| { |
| "paper_id": "P14-1001", |
| "header": { |
| "generated_with": "S2ORC 1.0.0", |
| "date_generated": "2023-01-19T09:06:50.589643Z" |
| }, |
| "title": "Learning Ensembles of Structured Prediction Rules", |
| "authors": [ |
| { |
| "first": "Corinna", |
| "middle": [], |
| "last": "Cortes", |
| "suffix": "", |
| "affiliation": { |
| "laboratory": "", |
| "institution": "Google Research", |
| "location": { |
| "addrLine": "111 8th Avenue", |
| "postCode": "10011", |
| "settlement": "New York", |
| "region": "NY" |
| } |
| }, |
| "email": "corinna@google.com" |
| }, |
| { |
| "first": "Vitaly", |
| "middle": [], |
| "last": "Kuznetsov", |
| "suffix": "", |
| "affiliation": { |
| "laboratory": "", |
| "institution": "Courant Institute", |
| "location": { |
| "addrLine": "251 Mercer Street", |
| "postCode": "10012", |
| "settlement": "New York", |
| "region": "NY" |
| } |
| }, |
| "email": "vitaly@cims.nyu.edu" |
| }, |
| { |
| "first": "Mehryar", |
| "middle": [], |
| "last": "Mohri", |
| "suffix": "", |
| "affiliation": { |
| "laboratory": "", |
| "institution": "Courant Institute and Google Research", |
| "location": { |
| "addrLine": "251 Mercer Street", |
| "postCode": "10012", |
| "settlement": "New York", |
| "region": "NY" |
| } |
| }, |
| "email": "mohri@cims.nyu.edu" |
| } |
| ], |
| "year": "", |
| "venue": null, |
| "identifiers": {}, |
| "abstract": "We present a series of algorithms with theoretical guarantees for learning accurate ensembles of several structured prediction rules for which no prior knowledge is assumed. This includes a number of randomized and deterministic algorithms devised by converting on-line learning algorithms to batch ones, and a boostingstyle algorithm applicable in the context of structured prediction with a large number of labels. We also report the results of extensive experiments with these algorithms.", |
| "pdf_parse": { |
| "paper_id": "P14-1001", |
| "_pdf_hash": "", |
| "abstract": [ |
| { |
| "text": "We present a series of algorithms with theoretical guarantees for learning accurate ensembles of several structured prediction rules for which no prior knowledge is assumed. This includes a number of randomized and deterministic algorithms devised by converting on-line learning algorithms to batch ones, and a boostingstyle algorithm applicable in the context of structured prediction with a large number of labels. We also report the results of extensive experiments with these algorithms.", |
| "cite_spans": [], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "Abstract", |
| "sec_num": null |
| } |
| ], |
| "body_text": [ |
| { |
| "text": "We study the problem of learning accurate ensembles of structured prediction experts. Ensemble methods are widely used in machine learning and have been shown to be often very effective (Breiman, 1996; Smyth and Wolpert, 1999; MacKay, 1991; Freund et al., 2004) . However, ensemble methods and their theory have been developed primarily for binary classification or regression tasks. Their techniques do not readily apply to structured prediction problems. While it is straightforward to combine scalar outputs for a classification or regression problem, it is less clear how to combine structured predictions such as phonemic pronunciation hypotheses, speech recognition lattices, parse trees, or alternative machine translations.", |
| "cite_spans": [ |
| { |
| "start": 186, |
| "end": 201, |
| "text": "(Breiman, 1996;", |
| "ref_id": "BIBREF0" |
| }, |
| { |
| "start": 202, |
| "end": 226, |
| "text": "Smyth and Wolpert, 1999;", |
| "ref_id": "BIBREF30" |
| }, |
| { |
| "start": 227, |
| "end": 240, |
| "text": "MacKay, 1991;", |
| "ref_id": "BIBREF17" |
| }, |
| { |
| "start": 241, |
| "end": 261, |
| "text": "Freund et al., 2004)", |
| "ref_id": "BIBREF10" |
| } |
| ], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "Introduction", |
| "sec_num": "1" |
| }, |
| { |
| "text": "Consider for example the problem of devising an ensemble method for pronunciation, a critical component of modern speech recognition (Ghoshal et al., 2009) . Often, several pronunciation models or experts are available for transcribing words into sequences of phonemes. These models may have been derived using other machine learning algorithms or they may be based on carefully hand-crafted rules. In general, none of these pronunciation experts is fully accurate and each expert may be making mistakes at different positions along the output sequence. One can hope that a model that patches together the pronunciation of different experts could achieve a superior performance.", |
| "cite_spans": [ |
| { |
| "start": 133, |
| "end": 155, |
| "text": "(Ghoshal et al., 2009)", |
| "ref_id": "BIBREF11" |
| } |
| ], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "Introduction", |
| "sec_num": "1" |
| }, |
| { |
| "text": "Similar ensemble structured prediction problems arise in other tasks, including machine translation, part-of-speech tagging, optical character recognition and computer vision, with structures or substructures varying with each task. We seek to tackle all of these problems simultaneously and consider the general setting where the label or output associated to an input x \u2208 X is a structure y \u2208 Y that can be decomposed and represented by l substructures y 1 , . . . , y l . For the pronunciation example just discussed, x is a specific word or word sequence and y its phonemic transcription. A natural choice for the substructures y k is then the individual phonemes forming y. Other possible choices include n-grams of consecutive phonemes or more general subsequences.", |
| "cite_spans": [], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "Introduction", |
| "sec_num": "1" |
| }, |
| { |
| "text": "We will assume that the loss function considered admits an additive decomposition over the substructures, as is common in structured prediction. We also assume access to a set of structured prediction experts h 1 , . . . , h p that we treat as black boxes. Given an input x \u2208 X , each expert predicts a structure h j (x) = (h 1 j (x), . . . , h l j (x)). The hypotheses h j may be the output of a structured prediction algorithm such as Conditional Random Fields (Lafferty et al., 2001) , Averaged Perceptron (Collins, 2002 ), StructSVM (Tsochantaridis et al., 2005 , Max Margin Markov Networks (Taskar et al., 2004) or the Regression Technique for Learning Transductions (Cortes et al., 2005) , or some other algorithmic or human expert. Given a labeled training sample (x 1 , y 1 ), . . . , (x m , y m ), our objective is to use the predictions of these experts to form an accurate ensemble.", |
| "cite_spans": [ |
| { |
| "start": 456, |
| "end": 486, |
| "text": "Fields (Lafferty et al., 2001)", |
| "ref_id": null |
| }, |
| { |
| "start": 509, |
| "end": 523, |
| "text": "(Collins, 2002", |
| "ref_id": "BIBREF4" |
| }, |
| { |
| "start": 524, |
| "end": 565, |
| "text": "), StructSVM (Tsochantaridis et al., 2005", |
| "ref_id": null |
| }, |
| { |
| "start": 595, |
| "end": 616, |
| "text": "(Taskar et al., 2004)", |
| "ref_id": "BIBREF31" |
| }, |
| { |
| "start": 672, |
| "end": 693, |
| "text": "(Cortes et al., 2005)", |
| "ref_id": "BIBREF5" |
| } |
| ], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "Introduction", |
| "sec_num": "1" |
| }, |
| { |
| "text": "Variants of the ensemble problem just formulated have been studied in the past in the natural language processing and machine learning literature. One of the most recent, and possibly most relevant studies for sequence data is that of (Nguyen and Guo, 2007) , which is based on the forward stepwise selection introduced by (Caruana et al., 2004) . However, one disadvantage of this greedy approach is that it can be proven to fail to select an optimal ensemble of experts even in favorable cases where a specialized expert is available for each local prediction (Cortes et al., 2014a) . Ensemble methods for structured prediction based on bagging, random forests and random subspaces have also been proposed in (Kocev et al., 2013) . One of the limitations of this work is that it is applicable only to a very specific class of treebased experts introduced in that paper. Similarly, a boosting approach was developed in (Wang et al., 2007) but it applies only to local experts. In the context of natural language processing, a variety of different re-ranking techniques have been proposed for somewhat related problems (Collins and Koo, 2005; Zeman and\u017dabokrtsk\u00fd, 2005; Sagae and Lavie, 2006; Zhang et al., 2009) . But, reranking methods do not combine predictions at the level of substructures, thus the final prediction of the ensemble coincides with the prediction made by one of the experts, which can be shown to be suboptimal in many cases. Furthermore, these methods typically assume the use of probabilistic models, which is not a requirement in our learning scenario. Other ensembles of probabilistic models have also been considered in text and speech processing by forming a product of probabilistic models via the intersection of lattices (Mohri et al., 2008) , or a straightforward combination of the posteriors from probabilistic grammars trained using EM with different starting points (Petrov, 2010) , or some other rather intricate techniques in speech recognition (Fiscus, 1997) . Finally, an algorithm of (MacKay, 1997) is another example of an ensemble method for structured prediction though it is not addressing directly the problem we are considering.", |
| "cite_spans": [ |
| { |
| "start": 235, |
| "end": 257, |
| "text": "(Nguyen and Guo, 2007)", |
| "ref_id": "BIBREF22" |
| }, |
| { |
| "start": 323, |
| "end": 345, |
| "text": "(Caruana et al., 2004)", |
| "ref_id": "BIBREF1" |
| }, |
| { |
| "start": 562, |
| "end": 584, |
| "text": "(Cortes et al., 2014a)", |
| "ref_id": "BIBREF6" |
| }, |
| { |
| "start": 711, |
| "end": 731, |
| "text": "(Kocev et al., 2013)", |
| "ref_id": "BIBREF14" |
| }, |
| { |
| "start": 920, |
| "end": 939, |
| "text": "(Wang et al., 2007)", |
| "ref_id": null |
| }, |
| { |
| "start": 1119, |
| "end": 1142, |
| "text": "(Collins and Koo, 2005;", |
| "ref_id": "BIBREF3" |
| }, |
| { |
| "start": 1143, |
| "end": 1169, |
| "text": "Zeman and\u017dabokrtsk\u00fd, 2005;", |
| "ref_id": null |
| }, |
| { |
| "start": 1170, |
| "end": 1192, |
| "text": "Sagae and Lavie, 2006;", |
| "ref_id": "BIBREF26" |
| }, |
| { |
| "start": 1193, |
| "end": 1212, |
| "text": "Zhang et al., 2009)", |
| "ref_id": "BIBREF32" |
| }, |
| { |
| "start": 1751, |
| "end": 1771, |
| "text": "(Mohri et al., 2008)", |
| "ref_id": "BIBREF19" |
| }, |
| { |
| "start": 1901, |
| "end": 1915, |
| "text": "(Petrov, 2010)", |
| "ref_id": "BIBREF24" |
| }, |
| { |
| "start": 1982, |
| "end": 1996, |
| "text": "(Fiscus, 1997)", |
| "ref_id": "BIBREF9" |
| } |
| ], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "Introduction", |
| "sec_num": "1" |
| }, |
| { |
| "text": "Most of the references just mentioned do not give a rigorous theoretical justification for the techniques proposed. We are not aware of any prior theoretical analysis for the ensemble structured predic-tion problem we consider. Here, we present two families of algorithms for learning ensembles of structured prediction rules that both perform well in practice and enjoy strong theoretical guarantees. In Section 3, we develop ensemble methods based on on-line algorithms. To do so, we extend existing on-line-to-batch conversions to our more general setting. In Section 4, we present a new boosting-style algorithm which is applicable even with a large set of classes as in the problem we consider, and for which we present margin-based learning guarantees. Section 5 reports the results of our extensive experiments. 1", |
| "cite_spans": [], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "Introduction", |
| "sec_num": "1" |
| }, |
| { |
| "text": "As in standard supervised learning problems, we assume that the learner receives a training sample", |
| "cite_spans": [], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "Learning scenario", |
| "sec_num": "2" |
| }, |
| { |
| "text": "S = ((x 1 , y 1 ), . . . , (x m , y m )) \u2208 X \u00d7 Y of m labeled points drawn i.i.d.", |
| "cite_spans": [], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "Learning scenario", |
| "sec_num": "2" |
| }, |
| { |
| "text": "according to the some distribution D used both for training and testing. We also assume that the learner has access to a set of p predictors h 1 , . . . , h p mapping X to Y to devise an accurate ensemble prediction. Thus, for any input x \u2208 X , he can use the prediction of the p experts h 1 (x), . . . , h p (x). No other information is available to the learner about these p experts, in particular the way they have been trained or derived is not known to the learner. But, we will assume that the training sample S is distinct from what may have been used for training the algorithms that generated h 1 (x), . . . , h p (x).", |
| "cite_spans": [], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "Learning scenario", |
| "sec_num": "2" |
| }, |
| { |
| "text": "To simplify our analysis, we assume that the number of substructures l \u2265 1 is fixed. This does not cause any loss of generality so long as the maximum number of substructures is bounded, which is the case in all the applications we consider. The quality of the predictions is measured by a loss function L : Y \u00d7 Y \u2192 R + that can be decomposed as a sum of loss functions k : Y k \u2192 R + over the substructure sets Y k , that is, for all y = (y 1 , . . . , y l ) \u2208 Y with y k \u2208 Y k and y", |
| "cite_spans": [], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "Learning scenario", |
| "sec_num": "2" |
| }, |
| { |
| "text": "EQUATION", |
| "cite_spans": [], |
| "ref_spans": [], |
| "eq_spans": [ |
| { |
| "start": 0, |
| "end": 8, |
| "text": "EQUATION", |
| "ref_id": "EQREF", |
| "raw_str": "= (y 1 , . . . , y l ) \u2208 Y with y k \u2208 Y k , L(y, y ) = l k=1 k (y k , y k ).", |
| "eq_num": "(1)" |
| } |
| ], |
| "section": "Learning scenario", |
| "sec_num": "2" |
| }, |
| { |
| "text": "We will assume in all that follows that the loss function L is bounded: L(y, y ) \u2264 M for all (y, y ) for some M > 0. A prototypical example of such loss functions is the normalized Hamming loss L Ham , which is the fraction of substructures for which two labels y and y disagree, thus in that case k (y k , y k ) = 1 l I y k =y k and M = 1.", |
| "cite_spans": [], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "Learning scenario", |
| "sec_num": "2" |
| }, |
| { |
| "text": "3 On-line learning approach", |
| "cite_spans": [], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "Learning scenario", |
| "sec_num": "2" |
| }, |
| { |
| "text": "In this section, we present an on-line learning solution to the ensemble structured prediction problem just discussed. We first give a new formulation of the problem as that of on-line learning with expert advice, where the experts correspond to the paths of an acyclic automaton. The on-line algorithm generates at each iteration a distribution over the path-experts. A critical component of our approach consists of using these distributions to define a prediction algorithm with favorable generalization guarantees. This requires an extension of the existing on-line-to-batch conversion techniques to the more general case of combining distributions over path-experts, as opposed to combining single hypotheses.", |
| "cite_spans": [], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "Learning scenario", |
| "sec_num": "2" |
| }, |
| { |
| "text": "Each expert h j induces a set of substructure hypotheses h 1 j , . . . , h l j . As already discussed, one particular expert may be better at predicting the kth substructure while some other expert may be more accurate at predicting another substructure. Therefore, it is desirable to combine the substructure predictions of all experts to derive a more accurate prediction. This leads us to considering an acyclic finite automaton G such as that of Figure 1 which admits all possible sequences of substructure hypotheses, or, more generally, a finite automaton such as that of Figure 2 which only allows a subset of these sequences.", |
| "cite_spans": [], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "Path experts", |
| "sec_num": "3.1" |
| }, |
| { |
| "text": "An automaton such as G compactly represents a set of path experts: each path from the initial vertex 0 to the final vertex l is labeled with a sequence of substructure hypotheses", |
| "cite_spans": [], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "Path experts", |
| "sec_num": "3.1" |
| }, |
| { |
| "text": "h 1 j 1 , . . . , h l j l", |
| "cite_spans": [], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "Path experts", |
| "sec_num": "3.1" |
| }, |
| { |
| "text": "and defines a hypothesis which associates to input", |
| "cite_spans": [], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "Path experts", |
| "sec_num": "3.1" |
| }, |
| { |
| "text": "x the output h 1 j 1 (x) \u2022 \u2022 \u2022 h l j l (x).", |
| "cite_spans": [], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "Path experts", |
| "sec_num": "3.1" |
| }, |
| { |
| "text": "We will denote by H the set of all path experts. We also denote by h each path expert defined by h 1 j 1 , . . . , h l j l , with j k \u2208 {1, . . . , p}, and denote by h k its kth substructure hypothesis h k j k . Our ensemble structure prediction problem can then be formulated as that of selecting the best path expert (or collection of path experts) in G. Note that, in general, the path expert selected does not coincide with any of the original experts h 1 , . . . , h p .", |
| "cite_spans": [], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "Path experts", |
| "sec_num": "3.1" |
| }, |
| { |
| "text": "Using an automaton G, the size of the pool of experts H we consider can be very large. For example, in the case of the automaton of Figure 1 , the size of the pool of experts is p l , and thus is exponentially large with respect to p. But, since learning guarantees in on-line learning admit only a logarithmic dependence on that size, they remain informative in this context. Nevertheless, the computational complexity of most on-line algorithms also directly depends on that size, which could make them impractical in this context. But, there exist several on-line solutions precisely designed to address this issue by exploiting the structure of the experts as in the case of our path experts. These include the algorithm of (Takimoto and Warmuth, 2003) denoted by WMWP, which is an extension of the (randomized) weightedmajority (WM) algorithm of (Littlestone and Warmuth, 1994) to more general bounded loss functions combined with the Weight Pushing (WP) algorithm of (Mohri, 1997) ; and the Follow the Perturbed Leader (FPL) algorithm of (Kalai and Vempala, 2005). The WMWP algorithm admits a more favorable regret guarantee than the FPL algorithm in our context and our discussion will focus on the use of WMWP for the design of our batch algorithm. However, we have also fully analyzed and implemented a batch algorithm based on FPL (Cortes et al., 2014a) .", |
| "cite_spans": [ |
| { |
| "start": 851, |
| "end": 882, |
| "text": "(Littlestone and Warmuth, 1994)", |
| "ref_id": "BIBREF15" |
| }, |
| { |
| "start": 973, |
| "end": 986, |
| "text": "(Mohri, 1997)", |
| "ref_id": "BIBREF21" |
| }, |
| { |
| "start": 1341, |
| "end": 1363, |
| "text": "(Cortes et al., 2014a)", |
| "ref_id": "BIBREF6" |
| } |
| ], |
| "ref_spans": [ |
| { |
| "start": 132, |
| "end": 140, |
| "text": "Figure 1", |
| "ref_id": "FIGREF0" |
| } |
| ], |
| "eq_spans": [], |
| "section": "On-line algorithm", |
| "sec_num": "3.2" |
| }, |
| { |
| "text": "As in the standard WM algorithm (Littlestone and Warmuth, 1994) , WMWP maintains at each round t \u2208 [1, T ], a distribution p t over the set of all experts, which in this context are the path experts h \u2208 H. At each round t \u2208 [1, T ], the algorithm receives an input sequence x t , incurs the loss", |
| "cite_spans": [ |
| { |
| "start": 32, |
| "end": 63, |
| "text": "(Littlestone and Warmuth, 1994)", |
| "ref_id": "BIBREF15" |
| } |
| ], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "On-line algorithm", |
| "sec_num": "3.2" |
| }, |
| { |
| "text": "E h\u223cpt [L(h(x t ), y t )] = h p t (h)L(h(x t ), y t )", |
| "cite_spans": [], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "On-line algorithm", |
| "sec_num": "3.2" |
| }, |
| { |
| "text": "and multiplicatively updates the distribution weight per expert: where \u03b2 \u2208 (0, 1) is some fixed parameter. The number of paths is exponentially large in p and the cost of updating all paths is therefore prohibitive. However, since the loss function is additive in the substructures and the updates are multiplicative, it suffices to maintain instead a weight w t (e) per transition e, following the update w t+1 (e) = w t (e)\u03b2 e (xt,yt) orig(e )=orig(e) w t (e )\u03b2 e (xt,yt) ( 3)where e (x t , y t ) denotes the loss incurred by the substructure predictor labeling e for the input x t and output y t , and orig(e ) denotes the origin state of a transition e (Takimoto and Warmuth, 2003) . Thus, the cost of the update is then linear in the size of the automaton. To use the resulting weighted automaton for sampling, the weight pushing algorithm is used, whose complexity is also linear in the size of the automaton (Mohri, 1997) .", |
| "cite_spans": [ |
| { |
| "start": 429, |
| "end": 436, |
| "text": "(xt,yt)", |
| "ref_id": null |
| }, |
| { |
| "start": 466, |
| "end": 473, |
| "text": "(xt,yt)", |
| "ref_id": null |
| }, |
| { |
| "start": 671, |
| "end": 685, |
| "text": "Warmuth, 2003)", |
| "ref_id": "BIBREF30" |
| }, |
| { |
| "start": 915, |
| "end": 928, |
| "text": "(Mohri, 1997)", |
| "ref_id": "BIBREF21" |
| } |
| ], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "On-line algorithm", |
| "sec_num": "3.2" |
| }, |
| { |
| "text": "EQUATION", |
| "cite_spans": [], |
| "ref_spans": [], |
| "eq_spans": [ |
| { |
| "start": 0, |
| "end": 8, |
| "text": "EQUATION", |
| "ref_id": "EQREF", |
| "raw_str": "\u2200h \u2208 H, p t+1 (h) = p t (h)\u03b2 L(h(xt),yt) h \u2208H p t (h )\u03b2 L(h (xt),yt) ,", |
| "eq_num": "(2)" |
| } |
| ], |
| "section": "On-line algorithm", |
| "sec_num": "3.2" |
| }, |
| { |
| "text": "The WMWP algorithm does not produce a sequence of path experts, rather, a sequence of distributions p 1 , . . . , p T over path experts. Thus, the on-line-to-batch conversion techniques described in (Littlestone, 1989; Cesa-Bianchi et al., 2004; Dekel and Singer, 2005) do not readily apply. Instead, we propose a generalization of the techniques of (Dekel and Singer, 2005) . The conversion consists of two steps: extract a good collection of distributions P \u2286 {p 1 , . . . , p T }; next use P to define an accurate hypothesis for prediction. For a subset P \u2286 {p 1 , . . . , p T }, we define", |
| "cite_spans": [ |
| { |
| "start": 199, |
| "end": 218, |
| "text": "(Littlestone, 1989;", |
| "ref_id": "BIBREF16" |
| }, |
| { |
| "start": 219, |
| "end": 245, |
| "text": "Cesa-Bianchi et al., 2004;", |
| "ref_id": "BIBREF2" |
| }, |
| { |
| "start": 246, |
| "end": 269, |
| "text": "Dekel and Singer, 2005)", |
| "ref_id": "BIBREF8" |
| }, |
| { |
| "start": 350, |
| "end": 374, |
| "text": "(Dekel and Singer, 2005)", |
| "ref_id": "BIBREF8" |
| } |
| ], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "On-line-to-batch conversion", |
| "sec_num": "3.3" |
| }, |
| { |
| "text": "\u0393(P) = 1 |P| pt\u2208P h\u2208H p t (h)L(h(x t ), y t )+M log 1 \u03b4 |P| = 1 |P| pt\u2208P e w t (e) e (x t ), y t )+M log 1 \u03b4 |P| ,", |
| "cite_spans": [], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "On-line-to-batch conversion", |
| "sec_num": "3.3" |
| }, |
| { |
| "text": "where \u03b4 > 0 is a fixed parameter. With this definition, we choose P \u03b4 as a minimizer of \u0393(P) over some collection P of subsets of {p 1 , . . . , p T }: P \u03b4 \u2208 argmin P\u2208P \u0393(P). The choice of P is restricted by computational considerations. One natural option is to let P be the union of the suffix sets {p t , . . . , p T }, t = 1, . . . , T . We will assume in what follows that P includes the set", |
| "cite_spans": [], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "On-line-to-batch conversion", |
| "sec_num": "3.3" |
| }, |
| { |
| "text": "{p 1 , . . . , p T }.", |
| "cite_spans": [], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "On-line-to-batch conversion", |
| "sec_num": "3.3" |
| }, |
| { |
| "text": "Next, we define a randomized algorithm based on P \u03b4 . Given an input x, the algorithm consists of randomly selecting a path h according to", |
| "cite_spans": [], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "On-line-to-batch conversion", |
| "sec_num": "3.3" |
| }, |
| { |
| "text": "EQUATION", |
| "cite_spans": [], |
| "ref_spans": [], |
| "eq_spans": [ |
| { |
| "start": 0, |
| "end": 8, |
| "text": "EQUATION", |
| "ref_id": "EQREF", |
| "raw_str": "p(h) = 1 |P \u03b4 | pt\u2208P \u03b4 p t (h),", |
| "eq_num": "(4)" |
| } |
| ], |
| "section": "On-line-to-batch conversion", |
| "sec_num": "3.3" |
| }, |
| { |
| "text": "and returning the prediction h(x). Note that computing and storing p directly is not efficient. To sample from p, we first choose p t \u2208 P \u03b4 uniformly at random and then sample a path h according to that p t . Sampling a path according to p t can be done efficiently using the weight pushing algorithm. Note that once an input x is received, the distribution p over the path experts h induces a probability distribution p x over the output space Y. It is not hard to see that sampling a prediction y according to p x is statistically equivalent to first sampling h according to p and then predicting h(x). We will denote by H Rand the randomized hypothesis thereby generated.", |
| "cite_spans": [], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "On-line-to-batch conversion", |
| "sec_num": "3.3" |
| }, |
| { |
| "text": "An inherent drawback of randomized solutions such as the one just described is that for the same input x the user can receive different predictions over time. Randomized solutions are also typically more costly to store. A collection of distributions P can also be used to define a deterministic prediction rule based on the scoring function approach. The majority vote scoring function is defined by", |
| "cite_spans": [], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "On-line-to-batch conversion", |
| "sec_num": "3.3" |
| }, |
| { |
| "text": "h MVote (x, y) = l k=1 1 |P \u03b4 | pt\u2208P \u03b4 p j=1 w t,kj 1 h k j (x)=y k . (5)", |
| "cite_spans": [], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "On-line-to-batch conversion", |
| "sec_num": "3.3" |
| }, |
| { |
| "text": "The majority vote algorithm denoted by H MVote is then defined for all x \u2208 X , by H MVote (x) = argmax y\u2208Y h MVote (x, y). For an expert automaton accepting all path experts such as that of Figure 1, the maximizer of h MVote can be found very efficiently by choosing y such that y k has the maximum weight in position k.", |
| "cite_spans": [], |
| "ref_spans": [ |
| { |
| "start": 190, |
| "end": 196, |
| "text": "Figure", |
| "ref_id": null |
| } |
| ], |
| "eq_spans": [], |
| "section": "On-line-to-batch conversion", |
| "sec_num": "3.3" |
| }, |
| { |
| "text": "In the next section, we present learning guarantees for H Rand and H MVote . For a more extensive dis-cussion of alternative prediction rules, see (Cortes et al., 2014a) .", |
| "cite_spans": [ |
| { |
| "start": 147, |
| "end": 169, |
| "text": "(Cortes et al., 2014a)", |
| "ref_id": "BIBREF6" |
| } |
| ], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "On-line-to-batch conversion", |
| "sec_num": "3.3" |
| }, |
| { |
| "text": "We first present learning bounds for the randomized prediction rule H Rand . Next, we upper bound the generalization error of H MVote in terms of that of H Rand . Theorem 1. For any \u03b4 > 0, with probability at least 1 \u2212 \u03b4 over the choice of the sample", |
| "cite_spans": [], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "Batch learning guarantees", |
| "sec_num": "3.4" |
| }, |
| { |
| "text": "((x 1 , y 1 ), . . . , (x T , y T )) drawn i.i.d.", |
| "cite_spans": [], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "Batch learning guarantees", |
| "sec_num": "3.4" |
| }, |
| { |
| "text": "according to D, the following inequalities hold:", |
| "cite_spans": [], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "Batch learning guarantees", |
| "sec_num": "3.4" |
| }, |
| { |
| "text": "E[L(H Rand (x), y)] \u2264 inf h\u2208H E[L(h(x), y)] + 2M l log p T + 2M log 2 \u03b4 T .", |
| "cite_spans": [], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "Batch learning guarantees", |
| "sec_num": "3.4" |
| }, |
| { |
| "text": "For the normalized Hamming loss L Ham , the bound of Theorem 1 holds with M = 1.", |
| "cite_spans": [], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "Batch learning guarantees", |
| "sec_num": "3.4" |
| }, |
| { |
| "text": "We now upper bound the generalization error of the majority-vote algorithm H MVote in terms of that of the randomized algorithm H Rand , which, combined with Theorem 1, immediately yields generalization bounds for the majority-vote algorithm H MVote . Proposition 2. The following inequality relates the generalization error of the majority-vote algorithm to that of the randomized one:", |
| "cite_spans": [], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "Batch learning guarantees", |
| "sec_num": "3.4" |
| }, |
| { |
| "text": "E[L Ham (H MVote (x),y)] \u2264 2 E[L Ham (H Rand (x),y)],", |
| "cite_spans": [], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "Batch learning guarantees", |
| "sec_num": "3.4" |
| }, |
| { |
| "text": "where the expectations are taken over (x, y) \u223c D and h \u223c p.", |
| "cite_spans": [], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "Batch learning guarantees", |
| "sec_num": "3.4" |
| }, |
| { |
| "text": "Proposition 2 suggests that the price to pay for derandomization is a factor of 2. More refined and more favorable guarantees can be proven for the majority-vote algorithm (Cortes et al., 2014a) .", |
| "cite_spans": [ |
| { |
| "start": 172, |
| "end": 194, |
| "text": "(Cortes et al., 2014a)", |
| "ref_id": "BIBREF6" |
| } |
| ], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "Batch learning guarantees", |
| "sec_num": "3.4" |
| }, |
| { |
| "text": "In this section, we devise a boosting-style algorithm for our ensemble structured prediction problem. The variants of AdaBoost for multiclass classification such as AdaBoost.MH or Ad-aBoost.MR Schapire and Singer, 1999; Schapire and Singer, 2000) cannot be readily applied in this context. First, the number of classes to consider here is quite large, as in all structured prediction problems, since it is exponential in the number of substructures l. For example, in the case of the pronunciation problem where the number of phonemes for English is in the order of 50, the number of classes is 50 l . But, the objective function for AdaBoost.MH or AdaBoost.MR as well as the main steps of the algorithms include a sum over all possible labels, whose computational cost in this context would be prohibitive. Second, the loss function we consider is the normalized Hamming loss over the substructures predictions, which does not match the multiclass losses for the variants of AdaBoost. 2 Finally, the natural base hypotheses for this problem admit a structure that can be exploited to devise a more efficient solution, which of course was not part of the original considerations for the design of these variants of AdaBoost.", |
| "cite_spans": [ |
| { |
| "start": 193, |
| "end": 219, |
| "text": "Schapire and Singer, 1999;", |
| "ref_id": "BIBREF27" |
| }, |
| { |
| "start": 220, |
| "end": 246, |
| "text": "Schapire and Singer, 2000)", |
| "ref_id": "BIBREF28" |
| } |
| ], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "Boosting-style algorithm", |
| "sec_num": "4" |
| }, |
| { |
| "text": "The predictor H Boost returned by our boosting algorithm is based on a scoring function h : X \u00d7 Y \u2192 R, which, as for standard ensemble algorithms such as AdaBoost, is a convex combination of base scoring functions h t : h = T t=1 \u03b1 t h t , with \u03b1 t \u2265 0. The base scoring functions used in our algorithm have the form", |
| "cite_spans": [], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "Hypothesis sets", |
| "sec_num": "4.1" |
| }, |
| { |
| "text": "\u2200(x, y) \u2208 X \u00d7 Y, h t (x, y) = l k=1 h k t (x, y).", |
| "cite_spans": [], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "Hypothesis sets", |
| "sec_num": "4.1" |
| }, |
| { |
| "text": "In particular, these can be derived from the path experts in H by letting h k t (x, y) = 1 h k t (x)=y k . Thus, the score assigned to y by the base scoring function h t is the number of positions at which y matches the prediction of path expert h t given input x. H Boost is defined as follows in terms of h or h t s:", |
| "cite_spans": [], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "Hypothesis sets", |
| "sec_num": "4.1" |
| }, |
| { |
| "text": "\u2200x \u2208 X , H Boost (x) = argmax y\u2208Y h(x, y)", |
| "cite_spans": [], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "Hypothesis sets", |
| "sec_num": "4.1" |
| }, |
| { |
| "text": "We remark that the analysis and algorithm presented in this section are also applicable with a scoring function that is the product of the scores at each substructure k as opposed to a sum, that is,", |
| "cite_spans": [], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "Hypothesis sets", |
| "sec_num": "4.1" |
| }, |
| { |
| "text": "h(x, y) = l k=1 T t=1 \u03b1 t h k t (x, y) .", |
| "cite_spans": [], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "Hypothesis sets", |
| "sec_num": "4.1" |
| }, |
| { |
| "text": "This can be used for example in the case where the experts are derived from probabilistic models.", |
| "cite_spans": [], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "Hypothesis sets", |
| "sec_num": "4.1" |
| }, |
| { |
| "text": "To simplify our exposition, the algorithm that we now present uses base learners of the form", |
| "cite_spans": [], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "ESPBoost algorithm", |
| "sec_num": "4.2" |
| }, |
| { |
| "text": "h k t (x, y) = 1 h k t (x)=y k .", |
| "cite_spans": [], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "ESPBoost algorithm", |
| "sec_num": "4.2" |
| }, |
| { |
| "text": "The general case can be handled in the same fashion with the only difference being the definition of the direction and step of the optimization procedure described below. For any i \u2208 [1, m] and k \u2208 [1, l], we define the margin of h k for point (", |
| "cite_spans": [], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "ESPBoost algorithm", |
| "sec_num": "4.2" |
| }, |
| { |
| "text": "x i , y i ) by \u03c1( h k , x i , y i ) = h k (x i , y k i )\u2212max y k =y k i h k (x i , y k )", |
| "cite_spans": [], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "ESPBoost algorithm", |
| "sec_num": "4.2" |
| }, |
| { |
| "text": ". We first derive an upper bound on the empirical normalized Hamming loss of a hypothesis H Boost , with h = T t=1 \u03b1 t h t . Lemma 3. The following upper bound holds for the empirical normalized Hamming loss of the hypothesis H Boost :", |
| "cite_spans": [], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "ESPBoost algorithm", |
| "sec_num": "4.2" |
| }, |
| { |
| "text": "E (x,y)\u223cS [L Ham (H Boost (x), y)] \u2264 1 ml m i=1 l k=1 exp \u2212 T t=1 \u03b1 t \u03c1( h k t , x i , y i ) .", |
| "cite_spans": [], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "ESPBoost algorithm", |
| "sec_num": "4.2" |
| }, |
| { |
| "text": "The proof of this lemma as well as that of several other theorems related to this algorithm can be found in (Cortes et al., 2014a) .", |
| "cite_spans": [ |
| { |
| "start": 108, |
| "end": 130, |
| "text": "(Cortes et al., 2014a)", |
| "ref_id": "BIBREF6" |
| } |
| ], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "ESPBoost algorithm", |
| "sec_num": "4.2" |
| }, |
| { |
| "text": "In view of this upper bound, we consider the objective function F :", |
| "cite_spans": [], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "ESPBoost algorithm", |
| "sec_num": "4.2" |
| }, |
| { |
| "text": "R N \u2192 R defined for all \u03b1 = (\u03b1 1 , . . . , \u03b1 N ) \u2208 R N by F (\u03b1) = 1 ml m i=1 l k=1 exp \u2212 N j=1 \u03b1 j \u03c1( h k j , x i , y i ) ,", |
| "cite_spans": [], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "ESPBoost algorithm", |
| "sec_num": "4.2" |
| }, |
| { |
| "text": "where h 1 , . . . , h N denote the set of all path experts in H. F is a convex and differentiable function of \u03b1. Our algorithm, ESPBoost (Ensemble Structured Prediction Boosting), is defined by the application of coordinate descent to the objective F . Algorithm 1 shows the pseudocode of the ESP-Boost.", |
| "cite_spans": [], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "ESPBoost algorithm", |
| "sec_num": "4.2" |
| }, |
| { |
| "text": "Algorithm 1 ESPBoost Algorithm Inputs: S = ((x 1 , y 1 ), . . . , (x m , y m )); set of experts {h 1 , . . . , h p } for i = 1 to m and k = 1 to l do", |
| "cite_spans": [], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "ESPBoost algorithm", |
| "sec_num": "4.2" |
| }, |
| { |
| "text": "D 1 (i, k) \u2190 1 ml end for for t = 1 to T do h t \u2190 argmin h\u2208H E (i,k)\u223cDt [1 h k (x i ) =y k i ] t \u2190 E (i,k)\u223cDt [1 h k t (x i ) =y k i ] \u03b1 t \u2190 1 2 log 1\u2212 t t Z t \u2190 2 t (1 \u2212 t ) for i = 1 to m and k = 1 to l do D t+1 (i, k) \u2190 exp(\u2212\u03b1t\u03c1( e h k t ,x i ,y i ))Dt(i,k) Zt end for end for Return h = T t=1 \u03b1 t h t", |
| "cite_spans": [], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "ESPBoost algorithm", |
| "sec_num": "4.2" |
| }, |
| { |
| "text": "Let \u03b1 t\u22121 \u2208 R N denote the vector obtained after t \u2212 1 iterations and e t the tth unit vector in R N . We denote by D t the distribution over", |
| "cite_spans": [], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "ESPBoost algorithm", |
| "sec_num": "4.2" |
| }, |
| { |
| "text": "[1, m]\u00d7[1, l] defined by D t (i, k) = 1 ml exp \u2212 t\u22121 u=1 \u03b1 u \u03c1( h k u , x i , y i ) A t\u22121 where A t\u22121 is a normalization factor, A t\u22121 = 1 ml m i=1 l k=1 exp \u2212 t\u22121 u=1 \u03b1 u \u03c1( h k u , x i , y i ) .", |
| "cite_spans": [], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "ESPBoost algorithm", |
| "sec_num": "4.2" |
| }, |
| { |
| "text": "The direction e t selected at the tth round is the one minimizing the directional derivative, that is", |
| "cite_spans": [], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "ESPBoost algorithm", |
| "sec_num": "4.2" |
| }, |
| { |
| "text": "dF (\u03b1 t\u22121 + \u03b7e t ) d\u03b7 \u03b7=0 = \u2212 m i=1 l k=1 \u03c1( h k t , x i , y i )D t (i, k)A t\u22121 = 2 i,k:h k t (x i ) =y k i D t (i, k) \u2212 1 A t\u22121 = (2 t \u2212 1)A t\u22121 ,", |
| "cite_spans": [], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "ESPBoost algorithm", |
| "sec_num": "4.2" |
| }, |
| { |
| "text": "where t is the average error of h t given by", |
| "cite_spans": [], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "ESPBoost algorithm", |
| "sec_num": "4.2" |
| }, |
| { |
| "text": "t = m i=1 l k=1 D t (i, k)1 h k t (x i ) =y k i = E (i,k)\u223cDt [1 h k t (x i ) =y k i ].", |
| "cite_spans": [], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "ESPBoost algorithm", |
| "sec_num": "4.2" |
| }, |
| { |
| "text": "The remaining steps of our algorithm can be determined as in the case of AdaBoost. In particular, given the direction e t , the best step \u03b1 t is obtained by solving the equation dF (\u03b1 t\u22121 +\u03b1tet) d\u03b1t = 0, which admits the closed-form solution \u03b1 t = 1 2 log 1\u2212 t t . The distribution D t+1 can be expressed in terms of D t with the normalization factor Z t = 2 t (1 \u2212 t ).", |
| "cite_spans": [], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "ESPBoost algorithm", |
| "sec_num": "4.2" |
| }, |
| { |
| "text": "Our weak learning assumption in this context is that there exists \u03b3 > 0 such that at each round, t verifies t < 1 2 \u2212 \u03b3. Note that, at each round, the path expert h t with the smallest error t can be determined easily and efficiently by first finding for each substructure k, the h k t that is the best with respect to the distribution weights D t (i, k).", |
| "cite_spans": [], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "ESPBoost algorithm", |
| "sec_num": "4.2" |
| }, |
| { |
| "text": "Observe that, while the steps of our algorithm are syntactically close to those of AdaBoost and its multi-class variants, our algorithm is distinct and does not require sums over the exponential number of all possible labelings of the substructures and is quite efficient.", |
| "cite_spans": [], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "ESPBoost algorithm", |
| "sec_num": "4.2" |
| }, |
| { |
| "text": "We have derived both a margin-based generalization bound in support of the ESPBoost algorithm and a bound on the empirical margin loss.", |
| "cite_spans": [], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "Learning guarantees", |
| "sec_num": "4.3" |
| }, |
| { |
| "text": "For any \u03c1 > 0, define the empirical margin loss of H Boost by the following:", |
| "cite_spans": [], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "Learning guarantees", |
| "sec_num": "4.3" |
| }, |
| { |
| "text": "R \u03c1 h \u03b1 1 = 1 ml m i=1 l k=1 1 \u03c1( e h k ,x i ,y i )\u2264\u03c1 \u03b1 1 ,", |
| "cite_spans": [], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "Learning guarantees", |
| "sec_num": "4.3" |
| }, |
| { |
| "text": "where h is the corresponding scoring function. The following theorem can be proven using the multi-class classification bounds of (Koltchinskii and Panchenko, 2002; Mohri et al., 2012) as can be shown in (Cortes et al., 2014a) . Theorem 4. Let F denote the set of functions H Boost with h = T t=1 \u03b1 t h t for some \u03b1 1 , . . . , \u03b1 t \u2265 0 and h t \u2208 H for all t \u2208 [1, T ]. Fix \u03c1 > 0. Then, for any \u03b4 > 0, with probability at least 1\u2212\u03b4, the following holds for all H Boost \u2208 F:", |
| "cite_spans": [ |
| { |
| "start": 130, |
| "end": 164, |
| "text": "(Koltchinskii and Panchenko, 2002;", |
| "ref_id": null |
| }, |
| { |
| "start": 165, |
| "end": 184, |
| "text": "Mohri et al., 2012)", |
| "ref_id": "BIBREF20" |
| }, |
| { |
| "start": 204, |
| "end": 226, |
| "text": "(Cortes et al., 2014a)", |
| "ref_id": "BIBREF6" |
| } |
| ], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "Learning guarantees", |
| "sec_num": "4.3" |
| }, |
| { |
| "text": "E (x,y)\u223cD [L Ham (H Boost (x), y)] \u2264 R \u03c1 h \u03b1 1 + 2 \u03c1l l k=1 |Y k | 2 R m (H k ) + log l \u03b4 2m ,", |
| "cite_spans": [], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "Learning guarantees", |
| "sec_num": "4.3" |
| }, |
| { |
| "text": "where R m (H k ) denotes the Rademacher complexity of the class of functions This theorem provides a margin-based guarantee for convex ensembles such as those returned by ESPBoost. The following theorem further provides an upper bound on the empirical margin loss for ESPBoost. Theorem 5. Let h denote the scoring function returned by ESPBoost after T \u2265 1 rounds. Then, for any \u03c1 > 0, the following inequality holds:", |
| "cite_spans": [], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "Learning guarantees", |
| "sec_num": "4.3" |
| }, |
| { |
| "text": "H k = {x \u2192 h k t : j \u2208 [1, p], y \u2208 Y k }.", |
| "cite_spans": [], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "Learning guarantees", |
| "sec_num": "4.3" |
| }, |
| { |
| "text": "R \u03c1 h \u03b1 1 \u2264 2 T T t=1 1\u2212\u03c1 t (1 \u2212 t ) 1+\u03c1 .", |
| "cite_spans": [], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "Learning guarantees", |
| "sec_num": "4.3" |
| }, |
| { |
| "text": "As in the case of AdaBoost , it can be shown that for \u03c1 < \u03b3,", |
| "cite_spans": [], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "Learning guarantees", |
| "sec_num": "4.3" |
| }, |
| { |
| "text": "1\u2212\u03c1 t (1 \u2212 t ) 1+\u03c1 \u2264 (1 \u2212 2\u03b3) 1\u2212\u03c1 (1 + 2\u03b3)", |
| "cite_spans": [], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "Learning guarantees", |
| "sec_num": "4.3" |
| }, |
| { |
| "text": "1+\u03c1 < 1 and the right-hand side of this bound decreases exponentially with T .", |
| "cite_spans": [], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "Learning guarantees", |
| "sec_num": "4.3" |
| }, |
| { |
| "text": "We used a number of artificial and real-world data sets for our experiments. For each data set, we performed 10-fold cross-validation with disjoint training sets. 3 We report the average error for each task. In addition to the H MVote , H Rand and H ESPBoost hypotheses, we experimented with two algorithms discussed in more detail in (Cortes et al., 2014a) : a cross-validation on-line-tobatch conversion of the WMWP algorithm, H CV , a majority-vote on-line-to-batch conversion with FPL, H FPL , and a cross-validation on-line-tobatch conversion with FPL, H FPL-CV . Finally, we compare with the H SLE algorithm of (Nguyen and Guo, 2007) .", |
| "cite_spans": [ |
| { |
| "start": 163, |
| "end": 164, |
| "text": "3", |
| "ref_id": null |
| }, |
| { |
| "start": 335, |
| "end": 357, |
| "text": "(Cortes et al., 2014a)", |
| "ref_id": "BIBREF6" |
| }, |
| { |
| "start": 617, |
| "end": 639, |
| "text": "(Nguyen and Guo, 2007)", |
| "ref_id": "BIBREF22" |
| } |
| ], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "Experiments", |
| "sec_num": "5" |
| }, |
| { |
| "text": "Our artificial data set, ADS1 and ADS2 simulate the scenarios described in Section 1. In ADS1 the kth expert has a high accuracy on the kth position, in ADS2 an expert has low accuracy in a fixed set of positions.", |
| "cite_spans": [], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "Artificial data sets", |
| "sec_num": "5.1" |
| }, |
| { |
| "text": "For the first artificial data set, ADS1, we used local experts h 1 , . . . , h p with p = 5. To generate the data we chose an arbitrary Markov chain over the English alphabet and sampled 40,000 random sequences each consisting of 10 symbols. Each of the five experts was designed to have a certain probability of making a mistake at each position in the sequence. Expert h j correctly predicted positions 2j \u2212 1 and 2j with probability 0.97 and other positions with probability 0.5. We forced experts to make similar mistakes by making them select an adjacent alphabet symbol in case of an error. For example, when a mistake was made on a symbol b, the expert prediction was forced to be either a or c. The second artificial data set, ADS2, modeled the case of rather poor experts. ADS2 was generated in the same way as ADS1, but the expert predictions were different. This time each expert made mistakes at four out of the ten distinct random positions in each sequence. Table 1 reports the results of our experiments. For all experiments with the algorithms H Rand , H MVote , and H CV , we ran the WMWP algorithm for T = m rounds with the \u03b2 values listed in the caption of Table 1 , generating distributions P \u2286 {p 1 , . . . , p T }. For P we used the collection of all suffix sets {p t , . . . , p T } and \u03b4 = 0.05. For the algorithms based on FPL, we used = 0.5/pl. The same parameter choices were used for the subsequent experiments.", |
| "cite_spans": [], |
| "ref_spans": [ |
| { |
| "start": 972, |
| "end": 979, |
| "text": "Table 1", |
| "ref_id": "TABREF0" |
| }, |
| { |
| "start": 1176, |
| "end": 1183, |
| "text": "Table 1", |
| "ref_id": "TABREF0" |
| } |
| ], |
| "eq_spans": [], |
| "section": "Artificial data sets", |
| "sec_num": "5.1" |
| }, |
| { |
| "text": "As can be seen from Table 1, in both cases, H MVote , our majority-vote algorithm based on our on-line-to-batch conversion using the WMWP algorithm (together with most of the other on-line based algorithms), yields a significant improvement over the best expert. It also outperforms H SLE , which in the case of ADS1 even fails to outperform the best h j . After 100 iterations on ADS1, the ensemble learned by H SLE consists of a single expert, which is why it leads to such a poor performance.", |
| "cite_spans": [], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "Artificial data sets", |
| "sec_num": "5.1" |
| }, |
| { |
| "text": "It is also worth pointing out that H FPL-CV and H Rand fail to outperform the best model on ADS2 set. This is in total agreement with our theoretical analysis since, in this case, any path expert has exactly the same performance and the error of the Table 2 : Average Normalized Hamming Loss for ADS3. \u03b2 ADS1 = 0.95, \u03b2 ADS2 = 0.95, T SLE = 100, \u03b4 = 0.05. Table 4 : Average edit distance, PDS1 and PDS2. \u03b2 P DS1 = 0.85, \u03b2 P DS2 = 0.97, T SLE = 100, \u03b4 = 0.05.", |
| "cite_spans": [], |
| "ref_spans": [ |
| { |
| "start": 250, |
| "end": 257, |
| "text": "Table 2", |
| "ref_id": null |
| }, |
| { |
| "start": 355, |
| "end": 362, |
| "text": "Table 4", |
| "ref_id": null |
| } |
| ], |
| "eq_spans": [], |
| "section": "Artificial data sets", |
| "sec_num": "5.1" |
| }, |
| { |
| "text": "PDS2, m = 400 In fact, on two runs, H SLE chooses an ensemble consisting of a single expert and fails to outperform the best model.", |
| "cite_spans": [], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "PDS1, m = 130", |
| "sec_num": null |
| }, |
| { |
| "text": "For our last set of experiments, we used another proprietary speech recognition data set, SDS. Each example in this data set is represented by a sequence of length l \u2208 [2, 15] . Therefore, for training we padded the true labels and the expert predictions to normalize the sequence lengths. For each of the 22,298 examples, there are between 2 and 251 expert predictions available. Since the ensemble methods we presented assume that the predictions of all p experts are available for each example in the training and test sets, we needed to restrict ourselves to the subsets of the data where at least some fixed number of expert predictions were available. In particular, we considered p = 5, 10, 20 and 50. For each value of p we used only the top p experts in our ensembles.", |
| "cite_spans": [ |
| { |
| "start": 168, |
| "end": 171, |
| "text": "[2,", |
| "ref_id": null |
| }, |
| { |
| "start": 172, |
| "end": 175, |
| "text": "15]", |
| "ref_id": null |
| } |
| ], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "Speech recognition data set", |
| "sec_num": "5.5" |
| }, |
| { |
| "text": "Our initial experiments showed that, as in the case of OCR data set, ensemble methods offer only a modest increase in performance over the best h j . This is again largely due to the dominant performance of the best expert h j . However, it was observed that the accuracy of the best model is a decreasing function of l, suggesting that ensemble algorithm may be used to improve performance for longer sequences. Subsequent experiments show that this is indeed the case: when training and testing with l \u2265 4, ensemble algorithms outperform the best model. Table 6 and Table 7 summarize these results for p = 5, 10, 20, 50.", |
| "cite_spans": [], |
| "ref_spans": [ |
| { |
| "start": 556, |
| "end": 575, |
| "text": "Table 6 and Table 7", |
| "ref_id": "TABREF1" |
| } |
| ], |
| "eq_spans": [], |
| "section": "Speech recognition data set", |
| "sec_num": "5.5" |
| }, |
| { |
| "text": "Our results suggest that the following simple scheme can be used: for short sequences use the best expert model and for longer sequences, use the ensemble model. A more elaborate variant of this algorithm can be derived based on the obser- Table 7 : Average Normalized Hamming Loss, SDS. l \u2265 4, \u03b2 = 0.97,\u03b4 = 0.05, T SLE = 100. p = 20, m = 900 p = 50, m = 700 HMVote 0.2773 \u00b1 0.00139 0.3217 \u00b1 0.00375 HFPL 0.2797 \u00b1 0.00154 0.3189 \u00b1 0.00344 HCV 0.2986 \u00b1 0.00075 0.3401 \u00b1 0.00054 HFPL-CV 0.3816 \u00b1 0.01457 0.4451 \u00b1 0.01360 HESPBoost 0.3115 \u00b1 0.00089 0.3426 \u00b1 0.00071 HSLE 0.3114 \u00b1 0.00087 0.3425 \u00b1 0.00076 HRand 0.3977 \u00b1 0.00302 0.4608 \u00b1 0.00303 Best hj 0.3116 \u00b1 0.00087 0.3427 \u00b1 0.00077 vation that the improvement in accuracy of the ensemble model over the best expert increases with the number of experts available.", |
| "cite_spans": [], |
| "ref_spans": [ |
| { |
| "start": 240, |
| "end": 247, |
| "text": "Table 7", |
| "ref_id": null |
| } |
| ], |
| "eq_spans": [], |
| "section": "Speech recognition data set", |
| "sec_num": "5.5" |
| }, |
| { |
| "text": "We presented a broad analysis of the problem of ensemble structured prediction, including a series of algorithms with learning guarantees and extensive experiments. Our results show that our algorithms, most notably H MVote , can result in significant benefits in several tasks, which can be of a critical practical importance. We also reported very favorable results for H MVote when used with the edit-distance, which is the standard loss used in many applications. A natural extension of this work consists of devising new algorithms and providing learning guarantees specific to other loss functions such as the edit-distance. While we aimed for an exhaustive study, including multiple on-learning algorithms, different conversions to batch and derandomizations, we are aware that the problem we studied is very rich and admits many more facets and scenarios that we plan to investigate in the future. Finally, the boosting-style algorithm we presented can be enhanced using recent theoretical and algorithmic results on deep boosting (Cortes et al., 2014b) .", |
| "cite_spans": [ |
| { |
| "start": 1039, |
| "end": 1061, |
| "text": "(Cortes et al., 2014b)", |
| "ref_id": "BIBREF7" |
| } |
| ], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "Conclusion", |
| "sec_num": "6" |
| }, |
| { |
| "text": "This paper is a modified version of(Cortes et al., 2014a) to which we refer the reader for the proofs of the theorems stated and a more detailed discussion of our algorithms.", |
| "cite_spans": [], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "", |
| "sec_num": null |
| }, |
| { |
| "text": "(Schapire and Singer, 1999) also present an algorithm using the Hamming loss for multi-class classification, but that is a Hamming loss over the set of classes and differs from the loss function relevant to our problem. Additionally, the main steps of that algorithm are also based on a sum over all classes.", |
| "cite_spans": [], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "", |
| "sec_num": null |
| }, |
| { |
| "text": "For the OCR data set, these subsets are predefined.", |
| "cite_spans": [], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "", |
| "sec_num": null |
| } |
| ], |
| "back_matter": [ |
| { |
| "text": "We warmly thank our colleagues Francoise Beaufays and Fuchun Peng for kindly extracting and making available to us the pronunciation data sets, Cyril Allauzen for providing us with the speech recognition data, and Richard Sproat and Brian Roark for help with other data sets. This work was partly funded by the NSF award IIS-1117591 and the NSERC PGS D3 award.", |
| "cite_spans": [], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "Acknowledgments", |
| "sec_num": null |
| }, |
| { |
| "text": "We also synthesized a third data set, ADS3. Here, we simulated the case where each expert specialized in predicting some subset of the labels. In particular, we generated 40,000 random sequences over the English alphabet in the same way as for ADS1 and ADS2. To generate expert predictions, we partitioned the alphabet into 5 disjoint subsets A j . Expert j always correctly predicted the label in A j and the probability of correctly predicting the label not in A j was set to 0.7. To train the ensemble algorithms, we used a training set of size m = 200.The results are presented in ", |
| "cite_spans": [], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "annex", |
| "sec_num": null |
| }, |
| { |
| "text": "We had access to two proprietary pronunciation data sets, PDS1 and PDS2. In both sets, each example is an English word, typically a proper name. For each word, 20 possible phonemic sequences are available, ranked by some pronunciation model. Since the true pronunciation was not available, we set the top sequence to be the target label and used the remaining as the predictions made by the experts. The only difference between PDS1 and PDS2 is their size: 1,313 words for PDS1 and 6,354 for PDS2.In both cases, on-line based algorithms, specifically H MVote , significantly outperform the best model as well as H SLE , see Table 3 . The poor performance of H ESPBoost is due to the fact that the weak learning assumption is violated after 5-8 iterations and hence the algorithm terminates.It can be argued that for this task the edit-distance is a more suitable measure of performance than the average Hamming loss. Thus, we also report the results of our experiments in terms of the edit-distance in Table 4 . Remarkably, our on-line based algorithms achieve a comparable improvement over the performance of the best model in the case of edit-distance as well.", |
| "cite_spans": [], |
| "ref_spans": [ |
| { |
| "start": 624, |
| "end": 631, |
| "text": "Table 3", |
| "ref_id": null |
| }, |
| { |
| "start": 1002, |
| "end": 1009, |
| "text": "Table 4", |
| "ref_id": null |
| } |
| ], |
| "eq_spans": [], |
| "section": "Pronunciation data sets", |
| "sec_num": "5.2" |
| }, |
| { |
| "text": "Rob Kassel's OCR data set is available for download from http://ai.stanford.edu/\u02dcbtaskar/ ocr/. It contains 6,877 word instances with a total of 52,152 characters. Each character is represented by 16 \u00d7 8 = 128 binary pixels. The task is to predict a word given its sequence of pixel vectors. To generate experts, we used several software packages: CRFsuite (Okazaki, 2007) and SVM struct , SVM multiclass (Joachims, 2008) , and the Stanford Classifier (Rafferty et al., 2014) . We trained these algorithms on each of the predefined folds of the data set and generated predictions on the test fold using the resulting models.Our results (see (Cortes et al., 2014a) ) show that ensemble methods lead only to a small improvement in performance over the best h j . This is because here the best model h j dominates all other experts and ensemble methods cannot benefit from patching together different outputs.", |
| "cite_spans": [ |
| { |
| "start": 357, |
| "end": 372, |
| "text": "(Okazaki, 2007)", |
| "ref_id": "BIBREF23" |
| }, |
| { |
| "start": 405, |
| "end": 421, |
| "text": "(Joachims, 2008)", |
| "ref_id": "BIBREF12" |
| }, |
| { |
| "start": 452, |
| "end": 475, |
| "text": "(Rafferty et al., 2014)", |
| "ref_id": null |
| }, |
| { |
| "start": 641, |
| "end": 663, |
| "text": "(Cortes et al., 2014a)", |
| "ref_id": "BIBREF6" |
| } |
| ], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "OCR data set", |
| "sec_num": "5.3" |
| }, |
| { |
| "text": "The part-of-speech task, POS, consists of labeling each word of a sentence with its correct part-of-speech tag. The Penn Treebank 2 data set is available through LDC license at http: //www.cis.upenn.edu/\u02dctreebank/ and contains 251,854 sentences with a total of 6,080,493 tokens and 45 different parts-of-speech.For the first experiment, TR1, we used 4 disjoint training sets to produce 4 SVM multiclass models and 4 maximum entropy models using the Stanford Classifier. We also used the union of these training sets to devise one CRFsuite model. For the second experiment, TR2, we trained 5 SVM struct models. The same features were used for both experiments. For the SVM algorithms, we generated 267,214 bag-of-word binary features. The Stanford Classifier and CRFsuite packages use internal routines to generate features.The results of the experiments are summarized in Table 5 . For TR1, our on-line ensemble methods improve over the best model. Note that H SLE has the best average loss over 10 runs for this experiment. This comes at a price of much higher standard deviation which does not allow us to conclude that the difference in performance between our methods and H SLE is statistically significant.", |
| "cite_spans": [], |
| "ref_spans": [ |
| { |
| "start": 872, |
| "end": 879, |
| "text": "Table 5", |
| "ref_id": null |
| } |
| ], |
| "eq_spans": [], |
| "section": "Penn Treebank data set", |
| "sec_num": "5.4" |
| } |
| ], |
| "bib_entries": { |
| "BIBREF0": { |
| "ref_id": "b0", |
| "title": "Bagging predictors", |
| "authors": [ |
| { |
| "first": "Leo", |
| "middle": [], |
| "last": "Breiman", |
| "suffix": "" |
| } |
| ], |
| "year": 1996, |
| "venue": "Machine Learning", |
| "volume": "24", |
| "issue": "", |
| "pages": "123--140", |
| "other_ids": {}, |
| "num": null, |
| "urls": [], |
| "raw_text": "Leo Breiman. 1996. Bagging predic- tors. Machine Learning, 24(2):123-140.", |
| "links": null |
| }, |
| "BIBREF1": { |
| "ref_id": "b1", |
| "title": "Ensemble selection from libraries of models", |
| "authors": [ |
| { |
| "first": "[", |
| "middle": [], |
| "last": "Caruana", |
| "suffix": "" |
| } |
| ], |
| "year": 2004, |
| "venue": "Proceedings of ICML", |
| "volume": "", |
| "issue": "", |
| "pages": "", |
| "other_ids": {}, |
| "num": null, |
| "urls": [], |
| "raw_text": "[Caruana et al.2004] R. Caruana, A. Niculescu-Mizil, G. Crew, and A. Ksikes. 2004. Ensemble selection from libraries of models. In Proceedings of ICML, pages 18-.", |
| "links": null |
| }, |
| "BIBREF2": { |
| "ref_id": "b2", |
| "title": "On the generalization ability of on-line learning algorithms", |
| "authors": [ |
| { |
| "first": "", |
| "middle": [], |
| "last": "Cesa-Bianchi", |
| "suffix": "" |
| } |
| ], |
| "year": 2004, |
| "venue": "IEEE Transactions on Information Theory", |
| "volume": "50", |
| "issue": "9", |
| "pages": "2050--2057", |
| "other_ids": {}, |
| "num": null, |
| "urls": [], |
| "raw_text": "Cesa-Bianchi et al.2004] N. Cesa-Bianchi, A. Con- coni, and C. Gentile. 2004. On the generalization abil- ity of on-line learning algorithms. IEEE Transactions on Information Theory, 50(9):2050-2057.", |
| "links": null |
| }, |
| "BIBREF3": { |
| "ref_id": "b3", |
| "title": "Discriminative reranking for natural language parsing", |
| "authors": [ |
| { |
| "first": "Koo2005] Michael", |
| "middle": [], |
| "last": "Collins", |
| "suffix": "" |
| }, |
| { |
| "first": "Terry", |
| "middle": [], |
| "last": "Collins", |
| "suffix": "" |
| }, |
| { |
| "first": "", |
| "middle": [], |
| "last": "Koo", |
| "suffix": "" |
| } |
| ], |
| "year": 2005, |
| "venue": "Computational Linguistics", |
| "volume": "31", |
| "issue": "1", |
| "pages": "25--70", |
| "other_ids": {}, |
| "num": null, |
| "urls": [], |
| "raw_text": "[Collins and Koo2005] Michael Collins and Terry Koo. 2005. Discriminative reranking for natural language parsing. Computational Linguistics, 31(1):25-70.", |
| "links": null |
| }, |
| "BIBREF4": { |
| "ref_id": "b4", |
| "title": "Discriminative training methods for hidden Markov models: theory and experiments with perceptron algorithms", |
| "authors": [ |
| { |
| "first": "M", |
| "middle": [], |
| "last": "Collins", |
| "suffix": "" |
| } |
| ], |
| "year": 2002, |
| "venue": "Proceedings of ACL", |
| "volume": "", |
| "issue": "", |
| "pages": "1--8", |
| "other_ids": {}, |
| "num": null, |
| "urls": [], |
| "raw_text": "M. Collins. 2002. Discriminative train- ing methods for hidden Markov models: theory and ex- periments with perceptron algorithms. In Proceedings of ACL, pages 1-8.", |
| "links": null |
| }, |
| "BIBREF5": { |
| "ref_id": "b5", |
| "title": "A general regression technique for learning transductions", |
| "authors": [ |
| { |
| "first": "", |
| "middle": [], |
| "last": "Cortes", |
| "suffix": "" |
| } |
| ], |
| "year": 2005, |
| "venue": "Proceedings of ICML 2005", |
| "volume": "", |
| "issue": "", |
| "pages": "153--160", |
| "other_ids": {}, |
| "num": null, |
| "urls": [], |
| "raw_text": "[Cortes et al.2005] C. Cortes, M. Mohri, and J. Weston. 2005. A general regression technique for learning transductions. In Proceedings of ICML 2005, pages 153-160, New York, NY, USA. ACM.", |
| "links": null |
| }, |
| "BIBREF6": { |
| "ref_id": "b6", |
| "title": "Ensemble methods for structured prediction", |
| "authors": [ |
| { |
| "first": "", |
| "middle": [], |
| "last": "Cortes", |
| "suffix": "" |
| } |
| ], |
| "year": 2014, |
| "venue": "Proceedings of ICML", |
| "volume": "", |
| "issue": "", |
| "pages": "", |
| "other_ids": {}, |
| "num": null, |
| "urls": [], |
| "raw_text": "[Cortes et al.2014a] Corinna Cortes, Vitaly Kuznetsov, and Mehryar Mohri. 2014a. Ensemble methods for structured prediction. In Proceedings of ICML.", |
| "links": null |
| }, |
| "BIBREF7": { |
| "ref_id": "b7", |
| "title": "Corinna Cortes, Mehryar Mohri, and Umar Syed. 2014b. Deep boosting", |
| "authors": [ |
| { |
| "first": "", |
| "middle": [], |
| "last": "Cortes", |
| "suffix": "" |
| } |
| ], |
| "year": 2014, |
| "venue": "Proceedings of the Fourteenth International Conference on Machine Learning", |
| "volume": "", |
| "issue": "", |
| "pages": "", |
| "other_ids": {}, |
| "num": null, |
| "urls": [], |
| "raw_text": "[Cortes et al.2014b] Corinna Cortes, Mehryar Mohri, and Umar Syed. 2014b. Deep boosting. In Proceed- ings of the Fourteenth International Conference on Ma- chine Learning (ICML 2014).", |
| "links": null |
| }, |
| "BIBREF8": { |
| "ref_id": "b8", |
| "title": "Data-driven online to batch conversion", |
| "authors": [ |
| { |
| "first": "O", |
| "middle": [], |
| "last": "Dekel", |
| "suffix": "" |
| }, |
| { |
| "first": "Y", |
| "middle": [], |
| "last": "Singer", |
| "suffix": "" |
| } |
| ], |
| "year": 2005, |
| "venue": "Advances in NIPS 18", |
| "volume": "", |
| "issue": "", |
| "pages": "1207--1216", |
| "other_ids": {}, |
| "num": null, |
| "urls": [], |
| "raw_text": "[Dekel and Singer2005] O. Dekel and Y. Singer. 2005. Data-driven online to batch conversion. In Advances in NIPS 18, pages 1207-1216.", |
| "links": null |
| }, |
| "BIBREF9": { |
| "ref_id": "b9", |
| "title": "Postprocessing system to yield reduced word error rates: Recognizer output voting error reduction (rover)", |
| "authors": [ |
| { |
| "first": ";", |
| "middle": [ |
| "Y" |
| ], |
| "last": "Jonathan G Fiscus", |
| "suffix": "" |
| }, |
| { |
| "first": "R", |
| "middle": [], |
| "last": "Freund", |
| "suffix": "" |
| }, |
| { |
| "first": "", |
| "middle": [], |
| "last": "Schapire", |
| "suffix": "" |
| } |
| ], |
| "year": 1997, |
| "venue": "Proceedings of the 1997 IEEE ASRU Workshop", |
| "volume": "55", |
| "issue": "", |
| "pages": "119--139", |
| "other_ids": {}, |
| "num": null, |
| "urls": [], |
| "raw_text": "Jonathan G Fiscus. 1997. Post- processing system to yield reduced word error rates: Recognizer output voting error reduction (rover). In Proceedings of the 1997 IEEE ASRU Workshop, pages 347-354, Santa Barbara, CA. [Freund and Schapire1997] Y. Freund and R. Schapire. 1997. A decision-theoretic generalization of on-line learning and application to boosting. Journal of Com- puter and System Sciences, 55(1):119-139.", |
| "links": null |
| }, |
| "BIBREF10": { |
| "ref_id": "b10", |
| "title": "Generalization bounds for averaged classifiers", |
| "authors": [ |
| { |
| "first": "[", |
| "middle": [], |
| "last": "Freund", |
| "suffix": "" |
| } |
| ], |
| "year": 2004, |
| "venue": "The Annals of Statistics", |
| "volume": "32", |
| "issue": "", |
| "pages": "1698--1722", |
| "other_ids": {}, |
| "num": null, |
| "urls": [], |
| "raw_text": "[Freund et al.2004] Yoav Freund, Yishay Mansour, and Robert E. Schapire. 2004. Generalization bounds for averaged classifiers. The Annals of Statistics, 32:1698- 1722.", |
| "links": null |
| }, |
| "BIBREF11": { |
| "ref_id": "b11", |
| "title": "Web-derived pronunciations", |
| "authors": [], |
| "year": 2009, |
| "venue": "Proceedings of ICASSP", |
| "volume": "", |
| "issue": "", |
| "pages": "4289--4292", |
| "other_ids": {}, |
| "num": null, |
| "urls": [], |
| "raw_text": "[Ghoshal et al.2009] Arnab Ghoshal, Martin Jansche, Sanjeev Khudanpur, Michael Riley, and Morgan Ulin- ski. 2009. Web-derived pronunciations. In Proceed- ings of ICASSP, pages 4289-4292.", |
| "links": null |
| }, |
| "BIBREF12": { |
| "ref_id": "b12", |
| "title": "Support vector machines for complex outputs", |
| "authors": [ |
| { |
| "first": "T", |
| "middle": [], |
| "last": "Joachims", |
| "suffix": "" |
| } |
| ], |
| "year": 2008, |
| "venue": "", |
| "volume": "", |
| "issue": "", |
| "pages": "", |
| "other_ids": {}, |
| "num": null, |
| "urls": [], |
| "raw_text": "T. Joachims. 2008. Support vector machines for complex outputs.", |
| "links": null |
| }, |
| "BIBREF13": { |
| "ref_id": "b13", |
| "title": "Efficient algorithms for online decision problems", |
| "authors": [], |
| "year": 2005, |
| "venue": "Journal of Computer and System Sciences", |
| "volume": "71", |
| "issue": "3", |
| "pages": "291--307", |
| "other_ids": {}, |
| "num": null, |
| "urls": [], |
| "raw_text": "[Kalai and Vempala2005] A. Kalai and S. Vempala. 2005. Efficient algorithms for online decision prob- lems. Journal of Computer and System Sciences, 71(3):291-307.", |
| "links": null |
| }, |
| "BIBREF14": { |
| "ref_id": "b14", |
| "title": "Empirical margin distributions and bounding the generalization error of combined classifiers. Annals of Statistics, 30", |
| "authors": [ |
| { |
| "first": "[", |
| "middle": [], |
| "last": "Kocev", |
| "suffix": "" |
| } |
| ], |
| "year": 2001, |
| "venue": "Proceedings of ICML", |
| "volume": "46", |
| "issue": "", |
| "pages": "282--289", |
| "other_ids": {}, |
| "num": null, |
| "urls": [], |
| "raw_text": "[Kocev et al.2013] D. Kocev, C. Vens, J. Struyf, and S. Deroski. 2013. Tree ensembles for predicting struc- tured outputs. Pattern Recognition, 46(3):817-833, March. [Koltchinskii and Panchenko2002] Vladmir Koltchin- skii and Dmitry Panchenko. 2002. Empirical margin distributions and bounding the generalization error of combined classifiers. Annals of Statistics, 30. [Lafferty et al.2001] J. Lafferty, A. McCallum, and F. Pereira. 2001. Conditional random fields: Proba- bilistic models for segmenting and labeling sequence data. In Proceedings of ICML, pages 282-289.", |
| "links": null |
| }, |
| "BIBREF15": { |
| "ref_id": "b15", |
| "title": "The weighted majority algorithm", |
| "authors": [ |
| { |
| "first": "N", |
| "middle": [], |
| "last": "Littlestone", |
| "suffix": "" |
| }, |
| { |
| "first": "M", |
| "middle": [], |
| "last": "Warmuth", |
| "suffix": "" |
| } |
| ], |
| "year": 1994, |
| "venue": "Information and Computation", |
| "volume": "108", |
| "issue": "2", |
| "pages": "212--261", |
| "other_ids": {}, |
| "num": null, |
| "urls": [], |
| "raw_text": "[Littlestone and Warmuth1994] N. Littlestone and M. Warmuth. 1994. The weighted majority algorithm. Information and Computation, 108(2):212-261.", |
| "links": null |
| }, |
| "BIBREF16": { |
| "ref_id": "b16", |
| "title": "From on-line to batch learning", |
| "authors": [ |
| { |
| "first": "N", |
| "middle": [], |
| "last": "Littlestone", |
| "suffix": "" |
| } |
| ], |
| "year": 1989, |
| "venue": "Proceedings of COLT 2", |
| "volume": "", |
| "issue": "", |
| "pages": "269--284", |
| "other_ids": {}, |
| "num": null, |
| "urls": [], |
| "raw_text": "N. Littlestone. 1989. From on-line to batch learning. In Proceedings of COLT 2, pages 269-284.", |
| "links": null |
| }, |
| "BIBREF17": { |
| "ref_id": "b17", |
| "title": "Bayesian methods for adaptive models", |
| "authors": [ |
| { |
| "first": "J", |
| "middle": [ |
| "C" |
| ], |
| "last": "David", |
| "suffix": "" |
| }, |
| { |
| "first": "", |
| "middle": [], |
| "last": "Mackay", |
| "suffix": "" |
| } |
| ], |
| "year": 1991, |
| "venue": "", |
| "volume": "", |
| "issue": "", |
| "pages": "", |
| "other_ids": {}, |
| "num": null, |
| "urls": [], |
| "raw_text": "David J. C. MacKay. 1991. Bayesian methods for adaptive models. Ph.D. thesis, California Institute of Technology.", |
| "links": null |
| }, |
| "BIBREF18": { |
| "ref_id": "b18", |
| "title": "Ensemble learning for hidden markov models", |
| "authors": [ |
| { |
| "first": "J", |
| "middle": [ |
| "C" |
| ], |
| "last": "David", |
| "suffix": "" |
| }, |
| { |
| "first": "", |
| "middle": [], |
| "last": "Mackay", |
| "suffix": "" |
| } |
| ], |
| "year": 1997, |
| "venue": "", |
| "volume": "", |
| "issue": "", |
| "pages": "", |
| "other_ids": {}, |
| "num": null, |
| "urls": [], |
| "raw_text": "David J.C. MacKay. 1997. Ensemble learning for hidden markov models. Technical report, Cavendish Laboratory, Cambridge UK.", |
| "links": null |
| }, |
| "BIBREF19": { |
| "ref_id": "b19", |
| "title": "Speech recognition with weighted finite-state transducers", |
| "authors": [ |
| { |
| "first": "[", |
| "middle": [], |
| "last": "Mohri", |
| "suffix": "" |
| } |
| ], |
| "year": 2008, |
| "venue": "Handbook on Speech Processing and Speech Communication, Part E: Speech recognition", |
| "volume": "", |
| "issue": "", |
| "pages": "", |
| "other_ids": {}, |
| "num": null, |
| "urls": [], |
| "raw_text": "[Mohri et al.2008] Mehryar Mohri, Fernando C. N. Pereira, and Michael Riley. 2008. Speech recognition with weighted finite-state transducers. In Handbook on Speech Processing and Speech Communication, Part E: Speech recognition. Springer-Verlag.", |
| "links": null |
| }, |
| "BIBREF20": { |
| "ref_id": "b20", |
| "title": "Mehryar Mohri, Afshin Rostamizadeh, and Ameet Talwalkar. 2012. Foundations of Machine Learning", |
| "authors": [ |
| { |
| "first": "[", |
| "middle": [], |
| "last": "Mohri", |
| "suffix": "" |
| } |
| ], |
| "year": 2012, |
| "venue": "", |
| "volume": "", |
| "issue": "", |
| "pages": "", |
| "other_ids": {}, |
| "num": null, |
| "urls": [], |
| "raw_text": "[Mohri et al.2012] Mehryar Mohri, Afshin Ros- tamizadeh, and Ameet Talwalkar. 2012. Foundations of Machine Learning. The MIT Press.", |
| "links": null |
| }, |
| "BIBREF21": { |
| "ref_id": "b21", |
| "title": "Finite-state transducers in language and speech processing", |
| "authors": [ |
| { |
| "first": "Mehryar", |
| "middle": [], |
| "last": "Mohri", |
| "suffix": "" |
| } |
| ], |
| "year": 1997, |
| "venue": "Computational Linguistics", |
| "volume": "23", |
| "issue": "2", |
| "pages": "269--311", |
| "other_ids": {}, |
| "num": null, |
| "urls": [], |
| "raw_text": "Mehryar Mohri. 1997. Finite-state trans- ducers in language and speech processing. Computa- tional Linguistics, 23(2):269-311.", |
| "links": null |
| }, |
| "BIBREF22": { |
| "ref_id": "b22", |
| "title": "Comparison of sequence labeling algorithms and extensions", |
| "authors": [ |
| { |
| "first": "N", |
| "middle": [], |
| "last": "Nguyen", |
| "suffix": "" |
| }, |
| { |
| "first": "Y", |
| "middle": [], |
| "last": "Guo", |
| "suffix": "" |
| } |
| ], |
| "year": 2007, |
| "venue": "Proceedings of ICML", |
| "volume": "", |
| "issue": "", |
| "pages": "681--688", |
| "other_ids": {}, |
| "num": null, |
| "urls": [], |
| "raw_text": "[Nguyen and Guo2007] N. Nguyen and Y. Guo. 2007. Comparison of sequence labeling algorithms and ex- tensions. In Proceedings of ICML, pages 681-688.", |
| "links": null |
| }, |
| "BIBREF23": { |
| "ref_id": "b23", |
| "title": "CRFsuite: a fast implementation of conditional random fields (crfs)", |
| "authors": [ |
| { |
| "first": "N", |
| "middle": [], |
| "last": "Okazaki", |
| "suffix": "" |
| } |
| ], |
| "year": 2007, |
| "venue": "", |
| "volume": "", |
| "issue": "", |
| "pages": "", |
| "other_ids": {}, |
| "num": null, |
| "urls": [], |
| "raw_text": "N. Okazaki. 2007. CRFsuite: a fast im- plementation of conditional random fields (crfs).", |
| "links": null |
| }, |
| "BIBREF24": { |
| "ref_id": "b24", |
| "title": "Products of random latent variable grammars", |
| "authors": [ |
| { |
| "first": "Slav", |
| "middle": [], |
| "last": "Petrov", |
| "suffix": "" |
| } |
| ], |
| "year": 2010, |
| "venue": "HLT-NAACL", |
| "volume": "", |
| "issue": "", |
| "pages": "19--27", |
| "other_ids": {}, |
| "num": null, |
| "urls": [], |
| "raw_text": "Slav Petrov. 2010. Products of random latent variable grammars. In HLT-NAACL, pages 19- 27.", |
| "links": null |
| }, |
| "BIBREF26": { |
| "ref_id": "b26", |
| "title": "Parser combination by reparsing", |
| "authors": [ |
| { |
| "first": "[", |
| "middle": [], |
| "last": "Sagae", |
| "suffix": "" |
| }, |
| { |
| "first": "]", |
| "middle": [ |
| "K" |
| ], |
| "last": "Lavie2006", |
| "suffix": "" |
| }, |
| { |
| "first": "A", |
| "middle": [], |
| "last": "Sagae", |
| "suffix": "" |
| }, |
| { |
| "first": "", |
| "middle": [], |
| "last": "Lavie", |
| "suffix": "" |
| } |
| ], |
| "year": 2006, |
| "venue": "Proceedings of HLT/NAACL", |
| "volume": "", |
| "issue": "", |
| "pages": "129--132", |
| "other_ids": {}, |
| "num": null, |
| "urls": [], |
| "raw_text": "[Sagae and Lavie2006] K. Sagae and A. Lavie. 2006. Parser combination by reparsing. In Proceedings of HLT/NAACL, pages 129-132.", |
| "links": null |
| }, |
| "BIBREF27": { |
| "ref_id": "b27", |
| "title": "Improved boosting algorithms using confidence-rated predictions", |
| "authors": [ |
| { |
| "first": "Robert", |
| "middle": [ |
| "E" |
| ], |
| "last": "Schapire", |
| "suffix": "" |
| }, |
| { |
| "first": "Yoram", |
| "middle": [], |
| "last": "Singer", |
| "suffix": "" |
| } |
| ], |
| "year": 1999, |
| "venue": "Machine Learning", |
| "volume": "37", |
| "issue": "", |
| "pages": "297--336", |
| "other_ids": {}, |
| "num": null, |
| "urls": [], |
| "raw_text": "[Schapire and Singer1999] Robert E. Schapire and Yoram Singer. 1999. Improved boosting algorithms using confidence-rated predictions. Machine Learning, 37(3):297-336.", |
| "links": null |
| }, |
| "BIBREF28": { |
| "ref_id": "b28", |
| "title": "Boostexter: A boosting-based system for text categorization", |
| "authors": [ |
| { |
| "first": "Robert", |
| "middle": [ |
| "E" |
| ], |
| "last": "Singer2000", |
| "suffix": "" |
| }, |
| { |
| "first": "Yoram", |
| "middle": [], |
| "last": "Schapire", |
| "suffix": "" |
| }, |
| { |
| "first": "", |
| "middle": [], |
| "last": "Singer", |
| "suffix": "" |
| } |
| ], |
| "year": 2000, |
| "venue": "Machine Learning", |
| "volume": "39", |
| "issue": "", |
| "pages": "135--168", |
| "other_ids": {}, |
| "num": null, |
| "urls": [], |
| "raw_text": "[Schapire and Singer2000] Robert E. Schapire and Yoram Singer. 2000. Boostexter: A boosting-based system for text categorization. Machine Learning, 39(2-3):135-168.", |
| "links": null |
| }, |
| "BIBREF29": { |
| "ref_id": "b29", |
| "title": "Boosting the margin: A new explanation for the effectiveness of voting methods", |
| "authors": [ |
| { |
| "first": "", |
| "middle": [], |
| "last": "Schapire", |
| "suffix": "" |
| } |
| ], |
| "year": 1997, |
| "venue": "ICML", |
| "volume": "", |
| "issue": "", |
| "pages": "322--330", |
| "other_ids": {}, |
| "num": null, |
| "urls": [], |
| "raw_text": "[Schapire et al.1997] Robert E. Schapire, Yoav Freund, Peter Bartlett, and Wee Sun Lee. 1997. Boosting the margin: A new explanation for the effectiveness of vot- ing methods. In ICML, pages 322-330.", |
| "links": null |
| }, |
| "BIBREF30": { |
| "ref_id": "b30", |
| "title": "Linearly combining density estimators via stacking", |
| "authors": [ |
| { |
| "first": "Padhraic", |
| "middle": [], |
| "last": "Smyth", |
| "suffix": "" |
| }, |
| { |
| "first": "David", |
| "middle": [], |
| "last": "Wolpert", |
| "suffix": "" |
| }, |
| { |
| "first": ";", |
| "middle": [ |
| "E" |
| ], |
| "last": "Takimoto", |
| "suffix": "" |
| }, |
| { |
| "first": "M", |
| "middle": [ |
| "K" |
| ], |
| "last": "Warmuth", |
| "suffix": "" |
| } |
| ], |
| "year": 1999, |
| "venue": "Path kernels and multiplicative updates. JMLR", |
| "volume": "36", |
| "issue": "", |
| "pages": "773--818", |
| "other_ids": {}, |
| "num": null, |
| "urls": [], |
| "raw_text": "[Smyth and Wolpert1999] Padhraic Smyth and David Wolpert. 1999. Linearly combining density estimators via stacking. Machine Learning, 36:59-83, July. [Takimoto and Warmuth2003] E. Takimoto and M. K. Warmuth. 2003. Path kernels and multiplicative up- dates. JMLR, 4:773-818.", |
| "links": null |
| }, |
| "BIBREF31": { |
| "ref_id": "b31", |
| "title": "Large margin methods for structured and interdependent output variables", |
| "authors": [ |
| { |
| "first": "[", |
| "middle": [], |
| "last": "Taskar", |
| "suffix": "" |
| } |
| ], |
| "year": 2004, |
| "venue": "Proceedings of IJCAI 20", |
| "volume": "6", |
| "issue": "", |
| "pages": "171--178", |
| "other_ids": {}, |
| "num": null, |
| "urls": [], |
| "raw_text": "[Taskar et al.2004] B. Taskar, C. Guestrin, and D. Koller. 2004. Max-margin Markov networks. In Advances in NIPS 16. MIT Press, Cambridge, MA. [Tsochantaridis et al.2005] I. Tsochantaridis, T. Joachims, T. Hofmann, and Y. Altun. 2005. Large margin methods for structured and interde- pendent output variables. JMLR, 6:1453-1484, December. [Wang et al.2007] Q. Wang, D. Lin, and D. Schuur- mans. 2007. Simple training of dependency parsers via structured boosting. In Proceedings of IJCAI 20, pages 1756-1762. [Zeman and\u017dabokrtsk\u00fd2005] D. Zeman and Z.\u017dabokrtsk\u00fd. 2005. Improving parsing accu- racy by combining diverse dependency parsers. In Proceedings of IWPT 9, pages 171-178.", |
| "links": null |
| }, |
| "BIBREF32": { |
| "ref_id": "b32", |
| "title": "K-best combination of syntactic parsers", |
| "authors": [ |
| { |
| "first": "[", |
| "middle": [], |
| "last": "Zhang", |
| "suffix": "" |
| } |
| ], |
| "year": 2009, |
| "venue": "Proceedings of EMNLP", |
| "volume": "3", |
| "issue": "", |
| "pages": "1552--1560", |
| "other_ids": {}, |
| "num": null, |
| "urls": [], |
| "raw_text": "[Zhang et al.2009] H. Zhang, M. Zhang, C. Tan, and H. Li. 2009. K-best combination of syntactic parsers. In Proceedings of EMNLP: Volume 3, pages 1552- 1560.", |
| "links": null |
| } |
| }, |
| "ref_entries": { |
| "FIGREF0": { |
| "num": null, |
| "type_str": "figure", |
| "text": "Finite automaton G of path experts.", |
| "uris": null |
| }, |
| "FIGREF1": { |
| "num": null, |
| "type_str": "figure", |
| "text": "Alternative experts automaton.", |
| "uris": null |
| }, |
| "TABREF0": { |
| "num": null, |
| "text": "Average Normalized Hamming Loss, ADS1 and ADS2. \u03b2 ADS1 = 0.95, \u03b2 ADS2 = 0.95, T SLE = 100, \u03b4 = 0.05.", |
| "html": null, |
| "type_str": "table", |
| "content": "<table><tr><td/><td>ADS1, m = 200</td><td>ADS2, m = 200</td></tr><tr><td>HMVote</td><td colspan=\"2\">0.0197 \u00b1 0.00002 0.2172 \u00b1 0.00983</td></tr><tr><td>HFPL</td><td colspan=\"2\">0.0228 \u00b1 0.00947 0.2517 \u00b1 0.05322</td></tr><tr><td>HCV</td><td colspan=\"2\">0.0197 \u00b1 0.00002 0.2385 \u00b1 0.00002</td></tr><tr><td>HFPL-CV</td><td colspan=\"2\">0.0741 \u00b1 0.04087 0.4001 \u00b1 0.00028</td></tr><tr><td colspan=\"3\">HESPBoost 0.0197 \u00b1 0.00002 0.2267 \u00b1 0.00834</td></tr><tr><td>HSLE</td><td colspan=\"2\">0.5641 \u00b1 0.00044 0.2500 \u00b1 0.05003</td></tr><tr><td>HRand</td><td colspan=\"2\">0.1112 \u00b1 0.00540 0.4000 \u00b1 0.00018</td></tr><tr><td>Best hj</td><td>0.5635 \u00b1 0.00004</td><td>0.4000</td></tr></table>" |
| }, |
| "TABREF1": { |
| "num": null, |
| "text": "Average Normalized Hamming Loss, SDS. l \u2265 4, \u03b2 = 0.97, \u03b4 = 0.05, T SLE = 100.", |
| "html": null, |
| "type_str": "table", |
| "content": "<table><tr><td/><td colspan=\"2\">p = 5, m = 1500 p = 10, m = 1200</td></tr><tr><td>HMVote</td><td>0.2465 \u00b1 0.00248</td><td>0.2606 \u00b1 0.00320</td></tr><tr><td>HFPL</td><td>0.2500 \u00b1 0.00248</td><td>0.2622 \u00b1 0.00316</td></tr><tr><td>HCV</td><td>0.2504 \u00b1 0.00576</td><td>0.2755 \u00b1 0.00212</td></tr><tr><td>HFPL-CV</td><td>0.2726 \u00b1 0.00839</td><td>0.3219 \u00b1 0.01176</td></tr><tr><td colspan=\"2\">HESPBoost 0.2572 \u00b1 0.00062</td><td>0.2864 \u00b1 0.00103</td></tr><tr><td>HSLE</td><td>0.2572 \u00b1 0.00061</td><td>0.2864 \u00b1 0.00102</td></tr><tr><td>HRand</td><td>0.2877 \u00b1 0.00480</td><td>0.3430 \u00b1 0.00468</td></tr><tr><td>Best hj</td><td>0.2573 \u00b1 0.00060</td><td>0.2865 \u00b1 0.00101</td></tr></table>" |
| } |
| } |
| } |
| } |