id
large_stringlengths 9
16
| submitter
large_stringlengths 3
64
⌀ | authors
large_stringlengths 5
20.2k
| title
large_stringlengths 5
245
| comments
large_stringlengths 1
482
⌀ | journal-ref
large_stringlengths 4
382
⌀ | doi
large_stringlengths 9
151
⌀ | report-no
large_stringlengths 2
509
⌀ | categories
large_stringlengths 5
78
| license
large_stringclasses 9
values | abstract
large_stringlengths 83
3.55k
| versions
large listlengths 1
21
| update_date
timestamp[ms]date 2007-05-23 00:00:00
2025-05-30 00:00:00
| authors_parsed
large listlengths 1
1.35k
| prompt
large_stringlengths 166
3.64k
| label
stringclasses 2
values | prob
float64 0.5
0.73
|
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1301.7192
|
Michael Schreiber
|
Michael Schreiber
|
Empirical Evidence for the Relevance of Fractional Scoring in the
Calculation of Percentile Rank Scores
|
10 pages, 4 tables, accepted for publication in Journal of American
Society for Information Science and Technology
|
Journal of the American Society for Information Science and
Technology, 64(4), 861-867 (2013)
|
10.1002/asi.22774
| null |
cs.DL physics.soc-ph stat.AP
|
http://creativecommons.org/licenses/by-nc-sa/3.0/
|
Fractional scoring has been proposed to avoid inconsistencies in the
attribution of publications to percentile rank classes. Uncertainties and
ambiguities in the evaluation of percentile ranks can be demonstrated most
easily with small datasets. But for larger datasets an often large number of
papers with the same citation count leads to the same uncertainties and
ambiguities which can be avoided by fractional scoring. This is demonstrated
for four different empirical datasets with several thousand publications each
which are assigned to 6 percentile rank classes. Only by utilizing fractional
scoring the total score of all papers exactly reproduces the theoretical value
in each case.
|
[
{
"version": "v1",
"created": "Wed, 30 Jan 2013 10:49:39 GMT"
}
] | 2013-03-25T00:00:00
|
[
[
"Schreiber",
"Michael",
""
]
] |
TITLE: Empirical Evidence for the Relevance of Fractional Scoring in the
Calculation of Percentile Rank Scores
ABSTRACT: Fractional scoring has been proposed to avoid inconsistencies in the
attribution of publications to percentile rank classes. Uncertainties and
ambiguities in the evaluation of percentile ranks can be demonstrated most
easily with small datasets. But for larger datasets an often large number of
papers with the same citation count leads to the same uncertainties and
ambiguities which can be avoided by fractional scoring. This is demonstrated
for four different empirical datasets with several thousand publications each
which are assigned to 6 percentile rank classes. Only by utilizing fractional
scoring the total score of all papers exactly reproduces the theoretical value
in each case.
|
no_new_dataset
| 0.711387
|
1303.5526
|
Oliver Obst
|
Oliver Obst, Joschka Boedecker, Benedikt Schmidt, Minoru Asada
|
On active information storage in input-driven systems
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Information theory and the framework of information dynamics have been used
to provide tools to characterise complex systems. In particular, we are
interested in quantifying information storage, information modification and
information transfer as characteristic elements of computation. Although these
quantities are defined for autonomous dynamical systems, information dynamics
can also help to get a "wholistic" understanding of input-driven systems such
as neural networks. In this case, we do not distinguish between the system
itself, and the effects the input has to the system. This may be desired in
some cases, but it will change the questions we are able to answer, and is
consequently an important consideration, for example, for biological systems
which perform non-trivial computations and also retain a short-term memory of
past inputs. Many other real world systems like cortical networks are also
heavily input-driven, and application of tools designed for autonomous dynamic
systems may not necessarily lead to intuitively interpretable results.
The aim of our work is to extend the measurements used in the information
dynamics framework for input-driven systems. Using the proposed input-corrected
information storage we hope to better quantify system behaviour, which will be
important for heavily input-driven systems like artificial neural networks to
abstract from specific benchmarks, or for brain networks, where intervention is
difficult, individual components cannot be tested in isolation or with
arbitrary input data.
|
[
{
"version": "v1",
"created": "Fri, 22 Mar 2013 06:40:30 GMT"
}
] | 2013-03-25T00:00:00
|
[
[
"Obst",
"Oliver",
""
],
[
"Boedecker",
"Joschka",
""
],
[
"Schmidt",
"Benedikt",
""
],
[
"Asada",
"Minoru",
""
]
] |
TITLE: On active information storage in input-driven systems
ABSTRACT: Information theory and the framework of information dynamics have been used
to provide tools to characterise complex systems. In particular, we are
interested in quantifying information storage, information modification and
information transfer as characteristic elements of computation. Although these
quantities are defined for autonomous dynamical systems, information dynamics
can also help to get a "wholistic" understanding of input-driven systems such
as neural networks. In this case, we do not distinguish between the system
itself, and the effects the input has to the system. This may be desired in
some cases, but it will change the questions we are able to answer, and is
consequently an important consideration, for example, for biological systems
which perform non-trivial computations and also retain a short-term memory of
past inputs. Many other real world systems like cortical networks are also
heavily input-driven, and application of tools designed for autonomous dynamic
systems may not necessarily lead to intuitively interpretable results.
The aim of our work is to extend the measurements used in the information
dynamics framework for input-driven systems. Using the proposed input-corrected
information storage we hope to better quantify system behaviour, which will be
important for heavily input-driven systems like artificial neural networks to
abstract from specific benchmarks, or for brain networks, where intervention is
difficult, individual components cannot be tested in isolation or with
arbitrary input data.
|
no_new_dataset
| 0.708616
|
1303.5675
|
Dongxiao He
|
Di Jin, Bo Yang, Carlos Baquero, Dayou Liu, Dongxiao He and Jie Liu
|
Markov random walk under constraint for discovering overlapping
communities in complex networks
|
21 pages, 8 pages, 2 tables
|
Journal of Statistical Mechanics: Theory and Experiment, P05031,
2011
|
10.1088/1742-5468/2011/05/P05031
| null |
cs.SI cond-mat.stat-mech physics.soc-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Detection of overlapping communities in complex networks has motivated recent
research in the relevant fields. Aiming this problem, we propose a Markov
dynamics based algorithm, called UEOC, which means, 'unfold and extract
overlapping communities'. In UEOC, when identifying each natural community that
overlaps, a Markov random walk method combined with a constraint strategy,
which is based on the corresponding annealed network (degree conserving random
network), is performed to unfold the community. Then, a cutoff criterion with
the aid of a local community function, called conductance, which can be thought
of as the ratio between the number of edges inside the community and those
leaving it, is presented to extract this emerged community from the entire
network. The UEOC algorithm depends on only one parameter whose value can be
easily set, and it requires no prior knowledge on the hidden community
structures. The proposed UEOC has been evaluated both on synthetic benchmarks
and on some real-world networks, and was compared with a set of competing
algorithms. Experimental result has shown that UEOC is highly effective and
efficient for discovering overlapping communities.
|
[
{
"version": "v1",
"created": "Fri, 22 Mar 2013 18:06:33 GMT"
}
] | 2013-03-25T00:00:00
|
[
[
"Jin",
"Di",
""
],
[
"Yang",
"Bo",
""
],
[
"Baquero",
"Carlos",
""
],
[
"Liu",
"Dayou",
""
],
[
"He",
"Dongxiao",
""
],
[
"Liu",
"Jie",
""
]
] |
TITLE: Markov random walk under constraint for discovering overlapping
communities in complex networks
ABSTRACT: Detection of overlapping communities in complex networks has motivated recent
research in the relevant fields. Aiming this problem, we propose a Markov
dynamics based algorithm, called UEOC, which means, 'unfold and extract
overlapping communities'. In UEOC, when identifying each natural community that
overlaps, a Markov random walk method combined with a constraint strategy,
which is based on the corresponding annealed network (degree conserving random
network), is performed to unfold the community. Then, a cutoff criterion with
the aid of a local community function, called conductance, which can be thought
of as the ratio between the number of edges inside the community and those
leaving it, is presented to extract this emerged community from the entire
network. The UEOC algorithm depends on only one parameter whose value can be
easily set, and it requires no prior knowledge on the hidden community
structures. The proposed UEOC has been evaluated both on synthetic benchmarks
and on some real-world networks, and was compared with a set of competing
algorithms. Experimental result has shown that UEOC is highly effective and
efficient for discovering overlapping communities.
|
no_new_dataset
| 0.709655
|
1303.5698
|
Mehdi Bennis
|
Mehdi Bennis, Meryem Simsek, Walid Saad, Stefan Valentin, Merouane
Debbah, Andreas Czylwik
|
When Cellular Meets WiFi in Wireless Small Cell Networks
| null | null | null | null |
cs.NI cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The deployment of small cell base stations(SCBSs) overlaid on existing
macro-cellular systems is seen as a key solution for offloading traffic,
optimizing coverage, and boosting the capacity of future cellular wireless
systems. The next-generation of SCBSs is envisioned to be multi-mode, i.e.,
capable of transmitting simultaneously on both licensed and unlicensed bands.
This constitutes a cost-effective integration of both WiFi and cellular radio
access technologies (RATs) that can efficiently cope with peak wireless data
traffic and heterogeneous quality-of-service requirements. To leverage the
advantage of such multi-mode SCBSs, we discuss the novel proposed paradigm of
cross-system learning by means of which SCBSs self-organize and autonomously
steer their traffic flows across different RATs. Cross-system learning allows
the SCBSs to leverage the advantage of both the WiFi and cellular worlds. For
example, the SCBSs can offload delay-tolerant data traffic to WiFi, while
simultaneously learning the probability distribution function of their
transmission strategy over the licensed cellular band. This article will first
introduce the basic building blocks of cross-system learning and then provide
preliminary performance evaluation in a Long-Term Evolution (LTE) simulator
overlaid with WiFi hotspots. Remarkably, it is shown that the proposed
cross-system learning approach significantly outperforms a number of benchmark
traffic steering policies.
|
[
{
"version": "v1",
"created": "Fri, 22 Mar 2013 19:48:54 GMT"
}
] | 2013-03-25T00:00:00
|
[
[
"Bennis",
"Mehdi",
""
],
[
"Simsek",
"Meryem",
""
],
[
"Saad",
"Walid",
""
],
[
"Valentin",
"Stefan",
""
],
[
"Debbah",
"Merouane",
""
],
[
"Czylwik",
"Andreas",
""
]
] |
TITLE: When Cellular Meets WiFi in Wireless Small Cell Networks
ABSTRACT: The deployment of small cell base stations(SCBSs) overlaid on existing
macro-cellular systems is seen as a key solution for offloading traffic,
optimizing coverage, and boosting the capacity of future cellular wireless
systems. The next-generation of SCBSs is envisioned to be multi-mode, i.e.,
capable of transmitting simultaneously on both licensed and unlicensed bands.
This constitutes a cost-effective integration of both WiFi and cellular radio
access technologies (RATs) that can efficiently cope with peak wireless data
traffic and heterogeneous quality-of-service requirements. To leverage the
advantage of such multi-mode SCBSs, we discuss the novel proposed paradigm of
cross-system learning by means of which SCBSs self-organize and autonomously
steer their traffic flows across different RATs. Cross-system learning allows
the SCBSs to leverage the advantage of both the WiFi and cellular worlds. For
example, the SCBSs can offload delay-tolerant data traffic to WiFi, while
simultaneously learning the probability distribution function of their
transmission strategy over the licensed cellular band. This article will first
introduce the basic building blocks of cross-system learning and then provide
preliminary performance evaluation in a Long-Term Evolution (LTE) simulator
overlaid with WiFi hotspots. Remarkably, it is shown that the proposed
cross-system learning approach significantly outperforms a number of benchmark
traffic steering policies.
|
no_new_dataset
| 0.710434
|
1209.4560
|
Patrick Prosser
|
Ciaran McCreesh and Patrick Prosser
|
Distributing an Exact Algorithm for Maximum Clique: maximising the
costup
|
13 pages, 2 Algorithms, 2 figures, 2 tables
|
Algorithms 2012, 5(4), 545-587
|
10.3390/a5040545
|
TR-2012-334
|
cs.DS cs.DC cs.DM cs.PF
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We take an existing implementation of an algorithm for the maximum clique
problem and modify it so that we can distribute it over an ad-hoc cluster of
machines. Our goal was to achieve a significant speedup in performance with
minimal development effort, i.e. a maximum costup. We present a simple
modification to a state-of-the-art exact algorithm for maximum clique that
allows us to distribute it across many machines. An empirical study over large
hard benchmarks shows that speedups of an order of magnitude are routine for 25
or more machines.
|
[
{
"version": "v1",
"created": "Thu, 20 Sep 2012 15:18:54 GMT"
}
] | 2013-03-22T00:00:00
|
[
[
"McCreesh",
"Ciaran",
""
],
[
"Prosser",
"Patrick",
""
]
] |
TITLE: Distributing an Exact Algorithm for Maximum Clique: maximising the
costup
ABSTRACT: We take an existing implementation of an algorithm for the maximum clique
problem and modify it so that we can distribute it over an ad-hoc cluster of
machines. Our goal was to achieve a significant speedup in performance with
minimal development effort, i.e. a maximum costup. We present a simple
modification to a state-of-the-art exact algorithm for maximum clique that
allows us to distribute it across many machines. An empirical study over large
hard benchmarks shows that speedups of an order of magnitude are routine for 25
or more machines.
|
no_new_dataset
| 0.708452
|
1301.3485
|
Antoine Bordes
|
Xavier Glorot and Antoine Bordes and Jason Weston and Yoshua Bengio
|
A Semantic Matching Energy Function for Learning with Multi-relational
Data
| null | null | null | null |
cs.LG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Large-scale relational learning becomes crucial for handling the huge amounts
of structured data generated daily in many application domains ranging from
computational biology or information retrieval, to natural language processing.
In this paper, we present a new neural network architecture designed to embed
multi-relational graphs into a flexible continuous vector space in which the
original data is kept and enhanced. The network is trained to encode the
semantics of these graphs in order to assign high probabilities to plausible
components. We empirically show that it reaches competitive performance in link
prediction on standard datasets from the literature.
|
[
{
"version": "v1",
"created": "Tue, 15 Jan 2013 20:52:50 GMT"
},
{
"version": "v2",
"created": "Thu, 21 Mar 2013 17:02:48 GMT"
}
] | 2013-03-22T00:00:00
|
[
[
"Glorot",
"Xavier",
""
],
[
"Bordes",
"Antoine",
""
],
[
"Weston",
"Jason",
""
],
[
"Bengio",
"Yoshua",
""
]
] |
TITLE: A Semantic Matching Energy Function for Learning with Multi-relational
Data
ABSTRACT: Large-scale relational learning becomes crucial for handling the huge amounts
of structured data generated daily in many application domains ranging from
computational biology or information retrieval, to natural language processing.
In this paper, we present a new neural network architecture designed to embed
multi-relational graphs into a flexible continuous vector space in which the
original data is kept and enhanced. The network is trained to encode the
semantics of these graphs in order to assign high probabilities to plausible
components. We empirically show that it reaches competitive performance in link
prediction on standard datasets from the literature.
|
no_new_dataset
| 0.709585
|
1303.5177
|
Nabila Shikoun
|
Nabila Shikoun, Mohamed El Nahas and Samar Kassim
|
Model Based Framework for Estimating Mutation Rate of Hepatitis C Virus
in Egypt
|
6 pages, 5 figures
| null | null | null |
cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Hepatitis C virus (HCV) is a widely spread disease all over the world. HCV
has very high mutation rate that makes it resistant to antibodies. Modeling HCV
to identify the virus mutation process is essential to its detection and
predicting its evolution. This paper presents a model based framework for
estimating mutation rate of HCV in two steps. Firstly profile hidden Markov
model (PHMM) architecture was builder to select the sequences which represents
sequence per year. Secondly mutation rate was calculated by using pair-wise
distance method between sequences. A pilot study is conducted on NS5B zone of
HCV dataset of genotype 4 subtype a (HCV4a) in Egypt.
|
[
{
"version": "v1",
"created": "Thu, 21 Mar 2013 06:49:05 GMT"
}
] | 2013-03-22T00:00:00
|
[
[
"Shikoun",
"Nabila",
""
],
[
"Nahas",
"Mohamed El",
""
],
[
"Kassim",
"Samar",
""
]
] |
TITLE: Model Based Framework for Estimating Mutation Rate of Hepatitis C Virus
in Egypt
ABSTRACT: Hepatitis C virus (HCV) is a widely spread disease all over the world. HCV
has very high mutation rate that makes it resistant to antibodies. Modeling HCV
to identify the virus mutation process is essential to its detection and
predicting its evolution. This paper presents a model based framework for
estimating mutation rate of HCV in two steps. Firstly profile hidden Markov
model (PHMM) architecture was builder to select the sequences which represents
sequence per year. Secondly mutation rate was calculated by using pair-wise
distance method between sequences. A pilot study is conducted on NS5B zone of
HCV dataset of genotype 4 subtype a (HCV4a) in Egypt.
|
no_new_dataset
| 0.712013
|
1206.5829
|
Alexandre Bartel
|
Alexandre Bartel (SnT), Jacques Klein (SnT), Martin Monperrus (INRIA
Lille - Nord Europe), Yves Le Traon (SnT)
|
Automatically Securing Permission-Based Software by Reducing the Attack
Surface: An Application to Android
| null | null | null |
ISBN: 978-2-87971-107-2
|
cs.CR cs.SE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A common security architecture, called the permission-based security model
(used e.g. in Android and Blackberry), entails intrinsic risks. For instance,
applications can be granted more permissions than they actually need, what we
call a "permission gap". Malware can leverage the unused permissions for
achieving their malicious goals, for instance using code injection. In this
paper, we present an approach to detecting permission gaps using static
analysis. Our prototype implementation in the context of Android shows that the
static analysis must take into account a significant amount of
platform-specific knowledge. Using our tool on two datasets of Android
applications, we found out that a non negligible part of applications suffers
from permission gaps, i.e. does not use all the permissions they declare.
|
[
{
"version": "v1",
"created": "Tue, 22 May 2012 13:58:03 GMT"
},
{
"version": "v2",
"created": "Wed, 20 Mar 2013 19:43:56 GMT"
}
] | 2013-03-21T00:00:00
|
[
[
"Bartel",
"Alexandre",
"",
"SnT"
],
[
"Klein",
"Jacques",
"",
"SnT"
],
[
"Monperrus",
"Martin",
"",
"INRIA\n Lille - Nord Europe"
],
[
"Traon",
"Yves Le",
"",
"SnT"
]
] |
TITLE: Automatically Securing Permission-Based Software by Reducing the Attack
Surface: An Application to Android
ABSTRACT: A common security architecture, called the permission-based security model
(used e.g. in Android and Blackberry), entails intrinsic risks. For instance,
applications can be granted more permissions than they actually need, what we
call a "permission gap". Malware can leverage the unused permissions for
achieving their malicious goals, for instance using code injection. In this
paper, we present an approach to detecting permission gaps using static
analysis. Our prototype implementation in the context of Android shows that the
static analysis must take into account a significant amount of
platform-specific knowledge. Using our tool on two datasets of Android
applications, we found out that a non negligible part of applications suffers
from permission gaps, i.e. does not use all the permissions they declare.
|
no_new_dataset
| 0.707398
|
1303.4803
|
Chunhua Shen
|
Xi Li, Weiming Hu, Chunhua Shen, Zhongfei Zhang, Anthony Dick, Anton
van den Hengel
|
A Survey of Appearance Models in Visual Object Tracking
|
Appearing in ACM Transactions on Intelligent Systems and Technology,
2013
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Visual object tracking is a significant computer vision task which can be
applied to many domains such as visual surveillance, human computer
interaction, and video compression. In the literature, researchers have
proposed a variety of 2D appearance models. To help readers swiftly learn the
recent advances in 2D appearance models for visual object tracking, we
contribute this survey, which provides a detailed review of the existing 2D
appearance models. In particular, this survey takes a module-based architecture
that enables readers to easily grasp the key points of visual object tracking.
In this survey, we first decompose the problem of appearance modeling into two
different processing stages: visual representation and statistical modeling.
Then, different 2D appearance models are categorized and discussed with respect
to their composition modules. Finally, we address several issues of interest as
well as the remaining challenges for future research on this topic. The
contributions of this survey are four-fold. First, we review the literature of
visual representations according to their feature-construction mechanisms
(i.e., local and global). Second, the existing statistical modeling schemes for
tracking-by-detection are reviewed according to their model-construction
mechanisms: generative, discriminative, and hybrid generative-discriminative.
Third, each type of visual representations or statistical modeling techniques
is analyzed and discussed from a theoretical or practical viewpoint. Fourth,
the existing benchmark resources (e.g., source code and video datasets) are
examined in this survey.
|
[
{
"version": "v1",
"created": "Wed, 20 Mar 2013 01:08:33 GMT"
}
] | 2013-03-21T00:00:00
|
[
[
"Li",
"Xi",
""
],
[
"Hu",
"Weiming",
""
],
[
"Shen",
"Chunhua",
""
],
[
"Zhang",
"Zhongfei",
""
],
[
"Dick",
"Anthony",
""
],
[
"Hengel",
"Anton van den",
""
]
] |
TITLE: A Survey of Appearance Models in Visual Object Tracking
ABSTRACT: Visual object tracking is a significant computer vision task which can be
applied to many domains such as visual surveillance, human computer
interaction, and video compression. In the literature, researchers have
proposed a variety of 2D appearance models. To help readers swiftly learn the
recent advances in 2D appearance models for visual object tracking, we
contribute this survey, which provides a detailed review of the existing 2D
appearance models. In particular, this survey takes a module-based architecture
that enables readers to easily grasp the key points of visual object tracking.
In this survey, we first decompose the problem of appearance modeling into two
different processing stages: visual representation and statistical modeling.
Then, different 2D appearance models are categorized and discussed with respect
to their composition modules. Finally, we address several issues of interest as
well as the remaining challenges for future research on this topic. The
contributions of this survey are four-fold. First, we review the literature of
visual representations according to their feature-construction mechanisms
(i.e., local and global). Second, the existing statistical modeling schemes for
tracking-by-detection are reviewed according to their model-construction
mechanisms: generative, discriminative, and hybrid generative-discriminative.
Third, each type of visual representations or statistical modeling techniques
is analyzed and discussed from a theoretical or practical viewpoint. Fourth,
the existing benchmark resources (e.g., source code and video datasets) are
examined in this survey.
|
no_new_dataset
| 0.707626
|
1303.4869
|
Raik Niemann M.Sc.
|
Raik Niemann, Nikolaos Korfiatis, Roberto Zicari, Richard G\"obel
|
Does query performance optimization lead to energy efficiency? A
comparative analysis of energy efficiency of database operations under
different workload scenarios
|
10 pages, 12 figures
| null | null | null |
cs.DB
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
With the continuous increase of online services as well as energy costs,
energy consumption becomes a significant cost factor for the evaluation of data
center operations. A significant contributor to that is the performance of
database servers which are found to constitute the backbone of online services.
From a software approach, while a set of novel data management technologies
appear in the market e.g. key-value based or in-memory databases, classic
relational database management systems (RDBMS) are still widely used. In
addition from a hardware perspective, the majority of database servers is still
using standard magnetic hard drives (HDDs) instead of solid state drives (SSDs)
due to lower cost of storage per gigabyte, disregarding the performance boost
that might be given due to high cost.
In this study we focus on a software based assessment of the energy
consumption of a database server by running three different and complete
database workloads namely TCP-H, Star Schema Benchmark -SSB as well a modified
benchmark we have derived for this study called W22. We profile the energy
distribution among the ost important server components and by using different
resource allocation we assess the energy consumption of a typical open source
RDBMS (PostgreSQL) on a standard server in relation with its performance
(measured by query time).
Results confirm the well-known fact that even for complete workloads,
optimization of the RDBMS results to lower energy consumption.
|
[
{
"version": "v1",
"created": "Wed, 20 Mar 2013 08:22:11 GMT"
}
] | 2013-03-21T00:00:00
|
[
[
"Niemann",
"Raik",
""
],
[
"Korfiatis",
"Nikolaos",
""
],
[
"Zicari",
"Roberto",
""
],
[
"Göbel",
"Richard",
""
]
] |
TITLE: Does query performance optimization lead to energy efficiency? A
comparative analysis of energy efficiency of database operations under
different workload scenarios
ABSTRACT: With the continuous increase of online services as well as energy costs,
energy consumption becomes a significant cost factor for the evaluation of data
center operations. A significant contributor to that is the performance of
database servers which are found to constitute the backbone of online services.
From a software approach, while a set of novel data management technologies
appear in the market e.g. key-value based or in-memory databases, classic
relational database management systems (RDBMS) are still widely used. In
addition from a hardware perspective, the majority of database servers is still
using standard magnetic hard drives (HDDs) instead of solid state drives (SSDs)
due to lower cost of storage per gigabyte, disregarding the performance boost
that might be given due to high cost.
In this study we focus on a software based assessment of the energy
consumption of a database server by running three different and complete
database workloads namely TCP-H, Star Schema Benchmark -SSB as well a modified
benchmark we have derived for this study called W22. We profile the energy
distribution among the ost important server components and by using different
resource allocation we assess the energy consumption of a typical open source
RDBMS (PostgreSQL) on a standard server in relation with its performance
(measured by query time).
Results confirm the well-known fact that even for complete workloads,
optimization of the RDBMS results to lower energy consumption.
|
no_new_dataset
| 0.703766
|
1303.4994
|
Albert Wegener
|
Albert Wegener
|
Universal Numerical Encoder and Profiler Reduces Computing's Memory Wall
with Software, FPGA, and SoC Implementations
|
10 pages, 4 figures, 3 tables, 19 references
| null | null | null |
cs.OH
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In the multicore era, the time to computational results is increasingly
determined by how quickly operands are accessed by cores, rather than by the
speed of computation per operand. From high-performance computing (HPC) to
mobile application processors, low multicore utilization rates result from the
slowness of accessing off-chip operands, i.e. the memory wall. The APplication
AXcelerator (APAX) universal numerical encoder reduces computing's memory wall
by compressing numerical operands (integers and floats), thereby decreasing CPU
access time by 3:1 to 10:1 as operands stream between memory and cores. APAX
encodes numbers using a low-complexity algorithm designed both for time series
sensor data and for multi-dimensional data, including images. APAX encoding
parameters are determined by a profiler that quantifies the uncertainty
inherent in numerical datasets and recommends encoding parameters reflecting
this uncertainty. Compatible software, FPGA, and systemon-chip (SoC)
implementations efficiently support encoding rates between 150 MByte/sec and
1.5 GByte/sec at low power. On 25 integer and floating-point datasets, we
achieved encoding rates between 3:1 and 10:1, with average correlation of
0.999959, while accelerating computational "time to results."
|
[
{
"version": "v1",
"created": "Wed, 20 Mar 2013 17:11:12 GMT"
}
] | 2013-03-21T00:00:00
|
[
[
"Wegener",
"Albert",
""
]
] |
TITLE: Universal Numerical Encoder and Profiler Reduces Computing's Memory Wall
with Software, FPGA, and SoC Implementations
ABSTRACT: In the multicore era, the time to computational results is increasingly
determined by how quickly operands are accessed by cores, rather than by the
speed of computation per operand. From high-performance computing (HPC) to
mobile application processors, low multicore utilization rates result from the
slowness of accessing off-chip operands, i.e. the memory wall. The APplication
AXcelerator (APAX) universal numerical encoder reduces computing's memory wall
by compressing numerical operands (integers and floats), thereby decreasing CPU
access time by 3:1 to 10:1 as operands stream between memory and cores. APAX
encodes numbers using a low-complexity algorithm designed both for time series
sensor data and for multi-dimensional data, including images. APAX encoding
parameters are determined by a profiler that quantifies the uncertainty
inherent in numerical datasets and recommends encoding parameters reflecting
this uncertainty. Compatible software, FPGA, and systemon-chip (SoC)
implementations efficiently support encoding rates between 150 MByte/sec and
1.5 GByte/sec at low power. On 25 integer and floating-point datasets, we
achieved encoding rates between 3:1 and 10:1, with average correlation of
0.999959, while accelerating computational "time to results."
|
no_new_dataset
| 0.70825
|
1301.3527
|
Vamsi Potluru
|
Vamsi K. Potluru, Sergey M. Plis, Jonathan Le Roux, Barak A.
Pearlmutter, Vince D. Calhoun, Thomas P. Hayes
|
Block Coordinate Descent for Sparse NMF
| null | null | null | null |
cs.LG cs.NA
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Nonnegative matrix factorization (NMF) has become a ubiquitous tool for data
analysis. An important variant is the sparse NMF problem which arises when we
explicitly require the learnt features to be sparse. A natural measure of
sparsity is the L$_0$ norm, however its optimization is NP-hard. Mixed norms,
such as L$_1$/L$_2$ measure, have been shown to model sparsity robustly, based
on intuitive attributes that such measures need to satisfy. This is in contrast
to computationally cheaper alternatives such as the plain L$_1$ norm. However,
present algorithms designed for optimizing the mixed norm L$_1$/L$_2$ are slow
and other formulations for sparse NMF have been proposed such as those based on
L$_1$ and L$_0$ norms. Our proposed algorithm allows us to solve the mixed norm
sparsity constraints while not sacrificing computation time. We present
experimental evidence on real-world datasets that shows our new algorithm
performs an order of magnitude faster compared to the current state-of-the-art
solvers optimizing the mixed norm and is suitable for large-scale datasets.
|
[
{
"version": "v1",
"created": "Tue, 15 Jan 2013 23:11:05 GMT"
},
{
"version": "v2",
"created": "Mon, 18 Mar 2013 22:42:11 GMT"
}
] | 2013-03-20T00:00:00
|
[
[
"Potluru",
"Vamsi K.",
""
],
[
"Plis",
"Sergey M.",
""
],
[
"Roux",
"Jonathan Le",
""
],
[
"Pearlmutter",
"Barak A.",
""
],
[
"Calhoun",
"Vince D.",
""
],
[
"Hayes",
"Thomas P.",
""
]
] |
TITLE: Block Coordinate Descent for Sparse NMF
ABSTRACT: Nonnegative matrix factorization (NMF) has become a ubiquitous tool for data
analysis. An important variant is the sparse NMF problem which arises when we
explicitly require the learnt features to be sparse. A natural measure of
sparsity is the L$_0$ norm, however its optimization is NP-hard. Mixed norms,
such as L$_1$/L$_2$ measure, have been shown to model sparsity robustly, based
on intuitive attributes that such measures need to satisfy. This is in contrast
to computationally cheaper alternatives such as the plain L$_1$ norm. However,
present algorithms designed for optimizing the mixed norm L$_1$/L$_2$ are slow
and other formulations for sparse NMF have been proposed such as those based on
L$_1$ and L$_0$ norms. Our proposed algorithm allows us to solve the mixed norm
sparsity constraints while not sacrificing computation time. We present
experimental evidence on real-world datasets that shows our new algorithm
performs an order of magnitude faster compared to the current state-of-the-art
solvers optimizing the mixed norm and is suitable for large-scale datasets.
|
no_new_dataset
| 0.708603
|
1303.4402
|
Julian McAuley
|
Julian McAuley and Jure Leskovec
|
From Amateurs to Connoisseurs: Modeling the Evolution of User Expertise
through Online Reviews
|
11 pages, 7 figures
| null | null | null |
cs.SI cs.IR physics.soc-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Recommending products to consumers means not only understanding their tastes,
but also understanding their level of experience. For example, it would be a
mistake to recommend the iconic film Seven Samurai simply because a user enjoys
other action movies; rather, we might conclude that they will eventually enjoy
it -- once they are ready. The same is true for beers, wines, gourmet foods --
or any products where users have acquired tastes: the `best' products may not
be the most `accessible'. Thus our goal in this paper is to recommend products
that a user will enjoy now, while acknowledging that their tastes may have
changed over time, and may change again in the future. We model how tastes
change due to the very act of consuming more products -- in other words, as
users become more experienced. We develop a latent factor recommendation system
that explicitly accounts for each user's level of experience. We find that such
a model not only leads to better recommendations, but also allows us to study
the role of user experience and expertise on a novel dataset of fifteen million
beer, wine, food, and movie reviews.
|
[
{
"version": "v1",
"created": "Mon, 18 Mar 2013 20:01:19 GMT"
}
] | 2013-03-20T00:00:00
|
[
[
"McAuley",
"Julian",
""
],
[
"Leskovec",
"Jure",
""
]
] |
TITLE: From Amateurs to Connoisseurs: Modeling the Evolution of User Expertise
through Online Reviews
ABSTRACT: Recommending products to consumers means not only understanding their tastes,
but also understanding their level of experience. For example, it would be a
mistake to recommend the iconic film Seven Samurai simply because a user enjoys
other action movies; rather, we might conclude that they will eventually enjoy
it -- once they are ready. The same is true for beers, wines, gourmet foods --
or any products where users have acquired tastes: the `best' products may not
be the most `accessible'. Thus our goal in this paper is to recommend products
that a user will enjoy now, while acknowledging that their tastes may have
changed over time, and may change again in the future. We model how tastes
change due to the very act of consuming more products -- in other words, as
users become more experienced. We develop a latent factor recommendation system
that explicitly accounts for each user's level of experience. We find that such
a model not only leads to better recommendations, but also allows us to study
the role of user experience and expertise on a novel dataset of fifteen million
beer, wine, food, and movie reviews.
|
new_dataset
| 0.717773
|
1303.4614
|
Santosh K.C.
|
Abdel Bela\"id (LORIA), K.C. Santosh (LORIA), Vincent Poulain D'Andecy
|
Handwritten and Printed Text Separation in Real Document
|
Machine Vision Applications (2013)
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The aim of the paper is to separate handwritten and printed text from a real
document embedded with noise, graphics including annotations. Relying on
run-length smoothing algorithm (RLSA), the extracted pseudo-lines and
pseudo-words are used as basic blocks for classification. To handle this, a
multi-class support vector machine (SVM) with Gaussian kernel performs a first
labelling of each pseudo-word including the study of local neighbourhood. It
then propagates the context between neighbours so that we can correct possible
labelling errors. Considering running time complexity issue, we propose linear
complexity methods where we use k-NN with constraint. When using a kd-tree, it
is almost linearly proportional to the number of pseudo-words. The performance
of our system is close to 90%, even when very small learning dataset where
samples are basically composed of complex administrative documents.
|
[
{
"version": "v1",
"created": "Tue, 19 Mar 2013 14:23:24 GMT"
}
] | 2013-03-20T00:00:00
|
[
[
"Belaïd",
"Abdel",
"",
"LORIA"
],
[
"Santosh",
"K. C.",
"",
"LORIA"
],
[
"D'Andecy",
"Vincent Poulain",
""
]
] |
TITLE: Handwritten and Printed Text Separation in Real Document
ABSTRACT: The aim of the paper is to separate handwritten and printed text from a real
document embedded with noise, graphics including annotations. Relying on
run-length smoothing algorithm (RLSA), the extracted pseudo-lines and
pseudo-words are used as basic blocks for classification. To handle this, a
multi-class support vector machine (SVM) with Gaussian kernel performs a first
labelling of each pseudo-word including the study of local neighbourhood. It
then propagates the context between neighbours so that we can correct possible
labelling errors. Considering running time complexity issue, we propose linear
complexity methods where we use k-NN with constraint. When using a kd-tree, it
is almost linearly proportional to the number of pseudo-words. The performance
of our system is close to 90%, even when very small learning dataset where
samples are basically composed of complex administrative documents.
|
no_new_dataset
| 0.708792
|
1303.4699
|
Dongxiao He
|
Dongxiao He, Dayou Liu, Weixiongzhang, Di Jin, and Bo Yang
|
Discovering link communities in complex networks by exploiting link
dynamics
|
18 pages,11 figures
|
Journal of Statistical Mechanics: Theory and Experiment,P10015,
2012
|
10.1088/1742-5468/2012/10/P10015
| null |
cs.SI cond-mat.stat-mech physics.soc-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Discovery of communities in complex networks is a fundamental data analysis
problem with applications in various domains. Most of the existing approaches
have focused on discovering communities of nodes, while recent studies have
shown great advantages and utilities of the knowledge of communities of links
in networks. From this new perspective, we propose a link dynamics based
algorithm, called UELC, for identifying link communities of networks. In UELC,
the stochastic process of a link-node-link random walk is employed to unfold an
embedded bipartition structure of links in a network. The local mixing
properties of the Markov chain underlying the random walk are then utilized to
extract two emerged link communities. Further, the random walk and the
bipartitioning processes are wrapped in an iterative subdivision strategy to
recursively identify link partitions that segregate the network links into
multiple subdivisions. We evaluate the performance of the new method on
synthetic benchmarks and demonstrate its utility on real-world networks. Our
experimental results show that our method is highly effective for discovering
link communities in complex networks. As a comparison, we also extend UELC to
extracting communities of node, and show that it is effective for node
community identification.
|
[
{
"version": "v1",
"created": "Tue, 19 Mar 2013 19:05:00 GMT"
}
] | 2013-03-20T00:00:00
|
[
[
"He",
"Dongxiao",
""
],
[
"Liu",
"Dayou",
""
],
[
"Weixiongzhang",
"",
""
],
[
"Jin",
"Di",
""
],
[
"Yang",
"Bo",
""
]
] |
TITLE: Discovering link communities in complex networks by exploiting link
dynamics
ABSTRACT: Discovery of communities in complex networks is a fundamental data analysis
problem with applications in various domains. Most of the existing approaches
have focused on discovering communities of nodes, while recent studies have
shown great advantages and utilities of the knowledge of communities of links
in networks. From this new perspective, we propose a link dynamics based
algorithm, called UELC, for identifying link communities of networks. In UELC,
the stochastic process of a link-node-link random walk is employed to unfold an
embedded bipartition structure of links in a network. The local mixing
properties of the Markov chain underlying the random walk are then utilized to
extract two emerged link communities. Further, the random walk and the
bipartitioning processes are wrapped in an iterative subdivision strategy to
recursively identify link partitions that segregate the network links into
multiple subdivisions. We evaluate the performance of the new method on
synthetic benchmarks and demonstrate its utility on real-world networks. Our
experimental results show that our method is highly effective for discovering
link communities in complex networks. As a comparison, we also extend UELC to
extracting communities of node, and show that it is effective for node
community identification.
|
no_new_dataset
| 0.710201
|
1303.4711
|
Dongxiao He
|
Dongxiao He, Jie Liu, Bo Yang, Yuxiao Huang, Dayou Liu, Di Jin
|
An Ant-Based Algorithm with Local Optimization for Community Detection
in Large-Scale Networks
|
18 pages,7 figures, 4 tables. arXiv admin note: text overlap with
arXiv:0803.0476, arXiv:cond-mat/0309508 by other authors
|
Advances in Complex Systems, 2012, 15(08): 1250036
|
10.1142/S0219525912500361
| null |
cs.SI physics.soc-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we propose a multi-layer ant-based algorithm MABA, which
detects communities from networks by means of locally optimizing modularity
using individual ants. The basic version of MABA, namely SABA, combines a
self-avoiding label propagation technique with a simulated annealing strategy
for ant diffusion in networks. Once the communities are found by SABA, this
method can be reapplied to a higher level network where each obtained community
is regarded as a new vertex. The aforementioned process is repeated
iteratively, and this corresponds to MABA. Thanks to the intrinsic multi-level
nature of our algorithm, it possesses the potential ability to unfold
multi-scale hierarchical structures. Furthermore, MABA has the ability that
mitigates the resolution limit of modularity. The proposed MABA has been
evaluated on both computer-generated benchmarks and widely used real-world
networks, and has been compared with a set of competitive algorithms.
Experimental results demonstrate that MABA is both effective and efficient (in
near linear time with respect to the size of network) for discovering
communities.
|
[
{
"version": "v1",
"created": "Tue, 19 Mar 2013 19:30:05 GMT"
}
] | 2013-03-20T00:00:00
|
[
[
"He",
"Dongxiao",
""
],
[
"Liu",
"Jie",
""
],
[
"Yang",
"Bo",
""
],
[
"Huang",
"Yuxiao",
""
],
[
"Liu",
"Dayou",
""
],
[
"Jin",
"Di",
""
]
] |
TITLE: An Ant-Based Algorithm with Local Optimization for Community Detection
in Large-Scale Networks
ABSTRACT: In this paper, we propose a multi-layer ant-based algorithm MABA, which
detects communities from networks by means of locally optimizing modularity
using individual ants. The basic version of MABA, namely SABA, combines a
self-avoiding label propagation technique with a simulated annealing strategy
for ant diffusion in networks. Once the communities are found by SABA, this
method can be reapplied to a higher level network where each obtained community
is regarded as a new vertex. The aforementioned process is repeated
iteratively, and this corresponds to MABA. Thanks to the intrinsic multi-level
nature of our algorithm, it possesses the potential ability to unfold
multi-scale hierarchical structures. Furthermore, MABA has the ability that
mitigates the resolution limit of modularity. The proposed MABA has been
evaluated on both computer-generated benchmarks and widely used real-world
networks, and has been compared with a set of competitive algorithms.
Experimental results demonstrate that MABA is both effective and efficient (in
near linear time with respect to the size of network) for discovering
communities.
|
no_new_dataset
| 0.710038
|
1303.3664
|
Weicong Ding
|
Weicong Ding, Mohammad H. Rohban, Prakash Ishwar, Venkatesh Saligrama
|
Topic Discovery through Data Dependent and Random Projections
| null | null | null | null |
stat.ML cs.LG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present algorithms for topic modeling based on the geometry of
cross-document word-frequency patterns. This perspective gains significance
under the so called separability condition. This is a condition on existence of
novel-words that are unique to each topic. We present a suite of highly
efficient algorithms based on data-dependent and random projections of
word-frequency patterns to identify novel words and associated topics. We will
also discuss the statistical guarantees of the data-dependent projections
method based on two mild assumptions on the prior density of topic document
matrix. Our key insight here is that the maximum and minimum values of
cross-document frequency patterns projected along any direction are associated
with novel words. While our sample complexity bounds for topic recovery are
similar to the state-of-art, the computational complexity of our random
projection scheme scales linearly with the number of documents and the number
of words per document. We present several experiments on synthetic and
real-world datasets to demonstrate qualitative and quantitative merits of our
scheme.
|
[
{
"version": "v1",
"created": "Fri, 15 Mar 2013 02:37:19 GMT"
},
{
"version": "v2",
"created": "Mon, 18 Mar 2013 13:11:02 GMT"
}
] | 2013-03-19T00:00:00
|
[
[
"Ding",
"Weicong",
""
],
[
"Rohban",
"Mohammad H.",
""
],
[
"Ishwar",
"Prakash",
""
],
[
"Saligrama",
"Venkatesh",
""
]
] |
TITLE: Topic Discovery through Data Dependent and Random Projections
ABSTRACT: We present algorithms for topic modeling based on the geometry of
cross-document word-frequency patterns. This perspective gains significance
under the so called separability condition. This is a condition on existence of
novel-words that are unique to each topic. We present a suite of highly
efficient algorithms based on data-dependent and random projections of
word-frequency patterns to identify novel words and associated topics. We will
also discuss the statistical guarantees of the data-dependent projections
method based on two mild assumptions on the prior density of topic document
matrix. Our key insight here is that the maximum and minimum values of
cross-document frequency patterns projected along any direction are associated
with novel words. While our sample complexity bounds for topic recovery are
similar to the state-of-art, the computational complexity of our random
projection scheme scales linearly with the number of documents and the number
of words per document. We present several experiments on synthetic and
real-world datasets to demonstrate qualitative and quantitative merits of our
scheme.
|
no_new_dataset
| 0.709372
|
1303.4087
|
Rafi Muhammad
|
Muhammad Rafi, Mohammad Shahid Shaikh
|
An improved semantic similarity measure for document clustering based on
topic maps
|
5 pages
| null | null | null |
cs.IR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A major computational burden, while performing document clustering, is the
calculation of similarity measure between a pair of documents. Similarity
measure is a function that assigns a real number between 0 and 1 to a pair of
documents, depending upon the degree of similarity between them. A value of
zero means that the documents are completely dissimilar whereas a value of one
indicates that the documents are practically identical. Traditionally,
vector-based models have been used for computing the document similarity. The
vector-based models represent several features present in documents. These
approaches to similarity measures, in general, cannot account for the semantics
of the document. Documents written in human languages contain contexts and the
words used to describe these contexts are generally semantically related.
Motivated by this fact, many researchers have proposed seman-tic-based
similarity measures by utilizing text annotation through external thesauruses
like WordNet (a lexical database). In this paper, we define a semantic
similarity measure based on documents represented in topic maps. Topic maps are
rapidly becoming an industrial standard for knowledge representation with a
focus for later search and extraction. The documents are transformed into a
topic map based coded knowledge and the similarity between a pair of documents
is represented as a correlation between the common patterns (sub-trees). The
experimental studies on the text mining datasets reveal that this new
similarity measure is more effective as compared to commonly used similarity
measures in text clustering.
|
[
{
"version": "v1",
"created": "Sun, 17 Mar 2013 18:28:02 GMT"
}
] | 2013-03-19T00:00:00
|
[
[
"Rafi",
"Muhammad",
""
],
[
"Shaikh",
"Mohammad Shahid",
""
]
] |
TITLE: An improved semantic similarity measure for document clustering based on
topic maps
ABSTRACT: A major computational burden, while performing document clustering, is the
calculation of similarity measure between a pair of documents. Similarity
measure is a function that assigns a real number between 0 and 1 to a pair of
documents, depending upon the degree of similarity between them. A value of
zero means that the documents are completely dissimilar whereas a value of one
indicates that the documents are practically identical. Traditionally,
vector-based models have been used for computing the document similarity. The
vector-based models represent several features present in documents. These
approaches to similarity measures, in general, cannot account for the semantics
of the document. Documents written in human languages contain contexts and the
words used to describe these contexts are generally semantically related.
Motivated by this fact, many researchers have proposed seman-tic-based
similarity measures by utilizing text annotation through external thesauruses
like WordNet (a lexical database). In this paper, we define a semantic
similarity measure based on documents represented in topic maps. Topic maps are
rapidly becoming an industrial standard for knowledge representation with a
focus for later search and extraction. The documents are transformed into a
topic map based coded knowledge and the similarity between a pair of documents
is represented as a correlation between the common patterns (sub-trees). The
experimental studies on the text mining datasets reveal that this new
similarity measure is more effective as compared to commonly used similarity
measures in text clustering.
|
no_new_dataset
| 0.71282
|
1303.4160
|
Conrad Sanderson
|
Vikas Reddy, Conrad Sanderson, Brian C. Lovell
|
Improved Foreground Detection via Block-based Classifier Cascade with
Probabilistic Decision Integration
| null |
IEEE Transactions on Circuits and Systems for Video Technology,
Vol. 23, No. 1, pp. 83-93, 2013
|
10.1109/TCSVT.2012.2203199
| null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Background subtraction is a fundamental low-level processing task in numerous
computer vision applications. The vast majority of algorithms process images on
a pixel-by-pixel basis, where an independent decision is made for each pixel. A
general limitation of such processing is that rich contextual information is
not taken into account. We propose a block-based method capable of dealing with
noise, illumination variations and dynamic backgrounds, while still obtaining
smooth contours of foreground objects. Specifically, image sequences are
analysed on an overlapping block-by-block basis. A low-dimensional texture
descriptor obtained from each block is passed through an adaptive classifier
cascade, where each stage handles a distinct problem. A probabilistic
foreground mask generation approach then exploits block overlaps to integrate
interim block-level decisions into final pixel-level foreground segmentation.
Unlike many pixel-based methods, ad-hoc post-processing of foreground masks is
not required. Experiments on the difficult Wallflower and I2R datasets show
that the proposed approach obtains on average better results (both
qualitatively and quantitatively) than several prominent methods. We
furthermore propose the use of tracking performance as an unbiased approach for
assessing the practical usefulness of foreground segmentation methods, and show
that the proposed approach leads to considerable improvements in tracking
accuracy on the CAVIAR dataset.
|
[
{
"version": "v1",
"created": "Mon, 18 Mar 2013 05:48:40 GMT"
}
] | 2013-03-19T00:00:00
|
[
[
"Reddy",
"Vikas",
""
],
[
"Sanderson",
"Conrad",
""
],
[
"Lovell",
"Brian C.",
""
]
] |
TITLE: Improved Foreground Detection via Block-based Classifier Cascade with
Probabilistic Decision Integration
ABSTRACT: Background subtraction is a fundamental low-level processing task in numerous
computer vision applications. The vast majority of algorithms process images on
a pixel-by-pixel basis, where an independent decision is made for each pixel. A
general limitation of such processing is that rich contextual information is
not taken into account. We propose a block-based method capable of dealing with
noise, illumination variations and dynamic backgrounds, while still obtaining
smooth contours of foreground objects. Specifically, image sequences are
analysed on an overlapping block-by-block basis. A low-dimensional texture
descriptor obtained from each block is passed through an adaptive classifier
cascade, where each stage handles a distinct problem. A probabilistic
foreground mask generation approach then exploits block overlaps to integrate
interim block-level decisions into final pixel-level foreground segmentation.
Unlike many pixel-based methods, ad-hoc post-processing of foreground masks is
not required. Experiments on the difficult Wallflower and I2R datasets show
that the proposed approach obtains on average better results (both
qualitatively and quantitatively) than several prominent methods. We
furthermore propose the use of tracking performance as an unbiased approach for
assessing the practical usefulness of foreground segmentation methods, and show
that the proposed approach leads to considerable improvements in tracking
accuracy on the CAVIAR dataset.
|
no_new_dataset
| 0.711017
|
1301.3583
|
Yann Dauphin
|
Yann N. Dauphin, Yoshua Bengio
|
Big Neural Networks Waste Capacity
| null | null | null | null |
cs.LG cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This article exposes the failure of some big neural networks to leverage
added capacity to reduce underfitting. Past research suggest diminishing
returns when increasing the size of neural networks. Our experiments on
ImageNet LSVRC-2010 show that this may be due to the fact there are highly
diminishing returns for capacity in terms of training error, leading to
underfitting. This suggests that the optimization method - first order gradient
descent - fails at this regime. Directly attacking this problem, either through
the optimization method or the choices of parametrization, may allow to improve
the generalization error on large datasets, for which a large capacity is
required.
|
[
{
"version": "v1",
"created": "Wed, 16 Jan 2013 04:45:29 GMT"
},
{
"version": "v2",
"created": "Thu, 17 Jan 2013 18:11:34 GMT"
},
{
"version": "v3",
"created": "Wed, 27 Feb 2013 23:07:05 GMT"
},
{
"version": "v4",
"created": "Thu, 14 Mar 2013 20:49:20 GMT"
}
] | 2013-03-18T00:00:00
|
[
[
"Dauphin",
"Yann N.",
""
],
[
"Bengio",
"Yoshua",
""
]
] |
TITLE: Big Neural Networks Waste Capacity
ABSTRACT: This article exposes the failure of some big neural networks to leverage
added capacity to reduce underfitting. Past research suggest diminishing
returns when increasing the size of neural networks. Our experiments on
ImageNet LSVRC-2010 show that this may be due to the fact there are highly
diminishing returns for capacity in terms of training error, leading to
underfitting. This suggests that the optimization method - first order gradient
descent - fails at this regime. Directly attacking this problem, either through
the optimization method or the choices of parametrization, may allow to improve
the generalization error on large datasets, for which a large capacity is
required.
|
no_new_dataset
| 0.712251
|
1303.3751
|
Michael (Micky) Fire
|
Michael Fire, Dima Kagan, Aviad Elyashar, and Yuval Elovici
|
Friend or Foe? Fake Profile Identification in Online Social Networks
|
Draft Version
| null | null | null |
cs.SI physics.soc-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The amount of personal information unwillingly exposed by users on online
social networks is staggering, as shown in recent research. Moreover, recent
reports indicate that these networks are infested with tens of millions of fake
users profiles, which may jeopardize the users' security and privacy. To
identify fake users in such networks and to improve users' security and
privacy, we developed the Social Privacy Protector software for Facebook. This
software contains three protection layers, which improve user privacy by
implementing different methods. The software first identifies a user's friends
who might pose a threat and then restricts this "friend's" exposure to the
user's personal information. The second layer is an expansion of Facebook's
basic privacy settings based on different types of social network usage
profiles. The third layer alerts users about the number of installed
applications on their Facebook profile, which have access to their private
information. An initial version of the Social Privacy Protection software
received high media coverage, and more than 3,000 users from more than twenty
countries have installed the software, out of which 527 used the software to
restrict more than nine thousand friends. In addition, we estimate that more
than a hundred users accepted the software's recommendations and removed at
least 1,792 Facebook applications from their profiles. By analyzing the unique
dataset obtained by the software in combination with machine learning
techniques, we developed classifiers, which are able to predict which Facebook
profiles have high probabilities of being fake and therefore, threaten the
user's well-being. Moreover, in this study, we present statistics on users'
privacy settings and statistics of the number of applications installed on
Facebook profiles...
|
[
{
"version": "v1",
"created": "Fri, 15 Mar 2013 12:17:10 GMT"
}
] | 2013-03-18T00:00:00
|
[
[
"Fire",
"Michael",
""
],
[
"Kagan",
"Dima",
""
],
[
"Elyashar",
"Aviad",
""
],
[
"Elovici",
"Yuval",
""
]
] |
TITLE: Friend or Foe? Fake Profile Identification in Online Social Networks
ABSTRACT: The amount of personal information unwillingly exposed by users on online
social networks is staggering, as shown in recent research. Moreover, recent
reports indicate that these networks are infested with tens of millions of fake
users profiles, which may jeopardize the users' security and privacy. To
identify fake users in such networks and to improve users' security and
privacy, we developed the Social Privacy Protector software for Facebook. This
software contains three protection layers, which improve user privacy by
implementing different methods. The software first identifies a user's friends
who might pose a threat and then restricts this "friend's" exposure to the
user's personal information. The second layer is an expansion of Facebook's
basic privacy settings based on different types of social network usage
profiles. The third layer alerts users about the number of installed
applications on their Facebook profile, which have access to their private
information. An initial version of the Social Privacy Protection software
received high media coverage, and more than 3,000 users from more than twenty
countries have installed the software, out of which 527 used the software to
restrict more than nine thousand friends. In addition, we estimate that more
than a hundred users accepted the software's recommendations and removed at
least 1,792 Facebook applications from their profiles. By analyzing the unique
dataset obtained by the software in combination with machine learning
techniques, we developed classifiers, which are able to predict which Facebook
profiles have high probabilities of being fake and therefore, threaten the
user's well-being. Moreover, in this study, we present statistics on users'
privacy settings and statistics of the number of applications installed on
Facebook profiles...
|
no_new_dataset
| 0.702721
|
1301.2820
|
Eugenio Culurciello Eugenio Culurciello
|
Eugenio Culurciello, Jordan Bates, Aysegul Dundar, Jose Carrasco,
Clement Farabet
|
Clustering Learning for Robotic Vision
|
Code for this paper is available here:
https://github.com/culurciello/CL_paper1_code
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present the clustering learning technique applied to multi-layer
feedforward deep neural networks. We show that this unsupervised learning
technique can compute network filters with only a few minutes and a much
reduced set of parameters. The goal of this paper is to promote the technique
for general-purpose robotic vision systems. We report its use in static image
datasets and object tracking datasets. We show that networks trained with
clustering learning can outperform large networks trained for many hours on
complex datasets.
|
[
{
"version": "v1",
"created": "Sun, 13 Jan 2013 20:49:30 GMT"
},
{
"version": "v2",
"created": "Wed, 23 Jan 2013 14:53:21 GMT"
},
{
"version": "v3",
"created": "Wed, 13 Mar 2013 22:48:38 GMT"
}
] | 2013-03-15T00:00:00
|
[
[
"Culurciello",
"Eugenio",
""
],
[
"Bates",
"Jordan",
""
],
[
"Dundar",
"Aysegul",
""
],
[
"Carrasco",
"Jose",
""
],
[
"Farabet",
"Clement",
""
]
] |
TITLE: Clustering Learning for Robotic Vision
ABSTRACT: We present the clustering learning technique applied to multi-layer
feedforward deep neural networks. We show that this unsupervised learning
technique can compute network filters with only a few minutes and a much
reduced set of parameters. The goal of this paper is to promote the technique
for general-purpose robotic vision systems. We report its use in static image
datasets and object tracking datasets. We show that networks trained with
clustering learning can outperform large networks trained for many hours on
complex datasets.
|
no_new_dataset
| 0.7116
|
1301.3572
|
Camille Couprie
|
Camille Couprie, Cl\'ement Farabet, Laurent Najman and Yann LeCun
|
Indoor Semantic Segmentation using depth information
|
8 pages, 3 figures
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This work addresses multi-class segmentation of indoor scenes with RGB-D
inputs. While this area of research has gained much attention recently, most
works still rely on hand-crafted features. In contrast, we apply a multiscale
convolutional network to learn features directly from the images and the depth
information. We obtain state-of-the-art on the NYU-v2 depth dataset with an
accuracy of 64.5%. We illustrate the labeling of indoor scenes in videos
sequences that could be processed in real-time using appropriate hardware such
as an FPGA.
|
[
{
"version": "v1",
"created": "Wed, 16 Jan 2013 03:31:30 GMT"
},
{
"version": "v2",
"created": "Thu, 14 Mar 2013 18:18:17 GMT"
}
] | 2013-03-15T00:00:00
|
[
[
"Couprie",
"Camille",
""
],
[
"Farabet",
"Clément",
""
],
[
"Najman",
"Laurent",
""
],
[
"LeCun",
"Yann",
""
]
] |
TITLE: Indoor Semantic Segmentation using depth information
ABSTRACT: This work addresses multi-class segmentation of indoor scenes with RGB-D
inputs. While this area of research has gained much attention recently, most
works still rely on hand-crafted features. In contrast, we apply a multiscale
convolutional network to learn features directly from the images and the depth
information. We obtain state-of-the-art on the NYU-v2 depth dataset with an
accuracy of 64.5%. We illustrate the labeling of indoor scenes in videos
sequences that could be processed in real-time using appropriate hardware such
as an FPGA.
|
no_new_dataset
| 0.712057
|
1303.3517
|
Yingyi Bu Yingyi Bu
|
Joshua Rosen, Neoklis Polyzotis, Vinayak Borkar, Yingyi Bu, Michael J.
Carey, Markus Weimer, Tyson Condie, Raghu Ramakrishnan
|
Iterative MapReduce for Large Scale Machine Learning
| null | null | null | null |
cs.DC cs.DB cs.LG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Large datasets ("Big Data") are becoming ubiquitous because the potential
value in deriving insights from data, across a wide range of business and
scientific applications, is increasingly recognized. In particular, machine
learning - one of the foundational disciplines for data analysis, summarization
and inference - on Big Data has become routine at most organizations that
operate large clouds, usually based on systems such as Hadoop that support the
MapReduce programming paradigm. It is now widely recognized that while
MapReduce is highly scalable, it suffers from a critical weakness for machine
learning: it does not support iteration. Consequently, one has to program
around this limitation, leading to fragile, inefficient code. Further, reliance
on the programmer is inherently flawed in a multi-tenanted cloud environment,
since the programmer does not have visibility into the state of the system when
his or her program executes. Prior work has sought to address this problem by
either developing specialized systems aimed at stylized applications, or by
augmenting MapReduce with ad hoc support for saving state across iterations
(driven by an external loop). In this paper, we advocate support for looping as
a first-class construct, and propose an extension of the MapReduce programming
paradigm called {\em Iterative MapReduce}. We then develop an optimizer for a
class of Iterative MapReduce programs that cover most machine learning
techniques, provide theoretical justifications for the key optimization steps,
and empirically demonstrate that system-optimized programs for significant
machine learning tasks are competitive with state-of-the-art specialized
solutions.
|
[
{
"version": "v1",
"created": "Wed, 13 Mar 2013 04:24:12 GMT"
}
] | 2013-03-15T00:00:00
|
[
[
"Rosen",
"Joshua",
""
],
[
"Polyzotis",
"Neoklis",
""
],
[
"Borkar",
"Vinayak",
""
],
[
"Bu",
"Yingyi",
""
],
[
"Carey",
"Michael J.",
""
],
[
"Weimer",
"Markus",
""
],
[
"Condie",
"Tyson",
""
],
[
"Ramakrishnan",
"Raghu",
""
]
] |
TITLE: Iterative MapReduce for Large Scale Machine Learning
ABSTRACT: Large datasets ("Big Data") are becoming ubiquitous because the potential
value in deriving insights from data, across a wide range of business and
scientific applications, is increasingly recognized. In particular, machine
learning - one of the foundational disciplines for data analysis, summarization
and inference - on Big Data has become routine at most organizations that
operate large clouds, usually based on systems such as Hadoop that support the
MapReduce programming paradigm. It is now widely recognized that while
MapReduce is highly scalable, it suffers from a critical weakness for machine
learning: it does not support iteration. Consequently, one has to program
around this limitation, leading to fragile, inefficient code. Further, reliance
on the programmer is inherently flawed in a multi-tenanted cloud environment,
since the programmer does not have visibility into the state of the system when
his or her program executes. Prior work has sought to address this problem by
either developing specialized systems aimed at stylized applications, or by
augmenting MapReduce with ad hoc support for saving state across iterations
(driven by an external loop). In this paper, we advocate support for looping as
a first-class construct, and propose an extension of the MapReduce programming
paradigm called {\em Iterative MapReduce}. We then develop an optimizer for a
class of Iterative MapReduce programs that cover most machine learning
techniques, provide theoretical justifications for the key optimization steps,
and empirically demonstrate that system-optimized programs for significant
machine learning tasks are competitive with state-of-the-art specialized
solutions.
|
no_new_dataset
| 0.706589
|
1303.3164
|
Uma Sawant
|
Uma Sawant and Soumen Chakrabarti
|
Features and Aggregators for Web-scale Entity Search
|
10 pages, 12 figures including tables
| null | null | null |
cs.IR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We focus on two research issues in entity search: scoring a document or
snippet that potentially supports a candidate entity, and aggregating scores
from different snippets into an entity score. Proximity scoring has been
studied in IR outside the scope of entity search. However, aggregation has been
hardwired except in a few cases where probabilistic language models are used.
We instead explore simple, robust, discriminative ranking algorithms, with
informative snippet features and broad families of aggregation functions. Our
first contribution is a study of proximity-cognizant snippet features. In
contrast with prior work which uses hardwired "proximity kernels" that
implement a fixed decay with distance, we present a "universal" feature
encoding which jointly expresses the perplexity (informativeness) of a query
term match and the proximity of the match to the entity mention. Our second
contribution is a study of aggregation functions. Rather than train the ranking
algorithm on snippets and then aggregate scores, we directly train on entities
such that the ranking algorithm takes into account the aggregation function
being used. Our third contribution is an extensive Web-scale evaluation of the
above algorithms on two data sets having quite different properties and
behavior. The first one is the W3C dataset used in TREC-scale enterprise
search, with pre-annotated entity mentions. The second is a Web-scale
open-domain entity search dataset consisting of 500 million Web pages, which
contain about 8 billion token spans annotated automatically with two million
entities from 200,000 entity types in Wikipedia. On the TREC dataset, the
performance of our system is comparable to the currently prevalent systems. On
the much larger and noisier Web dataset, our system delivers significantly
better performance than all other systems, with 8% MAP improvement over the
closest competitor.
|
[
{
"version": "v1",
"created": "Wed, 13 Mar 2013 14:06:49 GMT"
}
] | 2013-03-14T00:00:00
|
[
[
"Sawant",
"Uma",
""
],
[
"Chakrabarti",
"Soumen",
""
]
] |
TITLE: Features and Aggregators for Web-scale Entity Search
ABSTRACT: We focus on two research issues in entity search: scoring a document or
snippet that potentially supports a candidate entity, and aggregating scores
from different snippets into an entity score. Proximity scoring has been
studied in IR outside the scope of entity search. However, aggregation has been
hardwired except in a few cases where probabilistic language models are used.
We instead explore simple, robust, discriminative ranking algorithms, with
informative snippet features and broad families of aggregation functions. Our
first contribution is a study of proximity-cognizant snippet features. In
contrast with prior work which uses hardwired "proximity kernels" that
implement a fixed decay with distance, we present a "universal" feature
encoding which jointly expresses the perplexity (informativeness) of a query
term match and the proximity of the match to the entity mention. Our second
contribution is a study of aggregation functions. Rather than train the ranking
algorithm on snippets and then aggregate scores, we directly train on entities
such that the ranking algorithm takes into account the aggregation function
being used. Our third contribution is an extensive Web-scale evaluation of the
above algorithms on two data sets having quite different properties and
behavior. The first one is the W3C dataset used in TREC-scale enterprise
search, with pre-annotated entity mentions. The second is a Web-scale
open-domain entity search dataset consisting of 500 million Web pages, which
contain about 8 billion token spans annotated automatically with two million
entities from 200,000 entity types in Wikipedia. On the TREC dataset, the
performance of our system is comparable to the currently prevalent systems. On
the much larger and noisier Web dataset, our system delivers significantly
better performance than all other systems, with 8% MAP improvement over the
closest competitor.
|
new_dataset
| 0.623377
|
1303.3229
|
Radu Dragusin
|
Radu Dragusin (1 and 2), Paula Petcu (1 and 3), Christina Lioma (1 and
2), Birger Larsen (4), Henrik L. J{\o}rgensen (5), Ingemar J. Cox (1 and 6),
Lars Kai Hansen (1), Peter Ingwersen (4), Ole Winther (1) ((1) DTU Compute,
Technical University of Denmark, Denmark, (2) Department of Computer Science,
University of Copenhagen, Denmark, (3) Findwise, Copenhagen, Denmark, (4)
Information Systems and Interaction Design, Royal School of Library and
Information Science, Copenhagen, Denmark, (5) Department of Clinical
Biochemistry, Bispebjerg Hospital, Copenhagen, Denmark, (6) Department of
Computer Science, University College London, London, United Kingdom)
|
FindZebra: A search engine for rare diseases
| null |
International Journal of Medical Informatics, Available online 23
February 2013, ISSN 1386-5056
|
10.1016/j.ijmedinf.2013.01.005
| null |
cs.IR cs.DL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Background: The web has become a primary information resource about illnesses
and treatments for both medical and non-medical users. Standard web search is
by far the most common interface for such information. It is therefore of
interest to find out how well web search engines work for diagnostic queries
and what factors contribute to successes and failures. Among diseases, rare (or
orphan) diseases represent an especially challenging and thus interesting class
to diagnose as each is rare, diverse in symptoms and usually has scattered
resources associated with it. Methods: We use an evaluation approach for web
search engines for rare disease diagnosis which includes 56 real life
diagnostic cases, state-of-the-art evaluation measures, and curated information
resources. In addition, we introduce FindZebra, a specialized (vertical) rare
disease search engine. FindZebra is powered by open source search technology
and uses curated freely available online medical information. Results:
FindZebra outperforms Google Search in both default setup and customised to the
resources used by FindZebra. We extend FindZebra with specialized
functionalities exploiting medical ontological information and UMLS medical
concepts to demonstrate different ways of displaying the retrieved results to
medical experts. Conclusions: Our results indicate that a specialized search
engine can improve the diagnostic quality without compromising the ease of use
of the currently widely popular web search engines. The proposed evaluation
approach can be valuable for future development and benchmarking. The FindZebra
search engine is available at http://www.findzebra.com/.
|
[
{
"version": "v1",
"created": "Wed, 13 Mar 2013 17:47:57 GMT"
}
] | 2013-03-14T00:00:00
|
[
[
"Dragusin",
"Radu",
"",
"1 and 2"
],
[
"Petcu",
"Paula",
"",
"1 and 3"
],
[
"Lioma",
"Christina",
"",
"1 and\n 2"
],
[
"Larsen",
"Birger",
"",
"1 and 6"
],
[
"Jørgensen",
"Henrik L.",
"",
"1 and 6"
],
[
"Cox",
"Ingemar J.",
"",
"1 and 6"
],
[
"Hansen",
"Lars Kai",
""
],
[
"Ingwersen",
"Peter",
""
],
[
"Winther",
"Ole",
""
]
] |
TITLE: FindZebra: A search engine for rare diseases
ABSTRACT: Background: The web has become a primary information resource about illnesses
and treatments for both medical and non-medical users. Standard web search is
by far the most common interface for such information. It is therefore of
interest to find out how well web search engines work for diagnostic queries
and what factors contribute to successes and failures. Among diseases, rare (or
orphan) diseases represent an especially challenging and thus interesting class
to diagnose as each is rare, diverse in symptoms and usually has scattered
resources associated with it. Methods: We use an evaluation approach for web
search engines for rare disease diagnosis which includes 56 real life
diagnostic cases, state-of-the-art evaluation measures, and curated information
resources. In addition, we introduce FindZebra, a specialized (vertical) rare
disease search engine. FindZebra is powered by open source search technology
and uses curated freely available online medical information. Results:
FindZebra outperforms Google Search in both default setup and customised to the
resources used by FindZebra. We extend FindZebra with specialized
functionalities exploiting medical ontological information and UMLS medical
concepts to demonstrate different ways of displaying the retrieved results to
medical experts. Conclusions: Our results indicate that a specialized search
engine can improve the diagnostic quality without compromising the ease of use
of the currently widely popular web search engines. The proposed evaluation
approach can be valuable for future development and benchmarking. The FindZebra
search engine is available at http://www.findzebra.com/.
|
no_new_dataset
| 0.705417
|
1303.2751
|
Togerchety Hitendra sarma
|
Mallikarjun Hangarge
|
Gaussian Mixture Model for Handwritten Script Identification
|
Appeared in ICECIT-2012
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper presents a Gaussian Mixture Model (GMM) to identify the script of
handwritten words of Roman, Devanagari, Kannada and Telugu scripts. It
emphasizes the significance of directional energies for identification of
script of the word. It is robust to varied image sizes and different styles of
writing. A GMM is modeled using a set of six novel features derived from
directional energy distributions of the underlying image. The standard
deviation of directional energy distributions are computed by decomposing an
image matrix into right and left diagonals. Furthermore, deviation of
horizontal and vertical distributions of energies is also built-in to GMM. A
dataset of 400 images out of 800 (200 of each script) are used for training GMM
and the remaining is for testing. An exhaustive experimentation is carried out
at bi-script, tri-script and multi-script level and achieved script
identification accuracies in percentage as 98.7, 98.16 and 96.91 respectively.
|
[
{
"version": "v1",
"created": "Tue, 12 Mar 2013 02:32:02 GMT"
}
] | 2013-03-13T00:00:00
|
[
[
"Hangarge",
"Mallikarjun",
""
]
] |
TITLE: Gaussian Mixture Model for Handwritten Script Identification
ABSTRACT: This paper presents a Gaussian Mixture Model (GMM) to identify the script of
handwritten words of Roman, Devanagari, Kannada and Telugu scripts. It
emphasizes the significance of directional energies for identification of
script of the word. It is robust to varied image sizes and different styles of
writing. A GMM is modeled using a set of six novel features derived from
directional energy distributions of the underlying image. The standard
deviation of directional energy distributions are computed by decomposing an
image matrix into right and left diagonals. Furthermore, deviation of
horizontal and vertical distributions of energies is also built-in to GMM. A
dataset of 400 images out of 800 (200 of each script) are used for training GMM
and the remaining is for testing. An exhaustive experimentation is carried out
at bi-script, tri-script and multi-script level and achieved script
identification accuracies in percentage as 98.7, 98.16 and 96.91 respectively.
|
no_new_dataset
| 0.710245
|
1303.2783
|
Conrad Sanderson
|
Conrad Sanderson, Mehrtash T. Harandi, Yongkang Wong, Brian C. Lovell
|
Combined Learning of Salient Local Descriptors and Distance Metrics for
Image Set Face Verification
| null |
IEEE International Conference on Advanced Video and Signal-Based
Surveillance (AVSS), pp, 294-299, 2012
|
10.1109/AVSS.2012.23
| null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In contrast to comparing faces via single exemplars, matching sets of face
images increases robustness and discrimination performance. Recent image set
matching approaches typically measure similarities between subspaces or
manifolds, while representing faces in a rigid and holistic manner. Such
representations are easily affected by variations in terms of alignment,
illumination, pose and expression. While local feature based representations
are considerably more robust to such variations, they have received little
attention within the image set matching area. We propose a novel image set
matching technique, comprised of three aspects: (i) robust descriptors of face
regions based on local features, partly inspired by the hierarchy in the human
visual system, (ii) use of several subspace and exemplar metrics to compare
corresponding face regions, (iii) jointly learning which regions are the most
discriminative while finding the optimal mixing weights for combining metrics.
Face recognition experiments on LFW, PIE and MOBIO face datasets show that the
proposed algorithm obtains considerably better performance than several recent
state-of-the-art techniques, such as Local Principal Angle and the Kernel
Affine Hull Method.
|
[
{
"version": "v1",
"created": "Tue, 12 Mar 2013 06:12:59 GMT"
}
] | 2013-03-13T00:00:00
|
[
[
"Sanderson",
"Conrad",
""
],
[
"Harandi",
"Mehrtash T.",
""
],
[
"Wong",
"Yongkang",
""
],
[
"Lovell",
"Brian C.",
""
]
] |
TITLE: Combined Learning of Salient Local Descriptors and Distance Metrics for
Image Set Face Verification
ABSTRACT: In contrast to comparing faces via single exemplars, matching sets of face
images increases robustness and discrimination performance. Recent image set
matching approaches typically measure similarities between subspaces or
manifolds, while representing faces in a rigid and holistic manner. Such
representations are easily affected by variations in terms of alignment,
illumination, pose and expression. While local feature based representations
are considerably more robust to such variations, they have received little
attention within the image set matching area. We propose a novel image set
matching technique, comprised of three aspects: (i) robust descriptors of face
regions based on local features, partly inspired by the hierarchy in the human
visual system, (ii) use of several subspace and exemplar metrics to compare
corresponding face regions, (iii) jointly learning which regions are the most
discriminative while finding the optimal mixing weights for combining metrics.
Face recognition experiments on LFW, PIE and MOBIO face datasets show that the
proposed algorithm obtains considerably better performance than several recent
state-of-the-art techniques, such as Local Principal Angle and the Kernel
Affine Hull Method.
|
no_new_dataset
| 0.710791
|
1209.2178
|
Sutanay Choudhury
|
Sutanay Choudhury, Lawrence B. Holder, Abhik Ray, George Chin Jr.,
John T. Feo
|
Continuous Queries for Multi-Relational Graphs
|
Withdrawn because for information disclosure considerations
| null | null |
PNNL-SA-90326
|
cs.DB cs.SI
|
http://creativecommons.org/licenses/publicdomain/
|
Acting on time-critical events by processing ever growing social media or
news streams is a major technical challenge. Many of these data sources can be
modeled as multi-relational graphs. Continuous queries or techniques to search
for rare events that typically arise in monitoring applications have been
studied extensively for relational databases. This work is dedicated to answer
the question that emerges naturally: how can we efficiently execute a
continuous query on a dynamic graph? This paper presents an exact subgraph
search algorithm that exploits the temporal characteristics of representative
queries for online news or social media monitoring. The algorithm is based on a
novel data structure called the Subgraph Join Tree (SJ-Tree) that leverages the
structural and semantic characteristics of the underlying multi-relational
graph. The paper concludes with extensive experimentation on several real-world
datasets that demonstrates the validity of this approach.
|
[
{
"version": "v1",
"created": "Mon, 10 Sep 2012 23:23:16 GMT"
},
{
"version": "v2",
"created": "Sat, 9 Mar 2013 00:28:38 GMT"
}
] | 2013-03-12T00:00:00
|
[
[
"Choudhury",
"Sutanay",
""
],
[
"Holder",
"Lawrence B.",
""
],
[
"Ray",
"Abhik",
""
],
[
"Chin",
"George",
"Jr."
],
[
"Feo",
"John T.",
""
]
] |
TITLE: Continuous Queries for Multi-Relational Graphs
ABSTRACT: Acting on time-critical events by processing ever growing social media or
news streams is a major technical challenge. Many of these data sources can be
modeled as multi-relational graphs. Continuous queries or techniques to search
for rare events that typically arise in monitoring applications have been
studied extensively for relational databases. This work is dedicated to answer
the question that emerges naturally: how can we efficiently execute a
continuous query on a dynamic graph? This paper presents an exact subgraph
search algorithm that exploits the temporal characteristics of representative
queries for online news or social media monitoring. The algorithm is based on a
novel data structure called the Subgraph Join Tree (SJ-Tree) that leverages the
structural and semantic characteristics of the underlying multi-relational
graph. The paper concludes with extensive experimentation on several real-world
datasets that demonstrates the validity of this approach.
|
no_new_dataset
| 0.708168
|
1302.6556
|
Theodoros Rekatsinas
|
Theodoros Rekatsinas, Amol Deshpande, Ashwin Machanavajjhala
|
On Sharing Private Data with Multiple Non-Colluding Adversaries
|
14 pages, 6 figures, 2 tables
| null | null | null |
cs.DB
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present SPARSI, a theoretical framework for partitioning sensitive data
across multiple non-colluding adversaries. Most work in privacy-aware data
sharing has considered disclosing summaries where the aggregate information
about the data is preserved, but sensitive user information is protected.
Nonetheless, there are applications, including online advertising, cloud
computing and crowdsourcing markets, where detailed and fine-grained user-data
must be disclosed. We consider a new data sharing paradigm and introduce the
problem of privacy-aware data partitioning, where a sensitive dataset must be
partitioned among k untrusted parties (adversaries). The goal is to maximize
the utility derived by partitioning and distributing the dataset, while
minimizing the amount of sensitive information disclosed. The data should be
distributed so that an adversary, without colluding with other adversaries,
cannot draw additional inferences about the private information, by linking
together multiple pieces of information released to her. The assumption of no
collusion is both reasonable and necessary in the above application domains
that require release of private user information. SPARSI enables us to formally
define privacy-aware data partitioning using the notion of sensitive properties
for modeling private information and a hypergraph representation for describing
the interdependencies between data entries and private information. We show
that solving privacy-aware partitioning is, in general, NP-hard, but for
specific information disclosure functions, good approximate solutions can be
found using relaxation techniques. Finally, we present a local search algorithm
applicable to generic information disclosure functions. We apply SPARSI
together with the proposed algorithms on data from a real advertising scenario
and show that we can partition data with no disclosure to any single
advertiser.
|
[
{
"version": "v1",
"created": "Tue, 26 Feb 2013 19:49:55 GMT"
},
{
"version": "v2",
"created": "Thu, 28 Feb 2013 20:48:52 GMT"
},
{
"version": "v3",
"created": "Mon, 11 Mar 2013 15:41:40 GMT"
}
] | 2013-03-12T00:00:00
|
[
[
"Rekatsinas",
"Theodoros",
""
],
[
"Deshpande",
"Amol",
""
],
[
"Machanavajjhala",
"Ashwin",
""
]
] |
TITLE: On Sharing Private Data with Multiple Non-Colluding Adversaries
ABSTRACT: We present SPARSI, a theoretical framework for partitioning sensitive data
across multiple non-colluding adversaries. Most work in privacy-aware data
sharing has considered disclosing summaries where the aggregate information
about the data is preserved, but sensitive user information is protected.
Nonetheless, there are applications, including online advertising, cloud
computing and crowdsourcing markets, where detailed and fine-grained user-data
must be disclosed. We consider a new data sharing paradigm and introduce the
problem of privacy-aware data partitioning, where a sensitive dataset must be
partitioned among k untrusted parties (adversaries). The goal is to maximize
the utility derived by partitioning and distributing the dataset, while
minimizing the amount of sensitive information disclosed. The data should be
distributed so that an adversary, without colluding with other adversaries,
cannot draw additional inferences about the private information, by linking
together multiple pieces of information released to her. The assumption of no
collusion is both reasonable and necessary in the above application domains
that require release of private user information. SPARSI enables us to formally
define privacy-aware data partitioning using the notion of sensitive properties
for modeling private information and a hypergraph representation for describing
the interdependencies between data entries and private information. We show
that solving privacy-aware partitioning is, in general, NP-hard, but for
specific information disclosure functions, good approximate solutions can be
found using relaxation techniques. Finally, we present a local search algorithm
applicable to generic information disclosure functions. We apply SPARSI
together with the proposed algorithms on data from a real advertising scenario
and show that we can partition data with no disclosure to any single
advertiser.
|
no_new_dataset
| 0.708219
|
1303.0045
|
Bogdan State
|
Bogdan State, Patrick Park, Ingmar Weber, Yelena Mejova, Michael Macy
|
The Mesh of Civilizations and International Email Flows
|
10 pages, 3 figures
| null | null | null |
cs.SI physics.soc-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In The Clash of Civilizations, Samuel Huntington argued that the primary axis
of global conflict was no longer ideological or economic but cultural and
religious, and that this division would characterize the "battle lines of the
future." In contrast to the "top down" approach in previous research focused on
the relations among nation states, we focused on the flows of interpersonal
communication as a bottom-up view of international alignments. To that end, we
mapped the locations of the world's countries in global email networks to see
if we could detect cultural fault lines. Using IP-geolocation on a worldwide
anonymized dataset obtained from a large Internet company, we constructed a
global email network. In computing email flows we employ a novel rescaling
procedure to account for differences due to uneven adoption of a particular
Internet service across the world. Our analysis shows that email flows are
consistent with Huntington's thesis. In addition to location in Huntington's
"civilizations," our results also attest to the importance of both cultural and
economic factors in the patterning of inter-country communication ties.
|
[
{
"version": "v1",
"created": "Thu, 28 Feb 2013 23:29:11 GMT"
},
{
"version": "v2",
"created": "Sun, 10 Mar 2013 19:15:12 GMT"
}
] | 2013-03-12T00:00:00
|
[
[
"State",
"Bogdan",
""
],
[
"Park",
"Patrick",
""
],
[
"Weber",
"Ingmar",
""
],
[
"Mejova",
"Yelena",
""
],
[
"Macy",
"Michael",
""
]
] |
TITLE: The Mesh of Civilizations and International Email Flows
ABSTRACT: In The Clash of Civilizations, Samuel Huntington argued that the primary axis
of global conflict was no longer ideological or economic but cultural and
religious, and that this division would characterize the "battle lines of the
future." In contrast to the "top down" approach in previous research focused on
the relations among nation states, we focused on the flows of interpersonal
communication as a bottom-up view of international alignments. To that end, we
mapped the locations of the world's countries in global email networks to see
if we could detect cultural fault lines. Using IP-geolocation on a worldwide
anonymized dataset obtained from a large Internet company, we constructed a
global email network. In computing email flows we employ a novel rescaling
procedure to account for differences due to uneven adoption of a particular
Internet service across the world. Our analysis shows that email flows are
consistent with Huntington's thesis. In addition to location in Huntington's
"civilizations," our results also attest to the importance of both cultural and
economic factors in the patterning of inter-country communication ties.
|
no_new_dataset
| 0.704376
|
1303.0381
|
Derrick Wing Kwan Ng Dr.
|
Derrick Wing Kwan Ng and Robert Schober
|
Spectral Efficient Optimization in OFDM Systems with Wireless
Information and Power Transfer
|
Submitted to EUSIPCO 2013 (Invited paper)
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper considers an orthogonal frequency division multiplexing (OFDM)
point-to-point wireless communication system with simultaneous wireless
information and power transfer. We study a receiver which is able to harvest
energy from the desired signal, noise, and interference. In particular, we
consider a power splitting receiver which dynamically splits the received power
into two power streams for information decoding and energy harvesting. We
design power allocation algorithms maximizing the spectral efficiency
(bit/s/Hz) of data transmission. In particular, the algorithm design is
formulated as a nonconvex optimization problem which takes into account the
constraint on the minimum power delivered to the receiver. The problem is
solved by using convex optimization techniques and a one-dimensional search.
The optimal power allocation algorithm serves as a system benchmark scheme due
to its high complexity. To strike a balance between system performance and
computational complexity, we also propose two suboptimal algorithms which
require a low computational complexity. Simulation results demonstrate the
excellent performance of the proposed suboptimal algorithms.
|
[
{
"version": "v1",
"created": "Sat, 2 Mar 2013 12:33:21 GMT"
}
] | 2013-03-12T00:00:00
|
[
[
"Ng",
"Derrick Wing Kwan",
""
],
[
"Schober",
"Robert",
""
]
] |
TITLE: Spectral Efficient Optimization in OFDM Systems with Wireless
Information and Power Transfer
ABSTRACT: This paper considers an orthogonal frequency division multiplexing (OFDM)
point-to-point wireless communication system with simultaneous wireless
information and power transfer. We study a receiver which is able to harvest
energy from the desired signal, noise, and interference. In particular, we
consider a power splitting receiver which dynamically splits the received power
into two power streams for information decoding and energy harvesting. We
design power allocation algorithms maximizing the spectral efficiency
(bit/s/Hz) of data transmission. In particular, the algorithm design is
formulated as a nonconvex optimization problem which takes into account the
constraint on the minimum power delivered to the receiver. The problem is
solved by using convex optimization techniques and a one-dimensional search.
The optimal power allocation algorithm serves as a system benchmark scheme due
to its high complexity. To strike a balance between system performance and
computational complexity, we also propose two suboptimal algorithms which
require a low computational complexity. Simulation results demonstrate the
excellent performance of the proposed suboptimal algorithms.
|
no_new_dataset
| 0.707967
|
1303.2215
|
Maumita Bhattacharya
|
Maumita Bhattacharya
|
Expensive Optimisation: A Metaheuristics Perspective
|
7 pages
|
(IJACSA) International Journal of Advanced Computer Science and
Applications,ISSN-2156-5570(Online, Vol. 4, No. 2, 2013, pp. 203-209
| null | null |
cs.NE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Stochastic, iterative search methods such as Evolutionary Algorithms (EAs)
are proven to be efficient optimizers. However, they require evaluation of the
candidate solutions which may be prohibitively expensive in many real world
optimization problems. Use of approximate models or surrogates is being
explored as a way to reduce the number of such evaluations. In this paper we
investigated three such methods. The first method (DAFHEA) partially replaces
an expensive function evaluation by its approximate model. The approximation is
realized with support vector machine (SVM) regression models. The second method
(DAFHEA II) is an enhancement on DAFHEA to accommodate for uncertain
environments. The third one uses surrogate ranking with preference learning or
ordinal regression. The fitness of the candidates is estimated by modeling
their rank. The techniques' performances on some of the benchmark numerical
optimization problems have been reported. The comparative benefits and
shortcomings of both techniques have been identified.
|
[
{
"version": "v1",
"created": "Sat, 9 Mar 2013 14:41:24 GMT"
}
] | 2013-03-12T00:00:00
|
[
[
"Bhattacharya",
"Maumita",
""
]
] |
TITLE: Expensive Optimisation: A Metaheuristics Perspective
ABSTRACT: Stochastic, iterative search methods such as Evolutionary Algorithms (EAs)
are proven to be efficient optimizers. However, they require evaluation of the
candidate solutions which may be prohibitively expensive in many real world
optimization problems. Use of approximate models or surrogates is being
explored as a way to reduce the number of such evaluations. In this paper we
investigated three such methods. The first method (DAFHEA) partially replaces
an expensive function evaluation by its approximate model. The approximation is
realized with support vector machine (SVM) regression models. The second method
(DAFHEA II) is an enhancement on DAFHEA to accommodate for uncertain
environments. The third one uses surrogate ranking with preference learning or
ordinal regression. The fitness of the candidates is estimated by modeling
their rank. The techniques' performances on some of the benchmark numerical
optimization problems have been reported. The comparative benefits and
shortcomings of both techniques have been identified.
|
no_new_dataset
| 0.708792
|
1303.2277
|
Guilherme de Castro Mendes Gomes
|
Guilherme de Castro Mendes Gomes, Vitor Campos de Oliveira, Jussara
Marques de Almeida and Marcos Andr\'e Gon\c{c}alves
|
Is Learning to Rank Worth It? A Statistical Analysis of Learning to Rank
Methods
|
7 pages, 10 tables, 14 references. Original (short) paper published
in the Brazilian Symposium on Databases, 2012 (SBBD2012). Current revision
submitted to the Journal of Information and Data Management (JIDM)
| null | null | null |
cs.IR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The Learning to Rank (L2R) research field has experienced a fast paced growth
over the last few years, with a wide variety of benchmark datasets and
baselines available for experimentation. We here investigate the main
assumption behind this field, which is that, the use of sophisticated L2R
algorithms and models, produce significant gains over more traditional and
simple information retrieval approaches. Our experimental results surprisingly
indicate that many L2R algorithms, when put up against the best individual
features of each dataset, may not produce statistically significant
differences, even if the absolute gains may seem large. We also find that most
of the reported baselines are statistically tied, with no clear winner.
|
[
{
"version": "v1",
"created": "Sat, 9 Mar 2013 23:28:16 GMT"
}
] | 2013-03-12T00:00:00
|
[
[
"Gomes",
"Guilherme de Castro Mendes",
""
],
[
"de Oliveira",
"Vitor Campos",
""
],
[
"de Almeida",
"Jussara Marques",
""
],
[
"Gonçalves",
"Marcos André",
""
]
] |
TITLE: Is Learning to Rank Worth It? A Statistical Analysis of Learning to Rank
Methods
ABSTRACT: The Learning to Rank (L2R) research field has experienced a fast paced growth
over the last few years, with a wide variety of benchmark datasets and
baselines available for experimentation. We here investigate the main
assumption behind this field, which is that, the use of sophisticated L2R
algorithms and models, produce significant gains over more traditional and
simple information retrieval approaches. Our experimental results surprisingly
indicate that many L2R algorithms, when put up against the best individual
features of each dataset, may not produce statistically significant
differences, even if the absolute gains may seem large. We also find that most
of the reported baselines are statistically tied, with no clear winner.
|
no_new_dataset
| 0.709655
|
1303.2465
|
Conrad Sanderson
|
Vikas Reddy, Conrad Sanderson, Brian C. Lovell
|
A Low-Complexity Algorithm for Static Background Estimation from
Cluttered Image Sequences in Surveillance Contexts
| null |
EURASIP Journal on Image and Video Processing, 2011
|
10.1155/2011/164956
| null |
cs.CV
|
http://creativecommons.org/licenses/by/3.0/
|
For the purposes of foreground estimation, the true background model is
unavailable in many practical circumstances and needs to be estimated from
cluttered image sequences. We propose a sequential technique for static
background estimation in such conditions, with low computational and memory
requirements. Image sequences are analysed on a block-by-block basis. For each
block location a representative set is maintained which contains distinct
blocks obtained along its temporal line. The background estimation is carried
out in a Markov Random Field framework, where the optimal labelling solution is
computed using iterated conditional modes. The clique potentials are computed
based on the combined frequency response of the candidate block and its
neighbourhood. It is assumed that the most appropriate block results in the
smoothest response, indirectly enforcing the spatial continuity of structures
within a scene. Experiments on real-life surveillance videos demonstrate that
the proposed method obtains considerably better background estimates (both
qualitatively and quantitatively) than median filtering and the recently
proposed "intervals of stable intensity" method. Further experiments on the
Wallflower dataset suggest that the combination of the proposed method with a
foreground segmentation algorithm results in improved foreground segmentation.
|
[
{
"version": "v1",
"created": "Mon, 11 Mar 2013 09:57:49 GMT"
}
] | 2013-03-12T00:00:00
|
[
[
"Reddy",
"Vikas",
""
],
[
"Sanderson",
"Conrad",
""
],
[
"Lovell",
"Brian C.",
""
]
] |
TITLE: A Low-Complexity Algorithm for Static Background Estimation from
Cluttered Image Sequences in Surveillance Contexts
ABSTRACT: For the purposes of foreground estimation, the true background model is
unavailable in many practical circumstances and needs to be estimated from
cluttered image sequences. We propose a sequential technique for static
background estimation in such conditions, with low computational and memory
requirements. Image sequences are analysed on a block-by-block basis. For each
block location a representative set is maintained which contains distinct
blocks obtained along its temporal line. The background estimation is carried
out in a Markov Random Field framework, where the optimal labelling solution is
computed using iterated conditional modes. The clique potentials are computed
based on the combined frequency response of the candidate block and its
neighbourhood. It is assumed that the most appropriate block results in the
smoothest response, indirectly enforcing the spatial continuity of structures
within a scene. Experiments on real-life surveillance videos demonstrate that
the proposed method obtains considerably better background estimates (both
qualitatively and quantitatively) than median filtering and the recently
proposed "intervals of stable intensity" method. Further experiments on the
Wallflower dataset suggest that the combination of the proposed method with a
foreground segmentation algorithm results in improved foreground segmentation.
|
no_new_dataset
| 0.71123
|
1303.2593
|
Adeel Ansari
|
Adeel Ansari, Afza Bt Shafie, Abas B Md Said, Seema Ansari
|
Independent Component Analysis for Filtering Airwaves in Seabed Logging
Application
|
7 pages, 13 figures
|
International Journal of Advanced Studies in Computers, Science
and Engineering (IJASCSE), 2013
| null | null |
cs.OH physics.geo-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Marine controlled source electromagnetic (CSEM) sensing method used for the
detection of hydrocarbons based reservoirs in seabed logging application does
not perform well due to the presence of the airwaves (or sea-surface). These
airwaves interfere with the signal that comes from the subsurface seafloor and
also tend to dominate in the receiver response at larger offsets. The task is
to identify these air waves and the way they interact, and to filter them out.
In this paper, a popular method for counteracting with the above stated problem
scenario is Independent Component Analysis (ICA). Independent component
analysis (ICA) is a statistical method for transforming an observed
multidimensional or multivariate dataset into its constituent components
(sources) that are statistically as independent from each other as possible.
ICA-type de-convolution algorithm that is FASTICA is considered for mixed
signals de-convolution and considered convenient depending upon the nature of
the source and noise model. The results from the FASTICA algorithm are shown
and evaluated. In this paper, we present the FASTICA algorithm for the seabed
logging application.
|
[
{
"version": "v1",
"created": "Mon, 4 Mar 2013 16:18:51 GMT"
}
] | 2013-03-12T00:00:00
|
[
[
"Ansari",
"Adeel",
""
],
[
"Shafie",
"Afza Bt",
""
],
[
"Said",
"Abas B Md",
""
],
[
"Ansari",
"Seema",
""
]
] |
TITLE: Independent Component Analysis for Filtering Airwaves in Seabed Logging
Application
ABSTRACT: Marine controlled source electromagnetic (CSEM) sensing method used for the
detection of hydrocarbons based reservoirs in seabed logging application does
not perform well due to the presence of the airwaves (or sea-surface). These
airwaves interfere with the signal that comes from the subsurface seafloor and
also tend to dominate in the receiver response at larger offsets. The task is
to identify these air waves and the way they interact, and to filter them out.
In this paper, a popular method for counteracting with the above stated problem
scenario is Independent Component Analysis (ICA). Independent component
analysis (ICA) is a statistical method for transforming an observed
multidimensional or multivariate dataset into its constituent components
(sources) that are statistically as independent from each other as possible.
ICA-type de-convolution algorithm that is FASTICA is considered for mixed
signals de-convolution and considered convenient depending upon the nature of
the source and noise model. The results from the FASTICA algorithm are shown
and evaluated. In this paper, we present the FASTICA algorithm for the seabed
logging application.
|
no_new_dataset
| 0.713226
|
1303.1645
|
Rajdeep Mukherjee
|
Rajdeep Mukherjee, Priyankar Ghosh, Pallab Dasgupta and Ajit Pal
|
A Multi-objective Perspective for Operator Scheduling using Fine-grained
DVS Architecture
|
18 pages, 6 figures, International journal of VLSI design &
Communication Systems (VLSICS)
| null |
10.5121/vlsic.2013.4109
| null |
cs.OH
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The stringent power budget of fine grained power managed digital integrated
circuits have driven chip designers to optimize power at the cost of area and
delay, which were the traditional cost criteria for circuit optimization. The
emerging scenario motivates us to revisit the classical operator scheduling
problem under the availability of DVFS enabled functional units that can
trade-off cycles with power. We study the design space defined due to this
trade-off and present a branch-and-bound(B/B) algorithm to explore this state
space and report the pareto-optimal front with respect to area and power. The
scheduling also aims at maximum resource sharing and is able to attain
sufficient area and power gains for complex benchmarks when timing constraints
are relaxed by sufficient amount. Experimental results show that the algorithm
that operates without any user constraint(area/power) is able to solve the
problem for most available benchmarks, and the use of power budget or area
budget constraints leads to significant performance gain.
|
[
{
"version": "v1",
"created": "Thu, 7 Mar 2013 10:51:08 GMT"
}
] | 2013-03-11T00:00:00
|
[
[
"Mukherjee",
"Rajdeep",
""
],
[
"Ghosh",
"Priyankar",
""
],
[
"Dasgupta",
"Pallab",
""
],
[
"Pal",
"Ajit",
""
]
] |
TITLE: A Multi-objective Perspective for Operator Scheduling using Fine-grained
DVS Architecture
ABSTRACT: The stringent power budget of fine grained power managed digital integrated
circuits have driven chip designers to optimize power at the cost of area and
delay, which were the traditional cost criteria for circuit optimization. The
emerging scenario motivates us to revisit the classical operator scheduling
problem under the availability of DVFS enabled functional units that can
trade-off cycles with power. We study the design space defined due to this
trade-off and present a branch-and-bound(B/B) algorithm to explore this state
space and report the pareto-optimal front with respect to area and power. The
scheduling also aims at maximum resource sharing and is able to attain
sufficient area and power gains for complex benchmarks when timing constraints
are relaxed by sufficient amount. Experimental results show that the algorithm
that operates without any user constraint(area/power) is able to solve the
problem for most available benchmarks, and the use of power budget or area
budget constraints leads to significant performance gain.
|
no_new_dataset
| 0.708213
|
1104.5243
|
Georg Hager
|
Jan Treibig, Georg Hager, Hannes G. Hofmann, Joachim Hornegger,
Gerhard Wellein
|
Pushing the limits for medical image reconstruction on recent standard
multicore processors
|
13 pages, 9 figures. Revised and extended version
| null |
10.1177/1094342012442424
| null |
cs.PF cs.DC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Volume reconstruction by backprojection is the computational bottleneck in
many interventional clinical computed tomography (CT) applications. Today
vendors in this field replace special purpose hardware accelerators by standard
hardware like multicore chips and GPGPUs. Medical imaging algorithms are on the
verge of employing High Performance Computing (HPC) technology, and are
therefore an interesting new candidate for optimization. This paper presents
low-level optimizations for the backprojection algorithm, guided by a thorough
performance analysis on four generations of Intel multicore processors
(Harpertown, Westmere, Westmere EX, and Sandy Bridge).
We choose the RabbitCT benchmark, a standardized testcase well supported in
industry, to ensure transparent and comparable results. Our aim is to provide
not only the fastest possible implementation but also compare to performance
models and hardware counter data in order to fully understand the results. We
separate the influence of algorithmic optimizations, parallelization, SIMD
vectorization, and microarchitectural issues and pinpoint problems with current
SIMD instruction set extensions on standard CPUs (SSE, AVX). The use of
assembly language is mandatory for best performance. Finally we compare our
results to the best GPGPU implementations available for this open competition
benchmark.
|
[
{
"version": "v1",
"created": "Wed, 27 Apr 2011 20:31:11 GMT"
},
{
"version": "v2",
"created": "Tue, 20 Sep 2011 15:41:17 GMT"
}
] | 2013-03-08T00:00:00
|
[
[
"Treibig",
"Jan",
""
],
[
"Hager",
"Georg",
""
],
[
"Hofmann",
"Hannes G.",
""
],
[
"Hornegger",
"Joachim",
""
],
[
"Wellein",
"Gerhard",
""
]
] |
TITLE: Pushing the limits for medical image reconstruction on recent standard
multicore processors
ABSTRACT: Volume reconstruction by backprojection is the computational bottleneck in
many interventional clinical computed tomography (CT) applications. Today
vendors in this field replace special purpose hardware accelerators by standard
hardware like multicore chips and GPGPUs. Medical imaging algorithms are on the
verge of employing High Performance Computing (HPC) technology, and are
therefore an interesting new candidate for optimization. This paper presents
low-level optimizations for the backprojection algorithm, guided by a thorough
performance analysis on four generations of Intel multicore processors
(Harpertown, Westmere, Westmere EX, and Sandy Bridge).
We choose the RabbitCT benchmark, a standardized testcase well supported in
industry, to ensure transparent and comparable results. Our aim is to provide
not only the fastest possible implementation but also compare to performance
models and hardware counter data in order to fully understand the results. We
separate the influence of algorithmic optimizations, parallelization, SIMD
vectorization, and microarchitectural issues and pinpoint problems with current
SIMD instruction set extensions on standard CPUs (SSE, AVX). The use of
assembly language is mandatory for best performance. Finally we compare our
results to the best GPGPU implementations available for this open competition
benchmark.
|
no_new_dataset
| 0.707992
|
1208.3719
|
Chris Thornton
|
Chris Thornton and Frank Hutter and Holger H. Hoos and Kevin
Leyton-Brown
|
Auto-WEKA: Combined Selection and Hyperparameter Optimization of
Classification Algorithms
|
9 pages, 3 figures
| null | null |
Technical Report TR-2012-05
|
cs.LG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Many different machine learning algorithms exist; taking into account each
algorithm's hyperparameters, there is a staggeringly large number of possible
alternatives overall. We consider the problem of simultaneously selecting a
learning algorithm and setting its hyperparameters, going beyond previous work
that addresses these issues in isolation. We show that this problem can be
addressed by a fully automated approach, leveraging recent innovations in
Bayesian optimization. Specifically, we consider a wide range of feature
selection techniques (combining 3 search and 8 evaluator methods) and all
classification approaches implemented in WEKA, spanning 2 ensemble methods, 10
meta-methods, 27 base classifiers, and hyperparameter settings for each
classifier. On each of 21 popular datasets from the UCI repository, the KDD Cup
09, variants of the MNIST dataset and CIFAR-10, we show classification
performance often much better than using standard selection/hyperparameter
optimization methods. We hope that our approach will help non-expert users to
more effectively identify machine learning algorithms and hyperparameter
settings appropriate to their applications, and hence to achieve improved
performance.
|
[
{
"version": "v1",
"created": "Sat, 18 Aug 2012 02:14:47 GMT"
},
{
"version": "v2",
"created": "Wed, 6 Mar 2013 23:27:04 GMT"
}
] | 2013-03-08T00:00:00
|
[
[
"Thornton",
"Chris",
""
],
[
"Hutter",
"Frank",
""
],
[
"Hoos",
"Holger H.",
""
],
[
"Leyton-Brown",
"Kevin",
""
]
] |
TITLE: Auto-WEKA: Combined Selection and Hyperparameter Optimization of
Classification Algorithms
ABSTRACT: Many different machine learning algorithms exist; taking into account each
algorithm's hyperparameters, there is a staggeringly large number of possible
alternatives overall. We consider the problem of simultaneously selecting a
learning algorithm and setting its hyperparameters, going beyond previous work
that addresses these issues in isolation. We show that this problem can be
addressed by a fully automated approach, leveraging recent innovations in
Bayesian optimization. Specifically, we consider a wide range of feature
selection techniques (combining 3 search and 8 evaluator methods) and all
classification approaches implemented in WEKA, spanning 2 ensemble methods, 10
meta-methods, 27 base classifiers, and hyperparameter settings for each
classifier. On each of 21 popular datasets from the UCI repository, the KDD Cup
09, variants of the MNIST dataset and CIFAR-10, we show classification
performance often much better than using standard selection/hyperparameter
optimization methods. We hope that our approach will help non-expert users to
more effectively identify machine learning algorithms and hyperparameter
settings appropriate to their applications, and hence to achieve improved
performance.
|
no_new_dataset
| 0.708023
|
1303.1585
|
Swaminathan Sankararaman
|
Swaminathan Sankararaman, Pankaj K. Agarwal, Thomas M{\o}lhave, Arnold
P. Boedihardjo
|
Computing Similarity between a Pair of Trajectories
| null | null | null | null |
cs.CG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
With recent advances in sensing and tracking technology, trajectory data is
becoming increasingly pervasive and analysis of trajectory data is becoming
exceedingly important. A fundamental problem in analyzing trajectory data is
that of identifying common patterns between pairs or among groups of
trajectories. In this paper, we consider the problem of identifying similar
portions between a pair of trajectories, each observed as a sequence of points
sampled from it.
We present new measures of trajectory similarity --- both local and global
--- between a pair of trajectories to distinguish between similar and
dissimilar portions. Our model is robust under noise and outliers, it does not
make any assumptions on the sampling rates on either trajectory, and it works
even if they are partially observed. Additionally, the model also yields a
scalar similarity score which can be used to rank multiple pairs of
trajectories according to similarity, e.g. in clustering applications. We also
present efficient algorithms for computing the similarity under our measures;
the worst-case running time is quadratic in the number of sample points.
Finally, we present an extensive experimental study evaluating the
effectiveness of our approach on real datasets, comparing with it with earlier
approaches, and illustrating many issues that arise in trajectory data. Our
experiments show that our approach is highly accurate in distinguishing similar
and dissimilar portions as compared to earlier methods even with sparse
sampling.
|
[
{
"version": "v1",
"created": "Thu, 7 Mar 2013 01:37:22 GMT"
}
] | 2013-03-08T00:00:00
|
[
[
"Sankararaman",
"Swaminathan",
""
],
[
"Agarwal",
"Pankaj K.",
""
],
[
"Mølhave",
"Thomas",
""
],
[
"Boedihardjo",
"Arnold P.",
""
]
] |
TITLE: Computing Similarity between a Pair of Trajectories
ABSTRACT: With recent advances in sensing and tracking technology, trajectory data is
becoming increasingly pervasive and analysis of trajectory data is becoming
exceedingly important. A fundamental problem in analyzing trajectory data is
that of identifying common patterns between pairs or among groups of
trajectories. In this paper, we consider the problem of identifying similar
portions between a pair of trajectories, each observed as a sequence of points
sampled from it.
We present new measures of trajectory similarity --- both local and global
--- between a pair of trajectories to distinguish between similar and
dissimilar portions. Our model is robust under noise and outliers, it does not
make any assumptions on the sampling rates on either trajectory, and it works
even if they are partially observed. Additionally, the model also yields a
scalar similarity score which can be used to rank multiple pairs of
trajectories according to similarity, e.g. in clustering applications. We also
present efficient algorithms for computing the similarity under our measures;
the worst-case running time is quadratic in the number of sample points.
Finally, we present an extensive experimental study evaluating the
effectiveness of our approach on real datasets, comparing with it with earlier
approaches, and illustrating many issues that arise in trajectory data. Our
experiments show that our approach is highly accurate in distinguishing similar
and dissimilar portions as compared to earlier methods even with sparse
sampling.
|
no_new_dataset
| 0.710176
|
1303.1741
|
Emilio Ferrara
|
Pasquale De Meo, Emilio Ferrara, Giacomo Fiumara, Alessandro Provetti
|
Enhancing community detection using a network weighting strategy
|
28 pages, 2 figures
|
Information Sciences, 222:648-668, 2013
|
10.1016/j.ins.2012.08.001
| null |
cs.SI cs.DS physics.soc-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A community within a network is a group of vertices densely connected to each
other but less connected to the vertices outside. The problem of detecting
communities in large networks plays a key role in a wide range of research
areas, e.g. Computer Science, Biology and Sociology. Most of the existing
algorithms to find communities count on the topological features of the network
and often do not scale well on large, real-life instances.
In this article we propose a strategy to enhance existing community detection
algorithms by adding a pre-processing step in which edges are weighted
according to their centrality w.r.t. the network topology. In our approach, the
centrality of an edge reflects its contribute to making arbitrary graph
tranversals, i.e., spreading messages over the network, as short as possible.
Our strategy is able to effectively complements information about network
topology and it can be used as an additional tool to enhance community
detection. The computation of edge centralities is carried out by performing
multiple random walks of bounded length on the network. Our method makes the
computation of edge centralities feasible also on large-scale networks. It has
been tested in conjunction with three state-of-the-art community detection
algorithms, namely the Louvain method, COPRA and OSLOM. Experimental results
show that our method raises the accuracy of existing algorithms both on
synthetic and real-life datasets.
|
[
{
"version": "v1",
"created": "Thu, 7 Mar 2013 16:43:30 GMT"
}
] | 2013-03-08T00:00:00
|
[
[
"De Meo",
"Pasquale",
""
],
[
"Ferrara",
"Emilio",
""
],
[
"Fiumara",
"Giacomo",
""
],
[
"Provetti",
"Alessandro",
""
]
] |
TITLE: Enhancing community detection using a network weighting strategy
ABSTRACT: A community within a network is a group of vertices densely connected to each
other but less connected to the vertices outside. The problem of detecting
communities in large networks plays a key role in a wide range of research
areas, e.g. Computer Science, Biology and Sociology. Most of the existing
algorithms to find communities count on the topological features of the network
and often do not scale well on large, real-life instances.
In this article we propose a strategy to enhance existing community detection
algorithms by adding a pre-processing step in which edges are weighted
according to their centrality w.r.t. the network topology. In our approach, the
centrality of an edge reflects its contribute to making arbitrary graph
tranversals, i.e., spreading messages over the network, as short as possible.
Our strategy is able to effectively complements information about network
topology and it can be used as an additional tool to enhance community
detection. The computation of edge centralities is carried out by performing
multiple random walks of bounded length on the network. Our method makes the
computation of edge centralities feasible also on large-scale networks. It has
been tested in conjunction with three state-of-the-art community detection
algorithms, namely the Louvain method, COPRA and OSLOM. Experimental results
show that our method raises the accuracy of existing algorithms both on
synthetic and real-life datasets.
|
no_new_dataset
| 0.711387
|
1303.1747
|
Emilio Ferrara
|
Pasquale De Meo, Emilio Ferrara, Giacomo Fiumara, Angela Ricciardello
|
A Novel Measure of Edge Centrality in Social Networks
|
28 pages, 5 figures
|
Knowledge-based Systems, 30:136-150, 2012
|
10.1016/j.knosys.2012.01.007
| null |
cs.SI cs.DS physics.soc-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The problem of assigning centrality values to nodes and edges in graphs has
been widely investigated during last years. Recently, a novel measure of node
centrality has been proposed, called k-path centrality index, which is based on
the propagation of messages inside a network along paths consisting of at most
k edges. On the other hand, the importance of computing the centrality of edges
has been put into evidence since 1970's by Anthonisse and, subsequently by
Girvan and Newman. In this work we propose the generalization of the concept of
k-path centrality by defining the k-path edge centrality, a measure of
centrality introduced to compute the importance of edges. We provide an
efficient algorithm, running in O(k m), being m the number of edges in the
graph. Thus, our technique is feasible for large scale network analysis.
Finally, the performance of our algorithm is analyzed, discussing the results
obtained against large online social network datasets.
|
[
{
"version": "v1",
"created": "Thu, 7 Mar 2013 16:54:34 GMT"
}
] | 2013-03-08T00:00:00
|
[
[
"De Meo",
"Pasquale",
""
],
[
"Ferrara",
"Emilio",
""
],
[
"Fiumara",
"Giacomo",
""
],
[
"Ricciardello",
"Angela",
""
]
] |
TITLE: A Novel Measure of Edge Centrality in Social Networks
ABSTRACT: The problem of assigning centrality values to nodes and edges in graphs has
been widely investigated during last years. Recently, a novel measure of node
centrality has been proposed, called k-path centrality index, which is based on
the propagation of messages inside a network along paths consisting of at most
k edges. On the other hand, the importance of computing the centrality of edges
has been put into evidence since 1970's by Anthonisse and, subsequently by
Girvan and Newman. In this work we propose the generalization of the concept of
k-path centrality by defining the k-path edge centrality, a measure of
centrality introduced to compute the importance of edges. We provide an
efficient algorithm, running in O(k m), being m the number of edges in the
graph. Thus, our technique is feasible for large scale network analysis.
Finally, the performance of our algorithm is analyzed, discussing the results
obtained against large online social network datasets.
|
no_new_dataset
| 0.710641
|
1303.1243
|
M.M.A. Hashem
|
Md. Amjad Hossain, Md. Kawser Hossain, and M.M.A. Hashem
|
A Generalized Hybrid Real-Coded Quantum Evolutionary Algorithm Based on
Particle Swarm Theory with Arithmetic Crossover
|
http://airccse.org/journal/jcsit/0810ijcsit15.pdf
|
International Journal of Computers Science and Information
Technology (IJCSIT), Vol. 2, No. 4, pp.172-187, (2010)
|
10.5121/ijcsit.2010.2415
| null |
cs.NE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper proposes a generalized Hybrid Real-coded Quantum Evolutionary
Algorithm (HRCQEA) for optimizing complex functions as well as combinatorial
optimization. The main idea of HRCQEA is to devise a new technique for mutation
and crossover operators. Using the evolutionary equation of PSO a
Single-Multiple gene Mutation (SMM) is designed and the concept of Arithmetic
Crossover (AC) is used in the new Crossover operator. In HRCQEA, each triploid
chromosome represents a particle and the position of the particle is updated
using SMM and Quantum Rotation Gate (QRG), which can make the balance between
exploration and exploitation. Crossover is employed to expand the search space,
Hill Climbing Selection (HCS) and elitism help to accelerate the convergence
speed. Simulation results on Knapsack Problem and five benchmark complex
functions with high dimension show that HRCQEA performs better in terms of
ability to discover the global optimum and convergence speed.
|
[
{
"version": "v1",
"created": "Wed, 6 Mar 2013 02:55:20 GMT"
}
] | 2013-03-07T00:00:00
|
[
[
"Hossain",
"Md. Amjad",
""
],
[
"Hossain",
"Md. Kawser",
""
],
[
"Hashem",
"M. M. A.",
""
]
] |
TITLE: A Generalized Hybrid Real-Coded Quantum Evolutionary Algorithm Based on
Particle Swarm Theory with Arithmetic Crossover
ABSTRACT: This paper proposes a generalized Hybrid Real-coded Quantum Evolutionary
Algorithm (HRCQEA) for optimizing complex functions as well as combinatorial
optimization. The main idea of HRCQEA is to devise a new technique for mutation
and crossover operators. Using the evolutionary equation of PSO a
Single-Multiple gene Mutation (SMM) is designed and the concept of Arithmetic
Crossover (AC) is used in the new Crossover operator. In HRCQEA, each triploid
chromosome represents a particle and the position of the particle is updated
using SMM and Quantum Rotation Gate (QRG), which can make the balance between
exploration and exploitation. Crossover is employed to expand the search space,
Hill Climbing Selection (HCS) and elitism help to accelerate the convergence
speed. Simulation results on Knapsack Problem and five benchmark complex
functions with high dimension show that HRCQEA performs better in terms of
ability to discover the global optimum and convergence speed.
|
no_new_dataset
| 0.712013
|
1303.1280
|
Remi Lajugie
|
R\'emi Lajugie (LIENS), Sylvain Arlot (LIENS), Francis Bach (LIENS)
|
Large-Margin Metric Learning for Partitioning Problems
| null | null | null | null |
cs.LG stat.ML
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we consider unsupervised partitioning problems, such as
clustering, image segmentation, video segmentation and other change-point
detection problems. We focus on partitioning problems based explicitly or
implicitly on the minimization of Euclidean distortions, which include
mean-based change-point detection, K-means, spectral clustering and normalized
cuts. Our main goal is to learn a Mahalanobis metric for these unsupervised
problems, leading to feature weighting and/or selection. This is done in a
supervised way by assuming the availability of several potentially partially
labelled datasets that share the same metric. We cast the metric learning
problem as a large-margin structured prediction problem, with proper definition
of regularizers and losses, leading to a convex optimization problem which can
be solved efficiently with iterative techniques. We provide experiments where
we show how learning the metric may significantly improve the partitioning
performance in synthetic examples, bioinformatics, video segmentation and image
segmentation problems.
|
[
{
"version": "v1",
"created": "Wed, 6 Mar 2013 09:23:45 GMT"
}
] | 2013-03-07T00:00:00
|
[
[
"Lajugie",
"Rémi",
"",
"LIENS"
],
[
"Arlot",
"Sylvain",
"",
"LIENS"
],
[
"Bach",
"Francis",
"",
"LIENS"
]
] |
TITLE: Large-Margin Metric Learning for Partitioning Problems
ABSTRACT: In this paper, we consider unsupervised partitioning problems, such as
clustering, image segmentation, video segmentation and other change-point
detection problems. We focus on partitioning problems based explicitly or
implicitly on the minimization of Euclidean distortions, which include
mean-based change-point detection, K-means, spectral clustering and normalized
cuts. Our main goal is to learn a Mahalanobis metric for these unsupervised
problems, leading to feature weighting and/or selection. This is done in a
supervised way by assuming the availability of several potentially partially
labelled datasets that share the same metric. We cast the metric learning
problem as a large-margin structured prediction problem, with proper definition
of regularizers and losses, leading to a convex optimization problem which can
be solved efficiently with iterative techniques. We provide experiments where
we show how learning the metric may significantly improve the partitioning
performance in synthetic examples, bioinformatics, video segmentation and image
segmentation problems.
|
no_new_dataset
| 0.712045
|
1103.2068
|
Tamara Kolda
|
Justin D. Basilico and M. Arthur Munson and Tamara G. Kolda and Kevin
R. Dixon and W. Philip Kegelmeyer
|
COMET: A Recipe for Learning and Using Large Ensembles on Massive Data
| null |
ICDM 2011: Proceedings of the 2011 IEEE International Conference
on Data Mining, pp. 41-50, 2011
|
10.1109/ICDM.2011.39
| null |
cs.LG cs.DC stat.ML
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
COMET is a single-pass MapReduce algorithm for learning on large-scale data.
It builds multiple random forest ensembles on distributed blocks of data and
merges them into a mega-ensemble. This approach is appropriate when learning
from massive-scale data that is too large to fit on a single machine. To get
the best accuracy, IVoting should be used instead of bagging to generate the
training subset for each decision tree in the random forest. Experiments with
two large datasets (5GB and 50GB compressed) show that COMET compares favorably
(in both accuracy and training time) to learning on a subsample of data using a
serial algorithm. Finally, we propose a new Gaussian approach for lazy ensemble
evaluation which dynamically decides how many ensemble members to evaluate per
data point; this can reduce evaluation cost by 100X or more.
|
[
{
"version": "v1",
"created": "Thu, 10 Mar 2011 16:15:42 GMT"
},
{
"version": "v2",
"created": "Thu, 8 Sep 2011 16:20:45 GMT"
}
] | 2013-03-06T00:00:00
|
[
[
"Basilico",
"Justin D.",
""
],
[
"Munson",
"M. Arthur",
""
],
[
"Kolda",
"Tamara G.",
""
],
[
"Dixon",
"Kevin R.",
""
],
[
"Kegelmeyer",
"W. Philip",
""
]
] |
TITLE: COMET: A Recipe for Learning and Using Large Ensembles on Massive Data
ABSTRACT: COMET is a single-pass MapReduce algorithm for learning on large-scale data.
It builds multiple random forest ensembles on distributed blocks of data and
merges them into a mega-ensemble. This approach is appropriate when learning
from massive-scale data that is too large to fit on a single machine. To get
the best accuracy, IVoting should be used instead of bagging to generate the
training subset for each decision tree in the random forest. Experiments with
two large datasets (5GB and 50GB compressed) show that COMET compares favorably
(in both accuracy and training time) to learning on a subsample of data using a
serial algorithm. Finally, we propose a new Gaussian approach for lazy ensemble
evaluation which dynamically decides how many ensemble members to evaluate per
data point; this can reduce evaluation cost by 100X or more.
|
no_new_dataset
| 0.709447
|
1208.4289
|
Marcelo Serraro Zanetti
|
Marcelo Serrano Zanetti, Emre Sarigol, Ingo Scholtes, Claudio Juan
Tessone, Frank Schweitzer
|
A Quantitative Study of Social Organisation in Open Source Software
Communities
| null |
ICCSW 2012, pp. 116--122
|
10.4230/OASIcs.ICCSW.2012.116
| null |
cs.SE cs.SI nlin.AO physics.soc-ph
|
http://creativecommons.org/licenses/by/3.0/
|
The success of open source projects crucially depends on the voluntary
contributions of a sufficiently large community of users. Apart from the mere
size of the community, interesting questions arise when looking at the
evolution of structural features of collaborations between community members.
In this article, we discuss several network analytic proxies that can be used
to quantify different aspects of the social organisation in social
collaboration networks. We particularly focus on measures that can be related
to the cohesiveness of the communities, the distribution of responsibilities
and the resilience against turnover of community members. We present a
comparative analysis on a large-scale dataset that covers the full history of
collaborations between users of 14 major open source software communities. Our
analysis covers both aggregate and time-evolving measures and highlights
differences in the social organisation across communities. We argue that our
results are a promising step towards the definition of suitable, potentially
multi-dimensional, resilience and risk indicators for open source software
communities.
|
[
{
"version": "v1",
"created": "Tue, 21 Aug 2012 15:34:35 GMT"
},
{
"version": "v2",
"created": "Tue, 27 Nov 2012 10:55:11 GMT"
},
{
"version": "v3",
"created": "Mon, 4 Mar 2013 13:17:21 GMT"
}
] | 2013-03-05T00:00:00
|
[
[
"Zanetti",
"Marcelo Serrano",
""
],
[
"Sarigol",
"Emre",
""
],
[
"Scholtes",
"Ingo",
""
],
[
"Tessone",
"Claudio Juan",
""
],
[
"Schweitzer",
"Frank",
""
]
] |
TITLE: A Quantitative Study of Social Organisation in Open Source Software
Communities
ABSTRACT: The success of open source projects crucially depends on the voluntary
contributions of a sufficiently large community of users. Apart from the mere
size of the community, interesting questions arise when looking at the
evolution of structural features of collaborations between community members.
In this article, we discuss several network analytic proxies that can be used
to quantify different aspects of the social organisation in social
collaboration networks. We particularly focus on measures that can be related
to the cohesiveness of the communities, the distribution of responsibilities
and the resilience against turnover of community members. We present a
comparative analysis on a large-scale dataset that covers the full history of
collaborations between users of 14 major open source software communities. Our
analysis covers both aggregate and time-evolving measures and highlights
differences in the social organisation across communities. We argue that our
results are a promising step towards the definition of suitable, potentially
multi-dimensional, resilience and risk indicators for open source software
communities.
|
no_new_dataset
| 0.694937
|
1301.7015
|
Entong Shen
|
Entong Shen, Ting Yu
|
Mining Frequent Graph Patterns with Differential Privacy
| null | null | null | null |
cs.DB
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Discovering frequent graph patterns in a graph database offers valuable
information in a variety of applications. However, if the graph dataset
contains sensitive data of individuals such as mobile phone-call graphs and
web-click graphs, releasing discovered frequent patterns may present a threat
to the privacy of individuals. {\em Differential privacy} has recently emerged
as the {\em de facto} standard for private data analysis due to its provable
privacy guarantee. In this paper we propose the first differentially private
algorithm for mining frequent graph patterns.
We first show that previous techniques on differentially private discovery of
frequent {\em itemsets} cannot apply in mining frequent graph patterns due to
the inherent complexity of handling structural information in graphs. We then
address this challenge by proposing a Markov Chain Monte Carlo (MCMC) sampling
based algorithm. Unlike previous work on frequent itemset mining, our
techniques do not rely on the output of a non-private mining algorithm.
Instead, we observe that both frequent graph pattern mining and the guarantee
of differential privacy can be unified into an MCMC sampling framework. In
addition, we establish the privacy and utility guarantee of our algorithm and
propose an efficient neighboring pattern counting technique as well.
Experimental results show that the proposed algorithm is able to output
frequent patterns with good precision.
|
[
{
"version": "v1",
"created": "Tue, 29 Jan 2013 18:37:35 GMT"
},
{
"version": "v2",
"created": "Fri, 1 Mar 2013 21:43:20 GMT"
}
] | 2013-03-05T00:00:00
|
[
[
"Shen",
"Entong",
""
],
[
"Yu",
"Ting",
""
]
] |
TITLE: Mining Frequent Graph Patterns with Differential Privacy
ABSTRACT: Discovering frequent graph patterns in a graph database offers valuable
information in a variety of applications. However, if the graph dataset
contains sensitive data of individuals such as mobile phone-call graphs and
web-click graphs, releasing discovered frequent patterns may present a threat
to the privacy of individuals. {\em Differential privacy} has recently emerged
as the {\em de facto} standard for private data analysis due to its provable
privacy guarantee. In this paper we propose the first differentially private
algorithm for mining frequent graph patterns.
We first show that previous techniques on differentially private discovery of
frequent {\em itemsets} cannot apply in mining frequent graph patterns due to
the inherent complexity of handling structural information in graphs. We then
address this challenge by proposing a Markov Chain Monte Carlo (MCMC) sampling
based algorithm. Unlike previous work on frequent itemset mining, our
techniques do not rely on the output of a non-private mining algorithm.
Instead, we observe that both frequent graph pattern mining and the guarantee
of differential privacy can be unified into an MCMC sampling framework. In
addition, we establish the privacy and utility guarantee of our algorithm and
propose an efficient neighboring pattern counting technique as well.
Experimental results show that the proposed algorithm is able to output
frequent patterns with good precision.
|
no_new_dataset
| 0.71022
|
1302.7051
|
Wesam Elshamy
|
Wesam Elshamy, Hassan M Emara, Ahmed Bahgat
|
Polyploidy and Discontinuous Heredity Effect on Evolutionary
Multi-Objective Optimization
|
Corrected the last name of the second author to match his name in the
paper
| null | null |
EPM-217-2006
|
cs.NE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper examines the effect of mimicking discontinuous heredity caused by
carrying more than one chromosome in some living organisms cells in
Evolutionary Multi-Objective Optimization algorithms. In this representation,
the phenotype may not fully reflect the genotype. By doing so we are mimicking
living organisms inheritance mechanism, where traits may be silently carried
for many generations to reappear later. Representations with different number
of chromosomes in each solution vector are tested on different benchmark
problems with high number of decision variables and objectives. A comparison
with Non-Dominated Sorting Genetic Algorithm-II is done on all problems.
|
[
{
"version": "v1",
"created": "Thu, 28 Feb 2013 01:32:28 GMT"
},
{
"version": "v2",
"created": "Sat, 2 Mar 2013 00:20:07 GMT"
}
] | 2013-03-05T00:00:00
|
[
[
"Elshamy",
"Wesam",
""
],
[
"Emara",
"Hassan M",
""
],
[
"Bahgat",
"Ahmed",
""
]
] |
TITLE: Polyploidy and Discontinuous Heredity Effect on Evolutionary
Multi-Objective Optimization
ABSTRACT: This paper examines the effect of mimicking discontinuous heredity caused by
carrying more than one chromosome in some living organisms cells in
Evolutionary Multi-Objective Optimization algorithms. In this representation,
the phenotype may not fully reflect the genotype. By doing so we are mimicking
living organisms inheritance mechanism, where traits may be silently carried
for many generations to reappear later. Representations with different number
of chromosomes in each solution vector are tested on different benchmark
problems with high number of decision variables and objectives. A comparison
with Non-Dominated Sorting Genetic Algorithm-II is done on all problems.
|
no_new_dataset
| 0.708799
|
1303.0339
|
Chunhua Shen
|
Xi Li and Guosheng Lin and Chunhua Shen and Anton van den Hengel and
Anthony Dick
|
Learning Hash Functions Using Column Generation
|
9 pages, published in International Conf. Machine Learning, 2013
| null | null | null |
cs.LG
|
http://creativecommons.org/licenses/by/3.0/
|
Fast nearest neighbor searching is becoming an increasingly important tool in
solving many large-scale problems. Recently a number of approaches to learning
data-dependent hash functions have been developed. In this work, we propose a
column generation based method for learning data-dependent hash functions on
the basis of proximity comparison information. Given a set of triplets that
encode the pairwise proximity comparison information, our method learns hash
functions that preserve the relative comparison relationships in the data as
well as possible within the large-margin learning framework. The learning
procedure is implemented using column generation and hence is named CGHash. At
each iteration of the column generation procedure, the best hash function is
selected. Unlike most other hashing methods, our method generalizes to new data
points naturally; and has a training objective which is convex, thus ensuring
that the global optimum can be identified. Experiments demonstrate that the
proposed method learns compact binary codes and that its retrieval performance
compares favorably with state-of-the-art methods when tested on a few benchmark
datasets.
|
[
{
"version": "v1",
"created": "Sat, 2 Mar 2013 03:01:46 GMT"
}
] | 2013-03-05T00:00:00
|
[
[
"Li",
"Xi",
""
],
[
"Lin",
"Guosheng",
""
],
[
"Shen",
"Chunhua",
""
],
[
"Hengel",
"Anton van den",
""
],
[
"Dick",
"Anthony",
""
]
] |
TITLE: Learning Hash Functions Using Column Generation
ABSTRACT: Fast nearest neighbor searching is becoming an increasingly important tool in
solving many large-scale problems. Recently a number of approaches to learning
data-dependent hash functions have been developed. In this work, we propose a
column generation based method for learning data-dependent hash functions on
the basis of proximity comparison information. Given a set of triplets that
encode the pairwise proximity comparison information, our method learns hash
functions that preserve the relative comparison relationships in the data as
well as possible within the large-margin learning framework. The learning
procedure is implemented using column generation and hence is named CGHash. At
each iteration of the column generation procedure, the best hash function is
selected. Unlike most other hashing methods, our method generalizes to new data
points naturally; and has a training objective which is convex, thus ensuring
that the global optimum can be identified. Experiments demonstrate that the
proposed method learns compact binary codes and that its retrieval performance
compares favorably with state-of-the-art methods when tested on a few benchmark
datasets.
|
no_new_dataset
| 0.71039
|
1303.0566
|
Taher Zaki
|
T. Zaki (1 and 2), M. Amrouch (1), D. Mammass (1), A. Ennaji (2) ((1)
IRFSIC Laboratory, Ibn Zohr University Agadir Morocco, (2) LITIS Laboratory,
University of Rouen France)
|
Arabic documents classification using fuzzy R.B.F. classifier with
sliding window
|
5 pages, 2 figures
|
Journal of Computing , eISSN 2151-9617 , Volume 5, Issue 1,
January 2013
| null | null |
cs.IR
|
http://creativecommons.org/licenses/publicdomain/
|
In this paper, we propose a system for contextual and semantic Arabic
documents classification by improving the standard fuzzy model. Indeed,
promoting neighborhood semantic terms that seems absent in this model by using
a radial basis modeling. In order to identify the relevant documents to the
query. This approach calculates the similarity between related terms by
determining the relevance of each relative to documents (NEAR operator), based
on a kernel function. The use of sliding window improves the process of
classification. The results obtained on a arabic dataset of press show very
good performance compared with the literature.
|
[
{
"version": "v1",
"created": "Sun, 3 Mar 2013 20:50:12 GMT"
}
] | 2013-03-05T00:00:00
|
[
[
"Zaki",
"T.",
"",
"1 and 2"
],
[
"Amrouch",
"M.",
""
],
[
"Mammass",
"D.",
""
],
[
"Ennaji",
"A.",
""
]
] |
TITLE: Arabic documents classification using fuzzy R.B.F. classifier with
sliding window
ABSTRACT: In this paper, we propose a system for contextual and semantic Arabic
documents classification by improving the standard fuzzy model. Indeed,
promoting neighborhood semantic terms that seems absent in this model by using
a radial basis modeling. In order to identify the relevant documents to the
query. This approach calculates the similarity between related terms by
determining the relevance of each relative to documents (NEAR operator), based
on a kernel function. The use of sliding window improves the process of
classification. The results obtained on a arabic dataset of press show very
good performance compared with the literature.
|
no_new_dataset
| 0.709038
|
1303.0647
|
Meena Kabilan
|
A. Meena and R. Raja
|
Spatial Fuzzy C Means PET Image Segmentation of Neurodegenerative
Disorder
| null |
Indian Journal of Computer Science and Engineering (IJCSE), ISSN :
0976-5166 Vol. 4 No.1 Feb-Mar 2013, pp.no: 50-55
| null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Nuclear image has emerged as a promising research work in medical field.
Images from different modality meet its own challenge. Positron Emission
Tomography (PET) image may help to precisely localize disease to assist in
planning the right treatment for each case and saving valuable time. In this
paper, a novel approach of Spatial Fuzzy C Means (PET SFCM) clustering
algorithm is introduced on PET scan image datasets. The proposed algorithm is
incorporated the spatial neighborhood information with traditional FCM and
updating the objective function of each cluster. This algorithm is implemented
and tested on huge data collection of patients with brain neuro degenerative
disorder such as Alzheimers disease. It has demonstrated its effectiveness by
testing it for real world patient data sets. Experimental results are compared
with conventional FCM and K Means clustering algorithm. The performance of the
PET SFCM provides satisfactory results compared with other two algorithms
|
[
{
"version": "v1",
"created": "Mon, 4 Mar 2013 09:08:34 GMT"
}
] | 2013-03-05T00:00:00
|
[
[
"Meena",
"A.",
""
],
[
"Raja",
"R.",
""
]
] |
TITLE: Spatial Fuzzy C Means PET Image Segmentation of Neurodegenerative
Disorder
ABSTRACT: Nuclear image has emerged as a promising research work in medical field.
Images from different modality meet its own challenge. Positron Emission
Tomography (PET) image may help to precisely localize disease to assist in
planning the right treatment for each case and saving valuable time. In this
paper, a novel approach of Spatial Fuzzy C Means (PET SFCM) clustering
algorithm is introduced on PET scan image datasets. The proposed algorithm is
incorporated the spatial neighborhood information with traditional FCM and
updating the objective function of each cluster. This algorithm is implemented
and tested on huge data collection of patients with brain neuro degenerative
disorder such as Alzheimers disease. It has demonstrated its effectiveness by
testing it for real world patient data sets. Experimental results are compared
with conventional FCM and K Means clustering algorithm. The performance of the
PET SFCM provides satisfactory results compared with other two algorithms
|
no_new_dataset
| 0.710804
|
1303.0725
|
Namita Sharma
|
Namita Sharma, Vineet Sahula, and C.P. Ravikumar
|
Energy Aware Task Scheduling for Soft Real Time Systems using an
Analytical Approach for Energy Estimation
|
12 pages, 4 Figures, 3 Tables
|
IJASCSE, VOL 1, ISSUE 4, 2012
| null | null |
cs.OH
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Embedded systems have pervaded all walks of our life. With the increasing
importance of mobile embedded systems and flexible applications, considerable
progress in research has been made for power management. Power constraints are
increasingly becoming the critical component of the design specifications of
these systems. It helps in pre-determining the suitable hardware architecture
for the target application. The aim of this paper is to present a technique to
estimate 'pre-run time' and 'power' of a software mapped onto a hardware
system; guaranteeing the compliance of temporal constraints while generating a
schedule of tasks of software. Real time systems must handle several
independent macro-tasks, each represented by a task graph, which includes
communications and precedence constraints. We propose a novel approach for
power estimation of embedded software using the Control Data Flow Graph (CDFG)
or task graph model. This methodology uses an existing Hierarchical Concurrent
Flow Graph (HCFG) technique for the power analysis of the CDFGs. We have
evaluated our technique for energy efficient scheduling over various task graph
benchmarks. The results obtained prove the utility and efficacy of our proposed
approach for power analysis of embedded software. We also present a methodology
to obtain an energy optimal voltage assignment and perform scheduling by taking
advantage of the relaxation in execution time of tasks.
|
[
{
"version": "v1",
"created": "Mon, 4 Mar 2013 15:14:24 GMT"
}
] | 2013-03-05T00:00:00
|
[
[
"Sharma",
"Namita",
""
],
[
"Sahula",
"Vineet",
""
],
[
"Ravikumar",
"C. P.",
""
]
] |
TITLE: Energy Aware Task Scheduling for Soft Real Time Systems using an
Analytical Approach for Energy Estimation
ABSTRACT: Embedded systems have pervaded all walks of our life. With the increasing
importance of mobile embedded systems and flexible applications, considerable
progress in research has been made for power management. Power constraints are
increasingly becoming the critical component of the design specifications of
these systems. It helps in pre-determining the suitable hardware architecture
for the target application. The aim of this paper is to present a technique to
estimate 'pre-run time' and 'power' of a software mapped onto a hardware
system; guaranteeing the compliance of temporal constraints while generating a
schedule of tasks of software. Real time systems must handle several
independent macro-tasks, each represented by a task graph, which includes
communications and precedence constraints. We propose a novel approach for
power estimation of embedded software using the Control Data Flow Graph (CDFG)
or task graph model. This methodology uses an existing Hierarchical Concurrent
Flow Graph (HCFG) technique for the power analysis of the CDFGs. We have
evaluated our technique for energy efficient scheduling over various task graph
benchmarks. The results obtained prove the utility and efficacy of our proposed
approach for power analysis of embedded software. We also present a methodology
to obtain an energy optimal voltage assignment and perform scheduling by taking
advantage of the relaxation in execution time of tasks.
|
no_new_dataset
| 0.707398
|
1206.5065
|
Sofia Zaidenberg
|
Sofia Zaidenberg (INRIA Sophia Antipolis), Bernard Boulay (INRIA
Sophia Antipolis), Fran\c{c}ois Bremond (INRIA Sophia Antipolis)
|
A generic framework for video understanding applied to group behavior
recognition
|
(20/03/2012)
|
9th IEEE International Conference on Advanced Video and
Signal-Based Surveillance (AVSS 2012) (2012) 136 -142
|
10.1109/AVSS.2012.1
| null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper presents an approach to detect and track groups of people in
video-surveillance applications, and to automatically recognize their behavior.
This method keeps track of individuals moving together by maintaining a spacial
and temporal group coherence. First, people are individually detected and
tracked. Second, their trajectories are analyzed over a temporal window and
clustered using the Mean-Shift algorithm. A coherence value describes how well
a set of people can be described as a group. Furthermore, we propose a formal
event description language. The group events recognition approach is
successfully validated on 4 camera views from 3 datasets: an airport, a subway,
a shopping center corridor and an entrance hall.
|
[
{
"version": "v1",
"created": "Fri, 22 Jun 2012 06:24:30 GMT"
}
] | 2013-03-04T00:00:00
|
[
[
"Zaidenberg",
"Sofia",
"",
"INRIA Sophia Antipolis"
],
[
"Boulay",
"Bernard",
"",
"INRIA\n Sophia Antipolis"
],
[
"Bremond",
"François",
"",
"INRIA Sophia Antipolis"
]
] |
TITLE: A generic framework for video understanding applied to group behavior
recognition
ABSTRACT: This paper presents an approach to detect and track groups of people in
video-surveillance applications, and to automatically recognize their behavior.
This method keeps track of individuals moving together by maintaining a spacial
and temporal group coherence. First, people are individually detected and
tracked. Second, their trajectories are analyzed over a temporal window and
clustered using the Mean-Shift algorithm. A coherence value describes how well
a set of people can be described as a group. Furthermore, we propose a formal
event description language. The group events recognition approach is
successfully validated on 4 camera views from 3 datasets: an airport, a subway,
a shopping center corridor and an entrance hall.
|
no_new_dataset
| 0.708616
|
1301.5160
|
Claudio Gentile
|
Fabio Vitale, Nicolo Cesa-Bianchi, Claudio Gentile, Giovanni Zappella
|
See the Tree Through the Lines: The Shazoo Algorithm -- Full Version --
| null | null | null | null |
cs.LG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Predicting the nodes of a given graph is a fascinating theoretical problem
with applications in several domains. Since graph sparsification via spanning
trees retains enough information while making the task much easier, trees are
an important special case of this problem. Although it is known how to predict
the nodes of an unweighted tree in a nearly optimal way, in the weighted case a
fully satisfactory algorithm is not available yet. We fill this hole and
introduce an efficient node predictor, Shazoo, which is nearly optimal on any
weighted tree. Moreover, we show that Shazoo can be viewed as a common
nontrivial generalization of both previous approaches for unweighted trees and
weighted lines. Experiments on real-world datasets confirm that Shazoo performs
well in that it fully exploits the structure of the input tree, and gets very
close to (and sometimes better than) less scalable energy minimization methods.
|
[
{
"version": "v1",
"created": "Tue, 22 Jan 2013 11:59:04 GMT"
},
{
"version": "v2",
"created": "Thu, 28 Feb 2013 17:31:08 GMT"
}
] | 2013-03-01T00:00:00
|
[
[
"Vitale",
"Fabio",
""
],
[
"Cesa-Bianchi",
"Nicolo",
""
],
[
"Gentile",
"Claudio",
""
],
[
"Zappella",
"Giovanni",
""
]
] |
TITLE: See the Tree Through the Lines: The Shazoo Algorithm -- Full Version --
ABSTRACT: Predicting the nodes of a given graph is a fascinating theoretical problem
with applications in several domains. Since graph sparsification via spanning
trees retains enough information while making the task much easier, trees are
an important special case of this problem. Although it is known how to predict
the nodes of an unweighted tree in a nearly optimal way, in the weighted case a
fully satisfactory algorithm is not available yet. We fill this hole and
introduce an efficient node predictor, Shazoo, which is nearly optimal on any
weighted tree. Moreover, we show that Shazoo can be viewed as a common
nontrivial generalization of both previous approaches for unweighted trees and
weighted lines. Experiments on real-world datasets confirm that Shazoo performs
well in that it fully exploits the structure of the input tree, and gets very
close to (and sometimes better than) less scalable energy minimization methods.
|
no_new_dataset
| 0.709007
|
1302.7028
|
Alexandre Fr\'echette
|
Alexandre Fr\'echette, F. Bruce Shepherd, Marina K. Thottan, Peter J.
Winzer
|
Shortest Path versus Multi-Hub Routing in Networks with Uncertain Demand
| null | null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We study a class of robust network design problems motivated by the need to
scale core networks to meet increasingly dynamic capacity demands. Past work
has focused on designing the network to support all hose matrices (all matrices
not exceeding marginal bounds at the nodes). This model may be too conservative
if additional information on traffic patterns is available. Another extreme is
the fixed demand model, where one designs the network to support peak
point-to-point demands. We introduce a capped hose model to explore a broader
range of traffic matrices which includes the above two as special cases. It is
known that optimal designs for the hose model are always determined by
single-hub routing, and for the fixed- demand model are based on shortest-path
routing. We shed light on the wider space of capped hose matrices in order to
see which traffic models are more shortest path-like as opposed to hub-like. To
address the space in between, we use hierarchical multi-hub routing templates,
a generalization of hub and tree routing. In particular, we show that by adding
peak capacities into the hose model, the single-hub tree-routing template is no
longer cost-effective. This initiates the study of a class of robust network
design (RND) problems restricted to these templates. Our empirical analysis is
based on a heuristic for this new hierarchical RND problem. We also propose
that it is possible to define a routing indicator that accounts for the
strengths of the marginals and peak demands and use this information to choose
the appropriate routing template. We benchmark our approach against other
well-known routing templates, using representative carrier networks and a
variety of different capped hose traffic demands, parameterized by the relative
importance of their marginals as opposed to their point-to-point peak demands.
|
[
{
"version": "v1",
"created": "Wed, 27 Feb 2013 23:25:36 GMT"
}
] | 2013-03-01T00:00:00
|
[
[
"Fréchette",
"Alexandre",
""
],
[
"Shepherd",
"F. Bruce",
""
],
[
"Thottan",
"Marina K.",
""
],
[
"Winzer",
"Peter J.",
""
]
] |
TITLE: Shortest Path versus Multi-Hub Routing in Networks with Uncertain Demand
ABSTRACT: We study a class of robust network design problems motivated by the need to
scale core networks to meet increasingly dynamic capacity demands. Past work
has focused on designing the network to support all hose matrices (all matrices
not exceeding marginal bounds at the nodes). This model may be too conservative
if additional information on traffic patterns is available. Another extreme is
the fixed demand model, where one designs the network to support peak
point-to-point demands. We introduce a capped hose model to explore a broader
range of traffic matrices which includes the above two as special cases. It is
known that optimal designs for the hose model are always determined by
single-hub routing, and for the fixed- demand model are based on shortest-path
routing. We shed light on the wider space of capped hose matrices in order to
see which traffic models are more shortest path-like as opposed to hub-like. To
address the space in between, we use hierarchical multi-hub routing templates,
a generalization of hub and tree routing. In particular, we show that by adding
peak capacities into the hose model, the single-hub tree-routing template is no
longer cost-effective. This initiates the study of a class of robust network
design (RND) problems restricted to these templates. Our empirical analysis is
based on a heuristic for this new hierarchical RND problem. We also propose
that it is possible to define a routing indicator that accounts for the
strengths of the marginals and peak demands and use this information to choose
the appropriate routing template. We benchmark our approach against other
well-known routing templates, using representative carrier networks and a
variety of different capped hose traffic demands, parameterized by the relative
importance of their marginals as opposed to their point-to-point peak demands.
|
no_new_dataset
| 0.712282
|
1302.7043
|
Evangelos Papalexakis
|
Evangelos E. Papalexakis, Tom M. Mitchell, Nicholas D. Sidiropoulos,
Christos Faloutsos, Partha Pratim Talukdar, Brian Murphy
|
Scoup-SMT: Scalable Coupled Sparse Matrix-Tensor Factorization
|
9 pages
| null | null | null |
stat.ML cs.LG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
How can we correlate neural activity in the human brain as it responds to
words, with behavioral data expressed as answers to questions about these same
words? In short, we want to find latent variables, that explain both the brain
activity, as well as the behavioral responses. We show that this is an instance
of the Coupled Matrix-Tensor Factorization (CMTF) problem. We propose
Scoup-SMT, a novel, fast, and parallel algorithm that solves the CMTF problem
and produces a sparse latent low-rank subspace of the data. In our experiments,
we find that Scoup-SMT is 50-100 times faster than a state-of-the-art algorithm
for CMTF, along with a 5 fold increase in sparsity. Moreover, we extend
Scoup-SMT to handle missing data without degradation of performance. We apply
Scoup-SMT to BrainQ, a dataset consisting of a (nouns, brain voxels, human
subjects) tensor and a (nouns, properties) matrix, with coupling along the
nouns dimension. Scoup-SMT is able to find meaningful latent variables, as well
as to predict brain activity with competitive accuracy. Finally, we demonstrate
the generality of Scoup-SMT, by applying it on a Facebook dataset (users,
friends, wall-postings); there, Scoup-SMT spots spammer-like anomalies.
|
[
{
"version": "v1",
"created": "Thu, 28 Feb 2013 00:37:29 GMT"
}
] | 2013-03-01T00:00:00
|
[
[
"Papalexakis",
"Evangelos E.",
""
],
[
"Mitchell",
"Tom M.",
""
],
[
"Sidiropoulos",
"Nicholas D.",
""
],
[
"Faloutsos",
"Christos",
""
],
[
"Talukdar",
"Partha Pratim",
""
],
[
"Murphy",
"Brian",
""
]
] |
TITLE: Scoup-SMT: Scalable Coupled Sparse Matrix-Tensor Factorization
ABSTRACT: How can we correlate neural activity in the human brain as it responds to
words, with behavioral data expressed as answers to questions about these same
words? In short, we want to find latent variables, that explain both the brain
activity, as well as the behavioral responses. We show that this is an instance
of the Coupled Matrix-Tensor Factorization (CMTF) problem. We propose
Scoup-SMT, a novel, fast, and parallel algorithm that solves the CMTF problem
and produces a sparse latent low-rank subspace of the data. In our experiments,
we find that Scoup-SMT is 50-100 times faster than a state-of-the-art algorithm
for CMTF, along with a 5 fold increase in sparsity. Moreover, we extend
Scoup-SMT to handle missing data without degradation of performance. We apply
Scoup-SMT to BrainQ, a dataset consisting of a (nouns, brain voxels, human
subjects) tensor and a (nouns, properties) matrix, with coupling along the
nouns dimension. Scoup-SMT is able to find meaningful latent variables, as well
as to predict brain activity with competitive accuracy. Finally, we demonstrate
the generality of Scoup-SMT, by applying it on a Facebook dataset (users,
friends, wall-postings); there, Scoup-SMT spots spammer-like anomalies.
|
no_new_dataset
| 0.689057
|
1302.7082
|
Meena Kabilan
|
A.Meena, K.Raja
|
K Means Segmentation of Alzheimers Disease in PET scan datasets: An
implementation
|
International Joint Conference on Advances in Signal Processing and
Information Technology, SPIT2012
|
LNICST, ISSN:1867 To 8211 pp. 158 To 162, 2012
| null | null |
cs.CV cs.NE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The Positron Emission Tomography (PET) scan image requires expertise in the
segmentation where clustering algorithm plays an important role in the
automation process. The algorithm optimization is concluded based on the
performance, quality and number of clusters extracted. This paper is proposed
to study the commonly used K Means clustering algorithm and to discuss a brief
list of toolboxes for reproducing and extending works presented in medical
image analysis. This work is compiled using AForge .NET framework in windows
environment and MATrix LABoratory (MATLAB 7.0.1)
|
[
{
"version": "v1",
"created": "Thu, 28 Feb 2013 04:50:31 GMT"
}
] | 2013-03-01T00:00:00
|
[
[
"Meena",
"A.",
""
],
[
"Raja",
"K.",
""
]
] |
TITLE: K Means Segmentation of Alzheimers Disease in PET scan datasets: An
implementation
ABSTRACT: The Positron Emission Tomography (PET) scan image requires expertise in the
segmentation where clustering algorithm plays an important role in the
automation process. The algorithm optimization is concluded based on the
performance, quality and number of clusters extracted. This paper is proposed
to study the commonly used K Means clustering algorithm and to discuss a brief
list of toolboxes for reproducing and extending works presented in medical
image analysis. This work is compiled using AForge .NET framework in windows
environment and MATrix LABoratory (MATLAB 7.0.1)
|
no_new_dataset
| 0.707998
|
1302.6582
|
Michael Schreiber
|
Michael Schreiber
|
A Case Study of the Arbitrariness of the h-Index and the
Highly-Cited-Publications Indicator
|
16 pages, 3 tables, 5 figures. arXiv admin note: text overlap with
arXiv:1302.6396
|
Journal of Informetrics, 7(2), 379-387 (2013)
|
10.1016/j.joi.2012.12.006
| null |
physics.soc-ph cs.DL
|
http://creativecommons.org/licenses/by-nc-sa/3.0/
|
The arbitrariness of the h-index becomes evident, when one requires q*h
instead of h citations as the threshold for the definition of the index, thus
changing the size of the core of the most influential publications of a
dataset. I analyze the citation records of 26 physicists in order to determine
how much the prefactor q influences the ranking. Likewise, the arbitrariness of
the highly-cited-publications indicator is due to the threshold value, given
either as an absolute number of citations or as a percentage of highly cited
papers. The analysis of the 26 citation records shows that the changes in the
rankings in dependence on these thresholds are rather large and comparable with
the respective changes for the h-index.
|
[
{
"version": "v1",
"created": "Tue, 26 Feb 2013 11:49:29 GMT"
}
] | 2013-02-28T00:00:00
|
[
[
"Schreiber",
"Michael",
""
]
] |
TITLE: A Case Study of the Arbitrariness of the h-Index and the
Highly-Cited-Publications Indicator
ABSTRACT: The arbitrariness of the h-index becomes evident, when one requires q*h
instead of h citations as the threshold for the definition of the index, thus
changing the size of the core of the most influential publications of a
dataset. I analyze the citation records of 26 physicists in order to determine
how much the prefactor q influences the ranking. Likewise, the arbitrariness of
the highly-cited-publications indicator is due to the threshold value, given
either as an absolute number of citations or as a percentage of highly cited
papers. The analysis of the 26 citation records shows that the changes in the
rankings in dependence on these thresholds are rather large and comparable with
the respective changes for the h-index.
|
no_new_dataset
| 0.713007
|
1302.6613
|
Ratnadip Adhikari
|
Ratnadip Adhikari, R. K. Agrawal
|
An Introductory Study on Time Series Modeling and Forecasting
|
67 pages, 29 figures, 33 references, book
|
LAP Lambert Academic Publishing, Germany, 2013
| null | null |
cs.LG stat.ML
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Time series modeling and forecasting has fundamental importance to various
practical domains. Thus a lot of active research works is going on in this
subject during several years. Many important models have been proposed in
literature for improving the accuracy and effectiveness of time series
forecasting. The aim of this dissertation work is to present a concise
description of some popular time series forecasting models used in practice,
with their salient features. In this thesis, we have described three important
classes of time series models, viz. the stochastic, neural networks and SVM
based models, together with their inherent forecasting strengths and
weaknesses. We have also discussed about the basic issues related to time
series modeling, such as stationarity, parsimony, overfitting, etc. Our
discussion about different time series models is supported by giving the
experimental forecast results, performed on six real time series datasets.
While fitting a model to a dataset, special care is taken to select the most
parsimonious one. To evaluate forecast accuracy as well as to compare among
different models fitted to a time series, we have used the five performance
measures, viz. MSE, MAD, RMSE, MAPE and Theil's U-statistics. For each of the
six datasets, we have shown the obtained forecast diagram which graphically
depicts the closeness between the original and forecasted observations. To have
authenticity as well as clarity in our discussion about time series modeling
and forecasting, we have taken the help of various published research works
from reputed journals and some standard books.
|
[
{
"version": "v1",
"created": "Tue, 26 Feb 2013 22:18:55 GMT"
}
] | 2013-02-28T00:00:00
|
[
[
"Adhikari",
"Ratnadip",
""
],
[
"Agrawal",
"R. K.",
""
]
] |
TITLE: An Introductory Study on Time Series Modeling and Forecasting
ABSTRACT: Time series modeling and forecasting has fundamental importance to various
practical domains. Thus a lot of active research works is going on in this
subject during several years. Many important models have been proposed in
literature for improving the accuracy and effectiveness of time series
forecasting. The aim of this dissertation work is to present a concise
description of some popular time series forecasting models used in practice,
with their salient features. In this thesis, we have described three important
classes of time series models, viz. the stochastic, neural networks and SVM
based models, together with their inherent forecasting strengths and
weaknesses. We have also discussed about the basic issues related to time
series modeling, such as stationarity, parsimony, overfitting, etc. Our
discussion about different time series models is supported by giving the
experimental forecast results, performed on six real time series datasets.
While fitting a model to a dataset, special care is taken to select the most
parsimonious one. To evaluate forecast accuracy as well as to compare among
different models fitted to a time series, we have used the five performance
measures, viz. MSE, MAD, RMSE, MAPE and Theil's U-statistics. For each of the
six datasets, we have shown the obtained forecast diagram which graphically
depicts the closeness between the original and forecasted observations. To have
authenticity as well as clarity in our discussion about time series modeling
and forecasting, we have taken the help of various published research works
from reputed journals and some standard books.
|
no_new_dataset
| 0.711469
|
1302.6666
|
Yan Huang
|
Yan Huang, Ruoming Jin, Favyen Bastani, Xiaoyang Sean Wang
|
Large Scale Real-time Ridesharing with Service Guarantee on Road
Networks
| null | null | null | null |
cs.DS
|
http://creativecommons.org/licenses/by-nc-sa/3.0/
|
The mean occupancy rates of personal vehicle trips in the United States is
only 1.6 persons per vehicle mile. Urban traffic gridlock is a familiar scene.
Ridesharing has the potential to solve many environmental, congestion, and
energy problems. In this paper, we introduce the problem of large scale
real-time ridesharing with service guarantee on road networks. Servers and trip
requests are dynamically matched while waiting time and service time
constraints of trips are satisfied. We first propose two basic algorithms: a
branch-and-bound algorithm and an integer programing algorithm. However, these
algorithm structures do not adapt well to the dynamic nature of the ridesharing
problem. Thus, we then propose a kinetic tree algorithm capable of better
scheduling dynamic requests and adjusting routes on-the-fly. We perform
experiments on a large real taxi dataset from Shanghai. The results show that
the kinetic tree algorithm is faster than other algorithms in response time.
|
[
{
"version": "v1",
"created": "Wed, 27 Feb 2013 05:41:49 GMT"
}
] | 2013-02-28T00:00:00
|
[
[
"Huang",
"Yan",
""
],
[
"Jin",
"Ruoming",
""
],
[
"Bastani",
"Favyen",
""
],
[
"Wang",
"Xiaoyang Sean",
""
]
] |
TITLE: Large Scale Real-time Ridesharing with Service Guarantee on Road
Networks
ABSTRACT: The mean occupancy rates of personal vehicle trips in the United States is
only 1.6 persons per vehicle mile. Urban traffic gridlock is a familiar scene.
Ridesharing has the potential to solve many environmental, congestion, and
energy problems. In this paper, we introduce the problem of large scale
real-time ridesharing with service guarantee on road networks. Servers and trip
requests are dynamically matched while waiting time and service time
constraints of trips are satisfied. We first propose two basic algorithms: a
branch-and-bound algorithm and an integer programing algorithm. However, these
algorithm structures do not adapt well to the dynamic nature of the ridesharing
problem. Thus, we then propose a kinetic tree algorithm capable of better
scheduling dynamic requests and adjusting routes on-the-fly. We perform
experiments on a large real taxi dataset from Shanghai. The results show that
the kinetic tree algorithm is faster than other algorithms in response time.
|
no_new_dataset
| 0.710622
|
1302.6957
|
Jayaraman J. Thiagarajan
|
Karthikeyan Natesan Ramamurthy, Jayaraman J. Thiagarajan, Prasanna
Sattigeri and Andreas Spanias
|
Ensemble Sparse Models for Image Analysis
| null | null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Sparse representations with learned dictionaries have been successful in
several image analysis applications. In this paper, we propose and analyze the
framework of ensemble sparse models, and demonstrate their utility in image
restoration and unsupervised clustering. The proposed ensemble model
approximates the data as a linear combination of approximations from multiple
\textit{weak} sparse models. Theoretical analysis of the ensemble model reveals
that even in the worst-case, the ensemble can perform better than any of its
constituent individual models. The dictionaries corresponding to the individual
sparse models are obtained using either random example selection or boosted
approaches. Boosted approaches learn one dictionary per round such that the
dictionary learned in a particular round is optimized for the training examples
having high reconstruction error in the previous round. Results with compressed
recovery show that the ensemble representations lead to a better performance
compared to using a single dictionary obtained with the conventional
alternating minimization approach. The proposed ensemble models are also used
for single image superresolution, and we show that they perform comparably to
the recent approaches. In unsupervised clustering, experiments show that the
proposed model performs better than baseline approaches in several standard
datasets.
|
[
{
"version": "v1",
"created": "Wed, 27 Feb 2013 18:58:36 GMT"
}
] | 2013-02-28T00:00:00
|
[
[
"Ramamurthy",
"Karthikeyan Natesan",
""
],
[
"Thiagarajan",
"Jayaraman J.",
""
],
[
"Sattigeri",
"Prasanna",
""
],
[
"Spanias",
"Andreas",
""
]
] |
TITLE: Ensemble Sparse Models for Image Analysis
ABSTRACT: Sparse representations with learned dictionaries have been successful in
several image analysis applications. In this paper, we propose and analyze the
framework of ensemble sparse models, and demonstrate their utility in image
restoration and unsupervised clustering. The proposed ensemble model
approximates the data as a linear combination of approximations from multiple
\textit{weak} sparse models. Theoretical analysis of the ensemble model reveals
that even in the worst-case, the ensemble can perform better than any of its
constituent individual models. The dictionaries corresponding to the individual
sparse models are obtained using either random example selection or boosted
approaches. Boosted approaches learn one dictionary per round such that the
dictionary learned in a particular round is optimized for the training examples
having high reconstruction error in the previous round. Results with compressed
recovery show that the ensemble representations lead to a better performance
compared to using a single dictionary obtained with the conventional
alternating minimization approach. The proposed ensemble models are also used
for single image superresolution, and we show that they perform comparably to
the recent approaches. In unsupervised clustering, experiments show that the
proposed model performs better than baseline approaches in several standard
datasets.
|
no_new_dataset
| 0.711049
|
1302.6210
|
Ratnadip Adhikari
|
Ratnadip Adhikari, R. K. Agrawal
|
A Homogeneous Ensemble of Artificial Neural Networks for Time Series
Forecasting
|
8 pages, 4 figures, 2 tables, 26 references, international journal
|
International Journal of Computer Applications, Vol. 32, No. 7,
October 2011, pp. 1-8
|
10.5120/3913-5505
| null |
cs.NE cs.LG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Enhancing the robustness and accuracy of time series forecasting models is an
active area of research. Recently, Artificial Neural Networks (ANNs) have found
extensive applications in many practical forecasting problems. However, the
standard backpropagation ANN training algorithm has some critical issues, e.g.
it has a slow convergence rate and often converges to a local minimum, the
complex pattern of error surfaces, lack of proper training parameters selection
methods, etc. To overcome these drawbacks, various improved training methods
have been developed in literature; but, still none of them can be guaranteed as
the best for all problems. In this paper, we propose a novel weighted ensemble
scheme which intelligently combines multiple training algorithms to increase
the ANN forecast accuracies. The weight for each training algorithm is
determined from the performance of the corresponding ANN model on the
validation dataset. Experimental results on four important time series depicts
that our proposed technique reduces the mentioned shortcomings of individual
ANN training algorithms to a great extent. Also it achieves significantly
better forecast accuracies than two other popular statistical models.
|
[
{
"version": "v1",
"created": "Mon, 25 Feb 2013 20:09:19 GMT"
}
] | 2013-02-27T00:00:00
|
[
[
"Adhikari",
"Ratnadip",
""
],
[
"Agrawal",
"R. K.",
""
]
] |
TITLE: A Homogeneous Ensemble of Artificial Neural Networks for Time Series
Forecasting
ABSTRACT: Enhancing the robustness and accuracy of time series forecasting models is an
active area of research. Recently, Artificial Neural Networks (ANNs) have found
extensive applications in many practical forecasting problems. However, the
standard backpropagation ANN training algorithm has some critical issues, e.g.
it has a slow convergence rate and often converges to a local minimum, the
complex pattern of error surfaces, lack of proper training parameters selection
methods, etc. To overcome these drawbacks, various improved training methods
have been developed in literature; but, still none of them can be guaranteed as
the best for all problems. In this paper, we propose a novel weighted ensemble
scheme which intelligently combines multiple training algorithms to increase
the ANN forecast accuracies. The weight for each training algorithm is
determined from the performance of the corresponding ANN model on the
validation dataset. Experimental results on four important time series depicts
that our proposed technique reduces the mentioned shortcomings of individual
ANN training algorithms to a great extent. Also it achieves significantly
better forecast accuracies than two other popular statistical models.
|
no_new_dataset
| 0.710842
|
1302.6426
|
Meena Kabilan
|
A.Meena, K.Raja
|
Segmentation of Alzheimers Disease in PET scan datasets using MATLAB
| null |
International Journal on Information Sciences and
Computing,Vol.6,No.2,July 2012,PP.No.44-48
| null | null |
cs.NE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Positron Emission Tomography (PET) scan images are one of the bio medical
imaging techniques similar to that of MRI scan images but PET scan images are
helpful in finding the development of tumors.The PET scan images requires
expertise in the segmentation where clustering plays an important role in the
automation process.The segmentation of such images is manual to automate the
process clustering is used.Clustering is commonly known as unsupervised
learning process of n dimensional data sets are clustered into k groups so as
to maximize the inter cluster similarity and to minimize the intra cluster
similarity.This paper is proposed to implement the commonly used K Means and
Fuzzy CMeans (FCM) clustering algorithm.This work is implemented using MATrix
LABoratory (MATLAB) and tested with sample PET scan image. The sample data is
collected from Alzheimers Disease Neuro imaging Initiative ADNI. Medical Image
Processing and Visualization Tool (MIPAV) are used to compare the resultant
images.
|
[
{
"version": "v1",
"created": "Tue, 26 Feb 2013 13:19:26 GMT"
}
] | 2013-02-27T00:00:00
|
[
[
"Meena",
"A.",
""
],
[
"Raja",
"K.",
""
]
] |
TITLE: Segmentation of Alzheimers Disease in PET scan datasets using MATLAB
ABSTRACT: Positron Emission Tomography (PET) scan images are one of the bio medical
imaging techniques similar to that of MRI scan images but PET scan images are
helpful in finding the development of tumors.The PET scan images requires
expertise in the segmentation where clustering plays an important role in the
automation process.The segmentation of such images is manual to automate the
process clustering is used.Clustering is commonly known as unsupervised
learning process of n dimensional data sets are clustered into k groups so as
to maximize the inter cluster similarity and to minimize the intra cluster
similarity.This paper is proposed to implement the commonly used K Means and
Fuzzy CMeans (FCM) clustering algorithm.This work is implemented using MATrix
LABoratory (MATLAB) and tested with sample PET scan image. The sample data is
collected from Alzheimers Disease Neuro imaging Initiative ADNI. Medical Image
Processing and Visualization Tool (MIPAV) are used to compare the resultant
images.
|
no_new_dataset
| 0.709585
|
1302.5101
|
Jeremiah Blocki
|
Jeremiah Blocki and Saranga Komanduri and Ariel Procaccia and Or
Sheffet
|
Optimizing Password Composition Policies
| null | null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A password composition policy restricts the space of allowable passwords to
eliminate weak passwords that are vulnerable to statistical guessing attacks.
Usability studies have demonstrated that existing password composition policies
can sometimes result in weaker password distributions; hence a more principled
approach is needed. We introduce the first theoretical model for optimizing
password composition policies. We study the computational and sample complexity
of this problem under different assumptions on the structure of policies and on
users' preferences over passwords. Our main positive result is an algorithm
that -- with high probability --- constructs almost optimal policies (which are
specified as a union of subsets of allowed passwords), and requires only a
small number of samples of users' preferred passwords. We complement our
theoretical results with simulations using a real-world dataset of 32 million
passwords.
|
[
{
"version": "v1",
"created": "Wed, 20 Feb 2013 20:53:41 GMT"
},
{
"version": "v2",
"created": "Mon, 25 Feb 2013 19:44:50 GMT"
}
] | 2013-02-26T00:00:00
|
[
[
"Blocki",
"Jeremiah",
""
],
[
"Komanduri",
"Saranga",
""
],
[
"Procaccia",
"Ariel",
""
],
[
"Sheffet",
"Or",
""
]
] |
TITLE: Optimizing Password Composition Policies
ABSTRACT: A password composition policy restricts the space of allowable passwords to
eliminate weak passwords that are vulnerable to statistical guessing attacks.
Usability studies have demonstrated that existing password composition policies
can sometimes result in weaker password distributions; hence a more principled
approach is needed. We introduce the first theoretical model for optimizing
password composition policies. We study the computational and sample complexity
of this problem under different assumptions on the structure of policies and on
users' preferences over passwords. Our main positive result is an algorithm
that -- with high probability --- constructs almost optimal policies (which are
specified as a union of subsets of allowed passwords), and requires only a
small number of samples of users' preferred passwords. We complement our
theoretical results with simulations using a real-world dataset of 32 million
passwords.
|
no_new_dataset
| 0.634543
|
1302.5974
|
Zhengfeng Yang
|
Zhengfeng Yang, Min Wu and Wang Lin
|
Exact Safety Verification of Interval Hybrid Systems Based on
Symbolic-Numeric Computation
| null | null | null | null |
cs.SC cs.SE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we address the problem of safety verification of interval
hybrid systems in which the coefficients are intervals instead of explicit
numbers. A hybrid symbolic-numeric method, based on SOS relaxation and interval
arithmetic certification, is proposed to generate exact inequality invariants
for safety verification of interval hybrid systems. As an application, an
approach is provided to verify safety properties of non-polynomial hybrid
systems. Experiments on the benchmark hybrid systems are given to illustrate
the efficiency of our method.
|
[
{
"version": "v1",
"created": "Mon, 25 Feb 2013 01:54:41 GMT"
}
] | 2013-02-26T00:00:00
|
[
[
"Yang",
"Zhengfeng",
""
],
[
"Wu",
"Min",
""
],
[
"Lin",
"Wang",
""
]
] |
TITLE: Exact Safety Verification of Interval Hybrid Systems Based on
Symbolic-Numeric Computation
ABSTRACT: In this paper, we address the problem of safety verification of interval
hybrid systems in which the coefficients are intervals instead of explicit
numbers. A hybrid symbolic-numeric method, based on SOS relaxation and interval
arithmetic certification, is proposed to generate exact inequality invariants
for safety verification of interval hybrid systems. As an application, an
approach is provided to verify safety properties of non-polynomial hybrid
systems. Experiments on the benchmark hybrid systems are given to illustrate
the efficiency of our method.
|
no_new_dataset
| 0.709849
|
1302.5985
|
Xiaodi Hou
|
Xiaodi Hou and Alan Yuille and Christof Koch
|
A Meta-Theory of Boundary Detection Benchmarks
|
NIPS 2012 Workshop on Human Computation for Science and Computational
Sustainability
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Human labeled datasets, along with their corresponding evaluation algorithms,
play an important role in boundary detection. We here present a psychophysical
experiment that addresses the reliability of such benchmarks. To find better
remedies to evaluate the performance of any boundary detection algorithm, we
propose a computational framework to remove inappropriate human labels and
estimate the intrinsic properties of boundaries.
|
[
{
"version": "v1",
"created": "Mon, 25 Feb 2013 03:12:12 GMT"
}
] | 2013-02-26T00:00:00
|
[
[
"Hou",
"Xiaodi",
""
],
[
"Yuille",
"Alan",
""
],
[
"Koch",
"Christof",
""
]
] |
TITLE: A Meta-Theory of Boundary Detection Benchmarks
ABSTRACT: Human labeled datasets, along with their corresponding evaluation algorithms,
play an important role in boundary detection. We here present a psychophysical
experiment that addresses the reliability of such benchmarks. To find better
remedies to evaluate the performance of any boundary detection algorithm, we
propose a computational framework to remove inappropriate human labels and
estimate the intrinsic properties of boundaries.
|
no_new_dataset
| 0.71081
|
1211.3147
|
Keke Chen
|
James Powers and Keke Chen
|
Secure Computation of Top-K Eigenvectors for Shared Matrices in the
Cloud
|
8 pages
| null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
With the development of sensor network, mobile computing, and web
applications, data are now collected from many distributed sources to form big
datasets. Such datasets can be hosted in the cloud to achieve economical
processing. However, these data might be highly sensitive requiring secure
storage and processing. We envision a cloud-based data storage and processing
framework that enables users to economically and securely share and handle big
datasets. Under this framework, we study the matrix-based data mining
algorithms with a focus on the secure top-k eigenvector algorithm. Our approach
uses an iterative processing model in which the authorized user interacts with
the cloud to achieve the result. In this process, both the source matrix and
the intermediate results keep confidential and the client-side incurs low
costs. The security of this approach is guaranteed by using Paillier Encryption
and a random perturbation technique. We carefully analyze its security under a
cloud-specific threat model. Our experimental results show that the proposed
method is scalable to big matrices while requiring low client-side costs.
|
[
{
"version": "v1",
"created": "Tue, 13 Nov 2012 21:59:18 GMT"
},
{
"version": "v2",
"created": "Fri, 22 Feb 2013 05:35:22 GMT"
}
] | 2013-02-25T00:00:00
|
[
[
"Powers",
"James",
""
],
[
"Chen",
"Keke",
""
]
] |
TITLE: Secure Computation of Top-K Eigenvectors for Shared Matrices in the
Cloud
ABSTRACT: With the development of sensor network, mobile computing, and web
applications, data are now collected from many distributed sources to form big
datasets. Such datasets can be hosted in the cloud to achieve economical
processing. However, these data might be highly sensitive requiring secure
storage and processing. We envision a cloud-based data storage and processing
framework that enables users to economically and securely share and handle big
datasets. Under this framework, we study the matrix-based data mining
algorithms with a focus on the secure top-k eigenvector algorithm. Our approach
uses an iterative processing model in which the authorized user interacts with
the cloud to achieve the result. In this process, both the source matrix and
the intermediate results keep confidential and the client-side incurs low
costs. The security of this approach is guaranteed by using Paillier Encryption
and a random perturbation technique. We carefully analyze its security under a
cloud-specific threat model. Our experimental results show that the proposed
method is scalable to big matrices while requiring low client-side costs.
|
no_new_dataset
| 0.708616
|
1301.3533
|
Xanadu Halkias
|
Xanadu Halkias, Sebastien Paris, Herve Glotin
|
Sparse Penalty in Deep Belief Networks: Using the Mixed Norm Constraint
|
8 pages, 7 figures (including subfigures), ICleaR conference
| null | null | null |
cs.NE cs.LG stat.ML
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Deep Belief Networks (DBN) have been successfully applied on popular machine
learning tasks. Specifically, when applied on hand-written digit recognition,
DBNs have achieved approximate accuracy rates of 98.8%. In an effort to
optimize the data representation achieved by the DBN and maximize their
descriptive power, recent advances have focused on inducing sparse constraints
at each layer of the DBN. In this paper we present a theoretical approach for
sparse constraints in the DBN using the mixed norm for both non-overlapping and
overlapping groups. We explore how these constraints affect the classification
accuracy for digit recognition in three different datasets (MNIST, USPS, RIMES)
and provide initial estimations of their usefulness by altering different
parameters such as the group size and overlap percentage.
|
[
{
"version": "v1",
"created": "Wed, 16 Jan 2013 00:12:21 GMT"
},
{
"version": "v2",
"created": "Fri, 22 Feb 2013 10:18:15 GMT"
}
] | 2013-02-25T00:00:00
|
[
[
"Halkias",
"Xanadu",
""
],
[
"Paris",
"Sebastien",
""
],
[
"Glotin",
"Herve",
""
]
] |
TITLE: Sparse Penalty in Deep Belief Networks: Using the Mixed Norm Constraint
ABSTRACT: Deep Belief Networks (DBN) have been successfully applied on popular machine
learning tasks. Specifically, when applied on hand-written digit recognition,
DBNs have achieved approximate accuracy rates of 98.8%. In an effort to
optimize the data representation achieved by the DBN and maximize their
descriptive power, recent advances have focused on inducing sparse constraints
at each layer of the DBN. In this paper we present a theoretical approach for
sparse constraints in the DBN using the mixed norm for both non-overlapping and
overlapping groups. We explore how these constraints affect the classification
accuracy for digit recognition in three different datasets (MNIST, USPS, RIMES)
and provide initial estimations of their usefulness by altering different
parameters such as the group size and overlap percentage.
|
no_new_dataset
| 0.710434
|
1301.7321
|
Johannes Kloos
|
Johannes Kloos, Rupak Majumdar, Filip Niksic and Ruzica Piskac
|
Incremental, Inductive Coverability
|
Non-reviewed version, original version submitted to CAV 2013; this is
a revised version, containing more experimental results and some corrections
| null | null | null |
cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We give an incremental, inductive (IC3) procedure to check coverability of
well-structured transition systems. Our procedure generalizes the IC3 procedure
for safety verification that has been successfully applied in finite-state
hardware verification to infinite-state well-structured transition systems. We
show that our procedure is sound, complete, and terminating for downward-finite
well-structured transition systems---where each state has a finite number of
states below it---a class that contains extensions of Petri nets, broadcast
protocols, and lossy channel systems.
We have implemented our algorithm for checking coverability of Petri nets. We
describe how the algorithm can be efficiently implemented without the use of
SMT solvers. Our experiments on standard Petri net benchmarks show that IC3 is
competitive with state-of-the-art implementations for coverability based on
symbolic backward analysis or expand-enlarge-and-check algorithms both in time
taken and space usage.
|
[
{
"version": "v1",
"created": "Wed, 30 Jan 2013 18:37:03 GMT"
},
{
"version": "v2",
"created": "Fri, 22 Feb 2013 16:25:09 GMT"
}
] | 2013-02-25T00:00:00
|
[
[
"Kloos",
"Johannes",
""
],
[
"Majumdar",
"Rupak",
""
],
[
"Niksic",
"Filip",
""
],
[
"Piskac",
"Ruzica",
""
]
] |
TITLE: Incremental, Inductive Coverability
ABSTRACT: We give an incremental, inductive (IC3) procedure to check coverability of
well-structured transition systems. Our procedure generalizes the IC3 procedure
for safety verification that has been successfully applied in finite-state
hardware verification to infinite-state well-structured transition systems. We
show that our procedure is sound, complete, and terminating for downward-finite
well-structured transition systems---where each state has a finite number of
states below it---a class that contains extensions of Petri nets, broadcast
protocols, and lossy channel systems.
We have implemented our algorithm for checking coverability of Petri nets. We
describe how the algorithm can be efficiently implemented without the use of
SMT solvers. Our experiments on standard Petri net benchmarks show that IC3 is
competitive with state-of-the-art implementations for coverability based on
symbolic backward analysis or expand-enlarge-and-check algorithms both in time
taken and space usage.
|
no_new_dataset
| 0.706823
|
1302.5125
|
Oren Rippel
|
Oren Rippel, Ryan Prescott Adams
|
High-Dimensional Probability Estimation with Deep Density Models
|
12 pages, 4 figures, 1 table. Submitted for publication
| null | null | null |
stat.ML cs.LG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
One of the fundamental problems in machine learning is the estimation of a
probability distribution from data. Many techniques have been proposed to study
the structure of data, most often building around the assumption that
observations lie on a lower-dimensional manifold of high probability. It has
been more difficult, however, to exploit this insight to build explicit,
tractable density models for high-dimensional data. In this paper, we introduce
the deep density model (DDM), a new approach to density estimation. We exploit
insights from deep learning to construct a bijective map to a representation
space, under which the transformation of the distribution of the data is
approximately factorized and has identical and known marginal densities. The
simplicity of the latent distribution under the model allows us to feasibly
explore it, and the invertibility of the map to characterize contraction of
measure across it. This enables us to compute normalized densities for
out-of-sample data. This combination of tractability and flexibility allows us
to tackle a variety of probabilistic tasks on high-dimensional datasets,
including: rapid computation of normalized densities at test-time without
evaluating a partition function; generation of samples without MCMC; and
characterization of the joint entropy of the data.
|
[
{
"version": "v1",
"created": "Wed, 20 Feb 2013 21:20:30 GMT"
}
] | 2013-02-22T00:00:00
|
[
[
"Rippel",
"Oren",
""
],
[
"Adams",
"Ryan Prescott",
""
]
] |
TITLE: High-Dimensional Probability Estimation with Deep Density Models
ABSTRACT: One of the fundamental problems in machine learning is the estimation of a
probability distribution from data. Many techniques have been proposed to study
the structure of data, most often building around the assumption that
observations lie on a lower-dimensional manifold of high probability. It has
been more difficult, however, to exploit this insight to build explicit,
tractable density models for high-dimensional data. In this paper, we introduce
the deep density model (DDM), a new approach to density estimation. We exploit
insights from deep learning to construct a bijective map to a representation
space, under which the transformation of the distribution of the data is
approximately factorized and has identical and known marginal densities. The
simplicity of the latent distribution under the model allows us to feasibly
explore it, and the invertibility of the map to characterize contraction of
measure across it. This enables us to compute normalized densities for
out-of-sample data. This combination of tractability and flexibility allows us
to tackle a variety of probabilistic tasks on high-dimensional datasets,
including: rapid computation of normalized densities at test-time without
evaluating a partition function; generation of samples without MCMC; and
characterization of the joint entropy of the data.
|
no_new_dataset
| 0.709453
|
1302.5189
|
Dilip K. Prasad
|
Dilip K. Prasad
|
Object Detection in Real Images
| null | null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Object detection and recognition are important problems in computer vision.
Since these problems are meta-heuristic, despite a lot of research, practically
usable, intelligent, real-time, and dynamic object detection/recognition
methods are still unavailable. We propose a new object detection/recognition
method, which improves over the existing methods in every stage of the object
detection/recognition process. In addition to the usual features, we propose to
use geometric shapes, like linear cues, ellipses and quadrangles, as additional
features. The full potential of geometric cues is exploited by using them to
extract other features in a robust, computationally efficient, and less
meta-heuristic manner. We also propose a new hierarchical codebook, which
provides good generalization and discriminative properties. The codebook
enables fast multi-path inference mechanisms based on propagation of
conditional likelihoods, that make it robust to occlusion and noise. It has the
capability of dynamic learning. We also propose a new learning method that has
generative and discriminative learning capabilities, does not need large and
fully supervised training dataset, and is capable of online learning. The
preliminary work of detecting geometric shapes in real images has been
completed. This preliminary work is the focus of this report. Future path for
realizing the proposed object detection/recognition method is also discussed in
brief.
|
[
{
"version": "v1",
"created": "Thu, 21 Feb 2013 06:06:47 GMT"
}
] | 2013-02-22T00:00:00
|
[
[
"Prasad",
"Dilip K.",
""
]
] |
TITLE: Object Detection in Real Images
ABSTRACT: Object detection and recognition are important problems in computer vision.
Since these problems are meta-heuristic, despite a lot of research, practically
usable, intelligent, real-time, and dynamic object detection/recognition
methods are still unavailable. We propose a new object detection/recognition
method, which improves over the existing methods in every stage of the object
detection/recognition process. In addition to the usual features, we propose to
use geometric shapes, like linear cues, ellipses and quadrangles, as additional
features. The full potential of geometric cues is exploited by using them to
extract other features in a robust, computationally efficient, and less
meta-heuristic manner. We also propose a new hierarchical codebook, which
provides good generalization and discriminative properties. The codebook
enables fast multi-path inference mechanisms based on propagation of
conditional likelihoods, that make it robust to occlusion and noise. It has the
capability of dynamic learning. We also propose a new learning method that has
generative and discriminative learning capabilities, does not need large and
fully supervised training dataset, and is capable of online learning. The
preliminary work of detecting geometric shapes in real images has been
completed. This preliminary work is the focus of this report. Future path for
realizing the proposed object detection/recognition method is also discussed in
brief.
|
no_new_dataset
| 0.708055
|
1302.5199
|
Arunasalam Sambhanthan
|
Arunasalam Sambhanthan, Alice Good
|
A Virtual World Model to Enhance Tourism Destination Accessibility in
Developing Countries
|
Conference paper
| null | null | null |
cs.CY cs.HC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The problem of destination accessibility is a vital concern in the
sustainable tourism development in the emerging regions due to the increasing
numbers of tourism business growth in the recent times. Tourism is one of the
potential foreign exchange earning sectors, which place sustainability as one
of the main success metrics for benchmarking the industry's overall
development. On the other hand, there are several destinations, which are
inaccessible to tourists due to several reasons. Underutilization of potential
destinations in both pre purchase and consumption stages is a strategic
disadvantage for emerging countries on leading their tourism industry towards
sustainability. A virtual world model to increase the destination accessibility
of tourism products has been proposed. The model has to be designed with visual
and auditory experience to tourists. The model is expected to enhance the
accessibility of destinations for users of different categories. Elderly users,
users with panic disorders, users with mobility impairments also will be able
to enjoy traveling experience just same as other, through the proposed model.
|
[
{
"version": "v1",
"created": "Thu, 21 Feb 2013 06:39:37 GMT"
}
] | 2013-02-22T00:00:00
|
[
[
"Sambhanthan",
"Arunasalam",
""
],
[
"Good",
"Alice",
""
]
] |
TITLE: A Virtual World Model to Enhance Tourism Destination Accessibility in
Developing Countries
ABSTRACT: The problem of destination accessibility is a vital concern in the
sustainable tourism development in the emerging regions due to the increasing
numbers of tourism business growth in the recent times. Tourism is one of the
potential foreign exchange earning sectors, which place sustainability as one
of the main success metrics for benchmarking the industry's overall
development. On the other hand, there are several destinations, which are
inaccessible to tourists due to several reasons. Underutilization of potential
destinations in both pre purchase and consumption stages is a strategic
disadvantage for emerging countries on leading their tourism industry towards
sustainability. A virtual world model to increase the destination accessibility
of tourism products has been proposed. The model has to be designed with visual
and auditory experience to tourists. The model is expected to enhance the
accessibility of destinations for users of different categories. Elderly users,
users with panic disorders, users with mobility impairments also will be able
to enjoy traveling experience just same as other, through the proposed model.
|
no_new_dataset
| 0.705367
|
1206.0051
|
Florin Rusu
|
Chengjie Qin, Florin Rusu
|
PF-OLA: A High-Performance Framework for Parallel On-Line Aggregation
|
36 pages
| null | null | null |
cs.DB cs.DC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Online aggregation provides estimates to the final result of a computation
during the actual processing. The user can stop the computation as soon as the
estimate is accurate enough, typically early in the execution. This allows for
the interactive data exploration of the largest datasets. In this paper we
introduce the first framework for parallel online aggregation in which the
estimation virtually does not incur any overhead on top of the actual
execution. We define a generic interface to express any estimation model that
abstracts completely the execution details. We design a novel estimator
specifically targeted at parallel online aggregation. When executed by the
framework over a massive $8\text{TB}$ TPC-H instance, the estimator provides
accurate confidence bounds early in the execution even when the cardinality of
the final result is seven orders of magnitude smaller than the dataset size and
without incurring overhead.
|
[
{
"version": "v1",
"created": "Thu, 31 May 2012 23:38:36 GMT"
},
{
"version": "v2",
"created": "Wed, 20 Feb 2013 07:10:04 GMT"
}
] | 2013-02-21T00:00:00
|
[
[
"Qin",
"Chengjie",
""
],
[
"Rusu",
"Florin",
""
]
] |
TITLE: PF-OLA: A High-Performance Framework for Parallel On-Line Aggregation
ABSTRACT: Online aggregation provides estimates to the final result of a computation
during the actual processing. The user can stop the computation as soon as the
estimate is accurate enough, typically early in the execution. This allows for
the interactive data exploration of the largest datasets. In this paper we
introduce the first framework for parallel online aggregation in which the
estimation virtually does not incur any overhead on top of the actual
execution. We define a generic interface to express any estimation model that
abstracts completely the execution details. We design a novel estimator
specifically targeted at parallel online aggregation. When executed by the
framework over a massive $8\text{TB}$ TPC-H instance, the estimator provides
accurate confidence bounds early in the execution even when the cardinality of
the final result is seven orders of magnitude smaller than the dataset size and
without incurring overhead.
|
no_new_dataset
| 0.70883
|
1302.4798
|
Asankhaya Sharma
|
Asankhaya Sharma
|
An Empirical Study of Path Feasibility Queries
| null | null | null | null |
cs.SE cs.PL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper we present a comparative study of path feasibility queries
generated during path exploration based software engineering methods. Symbolic
execution based methods are gaining importance in different aspects of software
engineering e.g. proving properties about programs, test case generation,
comparing different executions of programs. These methods use SMT solvers to
check the satisfiability of path feasibility queries written as a formula in
the supported theories. We study the performance of solving such path
feasibility queries using SMT solvers for real world programs. Our path
condition formulas are generated in a theory of quantifier free bit vectors
with arrays (QF_ABV). We show that among the different SMT solvers, STP is
better than Z3 by an order of magnitude for such kind of queries. As an
application we design a new program analysis (Change Value Analysis) based on
our study which exploits undefined behaviors in programs. We have implemented
our analysis in LLVM and tested it with the benchmark of SIR programs. It
reduces the time taken for solving path feasibility queries by 48%. The study
can serve as guidance to practitioners using path feasibility queries to create
scalable software engineering methods based on symbolic execution.
|
[
{
"version": "v1",
"created": "Wed, 20 Feb 2013 02:59:49 GMT"
}
] | 2013-02-21T00:00:00
|
[
[
"Sharma",
"Asankhaya",
""
]
] |
TITLE: An Empirical Study of Path Feasibility Queries
ABSTRACT: In this paper we present a comparative study of path feasibility queries
generated during path exploration based software engineering methods. Symbolic
execution based methods are gaining importance in different aspects of software
engineering e.g. proving properties about programs, test case generation,
comparing different executions of programs. These methods use SMT solvers to
check the satisfiability of path feasibility queries written as a formula in
the supported theories. We study the performance of solving such path
feasibility queries using SMT solvers for real world programs. Our path
condition formulas are generated in a theory of quantifier free bit vectors
with arrays (QF_ABV). We show that among the different SMT solvers, STP is
better than Z3 by an order of magnitude for such kind of queries. As an
application we design a new program analysis (Change Value Analysis) based on
our study which exploits undefined behaviors in programs. We have implemented
our analysis in LLVM and tested it with the benchmark of SIR programs. It
reduces the time taken for solving path feasibility queries by 48%. The study
can serve as guidance to practitioners using path feasibility queries to create
scalable software engineering methods based on symbolic execution.
|
no_new_dataset
| 0.706165
|
1302.4874
|
Gon\c{c}alo Sim\~oes
|
Gon\c{c}alo Sim\~oes, Helena Galhardas, David Matos
|
A Labeled Graph Kernel for Relationship Extraction
| null | null | null | null |
cs.CL cs.LG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we propose an approach for Relationship Extraction (RE) based
on labeled graph kernels. The kernel we propose is a particularization of a
random walk kernel that exploits two properties previously studied in the RE
literature: (i) the words between the candidate entities or connecting them in
a syntactic representation are particularly likely to carry information
regarding the relationship; and (ii) combining information from distinct
sources in a kernel may help the RE system make better decisions. We performed
experiments on a dataset of protein-protein interactions and the results show
that our approach obtains effectiveness values that are comparable with the
state-of-the art kernel methods. Moreover, our approach is able to outperform
the state-of-the-art kernels when combined with other kernel methods.
|
[
{
"version": "v1",
"created": "Wed, 20 Feb 2013 11:06:25 GMT"
}
] | 2013-02-21T00:00:00
|
[
[
"Simões",
"Gonçalo",
""
],
[
"Galhardas",
"Helena",
""
],
[
"Matos",
"David",
""
]
] |
TITLE: A Labeled Graph Kernel for Relationship Extraction
ABSTRACT: In this paper, we propose an approach for Relationship Extraction (RE) based
on labeled graph kernels. The kernel we propose is a particularization of a
random walk kernel that exploits two properties previously studied in the RE
literature: (i) the words between the candidate entities or connecting them in
a syntactic representation are particularly likely to carry information
regarding the relationship; and (ii) combining information from distinct
sources in a kernel may help the RE system make better decisions. We performed
experiments on a dataset of protein-protein interactions and the results show
that our approach obtains effectiveness values that are comparable with the
state-of-the art kernel methods. Moreover, our approach is able to outperform
the state-of-the-art kernels when combined with other kernel methods.
|
no_new_dataset
| 0.710459
|
1302.4932
|
John S. Breese
|
John S. Breese, Russ Blake
|
Automating Computer Bottleneck Detection with Belief Nets
|
Appears in Proceedings of the Eleventh Conference on Uncertainty in
Artificial Intelligence (UAI1995)
| null | null |
UAI-P-1995-PG-36-45
|
cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We describe an application of belief networks to the diagnosis of bottlenecks
in computer systems. The technique relies on a high-level functional model of
the interaction between application workloads, the Windows NT operating system,
and system hardware. Given a workload description, the model predicts the
values of observable system counters available from the Windows NT performance
monitoring tool. Uncertainty in workloads, predictions, and counter values are
characterized with Gaussian distributions. During diagnostic inference, we use
observed performance monitor values to find the most probable assignment to the
workload parameters. In this paper we provide some background on automated
bottleneck detection, describe the structure of the system model, and discuss
empirical procedures for model calibration and verification. Part of the
calibration process includes generating a dataset to estimate a multivariate
Gaussian error model. Initial results in diagnosing bottlenecks are presented.
|
[
{
"version": "v1",
"created": "Wed, 20 Feb 2013 15:19:11 GMT"
}
] | 2013-02-21T00:00:00
|
[
[
"Breese",
"John S.",
""
],
[
"Blake",
"Russ",
""
]
] |
TITLE: Automating Computer Bottleneck Detection with Belief Nets
ABSTRACT: We describe an application of belief networks to the diagnosis of bottlenecks
in computer systems. The technique relies on a high-level functional model of
the interaction between application workloads, the Windows NT operating system,
and system hardware. Given a workload description, the model predicts the
values of observable system counters available from the Windows NT performance
monitoring tool. Uncertainty in workloads, predictions, and counter values are
characterized with Gaussian distributions. During diagnostic inference, we use
observed performance monitor values to find the most probable assignment to the
workload parameters. In this paper we provide some background on automated
bottleneck detection, describe the structure of the system model, and discuss
empirical procedures for model calibration and verification. Part of the
calibration process includes generating a dataset to estimate a multivariate
Gaussian error model. Initial results in diagnosing bottlenecks are presented.
|
no_new_dataset
| 0.710245
|
1301.0068
|
Guy Bresler
|
Guy Bresler, Ma'ayan Bresler, David Tse
|
Optimal Assembly for High Throughput Shotgun Sequencing
|
26 pages, 18 figures
| null | null | null |
q-bio.GN cs.DS cs.IT math.IT q-bio.QM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present a framework for the design of optimal assembly algorithms for
shotgun sequencing under the criterion of complete reconstruction. We derive a
lower bound on the read length and the coverage depth required for
reconstruction in terms of the repeat statistics of the genome. Building on
earlier works, we design a de Brujin graph based assembly algorithm which can
achieve very close to the lower bound for repeat statistics of a wide range of
sequenced genomes, including the GAGE datasets. The results are based on a set
of necessary and sufficient conditions on the DNA sequence and the reads for
reconstruction. The conditions can be viewed as the shotgun sequencing analogue
of Ukkonen-Pevzner's necessary and sufficient conditions for Sequencing by
Hybridization.
|
[
{
"version": "v1",
"created": "Tue, 1 Jan 2013 08:52:44 GMT"
},
{
"version": "v2",
"created": "Wed, 9 Jan 2013 03:51:20 GMT"
},
{
"version": "v3",
"created": "Mon, 18 Feb 2013 17:41:09 GMT"
}
] | 2013-02-20T00:00:00
|
[
[
"Bresler",
"Guy",
""
],
[
"Bresler",
"Ma'ayan",
""
],
[
"Tse",
"David",
""
]
] |
TITLE: Optimal Assembly for High Throughput Shotgun Sequencing
ABSTRACT: We present a framework for the design of optimal assembly algorithms for
shotgun sequencing under the criterion of complete reconstruction. We derive a
lower bound on the read length and the coverage depth required for
reconstruction in terms of the repeat statistics of the genome. Building on
earlier works, we design a de Brujin graph based assembly algorithm which can
achieve very close to the lower bound for repeat statistics of a wide range of
sequenced genomes, including the GAGE datasets. The results are based on a set
of necessary and sufficient conditions on the DNA sequence and the reads for
reconstruction. The conditions can be viewed as the shotgun sequencing analogue
of Ukkonen-Pevzner's necessary and sufficient conditions for Sequencing by
Hybridization.
|
no_new_dataset
| 0.709648
|
1302.4504
|
Diego Amancio Raphael
|
Diego R. Amancio, Osvaldo N. Oliveira Jr. and Luciano da F. Costa
|
On the use of topological features and hierarchical characterization for
disambiguating names in collaborative networks
| null |
Europhysics Letters (2012) 99 48002
|
10.1209/0295-5075/99/48002
| null |
physics.soc-ph cs.DL cs.IR cs.SI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Many features of complex systems can now be unveiled by applying statistical
physics methods to treat them as social networks. The power of the analysis may
be limited, however, by the presence of ambiguity in names, e.g., caused by
homonymy in collaborative networks. In this paper we show that the ability to
distinguish between homonymous authors is enhanced when longer-distance
connections are considered, rather than looking at only the immediate neighbors
of a node in the collaborative network. Optimized results were obtained upon
using the 3rd hierarchy in connections. Furthermore, reasonable distinction
among authors could also be achieved upon using pattern recognition strategies
for the data generated from the topology of the collaborative network. These
results were obtained with a network from papers in the arXiv repository, into
which homonymy was deliberately introduced to test the methods with a
controlled, reliable dataset. In all cases, several methods of supervised and
unsupervised machine learning were used, leading to the same overall results.
The suitability of using deeper hierarchies and network topology was confirmed
with a real database of movie actors, with the additional finding that the
distinguishing ability can be further enhanced by combining topology features
and long-range connections in the collaborative network.
|
[
{
"version": "v1",
"created": "Tue, 19 Feb 2013 02:00:01 GMT"
}
] | 2013-02-20T00:00:00
|
[
[
"Amancio",
"Diego R.",
""
],
[
"Oliveira",
"Osvaldo N.",
"Jr."
],
[
"Costa",
"Luciano da F.",
""
]
] |
TITLE: On the use of topological features and hierarchical characterization for
disambiguating names in collaborative networks
ABSTRACT: Many features of complex systems can now be unveiled by applying statistical
physics methods to treat them as social networks. The power of the analysis may
be limited, however, by the presence of ambiguity in names, e.g., caused by
homonymy in collaborative networks. In this paper we show that the ability to
distinguish between homonymous authors is enhanced when longer-distance
connections are considered, rather than looking at only the immediate neighbors
of a node in the collaborative network. Optimized results were obtained upon
using the 3rd hierarchy in connections. Furthermore, reasonable distinction
among authors could also be achieved upon using pattern recognition strategies
for the data generated from the topology of the collaborative network. These
results were obtained with a network from papers in the arXiv repository, into
which homonymy was deliberately introduced to test the methods with a
controlled, reliable dataset. In all cases, several methods of supervised and
unsupervised machine learning were used, leading to the same overall results.
The suitability of using deeper hierarchies and network topology was confirmed
with a real database of movie actors, with the additional finding that the
distinguishing ability can be further enhanced by combining topology features
and long-range connections in the collaborative network.
|
no_new_dataset
| 0.710226
|
1302.4680
|
Gregory Newstadt
|
Gregory E. Newstadt, Edmund G. Zelnio, and Alfred O. Hero III
|
Moving target inference with hierarchical Bayesian models in synthetic
aperture radar imagery
|
35 pages, 8 figures, 1 algorithm, 11 tables
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In synthetic aperture radar (SAR), images are formed by focusing the response
of stationary objects to a single spatial location. On the other hand, moving
targets cause phase errors in the standard formation of SAR images that cause
displacement and defocusing effects. SAR imagery also contains significant
sources of non-stationary spatially-varying noises, including antenna gain
discrepancies, angular scintillation (glints) and complex speckle. In order to
account for this intricate phenomenology, this work combines the knowledge of
the physical, kinematic, and statistical properties of SAR imaging into a
single unified Bayesian structure that simultaneously (a) estimates the
nuisance parameters such as clutter distributions and antenna miscalibrations
and (b) estimates the target signature required for detection/inference of the
target state. Moreover, we provide a Monte Carlo estimate of the posterior
distribution for the target state and nuisance parameters that infers the
parameters of the model directly from the data, largely eliminating tuning of
algorithm parameters. We demonstrate that our algorithm competes at least as
well on a synthetic dataset as state-of-the-art algorithms for estimating
sparse signals. Finally, performance analysis on a measured dataset
demonstrates that the proposed algorithm is robust at detecting/estimating
targets over a wide area and performs at least as well as popular algorithms
for SAR moving target detection.
|
[
{
"version": "v1",
"created": "Tue, 19 Feb 2013 17:12:53 GMT"
}
] | 2013-02-20T00:00:00
|
[
[
"Newstadt",
"Gregory E.",
""
],
[
"Zelnio",
"Edmund G.",
""
],
[
"Hero",
"Alfred O.",
"III"
]
] |
TITLE: Moving target inference with hierarchical Bayesian models in synthetic
aperture radar imagery
ABSTRACT: In synthetic aperture radar (SAR), images are formed by focusing the response
of stationary objects to a single spatial location. On the other hand, moving
targets cause phase errors in the standard formation of SAR images that cause
displacement and defocusing effects. SAR imagery also contains significant
sources of non-stationary spatially-varying noises, including antenna gain
discrepancies, angular scintillation (glints) and complex speckle. In order to
account for this intricate phenomenology, this work combines the knowledge of
the physical, kinematic, and statistical properties of SAR imaging into a
single unified Bayesian structure that simultaneously (a) estimates the
nuisance parameters such as clutter distributions and antenna miscalibrations
and (b) estimates the target signature required for detection/inference of the
target state. Moreover, we provide a Monte Carlo estimate of the posterior
distribution for the target state and nuisance parameters that infers the
parameters of the model directly from the data, largely eliminating tuning of
algorithm parameters. We demonstrate that our algorithm competes at least as
well on a synthetic dataset as state-of-the-art algorithms for estimating
sparse signals. Finally, performance analysis on a measured dataset
demonstrates that the proposed algorithm is robust at detecting/estimating
targets over a wide area and performs at least as well as popular algorithms
for SAR moving target detection.
|
no_new_dataset
| 0.71103
|
1207.4474
|
Igor Melatti
|
Vadim Alimguzhin, Federico Mari, Igor Melatti, Ivano Salvo, Enrico
Tronci
|
On Model Based Synthesis of Embedded Control Software
|
Accepted for publication by EMSOFT 2012. arXiv admin note:
substantial text overlap with arXiv:1107.5638,arXiv:1207.4098
| null | null | null |
cs.SE cs.SY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Many Embedded Systems are indeed Software Based Control Systems (SBCSs), that
is control systems whose controller consists of control software running on a
microcontroller device. This motivates investigation on Formal Model Based
Design approaches for control software. Given the formal model of a plant as a
Discrete Time Linear Hybrid System and the implementation specifications (that
is, number of bits in the Analog-to-Digital (AD) conversion)
correct-by-construction control software can be automatically generated from
System Level Formal Specifications of the closed loop system (that is, safety
and liveness requirements), by computing a suitable finite abstraction of the
plant.
With respect to given implementation specifications, the automatically
generated code implements a time optimal control strategy (in terms of set-up
time), has a Worst Case Execution Time linear in the number of AD bits $b$, but
unfortunately, its size grows exponentially with respect to $b$. In many
embedded systems, there are severe restrictions on the computational resources
(such as memory or computational power) available to microcontroller devices.
This paper addresses model based synthesis of control software by trading
system level non-functional requirements (such us optimal set-up time, ripple)
with software non-functional requirements (its footprint). Our experimental
results show the effectiveness of our approach: for the inverted pendulum
benchmark, by using a quantization schema with 12 bits, the size of the small
controller is less than 6% of the size of the time optimal one.
|
[
{
"version": "v1",
"created": "Tue, 17 Jul 2012 05:00:55 GMT"
},
{
"version": "v2",
"created": "Mon, 18 Feb 2013 15:36:59 GMT"
}
] | 2013-02-19T00:00:00
|
[
[
"Alimguzhin",
"Vadim",
""
],
[
"Mari",
"Federico",
""
],
[
"Melatti",
"Igor",
""
],
[
"Salvo",
"Ivano",
""
],
[
"Tronci",
"Enrico",
""
]
] |
TITLE: On Model Based Synthesis of Embedded Control Software
ABSTRACT: Many Embedded Systems are indeed Software Based Control Systems (SBCSs), that
is control systems whose controller consists of control software running on a
microcontroller device. This motivates investigation on Formal Model Based
Design approaches for control software. Given the formal model of a plant as a
Discrete Time Linear Hybrid System and the implementation specifications (that
is, number of bits in the Analog-to-Digital (AD) conversion)
correct-by-construction control software can be automatically generated from
System Level Formal Specifications of the closed loop system (that is, safety
and liveness requirements), by computing a suitable finite abstraction of the
plant.
With respect to given implementation specifications, the automatically
generated code implements a time optimal control strategy (in terms of set-up
time), has a Worst Case Execution Time linear in the number of AD bits $b$, but
unfortunately, its size grows exponentially with respect to $b$. In many
embedded systems, there are severe restrictions on the computational resources
(such as memory or computational power) available to microcontroller devices.
This paper addresses model based synthesis of control software by trading
system level non-functional requirements (such us optimal set-up time, ripple)
with software non-functional requirements (its footprint). Our experimental
results show the effectiveness of our approach: for the inverted pendulum
benchmark, by using a quantization schema with 12 bits, the size of the small
controller is less than 6% of the size of the time optimal one.
|
no_new_dataset
| 0.708811
|
1301.5809
|
Derek Greene
|
Derek Greene and P\'adraig Cunningham
|
Producing a Unified Graph Representation from Multiple Social Network
Views
|
13 pages. Clarify notation
| null | null | null |
cs.SI physics.soc-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In many social networks, several different link relations will exist between
the same set of users. Additionally, attribute or textual information will be
associated with those users, such as demographic details or user-generated
content. For many data analysis tasks, such as community finding and data
visualisation, the provision of multiple heterogeneous types of user data makes
the analysis process more complex. We propose an unsupervised method for
integrating multiple data views to produce a single unified graph
representation, based on the combination of the k-nearest neighbour sets for
users derived from each view. These views can be either relation-based or
feature-based. The proposed method is evaluated on a number of annotated
multi-view Twitter datasets, where it is shown to support the discovery of the
underlying community structure in the data.
|
[
{
"version": "v1",
"created": "Thu, 24 Jan 2013 15:07:12 GMT"
},
{
"version": "v2",
"created": "Mon, 28 Jan 2013 15:41:22 GMT"
},
{
"version": "v3",
"created": "Mon, 18 Feb 2013 13:56:21 GMT"
}
] | 2013-02-19T00:00:00
|
[
[
"Greene",
"Derek",
""
],
[
"Cunningham",
"Pádraig",
""
]
] |
TITLE: Producing a Unified Graph Representation from Multiple Social Network
Views
ABSTRACT: In many social networks, several different link relations will exist between
the same set of users. Additionally, attribute or textual information will be
associated with those users, such as demographic details or user-generated
content. For many data analysis tasks, such as community finding and data
visualisation, the provision of multiple heterogeneous types of user data makes
the analysis process more complex. We propose an unsupervised method for
integrating multiple data views to produce a single unified graph
representation, based on the combination of the k-nearest neighbour sets for
users derived from each view. These views can be either relation-based or
feature-based. The proposed method is evaluated on a number of annotated
multi-view Twitter datasets, where it is shown to support the discovery of the
underlying community structure in the data.
|
no_new_dataset
| 0.71086
|
1302.4280
|
Georg Hager
|
Markus Wittmann and Georg Hager and Thomas Zeiser and Gerhard Wellein
|
Asynchronous MPI for the Masses
|
12 pages, 5 figures
| null | null | null |
cs.DC cs.PF
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present a simple library which equips MPI implementations with truly
asynchronous non-blocking point-to-point operations, and which is independent
of the underlying communication infrastructure. It utilizes the MPI profiling
interface (PMPI) and the MPI_THREAD_MULTIPLE thread compatibility level, and
works with current versions of Intel MPI, Open MPI, MPICH2, MVAPICH2, Cray MPI,
and IBM MPI. We show performance comparisons on a commodity InfiniBand cluster
and two tier-1 systems in Germany, using low-level and application benchmarks.
Issues of thread/process placement and the peculiarities of different MPI
implementations are discussed in detail. We also identify the MPI libraries
that already support asynchronous operations. Finally we show how our ideas can
be extended to MPI-IO.
|
[
{
"version": "v1",
"created": "Mon, 18 Feb 2013 14:17:37 GMT"
}
] | 2013-02-19T00:00:00
|
[
[
"Wittmann",
"Markus",
""
],
[
"Hager",
"Georg",
""
],
[
"Zeiser",
"Thomas",
""
],
[
"Wellein",
"Gerhard",
""
]
] |
TITLE: Asynchronous MPI for the Masses
ABSTRACT: We present a simple library which equips MPI implementations with truly
asynchronous non-blocking point-to-point operations, and which is independent
of the underlying communication infrastructure. It utilizes the MPI profiling
interface (PMPI) and the MPI_THREAD_MULTIPLE thread compatibility level, and
works with current versions of Intel MPI, Open MPI, MPICH2, MVAPICH2, Cray MPI,
and IBM MPI. We show performance comparisons on a commodity InfiniBand cluster
and two tier-1 systems in Germany, using low-level and application benchmarks.
Issues of thread/process placement and the peculiarities of different MPI
implementations are discussed in detail. We also identify the MPI libraries
that already support asynchronous operations. Finally we show how our ideas can
be extended to MPI-IO.
|
no_new_dataset
| 0.705367
|
1204.6174
|
Kin Cheong Sou
|
Julien M. Hendrickx, Karl Henrik Johansson, Raphael M. Jungers, Henrik
Sandberg and Kin Cheong Sou
|
Efficient Computations of a Security Index for False Data Attacks in
Power Networks
| null | null | null | null |
math.OC cs.SY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The resilience of Supervisory Control and Data Acquisition (SCADA) systems
for electric power networks for certain cyber-attacks is considered. We analyze
the vulnerability of the measurement system to false data attack on
communicated measurements. The vulnerability analysis problem is shown to be
NP-hard, meaning that unless $P = NP$ there is no polynomial time algorithm to
analyze the vulnerability of the system. Nevertheless, we identify situations,
such as the full measurement case, where it can be solved efficiently. In such
cases, we show indeed that the problem can be cast as a generalization of the
minimum cut problem involving costly nodes. We further show that it can be
reformulated as a standard minimum cut problem (without costly nodes) on a
modified graph of proportional size. An important consequence of this result is
that our approach provides the first exact efficient algorithm for the
vulnerability analysis problem under the full measurement assumption.
Furthermore, our approach also provides an efficient heuristic algorithm for
the general NP-hard problem. Our results are illustrated by numerical studies
on benchmark systems including the IEEE 118-bus system.
|
[
{
"version": "v1",
"created": "Fri, 27 Apr 2012 11:50:03 GMT"
},
{
"version": "v2",
"created": "Fri, 15 Feb 2013 13:19:45 GMT"
}
] | 2013-02-18T00:00:00
|
[
[
"Hendrickx",
"Julien M.",
""
],
[
"Johansson",
"Karl Henrik",
""
],
[
"Jungers",
"Raphael M.",
""
],
[
"Sandberg",
"Henrik",
""
],
[
"Sou",
"Kin Cheong",
""
]
] |
TITLE: Efficient Computations of a Security Index for False Data Attacks in
Power Networks
ABSTRACT: The resilience of Supervisory Control and Data Acquisition (SCADA) systems
for electric power networks for certain cyber-attacks is considered. We analyze
the vulnerability of the measurement system to false data attack on
communicated measurements. The vulnerability analysis problem is shown to be
NP-hard, meaning that unless $P = NP$ there is no polynomial time algorithm to
analyze the vulnerability of the system. Nevertheless, we identify situations,
such as the full measurement case, where it can be solved efficiently. In such
cases, we show indeed that the problem can be cast as a generalization of the
minimum cut problem involving costly nodes. We further show that it can be
reformulated as a standard minimum cut problem (without costly nodes) on a
modified graph of proportional size. An important consequence of this result is
that our approach provides the first exact efficient algorithm for the
vulnerability analysis problem under the full measurement assumption.
Furthermore, our approach also provides an efficient heuristic algorithm for
the general NP-hard problem. Our results are illustrated by numerical studies
on benchmark systems including the IEEE 118-bus system.
|
no_new_dataset
| 0.70638
|
1302.3576
|
Yousri El Fattah
|
Yousri El Fattah, Rina Dechter
|
An Evaluation of Structural Parameters for Probabilistic Reasoning:
Results on Benchmark Circuits
|
Appears in Proceedings of the Twelfth Conference on Uncertainty in
Artificial Intelligence (UAI1996)
| null | null |
UAI-P-1996-PG-244-251
|
cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Many algorithms for processing probabilistic networks are dependent on the
topological properties of the problem's structure. Such algorithms (e.g.,
clustering, conditioning) are effective only if the problem has a sparse graph
captured by parameters such as tree width and cycle-cut set size. In this paper
we initiate a study to determine the potential of structure-based algorithms in
real-life applications. We analyze empirically the structural properties of
problems coming from the circuit diagnosis domain. Specifically, we locate
those properties that capture the effectiveness of clustering and conditioning
as well as of a family of conditioning+clustering algorithms designed to
gradually trade space for time. We perform our analysis on 11 benchmark
circuits widely used in the testing community. We also report on the effect of
ordering heuristics on tree-clustering and show that, on our benchmarks, the
well-known max-cardinality ordering is substantially inferior to an ordering
called min-degree.
|
[
{
"version": "v1",
"created": "Wed, 13 Feb 2013 14:13:55 GMT"
}
] | 2013-02-18T00:00:00
|
[
[
"Fattah",
"Yousri El",
""
],
[
"Dechter",
"Rina",
""
]
] |
TITLE: An Evaluation of Structural Parameters for Probabilistic Reasoning:
Results on Benchmark Circuits
ABSTRACT: Many algorithms for processing probabilistic networks are dependent on the
topological properties of the problem's structure. Such algorithms (e.g.,
clustering, conditioning) are effective only if the problem has a sparse graph
captured by parameters such as tree width and cycle-cut set size. In this paper
we initiate a study to determine the potential of structure-based algorithms in
real-life applications. We analyze empirically the structural properties of
problems coming from the circuit diagnosis domain. Specifically, we locate
those properties that capture the effectiveness of clustering and conditioning
as well as of a family of conditioning+clustering algorithms designed to
gradually trade space for time. We perform our analysis on 11 benchmark
circuits widely used in the testing community. We also report on the effect of
ordering heuristics on tree-clustering and show that, on our benchmarks, the
well-known max-cardinality ordering is substantially inferior to an ordering
called min-degree.
|
no_new_dataset
| 0.71022
|
1302.3219
|
Chunhua Shen
|
Chunhua Shen, Junae Kim, Fayao Liu, Lei Wang, Anton van den Hengel
|
An Efficient Dual Approach to Distance Metric Learning
| null | null | null | null |
cs.LG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Distance metric learning is of fundamental interest in machine learning
because the distance metric employed can significantly affect the performance
of many learning methods. Quadratic Mahalanobis metric learning is a popular
approach to the problem, but typically requires solving a semidefinite
programming (SDP) problem, which is computationally expensive. Standard
interior-point SDP solvers typically have a complexity of $O(D^{6.5})$ (with
$D$ the dimension of input data), and can thus only practically solve problems
exhibiting less than a few thousand variables. Since the number of variables is
$D (D+1) / 2 $, this implies a limit upon the size of problem that can
practically be solved of around a few hundred dimensions. The complexity of the
popular quadratic Mahalanobis metric learning approach thus limits the size of
problem to which metric learning can be applied. Here we propose a
significantly more efficient approach to the metric learning problem based on
the Lagrange dual formulation of the problem. The proposed formulation is much
simpler to implement, and therefore allows much larger Mahalanobis metric
learning problems to be solved. The time complexity of the proposed method is
$O (D ^ 3) $, which is significantly lower than that of the SDP approach.
Experiments on a variety of datasets demonstrate that the proposed method
achieves an accuracy comparable to the state-of-the-art, but is applicable to
significantly larger problems. We also show that the proposed method can be
applied to solve more general Frobenius-norm regularized SDP problems
approximately.
|
[
{
"version": "v1",
"created": "Wed, 13 Feb 2013 08:48:53 GMT"
}
] | 2013-02-15T00:00:00
|
[
[
"Shen",
"Chunhua",
""
],
[
"Kim",
"Junae",
""
],
[
"Liu",
"Fayao",
""
],
[
"Wang",
"Lei",
""
],
[
"Hengel",
"Anton van den",
""
]
] |
TITLE: An Efficient Dual Approach to Distance Metric Learning
ABSTRACT: Distance metric learning is of fundamental interest in machine learning
because the distance metric employed can significantly affect the performance
of many learning methods. Quadratic Mahalanobis metric learning is a popular
approach to the problem, but typically requires solving a semidefinite
programming (SDP) problem, which is computationally expensive. Standard
interior-point SDP solvers typically have a complexity of $O(D^{6.5})$ (with
$D$ the dimension of input data), and can thus only practically solve problems
exhibiting less than a few thousand variables. Since the number of variables is
$D (D+1) / 2 $, this implies a limit upon the size of problem that can
practically be solved of around a few hundred dimensions. The complexity of the
popular quadratic Mahalanobis metric learning approach thus limits the size of
problem to which metric learning can be applied. Here we propose a
significantly more efficient approach to the metric learning problem based on
the Lagrange dual formulation of the problem. The proposed formulation is much
simpler to implement, and therefore allows much larger Mahalanobis metric
learning problems to be solved. The time complexity of the proposed method is
$O (D ^ 3) $, which is significantly lower than that of the SDP approach.
Experiments on a variety of datasets demonstrate that the proposed method
achieves an accuracy comparable to the state-of-the-art, but is applicable to
significantly larger problems. We also show that the proposed method can be
applied to solve more general Frobenius-norm regularized SDP problems
approximately.
|
no_new_dataset
| 0.70866
|
1302.3123
|
Nizar Banu P K
|
P. K. Nizar Banu, H. Hannah Inbarani
|
An Analysis of Gene Expression Data using Penalized Fuzzy C-Means
Approach
|
14; IJCCI, Vol. 1, Issue 2,(January-July)2011
| null | null | null |
cs.CV cs.CE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
With the rapid advances of microarray technologies, large amounts of
high-dimensional gene expression data are being generated, which poses
significant computational challenges. A first step towards addressing this
challenge is the use of clustering techniques, which is essential in the data
mining process to reveal natural structures and identify interesting patterns
in the underlying data. A robust gene expression clustering approach to
minimize undesirable clustering is proposed. In this paper, Penalized Fuzzy
C-Means (PFCM) Clustering algorithm is described and compared with the most
representative off-line clustering techniques: K-Means Clustering, Rough
K-Means Clustering and Fuzzy C-Means clustering. These techniques are
implemented and tested for a Brain Tumor gene expression Dataset. Analysis of
the performance of the proposed approach is presented through qualitative
validation experiments. From experimental results, it can be observed that
Penalized Fuzzy C-Means algorithm shows a much higher usability than the other
projected clustering algorithms used in our comparison study. Significant and
promising clustering results are presented using Brain Tumor Gene expression
dataset. Thus patterns seen in genome-wide expression experiments can be
interpreted as indications of the status of cellular processes. In these
clustering results, we find that Penalized Fuzzy C-Means algorithm provides
useful information as an aid to diagnosis in oncology.
|
[
{
"version": "v1",
"created": "Tue, 8 Jan 2013 17:16:39 GMT"
}
] | 2013-02-14T00:00:00
|
[
[
"Banu",
"P. K. Nizar",
""
],
[
"Inbarani",
"H. Hannah",
""
]
] |
TITLE: An Analysis of Gene Expression Data using Penalized Fuzzy C-Means
Approach
ABSTRACT: With the rapid advances of microarray technologies, large amounts of
high-dimensional gene expression data are being generated, which poses
significant computational challenges. A first step towards addressing this
challenge is the use of clustering techniques, which is essential in the data
mining process to reveal natural structures and identify interesting patterns
in the underlying data. A robust gene expression clustering approach to
minimize undesirable clustering is proposed. In this paper, Penalized Fuzzy
C-Means (PFCM) Clustering algorithm is described and compared with the most
representative off-line clustering techniques: K-Means Clustering, Rough
K-Means Clustering and Fuzzy C-Means clustering. These techniques are
implemented and tested for a Brain Tumor gene expression Dataset. Analysis of
the performance of the proposed approach is presented through qualitative
validation experiments. From experimental results, it can be observed that
Penalized Fuzzy C-Means algorithm shows a much higher usability than the other
projected clustering algorithms used in our comparison study. Significant and
promising clustering results are presented using Brain Tumor Gene expression
dataset. Thus patterns seen in genome-wide expression experiments can be
interpreted as indications of the status of cellular processes. In these
clustering results, we find that Penalized Fuzzy C-Means algorithm provides
useful information as an aid to diagnosis in oncology.
|
no_new_dataset
| 0.71202
|
1302.2692
|
David Van Horn
|
Shuying Liang, Matthew Might, Thomas Gilray, David Van Horn
|
Pushdown Exception-Flow Analysis of Object-Oriented Programs
| null | null | null | null |
cs.PL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Statically reasoning in the presence of and about exceptions is challenging:
exceptions worsen the well-known mutual recursion between data-flow and
control-flow analysis. The recent development of pushdown control-flow analysis
for the {\lambda}-calculus hints at a way to improve analysis of exceptions: a
pushdown stack can precisely match catches to throws in the same way it matches
returns to calls. This work generalizes pushdown control-flow analysis to
object-oriented programs and to exceptions. Pushdown analysis of exceptions
improves precision over the next best analysis, Bravenboer and Smaragdakis's
Doop, by orders of magnitude. By then generalizing abstract garbage collection
to object-oriented programs, we reduce analysis time by half over pure pushdown
analysis. We evaluate our implementation for Dalvik bytecode on standard
benchmarks as well as several Android applications.
|
[
{
"version": "v1",
"created": "Tue, 12 Feb 2013 03:29:55 GMT"
}
] | 2013-02-13T00:00:00
|
[
[
"Liang",
"Shuying",
""
],
[
"Might",
"Matthew",
""
],
[
"Gilray",
"Thomas",
""
],
[
"Van Horn",
"David",
""
]
] |
TITLE: Pushdown Exception-Flow Analysis of Object-Oriented Programs
ABSTRACT: Statically reasoning in the presence of and about exceptions is challenging:
exceptions worsen the well-known mutual recursion between data-flow and
control-flow analysis. The recent development of pushdown control-flow analysis
for the {\lambda}-calculus hints at a way to improve analysis of exceptions: a
pushdown stack can precisely match catches to throws in the same way it matches
returns to calls. This work generalizes pushdown control-flow analysis to
object-oriented programs and to exceptions. Pushdown analysis of exceptions
improves precision over the next best analysis, Bravenboer and Smaragdakis's
Doop, by orders of magnitude. By then generalizing abstract garbage collection
to object-oriented programs, we reduce analysis time by half over pure pushdown
analysis. We evaluate our implementation for Dalvik bytecode on standard
benchmarks as well as several Android applications.
|
no_new_dataset
| 0.704935
|
1208.6157
|
Atieh Mirshahvalad
|
Atieh Mirshahvalad, Olivier H. Beauchesne, Eric Archambault, Martin
Rosvall
|
Resampling effects on significance analysis of network clustering and
ranking
|
12 pages, 7 figures
| null |
10.1371/journal.pone.0053943
| null |
physics.soc-ph cs.SI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Community detection helps us simplify the complex configuration of networks,
but communities are reliable only if they are statistically significant. To
detect statistically significant communities, a common approach is to resample
the original network and analyze the communities. But resampling assumes
independence between samples, while the components of a network are inherently
dependent. Therefore, we must understand how breaking dependencies between
resampled components affects the results of the significance analysis. Here we
use scientific communication as a model system to analyze this effect. Our
dataset includes citations among articles published in journals in the years
1984-2010. We compare parametric resampling of citations with non-parametric
article resampling. While citation resampling breaks link dependencies, article
resampling maintains such dependencies. We find that citation resampling
underestimates the variance of link weights. Moreover, this underestimation
explains most of the differences in the significance analysis of ranking and
clustering. Therefore, when only link weights are available and article
resampling is not an option, we suggest a simple parametric resampling scheme
that generates link-weight variances close to the link-weight variances of
article resampling. Nevertheless, when we highlight and summarize important
structural changes in science, the more dependencies we can maintain in the
resampling scheme, the earlier we can predict structural change.
|
[
{
"version": "v1",
"created": "Thu, 30 Aug 2012 12:58:10 GMT"
},
{
"version": "v2",
"created": "Mon, 11 Feb 2013 10:11:06 GMT"
}
] | 2013-02-12T00:00:00
|
[
[
"Mirshahvalad",
"Atieh",
""
],
[
"Beauchesne",
"Olivier H.",
""
],
[
"Archambault",
"Eric",
""
],
[
"Rosvall",
"Martin",
""
]
] |
TITLE: Resampling effects on significance analysis of network clustering and
ranking
ABSTRACT: Community detection helps us simplify the complex configuration of networks,
but communities are reliable only if they are statistically significant. To
detect statistically significant communities, a common approach is to resample
the original network and analyze the communities. But resampling assumes
independence between samples, while the components of a network are inherently
dependent. Therefore, we must understand how breaking dependencies between
resampled components affects the results of the significance analysis. Here we
use scientific communication as a model system to analyze this effect. Our
dataset includes citations among articles published in journals in the years
1984-2010. We compare parametric resampling of citations with non-parametric
article resampling. While citation resampling breaks link dependencies, article
resampling maintains such dependencies. We find that citation resampling
underestimates the variance of link weights. Moreover, this underestimation
explains most of the differences in the significance analysis of ranking and
clustering. Therefore, when only link weights are available and article
resampling is not an option, we suggest a simple parametric resampling scheme
that generates link-weight variances close to the link-weight variances of
article resampling. Nevertheless, when we highlight and summarize important
structural changes in science, the more dependencies we can maintain in the
resampling scheme, the earlier we can predict structural change.
|
no_new_dataset
| 0.709604
|
1302.2176
|
Hugh Brendan McMahan
|
H. Brendan McMahan
|
Minimax Optimal Algorithms for Unconstrained Linear Optimization
| null | null | null | null |
cs.LG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We design and analyze minimax-optimal algorithms for online linear
optimization games where the player's choice is unconstrained. The player
strives to minimize regret, the difference between his loss and the loss of a
post-hoc benchmark strategy. The standard benchmark is the loss of the best
strategy chosen from a bounded comparator set. When the the comparison set and
the adversary's gradients satisfy L_infinity bounds, we give the value of the
game in closed form and prove it approaches sqrt(2T/pi) as T -> infinity.
Interesting algorithms result when we consider soft constraints on the
comparator, rather than restricting it to a bounded set. As a warmup, we
analyze the game with a quadratic penalty. The value of this game is exactly
T/2, and this value is achieved by perhaps the simplest online algorithm of
all: unprojected gradient descent with a constant learning rate.
We then derive a minimax-optimal algorithm for a much softer penalty
function. This algorithm achieves good bounds under the standard notion of
regret for any comparator point, without needing to specify the comparator set
in advance. The value of this game converges to sqrt{e} as T ->infinity; we
give a closed-form for the exact value as a function of T. The resulting
algorithm is natural in unconstrained investment or betting scenarios, since it
guarantees at worst constant loss, while allowing for exponential reward
against an "easy" adversary.
|
[
{
"version": "v1",
"created": "Fri, 8 Feb 2013 23:16:04 GMT"
}
] | 2013-02-12T00:00:00
|
[
[
"McMahan",
"H. Brendan",
""
]
] |
TITLE: Minimax Optimal Algorithms for Unconstrained Linear Optimization
ABSTRACT: We design and analyze minimax-optimal algorithms for online linear
optimization games where the player's choice is unconstrained. The player
strives to minimize regret, the difference between his loss and the loss of a
post-hoc benchmark strategy. The standard benchmark is the loss of the best
strategy chosen from a bounded comparator set. When the the comparison set and
the adversary's gradients satisfy L_infinity bounds, we give the value of the
game in closed form and prove it approaches sqrt(2T/pi) as T -> infinity.
Interesting algorithms result when we consider soft constraints on the
comparator, rather than restricting it to a bounded set. As a warmup, we
analyze the game with a quadratic penalty. The value of this game is exactly
T/2, and this value is achieved by perhaps the simplest online algorithm of
all: unprojected gradient descent with a constant learning rate.
We then derive a minimax-optimal algorithm for a much softer penalty
function. This algorithm achieves good bounds under the standard notion of
regret for any comparator point, without needing to specify the comparator set
in advance. The value of this game converges to sqrt{e} as T ->infinity; we
give a closed-form for the exact value as a function of T. The resulting
algorithm is natural in unconstrained investment or betting scenarios, since it
guarantees at worst constant loss, while allowing for exponential reward
against an "easy" adversary.
|
no_new_dataset
| 0.706634
|
1302.2227
|
Sina Esfandiarpoor
|
Sina Esfandiarpoor, Ali Pahlavan, Maziar Goudarzi
|
Virtual Machine Consolidation for Datacenter Energy Improvement
|
This is draft version. The finally version will be published
| null | null | null |
cs.DC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Rapid growth and proliferation of cloud computing services around the world
has increased the necessity and significance of improving the energy efficiency
of could implementations. Virtual machines (VM) comprise the backend of most,
if not all, cloud computing services. Several VMs are often consolidated on a
physical machine to better utilize its resources. We take into account the
cooling and network structure of the datacenter hosting the physical machines
when consolidating the VMs so that fewer racks and routers are employed,
without compromising the service-level agreements, so that unused routing and
cooling equipment can be turned off to reduce energy consumption. Our
experimental results on four benchmarks shows that our technique improves
energy consumption of servers, network equipment, and cooling systems by 2.5%,
18.8%, and 28.2% respectively, resulting in a total of 14.7% improvement on
average in the entire datacenter.
|
[
{
"version": "v1",
"created": "Sat, 9 Feb 2013 12:23:21 GMT"
}
] | 2013-02-12T00:00:00
|
[
[
"Esfandiarpoor",
"Sina",
""
],
[
"Pahlavan",
"Ali",
""
],
[
"Goudarzi",
"Maziar",
""
]
] |
TITLE: Virtual Machine Consolidation for Datacenter Energy Improvement
ABSTRACT: Rapid growth and proliferation of cloud computing services around the world
has increased the necessity and significance of improving the energy efficiency
of could implementations. Virtual machines (VM) comprise the backend of most,
if not all, cloud computing services. Several VMs are often consolidated on a
physical machine to better utilize its resources. We take into account the
cooling and network structure of the datacenter hosting the physical machines
when consolidating the VMs so that fewer racks and routers are employed,
without compromising the service-level agreements, so that unused routing and
cooling equipment can be turned off to reduce energy consumption. Our
experimental results on four benchmarks shows that our technique improves
energy consumption of servers, network equipment, and cooling systems by 2.5%,
18.8%, and 28.2% respectively, resulting in a total of 14.7% improvement on
average in the entire datacenter.
|
no_new_dataset
| 0.711994
|
1302.2244
|
Jiping Xiong
|
Jiping Xiong, Jian Zhao and Lei Chen
|
Efficient Data Gathering in Wireless Sensor Networks Based on Matrix
Completion and Compressive Sensing
| null | null | null | null |
cs.NI cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Gathering data in an energy efficient manner in wireless sensor networks is
an important design challenge. In wireless sensor networks, the readings of
sensors always exhibit intra-temporal and inter-spatial correlations.
Therefore, in this letter, we use low rank matrix completion theory to explore
the inter-spatial correlation and use compressive sensing theory to take
advantage of intra-temporal correlation. Our method, dubbed MCCS, can
significantly reduce the amount of data that each sensor must send through
network and to the sink, thus prolong the lifetime of the whole networks.
Experiments using real datasets demonstrate the feasibility and efficacy of our
MCCS method.
|
[
{
"version": "v1",
"created": "Sat, 9 Feb 2013 16:34:00 GMT"
}
] | 2013-02-12T00:00:00
|
[
[
"Xiong",
"Jiping",
""
],
[
"Zhao",
"Jian",
""
],
[
"Chen",
"Lei",
""
]
] |
TITLE: Efficient Data Gathering in Wireless Sensor Networks Based on Matrix
Completion and Compressive Sensing
ABSTRACT: Gathering data in an energy efficient manner in wireless sensor networks is
an important design challenge. In wireless sensor networks, the readings of
sensors always exhibit intra-temporal and inter-spatial correlations.
Therefore, in this letter, we use low rank matrix completion theory to explore
the inter-spatial correlation and use compressive sensing theory to take
advantage of intra-temporal correlation. Our method, dubbed MCCS, can
significantly reduce the amount of data that each sensor must send through
network and to the sink, thus prolong the lifetime of the whole networks.
Experiments using real datasets demonstrate the feasibility and efficacy of our
MCCS method.
|
no_new_dataset
| 0.71345
|
1302.2436
|
Mahmood Ali Mohd
|
Mohd Mahmood Ali, Mohd S Qaseem, Lakshmi Rajamani, A Govardhan
|
Extracting useful rules through improved decision tree induction using
information entropy
|
15 pages, 7 figures, 4 tables, International Journal of Information
Sciences and Techniques (IJIST) Vol.3, No.1, January 2013
| null |
10.5121/ijist.2013.3103
| null |
cs.LG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Classification is widely used technique in the data mining domain, where
scalability and efficiency are the immediate problems in classification
algorithms for large databases. We suggest improvements to the existing C4.5
decision tree algorithm. In this paper attribute oriented induction (AOI) and
relevance analysis are incorporated with concept hierarchys knowledge and
HeightBalancePriority algorithm for construction of decision tree along with
Multi level mining. The assignment of priorities to attributes is done by
evaluating information entropy, at different levels of abstraction for building
decision tree using HeightBalancePriority algorithm. Modified DMQL queries are
used to understand and explore the shortcomings of the decision trees generated
by C4.5 classifier for education dataset and the results are compared with the
proposed approach.
|
[
{
"version": "v1",
"created": "Mon, 11 Feb 2013 10:29:17 GMT"
}
] | 2013-02-12T00:00:00
|
[
[
"Ali",
"Mohd Mahmood",
""
],
[
"Qaseem",
"Mohd S",
""
],
[
"Rajamani",
"Lakshmi",
""
],
[
"Govardhan",
"A",
""
]
] |
TITLE: Extracting useful rules through improved decision tree induction using
information entropy
ABSTRACT: Classification is widely used technique in the data mining domain, where
scalability and efficiency are the immediate problems in classification
algorithms for large databases. We suggest improvements to the existing C4.5
decision tree algorithm. In this paper attribute oriented induction (AOI) and
relevance analysis are incorporated with concept hierarchys knowledge and
HeightBalancePriority algorithm for construction of decision tree along with
Multi level mining. The assignment of priorities to attributes is done by
evaluating information entropy, at different levels of abstraction for building
decision tree using HeightBalancePriority algorithm. Modified DMQL queries are
used to understand and explore the shortcomings of the decision trees generated
by C4.5 classifier for education dataset and the results are compared with the
proposed approach.
|
no_new_dataset
| 0.711418
|
1302.2576
|
Oluwasanmi Koyejo
|
Oluwasanmi Koyejo and Cheng Lee and Joydeep Ghosh
|
The trace norm constrained matrix-variate Gaussian process for multitask
bipartite ranking
|
14 pages, 9 figures, 5 tables
| null | null | null |
cs.LG stat.ML
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We propose a novel hierarchical model for multitask bipartite ranking. The
proposed approach combines a matrix-variate Gaussian process with a generative
model for task-wise bipartite ranking. In addition, we employ a novel trace
constrained variational inference approach to impose low rank structure on the
posterior matrix-variate Gaussian process. The resulting posterior covariance
function is derived in closed form, and the posterior mean function is the
solution to a matrix-variate regression with a novel spectral elastic net
regularizer. Further, we show that variational inference for the trace
constrained matrix-variate Gaussian process combined with maximum likelihood
parameter estimation for the bipartite ranking model is jointly convex. Our
motivating application is the prioritization of candidate disease genes. The
goal of this task is to aid the identification of unobserved associations
between human genes and diseases using a small set of observed associations as
well as kernels induced by gene-gene interaction networks and disease
ontologies. Our experimental results illustrate the performance of the proposed
model on real world datasets. Moreover, we find that the resulting low rank
solution improves the computational scalability of training and testing as
compared to baseline models.
|
[
{
"version": "v1",
"created": "Mon, 11 Feb 2013 19:16:25 GMT"
}
] | 2013-02-12T00:00:00
|
[
[
"Koyejo",
"Oluwasanmi",
""
],
[
"Lee",
"Cheng",
""
],
[
"Ghosh",
"Joydeep",
""
]
] |
TITLE: The trace norm constrained matrix-variate Gaussian process for multitask
bipartite ranking
ABSTRACT: We propose a novel hierarchical model for multitask bipartite ranking. The
proposed approach combines a matrix-variate Gaussian process with a generative
model for task-wise bipartite ranking. In addition, we employ a novel trace
constrained variational inference approach to impose low rank structure on the
posterior matrix-variate Gaussian process. The resulting posterior covariance
function is derived in closed form, and the posterior mean function is the
solution to a matrix-variate regression with a novel spectral elastic net
regularizer. Further, we show that variational inference for the trace
constrained matrix-variate Gaussian process combined with maximum likelihood
parameter estimation for the bipartite ranking model is jointly convex. Our
motivating application is the prioritization of candidate disease genes. The
goal of this task is to aid the identification of unobserved associations
between human genes and diseases using a small set of observed associations as
well as kernels induced by gene-gene interaction networks and disease
ontologies. Our experimental results illustrate the performance of the proposed
model on real world datasets. Moreover, we find that the resulting low rank
solution improves the computational scalability of training and testing as
compared to baseline models.
|
no_new_dataset
| 0.711437
|
1302.1954
|
Zheng Li
|
Zheng Li and Liam O'Brien and He Zhang and Rainbow Cai
|
On a Catalogue of Metrics for Evaluating Commercial Cloud Services
|
10 pages, Proceedings of the 13th ACM/IEEE International Conference
on Grid Computing (Grid 2012), pp. 164-173, Beijing, China, September 20-23,
2012
| null |
10.1109/Grid.2012.15
| null |
cs.DC cs.PF
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Given the continually increasing amount of commercial Cloud services in the
market, evaluation of different services plays a significant role in
cost-benefit analysis or decision making for choosing Cloud Computing. In
particular, employing suitable metrics is essential in evaluation
implementations. However, to the best of our knowledge, there is not any
systematic discussion about metrics for evaluating Cloud services. By using the
method of Systematic Literature Review (SLR), we have collected the de facto
metrics adopted in the existing Cloud services evaluation work. The collected
metrics were arranged following different Cloud service features to be
evaluated, which essentially constructed an evaluation metrics catalogue, as
shown in this paper. This metrics catalogue can be used to facilitate the
future practice and research in the area of Cloud services evaluation.
Moreover, considering metrics selection is a prerequisite of benchmark
selection in evaluation implementations, this work also supplements the
existing research in benchmarking the commercial Cloud services.
|
[
{
"version": "v1",
"created": "Fri, 8 Feb 2013 07:10:19 GMT"
}
] | 2013-02-11T00:00:00
|
[
[
"Li",
"Zheng",
""
],
[
"O'Brien",
"Liam",
""
],
[
"Zhang",
"He",
""
],
[
"Cai",
"Rainbow",
""
]
] |
TITLE: On a Catalogue of Metrics for Evaluating Commercial Cloud Services
ABSTRACT: Given the continually increasing amount of commercial Cloud services in the
market, evaluation of different services plays a significant role in
cost-benefit analysis or decision making for choosing Cloud Computing. In
particular, employing suitable metrics is essential in evaluation
implementations. However, to the best of our knowledge, there is not any
systematic discussion about metrics for evaluating Cloud services. By using the
method of Systematic Literature Review (SLR), we have collected the de facto
metrics adopted in the existing Cloud services evaluation work. The collected
metrics were arranged following different Cloud service features to be
evaluated, which essentially constructed an evaluation metrics catalogue, as
shown in this paper. This metrics catalogue can be used to facilitate the
future practice and research in the area of Cloud services evaluation.
Moreover, considering metrics selection is a prerequisite of benchmark
selection in evaluation implementations, this work also supplements the
existing research in benchmarking the commercial Cloud services.
|
no_new_dataset
| 0.701751
|
1302.0439
|
Paul Shearer
|
Paul Shearer, Anna C. Gilbert, Alfred O. Hero III
|
Correcting Camera Shake by Incremental Sparse Approximation
|
5 pages, 3 figures. Conference submission
| null | null | null |
cs.CV cs.GR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The problem of deblurring an image when the blur kernel is unknown remains
challenging after decades of work. Recently there has been rapid progress on
correcting irregular blur patterns caused by camera shake, but there is still
much room for improvement. We propose a new blind deconvolution method using
incremental sparse edge approximation to recover images blurred by camera
shake. We estimate the blur kernel first from only the strongest edges in the
image, then gradually refine this estimate by allowing for weaker and weaker
edges. Our method competes with the benchmark deblurring performance of the
state-of-the-art while being significantly faster and easier to generalize.
|
[
{
"version": "v1",
"created": "Sun, 3 Feb 2013 00:46:11 GMT"
},
{
"version": "v2",
"created": "Thu, 7 Feb 2013 14:34:17 GMT"
}
] | 2013-02-08T00:00:00
|
[
[
"Shearer",
"Paul",
""
],
[
"Gilbert",
"Anna C.",
""
],
[
"Hero",
"Alfred O.",
"III"
]
] |
TITLE: Correcting Camera Shake by Incremental Sparse Approximation
ABSTRACT: The problem of deblurring an image when the blur kernel is unknown remains
challenging after decades of work. Recently there has been rapid progress on
correcting irregular blur patterns caused by camera shake, but there is still
much room for improvement. We propose a new blind deconvolution method using
incremental sparse edge approximation to recover images blurred by camera
shake. We estimate the blur kernel first from only the strongest edges in the
image, then gradually refine this estimate by allowing for weaker and weaker
edges. Our method competes with the benchmark deblurring performance of the
state-of-the-art while being significantly faster and easier to generalize.
|
no_new_dataset
| 0.709233
|
1302.1529
|
TongSheng Chu
|
TongSheng Chu, Yang Xiang
|
Exploring Parallelism in Learning Belief Networks
|
Appears in Proceedings of the Thirteenth Conference on Uncertainty in
Artificial Intelligence (UAI1997)
| null | null |
UAI-P-1997-PG-90-98
|
cs.AI cs.LG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
It has been shown that a class of probabilistic domain models cannot be
learned correctly by several existing algorithms which employ a single-link
look ahead search. When a multi-link look ahead search is used, the
computational complexity of the learning algorithm increases. We study how to
use parallelism to tackle the increased complexity in learning such models and
to speed up learning in large domains. An algorithm is proposed to decompose
the learning task for parallel processing. A further task decomposition is used
to balance load among processors and to increase the speed-up and efficiency.
For learning from very large datasets, we present a regrouping of the available
processors such that slow data access through file can be replaced by fast
memory access. Our implementation in a parallel computer demonstrates the
effectiveness of the algorithm.
|
[
{
"version": "v1",
"created": "Wed, 6 Feb 2013 15:54:31 GMT"
}
] | 2013-02-08T00:00:00
|
[
[
"Chu",
"TongSheng",
""
],
[
"Xiang",
"Yang",
""
]
] |
TITLE: Exploring Parallelism in Learning Belief Networks
ABSTRACT: It has been shown that a class of probabilistic domain models cannot be
learned correctly by several existing algorithms which employ a single-link
look ahead search. When a multi-link look ahead search is used, the
computational complexity of the learning algorithm increases. We study how to
use parallelism to tackle the increased complexity in learning such models and
to speed up learning in large domains. An algorithm is proposed to decompose
the learning task for parallel processing. A further task decomposition is used
to balance load among processors and to increase the speed-up and efficiency.
For learning from very large datasets, we present a regrouping of the available
processors such that slow data access through file can be replaced by fast
memory access. Our implementation in a parallel computer demonstrates the
effectiveness of the algorithm.
|
no_new_dataset
| 0.707007
|
1302.1591
|
Charng-Da Lu
|
Charng-Da Lu
|
Automatically Mining Program Build Information via Signature Matching
| null | null | null | null |
cs.SE
|
http://creativecommons.org/licenses/by/3.0/
|
Program build information, such as compilers and libraries used, is vitally
important in an auditing and benchmarking framework for HPC systems. We have
developed a tool to automatically extract this information using
signature-based detection, a common strategy employed by anti-virus software to
search for known patterns of data within the program binaries. We formulate the
patterns from various "features" embedded in the program binaries, and the
experiment shows that our tool can successfully identify many different
compilers, libraries, and their versions.
|
[
{
"version": "v1",
"created": "Wed, 6 Feb 2013 21:45:34 GMT"
}
] | 2013-02-08T00:00:00
|
[
[
"Lu",
"Charng-Da",
""
]
] |
TITLE: Automatically Mining Program Build Information via Signature Matching
ABSTRACT: Program build information, such as compilers and libraries used, is vitally
important in an auditing and benchmarking framework for HPC systems. We have
developed a tool to automatically extract this information using
signature-based detection, a common strategy employed by anti-virus software to
search for known patterns of data within the program binaries. We formulate the
patterns from various "features" embedded in the program binaries, and the
experiment shows that our tool can successfully identify many different
compilers, libraries, and their versions.
|
no_new_dataset
| 0.706437
|
1109.4920
|
Reza Farrahi Moghaddam
|
Reza Farrahi Moghaddam and Mohamed Cheriet
|
Beyond pixels and regions: A non local patch means (NLPM) method for
content-level restoration, enhancement, and reconstruction of degraded
document images
|
This paper has been withdrawn by the author to avoid duplication on
the DBLP bibliography
|
Pattern Recognition 44 (2011) 363-374
|
10.1016/j.patcog.2010.07.027
| null |
cs.CV cs.IR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A patch-based non-local restoration and reconstruction method for
preprocessing degraded document images is introduced. The method collects
relative data from the whole input image, while the image data are first
represented by a content-level descriptor based on patches. This
patch-equivalent representation of the input image is then corrected based on
similar patches identified using a modified genetic algorithm (GA) resulting in
a low computational load. The corrected patch-equivalent is then converted to
the output restored image. The fact that the method uses the patches at the
content level allows it to incorporate high-level restoration in an objective
and self-sufficient way. The method has been applied to several degraded
document images, including the DIBCO'09 contest dataset with promising results.
|
[
{
"version": "v1",
"created": "Thu, 22 Sep 2011 19:24:58 GMT"
},
{
"version": "v2",
"created": "Fri, 7 Oct 2011 16:46:52 GMT"
},
{
"version": "v3",
"created": "Tue, 8 Nov 2011 22:33:13 GMT"
}
] | 2013-02-07T00:00:00
|
[
[
"Moghaddam",
"Reza Farrahi",
""
],
[
"Cheriet",
"Mohamed",
""
]
] |
TITLE: Beyond pixels and regions: A non local patch means (NLPM) method for
content-level restoration, enhancement, and reconstruction of degraded
document images
ABSTRACT: A patch-based non-local restoration and reconstruction method for
preprocessing degraded document images is introduced. The method collects
relative data from the whole input image, while the image data are first
represented by a content-level descriptor based on patches. This
patch-equivalent representation of the input image is then corrected based on
similar patches identified using a modified genetic algorithm (GA) resulting in
a low computational load. The corrected patch-equivalent is then converted to
the output restored image. The fact that the method uses the patches at the
content level allows it to incorporate high-level restoration in an objective
and self-sufficient way. The method has been applied to several degraded
document images, including the DIBCO'09 contest dataset with promising results.
|
no_new_dataset
| 0.710478
|
1302.1007
|
Firas Ajil Jassim
|
Firas Ajil Jassim
|
Image Denoising Using Interquartile Range Filter with Local Averaging
|
5 pages, 8 figures, 2 tables
|
International Journal of Soft Computing and Engineering (IJSCE)
ISSN: 2231-2307, Volume-2, Issue-6, January 2013
| null | null |
cs.CV
|
http://creativecommons.org/licenses/by/3.0/
|
Image denoising is one of the fundamental problems in image processing. In
this paper, a novel approach to suppress noise from the image is conducted by
applying the interquartile range (IQR) which is one of the statistical methods
used to detect outlier effect from a dataset. A window of size kXk was
implemented to support IQR filter. Each pixel outside the IQR range of the kXk
window is treated as noisy pixel. The estimation of the noisy pixels was
obtained by local averaging. The essential advantage of applying IQR filter is
to preserve edge sharpness better of the original image. A variety of test
images have been used to support the proposed filter and PSNR was calculated
and compared with median filter. The experimental results on standard test
images demonstrate this filter is simpler and better performing than median
filter.
|
[
{
"version": "v1",
"created": "Tue, 5 Feb 2013 12:02:53 GMT"
}
] | 2013-02-06T00:00:00
|
[
[
"Jassim",
"Firas Ajil",
""
]
] |
TITLE: Image Denoising Using Interquartile Range Filter with Local Averaging
ABSTRACT: Image denoising is one of the fundamental problems in image processing. In
this paper, a novel approach to suppress noise from the image is conducted by
applying the interquartile range (IQR) which is one of the statistical methods
used to detect outlier effect from a dataset. A window of size kXk was
implemented to support IQR filter. Each pixel outside the IQR range of the kXk
window is treated as noisy pixel. The estimation of the noisy pixels was
obtained by local averaging. The essential advantage of applying IQR filter is
to preserve edge sharpness better of the original image. A variety of test
images have been used to support the proposed filter and PSNR was calculated
and compared with median filter. The experimental results on standard test
images demonstrate this filter is simpler and better performing than median
filter.
|
no_new_dataset
| 0.709416
|
1302.1078
|
Erik Saule
|
Erik Saule, Kamer Kaya, Umit V. Catalyurek
|
Performance Evaluation of Sparse Matrix Multiplication Kernels on Intel
Xeon Phi
| null | null | null | null |
cs.PF cs.AR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Intel Xeon Phi is a recently released high-performance coprocessor which
features 61 cores each supporting 4 hardware threads with 512-bit wide SIMD
registers achieving a peak theoretical performance of 1Tflop/s in double
precision. Many scientific applications involve operations on large sparse
matrices such as linear solvers, eigensolver, and graph mining algorithms. The
core of most of these applications involves the multiplication of a large,
sparse matrix with a dense vector (SpMV). In this paper, we investigate the
performance of the Xeon Phi coprocessor for SpMV. We first provide a
comprehensive introduction to this new architecture and analyze its peak
performance with a number of micro benchmarks. Although the design of a Xeon
Phi core is not much different than those of the cores in modern processors,
its large number of cores and hyperthreading capability allow many application
to saturate the available memory bandwidth, which is not the case for many
cutting-edge processors. Yet, our performance studies show that it is the
memory latency not the bandwidth which creates a bottleneck for SpMV on this
architecture. Finally, our experiments show that Xeon Phi's sparse kernel
performance is very promising and even better than that of cutting-edge general
purpose processors and GPUs.
|
[
{
"version": "v1",
"created": "Tue, 5 Feb 2013 16:06:15 GMT"
}
] | 2013-02-06T00:00:00
|
[
[
"Saule",
"Erik",
""
],
[
"Kaya",
"Kamer",
""
],
[
"Catalyurek",
"Umit V.",
""
]
] |
TITLE: Performance Evaluation of Sparse Matrix Multiplication Kernels on Intel
Xeon Phi
ABSTRACT: Intel Xeon Phi is a recently released high-performance coprocessor which
features 61 cores each supporting 4 hardware threads with 512-bit wide SIMD
registers achieving a peak theoretical performance of 1Tflop/s in double
precision. Many scientific applications involve operations on large sparse
matrices such as linear solvers, eigensolver, and graph mining algorithms. The
core of most of these applications involves the multiplication of a large,
sparse matrix with a dense vector (SpMV). In this paper, we investigate the
performance of the Xeon Phi coprocessor for SpMV. We first provide a
comprehensive introduction to this new architecture and analyze its peak
performance with a number of micro benchmarks. Although the design of a Xeon
Phi core is not much different than those of the cores in modern processors,
its large number of cores and hyperthreading capability allow many application
to saturate the available memory bandwidth, which is not the case for many
cutting-edge processors. Yet, our performance studies show that it is the
memory latency not the bandwidth which creates a bottleneck for SpMV on this
architecture. Finally, our experiments show that Xeon Phi's sparse kernel
performance is very promising and even better than that of cutting-edge general
purpose processors and GPUs.
|
no_new_dataset
| 0.708213
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.