used in existing
approaches varies from visual attributes to semantic word vectors and semantic
relatedness. However, the overall pipeline is similar: a projection mapping
low-level features to the semantic representation is learned from the auxiliary
dataset by either classification or regression models and applied directly to
map each instance into the same semantic representation space where a zero-shot
classifier is used to recognise the unseen target class instances with a single
known 'prototype' of each target class. In this paper we discuss two related
lines of work improving the conventional approach: exploiting transductive
learning ZSL, and generalising ZSL to the multi-label case.
| [
{
"version": "v1",
"created": "Thu, 26 Mar 2015 20:07:37 GMT"
}
] | 2015-03-30T00:00:00 | [
[
"Fu",
"Yanwei",
""
],
[
"Yang",
"Yongxin",
""
],
[
"Hospedales",
"Timothy M.",
""
],
[
"Xiang",
"Tao",
""
],
[
"Gong",
"Shaogang",
""
]
] | TITLE: Transductive Multi-class and Multi-label Zero-shot Learning
ABSTRACT: Recently, zero-shot learning (ZSL) has received increasing interest. The key
idea underpinning existing ZSL approaches is to exploit knowledge transfer via
an intermediate-level semantic representation which is assumed to be shared
between the auxiliary and target datasets, and is used to bridge between these
domains for knowledge transfer. The semantic representation used in existing
approaches varies from visual attributes to semantic word vectors and semantic
relatedness. However, the overall pipeline is similar: a projection mapping
low-level features to the semantic representation is learned from the auxiliary
dataset by either classification or regression models and applied directly to
map each instance into the same semantic representation space where a zero-shot
classifier is used to recognise the unseen target class instances with a single
known 'prototype' of each target class. In this paper we discuss two related
lines of work improving the conventional approach: exploiting transductive
learning ZSL, and generalising ZSL to the multi-label case.
| no_new_dataset | 0.942082 |
1503.07939 | Raktim Bhattacharya | Raktim Bhattacharya | Robust State Feedback Control Design with Probabilistic System
Parameters | Published in CDC 2014 | null | null | null | cs.SY | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, a new polynomial chaos based framework for analyzing linear
systems with probabilistic parameters is presented. Stability analysis and
synthesis of optimal quadratically stabilizing controllers for such systems are
presented as convex optimization problems, with exponential mean square
stability guarantees. A Monte-Carlo approach for analysis and synthesis is also
presented, which is used to benchmark the polynomial chaos based approach. The
computational advantage of the polynomial chaos approach is shown with an
example based on the design of an optimal EMS-stabilizing controller, for an
F-16 aircraft model.
| [
{
"version": "v1",
"created": "Fri, 27 Mar 2015 01:40:36 GMT"
}
] | 2015-03-30T00:00:00 | [
[
"Bhattacharya",
"Raktim",
""
]
] | TITLE: Robust State Feedback Control Design with Probabilistic System
Parameters
ABSTRACT: In this paper, a new polynomial chaos based framework for analyzing linear
systems with probabilistic parameters is presented. Stability analysis and
synthesis of optimal quadratically stabilizing controllers for such systems are
presented as convex optimization problems, with exponential mean square
stability guarantees. A Monte-Carlo approach for analysis and synthesis is also
presented, which is used to benchmark the polynomial chaos based approach. The
computational advantage of the polynomial chaos approach is shown with an
example based on the design of an optimal EMS-stabilizing controller, for an
F-16 aircraft model.
| no_new_dataset | 0.94801 |
1503.07989 | Naveed Akhtar Mr. | Naveed Akhtar, Faisal Shafait, Ajmal Mian | Discriminative Bayesian Dictionary Learning for Classification | 15 pages | null | null | null | cs.CV cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose a Bayesian approach to learn discriminative dictionaries for
sparse representation of data. The proposed approach infers probability
distributions over the atoms of a discriminative dictionary using a Beta
Process. It also computes sets of Bernoulli distributions that associate class
labels to the learned dictionary atoms. This association signifies the
selection probabilities of the dictionary atoms in the expansion of
class-specific data. Furthermore, the non-parametric character of the proposed
approach allows it to infer the correct size of the dictionary. We exploit the
aforementioned Bernoulli distributions in separately learning a linear
classifier. The classifier uses the same hierarchical Bayesian model as the
dictionary, which we present along the analytical inference solution for Gibbs
sampling. For classification, a test instance is first sparsely encoded over
the learned dictionary and the codes are fed to the classifier. We performed
experiments for face and action recognition; and object and scene-category
classification using five public datasets and compared the results with
state-of-the-art discriminative sparse representation approaches. Experiments
show that the proposed Bayesian approach consistently outperforms the existing
approaches.
| [
{
"version": "v1",
"created": "Fri, 27 Mar 2015 08:36:15 GMT"
}
] | 2015-03-30T00:00:00 | [
[
"Akhtar",
"Naveed",
""
],
[
"Shafait",
"Faisal",
""
],
[
"Mian",
"Ajmal",
""
]
] | TITLE: Discriminative Bayesian Dictionary Learning for Classification
ABSTRACT: We propose a Bayesian approach to learn discriminative dictionaries for
sparse representation of data. The proposed approach infers probability
distributions over the atoms of a discriminative dictionary using a Beta
Process. It also computes sets of Bernoulli distributions that associate class
labels to the learned dictionary atoms. This association signifies the
selection probabilities of the dictionary atoms in the expansion of
class-specific data. Furthermore, the non-parametric character of the proposed
approach allows it to infer the correct size of the dictionary. We exploit the
aforementioned Bernoulli distributions in separately learning a linear
classifier. The classifier uses the same hierarchical Bayesian model as the
dictionary, which we present along the analytical inference solution for Gibbs
sampling. For classification, a test instance is first sparsely encoded over
the learned dictionary and the codes are fed to the classifier. We performed
experiments for face and action recognition; and object and scene-category
classification using five public datasets and compared the results with
state-of-the-art discriminative sparse representation approaches. Experiments
show that the proposed Bayesian approach consistently outperforms the existing
approaches.
| no_new_dataset | 0.947235 |
1503.08081 | Manfred Poechacker DI | Manfred P\"ochacker, Dominik Egarter, Wilfried Elmenreich | Proficiency of Power Values for Load Disaggregation | null | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Load disaggregation techniques infer the operation of different power
consuming devices from a single measurement point that records the total power
draw over time. Thus, a device consuming power at the moment can be understood
as information encoded in the power draw. However, similar power draws or
similar combinations of power draws limit the ability to detect the currently
active device set. We present an information coding perspective of load
disaggregation to enable a better understanding of this process and to support
its future improvement. In typical cases of quantity and type of devices and
their respective power consumption, not all possible device configurations can
be mapped to distinguishable power values. We introduce the term of proficiency
to describe the suitability of a device set for load disaggregation. We provide
the notion and calculation of entropy of initial device states, mutual
information of power values and the resulting uncertainty coefficient or
proficiency. We show that the proficiency is highly dependent from the device
running probability especially for devices with multiple states of power
consumption. The application of the concept is demonstrated by exemplary
artificial data as well as with actual power consumption data from real-world
power draw datasets.
| [
{
"version": "v1",
"created": "Fri, 27 Mar 2015 14:01:07 GMT"
}
] | 2015-03-30T00:00:00 | [
[
"Pöchacker",
"Manfred",
""
],
[
"Egarter",
"Dominik",
""
],
[
"Elmenreich",
"Wilfried",
""
]
] | TITLE: Proficiency of Power Values for Load Disaggregation
ABSTRACT: Load disaggregation techniques infer the operation of different power
consuming devices from a single measurement point that records the total power
draw over time. Thus, a device consuming power at the moment can be understood
as information encoded in the power draw. However, similar power draws or
similar combinations of power draws limit the ability to detect the currently
active device set. We present an information coding perspective of load
disaggregation to enable a better understanding of this process and to support
its future improvement. In typical cases of quantity and type of devices and
their respective power consumption, not all possible device configurations can
be mapped to distinguishable power values. We introduce the term of proficiency
to describe the suitability of a device set for load disaggregation. We provide
the notion and calculation of entropy of initial device states, mutual
information of power values and the resulting uncertainty coefficient or
proficiency. We show that the proficiency is highly dependent from the device
running probability especially for devices with multiple states of power
consumption. The application of the concept is demonstrated by exemplary
artificial data as well as with actual power consumption data from real-world
power draw datasets.
| no_new_dataset | 0.946646 |
1503.05571 | Guillaume Alain | Guillaume Alain, Yoshua Bengio, Li Yao, Jason Yosinski, Eric
Thibodeau-Laufer, Saizheng Zhang, Pascal Vincent | GSNs : Generative Stochastic Networks | arXiv admin note: substantial text overlap with arXiv:1306.1091 | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We introduce a novel training principle for probabilistic models that is an
alternative to maximum likelihood. The proposed Generative Stochastic Networks
(GSN) framework is based on learning the transition operator of a Markov chain
whose stationary distribution estimates the data distribution. Because the
transition distribution is a conditional distribution generally involving a
small move, it has fewer dominant modes, being unimodal in the limit of small
moves. Thus, it is easier to learn, more like learning to perform supervised
function approximation, with gradients that can be obtained by
back-propagation. The theorems provided here generalize recent work on the
probabilistic interpretation of denoising auto-encoders and provide an
interesting justification for dependency networks and generalized
pseudolikelihood (along with defining an appropriate joint distribution and
sampling mechanism, even when the conditionals are not consistent). We study
how GSNs can be used with missing inputs and can be used to sample subsets of
variables given the rest. Successful experiments are conducted, validating
these theoretical results, on two image datasets and with a particular
architecture that mimics the Deep Boltzmann Machine Gibbs sampler but allows
training to proceed with backprop, without the need for layerwise pretraining.
| [
{
"version": "v1",
"created": "Wed, 18 Mar 2015 20:06:07 GMT"
},
{
"version": "v2",
"created": "Mon, 23 Mar 2015 16:44:52 GMT"
}
] | 2015-03-29T00:00:00 | [
[
"Alain",
"Guillaume",
""
],
[
"Bengio",
"Yoshua",
""
],
[
"Yao",
"Li",
""
],
[
"Yosinski",
"Jason",
""
],
[
"Thibodeau-Laufer",
"Eric",
""
],
[
"Zhang",
"Saizheng",
""
],
[
"Vincent",
"Pascal",
""
]
] | TITLE: GSNs : Generative Stochastic Networks
ABSTRACT: We introduce a novel training principle for probabilistic models that is an
alternative to maximum likelihood. The proposed Generative Stochastic Networks
(GSN) framework is based on learning the transition operator of a Markov chain
whose stationary distribution estimates the data distribution. Because the
transition distribution is a conditional distribution generally involving a
small move, it has fewer dominant modes, being unimodal in the limit of small
moves. Thus, it is easier to learn, more like learning to perform supervised
function approximation, with gradients that can be obtained by
back-propagation. The theorems provided here generalize recent work on the
probabilistic interpretation of denoising auto-encoders and provide an
interesting justification for dependency networks and generalized
pseudolikelihood (along with defining an appropriate joint distribution and
sampling mechanism, even when the conditionals are not consistent). We study
how GSNs can be used with missing inputs and can be used to sample subsets of
variables given the rest. Successful experiments are conducted, validating
these theoretical results, on two image datasets and with a particular
architecture that mimics the Deep Boltzmann Machine Gibbs sampler but allows
training to proceed with backprop, without the need for layerwise pretraining.
| no_new_dataset | 0.948202 |
1503.06268 | Tanmoy Chakraborty | Tanmoy Chakraborty, Suhansanu Kumar, Pawan Goyal, Niloy Ganguly,
Animesh Mukherjee | On the categorization of scientific citation profiles in computer
sciences | 11 pages, 10 figures, Accepted in Communications of the ACM (CACM),
2015. arXiv admin note: text overlap with arXiv:1206.0108 by other authors | null | null | null | cs.DL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A common consensus in the literature is that the citation profile of
published articles in general follows a universal pattern - an initial growth
in the number of citations within the first two to three years after
publication followed by a steady peak of one to two years and then a final
decline over the rest of the lifetime of the article. This observation has long
been the underlying heuristic in determining major bibliometric factors such as
the quality of a publication, the growth of scientific communities, impact
factor of publication venues etc. In this paper, we gather and analyze a
massive dataset of scientific papers from the computer science domain and
notice that the citation count of the articles over the years follows a
remarkably diverse set of patterns - a profile with an initial peak (PeakInit),
with distinct multiple peaks (PeakMul), with a peak late in time (PeakLate),
that is monotonically decreasing (MonDec), that is monotonically increasing
(MonIncr) and that can not be categorized into any of the above (Oth). We
conduct a thorough experiment to investigate several important characteristics
of these categories such as how individual categories attract citations, how
the categorization is influenced by the year and the venue of publication of
papers, how each category is affected by self-citations, the stability of the
categories over time, and how much each of these categories contribute to the
core of the network. Further, we show that the traditional preferential
attachment models fail to explain these citation profiles. Therefore, we
propose a novel dynamic growth model that takes both the preferential
attachment and the aging factor into account in order to replicate the
real-world behavior of various citation profiles. We believe that this paper
opens the scope for a serious re-investigation of the existing bibliometric
indices for scientific research.
| [
{
"version": "v1",
"created": "Sat, 21 Mar 2015 06:03:44 GMT"
}
] | 2015-03-29T00:00:00 | [
[
"Chakraborty",
"Tanmoy",
""
],
[
"Kumar",
"Suhansanu",
""
],
[
"Goyal",
"Pawan",
""
],
[
"Ganguly",
"Niloy",
""
],
[
"Mukherjee",
"Animesh",
""
]
] | TITLE: On the categorization of scientific citation profiles in computer
sciences
ABSTRACT: A common consensus in the literature is that the citation profile of
published articles in general follows a universal pattern - an initial growth
in the number of citations within the first two to three years after
publication followed by a steady peak of one to two years and then a final
decline over the rest of the lifetime of the article. This observation has long
been the underlying heuristic in determining major bibliometric factors such as
the quality of a publication, the growth of scientific communities, impact
factor of publication venues etc. In this paper, we gather and analyze a
massive dataset of scientific papers from the computer science domain and
notice that the citation count of the articles over the years follows a
remarkably diverse set of patterns - a profile with an initial peak (PeakInit),
with distinct multiple peaks (PeakMul), with a peak late in time (PeakLate),
that is monotonically decreasing (MonDec), that is monotonically increasing
(MonIncr) and that can not be categorized into any of the above (Oth). We
conduct a thorough experiment to investigate several important characteristics
of these categories such as how individual categories attract citations, how
the categorization is influenced by the year and the venue of publication of
papers, how each category is affected by self-citations, the stability of the
categories over time, and how much each of these categories contribute to the
core of the network. Further, we show that the traditional preferential
attachment models fail to explain these citation profiles. Therefore, we
propose a novel dynamic growth model that takes both the preferential
attachment and the aging factor into account in order to replicate the
real-world behavior of various citation profiles. We believe that this paper
opens the scope for a serious re-investigation of the existing bibliometric
indices for scientific research.
| no_new_dataset | 0.944587 |
1503.06608 | Lakshmi Devasena C | Lakshmi Devasena C | Proficiency Comparison of LADTree and REPTree Classifiers for Credit
Risk Forecast | arXiv admin note: text overlap with arXiv:1310.5963 by other authors | International Journal on Computational Sciences & Applications
(IJCSA) Vol.5, No.1, February 2015, pp. 39 - 50 | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Predicting the Credit Defaulter is a perilous task of Financial Industries
like Banks. Ascertaining non-payer before giving loan is a significant and
conflict-ridden task of the Banker. Classification techniques are the better
choice for predictive analysis like finding the claimant, whether he/she is an
unpretentious customer or a cheat. Defining the outstanding classifier is a
risky assignment for any industrialist like a banker. This allow computer
science researchers to drill down efficient research works through evaluating
different classifiers and finding out the best classifier for such predictive
problems. This research work investigates the productivity of LADTree
Classifier and REPTree Classifier for the credit risk prediction and compares
their fitness through various measures. German credit dataset has been taken
and used to predict the credit risk with a help of open source machine learning
tool.
| [
{
"version": "v1",
"created": "Mon, 23 Mar 2015 11:47:05 GMT"
}
] | 2015-03-29T00:00:00 | [
[
"C",
"Lakshmi Devasena",
""
]
] | TITLE: Proficiency Comparison of LADTree and REPTree Classifiers for Credit
Risk Forecast
ABSTRACT: Predicting the Credit Defaulter is a perilous task of Financial Industries
like Banks. Ascertaining non-payer before giving loan is a significant and
conflict-ridden task of the Banker. Classification techniques are the better
choice for predictive analysis like finding the claimant, whether he/she is an
unpretentious customer or a cheat. Defining the outstanding classifier is a
risky assignment for any industrialist like a banker. This allow computer
science researchers to drill down efficient research works through evaluating
different classifiers and finding out the best classifier for such predictive
problems. This research work investigates the productivity of LADTree
Classifier and REPTree Classifier for the credit risk prediction and compares
their fitness through various measures. German credit dataset has been taken
and used to predict the credit risk with a help of open source machine learning
tool.
| no_new_dataset | 0.948775 |
1403.4597 | Zheng Nan | Zheng Nan, Tianyi Chen, Xin Wang, and Wei Ni | Energy-Efficient Transmission Schedule for Delay-Limited Bursty Data
Arrivals under Non-Ideal Circuit Power Consumption | 30 pages, 7 figures | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper develops a novel approach to obtaining energy-efficient
transmission schedules for delay-limited bursty data arrivals under non-ideal
circuit power consumption. Assuming a-prior knowledge of packet arrivals,
deadlines and channel realizations, we show that the problem can be formulated
as a convex program. For both time-invariant and time-varying fading channels,
it is revealed that the optimal transmission between any two consecutive
channel or data state changing instants, termed epoch, can only take one of the
three strategies: (i) no transmission, (ii) transmission with an
energy-efficiency (EE) maximizing rate over part of the epoch, or (iii)
transmission with a rate greater than the EE-maximizing rate over the whole
epoch. Based on this specific structure, efficient algorithms are then
developed to find the optimal policies that minimize the total energy
consumption with a low computational complexity. The proposed approach can
provide the optimal benchmarks for practical schemes designed for transmissions
of delay-limited data arrivals, and can be employed to develop efficient online
scheduling schemes which require only causal knowledge of data arrivals and
deadline requirements.
| [
{
"version": "v1",
"created": "Tue, 18 Mar 2014 02:28:59 GMT"
},
{
"version": "v2",
"created": "Thu, 26 Mar 2015 01:51:42 GMT"
}
] | 2015-03-27T00:00:00 | [
[
"Nan",
"Zheng",
""
],
[
"Chen",
"Tianyi",
""
],
[
"Wang",
"Xin",
""
],
[
"Ni",
"Wei",
""
]
] | TITLE: Energy-Efficient Transmission Schedule for Delay-Limited Bursty Data
Arrivals under Non-Ideal Circuit Power Consumption
ABSTRACT: This paper develops a novel approach to obtaining energy-efficient
transmission schedules for delay-limited bursty data arrivals under non-ideal
circuit power consumption. Assuming a-prior knowledge of packet arrivals,
deadlines and channel realizations, we show that the problem can be formulated
as a convex program. For both time-invariant and time-varying fading channels,
it is revealed that the optimal transmission between any two consecutive
channel or data state changing instants, termed epoch, can only take one of the
three strategies: (i) no transmission, (ii) transmission with an
energy-efficiency (EE) maximizing rate over part of the epoch, or (iii)
transmission with a rate greater than the EE-maximizing rate over the whole
epoch. Based on this specific structure, efficient algorithms are then
developed to find the optimal policies that minimize the total energy
consumption with a low computational complexity. The proposed approach can
provide the optimal benchmarks for practical schemes designed for transmissions
of delay-limited data arrivals, and can be employed to develop efficient online
scheduling schemes which require only causal knowledge of data arrivals and
deadline requirements.
| no_new_dataset | 0.95018 |
1503.07783 | Faraz Saeedan | Faraz Saeedan, Barbara Caputo | Towards Learning free Naive Bayes Nearest Neighbor-based Domain
Adaptation | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | As of today, object categorization algorithms are not able to achieve the
level of robustness and generality necessary to work reliably in the real
world. Even the most powerful convolutional neural network we can train fails
to perform satisfactorily when trained and tested on data from different
databases. This issue, known as domain adaptation and/or dataset bias in the
literature, is due to a distribution mismatch between data collections. Methods
addressing it go from max-margin classifiers to learning how to modify the
features and obtain a more robust representation. Recent work showed that by
casting the problem into the image-to-class recognition framework, the domain
adaptation problem is significantly alleviated \cite{danbnn}. Here we follow
this approach, and show how a very simple, learning free Naive Bayes Nearest
Neighbor (NBNN)-based domain adaptation algorithm can significantly alleviate
the distribution mismatch among source and target data, especially when the
number of classes and the number of sources grow. Experiments on standard
benchmarks used in the literature show that our approach (a) is competitive
with the current state of the art on small scale problems, and (b) achieves the
current state of the art as the number of classes and sources grows, with
minimal computational requirements.
| [
{
"version": "v1",
"created": "Thu, 26 Mar 2015 16:55:19 GMT"
}
] | 2015-03-27T00:00:00 | [
[
"Saeedan",
"Faraz",
""
],
[
"Caputo",
"Barbara",
""
]
] | TITLE: Towards Learning free Naive Bayes Nearest Neighbor-based Domain
Adaptation
ABSTRACT: As of today, object categorization algorithms are not able to achieve the
level of robustness and generality necessary to work reliably in the real
world. Even the most powerful convolutional neural network we can train fails
to perform satisfactorily when trained and tested on data from different
databases. This issue, known as domain adaptation and/or dataset bias in the
literature, is due to a distribution mismatch between data collections. Methods
addressing it go from max-margin classifiers to learning how to modify the
features and obtain a more robust representation. Recent work showed that by
casting the problem into the image-to-class recognition framework, the domain
adaptation problem is significantly alleviated \cite{danbnn}. Here we follow
this approach, and show how a very simple, learning free Naive Bayes Nearest
Neighbor (NBNN)-based domain adaptation algorithm can significantly alleviate
the distribution mismatch among source and target data, especially when the
number of classes and the number of sources grow. Experiments on standard
benchmarks used in the literature show that our approach (a) is competitive
with the current state of the art on small scale problems, and (b) achieves the
current state of the art as the number of classes and sources grows, with
minimal computational requirements.
| no_new_dataset | 0.949949 |
1503.07790 | Yongxin Yang | Yanwei Fu, Yongxin Yang, Tim Hospedales, Tao Xiang and Shaogang Gong | Transductive Multi-label Zero-shot Learning | 12 pages, 6 figures, Accepted to BMVC 2014 (oral) | null | null | null | cs.LG cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Zero-shot learning has received increasing interest as a means to alleviate
the often prohibitive expense of annotating training data for large scale
recognition problems. These methods have achieved great success via learning
intermediate semantic representations in the form of attributes and more
recently, semantic word vectors. However, they have thus far been constrained
to the single-label case, in contrast to the growing popularity and importance
of more realistic multi-label data. In this paper, for the first time, we
investigate and formalise a general framework for multi-label zero-shot
learning, addressing the unique challenge therein: how to exploit multi-label
correlation at test time with no training data for those classes? In
particular, we propose (1) a multi-output deep regression model to project an
image into a semantic word space, which explicitly exploits the correlations in
the intermediate semantic layer of word vectors; (2) a novel zero-shot learning
algorithm for multi-label data that exploits the unique compositionality
property of semantic word vector representations; and (3) a transductive
learning strategy to enable the regression model learned from seen classes to
generalise well to unseen classes. Our zero-shot learning experiments on a
number of standard multi-label datasets demonstrate that our method outperforms
a variety of baselines.
| [
{
"version": "v1",
"created": "Thu, 26 Mar 2015 17:12:34 GMT"
}
] | 2015-03-27T00:00:00 | [
[
"Fu",
"Yanwei",
""
],
[
"Yang",
"Yongxin",
""
],
[
"Hospedales",
"Tim",
""
],
[
"Xiang",
"Tao",
""
],
[
"Gong",
"Shaogang",
""
]
] | TITLE: Transductive Multi-label Zero-shot Learning
ABSTRACT: Zero-shot learning has received increasing interest as a means to alleviate
the often prohibitive expense of annotating training data for large scale
recognition problems. These methods have achieved great success via learning
intermediate semantic representations in the form of attributes and more
recently, semantic word vectors. However, they have thus far been constrained
to the single-label case, in contrast to the growing popularity and importance
of more realistic multi-label data. In this paper, for the first time, we
investigate and formalise a general framework for multi-label zero-shot
learning, addressing the unique challenge therein: how to exploit multi-label
correlation at test time with no training data for those classes? In
particular, we propose (1) a multi-output deep regression model to project an
image into a semantic word space, which explicitly exploits the correlations in
the intermediate semantic layer of word vectors; (2) a novel zero-shot learning
algorithm for multi-label data that exploits the unique compositionality
property of semantic word vector representations; and (3) a transductive
learning strategy to enable the regression model learned from seen classes to
generalise well to unseen classes. Our zero-shot learning experiments on a
number of standard multi-label datasets demonstrate that our method outperforms
a variety of baselines.
| no_new_dataset | 0.946597 |
1503.07828 | Graham Pulford | Graham W. Pulford | A Survey of Manoeuvring Target Tracking Methods | 38 pages, 6 figures. Original manuscript dated 23/12/1998. Submitted
to IEEE Transactions on Aerospace & Electronic Systems. Withdrawn following a
review process lasting 3 years. By the end of this period, this survey paper
was out of date | null | 10.13140/2.1.4994.3846 | null | cs.SY | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A comprehensive review of the literature on manoeuvring target tracking for
both uncluttered and cluttered measurements is presented. Various discrete-time
dynamical models including non-random input, random-input and switching or
hybrid system manoeuvre models are presented. The problem of manoeuvre
detection is covered. Classical and current filtering methods for manoeuvre
tracking are presented including multi-level process noise, input estimation,
variable dimension filtering, two-stage filter, the interacting multiple model
algorithm, and generalised pseudo-Bayesian algorithms. Various extensions of
these algorithms to the case of cluttered measurements are also described and
these include: joint manoeuvre and measurement association, probabilistic data
association and multi-hypothesis tracking. Smoothing schemes, including IMM
smoothing and batch expectation-maximisation using the Viterbi algorithm, are
also described. The use of amplitude information for target measurement
discrimination is discussed. It is noted that although many manoeuvre tacking
techniques exist, the literature contains surprisingly few performance
comparisons to guide the design engineer although a performance benchmark has
recently been introduced.
| [
{
"version": "v1",
"created": "Fri, 6 Mar 2015 01:35:12 GMT"
}
] | 2015-03-27T00:00:00 | [
[
"Pulford",
"Graham W.",
""
]
] | TITLE: A Survey of Manoeuvring Target Tracking Methods
ABSTRACT: A comprehensive review of the literature on manoeuvring target tracking for
both uncluttered and cluttered measurements is presented. Various discrete-time
dynamical models including non-random input, random-input and switching or
hybrid system manoeuvre models are presented. The problem of manoeuvre
detection is covered. Classical and current filtering methods for manoeuvre
tracking are presented including multi-level process noise, input estimation,
variable dimension filtering, two-stage filter, the interacting multiple model
algorithm, and generalised pseudo-Bayesian algorithms. Various extensions of
these algorithms to the case of cluttered measurements are also described and
these include: joint manoeuvre and measurement association, probabilistic data
association and multi-hypothesis tracking. Smoothing schemes, including IMM
smoothing and batch expectation-maximisation using the Viterbi algorithm, are
also described. The use of amplitude information for target measurement
discrimination is discussed. It is noted that although many manoeuvre tacking
techniques exist, the literature contains surprisingly few performance
comparisons to guide the design engineer although a performance benchmark has
recently been introduced.
| no_new_dataset | 0.9455 |
1503.05768 | Yunjin Chen | Yunjin Chen, Wei Yu, Thomas Pock | On learning optimized reaction diffusion processes for effective image
restoration | 9 pages, 3 figures, 3 tables. CVPR2015 oral presentation together
with the supplemental material of 13 pages, 8 pages (Notes on diffusion
networks) | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | For several decades, image restoration remains an active research topic in
low-level computer vision and hence new approaches are constantly emerging.
However, many recently proposed algorithms achieve state-of-the-art performance
only at the expense of very high computation time, which clearly limits their
practical relevance. In this work, we propose a simple but effective approach
with both high computational efficiency and high restoration quality. We extend
conventional nonlinear reaction diffusion models by several parametrized linear
filters as well as several parametrized influence functions. We propose to
train the parameters of the filters and the influence functions through a loss
based approach. Experiments show that our trained nonlinear reaction diffusion
models largely benefit from the training of the parameters and finally lead to
the best reported performance on common test datasets for image restoration.
Due to their structural simplicity, our trained models are highly efficient and
are also well-suited for parallel computation on GPUs.
| [
{
"version": "v1",
"created": "Thu, 19 Mar 2015 14:01:42 GMT"
},
{
"version": "v2",
"created": "Wed, 25 Mar 2015 19:59:44 GMT"
}
] | 2015-03-26T00:00:00 | [
[
"Chen",
"Yunjin",
""
],
[
"Yu",
"Wei",
""
],
[
"Pock",
"Thomas",
""
]
] | TITLE: On learning optimized reaction diffusion processes for effective image
restoration
ABSTRACT: For several decades, image restoration remains an active research topic in
low-level computer vision and hence new approaches are constantly emerging.
However, many recently proposed algorithms achieve state-of-the-art performance
only at the expense of very high computation time, which clearly limits their
practical relevance. In this work, we propose a simple but effective approach
with both high computational efficiency and high restoration quality. We extend
conventional nonlinear reaction diffusion models by several parametrized linear
filters as well as several parametrized influence functions. We propose to
train the parameters of the filters and the influence functions through a loss
based approach. Experiments show that our trained nonlinear reaction diffusion
models largely benefit from the training of the parameters and finally lead to
the best reported performance on common test datasets for image restoration.
Due to their structural simplicity, our trained models are highly efficient and
are also well-suited for parallel computation on GPUs.
| no_new_dataset | 0.951369 |
1503.07240 | Dengyong Zhou | Dengyong Zhou, Qiang Liu, John C. Platt, Christopher Meek, Nihar B.
Shah | Regularized Minimax Conditional Entropy for Crowdsourcing | 31 pages | null | null | null | cs.LG stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | There is a rapidly increasing interest in crowdsourcing for data labeling. By
crowdsourcing, a large number of labels can be often quickly gathered at low
cost. However, the labels provided by the crowdsourcing workers are usually not
of high quality. In this paper, we propose a minimax conditional entropy
principle to infer ground truth from noisy crowdsourced labels. Under this
principle, we derive a unique probabilistic labeling model jointly
parameterized by worker ability and item difficulty. We also propose an
objective measurement principle, and show that our method is the only method
which satisfies this objective measurement principle. We validate our method
through a variety of real crowdsourcing datasets with binary, multiclass or
ordinal labels.
| [
{
"version": "v1",
"created": "Wed, 25 Mar 2015 00:10:11 GMT"
}
] | 2015-03-26T00:00:00 | [
[
"Zhou",
"Dengyong",
""
],
[
"Liu",
"Qiang",
""
],
[
"Platt",
"John C.",
""
],
[
"Meek",
"Christopher",
""
],
[
"Shah",
"Nihar B.",
""
]
] | TITLE: Regularized Minimax Conditional Entropy for Crowdsourcing
ABSTRACT: There is a rapidly increasing interest in crowdsourcing for data labeling. By
crowdsourcing, a large number of labels can be often quickly gathered at low
cost. However, the labels provided by the crowdsourcing workers are usually not
of high quality. In this paper, we propose a minimax conditional entropy
principle to infer ground truth from noisy crowdsourced labels. Under this
principle, we derive a unique probabilistic labeling model jointly
parameterized by worker ability and item difficulty. We also propose an
objective measurement principle, and show that our method is the only method
which satisfies this objective measurement principle. We validate our method
through a variety of real crowdsourcing datasets with binary, multiclass or
ordinal labels.
| no_new_dataset | 0.955277 |
1503.07274 | Elman Mansimov | Elman Mansimov, Nitish Srivastava, Ruslan Salakhutdinov | Initialization Strategies of Spatio-Temporal Convolutional Neural
Networks | Technical Report | null | null | null | cs.CV cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose a new way of incorporating temporal information present in videos
into Spatial Convolutional Neural Networks (ConvNets) trained on images, that
avoids training Spatio-Temporal ConvNets from scratch. We describe several
initializations of weights in 3D Convolutional Layers of Spatio-Temporal
ConvNet using 2D Convolutional Weights learned from ImageNet. We show that it
is important to initialize 3D Convolutional Weights judiciously in order to
learn temporal representations of videos. We evaluate our methods on the
UCF-101 dataset and demonstrate improvement over Spatial ConvNets.
| [
{
"version": "v1",
"created": "Wed, 25 Mar 2015 03:41:47 GMT"
}
] | 2015-03-26T00:00:00 | [
[
"Mansimov",
"Elman",
""
],
[
"Srivastava",
"Nitish",
""
],
[
"Salakhutdinov",
"Ruslan",
""
]
] | TITLE: Initialization Strategies of Spatio-Temporal Convolutional Neural
Networks
ABSTRACT: We propose a new way of incorporating temporal information present in videos
into Spatial Convolutional Neural Networks (ConvNets) trained on images, that
avoids training Spatio-Temporal ConvNets from scratch. We describe several
initializations of weights in 3D Convolutional Layers of Spatio-Temporal
ConvNet using 2D Convolutional Weights learned from ImageNet. We show that it
is important to initialize 3D Convolutional Weights judiciously in order to
learn temporal representations of videos. We evaluate our methods on the
UCF-101 dataset and demonstrate improvement over Spatial ConvNets.
| no_new_dataset | 0.950869 |
1503.07405 | Arkaitz Zubiaga | Bo Wang, Arkaitz Zubiaga, Maria Liakata, Rob Procter | Making the Most of Tweet-Inherent Features for Social Spam Detection on
Twitter | null | null | null | null | cs.IR cs.SI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Social spam produces a great amount of noise on social media services such as
Twitter, which reduces the signal-to-noise ratio that both end users and data
mining applications observe. Existing techniques on social spam detection have
focused primarily on the identification of spam accounts by using extensive
historical and network-based data. In this paper we focus on the detection of
spam tweets, which optimises the amount of data that needs to be gathered by
relying only on tweet-inherent features. This enables the application of the
spam detection system to a large set of tweets in a timely fashion, potentially
applicable in a real-time or near real-time setting. Using two large
hand-labelled datasets of tweets containing spam, we study the suitability of
five classification algorithms and four different feature sets to the social
spam detection task. Our results show that, by using the limited set of
features readily available in a tweet, we can achieve encouraging results which
are competitive when compared against existing spammer detection systems that
make use of additional, costly user features. Our study is the first that
attempts at generalising conclusions on the optimal classifiers and sets of
features for social spam detection over different datasets.
| [
{
"version": "v1",
"created": "Wed, 25 Mar 2015 14:58:59 GMT"
}
] | 2015-03-26T00:00:00 | [
[
"Wang",
"Bo",
""
],
[
"Zubiaga",
"Arkaitz",
""
],
[
"Liakata",
"Maria",
""
],
[
"Procter",
"Rob",
""
]
] | TITLE: Making the Most of Tweet-Inherent Features for Social Spam Detection on
Twitter
ABSTRACT: Social spam produces a great amount of noise on social media services such as
Twitter, which reduces the signal-to-noise ratio that both end users and data
mining applications observe. Existing techniques on social spam detection have
focused primarily on the identification of spam accounts by using extensive
historical and network-based data. In this paper we focus on the detection of
spam tweets, which optimises the amount of data that needs to be gathered by
relying only on tweet-inherent features. This enables the application of the
spam detection system to a large set of tweets in a timely fashion, potentially
applicable in a real-time or near real-time setting. Using two large
hand-labelled datasets of tweets containing spam, we study the suitability of
five classification algorithms and four different feature sets to the social
spam detection task. Our results show that, by using the limited set of
features readily available in a tweet, we can achieve encouraging results which
are competitive when compared against existing spammer detection systems that
make use of additional, costly user features. Our study is the first that
attempts at generalising conclusions on the optimal classifiers and sets of
features for social spam detection over different datasets.
| no_new_dataset | 0.944893 |
1503.07477 | Debajyoti Mukhopadhyay Prof. | Praful Koturwar, Sheetal Girase, Debajyoti Mukhopadhyay | A Survey of Classification Techniques in the Area of Big Data | 7 pages, 3 figures, 2 tables in IJAFRC, Vol.1, Issue 11, November
2014, ISSN: 2348-4853 | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Big Data concern large-volume, growing data sets that are complex and have
multiple autonomous sources. Earlier technologies were not able to handle
storage and processing of huge data thus Big Data concept comes into existence.
This is a tedious job for users unstructured data. So, there should be some
mechanism which classify unstructured data into organized form which helps user
to easily access required data. Classification techniques over big
transactional database provide required data to the users from large datasets
more simple way. There are two main classification techniques, supervised and
unsupervised. In this paper we focused on to study of different supervised
classification techniques. Further this paper shows a advantages and
limitations.
| [
{
"version": "v1",
"created": "Wed, 25 Mar 2015 17:56:19 GMT"
}
] | 2015-03-26T00:00:00 | [
[
"Koturwar",
"Praful",
""
],
[
"Girase",
"Sheetal",
""
],
[
"Mukhopadhyay",
"Debajyoti",
""
]
] | TITLE: A Survey of Classification Techniques in the Area of Big Data
ABSTRACT: Big Data concern large-volume, growing data sets that are complex and have
multiple autonomous sources. Earlier technologies were not able to handle
storage and processing of huge data thus Big Data concept comes into existence.
This is a tedious job for users unstructured data. So, there should be some
mechanism which classify unstructured data into organized form which helps user
to easily access required data. Classification techniques over big
transactional database provide required data to the users from large datasets
more simple way. There are two main classification techniques, supervised and
unsupervised. In this paper we focused on to study of different supervised
classification techniques. Further this paper shows a advantages and
limitations.
| no_new_dataset | 0.941277 |
1410.3469 | Daniel Whiteson | Pierre Baldi, Peter Sadowski, Daniel Whiteson | Enhanced Higgs to $\tau^+\tau^-$ Searches with Deep Learning | For submission to PRL | Phys. Rev. Lett. 114, 111801 (2015) | 10.1103/PhysRevLett.114.111801 | null | hep-ph cs.LG hep-ex | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The Higgs boson is thought to provide the interaction that imparts mass to
the fundamental fermions, but while measurements at the Large Hadron Collider
(LHC) are consistent with this hypothesis, current analysis techniques lack the
statistical power to cross the traditional 5$\sigma$ significance barrier
without more data. \emph{Deep learning} techniques have the potential to
increase the statistical power of this analysis by \emph{automatically}
learning complex, high-level data representations. In this work, deep neural
networks are used to detect the decay of the Higgs to a pair of tau leptons. A
Bayesian optimization algorithm is used to tune the network architecture and
training algorithm hyperparameters, resulting in a deep network of eight
non-linear processing layers that improves upon the performance of shallow
classifiers even without the use of features specifically engineered by
physicists for this application. The improvement in discovery significance is
equivalent to an increase in the accumulated dataset of 25\%.
| [
{
"version": "v1",
"created": "Mon, 13 Oct 2014 20:00:03 GMT"
}
] | 2015-03-25T00:00:00 | [
[
"Baldi",
"Pierre",
""
],
[
"Sadowski",
"Peter",
""
],
[
"Whiteson",
"Daniel",
""
]
] | TITLE: Enhanced Higgs to $\tau^+\tau^-$ Searches with Deep Learning
ABSTRACT: The Higgs boson is thought to provide the interaction that imparts mass to
the fundamental fermions, but while measurements at the Large Hadron Collider
(LHC) are consistent with this hypothesis, current analysis techniques lack the
statistical power to cross the traditional 5$\sigma$ significance barrier
without more data. \emph{Deep learning} techniques have the potential to
increase the statistical power of this analysis by \emph{automatically}
learning complex, high-level data representations. In this work, deep neural
networks are used to detect the decay of the Higgs to a pair of tau leptons. A
Bayesian optimization algorithm is used to tune the network architecture and
training algorithm hyperparameters, resulting in a deep network of eight
non-linear processing layers that improves upon the performance of shallow
classifiers even without the use of features specifically engineered by
physicists for this application. The improvement in discovery significance is
equivalent to an increase in the accumulated dataset of 25\%.
| no_new_dataset | 0.950319 |
1502.08040 | Mayank Kumar | Mayank Kumar, Ashok Veeraraghavan, Ashutosh Sabharval | DistancePPG: Robust non-contact vital signs monitoring using a camera | 24 pages, 11 figures | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Vital signs such as pulse rate and breathing rate are currently measured
using contact probes. But, non-contact methods for measuring vital signs are
desirable both in hospital settings (e.g. in NICU) and for ubiquitous in-situ
health tracking (e.g. on mobile phone and computers with webcams). Recently,
camera-based non-contact vital sign monitoring have been shown to be feasible.
However, camera-based vital sign monitoring is challenging for people with
darker skin tone, under low lighting conditions, and/or during movement of an
individual in front of the camera. In this paper, we propose distancePPG, a new
camera-based vital sign estimation algorithm which addresses these challenges.
DistancePPG proposes a new method of combining skin-color change signals from
different tracked regions of the face using a weighted average, where the
weights depend on the blood perfusion and incident light intensity in the
region, to improve the signal-to-noise ratio (SNR) of camera-based estimate.
One of our key contributions is a new automatic method for determining the
weights based only on the video recording of the subject. The gains in SNR of
camera-based PPG estimated using distancePPG translate into reduction of the
error in vital sign estimation, and thus expand the scope of camera-based vital
sign monitoring to potentially challenging scenarios. Further, a dataset will
be released, comprising of synchronized video recordings of face and pulse
oximeter based ground truth recordings from the earlobe for people with
different skin tones, under different lighting conditions and for various
motion scenarios.
| [
{
"version": "v1",
"created": "Fri, 27 Feb 2015 20:03:06 GMT"
},
{
"version": "v2",
"created": "Tue, 24 Mar 2015 02:31:18 GMT"
}
] | 2015-03-25T00:00:00 | [
[
"Kumar",
"Mayank",
""
],
[
"Veeraraghavan",
"Ashok",
""
],
[
"Sabharval",
"Ashutosh",
""
]
] | TITLE: DistancePPG: Robust non-contact vital signs monitoring using a camera
ABSTRACT: Vital signs such as pulse rate and breathing rate are currently measured
using contact probes. But, non-contact methods for measuring vital signs are
desirable both in hospital settings (e.g. in NICU) and for ubiquitous in-situ
health tracking (e.g. on mobile phone and computers with webcams). Recently,
camera-based non-contact vital sign monitoring have been shown to be feasible.
However, camera-based vital sign monitoring is challenging for people with
darker skin tone, under low lighting conditions, and/or during movement of an
individual in front of the camera. In this paper, we propose distancePPG, a new
camera-based vital sign estimation algorithm which addresses these challenges.
DistancePPG proposes a new method of combining skin-color change signals from
different tracked regions of the face using a weighted average, where the
weights depend on the blood perfusion and incident light intensity in the
region, to improve the signal-to-noise ratio (SNR) of camera-based estimate.
One of our key contributions is a new automatic method for determining the
weights based only on the video recording of the subject. The gains in SNR of
camera-based PPG estimated using distancePPG translate into reduction of the
error in vital sign estimation, and thus expand the scope of camera-based vital
sign monitoring to potentially challenging scenarios. Further, a dataset will
be released, comprising of synchronized video recordings of face and pulse
oximeter based ground truth recordings from the earlobe for people with
different skin tones, under different lighting conditions and for various
motion scenarios.
| new_dataset | 0.969382 |
1503.06917 | Yilin Wang | Qiang Zhang, Yilin Wang, Baoxin Li | Unsupervised Video Analysis Based on a Spatiotemporal Saliency Detector | 21 pages | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Visual saliency, which predicts regions in the field of view that draw the
most visual attention, has attracted a lot of interest from researchers. It has
already been used in several vision tasks, e.g., image classification, object
detection, foreground segmentation. Recently, the spectrum analysis based
visual saliency approach has attracted a lot of interest due to its simplicity
and good performance, where the phase information of the image is used to
construct the saliency map. In this paper, we propose a new approach for
detecting spatiotemporal visual saliency based on the phase spectrum of the
videos, which is easy to implement and computationally efficient. With the
proposed algorithm, we also study how the spatiotemporal saliency can be used
in two important vision task, abnormality detection and spatiotemporal interest
point detection. The proposed algorithm is evaluated on several commonly used
datasets with comparison to the state-of-art methods from the literature. The
experiments demonstrate the effectiveness of the proposed approach to
spatiotemporal visual saliency detection and its application to the above
vision tasks
| [
{
"version": "v1",
"created": "Tue, 24 Mar 2015 05:25:45 GMT"
}
] | 2015-03-25T00:00:00 | [
[
"Zhang",
"Qiang",
""
],
[
"Wang",
"Yilin",
""
],
[
"Li",
"Baoxin",
""
]
] | TITLE: Unsupervised Video Analysis Based on a Spatiotemporal Saliency Detector
ABSTRACT: Visual saliency, which predicts regions in the field of view that draw the
most visual attention, has attracted a lot of interest from researchers. It has
already been used in several vision tasks, e.g., image classification, object
detection, foreground segmentation. Recently, the spectrum analysis based
visual saliency approach has attracted a lot of interest due to its simplicity
and good performance, where the phase information of the image is used to
construct the saliency map. In this paper, we propose a new approach for
detecting spatiotemporal visual saliency based on the phase spectrum of the
videos, which is easy to implement and computationally efficient. With the
proposed algorithm, we also study how the spatiotemporal saliency can be used
in two important vision task, abnormality detection and spatiotemporal interest
point detection. The proposed algorithm is evaluated on several commonly used
datasets with comparison to the state-of-art methods from the literature. The
experiments demonstrate the effectiveness of the proposed approach to
spatiotemporal visual saliency detection and its application to the above
vision tasks
| no_new_dataset | 0.953622 |
1503.06952 | Maria-Carolina Monard MC | Jean Metz and Newton Spola\^or and Everton A. Cherman and Maria C.
Monard | Comparing published multi-label classifier performance measures to the
ones obtained by a simple multi-label baseline classifier | 19 pages, 8 figures, 7 tables | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In supervised learning, simple baseline classifiers can be constructed by
only looking at the class, i.e., ignoring any other information from the
dataset. The single-label learning community frequently uses as a reference the
one which always predicts the majority class. Although a classifier might
perform worse than this simple baseline classifier, this behaviour requires a
special explanation. Aiming to motivate the community to compare experimental
results with the ones provided by a multi-label baseline classifier, calling
the attention about the need of special explanations related to classifiers
which perform worse than the baseline, in this work we propose the use of
General_B, a multi-label baseline classifier. General_B was evaluated in
contrast to results published in the literature which were carefully selected
using a systematic review process. It was found that a considerable number of
published results on 10 frequently used datasets are worse than or equal to the
ones obtained by General_B, and for one dataset it reaches up to 43% of the
dataset published results. Moreover, although a simple baseline classifier was
not considered in these publications, it was observed that even for very poor
results no special explanations were provided in most of them. We hope that the
findings of this work would encourage the multi-label community to consider the
idea of using a simple baseline classifier, such that further explanations are
provided when a classifiers performs worse than a baseline.
| [
{
"version": "v1",
"created": "Tue, 24 Mar 2015 08:57:25 GMT"
}
] | 2015-03-25T00:00:00 | [
[
"Metz",
"Jean",
""
],
[
"Spolaôr",
"Newton",
""
],
[
"Cherman",
"Everton A.",
""
],
[
"Monard",
"Maria C.",
""
]
] | TITLE: Comparing published multi-label classifier performance measures to the
ones obtained by a simple multi-label baseline classifier
ABSTRACT: In supervised learning, simple baseline classifiers can be constructed by
only looking at the class, i.e., ignoring any other information from the
dataset. The single-label learning community frequently uses as a reference the
one which always predicts the majority class. Although a classifier might
perform worse than this simple baseline classifier, this behaviour requires a
special explanation. Aiming to motivate the community to compare experimental
results with the ones provided by a multi-label baseline classifier, calling
the attention about the need of special explanations related to classifiers
which perform worse than the baseline, in this work we propose the use of
General_B, a multi-label baseline classifier. General_B was evaluated in
contrast to results published in the literature which were carefully selected
using a systematic review process. It was found that a considerable number of
published results on 10 frequently used datasets are worse than or equal to the
ones obtained by General_B, and for one dataset it reaches up to 43% of the
dataset published results. Moreover, although a simple baseline classifier was
not considered in these publications, it was observed that even for very poor
results no special explanations were provided in most of them. We hope that the
findings of this work would encourage the multi-label community to consider the
idea of using a simple baseline classifier, such that further explanations are
provided when a classifiers performs worse than a baseline.
| no_new_dataset | 0.949482 |
1503.06962 | Andrew Simpson | Andrew J.R. Simpson | Probabilistic Binary-Mask Cocktail-Party Source Separation in a
Convolutional Deep Neural Network | null | null | null | null | cs.SD cs.LG cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Separation of competing speech is a key challenge in signal processing and a
feat routinely performed by the human auditory brain. A long standing benchmark
of the spectrogram approach to source separation is known as the ideal binary
mask. Here, we train a convolutional deep neural network, on a two-speaker
cocktail party problem, to make probabilistic predictions about binary masks.
Our results approach ideal binary mask performance, illustrating that
relatively simple deep neural networks are capable of robust binary mask
prediction. We also illustrate the trade-off between prediction statistics and
separation quality.
| [
{
"version": "v1",
"created": "Tue, 24 Mar 2015 09:34:51 GMT"
}
] | 2015-03-25T00:00:00 | [
[
"Simpson",
"Andrew J. R.",
""
]
] | TITLE: Probabilistic Binary-Mask Cocktail-Party Source Separation in a
Convolutional Deep Neural Network
ABSTRACT: Separation of competing speech is a key challenge in signal processing and a
feat routinely performed by the human auditory brain. A long standing benchmark
of the spectrogram approach to source separation is known as the ideal binary
mask. Here, we train a convolutional deep neural network, on a two-speaker
cocktail party problem, to make probabilistic predictions about binary masks.
Our results approach ideal binary mask performance, illustrating that
relatively simple deep neural networks are capable of robust binary mask
prediction. We also illustrate the trade-off between prediction statistics and
separation quality.
| no_new_dataset | 0.945197 |
1308.4568 | Cem Tekin | Cem Tekin and Mihaela van der Schaar | Distributed Online Learning via Cooperative Contextual Bandits | null | null | null | null | cs.LG stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we propose a novel framework for decentralized, online learning
by many learners. At each moment of time, an instance characterized by a
certain context may arrive to each learner; based on the context, the learner
can select one of its own actions (which gives a reward and provides
information) or request assistance from another learner. In the latter case,
the requester pays a cost and receives the reward but the provider learns the
information. In our framework, learners are modeled as cooperative contextual
bandits. Each learner seeks to maximize the expected reward from its arrivals,
which involves trading off the reward received from its own actions, the
information learned from its own actions, the reward received from the actions
requested of others and the cost paid for these actions - taking into account
what it has learned about the value of assistance from each other learner. We
develop distributed online learning algorithms and provide analytic bounds to
compare the efficiency of these with algorithms with the complete knowledge
(oracle) benchmark (in which the expected reward of every action in every
context is known by every learner). Our estimates show that regret - the loss
incurred by the algorithm - is sublinear in time. Our theoretical framework can
be used in many practical applications including Big Data mining, event
detection in surveillance sensor networks and distributed online recommendation
systems.
| [
{
"version": "v1",
"created": "Wed, 21 Aug 2013 13:28:43 GMT"
},
{
"version": "v2",
"created": "Sun, 25 Aug 2013 14:19:28 GMT"
},
{
"version": "v3",
"created": "Sat, 19 Apr 2014 09:40:06 GMT"
},
{
"version": "v4",
"created": "Mon, 23 Mar 2015 14:06:27 GMT"
}
] | 2015-03-24T00:00:00 | [
[
"Tekin",
"Cem",
""
],
[
"van der Schaar",
"Mihaela",
""
]
] | TITLE: Distributed Online Learning via Cooperative Contextual Bandits
ABSTRACT: In this paper we propose a novel framework for decentralized, online learning
by many learners. At each moment of time, an instance characterized by a
certain context may arrive to each learner; based on the context, the learner
can select one of its own actions (which gives a reward and provides
information) or request assistance from another learner. In the latter case,
the requester pays a cost and receives the reward but the provider learns the
information. In our framework, learners are modeled as cooperative contextual
bandits. Each learner seeks to maximize the expected reward from its arrivals,
which involves trading off the reward received from its own actions, the
information learned from its own actions, the reward received from the actions
requested of others and the cost paid for these actions - taking into account
what it has learned about the value of assistance from each other learner. We
develop distributed online learning algorithms and provide analytic bounds to
compare the efficiency of these with algorithms with the complete knowledge
(oracle) benchmark (in which the expected reward of every action in every
context is known by every learner). Our estimates show that regret - the loss
incurred by the algorithm - is sublinear in time. Our theoretical framework can
be used in many practical applications including Big Data mining, event
detection in surveillance sensor networks and distributed online recommendation
systems.
| no_new_dataset | 0.948822 |
1406.4877 | David Martins de Matos | Francisco Raposo, Ricardo Ribeiro, David Martins de Matos | On the Application of Generic Summarization Algorithms to Music | 12 pages, 1 table; Submitted to IEEE Signal Processing Letters | IEEE Signal Processing Letters, IEEE, vol. 22, n. 1, January 2015 | 10.1109/LSP.2014.2347582 | null | cs.IR cs.LG cs.SD | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Several generic summarization algorithms were developed in the past and
successfully applied in fields such as text and speech summarization. In this
paper, we review and apply these algorithms to music. To evaluate this
summarization's performance, we adopt an extrinsic approach: we compare a Fado
Genre Classifier's performance using truncated contiguous clips against the
summaries extracted with those algorithms on 2 different datasets. We show that
Maximal Marginal Relevance (MMR), LexRank and Latent Semantic Analysis (LSA)
all improve classification performance in both datasets used for testing.
| [
{
"version": "v1",
"created": "Wed, 18 Jun 2014 20:10:22 GMT"
}
] | 2015-03-24T00:00:00 | [
[
"Raposo",
"Francisco",
""
],
[
"Ribeiro",
"Ricardo",
""
],
[
"de Matos",
"David Martins",
""
]
] | TITLE: On the Application of Generic Summarization Algorithms to Music
ABSTRACT: Several generic summarization algorithms were developed in the past and
successfully applied in fields such as text and speech summarization. In this
paper, we review and apply these algorithms to music. To evaluate this
summarization's performance, we adopt an extrinsic approach: we compare a Fado
Genre Classifier's performance using truncated contiguous clips against the
summaries extracted with those algorithms on 2 different datasets. We show that
Maximal Marginal Relevance (MMR), LexRank and Latent Semantic Analysis (LSA)
all improve classification performance in both datasets used for testing.
| no_new_dataset | 0.950824 |
1412.6572 | Ian Goodfellow | Ian J. Goodfellow, Jonathon Shlens, Christian Szegedy | Explaining and Harnessing Adversarial Examples | null | null | null | null | stat.ML cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Several machine learning models, including neural networks, consistently
misclassify adversarial examples---inputs formed by applying small but
intentionally worst-case perturbations to examples from the dataset, such that
the perturbed input results in the model outputting an incorrect answer with
high confidence. Early attempts at explaining this phenomenon focused on
nonlinearity and overfitting. We argue instead that the primary cause of neural
networks' vulnerability to adversarial perturbation is their linear nature.
This explanation is supported by new quantitative results while giving the
first explanation of the most intriguing fact about them: their generalization
across architectures and training sets. Moreover, this view yields a simple and
fast method of generating adversarial examples. Using this approach to provide
examples for adversarial training, we reduce the test set error of a maxout
network on the MNIST dataset.
| [
{
"version": "v1",
"created": "Sat, 20 Dec 2014 01:17:12 GMT"
},
{
"version": "v2",
"created": "Wed, 25 Feb 2015 17:25:05 GMT"
},
{
"version": "v3",
"created": "Fri, 20 Mar 2015 20:19:16 GMT"
}
] | 2015-03-24T00:00:00 | [
[
"Goodfellow",
"Ian J.",
""
],
[
"Shlens",
"Jonathon",
""
],
[
"Szegedy",
"Christian",
""
]
] | TITLE: Explaining and Harnessing Adversarial Examples
ABSTRACT: Several machine learning models, including neural networks, consistently
misclassify adversarial examples---inputs formed by applying small but
intentionally worst-case perturbations to examples from the dataset, such that
the perturbed input results in the model outputting an incorrect answer with
high confidence. Early attempts at explaining this phenomenon focused on
nonlinearity and overfitting. We argue instead that the primary cause of neural
networks' vulnerability to adversarial perturbation is their linear nature.
This explanation is supported by new quantitative results while giving the
first explanation of the most intriguing fact about them: their generalization
across architectures and training sets. Moreover, this view yields a simple and
fast method of generating adversarial examples. Using this approach to provide
examples for adversarial training, we reduce the test set error of a maxout
network on the MNIST dataset.
| no_new_dataset | 0.951278 |
1503.03562 | Zhiyong Cheng | Zhiyong Cheng, Daniel Soudry, Zexi Mao, Zhenzhong Lan | Training Binary Multilayer Neural Networks for Image Classification
using Expectation Backpropagation | 8 pages with 1 figures and 4 tables | null | null | null | cs.NE cs.CV cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Compared to Multilayer Neural Networks with real weights, Binary Multilayer
Neural Networks (BMNNs) can be implemented more efficiently on dedicated
hardware. BMNNs have been demonstrated to be effective on binary classification
tasks with Expectation BackPropagation (EBP) algorithm on high dimensional text
datasets. In this paper, we investigate the capability of BMNNs using the EBP
algorithm on multiclass image classification tasks. The performances of binary
neural networks with multiple hidden layers and different numbers of hidden
units are examined on MNIST. We also explore the effectiveness of image spatial
filters and the dropout technique in BMNNs. Experimental results on MNIST
dataset show that EBP can obtain 2.12% test error with binary weights and 1.66%
test error with real weights, which is comparable to the results of standard
BackPropagation algorithm on fully connected MNNs.
| [
{
"version": "v1",
"created": "Thu, 12 Mar 2015 02:24:31 GMT"
},
{
"version": "v2",
"created": "Fri, 13 Mar 2015 01:32:15 GMT"
},
{
"version": "v3",
"created": "Sun, 22 Mar 2015 21:47:56 GMT"
}
] | 2015-03-24T00:00:00 | [
[
"Cheng",
"Zhiyong",
""
],
[
"Soudry",
"Daniel",
""
],
[
"Mao",
"Zexi",
""
],
[
"Lan",
"Zhenzhong",
""
]
] | TITLE: Training Binary Multilayer Neural Networks for Image Classification
using Expectation Backpropagation
ABSTRACT: Compared to Multilayer Neural Networks with real weights, Binary Multilayer
Neural Networks (BMNNs) can be implemented more efficiently on dedicated
hardware. BMNNs have been demonstrated to be effective on binary classification
tasks with Expectation BackPropagation (EBP) algorithm on high dimensional text
datasets. In this paper, we investigate the capability of BMNNs using the EBP
algorithm on multiclass image classification tasks. The performances of binary
neural networks with multiple hidden layers and different numbers of hidden
units are examined on MNIST. We also explore the effectiveness of image spatial
filters and the dropout technique in BMNNs. Experimental results on MNIST
dataset show that EBP can obtain 2.12% test error with binary weights and 1.66%
test error with real weights, which is comparable to the results of standard
BackPropagation algorithm on fully connected MNNs.
| no_new_dataset | 0.950595 |
1503.06239 | Jinye Zhang | Jinye Zhang, Zhijian Ou | Block-Wise MAP Inference for Determinantal Point Processes with
Application to Change-Point Detection | null | null | null | null | cs.LG cs.AI stat.ME stat.ML | http://creativecommons.org/licenses/by/3.0/ | Existing MAP inference algorithms for determinantal point processes (DPPs)
need to calculate determinants or conduct eigenvalue decomposition generally at
the scale of the full kernel, which presents a great challenge for real-world
applications. In this paper, we introduce a class of DPPs, called BwDPPs, that
are characterized by an almost block diagonal kernel matrix and thus can allow
efficient block-wise MAP inference. Furthermore, BwDPPs are successfully
applied to address the difficulty of selecting change-points in the problem of
change-point detection (CPD), which results in a new BwDPP-based CPD method,
named BwDppCpd. In BwDppCpd, a preliminary set of change-point candidates is
first created based on existing well-studied metrics. Then, these change-point
candidates are treated as DPP items, and DPP-based subset selection is
conducted to give the final estimate of the change-points that favours both
quality and diversity. The effectiveness of BwDppCpd is demonstrated through
extensive experiments on five real-world datasets.
| [
{
"version": "v1",
"created": "Fri, 20 Mar 2015 22:01:45 GMT"
}
] | 2015-03-24T00:00:00 | [
[
"Zhang",
"Jinye",
""
],
[
"Ou",
"Zhijian",
""
]
] | TITLE: Block-Wise MAP Inference for Determinantal Point Processes with
Application to Change-Point Detection
ABSTRACT: Existing MAP inference algorithms for determinantal point processes (DPPs)
need to calculate determinants or conduct eigenvalue decomposition generally at
the scale of the full kernel, which presents a great challenge for real-world
applications. In this paper, we introduce a class of DPPs, called BwDPPs, that
are characterized by an almost block diagonal kernel matrix and thus can allow
efficient block-wise MAP inference. Furthermore, BwDPPs are successfully
applied to address the difficulty of selecting change-points in the problem of
change-point detection (CPD), which results in a new BwDPP-based CPD method,
named BwDppCpd. In BwDppCpd, a preliminary set of change-point candidates is
first created based on existing well-studied metrics. Then, these change-point
candidates are treated as DPP items, and DPP-based subset selection is
conducted to give the final estimate of the change-points that favours both
quality and diversity. The effectiveness of BwDppCpd is demonstrated through
extensive experiments on five real-world datasets.
| no_new_dataset | 0.941385 |
1503.06250 | Ilya Safro | Talayeh Razzaghi and Oleg Roderick and Ilya Safro and Nick Marko | Fast Imbalanced Classification of Healthcare Data with Missing Values | null | null | null | null | stat.ML cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In medical domain, data features often contain missing values. This can
create serious bias in the predictive modeling. Typical standard data mining
methods often produce poor performance measures. In this paper, we propose a
new method to simultaneously classify large datasets and reduce the effects of
missing values. The proposed method is based on a multilevel framework of the
cost-sensitive SVM and the expected maximization imputation method for missing
values, which relies on iterated regression analyses. We compare classification
results of multilevel SVM-based algorithms on public benchmark datasets with
imbalanced classes and missing values as well as real data in health
applications, and show that our multilevel SVM-based method produces fast, and
more accurate and robust classification results.
| [
{
"version": "v1",
"created": "Sat, 21 Mar 2015 00:13:54 GMT"
}
] | 2015-03-24T00:00:00 | [
[
"Razzaghi",
"Talayeh",
""
],
[
"Roderick",
"Oleg",
""
],
[
"Safro",
"Ilya",
""
],
[
"Marko",
"Nick",
""
]
] | TITLE: Fast Imbalanced Classification of Healthcare Data with Missing Values
ABSTRACT: In medical domain, data features often contain missing values. This can
create serious bias in the predictive modeling. Typical standard data mining
methods often produce poor performance measures. In this paper, we propose a
new method to simultaneously classify large datasets and reduce the effects of
missing values. The proposed method is based on a multilevel framework of the
cost-sensitive SVM and the expected maximization imputation method for missing
values, which relies on iterated regression analyses. We compare classification
results of multilevel SVM-based algorithms on public benchmark datasets with
imbalanced classes and missing values as well as real data in health
applications, and show that our multilevel SVM-based method produces fast, and
more accurate and robust classification results.
| no_new_dataset | 0.950641 |
1503.06271 | Mina Ghashami | Mina Ghashami and Amirali Abdullah | Binary Coding in Stream | 5 figures, 9 pages | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Big data is becoming ever more ubiquitous, ranging over massive video
repositories, document corpuses, image sets and Internet routing history.
Proximity search and clustering are two algorithmic primitives fundamental to
data analysis, but suffer from the "curse of dimensionality" on these gigantic
datasets. A popular attack for this problem is to convert object
representations into short binary codewords, while approximately preserving
near neighbor structure. However, there has been limited research on
constructing codewords in the "streaming" or "online" settings often applicable
to this scale of data, where one may only make a single pass over data too
massive to fit in local memory.
In this paper, we apply recent advances in matrix sketching techniques to
construct binary codewords in both streaming and online setting. Our
experimental results compete outperform several of the most popularly used
algorithms, and we prove theoretical guarantees on performance in the streaming
setting under mild assumptions on the data and randomness of the training set.
| [
{
"version": "v1",
"created": "Sat, 21 Mar 2015 06:25:02 GMT"
}
] | 2015-03-24T00:00:00 | [
[
"Ghashami",
"Mina",
""
],
[
"Abdullah",
"Amirali",
""
]
] | TITLE: Binary Coding in Stream
ABSTRACT: Big data is becoming ever more ubiquitous, ranging over massive video
repositories, document corpuses, image sets and Internet routing history.
Proximity search and clustering are two algorithmic primitives fundamental to
data analysis, but suffer from the "curse of dimensionality" on these gigantic
datasets. A popular attack for this problem is to convert object
representations into short binary codewords, while approximately preserving
near neighbor structure. However, there has been limited research on
constructing codewords in the "streaming" or "online" settings often applicable
to this scale of data, where one may only make a single pass over data too
massive to fit in local memory.
In this paper, we apply recent advances in matrix sketching techniques to
construct binary codewords in both streaming and online setting. Our
experimental results compete outperform several of the most popularly used
algorithms, and we prove theoretical guarantees on performance in the streaming
setting under mild assumptions on the data and randomness of the training set.
| no_new_dataset | 0.943504 |
1503.06301 | Kamalakar Karlapalem | Yash Gupta and Kamalakar Karlapalem | Effective Handling of Urgent Jobs - Speed Up Scheduling for Computing
Applications | Paper covering main contributions from MS Thesis of Yash Gupta
http://web2py.iiit.ac.in/research_centres/publications/view_publication/mastersthesis/247
- presented in ACM format | null | null | MS Thesis Number IIIT/TH/2014/7 | cs.PF | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A queue is required when a service provider is not able to handle jobs
arriving over the time. In a highly flexible and dynamic environment, some jobs
might demand for faster execution at run-time especially when the resources are
limited and the jobs are competing for acquiring resources. A user might demand
for speed up (reduced wait time) for some of the jobs present in the queue at
run time. In such cases, it is required to accelerate (directly sending the job
to the server) urgent jobs (requesting for speed up) ahead of other jobs
present in the queue for an earlier completion of urgent jobs. Under the
assumption of no additional resources, such acceleration of jobs would result
in slowing down of other jobs present in the queue. In this paper, we formulate
the problem of Speed Up Scheduling without acquiring any additional resources
for the scheduling of on-line speed up requests posed by a user at run-time and
present algorithms for the same. We apply the idea of Speed Up Scheduling to
two different domains -Web Scheduling and CPU Scheduling. We demonstrate our
results with a simulation based model using trace driven workload and synthetic
datasets to show the usefulness of Speed Up scheduling. Speed Up provides a new
way of addressing urgent jobs, provides a different evaluation criteria for
comparing scheduling algorithms and has practical applications.
| [
{
"version": "v1",
"created": "Sat, 21 Mar 2015 13:51:48 GMT"
}
] | 2015-03-24T00:00:00 | [
[
"Gupta",
"Yash",
""
],
[
"Karlapalem",
"Kamalakar",
""
]
] | TITLE: Effective Handling of Urgent Jobs - Speed Up Scheduling for Computing
Applications
ABSTRACT: A queue is required when a service provider is not able to handle jobs
arriving over the time. In a highly flexible and dynamic environment, some jobs
might demand for faster execution at run-time especially when the resources are
limited and the jobs are competing for acquiring resources. A user might demand
for speed up (reduced wait time) for some of the jobs present in the queue at
run time. In such cases, it is required to accelerate (directly sending the job
to the server) urgent jobs (requesting for speed up) ahead of other jobs
present in the queue for an earlier completion of urgent jobs. Under the
assumption of no additional resources, such acceleration of jobs would result
in slowing down of other jobs present in the queue. In this paper, we formulate
the problem of Speed Up Scheduling without acquiring any additional resources
for the scheduling of on-line speed up requests posed by a user at run-time and
present algorithms for the same. We apply the idea of Speed Up Scheduling to
two different domains -Web Scheduling and CPU Scheduling. We demonstrate our
results with a simulation based model using trace driven workload and synthetic
datasets to show the usefulness of Speed Up scheduling. Speed Up provides a new
way of addressing urgent jobs, provides a different evaluation criteria for
comparing scheduling algorithms and has practical applications.
| no_new_dataset | 0.949623 |
1503.06350 | Nikolaos Karianakis | Nikolaos Karianakis, Thomas J. Fuchs and Stefano Soatto | Boosting Convolutional Features for Robust Object Proposals | 9 pages, 4 figures, 2 tables, 42 references | null | null | null | cs.CV cs.AI cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Deep Convolutional Neural Networks (CNNs) have demonstrated excellent
performance in image classification, but still show room for improvement in
object-detection tasks with many categories, in particular for cluttered scenes
and occlusion. Modern detection algorithms like Regions with CNNs (Girshick et
al., 2014) rely on Selective Search (Uijlings et al., 2013) to propose regions
which with high probability represent objects, where in turn CNNs are deployed
for classification. Selective Search represents a family of sophisticated
algorithms that are engineered with multiple segmentation, appearance and
saliency cues, typically coming with a significant run-time overhead.
Furthermore, (Hosang et al., 2014) have shown that most methods suffer from low
reproducibility due to unstable superpixels, even for slight image
perturbations. Although CNNs are subsequently used for classification in
top-performing object-detection pipelines, current proposal methods are
agnostic to how these models parse objects and their rich learned
representations. As a result they may propose regions which may not resemble
high-level objects or totally miss some of them. To overcome these drawbacks we
propose a boosting approach which directly takes advantage of hierarchical CNN
features for detecting regions of interest fast. We demonstrate its performance
on ImageNet 2013 detection benchmark and compare it with state-of-the-art
methods.
| [
{
"version": "v1",
"created": "Sat, 21 Mar 2015 20:54:39 GMT"
}
] | 2015-03-24T00:00:00 | [
[
"Karianakis",
"Nikolaos",
""
],
[
"Fuchs",
"Thomas J.",
""
],
[
"Soatto",
"Stefano",
""
]
] | TITLE: Boosting Convolutional Features for Robust Object Proposals
ABSTRACT: Deep Convolutional Neural Networks (CNNs) have demonstrated excellent
performance in image classification, but still show room for improvement in
object-detection tasks with many categories, in particular for cluttered scenes
and occlusion. Modern detection algorithms like Regions with CNNs (Girshick et
al., 2014) rely on Selective Search (Uijlings et al., 2013) to propose regions
which with high probability represent objects, where in turn CNNs are deployed
for classification. Selective Search represents a family of sophisticated
algorithms that are engineered with multiple segmentation, appearance and
saliency cues, typically coming with a significant run-time overhead.
Furthermore, (Hosang et al., 2014) have shown that most methods suffer from low
reproducibility due to unstable superpixels, even for slight image
perturbations. Although CNNs are subsequently used for classification in
top-performing object-detection pipelines, current proposal methods are
agnostic to how these models parse objects and their rich learned
representations. As a result they may propose regions which may not resemble
high-level objects or totally miss some of them. To overcome these drawbacks we
propose a boosting approach which directly takes advantage of hierarchical CNN
features for detecting regions of interest fast. We demonstrate its performance
on ImageNet 2013 detection benchmark and compare it with state-of-the-art
methods.
| no_new_dataset | 0.944944 |
1503.06424 | Juan Juli\'an Merelo-Guerv\'os Pr. | Juan Juli\'an Merelo-Guerv\'os, Pablo Garc\'ia-S\'anchez | Modeling browser-based distributed evolutionary computation systems | Technical report | null | null | null | cs.DC cs.NE cs.NI | http://creativecommons.org/licenses/by-nc-sa/3.0/ | From the era of big science we are back to the "do it yourself", where you do
not have any money to buy clusters or subscribe to grids but still have
algorithms that crave many computing nodes and need them to measure
scalability. Fortunately, this coincides with the era of big data, cloud
computing, and browsers that include JavaScript virtual machines. Those are the
reasons why this paper will focus on two different aspects of volunteer or
freeriding computing: first, the pragmatic: where to find those resources,
which ones can be used, what kind of support you have to give them; and then,
the theoretical: how evolutionary algorithms can be adapted to an environment
in which nodes come and go, have different computing capabilities and operate
in complete asynchrony of each other. We will examine the setup needed to
create a very simple distributed evolutionary algorithm using JavaScript and
then find a model of how users react to it by collecting data from several
experiments featuring different classical benchmark functions.
| [
{
"version": "v1",
"created": "Sun, 22 Mar 2015 13:20:57 GMT"
}
] | 2015-03-24T00:00:00 | [
[
"Merelo-Guervós",
"Juan Julián",
""
],
[
"García-Sánchez",
"Pablo",
""
]
] | TITLE: Modeling browser-based distributed evolutionary computation systems
ABSTRACT: From the era of big science we are back to the "do it yourself", where you do
not have any money to buy clusters or subscribe to grids but still have
algorithms that crave many computing nodes and need them to measure
scalability. Fortunately, this coincides with the era of big data, cloud
computing, and browsers that include JavaScript virtual machines. Those are the
reasons why this paper will focus on two different aspects of volunteer or
freeriding computing: first, the pragmatic: where to find those resources,
which ones can be used, what kind of support you have to give them; and then,
the theoretical: how evolutionary algorithms can be adapted to an environment
in which nodes come and go, have different computing capabilities and operate
in complete asynchrony of each other. We will examine the setup needed to
create a very simple distributed evolutionary algorithm using JavaScript and
then find a model of how users react to it by collecting data from several
experiments featuring different classical benchmark functions.
| no_new_dataset | 0.939192 |
1503.06549 | Lydia Fischer | Lydia Fischer, Barbara Hammer and Heiko Wersing | Optimum Reject Options for Prototype-based Classification | 19 pages | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We analyse optimum reject strategies for prototype-based classifiers and
real-valued rejection measures, using the distance of a data point to the
closest prototype or probabilistic counterparts. We compare reject schemes with
global thresholds, and local thresholds for the Voronoi cells of the
classifier. For the latter, we develop a polynomial-time algorithm to compute
optimum thresholds based on a dynamic programming scheme, and we propose an
intuitive linear time, memory efficient approximation thereof with competitive
accuracy. Evaluating the performance in various benchmarks, we conclude that
local reject options are beneficial in particular for simple prototype-based
classifiers, while the improvement is less pronounced for advanced models. For
the latter, an accuracy-reject curve which is comparable to support vector
machine classifiers with state of the art reject options can be reached.
| [
{
"version": "v1",
"created": "Mon, 23 Mar 2015 08:19:17 GMT"
}
] | 2015-03-24T00:00:00 | [
[
"Fischer",
"Lydia",
""
],
[
"Hammer",
"Barbara",
""
],
[
"Wersing",
"Heiko",
""
]
] | TITLE: Optimum Reject Options for Prototype-based Classification
ABSTRACT: We analyse optimum reject strategies for prototype-based classifiers and
real-valued rejection measures, using the distance of a data point to the
closest prototype or probabilistic counterparts. We compare reject schemes with
global thresholds, and local thresholds for the Voronoi cells of the
classifier. For the latter, we develop a polynomial-time algorithm to compute
optimum thresholds based on a dynamic programming scheme, and we propose an
intuitive linear time, memory efficient approximation thereof with competitive
accuracy. Evaluating the performance in various benchmarks, we conclude that
local reject options are beneficial in particular for simple prototype-based
classifiers, while the improvement is less pronounced for advanced models. For
the latter, an accuracy-reject curve which is comparable to support vector
machine classifiers with state of the art reject options can be reached.
| no_new_dataset | 0.949763 |
1503.06555 | Debajyoti Mukhopadhyay Prof. | Sumitkumar Kanoje, Sheetal Girase, Debajyoti Mukhopadhyay | User Profiling for Recommendation System | 5 pages, 5 figures, 5 tables | null | null | null | cs.IR cs.HC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Recommendation system is a type of information filtering systems that
recommend various objects from a vast variety and quantity of items which are
of the user interest. This results in guiding an individual in personalized way
to interesting or useful objects in a large space of possible options. Such
systems also help many businesses to achieve more profits to sustain in their
filed against their rivals. But looking at the amount of information which a
business holds it becomes difficult to identify the items of user interest.
Therefore personalization or user profiling is one of the challenging tasks
that give access to user relevant information which can be used in solving the
difficult task of classification and ranking items according to an individuals
interest. Profiling can be done in various ways such assupervised or
unsupervised, individual or group profiling, distributive or and non
distributive profiling. Our focus in this paper will be on the dataset which we
will use, we identify some interesting facts by using Weka Tool that can be
used for recommending the items from dataset. Our aim is to present a novel
technique to achieve user profiling in recommendation system.
| [
{
"version": "v1",
"created": "Mon, 23 Mar 2015 08:47:35 GMT"
}
] | 2015-03-24T00:00:00 | [
[
"Kanoje",
"Sumitkumar",
""
],
[
"Girase",
"Sheetal",
""
],
[
"Mukhopadhyay",
"Debajyoti",
""
]
] | TITLE: User Profiling for Recommendation System
ABSTRACT: Recommendation system is a type of information filtering systems that
recommend various objects from a vast variety and quantity of items which are
of the user interest. This results in guiding an individual in personalized way
to interesting or useful objects in a large space of possible options. Such
systems also help many businesses to achieve more profits to sustain in their
filed against their rivals. But looking at the amount of information which a
business holds it becomes difficult to identify the items of user interest.
Therefore personalization or user profiling is one of the challenging tasks
that give access to user relevant information which can be used in solving the
difficult task of classification and ranking items according to an individuals
interest. Profiling can be done in various ways such assupervised or
unsupervised, individual or group profiling, distributive or and non
distributive profiling. Our focus in this paper will be on the dataset which we
will use, we identify some interesting facts by using Weka Tool that can be
used for recommending the items from dataset. Our aim is to present a novel
technique to achieve user profiling in recommendation system.
| no_new_dataset | 0.955651 |
1503.06562 | Debajyoti Mukhopadhyay Prof. | Dheeraj kumar Bokde, Sheetal Girase, Debajyoti Mukhopadhyay | An Item-Based Collaborative Filtering using Dimensionality Reduction
Techniques on Mahout Framework | 6 pages, 4 figures, 3 tables | null | null | null | cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Collaborative Filtering is the most widely used prediction technique in
Recommendation System. Most of the current CF recommender systems maintains
single criteria user rating in user item matrix. However, recent studies
indicate that recommender system depending on multi criteria can improve
prediction and accuracy levels of recommendation by considering the user
preferences in multi aspects of items. This gives birth to Multi Criteria
Collaborative Filtering. In MC CF users provide the rating on multiple aspects
of an item in new dimensions,thereby increasing the size of rating matrix,
sparsity and scalability problem. Appropriate dimensionality reduction
techniques are thus needed to take care of these challenges to reduce the
dimension of user item rating matrix to improve the prediction accuracy and
efficiency of CF recommender system. The process of dimensionality reduction
maps the high dimensional input space into lower dimensional space. Thus, the
objective of this paper is to propose an efficient MC CF algorithm using
dimensionality reduction technique to improve the recommendation quality and
prediction accuracy. Dimensionality reduction techniques such as Singular Value
Decomposition and Principal Component Analysis are used to solve the
scalability and alleviate the sparsity problems in overall rating. The proposed
MC CF approach will be implemented using Apache Mahout, which allows processing
of massive dataset stored in distributed/non-distributed file system.
| [
{
"version": "v1",
"created": "Mon, 23 Mar 2015 09:09:07 GMT"
}
] | 2015-03-24T00:00:00 | [
[
"Bokde",
"Dheeraj kumar",
""
],
[
"Girase",
"Sheetal",
""
],
[
"Mukhopadhyay",
"Debajyoti",
""
]
] | TITLE: An Item-Based Collaborative Filtering using Dimensionality Reduction
Techniques on Mahout Framework
ABSTRACT: Collaborative Filtering is the most widely used prediction technique in
Recommendation System. Most of the current CF recommender systems maintains
single criteria user rating in user item matrix. However, recent studies
indicate that recommender system depending on multi criteria can improve
prediction and accuracy levels of recommendation by considering the user
preferences in multi aspects of items. This gives birth to Multi Criteria
Collaborative Filtering. In MC CF users provide the rating on multiple aspects
of an item in new dimensions,thereby increasing the size of rating matrix,
sparsity and scalability problem. Appropriate dimensionality reduction
techniques are thus needed to take care of these challenges to reduce the
dimension of user item rating matrix to improve the prediction accuracy and
efficiency of CF recommender system. The process of dimensionality reduction
maps the high dimensional input space into lower dimensional space. Thus, the
objective of this paper is to propose an efficient MC CF algorithm using
dimensionality reduction technique to improve the recommendation quality and
prediction accuracy. Dimensionality reduction techniques such as Singular Value
Decomposition and Principal Component Analysis are used to solve the
scalability and alleviate the sparsity problems in overall rating. The proposed
MC CF approach will be implemented using Apache Mahout, which allows processing
of massive dataset stored in distributed/non-distributed file system.
| no_new_dataset | 0.950732 |
1503.06575 | Sanja Brdar | Sanja Brdar, Katarina Gavric, Dubravko Culibrk, Vladimir Crnojevic | Unveiling Spatial Epidemiology of HIV with Mobile Phone Data | 13 pages, 4 figures, 2 tables | null | null | null | stat.AP cs.CY cs.SI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | An increasing amount of geo-referenced mobile phone data enables the
identification of behavioral patterns, habits and movements of people. With
this data, we can extract the knowledge potentially useful for many
applications including the one tackled in this study - understanding spatial
variation of epidemics. We explored the datasets collected by a cell phone
service provider and linked them to spatial HIV prevalence rates estimated from
publicly available surveys. For that purpose, 224 features were extracted from
mobility and connectivity traces and related to the level of HIV epidemic in 50
Ivory Coast departments. By means of regression models, we evaluated predictive
ability of extracted features. Several models predicted HIV prevalence that are
highly correlated (>0.7) with actual values. Through contribution analysis we
identified key elements that impact the rate of infections. Our findings
indicate that night connectivity and activity, spatial area covered by users
and overall migrations are strongly linked to HIV. By visualizing the
communication and mobility flows, we strived to explain the spatial structure
of epidemics. We discovered that strong ties and hubs in communication and
mobility align with HIV hot spots.
| [
{
"version": "v1",
"created": "Mon, 23 Mar 2015 09:47:16 GMT"
}
] | 2015-03-24T00:00:00 | [
[
"Brdar",
"Sanja",
""
],
[
"Gavric",
"Katarina",
""
],
[
"Culibrk",
"Dubravko",
""
],
[
"Crnojevic",
"Vladimir",
""
]
] | TITLE: Unveiling Spatial Epidemiology of HIV with Mobile Phone Data
ABSTRACT: An increasing amount of geo-referenced mobile phone data enables the
identification of behavioral patterns, habits and movements of people. With
this data, we can extract the knowledge potentially useful for many
applications including the one tackled in this study - understanding spatial
variation of epidemics. We explored the datasets collected by a cell phone
service provider and linked them to spatial HIV prevalence rates estimated from
publicly available surveys. For that purpose, 224 features were extracted from
mobility and connectivity traces and related to the level of HIV epidemic in 50
Ivory Coast departments. By means of regression models, we evaluated predictive
ability of extracted features. Several models predicted HIV prevalence that are
highly correlated (>0.7) with actual values. Through contribution analysis we
identified key elements that impact the rate of infections. Our findings
indicate that night connectivity and activity, spatial area covered by users
and overall migrations are strongly linked to HIV. By visualizing the
communication and mobility flows, we strived to explain the spatial structure
of epidemics. We discovered that strong ties and hubs in communication and
mobility align with HIV hot spots.
| no_new_dataset | 0.942823 |
1503.06643 | Mrinal Haloi | Mrinal Haloi | A novel pLSA based Traffic Signs Classification System | APMediaCast-2015, Bali, Indonesia | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this work we developed a novel and fast traffic sign recognition system, a
very important part for advanced driver assistance system and for autonomous
driving. Traffic signs play a very vital role in safe driving and avoiding
accident. We have used image processing and topic discovery model pLSA to
tackle this challenging multiclass classification problem. Our algorithm is
consist of two parts, shape classification and sign classification for improved
accuracy. For processing and representation of image we have used bag of
features model with SIFT local descriptor. Where a visual vocabulary of size
300 words are formed using k-means codebook formation algorithm. We exploited
the concept that every image is a collection of visual topics and images having
same topics will belong to same category. Our algorithm is tested on German
traffic sign recognition benchmark (GTSRB) and gives very promising result near
to existing state of the art techniques.
| [
{
"version": "v1",
"created": "Mon, 23 Mar 2015 14:10:44 GMT"
}
] | 2015-03-24T00:00:00 | [
[
"Haloi",
"Mrinal",
""
]
] | TITLE: A novel pLSA based Traffic Signs Classification System
ABSTRACT: In this work we developed a novel and fast traffic sign recognition system, a
very important part for advanced driver assistance system and for autonomous
driving. Traffic signs play a very vital role in safe driving and avoiding
accident. We have used image processing and topic discovery model pLSA to
tackle this challenging multiclass classification problem. Our algorithm is
consist of two parts, shape classification and sign classification for improved
accuracy. For processing and representation of image we have used bag of
features model with SIFT local descriptor. Where a visual vocabulary of size
300 words are formed using k-means codebook formation algorithm. We exploited
the concept that every image is a collection of visual topics and images having
same topics will belong to same category. Our algorithm is tested on German
traffic sign recognition benchmark (GTSRB) and gives very promising result near
to existing state of the art techniques.
| no_new_dataset | 0.949389 |
1503.05947 | Yanlai Chen | Yanlai Chen | Reduced Basis Decomposition: a Certified and Fast Lossy Data Compression
Algorithm | null | null | null | null | math.NA cs.AI cs.CV cs.NA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Dimension reduction is often needed in the area of data mining. The goal of
these methods is to map the given high-dimensional data into a low-dimensional
space preserving certain properties of the initial data. There are two kinds of
techniques for this purpose. The first, projective methods, builds an explicit
linear projection from the high-dimensional space to the low-dimensional one.
On the other hand, the nonlinear methods utilizes nonlinear and implicit
mapping between the two spaces. In both cases, the methods considered in
literature have usually relied on computationally very intensive matrix
factorizations, frequently the Singular Value Decomposition (SVD). The
computational burden of SVD quickly renders these dimension reduction methods
infeasible thanks to the ever-increasing sizes of the practical datasets.
In this paper, we present a new decomposition strategy, Reduced Basis
Decomposition (RBD), which is inspired by the Reduced Basis Method (RBM). Given
$X$ the high-dimensional data, the method approximates it by $Y \, T (\approx
X)$ with $Y$ being the low-dimensional surrogate and $T$ the transformation
matrix. $Y$ is obtained through a greedy algorithm thus extremely efficient. In
fact, it is significantly faster than SVD with comparable accuracy. $T$ can be
computed on the fly. Moreover, unlike many compression algorithms, it easily
finds the mapping for an arbitrary ``out-of-sample'' vector and it comes with
an ``error indicator'' certifying the accuracy of the compression. Numerical
results are shown validating these claims.
| [
{
"version": "v1",
"created": "Thu, 19 Mar 2015 21:10:57 GMT"
}
] | 2015-03-23T00:00:00 | [
[
"Chen",
"Yanlai",
""
]
] | TITLE: Reduced Basis Decomposition: a Certified and Fast Lossy Data Compression
Algorithm
ABSTRACT: Dimension reduction is often needed in the area of data mining. The goal of
these methods is to map the given high-dimensional data into a low-dimensional
space preserving certain properties of the initial data. There are two kinds of
techniques for this purpose. The first, projective methods, builds an explicit
linear projection from the high-dimensional space to the low-dimensional one.
On the other hand, the nonlinear methods utilizes nonlinear and implicit
mapping between the two spaces. In both cases, the methods considered in
literature have usually relied on computationally very intensive matrix
factorizations, frequently the Singular Value Decomposition (SVD). The
computational burden of SVD quickly renders these dimension reduction methods
infeasible thanks to the ever-increasing sizes of the practical datasets.
In this paper, we present a new decomposition strategy, Reduced Basis
Decomposition (RBD), which is inspired by the Reduced Basis Method (RBM). Given
$X$ the high-dimensional data, the method approximates it by $Y \, T (\approx
X)$ with $Y$ being the low-dimensional surrogate and $T$ the transformation
matrix. $Y$ is obtained through a greedy algorithm thus extremely efficient. In
fact, it is significantly faster than SVD with comparable accuracy. $T$ can be
computed on the fly. Moreover, unlike many compression algorithms, it easily
finds the mapping for an arbitrary ``out-of-sample'' vector and it comes with
an ``error indicator'' certifying the accuracy of the compression. Numerical
results are shown validating these claims.
| no_new_dataset | 0.947332 |
1503.06007 | Man Hon Cheung | Man Hon Cheung, Richard Southwell, Fen Hou, and Jianwei Huang | Distributed Time-Sensitive Task Selection in Mobile Crowdsensing | null | null | null | null | cs.GT cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | With the rich set of embedded sensors installed in smartphones and the large
number of mobile users, we witness the emergence of many innovative commercial
mobile crowdsensing applications that combine the power of mobile technology
with crowdsourcing to deliver time-sensitive and location-dependent information
to their customers. Motivated by these real-world applications, we consider the
task selection problem for heterogeneous users with different initial
locations, movement costs, movement speeds, and reputation levels. Computing
the social surplus maximization task allocation turns out to be an NP-hard
problem. Hence we focus on the distributed case, and propose an asynchronous
and distributed task selection (ADTS) algorithm to help the users plan their
task selections on their own. We prove the convergence of the algorithm, and
further characterize the computation time for users' updates in the algorithm.
Simulation results suggest that the ADTS scheme achieves the highest Jain's
fairness index and coverage comparing with several benchmark algorithms, while
yielding similar user payoff to a greedy centralized benchmark. Finally, we
illustrate how mobile users coordinate under the ADTS scheme based on some
practical movement time data derived from Google Maps.
| [
{
"version": "v1",
"created": "Fri, 20 Mar 2015 07:05:31 GMT"
}
] | 2015-03-23T00:00:00 | [
[
"Cheung",
"Man Hon",
""
],
[
"Southwell",
"Richard",
""
],
[
"Hou",
"Fen",
""
],
[
"Huang",
"Jianwei",
""
]
] | TITLE: Distributed Time-Sensitive Task Selection in Mobile Crowdsensing
ABSTRACT: With the rich set of embedded sensors installed in smartphones and the large
number of mobile users, we witness the emergence of many innovative commercial
mobile crowdsensing applications that combine the power of mobile technology
with crowdsourcing to deliver time-sensitive and location-dependent information
to their customers. Motivated by these real-world applications, we consider the
task selection problem for heterogeneous users with different initial
locations, movement costs, movement speeds, and reputation levels. Computing
the social surplus maximization task allocation turns out to be an NP-hard
problem. Hence we focus on the distributed case, and propose an asynchronous
and distributed task selection (ADTS) algorithm to help the users plan their
task selections on their own. We prove the convergence of the algorithm, and
further characterize the computation time for users' updates in the algorithm.
Simulation results suggest that the ADTS scheme achieves the highest Jain's
fairness index and coverage comparing with several benchmark algorithms, while
yielding similar user payoff to a greedy centralized benchmark. Finally, we
illustrate how mobile users coordinate under the ADTS scheme based on some
practical movement time data derived from Google Maps.
| no_new_dataset | 0.947381 |
1503.06095 | Amy Felty | Amy P. Felty, Alberto Momigliano and Brigitte Pientka | The Next 700 Challenge Problems for Reasoning with Higher-Order Abstract
Syntax Representations: Part 1-A Common Infrastructure for Benchmarks | 42 pages, 5 figures | null | null | null | cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A variety of logical frameworks support the use of higher-order abstract
syntax (HOAS) in representing formal systems. Although these systems seem
superficially the same, they differ in a variety of ways; for example, how they
handle a context of assumptions and which theorems about a given formal system
can be concisely expressed and proved. Our contributions in this paper are
three-fold: 1) we develop a common infrastructure for representing benchmarks
for systems supporting reasoning with binders, 2) we present several concrete
benchmarks, which highlight a variety of different aspects of reasoning within
a context of assumptions, and 3) we design an open repository ORBI, (Open
challenge problem Repository for systems supporting reasoning with BInders).
Our work sets the stage for providing a basis for qualitative comparison of
different systems. This allows us to review and survey the state of the art,
which we do in great detail for four systems in Part 2 of this paper (Felty et
al, 2015). It also allows us to outline future fundamental research questions
regarding the design and implementation of meta-reasoning systems.
| [
{
"version": "v1",
"created": "Fri, 20 Mar 2015 14:54:15 GMT"
}
] | 2015-03-23T00:00:00 | [
[
"Felty",
"Amy P.",
""
],
[
"Momigliano",
"Alberto",
""
],
[
"Pientka",
"Brigitte",
""
]
] | TITLE: The Next 700 Challenge Problems for Reasoning with Higher-Order Abstract
Syntax Representations: Part 1-A Common Infrastructure for Benchmarks
ABSTRACT: A variety of logical frameworks support the use of higher-order abstract
syntax (HOAS) in representing formal systems. Although these systems seem
superficially the same, they differ in a variety of ways; for example, how they
handle a context of assumptions and which theorems about a given formal system
can be concisely expressed and proved. Our contributions in this paper are
three-fold: 1) we develop a common infrastructure for representing benchmarks
for systems supporting reasoning with binders, 2) we present several concrete
benchmarks, which highlight a variety of different aspects of reasoning within
a context of assumptions, and 3) we design an open repository ORBI, (Open
challenge problem Repository for systems supporting reasoning with BInders).
Our work sets the stage for providing a basis for qualitative comparison of
different systems. This allows us to review and survey the state of the art,
which we do in great detail for four systems in Part 2 of this paper (Felty et
al, 2015). It also allows us to outline future fundamental research questions
regarding the design and implementation of meta-reasoning systems.
| no_new_dataset | 0.942612 |
1201.4219 | Zhengfeng Yang | Zhengfeng Yang and Min Wu and Wang Lin | Exact Safety Verification of Hybrid Systems Based on Bilinear SOS
Representation | arXiv admin note: substantial text overlap with arXiv:1112.2328 | null | null | null | cs.SE cs.SC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we address the problem of safety verification of nonlinear
hybrid systems. A hybrid symbolic-numeric method is presented to compute exact
inequality invariants of hybrid systems efficiently. Some numerical invariants
of a hybrid system can be obtained by solving a bilinear SOS programming via
PENBMI solver or iterative method, then the modified Newton refinement and
rational vector recovery techniques are applied to obtain exact polynomial
invariants with rational coefficients, which {\it exactly} satisfy the
conditions of invariants. Experiments on some benchmarks are given to
illustrate the efficiency of our algorithm.
| [
{
"version": "v1",
"created": "Fri, 20 Jan 2012 07:09:20 GMT"
},
{
"version": "v2",
"created": "Tue, 25 Sep 2012 05:29:48 GMT"
}
] | 2015-03-20T00:00:00 | [
[
"Yang",
"Zhengfeng",
""
],
[
"Wu",
"Min",
""
],
[
"Lin",
"Wang",
""
]
] | TITLE: Exact Safety Verification of Hybrid Systems Based on Bilinear SOS
Representation
ABSTRACT: In this paper, we address the problem of safety verification of nonlinear
hybrid systems. A hybrid symbolic-numeric method is presented to compute exact
inequality invariants of hybrid systems efficiently. Some numerical invariants
of a hybrid system can be obtained by solving a bilinear SOS programming via
PENBMI solver or iterative method, then the modified Newton refinement and
rational vector recovery techniques are applied to obtain exact polynomial
invariants with rational coefficients, which {\it exactly} satisfy the
conditions of invariants. Experiments on some benchmarks are given to
illustrate the efficiency of our algorithm.
| no_new_dataset | 0.945751 |
1202.2369 | Georgios Zervas | John W. Byers, Michael Mitzenmacher, Georgios Zervas | The Groupon Effect on Yelp Ratings: A Root Cause Analysis | Submitted to ACM EC 2012 | null | null | null | cs.SI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Daily deals sites such as Groupon offer deeply discounted goods and services
to tens of millions of customers through geographically targeted daily e-mail
marketing campaigns. In our prior work we observed that a negative side effect
for merchants using Groupons is that, on average, their Yelp ratings decline
significantly. However, this previous work was essentially observational,
rather than explanatory. In this work, we rigorously consider and evaluate
various hypotheses about underlying consumer and merchant behavior in order to
understand this phenomenon, which we dub the Groupon effect. We use statistical
analysis and mathematical modeling, leveraging a dataset we collected spanning
tens of thousands of daily deals and over 7 million Yelp reviews. In
particular, we investigate hypotheses such as whether Groupon subscribers are
more critical than their peers, or whether some fraction of Groupon merchants
provide significantly worse service to customers using Groupons. We suggest an
additional novel hypothesis: reviews from Groupon subscribers are lower on
average because such reviews correspond to real, unbiased customers, while the
body of reviews on Yelp contain some fraction of reviews from biased or even
potentially fake sources. Although we focus on a specific question, our work
provides broad insights into both consumer and merchant behavior within the
daily deals marketplace.
| [
{
"version": "v1",
"created": "Fri, 10 Feb 2012 21:03:11 GMT"
}
] | 2015-03-20T00:00:00 | [
[
"Byers",
"John W.",
""
],
[
"Mitzenmacher",
"Michael",
""
],
[
"Zervas",
"Georgios",
""
]
] | TITLE: The Groupon Effect on Yelp Ratings: A Root Cause Analysis
ABSTRACT: Daily deals sites such as Groupon offer deeply discounted goods and services
to tens of millions of customers through geographically targeted daily e-mail
marketing campaigns. In our prior work we observed that a negative side effect
for merchants using Groupons is that, on average, their Yelp ratings decline
significantly. However, this previous work was essentially observational,
rather than explanatory. In this work, we rigorously consider and evaluate
various hypotheses about underlying consumer and merchant behavior in order to
understand this phenomenon, which we dub the Groupon effect. We use statistical
analysis and mathematical modeling, leveraging a dataset we collected spanning
tens of thousands of daily deals and over 7 million Yelp reviews. In
particular, we investigate hypotheses such as whether Groupon subscribers are
more critical than their peers, or whether some fraction of Groupon merchants
provide significantly worse service to customers using Groupons. We suggest an
additional novel hypothesis: reviews from Groupon subscribers are lower on
average because such reviews correspond to real, unbiased customers, while the
body of reviews on Yelp contain some fraction of reviews from biased or even
potentially fake sources. Although we focus on a specific question, our work
provides broad insights into both consumer and merchant behavior within the
daily deals marketplace.
| new_dataset | 0.958963 |
1203.0059 | Prasang Upadhyaya | Prasang Upadhyaya, Magdalena Balazinska, Dan Suciu | How to Price Shared Optimizations in the Cloud | VLDB2012 | Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 6, pp.
562-573 (2012) | null | null | cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Data-management-as-a-service systems are increasingly being used in
collaborative settings, where multiple users access common datasets. Cloud
providers have the choice to implement various optimizations, such as indexing
or materialized views, to accelerate queries over these datasets. Each
optimization carries a cost and may benefit multiple users. This creates a
major challenge: how to select which optimizations to perform and how to share
their cost among users. The problem is especially challenging when users are
selfish and will only report their true values for different optimizations if
doing so maximizes their utility. In this paper, we present a new approach for
selecting and pricing shared optimizations by using Mechanism Design. We first
show how to apply the Shapley Value Mechanism to the simple case of selecting
and pricing additive optimizations, assuming an offline game where all users
access the service for the same time-period. Second, we extend the approach to
online scenarios where users come and go. Finally, we consider the case of
substitutive optimizations. We show analytically that our mechanisms induce
truth- fulness and recover the optimization costs. We also show experimentally
that our mechanisms yield higher utility than the state-of-the-art approach
based on regret accumulation.
| [
{
"version": "v1",
"created": "Thu, 1 Mar 2012 00:17:40 GMT"
}
] | 2015-03-20T00:00:00 | [
[
"Upadhyaya",
"Prasang",
""
],
[
"Balazinska",
"Magdalena",
""
],
[
"Suciu",
"Dan",
""
]
] | TITLE: How to Price Shared Optimizations in the Cloud
ABSTRACT: Data-management-as-a-service systems are increasingly being used in
collaborative settings, where multiple users access common datasets. Cloud
providers have the choice to implement various optimizations, such as indexing
or materialized views, to accelerate queries over these datasets. Each
optimization carries a cost and may benefit multiple users. This creates a
major challenge: how to select which optimizations to perform and how to share
their cost among users. The problem is especially challenging when users are
selfish and will only report their true values for different optimizations if
doing so maximizes their utility. In this paper, we present a new approach for
selecting and pricing shared optimizations by using Mechanism Design. We first
show how to apply the Shapley Value Mechanism to the simple case of selecting
and pricing additive optimizations, assuming an offline game where all users
access the service for the same time-period. Second, we extend the approach to
online scenarios where users come and go. Finally, we consider the case of
substitutive optimizations. We show analytically that our mechanisms induce
truth- fulness and recover the optimization costs. We also show experimentally
that our mechanisms yield higher utility than the state-of-the-art approach
based on regret accumulation.
| no_new_dataset | 0.946151 |
1203.0453 | Song Liu Mr | Song Liu, Makoto Yamada, Nigel Collier, Masashi Sugiyama | Change-Point Detection in Time-Series Data by Relative Density-Ratio
Estimation | null | null | 10.1016/j.neunet.2013.01.012 | null | stat.ML cs.LG stat.ME | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The objective of change-point detection is to discover abrupt property
changes lying behind time-series data. In this paper, we present a novel
statistical change-point detection algorithm based on non-parametric divergence
estimation between time-series samples from two retrospective segments. Our
method uses the relative Pearson divergence as a divergence measure, and it is
accurately and efficiently estimated by a method of direct density-ratio
estimation. Through experiments on artificial and real-world datasets including
human-activity sensing, speech, and Twitter messages, we demonstrate the
usefulness of the proposed method.
| [
{
"version": "v1",
"created": "Fri, 2 Mar 2012 13:12:03 GMT"
},
{
"version": "v2",
"created": "Wed, 16 Jan 2013 06:44:58 GMT"
}
] | 2015-03-20T00:00:00 | [
[
"Liu",
"Song",
""
],
[
"Yamada",
"Makoto",
""
],
[
"Collier",
"Nigel",
""
],
[
"Sugiyama",
"Masashi",
""
]
] | TITLE: Change-Point Detection in Time-Series Data by Relative Density-Ratio
Estimation
ABSTRACT: The objective of change-point detection is to discover abrupt property
changes lying behind time-series data. In this paper, we present a novel
statistical change-point detection algorithm based on non-parametric divergence
estimation between time-series samples from two retrospective segments. Our
method uses the relative Pearson divergence as a divergence measure, and it is
accurately and efficiently estimated by a method of direct density-ratio
estimation. Through experiments on artificial and real-world datasets including
human-activity sensing, speech, and Twitter messages, we demonstrate the
usefulness of the proposed method.
| no_new_dataset | 0.953144 |
1203.3453 | Davide Proserpio | Davide Proserpio, Sharon Goldberg and Frank McSherry | Calibrating Data to Sensitivity in Private Data Analysis | 17 pages | Calibrating Data to Sensitivity in Private Data Analysis
Proserpio, Davide, Sharon Goldberg, and Frank McSherry. "Calibrating Data to
Sensitivity in Private Data Analysis." Proceedings of the VLDB Endowment 7.8
(2014) | null | null | cs.CR cs.SI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present an approach to differentially private computation in which one
does not scale up the magnitude of noise for challenging queries, but rather
scales down the contributions of challenging records. While scaling down all
records uniformly is equivalent to scaling up the noise magnitude, we show that
scaling records non-uniformly can result in substantially higher accuracy by
bypassing the worst-case requirements of differential privacy for the noise
magnitudes. This paper details the data analysis platform wPINQ, which
generalizes the Privacy Integrated Query (PINQ) to weighted datasets. Using a
few simple operators (including a non-uniformly scaling Join operator) wPINQ
can reproduce (and improve) several recent results on graph analysis and
introduce new generalizations (e.g., counting triangles with given degrees). We
also show how to integrate probabilistic inference techniques to synthesize
datasets respecting more complicated (and less easily interpreted)
measurements.
| [
{
"version": "v1",
"created": "Thu, 15 Mar 2012 19:45:04 GMT"
},
{
"version": "v2",
"created": "Fri, 10 May 2013 19:17:28 GMT"
},
{
"version": "v3",
"created": "Mon, 13 May 2013 02:36:12 GMT"
},
{
"version": "v4",
"created": "Thu, 13 Feb 2014 20:04:56 GMT"
},
{
"version": "v5",
"created": "Sun, 4 May 2014 20:20:24 GMT"
}
] | 2015-03-20T00:00:00 | [
[
"Proserpio",
"Davide",
""
],
[
"Goldberg",
"Sharon",
""
],
[
"McSherry",
"Frank",
""
]
] | TITLE: Calibrating Data to Sensitivity in Private Data Analysis
ABSTRACT: We present an approach to differentially private computation in which one
does not scale up the magnitude of noise for challenging queries, but rather
scales down the contributions of challenging records. While scaling down all
records uniformly is equivalent to scaling up the noise magnitude, we show that
scaling records non-uniformly can result in substantially higher accuracy by
bypassing the worst-case requirements of differential privacy for the noise
magnitudes. This paper details the data analysis platform wPINQ, which
generalizes the Privacy Integrated Query (PINQ) to weighted datasets. Using a
few simple operators (including a non-uniformly scaling Join operator) wPINQ
can reproduce (and improve) several recent results on graph analysis and
introduce new generalizations (e.g., counting triangles with given degrees). We
also show how to integrate probabilistic inference techniques to synthesize
datasets respecting more complicated (and less easily interpreted)
measurements.
| no_new_dataset | 0.947381 |
1203.3744 | Stelvio Cimato | Carlo Blundo and Stelvio Cimato | Constrained Role Mining | null | null | null | null | cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Role Based Access Control (RBAC) is a very popular access control model, for
long time investigated and widely deployed in the security architecture of
different enterprises. To implement RBAC, roles have to be firstly identified
within the considered organization. Usually the process of (automatically)
defining the roles in a bottom up way, starting from the permissions assigned
to each user, is called {\it role mining}. In literature, the role mining
problem has been formally analyzed and several techniques have been proposed in
order to obtain a set of valid roles.
Recently, the problem of defining different kind of constraints on the number
and the size of the roles included in the resulting role set has been
addressed. In this paper we provide a formal definition of the role mining
problem under the cardinality constraint, i.e. restricting the maximum number
of permissions that can be included in a role. We discuss formally the
computational complexity of the problem and propose a novel heuristic.
Furthermore we present experimental results obtained after the application of
the proposed heuristic on both real and synthetic datasets, and compare the
resulting performance to previous proposals
| [
{
"version": "v1",
"created": "Fri, 16 Mar 2012 15:46:06 GMT"
}
] | 2015-03-20T00:00:00 | [
[
"Blundo",
"Carlo",
""
],
[
"Cimato",
"Stelvio",
""
]
] | TITLE: Constrained Role Mining
ABSTRACT: Role Based Access Control (RBAC) is a very popular access control model, for
long time investigated and widely deployed in the security architecture of
different enterprises. To implement RBAC, roles have to be firstly identified
within the considered organization. Usually the process of (automatically)
defining the roles in a bottom up way, starting from the permissions assigned
to each user, is called {\it role mining}. In literature, the role mining
problem has been formally analyzed and several techniques have been proposed in
order to obtain a set of valid roles.
Recently, the problem of defining different kind of constraints on the number
and the size of the roles included in the resulting role set has been
addressed. In this paper we provide a formal definition of the role mining
problem under the cardinality constraint, i.e. restricting the maximum number
of permissions that can be included in a role. We discuss formally the
computational complexity of the problem and propose a novel heuristic.
Furthermore we present experimental results obtained after the application of
the proposed heuristic on both real and synthetic datasets, and compare the
resulting performance to previous proposals
| no_new_dataset | 0.948298 |
1203.4903 | Edith Cohen | Edith Cohen | Distance Queries from Sampled Data: Accurate and Efficient | 13 pages; This is a full version of a KDD 2014 paper | null | null | null | cs.DS cs.DB math.ST stat.TH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Distance queries are a basic tool in data analysis. They are used for
detection and localization of change for the purpose of anomaly detection,
monitoring, or planning. Distance queries are particularly useful when data
sets such as measurements, snapshots of a system, content, traffic matrices,
and activity logs are collected repeatedly.
Random sampling, which can be efficiently performed over streamed or
distributed data, is an important tool for scalable data analysis. The sample
constitutes an extremely flexible summary, which naturally supports domain
queries and scalable estimation of statistics, which can be specified after the
sample is generated. The effectiveness of a sample as a summary, however,
hinges on the estimators we have.
We derive novel estimators for estimating $L_p$ distance from sampled data.
Our estimators apply with the most common weighted sampling schemes: Poisson
Probability Proportional to Size (PPS) and its fixed sample size variants. They
also apply when the samples of different data sets are independent or
coordinated. Our estimators are admissible (Pareto optimal in terms of
variance) and have compelling properties.
We study the performance of our Manhattan and Euclidean distance ($p=1,2$)
estimators on diverse datasets, demonstrating scalability and accuracy even
when a small fraction of the data is sampled. Our work, for the first time,
facilitates effective distance estimation over sampled data.
| [
{
"version": "v1",
"created": "Thu, 22 Mar 2012 08:06:09 GMT"
},
{
"version": "v2",
"created": "Fri, 15 Feb 2013 20:10:58 GMT"
},
{
"version": "v3",
"created": "Sun, 8 Jun 2014 13:06:42 GMT"
}
] | 2015-03-20T00:00:00 | [
[
"Cohen",
"Edith",
""
]
] | TITLE: Distance Queries from Sampled Data: Accurate and Efficient
ABSTRACT: Distance queries are a basic tool in data analysis. They are used for
detection and localization of change for the purpose of anomaly detection,
monitoring, or planning. Distance queries are particularly useful when data
sets such as measurements, snapshots of a system, content, traffic matrices,
and activity logs are collected repeatedly.
Random sampling, which can be efficiently performed over streamed or
distributed data, is an important tool for scalable data analysis. The sample
constitutes an extremely flexible summary, which naturally supports domain
queries and scalable estimation of statistics, which can be specified after the
sample is generated. The effectiveness of a sample as a summary, however,
hinges on the estimators we have.
We derive novel estimators for estimating $L_p$ distance from sampled data.
Our estimators apply with the most common weighted sampling schemes: Poisson
Probability Proportional to Size (PPS) and its fixed sample size variants. They
also apply when the samples of different data sets are independent or
coordinated. Our estimators are admissible (Pareto optimal in terms of
variance) and have compelling properties.
We study the performance of our Manhattan and Euclidean distance ($p=1,2$)
estimators on diverse datasets, demonstrating scalability and accuracy even
when a small fraction of the data is sampled. Our work, for the first time,
facilitates effective distance estimation over sampled data.
| no_new_dataset | 0.939471 |
1203.5126 | VIkas Kawadia | Vikas Kawadia and Sameet Sreenivasan | Online detection of temporal communities in evolving networks by
estrangement confinement | null | Scientific Reports 2, Article number: 794, Mar 2012 | 10.1038/srep00794 | null | cs.SI cond-mat.stat-mech physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Temporal communities result from a consistent partitioning of nodes across
multiple snapshots of an evolving complex network that can help uncover how
dense clusters in a network emerge, combine, split and decay with time. Current
methods for finding communities in a single snapshot are not straightforwardly
generalizable to finding temporal communities since the quality functions used
for finding static communities have highly degenerate landscapes, and the
eventual partition chosen among the many partitions of similar quality is
highly sensitive to small changes in the network. To reliably detect temporal
communities we need not only to find a good community partition in a given
snapshot but also ensure that it bears some similarity to the partition(s)
found in immediately preceding snapshots. We present a new measure of partition
distance called "estrangement" motivated by the inertia of inter-node
relationships which, when incorporated into the measurement of partition
quality, facilitates the detection of meaningful temporal communities.
Specifically, we propose the estrangement confinement method, which postulates
that neighboring nodes in a community prefer to continue to share community
affiliation as the network evolves. Constraining estrangement enables us to
find meaningful temporal communities at various degrees of temporal smoothness
in diverse real-world datasets. Specifically, we study the evolution of voting
behavior of senators in the United States Congress, the evolution of proximity
in human mobility datasets, and the detection of evolving communities in
synthetic networks that are otherwise hard to find. Estrangement confinement
thus provides a principled approach to uncovering temporal communities in
evolving networks.
| [
{
"version": "v1",
"created": "Thu, 22 Mar 2012 21:03:28 GMT"
}
] | 2015-03-20T00:00:00 | [
[
"Kawadia",
"Vikas",
""
],
[
"Sreenivasan",
"Sameet",
""
]
] | TITLE: Online detection of temporal communities in evolving networks by
estrangement confinement
ABSTRACT: Temporal communities result from a consistent partitioning of nodes across
multiple snapshots of an evolving complex network that can help uncover how
dense clusters in a network emerge, combine, split and decay with time. Current
methods for finding communities in a single snapshot are not straightforwardly
generalizable to finding temporal communities since the quality functions used
for finding static communities have highly degenerate landscapes, and the
eventual partition chosen among the many partitions of similar quality is
highly sensitive to small changes in the network. To reliably detect temporal
communities we need not only to find a good community partition in a given
snapshot but also ensure that it bears some similarity to the partition(s)
found in immediately preceding snapshots. We present a new measure of partition
distance called "estrangement" motivated by the inertia of inter-node
relationships which, when incorporated into the measurement of partition
quality, facilitates the detection of meaningful temporal communities.
Specifically, we propose the estrangement confinement method, which postulates
that neighboring nodes in a community prefer to continue to share community
affiliation as the network evolves. Constraining estrangement enables us to
find meaningful temporal communities at various degrees of temporal smoothness
in diverse real-world datasets. Specifically, we study the evolution of voting
behavior of senators in the United States Congress, the evolution of proximity
in human mobility datasets, and the detection of evolving communities in
synthetic networks that are otherwise hard to find. Estrangement confinement
thus provides a principled approach to uncovering temporal communities in
evolving networks.
| no_new_dataset | 0.94801 |
1203.6744 | Matteo Zignani | Sabrina Gaito, Matteo Zignani, Gian Paolo Rossi, Alessandra Sala, Xiao
Wang, Haitao Zheng and Ben Y. Zhao | On the Bursty Evolution of Online Social Networks | 13 pages, 7 figures | null | null | null | cs.SI physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The high level of dynamics in today's online social networks (OSNs) creates
new challenges for their infrastructures and providers. In particular, dynamics
involving edge creation has direct implications on strategies for resource
allocation, data partitioning and replication. Understanding network dynamics
in the context of physical time is a critical first step towards a predictive
approach towards infrastructure management in OSNs. Despite increasing efforts
to study social network dynamics, current analyses mainly focus on change over
time of static metrics computed on snapshots of social graphs. The limited
prior work models network dynamics with respect to a logical clock. In this
paper, we present results of analyzing a large timestamped dataset describing
the initial growth and evolution of Renren, the leading social network in
China. We analyze and model the burstiness of link creation process, using the
second derivative, i.e. the acceleration of the degree. This allows us to
detect bursts, and to characterize the social activity of a OSN user as one of
four phases: acceleration at the beginning of an activity burst, where link
creation rate is increasing; deceleration when burst is ending and link
creation process is slowing; cruising, when node activity is in a steady state,
and complete inactivity.
| [
{
"version": "v1",
"created": "Fri, 30 Mar 2012 08:49:22 GMT"
},
{
"version": "v2",
"created": "Fri, 25 May 2012 12:21:48 GMT"
}
] | 2015-03-20T00:00:00 | [
[
"Gaito",
"Sabrina",
""
],
[
"Zignani",
"Matteo",
""
],
[
"Rossi",
"Gian Paolo",
""
],
[
"Sala",
"Alessandra",
""
],
[
"Wang",
"Xiao",
""
],
[
"Zheng",
"Haitao",
""
],
[
"Zhao",
"Ben Y.",
""
]
] | TITLE: On the Bursty Evolution of Online Social Networks
ABSTRACT: The high level of dynamics in today's online social networks (OSNs) creates
new challenges for their infrastructures and providers. In particular, dynamics
involving edge creation has direct implications on strategies for resource
allocation, data partitioning and replication. Understanding network dynamics
in the context of physical time is a critical first step towards a predictive
approach towards infrastructure management in OSNs. Despite increasing efforts
to study social network dynamics, current analyses mainly focus on change over
time of static metrics computed on snapshots of social graphs. The limited
prior work models network dynamics with respect to a logical clock. In this
paper, we present results of analyzing a large timestamped dataset describing
the initial growth and evolution of Renren, the leading social network in
China. We analyze and model the burstiness of link creation process, using the
second derivative, i.e. the acceleration of the degree. This allows us to
detect bursts, and to characterize the social activity of a OSN user as one of
four phases: acceleration at the beginning of an activity burst, where link
creation rate is increasing; deceleration when burst is ending and link
creation process is slowing; cruising, when node activity is in a steady state,
and complete inactivity.
| no_new_dataset | 0.95275 |
1205.0042 | Mateusz Ujma | Mateusz Ujma, Nastaran Shafiei | jpf-concurrent: An extension of Java PathFinder for java.util.concurrent | null | null | null | null | cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | One of the main challenges when verifying multi-threaded Java applications is
the state space explosion problem. Due to thread interleavings, the number of
states that the model checker has to verify can grow rapidly and impede the
feasibility of verification. In the Java language, the source of thread
interleavings can be the system under test as well as the Java Development Kit
(JDK) itself. In our paper, we propose a method to minimize the state space
explosion problem for applications verified under the Java PathFinder (JPF)
model checker. Our method is based on abstracting the state of the application
to a smaller domain and implementing application behavior using the Model Java
Interface (MJI) of JPF. To show the capabilities of our approach, we have
created a JPF extension called jpf-concurrent which abstracts classes from the
Java Concurrency Utilities. Several benchmarks proved the usefulness of our
approach. In all cases, our implementation was faster than the JDK
implementation when running under the JPF model checker. Moreover, our
implementation led to significantly smaller state spaces.
| [
{
"version": "v1",
"created": "Mon, 30 Apr 2012 22:08:39 GMT"
}
] | 2015-03-20T00:00:00 | [
[
"Ujma",
"Mateusz",
""
],
[
"Shafiei",
"Nastaran",
""
]
] | TITLE: jpf-concurrent: An extension of Java PathFinder for java.util.concurrent
ABSTRACT: One of the main challenges when verifying multi-threaded Java applications is
the state space explosion problem. Due to thread interleavings, the number of
states that the model checker has to verify can grow rapidly and impede the
feasibility of verification. In the Java language, the source of thread
interleavings can be the system under test as well as the Java Development Kit
(JDK) itself. In our paper, we propose a method to minimize the state space
explosion problem for applications verified under the Java PathFinder (JPF)
model checker. Our method is based on abstracting the state of the application
to a smaller domain and implementing application behavior using the Model Java
Interface (MJI) of JPF. To show the capabilities of our approach, we have
created a JPF extension called jpf-concurrent which abstracts classes from the
Java Concurrency Utilities. Several benchmarks proved the usefulness of our
approach. In all cases, our implementation was faster than the JDK
implementation when running under the JPF model checker. Moreover, our
implementation led to significantly smaller state spaces.
| no_new_dataset | 0.932515 |
1205.0192 | Anthony J Cox | Anthony J. Cox, Markus J. Bauer, Tobias Jakobi and Giovanna Rosone | Large-scale compression of genomic sequence databases with the
Burrows-Wheeler transform | Version here is as submitted to Bioinformatics and is same as the
previously archived version. This submission registers the fact that the
advanced access version is now available at
http://bioinformatics.oxfordjournals.org/content/early/2012/05/02/bioinformatics.bts173.abstract
. Bioinformatics should be considered as the original place of publication of
this article, please cite accordingly | null | 10.1093/bioinformatics/bts173 | null | cs.DS q-bio.GN | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Motivation
The Burrows-Wheeler transform (BWT) is the foundation of many algorithms for
compression and indexing of text data, but the cost of computing the BWT of
very large string collections has prevented these techniques from being widely
applied to the large sets of sequences often encountered as the outcome of DNA
sequencing experiments. In previous work, we presented a novel algorithm that
allows the BWT of human genome scale data to be computed on very moderate
hardware, thus enabling us to investigate the BWT as a tool for the compression
of such datasets.
Results
We first used simulated reads to explore the relationship between the level
of compression and the error rate, the length of the reads and the level of
sampling of the underlying genome and compare choices of second-stage
compression algorithm.
We demonstrate that compression may be greatly improved by a particular
reordering of the sequences in the collection and give a novel `implicit
sorting' strategy that enables these benefits to be realised without the
overhead of sorting the reads. With these techniques, a 45x coverage of real
human genome sequence data compresses losslessly to under 0.5 bits per base,
allowing the 135.3Gbp of sequence to fit into only 8.2Gbytes of space (trimming
a small proportion of low-quality bases from the reads improves the compression
still further).
This is more than 4 times smaller than the size achieved by a standard
BWT-based compressor (bzip2) on the untrimmed reads, but an important further
advantage of our approach is that it facilitates the building of compressed
full text indexes such as the FM-index on large-scale DNA sequence collections.
| [
{
"version": "v1",
"created": "Tue, 1 May 2012 15:39:50 GMT"
},
{
"version": "v2",
"created": "Fri, 11 May 2012 11:22:55 GMT"
}
] | 2015-03-20T00:00:00 | [
[
"Cox",
"Anthony J.",
""
],
[
"Bauer",
"Markus J.",
""
],
[
"Jakobi",
"Tobias",
""
],
[
"Rosone",
"Giovanna",
""
]
] | TITLE: Large-scale compression of genomic sequence databases with the
Burrows-Wheeler transform
ABSTRACT: Motivation
The Burrows-Wheeler transform (BWT) is the foundation of many algorithms for
compression and indexing of text data, but the cost of computing the BWT of
very large string collections has prevented these techniques from being widely
applied to the large sets of sequences often encountered as the outcome of DNA
sequencing experiments. In previous work, we presented a novel algorithm that
allows the BWT of human genome scale data to be computed on very moderate
hardware, thus enabling us to investigate the BWT as a tool for the compression
of such datasets.
Results
We first used simulated reads to explore the relationship between the level
of compression and the error rate, the length of the reads and the level of
sampling of the underlying genome and compare choices of second-stage
compression algorithm.
We demonstrate that compression may be greatly improved by a particular
reordering of the sequences in the collection and give a novel `implicit
sorting' strategy that enables these benefits to be realised without the
overhead of sorting the reads. With these techniques, a 45x coverage of real
human genome sequence data compresses losslessly to under 0.5 bits per base,
allowing the 135.3Gbp of sequence to fit into only 8.2Gbytes of space (trimming
a small proportion of low-quality bases from the reads improves the compression
still further).
This is more than 4 times smaller than the size achieved by a standard
BWT-based compressor (bzip2) on the untrimmed reads, but an important further
advantage of our approach is that it facilitates the building of compressed
full text indexes such as the FM-index on large-scale DNA sequence collections.
| no_new_dataset | 0.940298 |
1205.2584 | Anh Huy Phan | Anh Huy Phan and Petr Tichavsk\'y and Andrzej Cichocki | Low Complexity Damped Gauss-Newton Algorithms for CANDECOMP/PARAFAC | null | null | null | null | cs.NA cs.LG math.OC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The damped Gauss-Newton (dGN) algorithm for CANDECOMP/PARAFAC (CP)
decomposition can handle the challenges of collinearity of factors and
different magnitudes of factors; nevertheless, for factorization of an $N$-D
tensor of size $I_1\times I_N$ with rank $R$, the algorithm is computationally
demanding due to construction of large approximate Hessian of size $(RT \times
RT)$ and its inversion where $T = \sum_n I_n$. In this paper, we propose a fast
implementation of the dGN algorithm which is based on novel expressions of the
inverse approximate Hessian in block form. The new implementation has lower
computational complexity, besides computation of the gradient (this part is
common to both methods), requiring the inversion of a matrix of size
$NR^2\times NR^2$, which is much smaller than the whole approximate Hessian, if
$T \gg NR$. In addition, the implementation has lower memory requirements,
because neither the Hessian nor its inverse never need to be stored in their
entirety. A variant of the algorithm working with complex valued data is
proposed as well. Complexity and performance of the proposed algorithm is
compared with those of dGN and ALS with line search on examples of difficult
benchmark tensors.
| [
{
"version": "v1",
"created": "Fri, 11 May 2012 17:26:21 GMT"
},
{
"version": "v2",
"created": "Thu, 13 Sep 2012 03:14:12 GMT"
}
] | 2015-03-20T00:00:00 | [
[
"Phan",
"Anh Huy",
""
],
[
"Tichavský",
"Petr",
""
],
[
"Cichocki",
"Andrzej",
""
]
] | TITLE: Low Complexity Damped Gauss-Newton Algorithms for CANDECOMP/PARAFAC
ABSTRACT: The damped Gauss-Newton (dGN) algorithm for CANDECOMP/PARAFAC (CP)
decomposition can handle the challenges of collinearity of factors and
different magnitudes of factors; nevertheless, for factorization of an $N$-D
tensor of size $I_1\times I_N$ with rank $R$, the algorithm is computationally
demanding due to construction of large approximate Hessian of size $(RT \times
RT)$ and its inversion where $T = \sum_n I_n$. In this paper, we propose a fast
implementation of the dGN algorithm which is based on novel expressions of the
inverse approximate Hessian in block form. The new implementation has lower
computational complexity, besides computation of the gradient (this part is
common to both methods), requiring the inversion of a matrix of size
$NR^2\times NR^2$, which is much smaller than the whole approximate Hessian, if
$T \gg NR$. In addition, the implementation has lower memory requirements,
because neither the Hessian nor its inverse never need to be stored in their
entirety. A variant of the algorithm working with complex valued data is
proposed as well. Complexity and performance of the proposed algorithm is
compared with those of dGN and ALS with line search on examples of difficult
benchmark tensors.
| no_new_dataset | 0.938576 |
1205.2663 | Ot\'avio Penatti | Otavio A. B. Penatti, Eduardo Valle, Ricardo da S. Torres | Are visual dictionaries generalizable? | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Mid-level features based on visual dictionaries are today a cornerstone of
systems for classification and retrieval of images. Those state-of-the-art
representations depend crucially on the choice of a codebook (visual
dictionary), which is usually derived from the dataset. In general-purpose,
dynamic image collections (e.g., the Web), one cannot have the entire
collection in order to extract a representative dictionary. However, based on
the hypothesis that the dictionary reflects only the diversity of low-level
appearances and does not capture semantics, we argue that a dictionary based on
a small subset of the data, or even on an entirely different dataset, is able
to produce a good representation, provided that the chosen images span a
diverse enough portion of the low-level feature space. Our experiments confirm
that hypothesis, opening the opportunity to greatly alleviate the burden in
generating the codebook, and confirming the feasibility of employing visual
dictionaries in large-scale dynamic environments.
| [
{
"version": "v1",
"created": "Fri, 11 May 2012 18:54:12 GMT"
}
] | 2015-03-20T00:00:00 | [
[
"Penatti",
"Otavio A. B.",
""
],
[
"Valle",
"Eduardo",
""
],
[
"Torres",
"Ricardo da S.",
""
]
] | TITLE: Are visual dictionaries generalizable?
ABSTRACT: Mid-level features based on visual dictionaries are today a cornerstone of
systems for classification and retrieval of images. Those state-of-the-art
representations depend crucially on the choice of a codebook (visual
dictionary), which is usually derived from the dataset. In general-purpose,
dynamic image collections (e.g., the Web), one cannot have the entire
collection in order to extract a representative dictionary. However, based on
the hypothesis that the dictionary reflects only the diversity of low-level
appearances and does not capture semantics, we argue that a dictionary based on
a small subset of the data, or even on an entirely different dataset, is able
to produce a good representation, provided that the chosen images span a
diverse enough portion of the low-level feature space. Our experiments confirm
that hypothesis, opening the opportunity to greatly alleviate the burden in
generating the codebook, and confirming the feasibility of employing visual
dictionaries in large-scale dynamic environments.
| no_new_dataset | 0.948251 |
1205.3109 | Arthur Guez | Arthur Guez and David Silver and Peter Dayan | Efficient Bayes-Adaptive Reinforcement Learning using Sample-Based
Search | 14 pages, 7 figures, includes supplementary material. Advances in
Neural Information Processing Systems (NIPS) 2012 | (2012) Advances in Neural Information Processing Systems 25, pages
1034-1042 | null | null | cs.LG cs.AI stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Bayesian model-based reinforcement learning is a formally elegant approach to
learning optimal behaviour under model uncertainty, trading off exploration and
exploitation in an ideal way. Unfortunately, finding the resulting
Bayes-optimal policies is notoriously taxing, since the search space becomes
enormous. In this paper we introduce a tractable, sample-based method for
approximate Bayes-optimal planning which exploits Monte-Carlo tree search. Our
approach outperformed prior Bayesian model-based RL algorithms by a significant
margin on several well-known benchmark problems -- because it avoids expensive
applications of Bayes rule within the search tree by lazily sampling models
from the current beliefs. We illustrate the advantages of our approach by
showing it working in an infinite state space domain which is qualitatively out
of reach of almost all previous work in Bayesian exploration.
| [
{
"version": "v1",
"created": "Mon, 14 May 2012 17:20:29 GMT"
},
{
"version": "v2",
"created": "Sat, 13 Oct 2012 15:19:09 GMT"
},
{
"version": "v3",
"created": "Thu, 3 Jan 2013 14:44:59 GMT"
},
{
"version": "v4",
"created": "Wed, 18 Dec 2013 11:45:49 GMT"
}
] | 2015-03-20T00:00:00 | [
[
"Guez",
"Arthur",
""
],
[
"Silver",
"David",
""
],
[
"Dayan",
"Peter",
""
]
] | TITLE: Efficient Bayes-Adaptive Reinforcement Learning using Sample-Based
Search
ABSTRACT: Bayesian model-based reinforcement learning is a formally elegant approach to
learning optimal behaviour under model uncertainty, trading off exploration and
exploitation in an ideal way. Unfortunately, finding the resulting
Bayes-optimal policies is notoriously taxing, since the search space becomes
enormous. In this paper we introduce a tractable, sample-based method for
approximate Bayes-optimal planning which exploits Monte-Carlo tree search. Our
approach outperformed prior Bayesian model-based RL algorithms by a significant
margin on several well-known benchmark problems -- because it avoids expensive
applications of Bayes rule within the search tree by lazily sampling models
from the current beliefs. We illustrate the advantages of our approach by
showing it working in an infinite state space domain which is qualitatively out
of reach of almost all previous work in Bayesian exploration.
| no_new_dataset | 0.94868 |
1205.4776 | Ilknur Icke | Ilknur Icke and Andrew Rosenberg | Visual and semantic interpretability of projections of high dimensional
data for classification tasks | Longer version of the VAST 2011 poster.
http://dx.doi.org/10.1109/VAST.2011.6102474 | null | 10.1109/VAST.2011.6102474 | null | cs.HC cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A number of visual quality measures have been introduced in visual analytics
literature in order to automatically select the best views of high dimensional
data from a large number of candidate data projections. These methods generally
concentrate on the interpretability of the visualization and pay little
attention to the interpretability of the projection axes. In this paper, we
argue that interpretability of the visualizations and the feature
transformation functions are both crucial for visual exploration of high
dimensional labeled data. We present a two-part user study to examine these two
related but orthogonal aspects of interpretability. We first study how humans
judge the quality of 2D scatterplots of various datasets with varying number of
classes and provide comparisons with ten automated measures, including a number
of visual quality measures and related measures from various machine learning
fields. We then investigate how the user perception on interpretability of
mathematical expressions relate to various automated measures of complexity
that can be used to characterize data projection functions. We conclude with a
discussion of how automated measures of visual and semantic interpretability of
data projections can be used together for exploratory analysis in
classification tasks.
| [
{
"version": "v1",
"created": "Tue, 22 May 2012 00:10:45 GMT"
}
] | 2015-03-20T00:00:00 | [
[
"Icke",
"Ilknur",
""
],
[
"Rosenberg",
"Andrew",
""
]
] | TITLE: Visual and semantic interpretability of projections of high dimensional
data for classification tasks
ABSTRACT: A number of visual quality measures have been introduced in visual analytics
literature in order to automatically select the best views of high dimensional
data from a large number of candidate data projections. These methods generally
concentrate on the interpretability of the visualization and pay little
attention to the interpretability of the projection axes. In this paper, we
argue that interpretability of the visualizations and the feature
transformation functions are both crucial for visual exploration of high
dimensional labeled data. We present a two-part user study to examine these two
related but orthogonal aspects of interpretability. We first study how humans
judge the quality of 2D scatterplots of various datasets with varying number of
classes and provide comparisons with ten automated measures, including a number
of visual quality measures and related measures from various machine learning
fields. We then investigate how the user perception on interpretability of
mathematical expressions relate to various automated measures of complexity
that can be used to characterize data projection functions. We conclude with a
discussion of how automated measures of visual and semantic interpretability of
data projections can be used together for exploratory analysis in
classification tasks.
| no_new_dataset | 0.937783 |
1205.4839 | Thomas Degris | Thomas Degris, Martha White, Richard S. Sutton | Off-Policy Actor-Critic | Full version of the paper, appendix and errata included; Proceedings
of the 2012 International Conference on Machine Learning | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper presents the first actor-critic algorithm for off-policy
reinforcement learning. Our algorithm is online and incremental, and its
per-time-step complexity scales linearly with the number of learned weights.
Previous work on actor-critic algorithms is limited to the on-policy setting
and does not take advantage of the recent advances in off-policy gradient
temporal-difference learning. Off-policy techniques, such as Greedy-GQ, enable
a target policy to be learned while following and obtaining data from another
(behavior) policy. For many problems, however, actor-critic methods are more
practical than action value methods (like Greedy-GQ) because they explicitly
represent the policy; consequently, the policy can be stochastic and utilize a
large action space. In this paper, we illustrate how to practically combine the
generality and learning potential of off-policy learning with the flexibility
in action selection given by actor-critic methods. We derive an incremental,
linear time and space complexity algorithm that includes eligibility traces,
prove convergence under assumptions similar to previous off-policy algorithms,
and empirically show better or comparable performance to existing algorithms on
standard reinforcement-learning benchmark problems.
| [
{
"version": "v1",
"created": "Tue, 22 May 2012 08:36:41 GMT"
},
{
"version": "v2",
"created": "Wed, 23 May 2012 14:36:42 GMT"
},
{
"version": "v3",
"created": "Tue, 17 Jul 2012 20:40:47 GMT"
},
{
"version": "v4",
"created": "Tue, 14 Aug 2012 07:08:17 GMT"
},
{
"version": "v5",
"created": "Thu, 20 Jun 2013 10:53:42 GMT"
}
] | 2015-03-20T00:00:00 | [
[
"Degris",
"Thomas",
""
],
[
"White",
"Martha",
""
],
[
"Sutton",
"Richard S.",
""
]
] | TITLE: Off-Policy Actor-Critic
ABSTRACT: This paper presents the first actor-critic algorithm for off-policy
reinforcement learning. Our algorithm is online and incremental, and its
per-time-step complexity scales linearly with the number of learned weights.
Previous work on actor-critic algorithms is limited to the on-policy setting
and does not take advantage of the recent advances in off-policy gradient
temporal-difference learning. Off-policy techniques, such as Greedy-GQ, enable
a target policy to be learned while following and obtaining data from another
(behavior) policy. For many problems, however, actor-critic methods are more
practical than action value methods (like Greedy-GQ) because they explicitly
represent the policy; consequently, the policy can be stochastic and utilize a
large action space. In this paper, we illustrate how to practically combine the
generality and learning potential of off-policy learning with the flexibility
in action selection given by actor-critic methods. We derive an incremental,
linear time and space complexity algorithm that includes eligibility traces,
prove convergence under assumptions similar to previous off-policy algorithms,
and empirically show better or comparable performance to existing algorithms on
standard reinforcement-learning benchmark problems.
| no_new_dataset | 0.943556 |
1206.4074 | Fuxin Li | Fuxin Li, Guy Lebanon, Cristian Sminchisescu | A Linear Approximation to the chi^2 Kernel with Geometric Convergence | null | null | null | null | cs.LG cs.CV stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose a new analytical approximation to the $\chi^2$ kernel that
converges geometrically. The analytical approximation is derived with
elementary methods and adapts to the input distribution for optimal convergence
rate. Experiments show the new approximation leads to improved performance in
image classification and semantic segmentation tasks using a random Fourier
feature approximation of the $\exp-\chi^2$ kernel. Besides, out-of-core
principal component analysis (PCA) methods are introduced to reduce the
dimensionality of the approximation and achieve better performance at the
expense of only an additional constant factor to the time complexity. Moreover,
when PCA is performed jointly on the training and unlabeled testing data,
further performance improvements can be obtained. Experiments conducted on the
PASCAL VOC 2010 segmentation and the ImageNet ILSVRC 2010 datasets show
statistically significant improvements over alternative approximation methods.
| [
{
"version": "v1",
"created": "Mon, 18 Jun 2012 21:05:16 GMT"
},
{
"version": "v2",
"created": "Thu, 18 Apr 2013 18:38:28 GMT"
},
{
"version": "v3",
"created": "Wed, 12 Jun 2013 19:29:18 GMT"
}
] | 2015-03-20T00:00:00 | [
[
"Li",
"Fuxin",
""
],
[
"Lebanon",
"Guy",
""
],
[
"Sminchisescu",
"Cristian",
""
]
] | TITLE: A Linear Approximation to the chi^2 Kernel with Geometric Convergence
ABSTRACT: We propose a new analytical approximation to the $\chi^2$ kernel that
converges geometrically. The analytical approximation is derived with
elementary methods and adapts to the input distribution for optimal convergence
rate. Experiments show the new approximation leads to improved performance in
image classification and semantic segmentation tasks using a random Fourier
feature approximation of the $\exp-\chi^2$ kernel. Besides, out-of-core
principal component analysis (PCA) methods are introduced to reduce the
dimensionality of the approximation and achieve better performance at the
expense of only an additional constant factor to the time complexity. Moreover,
when PCA is performed jointly on the training and unlabeled testing data,
further performance improvements can be obtained. Experiments conducted on the
PASCAL VOC 2010 segmentation and the ImageNet ILSVRC 2010 datasets show
statistically significant improvements over alternative approximation methods.
| no_new_dataset | 0.947817 |
1206.4094 | Jeremi K. Ochab | J. K. Ochab | Maximal-entropy random walk unifies centrality measures | 7 pages, 2 figures | Phys. Rev. E 86, 066109 (2012) | 10.1103/PhysRevE.86.066109 | null | physics.soc-ph cond-mat.dis-nn cond-mat.stat-mech cs.SI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper analogies between different (dis)similarity matrices are
derived. These matrices, which are connected to path enumeration and random
walks, are used in community detection methods or in computation of centrality
measures for complex networks. The focus is on a number of known centrality
measures, which inherit the connections established for similarity matrices.
These measures are based on the principal eigenvector of the adjacency matrix,
path enumeration, as well as on the stationary state, stochastic matrix or mean
first-passage times of a random walk. Particular attention is paid to the
maximal-entropy random walk, which serves as a very distinct alternative to the
ordinary random walk used in network analysis.
The various importance measures, defined both with the use of ordinary random
walk and the maximal-entropy random walk, are compared numerically on a set of
benchmark graphs. It is shown that groups of centrality measures defined with
the two random walks cluster into two separate families. In particular, the
group of centralities for the maximal-entropy random walk, connected to the
eigenvector centrality and path enumeration, is strongly distinct from all the
other measures and produces largely equivalent results.
| [
{
"version": "v1",
"created": "Mon, 18 Jun 2012 22:39:29 GMT"
},
{
"version": "v2",
"created": "Thu, 30 Aug 2012 11:07:23 GMT"
}
] | 2015-03-20T00:00:00 | [
[
"Ochab",
"J. K.",
""
]
] | TITLE: Maximal-entropy random walk unifies centrality measures
ABSTRACT: In this paper analogies between different (dis)similarity matrices are
derived. These matrices, which are connected to path enumeration and random
walks, are used in community detection methods or in computation of centrality
measures for complex networks. The focus is on a number of known centrality
measures, which inherit the connections established for similarity matrices.
These measures are based on the principal eigenvector of the adjacency matrix,
path enumeration, as well as on the stationary state, stochastic matrix or mean
first-passage times of a random walk. Particular attention is paid to the
maximal-entropy random walk, which serves as a very distinct alternative to the
ordinary random walk used in network analysis.
The various importance measures, defined both with the use of ordinary random
walk and the maximal-entropy random walk, are compared numerically on a set of
benchmark graphs. It is shown that groups of centrality measures defined with
the two random walks cluster into two separate families. In particular, the
group of centralities for the maximal-entropy random walk, connected to the
eigenvector centrality and path enumeration, is strongly distinct from all the
other measures and produces largely equivalent results.
| no_new_dataset | 0.946399 |
1206.6295 | Vojtech Forejt | Vojtech Forejt, Marta Kwiatkowska and David Parker | Pareto Curves for Probabilistic Model Checking | null | null | null | null | cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Multi-objective probabilistic model checking provides a way to verify
several, possibly conflicting, quantitative properties of a stochastic system.
It has useful applications in controller synthesis and compositional
probabilistic verification. However, existing methods are based on linear
programming, which limits the scale of systems that can be analysed and makes
verification of time-bounded properties very difficult. We present a novel
approach that addresses both of these shortcomings, based on the generation of
successive approximations of the Pareto curve for a multi-objective model
checking problem. We illustrate dramatic improvements in efficiency on a large
set of benchmarks and show how the ability to visualise Pareto curves
significantly enhances the quality of results obtained from current
probabilistic verification tools.
| [
{
"version": "v1",
"created": "Sun, 24 Jun 2012 15:09:09 GMT"
}
] | 2015-03-20T00:00:00 | [
[
"Forejt",
"Vojtech",
""
],
[
"Kwiatkowska",
"Marta",
""
],
[
"Parker",
"David",
""
]
] | TITLE: Pareto Curves for Probabilistic Model Checking
ABSTRACT: Multi-objective probabilistic model checking provides a way to verify
several, possibly conflicting, quantitative properties of a stochastic system.
It has useful applications in controller synthesis and compositional
probabilistic verification. However, existing methods are based on linear
programming, which limits the scale of systems that can be analysed and makes
verification of time-bounded properties very difficult. We present a novel
approach that addresses both of these shortcomings, based on the generation of
successive approximations of the Pareto curve for a multi-objective model
checking problem. We illustrate dramatic improvements in efficiency on a large
set of benchmarks and show how the ability to visualise Pareto curves
significantly enhances the quality of results obtained from current
probabilistic verification tools.
| no_new_dataset | 0.947866 |
1207.0141 | Beng Chin Ooi | Wei Lu, Yanyan Shen, Su Chen, Beng Chin Ooi | Efficient Processing of k Nearest Neighbor Joins using MapReduce | VLDB2012 | Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 10, pp.
1016-1027 (2012) | null | null | cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | k nearest neighbor join (kNN join), designed to find k nearest neighbors from
a dataset S for every object in another dataset R, is a primitive operation
widely adopted by many data mining applications. As a combination of the k
nearest neighbor query and the join operation, kNN join is an expensive
operation. Given the increasing volume of data, it is difficult to perform a
kNN join on a centralized machine efficiently. In this paper, we investigate
how to perform kNN join using MapReduce which is a well-accepted framework for
data-intensive applications over clusters of computers. In brief, the mappers
cluster objects into groups; the reducers perform the kNN join on each group of
objects separately. We design an effective mapping mechanism that exploits
pruning rules for distance filtering, and hence reduces both the shuffling and
computational costs. To reduce the shuffling cost, we propose two approximate
algorithms to minimize the number of replicas. Extensive experiments on our
in-house cluster demonstrate that our proposed methods are efficient, robust
and scalable.
| [
{
"version": "v1",
"created": "Sat, 30 Jun 2012 20:20:31 GMT"
}
] | 2015-03-20T00:00:00 | [
[
"Lu",
"Wei",
""
],
[
"Shen",
"Yanyan",
""
],
[
"Chen",
"Su",
""
],
[
"Ooi",
"Beng Chin",
""
]
] | TITLE: Efficient Processing of k Nearest Neighbor Joins using MapReduce
ABSTRACT: k nearest neighbor join (kNN join), designed to find k nearest neighbors from
a dataset S for every object in another dataset R, is a primitive operation
widely adopted by many data mining applications. As a combination of the k
nearest neighbor query and the join operation, kNN join is an expensive
operation. Given the increasing volume of data, it is difficult to perform a
kNN join on a centralized machine efficiently. In this paper, we investigate
how to perform kNN join using MapReduce which is a well-accepted framework for
data-intensive applications over clusters of computers. In brief, the mappers
cluster objects into groups; the reducers perform the kNN join on each group of
objects separately. We design an effective mapping mechanism that exploits
pruning rules for distance filtering, and hence reduces both the shuffling and
computational costs. To reduce the shuffling cost, we propose two approximate
algorithms to minimize the number of replicas. Extensive experiments on our
in-house cluster demonstrate that our proposed methods are efficient, robust
and scalable.
| no_new_dataset | 0.942029 |
1207.1524 | Vasanthan Raghavan | Vasanthan Raghavan and Venugopal V. Veeravalli | Ensemble Properties of RVQ-Based Limited-Feedback Beamforming Codebooks | 47 pages, 6 figures, submitted to IEEE Transactions on Information
Theory | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The ensemble properties of Random Vector Quantization (RVQ) codebooks for
limited-feedback beamforming in multi-input multi-output (MIMO) systems are
studied with the metrics of interest being the received SNR loss and mutual
information loss, both relative to a perfect channel state information (CSI)
benchmark. The simplest case of unskewed codebooks is studied in the correlated
MIMO setting and these loss metrics are computed as a function of the number of
bits of feedback ($B$), transmit antenna dimension ($N_t$), and spatial
correlation. In particular, it is established that: i) the loss metrics are a
product of two components -- a quantization component and a channel-dependent
component; ii) the quantization component, which is also common to analysis of
channels with independent and identically distributed (i.i.d.) fading, decays
as $B$ increases at the rate $2^{-B/(N_t-1)}$; iii) the channel-dependent
component reflects the condition number of the channel. Further, the precise
connection between the received SNR loss and the squared singular values of the
channel is shown to be a Schur-convex majorization relationship. Finally, the
ensemble properties of skewed codebooks that are generated by skewing RVQ
codebooks with an appropriately designed fixed skewing matrix are studied.
Based on an estimate of the loss expression for skewed codebooks, it is
established that the optimal skewing matrix is critically dependent on the
condition numbers of the effective channel (product of the true channel and the
skewing matrix) and the skewing matrix.
| [
{
"version": "v1",
"created": "Fri, 6 Jul 2012 05:41:00 GMT"
}
] | 2015-03-20T00:00:00 | [
[
"Raghavan",
"Vasanthan",
""
],
[
"Veeravalli",
"Venugopal V.",
""
]
] | TITLE: Ensemble Properties of RVQ-Based Limited-Feedback Beamforming Codebooks
ABSTRACT: The ensemble properties of Random Vector Quantization (RVQ) codebooks for
limited-feedback beamforming in multi-input multi-output (MIMO) systems are
studied with the metrics of interest being the received SNR loss and mutual
information loss, both relative to a perfect channel state information (CSI)
benchmark. The simplest case of unskewed codebooks is studied in the correlated
MIMO setting and these loss metrics are computed as a function of the number of
bits of feedback ($B$), transmit antenna dimension ($N_t$), and spatial
correlation. In particular, it is established that: i) the loss metrics are a
product of two components -- a quantization component and a channel-dependent
component; ii) the quantization component, which is also common to analysis of
channels with independent and identically distributed (i.i.d.) fading, decays
as $B$ increases at the rate $2^{-B/(N_t-1)}$; iii) the channel-dependent
component reflects the condition number of the channel. Further, the precise
connection between the received SNR loss and the squared singular values of the
channel is shown to be a Schur-convex majorization relationship. Finally, the
ensemble properties of skewed codebooks that are generated by skewing RVQ
codebooks with an appropriately designed fixed skewing matrix are studied.
Based on an estimate of the loss expression for skewed codebooks, it is
established that the optimal skewing matrix is critically dependent on the
condition numbers of the effective channel (product of the true channel and the
skewing matrix) and the skewing matrix.
| no_new_dataset | 0.947478 |
1207.6600 | Rama Badrinath | Rama Badrinath, C. E. Veni Madhavan | Diversity in Ranking using Negative Reinforcement | null | null | null | null | cs.IR cs.AI cs.SI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we consider the problem of diversity in ranking of the nodes
in a graph. The task is to pick the top-k nodes in the graph which are both
'central' and 'diverse'. Many graph-based models of NLP like text
summarization, opinion summarization involve the concept of diversity in
generating the summaries. We develop a novel method which works in an iterative
fashion based on random walks to achieve diversity. Specifically, we use
negative reinforcement as a main tool to introduce diversity in the
Personalized PageRank framework. Experiments on two benchmark datasets show
that our algorithm is competitive to the existing methods.
| [
{
"version": "v1",
"created": "Fri, 27 Jul 2012 17:16:59 GMT"
}
] | 2015-03-20T00:00:00 | [
[
"Badrinath",
"Rama",
""
],
[
"Madhavan",
"C. E. Veni",
""
]
] | TITLE: Diversity in Ranking using Negative Reinforcement
ABSTRACT: In this paper, we consider the problem of diversity in ranking of the nodes
in a graph. The task is to pick the top-k nodes in the graph which are both
'central' and 'diverse'. Many graph-based models of NLP like text
summarization, opinion summarization involve the concept of diversity in
generating the summaries. We develop a novel method which works in an iterative
fashion based on random walks to achieve diversity. Specifically, we use
negative reinforcement as a main tool to introduce diversity in the
Personalized PageRank framework. Experiments on two benchmark datasets show
that our algorithm is competitive to the existing methods.
| no_new_dataset | 0.951997 |
1208.1231 | Sebastian Michel | Foteini Alvanaki and Sebastian Michel and Aleksandar Stupar | Building and Maintaining Halls of Fame over a Database | null | null | null | null | cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Halls of Fame are fascinating constructs. They represent the elite of an
often very large amount of entities---persons, companies, products, countries
etc. Beyond their practical use as static rankings, changes to them are
particularly interesting---for decision making processes, as input to common
media or novel narrative science applications, or simply consumed by users. In
this work, we aim at detecting events that can be characterized by changes to a
Hall of Fame ranking in an automated way. We describe how the schema and data
of a database can be used to generate Halls of Fame. In this database scenario,
by Hall of Fame we refer to distinguished tuples; entities, whose
characteristics set them apart from the majority. We define every Hall of Fame
as one specific instance of an SQL query, such that a change in its result is
considered a noteworthy event. Identified changes (i.e., events) are ranked
using lexicographic tradeoffs over event and query properties and presented to
users or fed in higher-level applications. We have implemented a full-fledged
prototype system that uses either database triggers or a Java based middleware
for event identification. We report on an experimental evaluation using a
real-world dataset of basketball statistics.
| [
{
"version": "v1",
"created": "Mon, 6 Aug 2012 18:26:17 GMT"
}
] | 2015-03-20T00:00:00 | [
[
"Alvanaki",
"Foteini",
""
],
[
"Michel",
"Sebastian",
""
],
[
"Stupar",
"Aleksandar",
""
]
] | TITLE: Building and Maintaining Halls of Fame over a Database
ABSTRACT: Halls of Fame are fascinating constructs. They represent the elite of an
often very large amount of entities---persons, companies, products, countries
etc. Beyond their practical use as static rankings, changes to them are
particularly interesting---for decision making processes, as input to common
media or novel narrative science applications, or simply consumed by users. In
this work, we aim at detecting events that can be characterized by changes to a
Hall of Fame ranking in an automated way. We describe how the schema and data
of a database can be used to generate Halls of Fame. In this database scenario,
by Hall of Fame we refer to distinguished tuples; entities, whose
characteristics set them apart from the majority. We define every Hall of Fame
as one specific instance of an SQL query, such that a change in its result is
considered a noteworthy event. Identified changes (i.e., events) are ranked
using lexicographic tradeoffs over event and query properties and presented to
users or fed in higher-level applications. We have implemented a full-fledged
prototype system that uses either database triggers or a Java based middleware
for event identification. We report on an experimental evaluation using a
real-world dataset of basketball statistics.
| no_new_dataset | 0.952397 |
1208.1931 | Michele Dallachiesa | Michele Dallachiesa, Besmira Nushi, Katsiaryna Mirylenka, Themis
Palpanas | Uncertain Time-Series Similarity: Return to the Basics | VLDB2012 | Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 11, pp.
1662-1673 (2012) | null | null | cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In the last years there has been a considerable increase in the availability
of continuous sensor measurements in a wide range of application domains, such
as Location-Based Services (LBS), medical monitoring systems, manufacturing
plants and engineering facilities to ensure efficiency, product quality and
safety, hydrologic and geologic observing systems, pollution management, and
others. Due to the inherent imprecision of sensor observations, many
investigations have recently turned into querying, mining and storing uncertain
data. Uncertainty can also be due to data aggregation, privacy-preserving
transforms, and error-prone mining algorithms. In this study, we survey the
techniques that have been proposed specifically for modeling and processing
uncertain time series, an important model for temporal data. We provide an
analytical evaluation of the alternatives that have been proposed in the
literature, highlighting the advantages and disadvantages of each approach, and
further compare these alternatives with two additional techniques that were
carefully studied before. We conduct an extensive experimental evaluation with
17 real datasets, and discuss some surprising results, which suggest that a
fruitful research direction is to take into account the temporal correlations
in the time series. Based on our evaluations, we also provide guidelines useful
for the practitioners in the field.
| [
{
"version": "v1",
"created": "Thu, 9 Aug 2012 14:52:01 GMT"
}
] | 2015-03-20T00:00:00 | [
[
"Dallachiesa",
"Michele",
""
],
[
"Nushi",
"Besmira",
""
],
[
"Mirylenka",
"Katsiaryna",
""
],
[
"Palpanas",
"Themis",
""
]
] | TITLE: Uncertain Time-Series Similarity: Return to the Basics
ABSTRACT: In the last years there has been a considerable increase in the availability
of continuous sensor measurements in a wide range of application domains, such
as Location-Based Services (LBS), medical monitoring systems, manufacturing
plants and engineering facilities to ensure efficiency, product quality and
safety, hydrologic and geologic observing systems, pollution management, and
others. Due to the inherent imprecision of sensor observations, many
investigations have recently turned into querying, mining and storing uncertain
data. Uncertainty can also be due to data aggregation, privacy-preserving
transforms, and error-prone mining algorithms. In this study, we survey the
techniques that have been proposed specifically for modeling and processing
uncertain time series, an important model for temporal data. We provide an
analytical evaluation of the alternatives that have been proposed in the
literature, highlighting the advantages and disadvantages of each approach, and
further compare these alternatives with two additional techniques that were
carefully studied before. We conduct an extensive experimental evaluation with
17 real datasets, and discuss some surprising results, which suggest that a
fruitful research direction is to take into account the temporal correlations
in the time series. Based on our evaluations, we also provide guidelines useful
for the practitioners in the field.
| no_new_dataset | 0.947817 |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.