id
large_stringlengths 9
16
| submitter
large_stringlengths 3
64
⌀ | authors
large_stringlengths 5
20.2k
| title
large_stringlengths 5
245
| comments
large_stringlengths 1
482
⌀ | journal-ref
large_stringlengths 4
382
⌀ | doi
large_stringlengths 9
151
⌀ | report-no
large_stringlengths 2
509
⌀ | categories
large_stringlengths 5
78
| license
large_stringclasses 9
values | abstract
large_stringlengths 83
3.55k
| versions
large listlengths 1
21
| update_date
timestamp[ms]date 2007-05-23 00:00:00
2025-05-30 00:00:00
| authors_parsed
large listlengths 1
1.35k
| prompt
large_stringlengths 166
3.64k
| label
stringclasses 2
values | prob
float64 0.5
0.73
|
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1302.4922
|
David Duvenaud
|
David Duvenaud, James Robert Lloyd, Roger Grosse, Joshua B. Tenenbaum,
Zoubin Ghahramani
|
Structure Discovery in Nonparametric Regression through Compositional
Kernel Search
|
9 pages, 7 figures, To appear in proceedings of the 2013
International Conference on Machine Learning
| null | null | null |
stat.ML cs.LG stat.ME
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Despite its importance, choosing the structural form of the kernel in
nonparametric regression remains a black art. We define a space of kernel
structures which are built compositionally by adding and multiplying a small
number of base kernels. We present a method for searching over this space of
structures which mirrors the scientific discovery process. The learned
structures can often decompose functions into interpretable components and
enable long-range extrapolation on time-series datasets. Our structure search
method outperforms many widely used kernels and kernel combination methods on a
variety of prediction tasks.
|
[
{
"version": "v1",
"created": "Wed, 20 Feb 2013 14:53:13 GMT"
},
{
"version": "v2",
"created": "Tue, 5 Mar 2013 11:48:12 GMT"
},
{
"version": "v3",
"created": "Fri, 5 Apr 2013 16:53:30 GMT"
},
{
"version": "v4",
"created": "Mon, 13 May 2013 13:10:31 GMT"
}
] | 2013-05-15T00:00:00
|
[
[
"Duvenaud",
"David",
""
],
[
"Lloyd",
"James Robert",
""
],
[
"Grosse",
"Roger",
""
],
[
"Tenenbaum",
"Joshua B.",
""
],
[
"Ghahramani",
"Zoubin",
""
]
] |
TITLE: Structure Discovery in Nonparametric Regression through Compositional
Kernel Search
ABSTRACT: Despite its importance, choosing the structural form of the kernel in
nonparametric regression remains a black art. We define a space of kernel
structures which are built compositionally by adding and multiplying a small
number of base kernels. We present a method for searching over this space of
structures which mirrors the scientific discovery process. The learned
structures can often decompose functions into interpretable components and
enable long-range extrapolation on time-series datasets. Our structure search
method outperforms many widely used kernels and kernel combination methods on a
variety of prediction tasks.
|
no_new_dataset
| 0.709598
|
1305.3038
|
Li Gongming
|
Gongming Li, Hong An
|
Phase-Priority based Directory Coherence for Multicore Processor
|
15 pages. International Journal of Computer Science, Engineering and
Information Technology, April 2013
| null |
10.5121/ijcseit.2013.3201
| null |
cs.AR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
As the number of cores in a single chip increases, a typical implementation
of coherence protocol adds significant hardware and complexity overhead.
Besides, the performance of CMP system depends on the data access latency,
which is highly affected by coherence protocol and on-chip interconnect. In
this paper, we propose PPB (Phase-Priority Based) cache coherence protocol, an
optimization of modern directory coherence protocol. We take advantage of the
observation that transient states occur in directory coherence protocol,
resulting in some unnecessary transient states and stalling. PPB cache
coherence protocol decouples a coherence transaction and introduces the idea of
phase message. This phase is considered as the priority of the message.
Additionally, we also add new priority-based arbitrators in on-chip network to
support PPB cache coherence protocol. This mechanism in on-chip network can
support effective cache access, which makes the on-chip network more efficient.
Our analysis on an execution-driven full system simulator using SPLASH-2
benchmark shows that PPB cache coherence outperforms a MESI based directory,
and the number of unnecessary transient states and stalling reduces up to 24%.
Also it reported the speedup of 7.4%. Other advantages of this strategy are
reduced delay of flits and significantly less energy consumption in on-chip
network.
|
[
{
"version": "v1",
"created": "Tue, 14 May 2013 06:56:10 GMT"
}
] | 2013-05-15T00:00:00
|
[
[
"Li",
"Gongming",
""
],
[
"An",
"Hong",
""
]
] |
TITLE: Phase-Priority based Directory Coherence for Multicore Processor
ABSTRACT: As the number of cores in a single chip increases, a typical implementation
of coherence protocol adds significant hardware and complexity overhead.
Besides, the performance of CMP system depends on the data access latency,
which is highly affected by coherence protocol and on-chip interconnect. In
this paper, we propose PPB (Phase-Priority Based) cache coherence protocol, an
optimization of modern directory coherence protocol. We take advantage of the
observation that transient states occur in directory coherence protocol,
resulting in some unnecessary transient states and stalling. PPB cache
coherence protocol decouples a coherence transaction and introduces the idea of
phase message. This phase is considered as the priority of the message.
Additionally, we also add new priority-based arbitrators in on-chip network to
support PPB cache coherence protocol. This mechanism in on-chip network can
support effective cache access, which makes the on-chip network more efficient.
Our analysis on an execution-driven full system simulator using SPLASH-2
benchmark shows that PPB cache coherence outperforms a MESI based directory,
and the number of unnecessary transient states and stalling reduces up to 24%.
Also it reported the speedup of 7.4%. Other advantages of this strategy are
reduced delay of flits and significantly less energy consumption in on-chip
network.
|
no_new_dataset
| 0.711644
|
1103.3123
|
Yong Lai
|
Yong Lai, Dayou Liu, Shengsheng Wang
|
Reduced Ordered Binary Decision Diagram with Implied Literals: A New
knowledge Compilation Approach
|
18 pages, 13 figures
| null |
10.1007/s10115-012-0525-6
| null |
cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Knowledge compilation is an approach to tackle the computational
intractability of general reasoning problems. According to this approach,
knowledge bases are converted off-line into a target compilation language which
is tractable for on-line querying. Reduced ordered binary decision diagram
(ROBDD) is one of the most influential target languages. We generalize ROBDD by
associating some implied literals in each node and the new language is called
reduced ordered binary decision diagram with implied literals (ROBDD-L). Then
we discuss a kind of subsets of ROBDD-L called ROBDD-i with precisely i implied
literals (0 \leq i \leq \infty). In particular, ROBDD-0 is isomorphic to ROBDD;
ROBDD-\infty requires that each node should be associated by the implied
literals as many as possible. We show that ROBDD-i has uniqueness over some
specific variables order, and ROBDD-\infty is the most succinct subset in
ROBDD-L and can meet most of the querying requirements involved in the
knowledge compilation map. Finally, we propose an ROBDD-i compilation algorithm
for any i and a ROBDD-\infty compilation algorithm. Based on them, we implement
a ROBDD-L package called BDDjLu and then get some conclusions from preliminary
experimental results: ROBDD-\infty is obviously smaller than ROBDD for all
benchmarks; ROBDD-\infty is smaller than the d-DNNF the benchmarks whose
compilation results are relatively small; it seems that it is better to
transform ROBDDs-\infty into FBDDs and ROBDDs rather than straight compile the
benchmarks.
|
[
{
"version": "v1",
"created": "Wed, 16 Mar 2011 08:12:05 GMT"
},
{
"version": "v2",
"created": "Thu, 24 Mar 2011 04:23:05 GMT"
}
] | 2013-05-14T00:00:00
|
[
[
"Lai",
"Yong",
""
],
[
"Liu",
"Dayou",
""
],
[
"Wang",
"Shengsheng",
""
]
] |
TITLE: Reduced Ordered Binary Decision Diagram with Implied Literals: A New
knowledge Compilation Approach
ABSTRACT: Knowledge compilation is an approach to tackle the computational
intractability of general reasoning problems. According to this approach,
knowledge bases are converted off-line into a target compilation language which
is tractable for on-line querying. Reduced ordered binary decision diagram
(ROBDD) is one of the most influential target languages. We generalize ROBDD by
associating some implied literals in each node and the new language is called
reduced ordered binary decision diagram with implied literals (ROBDD-L). Then
we discuss a kind of subsets of ROBDD-L called ROBDD-i with precisely i implied
literals (0 \leq i \leq \infty). In particular, ROBDD-0 is isomorphic to ROBDD;
ROBDD-\infty requires that each node should be associated by the implied
literals as many as possible. We show that ROBDD-i has uniqueness over some
specific variables order, and ROBDD-\infty is the most succinct subset in
ROBDD-L and can meet most of the querying requirements involved in the
knowledge compilation map. Finally, we propose an ROBDD-i compilation algorithm
for any i and a ROBDD-\infty compilation algorithm. Based on them, we implement
a ROBDD-L package called BDDjLu and then get some conclusions from preliminary
experimental results: ROBDD-\infty is obviously smaller than ROBDD for all
benchmarks; ROBDD-\infty is smaller than the d-DNNF the benchmarks whose
compilation results are relatively small; it seems that it is better to
transform ROBDDs-\infty into FBDDs and ROBDDs rather than straight compile the
benchmarks.
|
no_new_dataset
| 0.707815
|
1305.0540
|
Shang Shang
|
Shang Shang and Yuk Hui and Pan Hui and Paul Cuff and Sanjeev Kulkarni
|
Privacy Preserving Recommendation System Based on Groups
| null | null | null | null |
cs.IR
|
http://creativecommons.org/licenses/by/3.0/
|
Recommendation systems have received considerable attention in the recent
decades. Yet with the development of information technology and social media,
the risk in revealing private data to service providers has been a growing
concern to more and more users. Trade-offs between quality and privacy in
recommendation systems naturally arise. In this paper, we present a privacy
preserving recommendation framework based on groups. The main idea is to use
groups as a natural middleware to preserve users' privacy. A distributed
preference exchange algorithm is proposed to ensure the anonymity of data,
wherein the effective size of the anonymity set asymptotically approaches the
group size with time. We construct a hybrid collaborative filtering model based
on Markov random walks to provide recommendations and predictions to group
members. Experimental results on the MovieLens and Epinions datasets show that
our proposed methods outperform the baseline methods, L+ and ItemRank, two
state-of-the-art personalized recommendation algorithms, for both
recommendation precision and hit rate despite the absence of personal
preference information.
|
[
{
"version": "v1",
"created": "Thu, 2 May 2013 19:17:08 GMT"
},
{
"version": "v2",
"created": "Mon, 13 May 2013 19:50:41 GMT"
}
] | 2013-05-14T00:00:00
|
[
[
"Shang",
"Shang",
""
],
[
"Hui",
"Yuk",
""
],
[
"Hui",
"Pan",
""
],
[
"Cuff",
"Paul",
""
],
[
"Kulkarni",
"Sanjeev",
""
]
] |
TITLE: Privacy Preserving Recommendation System Based on Groups
ABSTRACT: Recommendation systems have received considerable attention in the recent
decades. Yet with the development of information technology and social media,
the risk in revealing private data to service providers has been a growing
concern to more and more users. Trade-offs between quality and privacy in
recommendation systems naturally arise. In this paper, we present a privacy
preserving recommendation framework based on groups. The main idea is to use
groups as a natural middleware to preserve users' privacy. A distributed
preference exchange algorithm is proposed to ensure the anonymity of data,
wherein the effective size of the anonymity set asymptotically approaches the
group size with time. We construct a hybrid collaborative filtering model based
on Markov random walks to provide recommendations and predictions to group
members. Experimental results on the MovieLens and Epinions datasets show that
our proposed methods outperform the baseline methods, L+ and ItemRank, two
state-of-the-art personalized recommendation algorithms, for both
recommendation precision and hit rate despite the absence of personal
preference information.
|
no_new_dataset
| 0.708843
|
1305.2788
|
Fabian Pedregosa
|
Fabian Pedregosa (INRIA Paris - Rocquencourt, INRIA Saclay - Ile de
France), Michael Eickenberg (INRIA Saclay - Ile de France, LNAO), Bertrand
Thirion (INRIA Saclay - Ile de France, LNAO), Alexandre Gramfort (LTCI)
|
HRF estimation improves sensitivity of fMRI encoding and decoding models
|
3nd International Workshop on Pattern Recognition in NeuroImaging
(2013)
| null | null | null |
cs.LG stat.AP
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Extracting activation patterns from functional Magnetic Resonance Images
(fMRI) datasets remains challenging in rapid-event designs due to the inherent
delay of blood oxygen level-dependent (BOLD) signal. The general linear model
(GLM) allows to estimate the activation from a design matrix and a fixed
hemodynamic response function (HRF). However, the HRF is known to vary
substantially between subjects and brain regions. In this paper, we propose a
model for jointly estimating the hemodynamic response function (HRF) and the
activation patterns via a low-rank representation of task effects.This model is
based on the linearity assumption behind the GLM and can be computed using
standard gradient-based solvers. We use the activation patterns computed by our
model as input data for encoding and decoding studies and report performance
improvement in both settings.
|
[
{
"version": "v1",
"created": "Mon, 13 May 2013 14:19:24 GMT"
}
] | 2013-05-14T00:00:00
|
[
[
"Pedregosa",
"Fabian",
"",
"INRIA Paris - Rocquencourt, INRIA Saclay - Ile de\n France"
],
[
"Eickenberg",
"Michael",
"",
"INRIA Saclay - Ile de France, LNAO"
],
[
"Thirion",
"Bertrand",
"",
"INRIA Saclay - Ile de France, LNAO"
],
[
"Gramfort",
"Alexandre",
"",
"LTCI"
]
] |
TITLE: HRF estimation improves sensitivity of fMRI encoding and decoding models
ABSTRACT: Extracting activation patterns from functional Magnetic Resonance Images
(fMRI) datasets remains challenging in rapid-event designs due to the inherent
delay of blood oxygen level-dependent (BOLD) signal. The general linear model
(GLM) allows to estimate the activation from a design matrix and a fixed
hemodynamic response function (HRF). However, the HRF is known to vary
substantially between subjects and brain regions. In this paper, we propose a
model for jointly estimating the hemodynamic response function (HRF) and the
activation patterns via a low-rank representation of task effects.This model is
based on the linearity assumption behind the GLM and can be computed using
standard gradient-based solvers. We use the activation patterns computed by our
model as input data for encoding and decoding studies and report performance
improvement in both settings.
|
no_new_dataset
| 0.71039
|
1305.2835
|
Kostas Tsichlas
|
Andreas Kosmatopoulos and Kostas Tsichlas
|
Dynamic Top-$k$ Dominating Queries
| null | null | null | null |
cs.CG cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Let $\mathcal{S}$ be a dataset of $n$ 2-dimensional points. The top-$k$
dominating query aims to report the $k$ points that dominate the most points in
$\mathcal{S}$. A point $p$ dominates a point $q$ iff all coordinates of $p$ are
smaller than or equal to those of $q$ and at least one of them is strictly
smaller. The top-$k$ dominating query combines the dominance concept of maxima
queries with the ranking function of top-$k$ queries and can be used as an
important tool in multi-criteria decision making systems. In this work, we
propose novel algorithms for answering semi-dynamic (insertions only) and fully
dynamic (insertions and deletions) top-$k$ dominating queries. To the best of
our knowledge, this is the first work towards handling (semi-)dynamic top-$k$
dominating queries that offers algorithms with asymptotic guarantees regarding
their time and space cost.
|
[
{
"version": "v1",
"created": "Mon, 13 May 2013 16:30:11 GMT"
}
] | 2013-05-14T00:00:00
|
[
[
"Kosmatopoulos",
"Andreas",
""
],
[
"Tsichlas",
"Kostas",
""
]
] |
TITLE: Dynamic Top-$k$ Dominating Queries
ABSTRACT: Let $\mathcal{S}$ be a dataset of $n$ 2-dimensional points. The top-$k$
dominating query aims to report the $k$ points that dominate the most points in
$\mathcal{S}$. A point $p$ dominates a point $q$ iff all coordinates of $p$ are
smaller than or equal to those of $q$ and at least one of them is strictly
smaller. The top-$k$ dominating query combines the dominance concept of maxima
queries with the ranking function of top-$k$ queries and can be used as an
important tool in multi-criteria decision making systems. In this work, we
propose novel algorithms for answering semi-dynamic (insertions only) and fully
dynamic (insertions and deletions) top-$k$ dominating queries. To the best of
our knowledge, this is the first work towards handling (semi-)dynamic top-$k$
dominating queries that offers algorithms with asymptotic guarantees regarding
their time and space cost.
|
new_dataset
| 0.68516
|
1108.4531
|
Jun He
|
Jun He and Tianshi Chen and Boris Mitavskiy
|
Novel Analysis of Population Scalability in Evolutionary Algorithms
| null | null | null | null |
cs.NE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Population-based evolutionary algorithms (EAs) have been widely applied to
solve various optimization problems. The question of how the performance of a
population-based EA depends on the population size arises naturally. The
performance of an EA may be evaluated by different measures, such as the
average convergence rate to the optimal set per generation or the expected
number of generations to encounter an optimal solution for the first time.
Population scalability is the performance ratio between a benchmark EA and
another EA using identical genetic operators but a larger population size.
Although intuitively the performance of an EA may improve if its population
size increases, currently there exist only a few case studies for simple
fitness functions. This paper aims at providing a general study for discrete
optimisation. A novel approach is introduced to analyse population scalability
using the fundamental matrix. The following two contributions summarize the
major results of the current article. (1) We demonstrate rigorously that for
elitist EAs with identical global mutation, using a lager population size
always increases the average rate of convergence to the optimal set; and yet,
sometimes, the expected number of generations needed to find an optimal
solution (measured by either the maximal value or the average value) may
increase, rather than decrease. (2) We establish sufficient and/or necessary
conditions for the superlinear scalability, that is, when the average
convergence rate of a $(\mu+\mu)$ EA (where $\mu\ge2$) is bigger than $\mu$
times that of a $(1+1)$ EA.
|
[
{
"version": "v1",
"created": "Tue, 23 Aug 2011 09:12:04 GMT"
},
{
"version": "v2",
"created": "Thu, 31 May 2012 08:54:40 GMT"
},
{
"version": "v3",
"created": "Mon, 3 Sep 2012 19:02:10 GMT"
},
{
"version": "v4",
"created": "Fri, 10 May 2013 10:29:08 GMT"
}
] | 2013-05-13T00:00:00
|
[
[
"He",
"Jun",
""
],
[
"Chen",
"Tianshi",
""
],
[
"Mitavskiy",
"Boris",
""
]
] |
TITLE: Novel Analysis of Population Scalability in Evolutionary Algorithms
ABSTRACT: Population-based evolutionary algorithms (EAs) have been widely applied to
solve various optimization problems. The question of how the performance of a
population-based EA depends on the population size arises naturally. The
performance of an EA may be evaluated by different measures, such as the
average convergence rate to the optimal set per generation or the expected
number of generations to encounter an optimal solution for the first time.
Population scalability is the performance ratio between a benchmark EA and
another EA using identical genetic operators but a larger population size.
Although intuitively the performance of an EA may improve if its population
size increases, currently there exist only a few case studies for simple
fitness functions. This paper aims at providing a general study for discrete
optimisation. A novel approach is introduced to analyse population scalability
using the fundamental matrix. The following two contributions summarize the
major results of the current article. (1) We demonstrate rigorously that for
elitist EAs with identical global mutation, using a lager population size
always increases the average rate of convergence to the optimal set; and yet,
sometimes, the expected number of generations needed to find an optimal
solution (measured by either the maximal value or the average value) may
increase, rather than decrease. (2) We establish sufficient and/or necessary
conditions for the superlinear scalability, that is, when the average
convergence rate of a $(\mu+\mu)$ EA (where $\mu\ge2$) is bigger than $\mu$
times that of a $(1+1)$ EA.
|
no_new_dataset
| 0.71145
|
1304.4682
|
Yuan Li
|
Yuan Li, Haoyu Gao, Mingmin Yang, Wanqiu Guan, Haixin Ma, Weining
Qian, Zhigang Cao, Xiaoguang Yang
|
What are Chinese Talking about in Hot Weibos?
| null | null | null | null |
cs.SI cs.CY physics.soc-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
SinaWeibo is a Twitter-like social network service emerging in China in
recent years. People can post weibos (microblogs) and communicate with others
on it. Based on a dataset of 650 million weibos from August 2009 to January
2012 crawled from APIs of SinaWeibo, we study the hot ones that have been
reposted for at least 1000 times. We find that hot weibos can be roughly
classified into eight categories, i.e. Entertainment & Fashion, Hot Social
Events, Leisure & Mood, Life & Health, Seeking for Help, Sales Promotion,
Fengshui & Fortune and Deleted Weibos. In particular, Leisure & Mood and Hot
Social Events account for almost 65% of all the hot weibos. This reflects very
well the fundamental dual-structure of the current society of China: On the one
hand, economy has made a great progress and quite a part of people are now
living a relatively prosperous and fairly easy life. On the other hand, there
still exist quite a lot of serious social problems, such as government
corruptions and environmental pollutions. It is also shown that users' posting
and reposting behaviors are greatly affected by their identity factors (gender,
verification status, and regional location). For instance, (1) Two thirds of
the hot weibos are created by male users. (2) Although verified users account
for only 0.1% in SinaWeibo, 46.5% of the hot weibos are contributed by them.
Very interestingly, 39.2% are written by SPA users. A more or less pathetic
fact is that only 14.4% of the hot weibos are created by grassroots (individual
users that are neither SPA nor verified). (3) Users from different areas of
China have distinct posting and reposting behaviors which usually reflect very
their local cultures. Homophily is also examined for people's reposting
behaviors.
|
[
{
"version": "v1",
"created": "Wed, 17 Apr 2013 04:25:33 GMT"
},
{
"version": "v2",
"created": "Fri, 10 May 2013 09:52:35 GMT"
}
] | 2013-05-13T00:00:00
|
[
[
"Li",
"Yuan",
""
],
[
"Gao",
"Haoyu",
""
],
[
"Yang",
"Mingmin",
""
],
[
"Guan",
"Wanqiu",
""
],
[
"Ma",
"Haixin",
""
],
[
"Qian",
"Weining",
""
],
[
"Cao",
"Zhigang",
""
],
[
"Yang",
"Xiaoguang",
""
]
] |
TITLE: What are Chinese Talking about in Hot Weibos?
ABSTRACT: SinaWeibo is a Twitter-like social network service emerging in China in
recent years. People can post weibos (microblogs) and communicate with others
on it. Based on a dataset of 650 million weibos from August 2009 to January
2012 crawled from APIs of SinaWeibo, we study the hot ones that have been
reposted for at least 1000 times. We find that hot weibos can be roughly
classified into eight categories, i.e. Entertainment & Fashion, Hot Social
Events, Leisure & Mood, Life & Health, Seeking for Help, Sales Promotion,
Fengshui & Fortune and Deleted Weibos. In particular, Leisure & Mood and Hot
Social Events account for almost 65% of all the hot weibos. This reflects very
well the fundamental dual-structure of the current society of China: On the one
hand, economy has made a great progress and quite a part of people are now
living a relatively prosperous and fairly easy life. On the other hand, there
still exist quite a lot of serious social problems, such as government
corruptions and environmental pollutions. It is also shown that users' posting
and reposting behaviors are greatly affected by their identity factors (gender,
verification status, and regional location). For instance, (1) Two thirds of
the hot weibos are created by male users. (2) Although verified users account
for only 0.1% in SinaWeibo, 46.5% of the hot weibos are contributed by them.
Very interestingly, 39.2% are written by SPA users. A more or less pathetic
fact is that only 14.4% of the hot weibos are created by grassroots (individual
users that are neither SPA nor verified). (3) Users from different areas of
China have distinct posting and reposting behaviors which usually reflect very
their local cultures. Homophily is also examined for people's reposting
behaviors.
|
no_new_dataset
| 0.690507
|
1305.1956
|
Andrew Lan
|
Andrew S. Lan, Christoph Studer, Andrew E. Waters and Richard G.
Baraniuk
|
Joint Topic Modeling and Factor Analysis of Textual Information and
Graded Response Data
| null | null | null | null |
stat.ML cs.LG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Modern machine learning methods are critical to the development of
large-scale personalized learning systems that cater directly to the needs of
individual learners. The recently developed SPARse Factor Analysis (SPARFA)
framework provides a new statistical model and algorithms for machine
learning-based learning analytics, which estimate a learner's knowledge of the
latent concepts underlying a domain, and content analytics, which estimate the
relationships among a collection of questions and the latent concepts. SPARFA
estimates these quantities given only the binary-valued graded responses to a
collection of questions. In order to better interpret the estimated latent
concepts, SPARFA relies on a post-processing step that utilizes user-defined
tags (e.g., topics or keywords) available for each question. In this paper, we
relax the need for user-defined tags by extending SPARFA to jointly process
both graded learner responses and the text of each question and its associated
answer(s) or other feedback. Our purely data-driven approach (i) enhances the
interpretability of the estimated latent concepts without the need of
explicitly generating a set of tags or performing a post-processing step, (ii)
improves the prediction performance of SPARFA, and (iii) scales to large
test/assessments where human annotation would prove burdensome. We demonstrate
the efficacy of the proposed approach on two real educational datasets.
|
[
{
"version": "v1",
"created": "Wed, 8 May 2013 20:44:55 GMT"
},
{
"version": "v2",
"created": "Fri, 10 May 2013 01:05:09 GMT"
}
] | 2013-05-13T00:00:00
|
[
[
"Lan",
"Andrew S.",
""
],
[
"Studer",
"Christoph",
""
],
[
"Waters",
"Andrew E.",
""
],
[
"Baraniuk",
"Richard G.",
""
]
] |
TITLE: Joint Topic Modeling and Factor Analysis of Textual Information and
Graded Response Data
ABSTRACT: Modern machine learning methods are critical to the development of
large-scale personalized learning systems that cater directly to the needs of
individual learners. The recently developed SPARse Factor Analysis (SPARFA)
framework provides a new statistical model and algorithms for machine
learning-based learning analytics, which estimate a learner's knowledge of the
latent concepts underlying a domain, and content analytics, which estimate the
relationships among a collection of questions and the latent concepts. SPARFA
estimates these quantities given only the binary-valued graded responses to a
collection of questions. In order to better interpret the estimated latent
concepts, SPARFA relies on a post-processing step that utilizes user-defined
tags (e.g., topics or keywords) available for each question. In this paper, we
relax the need for user-defined tags by extending SPARFA to jointly process
both graded learner responses and the text of each question and its associated
answer(s) or other feedback. Our purely data-driven approach (i) enhances the
interpretability of the estimated latent concepts without the need of
explicitly generating a set of tags or performing a post-processing step, (ii)
improves the prediction performance of SPARFA, and (iii) scales to large
test/assessments where human annotation would prove burdensome. We demonstrate
the efficacy of the proposed approach on two real educational datasets.
|
no_new_dataset
| 0.710057
|
1305.2269
|
Fang Wang
|
Fang Wang and Yi Li
|
Beyond Physical Connections: Tree Models in Human Pose Estimation
|
CVPR 2013
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Simple tree models for articulated objects prevails in the last decade.
However, it is also believed that these simple tree models are not capable of
capturing large variations in many scenarios, such as human pose estimation.
This paper attempts to address three questions: 1) are simple tree models
sufficient? more specifically, 2) how to use tree models effectively in human
pose estimation? and 3) how shall we use combined parts together with single
parts efficiently?
Assuming we have a set of single parts and combined parts, and the goal is to
estimate a joint distribution of their locations. We surprisingly find that no
latent variables are introduced in the Leeds Sport Dataset (LSP) during
learning latent trees for deformable model, which aims at approximating the
joint distributions of body part locations using minimal tree structure. This
suggests one can straightforwardly use a mixed representation of single and
combined parts to approximate their joint distribution in a simple tree model.
As such, one only needs to build Visual Categories of the combined parts, and
then perform inference on the learned latent tree. Our method outperformed the
state of the art on the LSP, both in the scenarios when the training images are
from the same dataset and from the PARSE dataset. Experiments on animal images
from the VOC challenge further support our findings.
|
[
{
"version": "v1",
"created": "Fri, 10 May 2013 07:09:14 GMT"
}
] | 2013-05-13T00:00:00
|
[
[
"Wang",
"Fang",
""
],
[
"Li",
"Yi",
""
]
] |
TITLE: Beyond Physical Connections: Tree Models in Human Pose Estimation
ABSTRACT: Simple tree models for articulated objects prevails in the last decade.
However, it is also believed that these simple tree models are not capable of
capturing large variations in many scenarios, such as human pose estimation.
This paper attempts to address three questions: 1) are simple tree models
sufficient? more specifically, 2) how to use tree models effectively in human
pose estimation? and 3) how shall we use combined parts together with single
parts efficiently?
Assuming we have a set of single parts and combined parts, and the goal is to
estimate a joint distribution of their locations. We surprisingly find that no
latent variables are introduced in the Leeds Sport Dataset (LSP) during
learning latent trees for deformable model, which aims at approximating the
joint distributions of body part locations using minimal tree structure. This
suggests one can straightforwardly use a mixed representation of single and
combined parts to approximate their joint distribution in a simple tree model.
As such, one only needs to build Visual Categories of the combined parts, and
then perform inference on the learned latent tree. Our method outperformed the
state of the art on the LSP, both in the scenarios when the training images are
from the same dataset and from the PARSE dataset. Experiments on animal images
from the VOC challenge further support our findings.
|
no_new_dataset
| 0.709416
|
1305.2388
|
Ehsan Saboori Mr.
|
Shafigh Parsazad, Ehsan Saboori, Amin Allahyar
|
Fast Feature Reduction in intrusion detection datasets
| null |
Parsazad, Shafigh; Saboori, Ehsan; Allahyar, Amin; , "Fast Feature
Reduction in intrusion detection datasets," MIPRO, 2012 Proceedings of the
35th International Convention , vol., no., pp.1023-1029, 21-25 May 2012
| null | null |
cs.CR cs.LG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In the most intrusion detection systems (IDS), a system tries to learn
characteristics of different type of attacks by analyzing packets that sent or
received in network. These packets have a lot of features. But not all of them
is required to be analyzed to detect that specific type of attack. Detection
speed and computational cost is another vital matter here, because in these
types of problems, datasets are very huge regularly. In this paper we tried to
propose a very simple and fast feature selection method to eliminate features
with no helpful information on them. Result faster learning in process of
redundant feature omission. We compared our proposed method with three most
successful similarity based feature selection algorithm including Correlation
Coefficient, Least Square Regression Error and Maximal Information Compression
Index. After that we used recommended features by each of these algorithms in
two popular classifiers including: Bayes and KNN classifier to measure the
quality of the recommendations. Experimental result shows that although the
proposed method can't outperform evaluated algorithms with high differences in
accuracy, but in computational cost it has huge superiority over them.
|
[
{
"version": "v1",
"created": "Mon, 1 Apr 2013 05:27:47 GMT"
}
] | 2013-05-13T00:00:00
|
[
[
"Parsazad",
"Shafigh",
""
],
[
"Saboori",
"Ehsan",
""
],
[
"Allahyar",
"Amin",
""
]
] |
TITLE: Fast Feature Reduction in intrusion detection datasets
ABSTRACT: In the most intrusion detection systems (IDS), a system tries to learn
characteristics of different type of attacks by analyzing packets that sent or
received in network. These packets have a lot of features. But not all of them
is required to be analyzed to detect that specific type of attack. Detection
speed and computational cost is another vital matter here, because in these
types of problems, datasets are very huge regularly. In this paper we tried to
propose a very simple and fast feature selection method to eliminate features
with no helpful information on them. Result faster learning in process of
redundant feature omission. We compared our proposed method with three most
successful similarity based feature selection algorithm including Correlation
Coefficient, Least Square Regression Error and Maximal Information Compression
Index. After that we used recommended features by each of these algorithms in
two popular classifiers including: Bayes and KNN classifier to measure the
quality of the recommendations. Experimental result shows that although the
proposed method can't outperform evaluated algorithms with high differences in
accuracy, but in computational cost it has huge superiority over them.
|
no_new_dataset
| 0.708421
|
1305.1946
|
Luca Mazzola
|
Elena Camossi, Paola Villa, Luca Mazzola
|
Semantic-based Anomalous Pattern Discovery in Moving Object Trajectories
| null | null | null | null |
cs.AI cs.IR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this work, we investigate a novel semantic approach for pattern discovery
in trajectories that, relying on ontologies, enhances object movement
information with event semantics. The approach can be applied to the detection
of movement patterns and behaviors whenever the semantics of events occurring
along the trajectory is, explicitly or implicitly, available. In particular, we
tested it against an exacting case scenario in maritime surveillance, i.e., the
discovery of suspicious container transportations.
The methodology we have developed entails the formalization of the
application domain through a domain ontology, extending the Moving Object
Ontology (MOO) described in this paper. Afterwards, movement patterns have to
be formalized, either as Description Logic (DL) axioms or queries, enabling the
retrieval of the trajectories that follow the patterns.
In our experimental evaluation, we have considered a real world dataset of 18
Million of container events describing the deed undertaken in a port to
accomplish the shipping (e.g., loading on a vessel, export operation).
Leveraging events, we have reconstructed almost 300 thousand container
trajectories referring to 50 thousand containers travelling along three years.
We have formalized the anomalous itinerary patterns as DL axioms, testing
different ontology APIs and DL reasoners to retrieve the suspicious
transportations.
Our experiments demonstrate that the approach is feasible and efficient. In
particular, the joint use of Pellet and SPARQL-DL enables to detect the
trajectories following a given pattern in a reasonable time with big size
datasets.
|
[
{
"version": "v1",
"created": "Wed, 8 May 2013 20:14:03 GMT"
}
] | 2013-05-10T00:00:00
|
[
[
"Camossi",
"Elena",
""
],
[
"Villa",
"Paola",
""
],
[
"Mazzola",
"Luca",
""
]
] |
TITLE: Semantic-based Anomalous Pattern Discovery in Moving Object Trajectories
ABSTRACT: In this work, we investigate a novel semantic approach for pattern discovery
in trajectories that, relying on ontologies, enhances object movement
information with event semantics. The approach can be applied to the detection
of movement patterns and behaviors whenever the semantics of events occurring
along the trajectory is, explicitly or implicitly, available. In particular, we
tested it against an exacting case scenario in maritime surveillance, i.e., the
discovery of suspicious container transportations.
The methodology we have developed entails the formalization of the
application domain through a domain ontology, extending the Moving Object
Ontology (MOO) described in this paper. Afterwards, movement patterns have to
be formalized, either as Description Logic (DL) axioms or queries, enabling the
retrieval of the trajectories that follow the patterns.
In our experimental evaluation, we have considered a real world dataset of 18
Million of container events describing the deed undertaken in a port to
accomplish the shipping (e.g., loading on a vessel, export operation).
Leveraging events, we have reconstructed almost 300 thousand container
trajectories referring to 50 thousand containers travelling along three years.
We have formalized the anomalous itinerary patterns as DL axioms, testing
different ontology APIs and DL reasoners to retrieve the suspicious
transportations.
Our experiments demonstrate that the approach is feasible and efficient. In
particular, the joint use of Pellet and SPARQL-DL enables to detect the
trajectories following a given pattern in a reasonable time with big size
datasets.
|
new_dataset
| 0.716063
|
1305.1657
|
Emanuele Goldoni
|
Alberto Savioli, Emanuele Goldoni, Pietro Savazzi, Paolo Gamba
|
Low Complexity Indoor Localization in Wireless Sensor Networks by UWB
and Inertial Data Fusion
| null | null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Precise indoor localization of moving targets is a challenging activity which
cannot be easily accomplished without combining different sources of
information. In this sense, the combination of different data sources with an
appropriate filter might improve both positioning and tracking performance.
This work proposes an algorithm for hybrid positioning in Wireless Sensor
Networks based on data fusion of UWB and inertial information. A constant-gain
Steady State Kalman Filter is used to bound the complexity of the system,
simplifying its implementation on a typical low-power WSN node. The performance
of the presented data fusion algorithm has been evaluated in a realistic
scenario using both simulations and realistic datasets. The obtained results
prove the validity of this approach, which efficiently fuses different
positioning data sources, reducing the localization error.
|
[
{
"version": "v1",
"created": "Tue, 7 May 2013 21:43:07 GMT"
}
] | 2013-05-09T00:00:00
|
[
[
"Savioli",
"Alberto",
""
],
[
"Goldoni",
"Emanuele",
""
],
[
"Savazzi",
"Pietro",
""
],
[
"Gamba",
"Paolo",
""
]
] |
TITLE: Low Complexity Indoor Localization in Wireless Sensor Networks by UWB
and Inertial Data Fusion
ABSTRACT: Precise indoor localization of moving targets is a challenging activity which
cannot be easily accomplished without combining different sources of
information. In this sense, the combination of different data sources with an
appropriate filter might improve both positioning and tracking performance.
This work proposes an algorithm for hybrid positioning in Wireless Sensor
Networks based on data fusion of UWB and inertial information. A constant-gain
Steady State Kalman Filter is used to bound the complexity of the system,
simplifying its implementation on a typical low-power WSN node. The performance
of the presented data fusion algorithm has been evaluated in a realistic
scenario using both simulations and realistic datasets. The obtained results
prove the validity of this approach, which efficiently fuses different
positioning data sources, reducing the localization error.
|
no_new_dataset
| 0.713063
|
1305.1372
|
Fan Min
|
Fan Min and William Zhu
|
Cold-start recommendation through granular association rules
|
Submitted to Joint Rough Sets 2013
| null | null | null |
cs.IR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Recommender systems are popular in e-commerce as they suggest items of
interest to users. Researchers have addressed the cold-start problem where
either the user or the item is new. However, the situation with both new user
and new item has seldom been considered. In this paper, we propose a cold-start
recommendation approach to this situation based on granular association rules.
Specifically, we provide a means for describing users and items through
information granules, a means for generating association rules between users
and items, and a means for recommending items to users using these rules.
Experiments are undertaken on a publicly available dataset MovieLens. Results
indicate that rule sets perform similarly on the training and the testing sets,
and the appropriate setting of granule is essential to the application of
granular association rules.
|
[
{
"version": "v1",
"created": "Tue, 7 May 2013 01:08:27 GMT"
}
] | 2013-05-08T00:00:00
|
[
[
"Min",
"Fan",
""
],
[
"Zhu",
"William",
""
]
] |
TITLE: Cold-start recommendation through granular association rules
ABSTRACT: Recommender systems are popular in e-commerce as they suggest items of
interest to users. Researchers have addressed the cold-start problem where
either the user or the item is new. However, the situation with both new user
and new item has seldom been considered. In this paper, we propose a cold-start
recommendation approach to this situation based on granular association rules.
Specifically, we provide a means for describing users and items through
information granules, a means for generating association rules between users
and items, and a means for recommending items to users using these rules.
Experiments are undertaken on a publicly available dataset MovieLens. Results
indicate that rule sets perform similarly on the training and the testing sets,
and the appropriate setting of granule is essential to the application of
granular association rules.
|
no_new_dataset
| 0.712795
|
1305.1609
|
Florin Rusu
|
Yu Cheng and Florin Rusu
|
Formal Representation of the SS-DB Benchmark and Experimental Evaluation
in EXTASCID
|
32 pages, 3 figures
| null | null | null |
cs.DB
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Evaluating the performance of scientific data processing systems is a
difficult task considering the plethora of application-specific solutions
available in this landscape and the lack of a generally-accepted benchmark. The
dual structure of scientific data coupled with the complex nature of processing
complicate the evaluation procedure further. SS-DB is the first attempt to
define a general benchmark for complex scientific processing over raw and
derived data. It fails to draw sufficient attention though because of the
ambiguous plain language specification and the extraordinary SciDB results. In
this paper, we remedy the shortcomings of the original SS-DB specification by
providing a formal representation in terms of ArrayQL algebra operators and
ArrayQL/SciQL constructs. These are the first formal representations of the
SS-DB benchmark. Starting from the formal representation, we give a reference
implementation and present benchmark results in EXTASCID, a novel system for
scientific data processing. EXTASCID is complete in providing native support
both for array and relational data and extensible in executing any user code
inside the system by the means of a configurable metaoperator. These features
result in an order of magnitude improvement over SciDB at data loading,
extracting derived data, and operations over derived data.
|
[
{
"version": "v1",
"created": "Tue, 7 May 2013 19:07:28 GMT"
}
] | 2013-05-08T00:00:00
|
[
[
"Cheng",
"Yu",
""
],
[
"Rusu",
"Florin",
""
]
] |
TITLE: Formal Representation of the SS-DB Benchmark and Experimental Evaluation
in EXTASCID
ABSTRACT: Evaluating the performance of scientific data processing systems is a
difficult task considering the plethora of application-specific solutions
available in this landscape and the lack of a generally-accepted benchmark. The
dual structure of scientific data coupled with the complex nature of processing
complicate the evaluation procedure further. SS-DB is the first attempt to
define a general benchmark for complex scientific processing over raw and
derived data. It fails to draw sufficient attention though because of the
ambiguous plain language specification and the extraordinary SciDB results. In
this paper, we remedy the shortcomings of the original SS-DB specification by
providing a formal representation in terms of ArrayQL algebra operators and
ArrayQL/SciQL constructs. These are the first formal representations of the
SS-DB benchmark. Starting from the formal representation, we give a reference
implementation and present benchmark results in EXTASCID, a novel system for
scientific data processing. EXTASCID is complete in providing native support
both for array and relational data and extensible in executing any user code
inside the system by the means of a configurable metaoperator. These features
result in an order of magnitude improvement over SciDB at data loading,
extracting derived data, and operations over derived data.
|
no_new_dataset
| 0.70724
|
1210.1207
|
Hema Swetha Koppula
|
Hema Swetha Koppula, Rudhir Gupta, Ashutosh Saxena
|
Learning Human Activities and Object Affordances from RGB-D Videos
|
arXiv admin note: substantial text overlap with arXiv:1208.0967
| null | null | null |
cs.RO cs.AI cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Understanding human activities and object affordances are two very important
skills, especially for personal robots which operate in human environments. In
this work, we consider the problem of extracting a descriptive labeling of the
sequence of sub-activities being performed by a human, and more importantly, of
their interactions with the objects in the form of associated affordances.
Given a RGB-D video, we jointly model the human activities and object
affordances as a Markov random field where the nodes represent objects and
sub-activities, and the edges represent the relationships between object
affordances, their relations with sub-activities, and their evolution over
time. We formulate the learning problem using a structural support vector
machine (SSVM) approach, where labelings over various alternate temporal
segmentations are considered as latent variables. We tested our method on a
challenging dataset comprising 120 activity videos collected from 4 subjects,
and obtained an accuracy of 79.4% for affordance, 63.4% for sub-activity and
75.0% for high-level activity labeling. We then demonstrate the use of such
descriptive labeling in performing assistive tasks by a PR2 robot.
|
[
{
"version": "v1",
"created": "Thu, 4 Oct 2012 04:53:42 GMT"
},
{
"version": "v2",
"created": "Mon, 6 May 2013 01:13:39 GMT"
}
] | 2013-05-07T00:00:00
|
[
[
"Koppula",
"Hema Swetha",
""
],
[
"Gupta",
"Rudhir",
""
],
[
"Saxena",
"Ashutosh",
""
]
] |
TITLE: Learning Human Activities and Object Affordances from RGB-D Videos
ABSTRACT: Understanding human activities and object affordances are two very important
skills, especially for personal robots which operate in human environments. In
this work, we consider the problem of extracting a descriptive labeling of the
sequence of sub-activities being performed by a human, and more importantly, of
their interactions with the objects in the form of associated affordances.
Given a RGB-D video, we jointly model the human activities and object
affordances as a Markov random field where the nodes represent objects and
sub-activities, and the edges represent the relationships between object
affordances, their relations with sub-activities, and their evolution over
time. We formulate the learning problem using a structural support vector
machine (SSVM) approach, where labelings over various alternate temporal
segmentations are considered as latent variables. We tested our method on a
challenging dataset comprising 120 activity videos collected from 4 subjects,
and obtained an accuracy of 79.4% for affordance, 63.4% for sub-activity and
75.0% for high-level activity labeling. We then demonstrate the use of such
descriptive labeling in performing assistive tasks by a PR2 robot.
|
new_dataset
| 0.543348
|
1212.2278
|
Carl Vondrick
|
Carl Vondrick and Aditya Khosla and Tomasz Malisiewicz and Antonio
Torralba
|
Inverting and Visualizing Features for Object Detection
|
This paper is a preprint of our conference paper. We have made it
available early in the hopes that others find it useful
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We introduce algorithms to visualize feature spaces used by object detectors.
The tools in this paper allow a human to put on `HOG goggles' and perceive the
visual world as a HOG based object detector sees it. We found that these
visualizations allow us to analyze object detection systems in new ways and
gain new insight into the detector's failures. For example, when we visualize
the features for high scoring false alarms, we discovered that, although they
are clearly wrong in image space, they do look deceptively similar to true
positives in feature space. This result suggests that many of these false
alarms are caused by our choice of feature space, and indicates that creating a
better learning algorithm or building bigger datasets is unlikely to correct
these errors. By visualizing feature spaces, we can gain a more intuitive
understanding of our detection systems.
|
[
{
"version": "v1",
"created": "Tue, 11 Dec 2012 01:59:51 GMT"
},
{
"version": "v2",
"created": "Sun, 5 May 2013 18:17:44 GMT"
}
] | 2013-05-07T00:00:00
|
[
[
"Vondrick",
"Carl",
""
],
[
"Khosla",
"Aditya",
""
],
[
"Malisiewicz",
"Tomasz",
""
],
[
"Torralba",
"Antonio",
""
]
] |
TITLE: Inverting and Visualizing Features for Object Detection
ABSTRACT: We introduce algorithms to visualize feature spaces used by object detectors.
The tools in this paper allow a human to put on `HOG goggles' and perceive the
visual world as a HOG based object detector sees it. We found that these
visualizations allow us to analyze object detection systems in new ways and
gain new insight into the detector's failures. For example, when we visualize
the features for high scoring false alarms, we discovered that, although they
are clearly wrong in image space, they do look deceptively similar to true
positives in feature space. This result suggests that many of these false
alarms are caused by our choice of feature space, and indicates that creating a
better learning algorithm or building bigger datasets is unlikely to correct
these errors. By visualizing feature spaces, we can gain a more intuitive
understanding of our detection systems.
|
no_new_dataset
| 0.712226
|
1305.0896
|
Hemal Shah Hemal Shah
|
Hemal Shah, Yogeshwar Kosta, Vikrant Patel
|
Characterizing and Evaluation :Temporal properties of real and synthetic
datasets for DTN
|
10 pages
| null | null | null |
cs.NI
|
http://creativecommons.org/licenses/by/3.0/
|
Nodes movements play a significant role in disseminating messages in the
sparse mobile ad-hoc network. In the network scenarios, where traditional
end-to-end paths do not exist, mobility creates opportunities for nodes to
connect and communicate when they are encountered. A series of encountering
opportunities spread a message among many nodes and eventually deliver to the
destination. Further improvements to the performance of message delivery can
come from exploiting temporal mobility properties. It is modeled as time
varying graph, where, moving nodes are considered as vertices and contact
opportunity to other nodes as an edge. The paper discusses about
characterization and design of the temporal algorithm. Then, evaluating
temporal distance, diameter and centrality of real and synthetic mobility data
sets.
|
[
{
"version": "v1",
"created": "Sat, 4 May 2013 08:42:47 GMT"
}
] | 2013-05-07T00:00:00
|
[
[
"Shah",
"Hemal",
""
],
[
"Kosta",
"Yogeshwar",
""
],
[
"Patel",
"Vikrant",
""
]
] |
TITLE: Characterizing and Evaluation :Temporal properties of real and synthetic
datasets for DTN
ABSTRACT: Nodes movements play a significant role in disseminating messages in the
sparse mobile ad-hoc network. In the network scenarios, where traditional
end-to-end paths do not exist, mobility creates opportunities for nodes to
connect and communicate when they are encountered. A series of encountering
opportunities spread a message among many nodes and eventually deliver to the
destination. Further improvements to the performance of message delivery can
come from exploiting temporal mobility properties. It is modeled as time
varying graph, where, moving nodes are considered as vertices and contact
opportunity to other nodes as an edge. The paper discusses about
characterization and design of the temporal algorithm. Then, evaluating
temporal distance, diameter and centrality of real and synthetic mobility data
sets.
|
no_new_dataset
| 0.708175
|
1305.0922
|
M.M.A. Hashem
|
M.A. Khayer Azad, Md. Shafiqul Islam and M.M.A. Hashem
|
On Comparison between Evolutionary Programming Network-based Learning
and Novel Evolution Strategy Algorithm-based Learning
| null |
Procs. of the 3rd International Conference on Electrical,
Electronics and Computer Engineering (ICEECE 2003), pp. 213-218, Dhaka,
Bangladesh, December 22-24, (2003)
| null | null |
cs.NE cs.LG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper presents two different evolutionary systems - Evolutionary
Programming Network (EPNet) and Novel Evolutions Strategy (NES) Algorithm.
EPNet does both training and architecture evolution simultaneously, whereas NES
does a fixed network and only trains the network. Five mutation operators
proposed in EPNet to reflect the emphasis on evolving ANNs behaviors. Close
behavioral links between parents and their offspring are maintained by various
mutations, such as partial training and node splitting. On the other hand, NES
uses two new genetic operators - subpopulation-based max-mean arithmetical
crossover and time-variant mutation. The above-mentioned two algorithms have
been tested on a number of benchmark problems, such as the medical diagnosis
problems (breast cancer, diabetes, and heart disease). The results and the
comparison between them are also presented in this paper.
|
[
{
"version": "v1",
"created": "Sat, 4 May 2013 14:06:48 GMT"
}
] | 2013-05-07T00:00:00
|
[
[
"Azad",
"M. A. Khayer",
""
],
[
"Islam",
"Md. Shafiqul",
""
],
[
"Hashem",
"M. M. A.",
""
]
] |
TITLE: On Comparison between Evolutionary Programming Network-based Learning
and Novel Evolution Strategy Algorithm-based Learning
ABSTRACT: This paper presents two different evolutionary systems - Evolutionary
Programming Network (EPNet) and Novel Evolutions Strategy (NES) Algorithm.
EPNet does both training and architecture evolution simultaneously, whereas NES
does a fixed network and only trains the network. Five mutation operators
proposed in EPNet to reflect the emphasis on evolving ANNs behaviors. Close
behavioral links between parents and their offspring are maintained by various
mutations, such as partial training and node splitting. On the other hand, NES
uses two new genetic operators - subpopulation-based max-mean arithmetical
crossover and time-variant mutation. The above-mentioned two algorithms have
been tested on a number of benchmark problems, such as the medical diagnosis
problems (breast cancer, diabetes, and heart disease). The results and the
comparison between them are also presented in this paper.
|
no_new_dataset
| 0.711281
|
1305.1002
|
Ji Won Yoon
|
Ji Won Yoon and Nial Friel
|
Efficient Estimation of the number of neighbours in Probabilistic K
Nearest Neighbour Classification
| null | null | null | null |
cs.LG stat.ML
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Probabilistic k-nearest neighbour (PKNN) classification has been introduced
to improve the performance of original k-nearest neighbour (KNN) classification
algorithm by explicitly modelling uncertainty in the classification of each
feature vector. However, an issue common to both KNN and PKNN is to select the
optimal number of neighbours, $k$. The contribution of this paper is to
incorporate the uncertainty in $k$ into the decision making, and in so doing
use Bayesian model averaging to provide improved classification. Indeed the
problem of assessing the uncertainty in $k$ can be viewed as one of statistical
model selection which is one of the most important technical issues in the
statistics and machine learning domain. In this paper, a new functional
approximation algorithm is proposed to reconstruct the density of the model
(order) without relying on time consuming Monte Carlo simulations. In addition,
this algorithm avoids cross validation by adopting Bayesian framework. The
performance of this algorithm yielded very good performance on several real
experimental datasets.
|
[
{
"version": "v1",
"created": "Sun, 5 May 2013 09:44:08 GMT"
}
] | 2013-05-07T00:00:00
|
[
[
"Yoon",
"Ji Won",
""
],
[
"Friel",
"Nial",
""
]
] |
TITLE: Efficient Estimation of the number of neighbours in Probabilistic K
Nearest Neighbour Classification
ABSTRACT: Probabilistic k-nearest neighbour (PKNN) classification has been introduced
to improve the performance of original k-nearest neighbour (KNN) classification
algorithm by explicitly modelling uncertainty in the classification of each
feature vector. However, an issue common to both KNN and PKNN is to select the
optimal number of neighbours, $k$. The contribution of this paper is to
incorporate the uncertainty in $k$ into the decision making, and in so doing
use Bayesian model averaging to provide improved classification. Indeed the
problem of assessing the uncertainty in $k$ can be viewed as one of statistical
model selection which is one of the most important technical issues in the
statistics and machine learning domain. In this paper, a new functional
approximation algorithm is proposed to reconstruct the density of the model
(order) without relying on time consuming Monte Carlo simulations. In addition,
this algorithm avoids cross validation by adopting Bayesian framework. The
performance of this algorithm yielded very good performance on several real
experimental datasets.
|
no_new_dataset
| 0.710396
|
1305.1040
|
Ting-Li Chen
|
Ting-Li Chen
|
On the Convergence and Consistency of the Blurring Mean-Shift Process
|
arXiv admin note: text overlap with arXiv:1201.1979
| null | null | null |
stat.ML cs.LG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The mean-shift algorithm is a popular algorithm in computer vision and image
processing. It can also be cast as a minimum gamma-divergence estimation. In
this paper we focus on the "blurring" mean shift algorithm, which is one
version of the mean-shift process that successively blurs the dataset. The
analysis of the blurring mean-shift is relatively more complicated compared to
the nonblurring version, yet the algorithm convergence and the estimation
consistency have not been well studied in the literature. In this paper we
prove both the convergence and the consistency of the blurring mean-shift. We
also perform simulation studies to compare the efficiency of the blurring and
the nonblurring versions of the mean-shift algorithms. Our results show that
the blurring mean-shift has more efficiency.
|
[
{
"version": "v1",
"created": "Sun, 5 May 2013 18:51:24 GMT"
}
] | 2013-05-07T00:00:00
|
[
[
"Chen",
"Ting-Li",
""
]
] |
TITLE: On the Convergence and Consistency of the Blurring Mean-Shift Process
ABSTRACT: The mean-shift algorithm is a popular algorithm in computer vision and image
processing. It can also be cast as a minimum gamma-divergence estimation. In
this paper we focus on the "blurring" mean shift algorithm, which is one
version of the mean-shift process that successively blurs the dataset. The
analysis of the blurring mean-shift is relatively more complicated compared to
the nonblurring version, yet the algorithm convergence and the estimation
consistency have not been well studied in the literature. In this paper we
prove both the convergence and the consistency of the blurring mean-shift. We
also perform simulation studies to compare the efficiency of the blurring and
the nonblurring versions of the mean-shift algorithms. Our results show that
the blurring mean-shift has more efficiency.
|
no_new_dataset
| 0.712038
|
1305.1169
|
Marc Schoenauer
|
Mostepha Redouane Khouadjia (INRIA Saclay - Ile de France), Marc
Schoenauer (INRIA Saclay - Ile de France, LRI), Vincent Vidal (DCSD), Johann
Dr\'eo (TRT), Pierre Sav\'eant (TRT)
|
Multi-Objective AI Planning: Comparing Aggregation and Pareto Approaches
| null |
EvoCOP -- 13th European Conference on Evolutionary Computation in
Combinatorial Optimisation 7832 (2013) 202-213
| null | null |
cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Most real-world Planning problems are multi-objective, trying to minimize
both the makespan of the solution plan, and some cost of the actions involved
in the plan. But most, if not all existing approaches are based on
single-objective planners, and use an aggregation of the objectives to remain
in the single-objective context. Divide and Evolve (DaE) is an evolutionary
planner that won the temporal deterministic satisficing track at the last
International Planning Competitions (IPC). Like all Evolutionary Algorithms
(EA), it can easily be turned into a Pareto-based Multi-Objective EA. It is
however important to validate the resulting algorithm by comparing it with the
aggregation approach: this is the goal of this paper. The comparative
experiments on a recently proposed benchmark set that are reported here
demonstrate the usefulness of going Pareto-based in AI Planning.
|
[
{
"version": "v1",
"created": "Mon, 6 May 2013 12:53:25 GMT"
}
] | 2013-05-07T00:00:00
|
[
[
"Khouadjia",
"Mostepha Redouane",
"",
"INRIA Saclay - Ile de France"
],
[
"Schoenauer",
"Marc",
"",
"INRIA Saclay - Ile de France, LRI"
],
[
"Vidal",
"Vincent",
"",
"DCSD"
],
[
"Dréo",
"Johann",
"",
"TRT"
],
[
"Savéant",
"Pierre",
"",
"TRT"
]
] |
TITLE: Multi-Objective AI Planning: Comparing Aggregation and Pareto Approaches
ABSTRACT: Most real-world Planning problems are multi-objective, trying to minimize
both the makespan of the solution plan, and some cost of the actions involved
in the plan. But most, if not all existing approaches are based on
single-objective planners, and use an aggregation of the objectives to remain
in the single-objective context. Divide and Evolve (DaE) is an evolutionary
planner that won the temporal deterministic satisficing track at the last
International Planning Competitions (IPC). Like all Evolutionary Algorithms
(EA), it can easily be turned into a Pareto-based Multi-Objective EA. It is
however important to validate the resulting algorithm by comparing it with the
aggregation approach: this is the goal of this paper. The comparative
experiments on a recently proposed benchmark set that are reported here
demonstrate the usefulness of going Pareto-based in AI Planning.
|
no_new_dataset
| 0.678327
|
1210.0748
|
Yongming Luo
|
Yongming Luo, George H. L. Fletcher, Jan Hidders, Yuqing Wu and Paul
De Bra
|
External memory bisimulation reduction of big graphs
|
17 pages
| null | null | null |
cs.DB cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we present, to our knowledge, the first known I/O efficient
solutions for computing the k-bisimulation partition of a massive directed
graph, and performing maintenance of such a partition upon updates to the
underlying graph. Ubiquitous in the theory and application of graph data,
bisimulation is a robust notion of node equivalence which intuitively groups
together nodes in a graph which share fundamental structural features.
k-bisimulation is the standard variant of bisimulation where the topological
features of nodes are only considered within a local neighborhood of radius
$k\geqslant 0$.
The I/O cost of our partition construction algorithm is bounded by $O(k\cdot
\mathit{sort}(|\et|) + k\cdot scan(|\nt|) + \mathit{sort}(|\nt|))$, while our
maintenance algorithms are bounded by $O(k\cdot \mathit{sort}(|\et|) + k\cdot
\mathit{sort}(|\nt|))$. The space complexity bounds are $O(|\nt|+|\et|)$ and
$O(k\cdot|\nt|+k\cdot|\et|)$, resp. Here, $|\et|$ and $|\nt|$ are the number of
disk pages occupied by the input graph's edge set and node set, resp., and
$\mathit{sort}(n)$ and $\mathit{scan}(n)$ are the cost of sorting and scanning,
resp., a file occupying $n$ pages in external memory. Empirical analysis on a
variety of massive real-world and synthetic graph datasets shows that our
algorithms perform efficiently in practice, scaling gracefully as graphs grow
in size.
|
[
{
"version": "v1",
"created": "Tue, 2 Oct 2012 12:30:15 GMT"
},
{
"version": "v2",
"created": "Mon, 5 Nov 2012 09:26:03 GMT"
},
{
"version": "v3",
"created": "Thu, 2 May 2013 08:23:28 GMT"
}
] | 2013-05-03T00:00:00
|
[
[
"Luo",
"Yongming",
""
],
[
"Fletcher",
"George H. L.",
""
],
[
"Hidders",
"Jan",
""
],
[
"Wu",
"Yuqing",
""
],
[
"De Bra",
"Paul",
""
]
] |
TITLE: External memory bisimulation reduction of big graphs
ABSTRACT: In this paper, we present, to our knowledge, the first known I/O efficient
solutions for computing the k-bisimulation partition of a massive directed
graph, and performing maintenance of such a partition upon updates to the
underlying graph. Ubiquitous in the theory and application of graph data,
bisimulation is a robust notion of node equivalence which intuitively groups
together nodes in a graph which share fundamental structural features.
k-bisimulation is the standard variant of bisimulation where the topological
features of nodes are only considered within a local neighborhood of radius
$k\geqslant 0$.
The I/O cost of our partition construction algorithm is bounded by $O(k\cdot
\mathit{sort}(|\et|) + k\cdot scan(|\nt|) + \mathit{sort}(|\nt|))$, while our
maintenance algorithms are bounded by $O(k\cdot \mathit{sort}(|\et|) + k\cdot
\mathit{sort}(|\nt|))$. The space complexity bounds are $O(|\nt|+|\et|)$ and
$O(k\cdot|\nt|+k\cdot|\et|)$, resp. Here, $|\et|$ and $|\nt|$ are the number of
disk pages occupied by the input graph's edge set and node set, resp., and
$\mathit{sort}(n)$ and $\mathit{scan}(n)$ are the cost of sorting and scanning,
resp., a file occupying $n$ pages in external memory. Empirical analysis on a
variety of massive real-world and synthetic graph datasets shows that our
algorithms perform efficiently in practice, scaling gracefully as graphs grow
in size.
|
no_new_dataset
| 0.707007
|
1305.0423
|
Somayeh Danafar
|
Somayeh Danafar, Paola M.V. Rancoita, Tobias Glasmachers, Kevin
Whittingstall, Juergen Schmidhuber
|
Testing Hypotheses by Regularized Maximum Mean Discrepancy
| null | null | null | null |
cs.LG cs.AI stat.ML
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Do two data samples come from different distributions? Recent studies of this
fundamental problem focused on embedding probability distributions into
sufficiently rich characteristic Reproducing Kernel Hilbert Spaces (RKHSs), to
compare distributions by the distance between their embeddings. We show that
Regularized Maximum Mean Discrepancy (RMMD), our novel measure for kernel-based
hypothesis testing, yields substantial improvements even when sample sizes are
small, and excels at hypothesis tests involving multiple comparisons with power
control. We derive asymptotic distributions under the null and alternative
hypotheses, and assess power control. Outstanding results are obtained on:
challenging EEG data, MNIST, the Berkley Covertype, and the Flare-Solar
dataset.
|
[
{
"version": "v1",
"created": "Thu, 2 May 2013 13:03:53 GMT"
}
] | 2013-05-03T00:00:00
|
[
[
"Danafar",
"Somayeh",
""
],
[
"Rancoita",
"Paola M. V.",
""
],
[
"Glasmachers",
"Tobias",
""
],
[
"Whittingstall",
"Kevin",
""
],
[
"Schmidhuber",
"Juergen",
""
]
] |
TITLE: Testing Hypotheses by Regularized Maximum Mean Discrepancy
ABSTRACT: Do two data samples come from different distributions? Recent studies of this
fundamental problem focused on embedding probability distributions into
sufficiently rich characteristic Reproducing Kernel Hilbert Spaces (RKHSs), to
compare distributions by the distance between their embeddings. We show that
Regularized Maximum Mean Discrepancy (RMMD), our novel measure for kernel-based
hypothesis testing, yields substantial improvements even when sample sizes are
small, and excels at hypothesis tests involving multiple comparisons with power
control. We derive asymptotic distributions under the null and alternative
hypotheses, and assess power control. Outstanding results are obtained on:
challenging EEG data, MNIST, the Berkley Covertype, and the Flare-Solar
dataset.
|
no_new_dataset
| 0.710622
|
1305.0471
|
Chantal Cherifi
|
Chantal Cherifi, Jean-Fran\c{c}ois Santucci
|
Community Structure in Interaction Web Service Networks
| null | null | null | null |
cs.SI cs.NI physics.soc-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Many real-world complex systems such as social, biological, information as
well as technological systems results of a decentralized and unplanned
evolution which leads to a common structuration. Irrespective of their origin,
these so-called complex networks typically exhibit small-world and scale-free
properties. Another common feature is their organisation into communities. In
this paper, we introduce models of interaction networks based on the
composition process of syntactic and semantic Web services. An extensive
experimental study conducted on a benchmark of real Web services shows that
these networks possess the typical properties of complex networks (small-world,
scale-free). Unlike most social networks, they are not transitive. Using a
representative sample of community detection algorithms, a community
structuration is revealed. The comparative evaluation of the discovered
community structures shows that they are very similar in terms of content.
Furthermore, the analysis performed on the community structures and on the
communities themselves, leads us to conclude that their topological properties
are consistent.
|
[
{
"version": "v1",
"created": "Thu, 2 May 2013 15:09:42 GMT"
}
] | 2013-05-03T00:00:00
|
[
[
"Cherifi",
"Chantal",
""
],
[
"Santucci",
"Jean-François",
""
]
] |
TITLE: Community Structure in Interaction Web Service Networks
ABSTRACT: Many real-world complex systems such as social, biological, information as
well as technological systems results of a decentralized and unplanned
evolution which leads to a common structuration. Irrespective of their origin,
these so-called complex networks typically exhibit small-world and scale-free
properties. Another common feature is their organisation into communities. In
this paper, we introduce models of interaction networks based on the
composition process of syntactic and semantic Web services. An extensive
experimental study conducted on a benchmark of real Web services shows that
these networks possess the typical properties of complex networks (small-world,
scale-free). Unlike most social networks, they are not transitive. Using a
representative sample of community detection algorithms, a community
structuration is revealed. The comparative evaluation of the discovered
community structures shows that they are very similar in terms of content.
Furthermore, the analysis performed on the community structures and on the
communities themselves, leads us to conclude that their topological properties
are consistent.
|
no_new_dataset
| 0.711588
|
1305.0483
|
Mayank Gupta MR
|
A V Choudhari, N A Pande and M R Gupta
|
Feasibility Analysis of Low Cost Graphical Processing Units for
Electromagnetic Field Simulations by Finite Difference Time Domain Method
| null | null |
10.5120/11739-7396
| null |
cs.DC physics.comp-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Among several techniques available for solving Computational Electromagnetics
(CEM) problems, the Finite Difference Time Domain (FDTD) method is one of the
best suited approaches when a parallelized hardware platform is used. In this
paper we investigate the feasibility of implementing the FDTD method using the
NVIDIA GT 520, a low cost Graphical Processing Unit (GPU), for solving the
differential form of Maxwell's equation in time domain. Initially a generalized
benchmarking problem of bandwidth test and another benchmarking problem of
'matrix left division is discussed for understanding the correlation between
the problem size and the performance on the CPU and the GPU respectively. This
is further followed by the discussion of the FDTD method, again implemented on
both, the CPU and the GT520 GPU. For both of the above comparisons, the CPU
used is Intel E5300, a low cost dual core CPU.
|
[
{
"version": "v1",
"created": "Thu, 2 May 2013 15:37:36 GMT"
}
] | 2013-05-03T00:00:00
|
[
[
"Choudhari",
"A V",
""
],
[
"Pande",
"N A",
""
],
[
"Gupta",
"M R",
""
]
] |
TITLE: Feasibility Analysis of Low Cost Graphical Processing Units for
Electromagnetic Field Simulations by Finite Difference Time Domain Method
ABSTRACT: Among several techniques available for solving Computational Electromagnetics
(CEM) problems, the Finite Difference Time Domain (FDTD) method is one of the
best suited approaches when a parallelized hardware platform is used. In this
paper we investigate the feasibility of implementing the FDTD method using the
NVIDIA GT 520, a low cost Graphical Processing Unit (GPU), for solving the
differential form of Maxwell's equation in time domain. Initially a generalized
benchmarking problem of bandwidth test and another benchmarking problem of
'matrix left division is discussed for understanding the correlation between
the problem size and the performance on the CPU and the GPU respectively. This
is further followed by the discussion of the FDTD method, again implemented on
both, the CPU and the GT520 GPU. For both of the above comparisons, the CPU
used is Intel E5300, a low cost dual core CPU.
|
no_new_dataset
| 0.711825
|
1305.0513
|
Ruoming Jin
|
Ruoming Jin, Yelong Shen, Lin Liu and Xue-wen Chen
|
Limiting the Neighborhood: De-Small-World Network for Outbreak
Prevention
|
9 pages
| null | null | null |
cs.SI physics.soc-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this work, we study a basic and practically important strategy to help
prevent and/or delay an outbreak in the context of network: limiting the
contact between individuals. In this paper, we introduce the average
neighborhood size as a new measure for the degree of being small-world and
utilize it to formally define the desmall- world network problem. We also prove
the NP-hardness of the general reachable pair cut problem and propose a greedy
edge betweenness based approach as the benchmark in selecting the candidate
edges for solving our problem. Furthermore, we transform the de-small-world
network problem as an OR-AND Boolean function maximization problem, which is
also an NP-hardness problem. In addition, we develop a numerical relaxation
approach to solve the Boolean function maximization and the de-small-world
problem. Also, we introduce the short-betweenness, which measures the edge
importance in terms of all short paths with distance no greater than a certain
threshold, and utilize it to speed up our numerical relaxation approach. The
experimental evaluation demonstrates the effectiveness and efficiency of our
approaches.
|
[
{
"version": "v1",
"created": "Thu, 2 May 2013 17:03:58 GMT"
}
] | 2013-05-03T00:00:00
|
[
[
"Jin",
"Ruoming",
""
],
[
"Shen",
"Yelong",
""
],
[
"Liu",
"Lin",
""
],
[
"Chen",
"Xue-wen",
""
]
] |
TITLE: Limiting the Neighborhood: De-Small-World Network for Outbreak
Prevention
ABSTRACT: In this work, we study a basic and practically important strategy to help
prevent and/or delay an outbreak in the context of network: limiting the
contact between individuals. In this paper, we introduce the average
neighborhood size as a new measure for the degree of being small-world and
utilize it to formally define the desmall- world network problem. We also prove
the NP-hardness of the general reachable pair cut problem and propose a greedy
edge betweenness based approach as the benchmark in selecting the candidate
edges for solving our problem. Furthermore, we transform the de-small-world
network problem as an OR-AND Boolean function maximization problem, which is
also an NP-hardness problem. In addition, we develop a numerical relaxation
approach to solve the Boolean function maximization and the de-small-world
problem. Also, we introduce the short-betweenness, which measures the edge
importance in terms of all short paths with distance no greater than a certain
threshold, and utilize it to speed up our numerical relaxation approach. The
experimental evaluation demonstrates the effectiveness and efficiency of our
approaches.
|
no_new_dataset
| 0.710998
|
1301.3641
|
Ryan Kiros
|
Ryan Kiros
|
Training Neural Networks with Stochastic Hessian-Free Optimization
|
11 pages, ICLR 2013
| null | null | null |
cs.LG cs.NE stat.ML
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Hessian-free (HF) optimization has been successfully used for training deep
autoencoders and recurrent networks. HF uses the conjugate gradient algorithm
to construct update directions through curvature-vector products that can be
computed on the same order of time as gradients. In this paper we exploit this
property and study stochastic HF with gradient and curvature mini-batches
independent of the dataset size. We modify Martens' HF for these settings and
integrate dropout, a method for preventing co-adaptation of feature detectors,
to guard against overfitting. Stochastic Hessian-free optimization gives an
intermediary between SGD and HF that achieves competitive performance on both
classification and deep autoencoder experiments.
|
[
{
"version": "v1",
"created": "Wed, 16 Jan 2013 10:10:23 GMT"
},
{
"version": "v2",
"created": "Mon, 18 Mar 2013 05:51:37 GMT"
},
{
"version": "v3",
"created": "Wed, 1 May 2013 06:57:50 GMT"
}
] | 2013-05-02T00:00:00
|
[
[
"Kiros",
"Ryan",
""
]
] |
TITLE: Training Neural Networks with Stochastic Hessian-Free Optimization
ABSTRACT: Hessian-free (HF) optimization has been successfully used for training deep
autoencoders and recurrent networks. HF uses the conjugate gradient algorithm
to construct update directions through curvature-vector products that can be
computed on the same order of time as gradients. In this paper we exploit this
property and study stochastic HF with gradient and curvature mini-batches
independent of the dataset size. We modify Martens' HF for these settings and
integrate dropout, a method for preventing co-adaptation of feature detectors,
to guard against overfitting. Stochastic Hessian-free optimization gives an
intermediary between SGD and HF that achieves competitive performance on both
classification and deep autoencoder experiments.
|
no_new_dataset
| 0.710189
|
1304.2272
|
Elmar Peise
|
Elmar Peise (1), Diego Fabregat (1), Yurii Aulchenko (2), Paolo
Bientinesi (1) ((1) AICES, RWTH Aachen, (2) Institute of Cytology and
Genetics, Novosibirsk)
|
Algorithms for Large-scale Whole Genome Association Analysis
| null | null | null |
AICES-2013/04-2
|
cs.CE cs.MS q-bio.GN
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In order to associate complex traits with genetic polymorphisms, genome-wide
association studies process huge datasets involving tens of thousands of
individuals genotyped for millions of polymorphisms. When handling these
datasets, which exceed the main memory of contemporary computers, one faces two
distinct challenges: 1) Millions of polymorphisms come at the cost of hundreds
of Gigabytes of genotype data, which can only be kept in secondary storage; 2)
the relatedness of the test population is represented by a covariance matrix,
which, for large populations, can only fit in the combined main memory of a
distributed architecture. In this paper, we present solutions for both
challenges: The genotype data is streamed from and to secondary storage using a
double buffering technique, while the covariance matrix is kept across the main
memory of a distributed memory system. We show that these methods sustain
high-performance and allow the analysis of enormous dataset
|
[
{
"version": "v1",
"created": "Mon, 8 Apr 2013 17:13:39 GMT"
}
] | 2013-05-02T00:00:00
|
[
[
"Peise",
"Elmar",
""
],
[
"Fabregat",
"Diego",
""
],
[
"Aulchenko",
"Yurii",
""
],
[
"Bientinesi",
"Paolo",
""
]
] |
TITLE: Algorithms for Large-scale Whole Genome Association Analysis
ABSTRACT: In order to associate complex traits with genetic polymorphisms, genome-wide
association studies process huge datasets involving tens of thousands of
individuals genotyped for millions of polymorphisms. When handling these
datasets, which exceed the main memory of contemporary computers, one faces two
distinct challenges: 1) Millions of polymorphisms come at the cost of hundreds
of Gigabytes of genotype data, which can only be kept in secondary storage; 2)
the relatedness of the test population is represented by a covariance matrix,
which, for large populations, can only fit in the combined main memory of a
distributed architecture. In this paper, we present solutions for both
challenges: The genotype data is streamed from and to secondary storage using a
double buffering technique, while the covariance matrix is kept across the main
memory of a distributed memory system. We show that these methods sustain
high-performance and allow the analysis of enormous dataset
|
no_new_dataset
| 0.708635
|
1304.3596
|
Sandrine Blazy
|
Sandrine Blazy (INRIA - IRISA), Vincent Laporte (INRIA - IRISA),
Andr\'e Maroneze (INRIA - IRISA), David Pichardie (INRIA - IRISA)
|
Formal Verification of a C Value Analysis Based on Abstract
Interpretation
| null |
SAS - 20th Static Analysis Symposium Lecture Notes in Computer
Science (2013) 324-344
| null | null |
cs.PL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Static analyzers based on abstract interpretation are complex pieces of
software implementing delicate algorithms. Even if static analysis techniques
are well understood, their implementation on real languages is still
error-prone. This paper presents a formal verification using the Coq proof
assistant: a formalization of a value analysis (based on abstract
interpretation), and a soundness proof of the value analysis. The formalization
relies on generic interfaces. The mechanized proof is facilitated by a
translation validation of a Bourdoncle fixpoint iterator. The work has been
integrated into the CompCert verified C-compiler. Our verified analysis
directly operates over an intermediate language of the compiler having the same
expressiveness as C. The automatic extraction of our value analysis into OCaml
yields a program with competitive results, obtained from experiments on a
number of benchmarks and comparisons with the Frama-C tool.
|
[
{
"version": "v1",
"created": "Fri, 12 Apr 2013 10:32:40 GMT"
}
] | 2013-05-02T00:00:00
|
[
[
"Blazy",
"Sandrine",
"",
"INRIA - IRISA"
],
[
"Laporte",
"Vincent",
"",
"INRIA - IRISA"
],
[
"Maroneze",
"André",
"",
"INRIA - IRISA"
],
[
"Pichardie",
"David",
"",
"INRIA - IRISA"
]
] |
TITLE: Formal Verification of a C Value Analysis Based on Abstract
Interpretation
ABSTRACT: Static analyzers based on abstract interpretation are complex pieces of
software implementing delicate algorithms. Even if static analysis techniques
are well understood, their implementation on real languages is still
error-prone. This paper presents a formal verification using the Coq proof
assistant: a formalization of a value analysis (based on abstract
interpretation), and a soundness proof of the value analysis. The formalization
relies on generic interfaces. The mechanized proof is facilitated by a
translation validation of a Bourdoncle fixpoint iterator. The work has been
integrated into the CompCert verified C-compiler. Our verified analysis
directly operates over an intermediate language of the compiler having the same
expressiveness as C. The automatic extraction of our value analysis into OCaml
yields a program with competitive results, obtained from experiments on a
number of benchmarks and comparisons with the Frama-C tool.
|
no_new_dataset
| 0.705379
|
1305.0015
|
Balaji Lakshminarayanan
|
Balaji Lakshminarayanan and Yee Whye Teh
|
Inferring ground truth from multi-annotator ordinal data: a
probabilistic approach
| null | null | null | null |
stat.ML cs.LG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A popular approach for large scale data annotation tasks is crowdsourcing,
wherein each data point is labeled by multiple noisy annotators. We consider
the problem of inferring ground truth from noisy ordinal labels obtained from
multiple annotators of varying and unknown expertise levels. Annotation models
for ordinal data have been proposed mostly as extensions of their
binary/categorical counterparts and have received little attention in the
crowdsourcing literature. We propose a new model for crowdsourced ordinal data
that accounts for instance difficulty as well as annotator expertise, and
derive a variational Bayesian inference algorithm for parameter estimation. We
analyze the ordinal extensions of several state-of-the-art annotator models for
binary/categorical labels and evaluate the performance of all the models on two
real world datasets containing ordinal query-URL relevance scores, collected
through Amazon's Mechanical Turk. Our results indicate that the proposed model
performs better or as well as existing state-of-the-art methods and is more
resistant to `spammy' annotators (i.e., annotators who assign labels randomly
without actually looking at the instance) than popular baselines such as mean,
median, and majority vote which do not account for annotator expertise.
|
[
{
"version": "v1",
"created": "Tue, 30 Apr 2013 20:12:01 GMT"
}
] | 2013-05-02T00:00:00
|
[
[
"Lakshminarayanan",
"Balaji",
""
],
[
"Teh",
"Yee Whye",
""
]
] |
TITLE: Inferring ground truth from multi-annotator ordinal data: a
probabilistic approach
ABSTRACT: A popular approach for large scale data annotation tasks is crowdsourcing,
wherein each data point is labeled by multiple noisy annotators. We consider
the problem of inferring ground truth from noisy ordinal labels obtained from
multiple annotators of varying and unknown expertise levels. Annotation models
for ordinal data have been proposed mostly as extensions of their
binary/categorical counterparts and have received little attention in the
crowdsourcing literature. We propose a new model for crowdsourced ordinal data
that accounts for instance difficulty as well as annotator expertise, and
derive a variational Bayesian inference algorithm for parameter estimation. We
analyze the ordinal extensions of several state-of-the-art annotator models for
binary/categorical labels and evaluate the performance of all the models on two
real world datasets containing ordinal query-URL relevance scores, collected
through Amazon's Mechanical Turk. Our results indicate that the proposed model
performs better or as well as existing state-of-the-art methods and is more
resistant to `spammy' annotators (i.e., annotators who assign labels randomly
without actually looking at the instance) than popular baselines such as mean,
median, and majority vote which do not account for annotator expertise.
|
no_new_dataset
| 0.712245
|
1305.0103
|
Marthinus Christoffel du Plessis Marthinus Christoffel du Plessi
|
Marthinus Christoffel du Plessis and Masashi Sugiyama
|
Clustering Unclustered Data: Unsupervised Binary Labeling of Two
Datasets Having Different Class Balances
| null | null | null | null |
cs.LG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We consider the unsupervised learning problem of assigning labels to
unlabeled data. A naive approach is to use clustering methods, but this works
well only when data is properly clustered and each cluster corresponds to an
underlying class. In this paper, we first show that this unsupervised labeling
problem in balanced binary cases can be solved if two unlabeled datasets having
different class balances are available. More specifically, estimation of the
sign of the difference between probability densities of two unlabeled datasets
gives the solution. We then introduce a new method to directly estimate the
sign of the density difference without density estimation. Finally, we
demonstrate the usefulness of the proposed method against several clustering
methods on various toy problems and real-world datasets.
|
[
{
"version": "v1",
"created": "Wed, 1 May 2013 06:32:12 GMT"
}
] | 2013-05-02T00:00:00
|
[
[
"Plessis",
"Marthinus Christoffel du",
""
],
[
"Sugiyama",
"Masashi",
""
]
] |
TITLE: Clustering Unclustered Data: Unsupervised Binary Labeling of Two
Datasets Having Different Class Balances
ABSTRACT: We consider the unsupervised learning problem of assigning labels to
unlabeled data. A naive approach is to use clustering methods, but this works
well only when data is properly clustered and each cluster corresponds to an
underlying class. In this paper, we first show that this unsupervised labeling
problem in balanced binary cases can be solved if two unlabeled datasets having
different class balances are available. More specifically, estimation of the
sign of the difference between probability densities of two unlabeled datasets
gives the solution. We then introduce a new method to directly estimate the
sign of the density difference without density estimation. Finally, we
demonstrate the usefulness of the proposed method against several clustering
methods on various toy problems and real-world datasets.
|
no_new_dataset
| 0.710666
|
1305.0159
|
Anthony J Cox
|
Lilian Janin and Giovanna Rosone and Anthony J. Cox
|
Adaptive reference-free compression of sequence quality scores
|
Accepted paper for HiTSeq 2013, to appear in Bioinformatics.
Bioinformatics should be considered the original place of publication of this
work, please cite accordingly
| null | null | null |
q-bio.GN cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Motivation:
Rapid technological progress in DNA sequencing has stimulated interest in
compressing the vast datasets that are now routinely produced. Relatively
little attention has been paid to compressing the quality scores that are
assigned to each sequence, even though these scores may be harder to compress
than the sequences themselves. By aggregating a set of reads into a compressed
index, we find that the majority of bases can be predicted from the sequence of
bases that are adjacent to them and hence are likely to be less informative for
variant calling or other applications. The quality scores for such bases are
aggressively compressed, leaving a relatively small number at full resolution.
Since our approach relies directly on redundancy present in the reads, it does
not need a reference sequence and is therefore applicable to data from
metagenomics and de novo experiments as well as to resequencing data.
Results:
We show that a conservative smoothing strategy affecting 75% of the quality
scores above Q2 leads to an overall quality score compression of 1 bit per
value with a negligible effect on variant calling. A compression of 0.68 bit
per quality value is achieved using a more aggressive smoothing strategy, again
with a very small effect on variant calling.
Availability:
Code to construct the BWT and LCP-array on large genomic data sets is part of
the BEETL library, available as a github respository at
http://git@github.com:BEETL/BEETL.git .
|
[
{
"version": "v1",
"created": "Wed, 1 May 2013 12:51:10 GMT"
}
] | 2013-05-02T00:00:00
|
[
[
"Janin",
"Lilian",
""
],
[
"Rosone",
"Giovanna",
""
],
[
"Cox",
"Anthony J.",
""
]
] |
TITLE: Adaptive reference-free compression of sequence quality scores
ABSTRACT: Motivation:
Rapid technological progress in DNA sequencing has stimulated interest in
compressing the vast datasets that are now routinely produced. Relatively
little attention has been paid to compressing the quality scores that are
assigned to each sequence, even though these scores may be harder to compress
than the sequences themselves. By aggregating a set of reads into a compressed
index, we find that the majority of bases can be predicted from the sequence of
bases that are adjacent to them and hence are likely to be less informative for
variant calling or other applications. The quality scores for such bases are
aggressively compressed, leaving a relatively small number at full resolution.
Since our approach relies directly on redundancy present in the reads, it does
not need a reference sequence and is therefore applicable to data from
metagenomics and de novo experiments as well as to resequencing data.
Results:
We show that a conservative smoothing strategy affecting 75% of the quality
scores above Q2 leads to an overall quality score compression of 1 bit per
value with a negligible effect on variant calling. A compression of 0.68 bit
per quality value is achieved using a more aggressive smoothing strategy, again
with a very small effect on variant calling.
Availability:
Code to construct the BWT and LCP-array on large genomic data sets is part of
the BEETL library, available as a github respository at
http://git@github.com:BEETL/BEETL.git .
|
no_new_dataset
| 0.707443
|
1305.0160
|
Anthony J Cox
|
Markus J. Bauer and Anthony J. Cox and Giovanna Rosone and Marinella
Sciortino
|
Lightweight LCP Construction for Next-Generation Sequencing Datasets
|
Springer LNCS (Lecture Notes in Computer Science) should be
considered as the original place of publication, please cite accordingly. The
final version of this manuscript is available at
http://link.springer.com/chapter/10.1007/978-3-642-33122-0_26
|
Lecture Notes in Computer Science Volume 7534, 2012, pp 326-337
|
10.1007/978-3-642-33122-0_26
| null |
cs.DS q-bio.GN
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The advent of "next-generation" DNA sequencing (NGS) technologies has meant
that collections of hundreds of millions of DNA sequences are now commonplace
in bioinformatics. Knowing the longest common prefix array (LCP) of such a
collection would facilitate the rapid computation of maximal exact matches,
shortest unique substrings and shortest absent words. CPU-efficient algorithms
for computing the LCP of a string have been described in the literature, but
require the presence in RAM of large data structures. This prevents such
methods from being feasible for NGS datasets.
In this paper we propose the first lightweight method that simultaneously
computes, via sequential scans, the LCP and BWT of very large collections of
sequences. Computational results on collections as large as 800 million
100-mers demonstrate that our algorithm scales to the vast sequence collections
encountered in human whole genome sequencing experiments.
|
[
{
"version": "v1",
"created": "Wed, 1 May 2013 12:51:45 GMT"
}
] | 2013-05-02T00:00:00
|
[
[
"Bauer",
"Markus J.",
""
],
[
"Cox",
"Anthony J.",
""
],
[
"Rosone",
"Giovanna",
""
],
[
"Sciortino",
"Marinella",
""
]
] |
TITLE: Lightweight LCP Construction for Next-Generation Sequencing Datasets
ABSTRACT: The advent of "next-generation" DNA sequencing (NGS) technologies has meant
that collections of hundreds of millions of DNA sequences are now commonplace
in bioinformatics. Knowing the longest common prefix array (LCP) of such a
collection would facilitate the rapid computation of maximal exact matches,
shortest unique substrings and shortest absent words. CPU-efficient algorithms
for computing the LCP of a string have been described in the literature, but
require the presence in RAM of large data structures. This prevents such
methods from being feasible for NGS datasets.
In this paper we propose the first lightweight method that simultaneously
computes, via sequential scans, the LCP and BWT of very large collections of
sequences. Computational results on collections as large as 800 million
100-mers demonstrate that our algorithm scales to the vast sequence collections
encountered in human whole genome sequencing experiments.
|
no_new_dataset
| 0.709057
|
1305.0195
|
Chantal Cherifi
|
Chantal Cherifi
|
Similartity Network For Semantic Web Services Substitution
| null | null | null | null |
cs.SE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Web services substitution is one of the most challenging tasks for automating
the composition process of multiple Web services. It aims to improve
performances and to deal efficiently with Web services failures. Many existing
solutions have approached the problem through classification of substitutable
Web services. To go a step further, we propose in this paper a network based
approach where nodes are Web services operations and links join similar
operations. Four similarity measures based on the comparison of input and
output parameters values of Web services operations are presented. A
comparative evaluation of the topological structure of the corresponding
networks is performed on a benchmark of semantically annotated Web services.
Results show that this approach allows a more detailed analysis of
substitutable Web services.
|
[
{
"version": "v1",
"created": "Wed, 1 May 2013 15:13:55 GMT"
}
] | 2013-05-02T00:00:00
|
[
[
"Cherifi",
"Chantal",
""
]
] |
TITLE: Similartity Network For Semantic Web Services Substitution
ABSTRACT: Web services substitution is one of the most challenging tasks for automating
the composition process of multiple Web services. It aims to improve
performances and to deal efficiently with Web services failures. Many existing
solutions have approached the problem through classification of substitutable
Web services. To go a step further, we propose in this paper a network based
approach where nodes are Web services operations and links join similar
operations. Four similarity measures based on the comparison of input and
output parameters values of Web services operations are presented. A
comparative evaluation of the topological structure of the corresponding
networks is performed on a benchmark of semantically annotated Web services.
Results show that this approach allows a more detailed analysis of
substitutable Web services.
|
no_new_dataset
| 0.709604
|
1211.2863
|
Alon Schclar
|
Alon Schclar
|
Multi-Sensor Fusion via Reduction of Dimensionality
|
PhD Thesis, Tel Aviv Univ, 2008
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Large high-dimensional datasets are becoming more and more popular in an
increasing number of research areas. Processing the high dimensional data
incurs a high computational cost and is inherently inefficient since many of
the values that describe a data object are redundant due to noise and inner
correlations. Consequently, the dimensionality, i.e. the number of values that
are used to describe a data object, needs to be reduced prior to any other
processing of the data. The dimensionality reduction removes, in most cases,
noise from the data and reduces substantially the computational cost of
algorithms that are applied to the data.
In this thesis, a novel coherent integrated methodology is introduced
(theory, algorithm and applications) to reduce the dimensionality of
high-dimensional datasets. The method constructs a diffusion process among the
data coordinates via a random walk. The dimensionality reduction is obtained
based on the eigen-decomposition of the Markov matrix that is associated with
the random walk. The proposed method is utilized for: (a) segmentation and
detection of anomalies in hyper-spectral images; (b) segmentation of
multi-contrast MRI images; and (c) segmentation of video sequences.
We also present algorithms for: (a) the characterization of materials using
their spectral signatures to enable their identification; (b) detection of
vehicles according to their acoustic signatures; and (c) classification of
vascular vessels recordings to detect hyper-tension and cardio-vascular
diseases.
The proposed methodology and algorithms produce excellent results that
successfully compete with current state-of-the-art algorithms.
|
[
{
"version": "v1",
"created": "Tue, 13 Nov 2012 01:05:42 GMT"
}
] | 2013-05-01T00:00:00
|
[
[
"Schclar",
"Alon",
""
]
] |
TITLE: Multi-Sensor Fusion via Reduction of Dimensionality
ABSTRACT: Large high-dimensional datasets are becoming more and more popular in an
increasing number of research areas. Processing the high dimensional data
incurs a high computational cost and is inherently inefficient since many of
the values that describe a data object are redundant due to noise and inner
correlations. Consequently, the dimensionality, i.e. the number of values that
are used to describe a data object, needs to be reduced prior to any other
processing of the data. The dimensionality reduction removes, in most cases,
noise from the data and reduces substantially the computational cost of
algorithms that are applied to the data.
In this thesis, a novel coherent integrated methodology is introduced
(theory, algorithm and applications) to reduce the dimensionality of
high-dimensional datasets. The method constructs a diffusion process among the
data coordinates via a random walk. The dimensionality reduction is obtained
based on the eigen-decomposition of the Markov matrix that is associated with
the random walk. The proposed method is utilized for: (a) segmentation and
detection of anomalies in hyper-spectral images; (b) segmentation of
multi-contrast MRI images; and (c) segmentation of video sequences.
We also present algorithms for: (a) the characterization of materials using
their spectral signatures to enable their identification; (b) detection of
vehicles according to their acoustic signatures; and (c) classification of
vascular vessels recordings to detect hyper-tension and cardio-vascular
diseases.
The proposed methodology and algorithms produce excellent results that
successfully compete with current state-of-the-art algorithms.
|
no_new_dataset
| 0.7118
|
1304.4379
|
Jan Noessner
|
Jan Noessner, Mathias Niepert, Heiner Stuckenschmidt
|
RockIt: Exploiting Parallelism and Symmetry for MAP Inference in
Statistical Relational Models
|
To appear in proceedings of AAAI 2013
| null | null | null |
cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
RockIt is a maximum a-posteriori (MAP) query engine for statistical
relational models. MAP inference in graphical models is an optimization problem
which can be compiled to integer linear programs (ILPs). We describe several
advances in translating MAP queries to ILP instances and present the novel
meta-algorithm cutting plane aggregation (CPA). CPA exploits local
context-specific symmetries and bundles up sets of linear constraints. The
resulting counting constraints lead to more compact ILPs and make the symmetry
of the ground model more explicit to state-of-the-art ILP solvers. Moreover,
RockIt parallelizes most parts of the MAP inference pipeline taking advantage
of ubiquitous shared-memory multi-core architectures.
We report on extensive experiments with Markov logic network (MLN) benchmarks
showing that RockIt outperforms the state-of-the-art systems Alchemy, Markov
TheBeast, and Tuffy both in terms of efficiency and quality of results.
|
[
{
"version": "v1",
"created": "Tue, 16 Apr 2013 09:29:58 GMT"
},
{
"version": "v2",
"created": "Tue, 30 Apr 2013 10:19:58 GMT"
}
] | 2013-05-01T00:00:00
|
[
[
"Noessner",
"Jan",
""
],
[
"Niepert",
"Mathias",
""
],
[
"Stuckenschmidt",
"Heiner",
""
]
] |
TITLE: RockIt: Exploiting Parallelism and Symmetry for MAP Inference in
Statistical Relational Models
ABSTRACT: RockIt is a maximum a-posteriori (MAP) query engine for statistical
relational models. MAP inference in graphical models is an optimization problem
which can be compiled to integer linear programs (ILPs). We describe several
advances in translating MAP queries to ILP instances and present the novel
meta-algorithm cutting plane aggregation (CPA). CPA exploits local
context-specific symmetries and bundles up sets of linear constraints. The
resulting counting constraints lead to more compact ILPs and make the symmetry
of the ground model more explicit to state-of-the-art ILP solvers. Moreover,
RockIt parallelizes most parts of the MAP inference pipeline taking advantage
of ubiquitous shared-memory multi-core architectures.
We report on extensive experiments with Markov logic network (MLN) benchmarks
showing that RockIt outperforms the state-of-the-art systems Alchemy, Markov
TheBeast, and Tuffy both in terms of efficiency and quality of results.
|
no_new_dataset
| 0.707209
|
0905.4614
|
Alexander Artikis
|
A. Artikis, M. Sergot and G. Paliouras
|
A Logic Programming Approach to Activity Recognition
|
The original publication is available in the Proceedings of the 2nd
ACM international workshop on Events in multimedia, 2010
| null | null | null |
cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We have been developing a system for recognising human activity given a
symbolic representation of video content. The input of our system is a set of
time-stamped short-term activities detected on video frames. The output of our
system is a set of recognised long-term activities, which are pre-defined
temporal combinations of short-term activities. The constraints on the
short-term activities that, if satisfied, lead to the recognition of a
long-term activity, are expressed using a dialect of the Event Calculus. We
illustrate the expressiveness of the dialect by showing the representation of
several typical complex activities. Furthermore, we present a detailed
evaluation of the system through experimentation on a benchmark dataset of
surveillance videos.
|
[
{
"version": "v1",
"created": "Thu, 28 May 2009 11:44:04 GMT"
},
{
"version": "v2",
"created": "Mon, 29 Apr 2013 17:06:25 GMT"
}
] | 2013-04-30T00:00:00
|
[
[
"Artikis",
"A.",
""
],
[
"Sergot",
"M.",
""
],
[
"Paliouras",
"G.",
""
]
] |
TITLE: A Logic Programming Approach to Activity Recognition
ABSTRACT: We have been developing a system for recognising human activity given a
symbolic representation of video content. The input of our system is a set of
time-stamped short-term activities detected on video frames. The output of our
system is a set of recognised long-term activities, which are pre-defined
temporal combinations of short-term activities. The constraints on the
short-term activities that, if satisfied, lead to the recognition of a
long-term activity, are expressed using a dialect of the Event Calculus. We
illustrate the expressiveness of the dialect by showing the representation of
several typical complex activities. Furthermore, we present a detailed
evaluation of the system through experimentation on a benchmark dataset of
surveillance videos.
|
no_new_dataset
| 0.679405
|
1304.5197
|
Daniele Cono D'Elia
|
Daniele Cono D'Elia, Camil Demetrescu, Irene Finocchi
|
Ball-Larus Path Profiling Across Multiple Loop iterations
|
13 pages, 14 figures
| null | null | null |
cs.PL cs.PF
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Identifying the hottest paths in the control flow graph of a routine can
direct optimizations to portions of the code where most resources are consumed.
This powerful methodology, called path profiling, was introduced by Ball and
Larus in the mid 90s and has received considerable attention in the last 15
years for its practical relevance. A shortcoming of Ball-Larus path profiling
was the inability to profile cyclic paths, making it difficult to mine
interesting execution patterns that span multiple loop iterations. Previous
results, based on rather complex algorithms, have attempted to circumvent this
limitation at the price of significant performance losses already for a small
number of iterations. In this paper, we present a new approach to multiple
iterations path profiling, based on data structures built on top of the
original Ball-Larus numbering technique. Our approach allows it to profile all
executed paths obtained as a concatenation of up to k Ball-Larus acyclic paths,
where k is a user-defined parameter. An extensive experimental investigation on
a large variety of Java benchmarks on the Jikes RVM shows that, surprisingly,
our approach can be even faster than Ball-Larus due to fewer operations on
smaller hash tables, producing compact representations of cyclic paths even for
large values of k.
|
[
{
"version": "v1",
"created": "Thu, 18 Apr 2013 17:34:38 GMT"
}
] | 2013-04-30T00:00:00
|
[
[
"D'Elia",
"Daniele Cono",
""
],
[
"Demetrescu",
"Camil",
""
],
[
"Finocchi",
"Irene",
""
]
] |
TITLE: Ball-Larus Path Profiling Across Multiple Loop iterations
ABSTRACT: Identifying the hottest paths in the control flow graph of a routine can
direct optimizations to portions of the code where most resources are consumed.
This powerful methodology, called path profiling, was introduced by Ball and
Larus in the mid 90s and has received considerable attention in the last 15
years for its practical relevance. A shortcoming of Ball-Larus path profiling
was the inability to profile cyclic paths, making it difficult to mine
interesting execution patterns that span multiple loop iterations. Previous
results, based on rather complex algorithms, have attempted to circumvent this
limitation at the price of significant performance losses already for a small
number of iterations. In this paper, we present a new approach to multiple
iterations path profiling, based on data structures built on top of the
original Ball-Larus numbering technique. Our approach allows it to profile all
executed paths obtained as a concatenation of up to k Ball-Larus acyclic paths,
where k is a user-defined parameter. An extensive experimental investigation on
a large variety of Java benchmarks on the Jikes RVM shows that, surprisingly,
our approach can be even faster than Ball-Larus due to fewer operations on
smaller hash tables, producing compact representations of cyclic paths even for
large values of k.
|
no_new_dataset
| 0.708811
|
1304.7632
|
Rastislav \v{S}r\'amek
|
Barbara Geissmann and Rastislav \v{S}r\'amek
|
Counting small cuts in a graph
| null | null | null | null |
cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We study the minimum cut problem in the presence of uncertainty and show how
to apply a novel robust optimization approach, which aims to exploit the
similarity in subsequent graph measurements or similar graph instances, without
posing any assumptions on the way they have been obtained. With experiments we
show that the approach works well when compared to other approaches that are
also oblivious towards the relationship between the input datasets.
|
[
{
"version": "v1",
"created": "Mon, 29 Apr 2013 12:08:32 GMT"
}
] | 2013-04-30T00:00:00
|
[
[
"Geissmann",
"Barbara",
""
],
[
"Šrámek",
"Rastislav",
""
]
] |
TITLE: Counting small cuts in a graph
ABSTRACT: We study the minimum cut problem in the presence of uncertainty and show how
to apply a novel robust optimization approach, which aims to exploit the
similarity in subsequent graph measurements or similar graph instances, without
posing any assumptions on the way they have been obtained. With experiments we
show that the approach works well when compared to other approaches that are
also oblivious towards the relationship between the input datasets.
|
no_new_dataset
| 0.710666
|
1304.6933
|
Manuel Keglevic
|
Manuel Keglevic and Robert Sablatnig
|
Digit Recognition in Handwritten Weather Records
|
Part of the OAGM/AAPR 2013 proceedings (arXiv:1304.1876), 8 pages
| null | null |
OAGM-AAPR/2013/07
|
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper addresses the automatic recognition of handwritten temperature
values in weather records. The localization of table cells is based on line
detection using projection profiles. Further, a stroke-preserving line removal
method which is based on gradient images is proposed. The presented digit
recognition utilizes features which are extracted using a set of filters and a
Support Vector Machine classifier. It was evaluated on the MNIST and the USPS
dataset and our own database with about 17,000 RGB digit images. An accuracy of
99.36% per digit is achieved for the entire system using a set of 84 weather
records.
|
[
{
"version": "v1",
"created": "Thu, 25 Apr 2013 15:14:42 GMT"
},
{
"version": "v2",
"created": "Fri, 26 Apr 2013 08:35:18 GMT"
}
] | 2013-04-29T00:00:00
|
[
[
"Keglevic",
"Manuel",
""
],
[
"Sablatnig",
"Robert",
""
]
] |
TITLE: Digit Recognition in Handwritten Weather Records
ABSTRACT: This paper addresses the automatic recognition of handwritten temperature
values in weather records. The localization of table cells is based on line
detection using projection profiles. Further, a stroke-preserving line removal
method which is based on gradient images is proposed. The presented digit
recognition utilizes features which are extracted using a set of filters and a
Support Vector Machine classifier. It was evaluated on the MNIST and the USPS
dataset and our own database with about 17,000 RGB digit images. An accuracy of
99.36% per digit is achieved for the entire system using a set of 84 weather
records.
|
no_new_dataset
| 0.692395
|
1304.7048
|
Renato Paes Leme
|
Shahar Dobzinski and Renato Paes Leme
|
Efficiency Guarantees in Auctions with Budgets
| null | null | null | null |
cs.GT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In settings where players have a limited access to liquidity, represented in
the form of budget constraints, efficiency maximization has proven to be a
challenging goal. In particular, the social welfare cannot be approximated by a
better factor then the number of players. Therefore, the literature has mainly
resorted to Pareto-efficiency as a way to achieve efficiency in such settings.
While successful in some important scenarios, in many settings it is known that
either exactly one incentive-compatible auction that always outputs a
Pareto-efficient solution, or that no truthful mechanism can always guarantee a
Pareto-efficient outcome. Traditionally, impossibility results can be avoided
by considering approximations. However, Pareto-efficiency is a binary property
(is either satisfied or not), which does not allow for approximations.
In this paper we propose a new notion of efficiency, called \emph{liquid
welfare}. This is the maximum amount of revenue an omniscient seller would be
able to extract from a certain instance. We explain the intuition behind this
objective function and show that it can be 2-approximated by two different
auctions. Moreover, we show that no truthful algorithm can guarantee an
approximation factor better than 4/3 with respect to the liquid welfare, and
provide a truthful auction that attains this bound in a special case.
Importantly, the liquid welfare benchmark also overcomes impossibilities for
some settings. While it is impossible to design Pareto-efficient auctions for
multi-unit auctions where players have decreasing marginal values, we give a
deterministic $O(\log n)$-approximation for the liquid welfare in this setting.
|
[
{
"version": "v1",
"created": "Fri, 26 Apr 2013 01:29:04 GMT"
}
] | 2013-04-29T00:00:00
|
[
[
"Dobzinski",
"Shahar",
""
],
[
"Leme",
"Renato Paes",
""
]
] |
TITLE: Efficiency Guarantees in Auctions with Budgets
ABSTRACT: In settings where players have a limited access to liquidity, represented in
the form of budget constraints, efficiency maximization has proven to be a
challenging goal. In particular, the social welfare cannot be approximated by a
better factor then the number of players. Therefore, the literature has mainly
resorted to Pareto-efficiency as a way to achieve efficiency in such settings.
While successful in some important scenarios, in many settings it is known that
either exactly one incentive-compatible auction that always outputs a
Pareto-efficient solution, or that no truthful mechanism can always guarantee a
Pareto-efficient outcome. Traditionally, impossibility results can be avoided
by considering approximations. However, Pareto-efficiency is a binary property
(is either satisfied or not), which does not allow for approximations.
In this paper we propose a new notion of efficiency, called \emph{liquid
welfare}. This is the maximum amount of revenue an omniscient seller would be
able to extract from a certain instance. We explain the intuition behind this
objective function and show that it can be 2-approximated by two different
auctions. Moreover, we show that no truthful algorithm can guarantee an
approximation factor better than 4/3 with respect to the liquid welfare, and
provide a truthful auction that attains this bound in a special case.
Importantly, the liquid welfare benchmark also overcomes impossibilities for
some settings. While it is impossible to design Pareto-efficient auctions for
multi-unit auctions where players have decreasing marginal values, we give a
deterministic $O(\log n)$-approximation for the liquid welfare in this setting.
|
no_new_dataset
| 0.707392
|
1304.7140
|
Michael Helmberger Michael Helmberger
|
M. Helmberger, M. Urschler, M. Pienn, Z.Balint, A. Olschewski and H.
Bischof
|
Pulmonary Vascular Tree Segmentation from Contrast-Enhanced CT Images
|
Part of the OAGM/AAPR 2013 proceedings (1304.1876)
| null | null |
OAGM-AAPR/2013/09
|
cs.CV physics.med-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present a pulmonary vessel segmentation algorithm, which is fast, fully
automatic and robust. It uses a coarse segmentation of the airway tree and a
left and right lung labeled volume to restrict a vessel enhancement filter,
based on an offset medialness function, to the lungs. We show the application
of our algorithm on contrast-enhanced CT images, where we derive a clinical
parameter to detect pulmonary hypertension (PH) in patients. Results on a
dataset of 24 patients show that quantitative indices derived from the
segmentation are applicable to distinguish patients with and without PH.
Further work-in-progress results are shown on the VESSEL12 challenge dataset,
which is composed of non-contrast-enhanced scans, where we range in the
midfield of participating contestants.
|
[
{
"version": "v1",
"created": "Fri, 26 Apr 2013 12:30:36 GMT"
}
] | 2013-04-29T00:00:00
|
[
[
"Helmberger",
"M.",
""
],
[
"Urschler",
"M.",
""
],
[
"Pienn",
"M.",
""
],
[
"Balint",
"Z.",
""
],
[
"Olschewski",
"A.",
""
],
[
"Bischof",
"H.",
""
]
] |
TITLE: Pulmonary Vascular Tree Segmentation from Contrast-Enhanced CT Images
ABSTRACT: We present a pulmonary vessel segmentation algorithm, which is fast, fully
automatic and robust. It uses a coarse segmentation of the airway tree and a
left and right lung labeled volume to restrict a vessel enhancement filter,
based on an offset medialness function, to the lungs. We show the application
of our algorithm on contrast-enhanced CT images, where we derive a clinical
parameter to detect pulmonary hypertension (PH) in patients. Results on a
dataset of 24 patients show that quantitative indices derived from the
segmentation are applicable to distinguish patients with and without PH.
Further work-in-progress results are shown on the VESSEL12 challenge dataset,
which is composed of non-contrast-enhanced scans, where we range in the
midfield of participating contestants.
|
no_new_dataset
| 0.699909
|
1304.7236
|
Alessandro Perina
|
Alessandro Perina, Nebojsa Jojic
|
In the sight of my wearable camera: Classifying my visual experience
| null | null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We introduce and we analyze a new dataset which resembles the input to
biological vision systems much more than most previously published ones. Our
analysis leaded to several important conclusions. First, it is possible to
disambiguate over dozens of visual scenes (locations) encountered over the
course of several weeks of a human life with accuracy of over 80%, and this
opens up possibility for numerous novel vision applications, from early
detection of dementia to everyday use of wearable camera streams for automatic
reminders, and visual stream exchange. Second, our experimental results
indicate that, generative models such as Latent Dirichlet Allocation or
Counting Grids, are more suitable to such types of data, as they are more
robust to overtraining and comfortable with images at low resolution, blurred
and characterized by relatively random clutter and a mix of objects.
|
[
{
"version": "v1",
"created": "Fri, 26 Apr 2013 17:28:13 GMT"
}
] | 2013-04-29T00:00:00
|
[
[
"Perina",
"Alessandro",
""
],
[
"Jojic",
"Nebojsa",
""
]
] |
TITLE: In the sight of my wearable camera: Classifying my visual experience
ABSTRACT: We introduce and we analyze a new dataset which resembles the input to
biological vision systems much more than most previously published ones. Our
analysis leaded to several important conclusions. First, it is possible to
disambiguate over dozens of visual scenes (locations) encountered over the
course of several weeks of a human life with accuracy of over 80%, and this
opens up possibility for numerous novel vision applications, from early
detection of dementia to everyday use of wearable camera streams for automatic
reminders, and visual stream exchange. Second, our experimental results
indicate that, generative models such as Latent Dirichlet Allocation or
Counting Grids, are more suitable to such types of data, as they are more
robust to overtraining and comfortable with images at low resolution, blurred
and characterized by relatively random clutter and a mix of objects.
|
new_dataset
| 0.71302
|
1304.6663
|
Bamdev Mishra
|
B. Mishra, G. Meyer and R. Sepulchre
|
Low-rank optimization for distance matrix completion
|
In Proceedings of the 50th IEEE Conference on Decision and Control
and European Control Conference, 2011
| null |
10.1109/CDC.2011.6160810
| null |
math.OC cs.LG stat.ML
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper addresses the problem of low-rank distance matrix completion. This
problem amounts to recover the missing entries of a distance matrix when the
dimension of the data embedding space is possibly unknown but small compared to
the number of considered data points. The focus is on high-dimensional
problems. We recast the considered problem into an optimization problem over
the set of low-rank positive semidefinite matrices and propose two efficient
algorithms for low-rank distance matrix completion. In addition, we propose a
strategy to determine the dimension of the embedding space. The resulting
algorithms scale to high-dimensional problems and monotonically converge to a
global solution of the problem. Finally, numerical experiments illustrate the
good performance of the proposed algorithms on benchmarks.
|
[
{
"version": "v1",
"created": "Wed, 24 Apr 2013 16:52:34 GMT"
},
{
"version": "v2",
"created": "Thu, 25 Apr 2013 09:26:19 GMT"
}
] | 2013-04-26T00:00:00
|
[
[
"Mishra",
"B.",
""
],
[
"Meyer",
"G.",
""
],
[
"Sepulchre",
"R.",
""
]
] |
TITLE: Low-rank optimization for distance matrix completion
ABSTRACT: This paper addresses the problem of low-rank distance matrix completion. This
problem amounts to recover the missing entries of a distance matrix when the
dimension of the data embedding space is possibly unknown but small compared to
the number of considered data points. The focus is on high-dimensional
problems. We recast the considered problem into an optimization problem over
the set of low-rank positive semidefinite matrices and propose two efficient
algorithms for low-rank distance matrix completion. In addition, we propose a
strategy to determine the dimension of the embedding space. The resulting
algorithms scale to high-dimensional problems and monotonically converge to a
global solution of the problem. Finally, numerical experiments illustrate the
good performance of the proposed algorithms on benchmarks.
|
no_new_dataset
| 0.709787
|
1304.6480
|
Liwei Wang
|
Yining Wang, Liwei Wang, Yuanzhi Li, Di He, Tie-Yan Liu, Wei Chen
|
A Theoretical Analysis of NDCG Type Ranking Measures
|
COLT 2013
| null | null | null |
cs.LG cs.IR stat.ML
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A central problem in ranking is to design a ranking measure for evaluation of
ranking functions. In this paper we study, from a theoretical perspective, the
widely used Normalized Discounted Cumulative Gain (NDCG)-type ranking measures.
Although there are extensive empirical studies of NDCG, little is known about
its theoretical properties. We first show that, whatever the ranking function
is, the standard NDCG which adopts a logarithmic discount, converges to 1 as
the number of items to rank goes to infinity. On the first sight, this result
is very surprising. It seems to imply that NDCG cannot differentiate good and
bad ranking functions, contradicting to the empirical success of NDCG in many
applications. In order to have a deeper understanding of ranking measures in
general, we propose a notion referred to as consistent distinguishability. This
notion captures the intuition that a ranking measure should have such a
property: For every pair of substantially different ranking functions, the
ranking measure can decide which one is better in a consistent manner on almost
all datasets. We show that NDCG with logarithmic discount has consistent
distinguishability although it converges to the same limit for all ranking
functions. We next characterize the set of all feasible discount functions for
NDCG according to the concept of consistent distinguishability. Specifically we
show that whether NDCG has consistent distinguishability depends on how fast
the discount decays, and 1/r is a critical point. We then turn to the cut-off
version of NDCG, i.e., NDCG@k. We analyze the distinguishability of NDCG@k for
various choices of k and the discount functions. Experimental results on real
Web search datasets agree well with the theory.
|
[
{
"version": "v1",
"created": "Wed, 24 Apr 2013 04:08:23 GMT"
}
] | 2013-04-25T00:00:00
|
[
[
"Wang",
"Yining",
""
],
[
"Wang",
"Liwei",
""
],
[
"Li",
"Yuanzhi",
""
],
[
"He",
"Di",
""
],
[
"Liu",
"Tie-Yan",
""
],
[
"Chen",
"Wei",
""
]
] |
TITLE: A Theoretical Analysis of NDCG Type Ranking Measures
ABSTRACT: A central problem in ranking is to design a ranking measure for evaluation of
ranking functions. In this paper we study, from a theoretical perspective, the
widely used Normalized Discounted Cumulative Gain (NDCG)-type ranking measures.
Although there are extensive empirical studies of NDCG, little is known about
its theoretical properties. We first show that, whatever the ranking function
is, the standard NDCG which adopts a logarithmic discount, converges to 1 as
the number of items to rank goes to infinity. On the first sight, this result
is very surprising. It seems to imply that NDCG cannot differentiate good and
bad ranking functions, contradicting to the empirical success of NDCG in many
applications. In order to have a deeper understanding of ranking measures in
general, we propose a notion referred to as consistent distinguishability. This
notion captures the intuition that a ranking measure should have such a
property: For every pair of substantially different ranking functions, the
ranking measure can decide which one is better in a consistent manner on almost
all datasets. We show that NDCG with logarithmic discount has consistent
distinguishability although it converges to the same limit for all ranking
functions. We next characterize the set of all feasible discount functions for
NDCG according to the concept of consistent distinguishability. Specifically we
show that whether NDCG has consistent distinguishability depends on how fast
the discount decays, and 1/r is a critical point. We then turn to the cut-off
version of NDCG, i.e., NDCG@k. We analyze the distinguishability of NDCG@k for
various choices of k and the discount functions. Experimental results on real
Web search datasets agree well with the theory.
|
no_new_dataset
| 0.706621
|
1304.5894
|
Bruno Cornelis
|
Bruno Cornelis, Yun Yang, Joshua T. Vogelstein, Ann Dooms, Ingrid
Daubechies, David Dunson
|
Bayesian crack detection in ultra high resolution multimodal images of
paintings
|
8 pages, double column
| null | null | null |
cs.CV cs.LG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The preservation of our cultural heritage is of paramount importance. Thanks
to recent developments in digital acquisition techniques, powerful image
analysis algorithms are developed which can be useful non-invasive tools to
assist in the restoration and preservation of art. In this paper we propose a
semi-supervised crack detection method that can be used for high-dimensional
acquisitions of paintings coming from different modalities. Our dataset
consists of a recently acquired collection of images of the Ghent Altarpiece
(1432), one of Northern Europe's most important art masterpieces. Our goal is
to build a classifier that is able to discern crack pixels from the background
consisting of non-crack pixels, making optimal use of the information that is
provided by each modality. To accomplish this we employ a recently developed
non-parametric Bayesian classifier, that uses tensor factorizations to
characterize any conditional probability. A prior is placed on the parameters
of the factorization such that every possible interaction between predictors is
allowed while still identifying a sparse subset among these predictors. The
proposed Bayesian classifier, which we will refer to as conditional Bayesian
tensor factorization or CBTF, is assessed by visually comparing classification
results with the Random Forest (RF) algorithm.
|
[
{
"version": "v1",
"created": "Mon, 22 Apr 2013 09:46:47 GMT"
},
{
"version": "v2",
"created": "Tue, 23 Apr 2013 09:00:01 GMT"
}
] | 2013-04-24T00:00:00
|
[
[
"Cornelis",
"Bruno",
""
],
[
"Yang",
"Yun",
""
],
[
"Vogelstein",
"Joshua T.",
""
],
[
"Dooms",
"Ann",
""
],
[
"Daubechies",
"Ingrid",
""
],
[
"Dunson",
"David",
""
]
] |
TITLE: Bayesian crack detection in ultra high resolution multimodal images of
paintings
ABSTRACT: The preservation of our cultural heritage is of paramount importance. Thanks
to recent developments in digital acquisition techniques, powerful image
analysis algorithms are developed which can be useful non-invasive tools to
assist in the restoration and preservation of art. In this paper we propose a
semi-supervised crack detection method that can be used for high-dimensional
acquisitions of paintings coming from different modalities. Our dataset
consists of a recently acquired collection of images of the Ghent Altarpiece
(1432), one of Northern Europe's most important art masterpieces. Our goal is
to build a classifier that is able to discern crack pixels from the background
consisting of non-crack pixels, making optimal use of the information that is
provided by each modality. To accomplish this we employ a recently developed
non-parametric Bayesian classifier, that uses tensor factorizations to
characterize any conditional probability. A prior is placed on the parameters
of the factorization such that every possible interaction between predictors is
allowed while still identifying a sparse subset among these predictors. The
proposed Bayesian classifier, which we will refer to as conditional Bayesian
tensor factorization or CBTF, is assessed by visually comparing classification
results with the Random Forest (RF) algorithm.
|
new_dataset
| 0.720153
|
1304.6291
|
Fang Wang
|
Fang Wang and Yi Li
|
Learning Visual Symbols for Parsing Human Poses in Images
|
IJCAI 2013
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Parsing human poses in images is fundamental in extracting critical visual
information for artificial intelligent agents. Our goal is to learn
self-contained body part representations from images, which we call visual
symbols, and their symbol-wise geometric contexts in this parsing process. Each
symbol is individually learned by categorizing visual features leveraged by
geometric information. In the categorization, we use Latent Support Vector
Machine followed by an efficient cross validation procedure to learn visual
symbols. Then, these symbols naturally define geometric contexts of body parts
in a fine granularity. When the structure of the compositional parts is a tree,
we derive an efficient approach to estimating human poses in images.
Experiments on two large datasets suggest our approach outperforms state of the
art methods.
|
[
{
"version": "v1",
"created": "Tue, 23 Apr 2013 14:07:19 GMT"
}
] | 2013-04-24T00:00:00
|
[
[
"Wang",
"Fang",
""
],
[
"Li",
"Yi",
""
]
] |
TITLE: Learning Visual Symbols for Parsing Human Poses in Images
ABSTRACT: Parsing human poses in images is fundamental in extracting critical visual
information for artificial intelligent agents. Our goal is to learn
self-contained body part representations from images, which we call visual
symbols, and their symbol-wise geometric contexts in this parsing process. Each
symbol is individually learned by categorizing visual features leveraged by
geometric information. In the categorization, we use Latent Support Vector
Machine followed by an efficient cross validation procedure to learn visual
symbols. Then, these symbols naturally define geometric contexts of body parts
in a fine granularity. When the structure of the compositional parts is a tree,
we derive an efficient approach to estimating human poses in images.
Experiments on two large datasets suggest our approach outperforms state of the
art methods.
|
no_new_dataset
| 0.711387
|
1212.5238
|
Andrea Baronchelli
|
Delia Mocanu, Andrea Baronchelli, Bruno Gon\c{c}alves, Nicola Perra,
Alessandro Vespignani
|
The Twitter of Babel: Mapping World Languages through Microblogging
Platforms
| null |
PLoS One 8, E61981 (2013)
|
10.1371/journal.pone.0061981
| null |
physics.soc-ph cs.CL cs.SI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Large scale analysis and statistics of socio-technical systems that just a
few short years ago would have required the use of consistent economic and
human resources can nowadays be conveniently performed by mining the enormous
amount of digital data produced by human activities. Although a
characterization of several aspects of our societies is emerging from the data
revolution, a number of questions concerning the reliability and the biases
inherent to the big data "proxies" of social life are still open. Here, we
survey worldwide linguistic indicators and trends through the analysis of a
large-scale dataset of microblogging posts. We show that available data allow
for the study of language geography at scales ranging from country-level
aggregation to specific city neighborhoods. The high resolution and coverage of
the data allows us to investigate different indicators such as the linguistic
homogeneity of different countries, the touristic seasonal patterns within
countries and the geographical distribution of different languages in
multilingual regions. This work highlights the potential of geolocalized
studies of open data sources to improve current analysis and develop indicators
for major social phenomena in specific communities.
|
[
{
"version": "v1",
"created": "Thu, 20 Dec 2012 20:43:12 GMT"
}
] | 2013-04-23T00:00:00
|
[
[
"Mocanu",
"Delia",
""
],
[
"Baronchelli",
"Andrea",
""
],
[
"Gonçalves",
"Bruno",
""
],
[
"Perra",
"Nicola",
""
],
[
"Vespignani",
"Alessandro",
""
]
] |
TITLE: The Twitter of Babel: Mapping World Languages through Microblogging
Platforms
ABSTRACT: Large scale analysis and statistics of socio-technical systems that just a
few short years ago would have required the use of consistent economic and
human resources can nowadays be conveniently performed by mining the enormous
amount of digital data produced by human activities. Although a
characterization of several aspects of our societies is emerging from the data
revolution, a number of questions concerning the reliability and the biases
inherent to the big data "proxies" of social life are still open. Here, we
survey worldwide linguistic indicators and trends through the analysis of a
large-scale dataset of microblogging posts. We show that available data allow
for the study of language geography at scales ranging from country-level
aggregation to specific city neighborhoods. The high resolution and coverage of
the data allows us to investigate different indicators such as the linguistic
homogeneity of different countries, the touristic seasonal patterns within
countries and the geographical distribution of different languages in
multilingual regions. This work highlights the potential of geolocalized
studies of open data sources to improve current analysis and develop indicators
for major social phenomena in specific communities.
|
no_new_dataset
| 0.686002
|
1301.5177
|
Andrea Scharnhorst
|
Linda Reijnhoudt, Rodrigo Costas, Ed Noyons, Katy Boerner, Andrea
Scharnhorst
|
"Seed+Expand": A validated methodology for creating high quality
publication oeuvres of individual researchers
|
Paper accepted for the ISSI 2013, small changes in the text due to
referee comments, one figure added (Fig 3)
| null | null | null |
cs.DL cs.IR
|
http://creativecommons.org/licenses/by/3.0/
|
The study of science at the individual micro-level frequently requires the
disambiguation of author names. The creation of author's publication oeuvres
involves matching the list of unique author names to names used in publication
databases. Despite recent progress in the development of unique author
identifiers, e.g., ORCID, VIVO, or DAI, author disambiguation remains a key
problem when it comes to large-scale bibliometric analysis using data from
multiple databases. This study introduces and validates a new methodology
called seed+expand for semi-automatic bibliographic data collection for a given
set of individual authors. Specifically, we identify the oeuvre of a set of
Dutch full professors during the period 1980-2011. In particular, we combine
author records from the National Research Information System (NARCIS) with
publication records from the Web of Science. Starting with an initial list of
8,378 names, we identify "seed publications" for each author using five
different approaches. Subsequently, we "expand" the set of publication in three
different approaches. The different approaches are compared and resulting
oeuvres are evaluated on precision and recall using a "gold standard" dataset
of authors for which verified publications in the period 2001-2010 are
available.
|
[
{
"version": "v1",
"created": "Tue, 22 Jan 2013 13:16:15 GMT"
},
{
"version": "v2",
"created": "Mon, 22 Apr 2013 11:01:55 GMT"
}
] | 2013-04-23T00:00:00
|
[
[
"Reijnhoudt",
"Linda",
""
],
[
"Costas",
"Rodrigo",
""
],
[
"Noyons",
"Ed",
""
],
[
"Boerner",
"Katy",
""
],
[
"Scharnhorst",
"Andrea",
""
]
] |
TITLE: "Seed+Expand": A validated methodology for creating high quality
publication oeuvres of individual researchers
ABSTRACT: The study of science at the individual micro-level frequently requires the
disambiguation of author names. The creation of author's publication oeuvres
involves matching the list of unique author names to names used in publication
databases. Despite recent progress in the development of unique author
identifiers, e.g., ORCID, VIVO, or DAI, author disambiguation remains a key
problem when it comes to large-scale bibliometric analysis using data from
multiple databases. This study introduces and validates a new methodology
called seed+expand for semi-automatic bibliographic data collection for a given
set of individual authors. Specifically, we identify the oeuvre of a set of
Dutch full professors during the period 1980-2011. In particular, we combine
author records from the National Research Information System (NARCIS) with
publication records from the Web of Science. Starting with an initial list of
8,378 names, we identify "seed publications" for each author using five
different approaches. Subsequently, we "expand" the set of publication in three
different approaches. The different approaches are compared and resulting
oeuvres are evaluated on precision and recall using a "gold standard" dataset
of authors for which verified publications in the period 2001-2010 are
available.
|
no_new_dataset
| 0.7029
|
1304.5755
|
Puneet Kishor
|
Puneet Kishor, Oshani Seneviratne, and Noah Giansiracusa
|
Policy Aware Geospatial Data
|
5 pages. Accepted for ACMGIS 2009, but withdrawn because ACM would
not include this paper unless I presented in person (prior commitments
prevented me from travel even though I had registered)
| null | null | null |
cs.OH
|
http://creativecommons.org/licenses/publicdomain/
|
Digital Rights Management (DRM) prevents end-users from using content in a
manner inconsistent with its creator's wishes. The license describing these
use-conditions typically accompanies the content as its metadata. A resulting
problem is that the license and the content can get separated and lose track of
each other. The best metadata have two distinct qualities--they are created
automatically without user intervention, and they are embedded within the data
that they describe. If licenses are also created and transported this way, data
will always have licenses, and the licenses will be readily examinable. When
two or more datasets are combined, a new dataset, and with it a new license,
are created. This new license is a function of the licenses of the component
datasets and any additional conditions that the person combining the datasets
might want to impose. Following the notion of a data-purpose algebra, we model
this phenomenon by interpreting the transfer and conjunction of data as
inducing an algebraic operation on the corresponding licenses. When a dataset
passes from one source to the next its license is transformed in a
deterministic way, and similarly when datasets are combined the associated
licenses are combined in a non-trivial algebraic manner. Modern,
computer-savvy, licensing regimes such as Creative Commons allow writing the
license in a special kind of language called Creative Commons Rights Expression
Language (ccREL). ccREL allows creating and embedding the license using RDFa
utilizing XHTML. This is preferred over DRM which includes the rights in a
binary file completely opaque to nearly all users. The colocation of metadata
with human-visible XHTML makes the license more transparent. In this paper we
describe a methodology for creating and embedding licenses in geographic data
utilizing ccREL, and programmatically examining embedded licenses in component
data...
|
[
{
"version": "v1",
"created": "Sun, 21 Apr 2013 15:50:46 GMT"
}
] | 2013-04-23T00:00:00
|
[
[
"Kishor",
"Puneet",
""
],
[
"Seneviratne",
"Oshani",
""
],
[
"Giansiracusa",
"Noah",
""
]
] |
TITLE: Policy Aware Geospatial Data
ABSTRACT: Digital Rights Management (DRM) prevents end-users from using content in a
manner inconsistent with its creator's wishes. The license describing these
use-conditions typically accompanies the content as its metadata. A resulting
problem is that the license and the content can get separated and lose track of
each other. The best metadata have two distinct qualities--they are created
automatically without user intervention, and they are embedded within the data
that they describe. If licenses are also created and transported this way, data
will always have licenses, and the licenses will be readily examinable. When
two or more datasets are combined, a new dataset, and with it a new license,
are created. This new license is a function of the licenses of the component
datasets and any additional conditions that the person combining the datasets
might want to impose. Following the notion of a data-purpose algebra, we model
this phenomenon by interpreting the transfer and conjunction of data as
inducing an algebraic operation on the corresponding licenses. When a dataset
passes from one source to the next its license is transformed in a
deterministic way, and similarly when datasets are combined the associated
licenses are combined in a non-trivial algebraic manner. Modern,
computer-savvy, licensing regimes such as Creative Commons allow writing the
license in a special kind of language called Creative Commons Rights Expression
Language (ccREL). ccREL allows creating and embedding the license using RDFa
utilizing XHTML. This is preferred over DRM which includes the rights in a
binary file completely opaque to nearly all users. The colocation of metadata
with human-visible XHTML makes the license more transparent. In this paper we
describe a methodology for creating and embedding licenses in geographic data
utilizing ccREL, and programmatically examining embedded licenses in component
data...
|
no_new_dataset
| 0.709372
|
1304.5876
|
Jin-Kao Hao
|
Yang Wang, Jin-Kao Hao, Fred Glover, Zhipeng L\"u
|
Solving the minimum sum coloring problem via binary quadratic
programming
|
Short pre-print
| null | null | null |
cs.DS cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In recent years, binary quadratic programming (BQP) has been successively
applied to solve several combinatorial optimization problems. We consider in
this paper a study of using the BQP model to solve the minimum sum coloring
problem (MSCP). For this purpose, we recast the MSCP with a quadratic model
which is then solved via a recently proposed Path Relinking (PR) algorithm
designed for the general BQP. Based on a set of MSCP benchmark instances, we
investigate the performance of this solution approach compared with existing
methods.
|
[
{
"version": "v1",
"created": "Mon, 22 Apr 2013 08:56:11 GMT"
}
] | 2013-04-23T00:00:00
|
[
[
"Wang",
"Yang",
""
],
[
"Hao",
"Jin-Kao",
""
],
[
"Glover",
"Fred",
""
],
[
"Lü",
"Zhipeng",
""
]
] |
TITLE: Solving the minimum sum coloring problem via binary quadratic
programming
ABSTRACT: In recent years, binary quadratic programming (BQP) has been successively
applied to solve several combinatorial optimization problems. We consider in
this paper a study of using the BQP model to solve the minimum sum coloring
problem (MSCP). For this purpose, we recast the MSCP with a quadratic model
which is then solved via a recently proposed Path Relinking (PR) algorithm
designed for the general BQP. Based on a set of MSCP benchmark instances, we
investigate the performance of this solution approach compared with existing
methods.
|
no_new_dataset
| 0.709806
|
1304.5330
|
Li-Zhao You
|
Lizhao You, Zimu Yuan, Bin Tang, Guihai Chen
|
Minimum Latency Broadcast Scheduling in Single-Radio Multi-Channel
Wireless Ad-Hoc Networks
|
6 pages, 2 figures
| null | null | null |
cs.NI
|
http://creativecommons.org/licenses/by-nc-sa/3.0/
|
We study the minimum latency broadcast scheduling (MLBS) problem in
Single-Radio Multi-Channel (SR-MC) wireless ad-hoc networks (WANETs), which are
modeled by Unit Disk Graphs. Nodes with this capability have their fixed
reception channels, but can switch their transmission channels to communicate
with their neighbors. The single-radio and multi-channel model prevents
existing algorithms for single-channel networks achieving good performance.
First, the common assumption that one transmission reaches all the neighboring
nodes does not hold naturally. Second, the multi-channel dimension provides new
opportunities to schedule the broadcast transmissions in parallel. We show MLBS
problem in SR-MC WANETs is NP-hard, and present a benchmark algorithm: Basic
Transmission Scheduling (BTS), which has approximation ratio of 4k + 12. Here k
is the number of orthogonal channels in SR-MC WANETs. Then we propose an
Enhanced Transmission Scheduling (ETS) algorithm, improving the approximation
ratio to k + 23. Simulation results show that ETS achieves better performance
over BTS, and the performance of ETS approaches the lower bound.
|
[
{
"version": "v1",
"created": "Fri, 19 Apr 2013 07:15:05 GMT"
}
] | 2013-04-22T00:00:00
|
[
[
"You",
"Lizhao",
""
],
[
"Yuan",
"Zimu",
""
],
[
"Tang",
"Bin",
""
],
[
"Chen",
"Guihai",
""
]
] |
TITLE: Minimum Latency Broadcast Scheduling in Single-Radio Multi-Channel
Wireless Ad-Hoc Networks
ABSTRACT: We study the minimum latency broadcast scheduling (MLBS) problem in
Single-Radio Multi-Channel (SR-MC) wireless ad-hoc networks (WANETs), which are
modeled by Unit Disk Graphs. Nodes with this capability have their fixed
reception channels, but can switch their transmission channels to communicate
with their neighbors. The single-radio and multi-channel model prevents
existing algorithms for single-channel networks achieving good performance.
First, the common assumption that one transmission reaches all the neighboring
nodes does not hold naturally. Second, the multi-channel dimension provides new
opportunities to schedule the broadcast transmissions in parallel. We show MLBS
problem in SR-MC WANETs is NP-hard, and present a benchmark algorithm: Basic
Transmission Scheduling (BTS), which has approximation ratio of 4k + 12. Here k
is the number of orthogonal channels in SR-MC WANETs. Then we propose an
Enhanced Transmission Scheduling (ETS) algorithm, improving the approximation
ratio to k + 23. Simulation results show that ETS achieves better performance
over BTS, and the performance of ETS approaches the lower bound.
|
no_new_dataset
| 0.70614
|
1304.4679
|
Huiyi Hu
|
Huiyi Hu, Thomas Laurent, Mason A. Porter, Andrea L. Bertozzi
|
A Method Based on Total Variation for Network Modularity Optimization
using the MBO Scheme
|
23 pages
| null | null | null |
cs.SI math.OC physics.soc-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The study of network structure is pervasive in sociology, biology, computer
science, and many other disciplines. One of the most important areas of network
science is the algorithmic detection of cohesive groups of nodes called
"communities". One popular approach to find communities is to maximize a
quality function known as {\em modularity} to achieve some sort of optimal
clustering of nodes. In this paper, we interpret the modularity function from a
novel perspective: we reformulate modularity optimization as a minimization
problem of an energy functional that consists of a total variation term and an
$\ell_2$ balance term. By employing numerical techniques from image processing
and $\ell_1$ compressive sensing -- such as convex splitting and the
Merriman-Bence-Osher (MBO) scheme -- we develop a variational algorithm for the
minimization problem. We present our computational results using both synthetic
benchmark networks and real data.
|
[
{
"version": "v1",
"created": "Wed, 17 Apr 2013 04:11:37 GMT"
}
] | 2013-04-18T00:00:00
|
[
[
"Hu",
"Huiyi",
""
],
[
"Laurent",
"Thomas",
""
],
[
"Porter",
"Mason A.",
""
],
[
"Bertozzi",
"Andrea L.",
""
]
] |
TITLE: A Method Based on Total Variation for Network Modularity Optimization
using the MBO Scheme
ABSTRACT: The study of network structure is pervasive in sociology, biology, computer
science, and many other disciplines. One of the most important areas of network
science is the algorithmic detection of cohesive groups of nodes called
"communities". One popular approach to find communities is to maximize a
quality function known as {\em modularity} to achieve some sort of optimal
clustering of nodes. In this paper, we interpret the modularity function from a
novel perspective: we reformulate modularity optimization as a minimization
problem of an energy functional that consists of a total variation term and an
$\ell_2$ balance term. By employing numerical techniques from image processing
and $\ell_1$ compressive sensing -- such as convex splitting and the
Merriman-Bence-Osher (MBO) scheme -- we develop a variational algorithm for the
minimization problem. We present our computational results using both synthetic
benchmark networks and real data.
|
no_new_dataset
| 0.709573
|
1304.4371
|
Joel Lang
|
Joel Lang and James Henderson
|
Efficient Computation of Mean Truncated Hitting Times on Very Large
Graphs
| null | null | null | null |
cs.DS cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Previous work has shown the effectiveness of random walk hitting times as a
measure of dissimilarity in a variety of graph-based learning problems such as
collaborative filtering, query suggestion or finding paraphrases. However,
application of hitting times has been limited to small datasets because of
computational restrictions. This paper develops a new approximation algorithm
with which hitting times can be computed on very large, disk-resident graphs,
making their application possible to problems which were previously out of
reach. This will potentially benefit a range of large-scale problems.
|
[
{
"version": "v1",
"created": "Tue, 16 Apr 2013 09:11:16 GMT"
}
] | 2013-04-17T00:00:00
|
[
[
"Lang",
"Joel",
""
],
[
"Henderson",
"James",
""
]
] |
TITLE: Efficient Computation of Mean Truncated Hitting Times on Very Large
Graphs
ABSTRACT: Previous work has shown the effectiveness of random walk hitting times as a
measure of dissimilarity in a variety of graph-based learning problems such as
collaborative filtering, query suggestion or finding paraphrases. However,
application of hitting times has been limited to small datasets because of
computational restrictions. This paper develops a new approximation algorithm
with which hitting times can be computed on very large, disk-resident graphs,
making their application possible to problems which were previously out of
reach. This will potentially benefit a range of large-scale problems.
|
no_new_dataset
| 0.70825
|
1304.3745
|
Khadoudja Ghanem
|
Khadoudja Ghanem
|
Towards more accurate clustering method by using dynamic time warping
|
12 pages, 1 figure, 2 tables, journal. arXiv admin note: text overlap
with arXiv:1206.3509 by other authors
|
International Journal of Data Mining & Knowledge Management
Process (IJDKP) Vol.3, No.2, March 2013
|
10.5121/ijdkp.2013.3207
| null |
cs.LG stat.ML
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
An intrinsic problem of classifiers based on machine learning (ML) methods is
that their learning time grows as the size and complexity of the training
dataset increases. For this reason, it is important to have efficient
computational methods and algorithms that can be applied on large datasets,
such that it is still possible to complete the machine learning tasks in
reasonable time. In this context, we present in this paper a more accurate
simple process to speed up ML methods. An unsupervised clustering algorithm is
combined with Expectation, Maximization (EM) algorithm to develop an efficient
Hidden Markov Model (HMM) training. The idea of the proposed process consists
of two steps. In the first step, training instances with similar inputs are
clustered and a weight factor which represents the frequency of these instances
is assigned to each representative cluster. Dynamic Time Warping technique is
used as a dissimilarity function to cluster similar examples. In the second
step, all formulas in the classical HMM training algorithm (EM) associated with
the number of training instances are modified to include the weight factor in
appropriate terms. This process significantly accelerates HMM training while
maintaining the same initial, transition and emission probabilities matrixes as
those obtained with the classical HMM training algorithm. Accordingly, the
classification accuracy is preserved. Depending on the size of the training
set, speedups of up to 2200 times is possible when the size is about 100.000
instances. The proposed approach is not limited to training HMMs, but it can be
employed for a large variety of MLs methods.
|
[
{
"version": "v1",
"created": "Fri, 12 Apr 2013 22:23:53 GMT"
}
] | 2013-04-16T00:00:00
|
[
[
"Ghanem",
"Khadoudja",
""
]
] |
TITLE: Towards more accurate clustering method by using dynamic time warping
ABSTRACT: An intrinsic problem of classifiers based on machine learning (ML) methods is
that their learning time grows as the size and complexity of the training
dataset increases. For this reason, it is important to have efficient
computational methods and algorithms that can be applied on large datasets,
such that it is still possible to complete the machine learning tasks in
reasonable time. In this context, we present in this paper a more accurate
simple process to speed up ML methods. An unsupervised clustering algorithm is
combined with Expectation, Maximization (EM) algorithm to develop an efficient
Hidden Markov Model (HMM) training. The idea of the proposed process consists
of two steps. In the first step, training instances with similar inputs are
clustered and a weight factor which represents the frequency of these instances
is assigned to each representative cluster. Dynamic Time Warping technique is
used as a dissimilarity function to cluster similar examples. In the second
step, all formulas in the classical HMM training algorithm (EM) associated with
the number of training instances are modified to include the weight factor in
appropriate terms. This process significantly accelerates HMM training while
maintaining the same initial, transition and emission probabilities matrixes as
those obtained with the classical HMM training algorithm. Accordingly, the
classification accuracy is preserved. Depending on the size of the training
set, speedups of up to 2200 times is possible when the size is about 100.000
instances. The proposed approach is not limited to training HMMs, but it can be
employed for a large variety of MLs methods.
|
no_new_dataset
| 0.71039
|
1304.3804
|
Emilio Coppa
|
Emilio Coppa, Camil Demetrescu, Irene Finocchi and Romolo Marotta
|
Multithreaded Input-Sensitive Profiling
| null | null | null | null |
cs.PF cs.PL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Input-sensitive profiling is a recent performance analysis technique that
makes it possible to estimate the empirical cost function of individual
routines of a program, helping developers understand how performance scales to
larger inputs and pinpoint asymptotic bottlenecks in the code. A current
limitation of input-sensitive profilers is that they specifically target
sequential computations, ignoring any communication between threads. In this
paper we show how to overcome this limitation, extending the range of
applicability of the original approach to multithreaded applications and to
applications that operate on I/O streams. We develop new metrics for
automatically estimating the size of the input given to each routine
activation, addressing input produced by non-deterministic memory stores
performed by other threads as well as by the OS kernel (e.g., in response to
I/O or network operations). We provide real case studies, showing that our
extension allows it to characterize the behavior of complex applications more
precisely than previous approaches. An extensive experimental investigation on
a variety of benchmark suites (including the SPEC OMP2012 and the PARSEC
benchmarks) shows that our Valgrind-based input-sensitive profiler incurs an
overhead comparable to other prominent heavyweight analysis tools, while
collecting significantly more performance points from each profiling session
and correctly characterizing both thread-induced and external input.
|
[
{
"version": "v1",
"created": "Sat, 13 Apr 2013 12:39:34 GMT"
}
] | 2013-04-16T00:00:00
|
[
[
"Coppa",
"Emilio",
""
],
[
"Demetrescu",
"Camil",
""
],
[
"Finocchi",
"Irene",
""
],
[
"Marotta",
"Romolo",
""
]
] |
TITLE: Multithreaded Input-Sensitive Profiling
ABSTRACT: Input-sensitive profiling is a recent performance analysis technique that
makes it possible to estimate the empirical cost function of individual
routines of a program, helping developers understand how performance scales to
larger inputs and pinpoint asymptotic bottlenecks in the code. A current
limitation of input-sensitive profilers is that they specifically target
sequential computations, ignoring any communication between threads. In this
paper we show how to overcome this limitation, extending the range of
applicability of the original approach to multithreaded applications and to
applications that operate on I/O streams. We develop new metrics for
automatically estimating the size of the input given to each routine
activation, addressing input produced by non-deterministic memory stores
performed by other threads as well as by the OS kernel (e.g., in response to
I/O or network operations). We provide real case studies, showing that our
extension allows it to characterize the behavior of complex applications more
precisely than previous approaches. An extensive experimental investigation on
a variety of benchmark suites (including the SPEC OMP2012 and the PARSEC
benchmarks) shows that our Valgrind-based input-sensitive profiler incurs an
overhead comparable to other prominent heavyweight analysis tools, while
collecting significantly more performance points from each profiling session
and correctly characterizing both thread-induced and external input.
|
no_new_dataset
| 0.707967
|
1304.3816
|
Justin Thaler
|
Amit Chakrabarti and Graham Cormode and Navin Goyal and Justin Thaler
|
Annotations for Sparse Data Streams
|
29 pages, 5 tables
| null | null | null |
cs.CC cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Motivated by cloud computing, a number of recent works have studied annotated
data streams and variants thereof. In this setting, a computationally weak
verifier (cloud user), lacking the resources to store and manipulate his
massive input locally, accesses a powerful but untrusted prover (cloud
service). The verifier must work within the restrictive data streaming
paradigm. The prover, who can annotate the data stream as it is read, must not
just supply the answer but also convince the verifier of its correctness.
Ideally, both the amount of annotation and the space used by the verifier
should be sublinear in the relevant input size parameters.
A rich theory of such algorithms -- which we call schemes -- has emerged.
Prior work has shown how to leverage the prover's power to efficiently solve
problems that have no non-trivial standard data stream algorithms. However,
while optimal schemes are now known for several basic problems, such optimality
holds only for streams whose length is commensurate with the size of the data
universe. In contrast, many real-world datasets are relatively sparse,
including graphs that contain only O(n^2) edges, and IP traffic streams that
contain much fewer than the total number of possible IP addresses, 2^128 in
IPv6.
We design the first schemes that allow both the annotation and the space
usage to be sublinear in the total number of stream updates rather than the
size of the data universe. We solve significant problems, including variations
of INDEX, SET-DISJOINTNESS, and FREQUENCY-MOMENTS, plus several natural
problems on graphs. On the other hand, we give a new lower bound that, for the
first time, rules out smooth tradeoffs between annotation and space usage for a
specific problem. Our technique brings out new nuances in Merlin-Arthur
communication complexity models, and provides a separation between online
versions of the MA and AMA models.
|
[
{
"version": "v1",
"created": "Sat, 13 Apr 2013 15:17:28 GMT"
}
] | 2013-04-16T00:00:00
|
[
[
"Chakrabarti",
"Amit",
""
],
[
"Cormode",
"Graham",
""
],
[
"Goyal",
"Navin",
""
],
[
"Thaler",
"Justin",
""
]
] |
TITLE: Annotations for Sparse Data Streams
ABSTRACT: Motivated by cloud computing, a number of recent works have studied annotated
data streams and variants thereof. In this setting, a computationally weak
verifier (cloud user), lacking the resources to store and manipulate his
massive input locally, accesses a powerful but untrusted prover (cloud
service). The verifier must work within the restrictive data streaming
paradigm. The prover, who can annotate the data stream as it is read, must not
just supply the answer but also convince the verifier of its correctness.
Ideally, both the amount of annotation and the space used by the verifier
should be sublinear in the relevant input size parameters.
A rich theory of such algorithms -- which we call schemes -- has emerged.
Prior work has shown how to leverage the prover's power to efficiently solve
problems that have no non-trivial standard data stream algorithms. However,
while optimal schemes are now known for several basic problems, such optimality
holds only for streams whose length is commensurate with the size of the data
universe. In contrast, many real-world datasets are relatively sparse,
including graphs that contain only O(n^2) edges, and IP traffic streams that
contain much fewer than the total number of possible IP addresses, 2^128 in
IPv6.
We design the first schemes that allow both the annotation and the space
usage to be sublinear in the total number of stream updates rather than the
size of the data universe. We solve significant problems, including variations
of INDEX, SET-DISJOINTNESS, and FREQUENCY-MOMENTS, plus several natural
problems on graphs. On the other hand, we give a new lower bound that, for the
first time, rules out smooth tradeoffs between annotation and space usage for a
specific problem. Our technique brings out new nuances in Merlin-Arthur
communication complexity models, and provides a separation between online
versions of the MA and AMA models.
|
no_new_dataset
| 0.707632
|
1304.3924
|
Nicolas Robinson-Garcia
|
J.A. Garc\'ia, Rosa Rodriguez-S\'anchez, Joaqu\'in Fdez-Valdivia,
Nicol\'as Robinson-Garcia, Daniel Torres-Salinas
|
Best-in-class and Strategic Benchmarking of Scientific Subject
Categories of Web of Science in 2010
| null |
Garc\'ia, J.A. et al. Best-in-class and Strategic Benchmarking of
Scientific Subject Categories of Web of Science in 2010. Scientometrics.
Online first. doi:10.1007/s11192-013-1000-1
|
10.1007/s11192-013-1000-1
| null |
cs.DL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Here we show a novel technique for comparing subject categories, where the
prestige of academic journals in each category is represented statistically by
an impact-factor histogram. For each subject category we compute the
probability of occurrence of scholarly journals with impact factor in different
intervals. Here impact factor is measured with Thomson Reuters Impact Factor,
Eigenfactor Score, and Immediacy Index. Assuming the probabilities associated
with a pair of subject categories our objective is to measure the degree of
dissimilarity between them. To do so, we use an axiomatic characterization for
predicting dissimilarity between subject categories. The scientific subject
categories of Web of Science in 2010 were used to test the proposed approach
for benchmarking Cell Biology and Computer Science Information Systems with the
rest as two case studies. The former is best-in-class benchmarking that
involves studying the leading competitor category; the latter is strategic
benchmarking that involves observing how other scientific subject categories
compete.
|
[
{
"version": "v1",
"created": "Sun, 14 Apr 2013 16:52:41 GMT"
}
] | 2013-04-16T00:00:00
|
[
[
"García",
"J. A.",
""
],
[
"Rodriguez-Sánchez",
"Rosa",
""
],
[
"Fdez-Valdivia",
"Joaquín",
""
],
[
"Robinson-Garcia",
"Nicolás",
""
],
[
"Torres-Salinas",
"Daniel",
""
]
] |
TITLE: Best-in-class and Strategic Benchmarking of Scientific Subject
Categories of Web of Science in 2010
ABSTRACT: Here we show a novel technique for comparing subject categories, where the
prestige of academic journals in each category is represented statistically by
an impact-factor histogram. For each subject category we compute the
probability of occurrence of scholarly journals with impact factor in different
intervals. Here impact factor is measured with Thomson Reuters Impact Factor,
Eigenfactor Score, and Immediacy Index. Assuming the probabilities associated
with a pair of subject categories our objective is to measure the degree of
dissimilarity between them. To do so, we use an axiomatic characterization for
predicting dissimilarity between subject categories. The scientific subject
categories of Web of Science in 2010 were used to test the proposed approach
for benchmarking Cell Biology and Computer Science Information Systems with the
rest as two case studies. The former is best-in-class benchmarking that
involves studying the leading competitor category; the latter is strategic
benchmarking that involves observing how other scientific subject categories
compete.
|
no_new_dataset
| 0.712076
|
1304.4041
|
Humayun Irshad
|
H. Irshad, A. Gouaillard, L. Roux, D. Racoceanu
|
Multispectral Spatial Characterization: Application to Mitosis Detection
in Breast Cancer Histopathology
| null | null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Accurate detection of mitosis plays a critical role in breast cancer
histopathology. Manual detection and counting of mitosis is tedious and subject
to considerable inter- and intra-reader variations. Multispectral imaging is a
recent medical imaging technology, proven successful in increasing the
segmentation accuracy in other fields. This study aims at improving the
accuracy of mitosis detection by developing a specific solution using
multispectral and multifocal imaging of breast cancer histopathological data.
We propose to enable clinical routine-compliant quality of mitosis
discrimination from other objects. The proposed framework includes
comprehensive analysis of spectral bands and z-stack focus planes, detection of
expected mitotic regions (candidates) in selected focus planes and spectral
bands, computation of multispectral spatial features for each candidate,
selection of multispectral spatial features and a study of different
state-of-the-art classification methods for candidates classification as
mitotic or non mitotic figures. This framework has been evaluated on MITOS
multispectral medical dataset and achieved 60% detection rate and 57%
F-Measure. Our results indicate that multispectral spatial features have more
information for mitosis classification in comparison with white spectral band
features, being therefore a very promising exploration area to improve the
quality of the diagnosis assistance in histopathology.
|
[
{
"version": "v1",
"created": "Mon, 15 Apr 2013 10:11:34 GMT"
}
] | 2013-04-16T00:00:00
|
[
[
"Irshad",
"H.",
""
],
[
"Gouaillard",
"A.",
""
],
[
"Roux",
"L.",
""
],
[
"Racoceanu",
"D.",
""
]
] |
TITLE: Multispectral Spatial Characterization: Application to Mitosis Detection
in Breast Cancer Histopathology
ABSTRACT: Accurate detection of mitosis plays a critical role in breast cancer
histopathology. Manual detection and counting of mitosis is tedious and subject
to considerable inter- and intra-reader variations. Multispectral imaging is a
recent medical imaging technology, proven successful in increasing the
segmentation accuracy in other fields. This study aims at improving the
accuracy of mitosis detection by developing a specific solution using
multispectral and multifocal imaging of breast cancer histopathological data.
We propose to enable clinical routine-compliant quality of mitosis
discrimination from other objects. The proposed framework includes
comprehensive analysis of spectral bands and z-stack focus planes, detection of
expected mitotic regions (candidates) in selected focus planes and spectral
bands, computation of multispectral spatial features for each candidate,
selection of multispectral spatial features and a study of different
state-of-the-art classification methods for candidates classification as
mitotic or non mitotic figures. This framework has been evaluated on MITOS
multispectral medical dataset and achieved 60% detection rate and 57%
F-Measure. Our results indicate that multispectral spatial features have more
information for mitosis classification in comparison with white spectral band
features, being therefore a very promising exploration area to improve the
quality of the diagnosis assistance in histopathology.
|
no_new_dataset
| 0.671901
|
1304.3192
|
Yulan Guo
|
Yulan Guo, Ferdous Sohel, Mohammed Bennamoun, Min Lu, Jianwei Wan
|
Rotational Projection Statistics for 3D Local Surface Description and
Object Recognition
|
The final publication is available at link.springer.com International
Journal of Computer Vision 2013
| null |
10.1007/s11263-013-0627-y
| null |
cs.CV
|
http://creativecommons.org/licenses/by/3.0/
|
Recognizing 3D objects in the presence of noise, varying mesh resolution,
occlusion and clutter is a very challenging task. This paper presents a novel
method named Rotational Projection Statistics (RoPS). It has three major
modules: Local Reference Frame (LRF) definition, RoPS feature description and
3D object recognition. We propose a novel technique to define the LRF by
calculating the scatter matrix of all points lying on the local surface. RoPS
feature descriptors are obtained by rotationally projecting the neighboring
points of a feature point onto 2D planes and calculating a set of statistics
(including low-order central moments and entropy) of the distribution of these
projected points. Using the proposed LRF and RoPS descriptor, we present a
hierarchical 3D object recognition algorithm. The performance of the proposed
LRF, RoPS descriptor and object recognition algorithm was rigorously tested on
a number of popular and publicly available datasets. Our proposed techniques
exhibited superior performance compared to existing techniques. We also showed
that our method is robust with respect to noise and varying mesh resolution.
Our RoPS based algorithm achieved recognition rates of 100%, 98.9%, 95.4% and
96.0% respectively when tested on the Bologna, UWA, Queen's and Ca' Foscari
Venezia Datasets.
|
[
{
"version": "v1",
"created": "Thu, 11 Apr 2013 04:26:52 GMT"
}
] | 2013-04-12T00:00:00
|
[
[
"Guo",
"Yulan",
""
],
[
"Sohel",
"Ferdous",
""
],
[
"Bennamoun",
"Mohammed",
""
],
[
"Lu",
"Min",
""
],
[
"Wan",
"Jianwei",
""
]
] |
TITLE: Rotational Projection Statistics for 3D Local Surface Description and
Object Recognition
ABSTRACT: Recognizing 3D objects in the presence of noise, varying mesh resolution,
occlusion and clutter is a very challenging task. This paper presents a novel
method named Rotational Projection Statistics (RoPS). It has three major
modules: Local Reference Frame (LRF) definition, RoPS feature description and
3D object recognition. We propose a novel technique to define the LRF by
calculating the scatter matrix of all points lying on the local surface. RoPS
feature descriptors are obtained by rotationally projecting the neighboring
points of a feature point onto 2D planes and calculating a set of statistics
(including low-order central moments and entropy) of the distribution of these
projected points. Using the proposed LRF and RoPS descriptor, we present a
hierarchical 3D object recognition algorithm. The performance of the proposed
LRF, RoPS descriptor and object recognition algorithm was rigorously tested on
a number of popular and publicly available datasets. Our proposed techniques
exhibited superior performance compared to existing techniques. We also showed
that our method is robust with respect to noise and varying mesh resolution.
Our RoPS based algorithm achieved recognition rates of 100%, 98.9%, 95.4% and
96.0% respectively when tested on the Bologna, UWA, Queen's and Ca' Foscari
Venezia Datasets.
|
no_new_dataset
| 0.711606
|
1304.3406
|
Seyed Hamed Alemohammad
|
Seyed Hamed Alemohammad, Dara Entekhabi
|
Merging Satellite Measurements of Rainfall Using Multi-scale Imagery
Technique
|
6 pages, 10 Figures, WCRP Open Science Conference, 2011
| null | null | null |
cs.CV cs.IR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Several passive microwave satellites orbit the Earth and measure rainfall.
These measurements have the advantage of almost full global coverage when
compared to surface rain gauges. However, these satellites have low temporal
revisit and missing data over some regions. Image fusion is a useful technique
to fill in the gaps of one image (one satellite measurement) using another one.
The proposed algorithm uses an iterative fusion scheme to integrate information
from two satellite measurements. The algorithm is implemented on two datasets
for 7 years of half-hourly data. The results show significant improvements in
rain detection and rain intensity in the merged measurements.
|
[
{
"version": "v1",
"created": "Thu, 11 Apr 2013 19:31:57 GMT"
}
] | 2013-04-12T00:00:00
|
[
[
"Alemohammad",
"Seyed Hamed",
""
],
[
"Entekhabi",
"Dara",
""
]
] |
TITLE: Merging Satellite Measurements of Rainfall Using Multi-scale Imagery
Technique
ABSTRACT: Several passive microwave satellites orbit the Earth and measure rainfall.
These measurements have the advantage of almost full global coverage when
compared to surface rain gauges. However, these satellites have low temporal
revisit and missing data over some regions. Image fusion is a useful technique
to fill in the gaps of one image (one satellite measurement) using another one.
The proposed algorithm uses an iterative fusion scheme to integrate information
from two satellite measurements. The algorithm is implemented on two datasets
for 7 years of half-hourly data. The results show significant improvements in
rain detection and rain intensity in the merged measurements.
|
no_new_dataset
| 0.710377
|
1302.6569
|
Nicola Perra
|
Qian Zhang, Nicola Perra, Bruno Goncalves, Fabio Ciulla, Alessandro
Vespignani
|
Characterizing scientific production and consumption in Physics
| null |
Nature Scientific Reports 3, 1640 (2013)
|
10.1038/srep01640
| null |
physics.soc-ph cs.DL cs.SI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We analyze the entire publication database of the American Physical Society
generating longitudinal (50 years) citation networks geolocalized at the level
of single urban areas. We define the knowledge diffusion proxy, and scientific
production ranking algorithms to capture the spatio-temporal dynamics of
Physics knowledge worldwide. By using the knowledge diffusion proxy we identify
the key cities in the production and consumption of knowledge in Physics as a
function of time. The results from the scientific production ranking algorithm
allow us to characterize the top cities for scholarly research in Physics.
Although we focus on a single dataset concerning a specific field, the
methodology presented here opens the path to comparative studies of the
dynamics of knowledge across disciplines and research areas
|
[
{
"version": "v1",
"created": "Tue, 26 Feb 2013 20:33:51 GMT"
}
] | 2013-04-11T00:00:00
|
[
[
"Zhang",
"Qian",
""
],
[
"Perra",
"Nicola",
""
],
[
"Goncalves",
"Bruno",
""
],
[
"Ciulla",
"Fabio",
""
],
[
"Vespignani",
"Alessandro",
""
]
] |
TITLE: Characterizing scientific production and consumption in Physics
ABSTRACT: We analyze the entire publication database of the American Physical Society
generating longitudinal (50 years) citation networks geolocalized at the level
of single urban areas. We define the knowledge diffusion proxy, and scientific
production ranking algorithms to capture the spatio-temporal dynamics of
Physics knowledge worldwide. By using the knowledge diffusion proxy we identify
the key cities in the production and consumption of knowledge in Physics as a
function of time. The results from the scientific production ranking algorithm
allow us to characterize the top cities for scholarly research in Physics.
Although we focus on a single dataset concerning a specific field, the
methodology presented here opens the path to comparative studies of the
dynamics of knowledge across disciplines and research areas
|
no_new_dataset
| 0.711469
|
1303.3087
|
Togerchety Hitendra sarma
|
Mallikarjun Hangarge, K.C. Santosh, Srikanth Doddamani, Rajmohan
Pardeshi
|
Statistical Texture Features based Handwritten and Printed Text
Classification in South Indian Documents
|
Appeared in ICECIT-2102
| null | null |
Volume 1,Number 32
|
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we use statistical texture features for handwritten and
printed text classification. We primarily aim for word level classification in
south Indian scripts. Words are first extracted from the scanned document. For
each extracted word, statistical texture features are computed such as mean,
standard deviation, smoothness, moment, uniformity, entropy and local range
including local entropy. These feature vectors are then used to classify words
via k-NN classifier. We have validated the approach over several different
datasets. Scripts like Kannada, Telugu, Malayalam and Hindi i.e., Devanagari
are primarily employed where an average classification rate of 99.26% is
achieved. In addition, to provide an extensibility of the approach, we address
Roman script by using publicly available dataset and interesting results are
reported.
|
[
{
"version": "v1",
"created": "Wed, 13 Mar 2013 04:51:22 GMT"
}
] | 2013-04-11T00:00:00
|
[
[
"Hangarge",
"Mallikarjun",
""
],
[
"Santosh",
"K. C.",
""
],
[
"Doddamani",
"Srikanth",
""
],
[
"Pardeshi",
"Rajmohan",
""
]
] |
TITLE: Statistical Texture Features based Handwritten and Printed Text
Classification in South Indian Documents
ABSTRACT: In this paper, we use statistical texture features for handwritten and
printed text classification. We primarily aim for word level classification in
south Indian scripts. Words are first extracted from the scanned document. For
each extracted word, statistical texture features are computed such as mean,
standard deviation, smoothness, moment, uniformity, entropy and local range
including local entropy. These feature vectors are then used to classify words
via k-NN classifier. We have validated the approach over several different
datasets. Scripts like Kannada, Telugu, Malayalam and Hindi i.e., Devanagari
are primarily employed where an average classification rate of 99.26% is
achieved. In addition, to provide an extensibility of the approach, we address
Roman script by using publicly available dataset and interesting results are
reported.
|
no_new_dataset
| 0.714211
|
1304.2917
|
Flavia Maria Darcie Marquitti
|
Flavia Maria Darcie Marquitti, Paulo Roberto Guimaraes Jr., Mathias
Mistretta Pires, Luiz Fernando Bittencourt
|
MODULAR: Software for the Autonomous Computation of Modularity in Large
Network Sets
| null | null | null | null |
q-bio.QM cs.SI physics.soc-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Ecological systems can be seen as networks of interactions between
individual, species, or habitat patches. A key feature of many ecological
networks is their organization into modules, which are subsets of elements that
are more connected to each other than to the other elements in the network. We
introduce MODULAR to perform rapid and autonomous calculation of modularity in
sets of networks. MODULAR reads a set of files with matrices or edge lists that
represent unipartite or bipartite networks, and identify modules using two
different modularity metrics that have been previously used in studies of
ecological networks. To find the network partition that maximizes modularity,
the software offers five optimization methods to the user. We also included two
of the most common null models that are used in studies of ecological networks
to verify how the modularity found by the maximization of each metric differs
from a theoretical benchmark.
|
[
{
"version": "v1",
"created": "Tue, 9 Apr 2013 14:37:44 GMT"
}
] | 2013-04-11T00:00:00
|
[
[
"Marquitti",
"Flavia Maria Darcie",
""
],
[
"Guimaraes",
"Paulo Roberto",
"Jr."
],
[
"Pires",
"Mathias Mistretta",
""
],
[
"Bittencourt",
"Luiz Fernando",
""
]
] |
TITLE: MODULAR: Software for the Autonomous Computation of Modularity in Large
Network Sets
ABSTRACT: Ecological systems can be seen as networks of interactions between
individual, species, or habitat patches. A key feature of many ecological
networks is their organization into modules, which are subsets of elements that
are more connected to each other than to the other elements in the network. We
introduce MODULAR to perform rapid and autonomous calculation of modularity in
sets of networks. MODULAR reads a set of files with matrices or edge lists that
represent unipartite or bipartite networks, and identify modules using two
different modularity metrics that have been previously used in studies of
ecological networks. To find the network partition that maximizes modularity,
the software offers five optimization methods to the user. We also included two
of the most common null models that are used in studies of ecological networks
to verify how the modularity found by the maximization of each metric differs
from a theoretical benchmark.
|
no_new_dataset
| 0.708843
|
1209.1411
|
Chaoming Song Dr.
|
Chaoming Song, Dashun Wang, Albert-Laszlo Barabasi
|
Connections between Human Dynamics and Network Science
| null | null | null | null |
physics.soc-ph cond-mat.stat-mech cs.SI physics.data-an
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The increasing availability of large-scale data on human behavior has
catalyzed simultaneous advances in network theory, capturing the scaling
properties of the interactions between a large number of individuals, and human
dynamics, quantifying the temporal characteristics of human activity patterns.
These two areas remain disjoint, each pursuing as separate lines of inquiry.
Here we report a series of generic relationships between the quantities
characterizing these two areas by demonstrating that the degree and link weight
distributions in social networks can be expressed in terms of the dynamical
exponents characterizing human activity patterns. We test the validity of these
theoretical predictions on datasets capturing various facets of human
interactions, from mobile calls to tweets.
|
[
{
"version": "v1",
"created": "Thu, 6 Sep 2012 21:04:21 GMT"
},
{
"version": "v2",
"created": "Mon, 8 Apr 2013 20:01:21 GMT"
}
] | 2013-04-10T00:00:00
|
[
[
"Song",
"Chaoming",
""
],
[
"Wang",
"Dashun",
""
],
[
"Barabasi",
"Albert-Laszlo",
""
]
] |
TITLE: Connections between Human Dynamics and Network Science
ABSTRACT: The increasing availability of large-scale data on human behavior has
catalyzed simultaneous advances in network theory, capturing the scaling
properties of the interactions between a large number of individuals, and human
dynamics, quantifying the temporal characteristics of human activity patterns.
These two areas remain disjoint, each pursuing as separate lines of inquiry.
Here we report a series of generic relationships between the quantities
characterizing these two areas by demonstrating that the degree and link weight
distributions in social networks can be expressed in terms of the dynamical
exponents characterizing human activity patterns. We test the validity of these
theoretical predictions on datasets capturing various facets of human
interactions, from mobile calls to tweets.
|
no_new_dataset
| 0.70866
|
1304.2604
|
Jean Souviron
|
Jean Souviron
|
On the predictability of the number of convex vertices
|
6 pages, 6 figures
| null | null | null |
cs.CG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Convex hulls are a fundamental geometric tool used in a number of algorithms.
As a side-effect of exhaustive tests for an algorithm for which a convex hull
computation was the first step, interesting experimental results were found and
are the sunject of this paper. They establish that the number of convex
vertices of natural datasets can be predicted, if not precisely at least within
a defined range. Namely it was found that the number of convex vertices of a
dataset of N points lies in the range 2.35 N^0.091 <= h <= 19.19 N^0.091. This
range obviously does not describe neither natural nor artificial worst-cases
but corresponds to the distributions of natural data. This can be used for
instance to define a starting size for pre-allocated arrays or to evaluate
output-sensitive algorithms. A further consequence of these results is that the
random models of data used to test convex hull algorithms should be bounded by
rectangles and not as they usually are by circles if they want to represent
accurately natural datasets
|
[
{
"version": "v1",
"created": "Tue, 9 Apr 2013 14:17:12 GMT"
}
] | 2013-04-10T00:00:00
|
[
[
"Souviron",
"Jean",
""
]
] |
TITLE: On the predictability of the number of convex vertices
ABSTRACT: Convex hulls are a fundamental geometric tool used in a number of algorithms.
As a side-effect of exhaustive tests for an algorithm for which a convex hull
computation was the first step, interesting experimental results were found and
are the sunject of this paper. They establish that the number of convex
vertices of natural datasets can be predicted, if not precisely at least within
a defined range. Namely it was found that the number of convex vertices of a
dataset of N points lies in the range 2.35 N^0.091 <= h <= 19.19 N^0.091. This
range obviously does not describe neither natural nor artificial worst-cases
but corresponds to the distributions of natural data. This can be used for
instance to define a starting size for pre-allocated arrays or to evaluate
output-sensitive algorithms. A further consequence of these results is that the
random models of data used to test convex hull algorithms should be bounded by
rectangles and not as they usually are by circles if they want to represent
accurately natural datasets
|
no_new_dataset
| 0.708175
|
1303.7390
|
Aasa Feragen
|
Aasa Feragen, Jens Petersen, Dominik Grimm, Asger Dirksen, Jesper
Holst Pedersen, Karsten Borgwardt and Marleen de Bruijne
|
Geometric tree kernels: Classification of COPD from airway tree geometry
|
12 pages
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Methodological contributions: This paper introduces a family of kernels for
analyzing (anatomical) trees endowed with vector valued measurements made along
the tree. While state-of-the-art graph and tree kernels use combinatorial
tree/graph structure with discrete node and edge labels, the kernels presented
in this paper can include geometric information such as branch shape, branch
radius or other vector valued properties. In addition to being flexible in
their ability to model different types of attributes, the presented kernels are
computationally efficient and some of them can easily be computed for large
datasets (N of the order 10.000) of trees with 30-600 branches. Combining the
kernels with standard machine learning tools enables us to analyze the relation
between disease and anatomical tree structure and geometry. Experimental
results: The kernels are used to compare airway trees segmented from low-dose
CT, endowed with branch shape descriptors and airway wall area percentage
measurements made along the tree. Using kernelized hypothesis testing we show
that the geometric airway trees are significantly differently distributed in
patients with Chronic Obstructive Pulmonary Disease (COPD) than in healthy
individuals. The geometric tree kernels also give a significant increase in the
classification accuracy of COPD from geometric tree structure endowed with
airway wall thickness measurements in comparison with state-of-the-art methods,
giving further insight into the relationship between airway wall thickness and
COPD. Software: Software for computing kernels and statistical tests is
available at http://image.diku.dk/aasa/software.php.
|
[
{
"version": "v1",
"created": "Fri, 29 Mar 2013 13:25:17 GMT"
},
{
"version": "v2",
"created": "Mon, 8 Apr 2013 12:11:24 GMT"
}
] | 2013-04-09T00:00:00
|
[
[
"Feragen",
"Aasa",
""
],
[
"Petersen",
"Jens",
""
],
[
"Grimm",
"Dominik",
""
],
[
"Dirksen",
"Asger",
""
],
[
"Pedersen",
"Jesper Holst",
""
],
[
"Borgwardt",
"Karsten",
""
],
[
"de Bruijne",
"Marleen",
""
]
] |
TITLE: Geometric tree kernels: Classification of COPD from airway tree geometry
ABSTRACT: Methodological contributions: This paper introduces a family of kernels for
analyzing (anatomical) trees endowed with vector valued measurements made along
the tree. While state-of-the-art graph and tree kernels use combinatorial
tree/graph structure with discrete node and edge labels, the kernels presented
in this paper can include geometric information such as branch shape, branch
radius or other vector valued properties. In addition to being flexible in
their ability to model different types of attributes, the presented kernels are
computationally efficient and some of them can easily be computed for large
datasets (N of the order 10.000) of trees with 30-600 branches. Combining the
kernels with standard machine learning tools enables us to analyze the relation
between disease and anatomical tree structure and geometry. Experimental
results: The kernels are used to compare airway trees segmented from low-dose
CT, endowed with branch shape descriptors and airway wall area percentage
measurements made along the tree. Using kernelized hypothesis testing we show
that the geometric airway trees are significantly differently distributed in
patients with Chronic Obstructive Pulmonary Disease (COPD) than in healthy
individuals. The geometric tree kernels also give a significant increase in the
classification accuracy of COPD from geometric tree structure endowed with
airway wall thickness measurements in comparison with state-of-the-art methods,
giving further insight into the relationship between airway wall thickness and
COPD. Software: Software for computing kernels and statistical tests is
available at http://image.diku.dk/aasa/software.php.
|
no_new_dataset
| 0.712445
|
1304.1835
|
Alex Rubinsteyn
|
Eric Hielscher, Alex Rubinsteyn, Dennis Shasha
|
Locality Optimization for Data Parallel Programs
| null | null | null |
NYU CS TR2013-955
|
cs.PL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Productivity languages such as NumPy and Matlab make it much easier to
implement data-intensive numerical algorithms. However, these languages can be
intolerably slow for programs that don't map well to their built-in primitives.
In this paper, we discuss locality optimizations for our system Parakeet, a
just-in-time compiler and runtime system for an array-oriented subset of
Python. Parakeet dynamically compiles whole user functions to high performance
multi-threaded native code. Parakeet makes extensive use of the classic data
parallel operators Map, Reduce, and Scan. We introduce a new set of data
parallel operators,TiledMap, TiledReduce, and TiledScan, that break up their
computations into local pieces of bounded size so as better to make use of
small fast memories. We introduce a novel tiling transformation to generate
tiled operators automatically. Applying this transformation once tiles the
program for cache, and applying it again enables tiling for registers. The
sizes for cache tiles are left unspecified until runtime, when an autotuning
search is performed. Finally, we evaluate our optimizations on benchmarks and
show significant speedups on programs that exhibit data locality.
|
[
{
"version": "v1",
"created": "Fri, 5 Apr 2013 23:52:00 GMT"
}
] | 2013-04-09T00:00:00
|
[
[
"Hielscher",
"Eric",
""
],
[
"Rubinsteyn",
"Alex",
""
],
[
"Shasha",
"Dennis",
""
]
] |
TITLE: Locality Optimization for Data Parallel Programs
ABSTRACT: Productivity languages such as NumPy and Matlab make it much easier to
implement data-intensive numerical algorithms. However, these languages can be
intolerably slow for programs that don't map well to their built-in primitives.
In this paper, we discuss locality optimizations for our system Parakeet, a
just-in-time compiler and runtime system for an array-oriented subset of
Python. Parakeet dynamically compiles whole user functions to high performance
multi-threaded native code. Parakeet makes extensive use of the classic data
parallel operators Map, Reduce, and Scan. We introduce a new set of data
parallel operators,TiledMap, TiledReduce, and TiledScan, that break up their
computations into local pieces of bounded size so as better to make use of
small fast memories. We introduce a novel tiling transformation to generate
tiled operators automatically. Applying this transformation once tiles the
program for cache, and applying it again enables tiling for registers. The
sizes for cache tiles are left unspecified until runtime, when an autotuning
search is performed. Finally, we evaluate our optimizations on benchmarks and
show significant speedups on programs that exhibit data locality.
|
no_new_dataset
| 0.706165
|
1304.1924
|
Shuguang Han
|
Shuguang Han, Zhen Yue, Daqing He
|
Automatic Detection of Search Tactic in Individual Information Seeking:
A Hidden Markov Model Approach
|
5 pages, 3 figures, 3 tables
| null | null | null |
cs.IR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Information seeking process is an important topic in information seeking
behavior research. Both qualitative and empirical methods have been adopted in
analyzing information seeking processes, with major focus on uncovering the
latent search tactics behind user behaviors. Most of the existing works require
defining search tactics in advance and coding data manually. Among the few
works that can recognize search tactics automatically, they missed making sense
of those tactics. In this paper, we proposed using an automatic technique, i.e.
the Hidden Markov Model (HMM), to explicitly model the search tactics. HMM
results show that the identified search tactics of individual information
seeking behaviors are consistent with Marchioninis Information seeking process
model. With the advantages of showing the connections between search tactics
and search actions and the transitions among search tactics, we argue that HMM
is a useful tool to investigate information seeking process, or at least it
provides a feasible way to analyze large scale dataset.
|
[
{
"version": "v1",
"created": "Sat, 6 Apr 2013 19:13:41 GMT"
}
] | 2013-04-09T00:00:00
|
[
[
"Han",
"Shuguang",
""
],
[
"Yue",
"Zhen",
""
],
[
"He",
"Daqing",
""
]
] |
TITLE: Automatic Detection of Search Tactic in Individual Information Seeking:
A Hidden Markov Model Approach
ABSTRACT: Information seeking process is an important topic in information seeking
behavior research. Both qualitative and empirical methods have been adopted in
analyzing information seeking processes, with major focus on uncovering the
latent search tactics behind user behaviors. Most of the existing works require
defining search tactics in advance and coding data manually. Among the few
works that can recognize search tactics automatically, they missed making sense
of those tactics. In this paper, we proposed using an automatic technique, i.e.
the Hidden Markov Model (HMM), to explicitly model the search tactics. HMM
results show that the identified search tactics of individual information
seeking behaviors are consistent with Marchioninis Information seeking process
model. With the advantages of showing the connections between search tactics
and search actions and the transitions among search tactics, we argue that HMM
is a useful tool to investigate information seeking process, or at least it
provides a feasible way to analyze large scale dataset.
|
no_new_dataset
| 0.70978
|
1304.1979
|
Esteban Moro
|
Giovanna Miritello, Rub\'en Lara, Manuel Cebri\'an, and Esteban Moro
|
Limited communication capacity unveils strategies for human interaction
|
Main Text: 8 pages, 5 figures. Supplementary info: 8 pages, 8 figures
| null | null | null |
physics.soc-ph cs.SI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Social connectivity is the key process that characterizes the structural
properties of social networks and in turn processes such as navigation,
influence or information diffusion. Since time, attention and cognition are
inelastic resources, humans should have a predefined strategy to manage their
social interactions over time. However, the limited observational length of
existing human interaction datasets, together with the bursty nature of dyadic
communications have hampered the observation of tie dynamics in social
networks. Here we develop a method for the detection of tie
activation/deactivation, and apply it to a large longitudinal, cross-sectional
communication dataset ($\approx$ 19 months, $\approx$ 20 million people).
Contrary to the perception of ever-growing connectivity, we observe that
individuals exhibit a finite communication capacity, which limits the number of
ties they can maintain active. In particular we find that men have an overall
higher communication capacity than women and that this capacity decreases
gradually for both sexes over the lifespan of individuals (16-70 years). We are
then able to separate communication capacity from communication activity,
revealing a diverse range of tie activation patterns, from stable to
exploratory. We find that, in simulation, individuals exhibiting exploratory
strategies display longer time to receive information spreading in the network
those individuals with stable strategies. Our principled method to determine
the communication capacity of an individual allows us to quantify how
strategies for human interaction shape the dynamical evolution of social
networks.
|
[
{
"version": "v1",
"created": "Sun, 7 Apr 2013 11:00:16 GMT"
}
] | 2013-04-09T00:00:00
|
[
[
"Miritello",
"Giovanna",
""
],
[
"Lara",
"Rubén",
""
],
[
"Cebrián",
"Manuel",
""
],
[
"Moro",
"Esteban",
""
]
] |
TITLE: Limited communication capacity unveils strategies for human interaction
ABSTRACT: Social connectivity is the key process that characterizes the structural
properties of social networks and in turn processes such as navigation,
influence or information diffusion. Since time, attention and cognition are
inelastic resources, humans should have a predefined strategy to manage their
social interactions over time. However, the limited observational length of
existing human interaction datasets, together with the bursty nature of dyadic
communications have hampered the observation of tie dynamics in social
networks. Here we develop a method for the detection of tie
activation/deactivation, and apply it to a large longitudinal, cross-sectional
communication dataset ($\approx$ 19 months, $\approx$ 20 million people).
Contrary to the perception of ever-growing connectivity, we observe that
individuals exhibit a finite communication capacity, which limits the number of
ties they can maintain active. In particular we find that men have an overall
higher communication capacity than women and that this capacity decreases
gradually for both sexes over the lifespan of individuals (16-70 years). We are
then able to separate communication capacity from communication activity,
revealing a diverse range of tie activation patterns, from stable to
exploratory. We find that, in simulation, individuals exhibiting exploratory
strategies display longer time to receive information spreading in the network
those individuals with stable strategies. Our principled method to determine
the communication capacity of an individual allows us to quantify how
strategies for human interaction shape the dynamical evolution of social
networks.
|
no_new_dataset
| 0.704732
|
1304.2133
|
Conrad Sanderson
|
Yongkang Wong, Conrad Sanderson, Sandra Mau, Brian C. Lovell
|
Dynamic Amelioration of Resolution Mismatches for Local Feature Based
Identity Inference
| null |
International Conference on Pattern Recognition (ICPR), pp.
1200-1203, 2010
|
10.1109/ICPR.2010.299
| null |
cs.CV cs.IR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
While existing face recognition systems based on local features are robust to
issues such as misalignment, they can exhibit accuracy degradation when
comparing images of differing resolutions. This is common in surveillance
environments where a gallery of high resolution mugshots is compared to low
resolution CCTV probe images, or where the size of a given image is not a
reliable indicator of the underlying resolution (eg. poor optics). To alleviate
this degradation, we propose a compensation framework which dynamically chooses
the most appropriate face recognition system for a given pair of image
resolutions. This framework applies a novel resolution detection method which
does not rely on the size of the input images, but instead exploits the
sensitivity of local features to resolution using a probabilistic multi-region
histogram approach. Experiments on a resolution-modified version of the
"Labeled Faces in the Wild" dataset show that the proposed resolution detector
frontend obtains a 99% average accuracy in selecting the most appropriate face
recognition system, resulting in higher overall face discrimination accuracy
(across several resolutions) compared to the individual baseline face
recognition systems.
|
[
{
"version": "v1",
"created": "Mon, 8 Apr 2013 08:36:55 GMT"
}
] | 2013-04-09T00:00:00
|
[
[
"Wong",
"Yongkang",
""
],
[
"Sanderson",
"Conrad",
""
],
[
"Mau",
"Sandra",
""
],
[
"Lovell",
"Brian C.",
""
]
] |
TITLE: Dynamic Amelioration of Resolution Mismatches for Local Feature Based
Identity Inference
ABSTRACT: While existing face recognition systems based on local features are robust to
issues such as misalignment, they can exhibit accuracy degradation when
comparing images of differing resolutions. This is common in surveillance
environments where a gallery of high resolution mugshots is compared to low
resolution CCTV probe images, or where the size of a given image is not a
reliable indicator of the underlying resolution (eg. poor optics). To alleviate
this degradation, we propose a compensation framework which dynamically chooses
the most appropriate face recognition system for a given pair of image
resolutions. This framework applies a novel resolution detection method which
does not rely on the size of the input images, but instead exploits the
sensitivity of local features to resolution using a probabilistic multi-region
histogram approach. Experiments on a resolution-modified version of the
"Labeled Faces in the Wild" dataset show that the proposed resolution detector
frontend obtains a 99% average accuracy in selecting the most appropriate face
recognition system, resulting in higher overall face discrimination accuracy
(across several resolutions) compared to the individual baseline face
recognition systems.
|
no_new_dataset
| 0.707979
|
1212.6276
|
Sebasti\'an Basterrech
|
Sebasti\'an Basterrech and Gerardo Rubino
|
Echo State Queueing Network: a new reservoir computing learning tool
|
Proceedings of the 10th IEEE Consumer Communications and Networking
Conference (CCNC), Las Vegas, USA, 2013
| null |
10.1109/CCNC.2013.6488435
| null |
cs.NE cs.AI cs.LG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In the last decade, a new computational paradigm was introduced in the field
of Machine Learning, under the name of Reservoir Computing (RC). RC models are
neural networks which a recurrent part (the reservoir) that does not
participate in the learning process, and the rest of the system where no
recurrence (no neural circuit) occurs. This approach has grown rapidly due to
its success in solving learning tasks and other computational applications.
Some success was also observed with another recently proposed neural network
designed using Queueing Theory, the Random Neural Network (RandNN). Both
approaches have good properties and identified drawbacks. In this paper, we
propose a new RC model called Echo State Queueing Network (ESQN), where we use
ideas coming from RandNNs for the design of the reservoir. ESQNs consist in
ESNs where the reservoir has a new dynamics inspired by recurrent RandNNs. The
paper positions ESQNs in the global Machine Learning area, and provides
examples of their use and performances. We show on largely used benchmarks that
ESQNs are very accurate tools, and we illustrate how they compare with standard
ESNs.
|
[
{
"version": "v1",
"created": "Wed, 26 Dec 2012 22:31:13 GMT"
}
] | 2013-04-08T00:00:00
|
[
[
"Basterrech",
"Sebastián",
""
],
[
"Rubino",
"Gerardo",
""
]
] |
TITLE: Echo State Queueing Network: a new reservoir computing learning tool
ABSTRACT: In the last decade, a new computational paradigm was introduced in the field
of Machine Learning, under the name of Reservoir Computing (RC). RC models are
neural networks which a recurrent part (the reservoir) that does not
participate in the learning process, and the rest of the system where no
recurrence (no neural circuit) occurs. This approach has grown rapidly due to
its success in solving learning tasks and other computational applications.
Some success was also observed with another recently proposed neural network
designed using Queueing Theory, the Random Neural Network (RandNN). Both
approaches have good properties and identified drawbacks. In this paper, we
propose a new RC model called Echo State Queueing Network (ESQN), where we use
ideas coming from RandNNs for the design of the reservoir. ESQNs consist in
ESNs where the reservoir has a new dynamics inspired by recurrent RandNNs. The
paper positions ESQNs in the global Machine Learning area, and provides
examples of their use and performances. We show on largely used benchmarks that
ESQNs are very accurate tools, and we illustrate how they compare with standard
ESNs.
|
no_new_dataset
| 0.71
|
1304.1712
|
Michele Coscia
|
Michele Coscia
|
Competition and Success in the Meme Pool: a Case Study on Quickmeme.com
| null |
International Conference of Weblogs and Social Media, 2013
| null | null |
physics.soc-ph cs.SI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The advent of social media has provided data and insights about how people
relate to information and culture. While information is composed by bits and
its fundamental building bricks are relatively well understood, the same cannot
be said for culture. The fundamental cultural unit has been defined as a
"meme". Memes are defined in literature as specific fundamental cultural
traits, that are floating in their environment together. Just like genes
carried by bodies, memes are carried by cultural manifestations like songs,
buildings or pictures. Memes are studied in their competition for being
successfully passed from one generation of minds to another, in different ways.
In this paper we choose an empirical approach to the study of memes. We
downloaded data about memes from a well-known website hosting hundreds of
different memes and thousands of their implementations. From this data, we
empirically describe the behavior of these memes. We statistically describe
meme occurrences in our dataset and we delineate their fundamental traits,
along with those traits that make them more or less apt to be successful.
|
[
{
"version": "v1",
"created": "Fri, 5 Apr 2013 13:52:55 GMT"
}
] | 2013-04-08T00:00:00
|
[
[
"Coscia",
"Michele",
""
]
] |
TITLE: Competition and Success in the Meme Pool: a Case Study on Quickmeme.com
ABSTRACT: The advent of social media has provided data and insights about how people
relate to information and culture. While information is composed by bits and
its fundamental building bricks are relatively well understood, the same cannot
be said for culture. The fundamental cultural unit has been defined as a
"meme". Memes are defined in literature as specific fundamental cultural
traits, that are floating in their environment together. Just like genes
carried by bodies, memes are carried by cultural manifestations like songs,
buildings or pictures. Memes are studied in their competition for being
successfully passed from one generation of minds to another, in different ways.
In this paper we choose an empirical approach to the study of memes. We
downloaded data about memes from a well-known website hosting hundreds of
different memes and thousands of their implementations. From this data, we
empirically describe the behavior of these memes. We statistically describe
meme occurrences in our dataset and we delineate their fundamental traits,
along with those traits that make them more or less apt to be successful.
|
new_dataset
| 0.67686
|
1204.1259
|
Bal\'azs Hidasi
|
Bal\'azs Hidasi, Domonkos Tikk
|
Fast ALS-based tensor factorization for context-aware recommendation
from implicit feedback
|
Accepted for ECML/PKDD 2012, presented on 25th September 2012,
Bristol, UK
|
Proceedings of the 2012 European conference on Machine Learning
and Knowledge Discovery in Databases - Volume Part II
|
10.1007/978-3-642-33486-3_5
| null |
cs.LG cs.IR cs.NA
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Albeit, the implicit feedback based recommendation problem - when only the
user history is available but there are no ratings - is the most typical
setting in real-world applications, it is much less researched than the
explicit feedback case. State-of-the-art algorithms that are efficient on the
explicit case cannot be straightforwardly transformed to the implicit case if
scalability should be maintained. There are few if any implicit feedback
benchmark datasets, therefore new ideas are usually experimented on explicit
benchmarks. In this paper, we propose a generic context-aware implicit feedback
recommender algorithm, coined iTALS. iTALS apply a fast, ALS-based tensor
factorization learning method that scales linearly with the number of non-zero
elements in the tensor. The method also allows us to incorporate diverse
context information into the model while maintaining its computational
efficiency. In particular, we present two such context-aware implementation
variants of iTALS. The first incorporates seasonality and enables to
distinguish user behavior in different time intervals. The other views the user
history as sequential information and has the ability to recognize usage
pattern typical to certain group of items, e.g. to automatically tell apart
product types or categories that are typically purchased repetitively
(collectibles, grocery goods) or once (household appliances). Experiments
performed on three implicit datasets (two proprietary ones and an implicit
variant of the Netflix dataset) show that by integrating context-aware
information with our factorization framework into the state-of-the-art implicit
recommender algorithm the recommendation quality improves significantly.
|
[
{
"version": "v1",
"created": "Thu, 5 Apr 2012 15:34:30 GMT"
},
{
"version": "v2",
"created": "Thu, 4 Apr 2013 15:33:31 GMT"
}
] | 2013-04-05T00:00:00
|
[
[
"Hidasi",
"Balázs",
""
],
[
"Tikk",
"Domonkos",
""
]
] |
TITLE: Fast ALS-based tensor factorization for context-aware recommendation
from implicit feedback
ABSTRACT: Albeit, the implicit feedback based recommendation problem - when only the
user history is available but there are no ratings - is the most typical
setting in real-world applications, it is much less researched than the
explicit feedback case. State-of-the-art algorithms that are efficient on the
explicit case cannot be straightforwardly transformed to the implicit case if
scalability should be maintained. There are few if any implicit feedback
benchmark datasets, therefore new ideas are usually experimented on explicit
benchmarks. In this paper, we propose a generic context-aware implicit feedback
recommender algorithm, coined iTALS. iTALS apply a fast, ALS-based tensor
factorization learning method that scales linearly with the number of non-zero
elements in the tensor. The method also allows us to incorporate diverse
context information into the model while maintaining its computational
efficiency. In particular, we present two such context-aware implementation
variants of iTALS. The first incorporates seasonality and enables to
distinguish user behavior in different time intervals. The other views the user
history as sequential information and has the ability to recognize usage
pattern typical to certain group of items, e.g. to automatically tell apart
product types or categories that are typically purchased repetitively
(collectibles, grocery goods) or once (household appliances). Experiments
performed on three implicit datasets (two proprietary ones and an implicit
variant of the Netflix dataset) show that by integrating context-aware
information with our factorization framework into the state-of-the-art implicit
recommender algorithm the recommendation quality improves significantly.
|
no_new_dataset
| 0.711224
|
1304.1262
|
Conrad Sanderson
|
Arnold Wiliem, Yongkang Wong, Conrad Sanderson, Peter Hobson, Shaokang
Chen, Brian C. Lovell
|
Classification of Human Epithelial Type 2 Cell Indirect
Immunofluoresence Images via Codebook Based Descriptors
| null |
IEEE Workshop on Applications of Computer Vision (WACV), pp.
95-102, 2013
|
10.1109/WACV.2013.6475005
| null |
q-bio.CB cs.CV q-bio.QM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The Anti-Nuclear Antibody (ANA) clinical pathology test is commonly used to
identify the existence of various diseases. A hallmark method for identifying
the presence of ANAs is the Indirect Immunofluorescence method on Human
Epithelial (HEp-2) cells, due to its high sensitivity and the large range of
antigens that can be detected. However, the method suffers from numerous
shortcomings, such as being subjective as well as time and labour intensive.
Computer Aided Diagnostic (CAD) systems have been developed to address these
problems, which automatically classify a HEp-2 cell image into one of its known
patterns (eg., speckled, homogeneous). Most of the existing CAD systems use
handpicked features to represent a HEp-2 cell image, which may only work in
limited scenarios. In this paper, we propose a cell classification system
comprised of a dual-region codebook-based descriptor, combined with the Nearest
Convex Hull Classifier. We evaluate the performance of several variants of the
descriptor on two publicly available datasets: ICPR HEp-2 cell classification
contest dataset and the new SNPHEp-2 dataset. To our knowledge, this is the
first time codebook-based descriptors are applied and studied in this domain.
Experiments show that the proposed system has consistent high performance and
is more robust than two recent CAD systems.
|
[
{
"version": "v1",
"created": "Thu, 4 Apr 2013 07:51:32 GMT"
}
] | 2013-04-05T00:00:00
|
[
[
"Wiliem",
"Arnold",
""
],
[
"Wong",
"Yongkang",
""
],
[
"Sanderson",
"Conrad",
""
],
[
"Hobson",
"Peter",
""
],
[
"Chen",
"Shaokang",
""
],
[
"Lovell",
"Brian C.",
""
]
] |
TITLE: Classification of Human Epithelial Type 2 Cell Indirect
Immunofluoresence Images via Codebook Based Descriptors
ABSTRACT: The Anti-Nuclear Antibody (ANA) clinical pathology test is commonly used to
identify the existence of various diseases. A hallmark method for identifying
the presence of ANAs is the Indirect Immunofluorescence method on Human
Epithelial (HEp-2) cells, due to its high sensitivity and the large range of
antigens that can be detected. However, the method suffers from numerous
shortcomings, such as being subjective as well as time and labour intensive.
Computer Aided Diagnostic (CAD) systems have been developed to address these
problems, which automatically classify a HEp-2 cell image into one of its known
patterns (eg., speckled, homogeneous). Most of the existing CAD systems use
handpicked features to represent a HEp-2 cell image, which may only work in
limited scenarios. In this paper, we propose a cell classification system
comprised of a dual-region codebook-based descriptor, combined with the Nearest
Convex Hull Classifier. We evaluate the performance of several variants of the
descriptor on two publicly available datasets: ICPR HEp-2 cell classification
contest dataset and the new SNPHEp-2 dataset. To our knowledge, this is the
first time codebook-based descriptors are applied and studied in this domain.
Experiments show that the proposed system has consistent high performance and
is more robust than two recent CAD systems.
|
no_new_dataset
| 0.597667
|
1304.1391
|
Sachin Talathi
|
Manu Nandan, Pramod P. Khargonekar, Sachin S. Talathi
|
Fast SVM training using approximate extreme points
|
The manuscript in revised form has been submitted to J. Machine
Learning Research
| null | null | null |
cs.LG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Applications of non-linear kernel Support Vector Machines (SVMs) to large
datasets is seriously hampered by its excessive training time. We propose a
modification, called the approximate extreme points support vector machine
(AESVM), that is aimed at overcoming this burden. Our approach relies on
conducting the SVM optimization over a carefully selected subset, called the
representative set, of the training dataset. We present analytical results that
indicate the similarity of AESVM and SVM solutions. A linear time algorithm
based on convex hulls and extreme points is used to compute the representative
set in kernel space. Extensive computational experiments on nine datasets
compared AESVM to LIBSVM \citep{LIBSVM}, CVM \citep{Tsang05}, BVM
\citep{Tsang07}, LASVM \citep{Bordes05}, $\text{SVM}^{\text{perf}}$
\citep{Joachims09}, and the random features method \citep{rahimi07}. Our AESVM
implementation was found to train much faster than the other methods, while its
classification accuracy was similar to that of LIBSVM in all cases. In
particular, for a seizure detection dataset, AESVM training was almost $10^3$
times faster than LIBSVM and LASVM and more than forty times faster than CVM
and BVM. Additionally, AESVM also gave competitively fast classification times.
|
[
{
"version": "v1",
"created": "Thu, 4 Apr 2013 15:08:31 GMT"
}
] | 2013-04-05T00:00:00
|
[
[
"Nandan",
"Manu",
""
],
[
"Khargonekar",
"Pramod P.",
""
],
[
"Talathi",
"Sachin S.",
""
]
] |
TITLE: Fast SVM training using approximate extreme points
ABSTRACT: Applications of non-linear kernel Support Vector Machines (SVMs) to large
datasets is seriously hampered by its excessive training time. We propose a
modification, called the approximate extreme points support vector machine
(AESVM), that is aimed at overcoming this burden. Our approach relies on
conducting the SVM optimization over a carefully selected subset, called the
representative set, of the training dataset. We present analytical results that
indicate the similarity of AESVM and SVM solutions. A linear time algorithm
based on convex hulls and extreme points is used to compute the representative
set in kernel space. Extensive computational experiments on nine datasets
compared AESVM to LIBSVM \citep{LIBSVM}, CVM \citep{Tsang05}, BVM
\citep{Tsang07}, LASVM \citep{Bordes05}, $\text{SVM}^{\text{perf}}$
\citep{Joachims09}, and the random features method \citep{rahimi07}. Our AESVM
implementation was found to train much faster than the other methods, while its
classification accuracy was similar to that of LIBSVM in all cases. In
particular, for a seizure detection dataset, AESVM training was almost $10^3$
times faster than LIBSVM and LASVM and more than forty times faster than CVM
and BVM. Additionally, AESVM also gave competitively fast classification times.
|
no_new_dataset
| 0.709636
|
1302.6396
|
Michael Schreiber
|
Michael Schreiber
|
How to derive an advantage from the arbitrariness of the g-index
|
13 pages, 3 tables, 3 figures, accepted for publication in Journal of
Informetrics
|
Journal of Informetrics, 7, 555-561 (2013)
|
10.1016/j.joi.2013.02.003
| null |
physics.soc-ph cs.DL
|
http://creativecommons.org/licenses/by-nc-sa/3.0/
|
The definition of the g-index is as arbitrary as that of the h-index, because
the threshold number g^2 of citations to the g most cited papers can be
modified by a prefactor at one's discretion, thus taking into account more or
less of the highly cited publications within a dataset. In a case study I
investigate the citation records of 26 physicists and show that the prefactor
influences the ranking in terms of the generalized g-index less than for the
generalized h-index. I propose specifically a prefactor of 2 for the g-index,
because then the resulting values are of the same order of magnitude as for the
common h-index. In this way one can avoid the disadvantage of the original
g-index, namely that the values are usually substantially larger than for the
h-index and thus the precision problem is substantially larger; while the
advantages of the g-index over the h-index are kept. Like for the generalized
h-index, also for the generalized g-index different prefactors might be more
useful for investigations which concentrate only on top scientists with high
citation frequencies or on junior researchers with small numbers of citations.
|
[
{
"version": "v1",
"created": "Tue, 26 Feb 2013 11:24:25 GMT"
}
] | 2013-04-04T00:00:00
|
[
[
"Schreiber",
"Michael",
""
]
] |
TITLE: How to derive an advantage from the arbitrariness of the g-index
ABSTRACT: The definition of the g-index is as arbitrary as that of the h-index, because
the threshold number g^2 of citations to the g most cited papers can be
modified by a prefactor at one's discretion, thus taking into account more or
less of the highly cited publications within a dataset. In a case study I
investigate the citation records of 26 physicists and show that the prefactor
influences the ranking in terms of the generalized g-index less than for the
generalized h-index. I propose specifically a prefactor of 2 for the g-index,
because then the resulting values are of the same order of magnitude as for the
common h-index. In this way one can avoid the disadvantage of the original
g-index, namely that the values are usually substantially larger than for the
h-index and thus the precision problem is substantially larger; while the
advantages of the g-index over the h-index are kept. Like for the generalized
h-index, also for the generalized g-index different prefactors might be more
useful for investigations which concentrate only on top scientists with high
citation frequencies or on junior researchers with small numbers of citations.
|
no_new_dataset
| 0.709044
|
1304.0886
|
Conrad Sanderson
|
Vikas Reddy, Conrad Sanderson, Brian C. Lovell
|
Improved Anomaly Detection in Crowded Scenes via Cell-based Analysis of
Foreground Speed, Size and Texture
| null |
IEEE Conference on Computer Vision and Pattern Recognition
Workshops (CVPRW), pp. 55-61, 2011
|
10.1109/CVPRW.2011.5981799
| null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A robust and efficient anomaly detection technique is proposed, capable of
dealing with crowded scenes where traditional tracking based approaches tend to
fail. Initial foreground segmentation of the input frames confines the analysis
to foreground objects and effectively ignores irrelevant background dynamics.
Input frames are split into non-overlapping cells, followed by extracting
features based on motion, size and texture from each cell. Each feature type is
independently analysed for the presence of an anomaly. Unlike most methods, a
refined estimate of object motion is achieved by computing the optical flow of
only the foreground pixels. The motion and size features are modelled by an
approximated version of kernel density estimation, which is computationally
efficient even for large training datasets. Texture features are modelled by an
adaptively grown codebook, with the number of entries in the codebook selected
in an online fashion. Experiments on the recently published UCSD Anomaly
Detection dataset show that the proposed method obtains considerably better
results than three recent approaches: MPPCA, social force, and mixture of
dynamic textures (MDT). The proposed method is also several orders of magnitude
faster than MDT, the next best performing method.
|
[
{
"version": "v1",
"created": "Wed, 3 Apr 2013 09:31:27 GMT"
}
] | 2013-04-04T00:00:00
|
[
[
"Reddy",
"Vikas",
""
],
[
"Sanderson",
"Conrad",
""
],
[
"Lovell",
"Brian C.",
""
]
] |
TITLE: Improved Anomaly Detection in Crowded Scenes via Cell-based Analysis of
Foreground Speed, Size and Texture
ABSTRACT: A robust and efficient anomaly detection technique is proposed, capable of
dealing with crowded scenes where traditional tracking based approaches tend to
fail. Initial foreground segmentation of the input frames confines the analysis
to foreground objects and effectively ignores irrelevant background dynamics.
Input frames are split into non-overlapping cells, followed by extracting
features based on motion, size and texture from each cell. Each feature type is
independently analysed for the presence of an anomaly. Unlike most methods, a
refined estimate of object motion is achieved by computing the optical flow of
only the foreground pixels. The motion and size features are modelled by an
approximated version of kernel density estimation, which is computationally
efficient even for large training datasets. Texture features are modelled by an
adaptively grown codebook, with the number of entries in the codebook selected
in an online fashion. Experiments on the recently published UCSD Anomaly
Detection dataset show that the proposed method obtains considerably better
results than three recent approaches: MPPCA, social force, and mixture of
dynamic textures (MDT). The proposed method is also several orders of magnitude
faster than MDT, the next best performing method.
|
no_new_dataset
| 0.711205
|
1304.0897
|
Martin Suda
|
Martin Suda
|
Duality in STRIPS planning
|
6 pages (two columns), 4 tables
| null | null | null |
cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We describe a duality mapping between STRIPS planning tasks. By exchanging
the initial and goal conditions, taking their respective complements, and
swapping for every action its precondition and delete list, one obtains for
every STRIPS task its dual version, which has a solution if and only if the
original does. This is proved by showing that the described transformation
essentially turns progression (forward search) into regression (backward
search) and vice versa.
The duality sheds new light on STRIPS planning by allowing a transfer of
ideas from one search approach to the other. It can be used to construct new
algorithms from old ones, or (equivalently) to obtain new benchmarks from
existing ones. Experiments show that the dual versions of IPC benchmarks are in
general quite difficult for modern planners. This may be seen as a new
challenge. On the other hand, the cases where the dual versions are easier to
solve demonstrate that the duality can also be made useful in practice.
|
[
{
"version": "v1",
"created": "Wed, 3 Apr 2013 10:08:56 GMT"
}
] | 2013-04-04T00:00:00
|
[
[
"Suda",
"Martin",
""
]
] |
TITLE: Duality in STRIPS planning
ABSTRACT: We describe a duality mapping between STRIPS planning tasks. By exchanging
the initial and goal conditions, taking their respective complements, and
swapping for every action its precondition and delete list, one obtains for
every STRIPS task its dual version, which has a solution if and only if the
original does. This is proved by showing that the described transformation
essentially turns progression (forward search) into regression (backward
search) and vice versa.
The duality sheds new light on STRIPS planning by allowing a transfer of
ideas from one search approach to the other. It can be used to construct new
algorithms from old ones, or (equivalently) to obtain new benchmarks from
existing ones. Experiments show that the dual versions of IPC benchmarks are in
general quite difficult for modern planners. This may be seen as a new
challenge. On the other hand, the cases where the dual versions are easier to
solve demonstrate that the duality can also be made useful in practice.
|
no_new_dataset
| 0.71081
|
1304.0913
|
Morteza Ansarinia
|
Ahmad Salahi, Morteza Ansarinia
|
Predicting Network Attacks Using Ontology-Driven Inference
|
9 pages
|
International Journal of Information and Communication Technology
(IJICT), Volume 4, Issue 1, 2012
| null | null |
cs.AI cs.CR cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Graph knowledge models and ontologies are very powerful modeling and re
asoning tools. We propose an effective approach to model network attacks and
attack prediction which plays important roles in security management. The goals
of this study are: First we model network attacks, their prerequisites and
consequences using knowledge representation methods in order to provide
description logic reasoning and inference over attack domain concepts. And
secondly, we propose an ontology-based system which predicts potential attacks
using inference and observing information which provided by sensory inputs. We
generate our ontology and evaluate corresponding methods using CAPEC, CWE, and
CVE hierarchical datasets. Results from experiments show significant capability
improvements comparing to traditional hierarchical and relational models.
Proposed method also reduces false alarms and improves intrusion detection
effectiveness.
|
[
{
"version": "v1",
"created": "Wed, 3 Apr 2013 11:04:38 GMT"
}
] | 2013-04-04T00:00:00
|
[
[
"Salahi",
"Ahmad",
""
],
[
"Ansarinia",
"Morteza",
""
]
] |
TITLE: Predicting Network Attacks Using Ontology-Driven Inference
ABSTRACT: Graph knowledge models and ontologies are very powerful modeling and re
asoning tools. We propose an effective approach to model network attacks and
attack prediction which plays important roles in security management. The goals
of this study are: First we model network attacks, their prerequisites and
consequences using knowledge representation methods in order to provide
description logic reasoning and inference over attack domain concepts. And
secondly, we propose an ontology-based system which predicts potential attacks
using inference and observing information which provided by sensory inputs. We
generate our ontology and evaluate corresponding methods using CAPEC, CWE, and
CVE hierarchical datasets. Results from experiments show significant capability
improvements comparing to traditional hierarchical and relational models.
Proposed method also reduces false alarms and improves intrusion detection
effectiveness.
|
no_new_dataset
| 0.709648
|
1103.2596
|
Lovro \v{S}ubelj
|
Lovro \v{S}ubelj and Marko Bajec
|
Unfolding network communities by combining defensive and offensive label
propagation
| null |
Proceedings of the ECML PKDD Workshop on the Analysis of Complex
Networks 2010 (ACNE '10), pp. 87-104
| null | null |
physics.soc-ph cs.SI physics.data-an
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Label propagation has proven to be a fast method for detecting communities in
complex networks. Recent work has also improved the accuracy and stability of
the basic algorithm, however, a general approach is still an open issue. We
propose different label propagation algorithms that convey two unique
strategies of community formation, namely, defensive preservation and offensive
expansion of communities. Furthermore, the strategies are combined in an
advanced label propagation algorithm that retains the advantages of both
approaches; and are enhanced with hierarchical community extraction, prominent
for the use on larger networks. The proposed algorithms were empirically
evaluated on different benchmarks networks with planted partition and on over
30 real-world networks of various types and sizes. The results confirm the
adequacy of the propositions and give promising grounds for future analysis of
(large) complex networks. Nevertheless, the main contribution of this work is
in showing that different types of networks (with different topological
properties) favor different strategies of community formation.
|
[
{
"version": "v1",
"created": "Mon, 14 Mar 2011 07:29:30 GMT"
}
] | 2013-04-03T00:00:00
|
[
[
"Šubelj",
"Lovro",
""
],
[
"Bajec",
"Marko",
""
]
] |
TITLE: Unfolding network communities by combining defensive and offensive label
propagation
ABSTRACT: Label propagation has proven to be a fast method for detecting communities in
complex networks. Recent work has also improved the accuracy and stability of
the basic algorithm, however, a general approach is still an open issue. We
propose different label propagation algorithms that convey two unique
strategies of community formation, namely, defensive preservation and offensive
expansion of communities. Furthermore, the strategies are combined in an
advanced label propagation algorithm that retains the advantages of both
approaches; and are enhanced with hierarchical community extraction, prominent
for the use on larger networks. The proposed algorithms were empirically
evaluated on different benchmarks networks with planted partition and on over
30 real-world networks of various types and sizes. The results confirm the
adequacy of the propositions and give promising grounds for future analysis of
(large) complex networks. Nevertheless, the main contribution of this work is
in showing that different types of networks (with different topological
properties) favor different strategies of community formation.
|
no_new_dataset
| 0.708572
|
1212.0142
|
Pierre Sermanet
|
Pierre Sermanet and Koray Kavukcuoglu and Soumith Chintala and Yann
LeCun
|
Pedestrian Detection with Unsupervised Multi-Stage Feature Learning
|
12 pages
| null | null | null |
cs.CV cs.LG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Pedestrian detection is a problem of considerable practical interest. Adding
to the list of successful applications of deep learning methods to vision, we
report state-of-the-art and competitive results on all major pedestrian
datasets with a convolutional network model. The model uses a few new twists,
such as multi-stage features, connections that skip layers to integrate global
shape information with local distinctive motif information, and an unsupervised
method based on convolutional sparse coding to pre-train the filters at each
stage.
|
[
{
"version": "v1",
"created": "Sat, 1 Dec 2012 18:13:03 GMT"
},
{
"version": "v2",
"created": "Tue, 2 Apr 2013 18:05:46 GMT"
}
] | 2013-04-03T00:00:00
|
[
[
"Sermanet",
"Pierre",
""
],
[
"Kavukcuoglu",
"Koray",
""
],
[
"Chintala",
"Soumith",
""
],
[
"LeCun",
"Yann",
""
]
] |
TITLE: Pedestrian Detection with Unsupervised Multi-Stage Feature Learning
ABSTRACT: Pedestrian detection is a problem of considerable practical interest. Adding
to the list of successful applications of deep learning methods to vision, we
report state-of-the-art and competitive results on all major pedestrian
datasets with a convolutional network model. The model uses a few new twists,
such as multi-stage features, connections that skip layers to integrate global
shape information with local distinctive motif information, and an unsupervised
method based on convolutional sparse coding to pre-train the filters at each
stage.
|
no_new_dataset
| 0.709057
|
1304.0725
|
Ashok P
|
P. Ashok, G.M Kadhar Nawaz, E. Elayaraja, V. Vadivel
|
Improved Performance of Unsupervised Method by Renovated K-Means
|
7 pages, to strengthen the k means algorithm
| null | null | null |
cs.LG cs.CV stat.ML
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Clustering is a separation of data into groups of similar objects. Every
group called cluster consists of objects that are similar to one another and
dissimilar to objects of other groups. In this paper, the K-Means algorithm is
implemented by three distance functions and to identify the optimal distance
function for clustering methods. The proposed K-Means algorithm is compared
with K-Means, Static Weighted K-Means (SWK-Means) and Dynamic Weighted K-Means
(DWK-Means) algorithm by using Davis Bouldin index, Execution Time and
Iteration count methods. Experimental results show that the proposed K-Means
algorithm performed better on Iris and Wine dataset when compared with other
three clustering methods.
|
[
{
"version": "v1",
"created": "Mon, 11 Mar 2013 05:28:06 GMT"
}
] | 2013-04-03T00:00:00
|
[
[
"Ashok",
"P.",
""
],
[
"Nawaz",
"G. M Kadhar",
""
],
[
"Elayaraja",
"E.",
""
],
[
"Vadivel",
"V.",
""
]
] |
TITLE: Improved Performance of Unsupervised Method by Renovated K-Means
ABSTRACT: Clustering is a separation of data into groups of similar objects. Every
group called cluster consists of objects that are similar to one another and
dissimilar to objects of other groups. In this paper, the K-Means algorithm is
implemented by three distance functions and to identify the optimal distance
function for clustering methods. The proposed K-Means algorithm is compared
with K-Means, Static Weighted K-Means (SWK-Means) and Dynamic Weighted K-Means
(DWK-Means) algorithm by using Davis Bouldin index, Execution Time and
Iteration count methods. Experimental results show that the proposed K-Means
algorithm performed better on Iris and Wine dataset when compared with other
three clustering methods.
|
no_new_dataset
| 0.71103
|
1302.2073
|
Clemens Hage
|
Florian Seidel and Clemens Hage and Martin Kleinsteuber
|
pROST : A Smoothed Lp-norm Robust Online Subspace Tracking Method for
Realtime Background Subtraction in Video
| null | null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
An increasing number of methods for background subtraction use Robust PCA to
identify sparse foreground objects. While many algorithms use the L1-norm as a
convex relaxation of the ideal sparsifying function, we approach the problem
with a smoothed Lp-norm and present pROST, a method for robust online subspace
tracking. The algorithm is based on alternating minimization on manifolds.
Implemented on a graphics processing unit it achieves realtime performance.
Experimental results on a state-of-the-art benchmark for background subtraction
on real-world video data indicate that the method succeeds at a broad variety
of background subtraction scenarios, and it outperforms competing approaches
when video quality is deteriorated by camera jitter.
|
[
{
"version": "v1",
"created": "Fri, 8 Feb 2013 16:14:14 GMT"
},
{
"version": "v2",
"created": "Thu, 28 Mar 2013 15:11:00 GMT"
}
] | 2013-03-29T00:00:00
|
[
[
"Seidel",
"Florian",
""
],
[
"Hage",
"Clemens",
""
],
[
"Kleinsteuber",
"Martin",
""
]
] |
TITLE: pROST : A Smoothed Lp-norm Robust Online Subspace Tracking Method for
Realtime Background Subtraction in Video
ABSTRACT: An increasing number of methods for background subtraction use Robust PCA to
identify sparse foreground objects. While many algorithms use the L1-norm as a
convex relaxation of the ideal sparsifying function, we approach the problem
with a smoothed Lp-norm and present pROST, a method for robust online subspace
tracking. The algorithm is based on alternating minimization on manifolds.
Implemented on a graphics processing unit it achieves realtime performance.
Experimental results on a state-of-the-art benchmark for background subtraction
on real-world video data indicate that the method succeeds at a broad variety
of background subtraction scenarios, and it outperforms competing approaches
when video quality is deteriorated by camera jitter.
|
no_new_dataset
| 0.711262
|
1303.7012
|
Abedelaziz Mohaisen
|
Abedelaziz Mohaisen and Omar Alrawi
|
Unveiling Zeus
|
Accepted to SIMPLEX 2013 (a workshop held in conjunction with WWW
2013)
| null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Malware family classification is an age old problem that many Anti-Virus (AV)
companies have tackled. There are two common techniques used for
classification, signature based and behavior based. Signature based
classification uses a common sequence of bytes that appears in the binary code
to identify and detect a family of malware. Behavior based classification uses
artifacts created by malware during execution for identification. In this paper
we report on a unique dataset we obtained from our operations and classified
using several machine learning techniques using the behavior-based approach.
Our main class of malware we are interested in classifying is the popular Zeus
malware. For its classification we identify 65 features that are unique and
robust for identifying malware families. We show that artifacts like file
system, registry, and network features can be used to identify distinct malware
families with high accuracy---in some cases as high as 95%.
|
[
{
"version": "v1",
"created": "Thu, 28 Mar 2013 00:11:54 GMT"
}
] | 2013-03-29T00:00:00
|
[
[
"Mohaisen",
"Abedelaziz",
""
],
[
"Alrawi",
"Omar",
""
]
] |
TITLE: Unveiling Zeus
ABSTRACT: Malware family classification is an age old problem that many Anti-Virus (AV)
companies have tackled. There are two common techniques used for
classification, signature based and behavior based. Signature based
classification uses a common sequence of bytes that appears in the binary code
to identify and detect a family of malware. Behavior based classification uses
artifacts created by malware during execution for identification. In this paper
we report on a unique dataset we obtained from our operations and classified
using several machine learning techniques using the behavior-based approach.
Our main class of malware we are interested in classifying is the popular Zeus
malware. For its classification we identify 65 features that are unique and
robust for identifying malware families. We show that artifacts like file
system, registry, and network features can be used to identify distinct malware
families with high accuracy---in some cases as high as 95%.
|
new_dataset
| 0.7118
|
1303.7077
|
Oleg Verbitsky
|
Christoph Berkholz and Oleg Verbitsky
|
On the speed of constraint propagation and the time complexity of arc
consistency testing
|
19 pages, 5 figures
| null | null | null |
cs.LO cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Establishing arc consistency on two relational structures is one of the most
popular heuristics for the constraint satisfaction problem. We aim at
determining the time complexity of arc consistency testing. The input
structures $G$ and $H$ can be supposed to be connected colored graphs, as the
general problem reduces to this particular case. We first observe the upper
bound $O(e(G)v(H)+v(G)e(H))$, which implies the bound $O(e(G)e(H))$ in terms of
the number of edges and the bound $O((v(G)+v(H))^3)$ in terms of the number of
vertices. We then show that both bounds are tight up to a constant factor as
long as an arc consistency algorithm is based on constraint propagation (like
any algorithm currently known).
Our argument for the lower bounds is based on examples of slow constraint
propagation. We measure the speed of constraint propagation observed on a pair
$G,H$ by the size of a proof, in a natural combinatorial proof system, that
Spoiler wins the existential 2-pebble game on $G,H$. The proof size is bounded
from below by the game length $D(G,H)$, and a crucial ingredient of our
analysis is the existence of $G,H$ with $D(G,H)=\Omega(v(G)v(H))$. We find one
such example among old benchmark instances for the arc consistency problem and
also suggest a new, different construction.
|
[
{
"version": "v1",
"created": "Thu, 28 Mar 2013 09:39:53 GMT"
}
] | 2013-03-29T00:00:00
|
[
[
"Berkholz",
"Christoph",
""
],
[
"Verbitsky",
"Oleg",
""
]
] |
TITLE: On the speed of constraint propagation and the time complexity of arc
consistency testing
ABSTRACT: Establishing arc consistency on two relational structures is one of the most
popular heuristics for the constraint satisfaction problem. We aim at
determining the time complexity of arc consistency testing. The input
structures $G$ and $H$ can be supposed to be connected colored graphs, as the
general problem reduces to this particular case. We first observe the upper
bound $O(e(G)v(H)+v(G)e(H))$, which implies the bound $O(e(G)e(H))$ in terms of
the number of edges and the bound $O((v(G)+v(H))^3)$ in terms of the number of
vertices. We then show that both bounds are tight up to a constant factor as
long as an arc consistency algorithm is based on constraint propagation (like
any algorithm currently known).
Our argument for the lower bounds is based on examples of slow constraint
propagation. We measure the speed of constraint propagation observed on a pair
$G,H$ by the size of a proof, in a natural combinatorial proof system, that
Spoiler wins the existential 2-pebble game on $G,H$. The proof size is bounded
from below by the game length $D(G,H)$, and a crucial ingredient of our
analysis is the existence of $G,H$ with $D(G,H)=\Omega(v(G)v(H))$. We find one
such example among old benchmark instances for the arc consistency problem and
also suggest a new, different construction.
|
no_new_dataset
| 0.706577
|
1303.6761
|
Jin-Kao Hao
|
Qinghua Wu and Jin-Kao Hao
|
Improved Lower Bounds for Sum Coloring via Clique Decomposition
|
Pre-print
| null | null | null |
cs.DM cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Given an undirected graph $G = (V,E)$ with a set $V$ of vertices and a set
$E$ of edges, the minimum sum coloring problem (MSCP) is to find a legal vertex
coloring of $G$, using colors represented by natural numbers $1, 2, . . .$ such
that the total sum of the colors assigned to the vertices is minimized. This
paper describes an approach based on the decomposition of the original graph
into disjoint cliques for computing lower bounds for the MSCP. Basically, the
proposed approach identifies and removes at each extraction iteration a maximum
number of cliques of the same size (the largest possible) from the graph.
Computational experiments show that this approach is able to improve on the
current best lower bounds for 14 benchmark instances, and to prove optimality
for the first time for 4 instances. We also report lower bounds for 24 more
instances for which no such bounds are available in the literature. These new
lower bounds are useful to estimate the quality of the upper bounds obtained
with various heuristic approaches.
|
[
{
"version": "v1",
"created": "Wed, 27 Mar 2013 08:35:16 GMT"
}
] | 2013-03-28T00:00:00
|
[
[
"Wu",
"Qinghua",
""
],
[
"Hao",
"Jin-Kao",
""
]
] |
TITLE: Improved Lower Bounds for Sum Coloring via Clique Decomposition
ABSTRACT: Given an undirected graph $G = (V,E)$ with a set $V$ of vertices and a set
$E$ of edges, the minimum sum coloring problem (MSCP) is to find a legal vertex
coloring of $G$, using colors represented by natural numbers $1, 2, . . .$ such
that the total sum of the colors assigned to the vertices is minimized. This
paper describes an approach based on the decomposition of the original graph
into disjoint cliques for computing lower bounds for the MSCP. Basically, the
proposed approach identifies and removes at each extraction iteration a maximum
number of cliques of the same size (the largest possible) from the graph.
Computational experiments show that this approach is able to improve on the
current best lower bounds for 14 benchmark instances, and to prove optimality
for the first time for 4 instances. We also report lower bounds for 24 more
instances for which no such bounds are available in the literature. These new
lower bounds are useful to estimate the quality of the upper bounds obtained
with various heuristic approaches.
|
no_new_dataset
| 0.706962
|
0812.0146
|
Vladimir Pestov
|
Vladimir Pestov
|
Lower Bounds on Performance of Metric Tree Indexing Schemes for Exact
Similarity Search in High Dimensions
|
21 pages, revised submission to Algorithmica, an improved and
extended journal version of the conference paper arXiv:0812.0146v3 [cs.DS],
with lower bounds strengthened, and the proof of the main Theorem 4
simplified
|
Algorithmica 66 (2013), 310-328
| null | null |
cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Within a mathematically rigorous model, we analyse the curse of
dimensionality for deterministic exact similarity search in the context of
popular indexing schemes: metric trees. The datasets $X$ are sampled randomly
from a domain $\Omega$, equipped with a distance, $\rho$, and an underlying
probability distribution, $\mu$. While performing an asymptotic analysis, we
send the intrinsic dimension $d$ of $\Omega$ to infinity, and assume that the
size of a dataset, $n$, grows superpolynomially yet subexponentially in $d$.
Exact similarity search refers to finding the nearest neighbour in the dataset
$X$ to a query point $\omega\in\Omega$, where the query points are subject to
the same probability distribution $\mu$ as datapoints. Let $\mathscr F$ denote
a class of all 1-Lipschitz functions on $\Omega$ that can be used as decision
functions in constructing a hierarchical metric tree indexing scheme. Suppose
the VC dimension of the class of all sets $\{\omega\colon f(\omega)\geq a\}$,
$a\in\R$ is $o(n^{1/4}/\log^2n)$. (In view of a 1995 result of Goldberg and
Jerrum, even a stronger complexity assumption $d^{O(1)}$ is reasonable.) We
deduce the $\Omega(n^{1/4})$ lower bound on the expected average case
performance of hierarchical metric-tree based indexing schemes for exact
similarity search in $(\Omega,X)$. In paricular, this bound is superpolynomial
in $d$.
|
[
{
"version": "v1",
"created": "Sun, 30 Nov 2008 15:17:22 GMT"
},
{
"version": "v2",
"created": "Fri, 20 Aug 2010 03:42:50 GMT"
},
{
"version": "v3",
"created": "Tue, 10 May 2011 16:17:39 GMT"
},
{
"version": "v4",
"created": "Fri, 24 Feb 2012 18:38:50 GMT"
}
] | 2013-03-27T00:00:00
|
[
[
"Pestov",
"Vladimir",
""
]
] |
TITLE: Lower Bounds on Performance of Metric Tree Indexing Schemes for Exact
Similarity Search in High Dimensions
ABSTRACT: Within a mathematically rigorous model, we analyse the curse of
dimensionality for deterministic exact similarity search in the context of
popular indexing schemes: metric trees. The datasets $X$ are sampled randomly
from a domain $\Omega$, equipped with a distance, $\rho$, and an underlying
probability distribution, $\mu$. While performing an asymptotic analysis, we
send the intrinsic dimension $d$ of $\Omega$ to infinity, and assume that the
size of a dataset, $n$, grows superpolynomially yet subexponentially in $d$.
Exact similarity search refers to finding the nearest neighbour in the dataset
$X$ to a query point $\omega\in\Omega$, where the query points are subject to
the same probability distribution $\mu$ as datapoints. Let $\mathscr F$ denote
a class of all 1-Lipschitz functions on $\Omega$ that can be used as decision
functions in constructing a hierarchical metric tree indexing scheme. Suppose
the VC dimension of the class of all sets $\{\omega\colon f(\omega)\geq a\}$,
$a\in\R$ is $o(n^{1/4}/\log^2n)$. (In view of a 1995 result of Goldberg and
Jerrum, even a stronger complexity assumption $d^{O(1)}$ is reasonable.) We
deduce the $\Omega(n^{1/4})$ lower bound on the expected average case
performance of hierarchical metric-tree based indexing schemes for exact
similarity search in $(\Omega,X)$. In paricular, this bound is superpolynomial
in $d$.
|
no_new_dataset
| 0.709849
|
1303.4969
|
Jeff Jones Dr
|
Jeff Jones, Andrew Adamatzky
|
Computation of the Travelling Salesman Problem by a Shrinking Blob
|
27 Pages, 13 Figures. 25-03-13: Amended typos
| null | null | null |
cs.ET cs.CG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The Travelling Salesman Problem (TSP) is a well known and challenging
combinatorial optimisation problem. Its computational intractability has
attracted a number of heuristic approaches to generate satisfactory, if not
optimal, candidate solutions. In this paper we demonstrate a simple
unconventional computation method to approximate the Euclidean TSP using a
virtual material approach. The morphological adaptation behaviour of the
material emerges from the low-level interactions of a population of particles
moving within a diffusive lattice. A `blob' of this material is placed over a
set of data points projected into the lattice, representing TSP city locations,
and the blob is reduced in size over time. As the blob shrinks it
morphologically adapts to the configuration of the cities. The shrinkage
process automatically stops when the blob no longer completely covers all
cities. By manually tracing the perimeter of the blob a path between cities is
elicited corresponding to a TSP tour. Over 6 runs on 20 randomly generated
datasets of 20 cities this simple and unguided method found tours with a mean
best tour length of 1.04, mean average tour length of 1.07 and mean worst tour
length of 1.09 when expressed as a fraction of the minimal tour computed by an
exact TSP solver. We examine the insertion mechanism by which the blob
constructs a tour, note some properties and limitations of its performance, and
discuss the relationship between the blob TSP and proximity graphs which group
points on the plane. The method is notable for its simplicity and the spatially
represented mechanical mode of its operation. We discuss similarities between
this method and previously suggested models of human performance on the TSP and
suggest possibilities for further improvement.
|
[
{
"version": "v1",
"created": "Wed, 20 Mar 2013 15:36:54 GMT"
},
{
"version": "v2",
"created": "Mon, 25 Mar 2013 17:45:47 GMT"
}
] | 2013-03-27T00:00:00
|
[
[
"Jones",
"Jeff",
""
],
[
"Adamatzky",
"Andrew",
""
]
] |
TITLE: Computation of the Travelling Salesman Problem by a Shrinking Blob
ABSTRACT: The Travelling Salesman Problem (TSP) is a well known and challenging
combinatorial optimisation problem. Its computational intractability has
attracted a number of heuristic approaches to generate satisfactory, if not
optimal, candidate solutions. In this paper we demonstrate a simple
unconventional computation method to approximate the Euclidean TSP using a
virtual material approach. The morphological adaptation behaviour of the
material emerges from the low-level interactions of a population of particles
moving within a diffusive lattice. A `blob' of this material is placed over a
set of data points projected into the lattice, representing TSP city locations,
and the blob is reduced in size over time. As the blob shrinks it
morphologically adapts to the configuration of the cities. The shrinkage
process automatically stops when the blob no longer completely covers all
cities. By manually tracing the perimeter of the blob a path between cities is
elicited corresponding to a TSP tour. Over 6 runs on 20 randomly generated
datasets of 20 cities this simple and unguided method found tours with a mean
best tour length of 1.04, mean average tour length of 1.07 and mean worst tour
length of 1.09 when expressed as a fraction of the minimal tour computed by an
exact TSP solver. We examine the insertion mechanism by which the blob
constructs a tour, note some properties and limitations of its performance, and
discuss the relationship between the blob TSP and proximity graphs which group
points on the plane. The method is notable for its simplicity and the spatially
represented mechanical mode of its operation. We discuss similarities between
this method and previously suggested models of human performance on the TSP and
suggest possibilities for further improvement.
|
no_new_dataset
| 0.707222
|
1303.6271
|
Marcel Blattner
|
J\'er\^ome Kunegis, Marcel Blattner, Christine Moser
|
Preferential Attachment in Online Networks: Measurement and Explanations
|
10 pages, 5 figures, Accepted for the WebSci'13 Conference, Paris,
2013
| null | null | null |
physics.soc-ph cs.SI physics.data-an
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We perform an empirical study of the preferential attachment phenomenon in
temporal networks and show that on the Web, networks follow a nonlinear
preferential attachment model in which the exponent depends on the type of
network considered. The classical preferential attachment model for networks by
Barab\'asi and Albert (1999) assumes a linear relationship between the number
of neighbors of a node in a network and the probability of attachment. Although
this assumption is widely made in Web Science and related fields, the
underlying linearity is rarely measured. To fill this gap, this paper performs
an empirical longitudinal (time-based) study on forty-seven diverse Web network
datasets from seven network categories and including directed, undirected and
bipartite networks. We show that contrary to the usual assumption, preferential
attachment is nonlinear in the networks under consideration. Furthermore, we
observe that the deviation from linearity is dependent on the type of network,
giving sublinear attachment in certain types of networks, and superlinear
attachment in others. Thus, we introduce the preferential attachment exponent
$\beta$ as a novel numerical network measure that can be used to discriminate
different types of networks. We propose explanations for the behavior of that
network measure, based on the mechanisms that underly the growth of the network
in question.
|
[
{
"version": "v1",
"created": "Sat, 23 Mar 2013 09:23:39 GMT"
}
] | 2013-03-27T00:00:00
|
[
[
"Kunegis",
"Jérôme",
""
],
[
"Blattner",
"Marcel",
""
],
[
"Moser",
"Christine",
""
]
] |
TITLE: Preferential Attachment in Online Networks: Measurement and Explanations
ABSTRACT: We perform an empirical study of the preferential attachment phenomenon in
temporal networks and show that on the Web, networks follow a nonlinear
preferential attachment model in which the exponent depends on the type of
network considered. The classical preferential attachment model for networks by
Barab\'asi and Albert (1999) assumes a linear relationship between the number
of neighbors of a node in a network and the probability of attachment. Although
this assumption is widely made in Web Science and related fields, the
underlying linearity is rarely measured. To fill this gap, this paper performs
an empirical longitudinal (time-based) study on forty-seven diverse Web network
datasets from seven network categories and including directed, undirected and
bipartite networks. We show that contrary to the usual assumption, preferential
attachment is nonlinear in the networks under consideration. Furthermore, we
observe that the deviation from linearity is dependent on the type of network,
giving sublinear attachment in certain types of networks, and superlinear
attachment in others. Thus, we introduce the preferential attachment exponent
$\beta$ as a novel numerical network measure that can be used to discriminate
different types of networks. We propose explanations for the behavior of that
network measure, based on the mechanisms that underly the growth of the network
in question.
|
no_new_dataset
| 0.711606
|
1303.6361
|
Conrad Sanderson
|
Sandra Mau, Shaokang Chen, Conrad Sanderson, Brian C. Lovell
|
Video Face Matching using Subset Selection and Clustering of
Probabilistic Multi-Region Histograms
| null |
International Conference of Image and Vision Computing New Zealand
(IVCNZ), 2010
|
10.1109/IVCNZ.2010.6148860
| null |
cs.CV cs.IR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Balancing computational efficiency with recognition accuracy is one of the
major challenges in real-world video-based face recognition. A significant
design decision for any such system is whether to process and use all possible
faces detected over the video frames, or whether to select only a few "best"
faces. This paper presents a video face recognition system based on
probabilistic Multi-Region Histograms to characterise performance trade-offs
in: (i) selecting a subset of faces compared to using all faces, and (ii)
combining information from all faces via clustering. Three face selection
metrics are evaluated for choosing a subset: face detection confidence, random
subset, and sequential selection. Experiments on the recently introduced MOBIO
dataset indicate that the usage of all faces through clustering always
outperformed selecting only a subset of faces. The experiments also show that
the face selection metric based on face detection confidence generally provides
better recognition performance than random or sequential sampling. Moreover,
the optimal number of faces varies drastically across selection metric and
subsets of MOBIO. Given the trade-offs between computational effort,
recognition accuracy and robustness, it is recommended that face feature
clustering would be most advantageous in batch processing (particularly for
video-based watchlists), whereas face selection methods should be limited to
applications with significant computational restrictions.
|
[
{
"version": "v1",
"created": "Tue, 26 Mar 2013 01:34:42 GMT"
}
] | 2013-03-27T00:00:00
|
[
[
"Mau",
"Sandra",
""
],
[
"Chen",
"Shaokang",
""
],
[
"Sanderson",
"Conrad",
""
],
[
"Lovell",
"Brian C.",
""
]
] |
TITLE: Video Face Matching using Subset Selection and Clustering of
Probabilistic Multi-Region Histograms
ABSTRACT: Balancing computational efficiency with recognition accuracy is one of the
major challenges in real-world video-based face recognition. A significant
design decision for any such system is whether to process and use all possible
faces detected over the video frames, or whether to select only a few "best"
faces. This paper presents a video face recognition system based on
probabilistic Multi-Region Histograms to characterise performance trade-offs
in: (i) selecting a subset of faces compared to using all faces, and (ii)
combining information from all faces via clustering. Three face selection
metrics are evaluated for choosing a subset: face detection confidence, random
subset, and sequential selection. Experiments on the recently introduced MOBIO
dataset indicate that the usage of all faces through clustering always
outperformed selecting only a subset of faces. The experiments also show that
the face selection metric based on face detection confidence generally provides
better recognition performance than random or sequential sampling. Moreover,
the optimal number of faces varies drastically across selection metric and
subsets of MOBIO. Given the trade-offs between computational effort,
recognition accuracy and robustness, it is recommended that face feature
clustering would be most advantageous in batch processing (particularly for
video-based watchlists), whereas face selection methods should be limited to
applications with significant computational restrictions.
|
new_dataset
| 0.606673
|
1302.5235
|
Adrien Guille
|
Adrien Guille, Hakim Hacid, C\'ecile Favre
|
Predicting the Temporal Dynamics of Information Diffusion in Social
Networks
|
10 pages; (corrected typos)
| null | null |
ERIC Laboratory Report RI-ERIC-13/001
|
cs.SI physics.soc-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Online social networks play a major role in the spread of information at very
large scale and it becomes essential to provide means to analyse this
phenomenon. In this paper we address the issue of predicting the temporal
dynamics of the information diffusion process. We develop a graph-based
approach built on the assumption that the macroscopic dynamics of the spreading
process are explained by the topology of the network and the interactions that
occur through it, between pairs of users, on the basis of properties at the
microscopic level. We introduce a generic model, called T-BaSIC, and describe
how to estimate its parameters from users behaviours using machine learning
techniques. Contrary to classical approaches where the parameters are fixed in
advance, T-BaSIC's parameters are functions depending of time, which permit to
better approximate and adapt to the diffusion phenomenon observed in online
social networks. Our proposal has been validated on real Twitter datasets.
Experiments show that our approach is able to capture the particular patterns
of diffusion depending of the studied sub-networks of users and topics. The
results corroborate the "two-step" theory (1955) that states that information
flows from media to a few "opinion leaders" who then transfer it to the mass
population via social networks and show that it applies in the online context.
This work also highlights interesting recommendations for future
investigations.
|
[
{
"version": "v1",
"created": "Thu, 21 Feb 2013 10:06:35 GMT"
},
{
"version": "v2",
"created": "Fri, 1 Mar 2013 10:21:08 GMT"
}
] | 2013-03-26T00:00:00
|
[
[
"Guille",
"Adrien",
""
],
[
"Hacid",
"Hakim",
""
],
[
"Favre",
"Cécile",
""
]
] |
TITLE: Predicting the Temporal Dynamics of Information Diffusion in Social
Networks
ABSTRACT: Online social networks play a major role in the spread of information at very
large scale and it becomes essential to provide means to analyse this
phenomenon. In this paper we address the issue of predicting the temporal
dynamics of the information diffusion process. We develop a graph-based
approach built on the assumption that the macroscopic dynamics of the spreading
process are explained by the topology of the network and the interactions that
occur through it, between pairs of users, on the basis of properties at the
microscopic level. We introduce a generic model, called T-BaSIC, and describe
how to estimate its parameters from users behaviours using machine learning
techniques. Contrary to classical approaches where the parameters are fixed in
advance, T-BaSIC's parameters are functions depending of time, which permit to
better approximate and adapt to the diffusion phenomenon observed in online
social networks. Our proposal has been validated on real Twitter datasets.
Experiments show that our approach is able to capture the particular patterns
of diffusion depending of the studied sub-networks of users and topics. The
results corroborate the "two-step" theory (1955) that states that information
flows from media to a few "opinion leaders" who then transfer it to the mass
population via social networks and show that it applies in the online context.
This work also highlights interesting recommendations for future
investigations.
|
no_new_dataset
| 0.709982
|
1303.5778
|
Alex Graves
|
Alex Graves, Abdel-rahman Mohamed and Geoffrey Hinton
|
Speech Recognition with Deep Recurrent Neural Networks
|
To appear in ICASSP 2013
| null | null | null |
cs.NE cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Recurrent neural networks (RNNs) are a powerful model for sequential data.
End-to-end training methods such as Connectionist Temporal Classification make
it possible to train RNNs for sequence labelling problems where the
input-output alignment is unknown. The combination of these methods with the
Long Short-term Memory RNN architecture has proved particularly fruitful,
delivering state-of-the-art results in cursive handwriting recognition. However
RNN performance in speech recognition has so far been disappointing, with
better results returned by deep feedforward networks. This paper investigates
\emph{deep recurrent neural networks}, which combine the multiple levels of
representation that have proved so effective in deep networks with the flexible
use of long range context that empowers RNNs. When trained end-to-end with
suitable regularisation, we find that deep Long Short-term Memory RNNs achieve
a test set error of 17.7% on the TIMIT phoneme recognition benchmark, which to
our knowledge is the best recorded score.
|
[
{
"version": "v1",
"created": "Fri, 22 Mar 2013 20:55:48 GMT"
}
] | 2013-03-26T00:00:00
|
[
[
"Graves",
"Alex",
""
],
[
"Mohamed",
"Abdel-rahman",
""
],
[
"Hinton",
"Geoffrey",
""
]
] |
TITLE: Speech Recognition with Deep Recurrent Neural Networks
ABSTRACT: Recurrent neural networks (RNNs) are a powerful model for sequential data.
End-to-end training methods such as Connectionist Temporal Classification make
it possible to train RNNs for sequence labelling problems where the
input-output alignment is unknown. The combination of these methods with the
Long Short-term Memory RNN architecture has proved particularly fruitful,
delivering state-of-the-art results in cursive handwriting recognition. However
RNN performance in speech recognition has so far been disappointing, with
better results returned by deep feedforward networks. This paper investigates
\emph{deep recurrent neural networks}, which combine the multiple levels of
representation that have proved so effective in deep networks with the flexible
use of long range context that empowers RNNs. When trained end-to-end with
suitable regularisation, we find that deep Long Short-term Memory RNNs achieve
a test set error of 17.7% on the TIMIT phoneme recognition benchmark, which to
our knowledge is the best recorded score.
|
no_new_dataset
| 0.710025
|
1303.5891
|
Bharath Balasubramanian
|
Bharath Balasubramanian and Vijay K. Garg
|
Fault Tolerance in Distributed Systems using Fused State Machines
|
This is under review with the Distributed Computing journal
| null | null | null |
cs.DC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Replication is a standard technique for fault tolerance in distributed
systems modeled as deterministic finite state machines (DFSMs or machines). To
correct f crash or f/2 Byzantine faults among n different machines, replication
requires nf additional backup machines. We present a solution called fusion
that requires just f additional backup machines. First, we build a framework
for fault tolerance in DFSMs based on the notion of Hamming distances. We
introduce the concept of an (f,m)-fusion, which is a set of m backup machines
that can correct f crash faults or f/2 Byzantine faults among a given set of
machines. Second, we present an algorithm to generate an (f,f)-fusion for a
given set of machines. We ensure that our backups are efficient in terms of the
size of their state and event sets. Our evaluation of fusion on the widely used
MCNC'91 benchmarks for DFSMs show that the average state space savings in
fusion (over replication) is 38% (range 0-99%). To demonstrate the practical
use of fusion, we describe its potential application to the MapReduce
framework. Using a simple case study, we compare replication and fusion as
applied to this framework. While a pure replication-based solution requires 1.8
million map tasks, our fusion-based solution requires only 1.4 million map
tasks with minimal overhead during normal operation or recovery. Hence, fusion
results in considerable savings in state space and other resources such as the
power needed to run the backup tasks.
|
[
{
"version": "v1",
"created": "Sat, 23 Mar 2013 23:03:34 GMT"
}
] | 2013-03-26T00:00:00
|
[
[
"Balasubramanian",
"Bharath",
""
],
[
"Garg",
"Vijay K.",
""
]
] |
TITLE: Fault Tolerance in Distributed Systems using Fused State Machines
ABSTRACT: Replication is a standard technique for fault tolerance in distributed
systems modeled as deterministic finite state machines (DFSMs or machines). To
correct f crash or f/2 Byzantine faults among n different machines, replication
requires nf additional backup machines. We present a solution called fusion
that requires just f additional backup machines. First, we build a framework
for fault tolerance in DFSMs based on the notion of Hamming distances. We
introduce the concept of an (f,m)-fusion, which is a set of m backup machines
that can correct f crash faults or f/2 Byzantine faults among a given set of
machines. Second, we present an algorithm to generate an (f,f)-fusion for a
given set of machines. We ensure that our backups are efficient in terms of the
size of their state and event sets. Our evaluation of fusion on the widely used
MCNC'91 benchmarks for DFSMs show that the average state space savings in
fusion (over replication) is 38% (range 0-99%). To demonstrate the practical
use of fusion, we describe its potential application to the MapReduce
framework. Using a simple case study, we compare replication and fusion as
applied to this framework. While a pure replication-based solution requires 1.8
million map tasks, our fusion-based solution requires only 1.4 million map
tasks with minimal overhead during normal operation or recovery. Hence, fusion
results in considerable savings in state space and other resources such as the
power needed to run the backup tasks.
|
no_new_dataset
| 0.709573
|
1303.5909
|
Di Jin
|
Dayou Liu, Di Jin, Carlos Baquero, Dongxiao He, Bo Yang, Qiangyuan Yu
|
Genetic Algorithm with a Local Search Strategy for Discovering
Communities in Complex Networks
|
17 pages, 8 figures. arXiv admin note: text overlap with
arXiv:1303.4711
|
International Journal of Computational Intelligence Systems, Vol.
6, No. 2 (March, 2013), 354-369
|
10.1080/18756891.2013.773175
| null |
cs.SI physics.soc-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In order to further improve the performance of current genetic algorithms
aiming at discovering communities, a local search based genetic algorithm GALS
is here proposed. The core of GALS is a local search based mutation technique.
In order to overcome the drawbacks of traditional mutation methods, the paper
develops the concept of marginal gene and then the local monotonicity of
modularity function Q is deduced from each nodes local view. Based on these two
elements, a new mutation method combined with a local search strategy is
presented. GALS has been evaluated on both synthetic benchmarks and several
real networks, and compared with some presently competing algorithms.
Experimental results show that GALS is highly effective and efficient for
discovering community structure.
|
[
{
"version": "v1",
"created": "Sun, 24 Mar 2013 03:06:11 GMT"
}
] | 2013-03-26T00:00:00
|
[
[
"Liu",
"Dayou",
""
],
[
"Jin",
"Di",
""
],
[
"Baquero",
"Carlos",
""
],
[
"He",
"Dongxiao",
""
],
[
"Yang",
"Bo",
""
],
[
"Yu",
"Qiangyuan",
""
]
] |
TITLE: Genetic Algorithm with a Local Search Strategy for Discovering
Communities in Complex Networks
ABSTRACT: In order to further improve the performance of current genetic algorithms
aiming at discovering communities, a local search based genetic algorithm GALS
is here proposed. The core of GALS is a local search based mutation technique.
In order to overcome the drawbacks of traditional mutation methods, the paper
develops the concept of marginal gene and then the local monotonicity of
modularity function Q is deduced from each nodes local view. Based on these two
elements, a new mutation method combined with a local search strategy is
presented. GALS has been evaluated on both synthetic benchmarks and several
real networks, and compared with some presently competing algorithms.
Experimental results show that GALS is highly effective and efficient for
discovering community structure.
|
no_new_dataset
| 0.711619
|
1303.5910
|
Di Jin
|
Di Jin, Dayou Liu, Bo Yang, Jie Liu, Dongxiao He
|
Ant Colony Optimization with a New Random Walk Model for Community
Detection in Complex Networks
|
14 pages, 4 figures. arXiv admin note: substantial text overlap with
arXiv:1303.5675
|
Advances in Complex Systems, Vol. 14, No. 5 (2011) 795-815
|
10.1142/S0219525911003219
| null |
cs.SI physics.soc-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Detecting communities from complex networks has recently triggered great
interest. Aiming at this problem, a new ant colony optimization strategy
building on the Markov random walks theory, which is named as MACO, is proposed
in this paper. The framework of ant colony optimization is taken as the basic
framework in this algorithm. In each iteration, a Markov random walk model is
employed as heuristic rule; all of the ants local solutions are aggregated to a
global one through an idea of clustering ensemble, which then will be used to
update a pheromone matrix. The strategy relies on the progressive strengthening
of within-community links and the weakening of between-community links.
Gradually this converges to a solution where the underlying community structure
of the complex network will become clearly visible. The proposed MACO has been
evaluated both on synthetic benchmarks and on some real-world networks, and
compared with some present competing algorithms. Experimental result has shown
that MACO is highly effective for discovering communities.
|
[
{
"version": "v1",
"created": "Sun, 24 Mar 2013 03:20:06 GMT"
}
] | 2013-03-26T00:00:00
|
[
[
"Jin",
"Di",
""
],
[
"Liu",
"Dayou",
""
],
[
"Yang",
"Bo",
""
],
[
"Liu",
"Jie",
""
],
[
"He",
"Dongxiao",
""
]
] |
TITLE: Ant Colony Optimization with a New Random Walk Model for Community
Detection in Complex Networks
ABSTRACT: Detecting communities from complex networks has recently triggered great
interest. Aiming at this problem, a new ant colony optimization strategy
building on the Markov random walks theory, which is named as MACO, is proposed
in this paper. The framework of ant colony optimization is taken as the basic
framework in this algorithm. In each iteration, a Markov random walk model is
employed as heuristic rule; all of the ants local solutions are aggregated to a
global one through an idea of clustering ensemble, which then will be used to
update a pheromone matrix. The strategy relies on the progressive strengthening
of within-community links and the weakening of between-community links.
Gradually this converges to a solution where the underlying community structure
of the complex network will become clearly visible. The proposed MACO has been
evaluated both on synthetic benchmarks and on some real-world networks, and
compared with some present competing algorithms. Experimental result has shown
that MACO is highly effective for discovering communities.
|
no_new_dataset
| 0.710986
|
1303.5926
|
Sourish Dasgupta
|
Sourish Dasgupta, Satish Bhat, Yugyung Lee
|
STC: Semantic Taxonomical Clustering for Service Category Learning
|
14 pages
| null | null | null |
cs.SE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Service discovery is one of the key problems that has been widely researched
in the area of Service Oriented Architecture (SOA) based systems. Service
category learning is a technique for efficiently facilitating service
discovery. Most approaches for service category learning are based on suitable
similarity distance measures using thresholds. Threshold selection is
essentially difficult and often leads to unsatisfactory accuracy. In this
paper, we have proposed a self-organizing based clustering algorithm called
Semantic Taxonomical Clustering (STC) for taxonomically organizing services
with self-organizing information and knowledge. We have tested the STC
algorithm on both randomly generated data and the standard OWL-S TC dataset. We
have observed promising results both in terms of classification accuracy and
runtime performance compared to existing approaches.
|
[
{
"version": "v1",
"created": "Sun, 24 Mar 2013 08:30:44 GMT"
}
] | 2013-03-26T00:00:00
|
[
[
"Dasgupta",
"Sourish",
""
],
[
"Bhat",
"Satish",
""
],
[
"Lee",
"Yugyung",
""
]
] |
TITLE: STC: Semantic Taxonomical Clustering for Service Category Learning
ABSTRACT: Service discovery is one of the key problems that has been widely researched
in the area of Service Oriented Architecture (SOA) based systems. Service
category learning is a technique for efficiently facilitating service
discovery. Most approaches for service category learning are based on suitable
similarity distance measures using thresholds. Threshold selection is
essentially difficult and often leads to unsatisfactory accuracy. In this
paper, we have proposed a self-organizing based clustering algorithm called
Semantic Taxonomical Clustering (STC) for taxonomically organizing services
with self-organizing information and knowledge. We have tested the STC
algorithm on both randomly generated data and the standard OWL-S TC dataset. We
have observed promising results both in terms of classification accuracy and
runtime performance compared to existing approaches.
|
no_new_dataset
| 0.711857
|
1303.6021
|
Conrad Sanderson
|
Andres Sanin, Conrad Sanderson, Mehrtash T. Harandi, Brian C. Lovell
|
Spatio-Temporal Covariance Descriptors for Action and Gesture
Recognition
| null |
IEEE Workshop on Applications of Computer Vision, pp. 103-110,
2013
|
10.1109/WACV.2013.6475006
| null |
cs.CV cs.HC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We propose a new action and gesture recognition method based on
spatio-temporal covariance descriptors and a weighted Riemannian locality
preserving projection approach that takes into account the curved space formed
by the descriptors. The weighted projection is then exploited during boosting
to create a final multiclass classification algorithm that employs the most
useful spatio-temporal regions. We also show how the descriptors can be
computed quickly through the use of integral video representations. Experiments
on the UCF sport, CK+ facial expression and Cambridge hand gesture datasets
indicate superior performance of the proposed method compared to several recent
state-of-the-art techniques. The proposed method is robust and does not require
additional processing of the videos, such as foreground detection,
interest-point detection or tracking.
|
[
{
"version": "v1",
"created": "Mon, 25 Mar 2013 03:16:08 GMT"
}
] | 2013-03-26T00:00:00
|
[
[
"Sanin",
"Andres",
""
],
[
"Sanderson",
"Conrad",
""
],
[
"Harandi",
"Mehrtash T.",
""
],
[
"Lovell",
"Brian C.",
""
]
] |
TITLE: Spatio-Temporal Covariance Descriptors for Action and Gesture
Recognition
ABSTRACT: We propose a new action and gesture recognition method based on
spatio-temporal covariance descriptors and a weighted Riemannian locality
preserving projection approach that takes into account the curved space formed
by the descriptors. The weighted projection is then exploited during boosting
to create a final multiclass classification algorithm that employs the most
useful spatio-temporal regions. We also show how the descriptors can be
computed quickly through the use of integral video representations. Experiments
on the UCF sport, CK+ facial expression and Cambridge hand gesture datasets
indicate superior performance of the proposed method compared to several recent
state-of-the-art techniques. The proposed method is robust and does not require
additional processing of the videos, such as foreground detection,
interest-point detection or tracking.
|
no_new_dataset
| 0.710848
|
1210.2018
|
Zhong-Yuan Zhang
|
Zhong-Yuan Zhang
|
Community Structure Detection in Complex Networks with Partial
Background Information
| null |
Zhong-Yuan Zhang 2013 EPL 101 48005
|
10.1209/0295-5075/101/48005
| null |
cs.SI physics.soc-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Constrained clustering has been well-studied in the unsupervised learning
society. However, how to encode constraints into community structure detection,
within complex networks, remains a challenging problem. In this paper, we
propose a semi-supervised learning framework for community structure detection.
This framework implicitly encodes the must-link and cannot-link constraints by
modifying the adjacency matrix of network, which can also be regarded as
de-noising the consensus matrix of community structures. Our proposed method
gives consideration to both the topology and the functions (background
information) of complex network, which enhances the interpretability of the
results. The comparisons performed on both the synthetic benchmarks and the
real-world networks show that the proposed framework can significantly improve
the community detection performance with few constraints, which makes it an
attractive methodology in the analysis of complex networks.
|
[
{
"version": "v1",
"created": "Sun, 7 Oct 2012 03:49:00 GMT"
},
{
"version": "v2",
"created": "Fri, 22 Mar 2013 17:01:15 GMT"
}
] | 2013-03-25T00:00:00
|
[
[
"Zhang",
"Zhong-Yuan",
""
]
] |
TITLE: Community Structure Detection in Complex Networks with Partial
Background Information
ABSTRACT: Constrained clustering has been well-studied in the unsupervised learning
society. However, how to encode constraints into community structure detection,
within complex networks, remains a challenging problem. In this paper, we
propose a semi-supervised learning framework for community structure detection.
This framework implicitly encodes the must-link and cannot-link constraints by
modifying the adjacency matrix of network, which can also be regarded as
de-noising the consensus matrix of community structures. Our proposed method
gives consideration to both the topology and the functions (background
information) of complex network, which enhances the interpretability of the
results. The comparisons performed on both the synthetic benchmarks and the
real-world networks show that the proposed framework can significantly improve
the community detection performance with few constraints, which makes it an
attractive methodology in the analysis of complex networks.
|
no_new_dataset
| 0.71103
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.