id
large_stringlengths
9
16
submitter
large_stringlengths
3
64
authors
large_stringlengths
5
20.2k
title
large_stringlengths
5
245
comments
large_stringlengths
1
482
journal-ref
large_stringlengths
4
382
doi
large_stringlengths
9
151
report-no
large_stringlengths
2
509
categories
large_stringlengths
5
78
license
large_stringclasses
9 values
abstract
large_stringlengths
83
3.55k
versions
large listlengths
1
21
update_date
timestamp[ms]date
2007-05-23 00:00:00
2025-05-30 00:00:00
authors_parsed
large listlengths
1
1.35k
prompt
large_stringlengths
166
3.64k
label
stringclasses
2 values
prob
float64
0.5
0.73
1302.4922
David Duvenaud
David Duvenaud, James Robert Lloyd, Roger Grosse, Joshua B. Tenenbaum, Zoubin Ghahramani
Structure Discovery in Nonparametric Regression through Compositional Kernel Search
9 pages, 7 figures, To appear in proceedings of the 2013 International Conference on Machine Learning
null
null
null
stat.ML cs.LG stat.ME
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Despite its importance, choosing the structural form of the kernel in nonparametric regression remains a black art. We define a space of kernel structures which are built compositionally by adding and multiplying a small number of base kernels. We present a method for searching over this space of structures which mirrors the scientific discovery process. The learned structures can often decompose functions into interpretable components and enable long-range extrapolation on time-series datasets. Our structure search method outperforms many widely used kernels and kernel combination methods on a variety of prediction tasks.
[ { "version": "v1", "created": "Wed, 20 Feb 2013 14:53:13 GMT" }, { "version": "v2", "created": "Tue, 5 Mar 2013 11:48:12 GMT" }, { "version": "v3", "created": "Fri, 5 Apr 2013 16:53:30 GMT" }, { "version": "v4", "created": "Mon, 13 May 2013 13:10:31 GMT" } ]
2013-05-15T00:00:00
[ [ "Duvenaud", "David", "" ], [ "Lloyd", "James Robert", "" ], [ "Grosse", "Roger", "" ], [ "Tenenbaum", "Joshua B.", "" ], [ "Ghahramani", "Zoubin", "" ] ]
TITLE: Structure Discovery in Nonparametric Regression through Compositional Kernel Search ABSTRACT: Despite its importance, choosing the structural form of the kernel in nonparametric regression remains a black art. We define a space of kernel structures which are built compositionally by adding and multiplying a small number of base kernels. We present a method for searching over this space of structures which mirrors the scientific discovery process. The learned structures can often decompose functions into interpretable components and enable long-range extrapolation on time-series datasets. Our structure search method outperforms many widely used kernels and kernel combination methods on a variety of prediction tasks.
no_new_dataset
0.709598
1305.3038
Li Gongming
Gongming Li, Hong An
Phase-Priority based Directory Coherence for Multicore Processor
15 pages. International Journal of Computer Science, Engineering and Information Technology, April 2013
null
10.5121/ijcseit.2013.3201
null
cs.AR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
As the number of cores in a single chip increases, a typical implementation of coherence protocol adds significant hardware and complexity overhead. Besides, the performance of CMP system depends on the data access latency, which is highly affected by coherence protocol and on-chip interconnect. In this paper, we propose PPB (Phase-Priority Based) cache coherence protocol, an optimization of modern directory coherence protocol. We take advantage of the observation that transient states occur in directory coherence protocol, resulting in some unnecessary transient states and stalling. PPB cache coherence protocol decouples a coherence transaction and introduces the idea of phase message. This phase is considered as the priority of the message. Additionally, we also add new priority-based arbitrators in on-chip network to support PPB cache coherence protocol. This mechanism in on-chip network can support effective cache access, which makes the on-chip network more efficient. Our analysis on an execution-driven full system simulator using SPLASH-2 benchmark shows that PPB cache coherence outperforms a MESI based directory, and the number of unnecessary transient states and stalling reduces up to 24%. Also it reported the speedup of 7.4%. Other advantages of this strategy are reduced delay of flits and significantly less energy consumption in on-chip network.
[ { "version": "v1", "created": "Tue, 14 May 2013 06:56:10 GMT" } ]
2013-05-15T00:00:00
[ [ "Li", "Gongming", "" ], [ "An", "Hong", "" ] ]
TITLE: Phase-Priority based Directory Coherence for Multicore Processor ABSTRACT: As the number of cores in a single chip increases, a typical implementation of coherence protocol adds significant hardware and complexity overhead. Besides, the performance of CMP system depends on the data access latency, which is highly affected by coherence protocol and on-chip interconnect. In this paper, we propose PPB (Phase-Priority Based) cache coherence protocol, an optimization of modern directory coherence protocol. We take advantage of the observation that transient states occur in directory coherence protocol, resulting in some unnecessary transient states and stalling. PPB cache coherence protocol decouples a coherence transaction and introduces the idea of phase message. This phase is considered as the priority of the message. Additionally, we also add new priority-based arbitrators in on-chip network to support PPB cache coherence protocol. This mechanism in on-chip network can support effective cache access, which makes the on-chip network more efficient. Our analysis on an execution-driven full system simulator using SPLASH-2 benchmark shows that PPB cache coherence outperforms a MESI based directory, and the number of unnecessary transient states and stalling reduces up to 24%. Also it reported the speedup of 7.4%. Other advantages of this strategy are reduced delay of flits and significantly less energy consumption in on-chip network.
no_new_dataset
0.711644
1103.3123
Yong Lai
Yong Lai, Dayou Liu, Shengsheng Wang
Reduced Ordered Binary Decision Diagram with Implied Literals: A New knowledge Compilation Approach
18 pages, 13 figures
null
10.1007/s10115-012-0525-6
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Knowledge compilation is an approach to tackle the computational intractability of general reasoning problems. According to this approach, knowledge bases are converted off-line into a target compilation language which is tractable for on-line querying. Reduced ordered binary decision diagram (ROBDD) is one of the most influential target languages. We generalize ROBDD by associating some implied literals in each node and the new language is called reduced ordered binary decision diagram with implied literals (ROBDD-L). Then we discuss a kind of subsets of ROBDD-L called ROBDD-i with precisely i implied literals (0 \leq i \leq \infty). In particular, ROBDD-0 is isomorphic to ROBDD; ROBDD-\infty requires that each node should be associated by the implied literals as many as possible. We show that ROBDD-i has uniqueness over some specific variables order, and ROBDD-\infty is the most succinct subset in ROBDD-L and can meet most of the querying requirements involved in the knowledge compilation map. Finally, we propose an ROBDD-i compilation algorithm for any i and a ROBDD-\infty compilation algorithm. Based on them, we implement a ROBDD-L package called BDDjLu and then get some conclusions from preliminary experimental results: ROBDD-\infty is obviously smaller than ROBDD for all benchmarks; ROBDD-\infty is smaller than the d-DNNF the benchmarks whose compilation results are relatively small; it seems that it is better to transform ROBDDs-\infty into FBDDs and ROBDDs rather than straight compile the benchmarks.
[ { "version": "v1", "created": "Wed, 16 Mar 2011 08:12:05 GMT" }, { "version": "v2", "created": "Thu, 24 Mar 2011 04:23:05 GMT" } ]
2013-05-14T00:00:00
[ [ "Lai", "Yong", "" ], [ "Liu", "Dayou", "" ], [ "Wang", "Shengsheng", "" ] ]
TITLE: Reduced Ordered Binary Decision Diagram with Implied Literals: A New knowledge Compilation Approach ABSTRACT: Knowledge compilation is an approach to tackle the computational intractability of general reasoning problems. According to this approach, knowledge bases are converted off-line into a target compilation language which is tractable for on-line querying. Reduced ordered binary decision diagram (ROBDD) is one of the most influential target languages. We generalize ROBDD by associating some implied literals in each node and the new language is called reduced ordered binary decision diagram with implied literals (ROBDD-L). Then we discuss a kind of subsets of ROBDD-L called ROBDD-i with precisely i implied literals (0 \leq i \leq \infty). In particular, ROBDD-0 is isomorphic to ROBDD; ROBDD-\infty requires that each node should be associated by the implied literals as many as possible. We show that ROBDD-i has uniqueness over some specific variables order, and ROBDD-\infty is the most succinct subset in ROBDD-L and can meet most of the querying requirements involved in the knowledge compilation map. Finally, we propose an ROBDD-i compilation algorithm for any i and a ROBDD-\infty compilation algorithm. Based on them, we implement a ROBDD-L package called BDDjLu and then get some conclusions from preliminary experimental results: ROBDD-\infty is obviously smaller than ROBDD for all benchmarks; ROBDD-\infty is smaller than the d-DNNF the benchmarks whose compilation results are relatively small; it seems that it is better to transform ROBDDs-\infty into FBDDs and ROBDDs rather than straight compile the benchmarks.
no_new_dataset
0.707815
1305.0540
Shang Shang
Shang Shang and Yuk Hui and Pan Hui and Paul Cuff and Sanjeev Kulkarni
Privacy Preserving Recommendation System Based on Groups
null
null
null
null
cs.IR
http://creativecommons.org/licenses/by/3.0/
Recommendation systems have received considerable attention in the recent decades. Yet with the development of information technology and social media, the risk in revealing private data to service providers has been a growing concern to more and more users. Trade-offs between quality and privacy in recommendation systems naturally arise. In this paper, we present a privacy preserving recommendation framework based on groups. The main idea is to use groups as a natural middleware to preserve users' privacy. A distributed preference exchange algorithm is proposed to ensure the anonymity of data, wherein the effective size of the anonymity set asymptotically approaches the group size with time. We construct a hybrid collaborative filtering model based on Markov random walks to provide recommendations and predictions to group members. Experimental results on the MovieLens and Epinions datasets show that our proposed methods outperform the baseline methods, L+ and ItemRank, two state-of-the-art personalized recommendation algorithms, for both recommendation precision and hit rate despite the absence of personal preference information.
[ { "version": "v1", "created": "Thu, 2 May 2013 19:17:08 GMT" }, { "version": "v2", "created": "Mon, 13 May 2013 19:50:41 GMT" } ]
2013-05-14T00:00:00
[ [ "Shang", "Shang", "" ], [ "Hui", "Yuk", "" ], [ "Hui", "Pan", "" ], [ "Cuff", "Paul", "" ], [ "Kulkarni", "Sanjeev", "" ] ]
TITLE: Privacy Preserving Recommendation System Based on Groups ABSTRACT: Recommendation systems have received considerable attention in the recent decades. Yet with the development of information technology and social media, the risk in revealing private data to service providers has been a growing concern to more and more users. Trade-offs between quality and privacy in recommendation systems naturally arise. In this paper, we present a privacy preserving recommendation framework based on groups. The main idea is to use groups as a natural middleware to preserve users' privacy. A distributed preference exchange algorithm is proposed to ensure the anonymity of data, wherein the effective size of the anonymity set asymptotically approaches the group size with time. We construct a hybrid collaborative filtering model based on Markov random walks to provide recommendations and predictions to group members. Experimental results on the MovieLens and Epinions datasets show that our proposed methods outperform the baseline methods, L+ and ItemRank, two state-of-the-art personalized recommendation algorithms, for both recommendation precision and hit rate despite the absence of personal preference information.
no_new_dataset
0.708843
1305.2788
Fabian Pedregosa
Fabian Pedregosa (INRIA Paris - Rocquencourt, INRIA Saclay - Ile de France), Michael Eickenberg (INRIA Saclay - Ile de France, LNAO), Bertrand Thirion (INRIA Saclay - Ile de France, LNAO), Alexandre Gramfort (LTCI)
HRF estimation improves sensitivity of fMRI encoding and decoding models
3nd International Workshop on Pattern Recognition in NeuroImaging (2013)
null
null
null
cs.LG stat.AP
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Extracting activation patterns from functional Magnetic Resonance Images (fMRI) datasets remains challenging in rapid-event designs due to the inherent delay of blood oxygen level-dependent (BOLD) signal. The general linear model (GLM) allows to estimate the activation from a design matrix and a fixed hemodynamic response function (HRF). However, the HRF is known to vary substantially between subjects and brain regions. In this paper, we propose a model for jointly estimating the hemodynamic response function (HRF) and the activation patterns via a low-rank representation of task effects.This model is based on the linearity assumption behind the GLM and can be computed using standard gradient-based solvers. We use the activation patterns computed by our model as input data for encoding and decoding studies and report performance improvement in both settings.
[ { "version": "v1", "created": "Mon, 13 May 2013 14:19:24 GMT" } ]
2013-05-14T00:00:00
[ [ "Pedregosa", "Fabian", "", "INRIA Paris - Rocquencourt, INRIA Saclay - Ile de\n France" ], [ "Eickenberg", "Michael", "", "INRIA Saclay - Ile de France, LNAO" ], [ "Thirion", "Bertrand", "", "INRIA Saclay - Ile de France, LNAO" ], [ "Gramfort", "Alexandre", "", "LTCI" ] ]
TITLE: HRF estimation improves sensitivity of fMRI encoding and decoding models ABSTRACT: Extracting activation patterns from functional Magnetic Resonance Images (fMRI) datasets remains challenging in rapid-event designs due to the inherent delay of blood oxygen level-dependent (BOLD) signal. The general linear model (GLM) allows to estimate the activation from a design matrix and a fixed hemodynamic response function (HRF). However, the HRF is known to vary substantially between subjects and brain regions. In this paper, we propose a model for jointly estimating the hemodynamic response function (HRF) and the activation patterns via a low-rank representation of task effects.This model is based on the linearity assumption behind the GLM and can be computed using standard gradient-based solvers. We use the activation patterns computed by our model as input data for encoding and decoding studies and report performance improvement in both settings.
no_new_dataset
0.71039
1305.2835
Kostas Tsichlas
Andreas Kosmatopoulos and Kostas Tsichlas
Dynamic Top-$k$ Dominating Queries
null
null
null
null
cs.CG cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Let $\mathcal{S}$ be a dataset of $n$ 2-dimensional points. The top-$k$ dominating query aims to report the $k$ points that dominate the most points in $\mathcal{S}$. A point $p$ dominates a point $q$ iff all coordinates of $p$ are smaller than or equal to those of $q$ and at least one of them is strictly smaller. The top-$k$ dominating query combines the dominance concept of maxima queries with the ranking function of top-$k$ queries and can be used as an important tool in multi-criteria decision making systems. In this work, we propose novel algorithms for answering semi-dynamic (insertions only) and fully dynamic (insertions and deletions) top-$k$ dominating queries. To the best of our knowledge, this is the first work towards handling (semi-)dynamic top-$k$ dominating queries that offers algorithms with asymptotic guarantees regarding their time and space cost.
[ { "version": "v1", "created": "Mon, 13 May 2013 16:30:11 GMT" } ]
2013-05-14T00:00:00
[ [ "Kosmatopoulos", "Andreas", "" ], [ "Tsichlas", "Kostas", "" ] ]
TITLE: Dynamic Top-$k$ Dominating Queries ABSTRACT: Let $\mathcal{S}$ be a dataset of $n$ 2-dimensional points. The top-$k$ dominating query aims to report the $k$ points that dominate the most points in $\mathcal{S}$. A point $p$ dominates a point $q$ iff all coordinates of $p$ are smaller than or equal to those of $q$ and at least one of them is strictly smaller. The top-$k$ dominating query combines the dominance concept of maxima queries with the ranking function of top-$k$ queries and can be used as an important tool in multi-criteria decision making systems. In this work, we propose novel algorithms for answering semi-dynamic (insertions only) and fully dynamic (insertions and deletions) top-$k$ dominating queries. To the best of our knowledge, this is the first work towards handling (semi-)dynamic top-$k$ dominating queries that offers algorithms with asymptotic guarantees regarding their time and space cost.
new_dataset
0.68516
1108.4531
Jun He
Jun He and Tianshi Chen and Boris Mitavskiy
Novel Analysis of Population Scalability in Evolutionary Algorithms
null
null
null
null
cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Population-based evolutionary algorithms (EAs) have been widely applied to solve various optimization problems. The question of how the performance of a population-based EA depends on the population size arises naturally. The performance of an EA may be evaluated by different measures, such as the average convergence rate to the optimal set per generation or the expected number of generations to encounter an optimal solution for the first time. Population scalability is the performance ratio between a benchmark EA and another EA using identical genetic operators but a larger population size. Although intuitively the performance of an EA may improve if its population size increases, currently there exist only a few case studies for simple fitness functions. This paper aims at providing a general study for discrete optimisation. A novel approach is introduced to analyse population scalability using the fundamental matrix. The following two contributions summarize the major results of the current article. (1) We demonstrate rigorously that for elitist EAs with identical global mutation, using a lager population size always increases the average rate of convergence to the optimal set; and yet, sometimes, the expected number of generations needed to find an optimal solution (measured by either the maximal value or the average value) may increase, rather than decrease. (2) We establish sufficient and/or necessary conditions for the superlinear scalability, that is, when the average convergence rate of a $(\mu+\mu)$ EA (where $\mu\ge2$) is bigger than $\mu$ times that of a $(1+1)$ EA.
[ { "version": "v1", "created": "Tue, 23 Aug 2011 09:12:04 GMT" }, { "version": "v2", "created": "Thu, 31 May 2012 08:54:40 GMT" }, { "version": "v3", "created": "Mon, 3 Sep 2012 19:02:10 GMT" }, { "version": "v4", "created": "Fri, 10 May 2013 10:29:08 GMT" } ]
2013-05-13T00:00:00
[ [ "He", "Jun", "" ], [ "Chen", "Tianshi", "" ], [ "Mitavskiy", "Boris", "" ] ]
TITLE: Novel Analysis of Population Scalability in Evolutionary Algorithms ABSTRACT: Population-based evolutionary algorithms (EAs) have been widely applied to solve various optimization problems. The question of how the performance of a population-based EA depends on the population size arises naturally. The performance of an EA may be evaluated by different measures, such as the average convergence rate to the optimal set per generation or the expected number of generations to encounter an optimal solution for the first time. Population scalability is the performance ratio between a benchmark EA and another EA using identical genetic operators but a larger population size. Although intuitively the performance of an EA may improve if its population size increases, currently there exist only a few case studies for simple fitness functions. This paper aims at providing a general study for discrete optimisation. A novel approach is introduced to analyse population scalability using the fundamental matrix. The following two contributions summarize the major results of the current article. (1) We demonstrate rigorously that for elitist EAs with identical global mutation, using a lager population size always increases the average rate of convergence to the optimal set; and yet, sometimes, the expected number of generations needed to find an optimal solution (measured by either the maximal value or the average value) may increase, rather than decrease. (2) We establish sufficient and/or necessary conditions for the superlinear scalability, that is, when the average convergence rate of a $(\mu+\mu)$ EA (where $\mu\ge2$) is bigger than $\mu$ times that of a $(1+1)$ EA.
no_new_dataset
0.71145
1304.4682
Yuan Li
Yuan Li, Haoyu Gao, Mingmin Yang, Wanqiu Guan, Haixin Ma, Weining Qian, Zhigang Cao, Xiaoguang Yang
What are Chinese Talking about in Hot Weibos?
null
null
null
null
cs.SI cs.CY physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
SinaWeibo is a Twitter-like social network service emerging in China in recent years. People can post weibos (microblogs) and communicate with others on it. Based on a dataset of 650 million weibos from August 2009 to January 2012 crawled from APIs of SinaWeibo, we study the hot ones that have been reposted for at least 1000 times. We find that hot weibos can be roughly classified into eight categories, i.e. Entertainment & Fashion, Hot Social Events, Leisure & Mood, Life & Health, Seeking for Help, Sales Promotion, Fengshui & Fortune and Deleted Weibos. In particular, Leisure & Mood and Hot Social Events account for almost 65% of all the hot weibos. This reflects very well the fundamental dual-structure of the current society of China: On the one hand, economy has made a great progress and quite a part of people are now living a relatively prosperous and fairly easy life. On the other hand, there still exist quite a lot of serious social problems, such as government corruptions and environmental pollutions. It is also shown that users' posting and reposting behaviors are greatly affected by their identity factors (gender, verification status, and regional location). For instance, (1) Two thirds of the hot weibos are created by male users. (2) Although verified users account for only 0.1% in SinaWeibo, 46.5% of the hot weibos are contributed by them. Very interestingly, 39.2% are written by SPA users. A more or less pathetic fact is that only 14.4% of the hot weibos are created by grassroots (individual users that are neither SPA nor verified). (3) Users from different areas of China have distinct posting and reposting behaviors which usually reflect very their local cultures. Homophily is also examined for people's reposting behaviors.
[ { "version": "v1", "created": "Wed, 17 Apr 2013 04:25:33 GMT" }, { "version": "v2", "created": "Fri, 10 May 2013 09:52:35 GMT" } ]
2013-05-13T00:00:00
[ [ "Li", "Yuan", "" ], [ "Gao", "Haoyu", "" ], [ "Yang", "Mingmin", "" ], [ "Guan", "Wanqiu", "" ], [ "Ma", "Haixin", "" ], [ "Qian", "Weining", "" ], [ "Cao", "Zhigang", "" ], [ "Yang", "Xiaoguang", "" ] ]
TITLE: What are Chinese Talking about in Hot Weibos? ABSTRACT: SinaWeibo is a Twitter-like social network service emerging in China in recent years. People can post weibos (microblogs) and communicate with others on it. Based on a dataset of 650 million weibos from August 2009 to January 2012 crawled from APIs of SinaWeibo, we study the hot ones that have been reposted for at least 1000 times. We find that hot weibos can be roughly classified into eight categories, i.e. Entertainment & Fashion, Hot Social Events, Leisure & Mood, Life & Health, Seeking for Help, Sales Promotion, Fengshui & Fortune and Deleted Weibos. In particular, Leisure & Mood and Hot Social Events account for almost 65% of all the hot weibos. This reflects very well the fundamental dual-structure of the current society of China: On the one hand, economy has made a great progress and quite a part of people are now living a relatively prosperous and fairly easy life. On the other hand, there still exist quite a lot of serious social problems, such as government corruptions and environmental pollutions. It is also shown that users' posting and reposting behaviors are greatly affected by their identity factors (gender, verification status, and regional location). For instance, (1) Two thirds of the hot weibos are created by male users. (2) Although verified users account for only 0.1% in SinaWeibo, 46.5% of the hot weibos are contributed by them. Very interestingly, 39.2% are written by SPA users. A more or less pathetic fact is that only 14.4% of the hot weibos are created by grassroots (individual users that are neither SPA nor verified). (3) Users from different areas of China have distinct posting and reposting behaviors which usually reflect very their local cultures. Homophily is also examined for people's reposting behaviors.
no_new_dataset
0.690507
1305.1956
Andrew Lan
Andrew S. Lan, Christoph Studer, Andrew E. Waters and Richard G. Baraniuk
Joint Topic Modeling and Factor Analysis of Textual Information and Graded Response Data
null
null
null
null
stat.ML cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Modern machine learning methods are critical to the development of large-scale personalized learning systems that cater directly to the needs of individual learners. The recently developed SPARse Factor Analysis (SPARFA) framework provides a new statistical model and algorithms for machine learning-based learning analytics, which estimate a learner's knowledge of the latent concepts underlying a domain, and content analytics, which estimate the relationships among a collection of questions and the latent concepts. SPARFA estimates these quantities given only the binary-valued graded responses to a collection of questions. In order to better interpret the estimated latent concepts, SPARFA relies on a post-processing step that utilizes user-defined tags (e.g., topics or keywords) available for each question. In this paper, we relax the need for user-defined tags by extending SPARFA to jointly process both graded learner responses and the text of each question and its associated answer(s) or other feedback. Our purely data-driven approach (i) enhances the interpretability of the estimated latent concepts without the need of explicitly generating a set of tags or performing a post-processing step, (ii) improves the prediction performance of SPARFA, and (iii) scales to large test/assessments where human annotation would prove burdensome. We demonstrate the efficacy of the proposed approach on two real educational datasets.
[ { "version": "v1", "created": "Wed, 8 May 2013 20:44:55 GMT" }, { "version": "v2", "created": "Fri, 10 May 2013 01:05:09 GMT" } ]
2013-05-13T00:00:00
[ [ "Lan", "Andrew S.", "" ], [ "Studer", "Christoph", "" ], [ "Waters", "Andrew E.", "" ], [ "Baraniuk", "Richard G.", "" ] ]
TITLE: Joint Topic Modeling and Factor Analysis of Textual Information and Graded Response Data ABSTRACT: Modern machine learning methods are critical to the development of large-scale personalized learning systems that cater directly to the needs of individual learners. The recently developed SPARse Factor Analysis (SPARFA) framework provides a new statistical model and algorithms for machine learning-based learning analytics, which estimate a learner's knowledge of the latent concepts underlying a domain, and content analytics, which estimate the relationships among a collection of questions and the latent concepts. SPARFA estimates these quantities given only the binary-valued graded responses to a collection of questions. In order to better interpret the estimated latent concepts, SPARFA relies on a post-processing step that utilizes user-defined tags (e.g., topics or keywords) available for each question. In this paper, we relax the need for user-defined tags by extending SPARFA to jointly process both graded learner responses and the text of each question and its associated answer(s) or other feedback. Our purely data-driven approach (i) enhances the interpretability of the estimated latent concepts without the need of explicitly generating a set of tags or performing a post-processing step, (ii) improves the prediction performance of SPARFA, and (iii) scales to large test/assessments where human annotation would prove burdensome. We demonstrate the efficacy of the proposed approach on two real educational datasets.
no_new_dataset
0.710057
1305.2269
Fang Wang
Fang Wang and Yi Li
Beyond Physical Connections: Tree Models in Human Pose Estimation
CVPR 2013
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Simple tree models for articulated objects prevails in the last decade. However, it is also believed that these simple tree models are not capable of capturing large variations in many scenarios, such as human pose estimation. This paper attempts to address three questions: 1) are simple tree models sufficient? more specifically, 2) how to use tree models effectively in human pose estimation? and 3) how shall we use combined parts together with single parts efficiently? Assuming we have a set of single parts and combined parts, and the goal is to estimate a joint distribution of their locations. We surprisingly find that no latent variables are introduced in the Leeds Sport Dataset (LSP) during learning latent trees for deformable model, which aims at approximating the joint distributions of body part locations using minimal tree structure. This suggests one can straightforwardly use a mixed representation of single and combined parts to approximate their joint distribution in a simple tree model. As such, one only needs to build Visual Categories of the combined parts, and then perform inference on the learned latent tree. Our method outperformed the state of the art on the LSP, both in the scenarios when the training images are from the same dataset and from the PARSE dataset. Experiments on animal images from the VOC challenge further support our findings.
[ { "version": "v1", "created": "Fri, 10 May 2013 07:09:14 GMT" } ]
2013-05-13T00:00:00
[ [ "Wang", "Fang", "" ], [ "Li", "Yi", "" ] ]
TITLE: Beyond Physical Connections: Tree Models in Human Pose Estimation ABSTRACT: Simple tree models for articulated objects prevails in the last decade. However, it is also believed that these simple tree models are not capable of capturing large variations in many scenarios, such as human pose estimation. This paper attempts to address three questions: 1) are simple tree models sufficient? more specifically, 2) how to use tree models effectively in human pose estimation? and 3) how shall we use combined parts together with single parts efficiently? Assuming we have a set of single parts and combined parts, and the goal is to estimate a joint distribution of their locations. We surprisingly find that no latent variables are introduced in the Leeds Sport Dataset (LSP) during learning latent trees for deformable model, which aims at approximating the joint distributions of body part locations using minimal tree structure. This suggests one can straightforwardly use a mixed representation of single and combined parts to approximate their joint distribution in a simple tree model. As such, one only needs to build Visual Categories of the combined parts, and then perform inference on the learned latent tree. Our method outperformed the state of the art on the LSP, both in the scenarios when the training images are from the same dataset and from the PARSE dataset. Experiments on animal images from the VOC challenge further support our findings.
no_new_dataset
0.709416
1305.2388
Ehsan Saboori Mr.
Shafigh Parsazad, Ehsan Saboori, Amin Allahyar
Fast Feature Reduction in intrusion detection datasets
null
Parsazad, Shafigh; Saboori, Ehsan; Allahyar, Amin; , "Fast Feature Reduction in intrusion detection datasets," MIPRO, 2012 Proceedings of the 35th International Convention , vol., no., pp.1023-1029, 21-25 May 2012
null
null
cs.CR cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In the most intrusion detection systems (IDS), a system tries to learn characteristics of different type of attacks by analyzing packets that sent or received in network. These packets have a lot of features. But not all of them is required to be analyzed to detect that specific type of attack. Detection speed and computational cost is another vital matter here, because in these types of problems, datasets are very huge regularly. In this paper we tried to propose a very simple and fast feature selection method to eliminate features with no helpful information on them. Result faster learning in process of redundant feature omission. We compared our proposed method with three most successful similarity based feature selection algorithm including Correlation Coefficient, Least Square Regression Error and Maximal Information Compression Index. After that we used recommended features by each of these algorithms in two popular classifiers including: Bayes and KNN classifier to measure the quality of the recommendations. Experimental result shows that although the proposed method can't outperform evaluated algorithms with high differences in accuracy, but in computational cost it has huge superiority over them.
[ { "version": "v1", "created": "Mon, 1 Apr 2013 05:27:47 GMT" } ]
2013-05-13T00:00:00
[ [ "Parsazad", "Shafigh", "" ], [ "Saboori", "Ehsan", "" ], [ "Allahyar", "Amin", "" ] ]
TITLE: Fast Feature Reduction in intrusion detection datasets ABSTRACT: In the most intrusion detection systems (IDS), a system tries to learn characteristics of different type of attacks by analyzing packets that sent or received in network. These packets have a lot of features. But not all of them is required to be analyzed to detect that specific type of attack. Detection speed and computational cost is another vital matter here, because in these types of problems, datasets are very huge regularly. In this paper we tried to propose a very simple and fast feature selection method to eliminate features with no helpful information on them. Result faster learning in process of redundant feature omission. We compared our proposed method with three most successful similarity based feature selection algorithm including Correlation Coefficient, Least Square Regression Error and Maximal Information Compression Index. After that we used recommended features by each of these algorithms in two popular classifiers including: Bayes and KNN classifier to measure the quality of the recommendations. Experimental result shows that although the proposed method can't outperform evaluated algorithms with high differences in accuracy, but in computational cost it has huge superiority over them.
no_new_dataset
0.708421
1305.1946
Luca Mazzola
Elena Camossi, Paola Villa, Luca Mazzola
Semantic-based Anomalous Pattern Discovery in Moving Object Trajectories
null
null
null
null
cs.AI cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this work, we investigate a novel semantic approach for pattern discovery in trajectories that, relying on ontologies, enhances object movement information with event semantics. The approach can be applied to the detection of movement patterns and behaviors whenever the semantics of events occurring along the trajectory is, explicitly or implicitly, available. In particular, we tested it against an exacting case scenario in maritime surveillance, i.e., the discovery of suspicious container transportations. The methodology we have developed entails the formalization of the application domain through a domain ontology, extending the Moving Object Ontology (MOO) described in this paper. Afterwards, movement patterns have to be formalized, either as Description Logic (DL) axioms or queries, enabling the retrieval of the trajectories that follow the patterns. In our experimental evaluation, we have considered a real world dataset of 18 Million of container events describing the deed undertaken in a port to accomplish the shipping (e.g., loading on a vessel, export operation). Leveraging events, we have reconstructed almost 300 thousand container trajectories referring to 50 thousand containers travelling along three years. We have formalized the anomalous itinerary patterns as DL axioms, testing different ontology APIs and DL reasoners to retrieve the suspicious transportations. Our experiments demonstrate that the approach is feasible and efficient. In particular, the joint use of Pellet and SPARQL-DL enables to detect the trajectories following a given pattern in a reasonable time with big size datasets.
[ { "version": "v1", "created": "Wed, 8 May 2013 20:14:03 GMT" } ]
2013-05-10T00:00:00
[ [ "Camossi", "Elena", "" ], [ "Villa", "Paola", "" ], [ "Mazzola", "Luca", "" ] ]
TITLE: Semantic-based Anomalous Pattern Discovery in Moving Object Trajectories ABSTRACT: In this work, we investigate a novel semantic approach for pattern discovery in trajectories that, relying on ontologies, enhances object movement information with event semantics. The approach can be applied to the detection of movement patterns and behaviors whenever the semantics of events occurring along the trajectory is, explicitly or implicitly, available. In particular, we tested it against an exacting case scenario in maritime surveillance, i.e., the discovery of suspicious container transportations. The methodology we have developed entails the formalization of the application domain through a domain ontology, extending the Moving Object Ontology (MOO) described in this paper. Afterwards, movement patterns have to be formalized, either as Description Logic (DL) axioms or queries, enabling the retrieval of the trajectories that follow the patterns. In our experimental evaluation, we have considered a real world dataset of 18 Million of container events describing the deed undertaken in a port to accomplish the shipping (e.g., loading on a vessel, export operation). Leveraging events, we have reconstructed almost 300 thousand container trajectories referring to 50 thousand containers travelling along three years. We have formalized the anomalous itinerary patterns as DL axioms, testing different ontology APIs and DL reasoners to retrieve the suspicious transportations. Our experiments demonstrate that the approach is feasible and efficient. In particular, the joint use of Pellet and SPARQL-DL enables to detect the trajectories following a given pattern in a reasonable time with big size datasets.
new_dataset
0.716063
1305.1657
Emanuele Goldoni
Alberto Savioli, Emanuele Goldoni, Pietro Savazzi, Paolo Gamba
Low Complexity Indoor Localization in Wireless Sensor Networks by UWB and Inertial Data Fusion
null
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Precise indoor localization of moving targets is a challenging activity which cannot be easily accomplished without combining different sources of information. In this sense, the combination of different data sources with an appropriate filter might improve both positioning and tracking performance. This work proposes an algorithm for hybrid positioning in Wireless Sensor Networks based on data fusion of UWB and inertial information. A constant-gain Steady State Kalman Filter is used to bound the complexity of the system, simplifying its implementation on a typical low-power WSN node. The performance of the presented data fusion algorithm has been evaluated in a realistic scenario using both simulations and realistic datasets. The obtained results prove the validity of this approach, which efficiently fuses different positioning data sources, reducing the localization error.
[ { "version": "v1", "created": "Tue, 7 May 2013 21:43:07 GMT" } ]
2013-05-09T00:00:00
[ [ "Savioli", "Alberto", "" ], [ "Goldoni", "Emanuele", "" ], [ "Savazzi", "Pietro", "" ], [ "Gamba", "Paolo", "" ] ]
TITLE: Low Complexity Indoor Localization in Wireless Sensor Networks by UWB and Inertial Data Fusion ABSTRACT: Precise indoor localization of moving targets is a challenging activity which cannot be easily accomplished without combining different sources of information. In this sense, the combination of different data sources with an appropriate filter might improve both positioning and tracking performance. This work proposes an algorithm for hybrid positioning in Wireless Sensor Networks based on data fusion of UWB and inertial information. A constant-gain Steady State Kalman Filter is used to bound the complexity of the system, simplifying its implementation on a typical low-power WSN node. The performance of the presented data fusion algorithm has been evaluated in a realistic scenario using both simulations and realistic datasets. The obtained results prove the validity of this approach, which efficiently fuses different positioning data sources, reducing the localization error.
no_new_dataset
0.713063
1305.1372
Fan Min
Fan Min and William Zhu
Cold-start recommendation through granular association rules
Submitted to Joint Rough Sets 2013
null
null
null
cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recommender systems are popular in e-commerce as they suggest items of interest to users. Researchers have addressed the cold-start problem where either the user or the item is new. However, the situation with both new user and new item has seldom been considered. In this paper, we propose a cold-start recommendation approach to this situation based on granular association rules. Specifically, we provide a means for describing users and items through information granules, a means for generating association rules between users and items, and a means for recommending items to users using these rules. Experiments are undertaken on a publicly available dataset MovieLens. Results indicate that rule sets perform similarly on the training and the testing sets, and the appropriate setting of granule is essential to the application of granular association rules.
[ { "version": "v1", "created": "Tue, 7 May 2013 01:08:27 GMT" } ]
2013-05-08T00:00:00
[ [ "Min", "Fan", "" ], [ "Zhu", "William", "" ] ]
TITLE: Cold-start recommendation through granular association rules ABSTRACT: Recommender systems are popular in e-commerce as they suggest items of interest to users. Researchers have addressed the cold-start problem where either the user or the item is new. However, the situation with both new user and new item has seldom been considered. In this paper, we propose a cold-start recommendation approach to this situation based on granular association rules. Specifically, we provide a means for describing users and items through information granules, a means for generating association rules between users and items, and a means for recommending items to users using these rules. Experiments are undertaken on a publicly available dataset MovieLens. Results indicate that rule sets perform similarly on the training and the testing sets, and the appropriate setting of granule is essential to the application of granular association rules.
no_new_dataset
0.712795
1305.1609
Florin Rusu
Yu Cheng and Florin Rusu
Formal Representation of the SS-DB Benchmark and Experimental Evaluation in EXTASCID
32 pages, 3 figures
null
null
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Evaluating the performance of scientific data processing systems is a difficult task considering the plethora of application-specific solutions available in this landscape and the lack of a generally-accepted benchmark. The dual structure of scientific data coupled with the complex nature of processing complicate the evaluation procedure further. SS-DB is the first attempt to define a general benchmark for complex scientific processing over raw and derived data. It fails to draw sufficient attention though because of the ambiguous plain language specification and the extraordinary SciDB results. In this paper, we remedy the shortcomings of the original SS-DB specification by providing a formal representation in terms of ArrayQL algebra operators and ArrayQL/SciQL constructs. These are the first formal representations of the SS-DB benchmark. Starting from the formal representation, we give a reference implementation and present benchmark results in EXTASCID, a novel system for scientific data processing. EXTASCID is complete in providing native support both for array and relational data and extensible in executing any user code inside the system by the means of a configurable metaoperator. These features result in an order of magnitude improvement over SciDB at data loading, extracting derived data, and operations over derived data.
[ { "version": "v1", "created": "Tue, 7 May 2013 19:07:28 GMT" } ]
2013-05-08T00:00:00
[ [ "Cheng", "Yu", "" ], [ "Rusu", "Florin", "" ] ]
TITLE: Formal Representation of the SS-DB Benchmark and Experimental Evaluation in EXTASCID ABSTRACT: Evaluating the performance of scientific data processing systems is a difficult task considering the plethora of application-specific solutions available in this landscape and the lack of a generally-accepted benchmark. The dual structure of scientific data coupled with the complex nature of processing complicate the evaluation procedure further. SS-DB is the first attempt to define a general benchmark for complex scientific processing over raw and derived data. It fails to draw sufficient attention though because of the ambiguous plain language specification and the extraordinary SciDB results. In this paper, we remedy the shortcomings of the original SS-DB specification by providing a formal representation in terms of ArrayQL algebra operators and ArrayQL/SciQL constructs. These are the first formal representations of the SS-DB benchmark. Starting from the formal representation, we give a reference implementation and present benchmark results in EXTASCID, a novel system for scientific data processing. EXTASCID is complete in providing native support both for array and relational data and extensible in executing any user code inside the system by the means of a configurable metaoperator. These features result in an order of magnitude improvement over SciDB at data loading, extracting derived data, and operations over derived data.
no_new_dataset
0.70724
1210.1207
Hema Swetha Koppula
Hema Swetha Koppula, Rudhir Gupta, Ashutosh Saxena
Learning Human Activities and Object Affordances from RGB-D Videos
arXiv admin note: substantial text overlap with arXiv:1208.0967
null
null
null
cs.RO cs.AI cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Understanding human activities and object affordances are two very important skills, especially for personal robots which operate in human environments. In this work, we consider the problem of extracting a descriptive labeling of the sequence of sub-activities being performed by a human, and more importantly, of their interactions with the objects in the form of associated affordances. Given a RGB-D video, we jointly model the human activities and object affordances as a Markov random field where the nodes represent objects and sub-activities, and the edges represent the relationships between object affordances, their relations with sub-activities, and their evolution over time. We formulate the learning problem using a structural support vector machine (SSVM) approach, where labelings over various alternate temporal segmentations are considered as latent variables. We tested our method on a challenging dataset comprising 120 activity videos collected from 4 subjects, and obtained an accuracy of 79.4% for affordance, 63.4% for sub-activity and 75.0% for high-level activity labeling. We then demonstrate the use of such descriptive labeling in performing assistive tasks by a PR2 robot.
[ { "version": "v1", "created": "Thu, 4 Oct 2012 04:53:42 GMT" }, { "version": "v2", "created": "Mon, 6 May 2013 01:13:39 GMT" } ]
2013-05-07T00:00:00
[ [ "Koppula", "Hema Swetha", "" ], [ "Gupta", "Rudhir", "" ], [ "Saxena", "Ashutosh", "" ] ]
TITLE: Learning Human Activities and Object Affordances from RGB-D Videos ABSTRACT: Understanding human activities and object affordances are two very important skills, especially for personal robots which operate in human environments. In this work, we consider the problem of extracting a descriptive labeling of the sequence of sub-activities being performed by a human, and more importantly, of their interactions with the objects in the form of associated affordances. Given a RGB-D video, we jointly model the human activities and object affordances as a Markov random field where the nodes represent objects and sub-activities, and the edges represent the relationships between object affordances, their relations with sub-activities, and their evolution over time. We formulate the learning problem using a structural support vector machine (SSVM) approach, where labelings over various alternate temporal segmentations are considered as latent variables. We tested our method on a challenging dataset comprising 120 activity videos collected from 4 subjects, and obtained an accuracy of 79.4% for affordance, 63.4% for sub-activity and 75.0% for high-level activity labeling. We then demonstrate the use of such descriptive labeling in performing assistive tasks by a PR2 robot.
new_dataset
0.543348
1212.2278
Carl Vondrick
Carl Vondrick and Aditya Khosla and Tomasz Malisiewicz and Antonio Torralba
Inverting and Visualizing Features for Object Detection
This paper is a preprint of our conference paper. We have made it available early in the hopes that others find it useful
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce algorithms to visualize feature spaces used by object detectors. The tools in this paper allow a human to put on `HOG goggles' and perceive the visual world as a HOG based object detector sees it. We found that these visualizations allow us to analyze object detection systems in new ways and gain new insight into the detector's failures. For example, when we visualize the features for high scoring false alarms, we discovered that, although they are clearly wrong in image space, they do look deceptively similar to true positives in feature space. This result suggests that many of these false alarms are caused by our choice of feature space, and indicates that creating a better learning algorithm or building bigger datasets is unlikely to correct these errors. By visualizing feature spaces, we can gain a more intuitive understanding of our detection systems.
[ { "version": "v1", "created": "Tue, 11 Dec 2012 01:59:51 GMT" }, { "version": "v2", "created": "Sun, 5 May 2013 18:17:44 GMT" } ]
2013-05-07T00:00:00
[ [ "Vondrick", "Carl", "" ], [ "Khosla", "Aditya", "" ], [ "Malisiewicz", "Tomasz", "" ], [ "Torralba", "Antonio", "" ] ]
TITLE: Inverting and Visualizing Features for Object Detection ABSTRACT: We introduce algorithms to visualize feature spaces used by object detectors. The tools in this paper allow a human to put on `HOG goggles' and perceive the visual world as a HOG based object detector sees it. We found that these visualizations allow us to analyze object detection systems in new ways and gain new insight into the detector's failures. For example, when we visualize the features for high scoring false alarms, we discovered that, although they are clearly wrong in image space, they do look deceptively similar to true positives in feature space. This result suggests that many of these false alarms are caused by our choice of feature space, and indicates that creating a better learning algorithm or building bigger datasets is unlikely to correct these errors. By visualizing feature spaces, we can gain a more intuitive understanding of our detection systems.
no_new_dataset
0.712226
1305.0896
Hemal Shah Hemal Shah
Hemal Shah, Yogeshwar Kosta, Vikrant Patel
Characterizing and Evaluation :Temporal properties of real and synthetic datasets for DTN
10 pages
null
null
null
cs.NI
http://creativecommons.org/licenses/by/3.0/
Nodes movements play a significant role in disseminating messages in the sparse mobile ad-hoc network. In the network scenarios, where traditional end-to-end paths do not exist, mobility creates opportunities for nodes to connect and communicate when they are encountered. A series of encountering opportunities spread a message among many nodes and eventually deliver to the destination. Further improvements to the performance of message delivery can come from exploiting temporal mobility properties. It is modeled as time varying graph, where, moving nodes are considered as vertices and contact opportunity to other nodes as an edge. The paper discusses about characterization and design of the temporal algorithm. Then, evaluating temporal distance, diameter and centrality of real and synthetic mobility data sets.
[ { "version": "v1", "created": "Sat, 4 May 2013 08:42:47 GMT" } ]
2013-05-07T00:00:00
[ [ "Shah", "Hemal", "" ], [ "Kosta", "Yogeshwar", "" ], [ "Patel", "Vikrant", "" ] ]
TITLE: Characterizing and Evaluation :Temporal properties of real and synthetic datasets for DTN ABSTRACT: Nodes movements play a significant role in disseminating messages in the sparse mobile ad-hoc network. In the network scenarios, where traditional end-to-end paths do not exist, mobility creates opportunities for nodes to connect and communicate when they are encountered. A series of encountering opportunities spread a message among many nodes and eventually deliver to the destination. Further improvements to the performance of message delivery can come from exploiting temporal mobility properties. It is modeled as time varying graph, where, moving nodes are considered as vertices and contact opportunity to other nodes as an edge. The paper discusses about characterization and design of the temporal algorithm. Then, evaluating temporal distance, diameter and centrality of real and synthetic mobility data sets.
no_new_dataset
0.708175
1305.0922
M.M.A. Hashem
M.A. Khayer Azad, Md. Shafiqul Islam and M.M.A. Hashem
On Comparison between Evolutionary Programming Network-based Learning and Novel Evolution Strategy Algorithm-based Learning
null
Procs. of the 3rd International Conference on Electrical, Electronics and Computer Engineering (ICEECE 2003), pp. 213-218, Dhaka, Bangladesh, December 22-24, (2003)
null
null
cs.NE cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents two different evolutionary systems - Evolutionary Programming Network (EPNet) and Novel Evolutions Strategy (NES) Algorithm. EPNet does both training and architecture evolution simultaneously, whereas NES does a fixed network and only trains the network. Five mutation operators proposed in EPNet to reflect the emphasis on evolving ANNs behaviors. Close behavioral links between parents and their offspring are maintained by various mutations, such as partial training and node splitting. On the other hand, NES uses two new genetic operators - subpopulation-based max-mean arithmetical crossover and time-variant mutation. The above-mentioned two algorithms have been tested on a number of benchmark problems, such as the medical diagnosis problems (breast cancer, diabetes, and heart disease). The results and the comparison between them are also presented in this paper.
[ { "version": "v1", "created": "Sat, 4 May 2013 14:06:48 GMT" } ]
2013-05-07T00:00:00
[ [ "Azad", "M. A. Khayer", "" ], [ "Islam", "Md. Shafiqul", "" ], [ "Hashem", "M. M. A.", "" ] ]
TITLE: On Comparison between Evolutionary Programming Network-based Learning and Novel Evolution Strategy Algorithm-based Learning ABSTRACT: This paper presents two different evolutionary systems - Evolutionary Programming Network (EPNet) and Novel Evolutions Strategy (NES) Algorithm. EPNet does both training and architecture evolution simultaneously, whereas NES does a fixed network and only trains the network. Five mutation operators proposed in EPNet to reflect the emphasis on evolving ANNs behaviors. Close behavioral links between parents and their offspring are maintained by various mutations, such as partial training and node splitting. On the other hand, NES uses two new genetic operators - subpopulation-based max-mean arithmetical crossover and time-variant mutation. The above-mentioned two algorithms have been tested on a number of benchmark problems, such as the medical diagnosis problems (breast cancer, diabetes, and heart disease). The results and the comparison between them are also presented in this paper.
no_new_dataset
0.711281
1305.1002
Ji Won Yoon
Ji Won Yoon and Nial Friel
Efficient Estimation of the number of neighbours in Probabilistic K Nearest Neighbour Classification
null
null
null
null
cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Probabilistic k-nearest neighbour (PKNN) classification has been introduced to improve the performance of original k-nearest neighbour (KNN) classification algorithm by explicitly modelling uncertainty in the classification of each feature vector. However, an issue common to both KNN and PKNN is to select the optimal number of neighbours, $k$. The contribution of this paper is to incorporate the uncertainty in $k$ into the decision making, and in so doing use Bayesian model averaging to provide improved classification. Indeed the problem of assessing the uncertainty in $k$ can be viewed as one of statistical model selection which is one of the most important technical issues in the statistics and machine learning domain. In this paper, a new functional approximation algorithm is proposed to reconstruct the density of the model (order) without relying on time consuming Monte Carlo simulations. In addition, this algorithm avoids cross validation by adopting Bayesian framework. The performance of this algorithm yielded very good performance on several real experimental datasets.
[ { "version": "v1", "created": "Sun, 5 May 2013 09:44:08 GMT" } ]
2013-05-07T00:00:00
[ [ "Yoon", "Ji Won", "" ], [ "Friel", "Nial", "" ] ]
TITLE: Efficient Estimation of the number of neighbours in Probabilistic K Nearest Neighbour Classification ABSTRACT: Probabilistic k-nearest neighbour (PKNN) classification has been introduced to improve the performance of original k-nearest neighbour (KNN) classification algorithm by explicitly modelling uncertainty in the classification of each feature vector. However, an issue common to both KNN and PKNN is to select the optimal number of neighbours, $k$. The contribution of this paper is to incorporate the uncertainty in $k$ into the decision making, and in so doing use Bayesian model averaging to provide improved classification. Indeed the problem of assessing the uncertainty in $k$ can be viewed as one of statistical model selection which is one of the most important technical issues in the statistics and machine learning domain. In this paper, a new functional approximation algorithm is proposed to reconstruct the density of the model (order) without relying on time consuming Monte Carlo simulations. In addition, this algorithm avoids cross validation by adopting Bayesian framework. The performance of this algorithm yielded very good performance on several real experimental datasets.
no_new_dataset
0.710396
1305.1040
Ting-Li Chen
Ting-Li Chen
On the Convergence and Consistency of the Blurring Mean-Shift Process
arXiv admin note: text overlap with arXiv:1201.1979
null
null
null
stat.ML cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The mean-shift algorithm is a popular algorithm in computer vision and image processing. It can also be cast as a minimum gamma-divergence estimation. In this paper we focus on the "blurring" mean shift algorithm, which is one version of the mean-shift process that successively blurs the dataset. The analysis of the blurring mean-shift is relatively more complicated compared to the nonblurring version, yet the algorithm convergence and the estimation consistency have not been well studied in the literature. In this paper we prove both the convergence and the consistency of the blurring mean-shift. We also perform simulation studies to compare the efficiency of the blurring and the nonblurring versions of the mean-shift algorithms. Our results show that the blurring mean-shift has more efficiency.
[ { "version": "v1", "created": "Sun, 5 May 2013 18:51:24 GMT" } ]
2013-05-07T00:00:00
[ [ "Chen", "Ting-Li", "" ] ]
TITLE: On the Convergence and Consistency of the Blurring Mean-Shift Process ABSTRACT: The mean-shift algorithm is a popular algorithm in computer vision and image processing. It can also be cast as a minimum gamma-divergence estimation. In this paper we focus on the "blurring" mean shift algorithm, which is one version of the mean-shift process that successively blurs the dataset. The analysis of the blurring mean-shift is relatively more complicated compared to the nonblurring version, yet the algorithm convergence and the estimation consistency have not been well studied in the literature. In this paper we prove both the convergence and the consistency of the blurring mean-shift. We also perform simulation studies to compare the efficiency of the blurring and the nonblurring versions of the mean-shift algorithms. Our results show that the blurring mean-shift has more efficiency.
no_new_dataset
0.712038
1305.1169
Marc Schoenauer
Mostepha Redouane Khouadjia (INRIA Saclay - Ile de France), Marc Schoenauer (INRIA Saclay - Ile de France, LRI), Vincent Vidal (DCSD), Johann Dr\'eo (TRT), Pierre Sav\'eant (TRT)
Multi-Objective AI Planning: Comparing Aggregation and Pareto Approaches
null
EvoCOP -- 13th European Conference on Evolutionary Computation in Combinatorial Optimisation 7832 (2013) 202-213
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Most real-world Planning problems are multi-objective, trying to minimize both the makespan of the solution plan, and some cost of the actions involved in the plan. But most, if not all existing approaches are based on single-objective planners, and use an aggregation of the objectives to remain in the single-objective context. Divide and Evolve (DaE) is an evolutionary planner that won the temporal deterministic satisficing track at the last International Planning Competitions (IPC). Like all Evolutionary Algorithms (EA), it can easily be turned into a Pareto-based Multi-Objective EA. It is however important to validate the resulting algorithm by comparing it with the aggregation approach: this is the goal of this paper. The comparative experiments on a recently proposed benchmark set that are reported here demonstrate the usefulness of going Pareto-based in AI Planning.
[ { "version": "v1", "created": "Mon, 6 May 2013 12:53:25 GMT" } ]
2013-05-07T00:00:00
[ [ "Khouadjia", "Mostepha Redouane", "", "INRIA Saclay - Ile de France" ], [ "Schoenauer", "Marc", "", "INRIA Saclay - Ile de France, LRI" ], [ "Vidal", "Vincent", "", "DCSD" ], [ "Dréo", "Johann", "", "TRT" ], [ "Savéant", "Pierre", "", "TRT" ] ]
TITLE: Multi-Objective AI Planning: Comparing Aggregation and Pareto Approaches ABSTRACT: Most real-world Planning problems are multi-objective, trying to minimize both the makespan of the solution plan, and some cost of the actions involved in the plan. But most, if not all existing approaches are based on single-objective planners, and use an aggregation of the objectives to remain in the single-objective context. Divide and Evolve (DaE) is an evolutionary planner that won the temporal deterministic satisficing track at the last International Planning Competitions (IPC). Like all Evolutionary Algorithms (EA), it can easily be turned into a Pareto-based Multi-Objective EA. It is however important to validate the resulting algorithm by comparing it with the aggregation approach: this is the goal of this paper. The comparative experiments on a recently proposed benchmark set that are reported here demonstrate the usefulness of going Pareto-based in AI Planning.
no_new_dataset
0.678327
1210.0748
Yongming Luo
Yongming Luo, George H. L. Fletcher, Jan Hidders, Yuqing Wu and Paul De Bra
External memory bisimulation reduction of big graphs
17 pages
null
null
null
cs.DB cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we present, to our knowledge, the first known I/O efficient solutions for computing the k-bisimulation partition of a massive directed graph, and performing maintenance of such a partition upon updates to the underlying graph. Ubiquitous in the theory and application of graph data, bisimulation is a robust notion of node equivalence which intuitively groups together nodes in a graph which share fundamental structural features. k-bisimulation is the standard variant of bisimulation where the topological features of nodes are only considered within a local neighborhood of radius $k\geqslant 0$. The I/O cost of our partition construction algorithm is bounded by $O(k\cdot \mathit{sort}(|\et|) + k\cdot scan(|\nt|) + \mathit{sort}(|\nt|))$, while our maintenance algorithms are bounded by $O(k\cdot \mathit{sort}(|\et|) + k\cdot \mathit{sort}(|\nt|))$. The space complexity bounds are $O(|\nt|+|\et|)$ and $O(k\cdot|\nt|+k\cdot|\et|)$, resp. Here, $|\et|$ and $|\nt|$ are the number of disk pages occupied by the input graph's edge set and node set, resp., and $\mathit{sort}(n)$ and $\mathit{scan}(n)$ are the cost of sorting and scanning, resp., a file occupying $n$ pages in external memory. Empirical analysis on a variety of massive real-world and synthetic graph datasets shows that our algorithms perform efficiently in practice, scaling gracefully as graphs grow in size.
[ { "version": "v1", "created": "Tue, 2 Oct 2012 12:30:15 GMT" }, { "version": "v2", "created": "Mon, 5 Nov 2012 09:26:03 GMT" }, { "version": "v3", "created": "Thu, 2 May 2013 08:23:28 GMT" } ]
2013-05-03T00:00:00
[ [ "Luo", "Yongming", "" ], [ "Fletcher", "George H. L.", "" ], [ "Hidders", "Jan", "" ], [ "Wu", "Yuqing", "" ], [ "De Bra", "Paul", "" ] ]
TITLE: External memory bisimulation reduction of big graphs ABSTRACT: In this paper, we present, to our knowledge, the first known I/O efficient solutions for computing the k-bisimulation partition of a massive directed graph, and performing maintenance of such a partition upon updates to the underlying graph. Ubiquitous in the theory and application of graph data, bisimulation is a robust notion of node equivalence which intuitively groups together nodes in a graph which share fundamental structural features. k-bisimulation is the standard variant of bisimulation where the topological features of nodes are only considered within a local neighborhood of radius $k\geqslant 0$. The I/O cost of our partition construction algorithm is bounded by $O(k\cdot \mathit{sort}(|\et|) + k\cdot scan(|\nt|) + \mathit{sort}(|\nt|))$, while our maintenance algorithms are bounded by $O(k\cdot \mathit{sort}(|\et|) + k\cdot \mathit{sort}(|\nt|))$. The space complexity bounds are $O(|\nt|+|\et|)$ and $O(k\cdot|\nt|+k\cdot|\et|)$, resp. Here, $|\et|$ and $|\nt|$ are the number of disk pages occupied by the input graph's edge set and node set, resp., and $\mathit{sort}(n)$ and $\mathit{scan}(n)$ are the cost of sorting and scanning, resp., a file occupying $n$ pages in external memory. Empirical analysis on a variety of massive real-world and synthetic graph datasets shows that our algorithms perform efficiently in practice, scaling gracefully as graphs grow in size.
no_new_dataset
0.707007
1305.0423
Somayeh Danafar
Somayeh Danafar, Paola M.V. Rancoita, Tobias Glasmachers, Kevin Whittingstall, Juergen Schmidhuber
Testing Hypotheses by Regularized Maximum Mean Discrepancy
null
null
null
null
cs.LG cs.AI stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Do two data samples come from different distributions? Recent studies of this fundamental problem focused on embedding probability distributions into sufficiently rich characteristic Reproducing Kernel Hilbert Spaces (RKHSs), to compare distributions by the distance between their embeddings. We show that Regularized Maximum Mean Discrepancy (RMMD), our novel measure for kernel-based hypothesis testing, yields substantial improvements even when sample sizes are small, and excels at hypothesis tests involving multiple comparisons with power control. We derive asymptotic distributions under the null and alternative hypotheses, and assess power control. Outstanding results are obtained on: challenging EEG data, MNIST, the Berkley Covertype, and the Flare-Solar dataset.
[ { "version": "v1", "created": "Thu, 2 May 2013 13:03:53 GMT" } ]
2013-05-03T00:00:00
[ [ "Danafar", "Somayeh", "" ], [ "Rancoita", "Paola M. V.", "" ], [ "Glasmachers", "Tobias", "" ], [ "Whittingstall", "Kevin", "" ], [ "Schmidhuber", "Juergen", "" ] ]
TITLE: Testing Hypotheses by Regularized Maximum Mean Discrepancy ABSTRACT: Do two data samples come from different distributions? Recent studies of this fundamental problem focused on embedding probability distributions into sufficiently rich characteristic Reproducing Kernel Hilbert Spaces (RKHSs), to compare distributions by the distance between their embeddings. We show that Regularized Maximum Mean Discrepancy (RMMD), our novel measure for kernel-based hypothesis testing, yields substantial improvements even when sample sizes are small, and excels at hypothesis tests involving multiple comparisons with power control. We derive asymptotic distributions under the null and alternative hypotheses, and assess power control. Outstanding results are obtained on: challenging EEG data, MNIST, the Berkley Covertype, and the Flare-Solar dataset.
no_new_dataset
0.710622
1305.0471
Chantal Cherifi
Chantal Cherifi, Jean-Fran\c{c}ois Santucci
Community Structure in Interaction Web Service Networks
null
null
null
null
cs.SI cs.NI physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Many real-world complex systems such as social, biological, information as well as technological systems results of a decentralized and unplanned evolution which leads to a common structuration. Irrespective of their origin, these so-called complex networks typically exhibit small-world and scale-free properties. Another common feature is their organisation into communities. In this paper, we introduce models of interaction networks based on the composition process of syntactic and semantic Web services. An extensive experimental study conducted on a benchmark of real Web services shows that these networks possess the typical properties of complex networks (small-world, scale-free). Unlike most social networks, they are not transitive. Using a representative sample of community detection algorithms, a community structuration is revealed. The comparative evaluation of the discovered community structures shows that they are very similar in terms of content. Furthermore, the analysis performed on the community structures and on the communities themselves, leads us to conclude that their topological properties are consistent.
[ { "version": "v1", "created": "Thu, 2 May 2013 15:09:42 GMT" } ]
2013-05-03T00:00:00
[ [ "Cherifi", "Chantal", "" ], [ "Santucci", "Jean-François", "" ] ]
TITLE: Community Structure in Interaction Web Service Networks ABSTRACT: Many real-world complex systems such as social, biological, information as well as technological systems results of a decentralized and unplanned evolution which leads to a common structuration. Irrespective of their origin, these so-called complex networks typically exhibit small-world and scale-free properties. Another common feature is their organisation into communities. In this paper, we introduce models of interaction networks based on the composition process of syntactic and semantic Web services. An extensive experimental study conducted on a benchmark of real Web services shows that these networks possess the typical properties of complex networks (small-world, scale-free). Unlike most social networks, they are not transitive. Using a representative sample of community detection algorithms, a community structuration is revealed. The comparative evaluation of the discovered community structures shows that they are very similar in terms of content. Furthermore, the analysis performed on the community structures and on the communities themselves, leads us to conclude that their topological properties are consistent.
no_new_dataset
0.711588
1305.0483
Mayank Gupta MR
A V Choudhari, N A Pande and M R Gupta
Feasibility Analysis of Low Cost Graphical Processing Units for Electromagnetic Field Simulations by Finite Difference Time Domain Method
null
null
10.5120/11739-7396
null
cs.DC physics.comp-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Among several techniques available for solving Computational Electromagnetics (CEM) problems, the Finite Difference Time Domain (FDTD) method is one of the best suited approaches when a parallelized hardware platform is used. In this paper we investigate the feasibility of implementing the FDTD method using the NVIDIA GT 520, a low cost Graphical Processing Unit (GPU), for solving the differential form of Maxwell's equation in time domain. Initially a generalized benchmarking problem of bandwidth test and another benchmarking problem of 'matrix left division is discussed for understanding the correlation between the problem size and the performance on the CPU and the GPU respectively. This is further followed by the discussion of the FDTD method, again implemented on both, the CPU and the GT520 GPU. For both of the above comparisons, the CPU used is Intel E5300, a low cost dual core CPU.
[ { "version": "v1", "created": "Thu, 2 May 2013 15:37:36 GMT" } ]
2013-05-03T00:00:00
[ [ "Choudhari", "A V", "" ], [ "Pande", "N A", "" ], [ "Gupta", "M R", "" ] ]
TITLE: Feasibility Analysis of Low Cost Graphical Processing Units for Electromagnetic Field Simulations by Finite Difference Time Domain Method ABSTRACT: Among several techniques available for solving Computational Electromagnetics (CEM) problems, the Finite Difference Time Domain (FDTD) method is one of the best suited approaches when a parallelized hardware platform is used. In this paper we investigate the feasibility of implementing the FDTD method using the NVIDIA GT 520, a low cost Graphical Processing Unit (GPU), for solving the differential form of Maxwell's equation in time domain. Initially a generalized benchmarking problem of bandwidth test and another benchmarking problem of 'matrix left division is discussed for understanding the correlation between the problem size and the performance on the CPU and the GPU respectively. This is further followed by the discussion of the FDTD method, again implemented on both, the CPU and the GT520 GPU. For both of the above comparisons, the CPU used is Intel E5300, a low cost dual core CPU.
no_new_dataset
0.711825
1305.0513
Ruoming Jin
Ruoming Jin, Yelong Shen, Lin Liu and Xue-wen Chen
Limiting the Neighborhood: De-Small-World Network for Outbreak Prevention
9 pages
null
null
null
cs.SI physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this work, we study a basic and practically important strategy to help prevent and/or delay an outbreak in the context of network: limiting the contact between individuals. In this paper, we introduce the average neighborhood size as a new measure for the degree of being small-world and utilize it to formally define the desmall- world network problem. We also prove the NP-hardness of the general reachable pair cut problem and propose a greedy edge betweenness based approach as the benchmark in selecting the candidate edges for solving our problem. Furthermore, we transform the de-small-world network problem as an OR-AND Boolean function maximization problem, which is also an NP-hardness problem. In addition, we develop a numerical relaxation approach to solve the Boolean function maximization and the de-small-world problem. Also, we introduce the short-betweenness, which measures the edge importance in terms of all short paths with distance no greater than a certain threshold, and utilize it to speed up our numerical relaxation approach. The experimental evaluation demonstrates the effectiveness and efficiency of our approaches.
[ { "version": "v1", "created": "Thu, 2 May 2013 17:03:58 GMT" } ]
2013-05-03T00:00:00
[ [ "Jin", "Ruoming", "" ], [ "Shen", "Yelong", "" ], [ "Liu", "Lin", "" ], [ "Chen", "Xue-wen", "" ] ]
TITLE: Limiting the Neighborhood: De-Small-World Network for Outbreak Prevention ABSTRACT: In this work, we study a basic and practically important strategy to help prevent and/or delay an outbreak in the context of network: limiting the contact between individuals. In this paper, we introduce the average neighborhood size as a new measure for the degree of being small-world and utilize it to formally define the desmall- world network problem. We also prove the NP-hardness of the general reachable pair cut problem and propose a greedy edge betweenness based approach as the benchmark in selecting the candidate edges for solving our problem. Furthermore, we transform the de-small-world network problem as an OR-AND Boolean function maximization problem, which is also an NP-hardness problem. In addition, we develop a numerical relaxation approach to solve the Boolean function maximization and the de-small-world problem. Also, we introduce the short-betweenness, which measures the edge importance in terms of all short paths with distance no greater than a certain threshold, and utilize it to speed up our numerical relaxation approach. The experimental evaluation demonstrates the effectiveness and efficiency of our approaches.
no_new_dataset
0.710998
1301.3641
Ryan Kiros
Ryan Kiros
Training Neural Networks with Stochastic Hessian-Free Optimization
11 pages, ICLR 2013
null
null
null
cs.LG cs.NE stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Hessian-free (HF) optimization has been successfully used for training deep autoencoders and recurrent networks. HF uses the conjugate gradient algorithm to construct update directions through curvature-vector products that can be computed on the same order of time as gradients. In this paper we exploit this property and study stochastic HF with gradient and curvature mini-batches independent of the dataset size. We modify Martens' HF for these settings and integrate dropout, a method for preventing co-adaptation of feature detectors, to guard against overfitting. Stochastic Hessian-free optimization gives an intermediary between SGD and HF that achieves competitive performance on both classification and deep autoencoder experiments.
[ { "version": "v1", "created": "Wed, 16 Jan 2013 10:10:23 GMT" }, { "version": "v2", "created": "Mon, 18 Mar 2013 05:51:37 GMT" }, { "version": "v3", "created": "Wed, 1 May 2013 06:57:50 GMT" } ]
2013-05-02T00:00:00
[ [ "Kiros", "Ryan", "" ] ]
TITLE: Training Neural Networks with Stochastic Hessian-Free Optimization ABSTRACT: Hessian-free (HF) optimization has been successfully used for training deep autoencoders and recurrent networks. HF uses the conjugate gradient algorithm to construct update directions through curvature-vector products that can be computed on the same order of time as gradients. In this paper we exploit this property and study stochastic HF with gradient and curvature mini-batches independent of the dataset size. We modify Martens' HF for these settings and integrate dropout, a method for preventing co-adaptation of feature detectors, to guard against overfitting. Stochastic Hessian-free optimization gives an intermediary between SGD and HF that achieves competitive performance on both classification and deep autoencoder experiments.
no_new_dataset
0.710189
1304.2272
Elmar Peise
Elmar Peise (1), Diego Fabregat (1), Yurii Aulchenko (2), Paolo Bientinesi (1) ((1) AICES, RWTH Aachen, (2) Institute of Cytology and Genetics, Novosibirsk)
Algorithms for Large-scale Whole Genome Association Analysis
null
null
null
AICES-2013/04-2
cs.CE cs.MS q-bio.GN
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In order to associate complex traits with genetic polymorphisms, genome-wide association studies process huge datasets involving tens of thousands of individuals genotyped for millions of polymorphisms. When handling these datasets, which exceed the main memory of contemporary computers, one faces two distinct challenges: 1) Millions of polymorphisms come at the cost of hundreds of Gigabytes of genotype data, which can only be kept in secondary storage; 2) the relatedness of the test population is represented by a covariance matrix, which, for large populations, can only fit in the combined main memory of a distributed architecture. In this paper, we present solutions for both challenges: The genotype data is streamed from and to secondary storage using a double buffering technique, while the covariance matrix is kept across the main memory of a distributed memory system. We show that these methods sustain high-performance and allow the analysis of enormous dataset
[ { "version": "v1", "created": "Mon, 8 Apr 2013 17:13:39 GMT" } ]
2013-05-02T00:00:00
[ [ "Peise", "Elmar", "" ], [ "Fabregat", "Diego", "" ], [ "Aulchenko", "Yurii", "" ], [ "Bientinesi", "Paolo", "" ] ]
TITLE: Algorithms for Large-scale Whole Genome Association Analysis ABSTRACT: In order to associate complex traits with genetic polymorphisms, genome-wide association studies process huge datasets involving tens of thousands of individuals genotyped for millions of polymorphisms. When handling these datasets, which exceed the main memory of contemporary computers, one faces two distinct challenges: 1) Millions of polymorphisms come at the cost of hundreds of Gigabytes of genotype data, which can only be kept in secondary storage; 2) the relatedness of the test population is represented by a covariance matrix, which, for large populations, can only fit in the combined main memory of a distributed architecture. In this paper, we present solutions for both challenges: The genotype data is streamed from and to secondary storage using a double buffering technique, while the covariance matrix is kept across the main memory of a distributed memory system. We show that these methods sustain high-performance and allow the analysis of enormous dataset
no_new_dataset
0.708635
1304.3596
Sandrine Blazy
Sandrine Blazy (INRIA - IRISA), Vincent Laporte (INRIA - IRISA), Andr\'e Maroneze (INRIA - IRISA), David Pichardie (INRIA - IRISA)
Formal Verification of a C Value Analysis Based on Abstract Interpretation
null
SAS - 20th Static Analysis Symposium Lecture Notes in Computer Science (2013) 324-344
null
null
cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Static analyzers based on abstract interpretation are complex pieces of software implementing delicate algorithms. Even if static analysis techniques are well understood, their implementation on real languages is still error-prone. This paper presents a formal verification using the Coq proof assistant: a formalization of a value analysis (based on abstract interpretation), and a soundness proof of the value analysis. The formalization relies on generic interfaces. The mechanized proof is facilitated by a translation validation of a Bourdoncle fixpoint iterator. The work has been integrated into the CompCert verified C-compiler. Our verified analysis directly operates over an intermediate language of the compiler having the same expressiveness as C. The automatic extraction of our value analysis into OCaml yields a program with competitive results, obtained from experiments on a number of benchmarks and comparisons with the Frama-C tool.
[ { "version": "v1", "created": "Fri, 12 Apr 2013 10:32:40 GMT" } ]
2013-05-02T00:00:00
[ [ "Blazy", "Sandrine", "", "INRIA - IRISA" ], [ "Laporte", "Vincent", "", "INRIA - IRISA" ], [ "Maroneze", "André", "", "INRIA - IRISA" ], [ "Pichardie", "David", "", "INRIA - IRISA" ] ]
TITLE: Formal Verification of a C Value Analysis Based on Abstract Interpretation ABSTRACT: Static analyzers based on abstract interpretation are complex pieces of software implementing delicate algorithms. Even if static analysis techniques are well understood, their implementation on real languages is still error-prone. This paper presents a formal verification using the Coq proof assistant: a formalization of a value analysis (based on abstract interpretation), and a soundness proof of the value analysis. The formalization relies on generic interfaces. The mechanized proof is facilitated by a translation validation of a Bourdoncle fixpoint iterator. The work has been integrated into the CompCert verified C-compiler. Our verified analysis directly operates over an intermediate language of the compiler having the same expressiveness as C. The automatic extraction of our value analysis into OCaml yields a program with competitive results, obtained from experiments on a number of benchmarks and comparisons with the Frama-C tool.
no_new_dataset
0.705379
1305.0015
Balaji Lakshminarayanan
Balaji Lakshminarayanan and Yee Whye Teh
Inferring ground truth from multi-annotator ordinal data: a probabilistic approach
null
null
null
null
stat.ML cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A popular approach for large scale data annotation tasks is crowdsourcing, wherein each data point is labeled by multiple noisy annotators. We consider the problem of inferring ground truth from noisy ordinal labels obtained from multiple annotators of varying and unknown expertise levels. Annotation models for ordinal data have been proposed mostly as extensions of their binary/categorical counterparts and have received little attention in the crowdsourcing literature. We propose a new model for crowdsourced ordinal data that accounts for instance difficulty as well as annotator expertise, and derive a variational Bayesian inference algorithm for parameter estimation. We analyze the ordinal extensions of several state-of-the-art annotator models for binary/categorical labels and evaluate the performance of all the models on two real world datasets containing ordinal query-URL relevance scores, collected through Amazon's Mechanical Turk. Our results indicate that the proposed model performs better or as well as existing state-of-the-art methods and is more resistant to `spammy' annotators (i.e., annotators who assign labels randomly without actually looking at the instance) than popular baselines such as mean, median, and majority vote which do not account for annotator expertise.
[ { "version": "v1", "created": "Tue, 30 Apr 2013 20:12:01 GMT" } ]
2013-05-02T00:00:00
[ [ "Lakshminarayanan", "Balaji", "" ], [ "Teh", "Yee Whye", "" ] ]
TITLE: Inferring ground truth from multi-annotator ordinal data: a probabilistic approach ABSTRACT: A popular approach for large scale data annotation tasks is crowdsourcing, wherein each data point is labeled by multiple noisy annotators. We consider the problem of inferring ground truth from noisy ordinal labels obtained from multiple annotators of varying and unknown expertise levels. Annotation models for ordinal data have been proposed mostly as extensions of their binary/categorical counterparts and have received little attention in the crowdsourcing literature. We propose a new model for crowdsourced ordinal data that accounts for instance difficulty as well as annotator expertise, and derive a variational Bayesian inference algorithm for parameter estimation. We analyze the ordinal extensions of several state-of-the-art annotator models for binary/categorical labels and evaluate the performance of all the models on two real world datasets containing ordinal query-URL relevance scores, collected through Amazon's Mechanical Turk. Our results indicate that the proposed model performs better or as well as existing state-of-the-art methods and is more resistant to `spammy' annotators (i.e., annotators who assign labels randomly without actually looking at the instance) than popular baselines such as mean, median, and majority vote which do not account for annotator expertise.
no_new_dataset
0.712245
1305.0103
Marthinus Christoffel du Plessis Marthinus Christoffel du Plessi
Marthinus Christoffel du Plessis and Masashi Sugiyama
Clustering Unclustered Data: Unsupervised Binary Labeling of Two Datasets Having Different Class Balances
null
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the unsupervised learning problem of assigning labels to unlabeled data. A naive approach is to use clustering methods, but this works well only when data is properly clustered and each cluster corresponds to an underlying class. In this paper, we first show that this unsupervised labeling problem in balanced binary cases can be solved if two unlabeled datasets having different class balances are available. More specifically, estimation of the sign of the difference between probability densities of two unlabeled datasets gives the solution. We then introduce a new method to directly estimate the sign of the density difference without density estimation. Finally, we demonstrate the usefulness of the proposed method against several clustering methods on various toy problems and real-world datasets.
[ { "version": "v1", "created": "Wed, 1 May 2013 06:32:12 GMT" } ]
2013-05-02T00:00:00
[ [ "Plessis", "Marthinus Christoffel du", "" ], [ "Sugiyama", "Masashi", "" ] ]
TITLE: Clustering Unclustered Data: Unsupervised Binary Labeling of Two Datasets Having Different Class Balances ABSTRACT: We consider the unsupervised learning problem of assigning labels to unlabeled data. A naive approach is to use clustering methods, but this works well only when data is properly clustered and each cluster corresponds to an underlying class. In this paper, we first show that this unsupervised labeling problem in balanced binary cases can be solved if two unlabeled datasets having different class balances are available. More specifically, estimation of the sign of the difference between probability densities of two unlabeled datasets gives the solution. We then introduce a new method to directly estimate the sign of the density difference without density estimation. Finally, we demonstrate the usefulness of the proposed method against several clustering methods on various toy problems and real-world datasets.
no_new_dataset
0.710666
1305.0159
Anthony J Cox
Lilian Janin and Giovanna Rosone and Anthony J. Cox
Adaptive reference-free compression of sequence quality scores
Accepted paper for HiTSeq 2013, to appear in Bioinformatics. Bioinformatics should be considered the original place of publication of this work, please cite accordingly
null
null
null
q-bio.GN cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Motivation: Rapid technological progress in DNA sequencing has stimulated interest in compressing the vast datasets that are now routinely produced. Relatively little attention has been paid to compressing the quality scores that are assigned to each sequence, even though these scores may be harder to compress than the sequences themselves. By aggregating a set of reads into a compressed index, we find that the majority of bases can be predicted from the sequence of bases that are adjacent to them and hence are likely to be less informative for variant calling or other applications. The quality scores for such bases are aggressively compressed, leaving a relatively small number at full resolution. Since our approach relies directly on redundancy present in the reads, it does not need a reference sequence and is therefore applicable to data from metagenomics and de novo experiments as well as to resequencing data. Results: We show that a conservative smoothing strategy affecting 75% of the quality scores above Q2 leads to an overall quality score compression of 1 bit per value with a negligible effect on variant calling. A compression of 0.68 bit per quality value is achieved using a more aggressive smoothing strategy, again with a very small effect on variant calling. Availability: Code to construct the BWT and LCP-array on large genomic data sets is part of the BEETL library, available as a github respository at http://git@github.com:BEETL/BEETL.git .
[ { "version": "v1", "created": "Wed, 1 May 2013 12:51:10 GMT" } ]
2013-05-02T00:00:00
[ [ "Janin", "Lilian", "" ], [ "Rosone", "Giovanna", "" ], [ "Cox", "Anthony J.", "" ] ]
TITLE: Adaptive reference-free compression of sequence quality scores ABSTRACT: Motivation: Rapid technological progress in DNA sequencing has stimulated interest in compressing the vast datasets that are now routinely produced. Relatively little attention has been paid to compressing the quality scores that are assigned to each sequence, even though these scores may be harder to compress than the sequences themselves. By aggregating a set of reads into a compressed index, we find that the majority of bases can be predicted from the sequence of bases that are adjacent to them and hence are likely to be less informative for variant calling or other applications. The quality scores for such bases are aggressively compressed, leaving a relatively small number at full resolution. Since our approach relies directly on redundancy present in the reads, it does not need a reference sequence and is therefore applicable to data from metagenomics and de novo experiments as well as to resequencing data. Results: We show that a conservative smoothing strategy affecting 75% of the quality scores above Q2 leads to an overall quality score compression of 1 bit per value with a negligible effect on variant calling. A compression of 0.68 bit per quality value is achieved using a more aggressive smoothing strategy, again with a very small effect on variant calling. Availability: Code to construct the BWT and LCP-array on large genomic data sets is part of the BEETL library, available as a github respository at http://git@github.com:BEETL/BEETL.git .
no_new_dataset
0.707443
1305.0160
Anthony J Cox
Markus J. Bauer and Anthony J. Cox and Giovanna Rosone and Marinella Sciortino
Lightweight LCP Construction for Next-Generation Sequencing Datasets
Springer LNCS (Lecture Notes in Computer Science) should be considered as the original place of publication, please cite accordingly. The final version of this manuscript is available at http://link.springer.com/chapter/10.1007/978-3-642-33122-0_26
Lecture Notes in Computer Science Volume 7534, 2012, pp 326-337
10.1007/978-3-642-33122-0_26
null
cs.DS q-bio.GN
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The advent of "next-generation" DNA sequencing (NGS) technologies has meant that collections of hundreds of millions of DNA sequences are now commonplace in bioinformatics. Knowing the longest common prefix array (LCP) of such a collection would facilitate the rapid computation of maximal exact matches, shortest unique substrings and shortest absent words. CPU-efficient algorithms for computing the LCP of a string have been described in the literature, but require the presence in RAM of large data structures. This prevents such methods from being feasible for NGS datasets. In this paper we propose the first lightweight method that simultaneously computes, via sequential scans, the LCP and BWT of very large collections of sequences. Computational results on collections as large as 800 million 100-mers demonstrate that our algorithm scales to the vast sequence collections encountered in human whole genome sequencing experiments.
[ { "version": "v1", "created": "Wed, 1 May 2013 12:51:45 GMT" } ]
2013-05-02T00:00:00
[ [ "Bauer", "Markus J.", "" ], [ "Cox", "Anthony J.", "" ], [ "Rosone", "Giovanna", "" ], [ "Sciortino", "Marinella", "" ] ]
TITLE: Lightweight LCP Construction for Next-Generation Sequencing Datasets ABSTRACT: The advent of "next-generation" DNA sequencing (NGS) technologies has meant that collections of hundreds of millions of DNA sequences are now commonplace in bioinformatics. Knowing the longest common prefix array (LCP) of such a collection would facilitate the rapid computation of maximal exact matches, shortest unique substrings and shortest absent words. CPU-efficient algorithms for computing the LCP of a string have been described in the literature, but require the presence in RAM of large data structures. This prevents such methods from being feasible for NGS datasets. In this paper we propose the first lightweight method that simultaneously computes, via sequential scans, the LCP and BWT of very large collections of sequences. Computational results on collections as large as 800 million 100-mers demonstrate that our algorithm scales to the vast sequence collections encountered in human whole genome sequencing experiments.
no_new_dataset
0.709057
1305.0195
Chantal Cherifi
Chantal Cherifi
Similartity Network For Semantic Web Services Substitution
null
null
null
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Web services substitution is one of the most challenging tasks for automating the composition process of multiple Web services. It aims to improve performances and to deal efficiently with Web services failures. Many existing solutions have approached the problem through classification of substitutable Web services. To go a step further, we propose in this paper a network based approach where nodes are Web services operations and links join similar operations. Four similarity measures based on the comparison of input and output parameters values of Web services operations are presented. A comparative evaluation of the topological structure of the corresponding networks is performed on a benchmark of semantically annotated Web services. Results show that this approach allows a more detailed analysis of substitutable Web services.
[ { "version": "v1", "created": "Wed, 1 May 2013 15:13:55 GMT" } ]
2013-05-02T00:00:00
[ [ "Cherifi", "Chantal", "" ] ]
TITLE: Similartity Network For Semantic Web Services Substitution ABSTRACT: Web services substitution is one of the most challenging tasks for automating the composition process of multiple Web services. It aims to improve performances and to deal efficiently with Web services failures. Many existing solutions have approached the problem through classification of substitutable Web services. To go a step further, we propose in this paper a network based approach where nodes are Web services operations and links join similar operations. Four similarity measures based on the comparison of input and output parameters values of Web services operations are presented. A comparative evaluation of the topological structure of the corresponding networks is performed on a benchmark of semantically annotated Web services. Results show that this approach allows a more detailed analysis of substitutable Web services.
no_new_dataset
0.709604
1211.2863
Alon Schclar
Alon Schclar
Multi-Sensor Fusion via Reduction of Dimensionality
PhD Thesis, Tel Aviv Univ, 2008
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Large high-dimensional datasets are becoming more and more popular in an increasing number of research areas. Processing the high dimensional data incurs a high computational cost and is inherently inefficient since many of the values that describe a data object are redundant due to noise and inner correlations. Consequently, the dimensionality, i.e. the number of values that are used to describe a data object, needs to be reduced prior to any other processing of the data. The dimensionality reduction removes, in most cases, noise from the data and reduces substantially the computational cost of algorithms that are applied to the data. In this thesis, a novel coherent integrated methodology is introduced (theory, algorithm and applications) to reduce the dimensionality of high-dimensional datasets. The method constructs a diffusion process among the data coordinates via a random walk. The dimensionality reduction is obtained based on the eigen-decomposition of the Markov matrix that is associated with the random walk. The proposed method is utilized for: (a) segmentation and detection of anomalies in hyper-spectral images; (b) segmentation of multi-contrast MRI images; and (c) segmentation of video sequences. We also present algorithms for: (a) the characterization of materials using their spectral signatures to enable their identification; (b) detection of vehicles according to their acoustic signatures; and (c) classification of vascular vessels recordings to detect hyper-tension and cardio-vascular diseases. The proposed methodology and algorithms produce excellent results that successfully compete with current state-of-the-art algorithms.
[ { "version": "v1", "created": "Tue, 13 Nov 2012 01:05:42 GMT" } ]
2013-05-01T00:00:00
[ [ "Schclar", "Alon", "" ] ]
TITLE: Multi-Sensor Fusion via Reduction of Dimensionality ABSTRACT: Large high-dimensional datasets are becoming more and more popular in an increasing number of research areas. Processing the high dimensional data incurs a high computational cost and is inherently inefficient since many of the values that describe a data object are redundant due to noise and inner correlations. Consequently, the dimensionality, i.e. the number of values that are used to describe a data object, needs to be reduced prior to any other processing of the data. The dimensionality reduction removes, in most cases, noise from the data and reduces substantially the computational cost of algorithms that are applied to the data. In this thesis, a novel coherent integrated methodology is introduced (theory, algorithm and applications) to reduce the dimensionality of high-dimensional datasets. The method constructs a diffusion process among the data coordinates via a random walk. The dimensionality reduction is obtained based on the eigen-decomposition of the Markov matrix that is associated with the random walk. The proposed method is utilized for: (a) segmentation and detection of anomalies in hyper-spectral images; (b) segmentation of multi-contrast MRI images; and (c) segmentation of video sequences. We also present algorithms for: (a) the characterization of materials using their spectral signatures to enable their identification; (b) detection of vehicles according to their acoustic signatures; and (c) classification of vascular vessels recordings to detect hyper-tension and cardio-vascular diseases. The proposed methodology and algorithms produce excellent results that successfully compete with current state-of-the-art algorithms.
no_new_dataset
0.7118
1304.4379
Jan Noessner
Jan Noessner, Mathias Niepert, Heiner Stuckenschmidt
RockIt: Exploiting Parallelism and Symmetry for MAP Inference in Statistical Relational Models
To appear in proceedings of AAAI 2013
null
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
RockIt is a maximum a-posteriori (MAP) query engine for statistical relational models. MAP inference in graphical models is an optimization problem which can be compiled to integer linear programs (ILPs). We describe several advances in translating MAP queries to ILP instances and present the novel meta-algorithm cutting plane aggregation (CPA). CPA exploits local context-specific symmetries and bundles up sets of linear constraints. The resulting counting constraints lead to more compact ILPs and make the symmetry of the ground model more explicit to state-of-the-art ILP solvers. Moreover, RockIt parallelizes most parts of the MAP inference pipeline taking advantage of ubiquitous shared-memory multi-core architectures. We report on extensive experiments with Markov logic network (MLN) benchmarks showing that RockIt outperforms the state-of-the-art systems Alchemy, Markov TheBeast, and Tuffy both in terms of efficiency and quality of results.
[ { "version": "v1", "created": "Tue, 16 Apr 2013 09:29:58 GMT" }, { "version": "v2", "created": "Tue, 30 Apr 2013 10:19:58 GMT" } ]
2013-05-01T00:00:00
[ [ "Noessner", "Jan", "" ], [ "Niepert", "Mathias", "" ], [ "Stuckenschmidt", "Heiner", "" ] ]
TITLE: RockIt: Exploiting Parallelism and Symmetry for MAP Inference in Statistical Relational Models ABSTRACT: RockIt is a maximum a-posteriori (MAP) query engine for statistical relational models. MAP inference in graphical models is an optimization problem which can be compiled to integer linear programs (ILPs). We describe several advances in translating MAP queries to ILP instances and present the novel meta-algorithm cutting plane aggregation (CPA). CPA exploits local context-specific symmetries and bundles up sets of linear constraints. The resulting counting constraints lead to more compact ILPs and make the symmetry of the ground model more explicit to state-of-the-art ILP solvers. Moreover, RockIt parallelizes most parts of the MAP inference pipeline taking advantage of ubiquitous shared-memory multi-core architectures. We report on extensive experiments with Markov logic network (MLN) benchmarks showing that RockIt outperforms the state-of-the-art systems Alchemy, Markov TheBeast, and Tuffy both in terms of efficiency and quality of results.
no_new_dataset
0.707209
0905.4614
Alexander Artikis
A. Artikis, M. Sergot and G. Paliouras
A Logic Programming Approach to Activity Recognition
The original publication is available in the Proceedings of the 2nd ACM international workshop on Events in multimedia, 2010
null
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We have been developing a system for recognising human activity given a symbolic representation of video content. The input of our system is a set of time-stamped short-term activities detected on video frames. The output of our system is a set of recognised long-term activities, which are pre-defined temporal combinations of short-term activities. The constraints on the short-term activities that, if satisfied, lead to the recognition of a long-term activity, are expressed using a dialect of the Event Calculus. We illustrate the expressiveness of the dialect by showing the representation of several typical complex activities. Furthermore, we present a detailed evaluation of the system through experimentation on a benchmark dataset of surveillance videos.
[ { "version": "v1", "created": "Thu, 28 May 2009 11:44:04 GMT" }, { "version": "v2", "created": "Mon, 29 Apr 2013 17:06:25 GMT" } ]
2013-04-30T00:00:00
[ [ "Artikis", "A.", "" ], [ "Sergot", "M.", "" ], [ "Paliouras", "G.", "" ] ]
TITLE: A Logic Programming Approach to Activity Recognition ABSTRACT: We have been developing a system for recognising human activity given a symbolic representation of video content. The input of our system is a set of time-stamped short-term activities detected on video frames. The output of our system is a set of recognised long-term activities, which are pre-defined temporal combinations of short-term activities. The constraints on the short-term activities that, if satisfied, lead to the recognition of a long-term activity, are expressed using a dialect of the Event Calculus. We illustrate the expressiveness of the dialect by showing the representation of several typical complex activities. Furthermore, we present a detailed evaluation of the system through experimentation on a benchmark dataset of surveillance videos.
no_new_dataset
0.679405
1304.5197
Daniele Cono D'Elia
Daniele Cono D'Elia, Camil Demetrescu, Irene Finocchi
Ball-Larus Path Profiling Across Multiple Loop iterations
13 pages, 14 figures
null
null
null
cs.PL cs.PF
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Identifying the hottest paths in the control flow graph of a routine can direct optimizations to portions of the code where most resources are consumed. This powerful methodology, called path profiling, was introduced by Ball and Larus in the mid 90s and has received considerable attention in the last 15 years for its practical relevance. A shortcoming of Ball-Larus path profiling was the inability to profile cyclic paths, making it difficult to mine interesting execution patterns that span multiple loop iterations. Previous results, based on rather complex algorithms, have attempted to circumvent this limitation at the price of significant performance losses already for a small number of iterations. In this paper, we present a new approach to multiple iterations path profiling, based on data structures built on top of the original Ball-Larus numbering technique. Our approach allows it to profile all executed paths obtained as a concatenation of up to k Ball-Larus acyclic paths, where k is a user-defined parameter. An extensive experimental investigation on a large variety of Java benchmarks on the Jikes RVM shows that, surprisingly, our approach can be even faster than Ball-Larus due to fewer operations on smaller hash tables, producing compact representations of cyclic paths even for large values of k.
[ { "version": "v1", "created": "Thu, 18 Apr 2013 17:34:38 GMT" } ]
2013-04-30T00:00:00
[ [ "D'Elia", "Daniele Cono", "" ], [ "Demetrescu", "Camil", "" ], [ "Finocchi", "Irene", "" ] ]
TITLE: Ball-Larus Path Profiling Across Multiple Loop iterations ABSTRACT: Identifying the hottest paths in the control flow graph of a routine can direct optimizations to portions of the code where most resources are consumed. This powerful methodology, called path profiling, was introduced by Ball and Larus in the mid 90s and has received considerable attention in the last 15 years for its practical relevance. A shortcoming of Ball-Larus path profiling was the inability to profile cyclic paths, making it difficult to mine interesting execution patterns that span multiple loop iterations. Previous results, based on rather complex algorithms, have attempted to circumvent this limitation at the price of significant performance losses already for a small number of iterations. In this paper, we present a new approach to multiple iterations path profiling, based on data structures built on top of the original Ball-Larus numbering technique. Our approach allows it to profile all executed paths obtained as a concatenation of up to k Ball-Larus acyclic paths, where k is a user-defined parameter. An extensive experimental investigation on a large variety of Java benchmarks on the Jikes RVM shows that, surprisingly, our approach can be even faster than Ball-Larus due to fewer operations on smaller hash tables, producing compact representations of cyclic paths even for large values of k.
no_new_dataset
0.708811
1304.7632
Rastislav \v{S}r\'amek
Barbara Geissmann and Rastislav \v{S}r\'amek
Counting small cuts in a graph
null
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study the minimum cut problem in the presence of uncertainty and show how to apply a novel robust optimization approach, which aims to exploit the similarity in subsequent graph measurements or similar graph instances, without posing any assumptions on the way they have been obtained. With experiments we show that the approach works well when compared to other approaches that are also oblivious towards the relationship between the input datasets.
[ { "version": "v1", "created": "Mon, 29 Apr 2013 12:08:32 GMT" } ]
2013-04-30T00:00:00
[ [ "Geissmann", "Barbara", "" ], [ "Šrámek", "Rastislav", "" ] ]
TITLE: Counting small cuts in a graph ABSTRACT: We study the minimum cut problem in the presence of uncertainty and show how to apply a novel robust optimization approach, which aims to exploit the similarity in subsequent graph measurements or similar graph instances, without posing any assumptions on the way they have been obtained. With experiments we show that the approach works well when compared to other approaches that are also oblivious towards the relationship between the input datasets.
no_new_dataset
0.710666
1304.6933
Manuel Keglevic
Manuel Keglevic and Robert Sablatnig
Digit Recognition in Handwritten Weather Records
Part of the OAGM/AAPR 2013 proceedings (arXiv:1304.1876), 8 pages
null
null
OAGM-AAPR/2013/07
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper addresses the automatic recognition of handwritten temperature values in weather records. The localization of table cells is based on line detection using projection profiles. Further, a stroke-preserving line removal method which is based on gradient images is proposed. The presented digit recognition utilizes features which are extracted using a set of filters and a Support Vector Machine classifier. It was evaluated on the MNIST and the USPS dataset and our own database with about 17,000 RGB digit images. An accuracy of 99.36% per digit is achieved for the entire system using a set of 84 weather records.
[ { "version": "v1", "created": "Thu, 25 Apr 2013 15:14:42 GMT" }, { "version": "v2", "created": "Fri, 26 Apr 2013 08:35:18 GMT" } ]
2013-04-29T00:00:00
[ [ "Keglevic", "Manuel", "" ], [ "Sablatnig", "Robert", "" ] ]
TITLE: Digit Recognition in Handwritten Weather Records ABSTRACT: This paper addresses the automatic recognition of handwritten temperature values in weather records. The localization of table cells is based on line detection using projection profiles. Further, a stroke-preserving line removal method which is based on gradient images is proposed. The presented digit recognition utilizes features which are extracted using a set of filters and a Support Vector Machine classifier. It was evaluated on the MNIST and the USPS dataset and our own database with about 17,000 RGB digit images. An accuracy of 99.36% per digit is achieved for the entire system using a set of 84 weather records.
no_new_dataset
0.692395
1304.7048
Renato Paes Leme
Shahar Dobzinski and Renato Paes Leme
Efficiency Guarantees in Auctions with Budgets
null
null
null
null
cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In settings where players have a limited access to liquidity, represented in the form of budget constraints, efficiency maximization has proven to be a challenging goal. In particular, the social welfare cannot be approximated by a better factor then the number of players. Therefore, the literature has mainly resorted to Pareto-efficiency as a way to achieve efficiency in such settings. While successful in some important scenarios, in many settings it is known that either exactly one incentive-compatible auction that always outputs a Pareto-efficient solution, or that no truthful mechanism can always guarantee a Pareto-efficient outcome. Traditionally, impossibility results can be avoided by considering approximations. However, Pareto-efficiency is a binary property (is either satisfied or not), which does not allow for approximations. In this paper we propose a new notion of efficiency, called \emph{liquid welfare}. This is the maximum amount of revenue an omniscient seller would be able to extract from a certain instance. We explain the intuition behind this objective function and show that it can be 2-approximated by two different auctions. Moreover, we show that no truthful algorithm can guarantee an approximation factor better than 4/3 with respect to the liquid welfare, and provide a truthful auction that attains this bound in a special case. Importantly, the liquid welfare benchmark also overcomes impossibilities for some settings. While it is impossible to design Pareto-efficient auctions for multi-unit auctions where players have decreasing marginal values, we give a deterministic $O(\log n)$-approximation for the liquid welfare in this setting.
[ { "version": "v1", "created": "Fri, 26 Apr 2013 01:29:04 GMT" } ]
2013-04-29T00:00:00
[ [ "Dobzinski", "Shahar", "" ], [ "Leme", "Renato Paes", "" ] ]
TITLE: Efficiency Guarantees in Auctions with Budgets ABSTRACT: In settings where players have a limited access to liquidity, represented in the form of budget constraints, efficiency maximization has proven to be a challenging goal. In particular, the social welfare cannot be approximated by a better factor then the number of players. Therefore, the literature has mainly resorted to Pareto-efficiency as a way to achieve efficiency in such settings. While successful in some important scenarios, in many settings it is known that either exactly one incentive-compatible auction that always outputs a Pareto-efficient solution, or that no truthful mechanism can always guarantee a Pareto-efficient outcome. Traditionally, impossibility results can be avoided by considering approximations. However, Pareto-efficiency is a binary property (is either satisfied or not), which does not allow for approximations. In this paper we propose a new notion of efficiency, called \emph{liquid welfare}. This is the maximum amount of revenue an omniscient seller would be able to extract from a certain instance. We explain the intuition behind this objective function and show that it can be 2-approximated by two different auctions. Moreover, we show that no truthful algorithm can guarantee an approximation factor better than 4/3 with respect to the liquid welfare, and provide a truthful auction that attains this bound in a special case. Importantly, the liquid welfare benchmark also overcomes impossibilities for some settings. While it is impossible to design Pareto-efficient auctions for multi-unit auctions where players have decreasing marginal values, we give a deterministic $O(\log n)$-approximation for the liquid welfare in this setting.
no_new_dataset
0.707392
1304.7140
Michael Helmberger Michael Helmberger
M. Helmberger, M. Urschler, M. Pienn, Z.Balint, A. Olschewski and H. Bischof
Pulmonary Vascular Tree Segmentation from Contrast-Enhanced CT Images
Part of the OAGM/AAPR 2013 proceedings (1304.1876)
null
null
OAGM-AAPR/2013/09
cs.CV physics.med-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a pulmonary vessel segmentation algorithm, which is fast, fully automatic and robust. It uses a coarse segmentation of the airway tree and a left and right lung labeled volume to restrict a vessel enhancement filter, based on an offset medialness function, to the lungs. We show the application of our algorithm on contrast-enhanced CT images, where we derive a clinical parameter to detect pulmonary hypertension (PH) in patients. Results on a dataset of 24 patients show that quantitative indices derived from the segmentation are applicable to distinguish patients with and without PH. Further work-in-progress results are shown on the VESSEL12 challenge dataset, which is composed of non-contrast-enhanced scans, where we range in the midfield of participating contestants.
[ { "version": "v1", "created": "Fri, 26 Apr 2013 12:30:36 GMT" } ]
2013-04-29T00:00:00
[ [ "Helmberger", "M.", "" ], [ "Urschler", "M.", "" ], [ "Pienn", "M.", "" ], [ "Balint", "Z.", "" ], [ "Olschewski", "A.", "" ], [ "Bischof", "H.", "" ] ]
TITLE: Pulmonary Vascular Tree Segmentation from Contrast-Enhanced CT Images ABSTRACT: We present a pulmonary vessel segmentation algorithm, which is fast, fully automatic and robust. It uses a coarse segmentation of the airway tree and a left and right lung labeled volume to restrict a vessel enhancement filter, based on an offset medialness function, to the lungs. We show the application of our algorithm on contrast-enhanced CT images, where we derive a clinical parameter to detect pulmonary hypertension (PH) in patients. Results on a dataset of 24 patients show that quantitative indices derived from the segmentation are applicable to distinguish patients with and without PH. Further work-in-progress results are shown on the VESSEL12 challenge dataset, which is composed of non-contrast-enhanced scans, where we range in the midfield of participating contestants.
no_new_dataset
0.699909
1304.7236
Alessandro Perina
Alessandro Perina, Nebojsa Jojic
In the sight of my wearable camera: Classifying my visual experience
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce and we analyze a new dataset which resembles the input to biological vision systems much more than most previously published ones. Our analysis leaded to several important conclusions. First, it is possible to disambiguate over dozens of visual scenes (locations) encountered over the course of several weeks of a human life with accuracy of over 80%, and this opens up possibility for numerous novel vision applications, from early detection of dementia to everyday use of wearable camera streams for automatic reminders, and visual stream exchange. Second, our experimental results indicate that, generative models such as Latent Dirichlet Allocation or Counting Grids, are more suitable to such types of data, as they are more robust to overtraining and comfortable with images at low resolution, blurred and characterized by relatively random clutter and a mix of objects.
[ { "version": "v1", "created": "Fri, 26 Apr 2013 17:28:13 GMT" } ]
2013-04-29T00:00:00
[ [ "Perina", "Alessandro", "" ], [ "Jojic", "Nebojsa", "" ] ]
TITLE: In the sight of my wearable camera: Classifying my visual experience ABSTRACT: We introduce and we analyze a new dataset which resembles the input to biological vision systems much more than most previously published ones. Our analysis leaded to several important conclusions. First, it is possible to disambiguate over dozens of visual scenes (locations) encountered over the course of several weeks of a human life with accuracy of over 80%, and this opens up possibility for numerous novel vision applications, from early detection of dementia to everyday use of wearable camera streams for automatic reminders, and visual stream exchange. Second, our experimental results indicate that, generative models such as Latent Dirichlet Allocation or Counting Grids, are more suitable to such types of data, as they are more robust to overtraining and comfortable with images at low resolution, blurred and characterized by relatively random clutter and a mix of objects.
new_dataset
0.71302
1304.6663
Bamdev Mishra
B. Mishra, G. Meyer and R. Sepulchre
Low-rank optimization for distance matrix completion
In Proceedings of the 50th IEEE Conference on Decision and Control and European Control Conference, 2011
null
10.1109/CDC.2011.6160810
null
math.OC cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper addresses the problem of low-rank distance matrix completion. This problem amounts to recover the missing entries of a distance matrix when the dimension of the data embedding space is possibly unknown but small compared to the number of considered data points. The focus is on high-dimensional problems. We recast the considered problem into an optimization problem over the set of low-rank positive semidefinite matrices and propose two efficient algorithms for low-rank distance matrix completion. In addition, we propose a strategy to determine the dimension of the embedding space. The resulting algorithms scale to high-dimensional problems and monotonically converge to a global solution of the problem. Finally, numerical experiments illustrate the good performance of the proposed algorithms on benchmarks.
[ { "version": "v1", "created": "Wed, 24 Apr 2013 16:52:34 GMT" }, { "version": "v2", "created": "Thu, 25 Apr 2013 09:26:19 GMT" } ]
2013-04-26T00:00:00
[ [ "Mishra", "B.", "" ], [ "Meyer", "G.", "" ], [ "Sepulchre", "R.", "" ] ]
TITLE: Low-rank optimization for distance matrix completion ABSTRACT: This paper addresses the problem of low-rank distance matrix completion. This problem amounts to recover the missing entries of a distance matrix when the dimension of the data embedding space is possibly unknown but small compared to the number of considered data points. The focus is on high-dimensional problems. We recast the considered problem into an optimization problem over the set of low-rank positive semidefinite matrices and propose two efficient algorithms for low-rank distance matrix completion. In addition, we propose a strategy to determine the dimension of the embedding space. The resulting algorithms scale to high-dimensional problems and monotonically converge to a global solution of the problem. Finally, numerical experiments illustrate the good performance of the proposed algorithms on benchmarks.
no_new_dataset
0.709787
1304.6480
Liwei Wang
Yining Wang, Liwei Wang, Yuanzhi Li, Di He, Tie-Yan Liu, Wei Chen
A Theoretical Analysis of NDCG Type Ranking Measures
COLT 2013
null
null
null
cs.LG cs.IR stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A central problem in ranking is to design a ranking measure for evaluation of ranking functions. In this paper we study, from a theoretical perspective, the widely used Normalized Discounted Cumulative Gain (NDCG)-type ranking measures. Although there are extensive empirical studies of NDCG, little is known about its theoretical properties. We first show that, whatever the ranking function is, the standard NDCG which adopts a logarithmic discount, converges to 1 as the number of items to rank goes to infinity. On the first sight, this result is very surprising. It seems to imply that NDCG cannot differentiate good and bad ranking functions, contradicting to the empirical success of NDCG in many applications. In order to have a deeper understanding of ranking measures in general, we propose a notion referred to as consistent distinguishability. This notion captures the intuition that a ranking measure should have such a property: For every pair of substantially different ranking functions, the ranking measure can decide which one is better in a consistent manner on almost all datasets. We show that NDCG with logarithmic discount has consistent distinguishability although it converges to the same limit for all ranking functions. We next characterize the set of all feasible discount functions for NDCG according to the concept of consistent distinguishability. Specifically we show that whether NDCG has consistent distinguishability depends on how fast the discount decays, and 1/r is a critical point. We then turn to the cut-off version of NDCG, i.e., NDCG@k. We analyze the distinguishability of NDCG@k for various choices of k and the discount functions. Experimental results on real Web search datasets agree well with the theory.
[ { "version": "v1", "created": "Wed, 24 Apr 2013 04:08:23 GMT" } ]
2013-04-25T00:00:00
[ [ "Wang", "Yining", "" ], [ "Wang", "Liwei", "" ], [ "Li", "Yuanzhi", "" ], [ "He", "Di", "" ], [ "Liu", "Tie-Yan", "" ], [ "Chen", "Wei", "" ] ]
TITLE: A Theoretical Analysis of NDCG Type Ranking Measures ABSTRACT: A central problem in ranking is to design a ranking measure for evaluation of ranking functions. In this paper we study, from a theoretical perspective, the widely used Normalized Discounted Cumulative Gain (NDCG)-type ranking measures. Although there are extensive empirical studies of NDCG, little is known about its theoretical properties. We first show that, whatever the ranking function is, the standard NDCG which adopts a logarithmic discount, converges to 1 as the number of items to rank goes to infinity. On the first sight, this result is very surprising. It seems to imply that NDCG cannot differentiate good and bad ranking functions, contradicting to the empirical success of NDCG in many applications. In order to have a deeper understanding of ranking measures in general, we propose a notion referred to as consistent distinguishability. This notion captures the intuition that a ranking measure should have such a property: For every pair of substantially different ranking functions, the ranking measure can decide which one is better in a consistent manner on almost all datasets. We show that NDCG with logarithmic discount has consistent distinguishability although it converges to the same limit for all ranking functions. We next characterize the set of all feasible discount functions for NDCG according to the concept of consistent distinguishability. Specifically we show that whether NDCG has consistent distinguishability depends on how fast the discount decays, and 1/r is a critical point. We then turn to the cut-off version of NDCG, i.e., NDCG@k. We analyze the distinguishability of NDCG@k for various choices of k and the discount functions. Experimental results on real Web search datasets agree well with the theory.
no_new_dataset
0.706621
1304.5894
Bruno Cornelis
Bruno Cornelis, Yun Yang, Joshua T. Vogelstein, Ann Dooms, Ingrid Daubechies, David Dunson
Bayesian crack detection in ultra high resolution multimodal images of paintings
8 pages, double column
null
null
null
cs.CV cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The preservation of our cultural heritage is of paramount importance. Thanks to recent developments in digital acquisition techniques, powerful image analysis algorithms are developed which can be useful non-invasive tools to assist in the restoration and preservation of art. In this paper we propose a semi-supervised crack detection method that can be used for high-dimensional acquisitions of paintings coming from different modalities. Our dataset consists of a recently acquired collection of images of the Ghent Altarpiece (1432), one of Northern Europe's most important art masterpieces. Our goal is to build a classifier that is able to discern crack pixels from the background consisting of non-crack pixels, making optimal use of the information that is provided by each modality. To accomplish this we employ a recently developed non-parametric Bayesian classifier, that uses tensor factorizations to characterize any conditional probability. A prior is placed on the parameters of the factorization such that every possible interaction between predictors is allowed while still identifying a sparse subset among these predictors. The proposed Bayesian classifier, which we will refer to as conditional Bayesian tensor factorization or CBTF, is assessed by visually comparing classification results with the Random Forest (RF) algorithm.
[ { "version": "v1", "created": "Mon, 22 Apr 2013 09:46:47 GMT" }, { "version": "v2", "created": "Tue, 23 Apr 2013 09:00:01 GMT" } ]
2013-04-24T00:00:00
[ [ "Cornelis", "Bruno", "" ], [ "Yang", "Yun", "" ], [ "Vogelstein", "Joshua T.", "" ], [ "Dooms", "Ann", "" ], [ "Daubechies", "Ingrid", "" ], [ "Dunson", "David", "" ] ]
TITLE: Bayesian crack detection in ultra high resolution multimodal images of paintings ABSTRACT: The preservation of our cultural heritage is of paramount importance. Thanks to recent developments in digital acquisition techniques, powerful image analysis algorithms are developed which can be useful non-invasive tools to assist in the restoration and preservation of art. In this paper we propose a semi-supervised crack detection method that can be used for high-dimensional acquisitions of paintings coming from different modalities. Our dataset consists of a recently acquired collection of images of the Ghent Altarpiece (1432), one of Northern Europe's most important art masterpieces. Our goal is to build a classifier that is able to discern crack pixels from the background consisting of non-crack pixels, making optimal use of the information that is provided by each modality. To accomplish this we employ a recently developed non-parametric Bayesian classifier, that uses tensor factorizations to characterize any conditional probability. A prior is placed on the parameters of the factorization such that every possible interaction between predictors is allowed while still identifying a sparse subset among these predictors. The proposed Bayesian classifier, which we will refer to as conditional Bayesian tensor factorization or CBTF, is assessed by visually comparing classification results with the Random Forest (RF) algorithm.
new_dataset
0.720153
1304.6291
Fang Wang
Fang Wang and Yi Li
Learning Visual Symbols for Parsing Human Poses in Images
IJCAI 2013
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Parsing human poses in images is fundamental in extracting critical visual information for artificial intelligent agents. Our goal is to learn self-contained body part representations from images, which we call visual symbols, and their symbol-wise geometric contexts in this parsing process. Each symbol is individually learned by categorizing visual features leveraged by geometric information. In the categorization, we use Latent Support Vector Machine followed by an efficient cross validation procedure to learn visual symbols. Then, these symbols naturally define geometric contexts of body parts in a fine granularity. When the structure of the compositional parts is a tree, we derive an efficient approach to estimating human poses in images. Experiments on two large datasets suggest our approach outperforms state of the art methods.
[ { "version": "v1", "created": "Tue, 23 Apr 2013 14:07:19 GMT" } ]
2013-04-24T00:00:00
[ [ "Wang", "Fang", "" ], [ "Li", "Yi", "" ] ]
TITLE: Learning Visual Symbols for Parsing Human Poses in Images ABSTRACT: Parsing human poses in images is fundamental in extracting critical visual information for artificial intelligent agents. Our goal is to learn self-contained body part representations from images, which we call visual symbols, and their symbol-wise geometric contexts in this parsing process. Each symbol is individually learned by categorizing visual features leveraged by geometric information. In the categorization, we use Latent Support Vector Machine followed by an efficient cross validation procedure to learn visual symbols. Then, these symbols naturally define geometric contexts of body parts in a fine granularity. When the structure of the compositional parts is a tree, we derive an efficient approach to estimating human poses in images. Experiments on two large datasets suggest our approach outperforms state of the art methods.
no_new_dataset
0.711387
1212.5238
Andrea Baronchelli
Delia Mocanu, Andrea Baronchelli, Bruno Gon\c{c}alves, Nicola Perra, Alessandro Vespignani
The Twitter of Babel: Mapping World Languages through Microblogging Platforms
null
PLoS One 8, E61981 (2013)
10.1371/journal.pone.0061981
null
physics.soc-ph cs.CL cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Large scale analysis and statistics of socio-technical systems that just a few short years ago would have required the use of consistent economic and human resources can nowadays be conveniently performed by mining the enormous amount of digital data produced by human activities. Although a characterization of several aspects of our societies is emerging from the data revolution, a number of questions concerning the reliability and the biases inherent to the big data "proxies" of social life are still open. Here, we survey worldwide linguistic indicators and trends through the analysis of a large-scale dataset of microblogging posts. We show that available data allow for the study of language geography at scales ranging from country-level aggregation to specific city neighborhoods. The high resolution and coverage of the data allows us to investigate different indicators such as the linguistic homogeneity of different countries, the touristic seasonal patterns within countries and the geographical distribution of different languages in multilingual regions. This work highlights the potential of geolocalized studies of open data sources to improve current analysis and develop indicators for major social phenomena in specific communities.
[ { "version": "v1", "created": "Thu, 20 Dec 2012 20:43:12 GMT" } ]
2013-04-23T00:00:00
[ [ "Mocanu", "Delia", "" ], [ "Baronchelli", "Andrea", "" ], [ "Gonçalves", "Bruno", "" ], [ "Perra", "Nicola", "" ], [ "Vespignani", "Alessandro", "" ] ]
TITLE: The Twitter of Babel: Mapping World Languages through Microblogging Platforms ABSTRACT: Large scale analysis and statistics of socio-technical systems that just a few short years ago would have required the use of consistent economic and human resources can nowadays be conveniently performed by mining the enormous amount of digital data produced by human activities. Although a characterization of several aspects of our societies is emerging from the data revolution, a number of questions concerning the reliability and the biases inherent to the big data "proxies" of social life are still open. Here, we survey worldwide linguistic indicators and trends through the analysis of a large-scale dataset of microblogging posts. We show that available data allow for the study of language geography at scales ranging from country-level aggregation to specific city neighborhoods. The high resolution and coverage of the data allows us to investigate different indicators such as the linguistic homogeneity of different countries, the touristic seasonal patterns within countries and the geographical distribution of different languages in multilingual regions. This work highlights the potential of geolocalized studies of open data sources to improve current analysis and develop indicators for major social phenomena in specific communities.
no_new_dataset
0.686002
1301.5177
Andrea Scharnhorst
Linda Reijnhoudt, Rodrigo Costas, Ed Noyons, Katy Boerner, Andrea Scharnhorst
"Seed+Expand": A validated methodology for creating high quality publication oeuvres of individual researchers
Paper accepted for the ISSI 2013, small changes in the text due to referee comments, one figure added (Fig 3)
null
null
null
cs.DL cs.IR
http://creativecommons.org/licenses/by/3.0/
The study of science at the individual micro-level frequently requires the disambiguation of author names. The creation of author's publication oeuvres involves matching the list of unique author names to names used in publication databases. Despite recent progress in the development of unique author identifiers, e.g., ORCID, VIVO, or DAI, author disambiguation remains a key problem when it comes to large-scale bibliometric analysis using data from multiple databases. This study introduces and validates a new methodology called seed+expand for semi-automatic bibliographic data collection for a given set of individual authors. Specifically, we identify the oeuvre of a set of Dutch full professors during the period 1980-2011. In particular, we combine author records from the National Research Information System (NARCIS) with publication records from the Web of Science. Starting with an initial list of 8,378 names, we identify "seed publications" for each author using five different approaches. Subsequently, we "expand" the set of publication in three different approaches. The different approaches are compared and resulting oeuvres are evaluated on precision and recall using a "gold standard" dataset of authors for which verified publications in the period 2001-2010 are available.
[ { "version": "v1", "created": "Tue, 22 Jan 2013 13:16:15 GMT" }, { "version": "v2", "created": "Mon, 22 Apr 2013 11:01:55 GMT" } ]
2013-04-23T00:00:00
[ [ "Reijnhoudt", "Linda", "" ], [ "Costas", "Rodrigo", "" ], [ "Noyons", "Ed", "" ], [ "Boerner", "Katy", "" ], [ "Scharnhorst", "Andrea", "" ] ]
TITLE: "Seed+Expand": A validated methodology for creating high quality publication oeuvres of individual researchers ABSTRACT: The study of science at the individual micro-level frequently requires the disambiguation of author names. The creation of author's publication oeuvres involves matching the list of unique author names to names used in publication databases. Despite recent progress in the development of unique author identifiers, e.g., ORCID, VIVO, or DAI, author disambiguation remains a key problem when it comes to large-scale bibliometric analysis using data from multiple databases. This study introduces and validates a new methodology called seed+expand for semi-automatic bibliographic data collection for a given set of individual authors. Specifically, we identify the oeuvre of a set of Dutch full professors during the period 1980-2011. In particular, we combine author records from the National Research Information System (NARCIS) with publication records from the Web of Science. Starting with an initial list of 8,378 names, we identify "seed publications" for each author using five different approaches. Subsequently, we "expand" the set of publication in three different approaches. The different approaches are compared and resulting oeuvres are evaluated on precision and recall using a "gold standard" dataset of authors for which verified publications in the period 2001-2010 are available.
no_new_dataset
0.7029
1304.5755
Puneet Kishor
Puneet Kishor, Oshani Seneviratne, and Noah Giansiracusa
Policy Aware Geospatial Data
5 pages. Accepted for ACMGIS 2009, but withdrawn because ACM would not include this paper unless I presented in person (prior commitments prevented me from travel even though I had registered)
null
null
null
cs.OH
http://creativecommons.org/licenses/publicdomain/
Digital Rights Management (DRM) prevents end-users from using content in a manner inconsistent with its creator's wishes. The license describing these use-conditions typically accompanies the content as its metadata. A resulting problem is that the license and the content can get separated and lose track of each other. The best metadata have two distinct qualities--they are created automatically without user intervention, and they are embedded within the data that they describe. If licenses are also created and transported this way, data will always have licenses, and the licenses will be readily examinable. When two or more datasets are combined, a new dataset, and with it a new license, are created. This new license is a function of the licenses of the component datasets and any additional conditions that the person combining the datasets might want to impose. Following the notion of a data-purpose algebra, we model this phenomenon by interpreting the transfer and conjunction of data as inducing an algebraic operation on the corresponding licenses. When a dataset passes from one source to the next its license is transformed in a deterministic way, and similarly when datasets are combined the associated licenses are combined in a non-trivial algebraic manner. Modern, computer-savvy, licensing regimes such as Creative Commons allow writing the license in a special kind of language called Creative Commons Rights Expression Language (ccREL). ccREL allows creating and embedding the license using RDFa utilizing XHTML. This is preferred over DRM which includes the rights in a binary file completely opaque to nearly all users. The colocation of metadata with human-visible XHTML makes the license more transparent. In this paper we describe a methodology for creating and embedding licenses in geographic data utilizing ccREL, and programmatically examining embedded licenses in component data...
[ { "version": "v1", "created": "Sun, 21 Apr 2013 15:50:46 GMT" } ]
2013-04-23T00:00:00
[ [ "Kishor", "Puneet", "" ], [ "Seneviratne", "Oshani", "" ], [ "Giansiracusa", "Noah", "" ] ]
TITLE: Policy Aware Geospatial Data ABSTRACT: Digital Rights Management (DRM) prevents end-users from using content in a manner inconsistent with its creator's wishes. The license describing these use-conditions typically accompanies the content as its metadata. A resulting problem is that the license and the content can get separated and lose track of each other. The best metadata have two distinct qualities--they are created automatically without user intervention, and they are embedded within the data that they describe. If licenses are also created and transported this way, data will always have licenses, and the licenses will be readily examinable. When two or more datasets are combined, a new dataset, and with it a new license, are created. This new license is a function of the licenses of the component datasets and any additional conditions that the person combining the datasets might want to impose. Following the notion of a data-purpose algebra, we model this phenomenon by interpreting the transfer and conjunction of data as inducing an algebraic operation on the corresponding licenses. When a dataset passes from one source to the next its license is transformed in a deterministic way, and similarly when datasets are combined the associated licenses are combined in a non-trivial algebraic manner. Modern, computer-savvy, licensing regimes such as Creative Commons allow writing the license in a special kind of language called Creative Commons Rights Expression Language (ccREL). ccREL allows creating and embedding the license using RDFa utilizing XHTML. This is preferred over DRM which includes the rights in a binary file completely opaque to nearly all users. The colocation of metadata with human-visible XHTML makes the license more transparent. In this paper we describe a methodology for creating and embedding licenses in geographic data utilizing ccREL, and programmatically examining embedded licenses in component data...
no_new_dataset
0.709372
1304.5876
Jin-Kao Hao
Yang Wang, Jin-Kao Hao, Fred Glover, Zhipeng L\"u
Solving the minimum sum coloring problem via binary quadratic programming
Short pre-print
null
null
null
cs.DS cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In recent years, binary quadratic programming (BQP) has been successively applied to solve several combinatorial optimization problems. We consider in this paper a study of using the BQP model to solve the minimum sum coloring problem (MSCP). For this purpose, we recast the MSCP with a quadratic model which is then solved via a recently proposed Path Relinking (PR) algorithm designed for the general BQP. Based on a set of MSCP benchmark instances, we investigate the performance of this solution approach compared with existing methods.
[ { "version": "v1", "created": "Mon, 22 Apr 2013 08:56:11 GMT" } ]
2013-04-23T00:00:00
[ [ "Wang", "Yang", "" ], [ "Hao", "Jin-Kao", "" ], [ "Glover", "Fred", "" ], [ "Lü", "Zhipeng", "" ] ]
TITLE: Solving the minimum sum coloring problem via binary quadratic programming ABSTRACT: In recent years, binary quadratic programming (BQP) has been successively applied to solve several combinatorial optimization problems. We consider in this paper a study of using the BQP model to solve the minimum sum coloring problem (MSCP). For this purpose, we recast the MSCP with a quadratic model which is then solved via a recently proposed Path Relinking (PR) algorithm designed for the general BQP. Based on a set of MSCP benchmark instances, we investigate the performance of this solution approach compared with existing methods.
no_new_dataset
0.709806
1304.5330
Li-Zhao You
Lizhao You, Zimu Yuan, Bin Tang, Guihai Chen
Minimum Latency Broadcast Scheduling in Single-Radio Multi-Channel Wireless Ad-Hoc Networks
6 pages, 2 figures
null
null
null
cs.NI
http://creativecommons.org/licenses/by-nc-sa/3.0/
We study the minimum latency broadcast scheduling (MLBS) problem in Single-Radio Multi-Channel (SR-MC) wireless ad-hoc networks (WANETs), which are modeled by Unit Disk Graphs. Nodes with this capability have their fixed reception channels, but can switch their transmission channels to communicate with their neighbors. The single-radio and multi-channel model prevents existing algorithms for single-channel networks achieving good performance. First, the common assumption that one transmission reaches all the neighboring nodes does not hold naturally. Second, the multi-channel dimension provides new opportunities to schedule the broadcast transmissions in parallel. We show MLBS problem in SR-MC WANETs is NP-hard, and present a benchmark algorithm: Basic Transmission Scheduling (BTS), which has approximation ratio of 4k + 12. Here k is the number of orthogonal channels in SR-MC WANETs. Then we propose an Enhanced Transmission Scheduling (ETS) algorithm, improving the approximation ratio to k + 23. Simulation results show that ETS achieves better performance over BTS, and the performance of ETS approaches the lower bound.
[ { "version": "v1", "created": "Fri, 19 Apr 2013 07:15:05 GMT" } ]
2013-04-22T00:00:00
[ [ "You", "Lizhao", "" ], [ "Yuan", "Zimu", "" ], [ "Tang", "Bin", "" ], [ "Chen", "Guihai", "" ] ]
TITLE: Minimum Latency Broadcast Scheduling in Single-Radio Multi-Channel Wireless Ad-Hoc Networks ABSTRACT: We study the minimum latency broadcast scheduling (MLBS) problem in Single-Radio Multi-Channel (SR-MC) wireless ad-hoc networks (WANETs), which are modeled by Unit Disk Graphs. Nodes with this capability have their fixed reception channels, but can switch their transmission channels to communicate with their neighbors. The single-radio and multi-channel model prevents existing algorithms for single-channel networks achieving good performance. First, the common assumption that one transmission reaches all the neighboring nodes does not hold naturally. Second, the multi-channel dimension provides new opportunities to schedule the broadcast transmissions in parallel. We show MLBS problem in SR-MC WANETs is NP-hard, and present a benchmark algorithm: Basic Transmission Scheduling (BTS), which has approximation ratio of 4k + 12. Here k is the number of orthogonal channels in SR-MC WANETs. Then we propose an Enhanced Transmission Scheduling (ETS) algorithm, improving the approximation ratio to k + 23. Simulation results show that ETS achieves better performance over BTS, and the performance of ETS approaches the lower bound.
no_new_dataset
0.70614
1304.4679
Huiyi Hu
Huiyi Hu, Thomas Laurent, Mason A. Porter, Andrea L. Bertozzi
A Method Based on Total Variation for Network Modularity Optimization using the MBO Scheme
23 pages
null
null
null
cs.SI math.OC physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The study of network structure is pervasive in sociology, biology, computer science, and many other disciplines. One of the most important areas of network science is the algorithmic detection of cohesive groups of nodes called "communities". One popular approach to find communities is to maximize a quality function known as {\em modularity} to achieve some sort of optimal clustering of nodes. In this paper, we interpret the modularity function from a novel perspective: we reformulate modularity optimization as a minimization problem of an energy functional that consists of a total variation term and an $\ell_2$ balance term. By employing numerical techniques from image processing and $\ell_1$ compressive sensing -- such as convex splitting and the Merriman-Bence-Osher (MBO) scheme -- we develop a variational algorithm for the minimization problem. We present our computational results using both synthetic benchmark networks and real data.
[ { "version": "v1", "created": "Wed, 17 Apr 2013 04:11:37 GMT" } ]
2013-04-18T00:00:00
[ [ "Hu", "Huiyi", "" ], [ "Laurent", "Thomas", "" ], [ "Porter", "Mason A.", "" ], [ "Bertozzi", "Andrea L.", "" ] ]
TITLE: A Method Based on Total Variation for Network Modularity Optimization using the MBO Scheme ABSTRACT: The study of network structure is pervasive in sociology, biology, computer science, and many other disciplines. One of the most important areas of network science is the algorithmic detection of cohesive groups of nodes called "communities". One popular approach to find communities is to maximize a quality function known as {\em modularity} to achieve some sort of optimal clustering of nodes. In this paper, we interpret the modularity function from a novel perspective: we reformulate modularity optimization as a minimization problem of an energy functional that consists of a total variation term and an $\ell_2$ balance term. By employing numerical techniques from image processing and $\ell_1$ compressive sensing -- such as convex splitting and the Merriman-Bence-Osher (MBO) scheme -- we develop a variational algorithm for the minimization problem. We present our computational results using both synthetic benchmark networks and real data.
no_new_dataset
0.709573
1304.4371
Joel Lang
Joel Lang and James Henderson
Efficient Computation of Mean Truncated Hitting Times on Very Large Graphs
null
null
null
null
cs.DS cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Previous work has shown the effectiveness of random walk hitting times as a measure of dissimilarity in a variety of graph-based learning problems such as collaborative filtering, query suggestion or finding paraphrases. However, application of hitting times has been limited to small datasets because of computational restrictions. This paper develops a new approximation algorithm with which hitting times can be computed on very large, disk-resident graphs, making their application possible to problems which were previously out of reach. This will potentially benefit a range of large-scale problems.
[ { "version": "v1", "created": "Tue, 16 Apr 2013 09:11:16 GMT" } ]
2013-04-17T00:00:00
[ [ "Lang", "Joel", "" ], [ "Henderson", "James", "" ] ]
TITLE: Efficient Computation of Mean Truncated Hitting Times on Very Large Graphs ABSTRACT: Previous work has shown the effectiveness of random walk hitting times as a measure of dissimilarity in a variety of graph-based learning problems such as collaborative filtering, query suggestion or finding paraphrases. However, application of hitting times has been limited to small datasets because of computational restrictions. This paper develops a new approximation algorithm with which hitting times can be computed on very large, disk-resident graphs, making their application possible to problems which were previously out of reach. This will potentially benefit a range of large-scale problems.
no_new_dataset
0.70825
1304.3745
Khadoudja Ghanem
Khadoudja Ghanem
Towards more accurate clustering method by using dynamic time warping
12 pages, 1 figure, 2 tables, journal. arXiv admin note: text overlap with arXiv:1206.3509 by other authors
International Journal of Data Mining & Knowledge Management Process (IJDKP) Vol.3, No.2, March 2013
10.5121/ijdkp.2013.3207
null
cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
An intrinsic problem of classifiers based on machine learning (ML) methods is that their learning time grows as the size and complexity of the training dataset increases. For this reason, it is important to have efficient computational methods and algorithms that can be applied on large datasets, such that it is still possible to complete the machine learning tasks in reasonable time. In this context, we present in this paper a more accurate simple process to speed up ML methods. An unsupervised clustering algorithm is combined with Expectation, Maximization (EM) algorithm to develop an efficient Hidden Markov Model (HMM) training. The idea of the proposed process consists of two steps. In the first step, training instances with similar inputs are clustered and a weight factor which represents the frequency of these instances is assigned to each representative cluster. Dynamic Time Warping technique is used as a dissimilarity function to cluster similar examples. In the second step, all formulas in the classical HMM training algorithm (EM) associated with the number of training instances are modified to include the weight factor in appropriate terms. This process significantly accelerates HMM training while maintaining the same initial, transition and emission probabilities matrixes as those obtained with the classical HMM training algorithm. Accordingly, the classification accuracy is preserved. Depending on the size of the training set, speedups of up to 2200 times is possible when the size is about 100.000 instances. The proposed approach is not limited to training HMMs, but it can be employed for a large variety of MLs methods.
[ { "version": "v1", "created": "Fri, 12 Apr 2013 22:23:53 GMT" } ]
2013-04-16T00:00:00
[ [ "Ghanem", "Khadoudja", "" ] ]
TITLE: Towards more accurate clustering method by using dynamic time warping ABSTRACT: An intrinsic problem of classifiers based on machine learning (ML) methods is that their learning time grows as the size and complexity of the training dataset increases. For this reason, it is important to have efficient computational methods and algorithms that can be applied on large datasets, such that it is still possible to complete the machine learning tasks in reasonable time. In this context, we present in this paper a more accurate simple process to speed up ML methods. An unsupervised clustering algorithm is combined with Expectation, Maximization (EM) algorithm to develop an efficient Hidden Markov Model (HMM) training. The idea of the proposed process consists of two steps. In the first step, training instances with similar inputs are clustered and a weight factor which represents the frequency of these instances is assigned to each representative cluster. Dynamic Time Warping technique is used as a dissimilarity function to cluster similar examples. In the second step, all formulas in the classical HMM training algorithm (EM) associated with the number of training instances are modified to include the weight factor in appropriate terms. This process significantly accelerates HMM training while maintaining the same initial, transition and emission probabilities matrixes as those obtained with the classical HMM training algorithm. Accordingly, the classification accuracy is preserved. Depending on the size of the training set, speedups of up to 2200 times is possible when the size is about 100.000 instances. The proposed approach is not limited to training HMMs, but it can be employed for a large variety of MLs methods.
no_new_dataset
0.71039
1304.3804
Emilio Coppa
Emilio Coppa, Camil Demetrescu, Irene Finocchi and Romolo Marotta
Multithreaded Input-Sensitive Profiling
null
null
null
null
cs.PF cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Input-sensitive profiling is a recent performance analysis technique that makes it possible to estimate the empirical cost function of individual routines of a program, helping developers understand how performance scales to larger inputs and pinpoint asymptotic bottlenecks in the code. A current limitation of input-sensitive profilers is that they specifically target sequential computations, ignoring any communication between threads. In this paper we show how to overcome this limitation, extending the range of applicability of the original approach to multithreaded applications and to applications that operate on I/O streams. We develop new metrics for automatically estimating the size of the input given to each routine activation, addressing input produced by non-deterministic memory stores performed by other threads as well as by the OS kernel (e.g., in response to I/O or network operations). We provide real case studies, showing that our extension allows it to characterize the behavior of complex applications more precisely than previous approaches. An extensive experimental investigation on a variety of benchmark suites (including the SPEC OMP2012 and the PARSEC benchmarks) shows that our Valgrind-based input-sensitive profiler incurs an overhead comparable to other prominent heavyweight analysis tools, while collecting significantly more performance points from each profiling session and correctly characterizing both thread-induced and external input.
[ { "version": "v1", "created": "Sat, 13 Apr 2013 12:39:34 GMT" } ]
2013-04-16T00:00:00
[ [ "Coppa", "Emilio", "" ], [ "Demetrescu", "Camil", "" ], [ "Finocchi", "Irene", "" ], [ "Marotta", "Romolo", "" ] ]
TITLE: Multithreaded Input-Sensitive Profiling ABSTRACT: Input-sensitive profiling is a recent performance analysis technique that makes it possible to estimate the empirical cost function of individual routines of a program, helping developers understand how performance scales to larger inputs and pinpoint asymptotic bottlenecks in the code. A current limitation of input-sensitive profilers is that they specifically target sequential computations, ignoring any communication between threads. In this paper we show how to overcome this limitation, extending the range of applicability of the original approach to multithreaded applications and to applications that operate on I/O streams. We develop new metrics for automatically estimating the size of the input given to each routine activation, addressing input produced by non-deterministic memory stores performed by other threads as well as by the OS kernel (e.g., in response to I/O or network operations). We provide real case studies, showing that our extension allows it to characterize the behavior of complex applications more precisely than previous approaches. An extensive experimental investigation on a variety of benchmark suites (including the SPEC OMP2012 and the PARSEC benchmarks) shows that our Valgrind-based input-sensitive profiler incurs an overhead comparable to other prominent heavyweight analysis tools, while collecting significantly more performance points from each profiling session and correctly characterizing both thread-induced and external input.
no_new_dataset
0.707967
1304.3816
Justin Thaler
Amit Chakrabarti and Graham Cormode and Navin Goyal and Justin Thaler
Annotations for Sparse Data Streams
29 pages, 5 tables
null
null
null
cs.CC cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Motivated by cloud computing, a number of recent works have studied annotated data streams and variants thereof. In this setting, a computationally weak verifier (cloud user), lacking the resources to store and manipulate his massive input locally, accesses a powerful but untrusted prover (cloud service). The verifier must work within the restrictive data streaming paradigm. The prover, who can annotate the data stream as it is read, must not just supply the answer but also convince the verifier of its correctness. Ideally, both the amount of annotation and the space used by the verifier should be sublinear in the relevant input size parameters. A rich theory of such algorithms -- which we call schemes -- has emerged. Prior work has shown how to leverage the prover's power to efficiently solve problems that have no non-trivial standard data stream algorithms. However, while optimal schemes are now known for several basic problems, such optimality holds only for streams whose length is commensurate with the size of the data universe. In contrast, many real-world datasets are relatively sparse, including graphs that contain only O(n^2) edges, and IP traffic streams that contain much fewer than the total number of possible IP addresses, 2^128 in IPv6. We design the first schemes that allow both the annotation and the space usage to be sublinear in the total number of stream updates rather than the size of the data universe. We solve significant problems, including variations of INDEX, SET-DISJOINTNESS, and FREQUENCY-MOMENTS, plus several natural problems on graphs. On the other hand, we give a new lower bound that, for the first time, rules out smooth tradeoffs between annotation and space usage for a specific problem. Our technique brings out new nuances in Merlin-Arthur communication complexity models, and provides a separation between online versions of the MA and AMA models.
[ { "version": "v1", "created": "Sat, 13 Apr 2013 15:17:28 GMT" } ]
2013-04-16T00:00:00
[ [ "Chakrabarti", "Amit", "" ], [ "Cormode", "Graham", "" ], [ "Goyal", "Navin", "" ], [ "Thaler", "Justin", "" ] ]
TITLE: Annotations for Sparse Data Streams ABSTRACT: Motivated by cloud computing, a number of recent works have studied annotated data streams and variants thereof. In this setting, a computationally weak verifier (cloud user), lacking the resources to store and manipulate his massive input locally, accesses a powerful but untrusted prover (cloud service). The verifier must work within the restrictive data streaming paradigm. The prover, who can annotate the data stream as it is read, must not just supply the answer but also convince the verifier of its correctness. Ideally, both the amount of annotation and the space used by the verifier should be sublinear in the relevant input size parameters. A rich theory of such algorithms -- which we call schemes -- has emerged. Prior work has shown how to leverage the prover's power to efficiently solve problems that have no non-trivial standard data stream algorithms. However, while optimal schemes are now known for several basic problems, such optimality holds only for streams whose length is commensurate with the size of the data universe. In contrast, many real-world datasets are relatively sparse, including graphs that contain only O(n^2) edges, and IP traffic streams that contain much fewer than the total number of possible IP addresses, 2^128 in IPv6. We design the first schemes that allow both the annotation and the space usage to be sublinear in the total number of stream updates rather than the size of the data universe. We solve significant problems, including variations of INDEX, SET-DISJOINTNESS, and FREQUENCY-MOMENTS, plus several natural problems on graphs. On the other hand, we give a new lower bound that, for the first time, rules out smooth tradeoffs between annotation and space usage for a specific problem. Our technique brings out new nuances in Merlin-Arthur communication complexity models, and provides a separation between online versions of the MA and AMA models.
no_new_dataset
0.707632
1304.3924
Nicolas Robinson-Garcia
J.A. Garc\'ia, Rosa Rodriguez-S\'anchez, Joaqu\'in Fdez-Valdivia, Nicol\'as Robinson-Garcia, Daniel Torres-Salinas
Best-in-class and Strategic Benchmarking of Scientific Subject Categories of Web of Science in 2010
null
Garc\'ia, J.A. et al. Best-in-class and Strategic Benchmarking of Scientific Subject Categories of Web of Science in 2010. Scientometrics. Online first. doi:10.1007/s11192-013-1000-1
10.1007/s11192-013-1000-1
null
cs.DL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Here we show a novel technique for comparing subject categories, where the prestige of academic journals in each category is represented statistically by an impact-factor histogram. For each subject category we compute the probability of occurrence of scholarly journals with impact factor in different intervals. Here impact factor is measured with Thomson Reuters Impact Factor, Eigenfactor Score, and Immediacy Index. Assuming the probabilities associated with a pair of subject categories our objective is to measure the degree of dissimilarity between them. To do so, we use an axiomatic characterization for predicting dissimilarity between subject categories. The scientific subject categories of Web of Science in 2010 were used to test the proposed approach for benchmarking Cell Biology and Computer Science Information Systems with the rest as two case studies. The former is best-in-class benchmarking that involves studying the leading competitor category; the latter is strategic benchmarking that involves observing how other scientific subject categories compete.
[ { "version": "v1", "created": "Sun, 14 Apr 2013 16:52:41 GMT" } ]
2013-04-16T00:00:00
[ [ "García", "J. A.", "" ], [ "Rodriguez-Sánchez", "Rosa", "" ], [ "Fdez-Valdivia", "Joaquín", "" ], [ "Robinson-Garcia", "Nicolás", "" ], [ "Torres-Salinas", "Daniel", "" ] ]
TITLE: Best-in-class and Strategic Benchmarking of Scientific Subject Categories of Web of Science in 2010 ABSTRACT: Here we show a novel technique for comparing subject categories, where the prestige of academic journals in each category is represented statistically by an impact-factor histogram. For each subject category we compute the probability of occurrence of scholarly journals with impact factor in different intervals. Here impact factor is measured with Thomson Reuters Impact Factor, Eigenfactor Score, and Immediacy Index. Assuming the probabilities associated with a pair of subject categories our objective is to measure the degree of dissimilarity between them. To do so, we use an axiomatic characterization for predicting dissimilarity between subject categories. The scientific subject categories of Web of Science in 2010 were used to test the proposed approach for benchmarking Cell Biology and Computer Science Information Systems with the rest as two case studies. The former is best-in-class benchmarking that involves studying the leading competitor category; the latter is strategic benchmarking that involves observing how other scientific subject categories compete.
no_new_dataset
0.712076
1304.4041
Humayun Irshad
H. Irshad, A. Gouaillard, L. Roux, D. Racoceanu
Multispectral Spatial Characterization: Application to Mitosis Detection in Breast Cancer Histopathology
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Accurate detection of mitosis plays a critical role in breast cancer histopathology. Manual detection and counting of mitosis is tedious and subject to considerable inter- and intra-reader variations. Multispectral imaging is a recent medical imaging technology, proven successful in increasing the segmentation accuracy in other fields. This study aims at improving the accuracy of mitosis detection by developing a specific solution using multispectral and multifocal imaging of breast cancer histopathological data. We propose to enable clinical routine-compliant quality of mitosis discrimination from other objects. The proposed framework includes comprehensive analysis of spectral bands and z-stack focus planes, detection of expected mitotic regions (candidates) in selected focus planes and spectral bands, computation of multispectral spatial features for each candidate, selection of multispectral spatial features and a study of different state-of-the-art classification methods for candidates classification as mitotic or non mitotic figures. This framework has been evaluated on MITOS multispectral medical dataset and achieved 60% detection rate and 57% F-Measure. Our results indicate that multispectral spatial features have more information for mitosis classification in comparison with white spectral band features, being therefore a very promising exploration area to improve the quality of the diagnosis assistance in histopathology.
[ { "version": "v1", "created": "Mon, 15 Apr 2013 10:11:34 GMT" } ]
2013-04-16T00:00:00
[ [ "Irshad", "H.", "" ], [ "Gouaillard", "A.", "" ], [ "Roux", "L.", "" ], [ "Racoceanu", "D.", "" ] ]
TITLE: Multispectral Spatial Characterization: Application to Mitosis Detection in Breast Cancer Histopathology ABSTRACT: Accurate detection of mitosis plays a critical role in breast cancer histopathology. Manual detection and counting of mitosis is tedious and subject to considerable inter- and intra-reader variations. Multispectral imaging is a recent medical imaging technology, proven successful in increasing the segmentation accuracy in other fields. This study aims at improving the accuracy of mitosis detection by developing a specific solution using multispectral and multifocal imaging of breast cancer histopathological data. We propose to enable clinical routine-compliant quality of mitosis discrimination from other objects. The proposed framework includes comprehensive analysis of spectral bands and z-stack focus planes, detection of expected mitotic regions (candidates) in selected focus planes and spectral bands, computation of multispectral spatial features for each candidate, selection of multispectral spatial features and a study of different state-of-the-art classification methods for candidates classification as mitotic or non mitotic figures. This framework has been evaluated on MITOS multispectral medical dataset and achieved 60% detection rate and 57% F-Measure. Our results indicate that multispectral spatial features have more information for mitosis classification in comparison with white spectral band features, being therefore a very promising exploration area to improve the quality of the diagnosis assistance in histopathology.
no_new_dataset
0.671901
1304.3192
Yulan Guo
Yulan Guo, Ferdous Sohel, Mohammed Bennamoun, Min Lu, Jianwei Wan
Rotational Projection Statistics for 3D Local Surface Description and Object Recognition
The final publication is available at link.springer.com International Journal of Computer Vision 2013
null
10.1007/s11263-013-0627-y
null
cs.CV
http://creativecommons.org/licenses/by/3.0/
Recognizing 3D objects in the presence of noise, varying mesh resolution, occlusion and clutter is a very challenging task. This paper presents a novel method named Rotational Projection Statistics (RoPS). It has three major modules: Local Reference Frame (LRF) definition, RoPS feature description and 3D object recognition. We propose a novel technique to define the LRF by calculating the scatter matrix of all points lying on the local surface. RoPS feature descriptors are obtained by rotationally projecting the neighboring points of a feature point onto 2D planes and calculating a set of statistics (including low-order central moments and entropy) of the distribution of these projected points. Using the proposed LRF and RoPS descriptor, we present a hierarchical 3D object recognition algorithm. The performance of the proposed LRF, RoPS descriptor and object recognition algorithm was rigorously tested on a number of popular and publicly available datasets. Our proposed techniques exhibited superior performance compared to existing techniques. We also showed that our method is robust with respect to noise and varying mesh resolution. Our RoPS based algorithm achieved recognition rates of 100%, 98.9%, 95.4% and 96.0% respectively when tested on the Bologna, UWA, Queen's and Ca' Foscari Venezia Datasets.
[ { "version": "v1", "created": "Thu, 11 Apr 2013 04:26:52 GMT" } ]
2013-04-12T00:00:00
[ [ "Guo", "Yulan", "" ], [ "Sohel", "Ferdous", "" ], [ "Bennamoun", "Mohammed", "" ], [ "Lu", "Min", "" ], [ "Wan", "Jianwei", "" ] ]
TITLE: Rotational Projection Statistics for 3D Local Surface Description and Object Recognition ABSTRACT: Recognizing 3D objects in the presence of noise, varying mesh resolution, occlusion and clutter is a very challenging task. This paper presents a novel method named Rotational Projection Statistics (RoPS). It has three major modules: Local Reference Frame (LRF) definition, RoPS feature description and 3D object recognition. We propose a novel technique to define the LRF by calculating the scatter matrix of all points lying on the local surface. RoPS feature descriptors are obtained by rotationally projecting the neighboring points of a feature point onto 2D planes and calculating a set of statistics (including low-order central moments and entropy) of the distribution of these projected points. Using the proposed LRF and RoPS descriptor, we present a hierarchical 3D object recognition algorithm. The performance of the proposed LRF, RoPS descriptor and object recognition algorithm was rigorously tested on a number of popular and publicly available datasets. Our proposed techniques exhibited superior performance compared to existing techniques. We also showed that our method is robust with respect to noise and varying mesh resolution. Our RoPS based algorithm achieved recognition rates of 100%, 98.9%, 95.4% and 96.0% respectively when tested on the Bologna, UWA, Queen's and Ca' Foscari Venezia Datasets.
no_new_dataset
0.711606
1304.3406
Seyed Hamed Alemohammad
Seyed Hamed Alemohammad, Dara Entekhabi
Merging Satellite Measurements of Rainfall Using Multi-scale Imagery Technique
6 pages, 10 Figures, WCRP Open Science Conference, 2011
null
null
null
cs.CV cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Several passive microwave satellites orbit the Earth and measure rainfall. These measurements have the advantage of almost full global coverage when compared to surface rain gauges. However, these satellites have low temporal revisit and missing data over some regions. Image fusion is a useful technique to fill in the gaps of one image (one satellite measurement) using another one. The proposed algorithm uses an iterative fusion scheme to integrate information from two satellite measurements. The algorithm is implemented on two datasets for 7 years of half-hourly data. The results show significant improvements in rain detection and rain intensity in the merged measurements.
[ { "version": "v1", "created": "Thu, 11 Apr 2013 19:31:57 GMT" } ]
2013-04-12T00:00:00
[ [ "Alemohammad", "Seyed Hamed", "" ], [ "Entekhabi", "Dara", "" ] ]
TITLE: Merging Satellite Measurements of Rainfall Using Multi-scale Imagery Technique ABSTRACT: Several passive microwave satellites orbit the Earth and measure rainfall. These measurements have the advantage of almost full global coverage when compared to surface rain gauges. However, these satellites have low temporal revisit and missing data over some regions. Image fusion is a useful technique to fill in the gaps of one image (one satellite measurement) using another one. The proposed algorithm uses an iterative fusion scheme to integrate information from two satellite measurements. The algorithm is implemented on two datasets for 7 years of half-hourly data. The results show significant improvements in rain detection and rain intensity in the merged measurements.
no_new_dataset
0.710377
1302.6569
Nicola Perra
Qian Zhang, Nicola Perra, Bruno Goncalves, Fabio Ciulla, Alessandro Vespignani
Characterizing scientific production and consumption in Physics
null
Nature Scientific Reports 3, 1640 (2013)
10.1038/srep01640
null
physics.soc-ph cs.DL cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We analyze the entire publication database of the American Physical Society generating longitudinal (50 years) citation networks geolocalized at the level of single urban areas. We define the knowledge diffusion proxy, and scientific production ranking algorithms to capture the spatio-temporal dynamics of Physics knowledge worldwide. By using the knowledge diffusion proxy we identify the key cities in the production and consumption of knowledge in Physics as a function of time. The results from the scientific production ranking algorithm allow us to characterize the top cities for scholarly research in Physics. Although we focus on a single dataset concerning a specific field, the methodology presented here opens the path to comparative studies of the dynamics of knowledge across disciplines and research areas
[ { "version": "v1", "created": "Tue, 26 Feb 2013 20:33:51 GMT" } ]
2013-04-11T00:00:00
[ [ "Zhang", "Qian", "" ], [ "Perra", "Nicola", "" ], [ "Goncalves", "Bruno", "" ], [ "Ciulla", "Fabio", "" ], [ "Vespignani", "Alessandro", "" ] ]
TITLE: Characterizing scientific production and consumption in Physics ABSTRACT: We analyze the entire publication database of the American Physical Society generating longitudinal (50 years) citation networks geolocalized at the level of single urban areas. We define the knowledge diffusion proxy, and scientific production ranking algorithms to capture the spatio-temporal dynamics of Physics knowledge worldwide. By using the knowledge diffusion proxy we identify the key cities in the production and consumption of knowledge in Physics as a function of time. The results from the scientific production ranking algorithm allow us to characterize the top cities for scholarly research in Physics. Although we focus on a single dataset concerning a specific field, the methodology presented here opens the path to comparative studies of the dynamics of knowledge across disciplines and research areas
no_new_dataset
0.711469
1303.3087
Togerchety Hitendra sarma
Mallikarjun Hangarge, K.C. Santosh, Srikanth Doddamani, Rajmohan Pardeshi
Statistical Texture Features based Handwritten and Printed Text Classification in South Indian Documents
Appeared in ICECIT-2102
null
null
Volume 1,Number 32
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we use statistical texture features for handwritten and printed text classification. We primarily aim for word level classification in south Indian scripts. Words are first extracted from the scanned document. For each extracted word, statistical texture features are computed such as mean, standard deviation, smoothness, moment, uniformity, entropy and local range including local entropy. These feature vectors are then used to classify words via k-NN classifier. We have validated the approach over several different datasets. Scripts like Kannada, Telugu, Malayalam and Hindi i.e., Devanagari are primarily employed where an average classification rate of 99.26% is achieved. In addition, to provide an extensibility of the approach, we address Roman script by using publicly available dataset and interesting results are reported.
[ { "version": "v1", "created": "Wed, 13 Mar 2013 04:51:22 GMT" } ]
2013-04-11T00:00:00
[ [ "Hangarge", "Mallikarjun", "" ], [ "Santosh", "K. C.", "" ], [ "Doddamani", "Srikanth", "" ], [ "Pardeshi", "Rajmohan", "" ] ]
TITLE: Statistical Texture Features based Handwritten and Printed Text Classification in South Indian Documents ABSTRACT: In this paper, we use statistical texture features for handwritten and printed text classification. We primarily aim for word level classification in south Indian scripts. Words are first extracted from the scanned document. For each extracted word, statistical texture features are computed such as mean, standard deviation, smoothness, moment, uniformity, entropy and local range including local entropy. These feature vectors are then used to classify words via k-NN classifier. We have validated the approach over several different datasets. Scripts like Kannada, Telugu, Malayalam and Hindi i.e., Devanagari are primarily employed where an average classification rate of 99.26% is achieved. In addition, to provide an extensibility of the approach, we address Roman script by using publicly available dataset and interesting results are reported.
no_new_dataset
0.714211
1304.2917
Flavia Maria Darcie Marquitti
Flavia Maria Darcie Marquitti, Paulo Roberto Guimaraes Jr., Mathias Mistretta Pires, Luiz Fernando Bittencourt
MODULAR: Software for the Autonomous Computation of Modularity in Large Network Sets
null
null
null
null
q-bio.QM cs.SI physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Ecological systems can be seen as networks of interactions between individual, species, or habitat patches. A key feature of many ecological networks is their organization into modules, which are subsets of elements that are more connected to each other than to the other elements in the network. We introduce MODULAR to perform rapid and autonomous calculation of modularity in sets of networks. MODULAR reads a set of files with matrices or edge lists that represent unipartite or bipartite networks, and identify modules using two different modularity metrics that have been previously used in studies of ecological networks. To find the network partition that maximizes modularity, the software offers five optimization methods to the user. We also included two of the most common null models that are used in studies of ecological networks to verify how the modularity found by the maximization of each metric differs from a theoretical benchmark.
[ { "version": "v1", "created": "Tue, 9 Apr 2013 14:37:44 GMT" } ]
2013-04-11T00:00:00
[ [ "Marquitti", "Flavia Maria Darcie", "" ], [ "Guimaraes", "Paulo Roberto", "Jr." ], [ "Pires", "Mathias Mistretta", "" ], [ "Bittencourt", "Luiz Fernando", "" ] ]
TITLE: MODULAR: Software for the Autonomous Computation of Modularity in Large Network Sets ABSTRACT: Ecological systems can be seen as networks of interactions between individual, species, or habitat patches. A key feature of many ecological networks is their organization into modules, which are subsets of elements that are more connected to each other than to the other elements in the network. We introduce MODULAR to perform rapid and autonomous calculation of modularity in sets of networks. MODULAR reads a set of files with matrices or edge lists that represent unipartite or bipartite networks, and identify modules using two different modularity metrics that have been previously used in studies of ecological networks. To find the network partition that maximizes modularity, the software offers five optimization methods to the user. We also included two of the most common null models that are used in studies of ecological networks to verify how the modularity found by the maximization of each metric differs from a theoretical benchmark.
no_new_dataset
0.708843
1209.1411
Chaoming Song Dr.
Chaoming Song, Dashun Wang, Albert-Laszlo Barabasi
Connections between Human Dynamics and Network Science
null
null
null
null
physics.soc-ph cond-mat.stat-mech cs.SI physics.data-an
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The increasing availability of large-scale data on human behavior has catalyzed simultaneous advances in network theory, capturing the scaling properties of the interactions between a large number of individuals, and human dynamics, quantifying the temporal characteristics of human activity patterns. These two areas remain disjoint, each pursuing as separate lines of inquiry. Here we report a series of generic relationships between the quantities characterizing these two areas by demonstrating that the degree and link weight distributions in social networks can be expressed in terms of the dynamical exponents characterizing human activity patterns. We test the validity of these theoretical predictions on datasets capturing various facets of human interactions, from mobile calls to tweets.
[ { "version": "v1", "created": "Thu, 6 Sep 2012 21:04:21 GMT" }, { "version": "v2", "created": "Mon, 8 Apr 2013 20:01:21 GMT" } ]
2013-04-10T00:00:00
[ [ "Song", "Chaoming", "" ], [ "Wang", "Dashun", "" ], [ "Barabasi", "Albert-Laszlo", "" ] ]
TITLE: Connections between Human Dynamics and Network Science ABSTRACT: The increasing availability of large-scale data on human behavior has catalyzed simultaneous advances in network theory, capturing the scaling properties of the interactions between a large number of individuals, and human dynamics, quantifying the temporal characteristics of human activity patterns. These two areas remain disjoint, each pursuing as separate lines of inquiry. Here we report a series of generic relationships between the quantities characterizing these two areas by demonstrating that the degree and link weight distributions in social networks can be expressed in terms of the dynamical exponents characterizing human activity patterns. We test the validity of these theoretical predictions on datasets capturing various facets of human interactions, from mobile calls to tweets.
no_new_dataset
0.70866
1304.2604
Jean Souviron
Jean Souviron
On the predictability of the number of convex vertices
6 pages, 6 figures
null
null
null
cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Convex hulls are a fundamental geometric tool used in a number of algorithms. As a side-effect of exhaustive tests for an algorithm for which a convex hull computation was the first step, interesting experimental results were found and are the sunject of this paper. They establish that the number of convex vertices of natural datasets can be predicted, if not precisely at least within a defined range. Namely it was found that the number of convex vertices of a dataset of N points lies in the range 2.35 N^0.091 <= h <= 19.19 N^0.091. This range obviously does not describe neither natural nor artificial worst-cases but corresponds to the distributions of natural data. This can be used for instance to define a starting size for pre-allocated arrays or to evaluate output-sensitive algorithms. A further consequence of these results is that the random models of data used to test convex hull algorithms should be bounded by rectangles and not as they usually are by circles if they want to represent accurately natural datasets
[ { "version": "v1", "created": "Tue, 9 Apr 2013 14:17:12 GMT" } ]
2013-04-10T00:00:00
[ [ "Souviron", "Jean", "" ] ]
TITLE: On the predictability of the number of convex vertices ABSTRACT: Convex hulls are a fundamental geometric tool used in a number of algorithms. As a side-effect of exhaustive tests for an algorithm for which a convex hull computation was the first step, interesting experimental results were found and are the sunject of this paper. They establish that the number of convex vertices of natural datasets can be predicted, if not precisely at least within a defined range. Namely it was found that the number of convex vertices of a dataset of N points lies in the range 2.35 N^0.091 <= h <= 19.19 N^0.091. This range obviously does not describe neither natural nor artificial worst-cases but corresponds to the distributions of natural data. This can be used for instance to define a starting size for pre-allocated arrays or to evaluate output-sensitive algorithms. A further consequence of these results is that the random models of data used to test convex hull algorithms should be bounded by rectangles and not as they usually are by circles if they want to represent accurately natural datasets
no_new_dataset
0.708175
1303.7390
Aasa Feragen
Aasa Feragen, Jens Petersen, Dominik Grimm, Asger Dirksen, Jesper Holst Pedersen, Karsten Borgwardt and Marleen de Bruijne
Geometric tree kernels: Classification of COPD from airway tree geometry
12 pages
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Methodological contributions: This paper introduces a family of kernels for analyzing (anatomical) trees endowed with vector valued measurements made along the tree. While state-of-the-art graph and tree kernels use combinatorial tree/graph structure with discrete node and edge labels, the kernels presented in this paper can include geometric information such as branch shape, branch radius or other vector valued properties. In addition to being flexible in their ability to model different types of attributes, the presented kernels are computationally efficient and some of them can easily be computed for large datasets (N of the order 10.000) of trees with 30-600 branches. Combining the kernels with standard machine learning tools enables us to analyze the relation between disease and anatomical tree structure and geometry. Experimental results: The kernels are used to compare airway trees segmented from low-dose CT, endowed with branch shape descriptors and airway wall area percentage measurements made along the tree. Using kernelized hypothesis testing we show that the geometric airway trees are significantly differently distributed in patients with Chronic Obstructive Pulmonary Disease (COPD) than in healthy individuals. The geometric tree kernels also give a significant increase in the classification accuracy of COPD from geometric tree structure endowed with airway wall thickness measurements in comparison with state-of-the-art methods, giving further insight into the relationship between airway wall thickness and COPD. Software: Software for computing kernels and statistical tests is available at http://image.diku.dk/aasa/software.php.
[ { "version": "v1", "created": "Fri, 29 Mar 2013 13:25:17 GMT" }, { "version": "v2", "created": "Mon, 8 Apr 2013 12:11:24 GMT" } ]
2013-04-09T00:00:00
[ [ "Feragen", "Aasa", "" ], [ "Petersen", "Jens", "" ], [ "Grimm", "Dominik", "" ], [ "Dirksen", "Asger", "" ], [ "Pedersen", "Jesper Holst", "" ], [ "Borgwardt", "Karsten", "" ], [ "de Bruijne", "Marleen", "" ] ]
TITLE: Geometric tree kernels: Classification of COPD from airway tree geometry ABSTRACT: Methodological contributions: This paper introduces a family of kernels for analyzing (anatomical) trees endowed with vector valued measurements made along the tree. While state-of-the-art graph and tree kernels use combinatorial tree/graph structure with discrete node and edge labels, the kernels presented in this paper can include geometric information such as branch shape, branch radius or other vector valued properties. In addition to being flexible in their ability to model different types of attributes, the presented kernels are computationally efficient and some of them can easily be computed for large datasets (N of the order 10.000) of trees with 30-600 branches. Combining the kernels with standard machine learning tools enables us to analyze the relation between disease and anatomical tree structure and geometry. Experimental results: The kernels are used to compare airway trees segmented from low-dose CT, endowed with branch shape descriptors and airway wall area percentage measurements made along the tree. Using kernelized hypothesis testing we show that the geometric airway trees are significantly differently distributed in patients with Chronic Obstructive Pulmonary Disease (COPD) than in healthy individuals. The geometric tree kernels also give a significant increase in the classification accuracy of COPD from geometric tree structure endowed with airway wall thickness measurements in comparison with state-of-the-art methods, giving further insight into the relationship between airway wall thickness and COPD. Software: Software for computing kernels and statistical tests is available at http://image.diku.dk/aasa/software.php.
no_new_dataset
0.712445
1304.1835
Alex Rubinsteyn
Eric Hielscher, Alex Rubinsteyn, Dennis Shasha
Locality Optimization for Data Parallel Programs
null
null
null
NYU CS TR2013-955
cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Productivity languages such as NumPy and Matlab make it much easier to implement data-intensive numerical algorithms. However, these languages can be intolerably slow for programs that don't map well to their built-in primitives. In this paper, we discuss locality optimizations for our system Parakeet, a just-in-time compiler and runtime system for an array-oriented subset of Python. Parakeet dynamically compiles whole user functions to high performance multi-threaded native code. Parakeet makes extensive use of the classic data parallel operators Map, Reduce, and Scan. We introduce a new set of data parallel operators,TiledMap, TiledReduce, and TiledScan, that break up their computations into local pieces of bounded size so as better to make use of small fast memories. We introduce a novel tiling transformation to generate tiled operators automatically. Applying this transformation once tiles the program for cache, and applying it again enables tiling for registers. The sizes for cache tiles are left unspecified until runtime, when an autotuning search is performed. Finally, we evaluate our optimizations on benchmarks and show significant speedups on programs that exhibit data locality.
[ { "version": "v1", "created": "Fri, 5 Apr 2013 23:52:00 GMT" } ]
2013-04-09T00:00:00
[ [ "Hielscher", "Eric", "" ], [ "Rubinsteyn", "Alex", "" ], [ "Shasha", "Dennis", "" ] ]
TITLE: Locality Optimization for Data Parallel Programs ABSTRACT: Productivity languages such as NumPy and Matlab make it much easier to implement data-intensive numerical algorithms. However, these languages can be intolerably slow for programs that don't map well to their built-in primitives. In this paper, we discuss locality optimizations for our system Parakeet, a just-in-time compiler and runtime system for an array-oriented subset of Python. Parakeet dynamically compiles whole user functions to high performance multi-threaded native code. Parakeet makes extensive use of the classic data parallel operators Map, Reduce, and Scan. We introduce a new set of data parallel operators,TiledMap, TiledReduce, and TiledScan, that break up their computations into local pieces of bounded size so as better to make use of small fast memories. We introduce a novel tiling transformation to generate tiled operators automatically. Applying this transformation once tiles the program for cache, and applying it again enables tiling for registers. The sizes for cache tiles are left unspecified until runtime, when an autotuning search is performed. Finally, we evaluate our optimizations on benchmarks and show significant speedups on programs that exhibit data locality.
no_new_dataset
0.706165
1304.1924
Shuguang Han
Shuguang Han, Zhen Yue, Daqing He
Automatic Detection of Search Tactic in Individual Information Seeking: A Hidden Markov Model Approach
5 pages, 3 figures, 3 tables
null
null
null
cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Information seeking process is an important topic in information seeking behavior research. Both qualitative and empirical methods have been adopted in analyzing information seeking processes, with major focus on uncovering the latent search tactics behind user behaviors. Most of the existing works require defining search tactics in advance and coding data manually. Among the few works that can recognize search tactics automatically, they missed making sense of those tactics. In this paper, we proposed using an automatic technique, i.e. the Hidden Markov Model (HMM), to explicitly model the search tactics. HMM results show that the identified search tactics of individual information seeking behaviors are consistent with Marchioninis Information seeking process model. With the advantages of showing the connections between search tactics and search actions and the transitions among search tactics, we argue that HMM is a useful tool to investigate information seeking process, or at least it provides a feasible way to analyze large scale dataset.
[ { "version": "v1", "created": "Sat, 6 Apr 2013 19:13:41 GMT" } ]
2013-04-09T00:00:00
[ [ "Han", "Shuguang", "" ], [ "Yue", "Zhen", "" ], [ "He", "Daqing", "" ] ]
TITLE: Automatic Detection of Search Tactic in Individual Information Seeking: A Hidden Markov Model Approach ABSTRACT: Information seeking process is an important topic in information seeking behavior research. Both qualitative and empirical methods have been adopted in analyzing information seeking processes, with major focus on uncovering the latent search tactics behind user behaviors. Most of the existing works require defining search tactics in advance and coding data manually. Among the few works that can recognize search tactics automatically, they missed making sense of those tactics. In this paper, we proposed using an automatic technique, i.e. the Hidden Markov Model (HMM), to explicitly model the search tactics. HMM results show that the identified search tactics of individual information seeking behaviors are consistent with Marchioninis Information seeking process model. With the advantages of showing the connections between search tactics and search actions and the transitions among search tactics, we argue that HMM is a useful tool to investigate information seeking process, or at least it provides a feasible way to analyze large scale dataset.
no_new_dataset
0.70978
1304.1979
Esteban Moro
Giovanna Miritello, Rub\'en Lara, Manuel Cebri\'an, and Esteban Moro
Limited communication capacity unveils strategies for human interaction
Main Text: 8 pages, 5 figures. Supplementary info: 8 pages, 8 figures
null
null
null
physics.soc-ph cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Social connectivity is the key process that characterizes the structural properties of social networks and in turn processes such as navigation, influence or information diffusion. Since time, attention and cognition are inelastic resources, humans should have a predefined strategy to manage their social interactions over time. However, the limited observational length of existing human interaction datasets, together with the bursty nature of dyadic communications have hampered the observation of tie dynamics in social networks. Here we develop a method for the detection of tie activation/deactivation, and apply it to a large longitudinal, cross-sectional communication dataset ($\approx$ 19 months, $\approx$ 20 million people). Contrary to the perception of ever-growing connectivity, we observe that individuals exhibit a finite communication capacity, which limits the number of ties they can maintain active. In particular we find that men have an overall higher communication capacity than women and that this capacity decreases gradually for both sexes over the lifespan of individuals (16-70 years). We are then able to separate communication capacity from communication activity, revealing a diverse range of tie activation patterns, from stable to exploratory. We find that, in simulation, individuals exhibiting exploratory strategies display longer time to receive information spreading in the network those individuals with stable strategies. Our principled method to determine the communication capacity of an individual allows us to quantify how strategies for human interaction shape the dynamical evolution of social networks.
[ { "version": "v1", "created": "Sun, 7 Apr 2013 11:00:16 GMT" } ]
2013-04-09T00:00:00
[ [ "Miritello", "Giovanna", "" ], [ "Lara", "Rubén", "" ], [ "Cebrián", "Manuel", "" ], [ "Moro", "Esteban", "" ] ]
TITLE: Limited communication capacity unveils strategies for human interaction ABSTRACT: Social connectivity is the key process that characterizes the structural properties of social networks and in turn processes such as navigation, influence or information diffusion. Since time, attention and cognition are inelastic resources, humans should have a predefined strategy to manage their social interactions over time. However, the limited observational length of existing human interaction datasets, together with the bursty nature of dyadic communications have hampered the observation of tie dynamics in social networks. Here we develop a method for the detection of tie activation/deactivation, and apply it to a large longitudinal, cross-sectional communication dataset ($\approx$ 19 months, $\approx$ 20 million people). Contrary to the perception of ever-growing connectivity, we observe that individuals exhibit a finite communication capacity, which limits the number of ties they can maintain active. In particular we find that men have an overall higher communication capacity than women and that this capacity decreases gradually for both sexes over the lifespan of individuals (16-70 years). We are then able to separate communication capacity from communication activity, revealing a diverse range of tie activation patterns, from stable to exploratory. We find that, in simulation, individuals exhibiting exploratory strategies display longer time to receive information spreading in the network those individuals with stable strategies. Our principled method to determine the communication capacity of an individual allows us to quantify how strategies for human interaction shape the dynamical evolution of social networks.
no_new_dataset
0.704732
1304.2133
Conrad Sanderson
Yongkang Wong, Conrad Sanderson, Sandra Mau, Brian C. Lovell
Dynamic Amelioration of Resolution Mismatches for Local Feature Based Identity Inference
null
International Conference on Pattern Recognition (ICPR), pp. 1200-1203, 2010
10.1109/ICPR.2010.299
null
cs.CV cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
While existing face recognition systems based on local features are robust to issues such as misalignment, they can exhibit accuracy degradation when comparing images of differing resolutions. This is common in surveillance environments where a gallery of high resolution mugshots is compared to low resolution CCTV probe images, or where the size of a given image is not a reliable indicator of the underlying resolution (eg. poor optics). To alleviate this degradation, we propose a compensation framework which dynamically chooses the most appropriate face recognition system for a given pair of image resolutions. This framework applies a novel resolution detection method which does not rely on the size of the input images, but instead exploits the sensitivity of local features to resolution using a probabilistic multi-region histogram approach. Experiments on a resolution-modified version of the "Labeled Faces in the Wild" dataset show that the proposed resolution detector frontend obtains a 99% average accuracy in selecting the most appropriate face recognition system, resulting in higher overall face discrimination accuracy (across several resolutions) compared to the individual baseline face recognition systems.
[ { "version": "v1", "created": "Mon, 8 Apr 2013 08:36:55 GMT" } ]
2013-04-09T00:00:00
[ [ "Wong", "Yongkang", "" ], [ "Sanderson", "Conrad", "" ], [ "Mau", "Sandra", "" ], [ "Lovell", "Brian C.", "" ] ]
TITLE: Dynamic Amelioration of Resolution Mismatches for Local Feature Based Identity Inference ABSTRACT: While existing face recognition systems based on local features are robust to issues such as misalignment, they can exhibit accuracy degradation when comparing images of differing resolutions. This is common in surveillance environments where a gallery of high resolution mugshots is compared to low resolution CCTV probe images, or where the size of a given image is not a reliable indicator of the underlying resolution (eg. poor optics). To alleviate this degradation, we propose a compensation framework which dynamically chooses the most appropriate face recognition system for a given pair of image resolutions. This framework applies a novel resolution detection method which does not rely on the size of the input images, but instead exploits the sensitivity of local features to resolution using a probabilistic multi-region histogram approach. Experiments on a resolution-modified version of the "Labeled Faces in the Wild" dataset show that the proposed resolution detector frontend obtains a 99% average accuracy in selecting the most appropriate face recognition system, resulting in higher overall face discrimination accuracy (across several resolutions) compared to the individual baseline face recognition systems.
no_new_dataset
0.707979
1212.6276
Sebasti\'an Basterrech
Sebasti\'an Basterrech and Gerardo Rubino
Echo State Queueing Network: a new reservoir computing learning tool
Proceedings of the 10th IEEE Consumer Communications and Networking Conference (CCNC), Las Vegas, USA, 2013
null
10.1109/CCNC.2013.6488435
null
cs.NE cs.AI cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In the last decade, a new computational paradigm was introduced in the field of Machine Learning, under the name of Reservoir Computing (RC). RC models are neural networks which a recurrent part (the reservoir) that does not participate in the learning process, and the rest of the system where no recurrence (no neural circuit) occurs. This approach has grown rapidly due to its success in solving learning tasks and other computational applications. Some success was also observed with another recently proposed neural network designed using Queueing Theory, the Random Neural Network (RandNN). Both approaches have good properties and identified drawbacks. In this paper, we propose a new RC model called Echo State Queueing Network (ESQN), where we use ideas coming from RandNNs for the design of the reservoir. ESQNs consist in ESNs where the reservoir has a new dynamics inspired by recurrent RandNNs. The paper positions ESQNs in the global Machine Learning area, and provides examples of their use and performances. We show on largely used benchmarks that ESQNs are very accurate tools, and we illustrate how they compare with standard ESNs.
[ { "version": "v1", "created": "Wed, 26 Dec 2012 22:31:13 GMT" } ]
2013-04-08T00:00:00
[ [ "Basterrech", "Sebastián", "" ], [ "Rubino", "Gerardo", "" ] ]
TITLE: Echo State Queueing Network: a new reservoir computing learning tool ABSTRACT: In the last decade, a new computational paradigm was introduced in the field of Machine Learning, under the name of Reservoir Computing (RC). RC models are neural networks which a recurrent part (the reservoir) that does not participate in the learning process, and the rest of the system where no recurrence (no neural circuit) occurs. This approach has grown rapidly due to its success in solving learning tasks and other computational applications. Some success was also observed with another recently proposed neural network designed using Queueing Theory, the Random Neural Network (RandNN). Both approaches have good properties and identified drawbacks. In this paper, we propose a new RC model called Echo State Queueing Network (ESQN), where we use ideas coming from RandNNs for the design of the reservoir. ESQNs consist in ESNs where the reservoir has a new dynamics inspired by recurrent RandNNs. The paper positions ESQNs in the global Machine Learning area, and provides examples of their use and performances. We show on largely used benchmarks that ESQNs are very accurate tools, and we illustrate how they compare with standard ESNs.
no_new_dataset
0.71
1304.1712
Michele Coscia
Michele Coscia
Competition and Success in the Meme Pool: a Case Study on Quickmeme.com
null
International Conference of Weblogs and Social Media, 2013
null
null
physics.soc-ph cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The advent of social media has provided data and insights about how people relate to information and culture. While information is composed by bits and its fundamental building bricks are relatively well understood, the same cannot be said for culture. The fundamental cultural unit has been defined as a "meme". Memes are defined in literature as specific fundamental cultural traits, that are floating in their environment together. Just like genes carried by bodies, memes are carried by cultural manifestations like songs, buildings or pictures. Memes are studied in their competition for being successfully passed from one generation of minds to another, in different ways. In this paper we choose an empirical approach to the study of memes. We downloaded data about memes from a well-known website hosting hundreds of different memes and thousands of their implementations. From this data, we empirically describe the behavior of these memes. We statistically describe meme occurrences in our dataset and we delineate their fundamental traits, along with those traits that make them more or less apt to be successful.
[ { "version": "v1", "created": "Fri, 5 Apr 2013 13:52:55 GMT" } ]
2013-04-08T00:00:00
[ [ "Coscia", "Michele", "" ] ]
TITLE: Competition and Success in the Meme Pool: a Case Study on Quickmeme.com ABSTRACT: The advent of social media has provided data and insights about how people relate to information and culture. While information is composed by bits and its fundamental building bricks are relatively well understood, the same cannot be said for culture. The fundamental cultural unit has been defined as a "meme". Memes are defined in literature as specific fundamental cultural traits, that are floating in their environment together. Just like genes carried by bodies, memes are carried by cultural manifestations like songs, buildings or pictures. Memes are studied in their competition for being successfully passed from one generation of minds to another, in different ways. In this paper we choose an empirical approach to the study of memes. We downloaded data about memes from a well-known website hosting hundreds of different memes and thousands of their implementations. From this data, we empirically describe the behavior of these memes. We statistically describe meme occurrences in our dataset and we delineate their fundamental traits, along with those traits that make them more or less apt to be successful.
new_dataset
0.67686
1204.1259
Bal\'azs Hidasi
Bal\'azs Hidasi, Domonkos Tikk
Fast ALS-based tensor factorization for context-aware recommendation from implicit feedback
Accepted for ECML/PKDD 2012, presented on 25th September 2012, Bristol, UK
Proceedings of the 2012 European conference on Machine Learning and Knowledge Discovery in Databases - Volume Part II
10.1007/978-3-642-33486-3_5
null
cs.LG cs.IR cs.NA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Albeit, the implicit feedback based recommendation problem - when only the user history is available but there are no ratings - is the most typical setting in real-world applications, it is much less researched than the explicit feedback case. State-of-the-art algorithms that are efficient on the explicit case cannot be straightforwardly transformed to the implicit case if scalability should be maintained. There are few if any implicit feedback benchmark datasets, therefore new ideas are usually experimented on explicit benchmarks. In this paper, we propose a generic context-aware implicit feedback recommender algorithm, coined iTALS. iTALS apply a fast, ALS-based tensor factorization learning method that scales linearly with the number of non-zero elements in the tensor. The method also allows us to incorporate diverse context information into the model while maintaining its computational efficiency. In particular, we present two such context-aware implementation variants of iTALS. The first incorporates seasonality and enables to distinguish user behavior in different time intervals. The other views the user history as sequential information and has the ability to recognize usage pattern typical to certain group of items, e.g. to automatically tell apart product types or categories that are typically purchased repetitively (collectibles, grocery goods) or once (household appliances). Experiments performed on three implicit datasets (two proprietary ones and an implicit variant of the Netflix dataset) show that by integrating context-aware information with our factorization framework into the state-of-the-art implicit recommender algorithm the recommendation quality improves significantly.
[ { "version": "v1", "created": "Thu, 5 Apr 2012 15:34:30 GMT" }, { "version": "v2", "created": "Thu, 4 Apr 2013 15:33:31 GMT" } ]
2013-04-05T00:00:00
[ [ "Hidasi", "Balázs", "" ], [ "Tikk", "Domonkos", "" ] ]
TITLE: Fast ALS-based tensor factorization for context-aware recommendation from implicit feedback ABSTRACT: Albeit, the implicit feedback based recommendation problem - when only the user history is available but there are no ratings - is the most typical setting in real-world applications, it is much less researched than the explicit feedback case. State-of-the-art algorithms that are efficient on the explicit case cannot be straightforwardly transformed to the implicit case if scalability should be maintained. There are few if any implicit feedback benchmark datasets, therefore new ideas are usually experimented on explicit benchmarks. In this paper, we propose a generic context-aware implicit feedback recommender algorithm, coined iTALS. iTALS apply a fast, ALS-based tensor factorization learning method that scales linearly with the number of non-zero elements in the tensor. The method also allows us to incorporate diverse context information into the model while maintaining its computational efficiency. In particular, we present two such context-aware implementation variants of iTALS. The first incorporates seasonality and enables to distinguish user behavior in different time intervals. The other views the user history as sequential information and has the ability to recognize usage pattern typical to certain group of items, e.g. to automatically tell apart product types or categories that are typically purchased repetitively (collectibles, grocery goods) or once (household appliances). Experiments performed on three implicit datasets (two proprietary ones and an implicit variant of the Netflix dataset) show that by integrating context-aware information with our factorization framework into the state-of-the-art implicit recommender algorithm the recommendation quality improves significantly.
no_new_dataset
0.711224
1304.1262
Conrad Sanderson
Arnold Wiliem, Yongkang Wong, Conrad Sanderson, Peter Hobson, Shaokang Chen, Brian C. Lovell
Classification of Human Epithelial Type 2 Cell Indirect Immunofluoresence Images via Codebook Based Descriptors
null
IEEE Workshop on Applications of Computer Vision (WACV), pp. 95-102, 2013
10.1109/WACV.2013.6475005
null
q-bio.CB cs.CV q-bio.QM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Anti-Nuclear Antibody (ANA) clinical pathology test is commonly used to identify the existence of various diseases. A hallmark method for identifying the presence of ANAs is the Indirect Immunofluorescence method on Human Epithelial (HEp-2) cells, due to its high sensitivity and the large range of antigens that can be detected. However, the method suffers from numerous shortcomings, such as being subjective as well as time and labour intensive. Computer Aided Diagnostic (CAD) systems have been developed to address these problems, which automatically classify a HEp-2 cell image into one of its known patterns (eg., speckled, homogeneous). Most of the existing CAD systems use handpicked features to represent a HEp-2 cell image, which may only work in limited scenarios. In this paper, we propose a cell classification system comprised of a dual-region codebook-based descriptor, combined with the Nearest Convex Hull Classifier. We evaluate the performance of several variants of the descriptor on two publicly available datasets: ICPR HEp-2 cell classification contest dataset and the new SNPHEp-2 dataset. To our knowledge, this is the first time codebook-based descriptors are applied and studied in this domain. Experiments show that the proposed system has consistent high performance and is more robust than two recent CAD systems.
[ { "version": "v1", "created": "Thu, 4 Apr 2013 07:51:32 GMT" } ]
2013-04-05T00:00:00
[ [ "Wiliem", "Arnold", "" ], [ "Wong", "Yongkang", "" ], [ "Sanderson", "Conrad", "" ], [ "Hobson", "Peter", "" ], [ "Chen", "Shaokang", "" ], [ "Lovell", "Brian C.", "" ] ]
TITLE: Classification of Human Epithelial Type 2 Cell Indirect Immunofluoresence Images via Codebook Based Descriptors ABSTRACT: The Anti-Nuclear Antibody (ANA) clinical pathology test is commonly used to identify the existence of various diseases. A hallmark method for identifying the presence of ANAs is the Indirect Immunofluorescence method on Human Epithelial (HEp-2) cells, due to its high sensitivity and the large range of antigens that can be detected. However, the method suffers from numerous shortcomings, such as being subjective as well as time and labour intensive. Computer Aided Diagnostic (CAD) systems have been developed to address these problems, which automatically classify a HEp-2 cell image into one of its known patterns (eg., speckled, homogeneous). Most of the existing CAD systems use handpicked features to represent a HEp-2 cell image, which may only work in limited scenarios. In this paper, we propose a cell classification system comprised of a dual-region codebook-based descriptor, combined with the Nearest Convex Hull Classifier. We evaluate the performance of several variants of the descriptor on two publicly available datasets: ICPR HEp-2 cell classification contest dataset and the new SNPHEp-2 dataset. To our knowledge, this is the first time codebook-based descriptors are applied and studied in this domain. Experiments show that the proposed system has consistent high performance and is more robust than two recent CAD systems.
no_new_dataset
0.597667
1304.1391
Sachin Talathi
Manu Nandan, Pramod P. Khargonekar, Sachin S. Talathi
Fast SVM training using approximate extreme points
The manuscript in revised form has been submitted to J. Machine Learning Research
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Applications of non-linear kernel Support Vector Machines (SVMs) to large datasets is seriously hampered by its excessive training time. We propose a modification, called the approximate extreme points support vector machine (AESVM), that is aimed at overcoming this burden. Our approach relies on conducting the SVM optimization over a carefully selected subset, called the representative set, of the training dataset. We present analytical results that indicate the similarity of AESVM and SVM solutions. A linear time algorithm based on convex hulls and extreme points is used to compute the representative set in kernel space. Extensive computational experiments on nine datasets compared AESVM to LIBSVM \citep{LIBSVM}, CVM \citep{Tsang05}, BVM \citep{Tsang07}, LASVM \citep{Bordes05}, $\text{SVM}^{\text{perf}}$ \citep{Joachims09}, and the random features method \citep{rahimi07}. Our AESVM implementation was found to train much faster than the other methods, while its classification accuracy was similar to that of LIBSVM in all cases. In particular, for a seizure detection dataset, AESVM training was almost $10^3$ times faster than LIBSVM and LASVM and more than forty times faster than CVM and BVM. Additionally, AESVM also gave competitively fast classification times.
[ { "version": "v1", "created": "Thu, 4 Apr 2013 15:08:31 GMT" } ]
2013-04-05T00:00:00
[ [ "Nandan", "Manu", "" ], [ "Khargonekar", "Pramod P.", "" ], [ "Talathi", "Sachin S.", "" ] ]
TITLE: Fast SVM training using approximate extreme points ABSTRACT: Applications of non-linear kernel Support Vector Machines (SVMs) to large datasets is seriously hampered by its excessive training time. We propose a modification, called the approximate extreme points support vector machine (AESVM), that is aimed at overcoming this burden. Our approach relies on conducting the SVM optimization over a carefully selected subset, called the representative set, of the training dataset. We present analytical results that indicate the similarity of AESVM and SVM solutions. A linear time algorithm based on convex hulls and extreme points is used to compute the representative set in kernel space. Extensive computational experiments on nine datasets compared AESVM to LIBSVM \citep{LIBSVM}, CVM \citep{Tsang05}, BVM \citep{Tsang07}, LASVM \citep{Bordes05}, $\text{SVM}^{\text{perf}}$ \citep{Joachims09}, and the random features method \citep{rahimi07}. Our AESVM implementation was found to train much faster than the other methods, while its classification accuracy was similar to that of LIBSVM in all cases. In particular, for a seizure detection dataset, AESVM training was almost $10^3$ times faster than LIBSVM and LASVM and more than forty times faster than CVM and BVM. Additionally, AESVM also gave competitively fast classification times.
no_new_dataset
0.709636
1302.6396
Michael Schreiber
Michael Schreiber
How to derive an advantage from the arbitrariness of the g-index
13 pages, 3 tables, 3 figures, accepted for publication in Journal of Informetrics
Journal of Informetrics, 7, 555-561 (2013)
10.1016/j.joi.2013.02.003
null
physics.soc-ph cs.DL
http://creativecommons.org/licenses/by-nc-sa/3.0/
The definition of the g-index is as arbitrary as that of the h-index, because the threshold number g^2 of citations to the g most cited papers can be modified by a prefactor at one's discretion, thus taking into account more or less of the highly cited publications within a dataset. In a case study I investigate the citation records of 26 physicists and show that the prefactor influences the ranking in terms of the generalized g-index less than for the generalized h-index. I propose specifically a prefactor of 2 for the g-index, because then the resulting values are of the same order of magnitude as for the common h-index. In this way one can avoid the disadvantage of the original g-index, namely that the values are usually substantially larger than for the h-index and thus the precision problem is substantially larger; while the advantages of the g-index over the h-index are kept. Like for the generalized h-index, also for the generalized g-index different prefactors might be more useful for investigations which concentrate only on top scientists with high citation frequencies or on junior researchers with small numbers of citations.
[ { "version": "v1", "created": "Tue, 26 Feb 2013 11:24:25 GMT" } ]
2013-04-04T00:00:00
[ [ "Schreiber", "Michael", "" ] ]
TITLE: How to derive an advantage from the arbitrariness of the g-index ABSTRACT: The definition of the g-index is as arbitrary as that of the h-index, because the threshold number g^2 of citations to the g most cited papers can be modified by a prefactor at one's discretion, thus taking into account more or less of the highly cited publications within a dataset. In a case study I investigate the citation records of 26 physicists and show that the prefactor influences the ranking in terms of the generalized g-index less than for the generalized h-index. I propose specifically a prefactor of 2 for the g-index, because then the resulting values are of the same order of magnitude as for the common h-index. In this way one can avoid the disadvantage of the original g-index, namely that the values are usually substantially larger than for the h-index and thus the precision problem is substantially larger; while the advantages of the g-index over the h-index are kept. Like for the generalized h-index, also for the generalized g-index different prefactors might be more useful for investigations which concentrate only on top scientists with high citation frequencies or on junior researchers with small numbers of citations.
no_new_dataset
0.709044
1304.0886
Conrad Sanderson
Vikas Reddy, Conrad Sanderson, Brian C. Lovell
Improved Anomaly Detection in Crowded Scenes via Cell-based Analysis of Foreground Speed, Size and Texture
null
IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), pp. 55-61, 2011
10.1109/CVPRW.2011.5981799
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A robust and efficient anomaly detection technique is proposed, capable of dealing with crowded scenes where traditional tracking based approaches tend to fail. Initial foreground segmentation of the input frames confines the analysis to foreground objects and effectively ignores irrelevant background dynamics. Input frames are split into non-overlapping cells, followed by extracting features based on motion, size and texture from each cell. Each feature type is independently analysed for the presence of an anomaly. Unlike most methods, a refined estimate of object motion is achieved by computing the optical flow of only the foreground pixels. The motion and size features are modelled by an approximated version of kernel density estimation, which is computationally efficient even for large training datasets. Texture features are modelled by an adaptively grown codebook, with the number of entries in the codebook selected in an online fashion. Experiments on the recently published UCSD Anomaly Detection dataset show that the proposed method obtains considerably better results than three recent approaches: MPPCA, social force, and mixture of dynamic textures (MDT). The proposed method is also several orders of magnitude faster than MDT, the next best performing method.
[ { "version": "v1", "created": "Wed, 3 Apr 2013 09:31:27 GMT" } ]
2013-04-04T00:00:00
[ [ "Reddy", "Vikas", "" ], [ "Sanderson", "Conrad", "" ], [ "Lovell", "Brian C.", "" ] ]
TITLE: Improved Anomaly Detection in Crowded Scenes via Cell-based Analysis of Foreground Speed, Size and Texture ABSTRACT: A robust and efficient anomaly detection technique is proposed, capable of dealing with crowded scenes where traditional tracking based approaches tend to fail. Initial foreground segmentation of the input frames confines the analysis to foreground objects and effectively ignores irrelevant background dynamics. Input frames are split into non-overlapping cells, followed by extracting features based on motion, size and texture from each cell. Each feature type is independently analysed for the presence of an anomaly. Unlike most methods, a refined estimate of object motion is achieved by computing the optical flow of only the foreground pixels. The motion and size features are modelled by an approximated version of kernel density estimation, which is computationally efficient even for large training datasets. Texture features are modelled by an adaptively grown codebook, with the number of entries in the codebook selected in an online fashion. Experiments on the recently published UCSD Anomaly Detection dataset show that the proposed method obtains considerably better results than three recent approaches: MPPCA, social force, and mixture of dynamic textures (MDT). The proposed method is also several orders of magnitude faster than MDT, the next best performing method.
no_new_dataset
0.711205
1304.0897
Martin Suda
Martin Suda
Duality in STRIPS planning
6 pages (two columns), 4 tables
null
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We describe a duality mapping between STRIPS planning tasks. By exchanging the initial and goal conditions, taking their respective complements, and swapping for every action its precondition and delete list, one obtains for every STRIPS task its dual version, which has a solution if and only if the original does. This is proved by showing that the described transformation essentially turns progression (forward search) into regression (backward search) and vice versa. The duality sheds new light on STRIPS planning by allowing a transfer of ideas from one search approach to the other. It can be used to construct new algorithms from old ones, or (equivalently) to obtain new benchmarks from existing ones. Experiments show that the dual versions of IPC benchmarks are in general quite difficult for modern planners. This may be seen as a new challenge. On the other hand, the cases where the dual versions are easier to solve demonstrate that the duality can also be made useful in practice.
[ { "version": "v1", "created": "Wed, 3 Apr 2013 10:08:56 GMT" } ]
2013-04-04T00:00:00
[ [ "Suda", "Martin", "" ] ]
TITLE: Duality in STRIPS planning ABSTRACT: We describe a duality mapping between STRIPS planning tasks. By exchanging the initial and goal conditions, taking their respective complements, and swapping for every action its precondition and delete list, one obtains for every STRIPS task its dual version, which has a solution if and only if the original does. This is proved by showing that the described transformation essentially turns progression (forward search) into regression (backward search) and vice versa. The duality sheds new light on STRIPS planning by allowing a transfer of ideas from one search approach to the other. It can be used to construct new algorithms from old ones, or (equivalently) to obtain new benchmarks from existing ones. Experiments show that the dual versions of IPC benchmarks are in general quite difficult for modern planners. This may be seen as a new challenge. On the other hand, the cases where the dual versions are easier to solve demonstrate that the duality can also be made useful in practice.
no_new_dataset
0.71081
1304.0913
Morteza Ansarinia
Ahmad Salahi, Morteza Ansarinia
Predicting Network Attacks Using Ontology-Driven Inference
9 pages
International Journal of Information and Communication Technology (IJICT), Volume 4, Issue 1, 2012
null
null
cs.AI cs.CR cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Graph knowledge models and ontologies are very powerful modeling and re asoning tools. We propose an effective approach to model network attacks and attack prediction which plays important roles in security management. The goals of this study are: First we model network attacks, their prerequisites and consequences using knowledge representation methods in order to provide description logic reasoning and inference over attack domain concepts. And secondly, we propose an ontology-based system which predicts potential attacks using inference and observing information which provided by sensory inputs. We generate our ontology and evaluate corresponding methods using CAPEC, CWE, and CVE hierarchical datasets. Results from experiments show significant capability improvements comparing to traditional hierarchical and relational models. Proposed method also reduces false alarms and improves intrusion detection effectiveness.
[ { "version": "v1", "created": "Wed, 3 Apr 2013 11:04:38 GMT" } ]
2013-04-04T00:00:00
[ [ "Salahi", "Ahmad", "" ], [ "Ansarinia", "Morteza", "" ] ]
TITLE: Predicting Network Attacks Using Ontology-Driven Inference ABSTRACT: Graph knowledge models and ontologies are very powerful modeling and re asoning tools. We propose an effective approach to model network attacks and attack prediction which plays important roles in security management. The goals of this study are: First we model network attacks, their prerequisites and consequences using knowledge representation methods in order to provide description logic reasoning and inference over attack domain concepts. And secondly, we propose an ontology-based system which predicts potential attacks using inference and observing information which provided by sensory inputs. We generate our ontology and evaluate corresponding methods using CAPEC, CWE, and CVE hierarchical datasets. Results from experiments show significant capability improvements comparing to traditional hierarchical and relational models. Proposed method also reduces false alarms and improves intrusion detection effectiveness.
no_new_dataset
0.709648
1103.2596
Lovro \v{S}ubelj
Lovro \v{S}ubelj and Marko Bajec
Unfolding network communities by combining defensive and offensive label propagation
null
Proceedings of the ECML PKDD Workshop on the Analysis of Complex Networks 2010 (ACNE '10), pp. 87-104
null
null
physics.soc-ph cs.SI physics.data-an
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Label propagation has proven to be a fast method for detecting communities in complex networks. Recent work has also improved the accuracy and stability of the basic algorithm, however, a general approach is still an open issue. We propose different label propagation algorithms that convey two unique strategies of community formation, namely, defensive preservation and offensive expansion of communities. Furthermore, the strategies are combined in an advanced label propagation algorithm that retains the advantages of both approaches; and are enhanced with hierarchical community extraction, prominent for the use on larger networks. The proposed algorithms were empirically evaluated on different benchmarks networks with planted partition and on over 30 real-world networks of various types and sizes. The results confirm the adequacy of the propositions and give promising grounds for future analysis of (large) complex networks. Nevertheless, the main contribution of this work is in showing that different types of networks (with different topological properties) favor different strategies of community formation.
[ { "version": "v1", "created": "Mon, 14 Mar 2011 07:29:30 GMT" } ]
2013-04-03T00:00:00
[ [ "Šubelj", "Lovro", "" ], [ "Bajec", "Marko", "" ] ]
TITLE: Unfolding network communities by combining defensive and offensive label propagation ABSTRACT: Label propagation has proven to be a fast method for detecting communities in complex networks. Recent work has also improved the accuracy and stability of the basic algorithm, however, a general approach is still an open issue. We propose different label propagation algorithms that convey two unique strategies of community formation, namely, defensive preservation and offensive expansion of communities. Furthermore, the strategies are combined in an advanced label propagation algorithm that retains the advantages of both approaches; and are enhanced with hierarchical community extraction, prominent for the use on larger networks. The proposed algorithms were empirically evaluated on different benchmarks networks with planted partition and on over 30 real-world networks of various types and sizes. The results confirm the adequacy of the propositions and give promising grounds for future analysis of (large) complex networks. Nevertheless, the main contribution of this work is in showing that different types of networks (with different topological properties) favor different strategies of community formation.
no_new_dataset
0.708572
1212.0142
Pierre Sermanet
Pierre Sermanet and Koray Kavukcuoglu and Soumith Chintala and Yann LeCun
Pedestrian Detection with Unsupervised Multi-Stage Feature Learning
12 pages
null
null
null
cs.CV cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Pedestrian detection is a problem of considerable practical interest. Adding to the list of successful applications of deep learning methods to vision, we report state-of-the-art and competitive results on all major pedestrian datasets with a convolutional network model. The model uses a few new twists, such as multi-stage features, connections that skip layers to integrate global shape information with local distinctive motif information, and an unsupervised method based on convolutional sparse coding to pre-train the filters at each stage.
[ { "version": "v1", "created": "Sat, 1 Dec 2012 18:13:03 GMT" }, { "version": "v2", "created": "Tue, 2 Apr 2013 18:05:46 GMT" } ]
2013-04-03T00:00:00
[ [ "Sermanet", "Pierre", "" ], [ "Kavukcuoglu", "Koray", "" ], [ "Chintala", "Soumith", "" ], [ "LeCun", "Yann", "" ] ]
TITLE: Pedestrian Detection with Unsupervised Multi-Stage Feature Learning ABSTRACT: Pedestrian detection is a problem of considerable practical interest. Adding to the list of successful applications of deep learning methods to vision, we report state-of-the-art and competitive results on all major pedestrian datasets with a convolutional network model. The model uses a few new twists, such as multi-stage features, connections that skip layers to integrate global shape information with local distinctive motif information, and an unsupervised method based on convolutional sparse coding to pre-train the filters at each stage.
no_new_dataset
0.709057
1304.0725
Ashok P
P. Ashok, G.M Kadhar Nawaz, E. Elayaraja, V. Vadivel
Improved Performance of Unsupervised Method by Renovated K-Means
7 pages, to strengthen the k means algorithm
null
null
null
cs.LG cs.CV stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Clustering is a separation of data into groups of similar objects. Every group called cluster consists of objects that are similar to one another and dissimilar to objects of other groups. In this paper, the K-Means algorithm is implemented by three distance functions and to identify the optimal distance function for clustering methods. The proposed K-Means algorithm is compared with K-Means, Static Weighted K-Means (SWK-Means) and Dynamic Weighted K-Means (DWK-Means) algorithm by using Davis Bouldin index, Execution Time and Iteration count methods. Experimental results show that the proposed K-Means algorithm performed better on Iris and Wine dataset when compared with other three clustering methods.
[ { "version": "v1", "created": "Mon, 11 Mar 2013 05:28:06 GMT" } ]
2013-04-03T00:00:00
[ [ "Ashok", "P.", "" ], [ "Nawaz", "G. M Kadhar", "" ], [ "Elayaraja", "E.", "" ], [ "Vadivel", "V.", "" ] ]
TITLE: Improved Performance of Unsupervised Method by Renovated K-Means ABSTRACT: Clustering is a separation of data into groups of similar objects. Every group called cluster consists of objects that are similar to one another and dissimilar to objects of other groups. In this paper, the K-Means algorithm is implemented by three distance functions and to identify the optimal distance function for clustering methods. The proposed K-Means algorithm is compared with K-Means, Static Weighted K-Means (SWK-Means) and Dynamic Weighted K-Means (DWK-Means) algorithm by using Davis Bouldin index, Execution Time and Iteration count methods. Experimental results show that the proposed K-Means algorithm performed better on Iris and Wine dataset when compared with other three clustering methods.
no_new_dataset
0.71103
1302.2073
Clemens Hage
Florian Seidel and Clemens Hage and Martin Kleinsteuber
pROST : A Smoothed Lp-norm Robust Online Subspace Tracking Method for Realtime Background Subtraction in Video
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
An increasing number of methods for background subtraction use Robust PCA to identify sparse foreground objects. While many algorithms use the L1-norm as a convex relaxation of the ideal sparsifying function, we approach the problem with a smoothed Lp-norm and present pROST, a method for robust online subspace tracking. The algorithm is based on alternating minimization on manifolds. Implemented on a graphics processing unit it achieves realtime performance. Experimental results on a state-of-the-art benchmark for background subtraction on real-world video data indicate that the method succeeds at a broad variety of background subtraction scenarios, and it outperforms competing approaches when video quality is deteriorated by camera jitter.
[ { "version": "v1", "created": "Fri, 8 Feb 2013 16:14:14 GMT" }, { "version": "v2", "created": "Thu, 28 Mar 2013 15:11:00 GMT" } ]
2013-03-29T00:00:00
[ [ "Seidel", "Florian", "" ], [ "Hage", "Clemens", "" ], [ "Kleinsteuber", "Martin", "" ] ]
TITLE: pROST : A Smoothed Lp-norm Robust Online Subspace Tracking Method for Realtime Background Subtraction in Video ABSTRACT: An increasing number of methods for background subtraction use Robust PCA to identify sparse foreground objects. While many algorithms use the L1-norm as a convex relaxation of the ideal sparsifying function, we approach the problem with a smoothed Lp-norm and present pROST, a method for robust online subspace tracking. The algorithm is based on alternating minimization on manifolds. Implemented on a graphics processing unit it achieves realtime performance. Experimental results on a state-of-the-art benchmark for background subtraction on real-world video data indicate that the method succeeds at a broad variety of background subtraction scenarios, and it outperforms competing approaches when video quality is deteriorated by camera jitter.
no_new_dataset
0.711262
1303.7012
Abedelaziz Mohaisen
Abedelaziz Mohaisen and Omar Alrawi
Unveiling Zeus
Accepted to SIMPLEX 2013 (a workshop held in conjunction with WWW 2013)
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Malware family classification is an age old problem that many Anti-Virus (AV) companies have tackled. There are two common techniques used for classification, signature based and behavior based. Signature based classification uses a common sequence of bytes that appears in the binary code to identify and detect a family of malware. Behavior based classification uses artifacts created by malware during execution for identification. In this paper we report on a unique dataset we obtained from our operations and classified using several machine learning techniques using the behavior-based approach. Our main class of malware we are interested in classifying is the popular Zeus malware. For its classification we identify 65 features that are unique and robust for identifying malware families. We show that artifacts like file system, registry, and network features can be used to identify distinct malware families with high accuracy---in some cases as high as 95%.
[ { "version": "v1", "created": "Thu, 28 Mar 2013 00:11:54 GMT" } ]
2013-03-29T00:00:00
[ [ "Mohaisen", "Abedelaziz", "" ], [ "Alrawi", "Omar", "" ] ]
TITLE: Unveiling Zeus ABSTRACT: Malware family classification is an age old problem that many Anti-Virus (AV) companies have tackled. There are two common techniques used for classification, signature based and behavior based. Signature based classification uses a common sequence of bytes that appears in the binary code to identify and detect a family of malware. Behavior based classification uses artifacts created by malware during execution for identification. In this paper we report on a unique dataset we obtained from our operations and classified using several machine learning techniques using the behavior-based approach. Our main class of malware we are interested in classifying is the popular Zeus malware. For its classification we identify 65 features that are unique and robust for identifying malware families. We show that artifacts like file system, registry, and network features can be used to identify distinct malware families with high accuracy---in some cases as high as 95%.
new_dataset
0.7118
1303.7077
Oleg Verbitsky
Christoph Berkholz and Oleg Verbitsky
On the speed of constraint propagation and the time complexity of arc consistency testing
19 pages, 5 figures
null
null
null
cs.LO cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Establishing arc consistency on two relational structures is one of the most popular heuristics for the constraint satisfaction problem. We aim at determining the time complexity of arc consistency testing. The input structures $G$ and $H$ can be supposed to be connected colored graphs, as the general problem reduces to this particular case. We first observe the upper bound $O(e(G)v(H)+v(G)e(H))$, which implies the bound $O(e(G)e(H))$ in terms of the number of edges and the bound $O((v(G)+v(H))^3)$ in terms of the number of vertices. We then show that both bounds are tight up to a constant factor as long as an arc consistency algorithm is based on constraint propagation (like any algorithm currently known). Our argument for the lower bounds is based on examples of slow constraint propagation. We measure the speed of constraint propagation observed on a pair $G,H$ by the size of a proof, in a natural combinatorial proof system, that Spoiler wins the existential 2-pebble game on $G,H$. The proof size is bounded from below by the game length $D(G,H)$, and a crucial ingredient of our analysis is the existence of $G,H$ with $D(G,H)=\Omega(v(G)v(H))$. We find one such example among old benchmark instances for the arc consistency problem and also suggest a new, different construction.
[ { "version": "v1", "created": "Thu, 28 Mar 2013 09:39:53 GMT" } ]
2013-03-29T00:00:00
[ [ "Berkholz", "Christoph", "" ], [ "Verbitsky", "Oleg", "" ] ]
TITLE: On the speed of constraint propagation and the time complexity of arc consistency testing ABSTRACT: Establishing arc consistency on two relational structures is one of the most popular heuristics for the constraint satisfaction problem. We aim at determining the time complexity of arc consistency testing. The input structures $G$ and $H$ can be supposed to be connected colored graphs, as the general problem reduces to this particular case. We first observe the upper bound $O(e(G)v(H)+v(G)e(H))$, which implies the bound $O(e(G)e(H))$ in terms of the number of edges and the bound $O((v(G)+v(H))^3)$ in terms of the number of vertices. We then show that both bounds are tight up to a constant factor as long as an arc consistency algorithm is based on constraint propagation (like any algorithm currently known). Our argument for the lower bounds is based on examples of slow constraint propagation. We measure the speed of constraint propagation observed on a pair $G,H$ by the size of a proof, in a natural combinatorial proof system, that Spoiler wins the existential 2-pebble game on $G,H$. The proof size is bounded from below by the game length $D(G,H)$, and a crucial ingredient of our analysis is the existence of $G,H$ with $D(G,H)=\Omega(v(G)v(H))$. We find one such example among old benchmark instances for the arc consistency problem and also suggest a new, different construction.
no_new_dataset
0.706577
1303.6761
Jin-Kao Hao
Qinghua Wu and Jin-Kao Hao
Improved Lower Bounds for Sum Coloring via Clique Decomposition
Pre-print
null
null
null
cs.DM cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Given an undirected graph $G = (V,E)$ with a set $V$ of vertices and a set $E$ of edges, the minimum sum coloring problem (MSCP) is to find a legal vertex coloring of $G$, using colors represented by natural numbers $1, 2, . . .$ such that the total sum of the colors assigned to the vertices is minimized. This paper describes an approach based on the decomposition of the original graph into disjoint cliques for computing lower bounds for the MSCP. Basically, the proposed approach identifies and removes at each extraction iteration a maximum number of cliques of the same size (the largest possible) from the graph. Computational experiments show that this approach is able to improve on the current best lower bounds for 14 benchmark instances, and to prove optimality for the first time for 4 instances. We also report lower bounds for 24 more instances for which no such bounds are available in the literature. These new lower bounds are useful to estimate the quality of the upper bounds obtained with various heuristic approaches.
[ { "version": "v1", "created": "Wed, 27 Mar 2013 08:35:16 GMT" } ]
2013-03-28T00:00:00
[ [ "Wu", "Qinghua", "" ], [ "Hao", "Jin-Kao", "" ] ]
TITLE: Improved Lower Bounds for Sum Coloring via Clique Decomposition ABSTRACT: Given an undirected graph $G = (V,E)$ with a set $V$ of vertices and a set $E$ of edges, the minimum sum coloring problem (MSCP) is to find a legal vertex coloring of $G$, using colors represented by natural numbers $1, 2, . . .$ such that the total sum of the colors assigned to the vertices is minimized. This paper describes an approach based on the decomposition of the original graph into disjoint cliques for computing lower bounds for the MSCP. Basically, the proposed approach identifies and removes at each extraction iteration a maximum number of cliques of the same size (the largest possible) from the graph. Computational experiments show that this approach is able to improve on the current best lower bounds for 14 benchmark instances, and to prove optimality for the first time for 4 instances. We also report lower bounds for 24 more instances for which no such bounds are available in the literature. These new lower bounds are useful to estimate the quality of the upper bounds obtained with various heuristic approaches.
no_new_dataset
0.706962
0812.0146
Vladimir Pestov
Vladimir Pestov
Lower Bounds on Performance of Metric Tree Indexing Schemes for Exact Similarity Search in High Dimensions
21 pages, revised submission to Algorithmica, an improved and extended journal version of the conference paper arXiv:0812.0146v3 [cs.DS], with lower bounds strengthened, and the proof of the main Theorem 4 simplified
Algorithmica 66 (2013), 310-328
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Within a mathematically rigorous model, we analyse the curse of dimensionality for deterministic exact similarity search in the context of popular indexing schemes: metric trees. The datasets $X$ are sampled randomly from a domain $\Omega$, equipped with a distance, $\rho$, and an underlying probability distribution, $\mu$. While performing an asymptotic analysis, we send the intrinsic dimension $d$ of $\Omega$ to infinity, and assume that the size of a dataset, $n$, grows superpolynomially yet subexponentially in $d$. Exact similarity search refers to finding the nearest neighbour in the dataset $X$ to a query point $\omega\in\Omega$, where the query points are subject to the same probability distribution $\mu$ as datapoints. Let $\mathscr F$ denote a class of all 1-Lipschitz functions on $\Omega$ that can be used as decision functions in constructing a hierarchical metric tree indexing scheme. Suppose the VC dimension of the class of all sets $\{\omega\colon f(\omega)\geq a\}$, $a\in\R$ is $o(n^{1/4}/\log^2n)$. (In view of a 1995 result of Goldberg and Jerrum, even a stronger complexity assumption $d^{O(1)}$ is reasonable.) We deduce the $\Omega(n^{1/4})$ lower bound on the expected average case performance of hierarchical metric-tree based indexing schemes for exact similarity search in $(\Omega,X)$. In paricular, this bound is superpolynomial in $d$.
[ { "version": "v1", "created": "Sun, 30 Nov 2008 15:17:22 GMT" }, { "version": "v2", "created": "Fri, 20 Aug 2010 03:42:50 GMT" }, { "version": "v3", "created": "Tue, 10 May 2011 16:17:39 GMT" }, { "version": "v4", "created": "Fri, 24 Feb 2012 18:38:50 GMT" } ]
2013-03-27T00:00:00
[ [ "Pestov", "Vladimir", "" ] ]
TITLE: Lower Bounds on Performance of Metric Tree Indexing Schemes for Exact Similarity Search in High Dimensions ABSTRACT: Within a mathematically rigorous model, we analyse the curse of dimensionality for deterministic exact similarity search in the context of popular indexing schemes: metric trees. The datasets $X$ are sampled randomly from a domain $\Omega$, equipped with a distance, $\rho$, and an underlying probability distribution, $\mu$. While performing an asymptotic analysis, we send the intrinsic dimension $d$ of $\Omega$ to infinity, and assume that the size of a dataset, $n$, grows superpolynomially yet subexponentially in $d$. Exact similarity search refers to finding the nearest neighbour in the dataset $X$ to a query point $\omega\in\Omega$, where the query points are subject to the same probability distribution $\mu$ as datapoints. Let $\mathscr F$ denote a class of all 1-Lipschitz functions on $\Omega$ that can be used as decision functions in constructing a hierarchical metric tree indexing scheme. Suppose the VC dimension of the class of all sets $\{\omega\colon f(\omega)\geq a\}$, $a\in\R$ is $o(n^{1/4}/\log^2n)$. (In view of a 1995 result of Goldberg and Jerrum, even a stronger complexity assumption $d^{O(1)}$ is reasonable.) We deduce the $\Omega(n^{1/4})$ lower bound on the expected average case performance of hierarchical metric-tree based indexing schemes for exact similarity search in $(\Omega,X)$. In paricular, this bound is superpolynomial in $d$.
no_new_dataset
0.709849
1303.4969
Jeff Jones Dr
Jeff Jones, Andrew Adamatzky
Computation of the Travelling Salesman Problem by a Shrinking Blob
27 Pages, 13 Figures. 25-03-13: Amended typos
null
null
null
cs.ET cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Travelling Salesman Problem (TSP) is a well known and challenging combinatorial optimisation problem. Its computational intractability has attracted a number of heuristic approaches to generate satisfactory, if not optimal, candidate solutions. In this paper we demonstrate a simple unconventional computation method to approximate the Euclidean TSP using a virtual material approach. The morphological adaptation behaviour of the material emerges from the low-level interactions of a population of particles moving within a diffusive lattice. A `blob' of this material is placed over a set of data points projected into the lattice, representing TSP city locations, and the blob is reduced in size over time. As the blob shrinks it morphologically adapts to the configuration of the cities. The shrinkage process automatically stops when the blob no longer completely covers all cities. By manually tracing the perimeter of the blob a path between cities is elicited corresponding to a TSP tour. Over 6 runs on 20 randomly generated datasets of 20 cities this simple and unguided method found tours with a mean best tour length of 1.04, mean average tour length of 1.07 and mean worst tour length of 1.09 when expressed as a fraction of the minimal tour computed by an exact TSP solver. We examine the insertion mechanism by which the blob constructs a tour, note some properties and limitations of its performance, and discuss the relationship between the blob TSP and proximity graphs which group points on the plane. The method is notable for its simplicity and the spatially represented mechanical mode of its operation. We discuss similarities between this method and previously suggested models of human performance on the TSP and suggest possibilities for further improvement.
[ { "version": "v1", "created": "Wed, 20 Mar 2013 15:36:54 GMT" }, { "version": "v2", "created": "Mon, 25 Mar 2013 17:45:47 GMT" } ]
2013-03-27T00:00:00
[ [ "Jones", "Jeff", "" ], [ "Adamatzky", "Andrew", "" ] ]
TITLE: Computation of the Travelling Salesman Problem by a Shrinking Blob ABSTRACT: The Travelling Salesman Problem (TSP) is a well known and challenging combinatorial optimisation problem. Its computational intractability has attracted a number of heuristic approaches to generate satisfactory, if not optimal, candidate solutions. In this paper we demonstrate a simple unconventional computation method to approximate the Euclidean TSP using a virtual material approach. The morphological adaptation behaviour of the material emerges from the low-level interactions of a population of particles moving within a diffusive lattice. A `blob' of this material is placed over a set of data points projected into the lattice, representing TSP city locations, and the blob is reduced in size over time. As the blob shrinks it morphologically adapts to the configuration of the cities. The shrinkage process automatically stops when the blob no longer completely covers all cities. By manually tracing the perimeter of the blob a path between cities is elicited corresponding to a TSP tour. Over 6 runs on 20 randomly generated datasets of 20 cities this simple and unguided method found tours with a mean best tour length of 1.04, mean average tour length of 1.07 and mean worst tour length of 1.09 when expressed as a fraction of the minimal tour computed by an exact TSP solver. We examine the insertion mechanism by which the blob constructs a tour, note some properties and limitations of its performance, and discuss the relationship between the blob TSP and proximity graphs which group points on the plane. The method is notable for its simplicity and the spatially represented mechanical mode of its operation. We discuss similarities between this method and previously suggested models of human performance on the TSP and suggest possibilities for further improvement.
no_new_dataset
0.707222
1303.6271
Marcel Blattner
J\'er\^ome Kunegis, Marcel Blattner, Christine Moser
Preferential Attachment in Online Networks: Measurement and Explanations
10 pages, 5 figures, Accepted for the WebSci'13 Conference, Paris, 2013
null
null
null
physics.soc-ph cs.SI physics.data-an
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We perform an empirical study of the preferential attachment phenomenon in temporal networks and show that on the Web, networks follow a nonlinear preferential attachment model in which the exponent depends on the type of network considered. The classical preferential attachment model for networks by Barab\'asi and Albert (1999) assumes a linear relationship between the number of neighbors of a node in a network and the probability of attachment. Although this assumption is widely made in Web Science and related fields, the underlying linearity is rarely measured. To fill this gap, this paper performs an empirical longitudinal (time-based) study on forty-seven diverse Web network datasets from seven network categories and including directed, undirected and bipartite networks. We show that contrary to the usual assumption, preferential attachment is nonlinear in the networks under consideration. Furthermore, we observe that the deviation from linearity is dependent on the type of network, giving sublinear attachment in certain types of networks, and superlinear attachment in others. Thus, we introduce the preferential attachment exponent $\beta$ as a novel numerical network measure that can be used to discriminate different types of networks. We propose explanations for the behavior of that network measure, based on the mechanisms that underly the growth of the network in question.
[ { "version": "v1", "created": "Sat, 23 Mar 2013 09:23:39 GMT" } ]
2013-03-27T00:00:00
[ [ "Kunegis", "Jérôme", "" ], [ "Blattner", "Marcel", "" ], [ "Moser", "Christine", "" ] ]
TITLE: Preferential Attachment in Online Networks: Measurement and Explanations ABSTRACT: We perform an empirical study of the preferential attachment phenomenon in temporal networks and show that on the Web, networks follow a nonlinear preferential attachment model in which the exponent depends on the type of network considered. The classical preferential attachment model for networks by Barab\'asi and Albert (1999) assumes a linear relationship between the number of neighbors of a node in a network and the probability of attachment. Although this assumption is widely made in Web Science and related fields, the underlying linearity is rarely measured. To fill this gap, this paper performs an empirical longitudinal (time-based) study on forty-seven diverse Web network datasets from seven network categories and including directed, undirected and bipartite networks. We show that contrary to the usual assumption, preferential attachment is nonlinear in the networks under consideration. Furthermore, we observe that the deviation from linearity is dependent on the type of network, giving sublinear attachment in certain types of networks, and superlinear attachment in others. Thus, we introduce the preferential attachment exponent $\beta$ as a novel numerical network measure that can be used to discriminate different types of networks. We propose explanations for the behavior of that network measure, based on the mechanisms that underly the growth of the network in question.
no_new_dataset
0.711606
1303.6361
Conrad Sanderson
Sandra Mau, Shaokang Chen, Conrad Sanderson, Brian C. Lovell
Video Face Matching using Subset Selection and Clustering of Probabilistic Multi-Region Histograms
null
International Conference of Image and Vision Computing New Zealand (IVCNZ), 2010
10.1109/IVCNZ.2010.6148860
null
cs.CV cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Balancing computational efficiency with recognition accuracy is one of the major challenges in real-world video-based face recognition. A significant design decision for any such system is whether to process and use all possible faces detected over the video frames, or whether to select only a few "best" faces. This paper presents a video face recognition system based on probabilistic Multi-Region Histograms to characterise performance trade-offs in: (i) selecting a subset of faces compared to using all faces, and (ii) combining information from all faces via clustering. Three face selection metrics are evaluated for choosing a subset: face detection confidence, random subset, and sequential selection. Experiments on the recently introduced MOBIO dataset indicate that the usage of all faces through clustering always outperformed selecting only a subset of faces. The experiments also show that the face selection metric based on face detection confidence generally provides better recognition performance than random or sequential sampling. Moreover, the optimal number of faces varies drastically across selection metric and subsets of MOBIO. Given the trade-offs between computational effort, recognition accuracy and robustness, it is recommended that face feature clustering would be most advantageous in batch processing (particularly for video-based watchlists), whereas face selection methods should be limited to applications with significant computational restrictions.
[ { "version": "v1", "created": "Tue, 26 Mar 2013 01:34:42 GMT" } ]
2013-03-27T00:00:00
[ [ "Mau", "Sandra", "" ], [ "Chen", "Shaokang", "" ], [ "Sanderson", "Conrad", "" ], [ "Lovell", "Brian C.", "" ] ]
TITLE: Video Face Matching using Subset Selection and Clustering of Probabilistic Multi-Region Histograms ABSTRACT: Balancing computational efficiency with recognition accuracy is one of the major challenges in real-world video-based face recognition. A significant design decision for any such system is whether to process and use all possible faces detected over the video frames, or whether to select only a few "best" faces. This paper presents a video face recognition system based on probabilistic Multi-Region Histograms to characterise performance trade-offs in: (i) selecting a subset of faces compared to using all faces, and (ii) combining information from all faces via clustering. Three face selection metrics are evaluated for choosing a subset: face detection confidence, random subset, and sequential selection. Experiments on the recently introduced MOBIO dataset indicate that the usage of all faces through clustering always outperformed selecting only a subset of faces. The experiments also show that the face selection metric based on face detection confidence generally provides better recognition performance than random or sequential sampling. Moreover, the optimal number of faces varies drastically across selection metric and subsets of MOBIO. Given the trade-offs between computational effort, recognition accuracy and robustness, it is recommended that face feature clustering would be most advantageous in batch processing (particularly for video-based watchlists), whereas face selection methods should be limited to applications with significant computational restrictions.
new_dataset
0.606673
1302.5235
Adrien Guille
Adrien Guille, Hakim Hacid, C\'ecile Favre
Predicting the Temporal Dynamics of Information Diffusion in Social Networks
10 pages; (corrected typos)
null
null
ERIC Laboratory Report RI-ERIC-13/001
cs.SI physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Online social networks play a major role in the spread of information at very large scale and it becomes essential to provide means to analyse this phenomenon. In this paper we address the issue of predicting the temporal dynamics of the information diffusion process. We develop a graph-based approach built on the assumption that the macroscopic dynamics of the spreading process are explained by the topology of the network and the interactions that occur through it, between pairs of users, on the basis of properties at the microscopic level. We introduce a generic model, called T-BaSIC, and describe how to estimate its parameters from users behaviours using machine learning techniques. Contrary to classical approaches where the parameters are fixed in advance, T-BaSIC's parameters are functions depending of time, which permit to better approximate and adapt to the diffusion phenomenon observed in online social networks. Our proposal has been validated on real Twitter datasets. Experiments show that our approach is able to capture the particular patterns of diffusion depending of the studied sub-networks of users and topics. The results corroborate the "two-step" theory (1955) that states that information flows from media to a few "opinion leaders" who then transfer it to the mass population via social networks and show that it applies in the online context. This work also highlights interesting recommendations for future investigations.
[ { "version": "v1", "created": "Thu, 21 Feb 2013 10:06:35 GMT" }, { "version": "v2", "created": "Fri, 1 Mar 2013 10:21:08 GMT" } ]
2013-03-26T00:00:00
[ [ "Guille", "Adrien", "" ], [ "Hacid", "Hakim", "" ], [ "Favre", "Cécile", "" ] ]
TITLE: Predicting the Temporal Dynamics of Information Diffusion in Social Networks ABSTRACT: Online social networks play a major role in the spread of information at very large scale and it becomes essential to provide means to analyse this phenomenon. In this paper we address the issue of predicting the temporal dynamics of the information diffusion process. We develop a graph-based approach built on the assumption that the macroscopic dynamics of the spreading process are explained by the topology of the network and the interactions that occur through it, between pairs of users, on the basis of properties at the microscopic level. We introduce a generic model, called T-BaSIC, and describe how to estimate its parameters from users behaviours using machine learning techniques. Contrary to classical approaches where the parameters are fixed in advance, T-BaSIC's parameters are functions depending of time, which permit to better approximate and adapt to the diffusion phenomenon observed in online social networks. Our proposal has been validated on real Twitter datasets. Experiments show that our approach is able to capture the particular patterns of diffusion depending of the studied sub-networks of users and topics. The results corroborate the "two-step" theory (1955) that states that information flows from media to a few "opinion leaders" who then transfer it to the mass population via social networks and show that it applies in the online context. This work also highlights interesting recommendations for future investigations.
no_new_dataset
0.709982
1303.5778
Alex Graves
Alex Graves, Abdel-rahman Mohamed and Geoffrey Hinton
Speech Recognition with Deep Recurrent Neural Networks
To appear in ICASSP 2013
null
null
null
cs.NE cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recurrent neural networks (RNNs) are a powerful model for sequential data. End-to-end training methods such as Connectionist Temporal Classification make it possible to train RNNs for sequence labelling problems where the input-output alignment is unknown. The combination of these methods with the Long Short-term Memory RNN architecture has proved particularly fruitful, delivering state-of-the-art results in cursive handwriting recognition. However RNN performance in speech recognition has so far been disappointing, with better results returned by deep feedforward networks. This paper investigates \emph{deep recurrent neural networks}, which combine the multiple levels of representation that have proved so effective in deep networks with the flexible use of long range context that empowers RNNs. When trained end-to-end with suitable regularisation, we find that deep Long Short-term Memory RNNs achieve a test set error of 17.7% on the TIMIT phoneme recognition benchmark, which to our knowledge is the best recorded score.
[ { "version": "v1", "created": "Fri, 22 Mar 2013 20:55:48 GMT" } ]
2013-03-26T00:00:00
[ [ "Graves", "Alex", "" ], [ "Mohamed", "Abdel-rahman", "" ], [ "Hinton", "Geoffrey", "" ] ]
TITLE: Speech Recognition with Deep Recurrent Neural Networks ABSTRACT: Recurrent neural networks (RNNs) are a powerful model for sequential data. End-to-end training methods such as Connectionist Temporal Classification make it possible to train RNNs for sequence labelling problems where the input-output alignment is unknown. The combination of these methods with the Long Short-term Memory RNN architecture has proved particularly fruitful, delivering state-of-the-art results in cursive handwriting recognition. However RNN performance in speech recognition has so far been disappointing, with better results returned by deep feedforward networks. This paper investigates \emph{deep recurrent neural networks}, which combine the multiple levels of representation that have proved so effective in deep networks with the flexible use of long range context that empowers RNNs. When trained end-to-end with suitable regularisation, we find that deep Long Short-term Memory RNNs achieve a test set error of 17.7% on the TIMIT phoneme recognition benchmark, which to our knowledge is the best recorded score.
no_new_dataset
0.710025
1303.5891
Bharath Balasubramanian
Bharath Balasubramanian and Vijay K. Garg
Fault Tolerance in Distributed Systems using Fused State Machines
This is under review with the Distributed Computing journal
null
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Replication is a standard technique for fault tolerance in distributed systems modeled as deterministic finite state machines (DFSMs or machines). To correct f crash or f/2 Byzantine faults among n different machines, replication requires nf additional backup machines. We present a solution called fusion that requires just f additional backup machines. First, we build a framework for fault tolerance in DFSMs based on the notion of Hamming distances. We introduce the concept of an (f,m)-fusion, which is a set of m backup machines that can correct f crash faults or f/2 Byzantine faults among a given set of machines. Second, we present an algorithm to generate an (f,f)-fusion for a given set of machines. We ensure that our backups are efficient in terms of the size of their state and event sets. Our evaluation of fusion on the widely used MCNC'91 benchmarks for DFSMs show that the average state space savings in fusion (over replication) is 38% (range 0-99%). To demonstrate the practical use of fusion, we describe its potential application to the MapReduce framework. Using a simple case study, we compare replication and fusion as applied to this framework. While a pure replication-based solution requires 1.8 million map tasks, our fusion-based solution requires only 1.4 million map tasks with minimal overhead during normal operation or recovery. Hence, fusion results in considerable savings in state space and other resources such as the power needed to run the backup tasks.
[ { "version": "v1", "created": "Sat, 23 Mar 2013 23:03:34 GMT" } ]
2013-03-26T00:00:00
[ [ "Balasubramanian", "Bharath", "" ], [ "Garg", "Vijay K.", "" ] ]
TITLE: Fault Tolerance in Distributed Systems using Fused State Machines ABSTRACT: Replication is a standard technique for fault tolerance in distributed systems modeled as deterministic finite state machines (DFSMs or machines). To correct f crash or f/2 Byzantine faults among n different machines, replication requires nf additional backup machines. We present a solution called fusion that requires just f additional backup machines. First, we build a framework for fault tolerance in DFSMs based on the notion of Hamming distances. We introduce the concept of an (f,m)-fusion, which is a set of m backup machines that can correct f crash faults or f/2 Byzantine faults among a given set of machines. Second, we present an algorithm to generate an (f,f)-fusion for a given set of machines. We ensure that our backups are efficient in terms of the size of their state and event sets. Our evaluation of fusion on the widely used MCNC'91 benchmarks for DFSMs show that the average state space savings in fusion (over replication) is 38% (range 0-99%). To demonstrate the practical use of fusion, we describe its potential application to the MapReduce framework. Using a simple case study, we compare replication and fusion as applied to this framework. While a pure replication-based solution requires 1.8 million map tasks, our fusion-based solution requires only 1.4 million map tasks with minimal overhead during normal operation or recovery. Hence, fusion results in considerable savings in state space and other resources such as the power needed to run the backup tasks.
no_new_dataset
0.709573
1303.5909
Di Jin
Dayou Liu, Di Jin, Carlos Baquero, Dongxiao He, Bo Yang, Qiangyuan Yu
Genetic Algorithm with a Local Search Strategy for Discovering Communities in Complex Networks
17 pages, 8 figures. arXiv admin note: text overlap with arXiv:1303.4711
International Journal of Computational Intelligence Systems, Vol. 6, No. 2 (March, 2013), 354-369
10.1080/18756891.2013.773175
null
cs.SI physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In order to further improve the performance of current genetic algorithms aiming at discovering communities, a local search based genetic algorithm GALS is here proposed. The core of GALS is a local search based mutation technique. In order to overcome the drawbacks of traditional mutation methods, the paper develops the concept of marginal gene and then the local monotonicity of modularity function Q is deduced from each nodes local view. Based on these two elements, a new mutation method combined with a local search strategy is presented. GALS has been evaluated on both synthetic benchmarks and several real networks, and compared with some presently competing algorithms. Experimental results show that GALS is highly effective and efficient for discovering community structure.
[ { "version": "v1", "created": "Sun, 24 Mar 2013 03:06:11 GMT" } ]
2013-03-26T00:00:00
[ [ "Liu", "Dayou", "" ], [ "Jin", "Di", "" ], [ "Baquero", "Carlos", "" ], [ "He", "Dongxiao", "" ], [ "Yang", "Bo", "" ], [ "Yu", "Qiangyuan", "" ] ]
TITLE: Genetic Algorithm with a Local Search Strategy for Discovering Communities in Complex Networks ABSTRACT: In order to further improve the performance of current genetic algorithms aiming at discovering communities, a local search based genetic algorithm GALS is here proposed. The core of GALS is a local search based mutation technique. In order to overcome the drawbacks of traditional mutation methods, the paper develops the concept of marginal gene and then the local monotonicity of modularity function Q is deduced from each nodes local view. Based on these two elements, a new mutation method combined with a local search strategy is presented. GALS has been evaluated on both synthetic benchmarks and several real networks, and compared with some presently competing algorithms. Experimental results show that GALS is highly effective and efficient for discovering community structure.
no_new_dataset
0.711619
1303.5910
Di Jin
Di Jin, Dayou Liu, Bo Yang, Jie Liu, Dongxiao He
Ant Colony Optimization with a New Random Walk Model for Community Detection in Complex Networks
14 pages, 4 figures. arXiv admin note: substantial text overlap with arXiv:1303.5675
Advances in Complex Systems, Vol. 14, No. 5 (2011) 795-815
10.1142/S0219525911003219
null
cs.SI physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Detecting communities from complex networks has recently triggered great interest. Aiming at this problem, a new ant colony optimization strategy building on the Markov random walks theory, which is named as MACO, is proposed in this paper. The framework of ant colony optimization is taken as the basic framework in this algorithm. In each iteration, a Markov random walk model is employed as heuristic rule; all of the ants local solutions are aggregated to a global one through an idea of clustering ensemble, which then will be used to update a pheromone matrix. The strategy relies on the progressive strengthening of within-community links and the weakening of between-community links. Gradually this converges to a solution where the underlying community structure of the complex network will become clearly visible. The proposed MACO has been evaluated both on synthetic benchmarks and on some real-world networks, and compared with some present competing algorithms. Experimental result has shown that MACO is highly effective for discovering communities.
[ { "version": "v1", "created": "Sun, 24 Mar 2013 03:20:06 GMT" } ]
2013-03-26T00:00:00
[ [ "Jin", "Di", "" ], [ "Liu", "Dayou", "" ], [ "Yang", "Bo", "" ], [ "Liu", "Jie", "" ], [ "He", "Dongxiao", "" ] ]
TITLE: Ant Colony Optimization with a New Random Walk Model for Community Detection in Complex Networks ABSTRACT: Detecting communities from complex networks has recently triggered great interest. Aiming at this problem, a new ant colony optimization strategy building on the Markov random walks theory, which is named as MACO, is proposed in this paper. The framework of ant colony optimization is taken as the basic framework in this algorithm. In each iteration, a Markov random walk model is employed as heuristic rule; all of the ants local solutions are aggregated to a global one through an idea of clustering ensemble, which then will be used to update a pheromone matrix. The strategy relies on the progressive strengthening of within-community links and the weakening of between-community links. Gradually this converges to a solution where the underlying community structure of the complex network will become clearly visible. The proposed MACO has been evaluated both on synthetic benchmarks and on some real-world networks, and compared with some present competing algorithms. Experimental result has shown that MACO is highly effective for discovering communities.
no_new_dataset
0.710986
1303.5926
Sourish Dasgupta
Sourish Dasgupta, Satish Bhat, Yugyung Lee
STC: Semantic Taxonomical Clustering for Service Category Learning
14 pages
null
null
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Service discovery is one of the key problems that has been widely researched in the area of Service Oriented Architecture (SOA) based systems. Service category learning is a technique for efficiently facilitating service discovery. Most approaches for service category learning are based on suitable similarity distance measures using thresholds. Threshold selection is essentially difficult and often leads to unsatisfactory accuracy. In this paper, we have proposed a self-organizing based clustering algorithm called Semantic Taxonomical Clustering (STC) for taxonomically organizing services with self-organizing information and knowledge. We have tested the STC algorithm on both randomly generated data and the standard OWL-S TC dataset. We have observed promising results both in terms of classification accuracy and runtime performance compared to existing approaches.
[ { "version": "v1", "created": "Sun, 24 Mar 2013 08:30:44 GMT" } ]
2013-03-26T00:00:00
[ [ "Dasgupta", "Sourish", "" ], [ "Bhat", "Satish", "" ], [ "Lee", "Yugyung", "" ] ]
TITLE: STC: Semantic Taxonomical Clustering for Service Category Learning ABSTRACT: Service discovery is one of the key problems that has been widely researched in the area of Service Oriented Architecture (SOA) based systems. Service category learning is a technique for efficiently facilitating service discovery. Most approaches for service category learning are based on suitable similarity distance measures using thresholds. Threshold selection is essentially difficult and often leads to unsatisfactory accuracy. In this paper, we have proposed a self-organizing based clustering algorithm called Semantic Taxonomical Clustering (STC) for taxonomically organizing services with self-organizing information and knowledge. We have tested the STC algorithm on both randomly generated data and the standard OWL-S TC dataset. We have observed promising results both in terms of classification accuracy and runtime performance compared to existing approaches.
no_new_dataset
0.711857
1303.6021
Conrad Sanderson
Andres Sanin, Conrad Sanderson, Mehrtash T. Harandi, Brian C. Lovell
Spatio-Temporal Covariance Descriptors for Action and Gesture Recognition
null
IEEE Workshop on Applications of Computer Vision, pp. 103-110, 2013
10.1109/WACV.2013.6475006
null
cs.CV cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a new action and gesture recognition method based on spatio-temporal covariance descriptors and a weighted Riemannian locality preserving projection approach that takes into account the curved space formed by the descriptors. The weighted projection is then exploited during boosting to create a final multiclass classification algorithm that employs the most useful spatio-temporal regions. We also show how the descriptors can be computed quickly through the use of integral video representations. Experiments on the UCF sport, CK+ facial expression and Cambridge hand gesture datasets indicate superior performance of the proposed method compared to several recent state-of-the-art techniques. The proposed method is robust and does not require additional processing of the videos, such as foreground detection, interest-point detection or tracking.
[ { "version": "v1", "created": "Mon, 25 Mar 2013 03:16:08 GMT" } ]
2013-03-26T00:00:00
[ [ "Sanin", "Andres", "" ], [ "Sanderson", "Conrad", "" ], [ "Harandi", "Mehrtash T.", "" ], [ "Lovell", "Brian C.", "" ] ]
TITLE: Spatio-Temporal Covariance Descriptors for Action and Gesture Recognition ABSTRACT: We propose a new action and gesture recognition method based on spatio-temporal covariance descriptors and a weighted Riemannian locality preserving projection approach that takes into account the curved space formed by the descriptors. The weighted projection is then exploited during boosting to create a final multiclass classification algorithm that employs the most useful spatio-temporal regions. We also show how the descriptors can be computed quickly through the use of integral video representations. Experiments on the UCF sport, CK+ facial expression and Cambridge hand gesture datasets indicate superior performance of the proposed method compared to several recent state-of-the-art techniques. The proposed method is robust and does not require additional processing of the videos, such as foreground detection, interest-point detection or tracking.
no_new_dataset
0.710848
1210.2018
Zhong-Yuan Zhang
Zhong-Yuan Zhang
Community Structure Detection in Complex Networks with Partial Background Information
null
Zhong-Yuan Zhang 2013 EPL 101 48005
10.1209/0295-5075/101/48005
null
cs.SI physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Constrained clustering has been well-studied in the unsupervised learning society. However, how to encode constraints into community structure detection, within complex networks, remains a challenging problem. In this paper, we propose a semi-supervised learning framework for community structure detection. This framework implicitly encodes the must-link and cannot-link constraints by modifying the adjacency matrix of network, which can also be regarded as de-noising the consensus matrix of community structures. Our proposed method gives consideration to both the topology and the functions (background information) of complex network, which enhances the interpretability of the results. The comparisons performed on both the synthetic benchmarks and the real-world networks show that the proposed framework can significantly improve the community detection performance with few constraints, which makes it an attractive methodology in the analysis of complex networks.
[ { "version": "v1", "created": "Sun, 7 Oct 2012 03:49:00 GMT" }, { "version": "v2", "created": "Fri, 22 Mar 2013 17:01:15 GMT" } ]
2013-03-25T00:00:00
[ [ "Zhang", "Zhong-Yuan", "" ] ]
TITLE: Community Structure Detection in Complex Networks with Partial Background Information ABSTRACT: Constrained clustering has been well-studied in the unsupervised learning society. However, how to encode constraints into community structure detection, within complex networks, remains a challenging problem. In this paper, we propose a semi-supervised learning framework for community structure detection. This framework implicitly encodes the must-link and cannot-link constraints by modifying the adjacency matrix of network, which can also be regarded as de-noising the consensus matrix of community structures. Our proposed method gives consideration to both the topology and the functions (background information) of complex network, which enhances the interpretability of the results. The comparisons performed on both the synthetic benchmarks and the real-world networks show that the proposed framework can significantly improve the community detection performance with few constraints, which makes it an attractive methodology in the analysis of complex networks.
no_new_dataset
0.71103