id
large_stringlengths 9
16
| submitter
large_stringlengths 3
64
⌀ | authors
large_stringlengths 5
20.7k
| title
large_stringlengths 5
245
| comments
large_stringlengths 1
482
⌀ | journal-ref
large_stringlengths 4
382
⌀ | doi
large_stringlengths 9
151
⌀ | report-no
large_stringlengths 2
509
⌀ | categories
large_stringlengths 5
78
| license
large_stringclasses 9
values | abstract
large_stringlengths 83
3.55k
| versions
large listlengths 1
21
| update_date
timestamp[ms]date 2007-05-23 00:00:00
2025-04-25 00:00:00
| authors_parsed
large listlengths 1
1.35k
| prompt
large_stringlengths 166
3.64k
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1502.04623 | Ivo Danihelka | Karol Gregor, Ivo Danihelka, Alex Graves, Danilo Jimenez Rezende, Daan
Wierstra | DRAW: A Recurrent Neural Network For Image Generation | null | null | null | null | cs.CV cs.LG cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper introduces the Deep Recurrent Attentive Writer (DRAW) neural
network architecture for image generation. DRAW networks combine a novel
spatial attention mechanism that mimics the foveation of the human eye, with a
sequential variational auto-encoding framework that allows for the iterative
construction of complex images. The system substantially improves on the state
of the art for generative models on MNIST, and, when trained on the Street View
House Numbers dataset, it generates images that cannot be distinguished from
real data with the naked eye.
| [
{
"version": "v1",
"created": "Mon, 16 Feb 2015 16:48:56 GMT"
},
{
"version": "v2",
"created": "Wed, 20 May 2015 15:29:42 GMT"
}
] | 2015-05-21T00:00:00 | [
[
"Gregor",
"Karol",
""
],
[
"Danihelka",
"Ivo",
""
],
[
"Graves",
"Alex",
""
],
[
"Rezende",
"Danilo Jimenez",
""
],
[
"Wierstra",
"Daan",
""
]
] | TITLE: DRAW: A Recurrent Neural Network For Image Generation
ABSTRACT: This paper introduces the Deep Recurrent Attentive Writer (DRAW) neural
network architecture for image generation. DRAW networks combine a novel
spatial attention mechanism that mimics the foveation of the human eye, with a
sequential variational auto-encoding framework that allows for the iterative
construction of complex images. The system substantially improves on the state
of the art for generative models on MNIST, and, when trained on the Street View
House Numbers dataset, it generates images that cannot be distinguished from
real data with the naked eye.
|
1504.06755 | Pingmei Xu | Pingmei Xu, Krista A Ehinger, Yinda Zhang, Adam Finkelstein, Sanjeev
R. Kulkarni, Jianxiong Xiao | TurkerGaze: Crowdsourcing Saliency with Webcam based Eye Tracking | 9 pages, 14 figures | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Traditional eye tracking requires specialized hardware, which means
collecting gaze data from many observers is expensive, tedious and slow.
Therefore, existing saliency prediction datasets are order-of-magnitudes
smaller than typical datasets for other vision recognition tasks. The small
size of these datasets limits the potential for training data intensive
algorithms, and causes overfitting in benchmark evaluation. To address this
deficiency, this paper introduces a webcam-based gaze tracking system that
supports large-scale, crowdsourced eye tracking deployed on Amazon Mechanical
Turk (AMTurk). By a combination of careful algorithm and gaming protocol
design, our system obtains eye tracking data for saliency prediction comparable
to data gathered in a traditional lab setting, with relatively lower cost and
less effort on the part of the researchers. Using this tool, we build a
saliency dataset for a large number of natural images. We will open-source our
tool and provide a web server where researchers can upload their images to get
eye tracking results from AMTurk.
| [
{
"version": "v1",
"created": "Sat, 25 Apr 2015 19:26:47 GMT"
},
{
"version": "v2",
"created": "Wed, 20 May 2015 18:51:23 GMT"
}
] | 2015-05-21T00:00:00 | [
[
"Xu",
"Pingmei",
""
],
[
"Ehinger",
"Krista A",
""
],
[
"Zhang",
"Yinda",
""
],
[
"Finkelstein",
"Adam",
""
],
[
"Kulkarni",
"Sanjeev R.",
""
],
[
"Xiao",
"Jianxiong",
""
]
] | TITLE: TurkerGaze: Crowdsourcing Saliency with Webcam based Eye Tracking
ABSTRACT: Traditional eye tracking requires specialized hardware, which means
collecting gaze data from many observers is expensive, tedious and slow.
Therefore, existing saliency prediction datasets are order-of-magnitudes
smaller than typical datasets for other vision recognition tasks. The small
size of these datasets limits the potential for training data intensive
algorithms, and causes overfitting in benchmark evaluation. To address this
deficiency, this paper introduces a webcam-based gaze tracking system that
supports large-scale, crowdsourced eye tracking deployed on Amazon Mechanical
Turk (AMTurk). By a combination of careful algorithm and gaming protocol
design, our system obtains eye tracking data for saliency prediction comparable
to data gathered in a traditional lab setting, with relatively lower cost and
less effort on the part of the researchers. Using this tool, we build a
saliency dataset for a large number of natural images. We will open-source our
tool and provide a web server where researchers can upload their images to get
eye tracking results from AMTurk.
|
1505.05208 | Raajen Patel | Raajen Patel, Thomas A. Goldstein, Eva L. Dyer, Azalia Mirhoseini, and
Richard G. Baraniuk | oASIS: Adaptive Column Sampling for Kernel Matrix Approximation | null | null | null | null | stat.ML cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Kernel matrices (e.g. Gram or similarity matrices) are essential for many
state-of-the-art approaches to classification, clustering, and dimensionality
reduction. For large datasets, the cost of forming and factoring such kernel
matrices becomes intractable. To address this challenge, we introduce a new
adaptive sampling algorithm called Accelerated Sequential Incoherence Selection
(oASIS) that samples columns without explicitly computing the entire kernel
matrix. We provide conditions under which oASIS is guaranteed to exactly
recover the kernel matrix with an optimal number of columns selected. Numerical
experiments on both synthetic and real-world datasets demonstrate that oASIS
achieves performance comparable to state-of-the-art adaptive sampling methods
at a fraction of the computational cost. The low runtime complexity of oASIS
and its low memory footprint enable the solution of large problems that are
simply intractable using other adaptive methods.
| [
{
"version": "v1",
"created": "Tue, 19 May 2015 23:12:01 GMT"
}
] | 2015-05-21T00:00:00 | [
[
"Patel",
"Raajen",
""
],
[
"Goldstein",
"Thomas A.",
""
],
[
"Dyer",
"Eva L.",
""
],
[
"Mirhoseini",
"Azalia",
""
],
[
"Baraniuk",
"Richard G.",
""
]
] | TITLE: oASIS: Adaptive Column Sampling for Kernel Matrix Approximation
ABSTRACT: Kernel matrices (e.g. Gram or similarity matrices) are essential for many
state-of-the-art approaches to classification, clustering, and dimensionality
reduction. For large datasets, the cost of forming and factoring such kernel
matrices becomes intractable. To address this challenge, we introduce a new
adaptive sampling algorithm called Accelerated Sequential Incoherence Selection
(oASIS) that samples columns without explicitly computing the entire kernel
matrix. We provide conditions under which oASIS is guaranteed to exactly
recover the kernel matrix with an optimal number of columns selected. Numerical
experiments on both synthetic and real-world datasets demonstrate that oASIS
achieves performance comparable to state-of-the-art adaptive sampling methods
at a fraction of the computational cost. The low runtime complexity of oASIS
and its low memory footprint enable the solution of large problems that are
simply intractable using other adaptive methods.
|
1505.05211 | Souvik Bhattacherjee | Souvik Bhattacherjee and Amit Chavan and Silu Huang and Amol Deshpande
and Aditya Parameswaran | Principles of Dataset Versioning: Exploring the Recreation/Storage
Tradeoff | null | null | null | null | cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The relative ease of collaborative data science and analysis has led to a
proliferation of many thousands or millions of $versions$ of the same datasets
in many scientific and commercial domains, acquired or constructed at various
stages of data analysis across many users, and often over long periods of time.
Managing, storing, and recreating these dataset versions is a non-trivial task.
The fundamental challenge here is the $storage-recreation\;trade-off$: the more
storage we use, the faster it is to recreate or retrieve versions, while the
less storage we use, the slower it is to recreate or retrieve versions. Despite
the fundamental nature of this problem, there has been a surprisingly little
amount of work on it. In this paper, we study this trade-off in a principled
manner: we formulate six problems under various settings, trading off these
quantities in various ways, demonstrate that most of the problems are
intractable, and propose a suite of inexpensive heuristics drawing from
techniques in delay-constrained scheduling, and spanning tree literature, to
solve these problems. We have built a prototype version management system, that
aims to serve as a foundation to our DATAHUB system for facilitating
collaborative data science. We demonstrate, via extensive experiments, that our
proposed heuristics provide efficient solutions in practical dataset versioning
scenarios.
| [
{
"version": "v1",
"created": "Tue, 19 May 2015 23:45:05 GMT"
}
] | 2015-05-21T00:00:00 | [
[
"Bhattacherjee",
"Souvik",
""
],
[
"Chavan",
"Amit",
""
],
[
"Huang",
"Silu",
""
],
[
"Deshpande",
"Amol",
""
],
[
"Parameswaran",
"Aditya",
""
]
] | TITLE: Principles of Dataset Versioning: Exploring the Recreation/Storage
Tradeoff
ABSTRACT: The relative ease of collaborative data science and analysis has led to a
proliferation of many thousands or millions of $versions$ of the same datasets
in many scientific and commercial domains, acquired or constructed at various
stages of data analysis across many users, and often over long periods of time.
Managing, storing, and recreating these dataset versions is a non-trivial task.
The fundamental challenge here is the $storage-recreation\;trade-off$: the more
storage we use, the faster it is to recreate or retrieve versions, while the
less storage we use, the slower it is to recreate or retrieve versions. Despite
the fundamental nature of this problem, there has been a surprisingly little
amount of work on it. In this paper, we study this trade-off in a principled
manner: we formulate six problems under various settings, trading off these
quantities in various ways, demonstrate that most of the problems are
intractable, and propose a suite of inexpensive heuristics drawing from
techniques in delay-constrained scheduling, and spanning tree literature, to
solve these problems. We have built a prototype version management system, that
aims to serve as a foundation to our DATAHUB system for facilitating
collaborative data science. We demonstrate, via extensive experiments, that our
proposed heuristics provide efficient solutions in practical dataset versioning
scenarios.
|
1505.05225 | Lihua Guo | Guo Lihua, Li Fudi | Image aesthetic evaluation using paralleled deep convolution neural
network | 7 pages, 6 figures, 9 tables | null | null | null | cs.CV cs.MM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Image aesthetic evaluation has attracted much attention in recent years.
Image aesthetic evaluation methods heavily depend on the effective aesthetic
feature. Traditional meth-ods always extract hand-crafted features. However,
these hand-crafted features are always designed to adapt particu-lar datasets,
and extraction of them needs special design. Rather than extracting
hand-crafted features, an automati-cally learn of aesthetic features based on
deep convolutional neural network (DCNN) is first adopt in this paper. As we
all know, when the training dataset is given, the DCNN architecture with high
complexity may meet the over-fitting problem. On the other side, the DCNN
architecture with low complexity would not efficiently extract effective
features. For these reasons, we further propose a paralleled convolutional
neural network (PDCNN) with multi-level structures to automatically adapt to
the training dataset. Experimental results show that our proposed PDCNN
architecture achieves better performance than other traditional methods.
| [
{
"version": "v1",
"created": "Wed, 20 May 2015 02:03:23 GMT"
}
] | 2015-05-21T00:00:00 | [
[
"Lihua",
"Guo",
""
],
[
"Fudi",
"Li",
""
]
] | TITLE: Image aesthetic evaluation using paralleled deep convolution neural
network
ABSTRACT: Image aesthetic evaluation has attracted much attention in recent years.
Image aesthetic evaluation methods heavily depend on the effective aesthetic
feature. Traditional meth-ods always extract hand-crafted features. However,
these hand-crafted features are always designed to adapt particu-lar datasets,
and extraction of them needs special design. Rather than extracting
hand-crafted features, an automati-cally learn of aesthetic features based on
deep convolutional neural network (DCNN) is first adopt in this paper. As we
all know, when the training dataset is given, the DCNN architecture with high
complexity may meet the over-fitting problem. On the other side, the DCNN
architecture with low complexity would not efficiently extract effective
features. For these reasons, we further propose a paralleled convolutional
neural network (PDCNN) with multi-level structures to automatically adapt to
the training dataset. Experimental results show that our proposed PDCNN
architecture achieves better performance than other traditional methods.
|
1505.05232 | Songfan Yang | Songfan Yang, Deva Ramanan | Multi-scale recognition with DAG-CNNs | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We explore multi-scale convolutional neural nets (CNNs) for image
classification. Contemporary approaches extract features from a single output
layer. By extracting features from multiple layers, one can simultaneously
reason about high, mid, and low-level features during classification. The
resulting multi-scale architecture can itself be seen as a feed-forward model
that is structured as a directed acyclic graph (DAG-CNNs). We use DAG-CNNs to
learn a set of multiscale features that can be effectively shared between
coarse and fine-grained classification tasks. While fine-tuning such models
helps performance, we show that even "off-the-self" multiscale features perform
quite well. We present extensive analysis and demonstrate state-of-the-art
classification performance on three standard scene benchmarks (SUN397, MIT67,
and Scene15). In terms of the heavily benchmarked MIT67 and Scene15 datasets,
our results reduce the lowest previously-reported error by 23.9% and 9.5%,
respectively.
| [
{
"version": "v1",
"created": "Wed, 20 May 2015 02:52:07 GMT"
}
] | 2015-05-21T00:00:00 | [
[
"Yang",
"Songfan",
""
],
[
"Ramanan",
"Deva",
""
]
] | TITLE: Multi-scale recognition with DAG-CNNs
ABSTRACT: We explore multi-scale convolutional neural nets (CNNs) for image
classification. Contemporary approaches extract features from a single output
layer. By extracting features from multiple layers, one can simultaneously
reason about high, mid, and low-level features during classification. The
resulting multi-scale architecture can itself be seen as a feed-forward model
that is structured as a directed acyclic graph (DAG-CNNs). We use DAG-CNNs to
learn a set of multiscale features that can be effectively shared between
coarse and fine-grained classification tasks. While fine-tuning such models
helps performance, we show that even "off-the-self" multiscale features perform
quite well. We present extensive analysis and demonstrate state-of-the-art
classification performance on three standard scene benchmarks (SUN397, MIT67,
and Scene15). In terms of the heavily benchmarked MIT67 and Scene15 datasets,
our results reduce the lowest previously-reported error by 23.9% and 9.5%,
respectively.
|
1505.05322 | Ai Munandar Tb | Azhari SN and Tb. Ai Munandar | Unsupervised Neural Network-Naive Bayes Model for Grouping Data Regional
Development Results | 6 pages | International Journal of Computer Applications, Volume 104, No 15,
October 2014 | null | null | cs.CY | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Determination quadrant development has an important role in order to
determine the achievement of the development of a district, in terms of the
sector's gross regional domestic product (GDP). The process of determining the
quadrant development typically uses Klassen rules based on its sector GDP. This
study aims to provide a new approach in the conduct of regional development
quadrant clustering using cluster techniques. Clustering is performed based on
the average value of the growth and development of a district contribution
compared with the average value and contribution of the development of the
province based on data in comparison with a year of data to be compared.
Testing models of clustering, performed on a dataset of two provinces, namely
Banten (as a data testing) and Central Java (as the training data), to see the
accuracy of the classification model proposed. The proposed model consists of
two learning methods in it, namely unsupervised (Self Organizing Map / SOM-NN)
method and supervised (Naive Bayess). SOM-NN method is used as a learning
engine to generate training data for the target Class that will be used in the
machine learning Naive Bayess. The results showed the clustering accuracy rate
of the model was 98.1%, while the clustering accuracy rate of the model results
compared to manual analysis shows the accuracy of the typology Klassen smaller,
ie 29.63%. On one side, clustering results of the proposed model is influenced
by the number and keagaraman data sets used.
| [
{
"version": "v1",
"created": "Wed, 20 May 2015 11:22:18 GMT"
}
] | 2015-05-21T00:00:00 | [
[
"SN",
"Azhari",
""
],
[
"Munandar",
"Tb. Ai",
""
]
] | TITLE: Unsupervised Neural Network-Naive Bayes Model for Grouping Data Regional
Development Results
ABSTRACT: Determination quadrant development has an important role in order to
determine the achievement of the development of a district, in terms of the
sector's gross regional domestic product (GDP). The process of determining the
quadrant development typically uses Klassen rules based on its sector GDP. This
study aims to provide a new approach in the conduct of regional development
quadrant clustering using cluster techniques. Clustering is performed based on
the average value of the growth and development of a district contribution
compared with the average value and contribution of the development of the
province based on data in comparison with a year of data to be compared.
Testing models of clustering, performed on a dataset of two provinces, namely
Banten (as a data testing) and Central Java (as the training data), to see the
accuracy of the classification model proposed. The proposed model consists of
two learning methods in it, namely unsupervised (Self Organizing Map / SOM-NN)
method and supervised (Naive Bayess). SOM-NN method is used as a learning
engine to generate training data for the target Class that will be used in the
machine learning Naive Bayess. The results showed the clustering accuracy rate
of the model was 98.1%, while the clustering accuracy rate of the model results
compared to manual analysis shows the accuracy of the typology Klassen smaller,
ie 29.63%. On one side, clustering results of the proposed model is influenced
by the number and keagaraman data sets used.
|
1505.05338 | Poorna Dasgupta | Poorna Banerjee Dasgupta | Algorithmic Analysis of Edge Ranking and Profiling for MTF Determination
of an Imaging System | 3 pages, Published with International Journal of Computer Trends and
Technology (IJCTT), Volume-23 Number-1, 2015 | International Journal of Computer Trends and Technology (IJCTT)
V23(1):46-48, May 2015 | 10.14445/22312803/IJCTT-V23P110 | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Edge detection is one of the most principal techniques for detecting
discontinuities in the gray levels of image pixels. The Modulation Transfer
Function (MTF) is one of the main criteria for assessing imaging quality and is
a parameter frequently used for measuring the sharpness of an imaging system.
In order to determine the MTF, it is essential to determine the best edge from
the target image so that an edge profile can be developed and then the line
spread function and hence the MTF, can be computed accordingly. For regular
image sizes, the human visual system is adept enough to identify suitable edges
from the image. But considering huge image datasets, such as those obtained
from satellites, the image size may range in few gigabytes and in such a case,
manual inspection of images for determination of the best suitable edge is not
plausible and hence, edge profiling tasks have to be automated. This paper
presents a novel, yet simple, algorithm for edge ranking and detection from
image data-sets for MTF computation, which is ideal for automation on
vectorised graphical processing units.
| [
{
"version": "v1",
"created": "Wed, 20 May 2015 12:12:48 GMT"
}
] | 2015-05-21T00:00:00 | [
[
"Dasgupta",
"Poorna Banerjee",
""
]
] | TITLE: Algorithmic Analysis of Edge Ranking and Profiling for MTF Determination
of an Imaging System
ABSTRACT: Edge detection is one of the most principal techniques for detecting
discontinuities in the gray levels of image pixels. The Modulation Transfer
Function (MTF) is one of the main criteria for assessing imaging quality and is
a parameter frequently used for measuring the sharpness of an imaging system.
In order to determine the MTF, it is essential to determine the best edge from
the target image so that an edge profile can be developed and then the line
spread function and hence the MTF, can be computed accordingly. For regular
image sizes, the human visual system is adept enough to identify suitable edges
from the image. But considering huge image datasets, such as those obtained
from satellites, the image size may range in few gigabytes and in such a case,
manual inspection of images for determination of the best suitable edge is not
plausible and hence, edge profiling tasks have to be automated. This paper
presents a novel, yet simple, algorithm for edge ranking and detection from
image data-sets for MTF computation, which is ideal for automation on
vectorised graphical processing units.
|
1505.05354 | Lianwen Jin | Weixin Yang, Lianwen Jin, Dacheng Tao, Zecheng Xie, Ziyong Feng | DropSample: A New Training Method to Enhance Deep Convolutional Neural
Networks for Large-Scale Unconstrained Handwritten Chinese Character
Recognition | 18 pages, 8 figures, 5 tables | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Inspired by the theory of Leitners learning box from the field of psychology,
we propose DropSample, a new method for training deep convolutional neural
networks (DCNNs), and apply it to large-scale online handwritten Chinese
character recognition (HCCR). According to the principle of DropSample, each
training sample is associated with a quota function that is dynamically
adjusted on the basis of the classification confidence given by the DCNN
softmax output. After a learning iteration, samples with low confidence will
have a higher probability of being selected as training data in the next
iteration; in contrast, well-trained and well-recognized samples with very high
confidence will have a lower probability of being involved in the next training
iteration and can be gradually eliminated. As a result, the learning process
becomes more efficient as it progresses. Furthermore, we investigate the use of
domain-specific knowledge to enhance the performance of DCNN by adding a domain
knowledge layer before the traditional CNN. By adopting DropSample together
with different types of domain-specific knowledge, the accuracy of HCCR can be
improved efficiently. Experiments on the CASIA-OLHDWB 1.0, CASIA-OLHWDB 1.1,
and ICDAR 2013 online HCCR competition datasets yield outstanding recognition
rates of 97.33%, 97.06%, and 97.51% respectively, all of which are
significantly better than the previous best results reported in the literature.
| [
{
"version": "v1",
"created": "Wed, 20 May 2015 13:08:57 GMT"
}
] | 2015-05-21T00:00:00 | [
[
"Yang",
"Weixin",
""
],
[
"Jin",
"Lianwen",
""
],
[
"Tao",
"Dacheng",
""
],
[
"Xie",
"Zecheng",
""
],
[
"Feng",
"Ziyong",
""
]
] | TITLE: DropSample: A New Training Method to Enhance Deep Convolutional Neural
Networks for Large-Scale Unconstrained Handwritten Chinese Character
Recognition
ABSTRACT: Inspired by the theory of Leitners learning box from the field of psychology,
we propose DropSample, a new method for training deep convolutional neural
networks (DCNNs), and apply it to large-scale online handwritten Chinese
character recognition (HCCR). According to the principle of DropSample, each
training sample is associated with a quota function that is dynamically
adjusted on the basis of the classification confidence given by the DCNN
softmax output. After a learning iteration, samples with low confidence will
have a higher probability of being selected as training data in the next
iteration; in contrast, well-trained and well-recognized samples with very high
confidence will have a lower probability of being involved in the next training
iteration and can be gradually eliminated. As a result, the learning process
becomes more efficient as it progresses. Furthermore, we investigate the use of
domain-specific knowledge to enhance the performance of DCNN by adding a domain
knowledge layer before the traditional CNN. By adopting DropSample together
with different types of domain-specific knowledge, the accuracy of HCCR can be
improved efficiently. Experiments on the CASIA-OLHDWB 1.0, CASIA-OLHWDB 1.1,
and ICDAR 2013 online HCCR competition datasets yield outstanding recognition
rates of 97.33%, 97.06%, and 97.51% respectively, all of which are
significantly better than the previous best results reported in the literature.
|
1010.1015 | Keith Wiley | Keith Wiley, Andrew Connolly, Jeff Gardner, Simon Krughof, Magdalena
Balazinska, Bill Howe, YongChul Kwon and YingYi Bu | Astronomy in the Cloud: Using MapReduce for Image Coaddition | 31 pages, 11 figures, 2 tables | null | 10.1086/658877 | null | cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In the coming decade, astronomical surveys of the sky will generate tens of
terabytes of images and detect hundreds of millions of sources every night. The
study of these sources will involve computation challenges such as anomaly
detection and classification, and moving object tracking. Since such studies
benefit from the highest quality data, methods such as image coaddition
(stacking) will be a critical preprocessing step prior to scientific
investigation. With a requirement that these images be analyzed on a nightly
basis to identify moving sources or transient objects, these data streams
present many computational challenges. Given the quantity of data involved, the
computational load of these problems can only be addressed by distributing the
workload over a large number of nodes. However, the high data throughput
demanded by these applications may present scalability challenges for certain
storage architectures. One scalable data-processing method that has emerged in
recent years is MapReduce, and in this paper we focus on its popular
open-source implementation called Hadoop. In the Hadoop framework, the data is
partitioned among storage attached directly to worker nodes, and the processing
workload is scheduled in parallel on the nodes that contain the required input
data. A further motivation for using Hadoop is that it allows us to exploit
cloud computing resources, e.g., Amazon's EC2. We report on our experience
implementing a scalable image-processing pipeline for the SDSS imaging database
using Hadoop. This multi-terabyte imaging dataset provides a good testbed for
algorithm development since its scope and structure approximate future surveys.
First, we describe MapReduce and how we adapted image coaddition to the
MapReduce framework. Then we describe a number of optimizations to our basic
approach and report experimental results comparing their performance.
| [
{
"version": "v1",
"created": "Tue, 5 Oct 2010 20:35:53 GMT"
}
] | 2015-05-20T00:00:00 | [
[
"Wiley",
"Keith",
""
],
[
"Connolly",
"Andrew",
""
],
[
"Gardner",
"Jeff",
""
],
[
"Krughof",
"Simon",
""
],
[
"Balazinska",
"Magdalena",
""
],
[
"Howe",
"Bill",
""
],
[
"Kwon",
"YongChul",
""
],
[
"Bu",
"YingYi",
""
]
] | TITLE: Astronomy in the Cloud: Using MapReduce for Image Coaddition
ABSTRACT: In the coming decade, astronomical surveys of the sky will generate tens of
terabytes of images and detect hundreds of millions of sources every night. The
study of these sources will involve computation challenges such as anomaly
detection and classification, and moving object tracking. Since such studies
benefit from the highest quality data, methods such as image coaddition
(stacking) will be a critical preprocessing step prior to scientific
investigation. With a requirement that these images be analyzed on a nightly
basis to identify moving sources or transient objects, these data streams
present many computational challenges. Given the quantity of data involved, the
computational load of these problems can only be addressed by distributing the
workload over a large number of nodes. However, the high data throughput
demanded by these applications may present scalability challenges for certain
storage architectures. One scalable data-processing method that has emerged in
recent years is MapReduce, and in this paper we focus on its popular
open-source implementation called Hadoop. In the Hadoop framework, the data is
partitioned among storage attached directly to worker nodes, and the processing
workload is scheduled in parallel on the nodes that contain the required input
data. A further motivation for using Hadoop is that it allows us to exploit
cloud computing resources, e.g., Amazon's EC2. We report on our experience
implementing a scalable image-processing pipeline for the SDSS imaging database
using Hadoop. This multi-terabyte imaging dataset provides a good testbed for
algorithm development since its scope and structure approximate future surveys.
First, we describe MapReduce and how we adapted image coaddition to the
MapReduce framework. Then we describe a number of optimizations to our basic
approach and report experimental results comparing their performance.
|
1011.6268 | Marija Mitrovic | Marija Mitrovi\'c, Georgios Paltoglou and Bosiljka Tadi\'c | Quantitative Analysis of Bloggers Collective Behavior Powered by
Emotions | null | null | 10.1088/1742-5468/2011/02/P02005 | 0143821 | physics.soc-ph cond-mat.stat-mech cs.SI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Large-scale data resulting from users online interactions provide the
ultimate source of information to study emergent social phenomena on the Web.
From individual actions of users to observable collective behaviors, different
mechanisms involving emotions expressed in the posted text play a role. Here we
combine approaches of statistical physics with machine-learning methods of text
analysis to study emergence of the emotional behavior among Web users. Mapping
the high-resolution data from digg.com onto bipartite network of users and
their comments onto posted stories, we identify user communities centered
around certain popular posts and determine emotional contents of the related
comments by the emotion-classifier developed for this type of texts. Applied
over different time periods, this framework reveals strong correlations between
the excess of negative emotions and the evolution of communities. We observe
avalanches of emotional comments exhibiting significant self-organized critical
behavior and temporal correlations. To explore robustness of these critical
states, we design a network automaton model on realistic network connections
and several control parameters, which can be inferred from the dataset.
Dissemination of emotions by a small fraction of very active users appears to
critically tune the collective states.
| [
{
"version": "v1",
"created": "Mon, 29 Nov 2010 15:36:39 GMT"
}
] | 2015-05-20T00:00:00 | [
[
"Mitrović",
"Marija",
""
],
[
"Paltoglou",
"Georgios",
""
],
[
"Tadić",
"Bosiljka",
""
]
] | TITLE: Quantitative Analysis of Bloggers Collective Behavior Powered by
Emotions
ABSTRACT: Large-scale data resulting from users online interactions provide the
ultimate source of information to study emergent social phenomena on the Web.
From individual actions of users to observable collective behaviors, different
mechanisms involving emotions expressed in the posted text play a role. Here we
combine approaches of statistical physics with machine-learning methods of text
analysis to study emergence of the emotional behavior among Web users. Mapping
the high-resolution data from digg.com onto bipartite network of users and
their comments onto posted stories, we identify user communities centered
around certain popular posts and determine emotional contents of the related
comments by the emotion-classifier developed for this type of texts. Applied
over different time periods, this framework reveals strong correlations between
the excess of negative emotions and the evolution of communities. We observe
avalanches of emotional comments exhibiting significant self-organized critical
behavior and temporal correlations. To explore robustness of these critical
states, we design a network automaton model on realistic network connections
and several control parameters, which can be inferred from the dataset.
Dissemination of emotions by a small fraction of very active users appears to
critically tune the collective states.
|
1012.1184 | Lei Zhang Dr. | Weisheng Dong, Lei Zhang, Guangming Shi, Xiaolin Wu | Image Deblurring and Super-resolution by Adaptive Sparse Domain
Selection and Adaptive Regularization | 35 pages. This paper is under review in IEEE TIP | null | 10.1109/TIP.2011.2108306 | null | cs.CV cs.MM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | As a powerful statistical image modeling technique, sparse representation has
been successfully used in various image restoration applications. The success
of sparse representation owes to the development of l1-norm optimization
techniques, and the fact that natural images are intrinsically sparse in some
domain. The image restoration quality largely depends on whether the employed
sparse domain can represent well the underlying image. Considering that the
contents can vary significantly across different images or different patches in
a single image, we propose to learn various sets of bases from a pre-collected
dataset of example image patches, and then for a given patch to be processed,
one set of bases are adaptively selected to characterize the local sparse
domain. We further introduce two adaptive regularization terms into the sparse
representation framework. First, a set of autoregressive (AR) models are
learned from the dataset of example image patches. The best fitted AR models to
a given patch are adaptively selected to regularize the image local structures.
Second, the image non-local self-similarity is introduced as another
regularization term. In addition, the sparsity regularization parameter is
adaptively estimated for better image restoration performance. Extensive
experiments on image deblurring and super-resolution validate that by using
adaptive sparse domain selection and adaptive regularization, the proposed
method achieves much better results than many state-of-the-art algorithms in
terms of both PSNR and visual perception.
| [
{
"version": "v1",
"created": "Mon, 6 Dec 2010 14:37:14 GMT"
}
] | 2015-05-20T00:00:00 | [
[
"Dong",
"Weisheng",
""
],
[
"Zhang",
"Lei",
""
],
[
"Shi",
"Guangming",
""
],
[
"Wu",
"Xiaolin",
""
]
] | TITLE: Image Deblurring and Super-resolution by Adaptive Sparse Domain
Selection and Adaptive Regularization
ABSTRACT: As a powerful statistical image modeling technique, sparse representation has
been successfully used in various image restoration applications. The success
of sparse representation owes to the development of l1-norm optimization
techniques, and the fact that natural images are intrinsically sparse in some
domain. The image restoration quality largely depends on whether the employed
sparse domain can represent well the underlying image. Considering that the
contents can vary significantly across different images or different patches in
a single image, we propose to learn various sets of bases from a pre-collected
dataset of example image patches, and then for a given patch to be processed,
one set of bases are adaptively selected to characterize the local sparse
domain. We further introduce two adaptive regularization terms into the sparse
representation framework. First, a set of autoregressive (AR) models are
learned from the dataset of example image patches. The best fitted AR models to
a given patch are adaptively selected to regularize the image local structures.
Second, the image non-local self-similarity is introduced as another
regularization term. In addition, the sparsity regularization parameter is
adaptively estimated for better image restoration performance. Extensive
experiments on image deblurring and super-resolution validate that by using
adaptive sparse domain selection and adaptive regularization, the proposed
method achieves much better results than many state-of-the-art algorithms in
terms of both PSNR and visual perception.
|
1401.4529 | Bal\'azs Hidasi | Bal\'azs Hidasi, Domonkos Tikk | General factorization framework for context-aware recommendations | The final publication is available at Springer via
http://dx.doi.org/10.1007/s10618-015-0417-y. Data Mining and Knowledge
Discovery, 2015 | null | 10.1007/s10618-015-0417-y | null | cs.IR cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Context-aware recommendation algorithms focus on refining recommendations by
considering additional information, available to the system. This topic has
gained a lot of attention recently. Among others, several factorization methods
were proposed to solve the problem, although most of them assume explicit
feedback which strongly limits their real-world applicability. While these
algorithms apply various loss functions and optimization strategies, the
preference modeling under context is less explored due to the lack of tools
allowing for easy experimentation with various models. As context dimensions
are introduced beyond users and items, the space of possible preference models
and the importance of proper modeling largely increases.
In this paper we propose a General Factorization Framework (GFF), a single
flexible algorithm that takes the preference model as an input and computes
latent feature matrices for the input dimensions. GFF allows us to easily
experiment with various linear models on any context-aware recommendation task,
be it explicit or implicit feedback based. The scaling properties makes it
usable under real life circumstances as well.
We demonstrate the framework's potential by exploring various preference
models on a 4-dimensional context-aware problem with contexts that are
available for almost any real life datasets. We show in our experiments --
performed on five real life, implicit feedback datasets -- that proper
preference modelling significantly increases recommendation accuracy, and
previously unused models outperform the traditional ones. Novel models in GFF
also outperform state-of-the-art factorization algorithms.
We also extend the method to be fully compliant to the Multidimensional
Dataspace Model, one of the most extensive data models of context-enriched
data. Extended GFF allows the seamless incorporation of information into the
fac[truncated]
| [
{
"version": "v1",
"created": "Sat, 18 Jan 2014 11:13:26 GMT"
},
{
"version": "v2",
"created": "Tue, 19 May 2015 11:50:22 GMT"
}
] | 2015-05-20T00:00:00 | [
[
"Hidasi",
"Balázs",
""
],
[
"Tikk",
"Domonkos",
""
]
] | TITLE: General factorization framework for context-aware recommendations
ABSTRACT: Context-aware recommendation algorithms focus on refining recommendations by
considering additional information, available to the system. This topic has
gained a lot of attention recently. Among others, several factorization methods
were proposed to solve the problem, although most of them assume explicit
feedback which strongly limits their real-world applicability. While these
algorithms apply various loss functions and optimization strategies, the
preference modeling under context is less explored due to the lack of tools
allowing for easy experimentation with various models. As context dimensions
are introduced beyond users and items, the space of possible preference models
and the importance of proper modeling largely increases.
In this paper we propose a General Factorization Framework (GFF), a single
flexible algorithm that takes the preference model as an input and computes
latent feature matrices for the input dimensions. GFF allows us to easily
experiment with various linear models on any context-aware recommendation task,
be it explicit or implicit feedback based. The scaling properties makes it
usable under real life circumstances as well.
We demonstrate the framework's potential by exploring various preference
models on a 4-dimensional context-aware problem with contexts that are
available for almost any real life datasets. We show in our experiments --
performed on five real life, implicit feedback datasets -- that proper
preference modelling significantly increases recommendation accuracy, and
previously unused models outperform the traditional ones. Novel models in GFF
also outperform state-of-the-art factorization algorithms.
We also extend the method to be fully compliant to the Multidimensional
Dataspace Model, one of the most extensive data models of context-enriched
data. Extended GFF allows the seamless incorporation of information into the
fac[truncated]
|
1501.07320 | Arun Tejasvi Chaganty | Volodymyr Kuleshov and Arun Tejasvi Chaganty and Percy Liang | Tensor Factorization via Matrix Factorization | Appearing in Proceedings of the 18th International Conference on
Artificial Intelligence and Statistics (AISTATS) 2015, San Diego, CA, USA.
JMLR: W&CP volume 38 | null | null | null | cs.LG stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Tensor factorization arises in many machine learning applications, such
knowledge base modeling and parameter estimation in latent variable models.
However, numerical methods for tensor factorization have not reached the level
of maturity of matrix factorization methods. In this paper, we propose a new
method for CP tensor factorization that uses random projections to reduce the
problem to simultaneous matrix diagonalization. Our method is conceptually
simple and also applies to non-orthogonal and asymmetric tensors of arbitrary
order. We prove that a small number random projections essentially preserves
the spectral information in the tensor, allowing us to remove the dependence on
the eigengap that plagued earlier tensor-to-matrix reductions. Experimentally,
our method outperforms existing tensor factorization methods on both simulated
data and two real datasets.
| [
{
"version": "v1",
"created": "Thu, 29 Jan 2015 01:01:34 GMT"
},
{
"version": "v2",
"created": "Mon, 18 May 2015 21:53:34 GMT"
}
] | 2015-05-20T00:00:00 | [
[
"Kuleshov",
"Volodymyr",
""
],
[
"Chaganty",
"Arun Tejasvi",
""
],
[
"Liang",
"Percy",
""
]
] | TITLE: Tensor Factorization via Matrix Factorization
ABSTRACT: Tensor factorization arises in many machine learning applications, such
knowledge base modeling and parameter estimation in latent variable models.
However, numerical methods for tensor factorization have not reached the level
of maturity of matrix factorization methods. In this paper, we propose a new
method for CP tensor factorization that uses random projections to reduce the
problem to simultaneous matrix diagonalization. Our method is conceptually
simple and also applies to non-orthogonal and asymmetric tensors of arbitrary
order. We prove that a small number random projections essentially preserves
the spectral information in the tensor, allowing us to remove the dependence on
the eigengap that plagued earlier tensor-to-matrix reductions. Experimentally,
our method outperforms existing tensor factorization methods on both simulated
data and two real datasets.
|
1505.04803 | Yong Jae Lee | Yong Jae Lee and Kristen Grauman | Predicting Important Objects for Egocentric Video Summarization | Published in the International Journal of Computer Vision (IJCV),
January 2015 | null | 10.1007/s11263-014-0794-5 | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present a video summarization approach for egocentric or "wearable" camera
data. Given hours of video, the proposed method produces a compact storyboard
summary of the camera wearer's day. In contrast to traditional keyframe
selection techniques, the resulting summary focuses on the most important
objects and people with which the camera wearer interacts. To accomplish this,
we develop region cues indicative of high-level saliency in egocentric
video---such as the nearness to hands, gaze, and frequency of occurrence---and
learn a regressor to predict the relative importance of any new region based on
these cues. Using these predictions and a simple form of temporal event
detection, our method selects frames for the storyboard that reflect the key
object-driven happenings. We adjust the compactness of the final summary given
either an importance selection criterion or a length budget; for the latter, we
design an efficient dynamic programming solution that accounts for importance,
visual uniqueness, and temporal displacement. Critically, the approach is
neither camera-wearer-specific nor object-specific; that means the learned
importance metric need not be trained for a given user or context, and it can
predict the importance of objects and people that have never been seen
previously. Our results on two egocentric video datasets show the method's
promise relative to existing techniques for saliency and summarization.
| [
{
"version": "v1",
"created": "Mon, 18 May 2015 20:07:20 GMT"
}
] | 2015-05-20T00:00:00 | [
[
"Lee",
"Yong Jae",
""
],
[
"Grauman",
"Kristen",
""
]
] | TITLE: Predicting Important Objects for Egocentric Video Summarization
ABSTRACT: We present a video summarization approach for egocentric or "wearable" camera
data. Given hours of video, the proposed method produces a compact storyboard
summary of the camera wearer's day. In contrast to traditional keyframe
selection techniques, the resulting summary focuses on the most important
objects and people with which the camera wearer interacts. To accomplish this,
we develop region cues indicative of high-level saliency in egocentric
video---such as the nearness to hands, gaze, and frequency of occurrence---and
learn a regressor to predict the relative importance of any new region based on
these cues. Using these predictions and a simple form of temporal event
detection, our method selects frames for the storyboard that reflect the key
object-driven happenings. We adjust the compactness of the final summary given
either an importance selection criterion or a length budget; for the latter, we
design an efficient dynamic programming solution that accounts for importance,
visual uniqueness, and temporal displacement. Critically, the approach is
neither camera-wearer-specific nor object-specific; that means the learned
importance metric need not be trained for a given user or context, and it can
predict the importance of objects and people that have never been seen
previously. Our results on two egocentric video datasets show the method's
promise relative to existing techniques for saliency and summarization.
|
1505.04873 | Lior Talker | Lior Talker and Yael Moses and Ilan Shimshoni | Have a Look at What I See | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose a method for guiding a photographer to rotate her/his smartphone
camera to obtain an image that overlaps with another image of the same scene.
The other image is taken by another photographer from a different viewpoint.
Our method is applicable even when the images do not have overlapping fields of
view. Straightforward applications of our method include sharing attention to
regions of interest for social purposes, or adding missing images to improve
structure for motion results. Our solution uses additional images of the scene,
which are often available since many people use their smartphone cameras
regularly. These images may be available online from other photographers who
are present at the scene. Our method avoids 3D scene reconstruction; it relies
instead on a new representation that consists of the spatial orders of the
scene points on two axes, x and y. This representation allows a sequence of
points to be chosen efficiently and projected onto the photographers images,
using epipolar point transfer. Overlaying these epipolar lines on the live
preview of the camera produces a convenient interface to guide the user. The
method was tested on challenging datasets of images and succeeded in guiding a
photographer from one view to a non-overlapping destination view.
| [
{
"version": "v1",
"created": "Tue, 19 May 2015 04:49:46 GMT"
}
] | 2015-05-20T00:00:00 | [
[
"Talker",
"Lior",
""
],
[
"Moses",
"Yael",
""
],
[
"Shimshoni",
"Ilan",
""
]
] | TITLE: Have a Look at What I See
ABSTRACT: We propose a method for guiding a photographer to rotate her/his smartphone
camera to obtain an image that overlaps with another image of the same scene.
The other image is taken by another photographer from a different viewpoint.
Our method is applicable even when the images do not have overlapping fields of
view. Straightforward applications of our method include sharing attention to
regions of interest for social purposes, or adding missing images to improve
structure for motion results. Our solution uses additional images of the scene,
which are often available since many people use their smartphone cameras
regularly. These images may be available online from other photographers who
are present at the scene. Our method avoids 3D scene reconstruction; it relies
instead on a new representation that consists of the spatial orders of the
scene points on two axes, x and y. This representation allows a sequence of
points to be chosen efficiently and projected onto the photographers images,
using epipolar point transfer. Overlaying these epipolar lines on the live
preview of the camera produces a convenient interface to guide the user. The
method was tested on challenging datasets of images and succeeded in guiding a
photographer from one view to a non-overlapping destination view.
|
1505.04880 | Nasser Ghadiri | Amin Beiranvand and Nasser Ghadiri | ADQUEX: Adaptive Processing of Federated Queries over Linked Data based
on Tuple Routing | null | null | null | null | cs.DC cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Due to the distribution of linked data across the web, the methods that
process federated queries through a distributed approach are more attractive to
the users and have gained more prosperity. In distributed processing of
federated queries, we need methods and procedures to execute the query in an
optimal manner. Most of the existing methods perform the optimization task
based on some statistical information, whereas the query processor does not
have precise statistical information about their properties, since the data
sources are autonomous. When precise statistics are not available, the
possibility of wrong estimations will highly increase, and may lead to
inefficient execution of the query at runtime. Another problem of the existing
methods is that in the optimization phase, they assume that runtime conditions
of query execution are stable, while the environment in which federated queries
are executed over linked data is dynamic and non-predictable. By considering
these two problems, there is a great potential for exploiting the federated
query processing techniques in an adaptive manner. In this paper, an adaptive
method is proposed for processing federated queries over linked data, based on
the concept of routing the tuples. The proposed method, named ADQUEX, is able
to execute the query effectively without any prior statistical information.
This method can change the query execution plan at runtime so that less
intermediate results are produced. It can also adapt the execution plan to new
situation if unpredicted network latencies arise. Extensive evaluation of our
method by running real queries over well-known linked datasets shows very good
results especially for complex queries.
| [
{
"version": "v1",
"created": "Tue, 19 May 2015 05:51:27 GMT"
}
] | 2015-05-20T00:00:00 | [
[
"Beiranvand",
"Amin",
""
],
[
"Ghadiri",
"Nasser",
""
]
] | TITLE: ADQUEX: Adaptive Processing of Federated Queries over Linked Data based
on Tuple Routing
ABSTRACT: Due to the distribution of linked data across the web, the methods that
process federated queries through a distributed approach are more attractive to
the users and have gained more prosperity. In distributed processing of
federated queries, we need methods and procedures to execute the query in an
optimal manner. Most of the existing methods perform the optimization task
based on some statistical information, whereas the query processor does not
have precise statistical information about their properties, since the data
sources are autonomous. When precise statistics are not available, the
possibility of wrong estimations will highly increase, and may lead to
inefficient execution of the query at runtime. Another problem of the existing
methods is that in the optimization phase, they assume that runtime conditions
of query execution are stable, while the environment in which federated queries
are executed over linked data is dynamic and non-predictable. By considering
these two problems, there is a great potential for exploiting the federated
query processing techniques in an adaptive manner. In this paper, an adaptive
method is proposed for processing federated queries over linked data, based on
the concept of routing the tuples. The proposed method, named ADQUEX, is able
to execute the query effectively without any prior statistical information.
This method can change the query execution plan at runtime so that less
intermediate results are produced. It can also adapt the execution plan to new
situation if unpredicted network latencies arise. Extensive evaluation of our
method by running real queries over well-known linked datasets shows very good
results especially for complex queries.
|
1505.04922 | Lianwen Jin | Weixin Yang, Lianwen Jin, Manfei Liu | Character-level Chinese Writer Identification using Path Signature
Feature, DropStroke and Deep CNN | 5 pages, 4 figures, 2 tables. Manuscript is accepted to appear in
ICDAR 2015 | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Most existing online writer-identification systems require that the text
content is supplied in advance and rely on separately designed features and
classifiers. The identifications are based on lines of text, entire paragraphs,
or entire documents; however, these materials are not always available. In this
paper, we introduce a path-signature feature to an end-to-end text-independent
writer-identification system with a deep convolutional neural network (DCNN).
Because deep models require a considerable amount of data to achieve good
performance, we propose a data-augmentation method named DropStroke to enrich
personal handwriting. Experiments were conducted on online handwritten Chinese
characters from the CASIA-OLHWDB1.0 dataset, which consists of 3,866 classes
from 420 writers. For each writer, we only used 200 samples for training and
the remaining 3,666. The results reveal that the path-signature feature is
useful for writer identification, and the proposed DropStroke technique
enhances the generalization and significantly improves performance.
| [
{
"version": "v1",
"created": "Tue, 19 May 2015 09:25:46 GMT"
}
] | 2015-05-20T00:00:00 | [
[
"Yang",
"Weixin",
""
],
[
"Jin",
"Lianwen",
""
],
[
"Liu",
"Manfei",
""
]
] | TITLE: Character-level Chinese Writer Identification using Path Signature
Feature, DropStroke and Deep CNN
ABSTRACT: Most existing online writer-identification systems require that the text
content is supplied in advance and rely on separately designed features and
classifiers. The identifications are based on lines of text, entire paragraphs,
or entire documents; however, these materials are not always available. In this
paper, we introduce a path-signature feature to an end-to-end text-independent
writer-identification system with a deep convolutional neural network (DCNN).
Because deep models require a considerable amount of data to achieve good
performance, we propose a data-augmentation method named DropStroke to enrich
personal handwriting. Experiments were conducted on online handwritten Chinese
characters from the CASIA-OLHWDB1.0 dataset, which consists of 3,866 classes
from 420 writers. For each writer, we only used 200 samples for training and
the remaining 3,666. The results reveal that the path-signature feature is
useful for writer identification, and the proposed DropStroke technique
enhances the generalization and significantly improves performance.
|
1505.04925 | Lianwen Jin | Zhuoyao Zhong, Lianwen Jin, Zecheng Xie | High Performance Offline Handwritten Chinese Character Recognition Using
GoogLeNet and Directional Feature Maps | 5 pages, 4 figures, 2 tables. Manuscript is accepted to appear in
ICDAR 2015 | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Just like its great success in solving many computer vision problems, the
convolutional neural networks (CNN) provided new end-to-end approach to
handwritten Chinese character recognition (HCCR) with very promising results in
recent years. However, previous CNNs so far proposed for HCCR were neither deep
enough nor slim enough. We show in this paper that, a deeper architecture can
benefit HCCR a lot to achieve higher performance, meanwhile can be designed
with less parameters. We also show that the traditional feature extraction
methods, such as Gabor or gradient feature maps, are still useful for enhancing
the performance of CNN. We design a streamlined version of GoogLeNet [13],
which was original proposed for image classification in recent years with very
deep architecture, for HCCR (denoted as HCCR-GoogLeNet). The HCCR-GoogLeNet we
used is 19 layers deep but involves with only 7.26 million parameters.
Experiments were conducted using the ICDAR 2013 offline HCCR competition
dataset. It has been shown that with the proper incorporation with traditional
directional feature maps, the proposed single and ensemble HCCR-GoogLeNet
models achieve new state of the art recognition accuracy of 96.35% and 96.74%,
respectively, outperforming previous best result with significant gap.
| [
{
"version": "v1",
"created": "Tue, 19 May 2015 09:32:54 GMT"
}
] | 2015-05-20T00:00:00 | [
[
"Zhong",
"Zhuoyao",
""
],
[
"Jin",
"Lianwen",
""
],
[
"Xie",
"Zecheng",
""
]
] | TITLE: High Performance Offline Handwritten Chinese Character Recognition Using
GoogLeNet and Directional Feature Maps
ABSTRACT: Just like its great success in solving many computer vision problems, the
convolutional neural networks (CNN) provided new end-to-end approach to
handwritten Chinese character recognition (HCCR) with very promising results in
recent years. However, previous CNNs so far proposed for HCCR were neither deep
enough nor slim enough. We show in this paper that, a deeper architecture can
benefit HCCR a lot to achieve higher performance, meanwhile can be designed
with less parameters. We also show that the traditional feature extraction
methods, such as Gabor or gradient feature maps, are still useful for enhancing
the performance of CNN. We design a streamlined version of GoogLeNet [13],
which was original proposed for image classification in recent years with very
deep architecture, for HCCR (denoted as HCCR-GoogLeNet). The HCCR-GoogLeNet we
used is 19 layers deep but involves with only 7.26 million parameters.
Experiments were conducted using the ICDAR 2013 offline HCCR competition
dataset. It has been shown that with the proper incorporation with traditional
directional feature maps, the proposed single and ensemble HCCR-GoogLeNet
models achieve new state of the art recognition accuracy of 96.35% and 96.74%,
respectively, outperforming previous best result with significant gap.
|
1505.05136 | Nicolas Turenne | Nicolas Turenne | A Table-Binning Approach for Visualizing the Past | null | null | null | null | cs.IR cs.DB cs.SI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Large amounts of data are available due to low-cost and high-capacity data
storage equipments. We propose a data exploration/visualization method for
tabular multi-dimensional, time-varying datasets to present selected items in
their global context. The approach is simple and uses a rank-based
visualization and a pattern matching functionality based on temporal profiles.
Ranking categories can be specified in a flexible way and are used instead of
actual values (value reduction into bins) and plotting it over time in an
unevenly quantized representation. Patterns that emerge are matched against a
set of eight predefined temporal profiles. The graphical summarization of
large-scale temporal data is proposed and applicability is tested qualitatively
on about eight data sets and the approach is compared to classic line plots and
SAX representation
| [
{
"version": "v1",
"created": "Mon, 27 Apr 2015 11:15:39 GMT"
}
] | 2015-05-20T00:00:00 | [
[
"Turenne",
"Nicolas",
""
]
] | TITLE: A Table-Binning Approach for Visualizing the Past
ABSTRACT: Large amounts of data are available due to low-cost and high-capacity data
storage equipments. We propose a data exploration/visualization method for
tabular multi-dimensional, time-varying datasets to present selected items in
their global context. The approach is simple and uses a rank-based
visualization and a pattern matching functionality based on temporal profiles.
Ranking categories can be specified in a flexible way and are used instead of
actual values (value reduction into bins) and plotting it over time in an
unevenly quantized representation. Patterns that emerge are matched against a
set of eight predefined temporal profiles. The graphical summarization of
large-scale temporal data is proposed and applicability is tested qualitatively
on about eight data sets and the approach is compared to classic line plots and
SAX representation
|
1005.5227 | Michael Schreiber | Michael Schreiber | Twenty Hirsch index variants and other indicators giving more or less
preference to highly cited papers | 19 pages, including 6 tables and 3 figures accepted for publication
in Annalen der Physik Berlin | Ann. Phys. (Berlin) 522, 536-554 (2010) | 10.1002/andp.201000046 | null | physics.soc-ph cs.DL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The Hirsch index or h-index is widely used to quantify the impact of an
individual's scientific research output, determining the highest number h of a
scientist's papers that received at least h citations. Several variants of the
index have been proposed in order to give more or less preference to highly
cited papers. I analyse the citation records of 26 physicists discussing
various suggestions, in particular A, e, f, g, h(2), h_w, h_T, \hbar, m, {\pi},
R, s, t, w, and maxprod. The total number of all and of all cited publications
as well as the highest and the average number of citations are also compared.
Advantages and disadvantages of these indices and indicators are discussed.
Correlation coefficients are determined quantifying which indices and
indicators yield similar and which yield more deviating rankings of the 26
datasets. For 6 datasets the determination of the indices and indicators is
visualized.
| [
{
"version": "v1",
"created": "Fri, 28 May 2010 07:08:09 GMT"
}
] | 2015-05-19T00:00:00 | [
[
"Schreiber",
"Michael",
""
]
] | TITLE: Twenty Hirsch index variants and other indicators giving more or less
preference to highly cited papers
ABSTRACT: The Hirsch index or h-index is widely used to quantify the impact of an
individual's scientific research output, determining the highest number h of a
scientist's papers that received at least h citations. Several variants of the
index have been proposed in order to give more or less preference to highly
cited papers. I analyse the citation records of 26 physicists discussing
various suggestions, in particular A, e, f, g, h(2), h_w, h_T, \hbar, m, {\pi},
R, s, t, w, and maxprod. The total number of all and of all cited publications
as well as the highest and the average number of citations are also compared.
Advantages and disadvantages of these indices and indicators are discussed.
Correlation coefficients are determined quantifying which indices and
indicators yield similar and which yield more deviating rankings of the 26
datasets. For 6 datasets the determination of the indices and indicators is
visualized.
|
1006.4828 | Vamsi Kundeti | Vamsi Kundeti and Sanguthevar Rajasekaran and Hieu Dinh | An Efficient Algorithm For Chinese Postman Walk on Bi-directed de Bruijn
Graphs | null | null | 10.1007/978-3-642-17458-2_16 | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Sequence assembly from short reads is an important problem in biology. It is
known that solving the sequence assembly problem exactly on a bi-directed de
Bruijn graph or a string graph is intractable. However finding a Shortest
Double stranded DNA string (SDDNA) containing all the k-long words in the reads
seems to be a good heuristic to get close to the original genome. This problem
is equivalent to finding a cyclic Chinese Postman (CP) walk on the underlying
un-weighted bi-directed de Bruijn graph built from the reads. The Chinese
Postman walk Problem (CPP) is solved by reducing it to a general bi-directed
flow on this graph which runs in O(|E|2 log2(|V |)) time. In this paper we show
that the cyclic CPP on bi-directed graphs can be solved without reducing it to
bi-directed flow. We present a ?(p(|V | + |E|) log(|V |) + (dmaxp)3) time
algorithm to solve the cyclic CPP on a weighted bi-directed de Bruijn graph,
where p = max{|{v|din(v) - dout(v) > 0}|, |{v|din(v) - dout(v) < 0}|} and dmax
= max{|din(v) - dout(v)}. Our algorithm performs asymptotically better than the
bidirected flow algorithm when the number of imbalanced nodes p is much less
than the nodes in the bi-directed graph. From our experimental results on
various datasets, we have noticed that the value of p/|V | lies between 0.08%
and 0.13% with 95% probability.
| [
{
"version": "v1",
"created": "Thu, 24 Jun 2010 16:35:47 GMT"
}
] | 2015-05-19T00:00:00 | [
[
"Kundeti",
"Vamsi",
""
],
[
"Rajasekaran",
"Sanguthevar",
""
],
[
"Dinh",
"Hieu",
""
]
] | TITLE: An Efficient Algorithm For Chinese Postman Walk on Bi-directed de Bruijn
Graphs
ABSTRACT: Sequence assembly from short reads is an important problem in biology. It is
known that solving the sequence assembly problem exactly on a bi-directed de
Bruijn graph or a string graph is intractable. However finding a Shortest
Double stranded DNA string (SDDNA) containing all the k-long words in the reads
seems to be a good heuristic to get close to the original genome. This problem
is equivalent to finding a cyclic Chinese Postman (CP) walk on the underlying
un-weighted bi-directed de Bruijn graph built from the reads. The Chinese
Postman walk Problem (CPP) is solved by reducing it to a general bi-directed
flow on this graph which runs in O(|E|2 log2(|V |)) time. In this paper we show
that the cyclic CPP on bi-directed graphs can be solved without reducing it to
bi-directed flow. We present a ?(p(|V | + |E|) log(|V |) + (dmaxp)3) time
algorithm to solve the cyclic CPP on a weighted bi-directed de Bruijn graph,
where p = max{|{v|din(v) - dout(v) > 0}|, |{v|din(v) - dout(v) < 0}|} and dmax
= max{|din(v) - dout(v)}. Our algorithm performs asymptotically better than the
bidirected flow algorithm when the number of imbalanced nodes p is much less
than the nodes in the bi-directed graph. From our experimental results on
various datasets, we have noticed that the value of p/|V | lies between 0.08%
and 0.13% with 95% probability.
|
1404.1653 | Zi-Ke Zhang Dr. | Lu Yu, Chuang Liu, Zi-Ke Zhang | Multi-Linear Interactive Matrix Factorization | null | null | null | null | cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Recommender systems, which can significantly help users find their interested
items from the information era, has attracted an increasing attention from both
the scientific and application society. One of the widest applied
recommendation methods is the Matrix Factorization (MF). However, most of MF
based approaches focus on the user-item rating matrix, but ignoring the
ingredients which may have significant influence on users' preferences on
items. In this paper, we propose a multi-linear interactive MF algorithm
(MLIMF) to model the interactions between the users and each event associated
with their final decisions. Our model considers not only the user-item rating
information but also the pairwise interactions based on some empirically
supported factors. In addition, we compared the proposed model with three
typical other methods: user-based collaborative filtering (UCF), item-based
collaborative filtering (ICF) and regularized MF (RMF). Experimental results on
two real-world datasets, \emph{MovieLens} 1M and \emph{MovieLens} 100k, show
that our method performs much better than other three methods in the accuracy
of recommendation. This work may shed some light on the in-depth understanding
of modeling user online behaviors and the consequent decisions.
| [
{
"version": "v1",
"created": "Mon, 7 Apr 2014 04:39:14 GMT"
},
{
"version": "v2",
"created": "Mon, 18 May 2015 06:05:02 GMT"
}
] | 2015-05-19T00:00:00 | [
[
"Yu",
"Lu",
""
],
[
"Liu",
"Chuang",
""
],
[
"Zhang",
"Zi-Ke",
""
]
] | TITLE: Multi-Linear Interactive Matrix Factorization
ABSTRACT: Recommender systems, which can significantly help users find their interested
items from the information era, has attracted an increasing attention from both
the scientific and application society. One of the widest applied
recommendation methods is the Matrix Factorization (MF). However, most of MF
based approaches focus on the user-item rating matrix, but ignoring the
ingredients which may have significant influence on users' preferences on
items. In this paper, we propose a multi-linear interactive MF algorithm
(MLIMF) to model the interactions between the users and each event associated
with their final decisions. Our model considers not only the user-item rating
information but also the pairwise interactions based on some empirically
supported factors. In addition, we compared the proposed model with three
typical other methods: user-based collaborative filtering (UCF), item-based
collaborative filtering (ICF) and regularized MF (RMF). Experimental results on
two real-world datasets, \emph{MovieLens} 1M and \emph{MovieLens} 100k, show
that our method performs much better than other three methods in the accuracy
of recommendation. This work may shed some light on the in-depth understanding
of modeling user online behaviors and the consequent decisions.
|
1407.2433 | Peter Foster | Peter Foster, Simon Dixon, Anssi Klapuri | Identifying Cover Songs Using Information-Theoretic Measures of
Similarity | 13 pages, 5 figures, 4 tables. v3: Accepted version | IEEE/ACM Transactions on Audio, Speech, and Language Processing,
vol. 23 no. 6, pp. 993-1005, 2015 | 10.1109/TASLP.2015.2416655 | null | cs.IR cs.LG stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper investigates methods for quantifying similarity between audio
signals, specifically for the task of of cover song detection. We consider an
information-theoretic approach, where we compute pairwise measures of
predictability between time series. We compare discrete-valued approaches
operating on quantised audio features, to continuous-valued approaches. In the
discrete case, we propose a method for computing the normalised compression
distance, where we account for correlation between time series. In the
continuous case, we propose to compute information-based measures of similarity
as statistics of the prediction error between time series. We evaluate our
methods on two cover song identification tasks using a data set comprised of
300 Jazz standards and using the Million Song Dataset. For both datasets, we
observe that continuous-valued approaches outperform discrete-valued
approaches. We consider approaches to estimating the normalised compression
distance (NCD) based on string compression and prediction, where we observe
that our proposed normalised compression distance with alignment (NCDA)
improves average performance over NCD, for sequential compression algorithms.
Finally, we demonstrate that continuous-valued distances may be combined to
improve performance with respect to baseline approaches. Using a large-scale
filter-and-refine approach, we demonstrate state-of-the-art performance for
cover song identification using the Million Song Dataset.
| [
{
"version": "v1",
"created": "Wed, 9 Jul 2014 11:04:15 GMT"
},
{
"version": "v2",
"created": "Thu, 10 Jul 2014 00:53:47 GMT"
},
{
"version": "v3",
"created": "Sun, 17 May 2015 15:53:43 GMT"
}
] | 2015-05-19T00:00:00 | [
[
"Foster",
"Peter",
""
],
[
"Dixon",
"Simon",
""
],
[
"Klapuri",
"Anssi",
""
]
] | TITLE: Identifying Cover Songs Using Information-Theoretic Measures of
Similarity
ABSTRACT: This paper investigates methods for quantifying similarity between audio
signals, specifically for the task of of cover song detection. We consider an
information-theoretic approach, where we compute pairwise measures of
predictability between time series. We compare discrete-valued approaches
operating on quantised audio features, to continuous-valued approaches. In the
discrete case, we propose a method for computing the normalised compression
distance, where we account for correlation between time series. In the
continuous case, we propose to compute information-based measures of similarity
as statistics of the prediction error between time series. We evaluate our
methods on two cover song identification tasks using a data set comprised of
300 Jazz standards and using the Million Song Dataset. For both datasets, we
observe that continuous-valued approaches outperform discrete-valued
approaches. We consider approaches to estimating the normalised compression
distance (NCD) based on string compression and prediction, where we observe
that our proposed normalised compression distance with alignment (NCDA)
improves average performance over NCD, for sequential compression algorithms.
Finally, we demonstrate that continuous-valued distances may be combined to
improve performance with respect to baseline approaches. Using a large-scale
filter-and-refine approach, we demonstrate state-of-the-art performance for
cover song identification using the Million Song Dataset.
|
1412.4458 | Hang Li | Hang Li, Chuan Huang, Fuad Alsaadi, Abdullah M. Dobaie, and Shuguang
Cui | Opportunistic Multi-Channel Access in Heterogeneous 5G Network with
Renewable Energy Supplies | 28 pages, 8 figures | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A heterogeneous system, where small networks (e.g., small cell or WiFi) boost
the system throughput under the umbrella of a large network (e.g., large cell),
is a promising architecture for the 5G wireless communication networks, where
green and sustainable communication is also a key aspect. Renewable energy
based communication via energy harvesting (EH) devices is one of such green
technology candidates. In this paper, we study an uplink transmission scenario
under a heterogeneous network hierarchy, where each mobile user (MU) is powered
by a sustainable energy supply, capable of both deterministic access to the
large network via one private channel, and dynamic access to a small network
with certain probability via one common channel shared by multiple MUs.
Considering a general EH model, i.e., energy arrivals are time-correlated, we
study an opportunistic transmission scheme and aim to maximize the average
throughput for each MU, which jointly exploits the statistics and current
states of the private channel, common channel, battery level, and EH rate.
Applying a simple yet efficient "save-then-transmit" scheme, the throughput
maximization problem is cast as a "rate-of-return" optimal stopping problem.
The optimal stopping rule is proved to has a time-dependent threshold-based
structure for the case with general Markovian system dynamics, and degrades to
a pure threshold policy for the case with independent and identically
distributed system dynamics. As performance benchmarks, the optimal power
allocation scheme with conventional power supplies is also examined. Finally,
numerical results are presented, and a new concept of "EH diversity" is
discussed.
| [
{
"version": "v1",
"created": "Mon, 15 Dec 2014 04:25:57 GMT"
},
{
"version": "v2",
"created": "Tue, 6 Jan 2015 04:01:06 GMT"
},
{
"version": "v3",
"created": "Sat, 16 May 2015 15:11:53 GMT"
}
] | 2015-05-19T00:00:00 | [
[
"Li",
"Hang",
""
],
[
"Huang",
"Chuan",
""
],
[
"Alsaadi",
"Fuad",
""
],
[
"Dobaie",
"Abdullah M.",
""
],
[
"Cui",
"Shuguang",
""
]
] | TITLE: Opportunistic Multi-Channel Access in Heterogeneous 5G Network with
Renewable Energy Supplies
ABSTRACT: A heterogeneous system, where small networks (e.g., small cell or WiFi) boost
the system throughput under the umbrella of a large network (e.g., large cell),
is a promising architecture for the 5G wireless communication networks, where
green and sustainable communication is also a key aspect. Renewable energy
based communication via energy harvesting (EH) devices is one of such green
technology candidates. In this paper, we study an uplink transmission scenario
under a heterogeneous network hierarchy, where each mobile user (MU) is powered
by a sustainable energy supply, capable of both deterministic access to the
large network via one private channel, and dynamic access to a small network
with certain probability via one common channel shared by multiple MUs.
Considering a general EH model, i.e., energy arrivals are time-correlated, we
study an opportunistic transmission scheme and aim to maximize the average
throughput for each MU, which jointly exploits the statistics and current
states of the private channel, common channel, battery level, and EH rate.
Applying a simple yet efficient "save-then-transmit" scheme, the throughput
maximization problem is cast as a "rate-of-return" optimal stopping problem.
The optimal stopping rule is proved to has a time-dependent threshold-based
structure for the case with general Markovian system dynamics, and degrades to
a pure threshold policy for the case with independent and identically
distributed system dynamics. As performance benchmarks, the optimal power
allocation scheme with conventional power supplies is also examined. Finally,
numerical results are presented, and a new concept of "EH diversity" is
discussed.
|
1501.07645 | Sachin Talathi | Sachin S. Talathi | Hyper-parameter optimization of Deep Convolutional Networks for object
recognition | 4 pages, 1 figure, 3 tables, Submitted to ICIP 2015 | null | null | null | cs.CV cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Recently sequential model based optimization (SMBO) has emerged as a
promising hyper-parameter optimization strategy in machine learning. In this
work, we investigate SMBO to identify architecture hyper-parameters of deep
convolution networks (DCNs) object recognition. We propose a simple SMBO
strategy that starts from a set of random initial DCN architectures to generate
new architectures, which on training perform well on a given dataset. Using the
proposed SMBO strategy we are able to identify a number of DCN architectures
that produce results that are comparable to state-of-the-art results on object
recognition benchmarks.
| [
{
"version": "v1",
"created": "Fri, 30 Jan 2015 02:08:51 GMT"
},
{
"version": "v2",
"created": "Sun, 17 May 2015 03:32:22 GMT"
}
] | 2015-05-19T00:00:00 | [
[
"Talathi",
"Sachin S.",
""
]
] | TITLE: Hyper-parameter optimization of Deep Convolutional Networks for object
recognition
ABSTRACT: Recently sequential model based optimization (SMBO) has emerged as a
promising hyper-parameter optimization strategy in machine learning. In this
work, we investigate SMBO to identify architecture hyper-parameters of deep
convolution networks (DCNs) object recognition. We propose a simple SMBO
strategy that starts from a set of random initial DCN architectures to generate
new architectures, which on training perform well on a given dataset. Using the
proposed SMBO strategy we are able to identify a number of DCN architectures
that produce results that are comparable to state-of-the-art results on object
recognition benchmarks.
|
1504.02531 | Zhimin Gao | Zhimin Gao, Lei Wang, Luping Zhou, Jianjia Zhang | HEp-2 Cell Image Classification with Deep Convolutional Neural Networks | 32 pages | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Efficient Human Epithelial-2 (HEp-2) cell image classification can facilitate
the diagnosis of many autoimmune diseases. This paper presents an automatic
framework for this classification task, by utilizing the deep convolutional
neural networks (CNNs) which have recently attracted intensive attention in
visual recognition. This paper elaborates the important components of this
framework, discusses multiple key factors that impact the efficiency of
training a deep CNN, and systematically compares this framework with the
well-established image classification models in the literature. Experiments on
benchmark datasets show that i) the proposed framework can effectively
outperform existing models by properly applying data augmentation; ii) our
CNN-based framework demonstrates excellent adaptability across different
datasets, which is highly desirable for classification under varying laboratory
settings. Our system is ranked high in the cell image classification
competition hosted by ICPR 2014.
| [
{
"version": "v1",
"created": "Fri, 10 Apr 2015 01:58:17 GMT"
},
{
"version": "v2",
"created": "Mon, 18 May 2015 01:12:12 GMT"
}
] | 2015-05-19T00:00:00 | [
[
"Gao",
"Zhimin",
""
],
[
"Wang",
"Lei",
""
],
[
"Zhou",
"Luping",
""
],
[
"Zhang",
"Jianjia",
""
]
] | TITLE: HEp-2 Cell Image Classification with Deep Convolutional Neural Networks
ABSTRACT: Efficient Human Epithelial-2 (HEp-2) cell image classification can facilitate
the diagnosis of many autoimmune diseases. This paper presents an automatic
framework for this classification task, by utilizing the deep convolutional
neural networks (CNNs) which have recently attracted intensive attention in
visual recognition. This paper elaborates the important components of this
framework, discusses multiple key factors that impact the efficiency of
training a deep CNN, and systematically compares this framework with the
well-established image classification models in the literature. Experiments on
benchmark datasets show that i) the proposed framework can effectively
outperform existing models by properly applying data augmentation; ii) our
CNN-based framework demonstrates excellent adaptability across different
datasets, which is highly desirable for classification under varying laboratory
settings. Our system is ranked high in the cell image classification
competition hosted by ICPR 2014.
|
1504.06236 | Arman Shokrollahi | Amir Sheikhahmadi, Mohammad A. Nematbakhsh, and Arman Shokrollahi | Improving detection of influential nodes in complex networks | 17 pages, 8 figures, 5 tables . . . accepted for publication in
Physica A: Statistical Mechanics and its Applications | null | 10.1016/j.physa.2015.04.035 | null | cs.SI physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Recently an increasing amount of research is devoted to the question of how
the most influential nodes (seeds) can be found effectively in a complex
network. There are a number of measures proposed for this purpose, for
instance, high-degree centrality measure reflects the importance of the network
topology and has a reasonable runtime performance to find a set of nodes with
highest degree, but they do not have a satisfactory dissemination potentiality
in the network due to having many common neighbors ($\mbox{CN}^{(1)}$) and
common neighbors of neighbors ($\mbox{CN}^{(2)}$). This flaw holds in other
measures as well. In this paper, we compare high-degree centrality measure with
other well-known measures using ten datasets in order to find a proportion for
the common seeds in the seed sets obtained by them. We, thereof, propose an
improved high-degree centrality measure (named DegreeDistance) and improve it
to enhance accuracy in two phases, FIDD and SIDD, by putting a threshold on the
number of common neighbors of already-selected seed nodes and a non-seed node
which is under investigation to be selected as a seed as well as considering
the influence score of seed nodes directly or through their common neighbors
over the non-seed node. To evaluate the accuracy and runtime performance of
DegreeDistance, FIDD, and SIDD, they are applied to eight large-scale networks
and it finally turns out that SIDD dramatically outperforms other well-known
measures and evinces comparatively more accurate performance in identifying the
most influential nodes.
| [
{
"version": "v1",
"created": "Thu, 23 Apr 2015 16:01:35 GMT"
},
{
"version": "v2",
"created": "Fri, 24 Apr 2015 08:10:49 GMT"
}
] | 2015-05-19T00:00:00 | [
[
"Sheikhahmadi",
"Amir",
""
],
[
"Nematbakhsh",
"Mohammad A.",
""
],
[
"Shokrollahi",
"Arman",
""
]
] | TITLE: Improving detection of influential nodes in complex networks
ABSTRACT: Recently an increasing amount of research is devoted to the question of how
the most influential nodes (seeds) can be found effectively in a complex
network. There are a number of measures proposed for this purpose, for
instance, high-degree centrality measure reflects the importance of the network
topology and has a reasonable runtime performance to find a set of nodes with
highest degree, but they do not have a satisfactory dissemination potentiality
in the network due to having many common neighbors ($\mbox{CN}^{(1)}$) and
common neighbors of neighbors ($\mbox{CN}^{(2)}$). This flaw holds in other
measures as well. In this paper, we compare high-degree centrality measure with
other well-known measures using ten datasets in order to find a proportion for
the common seeds in the seed sets obtained by them. We, thereof, propose an
improved high-degree centrality measure (named DegreeDistance) and improve it
to enhance accuracy in two phases, FIDD and SIDD, by putting a threshold on the
number of common neighbors of already-selected seed nodes and a non-seed node
which is under investigation to be selected as a seed as well as considering
the influence score of seed nodes directly or through their common neighbors
over the non-seed node. To evaluate the accuracy and runtime performance of
DegreeDistance, FIDD, and SIDD, they are applied to eight large-scale networks
and it finally turns out that SIDD dramatically outperforms other well-known
measures and evinces comparatively more accurate performance in identifying the
most influential nodes.
|
1505.04134 | Georgios Rokos | Georgios Rokos and Gerard J. Gorman and Paul H. J. Kelly | An Interrupt-Driven Work-Sharing For-Loop Scheduler | null | null | null | null | cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we present a parallel for-loop scheduler which is based on
work-stealing principles but runs under a completely cooperative scheme. POSIX
signals are used by idle threads to interrupt left-behind workers, which in
turn decide what portion of their workload can be given to the requester. We
call this scheme Interrupt-Driven Work-Sharing (IDWS). This article describes
how IDWS works, how it can be integrated into any POSIX-compliant OpenMP
implementation and how a user can manually replace OpenMP parallel for-loops
with IDWS in existing POSIX-compliant C++ applications. Additionally, we
measure its performance using both a synthetic benchmark with varying
distributions of workload across the iteration space and a real-life
application on Sandy Bridge and Xeon Phi systems. Regardless the workload
distribution and the underlying hardware, IDWS is always the best or among the
best-performing strategies, providing a good all-around solution to the
scheduling-choice dilemma.
| [
{
"version": "v1",
"created": "Fri, 15 May 2015 17:30:17 GMT"
},
{
"version": "v2",
"created": "Mon, 18 May 2015 16:04:00 GMT"
}
] | 2015-05-19T00:00:00 | [
[
"Rokos",
"Georgios",
""
],
[
"Gorman",
"Gerard J.",
""
],
[
"Kelly",
"Paul H. J.",
""
]
] | TITLE: An Interrupt-Driven Work-Sharing For-Loop Scheduler
ABSTRACT: In this paper we present a parallel for-loop scheduler which is based on
work-stealing principles but runs under a completely cooperative scheme. POSIX
signals are used by idle threads to interrupt left-behind workers, which in
turn decide what portion of their workload can be given to the requester. We
call this scheme Interrupt-Driven Work-Sharing (IDWS). This article describes
how IDWS works, how it can be integrated into any POSIX-compliant OpenMP
implementation and how a user can manually replace OpenMP parallel for-loops
with IDWS in existing POSIX-compliant C++ applications. Additionally, we
measure its performance using both a synthetic benchmark with varying
distributions of workload across the iteration space and a real-life
application on Sandy Bridge and Xeon Phi systems. Regardless the workload
distribution and the underlying hardware, IDWS is always the best or among the
best-performing strategies, providing a good all-around solution to the
scheduling-choice dilemma.
|
1505.04198 | Matthias Poloczek | Bert Besser and Matthias Poloczek | Greedy Matching: Guarantees and Limitations | 29 pages, 8 figures | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Since Tinhofer proposed the MinGreedy algorithm for maximum cardinality
matching in 1984, several experimental studies found the randomized algorithm
to perform excellently for various classes of random graphs and benchmark
instances. In contrast, only few analytical results are known. We show that
MinGreedy cannot improve on the trivial approximation ratio 1/2 whp., even for
bipartite graphs. Our hard inputs seem to require a small number of high-degree
nodes.
This motivates an investigation of greedy algorithms on graphs with maximum
degree D: We show that MinGreedy achieves a (D-1)/(2D-3)-approximation for
graphs with D=3 and for D-regular graphs, and a guarantee of (D-1/2)/(2D-2) for
graphs with maximum degree D. Interestingly, our bounds even hold for the
deterministic MinGreedy that breaks all ties arbitrarily.
Moreover, we investigate the limitations of the greedy paradigm, using the
model of priority algorithms introduced by Borodin, Nielsen, and Rackoff. We
study deterministic priority algorithms and prove a
(D-1)/(2D-3)-inapproximability result for graphs with maximum degree D; thus,
these greedy algorithms do not achieve a 1/2+eps-approximation and in
particular the 2/3-approximation obtained by the deterministic MinGreedy for
D=3 is optimal in this class. For k-uniform hypergraphs we show a tight
1/k-inapproximability bound. We also study fully randomized priority algorithms
and give a 5/6-inapproximability bound. Thus, they cannot compete with matching
algorithms of other paradigms.
| [
{
"version": "v1",
"created": "Fri, 15 May 2015 20:26:21 GMT"
}
] | 2015-05-19T00:00:00 | [
[
"Besser",
"Bert",
""
],
[
"Poloczek",
"Matthias",
""
]
] | TITLE: Greedy Matching: Guarantees and Limitations
ABSTRACT: Since Tinhofer proposed the MinGreedy algorithm for maximum cardinality
matching in 1984, several experimental studies found the randomized algorithm
to perform excellently for various classes of random graphs and benchmark
instances. In contrast, only few analytical results are known. We show that
MinGreedy cannot improve on the trivial approximation ratio 1/2 whp., even for
bipartite graphs. Our hard inputs seem to require a small number of high-degree
nodes.
This motivates an investigation of greedy algorithms on graphs with maximum
degree D: We show that MinGreedy achieves a (D-1)/(2D-3)-approximation for
graphs with D=3 and for D-regular graphs, and a guarantee of (D-1/2)/(2D-2) for
graphs with maximum degree D. Interestingly, our bounds even hold for the
deterministic MinGreedy that breaks all ties arbitrarily.
Moreover, we investigate the limitations of the greedy paradigm, using the
model of priority algorithms introduced by Borodin, Nielsen, and Rackoff. We
study deterministic priority algorithms and prove a
(D-1)/(2D-3)-inapproximability result for graphs with maximum degree D; thus,
these greedy algorithms do not achieve a 1/2+eps-approximation and in
particular the 2/3-approximation obtained by the deterministic MinGreedy for
D=3 is optimal in this class. For k-uniform hypergraphs we show a tight
1/k-inapproximability bound. We also study fully randomized priority algorithms
and give a 5/6-inapproximability bound. Thus, they cannot compete with matching
algorithms of other paradigms.
|
1505.04243 | Paul Grigas | Robert M. Freund, Paul Grigas, Rahul Mazumder | A New Perspective on Boosting in Linear Regression via Subgradient
Optimization and Relatives | null | null | null | null | math.ST cs.LG math.OC stat.ML stat.TH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we analyze boosting algorithms in linear regression from a new
perspective: that of modern first-order methods in convex optimization. We show
that classic boosting algorithms in linear regression, namely the incremental
forward stagewise algorithm (FS$_\varepsilon$) and least squares boosting
(LS-Boost($\varepsilon$)), can be viewed as subgradient descent to minimize the
loss function defined as the maximum absolute correlation between the features
and residuals. We also propose a modification of FS$_\varepsilon$ that yields
an algorithm for the Lasso, and that may be easily extended to an algorithm
that computes the Lasso path for different values of the regularization
parameter. Furthermore, we show that these new algorithms for the Lasso may
also be interpreted as the same master algorithm (subgradient descent), applied
to a regularized version of the maximum absolute correlation loss function. We
derive novel, comprehensive computational guarantees for several boosting
algorithms in linear regression (including LS-Boost($\varepsilon$) and
FS$_\varepsilon$) by using techniques of modern first-order methods in convex
optimization. Our computational guarantees inform us about the statistical
properties of boosting algorithms. In particular they provide, for the first
time, a precise theoretical description of the amount of data-fidelity and
regularization imparted by running a boosting algorithm with a prespecified
learning rate for a fixed but arbitrary number of iterations, for any dataset.
| [
{
"version": "v1",
"created": "Sat, 16 May 2015 04:23:08 GMT"
}
] | 2015-05-19T00:00:00 | [
[
"Freund",
"Robert M.",
""
],
[
"Grigas",
"Paul",
""
],
[
"Mazumder",
"Rahul",
""
]
] | TITLE: A New Perspective on Boosting in Linear Regression via Subgradient
Optimization and Relatives
ABSTRACT: In this paper we analyze boosting algorithms in linear regression from a new
perspective: that of modern first-order methods in convex optimization. We show
that classic boosting algorithms in linear regression, namely the incremental
forward stagewise algorithm (FS$_\varepsilon$) and least squares boosting
(LS-Boost($\varepsilon$)), can be viewed as subgradient descent to minimize the
loss function defined as the maximum absolute correlation between the features
and residuals. We also propose a modification of FS$_\varepsilon$ that yields
an algorithm for the Lasso, and that may be easily extended to an algorithm
that computes the Lasso path for different values of the regularization
parameter. Furthermore, we show that these new algorithms for the Lasso may
also be interpreted as the same master algorithm (subgradient descent), applied
to a regularized version of the maximum absolute correlation loss function. We
derive novel, comprehensive computational guarantees for several boosting
algorithms in linear regression (including LS-Boost($\varepsilon$) and
FS$_\varepsilon$) by using techniques of modern first-order methods in convex
optimization. Our computational guarantees inform us about the statistical
properties of boosting algorithms. In particular they provide, for the first
time, a precise theoretical description of the amount of data-fidelity and
regularization imparted by running a boosting algorithm with a prespecified
learning rate for a fixed but arbitrary number of iterations, for any dataset.
|
1505.04286 | Harry Commin PhD | Harry Commin | Robust Real-time Extraction of Fiducial Facial Feature Points using
Haar-like Features | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we explore methods of robustly extracting fiducial facial
feature points - an important process for numerous facial image processing
tasks. We consider various methods to first detect face, then facial features
and finally salient facial feature points. Colour-based models are analysed and
their overall unsuitability for this task is summarised. The bulk of the report
is then dedicated to proposing a learning-based method centred on the
Viola-Jones algorithm. The specific difficulties and considerations relating to
feature point detection are laid out in this context and a novel approach is
established to address these issues. On a sequence of clear and unobstructed
face images, our proposed system achieves average detection rates of over 90%.
Then, using a more varied sample dataset, we identify some possible areas for
future development of our system.
| [
{
"version": "v1",
"created": "Sat, 16 May 2015 15:41:21 GMT"
}
] | 2015-05-19T00:00:00 | [
[
"Commin",
"Harry",
""
]
] | TITLE: Robust Real-time Extraction of Fiducial Facial Feature Points using
Haar-like Features
ABSTRACT: In this paper, we explore methods of robustly extracting fiducial facial
feature points - an important process for numerous facial image processing
tasks. We consider various methods to first detect face, then facial features
and finally salient facial feature points. Colour-based models are analysed and
their overall unsuitability for this task is summarised. The bulk of the report
is then dedicated to proposing a learning-based method centred on the
Viola-Jones algorithm. The specific difficulties and considerations relating to
feature point detection are laid out in this context and a novel approach is
established to address these issues. On a sequence of clear and unobstructed
face images, our proposed system achieves average detection rates of over 90%.
Then, using a more varied sample dataset, we identify some possible areas for
future development of our system.
|
1505.04366 | Seunghoon Hong | Hyeonwoo Noh, Seunghoon Hong, Bohyung Han | Learning Deconvolution Network for Semantic Segmentation | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose a novel semantic segmentation algorithm by learning a
deconvolution network. We learn the network on top of the convolutional layers
adopted from VGG 16-layer net. The deconvolution network is composed of
deconvolution and unpooling layers, which identify pixel-wise class labels and
predict segmentation masks. We apply the trained network to each proposal in an
input image, and construct the final semantic segmentation map by combining the
results from all proposals in a simple manner. The proposed algorithm mitigates
the limitations of the existing methods based on fully convolutional networks
by integrating deep deconvolution network and proposal-wise prediction; our
segmentation method typically identifies detailed structures and handles
objects in multiple scales naturally. Our network demonstrates outstanding
performance in PASCAL VOC 2012 dataset, and we achieve the best accuracy
(72.5%) among the methods trained with no external data through ensemble with
the fully convolutional network.
| [
{
"version": "v1",
"created": "Sun, 17 May 2015 07:33:28 GMT"
}
] | 2015-05-19T00:00:00 | [
[
"Noh",
"Hyeonwoo",
""
],
[
"Hong",
"Seunghoon",
""
],
[
"Han",
"Bohyung",
""
]
] | TITLE: Learning Deconvolution Network for Semantic Segmentation
ABSTRACT: We propose a novel semantic segmentation algorithm by learning a
deconvolution network. We learn the network on top of the convolutional layers
adopted from VGG 16-layer net. The deconvolution network is composed of
deconvolution and unpooling layers, which identify pixel-wise class labels and
predict segmentation masks. We apply the trained network to each proposal in an
input image, and construct the final semantic segmentation map by combining the
results from all proposals in a simple manner. The proposed algorithm mitigates
the limitations of the existing methods based on fully convolutional networks
by integrating deep deconvolution network and proposal-wise prediction; our
segmentation method typically identifies detailed structures and handles
objects in multiple scales naturally. Our network demonstrates outstanding
performance in PASCAL VOC 2012 dataset, and we achieve the best accuracy
(72.5%) among the methods trained with no external data through ensemble with
the fully convolutional network.
|
1505.04420 | Miryam de Lhoneux | Miryam de Lhoneux | CCG Parsing and Multiword Expressions | MSc thesis, The University of Edinburgh, 2014, School of Informatics,
MSc Artificial Intelligence | null | null | null | cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This thesis presents a study about the integration of information about
Multiword Expressions (MWEs) into parsing with Combinatory Categorial Grammar
(CCG). We build on previous work which has shown the benefit of adding
information about MWEs to syntactic parsing by implementing a similar pipeline
with CCG parsing. More specifically, we collapse MWEs to one token in training
and test data in CCGbank, a corpus which contains sentences annotated with CCG
derivations. Our collapsing algorithm however can only deal with MWEs when they
form a constituent in the data which is one of the limitations of our approach.
We study the effect of collapsing training and test data. A parsing effect
can be obtained if collapsed data help the parser in its decisions and a
training effect can be obtained if training on the collapsed data improves
results. We also collapse the gold standard and show that our model
significantly outperforms the baseline model on our gold standard, which
indicates that there is a training effect. We show that the baseline model
performs significantly better on our gold standard when the data are collapsed
before parsing than when the data are collapsed after parsing which indicates
that there is a parsing effect. We show that these results can lead to improved
performance on the non-collapsed standard benchmark although we fail to show
that it does so significantly. We conclude that despite the limited settings,
there are noticeable improvements from using MWEs in parsing. We discuss ways
in which the incorporation of MWEs into parsing can be improved and hypothesize
that this will lead to more substantial results.
We finally show that turning the MWE recognition part of the pipeline into an
experimental part is a useful thing to do as we obtain different results with
different recognizers.
| [
{
"version": "v1",
"created": "Sun, 17 May 2015 17:26:36 GMT"
}
] | 2015-05-19T00:00:00 | [
[
"de Lhoneux",
"Miryam",
""
]
] | TITLE: CCG Parsing and Multiword Expressions
ABSTRACT: This thesis presents a study about the integration of information about
Multiword Expressions (MWEs) into parsing with Combinatory Categorial Grammar
(CCG). We build on previous work which has shown the benefit of adding
information about MWEs to syntactic parsing by implementing a similar pipeline
with CCG parsing. More specifically, we collapse MWEs to one token in training
and test data in CCGbank, a corpus which contains sentences annotated with CCG
derivations. Our collapsing algorithm however can only deal with MWEs when they
form a constituent in the data which is one of the limitations of our approach.
We study the effect of collapsing training and test data. A parsing effect
can be obtained if collapsed data help the parser in its decisions and a
training effect can be obtained if training on the collapsed data improves
results. We also collapse the gold standard and show that our model
significantly outperforms the baseline model on our gold standard, which
indicates that there is a training effect. We show that the baseline model
performs significantly better on our gold standard when the data are collapsed
before parsing than when the data are collapsed after parsing which indicates
that there is a parsing effect. We show that these results can lead to improved
performance on the non-collapsed standard benchmark although we fail to show
that it does so significantly. We conclude that despite the limited settings,
there are noticeable improvements from using MWEs in parsing. We discuss ways
in which the incorporation of MWEs into parsing can be improved and hypothesize
that this will lead to more substantial results.
We finally show that turning the MWE recognition part of the pipeline into an
experimental part is a useful thing to do as we obtain different results with
different recognizers.
|
1505.04427 | Zhenzhong Lan | Zhenzhong Lan, Dezhong Yao, Ming Lin, Shoou-I Yu, Alexander Hauptmann | The Best of Both Worlds: Combining Data-independent and Data-driven
Approaches for Action Recognition | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Motivated by the success of data-driven convolutional neural networks (CNNs)
in object recognition on static images, researchers are working hard towards
developing CNN equivalents for learning video features. However, learning video
features globally has proven to be quite a challenge due to its high
dimensionality, the lack of labelled data and the difficulty in processing
large-scale video data. Therefore, we propose to leverage effective techniques
from both data-driven and data-independent approaches to improve action
recognition system.
Our contribution is three-fold. First, we propose a two-stream Stacked
Convolutional Independent Subspace Analysis (ConvISA) architecture to show that
unsupervised learning methods can significantly boost the performance of
traditional local features extracted from data-independent models. Second, we
demonstrate that by learning on video volumes detected by Improved Dense
Trajectory (IDT), we can seamlessly combine our novel local descriptors with
hand-crafted descriptors. Thus we can utilize available feature enhancing
techniques developed for hand-crafted descriptors. Finally, similar to
multi-class classification framework in CNNs, we propose a training-free
re-ranking technique that exploits the relationship among action classes to
improve the overall performance. Our experimental results on four benchmark
action recognition datasets show significantly improved performance.
| [
{
"version": "v1",
"created": "Sun, 17 May 2015 17:54:38 GMT"
}
] | 2015-05-19T00:00:00 | [
[
"Lan",
"Zhenzhong",
""
],
[
"Yao",
"Dezhong",
""
],
[
"Lin",
"Ming",
""
],
[
"Yu",
"Shoou-I",
""
],
[
"Hauptmann",
"Alexander",
""
]
] | TITLE: The Best of Both Worlds: Combining Data-independent and Data-driven
Approaches for Action Recognition
ABSTRACT: Motivated by the success of data-driven convolutional neural networks (CNNs)
in object recognition on static images, researchers are working hard towards
developing CNN equivalents for learning video features. However, learning video
features globally has proven to be quite a challenge due to its high
dimensionality, the lack of labelled data and the difficulty in processing
large-scale video data. Therefore, we propose to leverage effective techniques
from both data-driven and data-independent approaches to improve action
recognition system.
Our contribution is three-fold. First, we propose a two-stream Stacked
Convolutional Independent Subspace Analysis (ConvISA) architecture to show that
unsupervised learning methods can significantly boost the performance of
traditional local features extracted from data-independent models. Second, we
demonstrate that by learning on video volumes detected by Improved Dense
Trajectory (IDT), we can seamlessly combine our novel local descriptors with
hand-crafted descriptors. Thus we can utilize available feature enhancing
techniques developed for hand-crafted descriptors. Finally, similar to
multi-class classification framework in CNNs, we propose a training-free
re-ranking technique that exploits the relationship among action classes to
improve the overall performance. Our experimental results on four benchmark
action recognition datasets show significantly improved performance.
|
1505.04474 | Saurabh Gupta | Saurabh Gupta and Jitendra Malik | Visual Semantic Role Labeling | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we introduce the problem of Visual Semantic Role Labeling:
given an image we want to detect people doing actions and localize the objects
of interaction. Classical approaches to action recognition either study the
task of action classification at the image or video clip level or at best
produce a bounding box around the person doing the action. We believe such an
output is inadequate and a complete understanding can only come when we are
able to associate objects in the scene to the different semantic roles of the
action. To enable progress towards this goal, we annotate a dataset of 16K
people instances in 10K images with actions they are doing and associate
objects in the scene with different semantic roles for each action. Finally, we
provide a set of baseline algorithms for this task and analyze error modes
providing directions for future work.
| [
{
"version": "v1",
"created": "Sun, 17 May 2015 23:21:35 GMT"
}
] | 2015-05-19T00:00:00 | [
[
"Gupta",
"Saurabh",
""
],
[
"Malik",
"Jitendra",
""
]
] | TITLE: Visual Semantic Role Labeling
ABSTRACT: In this paper we introduce the problem of Visual Semantic Role Labeling:
given an image we want to detect people doing actions and localize the objects
of interaction. Classical approaches to action recognition either study the
task of action classification at the image or video clip level or at best
produce a bounding box around the person doing the action. We believe such an
output is inadequate and a complete understanding can only come when we are
able to associate objects in the scene to the different semantic roles of the
action. To enable progress towards this goal, we annotate a dataset of 16K
people instances in 10K images with actions they are doing and associate
objects in the scene with different semantic roles for each action. Finally, we
provide a set of baseline algorithms for this task and analyze error modes
providing directions for future work.
|
1505.04636 | Alex Smola J | Mu Li, Dave G. Andersen, Alexander J. Smola | Graph Partitioning via Parallel Submodular Approximation to Accelerate
Distributed Machine Learning | null | null | null | null | cs.DC cs.AI cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Distributed computing excels at processing large scale data, but the
communication cost for synchronizing the shared parameters may slow down the
overall performance. Fortunately, the interactions between parameter and data
in many problems are sparse, which admits efficient partition in order to
reduce the communication overhead.
In this paper, we formulate data placement as a graph partitioning problem.
We propose a distributed partitioning algorithm. We give both theoretical
guarantees and a highly efficient implementation. We also provide a highly
efficient implementation of the algorithm and demonstrate its promising results
on both text datasets and social networks. We show that the proposed algorithm
leads to 1.6x speedup of a state-of-the-start distributed machine learning
system by eliminating 90\% of the network communication.
| [
{
"version": "v1",
"created": "Mon, 18 May 2015 13:43:46 GMT"
}
] | 2015-05-19T00:00:00 | [
[
"Li",
"Mu",
""
],
[
"Andersen",
"Dave G.",
""
],
[
"Smola",
"Alexander J.",
""
]
] | TITLE: Graph Partitioning via Parallel Submodular Approximation to Accelerate
Distributed Machine Learning
ABSTRACT: Distributed computing excels at processing large scale data, but the
communication cost for synchronizing the shared parameters may slow down the
overall performance. Fortunately, the interactions between parameter and data
in many problems are sparse, which admits efficient partition in order to
reduce the communication overhead.
In this paper, we formulate data placement as a graph partitioning problem.
We propose a distributed partitioning algorithm. We give both theoretical
guarantees and a highly efficient implementation. We also provide a highly
efficient implementation of the algorithm and demonstrate its promising results
on both text datasets and social networks. We show that the proposed algorithm
leads to 1.6x speedup of a state-of-the-start distributed machine learning
system by eliminating 90\% of the network communication.
|
1003.1931 | Zi-Ke Zhang Mr. | Zi-Ke Zhang, Chuang Liu | Hypergraph model of social tagging networks | 7 pages,7 figures, 32 references | J. Stat. Mech. (2010) P100005 | 10.1088/1742-5468/2010/10/P10005 | null | physics.soc-ph cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The past few years have witnessed the great success of a new family of
paradigms, so-called folksonomy, which allows users to freely associate tags to
resources and efficiently manage them. In order to uncover the underlying
structures and user behaviors in folksonomy, in this paper, we propose an
evolutionary hypergrah model to explain the emerging statistical properties.
The present model introduces a novel mechanism that one can not only assign
tags to resources, but also retrieve resources via collaborative tags. We then
compare the model with a real-world dataset: \emph{Del.icio.us}. Indeed, the
present model shows considerable agreement with the empirical data in following
aspects: power-law hyperdegree distributions, negtive correlation between
clustering coefficients and hyperdegrees, and small average distances.
Furthermore, the model indicates that most tagging behaviors are motivated by
labeling tags to resources, and tags play a significant role in effectively
retrieving interesting resources and making acquaintance with congenial
friends. The proposed model may shed some light on the in-depth understanding
of the structure and function of folksonomy.
| [
{
"version": "v1",
"created": "Tue, 9 Mar 2010 17:03:41 GMT"
}
] | 2015-05-18T00:00:00 | [
[
"Zhang",
"Zi-Ke",
""
],
[
"Liu",
"Chuang",
""
]
] | TITLE: Hypergraph model of social tagging networks
ABSTRACT: The past few years have witnessed the great success of a new family of
paradigms, so-called folksonomy, which allows users to freely associate tags to
resources and efficiently manage them. In order to uncover the underlying
structures and user behaviors in folksonomy, in this paper, we propose an
evolutionary hypergrah model to explain the emerging statistical properties.
The present model introduces a novel mechanism that one can not only assign
tags to resources, but also retrieve resources via collaborative tags. We then
compare the model with a real-world dataset: \emph{Del.icio.us}. Indeed, the
present model shows considerable agreement with the empirical data in following
aspects: power-law hyperdegree distributions, negtive correlation between
clustering coefficients and hyperdegrees, and small average distances.
Furthermore, the model indicates that most tagging behaviors are motivated by
labeling tags to resources, and tags play a significant role in effectively
retrieving interesting resources and making acquaintance with congenial
friends. The proposed model may shed some light on the in-depth understanding
of the structure and function of folksonomy.
|
1306.1461 | Bob Sturm | Bob L. Sturm | The GTZAN dataset: Its contents, its faults, their effects on
evaluation, and its future use | 29 pages, 7 figures, 6 tables, 128 references | null | 10.1080/09298215.2014.894533 | null | cs.SD | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The GTZAN dataset appears in at least 100 published works, and is the
most-used public dataset for evaluation in machine listening research for music
genre recognition (MGR). Our recent work, however, shows GTZAN has several
faults (repetitions, mislabelings, and distortions), which challenge the
interpretability of any result derived using it. In this article, we disprove
the claims that all MGR systems are affected in the same ways by these faults,
and that the performances of MGR systems in GTZAN are still meaningfully
comparable since they all face the same faults. We identify and analyze the
contents of GTZAN, and provide a catalog of its faults. We review how GTZAN has
been used in MGR research, and find few indications that its faults have been
known and considered. Finally, we rigorously study the effects of its faults on
evaluating five different MGR systems. The lesson is not to banish GTZAN, but
to use it with consideration of its contents.
| [
{
"version": "v1",
"created": "Thu, 6 Jun 2013 16:30:44 GMT"
},
{
"version": "v2",
"created": "Fri, 7 Jun 2013 16:57:39 GMT"
}
] | 2015-05-18T00:00:00 | [
[
"Sturm",
"Bob L.",
""
]
] | TITLE: The GTZAN dataset: Its contents, its faults, their effects on
evaluation, and its future use
ABSTRACT: The GTZAN dataset appears in at least 100 published works, and is the
most-used public dataset for evaluation in machine listening research for music
genre recognition (MGR). Our recent work, however, shows GTZAN has several
faults (repetitions, mislabelings, and distortions), which challenge the
interpretability of any result derived using it. In this article, we disprove
the claims that all MGR systems are affected in the same ways by these faults,
and that the performances of MGR systems in GTZAN are still meaningfully
comparable since they all face the same faults. We identify and analyze the
contents of GTZAN, and provide a catalog of its faults. We review how GTZAN has
been used in MGR research, and find few indications that its faults have been
known and considered. Finally, we rigorously study the effects of its faults on
evaluating five different MGR systems. The lesson is not to banish GTZAN, but
to use it with consideration of its contents.
|
1505.03358 | Miriam Redi | Rossano Schifanella, Miriam Redi, Luca Aiello | An Image is Worth More than a Thousand Favorites: Surfacing the Hidden
Beauty of Flickr Pictures | ICWSM 2015 | null | null | null | cs.SI cs.CV cs.CY cs.MM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The dynamics of attention in social media tend to obey power laws. Attention
concentrates on a relatively small number of popular items and neglecting the
vast majority of content produced by the crowd. Although popularity can be an
indication of the perceived value of an item within its community, previous
research has hinted to the fact that popularity is distinct from intrinsic
quality. As a result, content with low visibility but high quality lurks in the
tail of the popularity distribution. This phenomenon can be particularly
evident in the case of photo-sharing communities, where valuable photographers
who are not highly engaged in online social interactions contribute with
high-quality pictures that remain unseen. We propose to use a computer vision
method to surface beautiful pictures from the immense pool of
near-zero-popularity items, and we test it on a large dataset of
creative-commons photos on Flickr. By gathering a large crowdsourced ground
truth of aesthetics scores for Flickr images, we show that our method retrieves
photos whose median perceived beauty score is equal to the most popular ones,
and whose average is lower by only 1.5%.
| [
{
"version": "v1",
"created": "Wed, 13 May 2015 12:40:24 GMT"
},
{
"version": "v2",
"created": "Fri, 15 May 2015 10:05:34 GMT"
}
] | 2015-05-18T00:00:00 | [
[
"Schifanella",
"Rossano",
""
],
[
"Redi",
"Miriam",
""
],
[
"Aiello",
"Luca",
""
]
] | TITLE: An Image is Worth More than a Thousand Favorites: Surfacing the Hidden
Beauty of Flickr Pictures
ABSTRACT: The dynamics of attention in social media tend to obey power laws. Attention
concentrates on a relatively small number of popular items and neglecting the
vast majority of content produced by the crowd. Although popularity can be an
indication of the perceived value of an item within its community, previous
research has hinted to the fact that popularity is distinct from intrinsic
quality. As a result, content with low visibility but high quality lurks in the
tail of the popularity distribution. This phenomenon can be particularly
evident in the case of photo-sharing communities, where valuable photographers
who are not highly engaged in online social interactions contribute with
high-quality pictures that remain unseen. We propose to use a computer vision
method to surface beautiful pictures from the immense pool of
near-zero-popularity items, and we test it on a large dataset of
creative-commons photos on Flickr. By gathering a large crowdsourced ground
truth of aesthetics scores for Flickr images, we show that our method retrieves
photos whose median perceived beauty score is equal to the most popular ones,
and whose average is lower by only 1.5%.
|
1505.03873 | Kevin Tang | Kevin Tang and Manohar Paluri and Li Fei-Fei and Rob Fergus and
Lubomir Bourdev | Improving Image Classification with Location Context | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | With the widespread availability of cellphones and cameras that have GPS
capabilities, it is common for images being uploaded to the Internet today to
have GPS coordinates associated with them. In addition to research that tries
to predict GPS coordinates from visual features, this also opens up the door to
problems that are conditioned on the availability of GPS coordinates. In this
work, we tackle the problem of performing image classification with location
context, in which we are given the GPS coordinates for images in both the train
and test phases. We explore different ways of encoding and extracting features
from the GPS coordinates, and show how to naturally incorporate these features
into a Convolutional Neural Network (CNN), the current state-of-the-art for
most image classification and recognition problems. We also show how it is
possible to simultaneously learn the optimal pooling radii for a subset of our
features within the CNN framework. To evaluate our model and to help promote
research in this area, we identify a set of location-sensitive concepts and
annotate a subset of the Yahoo Flickr Creative Commons 100M dataset that has
GPS coordinates with these concepts, which we make publicly available. By
leveraging location context, we are able to achieve almost a 7% gain in mean
average precision.
| [
{
"version": "v1",
"created": "Thu, 14 May 2015 20:13:34 GMT"
}
] | 2015-05-18T00:00:00 | [
[
"Tang",
"Kevin",
""
],
[
"Paluri",
"Manohar",
""
],
[
"Fei-Fei",
"Li",
""
],
[
"Fergus",
"Rob",
""
],
[
"Bourdev",
"Lubomir",
""
]
] | TITLE: Improving Image Classification with Location Context
ABSTRACT: With the widespread availability of cellphones and cameras that have GPS
capabilities, it is common for images being uploaded to the Internet today to
have GPS coordinates associated with them. In addition to research that tries
to predict GPS coordinates from visual features, this also opens up the door to
problems that are conditioned on the availability of GPS coordinates. In this
work, we tackle the problem of performing image classification with location
context, in which we are given the GPS coordinates for images in both the train
and test phases. We explore different ways of encoding and extracting features
from the GPS coordinates, and show how to naturally incorporate these features
into a Convolutional Neural Network (CNN), the current state-of-the-art for
most image classification and recognition problems. We also show how it is
possible to simultaneously learn the optimal pooling radii for a subset of our
features within the CNN framework. To evaluate our model and to help promote
research in this area, we identify a set of location-sensitive concepts and
annotate a subset of the Yahoo Flickr Creative Commons 100M dataset that has
GPS coordinates with these concepts, which we make publicly available. By
leveraging location context, we are able to achieve almost a 7% gain in mean
average precision.
|
1505.03899 | Josef Spjut | Jean Sung, Sebastian Krupa, Andrew Fishberg, Josef Spjut | An Approach to Data Prefetching Using 2-Dimensional Selection Criteria | 4 pages, 5 figures, submitted to Second Data Prefetching Championship | null | null | null | cs.AR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose an approach to data memory prefetching which augments the standard
prefetch buffer with selection criteria based on performance and usage pattern
of a given instruction. This approach is built on top of a pattern matching
based prefetcher, specifically one which can choose between a stream, a stride,
or a stream followed by a stride. We track the most recently called
instructions to make a decision on the quantity of data to prefetch next. The
decision is based on the frequency with which these instructions are called and
the hit/miss rate of the prefetcher. In our approach, we separate the amount of
data to prefetch into three categories: a high degree, a standard degree and a
low degree. We ran tests on different values for the high prefetch degree,
standard prefetch degree and low prefetch degree to determine that the most
optimal combination was 1, 4, 8 lines respectively. The 2 dimensional selection
criteria improved the performance of the prefetcher by up to 9.5% over the
first data prefetching championship winner. Unfortunately performance also fell
by as much as 14%, but remained similar on average across all of the benchmarks
we tested.
| [
{
"version": "v1",
"created": "Thu, 14 May 2015 21:57:26 GMT"
}
] | 2015-05-18T00:00:00 | [
[
"Sung",
"Jean",
""
],
[
"Krupa",
"Sebastian",
""
],
[
"Fishberg",
"Andrew",
""
],
[
"Spjut",
"Josef",
""
]
] | TITLE: An Approach to Data Prefetching Using 2-Dimensional Selection Criteria
ABSTRACT: We propose an approach to data memory prefetching which augments the standard
prefetch buffer with selection criteria based on performance and usage pattern
of a given instruction. This approach is built on top of a pattern matching
based prefetcher, specifically one which can choose between a stream, a stride,
or a stream followed by a stride. We track the most recently called
instructions to make a decision on the quantity of data to prefetch next. The
decision is based on the frequency with which these instructions are called and
the hit/miss rate of the prefetcher. In our approach, we separate the amount of
data to prefetch into three categories: a high degree, a standard degree and a
low degree. We ran tests on different values for the high prefetch degree,
standard prefetch degree and low prefetch degree to determine that the most
optimal combination was 1, 4, 8 lines respectively. The 2 dimensional selection
criteria improved the performance of the prefetcher by up to 9.5% over the
first data prefetching championship winner. Unfortunately performance also fell
by as much as 14%, but remained similar on average across all of the benchmarks
we tested.
|
1505.04098 | Kris Hauser | Kris Hauser and Yilun Zhou | Asymptotically Optimal Planning by Feasible Kinodynamic Planning in
State-Cost Space | null | null | null | null | cs.RO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper presents an equivalence between feasible kinodynamic planning and
optimal kinodynamic planning, in that any optimal planning problem can be
transformed into a series of feasible planning problems in a state-cost space
whose solutions approach the optimum. This transformation gives rise to a
meta-algorithm that produces an asymptotically optimal planner, given any
feasible kinodynamic planner as a subroutine. The meta-algorithm is proven to
be asymptotically optimal, and a formula is derived relating expected running
time and solution suboptimality. It is directly applicable to a wide range of
optimal planning problems because it does not resort to the use of steering
functions or numerical boundary-value problem solvers. On a set of benchmark
problems, it is demonstrated to perform, using the EST and RRT algorithms as
subroutines, at a superior or comparable level to related planners.
| [
{
"version": "v1",
"created": "Fri, 15 May 2015 15:39:58 GMT"
}
] | 2015-05-18T00:00:00 | [
[
"Hauser",
"Kris",
""
],
[
"Zhou",
"Yilun",
""
]
] | TITLE: Asymptotically Optimal Planning by Feasible Kinodynamic Planning in
State-Cost Space
ABSTRACT: This paper presents an equivalence between feasible kinodynamic planning and
optimal kinodynamic planning, in that any optimal planning problem can be
transformed into a series of feasible planning problems in a state-cost space
whose solutions approach the optimum. This transformation gives rise to a
meta-algorithm that produces an asymptotically optimal planner, given any
feasible kinodynamic planner as a subroutine. The meta-algorithm is proven to
be asymptotically optimal, and a formula is derived relating expected running
time and solution suboptimality. It is directly applicable to a wide range of
optimal planning problems because it does not resort to the use of steering
functions or numerical boundary-value problem solvers. On a set of benchmark
problems, it is demonstrated to perform, using the EST and RRT algorithms as
subroutines, at a superior or comparable level to related planners.
|
1503.03957 | Prabhjot Singh | Prabhjot Singh, Sumit Dhawan, Shubham Agarwal, Narina Thakur | Implementation of an efficient Fuzzy Logic based Information Retrieval
System | arXiv admin note: substantial text overlap with
http://ntz-develop.blogspot.in/ ,
http://www.micsymposium.org/mics2012/submissions/mics2012_submission_8.pdf ,
http://www.slideshare.net/JeffreyStricklandPhD/predictive-modeling-and-analytics-selectchapters-41304405
by other authors | null | null | null | cs.IR | http://creativecommons.org/licenses/by/3.0/ | This paper exemplifies the implementation of an efficient Information
Retrieval (IR) System to compute the similarity between a dataset and a query
using Fuzzy Logic. TREC dataset has been used for the same purpose. The dataset
is parsed to generate keywords index which is used for the similarity
comparison with the user query. Each query is assigned a score value based on
its fuzzy similarity with the index keywords. The relevant documents are
retrieved based on the score value. The performance and accuracy of the
proposed fuzzy similarity model is compared with Cosine similarity model using
Precision-Recall curves. The results prove the dominance of Fuzzy Similarity
based IR system.
| [
{
"version": "v1",
"created": "Fri, 13 Mar 2015 05:21:02 GMT"
}
] | 2015-05-15T00:00:00 | [
[
"Singh",
"Prabhjot",
""
],
[
"Dhawan",
"Sumit",
""
],
[
"Agarwal",
"Shubham",
""
],
[
"Thakur",
"Narina",
""
]
] | TITLE: Implementation of an efficient Fuzzy Logic based Information Retrieval
System
ABSTRACT: This paper exemplifies the implementation of an efficient Information
Retrieval (IR) System to compute the similarity between a dataset and a query
using Fuzzy Logic. TREC dataset has been used for the same purpose. The dataset
is parsed to generate keywords index which is used for the similarity
comparison with the user query. Each query is assigned a score value based on
its fuzzy similarity with the index keywords. The relevant documents are
retrieved based on the score value. The performance and accuracy of the
proposed fuzzy similarity model is compared with Cosine similarity model using
Precision-Recall curves. The results prove the dominance of Fuzzy Similarity
based IR system.
|
1504.05457 | Yury Kashnitsky | Yury Kashnitsky, Sergei O. Kuznetsov | Graphlet-based lazy associative graph classification | This paper has been withdrawn by the author due to the incomplete set
of necessary definitions and experiments | null | null | null | cs.DS cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The paper addresses the graph classification problem and introduces a
modification of the lazy associative classification method to efficiently
handle intersections of graphs. Graph intersections are approximated with all
common subgraphs up to a fixed size similarly to what is done with graphlet
kernels. We explain the idea of the algorithm with a toy example and describe
our experiments with a predictive toxicology dataset.
| [
{
"version": "v1",
"created": "Tue, 21 Apr 2015 15:12:45 GMT"
},
{
"version": "v2",
"created": "Wed, 13 May 2015 20:46:47 GMT"
}
] | 2015-05-15T00:00:00 | [
[
"Kashnitsky",
"Yury",
""
],
[
"Kuznetsov",
"Sergei O.",
""
]
] | TITLE: Graphlet-based lazy associative graph classification
ABSTRACT: The paper addresses the graph classification problem and introduces a
modification of the lazy associative classification method to efficiently
handle intersections of graphs. Graph intersections are approximated with all
common subgraphs up to a fixed size similarly to what is done with graphlet
kernels. We explain the idea of the algorithm with a toy example and describe
our experiments with a predictive toxicology dataset.
|
1505.03581 | Ali Borji | Ali Borji, Laurent Itti | CAT2000: A Large Scale Fixation Dataset for Boosting Saliency Research | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Saliency modeling has been an active research area in computer vision for
about two decades. Existing state of the art models perform very well in
predicting where people look in natural scenes. There is, however, the risk
that these models may have been overfitting themselves to available small scale
biased datasets, thus trapping the progress in a local minimum. To gain a
deeper insight regarding current issues in saliency modeling and to better
gauge progress, we recorded eye movements of 120 observers while they freely
viewed a large number of naturalistic and artificial images. Our stimuli
includes 4000 images; 200 from each of 20 categories covering different types
of scenes such as Cartoons, Art, Objects, Low resolution images, Indoor,
Outdoor, Jumbled, Random, and Line drawings. We analyze some basic properties
of this dataset and compare some successful models. We believe that our dataset
opens new challenges for the next generation of saliency models and helps
conduct behavioral studies on bottom-up visual attention.
| [
{
"version": "v1",
"created": "Thu, 14 May 2015 00:34:43 GMT"
}
] | 2015-05-15T00:00:00 | [
[
"Borji",
"Ali",
""
],
[
"Itti",
"Laurent",
""
]
] | TITLE: CAT2000: A Large Scale Fixation Dataset for Boosting Saliency Research
ABSTRACT: Saliency modeling has been an active research area in computer vision for
about two decades. Existing state of the art models perform very well in
predicting where people look in natural scenes. There is, however, the risk
that these models may have been overfitting themselves to available small scale
biased datasets, thus trapping the progress in a local minimum. To gain a
deeper insight regarding current issues in saliency modeling and to better
gauge progress, we recorded eye movements of 120 observers while they freely
viewed a large number of naturalistic and artificial images. Our stimuli
includes 4000 images; 200 from each of 20 categories covering different types
of scenes such as Cartoons, Art, Objects, Low resolution images, Indoor,
Outdoor, Jumbled, Random, and Line drawings. We analyze some basic properties
of this dataset and compare some successful models. We believe that our dataset
opens new challenges for the next generation of saliency models and helps
conduct behavioral studies on bottom-up visual attention.
|
0910.0767 | Serena Bradde | M. Bailly-Bechet, S. Bradde, A. Braunstein, A. Flaxman, L. Foini, R.
Zecchina | Clustering with shallow trees | 11 pages, 7 figures | J. Stat. Mech. (2009) P12010 | 10.1088/1742-5468/2009/12/P12010 | null | cond-mat.dis-nn cs.DS q-bio.QM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose a new method for hierarchical clustering based on the optimisation
of a cost function over trees of limited depth, and we derive a
message--passing method that allows to solve it efficiently. The method and
algorithm can be interpreted as a natural interpolation between two well-known
approaches, namely single linkage and the recently presented Affinity
Propagation. We analyze with this general scheme three biological/medical
structured datasets (human population based on genetic information, proteins
based on sequences and verbal autopsies) and show that the interpolation
technique provides new insight.
| [
{
"version": "v1",
"created": "Mon, 5 Oct 2009 14:13:25 GMT"
},
{
"version": "v2",
"created": "Mon, 23 Nov 2009 15:44:29 GMT"
}
] | 2015-05-14T00:00:00 | [
[
"Bailly-Bechet",
"M.",
""
],
[
"Bradde",
"S.",
""
],
[
"Braunstein",
"A.",
""
],
[
"Flaxman",
"A.",
""
],
[
"Foini",
"L.",
""
],
[
"Zecchina",
"R.",
""
]
] | TITLE: Clustering with shallow trees
ABSTRACT: We propose a new method for hierarchical clustering based on the optimisation
of a cost function over trees of limited depth, and we derive a
message--passing method that allows to solve it efficiently. The method and
algorithm can be interpreted as a natural interpolation between two well-known
approaches, namely single linkage and the recently presented Affinity
Propagation. We analyze with this general scheme three biological/medical
structured datasets (human population based on genetic information, proteins
based on sequences and verbal autopsies) and show that the interpolation
technique provides new insight.
|
0911.4416 | Arijit Laha Ph.D. | Arijit Laha, Nikhil R. Pal, and J. Das | Land cover classification using fuzzy rules and aggregation of
contextual information through evidence theory | 14 pages, 2 figures | IEEE Transactions on Geoscience and Remote Sensing, Vol. 44, No.
6, pp. 1633-1642, June 2006 | 10.1109/TGRS.2006.864391 | null | cs.CV cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Land cover classification using multispectral satellite image is a very
challenging task with numerous practical applications. We propose a multi-stage
classifier that involves fuzzy rule extraction from the training data and then
generation of a possibilistic label vector for each pixel using the fuzzy rule
base. To exploit the spatial correlation of land cover types we propose four
different information aggregation methods which use the possibilistic class
label of a pixel and those of its eight spatial neighbors for making the final
classification decision. Three of the aggregation methods use Dempster-Shafer
theory of evidence while the remaining one is modeled after the fuzzy k-NN
rule. The proposed methods are tested with two benchmark seven channel
satellite images and the results are found to be quite satisfactory. They are
also compared with a Markov random field (MRF) model-based contextual
classification method and found to perform consistently better.
| [
{
"version": "v1",
"created": "Mon, 23 Nov 2009 14:33:27 GMT"
}
] | 2015-05-14T00:00:00 | [
[
"Laha",
"Arijit",
""
],
[
"Pal",
"Nikhil R.",
""
],
[
"Das",
"J.",
""
]
] | TITLE: Land cover classification using fuzzy rules and aggregation of
contextual information through evidence theory
ABSTRACT: Land cover classification using multispectral satellite image is a very
challenging task with numerous practical applications. We propose a multi-stage
classifier that involves fuzzy rule extraction from the training data and then
generation of a possibilistic label vector for each pixel using the fuzzy rule
base. To exploit the spatial correlation of land cover types we propose four
different information aggregation methods which use the possibilistic class
label of a pixel and those of its eight spatial neighbors for making the final
classification decision. Three of the aggregation methods use Dempster-Shafer
theory of evidence while the remaining one is modeled after the fuzzy k-NN
rule. The proposed methods are tested with two benchmark seven channel
satellite images and the results are found to be quite satisfactory. They are
also compared with a Markov random field (MRF) model-based contextual
classification method and found to perform consistently better.
|
0912.2826 | Floriana Gargiulo | Floriana Gargiulo, Sonia Ternes, Sylvie Huet, Guillaume Deffuant | An iterative approach for generating statistically realistic populations
of households | 16 oages, 11 figures | null | 10.1371/journal.pone.0008828 | null | cs.MA cs.CY | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Background: Many different simulation frameworks, in different topics, need
to treat realistic datasets to initialize and calibrate the system. A precise
reproduction of initial states is extremely important to obtain reliable
forecast from the model. Methodology/Principal Findings: This paper proposes an
algorithm to create an artificial population where individuals are described by
their age, and are gathered in households respecting a variety of statistical
constraints (distribution of household types, sizes, age of household head,
difference of age between partners and among parents and children). Such a
population is often the initial state of microsimulation or (agent)
individual-based models. To get a realistic distribution of households is often
very important, because this distribution has an impact on the demographic
evolution. Usual techniques from microsimulation approach cross different
sources of aggregated data for generating individuals. In our case the number
of combinations of different households (types, sizes, age of participants)
makes it computationally difficult to use directly such methods. Hence we
developed a specific algorithm to make the problem more easily tractable.
Conclusions/Significance: We generate the populations of two pilot
municipalities in Auvergne region (France), to illustrate the approach. The
generated populations show a good agreement with the available statistical
datasets (not used for the generation) and are obtained in a reasonable
computational time.
| [
{
"version": "v1",
"created": "Tue, 15 Dec 2009 09:28:33 GMT"
}
] | 2015-05-14T00:00:00 | [
[
"Gargiulo",
"Floriana",
""
],
[
"Ternes",
"Sonia",
""
],
[
"Huet",
"Sylvie",
""
],
[
"Deffuant",
"Guillaume",
""
]
] | TITLE: An iterative approach for generating statistically realistic populations
of households
ABSTRACT: Background: Many different simulation frameworks, in different topics, need
to treat realistic datasets to initialize and calibrate the system. A precise
reproduction of initial states is extremely important to obtain reliable
forecast from the model. Methodology/Principal Findings: This paper proposes an
algorithm to create an artificial population where individuals are described by
their age, and are gathered in households respecting a variety of statistical
constraints (distribution of household types, sizes, age of household head,
difference of age between partners and among parents and children). Such a
population is often the initial state of microsimulation or (agent)
individual-based models. To get a realistic distribution of households is often
very important, because this distribution has an impact on the demographic
evolution. Usual techniques from microsimulation approach cross different
sources of aggregated data for generating individuals. In our case the number
of combinations of different households (types, sizes, age of participants)
makes it computationally difficult to use directly such methods. Hence we
developed a specific algorithm to make the problem more easily tractable.
Conclusions/Significance: We generate the populations of two pilot
municipalities in Auvergne region (France), to illustrate the approach. The
generated populations show a good agreement with the available statistical
datasets (not used for the generation) and are obtained in a reasonable
computational time.
|
1503.05214 | Tarek Elgamal | Tarek Elgamal, Mohamed Hefeeda | Analysis of PCA Algorithms in Distributed Environments | null | null | null | null | cs.DC cs.LG cs.NA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Classical machine learning algorithms often face scalability bottlenecks when
they are applied to large-scale data. Such algorithms were designed to work
with small data that is assumed to fit in the memory of one machine. In this
report, we analyze different methods for computing an important machine learing
algorithm, namely Principal Component Analysis (PCA), and we comment on its
limitations in supporting large datasets. The methods are analyzed and compared
across two important metrics: time complexity and communication complexity. We
consider the worst-case scenarios for both metrics, and we identify the
software libraries that implement each method. The analysis in this report
helps researchers and engineers in (i) understanding the main bottlenecks for
scalability in different PCA algorithms, (ii) choosing the most appropriate
method and software library for a given application and data set
characteristics, and (iii) designing new scalable PCA algorithms.
| [
{
"version": "v1",
"created": "Tue, 17 Mar 2015 20:38:15 GMT"
},
{
"version": "v2",
"created": "Wed, 13 May 2015 12:05:02 GMT"
}
] | 2015-05-14T00:00:00 | [
[
"Elgamal",
"Tarek",
""
],
[
"Hefeeda",
"Mohamed",
""
]
] | TITLE: Analysis of PCA Algorithms in Distributed Environments
ABSTRACT: Classical machine learning algorithms often face scalability bottlenecks when
they are applied to large-scale data. Such algorithms were designed to work
with small data that is assumed to fit in the memory of one machine. In this
report, we analyze different methods for computing an important machine learing
algorithm, namely Principal Component Analysis (PCA), and we comment on its
limitations in supporting large datasets. The methods are analyzed and compared
across two important metrics: time complexity and communication complexity. We
consider the worst-case scenarios for both metrics, and we identify the
software libraries that implement each method. The analysis in this report
helps researchers and engineers in (i) understanding the main bottlenecks for
scalability in different PCA algorithms, (ii) choosing the most appropriate
method and software library for a given application and data set
characteristics, and (iii) designing new scalable PCA algorithms.
|
1505.01919 | Puja Gupta | Puja Gupta | Characterization of Performance Anomalies in Hadoop | null | null | null | null | cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | With the huge variety of data and equally large-scale systems, there is not a
unique execution setting for these systems which can guarantee the best
performance for each query. In this project, we tried so study the impact of
different execution settings on execution time of workloads by varying them one
at a time. Using the data from these experiments, a decision tree was built
where each internal node represents the execution parameter, each branch
represents value chosen for the parameter and each leaf node represents a range
for execution time in minutes. The attribute in the decision tree to split the
dataset on is selected based on the maximum information gain or lowest entropy.
Once the tree is trained with the training samples, this tree can be used to
get approximate range for the expected execution time. When the actual
execution time differs from this expected value, a performance anomaly can be
detected. For a test dataset with 400 samples, 99% of samples had actual
execution time in the range predicted time by the decision tree. Also on
analyzing the constructed tree, an idea about what configuration can give
better performance for a given workload can be obtained. Initial experiments
suggest that the impact an execution parameter can have on the target attribute
(here execution time) can be related to the distance of that feature node from
the root of the constructed decision tree. From initial results the percent
change in the values of the target attribute for various value of the feature
node which is closer to the root is 6 times larger than when that same iii
feature node is away from the root node. This observation will depend on how
well the decision tree was trained and may not be true for every case.
| [
{
"version": "v1",
"created": "Fri, 8 May 2015 03:24:33 GMT"
},
{
"version": "v2",
"created": "Wed, 13 May 2015 03:50:26 GMT"
}
] | 2015-05-14T00:00:00 | [
[
"Gupta",
"Puja",
""
]
] | TITLE: Characterization of Performance Anomalies in Hadoop
ABSTRACT: With the huge variety of data and equally large-scale systems, there is not a
unique execution setting for these systems which can guarantee the best
performance for each query. In this project, we tried so study the impact of
different execution settings on execution time of workloads by varying them one
at a time. Using the data from these experiments, a decision tree was built
where each internal node represents the execution parameter, each branch
represents value chosen for the parameter and each leaf node represents a range
for execution time in minutes. The attribute in the decision tree to split the
dataset on is selected based on the maximum information gain or lowest entropy.
Once the tree is trained with the training samples, this tree can be used to
get approximate range for the expected execution time. When the actual
execution time differs from this expected value, a performance anomaly can be
detected. For a test dataset with 400 samples, 99% of samples had actual
execution time in the range predicted time by the decision tree. Also on
analyzing the constructed tree, an idea about what configuration can give
better performance for a given workload can be obtained. Initial experiments
suggest that the impact an execution parameter can have on the target attribute
(here execution time) can be related to the distance of that feature node from
the root of the constructed decision tree. From initial results the percent
change in the values of the target attribute for various value of the feature
node which is closer to the root is 6 times larger than when that same iii
feature node is away from the root node. This observation will depend on how
well the decision tree was trained and may not be true for every case.
|
1505.02212 | Yakir Reshef | Yakir A. Reshef, David N. Reshef, Pardis C. Sabeti, Michael M.
Mitzenmacher | Equitability, interval estimation, and statistical power | Yakir A. Reshef and David N. Reshef are co-first authors, Pardis C.
Sabeti and Michael M. Mitzenmacher are co-last authors. This paper, together
with arXiv:1505.02212, subsumes arXiv:1408.4908 | null | null | null | math.ST cs.LG q-bio.QM stat.ME stat.ML stat.TH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | For analysis of a high-dimensional dataset, a common approach is to test a
null hypothesis of statistical independence on all variable pairs using a
non-parametric measure of dependence. However, because this approach attempts
to identify any non-trivial relationship no matter how weak, it often
identifies too many relationships to be useful. What is needed is a way of
identifying a smaller set of relationships that merit detailed further
analysis.
Here we formally present and characterize equitability, a property of
measures of dependence that aims to overcome this challenge. Notionally, an
equitable statistic is a statistic that, given some measure of noise, assigns
similar scores to equally noisy relationships of different types [Reshef et al.
2011]. We begin by formalizing this idea via a new object called the
interpretable interval, which functions as an interval estimate of the amount
of noise in a relationship of unknown type. We define an equitable statistic as
one with small interpretable intervals.
We then draw on the equivalence of interval estimation and hypothesis testing
to show that under moderate assumptions an equitable statistic is one that
yields well powered tests for distinguishing not only between trivial and
non-trivial relationships of all kinds but also between non-trivial
relationships of different strengths. This means that equitability allows us to
specify a threshold relationship strength $x_0$ and to search for relationships
of all kinds with strength greater than $x_0$. Thus, equitability can be
thought of as a strengthening of power against independence that enables
fruitful analysis of data sets with a small number of strong, interesting
relationships and a large number of weaker ones. We conclude with a
demonstration of how our two equivalent characterizations of equitability can
be used to evaluate the equitability of a statistic in practice.
| [
{
"version": "v1",
"created": "Sat, 9 May 2015 00:31:23 GMT"
},
{
"version": "v2",
"created": "Tue, 12 May 2015 20:05:17 GMT"
}
] | 2015-05-14T00:00:00 | [
[
"Reshef",
"Yakir A.",
""
],
[
"Reshef",
"David N.",
""
],
[
"Sabeti",
"Pardis C.",
""
],
[
"Mitzenmacher",
"Michael M.",
""
]
] | TITLE: Equitability, interval estimation, and statistical power
ABSTRACT: For analysis of a high-dimensional dataset, a common approach is to test a
null hypothesis of statistical independence on all variable pairs using a
non-parametric measure of dependence. However, because this approach attempts
to identify any non-trivial relationship no matter how weak, it often
identifies too many relationships to be useful. What is needed is a way of
identifying a smaller set of relationships that merit detailed further
analysis.
Here we formally present and characterize equitability, a property of
measures of dependence that aims to overcome this challenge. Notionally, an
equitable statistic is a statistic that, given some measure of noise, assigns
similar scores to equally noisy relationships of different types [Reshef et al.
2011]. We begin by formalizing this idea via a new object called the
interpretable interval, which functions as an interval estimate of the amount
of noise in a relationship of unknown type. We define an equitable statistic as
one with small interpretable intervals.
We then draw on the equivalence of interval estimation and hypothesis testing
to show that under moderate assumptions an equitable statistic is one that
yields well powered tests for distinguishing not only between trivial and
non-trivial relationships of all kinds but also between non-trivial
relationships of different strengths. This means that equitability allows us to
specify a threshold relationship strength $x_0$ and to search for relationships
of all kinds with strength greater than $x_0$. Thus, equitability can be
thought of as a strengthening of power against independence that enables
fruitful analysis of data sets with a small number of strong, interesting
relationships and a large number of weaker ones. We conclude with a
demonstration of how our two equivalent characterizations of equitability can
be used to evaluate the equitability of a statistic in practice.
|
1505.02867 | Charles Mathy | Charles Mathy, Nate Derbinsky, Jos\'e Bento, Jonathan Rosenthal and
Jonathan Yedidia | The Boundary Forest Algorithm for Online Supervised and Unsupervised
Learning | 7 pages, 4 figs, 1 page supp. info | Proc. of the 29th AAAI Conference on Artificial Intelligence
(AAAI), 2864-2870. Austin, TX, USA. (2015) | null | null | cs.LG cs.DS cs.IR stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We describe a new instance-based learning algorithm called the Boundary
Forest (BF) algorithm, that can be used for supervised and unsupervised
learning. The algorithm builds a forest of trees whose nodes store previously
seen examples. It can be shown data points one at a time and updates itself
incrementally, hence it is naturally online. Few instance-based algorithms have
this property while being simultaneously fast, which the BF is. This is crucial
for applications where one needs to respond to input data in real time. The
number of children of each node is not set beforehand but obtained from the
training procedure, which makes the algorithm very flexible with regards to
what data manifolds it can learn. We test its generalization performance and
speed on a range of benchmark datasets and detail in which settings it
outperforms the state of the art. Empirically we find that training time scales
as O(DNlog(N)) and testing as O(Dlog(N)), where D is the dimensionality and N
the amount of data,
| [
{
"version": "v1",
"created": "Tue, 12 May 2015 03:45:11 GMT"
}
] | 2015-05-14T00:00:00 | [
[
"Mathy",
"Charles",
""
],
[
"Derbinsky",
"Nate",
""
],
[
"Bento",
"José",
""
],
[
"Rosenthal",
"Jonathan",
""
],
[
"Yedidia",
"Jonathan",
""
]
] | TITLE: The Boundary Forest Algorithm for Online Supervised and Unsupervised
Learning
ABSTRACT: We describe a new instance-based learning algorithm called the Boundary
Forest (BF) algorithm, that can be used for supervised and unsupervised
learning. The algorithm builds a forest of trees whose nodes store previously
seen examples. It can be shown data points one at a time and updates itself
incrementally, hence it is naturally online. Few instance-based algorithms have
this property while being simultaneously fast, which the BF is. This is crucial
for applications where one needs to respond to input data in real time. The
number of children of each node is not set beforehand but obtained from the
training procedure, which makes the algorithm very flexible with regards to
what data manifolds it can learn. We test its generalization performance and
speed on a range of benchmark datasets and detail in which settings it
outperforms the state of the art. Empirically we find that training time scales
as O(DNlog(N)) and testing as O(Dlog(N)), where D is the dimensionality and N
the amount of data,
|
1505.02973 | Konstantinos Tserpes | Evangelos Psomakelis, Konstantinos Tserpes, Dimosthenis
Anagnostopoulos, Theodora Varvarigou | Comparing methods for Twitter Sentiment Analysis | 5 pages, 1 figure, 6th Conference on Knowledge Discovery and
Information Retrieval 2014, Rome, Italy | null | null | null | cs.CL cs.IR cs.SI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This work extends the set of works which deal with the popular problem of
sentiment analysis in Twitter. It investigates the most popular document
("tweet") representation methods which feed sentiment evaluation mechanisms. In
particular, we study the bag-of-words, n-grams and n-gram graphs approaches and
for each of them we evaluate the performance of a lexicon-based and 7
learning-based classification algorithms (namely SVM, Na\"ive Bayesian
Networks, Logistic Regression, Multilayer Perceptrons, Best-First Trees,
Functional Trees and C4.5) as well as their combinations, using a set of 4451
manually annotated tweets. The results demonstrate the superiority of
learning-based methods and in particular of n-gram graphs approaches for
predicting the sentiment of tweets. They also show that the combinatory
approach has impressive effects on n-grams, raising the confidence up to 83.15%
on the 5-Grams, using majority vote and a balanced dataset (equal number of
positive, negative and neutral tweets for training). In the n-gram graph cases
the improvement was small to none, reaching 94.52% on the 4-gram graphs, using
Orthodromic distance and a threshold of 0.001.
| [
{
"version": "v1",
"created": "Tue, 12 May 2015 12:05:19 GMT"
}
] | 2015-05-14T00:00:00 | [
[
"Psomakelis",
"Evangelos",
""
],
[
"Tserpes",
"Konstantinos",
""
],
[
"Anagnostopoulos",
"Dimosthenis",
""
],
[
"Varvarigou",
"Theodora",
""
]
] | TITLE: Comparing methods for Twitter Sentiment Analysis
ABSTRACT: This work extends the set of works which deal with the popular problem of
sentiment analysis in Twitter. It investigates the most popular document
("tweet") representation methods which feed sentiment evaluation mechanisms. In
particular, we study the bag-of-words, n-grams and n-gram graphs approaches and
for each of them we evaluate the performance of a lexicon-based and 7
learning-based classification algorithms (namely SVM, Na\"ive Bayesian
Networks, Logistic Regression, Multilayer Perceptrons, Best-First Trees,
Functional Trees and C4.5) as well as their combinations, using a set of 4451
manually annotated tweets. The results demonstrate the superiority of
learning-based methods and in particular of n-gram graphs approaches for
predicting the sentiment of tweets. They also show that the combinatory
approach has impressive effects on n-grams, raising the confidence up to 83.15%
on the 5-Grams, using majority vote and a balanced dataset (equal number of
positive, negative and neutral tweets for training). In the n-gram graph cases
the improvement was small to none, reaching 94.52% on the 4-gram graphs, using
Orthodromic distance and a threshold of 0.001.
|
1505.03229 | Ikuro Sato | Ikuro Sato, Hiroki Nishimura, Kensuke Yokoi | APAC: Augmented PAttern Classification with Neural Networks | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Deep neural networks have been exhibiting splendid accuracies in many of
visual pattern classification problems. Many of the state-of-the-art methods
employ a technique known as data augmentation at the training stage. This paper
addresses an issue of decision rule for classifiers trained with augmented
data. Our method is named as APAC: the Augmented PAttern Classification, which
is a way of classification using the optimal decision rule for augmented data
learning. Discussion of methods of data augmentation is not our primary focus.
We show clear evidences that APAC gives far better generalization performance
than the traditional way of class prediction in several experiments. Our
convolutional neural network model with APAC achieved a state-of-the-art
accuracy on the MNIST dataset among non-ensemble classifiers. Even our
multilayer perceptron model beats some of the convolutional models with
recently invented stochastic regularization techniques on the CIFAR-10 dataset.
| [
{
"version": "v1",
"created": "Wed, 13 May 2015 03:33:29 GMT"
}
] | 2015-05-14T00:00:00 | [
[
"Sato",
"Ikuro",
""
],
[
"Nishimura",
"Hiroki",
""
],
[
"Yokoi",
"Kensuke",
""
]
] | TITLE: APAC: Augmented PAttern Classification with Neural Networks
ABSTRACT: Deep neural networks have been exhibiting splendid accuracies in many of
visual pattern classification problems. Many of the state-of-the-art methods
employ a technique known as data augmentation at the training stage. This paper
addresses an issue of decision rule for classifiers trained with augmented
data. Our method is named as APAC: the Augmented PAttern Classification, which
is a way of classification using the optimal decision rule for augmented data
learning. Discussion of methods of data augmentation is not our primary focus.
We show clear evidences that APAC gives far better generalization performance
than the traditional way of class prediction in several experiments. Our
convolutional neural network model with APAC achieved a state-of-the-art
accuracy on the MNIST dataset among non-ensemble classifiers. Even our
multilayer perceptron model beats some of the convolutional models with
recently invented stochastic regularization techniques on the CIFAR-10 dataset.
|
1505.03236 | Jensi | R. Jensi and G. Wiselin Jiji | Hybrid data clustering approach using K-Means and Flower Pollination
Algorithm | 11 pages, Journal. Advanced Computational Intelligence: An
International Journal (ACII), Vol.2, No.2, April 2015 | null | null | null | cs.LG cs.IR cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Data clustering is a technique for clustering set of objects into known
number of groups. Several approaches are widely applied to data clustering so
that objects within the clusters are similar and objects in different clusters
are far away from each other. K-Means, is one of the familiar center based
clustering algorithms since implementation is very easy and fast convergence.
However, K-Means algorithm suffers from initialization, hence trapped in local
optima. Flower Pollination Algorithm (FPA) is the global optimization
technique, which avoids trapping in local optimum solution. In this paper, a
novel hybrid data clustering approach using Flower Pollination Algorithm and
K-Means (FPAKM) is proposed. The proposed algorithm results are compared with
K-Means and FPA on eight datasets. From the experimental results, FPAKM is
better than FPA and K-Means.
| [
{
"version": "v1",
"created": "Wed, 13 May 2015 04:24:50 GMT"
}
] | 2015-05-14T00:00:00 | [
[
"Jensi",
"R.",
""
],
[
"Jiji",
"G. Wiselin",
""
]
] | TITLE: Hybrid data clustering approach using K-Means and Flower Pollination
Algorithm
ABSTRACT: Data clustering is a technique for clustering set of objects into known
number of groups. Several approaches are widely applied to data clustering so
that objects within the clusters are similar and objects in different clusters
are far away from each other. K-Means, is one of the familiar center based
clustering algorithms since implementation is very easy and fast convergence.
However, K-Means algorithm suffers from initialization, hence trapped in local
optima. Flower Pollination Algorithm (FPA) is the global optimization
technique, which avoids trapping in local optimum solution. In this paper, a
novel hybrid data clustering approach using Flower Pollination Algorithm and
K-Means (FPAKM) is proposed. The proposed algorithm results are compared with
K-Means and FPA on eight datasets. From the experimental results, FPAKM is
better than FPA and K-Means.
|
1505.03329 | Jelena Milosevic | Jelena Milosevic, Alberto Ferrante, Miroslaw Malek | A general practitioner or a specialist for your infected smartphone? | 2 pages poster, IEEE Symposium on Security and Privacy, San Jose,
USA, May 2015 | null | null | null | cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | With explosive growth in the number of mobile devices, the mobile malware is
rapidly spreading as well, and the number of encountered malware families is
increasing. Existing solutions, which are mainly based on one malware detector
running on the phone or in the cloud, are no longer effective. Main problem
lies in the fact that it might be impossible to create a unique mobile malware
detector that would be able to detect different malware families with high
accuracy, being at the same time lightweight enough not to drain battery
quickly and fast enough to give results of detection promptly. The proposed
approach to mobile malware detection is analogous to general practitioner
versus specialist approach to dealing with a medical problem. Similarly to a
general practitioner that, based on indicative symptoms identifies potential
illnesses and sends the patient to an appropriate specialist, our detection
system distinguishes among symptoms representing different malware families
and, once the symptoms are detected, it triggers specific analyses. A system
monitoring application operates in the same way as a general practitioner. It
is able to distinguish between different symptoms and trigger appropriate
detection mechanisms. As an analogy to different specialists, an ensemble of
detectors, each of which specifically trained for a particular malware family,
is used. The main challenge of the approach is to define representative
symptoms of different malware families and train detectors accordingly to them.
The main goal of the poster is to foster discussion on the most representative
symptoms of different malware families and to discuss initial results in this
area obtained by using Malware Genome project dataset.
| [
{
"version": "v1",
"created": "Wed, 13 May 2015 11:09:52 GMT"
}
] | 2015-05-14T00:00:00 | [
[
"Milosevic",
"Jelena",
""
],
[
"Ferrante",
"Alberto",
""
],
[
"Malek",
"Miroslaw",
""
]
] | TITLE: A general practitioner or a specialist for your infected smartphone?
ABSTRACT: With explosive growth in the number of mobile devices, the mobile malware is
rapidly spreading as well, and the number of encountered malware families is
increasing. Existing solutions, which are mainly based on one malware detector
running on the phone or in the cloud, are no longer effective. Main problem
lies in the fact that it might be impossible to create a unique mobile malware
detector that would be able to detect different malware families with high
accuracy, being at the same time lightweight enough not to drain battery
quickly and fast enough to give results of detection promptly. The proposed
approach to mobile malware detection is analogous to general practitioner
versus specialist approach to dealing with a medical problem. Similarly to a
general practitioner that, based on indicative symptoms identifies potential
illnesses and sends the patient to an appropriate specialist, our detection
system distinguishes among symptoms representing different malware families
and, once the symptoms are detected, it triggers specific analyses. A system
monitoring application operates in the same way as a general practitioner. It
is able to distinguish between different symptoms and trigger appropriate
detection mechanisms. As an analogy to different specialists, an ensemble of
detectors, each of which specifically trained for a particular malware family,
is used. The main challenge of the approach is to define representative
symptoms of different malware families and train detectors accordingly to them.
The main goal of the poster is to foster discussion on the most representative
symptoms of different malware families and to discuss initial results in this
area obtained by using Malware Genome project dataset.
|
0812.0743 | Qiang Li | Qiang Li, Yan He, Jing-ping Jiang | A Novel Clustering Algorithm Based on Quantum Games | 19 pages, 5 figures, 5 tables | 2009 J. Phys. A: Math. Theor. 42 445303 | 10.1088/1751-8113/42/44/445303 | null | cs.LG cs.AI cs.CV cs.GT cs.MA cs.NE quant-ph | http://creativecommons.org/licenses/by-nc-sa/3.0/ | Enormous successes have been made by quantum algorithms during the last
decade. In this paper, we combine the quantum game with the problem of data
clustering, and then develop a quantum-game-based clustering algorithm, in
which data points in a dataset are considered as players who can make decisions
and implement quantum strategies in quantum games. After each round of a
quantum game, each player's expected payoff is calculated. Later, he uses a
link-removing-and-rewiring (LRR) function to change his neighbors and adjust
the strength of links connecting to them in order to maximize his payoff.
Further, algorithms are discussed and analyzed in two cases of strategies, two
payoff matrixes and two LRR functions. Consequently, the simulation results
have demonstrated that data points in datasets are clustered reasonably and
efficiently, and the clustering algorithms have fast rates of convergence.
Moreover, the comparison with other algorithms also provides an indication of
the effectiveness of the proposed approach.
| [
{
"version": "v1",
"created": "Wed, 3 Dec 2008 15:46:03 GMT"
},
{
"version": "v2",
"created": "Sat, 10 Oct 2009 09:10:36 GMT"
}
] | 2015-05-13T00:00:00 | [
[
"Li",
"Qiang",
""
],
[
"He",
"Yan",
""
],
[
"Jiang",
"Jing-ping",
""
]
] | TITLE: A Novel Clustering Algorithm Based on Quantum Games
ABSTRACT: Enormous successes have been made by quantum algorithms during the last
decade. In this paper, we combine the quantum game with the problem of data
clustering, and then develop a quantum-game-based clustering algorithm, in
which data points in a dataset are considered as players who can make decisions
and implement quantum strategies in quantum games. After each round of a
quantum game, each player's expected payoff is calculated. Later, he uses a
link-removing-and-rewiring (LRR) function to change his neighbors and adjust
the strength of links connecting to them in order to maximize his payoff.
Further, algorithms are discussed and analyzed in two cases of strategies, two
payoff matrixes and two LRR functions. Consequently, the simulation results
have demonstrated that data points in datasets are clustered reasonably and
efficiently, and the clustering algorithms have fast rates of convergence.
Moreover, the comparison with other algorithms also provides an indication of
the effectiveness of the proposed approach.
|
0906.2914 | Michal Zerola | Michal Zerola, J\'er\^ome Lauret, Roman Bart\'ak and Michal
\v{S}umbera | Efficient Multi-site Data Movement Using Constraint Programming for Data
Hungry Science | To appear in proceedings of Computing in High Energy and Nuclear
Physics 2009 | null | 10.1088/1742-6596/219/6/062069 | null | cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | For the past decade, HENP experiments have been heading towards a distributed
computing model in an effort to concurrently process tasks over enormous data
sets that have been increasing in size as a function of time. In order to
optimize all available resources (geographically spread) and minimize the
processing time, it is necessary to face also the question of efficient data
transfers and placements. A key question is whether the time penalty for moving
the data to the computational resources is worth the presumed gain. Onward to
the truly distributed task scheduling we present the technique using a
Constraint Programming (CP) approach. The CP technique schedules data transfers
from multiple resources considering all available paths of diverse
characteristic (capacity, sharing and storage) having minimum user's waiting
time as an objective. We introduce a model for planning data transfers to a
single destination (data transfer) as well as its extension for an optimal data
set spreading strategy (data placement). Several enhancements for a solver of
the CP model will be shown, leading to a faster schedule computation time using
symmetry breaking, branch cutting, well studied principles from job-shop
scheduling field and several heuristics. Finally, we will present the design
and implementation of a corner-stone application aimed at moving datasets
according to the schedule. Results will include comparison of performance and
trade-off between CP techniques and a Peer-2-Peer model from simulation
framework as well as the real case scenario taken from a practical usage of a
CP scheduler.
| [
{
"version": "v1",
"created": "Tue, 16 Jun 2009 12:33:25 GMT"
},
{
"version": "v2",
"created": "Thu, 18 Jun 2009 19:20:05 GMT"
}
] | 2015-05-13T00:00:00 | [
[
"Zerola",
"Michal",
""
],
[
"Lauret",
"Jérôme",
""
],
[
"Barták",
"Roman",
""
],
[
"Šumbera",
"Michal",
""
]
] | TITLE: Efficient Multi-site Data Movement Using Constraint Programming for Data
Hungry Science
ABSTRACT: For the past decade, HENP experiments have been heading towards a distributed
computing model in an effort to concurrently process tasks over enormous data
sets that have been increasing in size as a function of time. In order to
optimize all available resources (geographically spread) and minimize the
processing time, it is necessary to face also the question of efficient data
transfers and placements. A key question is whether the time penalty for moving
the data to the computational resources is worth the presumed gain. Onward to
the truly distributed task scheduling we present the technique using a
Constraint Programming (CP) approach. The CP technique schedules data transfers
from multiple resources considering all available paths of diverse
characteristic (capacity, sharing and storage) having minimum user's waiting
time as an objective. We introduce a model for planning data transfers to a
single destination (data transfer) as well as its extension for an optimal data
set spreading strategy (data placement). Several enhancements for a solver of
the CP model will be shown, leading to a faster schedule computation time using
symmetry breaking, branch cutting, well studied principles from job-shop
scheduling field and several heuristics. Finally, we will present the design
and implementation of a corner-stone application aimed at moving datasets
according to the schedule. Results will include comparison of performance and
trade-off between CP techniques and a Peer-2-Peer model from simulation
framework as well as the real case scenario taken from a practical usage of a
CP scheduler.
|
0907.1228 | Jianguo Liu | Jian-Guo Liu, Tao Zhou, Zhao-Guo Xuan, Hong-An Che, Bing-Hong Wang,
Yi-Cheng Zhang | Degree correlation effect of bipartite network on personalized
recommendation | 9 pages, 3 figures | IJMPC 21(01) 2010 137-147 | 10.1142/S0129183110014999 | null | physics.data-an cs.IR physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, by introducing a new user similarity index base on the
diffusion process, we propose a modified collaborative filtering (MCF)
algorithm, which has remarkably higher accuracy than the standard collaborative
filtering. In the proposed algorithm, the degree correlation between users and
objects is taken into account and embedded into the similarity index by a
tunable parameter. The numerical simulation on a benchmark data set shows that
the algorithmic accuracy of the MCF, measured by the average ranking score, is
further improved by 18.19% in the optimal case. In addition, two significant
criteria of algorithmic performance, diversity and popularity, are also taken
into account. Numerical results show that the presented algorithm can provide
more diverse and less popular recommendations, for example, when the
recommendation list contains 10 objects, the diversity, measured by the hamming
distance, is improved by 21.90%.
| [
{
"version": "v1",
"created": "Tue, 7 Jul 2009 14:20:47 GMT"
}
] | 2015-05-13T00:00:00 | [
[
"Liu",
"Jian-Guo",
""
],
[
"Zhou",
"Tao",
""
],
[
"Xuan",
"Zhao-Guo",
""
],
[
"Che",
"Hong-An",
""
],
[
"Wang",
"Bing-Hong",
""
],
[
"Zhang",
"Yi-Cheng",
""
]
] | TITLE: Degree correlation effect of bipartite network on personalized
recommendation
ABSTRACT: In this paper, by introducing a new user similarity index base on the
diffusion process, we propose a modified collaborative filtering (MCF)
algorithm, which has remarkably higher accuracy than the standard collaborative
filtering. In the proposed algorithm, the degree correlation between users and
objects is taken into account and embedded into the similarity index by a
tunable parameter. The numerical simulation on a benchmark data set shows that
the algorithmic accuracy of the MCF, measured by the average ranking score, is
further improved by 18.19% in the optimal case. In addition, two significant
criteria of algorithmic performance, diversity and popularity, are also taken
into account. Numerical results show that the presented algorithm can provide
more diverse and less popular recommendations, for example, when the
recommendation list contains 10 objects, the diversity, measured by the hamming
distance, is improved by 21.90%.
|
1412.6071 | Benjamin Graham | Benjamin Graham | Fractional Max-Pooling | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Convolutional networks almost always incorporate some form of spatial
pooling, and very often it is alpha times alpha max-pooling with alpha=2.
Max-pooling act on the hidden layers of the network, reducing their size by an
integer multiplicative factor alpha. The amazing by-product of discarding 75%
of your data is that you build into the network a degree of invariance with
respect to translations and elastic distortions. However, if you simply
alternate convolutional layers with max-pooling layers, performance is limited
due to the rapid reduction in spatial size, and the disjoint nature of the
pooling regions. We have formulated a fractional version of max-pooling where
alpha is allowed to take non-integer values. Our version of max-pooling is
stochastic as there are lots of different ways of constructing suitable pooling
regions. We find that our form of fractional max-pooling reduces overfitting on
a variety of datasets: for instance, we improve on the state-of-the art for
CIFAR-100 without even using dropout.
| [
{
"version": "v1",
"created": "Thu, 18 Dec 2014 20:45:11 GMT"
},
{
"version": "v2",
"created": "Mon, 22 Dec 2014 11:06:35 GMT"
},
{
"version": "v3",
"created": "Mon, 2 Mar 2015 20:06:22 GMT"
},
{
"version": "v4",
"created": "Tue, 12 May 2015 06:36:11 GMT"
}
] | 2015-05-13T00:00:00 | [
[
"Graham",
"Benjamin",
""
]
] | TITLE: Fractional Max-Pooling
ABSTRACT: Convolutional networks almost always incorporate some form of spatial
pooling, and very often it is alpha times alpha max-pooling with alpha=2.
Max-pooling act on the hidden layers of the network, reducing their size by an
integer multiplicative factor alpha. The amazing by-product of discarding 75%
of your data is that you build into the network a degree of invariance with
respect to translations and elastic distortions. However, if you simply
alternate convolutional layers with max-pooling layers, performance is limited
due to the rapid reduction in spatial size, and the disjoint nature of the
pooling regions. We have formulated a fractional version of max-pooling where
alpha is allowed to take non-integer values. Our version of max-pooling is
stochastic as there are lots of different ways of constructing suitable pooling
regions. We find that our form of fractional max-pooling reduces overfitting on
a variety of datasets: for instance, we improve on the state-of-the art for
CIFAR-100 without even using dropout.
|
1412.6857 | Tyng-Luh Liu | Jyh-Jing Hwang and Tyng-Luh Liu | Contour Detection Using Cost-Sensitive Convolutional Neural Networks | 9 pages, 3 figures | null | null | null | cs.CV cs.LG cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We address the problem of contour detection via per-pixel classifications of
edge point. To facilitate the process, the proposed approach leverages with
DenseNet, an efficient implementation of multiscale convolutional neural
networks (CNNs), to extract an informative feature vector for each pixel and
uses an SVM classifier to accomplish contour detection. The main challenge lies
in adapting a pre-trained per-image CNN model for yielding per-pixel image
features. We propose to base on the DenseNet architecture to achieve pixelwise
fine-tuning and then consider a cost-sensitive strategy to further improve the
learning with a small dataset of edge and non-edge image patches. In the
experiment of contour detection, we look into the effectiveness of combining
per-pixel features from different CNN layers and obtain comparable performances
to the state-of-the-art on BSDS500.
| [
{
"version": "v1",
"created": "Mon, 22 Dec 2014 01:16:50 GMT"
},
{
"version": "v2",
"created": "Wed, 24 Dec 2014 14:37:27 GMT"
},
{
"version": "v3",
"created": "Thu, 15 Jan 2015 15:01:16 GMT"
},
{
"version": "v4",
"created": "Sat, 28 Feb 2015 07:37:54 GMT"
},
{
"version": "v5",
"created": "Tue, 12 May 2015 08:42:42 GMT"
}
] | 2015-05-13T00:00:00 | [
[
"Hwang",
"Jyh-Jing",
""
],
[
"Liu",
"Tyng-Luh",
""
]
] | TITLE: Contour Detection Using Cost-Sensitive Convolutional Neural Networks
ABSTRACT: We address the problem of contour detection via per-pixel classifications of
edge point. To facilitate the process, the proposed approach leverages with
DenseNet, an efficient implementation of multiscale convolutional neural
networks (CNNs), to extract an informative feature vector for each pixel and
uses an SVM classifier to accomplish contour detection. The main challenge lies
in adapting a pre-trained per-image CNN model for yielding per-pixel image
features. We propose to base on the DenseNet architecture to achieve pixelwise
fine-tuning and then consider a cost-sensitive strategy to further improve the
learning with a small dataset of edge and non-edge image patches. In the
experiment of contour detection, we look into the effectiveness of combining
per-pixel features from different CNN layers and obtain comparable performances
to the state-of-the-art on BSDS500.
|
1504.06603 | Dmytro Mishkin | Dmytro Mishkin and Jiri Matas and Michal Perdoch and Karel Lenc | WxBS: Wide Baseline Stereo Generalizations | Descriptor and detector evaluation expanded | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We have presented a new problem -- the wide multiple baseline stereo (WxBS)
-- which considers matching of images that simultaneously differ in more than
one image acquisition factor such as viewpoint, illumination, sensor type or
where object appearance changes significantly, e.g. over time. A new dataset
with the ground truth for evaluation of matching algorithms has been introduced
and will be made public.
We have extensively tested a large set of popular and recent detectors and
descriptors and show than the combination of RootSIFT and HalfRootSIFT as
descriptors with MSER and Hessian-Affine detectors works best for many
different nuisance factors. We show that simple adaptive thresholding improves
Hessian-Affine, DoG, MSER (and possibly other) detectors and allows to use them
on infrared and low contrast images.
A novel matching algorithm for addressing the WxBS problem has been
introduced. We have shown experimentally that the WxBS-M matcher dominantes the
state-of-the-art methods both on both the new and existing datasets.
| [
{
"version": "v1",
"created": "Fri, 24 Apr 2015 19:19:04 GMT"
},
{
"version": "v2",
"created": "Tue, 12 May 2015 14:42:53 GMT"
}
] | 2015-05-13T00:00:00 | [
[
"Mishkin",
"Dmytro",
""
],
[
"Matas",
"Jiri",
""
],
[
"Perdoch",
"Michal",
""
],
[
"Lenc",
"Karel",
""
]
] | TITLE: WxBS: Wide Baseline Stereo Generalizations
ABSTRACT: We have presented a new problem -- the wide multiple baseline stereo (WxBS)
-- which considers matching of images that simultaneously differ in more than
one image acquisition factor such as viewpoint, illumination, sensor type or
where object appearance changes significantly, e.g. over time. A new dataset
with the ground truth for evaluation of matching algorithms has been introduced
and will be made public.
We have extensively tested a large set of popular and recent detectors and
descriptors and show than the combination of RootSIFT and HalfRootSIFT as
descriptors with MSER and Hessian-Affine detectors works best for many
different nuisance factors. We show that simple adaptive thresholding improves
Hessian-Affine, DoG, MSER (and possibly other) detectors and allows to use them
on infrared and low contrast images.
A novel matching algorithm for addressing the WxBS problem has been
introduced. We have shown experimentally that the WxBS-M matcher dominantes the
state-of-the-art methods both on both the new and existing datasets.
|
1504.07751 | Zhiguo Ding | Peng Xu, Zhiguo Ding, Xuchu Dai and H. Vincent Poor | NOMA: An Information Theoretic Perspective | One typo in Eq. (3) in v1 has been corrected | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this letter, the performance of non-orthogonal multiple access (NOMA) is
investigated from an information theoretic perspective. The relationships among
the capacity region of broadcast channels and two rate regions achieved by NOMA
and time-division multiple access (TDMA) are illustrated first. Then, the
performance of NOMA is evaluated by considering TDMA as the benchmark, where
both the sum rate and the individual user rates are used as the criteria. In a
wireless downlink scenario with user pairing, the developed analytical results
show that NOMA can outperform TDMA not only for the sum rate but also for each
user's individual rate, particularly when the difference between the users'
channels is large.
| [
{
"version": "v1",
"created": "Wed, 29 Apr 2015 08:01:19 GMT"
},
{
"version": "v2",
"created": "Tue, 12 May 2015 10:16:59 GMT"
}
] | 2015-05-13T00:00:00 | [
[
"Xu",
"Peng",
""
],
[
"Ding",
"Zhiguo",
""
],
[
"Dai",
"Xuchu",
""
],
[
"Poor",
"H. Vincent",
""
]
] | TITLE: NOMA: An Information Theoretic Perspective
ABSTRACT: In this letter, the performance of non-orthogonal multiple access (NOMA) is
investigated from an information theoretic perspective. The relationships among
the capacity region of broadcast channels and two rate regions achieved by NOMA
and time-division multiple access (TDMA) are illustrated first. Then, the
performance of NOMA is evaluated by considering TDMA as the benchmark, where
both the sum rate and the individual user rates are used as the criteria. In a
wireless downlink scenario with user pairing, the developed analytical results
show that NOMA can outperform TDMA not only for the sum rate but also for each
user's individual rate, particularly when the difference between the users'
channels is large.
|
1505.02982 | Baoguang Shi | Baoguang Shi, Cong Yao, Chengquan Zhang, Xiaowei Guo, Feiyue Huang,
Xiang Bai | Automatic Script Identification in the Wild | 5 pages, 7 figures, submitted to ICDAR 2015 | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | With the rapid increase of transnational communication and cooperation,
people frequently encounter multilingual scenarios in various situations. In
this paper, we are concerned with a relatively new problem: script
identification at word or line levels in natural scenes. A large-scale dataset
with a great quantity of natural images and 10 types of widely used languages
is constructed and released. In allusion to the challenges in script
identification in real-world scenarios, a deep learning based algorithm is
proposed. The experiments on the proposed dataset demonstrate that our
algorithm achieves superior performance, compared with conventional image
classification methods, such as the original CNN architecture and LLC.
| [
{
"version": "v1",
"created": "Tue, 12 May 2015 12:38:30 GMT"
}
] | 2015-05-13T00:00:00 | [
[
"Shi",
"Baoguang",
""
],
[
"Yao",
"Cong",
""
],
[
"Zhang",
"Chengquan",
""
],
[
"Guo",
"Xiaowei",
""
],
[
"Huang",
"Feiyue",
""
],
[
"Bai",
"Xiang",
""
]
] | TITLE: Automatic Script Identification in the Wild
ABSTRACT: With the rapid increase of transnational communication and cooperation,
people frequently encounter multilingual scenarios in various situations. In
this paper, we are concerned with a relatively new problem: script
identification at word or line levels in natural scenes. A large-scale dataset
with a great quantity of natural images and 10 types of widely used languages
is constructed and released. In allusion to the challenges in script
identification in real-world scenarios, a deep learning based algorithm is
proposed. The experiments on the proposed dataset demonstrate that our
algorithm achieves superior performance, compared with conventional image
classification methods, such as the original CNN architecture and LLC.
|
1505.03008 | Lovro \v{S}ubelj | Dalibor Fiala, Lovro \v{S}ubelj, Slavko \v{Z}itnik, Marko Bajec | Do PageRank-based author rankings outperform simple citation counts? | 28 pages, 5 figures, 6 tables | J. Infometr. 9(2), 334-348 (2015) | 10.1016/j.joi.2015.02.008 | null | cs.DL cs.SI physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The basic indicators of a researcher's productivity and impact are still the
number of publications and their citation counts. These metrics are clear,
straightforward, and easy to obtain. When a ranking of scholars is needed, for
instance in grant, award, or promotion procedures, their use is the fastest and
cheapest way of prioritizing some scientists over others. However, due to their
nature, there is a danger of oversimplifying scientific achievements.
Therefore, many other indicators have been proposed including the usage of the
PageRank algorithm known for the ranking of webpages and its modifications
suited to citation networks. Nevertheless, this recursive method is
computationally expensive and even if it has the advantage of favouring
prestige over popularity, its application should be well justified,
particularly when compared to the standard citation counts. In this study, we
analyze three large datasets of computer science papers in the categories of
artificial intelligence, software engineering, and theory and methods and apply
12 different ranking methods to the citation networks of authors. We compare
the resulting rankings with self-compiled lists of outstanding researchers
selected as frequent editorial board members of prestigious journals in the
field and conclude that there is no evidence of PageRank-based methods
outperforming simple citation counts.
| [
{
"version": "v1",
"created": "Tue, 12 May 2015 13:59:30 GMT"
}
] | 2015-05-13T00:00:00 | [
[
"Fiala",
"Dalibor",
""
],
[
"Šubelj",
"Lovro",
""
],
[
"Žitnik",
"Slavko",
""
],
[
"Bajec",
"Marko",
""
]
] | TITLE: Do PageRank-based author rankings outperform simple citation counts?
ABSTRACT: The basic indicators of a researcher's productivity and impact are still the
number of publications and their citation counts. These metrics are clear,
straightforward, and easy to obtain. When a ranking of scholars is needed, for
instance in grant, award, or promotion procedures, their use is the fastest and
cheapest way of prioritizing some scientists over others. However, due to their
nature, there is a danger of oversimplifying scientific achievements.
Therefore, many other indicators have been proposed including the usage of the
PageRank algorithm known for the ranking of webpages and its modifications
suited to citation networks. Nevertheless, this recursive method is
computationally expensive and even if it has the advantage of favouring
prestige over popularity, its application should be well justified,
particularly when compared to the standard citation counts. In this study, we
analyze three large datasets of computer science papers in the categories of
artificial intelligence, software engineering, and theory and methods and apply
12 different ranking methods to the citation networks of authors. We compare
the resulting rankings with self-compiled lists of outstanding researchers
selected as frequent editorial board members of prestigious journals in the
field and conclude that there is no evidence of PageRank-based methods
outperforming simple citation counts.
|
1412.2227 | Ravi Venkatesan | R. C. Venkatesan and A. Plastino | Hellmann-Feynman connection for the relative Fisher information | 29 pages, 2 figures. Article to Appear in Annals of Physics. R. C.
Venkatesan, A. Plastino, Hellmann-Feynman connection for the relative Fisher
information, Annals of Physics (2015),
http://dx.doi.org/10.1016/j.aop.2015.04.021 | null | null | null | cond-mat.stat-mech cs.IT math-ph math.IT math.MP physics.data-an | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The $(i)$ reciprocity relations for the relative Fisher information (RFI,
hereafter) and $(ii)$ a generalized RFI-Euler theorem, are self-consistently
derived from the Hellmann-Feynman theorem. These new reciprocity relations
generalize the RFI-Euler theorem and constitute the basis for building up a
mathematical Legendre transform structure (LTS, hereafter), akin to that of
thermodynamics, that underlies the RFI scenario. This demonstrates the
possibility of translating the entire mathematical structure of thermodynamics
into a RFI-based theoretical framework. Virial theorems play a prominent role
in this endeavor, as a Schr\"odinger-like equation can be associated to the
RFI. Lagrange multipliers are determined invoking the RFI-LTS link and the
quantum mechanical virial theorem. An appropriate ansatz allows for the
inference of probability density functions (pdf's, hereafter) and
energy-eigenvalues of the above mentioned Schr\"odinger-like equation. The
energy-eigenvalues obtained here via inference are benchmarked against
established theoretical and numerical results. A principled theoretical basis
to reconstruct the RFI-framework from the FIM framework is established.
Numerical examples for exemplary cases are provided.
| [
{
"version": "v1",
"created": "Sat, 6 Dec 2014 11:54:57 GMT"
},
{
"version": "v2",
"created": "Tue, 9 Dec 2014 05:41:59 GMT"
},
{
"version": "v3",
"created": "Thu, 19 Mar 2015 14:53:02 GMT"
},
{
"version": "v4",
"created": "Sun, 10 May 2015 14:35:24 GMT"
}
] | 2015-05-12T00:00:00 | [
[
"Venkatesan",
"R. C.",
""
],
[
"Plastino",
"A.",
""
]
] | TITLE: Hellmann-Feynman connection for the relative Fisher information
ABSTRACT: The $(i)$ reciprocity relations for the relative Fisher information (RFI,
hereafter) and $(ii)$ a generalized RFI-Euler theorem, are self-consistently
derived from the Hellmann-Feynman theorem. These new reciprocity relations
generalize the RFI-Euler theorem and constitute the basis for building up a
mathematical Legendre transform structure (LTS, hereafter), akin to that of
thermodynamics, that underlies the RFI scenario. This demonstrates the
possibility of translating the entire mathematical structure of thermodynamics
into a RFI-based theoretical framework. Virial theorems play a prominent role
in this endeavor, as a Schr\"odinger-like equation can be associated to the
RFI. Lagrange multipliers are determined invoking the RFI-LTS link and the
quantum mechanical virial theorem. An appropriate ansatz allows for the
inference of probability density functions (pdf's, hereafter) and
energy-eigenvalues of the above mentioned Schr\"odinger-like equation. The
energy-eigenvalues obtained here via inference are benchmarked against
established theoretical and numerical results. A principled theoretical basis
to reconstruct the RFI-framework from the FIM framework is established.
Numerical examples for exemplary cases are provided.
|
1505.01709 | Piotr Br\'odka | Stanis{\l}aw Saganowski, Bogdan Gliwa, Piotr Br\'odka, Anna Zygmunt,
Przemys{\l}aw Kazienko, Jaros{\l}aw Ko\'zlak | Predicting Community Evolution in Social Networks | Entropy 2015, 17, 1-x manuscripts; doi:10.3390/e170x000x 46 pages | Entropy 2015, 17, 3053-3096 | 10.3390/e17053053 | null | cs.SI physics.soc-ph | http://creativecommons.org/licenses/by/3.0/ | Nowadays, sustained development of different social media can be observed
worldwide. One of the relevant research domains intensively explored recently
is analysis of social communities existing in social media as well as
prediction of their future evolution taking into account collected historical
evolution chains. These evolution chains proposed in the paper contain group
states in the previous time frames and its historical transitions that were
identified using one out of two methods: Stable Group Changes Identification
(SGCI) and Group Evolution Discovery (GED). Based on the observed evolution
chains of various length, structural network features are extracted, validated
and selected as well as used to learn classification models. The experimental
studies were performed on three real datasets with different profile: DBLP,
Facebook and Polish blogosphere. The process of group prediction was analysed
with respect to different classifiers as well as various descriptive feature
sets extracted from evolution chains of different length. The results revealed
that, in general, the longer evolution chains the better predictive abilities
of the classification models. However, chains of length 3 to 7 enabled the
GED-based method to almost reach its maximum possible prediction quality. For
SGCI, this value was at the level of 3 to 5 last periods.
| [
{
"version": "v1",
"created": "Thu, 7 May 2015 14:03:47 GMT"
}
] | 2015-05-12T00:00:00 | [
[
"Saganowski",
"Stanisław",
""
],
[
"Gliwa",
"Bogdan",
""
],
[
"Bródka",
"Piotr",
""
],
[
"Zygmunt",
"Anna",
""
],
[
"Kazienko",
"Przemysław",
""
],
[
"Koźlak",
"Jarosław",
""
]
] | TITLE: Predicting Community Evolution in Social Networks
ABSTRACT: Nowadays, sustained development of different social media can be observed
worldwide. One of the relevant research domains intensively explored recently
is analysis of social communities existing in social media as well as
prediction of their future evolution taking into account collected historical
evolution chains. These evolution chains proposed in the paper contain group
states in the previous time frames and its historical transitions that were
identified using one out of two methods: Stable Group Changes Identification
(SGCI) and Group Evolution Discovery (GED). Based on the observed evolution
chains of various length, structural network features are extracted, validated
and selected as well as used to learn classification models. The experimental
studies were performed on three real datasets with different profile: DBLP,
Facebook and Polish blogosphere. The process of group prediction was analysed
with respect to different classifiers as well as various descriptive feature
sets extracted from evolution chains of different length. The results revealed
that, in general, the longer evolution chains the better predictive abilities
of the classification models. However, chains of length 3 to 7 enabled the
GED-based method to almost reach its maximum possible prediction quality. For
SGCI, this value was at the level of 3 to 5 last periods.
|
1505.02269 | Zongyuan Ge | Zongyuan Ge and Christopher Mccool and Conrad Sanderson and Peter
Corke | Subset Feature Learning for Fine-Grained Category Classification | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Fine-grained categorisation has been a challenging problem due to small
inter-class variation, large intra-class variation and low number of training
images. We propose a learning system which first clusters visually similar
classes and then learns deep convolutional neural network features specific to
each subset. Experiments on the popular fine-grained Caltech-UCSD bird dataset
show that the proposed method outperforms recent fine-grained categorisation
methods under the most difficult setting: no bounding boxes are presented at
test time. It achieves a mean accuracy of 77.5%, compared to the previous best
performance of 73.2%. We also show that progressive transfer learning allows us
to first learn domain-generic features (for bird classification) which can then
be adapted to specific set of bird classes, yielding improvements in accuracy.
| [
{
"version": "v1",
"created": "Sat, 9 May 2015 13:25:24 GMT"
}
] | 2015-05-12T00:00:00 | [
[
"Ge",
"Zongyuan",
""
],
[
"Mccool",
"Christopher",
""
],
[
"Sanderson",
"Conrad",
""
],
[
"Corke",
"Peter",
""
]
] | TITLE: Subset Feature Learning for Fine-Grained Category Classification
ABSTRACT: Fine-grained categorisation has been a challenging problem due to small
inter-class variation, large intra-class variation and low number of training
images. We propose a learning system which first clusters visually similar
classes and then learns deep convolutional neural network features specific to
each subset. Experiments on the popular fine-grained Caltech-UCSD bird dataset
show that the proposed method outperforms recent fine-grained categorisation
methods under the most difficult setting: no bounding boxes are presented at
test time. It achieves a mean accuracy of 77.5%, compared to the previous best
performance of 73.2%. We also show that progressive transfer learning allows us
to first learn domain-generic features (for bird classification) which can then
be adapted to specific set of bird classes, yielding improvements in accuracy.
|
1505.02377 | Renjie Liao | Renjie Liao, Jianping Shi, Ziyang Ma, Jun Zhu and Jiaya Jia | Bounded-Distortion Metric Learning | null | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Metric learning aims to embed one metric space into another to benefit tasks
like classification and clustering. Although a greatly distorted metric space
has a high degree of freedom to fit training data, it is prone to overfitting
and numerical inaccuracy. This paper presents {\it bounded-distortion metric
learning} (BDML), a new metric learning framework which amounts to finding an
optimal Mahalanobis metric space with a bounded-distortion constraint. An
efficient solver based on the multiplicative weights update method is proposed.
Moreover, we generalize BDML to pseudo-metric learning and devise the
semidefinite relaxation and a randomized algorithm to approximately solve it.
We further provide theoretical analysis to show that distortion is a key
ingredient for stability and generalization ability of our BDML algorithm.
Extensive experiments on several benchmark datasets yield promising results.
| [
{
"version": "v1",
"created": "Sun, 10 May 2015 13:27:36 GMT"
}
] | 2015-05-12T00:00:00 | [
[
"Liao",
"Renjie",
""
],
[
"Shi",
"Jianping",
""
],
[
"Ma",
"Ziyang",
""
],
[
"Zhu",
"Jun",
""
],
[
"Jia",
"Jiaya",
""
]
] | TITLE: Bounded-Distortion Metric Learning
ABSTRACT: Metric learning aims to embed one metric space into another to benefit tasks
like classification and clustering. Although a greatly distorted metric space
has a high degree of freedom to fit training data, it is prone to overfitting
and numerical inaccuracy. This paper presents {\it bounded-distortion metric
learning} (BDML), a new metric learning framework which amounts to finding an
optimal Mahalanobis metric space with a bounded-distortion constraint. An
efficient solver based on the multiplicative weights update method is proposed.
Moreover, we generalize BDML to pseudo-metric learning and devise the
semidefinite relaxation and a randomized algorithm to approximately solve it.
We further provide theoretical analysis to show that distortion is a key
ingredient for stability and generalization ability of our BDML algorithm.
Extensive experiments on several benchmark datasets yield promising results.
|
1505.02496 | Liwei Wang | Liwei Wang, Chen-Yu Lee, Zhuowen Tu, Svetlana Lazebnik | Training Deeper Convolutional Networks with Deep Supervision | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | One of the most promising ways of improving the performance of deep
convolutional neural networks is by increasing the number of convolutional
layers. However, adding layers makes training more difficult and
computationally expensive. In order to train deeper networks, we propose to add
auxiliary supervision branches after certain intermediate layers during
training. We formulate a simple rule of thumb to determine where these branches
should be added. The resulting deeply supervised structure makes the training
much easier and also produces better classification results on ImageNet and the
recently released, larger MIT Places dataset
| [
{
"version": "v1",
"created": "Mon, 11 May 2015 06:26:46 GMT"
}
] | 2015-05-12T00:00:00 | [
[
"Wang",
"Liwei",
""
],
[
"Lee",
"Chen-Yu",
""
],
[
"Tu",
"Zhuowen",
""
],
[
"Lazebnik",
"Svetlana",
""
]
] | TITLE: Training Deeper Convolutional Networks with Deep Supervision
ABSTRACT: One of the most promising ways of improving the performance of deep
convolutional neural networks is by increasing the number of convolutional
layers. However, adding layers makes training more difficult and
computationally expensive. In order to train deeper networks, we propose to add
auxiliary supervision branches after certain intermediate layers during
training. We formulate a simple rule of thumb to determine where these branches
should be added. The resulting deeply supervised structure makes the training
much easier and also produces better classification results on ImageNet and the
recently released, larger MIT Places dataset
|
1505.02505 | Lihua Guo | Guo Lihua and Guo Chenggan | A Two-Layer Local Constrained Sparse Coding Method for Fine-Grained
Visual Categorization | 19 pages, 12 figures, 8 tables | null | null | null | cs.CV | http://creativecommons.org/licenses/by/3.0/ | Fine-grained categories are more difficulty distinguished than generic
categories due to the similarity of inter-class and the diversity of
intra-class. Therefore, the fine-grained visual categorization (FGVC) is
considered as one of challenge problems in computer vision recently. A new
feature learning framework, which is based on a two-layer local constrained
sparse coding architecture, is proposed in this paper. The two-layer
architecture is introduced for learning intermediate-level features, and the
local constrained term is applied to guarantee the local smooth of coding
coefficients. For extracting more discriminative information, local orientation
histograms are the input of sparse coding instead of raw pixels. Moreover, a
quick dictionary updating process is derived to further improve the training
speed. Two experimental results show that our method achieves 85.29% accuracy
on the Oxford 102 flowers dataset and 67.8% accuracy on the CUB-200-2011 bird
dataset, and the performance of our framework is highly competitive with
existing literatures.
| [
{
"version": "v1",
"created": "Mon, 11 May 2015 07:34:35 GMT"
}
] | 2015-05-12T00:00:00 | [
[
"Lihua",
"Guo",
""
],
[
"Chenggan",
"Guo",
""
]
] | TITLE: A Two-Layer Local Constrained Sparse Coding Method for Fine-Grained
Visual Categorization
ABSTRACT: Fine-grained categories are more difficulty distinguished than generic
categories due to the similarity of inter-class and the diversity of
intra-class. Therefore, the fine-grained visual categorization (FGVC) is
considered as one of challenge problems in computer vision recently. A new
feature learning framework, which is based on a two-layer local constrained
sparse coding architecture, is proposed in this paper. The two-layer
architecture is introduced for learning intermediate-level features, and the
local constrained term is applied to guarantee the local smooth of coding
coefficients. For extracting more discriminative information, local orientation
histograms are the input of sparse coding instead of raw pixels. Moreover, a
quick dictionary updating process is derived to further improve the training
speed. Two experimental results show that our method achieves 85.29% accuracy
on the Oxford 102 flowers dataset and 67.8% accuracy on the CUB-200-2011 bird
dataset, and the performance of our framework is highly competitive with
existing literatures.
|
1505.02729 | Nakul Verma | Nakul Verma and Kristin Branson | Sample complexity of learning Mahalanobis distance metrics | 26 pages, 1 figure | null | null | null | cs.LG cs.AI stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Metric learning seeks a transformation of the feature space that enhances
prediction quality for the given task at hand. In this work we provide
PAC-style sample complexity rates for supervised metric learning. We give
matching lower- and upper-bounds showing that the sample complexity scales with
the representation dimension when no assumptions are made about the underlying
data distribution. However, by leveraging the structure of the data
distribution, we show that one can achieve rates that are fine-tuned to a
specific notion of intrinsic complexity for a given dataset. Our analysis
reveals that augmenting the metric learning optimization criterion with a
simple norm-based regularization can help adapt to a dataset's intrinsic
complexity, yielding better generalization. Experiments on benchmark datasets
validate our analysis and show that regularizing the metric can help discern
the signal even when the data contains high amounts of noise.
| [
{
"version": "v1",
"created": "Mon, 11 May 2015 18:55:42 GMT"
}
] | 2015-05-12T00:00:00 | [
[
"Verma",
"Nakul",
""
],
[
"Branson",
"Kristin",
""
]
] | TITLE: Sample complexity of learning Mahalanobis distance metrics
ABSTRACT: Metric learning seeks a transformation of the feature space that enhances
prediction quality for the given task at hand. In this work we provide
PAC-style sample complexity rates for supervised metric learning. We give
matching lower- and upper-bounds showing that the sample complexity scales with
the representation dimension when no assumptions are made about the underlying
data distribution. However, by leveraging the structure of the data
distribution, we show that one can achieve rates that are fine-tuned to a
specific notion of intrinsic complexity for a given dataset. Our analysis
reveals that augmenting the metric learning optimization criterion with a
simple norm-based regularization can help adapt to a dataset's intrinsic
complexity, yielding better generalization. Experiments on benchmark datasets
validate our analysis and show that regularizing the metric can help discern
the signal even when the data contains high amounts of noise.
|
1412.6504 | Katerina Fragkiadaki | Katerina Fragkiadaki and Pablo Arbelaez and Panna Felsen and Jitendra
Malik | Learning to Segment Moving Objects in Videos | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We segment moving objects in videos by ranking spatio-temporal segment
proposals according to "moving objectness": how likely they are to contain a
moving object. In each video frame, we compute segment proposals using multiple
figure-ground segmentations on per frame motion boundaries. We rank them with a
Moving Objectness Detector trained on image and motion fields to detect moving
objects and discard over/under segmentations or background parts of the scene.
We extend the top ranked segments into spatio-temporal tubes using random
walkers on motion affinities of dense point trajectories. Our final tube
ranking consistently outperforms previous segmentation methods in the two
largest video segmentation benchmarks currently available, for any number of
proposals. Further, our per frame moving object proposals increase the
detection rate up to 7\% over previous state-of-the-art static proposal
methods.
| [
{
"version": "v1",
"created": "Fri, 19 Dec 2014 20:01:16 GMT"
},
{
"version": "v2",
"created": "Fri, 8 May 2015 02:05:52 GMT"
}
] | 2015-05-11T00:00:00 | [
[
"Fragkiadaki",
"Katerina",
""
],
[
"Arbelaez",
"Pablo",
""
],
[
"Felsen",
"Panna",
""
],
[
"Malik",
"Jitendra",
""
]
] | TITLE: Learning to Segment Moving Objects in Videos
ABSTRACT: We segment moving objects in videos by ranking spatio-temporal segment
proposals according to "moving objectness": how likely they are to contain a
moving object. In each video frame, we compute segment proposals using multiple
figure-ground segmentations on per frame motion boundaries. We rank them with a
Moving Objectness Detector trained on image and motion fields to detect moving
objects and discard over/under segmentations or background parts of the scene.
We extend the top ranked segments into spatio-temporal tubes using random
walkers on motion affinities of dense point trajectories. Our final tube
ranking consistently outperforms previous segmentation methods in the two
largest video segmentation benchmarks currently available, for any number of
proposals. Further, our per frame moving object proposals increase the
detection rate up to 7\% over previous state-of-the-art static proposal
methods.
|
1503.04144 | Shengxin Zha | Shengxin Zha, Florian Luisier, Walter Andrews, Nitish Srivastava,
Ruslan Salakhutdinov | Exploiting Image-trained CNN Architectures for Unconstrained Video
Classification | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We conduct an in-depth exploration of different strategies for doing event
detection in videos using convolutional neural networks (CNNs) trained for
image classification. We study different ways of performing spatial and
temporal pooling, feature normalization, choice of CNN layers as well as choice
of classifiers. Making judicious choices along these dimensions led to a very
significant increase in performance over more naive approaches that have been
used till now. We evaluate our approach on the challenging TRECVID MED'14
dataset with two popular CNN architectures pretrained on ImageNet. On this
MED'14 dataset, our methods, based entirely on image-trained CNN features, can
outperform several state-of-the-art non-CNN models. Our proposed late fusion of
CNN- and motion-based features can further increase the mean average precision
(mAP) on MED'14 from 34.95% to 38.74%. The fusion approach achieves the
state-of-the-art classification performance on the challenging UCF-101 dataset.
| [
{
"version": "v1",
"created": "Fri, 13 Mar 2015 17:00:53 GMT"
},
{
"version": "v2",
"created": "Mon, 16 Mar 2015 00:53:49 GMT"
},
{
"version": "v3",
"created": "Fri, 8 May 2015 01:54:08 GMT"
}
] | 2015-05-11T00:00:00 | [
[
"Zha",
"Shengxin",
""
],
[
"Luisier",
"Florian",
""
],
[
"Andrews",
"Walter",
""
],
[
"Srivastava",
"Nitish",
""
],
[
"Salakhutdinov",
"Ruslan",
""
]
] | TITLE: Exploiting Image-trained CNN Architectures for Unconstrained Video
Classification
ABSTRACT: We conduct an in-depth exploration of different strategies for doing event
detection in videos using convolutional neural networks (CNNs) trained for
image classification. We study different ways of performing spatial and
temporal pooling, feature normalization, choice of CNN layers as well as choice
of classifiers. Making judicious choices along these dimensions led to a very
significant increase in performance over more naive approaches that have been
used till now. We evaluate our approach on the challenging TRECVID MED'14
dataset with two popular CNN architectures pretrained on ImageNet. On this
MED'14 dataset, our methods, based entirely on image-trained CNN features, can
outperform several state-of-the-art non-CNN models. Our proposed late fusion of
CNN- and motion-based features can further increase the mean average precision
(mAP) on MED'14 from 34.95% to 38.74%. The fusion approach achieves the
state-of-the-art classification performance on the challenging UCF-101 dataset.
|
1503.08039 | Hui-Jia Li | Hui-Jia Li and J J.Daniels | Social significance of community structure: Statistical view | This paper has been withdrawn by the author due to a crucial sign
error in equation (17) and high overlapping rate | Physical Review E, 91(1), 012801, 2015 | 10.1103/PhysRevE.91.012801 | null | physics.soc-ph cs.SI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Community structure analysis is a powerful tool for social networks, which
can simplify their topological and functional analysis considerably. However,
since community detection methods have random factors and real social networks
obtained from complex systems always contain error edges, evaluating the
significance of community structure partitioned is an urgent and important
question. In this paper, integrating the specific characteristics of real
society, we present a novel framework analyzing the significance of social
community specially. The dynamics of social interactions are modeled by
identifying social leaders and corresponding hierarchical structures. Instead
of a direct comparison with the average outcome of a random model, we compute
the similarity of a given node with the leader by the number of common
neighbors. To determine the membership vector, an efficient community detection
algorithm is proposed based on the position of nodes and their corresponding
leaders. Then, using log-likelihood score, the tightness of community can be
derived. Based on the distribution of community tightness, we establish a new
connection between $p$-value theory and network analysis and then get a novel
statistical form significance measure. Finally, the framework is applied to
both benchmark networks and real social networks. Experimental results show
that our work can be used in many fields, such as determining the optimal
number of communities, analyzing the social significance of a given community,
comparing the performance among various algorithms and so on.
| [
{
"version": "v1",
"created": "Fri, 27 Mar 2015 12:09:12 GMT"
},
{
"version": "v2",
"created": "Fri, 8 May 2015 15:58:38 GMT"
}
] | 2015-05-11T00:00:00 | [
[
"Li",
"Hui-Jia",
""
],
[
"Daniels",
"J J.",
""
]
] | TITLE: Social significance of community structure: Statistical view
ABSTRACT: Community structure analysis is a powerful tool for social networks, which
can simplify their topological and functional analysis considerably. However,
since community detection methods have random factors and real social networks
obtained from complex systems always contain error edges, evaluating the
significance of community structure partitioned is an urgent and important
question. In this paper, integrating the specific characteristics of real
society, we present a novel framework analyzing the significance of social
community specially. The dynamics of social interactions are modeled by
identifying social leaders and corresponding hierarchical structures. Instead
of a direct comparison with the average outcome of a random model, we compute
the similarity of a given node with the leader by the number of common
neighbors. To determine the membership vector, an efficient community detection
algorithm is proposed based on the position of nodes and their corresponding
leaders. Then, using log-likelihood score, the tightness of community can be
derived. Based on the distribution of community tightness, we establish a new
connection between $p$-value theory and network analysis and then get a novel
statistical form significance measure. Finally, the framework is applied to
both benchmark networks and real social networks. Experimental results show
that our work can be used in many fields, such as determining the optimal
number of communities, analyzing the social significance of a given community,
comparing the performance among various algorithms and so on.
|
1505.01589 | Li Shen | Li Shen, Teck Wee Chua, Karianto Leman | Shadow Optimization from Structured Deep Edge Detection | 8 pages. CVPR 2015 | null | null | null | cs.CV | http://creativecommons.org/licenses/by-nc-sa/3.0/ | Local structures of shadow boundaries as well as complex interactions of
image regions remain largely unexploited by previous shadow detection
approaches. In this paper, we present a novel learning-based framework for
shadow region recovery from a single image. We exploit the local structures of
shadow edges by using a structured CNN learning framework. We show that using
the structured label information in the classification can improve the local
consistency of the results and avoid spurious labelling. We further propose and
formulate a shadow/bright measure to model the complex interactions among image
regions. The shadow and bright measures of each patch are computed from the
shadow edges detected in the image. Using the global interaction constraints on
patches, we formulate a least-square optimization problem for shadow recovery
that can be solved efficiently. Our shadow recovery method achieves
state-of-the-art results on the major shadow benchmark databases collected
under various conditions.
| [
{
"version": "v1",
"created": "Thu, 7 May 2015 05:07:11 GMT"
},
{
"version": "v2",
"created": "Fri, 8 May 2015 06:42:48 GMT"
}
] | 2015-05-11T00:00:00 | [
[
"Shen",
"Li",
""
],
[
"Chua",
"Teck Wee",
""
],
[
"Leman",
"Karianto",
""
]
] | TITLE: Shadow Optimization from Structured Deep Edge Detection
ABSTRACT: Local structures of shadow boundaries as well as complex interactions of
image regions remain largely unexploited by previous shadow detection
approaches. In this paper, we present a novel learning-based framework for
shadow region recovery from a single image. We exploit the local structures of
shadow edges by using a structured CNN learning framework. We show that using
the structured label information in the classification can improve the local
consistency of the results and avoid spurious labelling. We further propose and
formulate a shadow/bright measure to model the complex interactions among image
regions. The shadow and bright measures of each patch are computed from the
shadow edges detected in the image. Using the global interaction constraints on
patches, we formulate a least-square optimization problem for shadow recovery
that can be solved efficiently. Our shadow recovery method achieves
state-of-the-art results on the major shadow benchmark databases collected
under various conditions.
|
1505.01866 | K. V. Rashmi | K. V. Rashmi and Ran Gilad-Bachrach | DART: Dropouts meet Multiple Additive Regression Trees | AIStats 2015 | null | null | null | cs.LG stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Multiple Additive Regression Trees (MART), an ensemble model of boosted
regression trees, is known to deliver high prediction accuracy for diverse
tasks, and it is widely used in practice. However, it suffers an issue which we
call over-specialization, wherein trees added at later iterations tend to
impact the prediction of only a few instances, and make negligible contribution
towards the remaining instances. This negatively affects the performance of the
model on unseen data, and also makes the model over-sensitive to the
contributions of the few, initially added tress. We show that the commonly used
tool to address this issue, that of shrinkage, alleviates the problem only to a
certain extent and the fundamental issue of over-specialization still remains.
In this work, we explore a different approach to address the problem that of
employing dropouts, a tool that has been recently proposed in the context of
learning deep neural networks. We propose a novel way of employing dropouts in
MART, resulting in the DART algorithm. We evaluate DART on ranking, regression
and classification tasks, using large scale, publicly available datasets, and
show that DART outperforms MART in each of the tasks, with a significant
margin. We also show that DART overcomes the issue of over-specialization to a
considerable extent.
| [
{
"version": "v1",
"created": "Thu, 7 May 2015 20:38:48 GMT"
}
] | 2015-05-11T00:00:00 | [
[
"Rashmi",
"K. V.",
""
],
[
"Gilad-Bachrach",
"Ran",
""
]
] | TITLE: DART: Dropouts meet Multiple Additive Regression Trees
ABSTRACT: Multiple Additive Regression Trees (MART), an ensemble model of boosted
regression trees, is known to deliver high prediction accuracy for diverse
tasks, and it is widely used in practice. However, it suffers an issue which we
call over-specialization, wherein trees added at later iterations tend to
impact the prediction of only a few instances, and make negligible contribution
towards the remaining instances. This negatively affects the performance of the
model on unseen data, and also makes the model over-sensitive to the
contributions of the few, initially added tress. We show that the commonly used
tool to address this issue, that of shrinkage, alleviates the problem only to a
certain extent and the fundamental issue of over-specialization still remains.
In this work, we explore a different approach to address the problem that of
employing dropouts, a tool that has been recently proposed in the context of
learning deep neural networks. We propose a novel way of employing dropouts in
MART, resulting in the DART algorithm. We evaluate DART on ranking, regression
and classification tasks, using large scale, publicly available datasets, and
show that DART outperforms MART in each of the tasks, with a significant
margin. We also show that DART overcomes the issue of over-specialization to a
considerable extent.
|
1505.02000 | Matthew Lai | Matthew Lai | Deep Learning for Medical Image Segmentation | null | null | null | null | cs.LG cs.AI cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This report provides an overview of the current state of the art deep
learning architectures and optimisation techniques, and uses the ADNI
hippocampus MRI dataset as an example to compare the effectiveness and
efficiency of different convolutional architectures on the task of patch-based
3-dimensional hippocampal segmentation, which is important in the diagnosis of
Alzheimer's Disease. We found that a slightly unconventional "stacked 2D"
approach provides much better classification performance than simple 2D patches
without requiring significantly more computational power. We also examined the
popular "tri-planar" approach used in some recently published studies, and
found that it provides much better results than the 2D approaches, but also
with a moderate increase in computational power requirement. Finally, we
evaluated a full 3D convolutional architecture, and found that it provides
marginally better results than the tri-planar approach, but at the cost of a
very significant increase in computational power requirement.
| [
{
"version": "v1",
"created": "Fri, 8 May 2015 11:35:53 GMT"
}
] | 2015-05-11T00:00:00 | [
[
"Lai",
"Matthew",
""
]
] | TITLE: Deep Learning for Medical Image Segmentation
ABSTRACT: This report provides an overview of the current state of the art deep
learning architectures and optimisation techniques, and uses the ADNI
hippocampus MRI dataset as an example to compare the effectiveness and
efficiency of different convolutional architectures on the task of patch-based
3-dimensional hippocampal segmentation, which is important in the diagnosis of
Alzheimer's Disease. We found that a slightly unconventional "stacked 2D"
approach provides much better classification performance than simple 2D patches
without requiring significantly more computational power. We also examined the
popular "tri-planar" approach used in some recently published studies, and
found that it provides much better results than the 2D approaches, but also
with a moderate increase in computational power requirement. Finally, we
evaluated a full 3D convolutional architecture, and found that it provides
marginally better results than the tri-planar approach, but at the cost of a
very significant increase in computational power requirement.
|
1505.02056 | Junchen Jiang | Junchen Jiang and Vyas Sekar and Yi Sun | DDA: Cross-Session Throughput Prediction with Applications to Video
Bitrate Selection | null | null | null | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | User experience of video streaming could be greatly improved by selecting a
high-yet-sustainable initial video bitrate, and it is therefore critical to
accurately predict throughput before a video session starts. Inspired by
previous studies that show similarity among throughput of similar sessions
(e.g., those sharing same bottleneck link), we argue for a cross-session
prediction approach, where throughput measured on other sessions is used to
predict the throughput of a new session. In this paper, we study the challenges
of cross-session throughput prediction, develop an accurate throughput
predictor called DDA, and evaluate the performance of the predictor with
real-world datasets. We show that DDA can predict throughput more accurately
than simple predictors and conventional machine learning algorithms; e.g.,
DDA's 80%ile prediction error of DDA is > 50% lower than other algorithms. We
also show that this improved accuracy enables video players to select a higher
sustainable initial bitrate; e.g., compared to initial bitrate without
prediction, DDA leads to 4x higher average bitrate.
| [
{
"version": "v1",
"created": "Fri, 8 May 2015 14:51:12 GMT"
}
] | 2015-05-11T00:00:00 | [
[
"Jiang",
"Junchen",
""
],
[
"Sekar",
"Vyas",
""
],
[
"Sun",
"Yi",
""
]
] | TITLE: DDA: Cross-Session Throughput Prediction with Applications to Video
Bitrate Selection
ABSTRACT: User experience of video streaming could be greatly improved by selecting a
high-yet-sustainable initial video bitrate, and it is therefore critical to
accurately predict throughput before a video session starts. Inspired by
previous studies that show similarity among throughput of similar sessions
(e.g., those sharing same bottleneck link), we argue for a cross-session
prediction approach, where throughput measured on other sessions is used to
predict the throughput of a new session. In this paper, we study the challenges
of cross-session throughput prediction, develop an accurate throughput
predictor called DDA, and evaluate the performance of the predictor with
real-world datasets. We show that DDA can predict throughput more accurately
than simple predictors and conventional machine learning algorithms; e.g.,
DDA's 80%ile prediction error of DDA is > 50% lower than other algorithms. We
also show that this improved accuracy enables video players to select a higher
sustainable initial bitrate; e.g., compared to initial bitrate without
prediction, DDA leads to 4x higher average bitrate.
|
1411.6069 | Abhishek Kar | Abhishek Kar, Shubham Tulsiani, Jo\~ao Carreira, Jitendra Malik | Category-Specific Object Reconstruction from a Single Image | First two authors contributed equally. To appear at CVPR 2015 | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Object reconstruction from a single image -- in the wild -- is a problem
where we can make progress and get meaningful results today. This is the main
message of this paper, which introduces an automated pipeline with pixels as
inputs and 3D surfaces of various rigid categories as outputs in images of
realistic scenes. At the core of our approach are deformable 3D models that can
be learned from 2D annotations available in existing object detection datasets,
that can be driven by noisy automatic object segmentations and which we
complement with a bottom-up module for recovering high-frequency shape details.
We perform a comprehensive quantitative analysis and ablation study of our
approach using the recently introduced PASCAL 3D+ dataset and show very
encouraging automatic reconstructions on PASCAL VOC.
| [
{
"version": "v1",
"created": "Sat, 22 Nov 2014 03:15:29 GMT"
},
{
"version": "v2",
"created": "Wed, 6 May 2015 21:42:41 GMT"
}
] | 2015-05-08T00:00:00 | [
[
"Kar",
"Abhishek",
""
],
[
"Tulsiani",
"Shubham",
""
],
[
"Carreira",
"João",
""
],
[
"Malik",
"Jitendra",
""
]
] | TITLE: Category-Specific Object Reconstruction from a Single Image
ABSTRACT: Object reconstruction from a single image -- in the wild -- is a problem
where we can make progress and get meaningful results today. This is the main
message of this paper, which introduces an automated pipeline with pixels as
inputs and 3D surfaces of various rigid categories as outputs in images of
realistic scenes. At the core of our approach are deformable 3D models that can
be learned from 2D annotations available in existing object detection datasets,
that can be driven by noisy automatic object segmentations and which we
complement with a bottom-up module for recovering high-frequency shape details.
We perform a comprehensive quantitative analysis and ablation study of our
approach using the recently introduced PASCAL 3D+ dataset and show very
encouraging automatic reconstructions on PASCAL VOC.
|
1504.06378 | James Supancic III | James Steven Supancic III, Gregory Rogez, Yi Yang, Jamie Shotton, Deva
Ramanan | Depth-based hand pose estimation: methods, data, and challenges | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Hand pose estimation has matured rapidly in recent years. The introduction of
commodity depth sensors and a multitude of practical applications have spurred
new advances. We provide an extensive analysis of the state-of-the-art,
focusing on hand pose estimation from a single depth frame. To do so, we have
implemented a considerable number of systems, and will release all software and
evaluation code. We summarize important conclusions here: (1) Pose estimation
appears roughly solved for scenes with isolated hands. However, methods still
struggle to analyze cluttered scenes where hands may be interacting with nearby
objects and surfaces. To spur further progress we introduce a challenging new
dataset with diverse, cluttered scenes. (2) Many methods evaluate themselves
with disparate criteria, making comparisons difficult. We define a consistent
evaluation criteria, rigorously motivated by human experiments. (3) We
introduce a simple nearest-neighbor baseline that outperforms most existing
systems. This implies that most systems do not generalize beyond their training
sets. This also reinforces the under-appreciated point that training data is as
important as the model itself. We conclude with directions for future progress.
| [
{
"version": "v1",
"created": "Fri, 24 Apr 2015 02:37:37 GMT"
},
{
"version": "v2",
"created": "Wed, 6 May 2015 20:31:57 GMT"
}
] | 2015-05-08T00:00:00 | [
[
"Supancic",
"James Steven",
"III"
],
[
"Rogez",
"Gregory",
""
],
[
"Yang",
"Yi",
""
],
[
"Shotton",
"Jamie",
""
],
[
"Ramanan",
"Deva",
""
]
] | TITLE: Depth-based hand pose estimation: methods, data, and challenges
ABSTRACT: Hand pose estimation has matured rapidly in recent years. The introduction of
commodity depth sensors and a multitude of practical applications have spurred
new advances. We provide an extensive analysis of the state-of-the-art,
focusing on hand pose estimation from a single depth frame. To do so, we have
implemented a considerable number of systems, and will release all software and
evaluation code. We summarize important conclusions here: (1) Pose estimation
appears roughly solved for scenes with isolated hands. However, methods still
struggle to analyze cluttered scenes where hands may be interacting with nearby
objects and surfaces. To spur further progress we introduce a challenging new
dataset with diverse, cluttered scenes. (2) Many methods evaluate themselves
with disparate criteria, making comparisons difficult. We define a consistent
evaluation criteria, rigorously motivated by human experiments. (3) We
introduce a simple nearest-neighbor baseline that outperforms most existing
systems. This implies that most systems do not generalize beyond their training
sets. This also reinforces the under-appreciated point that training data is as
important as the model itself. We conclude with directions for future progress.
|
1505.01547 | Gordon J Ross | Gordon J Ross and Tim Jones | Understanding the Heavy Tailed Dynamics in Human Behavior | 9 pages in Physical Review E, 2015 | null | null | null | physics.soc-ph cs.SI stat.AP | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The recent availability of electronic datasets containing large volumes of
communication data has made it possible to study human behavior on a larger
scale than ever before. From this, it has been discovered that across a diverse
range of data sets, the inter-event times between consecutive communication
events obey heavy tailed power law dynamics. Explaining this has proved
controversial, and two distinct hypotheses have emerged. The first holds that
these power laws are fundamental, and arise from the mechanisms such as
priority queuing that humans use to schedule tasks. The second holds that they
are a statistical artifact which only occur in aggregated data when features
such as circadian rhythms and burstiness are ignored. We use a large social
media data set to test these hypotheses, and find that although models that
incorporate circadian rhythms and burstiness do explain part of the observed
heavy tails, there is residual unexplained heavy tail behavior which suggests a
more fundamental cause. Based on this, we develop a new quantitative model of
human behavior which improves on existing approaches, and gives insight into
the mechanisms underlying human interactions.
| [
{
"version": "v1",
"created": "Thu, 7 May 2015 00:12:24 GMT"
}
] | 2015-05-08T00:00:00 | [
[
"Ross",
"Gordon J",
""
],
[
"Jones",
"Tim",
""
]
] | TITLE: Understanding the Heavy Tailed Dynamics in Human Behavior
ABSTRACT: The recent availability of electronic datasets containing large volumes of
communication data has made it possible to study human behavior on a larger
scale than ever before. From this, it has been discovered that across a diverse
range of data sets, the inter-event times between consecutive communication
events obey heavy tailed power law dynamics. Explaining this has proved
controversial, and two distinct hypotheses have emerged. The first holds that
these power laws are fundamental, and arise from the mechanisms such as
priority queuing that humans use to schedule tasks. The second holds that they
are a statistical artifact which only occur in aggregated data when features
such as circadian rhythms and burstiness are ignored. We use a large social
media data set to test these hypotheses, and find that although models that
incorporate circadian rhythms and burstiness do explain part of the observed
heavy tails, there is residual unexplained heavy tail behavior which suggests a
more fundamental cause. Based on this, we develop a new quantitative model of
human behavior which improves on existing approaches, and gives insight into
the mechanisms underlying human interactions.
|
1505.01560 | Tam Nguyen | Tam V. Nguyen, Canyi Lu, Jose Sepulveda, Shuicheng Yan | Adaptive Nonparametric Image Parsing | 11 pages | null | null | null | cs.CV | http://creativecommons.org/licenses/by/3.0/ | In this paper, we present an adaptive nonparametric solution to the image
parsing task, namely annotating each image pixel with its corresponding
category label. For a given test image, first, a locality-aware retrieval set
is extracted from the training data based on super-pixel matching similarities,
which are augmented with feature extraction for better differentiation of local
super-pixels. Then, the category of each super-pixel is initialized by the
majority vote of the $k$-nearest-neighbor super-pixels in the retrieval set.
Instead of fixing $k$ as in traditional non-parametric approaches, here we
propose a novel adaptive nonparametric approach which determines the
sample-specific k for each test image. In particular, $k$ is adaptively set to
be the number of the fewest nearest super-pixels which the images in the
retrieval set can use to get the best category prediction. Finally, the initial
super-pixel labels are further refined by contextual smoothing. Extensive
experiments on challenging datasets demonstrate the superiority of the new
solution over other state-of-the-art nonparametric solutions.
| [
{
"version": "v1",
"created": "Thu, 7 May 2015 02:28:32 GMT"
}
] | 2015-05-08T00:00:00 | [
[
"Nguyen",
"Tam V.",
""
],
[
"Lu",
"Canyi",
""
],
[
"Sepulveda",
"Jose",
""
],
[
"Yan",
"Shuicheng",
""
]
] | TITLE: Adaptive Nonparametric Image Parsing
ABSTRACT: In this paper, we present an adaptive nonparametric solution to the image
parsing task, namely annotating each image pixel with its corresponding
category label. For a given test image, first, a locality-aware retrieval set
is extracted from the training data based on super-pixel matching similarities,
which are augmented with feature extraction for better differentiation of local
super-pixels. Then, the category of each super-pixel is initialized by the
majority vote of the $k$-nearest-neighbor super-pixels in the retrieval set.
Instead of fixing $k$ as in traditional non-parametric approaches, here we
propose a novel adaptive nonparametric approach which determines the
sample-specific k for each test image. In particular, $k$ is adaptively set to
be the number of the fewest nearest super-pixels which the images in the
retrieval set can use to get the best category prediction. Finally, the initial
super-pixel labels are further refined by contextual smoothing. Extensive
experiments on challenging datasets demonstrate the superiority of the new
solution over other state-of-the-art nonparametric solutions.
|
1505.01802 | Nagarajan Natarajan | Nagarajan Natarajan, Oluwasanmi Koyejo, Pradeep Ravikumar, Inderjit S.
Dhillon | Optimal Decision-Theoretic Classification Using Non-Decomposable
Performance Metrics | null | null | null | null | cs.LG stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We provide a general theoretical analysis of expected out-of-sample utility,
also referred to as decision-theoretic classification, for non-decomposable
binary classification metrics such as F-measure and Jaccard coefficient. Our
key result is that the expected out-of-sample utility for many performance
metrics is provably optimized by a classifier which is equivalent to a signed
thresholding of the conditional probability of the positive class. Our analysis
bridges a gap in the literature on binary classification, revealed in light of
recent results for non-decomposable metrics in population utility maximization
style classification. Our results identify checkable properties of a
performance metric which are sufficient to guarantee a probability ranking
principle. We propose consistent estimators for optimal expected out-of-sample
classification. As a consequence of the probability ranking principle,
computational requirements can be reduced from exponential to cubic complexity
in the general case, and further reduced to quadratic complexity in special
cases. We provide empirical results on simulated and benchmark datasets
evaluating the performance of the proposed algorithms for decision-theoretic
classification and comparing them to baseline and state-of-the-art methods in
population utility maximization for non-decomposable metrics.
| [
{
"version": "v1",
"created": "Thu, 7 May 2015 18:19:24 GMT"
}
] | 2015-05-08T00:00:00 | [
[
"Natarajan",
"Nagarajan",
""
],
[
"Koyejo",
"Oluwasanmi",
""
],
[
"Ravikumar",
"Pradeep",
""
],
[
"Dhillon",
"Inderjit S.",
""
]
] | TITLE: Optimal Decision-Theoretic Classification Using Non-Decomposable
Performance Metrics
ABSTRACT: We provide a general theoretical analysis of expected out-of-sample utility,
also referred to as decision-theoretic classification, for non-decomposable
binary classification metrics such as F-measure and Jaccard coefficient. Our
key result is that the expected out-of-sample utility for many performance
metrics is provably optimized by a classifier which is equivalent to a signed
thresholding of the conditional probability of the positive class. Our analysis
bridges a gap in the literature on binary classification, revealed in light of
recent results for non-decomposable metrics in population utility maximization
style classification. Our results identify checkable properties of a
performance metric which are sufficient to guarantee a probability ranking
principle. We propose consistent estimators for optimal expected out-of-sample
classification. As a consequence of the probability ranking principle,
computational requirements can be reduced from exponential to cubic complexity
in the general case, and further reduced to quadratic complexity in special
cases. We provide empirical results on simulated and benchmark datasets
evaluating the performance of the proposed algorithms for decision-theoretic
classification and comparing them to baseline and state-of-the-art methods in
population utility maximization for non-decomposable metrics.
|
1310.3567 | Adam Vaughan | Adam Vaughan and Stanislav V. Bohac | An Extreme Learning Machine Approach to Predicting Near Chaotic HCCI
Combustion Phasing in Real-Time | 11 pages, 7 figures, minor revision (added implementation details and
video link), submitted to Neural Networks | null | null | null | cs.LG cs.CE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Fuel efficient Homogeneous Charge Compression Ignition (HCCI) engine
combustion timing predictions must contend with non-linear chemistry,
non-linear physics, period doubling bifurcation(s), turbulent mixing, model
parameters that can drift day-to-day, and air-fuel mixture state information
that cannot typically be resolved on a cycle-to-cycle basis, especially during
transients. In previous work, an abstract cycle-to-cycle mapping function
coupled with $\epsilon$-Support Vector Regression was shown to predict
experimentally observed cycle-to-cycle combustion timing over a wide range of
engine conditions, despite some of the aforementioned difficulties. The main
limitation of the previous approach was that a partially acausual randomly
sampled training dataset was used to train proof of concept offline
predictions. The objective of this paper is to address this limitation by
proposing a new online adaptive Extreme Learning Machine (ELM) extension named
Weighted Ring-ELM. This extension enables fully causal combustion timing
predictions at randomly chosen engine set points, and is shown to achieve
results that are as good as or better than the previous offline method. The
broader objective of this approach is to enable a new class of real-time model
predictive control strategies for high variability HCCI and, ultimately, to
bring HCCI's low engine-out NOx and reduced CO2 emissions to production
engines.
| [
{
"version": "v1",
"created": "Mon, 14 Oct 2013 06:00:31 GMT"
},
{
"version": "v2",
"created": "Wed, 24 Sep 2014 16:52:27 GMT"
},
{
"version": "v3",
"created": "Tue, 5 May 2015 20:23:49 GMT"
}
] | 2015-05-07T00:00:00 | [
[
"Vaughan",
"Adam",
""
],
[
"Bohac",
"Stanislav V.",
""
]
] | TITLE: An Extreme Learning Machine Approach to Predicting Near Chaotic HCCI
Combustion Phasing in Real-Time
ABSTRACT: Fuel efficient Homogeneous Charge Compression Ignition (HCCI) engine
combustion timing predictions must contend with non-linear chemistry,
non-linear physics, period doubling bifurcation(s), turbulent mixing, model
parameters that can drift day-to-day, and air-fuel mixture state information
that cannot typically be resolved on a cycle-to-cycle basis, especially during
transients. In previous work, an abstract cycle-to-cycle mapping function
coupled with $\epsilon$-Support Vector Regression was shown to predict
experimentally observed cycle-to-cycle combustion timing over a wide range of
engine conditions, despite some of the aforementioned difficulties. The main
limitation of the previous approach was that a partially acausual randomly
sampled training dataset was used to train proof of concept offline
predictions. The objective of this paper is to address this limitation by
proposing a new online adaptive Extreme Learning Machine (ELM) extension named
Weighted Ring-ELM. This extension enables fully causal combustion timing
predictions at randomly chosen engine set points, and is shown to achieve
results that are as good as or better than the previous offline method. The
broader objective of this approach is to enable a new class of real-time model
predictive control strategies for high variability HCCI and, ultimately, to
bring HCCI's low engine-out NOx and reduced CO2 emissions to production
engines.
|
1412.6505 | Michael S. Ryoo | M. S. Ryoo, Brandon Rothrock, Larry Matthies | Pooled Motion Features for First-Person Videos | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we present a new feature representation for first-person
videos. In first-person video understanding (e.g., activity recognition), it is
very important to capture both entire scene dynamics (i.e., egomotion) and
salient local motion observed in videos. We describe a representation framework
based on time series pooling, which is designed to abstract
short-term/long-term changes in feature descriptor elements. The idea is to
keep track of how descriptor values are changing over time and summarize them
to represent motion in the activity video. The framework is general, handling
any types of per-frame feature descriptors including conventional motion
descriptors like histogram of optical flows (HOF) as well as appearance
descriptors from more recent convolutional neural networks (CNN). We
experimentally confirm that our approach clearly outperforms previous feature
representations including bag-of-visual-words and improved Fisher vector (IFV)
when using identical underlying feature descriptors. We also confirm that our
feature representation has superior performance to existing state-of-the-art
features like local spatio-temporal features and Improved Trajectory Features
(originally developed for 3rd-person videos) when handling first-person videos.
Multiple first-person activity datasets were tested under various settings to
confirm these findings.
| [
{
"version": "v1",
"created": "Fri, 19 Dec 2014 20:03:00 GMT"
},
{
"version": "v2",
"created": "Wed, 6 May 2015 19:16:08 GMT"
}
] | 2015-05-07T00:00:00 | [
[
"Ryoo",
"M. S.",
""
],
[
"Rothrock",
"Brandon",
""
],
[
"Matthies",
"Larry",
""
]
] | TITLE: Pooled Motion Features for First-Person Videos
ABSTRACT: In this paper, we present a new feature representation for first-person
videos. In first-person video understanding (e.g., activity recognition), it is
very important to capture both entire scene dynamics (i.e., egomotion) and
salient local motion observed in videos. We describe a representation framework
based on time series pooling, which is designed to abstract
short-term/long-term changes in feature descriptor elements. The idea is to
keep track of how descriptor values are changing over time and summarize them
to represent motion in the activity video. The framework is general, handling
any types of per-frame feature descriptors including conventional motion
descriptors like histogram of optical flows (HOF) as well as appearance
descriptors from more recent convolutional neural networks (CNN). We
experimentally confirm that our approach clearly outperforms previous feature
representations including bag-of-visual-words and improved Fisher vector (IFV)
when using identical underlying feature descriptors. We also confirm that our
feature representation has superior performance to existing state-of-the-art
features like local spatio-temporal features and Improved Trajectory Features
(originally developed for 3rd-person videos) when handling first-person videos.
Multiple first-person activity datasets were tested under various settings to
confirm these findings.
|
1501.00334 | Xiaoxian Tang | Jose Israel Rodriguez and Xiaoxian Tang | Data-Discriminants of Likelihood Equations | 2 tables | null | null | null | cs.SC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Maximum likelihood estimation (MLE) is a fundamental computational problem in
statistics. The problem is to maximize the likelihood function with respect to
given data on a statistical model. An algebraic approach to this problem is to
solve a very structured parameterized polynomial system called likelihood
equations. For general choices of data, the number of complex solutions to the
likelihood equations is finite and called the ML-degree of the model. The only
solutions to the likelihood equations that are statistically meaningful are the
real/positive solutions. However, the number of real/positive solutions is not
characterized by the ML-degree. We use discriminants to classify data according
to the number of real/positive solutions of the likelihood equations. We call
these discriminants data-discriminants (DD). We develop a probabilistic
algorithm for computing DDs. Experimental results show that, for the benchmarks
we have tried, the probabilistic algorithm is more efficient than the standard
elimination algorithm. Based on the computational results, we discuss the real
root classification problem for the 3 by 3 symmetric matrix~model.
| [
{
"version": "v1",
"created": "Fri, 2 Jan 2015 01:55:37 GMT"
},
{
"version": "v2",
"created": "Mon, 5 Jan 2015 11:00:10 GMT"
},
{
"version": "v3",
"created": "Fri, 9 Jan 2015 08:28:44 GMT"
},
{
"version": "v4",
"created": "Tue, 20 Jan 2015 02:42:51 GMT"
},
{
"version": "v5",
"created": "Wed, 6 May 2015 00:45:37 GMT"
}
] | 2015-05-07T00:00:00 | [
[
"Rodriguez",
"Jose Israel",
""
],
[
"Tang",
"Xiaoxian",
""
]
] | TITLE: Data-Discriminants of Likelihood Equations
ABSTRACT: Maximum likelihood estimation (MLE) is a fundamental computational problem in
statistics. The problem is to maximize the likelihood function with respect to
given data on a statistical model. An algebraic approach to this problem is to
solve a very structured parameterized polynomial system called likelihood
equations. For general choices of data, the number of complex solutions to the
likelihood equations is finite and called the ML-degree of the model. The only
solutions to the likelihood equations that are statistically meaningful are the
real/positive solutions. However, the number of real/positive solutions is not
characterized by the ML-degree. We use discriminants to classify data according
to the number of real/positive solutions of the likelihood equations. We call
these discriminants data-discriminants (DD). We develop a probabilistic
algorithm for computing DDs. Experimental results show that, for the benchmarks
we have tried, the probabilistic algorithm is more efficient than the standard
elimination algorithm. Based on the computational results, we discuss the real
root classification problem for the 3 by 3 symmetric matrix~model.
|
1505.01173 | Hui Jiang | Hengyue Pan, Bo Wang and Hui Jiang | Deep Learning for Object Saliency Detection and Image Segmentation | 9 pages, 126 figures, technical report | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we propose several novel deep learning methods for object
saliency detection based on the powerful convolutional neural networks. In our
approach, we use a gradient descent method to iteratively modify an input image
based on the pixel-wise gradients to reduce a cost function measuring the
class-specific objectness of the image. The pixel-wise gradients can be
efficiently computed using the back-propagation algorithm. The discrepancy
between the modified image and the original one may be used as a saliency map
for the image. Moreover, we have further proposed several new training methods
to learn saliency-specific convolutional nets for object saliency detection, in
order to leverage the available pixel-wise segmentation information. Our
methods are extremely computationally efficient (processing 20-40 images per
second in one GPU). In this work, we use the computed saliency maps for image
segmentation. Experimental results on two benchmark tasks, namely Microsoft
COCO and Pascal VOC 2012, have shown that our proposed methods can generate
high-quality salience maps, clearly outperforming many existing methods. In
particular, our approaches excel in handling many difficult images, which
contain complex background, highly-variable salient objects, multiple objects,
and/or very small salient objects.
| [
{
"version": "v1",
"created": "Tue, 5 May 2015 20:03:07 GMT"
}
] | 2015-05-07T00:00:00 | [
[
"Pan",
"Hengyue",
""
],
[
"Wang",
"Bo",
""
],
[
"Jiang",
"Hui",
""
]
] | TITLE: Deep Learning for Object Saliency Detection and Image Segmentation
ABSTRACT: In this paper, we propose several novel deep learning methods for object
saliency detection based on the powerful convolutional neural networks. In our
approach, we use a gradient descent method to iteratively modify an input image
based on the pixel-wise gradients to reduce a cost function measuring the
class-specific objectness of the image. The pixel-wise gradients can be
efficiently computed using the back-propagation algorithm. The discrepancy
between the modified image and the original one may be used as a saliency map
for the image. Moreover, we have further proposed several new training methods
to learn saliency-specific convolutional nets for object saliency detection, in
order to leverage the available pixel-wise segmentation information. Our
methods are extremely computationally efficient (processing 20-40 images per
second in one GPU). In this work, we use the computed saliency maps for image
segmentation. Experimental results on two benchmark tasks, namely Microsoft
COCO and Pascal VOC 2012, have shown that our proposed methods can generate
high-quality salience maps, clearly outperforming many existing methods. In
particular, our approaches excel in handling many difficult images, which
contain complex background, highly-variable salient objects, multiple objects,
and/or very small salient objects.
|
1505.01210 | Lars Bonnichsen | Lars F. Bonnichsen, Christian W. Probst, Sven Karlsson | Implementation of BT-trees | null | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This document presents the full implementation details of BT-trees, a highly
efficient ordered map, and an evaluation which compares BT-trees with unordered
maps. BT- trees are often much faster than other ordered maps, and have
comparable performance to unordered map implementations. However, in benchmarks
which favor unordered maps, BT-trees are not faster than the fastest unordered
map implementations we know of.
| [
{
"version": "v1",
"created": "Tue, 5 May 2015 22:40:19 GMT"
}
] | 2015-05-07T00:00:00 | [
[
"Bonnichsen",
"Lars F.",
""
],
[
"Probst",
"Christian W.",
""
],
[
"Karlsson",
"Sven",
""
]
] | TITLE: Implementation of BT-trees
ABSTRACT: This document presents the full implementation details of BT-trees, a highly
efficient ordered map, and an evaluation which compares BT-trees with unordered
maps. BT- trees are often much faster than other ordered maps, and have
comparable performance to unordered map implementations. However, in benchmarks
which favor unordered maps, BT-trees are not faster than the fastest unordered
map implementations we know of.
|
1505.01257 | Tatiana Tommasi | Tatiana Tommasi, Novi Patricia, Barbara Caputo, Tinne Tuytelaars | A Deeper Look at Dataset Bias | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The presence of a bias in each image data collection has recently attracted a
lot of attention in the computer vision community showing the limits in
generalization of any learning method trained on a specific dataset. At the
same time, with the rapid development of deep learning architectures, the
activation values of Convolutional Neural Networks (CNN) are emerging as
reliable and robust image descriptors. In this paper we propose to verify the
potential of the DeCAF features when facing the dataset bias problem. We
conduct a series of analyses looking at how existing datasets differ among each
other and verifying the performance of existing debiasing methods under
different representations. We learn important lessons on which part of the
dataset bias problem can be considered solved and which open questions still
need to be tackled.
| [
{
"version": "v1",
"created": "Wed, 6 May 2015 06:19:23 GMT"
}
] | 2015-05-07T00:00:00 | [
[
"Tommasi",
"Tatiana",
""
],
[
"Patricia",
"Novi",
""
],
[
"Caputo",
"Barbara",
""
],
[
"Tuytelaars",
"Tinne",
""
]
] | TITLE: A Deeper Look at Dataset Bias
ABSTRACT: The presence of a bias in each image data collection has recently attracted a
lot of attention in the computer vision community showing the limits in
generalization of any learning method trained on a specific dataset. At the
same time, with the rapid development of deep learning architectures, the
activation values of Convolutional Neural Networks (CNN) are emerging as
reliable and robust image descriptors. In this paper we propose to verify the
potential of the DeCAF features when facing the dataset bias problem. We
conduct a series of analyses looking at how existing datasets differ among each
other and verifying the performance of existing debiasing methods under
different representations. We learn important lessons on which part of the
dataset bias problem can be considered solved and which open questions still
need to be tackled.
|
1505.01350 | Ozgur Yilmaz | Ozgur Yilmaz | Classification of Occluded Objects using Fast Recurrent Processing | arXiv admin note: text overlap with arXiv:1409.8576 by other authors | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Recurrent neural networks are powerful tools for handling incomplete data
problems in computer vision, thanks to their significant generative
capabilities. However, the computational demand for these algorithms is too
high to work in real time, without specialized hardware or software solutions.
In this paper, we propose a framework for augmenting recurrent processing
capabilities into a feedforward network without sacrificing much from
computational efficiency. We assume a mixture model and generate samples of the
last hidden layer according to the class decisions of the output layer, modify
the hidden layer activity using the samples, and propagate to lower layers. For
visual occlusion problem, the iterative procedure emulates feedforward-feedback
loop, filling-in the missing hidden layer activity with meaningful
representations. The proposed algorithm is tested on a widely used dataset, and
shown to achieve 2$\times$ improvement in classification accuracy for occluded
objects. When compared to Restricted Boltzmann Machines, our algorithm shows
superior performance for occluded object classification.
| [
{
"version": "v1",
"created": "Wed, 6 May 2015 12:58:58 GMT"
}
] | 2015-05-07T00:00:00 | [
[
"Yilmaz",
"Ozgur",
""
]
] | TITLE: Classification of Occluded Objects using Fast Recurrent Processing
ABSTRACT: Recurrent neural networks are powerful tools for handling incomplete data
problems in computer vision, thanks to their significant generative
capabilities. However, the computational demand for these algorithms is too
high to work in real time, without specialized hardware or software solutions.
In this paper, we propose a framework for augmenting recurrent processing
capabilities into a feedforward network without sacrificing much from
computational efficiency. We assume a mixture model and generate samples of the
last hidden layer according to the class decisions of the output layer, modify
the hidden layer activity using the samples, and propagate to lower layers. For
visual occlusion problem, the iterative procedure emulates feedforward-feedback
loop, filling-in the missing hidden layer activity with meaningful
representations. The proposed algorithm is tested on a widely used dataset, and
shown to achieve 2$\times$ improvement in classification accuracy for occluded
objects. When compared to Restricted Boltzmann Machines, our algorithm shows
superior performance for occluded object classification.
|
1505.01474 | Robyn Ffrancon | Robyn Ffrancon | Retaining Experience and Growing Solutions | null | null | null | null | cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Generally, when genetic programming (GP) is used for function synthesis any
valuable experience gained by the system is lost from one problem to the next,
even when the problems are closely related. With the aim of developing a system
which retains beneficial experience from problem to problem, this paper
introduces the novel Node-by-Node Growth Solver (NNGS) algorithm which features
a component, called the controller, which can be adapted and improved for use
across a set of related problems. NNGS grows a single solution tree from root
to leaves. Using semantic backpropagation and acting locally on each node in
turn, the algorithm employs the controller to assign subsequent child nodes
until a fully formed solution is generated.
The aim of this paper is to pave a path towards the use of a neural network
as the controller component and also, separately, towards the use of meta-GP as
a mechanism for improving the controller component. A proof-of-concept
controller is discussed which demonstrates the success and potential of the
NNGS algorithm. In this case, the controller constitutes a set of hand written
rules which can be used to deterministically and greedily solve standard
Boolean function synthesis benchmarks. Even before employing machine learning
to improve the controller, the algorithm vastly outperforms other well known
recent algorithms on run times, maintains comparable solution sizes, and has a
100% success rate on all Boolean function synthesis benchmarks tested so far.
| [
{
"version": "v1",
"created": "Wed, 6 May 2015 19:40:26 GMT"
}
] | 2015-05-07T00:00:00 | [
[
"Ffrancon",
"Robyn",
""
]
] | TITLE: Retaining Experience and Growing Solutions
ABSTRACT: Generally, when genetic programming (GP) is used for function synthesis any
valuable experience gained by the system is lost from one problem to the next,
even when the problems are closely related. With the aim of developing a system
which retains beneficial experience from problem to problem, this paper
introduces the novel Node-by-Node Growth Solver (NNGS) algorithm which features
a component, called the controller, which can be adapted and improved for use
across a set of related problems. NNGS grows a single solution tree from root
to leaves. Using semantic backpropagation and acting locally on each node in
turn, the algorithm employs the controller to assign subsequent child nodes
until a fully formed solution is generated.
The aim of this paper is to pave a path towards the use of a neural network
as the controller component and also, separately, towards the use of meta-GP as
a mechanism for improving the controller component. A proof-of-concept
controller is discussed which demonstrates the success and potential of the
NNGS algorithm. In this case, the controller constitutes a set of hand written
rules which can be used to deterministically and greedily solve standard
Boolean function synthesis benchmarks. Even before employing machine learning
to improve the controller, the algorithm vastly outperforms other well known
recent algorithms on run times, maintains comparable solution sizes, and has a
100% success rate on all Boolean function synthesis benchmarks tested so far.
|
1301.3516 | Mateusz Malinowski | Mateusz Malinowski and Mario Fritz | Learnable Pooling Regions for Image Classification | null | null | null | null | cs.CV cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Biologically inspired, from the early HMAX model to Spatial Pyramid Matching,
pooling has played an important role in visual recognition pipelines. Spatial
pooling, by grouping of local codes, equips these methods with a certain degree
of robustness to translation and deformation yet preserving important spatial
information. Despite the predominance of this approach in current recognition
systems, we have seen little progress to fully adapt the pooling strategy to
the task at hand. This paper proposes a model for learning task dependent
pooling scheme -- including previously proposed hand-crafted pooling schemes as
a particular instantiation. In our work, we investigate the role of different
regularization terms showing that the smooth regularization term is crucial to
achieve strong performance using the presented architecture. Finally, we
propose an efficient and parallel method to train the model. Our experiments
show improved performance over hand-crafted pooling schemes on the CIFAR-10 and
CIFAR-100 datasets -- in particular improving the state-of-the-art to 56.29% on
the latter.
| [
{
"version": "v1",
"created": "Tue, 15 Jan 2013 22:15:06 GMT"
},
{
"version": "v2",
"created": "Tue, 6 Aug 2013 13:51:04 GMT"
},
{
"version": "v3",
"created": "Tue, 5 May 2015 18:12:46 GMT"
}
] | 2015-05-06T00:00:00 | [
[
"Malinowski",
"Mateusz",
""
],
[
"Fritz",
"Mario",
""
]
] | TITLE: Learnable Pooling Regions for Image Classification
ABSTRACT: Biologically inspired, from the early HMAX model to Spatial Pyramid Matching,
pooling has played an important role in visual recognition pipelines. Spatial
pooling, by grouping of local codes, equips these methods with a certain degree
of robustness to translation and deformation yet preserving important spatial
information. Despite the predominance of this approach in current recognition
systems, we have seen little progress to fully adapt the pooling strategy to
the task at hand. This paper proposes a model for learning task dependent
pooling scheme -- including previously proposed hand-crafted pooling schemes as
a particular instantiation. In our work, we investigate the role of different
regularization terms showing that the smooth regularization term is crucial to
achieve strong performance using the presented architecture. Finally, we
propose an efficient and parallel method to train the model. Our experiments
show improved performance over hand-crafted pooling schemes on the CIFAR-10 and
CIFAR-100 datasets -- in particular improving the state-of-the-art to 56.29% on
the latter.
|
1410.0210 | Mateusz Malinowski | Mateusz Malinowski and Mario Fritz | A Multi-World Approach to Question Answering about Real-World Scenes
based on Uncertain Input | Published in NIPS 2014 | null | null | null | cs.AI cs.CL cs.CV cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose a method for automatically answering questions about images by
bringing together recent advances from natural language processing and computer
vision. We combine discrete reasoning with uncertain predictions by a
multi-world approach that represents uncertainty about the perceived world in a
bayesian framework. Our approach can handle human questions of high complexity
about realistic scenes and replies with range of answer like counts, object
classes, instances and lists of them. The system is directly trained from
question-answer pairs. We establish a first benchmark for this task that can be
seen as a modern attempt at a visual turing test.
| [
{
"version": "v1",
"created": "Wed, 1 Oct 2014 12:59:16 GMT"
},
{
"version": "v2",
"created": "Wed, 29 Oct 2014 16:29:44 GMT"
},
{
"version": "v3",
"created": "Tue, 11 Nov 2014 12:13:18 GMT"
},
{
"version": "v4",
"created": "Tue, 5 May 2015 17:39:10 GMT"
}
] | 2015-05-06T00:00:00 | [
[
"Malinowski",
"Mateusz",
""
],
[
"Fritz",
"Mario",
""
]
] | TITLE: A Multi-World Approach to Question Answering about Real-World Scenes
based on Uncertain Input
ABSTRACT: We propose a method for automatically answering questions about images by
bringing together recent advances from natural language processing and computer
vision. We combine discrete reasoning with uncertain predictions by a
multi-world approach that represents uncertainty about the perceived world in a
bayesian framework. Our approach can handle human questions of high complexity
about realistic scenes and replies with range of answer like counts, object
classes, instances and lists of them. The system is directly trained from
question-answer pairs. We establish a first benchmark for this task that can be
seen as a modern attempt at a visual turing test.
|
1411.5190 | Mateusz Malinowski | Mateusz Malinowski and Mario Fritz | A Pooling Approach to Modelling Spatial Relations for Image Retrieval
and Annotation | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Over the last two decades we have witnessed strong progress on modeling
visual object classes, scenes and attributes that have significantly
contributed to automated image understanding. On the other hand, surprisingly
little progress has been made on incorporating a spatial representation and
reasoning in the inference process. In this work, we propose a pooling
interpretation of spatial relations and show how it improves image retrieval
and annotations tasks involving spatial language. Due to the complexity of the
spatial language, we argue for a learning-based approach that acquires a
representation of spatial relations by learning parameters of the pooling
operator. We show improvements on previous work on two datasets and two
different tasks as well as provide additional insights on a new dataset with an
explicit focus on spatial relations.
| [
{
"version": "v1",
"created": "Wed, 19 Nov 2014 11:44:24 GMT"
},
{
"version": "v2",
"created": "Tue, 5 May 2015 17:55:23 GMT"
}
] | 2015-05-06T00:00:00 | [
[
"Malinowski",
"Mateusz",
""
],
[
"Fritz",
"Mario",
""
]
] | TITLE: A Pooling Approach to Modelling Spatial Relations for Image Retrieval
and Annotation
ABSTRACT: Over the last two decades we have witnessed strong progress on modeling
visual object classes, scenes and attributes that have significantly
contributed to automated image understanding. On the other hand, surprisingly
little progress has been made on incorporating a spatial representation and
reasoning in the inference process. In this work, we propose a pooling
interpretation of spatial relations and show how it improves image retrieval
and annotations tasks involving spatial language. Due to the complexity of the
spatial language, we argue for a learning-based approach that acquires a
representation of spatial relations by learning parameters of the pooling
operator. We show improvements on previous work on two datasets and two
different tasks as well as provide additional insights on a new dataset with an
explicit focus on spatial relations.
|
1412.8556 | Jingming Dong | Jingming Dong, Stefano Soatto | Domain-Size Pooling in Local Descriptors: DSP-SIFT | Extended version of the CVPR 2015 paper. Technical Report UCLA CSD
140022 | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We introduce a simple modification of local image descriptors, such as SIFT,
based on pooling gradient orientations across different domain sizes, in
addition to spatial locations. The resulting descriptor, which we call
DSP-SIFT, outperforms other methods in wide-baseline matching benchmarks,
including those based on convolutional neural networks, despite having the same
dimension of SIFT and requiring no training.
| [
{
"version": "v1",
"created": "Tue, 30 Dec 2014 03:49:47 GMT"
},
{
"version": "v2",
"created": "Sat, 28 Feb 2015 20:36:01 GMT"
},
{
"version": "v3",
"created": "Tue, 5 May 2015 05:36:05 GMT"
}
] | 2015-05-06T00:00:00 | [
[
"Dong",
"Jingming",
""
],
[
"Soatto",
"Stefano",
""
]
] | TITLE: Domain-Size Pooling in Local Descriptors: DSP-SIFT
ABSTRACT: We introduce a simple modification of local image descriptors, such as SIFT,
based on pooling gradient orientations across different domain sizes, in
addition to spatial locations. The resulting descriptor, which we call
DSP-SIFT, outperforms other methods in wide-baseline matching benchmarks,
including those based on convolutional neural networks, despite having the same
dimension of SIFT and requiring no training.
|
1504.06451 | Marios Meimaris | Marios Meimaris, George Papastefanatos, Christos Pateritsas, Theodora
Galani and Yannis Stavrakas | A Framework for Managing Evolving Information Resources on the Data Web | arXiv admin note: text overlap with arXiv:1504.01891 | null | null | null | cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The web of data has brought forth the need to preserve and sustain evolving
information within linked datasets; however, a basic requirement of data
preservation is the maintenance of the datasets' structural characteristics as
well. As open data are often found using different and/or heterogeneous data
models and schemata from one source to another, there is a need to reconcile
these mismatches and provide common denominations of interpretation on a
multitude of levels, in order to be able to preserve and manage the evolution
of the generated resources. In this paper, we present a linked data approach
for the preservation and archiving of open heterogeneous datasets that evolve
through time, at both the structural and the semantic layer. We first propose a
set of re-quirements for modelling evolving linked datasets. We then proceed on
concep-tualizing a modelling framework for evolving entities and place these in
a 2x2 model space that consists of the semantic and the temporal dimensions.
| [
{
"version": "v1",
"created": "Fri, 24 Apr 2015 10:02:01 GMT"
},
{
"version": "v2",
"created": "Tue, 5 May 2015 14:43:54 GMT"
}
] | 2015-05-06T00:00:00 | [
[
"Meimaris",
"Marios",
""
],
[
"Papastefanatos",
"George",
""
],
[
"Pateritsas",
"Christos",
""
],
[
"Galani",
"Theodora",
""
],
[
"Stavrakas",
"Yannis",
""
]
] | TITLE: A Framework for Managing Evolving Information Resources on the Data Web
ABSTRACT: The web of data has brought forth the need to preserve and sustain evolving
information within linked datasets; however, a basic requirement of data
preservation is the maintenance of the datasets' structural characteristics as
well. As open data are often found using different and/or heterogeneous data
models and schemata from one source to another, there is a need to reconcile
these mismatches and provide common denominations of interpretation on a
multitude of levels, in order to be able to preserve and manage the evolution
of the generated resources. In this paper, we present a linked data approach
for the preservation and archiving of open heterogeneous datasets that evolve
through time, at both the structural and the semantic layer. We first propose a
set of re-quirements for modelling evolving linked datasets. We then proceed on
concep-tualizing a modelling framework for evolving entities and place these in
a 2x2 model space that consists of the semantic and the temporal dimensions.
|
1505.00796 | Stefanie Haustein | Stefanie Haustein, Timothy D. Bowman and Rodrigo Costas | When is an article actually published? An analysis of online
availability, publication, and indexation dates | accepted for presentation at 15th International Conference on
Scientometrics and Informetrics (ISSI) 2015 | null | null | null | cs.DL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | With the acceleration of scholarly communication in the digital era, the
publication year is no longer a sufficient level of time aggregation for
bibliometric and social media indicators. Papers are increasingly cited before
they have been officially published in a journal issue and mentioned on Twitter
within days of online availability. In order to find a suitable proxy for the
day of online publication allowing for the computation of more accurate
benchmarks and fine-grained citation and social media event windows, various
dates are compared for a set of 58,896 papers published by Nature Publishing
Group, PLOS, Springer and Wiley-Blackwell in 2012. Dates include the online
date provided by the publishers, the month of the journal issue, the Web of
Science indexing date, the date of the first tweet mentioning the paper as well
as the Altmetric.com publication and first-seen dates. Comparing these dates,
the analysis reveals that large differences exist between publishers, leading
to the conclusion that more transparency and standardization is needed in the
reporting of publication dates. The date on which the fixed journal article
(Version of Record) is first made available on the publisher's website is
proposed as a consistent definition of the online date.
| [
{
"version": "v1",
"created": "Mon, 4 May 2015 20:07:47 GMT"
}
] | 2015-05-06T00:00:00 | [
[
"Haustein",
"Stefanie",
""
],
[
"Bowman",
"Timothy D.",
""
],
[
"Costas",
"Rodrigo",
""
]
] | TITLE: When is an article actually published? An analysis of online
availability, publication, and indexation dates
ABSTRACT: With the acceleration of scholarly communication in the digital era, the
publication year is no longer a sufficient level of time aggregation for
bibliometric and social media indicators. Papers are increasingly cited before
they have been officially published in a journal issue and mentioned on Twitter
within days of online availability. In order to find a suitable proxy for the
day of online publication allowing for the computation of more accurate
benchmarks and fine-grained citation and social media event windows, various
dates are compared for a set of 58,896 papers published by Nature Publishing
Group, PLOS, Springer and Wiley-Blackwell in 2012. Dates include the online
date provided by the publishers, the month of the journal issue, the Web of
Science indexing date, the date of the first tweet mentioning the paper as well
as the Altmetric.com publication and first-seen dates. Comparing these dates,
the analysis reveals that large differences exist between publishers, leading
to the conclusion that more transparency and standardization is needed in the
reporting of publication dates. The date on which the fixed journal article
(Version of Record) is first made available on the publisher's website is
proposed as a consistent definition of the online date.
|
1505.00824 | Eva Dyer | Eva L. Dyer, Tom A. Goldstein, Raajen Patel, Konrad P. Kording, and
Richard G. Baraniuk | Self-Expressive Decompositions for Matrix Approximation and Clustering | 11 pages, 7 figures | null | null | null | cs.IT cs.CV cs.LG math.IT stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Data-aware methods for dimensionality reduction and matrix decomposition aim
to find low-dimensional structure in a collection of data. Classical approaches
discover such structure by learning a basis that can efficiently express the
collection. Recently, "self expression", the idea of using a small subset of
data vectors to represent the full collection, has been developed as an
alternative to learning. Here, we introduce a scalable method for computing
sparse SElf-Expressive Decompositions (SEED). SEED is a greedy method that
constructs a basis by sequentially selecting incoherent vectors from the
dataset. After forming a basis from a subset of vectors in the dataset, SEED
then computes a sparse representation of the dataset with respect to this
basis. We develop sufficient conditions under which SEED exactly represents low
rank matrices and vectors sampled from a unions of independent subspaces. We
show how SEED can be used in applications ranging from matrix approximation and
denoising to clustering, and apply it to numerous real-world datasets. Our
results demonstrate that SEED is an attractive low-complexity alternative to
other sparse matrix factorization approaches such as sparse PCA and
self-expressive methods for clustering.
| [
{
"version": "v1",
"created": "Mon, 4 May 2015 21:56:54 GMT"
}
] | 2015-05-06T00:00:00 | [
[
"Dyer",
"Eva L.",
""
],
[
"Goldstein",
"Tom A.",
""
],
[
"Patel",
"Raajen",
""
],
[
"Kording",
"Konrad P.",
""
],
[
"Baraniuk",
"Richard G.",
""
]
] | TITLE: Self-Expressive Decompositions for Matrix Approximation and Clustering
ABSTRACT: Data-aware methods for dimensionality reduction and matrix decomposition aim
to find low-dimensional structure in a collection of data. Classical approaches
discover such structure by learning a basis that can efficiently express the
collection. Recently, "self expression", the idea of using a small subset of
data vectors to represent the full collection, has been developed as an
alternative to learning. Here, we introduce a scalable method for computing
sparse SElf-Expressive Decompositions (SEED). SEED is a greedy method that
constructs a basis by sequentially selecting incoherent vectors from the
dataset. After forming a basis from a subset of vectors in the dataset, SEED
then computes a sparse representation of the dataset with respect to this
basis. We develop sufficient conditions under which SEED exactly represents low
rank matrices and vectors sampled from a unions of independent subspaces. We
show how SEED can be used in applications ranging from matrix approximation and
denoising to clustering, and apply it to numerous real-world datasets. Our
results demonstrate that SEED is an attractive low-complexity alternative to
other sparse matrix factorization approaches such as sparse PCA and
self-expressive methods for clustering.
|
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.