id
large_stringlengths
9
16
submitter
large_stringlengths
3
64
authors
large_stringlengths
5
20.2k
title
large_stringlengths
5
245
comments
large_stringlengths
1
482
journal-ref
large_stringlengths
4
382
doi
large_stringlengths
9
151
report-no
large_stringlengths
2
509
categories
large_stringlengths
5
78
license
large_stringclasses
9 values
abstract
large_stringlengths
83
3.55k
versions
large listlengths
1
21
update_date
timestamp[ms]date
2007-05-23 00:00:00
2025-05-30 00:00:00
authors_parsed
large listlengths
1
1.35k
prompt
large_stringlengths
166
3.64k
label
stringclasses
2 values
prob
float64
0.5
0.73
1501.01301
David Delahaye
M\'elanie Jacquel, Karim Berkani, David Delahaye (CEDRIC, CNAM Paris, INRIA), Catherine Dubois (CEDRIC, INRIA, ENSIIE)
Tableaux Modulo Theories Using Superdeduction
arXiv admin note: substantial text overlap with arXiv:1501.01170
Global Journal of Advanced Software Engineering (GJASE), Avanti Publishers, 2014, 1, pp.1 - 13
10.1007/978-3-642-31365-3_26
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a method that allows us to develop tableaux modulo theories using the principles of superdeduction, among which the theory is used to enrich the deduction system with new deduction rules. This method is presented in the framework of the Zenon automated theorem prover, and is applied to the set theory of the B method. This allows us to provide another prover to Atelier B, which can be used to verify B proof rules in particular. We also propose some benchmarks, in which this prover is able to automatically verify a part of the rules coming from the database maintained by Siemens IC-MOL. Finally, we describe another extension of Zenon with superdeduction, which is able to deal with any first order theory, and provide a benchmark coming from the TPTP library, which contains a large set of first order problems.
[ { "version": "v1", "created": "Tue, 6 Jan 2015 13:13:59 GMT" } ]
2015-01-08T00:00:00
[ [ "Jacquel", "Mélanie", "", "CEDRIC, CNAM Paris,\n INRIA" ], [ "Berkani", "Karim", "", "CEDRIC, CNAM Paris,\n INRIA" ], [ "Delahaye", "David", "", "CEDRIC, CNAM Paris,\n INRIA" ], [ "Dubois", "Catherine", "", "CEDRIC, INRIA, ENSIIE" ] ]
TITLE: Tableaux Modulo Theories Using Superdeduction ABSTRACT: We propose a method that allows us to develop tableaux modulo theories using the principles of superdeduction, among which the theory is used to enrich the deduction system with new deduction rules. This method is presented in the framework of the Zenon automated theorem prover, and is applied to the set theory of the B method. This allows us to provide another prover to Atelier B, which can be used to verify B proof rules in particular. We also propose some benchmarks, in which this prover is able to automatically verify a part of the rules coming from the database maintained by Siemens IC-MOL. Finally, we describe another extension of Zenon with superdeduction, which is able to deal with any first order theory, and provide a benchmark coming from the TPTP library, which contains a large set of first order problems.
no_new_dataset
0.70779
1501.01405
Jonathan Passerat-Palmbach
Jonathan Passerat-Palmbach (ISIMA, LIMOS, UBP), Jonathan Caux (LIMOS, UBP, IBC, ISIMA), Pridi Siregar (IBC), Claude Mazel (LIMOS, UBP, ISIMA), David Hill (UBP, LIMOS, ISIMA)
Warp-Level Parallelism: Enabling Multiple Replications In Parallel on GPU
Best paper award. from European Simulation and Modelling, Oct 2011, Guimaraes, Portugal
null
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Stochastic simulations need multiple replications in order to build confidence intervals for their results. Even if we do not need a large amount of replications, it is a good practice to speed-up the whole simulation time using the Multiple Replications In Parallel (MRIP) approach. This approach usually supposes to have access to a parallel computer such as a symmetric mul-tiprocessing machine (with many cores), a computing cluster or a computing grid. In this paper, we propose Warp-Level Parallelism (WLP), a GP-GPU-enabled solution to compute MRIP on GP-GPUs (General-Purpose Graphics Processing Units). These devices display a great amount of parallel computational power at low cost, but are tuned to process efficiently the same operation on several data, through different threads. Indeed, this paradigm is called Single Instruction, Multiple Threads (SIMT). Our approach proposes to rely on small threads groups, called warps, to perform independent computations such as replications. We have benchmarked WLP with three different models: it allows MRIP to be computed up to six times faster than with the SIMT computing paradigm.
[ { "version": "v1", "created": "Wed, 7 Jan 2015 09:15:48 GMT" } ]
2015-01-08T00:00:00
[ [ "Passerat-Palmbach", "Jonathan", "", "ISIMA, LIMOS, UBP" ], [ "Caux", "Jonathan", "", "LIMOS,\n UBP, IBC, ISIMA" ], [ "Siregar", "Pridi", "", "IBC" ], [ "Mazel", "Claude", "", "LIMOS, UBP, ISIMA" ], [ "Hill", "David", "", "UBP, LIMOS, ISIMA" ] ]
TITLE: Warp-Level Parallelism: Enabling Multiple Replications In Parallel on GPU ABSTRACT: Stochastic simulations need multiple replications in order to build confidence intervals for their results. Even if we do not need a large amount of replications, it is a good practice to speed-up the whole simulation time using the Multiple Replications In Parallel (MRIP) approach. This approach usually supposes to have access to a parallel computer such as a symmetric mul-tiprocessing machine (with many cores), a computing cluster or a computing grid. In this paper, we propose Warp-Level Parallelism (WLP), a GP-GPU-enabled solution to compute MRIP on GP-GPUs (General-Purpose Graphics Processing Units). These devices display a great amount of parallel computational power at low cost, but are tuned to process efficiently the same operation on several data, through different threads. Indeed, this paradigm is called Single Instruction, Multiple Threads (SIMT). Our approach proposes to rely on small threads groups, called warps, to perform independent computations such as replications. We have benchmarked WLP with three different models: it allows MRIP to be computed up to six times faster than with the SIMT computing paradigm.
no_new_dataset
0.710427
1501.01426
Mansaf Alam
Mansaf Alam, Kashish Ara Shakil and Shuchi Sethi
Analysis and Clustering of Workload in Google Cluster Trace based on Resource Usage
null
null
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Cloud computing has gained interest amongst commercial organizations, research communities, developers and other individuals during the past few years.In order to move ahead with research in field of data management and processing of such data, we need benchmark datasets and freely available data which are publicly accessible. Google in May 2011 released a trace of a cluster of 11k machines referred as Google Cluster Trace.This trace contains cell information of about 29 days.This paper provides analysis of resource usage and requirements in this trace and is an attempt to give an insight into such kind of production trace similar to the ones in cloud environment.The major contributions of this paper include Statistical Profile of Jobs based on resource usage, clustering of Workload Patterns and Classification of jobs into different types based on k-means clustering.Though there have been earlier works for analysis of this trace, but our analysis provides several new findings such as jobs in a production trace are trimodal and there occurs symmetry in the tasks within a long job type
[ { "version": "v1", "created": "Wed, 7 Jan 2015 10:15:05 GMT" } ]
2015-01-08T00:00:00
[ [ "Alam", "Mansaf", "" ], [ "Shakil", "Kashish Ara", "" ], [ "Sethi", "Shuchi", "" ] ]
TITLE: Analysis and Clustering of Workload in Google Cluster Trace based on Resource Usage ABSTRACT: Cloud computing has gained interest amongst commercial organizations, research communities, developers and other individuals during the past few years.In order to move ahead with research in field of data management and processing of such data, we need benchmark datasets and freely available data which are publicly accessible. Google in May 2011 released a trace of a cluster of 11k machines referred as Google Cluster Trace.This trace contains cell information of about 29 days.This paper provides analysis of resource usage and requirements in this trace and is an attempt to give an insight into such kind of production trace similar to the ones in cloud environment.The major contributions of this paper include Statistical Profile of Jobs based on resource usage, clustering of Workload Patterns and Classification of jobs into different types based on k-means clustering.Though there have been earlier works for analysis of this trace, but our analysis provides several new findings such as jobs in a production trace are trimodal and there occurs symmetry in the tasks within a long job type
no_new_dataset
0.708011
1412.7625
Teng Qiu
Teng Qiu, Yongjie Li
An Effective Semi-supervised Divisive Clustering Algorithm
8 pages, 4 figures, a new (6th) member of the in-tree clustering family
null
null
null
cs.LG cs.CV stat.ML
http://creativecommons.org/licenses/by-nc-sa/3.0/
Nowadays, data are generated massively and rapidly from scientific fields as bioinformatics, neuroscience and astronomy to business and engineering fields. Cluster analysis, as one of the major data analysis tools, is therefore more significant than ever. We propose in this work an effective Semi-supervised Divisive Clustering algorithm (SDC). Data points are first organized by a minimal spanning tree. Next, this tree structure is transitioned to the in-tree structure, and then divided into sub-trees under the supervision of the labeled data, and in the end, all points in the sub-trees are directly associated with specific cluster centers. SDC is fully automatic, non-iterative, involving no free parameter, insensitive to noise, able to detect irregularly shaped cluster structures, applicable to the data sets of high dimensionality and different attributes. The power of SDC is demonstrated on several datasets.
[ { "version": "v1", "created": "Wed, 24 Dec 2014 08:55:50 GMT" }, { "version": "v2", "created": "Tue, 6 Jan 2015 09:35:39 GMT" } ]
2015-01-07T00:00:00
[ [ "Qiu", "Teng", "" ], [ "Li", "Yongjie", "" ] ]
TITLE: An Effective Semi-supervised Divisive Clustering Algorithm ABSTRACT: Nowadays, data are generated massively and rapidly from scientific fields as bioinformatics, neuroscience and astronomy to business and engineering fields. Cluster analysis, as one of the major data analysis tools, is therefore more significant than ever. We propose in this work an effective Semi-supervised Divisive Clustering algorithm (SDC). Data points are first organized by a minimal spanning tree. Next, this tree structure is transitioned to the in-tree structure, and then divided into sub-trees under the supervision of the labeled data, and in the end, all points in the sub-trees are directly associated with specific cluster centers. SDC is fully automatic, non-iterative, involving no free parameter, insensitive to noise, able to detect irregularly shaped cluster structures, applicable to the data sets of high dimensionality and different attributes. The power of SDC is demonstrated on several datasets.
no_new_dataset
0.711462
1501.00994
Vikram Krishnamurthy
Vikram Krishnamurthy and William Hoiles
Online Reputation and Polling Systems: Data Incest, Social Learning and Revealed Preferences
arXiv admin note: substantial text overlap with arXiv:1412.4171
null
null
null
cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper considers online reputation and polling systems where individuals make recommendations based on their private observations and recommendations of friends. Such interaction of individuals and their social influence is modelled as social learning on a directed acyclic graph. Data incest (misinformation propagation) occurs due to unintentional re-use of identical actions in the for- mation of public belief in social learning; the information gathered by each agent is mistakenly considered to be independent. This results in overconfidence and bias in estimates of the state. Necessary and sufficient conditions are given on the structure of information exchange graph to mitigate data incest. Incest removal algorithms are presented. Experimental results on human subjects are presented to illustrate the effect of social influence and data incest on decision making. These experimental results indicate that social learning protocols require careful design to handle and mitigate data incest. The incest removal algorithms are illustrated in an expectation polling system where participants in a poll respond with a summary of their friends' beliefs. Finally, the principle of revealed preferences arising in micro-economics theory is used to parse Twitter datasets to determine if social sensors are utility maximizers and then determine their utility functions.
[ { "version": "v1", "created": "Mon, 5 Jan 2015 21:00:51 GMT" } ]
2015-01-07T00:00:00
[ [ "Krishnamurthy", "Vikram", "" ], [ "Hoiles", "William", "" ] ]
TITLE: Online Reputation and Polling Systems: Data Incest, Social Learning and Revealed Preferences ABSTRACT: This paper considers online reputation and polling systems where individuals make recommendations based on their private observations and recommendations of friends. Such interaction of individuals and their social influence is modelled as social learning on a directed acyclic graph. Data incest (misinformation propagation) occurs due to unintentional re-use of identical actions in the for- mation of public belief in social learning; the information gathered by each agent is mistakenly considered to be independent. This results in overconfidence and bias in estimates of the state. Necessary and sufficient conditions are given on the structure of information exchange graph to mitigate data incest. Incest removal algorithms are presented. Experimental results on human subjects are presented to illustrate the effect of social influence and data incest on decision making. These experimental results indicate that social learning protocols require careful design to handle and mitigate data incest. The incest removal algorithms are illustrated in an expectation polling system where participants in a poll respond with a summary of their friends' beliefs. Finally, the principle of revealed preferences arising in micro-economics theory is used to parse Twitter datasets to determine if social sensors are utility maximizers and then determine their utility functions.
no_new_dataset
0.710622
1501.01083
Mohana S H
S.H. Mohana, C.J. Prabhakar
Stem-Calyx Recognition of an Apple using Shape Descriptors
15 pages, 10 figures and 2 tables in Signal & Image Processing : An International Journal (SIPIJ) Vol.5, No.6, December 2014
null
10.5121/sipij.2014.5602
null
cs.CV
http://creativecommons.org/licenses/by-nc-sa/3.0/
This paper presents a novel method to recognize stem - calyx of an apple using shape descriptors. The main drawback of existing apple grading techniques is that stem - calyx part of an apple is treated as defects, this leads to poor grading of apples. In order to overcome this drawback, we proposed an approach to recognize stem-calyx and differentiated from true defects based on shape features. Our method comprises of steps such as segmentation of apple using grow-cut method, candidate objects such as stem-calyx and small defects are detected using multi-threshold segmentation. The shape features are extracted from detected objects using Multifractal, Fourier and Radon descriptor and finally stem-calyx regions are recognized and differentiated from true defects using SVM classifier. The proposed algorithm is evaluated using experiments conducted on apple image dataset and results exhibit considerable improvement in recognition of stem-calyx region compared to other techniques.
[ { "version": "v1", "created": "Tue, 6 Jan 2015 05:51:23 GMT" } ]
2015-01-07T00:00:00
[ [ "Mohana", "S. H.", "" ], [ "Prabhakar", "C. J.", "" ] ]
TITLE: Stem-Calyx Recognition of an Apple using Shape Descriptors ABSTRACT: This paper presents a novel method to recognize stem - calyx of an apple using shape descriptors. The main drawback of existing apple grading techniques is that stem - calyx part of an apple is treated as defects, this leads to poor grading of apples. In order to overcome this drawback, we proposed an approach to recognize stem-calyx and differentiated from true defects based on shape features. Our method comprises of steps such as segmentation of apple using grow-cut method, candidate objects such as stem-calyx and small defects are detected using multi-threshold segmentation. The shape features are extracted from detected objects using Multifractal, Fourier and Radon descriptor and finally stem-calyx regions are recognized and differentiated from true defects using SVM classifier. The proposed algorithm is evaluated using experiments conducted on apple image dataset and results exhibit considerable improvement in recognition of stem-calyx region compared to other techniques.
no_new_dataset
0.713201
1402.1473
Yuxin Chen
Yuxin Chen and Leonidas J. Guibas and Qi-Xing Huang
Near-Optimal Joint Object Matching via Convex Relaxation
null
31st International Conference on Machine Learning, vol. 32, pp. 100 - 108, June 2014
null
null
cs.LG cs.CV cs.IT math.IT math.OC stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Joint matching over a collection of objects aims at aggregating information from a large collection of similar instances (e.g. images, graphs, shapes) to improve maps between pairs of them. Given multiple matches computed between a few object pairs in isolation, the goal is to recover an entire collection of maps that are (1) globally consistent, and (2) close to the provided maps --- and under certain conditions provably the ground-truth maps. Despite recent advances on this problem, the best-known recovery guarantees are limited to a small constant barrier --- none of the existing methods find theoretical support when more than $50\%$ of input correspondences are corrupted. Moreover, prior approaches focus mostly on fully similar objects, while it is practically more demanding to match instances that are only partially similar to each other. In this paper, we develop an algorithm to jointly match multiple objects that exhibit only partial similarities, given a few pairwise matches that are densely corrupted. Specifically, we propose to recover the ground-truth maps via a parameter-free convex program called MatchLift, following a spectral method that pre-estimates the total number of distinct elements to be matched. Encouragingly, MatchLift exhibits near-optimal error-correction ability, i.e. in the asymptotic regime it is guaranteed to work even when a dominant fraction $1-\Theta\left(\frac{\log^{2}n}{\sqrt{n}}\right)$ of the input maps behave like random outliers. Furthermore, MatchLift succeeds with minimal input complexity, namely, perfect matching can be achieved as soon as the provided maps form a connected map graph. We evaluate the proposed algorithm on various benchmark data sets including synthetic examples and real-world examples, all of which confirm the practical applicability of MatchLift.
[ { "version": "v1", "created": "Thu, 6 Feb 2014 20:16:35 GMT" } ]
2015-01-06T00:00:00
[ [ "Chen", "Yuxin", "" ], [ "Guibas", "Leonidas J.", "" ], [ "Huang", "Qi-Xing", "" ] ]
TITLE: Near-Optimal Joint Object Matching via Convex Relaxation ABSTRACT: Joint matching over a collection of objects aims at aggregating information from a large collection of similar instances (e.g. images, graphs, shapes) to improve maps between pairs of them. Given multiple matches computed between a few object pairs in isolation, the goal is to recover an entire collection of maps that are (1) globally consistent, and (2) close to the provided maps --- and under certain conditions provably the ground-truth maps. Despite recent advances on this problem, the best-known recovery guarantees are limited to a small constant barrier --- none of the existing methods find theoretical support when more than $50\%$ of input correspondences are corrupted. Moreover, prior approaches focus mostly on fully similar objects, while it is practically more demanding to match instances that are only partially similar to each other. In this paper, we develop an algorithm to jointly match multiple objects that exhibit only partial similarities, given a few pairwise matches that are densely corrupted. Specifically, we propose to recover the ground-truth maps via a parameter-free convex program called MatchLift, following a spectral method that pre-estimates the total number of distinct elements to be matched. Encouragingly, MatchLift exhibits near-optimal error-correction ability, i.e. in the asymptotic regime it is guaranteed to work even when a dominant fraction $1-\Theta\left(\frac{\log^{2}n}{\sqrt{n}}\right)$ of the input maps behave like random outliers. Furthermore, MatchLift succeeds with minimal input complexity, namely, perfect matching can be achieved as soon as the provided maps form a connected map graph. We evaluate the proposed algorithm on various benchmark data sets including synthetic examples and real-world examples, all of which confirm the practical applicability of MatchLift.
no_new_dataset
0.710069
1405.4807
Yuxin Chen
Qixing Huang, Yuxin Chen, and Leonidas Guibas
Scalable Semidefinite Relaxation for Maximum A Posterior Estimation
accepted to International Conference on Machine Learning (ICML 2014)
International Conference on Machine Learning (ICML), vol. 32, pp. 64-72, June 2014
null
null
cs.LG cs.CV cs.IT math.IT math.OC stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Maximum a posteriori (MAP) inference over discrete Markov random fields is a fundamental task spanning a wide spectrum of real-world applications, which is known to be NP-hard for general graphs. In this paper, we propose a novel semidefinite relaxation formulation (referred to as SDR) to estimate the MAP assignment. Algorithmically, we develop an accelerated variant of the alternating direction method of multipliers (referred to as SDPAD-LR) that can effectively exploit the special structure of the new relaxation. Encouragingly, the proposed procedure allows solving SDR for large-scale problems, e.g., problems on a grid graph comprising hundreds of thousands of variables with multiple states per node. Compared with prior SDP solvers, SDPAD-LR is capable of attaining comparable accuracy while exhibiting remarkably improved scalability, in contrast to the commonly held belief that semidefinite relaxation can only been applied on small-scale MRF problems. We have evaluated the performance of SDR on various benchmark datasets including OPENGM2 and PIC in terms of both the quality of the solutions and computation time. Experimental results demonstrate that for a broad class of problems, SDPAD-LR outperforms state-of-the-art algorithms in producing better MAP assignment in an efficient manner.
[ { "version": "v1", "created": "Mon, 19 May 2014 16:58:24 GMT" } ]
2015-01-06T00:00:00
[ [ "Huang", "Qixing", "" ], [ "Chen", "Yuxin", "" ], [ "Guibas", "Leonidas", "" ] ]
TITLE: Scalable Semidefinite Relaxation for Maximum A Posterior Estimation ABSTRACT: Maximum a posteriori (MAP) inference over discrete Markov random fields is a fundamental task spanning a wide spectrum of real-world applications, which is known to be NP-hard for general graphs. In this paper, we propose a novel semidefinite relaxation formulation (referred to as SDR) to estimate the MAP assignment. Algorithmically, we develop an accelerated variant of the alternating direction method of multipliers (referred to as SDPAD-LR) that can effectively exploit the special structure of the new relaxation. Encouragingly, the proposed procedure allows solving SDR for large-scale problems, e.g., problems on a grid graph comprising hundreds of thousands of variables with multiple states per node. Compared with prior SDP solvers, SDPAD-LR is capable of attaining comparable accuracy while exhibiting remarkably improved scalability, in contrast to the commonly held belief that semidefinite relaxation can only been applied on small-scale MRF problems. We have evaluated the performance of SDR on various benchmark datasets including OPENGM2 and PIC in terms of both the quality of the solutions and computation time. Experimental results demonstrate that for a broad class of problems, SDPAD-LR outperforms state-of-the-art algorithms in producing better MAP assignment in an efficient manner.
no_new_dataset
0.709573
1412.7828
S{\o}ren S{\o}nderby
S{\o}ren Kaae S{\o}nderby and Ole Winther
Protein Secondary Structure Prediction with Long Short Term Memory Networks
v2: adds larger network with slightly better results, update author affiliations
null
null
null
q-bio.QM cs.LG cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Prediction of protein secondary structure from the amino acid sequence is a classical bioinformatics problem. Common methods use feed forward neural networks or SVMs combined with a sliding window, as these models does not naturally handle sequential data. Recurrent neural networks are an generalization of the feed forward neural network that naturally handle sequential data. We use a bidirectional recurrent neural network with long short term memory cells for prediction of secondary structure and evaluate using the CB513 dataset. On the secondary structure 8-class problem we report better performance (0.674) than state of the art (0.664). Our model includes feed forward networks between the long short term memory cells, a path that can be further explored.
[ { "version": "v1", "created": "Thu, 25 Dec 2014 14:27:42 GMT" }, { "version": "v2", "created": "Sun, 4 Jan 2015 19:44:17 GMT" } ]
2015-01-06T00:00:00
[ [ "Sønderby", "Søren Kaae", "" ], [ "Winther", "Ole", "" ] ]
TITLE: Protein Secondary Structure Prediction with Long Short Term Memory Networks ABSTRACT: Prediction of protein secondary structure from the amino acid sequence is a classical bioinformatics problem. Common methods use feed forward neural networks or SVMs combined with a sliding window, as these models does not naturally handle sequential data. Recurrent neural networks are an generalization of the feed forward neural network that naturally handle sequential data. We use a bidirectional recurrent neural network with long short term memory cells for prediction of secondary structure and evaluate using the CB513 dataset. On the secondary structure 8-class problem we report better performance (0.674) than state of the art (0.664). Our model includes feed forward networks between the long short term memory cells, a path that can be further explored.
no_new_dataset
0.711406
1501.00503
Sebasti\'an Basterrech
Sebasti\'an Basterrech
An Empirical Study of the L2-Boost technique with Echo State Networks
To appear in Journal of Network and Innovative Computing, Volume 2, Issue 1, pp. 120 - 127, 2014
null
null
null
cs.LG cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A particular case of Recurrent Neural Network (RNN) was introduced at the beginning of the 2000s under the name of Echo State Networks (ESNs). The ESN model overcomes the limitations during the training of the RNNs while introducing no significant disadvantages. Although the model presents some well-identified drawbacks when the parameters are not well initialised. The performance of an ESN is highly dependent on its internal parameters and pattern of connectivity of the hidden-hidden weights Often, the tuning of the network parameters can be hard and can impact in the accuracy of the models. In this work, we investigate the performance of a specific boosting technique (called L2-Boost) with ESNs as single predictors. The L2-Boost technique has been shown to be an effective tool to combine "weak" predictors in regression problems. In this study, we use an ensemble of random initialized ESNs (without control their parameters) as "weak" predictors of the boosting procedure. We evaluate our approach on five well-know time-series benchmark problems. Additionally, we compare this technique with a baseline approach that consists of averaging the prediction of an ensemble of ESNs.
[ { "version": "v1", "created": "Fri, 2 Jan 2015 21:15:00 GMT" } ]
2015-01-06T00:00:00
[ [ "Basterrech", "Sebastián", "" ] ]
TITLE: An Empirical Study of the L2-Boost technique with Echo State Networks ABSTRACT: A particular case of Recurrent Neural Network (RNN) was introduced at the beginning of the 2000s under the name of Echo State Networks (ESNs). The ESN model overcomes the limitations during the training of the RNNs while introducing no significant disadvantages. Although the model presents some well-identified drawbacks when the parameters are not well initialised. The performance of an ESN is highly dependent on its internal parameters and pattern of connectivity of the hidden-hidden weights Often, the tuning of the network parameters can be hard and can impact in the accuracy of the models. In this work, we investigate the performance of a specific boosting technique (called L2-Boost) with ESNs as single predictors. The L2-Boost technique has been shown to be an effective tool to combine "weak" predictors in regression problems. In this study, we use an ensemble of random initialized ESNs (without control their parameters) as "weak" predictors of the boosting procedure. We evaluate our approach on five well-know time-series benchmark problems. Additionally, we compare this technique with a baseline approach that consists of averaging the prediction of an ensemble of ESNs.
no_new_dataset
0.707613
1501.00549
David Pastor-Escuredo
David Pastor-Escuredo, Thierry Savy and Miguel A. Luengo-Oroz
Can Fires, Night Lights, and Mobile Phones reveal behavioral fingerprints useful for Development?
Published in D4D Challenge. NetMob, May 1-3, 2013, MIT
null
null
null
cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Fires, lights at night and mobile phone activity have been separately used as proxy indicators of human activity with high potential for measuring human development. In this preliminary report, we develop some tools and methodologies to identify and visualize relations among remote sensing datasets containing fires and night lights information with mobile phone activity in Cote D'Ivoire from December 2011 to April 2012.
[ { "version": "v1", "created": "Sat, 3 Jan 2015 09:28:20 GMT" } ]
2015-01-06T00:00:00
[ [ "Pastor-Escuredo", "David", "" ], [ "Savy", "Thierry", "" ], [ "Luengo-Oroz", "Miguel A.", "" ] ]
TITLE: Can Fires, Night Lights, and Mobile Phones reveal behavioral fingerprints useful for Development? ABSTRACT: Fires, lights at night and mobile phone activity have been separately used as proxy indicators of human activity with high potential for measuring human development. In this preliminary report, we develop some tools and methodologies to identify and visualize relations among remote sensing datasets containing fires and night lights information with mobile phone activity in Cote D'Ivoire from December 2011 to April 2012.
no_new_dataset
0.703295
1501.00607
Kwetishe Danjuma
Kwetishe Danjuma and Adenike O. Osofisan
Evaluation of Predictive Data Mining Algorithms in Erythemato-Squamous Disease Diagnosis
10 pages, 3 figures 2 tables
IJCSI International Journal of Computer Science Issues, 11(6), 85-94 (2014)
null
null
cs.LG cs.CE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A lot of time is spent searching for the most performing data mining algorithms applied in clinical diagnosis. The study set out to identify the most performing predictive data mining algorithms applied in the diagnosis of Erythemato-squamous diseases. The study used Naive Bayes, Multilayer Perceptron and J48 decision tree induction to build predictive data mining models on 366 instances of Erythemato-squamous diseases datasets. Also, 10-fold cross-validation and sets of performance metrics were used to evaluate the baseline predictive performance of the classifiers. The comparative analysis shows that the Naive Bayes performed best with accuracy of 97.4%, Multilayer Perceptron came out second with accuracy of 96.6%, and J48 came out the worst with accuracy of 93.5%. The evaluation of these classifiers on clinical datasets, gave an insight into the predictive ability of different data mining algorithms applicable in clinical diagnosis especially in the diagnosis of Erythemato-squamous diseases.
[ { "version": "v1", "created": "Sat, 3 Jan 2015 21:34:35 GMT" } ]
2015-01-06T00:00:00
[ [ "Danjuma", "Kwetishe", "" ], [ "Osofisan", "Adenike O.", "" ] ]
TITLE: Evaluation of Predictive Data Mining Algorithms in Erythemato-Squamous Disease Diagnosis ABSTRACT: A lot of time is spent searching for the most performing data mining algorithms applied in clinical diagnosis. The study set out to identify the most performing predictive data mining algorithms applied in the diagnosis of Erythemato-squamous diseases. The study used Naive Bayes, Multilayer Perceptron and J48 decision tree induction to build predictive data mining models on 366 instances of Erythemato-squamous diseases datasets. Also, 10-fold cross-validation and sets of performance metrics were used to evaluate the baseline predictive performance of the classifiers. The comparative analysis shows that the Naive Bayes performed best with accuracy of 97.4%, Multilayer Perceptron came out second with accuracy of 96.6%, and J48 came out the worst with accuracy of 93.5%. The evaluation of these classifiers on clinical datasets, gave an insight into the predictive ability of different data mining algorithms applicable in clinical diagnosis especially in the diagnosis of Erythemato-squamous diseases.
no_new_dataset
0.712795
1501.00614
Mahdi Kalayeh
Mahdi M. Kalayeh, Stephen Mussmann, Alla Petrakova, Niels da Vitoria Lobo and Mubarak Shah
Understanding Trajectory Behavior: A Motion Pattern Approach
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Mining the underlying patterns in gigantic and complex data is of great importance to data analysts. In this paper, we propose a motion pattern approach to mine frequent behaviors in trajectory data. Motion patterns, defined by a set of highly similar flow vector groups in a spatial locality, have been shown to be very effective in extracting dominant motion behaviors in video sequences. Inspired by applications and properties of motion patterns, we have designed a framework that successfully solves the general task of trajectory clustering. Our proposed algorithm consists of four phases: flow vector computation, motion component extraction, motion component's reachability set creation, and motion pattern formation. For the first phase, we break down trajectories into flow vectors that indicate instantaneous movements. In the second phase, via a Kmeans clustering approach, we create motion components by clustering the flow vectors with respect to their location and velocity. Next, we create motion components' reachability set in terms of spatial proximity and motion similarity. Finally, for the fourth phase, we cluster motion components using agglomerative clustering with the weighted Jaccard distance between the motion components' signatures, a set created using path reachability. We have evaluated the effectiveness of our proposed method in an extensive set of experiments on diverse datasets. Further, we have shown how our proposed method handles difficulties in the general task of trajectory clustering that challenge the existing state-of-the-art methods.
[ { "version": "v1", "created": "Sun, 4 Jan 2015 00:07:00 GMT" } ]
2015-01-06T00:00:00
[ [ "Kalayeh", "Mahdi M.", "" ], [ "Mussmann", "Stephen", "" ], [ "Petrakova", "Alla", "" ], [ "Lobo", "Niels da Vitoria", "" ], [ "Shah", "Mubarak", "" ] ]
TITLE: Understanding Trajectory Behavior: A Motion Pattern Approach ABSTRACT: Mining the underlying patterns in gigantic and complex data is of great importance to data analysts. In this paper, we propose a motion pattern approach to mine frequent behaviors in trajectory data. Motion patterns, defined by a set of highly similar flow vector groups in a spatial locality, have been shown to be very effective in extracting dominant motion behaviors in video sequences. Inspired by applications and properties of motion patterns, we have designed a framework that successfully solves the general task of trajectory clustering. Our proposed algorithm consists of four phases: flow vector computation, motion component extraction, motion component's reachability set creation, and motion pattern formation. For the first phase, we break down trajectories into flow vectors that indicate instantaneous movements. In the second phase, via a Kmeans clustering approach, we create motion components by clustering the flow vectors with respect to their location and velocity. Next, we create motion components' reachability set in terms of spatial proximity and motion similarity. Finally, for the fourth phase, we cluster motion components using agglomerative clustering with the weighted Jaccard distance between the motion components' signatures, a set created using path reachability. We have evaluated the effectiveness of our proposed method in an extensive set of experiments on diverse datasets. Further, we have shown how our proposed method handles difficulties in the general task of trajectory clustering that challenge the existing state-of-the-art methods.
no_new_dataset
0.71027
1501.00742
Mohammad Javad Dousti
Mohammad Javad Dousti and Massoud Pedram
LEQA: Latency Estimation for a Quantum Algorithm Mapped to a Quantum Circuit Fabric
null
null
null
null
quant-ph cs.ET
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents LEQA, a fast latency estimation tool for evaluating the performance of a quantum algorithm mapped to a quantum fabric. The actual quantum algorithm latency can be computed by performing detailed scheduling, placement and routing of the quantum instructions and qubits in a quantum operation dependency graph on a quantum circuit fabric. This is, however, a very expensive proposition that requires large amounts of processing time. Instead, LEQA, which is based on computing the neighborhood population counts of qubits, can produce estimates of the circuit latency with good accuracy (i.e., an average of less than 3% error) with up to two orders of magnitude speedup for mid-size benchmarks. This speedup is expected to increase superlinearly as a function of circuit size (operation count).
[ { "version": "v1", "created": "Mon, 5 Jan 2015 01:13:06 GMT" } ]
2015-01-06T00:00:00
[ [ "Dousti", "Mohammad Javad", "" ], [ "Pedram", "Massoud", "" ] ]
TITLE: LEQA: Latency Estimation for a Quantum Algorithm Mapped to a Quantum Circuit Fabric ABSTRACT: This paper presents LEQA, a fast latency estimation tool for evaluating the performance of a quantum algorithm mapped to a quantum fabric. The actual quantum algorithm latency can be computed by performing detailed scheduling, placement and routing of the quantum instructions and qubits in a quantum operation dependency graph on a quantum circuit fabric. This is, however, a very expensive proposition that requires large amounts of processing time. Instead, LEQA, which is based on computing the neighborhood population counts of qubits, can produce estimates of the circuit latency with good accuracy (i.e., an average of less than 3% error) with up to two orders of magnitude speedup for mid-size benchmarks. This speedup is expected to increase superlinearly as a function of circuit size (operation count).
no_new_dataset
0.712238
1501.00825
Jianfeng Wang
Jianfeng Wang, Shuicheng Yan, Yi Yang, Mohan S Kankanhalli, Shipeng Li, Jingdong Wang
Group $K$-Means
The developed algorithm is similar with "Christopher F. Barnes, A new multiple path search technique for residual vector quantizers, 1994", but we conduct the research independently and apply it in data/feature compression and image retrieval
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study how to learn multiple dictionaries from a dataset, and approximate any data point by the sum of the codewords each chosen from the corresponding dictionary. Although theoretically low approximation errors can be achieved by the global solution, an effective solution has not been well studied in practice. To solve the problem, we propose a simple yet effective algorithm \textit{Group $K$-Means}. Specifically, we take each dictionary, or any two selected dictionaries, as a group of $K$-means cluster centers, and then deal with the approximation issue by minimizing the approximation errors. Besides, we propose a hierarchical initialization for such a non-convex problem. Experimental results well validate the effectiveness of the approach.
[ { "version": "v1", "created": "Mon, 5 Jan 2015 11:43:26 GMT" } ]
2015-01-06T00:00:00
[ [ "Wang", "Jianfeng", "" ], [ "Yan", "Shuicheng", "" ], [ "Yang", "Yi", "" ], [ "Kankanhalli", "Mohan S", "" ], [ "Li", "Shipeng", "" ], [ "Wang", "Jingdong", "" ] ]
TITLE: Group $K$-Means ABSTRACT: We study how to learn multiple dictionaries from a dataset, and approximate any data point by the sum of the codewords each chosen from the corresponding dictionary. Although theoretically low approximation errors can be achieved by the global solution, an effective solution has not been well studied in practice. To solve the problem, we propose a simple yet effective algorithm \textit{Group $K$-Means}. Specifically, we take each dictionary, or any two selected dictionaries, as a group of $K$-means cluster centers, and then deal with the approximation issue by minimizing the approximation errors. Besides, we propose a hierarchical initialization for such a non-convex problem. Experimental results well validate the effectiveness of the approach.
no_new_dataset
0.707411
1412.8412
Mohammed Tuhin
Mohammad Alaggan, S\'ebastien Gambs, Stan Matwin, Eriko Souza, and Mohammed Tuhin
Sanitization of Call Detail Records via Differentially-private Summaries
Withdrawn due to some possible agreement issues
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this work, we initiate the study of human mobility from sanitized call detail records (CDRs). Such data can be extremely valuable to solve important societal issues such as the improvement of urban transportation or the understanding on the spread of diseases. One of the fundamental building block for such study is the computation of mobility patterns summarizing how individuals move during a given period from one area e.g., cellular tower or administrative district) to another. However, such knowledge cannot be published directly as it has been demonstrated that the access to this type of data enable the (re-)identification of individuals. To answer this issue and to foster the development of such applications in a privacy-preserving manner, we propose in this paper a novel approach in which CDRs are summarized under the form of a differentially-private Bloom filter for the purpose of privately counting the number of mobile service users moving from one area (region) to another in a given time frame. Our sanitization method is both time and space efficient, and ensures differential privacy while solving the shortcomings of a solution recently proposed to this problem. We also report on experiments conducted with the proposed solution using a real life CDRs dataset. The results obtained show that our method achieves - in most cases - a performance similar to another method (linear counting sketch) that does not provide any privacy guarantees. Thus, we conclude that our method maintains a high utility while providing strong privacy guarantees.
[ { "version": "v1", "created": "Mon, 29 Dec 2014 18:28:12 GMT" }, { "version": "v2", "created": "Wed, 31 Dec 2014 15:22:04 GMT" } ]
2015-01-05T00:00:00
[ [ "Alaggan", "Mohammad", "" ], [ "Gambs", "Sébastien", "" ], [ "Matwin", "Stan", "" ], [ "Souza", "Eriko", "" ], [ "Tuhin", "Mohammed", "" ] ]
TITLE: Sanitization of Call Detail Records via Differentially-private Summaries ABSTRACT: In this work, we initiate the study of human mobility from sanitized call detail records (CDRs). Such data can be extremely valuable to solve important societal issues such as the improvement of urban transportation or the understanding on the spread of diseases. One of the fundamental building block for such study is the computation of mobility patterns summarizing how individuals move during a given period from one area e.g., cellular tower or administrative district) to another. However, such knowledge cannot be published directly as it has been demonstrated that the access to this type of data enable the (re-)identification of individuals. To answer this issue and to foster the development of such applications in a privacy-preserving manner, we propose in this paper a novel approach in which CDRs are summarized under the form of a differentially-private Bloom filter for the purpose of privately counting the number of mobile service users moving from one area (region) to another in a given time frame. Our sanitization method is both time and space efficient, and ensures differential privacy while solving the shortcomings of a solution recently proposed to this problem. We also report on experiments conducted with the proposed solution using a real life CDRs dataset. The results obtained show that our method achieves - in most cases - a performance similar to another method (linear counting sketch) that does not provide any privacy guarantees. Thus, we conclude that our method maintains a high utility while providing strong privacy guarantees.
no_new_dataset
0.701342
1501.00255
Florin Rusu
Chengjie Qin and Florin Rusu
Speculative Approximations for Terascale Analytics
null
null
null
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Model calibration is a major challenge faced by the plethora of statistical analytics packages that are increasingly used in Big Data applications. Identifying the optimal model parameters is a time-consuming process that has to be executed from scratch for every dataset/model combination even by experienced data scientists. We argue that the incapacity to evaluate multiple parameter configurations simultaneously and the lack of support to quickly identify sub-optimal configurations are the principal causes. In this paper, we develop two database-inspired techniques for efficient model calibration. Speculative parameter testing applies advanced parallel multi-query processing methods to evaluate several configurations concurrently. The number of configurations is determined adaptively at runtime, while the configurations themselves are extracted from a distribution that is continuously learned following a Bayesian process. Online aggregation is applied to identify sub-optimal configurations early in the processing by incrementally sampling the training dataset and estimating the objective function corresponding to each configuration. We design concurrent online aggregation estimators and define halting conditions to accurately and timely stop the execution. We apply the proposed techniques to distributed gradient descent optimization -- batch and incremental -- for support vector machines and logistic regression models. We implement the resulting solutions in GLADE PF-OLA -- a state-of-the-art Big Data analytics system -- and evaluate their performance over terascale-size synthetic and real datasets. The results confirm that as many as 32 configurations can be evaluated concurrently almost as fast as one, while sub-optimal configurations are detected accurately in as little as a $1/20^{\text{th}}$ fraction of the time.
[ { "version": "v1", "created": "Thu, 1 Jan 2015 07:07:44 GMT" } ]
2015-01-05T00:00:00
[ [ "Qin", "Chengjie", "" ], [ "Rusu", "Florin", "" ] ]
TITLE: Speculative Approximations for Terascale Analytics ABSTRACT: Model calibration is a major challenge faced by the plethora of statistical analytics packages that are increasingly used in Big Data applications. Identifying the optimal model parameters is a time-consuming process that has to be executed from scratch for every dataset/model combination even by experienced data scientists. We argue that the incapacity to evaluate multiple parameter configurations simultaneously and the lack of support to quickly identify sub-optimal configurations are the principal causes. In this paper, we develop two database-inspired techniques for efficient model calibration. Speculative parameter testing applies advanced parallel multi-query processing methods to evaluate several configurations concurrently. The number of configurations is determined adaptively at runtime, while the configurations themselves are extracted from a distribution that is continuously learned following a Bayesian process. Online aggregation is applied to identify sub-optimal configurations early in the processing by incrementally sampling the training dataset and estimating the objective function corresponding to each configuration. We design concurrent online aggregation estimators and define halting conditions to accurately and timely stop the execution. We apply the proposed techniques to distributed gradient descent optimization -- batch and incremental -- for support vector machines and logistic regression models. We implement the resulting solutions in GLADE PF-OLA -- a state-of-the-art Big Data analytics system -- and evaluate their performance over terascale-size synthetic and real datasets. The results confirm that as many as 32 configurations can be evaluated concurrently almost as fast as one, while sub-optimal configurations are detected accurately in as little as a $1/20^{\text{th}}$ fraction of the time.
no_new_dataset
0.710025
1501.00436
Sebasti\'an Basterrech
Sebasti\'an Basterrech and Enrique Alba and V\'aclav Sn\'a\v{s}el
An Experimental Analysis of the Echo State Network Initialization Using the Particle Swarm Optimization
IEEE Sixth World Congress on Nature and Biologically Inspired Computing (NaBIC2014), Porto, Portugal, July 30-August 1, 2014
null
null
null
cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This article introduces a robust hybrid method for solving supervised learning tasks, which uses the Echo State Network (ESN) model and the Particle Swarm Optimization (PSO) algorithm. An ESN is a Recurrent Neural Network with the hidden-hidden weights fixed in the learning process. The recurrent part of the network stores the input information in internal states of the network. Another structure forms a free-memory method used as supervised learning tool. The setting procedure for initializing the recurrent structure of the ESN model can impact on the model performance. On the other hand, the PSO has been shown to be a successful technique for finding optimal points in complex spaces. Here, we present an approach to use the PSO for finding some initial hidden-hidden weights of the ESN model. We present empirical results that compare the canonical ESN model with this hybrid method on a wide range of benchmark problems.
[ { "version": "v1", "created": "Fri, 2 Jan 2015 16:49:29 GMT" } ]
2015-01-05T00:00:00
[ [ "Basterrech", "Sebastián", "" ], [ "Alba", "Enrique", "" ], [ "Snášel", "Václav", "" ] ]
TITLE: An Experimental Analysis of the Echo State Network Initialization Using the Particle Swarm Optimization ABSTRACT: This article introduces a robust hybrid method for solving supervised learning tasks, which uses the Echo State Network (ESN) model and the Particle Swarm Optimization (PSO) algorithm. An ESN is a Recurrent Neural Network with the hidden-hidden weights fixed in the learning process. The recurrent part of the network stores the input information in internal states of the network. Another structure forms a free-memory method used as supervised learning tool. The setting procedure for initializing the recurrent structure of the ESN model can impact on the model performance. On the other hand, the PSO has been shown to be a successful technique for finding optimal points in complex spaces. Here, we present an approach to use the PSO for finding some initial hidden-hidden weights of the ESN model. We present empirical results that compare the canonical ESN model with this hybrid method on a wide range of benchmark problems.
no_new_dataset
0.710434
1407.6251
Philip Lenz
Philip Lenz, Andreas Geiger, Raquel Urtasun
FollowMe: Efficient Online Min-Cost Flow Tracking with Bounded Memory and Computation
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
One of the most popular approaches to multi-target tracking is tracking-by-detection. Current min-cost flow algorithms which solve the data association problem optimally have three main drawbacks: they are computationally expensive, they assume that the whole video is given as a batch, and they scale badly in memory and computation with the length of the video sequence. In this paper, we address each of these issues, resulting in a computationally and memory-bounded solution. First, we introduce a dynamic version of the successive shortest-path algorithm which solves the data association problem optimally while reusing computation, resulting in significantly faster inference than standard solvers. Second, we address the optimal solution to the data association problem when dealing with an incoming stream of data (i.e., online setting). Finally, we present our main contribution which is an approximate online solution with bounded memory and computation which is capable of handling videos of arbitrarily length while performing tracking in real time. We demonstrate the effectiveness of our algorithms on the KITTI and PETS2009 benchmarks and show state-of-the-art performance, while being significantly faster than existing solvers.
[ { "version": "v1", "created": "Wed, 23 Jul 2014 15:07:12 GMT" }, { "version": "v2", "created": "Thu, 25 Dec 2014 14:15:01 GMT" } ]
2014-12-30T00:00:00
[ [ "Lenz", "Philip", "" ], [ "Geiger", "Andreas", "" ], [ "Urtasun", "Raquel", "" ] ]
TITLE: FollowMe: Efficient Online Min-Cost Flow Tracking with Bounded Memory and Computation ABSTRACT: One of the most popular approaches to multi-target tracking is tracking-by-detection. Current min-cost flow algorithms which solve the data association problem optimally have three main drawbacks: they are computationally expensive, they assume that the whole video is given as a batch, and they scale badly in memory and computation with the length of the video sequence. In this paper, we address each of these issues, resulting in a computationally and memory-bounded solution. First, we introduce a dynamic version of the successive shortest-path algorithm which solves the data association problem optimally while reusing computation, resulting in significantly faster inference than standard solvers. Second, we address the optimal solution to the data association problem when dealing with an incoming stream of data (i.e., online setting). Finally, we present our main contribution which is an approximate online solution with bounded memory and computation which is capable of handling videos of arbitrarily length while performing tracking in real time. We demonstrate the effectiveness of our algorithms on the KITTI and PETS2009 benchmarks and show state-of-the-art performance, while being significantly faster than existing solvers.
no_new_dataset
0.709044
1412.7242
Chengyao Shen
Chengyao Shen, Xun Huang and Qi Zhao
Learning of Proto-object Representations via Fixations on Low Resolution
This paper has been withdrawn by the author due to incompletion of the submission
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
While previous researches in eye fixation prediction typically rely on integrating low-level features (e.g. color, edge) to form a saliency map, recently it has been found that the structural organization of these features into a proto-object representation can play a more significant role. In this work, we present a computational framework based on deep network to demonstrate that proto-object representations can be learned from low-resolution image patches from fixation regions. We advocate the use of low-resolution inputs in this work due to the following reasons: (1) Proto-objects are computed in parallel over an entire visual field (2) People can perceive or recognize objects well even it is in low resolution. (3) Fixations from lower resolution images can predict fixations on higher resolution images. In the proposed computational model, we extract multi-scale image patches on fixation regions from eye fixation datasets, resize them to low resolution and feed them into a hierarchical. With layer-wise unsupervised feature learning, we find that many proto-objects like features responsive to different shapes of object blobs are learned out. Visualizations also show that these features are selective to potential objects in the scene and the responses of these features work well in predicting eye fixations on the images when combined with learned weights.
[ { "version": "v1", "created": "Tue, 23 Dec 2014 03:14:21 GMT" }, { "version": "v2", "created": "Sat, 27 Dec 2014 08:29:00 GMT" } ]
2014-12-30T00:00:00
[ [ "Shen", "Chengyao", "" ], [ "Huang", "Xun", "" ], [ "Zhao", "Qi", "" ] ]
TITLE: Learning of Proto-object Representations via Fixations on Low Resolution ABSTRACT: While previous researches in eye fixation prediction typically rely on integrating low-level features (e.g. color, edge) to form a saliency map, recently it has been found that the structural organization of these features into a proto-object representation can play a more significant role. In this work, we present a computational framework based on deep network to demonstrate that proto-object representations can be learned from low-resolution image patches from fixation regions. We advocate the use of low-resolution inputs in this work due to the following reasons: (1) Proto-objects are computed in parallel over an entire visual field (2) People can perceive or recognize objects well even it is in low resolution. (3) Fixations from lower resolution images can predict fixations on higher resolution images. In the proposed computational model, we extract multi-scale image patches on fixation regions from eye fixation datasets, resize them to low resolution and feed them into a hierarchical. With layer-wise unsupervised feature learning, we find that many proto-objects like features responsive to different shapes of object blobs are learned out. Visualizations also show that these features are selective to potential objects in the scene and the responses of these features work well in predicting eye fixations on the images when combined with learned weights.
no_new_dataset
0.711782
1412.7782
Roshan Ragel
MAC Jiffriya, MAC Akmal Jahan, and Roshan G. Ragel
Plagiarism Detection on Electronic Text based Assignments using Vector Space Model (ICIAfS14)
appears in The 7th International Conference on Information and Automation for Sustainability (ICIAfS) 2014
null
null
null
cs.IR cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Plagiarism is known as illegal use of others' part of work or whole work as one's own in any field such as art, poetry, literature, cinema, research and other creative forms of study. Plagiarism is one of the important issues in academic and research fields and giving more concern in academic systems. The situation is even worse with the availability of ample resources on the web. This paper focuses on an effective plagiarism detection tool on identifying suitable intra-corpal plagiarism detection for text based assignments by comparing unigram, bigram, trigram of vector space model with cosine similarity measure. Manually evaluated, labelled dataset was tested using unigram, bigram and trigram vector. Even though trigram vector consumes comparatively more time, it shows better results with the labelled data. In addition, the selected trigram vector space model with cosine similarity measure is compared with tri-gram sequence matching technique with Jaccard measure. In the results, cosine similarity score shows slightly higher values than the other. Because, it focuses on giving more weight for terms that do not frequently exist in the dataset and cosine similarity measure using trigram technique is more preferable than the other. Therefore, we present our new tool and it could be used as an effective tool to evaluate text based electronic assignments and minimize the plagiarism among students.
[ { "version": "v1", "created": "Thu, 25 Dec 2014 03:54:01 GMT" } ]
2014-12-30T00:00:00
[ [ "Jiffriya", "MAC", "" ], [ "Jahan", "MAC Akmal", "" ], [ "Ragel", "Roshan G.", "" ] ]
TITLE: Plagiarism Detection on Electronic Text based Assignments using Vector Space Model (ICIAfS14) ABSTRACT: Plagiarism is known as illegal use of others' part of work or whole work as one's own in any field such as art, poetry, literature, cinema, research and other creative forms of study. Plagiarism is one of the important issues in academic and research fields and giving more concern in academic systems. The situation is even worse with the availability of ample resources on the web. This paper focuses on an effective plagiarism detection tool on identifying suitable intra-corpal plagiarism detection for text based assignments by comparing unigram, bigram, trigram of vector space model with cosine similarity measure. Manually evaluated, labelled dataset was tested using unigram, bigram and trigram vector. Even though trigram vector consumes comparatively more time, it shows better results with the labelled data. In addition, the selected trigram vector space model with cosine similarity measure is compared with tri-gram sequence matching technique with Jaccard measure. In the results, cosine similarity score shows slightly higher values than the other. Because, it focuses on giving more weight for terms that do not frequently exist in the dataset and cosine similarity measure using trigram technique is more preferable than the other. Therefore, we present our new tool and it could be used as an effective tool to evaluate text based electronic assignments and minimize the plagiarism among students.
no_new_dataset
0.710176
1412.7789
Roshan Ragel
Vajira Thambawita, Roshan Ragel and Dhammika Elkaduwe
To Use or Not to Use: Graphics Processing Units for Pattern Matching Algorithms
appears in The 7th International Conference on Information and Automation for Sustainability (ICIAfS) 2014
null
null
null
cs.DC cs.PF
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
String matching is an important part in today's computer applications and Aho-Corasick algorithm is one of the main string matching algorithms used to accomplish this. This paper discusses that when can the GPUs be used for string matching applications using the Aho-Corasick algorithm as a benchmark. We have to identify the best unit to run our string matching algorithm according to the performance of our devices and the applications. Sometimes CPU gives better performance than GPU and sometimes GPU gives better performance than CPU. Therefore, identifying this critical point is significant task for researchers who are using GPUs to improve the performance of their string matching applications based on string matching algorithms.
[ { "version": "v1", "created": "Thu, 25 Dec 2014 05:27:49 GMT" } ]
2014-12-30T00:00:00
[ [ "Thambawita", "Vajira", "" ], [ "Ragel", "Roshan", "" ], [ "Elkaduwe", "Dhammika", "" ] ]
TITLE: To Use or Not to Use: Graphics Processing Units for Pattern Matching Algorithms ABSTRACT: String matching is an important part in today's computer applications and Aho-Corasick algorithm is one of the main string matching algorithms used to accomplish this. This paper discusses that when can the GPUs be used for string matching applications using the Aho-Corasick algorithm as a benchmark. We have to identify the best unit to run our string matching algorithm according to the performance of our devices and the applications. Sometimes CPU gives better performance than GPU and sometimes GPU gives better performance than CPU. Therefore, identifying this critical point is significant task for researchers who are using GPUs to improve the performance of their string matching applications based on string matching algorithms.
no_new_dataset
0.711825
1412.7851
Odemir Bruno PhD
Jo\~ao Batista Florindo and Odemir Martinez Bruno
Fractal descriptors based on the probability dimension: a texture analysis and classification approach
7 pages, 6 figures. arXiv admin note: text overlap with arXiv:1205.2821
Pattern Recognition Letters, Volume 42, Pages 107-114, 2014
10.1016/j.patrec.2014.01.009
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this work, we propose a novel technique for obtaining descriptors of gray-level texture images. The descriptors are provided by applying a multiscale transform to the fractal dimension of the image estimated through the probability (Voss) method. The effectiveness of the descriptors is verified in a classification task using benchmark over texture datasets. The results obtained demonstrate the efficiency of the proposed method as a tool for the description and discrimination of texture images.
[ { "version": "v1", "created": "Thu, 25 Dec 2014 18:50:31 GMT" } ]
2014-12-30T00:00:00
[ [ "Florindo", "João Batista", "" ], [ "Bruno", "Odemir Martinez", "" ] ]
TITLE: Fractal descriptors based on the probability dimension: a texture analysis and classification approach ABSTRACT: In this work, we propose a novel technique for obtaining descriptors of gray-level texture images. The descriptors are provided by applying a multiscale transform to the fractal dimension of the image estimated through the probability (Voss) method. The effectiveness of the descriptors is verified in a classification task using benchmark over texture datasets. The results obtained demonstrate the efficiency of the proposed method as a tool for the description and discrimination of texture images.
no_new_dataset
0.712063
1412.7880
Odemir Bruno PhD
Marcos W. S. Oliveira and Dalcimar Casanova and Jo\~ao B. Florindo and Odemir Martinez Bruno
Enhancing fractal descriptors on images by combining boundary and interior of Minkowski dilation
6 pages 3 figures
Physica A, Volume 416, Pages 41-48, 2014
10.1016/j.physa.2014.07.074
null
physics.data-an cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This work proposes to obtain novel fractal descriptors from gray-level texture images by combining information from interior and boundary measures of the Minkowski dilation applied to the texture surface. At first, the image is converted into a surface where the height of each point is the gray intensity of the respective pixel in that position in the image. Thus, this surface is morphologically dilated by spheres. The radius of such spheres is ranged within an interval and the volume and the external area of the dilated structure are computed for each radius. The final descriptors are given by such measures concatenated and subject to a canonical transform to reduce the dimensionality. The proposal is an enhancement to the classical Bouligand-Minkowski fractal descriptors, where only the volume (interior) information is considered. As different structures may have the same volume, but not the same area, the proposal yields to more rich descriptors as confirmed by results on the classification of benchmark databases.
[ { "version": "v1", "created": "Fri, 26 Dec 2014 02:13:04 GMT" } ]
2014-12-30T00:00:00
[ [ "Oliveira", "Marcos W. S.", "" ], [ "Casanova", "Dalcimar", "" ], [ "Florindo", "João B.", "" ], [ "Bruno", "Odemir Martinez", "" ] ]
TITLE: Enhancing fractal descriptors on images by combining boundary and interior of Minkowski dilation ABSTRACT: This work proposes to obtain novel fractal descriptors from gray-level texture images by combining information from interior and boundary measures of the Minkowski dilation applied to the texture surface. At first, the image is converted into a surface where the height of each point is the gray intensity of the respective pixel in that position in the image. Thus, this surface is morphologically dilated by spheres. The radius of such spheres is ranged within an interval and the volume and the external area of the dilated structure are computed for each radius. The final descriptors are given by such measures concatenated and subject to a canonical transform to reduce the dimensionality. The proposal is an enhancement to the classical Bouligand-Minkowski fractal descriptors, where only the volume (interior) information is considered. As different structures may have the same volume, but not the same area, the proposal yields to more rich descriptors as confirmed by results on the classification of benchmark databases.
no_new_dataset
0.712988
1412.7963
Odemir Bruno PhD
Jo\~ao B. Florindo, Odemir M. Bruno
Texture analysis by multi-resolution fractal descriptors
8 pages, 6 figures
Expert Systems with Applications, Volume 40, Issue 10, Pages 4022-4028, 2013
10.1016/j.eswa.2013.01.007
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This work proposes a texture descriptor based on fractal theory. The method is based on the Bouligand-Minkowski descriptors. We decompose the original image recursively into 4 equal parts. In each recursion step, we estimate the average and the deviation of the Bouligand-Minkowski descriptors computed over each part. Thus, we extract entropy features from both average and deviation. The proposed descriptors are provided by the concatenation of such measures. The method is tested in a classification experiment under well known datasets, that is, Brodatz and Vistex. The results demonstrate that the proposed technique achieves better results than classical and state-of-the-art texture descriptors, such as Gabor-wavelets and co-occurrence matrix.
[ { "version": "v1", "created": "Fri, 26 Dec 2014 17:45:41 GMT" } ]
2014-12-30T00:00:00
[ [ "Florindo", "João B.", "" ], [ "Bruno", "Odemir M.", "" ] ]
TITLE: Texture analysis by multi-resolution fractal descriptors ABSTRACT: This work proposes a texture descriptor based on fractal theory. The method is based on the Bouligand-Minkowski descriptors. We decompose the original image recursively into 4 equal parts. In each recursion step, we estimate the average and the deviation of the Bouligand-Minkowski descriptors computed over each part. Thus, we extract entropy features from both average and deviation. The proposed descriptors are provided by the concatenation of such measures. The method is tested in a classification experiment under well known datasets, that is, Brodatz and Vistex. The results demonstrate that the proposed technique achieves better results than classical and state-of-the-art texture descriptors, such as Gabor-wavelets and co-occurrence matrix.
no_new_dataset
0.709831
1412.7990
Ernesto Diaz-Aviles
Ernesto Diaz-Aviles, Hoang Thanh Lam, Fabio Pinelli, Stefano Braghin, Yiannis Gkoufas, Michele Berlingerio, and Francesco Calabrese
Predicting User Engagement in Twitter with Collaborative Ranking
RecSysChallenge'14 at RecSys 2014, October 10, 2014, Foster City, CA, USA
In Proceedings of the 2014 Recommender Systems Challenge (RecSysChallenge'14). ACM, New York, NY, USA, , Pages 41 , 6 pages
10.1145/2668067.2668072
null
cs.IR cs.CY cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Collaborative Filtering (CF) is a core component of popular web-based services such as Amazon, YouTube, Netflix, and Twitter. Most applications use CF to recommend a small set of items to the user. For instance, YouTube presents to a user a list of top-n videos she would likely watch next based on her rating and viewing history. Current methods of CF evaluation have been focused on assessing the quality of a predicted rating or the ranking performance for top-n recommended items. However, restricting the recommender system evaluation to these two aspects is rather limiting and neglects other dimensions that could better characterize a well-perceived recommendation. In this paper, instead of optimizing rating or top-n recommendation, we focus on the task of predicting which items generate the highest user engagement. In particular, we use Twitter as our testbed and cast the problem as a Collaborative Ranking task where the rich features extracted from the metadata of the tweets help to complement the transaction information limited to user ids, item ids, ratings and timestamps. We learn a scoring function that directly optimizes the user engagement in terms of nDCG@10 on the predicted ranking. Experiments conducted on an extended version of the MovieTweetings dataset, released as part of the RecSys Challenge 2014, show the effectiveness of our approach.
[ { "version": "v1", "created": "Fri, 26 Dec 2014 21:00:14 GMT" } ]
2014-12-30T00:00:00
[ [ "Diaz-Aviles", "Ernesto", "" ], [ "Lam", "Hoang Thanh", "" ], [ "Pinelli", "Fabio", "" ], [ "Braghin", "Stefano", "" ], [ "Gkoufas", "Yiannis", "" ], [ "Berlingerio", "Michele", "" ], [ "Calabrese", "Francesco", "" ] ]
TITLE: Predicting User Engagement in Twitter with Collaborative Ranking ABSTRACT: Collaborative Filtering (CF) is a core component of popular web-based services such as Amazon, YouTube, Netflix, and Twitter. Most applications use CF to recommend a small set of items to the user. For instance, YouTube presents to a user a list of top-n videos she would likely watch next based on her rating and viewing history. Current methods of CF evaluation have been focused on assessing the quality of a predicted rating or the ranking performance for top-n recommended items. However, restricting the recommender system evaluation to these two aspects is rather limiting and neglects other dimensions that could better characterize a well-perceived recommendation. In this paper, instead of optimizing rating or top-n recommendation, we focus on the task of predicting which items generate the highest user engagement. In particular, we use Twitter as our testbed and cast the problem as a Collaborative Ranking task where the rich features extracted from the metadata of the tweets help to complement the transaction information limited to user ids, item ids, ratings and timestamps. We learn a scoring function that directly optimizes the user engagement in terms of nDCG@10 on the predicted ranking. Experiments conducted on an extended version of the MovieTweetings dataset, released as part of the RecSys Challenge 2014, show the effectiveness of our approach.
no_new_dataset
0.710785
1412.8070
Artiom Kovnatsky Artiom Kovnatsky
Artiom Kovnatsky, Michael M. Bronstein, Xavier Bresson, Pierre Vandergheynst
Functional correspondence by matrix completion
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we consider the problem of finding dense intrinsic correspondence between manifolds using the recently introduced functional framework. We pose the functional correspondence problem as matrix completion with manifold geometric structure and inducing functional localization with the $L_1$ norm. We discuss efficient numerical procedures for the solution of our problem. Our method compares favorably to the accuracy of state-of-the-art correspondence algorithms on non-rigid shape matching benchmarks, and is especially advantageous in settings when only scarce data is available.
[ { "version": "v1", "created": "Sat, 27 Dec 2014 17:53:06 GMT" } ]
2014-12-30T00:00:00
[ [ "Kovnatsky", "Artiom", "" ], [ "Bronstein", "Michael M.", "" ], [ "Bresson", "Xavier", "" ], [ "Vandergheynst", "Pierre", "" ] ]
TITLE: Functional correspondence by matrix completion ABSTRACT: In this paper, we consider the problem of finding dense intrinsic correspondence between manifolds using the recently introduced functional framework. We pose the functional correspondence problem as matrix completion with manifold geometric structure and inducing functional localization with the $L_1$ norm. We discuss efficient numerical procedures for the solution of our problem. Our method compares favorably to the accuracy of state-of-the-art correspondence algorithms on non-rigid shape matching benchmarks, and is especially advantageous in settings when only scarce data is available.
no_new_dataset
0.709636
1412.8099
Rathipriya R
R. Rathipriya, K. Thangavel
Extraction of Web Usage Profiles using Simulated Annealing Based Biclustering Approach
null
null
null
null
cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, the Simulated Annealing (SA) based biclustering approach is proposed in which SA is used as an optimization tool for biclustering of web usage data to identify the optimal user profile from the given web usage data. Extracted biclusters are consists of correlated users whose usage behaviors are similar across the subset of web pages of a web site where as these users are uncorrelated for remaining pages of a web site. These results are very useful in web personalization so that it communicates better with its users and for making customized prediction. Also useful for providing customized web service too. Experiment was conducted on the real web usage dataset called CTI dataset. Results show that proposed SA based biclustering approach can extract highly correlated user groups from the preprocessed web usage data.
[ { "version": "v1", "created": "Mon, 1 Dec 2014 10:06:25 GMT" } ]
2014-12-30T00:00:00
[ [ "Rathipriya", "R.", "" ], [ "Thangavel", "K.", "" ] ]
TITLE: Extraction of Web Usage Profiles using Simulated Annealing Based Biclustering Approach ABSTRACT: In this paper, the Simulated Annealing (SA) based biclustering approach is proposed in which SA is used as an optimization tool for biclustering of web usage data to identify the optimal user profile from the given web usage data. Extracted biclusters are consists of correlated users whose usage behaviors are similar across the subset of web pages of a web site where as these users are uncorrelated for remaining pages of a web site. These results are very useful in web personalization so that it communicates better with its users and for making customized prediction. Also useful for providing customized web service too. Experiment was conducted on the real web usage dataset called CTI dataset. Results show that proposed SA based biclustering approach can extract highly correlated user groups from the preprocessed web usage data.
no_new_dataset
0.706804
1412.8104
Natarajan Meghanathan
Natarajan Meghanathan
Performance Comparison of Minimum Hop vs. Minimum Edge Based Multicast Routing under Different Mobility Models for Mobile Ad hoc Networks
14 pages, 17 figures
International Journal of Wireless and Mobile Networks, 3(3):1-14, June 2011
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The high-level contribution of this paper is to establish benchmarks for the minimum hop count per source-receiver path and the minimum number of edges per tree for multicast routing in mobile ad hoc networks (MANETs) under different mobility models. In this pursuit, we explore the tradeoffs between these two routing strategies with respect to hop count, number of edges and lifetime per multicast tree with respect to the Random Waypoint, City Section and Manhattan mobility models. We employ the Breadth First Search algorithm and the Minimum Steiner Tree heuristic for determining a sequence of minimum hop and minimum edge trees respectively. While both the minimum hop and minimum edge trees exist for a relatively longer time under the Manhattan mobility model; the number of edges per tree and the hop count per source-receiver path are relatively low under the Random Waypoint model. For all the three mobility models, the minimum edge trees have a longer lifetime compared to the minimum hop trees and the difference in lifetime increases with increase in network density and/or the multicast group size. Multicast trees determined under the City Section model incur fewer edges and lower hop count compared to the Manhattan mobility model.
[ { "version": "v1", "created": "Sun, 7 Dec 2014 20:48:15 GMT" } ]
2014-12-30T00:00:00
[ [ "Meghanathan", "Natarajan", "" ] ]
TITLE: Performance Comparison of Minimum Hop vs. Minimum Edge Based Multicast Routing under Different Mobility Models for Mobile Ad hoc Networks ABSTRACT: The high-level contribution of this paper is to establish benchmarks for the minimum hop count per source-receiver path and the minimum number of edges per tree for multicast routing in mobile ad hoc networks (MANETs) under different mobility models. In this pursuit, we explore the tradeoffs between these two routing strategies with respect to hop count, number of edges and lifetime per multicast tree with respect to the Random Waypoint, City Section and Manhattan mobility models. We employ the Breadth First Search algorithm and the Minimum Steiner Tree heuristic for determining a sequence of minimum hop and minimum edge trees respectively. While both the minimum hop and minimum edge trees exist for a relatively longer time under the Manhattan mobility model; the number of edges per tree and the hop count per source-receiver path are relatively low under the Random Waypoint model. For all the three mobility models, the minimum edge trees have a longer lifetime compared to the minimum hop trees and the difference in lifetime increases with increase in network density and/or the multicast group size. Multicast trees determined under the City Section model incur fewer edges and lower hop count compared to the Manhattan mobility model.
no_new_dataset
0.713425
1412.8118
Lanbo Zhang
Lanbo Zhang and Yi Zhang
Hierarchical Bayesian Models with Factorization for Content-Based Recommendation
null
null
null
null
cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Most existing content-based filtering approaches learn user profiles independently without capturing the similarity among users. Bayesian hierarchical models \cite{Zhang:Efficient} learn user profiles jointly and have the advantage of being able to borrow discriminative information from other users through a Bayesian prior. However, the standard Bayesian hierarchical models assume all user profiles are generated from the same prior. Considering the diversity of user interests, this assumption could be improved by introducing more flexibility. Besides, most existing content-based filtering approaches implicitly assume that each user profile corresponds to exactly one user interest and fail to capture a user's multiple interests (information needs). In this paper, we present a flexible Bayesian hierarchical modeling approach to model both commonality and diversity among users as well as individual users' multiple interests. We propose two models each with different assumptions, and the proposed models are called Discriminative Factored Prior Models (DFPM). In our models, each user profile is modeled as a discriminative classifier with a factored model as its prior, and different factors contribute in different levels to each user profile. Compared with existing content-based filtering models, DFPM are interesting because they can 1) borrow discriminative criteria of other users while learning a particular user profile through the factored prior; 2) trade off well between diversity and commonality among users; and 3) handle the challenging classification situation where each class contains multiple concepts. The experimental results on a dataset collected from real users on digg.com show that our models significantly outperform the baseline models of L-2 regularized logistic regression and traditional Bayesian hierarchical model with logistic regression.
[ { "version": "v1", "created": "Sun, 28 Dec 2014 06:07:48 GMT" } ]
2014-12-30T00:00:00
[ [ "Zhang", "Lanbo", "" ], [ "Zhang", "Yi", "" ] ]
TITLE: Hierarchical Bayesian Models with Factorization for Content-Based Recommendation ABSTRACT: Most existing content-based filtering approaches learn user profiles independently without capturing the similarity among users. Bayesian hierarchical models \cite{Zhang:Efficient} learn user profiles jointly and have the advantage of being able to borrow discriminative information from other users through a Bayesian prior. However, the standard Bayesian hierarchical models assume all user profiles are generated from the same prior. Considering the diversity of user interests, this assumption could be improved by introducing more flexibility. Besides, most existing content-based filtering approaches implicitly assume that each user profile corresponds to exactly one user interest and fail to capture a user's multiple interests (information needs). In this paper, we present a flexible Bayesian hierarchical modeling approach to model both commonality and diversity among users as well as individual users' multiple interests. We propose two models each with different assumptions, and the proposed models are called Discriminative Factored Prior Models (DFPM). In our models, each user profile is modeled as a discriminative classifier with a factored model as its prior, and different factors contribute in different levels to each user profile. Compared with existing content-based filtering models, DFPM are interesting because they can 1) borrow discriminative criteria of other users while learning a particular user profile through the factored prior; 2) trade off well between diversity and commonality among users; and 3) handle the challenging classification situation where each class contains multiple concepts. The experimental results on a dataset collected from real users on digg.com show that our models significantly outperform the baseline models of L-2 regularized logistic regression and traditional Bayesian hierarchical model with logistic regression.
no_new_dataset
0.711281
1412.8120
Amlan Kusum
Amlan Kusum, Iulian Neamtiu and Rajiv Gupta
Adapting Graph Application Performance via Alternate Data Structure Representation
Part of ADAPT Workshop proceedings, 2015 (arXiv:1412.2347)
null
null
ADAPT/2015/03
cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Graph processing is used extensively in areas from social networking mining to web indexing. We demonstrate that the performance and dependability of such applications critically hinges on the graph data structure used, because a fixed, compile-time choice of data structure can lead to poor performance or applications unable to complete. To address this problem, we introduce an approach that helps programmers transform regular, off-the-shelf graph applications into adaptive, more dependable applications where adaptations are performed via runtime selection from alternate data structure representations. Using our approach, applications dynamically adapt to the input graph's characteristics and changes in available memory so they continue to run when faced with adverse conditions such as low memory. Experiments with graph algorithms on real-world (e.g., Wikipedia metadata, Gnutella topology) and synthetic graph datasets show that our adaptive applications run to completion with lower execution time and/or memory utilization in comparison to their non-adaptive versions.
[ { "version": "v1", "created": "Sun, 28 Dec 2014 06:49:23 GMT" } ]
2014-12-30T00:00:00
[ [ "Kusum", "Amlan", "" ], [ "Neamtiu", "Iulian", "" ], [ "Gupta", "Rajiv", "" ] ]
TITLE: Adapting Graph Application Performance via Alternate Data Structure Representation ABSTRACT: Graph processing is used extensively in areas from social networking mining to web indexing. We demonstrate that the performance and dependability of such applications critically hinges on the graph data structure used, because a fixed, compile-time choice of data structure can lead to poor performance or applications unable to complete. To address this problem, we introduce an approach that helps programmers transform regular, off-the-shelf graph applications into adaptive, more dependable applications where adaptations are performed via runtime selection from alternate data structure representations. Using our approach, applications dynamically adapt to the input graph's characteristics and changes in available memory so they continue to run when faced with adverse conditions such as low memory. Experiments with graph algorithms on real-world (e.g., Wikipedia metadata, Gnutella topology) and synthetic graph datasets show that our adaptive applications run to completion with lower execution time and/or memory utilization in comparison to their non-adaptive versions.
no_new_dataset
0.709799
1412.8341
Pavel H\'ala
Pavel H\'ala
Spectral classification using convolutional neural networks
71 pages, 50 figures, Master's thesis, Masaryk University
null
null
null
cs.CV astro-ph.IM cs.NE
http://creativecommons.org/licenses/by/3.0/
There is a great need for accurate and autonomous spectral classification methods in astrophysics. This thesis is about training a convolutional neural network (ConvNet) to recognize an object class (quasar, star or galaxy) from one-dimension spectra only. Author developed several scripts and C programs for datasets preparation, preprocessing and postprocessing of the data. EBLearn library (developed by Pierre Sermanet and Yann LeCun) was used to create ConvNets. Application on dataset of more than 60000 spectra yielded success rate of nearly 95%. This thesis conclusively proved great potential of convolutional neural networks and deep learning methods in astrophysics.
[ { "version": "v1", "created": "Mon, 29 Dec 2014 13:47:06 GMT" } ]
2014-12-30T00:00:00
[ [ "Hála", "Pavel", "" ] ]
TITLE: Spectral classification using convolutional neural networks ABSTRACT: There is a great need for accurate and autonomous spectral classification methods in astrophysics. This thesis is about training a convolutional neural network (ConvNet) to recognize an object class (quasar, star or galaxy) from one-dimension spectra only. Author developed several scripts and C programs for datasets preparation, preprocessing and postprocessing of the data. EBLearn library (developed by Pierre Sermanet and Yann LeCun) was used to create ConvNets. Application on dataset of more than 60000 spectra yielded success rate of nearly 95%. This thesis conclusively proved great potential of convolutional neural networks and deep learning methods in astrophysics.
no_new_dataset
0.712038
1412.7584
Zhanglong Ji
Zhanglong Ji, Zachary C. Lipton, Charles Elkan
Differential Privacy and Machine Learning: a Survey and Review
null
null
null
null
cs.LG cs.CR cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The objective of machine learning is to extract useful information from data, while privacy is preserved by concealing information. Thus it seems hard to reconcile these competing interests. However, they frequently must be balanced when mining sensitive data. For example, medical research represents an important application where it is necessary both to extract useful information and protect patient privacy. One way to resolve the conflict is to extract general characteristics of whole populations without disclosing the private information of individuals. In this paper, we consider differential privacy, one of the most popular and powerful definitions of privacy. We explore the interplay between machine learning and differential privacy, namely privacy-preserving machine learning algorithms and learning-based data release mechanisms. We also describe some theoretical results that address what can be learned differentially privately and upper bounds of loss functions for differentially private algorithms. Finally, we present some open questions, including how to incorporate public data, how to deal with missing data in private datasets, and whether, as the number of observed samples grows arbitrarily large, differentially private machine learning algorithms can be achieved at no cost to utility as compared to corresponding non-differentially private algorithms.
[ { "version": "v1", "created": "Wed, 24 Dec 2014 01:51:06 GMT" } ]
2014-12-25T00:00:00
[ [ "Ji", "Zhanglong", "" ], [ "Lipton", "Zachary C.", "" ], [ "Elkan", "Charles", "" ] ]
TITLE: Differential Privacy and Machine Learning: a Survey and Review ABSTRACT: The objective of machine learning is to extract useful information from data, while privacy is preserved by concealing information. Thus it seems hard to reconcile these competing interests. However, they frequently must be balanced when mining sensitive data. For example, medical research represents an important application where it is necessary both to extract useful information and protect patient privacy. One way to resolve the conflict is to extract general characteristics of whole populations without disclosing the private information of individuals. In this paper, we consider differential privacy, one of the most popular and powerful definitions of privacy. We explore the interplay between machine learning and differential privacy, namely privacy-preserving machine learning algorithms and learning-based data release mechanisms. We also describe some theoretical results that address what can be learned differentially privately and upper bounds of loss functions for differentially private algorithms. Finally, we present some open questions, including how to incorporate public data, how to deal with missing data in private datasets, and whether, as the number of observed samples grows arbitrarily large, differentially private machine learning algorithms can be achieved at no cost to utility as compared to corresponding non-differentially private algorithms.
no_new_dataset
0.707582
1412.6821
Roland Kwitt
Jan Reininghaus, Stefan Huber, Ulrich Bauer, Roland Kwitt
A Stable Multi-Scale Kernel for Topological Machine Learning
null
null
null
null
stat.ML cs.CV cs.LG math.AT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Topological data analysis offers a rich source of valuable information to study vision problems. Yet, so far we lack a theoretically sound connection to popular kernel-based learning techniques, such as kernel SVMs or kernel PCA. In this work, we establish such a connection by designing a multi-scale kernel for persistence diagrams, a stable summary representation of topological features in data. We show that this kernel is positive definite and prove its stability with respect to the 1-Wasserstein distance. Experiments on two benchmark datasets for 3D shape classification/retrieval and texture recognition show considerable performance gains of the proposed method compared to an alternative approach that is based on the recently introduced persistence landscapes.
[ { "version": "v1", "created": "Sun, 21 Dec 2014 19:17:08 GMT" } ]
2014-12-24T00:00:00
[ [ "Reininghaus", "Jan", "" ], [ "Huber", "Stefan", "" ], [ "Bauer", "Ulrich", "" ], [ "Kwitt", "Roland", "" ] ]
TITLE: A Stable Multi-Scale Kernel for Topological Machine Learning ABSTRACT: Topological data analysis offers a rich source of valuable information to study vision problems. Yet, so far we lack a theoretically sound connection to popular kernel-based learning techniques, such as kernel SVMs or kernel PCA. In this work, we establish such a connection by designing a multi-scale kernel for persistence diagrams, a stable summary representation of topological features in data. We show that this kernel is positive definite and prove its stability with respect to the 1-Wasserstein distance. Experiments on two benchmark datasets for 3D shape classification/retrieval and texture recognition show considerable performance gains of the proposed method compared to an alternative approach that is based on the recently introduced persistence landscapes.
no_new_dataset
0.709025
1209.3686
Barzan Mozafari
Barzan Mozafari, Purnamrita Sarkar, Michael J. Franklin, Michael I. Jordan, Samuel Madden
Active Learning for Crowd-Sourced Databases
A shorter version of this manuscript has been published in Proceedings of Very Large Data Bases 2015, entitled "Scaling Up Crowd-Sourcing to Very Large Datasets: A Case for Active Learning"
null
null
null
cs.LG cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Crowd-sourcing has become a popular means of acquiring labeled data for a wide variety of tasks where humans are more accurate than computers, e.g., labeling images, matching objects, or analyzing sentiment. However, relying solely on the crowd is often impractical even for data sets with thousands of items, due to time and cost constraints of acquiring human input (which cost pennies and minutes per label). In this paper, we propose algorithms for integrating machine learning into crowd-sourced databases, with the goal of allowing crowd-sourcing applications to scale, i.e., to handle larger datasets at lower costs. The key observation is that, in many of the above tasks, humans and machine learning algorithms can be complementary, as humans are often more accurate but slow and expensive, while algorithms are usually less accurate, but faster and cheaper. Based on this observation, we present two new active learning algorithms to combine humans and algorithms together in a crowd-sourced database. Our algorithms are based on the theory of non-parametric bootstrap, which makes our results applicable to a broad class of machine learning models. Our results, on three real-life datasets collected with Amazon's Mechanical Turk, and on 15 well-known UCI data sets, show that our methods on average ask humans to label one to two orders of magnitude fewer items to achieve the same accuracy as a baseline that labels random images, and two to eight times fewer questions than previous active learning schemes.
[ { "version": "v1", "created": "Mon, 17 Sep 2012 15:21:06 GMT" }, { "version": "v2", "created": "Mon, 3 Dec 2012 15:45:55 GMT" }, { "version": "v3", "created": "Thu, 13 Dec 2012 18:20:04 GMT" }, { "version": "v4", "created": "Sat, 20 Dec 2014 08:56:15 GMT" } ]
2014-12-23T00:00:00
[ [ "Mozafari", "Barzan", "" ], [ "Sarkar", "Purnamrita", "" ], [ "Franklin", "Michael J.", "" ], [ "Jordan", "Michael I.", "" ], [ "Madden", "Samuel", "" ] ]
TITLE: Active Learning for Crowd-Sourced Databases ABSTRACT: Crowd-sourcing has become a popular means of acquiring labeled data for a wide variety of tasks where humans are more accurate than computers, e.g., labeling images, matching objects, or analyzing sentiment. However, relying solely on the crowd is often impractical even for data sets with thousands of items, due to time and cost constraints of acquiring human input (which cost pennies and minutes per label). In this paper, we propose algorithms for integrating machine learning into crowd-sourced databases, with the goal of allowing crowd-sourcing applications to scale, i.e., to handle larger datasets at lower costs. The key observation is that, in many of the above tasks, humans and machine learning algorithms can be complementary, as humans are often more accurate but slow and expensive, while algorithms are usually less accurate, but faster and cheaper. Based on this observation, we present two new active learning algorithms to combine humans and algorithms together in a crowd-sourced database. Our algorithms are based on the theory of non-parametric bootstrap, which makes our results applicable to a broad class of machine learning models. Our results, on three real-life datasets collected with Amazon's Mechanical Turk, and on 15 well-known UCI data sets, show that our methods on average ask humans to label one to two orders of magnitude fewer items to achieve the same accuracy as a baseline that labels random images, and two to eight times fewer questions than previous active learning schemes.
no_new_dataset
0.711819
1304.5409
Carsten Gottschlich
Carsten Gottschlich and Stephan Huckemann
Separating the Real from the Synthetic: Minutiae Histograms as Fingerprints of Fingerprints
null
IET Biometrics, vol. 3, no. 4, pp. 291-301, Dec. 2014
10.1049/iet-bmt.2013.0065
null
cs.CV cs.AI cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this study we show that by the current state-of-the-art synthetically generated fingerprints can easily be discriminated from real fingerprints. We propose a method based on second order extended minutiae histograms (MHs) which can distinguish between real and synthetic prints with very high accuracy. MHs provide a fixed-length feature vector for a fingerprint which are invariant under rotation and translation. This 'test of realness' can be applied to synthetic fingerprints produced by any method. In this work, tests are conducted on the 12 publicly available databases of FVC2000, FVC2002 and FVC2004 which are well established benchmarks for evaluating the performance of fingerprint recognition algorithms; 3 of these 12 databases consist of artificial fingerprints generated by the SFinGe software. Additionally, we evaluate the discriminative performance on a database of synthetic fingerprints generated by the software of Bicz versus real fingerprint images. We conclude with suggestions for the improvement of synthetic fingerprint generation.
[ { "version": "v1", "created": "Fri, 19 Apr 2013 13:21:13 GMT" }, { "version": "v2", "created": "Thu, 30 Jan 2014 11:28:08 GMT" }, { "version": "v3", "created": "Wed, 15 Oct 2014 14:04:46 GMT" } ]
2014-12-23T00:00:00
[ [ "Gottschlich", "Carsten", "" ], [ "Huckemann", "Stephan", "" ] ]
TITLE: Separating the Real from the Synthetic: Minutiae Histograms as Fingerprints of Fingerprints ABSTRACT: In this study we show that by the current state-of-the-art synthetically generated fingerprints can easily be discriminated from real fingerprints. We propose a method based on second order extended minutiae histograms (MHs) which can distinguish between real and synthetic prints with very high accuracy. MHs provide a fixed-length feature vector for a fingerprint which are invariant under rotation and translation. This 'test of realness' can be applied to synthetic fingerprints produced by any method. In this work, tests are conducted on the 12 publicly available databases of FVC2000, FVC2002 and FVC2004 which are well established benchmarks for evaluating the performance of fingerprint recognition algorithms; 3 of these 12 databases consist of artificial fingerprints generated by the SFinGe software. Additionally, we evaluate the discriminative performance on a database of synthetic fingerprints generated by the software of Bicz versus real fingerprint images. We conclude with suggestions for the improvement of synthetic fingerprint generation.
no_new_dataset
0.707411
1404.3840
Chaochao Lu
Chaochao Lu, Xiaoou Tang
Surpassing Human-Level Face Verification Performance on LFW with GaussianFace
Appearing in Proceedings of the 29th AAAI Conference on Artificial Intelligence (AAAI-15), Oral Presentation
null
null
null
cs.CV cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Face verification remains a challenging problem in very complex conditions with large variations such as pose, illumination, expression, and occlusions. This problem is exacerbated when we rely unrealistically on a single training data source, which is often insufficient to cover the intrinsically complex face variations. This paper proposes a principled multi-task learning approach based on Discriminative Gaussian Process Latent Variable Model, named GaussianFace, to enrich the diversity of training data. In comparison to existing methods, our model exploits additional data from multiple source-domains to improve the generalization performance of face verification in an unknown target-domain. Importantly, our model can adapt automatically to complex data distributions, and therefore can well capture complex face variations inherent in multiple sources. Extensive experiments demonstrate the effectiveness of the proposed model in learning from diverse data sources and generalize to unseen domain. Specifically, the accuracy of our algorithm achieves an impressive accuracy rate of 98.52% on the well-known and challenging Labeled Faces in the Wild (LFW) benchmark. For the first time, the human-level performance in face verification (97.53%) on LFW is surpassed.
[ { "version": "v1", "created": "Tue, 15 Apr 2014 07:51:23 GMT" }, { "version": "v2", "created": "Mon, 16 Jun 2014 14:37:38 GMT" }, { "version": "v3", "created": "Sat, 20 Dec 2014 03:37:36 GMT" } ]
2014-12-23T00:00:00
[ [ "Lu", "Chaochao", "" ], [ "Tang", "Xiaoou", "" ] ]
TITLE: Surpassing Human-Level Face Verification Performance on LFW with GaussianFace ABSTRACT: Face verification remains a challenging problem in very complex conditions with large variations such as pose, illumination, expression, and occlusions. This problem is exacerbated when we rely unrealistically on a single training data source, which is often insufficient to cover the intrinsically complex face variations. This paper proposes a principled multi-task learning approach based on Discriminative Gaussian Process Latent Variable Model, named GaussianFace, to enrich the diversity of training data. In comparison to existing methods, our model exploits additional data from multiple source-domains to improve the generalization performance of face verification in an unknown target-domain. Importantly, our model can adapt automatically to complex data distributions, and therefore can well capture complex face variations inherent in multiple sources. Extensive experiments demonstrate the effectiveness of the proposed model in learning from diverse data sources and generalize to unseen domain. Specifically, the accuracy of our algorithm achieves an impressive accuracy rate of 98.52% on the well-known and challenging Labeled Faces in the Wild (LFW) benchmark. For the first time, the human-level performance in face verification (97.53%) on LFW is surpassed.
no_new_dataset
0.71081
1412.6570
Changchun Zhang
Robert C. Qiu
The Foundation of Big Data: Experiments, Formulation, and Applications
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The central theme of this talk is to promote the non-asymptotic statistical viewpoint in the context of massive datasets. The classical viewpoint breaks down when the data size becomes large.
[ { "version": "v1", "created": "Sat, 20 Dec 2014 01:14:55 GMT" } ]
2014-12-23T00:00:00
[ [ "Qiu", "Robert C.", "" ] ]
TITLE: The Foundation of Big Data: Experiments, Formulation, and Applications ABSTRACT: The central theme of this talk is to promote the non-asymptotic statistical viewpoint in the context of massive datasets. The classical viewpoint breaks down when the data size becomes large.
no_new_dataset
0.709617
1412.6734
Aviv Tamar
Aviv Tamar, Panos Toulis, Shie Mannor, Edoardo M. Airoldi
Implicit Temporal Differences
null
null
null
null
stat.ML cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In reinforcement learning, the TD($\lambda$) algorithm is a fundamental policy evaluation method with an efficient online implementation that is suitable for large-scale problems. One practical drawback of TD($\lambda$) is its sensitivity to the choice of the step-size. It is an empirically well-known fact that a large step-size leads to fast convergence, at the cost of higher variance and risk of instability. In this work, we introduce the implicit TD($\lambda$) algorithm which has the same function and computational cost as TD($\lambda$), but is significantly more stable. We provide a theoretical explanation of this stability and an empirical evaluation of implicit TD($\lambda$) on typical benchmark tasks. Our results show that implicit TD($\lambda$) outperforms standard TD($\lambda$) and a state-of-the-art method that automatically tunes the step-size, and thus shows promise for wide applicability.
[ { "version": "v1", "created": "Sun, 21 Dec 2014 06:53:15 GMT" } ]
2014-12-23T00:00:00
[ [ "Tamar", "Aviv", "" ], [ "Toulis", "Panos", "" ], [ "Mannor", "Shie", "" ], [ "Airoldi", "Edoardo M.", "" ] ]
TITLE: Implicit Temporal Differences ABSTRACT: In reinforcement learning, the TD($\lambda$) algorithm is a fundamental policy evaluation method with an efficient online implementation that is suitable for large-scale problems. One practical drawback of TD($\lambda$) is its sensitivity to the choice of the step-size. It is an empirically well-known fact that a large step-size leads to fast convergence, at the cost of higher variance and risk of instability. In this work, we introduce the implicit TD($\lambda$) algorithm which has the same function and computational cost as TD($\lambda$), but is significantly more stable. We provide a theoretical explanation of this stability and an empirical evaluation of implicit TD($\lambda$) on typical benchmark tasks. Our results show that implicit TD($\lambda$) outperforms standard TD($\lambda$) and a state-of-the-art method that automatically tunes the step-size, and thus shows promise for wide applicability.
no_new_dataset
0.708231
1412.6791
Anoop Katti
Anoop Katti, Anurag Mittal
Mixture of Parts Revisited: Expressive Part Interactions for Pose Estimation
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Part-based models with restrictive tree-structured interactions for the Human Pose Estimation problem, leaves many part interactions unhandled. Two of the most common and strong manifestations of such unhandled interactions are self-occlusion among the parts and the confusion in the localization of the non-adjacent symmetric parts. By handling the self-occlusion in a data efficient manner, we improve the performance of the basic Mixture of Parts model by a large margin, especially on uncommon poses. Through addressing the confusion in the symmetric limb localization using a combination of two complementing trees, we improve the performance on all the parts by atmost doubling the running time. Finally, we show that the combination of the two solutions improves the results. We report results that are equivalent to the state-of-the-art on two standard datasets. Because of maintaining the tree-structured interactions and only part-level modeling of the base Mixture of Parts model, this is achieved in time that is much less than the best performing part-based model.
[ { "version": "v1", "created": "Sun, 21 Dec 2014 14:48:41 GMT" } ]
2014-12-23T00:00:00
[ [ "Katti", "Anoop", "" ], [ "Mittal", "Anurag", "" ] ]
TITLE: Mixture of Parts Revisited: Expressive Part Interactions for Pose Estimation ABSTRACT: Part-based models with restrictive tree-structured interactions for the Human Pose Estimation problem, leaves many part interactions unhandled. Two of the most common and strong manifestations of such unhandled interactions are self-occlusion among the parts and the confusion in the localization of the non-adjacent symmetric parts. By handling the self-occlusion in a data efficient manner, we improve the performance of the basic Mixture of Parts model by a large margin, especially on uncommon poses. Through addressing the confusion in the symmetric limb localization using a combination of two complementing trees, we improve the performance on all the parts by atmost doubling the running time. Finally, we show that the combination of the two solutions improves the results. We report results that are equivalent to the state-of-the-art on two standard datasets. Because of maintaining the tree-structured interactions and only part-level modeling of the base Mixture of Parts model, this is achieved in time that is much less than the best performing part-based model.
no_new_dataset
0.709453
1412.6883
Mahdi Nasrullah Al-Ameen
Mahdi Nasrullah Al-Ameen and Matthew Wright
iPersea : The Improved Persea with Sybil Detection Mechanism
10 pages
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
P2P systems are highly susceptible to Sybil attacks, in which an attacker creates a large number of identities and uses them to control a substantial fraction of the system. Persea is the most recent approach towards designing a social network based Sybil-resistant DHT. Unlike prior Sybil-resistant P2P systems based on social networks, Persea does not rely on two key assumptions: (i) that the social network is fast mixing, and (ii) that there is a small ratio of attack edges to honest peers. Both assumptions have been shown to be unreliable in real social networks. The hierarchical distribution of node IDs in Persea confines a large attacker botnet to a considerably smaller region of the ID space than in a normal P2P system and its replication mechanism lets a peer to retrieve the desired results even if a given region is occupied by attackers. However, Persea system suffers from certain limitations, since it cannot handle the scenario, where the malicious target returns an incorrect result instead of just ignoring the lookup request. In this paper, we address this major limitation of Persea through a Sybil detection mechanism built on top of Persea system, which accommodates inspection lookup, a specially designed lookup scheme to detect the Sybil nodes based on their responses to the lookup query. We design a scheme to filter those detected Sybils to ensure the participation of honest nodes on the lookup path during regular DHT lookup. Since the malicious nodes are opt-out from the lookup path in our system, they cannot return any incorrect result during regular lookup. We evaluate our system in simulations with social network datasets and the results show that catster, the largest network in our simulation with 149700 nodes and 5449275 edges, gains 100% lookup success rate, even when the number of attack edges is equal to the number of benign peers in the network.
[ { "version": "v1", "created": "Mon, 22 Dec 2014 06:25:49 GMT" } ]
2014-12-23T00:00:00
[ [ "Al-Ameen", "Mahdi Nasrullah", "" ], [ "Wright", "Matthew", "" ] ]
TITLE: iPersea : The Improved Persea with Sybil Detection Mechanism ABSTRACT: P2P systems are highly susceptible to Sybil attacks, in which an attacker creates a large number of identities and uses them to control a substantial fraction of the system. Persea is the most recent approach towards designing a social network based Sybil-resistant DHT. Unlike prior Sybil-resistant P2P systems based on social networks, Persea does not rely on two key assumptions: (i) that the social network is fast mixing, and (ii) that there is a small ratio of attack edges to honest peers. Both assumptions have been shown to be unreliable in real social networks. The hierarchical distribution of node IDs in Persea confines a large attacker botnet to a considerably smaller region of the ID space than in a normal P2P system and its replication mechanism lets a peer to retrieve the desired results even if a given region is occupied by attackers. However, Persea system suffers from certain limitations, since it cannot handle the scenario, where the malicious target returns an incorrect result instead of just ignoring the lookup request. In this paper, we address this major limitation of Persea through a Sybil detection mechanism built on top of Persea system, which accommodates inspection lookup, a specially designed lookup scheme to detect the Sybil nodes based on their responses to the lookup query. We design a scheme to filter those detected Sybils to ensure the participation of honest nodes on the lookup path during regular DHT lookup. Since the malicious nodes are opt-out from the lookup path in our system, they cannot return any incorrect result during regular lookup. We evaluate our system in simulations with social network datasets and the results show that catster, the largest network in our simulation with 149700 nodes and 5449275 edges, gains 100% lookup success rate, even when the number of attack edges is equal to the number of benign peers in the network.
no_new_dataset
0.705785
1412.6986
Tarek Abdelrahman
Tianyi David Han, Tarek S. Abdelrahman
Automatic Tuning of Local Memory Use on GPGPUs
Part of ADAPT Workshop proceedings, 2015 (arXiv:1412.2347)
null
null
ADAPT/2015/04
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The use of local memory is important to improve the performance of OpenCL programs. However, its use may not always benefit performance, depending on various application characteristics, and there is no simple heuristic for deciding when to use it. We develop a machine learning model to decide if the optimization is beneficial or not. We train the model with millions of synthetic benchmarks and show that it can predict if the optimization should be applied for a single array, in both synthetic and real benchmarks, with high accuracy.
[ { "version": "v1", "created": "Mon, 22 Dec 2014 14:06:37 GMT" } ]
2014-12-23T00:00:00
[ [ "Han", "Tianyi David", "" ], [ "Abdelrahman", "Tarek S.", "" ] ]
TITLE: Automatic Tuning of Local Memory Use on GPGPUs ABSTRACT: The use of local memory is important to improve the performance of OpenCL programs. However, its use may not always benefit performance, depending on various application characteristics, and there is no simple heuristic for deciding when to use it. We develop a machine learning model to decide if the optimization is beneficial or not. We train the model with millions of synthetic benchmarks and show that it can predict if the optimization should be applied for a single array, in both synthetic and real benchmarks, with high accuracy.
no_new_dataset
0.71145
1412.6124
Jianyu Wang
Jianyu Wang and Alan Yuille
Semantic Part Segmentation using Compositional Model combining Shape and Appearance
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we study the problem of semantic part segmentation for animals. This is more challenging than standard object detection, object segmentation and pose estimation tasks because semantic parts of animals often have similar appearance and highly varying shapes. To tackle these challenges, we build a mixture of compositional models to represent the object boundary and the boundaries of semantic parts. And we incorporate edge, appearance, and semantic part cues into the compositional model. Given part-level segmentation annotation, we develop a novel algorithm to learn a mixture of compositional models under various poses and viewpoints for certain animal classes. Furthermore, a linear complexity algorithm is offered for efficient inference of the compositional model using dynamic programming. We evaluate our method for horse and cow using a newly annotated dataset on Pascal VOC 2010 which has pixelwise part labels. Experimental results demonstrate the effectiveness of our method.
[ { "version": "v1", "created": "Thu, 18 Dec 2014 21:27:38 GMT" } ]
2014-12-22T00:00:00
[ [ "Wang", "Jianyu", "" ], [ "Yuille", "Alan", "" ] ]
TITLE: Semantic Part Segmentation using Compositional Model combining Shape and Appearance ABSTRACT: In this paper, we study the problem of semantic part segmentation for animals. This is more challenging than standard object detection, object segmentation and pose estimation tasks because semantic parts of animals often have similar appearance and highly varying shapes. To tackle these challenges, we build a mixture of compositional models to represent the object boundary and the boundaries of semantic parts. And we incorporate edge, appearance, and semantic part cues into the compositional model. Given part-level segmentation annotation, we develop a novel algorithm to learn a mixture of compositional models under various poses and viewpoints for certain animal classes. Furthermore, a linear complexity algorithm is offered for efficient inference of the compositional model using dynamic programming. We evaluate our method for horse and cow using a newly annotated dataset on Pascal VOC 2010 which has pixelwise part labels. Experimental results demonstrate the effectiveness of our method.
new_dataset
0.715778
1412.6154
Ana Romero
Ana Romero, Julio Rubio, Francis Sergeraert
Effective persistent homology of digital images
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, three Computational Topology methods (namely effective homology, persistent homology and discrete vector fields) are mixed together to produce algorithms for homological digital image processing. The algorithms have been implemented as extensions of the Kenzo system and have shown a good performance when applied on some actual images extracted from a public dataset.
[ { "version": "v1", "created": "Mon, 6 Oct 2014 11:45:07 GMT" } ]
2014-12-22T00:00:00
[ [ "Romero", "Ana", "" ], [ "Rubio", "Julio", "" ], [ "Sergeraert", "Francis", "" ] ]
TITLE: Effective persistent homology of digital images ABSTRACT: In this paper, three Computational Topology methods (namely effective homology, persistent homology and discrete vector fields) are mixed together to produce algorithms for homological digital image processing. The algorithms have been implemented as extensions of the Kenzo system and have shown a good performance when applied on some actual images extracted from a public dataset.
no_new_dataset
0.713013
1412.6170
Francesco Lettich
Francesco Lettich, Salvatore Orlando and Claudio Silvestri
Manycore processing of repeated k-NN queries over massive moving objects observations
null
null
null
null
cs.DC cs.DB cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The ability to timely process significant amounts of continuously updated spatial data is mandatory for an increasing number of applications. In this paper we focus on a specific data-intensive problem concerning the repeated processing of huge amounts of k nearest neighbours (k-NN) queries over massive sets of moving objects, where the spatial extents of queries and the position of objects are continuously modified over time. In particular, we propose a novel hybrid CPU/GPU pipeline that significantly accelerate query processing thanks to a combination of ad-hoc data structures and non-trivial memory access patterns. To the best of our knowledge this is the first work that exploits GPUs to efficiently solve repeated k-NN queries over massive sets of continuously moving objects, even characterized by highly skewed spatial distributions. In comparison with state-of-the-art sequential CPU-based implementations, our method highlights significant speedups in the order of 10x-20x, depending on the datasets, even when considering cheap GPUs.
[ { "version": "v1", "created": "Thu, 18 Dec 2014 22:43:28 GMT" } ]
2014-12-22T00:00:00
[ [ "Lettich", "Francesco", "" ], [ "Orlando", "Salvatore", "" ], [ "Silvestri", "Claudio", "" ] ]
TITLE: Manycore processing of repeated k-NN queries over massive moving objects observations ABSTRACT: The ability to timely process significant amounts of continuously updated spatial data is mandatory for an increasing number of applications. In this paper we focus on a specific data-intensive problem concerning the repeated processing of huge amounts of k nearest neighbours (k-NN) queries over massive sets of moving objects, where the spatial extents of queries and the position of objects are continuously modified over time. In particular, we propose a novel hybrid CPU/GPU pipeline that significantly accelerate query processing thanks to a combination of ad-hoc data structures and non-trivial memory access patterns. To the best of our knowledge this is the first work that exploits GPUs to efficiently solve repeated k-NN queries over massive sets of continuously moving objects, even characterized by highly skewed spatial distributions. In comparison with state-of-the-art sequential CPU-based implementations, our method highlights significant speedups in the order of 10x-20x, depending on the datasets, even when considering cheap GPUs.
no_new_dataset
0.710245
1412.6257
Alexander Kalmanovich
Alexander Kalmanovich and Gal Chechik
Gradual training of deep denoising auto encoders
null
null
null
null
cs.LG cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Stacked denoising auto encoders (DAEs) are well known to learn useful deep representations, which can be used to improve supervised training by initializing a deep network. We investigate a training scheme of a deep DAE, where DAE layers are gradually added and keep adapting as additional layers are added. We show that in the regime of mid-sized datasets, this gradual training provides a small but consistent improvement over stacked training in both reconstruction quality and classification error over stacked training on MNIST and CIFAR datasets.
[ { "version": "v1", "created": "Fri, 19 Dec 2014 09:30:33 GMT" } ]
2014-12-22T00:00:00
[ [ "Kalmanovich", "Alexander", "" ], [ "Chechik", "Gal", "" ] ]
TITLE: Gradual training of deep denoising auto encoders ABSTRACT: Stacked denoising auto encoders (DAEs) are well known to learn useful deep representations, which can be used to improve supervised training by initializing a deep network. We investigate a training scheme of a deep DAE, where DAE layers are gradually added and keep adapting as additional layers are added. We show that in the regime of mid-sized datasets, this gradual training provides a small but consistent improvement over stacked training in both reconstruction quality and classification error over stacked training on MNIST and CIFAR datasets.
no_new_dataset
0.710019
1412.6264
Taraka Rama Kasicheyanula
Taraka Rama K
Supertagging: Introduction, learning, and application
null
null
null
null
cs.CL
http://creativecommons.org/licenses/by-nc-sa/3.0/
Supertagging is an approach originally developed by Bangalore and Joshi (1999) to improve the parsing efficiency. In the beginning, the scholars used small training datasets and somewhat na\"ive smoothing techniques to learn the probability distributions of supertags. Since its inception, the applicability of Supertags has been explored for TAG (tree-adjoining grammar) formalism as well as other related yet, different formalisms such as CCG. This article will try to summarize the various chapters, relevant to statistical parsing, from the most recent edited book volume (Bangalore and Joshi, 2010). The chapters were selected so as to blend the learning of supertags, its integration into full-scale parsing, and in semantic parsing.
[ { "version": "v1", "created": "Fri, 19 Dec 2014 09:53:57 GMT" } ]
2014-12-22T00:00:00
[ [ "K", "Taraka Rama", "" ] ]
TITLE: Supertagging: Introduction, learning, and application ABSTRACT: Supertagging is an approach originally developed by Bangalore and Joshi (1999) to improve the parsing efficiency. In the beginning, the scholars used small training datasets and somewhat na\"ive smoothing techniques to learn the probability distributions of supertags. Since its inception, the applicability of Supertags has been explored for TAG (tree-adjoining grammar) formalism as well as other related yet, different formalisms such as CCG. This article will try to summarize the various chapters, relevant to statistical parsing, from the most recent edited book volume (Bangalore and Joshi, 2010). The chapters were selected so as to blend the learning of supertags, its integration into full-scale parsing, and in semantic parsing.
no_new_dataset
0.712251
1412.6402
Pierre de Buyl
Rebecca R. Murphy, Sophie E. Jackson, David Klenerman
pyFRET: A Python Library for Single Molecule Fluorescence Data Analysis
Part of the Proceedings of the 7th European Conference on Python in Science (EuroSciPy 2014), Pierre de Buyl and Nelle Varoquaux editors, (2014)
null
null
euroscipy-proceedings2014-10
cs.CE physics.bio-ph q-bio.BM
http://creativecommons.org/licenses/by/3.0/
Single molecule F\"orster resonance energy transfer (smFRET) is a powerful experimental technique for studying the properties of individual biological molecules in solution. However, as adoption of smFRET techniques becomes more widespread, the lack of available software, whether open source or commercial, for data analysis, is becoming a significant issue. Here, we present pyFRET, an open source Python package for the analysis of data from single-molecule fluorescence experiments from freely diffusing biomolecules. The package provides methods for the complete analysis of a smFRET dataset, from burst selection and denoising, through data visualisation and model fitting. We provide support for both continuous excitation and alternating laser excitation (ALEX) data analysis. pyFRET is available as a package downloadable from the Python Package Index (PyPI) under the open source three-clause BSD licence, together with links to extensive documentation and tutorials, including example usage and test data. Additional documentation including tutorials is hosted independently on ReadTheDocs. The code is available from the free hosting site Bitbucket. Through distribution of this software, we hope to lower the barrier for the adoption of smFRET experiments by other research groups and we encourage others to contribute modules for specific analysis needs.
[ { "version": "v1", "created": "Fri, 19 Dec 2014 16:00:31 GMT" } ]
2014-12-22T00:00:00
[ [ "Murphy", "Rebecca R.", "" ], [ "Jackson", "Sophie E.", "" ], [ "Klenerman", "David", "" ] ]
TITLE: pyFRET: A Python Library for Single Molecule Fluorescence Data Analysis ABSTRACT: Single molecule F\"orster resonance energy transfer (smFRET) is a powerful experimental technique for studying the properties of individual biological molecules in solution. However, as adoption of smFRET techniques becomes more widespread, the lack of available software, whether open source or commercial, for data analysis, is becoming a significant issue. Here, we present pyFRET, an open source Python package for the analysis of data from single-molecule fluorescence experiments from freely diffusing biomolecules. The package provides methods for the complete analysis of a smFRET dataset, from burst selection and denoising, through data visualisation and model fitting. We provide support for both continuous excitation and alternating laser excitation (ALEX) data analysis. pyFRET is available as a package downloadable from the Python Package Index (PyPI) under the open source three-clause BSD licence, together with links to extensive documentation and tutorials, including example usage and test data. Additional documentation including tutorials is hosted independently on ReadTheDocs. The code is available from the free hosting site Bitbucket. Through distribution of this software, we hope to lower the barrier for the adoption of smFRET experiments by other research groups and we encourage others to contribute modules for specific analysis needs.
no_new_dataset
0.707354
1412.6493
Zichao Yang
Zichao Yang and Alexander J. Smola and Le Song and Andrew Gordon Wilson
A la Carte - Learning Fast Kernels
null
null
null
null
cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Kernel methods have great promise for learning rich statistical representations of large modern datasets. However, compared to neural networks, kernel methods have been perceived as lacking in scalability and flexibility. We introduce a family of fast, flexible, lightly parametrized and general purpose kernel learning methods, derived from Fastfood basis function expansions. We provide mechanisms to learn the properties of groups of spectral frequencies in these expansions, which require only O(mlogd) time and O(m) memory, for m basis functions and d input dimensions. We show that the proposed methods can learn a wide class of kernels, outperforming the alternatives in accuracy, speed, and memory consumption.
[ { "version": "v1", "created": "Fri, 19 Dec 2014 19:27:21 GMT" } ]
2014-12-22T00:00:00
[ [ "Yang", "Zichao", "" ], [ "Smola", "Alexander J.", "" ], [ "Song", "Le", "" ], [ "Wilson", "Andrew Gordon", "" ] ]
TITLE: A la Carte - Learning Fast Kernels ABSTRACT: Kernel methods have great promise for learning rich statistical representations of large modern datasets. However, compared to neural networks, kernel methods have been perceived as lacking in scalability and flexibility. We introduce a family of fast, flexible, lightly parametrized and general purpose kernel learning methods, derived from Fastfood basis function expansions. We provide mechanisms to learn the properties of groups of spectral frequencies in these expansions, which require only O(mlogd) time and O(m) memory, for m basis functions and d input dimensions. We show that the proposed methods can learn a wide class of kernels, outperforming the alternatives in accuracy, speed, and memory consumption.
no_new_dataset
0.709868
1303.1624
Conrad Sanderson
Yongkang Wong, Mehrtash T. Harandi, Conrad Sanderson
On Robust Face Recognition via Sparse Encoding: the Good, the Bad, and the Ugly
null
IET Biometrics, Vol. 3, No. 4, pp. 176-189, 2014
10.1049/iet-bmt.2013.0033
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In the field of face recognition, Sparse Representation (SR) has received considerable attention during the past few years. Most of the relevant literature focuses on holistic descriptors in closed-set identification applications. The underlying assumption in SR-based methods is that each class in the gallery has sufficient samples and the query lies on the subspace spanned by the gallery of the same class. Unfortunately, such assumption is easily violated in the more challenging face verification scenario, where an algorithm is required to determine if two faces (where one or both have not been seen before) belong to the same person. In this paper, we first discuss why previous attempts with SR might not be applicable to verification problems. We then propose an alternative approach to face verification via SR. Specifically, we propose to use explicit SR encoding on local image patches rather than the entire face. The obtained sparse signals are pooled via averaging to form multiple region descriptors, which are then concatenated to form an overall face descriptor. Due to the deliberate loss spatial relations within each region (caused by averaging), the resulting descriptor is robust to misalignment & various image deformations. Within the proposed framework, we evaluate several SR encoding techniques: l1-minimisation, Sparse Autoencoder Neural Network (SANN), and an implicit probabilistic technique based on Gaussian Mixture Models. Thorough experiments on AR, FERET, exYaleB, BANCA and ChokePoint datasets show that the proposed local SR approach obtains considerably better and more robust performance than several previous state-of-the-art holistic SR methods, in both verification and closed-set identification problems. The experiments also show that l1-minimisation based encoding has a considerably higher computational than the other techniques, but leads to higher recognition rates.
[ { "version": "v1", "created": "Thu, 7 Mar 2013 09:30:10 GMT" } ]
2014-12-19T00:00:00
[ [ "Wong", "Yongkang", "" ], [ "Harandi", "Mehrtash T.", "" ], [ "Sanderson", "Conrad", "" ] ]
TITLE: On Robust Face Recognition via Sparse Encoding: the Good, the Bad, and the Ugly ABSTRACT: In the field of face recognition, Sparse Representation (SR) has received considerable attention during the past few years. Most of the relevant literature focuses on holistic descriptors in closed-set identification applications. The underlying assumption in SR-based methods is that each class in the gallery has sufficient samples and the query lies on the subspace spanned by the gallery of the same class. Unfortunately, such assumption is easily violated in the more challenging face verification scenario, where an algorithm is required to determine if two faces (where one or both have not been seen before) belong to the same person. In this paper, we first discuss why previous attempts with SR might not be applicable to verification problems. We then propose an alternative approach to face verification via SR. Specifically, we propose to use explicit SR encoding on local image patches rather than the entire face. The obtained sparse signals are pooled via averaging to form multiple region descriptors, which are then concatenated to form an overall face descriptor. Due to the deliberate loss spatial relations within each region (caused by averaging), the resulting descriptor is robust to misalignment & various image deformations. Within the proposed framework, we evaluate several SR encoding techniques: l1-minimisation, Sparse Autoencoder Neural Network (SANN), and an implicit probabilistic technique based on Gaussian Mixture Models. Thorough experiments on AR, FERET, exYaleB, BANCA and ChokePoint datasets show that the proposed local SR approach obtains considerably better and more robust performance than several previous state-of-the-art holistic SR methods, in both verification and closed-set identification problems. The experiments also show that l1-minimisation based encoding has a considerably higher computational than the other techniques, but leads to higher recognition rates.
no_new_dataset
0.711281
1412.3506
Jose M. Alvarez
Jose M. Alvarez and Theo Gevers and Antonio M. Lopez
Road Detection by One-Class Color Classification: Dataset and Experiments
10 pages
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Detecting traversable road areas ahead a moving vehicle is a key process for modern autonomous driving systems. A common approach to road detection consists of exploiting color features to classify pixels as road or background. These algorithms reduce the effect of lighting variations and weather conditions by exploiting the discriminant/invariant properties of different color representations. Furthermore, the lack of labeled datasets has motivated the development of algorithms performing on single images based on the assumption that the bottom part of the image belongs to the road surface. In this paper, we first introduce a dataset of road images taken at different times and in different scenarios using an onboard camera. Then, we devise a simple online algorithm and conduct an exhaustive evaluation of different classifiers and the effect of using different color representation to characterize pixels.
[ { "version": "v1", "created": "Thu, 11 Dec 2014 00:31:37 GMT" }, { "version": "v2", "created": "Thu, 18 Dec 2014 00:57:36 GMT" } ]
2014-12-19T00:00:00
[ [ "Alvarez", "Jose M.", "" ], [ "Gevers", "Theo", "" ], [ "Lopez", "Antonio M.", "" ] ]
TITLE: Road Detection by One-Class Color Classification: Dataset and Experiments ABSTRACT: Detecting traversable road areas ahead a moving vehicle is a key process for modern autonomous driving systems. A common approach to road detection consists of exploiting color features to classify pixels as road or background. These algorithms reduce the effect of lighting variations and weather conditions by exploiting the discriminant/invariant properties of different color representations. Furthermore, the lack of labeled datasets has motivated the development of algorithms performing on single images based on the assumption that the bottom part of the image belongs to the road surface. In this paper, we first introduce a dataset of road images taken at different times and in different scenarios using an onboard camera. Then, we devise a simple online algorithm and conduct an exhaustive evaluation of different classifiers and the effect of using different color representation to characterize pixels.
new_dataset
0.714186
1412.4973
Somnath Sikdar
Jan Dreier and Philipp Kuinke and Rafael Przybylski and Felix Reidl and Peter Rossmanith and Somnath Sikdar
Overlapping Communities in Social Networks
null
null
null
null
cs.SI physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Complex networks can be typically broken down into groups or modules. Discovering this "community structure" is an important step in studying the large-scale structure of networks. Many algorithms have been proposed for community detection and benchmarks have been created to evaluate their performance. Typically algorithms for community detection either partition the graph (non-overlapping communities) or find node covers (overlapping communities). In this paper, we propose a particularly simple semi-supervised learning algorithm for finding out communities. In essence, given the community information of a small number of "seed nodes", the method uses random walks from the seed nodes to uncover the community information of the whole network. The algorithm runs in time $O(k \cdot m \cdot \log n)$, where $m$ is the number of edges; $n$ the number of links; and $k$ the number of communities in the network. In sparse networks with $m = O(n)$ and a constant number of communities, this running time is almost linear in the size of the network. Another important feature of our algorithm is that it can be used for either non-overlapping or overlapping communities. We test our algorithm using the LFR benchmark created by Lancichinetti, Fortunato, and Radicchi specifically for the purpose of evaluating such algorithms. Our algorithm can compete with the best of algorithms for both non-overlapping and overlapping communities as found in the comprehensive study of Lancichinetti and Fortunato.
[ { "version": "v1", "created": "Tue, 16 Dec 2014 12:18:52 GMT" }, { "version": "v2", "created": "Thu, 18 Dec 2014 14:52:46 GMT" } ]
2014-12-19T00:00:00
[ [ "Dreier", "Jan", "" ], [ "Kuinke", "Philipp", "" ], [ "Przybylski", "Rafael", "" ], [ "Reidl", "Felix", "" ], [ "Rossmanith", "Peter", "" ], [ "Sikdar", "Somnath", "" ] ]
TITLE: Overlapping Communities in Social Networks ABSTRACT: Complex networks can be typically broken down into groups or modules. Discovering this "community structure" is an important step in studying the large-scale structure of networks. Many algorithms have been proposed for community detection and benchmarks have been created to evaluate their performance. Typically algorithms for community detection either partition the graph (non-overlapping communities) or find node covers (overlapping communities). In this paper, we propose a particularly simple semi-supervised learning algorithm for finding out communities. In essence, given the community information of a small number of "seed nodes", the method uses random walks from the seed nodes to uncover the community information of the whole network. The algorithm runs in time $O(k \cdot m \cdot \log n)$, where $m$ is the number of edges; $n$ the number of links; and $k$ the number of communities in the network. In sparse networks with $m = O(n)$ and a constant number of communities, this running time is almost linear in the size of the network. Another important feature of our algorithm is that it can be used for either non-overlapping or overlapping communities. We test our algorithm using the LFR benchmark created by Lancichinetti, Fortunato, and Radicchi specifically for the purpose of evaluating such algorithms. Our algorithm can compete with the best of algorithms for both non-overlapping and overlapping communities as found in the comprehensive study of Lancichinetti and Fortunato.
no_new_dataset
0.710396
1412.5617
Shuang Song
Shuang Song, Kamalika Chaudhuri, Anand D. Sarwate
Learning from Data with Heterogeneous Noise using SGD
null
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider learning from data of variable quality that may be obtained from different heterogeneous sources. Addressing learning from heterogeneous data in its full generality is a challenging problem. In this paper, we adopt instead a model in which data is observed through heterogeneous noise, where the noise level reflects the quality of the data source. We study how to use stochastic gradient algorithms to learn in this model. Our study is motivated by two concrete examples where this problem arises naturally: learning with local differential privacy based on data from multiple sources with different privacy requirements, and learning from data with labels of variable quality. The main contribution of this paper is to identify how heterogeneous noise impacts performance. We show that given two datasets with heterogeneous noise, the order in which to use them in standard SGD depends on the learning rate. We propose a method for changing the learning rate as a function of the heterogeneity, and prove new regret bounds for our method in two cases of interest. Experiments on real data show that our method performs better than using a single learning rate and using only the less noisy of the two datasets when the noise level is low to moderate.
[ { "version": "v1", "created": "Wed, 17 Dec 2014 21:15:06 GMT" } ]
2014-12-19T00:00:00
[ [ "Song", "Shuang", "" ], [ "Chaudhuri", "Kamalika", "" ], [ "Sarwate", "Anand D.", "" ] ]
TITLE: Learning from Data with Heterogeneous Noise using SGD ABSTRACT: We consider learning from data of variable quality that may be obtained from different heterogeneous sources. Addressing learning from heterogeneous data in its full generality is a challenging problem. In this paper, we adopt instead a model in which data is observed through heterogeneous noise, where the noise level reflects the quality of the data source. We study how to use stochastic gradient algorithms to learn in this model. Our study is motivated by two concrete examples where this problem arises naturally: learning with local differential privacy based on data from multiple sources with different privacy requirements, and learning from data with labels of variable quality. The main contribution of this paper is to identify how heterogeneous noise impacts performance. We show that given two datasets with heterogeneous noise, the order in which to use them in standard SGD depends on the learning rate. We propose a method for changing the learning rate as a function of the heterogeneity, and prove new regret bounds for our method in two cases of interest. Experiments on real data show that our method performs better than using a single learning rate and using only the less noisy of the two datasets when the noise level is low to moderate.
no_new_dataset
0.710038
1412.5627
Fabricio Martins Lopes
Bruno Mendes Moro Conque and Andr\'e Yoshiaki Kashiwabara and Fabr\'icio Martins Lopes
Feature extraction from complex networks: A case of study in genomic sequences classification
8 pages
null
null
null
cs.CE cs.LG q-bio.QM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This work presents a new approach for classification of genomic sequences from measurements of complex networks and information theory. For this, it is considered the nucleotides, dinucleotides and trinucleotides of a genomic sequence. For each of them, the entropy, sum entropy and maximum entropy values are calculated.For each of them is also generated a network, in which the nodes are the nucleotides, dinucleotides or trinucleotides and its edges are estimated by observing the respective adjacency among them in the genomic sequence. In this way, it is generated three networks, for which measures of complex networks are extracted.These measures together with measures of information theory comprise a feature vector representing a genomic sequence. Thus, the feature vector is used for classification by methods such as SVM, MultiLayer Perceptron, J48, IBK, Naive Bayes and Random Forest in order to evaluate the proposed approach.It was adopted coding sequences, intergenic sequences and TSS (Transcriptional Starter Sites) as datasets, for which the better results were obtained by the Random Forest with 91.2%, followed by J48 with 89.1% and SVM with 84.8% of accuracy. These results indicate that the new approach of feature extraction has its value, reaching good levels of classification even considering only the genomic sequences, i.e., no other a priori knowledge about them is considered.
[ { "version": "v1", "created": "Wed, 17 Dec 2014 21:31:51 GMT" } ]
2014-12-19T00:00:00
[ [ "Conque", "Bruno Mendes Moro", "" ], [ "Kashiwabara", "André Yoshiaki", "" ], [ "Lopes", "Fabrício Martins", "" ] ]
TITLE: Feature extraction from complex networks: A case of study in genomic sequences classification ABSTRACT: This work presents a new approach for classification of genomic sequences from measurements of complex networks and information theory. For this, it is considered the nucleotides, dinucleotides and trinucleotides of a genomic sequence. For each of them, the entropy, sum entropy and maximum entropy values are calculated.For each of them is also generated a network, in which the nodes are the nucleotides, dinucleotides or trinucleotides and its edges are estimated by observing the respective adjacency among them in the genomic sequence. In this way, it is generated three networks, for which measures of complex networks are extracted.These measures together with measures of information theory comprise a feature vector representing a genomic sequence. Thus, the feature vector is used for classification by methods such as SVM, MultiLayer Perceptron, J48, IBK, Naive Bayes and Random Forest in order to evaluate the proposed approach.It was adopted coding sequences, intergenic sequences and TSS (Transcriptional Starter Sites) as datasets, for which the better results were obtained by the Random Forest with 91.2%, followed by J48 with 89.1% and SVM with 84.8% of accuracy. These results indicate that the new approach of feature extraction has its value, reaching good levels of classification even considering only the genomic sequences, i.e., no other a priori knowledge about them is considered.
no_new_dataset
0.710176
1412.5710
Jiaqi Zhao
Jiaqi Zhao, Vitor Basto Fernandes, Licheng Jiao, Iryna Yevseyeva, Asep Maulana, Rui Li, Thomas B\"ack, and Michael T. M. Emmerich
Multiobjective Optimization of Classifiers by Means of 3-D Convex Hull Based Evolutionary Algorithm
32 pages, 26 figures
null
null
null
cs.NE cs.LG
http://creativecommons.org/licenses/by/3.0/
Finding a good classifier is a multiobjective optimization problem with different error rates and the costs to be minimized. The receiver operating characteristic is widely used in the machine learning community to analyze the performance of parametric classifiers or sets of Pareto optimal classifiers. In order to directly compare two sets of classifiers the area (or volume) under the convex hull can be used as a scalar indicator for the performance of a set of classifiers in receiver operating characteristic space. Recently, the convex hull based multiobjective genetic programming algorithm was proposed and successfully applied to maximize the convex hull area for binary classification problems. The contribution of this paper is to extend this algorithm for dealing with higher dimensional problem formulations. In particular, we discuss problems where parsimony (or classifier complexity) is stated as a third objective and multi-class classification with three different true classification rates to be maximized. The design of the algorithm proposed in this paper is inspired by indicator-based evolutionary algorithms, where first a performance indicator for a solution set is established and then a selection operator is designed that complies with the performance indicator. In this case, the performance indicator will be the volume under the convex hull. The algorithm is tested and analyzed in a proof of concept study on different benchmarks that are designed for measuring its capability to capture relevant parts of a convex hull. Further benchmark and application studies on email classification and feature selection round up the analysis and assess robustness and usefulness of the new algorithm in real world settings.
[ { "version": "v1", "created": "Thu, 18 Dec 2014 03:01:10 GMT" } ]
2014-12-19T00:00:00
[ [ "Zhao", "Jiaqi", "" ], [ "Fernandes", "Vitor Basto", "" ], [ "Jiao", "Licheng", "" ], [ "Yevseyeva", "Iryna", "" ], [ "Maulana", "Asep", "" ], [ "Li", "Rui", "" ], [ "Bäck", "Thomas", "" ], [ "Emmerich", "Michael T. M.", "" ] ]
TITLE: Multiobjective Optimization of Classifiers by Means of 3-D Convex Hull Based Evolutionary Algorithm ABSTRACT: Finding a good classifier is a multiobjective optimization problem with different error rates and the costs to be minimized. The receiver operating characteristic is widely used in the machine learning community to analyze the performance of parametric classifiers or sets of Pareto optimal classifiers. In order to directly compare two sets of classifiers the area (or volume) under the convex hull can be used as a scalar indicator for the performance of a set of classifiers in receiver operating characteristic space. Recently, the convex hull based multiobjective genetic programming algorithm was proposed and successfully applied to maximize the convex hull area for binary classification problems. The contribution of this paper is to extend this algorithm for dealing with higher dimensional problem formulations. In particular, we discuss problems where parsimony (or classifier complexity) is stated as a third objective and multi-class classification with three different true classification rates to be maximized. The design of the algorithm proposed in this paper is inspired by indicator-based evolutionary algorithms, where first a performance indicator for a solution set is established and then a selection operator is designed that complies with the performance indicator. In this case, the performance indicator will be the volume under the convex hull. The algorithm is tested and analyzed in a proof of concept study on different benchmarks that are designed for measuring its capability to capture relevant parts of a convex hull. Further benchmark and application studies on email classification and feature selection round up the analysis and assess robustness and usefulness of the new algorithm in real world settings.
no_new_dataset
0.708603
1412.5720
David Budden
Madison Flannery, David M Budden and Alexandre Mendes
FlexDM: Enabling robust and reliable parallel data mining using WEKA
4 pages, 2 figures
null
null
null
cs.MS cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Performing massive data mining experiments with multiple datasets and methods is a common task faced by most bioinformatics and computational biology laboratories. WEKA is a machine learning package designed to facilitate this task by providing tools that allow researchers to select from several classification methods and specific test strategies. Despite its popularity, the current WEKA environment for batch experiments, namely Experimenter, has four limitations that impact its usability: the selection of value ranges for methods options lacks flexibility and is not intuitive; there is no support for parallelisation when running large-scale data mining tasks; the XML schema is difficult to read, necessitating the use of the Experimenter's graphical user interface for generation and modification; and robustness is limited by the fact that results are not saved until the last test has concluded. FlexDM implements an interface to WEKA to run batch processing tasks in a simple and intuitive way. In a short and easy-to-understand XML file, one can define hundreds of tests to be performed on several datasets. FlexDM also allows those tests to be executed asynchronously in parallel to take advantage of multi-core processors, significantly increasing usability and productivity. Results are saved incrementally for better robustness and reliability. FlexDM is implemented in Java and runs on Windows, Linux and OSX. As we encourage other researchers to explore and adopt our software, FlexDM is made available as a pre-configured bootable reference environment. All code, supporting documentation and usage examples are also available for download at http://sourceforge.net/projects/flexdm.
[ { "version": "v1", "created": "Thu, 18 Dec 2014 05:07:44 GMT" } ]
2014-12-19T00:00:00
[ [ "Flannery", "Madison", "" ], [ "Budden", "David M", "" ], [ "Mendes", "Alexandre", "" ] ]
TITLE: FlexDM: Enabling robust and reliable parallel data mining using WEKA ABSTRACT: Performing massive data mining experiments with multiple datasets and methods is a common task faced by most bioinformatics and computational biology laboratories. WEKA is a machine learning package designed to facilitate this task by providing tools that allow researchers to select from several classification methods and specific test strategies. Despite its popularity, the current WEKA environment for batch experiments, namely Experimenter, has four limitations that impact its usability: the selection of value ranges for methods options lacks flexibility and is not intuitive; there is no support for parallelisation when running large-scale data mining tasks; the XML schema is difficult to read, necessitating the use of the Experimenter's graphical user interface for generation and modification; and robustness is limited by the fact that results are not saved until the last test has concluded. FlexDM implements an interface to WEKA to run batch processing tasks in a simple and intuitive way. In a short and easy-to-understand XML file, one can define hundreds of tests to be performed on several datasets. FlexDM also allows those tests to be executed asynchronously in parallel to take advantage of multi-core processors, significantly increasing usability and productivity. Results are saved incrementally for better robustness and reliability. FlexDM is implemented in Java and runs on Windows, Linux and OSX. As we encourage other researchers to explore and adopt our software, FlexDM is made available as a pre-configured bootable reference environment. All code, supporting documentation and usage examples are also available for download at http://sourceforge.net/projects/flexdm.
no_new_dataset
0.70458
1412.5949
Pengtao Xie
Pengtao Xie and Eric Xing
Large Scale Distributed Distance Metric Learning
null
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In large scale machine learning and data mining problems with high feature dimensionality, the Euclidean distance between data points can be uninformative, and Distance Metric Learning (DML) is often desired to learn a proper similarity measure (using side information such as example data pairs being similar or dissimilar). However, high dimensionality and large volume of pairwise constraints in modern big data can lead to prohibitive computational cost for both the original DML formulation in Xing et al. (2002) and later extensions. In this paper, we present a distributed algorithm for DML, and a large-scale implementation on a parameter server architecture. Our approach builds on a parallelizable reformulation of Xing et al. (2002), and an asynchronous stochastic gradient descent optimization procedure. To our knowledge, this is the first distributed solution to DML, and we show that, on a system with 256 CPU cores, our program is able to complete a DML task on a dataset with 1 million data points, 22-thousand features, and 200 million labeled data pairs, in 15 hours; and the learned metric shows great effectiveness in properly measuring distances.
[ { "version": "v1", "created": "Thu, 18 Dec 2014 17:14:34 GMT" } ]
2014-12-19T00:00:00
[ [ "Xie", "Pengtao", "" ], [ "Xing", "Eric", "" ] ]
TITLE: Large Scale Distributed Distance Metric Learning ABSTRACT: In large scale machine learning and data mining problems with high feature dimensionality, the Euclidean distance between data points can be uninformative, and Distance Metric Learning (DML) is often desired to learn a proper similarity measure (using side information such as example data pairs being similar or dissimilar). However, high dimensionality and large volume of pairwise constraints in modern big data can lead to prohibitive computational cost for both the original DML formulation in Xing et al. (2002) and later extensions. In this paper, we present a distributed algorithm for DML, and a large-scale implementation on a parameter server architecture. Our approach builds on a parallelizable reformulation of Xing et al. (2002), and an asynchronous stochastic gradient descent optimization procedure. To our knowledge, this is the first distributed solution to DML, and we show that, on a system with 256 CPU cores, our program is able to complete a DML task on a dataset with 1 million data points, 22-thousand features, and 200 million labeled data pairs, in 15 hours; and the learned metric shows great effectiveness in properly measuring distances.
no_new_dataset
0.709629
1412.5968
Andrew Lan
Andrew S. Lan, Christoph Studer, Richard G. Baraniuk
Quantized Matrix Completion for Personalized Learning
null
In Proc. 7th Intl. Conf. on Educational Data Mining, pages 280-283, July 2014
null
null
stat.ML cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The recently proposed SPARse Factor Analysis (SPARFA) framework for personalized learning performs factor analysis on ordinal or binary-valued (e.g., correct/incorrect) graded learner responses to questions. The underlying factors are termed "concepts" (or knowledge components) and are used for learning analytics (LA), the estimation of learner concept-knowledge profiles, and for content analytics (CA), the estimation of question-concept associations and question difficulties. While SPARFA is a powerful tool for LA and CA, it requires a number of algorithm parameters (including the number of concepts), which are difficult to determine in practice. In this paper, we propose SPARFA-Lite, a convex optimization-based method for LA that builds on matrix completion, which only requires a single algorithm parameter and enables us to automatically identify the required number of concepts. Using a variety of educational datasets, we demonstrate that SPARFALite (i) achieves comparable performance in predicting unobserved learner responses to existing methods, including item response theory (IRT) and SPARFA, and (ii) is computationally more efficient.
[ { "version": "v1", "created": "Thu, 18 Dec 2014 17:48:17 GMT" } ]
2014-12-19T00:00:00
[ [ "Lan", "Andrew S.", "" ], [ "Studer", "Christoph", "" ], [ "Baraniuk", "Richard G.", "" ] ]
TITLE: Quantized Matrix Completion for Personalized Learning ABSTRACT: The recently proposed SPARse Factor Analysis (SPARFA) framework for personalized learning performs factor analysis on ordinal or binary-valued (e.g., correct/incorrect) graded learner responses to questions. The underlying factors are termed "concepts" (or knowledge components) and are used for learning analytics (LA), the estimation of learner concept-knowledge profiles, and for content analytics (CA), the estimation of question-concept associations and question difficulties. While SPARFA is a powerful tool for LA and CA, it requires a number of algorithm parameters (including the number of concepts), which are difficult to determine in practice. In this paper, we propose SPARFA-Lite, a convex optimization-based method for LA that builds on matrix completion, which only requires a single algorithm parameter and enables us to automatically identify the required number of concepts. Using a variety of educational datasets, we demonstrate that SPARFALite (i) achieves comparable performance in predicting unobserved learner responses to existing methods, including item response theory (IRT) and SPARFA, and (ii) is computationally more efficient.
no_new_dataset
0.711268
1412.5984
Swakkhar Shatabda
Muktadir Hossain, Tajkia Tasnim, Swakkhar Shatabda and Dewan M. Farid
Stochastic Local Search for Pattern Set Mining
The 8th International Conference on Software, Knowledge, Information Management and Applications (SKIMA 2014)
null
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Local search methods can quickly find good quality solutions in cases where systematic search methods might take a large amount of time. Moreover, in the context of pattern set mining, exhaustive search methods are not applicable due to the large search space they have to explore. In this paper, we propose the application of stochastic local search to solve the pattern set mining. Specifically, to the task of concept learning. We applied a number of local search algorithms on a standard benchmark instances for pattern set mining and the results show the potentials for further exploration.
[ { "version": "v1", "created": "Thu, 18 Dec 2014 18:16:52 GMT" } ]
2014-12-19T00:00:00
[ [ "Hossain", "Muktadir", "" ], [ "Tasnim", "Tajkia", "" ], [ "Shatabda", "Swakkhar", "" ], [ "Farid", "Dewan M.", "" ] ]
TITLE: Stochastic Local Search for Pattern Set Mining ABSTRACT: Local search methods can quickly find good quality solutions in cases where systematic search methods might take a large amount of time. Moreover, in the context of pattern set mining, exhaustive search methods are not applicable due to the large search space they have to explore. In this paper, we propose the application of stochastic local search to solve the pattern set mining. Specifically, to the task of concept learning. We applied a number of local search algorithms on a standard benchmark instances for pattern set mining and the results show the potentials for further exploration.
no_new_dataset
0.713862
1412.6018
Rachada Kongkachandra Asst.Prof.Dr.
Sirisak Visessenee, Sanparith Marukatat, and Rachada Kongkachandra
Automatic Training Data Synthesis for Handwriting Recognition Using the Structural Crossing-Over Technique
8 pages, 6 figures
International Journal of Artificial Intelligence & Applications (IJAIA), Vol. 5, No. 5, September 2014
null
null
cs.CV cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The paper presents a novel technique called "Structural Crossing-Over" to synthesize qualified data for training machine learning-based handwriting recognition. The proposed technique can provide a greater variety of patterns of training data than the existing approaches such as elastic distortion and tangent-based affine transformation. A couple of training characters are chosen, then they are analyzed by their similar and different structures, and finally are crossed over to generate the new characters. The experiments are set to compare the performances of tangent-based affine transformation and the proposed approach in terms of the variety of generated characters and percent of recognition errors. The standard MNIST corpus including 60,000 training characters and 10,000 test characters is employed in the experiments. The proposed technique uses 1,000 characters to synthesize 60,000 characters, and then uses these data to train and test the benchmark handwriting recognition system that exploits Histogram of Gradient (HOG) as features and Support Vector Machine (SVM) as recognizer. The experimental result yields 8.06% of errors. It significantly outperforms the tangent-based affine transformation and the original MNIST training data, which are 11.74% and 16.55%, respectively.
[ { "version": "v1", "created": "Thu, 9 Oct 2014 04:32:20 GMT" } ]
2014-12-19T00:00:00
[ [ "Visessenee", "Sirisak", "" ], [ "Marukatat", "Sanparith", "" ], [ "Kongkachandra", "Rachada", "" ] ]
TITLE: Automatic Training Data Synthesis for Handwriting Recognition Using the Structural Crossing-Over Technique ABSTRACT: The paper presents a novel technique called "Structural Crossing-Over" to synthesize qualified data for training machine learning-based handwriting recognition. The proposed technique can provide a greater variety of patterns of training data than the existing approaches such as elastic distortion and tangent-based affine transformation. A couple of training characters are chosen, then they are analyzed by their similar and different structures, and finally are crossed over to generate the new characters. The experiments are set to compare the performances of tangent-based affine transformation and the proposed approach in terms of the variety of generated characters and percent of recognition errors. The standard MNIST corpus including 60,000 training characters and 10,000 test characters is employed in the experiments. The proposed technique uses 1,000 characters to synthesize 60,000 characters, and then uses these data to train and test the benchmark handwriting recognition system that exploits Histogram of Gradient (HOG) as features and Support Vector Machine (SVM) as recognizer. The experimental result yields 8.06% of errors. It significantly outperforms the tangent-based affine transformation and the original MNIST training data, which are 11.74% and 16.55%, respectively.
no_new_dataset
0.71282
1302.0296
Navid Naderializadeh
Navid Naderializadeh, A. Salman Avestimehr
Interference Networks with No CSIT: Impact of Topology
Accepted for Publication in IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider partially-connected $K$-user interference networks, where the transmitters have no knowledge about the channel gain values, but they are aware of network topology (or connectivity). We introduce several linear algebraic and graph theoretic concepts to derive new topology-based outer bounds and inner bounds on the symmetric degrees-of-freedom (DoF) of these networks. We evaluate our bounds for two classes of networks to demonstrate their tightness for most networks in these classes, quantify the gain of our inner bounds over benchmark interference management strategies, and illustrate the effect of network topology on these gains.
[ { "version": "v1", "created": "Fri, 1 Feb 2013 21:22:16 GMT" }, { "version": "v2", "created": "Wed, 17 Dec 2014 07:45:20 GMT" } ]
2014-12-18T00:00:00
[ [ "Naderializadeh", "Navid", "" ], [ "Avestimehr", "A. Salman", "" ] ]
TITLE: Interference Networks with No CSIT: Impact of Topology ABSTRACT: We consider partially-connected $K$-user interference networks, where the transmitters have no knowledge about the channel gain values, but they are aware of network topology (or connectivity). We introduce several linear algebraic and graph theoretic concepts to derive new topology-based outer bounds and inner bounds on the symmetric degrees-of-freedom (DoF) of these networks. We evaluate our bounds for two classes of networks to demonstrate their tightness for most networks in these classes, quantify the gain of our inner bounds over benchmark interference management strategies, and illustrate the effect of network topology on these gains.
no_new_dataset
0.709025
1309.4796
Lijun Peng
Lijun Peng, Luis Carvalho
Bayesian Degree-Corrected Stochastic Blockmodels for Community Detection
23 pages, 9 figures
null
null
null
stat.ME cs.SI physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Community detection in networks has drawn much attention in diverse fields, especially social sciences. Given its significance, there has been a large body of literature with approaches from many fields. Here we present a statistical framework that is representative, extensible, and that yields an estimator with good properties. Our proposed approach considers a stochastic blockmodel based on a logistic regression formulation with node correction terms. We follow a Bayesian approach that explicitly captures the community behavior via prior specification. We further adopt a data augmentation strategy with latent Polya-Gamma variables to obtain posterior samples. We conduct inference based on a principled, canonically mapped centroid estimator that formally addresses label non-identifiability and captures representative community assignments. We demonstrate the proposed model and estimation on real-world as well as simulated benchmark networks and show that the proposed model and estimator are more flexible, representative, and yield smaller error rates when compared to the MAP estimator from classical degree-corrected stochastic blockmodels.
[ { "version": "v1", "created": "Wed, 18 Sep 2013 21:14:45 GMT" }, { "version": "v2", "created": "Wed, 17 Dec 2014 17:50:02 GMT" } ]
2014-12-18T00:00:00
[ [ "Peng", "Lijun", "" ], [ "Carvalho", "Luis", "" ] ]
TITLE: Bayesian Degree-Corrected Stochastic Blockmodels for Community Detection ABSTRACT: Community detection in networks has drawn much attention in diverse fields, especially social sciences. Given its significance, there has been a large body of literature with approaches from many fields. Here we present a statistical framework that is representative, extensible, and that yields an estimator with good properties. Our proposed approach considers a stochastic blockmodel based on a logistic regression formulation with node correction terms. We follow a Bayesian approach that explicitly captures the community behavior via prior specification. We further adopt a data augmentation strategy with latent Polya-Gamma variables to obtain posterior samples. We conduct inference based on a principled, canonically mapped centroid estimator that formally addresses label non-identifiability and captures representative community assignments. We demonstrate the proposed model and estimation on real-world as well as simulated benchmark networks and show that the proposed model and estimator are more flexible, representative, and yield smaller error rates when compared to the MAP estimator from classical degree-corrected stochastic blockmodels.
no_new_dataset
0.710258
1412.5448
Micka\"el Poussevin
Micka\"el Poussevin and Vincent Guigue and Patrick Gallinari
Extended Recommendation Framework: Generating the Text of a User Review as a Personalized Summary
null
null
null
null
cs.IR cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose to augment rating based recommender systems by providing the user with additional information which might help him in his choice or in the understanding of the recommendation. We consider here as a new task, the generation of personalized reviews associated to items. We use an extractive summary formulation for generating these reviews. We also show that the two information sources, ratings and items could be used both for estimating ratings and for generating summaries, leading to improved performance for each system compared to the use of a single source. Besides these two contributions, we show how a personalized polarity classifier can integrate the rating and textual aspects. Overall, the proposed system offers the user three personalized hints for a recommendation: rating, text and polarity. We evaluate these three components on two datasets using appropriate measures for each task.
[ { "version": "v1", "created": "Wed, 17 Dec 2014 15:46:28 GMT" } ]
2014-12-18T00:00:00
[ [ "Poussevin", "Mickaël", "" ], [ "Guigue", "Vincent", "" ], [ "Gallinari", "Patrick", "" ] ]
TITLE: Extended Recommendation Framework: Generating the Text of a User Review as a Personalized Summary ABSTRACT: We propose to augment rating based recommender systems by providing the user with additional information which might help him in his choice or in the understanding of the recommendation. We consider here as a new task, the generation of personalized reviews associated to items. We use an extractive summary formulation for generating these reviews. We also show that the two information sources, ratings and items could be used both for estimating ratings and for generating summaries, leading to improved performance for each system compared to the use of a single source. Besides these two contributions, we show how a personalized polarity classifier can integrate the rating and textual aspects. Overall, the proposed system offers the user three personalized hints for a recommendation: rating, text and polarity. We evaluate these three components on two datasets using appropriate measures for each task.
no_new_dataset
0.711863
1412.5488
Ashirbani Saha
Ashirbani Saha, Q. M. Jonathan Wu
Full-reference image quality assessment by combining global and local distortion measures
31 pages, 8 figures, 2 tables
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Full-reference image quality assessment (FR-IQA) techniques compare a reference and a distorted/test image and predict the perceptual quality of the test image in terms of a scalar value representing an objective score. The evaluation of FR-IQA techniques is carried out by comparing the objective scores from the techniques with the subjective scores (obtained from human observers) provided in the image databases used for the IQA. Hence, we reasonably assume that the goal of a human observer is to rate the distortion present in the test image. The goal oriented tasks are processed by the human visual system (HVS) through top-down processing which actively searches for local distortions driven by the goal. Therefore local distortion measures in an image are important for the top-down processing. At the same time, bottom-up processing also takes place signifying spontaneous visual functions in the HVS. To account for this, global perceptual features can be used. Therefore, we hypothesize that the resulting objective score for an image can be derived from the combination of local and global distortion measures calculated from the reference and test images. We calculate the local distortion by measuring the local correlation differences from the gradient and contrast information. For global distortion, dissimilarity of the saliency maps computed from a bottom-up model of saliency is used. The motivation behind the proposed approach has been thoroughly discussed, accompanied by an intuitive analysis. Finally, experiments are conducted in six benchmark databases suggesting the effectiveness of the proposed approach that achieves competitive performance with the state-of-the-art methods providing an improvement in the overall performance.
[ { "version": "v1", "created": "Wed, 17 Dec 2014 17:15:12 GMT" } ]
2014-12-18T00:00:00
[ [ "Saha", "Ashirbani", "" ], [ "Wu", "Q. M. Jonathan", "" ] ]
TITLE: Full-reference image quality assessment by combining global and local distortion measures ABSTRACT: Full-reference image quality assessment (FR-IQA) techniques compare a reference and a distorted/test image and predict the perceptual quality of the test image in terms of a scalar value representing an objective score. The evaluation of FR-IQA techniques is carried out by comparing the objective scores from the techniques with the subjective scores (obtained from human observers) provided in the image databases used for the IQA. Hence, we reasonably assume that the goal of a human observer is to rate the distortion present in the test image. The goal oriented tasks are processed by the human visual system (HVS) through top-down processing which actively searches for local distortions driven by the goal. Therefore local distortion measures in an image are important for the top-down processing. At the same time, bottom-up processing also takes place signifying spontaneous visual functions in the HVS. To account for this, global perceptual features can be used. Therefore, we hypothesize that the resulting objective score for an image can be derived from the combination of local and global distortion measures calculated from the reference and test images. We calculate the local distortion by measuring the local correlation differences from the gradient and contrast information. For global distortion, dissimilarity of the saliency maps computed from a bottom-up model of saliency is used. The motivation behind the proposed approach has been thoroughly discussed, accompanied by an intuitive analysis. Finally, experiments are conducted in six benchmark databases suggesting the effectiveness of the proposed approach that achieves competitive performance with the state-of-the-art methods providing an improvement in the overall performance.
no_new_dataset
0.708408
1412.5513
Engelbert Mephu Nguifo
Cyrine Arouri, Engelbert Mephu Nguifo, Sabeur Aridhi, C\'ecile Roucelle, Gaelle Bonnet-Loosli, Norbert Tsopz\'e
Towards a constructive multilayer perceptron for regression task using non-parametric clustering. A case study of Photo-Z redshift reconstruction
null
null
null
null
cs.NE cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The choice of architecture of artificial neuron network (ANN) is still a challenging task that users face every time. It greatly affects the accuracy of the built network. In fact there is no optimal method that is applicable to various implementations at the same time. In this paper we propose a method to construct ANN based on clustering, that resolves the problems of random and ad hoc approaches for multilayer ANN architecture. Our method can be applied to regression problems. Experimental results obtained with different datasets, reveals the efficiency of our method.
[ { "version": "v1", "created": "Wed, 17 Dec 2014 18:36:23 GMT" } ]
2014-12-18T00:00:00
[ [ "Arouri", "Cyrine", "" ], [ "Nguifo", "Engelbert Mephu", "" ], [ "Aridhi", "Sabeur", "" ], [ "Roucelle", "Cécile", "" ], [ "Bonnet-Loosli", "Gaelle", "" ], [ "Tsopzé", "Norbert", "" ] ]
TITLE: Towards a constructive multilayer perceptron for regression task using non-parametric clustering. A case study of Photo-Z redshift reconstruction ABSTRACT: The choice of architecture of artificial neuron network (ANN) is still a challenging task that users face every time. It greatly affects the accuracy of the built network. In fact there is no optimal method that is applicable to various implementations at the same time. In this paper we propose a method to construct ANN based on clustering, that resolves the problems of random and ad hoc approaches for multilayer ANN architecture. Our method can be applied to regression problems. Experimental results obtained with different datasets, reveals the efficiency of our method.
no_new_dataset
0.709667
1411.4044
Todor Ivanov
Todor Ivanov, Raik Niemann, Sead Izberovic, Marten Rosselli, Karsten Tolle, Roberto V. Zicari
Benchmarking DataStax Enterprise/Cassandra with HiBench
arXiv admin note: substantial text overlap with arXiv:1411.3811
null
null
Technical Report No. 2014-2
cs.DC cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This report evaluates the new analytical capabilities of DataStax Enterprise (DSE) [1] through the use of standard Hadoop workloads. In particular, we run experiments with CPU and I/O bound micro-benchmarks as well as OLAP-style analytical query workloads. The performed tests should show that DSE is capable of successfully executing Hadoop applications without the need to adapt them for the underlying Cassandra distributed storage system [2]. Due to the Cassandra File System (CFS) [3], which supports the Hadoop Distributed File System API, Hadoop stack applications should seamlessly run in DSE. The report is structured as follows: Section 2 provides a brief description of the technologies involved in our study. An overview of our used hardware and software components of the experimental environment is given in Section 3. Our benchmark methodology is defined in Section 4. The performed experiments together with the evaluation of the results are presented in Section 5. Finally, Section 6 concludes with lessons learned.
[ { "version": "v1", "created": "Fri, 14 Nov 2014 07:17:54 GMT" }, { "version": "v2", "created": "Tue, 16 Dec 2014 14:34:47 GMT" } ]
2014-12-17T00:00:00
[ [ "Ivanov", "Todor", "" ], [ "Niemann", "Raik", "" ], [ "Izberovic", "Sead", "" ], [ "Rosselli", "Marten", "" ], [ "Tolle", "Karsten", "" ], [ "Zicari", "Roberto V.", "" ] ]
TITLE: Benchmarking DataStax Enterprise/Cassandra with HiBench ABSTRACT: This report evaluates the new analytical capabilities of DataStax Enterprise (DSE) [1] through the use of standard Hadoop workloads. In particular, we run experiments with CPU and I/O bound micro-benchmarks as well as OLAP-style analytical query workloads. The performed tests should show that DSE is capable of successfully executing Hadoop applications without the need to adapt them for the underlying Cassandra distributed storage system [2]. Due to the Cassandra File System (CFS) [3], which supports the Hadoop Distributed File System API, Hadoop stack applications should seamlessly run in DSE. The report is structured as follows: Section 2 provides a brief description of the technologies involved in our study. An overview of our used hardware and software components of the experimental environment is given in Section 3. Our benchmark methodology is defined in Section 4. The performed experiments together with the evaluation of the results are presented in Section 5. Finally, Section 6 concludes with lessons learned.
no_new_dataset
0.703982
1412.4842
Mingjie Tang
Mingjie Tang, Ruby Y.Tahboub, Walid G.Are, Mikhail J. Atallah, Qutaibah M. Malluhi, Mourad Ouzzani, and Yasin N. Silva
Similarity Group-by Operators for Multi-dimensional Relational Data
submit to TKDE
null
null
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The SQL group-by operator plays an important role in summarizing and aggregating large datasets in a data analytic stack.While the standard group-by operator, which is based on equality, is useful in several applications, allowing similarity aware grouping provides a more realistic view on real-world data that could lead to better insights. The Similarity SQL-based Group-By operator (SGB, for short) extends the semantics of the standard SQL Group-by by grouping data with similar but not necessarily equal values. While existing similarity-based grouping operators efficiently materialize this approximate semantics, they primarily focus on one-dimensional attributes and treat multidimensional attributes independently. However, correlated attributes, such as in spatial data, are processed independently, and hence, groups in the multidimensional space are not detected properly. To address this problem, we introduce two new SGB operators for multidimensional data. The first operator is the clique (or distance-to-all) SGB, where all the tuples in a group are within some distance from each other. The second operator is the distance-to-any SGB, where a tuple belongs to a group if the tuple is within some distance from any other tuple in the group. We implement and test the new SGB operators and their algorithms inside PostgreSQL. The overhead introduced by these operators proves to be minimal and the execution times are comparable to those of the standard Group-by. The experimental study, based on TPC-H and a social check-in data, demonstrates that the proposed algorithms can achieve up to three orders of magnitude enhancement in performance over baseline methods developed to solve the same problem.
[ { "version": "v1", "created": "Tue, 16 Dec 2014 00:27:52 GMT" } ]
2014-12-17T00:00:00
[ [ "Tang", "Mingjie", "" ], [ "Tahboub", "Ruby Y.", "" ], [ "Are", "Walid G.", "" ], [ "Atallah", "Mikhail J.", "" ], [ "Malluhi", "Qutaibah M.", "" ], [ "Ouzzani", "Mourad", "" ], [ "Silva", "Yasin N.", "" ] ]
TITLE: Similarity Group-by Operators for Multi-dimensional Relational Data ABSTRACT: The SQL group-by operator plays an important role in summarizing and aggregating large datasets in a data analytic stack.While the standard group-by operator, which is based on equality, is useful in several applications, allowing similarity aware grouping provides a more realistic view on real-world data that could lead to better insights. The Similarity SQL-based Group-By operator (SGB, for short) extends the semantics of the standard SQL Group-by by grouping data with similar but not necessarily equal values. While existing similarity-based grouping operators efficiently materialize this approximate semantics, they primarily focus on one-dimensional attributes and treat multidimensional attributes independently. However, correlated attributes, such as in spatial data, are processed independently, and hence, groups in the multidimensional space are not detected properly. To address this problem, we introduce two new SGB operators for multidimensional data. The first operator is the clique (or distance-to-all) SGB, where all the tuples in a group are within some distance from each other. The second operator is the distance-to-any SGB, where a tuple belongs to a group if the tuple is within some distance from any other tuple in the group. We implement and test the new SGB operators and their algorithms inside PostgreSQL. The overhead introduced by these operators proves to be minimal and the execution times are comparable to those of the standard Group-by. The experimental study, based on TPC-H and a social check-in data, demonstrates that the proposed algorithms can achieve up to three orders of magnitude enhancement in performance over baseline methods developed to solve the same problem.
no_new_dataset
0.707998
1412.4864
Philip Bachman
Philip Bachman and Ouais Alsharif and Doina Precup
Learning with Pseudo-Ensembles
To appear in Advances in Neural Information Processing Systems 27 (NIPS 2014), Advances in Neural Information Processing Systems 27, Dec. 2014
null
null
null
stat.ML cs.LG cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We formalize the notion of a pseudo-ensemble, a (possibly infinite) collection of child models spawned from a parent model by perturbing it according to some noise process. E.g., dropout (Hinton et. al, 2012) in a deep neural network trains a pseudo-ensemble of child subnetworks generated by randomly masking nodes in the parent network. We present a novel regularizer based on making the behavior of a pseudo-ensemble robust with respect to the noise process generating it. In the fully-supervised setting, our regularizer matches the performance of dropout. But, unlike dropout, our regularizer naturally extends to the semi-supervised setting, where it produces state-of-the-art results. We provide a case study in which we transform the Recursive Neural Tensor Network of (Socher et. al, 2013) into a pseudo-ensemble, which significantly improves its performance on a real-world sentiment analysis benchmark.
[ { "version": "v1", "created": "Tue, 16 Dec 2014 02:55:05 GMT" } ]
2014-12-17T00:00:00
[ [ "Bachman", "Philip", "" ], [ "Alsharif", "Ouais", "" ], [ "Precup", "Doina", "" ] ]
TITLE: Learning with Pseudo-Ensembles ABSTRACT: We formalize the notion of a pseudo-ensemble, a (possibly infinite) collection of child models spawned from a parent model by perturbing it according to some noise process. E.g., dropout (Hinton et. al, 2012) in a deep neural network trains a pseudo-ensemble of child subnetworks generated by randomly masking nodes in the parent network. We present a novel regularizer based on making the behavior of a pseudo-ensemble robust with respect to the noise process generating it. In the fully-supervised setting, our regularizer matches the performance of dropout. But, unlike dropout, our regularizer naturally extends to the semi-supervised setting, where it produces state-of-the-art results. We provide a case study in which we transform the Recursive Neural Tensor Network of (Socher et. al, 2013) into a pseudo-ensemble, which significantly improves its performance on a real-world sentiment analysis benchmark.
no_new_dataset
0.709818
1412.4967
Anthony Knittel
Anthony Knittel, Alan Blair
Sparse, guided feature connections in an Abstract Deep Network
null
null
null
null
cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a technique for developing a network of re-used features, where the topology is formed using a coarse learning method, that allows gradient-descent fine tuning, known as an Abstract Deep Network (ADN). New features are built based on observed co-occurrences, and the network is maintained using a selection process related to evolutionary algorithms. This allows coarse ex- ploration of the problem space, effective for irregular domains, while gradient descent allows pre- cise solutions. Accuracy on standard UCI and Protein-Structure Prediction problems is comparable with benchmark SVM and optimized GBML approaches, and shows scalability for addressing large problems. The discrete implementation is symbolic, allowing interpretability, while the continuous method using fine-tuning shows improved accuracy. The binary multiplexer problem is explored, as an irregular domain that does not support gradient descent learning, showing solution to the bench- mark 135-bit problem. A convolutional implementation is demonstrated on image classification, showing an error-rate of 0.79% on the MNIST problem, without a pre-defined topology. The ADN system provides a method for developing a very sparse, deep feature topology, based on observed relationships between features, that is able to find solutions in irregular domains, and initialize a network prior to gradient descent learning.
[ { "version": "v1", "created": "Tue, 16 Dec 2014 12:04:35 GMT" } ]
2014-12-17T00:00:00
[ [ "Knittel", "Anthony", "" ], [ "Blair", "Alan", "" ] ]
TITLE: Sparse, guided feature connections in an Abstract Deep Network ABSTRACT: We present a technique for developing a network of re-used features, where the topology is formed using a coarse learning method, that allows gradient-descent fine tuning, known as an Abstract Deep Network (ADN). New features are built based on observed co-occurrences, and the network is maintained using a selection process related to evolutionary algorithms. This allows coarse ex- ploration of the problem space, effective for irregular domains, while gradient descent allows pre- cise solutions. Accuracy on standard UCI and Protein-Structure Prediction problems is comparable with benchmark SVM and optimized GBML approaches, and shows scalability for addressing large problems. The discrete implementation is symbolic, allowing interpretability, while the continuous method using fine-tuning shows improved accuracy. The binary multiplexer problem is explored, as an irregular domain that does not support gradient descent learning, showing solution to the bench- mark 135-bit problem. A convolutional implementation is demonstrated on image classification, showing an error-rate of 0.79% on the MNIST problem, without a pre-defined topology. The ADN system provides a method for developing a very sparse, deep feature topology, based on observed relationships between features, that is able to find solutions in irregular domains, and initialize a network prior to gradient descent learning.
no_new_dataset
0.711588
1412.5067
Anton Eremeev
A. V. Eremeev, Ju. V. Kovalenko
Analysis of Optimal Recombination in Genetic Algorithm for a Scheduling Problem with Setups
13 pages, in Russian
null
null
null
cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we perform an experimental study of optimal recombination operator for makespan minimization problem on single machine with sequence-dependent setup times ($1|s_{vu}|C_{\max}$). The computational experiment on benchmark problems from TSPLIB library indicates practical applicability of optimal recombination in crossover operator of genetic algorithm for $1|s_{vu}|C_{\max}$.
[ { "version": "v1", "created": "Tue, 16 Dec 2014 16:29:34 GMT" } ]
2014-12-17T00:00:00
[ [ "Eremeev", "A. V.", "" ], [ "Kovalenko", "Ju. V.", "" ] ]
TITLE: Analysis of Optimal Recombination in Genetic Algorithm for a Scheduling Problem with Setups ABSTRACT: In this paper, we perform an experimental study of optimal recombination operator for makespan minimization problem on single machine with sequence-dependent setup times ($1|s_{vu}|C_{\max}$). The computational experiment on benchmark problems from TSPLIB library indicates practical applicability of optimal recombination in crossover operator of genetic algorithm for $1|s_{vu}|C_{\max}$.
no_new_dataset
0.708616
1412.5104
Angjoo Kanazawa
Angjoo Kanazawa, Abhishek Sharma, David Jacobs
Locally Scale-Invariant Convolutional Neural Networks
Deep Learning and Representation Learning Workshop: NIPS 2014
null
null
null
cs.CV cs.LG cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Convolutional Neural Networks (ConvNets) have shown excellent results on many visual classification tasks. With the exception of ImageNet, these datasets are carefully crafted such that objects are well-aligned at similar scales. Naturally, the feature learning problem gets more challenging as the amount of variation in the data increases, as the models have to learn to be invariant to certain changes in appearance. Recent results on the ImageNet dataset show that given enough data, ConvNets can learn such invariances producing very discriminative features [1]. But could we do more: use less parameters, less data, learn more discriminative features, if certain invariances were built into the learning process? In this paper we present a simple model that allows ConvNets to learn features in a locally scale-invariant manner without increasing the number of model parameters. We show on a modified MNIST dataset that when faced with scale variation, building in scale-invariance allows ConvNets to learn more discriminative features with reduced chances of over-fitting.
[ { "version": "v1", "created": "Tue, 16 Dec 2014 18:09:34 GMT" } ]
2014-12-17T00:00:00
[ [ "Kanazawa", "Angjoo", "" ], [ "Sharma", "Abhishek", "" ], [ "Jacobs", "David", "" ] ]
TITLE: Locally Scale-Invariant Convolutional Neural Networks ABSTRACT: Convolutional Neural Networks (ConvNets) have shown excellent results on many visual classification tasks. With the exception of ImageNet, these datasets are carefully crafted such that objects are well-aligned at similar scales. Naturally, the feature learning problem gets more challenging as the amount of variation in the data increases, as the models have to learn to be invariant to certain changes in appearance. Recent results on the ImageNet dataset show that given enough data, ConvNets can learn such invariances producing very discriminative features [1]. But could we do more: use less parameters, less data, learn more discriminative features, if certain invariances were built into the learning process? In this paper we present a simple model that allows ConvNets to learn features in a locally scale-invariant manner without increasing the number of model parameters. We show on a modified MNIST dataset that when faced with scale variation, building in scale-invariance allows ConvNets to learn more discriminative features with reduced chances of over-fitting.
no_new_dataset
0.711638
1409.3215
Ilya Sutskever
Ilya Sutskever and Oriol Vinyals and Quoc V. Le
Sequence to Sequence Learning with Neural Networks
9 pages
null
null
null
cs.CL cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Deep Neural Networks (DNNs) are powerful models that have achieved excellent performance on difficult learning tasks. Although DNNs work well whenever large labeled training sets are available, they cannot be used to map sequences to sequences. In this paper, we present a general end-to-end approach to sequence learning that makes minimal assumptions on the sequence structure. Our method uses a multilayered Long Short-Term Memory (LSTM) to map the input sequence to a vector of a fixed dimensionality, and then another deep LSTM to decode the target sequence from the vector. Our main result is that on an English to French translation task from the WMT'14 dataset, the translations produced by the LSTM achieve a BLEU score of 34.8 on the entire test set, where the LSTM's BLEU score was penalized on out-of-vocabulary words. Additionally, the LSTM did not have difficulty on long sentences. For comparison, a phrase-based SMT system achieves a BLEU score of 33.3 on the same dataset. When we used the LSTM to rerank the 1000 hypotheses produced by the aforementioned SMT system, its BLEU score increases to 36.5, which is close to the previous best result on this task. The LSTM also learned sensible phrase and sentence representations that are sensitive to word order and are relatively invariant to the active and the passive voice. Finally, we found that reversing the order of the words in all source sentences (but not target sentences) improved the LSTM's performance markedly, because doing so introduced many short term dependencies between the source and the target sentence which made the optimization problem easier.
[ { "version": "v1", "created": "Wed, 10 Sep 2014 19:55:35 GMT" }, { "version": "v2", "created": "Wed, 29 Oct 2014 12:13:17 GMT" }, { "version": "v3", "created": "Sun, 14 Dec 2014 20:59:51 GMT" } ]
2014-12-16T00:00:00
[ [ "Sutskever", "Ilya", "" ], [ "Vinyals", "Oriol", "" ], [ "Le", "Quoc V.", "" ] ]
TITLE: Sequence to Sequence Learning with Neural Networks ABSTRACT: Deep Neural Networks (DNNs) are powerful models that have achieved excellent performance on difficult learning tasks. Although DNNs work well whenever large labeled training sets are available, they cannot be used to map sequences to sequences. In this paper, we present a general end-to-end approach to sequence learning that makes minimal assumptions on the sequence structure. Our method uses a multilayered Long Short-Term Memory (LSTM) to map the input sequence to a vector of a fixed dimensionality, and then another deep LSTM to decode the target sequence from the vector. Our main result is that on an English to French translation task from the WMT'14 dataset, the translations produced by the LSTM achieve a BLEU score of 34.8 on the entire test set, where the LSTM's BLEU score was penalized on out-of-vocabulary words. Additionally, the LSTM did not have difficulty on long sentences. For comparison, a phrase-based SMT system achieves a BLEU score of 33.3 on the same dataset. When we used the LSTM to rerank the 1000 hypotheses produced by the aforementioned SMT system, its BLEU score increases to 36.5, which is close to the previous best result on this task. The LSTM also learned sensible phrase and sentence representations that are sensitive to word order and are relatively invariant to the active and the passive voice. Finally, we found that reversing the order of the words in all source sentences (but not target sentences) improved the LSTM's performance markedly, because doing so introduced many short term dependencies between the source and the target sentence which made the optimization problem easier.
no_new_dataset
0.710377
1412.4183
Eugene Borovikov
Eugene Borovikov
A survey of modern optical character recognition techniques
Technical report surveying OCR/ICR and document understanding methods as of 2004.It contains 38 pages, numerous figures, 93 references, and provides a table of contents
null
null
null
cs.CV
http://creativecommons.org/licenses/publicdomain/
This report explores the latest advances in the field of digital document recognition. With the focus on printed document imagery, we discuss the major developments in optical character recognition (OCR) and document image enhancement/restoration in application to Latin and non-Latin scripts. In addition, we review and discuss the available technologies for hand-written document recognition. In this report, we also provide some company-accumulated benchmark results on available OCR engines.
[ { "version": "v1", "created": "Sat, 13 Dec 2014 02:39:09 GMT" } ]
2014-12-16T00:00:00
[ [ "Borovikov", "Eugene", "" ] ]
TITLE: A survey of modern optical character recognition techniques ABSTRACT: This report explores the latest advances in the field of digital document recognition. With the focus on printed document imagery, we discuss the major developments in optical character recognition (OCR) and document image enhancement/restoration in application to Latin and non-Latin scripts. In addition, we review and discuss the available technologies for hand-written document recognition. In this report, we also provide some company-accumulated benchmark results on available OCR engines.
no_new_dataset
0.710025
1412.4196
Yuanting Hu
Yuan-Ting Hu and Yen-Yu Lin and Hsin-Yi Chen and Kuang-Jui Hsu and Bing-Yu Chen
Descriptor Ensemble: An Unsupervised Approach to Descriptor Fusion in the Homography Space
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
With the aim to improve the performance of feature matching, we present an unsupervised approach to fuse various local descriptors in the space of homographies. Inspired by the observation that the homographies of correct feature correspondences vary smoothly along the spatial domain, our approach stands on the unsupervised nature of feature matching, and can select a good descriptor for matching each feature point. Specifically, the homography space serves as the common domain, in which a correspondence obtained by any descriptor is considered as a point, for integrating various heterogeneous descriptors. Both geometric coherence and spatial continuity among correspondences are considered via computing their geodesic distances in the space. In this way, mutual verification across different descriptors is allowed, and correct correspondences will be highlighted with a high degree of consistency (i.e., short geodesic distances here). It follows that one-class SVM can be applied to identifying these correct correspondences, and boosts the performance of feature matching. The proposed approach is comprehensively compared with the state-of-the-art approaches, and evaluated on four benchmarks of image matching. The promising results manifest its effectiveness.
[ { "version": "v1", "created": "Sat, 13 Dec 2014 06:39:04 GMT" } ]
2014-12-16T00:00:00
[ [ "Hu", "Yuan-Ting", "" ], [ "Lin", "Yen-Yu", "" ], [ "Chen", "Hsin-Yi", "" ], [ "Hsu", "Kuang-Jui", "" ], [ "Chen", "Bing-Yu", "" ] ]
TITLE: Descriptor Ensemble: An Unsupervised Approach to Descriptor Fusion in the Homography Space ABSTRACT: With the aim to improve the performance of feature matching, we present an unsupervised approach to fuse various local descriptors in the space of homographies. Inspired by the observation that the homographies of correct feature correspondences vary smoothly along the spatial domain, our approach stands on the unsupervised nature of feature matching, and can select a good descriptor for matching each feature point. Specifically, the homography space serves as the common domain, in which a correspondence obtained by any descriptor is considered as a point, for integrating various heterogeneous descriptors. Both geometric coherence and spatial continuity among correspondences are considered via computing their geodesic distances in the space. In this way, mutual verification across different descriptors is allowed, and correct correspondences will be highlighted with a high degree of consistency (i.e., short geodesic distances here). It follows that one-class SVM can be applied to identifying these correct correspondences, and boosts the performance of feature matching. The proposed approach is comprehensively compared with the state-of-the-art approaches, and evaluated on four benchmarks of image matching. The promising results manifest its effectiveness.
no_new_dataset
0.711406
1412.4378
Bharath Kumar Samanthula
Bharath K. Samanthula, Fang-Yu Rao, Elisa Bertino, Xun Yi, Dongxi Liu
Privacy-Preserving and Outsourced Multi-User k-Means Clustering
16 pages, 2 figures, 5 tables
null
null
null
cs.CR cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Many techniques for privacy-preserving data mining (PPDM) have been investigated over the past decade. Often, the entities involved in the data mining process are end-users or organizations with limited computing and storage resources. As a result, such entities may want to refrain from participating in the PPDM process. To overcome this issue and to take many other benefits of cloud computing, outsourcing PPDM tasks to the cloud environment has recently gained special attention. We consider the scenario where n entities outsource their databases (in encrypted format) to the cloud and ask the cloud to perform the clustering task on their combined data in a privacy-preserving manner. We term such a process as privacy-preserving and outsourced distributed clustering (PPODC). In this paper, we propose a novel and efficient solution to the PPODC problem based on k-means clustering algorithm. The main novelty of our solution lies in avoiding the secure division operations required in computing cluster centers altogether through an efficient transformation technique. Our solution builds the clusters securely in an iterative fashion and returns the final cluster centers to all entities when a pre-determined termination condition holds. The proposed solution protects data confidentiality of all the participating entities under the standard semi-honest model. To the best of our knowledge, ours is the first work to discuss and propose a comprehensive solution to the PPODC problem that incurs negligible cost on the participating entities. We theoretically estimate both the computation and communication costs of the proposed protocol and also demonstrate its practical value through experiments on a real dataset.
[ { "version": "v1", "created": "Sun, 14 Dec 2014 16:54:26 GMT" } ]
2014-12-16T00:00:00
[ [ "Samanthula", "Bharath K.", "" ], [ "Rao", "Fang-Yu", "" ], [ "Bertino", "Elisa", "" ], [ "Yi", "Xun", "" ], [ "Liu", "Dongxi", "" ] ]
TITLE: Privacy-Preserving and Outsourced Multi-User k-Means Clustering ABSTRACT: Many techniques for privacy-preserving data mining (PPDM) have been investigated over the past decade. Often, the entities involved in the data mining process are end-users or organizations with limited computing and storage resources. As a result, such entities may want to refrain from participating in the PPDM process. To overcome this issue and to take many other benefits of cloud computing, outsourcing PPDM tasks to the cloud environment has recently gained special attention. We consider the scenario where n entities outsource their databases (in encrypted format) to the cloud and ask the cloud to perform the clustering task on their combined data in a privacy-preserving manner. We term such a process as privacy-preserving and outsourced distributed clustering (PPODC). In this paper, we propose a novel and efficient solution to the PPODC problem based on k-means clustering algorithm. The main novelty of our solution lies in avoiding the secure division operations required in computing cluster centers altogether through an efficient transformation technique. Our solution builds the clusters securely in an iterative fashion and returns the final cluster centers to all entities when a pre-determined termination condition holds. The proposed solution protects data confidentiality of all the participating entities under the standard semi-honest model. To the best of our knowledge, ours is the first work to discuss and propose a comprehensive solution to the PPODC problem that incurs negligible cost on the participating entities. We theoretically estimate both the computation and communication costs of the proposed protocol and also demonstrate its practical value through experiments on a real dataset.
no_new_dataset
0.709868
1412.4682
Mykola Pechenizkiy
Erik Tromp and Mykola Pechenizkiy
Rule-based Emotion Detection on Social Media: Putting Tweets on Plutchik's Wheel
null
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study sentiment analysis beyond the typical granularity of polarity and instead use Plutchik's wheel of emotions model. We introduce RBEM-Emo as an extension to the Rule-Based Emission Model algorithm to deduce such emotions from human-written messages. We evaluate our approach on two different datasets and compare its performance with the current state-of-the-art techniques for emotion detection, including a recursive auto-encoder. The results of the experimental study suggest that RBEM-Emo is a promising approach advancing the current state-of-the-art in emotion detection.
[ { "version": "v1", "created": "Mon, 15 Dec 2014 17:20:47 GMT" } ]
2014-12-16T00:00:00
[ [ "Tromp", "Erik", "" ], [ "Pechenizkiy", "Mykola", "" ] ]
TITLE: Rule-based Emotion Detection on Social Media: Putting Tweets on Plutchik's Wheel ABSTRACT: We study sentiment analysis beyond the typical granularity of polarity and instead use Plutchik's wheel of emotions model. We introduce RBEM-Emo as an extension to the Rule-Based Emission Model algorithm to deduce such emotions from human-written messages. We evaluate our approach on two different datasets and compare its performance with the current state-of-the-art techniques for emotion detection, including a recursive auto-encoder. The results of the experimental study suggest that RBEM-Emo is a promising approach advancing the current state-of-the-art in emotion detection.
no_new_dataset
0.709655
1412.4726
Rustam Tagiew
Rustam Tagiew and Dmitry I. Ignatov and Fadi Amroush
Experimental economics for web mining
3 pages, 2 tables
null
null
null
cs.CE cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper offers a step towards research infrastructure, which makes data from experimental economics efficiently usable for analysis of web data. We believe that regularities of human behavior found in experimental data also emerge in real world web data. A format for data from experiments is suggested, which enables its publication as open data. Once standardized datasets of experiments are available on-line, web mining can take advantages from this data. Further, the questions about the order of causalities arisen from web data analysis can inspire new experiment setups.
[ { "version": "v1", "created": "Mon, 15 Dec 2014 19:09:48 GMT" } ]
2014-12-16T00:00:00
[ [ "Tagiew", "Rustam", "" ], [ "Ignatov", "Dmitry I.", "" ], [ "Amroush", "Fadi", "" ] ]
TITLE: Experimental economics for web mining ABSTRACT: This paper offers a step towards research infrastructure, which makes data from experimental economics efficiently usable for analysis of web data. We believe that regularities of human behavior found in experimental data also emerge in real world web data. A format for data from experiments is suggested, which enables its publication as open data. Once standardized datasets of experiments are available on-line, web mining can take advantages from this data. Further, the questions about the order of causalities arisen from web data analysis can inspire new experiment setups.
no_new_dataset
0.710842
1412.4754
Yuxiao Dong
Yuxiao Dong, Reid A. Johnson, Nitesh V. Chawla
Will This Paper Increase Your h-index? Scientific Impact Prediction
Proc. of the 8th ACM International Conference on Web Search and Data Mining (WSDM'15)
null
10.1145/2684822.2685314
null
cs.SI cs.DL physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Scientific impact plays a central role in the evaluation of the output of scholars, departments, and institutions. A widely used measure of scientific impact is citations, with a growing body of literature focused on predicting the number of citations obtained by any given publication. The effectiveness of such predictions, however, is fundamentally limited by the power-law distribution of citations, whereby publications with few citations are extremely common and publications with many citations are relatively rare. Given this limitation, in this work we instead address a related question asked by many academic researchers in the course of writing a paper, namely: "Will this paper increase my h-index?" Using a real academic dataset with over 1.7 million authors, 2 million papers, and 8 million citation relationships from the premier online academic service ArnetMiner, we formalize a novel scientific impact prediction problem to examine several factors that can drive a paper to increase the primary author's h-index. We find that the researcher's authority on the publication topic and the venue in which the paper is published are crucial factors to the increase of the primary author's h-index, while the topic popularity and the co-authors' h-indices are of surprisingly little relevance. By leveraging relevant factors, we find a greater than 87.5% potential predictability for whether a paper will contribute to an author's h-index within five years. As a further experiment, we generate a self-prediction for this paper, estimating that there is a 76% probability that it will contribute to the h-index of the co-author with the highest current h-index in five years. We conclude that our findings on the quantification of scientific impact can help researchers to expand their influence and more effectively leverage their position of "standing on the shoulders of giants."
[ { "version": "v1", "created": "Mon, 15 Dec 2014 20:36:00 GMT" } ]
2014-12-16T00:00:00
[ [ "Dong", "Yuxiao", "" ], [ "Johnson", "Reid A.", "" ], [ "Chawla", "Nitesh V.", "" ] ]
TITLE: Will This Paper Increase Your h-index? Scientific Impact Prediction ABSTRACT: Scientific impact plays a central role in the evaluation of the output of scholars, departments, and institutions. A widely used measure of scientific impact is citations, with a growing body of literature focused on predicting the number of citations obtained by any given publication. The effectiveness of such predictions, however, is fundamentally limited by the power-law distribution of citations, whereby publications with few citations are extremely common and publications with many citations are relatively rare. Given this limitation, in this work we instead address a related question asked by many academic researchers in the course of writing a paper, namely: "Will this paper increase my h-index?" Using a real academic dataset with over 1.7 million authors, 2 million papers, and 8 million citation relationships from the premier online academic service ArnetMiner, we formalize a novel scientific impact prediction problem to examine several factors that can drive a paper to increase the primary author's h-index. We find that the researcher's authority on the publication topic and the venue in which the paper is published are crucial factors to the increase of the primary author's h-index, while the topic popularity and the co-authors' h-indices are of surprisingly little relevance. By leveraging relevant factors, we find a greater than 87.5% potential predictability for whether a paper will contribute to an author's h-index within five years. As a further experiment, we generate a self-prediction for this paper, estimating that there is a 76% probability that it will contribute to the h-index of the co-author with the highest current h-index in five years. We conclude that our findings on the quantification of scientific impact can help researchers to expand their influence and more effectively leverage their position of "standing on the shoulders of giants."
no_new_dataset
0.708427
1412.3898
Lu Yu
Lu Yu and Junming Huang and Chuang Liu and Zike Zhang
ILCR: Item-based Latent Factors for Sparse Collaborative Retrieval
10 pages, conference
null
null
null
cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Interactions between search and recommendation have recently attracted significant attention, and several studies have shown that many potential applications involve with a joint problem of producing recommendations to users with respect to a given query, termed $Collaborative$ $Retrieval$ (CR). Successful algorithms designed for CR should be potentially flexible at dealing with the sparsity challenges since the setup of collaborative retrieval associates with a given $query$ $\times$ $user$ $\times$ $item$ tensor instead of traditional $user$ $\times$ $item$ matrix. Recently, several works are proposed to study CR task from users' perspective. In this paper, we aim to sufficiently explore the sophisticated relationship of each $query$ $\times$ $user$ $\times$ $item$ triple from items' perspective. By integrating item-based collaborative information for this joint task, we present an alternative factorized model that could better evaluate the ranks of those items with sparse information for the given query-user pair. In addition, we suggest to employ a recently proposed scalable ranking learning algorithm, namely BPR, to optimize the state-of-the-art approach, $Latent$ $Collaborative$ $Retrieval$ model, instead of the original learning algorithm. The experimental results on two real-world datasets, (i.e. \emph{Last.fm}, \emph{Yelp}), demonstrate the efficiency and effectiveness of our proposed approach.
[ { "version": "v1", "created": "Fri, 12 Dec 2014 06:32:47 GMT" } ]
2014-12-15T00:00:00
[ [ "Yu", "Lu", "" ], [ "Huang", "Junming", "" ], [ "Liu", "Chuang", "" ], [ "Zhang", "Zike", "" ] ]
TITLE: ILCR: Item-based Latent Factors for Sparse Collaborative Retrieval ABSTRACT: Interactions between search and recommendation have recently attracted significant attention, and several studies have shown that many potential applications involve with a joint problem of producing recommendations to users with respect to a given query, termed $Collaborative$ $Retrieval$ (CR). Successful algorithms designed for CR should be potentially flexible at dealing with the sparsity challenges since the setup of collaborative retrieval associates with a given $query$ $\times$ $user$ $\times$ $item$ tensor instead of traditional $user$ $\times$ $item$ matrix. Recently, several works are proposed to study CR task from users' perspective. In this paper, we aim to sufficiently explore the sophisticated relationship of each $query$ $\times$ $user$ $\times$ $item$ triple from items' perspective. By integrating item-based collaborative information for this joint task, we present an alternative factorized model that could better evaluate the ranks of those items with sparse information for the given query-user pair. In addition, we suggest to employ a recently proposed scalable ranking learning algorithm, namely BPR, to optimize the state-of-the-art approach, $Latent$ $Collaborative$ $Retrieval$ model, instead of the original learning algorithm. The experimental results on two real-world datasets, (i.e. \emph{Last.fm}, \emph{Yelp}), demonstrate the efficiency and effectiveness of our proposed approach.
no_new_dataset
0.707777
1412.3919
Alexandre Abraham
Alexandre Abraham (NEUROSPIN, INRIA Saclay - Ile de France), Fabian Pedregosa (INRIA Saclay - Ile de France), Michael Eickenberg (LNAO, INRIA Saclay - Ile de France), Philippe Gervais (NEUROSPIN, INRIA Saclay - Ile de France, LNAO), Andreas Muller, Jean Kossaifi, Alexandre Gramfort (NEUROSPIN, LTCI), Bertrand Thirion (NEUROSPIN, INRIA Saclay - Ile de France), G\"ael Varoquaux (NEUROSPIN, INRIA Saclay - Ile de France, LNAO)
Machine Learning for Neuroimaging with Scikit-Learn
Frontiers in neuroscience, Frontiers Research Foundation, 2013, pp.15
null
null
null
cs.LG cs.CV stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Statistical machine learning methods are increasingly used for neuroimaging data analysis. Their main virtue is their ability to model high-dimensional datasets, e.g. multivariate analysis of activation images or resting-state time series. Supervised learning is typically used in decoding or encoding settings to relate brain images to behavioral or clinical observations, while unsupervised learning can uncover hidden structures in sets of images (e.g. resting state functional MRI) or find sub-populations in large cohorts. By considering different functional neuroimaging applications, we illustrate how scikit-learn, a Python machine learning library, can be used to perform some key analysis steps. Scikit-learn contains a very large set of statistical learning algorithms, both supervised and unsupervised, and its application to neuroimaging data provides a versatile tool to study the brain.
[ { "version": "v1", "created": "Fri, 12 Dec 2014 08:38:35 GMT" } ]
2014-12-15T00:00:00
[ [ "Abraham", "Alexandre", "", "NEUROSPIN, INRIA Saclay - Ile de France" ], [ "Pedregosa", "Fabian", "", "INRIA Saclay - Ile de France" ], [ "Eickenberg", "Michael", "", "LNAO, INRIA\n Saclay - Ile de France" ], [ "Gervais", "Philippe", "", "NEUROSPIN, INRIA Saclay - Ile de\n France, LNAO" ], [ "Muller", "Andreas", "", "NEUROSPIN,\n LTCI" ], [ "Kossaifi", "Jean", "", "NEUROSPIN,\n LTCI" ], [ "Gramfort", "Alexandre", "", "NEUROSPIN,\n LTCI" ], [ "Thirion", "Bertrand", "", "NEUROSPIN, INRIA Saclay - Ile de France" ], [ "Varoquaux", "Gäel", "", "NEUROSPIN, INRIA Saclay - Ile de France, LNAO" ] ]
TITLE: Machine Learning for Neuroimaging with Scikit-Learn ABSTRACT: Statistical machine learning methods are increasingly used for neuroimaging data analysis. Their main virtue is their ability to model high-dimensional datasets, e.g. multivariate analysis of activation images or resting-state time series. Supervised learning is typically used in decoding or encoding settings to relate brain images to behavioral or clinical observations, while unsupervised learning can uncover hidden structures in sets of images (e.g. resting state functional MRI) or find sub-populations in large cohorts. By considering different functional neuroimaging applications, we illustrate how scikit-learn, a Python machine learning library, can be used to perform some key analysis steps. Scikit-learn contains a very large set of statistical learning algorithms, both supervised and unsupervised, and its application to neuroimaging data provides a versatile tool to study the brain.
no_new_dataset
0.707398
1412.4042
D\'aniel Kondor Mr
D\'aniel Kondor, Istv\'an Csabai, J\'anos Sz\"ule, M\'arton P\'osfai, G\'abor Vattay
Inferring the interplay of network structure and market effects in Bitcoin
project website: http://www.vo.elte.hu/bitcoin
New J. Phys. 16 (2014) 125003
10.1088/1367-2630/16/12/125003
null
physics.soc-ph cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A main focus in economics research is understanding the time series of prices of goods and assets. While statistical models using only the properties of the time series itself have been successful in many aspects, we expect to gain a better understanding of the phenomena involved if we can model the underlying system of interacting agents. In this article, we consider the history of Bitcoin, a novel digital currency system, for which the complete list of transactions is available for analysis. Using this dataset, we reconstruct the transaction network between users and analyze changes in the structure of the subgraph induced by the most active users. Our approach is based on the unsupervised identification of important features of the time variation of the network. Applying the widely used method of Principal Component Analysis to the matrix constructed from snapshots of the network at different times, we are able to show how structural changes in the network accompany significant changes in the exchange price of bitcoins.
[ { "version": "v1", "created": "Fri, 12 Dec 2014 16:31:24 GMT" } ]
2014-12-15T00:00:00
[ [ "Kondor", "Dániel", "" ], [ "Csabai", "István", "" ], [ "Szüle", "János", "" ], [ "Pósfai", "Márton", "" ], [ "Vattay", "Gábor", "" ] ]
TITLE: Inferring the interplay of network structure and market effects in Bitcoin ABSTRACT: A main focus in economics research is understanding the time series of prices of goods and assets. While statistical models using only the properties of the time series itself have been successful in many aspects, we expect to gain a better understanding of the phenomena involved if we can model the underlying system of interacting agents. In this article, we consider the history of Bitcoin, a novel digital currency system, for which the complete list of transactions is available for analysis. Using this dataset, we reconstruct the transaction network between users and analyze changes in the structure of the subgraph induced by the most active users. Our approach is based on the unsupervised identification of important features of the time variation of the network. Applying the widely used method of Principal Component Analysis to the matrix constructed from snapshots of the network at different times, we are able to show how structural changes in the network accompany significant changes in the exchange price of bitcoins.
new_dataset
0.610628
1412.4102
Chunyu Wang
Chunyu Wang, John Flynn, Yizhou Wang, Alan L. Yuille
Representing Data by a Mixture of Activated Simplices
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a new model which represents data as a mixture of simplices. Simplices are geometric structures that generalize triangles. We give a simple geometric understanding that allows us to learn a simplicial structure efficiently. Our method requires that the data are unit normalized (and thus lie on the unit sphere). We show that under this restriction, building a model with simplices amounts to constructing a convex hull inside the sphere whose boundary facets is close to the data. We call the boundary facets of the convex hull that are close to the data Activated Simplices. While the total number of bases used to build the simplices is a parameter of the model, the dimensions of the individual activated simplices are learned from the data. Simplices can have different dimensions, which facilitates modeling of inhomogeneous data sources. The simplicial structure is bounded --- this is appropriate for modeling data with constraints, such as human elbows can not bend more than 180 degrees. The simplices are easy to interpret and extremes within the data can be discovered among the vertices. The method provides good reconstruction and regularization. It supports good nearest neighbor classification and it allows realistic generative models to be constructed. It achieves state-of-the-art results on benchmark datasets, including 3D poses and digits.
[ { "version": "v1", "created": "Fri, 12 Dec 2014 20:12:40 GMT" } ]
2014-12-15T00:00:00
[ [ "Wang", "Chunyu", "" ], [ "Flynn", "John", "" ], [ "Wang", "Yizhou", "" ], [ "Yuille", "Alan L.", "" ] ]
TITLE: Representing Data by a Mixture of Activated Simplices ABSTRACT: We present a new model which represents data as a mixture of simplices. Simplices are geometric structures that generalize triangles. We give a simple geometric understanding that allows us to learn a simplicial structure efficiently. Our method requires that the data are unit normalized (and thus lie on the unit sphere). We show that under this restriction, building a model with simplices amounts to constructing a convex hull inside the sphere whose boundary facets is close to the data. We call the boundary facets of the convex hull that are close to the data Activated Simplices. While the total number of bases used to build the simplices is a parameter of the model, the dimensions of the individual activated simplices are learned from the data. Simplices can have different dimensions, which facilitates modeling of inhomogeneous data sources. The simplicial structure is bounded --- this is appropriate for modeling data with constraints, such as human elbows can not bend more than 180 degrees. The simplices are easy to interpret and extremes within the data can be discovered among the vertices. The method provides good reconstruction and regularization. It supports good nearest neighbor classification and it allows realistic generative models to be constructed. It achieves state-of-the-art results on benchmark datasets, including 3D poses and digits.
no_new_dataset
0.712795
1309.3421
Yanshan Wang
Yanshan Wang, Jae-Sung Lee, In-Chan Choi
Indexing by Latent Dirichlet Allocation and Ensemble Model
Accepted by the Journal of American Society for Information Science and Technology (JASIST)
null
null
null
cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The contribution of this paper is two-fold. First, we present Indexing by Latent Dirichlet Allocation (LDI), an automatic document indexing method. The probability distributions in LDI utilize those in Latent Dirichlet Allocation (LDA), a generative topic model that has been previously used in applications for document retrieval tasks. However, the ad hoc applications, or their variants with smoothing techniques as prompted by previous studies in LDA-based language modeling, result in unsatisfactory performance as the document representations do not accurately reflect concept space. To improve performance, we introduce a new definition of document probability vectors in the context of LDA and present a novel scheme for automatic document indexing based on LDA. Second, we propose an Ensemble Model (EnM) for document retrieval. The EnM combines basis indexing models by assigning different weights and attempts to uncover the optimal weights to maximize the Mean Average Precision (MAP). To solve the optimization problem, we propose an algorithm, EnM.B, which is derived based on the boosting method. The results of our computational experiments on benchmark data sets indicate that both the proposed approaches are viable options for document retrieval.
[ { "version": "v1", "created": "Fri, 13 Sep 2013 10:37:47 GMT" }, { "version": "v2", "created": "Thu, 28 Nov 2013 11:37:58 GMT" }, { "version": "v3", "created": "Tue, 14 Oct 2014 07:41:46 GMT" }, { "version": "v4", "created": "Tue, 21 Oct 2014 12:57:14 GMT" }, { "version": "v5", "created": "Mon, 8 Dec 2014 08:27:49 GMT" }, { "version": "v6", "created": "Thu, 11 Dec 2014 05:18:32 GMT" } ]
2014-12-12T00:00:00
[ [ "Wang", "Yanshan", "" ], [ "Lee", "Jae-Sung", "" ], [ "Choi", "In-Chan", "" ] ]
TITLE: Indexing by Latent Dirichlet Allocation and Ensemble Model ABSTRACT: The contribution of this paper is two-fold. First, we present Indexing by Latent Dirichlet Allocation (LDI), an automatic document indexing method. The probability distributions in LDI utilize those in Latent Dirichlet Allocation (LDA), a generative topic model that has been previously used in applications for document retrieval tasks. However, the ad hoc applications, or their variants with smoothing techniques as prompted by previous studies in LDA-based language modeling, result in unsatisfactory performance as the document representations do not accurately reflect concept space. To improve performance, we introduce a new definition of document probability vectors in the context of LDA and present a novel scheme for automatic document indexing based on LDA. Second, we propose an Ensemble Model (EnM) for document retrieval. The EnM combines basis indexing models by assigning different weights and attempts to uncover the optimal weights to maximize the Mean Average Precision (MAP). To solve the optimization problem, we propose an algorithm, EnM.B, which is derived based on the boosting method. The results of our computational experiments on benchmark data sets indicate that both the proposed approaches are viable options for document retrieval.
no_new_dataset
0.709422
1406.0146
Darko Hric
Darko Hric, Richard K. Darst, Santo Fortunato
Community detection in networks: Structural communities versus ground truth
21 pages, 19 figures
Phys. Rev. E 90, 062805 (2014)
10.1103/PhysRevE.90.062805
null
physics.soc-ph cs.IR cs.SI q-bio.QM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Algorithms to find communities in networks rely just on structural information and search for cohesive subsets of nodes. On the other hand, most scholars implicitly or explicitly assume that structural communities represent groups of nodes with similar (non-topological) properties or functions. This hypothesis could not be verified, so far, because of the lack of network datasets with information on the classification of the nodes. We show that traditional community detection methods fail to find the metadata groups in many large networks. Our results show that there is a marked separation between structural communities and metadata groups, in line with recent findings. That means that either our current modeling of community structure has to be substantially modified, or that metadata groups may not be recoverable from topology alone.
[ { "version": "v1", "created": "Sun, 1 Jun 2014 09:06:16 GMT" }, { "version": "v2", "created": "Thu, 11 Dec 2014 18:08:15 GMT" } ]
2014-12-12T00:00:00
[ [ "Hric", "Darko", "" ], [ "Darst", "Richard K.", "" ], [ "Fortunato", "Santo", "" ] ]
TITLE: Community detection in networks: Structural communities versus ground truth ABSTRACT: Algorithms to find communities in networks rely just on structural information and search for cohesive subsets of nodes. On the other hand, most scholars implicitly or explicitly assume that structural communities represent groups of nodes with similar (non-topological) properties or functions. This hypothesis could not be verified, so far, because of the lack of network datasets with information on the classification of the nodes. We show that traditional community detection methods fail to find the metadata groups in many large networks. Our results show that there is a marked separation between structural communities and metadata groups, in line with recent findings. That means that either our current modeling of community structure has to be substantially modified, or that metadata groups may not be recoverable from topology alone.
no_new_dataset
0.710201
1412.3474
Eric Tzeng
Eric Tzeng, Judy Hoffman, Ning Zhang, Kate Saenko, Trevor Darrell
Deep Domain Confusion: Maximizing for Domain Invariance
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recent reports suggest that a generic supervised deep CNN model trained on a large-scale dataset reduces, but does not remove, dataset bias on a standard benchmark. Fine-tuning deep models in a new domain can require a significant amount of data, which for many applications is simply not available. We propose a new CNN architecture which introduces an adaptation layer and an additional domain confusion loss, to learn a representation that is both semantically meaningful and domain invariant. We additionally show that a domain confusion metric can be used for model selection to determine the dimension of an adaptation layer and the best position for the layer in the CNN architecture. Our proposed adaptation method offers empirical performance which exceeds previously published results on a standard benchmark visual domain adaptation task.
[ { "version": "v1", "created": "Wed, 10 Dec 2014 21:20:54 GMT" } ]
2014-12-12T00:00:00
[ [ "Tzeng", "Eric", "" ], [ "Hoffman", "Judy", "" ], [ "Zhang", "Ning", "" ], [ "Saenko", "Kate", "" ], [ "Darrell", "Trevor", "" ] ]
TITLE: Deep Domain Confusion: Maximizing for Domain Invariance ABSTRACT: Recent reports suggest that a generic supervised deep CNN model trained on a large-scale dataset reduces, but does not remove, dataset bias on a standard benchmark. Fine-tuning deep models in a new domain can require a significant amount of data, which for many applications is simply not available. We propose a new CNN architecture which introduces an adaptation layer and an additional domain confusion loss, to learn a representation that is both semantically meaningful and domain invariant. We additionally show that a domain confusion metric can be used for model selection to determine the dimension of an adaptation layer and the best position for the layer in the CNN architecture. Our proposed adaptation method offers empirical performance which exceeds previously published results on a standard benchmark visual domain adaptation task.
no_new_dataset
0.71081
1412.3684
Soren Goyal
Soren Goyal, Paul Benjamin
Object Recognition Using Deep Neural Networks: A Survey
null
null
null
null
cs.CV cs.LG cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recognition of objects using Deep Neural Networks is an active area of research and many breakthroughs have been made in the last few years. The paper attempts to indicate how far this field has progressed. The paper briefly describes the history of research in Neural Networks and describe several of the recent advances in this field. The performances of recently developed Neural Network Algorithm over benchmark datasets have been tabulated. Finally, some the applications of this field have been provided.
[ { "version": "v1", "created": "Wed, 10 Dec 2014 18:23:13 GMT" } ]
2014-12-12T00:00:00
[ [ "Goyal", "Soren", "" ], [ "Benjamin", "Paul", "" ] ]
TITLE: Object Recognition Using Deep Neural Networks: A Survey ABSTRACT: Recognition of objects using Deep Neural Networks is an active area of research and many breakthroughs have been made in the last few years. The paper attempts to indicate how far this field has progressed. The paper briefly describes the history of research in Neural Networks and describe several of the recent advances in this field. The performances of recently developed Neural Network Algorithm over benchmark datasets have been tabulated. Finally, some the applications of this field have been provided.
no_new_dataset
0.713407
1402.5450
Nicholas Rotella
Nicholas Rotella, Michael Bloesch, Ludovic Righetti and Stefan Schaal
State Estimation for a Humanoid Robot
IROS 2014 Submission, IEEE/RSJ International Conference on Intelligent Robots and Systems (2014) 952-958
null
10.1109/IROS.2014.6942674
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper introduces a framework for state estimation on a humanoid robot platform using only common proprioceptive sensors and knowledge of leg kinematics. The presented approach extends that detailed in [1] on a quadruped platform by incorporating the rotational constraints imposed by the humanoid's flat feet. As in previous work, the proposed Extended Kalman Filter (EKF) accommodates contact switching and makes no assumptions about gait or terrain, making it applicable on any humanoid platform for use in any task. The filter employs a sensor-based prediction model which uses inertial data from an IMU and corrects for integrated error using a kinematics-based measurement model which relies on joint encoders and a kinematic model to determine the relative position and orientation of the feet. A nonlinear observability analysis is performed on both the original and updated filters and it is concluded that the new filter significantly simplifies singular cases and improves the observability characteristics of the system. Results on simulated walking and squatting datasets demonstrate the performance gain of the flat-foot filter as well as confirm the results of the presented observability analysis.
[ { "version": "v1", "created": "Fri, 21 Feb 2014 23:35:34 GMT" }, { "version": "v2", "created": "Wed, 10 Dec 2014 20:42:58 GMT" } ]
2014-12-11T00:00:00
[ [ "Rotella", "Nicholas", "" ], [ "Bloesch", "Michael", "" ], [ "Righetti", "Ludovic", "" ], [ "Schaal", "Stefan", "" ] ]
TITLE: State Estimation for a Humanoid Robot ABSTRACT: This paper introduces a framework for state estimation on a humanoid robot platform using only common proprioceptive sensors and knowledge of leg kinematics. The presented approach extends that detailed in [1] on a quadruped platform by incorporating the rotational constraints imposed by the humanoid's flat feet. As in previous work, the proposed Extended Kalman Filter (EKF) accommodates contact switching and makes no assumptions about gait or terrain, making it applicable on any humanoid platform for use in any task. The filter employs a sensor-based prediction model which uses inertial data from an IMU and corrects for integrated error using a kinematics-based measurement model which relies on joint encoders and a kinematic model to determine the relative position and orientation of the feet. A nonlinear observability analysis is performed on both the original and updated filters and it is concluded that the new filter significantly simplifies singular cases and improves the observability characteristics of the system. Results on simulated walking and squatting datasets demonstrate the performance gain of the flat-foot filter as well as confirm the results of the presented observability analysis.
no_new_dataset
0.710057
1412.3161
Xiaoyu Wang
Xiaoyu Wang, Tianbao Yang, Guobin Chen, Yuanqing Lin
Object-centric Sampling for Fine-grained Image Classification
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper proposes to go beyond the state-of-the-art deep convolutional neural network (CNN) by incorporating the information from object detection, focusing on dealing with fine-grained image classification. Unfortunately, CNN suffers from over-fiting when it is trained on existing fine-grained image classification benchmarks, which typically only consist of less than a few tens of thousands training images. Therefore, we first construct a large-scale fine-grained car recognition dataset that consists of 333 car classes with more than 150 thousand training images. With this large-scale dataset, we are able to build a strong baseline for CNN with top-1 classification accuracy of 81.6%. One major challenge in fine-grained image classification is that many classes are very similar to each other while having large within-class variation. One contributing factor to the within-class variation is cluttered image background. However, the existing CNN training takes uniform window sampling over the image, acting as blind on the location of the object of interest. In contrast, this paper proposes an \emph{object-centric sampling} (OCS) scheme that samples image windows based on the object location information. The challenge in using the location information lies in how to design powerful object detector and how to handle the imperfectness of detection results. To that end, we design a saliency-aware object detection approach specific for the setting of fine-grained image classification, and the uncertainty of detection results are naturally handled in our OCS scheme. Our framework is demonstrated to be very effective, improving top-1 accuracy to 89.3% (from 81.6%) on the large-scale fine-grained car classification dataset.
[ { "version": "v1", "created": "Wed, 10 Dec 2014 00:28:49 GMT" } ]
2014-12-11T00:00:00
[ [ "Wang", "Xiaoyu", "" ], [ "Yang", "Tianbao", "" ], [ "Chen", "Guobin", "" ], [ "Lin", "Yuanqing", "" ] ]
TITLE: Object-centric Sampling for Fine-grained Image Classification ABSTRACT: This paper proposes to go beyond the state-of-the-art deep convolutional neural network (CNN) by incorporating the information from object detection, focusing on dealing with fine-grained image classification. Unfortunately, CNN suffers from over-fiting when it is trained on existing fine-grained image classification benchmarks, which typically only consist of less than a few tens of thousands training images. Therefore, we first construct a large-scale fine-grained car recognition dataset that consists of 333 car classes with more than 150 thousand training images. With this large-scale dataset, we are able to build a strong baseline for CNN with top-1 classification accuracy of 81.6%. One major challenge in fine-grained image classification is that many classes are very similar to each other while having large within-class variation. One contributing factor to the within-class variation is cluttered image background. However, the existing CNN training takes uniform window sampling over the image, acting as blind on the location of the object of interest. In contrast, this paper proposes an \emph{object-centric sampling} (OCS) scheme that samples image windows based on the object location information. The challenge in using the location information lies in how to design powerful object detector and how to handle the imperfectness of detection results. To that end, we design a saliency-aware object detection approach specific for the setting of fine-grained image classification, and the uncertainty of detection results are naturally handled in our OCS scheme. Our framework is demonstrated to be very effective, improving top-1 accuracy to 89.3% (from 81.6%) on the large-scale fine-grained car classification dataset.
new_dataset
0.682957
1412.3333
Patrick Prosser
Frod Prefect, Patrick Prosser
Empirical Algorithmics: draw your own conclusions
arXiv admin note: text overlap with arXiv:1207.4616
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In an empirical comparisons of algorithms we might compare run times over a set of benchmark problems to decide which one is fastest, i.e. an algorithmic horse race. Ideally we would like to download source code for the algorithms, compile and then run on our machine. Sometimes code isn't available to download and sometimes resource isn't available to implement all the algorithms we want to study. To get round this, published results are rescaled, a technique endorsed by DIMACS, and those rescaled results included in a new study. This technique is frequently used when presenting new algorithms for the maximum clique problem. We demonstrate that this is unsafe, and that if carelessly used may allow us to draw conflicting conclusions from our empirical study.
[ { "version": "v1", "created": "Wed, 10 Dec 2014 15:11:05 GMT" } ]
2014-12-11T00:00:00
[ [ "Prefect", "Frod", "" ], [ "Prosser", "Patrick", "" ] ]
TITLE: Empirical Algorithmics: draw your own conclusions ABSTRACT: In an empirical comparisons of algorithms we might compare run times over a set of benchmark problems to decide which one is fastest, i.e. an algorithmic horse race. Ideally we would like to download source code for the algorithms, compile and then run on our machine. Sometimes code isn't available to download and sometimes resource isn't available to implement all the algorithms we want to study. To get round this, published results are rescaled, a technique endorsed by DIMACS, and those rescaled results included in a new study. This technique is frequently used when presenting new algorithms for the maximum clique problem. We demonstrate that this is unsafe, and that if carelessly used may allow us to draw conflicting conclusions from our empirical study.
no_new_dataset
0.709573
1412.3352
Neda Pourali
Neda Pourali
Web image annotation by diffusion maps manifold learning algorithm
11 pages, 8 figures
null
10.5121/ijfcst.2014.4606
null
cs.CV cs.IR cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Automatic image annotation is one of the most challenging problems in machine vision areas. The goal of this task is to predict number of keywords automatically for images captured in real data. Many methods are based on visual features in order to calculate similarities between image samples. But the computation cost of these approaches is very high. These methods require many training samples to be stored in memory. To lessen this burden, a number of techniques have been developed to reduce the number of features in a dataset. Manifold learning is a popular approach to nonlinear dimensionality reduction. In this paper, we investigate Diffusion maps manifold learning method for web image auto-annotation task. Diffusion maps manifold learning method is used to reduce the dimension of some visual features. Extensive experiments and analysis on NUS-WIDE-LITE web image dataset with different visual features show how this manifold learning dimensionality reduction method can be applied effectively to image annotation.
[ { "version": "v1", "created": "Mon, 8 Dec 2014 10:38:28 GMT" } ]
2014-12-11T00:00:00
[ [ "Pourali", "Neda", "" ] ]
TITLE: Web image annotation by diffusion maps manifold learning algorithm ABSTRACT: Automatic image annotation is one of the most challenging problems in machine vision areas. The goal of this task is to predict number of keywords automatically for images captured in real data. Many methods are based on visual features in order to calculate similarities between image samples. But the computation cost of these approaches is very high. These methods require many training samples to be stored in memory. To lessen this burden, a number of techniques have been developed to reduce the number of features in a dataset. Manifold learning is a popular approach to nonlinear dimensionality reduction. In this paper, we investigate Diffusion maps manifold learning method for web image auto-annotation task. Diffusion maps manifold learning method is used to reduce the dimension of some visual features. Extensive experiments and analysis on NUS-WIDE-LITE web image dataset with different visual features show how this manifold learning dimensionality reduction method can be applied effectively to image annotation.
no_new_dataset
0.711205
1406.2227
Max Jaderberg
Max Jaderberg, Karen Simonyan, Andrea Vedaldi, Andrew Zisserman
Synthetic Data and Artificial Neural Networks for Natural Scene Text Recognition
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this work we present a framework for the recognition of natural scene text. Our framework does not require any human-labelled data, and performs word recognition on the whole image holistically, departing from the character based recognition systems of the past. The deep neural network models at the centre of this framework are trained solely on data produced by a synthetic text generation engine -- synthetic data that is highly realistic and sufficient to replace real data, giving us infinite amounts of training data. This excess of data exposes new possibilities for word recognition models, and here we consider three models, each one "reading" words in a different way: via 90k-way dictionary encoding, character sequence encoding, and bag-of-N-grams encoding. In the scenarios of language based and completely unconstrained text recognition we greatly improve upon state-of-the-art performance on standard datasets, using our fast, simple machinery and requiring zero data-acquisition costs.
[ { "version": "v1", "created": "Mon, 9 Jun 2014 15:53:33 GMT" }, { "version": "v2", "created": "Tue, 10 Jun 2014 03:10:35 GMT" }, { "version": "v3", "created": "Mon, 6 Oct 2014 16:08:24 GMT" }, { "version": "v4", "created": "Tue, 9 Dec 2014 11:22:59 GMT" } ]
2014-12-10T00:00:00
[ [ "Jaderberg", "Max", "" ], [ "Simonyan", "Karen", "" ], [ "Vedaldi", "Andrea", "" ], [ "Zisserman", "Andrew", "" ] ]
TITLE: Synthetic Data and Artificial Neural Networks for Natural Scene Text Recognition ABSTRACT: In this work we present a framework for the recognition of natural scene text. Our framework does not require any human-labelled data, and performs word recognition on the whole image holistically, departing from the character based recognition systems of the past. The deep neural network models at the centre of this framework are trained solely on data produced by a synthetic text generation engine -- synthetic data that is highly realistic and sufficient to replace real data, giving us infinite amounts of training data. This excess of data exposes new possibilities for word recognition models, and here we consider three models, each one "reading" words in a different way: via 90k-way dictionary encoding, character sequence encoding, and bag-of-N-grams encoding. In the scenarios of language based and completely unconstrained text recognition we greatly improve upon state-of-the-art performance on standard datasets, using our fast, simple machinery and requiring zero data-acquisition costs.
no_new_dataset
0.712001
1410.5772
Lutz Bornmann Dr.
Lutz Bornmann, Werner Marx
Methods for the generation of normalized citation impact scores in bibliometrics: Which method best reflects the judgements of experts?
Accepted for publication in the Journal of Informetrics
null
null
null
cs.DL stat.OT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Evaluative bibliometrics compares the citation impact of researchers, research groups and institutions with each other across time scales and disciplines. Both factors - discipline and period - have an influence on the citation count which is independent of the quality of the publication. Normalizing the citation impact of papers for these two factors started in the mid-1980s. Since then, a range of different methods have been presented for producing normalized citation impact scores. The current study uses a data set of over 50,000 records to test which of the methods so far presented correlate better with the assessment of papers by peers. The peer assessments come from F1000Prime - a post-publication peer review system of the biomedical literature. Of the normalized indicators, the current study involves not only cited-side indicators, such as the mean normalized citation score, but also citing-side indicators. As the results show, the correlations of the indicators with the peer assessments all turn out to be very similar. Since F1000 focuses on biomedicine, it is important that the results of this study are validated by other studies based on datasets from other disciplines or (ideally) based on multi-disciplinary datasets.
[ { "version": "v1", "created": "Mon, 20 Oct 2014 07:57:32 GMT" }, { "version": "v2", "created": "Tue, 9 Dec 2014 10:58:06 GMT" } ]
2014-12-10T00:00:00
[ [ "Bornmann", "Lutz", "" ], [ "Marx", "Werner", "" ] ]
TITLE: Methods for the generation of normalized citation impact scores in bibliometrics: Which method best reflects the judgements of experts? ABSTRACT: Evaluative bibliometrics compares the citation impact of researchers, research groups and institutions with each other across time scales and disciplines. Both factors - discipline and period - have an influence on the citation count which is independent of the quality of the publication. Normalizing the citation impact of papers for these two factors started in the mid-1980s. Since then, a range of different methods have been presented for producing normalized citation impact scores. The current study uses a data set of over 50,000 records to test which of the methods so far presented correlate better with the assessment of papers by peers. The peer assessments come from F1000Prime - a post-publication peer review system of the biomedical literature. Of the normalized indicators, the current study involves not only cited-side indicators, such as the mean normalized citation score, but also citing-side indicators. As the results show, the correlations of the indicators with the peer assessments all turn out to be very similar. Since F1000 focuses on biomedicine, it is important that the results of this study are validated by other studies based on datasets from other disciplines or (ideally) based on multi-disciplinary datasets.
no_new_dataset
0.707234
1410.7835
Zhensong Qian
Oliver Schulte, Zhensong Qian, Arthur E. Kirkpatrick, Xiaoqian Yin, Yan Sun
Fast Learning of Relational Dependency Networks
17 pages, 2 figures, 3 tables, Accepted as long paper by ILP 2014, September 14- 16th, Nancy, France. Added the Appendix: Proof of Consistency Characterization
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A Relational Dependency Network (RDN) is a directed graphical model widely used for multi-relational data. These networks allow cyclic dependencies, necessary to represent relational autocorrelations. We describe an approach for learning both the RDN's structure and its parameters, given an input relational database: First learn a Bayesian network (BN), then transform the Bayesian network to an RDN. Thus fast Bayes net learning can provide fast RDN learning. The BN-to-RDN transform comprises a simple, local adjustment of the Bayes net structure and a closed-form transform of the Bayes net parameters. This method can learn an RDN for a dataset with a million tuples in minutes. We empirically compare our approach to state-of-the art RDN learning methods that use functional gradient boosting, on five benchmark datasets. Learning RDNs via BNs scales much better to large datasets than learning RDNs with boosting, and provides competitive accuracy in predictions.
[ { "version": "v1", "created": "Tue, 28 Oct 2014 23:14:56 GMT" }, { "version": "v2", "created": "Tue, 9 Dec 2014 01:07:36 GMT" } ]
2014-12-10T00:00:00
[ [ "Schulte", "Oliver", "" ], [ "Qian", "Zhensong", "" ], [ "Kirkpatrick", "Arthur E.", "" ], [ "Yin", "Xiaoqian", "" ], [ "Sun", "Yan", "" ] ]
TITLE: Fast Learning of Relational Dependency Networks ABSTRACT: A Relational Dependency Network (RDN) is a directed graphical model widely used for multi-relational data. These networks allow cyclic dependencies, necessary to represent relational autocorrelations. We describe an approach for learning both the RDN's structure and its parameters, given an input relational database: First learn a Bayesian network (BN), then transform the Bayesian network to an RDN. Thus fast Bayes net learning can provide fast RDN learning. The BN-to-RDN transform comprises a simple, local adjustment of the Bayes net structure and a closed-form transform of the Bayes net parameters. This method can learn an RDN for a dataset with a million tuples in minutes. We empirically compare our approach to state-of-the art RDN learning methods that use functional gradient boosting, on five benchmark datasets. Learning RDNs via BNs scales much better to large datasets than learning RDNs with boosting, and provides competitive accuracy in predictions.
no_new_dataset
0.712632
1412.2066
Charless Fowlkes
Shaofei Wang and Charless C. Fowlkes
Learning Multi-target Tracking with Quadratic Object Interactions
null
null
null
null
cs.CV cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We describe a model for multi-target tracking based on associating collections of candidate detections across frames of a video. In order to model pairwise interactions between different tracks, such as suppression of overlapping tracks and contextual cues about co-occurence of different objects, we augment a standard min-cost flow objective with quadratic terms between detection variables. We learn the parameters of this model using structured prediction and a loss function which approximates the multi-target tracking accuracy. We evaluate two different approaches to finding an optimal set of tracks under model objective based on an LP relaxation and a novel greedy extension to dynamic programming that handles pairwise interactions. We find the greedy algorithm achieves equivalent performance to the LP relaxation while being 2-7x faster than a commercial solver. The resulting model with learned parameters outperforms existing methods across several categories on the KITTI tracking benchmark.
[ { "version": "v1", "created": "Fri, 5 Dec 2014 17:04:35 GMT" }, { "version": "v2", "created": "Tue, 9 Dec 2014 05:25:44 GMT" } ]
2014-12-10T00:00:00
[ [ "Wang", "Shaofei", "" ], [ "Fowlkes", "Charless C.", "" ] ]
TITLE: Learning Multi-target Tracking with Quadratic Object Interactions ABSTRACT: We describe a model for multi-target tracking based on associating collections of candidate detections across frames of a video. In order to model pairwise interactions between different tracks, such as suppression of overlapping tracks and contextual cues about co-occurence of different objects, we augment a standard min-cost flow objective with quadratic terms between detection variables. We learn the parameters of this model using structured prediction and a loss function which approximates the multi-target tracking accuracy. We evaluate two different approaches to finding an optimal set of tracks under model objective based on an LP relaxation and a novel greedy extension to dynamic programming that handles pairwise interactions. We find the greedy algorithm achieves equivalent performance to the LP relaxation while being 2-7x faster than a commercial solver. The resulting model with learned parameters outperforms existing methods across several categories on the KITTI tracking benchmark.
no_new_dataset
0.70779
1412.3040
Albert Kim
Albert Kim, Eric Blais, Aditya Parameswaran, Piotr Indyk, Sam Madden, Ronitt Rubinfeld
Rapid Sampling for Visualizations with Ordering Guarantees
Tech Report. 17 pages. Condensed version to appear in VLDB Vol. 8 No. 5
null
null
null
cs.DB
http://creativecommons.org/licenses/by-nc-sa/3.0/
Visualizations are frequently used as a means to understand trends and gather insights from datasets, but often take a long time to generate. In this paper, we focus on the problem of rapidly generating approximate visualizations while preserving crucial visual proper- ties of interest to analysts. Our primary focus will be on sampling algorithms that preserve the visual property of ordering; our techniques will also apply to some other visual properties. For instance, our algorithms can be used to generate an approximate visualization of a bar chart very rapidly, where the comparisons between any two bars are correct. We formally show that our sampling algorithms are generally applicable and provably optimal in theory, in that they do not take more samples than necessary to generate the visualizations with ordering guarantees. They also work well in practice, correctly ordering output groups while taking orders of magnitude fewer samples and much less time than conventional sampling schemes.
[ { "version": "v1", "created": "Tue, 9 Dec 2014 18:08:26 GMT" } ]
2014-12-10T00:00:00
[ [ "Kim", "Albert", "" ], [ "Blais", "Eric", "" ], [ "Parameswaran", "Aditya", "" ], [ "Indyk", "Piotr", "" ], [ "Madden", "Sam", "" ], [ "Rubinfeld", "Ronitt", "" ] ]
TITLE: Rapid Sampling for Visualizations with Ordering Guarantees ABSTRACT: Visualizations are frequently used as a means to understand trends and gather insights from datasets, but often take a long time to generate. In this paper, we focus on the problem of rapidly generating approximate visualizations while preserving crucial visual proper- ties of interest to analysts. Our primary focus will be on sampling algorithms that preserve the visual property of ordering; our techniques will also apply to some other visual properties. For instance, our algorithms can be used to generate an approximate visualization of a bar chart very rapidly, where the comparisons between any two bars are correct. We formally show that our sampling algorithms are generally applicable and provably optimal in theory, in that they do not take more samples than necessary to generate the visualizations with ordering guarantees. They also work well in practice, correctly ordering output groups while taking orders of magnitude fewer samples and much less time than conventional sampling schemes.
no_new_dataset
0.711619
1406.1485
Li Yao
Tapani Raiko, Li Yao, Kyunghyun Cho and Yoshua Bengio
Iterative Neural Autoregressive Distribution Estimator (NADE-k)
Accepted at Neural Information Processing Systems (NIPS) 2014
null
null
null
stat.ML cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Training of the neural autoregressive density estimator (NADE) can be viewed as doing one step of probabilistic inference on missing values in data. We propose a new model that extends this inference scheme to multiple steps, arguing that it is easier to learn to improve a reconstruction in $k$ steps rather than to learn to reconstruct in a single inference step. The proposed model is an unsupervised building block for deep learning that combines the desirable properties of NADE and multi-predictive training: (1) Its test likelihood can be computed analytically, (2) it is easy to generate independent samples from it, and (3) it uses an inference engine that is a superset of variational inference for Boltzmann machines. The proposed NADE-k is competitive with the state-of-the-art in density estimation on the two datasets tested.
[ { "version": "v1", "created": "Thu, 5 Jun 2014 19:13:51 GMT" }, { "version": "v2", "created": "Wed, 11 Jun 2014 11:28:36 GMT" }, { "version": "v3", "created": "Sat, 6 Dec 2014 00:22:00 GMT" } ]
2014-12-09T00:00:00
[ [ "Raiko", "Tapani", "" ], [ "Yao", "Li", "" ], [ "Cho", "Kyunghyun", "" ], [ "Bengio", "Yoshua", "" ] ]
TITLE: Iterative Neural Autoregressive Distribution Estimator (NADE-k) ABSTRACT: Training of the neural autoregressive density estimator (NADE) can be viewed as doing one step of probabilistic inference on missing values in data. We propose a new model that extends this inference scheme to multiple steps, arguing that it is easier to learn to improve a reconstruction in $k$ steps rather than to learn to reconstruct in a single inference step. The proposed model is an unsupervised building block for deep learning that combines the desirable properties of NADE and multi-predictive training: (1) Its test likelihood can be computed analytically, (2) it is easy to generate independent samples from it, and (3) it uses an inference engine that is a superset of variational inference for Boltzmann machines. The proposed NADE-k is competitive with the state-of-the-art in density estimation on the two datasets tested.
no_new_dataset
0.709648
1411.1792
Jason Yosinski
Jason Yosinski, Jeff Clune, Yoshua Bengio, Hod Lipson
How transferable are features in deep neural networks?
To appear in Advances in Neural Information Processing Systems 27 (NIPS 2014)
Advances in Neural Information Processing Systems 27, pages 3320-3328. Dec. 2014
null
null
cs.LG cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Many deep neural networks trained on natural images exhibit a curious phenomenon in common: on the first layer they learn features similar to Gabor filters and color blobs. Such first-layer features appear not to be specific to a particular dataset or task, but general in that they are applicable to many datasets and tasks. Features must eventually transition from general to specific by the last layer of the network, but this transition has not been studied extensively. In this paper we experimentally quantify the generality versus specificity of neurons in each layer of a deep convolutional neural network and report a few surprising results. Transferability is negatively affected by two distinct issues: (1) the specialization of higher layer neurons to their original task at the expense of performance on the target task, which was expected, and (2) optimization difficulties related to splitting networks between co-adapted neurons, which was not expected. In an example network trained on ImageNet, we demonstrate that either of these two issues may dominate, depending on whether features are transferred from the bottom, middle, or top of the network. We also document that the transferability of features decreases as the distance between the base task and target task increases, but that transferring features even from distant tasks can be better than using random features. A final surprising result is that initializing a network with transferred features from almost any number of layers can produce a boost to generalization that lingers even after fine-tuning to the target dataset.
[ { "version": "v1", "created": "Thu, 6 Nov 2014 23:09:37 GMT" } ]
2014-12-09T00:00:00
[ [ "Yosinski", "Jason", "" ], [ "Clune", "Jeff", "" ], [ "Bengio", "Yoshua", "" ], [ "Lipson", "Hod", "" ] ]
TITLE: How transferable are features in deep neural networks? ABSTRACT: Many deep neural networks trained on natural images exhibit a curious phenomenon in common: on the first layer they learn features similar to Gabor filters and color blobs. Such first-layer features appear not to be specific to a particular dataset or task, but general in that they are applicable to many datasets and tasks. Features must eventually transition from general to specific by the last layer of the network, but this transition has not been studied extensively. In this paper we experimentally quantify the generality versus specificity of neurons in each layer of a deep convolutional neural network and report a few surprising results. Transferability is negatively affected by two distinct issues: (1) the specialization of higher layer neurons to their original task at the expense of performance on the target task, which was expected, and (2) optimization difficulties related to splitting networks between co-adapted neurons, which was not expected. In an example network trained on ImageNet, we demonstrate that either of these two issues may dominate, depending on whether features are transferred from the bottom, middle, or top of the network. We also document that the transferability of features decreases as the distance between the base task and target task increases, but that transferring features even from distant tasks can be better than using random features. A final surprising result is that initializing a network with transferred features from almost any number of layers can produce a boost to generalization that lingers even after fine-tuning to the target dataset.
no_new_dataset
0.707657
1412.2485
Vikram Nathan
Vikram Nathan, Sharath Raghvendra
Accurate Streaming Support Vector Machines
2 figures, 8 pages
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A widely-used tool for binary classification is the Support Vector Machine (SVM), a supervised learning technique that finds the "maximum margin" linear separator between the two classes. While SVMs have been well studied in the batch (offline) setting, there is considerably less work on the streaming (online) setting, which requires only a single pass over the data using sub-linear space. Existing streaming algorithms are not yet competitive with the batch implementation. In this paper, we use the formulation of the SVM as a minimum enclosing ball (MEB) problem to provide a streaming SVM algorithm based off of the blurred ball cover originally proposed by Agarwal and Sharathkumar. Our implementation consistently outperforms existing streaming SVM approaches and provides higher accuracies than libSVM on several datasets, thus making it competitive with the standard SVM batch implementation.
[ { "version": "v1", "created": "Mon, 8 Dec 2014 08:46:07 GMT" } ]
2014-12-09T00:00:00
[ [ "Nathan", "Vikram", "" ], [ "Raghvendra", "Sharath", "" ] ]
TITLE: Accurate Streaming Support Vector Machines ABSTRACT: A widely-used tool for binary classification is the Support Vector Machine (SVM), a supervised learning technique that finds the "maximum margin" linear separator between the two classes. While SVMs have been well studied in the batch (offline) setting, there is considerably less work on the streaming (online) setting, which requires only a single pass over the data using sub-linear space. Existing streaming algorithms are not yet competitive with the batch implementation. In this paper, we use the formulation of the SVM as a minimum enclosing ball (MEB) problem to provide a streaming SVM algorithm based off of the blurred ball cover originally proposed by Agarwal and Sharathkumar. Our implementation consistently outperforms existing streaming SVM approaches and provides higher accuracies than libSVM on several datasets, thus making it competitive with the standard SVM batch implementation.
no_new_dataset
0.71022
1412.2697
Hocine Cherifi
Abdelkaher Ait Abdelouahad, Mohammed El Hassouni, Hocine Cherifi, and Driss Aboutajdine
Image quality assessment measure based on natural image statistics in the Tetrolet domain
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper deals with a reduced reference (RR) image quality measure based on natural image statistics modeling. For this purpose, Tetrolet transform is used since it provides a convenient way to capture local geometric structures. This transform is applied to both reference and distorted images. Then, Gaussian Scale Mixture (GSM) is proposed to model subbands in order to take account statistical dependencies between tetrolet coefficients. In order to quantify the visual degradation, a measure based on Kullback Leibler Divergence (KLD) is provided. The proposed measure was tested on the Cornell VCL A-57 dataset and compared with other measures according to FR-TV1 VQEG framework.
[ { "version": "v1", "created": "Mon, 8 Dec 2014 18:48:26 GMT" } ]
2014-12-09T00:00:00
[ [ "Abdelouahad", "Abdelkaher Ait", "" ], [ "Hassouni", "Mohammed El", "" ], [ "Cherifi", "Hocine", "" ], [ "Aboutajdine", "Driss", "" ] ]
TITLE: Image quality assessment measure based on natural image statistics in the Tetrolet domain ABSTRACT: This paper deals with a reduced reference (RR) image quality measure based on natural image statistics modeling. For this purpose, Tetrolet transform is used since it provides a convenient way to capture local geometric structures. This transform is applied to both reference and distorted images. Then, Gaussian Scale Mixture (GSM) is proposed to model subbands in order to take account statistical dependencies between tetrolet coefficients. In order to quantify the visual degradation, a measure based on Kullback Leibler Divergence (KLD) is provided. The proposed measure was tested on the Cornell VCL A-57 dataset and compared with other measures according to FR-TV1 VQEG framework.
no_new_dataset
0.711675
1412.2716
Paul Ginsparg
Daniel T. Citron and Paul Ginsparg
Patterns of Text Reuse in a Scientific Corpus
6 pages, plus 10 pages of supplementary material. To appear in PNAS (online 8 Dec 2014)
null
10.1073/pnas.1415135111
null
cs.DL physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the incidence of text "reuse" by researchers, via a systematic pairwise comparison of the text content of all articles deposited to arXiv.org from 1991--2012. We measure the global frequencies of three classes of text reuse, and measure how chronic text reuse is distributed among authors in the dataset. We infer a baseline for accepted practice, perhaps surprisingly permissive compared with other societal contexts, and a clearly delineated set of aberrant authors. We find a negative correlation between the amount of reused text in an article and its influence, as measured by subsequent citations. Finally, we consider the distribution of countries of origin of articles containing large amounts of reused text.
[ { "version": "v1", "created": "Mon, 8 Dec 2014 20:01:17 GMT" } ]
2014-12-09T00:00:00
[ [ "Citron", "Daniel T.", "" ], [ "Ginsparg", "Paul", "" ] ]
TITLE: Patterns of Text Reuse in a Scientific Corpus ABSTRACT: We consider the incidence of text "reuse" by researchers, via a systematic pairwise comparison of the text content of all articles deposited to arXiv.org from 1991--2012. We measure the global frequencies of three classes of text reuse, and measure how chronic text reuse is distributed among authors in the dataset. We infer a baseline for accepted practice, perhaps surprisingly permissive compared with other societal contexts, and a clearly delineated set of aberrant authors. We find a negative correlation between the amount of reused text in an article and its influence, as measured by subsequent citations. Finally, we consider the distribution of countries of origin of articles containing large amounts of reused text.
no_new_dataset
0.709403