id
large_stringlengths 9
16
| submitter
large_stringlengths 3
64
⌀ | authors
large_stringlengths 5
20.7k
| title
large_stringlengths 5
245
| comments
large_stringlengths 1
482
⌀ | journal-ref
large_stringlengths 4
382
⌀ | doi
large_stringlengths 9
151
⌀ | report-no
large_stringlengths 2
509
⌀ | categories
large_stringlengths 5
78
| license
large_stringclasses 9
values | abstract
large_stringlengths 83
3.55k
| versions
large listlengths 1
21
| update_date
timestamp[ms]date 2007-05-23 00:00:00
2025-04-25 00:00:00
| authors_parsed
large listlengths 1
1.35k
| prompt
large_stringlengths 166
3.64k
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1506.01115 | Alexandros-Stavros Iliopoulos | Alexandros-Stavros Iliopoulos, Tiancheng Liu, Xiaobai Sun | Hyperspectral Image Classification and Clutter Detection via Multiple
Structural Embeddings and Dimension Reductions | 13 pages, 6 figures (30 images), submitted to International
Conference on Computer Vision (ICCV) 2015 | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present a new and effective approach for Hyperspectral Image (HSI)
classification and clutter detection, overcoming a few long-standing challenges
presented by HSI data characteristics. Residing in a high-dimensional spectral
attribute space, HSI data samples are known to be strongly correlated in their
spectral signatures, exhibit nonlinear structure due to several physical laws,
and contain uncertainty and noise from multiple sources. In the presented
approach, we generate an adaptive, structurally enriched representation
environment, and employ the locally linear embedding (LLE) in it. There are two
structure layers external to LLE. One is feature space embedding: the HSI data
attributes are embedded into a discriminatory feature space where
spatio-spectral coherence and distinctive structures are distilled and
exploited to mitigate various difficulties encountered in the native
hyperspectral attribute space. The other structure layer encloses the ranges of
algorithmic parameters for LLE and feature embedding, and supports a
multiplexing and integrating scheme for contending with multi-source
uncertainty. Experiments on two commonly used HSI datasets with a small number
of learning samples have rendered remarkably high-accuracy classification
results, as well as distinctive maps of detected clutter regions.
| [
{
"version": "v1",
"created": "Wed, 3 Jun 2015 04:04:43 GMT"
}
] | 2015-06-04T00:00:00 | [
[
"Iliopoulos",
"Alexandros-Stavros",
""
],
[
"Liu",
"Tiancheng",
""
],
[
"Sun",
"Xiaobai",
""
]
] | TITLE: Hyperspectral Image Classification and Clutter Detection via Multiple
Structural Embeddings and Dimension Reductions
ABSTRACT: We present a new and effective approach for Hyperspectral Image (HSI)
classification and clutter detection, overcoming a few long-standing challenges
presented by HSI data characteristics. Residing in a high-dimensional spectral
attribute space, HSI data samples are known to be strongly correlated in their
spectral signatures, exhibit nonlinear structure due to several physical laws,
and contain uncertainty and noise from multiple sources. In the presented
approach, we generate an adaptive, structurally enriched representation
environment, and employ the locally linear embedding (LLE) in it. There are two
structure layers external to LLE. One is feature space embedding: the HSI data
attributes are embedded into a discriminatory feature space where
spatio-spectral coherence and distinctive structures are distilled and
exploited to mitigate various difficulties encountered in the native
hyperspectral attribute space. The other structure layer encloses the ranges of
algorithmic parameters for LLE and feature embedding, and supports a
multiplexing and integrating scheme for contending with multi-source
uncertainty. Experiments on two commonly used HSI datasets with a small number
of learning samples have rendered remarkably high-accuracy classification
results, as well as distinctive maps of detected clutter regions.
|
1506.01125 | Zhun Zhong | Zhun Zhong, Zongmin Li, Runlin Li, Xiaoxia Sun | Unsupervised domain adaption dictionary learning for visual recognition | 5 pages, 3 figures, ICIP 2015 | null | null | null | cs.CV | http://creativecommons.org/licenses/by/3.0/ | Over the last years, dictionary learning method has been extensively applied
to deal with various computer vision recognition applications, and produced
state-of-the-art results. However, when the data instances of a target domain
have a different distribution than that of a source domain, the dictionary
learning method may fail to perform well. In this paper, we address the
cross-domain visual recognition problem and propose a simple but effective
unsupervised domain adaption approach, where labeled data are only from source
domain. In order to bring the original data in source and target domain into
the same distribution, the proposed method forcing nearest coupled data between
source and target domain to have identical sparse representations while jointly
learning dictionaries for each domain, where the learned dictionaries can
reconstruct original data in source and target domain respectively. So that
sparse representations of original data can be used to perform visual
recognition tasks. We demonstrate the effectiveness of our approach on standard
datasets. Our method performs on par or better than competitive
state-of-the-art methods.
| [
{
"version": "v1",
"created": "Wed, 3 Jun 2015 05:21:37 GMT"
}
] | 2015-06-04T00:00:00 | [
[
"Zhong",
"Zhun",
""
],
[
"Li",
"Zongmin",
""
],
[
"Li",
"Runlin",
""
],
[
"Sun",
"Xiaoxia",
""
]
] | TITLE: Unsupervised domain adaption dictionary learning for visual recognition
ABSTRACT: Over the last years, dictionary learning method has been extensively applied
to deal with various computer vision recognition applications, and produced
state-of-the-art results. However, when the data instances of a target domain
have a different distribution than that of a source domain, the dictionary
learning method may fail to perform well. In this paper, we address the
cross-domain visual recognition problem and propose a simple but effective
unsupervised domain adaption approach, where labeled data are only from source
domain. In order to bring the original data in source and target domain into
the same distribution, the proposed method forcing nearest coupled data between
source and target domain to have identical sparse representations while jointly
learning dictionaries for each domain, where the learned dictionaries can
reconstruct original data in source and target domain respectively. So that
sparse representations of original data can be used to perform visual
recognition tasks. We demonstrate the effectiveness of our approach on standard
datasets. Our method performs on par or better than competitive
state-of-the-art methods.
|
1506.01151 | Mathieu Aubry | Mathieu Aubry and Bryan Russell | Understanding deep features with computer-generated imagery | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We introduce an approach for analyzing the variation of features generated by
convolutional neural networks (CNNs) with respect to scene factors that occur
in natural images. Such factors may include object style, 3D viewpoint, color,
and scene lighting configuration. Our approach analyzes CNN feature responses
corresponding to different scene factors by controlling for them via rendering
using a large database of 3D CAD models. The rendered images are presented to a
trained CNN and responses for different layers are studied with respect to the
input scene factors. We perform a decomposition of the responses based on
knowledge of the input scene factors and analyze the resulting components. In
particular, we quantify their relative importance in the CNN responses and
visualize them using principal component analysis. We show qualitative and
quantitative results of our study on three CNNs trained on large image
datasets: AlexNet, Places, and Oxford VGG. We observe important differences
across the networks and CNN layers for different scene factors and object
categories. Finally, we demonstrate that our analysis based on
computer-generated imagery translates to the network representation of natural
images.
| [
{
"version": "v1",
"created": "Wed, 3 Jun 2015 07:41:14 GMT"
}
] | 2015-06-04T00:00:00 | [
[
"Aubry",
"Mathieu",
""
],
[
"Russell",
"Bryan",
""
]
] | TITLE: Understanding deep features with computer-generated imagery
ABSTRACT: We introduce an approach for analyzing the variation of features generated by
convolutional neural networks (CNNs) with respect to scene factors that occur
in natural images. Such factors may include object style, 3D viewpoint, color,
and scene lighting configuration. Our approach analyzes CNN feature responses
corresponding to different scene factors by controlling for them via rendering
using a large database of 3D CAD models. The rendered images are presented to a
trained CNN and responses for different layers are studied with respect to the
input scene factors. We perform a decomposition of the responses based on
knowledge of the input scene factors and analyze the resulting components. In
particular, we quantify their relative importance in the CNN responses and
visualize them using principal component analysis. We show qualitative and
quantitative results of our study on three CNNs trained on large image
datasets: AlexNet, Places, and Oxford VGG. We observe important differences
across the networks and CNN layers for different scene factors and object
categories. Finally, we demonstrate that our analysis based on
computer-generated imagery translates to the network representation of natural
images.
|
1506.01330 | Xiaojun Chang | Sen Wang, Feiping Nie, Xiaojun Chang, Lina Yao, Xue Li, Quan Z. Sheng | Unsupervised Feature Analysis with Class Margin Optimization | Accepted by European Conference on Machine Learning and Principles
and Practice of Knowledge Discovery in Databases, ECML/PKDD 2015 | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Unsupervised feature selection has been always attracting research attention
in the communities of machine learning and data mining for decades. In this
paper, we propose an unsupervised feature selection method seeking a feature
coefficient matrix to select the most distinctive features. Specifically, our
proposed algorithm integrates the Maximum Margin Criterion with a
sparsity-based model into a joint framework, where the class margin and feature
correlation are taken into account at the same time. To maximize the total data
separability while preserving minimized within-class scatter simultaneously, we
propose to embed Kmeans into the framework generating pseudo class label
information in a scenario of unsupervised feature selection. Meanwhile, a
sparsity-based model, ` 2 ,p-norm, is imposed to the regularization term to
effectively discover the sparse structures of the feature coefficient matrix.
In this way, noisy and irrelevant features are removed by ruling out those
features whose corresponding coefficients are zeros. To alleviate the local
optimum problem that is caused by random initializations of K-means, a
convergence guaranteed algorithm with an updating strategy for the clustering
indicator matrix, is proposed to iteractively chase the optimal solution.
Performance evaluation is extensively conducted over six benchmark data sets.
From plenty of experimental results, it is demonstrated that our method has
superior performance against all other compared approaches.
| [
{
"version": "v1",
"created": "Wed, 3 Jun 2015 17:49:52 GMT"
}
] | 2015-06-04T00:00:00 | [
[
"Wang",
"Sen",
""
],
[
"Nie",
"Feiping",
""
],
[
"Chang",
"Xiaojun",
""
],
[
"Yao",
"Lina",
""
],
[
"Li",
"Xue",
""
],
[
"Sheng",
"Quan Z.",
""
]
] | TITLE: Unsupervised Feature Analysis with Class Margin Optimization
ABSTRACT: Unsupervised feature selection has been always attracting research attention
in the communities of machine learning and data mining for decades. In this
paper, we propose an unsupervised feature selection method seeking a feature
coefficient matrix to select the most distinctive features. Specifically, our
proposed algorithm integrates the Maximum Margin Criterion with a
sparsity-based model into a joint framework, where the class margin and feature
correlation are taken into account at the same time. To maximize the total data
separability while preserving minimized within-class scatter simultaneously, we
propose to embed Kmeans into the framework generating pseudo class label
information in a scenario of unsupervised feature selection. Meanwhile, a
sparsity-based model, ` 2 ,p-norm, is imposed to the regularization term to
effectively discover the sparse structures of the feature coefficient matrix.
In this way, noisy and irrelevant features are removed by ruling out those
features whose corresponding coefficients are zeros. To alleviate the local
optimum problem that is caused by random initializations of K-means, a
convergence guaranteed algorithm with an updating strategy for the clustering
indicator matrix, is proposed to iteractively chase the optimal solution.
Performance evaluation is extensively conducted over six benchmark data sets.
From plenty of experimental results, it is demonstrated that our method has
superior performance against all other compared approaches.
|
1111.5612 | Vijayaraghavan Thirumalai | Vijayaraghavan Thirumalai, and Pascal Frossard | Distributed Representation of Geometrically Correlated Images with
Compressed Linear Measurements | null | null | 10.1109/TIP.2012.2188035 | null | cs.CV cs.MM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper addresses the problem of distributed coding of images whose
correlation is driven by the motion of objects or positioning of the vision
sensors. It concentrates on the problem where images are encoded with
compressed linear measurements. We propose a geometry-based correlation model
in order to describe the common information in pairs of images. We assume that
the constitutive components of natural images can be captured by visual
features that undergo local transformations (e.g., translation) in different
images. We first identify prominent visual features by computing a sparse
approximation of a reference image with a dictionary of geometric basis
functions. We then pose a regularized optimization problem to estimate the
corresponding features in correlated images given by quantized linear
measurements. The estimated features have to comply with the compressed
information and to represent consistent transformation between images. The
correlation model is given by the relative geometric transformations between
corresponding features. We then propose an efficient joint decoding algorithm
that estimates the compressed images such that they stay consistent with both
the quantized measurements and the correlation model. Experimental results show
that the proposed algorithm effectively estimates the correlation between
images in multi-view datasets. In addition, the proposed algorithm provides
effective decoding performance that compares advantageously to independent
coding solutions as well as state-of-the-art distributed coding schemes based
on disparity learning.
| [
{
"version": "v1",
"created": "Wed, 23 Nov 2011 15:54:23 GMT"
}
] | 2015-06-03T00:00:00 | [
[
"Thirumalai",
"Vijayaraghavan",
""
],
[
"Frossard",
"Pascal",
""
]
] | TITLE: Distributed Representation of Geometrically Correlated Images with
Compressed Linear Measurements
ABSTRACT: This paper addresses the problem of distributed coding of images whose
correlation is driven by the motion of objects or positioning of the vision
sensors. It concentrates on the problem where images are encoded with
compressed linear measurements. We propose a geometry-based correlation model
in order to describe the common information in pairs of images. We assume that
the constitutive components of natural images can be captured by visual
features that undergo local transformations (e.g., translation) in different
images. We first identify prominent visual features by computing a sparse
approximation of a reference image with a dictionary of geometric basis
functions. We then pose a regularized optimization problem to estimate the
corresponding features in correlated images given by quantized linear
measurements. The estimated features have to comply with the compressed
information and to represent consistent transformation between images. The
correlation model is given by the relative geometric transformations between
corresponding features. We then propose an efficient joint decoding algorithm
that estimates the compressed images such that they stay consistent with both
the quantized measurements and the correlation model. Experimental results show
that the proposed algorithm effectively estimates the correlation between
images in multi-view datasets. In addition, the proposed algorithm provides
effective decoding performance that compares advantageously to independent
coding solutions as well as state-of-the-art distributed coding schemes based
on disparity learning.
|
1112.1224 | Emanuele Massaro | E. Massaro, A. Guazzini, F. Bagnoli and P. Li\`o | Information dynamics algorithm for detecting communities in networks | Submitted to "Communication in Nonlinear Science and Numerical
Simulation" | null | 10.1016/j.cnsns.2012.03.023 | null | physics.soc-ph cs.SI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The problem of community detection is relevant in many scientific
disciplines, from social science to statistical physics. Given the impact of
community detection in many areas, such as psychology and social sciences, we
have addressed the issue of modifying existing well performing algorithms by
incorporating elements of the domain application fields, i.e. domain-inspired.
We have focused on a psychology and social network - inspired approach which
may be useful for further strengthening the link between social network studies
and mathematics of community detection. Here we introduce a community-detection
algorithm derived from the van Dongen's Markov Cluster algorithm (MCL) method
by considering networks' nodes as agents capable to take decisions. In this
framework we have introduced a memory factor to mimic a typical human behavior
such as the oblivion effect. The method is based on information diffusion and
it includes a non-linear processing phase. We test our method on two classical
community benchmark and on computer generated networks with known community
structure. Our approach has three important features: the capacity of detecting
overlapping communities, the capability of identifying communities from an
individual point of view and the fine tuning the community detectability with
respect to prior knowledge of the data. Finally we discuss how to use a Shannon
entropy measure for parameter estimation in complex networks.
| [
{
"version": "v1",
"created": "Tue, 6 Dec 2011 10:45:27 GMT"
}
] | 2015-06-03T00:00:00 | [
[
"Massaro",
"E.",
""
],
[
"Guazzini",
"A.",
""
],
[
"Bagnoli",
"F.",
""
],
[
"Liò",
"P.",
""
]
] | TITLE: Information dynamics algorithm for detecting communities in networks
ABSTRACT: The problem of community detection is relevant in many scientific
disciplines, from social science to statistical physics. Given the impact of
community detection in many areas, such as psychology and social sciences, we
have addressed the issue of modifying existing well performing algorithms by
incorporating elements of the domain application fields, i.e. domain-inspired.
We have focused on a psychology and social network - inspired approach which
may be useful for further strengthening the link between social network studies
and mathematics of community detection. Here we introduce a community-detection
algorithm derived from the van Dongen's Markov Cluster algorithm (MCL) method
by considering networks' nodes as agents capable to take decisions. In this
framework we have introduced a memory factor to mimic a typical human behavior
such as the oblivion effect. The method is based on information diffusion and
it includes a non-linear processing phase. We test our method on two classical
community benchmark and on computer generated networks with known community
structure. Our approach has three important features: the capacity of detecting
overlapping communities, the capability of identifying communities from an
individual point of view and the fine tuning the community detectability with
respect to prior knowledge of the data. Finally we discuss how to use a Shannon
entropy measure for parameter estimation in complex networks.
|
1112.2392 | Jianguo Liu | Jian-Guo Liu, Tao Zhou, Qiang Guo | Information filtering via biased heat conduction | 4 pages, 3 figures | Phys. Rev. E 87 (2011) 037101 | 10.1103/PhysRevE.84.037101 | null | physics.data-an cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Heat conduction process has recently found its application in personalized
recommendation [T. Zhou \emph{et al.}, PNAS 107, 4511 (2010)], which is of high
diversity but low accuracy. By decreasing the temperatures of small-degree
objects, we present an improved algorithm, called biased heat conduction (BHC),
which could simultaneously enhance the accuracy and diversity. Extensive
experimental analyses demonstrate that the accuracy on MovieLens, Netflix and
Delicious datasets could be improved by 43.5%, 55.4% and 19.2% compared with
the standard heat conduction algorithm, and the diversity is also increased or
approximately unchanged. Further statistical analyses suggest that the present
algorithm could simultaneously identify users' mainstream and special tastes,
resulting in better performance than the standard heat conduction algorithm.
This work provides a creditable way for highly efficient information filtering.
| [
{
"version": "v1",
"created": "Sun, 11 Dec 2011 20:18:22 GMT"
}
] | 2015-06-03T00:00:00 | [
[
"Liu",
"Jian-Guo",
""
],
[
"Zhou",
"Tao",
""
],
[
"Guo",
"Qiang",
""
]
] | TITLE: Information filtering via biased heat conduction
ABSTRACT: Heat conduction process has recently found its application in personalized
recommendation [T. Zhou \emph{et al.}, PNAS 107, 4511 (2010)], which is of high
diversity but low accuracy. By decreasing the temperatures of small-degree
objects, we present an improved algorithm, called biased heat conduction (BHC),
which could simultaneously enhance the accuracy and diversity. Extensive
experimental analyses demonstrate that the accuracy on MovieLens, Netflix and
Delicious datasets could be improved by 43.5%, 55.4% and 19.2% compared with
the standard heat conduction algorithm, and the diversity is also increased or
approximately unchanged. Further statistical analyses suggest that the present
algorithm could simultaneously identify users' mainstream and special tastes,
resulting in better performance than the standard heat conduction algorithm.
This work provides a creditable way for highly efficient information filtering.
|
1407.7443 | Saurabh Joshi | Saurabh Joshi and Daniel Kroening | Property-Driven Fence Insertion using Reorder Bounded Model Checking | 18 pages, 3 figures, 4 algorithms. Version change reason : new set of
results and publication ready version of FM 2015 | null | 10.1007/978-3-319-19249-9_19 | null | cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Modern architectures provide weaker memory consistency guarantees than
sequential consistency. These weaker guarantees allow programs to exhibit
behaviours where the program statements appear to have executed out of program
order. Fortunately, modern architectures provide memory barriers (fences) to
enforce the program order between a pair of statements if needed. Due to the
intricate semantics of weak memory models, the placement of fences is
challenging even for experienced programmers. Too few fences lead to bugs
whereas overuse of fences results in performance degradation. This motivates
automated placement of fences. Tools that restore sequential consistency in the
program may insert more fences than necessary for the program to be correct.
Therefore, we propose a property-driven technique that introduces
"reorder-bounded exploration" to identify the smallest number of program
locations for fence placement. We implemented our technique on top of CBMC;
however, in principle, our technique is generic enough to be used with any
model checker. Our experimental results show that our technique is faster and
solves more instances of relevant benchmarks as compared to earlier approaches.
| [
{
"version": "v1",
"created": "Mon, 28 Jul 2014 15:27:10 GMT"
},
{
"version": "v2",
"created": "Tue, 9 Dec 2014 18:21:28 GMT"
},
{
"version": "v3",
"created": "Mon, 1 Jun 2015 20:39:01 GMT"
}
] | 2015-06-03T00:00:00 | [
[
"Joshi",
"Saurabh",
""
],
[
"Kroening",
"Daniel",
""
]
] | TITLE: Property-Driven Fence Insertion using Reorder Bounded Model Checking
ABSTRACT: Modern architectures provide weaker memory consistency guarantees than
sequential consistency. These weaker guarantees allow programs to exhibit
behaviours where the program statements appear to have executed out of program
order. Fortunately, modern architectures provide memory barriers (fences) to
enforce the program order between a pair of statements if needed. Due to the
intricate semantics of weak memory models, the placement of fences is
challenging even for experienced programmers. Too few fences lead to bugs
whereas overuse of fences results in performance degradation. This motivates
automated placement of fences. Tools that restore sequential consistency in the
program may insert more fences than necessary for the program to be correct.
Therefore, we propose a property-driven technique that introduces
"reorder-bounded exploration" to identify the smallest number of program
locations for fence placement. We implemented our technique on top of CBMC;
however, in principle, our technique is generic enough to be used with any
model checker. Our experimental results show that our technique is faster and
solves more instances of relevant benchmarks as compared to earlier approaches.
|
1506.00765 | Rongrong Ji Rongrong Ji | Zheng Cai, Donglin Cao, Rongrong Ji | Video (GIF) Sentiment Analysis using Large-Scale Mid-Level Ontology | null | null | null | null | cs.MM cs.CL cs.IR | http://creativecommons.org/licenses/by/3.0/ | With faster connection speed, Internet users are now making social network a
huge reservoir of texts, images and video clips (GIF). Sentiment analysis for
such online platform can be used to predict political elections, evaluates
economic indicators and so on. However, GIF sentiment analysis is quite
challenging, not only because it hinges on spatio-temporal visual
contentabstraction, but also for the relationship between such abstraction and
final sentiment remains unknown.In this paper, we dedicated to find out such
relationship.We proposed a SentiPairSequence basedspatiotemporal visual
sentiment ontology, which forms the midlevel representations for GIFsentiment.
The establishment process of SentiPair contains two steps. First, we construct
the Synset Forest to define the semantic tree structure of visual sentiment
label elements. Then, through theSynset Forest, we organically select and
combine sentiment label elements to form a mid-level visual sentiment
representation. Our experiments indicate that SentiPair outperforms other
competing mid-level attributes. Using SentiPair, our analysis frameworkcan
achieve satisfying prediction accuracy (72.6%). We also opened ourdataset
(GSO-2015) to the research community. GSO-2015 contains more than 6,000
manually annotated GIFs out of more than 40,000 candidates. Each is labeled
with both sentiment and SentiPair Sequence.
| [
{
"version": "v1",
"created": "Tue, 2 Jun 2015 06:31:57 GMT"
}
] | 2015-06-03T00:00:00 | [
[
"Cai",
"Zheng",
""
],
[
"Cao",
"Donglin",
""
],
[
"Ji",
"Rongrong",
""
]
] | TITLE: Video (GIF) Sentiment Analysis using Large-Scale Mid-Level Ontology
ABSTRACT: With faster connection speed, Internet users are now making social network a
huge reservoir of texts, images and video clips (GIF). Sentiment analysis for
such online platform can be used to predict political elections, evaluates
economic indicators and so on. However, GIF sentiment analysis is quite
challenging, not only because it hinges on spatio-temporal visual
contentabstraction, but also for the relationship between such abstraction and
final sentiment remains unknown.In this paper, we dedicated to find out such
relationship.We proposed a SentiPairSequence basedspatiotemporal visual
sentiment ontology, which forms the midlevel representations for GIFsentiment.
The establishment process of SentiPair contains two steps. First, we construct
the Synset Forest to define the semantic tree structure of visual sentiment
label elements. Then, through theSynset Forest, we organically select and
combine sentiment label elements to form a mid-level visual sentiment
representation. Our experiments indicate that SentiPair outperforms other
competing mid-level attributes. Using SentiPair, our analysis frameworkcan
achieve satisfying prediction accuracy (72.6%). We also opened ourdataset
(GSO-2015) to the research community. GSO-2015 contains more than 6,000
manually annotated GIFs out of more than 40,000 candidates. Each is labeled
with both sentiment and SentiPair Sequence.
|
1506.00770 | Carlos Herrera-Yag\"ue | C. Herrera-Yag\"ue, C.M. Schneider, T. Couronn\'e, Z. Smoreda, R.M.
Benito, P.J. Zufiria and M.C. Gonz\'alez | The anatomy of urban social networks and its implications in the
searchability problem | null | null | null | null | physics.soc-ph cs.SI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The appearance of large geolocated communication datasets has recently
increased our understanding of how social networks relate to their physical
space. However, many recurrently reported properties, such as the spatial
clustering of network communities, have not yet been systematically tested at
different scales. In this work we analyze the social network structure of over
25 million phone users from three countries at three different scales: country,
provinces and cities. We consistently find that this last urban scenario
presents significant differences to common knowledge about social networks.
First, the emergence of a giant component in the network seems to be controlled
by whether or not the network spans over the entire urban border, almost
independently of the population or geographic extension of the city. Second,
urban communities are much less geographically clustered than expected. These
two findings shed new light on the widely-studied searchability in
self-organized networks. By exhaustive simulation of decentralized search
strategies we conclude that urban networks are searchable not through
geographical proximity as their country-wide counterparts, but through an
homophily-driven community structure.
| [
{
"version": "v1",
"created": "Tue, 2 Jun 2015 06:48:16 GMT"
}
] | 2015-06-03T00:00:00 | [
[
"Herrera-Yagüe",
"C.",
""
],
[
"Schneider",
"C. M.",
""
],
[
"Couronné",
"T.",
""
],
[
"Smoreda",
"Z.",
""
],
[
"Benito",
"R. M.",
""
],
[
"Zufiria",
"P. J.",
""
],
[
"González",
"M. C.",
""
]
] | TITLE: The anatomy of urban social networks and its implications in the
searchability problem
ABSTRACT: The appearance of large geolocated communication datasets has recently
increased our understanding of how social networks relate to their physical
space. However, many recurrently reported properties, such as the spatial
clustering of network communities, have not yet been systematically tested at
different scales. In this work we analyze the social network structure of over
25 million phone users from three countries at three different scales: country,
provinces and cities. We consistently find that this last urban scenario
presents significant differences to common knowledge about social networks.
First, the emergence of a giant component in the network seems to be controlled
by whether or not the network spans over the entire urban border, almost
independently of the population or geographic extension of the city. Second,
urban communities are much less geographically clustered than expected. These
two findings shed new light on the widely-studied searchability in
self-organized networks. By exhaustive simulation of decentralized search
strategies we conclude that urban networks are searchable not through
geographical proximity as their country-wide counterparts, but through an
homophily-driven community structure.
|
1506.00893 | Joana C\^orte-Real | Joana C\^orte-Real and Theofrastos Mantadelis and In\^es Dutra and
Ricardo Rocha | SkILL - a Stochastic Inductive Logic Learner | null | null | null | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Probabilistic Inductive Logic Programming (PILP) is a rel- atively unexplored
area of Statistical Relational Learning which extends classic Inductive Logic
Programming (ILP). This work introduces SkILL, a Stochastic Inductive Logic
Learner, which takes probabilistic annotated data and produces First Order
Logic theories. Data in several domains such as medicine and bioinformatics
have an inherent degree of uncer- tainty, that can be used to produce models
closer to reality. SkILL can not only use this type of probabilistic data to
extract non-trivial knowl- edge from databases, but it also addresses
efficiency issues by introducing a novel, efficient and effective search
strategy to guide the search in PILP environments. The capabilities of SkILL
are demonstrated in three dif- ferent datasets: (i) a synthetic toy example
used to validate the system, (ii) a probabilistic adaptation of a well-known
biological metabolism ap- plication, and (iii) a real world medical dataset in
the breast cancer domain. Results show that SkILL can perform as well as a
deterministic ILP learner, while also being able to incorporate probabilistic
knowledge that would otherwise not be considered.
| [
{
"version": "v1",
"created": "Tue, 2 Jun 2015 14:10:02 GMT"
}
] | 2015-06-03T00:00:00 | [
[
"Côrte-Real",
"Joana",
""
],
[
"Mantadelis",
"Theofrastos",
""
],
[
"Dutra",
"Inês",
""
],
[
"Rocha",
"Ricardo",
""
]
] | TITLE: SkILL - a Stochastic Inductive Logic Learner
ABSTRACT: Probabilistic Inductive Logic Programming (PILP) is a rel- atively unexplored
area of Statistical Relational Learning which extends classic Inductive Logic
Programming (ILP). This work introduces SkILL, a Stochastic Inductive Logic
Learner, which takes probabilistic annotated data and produces First Order
Logic theories. Data in several domains such as medicine and bioinformatics
have an inherent degree of uncer- tainty, that can be used to produce models
closer to reality. SkILL can not only use this type of probabilistic data to
extract non-trivial knowl- edge from databases, but it also addresses
efficiency issues by introducing a novel, efficient and effective search
strategy to guide the search in PILP environments. The capabilities of SkILL
are demonstrated in three dif- ferent datasets: (i) a synthetic toy example
used to validate the system, (ii) a probabilistic adaptation of a well-known
biological metabolism ap- plication, and (iii) a real world medical dataset in
the breast cancer domain. Results show that SkILL can perform as well as a
deterministic ILP learner, while also being able to incorporate probabilistic
knowledge that would otherwise not be considered.
|
1506.00999 | Antoine Bordes | Alberto Garcia-Duran, Antoine Bordes, Nicolas Usunier, Yves Grandvalet | Combining Two And Three-Way Embeddings Models for Link Prediction in
Knowledge Bases | 26 pages | null | null | null | cs.AI cs.CL cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper tackles the problem of endogenous link prediction for Knowledge
Base completion. Knowledge Bases can be represented as directed graphs whose
nodes correspond to entities and edges to relationships. Previous attempts
either consist of powerful systems with high capacity to model complex
connectivity patterns, which unfortunately usually end up overfitting on rare
relationships, or in approaches that trade capacity for simplicity in order to
fairly model all relationships, frequent or not. In this paper, we propose
Tatec a happy medium obtained by complementing a high-capacity model with a
simpler one, both pre-trained separately and then combined. We present several
variants of this model with different kinds of regularization and combination
strategies and show that this approach outperforms existing methods on
different types of relationships by achieving state-of-the-art results on four
benchmarks of the literature.
| [
{
"version": "v1",
"created": "Tue, 2 Jun 2015 19:34:19 GMT"
}
] | 2015-06-03T00:00:00 | [
[
"Garcia-Duran",
"Alberto",
""
],
[
"Bordes",
"Antoine",
""
],
[
"Usunier",
"Nicolas",
""
],
[
"Grandvalet",
"Yves",
""
]
] | TITLE: Combining Two And Three-Way Embeddings Models for Link Prediction in
Knowledge Bases
ABSTRACT: This paper tackles the problem of endogenous link prediction for Knowledge
Base completion. Knowledge Bases can be represented as directed graphs whose
nodes correspond to entities and edges to relationships. Previous attempts
either consist of powerful systems with high capacity to model complex
connectivity patterns, which unfortunately usually end up overfitting on rare
relationships, or in approaches that trade capacity for simplicity in order to
fairly model all relationships, frequent or not. In this paper, we propose
Tatec a happy medium obtained by complementing a high-capacity model with a
simpler one, both pre-trained separately and then combined. We present several
variants of this model with different kinds of regularization and combination
strategies and show that this approach outperforms existing methods on
different types of relationships by achieving state-of-the-art results on four
benchmarks of the literature.
|
1401.8269 | Peter Turney | Peter D. Turney and Saif M. Mohammad | Experiments with Three Approaches to Recognizing Lexical Entailment | to appear in Natural Language Engineering | Natural Language Engineering, 21 (3), (2015), 437-476 | 10.1017/S1351324913000387 | null | cs.CL cs.AI cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Inference in natural language often involves recognizing lexical entailment
(RLE); that is, identifying whether one word entails another. For example,
"buy" entails "own". Two general strategies for RLE have been proposed: One
strategy is to manually construct an asymmetric similarity measure for context
vectors (directional similarity) and another is to treat RLE as a problem of
learning to recognize semantic relations using supervised machine learning
techniques (relation classification). In this paper, we experiment with two
recent state-of-the-art representatives of the two general strategies. The
first approach is an asymmetric similarity measure (an instance of the
directional similarity strategy), designed to capture the degree to which the
contexts of a word, a, form a subset of the contexts of another word, b. The
second approach (an instance of the relation classification strategy)
represents a word pair, a:b, with a feature vector that is the concatenation of
the context vectors of a and b, and then applies supervised learning to a
training set of labeled feature vectors. Additionally, we introduce a third
approach that is a new instance of the relation classification strategy. The
third approach represents a word pair, a:b, with a feature vector in which the
features are the differences in the similarities of a and b to a set of
reference words. All three approaches use vector space models (VSMs) of
semantics, based on word-context matrices. We perform an extensive evaluation
of the three approaches using three different datasets. The proposed new
approach (similarity differences) performs significantly better than the other
two approaches on some datasets and there is no dataset for which it is
significantly worse. Our results suggest it is beneficial to make connections
between the research in lexical entailment and the research in semantic
relation classification.
| [
{
"version": "v1",
"created": "Fri, 31 Jan 2014 19:42:19 GMT"
}
] | 2015-06-02T00:00:00 | [
[
"Turney",
"Peter D.",
""
],
[
"Mohammad",
"Saif M.",
""
]
] | TITLE: Experiments with Three Approaches to Recognizing Lexical Entailment
ABSTRACT: Inference in natural language often involves recognizing lexical entailment
(RLE); that is, identifying whether one word entails another. For example,
"buy" entails "own". Two general strategies for RLE have been proposed: One
strategy is to manually construct an asymmetric similarity measure for context
vectors (directional similarity) and another is to treat RLE as a problem of
learning to recognize semantic relations using supervised machine learning
techniques (relation classification). In this paper, we experiment with two
recent state-of-the-art representatives of the two general strategies. The
first approach is an asymmetric similarity measure (an instance of the
directional similarity strategy), designed to capture the degree to which the
contexts of a word, a, form a subset of the contexts of another word, b. The
second approach (an instance of the relation classification strategy)
represents a word pair, a:b, with a feature vector that is the concatenation of
the context vectors of a and b, and then applies supervised learning to a
training set of labeled feature vectors. Additionally, we introduce a third
approach that is a new instance of the relation classification strategy. The
third approach represents a word pair, a:b, with a feature vector in which the
features are the differences in the similarities of a and b to a set of
reference words. All three approaches use vector space models (VSMs) of
semantics, based on word-context matrices. We perform an extensive evaluation
of the three approaches using three different datasets. The proposed new
approach (similarity differences) performs significantly better than the other
two approaches on some datasets and there is no dataset for which it is
significantly worse. Our results suggest it is beneficial to make connections
between the research in lexical entailment and the research in semantic
relation classification.
|
1409.7480 | Mohamed Elhoseiny Mohamed Elhoseiny | Mohamed Elhoseiny, Ahmed Elgammal | Generalized Twin Gaussian Processes using Sharma-Mittal Divergence | This work got accepted for Publication in the Machine Learning
Journal 2015. The work is scheduled for presentation at ECML-PKDD 2015
journal track papers | null | null | null | cs.LG cs.CV stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | There has been a growing interest in mutual information measures due to their
wide range of applications in Machine Learning and Computer Vision. In this
paper, we present a generalized structured regression framework based on
Shama-Mittal divergence, a relative entropy measure, which is introduced to the
Machine Learning community in this work. Sharma-Mittal (SM) divergence is a
generalized mutual information measure for the widely used R\'enyi, Tsallis,
Bhattacharyya, and Kullback-Leibler (KL) relative entropies. Specifically, we
study Sharma-Mittal divergence as a cost function in the context of the Twin
Gaussian Processes (TGP)~\citep{Bo:2010}, which generalizes over the
KL-divergence without computational penalty. We show interesting properties of
Sharma-Mittal TGP (SMTGP) through a theoretical analysis, which covers missing
insights in the traditional TGP formulation. However, we generalize this theory
based on SM-divergence instead of KL-divergence which is a special case.
Experimentally, we evaluated the proposed SMTGP framework on several datasets.
The results show that SMTGP reaches better predictions than KL-based TGP, since
it offers a bigger class of models through its parameters that we learn from
the data.
| [
{
"version": "v1",
"created": "Fri, 26 Sep 2014 06:46:38 GMT"
},
{
"version": "v2",
"created": "Wed, 1 Oct 2014 13:32:50 GMT"
},
{
"version": "v3",
"created": "Fri, 3 Oct 2014 03:54:41 GMT"
},
{
"version": "v4",
"created": "Mon, 6 Oct 2014 03:47:51 GMT"
},
{
"version": "v5",
"created": "Mon, 1 Jun 2015 06:30:29 GMT"
}
] | 2015-06-02T00:00:00 | [
[
"Elhoseiny",
"Mohamed",
""
],
[
"Elgammal",
"Ahmed",
""
]
] | TITLE: Generalized Twin Gaussian Processes using Sharma-Mittal Divergence
ABSTRACT: There has been a growing interest in mutual information measures due to their
wide range of applications in Machine Learning and Computer Vision. In this
paper, we present a generalized structured regression framework based on
Shama-Mittal divergence, a relative entropy measure, which is introduced to the
Machine Learning community in this work. Sharma-Mittal (SM) divergence is a
generalized mutual information measure for the widely used R\'enyi, Tsallis,
Bhattacharyya, and Kullback-Leibler (KL) relative entropies. Specifically, we
study Sharma-Mittal divergence as a cost function in the context of the Twin
Gaussian Processes (TGP)~\citep{Bo:2010}, which generalizes over the
KL-divergence without computational penalty. We show interesting properties of
Sharma-Mittal TGP (SMTGP) through a theoretical analysis, which covers missing
insights in the traditional TGP formulation. However, we generalize this theory
based on SM-divergence instead of KL-divergence which is a special case.
Experimentally, we evaluated the proposed SMTGP framework on several datasets.
The results show that SMTGP reaches better predictions than KL-based TGP, since
it offers a bigger class of models through its parameters that we learn from
the data.
|
1412.2197 | Liangliang Cao | Liangliang Cao and Chang Wang | Practice in Synonym Extraction at Large Scale | This paper has been withdrawn by the author since the experimental
results are not good enough | null | null | null | cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Synonym extraction is an important task in natural language processing and
often used as a submodule in query expansion, question answering and other
applications. Automatic synonym extractor is highly preferred for large scale
applications. Previous studies in synonym extraction are most limited to small
scale datasets. In this paper, we build a large dataset with 3.4 million
synonym/non-synonym pairs to capture the challenges in real world scenarios. We
proposed (1) a new cost function to accommodate the unbalanced learning
problem, and (2) a feature learning based deep neural network to model the
complicated relationships in synonym pairs. We compare several different
approaches based on SVMs and neural networks, and find out a novel feature
learning based neural network outperforms the methods with hand-assigned
features. Specifically, the best performance of our model surpasses the SVM
baseline with a significant 97\% relative improvement.
| [
{
"version": "v1",
"created": "Sat, 6 Dec 2014 04:40:18 GMT"
},
{
"version": "v2",
"created": "Thu, 18 Dec 2014 16:49:44 GMT"
},
{
"version": "v3",
"created": "Mon, 1 Jun 2015 19:55:17 GMT"
}
] | 2015-06-02T00:00:00 | [
[
"Cao",
"Liangliang",
""
],
[
"Wang",
"Chang",
""
]
] | TITLE: Practice in Synonym Extraction at Large Scale
ABSTRACT: Synonym extraction is an important task in natural language processing and
often used as a submodule in query expansion, question answering and other
applications. Automatic synonym extractor is highly preferred for large scale
applications. Previous studies in synonym extraction are most limited to small
scale datasets. In this paper, we build a large dataset with 3.4 million
synonym/non-synonym pairs to capture the challenges in real world scenarios. We
proposed (1) a new cost function to accommodate the unbalanced learning
problem, and (2) a feature learning based deep neural network to model the
complicated relationships in synonym pairs. We compare several different
approaches based on SVMs and neural networks, and find out a novel feature
learning based neural network outperforms the methods with hand-assigned
features. Specifically, the best performance of our model surpasses the SVM
baseline with a significant 97\% relative improvement.
|
1503.06772 | Abigail Jacobs | Abigail Z. Jacobs, Samuel F. Way, Johan Ugander and Aaron Clauset | Assembling thefacebook: Using heterogeneity to understand online social
network assembly | 13 pages, 11 figures, Proceedings of the 7th Annual ACM Web Science
Conference (WebSci), 2015 | null | 10.1145/2786451.2786477 | null | cs.SI physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Online social networks represent a popular and diverse class of social media
systems. Despite this variety, each of these systems undergoes a general
process of online social network assembly, which represents the complicated and
heterogeneous changes that transform newly born systems into mature platforms.
However, little is known about this process. For example, how much of a
network's assembly is driven by simple growth? How does a network's structure
change as it matures? How does network structure vary with adoption rates and
user heterogeneity, and do these properties play different roles at different
points in the assembly? We investigate these and other questions using a unique
dataset of online connections among the roughly one million users at the first
100 colleges admitted to Facebook, captured just 20 months after its launch. We
first show that different vintages and adoption rates across this population of
networks reveal temporal dynamics of the assembly process, and that assembly is
only loosely related to network growth. We then exploit natural experiments
embedded in this dataset and complementary data obtained via Internet
archaeology to show that different subnetworks matured at different rates
toward similar end states. These results shed light on the processes and
patterns of online social network assembly, and may facilitate more effective
design for online social systems.
| [
{
"version": "v1",
"created": "Mon, 23 Mar 2015 19:13:27 GMT"
},
{
"version": "v2",
"created": "Sun, 31 May 2015 20:24:02 GMT"
}
] | 2015-06-02T00:00:00 | [
[
"Jacobs",
"Abigail Z.",
""
],
[
"Way",
"Samuel F.",
""
],
[
"Ugander",
"Johan",
""
],
[
"Clauset",
"Aaron",
""
]
] | TITLE: Assembling thefacebook: Using heterogeneity to understand online social
network assembly
ABSTRACT: Online social networks represent a popular and diverse class of social media
systems. Despite this variety, each of these systems undergoes a general
process of online social network assembly, which represents the complicated and
heterogeneous changes that transform newly born systems into mature platforms.
However, little is known about this process. For example, how much of a
network's assembly is driven by simple growth? How does a network's structure
change as it matures? How does network structure vary with adoption rates and
user heterogeneity, and do these properties play different roles at different
points in the assembly? We investigate these and other questions using a unique
dataset of online connections among the roughly one million users at the first
100 colleges admitted to Facebook, captured just 20 months after its launch. We
first show that different vintages and adoption rates across this population of
networks reveal temporal dynamics of the assembly process, and that assembly is
only loosely related to network growth. We then exploit natural experiments
embedded in this dataset and complementary data obtained via Internet
archaeology to show that different subnetworks matured at different rates
toward similar end states. These results shed light on the processes and
patterns of online social network assembly, and may facilitate more effective
design for online social systems.
|
1504.00905 | Jose Lopez | Jose A. Lopez, Octavia Camps, Mario Sznaier | Robust Anomaly Detection Using Semidefinite Programming | 13 pages, 11 figures | null | null | null | math.OC cs.CV cs.LG cs.SY | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper presents a new approach, based on polynomial optimization and the
method of moments, to the problem of anomaly detection. The proposed technique
only requires information about the statistical moments of the normal-state
distribution of the features of interest and compares favorably with existing
approaches (such as Parzen windows and 1-class SVM). In addition, it provides a
succinct description of the normal state. Thus, it leads to a substantial
simplification of the the anomaly detection problem when working with higher
dimensional datasets.
| [
{
"version": "v1",
"created": "Fri, 3 Apr 2015 18:20:36 GMT"
},
{
"version": "v2",
"created": "Sat, 30 May 2015 15:58:36 GMT"
}
] | 2015-06-02T00:00:00 | [
[
"Lopez",
"Jose A.",
""
],
[
"Camps",
"Octavia",
""
],
[
"Sznaier",
"Mario",
""
]
] | TITLE: Robust Anomaly Detection Using Semidefinite Programming
ABSTRACT: This paper presents a new approach, based on polynomial optimization and the
method of moments, to the problem of anomaly detection. The proposed technique
only requires information about the statistical moments of the normal-state
distribution of the features of interest and compares favorably with existing
approaches (such as Parzen windows and 1-class SVM). In addition, it provides a
succinct description of the normal state. Thus, it leads to a substantial
simplification of the the anomaly detection problem when working with higher
dimensional datasets.
|
1506.00022 | Xiaohan Zhao | Xiaohan Zhao, Qingyun Liu, Lin Zhou, Haitao Zheng and Ben Y. Zhao | Graph Watermarks | 16 pages, 14 figures, full version | null | null | null | cs.CR cs.SI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | From network topologies to online social networks, many of today's most
sensitive datasets are captured in large graphs. A significant challenge facing
owners of these datasets is how to share sensitive graphs with collaborators
and authorized users, e.g. network topologies with network equipment vendors or
Facebook's social graphs with academic collaborators. Current tools can provide
limited node or edge privacy, but require modifications to the graph that
significantly reduce its utility.
In this work, we propose a new alternative in the form of graph watermarks.
Graph watermarks are small graphs tailor-made for a given graph dataset, a
secure graph key, and a secure user key. To share a sensitive graph G with a
collaborator C, the owner generates a watermark graph W using G, the graph key,
and C's key as input, and embeds W into G to form G'. If G' is leaked by C,its
owner can reliably determine if the watermark W generated for C does in fact
reside inside G', thereby proving C is responsible for the leak. Graph
watermarks serve both as a deterrent against data leakage and a method of
recourse after a leak. We provide robust schemes for creating, embedding and
extracting watermarks, and use analysis and experiments on large, real graphs
to show that they are unique and difficult to forge. We study the robustness of
graph watermarks against both single and powerful colluding attacker models,
then propose and empirically evaluate mechanisms to dramatically improve
resilience.
| [
{
"version": "v1",
"created": "Fri, 29 May 2015 20:29:04 GMT"
}
] | 2015-06-02T00:00:00 | [
[
"Zhao",
"Xiaohan",
""
],
[
"Liu",
"Qingyun",
""
],
[
"Zhou",
"Lin",
""
],
[
"Zheng",
"Haitao",
""
],
[
"Zhao",
"Ben Y.",
""
]
] | TITLE: Graph Watermarks
ABSTRACT: From network topologies to online social networks, many of today's most
sensitive datasets are captured in large graphs. A significant challenge facing
owners of these datasets is how to share sensitive graphs with collaborators
and authorized users, e.g. network topologies with network equipment vendors or
Facebook's social graphs with academic collaborators. Current tools can provide
limited node or edge privacy, but require modifications to the graph that
significantly reduce its utility.
In this work, we propose a new alternative in the form of graph watermarks.
Graph watermarks are small graphs tailor-made for a given graph dataset, a
secure graph key, and a secure user key. To share a sensitive graph G with a
collaborator C, the owner generates a watermark graph W using G, the graph key,
and C's key as input, and embeds W into G to form G'. If G' is leaked by C,its
owner can reliably determine if the watermark W generated for C does in fact
reside inside G', thereby proving C is responsible for the leak. Graph
watermarks serve both as a deterrent against data leakage and a method of
recourse after a leak. We provide robust schemes for creating, embedding and
extracting watermarks, and use analysis and experiments on large, real graphs
to show that they are unique and difficult to forge. We study the robustness of
graph watermarks against both single and powerful colluding attacker models,
then propose and empirically evaluate mechanisms to dramatically improve
resilience.
|
1506.00102 | Pau Bellot | Pau Bellot, Patrick E. Meyer | Efficient combination of pairswise feature networks | JMLR: Workshop and Conference Proceedings, 2014 Connectomics (ECML
2014) | null | null | null | stat.ML cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper presents a novel method for the reconstruction of a neural network
connectivity using calcium fluorescence data. We introduce a fast unsupervised
method to integrate different networks that reconstructs structural
connectivity from neuron activity. Our method improves the state-of-the-art
reconstruction method General Transfer Entropy (GTE). We are able to better
eliminate indirect links, improving therefore the quality of the network via a
normalization and ensemble process of GTE and three new informative features.
The approach is based on a simple combination of networks, which is remarkably
fast. The performance of our approach is benchmarked on simulated time series
provided at the connectomics challenge and also submitted at the public
competition.
| [
{
"version": "v1",
"created": "Sat, 30 May 2015 10:31:31 GMT"
}
] | 2015-06-02T00:00:00 | [
[
"Bellot",
"Pau",
""
],
[
"Meyer",
"Patrick E.",
""
]
] | TITLE: Efficient combination of pairswise feature networks
ABSTRACT: This paper presents a novel method for the reconstruction of a neural network
connectivity using calcium fluorescence data. We introduce a fast unsupervised
method to integrate different networks that reconstructs structural
connectivity from neuron activity. Our method improves the state-of-the-art
reconstruction method General Transfer Entropy (GTE). We are able to better
eliminate indirect links, improving therefore the quality of the network via a
normalization and ensemble process of GTE and three new informative features.
The approach is based on a simple combination of networks, which is remarkably
fast. The performance of our approach is benchmarked on simulated time series
provided at the connectomics challenge and also submitted at the public
competition.
|
1506.00176 | Lianwen Jin | Liquan Qiu, Lianwen Jin, Ruifen Dai, Yuxiang Zhang, Lei Li | An Open Source Testing Tool for Evaluating Handwriting Input Methods | 5 pages, 3 figures, 11 tables. Accepted to appear at ICDAR 2015 | null | null | null | cs.HC cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper presents an open source tool for testing the recognition accuracy
of Chinese handwriting input methods. The tool consists of two modules, namely
the PC and Android mobile client. The PC client reads handwritten samples in
the computer, and transfers them individually to the Android client in
accordance with the socket communication protocol. After the Android client
receives the data, it simulates the handwriting on screen of client device, and
triggers the corresponding handwriting recognition method. The recognition
accuracy is recorded by the Android client. We present the design principles
and describe the implementation of the test platform. We construct several test
datasets for evaluating different handwriting recognition systems, and conduct
an objective and comprehensive test using six Chinese handwriting input methods
with five datasets. The test results for the recognition accuracy are then
compared and analyzed.
| [
{
"version": "v1",
"created": "Sat, 30 May 2015 22:35:55 GMT"
}
] | 2015-06-02T00:00:00 | [
[
"Qiu",
"Liquan",
""
],
[
"Jin",
"Lianwen",
""
],
[
"Dai",
"Ruifen",
""
],
[
"Zhang",
"Yuxiang",
""
],
[
"Li",
"Lei",
""
]
] | TITLE: An Open Source Testing Tool for Evaluating Handwriting Input Methods
ABSTRACT: This paper presents an open source tool for testing the recognition accuracy
of Chinese handwriting input methods. The tool consists of two modules, namely
the PC and Android mobile client. The PC client reads handwritten samples in
the computer, and transfers them individually to the Android client in
accordance with the socket communication protocol. After the Android client
receives the data, it simulates the handwriting on screen of client device, and
triggers the corresponding handwriting recognition method. The recognition
accuracy is recorded by the Android client. We present the design principles
and describe the implementation of the test platform. We construct several test
datasets for evaluating different handwriting recognition systems, and conduct
an objective and comprehensive test using six Chinese handwriting input methods
with five datasets. The test results for the recognition accuracy are then
compared and analyzed.
|
1506.00195 | Kaisheng Yao | Baolin Peng and Kaisheng Yao | Recurrent Neural Networks with External Memory for Language
Understanding | submitted to Interspeech 2015 | null | null | null | cs.CL cs.AI cs.LG cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Recurrent Neural Networks (RNNs) have become increasingly popular for the
task of language understanding. In this task, a semantic tagger is deployed to
associate a semantic label to each word in an input sequence. The success of
RNN may be attributed to its ability to memorize long-term dependence that
relates the current-time semantic label prediction to the observations many
time instances away. However, the memory capacity of simple RNNs is limited
because of the gradient vanishing and exploding problem. We propose to use an
external memory to improve memorization capability of RNNs. We conducted
experiments on the ATIS dataset, and observed that the proposed model was able
to achieve the state-of-the-art results. We compare our proposed model with
alternative models and report analysis results that may provide insights for
future research.
| [
{
"version": "v1",
"created": "Sun, 31 May 2015 05:10:03 GMT"
}
] | 2015-06-02T00:00:00 | [
[
"Peng",
"Baolin",
""
],
[
"Yao",
"Kaisheng",
""
]
] | TITLE: Recurrent Neural Networks with External Memory for Language
Understanding
ABSTRACT: Recurrent Neural Networks (RNNs) have become increasingly popular for the
task of language understanding. In this task, a semantic tagger is deployed to
associate a semantic label to each word in an input sequence. The success of
RNN may be attributed to its ability to memorize long-term dependence that
relates the current-time semantic label prediction to the observations many
time instances away. However, the memory capacity of simple RNNs is limited
because of the gradient vanishing and exploding problem. We propose to use an
external memory to improve memorization capability of RNNs. We conducted
experiments on the ATIS dataset, and observed that the proposed model was able
to achieve the state-of-the-art results. We compare our proposed model with
alternative models and report analysis results that may provide insights for
future research.
|
1506.00242 | Zhiwei Steven Wu | Michael Kearns, Aaron Roth, Zhiwei Steven Wu, Grigory Yaroslavtsev | Privacy for the Protected (Only) | null | null | null | null | cs.DS cs.CR cs.CY cs.SI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Motivated by tensions between data privacy for individual citizens, and
societal priorities such as counterterrorism and the containment of infectious
disease, we introduce a computational model that distinguishes between parties
for whom privacy is explicitly protected, and those for whom it is not (the
targeted subpopulation). The goal is the development of algorithms that can
effectively identify and take action upon members of the targeted subpopulation
in a way that minimally compromises the privacy of the protected, while
simultaneously limiting the expense of distinguishing members of the two groups
via costly mechanisms such as surveillance, background checks, or medical
testing. Within this framework, we provide provably privacy-preserving
algorithms for targeted search in social networks. These algorithms are natural
variants of common graph search methods, and ensure privacy for the protected
by the careful injection of noise in the prioritization of potential targets.
We validate the utility of our algorithms with extensive computational
experiments on two large-scale social network datasets.
| [
{
"version": "v1",
"created": "Sun, 31 May 2015 14:47:27 GMT"
}
] | 2015-06-02T00:00:00 | [
[
"Kearns",
"Michael",
""
],
[
"Roth",
"Aaron",
""
],
[
"Wu",
"Zhiwei Steven",
""
],
[
"Yaroslavtsev",
"Grigory",
""
]
] | TITLE: Privacy for the Protected (Only)
ABSTRACT: Motivated by tensions between data privacy for individual citizens, and
societal priorities such as counterterrorism and the containment of infectious
disease, we introduce a computational model that distinguishes between parties
for whom privacy is explicitly protected, and those for whom it is not (the
targeted subpopulation). The goal is the development of algorithms that can
effectively identify and take action upon members of the targeted subpopulation
in a way that minimally compromises the privacy of the protected, while
simultaneously limiting the expense of distinguishing members of the two groups
via costly mechanisms such as surveillance, background checks, or medical
testing. Within this framework, we provide provably privacy-preserving
algorithms for targeted search in social networks. These algorithms are natural
variants of common graph search methods, and ensure privacy for the protected
by the careful injection of noise in the prioritization of potential targets.
We validate the utility of our algorithms with extensive computational
experiments on two large-scale social network datasets.
|
1506.00278 | Licheng Yu | Licheng Yu, Eunbyung Park, Alexander C. Berg, and Tamara L. Berg | Visual Madlibs: Fill in the blank Image Generation and Question
Answering | 10 pages; 8 figures; 4 tables | null | null | null | cs.CV cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we introduce a new dataset consisting of 360,001 focused
natural language descriptions for 10,738 images. This dataset, the Visual
Madlibs dataset, is collected using automatically produced fill-in-the-blank
templates designed to gather targeted descriptions about: people and objects,
their appearances, activities, and interactions, as well as inferences about
the general scene or its broader context. We provide several analyses of the
Visual Madlibs dataset and demonstrate its applicability to two new description
generation tasks: focused description generation, and multiple-choice
question-answering for images. Experiments using joint-embedding and deep
learning methods show promising results on these tasks.
| [
{
"version": "v1",
"created": "Sun, 31 May 2015 19:39:44 GMT"
}
] | 2015-06-02T00:00:00 | [
[
"Yu",
"Licheng",
""
],
[
"Park",
"Eunbyung",
""
],
[
"Berg",
"Alexander C.",
""
],
[
"Berg",
"Tamara L.",
""
]
] | TITLE: Visual Madlibs: Fill in the blank Image Generation and Question
Answering
ABSTRACT: In this paper, we introduce a new dataset consisting of 360,001 focused
natural language descriptions for 10,738 images. This dataset, the Visual
Madlibs dataset, is collected using automatically produced fill-in-the-blank
templates designed to gather targeted descriptions about: people and objects,
their appearances, activities, and interactions, as well as inferences about
the general scene or its broader context. We provide several analyses of the
Visual Madlibs dataset and demonstrate its applicability to two new description
generation tasks: focused description generation, and multiple-choice
question-answering for images. Experiments using joint-embedding and deep
learning methods show promising results on these tasks.
|
1506.00323 | Anastasia Podosinnikova | Anastasia Podosinnikova, Simon Setzer, and Matthias Hein | Robust PCA: Optimization of the Robust Reconstruction Error over the
Stiefel Manifold | long version of GCPR 2014 paper | null | null | null | stat.ML cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | It is well known that Principal Component Analysis (PCA) is strongly affected
by outliers and a lot of effort has been put into robustification of PCA. In
this paper we present a new algorithm for robust PCA minimizing the trimmed
reconstruction error. By directly minimizing over the Stiefel manifold, we
avoid deflation as often used by projection pursuit methods. In distinction to
other methods for robust PCA, our method has no free parameter and is
computationally very efficient. We illustrate the performance on various
datasets including an application to background modeling and subtraction. Our
method performs better or similar to current state-of-the-art methods while
being faster.
| [
{
"version": "v1",
"created": "Mon, 1 Jun 2015 01:57:15 GMT"
}
] | 2015-06-02T00:00:00 | [
[
"Podosinnikova",
"Anastasia",
""
],
[
"Setzer",
"Simon",
""
],
[
"Hein",
"Matthias",
""
]
] | TITLE: Robust PCA: Optimization of the Robust Reconstruction Error over the
Stiefel Manifold
ABSTRACT: It is well known that Principal Component Analysis (PCA) is strongly affected
by outliers and a lot of effort has been put into robustification of PCA. In
this paper we present a new algorithm for robust PCA minimizing the trimmed
reconstruction error. By directly minimizing over the Stiefel manifold, we
avoid deflation as often used by projection pursuit methods. In distinction to
other methods for robust PCA, our method has no free parameter and is
computationally very efficient. We illustrate the performance on various
datasets including an application to background modeling and subtraction. Our
method performs better or similar to current state-of-the-art methods while
being faster.
|
1506.00327 | Zhiguang Wang | Zhiguang Wang and Tim Oates | Imaging Time-Series to Improve Classification and Imputation | Accepted by IJCAI-2015 ML track | null | null | null | cs.LG cs.NE stat.ML | http://creativecommons.org/licenses/by/3.0/ | Inspired by recent successes of deep learning in computer vision, we propose
a novel framework for encoding time series as different types of images,
namely, Gramian Angular Summation/Difference Fields (GASF/GADF) and Markov
Transition Fields (MTF). This enables the use of techniques from computer
vision for time series classification and imputation. We used Tiled
Convolutional Neural Networks (tiled CNNs) on 20 standard datasets to learn
high-level features from the individual and compound GASF-GADF-MTF images. Our
approaches achieve highly competitive results when compared to nine of the
current best time series classification approaches. Inspired by the bijection
property of GASF on 0/1 rescaled data, we train Denoised Auto-encoders (DA) on
the GASF images of four standard and one synthesized compound dataset. The
imputation MSE on test data is reduced by 12.18%-48.02% when compared to using
the raw data. An analysis of the features and weights learned via tiled CNNs
and DAs explains why the approaches work.
| [
{
"version": "v1",
"created": "Mon, 1 Jun 2015 02:17:06 GMT"
}
] | 2015-06-02T00:00:00 | [
[
"Wang",
"Zhiguang",
""
],
[
"Oates",
"Tim",
""
]
] | TITLE: Imaging Time-Series to Improve Classification and Imputation
ABSTRACT: Inspired by recent successes of deep learning in computer vision, we propose
a novel framework for encoding time series as different types of images,
namely, Gramian Angular Summation/Difference Fields (GASF/GADF) and Markov
Transition Fields (MTF). This enables the use of techniques from computer
vision for time series classification and imputation. We used Tiled
Convolutional Neural Networks (tiled CNNs) on 20 standard datasets to learn
high-level features from the individual and compound GASF-GADF-MTF images. Our
approaches achieve highly competitive results when compared to nine of the
current best time series classification approaches. Inspired by the bijection
property of GASF on 0/1 rescaled data, we train Denoised Auto-encoders (DA) on
the GASF images of four standard and one synthesized compound dataset. The
imputation MSE on test data is reduced by 12.18%-48.02% when compared to using
the raw data. An analysis of the features and weights learned via tiled CNNs
and DAs explains why the approaches work.
|
1506.00481 | Weilin Huang | Weilin Huang and Hujun Yin | Robust Face Recognition with Structural Binary Gradient Patterns | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper presents a computationally efficient yet powerful binary framework
for robust facial representation based on image gradients. It is termed as
structural binary gradient patterns (SBGP). To discover underlying local
structures in the gradient domain, we compute image gradients from multiple
directions and simplify them into a set of binary strings. The SBGP is derived
from certain types of these binary strings that have meaningful local
structures and are capable of resembling fundamental textural information. They
detect micro orientational edges and possess strong orientation and locality
capabilities, thus enabling great discrimination. The SBGP also benefits from
the advantages of the gradient domain and exhibits profound robustness against
illumination variations. The binary strategy realized by pixel correlations in
a small neighborhood substantially simplifies the computational complexity and
achieves extremely efficient processing with only 0.0032s in Matlab for a
typical face image. Furthermore, the discrimination power of the SBGP can be
enhanced on a set of defined orientational image gradient magnitudes, further
enforcing locality and orientation. Results of extensive experiments on various
benchmark databases illustrate significant improvements of the SBGP based
representations over the existing state-of-the-art local descriptors in the
terms of discrimination, robustness and complexity. Codes for the SBGP methods
will be available at
http://www.eee.manchester.ac.uk/research/groups/sisp/software/.
| [
{
"version": "v1",
"created": "Mon, 1 Jun 2015 12:57:07 GMT"
}
] | 2015-06-02T00:00:00 | [
[
"Huang",
"Weilin",
""
],
[
"Yin",
"Hujun",
""
]
] | TITLE: Robust Face Recognition with Structural Binary Gradient Patterns
ABSTRACT: This paper presents a computationally efficient yet powerful binary framework
for robust facial representation based on image gradients. It is termed as
structural binary gradient patterns (SBGP). To discover underlying local
structures in the gradient domain, we compute image gradients from multiple
directions and simplify them into a set of binary strings. The SBGP is derived
from certain types of these binary strings that have meaningful local
structures and are capable of resembling fundamental textural information. They
detect micro orientational edges and possess strong orientation and locality
capabilities, thus enabling great discrimination. The SBGP also benefits from
the advantages of the gradient domain and exhibits profound robustness against
illumination variations. The binary strategy realized by pixel correlations in
a small neighborhood substantially simplifies the computational complexity and
achieves extremely efficient processing with only 0.0032s in Matlab for a
typical face image. Furthermore, the discrimination power of the SBGP can be
enhanced on a set of defined orientational image gradient magnitudes, further
enforcing locality and orientation. Results of extensive experiments on various
benchmark databases illustrate significant improvements of the SBGP based
representations over the existing state-of-the-art local descriptors in the
terms of discrimination, robustness and complexity. Codes for the SBGP methods
will be available at
http://www.eee.manchester.ac.uk/research/groups/sisp/software/.
|
1506.00527 | Gianluigi Ciocca | Simone Bianco, Gianluigi Ciocca | User Preferences Modeling and Learning for Pleasing Photo Collage
Generation | To be published in ACM Transactions on Multimedia Computing,
Communications, and Applications (TOMM) | null | null | null | cs.MM cs.CV cs.HC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we consider how to automatically create pleasing photo collages
created by placing a set of images on a limited canvas area. The task is
formulated as an optimization problem. Differently from existing
state-of-the-art approaches, we here exploit subjective experiments to model
and learn pleasantness from user preferences. To this end, we design an
experimental framework for the identification of the criteria that need to be
taken into account to generate a pleasing photo collage. Five different
thematic photo datasets are used to create collages using state-of-the-art
criteria. A first subjective experiment where several subjects evaluated the
collages, emphasizes that different criteria are involved in the subjective
definition of pleasantness. We then identify new global and local criteria and
design algorithms to quantify them. The relative importance of these criteria
are automatically learned by exploiting the user preferences, and new collages
are generated. To validate our framework, we performed several psycho-visual
experiments involving different users. The results shows that the proposed
framework allows to learn a novel computational model which effectively encodes
an inter-user definition of pleasantness. The learned definition of
pleasantness generalizes well to new photo datasets of different themes and
sizes not used in the learning. Moreover, compared with two state of the art
approaches, the collages created using our framework are preferred by the
majority of the users.
| [
{
"version": "v1",
"created": "Mon, 1 Jun 2015 15:20:29 GMT"
}
] | 2015-06-02T00:00:00 | [
[
"Bianco",
"Simone",
""
],
[
"Ciocca",
"Gianluigi",
""
]
] | TITLE: User Preferences Modeling and Learning for Pleasing Photo Collage
Generation
ABSTRACT: In this paper we consider how to automatically create pleasing photo collages
created by placing a set of images on a limited canvas area. The task is
formulated as an optimization problem. Differently from existing
state-of-the-art approaches, we here exploit subjective experiments to model
and learn pleasantness from user preferences. To this end, we design an
experimental framework for the identification of the criteria that need to be
taken into account to generate a pleasing photo collage. Five different
thematic photo datasets are used to create collages using state-of-the-art
criteria. A first subjective experiment where several subjects evaluated the
collages, emphasizes that different criteria are involved in the subjective
definition of pleasantness. We then identify new global and local criteria and
design algorithms to quantify them. The relative importance of these criteria
are automatically learned by exploiting the user preferences, and new collages
are generated. To validate our framework, we performed several psycho-visual
experiments involving different users. The results shows that the proposed
framework allows to learn a novel computational model which effectively encodes
an inter-user definition of pleasantness. The learned definition of
pleasantness generalizes well to new photo datasets of different themes and
sizes not used in the learning. Moreover, compared with two state of the art
approaches, the collages created using our framework are preferred by the
majority of the users.
|
1506.00528 | Liangliang Cao | Chang Wang, Liangliang Cao, Bowen Zhou | Medical Synonym Extraction with Concept Space Models | 7 pages, to appear in IJCAI 2015 | null | null | null | cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we present a novel approach for medical synonym extraction. We
aim to integrate the term embedding with the medical domain knowledge for
healthcare applications. One advantage of our method is that it is very
scalable. Experiments on a dataset with more than 1M term pairs show that the
proposed approach outperforms the baseline approaches by a large margin.
| [
{
"version": "v1",
"created": "Mon, 1 Jun 2015 15:21:00 GMT"
}
] | 2015-06-02T00:00:00 | [
[
"Wang",
"Chang",
""
],
[
"Cao",
"Liangliang",
""
],
[
"Zhou",
"Bowen",
""
]
] | TITLE: Medical Synonym Extraction with Concept Space Models
ABSTRACT: In this paper, we present a novel approach for medical synonym extraction. We
aim to integrate the term embedding with the medical domain knowledge for
healthcare applications. One advantage of our method is that it is very
scalable. Experiments on a dataset with more than 1M term pairs show that the
proposed approach outperforms the baseline approaches by a large margin.
|
1506.00619 | Bart van Merri\"enboer | Bart van Merri\"enboer, Dzmitry Bahdanau, Vincent Dumoulin, Dmitriy
Serdyuk, David Warde-Farley, Jan Chorowski, Yoshua Bengio | Blocks and Fuel: Frameworks for deep learning | null | null | null | null | cs.LG cs.NE stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We introduce two Python frameworks to train neural networks on large
datasets: Blocks and Fuel. Blocks is based on Theano, a linear algebra compiler
with CUDA-support. It facilitates the training of complex neural network models
by providing parametrized Theano operations, attaching metadata to Theano's
symbolic computational graph, and providing an extensive set of utilities to
assist training the networks, e.g. training algorithms, logging, monitoring,
visualization, and serialization. Fuel provides a standard format for machine
learning datasets. It allows the user to easily iterate over large datasets,
performing many types of pre-processing on the fly.
| [
{
"version": "v1",
"created": "Mon, 1 Jun 2015 19:28:27 GMT"
}
] | 2015-06-02T00:00:00 | [
[
"van Merriënboer",
"Bart",
""
],
[
"Bahdanau",
"Dzmitry",
""
],
[
"Dumoulin",
"Vincent",
""
],
[
"Serdyuk",
"Dmitriy",
""
],
[
"Warde-Farley",
"David",
""
],
[
"Chorowski",
"Jan",
""
],
[
"Bengio",
"Yoshua",
""
]
] | TITLE: Blocks and Fuel: Frameworks for deep learning
ABSTRACT: We introduce two Python frameworks to train neural networks on large
datasets: Blocks and Fuel. Blocks is based on Theano, a linear algebra compiler
with CUDA-support. It facilitates the training of complex neural network models
by providing parametrized Theano operations, attaching metadata to Theano's
symbolic computational graph, and providing an extensive set of utilities to
assist training the networks, e.g. training algorithms, logging, monitoring,
visualization, and serialization. Fuel provides a standard format for machine
learning datasets. It allows the user to easily iterate over large datasets,
performing many types of pre-processing on the fly.
|
1411.0352 | Maxime Chevalier-Boisvert | Maxime Chevalier-Boisvert, Marc Feeley | Simple and Effective Type Check Removal through Lazy Basic Block
Versioning | null | null | null | null | cs.PL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Dynamically typed programming languages such as JavaScript and Python defer
type checking to run time. In order to maximize performance, dynamic language
VM implementations must attempt to eliminate redundant dynamic type checks.
However, type inference analyses are often costly and involve tradeoffs between
compilation time and resulting precision. This has lead to the creation of
increasingly complex multi-tiered VM architectures.
This paper introduces lazy basic block versioning, a simple JIT compilation
technique which effectively removes redundant type checks from critical code
paths. This novel approach lazily generates type-specialized versions of basic
blocks on-the-fly while propagating context-dependent type information. This
does not require the use of costly program analyses, is not restricted by the
precision limitations of traditional type analyses and avoids the
implementation complexity of speculative optimization techniques.
We have implemented intraprocedural lazy basic block versioning in a
JavaScript JIT compiler. This approach is compared with a classical flow-based
type analysis. Lazy basic block versioning performs as well or better on all
benchmarks. On average, 71% of type tests are eliminated, yielding speedups of
up to 50%. We also show that our implementation generates more efficient
machine code than TraceMonkey, a tracing JIT compiler for JavaScript, on
several benchmarks. The combination of implementation simplicity, low
algorithmic complexity and good run time performance makes basic block
versioning attractive for baseline JIT compilers.
| [
{
"version": "v1",
"created": "Mon, 3 Nov 2014 03:46:18 GMT"
},
{
"version": "v2",
"created": "Fri, 29 May 2015 18:06:07 GMT"
}
] | 2015-06-01T00:00:00 | [
[
"Chevalier-Boisvert",
"Maxime",
""
],
[
"Feeley",
"Marc",
""
]
] | TITLE: Simple and Effective Type Check Removal through Lazy Basic Block
Versioning
ABSTRACT: Dynamically typed programming languages such as JavaScript and Python defer
type checking to run time. In order to maximize performance, dynamic language
VM implementations must attempt to eliminate redundant dynamic type checks.
However, type inference analyses are often costly and involve tradeoffs between
compilation time and resulting precision. This has lead to the creation of
increasingly complex multi-tiered VM architectures.
This paper introduces lazy basic block versioning, a simple JIT compilation
technique which effectively removes redundant type checks from critical code
paths. This novel approach lazily generates type-specialized versions of basic
blocks on-the-fly while propagating context-dependent type information. This
does not require the use of costly program analyses, is not restricted by the
precision limitations of traditional type analyses and avoids the
implementation complexity of speculative optimization techniques.
We have implemented intraprocedural lazy basic block versioning in a
JavaScript JIT compiler. This approach is compared with a classical flow-based
type analysis. Lazy basic block versioning performs as well or better on all
benchmarks. On average, 71% of type tests are eliminated, yielding speedups of
up to 50%. We also show that our implementation generates more efficient
machine code than TraceMonkey, a tracing JIT compiler for JavaScript, on
several benchmarks. The combination of implementation simplicity, low
algorithmic complexity and good run time performance makes basic block
versioning attractive for baseline JIT compilers.
|
1412.7259 | Dong Wang | Dong Wang and Xiaoyang Tan | Unsupervised Feature Learning with C-SVDDNet | null | null | null | null | cs.CV cs.LG cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we investigate the problem of learning feature representation
from unlabeled data using a single-layer K-means network. A K-means network
maps the input data into a feature representation by finding the nearest
centroid for each input point, which has attracted researchers' great attention
recently due to its simplicity, effectiveness, and scalability. However, one
drawback of this feature mapping is that it tends to be unreliable when the
training data contains noise. To address this issue, we propose a SVDD based
feature learning algorithm that describes the density and distribution of each
cluster from K-means with an SVDD ball for more robust feature representation.
For this purpose, we present a new SVDD algorithm called C-SVDD that centers
the SVDD ball towards the mode of local density of each cluster, and we show
that the objective of C-SVDD can be solved very efficiently as a linear
programming problem. Additionally, traditional unsupervised feature learning
methods usually take an average or sum of local representations to obtain
global representation which ignore spatial relationship among them. To use
spatial information we propose a global representation with a variant of SIFT
descriptor. The architecture is also extended with multiple receptive field
scales and multiple pooling sizes. Extensive experiments on several popular
object recognition benchmarks, such as STL-10, MINST, Holiday and Copydays
shows that the proposed C-SVDDNet method yields comparable or better
performance than that of the previous state of the art methods.
| [
{
"version": "v1",
"created": "Tue, 23 Dec 2014 05:56:50 GMT"
},
{
"version": "v2",
"created": "Mon, 12 Jan 2015 05:31:03 GMT"
},
{
"version": "v3",
"created": "Fri, 29 May 2015 09:50:54 GMT"
}
] | 2015-06-01T00:00:00 | [
[
"Wang",
"Dong",
""
],
[
"Tan",
"Xiaoyang",
""
]
] | TITLE: Unsupervised Feature Learning with C-SVDDNet
ABSTRACT: In this paper, we investigate the problem of learning feature representation
from unlabeled data using a single-layer K-means network. A K-means network
maps the input data into a feature representation by finding the nearest
centroid for each input point, which has attracted researchers' great attention
recently due to its simplicity, effectiveness, and scalability. However, one
drawback of this feature mapping is that it tends to be unreliable when the
training data contains noise. To address this issue, we propose a SVDD based
feature learning algorithm that describes the density and distribution of each
cluster from K-means with an SVDD ball for more robust feature representation.
For this purpose, we present a new SVDD algorithm called C-SVDD that centers
the SVDD ball towards the mode of local density of each cluster, and we show
that the objective of C-SVDD can be solved very efficiently as a linear
programming problem. Additionally, traditional unsupervised feature learning
methods usually take an average or sum of local representations to obtain
global representation which ignore spatial relationship among them. To use
spatial information we propose a global representation with a variant of SIFT
descriptor. The architecture is also extended with multiple receptive field
scales and multiple pooling sizes. Extensive experiments on several popular
object recognition benchmarks, such as STL-10, MINST, Holiday and Copydays
shows that the proposed C-SVDDNet method yields comparable or better
performance than that of the previous state of the art methods.
|
1501.04870 | Luca Martino | J. Read, L. Martino, P. Olmos, D. Luengo | Scalable Multi-Output Label Prediction: From Classifier Chains to
Classifier Trellises | (accepted in Pattern Recognition) | Pattern Recognition, Volume 48, Issue 6, 2015, Pages 2096-2109 | 10.1016/j.patcog.2015.01.004 | null | stat.ML cs.CV cs.DS cs.LG stat.CO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Multi-output inference tasks, such as multi-label classification, have become
increasingly important in recent years. A popular method for multi-label
classification is classifier chains, in which the predictions of individual
classifiers are cascaded along a chain, thus taking into account inter-label
dependencies and improving the overall performance. Several varieties of
classifier chain methods have been introduced, and many of them perform very
competitively across a wide range of benchmark datasets. However, scalability
limitations become apparent on larger datasets when modeling a fully-cascaded
chain. In particular, the methods' strategies for discovering and modeling a
good chain structure constitutes a mayor computational bottleneck. In this
paper, we present the classifier trellis (CT) method for scalable multi-label
classification. We compare CT with several recently proposed classifier chain
methods to show that it occupies an important niche: it is highly competitive
on standard multi-label problems, yet it can also scale up to thousands or even
tens of thousands of labels.
| [
{
"version": "v1",
"created": "Tue, 20 Jan 2015 16:33:40 GMT"
}
] | 2015-06-01T00:00:00 | [
[
"Read",
"J.",
""
],
[
"Martino",
"L.",
""
],
[
"Olmos",
"P.",
""
],
[
"Luengo",
"D.",
""
]
] | TITLE: Scalable Multi-Output Label Prediction: From Classifier Chains to
Classifier Trellises
ABSTRACT: Multi-output inference tasks, such as multi-label classification, have become
increasingly important in recent years. A popular method for multi-label
classification is classifier chains, in which the predictions of individual
classifiers are cascaded along a chain, thus taking into account inter-label
dependencies and improving the overall performance. Several varieties of
classifier chain methods have been introduced, and many of them perform very
competitively across a wide range of benchmark datasets. However, scalability
limitations become apparent on larger datasets when modeling a fully-cascaded
chain. In particular, the methods' strategies for discovering and modeling a
good chain structure constitutes a mayor computational bottleneck. In this
paper, we present the classifier trellis (CT) method for scalable multi-label
classification. We compare CT with several recently proposed classifier chain
methods to show that it occupies an important niche: it is highly competitive
on standard multi-label problems, yet it can also scale up to thousands or even
tens of thousands of labels.
|
1505.07922 | Junshi Huang | Junshi Huang, Rogerio S. Feris, Qiang Chen, Shuicheng Yan | Cross-domain Image Retrieval with a Dual Attribute-aware Ranking Network | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We address the problem of cross-domain image retrieval, considering the
following practical application: given a user photo depicting a clothing image,
our goal is to retrieve the same or attribute-similar clothing items from
online shopping stores. This is a challenging problem due to the large
discrepancy between online shopping images, usually taken in ideal
lighting/pose/background conditions, and user photos captured in uncontrolled
conditions. To address this problem, we propose a Dual Attribute-aware Ranking
Network (DARN) for retrieval feature learning. More specifically, DARN consists
of two sub-networks, one for each domain, whose retrieval feature
representations are driven by semantic attribute learning. We show that this
attribute-guided learning is a key factor for retrieval accuracy improvement.
In addition, to further align with the nature of the retrieval problem, we
impose a triplet visual similarity constraint for learning to rank across the
two sub-networks. Another contribution of our work is a large-scale dataset
which makes the network learning feasible. We exploit customer review websites
to crawl a large set of online shopping images and corresponding offline user
photos with fine-grained clothing attributes, i.e., around 450,000 online
shopping images and about 90,000 exact offline counterpart images of those
online ones. All these images are collected from real-world consumer websites
reflecting the diversity of the data modality, which makes this dataset unique
and rare in the academic community. We extensively evaluate the retrieval
performance of networks in different configurations. The top-20 retrieval
accuracy is doubled when using the proposed DARN other than the current popular
solution using pre-trained CNN features only (0.570 vs. 0.268).
| [
{
"version": "v1",
"created": "Fri, 29 May 2015 04:46:37 GMT"
}
] | 2015-06-01T00:00:00 | [
[
"Huang",
"Junshi",
""
],
[
"Feris",
"Rogerio S.",
""
],
[
"Chen",
"Qiang",
""
],
[
"Yan",
"Shuicheng",
""
]
] | TITLE: Cross-domain Image Retrieval with a Dual Attribute-aware Ranking Network
ABSTRACT: We address the problem of cross-domain image retrieval, considering the
following practical application: given a user photo depicting a clothing image,
our goal is to retrieve the same or attribute-similar clothing items from
online shopping stores. This is a challenging problem due to the large
discrepancy between online shopping images, usually taken in ideal
lighting/pose/background conditions, and user photos captured in uncontrolled
conditions. To address this problem, we propose a Dual Attribute-aware Ranking
Network (DARN) for retrieval feature learning. More specifically, DARN consists
of two sub-networks, one for each domain, whose retrieval feature
representations are driven by semantic attribute learning. We show that this
attribute-guided learning is a key factor for retrieval accuracy improvement.
In addition, to further align with the nature of the retrieval problem, we
impose a triplet visual similarity constraint for learning to rank across the
two sub-networks. Another contribution of our work is a large-scale dataset
which makes the network learning feasible. We exploit customer review websites
to crawl a large set of online shopping images and corresponding offline user
photos with fine-grained clothing attributes, i.e., around 450,000 online
shopping images and about 90,000 exact offline counterpart images of those
online ones. All these images are collected from real-world consumer websites
reflecting the diversity of the data modality, which makes this dataset unique
and rare in the academic community. We extensively evaluate the retrieval
performance of networks in different configurations. The top-20 retrieval
accuracy is doubled when using the proposed DARN other than the current popular
solution using pre-trained CNN features only (0.570 vs. 0.268).
|
1505.07930 | Tam Nguyen | Tam V. Nguyen, Jose Sepulveda | Salient Object Detection via Augmented Hypotheses | IJCAI 2015 paper | null | null | null | cs.CV | http://creativecommons.org/licenses/by/3.0/ | In this paper, we propose using \textit{augmented hypotheses} which consider
objectness, foreground and compactness for salient object detection. Our
algorithm consists of four basic steps. First, our method generates the
objectness map via objectness hypotheses. Based on the objectness map, we
estimate the foreground margin and compute the corresponding foreground map
which prefers the foreground objects. From the objectness map and the
foreground map, the compactness map is formed to favor the compact objects. We
then derive a saliency measure that produces a pixel-accurate saliency map
which uniformly covers the objects of interest and consistently separates fore-
and background. We finally evaluate the proposed framework on two challenging
datasets, MSRA-1000 and iCoSeg. Our extensive experimental results show that
our method outperforms state-of-the-art approaches.
| [
{
"version": "v1",
"created": "Fri, 29 May 2015 06:03:57 GMT"
}
] | 2015-06-01T00:00:00 | [
[
"Nguyen",
"Tam V.",
""
],
[
"Sepulveda",
"Jose",
""
]
] | TITLE: Salient Object Detection via Augmented Hypotheses
ABSTRACT: In this paper, we propose using \textit{augmented hypotheses} which consider
objectness, foreground and compactness for salient object detection. Our
algorithm consists of four basic steps. First, our method generates the
objectness map via objectness hypotheses. Based on the objectness map, we
estimate the foreground margin and compute the corresponding foreground map
which prefers the foreground objects. From the objectness map and the
foreground map, the compactness map is formed to favor the compact objects. We
then derive a saliency measure that produces a pixel-accurate saliency map
which uniformly covers the objects of interest and consistently separates fore-
and background. We finally evaluate the proposed framework on two challenging
datasets, MSRA-1000 and iCoSeg. Our extensive experimental results show that
our method outperforms state-of-the-art approaches.
|
1505.07931 | Xuefeng Yang | Xuefeng Yang, Kezhi Mao | Supervised Fine Tuning for Word Embedding with Integrated Knowledge | null | null | null | null | cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Learning vector representation for words is an important research field which
may benefit many natural language processing tasks. Two limitations exist in
nearly all available models, which are the bias caused by the context
definition and the lack of knowledge utilization. They are difficult to tackle
because these algorithms are essentially unsupervised learning approaches.
Inspired by deep learning, the authors propose a supervised framework for
learning vector representation of words to provide additional supervised fine
tuning after unsupervised learning. The framework is knowledge rich approacher
and compatible with any numerical vectors word representation. The authors
perform both intrinsic evaluation like attributional and relational similarity
prediction and extrinsic evaluations like the sentence completion and sentiment
analysis. Experiments results on 6 embeddings and 4 tasks with 10 datasets show
that the proposed fine tuning framework may significantly improve the quality
of the vector representation of words.
| [
{
"version": "v1",
"created": "Fri, 29 May 2015 06:11:00 GMT"
}
] | 2015-06-01T00:00:00 | [
[
"Yang",
"Xuefeng",
""
],
[
"Mao",
"Kezhi",
""
]
] | TITLE: Supervised Fine Tuning for Word Embedding with Integrated Knowledge
ABSTRACT: Learning vector representation for words is an important research field which
may benefit many natural language processing tasks. Two limitations exist in
nearly all available models, which are the bias caused by the context
definition and the lack of knowledge utilization. They are difficult to tackle
because these algorithms are essentially unsupervised learning approaches.
Inspired by deep learning, the authors propose a supervised framework for
learning vector representation of words to provide additional supervised fine
tuning after unsupervised learning. The framework is knowledge rich approacher
and compatible with any numerical vectors word representation. The authors
perform both intrinsic evaluation like attributional and relational similarity
prediction and extrinsic evaluations like the sentence completion and sentiment
analysis. Experiments results on 6 embeddings and 4 tasks with 10 datasets show
that the proposed fine tuning framework may significantly improve the quality
of the vector representation of words.
|
1505.07987 | Thomas Gransden | Thomas Gransden and Neil Walkinshaw and Rajeev Raman | SEPIA: Search for Proofs Using Inferred Automata | To appear at 25th International Conference on Automated Deduction | null | null | null | cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper describes SEPIA, a tool for automated proof generation in Coq.
SEPIA combines model inference with interactive theorem proving. Existing proof
corpora are modelled using state-based models inferred from tactic sequences.
These can then be traversed automatically to identify proofs. The SEPIA system
is described and its performance evaluated on three Coq datasets. Our results
show that SEPIA provides a useful complement to existing automated tactics in
Coq.
| [
{
"version": "v1",
"created": "Fri, 29 May 2015 10:39:44 GMT"
}
] | 2015-06-01T00:00:00 | [
[
"Gransden",
"Thomas",
""
],
[
"Walkinshaw",
"Neil",
""
],
[
"Raman",
"Rajeev",
""
]
] | TITLE: SEPIA: Search for Proofs Using Inferred Automata
ABSTRACT: This paper describes SEPIA, a tool for automated proof generation in Coq.
SEPIA combines model inference with interactive theorem proving. Existing proof
corpora are modelled using state-based models inferred from tactic sequences.
These can then be traversed automatically to identify proofs. The SEPIA system
is described and its performance evaluated on three Coq datasets. Our results
show that SEPIA provides a useful complement to existing automated tactics in
Coq.
|
1110.3649 | Yaron Lipman | D. Boyer and Y. Lipman and E. St. Clair and J. Puente and T.
Funkhouser and B. Patel and J. Jernvall and I. Daubechies | Algorithms to automatically quantify the geometric similarity of
anatomical surfaces | Changes with respect to v1, v2: an Erratum was added, correcting the
references for one of the three datasets. Note that the datasets and code for
this paper can be obtained from the Data Conservancy (see Download column on
v1, v2) | PNAS 2011 108 (45) 18221-18226 | 10.1073/pnas.1112822108 | null | math.NA cs.CV cs.GR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We describe new approaches for distances between pairs of 2-dimensional
surfaces (embedded in 3-dimensional space) that use local structures and global
information contained in inter-structure geometric relationships. We present
algorithms to automatically determine these distances as well as geometric
correspondences. This is motivated by the aspiration of students of natural
science to understand the continuity of form that unites the diversity of life.
At present, scientists using physical traits to study evolutionary
relationships among living and extinct animals analyze data extracted from
carefully defined anatomical correspondence points (landmarks). Identifying and
recording these landmarks is time consuming and can be done accurately only by
trained morphologists. This renders these studies inaccessible to
non-morphologists, and causes phenomics to lag behind genomics in elucidating
evolutionary patterns. Unlike other algorithms presented for morphological
correspondences our approach does not require any preliminary marking of
special features or landmarks by the user. It also differs from other seminal
work in computational geometry in that our algorithms are polynomial in nature
and thus faster, making pairwise comparisons feasible for significantly larger
numbers of digitized surfaces. We illustrate our approach using three datasets
representing teeth and different bones of primates and humans, and show that it
leads to highly accurate results.
| [
{
"version": "v1",
"created": "Mon, 17 Oct 2011 12:23:30 GMT"
},
{
"version": "v2",
"created": "Tue, 18 Oct 2011 09:16:12 GMT"
},
{
"version": "v3",
"created": "Thu, 15 Mar 2012 13:36:16 GMT"
}
] | 2015-05-30T00:00:00 | [
[
"Boyer",
"D.",
""
],
[
"Lipman",
"Y.",
""
],
[
"Clair",
"E. St.",
""
],
[
"Puente",
"J.",
""
],
[
"Funkhouser",
"T.",
""
],
[
"Patel",
"B.",
""
],
[
"Jernvall",
"J.",
""
],
[
"Daubechies",
"I.",
""
]
] | TITLE: Algorithms to automatically quantify the geometric similarity of
anatomical surfaces
ABSTRACT: We describe new approaches for distances between pairs of 2-dimensional
surfaces (embedded in 3-dimensional space) that use local structures and global
information contained in inter-structure geometric relationships. We present
algorithms to automatically determine these distances as well as geometric
correspondences. This is motivated by the aspiration of students of natural
science to understand the continuity of form that unites the diversity of life.
At present, scientists using physical traits to study evolutionary
relationships among living and extinct animals analyze data extracted from
carefully defined anatomical correspondence points (landmarks). Identifying and
recording these landmarks is time consuming and can be done accurately only by
trained morphologists. This renders these studies inaccessible to
non-morphologists, and causes phenomics to lag behind genomics in elucidating
evolutionary patterns. Unlike other algorithms presented for morphological
correspondences our approach does not require any preliminary marking of
special features or landmarks by the user. It also differs from other seminal
work in computational geometry in that our algorithms are polynomial in nature
and thus faster, making pairwise comparisons feasible for significantly larger
numbers of digitized surfaces. We illustrate our approach using three datasets
representing teeth and different bones of primates and humans, and show that it
leads to highly accurate results.
|
1110.4784 | Matthieu Cristelli | Ilaria Bordino, Stefano Battiston, Guido Caldarelli, Matthieu
Cristelli, Antti Ukkonen, Ingmar Weber | Web search queries can predict stock market volumes | 29 pages, 11 figures, 11 tables + Supporting Information | null | 10.1371/journal.pone.0040014 | null | q-fin.ST cs.LG physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We live in a computerized and networked society where many of our actions
leave a digital trace and affect other people's actions. This has lead to the
emergence of a new data-driven research field: mathematical methods of computer
science, statistical physics and sociometry provide insights on a wide range of
disciplines ranging from social science to human mobility. A recent important
discovery is that query volumes (i.e., the number of requests submitted by
users to search engines on the www) can be used to track and, in some cases, to
anticipate the dynamics of social phenomena. Successful exemples include
unemployment levels, car and home sales, and epidemics spreading. Few recent
works applied this approach to stock prices and market sentiment. However, it
remains unclear if trends in financial markets can be anticipated by the
collective wisdom of on-line users on the web. Here we show that trading
volumes of stocks traded in NASDAQ-100 are correlated with the volumes of
queries related to the same stocks. In particular, query volumes anticipate in
many cases peaks of trading by one day or more. Our analysis is carried out on
a unique dataset of queries, submitted to an important web search engine, which
enable us to investigate also the user behavior. We show that the query volume
dynamics emerges from the collective but seemingly uncoordinated activity of
many users. These findings contribute to the debate on the identification of
early warnings of financial systemic risk, based on the activity of users of
the www.
| [
{
"version": "v1",
"created": "Fri, 21 Oct 2011 13:15:59 GMT"
},
{
"version": "v2",
"created": "Wed, 28 Mar 2012 14:07:49 GMT"
},
{
"version": "v3",
"created": "Mon, 4 Jun 2012 15:42:35 GMT"
}
] | 2015-05-30T00:00:00 | [
[
"Bordino",
"Ilaria",
""
],
[
"Battiston",
"Stefano",
""
],
[
"Caldarelli",
"Guido",
""
],
[
"Cristelli",
"Matthieu",
""
],
[
"Ukkonen",
"Antti",
""
],
[
"Weber",
"Ingmar",
""
]
] | TITLE: Web search queries can predict stock market volumes
ABSTRACT: We live in a computerized and networked society where many of our actions
leave a digital trace and affect other people's actions. This has lead to the
emergence of a new data-driven research field: mathematical methods of computer
science, statistical physics and sociometry provide insights on a wide range of
disciplines ranging from social science to human mobility. A recent important
discovery is that query volumes (i.e., the number of requests submitted by
users to search engines on the www) can be used to track and, in some cases, to
anticipate the dynamics of social phenomena. Successful exemples include
unemployment levels, car and home sales, and epidemics spreading. Few recent
works applied this approach to stock prices and market sentiment. However, it
remains unclear if trends in financial markets can be anticipated by the
collective wisdom of on-line users on the web. Here we show that trading
volumes of stocks traded in NASDAQ-100 are correlated with the volumes of
queries related to the same stocks. In particular, query volumes anticipate in
many cases peaks of trading by one day or more. Our analysis is carried out on
a unique dataset of queries, submitted to an important web search engine, which
enable us to investigate also the user behavior. We show that the query volume
dynamics emerges from the collective but seemingly uncoordinated activity of
many users. These findings contribute to the debate on the identification of
early warnings of financial systemic risk, based on the activity of users of
the www.
|
1404.4888 | Isadora Nun Ms | Isadora Nun, Karim Pichara, Pavlos Protopapas, Dae-Won Kim | Supervised detection of anomalous light-curves in massive astronomical
catalogs | 16 pages, 18 figures, published in The Astrophysical Journal | 2014, ApJ, 793, 23 | 10.1088/0004-637X/793/1/23 | null | cs.CE astro-ph.IM cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The development of synoptic sky surveys has led to a massive amount of data
for which resources needed for analysis are beyond human capabilities. To
process this information and to extract all possible knowledge, machine
learning techniques become necessary. Here we present a new method to
automatically discover unknown variable objects in large astronomical catalogs.
With the aim of taking full advantage of all the information we have about
known objects, our method is based on a supervised algorithm. In particular, we
train a random forest classifier using known variability classes of objects and
obtain votes for each of the objects in the training set. We then model this
voting distribution with a Bayesian network and obtain the joint voting
distribution among the training objects. Consequently, an unknown object is
considered as an outlier insofar it has a low joint probability. Our method is
suitable for exploring massive datasets given that the training process is
performed offline. We tested our algorithm on 20 millions light-curves from the
MACHO catalog and generated a list of anomalous candidates. We divided the
candidates into two main classes of outliers: artifacts and intrinsic outliers.
Artifacts were principally due to air mass variation, seasonal variation, bad
calibration or instrumental errors and were consequently removed from our
outlier list and added to the training set. After retraining, we selected about
4000 objects, which we passed to a post analysis stage by perfoming a
cross-match with all publicly available catalogs. Within these candidates we
identified certain known but rare objects such as eclipsing Cepheids, blue
variables, cataclysmic variables and X-ray sources. For some outliers there
were no additional information. Among them we identified three unknown
variability types and few individual outliers that will be followed up for a
deeper analysis.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2014 21:12:13 GMT"
},
{
"version": "v2",
"created": "Wed, 3 Sep 2014 15:50:49 GMT"
},
{
"version": "v3",
"created": "Wed, 27 May 2015 21:27:11 GMT"
}
] | 2015-05-29T00:00:00 | [
[
"Nun",
"Isadora",
""
],
[
"Pichara",
"Karim",
""
],
[
"Protopapas",
"Pavlos",
""
],
[
"Kim",
"Dae-Won",
""
]
] | TITLE: Supervised detection of anomalous light-curves in massive astronomical
catalogs
ABSTRACT: The development of synoptic sky surveys has led to a massive amount of data
for which resources needed for analysis are beyond human capabilities. To
process this information and to extract all possible knowledge, machine
learning techniques become necessary. Here we present a new method to
automatically discover unknown variable objects in large astronomical catalogs.
With the aim of taking full advantage of all the information we have about
known objects, our method is based on a supervised algorithm. In particular, we
train a random forest classifier using known variability classes of objects and
obtain votes for each of the objects in the training set. We then model this
voting distribution with a Bayesian network and obtain the joint voting
distribution among the training objects. Consequently, an unknown object is
considered as an outlier insofar it has a low joint probability. Our method is
suitable for exploring massive datasets given that the training process is
performed offline. We tested our algorithm on 20 millions light-curves from the
MACHO catalog and generated a list of anomalous candidates. We divided the
candidates into two main classes of outliers: artifacts and intrinsic outliers.
Artifacts were principally due to air mass variation, seasonal variation, bad
calibration or instrumental errors and were consequently removed from our
outlier list and added to the training set. After retraining, we selected about
4000 objects, which we passed to a post analysis stage by perfoming a
cross-match with all publicly available catalogs. Within these candidates we
identified certain known but rare objects such as eclipsing Cepheids, blue
variables, cataclysmic variables and X-ray sources. For some outliers there
were no additional information. Among them we identified three unknown
variability types and few individual outliers that will be followed up for a
deeper analysis.
|
1410.3560 | Ryan Rossi | Ryan A. Rossi and Nesreen K. Ahmed | NetworkRepository: An Interactive Data Repository with Multi-scale
Visual Analytics | AAAI 2015 DT | null | null | null | cs.DL cs.HC cs.SI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Network Repository (NR) is the first interactive data repository with a
web-based platform for visual interactive analytics. Unlike other data
repositories (e.g., UCI ML Data Repository, and SNAP), the network data
repository (networkrepository.com) allows users to not only download, but to
interactively analyze and visualize such data using our web-based interactive
graph analytics platform. Users can in real-time analyze, visualize, compare,
and explore data along many different dimensions. The aim of NR is to make it
easy to discover key insights into the data extremely fast with little effort
while also providing a medium for users to share data, visualizations, and
insights. Other key factors that differentiate NR from the current data
repositories is the number of graph datasets, their size, and variety. While
other data repositories are static, they also lack a means for users to
collaboratively discuss a particular dataset, corrections, or challenges with
using the data for certain applications. In contrast, we have incorporated many
social and collaborative aspects into NR in hopes of further facilitating
scientific research (e.g., users can discuss each graph, post observations,
visualizations, etc.).
| [
{
"version": "v1",
"created": "Tue, 14 Oct 2014 03:35:37 GMT"
},
{
"version": "v2",
"created": "Thu, 28 May 2015 19:58:23 GMT"
}
] | 2015-05-29T00:00:00 | [
[
"Rossi",
"Ryan A.",
""
],
[
"Ahmed",
"Nesreen K.",
""
]
] | TITLE: NetworkRepository: An Interactive Data Repository with Multi-scale
Visual Analytics
ABSTRACT: Network Repository (NR) is the first interactive data repository with a
web-based platform for visual interactive analytics. Unlike other data
repositories (e.g., UCI ML Data Repository, and SNAP), the network data
repository (networkrepository.com) allows users to not only download, but to
interactively analyze and visualize such data using our web-based interactive
graph analytics platform. Users can in real-time analyze, visualize, compare,
and explore data along many different dimensions. The aim of NR is to make it
easy to discover key insights into the data extremely fast with little effort
while also providing a medium for users to share data, visualizations, and
insights. Other key factors that differentiate NR from the current data
repositories is the number of graph datasets, their size, and variety. While
other data repositories are static, they also lack a means for users to
collaboratively discuss a particular dataset, corrections, or challenges with
using the data for certain applications. In contrast, we have incorporated many
social and collaborative aspects into NR in hopes of further facilitating
scientific research (e.g., users can discuss each graph, post observations,
visualizations, etc.).
|
1504.06662 | Arvind Neelakantan | Arvind Neelakantan, Benjamin Roth and Andrew McCallum | Compositional Vector Space Models for Knowledge Base Completion | The 53rd Annual Meeting of the Association for Computational
Linguistics and The 7th International Joint Conference of the Asian
Federation of Natural Language Processing, 2015 | null | null | null | cs.CL stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Knowledge base (KB) completion adds new facts to a KB by making inferences
from existing facts, for example by inferring with high likelihood
nationality(X,Y) from bornIn(X,Y). Most previous methods infer simple one-hop
relational synonyms like this, or use as evidence a multi-hop relational path
treated as an atomic feature, like bornIn(X,Z) -> containedIn(Z,Y). This paper
presents an approach that reasons about conjunctions of multi-hop relations
non-atomically, composing the implications of a path using a recursive neural
network (RNN) that takes as inputs vector embeddings of the binary relation in
the path. Not only does this allow us to generalize to paths unseen at training
time, but also, with a single high-capacity RNN, to predict new relation types
not seen when the compositional model was trained (zero-shot learning). We
assemble a new dataset of over 52M relational triples, and show that our method
improves over a traditional classifier by 11%, and a method leveraging
pre-trained embeddings by 7%.
| [
{
"version": "v1",
"created": "Fri, 24 Apr 2015 23:06:10 GMT"
},
{
"version": "v2",
"created": "Wed, 27 May 2015 21:23:45 GMT"
}
] | 2015-05-29T00:00:00 | [
[
"Neelakantan",
"Arvind",
""
],
[
"Roth",
"Benjamin",
""
],
[
"McCallum",
"Andrew",
""
]
] | TITLE: Compositional Vector Space Models for Knowledge Base Completion
ABSTRACT: Knowledge base (KB) completion adds new facts to a KB by making inferences
from existing facts, for example by inferring with high likelihood
nationality(X,Y) from bornIn(X,Y). Most previous methods infer simple one-hop
relational synonyms like this, or use as evidence a multi-hop relational path
treated as an atomic feature, like bornIn(X,Z) -> containedIn(Z,Y). This paper
presents an approach that reasons about conjunctions of multi-hop relations
non-atomically, composing the implications of a path using a recursive neural
network (RNN) that takes as inputs vector embeddings of the binary relation in
the path. Not only does this allow us to generalize to paths unseen at training
time, but also, with a single high-capacity RNN, to predict new relation types
not seen when the compositional model was trained (zero-shot learning). We
assemble a new dataset of over 52M relational triples, and show that our method
improves over a traditional classifier by 11%, and a method leveraging
pre-trained embeddings by 7%.
|
1505.02137 | Mohamed Amer | Mohamed R. Amer, Behjat Siddiquie, Amir Tamrakar, David A. Salter,
Brian Lande, Darius Mehri and Ajay Divakaran | Human Social Interaction Modeling Using Temporal Deep Networks | null | null | null | null | cs.CY cs.LG | http://creativecommons.org/licenses/by-nc-sa/3.0/ | We present a novel approach to computational modeling of social interactions
based on modeling of essential social interaction predicates (ESIPs) such as
joint attention and entrainment. Based on sound social psychological theory and
methodology, we collect a new "Tower Game" dataset consisting of audio-visual
capture of dyadic interactions labeled with the ESIPs. We expect this dataset
to provide a new avenue for research in computational social interaction
modeling. We propose a novel joint Discriminative Conditional Restricted
Boltzmann Machine (DCRBM) model that combines a discriminative component with
the generative power of CRBMs. Such a combination enables us to uncover
actionable constituents of the ESIPs in two steps. First, we train the DCRBM
model on the labeled data and get accurate (76\%-49\% across various ESIPs)
detection of the predicates. Second, we exploit the generative capability of
DCRBMs to activate the trained model so as to generate the lower-level data
corresponding to the specific ESIP that closely matches the actual training
data (with mean square error 0.01-0.1 for generating 100 frames). We are thus
able to decompose the ESIPs into their constituent actionable behaviors. Such a
purely computational determination of how to establish an ESIP such as
engagement is unprecedented.
| [
{
"version": "v1",
"created": "Wed, 6 May 2015 18:17:56 GMT"
},
{
"version": "v2",
"created": "Thu, 28 May 2015 16:05:07 GMT"
}
] | 2015-05-29T00:00:00 | [
[
"Amer",
"Mohamed R.",
""
],
[
"Siddiquie",
"Behjat",
""
],
[
"Tamrakar",
"Amir",
""
],
[
"Salter",
"David A.",
""
],
[
"Lande",
"Brian",
""
],
[
"Mehri",
"Darius",
""
],
[
"Divakaran",
"Ajay",
""
]
] | TITLE: Human Social Interaction Modeling Using Temporal Deep Networks
ABSTRACT: We present a novel approach to computational modeling of social interactions
based on modeling of essential social interaction predicates (ESIPs) such as
joint attention and entrainment. Based on sound social psychological theory and
methodology, we collect a new "Tower Game" dataset consisting of audio-visual
capture of dyadic interactions labeled with the ESIPs. We expect this dataset
to provide a new avenue for research in computational social interaction
modeling. We propose a novel joint Discriminative Conditional Restricted
Boltzmann Machine (DCRBM) model that combines a discriminative component with
the generative power of CRBMs. Such a combination enables us to uncover
actionable constituents of the ESIPs in two steps. First, we train the DCRBM
model on the labeled data and get accurate (76\%-49\% across various ESIPs)
detection of the predicates. Second, we exploit the generative capability of
DCRBMs to activate the trained model so as to generate the lower-level data
corresponding to the specific ESIP that closely matches the actual training
data (with mean square error 0.01-0.1 for generating 100 frames). We are thus
able to decompose the ESIPs into their constituent actionable behaviors. Such a
purely computational determination of how to establish an ESIP such as
engagement is unprecedented.
|
1505.07499 | Reza Shokri | Vincent Bindschaedler and Reza Shokri | Privacy through Fake yet Semantically Real Traces | null | null | null | null | cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Camouflaging data by generating fake information is a well-known obfuscation
technique for protecting data privacy. In this paper, we focus on a very
sensitive and increasingly exposed type of data: location data. There are two
main scenarios in which fake traces are of extreme value to preserve location
privacy: publishing datasets of location trajectories, and using location-based
services. Despite advances in protecting (location) data privacy, there is no
quantitative method to evaluate how realistic a synthetic trace is, and how
much utility and privacy it provides in each scenario. Also, the lack of a
methodology to generate privacy-preserving fake traces is evident. In this
paper, we fill this gap and propose the first statistical metric and model to
generate fake location traces such that both the utility of data and the
privacy of users are preserved. We build upon the fact that, although
geographically they visit distinct locations, people have strongly semantically
similar mobility patterns, for example, their transition pattern across
activities (e.g., working, driving, staying at home) is similar. We define a
statistical metric and propose an algorithm that automatically discovers the
hidden semantic similarities between locations from a bag of real location
traces as seeds, without requiring any initial semantic annotations. We
guarantee that fake traces are geographically dissimilar to their seeds, so
they do not leak sensitive location information. We also protect contributors
to seed traces against membership attacks. Interleaving fake traces with mobile
users' traces is a prominent location privacy defense mechanism. We
quantitatively show the effectiveness of our methodology in protecting against
localization inference attacks while preserving utility of sharing/publishing
traces.
| [
{
"version": "v1",
"created": "Wed, 27 May 2015 21:48:59 GMT"
}
] | 2015-05-29T00:00:00 | [
[
"Bindschaedler",
"Vincent",
""
],
[
"Shokri",
"Reza",
""
]
] | TITLE: Privacy through Fake yet Semantically Real Traces
ABSTRACT: Camouflaging data by generating fake information is a well-known obfuscation
technique for protecting data privacy. In this paper, we focus on a very
sensitive and increasingly exposed type of data: location data. There are two
main scenarios in which fake traces are of extreme value to preserve location
privacy: publishing datasets of location trajectories, and using location-based
services. Despite advances in protecting (location) data privacy, there is no
quantitative method to evaluate how realistic a synthetic trace is, and how
much utility and privacy it provides in each scenario. Also, the lack of a
methodology to generate privacy-preserving fake traces is evident. In this
paper, we fill this gap and propose the first statistical metric and model to
generate fake location traces such that both the utility of data and the
privacy of users are preserved. We build upon the fact that, although
geographically they visit distinct locations, people have strongly semantically
similar mobility patterns, for example, their transition pattern across
activities (e.g., working, driving, staying at home) is similar. We define a
statistical metric and propose an algorithm that automatically discovers the
hidden semantic similarities between locations from a bag of real location
traces as seeds, without requiring any initial semantic annotations. We
guarantee that fake traces are geographically dissimilar to their seeds, so
they do not leak sensitive location information. We also protect contributors
to seed traces against membership attacks. Interleaving fake traces with mobile
users' traces is a prominent location privacy defense mechanism. We
quantitatively show the effectiveness of our methodology in protecting against
localization inference attacks while preserving utility of sharing/publishing
traces.
|
1505.07690 | Remco Duits | Michiel Janssen, Remco Duits, Marcel Breeuwer | Invertible Orientation Scores of 3D Images | ssvm 2015 published version in LNCS contains a mistake (a switch
notation spherical angles) that is corrected in this arxiv version | null | null | null | math.NA cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The enhancement and detection of elongated structures in noisy image data is
relevant for many biomedical applications. To handle complex crossing
structures in 2D images, 2D orientation scores were introduced, which already
showed their use in a variety of applications. Here we extend this work to 3D
orientation scores. First, we construct the orientation score from a given
dataset, which is achieved by an invertible coherent state type of transform.
For this transformation we introduce 3D versions of the 2D cake-wavelets, which
are complex wavelets that can simultaneously detect oriented structures and
oriented edges. For efficient implementation of the different steps in the
wavelet creation we use a spherical harmonic transform. Finally, we show some
first results of practical applications of 3D orientation scores.
| [
{
"version": "v1",
"created": "Thu, 28 May 2015 13:52:41 GMT"
}
] | 2015-05-29T00:00:00 | [
[
"Janssen",
"Michiel",
""
],
[
"Duits",
"Remco",
""
],
[
"Breeuwer",
"Marcel",
""
]
] | TITLE: Invertible Orientation Scores of 3D Images
ABSTRACT: The enhancement and detection of elongated structures in noisy image data is
relevant for many biomedical applications. To handle complex crossing
structures in 2D images, 2D orientation scores were introduced, which already
showed their use in a variety of applications. Here we extend this work to 3D
orientation scores. First, we construct the orientation score from a given
dataset, which is achieved by an invertible coherent state type of transform.
For this transformation we introduce 3D versions of the 2D cake-wavelets, which
are complex wavelets that can simultaneously detect oriented structures and
oriented edges. For efficient implementation of the different steps in the
wavelet creation we use a spherical harmonic transform. Finally, we show some
first results of practical applications of 3D orientation scores.
|
1505.07716 | Johannes Doerfert | Johannes Doerfert, Kevin Streit, Sebastian Hack and Zino Benaissa | Polly's Polyhedral Scheduling in the Presence of Reductions | Presented at the IMPACT15 workshop | null | null | null | cs.PL cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The polyhedral model provides a powerful mathematical abstraction to enable
effective optimization of loop nests with respect to a given optimization goal,
e.g., exploiting parallelism. Unexploited reduction properties are a frequent
reason for polyhedral optimizers to assume parallelism prohibiting dependences.
To our knowledge, no polyhedral loop optimizer available in any production
compiler provides support for reductions. In this paper, we show that
leveraging the parallelism of reductions can lead to a significant performance
increase. We give a precise, dependence based, definition of reductions and
discuss ways to extend polyhedral optimization to exploit the associativity and
commutativity of reduction computations. We have implemented a
reduction-enabled scheduling approach in the Polly polyhedral optimizer and
evaluate it on the standard Polybench 3.2 benchmark suite. We were able to
detect and model all 52 arithmetic reductions and achieve speedups up to
2.21$\times$ on a quad core machine by exploiting the multidimensional
reduction in the BiCG benchmark.
| [
{
"version": "v1",
"created": "Thu, 28 May 2015 15:05:46 GMT"
}
] | 2015-05-29T00:00:00 | [
[
"Doerfert",
"Johannes",
""
],
[
"Streit",
"Kevin",
""
],
[
"Hack",
"Sebastian",
""
],
[
"Benaissa",
"Zino",
""
]
] | TITLE: Polly's Polyhedral Scheduling in the Presence of Reductions
ABSTRACT: The polyhedral model provides a powerful mathematical abstraction to enable
effective optimization of loop nests with respect to a given optimization goal,
e.g., exploiting parallelism. Unexploited reduction properties are a frequent
reason for polyhedral optimizers to assume parallelism prohibiting dependences.
To our knowledge, no polyhedral loop optimizer available in any production
compiler provides support for reductions. In this paper, we show that
leveraging the parallelism of reductions can lead to a significant performance
increase. We give a precise, dependence based, definition of reductions and
discuss ways to extend polyhedral optimization to exploit the associativity and
commutativity of reduction computations. We have implemented a
reduction-enabled scheduling approach in the Polly polyhedral optimizer and
evaluate it on the standard Polybench 3.2 benchmark suite. We were able to
detect and model all 52 arithmetic reductions and achieve speedups up to
2.21$\times$ on a quad core machine by exploiting the multidimensional
reduction in the BiCG benchmark.
|
1104.5578 | Conrad Lee | Conrad Lee, Fergal Reid, Aaron McDaid, Neil Hurley | Seeding for pervasively overlapping communities | 8 Pages | null | 10.1103/PhysRevE.83.066107 | null | physics.soc-ph cs.SI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In some social and biological networks, the majority of nodes belong to
multiple communities. It has recently been shown that a number of the
algorithms that are designed to detect overlapping communities do not perform
well in such highly overlapping settings. Here, we consider one class of these
algorithms, those which optimize a local fitness measure, typically by using a
greedy heuristic to expand a seed into a community. We perform synthetic
benchmarks which indicate that an appropriate seeding strategy becomes
increasingly important as the extent of community overlap increases. We find
that distinct cliques provide the best seeds. We find further support for this
seeding strategy with benchmarks on a Facebook network and the yeast
interactome.
| [
{
"version": "v1",
"created": "Fri, 29 Apr 2011 09:21:33 GMT"
}
] | 2015-05-28T00:00:00 | [
[
"Lee",
"Conrad",
""
],
[
"Reid",
"Fergal",
""
],
[
"McDaid",
"Aaron",
""
],
[
"Hurley",
"Neil",
""
]
] | TITLE: Seeding for pervasively overlapping communities
ABSTRACT: In some social and biological networks, the majority of nodes belong to
multiple communities. It has recently been shown that a number of the
algorithms that are designed to detect overlapping communities do not perform
well in such highly overlapping settings. Here, we consider one class of these
algorithms, those which optimize a local fitness measure, typically by using a
greedy heuristic to expand a seed into a community. We perform synthetic
benchmarks which indicate that an appropriate seeding strategy becomes
increasingly important as the extent of community overlap increases. We find
that distinct cliques provide the best seeds. We find further support for this
seeding strategy with benchmarks on a Facebook network and the yeast
interactome.
|
1105.0819 | Pierpaolo Vivo | Simone Pigolotti, Sebastian Bernhardsson, Jeppe Juul, Gorm Galster,
Pierpaolo Vivo | Equilibrium strategy and population-size effects in lowest unique bid
auctions | 6 pag. - 7 figs - added Supplementary Material. Changed affiliations.
Published version | Phys. Rev. Lett. 108, 088701 (2012) | 10.1103/PhysRevLett.108.088701 | null | cs.GT physics.soc-ph q-fin.GN | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In lowest unique bid auctions, $N$ players bid for an item. The winner is
whoever places the \emph{lowest} bid, provided that it is also unique. We use a
grand canonical approach to derive an analytical expression for the equilibrium
distribution of strategies. We then study the properties of the solution as a
function of the mean number of players, and compare them with a large dataset
of internet auctions. The theory agrees with the data with striking accuracy
for small population size $N$, while for larger $N$ a qualitatively different
distribution is observed. We interpret this result as the emergence of two
different regimes, one in which adaptation is feasible and one in which it is
not. Our results question the actual possibility of a large population to adapt
and find the optimal strategy when participating in a collective game.
| [
{
"version": "v1",
"created": "Sat, 30 Apr 2011 10:09:03 GMT"
},
{
"version": "v2",
"created": "Fri, 9 Dec 2011 12:15:39 GMT"
},
{
"version": "v3",
"created": "Sat, 25 Feb 2012 15:03:56 GMT"
}
] | 2015-05-28T00:00:00 | [
[
"Pigolotti",
"Simone",
""
],
[
"Bernhardsson",
"Sebastian",
""
],
[
"Juul",
"Jeppe",
""
],
[
"Galster",
"Gorm",
""
],
[
"Vivo",
"Pierpaolo",
""
]
] | TITLE: Equilibrium strategy and population-size effects in lowest unique bid
auctions
ABSTRACT: In lowest unique bid auctions, $N$ players bid for an item. The winner is
whoever places the \emph{lowest} bid, provided that it is also unique. We use a
grand canonical approach to derive an analytical expression for the equilibrium
distribution of strategies. We then study the properties of the solution as a
function of the mean number of players, and compare them with a large dataset
of internet auctions. The theory agrees with the data with striking accuracy
for small population size $N$, while for larger $N$ a qualitatively different
distribution is observed. We interpret this result as the emergence of two
different regimes, one in which adaptation is feasible and one in which it is
not. Our results question the actual possibility of a large population to adapt
and find the optimal strategy when participating in a collective game.
|
1107.4218 | Maurizio Serva | Maurizio Serva | The settlement of Madagascar: what dialects and languages can tell | We find out the area and the modalities of the settlement of
Madagascar by Indonesian colonizers around 650 CE. Results are obtained
comparing 23 Malagasy dialects with Malay and Maanyan languages | null | 10.1371/journal.pone.0030666 | null | cs.CL q-bio.PE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The dialects of Madagascar belong to the Greater Barito East group of the
Austronesian family and it is widely accepted that the Island was colonized by
Indonesian sailors after a maritime trek which probably took place around 650
CE. The language most closely related to Malagasy dialects is Maanyan but also
Malay is strongly related especially for what concerns navigation terms. Since
the Maanyan Dayaks live along the Barito river in Kalimantan (Borneo) and they
do not possess the necessary skill for long maritime navigation, probably they
were brought as subordinates by Malay sailors.
In a recent paper we compared 23 different Malagasy dialects in order to
determine the time and the landing area of the first colonization. In this
research we use new data and new methods to confirm that the landing took place
on the south-east coast of the Island. Furthermore, we are able to state here
that it is unlikely that there were multiple settlements and, therefore,
colonization consisted in a single founding event.
To reach our goal we find out the internal kinship relations among all the 23
Malagasy dialects and we also find out the different kinship degrees of the 23
dialects versus Malay and Maanyan. The method used is an automated version of
the lexicostatistic approach. The data concerning Madagascar were collected by
the author at the beginning of 2010 and consist of Swadesh lists of 200 items
for 23 dialects covering all areas of the Island. The lists for Maanyan and
Malay were obtained from published datasets integrated by author's interviews.
| [
{
"version": "v1",
"created": "Thu, 21 Jul 2011 10:02:31 GMT"
}
] | 2015-05-28T00:00:00 | [
[
"Serva",
"Maurizio",
""
]
] | TITLE: The settlement of Madagascar: what dialects and languages can tell
ABSTRACT: The dialects of Madagascar belong to the Greater Barito East group of the
Austronesian family and it is widely accepted that the Island was colonized by
Indonesian sailors after a maritime trek which probably took place around 650
CE. The language most closely related to Malagasy dialects is Maanyan but also
Malay is strongly related especially for what concerns navigation terms. Since
the Maanyan Dayaks live along the Barito river in Kalimantan (Borneo) and they
do not possess the necessary skill for long maritime navigation, probably they
were brought as subordinates by Malay sailors.
In a recent paper we compared 23 different Malagasy dialects in order to
determine the time and the landing area of the first colonization. In this
research we use new data and new methods to confirm that the landing took place
on the south-east coast of the Island. Furthermore, we are able to state here
that it is unlikely that there were multiple settlements and, therefore,
colonization consisted in a single founding event.
To reach our goal we find out the internal kinship relations among all the 23
Malagasy dialects and we also find out the different kinship degrees of the 23
dialects versus Malay and Maanyan. The method used is an automated version of
the lexicostatistic approach. The data concerning Madagascar were collected by
the author at the beginning of 2010 and consist of Swadesh lists of 200 items
for 23 dialects covering all areas of the Island. The lists for Maanyan and
Malay were obtained from published datasets integrated by author's interviews.
|
1412.5335 | Gr\'egoire Mesnil | Gr\'egoire Mesnil, Tomas Mikolov, Marc'Aurelio Ranzato, Yoshua Bengio | Ensemble of Generative and Discriminative Techniques for Sentiment
Analysis of Movie Reviews | null | null | null | null | cs.CL cs.IR cs.LG cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Sentiment analysis is a common task in natural language processing that aims
to detect polarity of a text document (typically a consumer review). In the
simplest settings, we discriminate only between positive and negative
sentiment, turning the task into a standard binary classification problem. We
compare several ma- chine learning approaches to this problem, and combine them
to achieve the best possible results. We show how to use for this task the
standard generative lan- guage models, which are slightly complementary to the
state of the art techniques. We achieve strong results on a well-known dataset
of IMDB movie reviews. Our results are easily reproducible, as we publish also
the code needed to repeat the experiments. This should simplify further advance
of the state of the art, as other researchers can combine their techniques with
ours with little effort.
| [
{
"version": "v1",
"created": "Wed, 17 Dec 2014 11:02:04 GMT"
},
{
"version": "v2",
"created": "Thu, 18 Dec 2014 14:17:16 GMT"
},
{
"version": "v3",
"created": "Fri, 19 Dec 2014 11:36:14 GMT"
},
{
"version": "v4",
"created": "Tue, 3 Feb 2015 20:03:35 GMT"
},
{
"version": "v5",
"created": "Wed, 4 Feb 2015 05:17:55 GMT"
},
{
"version": "v6",
"created": "Thu, 16 Apr 2015 14:26:14 GMT"
},
{
"version": "v7",
"created": "Wed, 27 May 2015 06:40:09 GMT"
}
] | 2015-05-28T00:00:00 | [
[
"Mesnil",
"Grégoire",
""
],
[
"Mikolov",
"Tomas",
""
],
[
"Ranzato",
"Marc'Aurelio",
""
],
[
"Bengio",
"Yoshua",
""
]
] | TITLE: Ensemble of Generative and Discriminative Techniques for Sentiment
Analysis of Movie Reviews
ABSTRACT: Sentiment analysis is a common task in natural language processing that aims
to detect polarity of a text document (typically a consumer review). In the
simplest settings, we discriminate only between positive and negative
sentiment, turning the task into a standard binary classification problem. We
compare several ma- chine learning approaches to this problem, and combine them
to achieve the best possible results. We show how to use for this task the
standard generative lan- guage models, which are slightly complementary to the
state of the art techniques. We achieve strong results on a well-known dataset
of IMDB movie reviews. Our results are easily reproducible, as we publish also
the code needed to repeat the experiments. This should simplify further advance
of the state of the art, as other researchers can combine their techniques with
ours with little effort.
|
1502.02791 | Mingsheng Long | Mingsheng Long, Yue Cao, Jianmin Wang, Michael I. Jordan | Learning Transferable Features with Deep Adaptation Networks | null | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Recent studies reveal that a deep neural network can learn transferable
features which generalize well to novel tasks for domain adaptation. However,
as deep features eventually transition from general to specific along the
network, the feature transferability drops significantly in higher layers with
increasing domain discrepancy. Hence, it is important to formally reduce the
dataset bias and enhance the transferability in task-specific layers. In this
paper, we propose a new Deep Adaptation Network (DAN) architecture, which
generalizes deep convolutional neural network to the domain adaptation
scenario. In DAN, hidden representations of all task-specific layers are
embedded in a reproducing kernel Hilbert space where the mean embeddings of
different domain distributions can be explicitly matched. The domain
discrepancy is further reduced using an optimal multi-kernel selection method
for mean embedding matching. DAN can learn transferable features with
statistical guarantees, and can scale linearly by unbiased estimate of kernel
embedding. Extensive empirical evidence shows that the proposed architecture
yields state-of-the-art image classification error rates on standard domain
adaptation benchmarks.
| [
{
"version": "v1",
"created": "Tue, 10 Feb 2015 06:01:30 GMT"
},
{
"version": "v2",
"created": "Wed, 27 May 2015 05:28:35 GMT"
}
] | 2015-05-28T00:00:00 | [
[
"Long",
"Mingsheng",
""
],
[
"Cao",
"Yue",
""
],
[
"Wang",
"Jianmin",
""
],
[
"Jordan",
"Michael I.",
""
]
] | TITLE: Learning Transferable Features with Deep Adaptation Networks
ABSTRACT: Recent studies reveal that a deep neural network can learn transferable
features which generalize well to novel tasks for domain adaptation. However,
as deep features eventually transition from general to specific along the
network, the feature transferability drops significantly in higher layers with
increasing domain discrepancy. Hence, it is important to formally reduce the
dataset bias and enhance the transferability in task-specific layers. In this
paper, we propose a new Deep Adaptation Network (DAN) architecture, which
generalizes deep convolutional neural network to the domain adaptation
scenario. In DAN, hidden representations of all task-specific layers are
embedded in a reproducing kernel Hilbert space where the mean embeddings of
different domain distributions can be explicitly matched. The domain
discrepancy is further reduced using an optimal multi-kernel selection method
for mean embedding matching. DAN can learn transferable features with
statistical guarantees, and can scale linearly by unbiased estimate of kernel
embedding. Extensive empirical evidence shows that the proposed architecture
yields state-of-the-art image classification error rates on standard domain
adaptation benchmarks.
|
1505.07130 | Kemele M. Endris | Kemele M. Endris, Sidra Faisal, Fabrizio Orlandi, S\"oren Auer, Simon
Scerri | Interest-based RDF Update Propagation | 16 pages, Keywords: Change Propagation, Dataset Dynamics, Linked
Data, Replication | null | null | null | cs.DC cs.DB cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Many LOD datasets, such as DBpedia and LinkedGeoData, are voluminous and
process large amounts of requests from diverse applications. Many data products
and services rely on full or partial local LOD replications to ensure faster
querying and processing. While such replicas enhance the flexibility of
information sharing and integration infrastructures, they also introduce data
duplication with all the associated undesirable consequences. Given the
evolving nature of the original and authoritative datasets, to ensure
consistent and up-to-date replicas frequent replacements are required at a
great cost. In this paper, we introduce an approach for interest-based RDF
update propagation, which propagates only interesting parts of updates from the
source to the target dataset. Effectively, this enables remote applications to
`subscribe' to relevant datasets and consistently reflect the necessary changes
locally without the need to frequently replace the entire dataset (or a
relevant subset). Our approach is based on a formal definition for
graph-pattern-based interest expressions that is used to filter interesting
parts of updates from the source. We implement the approach in the iRap
framework and perform a comprehensive evaluation based on DBpedia Live updates,
to confirm the validity and value of our approach.
| [
{
"version": "v1",
"created": "Tue, 26 May 2015 20:36:42 GMT"
}
] | 2015-05-28T00:00:00 | [
[
"Endris",
"Kemele M.",
""
],
[
"Faisal",
"Sidra",
""
],
[
"Orlandi",
"Fabrizio",
""
],
[
"Auer",
"Sören",
""
],
[
"Scerri",
"Simon",
""
]
] | TITLE: Interest-based RDF Update Propagation
ABSTRACT: Many LOD datasets, such as DBpedia and LinkedGeoData, are voluminous and
process large amounts of requests from diverse applications. Many data products
and services rely on full or partial local LOD replications to ensure faster
querying and processing. While such replicas enhance the flexibility of
information sharing and integration infrastructures, they also introduce data
duplication with all the associated undesirable consequences. Given the
evolving nature of the original and authoritative datasets, to ensure
consistent and up-to-date replicas frequent replacements are required at a
great cost. In this paper, we introduce an approach for interest-based RDF
update propagation, which propagates only interesting parts of updates from the
source to the target dataset. Effectively, this enables remote applications to
`subscribe' to relevant datasets and consistently reflect the necessary changes
locally without the need to frequently replace the entire dataset (or a
relevant subset). Our approach is based on a formal definition for
graph-pattern-based interest expressions that is used to filter interesting
parts of updates from the source. We implement the approach in the iRap
framework and perform a comprehensive evaluation based on DBpedia Live updates,
to confirm the validity and value of our approach.
|
1505.07184 | Danushka Bollegala | Danushka Bollegala and Takanori Maehara and Ken-ichi Kawarabayashi | Unsupervised Cross-Domain Word Representation Learning | 53rd Annual Meeting of the Association for Computational Linguistics
and the 7th International Joint Conferences on Natural Language Processing of
the Asian Federation of Natural Language Processing | null | null | null | cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Meaning of a word varies from one domain to another. Despite this important
domain dependence in word semantics, existing word representation learning
methods are bound to a single domain. Given a pair of
\emph{source}-\emph{target} domains, we propose an unsupervised method for
learning domain-specific word representations that accurately capture the
domain-specific aspects of word semantics. First, we select a subset of
frequent words that occur in both domains as \emph{pivots}. Next, we optimize
an objective function that enforces two constraints: (a) for both source and
target domain documents, pivots that appear in a document must accurately
predict the co-occurring non-pivots, and (b) word representations learnt for
pivots must be similar in the two domains. Moreover, we propose a method to
perform domain adaptation using the learnt word representations. Our proposed
method significantly outperforms competitive baselines including the
state-of-the-art domain-insensitive word representations, and reports best
sentiment classification accuracies for all domain-pairs in a benchmark
dataset.
| [
{
"version": "v1",
"created": "Wed, 27 May 2015 04:02:56 GMT"
}
] | 2015-05-28T00:00:00 | [
[
"Bollegala",
"Danushka",
""
],
[
"Maehara",
"Takanori",
""
],
[
"Kawarabayashi",
"Ken-ichi",
""
]
] | TITLE: Unsupervised Cross-Domain Word Representation Learning
ABSTRACT: Meaning of a word varies from one domain to another. Despite this important
domain dependence in word semantics, existing word representation learning
methods are bound to a single domain. Given a pair of
\emph{source}-\emph{target} domains, we propose an unsupervised method for
learning domain-specific word representations that accurately capture the
domain-specific aspects of word semantics. First, we select a subset of
frequent words that occur in both domains as \emph{pivots}. Next, we optimize
an objective function that enforces two constraints: (a) for both source and
target domain documents, pivots that appear in a document must accurately
predict the co-occurring non-pivots, and (b) word representations learnt for
pivots must be similar in the two domains. Moreover, we propose a method to
perform domain adaptation using the learnt word representations. Our proposed
method significantly outperforms competitive baselines including the
state-of-the-art domain-insensitive word representations, and reports best
sentiment classification accuracies for all domain-pairs in a benchmark
dataset.
|
1505.07188 | Peng Liu | Peng Liu and Saeed Gazor and Il-Min Kim and Dong In Kim | Energy Harvesting Noncoherent Cooperative Communications | null | null | null | null | cs.IT math.IT | http://creativecommons.org/licenses/by-nc-sa/3.0/ | This paper investigates simultaneous wireless information and power transfer
(SWIPT) in energy harvesting (EH) relay systems. Unlike existing SWIPT schemes
requiring the channel state information (CSI) for coherent information
delivery, we propose a noncoherent SWIPT framework for decode-and-forward (DF)
relay systems bypassing the need for CSI and consequently saving energy in the
network. The proposed SWIPT framework embraces power-splitting noncoherent DF
(PS-NcDF) and time-switching noncoherent DF (TS-NcDF) in a unified form, and
supports arbitrary M-ary noncoherent frequency-shift keying (FSK) and
differential phase-shift keying (DPSK). Exact (noncoherent) maximum-likelihood
detectors (MLDs) for PS-NcDF and TS-NcDF are developed in a unified form, which
involves integral evaluations yet serves as the optimum performance benchmark
for noncoherent SWIPT. To reduce the computational cost of the exact MLDs, we
also propose closed-form approximate MLDs achieving near-optimum performance,
thus serving as a practical solution for noncoherent SWIPT. Numerical results
demonstrate a performance tradeoff between the first and second hops through
the adjustment of time switching or power splitting parameters, whose optimal
values minimizing the symbol-error rate (SER) are strictly between 0 and 1. We
demonstrate that M-FSK results in a significant energy saving over M-DPSK for M
>= 8; thus M-FSK may be more suitable for EH relay systems.
| [
{
"version": "v1",
"created": "Wed, 27 May 2015 04:59:11 GMT"
}
] | 2015-05-28T00:00:00 | [
[
"Liu",
"Peng",
""
],
[
"Gazor",
"Saeed",
""
],
[
"Kim",
"Il-Min",
""
],
[
"Kim",
"Dong In",
""
]
] | TITLE: Energy Harvesting Noncoherent Cooperative Communications
ABSTRACT: This paper investigates simultaneous wireless information and power transfer
(SWIPT) in energy harvesting (EH) relay systems. Unlike existing SWIPT schemes
requiring the channel state information (CSI) for coherent information
delivery, we propose a noncoherent SWIPT framework for decode-and-forward (DF)
relay systems bypassing the need for CSI and consequently saving energy in the
network. The proposed SWIPT framework embraces power-splitting noncoherent DF
(PS-NcDF) and time-switching noncoherent DF (TS-NcDF) in a unified form, and
supports arbitrary M-ary noncoherent frequency-shift keying (FSK) and
differential phase-shift keying (DPSK). Exact (noncoherent) maximum-likelihood
detectors (MLDs) for PS-NcDF and TS-NcDF are developed in a unified form, which
involves integral evaluations yet serves as the optimum performance benchmark
for noncoherent SWIPT. To reduce the computational cost of the exact MLDs, we
also propose closed-form approximate MLDs achieving near-optimum performance,
thus serving as a practical solution for noncoherent SWIPT. Numerical results
demonstrate a performance tradeoff between the first and second hops through
the adjustment of time switching or power splitting parameters, whose optimal
values minimizing the symbol-error rate (SER) are strictly between 0 and 1. We
demonstrate that M-FSK results in a significant energy saving over M-DPSK for M
>= 8; thus M-FSK may be more suitable for EH relay systems.
|
1505.07193 | Linyun Yu | Linyun Yu, Peng Cui, Fei Wang, Chaoming Song, Shiqiang Yang | From Micro to Macro: Uncovering and Predicting Information Cascading
Process with Behavioral Dynamics | 10 pages, 11 figures | null | null | null | cs.SI physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Cascades are ubiquitous in various network environments. How to predict these
cascades is highly nontrivial in several vital applications, such as viral
marketing, epidemic prevention and traffic management. Most previous works
mainly focus on predicting the final cascade sizes. As cascades are typical
dynamic processes, it is always interesting and important to predict the
cascade size at any time, or predict the time when a cascade will reach a
certain size (e.g. an threshold for outbreak). In this paper, we unify all
these tasks into a fundamental problem: cascading process prediction. That is,
given the early stage of a cascade, how to predict its cumulative cascade size
of any later time? For such a challenging problem, how to understand the micro
mechanism that drives and generates the macro phenomenons (i.e. cascading
proceese) is essential. Here we introduce behavioral dynamics as the micro
mechanism to describe the dynamic process of a node's neighbors get infected by
a cascade after this node get infected (i.e. one-hop subcascades). Through
data-driven analysis, we find out the common principles and patterns lying in
behavioral dynamics and propose a novel Networked Weibull Regression model for
behavioral dynamics modeling. After that we propose a novel method for
predicting cascading processes by effectively aggregating behavioral dynamics,
and propose a scalable solution to approximate the cascading process with a
theoretical guarantee. We extensively evaluate the proposed method on a large
scale social network dataset. The results demonstrate that the proposed method
can significantly outperform other state-of-the-art baselines in multiple tasks
including cascade size prediction, outbreak time prediction and cascading
process prediction.
| [
{
"version": "v1",
"created": "Wed, 27 May 2015 05:30:33 GMT"
}
] | 2015-05-28T00:00:00 | [
[
"Yu",
"Linyun",
""
],
[
"Cui",
"Peng",
""
],
[
"Wang",
"Fei",
""
],
[
"Song",
"Chaoming",
""
],
[
"Yang",
"Shiqiang",
""
]
] | TITLE: From Micro to Macro: Uncovering and Predicting Information Cascading
Process with Behavioral Dynamics
ABSTRACT: Cascades are ubiquitous in various network environments. How to predict these
cascades is highly nontrivial in several vital applications, such as viral
marketing, epidemic prevention and traffic management. Most previous works
mainly focus on predicting the final cascade sizes. As cascades are typical
dynamic processes, it is always interesting and important to predict the
cascade size at any time, or predict the time when a cascade will reach a
certain size (e.g. an threshold for outbreak). In this paper, we unify all
these tasks into a fundamental problem: cascading process prediction. That is,
given the early stage of a cascade, how to predict its cumulative cascade size
of any later time? For such a challenging problem, how to understand the micro
mechanism that drives and generates the macro phenomenons (i.e. cascading
proceese) is essential. Here we introduce behavioral dynamics as the micro
mechanism to describe the dynamic process of a node's neighbors get infected by
a cascade after this node get infected (i.e. one-hop subcascades). Through
data-driven analysis, we find out the common principles and patterns lying in
behavioral dynamics and propose a novel Networked Weibull Regression model for
behavioral dynamics modeling. After that we propose a novel method for
predicting cascading processes by effectively aggregating behavioral dynamics,
and propose a scalable solution to approximate the cascading process with a
theoretical guarantee. We extensively evaluate the proposed method on a large
scale social network dataset. The results demonstrate that the proposed method
can significantly outperform other state-of-the-art baselines in multiple tasks
including cascade size prediction, outbreak time prediction and cascading
process prediction.
|
1505.07254 | Oliver Mason | Naoise Holohan, Doug Leith and Oliver Mason | Differentially Private Response Mechanisms on Categorical Data | null | null | null | null | cs.DM cs.CR math.CO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study mechanisms for differential privacy on finite datasets. By deriving
\emph{sufficient sets} for differential privacy we obtain necessary and
sufficient conditions for differential privacy, a tight lower bound on the
maximal expected error of a discrete mechanism and a characterisation of the
optimal mechanism which minimises the maximal expected error within the class
of mechanisms considered.
| [
{
"version": "v1",
"created": "Wed, 27 May 2015 10:16:57 GMT"
}
] | 2015-05-28T00:00:00 | [
[
"Holohan",
"Naoise",
""
],
[
"Leith",
"Doug",
""
],
[
"Mason",
"Oliver",
""
]
] | TITLE: Differentially Private Response Mechanisms on Categorical Data
ABSTRACT: We study mechanisms for differential privacy on finite datasets. By deriving
\emph{sufficient sets} for differential privacy we obtain necessary and
sufficient conditions for differential privacy, a tight lower bound on the
maximal expected error of a discrete mechanism and a characterisation of the
optimal mechanism which minimises the maximal expected error within the class
of mechanisms considered.
|
1505.07293 | Vijay Badrinarayanan | Vijay Badrinarayanan, Ankur Handa, Roberto Cipolla | SegNet: A Deep Convolutional Encoder-Decoder Architecture for Robust
Semantic Pixel-Wise Labelling | This version was first submitted to CVPR' 15 on November 14, 2014
with paper Id 1468. A similar architecture was proposed more recently on May
17, 2015, see http://arxiv.org/pdf/1505.04366.pdf | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose a novel deep architecture, SegNet, for semantic pixel wise image
labelling. SegNet has several attractive properties; (i) it only requires
forward evaluation of a fully learnt function to obtain smooth label
predictions, (ii) with increasing depth, a larger context is considered for
pixel labelling which improves accuracy, and (iii) it is easy to visualise the
effect of feature activation(s) in the pixel label space at any depth. SegNet
is composed of a stack of encoders followed by a corresponding decoder stack
which feeds into a soft-max classification layer. The decoders help map low
resolution feature maps at the output of the encoder stack to full input image
size feature maps. This addresses an important drawback of recent deep learning
approaches which have adopted networks designed for object categorization for
pixel wise labelling. These methods lack a mechanism to map deep layer feature
maps to input dimensions. They resort to ad hoc methods to upsample features,
e.g. by replication. This results in noisy predictions and also restricts the
number of pooling layers in order to avoid too much upsampling and thus reduces
spatial context. SegNet overcomes these problems by learning to map encoder
outputs to image pixel labels. We test the performance of SegNet on outdoor RGB
scenes from CamVid, KITTI and indoor scenes from the NYU dataset. Our results
show that SegNet achieves state-of-the-art performance even without use of
additional cues such as depth, video frames or post-processing with CRF models.
| [
{
"version": "v1",
"created": "Wed, 27 May 2015 12:54:17 GMT"
}
] | 2015-05-28T00:00:00 | [
[
"Badrinarayanan",
"Vijay",
""
],
[
"Handa",
"Ankur",
""
],
[
"Cipolla",
"Roberto",
""
]
] | TITLE: SegNet: A Deep Convolutional Encoder-Decoder Architecture for Robust
Semantic Pixel-Wise Labelling
ABSTRACT: We propose a novel deep architecture, SegNet, for semantic pixel wise image
labelling. SegNet has several attractive properties; (i) it only requires
forward evaluation of a fully learnt function to obtain smooth label
predictions, (ii) with increasing depth, a larger context is considered for
pixel labelling which improves accuracy, and (iii) it is easy to visualise the
effect of feature activation(s) in the pixel label space at any depth. SegNet
is composed of a stack of encoders followed by a corresponding decoder stack
which feeds into a soft-max classification layer. The decoders help map low
resolution feature maps at the output of the encoder stack to full input image
size feature maps. This addresses an important drawback of recent deep learning
approaches which have adopted networks designed for object categorization for
pixel wise labelling. These methods lack a mechanism to map deep layer feature
maps to input dimensions. They resort to ad hoc methods to upsample features,
e.g. by replication. This results in noisy predictions and also restricts the
number of pooling layers in order to avoid too much upsampling and thus reduces
spatial context. SegNet overcomes these problems by learning to map encoder
outputs to image pixel labels. We test the performance of SegNet on outdoor RGB
scenes from CamVid, KITTI and indoor scenes from the NYU dataset. Our results
show that SegNet achieves state-of-the-art performance even without use of
additional cues such as depth, video frames or post-processing with CRF models.
|
1505.07310 | Md. Iftekhar Tanveer | M. Iftekhar Tanveer | Use of Laplacian Projection Technique for Summarizing Likert Scale
Annotations | null | null | null | null | cs.HC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Summarizing Likert scale ratings from human annotators is an important step
for collecting human judgments. In this project we study a novel, graph
theoretic method for this purpose. We also analyze a few interesting properties
for this approach using real annotation datasets.
| [
{
"version": "v1",
"created": "Tue, 26 May 2015 15:45:00 GMT"
}
] | 2015-05-28T00:00:00 | [
[
"Tanveer",
"M. Iftekhar",
""
]
] | TITLE: Use of Laplacian Projection Technique for Summarizing Likert Scale
Annotations
ABSTRACT: Summarizing Likert scale ratings from human annotators is an important step
for collecting human judgments. In this project we study a novel, graph
theoretic method for this purpose. We also analyze a few interesting properties
for this approach using real annotation datasets.
|
1505.07428 | Manuel L\'opez-Antequera | Ruben Gomez-Ojeda, Manuel Lopez-Antequera, Nicolai Petkov, Javier
Gonzalez-Jimenez | Training a Convolutional Neural Network for Appearance-Invariant Place
Recognition | null | null | null | null | cs.CV cs.LG cs.RO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Place recognition is one of the most challenging problems in computer vision,
and has become a key part in mobile robotics and autonomous driving
applications for performing loop closure in visual SLAM systems. Moreover, the
difficulty of recognizing a revisited location increases with appearance
changes caused, for instance, by weather or illumination variations, which
hinders the long-term application of such algorithms in real environments. In
this paper we present a convolutional neural network (CNN), trained for the
first time with the purpose of recognizing revisited locations under severe
appearance changes, which maps images to a low dimensional space where
Euclidean distances represent place dissimilarity. In order for the network to
learn the desired invariances, we train it with triplets of images selected
from datasets which present a challenging variability in visual appearance. The
triplets are selected in such way that two samples are from the same location
and the third one is taken from a different place. We validate our system
through extensive experimentation, where we demonstrate better performance than
state-of-art algorithms in a number of popular datasets.
| [
{
"version": "v1",
"created": "Wed, 27 May 2015 18:21:54 GMT"
}
] | 2015-05-28T00:00:00 | [
[
"Gomez-Ojeda",
"Ruben",
""
],
[
"Lopez-Antequera",
"Manuel",
""
],
[
"Petkov",
"Nicolai",
""
],
[
"Gonzalez-Jimenez",
"Javier",
""
]
] | TITLE: Training a Convolutional Neural Network for Appearance-Invariant Place
Recognition
ABSTRACT: Place recognition is one of the most challenging problems in computer vision,
and has become a key part in mobile robotics and autonomous driving
applications for performing loop closure in visual SLAM systems. Moreover, the
difficulty of recognizing a revisited location increases with appearance
changes caused, for instance, by weather or illumination variations, which
hinders the long-term application of such algorithms in real environments. In
this paper we present a convolutional neural network (CNN), trained for the
first time with the purpose of recognizing revisited locations under severe
appearance changes, which maps images to a low dimensional space where
Euclidean distances represent place dissimilarity. In order for the network to
learn the desired invariances, we train it with triplets of images selected
from datasets which present a challenging variability in visual appearance. The
triplets are selected in such way that two samples are from the same location
and the third one is taken from a different place. We validate our system
through extensive experimentation, where we demonstrate better performance than
state-of-art algorithms in a number of popular datasets.
|
1101.4749 | Osman G\"unay | Osman Gunay and Behcet Ugur Toreyin and Kivanc Kose and A. Enis Cetin | Online Adaptive Decision Fusion Framework Based on Entropic Projections
onto Convex Sets with Application to Wildfire Detection in Video | 10 pages, 7 figures | null | 10.1117/1.3595426 | null | cs.CV cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, an Entropy functional based online Adaptive Decision Fusion
(EADF) framework is developed for image analysis and computer vision
applications. In this framework, it is assumed that the compound algorithm
consists of several sub-algorithms each of which yielding its own decision as a
real number centered around zero, representing the confidence level of that
particular sub-algorithm. Decision values are linearly combined with weights
which are updated online according to an active fusion method based on
performing entropic projections onto convex sets describing sub-algorithms. It
is assumed that there is an oracle, who is usually a human operator, providing
feedback to the decision fusion method. A video based wildfire detection system
is developed to evaluate the performance of the algorithm in handling the
problems where data arrives sequentially. In this case, the oracle is the
security guard of the forest lookout tower verifying the decision of the
combined algorithm. Simulation results are presented. The EADF framework is
also tested with a standard dataset.
| [
{
"version": "v1",
"created": "Tue, 25 Jan 2011 09:11:49 GMT"
}
] | 2015-05-27T00:00:00 | [
[
"Gunay",
"Osman",
""
],
[
"Toreyin",
"Behcet Ugur",
""
],
[
"Kose",
"Kivanc",
""
],
[
"Cetin",
"A. Enis",
""
]
] | TITLE: Online Adaptive Decision Fusion Framework Based on Entropic Projections
onto Convex Sets with Application to Wildfire Detection in Video
ABSTRACT: In this paper, an Entropy functional based online Adaptive Decision Fusion
(EADF) framework is developed for image analysis and computer vision
applications. In this framework, it is assumed that the compound algorithm
consists of several sub-algorithms each of which yielding its own decision as a
real number centered around zero, representing the confidence level of that
particular sub-algorithm. Decision values are linearly combined with weights
which are updated online according to an active fusion method based on
performing entropic projections onto convex sets describing sub-algorithms. It
is assumed that there is an oracle, who is usually a human operator, providing
feedback to the decision fusion method. A video based wildfire detection system
is developed to evaluate the performance of the algorithm in handling the
problems where data arrives sequentially. In this case, the oracle is the
security guard of the forest lookout tower verifying the decision of the
combined algorithm. Simulation results are presented. The EADF framework is
also tested with a standard dataset.
|
1102.3260 | Simona Cocco | Simona Cocco (LPS), R\'emi Monasson (LPTENS) | Adaptive Cluster Expansion for Inferring Boltzmann Machines with Noisy
Data | Accepted for publication in Physical Review Letters (2011) | null | 10.1103/PhysRevLett.106.090601 | null | physics.data-an cond-mat.stat-mech cs.LG q-bio.NC q-bio.QM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We introduce a procedure to infer the interactions among a set of binary
variables, based on their sampled frequencies and pairwise correlations. The
algorithm builds the clusters of variables contributing most to the entropy of
the inferred Ising model, and rejects the small contributions due to the
sampling noise. Our procedure successfully recovers benchmark Ising models even
at criticality and in the low temperature phase, and is applied to
neurobiological data.
| [
{
"version": "v1",
"created": "Wed, 16 Feb 2011 08:15:42 GMT"
}
] | 2015-05-27T00:00:00 | [
[
"Cocco",
"Simona",
"",
"LPS"
],
[
"Monasson",
"Rémi",
"",
"LPTENS"
]
] | TITLE: Adaptive Cluster Expansion for Inferring Boltzmann Machines with Noisy
Data
ABSTRACT: We introduce a procedure to infer the interactions among a set of binary
variables, based on their sampled frequencies and pairwise correlations. The
algorithm builds the clusters of variables contributing most to the entropy of
the inferred Ising model, and rejects the small contributions due to the
sampling noise. Our procedure successfully recovers benchmark Ising models even
at criticality and in the low temperature phase, and is applied to
neurobiological data.
|
1103.3397 | Gergely Tib\'ely | Gergely Tib\'ely | Criterions for locally dense subgraphs | Revised version. 26 pages, 8 figures, 1 table | null | 10.1016/j.physa.2011.09.040 | null | physics.soc-ph cs.SI physics.comp-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Community detection is one of the most investigated problems in the field of
complex networks. Although several methods were proposed, there is still no
precise definition of communities. As a step towards a definition, I highlight
two necessary properties of communities, separation and internal cohesion, the
latter being a new concept. I propose a local method of community detection
based on two-dimensional local optimization, which I tested on common
benchmarks and on the word association database.
| [
{
"version": "v1",
"created": "Thu, 17 Mar 2011 12:48:40 GMT"
},
{
"version": "v2",
"created": "Tue, 23 Aug 2011 22:08:22 GMT"
},
{
"version": "v3",
"created": "Thu, 25 Aug 2011 09:35:30 GMT"
}
] | 2015-05-27T00:00:00 | [
[
"Tibély",
"Gergely",
""
]
] | TITLE: Criterions for locally dense subgraphs
ABSTRACT: Community detection is one of the most investigated problems in the field of
complex networks. Although several methods were proposed, there is still no
precise definition of communities. As a step towards a definition, I highlight
two necessary properties of communities, separation and internal cohesion, the
latter being a new concept. I propose a local method of community detection
based on two-dimensional local optimization, which I tested on common
benchmarks and on the word association database.
|
1103.5479 | Deanna Needell | Yonina C. Eldar, Deanna Needell, Yaniv Plan | Unicity conditions for low-rank matrix recovery | null | null | 10.1117/12.891933 | null | math.NA cs.IT cs.SY math.IT math.OC math.PR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Low-rank matrix recovery addresses the problem of recovering an unknown
low-rank matrix from few linear measurements. Nuclear-norm minimization is a
tractible approach with a recent surge of strong theoretical backing. Analagous
to the theory of compressed sensing, these results have required random
measurements. For example, m >= Cnr Gaussian measurements are sufficient to
recover any rank-r n x n matrix with high probability. In this paper we address
the theoretical question of how many measurements are needed via any method
whatsoever --- tractible or not. We show that for a family of random
measurement ensembles, m >= 4nr - 4r^2 measurements are sufficient to guarantee
that no rank-2r matrix lies in the null space of the measurement operator with
probability one. This is a necessary and sufficient condition to ensure uniform
recovery of all rank-r matrices by rank minimization. Furthermore, this value
of $m$ precisely matches the dimension of the manifold of all rank-2r matrices.
We also prove that for a fixed rank-r matrix, m >= 2nr - r^2 + 1 random
measurements are enough to guarantee recovery using rank minimization. These
results give a benchmark to which we may compare the efficacy of nuclear-norm
minimization.
| [
{
"version": "v1",
"created": "Mon, 28 Mar 2011 20:36:03 GMT"
}
] | 2015-05-27T00:00:00 | [
[
"Eldar",
"Yonina C.",
""
],
[
"Needell",
"Deanna",
""
],
[
"Plan",
"Yaniv",
""
]
] | TITLE: Unicity conditions for low-rank matrix recovery
ABSTRACT: Low-rank matrix recovery addresses the problem of recovering an unknown
low-rank matrix from few linear measurements. Nuclear-norm minimization is a
tractible approach with a recent surge of strong theoretical backing. Analagous
to the theory of compressed sensing, these results have required random
measurements. For example, m >= Cnr Gaussian measurements are sufficient to
recover any rank-r n x n matrix with high probability. In this paper we address
the theoretical question of how many measurements are needed via any method
whatsoever --- tractible or not. We show that for a family of random
measurement ensembles, m >= 4nr - 4r^2 measurements are sufficient to guarantee
that no rank-2r matrix lies in the null space of the measurement operator with
probability one. This is a necessary and sufficient condition to ensure uniform
recovery of all rank-r matrices by rank minimization. Furthermore, this value
of $m$ precisely matches the dimension of the manifold of all rank-2r matrices.
We also prove that for a fixed rank-r matrix, m >= 2nr - r^2 + 1 random
measurements are enough to guarantee recovery using rank minimization. These
results give a benchmark to which we may compare the efficacy of nuclear-norm
minimization.
|
1104.4512 | Vassilis Kekatos | Pedro A. Forero, Vassilis Kekatos, Georgios B. Giannakis | Robust Clustering Using Outlier-Sparsity Regularization | Submitted to IEEE Trans. on PAMI | null | 10.1109/TSP.2012.2196696 | null | stat.ML cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Notwithstanding the popularity of conventional clustering algorithms such as
K-means and probabilistic clustering, their clustering results are sensitive to
the presence of outliers in the data. Even a few outliers can compromise the
ability of these algorithms to identify meaningful hidden structures rendering
their outcome unreliable. This paper develops robust clustering algorithms that
not only aim to cluster the data, but also to identify the outliers. The novel
approaches rely on the infrequent presence of outliers in the data which
translates to sparsity in a judiciously chosen domain. Capitalizing on the
sparsity in the outlier domain, outlier-aware robust K-means and probabilistic
clustering approaches are proposed. Their novelty lies on identifying outliers
while effecting sparsity in the outlier domain through carefully chosen
regularization. A block coordinate descent approach is developed to obtain
iterative algorithms with convergence guarantees and small excess computational
complexity with respect to their non-robust counterparts. Kernelized versions
of the robust clustering algorithms are also developed to efficiently handle
high-dimensional data, identify nonlinearly separable clusters, or even cluster
objects that are not represented by vectors. Numerical tests on both synthetic
and real datasets validate the performance and applicability of the novel
algorithms.
| [
{
"version": "v1",
"created": "Fri, 22 Apr 2011 22:01:14 GMT"
}
] | 2015-05-27T00:00:00 | [
[
"Forero",
"Pedro A.",
""
],
[
"Kekatos",
"Vassilis",
""
],
[
"Giannakis",
"Georgios B.",
""
]
] | TITLE: Robust Clustering Using Outlier-Sparsity Regularization
ABSTRACT: Notwithstanding the popularity of conventional clustering algorithms such as
K-means and probabilistic clustering, their clustering results are sensitive to
the presence of outliers in the data. Even a few outliers can compromise the
ability of these algorithms to identify meaningful hidden structures rendering
their outcome unreliable. This paper develops robust clustering algorithms that
not only aim to cluster the data, but also to identify the outliers. The novel
approaches rely on the infrequent presence of outliers in the data which
translates to sparsity in a judiciously chosen domain. Capitalizing on the
sparsity in the outlier domain, outlier-aware robust K-means and probabilistic
clustering approaches are proposed. Their novelty lies on identifying outliers
while effecting sparsity in the outlier domain through carefully chosen
regularization. A block coordinate descent approach is developed to obtain
iterative algorithms with convergence guarantees and small excess computational
complexity with respect to their non-robust counterparts. Kernelized versions
of the robust clustering algorithms are also developed to efficiently handle
high-dimensional data, identify nonlinearly separable clusters, or even cluster
objects that are not represented by vectors. Numerical tests on both synthetic
and real datasets validate the performance and applicability of the novel
algorithms.
|
1410.4871 | Herwig Wendt | S\'ebastien Combrexelle, Herwig Wendt, Nicolas Dobigeon, Jean-Yves
Tourneret, Steve McLaughlin and Patrice Abry | Bayesian estimation of the multifractality parameter for image texture
using a Whittle approximation | null | IEEE T. Image Proces., vol. 24, no. 8, pp. 2540-2551, Aug. 2015 | 10.1109/TIP.2015.2426021 | null | physics.data-an cs.CV stat.ME | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Texture characterization is a central element in many image processing
applications. Multifractal analysis is a useful signal and image processing
tool, yet, the accurate estimation of multifractal parameters for image texture
remains a challenge. This is due in the main to the fact that current
estimation procedures consist of performing linear regressions across frequency
scales of the two-dimensional (2D) dyadic wavelet transform, for which only a
few such scales are computable for images. The strongly non-Gaussian nature of
multifractal processes, combined with their complicated dependence structure,
makes it difficult to develop suitable models for parameter estimation. Here,
we propose a Bayesian procedure that addresses the difficulties in the
estimation of the multifractality parameter. The originality of the procedure
is threefold: The construction of a generic semi-parametric statistical model
for the logarithm of wavelet leaders; the formulation of Bayesian estimators
that are associated with this model and the set of parameter values admitted by
multifractal theory; the exploitation of a suitable Whittle approximation
within the Bayesian model which enables the otherwise infeasible evaluation of
the posterior distribution associated with the model. Performance is assessed
numerically for several 2D multifractal processes, for several image sizes and
a large range of process parameters. The procedure yields significant benefits
over current benchmark estimators in terms of estimation performance and
ability to discriminate between the two most commonly used classes of
multifractal process models. The gains in performance are particularly
pronounced for small image sizes, notably enabling for the first time the
analysis of image patches as small as 64x64 pixels.
| [
{
"version": "v1",
"created": "Fri, 17 Oct 2014 21:32:28 GMT"
},
{
"version": "v2",
"created": "Thu, 9 Apr 2015 09:13:28 GMT"
}
] | 2015-05-27T00:00:00 | [
[
"Combrexelle",
"Sébastien",
""
],
[
"Wendt",
"Herwig",
""
],
[
"Dobigeon",
"Nicolas",
""
],
[
"Tourneret",
"Jean-Yves",
""
],
[
"McLaughlin",
"Steve",
""
],
[
"Abry",
"Patrice",
""
]
] | TITLE: Bayesian estimation of the multifractality parameter for image texture
using a Whittle approximation
ABSTRACT: Texture characterization is a central element in many image processing
applications. Multifractal analysis is a useful signal and image processing
tool, yet, the accurate estimation of multifractal parameters for image texture
remains a challenge. This is due in the main to the fact that current
estimation procedures consist of performing linear regressions across frequency
scales of the two-dimensional (2D) dyadic wavelet transform, for which only a
few such scales are computable for images. The strongly non-Gaussian nature of
multifractal processes, combined with their complicated dependence structure,
makes it difficult to develop suitable models for parameter estimation. Here,
we propose a Bayesian procedure that addresses the difficulties in the
estimation of the multifractality parameter. The originality of the procedure
is threefold: The construction of a generic semi-parametric statistical model
for the logarithm of wavelet leaders; the formulation of Bayesian estimators
that are associated with this model and the set of parameter values admitted by
multifractal theory; the exploitation of a suitable Whittle approximation
within the Bayesian model which enables the otherwise infeasible evaluation of
the posterior distribution associated with the model. Performance is assessed
numerically for several 2D multifractal processes, for several image sizes and
a large range of process parameters. The procedure yields significant benefits
over current benchmark estimators in terms of estimation performance and
ability to discriminate between the two most commonly used classes of
multifractal process models. The gains in performance are particularly
pronounced for small image sizes, notably enabling for the first time the
analysis of image patches as small as 64x64 pixels.
|
1505.06751 | Ayad Ghany Ismaeel | Ayad Ghany Ismaeel, Raghad Zuhair Yousif | Novel Mining of Cancer via Mutation in Tumor Protein P53 using Quick
Propagation Network | 6 Pages, 9 figures, 2 Table | International Journal of Computer Science and Electronics
Engineering IJCSEE, Volume 3, Issue 2, 2015 | null | null | cs.CE | http://creativecommons.org/licenses/by/3.0/ | There is multiple databases contain datasets of TP53 gene and its tumor
protein P53 which believed to be involved in over 50% of human cancers cases,
these databases are rich as datasets covered all mutations caused diseases
(cancers), but they haven't efficient mining method can classify and diagnosis
mutations patient's then predict the cancer of that patient. This paper
proposed a novel mining of cancer via mutations because there is no mining
method before offers friendly, effective and flexible predict or diagnosis of
cancers via using whole common database of TP53 gene (tumor protein P53) as
dataset and selecting a minimum number of fields in training and testing quick
propagation algorithm which supporting this miming method. Simulating quick
propagation network for the train dataset shows results the Correlation
(0.9999), R-squared (0.9998) and mean of Absolute Relative Error (0.0029),
while the training for the ALL datasets (train, test and validation dataset)
have results the Correlation (0.9993), R-squared (0.9987) and mean of Absolute
Relative Error (0.0057).
| [
{
"version": "v1",
"created": "Wed, 20 May 2015 15:46:45 GMT"
}
] | 2015-05-27T00:00:00 | [
[
"Ismaeel",
"Ayad Ghany",
""
],
[
"Yousif",
"Raghad Zuhair",
""
]
] | TITLE: Novel Mining of Cancer via Mutation in Tumor Protein P53 using Quick
Propagation Network
ABSTRACT: There is multiple databases contain datasets of TP53 gene and its tumor
protein P53 which believed to be involved in over 50% of human cancers cases,
these databases are rich as datasets covered all mutations caused diseases
(cancers), but they haven't efficient mining method can classify and diagnosis
mutations patient's then predict the cancer of that patient. This paper
proposed a novel mining of cancer via mutations because there is no mining
method before offers friendly, effective and flexible predict or diagnosis of
cancers via using whole common database of TP53 gene (tumor protein P53) as
dataset and selecting a minimum number of fields in training and testing quick
propagation algorithm which supporting this miming method. Simulating quick
propagation network for the train dataset shows results the Correlation
(0.9999), R-squared (0.9998) and mean of Absolute Relative Error (0.0029),
while the training for the ALL datasets (train, test and validation dataset)
have results the Correlation (0.9993), R-squared (0.9987) and mean of Absolute
Relative Error (0.0057).
|
1505.06800 | Baochang Zhang | Lei Wang, Baochang Zhang | Boosting-like Deep Learning For Pedestrian Detection | 9 pages,7 figures | null | null | null | cs.CV cs.LG cs.NE | http://creativecommons.org/licenses/by-nc-sa/3.0/ | This paper proposes boosting-like deep learning (BDL) framework for
pedestrian detection. Due to overtraining on the limited training samples,
overfitting is a major problem of deep learning. We incorporate a boosting-like
technique into deep learning to weigh the training samples, and thus prevent
overtraining in the iterative process. We theoretically give the details of
derivation of our algorithm, and report the experimental results on open data
sets showing that BDL achieves a better stable performance than the
state-of-the-arts. Our approach achieves 15.85% and 3.81% reduction in the
average miss rate compared with ACF and JointDeep on the largest Caltech
benchmark dataset, respectively.
| [
{
"version": "v1",
"created": "Tue, 26 May 2015 03:52:52 GMT"
}
] | 2015-05-27T00:00:00 | [
[
"Wang",
"Lei",
""
],
[
"Zhang",
"Baochang",
""
]
] | TITLE: Boosting-like Deep Learning For Pedestrian Detection
ABSTRACT: This paper proposes boosting-like deep learning (BDL) framework for
pedestrian detection. Due to overtraining on the limited training samples,
overfitting is a major problem of deep learning. We incorporate a boosting-like
technique into deep learning to weigh the training samples, and thus prevent
overtraining in the iterative process. We theoretically give the details of
derivation of our algorithm, and report the experimental results on open data
sets showing that BDL achieves a better stable performance than the
state-of-the-arts. Our approach achieves 15.85% and 3.81% reduction in the
average miss rate compared with ACF and JointDeep on the largest Caltech
benchmark dataset, respectively.
|
1505.06812 | Purushottam Kar | Harikrishna Narasimhan and Purushottam Kar and Prateek Jain | Optimizing Non-decomposable Performance Measures: A Tale of Two Classes | To appear in proceedings of the 32nd International Conference on
Machine Learning (ICML 2015) | Journal of Machine Learning Research, W&CP 37 (2015) | null | null | stat.ML cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Modern classification problems frequently present mild to severe label
imbalance as well as specific requirements on classification characteristics,
and require optimizing performance measures that are non-decomposable over the
dataset, such as F-measure. Such measures have spurred much interest and pose
specific challenges to learning algorithms since their non-additive nature
precludes a direct application of well-studied large scale optimization methods
such as stochastic gradient descent.
In this paper we reveal that for two large families of performance measures
that can be expressed as functions of true positive/negative rates, it is
indeed possible to implement point stochastic updates. The families we consider
are concave and pseudo-linear functions of TPR, TNR which cover several
popularly used performance measures such as F-measure, G-mean and H-mean.
Our core contribution is an adaptive linearization scheme for these families,
using which we develop optimization techniques that enable truly point-based
stochastic updates. For concave performance measures we propose SPADE, a
stochastic primal dual solver; for pseudo-linear measures we propose STAMP, a
stochastic alternate maximization procedure. Both methods have crisp
convergence guarantees, demonstrate significant speedups over existing methods
- often by an order of magnitude or more, and give similar or more accurate
predictions on test data.
| [
{
"version": "v1",
"created": "Tue, 26 May 2015 05:59:33 GMT"
}
] | 2015-05-27T00:00:00 | [
[
"Narasimhan",
"Harikrishna",
""
],
[
"Kar",
"Purushottam",
""
],
[
"Jain",
"Prateek",
""
]
] | TITLE: Optimizing Non-decomposable Performance Measures: A Tale of Two Classes
ABSTRACT: Modern classification problems frequently present mild to severe label
imbalance as well as specific requirements on classification characteristics,
and require optimizing performance measures that are non-decomposable over the
dataset, such as F-measure. Such measures have spurred much interest and pose
specific challenges to learning algorithms since their non-additive nature
precludes a direct application of well-studied large scale optimization methods
such as stochastic gradient descent.
In this paper we reveal that for two large families of performance measures
that can be expressed as functions of true positive/negative rates, it is
indeed possible to implement point stochastic updates. The families we consider
are concave and pseudo-linear functions of TPR, TNR which cover several
popularly used performance measures such as F-measure, G-mean and H-mean.
Our core contribution is an adaptive linearization scheme for these families,
using which we develop optimization techniques that enable truly point-based
stochastic updates. For concave performance measures we propose SPADE, a
stochastic primal dual solver; for pseudo-linear measures we propose STAMP, a
stochastic alternate maximization procedure. Both methods have crisp
convergence guarantees, demonstrate significant speedups over existing methods
- often by an order of magnitude or more, and give similar or more accurate
predictions on test data.
|
1505.06814 | Francesco Palmieri A. N. | Francesco A. N. Palmieri and Amedeo Buonanno | Discrete Independent Component Analysis (DICA) with Belief Propagation | Sumbitted for publication (May 2015) | null | null | null | cs.CV cs.LG stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We apply belief propagation to a Bayesian bipartite graph composed of
discrete independent hidden variables and discrete visible variables. The
network is the Discrete counterpart of Independent Component Analysis (DICA)
and it is manipulated in a factor graph form for inference and learning. A full
set of simulations is reported for character images from the MNIST dataset. The
results show that the factorial code implemented by the sources contributes to
build a good generative model for the data that can be used in various
inference modes.
| [
{
"version": "v1",
"created": "Tue, 26 May 2015 06:02:05 GMT"
}
] | 2015-05-27T00:00:00 | [
[
"Palmieri",
"Francesco A. N.",
""
],
[
"Buonanno",
"Amedeo",
""
]
] | TITLE: Discrete Independent Component Analysis (DICA) with Belief Propagation
ABSTRACT: We apply belief propagation to a Bayesian bipartite graph composed of
discrete independent hidden variables and discrete visible variables. The
network is the Discrete counterpart of Independent Component Analysis (DICA)
and it is manipulated in a factor graph form for inference and learning. A full
set of simulations is reported for character images from the MNIST dataset. The
results show that the factorial code implemented by the sources contributes to
build a good generative model for the data that can be used in various
inference modes.
|
1505.06872 | Wanling Gao | Wanling Gao, Chunjie Luo, Jianfeng Zhan, Hainan Ye, Xiwen He, Lei
Wang, Yuqing Zhu and Xinhui Tian | Identifying Dwarfs Workloads in Big Data Analytics | null | null | null | null | cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Big data benchmarking is particularly important and provides applicable
yardsticks for evaluating booming big data systems. However, wide coverage and
great complexity of big data computing impose big challenges on big data
benchmarking. How can we construct a benchmark suite using a minimum set of
units of computation to represent diversity of big data analytics workloads?
Big data dwarfs are abstractions of extracting frequently appearing operations
in big data computing. One dwarf represents one unit of computation, and big
data workloads are decomposed into one or more dwarfs. Furthermore, dwarfs
workloads rather than vast real workloads are more cost-efficient and
representative to evaluate big data systems. In this paper, we extensively
investigate six most important or emerging application domains i.e. search
engine, social network, e-commerce, multimedia, bioinformatics and astronomy.
After analyzing forty representative algorithms, we single out eight dwarfs
workloads in big data analytics other than OLAP, which are linear algebra,
sampling, logic operations, transform operations, set operations, graph
operations, statistic operations and sort.
| [
{
"version": "v1",
"created": "Tue, 26 May 2015 09:38:08 GMT"
}
] | 2015-05-27T00:00:00 | [
[
"Gao",
"Wanling",
""
],
[
"Luo",
"Chunjie",
""
],
[
"Zhan",
"Jianfeng",
""
],
[
"Ye",
"Hainan",
""
],
[
"He",
"Xiwen",
""
],
[
"Wang",
"Lei",
""
],
[
"Zhu",
"Yuqing",
""
],
[
"Tian",
"Xinhui",
""
]
] | TITLE: Identifying Dwarfs Workloads in Big Data Analytics
ABSTRACT: Big data benchmarking is particularly important and provides applicable
yardsticks for evaluating booming big data systems. However, wide coverage and
great complexity of big data computing impose big challenges on big data
benchmarking. How can we construct a benchmark suite using a minimum set of
units of computation to represent diversity of big data analytics workloads?
Big data dwarfs are abstractions of extracting frequently appearing operations
in big data computing. One dwarf represents one unit of computation, and big
data workloads are decomposed into one or more dwarfs. Furthermore, dwarfs
workloads rather than vast real workloads are more cost-efficient and
representative to evaluate big data systems. In this paper, we extensively
investigate six most important or emerging application domains i.e. search
engine, social network, e-commerce, multimedia, bioinformatics and astronomy.
After analyzing forty representative algorithms, we single out eight dwarfs
workloads in big data analytics other than OLAP, which are linear algebra,
sampling, logic operations, transform operations, set operations, graph
operations, statistic operations and sort.
|
1505.06907 | Andreas Gr\"unauer | Andreas Gr\"unauer and Markus Vincze | Using Dimension Reduction to Improve the Classification of
High-dimensional Data | Presented at OAGM Workshop, 2015 (arXiv:1505.01065) | null | null | OAGM/2015/09 | cs.LG cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this work we show that the classification performance of high-dimensional
structural MRI data with only a small set of training examples is improved by
the usage of dimension reduction methods. We assessed two different dimension
reduction variants: feature selection by ANOVA F-test and feature
transformation by PCA. On the reduced datasets, we applied common learning
algorithms using 5-fold cross-validation. Training, tuning of the
hyperparameters, as well as the performance evaluation of the classifiers was
conducted using two different performance measures: Accuracy, and Receiver
Operating Characteristic curve (AUC). Our hypothesis is supported by
experimental results.
| [
{
"version": "v1",
"created": "Tue, 26 May 2015 11:33:04 GMT"
}
] | 2015-05-27T00:00:00 | [
[
"Grünauer",
"Andreas",
""
],
[
"Vincze",
"Markus",
""
]
] | TITLE: Using Dimension Reduction to Improve the Classification of
High-dimensional Data
ABSTRACT: In this work we show that the classification performance of high-dimensional
structural MRI data with only a small set of training examples is improved by
the usage of dimension reduction methods. We assessed two different dimension
reduction variants: feature selection by ANOVA F-test and feature
transformation by PCA. On the reduced datasets, we applied common learning
algorithms using 5-fold cross-validation. Training, tuning of the
hyperparameters, as well as the performance evaluation of the classifiers was
conducted using two different performance measures: Accuracy, and Receiver
Operating Characteristic curve (AUC). Our hypothesis is supported by
experimental results.
|
1505.06915 | Jean-Philippe Vert | K\'evin Vervier (CBIO), Pierre Mah\'e, Maud Tournoud, Jean-Baptiste
Veyrieras, Jean-Philippe Vert (CBIO) | Large-scale Machine Learning for Metagenomics Sequence Classification | null | null | null | null | q-bio.QM cs.CE cs.LG q-bio.GN stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Metagenomics characterizes the taxonomic diversity of microbial communities
by sequencing DNA directly from an environmental sample. One of the main
challenges in metagenomics data analysis is the binning step, where each
sequenced read is assigned to a taxonomic clade. Due to the large volume of
metagenomics datasets, binning methods need fast and accurate algorithms that
can operate with reasonable computing requirements. While standard
alignment-based methods provide state-of-the-art performance, compositional
approaches that assign a taxonomic class to a DNA read based on the k-mers it
contains have the potential to provide faster solutions. In this work, we
investigate the potential of modern, large-scale machine learning
implementations for taxonomic affectation of next-generation sequencing reads
based on their k-mers profile. We show that machine learning-based
compositional approaches benefit from increasing the number of fragments
sampled from reference genome to tune their parameters, up to a coverage of
about 10, and from increasing the k-mer size to about 12. Tuning these models
involves training a machine learning model on about 10 8 samples in 10 7
dimensions, which is out of reach of standard soft-wares but can be done
efficiently with modern implementations for large-scale machine learning. The
resulting models are competitive in terms of accuracy with well-established
alignment tools for problems involving a small to moderate number of candidate
species, and for reasonable amounts of sequencing errors. We show, however,
that compositional approaches are still limited in their ability to deal with
problems involving a greater number of species, and more sensitive to
sequencing errors. We finally confirm that compositional approach achieve
faster prediction times, with a gain of 3 to 15 times with respect to the
BWA-MEM short read mapper, depending on the number of candidate species and the
level of sequencing noise.
| [
{
"version": "v1",
"created": "Tue, 26 May 2015 12:02:04 GMT"
}
] | 2015-05-27T00:00:00 | [
[
"Vervier",
"Kévin",
"",
"CBIO"
],
[
"Mahé",
"Pierre",
"",
"CBIO"
],
[
"Tournoud",
"Maud",
"",
"CBIO"
],
[
"Veyrieras",
"Jean-Baptiste",
"",
"CBIO"
],
[
"Vert",
"Jean-Philippe",
"",
"CBIO"
]
] | TITLE: Large-scale Machine Learning for Metagenomics Sequence Classification
ABSTRACT: Metagenomics characterizes the taxonomic diversity of microbial communities
by sequencing DNA directly from an environmental sample. One of the main
challenges in metagenomics data analysis is the binning step, where each
sequenced read is assigned to a taxonomic clade. Due to the large volume of
metagenomics datasets, binning methods need fast and accurate algorithms that
can operate with reasonable computing requirements. While standard
alignment-based methods provide state-of-the-art performance, compositional
approaches that assign a taxonomic class to a DNA read based on the k-mers it
contains have the potential to provide faster solutions. In this work, we
investigate the potential of modern, large-scale machine learning
implementations for taxonomic affectation of next-generation sequencing reads
based on their k-mers profile. We show that machine learning-based
compositional approaches benefit from increasing the number of fragments
sampled from reference genome to tune their parameters, up to a coverage of
about 10, and from increasing the k-mer size to about 12. Tuning these models
involves training a machine learning model on about 10 8 samples in 10 7
dimensions, which is out of reach of standard soft-wares but can be done
efficiently with modern implementations for large-scale machine learning. The
resulting models are competitive in terms of accuracy with well-established
alignment tools for problems involving a small to moderate number of candidate
species, and for reasonable amounts of sequencing errors. We show, however,
that compositional approaches are still limited in their ability to deal with
problems involving a greater number of species, and more sensitive to
sequencing errors. We finally confirm that compositional approach achieve
faster prediction times, with a gain of 3 to 15 times with respect to the
BWA-MEM short read mapper, depending on the number of candidate species and the
level of sequencing noise.
|
1505.06918 | Roman Lutz | Roman Lutz | Fantasy Football Prediction | class project, 7 pages (1 sources, 1 appendix) | null | null | null | cs.LG | http://creativecommons.org/licenses/by/3.0/ | The ubiquity of professional sports and specifically the NFL have lead to an
increase in popularity for Fantasy Football. Users have many tools at their
disposal: statistics, predictions, rankings of experts and even recommendations
of peers. There are issues with all of these, though. Especially since many
people pay money to play, the prediction tools should be enhanced as they
provide unbiased and easy-to-use assistance for users. This paper provides and
discusses approaches to predict Fantasy Football scores of Quarterbacks with
relatively limited data. In addition to that, it includes several suggestions
on how the data could be enhanced to achieve better results. The dataset
consists only of game data from the last six NFL seasons. I used two different
methods to predict the Fantasy Football scores of NFL players: Support Vector
Regression (SVR) and Neural Networks. The results of both are promising given
the limited data that was used.
| [
{
"version": "v1",
"created": "Tue, 26 May 2015 12:14:56 GMT"
}
] | 2015-05-27T00:00:00 | [
[
"Lutz",
"Roman",
""
]
] | TITLE: Fantasy Football Prediction
ABSTRACT: The ubiquity of professional sports and specifically the NFL have lead to an
increase in popularity for Fantasy Football. Users have many tools at their
disposal: statistics, predictions, rankings of experts and even recommendations
of peers. There are issues with all of these, though. Especially since many
people pay money to play, the prediction tools should be enhanced as they
provide unbiased and easy-to-use assistance for users. This paper provides and
discusses approaches to predict Fantasy Football scores of Quarterbacks with
relatively limited data. In addition to that, it includes several suggestions
on how the data could be enhanced to achieve better results. The dataset
consists only of game data from the last six NFL seasons. I used two different
methods to predict the Fantasy Football scores of NFL players: Support Vector
Regression (SVR) and Neural Networks. The results of both are promising given
the limited data that was used.
|
1505.06999 | Luis Ortiz | Joshua Belanich and Luis E. Ortiz | Some Open Problems in Optimal AdaBoost and Decision Stumps | 4 pages, rejected from COLT15 Open Problems May 19, 2015 (submitted
April 21, 2015; original 3 pages in COLT-conference format) | null | null | null | cs.LG stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The significance of the study of the theoretical and practical properties of
AdaBoost is unquestionable, given its simplicity, wide practical use, and
effectiveness on real-world datasets. Here we present a few open problems
regarding the behavior of "Optimal AdaBoost," a term coined by Rudin,
Daubechies, and Schapire in 2004 to label the simple version of the standard
AdaBoost algorithm in which the weak learner that AdaBoost uses always outputs
the weak classifier with lowest weighted error among the respective hypothesis
class of weak classifiers implicit in the weak learner. We concentrate on the
standard, "vanilla" version of Optimal AdaBoost for binary classification that
results from using an exponential-loss upper bound on the misclassification
training error. We present two types of open problems. One deals with general
weak hypotheses. The other deals with the particular case of decision stumps,
as often and commonly used in practice. Answers to the open problems can have
immediate significant impact to (1) cementing previously established results on
asymptotic convergence properties of Optimal AdaBoost, for finite datasets,
which in turn can be the start to any convergence-rate analysis; (2)
understanding the weak-hypotheses class of effective decision stumps generated
from data, which we have empirically observed to be significantly smaller than
the typically obtained class, as well as the effect on the weak learner's
running time and previously established improved bounds on the generalization
performance of Optimal AdaBoost classifiers; and (3) shedding some light on the
"self control" that AdaBoost tends to exhibit in practice.
| [
{
"version": "v1",
"created": "Tue, 26 May 2015 15:18:33 GMT"
}
] | 2015-05-27T00:00:00 | [
[
"Belanich",
"Joshua",
""
],
[
"Ortiz",
"Luis E.",
""
]
] | TITLE: Some Open Problems in Optimal AdaBoost and Decision Stumps
ABSTRACT: The significance of the study of the theoretical and practical properties of
AdaBoost is unquestionable, given its simplicity, wide practical use, and
effectiveness on real-world datasets. Here we present a few open problems
regarding the behavior of "Optimal AdaBoost," a term coined by Rudin,
Daubechies, and Schapire in 2004 to label the simple version of the standard
AdaBoost algorithm in which the weak learner that AdaBoost uses always outputs
the weak classifier with lowest weighted error among the respective hypothesis
class of weak classifiers implicit in the weak learner. We concentrate on the
standard, "vanilla" version of Optimal AdaBoost for binary classification that
results from using an exponential-loss upper bound on the misclassification
training error. We present two types of open problems. One deals with general
weak hypotheses. The other deals with the particular case of decision stumps,
as often and commonly used in practice. Answers to the open problems can have
immediate significant impact to (1) cementing previously established results on
asymptotic convergence properties of Optimal AdaBoost, for finite datasets,
which in turn can be the start to any convergence-rate analysis; (2)
understanding the weak-hypotheses class of effective decision stumps generated
from data, which we have empirically observed to be significantly smaller than
the typically obtained class, as well as the effect on the weak learner's
running time and previously established improved bounds on the generalization
performance of Optimal AdaBoost classifiers; and (3) shedding some light on the
"self control" that AdaBoost tends to exhibit in practice.
|
1406.4923 | Jeremy Kepner | Jeremy Kepner, William Arcand, David Bestor, Bill Bergeron, Chansup
Byun, Vijay Gadepally, Matthew Hubbell, Peter Michaleas, Julie Mullen, Andrew
Prout, Albert Reuther, Antonio Rosa, Charles Yee (MIT) | Achieving 100,000,000 database inserts per second using Accumulo and D4M | 6 pages; to appear in IEEE High Performance Extreme Computing (HPEC)
2014 | null | 10.1109/HPEC.2014.7040945 | null | cs.DB astro-ph.IM cs.CE cs.DC cs.MS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The Apache Accumulo database is an open source relaxed consistency database
that is widely used for government applications. Accumulo is designed to
deliver high performance on unstructured data such as graphs of network data.
This paper tests the performance of Accumulo using data from the Graph500
benchmark. The Dynamic Distributed Dimensional Data Model (D4M) software is
used to implement the benchmark on a 216-node cluster running the MIT
SuperCloud software stack. A peak performance of over 100,000,000 database
inserts per second was achieved which is 100x larger than the highest
previously published value for any other database. The performance scales
linearly with the number of ingest clients, number of database servers, and
data size. The performance was achieved by adapting several supercomputing
techniques to this application: distributed arrays, domain decomposition,
adaptive load balancing, and single-program-multiple-data programming.
| [
{
"version": "v1",
"created": "Thu, 19 Jun 2014 00:44:12 GMT"
}
] | 2015-05-26T00:00:00 | [
[
"Kepner",
"Jeremy",
"",
"MIT"
],
[
"Arcand",
"William",
"",
"MIT"
],
[
"Bestor",
"David",
"",
"MIT"
],
[
"Bergeron",
"Bill",
"",
"MIT"
],
[
"Byun",
"Chansup",
"",
"MIT"
],
[
"Gadepally",
"Vijay",
"",
"MIT"
],
[
"Hubbell",
"Matthew",
"",
"MIT"
],
[
"Michaleas",
"Peter",
"",
"MIT"
],
[
"Mullen",
"Julie",
"",
"MIT"
],
[
"Prout",
"Andrew",
"",
"MIT"
],
[
"Reuther",
"Albert",
"",
"MIT"
],
[
"Rosa",
"Antonio",
"",
"MIT"
],
[
"Yee",
"Charles",
"",
"MIT"
]
] | TITLE: Achieving 100,000,000 database inserts per second using Accumulo and D4M
ABSTRACT: The Apache Accumulo database is an open source relaxed consistency database
that is widely used for government applications. Accumulo is designed to
deliver high performance on unstructured data such as graphs of network data.
This paper tests the performance of Accumulo using data from the Graph500
benchmark. The Dynamic Distributed Dimensional Data Model (D4M) software is
used to implement the benchmark on a 216-node cluster running the MIT
SuperCloud software stack. A peak performance of over 100,000,000 database
inserts per second was achieved which is 100x larger than the highest
previously published value for any other database. The performance scales
linearly with the number of ingest clients, number of database servers, and
data size. The performance was achieved by adapting several supercomputing
techniques to this application: distributed arrays, domain decomposition,
adaptive load balancing, and single-program-multiple-data programming.
|
1407.3859 | Jeremy Kepner | Jeremy Kepner, Christian Anderson, William Arcand, David Bestor, Bill
Bergeron, Chansup Byun, Matthew Hubbell, Peter Michaleas, Julie Mullen, David
O'Gwynn, Andrew Prout, Albert Reuther, Antonio Rosa, Charles Yee (MIT) | D4M 2.0 Schema: A General Purpose High Performance Schema for the
Accumulo Database | 6 pages; IEEE HPEC 2013 | null | 10.1109/HPEC.2013.6670318 | null | cs.DB astro-ph.IM cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Non-traditional, relaxed consistency, triple store databases are the backbone
of many web companies (e.g., Google Big Table, Amazon Dynamo, and Facebook
Cassandra). The Apache Accumulo database is a high performance open source
relaxed consistency database that is widely used for government applications.
Obtaining the full benefits of Accumulo requires using novel schemas. The
Dynamic Distributed Dimensional Data Model (D4M)[http://d4m.mit.edu] provides a
uniform mathematical framework based on associative arrays that encompasses
both traditional (i.e., SQL) and non-traditional databases. For non-traditional
databases D4M naturally leads to a general purpose schema that can be used to
fully index and rapidly query every unique string in a dataset. The D4M 2.0
Schema has been applied with little or no customization to cyber,
bioinformatics, scientific citation, free text, and social media data. The D4M
2.0 Schema is simple, requires minimal parsing, and achieves the highest
published Accumulo ingest rates. The benefits of the D4M 2.0 Schema are
independent of the D4M interface. Any interface to Accumulo can achieve these
benefits by using the D4M 2.0 Schema
| [
{
"version": "v1",
"created": "Tue, 15 Jul 2014 01:54:45 GMT"
}
] | 2015-05-26T00:00:00 | [
[
"Kepner",
"Jeremy",
"",
"MIT"
],
[
"Anderson",
"Christian",
"",
"MIT"
],
[
"Arcand",
"William",
"",
"MIT"
],
[
"Bestor",
"David",
"",
"MIT"
],
[
"Bergeron",
"Bill",
"",
"MIT"
],
[
"Byun",
"Chansup",
"",
"MIT"
],
[
"Hubbell",
"Matthew",
"",
"MIT"
],
[
"Michaleas",
"Peter",
"",
"MIT"
],
[
"Mullen",
"Julie",
"",
"MIT"
],
[
"O'Gwynn",
"David",
"",
"MIT"
],
[
"Prout",
"Andrew",
"",
"MIT"
],
[
"Reuther",
"Albert",
"",
"MIT"
],
[
"Rosa",
"Antonio",
"",
"MIT"
],
[
"Yee",
"Charles",
"",
"MIT"
]
] | TITLE: D4M 2.0 Schema: A General Purpose High Performance Schema for the
Accumulo Database
ABSTRACT: Non-traditional, relaxed consistency, triple store databases are the backbone
of many web companies (e.g., Google Big Table, Amazon Dynamo, and Facebook
Cassandra). The Apache Accumulo database is a high performance open source
relaxed consistency database that is widely used for government applications.
Obtaining the full benefits of Accumulo requires using novel schemas. The
Dynamic Distributed Dimensional Data Model (D4M)[http://d4m.mit.edu] provides a
uniform mathematical framework based on associative arrays that encompasses
both traditional (i.e., SQL) and non-traditional databases. For non-traditional
databases D4M naturally leads to a general purpose schema that can be used to
fully index and rapidly query every unique string in a dataset. The D4M 2.0
Schema has been applied with little or no customization to cyber,
bioinformatics, scientific citation, free text, and social media data. The D4M
2.0 Schema is simple, requires minimal parsing, and achieves the highest
published Accumulo ingest rates. The benefits of the D4M 2.0 Schema are
independent of the D4M interface. Any interface to Accumulo can achieve these
benefits by using the D4M 2.0 Schema
|
1412.1740 | Matthew Kusner | Matt J. Kusner, Nicholas I. Kolkin, Stephen Tyree, Kilian Q.
Weinberger | Image Data Compression for Covariance and Histogram Descriptors | null | null | null | null | stat.ML cs.CV cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Covariance and histogram image descriptors provide an effective way to
capture information about images. Both excel when used in combination with
special purpose distance metrics. For covariance descriptors these metrics
measure the distance along the non-Euclidean Riemannian manifold of symmetric
positive definite matrices. For histogram descriptors the Earth Mover's
distance measures the optimal transport between two histograms. Although more
precise, these distance metrics are very expensive to compute, making them
impractical in many applications, even for data sets of only a few thousand
examples. In this paper we present two methods to compress the size of
covariance and histogram datasets with only marginal increases in test error
for k-nearest neighbor classification. Specifically, we show that we can reduce
data sets to 16% and in some cases as little as 2% of their original size,
while approximately matching the test error of kNN classification on the full
training set. In fact, because the compressed set is learned in a supervised
fashion, it sometimes even outperforms the full data set, while requiring only
a fraction of the space and drastically reducing test-time computation.
| [
{
"version": "v1",
"created": "Thu, 4 Dec 2014 17:22:22 GMT"
},
{
"version": "v2",
"created": "Sat, 23 May 2015 17:07:59 GMT"
}
] | 2015-05-26T00:00:00 | [
[
"Kusner",
"Matt J.",
""
],
[
"Kolkin",
"Nicholas I.",
""
],
[
"Tyree",
"Stephen",
""
],
[
"Weinberger",
"Kilian Q.",
""
]
] | TITLE: Image Data Compression for Covariance and Histogram Descriptors
ABSTRACT: Covariance and histogram image descriptors provide an effective way to
capture information about images. Both excel when used in combination with
special purpose distance metrics. For covariance descriptors these metrics
measure the distance along the non-Euclidean Riemannian manifold of symmetric
positive definite matrices. For histogram descriptors the Earth Mover's
distance measures the optimal transport between two histograms. Although more
precise, these distance metrics are very expensive to compute, making them
impractical in many applications, even for data sets of only a few thousand
examples. In this paper we present two methods to compress the size of
covariance and histogram datasets with only marginal increases in test error
for k-nearest neighbor classification. Specifically, we show that we can reduce
data sets to 16% and in some cases as little as 2% of their original size,
while approximately matching the test error of kNN classification on the full
training set. In fact, because the compressed set is learned in a supervised
fashion, it sometimes even outperforms the full data set, while requiring only
a fraction of the space and drastically reducing test-time computation.
|
1502.01911 | Mehdi Mortazawi Molu | Mehdi M. Molu and Alister Burr and Norbert Goertz | Statistical Analysis of Multi-Antenna Relay Systems and Power Allocation
Algorithms in a Relay with Partial Channel State Information | null | null | 10.1109/TWC.2015.2432768 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The performance of a dual-hop MIMO relay network is studied in this paper.
The relay is assumed to have access to the statistical channel state
information of its preceding and following channels and it is assumed that
fading at the antennas of the relay is correlated. The cumulative density
function (cdf) of the received SNR at the destination is first studied and
closed-form expressions are derived for the asymptotic cases of the
fully-correlated and non-correlated scenarios; moreover, the statistical
characteristics of the SNR are further studied and an approximate cdf of the
SNR is derived for arbitrary correlation. The cdf is a multipartite function
which does not easily lend itself to further mathematical calculations, e.g.,
rate optimization. However, we use it to propose a simple power allocation
algorithm which we call "proportional power allocation". The algorithm is
explained in detail for the case of two antennas and three antennas at the
relay and the extension of the algorithm to a relay with an arbitrary number of
the antennas is discussed. Although the proposed method is not claimed to be
optimal, the result is indistinguishable from the benchmark obtained using
exhaustive search. The simplicity of the algorithm combined with its precision
is indeed attractive from the practical point of view.
| [
{
"version": "v1",
"created": "Fri, 6 Feb 2015 15:03:10 GMT"
},
{
"version": "v2",
"created": "Sat, 2 May 2015 13:03:06 GMT"
}
] | 2015-05-26T00:00:00 | [
[
"Molu",
"Mehdi M.",
""
],
[
"Burr",
"Alister",
""
],
[
"Goertz",
"Norbert",
""
]
] | TITLE: Statistical Analysis of Multi-Antenna Relay Systems and Power Allocation
Algorithms in a Relay with Partial Channel State Information
ABSTRACT: The performance of a dual-hop MIMO relay network is studied in this paper.
The relay is assumed to have access to the statistical channel state
information of its preceding and following channels and it is assumed that
fading at the antennas of the relay is correlated. The cumulative density
function (cdf) of the received SNR at the destination is first studied and
closed-form expressions are derived for the asymptotic cases of the
fully-correlated and non-correlated scenarios; moreover, the statistical
characteristics of the SNR are further studied and an approximate cdf of the
SNR is derived for arbitrary correlation. The cdf is a multipartite function
which does not easily lend itself to further mathematical calculations, e.g.,
rate optimization. However, we use it to propose a simple power allocation
algorithm which we call "proportional power allocation". The algorithm is
explained in detail for the case of two antennas and three antennas at the
relay and the extension of the algorithm to a relay with an arbitrary number of
the antennas is discussed. Although the proposed method is not claimed to be
optimal, the result is indistinguishable from the benchmark obtained using
exhaustive search. The simplicity of the algorithm combined with its precision
is indeed attractive from the practical point of view.
|
1504.06580 | Cicero dos Santos | Cicero Nogueira dos Santos, Bing Xiang, Bowen Zhou | Classifying Relations by Ranking with Convolutional Neural Networks | Accepted as a long paper in the 53rd Annual Meeting of the
Association for Computational Linguistics (ACL 2015) | null | null | null | cs.CL cs.LG cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Relation classification is an important semantic processing task for which
state-ofthe-art systems still rely on costly handcrafted features. In this work
we tackle the relation classification task using a convolutional neural network
that performs classification by ranking (CR-CNN). We propose a new pairwise
ranking loss function that makes it easy to reduce the impact of artificial
classes. We perform experiments using the the SemEval-2010 Task 8 dataset,
which is designed for the task of classifying the relationship between two
nominals marked in a sentence. Using CRCNN, we outperform the state-of-the-art
for this dataset and achieve a F1 of 84.1 without using any costly handcrafted
features. Additionally, our experimental results show that: (1) our approach is
more effective than CNN followed by a softmax classifier; (2) omitting the
representation of the artificial class Other improves both precision and
recall; and (3) using only word embeddings as input features is enough to
achieve state-of-the-art results if we consider only the text between the two
target nominals.
| [
{
"version": "v1",
"created": "Fri, 24 Apr 2015 17:50:33 GMT"
},
{
"version": "v2",
"created": "Sun, 24 May 2015 13:58:05 GMT"
}
] | 2015-05-26T00:00:00 | [
[
"Santos",
"Cicero Nogueira dos",
""
],
[
"Xiang",
"Bing",
""
],
[
"Zhou",
"Bowen",
""
]
] | TITLE: Classifying Relations by Ranking with Convolutional Neural Networks
ABSTRACT: Relation classification is an important semantic processing task for which
state-ofthe-art systems still rely on costly handcrafted features. In this work
we tackle the relation classification task using a convolutional neural network
that performs classification by ranking (CR-CNN). We propose a new pairwise
ranking loss function that makes it easy to reduce the impact of artificial
classes. We perform experiments using the the SemEval-2010 Task 8 dataset,
which is designed for the task of classifying the relationship between two
nominals marked in a sentence. Using CRCNN, we outperform the state-of-the-art
for this dataset and achieve a F1 of 84.1 without using any costly handcrafted
features. Additionally, our experimental results show that: (1) our approach is
more effective than CNN followed by a softmax classifier; (2) omitting the
representation of the artificial class Other improves both precision and
recall; and (3) using only word embeddings as input features is enough to
achieve state-of-the-art results if we consider only the text between the two
target nominals.
|
1505.06249 | Alexandre Drouin | Alexandre Drouin, S\'ebastien Gigu\`ere, Maxime D\'eraspe,
Fran\c{c}ois Laviolette, Mario Marchand, Jacques Corbeil | Greedy Biomarker Discovery in the Genome with Applications to
Antimicrobial Resistance | Peer-reviewed and accepted for an oral presentation in the Greed is
Great workshop at the International Conference on Machine Learning, Lille,
France, 2015 | null | null | null | q-bio.GN cs.LG stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The Set Covering Machine (SCM) is a greedy learning algorithm that produces
sparse classifiers. We extend the SCM for datasets that contain a huge number
of features. The whole genetic material of living organisms is an example of
such a case, where the number of feature exceeds 10^7. Three human pathogens
were used to evaluate the performance of the SCM at predicting antimicrobial
resistance. Our results show that the SCM compares favorably in terms of
sparsity and accuracy against L1 and L2 regularized Support Vector Machines and
CART decision trees. Moreover, the SCM was the only algorithm that could
consider the full feature space. For all other algorithms, the latter had to be
filtered as a preprocessing step.
| [
{
"version": "v1",
"created": "Fri, 22 May 2015 23:29:40 GMT"
}
] | 2015-05-26T00:00:00 | [
[
"Drouin",
"Alexandre",
""
],
[
"Giguère",
"Sébastien",
""
],
[
"Déraspe",
"Maxime",
""
],
[
"Laviolette",
"François",
""
],
[
"Marchand",
"Mario",
""
],
[
"Corbeil",
"Jacques",
""
]
] | TITLE: Greedy Biomarker Discovery in the Genome with Applications to
Antimicrobial Resistance
ABSTRACT: The Set Covering Machine (SCM) is a greedy learning algorithm that produces
sparse classifiers. We extend the SCM for datasets that contain a huge number
of features. The whole genetic material of living organisms is an example of
such a case, where the number of feature exceeds 10^7. Three human pathogens
were used to evaluate the performance of the SCM at predicting antimicrobial
resistance. Our results show that the SCM compares favorably in terms of
sparsity and accuracy against L1 and L2 regularized Support Vector Machines and
CART decision trees. Moreover, the SCM was the only algorithm that could
consider the full feature space. For all other algorithms, the latter had to be
filtered as a preprocessing step.
|
1505.06250 | George Toderici | Balakrishnan Varadarajan and George Toderici and Sudheendra
Vijayanarasimhan and Apostol Natsev | Efficient Large Scale Video Classification | null | null | null | null | cs.CV cs.MM cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Video classification has advanced tremendously over the recent years. A large
part of the improvements in video classification had to do with the work done
by the image classification community and the use of deep convolutional
networks (CNNs) which produce competitive results with hand- crafted motion
features. These networks were adapted to use video frames in various ways and
have yielded state of the art classification results. We present two methods
that build on this work, and scale it up to work with millions of videos and
hundreds of thousands of classes while maintaining a low computational cost. In
the context of large scale video processing, training CNNs on video frames is
extremely time consuming, due to the large number of frames involved. We
propose to avoid this problem by training CNNs on either YouTube thumbnails or
Flickr images, and then using these networks' outputs as features for other
higher level classifiers. We discuss the challenges of achieving this and
propose two models for frame-level and video-level classification. The first is
a highly efficient mixture of experts while the latter is based on long short
term memory neural networks. We present results on the Sports-1M video dataset
(1 million videos, 487 classes) and on a new dataset which has 12 million
videos and 150,000 labels.
| [
{
"version": "v1",
"created": "Fri, 22 May 2015 23:45:32 GMT"
}
] | 2015-05-26T00:00:00 | [
[
"Varadarajan",
"Balakrishnan",
""
],
[
"Toderici",
"George",
""
],
[
"Vijayanarasimhan",
"Sudheendra",
""
],
[
"Natsev",
"Apostol",
""
]
] | TITLE: Efficient Large Scale Video Classification
ABSTRACT: Video classification has advanced tremendously over the recent years. A large
part of the improvements in video classification had to do with the work done
by the image classification community and the use of deep convolutional
networks (CNNs) which produce competitive results with hand- crafted motion
features. These networks were adapted to use video frames in various ways and
have yielded state of the art classification results. We present two methods
that build on this work, and scale it up to work with millions of videos and
hundreds of thousands of classes while maintaining a low computational cost. In
the context of large scale video processing, training CNNs on video frames is
extremely time consuming, due to the large number of frames involved. We
propose to avoid this problem by training CNNs on either YouTube thumbnails or
Flickr images, and then using these networks' outputs as features for other
higher level classifiers. We discuss the challenges of achieving this and
propose two models for frame-level and video-level classification. The first is
a highly efficient mixture of experts while the latter is based on long short
term memory neural networks. We present results on the Sports-1M video dataset
(1 million videos, 487 classes) and on a new dataset which has 12 million
videos and 150,000 labels.
|
1505.06485 | Syama Sundar Rangapuram | Syama Sundar Rangapuram and Matthias Hein | Constrained 1-Spectral Clustering | Long version of paper accepted at AISTATS 2012 | null | null | null | stat.ML cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | An important form of prior information in clustering comes in form of
cannot-link and must-link constraints. We present a generalization of the
popular spectral clustering technique which integrates such constraints.
Motivated by the recently proposed $1$-spectral clustering for the
unconstrained problem, our method is based on a tight relaxation of the
constrained normalized cut into a continuous optimization problem. Opposite to
all other methods which have been suggested for constrained spectral
clustering, we can always guarantee to satisfy all constraints. Moreover, our
soft formulation allows to optimize a trade-off between normalized cut and the
number of violated constraints. An efficient implementation is provided which
scales to large datasets. We outperform consistently all other proposed methods
in the experiments.
| [
{
"version": "v1",
"created": "Sun, 24 May 2015 21:25:44 GMT"
}
] | 2015-05-26T00:00:00 | [
[
"Rangapuram",
"Syama Sundar",
""
],
[
"Hein",
"Matthias",
""
]
] | TITLE: Constrained 1-Spectral Clustering
ABSTRACT: An important form of prior information in clustering comes in form of
cannot-link and must-link constraints. We present a generalization of the
popular spectral clustering technique which integrates such constraints.
Motivated by the recently proposed $1$-spectral clustering for the
unconstrained problem, our method is based on a tight relaxation of the
constrained normalized cut into a continuous optimization problem. Opposite to
all other methods which have been suggested for constrained spectral
clustering, we can always guarantee to satisfy all constraints. Moreover, our
soft formulation allows to optimize a trade-off between normalized cut and the
number of violated constraints. An efficient implementation is provided which
scales to large datasets. We outperform consistently all other proposed methods
in the experiments.
|
1505.06531 | Tsu-Wei Chen | Tsu-Wei Chen, Meena Abdelmaseeh, Daniel Stashuk | Affine and Regional Dynamic Time Warpng | null | null | null | null | cs.CV cs.CE cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Pointwise matches between two time series are of great importance in time
series analysis, and dynamic time warping (DTW) is known to provide generally
reasonable matches. There are situations where time series alignment should be
invariant to scaling and offset in amplitude or where local regions of the
considered time series should be strongly reflected in pointwise matches. Two
different variants of DTW, affine DTW (ADTW) and regional DTW (RDTW), are
proposed to handle scaling and offset in amplitude and provide regional
emphasis respectively. Furthermore, ADTW and RDTW can be combined in two
different ways to generate alignments that incorporate advantages from both
methods, where the affine model can be applied either globally to the entire
time series or locally to each region. The proposed alignment methods
outperform DTW on specific simulated datasets, and one-nearest-neighbor
classifiers using their associated difference measures are competitive with the
difference measures associated with state-of-the-art alignment methods on real
datasets.
| [
{
"version": "v1",
"created": "Mon, 25 May 2015 03:23:31 GMT"
}
] | 2015-05-26T00:00:00 | [
[
"Chen",
"Tsu-Wei",
""
],
[
"Abdelmaseeh",
"Meena",
""
],
[
"Stashuk",
"Daniel",
""
]
] | TITLE: Affine and Regional Dynamic Time Warpng
ABSTRACT: Pointwise matches between two time series are of great importance in time
series analysis, and dynamic time warping (DTW) is known to provide generally
reasonable matches. There are situations where time series alignment should be
invariant to scaling and offset in amplitude or where local regions of the
considered time series should be strongly reflected in pointwise matches. Two
different variants of DTW, affine DTW (ADTW) and regional DTW (RDTW), are
proposed to handle scaling and offset in amplitude and provide regional
emphasis respectively. Furthermore, ADTW and RDTW can be combined in two
different ways to generate alignments that incorporate advantages from both
methods, where the affine model can be applied either globally to the entire
time series or locally to each region. The proposed alignment methods
outperform DTW on specific simulated datasets, and one-nearest-neighbor
classifiers using their associated difference measures are competitive with the
difference measures associated with state-of-the-art alignment methods on real
datasets.
|
1505.06532 | Ali Jahanian | Ali Jahanian, S. V. N. Vishwanathan, Jan P. Allebach | Colors $-$Messengers of Concepts: Visual Design Mining for Learning
Color Semantics | null | null | null | null | cs.HC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper studies the concept of color semantics by modeling a dataset of
magazine cover designs, evaluating the model via crowdsourcing, and
demonstrating several prototypes that facilitate color-related design tasks. We
investigate a probabilistic generative modeling framework that expresses
semantic concepts as a combination of color and word distributions
$-$color-word topics. We adopt an extension to Latent Dirichlet Allocation
(LDA) topic modeling called LDA-dual to infer a set of color-word topics over a
corpus of 2,654 magazine covers spanning 71 distinct titles and 12 genres.
While LDA models text documents as distributions over word topics, we model
magazine covers as distributions over color-word topics. The results of our
crowdsourced experiments confirm that the model is able to successfully
discover the associations between colors and linguistic concepts. Finally, we
demonstrate several simple prototypes that apply the learned model to color
palette recommendation, design example retrieval, image retrieval, image color
selection, and image recoloring.
| [
{
"version": "v1",
"created": "Mon, 25 May 2015 03:34:46 GMT"
}
] | 2015-05-26T00:00:00 | [
[
"Jahanian",
"Ali",
""
],
[
"Vishwanathan",
"S. V. N.",
""
],
[
"Allebach",
"Jan P.",
""
]
] | TITLE: Colors $-$Messengers of Concepts: Visual Design Mining for Learning
Color Semantics
ABSTRACT: This paper studies the concept of color semantics by modeling a dataset of
magazine cover designs, evaluating the model via crowdsourcing, and
demonstrating several prototypes that facilitate color-related design tasks. We
investigate a probabilistic generative modeling framework that expresses
semantic concepts as a combination of color and word distributions
$-$color-word topics. We adopt an extension to Latent Dirichlet Allocation
(LDA) topic modeling called LDA-dual to infer a set of color-word topics over a
corpus of 2,654 magazine covers spanning 71 distinct titles and 12 genres.
While LDA models text documents as distributions over word topics, we model
magazine covers as distributions over color-word topics. The results of our
crowdsourced experiments confirm that the model is able to successfully
discover the associations between colors and linguistic concepts. Finally, we
demonstrate several simple prototypes that apply the learned model to color
palette recommendation, design example retrieval, image retrieval, image color
selection, and image recoloring.
|
1505.06538 | J Massey Cashore | J. Massey Cashore, Xiaoting Zhao, Alexander A. Alemi, Yujia Liu, Peter
I. Frazier | Clustering via Content-Augmented Stochastic Blockmodels | null | null | null | null | stat.ML cs.LG cs.SI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Much of the data being created on the web contains interactions between users
and items. Stochastic blockmodels, and other methods for community detection
and clustering of bipartite graphs, can infer latent user communities and
latent item clusters from this interaction data. These methods, however,
typically ignore the items' contents and the information they provide about
item clusters, despite the tendency of items in the same latent cluster to
share commonalities in content. We introduce content-augmented stochastic
blockmodels (CASB), which use item content together with user-item interaction
data to enhance the user communities and item clusters learned. Comparisons to
several state-of-the-art benchmark methods, on datasets arising from scientists
interacting with scientific articles, show that content-augmented stochastic
blockmodels provide highly accurate clusters with respect to metrics
representative of the underlying community structure.
| [
{
"version": "v1",
"created": "Mon, 25 May 2015 04:19:12 GMT"
}
] | 2015-05-26T00:00:00 | [
[
"Cashore",
"J. Massey",
""
],
[
"Zhao",
"Xiaoting",
""
],
[
"Alemi",
"Alexander A.",
""
],
[
"Liu",
"Yujia",
""
],
[
"Frazier",
"Peter I.",
""
]
] | TITLE: Clustering via Content-Augmented Stochastic Blockmodels
ABSTRACT: Much of the data being created on the web contains interactions between users
and items. Stochastic blockmodels, and other methods for community detection
and clustering of bipartite graphs, can infer latent user communities and
latent item clusters from this interaction data. These methods, however,
typically ignore the items' contents and the information they provide about
item clusters, despite the tendency of items in the same latent cluster to
share commonalities in content. We introduce content-augmented stochastic
blockmodels (CASB), which use item content together with user-item interaction
data to enhance the user communities and item clusters learned. Comparisons to
several state-of-the-art benchmark methods, on datasets arising from scientists
interacting with scientific articles, show that content-augmented stochastic
blockmodels provide highly accurate clusters with respect to metrics
representative of the underlying community structure.
|
1505.05921 | Katherine Driggs-Campbell | Katherine Driggs-Campbell and Ruzena Bajcsy | Identifying Modes of Intent from Driver Behaviors in Dynamic
Environments | Submitted to ITSC 2015 | null | null | null | cs.SY | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In light of growing attention of intelligent vehicle systems, we propose
developing a driver model that uses a hybrid system formulation to capture the
intent of the driver. This model hopes to capture human driving behavior in a
way that can be utilized by semi- and fully autonomous systems in heterogeneous
environments. We consider a discrete set of high level goals or intent modes,
that is designed to encompass the decision making process of the human. A
driver model is derived using a dataset of lane changes collected in a
realistic driving simulator, in which the driver actively labels data to give
us insight into her intent. By building the labeled dataset, we are able to
utilize classification tools to build the driver model using features of based
on her perception of the environment, and achieve high accuracy in identifying
driver intent. Multiple algorithms are presented and compared on the dataset,
and a comparison of the varying behaviors between drivers is drawn. Using this
modeling methodology, we present a model that can be used to assess driver
behaviors and to develop human-inspired safety metrics that can be utilized in
intelligent vehicular systems.
| [
{
"version": "v1",
"created": "Thu, 21 May 2015 23:19:09 GMT"
}
] | 2015-05-25T00:00:00 | [
[
"Driggs-Campbell",
"Katherine",
""
],
[
"Bajcsy",
"Ruzena",
""
]
] | TITLE: Identifying Modes of Intent from Driver Behaviors in Dynamic
Environments
ABSTRACT: In light of growing attention of intelligent vehicle systems, we propose
developing a driver model that uses a hybrid system formulation to capture the
intent of the driver. This model hopes to capture human driving behavior in a
way that can be utilized by semi- and fully autonomous systems in heterogeneous
environments. We consider a discrete set of high level goals or intent modes,
that is designed to encompass the decision making process of the human. A
driver model is derived using a dataset of lane changes collected in a
realistic driving simulator, in which the driver actively labels data to give
us insight into her intent. By building the labeled dataset, we are able to
utilize classification tools to build the driver model using features of based
on her perception of the environment, and achieve high accuracy in identifying
driver intent. Multiple algorithms are presented and compared on the dataset,
and a comparison of the varying behaviors between drivers is drawn. Using this
modeling methodology, we present a model that can be used to assess driver
behaviors and to develop human-inspired safety metrics that can be utilized in
intelligent vehicular systems.
|
1505.05957 | Tianmin Shu | Tianmin Shu, Dan Xie, Brandon Rothrock, Sinisa Todorovic, Song-Chun
Zhu | Joint Inference of Groups, Events and Human Roles in Aerial Videos | CVPR 2015 Oral Presentation | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | With the advent of drones, aerial video analysis becomes increasingly
important; yet, it has received scant attention in the literature. This paper
addresses a new problem of parsing low-resolution aerial videos of large
spatial areas, in terms of 1) grouping, 2) recognizing events and 3) assigning
roles to people engaged in events. We propose a novel framework aimed at
conducting joint inference of the above tasks, as reasoning about each in
isolation typically fails in our setting. Given noisy tracklets of people and
detections of large objects and scene surfaces (e.g., building, grass), we use
a spatiotemporal AND-OR graph to drive our joint inference, using Markov Chain
Monte Carlo and dynamic programming. We also introduce a new formalism of
spatiotemporal templates characterizing latent sub-events. For evaluation, we
have collected and released a new aerial videos dataset using a hex-rotor
flying over picnic areas rich with group events. Our results demonstrate that
we successfully address above inference tasks under challenging conditions.
| [
{
"version": "v1",
"created": "Fri, 22 May 2015 05:59:18 GMT"
}
] | 2015-05-25T00:00:00 | [
[
"Shu",
"Tianmin",
""
],
[
"Xie",
"Dan",
""
],
[
"Rothrock",
"Brandon",
""
],
[
"Todorovic",
"Sinisa",
""
],
[
"Zhu",
"Song-Chun",
""
]
] | TITLE: Joint Inference of Groups, Events and Human Roles in Aerial Videos
ABSTRACT: With the advent of drones, aerial video analysis becomes increasingly
important; yet, it has received scant attention in the literature. This paper
addresses a new problem of parsing low-resolution aerial videos of large
spatial areas, in terms of 1) grouping, 2) recognizing events and 3) assigning
roles to people engaged in events. We propose a novel framework aimed at
conducting joint inference of the above tasks, as reasoning about each in
isolation typically fails in our setting. Given noisy tracklets of people and
detections of large objects and scene surfaces (e.g., building, grass), we use
a spatiotemporal AND-OR graph to drive our joint inference, using Markov Chain
Monte Carlo and dynamic programming. We also introduce a new formalism of
spatiotemporal templates characterizing latent sub-events. For evaluation, we
have collected and released a new aerial videos dataset using a hex-rotor
flying over picnic areas rich with group events. Our results demonstrate that
we successfully address above inference tasks under challenging conditions.
|
1505.06169 | Emma Strubell | Emma Strubell, Luke Vilnis, Kate Silverstein, Andrew McCallum | Learning Dynamic Feature Selection for Fast Sequential Prediction | Appears in The 53rd Annual Meeting of the Association for
Computational Linguistics, Beijing, China, July 2015 | null | null | null | cs.CL cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present paired learning and inference algorithms for significantly
reducing computation and increasing speed of the vector dot products in the
classifiers that are at the heart of many NLP components. This is accomplished
by partitioning the features into a sequence of templates which are ordered
such that high confidence can often be reached using only a small fraction of
all features. Parameter estimation is arranged to maximize accuracy and early
confidence in this sequence. Our approach is simpler and better suited to NLP
than other related cascade methods. We present experiments in left-to-right
part-of-speech tagging, named entity recognition, and transition-based
dependency parsing. On the typical benchmarking datasets we can preserve POS
tagging accuracy above 97% and parsing LAS above 88.5% both with over a
five-fold reduction in run-time, and NER F1 above 88 with more than 2x increase
in speed.
| [
{
"version": "v1",
"created": "Fri, 22 May 2015 18:28:21 GMT"
}
] | 2015-05-25T00:00:00 | [
[
"Strubell",
"Emma",
""
],
[
"Vilnis",
"Luke",
""
],
[
"Silverstein",
"Kate",
""
],
[
"McCallum",
"Andrew",
""
]
] | TITLE: Learning Dynamic Feature Selection for Fast Sequential Prediction
ABSTRACT: We present paired learning and inference algorithms for significantly
reducing computation and increasing speed of the vector dot products in the
classifiers that are at the heart of many NLP components. This is accomplished
by partitioning the features into a sequence of templates which are ordered
such that high confidence can often be reached using only a small fraction of
all features. Parameter estimation is arranged to maximize accuracy and early
confidence in this sequence. Our approach is simpler and better suited to NLP
than other related cascade methods. We present experiments in left-to-right
part-of-speech tagging, named entity recognition, and transition-based
dependency parsing. On the typical benchmarking datasets we can preserve POS
tagging accuracy above 97% and parsing LAS above 88.5% both with over a
five-fold reduction in run-time, and NER F1 above 88 with more than 2x increase
in speed.
|
1401.4489 | Devansh Arpit | Devansh Arpit, Ifeoma Nwogu, Gaurav Srivastava, Venu Govindaraju | An Analysis of Random Projections in Cancelable Biometrics | null | null | null | null | cs.CV cs.LG stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | With increasing concerns about security, the need for highly secure physical
biometrics-based authentication systems utilizing \emph{cancelable biometric}
technologies is on the rise. Because the problem of cancelable template
generation deals with the trade-off between template security and matching
performance, many state-of-the-art algorithms successful in generating high
quality cancelable biometrics all have random projection as one of their early
processing steps. This paper therefore presents a formal analysis of why random
projections is an essential step in cancelable biometrics. By formally defining
the notion of an \textit{Independent Subspace Structure} for datasets, it can
be shown that random projection preserves the subspace structure of data
vectors generated from a union of independent linear subspaces. The bound on
the minimum number of random vectors required for this to hold is also derived
and is shown to depend logarithmically on the number of data samples, not only
in independent subspaces but in disjoint subspace settings as well. The
theoretical analysis presented is supported in detail with empirical results on
real-world face recognition datasets.
| [
{
"version": "v1",
"created": "Fri, 17 Jan 2014 23:21:56 GMT"
},
{
"version": "v2",
"created": "Wed, 5 Feb 2014 02:57:25 GMT"
},
{
"version": "v3",
"created": "Fri, 14 Nov 2014 02:38:09 GMT"
}
] | 2015-05-22T00:00:00 | [
[
"Arpit",
"Devansh",
""
],
[
"Nwogu",
"Ifeoma",
""
],
[
"Srivastava",
"Gaurav",
""
],
[
"Govindaraju",
"Venu",
""
]
] | TITLE: An Analysis of Random Projections in Cancelable Biometrics
ABSTRACT: With increasing concerns about security, the need for highly secure physical
biometrics-based authentication systems utilizing \emph{cancelable biometric}
technologies is on the rise. Because the problem of cancelable template
generation deals with the trade-off between template security and matching
performance, many state-of-the-art algorithms successful in generating high
quality cancelable biometrics all have random projection as one of their early
processing steps. This paper therefore presents a formal analysis of why random
projections is an essential step in cancelable biometrics. By formally defining
the notion of an \textit{Independent Subspace Structure} for datasets, it can
be shown that random projection preserves the subspace structure of data
vectors generated from a union of independent linear subspaces. The bound on
the minimum number of random vectors required for this to hold is also derived
and is shown to depend logarithmically on the number of data samples, not only
in independent subspaces but in disjoint subspace settings as well. The
theoretical analysis presented is supported in detail with empirical results on
real-world face recognition datasets.
|
1407.7073 | Weinan Zhang | Weinan Zhang, Shuai Yuan, Jun Wang, Xuehua Shen | Real-Time Bidding Benchmarking with iPinYou Dataset | UCL Technical Report 2014 | null | null | null | cs.GT cs.CY | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Being an emerging paradigm for display advertising, Real-Time Bidding (RTB)
drives the focus of the bidding strategy from context to users' interest by
computing a bid for each impression in real time. The data mining work and
particularly the bidding strategy development becomes crucial in this
performance-driven business. However, researchers in computational advertising
area have been suffering from lack of publicly available benchmark datasets,
which are essential to compare different algorithms and systems. Fortunately, a
leading Chinese advertising technology company iPinYou decided to release the
dataset used in its global RTB algorithm competition in 2013. The dataset
includes logs of ad auctions, bids, impressions, clicks, and final conversions.
These logs reflect the market environment as well as form a complete path of
users' responses from advertisers' perspective. This dataset directly supports
the experiments of some important research problems such as bid optimisation
and CTR estimation. To the best of our knowledge, this is the first publicly
available dataset on RTB display advertising. Thus, they are valuable for
reproducible research and understanding the whole RTB ecosystem. In this paper,
we first provide the detailed statistical analysis of this dataset. Then we
introduce the research problem of bid optimisation in RTB and the simple yet
comprehensive evaluation protocol. Besides, a series of benchmark experiments
are also conducted, including both click-through rate (CTR) estimation and bid
optimisation.
| [
{
"version": "v1",
"created": "Fri, 25 Jul 2014 23:20:29 GMT"
},
{
"version": "v2",
"created": "Fri, 1 Aug 2014 11:22:17 GMT"
},
{
"version": "v3",
"created": "Thu, 21 May 2015 18:20:30 GMT"
}
] | 2015-05-22T00:00:00 | [
[
"Zhang",
"Weinan",
""
],
[
"Yuan",
"Shuai",
""
],
[
"Wang",
"Jun",
""
],
[
"Shen",
"Xuehua",
""
]
] | TITLE: Real-Time Bidding Benchmarking with iPinYou Dataset
ABSTRACT: Being an emerging paradigm for display advertising, Real-Time Bidding (RTB)
drives the focus of the bidding strategy from context to users' interest by
computing a bid for each impression in real time. The data mining work and
particularly the bidding strategy development becomes crucial in this
performance-driven business. However, researchers in computational advertising
area have been suffering from lack of publicly available benchmark datasets,
which are essential to compare different algorithms and systems. Fortunately, a
leading Chinese advertising technology company iPinYou decided to release the
dataset used in its global RTB algorithm competition in 2013. The dataset
includes logs of ad auctions, bids, impressions, clicks, and final conversions.
These logs reflect the market environment as well as form a complete path of
users' responses from advertisers' perspective. This dataset directly supports
the experiments of some important research problems such as bid optimisation
and CTR estimation. To the best of our knowledge, this is the first publicly
available dataset on RTB display advertising. Thus, they are valuable for
reproducible research and understanding the whole RTB ecosystem. In this paper,
we first provide the detailed statistical analysis of this dataset. Then we
introduce the research problem of bid optimisation in RTB and the simple yet
comprehensive evaluation protocol. Besides, a series of benchmark experiments
are also conducted, including both click-through rate (CTR) estimation and bid
optimisation.
|
1502.01602 | Donn Morrison | V\'aclav Bel\'ak, Afra Mashhadi, Alessandra Sala, Donn Morrison | Phantom cascades: The effect of hidden nodes on information diffusion | Preprint submitted to Elsevier Computer Communications | null | null | null | cs.SI physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Research on information diffusion generally assumes complete knowledge of the
underlying network. However, in the presence of factors such as increasing
privacy awareness, restrictions on application programming interfaces (APIs)
and sampling strategies, this assumption rarely holds in the real world which
in turn leads to an underestimation of the size of information cascades. In
this work we study the effect of hidden network structure on information
diffusion processes. We characterise information cascades through activation
paths traversing visible and hidden parts of the network. We quantify diffusion
estimation error while varying the amount of hidden structure in five empirical
and synthetic network datasets and demonstrate the effect of topological
properties on this error. Finally, we suggest practical recommendations for
practitioners and propose a model to predict the cascade size with minimal
information regarding the underlying network.
| [
{
"version": "v1",
"created": "Thu, 5 Feb 2015 15:13:33 GMT"
},
{
"version": "v2",
"created": "Thu, 21 May 2015 13:34:14 GMT"
}
] | 2015-05-22T00:00:00 | [
[
"Belák",
"Václav",
""
],
[
"Mashhadi",
"Afra",
""
],
[
"Sala",
"Alessandra",
""
],
[
"Morrison",
"Donn",
""
]
] | TITLE: Phantom cascades: The effect of hidden nodes on information diffusion
ABSTRACT: Research on information diffusion generally assumes complete knowledge of the
underlying network. However, in the presence of factors such as increasing
privacy awareness, restrictions on application programming interfaces (APIs)
and sampling strategies, this assumption rarely holds in the real world which
in turn leads to an underestimation of the size of information cascades. In
this work we study the effect of hidden network structure on information
diffusion processes. We characterise information cascades through activation
paths traversing visible and hidden parts of the network. We quantify diffusion
estimation error while varying the amount of hidden structure in five empirical
and synthetic network datasets and demonstrate the effect of topological
properties on this error. Finally, we suggest practical recommendations for
practitioners and propose a model to predict the cascade size with minimal
information regarding the underlying network.
|
1503.00756 | Marco Stronati | Konstantinos Chatzikokolakis, Catuscia Palamidessi, Marco Stronati | Constructing elastic distinguishability metrics for location privacy | null | null | 10.1515/popets-2015-0023 | null | cs.CR | http://creativecommons.org/licenses/by/3.0/ | With the increasing popularity of hand-held devices, location-based
applications and services have access to accurate and real-time location
information, raising serious privacy concerns for their users. The recently
introduced notion of geo-indistinguishability tries to address this problem by
adapting the well-known concept of differential privacy to the area of
location-based systems. Although geo-indistinguishability presents various
appealing aspects, it has the problem of treating space in a uniform way,
imposing the addition of the same amount of noise everywhere on the map. In
this paper we propose a novel elastic distinguishability metric that warps the
geometrical distance, capturing the different degrees of density of each area.
As a consequence, the obtained mechanism adapts the level of noise while
achieving the same degree of privacy everywhere. We also show how such an
elastic metric can easily incorporate the concept of a "geographic fence" that
is commonly employed to protect the highly recurrent locations of a user, such
as his home or work. We perform an extensive evaluation of our technique by
building an elastic metric for Paris' wide metropolitan area, using semantic
information from the OpenStreetMap database. We compare the resulting mechanism
against the Planar Laplace mechanism satisfying standard
geo-indistinguishability, using two real-world datasets from the Gowalla and
Brightkite location-based social networks. The results show that the elastic
mechanism adapts well to the semantics of each area, adjusting the noise as we
move outside the city center, hence offering better overall privacy.
| [
{
"version": "v1",
"created": "Mon, 2 Mar 2015 21:32:11 GMT"
},
{
"version": "v2",
"created": "Thu, 21 May 2015 09:39:47 GMT"
}
] | 2015-05-22T00:00:00 | [
[
"Chatzikokolakis",
"Konstantinos",
""
],
[
"Palamidessi",
"Catuscia",
""
],
[
"Stronati",
"Marco",
""
]
] | TITLE: Constructing elastic distinguishability metrics for location privacy
ABSTRACT: With the increasing popularity of hand-held devices, location-based
applications and services have access to accurate and real-time location
information, raising serious privacy concerns for their users. The recently
introduced notion of geo-indistinguishability tries to address this problem by
adapting the well-known concept of differential privacy to the area of
location-based systems. Although geo-indistinguishability presents various
appealing aspects, it has the problem of treating space in a uniform way,
imposing the addition of the same amount of noise everywhere on the map. In
this paper we propose a novel elastic distinguishability metric that warps the
geometrical distance, capturing the different degrees of density of each area.
As a consequence, the obtained mechanism adapts the level of noise while
achieving the same degree of privacy everywhere. We also show how such an
elastic metric can easily incorporate the concept of a "geographic fence" that
is commonly employed to protect the highly recurrent locations of a user, such
as his home or work. We perform an extensive evaluation of our technique by
building an elastic metric for Paris' wide metropolitan area, using semantic
information from the OpenStreetMap database. We compare the resulting mechanism
against the Planar Laplace mechanism satisfying standard
geo-indistinguishability, using two real-world datasets from the Gowalla and
Brightkite location-based social networks. The results show that the elastic
mechanism adapts well to the semantics of each area, adjusting the noise as we
move outside the city center, hence offering better overall privacy.
|
1505.05641 | Hao Su | Hao Su, Charles R. Qi, Yangyan Li, Leonidas Guibas | Render for CNN: Viewpoint Estimation in Images Using CNNs Trained with
Rendered 3D Model Views | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Object viewpoint estimation from 2D images is an essential task in computer
vision. However, two issues hinder its progress: scarcity of training data with
viewpoint annotations, and a lack of powerful features. Inspired by the growing
availability of 3D models, we propose a framework to address both issues by
combining render-based image synthesis and CNNs. We believe that 3D models have
the potential in generating a large number of images of high variation, which
can be well exploited by deep CNN with a high learning capacity. Towards this
goal, we propose a scalable and overfit-resistant image synthesis pipeline,
together with a novel CNN specifically tailored for the viewpoint estimation
task. Experimentally, we show that the viewpoint estimation from our pipeline
can significantly outperform state-of-the-art methods on PASCAL 3D+ benchmark.
| [
{
"version": "v1",
"created": "Thu, 21 May 2015 08:16:06 GMT"
}
] | 2015-05-22T00:00:00 | [
[
"Su",
"Hao",
""
],
[
"Qi",
"Charles R.",
""
],
[
"Li",
"Yangyan",
""
],
[
"Guibas",
"Leonidas",
""
]
] | TITLE: Render for CNN: Viewpoint Estimation in Images Using CNNs Trained with
Rendered 3D Model Views
ABSTRACT: Object viewpoint estimation from 2D images is an essential task in computer
vision. However, two issues hinder its progress: scarcity of training data with
viewpoint annotations, and a lack of powerful features. Inspired by the growing
availability of 3D models, we propose a framework to address both issues by
combining render-based image synthesis and CNNs. We believe that 3D models have
the potential in generating a large number of images of high variation, which
can be well exploited by deep CNN with a high learning capacity. Towards this
goal, we propose a scalable and overfit-resistant image synthesis pipeline,
together with a novel CNN specifically tailored for the viewpoint estimation
task. Experimentally, we show that the viewpoint estimation from our pipeline
can significantly outperform state-of-the-art methods on PASCAL 3D+ benchmark.
|
1505.05667 | Xipeng Qiu | Chenxi Zhu, Xipeng Qiu, Xinchi Chen, Xuanjing Huang | A Re-ranking Model for Dependency Parser with Recursive Convolutional
Neural Network | null | null | null | null | cs.CL cs.LG cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this work, we address the problem to model all the nodes (words or
phrases) in a dependency tree with the dense representations. We propose a
recursive convolutional neural network (RCNN) architecture to capture syntactic
and compositional-semantic representations of phrases and words in a dependency
tree. Different with the original recursive neural network, we introduce the
convolution and pooling layers, which can model a variety of compositions by
the feature maps and choose the most informative compositions by the pooling
layers. Based on RCNN, we use a discriminative model to re-rank a $k$-best list
of candidate dependency parsing trees. The experiments show that RCNN is very
effective to improve the state-of-the-art dependency parsing on both English
and Chinese datasets.
| [
{
"version": "v1",
"created": "Thu, 21 May 2015 10:23:10 GMT"
}
] | 2015-05-22T00:00:00 | [
[
"Zhu",
"Chenxi",
""
],
[
"Qiu",
"Xipeng",
""
],
[
"Chen",
"Xinchi",
""
],
[
"Huang",
"Xuanjing",
""
]
] | TITLE: A Re-ranking Model for Dependency Parser with Recursive Convolutional
Neural Network
ABSTRACT: In this work, we address the problem to model all the nodes (words or
phrases) in a dependency tree with the dense representations. We propose a
recursive convolutional neural network (RCNN) architecture to capture syntactic
and compositional-semantic representations of phrases and words in a dependency
tree. Different with the original recursive neural network, we introduce the
convolution and pooling layers, which can model a variety of compositions by
the feature maps and choose the most informative compositions by the pooling
layers. Based on RCNN, we use a discriminative model to re-rank a $k$-best list
of candidate dependency parsing trees. The experiments show that RCNN is very
effective to improve the state-of-the-art dependency parsing on both English
and Chinese datasets.
|
1505.05723 | Indre Zliobaite | Indre Zliobaite | On the relation between accuracy and fairness in binary classification | Accepted for presentation to the 2nd workshop on Fairness,
Accountability, and Transparency in Machine Learning (http://www.fatml.org/) | null | null | null | cs.LG cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Our study revisits the problem of accuracy-fairness tradeoff in binary
classification. We argue that comparison of non-discriminatory classifiers
needs to account for different rates of positive predictions, otherwise
conclusions about performance may be misleading, because accuracy and
discrimination of naive baselines on the same dataset vary with different rates
of positive predictions. We provide methodological recommendations for sound
comparison of non-discriminatory classifiers, and present a brief theoretical
and empirical analysis of tradeoffs between accuracy and non-discrimination.
| [
{
"version": "v1",
"created": "Thu, 21 May 2015 13:20:06 GMT"
}
] | 2015-05-22T00:00:00 | [
[
"Zliobaite",
"Indre",
""
]
] | TITLE: On the relation between accuracy and fairness in binary classification
ABSTRACT: Our study revisits the problem of accuracy-fairness tradeoff in binary
classification. We argue that comparison of non-discriminatory classifiers
needs to account for different rates of positive predictions, otherwise
conclusions about performance may be misleading, because accuracy and
discrimination of naive baselines on the same dataset vary with different rates
of positive predictions. We provide methodological recommendations for sound
comparison of non-discriminatory classifiers, and present a brief theoretical
and empirical analysis of tradeoffs between accuracy and non-discrimination.
|
1505.05747 | Franziska Wegner | Thomas Leibfried, Tamara Mchedlidze, Nico Meyer-H\"ubner, Martin
N\"ollenburg, Ignaz Rutter, Peter Sanders, Dorothea Wagner, Franziska Wegner | Operating Power Grids with Few Flow Control Buses | extended version of an ACM e-Energy 2015 poster/workshop paper | null | null | null | cs.SY | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Future power grids will offer enhanced controllability due to the increased
availability of power flow control units (FACTS). As the installation of
control units in the grid is an expensive investment, we are interested in
using few controllers to achieve high controllability. In particular, two
questions arise: How many flow control buses are necessary to obtain globally
optimal power flows? And if fewer flow control buses are available, what can we
achieve with them? Using steady state IEEE benchmark data sets, we explore
experimentally that already a small number of controllers placed at certain
grid buses suffices to achieve globally optimal power flows. We present a
graph-theoretic explanation for this behavior. To answer the second question we
perform a set of experiments that explore the existence and costs of feasible
power flow solutions at increased loads with respect to the number of flow
control buses in the grid. We observe that adding a small number of flow
control buses reduces the flow costs and extends the existence of feasible
solutions at increased load.
| [
{
"version": "v1",
"created": "Thu, 21 May 2015 14:13:11 GMT"
}
] | 2015-05-22T00:00:00 | [
[
"Leibfried",
"Thomas",
""
],
[
"Mchedlidze",
"Tamara",
""
],
[
"Meyer-Hübner",
"Nico",
""
],
[
"Nöllenburg",
"Martin",
""
],
[
"Rutter",
"Ignaz",
""
],
[
"Sanders",
"Peter",
""
],
[
"Wagner",
"Dorothea",
""
],
[
"Wegner",
"Franziska",
""
]
] | TITLE: Operating Power Grids with Few Flow Control Buses
ABSTRACT: Future power grids will offer enhanced controllability due to the increased
availability of power flow control units (FACTS). As the installation of
control units in the grid is an expensive investment, we are interested in
using few controllers to achieve high controllability. In particular, two
questions arise: How many flow control buses are necessary to obtain globally
optimal power flows? And if fewer flow control buses are available, what can we
achieve with them? Using steady state IEEE benchmark data sets, we explore
experimentally that already a small number of controllers placed at certain
grid buses suffices to achieve globally optimal power flows. We present a
graph-theoretic explanation for this behavior. To answer the second question we
perform a set of experiments that explore the existence and costs of feasible
power flow solutions at increased loads with respect to the number of flow
control buses in the grid. We observe that adding a small number of flow
control buses reduces the flow costs and extends the existence of feasible
solutions at increased load.
|
1505.05753 | Mario Fritz | Iaroslav Shcherbatyi, Andreas Bulling, Mario Fritz | GazeDPM: Early Integration of Gaze Information in Deformable Part Models | null | null | null | null | cs.CV cs.HC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | An increasing number of works explore collaborative human-computer systems in
which human gaze is used to enhance computer vision systems. For object
detection these efforts were so far restricted to late integration approaches
that have inherent limitations, such as increased precision without increase in
recall. We propose an early integration approach in a deformable part model,
which constitutes a joint formulation over gaze and visual data. We show that
our GazeDPM method improves over the state-of-the-art DPM baseline by 4% and a
recent method for gaze-supported object detection by 3% on the public POET
dataset. Our approach additionally provides introspection of the learnt models,
can reveal salient image structures, and allows us to investigate the interplay
between gaze attracting and repelling areas, the importance of view-specific
models, as well as viewers' personal biases in gaze patterns. We finally study
important practical aspects of our approach, such as the impact of using
saliency maps instead of real fixations, the impact of the number of fixations,
as well as robustness to gaze estimation error.
| [
{
"version": "v1",
"created": "Thu, 21 May 2015 14:39:51 GMT"
}
] | 2015-05-22T00:00:00 | [
[
"Shcherbatyi",
"Iaroslav",
""
],
[
"Bulling",
"Andreas",
""
],
[
"Fritz",
"Mario",
""
]
] | TITLE: GazeDPM: Early Integration of Gaze Information in Deformable Part Models
ABSTRACT: An increasing number of works explore collaborative human-computer systems in
which human gaze is used to enhance computer vision systems. For object
detection these efforts were so far restricted to late integration approaches
that have inherent limitations, such as increased precision without increase in
recall. We propose an early integration approach in a deformable part model,
which constitutes a joint formulation over gaze and visual data. We show that
our GazeDPM method improves over the state-of-the-art DPM baseline by 4% and a
recent method for gaze-supported object detection by 3% on the public POET
dataset. Our approach additionally provides introspection of the learnt models,
can reveal salient image structures, and allows us to investigate the interplay
between gaze attracting and repelling areas, the importance of view-specific
models, as well as viewers' personal biases in gaze patterns. We finally study
important practical aspects of our approach, such as the impact of using
saliency maps instead of real fixations, the impact of the number of fixations,
as well as robustness to gaze estimation error.
|
1505.05798 | Haitham Bou Ammar PhD | Haitham Bou Ammar, Rasul Tutunov, Eric Eaton | Safe Policy Search for Lifelong Reinforcement Learning with Sublinear
Regret | null | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Lifelong reinforcement learning provides a promising framework for developing
versatile agents that can accumulate knowledge over a lifetime of experience
and rapidly learn new tasks by building upon prior knowledge. However, current
lifelong learning methods exhibit non-vanishing regret as the amount of
experience increases and include limitations that can lead to suboptimal or
unsafe control policies. To address these issues, we develop a lifelong policy
gradient learner that operates in an adversarial set- ting to learn multiple
tasks online while enforcing safety constraints on the learned policies. We
demonstrate, for the first time, sublinear regret for lifelong policy search,
and validate our algorithm on several benchmark dynamical systems and an
application to quadrotor control.
| [
{
"version": "v1",
"created": "Thu, 21 May 2015 17:24:57 GMT"
}
] | 2015-05-22T00:00:00 | [
[
"Ammar",
"Haitham Bou",
""
],
[
"Tutunov",
"Rasul",
""
],
[
"Eaton",
"Eric",
""
]
] | TITLE: Safe Policy Search for Lifelong Reinforcement Learning with Sublinear
Regret
ABSTRACT: Lifelong reinforcement learning provides a promising framework for developing
versatile agents that can accumulate knowledge over a lifetime of experience
and rapidly learn new tasks by building upon prior knowledge. However, current
lifelong learning methods exhibit non-vanishing regret as the amount of
experience increases and include limitations that can lead to suboptimal or
unsafe control policies. To address these issues, we develop a lifelong policy
gradient learner that operates in an adversarial set- ting to learn multiple
tasks online while enforcing safety constraints on the learned policies. We
demonstrate, for the first time, sublinear regret for lifelong policy search,
and validate our algorithm on several benchmark dynamical systems and an
application to quadrotor control.
|
1505.05832 | Vinayak Prabhu | Jyotirmoy V. Deshmukh, Rupak Majumdar, Vinayak S. Prabhu | Quantifying Conformance using the Skorokhod Metric (full version) | Full version of CAV 2015 paper | null | null | null | cs.SY cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The conformance testing problem for dynamical systems asks, given two
dynamical models (e.g., as Simulink diagrams), whether their behaviors are
"close" to each other. In the semi-formal approach to conformance testing, the
two systems are simulated on a large set of tests, and a metric, defined on
pairs of real-valued, real-timed trajectories, is used to determine a lower
bound on the distance. We show how the Skorkhod metric on continuous dynamical
systems can be used as the foundation for conformance testing of complex
dynamical models. The Skorokhod metric allows for both state value mismatches
and timing distortions, and is thus well suited for checking conformance
between idealized models of dynamical systems and their implementations. We
demonstrate the robustness of the system conformance quantification by proving
a \emph{transference theorem}: trajectories close under the Skorokhod metric
satisfy "close" logical properties. Specifically, we show the result for the
timed linear time logic \TLTL augmented with a rich class of temporal and
spatial constraint predicates. We provide a window-based streaming algorithm to
compute the Skorokhod metric, and use it as a basis for a conformance testing
tool for Simulink. We experimentally demonstrate the effectiveness of our tool
in finding discrepant behaviors on a set of control system benchmarks,
including an industrial challenge problem.
| [
{
"version": "v1",
"created": "Thu, 21 May 2015 18:42:33 GMT"
}
] | 2015-05-22T00:00:00 | [
[
"Deshmukh",
"Jyotirmoy V.",
""
],
[
"Majumdar",
"Rupak",
""
],
[
"Prabhu",
"Vinayak S.",
""
]
] | TITLE: Quantifying Conformance using the Skorokhod Metric (full version)
ABSTRACT: The conformance testing problem for dynamical systems asks, given two
dynamical models (e.g., as Simulink diagrams), whether their behaviors are
"close" to each other. In the semi-formal approach to conformance testing, the
two systems are simulated on a large set of tests, and a metric, defined on
pairs of real-valued, real-timed trajectories, is used to determine a lower
bound on the distance. We show how the Skorkhod metric on continuous dynamical
systems can be used as the foundation for conformance testing of complex
dynamical models. The Skorokhod metric allows for both state value mismatches
and timing distortions, and is thus well suited for checking conformance
between idealized models of dynamical systems and their implementations. We
demonstrate the robustness of the system conformance quantification by proving
a \emph{transference theorem}: trajectories close under the Skorokhod metric
satisfy "close" logical properties. Specifically, we show the result for the
timed linear time logic \TLTL augmented with a rich class of temporal and
spatial constraint predicates. We provide a window-based streaming algorithm to
compute the Skorokhod metric, and use it as a basis for a conformance testing
tool for Simulink. We experimentally demonstrate the effectiveness of our tool
in finding discrepant behaviors on a set of control system benchmarks,
including an industrial challenge problem.
|
1505.05868 | Arjun Radhakrishna | Rajeev Alur, Pavol Cerny, Arjun Radhakrishna | Synthesis through Unification | null | null | null | null | cs.PL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Given a specification and a set of candidate programs (program space), the
program synthesis problem is to find a candidate program that satisfies the
specification. We present the synthesis through unification (STUN) approach,
which is an extension of the counter-example guided inductive synthesis (CEGIS)
approach. In CEGIS, the synthesizer maintains a subset S of inputs and a
candidate program Prog that is correct for S. The synthesizer repeatedly checks
if there exists a counter-example input c such that the execution of Prog is
incorrect on c. If so, the synthesizer enlarges S to include c, and picks a
program from the program space that is correct for the new set S.
The STUN approach extends CEGIS with the idea that given a program Prog that
is correct for a subset of inputs, the synthesizer can try to find a program
Prog' that is correct for the rest of the inputs. If Prog and Prog' can be
unified into a program in the program space, then a solution has been found. We
present a generic synthesis procedure based on the STUN approach and specialize
it for three different domains by providing the appropriate unification
operators. We implemented these specializations in prototype tools, and we show
that our tools often per- forms significantly better on standard benchmarks
than a tool based on a pure CEGIS approach.
| [
{
"version": "v1",
"created": "Thu, 21 May 2015 19:58:46 GMT"
}
] | 2015-05-22T00:00:00 | [
[
"Alur",
"Rajeev",
""
],
[
"Cerny",
"Pavol",
""
],
[
"Radhakrishna",
"Arjun",
""
]
] | TITLE: Synthesis through Unification
ABSTRACT: Given a specification and a set of candidate programs (program space), the
program synthesis problem is to find a candidate program that satisfies the
specification. We present the synthesis through unification (STUN) approach,
which is an extension of the counter-example guided inductive synthesis (CEGIS)
approach. In CEGIS, the synthesizer maintains a subset S of inputs and a
candidate program Prog that is correct for S. The synthesizer repeatedly checks
if there exists a counter-example input c such that the execution of Prog is
incorrect on c. If so, the synthesizer enlarges S to include c, and picks a
program from the program space that is correct for the new set S.
The STUN approach extends CEGIS with the idea that given a program Prog that
is correct for a subset of inputs, the synthesizer can try to find a program
Prog' that is correct for the rest of the inputs. If Prog and Prog' can be
unified into a program in the program space, then a solution has been found. We
present a generic synthesis procedure based on the STUN approach and specialize
it for three different domains by providing the appropriate unification
operators. We implemented these specializations in prototype tools, and we show
that our tools often per- forms significantly better on standard benchmarks
than a tool based on a pure CEGIS approach.
|
1409.4450 | Giovanni Luca Ciampaglia | Giovanni Luca Ciampaglia, Alessandro Flammini, Filippo Menczer | The production of information in the attention economy | 14 pages, 3 figures, 1 table | null | 10.1038/srep09452 | Giovanni Luca Ciampaglia, Alessandro Flammini & Filippo Menczer
Scientific Reports 5, Article number: 9452 (2015) | physics.soc-ph cs.SI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Online traces of human activity offer novel opportunities to study the
dynamics of complex knowledge exchange networks, and in particular how the
relationship between demand and supply of information is mediated by
competition for our limited individual attention. The emergent patterns of
collective attention determine what new information is generated and consumed.
Can we measure the relationship between demand and supply for new information
about a topic? Here we propose a normalization method to compare attention
bursts statistics across topics that have an heterogeneous distribution of
attention. Through analysis of a massive dataset on traffic to Wikipedia, we
find that the production of new knowledge is associated to significant shifts
of collective attention, which we take as a proxy for its demand. What we
observe is consistent with a scenario in which the allocation of attention
toward a topic stimulates the demand for information about it, and in turn the
supply of further novel information. Our attempt to quantify demand and supply
of information, and our finding about their temporal ordering, may lead to the
development of the fundamental laws of the attention economy, and a better
understanding of the social exchange of knowledge in online and offline
information networks.
| [
{
"version": "v1",
"created": "Mon, 15 Sep 2014 21:13:35 GMT"
}
] | 2015-05-21T00:00:00 | [
[
"Ciampaglia",
"Giovanni Luca",
""
],
[
"Flammini",
"Alessandro",
""
],
[
"Menczer",
"Filippo",
""
]
] | TITLE: The production of information in the attention economy
ABSTRACT: Online traces of human activity offer novel opportunities to study the
dynamics of complex knowledge exchange networks, and in particular how the
relationship between demand and supply of information is mediated by
competition for our limited individual attention. The emergent patterns of
collective attention determine what new information is generated and consumed.
Can we measure the relationship between demand and supply for new information
about a topic? Here we propose a normalization method to compare attention
bursts statistics across topics that have an heterogeneous distribution of
attention. Through analysis of a massive dataset on traffic to Wikipedia, we
find that the production of new knowledge is associated to significant shifts
of collective attention, which we take as a proxy for its demand. What we
observe is consistent with a scenario in which the allocation of attention
toward a topic stimulates the demand for information about it, and in turn the
supply of further novel information. Our attempt to quantify demand and supply
of information, and our finding about their temporal ordering, may lead to the
development of the fundamental laws of the attention economy, and a better
understanding of the social exchange of knowledge in online and offline
information networks.
|
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.