id
large_stringlengths
9
16
submitter
large_stringlengths
3
64
authors
large_stringlengths
5
20.2k
title
large_stringlengths
5
245
comments
large_stringlengths
1
482
journal-ref
large_stringlengths
4
382
doi
large_stringlengths
9
151
report-no
large_stringlengths
2
509
categories
large_stringlengths
5
78
license
large_stringclasses
9 values
abstract
large_stringlengths
83
3.55k
versions
large listlengths
1
21
update_date
timestamp[ms]date
2007-05-23 00:00:00
2025-05-30 00:00:00
authors_parsed
large listlengths
1
1.35k
prompt
large_stringlengths
166
3.64k
label
stringclasses
2 values
prob
float64
0.5
0.73
1301.7192
Michael Schreiber
Michael Schreiber
Empirical Evidence for the Relevance of Fractional Scoring in the Calculation of Percentile Rank Scores
10 pages, 4 tables, accepted for publication in Journal of American Society for Information Science and Technology
Journal of the American Society for Information Science and Technology, 64(4), 861-867 (2013)
10.1002/asi.22774
null
cs.DL physics.soc-ph stat.AP
http://creativecommons.org/licenses/by-nc-sa/3.0/
Fractional scoring has been proposed to avoid inconsistencies in the attribution of publications to percentile rank classes. Uncertainties and ambiguities in the evaluation of percentile ranks can be demonstrated most easily with small datasets. But for larger datasets an often large number of papers with the same citation count leads to the same uncertainties and ambiguities which can be avoided by fractional scoring. This is demonstrated for four different empirical datasets with several thousand publications each which are assigned to 6 percentile rank classes. Only by utilizing fractional scoring the total score of all papers exactly reproduces the theoretical value in each case.
[ { "version": "v1", "created": "Wed, 30 Jan 2013 10:49:39 GMT" } ]
2013-03-25T00:00:00
[ [ "Schreiber", "Michael", "" ] ]
TITLE: Empirical Evidence for the Relevance of Fractional Scoring in the Calculation of Percentile Rank Scores ABSTRACT: Fractional scoring has been proposed to avoid inconsistencies in the attribution of publications to percentile rank classes. Uncertainties and ambiguities in the evaluation of percentile ranks can be demonstrated most easily with small datasets. But for larger datasets an often large number of papers with the same citation count leads to the same uncertainties and ambiguities which can be avoided by fractional scoring. This is demonstrated for four different empirical datasets with several thousand publications each which are assigned to 6 percentile rank classes. Only by utilizing fractional scoring the total score of all papers exactly reproduces the theoretical value in each case.
no_new_dataset
0.711387
1303.5526
Oliver Obst
Oliver Obst, Joschka Boedecker, Benedikt Schmidt, Minoru Asada
On active information storage in input-driven systems
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Information theory and the framework of information dynamics have been used to provide tools to characterise complex systems. In particular, we are interested in quantifying information storage, information modification and information transfer as characteristic elements of computation. Although these quantities are defined for autonomous dynamical systems, information dynamics can also help to get a "wholistic" understanding of input-driven systems such as neural networks. In this case, we do not distinguish between the system itself, and the effects the input has to the system. This may be desired in some cases, but it will change the questions we are able to answer, and is consequently an important consideration, for example, for biological systems which perform non-trivial computations and also retain a short-term memory of past inputs. Many other real world systems like cortical networks are also heavily input-driven, and application of tools designed for autonomous dynamic systems may not necessarily lead to intuitively interpretable results. The aim of our work is to extend the measurements used in the information dynamics framework for input-driven systems. Using the proposed input-corrected information storage we hope to better quantify system behaviour, which will be important for heavily input-driven systems like artificial neural networks to abstract from specific benchmarks, or for brain networks, where intervention is difficult, individual components cannot be tested in isolation or with arbitrary input data.
[ { "version": "v1", "created": "Fri, 22 Mar 2013 06:40:30 GMT" } ]
2013-03-25T00:00:00
[ [ "Obst", "Oliver", "" ], [ "Boedecker", "Joschka", "" ], [ "Schmidt", "Benedikt", "" ], [ "Asada", "Minoru", "" ] ]
TITLE: On active information storage in input-driven systems ABSTRACT: Information theory and the framework of information dynamics have been used to provide tools to characterise complex systems. In particular, we are interested in quantifying information storage, information modification and information transfer as characteristic elements of computation. Although these quantities are defined for autonomous dynamical systems, information dynamics can also help to get a "wholistic" understanding of input-driven systems such as neural networks. In this case, we do not distinguish between the system itself, and the effects the input has to the system. This may be desired in some cases, but it will change the questions we are able to answer, and is consequently an important consideration, for example, for biological systems which perform non-trivial computations and also retain a short-term memory of past inputs. Many other real world systems like cortical networks are also heavily input-driven, and application of tools designed for autonomous dynamic systems may not necessarily lead to intuitively interpretable results. The aim of our work is to extend the measurements used in the information dynamics framework for input-driven systems. Using the proposed input-corrected information storage we hope to better quantify system behaviour, which will be important for heavily input-driven systems like artificial neural networks to abstract from specific benchmarks, or for brain networks, where intervention is difficult, individual components cannot be tested in isolation or with arbitrary input data.
no_new_dataset
0.708616
1303.5675
Dongxiao He
Di Jin, Bo Yang, Carlos Baquero, Dayou Liu, Dongxiao He and Jie Liu
Markov random walk under constraint for discovering overlapping communities in complex networks
21 pages, 8 pages, 2 tables
Journal of Statistical Mechanics: Theory and Experiment, P05031, 2011
10.1088/1742-5468/2011/05/P05031
null
cs.SI cond-mat.stat-mech physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Detection of overlapping communities in complex networks has motivated recent research in the relevant fields. Aiming this problem, we propose a Markov dynamics based algorithm, called UEOC, which means, 'unfold and extract overlapping communities'. In UEOC, when identifying each natural community that overlaps, a Markov random walk method combined with a constraint strategy, which is based on the corresponding annealed network (degree conserving random network), is performed to unfold the community. Then, a cutoff criterion with the aid of a local community function, called conductance, which can be thought of as the ratio between the number of edges inside the community and those leaving it, is presented to extract this emerged community from the entire network. The UEOC algorithm depends on only one parameter whose value can be easily set, and it requires no prior knowledge on the hidden community structures. The proposed UEOC has been evaluated both on synthetic benchmarks and on some real-world networks, and was compared with a set of competing algorithms. Experimental result has shown that UEOC is highly effective and efficient for discovering overlapping communities.
[ { "version": "v1", "created": "Fri, 22 Mar 2013 18:06:33 GMT" } ]
2013-03-25T00:00:00
[ [ "Jin", "Di", "" ], [ "Yang", "Bo", "" ], [ "Baquero", "Carlos", "" ], [ "Liu", "Dayou", "" ], [ "He", "Dongxiao", "" ], [ "Liu", "Jie", "" ] ]
TITLE: Markov random walk under constraint for discovering overlapping communities in complex networks ABSTRACT: Detection of overlapping communities in complex networks has motivated recent research in the relevant fields. Aiming this problem, we propose a Markov dynamics based algorithm, called UEOC, which means, 'unfold and extract overlapping communities'. In UEOC, when identifying each natural community that overlaps, a Markov random walk method combined with a constraint strategy, which is based on the corresponding annealed network (degree conserving random network), is performed to unfold the community. Then, a cutoff criterion with the aid of a local community function, called conductance, which can be thought of as the ratio between the number of edges inside the community and those leaving it, is presented to extract this emerged community from the entire network. The UEOC algorithm depends on only one parameter whose value can be easily set, and it requires no prior knowledge on the hidden community structures. The proposed UEOC has been evaluated both on synthetic benchmarks and on some real-world networks, and was compared with a set of competing algorithms. Experimental result has shown that UEOC is highly effective and efficient for discovering overlapping communities.
no_new_dataset
0.709655
1303.5698
Mehdi Bennis
Mehdi Bennis, Meryem Simsek, Walid Saad, Stefan Valentin, Merouane Debbah, Andreas Czylwik
When Cellular Meets WiFi in Wireless Small Cell Networks
null
null
null
null
cs.NI cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The deployment of small cell base stations(SCBSs) overlaid on existing macro-cellular systems is seen as a key solution for offloading traffic, optimizing coverage, and boosting the capacity of future cellular wireless systems. The next-generation of SCBSs is envisioned to be multi-mode, i.e., capable of transmitting simultaneously on both licensed and unlicensed bands. This constitutes a cost-effective integration of both WiFi and cellular radio access technologies (RATs) that can efficiently cope with peak wireless data traffic and heterogeneous quality-of-service requirements. To leverage the advantage of such multi-mode SCBSs, we discuss the novel proposed paradigm of cross-system learning by means of which SCBSs self-organize and autonomously steer their traffic flows across different RATs. Cross-system learning allows the SCBSs to leverage the advantage of both the WiFi and cellular worlds. For example, the SCBSs can offload delay-tolerant data traffic to WiFi, while simultaneously learning the probability distribution function of their transmission strategy over the licensed cellular band. This article will first introduce the basic building blocks of cross-system learning and then provide preliminary performance evaluation in a Long-Term Evolution (LTE) simulator overlaid with WiFi hotspots. Remarkably, it is shown that the proposed cross-system learning approach significantly outperforms a number of benchmark traffic steering policies.
[ { "version": "v1", "created": "Fri, 22 Mar 2013 19:48:54 GMT" } ]
2013-03-25T00:00:00
[ [ "Bennis", "Mehdi", "" ], [ "Simsek", "Meryem", "" ], [ "Saad", "Walid", "" ], [ "Valentin", "Stefan", "" ], [ "Debbah", "Merouane", "" ], [ "Czylwik", "Andreas", "" ] ]
TITLE: When Cellular Meets WiFi in Wireless Small Cell Networks ABSTRACT: The deployment of small cell base stations(SCBSs) overlaid on existing macro-cellular systems is seen as a key solution for offloading traffic, optimizing coverage, and boosting the capacity of future cellular wireless systems. The next-generation of SCBSs is envisioned to be multi-mode, i.e., capable of transmitting simultaneously on both licensed and unlicensed bands. This constitutes a cost-effective integration of both WiFi and cellular radio access technologies (RATs) that can efficiently cope with peak wireless data traffic and heterogeneous quality-of-service requirements. To leverage the advantage of such multi-mode SCBSs, we discuss the novel proposed paradigm of cross-system learning by means of which SCBSs self-organize and autonomously steer their traffic flows across different RATs. Cross-system learning allows the SCBSs to leverage the advantage of both the WiFi and cellular worlds. For example, the SCBSs can offload delay-tolerant data traffic to WiFi, while simultaneously learning the probability distribution function of their transmission strategy over the licensed cellular band. This article will first introduce the basic building blocks of cross-system learning and then provide preliminary performance evaluation in a Long-Term Evolution (LTE) simulator overlaid with WiFi hotspots. Remarkably, it is shown that the proposed cross-system learning approach significantly outperforms a number of benchmark traffic steering policies.
no_new_dataset
0.710434
1209.4560
Patrick Prosser
Ciaran McCreesh and Patrick Prosser
Distributing an Exact Algorithm for Maximum Clique: maximising the costup
13 pages, 2 Algorithms, 2 figures, 2 tables
Algorithms 2012, 5(4), 545-587
10.3390/a5040545
TR-2012-334
cs.DS cs.DC cs.DM cs.PF
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We take an existing implementation of an algorithm for the maximum clique problem and modify it so that we can distribute it over an ad-hoc cluster of machines. Our goal was to achieve a significant speedup in performance with minimal development effort, i.e. a maximum costup. We present a simple modification to a state-of-the-art exact algorithm for maximum clique that allows us to distribute it across many machines. An empirical study over large hard benchmarks shows that speedups of an order of magnitude are routine for 25 or more machines.
[ { "version": "v1", "created": "Thu, 20 Sep 2012 15:18:54 GMT" } ]
2013-03-22T00:00:00
[ [ "McCreesh", "Ciaran", "" ], [ "Prosser", "Patrick", "" ] ]
TITLE: Distributing an Exact Algorithm for Maximum Clique: maximising the costup ABSTRACT: We take an existing implementation of an algorithm for the maximum clique problem and modify it so that we can distribute it over an ad-hoc cluster of machines. Our goal was to achieve a significant speedup in performance with minimal development effort, i.e. a maximum costup. We present a simple modification to a state-of-the-art exact algorithm for maximum clique that allows us to distribute it across many machines. An empirical study over large hard benchmarks shows that speedups of an order of magnitude are routine for 25 or more machines.
no_new_dataset
0.708452
1301.3485
Antoine Bordes
Xavier Glorot and Antoine Bordes and Jason Weston and Yoshua Bengio
A Semantic Matching Energy Function for Learning with Multi-relational Data
null
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Large-scale relational learning becomes crucial for handling the huge amounts of structured data generated daily in many application domains ranging from computational biology or information retrieval, to natural language processing. In this paper, we present a new neural network architecture designed to embed multi-relational graphs into a flexible continuous vector space in which the original data is kept and enhanced. The network is trained to encode the semantics of these graphs in order to assign high probabilities to plausible components. We empirically show that it reaches competitive performance in link prediction on standard datasets from the literature.
[ { "version": "v1", "created": "Tue, 15 Jan 2013 20:52:50 GMT" }, { "version": "v2", "created": "Thu, 21 Mar 2013 17:02:48 GMT" } ]
2013-03-22T00:00:00
[ [ "Glorot", "Xavier", "" ], [ "Bordes", "Antoine", "" ], [ "Weston", "Jason", "" ], [ "Bengio", "Yoshua", "" ] ]
TITLE: A Semantic Matching Energy Function for Learning with Multi-relational Data ABSTRACT: Large-scale relational learning becomes crucial for handling the huge amounts of structured data generated daily in many application domains ranging from computational biology or information retrieval, to natural language processing. In this paper, we present a new neural network architecture designed to embed multi-relational graphs into a flexible continuous vector space in which the original data is kept and enhanced. The network is trained to encode the semantics of these graphs in order to assign high probabilities to plausible components. We empirically show that it reaches competitive performance in link prediction on standard datasets from the literature.
no_new_dataset
0.709585
1303.5177
Nabila Shikoun
Nabila Shikoun, Mohamed El Nahas and Samar Kassim
Model Based Framework for Estimating Mutation Rate of Hepatitis C Virus in Egypt
6 pages, 5 figures
null
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Hepatitis C virus (HCV) is a widely spread disease all over the world. HCV has very high mutation rate that makes it resistant to antibodies. Modeling HCV to identify the virus mutation process is essential to its detection and predicting its evolution. This paper presents a model based framework for estimating mutation rate of HCV in two steps. Firstly profile hidden Markov model (PHMM) architecture was builder to select the sequences which represents sequence per year. Secondly mutation rate was calculated by using pair-wise distance method between sequences. A pilot study is conducted on NS5B zone of HCV dataset of genotype 4 subtype a (HCV4a) in Egypt.
[ { "version": "v1", "created": "Thu, 21 Mar 2013 06:49:05 GMT" } ]
2013-03-22T00:00:00
[ [ "Shikoun", "Nabila", "" ], [ "Nahas", "Mohamed El", "" ], [ "Kassim", "Samar", "" ] ]
TITLE: Model Based Framework for Estimating Mutation Rate of Hepatitis C Virus in Egypt ABSTRACT: Hepatitis C virus (HCV) is a widely spread disease all over the world. HCV has very high mutation rate that makes it resistant to antibodies. Modeling HCV to identify the virus mutation process is essential to its detection and predicting its evolution. This paper presents a model based framework for estimating mutation rate of HCV in two steps. Firstly profile hidden Markov model (PHMM) architecture was builder to select the sequences which represents sequence per year. Secondly mutation rate was calculated by using pair-wise distance method between sequences. A pilot study is conducted on NS5B zone of HCV dataset of genotype 4 subtype a (HCV4a) in Egypt.
no_new_dataset
0.712013
1206.5829
Alexandre Bartel
Alexandre Bartel (SnT), Jacques Klein (SnT), Martin Monperrus (INRIA Lille - Nord Europe), Yves Le Traon (SnT)
Automatically Securing Permission-Based Software by Reducing the Attack Surface: An Application to Android
null
null
null
ISBN: 978-2-87971-107-2
cs.CR cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A common security architecture, called the permission-based security model (used e.g. in Android and Blackberry), entails intrinsic risks. For instance, applications can be granted more permissions than they actually need, what we call a "permission gap". Malware can leverage the unused permissions for achieving their malicious goals, for instance using code injection. In this paper, we present an approach to detecting permission gaps using static analysis. Our prototype implementation in the context of Android shows that the static analysis must take into account a significant amount of platform-specific knowledge. Using our tool on two datasets of Android applications, we found out that a non negligible part of applications suffers from permission gaps, i.e. does not use all the permissions they declare.
[ { "version": "v1", "created": "Tue, 22 May 2012 13:58:03 GMT" }, { "version": "v2", "created": "Wed, 20 Mar 2013 19:43:56 GMT" } ]
2013-03-21T00:00:00
[ [ "Bartel", "Alexandre", "", "SnT" ], [ "Klein", "Jacques", "", "SnT" ], [ "Monperrus", "Martin", "", "INRIA\n Lille - Nord Europe" ], [ "Traon", "Yves Le", "", "SnT" ] ]
TITLE: Automatically Securing Permission-Based Software by Reducing the Attack Surface: An Application to Android ABSTRACT: A common security architecture, called the permission-based security model (used e.g. in Android and Blackberry), entails intrinsic risks. For instance, applications can be granted more permissions than they actually need, what we call a "permission gap". Malware can leverage the unused permissions for achieving their malicious goals, for instance using code injection. In this paper, we present an approach to detecting permission gaps using static analysis. Our prototype implementation in the context of Android shows that the static analysis must take into account a significant amount of platform-specific knowledge. Using our tool on two datasets of Android applications, we found out that a non negligible part of applications suffers from permission gaps, i.e. does not use all the permissions they declare.
no_new_dataset
0.707398
1303.4803
Chunhua Shen
Xi Li, Weiming Hu, Chunhua Shen, Zhongfei Zhang, Anthony Dick, Anton van den Hengel
A Survey of Appearance Models in Visual Object Tracking
Appearing in ACM Transactions on Intelligent Systems and Technology, 2013
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Visual object tracking is a significant computer vision task which can be applied to many domains such as visual surveillance, human computer interaction, and video compression. In the literature, researchers have proposed a variety of 2D appearance models. To help readers swiftly learn the recent advances in 2D appearance models for visual object tracking, we contribute this survey, which provides a detailed review of the existing 2D appearance models. In particular, this survey takes a module-based architecture that enables readers to easily grasp the key points of visual object tracking. In this survey, we first decompose the problem of appearance modeling into two different processing stages: visual representation and statistical modeling. Then, different 2D appearance models are categorized and discussed with respect to their composition modules. Finally, we address several issues of interest as well as the remaining challenges for future research on this topic. The contributions of this survey are four-fold. First, we review the literature of visual representations according to their feature-construction mechanisms (i.e., local and global). Second, the existing statistical modeling schemes for tracking-by-detection are reviewed according to their model-construction mechanisms: generative, discriminative, and hybrid generative-discriminative. Third, each type of visual representations or statistical modeling techniques is analyzed and discussed from a theoretical or practical viewpoint. Fourth, the existing benchmark resources (e.g., source code and video datasets) are examined in this survey.
[ { "version": "v1", "created": "Wed, 20 Mar 2013 01:08:33 GMT" } ]
2013-03-21T00:00:00
[ [ "Li", "Xi", "" ], [ "Hu", "Weiming", "" ], [ "Shen", "Chunhua", "" ], [ "Zhang", "Zhongfei", "" ], [ "Dick", "Anthony", "" ], [ "Hengel", "Anton van den", "" ] ]
TITLE: A Survey of Appearance Models in Visual Object Tracking ABSTRACT: Visual object tracking is a significant computer vision task which can be applied to many domains such as visual surveillance, human computer interaction, and video compression. In the literature, researchers have proposed a variety of 2D appearance models. To help readers swiftly learn the recent advances in 2D appearance models for visual object tracking, we contribute this survey, which provides a detailed review of the existing 2D appearance models. In particular, this survey takes a module-based architecture that enables readers to easily grasp the key points of visual object tracking. In this survey, we first decompose the problem of appearance modeling into two different processing stages: visual representation and statistical modeling. Then, different 2D appearance models are categorized and discussed with respect to their composition modules. Finally, we address several issues of interest as well as the remaining challenges for future research on this topic. The contributions of this survey are four-fold. First, we review the literature of visual representations according to their feature-construction mechanisms (i.e., local and global). Second, the existing statistical modeling schemes for tracking-by-detection are reviewed according to their model-construction mechanisms: generative, discriminative, and hybrid generative-discriminative. Third, each type of visual representations or statistical modeling techniques is analyzed and discussed from a theoretical or practical viewpoint. Fourth, the existing benchmark resources (e.g., source code and video datasets) are examined in this survey.
no_new_dataset
0.707626
1303.4869
Raik Niemann M.Sc.
Raik Niemann, Nikolaos Korfiatis, Roberto Zicari, Richard G\"obel
Does query performance optimization lead to energy efficiency? A comparative analysis of energy efficiency of database operations under different workload scenarios
10 pages, 12 figures
null
null
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
With the continuous increase of online services as well as energy costs, energy consumption becomes a significant cost factor for the evaluation of data center operations. A significant contributor to that is the performance of database servers which are found to constitute the backbone of online services. From a software approach, while a set of novel data management technologies appear in the market e.g. key-value based or in-memory databases, classic relational database management systems (RDBMS) are still widely used. In addition from a hardware perspective, the majority of database servers is still using standard magnetic hard drives (HDDs) instead of solid state drives (SSDs) due to lower cost of storage per gigabyte, disregarding the performance boost that might be given due to high cost. In this study we focus on a software based assessment of the energy consumption of a database server by running three different and complete database workloads namely TCP-H, Star Schema Benchmark -SSB as well a modified benchmark we have derived for this study called W22. We profile the energy distribution among the ost important server components and by using different resource allocation we assess the energy consumption of a typical open source RDBMS (PostgreSQL) on a standard server in relation with its performance (measured by query time). Results confirm the well-known fact that even for complete workloads, optimization of the RDBMS results to lower energy consumption.
[ { "version": "v1", "created": "Wed, 20 Mar 2013 08:22:11 GMT" } ]
2013-03-21T00:00:00
[ [ "Niemann", "Raik", "" ], [ "Korfiatis", "Nikolaos", "" ], [ "Zicari", "Roberto", "" ], [ "Göbel", "Richard", "" ] ]
TITLE: Does query performance optimization lead to energy efficiency? A comparative analysis of energy efficiency of database operations under different workload scenarios ABSTRACT: With the continuous increase of online services as well as energy costs, energy consumption becomes a significant cost factor for the evaluation of data center operations. A significant contributor to that is the performance of database servers which are found to constitute the backbone of online services. From a software approach, while a set of novel data management technologies appear in the market e.g. key-value based or in-memory databases, classic relational database management systems (RDBMS) are still widely used. In addition from a hardware perspective, the majority of database servers is still using standard magnetic hard drives (HDDs) instead of solid state drives (SSDs) due to lower cost of storage per gigabyte, disregarding the performance boost that might be given due to high cost. In this study we focus on a software based assessment of the energy consumption of a database server by running three different and complete database workloads namely TCP-H, Star Schema Benchmark -SSB as well a modified benchmark we have derived for this study called W22. We profile the energy distribution among the ost important server components and by using different resource allocation we assess the energy consumption of a typical open source RDBMS (PostgreSQL) on a standard server in relation with its performance (measured by query time). Results confirm the well-known fact that even for complete workloads, optimization of the RDBMS results to lower energy consumption.
no_new_dataset
0.703766
1303.4994
Albert Wegener
Albert Wegener
Universal Numerical Encoder and Profiler Reduces Computing's Memory Wall with Software, FPGA, and SoC Implementations
10 pages, 4 figures, 3 tables, 19 references
null
null
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In the multicore era, the time to computational results is increasingly determined by how quickly operands are accessed by cores, rather than by the speed of computation per operand. From high-performance computing (HPC) to mobile application processors, low multicore utilization rates result from the slowness of accessing off-chip operands, i.e. the memory wall. The APplication AXcelerator (APAX) universal numerical encoder reduces computing's memory wall by compressing numerical operands (integers and floats), thereby decreasing CPU access time by 3:1 to 10:1 as operands stream between memory and cores. APAX encodes numbers using a low-complexity algorithm designed both for time series sensor data and for multi-dimensional data, including images. APAX encoding parameters are determined by a profiler that quantifies the uncertainty inherent in numerical datasets and recommends encoding parameters reflecting this uncertainty. Compatible software, FPGA, and systemon-chip (SoC) implementations efficiently support encoding rates between 150 MByte/sec and 1.5 GByte/sec at low power. On 25 integer and floating-point datasets, we achieved encoding rates between 3:1 and 10:1, with average correlation of 0.999959, while accelerating computational "time to results."
[ { "version": "v1", "created": "Wed, 20 Mar 2013 17:11:12 GMT" } ]
2013-03-21T00:00:00
[ [ "Wegener", "Albert", "" ] ]
TITLE: Universal Numerical Encoder and Profiler Reduces Computing's Memory Wall with Software, FPGA, and SoC Implementations ABSTRACT: In the multicore era, the time to computational results is increasingly determined by how quickly operands are accessed by cores, rather than by the speed of computation per operand. From high-performance computing (HPC) to mobile application processors, low multicore utilization rates result from the slowness of accessing off-chip operands, i.e. the memory wall. The APplication AXcelerator (APAX) universal numerical encoder reduces computing's memory wall by compressing numerical operands (integers and floats), thereby decreasing CPU access time by 3:1 to 10:1 as operands stream between memory and cores. APAX encodes numbers using a low-complexity algorithm designed both for time series sensor data and for multi-dimensional data, including images. APAX encoding parameters are determined by a profiler that quantifies the uncertainty inherent in numerical datasets and recommends encoding parameters reflecting this uncertainty. Compatible software, FPGA, and systemon-chip (SoC) implementations efficiently support encoding rates between 150 MByte/sec and 1.5 GByte/sec at low power. On 25 integer and floating-point datasets, we achieved encoding rates between 3:1 and 10:1, with average correlation of 0.999959, while accelerating computational "time to results."
no_new_dataset
0.70825
1301.3527
Vamsi Potluru
Vamsi K. Potluru, Sergey M. Plis, Jonathan Le Roux, Barak A. Pearlmutter, Vince D. Calhoun, Thomas P. Hayes
Block Coordinate Descent for Sparse NMF
null
null
null
null
cs.LG cs.NA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Nonnegative matrix factorization (NMF) has become a ubiquitous tool for data analysis. An important variant is the sparse NMF problem which arises when we explicitly require the learnt features to be sparse. A natural measure of sparsity is the L$_0$ norm, however its optimization is NP-hard. Mixed norms, such as L$_1$/L$_2$ measure, have been shown to model sparsity robustly, based on intuitive attributes that such measures need to satisfy. This is in contrast to computationally cheaper alternatives such as the plain L$_1$ norm. However, present algorithms designed for optimizing the mixed norm L$_1$/L$_2$ are slow and other formulations for sparse NMF have been proposed such as those based on L$_1$ and L$_0$ norms. Our proposed algorithm allows us to solve the mixed norm sparsity constraints while not sacrificing computation time. We present experimental evidence on real-world datasets that shows our new algorithm performs an order of magnitude faster compared to the current state-of-the-art solvers optimizing the mixed norm and is suitable for large-scale datasets.
[ { "version": "v1", "created": "Tue, 15 Jan 2013 23:11:05 GMT" }, { "version": "v2", "created": "Mon, 18 Mar 2013 22:42:11 GMT" } ]
2013-03-20T00:00:00
[ [ "Potluru", "Vamsi K.", "" ], [ "Plis", "Sergey M.", "" ], [ "Roux", "Jonathan Le", "" ], [ "Pearlmutter", "Barak A.", "" ], [ "Calhoun", "Vince D.", "" ], [ "Hayes", "Thomas P.", "" ] ]
TITLE: Block Coordinate Descent for Sparse NMF ABSTRACT: Nonnegative matrix factorization (NMF) has become a ubiquitous tool for data analysis. An important variant is the sparse NMF problem which arises when we explicitly require the learnt features to be sparse. A natural measure of sparsity is the L$_0$ norm, however its optimization is NP-hard. Mixed norms, such as L$_1$/L$_2$ measure, have been shown to model sparsity robustly, based on intuitive attributes that such measures need to satisfy. This is in contrast to computationally cheaper alternatives such as the plain L$_1$ norm. However, present algorithms designed for optimizing the mixed norm L$_1$/L$_2$ are slow and other formulations for sparse NMF have been proposed such as those based on L$_1$ and L$_0$ norms. Our proposed algorithm allows us to solve the mixed norm sparsity constraints while not sacrificing computation time. We present experimental evidence on real-world datasets that shows our new algorithm performs an order of magnitude faster compared to the current state-of-the-art solvers optimizing the mixed norm and is suitable for large-scale datasets.
no_new_dataset
0.708603
1303.4402
Julian McAuley
Julian McAuley and Jure Leskovec
From Amateurs to Connoisseurs: Modeling the Evolution of User Expertise through Online Reviews
11 pages, 7 figures
null
null
null
cs.SI cs.IR physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recommending products to consumers means not only understanding their tastes, but also understanding their level of experience. For example, it would be a mistake to recommend the iconic film Seven Samurai simply because a user enjoys other action movies; rather, we might conclude that they will eventually enjoy it -- once they are ready. The same is true for beers, wines, gourmet foods -- or any products where users have acquired tastes: the `best' products may not be the most `accessible'. Thus our goal in this paper is to recommend products that a user will enjoy now, while acknowledging that their tastes may have changed over time, and may change again in the future. We model how tastes change due to the very act of consuming more products -- in other words, as users become more experienced. We develop a latent factor recommendation system that explicitly accounts for each user's level of experience. We find that such a model not only leads to better recommendations, but also allows us to study the role of user experience and expertise on a novel dataset of fifteen million beer, wine, food, and movie reviews.
[ { "version": "v1", "created": "Mon, 18 Mar 2013 20:01:19 GMT" } ]
2013-03-20T00:00:00
[ [ "McAuley", "Julian", "" ], [ "Leskovec", "Jure", "" ] ]
TITLE: From Amateurs to Connoisseurs: Modeling the Evolution of User Expertise through Online Reviews ABSTRACT: Recommending products to consumers means not only understanding their tastes, but also understanding their level of experience. For example, it would be a mistake to recommend the iconic film Seven Samurai simply because a user enjoys other action movies; rather, we might conclude that they will eventually enjoy it -- once they are ready. The same is true for beers, wines, gourmet foods -- or any products where users have acquired tastes: the `best' products may not be the most `accessible'. Thus our goal in this paper is to recommend products that a user will enjoy now, while acknowledging that their tastes may have changed over time, and may change again in the future. We model how tastes change due to the very act of consuming more products -- in other words, as users become more experienced. We develop a latent factor recommendation system that explicitly accounts for each user's level of experience. We find that such a model not only leads to better recommendations, but also allows us to study the role of user experience and expertise on a novel dataset of fifteen million beer, wine, food, and movie reviews.
new_dataset
0.717773
1303.4614
Santosh K.C.
Abdel Bela\"id (LORIA), K.C. Santosh (LORIA), Vincent Poulain D'Andecy
Handwritten and Printed Text Separation in Real Document
Machine Vision Applications (2013)
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The aim of the paper is to separate handwritten and printed text from a real document embedded with noise, graphics including annotations. Relying on run-length smoothing algorithm (RLSA), the extracted pseudo-lines and pseudo-words are used as basic blocks for classification. To handle this, a multi-class support vector machine (SVM) with Gaussian kernel performs a first labelling of each pseudo-word including the study of local neighbourhood. It then propagates the context between neighbours so that we can correct possible labelling errors. Considering running time complexity issue, we propose linear complexity methods where we use k-NN with constraint. When using a kd-tree, it is almost linearly proportional to the number of pseudo-words. The performance of our system is close to 90%, even when very small learning dataset where samples are basically composed of complex administrative documents.
[ { "version": "v1", "created": "Tue, 19 Mar 2013 14:23:24 GMT" } ]
2013-03-20T00:00:00
[ [ "Belaïd", "Abdel", "", "LORIA" ], [ "Santosh", "K. C.", "", "LORIA" ], [ "D'Andecy", "Vincent Poulain", "" ] ]
TITLE: Handwritten and Printed Text Separation in Real Document ABSTRACT: The aim of the paper is to separate handwritten and printed text from a real document embedded with noise, graphics including annotations. Relying on run-length smoothing algorithm (RLSA), the extracted pseudo-lines and pseudo-words are used as basic blocks for classification. To handle this, a multi-class support vector machine (SVM) with Gaussian kernel performs a first labelling of each pseudo-word including the study of local neighbourhood. It then propagates the context between neighbours so that we can correct possible labelling errors. Considering running time complexity issue, we propose linear complexity methods where we use k-NN with constraint. When using a kd-tree, it is almost linearly proportional to the number of pseudo-words. The performance of our system is close to 90%, even when very small learning dataset where samples are basically composed of complex administrative documents.
no_new_dataset
0.708792
1303.4699
Dongxiao He
Dongxiao He, Dayou Liu, Weixiongzhang, Di Jin, and Bo Yang
Discovering link communities in complex networks by exploiting link dynamics
18 pages,11 figures
Journal of Statistical Mechanics: Theory and Experiment,P10015, 2012
10.1088/1742-5468/2012/10/P10015
null
cs.SI cond-mat.stat-mech physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Discovery of communities in complex networks is a fundamental data analysis problem with applications in various domains. Most of the existing approaches have focused on discovering communities of nodes, while recent studies have shown great advantages and utilities of the knowledge of communities of links in networks. From this new perspective, we propose a link dynamics based algorithm, called UELC, for identifying link communities of networks. In UELC, the stochastic process of a link-node-link random walk is employed to unfold an embedded bipartition structure of links in a network. The local mixing properties of the Markov chain underlying the random walk are then utilized to extract two emerged link communities. Further, the random walk and the bipartitioning processes are wrapped in an iterative subdivision strategy to recursively identify link partitions that segregate the network links into multiple subdivisions. We evaluate the performance of the new method on synthetic benchmarks and demonstrate its utility on real-world networks. Our experimental results show that our method is highly effective for discovering link communities in complex networks. As a comparison, we also extend UELC to extracting communities of node, and show that it is effective for node community identification.
[ { "version": "v1", "created": "Tue, 19 Mar 2013 19:05:00 GMT" } ]
2013-03-20T00:00:00
[ [ "He", "Dongxiao", "" ], [ "Liu", "Dayou", "" ], [ "Weixiongzhang", "", "" ], [ "Jin", "Di", "" ], [ "Yang", "Bo", "" ] ]
TITLE: Discovering link communities in complex networks by exploiting link dynamics ABSTRACT: Discovery of communities in complex networks is a fundamental data analysis problem with applications in various domains. Most of the existing approaches have focused on discovering communities of nodes, while recent studies have shown great advantages and utilities of the knowledge of communities of links in networks. From this new perspective, we propose a link dynamics based algorithm, called UELC, for identifying link communities of networks. In UELC, the stochastic process of a link-node-link random walk is employed to unfold an embedded bipartition structure of links in a network. The local mixing properties of the Markov chain underlying the random walk are then utilized to extract two emerged link communities. Further, the random walk and the bipartitioning processes are wrapped in an iterative subdivision strategy to recursively identify link partitions that segregate the network links into multiple subdivisions. We evaluate the performance of the new method on synthetic benchmarks and demonstrate its utility on real-world networks. Our experimental results show that our method is highly effective for discovering link communities in complex networks. As a comparison, we also extend UELC to extracting communities of node, and show that it is effective for node community identification.
no_new_dataset
0.710201
1303.4711
Dongxiao He
Dongxiao He, Jie Liu, Bo Yang, Yuxiao Huang, Dayou Liu, Di Jin
An Ant-Based Algorithm with Local Optimization for Community Detection in Large-Scale Networks
18 pages,7 figures, 4 tables. arXiv admin note: text overlap with arXiv:0803.0476, arXiv:cond-mat/0309508 by other authors
Advances in Complex Systems, 2012, 15(08): 1250036
10.1142/S0219525912500361
null
cs.SI physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we propose a multi-layer ant-based algorithm MABA, which detects communities from networks by means of locally optimizing modularity using individual ants. The basic version of MABA, namely SABA, combines a self-avoiding label propagation technique with a simulated annealing strategy for ant diffusion in networks. Once the communities are found by SABA, this method can be reapplied to a higher level network where each obtained community is regarded as a new vertex. The aforementioned process is repeated iteratively, and this corresponds to MABA. Thanks to the intrinsic multi-level nature of our algorithm, it possesses the potential ability to unfold multi-scale hierarchical structures. Furthermore, MABA has the ability that mitigates the resolution limit of modularity. The proposed MABA has been evaluated on both computer-generated benchmarks and widely used real-world networks, and has been compared with a set of competitive algorithms. Experimental results demonstrate that MABA is both effective and efficient (in near linear time with respect to the size of network) for discovering communities.
[ { "version": "v1", "created": "Tue, 19 Mar 2013 19:30:05 GMT" } ]
2013-03-20T00:00:00
[ [ "He", "Dongxiao", "" ], [ "Liu", "Jie", "" ], [ "Yang", "Bo", "" ], [ "Huang", "Yuxiao", "" ], [ "Liu", "Dayou", "" ], [ "Jin", "Di", "" ] ]
TITLE: An Ant-Based Algorithm with Local Optimization for Community Detection in Large-Scale Networks ABSTRACT: In this paper, we propose a multi-layer ant-based algorithm MABA, which detects communities from networks by means of locally optimizing modularity using individual ants. The basic version of MABA, namely SABA, combines a self-avoiding label propagation technique with a simulated annealing strategy for ant diffusion in networks. Once the communities are found by SABA, this method can be reapplied to a higher level network where each obtained community is regarded as a new vertex. The aforementioned process is repeated iteratively, and this corresponds to MABA. Thanks to the intrinsic multi-level nature of our algorithm, it possesses the potential ability to unfold multi-scale hierarchical structures. Furthermore, MABA has the ability that mitigates the resolution limit of modularity. The proposed MABA has been evaluated on both computer-generated benchmarks and widely used real-world networks, and has been compared with a set of competitive algorithms. Experimental results demonstrate that MABA is both effective and efficient (in near linear time with respect to the size of network) for discovering communities.
no_new_dataset
0.710038
1303.3664
Weicong Ding
Weicong Ding, Mohammad H. Rohban, Prakash Ishwar, Venkatesh Saligrama
Topic Discovery through Data Dependent and Random Projections
null
null
null
null
stat.ML cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present algorithms for topic modeling based on the geometry of cross-document word-frequency patterns. This perspective gains significance under the so called separability condition. This is a condition on existence of novel-words that are unique to each topic. We present a suite of highly efficient algorithms based on data-dependent and random projections of word-frequency patterns to identify novel words and associated topics. We will also discuss the statistical guarantees of the data-dependent projections method based on two mild assumptions on the prior density of topic document matrix. Our key insight here is that the maximum and minimum values of cross-document frequency patterns projected along any direction are associated with novel words. While our sample complexity bounds for topic recovery are similar to the state-of-art, the computational complexity of our random projection scheme scales linearly with the number of documents and the number of words per document. We present several experiments on synthetic and real-world datasets to demonstrate qualitative and quantitative merits of our scheme.
[ { "version": "v1", "created": "Fri, 15 Mar 2013 02:37:19 GMT" }, { "version": "v2", "created": "Mon, 18 Mar 2013 13:11:02 GMT" } ]
2013-03-19T00:00:00
[ [ "Ding", "Weicong", "" ], [ "Rohban", "Mohammad H.", "" ], [ "Ishwar", "Prakash", "" ], [ "Saligrama", "Venkatesh", "" ] ]
TITLE: Topic Discovery through Data Dependent and Random Projections ABSTRACT: We present algorithms for topic modeling based on the geometry of cross-document word-frequency patterns. This perspective gains significance under the so called separability condition. This is a condition on existence of novel-words that are unique to each topic. We present a suite of highly efficient algorithms based on data-dependent and random projections of word-frequency patterns to identify novel words and associated topics. We will also discuss the statistical guarantees of the data-dependent projections method based on two mild assumptions on the prior density of topic document matrix. Our key insight here is that the maximum and minimum values of cross-document frequency patterns projected along any direction are associated with novel words. While our sample complexity bounds for topic recovery are similar to the state-of-art, the computational complexity of our random projection scheme scales linearly with the number of documents and the number of words per document. We present several experiments on synthetic and real-world datasets to demonstrate qualitative and quantitative merits of our scheme.
no_new_dataset
0.709372
1303.4087
Rafi Muhammad
Muhammad Rafi, Mohammad Shahid Shaikh
An improved semantic similarity measure for document clustering based on topic maps
5 pages
null
null
null
cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A major computational burden, while performing document clustering, is the calculation of similarity measure between a pair of documents. Similarity measure is a function that assigns a real number between 0 and 1 to a pair of documents, depending upon the degree of similarity between them. A value of zero means that the documents are completely dissimilar whereas a value of one indicates that the documents are practically identical. Traditionally, vector-based models have been used for computing the document similarity. The vector-based models represent several features present in documents. These approaches to similarity measures, in general, cannot account for the semantics of the document. Documents written in human languages contain contexts and the words used to describe these contexts are generally semantically related. Motivated by this fact, many researchers have proposed seman-tic-based similarity measures by utilizing text annotation through external thesauruses like WordNet (a lexical database). In this paper, we define a semantic similarity measure based on documents represented in topic maps. Topic maps are rapidly becoming an industrial standard for knowledge representation with a focus for later search and extraction. The documents are transformed into a topic map based coded knowledge and the similarity between a pair of documents is represented as a correlation between the common patterns (sub-trees). The experimental studies on the text mining datasets reveal that this new similarity measure is more effective as compared to commonly used similarity measures in text clustering.
[ { "version": "v1", "created": "Sun, 17 Mar 2013 18:28:02 GMT" } ]
2013-03-19T00:00:00
[ [ "Rafi", "Muhammad", "" ], [ "Shaikh", "Mohammad Shahid", "" ] ]
TITLE: An improved semantic similarity measure for document clustering based on topic maps ABSTRACT: A major computational burden, while performing document clustering, is the calculation of similarity measure between a pair of documents. Similarity measure is a function that assigns a real number between 0 and 1 to a pair of documents, depending upon the degree of similarity between them. A value of zero means that the documents are completely dissimilar whereas a value of one indicates that the documents are practically identical. Traditionally, vector-based models have been used for computing the document similarity. The vector-based models represent several features present in documents. These approaches to similarity measures, in general, cannot account for the semantics of the document. Documents written in human languages contain contexts and the words used to describe these contexts are generally semantically related. Motivated by this fact, many researchers have proposed seman-tic-based similarity measures by utilizing text annotation through external thesauruses like WordNet (a lexical database). In this paper, we define a semantic similarity measure based on documents represented in topic maps. Topic maps are rapidly becoming an industrial standard for knowledge representation with a focus for later search and extraction. The documents are transformed into a topic map based coded knowledge and the similarity between a pair of documents is represented as a correlation between the common patterns (sub-trees). The experimental studies on the text mining datasets reveal that this new similarity measure is more effective as compared to commonly used similarity measures in text clustering.
no_new_dataset
0.71282
1303.4160
Conrad Sanderson
Vikas Reddy, Conrad Sanderson, Brian C. Lovell
Improved Foreground Detection via Block-based Classifier Cascade with Probabilistic Decision Integration
null
IEEE Transactions on Circuits and Systems for Video Technology, Vol. 23, No. 1, pp. 83-93, 2013
10.1109/TCSVT.2012.2203199
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Background subtraction is a fundamental low-level processing task in numerous computer vision applications. The vast majority of algorithms process images on a pixel-by-pixel basis, where an independent decision is made for each pixel. A general limitation of such processing is that rich contextual information is not taken into account. We propose a block-based method capable of dealing with noise, illumination variations and dynamic backgrounds, while still obtaining smooth contours of foreground objects. Specifically, image sequences are analysed on an overlapping block-by-block basis. A low-dimensional texture descriptor obtained from each block is passed through an adaptive classifier cascade, where each stage handles a distinct problem. A probabilistic foreground mask generation approach then exploits block overlaps to integrate interim block-level decisions into final pixel-level foreground segmentation. Unlike many pixel-based methods, ad-hoc post-processing of foreground masks is not required. Experiments on the difficult Wallflower and I2R datasets show that the proposed approach obtains on average better results (both qualitatively and quantitatively) than several prominent methods. We furthermore propose the use of tracking performance as an unbiased approach for assessing the practical usefulness of foreground segmentation methods, and show that the proposed approach leads to considerable improvements in tracking accuracy on the CAVIAR dataset.
[ { "version": "v1", "created": "Mon, 18 Mar 2013 05:48:40 GMT" } ]
2013-03-19T00:00:00
[ [ "Reddy", "Vikas", "" ], [ "Sanderson", "Conrad", "" ], [ "Lovell", "Brian C.", "" ] ]
TITLE: Improved Foreground Detection via Block-based Classifier Cascade with Probabilistic Decision Integration ABSTRACT: Background subtraction is a fundamental low-level processing task in numerous computer vision applications. The vast majority of algorithms process images on a pixel-by-pixel basis, where an independent decision is made for each pixel. A general limitation of such processing is that rich contextual information is not taken into account. We propose a block-based method capable of dealing with noise, illumination variations and dynamic backgrounds, while still obtaining smooth contours of foreground objects. Specifically, image sequences are analysed on an overlapping block-by-block basis. A low-dimensional texture descriptor obtained from each block is passed through an adaptive classifier cascade, where each stage handles a distinct problem. A probabilistic foreground mask generation approach then exploits block overlaps to integrate interim block-level decisions into final pixel-level foreground segmentation. Unlike many pixel-based methods, ad-hoc post-processing of foreground masks is not required. Experiments on the difficult Wallflower and I2R datasets show that the proposed approach obtains on average better results (both qualitatively and quantitatively) than several prominent methods. We furthermore propose the use of tracking performance as an unbiased approach for assessing the practical usefulness of foreground segmentation methods, and show that the proposed approach leads to considerable improvements in tracking accuracy on the CAVIAR dataset.
no_new_dataset
0.711017
1301.3583
Yann Dauphin
Yann N. Dauphin, Yoshua Bengio
Big Neural Networks Waste Capacity
null
null
null
null
cs.LG cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This article exposes the failure of some big neural networks to leverage added capacity to reduce underfitting. Past research suggest diminishing returns when increasing the size of neural networks. Our experiments on ImageNet LSVRC-2010 show that this may be due to the fact there are highly diminishing returns for capacity in terms of training error, leading to underfitting. This suggests that the optimization method - first order gradient descent - fails at this regime. Directly attacking this problem, either through the optimization method or the choices of parametrization, may allow to improve the generalization error on large datasets, for which a large capacity is required.
[ { "version": "v1", "created": "Wed, 16 Jan 2013 04:45:29 GMT" }, { "version": "v2", "created": "Thu, 17 Jan 2013 18:11:34 GMT" }, { "version": "v3", "created": "Wed, 27 Feb 2013 23:07:05 GMT" }, { "version": "v4", "created": "Thu, 14 Mar 2013 20:49:20 GMT" } ]
2013-03-18T00:00:00
[ [ "Dauphin", "Yann N.", "" ], [ "Bengio", "Yoshua", "" ] ]
TITLE: Big Neural Networks Waste Capacity ABSTRACT: This article exposes the failure of some big neural networks to leverage added capacity to reduce underfitting. Past research suggest diminishing returns when increasing the size of neural networks. Our experiments on ImageNet LSVRC-2010 show that this may be due to the fact there are highly diminishing returns for capacity in terms of training error, leading to underfitting. This suggests that the optimization method - first order gradient descent - fails at this regime. Directly attacking this problem, either through the optimization method or the choices of parametrization, may allow to improve the generalization error on large datasets, for which a large capacity is required.
no_new_dataset
0.712251
1303.3751
Michael (Micky) Fire
Michael Fire, Dima Kagan, Aviad Elyashar, and Yuval Elovici
Friend or Foe? Fake Profile Identification in Online Social Networks
Draft Version
null
null
null
cs.SI physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The amount of personal information unwillingly exposed by users on online social networks is staggering, as shown in recent research. Moreover, recent reports indicate that these networks are infested with tens of millions of fake users profiles, which may jeopardize the users' security and privacy. To identify fake users in such networks and to improve users' security and privacy, we developed the Social Privacy Protector software for Facebook. This software contains three protection layers, which improve user privacy by implementing different methods. The software first identifies a user's friends who might pose a threat and then restricts this "friend's" exposure to the user's personal information. The second layer is an expansion of Facebook's basic privacy settings based on different types of social network usage profiles. The third layer alerts users about the number of installed applications on their Facebook profile, which have access to their private information. An initial version of the Social Privacy Protection software received high media coverage, and more than 3,000 users from more than twenty countries have installed the software, out of which 527 used the software to restrict more than nine thousand friends. In addition, we estimate that more than a hundred users accepted the software's recommendations and removed at least 1,792 Facebook applications from their profiles. By analyzing the unique dataset obtained by the software in combination with machine learning techniques, we developed classifiers, which are able to predict which Facebook profiles have high probabilities of being fake and therefore, threaten the user's well-being. Moreover, in this study, we present statistics on users' privacy settings and statistics of the number of applications installed on Facebook profiles...
[ { "version": "v1", "created": "Fri, 15 Mar 2013 12:17:10 GMT" } ]
2013-03-18T00:00:00
[ [ "Fire", "Michael", "" ], [ "Kagan", "Dima", "" ], [ "Elyashar", "Aviad", "" ], [ "Elovici", "Yuval", "" ] ]
TITLE: Friend or Foe? Fake Profile Identification in Online Social Networks ABSTRACT: The amount of personal information unwillingly exposed by users on online social networks is staggering, as shown in recent research. Moreover, recent reports indicate that these networks are infested with tens of millions of fake users profiles, which may jeopardize the users' security and privacy. To identify fake users in such networks and to improve users' security and privacy, we developed the Social Privacy Protector software for Facebook. This software contains three protection layers, which improve user privacy by implementing different methods. The software first identifies a user's friends who might pose a threat and then restricts this "friend's" exposure to the user's personal information. The second layer is an expansion of Facebook's basic privacy settings based on different types of social network usage profiles. The third layer alerts users about the number of installed applications on their Facebook profile, which have access to their private information. An initial version of the Social Privacy Protection software received high media coverage, and more than 3,000 users from more than twenty countries have installed the software, out of which 527 used the software to restrict more than nine thousand friends. In addition, we estimate that more than a hundred users accepted the software's recommendations and removed at least 1,792 Facebook applications from their profiles. By analyzing the unique dataset obtained by the software in combination with machine learning techniques, we developed classifiers, which are able to predict which Facebook profiles have high probabilities of being fake and therefore, threaten the user's well-being. Moreover, in this study, we present statistics on users' privacy settings and statistics of the number of applications installed on Facebook profiles...
no_new_dataset
0.702721
1301.2820
Eugenio Culurciello Eugenio Culurciello
Eugenio Culurciello, Jordan Bates, Aysegul Dundar, Jose Carrasco, Clement Farabet
Clustering Learning for Robotic Vision
Code for this paper is available here: https://github.com/culurciello/CL_paper1_code
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present the clustering learning technique applied to multi-layer feedforward deep neural networks. We show that this unsupervised learning technique can compute network filters with only a few minutes and a much reduced set of parameters. The goal of this paper is to promote the technique for general-purpose robotic vision systems. We report its use in static image datasets and object tracking datasets. We show that networks trained with clustering learning can outperform large networks trained for many hours on complex datasets.
[ { "version": "v1", "created": "Sun, 13 Jan 2013 20:49:30 GMT" }, { "version": "v2", "created": "Wed, 23 Jan 2013 14:53:21 GMT" }, { "version": "v3", "created": "Wed, 13 Mar 2013 22:48:38 GMT" } ]
2013-03-15T00:00:00
[ [ "Culurciello", "Eugenio", "" ], [ "Bates", "Jordan", "" ], [ "Dundar", "Aysegul", "" ], [ "Carrasco", "Jose", "" ], [ "Farabet", "Clement", "" ] ]
TITLE: Clustering Learning for Robotic Vision ABSTRACT: We present the clustering learning technique applied to multi-layer feedforward deep neural networks. We show that this unsupervised learning technique can compute network filters with only a few minutes and a much reduced set of parameters. The goal of this paper is to promote the technique for general-purpose robotic vision systems. We report its use in static image datasets and object tracking datasets. We show that networks trained with clustering learning can outperform large networks trained for many hours on complex datasets.
no_new_dataset
0.7116
1301.3572
Camille Couprie
Camille Couprie, Cl\'ement Farabet, Laurent Najman and Yann LeCun
Indoor Semantic Segmentation using depth information
8 pages, 3 figures
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This work addresses multi-class segmentation of indoor scenes with RGB-D inputs. While this area of research has gained much attention recently, most works still rely on hand-crafted features. In contrast, we apply a multiscale convolutional network to learn features directly from the images and the depth information. We obtain state-of-the-art on the NYU-v2 depth dataset with an accuracy of 64.5%. We illustrate the labeling of indoor scenes in videos sequences that could be processed in real-time using appropriate hardware such as an FPGA.
[ { "version": "v1", "created": "Wed, 16 Jan 2013 03:31:30 GMT" }, { "version": "v2", "created": "Thu, 14 Mar 2013 18:18:17 GMT" } ]
2013-03-15T00:00:00
[ [ "Couprie", "Camille", "" ], [ "Farabet", "Clément", "" ], [ "Najman", "Laurent", "" ], [ "LeCun", "Yann", "" ] ]
TITLE: Indoor Semantic Segmentation using depth information ABSTRACT: This work addresses multi-class segmentation of indoor scenes with RGB-D inputs. While this area of research has gained much attention recently, most works still rely on hand-crafted features. In contrast, we apply a multiscale convolutional network to learn features directly from the images and the depth information. We obtain state-of-the-art on the NYU-v2 depth dataset with an accuracy of 64.5%. We illustrate the labeling of indoor scenes in videos sequences that could be processed in real-time using appropriate hardware such as an FPGA.
no_new_dataset
0.712057
1303.3517
Yingyi Bu Yingyi Bu
Joshua Rosen, Neoklis Polyzotis, Vinayak Borkar, Yingyi Bu, Michael J. Carey, Markus Weimer, Tyson Condie, Raghu Ramakrishnan
Iterative MapReduce for Large Scale Machine Learning
null
null
null
null
cs.DC cs.DB cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Large datasets ("Big Data") are becoming ubiquitous because the potential value in deriving insights from data, across a wide range of business and scientific applications, is increasingly recognized. In particular, machine learning - one of the foundational disciplines for data analysis, summarization and inference - on Big Data has become routine at most organizations that operate large clouds, usually based on systems such as Hadoop that support the MapReduce programming paradigm. It is now widely recognized that while MapReduce is highly scalable, it suffers from a critical weakness for machine learning: it does not support iteration. Consequently, one has to program around this limitation, leading to fragile, inefficient code. Further, reliance on the programmer is inherently flawed in a multi-tenanted cloud environment, since the programmer does not have visibility into the state of the system when his or her program executes. Prior work has sought to address this problem by either developing specialized systems aimed at stylized applications, or by augmenting MapReduce with ad hoc support for saving state across iterations (driven by an external loop). In this paper, we advocate support for looping as a first-class construct, and propose an extension of the MapReduce programming paradigm called {\em Iterative MapReduce}. We then develop an optimizer for a class of Iterative MapReduce programs that cover most machine learning techniques, provide theoretical justifications for the key optimization steps, and empirically demonstrate that system-optimized programs for significant machine learning tasks are competitive with state-of-the-art specialized solutions.
[ { "version": "v1", "created": "Wed, 13 Mar 2013 04:24:12 GMT" } ]
2013-03-15T00:00:00
[ [ "Rosen", "Joshua", "" ], [ "Polyzotis", "Neoklis", "" ], [ "Borkar", "Vinayak", "" ], [ "Bu", "Yingyi", "" ], [ "Carey", "Michael J.", "" ], [ "Weimer", "Markus", "" ], [ "Condie", "Tyson", "" ], [ "Ramakrishnan", "Raghu", "" ] ]
TITLE: Iterative MapReduce for Large Scale Machine Learning ABSTRACT: Large datasets ("Big Data") are becoming ubiquitous because the potential value in deriving insights from data, across a wide range of business and scientific applications, is increasingly recognized. In particular, machine learning - one of the foundational disciplines for data analysis, summarization and inference - on Big Data has become routine at most organizations that operate large clouds, usually based on systems such as Hadoop that support the MapReduce programming paradigm. It is now widely recognized that while MapReduce is highly scalable, it suffers from a critical weakness for machine learning: it does not support iteration. Consequently, one has to program around this limitation, leading to fragile, inefficient code. Further, reliance on the programmer is inherently flawed in a multi-tenanted cloud environment, since the programmer does not have visibility into the state of the system when his or her program executes. Prior work has sought to address this problem by either developing specialized systems aimed at stylized applications, or by augmenting MapReduce with ad hoc support for saving state across iterations (driven by an external loop). In this paper, we advocate support for looping as a first-class construct, and propose an extension of the MapReduce programming paradigm called {\em Iterative MapReduce}. We then develop an optimizer for a class of Iterative MapReduce programs that cover most machine learning techniques, provide theoretical justifications for the key optimization steps, and empirically demonstrate that system-optimized programs for significant machine learning tasks are competitive with state-of-the-art specialized solutions.
no_new_dataset
0.706589
1303.3164
Uma Sawant
Uma Sawant and Soumen Chakrabarti
Features and Aggregators for Web-scale Entity Search
10 pages, 12 figures including tables
null
null
null
cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We focus on two research issues in entity search: scoring a document or snippet that potentially supports a candidate entity, and aggregating scores from different snippets into an entity score. Proximity scoring has been studied in IR outside the scope of entity search. However, aggregation has been hardwired except in a few cases where probabilistic language models are used. We instead explore simple, robust, discriminative ranking algorithms, with informative snippet features and broad families of aggregation functions. Our first contribution is a study of proximity-cognizant snippet features. In contrast with prior work which uses hardwired "proximity kernels" that implement a fixed decay with distance, we present a "universal" feature encoding which jointly expresses the perplexity (informativeness) of a query term match and the proximity of the match to the entity mention. Our second contribution is a study of aggregation functions. Rather than train the ranking algorithm on snippets and then aggregate scores, we directly train on entities such that the ranking algorithm takes into account the aggregation function being used. Our third contribution is an extensive Web-scale evaluation of the above algorithms on two data sets having quite different properties and behavior. The first one is the W3C dataset used in TREC-scale enterprise search, with pre-annotated entity mentions. The second is a Web-scale open-domain entity search dataset consisting of 500 million Web pages, which contain about 8 billion token spans annotated automatically with two million entities from 200,000 entity types in Wikipedia. On the TREC dataset, the performance of our system is comparable to the currently prevalent systems. On the much larger and noisier Web dataset, our system delivers significantly better performance than all other systems, with 8% MAP improvement over the closest competitor.
[ { "version": "v1", "created": "Wed, 13 Mar 2013 14:06:49 GMT" } ]
2013-03-14T00:00:00
[ [ "Sawant", "Uma", "" ], [ "Chakrabarti", "Soumen", "" ] ]
TITLE: Features and Aggregators for Web-scale Entity Search ABSTRACT: We focus on two research issues in entity search: scoring a document or snippet that potentially supports a candidate entity, and aggregating scores from different snippets into an entity score. Proximity scoring has been studied in IR outside the scope of entity search. However, aggregation has been hardwired except in a few cases where probabilistic language models are used. We instead explore simple, robust, discriminative ranking algorithms, with informative snippet features and broad families of aggregation functions. Our first contribution is a study of proximity-cognizant snippet features. In contrast with prior work which uses hardwired "proximity kernels" that implement a fixed decay with distance, we present a "universal" feature encoding which jointly expresses the perplexity (informativeness) of a query term match and the proximity of the match to the entity mention. Our second contribution is a study of aggregation functions. Rather than train the ranking algorithm on snippets and then aggregate scores, we directly train on entities such that the ranking algorithm takes into account the aggregation function being used. Our third contribution is an extensive Web-scale evaluation of the above algorithms on two data sets having quite different properties and behavior. The first one is the W3C dataset used in TREC-scale enterprise search, with pre-annotated entity mentions. The second is a Web-scale open-domain entity search dataset consisting of 500 million Web pages, which contain about 8 billion token spans annotated automatically with two million entities from 200,000 entity types in Wikipedia. On the TREC dataset, the performance of our system is comparable to the currently prevalent systems. On the much larger and noisier Web dataset, our system delivers significantly better performance than all other systems, with 8% MAP improvement over the closest competitor.
new_dataset
0.623377
1303.3229
Radu Dragusin
Radu Dragusin (1 and 2), Paula Petcu (1 and 3), Christina Lioma (1 and 2), Birger Larsen (4), Henrik L. J{\o}rgensen (5), Ingemar J. Cox (1 and 6), Lars Kai Hansen (1), Peter Ingwersen (4), Ole Winther (1) ((1) DTU Compute, Technical University of Denmark, Denmark, (2) Department of Computer Science, University of Copenhagen, Denmark, (3) Findwise, Copenhagen, Denmark, (4) Information Systems and Interaction Design, Royal School of Library and Information Science, Copenhagen, Denmark, (5) Department of Clinical Biochemistry, Bispebjerg Hospital, Copenhagen, Denmark, (6) Department of Computer Science, University College London, London, United Kingdom)
FindZebra: A search engine for rare diseases
null
International Journal of Medical Informatics, Available online 23 February 2013, ISSN 1386-5056
10.1016/j.ijmedinf.2013.01.005
null
cs.IR cs.DL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Background: The web has become a primary information resource about illnesses and treatments for both medical and non-medical users. Standard web search is by far the most common interface for such information. It is therefore of interest to find out how well web search engines work for diagnostic queries and what factors contribute to successes and failures. Among diseases, rare (or orphan) diseases represent an especially challenging and thus interesting class to diagnose as each is rare, diverse in symptoms and usually has scattered resources associated with it. Methods: We use an evaluation approach for web search engines for rare disease diagnosis which includes 56 real life diagnostic cases, state-of-the-art evaluation measures, and curated information resources. In addition, we introduce FindZebra, a specialized (vertical) rare disease search engine. FindZebra is powered by open source search technology and uses curated freely available online medical information. Results: FindZebra outperforms Google Search in both default setup and customised to the resources used by FindZebra. We extend FindZebra with specialized functionalities exploiting medical ontological information and UMLS medical concepts to demonstrate different ways of displaying the retrieved results to medical experts. Conclusions: Our results indicate that a specialized search engine can improve the diagnostic quality without compromising the ease of use of the currently widely popular web search engines. The proposed evaluation approach can be valuable for future development and benchmarking. The FindZebra search engine is available at http://www.findzebra.com/.
[ { "version": "v1", "created": "Wed, 13 Mar 2013 17:47:57 GMT" } ]
2013-03-14T00:00:00
[ [ "Dragusin", "Radu", "", "1 and 2" ], [ "Petcu", "Paula", "", "1 and 3" ], [ "Lioma", "Christina", "", "1 and\n 2" ], [ "Larsen", "Birger", "", "1 and 6" ], [ "Jørgensen", "Henrik L.", "", "1 and 6" ], [ "Cox", "Ingemar J.", "", "1 and 6" ], [ "Hansen", "Lars Kai", "" ], [ "Ingwersen", "Peter", "" ], [ "Winther", "Ole", "" ] ]
TITLE: FindZebra: A search engine for rare diseases ABSTRACT: Background: The web has become a primary information resource about illnesses and treatments for both medical and non-medical users. Standard web search is by far the most common interface for such information. It is therefore of interest to find out how well web search engines work for diagnostic queries and what factors contribute to successes and failures. Among diseases, rare (or orphan) diseases represent an especially challenging and thus interesting class to diagnose as each is rare, diverse in symptoms and usually has scattered resources associated with it. Methods: We use an evaluation approach for web search engines for rare disease diagnosis which includes 56 real life diagnostic cases, state-of-the-art evaluation measures, and curated information resources. In addition, we introduce FindZebra, a specialized (vertical) rare disease search engine. FindZebra is powered by open source search technology and uses curated freely available online medical information. Results: FindZebra outperforms Google Search in both default setup and customised to the resources used by FindZebra. We extend FindZebra with specialized functionalities exploiting medical ontological information and UMLS medical concepts to demonstrate different ways of displaying the retrieved results to medical experts. Conclusions: Our results indicate that a specialized search engine can improve the diagnostic quality without compromising the ease of use of the currently widely popular web search engines. The proposed evaluation approach can be valuable for future development and benchmarking. The FindZebra search engine is available at http://www.findzebra.com/.
no_new_dataset
0.705417
1303.2751
Togerchety Hitendra sarma
Mallikarjun Hangarge
Gaussian Mixture Model for Handwritten Script Identification
Appeared in ICECIT-2012
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents a Gaussian Mixture Model (GMM) to identify the script of handwritten words of Roman, Devanagari, Kannada and Telugu scripts. It emphasizes the significance of directional energies for identification of script of the word. It is robust to varied image sizes and different styles of writing. A GMM is modeled using a set of six novel features derived from directional energy distributions of the underlying image. The standard deviation of directional energy distributions are computed by decomposing an image matrix into right and left diagonals. Furthermore, deviation of horizontal and vertical distributions of energies is also built-in to GMM. A dataset of 400 images out of 800 (200 of each script) are used for training GMM and the remaining is for testing. An exhaustive experimentation is carried out at bi-script, tri-script and multi-script level and achieved script identification accuracies in percentage as 98.7, 98.16 and 96.91 respectively.
[ { "version": "v1", "created": "Tue, 12 Mar 2013 02:32:02 GMT" } ]
2013-03-13T00:00:00
[ [ "Hangarge", "Mallikarjun", "" ] ]
TITLE: Gaussian Mixture Model for Handwritten Script Identification ABSTRACT: This paper presents a Gaussian Mixture Model (GMM) to identify the script of handwritten words of Roman, Devanagari, Kannada and Telugu scripts. It emphasizes the significance of directional energies for identification of script of the word. It is robust to varied image sizes and different styles of writing. A GMM is modeled using a set of six novel features derived from directional energy distributions of the underlying image. The standard deviation of directional energy distributions are computed by decomposing an image matrix into right and left diagonals. Furthermore, deviation of horizontal and vertical distributions of energies is also built-in to GMM. A dataset of 400 images out of 800 (200 of each script) are used for training GMM and the remaining is for testing. An exhaustive experimentation is carried out at bi-script, tri-script and multi-script level and achieved script identification accuracies in percentage as 98.7, 98.16 and 96.91 respectively.
no_new_dataset
0.710245
1303.2783
Conrad Sanderson
Conrad Sanderson, Mehrtash T. Harandi, Yongkang Wong, Brian C. Lovell
Combined Learning of Salient Local Descriptors and Distance Metrics for Image Set Face Verification
null
IEEE International Conference on Advanced Video and Signal-Based Surveillance (AVSS), pp, 294-299, 2012
10.1109/AVSS.2012.23
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In contrast to comparing faces via single exemplars, matching sets of face images increases robustness and discrimination performance. Recent image set matching approaches typically measure similarities between subspaces or manifolds, while representing faces in a rigid and holistic manner. Such representations are easily affected by variations in terms of alignment, illumination, pose and expression. While local feature based representations are considerably more robust to such variations, they have received little attention within the image set matching area. We propose a novel image set matching technique, comprised of three aspects: (i) robust descriptors of face regions based on local features, partly inspired by the hierarchy in the human visual system, (ii) use of several subspace and exemplar metrics to compare corresponding face regions, (iii) jointly learning which regions are the most discriminative while finding the optimal mixing weights for combining metrics. Face recognition experiments on LFW, PIE and MOBIO face datasets show that the proposed algorithm obtains considerably better performance than several recent state-of-the-art techniques, such as Local Principal Angle and the Kernel Affine Hull Method.
[ { "version": "v1", "created": "Tue, 12 Mar 2013 06:12:59 GMT" } ]
2013-03-13T00:00:00
[ [ "Sanderson", "Conrad", "" ], [ "Harandi", "Mehrtash T.", "" ], [ "Wong", "Yongkang", "" ], [ "Lovell", "Brian C.", "" ] ]
TITLE: Combined Learning of Salient Local Descriptors and Distance Metrics for Image Set Face Verification ABSTRACT: In contrast to comparing faces via single exemplars, matching sets of face images increases robustness and discrimination performance. Recent image set matching approaches typically measure similarities between subspaces or manifolds, while representing faces in a rigid and holistic manner. Such representations are easily affected by variations in terms of alignment, illumination, pose and expression. While local feature based representations are considerably more robust to such variations, they have received little attention within the image set matching area. We propose a novel image set matching technique, comprised of three aspects: (i) robust descriptors of face regions based on local features, partly inspired by the hierarchy in the human visual system, (ii) use of several subspace and exemplar metrics to compare corresponding face regions, (iii) jointly learning which regions are the most discriminative while finding the optimal mixing weights for combining metrics. Face recognition experiments on LFW, PIE and MOBIO face datasets show that the proposed algorithm obtains considerably better performance than several recent state-of-the-art techniques, such as Local Principal Angle and the Kernel Affine Hull Method.
no_new_dataset
0.710791
1209.2178
Sutanay Choudhury
Sutanay Choudhury, Lawrence B. Holder, Abhik Ray, George Chin Jr., John T. Feo
Continuous Queries for Multi-Relational Graphs
Withdrawn because for information disclosure considerations
null
null
PNNL-SA-90326
cs.DB cs.SI
http://creativecommons.org/licenses/publicdomain/
Acting on time-critical events by processing ever growing social media or news streams is a major technical challenge. Many of these data sources can be modeled as multi-relational graphs. Continuous queries or techniques to search for rare events that typically arise in monitoring applications have been studied extensively for relational databases. This work is dedicated to answer the question that emerges naturally: how can we efficiently execute a continuous query on a dynamic graph? This paper presents an exact subgraph search algorithm that exploits the temporal characteristics of representative queries for online news or social media monitoring. The algorithm is based on a novel data structure called the Subgraph Join Tree (SJ-Tree) that leverages the structural and semantic characteristics of the underlying multi-relational graph. The paper concludes with extensive experimentation on several real-world datasets that demonstrates the validity of this approach.
[ { "version": "v1", "created": "Mon, 10 Sep 2012 23:23:16 GMT" }, { "version": "v2", "created": "Sat, 9 Mar 2013 00:28:38 GMT" } ]
2013-03-12T00:00:00
[ [ "Choudhury", "Sutanay", "" ], [ "Holder", "Lawrence B.", "" ], [ "Ray", "Abhik", "" ], [ "Chin", "George", "Jr." ], [ "Feo", "John T.", "" ] ]
TITLE: Continuous Queries for Multi-Relational Graphs ABSTRACT: Acting on time-critical events by processing ever growing social media or news streams is a major technical challenge. Many of these data sources can be modeled as multi-relational graphs. Continuous queries or techniques to search for rare events that typically arise in monitoring applications have been studied extensively for relational databases. This work is dedicated to answer the question that emerges naturally: how can we efficiently execute a continuous query on a dynamic graph? This paper presents an exact subgraph search algorithm that exploits the temporal characteristics of representative queries for online news or social media monitoring. The algorithm is based on a novel data structure called the Subgraph Join Tree (SJ-Tree) that leverages the structural and semantic characteristics of the underlying multi-relational graph. The paper concludes with extensive experimentation on several real-world datasets that demonstrates the validity of this approach.
no_new_dataset
0.708168
1302.6556
Theodoros Rekatsinas
Theodoros Rekatsinas, Amol Deshpande, Ashwin Machanavajjhala
On Sharing Private Data with Multiple Non-Colluding Adversaries
14 pages, 6 figures, 2 tables
null
null
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present SPARSI, a theoretical framework for partitioning sensitive data across multiple non-colluding adversaries. Most work in privacy-aware data sharing has considered disclosing summaries where the aggregate information about the data is preserved, but sensitive user information is protected. Nonetheless, there are applications, including online advertising, cloud computing and crowdsourcing markets, where detailed and fine-grained user-data must be disclosed. We consider a new data sharing paradigm and introduce the problem of privacy-aware data partitioning, where a sensitive dataset must be partitioned among k untrusted parties (adversaries). The goal is to maximize the utility derived by partitioning and distributing the dataset, while minimizing the amount of sensitive information disclosed. The data should be distributed so that an adversary, without colluding with other adversaries, cannot draw additional inferences about the private information, by linking together multiple pieces of information released to her. The assumption of no collusion is both reasonable and necessary in the above application domains that require release of private user information. SPARSI enables us to formally define privacy-aware data partitioning using the notion of sensitive properties for modeling private information and a hypergraph representation for describing the interdependencies between data entries and private information. We show that solving privacy-aware partitioning is, in general, NP-hard, but for specific information disclosure functions, good approximate solutions can be found using relaxation techniques. Finally, we present a local search algorithm applicable to generic information disclosure functions. We apply SPARSI together with the proposed algorithms on data from a real advertising scenario and show that we can partition data with no disclosure to any single advertiser.
[ { "version": "v1", "created": "Tue, 26 Feb 2013 19:49:55 GMT" }, { "version": "v2", "created": "Thu, 28 Feb 2013 20:48:52 GMT" }, { "version": "v3", "created": "Mon, 11 Mar 2013 15:41:40 GMT" } ]
2013-03-12T00:00:00
[ [ "Rekatsinas", "Theodoros", "" ], [ "Deshpande", "Amol", "" ], [ "Machanavajjhala", "Ashwin", "" ] ]
TITLE: On Sharing Private Data with Multiple Non-Colluding Adversaries ABSTRACT: We present SPARSI, a theoretical framework for partitioning sensitive data across multiple non-colluding adversaries. Most work in privacy-aware data sharing has considered disclosing summaries where the aggregate information about the data is preserved, but sensitive user information is protected. Nonetheless, there are applications, including online advertising, cloud computing and crowdsourcing markets, where detailed and fine-grained user-data must be disclosed. We consider a new data sharing paradigm and introduce the problem of privacy-aware data partitioning, where a sensitive dataset must be partitioned among k untrusted parties (adversaries). The goal is to maximize the utility derived by partitioning and distributing the dataset, while minimizing the amount of sensitive information disclosed. The data should be distributed so that an adversary, without colluding with other adversaries, cannot draw additional inferences about the private information, by linking together multiple pieces of information released to her. The assumption of no collusion is both reasonable and necessary in the above application domains that require release of private user information. SPARSI enables us to formally define privacy-aware data partitioning using the notion of sensitive properties for modeling private information and a hypergraph representation for describing the interdependencies between data entries and private information. We show that solving privacy-aware partitioning is, in general, NP-hard, but for specific information disclosure functions, good approximate solutions can be found using relaxation techniques. Finally, we present a local search algorithm applicable to generic information disclosure functions. We apply SPARSI together with the proposed algorithms on data from a real advertising scenario and show that we can partition data with no disclosure to any single advertiser.
no_new_dataset
0.708219
1303.0045
Bogdan State
Bogdan State, Patrick Park, Ingmar Weber, Yelena Mejova, Michael Macy
The Mesh of Civilizations and International Email Flows
10 pages, 3 figures
null
null
null
cs.SI physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In The Clash of Civilizations, Samuel Huntington argued that the primary axis of global conflict was no longer ideological or economic but cultural and religious, and that this division would characterize the "battle lines of the future." In contrast to the "top down" approach in previous research focused on the relations among nation states, we focused on the flows of interpersonal communication as a bottom-up view of international alignments. To that end, we mapped the locations of the world's countries in global email networks to see if we could detect cultural fault lines. Using IP-geolocation on a worldwide anonymized dataset obtained from a large Internet company, we constructed a global email network. In computing email flows we employ a novel rescaling procedure to account for differences due to uneven adoption of a particular Internet service across the world. Our analysis shows that email flows are consistent with Huntington's thesis. In addition to location in Huntington's "civilizations," our results also attest to the importance of both cultural and economic factors in the patterning of inter-country communication ties.
[ { "version": "v1", "created": "Thu, 28 Feb 2013 23:29:11 GMT" }, { "version": "v2", "created": "Sun, 10 Mar 2013 19:15:12 GMT" } ]
2013-03-12T00:00:00
[ [ "State", "Bogdan", "" ], [ "Park", "Patrick", "" ], [ "Weber", "Ingmar", "" ], [ "Mejova", "Yelena", "" ], [ "Macy", "Michael", "" ] ]
TITLE: The Mesh of Civilizations and International Email Flows ABSTRACT: In The Clash of Civilizations, Samuel Huntington argued that the primary axis of global conflict was no longer ideological or economic but cultural and religious, and that this division would characterize the "battle lines of the future." In contrast to the "top down" approach in previous research focused on the relations among nation states, we focused on the flows of interpersonal communication as a bottom-up view of international alignments. To that end, we mapped the locations of the world's countries in global email networks to see if we could detect cultural fault lines. Using IP-geolocation on a worldwide anonymized dataset obtained from a large Internet company, we constructed a global email network. In computing email flows we employ a novel rescaling procedure to account for differences due to uneven adoption of a particular Internet service across the world. Our analysis shows that email flows are consistent with Huntington's thesis. In addition to location in Huntington's "civilizations," our results also attest to the importance of both cultural and economic factors in the patterning of inter-country communication ties.
no_new_dataset
0.704376
1303.0381
Derrick Wing Kwan Ng Dr.
Derrick Wing Kwan Ng and Robert Schober
Spectral Efficient Optimization in OFDM Systems with Wireless Information and Power Transfer
Submitted to EUSIPCO 2013 (Invited paper)
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper considers an orthogonal frequency division multiplexing (OFDM) point-to-point wireless communication system with simultaneous wireless information and power transfer. We study a receiver which is able to harvest energy from the desired signal, noise, and interference. In particular, we consider a power splitting receiver which dynamically splits the received power into two power streams for information decoding and energy harvesting. We design power allocation algorithms maximizing the spectral efficiency (bit/s/Hz) of data transmission. In particular, the algorithm design is formulated as a nonconvex optimization problem which takes into account the constraint on the minimum power delivered to the receiver. The problem is solved by using convex optimization techniques and a one-dimensional search. The optimal power allocation algorithm serves as a system benchmark scheme due to its high complexity. To strike a balance between system performance and computational complexity, we also propose two suboptimal algorithms which require a low computational complexity. Simulation results demonstrate the excellent performance of the proposed suboptimal algorithms.
[ { "version": "v1", "created": "Sat, 2 Mar 2013 12:33:21 GMT" } ]
2013-03-12T00:00:00
[ [ "Ng", "Derrick Wing Kwan", "" ], [ "Schober", "Robert", "" ] ]
TITLE: Spectral Efficient Optimization in OFDM Systems with Wireless Information and Power Transfer ABSTRACT: This paper considers an orthogonal frequency division multiplexing (OFDM) point-to-point wireless communication system with simultaneous wireless information and power transfer. We study a receiver which is able to harvest energy from the desired signal, noise, and interference. In particular, we consider a power splitting receiver which dynamically splits the received power into two power streams for information decoding and energy harvesting. We design power allocation algorithms maximizing the spectral efficiency (bit/s/Hz) of data transmission. In particular, the algorithm design is formulated as a nonconvex optimization problem which takes into account the constraint on the minimum power delivered to the receiver. The problem is solved by using convex optimization techniques and a one-dimensional search. The optimal power allocation algorithm serves as a system benchmark scheme due to its high complexity. To strike a balance between system performance and computational complexity, we also propose two suboptimal algorithms which require a low computational complexity. Simulation results demonstrate the excellent performance of the proposed suboptimal algorithms.
no_new_dataset
0.707967
1303.2215
Maumita Bhattacharya
Maumita Bhattacharya
Expensive Optimisation: A Metaheuristics Perspective
7 pages
(IJACSA) International Journal of Advanced Computer Science and Applications,ISSN-2156-5570(Online, Vol. 4, No. 2, 2013, pp. 203-209
null
null
cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Stochastic, iterative search methods such as Evolutionary Algorithms (EAs) are proven to be efficient optimizers. However, they require evaluation of the candidate solutions which may be prohibitively expensive in many real world optimization problems. Use of approximate models or surrogates is being explored as a way to reduce the number of such evaluations. In this paper we investigated three such methods. The first method (DAFHEA) partially replaces an expensive function evaluation by its approximate model. The approximation is realized with support vector machine (SVM) regression models. The second method (DAFHEA II) is an enhancement on DAFHEA to accommodate for uncertain environments. The third one uses surrogate ranking with preference learning or ordinal regression. The fitness of the candidates is estimated by modeling their rank. The techniques' performances on some of the benchmark numerical optimization problems have been reported. The comparative benefits and shortcomings of both techniques have been identified.
[ { "version": "v1", "created": "Sat, 9 Mar 2013 14:41:24 GMT" } ]
2013-03-12T00:00:00
[ [ "Bhattacharya", "Maumita", "" ] ]
TITLE: Expensive Optimisation: A Metaheuristics Perspective ABSTRACT: Stochastic, iterative search methods such as Evolutionary Algorithms (EAs) are proven to be efficient optimizers. However, they require evaluation of the candidate solutions which may be prohibitively expensive in many real world optimization problems. Use of approximate models or surrogates is being explored as a way to reduce the number of such evaluations. In this paper we investigated three such methods. The first method (DAFHEA) partially replaces an expensive function evaluation by its approximate model. The approximation is realized with support vector machine (SVM) regression models. The second method (DAFHEA II) is an enhancement on DAFHEA to accommodate for uncertain environments. The third one uses surrogate ranking with preference learning or ordinal regression. The fitness of the candidates is estimated by modeling their rank. The techniques' performances on some of the benchmark numerical optimization problems have been reported. The comparative benefits and shortcomings of both techniques have been identified.
no_new_dataset
0.708792
1303.2277
Guilherme de Castro Mendes Gomes
Guilherme de Castro Mendes Gomes, Vitor Campos de Oliveira, Jussara Marques de Almeida and Marcos Andr\'e Gon\c{c}alves
Is Learning to Rank Worth It? A Statistical Analysis of Learning to Rank Methods
7 pages, 10 tables, 14 references. Original (short) paper published in the Brazilian Symposium on Databases, 2012 (SBBD2012). Current revision submitted to the Journal of Information and Data Management (JIDM)
null
null
null
cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Learning to Rank (L2R) research field has experienced a fast paced growth over the last few years, with a wide variety of benchmark datasets and baselines available for experimentation. We here investigate the main assumption behind this field, which is that, the use of sophisticated L2R algorithms and models, produce significant gains over more traditional and simple information retrieval approaches. Our experimental results surprisingly indicate that many L2R algorithms, when put up against the best individual features of each dataset, may not produce statistically significant differences, even if the absolute gains may seem large. We also find that most of the reported baselines are statistically tied, with no clear winner.
[ { "version": "v1", "created": "Sat, 9 Mar 2013 23:28:16 GMT" } ]
2013-03-12T00:00:00
[ [ "Gomes", "Guilherme de Castro Mendes", "" ], [ "de Oliveira", "Vitor Campos", "" ], [ "de Almeida", "Jussara Marques", "" ], [ "Gonçalves", "Marcos André", "" ] ]
TITLE: Is Learning to Rank Worth It? A Statistical Analysis of Learning to Rank Methods ABSTRACT: The Learning to Rank (L2R) research field has experienced a fast paced growth over the last few years, with a wide variety of benchmark datasets and baselines available for experimentation. We here investigate the main assumption behind this field, which is that, the use of sophisticated L2R algorithms and models, produce significant gains over more traditional and simple information retrieval approaches. Our experimental results surprisingly indicate that many L2R algorithms, when put up against the best individual features of each dataset, may not produce statistically significant differences, even if the absolute gains may seem large. We also find that most of the reported baselines are statistically tied, with no clear winner.
no_new_dataset
0.709655
1303.2465
Conrad Sanderson
Vikas Reddy, Conrad Sanderson, Brian C. Lovell
A Low-Complexity Algorithm for Static Background Estimation from Cluttered Image Sequences in Surveillance Contexts
null
EURASIP Journal on Image and Video Processing, 2011
10.1155/2011/164956
null
cs.CV
http://creativecommons.org/licenses/by/3.0/
For the purposes of foreground estimation, the true background model is unavailable in many practical circumstances and needs to be estimated from cluttered image sequences. We propose a sequential technique for static background estimation in such conditions, with low computational and memory requirements. Image sequences are analysed on a block-by-block basis. For each block location a representative set is maintained which contains distinct blocks obtained along its temporal line. The background estimation is carried out in a Markov Random Field framework, where the optimal labelling solution is computed using iterated conditional modes. The clique potentials are computed based on the combined frequency response of the candidate block and its neighbourhood. It is assumed that the most appropriate block results in the smoothest response, indirectly enforcing the spatial continuity of structures within a scene. Experiments on real-life surveillance videos demonstrate that the proposed method obtains considerably better background estimates (both qualitatively and quantitatively) than median filtering and the recently proposed "intervals of stable intensity" method. Further experiments on the Wallflower dataset suggest that the combination of the proposed method with a foreground segmentation algorithm results in improved foreground segmentation.
[ { "version": "v1", "created": "Mon, 11 Mar 2013 09:57:49 GMT" } ]
2013-03-12T00:00:00
[ [ "Reddy", "Vikas", "" ], [ "Sanderson", "Conrad", "" ], [ "Lovell", "Brian C.", "" ] ]
TITLE: A Low-Complexity Algorithm for Static Background Estimation from Cluttered Image Sequences in Surveillance Contexts ABSTRACT: For the purposes of foreground estimation, the true background model is unavailable in many practical circumstances and needs to be estimated from cluttered image sequences. We propose a sequential technique for static background estimation in such conditions, with low computational and memory requirements. Image sequences are analysed on a block-by-block basis. For each block location a representative set is maintained which contains distinct blocks obtained along its temporal line. The background estimation is carried out in a Markov Random Field framework, where the optimal labelling solution is computed using iterated conditional modes. The clique potentials are computed based on the combined frequency response of the candidate block and its neighbourhood. It is assumed that the most appropriate block results in the smoothest response, indirectly enforcing the spatial continuity of structures within a scene. Experiments on real-life surveillance videos demonstrate that the proposed method obtains considerably better background estimates (both qualitatively and quantitatively) than median filtering and the recently proposed "intervals of stable intensity" method. Further experiments on the Wallflower dataset suggest that the combination of the proposed method with a foreground segmentation algorithm results in improved foreground segmentation.
no_new_dataset
0.71123
1303.2593
Adeel Ansari
Adeel Ansari, Afza Bt Shafie, Abas B Md Said, Seema Ansari
Independent Component Analysis for Filtering Airwaves in Seabed Logging Application
7 pages, 13 figures
International Journal of Advanced Studies in Computers, Science and Engineering (IJASCSE), 2013
null
null
cs.OH physics.geo-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Marine controlled source electromagnetic (CSEM) sensing method used for the detection of hydrocarbons based reservoirs in seabed logging application does not perform well due to the presence of the airwaves (or sea-surface). These airwaves interfere with the signal that comes from the subsurface seafloor and also tend to dominate in the receiver response at larger offsets. The task is to identify these air waves and the way they interact, and to filter them out. In this paper, a popular method for counteracting with the above stated problem scenario is Independent Component Analysis (ICA). Independent component analysis (ICA) is a statistical method for transforming an observed multidimensional or multivariate dataset into its constituent components (sources) that are statistically as independent from each other as possible. ICA-type de-convolution algorithm that is FASTICA is considered for mixed signals de-convolution and considered convenient depending upon the nature of the source and noise model. The results from the FASTICA algorithm are shown and evaluated. In this paper, we present the FASTICA algorithm for the seabed logging application.
[ { "version": "v1", "created": "Mon, 4 Mar 2013 16:18:51 GMT" } ]
2013-03-12T00:00:00
[ [ "Ansari", "Adeel", "" ], [ "Shafie", "Afza Bt", "" ], [ "Said", "Abas B Md", "" ], [ "Ansari", "Seema", "" ] ]
TITLE: Independent Component Analysis for Filtering Airwaves in Seabed Logging Application ABSTRACT: Marine controlled source electromagnetic (CSEM) sensing method used for the detection of hydrocarbons based reservoirs in seabed logging application does not perform well due to the presence of the airwaves (or sea-surface). These airwaves interfere with the signal that comes from the subsurface seafloor and also tend to dominate in the receiver response at larger offsets. The task is to identify these air waves and the way they interact, and to filter them out. In this paper, a popular method for counteracting with the above stated problem scenario is Independent Component Analysis (ICA). Independent component analysis (ICA) is a statistical method for transforming an observed multidimensional or multivariate dataset into its constituent components (sources) that are statistically as independent from each other as possible. ICA-type de-convolution algorithm that is FASTICA is considered for mixed signals de-convolution and considered convenient depending upon the nature of the source and noise model. The results from the FASTICA algorithm are shown and evaluated. In this paper, we present the FASTICA algorithm for the seabed logging application.
no_new_dataset
0.713226
1303.1645
Rajdeep Mukherjee
Rajdeep Mukherjee, Priyankar Ghosh, Pallab Dasgupta and Ajit Pal
A Multi-objective Perspective for Operator Scheduling using Fine-grained DVS Architecture
18 pages, 6 figures, International journal of VLSI design & Communication Systems (VLSICS)
null
10.5121/vlsic.2013.4109
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The stringent power budget of fine grained power managed digital integrated circuits have driven chip designers to optimize power at the cost of area and delay, which were the traditional cost criteria for circuit optimization. The emerging scenario motivates us to revisit the classical operator scheduling problem under the availability of DVFS enabled functional units that can trade-off cycles with power. We study the design space defined due to this trade-off and present a branch-and-bound(B/B) algorithm to explore this state space and report the pareto-optimal front with respect to area and power. The scheduling also aims at maximum resource sharing and is able to attain sufficient area and power gains for complex benchmarks when timing constraints are relaxed by sufficient amount. Experimental results show that the algorithm that operates without any user constraint(area/power) is able to solve the problem for most available benchmarks, and the use of power budget or area budget constraints leads to significant performance gain.
[ { "version": "v1", "created": "Thu, 7 Mar 2013 10:51:08 GMT" } ]
2013-03-11T00:00:00
[ [ "Mukherjee", "Rajdeep", "" ], [ "Ghosh", "Priyankar", "" ], [ "Dasgupta", "Pallab", "" ], [ "Pal", "Ajit", "" ] ]
TITLE: A Multi-objective Perspective for Operator Scheduling using Fine-grained DVS Architecture ABSTRACT: The stringent power budget of fine grained power managed digital integrated circuits have driven chip designers to optimize power at the cost of area and delay, which were the traditional cost criteria for circuit optimization. The emerging scenario motivates us to revisit the classical operator scheduling problem under the availability of DVFS enabled functional units that can trade-off cycles with power. We study the design space defined due to this trade-off and present a branch-and-bound(B/B) algorithm to explore this state space and report the pareto-optimal front with respect to area and power. The scheduling also aims at maximum resource sharing and is able to attain sufficient area and power gains for complex benchmarks when timing constraints are relaxed by sufficient amount. Experimental results show that the algorithm that operates without any user constraint(area/power) is able to solve the problem for most available benchmarks, and the use of power budget or area budget constraints leads to significant performance gain.
no_new_dataset
0.708213
1104.5243
Georg Hager
Jan Treibig, Georg Hager, Hannes G. Hofmann, Joachim Hornegger, Gerhard Wellein
Pushing the limits for medical image reconstruction on recent standard multicore processors
13 pages, 9 figures. Revised and extended version
null
10.1177/1094342012442424
null
cs.PF cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Volume reconstruction by backprojection is the computational bottleneck in many interventional clinical computed tomography (CT) applications. Today vendors in this field replace special purpose hardware accelerators by standard hardware like multicore chips and GPGPUs. Medical imaging algorithms are on the verge of employing High Performance Computing (HPC) technology, and are therefore an interesting new candidate for optimization. This paper presents low-level optimizations for the backprojection algorithm, guided by a thorough performance analysis on four generations of Intel multicore processors (Harpertown, Westmere, Westmere EX, and Sandy Bridge). We choose the RabbitCT benchmark, a standardized testcase well supported in industry, to ensure transparent and comparable results. Our aim is to provide not only the fastest possible implementation but also compare to performance models and hardware counter data in order to fully understand the results. We separate the influence of algorithmic optimizations, parallelization, SIMD vectorization, and microarchitectural issues and pinpoint problems with current SIMD instruction set extensions on standard CPUs (SSE, AVX). The use of assembly language is mandatory for best performance. Finally we compare our results to the best GPGPU implementations available for this open competition benchmark.
[ { "version": "v1", "created": "Wed, 27 Apr 2011 20:31:11 GMT" }, { "version": "v2", "created": "Tue, 20 Sep 2011 15:41:17 GMT" } ]
2013-03-08T00:00:00
[ [ "Treibig", "Jan", "" ], [ "Hager", "Georg", "" ], [ "Hofmann", "Hannes G.", "" ], [ "Hornegger", "Joachim", "" ], [ "Wellein", "Gerhard", "" ] ]
TITLE: Pushing the limits for medical image reconstruction on recent standard multicore processors ABSTRACT: Volume reconstruction by backprojection is the computational bottleneck in many interventional clinical computed tomography (CT) applications. Today vendors in this field replace special purpose hardware accelerators by standard hardware like multicore chips and GPGPUs. Medical imaging algorithms are on the verge of employing High Performance Computing (HPC) technology, and are therefore an interesting new candidate for optimization. This paper presents low-level optimizations for the backprojection algorithm, guided by a thorough performance analysis on four generations of Intel multicore processors (Harpertown, Westmere, Westmere EX, and Sandy Bridge). We choose the RabbitCT benchmark, a standardized testcase well supported in industry, to ensure transparent and comparable results. Our aim is to provide not only the fastest possible implementation but also compare to performance models and hardware counter data in order to fully understand the results. We separate the influence of algorithmic optimizations, parallelization, SIMD vectorization, and microarchitectural issues and pinpoint problems with current SIMD instruction set extensions on standard CPUs (SSE, AVX). The use of assembly language is mandatory for best performance. Finally we compare our results to the best GPGPU implementations available for this open competition benchmark.
no_new_dataset
0.707992
1208.3719
Chris Thornton
Chris Thornton and Frank Hutter and Holger H. Hoos and Kevin Leyton-Brown
Auto-WEKA: Combined Selection and Hyperparameter Optimization of Classification Algorithms
9 pages, 3 figures
null
null
Technical Report TR-2012-05
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Many different machine learning algorithms exist; taking into account each algorithm's hyperparameters, there is a staggeringly large number of possible alternatives overall. We consider the problem of simultaneously selecting a learning algorithm and setting its hyperparameters, going beyond previous work that addresses these issues in isolation. We show that this problem can be addressed by a fully automated approach, leveraging recent innovations in Bayesian optimization. Specifically, we consider a wide range of feature selection techniques (combining 3 search and 8 evaluator methods) and all classification approaches implemented in WEKA, spanning 2 ensemble methods, 10 meta-methods, 27 base classifiers, and hyperparameter settings for each classifier. On each of 21 popular datasets from the UCI repository, the KDD Cup 09, variants of the MNIST dataset and CIFAR-10, we show classification performance often much better than using standard selection/hyperparameter optimization methods. We hope that our approach will help non-expert users to more effectively identify machine learning algorithms and hyperparameter settings appropriate to their applications, and hence to achieve improved performance.
[ { "version": "v1", "created": "Sat, 18 Aug 2012 02:14:47 GMT" }, { "version": "v2", "created": "Wed, 6 Mar 2013 23:27:04 GMT" } ]
2013-03-08T00:00:00
[ [ "Thornton", "Chris", "" ], [ "Hutter", "Frank", "" ], [ "Hoos", "Holger H.", "" ], [ "Leyton-Brown", "Kevin", "" ] ]
TITLE: Auto-WEKA: Combined Selection and Hyperparameter Optimization of Classification Algorithms ABSTRACT: Many different machine learning algorithms exist; taking into account each algorithm's hyperparameters, there is a staggeringly large number of possible alternatives overall. We consider the problem of simultaneously selecting a learning algorithm and setting its hyperparameters, going beyond previous work that addresses these issues in isolation. We show that this problem can be addressed by a fully automated approach, leveraging recent innovations in Bayesian optimization. Specifically, we consider a wide range of feature selection techniques (combining 3 search and 8 evaluator methods) and all classification approaches implemented in WEKA, spanning 2 ensemble methods, 10 meta-methods, 27 base classifiers, and hyperparameter settings for each classifier. On each of 21 popular datasets from the UCI repository, the KDD Cup 09, variants of the MNIST dataset and CIFAR-10, we show classification performance often much better than using standard selection/hyperparameter optimization methods. We hope that our approach will help non-expert users to more effectively identify machine learning algorithms and hyperparameter settings appropriate to their applications, and hence to achieve improved performance.
no_new_dataset
0.708023
1303.1585
Swaminathan Sankararaman
Swaminathan Sankararaman, Pankaj K. Agarwal, Thomas M{\o}lhave, Arnold P. Boedihardjo
Computing Similarity between a Pair of Trajectories
null
null
null
null
cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
With recent advances in sensing and tracking technology, trajectory data is becoming increasingly pervasive and analysis of trajectory data is becoming exceedingly important. A fundamental problem in analyzing trajectory data is that of identifying common patterns between pairs or among groups of trajectories. In this paper, we consider the problem of identifying similar portions between a pair of trajectories, each observed as a sequence of points sampled from it. We present new measures of trajectory similarity --- both local and global --- between a pair of trajectories to distinguish between similar and dissimilar portions. Our model is robust under noise and outliers, it does not make any assumptions on the sampling rates on either trajectory, and it works even if they are partially observed. Additionally, the model also yields a scalar similarity score which can be used to rank multiple pairs of trajectories according to similarity, e.g. in clustering applications. We also present efficient algorithms for computing the similarity under our measures; the worst-case running time is quadratic in the number of sample points. Finally, we present an extensive experimental study evaluating the effectiveness of our approach on real datasets, comparing with it with earlier approaches, and illustrating many issues that arise in trajectory data. Our experiments show that our approach is highly accurate in distinguishing similar and dissimilar portions as compared to earlier methods even with sparse sampling.
[ { "version": "v1", "created": "Thu, 7 Mar 2013 01:37:22 GMT" } ]
2013-03-08T00:00:00
[ [ "Sankararaman", "Swaminathan", "" ], [ "Agarwal", "Pankaj K.", "" ], [ "Mølhave", "Thomas", "" ], [ "Boedihardjo", "Arnold P.", "" ] ]
TITLE: Computing Similarity between a Pair of Trajectories ABSTRACT: With recent advances in sensing and tracking technology, trajectory data is becoming increasingly pervasive and analysis of trajectory data is becoming exceedingly important. A fundamental problem in analyzing trajectory data is that of identifying common patterns between pairs or among groups of trajectories. In this paper, we consider the problem of identifying similar portions between a pair of trajectories, each observed as a sequence of points sampled from it. We present new measures of trajectory similarity --- both local and global --- between a pair of trajectories to distinguish between similar and dissimilar portions. Our model is robust under noise and outliers, it does not make any assumptions on the sampling rates on either trajectory, and it works even if they are partially observed. Additionally, the model also yields a scalar similarity score which can be used to rank multiple pairs of trajectories according to similarity, e.g. in clustering applications. We also present efficient algorithms for computing the similarity under our measures; the worst-case running time is quadratic in the number of sample points. Finally, we present an extensive experimental study evaluating the effectiveness of our approach on real datasets, comparing with it with earlier approaches, and illustrating many issues that arise in trajectory data. Our experiments show that our approach is highly accurate in distinguishing similar and dissimilar portions as compared to earlier methods even with sparse sampling.
no_new_dataset
0.710176
1303.1741
Emilio Ferrara
Pasquale De Meo, Emilio Ferrara, Giacomo Fiumara, Alessandro Provetti
Enhancing community detection using a network weighting strategy
28 pages, 2 figures
Information Sciences, 222:648-668, 2013
10.1016/j.ins.2012.08.001
null
cs.SI cs.DS physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A community within a network is a group of vertices densely connected to each other but less connected to the vertices outside. The problem of detecting communities in large networks plays a key role in a wide range of research areas, e.g. Computer Science, Biology and Sociology. Most of the existing algorithms to find communities count on the topological features of the network and often do not scale well on large, real-life instances. In this article we propose a strategy to enhance existing community detection algorithms by adding a pre-processing step in which edges are weighted according to their centrality w.r.t. the network topology. In our approach, the centrality of an edge reflects its contribute to making arbitrary graph tranversals, i.e., spreading messages over the network, as short as possible. Our strategy is able to effectively complements information about network topology and it can be used as an additional tool to enhance community detection. The computation of edge centralities is carried out by performing multiple random walks of bounded length on the network. Our method makes the computation of edge centralities feasible also on large-scale networks. It has been tested in conjunction with three state-of-the-art community detection algorithms, namely the Louvain method, COPRA and OSLOM. Experimental results show that our method raises the accuracy of existing algorithms both on synthetic and real-life datasets.
[ { "version": "v1", "created": "Thu, 7 Mar 2013 16:43:30 GMT" } ]
2013-03-08T00:00:00
[ [ "De Meo", "Pasquale", "" ], [ "Ferrara", "Emilio", "" ], [ "Fiumara", "Giacomo", "" ], [ "Provetti", "Alessandro", "" ] ]
TITLE: Enhancing community detection using a network weighting strategy ABSTRACT: A community within a network is a group of vertices densely connected to each other but less connected to the vertices outside. The problem of detecting communities in large networks plays a key role in a wide range of research areas, e.g. Computer Science, Biology and Sociology. Most of the existing algorithms to find communities count on the topological features of the network and often do not scale well on large, real-life instances. In this article we propose a strategy to enhance existing community detection algorithms by adding a pre-processing step in which edges are weighted according to their centrality w.r.t. the network topology. In our approach, the centrality of an edge reflects its contribute to making arbitrary graph tranversals, i.e., spreading messages over the network, as short as possible. Our strategy is able to effectively complements information about network topology and it can be used as an additional tool to enhance community detection. The computation of edge centralities is carried out by performing multiple random walks of bounded length on the network. Our method makes the computation of edge centralities feasible also on large-scale networks. It has been tested in conjunction with three state-of-the-art community detection algorithms, namely the Louvain method, COPRA and OSLOM. Experimental results show that our method raises the accuracy of existing algorithms both on synthetic and real-life datasets.
no_new_dataset
0.711387
1303.1747
Emilio Ferrara
Pasquale De Meo, Emilio Ferrara, Giacomo Fiumara, Angela Ricciardello
A Novel Measure of Edge Centrality in Social Networks
28 pages, 5 figures
Knowledge-based Systems, 30:136-150, 2012
10.1016/j.knosys.2012.01.007
null
cs.SI cs.DS physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The problem of assigning centrality values to nodes and edges in graphs has been widely investigated during last years. Recently, a novel measure of node centrality has been proposed, called k-path centrality index, which is based on the propagation of messages inside a network along paths consisting of at most k edges. On the other hand, the importance of computing the centrality of edges has been put into evidence since 1970's by Anthonisse and, subsequently by Girvan and Newman. In this work we propose the generalization of the concept of k-path centrality by defining the k-path edge centrality, a measure of centrality introduced to compute the importance of edges. We provide an efficient algorithm, running in O(k m), being m the number of edges in the graph. Thus, our technique is feasible for large scale network analysis. Finally, the performance of our algorithm is analyzed, discussing the results obtained against large online social network datasets.
[ { "version": "v1", "created": "Thu, 7 Mar 2013 16:54:34 GMT" } ]
2013-03-08T00:00:00
[ [ "De Meo", "Pasquale", "" ], [ "Ferrara", "Emilio", "" ], [ "Fiumara", "Giacomo", "" ], [ "Ricciardello", "Angela", "" ] ]
TITLE: A Novel Measure of Edge Centrality in Social Networks ABSTRACT: The problem of assigning centrality values to nodes and edges in graphs has been widely investigated during last years. Recently, a novel measure of node centrality has been proposed, called k-path centrality index, which is based on the propagation of messages inside a network along paths consisting of at most k edges. On the other hand, the importance of computing the centrality of edges has been put into evidence since 1970's by Anthonisse and, subsequently by Girvan and Newman. In this work we propose the generalization of the concept of k-path centrality by defining the k-path edge centrality, a measure of centrality introduced to compute the importance of edges. We provide an efficient algorithm, running in O(k m), being m the number of edges in the graph. Thus, our technique is feasible for large scale network analysis. Finally, the performance of our algorithm is analyzed, discussing the results obtained against large online social network datasets.
no_new_dataset
0.710641
1303.1243
M.M.A. Hashem
Md. Amjad Hossain, Md. Kawser Hossain, and M.M.A. Hashem
A Generalized Hybrid Real-Coded Quantum Evolutionary Algorithm Based on Particle Swarm Theory with Arithmetic Crossover
http://airccse.org/journal/jcsit/0810ijcsit15.pdf
International Journal of Computers Science and Information Technology (IJCSIT), Vol. 2, No. 4, pp.172-187, (2010)
10.5121/ijcsit.2010.2415
null
cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper proposes a generalized Hybrid Real-coded Quantum Evolutionary Algorithm (HRCQEA) for optimizing complex functions as well as combinatorial optimization. The main idea of HRCQEA is to devise a new technique for mutation and crossover operators. Using the evolutionary equation of PSO a Single-Multiple gene Mutation (SMM) is designed and the concept of Arithmetic Crossover (AC) is used in the new Crossover operator. In HRCQEA, each triploid chromosome represents a particle and the position of the particle is updated using SMM and Quantum Rotation Gate (QRG), which can make the balance between exploration and exploitation. Crossover is employed to expand the search space, Hill Climbing Selection (HCS) and elitism help to accelerate the convergence speed. Simulation results on Knapsack Problem and five benchmark complex functions with high dimension show that HRCQEA performs better in terms of ability to discover the global optimum and convergence speed.
[ { "version": "v1", "created": "Wed, 6 Mar 2013 02:55:20 GMT" } ]
2013-03-07T00:00:00
[ [ "Hossain", "Md. Amjad", "" ], [ "Hossain", "Md. Kawser", "" ], [ "Hashem", "M. M. A.", "" ] ]
TITLE: A Generalized Hybrid Real-Coded Quantum Evolutionary Algorithm Based on Particle Swarm Theory with Arithmetic Crossover ABSTRACT: This paper proposes a generalized Hybrid Real-coded Quantum Evolutionary Algorithm (HRCQEA) for optimizing complex functions as well as combinatorial optimization. The main idea of HRCQEA is to devise a new technique for mutation and crossover operators. Using the evolutionary equation of PSO a Single-Multiple gene Mutation (SMM) is designed and the concept of Arithmetic Crossover (AC) is used in the new Crossover operator. In HRCQEA, each triploid chromosome represents a particle and the position of the particle is updated using SMM and Quantum Rotation Gate (QRG), which can make the balance between exploration and exploitation. Crossover is employed to expand the search space, Hill Climbing Selection (HCS) and elitism help to accelerate the convergence speed. Simulation results on Knapsack Problem and five benchmark complex functions with high dimension show that HRCQEA performs better in terms of ability to discover the global optimum and convergence speed.
no_new_dataset
0.712013
1303.1280
Remi Lajugie
R\'emi Lajugie (LIENS), Sylvain Arlot (LIENS), Francis Bach (LIENS)
Large-Margin Metric Learning for Partitioning Problems
null
null
null
null
cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we consider unsupervised partitioning problems, such as clustering, image segmentation, video segmentation and other change-point detection problems. We focus on partitioning problems based explicitly or implicitly on the minimization of Euclidean distortions, which include mean-based change-point detection, K-means, spectral clustering and normalized cuts. Our main goal is to learn a Mahalanobis metric for these unsupervised problems, leading to feature weighting and/or selection. This is done in a supervised way by assuming the availability of several potentially partially labelled datasets that share the same metric. We cast the metric learning problem as a large-margin structured prediction problem, with proper definition of regularizers and losses, leading to a convex optimization problem which can be solved efficiently with iterative techniques. We provide experiments where we show how learning the metric may significantly improve the partitioning performance in synthetic examples, bioinformatics, video segmentation and image segmentation problems.
[ { "version": "v1", "created": "Wed, 6 Mar 2013 09:23:45 GMT" } ]
2013-03-07T00:00:00
[ [ "Lajugie", "Rémi", "", "LIENS" ], [ "Arlot", "Sylvain", "", "LIENS" ], [ "Bach", "Francis", "", "LIENS" ] ]
TITLE: Large-Margin Metric Learning for Partitioning Problems ABSTRACT: In this paper, we consider unsupervised partitioning problems, such as clustering, image segmentation, video segmentation and other change-point detection problems. We focus on partitioning problems based explicitly or implicitly on the minimization of Euclidean distortions, which include mean-based change-point detection, K-means, spectral clustering and normalized cuts. Our main goal is to learn a Mahalanobis metric for these unsupervised problems, leading to feature weighting and/or selection. This is done in a supervised way by assuming the availability of several potentially partially labelled datasets that share the same metric. We cast the metric learning problem as a large-margin structured prediction problem, with proper definition of regularizers and losses, leading to a convex optimization problem which can be solved efficiently with iterative techniques. We provide experiments where we show how learning the metric may significantly improve the partitioning performance in synthetic examples, bioinformatics, video segmentation and image segmentation problems.
no_new_dataset
0.712045
1103.2068
Tamara Kolda
Justin D. Basilico and M. Arthur Munson and Tamara G. Kolda and Kevin R. Dixon and W. Philip Kegelmeyer
COMET: A Recipe for Learning and Using Large Ensembles on Massive Data
null
ICDM 2011: Proceedings of the 2011 IEEE International Conference on Data Mining, pp. 41-50, 2011
10.1109/ICDM.2011.39
null
cs.LG cs.DC stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
COMET is a single-pass MapReduce algorithm for learning on large-scale data. It builds multiple random forest ensembles on distributed blocks of data and merges them into a mega-ensemble. This approach is appropriate when learning from massive-scale data that is too large to fit on a single machine. To get the best accuracy, IVoting should be used instead of bagging to generate the training subset for each decision tree in the random forest. Experiments with two large datasets (5GB and 50GB compressed) show that COMET compares favorably (in both accuracy and training time) to learning on a subsample of data using a serial algorithm. Finally, we propose a new Gaussian approach for lazy ensemble evaluation which dynamically decides how many ensemble members to evaluate per data point; this can reduce evaluation cost by 100X or more.
[ { "version": "v1", "created": "Thu, 10 Mar 2011 16:15:42 GMT" }, { "version": "v2", "created": "Thu, 8 Sep 2011 16:20:45 GMT" } ]
2013-03-06T00:00:00
[ [ "Basilico", "Justin D.", "" ], [ "Munson", "M. Arthur", "" ], [ "Kolda", "Tamara G.", "" ], [ "Dixon", "Kevin R.", "" ], [ "Kegelmeyer", "W. Philip", "" ] ]
TITLE: COMET: A Recipe for Learning and Using Large Ensembles on Massive Data ABSTRACT: COMET is a single-pass MapReduce algorithm for learning on large-scale data. It builds multiple random forest ensembles on distributed blocks of data and merges them into a mega-ensemble. This approach is appropriate when learning from massive-scale data that is too large to fit on a single machine. To get the best accuracy, IVoting should be used instead of bagging to generate the training subset for each decision tree in the random forest. Experiments with two large datasets (5GB and 50GB compressed) show that COMET compares favorably (in both accuracy and training time) to learning on a subsample of data using a serial algorithm. Finally, we propose a new Gaussian approach for lazy ensemble evaluation which dynamically decides how many ensemble members to evaluate per data point; this can reduce evaluation cost by 100X or more.
no_new_dataset
0.709447
1208.4289
Marcelo Serraro Zanetti
Marcelo Serrano Zanetti, Emre Sarigol, Ingo Scholtes, Claudio Juan Tessone, Frank Schweitzer
A Quantitative Study of Social Organisation in Open Source Software Communities
null
ICCSW 2012, pp. 116--122
10.4230/OASIcs.ICCSW.2012.116
null
cs.SE cs.SI nlin.AO physics.soc-ph
http://creativecommons.org/licenses/by/3.0/
The success of open source projects crucially depends on the voluntary contributions of a sufficiently large community of users. Apart from the mere size of the community, interesting questions arise when looking at the evolution of structural features of collaborations between community members. In this article, we discuss several network analytic proxies that can be used to quantify different aspects of the social organisation in social collaboration networks. We particularly focus on measures that can be related to the cohesiveness of the communities, the distribution of responsibilities and the resilience against turnover of community members. We present a comparative analysis on a large-scale dataset that covers the full history of collaborations between users of 14 major open source software communities. Our analysis covers both aggregate and time-evolving measures and highlights differences in the social organisation across communities. We argue that our results are a promising step towards the definition of suitable, potentially multi-dimensional, resilience and risk indicators for open source software communities.
[ { "version": "v1", "created": "Tue, 21 Aug 2012 15:34:35 GMT" }, { "version": "v2", "created": "Tue, 27 Nov 2012 10:55:11 GMT" }, { "version": "v3", "created": "Mon, 4 Mar 2013 13:17:21 GMT" } ]
2013-03-05T00:00:00
[ [ "Zanetti", "Marcelo Serrano", "" ], [ "Sarigol", "Emre", "" ], [ "Scholtes", "Ingo", "" ], [ "Tessone", "Claudio Juan", "" ], [ "Schweitzer", "Frank", "" ] ]
TITLE: A Quantitative Study of Social Organisation in Open Source Software Communities ABSTRACT: The success of open source projects crucially depends on the voluntary contributions of a sufficiently large community of users. Apart from the mere size of the community, interesting questions arise when looking at the evolution of structural features of collaborations between community members. In this article, we discuss several network analytic proxies that can be used to quantify different aspects of the social organisation in social collaboration networks. We particularly focus on measures that can be related to the cohesiveness of the communities, the distribution of responsibilities and the resilience against turnover of community members. We present a comparative analysis on a large-scale dataset that covers the full history of collaborations between users of 14 major open source software communities. Our analysis covers both aggregate and time-evolving measures and highlights differences in the social organisation across communities. We argue that our results are a promising step towards the definition of suitable, potentially multi-dimensional, resilience and risk indicators for open source software communities.
no_new_dataset
0.694937
1301.7015
Entong Shen
Entong Shen, Ting Yu
Mining Frequent Graph Patterns with Differential Privacy
null
null
null
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Discovering frequent graph patterns in a graph database offers valuable information in a variety of applications. However, if the graph dataset contains sensitive data of individuals such as mobile phone-call graphs and web-click graphs, releasing discovered frequent patterns may present a threat to the privacy of individuals. {\em Differential privacy} has recently emerged as the {\em de facto} standard for private data analysis due to its provable privacy guarantee. In this paper we propose the first differentially private algorithm for mining frequent graph patterns. We first show that previous techniques on differentially private discovery of frequent {\em itemsets} cannot apply in mining frequent graph patterns due to the inherent complexity of handling structural information in graphs. We then address this challenge by proposing a Markov Chain Monte Carlo (MCMC) sampling based algorithm. Unlike previous work on frequent itemset mining, our techniques do not rely on the output of a non-private mining algorithm. Instead, we observe that both frequent graph pattern mining and the guarantee of differential privacy can be unified into an MCMC sampling framework. In addition, we establish the privacy and utility guarantee of our algorithm and propose an efficient neighboring pattern counting technique as well. Experimental results show that the proposed algorithm is able to output frequent patterns with good precision.
[ { "version": "v1", "created": "Tue, 29 Jan 2013 18:37:35 GMT" }, { "version": "v2", "created": "Fri, 1 Mar 2013 21:43:20 GMT" } ]
2013-03-05T00:00:00
[ [ "Shen", "Entong", "" ], [ "Yu", "Ting", "" ] ]
TITLE: Mining Frequent Graph Patterns with Differential Privacy ABSTRACT: Discovering frequent graph patterns in a graph database offers valuable information in a variety of applications. However, if the graph dataset contains sensitive data of individuals such as mobile phone-call graphs and web-click graphs, releasing discovered frequent patterns may present a threat to the privacy of individuals. {\em Differential privacy} has recently emerged as the {\em de facto} standard for private data analysis due to its provable privacy guarantee. In this paper we propose the first differentially private algorithm for mining frequent graph patterns. We first show that previous techniques on differentially private discovery of frequent {\em itemsets} cannot apply in mining frequent graph patterns due to the inherent complexity of handling structural information in graphs. We then address this challenge by proposing a Markov Chain Monte Carlo (MCMC) sampling based algorithm. Unlike previous work on frequent itemset mining, our techniques do not rely on the output of a non-private mining algorithm. Instead, we observe that both frequent graph pattern mining and the guarantee of differential privacy can be unified into an MCMC sampling framework. In addition, we establish the privacy and utility guarantee of our algorithm and propose an efficient neighboring pattern counting technique as well. Experimental results show that the proposed algorithm is able to output frequent patterns with good precision.
no_new_dataset
0.71022
1302.7051
Wesam Elshamy
Wesam Elshamy, Hassan M Emara, Ahmed Bahgat
Polyploidy and Discontinuous Heredity Effect on Evolutionary Multi-Objective Optimization
Corrected the last name of the second author to match his name in the paper
null
null
EPM-217-2006
cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper examines the effect of mimicking discontinuous heredity caused by carrying more than one chromosome in some living organisms cells in Evolutionary Multi-Objective Optimization algorithms. In this representation, the phenotype may not fully reflect the genotype. By doing so we are mimicking living organisms inheritance mechanism, where traits may be silently carried for many generations to reappear later. Representations with different number of chromosomes in each solution vector are tested on different benchmark problems with high number of decision variables and objectives. A comparison with Non-Dominated Sorting Genetic Algorithm-II is done on all problems.
[ { "version": "v1", "created": "Thu, 28 Feb 2013 01:32:28 GMT" }, { "version": "v2", "created": "Sat, 2 Mar 2013 00:20:07 GMT" } ]
2013-03-05T00:00:00
[ [ "Elshamy", "Wesam", "" ], [ "Emara", "Hassan M", "" ], [ "Bahgat", "Ahmed", "" ] ]
TITLE: Polyploidy and Discontinuous Heredity Effect on Evolutionary Multi-Objective Optimization ABSTRACT: This paper examines the effect of mimicking discontinuous heredity caused by carrying more than one chromosome in some living organisms cells in Evolutionary Multi-Objective Optimization algorithms. In this representation, the phenotype may not fully reflect the genotype. By doing so we are mimicking living organisms inheritance mechanism, where traits may be silently carried for many generations to reappear later. Representations with different number of chromosomes in each solution vector are tested on different benchmark problems with high number of decision variables and objectives. A comparison with Non-Dominated Sorting Genetic Algorithm-II is done on all problems.
no_new_dataset
0.708799
1303.0339
Chunhua Shen
Xi Li and Guosheng Lin and Chunhua Shen and Anton van den Hengel and Anthony Dick
Learning Hash Functions Using Column Generation
9 pages, published in International Conf. Machine Learning, 2013
null
null
null
cs.LG
http://creativecommons.org/licenses/by/3.0/
Fast nearest neighbor searching is becoming an increasingly important tool in solving many large-scale problems. Recently a number of approaches to learning data-dependent hash functions have been developed. In this work, we propose a column generation based method for learning data-dependent hash functions on the basis of proximity comparison information. Given a set of triplets that encode the pairwise proximity comparison information, our method learns hash functions that preserve the relative comparison relationships in the data as well as possible within the large-margin learning framework. The learning procedure is implemented using column generation and hence is named CGHash. At each iteration of the column generation procedure, the best hash function is selected. Unlike most other hashing methods, our method generalizes to new data points naturally; and has a training objective which is convex, thus ensuring that the global optimum can be identified. Experiments demonstrate that the proposed method learns compact binary codes and that its retrieval performance compares favorably with state-of-the-art methods when tested on a few benchmark datasets.
[ { "version": "v1", "created": "Sat, 2 Mar 2013 03:01:46 GMT" } ]
2013-03-05T00:00:00
[ [ "Li", "Xi", "" ], [ "Lin", "Guosheng", "" ], [ "Shen", "Chunhua", "" ], [ "Hengel", "Anton van den", "" ], [ "Dick", "Anthony", "" ] ]
TITLE: Learning Hash Functions Using Column Generation ABSTRACT: Fast nearest neighbor searching is becoming an increasingly important tool in solving many large-scale problems. Recently a number of approaches to learning data-dependent hash functions have been developed. In this work, we propose a column generation based method for learning data-dependent hash functions on the basis of proximity comparison information. Given a set of triplets that encode the pairwise proximity comparison information, our method learns hash functions that preserve the relative comparison relationships in the data as well as possible within the large-margin learning framework. The learning procedure is implemented using column generation and hence is named CGHash. At each iteration of the column generation procedure, the best hash function is selected. Unlike most other hashing methods, our method generalizes to new data points naturally; and has a training objective which is convex, thus ensuring that the global optimum can be identified. Experiments demonstrate that the proposed method learns compact binary codes and that its retrieval performance compares favorably with state-of-the-art methods when tested on a few benchmark datasets.
no_new_dataset
0.71039
1303.0566
Taher Zaki
T. Zaki (1 and 2), M. Amrouch (1), D. Mammass (1), A. Ennaji (2) ((1) IRFSIC Laboratory, Ibn Zohr University Agadir Morocco, (2) LITIS Laboratory, University of Rouen France)
Arabic documents classification using fuzzy R.B.F. classifier with sliding window
5 pages, 2 figures
Journal of Computing , eISSN 2151-9617 , Volume 5, Issue 1, January 2013
null
null
cs.IR
http://creativecommons.org/licenses/publicdomain/
In this paper, we propose a system for contextual and semantic Arabic documents classification by improving the standard fuzzy model. Indeed, promoting neighborhood semantic terms that seems absent in this model by using a radial basis modeling. In order to identify the relevant documents to the query. This approach calculates the similarity between related terms by determining the relevance of each relative to documents (NEAR operator), based on a kernel function. The use of sliding window improves the process of classification. The results obtained on a arabic dataset of press show very good performance compared with the literature.
[ { "version": "v1", "created": "Sun, 3 Mar 2013 20:50:12 GMT" } ]
2013-03-05T00:00:00
[ [ "Zaki", "T.", "", "1 and 2" ], [ "Amrouch", "M.", "" ], [ "Mammass", "D.", "" ], [ "Ennaji", "A.", "" ] ]
TITLE: Arabic documents classification using fuzzy R.B.F. classifier with sliding window ABSTRACT: In this paper, we propose a system for contextual and semantic Arabic documents classification by improving the standard fuzzy model. Indeed, promoting neighborhood semantic terms that seems absent in this model by using a radial basis modeling. In order to identify the relevant documents to the query. This approach calculates the similarity between related terms by determining the relevance of each relative to documents (NEAR operator), based on a kernel function. The use of sliding window improves the process of classification. The results obtained on a arabic dataset of press show very good performance compared with the literature.
no_new_dataset
0.709038
1303.0647
Meena Kabilan
A. Meena and R. Raja
Spatial Fuzzy C Means PET Image Segmentation of Neurodegenerative Disorder
null
Indian Journal of Computer Science and Engineering (IJCSE), ISSN : 0976-5166 Vol. 4 No.1 Feb-Mar 2013, pp.no: 50-55
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Nuclear image has emerged as a promising research work in medical field. Images from different modality meet its own challenge. Positron Emission Tomography (PET) image may help to precisely localize disease to assist in planning the right treatment for each case and saving valuable time. In this paper, a novel approach of Spatial Fuzzy C Means (PET SFCM) clustering algorithm is introduced on PET scan image datasets. The proposed algorithm is incorporated the spatial neighborhood information with traditional FCM and updating the objective function of each cluster. This algorithm is implemented and tested on huge data collection of patients with brain neuro degenerative disorder such as Alzheimers disease. It has demonstrated its effectiveness by testing it for real world patient data sets. Experimental results are compared with conventional FCM and K Means clustering algorithm. The performance of the PET SFCM provides satisfactory results compared with other two algorithms
[ { "version": "v1", "created": "Mon, 4 Mar 2013 09:08:34 GMT" } ]
2013-03-05T00:00:00
[ [ "Meena", "A.", "" ], [ "Raja", "R.", "" ] ]
TITLE: Spatial Fuzzy C Means PET Image Segmentation of Neurodegenerative Disorder ABSTRACT: Nuclear image has emerged as a promising research work in medical field. Images from different modality meet its own challenge. Positron Emission Tomography (PET) image may help to precisely localize disease to assist in planning the right treatment for each case and saving valuable time. In this paper, a novel approach of Spatial Fuzzy C Means (PET SFCM) clustering algorithm is introduced on PET scan image datasets. The proposed algorithm is incorporated the spatial neighborhood information with traditional FCM and updating the objective function of each cluster. This algorithm is implemented and tested on huge data collection of patients with brain neuro degenerative disorder such as Alzheimers disease. It has demonstrated its effectiveness by testing it for real world patient data sets. Experimental results are compared with conventional FCM and K Means clustering algorithm. The performance of the PET SFCM provides satisfactory results compared with other two algorithms
no_new_dataset
0.710804
1303.0725
Namita Sharma
Namita Sharma, Vineet Sahula, and C.P. Ravikumar
Energy Aware Task Scheduling for Soft Real Time Systems using an Analytical Approach for Energy Estimation
12 pages, 4 Figures, 3 Tables
IJASCSE, VOL 1, ISSUE 4, 2012
null
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Embedded systems have pervaded all walks of our life. With the increasing importance of mobile embedded systems and flexible applications, considerable progress in research has been made for power management. Power constraints are increasingly becoming the critical component of the design specifications of these systems. It helps in pre-determining the suitable hardware architecture for the target application. The aim of this paper is to present a technique to estimate 'pre-run time' and 'power' of a software mapped onto a hardware system; guaranteeing the compliance of temporal constraints while generating a schedule of tasks of software. Real time systems must handle several independent macro-tasks, each represented by a task graph, which includes communications and precedence constraints. We propose a novel approach for power estimation of embedded software using the Control Data Flow Graph (CDFG) or task graph model. This methodology uses an existing Hierarchical Concurrent Flow Graph (HCFG) technique for the power analysis of the CDFGs. We have evaluated our technique for energy efficient scheduling over various task graph benchmarks. The results obtained prove the utility and efficacy of our proposed approach for power analysis of embedded software. We also present a methodology to obtain an energy optimal voltage assignment and perform scheduling by taking advantage of the relaxation in execution time of tasks.
[ { "version": "v1", "created": "Mon, 4 Mar 2013 15:14:24 GMT" } ]
2013-03-05T00:00:00
[ [ "Sharma", "Namita", "" ], [ "Sahula", "Vineet", "" ], [ "Ravikumar", "C. P.", "" ] ]
TITLE: Energy Aware Task Scheduling for Soft Real Time Systems using an Analytical Approach for Energy Estimation ABSTRACT: Embedded systems have pervaded all walks of our life. With the increasing importance of mobile embedded systems and flexible applications, considerable progress in research has been made for power management. Power constraints are increasingly becoming the critical component of the design specifications of these systems. It helps in pre-determining the suitable hardware architecture for the target application. The aim of this paper is to present a technique to estimate 'pre-run time' and 'power' of a software mapped onto a hardware system; guaranteeing the compliance of temporal constraints while generating a schedule of tasks of software. Real time systems must handle several independent macro-tasks, each represented by a task graph, which includes communications and precedence constraints. We propose a novel approach for power estimation of embedded software using the Control Data Flow Graph (CDFG) or task graph model. This methodology uses an existing Hierarchical Concurrent Flow Graph (HCFG) technique for the power analysis of the CDFGs. We have evaluated our technique for energy efficient scheduling over various task graph benchmarks. The results obtained prove the utility and efficacy of our proposed approach for power analysis of embedded software. We also present a methodology to obtain an energy optimal voltage assignment and perform scheduling by taking advantage of the relaxation in execution time of tasks.
no_new_dataset
0.707398
1206.5065
Sofia Zaidenberg
Sofia Zaidenberg (INRIA Sophia Antipolis), Bernard Boulay (INRIA Sophia Antipolis), Fran\c{c}ois Bremond (INRIA Sophia Antipolis)
A generic framework for video understanding applied to group behavior recognition
(20/03/2012)
9th IEEE International Conference on Advanced Video and Signal-Based Surveillance (AVSS 2012) (2012) 136 -142
10.1109/AVSS.2012.1
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents an approach to detect and track groups of people in video-surveillance applications, and to automatically recognize their behavior. This method keeps track of individuals moving together by maintaining a spacial and temporal group coherence. First, people are individually detected and tracked. Second, their trajectories are analyzed over a temporal window and clustered using the Mean-Shift algorithm. A coherence value describes how well a set of people can be described as a group. Furthermore, we propose a formal event description language. The group events recognition approach is successfully validated on 4 camera views from 3 datasets: an airport, a subway, a shopping center corridor and an entrance hall.
[ { "version": "v1", "created": "Fri, 22 Jun 2012 06:24:30 GMT" } ]
2013-03-04T00:00:00
[ [ "Zaidenberg", "Sofia", "", "INRIA Sophia Antipolis" ], [ "Boulay", "Bernard", "", "INRIA\n Sophia Antipolis" ], [ "Bremond", "François", "", "INRIA Sophia Antipolis" ] ]
TITLE: A generic framework for video understanding applied to group behavior recognition ABSTRACT: This paper presents an approach to detect and track groups of people in video-surveillance applications, and to automatically recognize their behavior. This method keeps track of individuals moving together by maintaining a spacial and temporal group coherence. First, people are individually detected and tracked. Second, their trajectories are analyzed over a temporal window and clustered using the Mean-Shift algorithm. A coherence value describes how well a set of people can be described as a group. Furthermore, we propose a formal event description language. The group events recognition approach is successfully validated on 4 camera views from 3 datasets: an airport, a subway, a shopping center corridor and an entrance hall.
no_new_dataset
0.708616
1301.5160
Claudio Gentile
Fabio Vitale, Nicolo Cesa-Bianchi, Claudio Gentile, Giovanni Zappella
See the Tree Through the Lines: The Shazoo Algorithm -- Full Version --
null
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Predicting the nodes of a given graph is a fascinating theoretical problem with applications in several domains. Since graph sparsification via spanning trees retains enough information while making the task much easier, trees are an important special case of this problem. Although it is known how to predict the nodes of an unweighted tree in a nearly optimal way, in the weighted case a fully satisfactory algorithm is not available yet. We fill this hole and introduce an efficient node predictor, Shazoo, which is nearly optimal on any weighted tree. Moreover, we show that Shazoo can be viewed as a common nontrivial generalization of both previous approaches for unweighted trees and weighted lines. Experiments on real-world datasets confirm that Shazoo performs well in that it fully exploits the structure of the input tree, and gets very close to (and sometimes better than) less scalable energy minimization methods.
[ { "version": "v1", "created": "Tue, 22 Jan 2013 11:59:04 GMT" }, { "version": "v2", "created": "Thu, 28 Feb 2013 17:31:08 GMT" } ]
2013-03-01T00:00:00
[ [ "Vitale", "Fabio", "" ], [ "Cesa-Bianchi", "Nicolo", "" ], [ "Gentile", "Claudio", "" ], [ "Zappella", "Giovanni", "" ] ]
TITLE: See the Tree Through the Lines: The Shazoo Algorithm -- Full Version -- ABSTRACT: Predicting the nodes of a given graph is a fascinating theoretical problem with applications in several domains. Since graph sparsification via spanning trees retains enough information while making the task much easier, trees are an important special case of this problem. Although it is known how to predict the nodes of an unweighted tree in a nearly optimal way, in the weighted case a fully satisfactory algorithm is not available yet. We fill this hole and introduce an efficient node predictor, Shazoo, which is nearly optimal on any weighted tree. Moreover, we show that Shazoo can be viewed as a common nontrivial generalization of both previous approaches for unweighted trees and weighted lines. Experiments on real-world datasets confirm that Shazoo performs well in that it fully exploits the structure of the input tree, and gets very close to (and sometimes better than) less scalable energy minimization methods.
no_new_dataset
0.709007
1302.7028
Alexandre Fr\'echette
Alexandre Fr\'echette, F. Bruce Shepherd, Marina K. Thottan, Peter J. Winzer
Shortest Path versus Multi-Hub Routing in Networks with Uncertain Demand
null
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study a class of robust network design problems motivated by the need to scale core networks to meet increasingly dynamic capacity demands. Past work has focused on designing the network to support all hose matrices (all matrices not exceeding marginal bounds at the nodes). This model may be too conservative if additional information on traffic patterns is available. Another extreme is the fixed demand model, where one designs the network to support peak point-to-point demands. We introduce a capped hose model to explore a broader range of traffic matrices which includes the above two as special cases. It is known that optimal designs for the hose model are always determined by single-hub routing, and for the fixed- demand model are based on shortest-path routing. We shed light on the wider space of capped hose matrices in order to see which traffic models are more shortest path-like as opposed to hub-like. To address the space in between, we use hierarchical multi-hub routing templates, a generalization of hub and tree routing. In particular, we show that by adding peak capacities into the hose model, the single-hub tree-routing template is no longer cost-effective. This initiates the study of a class of robust network design (RND) problems restricted to these templates. Our empirical analysis is based on a heuristic for this new hierarchical RND problem. We also propose that it is possible to define a routing indicator that accounts for the strengths of the marginals and peak demands and use this information to choose the appropriate routing template. We benchmark our approach against other well-known routing templates, using representative carrier networks and a variety of different capped hose traffic demands, parameterized by the relative importance of their marginals as opposed to their point-to-point peak demands.
[ { "version": "v1", "created": "Wed, 27 Feb 2013 23:25:36 GMT" } ]
2013-03-01T00:00:00
[ [ "Fréchette", "Alexandre", "" ], [ "Shepherd", "F. Bruce", "" ], [ "Thottan", "Marina K.", "" ], [ "Winzer", "Peter J.", "" ] ]
TITLE: Shortest Path versus Multi-Hub Routing in Networks with Uncertain Demand ABSTRACT: We study a class of robust network design problems motivated by the need to scale core networks to meet increasingly dynamic capacity demands. Past work has focused on designing the network to support all hose matrices (all matrices not exceeding marginal bounds at the nodes). This model may be too conservative if additional information on traffic patterns is available. Another extreme is the fixed demand model, where one designs the network to support peak point-to-point demands. We introduce a capped hose model to explore a broader range of traffic matrices which includes the above two as special cases. It is known that optimal designs for the hose model are always determined by single-hub routing, and for the fixed- demand model are based on shortest-path routing. We shed light on the wider space of capped hose matrices in order to see which traffic models are more shortest path-like as opposed to hub-like. To address the space in between, we use hierarchical multi-hub routing templates, a generalization of hub and tree routing. In particular, we show that by adding peak capacities into the hose model, the single-hub tree-routing template is no longer cost-effective. This initiates the study of a class of robust network design (RND) problems restricted to these templates. Our empirical analysis is based on a heuristic for this new hierarchical RND problem. We also propose that it is possible to define a routing indicator that accounts for the strengths of the marginals and peak demands and use this information to choose the appropriate routing template. We benchmark our approach against other well-known routing templates, using representative carrier networks and a variety of different capped hose traffic demands, parameterized by the relative importance of their marginals as opposed to their point-to-point peak demands.
no_new_dataset
0.712282
1302.7043
Evangelos Papalexakis
Evangelos E. Papalexakis, Tom M. Mitchell, Nicholas D. Sidiropoulos, Christos Faloutsos, Partha Pratim Talukdar, Brian Murphy
Scoup-SMT: Scalable Coupled Sparse Matrix-Tensor Factorization
9 pages
null
null
null
stat.ML cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
How can we correlate neural activity in the human brain as it responds to words, with behavioral data expressed as answers to questions about these same words? In short, we want to find latent variables, that explain both the brain activity, as well as the behavioral responses. We show that this is an instance of the Coupled Matrix-Tensor Factorization (CMTF) problem. We propose Scoup-SMT, a novel, fast, and parallel algorithm that solves the CMTF problem and produces a sparse latent low-rank subspace of the data. In our experiments, we find that Scoup-SMT is 50-100 times faster than a state-of-the-art algorithm for CMTF, along with a 5 fold increase in sparsity. Moreover, we extend Scoup-SMT to handle missing data without degradation of performance. We apply Scoup-SMT to BrainQ, a dataset consisting of a (nouns, brain voxels, human subjects) tensor and a (nouns, properties) matrix, with coupling along the nouns dimension. Scoup-SMT is able to find meaningful latent variables, as well as to predict brain activity with competitive accuracy. Finally, we demonstrate the generality of Scoup-SMT, by applying it on a Facebook dataset (users, friends, wall-postings); there, Scoup-SMT spots spammer-like anomalies.
[ { "version": "v1", "created": "Thu, 28 Feb 2013 00:37:29 GMT" } ]
2013-03-01T00:00:00
[ [ "Papalexakis", "Evangelos E.", "" ], [ "Mitchell", "Tom M.", "" ], [ "Sidiropoulos", "Nicholas D.", "" ], [ "Faloutsos", "Christos", "" ], [ "Talukdar", "Partha Pratim", "" ], [ "Murphy", "Brian", "" ] ]
TITLE: Scoup-SMT: Scalable Coupled Sparse Matrix-Tensor Factorization ABSTRACT: How can we correlate neural activity in the human brain as it responds to words, with behavioral data expressed as answers to questions about these same words? In short, we want to find latent variables, that explain both the brain activity, as well as the behavioral responses. We show that this is an instance of the Coupled Matrix-Tensor Factorization (CMTF) problem. We propose Scoup-SMT, a novel, fast, and parallel algorithm that solves the CMTF problem and produces a sparse latent low-rank subspace of the data. In our experiments, we find that Scoup-SMT is 50-100 times faster than a state-of-the-art algorithm for CMTF, along with a 5 fold increase in sparsity. Moreover, we extend Scoup-SMT to handle missing data without degradation of performance. We apply Scoup-SMT to BrainQ, a dataset consisting of a (nouns, brain voxels, human subjects) tensor and a (nouns, properties) matrix, with coupling along the nouns dimension. Scoup-SMT is able to find meaningful latent variables, as well as to predict brain activity with competitive accuracy. Finally, we demonstrate the generality of Scoup-SMT, by applying it on a Facebook dataset (users, friends, wall-postings); there, Scoup-SMT spots spammer-like anomalies.
no_new_dataset
0.689057
1302.7082
Meena Kabilan
A.Meena, K.Raja
K Means Segmentation of Alzheimers Disease in PET scan datasets: An implementation
International Joint Conference on Advances in Signal Processing and Information Technology, SPIT2012
LNICST, ISSN:1867 To 8211 pp. 158 To 162, 2012
null
null
cs.CV cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Positron Emission Tomography (PET) scan image requires expertise in the segmentation where clustering algorithm plays an important role in the automation process. The algorithm optimization is concluded based on the performance, quality and number of clusters extracted. This paper is proposed to study the commonly used K Means clustering algorithm and to discuss a brief list of toolboxes for reproducing and extending works presented in medical image analysis. This work is compiled using AForge .NET framework in windows environment and MATrix LABoratory (MATLAB 7.0.1)
[ { "version": "v1", "created": "Thu, 28 Feb 2013 04:50:31 GMT" } ]
2013-03-01T00:00:00
[ [ "Meena", "A.", "" ], [ "Raja", "K.", "" ] ]
TITLE: K Means Segmentation of Alzheimers Disease in PET scan datasets: An implementation ABSTRACT: The Positron Emission Tomography (PET) scan image requires expertise in the segmentation where clustering algorithm plays an important role in the automation process. The algorithm optimization is concluded based on the performance, quality and number of clusters extracted. This paper is proposed to study the commonly used K Means clustering algorithm and to discuss a brief list of toolboxes for reproducing and extending works presented in medical image analysis. This work is compiled using AForge .NET framework in windows environment and MATrix LABoratory (MATLAB 7.0.1)
no_new_dataset
0.707998
1302.6582
Michael Schreiber
Michael Schreiber
A Case Study of the Arbitrariness of the h-Index and the Highly-Cited-Publications Indicator
16 pages, 3 tables, 5 figures. arXiv admin note: text overlap with arXiv:1302.6396
Journal of Informetrics, 7(2), 379-387 (2013)
10.1016/j.joi.2012.12.006
null
physics.soc-ph cs.DL
http://creativecommons.org/licenses/by-nc-sa/3.0/
The arbitrariness of the h-index becomes evident, when one requires q*h instead of h citations as the threshold for the definition of the index, thus changing the size of the core of the most influential publications of a dataset. I analyze the citation records of 26 physicists in order to determine how much the prefactor q influences the ranking. Likewise, the arbitrariness of the highly-cited-publications indicator is due to the threshold value, given either as an absolute number of citations or as a percentage of highly cited papers. The analysis of the 26 citation records shows that the changes in the rankings in dependence on these thresholds are rather large and comparable with the respective changes for the h-index.
[ { "version": "v1", "created": "Tue, 26 Feb 2013 11:49:29 GMT" } ]
2013-02-28T00:00:00
[ [ "Schreiber", "Michael", "" ] ]
TITLE: A Case Study of the Arbitrariness of the h-Index and the Highly-Cited-Publications Indicator ABSTRACT: The arbitrariness of the h-index becomes evident, when one requires q*h instead of h citations as the threshold for the definition of the index, thus changing the size of the core of the most influential publications of a dataset. I analyze the citation records of 26 physicists in order to determine how much the prefactor q influences the ranking. Likewise, the arbitrariness of the highly-cited-publications indicator is due to the threshold value, given either as an absolute number of citations or as a percentage of highly cited papers. The analysis of the 26 citation records shows that the changes in the rankings in dependence on these thresholds are rather large and comparable with the respective changes for the h-index.
no_new_dataset
0.713007
1302.6613
Ratnadip Adhikari
Ratnadip Adhikari, R. K. Agrawal
An Introductory Study on Time Series Modeling and Forecasting
67 pages, 29 figures, 33 references, book
LAP Lambert Academic Publishing, Germany, 2013
null
null
cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Time series modeling and forecasting has fundamental importance to various practical domains. Thus a lot of active research works is going on in this subject during several years. Many important models have been proposed in literature for improving the accuracy and effectiveness of time series forecasting. The aim of this dissertation work is to present a concise description of some popular time series forecasting models used in practice, with their salient features. In this thesis, we have described three important classes of time series models, viz. the stochastic, neural networks and SVM based models, together with their inherent forecasting strengths and weaknesses. We have also discussed about the basic issues related to time series modeling, such as stationarity, parsimony, overfitting, etc. Our discussion about different time series models is supported by giving the experimental forecast results, performed on six real time series datasets. While fitting a model to a dataset, special care is taken to select the most parsimonious one. To evaluate forecast accuracy as well as to compare among different models fitted to a time series, we have used the five performance measures, viz. MSE, MAD, RMSE, MAPE and Theil's U-statistics. For each of the six datasets, we have shown the obtained forecast diagram which graphically depicts the closeness between the original and forecasted observations. To have authenticity as well as clarity in our discussion about time series modeling and forecasting, we have taken the help of various published research works from reputed journals and some standard books.
[ { "version": "v1", "created": "Tue, 26 Feb 2013 22:18:55 GMT" } ]
2013-02-28T00:00:00
[ [ "Adhikari", "Ratnadip", "" ], [ "Agrawal", "R. K.", "" ] ]
TITLE: An Introductory Study on Time Series Modeling and Forecasting ABSTRACT: Time series modeling and forecasting has fundamental importance to various practical domains. Thus a lot of active research works is going on in this subject during several years. Many important models have been proposed in literature for improving the accuracy and effectiveness of time series forecasting. The aim of this dissertation work is to present a concise description of some popular time series forecasting models used in practice, with their salient features. In this thesis, we have described three important classes of time series models, viz. the stochastic, neural networks and SVM based models, together with their inherent forecasting strengths and weaknesses. We have also discussed about the basic issues related to time series modeling, such as stationarity, parsimony, overfitting, etc. Our discussion about different time series models is supported by giving the experimental forecast results, performed on six real time series datasets. While fitting a model to a dataset, special care is taken to select the most parsimonious one. To evaluate forecast accuracy as well as to compare among different models fitted to a time series, we have used the five performance measures, viz. MSE, MAD, RMSE, MAPE and Theil's U-statistics. For each of the six datasets, we have shown the obtained forecast diagram which graphically depicts the closeness between the original and forecasted observations. To have authenticity as well as clarity in our discussion about time series modeling and forecasting, we have taken the help of various published research works from reputed journals and some standard books.
no_new_dataset
0.711469
1302.6666
Yan Huang
Yan Huang, Ruoming Jin, Favyen Bastani, Xiaoyang Sean Wang
Large Scale Real-time Ridesharing with Service Guarantee on Road Networks
null
null
null
null
cs.DS
http://creativecommons.org/licenses/by-nc-sa/3.0/
The mean occupancy rates of personal vehicle trips in the United States is only 1.6 persons per vehicle mile. Urban traffic gridlock is a familiar scene. Ridesharing has the potential to solve many environmental, congestion, and energy problems. In this paper, we introduce the problem of large scale real-time ridesharing with service guarantee on road networks. Servers and trip requests are dynamically matched while waiting time and service time constraints of trips are satisfied. We first propose two basic algorithms: a branch-and-bound algorithm and an integer programing algorithm. However, these algorithm structures do not adapt well to the dynamic nature of the ridesharing problem. Thus, we then propose a kinetic tree algorithm capable of better scheduling dynamic requests and adjusting routes on-the-fly. We perform experiments on a large real taxi dataset from Shanghai. The results show that the kinetic tree algorithm is faster than other algorithms in response time.
[ { "version": "v1", "created": "Wed, 27 Feb 2013 05:41:49 GMT" } ]
2013-02-28T00:00:00
[ [ "Huang", "Yan", "" ], [ "Jin", "Ruoming", "" ], [ "Bastani", "Favyen", "" ], [ "Wang", "Xiaoyang Sean", "" ] ]
TITLE: Large Scale Real-time Ridesharing with Service Guarantee on Road Networks ABSTRACT: The mean occupancy rates of personal vehicle trips in the United States is only 1.6 persons per vehicle mile. Urban traffic gridlock is a familiar scene. Ridesharing has the potential to solve many environmental, congestion, and energy problems. In this paper, we introduce the problem of large scale real-time ridesharing with service guarantee on road networks. Servers and trip requests are dynamically matched while waiting time and service time constraints of trips are satisfied. We first propose two basic algorithms: a branch-and-bound algorithm and an integer programing algorithm. However, these algorithm structures do not adapt well to the dynamic nature of the ridesharing problem. Thus, we then propose a kinetic tree algorithm capable of better scheduling dynamic requests and adjusting routes on-the-fly. We perform experiments on a large real taxi dataset from Shanghai. The results show that the kinetic tree algorithm is faster than other algorithms in response time.
no_new_dataset
0.710622
1302.6957
Jayaraman J. Thiagarajan
Karthikeyan Natesan Ramamurthy, Jayaraman J. Thiagarajan, Prasanna Sattigeri and Andreas Spanias
Ensemble Sparse Models for Image Analysis
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Sparse representations with learned dictionaries have been successful in several image analysis applications. In this paper, we propose and analyze the framework of ensemble sparse models, and demonstrate their utility in image restoration and unsupervised clustering. The proposed ensemble model approximates the data as a linear combination of approximations from multiple \textit{weak} sparse models. Theoretical analysis of the ensemble model reveals that even in the worst-case, the ensemble can perform better than any of its constituent individual models. The dictionaries corresponding to the individual sparse models are obtained using either random example selection or boosted approaches. Boosted approaches learn one dictionary per round such that the dictionary learned in a particular round is optimized for the training examples having high reconstruction error in the previous round. Results with compressed recovery show that the ensemble representations lead to a better performance compared to using a single dictionary obtained with the conventional alternating minimization approach. The proposed ensemble models are also used for single image superresolution, and we show that they perform comparably to the recent approaches. In unsupervised clustering, experiments show that the proposed model performs better than baseline approaches in several standard datasets.
[ { "version": "v1", "created": "Wed, 27 Feb 2013 18:58:36 GMT" } ]
2013-02-28T00:00:00
[ [ "Ramamurthy", "Karthikeyan Natesan", "" ], [ "Thiagarajan", "Jayaraman J.", "" ], [ "Sattigeri", "Prasanna", "" ], [ "Spanias", "Andreas", "" ] ]
TITLE: Ensemble Sparse Models for Image Analysis ABSTRACT: Sparse representations with learned dictionaries have been successful in several image analysis applications. In this paper, we propose and analyze the framework of ensemble sparse models, and demonstrate their utility in image restoration and unsupervised clustering. The proposed ensemble model approximates the data as a linear combination of approximations from multiple \textit{weak} sparse models. Theoretical analysis of the ensemble model reveals that even in the worst-case, the ensemble can perform better than any of its constituent individual models. The dictionaries corresponding to the individual sparse models are obtained using either random example selection or boosted approaches. Boosted approaches learn one dictionary per round such that the dictionary learned in a particular round is optimized for the training examples having high reconstruction error in the previous round. Results with compressed recovery show that the ensemble representations lead to a better performance compared to using a single dictionary obtained with the conventional alternating minimization approach. The proposed ensemble models are also used for single image superresolution, and we show that they perform comparably to the recent approaches. In unsupervised clustering, experiments show that the proposed model performs better than baseline approaches in several standard datasets.
no_new_dataset
0.711049
1302.6210
Ratnadip Adhikari
Ratnadip Adhikari, R. K. Agrawal
A Homogeneous Ensemble of Artificial Neural Networks for Time Series Forecasting
8 pages, 4 figures, 2 tables, 26 references, international journal
International Journal of Computer Applications, Vol. 32, No. 7, October 2011, pp. 1-8
10.5120/3913-5505
null
cs.NE cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Enhancing the robustness and accuracy of time series forecasting models is an active area of research. Recently, Artificial Neural Networks (ANNs) have found extensive applications in many practical forecasting problems. However, the standard backpropagation ANN training algorithm has some critical issues, e.g. it has a slow convergence rate and often converges to a local minimum, the complex pattern of error surfaces, lack of proper training parameters selection methods, etc. To overcome these drawbacks, various improved training methods have been developed in literature; but, still none of them can be guaranteed as the best for all problems. In this paper, we propose a novel weighted ensemble scheme which intelligently combines multiple training algorithms to increase the ANN forecast accuracies. The weight for each training algorithm is determined from the performance of the corresponding ANN model on the validation dataset. Experimental results on four important time series depicts that our proposed technique reduces the mentioned shortcomings of individual ANN training algorithms to a great extent. Also it achieves significantly better forecast accuracies than two other popular statistical models.
[ { "version": "v1", "created": "Mon, 25 Feb 2013 20:09:19 GMT" } ]
2013-02-27T00:00:00
[ [ "Adhikari", "Ratnadip", "" ], [ "Agrawal", "R. K.", "" ] ]
TITLE: A Homogeneous Ensemble of Artificial Neural Networks for Time Series Forecasting ABSTRACT: Enhancing the robustness and accuracy of time series forecasting models is an active area of research. Recently, Artificial Neural Networks (ANNs) have found extensive applications in many practical forecasting problems. However, the standard backpropagation ANN training algorithm has some critical issues, e.g. it has a slow convergence rate and often converges to a local minimum, the complex pattern of error surfaces, lack of proper training parameters selection methods, etc. To overcome these drawbacks, various improved training methods have been developed in literature; but, still none of them can be guaranteed as the best for all problems. In this paper, we propose a novel weighted ensemble scheme which intelligently combines multiple training algorithms to increase the ANN forecast accuracies. The weight for each training algorithm is determined from the performance of the corresponding ANN model on the validation dataset. Experimental results on four important time series depicts that our proposed technique reduces the mentioned shortcomings of individual ANN training algorithms to a great extent. Also it achieves significantly better forecast accuracies than two other popular statistical models.
no_new_dataset
0.710842
1302.6426
Meena Kabilan
A.Meena, K.Raja
Segmentation of Alzheimers Disease in PET scan datasets using MATLAB
null
International Journal on Information Sciences and Computing,Vol.6,No.2,July 2012,PP.No.44-48
null
null
cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Positron Emission Tomography (PET) scan images are one of the bio medical imaging techniques similar to that of MRI scan images but PET scan images are helpful in finding the development of tumors.The PET scan images requires expertise in the segmentation where clustering plays an important role in the automation process.The segmentation of such images is manual to automate the process clustering is used.Clustering is commonly known as unsupervised learning process of n dimensional data sets are clustered into k groups so as to maximize the inter cluster similarity and to minimize the intra cluster similarity.This paper is proposed to implement the commonly used K Means and Fuzzy CMeans (FCM) clustering algorithm.This work is implemented using MATrix LABoratory (MATLAB) and tested with sample PET scan image. The sample data is collected from Alzheimers Disease Neuro imaging Initiative ADNI. Medical Image Processing and Visualization Tool (MIPAV) are used to compare the resultant images.
[ { "version": "v1", "created": "Tue, 26 Feb 2013 13:19:26 GMT" } ]
2013-02-27T00:00:00
[ [ "Meena", "A.", "" ], [ "Raja", "K.", "" ] ]
TITLE: Segmentation of Alzheimers Disease in PET scan datasets using MATLAB ABSTRACT: Positron Emission Tomography (PET) scan images are one of the bio medical imaging techniques similar to that of MRI scan images but PET scan images are helpful in finding the development of tumors.The PET scan images requires expertise in the segmentation where clustering plays an important role in the automation process.The segmentation of such images is manual to automate the process clustering is used.Clustering is commonly known as unsupervised learning process of n dimensional data sets are clustered into k groups so as to maximize the inter cluster similarity and to minimize the intra cluster similarity.This paper is proposed to implement the commonly used K Means and Fuzzy CMeans (FCM) clustering algorithm.This work is implemented using MATrix LABoratory (MATLAB) and tested with sample PET scan image. The sample data is collected from Alzheimers Disease Neuro imaging Initiative ADNI. Medical Image Processing and Visualization Tool (MIPAV) are used to compare the resultant images.
no_new_dataset
0.709585
1302.5101
Jeremiah Blocki
Jeremiah Blocki and Saranga Komanduri and Ariel Procaccia and Or Sheffet
Optimizing Password Composition Policies
null
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A password composition policy restricts the space of allowable passwords to eliminate weak passwords that are vulnerable to statistical guessing attacks. Usability studies have demonstrated that existing password composition policies can sometimes result in weaker password distributions; hence a more principled approach is needed. We introduce the first theoretical model for optimizing password composition policies. We study the computational and sample complexity of this problem under different assumptions on the structure of policies and on users' preferences over passwords. Our main positive result is an algorithm that -- with high probability --- constructs almost optimal policies (which are specified as a union of subsets of allowed passwords), and requires only a small number of samples of users' preferred passwords. We complement our theoretical results with simulations using a real-world dataset of 32 million passwords.
[ { "version": "v1", "created": "Wed, 20 Feb 2013 20:53:41 GMT" }, { "version": "v2", "created": "Mon, 25 Feb 2013 19:44:50 GMT" } ]
2013-02-26T00:00:00
[ [ "Blocki", "Jeremiah", "" ], [ "Komanduri", "Saranga", "" ], [ "Procaccia", "Ariel", "" ], [ "Sheffet", "Or", "" ] ]
TITLE: Optimizing Password Composition Policies ABSTRACT: A password composition policy restricts the space of allowable passwords to eliminate weak passwords that are vulnerable to statistical guessing attacks. Usability studies have demonstrated that existing password composition policies can sometimes result in weaker password distributions; hence a more principled approach is needed. We introduce the first theoretical model for optimizing password composition policies. We study the computational and sample complexity of this problem under different assumptions on the structure of policies and on users' preferences over passwords. Our main positive result is an algorithm that -- with high probability --- constructs almost optimal policies (which are specified as a union of subsets of allowed passwords), and requires only a small number of samples of users' preferred passwords. We complement our theoretical results with simulations using a real-world dataset of 32 million passwords.
no_new_dataset
0.634543
1302.5974
Zhengfeng Yang
Zhengfeng Yang, Min Wu and Wang Lin
Exact Safety Verification of Interval Hybrid Systems Based on Symbolic-Numeric Computation
null
null
null
null
cs.SC cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we address the problem of safety verification of interval hybrid systems in which the coefficients are intervals instead of explicit numbers. A hybrid symbolic-numeric method, based on SOS relaxation and interval arithmetic certification, is proposed to generate exact inequality invariants for safety verification of interval hybrid systems. As an application, an approach is provided to verify safety properties of non-polynomial hybrid systems. Experiments on the benchmark hybrid systems are given to illustrate the efficiency of our method.
[ { "version": "v1", "created": "Mon, 25 Feb 2013 01:54:41 GMT" } ]
2013-02-26T00:00:00
[ [ "Yang", "Zhengfeng", "" ], [ "Wu", "Min", "" ], [ "Lin", "Wang", "" ] ]
TITLE: Exact Safety Verification of Interval Hybrid Systems Based on Symbolic-Numeric Computation ABSTRACT: In this paper, we address the problem of safety verification of interval hybrid systems in which the coefficients are intervals instead of explicit numbers. A hybrid symbolic-numeric method, based on SOS relaxation and interval arithmetic certification, is proposed to generate exact inequality invariants for safety verification of interval hybrid systems. As an application, an approach is provided to verify safety properties of non-polynomial hybrid systems. Experiments on the benchmark hybrid systems are given to illustrate the efficiency of our method.
no_new_dataset
0.709849
1302.5985
Xiaodi Hou
Xiaodi Hou and Alan Yuille and Christof Koch
A Meta-Theory of Boundary Detection Benchmarks
NIPS 2012 Workshop on Human Computation for Science and Computational Sustainability
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Human labeled datasets, along with their corresponding evaluation algorithms, play an important role in boundary detection. We here present a psychophysical experiment that addresses the reliability of such benchmarks. To find better remedies to evaluate the performance of any boundary detection algorithm, we propose a computational framework to remove inappropriate human labels and estimate the intrinsic properties of boundaries.
[ { "version": "v1", "created": "Mon, 25 Feb 2013 03:12:12 GMT" } ]
2013-02-26T00:00:00
[ [ "Hou", "Xiaodi", "" ], [ "Yuille", "Alan", "" ], [ "Koch", "Christof", "" ] ]
TITLE: A Meta-Theory of Boundary Detection Benchmarks ABSTRACT: Human labeled datasets, along with their corresponding evaluation algorithms, play an important role in boundary detection. We here present a psychophysical experiment that addresses the reliability of such benchmarks. To find better remedies to evaluate the performance of any boundary detection algorithm, we propose a computational framework to remove inappropriate human labels and estimate the intrinsic properties of boundaries.
no_new_dataset
0.71081
1211.3147
Keke Chen
James Powers and Keke Chen
Secure Computation of Top-K Eigenvectors for Shared Matrices in the Cloud
8 pages
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
With the development of sensor network, mobile computing, and web applications, data are now collected from many distributed sources to form big datasets. Such datasets can be hosted in the cloud to achieve economical processing. However, these data might be highly sensitive requiring secure storage and processing. We envision a cloud-based data storage and processing framework that enables users to economically and securely share and handle big datasets. Under this framework, we study the matrix-based data mining algorithms with a focus on the secure top-k eigenvector algorithm. Our approach uses an iterative processing model in which the authorized user interacts with the cloud to achieve the result. In this process, both the source matrix and the intermediate results keep confidential and the client-side incurs low costs. The security of this approach is guaranteed by using Paillier Encryption and a random perturbation technique. We carefully analyze its security under a cloud-specific threat model. Our experimental results show that the proposed method is scalable to big matrices while requiring low client-side costs.
[ { "version": "v1", "created": "Tue, 13 Nov 2012 21:59:18 GMT" }, { "version": "v2", "created": "Fri, 22 Feb 2013 05:35:22 GMT" } ]
2013-02-25T00:00:00
[ [ "Powers", "James", "" ], [ "Chen", "Keke", "" ] ]
TITLE: Secure Computation of Top-K Eigenvectors for Shared Matrices in the Cloud ABSTRACT: With the development of sensor network, mobile computing, and web applications, data are now collected from many distributed sources to form big datasets. Such datasets can be hosted in the cloud to achieve economical processing. However, these data might be highly sensitive requiring secure storage and processing. We envision a cloud-based data storage and processing framework that enables users to economically and securely share and handle big datasets. Under this framework, we study the matrix-based data mining algorithms with a focus on the secure top-k eigenvector algorithm. Our approach uses an iterative processing model in which the authorized user interacts with the cloud to achieve the result. In this process, both the source matrix and the intermediate results keep confidential and the client-side incurs low costs. The security of this approach is guaranteed by using Paillier Encryption and a random perturbation technique. We carefully analyze its security under a cloud-specific threat model. Our experimental results show that the proposed method is scalable to big matrices while requiring low client-side costs.
no_new_dataset
0.708616
1301.3533
Xanadu Halkias
Xanadu Halkias, Sebastien Paris, Herve Glotin
Sparse Penalty in Deep Belief Networks: Using the Mixed Norm Constraint
8 pages, 7 figures (including subfigures), ICleaR conference
null
null
null
cs.NE cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Deep Belief Networks (DBN) have been successfully applied on popular machine learning tasks. Specifically, when applied on hand-written digit recognition, DBNs have achieved approximate accuracy rates of 98.8%. In an effort to optimize the data representation achieved by the DBN and maximize their descriptive power, recent advances have focused on inducing sparse constraints at each layer of the DBN. In this paper we present a theoretical approach for sparse constraints in the DBN using the mixed norm for both non-overlapping and overlapping groups. We explore how these constraints affect the classification accuracy for digit recognition in three different datasets (MNIST, USPS, RIMES) and provide initial estimations of their usefulness by altering different parameters such as the group size and overlap percentage.
[ { "version": "v1", "created": "Wed, 16 Jan 2013 00:12:21 GMT" }, { "version": "v2", "created": "Fri, 22 Feb 2013 10:18:15 GMT" } ]
2013-02-25T00:00:00
[ [ "Halkias", "Xanadu", "" ], [ "Paris", "Sebastien", "" ], [ "Glotin", "Herve", "" ] ]
TITLE: Sparse Penalty in Deep Belief Networks: Using the Mixed Norm Constraint ABSTRACT: Deep Belief Networks (DBN) have been successfully applied on popular machine learning tasks. Specifically, when applied on hand-written digit recognition, DBNs have achieved approximate accuracy rates of 98.8%. In an effort to optimize the data representation achieved by the DBN and maximize their descriptive power, recent advances have focused on inducing sparse constraints at each layer of the DBN. In this paper we present a theoretical approach for sparse constraints in the DBN using the mixed norm for both non-overlapping and overlapping groups. We explore how these constraints affect the classification accuracy for digit recognition in three different datasets (MNIST, USPS, RIMES) and provide initial estimations of their usefulness by altering different parameters such as the group size and overlap percentage.
no_new_dataset
0.710434
1301.7321
Johannes Kloos
Johannes Kloos, Rupak Majumdar, Filip Niksic and Ruzica Piskac
Incremental, Inductive Coverability
Non-reviewed version, original version submitted to CAV 2013; this is a revised version, containing more experimental results and some corrections
null
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We give an incremental, inductive (IC3) procedure to check coverability of well-structured transition systems. Our procedure generalizes the IC3 procedure for safety verification that has been successfully applied in finite-state hardware verification to infinite-state well-structured transition systems. We show that our procedure is sound, complete, and terminating for downward-finite well-structured transition systems---where each state has a finite number of states below it---a class that contains extensions of Petri nets, broadcast protocols, and lossy channel systems. We have implemented our algorithm for checking coverability of Petri nets. We describe how the algorithm can be efficiently implemented without the use of SMT solvers. Our experiments on standard Petri net benchmarks show that IC3 is competitive with state-of-the-art implementations for coverability based on symbolic backward analysis or expand-enlarge-and-check algorithms both in time taken and space usage.
[ { "version": "v1", "created": "Wed, 30 Jan 2013 18:37:03 GMT" }, { "version": "v2", "created": "Fri, 22 Feb 2013 16:25:09 GMT" } ]
2013-02-25T00:00:00
[ [ "Kloos", "Johannes", "" ], [ "Majumdar", "Rupak", "" ], [ "Niksic", "Filip", "" ], [ "Piskac", "Ruzica", "" ] ]
TITLE: Incremental, Inductive Coverability ABSTRACT: We give an incremental, inductive (IC3) procedure to check coverability of well-structured transition systems. Our procedure generalizes the IC3 procedure for safety verification that has been successfully applied in finite-state hardware verification to infinite-state well-structured transition systems. We show that our procedure is sound, complete, and terminating for downward-finite well-structured transition systems---where each state has a finite number of states below it---a class that contains extensions of Petri nets, broadcast protocols, and lossy channel systems. We have implemented our algorithm for checking coverability of Petri nets. We describe how the algorithm can be efficiently implemented without the use of SMT solvers. Our experiments on standard Petri net benchmarks show that IC3 is competitive with state-of-the-art implementations for coverability based on symbolic backward analysis or expand-enlarge-and-check algorithms both in time taken and space usage.
no_new_dataset
0.706823
1302.5125
Oren Rippel
Oren Rippel, Ryan Prescott Adams
High-Dimensional Probability Estimation with Deep Density Models
12 pages, 4 figures, 1 table. Submitted for publication
null
null
null
stat.ML cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
One of the fundamental problems in machine learning is the estimation of a probability distribution from data. Many techniques have been proposed to study the structure of data, most often building around the assumption that observations lie on a lower-dimensional manifold of high probability. It has been more difficult, however, to exploit this insight to build explicit, tractable density models for high-dimensional data. In this paper, we introduce the deep density model (DDM), a new approach to density estimation. We exploit insights from deep learning to construct a bijective map to a representation space, under which the transformation of the distribution of the data is approximately factorized and has identical and known marginal densities. The simplicity of the latent distribution under the model allows us to feasibly explore it, and the invertibility of the map to characterize contraction of measure across it. This enables us to compute normalized densities for out-of-sample data. This combination of tractability and flexibility allows us to tackle a variety of probabilistic tasks on high-dimensional datasets, including: rapid computation of normalized densities at test-time without evaluating a partition function; generation of samples without MCMC; and characterization of the joint entropy of the data.
[ { "version": "v1", "created": "Wed, 20 Feb 2013 21:20:30 GMT" } ]
2013-02-22T00:00:00
[ [ "Rippel", "Oren", "" ], [ "Adams", "Ryan Prescott", "" ] ]
TITLE: High-Dimensional Probability Estimation with Deep Density Models ABSTRACT: One of the fundamental problems in machine learning is the estimation of a probability distribution from data. Many techniques have been proposed to study the structure of data, most often building around the assumption that observations lie on a lower-dimensional manifold of high probability. It has been more difficult, however, to exploit this insight to build explicit, tractable density models for high-dimensional data. In this paper, we introduce the deep density model (DDM), a new approach to density estimation. We exploit insights from deep learning to construct a bijective map to a representation space, under which the transformation of the distribution of the data is approximately factorized and has identical and known marginal densities. The simplicity of the latent distribution under the model allows us to feasibly explore it, and the invertibility of the map to characterize contraction of measure across it. This enables us to compute normalized densities for out-of-sample data. This combination of tractability and flexibility allows us to tackle a variety of probabilistic tasks on high-dimensional datasets, including: rapid computation of normalized densities at test-time without evaluating a partition function; generation of samples without MCMC; and characterization of the joint entropy of the data.
no_new_dataset
0.709453
1302.5189
Dilip K. Prasad
Dilip K. Prasad
Object Detection in Real Images
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Object detection and recognition are important problems in computer vision. Since these problems are meta-heuristic, despite a lot of research, practically usable, intelligent, real-time, and dynamic object detection/recognition methods are still unavailable. We propose a new object detection/recognition method, which improves over the existing methods in every stage of the object detection/recognition process. In addition to the usual features, we propose to use geometric shapes, like linear cues, ellipses and quadrangles, as additional features. The full potential of geometric cues is exploited by using them to extract other features in a robust, computationally efficient, and less meta-heuristic manner. We also propose a new hierarchical codebook, which provides good generalization and discriminative properties. The codebook enables fast multi-path inference mechanisms based on propagation of conditional likelihoods, that make it robust to occlusion and noise. It has the capability of dynamic learning. We also propose a new learning method that has generative and discriminative learning capabilities, does not need large and fully supervised training dataset, and is capable of online learning. The preliminary work of detecting geometric shapes in real images has been completed. This preliminary work is the focus of this report. Future path for realizing the proposed object detection/recognition method is also discussed in brief.
[ { "version": "v1", "created": "Thu, 21 Feb 2013 06:06:47 GMT" } ]
2013-02-22T00:00:00
[ [ "Prasad", "Dilip K.", "" ] ]
TITLE: Object Detection in Real Images ABSTRACT: Object detection and recognition are important problems in computer vision. Since these problems are meta-heuristic, despite a lot of research, practically usable, intelligent, real-time, and dynamic object detection/recognition methods are still unavailable. We propose a new object detection/recognition method, which improves over the existing methods in every stage of the object detection/recognition process. In addition to the usual features, we propose to use geometric shapes, like linear cues, ellipses and quadrangles, as additional features. The full potential of geometric cues is exploited by using them to extract other features in a robust, computationally efficient, and less meta-heuristic manner. We also propose a new hierarchical codebook, which provides good generalization and discriminative properties. The codebook enables fast multi-path inference mechanisms based on propagation of conditional likelihoods, that make it robust to occlusion and noise. It has the capability of dynamic learning. We also propose a new learning method that has generative and discriminative learning capabilities, does not need large and fully supervised training dataset, and is capable of online learning. The preliminary work of detecting geometric shapes in real images has been completed. This preliminary work is the focus of this report. Future path for realizing the proposed object detection/recognition method is also discussed in brief.
no_new_dataset
0.708055
1302.5199
Arunasalam Sambhanthan
Arunasalam Sambhanthan, Alice Good
A Virtual World Model to Enhance Tourism Destination Accessibility in Developing Countries
Conference paper
null
null
null
cs.CY cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The problem of destination accessibility is a vital concern in the sustainable tourism development in the emerging regions due to the increasing numbers of tourism business growth in the recent times. Tourism is one of the potential foreign exchange earning sectors, which place sustainability as one of the main success metrics for benchmarking the industry's overall development. On the other hand, there are several destinations, which are inaccessible to tourists due to several reasons. Underutilization of potential destinations in both pre purchase and consumption stages is a strategic disadvantage for emerging countries on leading their tourism industry towards sustainability. A virtual world model to increase the destination accessibility of tourism products has been proposed. The model has to be designed with visual and auditory experience to tourists. The model is expected to enhance the accessibility of destinations for users of different categories. Elderly users, users with panic disorders, users with mobility impairments also will be able to enjoy traveling experience just same as other, through the proposed model.
[ { "version": "v1", "created": "Thu, 21 Feb 2013 06:39:37 GMT" } ]
2013-02-22T00:00:00
[ [ "Sambhanthan", "Arunasalam", "" ], [ "Good", "Alice", "" ] ]
TITLE: A Virtual World Model to Enhance Tourism Destination Accessibility in Developing Countries ABSTRACT: The problem of destination accessibility is a vital concern in the sustainable tourism development in the emerging regions due to the increasing numbers of tourism business growth in the recent times. Tourism is one of the potential foreign exchange earning sectors, which place sustainability as one of the main success metrics for benchmarking the industry's overall development. On the other hand, there are several destinations, which are inaccessible to tourists due to several reasons. Underutilization of potential destinations in both pre purchase and consumption stages is a strategic disadvantage for emerging countries on leading their tourism industry towards sustainability. A virtual world model to increase the destination accessibility of tourism products has been proposed. The model has to be designed with visual and auditory experience to tourists. The model is expected to enhance the accessibility of destinations for users of different categories. Elderly users, users with panic disorders, users with mobility impairments also will be able to enjoy traveling experience just same as other, through the proposed model.
no_new_dataset
0.705367
1206.0051
Florin Rusu
Chengjie Qin, Florin Rusu
PF-OLA: A High-Performance Framework for Parallel On-Line Aggregation
36 pages
null
null
null
cs.DB cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Online aggregation provides estimates to the final result of a computation during the actual processing. The user can stop the computation as soon as the estimate is accurate enough, typically early in the execution. This allows for the interactive data exploration of the largest datasets. In this paper we introduce the first framework for parallel online aggregation in which the estimation virtually does not incur any overhead on top of the actual execution. We define a generic interface to express any estimation model that abstracts completely the execution details. We design a novel estimator specifically targeted at parallel online aggregation. When executed by the framework over a massive $8\text{TB}$ TPC-H instance, the estimator provides accurate confidence bounds early in the execution even when the cardinality of the final result is seven orders of magnitude smaller than the dataset size and without incurring overhead.
[ { "version": "v1", "created": "Thu, 31 May 2012 23:38:36 GMT" }, { "version": "v2", "created": "Wed, 20 Feb 2013 07:10:04 GMT" } ]
2013-02-21T00:00:00
[ [ "Qin", "Chengjie", "" ], [ "Rusu", "Florin", "" ] ]
TITLE: PF-OLA: A High-Performance Framework for Parallel On-Line Aggregation ABSTRACT: Online aggregation provides estimates to the final result of a computation during the actual processing. The user can stop the computation as soon as the estimate is accurate enough, typically early in the execution. This allows for the interactive data exploration of the largest datasets. In this paper we introduce the first framework for parallel online aggregation in which the estimation virtually does not incur any overhead on top of the actual execution. We define a generic interface to express any estimation model that abstracts completely the execution details. We design a novel estimator specifically targeted at parallel online aggregation. When executed by the framework over a massive $8\text{TB}$ TPC-H instance, the estimator provides accurate confidence bounds early in the execution even when the cardinality of the final result is seven orders of magnitude smaller than the dataset size and without incurring overhead.
no_new_dataset
0.70883
1302.4798
Asankhaya Sharma
Asankhaya Sharma
An Empirical Study of Path Feasibility Queries
null
null
null
null
cs.SE cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we present a comparative study of path feasibility queries generated during path exploration based software engineering methods. Symbolic execution based methods are gaining importance in different aspects of software engineering e.g. proving properties about programs, test case generation, comparing different executions of programs. These methods use SMT solvers to check the satisfiability of path feasibility queries written as a formula in the supported theories. We study the performance of solving such path feasibility queries using SMT solvers for real world programs. Our path condition formulas are generated in a theory of quantifier free bit vectors with arrays (QF_ABV). We show that among the different SMT solvers, STP is better than Z3 by an order of magnitude for such kind of queries. As an application we design a new program analysis (Change Value Analysis) based on our study which exploits undefined behaviors in programs. We have implemented our analysis in LLVM and tested it with the benchmark of SIR programs. It reduces the time taken for solving path feasibility queries by 48%. The study can serve as guidance to practitioners using path feasibility queries to create scalable software engineering methods based on symbolic execution.
[ { "version": "v1", "created": "Wed, 20 Feb 2013 02:59:49 GMT" } ]
2013-02-21T00:00:00
[ [ "Sharma", "Asankhaya", "" ] ]
TITLE: An Empirical Study of Path Feasibility Queries ABSTRACT: In this paper we present a comparative study of path feasibility queries generated during path exploration based software engineering methods. Symbolic execution based methods are gaining importance in different aspects of software engineering e.g. proving properties about programs, test case generation, comparing different executions of programs. These methods use SMT solvers to check the satisfiability of path feasibility queries written as a formula in the supported theories. We study the performance of solving such path feasibility queries using SMT solvers for real world programs. Our path condition formulas are generated in a theory of quantifier free bit vectors with arrays (QF_ABV). We show that among the different SMT solvers, STP is better than Z3 by an order of magnitude for such kind of queries. As an application we design a new program analysis (Change Value Analysis) based on our study which exploits undefined behaviors in programs. We have implemented our analysis in LLVM and tested it with the benchmark of SIR programs. It reduces the time taken for solving path feasibility queries by 48%. The study can serve as guidance to practitioners using path feasibility queries to create scalable software engineering methods based on symbolic execution.
no_new_dataset
0.706165
1302.4874
Gon\c{c}alo Sim\~oes
Gon\c{c}alo Sim\~oes, Helena Galhardas, David Matos
A Labeled Graph Kernel for Relationship Extraction
null
null
null
null
cs.CL cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we propose an approach for Relationship Extraction (RE) based on labeled graph kernels. The kernel we propose is a particularization of a random walk kernel that exploits two properties previously studied in the RE literature: (i) the words between the candidate entities or connecting them in a syntactic representation are particularly likely to carry information regarding the relationship; and (ii) combining information from distinct sources in a kernel may help the RE system make better decisions. We performed experiments on a dataset of protein-protein interactions and the results show that our approach obtains effectiveness values that are comparable with the state-of-the art kernel methods. Moreover, our approach is able to outperform the state-of-the-art kernels when combined with other kernel methods.
[ { "version": "v1", "created": "Wed, 20 Feb 2013 11:06:25 GMT" } ]
2013-02-21T00:00:00
[ [ "Simões", "Gonçalo", "" ], [ "Galhardas", "Helena", "" ], [ "Matos", "David", "" ] ]
TITLE: A Labeled Graph Kernel for Relationship Extraction ABSTRACT: In this paper, we propose an approach for Relationship Extraction (RE) based on labeled graph kernels. The kernel we propose is a particularization of a random walk kernel that exploits two properties previously studied in the RE literature: (i) the words between the candidate entities or connecting them in a syntactic representation are particularly likely to carry information regarding the relationship; and (ii) combining information from distinct sources in a kernel may help the RE system make better decisions. We performed experiments on a dataset of protein-protein interactions and the results show that our approach obtains effectiveness values that are comparable with the state-of-the art kernel methods. Moreover, our approach is able to outperform the state-of-the-art kernels when combined with other kernel methods.
no_new_dataset
0.710459
1302.4932
John S. Breese
John S. Breese, Russ Blake
Automating Computer Bottleneck Detection with Belief Nets
Appears in Proceedings of the Eleventh Conference on Uncertainty in Artificial Intelligence (UAI1995)
null
null
UAI-P-1995-PG-36-45
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We describe an application of belief networks to the diagnosis of bottlenecks in computer systems. The technique relies on a high-level functional model of the interaction between application workloads, the Windows NT operating system, and system hardware. Given a workload description, the model predicts the values of observable system counters available from the Windows NT performance monitoring tool. Uncertainty in workloads, predictions, and counter values are characterized with Gaussian distributions. During diagnostic inference, we use observed performance monitor values to find the most probable assignment to the workload parameters. In this paper we provide some background on automated bottleneck detection, describe the structure of the system model, and discuss empirical procedures for model calibration and verification. Part of the calibration process includes generating a dataset to estimate a multivariate Gaussian error model. Initial results in diagnosing bottlenecks are presented.
[ { "version": "v1", "created": "Wed, 20 Feb 2013 15:19:11 GMT" } ]
2013-02-21T00:00:00
[ [ "Breese", "John S.", "" ], [ "Blake", "Russ", "" ] ]
TITLE: Automating Computer Bottleneck Detection with Belief Nets ABSTRACT: We describe an application of belief networks to the diagnosis of bottlenecks in computer systems. The technique relies on a high-level functional model of the interaction between application workloads, the Windows NT operating system, and system hardware. Given a workload description, the model predicts the values of observable system counters available from the Windows NT performance monitoring tool. Uncertainty in workloads, predictions, and counter values are characterized with Gaussian distributions. During diagnostic inference, we use observed performance monitor values to find the most probable assignment to the workload parameters. In this paper we provide some background on automated bottleneck detection, describe the structure of the system model, and discuss empirical procedures for model calibration and verification. Part of the calibration process includes generating a dataset to estimate a multivariate Gaussian error model. Initial results in diagnosing bottlenecks are presented.
no_new_dataset
0.710245
1301.0068
Guy Bresler
Guy Bresler, Ma'ayan Bresler, David Tse
Optimal Assembly for High Throughput Shotgun Sequencing
26 pages, 18 figures
null
null
null
q-bio.GN cs.DS cs.IT math.IT q-bio.QM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a framework for the design of optimal assembly algorithms for shotgun sequencing under the criterion of complete reconstruction. We derive a lower bound on the read length and the coverage depth required for reconstruction in terms of the repeat statistics of the genome. Building on earlier works, we design a de Brujin graph based assembly algorithm which can achieve very close to the lower bound for repeat statistics of a wide range of sequenced genomes, including the GAGE datasets. The results are based on a set of necessary and sufficient conditions on the DNA sequence and the reads for reconstruction. The conditions can be viewed as the shotgun sequencing analogue of Ukkonen-Pevzner's necessary and sufficient conditions for Sequencing by Hybridization.
[ { "version": "v1", "created": "Tue, 1 Jan 2013 08:52:44 GMT" }, { "version": "v2", "created": "Wed, 9 Jan 2013 03:51:20 GMT" }, { "version": "v3", "created": "Mon, 18 Feb 2013 17:41:09 GMT" } ]
2013-02-20T00:00:00
[ [ "Bresler", "Guy", "" ], [ "Bresler", "Ma'ayan", "" ], [ "Tse", "David", "" ] ]
TITLE: Optimal Assembly for High Throughput Shotgun Sequencing ABSTRACT: We present a framework for the design of optimal assembly algorithms for shotgun sequencing under the criterion of complete reconstruction. We derive a lower bound on the read length and the coverage depth required for reconstruction in terms of the repeat statistics of the genome. Building on earlier works, we design a de Brujin graph based assembly algorithm which can achieve very close to the lower bound for repeat statistics of a wide range of sequenced genomes, including the GAGE datasets. The results are based on a set of necessary and sufficient conditions on the DNA sequence and the reads for reconstruction. The conditions can be viewed as the shotgun sequencing analogue of Ukkonen-Pevzner's necessary and sufficient conditions for Sequencing by Hybridization.
no_new_dataset
0.709648
1302.4504
Diego Amancio Raphael
Diego R. Amancio, Osvaldo N. Oliveira Jr. and Luciano da F. Costa
On the use of topological features and hierarchical characterization for disambiguating names in collaborative networks
null
Europhysics Letters (2012) 99 48002
10.1209/0295-5075/99/48002
null
physics.soc-ph cs.DL cs.IR cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Many features of complex systems can now be unveiled by applying statistical physics methods to treat them as social networks. The power of the analysis may be limited, however, by the presence of ambiguity in names, e.g., caused by homonymy in collaborative networks. In this paper we show that the ability to distinguish between homonymous authors is enhanced when longer-distance connections are considered, rather than looking at only the immediate neighbors of a node in the collaborative network. Optimized results were obtained upon using the 3rd hierarchy in connections. Furthermore, reasonable distinction among authors could also be achieved upon using pattern recognition strategies for the data generated from the topology of the collaborative network. These results were obtained with a network from papers in the arXiv repository, into which homonymy was deliberately introduced to test the methods with a controlled, reliable dataset. In all cases, several methods of supervised and unsupervised machine learning were used, leading to the same overall results. The suitability of using deeper hierarchies and network topology was confirmed with a real database of movie actors, with the additional finding that the distinguishing ability can be further enhanced by combining topology features and long-range connections in the collaborative network.
[ { "version": "v1", "created": "Tue, 19 Feb 2013 02:00:01 GMT" } ]
2013-02-20T00:00:00
[ [ "Amancio", "Diego R.", "" ], [ "Oliveira", "Osvaldo N.", "Jr." ], [ "Costa", "Luciano da F.", "" ] ]
TITLE: On the use of topological features and hierarchical characterization for disambiguating names in collaborative networks ABSTRACT: Many features of complex systems can now be unveiled by applying statistical physics methods to treat them as social networks. The power of the analysis may be limited, however, by the presence of ambiguity in names, e.g., caused by homonymy in collaborative networks. In this paper we show that the ability to distinguish between homonymous authors is enhanced when longer-distance connections are considered, rather than looking at only the immediate neighbors of a node in the collaborative network. Optimized results were obtained upon using the 3rd hierarchy in connections. Furthermore, reasonable distinction among authors could also be achieved upon using pattern recognition strategies for the data generated from the topology of the collaborative network. These results were obtained with a network from papers in the arXiv repository, into which homonymy was deliberately introduced to test the methods with a controlled, reliable dataset. In all cases, several methods of supervised and unsupervised machine learning were used, leading to the same overall results. The suitability of using deeper hierarchies and network topology was confirmed with a real database of movie actors, with the additional finding that the distinguishing ability can be further enhanced by combining topology features and long-range connections in the collaborative network.
no_new_dataset
0.710226
1302.4680
Gregory Newstadt
Gregory E. Newstadt, Edmund G. Zelnio, and Alfred O. Hero III
Moving target inference with hierarchical Bayesian models in synthetic aperture radar imagery
35 pages, 8 figures, 1 algorithm, 11 tables
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In synthetic aperture radar (SAR), images are formed by focusing the response of stationary objects to a single spatial location. On the other hand, moving targets cause phase errors in the standard formation of SAR images that cause displacement and defocusing effects. SAR imagery also contains significant sources of non-stationary spatially-varying noises, including antenna gain discrepancies, angular scintillation (glints) and complex speckle. In order to account for this intricate phenomenology, this work combines the knowledge of the physical, kinematic, and statistical properties of SAR imaging into a single unified Bayesian structure that simultaneously (a) estimates the nuisance parameters such as clutter distributions and antenna miscalibrations and (b) estimates the target signature required for detection/inference of the target state. Moreover, we provide a Monte Carlo estimate of the posterior distribution for the target state and nuisance parameters that infers the parameters of the model directly from the data, largely eliminating tuning of algorithm parameters. We demonstrate that our algorithm competes at least as well on a synthetic dataset as state-of-the-art algorithms for estimating sparse signals. Finally, performance analysis on a measured dataset demonstrates that the proposed algorithm is robust at detecting/estimating targets over a wide area and performs at least as well as popular algorithms for SAR moving target detection.
[ { "version": "v1", "created": "Tue, 19 Feb 2013 17:12:53 GMT" } ]
2013-02-20T00:00:00
[ [ "Newstadt", "Gregory E.", "" ], [ "Zelnio", "Edmund G.", "" ], [ "Hero", "Alfred O.", "III" ] ]
TITLE: Moving target inference with hierarchical Bayesian models in synthetic aperture radar imagery ABSTRACT: In synthetic aperture radar (SAR), images are formed by focusing the response of stationary objects to a single spatial location. On the other hand, moving targets cause phase errors in the standard formation of SAR images that cause displacement and defocusing effects. SAR imagery also contains significant sources of non-stationary spatially-varying noises, including antenna gain discrepancies, angular scintillation (glints) and complex speckle. In order to account for this intricate phenomenology, this work combines the knowledge of the physical, kinematic, and statistical properties of SAR imaging into a single unified Bayesian structure that simultaneously (a) estimates the nuisance parameters such as clutter distributions and antenna miscalibrations and (b) estimates the target signature required for detection/inference of the target state. Moreover, we provide a Monte Carlo estimate of the posterior distribution for the target state and nuisance parameters that infers the parameters of the model directly from the data, largely eliminating tuning of algorithm parameters. We demonstrate that our algorithm competes at least as well on a synthetic dataset as state-of-the-art algorithms for estimating sparse signals. Finally, performance analysis on a measured dataset demonstrates that the proposed algorithm is robust at detecting/estimating targets over a wide area and performs at least as well as popular algorithms for SAR moving target detection.
no_new_dataset
0.71103
1207.4474
Igor Melatti
Vadim Alimguzhin, Federico Mari, Igor Melatti, Ivano Salvo, Enrico Tronci
On Model Based Synthesis of Embedded Control Software
Accepted for publication by EMSOFT 2012. arXiv admin note: substantial text overlap with arXiv:1107.5638,arXiv:1207.4098
null
null
null
cs.SE cs.SY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Many Embedded Systems are indeed Software Based Control Systems (SBCSs), that is control systems whose controller consists of control software running on a microcontroller device. This motivates investigation on Formal Model Based Design approaches for control software. Given the formal model of a plant as a Discrete Time Linear Hybrid System and the implementation specifications (that is, number of bits in the Analog-to-Digital (AD) conversion) correct-by-construction control software can be automatically generated from System Level Formal Specifications of the closed loop system (that is, safety and liveness requirements), by computing a suitable finite abstraction of the plant. With respect to given implementation specifications, the automatically generated code implements a time optimal control strategy (in terms of set-up time), has a Worst Case Execution Time linear in the number of AD bits $b$, but unfortunately, its size grows exponentially with respect to $b$. In many embedded systems, there are severe restrictions on the computational resources (such as memory or computational power) available to microcontroller devices. This paper addresses model based synthesis of control software by trading system level non-functional requirements (such us optimal set-up time, ripple) with software non-functional requirements (its footprint). Our experimental results show the effectiveness of our approach: for the inverted pendulum benchmark, by using a quantization schema with 12 bits, the size of the small controller is less than 6% of the size of the time optimal one.
[ { "version": "v1", "created": "Tue, 17 Jul 2012 05:00:55 GMT" }, { "version": "v2", "created": "Mon, 18 Feb 2013 15:36:59 GMT" } ]
2013-02-19T00:00:00
[ [ "Alimguzhin", "Vadim", "" ], [ "Mari", "Federico", "" ], [ "Melatti", "Igor", "" ], [ "Salvo", "Ivano", "" ], [ "Tronci", "Enrico", "" ] ]
TITLE: On Model Based Synthesis of Embedded Control Software ABSTRACT: Many Embedded Systems are indeed Software Based Control Systems (SBCSs), that is control systems whose controller consists of control software running on a microcontroller device. This motivates investigation on Formal Model Based Design approaches for control software. Given the formal model of a plant as a Discrete Time Linear Hybrid System and the implementation specifications (that is, number of bits in the Analog-to-Digital (AD) conversion) correct-by-construction control software can be automatically generated from System Level Formal Specifications of the closed loop system (that is, safety and liveness requirements), by computing a suitable finite abstraction of the plant. With respect to given implementation specifications, the automatically generated code implements a time optimal control strategy (in terms of set-up time), has a Worst Case Execution Time linear in the number of AD bits $b$, but unfortunately, its size grows exponentially with respect to $b$. In many embedded systems, there are severe restrictions on the computational resources (such as memory or computational power) available to microcontroller devices. This paper addresses model based synthesis of control software by trading system level non-functional requirements (such us optimal set-up time, ripple) with software non-functional requirements (its footprint). Our experimental results show the effectiveness of our approach: for the inverted pendulum benchmark, by using a quantization schema with 12 bits, the size of the small controller is less than 6% of the size of the time optimal one.
no_new_dataset
0.708811
1301.5809
Derek Greene
Derek Greene and P\'adraig Cunningham
Producing a Unified Graph Representation from Multiple Social Network Views
13 pages. Clarify notation
null
null
null
cs.SI physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In many social networks, several different link relations will exist between the same set of users. Additionally, attribute or textual information will be associated with those users, such as demographic details or user-generated content. For many data analysis tasks, such as community finding and data visualisation, the provision of multiple heterogeneous types of user data makes the analysis process more complex. We propose an unsupervised method for integrating multiple data views to produce a single unified graph representation, based on the combination of the k-nearest neighbour sets for users derived from each view. These views can be either relation-based or feature-based. The proposed method is evaluated on a number of annotated multi-view Twitter datasets, where it is shown to support the discovery of the underlying community structure in the data.
[ { "version": "v1", "created": "Thu, 24 Jan 2013 15:07:12 GMT" }, { "version": "v2", "created": "Mon, 28 Jan 2013 15:41:22 GMT" }, { "version": "v3", "created": "Mon, 18 Feb 2013 13:56:21 GMT" } ]
2013-02-19T00:00:00
[ [ "Greene", "Derek", "" ], [ "Cunningham", "Pádraig", "" ] ]
TITLE: Producing a Unified Graph Representation from Multiple Social Network Views ABSTRACT: In many social networks, several different link relations will exist between the same set of users. Additionally, attribute or textual information will be associated with those users, such as demographic details or user-generated content. For many data analysis tasks, such as community finding and data visualisation, the provision of multiple heterogeneous types of user data makes the analysis process more complex. We propose an unsupervised method for integrating multiple data views to produce a single unified graph representation, based on the combination of the k-nearest neighbour sets for users derived from each view. These views can be either relation-based or feature-based. The proposed method is evaluated on a number of annotated multi-view Twitter datasets, where it is shown to support the discovery of the underlying community structure in the data.
no_new_dataset
0.71086
1302.4280
Georg Hager
Markus Wittmann and Georg Hager and Thomas Zeiser and Gerhard Wellein
Asynchronous MPI for the Masses
12 pages, 5 figures
null
null
null
cs.DC cs.PF
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a simple library which equips MPI implementations with truly asynchronous non-blocking point-to-point operations, and which is independent of the underlying communication infrastructure. It utilizes the MPI profiling interface (PMPI) and the MPI_THREAD_MULTIPLE thread compatibility level, and works with current versions of Intel MPI, Open MPI, MPICH2, MVAPICH2, Cray MPI, and IBM MPI. We show performance comparisons on a commodity InfiniBand cluster and two tier-1 systems in Germany, using low-level and application benchmarks. Issues of thread/process placement and the peculiarities of different MPI implementations are discussed in detail. We also identify the MPI libraries that already support asynchronous operations. Finally we show how our ideas can be extended to MPI-IO.
[ { "version": "v1", "created": "Mon, 18 Feb 2013 14:17:37 GMT" } ]
2013-02-19T00:00:00
[ [ "Wittmann", "Markus", "" ], [ "Hager", "Georg", "" ], [ "Zeiser", "Thomas", "" ], [ "Wellein", "Gerhard", "" ] ]
TITLE: Asynchronous MPI for the Masses ABSTRACT: We present a simple library which equips MPI implementations with truly asynchronous non-blocking point-to-point operations, and which is independent of the underlying communication infrastructure. It utilizes the MPI profiling interface (PMPI) and the MPI_THREAD_MULTIPLE thread compatibility level, and works with current versions of Intel MPI, Open MPI, MPICH2, MVAPICH2, Cray MPI, and IBM MPI. We show performance comparisons on a commodity InfiniBand cluster and two tier-1 systems in Germany, using low-level and application benchmarks. Issues of thread/process placement and the peculiarities of different MPI implementations are discussed in detail. We also identify the MPI libraries that already support asynchronous operations. Finally we show how our ideas can be extended to MPI-IO.
no_new_dataset
0.705367
1204.6174
Kin Cheong Sou
Julien M. Hendrickx, Karl Henrik Johansson, Raphael M. Jungers, Henrik Sandberg and Kin Cheong Sou
Efficient Computations of a Security Index for False Data Attacks in Power Networks
null
null
null
null
math.OC cs.SY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The resilience of Supervisory Control and Data Acquisition (SCADA) systems for electric power networks for certain cyber-attacks is considered. We analyze the vulnerability of the measurement system to false data attack on communicated measurements. The vulnerability analysis problem is shown to be NP-hard, meaning that unless $P = NP$ there is no polynomial time algorithm to analyze the vulnerability of the system. Nevertheless, we identify situations, such as the full measurement case, where it can be solved efficiently. In such cases, we show indeed that the problem can be cast as a generalization of the minimum cut problem involving costly nodes. We further show that it can be reformulated as a standard minimum cut problem (without costly nodes) on a modified graph of proportional size. An important consequence of this result is that our approach provides the first exact efficient algorithm for the vulnerability analysis problem under the full measurement assumption. Furthermore, our approach also provides an efficient heuristic algorithm for the general NP-hard problem. Our results are illustrated by numerical studies on benchmark systems including the IEEE 118-bus system.
[ { "version": "v1", "created": "Fri, 27 Apr 2012 11:50:03 GMT" }, { "version": "v2", "created": "Fri, 15 Feb 2013 13:19:45 GMT" } ]
2013-02-18T00:00:00
[ [ "Hendrickx", "Julien M.", "" ], [ "Johansson", "Karl Henrik", "" ], [ "Jungers", "Raphael M.", "" ], [ "Sandberg", "Henrik", "" ], [ "Sou", "Kin Cheong", "" ] ]
TITLE: Efficient Computations of a Security Index for False Data Attacks in Power Networks ABSTRACT: The resilience of Supervisory Control and Data Acquisition (SCADA) systems for electric power networks for certain cyber-attacks is considered. We analyze the vulnerability of the measurement system to false data attack on communicated measurements. The vulnerability analysis problem is shown to be NP-hard, meaning that unless $P = NP$ there is no polynomial time algorithm to analyze the vulnerability of the system. Nevertheless, we identify situations, such as the full measurement case, where it can be solved efficiently. In such cases, we show indeed that the problem can be cast as a generalization of the minimum cut problem involving costly nodes. We further show that it can be reformulated as a standard minimum cut problem (without costly nodes) on a modified graph of proportional size. An important consequence of this result is that our approach provides the first exact efficient algorithm for the vulnerability analysis problem under the full measurement assumption. Furthermore, our approach also provides an efficient heuristic algorithm for the general NP-hard problem. Our results are illustrated by numerical studies on benchmark systems including the IEEE 118-bus system.
no_new_dataset
0.70638
1302.3576
Yousri El Fattah
Yousri El Fattah, Rina Dechter
An Evaluation of Structural Parameters for Probabilistic Reasoning: Results on Benchmark Circuits
Appears in Proceedings of the Twelfth Conference on Uncertainty in Artificial Intelligence (UAI1996)
null
null
UAI-P-1996-PG-244-251
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Many algorithms for processing probabilistic networks are dependent on the topological properties of the problem's structure. Such algorithms (e.g., clustering, conditioning) are effective only if the problem has a sparse graph captured by parameters such as tree width and cycle-cut set size. In this paper we initiate a study to determine the potential of structure-based algorithms in real-life applications. We analyze empirically the structural properties of problems coming from the circuit diagnosis domain. Specifically, we locate those properties that capture the effectiveness of clustering and conditioning as well as of a family of conditioning+clustering algorithms designed to gradually trade space for time. We perform our analysis on 11 benchmark circuits widely used in the testing community. We also report on the effect of ordering heuristics on tree-clustering and show that, on our benchmarks, the well-known max-cardinality ordering is substantially inferior to an ordering called min-degree.
[ { "version": "v1", "created": "Wed, 13 Feb 2013 14:13:55 GMT" } ]
2013-02-18T00:00:00
[ [ "Fattah", "Yousri El", "" ], [ "Dechter", "Rina", "" ] ]
TITLE: An Evaluation of Structural Parameters for Probabilistic Reasoning: Results on Benchmark Circuits ABSTRACT: Many algorithms for processing probabilistic networks are dependent on the topological properties of the problem's structure. Such algorithms (e.g., clustering, conditioning) are effective only if the problem has a sparse graph captured by parameters such as tree width and cycle-cut set size. In this paper we initiate a study to determine the potential of structure-based algorithms in real-life applications. We analyze empirically the structural properties of problems coming from the circuit diagnosis domain. Specifically, we locate those properties that capture the effectiveness of clustering and conditioning as well as of a family of conditioning+clustering algorithms designed to gradually trade space for time. We perform our analysis on 11 benchmark circuits widely used in the testing community. We also report on the effect of ordering heuristics on tree-clustering and show that, on our benchmarks, the well-known max-cardinality ordering is substantially inferior to an ordering called min-degree.
no_new_dataset
0.71022
1302.3219
Chunhua Shen
Chunhua Shen, Junae Kim, Fayao Liu, Lei Wang, Anton van den Hengel
An Efficient Dual Approach to Distance Metric Learning
null
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Distance metric learning is of fundamental interest in machine learning because the distance metric employed can significantly affect the performance of many learning methods. Quadratic Mahalanobis metric learning is a popular approach to the problem, but typically requires solving a semidefinite programming (SDP) problem, which is computationally expensive. Standard interior-point SDP solvers typically have a complexity of $O(D^{6.5})$ (with $D$ the dimension of input data), and can thus only practically solve problems exhibiting less than a few thousand variables. Since the number of variables is $D (D+1) / 2 $, this implies a limit upon the size of problem that can practically be solved of around a few hundred dimensions. The complexity of the popular quadratic Mahalanobis metric learning approach thus limits the size of problem to which metric learning can be applied. Here we propose a significantly more efficient approach to the metric learning problem based on the Lagrange dual formulation of the problem. The proposed formulation is much simpler to implement, and therefore allows much larger Mahalanobis metric learning problems to be solved. The time complexity of the proposed method is $O (D ^ 3) $, which is significantly lower than that of the SDP approach. Experiments on a variety of datasets demonstrate that the proposed method achieves an accuracy comparable to the state-of-the-art, but is applicable to significantly larger problems. We also show that the proposed method can be applied to solve more general Frobenius-norm regularized SDP problems approximately.
[ { "version": "v1", "created": "Wed, 13 Feb 2013 08:48:53 GMT" } ]
2013-02-15T00:00:00
[ [ "Shen", "Chunhua", "" ], [ "Kim", "Junae", "" ], [ "Liu", "Fayao", "" ], [ "Wang", "Lei", "" ], [ "Hengel", "Anton van den", "" ] ]
TITLE: An Efficient Dual Approach to Distance Metric Learning ABSTRACT: Distance metric learning is of fundamental interest in machine learning because the distance metric employed can significantly affect the performance of many learning methods. Quadratic Mahalanobis metric learning is a popular approach to the problem, but typically requires solving a semidefinite programming (SDP) problem, which is computationally expensive. Standard interior-point SDP solvers typically have a complexity of $O(D^{6.5})$ (with $D$ the dimension of input data), and can thus only practically solve problems exhibiting less than a few thousand variables. Since the number of variables is $D (D+1) / 2 $, this implies a limit upon the size of problem that can practically be solved of around a few hundred dimensions. The complexity of the popular quadratic Mahalanobis metric learning approach thus limits the size of problem to which metric learning can be applied. Here we propose a significantly more efficient approach to the metric learning problem based on the Lagrange dual formulation of the problem. The proposed formulation is much simpler to implement, and therefore allows much larger Mahalanobis metric learning problems to be solved. The time complexity of the proposed method is $O (D ^ 3) $, which is significantly lower than that of the SDP approach. Experiments on a variety of datasets demonstrate that the proposed method achieves an accuracy comparable to the state-of-the-art, but is applicable to significantly larger problems. We also show that the proposed method can be applied to solve more general Frobenius-norm regularized SDP problems approximately.
no_new_dataset
0.70866
1302.3123
Nizar Banu P K
P. K. Nizar Banu, H. Hannah Inbarani
An Analysis of Gene Expression Data using Penalized Fuzzy C-Means Approach
14; IJCCI, Vol. 1, Issue 2,(January-July)2011
null
null
null
cs.CV cs.CE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
With the rapid advances of microarray technologies, large amounts of high-dimensional gene expression data are being generated, which poses significant computational challenges. A first step towards addressing this challenge is the use of clustering techniques, which is essential in the data mining process to reveal natural structures and identify interesting patterns in the underlying data. A robust gene expression clustering approach to minimize undesirable clustering is proposed. In this paper, Penalized Fuzzy C-Means (PFCM) Clustering algorithm is described and compared with the most representative off-line clustering techniques: K-Means Clustering, Rough K-Means Clustering and Fuzzy C-Means clustering. These techniques are implemented and tested for a Brain Tumor gene expression Dataset. Analysis of the performance of the proposed approach is presented through qualitative validation experiments. From experimental results, it can be observed that Penalized Fuzzy C-Means algorithm shows a much higher usability than the other projected clustering algorithms used in our comparison study. Significant and promising clustering results are presented using Brain Tumor Gene expression dataset. Thus patterns seen in genome-wide expression experiments can be interpreted as indications of the status of cellular processes. In these clustering results, we find that Penalized Fuzzy C-Means algorithm provides useful information as an aid to diagnosis in oncology.
[ { "version": "v1", "created": "Tue, 8 Jan 2013 17:16:39 GMT" } ]
2013-02-14T00:00:00
[ [ "Banu", "P. K. Nizar", "" ], [ "Inbarani", "H. Hannah", "" ] ]
TITLE: An Analysis of Gene Expression Data using Penalized Fuzzy C-Means Approach ABSTRACT: With the rapid advances of microarray technologies, large amounts of high-dimensional gene expression data are being generated, which poses significant computational challenges. A first step towards addressing this challenge is the use of clustering techniques, which is essential in the data mining process to reveal natural structures and identify interesting patterns in the underlying data. A robust gene expression clustering approach to minimize undesirable clustering is proposed. In this paper, Penalized Fuzzy C-Means (PFCM) Clustering algorithm is described and compared with the most representative off-line clustering techniques: K-Means Clustering, Rough K-Means Clustering and Fuzzy C-Means clustering. These techniques are implemented and tested for a Brain Tumor gene expression Dataset. Analysis of the performance of the proposed approach is presented through qualitative validation experiments. From experimental results, it can be observed that Penalized Fuzzy C-Means algorithm shows a much higher usability than the other projected clustering algorithms used in our comparison study. Significant and promising clustering results are presented using Brain Tumor Gene expression dataset. Thus patterns seen in genome-wide expression experiments can be interpreted as indications of the status of cellular processes. In these clustering results, we find that Penalized Fuzzy C-Means algorithm provides useful information as an aid to diagnosis in oncology.
no_new_dataset
0.71202
1302.2692
David Van Horn
Shuying Liang, Matthew Might, Thomas Gilray, David Van Horn
Pushdown Exception-Flow Analysis of Object-Oriented Programs
null
null
null
null
cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Statically reasoning in the presence of and about exceptions is challenging: exceptions worsen the well-known mutual recursion between data-flow and control-flow analysis. The recent development of pushdown control-flow analysis for the {\lambda}-calculus hints at a way to improve analysis of exceptions: a pushdown stack can precisely match catches to throws in the same way it matches returns to calls. This work generalizes pushdown control-flow analysis to object-oriented programs and to exceptions. Pushdown analysis of exceptions improves precision over the next best analysis, Bravenboer and Smaragdakis's Doop, by orders of magnitude. By then generalizing abstract garbage collection to object-oriented programs, we reduce analysis time by half over pure pushdown analysis. We evaluate our implementation for Dalvik bytecode on standard benchmarks as well as several Android applications.
[ { "version": "v1", "created": "Tue, 12 Feb 2013 03:29:55 GMT" } ]
2013-02-13T00:00:00
[ [ "Liang", "Shuying", "" ], [ "Might", "Matthew", "" ], [ "Gilray", "Thomas", "" ], [ "Van Horn", "David", "" ] ]
TITLE: Pushdown Exception-Flow Analysis of Object-Oriented Programs ABSTRACT: Statically reasoning in the presence of and about exceptions is challenging: exceptions worsen the well-known mutual recursion between data-flow and control-flow analysis. The recent development of pushdown control-flow analysis for the {\lambda}-calculus hints at a way to improve analysis of exceptions: a pushdown stack can precisely match catches to throws in the same way it matches returns to calls. This work generalizes pushdown control-flow analysis to object-oriented programs and to exceptions. Pushdown analysis of exceptions improves precision over the next best analysis, Bravenboer and Smaragdakis's Doop, by orders of magnitude. By then generalizing abstract garbage collection to object-oriented programs, we reduce analysis time by half over pure pushdown analysis. We evaluate our implementation for Dalvik bytecode on standard benchmarks as well as several Android applications.
no_new_dataset
0.704935
1208.6157
Atieh Mirshahvalad
Atieh Mirshahvalad, Olivier H. Beauchesne, Eric Archambault, Martin Rosvall
Resampling effects on significance analysis of network clustering and ranking
12 pages, 7 figures
null
10.1371/journal.pone.0053943
null
physics.soc-ph cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Community detection helps us simplify the complex configuration of networks, but communities are reliable only if they are statistically significant. To detect statistically significant communities, a common approach is to resample the original network and analyze the communities. But resampling assumes independence between samples, while the components of a network are inherently dependent. Therefore, we must understand how breaking dependencies between resampled components affects the results of the significance analysis. Here we use scientific communication as a model system to analyze this effect. Our dataset includes citations among articles published in journals in the years 1984-2010. We compare parametric resampling of citations with non-parametric article resampling. While citation resampling breaks link dependencies, article resampling maintains such dependencies. We find that citation resampling underestimates the variance of link weights. Moreover, this underestimation explains most of the differences in the significance analysis of ranking and clustering. Therefore, when only link weights are available and article resampling is not an option, we suggest a simple parametric resampling scheme that generates link-weight variances close to the link-weight variances of article resampling. Nevertheless, when we highlight and summarize important structural changes in science, the more dependencies we can maintain in the resampling scheme, the earlier we can predict structural change.
[ { "version": "v1", "created": "Thu, 30 Aug 2012 12:58:10 GMT" }, { "version": "v2", "created": "Mon, 11 Feb 2013 10:11:06 GMT" } ]
2013-02-12T00:00:00
[ [ "Mirshahvalad", "Atieh", "" ], [ "Beauchesne", "Olivier H.", "" ], [ "Archambault", "Eric", "" ], [ "Rosvall", "Martin", "" ] ]
TITLE: Resampling effects on significance analysis of network clustering and ranking ABSTRACT: Community detection helps us simplify the complex configuration of networks, but communities are reliable only if they are statistically significant. To detect statistically significant communities, a common approach is to resample the original network and analyze the communities. But resampling assumes independence between samples, while the components of a network are inherently dependent. Therefore, we must understand how breaking dependencies between resampled components affects the results of the significance analysis. Here we use scientific communication as a model system to analyze this effect. Our dataset includes citations among articles published in journals in the years 1984-2010. We compare parametric resampling of citations with non-parametric article resampling. While citation resampling breaks link dependencies, article resampling maintains such dependencies. We find that citation resampling underestimates the variance of link weights. Moreover, this underestimation explains most of the differences in the significance analysis of ranking and clustering. Therefore, when only link weights are available and article resampling is not an option, we suggest a simple parametric resampling scheme that generates link-weight variances close to the link-weight variances of article resampling. Nevertheless, when we highlight and summarize important structural changes in science, the more dependencies we can maintain in the resampling scheme, the earlier we can predict structural change.
no_new_dataset
0.709604
1302.2176
Hugh Brendan McMahan
H. Brendan McMahan
Minimax Optimal Algorithms for Unconstrained Linear Optimization
null
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We design and analyze minimax-optimal algorithms for online linear optimization games where the player's choice is unconstrained. The player strives to minimize regret, the difference between his loss and the loss of a post-hoc benchmark strategy. The standard benchmark is the loss of the best strategy chosen from a bounded comparator set. When the the comparison set and the adversary's gradients satisfy L_infinity bounds, we give the value of the game in closed form and prove it approaches sqrt(2T/pi) as T -> infinity. Interesting algorithms result when we consider soft constraints on the comparator, rather than restricting it to a bounded set. As a warmup, we analyze the game with a quadratic penalty. The value of this game is exactly T/2, and this value is achieved by perhaps the simplest online algorithm of all: unprojected gradient descent with a constant learning rate. We then derive a minimax-optimal algorithm for a much softer penalty function. This algorithm achieves good bounds under the standard notion of regret for any comparator point, without needing to specify the comparator set in advance. The value of this game converges to sqrt{e} as T ->infinity; we give a closed-form for the exact value as a function of T. The resulting algorithm is natural in unconstrained investment or betting scenarios, since it guarantees at worst constant loss, while allowing for exponential reward against an "easy" adversary.
[ { "version": "v1", "created": "Fri, 8 Feb 2013 23:16:04 GMT" } ]
2013-02-12T00:00:00
[ [ "McMahan", "H. Brendan", "" ] ]
TITLE: Minimax Optimal Algorithms for Unconstrained Linear Optimization ABSTRACT: We design and analyze minimax-optimal algorithms for online linear optimization games where the player's choice is unconstrained. The player strives to minimize regret, the difference between his loss and the loss of a post-hoc benchmark strategy. The standard benchmark is the loss of the best strategy chosen from a bounded comparator set. When the the comparison set and the adversary's gradients satisfy L_infinity bounds, we give the value of the game in closed form and prove it approaches sqrt(2T/pi) as T -> infinity. Interesting algorithms result when we consider soft constraints on the comparator, rather than restricting it to a bounded set. As a warmup, we analyze the game with a quadratic penalty. The value of this game is exactly T/2, and this value is achieved by perhaps the simplest online algorithm of all: unprojected gradient descent with a constant learning rate. We then derive a minimax-optimal algorithm for a much softer penalty function. This algorithm achieves good bounds under the standard notion of regret for any comparator point, without needing to specify the comparator set in advance. The value of this game converges to sqrt{e} as T ->infinity; we give a closed-form for the exact value as a function of T. The resulting algorithm is natural in unconstrained investment or betting scenarios, since it guarantees at worst constant loss, while allowing for exponential reward against an "easy" adversary.
no_new_dataset
0.706634
1302.2227
Sina Esfandiarpoor
Sina Esfandiarpoor, Ali Pahlavan, Maziar Goudarzi
Virtual Machine Consolidation for Datacenter Energy Improvement
This is draft version. The finally version will be published
null
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Rapid growth and proliferation of cloud computing services around the world has increased the necessity and significance of improving the energy efficiency of could implementations. Virtual machines (VM) comprise the backend of most, if not all, cloud computing services. Several VMs are often consolidated on a physical machine to better utilize its resources. We take into account the cooling and network structure of the datacenter hosting the physical machines when consolidating the VMs so that fewer racks and routers are employed, without compromising the service-level agreements, so that unused routing and cooling equipment can be turned off to reduce energy consumption. Our experimental results on four benchmarks shows that our technique improves energy consumption of servers, network equipment, and cooling systems by 2.5%, 18.8%, and 28.2% respectively, resulting in a total of 14.7% improvement on average in the entire datacenter.
[ { "version": "v1", "created": "Sat, 9 Feb 2013 12:23:21 GMT" } ]
2013-02-12T00:00:00
[ [ "Esfandiarpoor", "Sina", "" ], [ "Pahlavan", "Ali", "" ], [ "Goudarzi", "Maziar", "" ] ]
TITLE: Virtual Machine Consolidation for Datacenter Energy Improvement ABSTRACT: Rapid growth and proliferation of cloud computing services around the world has increased the necessity and significance of improving the energy efficiency of could implementations. Virtual machines (VM) comprise the backend of most, if not all, cloud computing services. Several VMs are often consolidated on a physical machine to better utilize its resources. We take into account the cooling and network structure of the datacenter hosting the physical machines when consolidating the VMs so that fewer racks and routers are employed, without compromising the service-level agreements, so that unused routing and cooling equipment can be turned off to reduce energy consumption. Our experimental results on four benchmarks shows that our technique improves energy consumption of servers, network equipment, and cooling systems by 2.5%, 18.8%, and 28.2% respectively, resulting in a total of 14.7% improvement on average in the entire datacenter.
no_new_dataset
0.711994
1302.2244
Jiping Xiong
Jiping Xiong, Jian Zhao and Lei Chen
Efficient Data Gathering in Wireless Sensor Networks Based on Matrix Completion and Compressive Sensing
null
null
null
null
cs.NI cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Gathering data in an energy efficient manner in wireless sensor networks is an important design challenge. In wireless sensor networks, the readings of sensors always exhibit intra-temporal and inter-spatial correlations. Therefore, in this letter, we use low rank matrix completion theory to explore the inter-spatial correlation and use compressive sensing theory to take advantage of intra-temporal correlation. Our method, dubbed MCCS, can significantly reduce the amount of data that each sensor must send through network and to the sink, thus prolong the lifetime of the whole networks. Experiments using real datasets demonstrate the feasibility and efficacy of our MCCS method.
[ { "version": "v1", "created": "Sat, 9 Feb 2013 16:34:00 GMT" } ]
2013-02-12T00:00:00
[ [ "Xiong", "Jiping", "" ], [ "Zhao", "Jian", "" ], [ "Chen", "Lei", "" ] ]
TITLE: Efficient Data Gathering in Wireless Sensor Networks Based on Matrix Completion and Compressive Sensing ABSTRACT: Gathering data in an energy efficient manner in wireless sensor networks is an important design challenge. In wireless sensor networks, the readings of sensors always exhibit intra-temporal and inter-spatial correlations. Therefore, in this letter, we use low rank matrix completion theory to explore the inter-spatial correlation and use compressive sensing theory to take advantage of intra-temporal correlation. Our method, dubbed MCCS, can significantly reduce the amount of data that each sensor must send through network and to the sink, thus prolong the lifetime of the whole networks. Experiments using real datasets demonstrate the feasibility and efficacy of our MCCS method.
no_new_dataset
0.71345
1302.2436
Mahmood Ali Mohd
Mohd Mahmood Ali, Mohd S Qaseem, Lakshmi Rajamani, A Govardhan
Extracting useful rules through improved decision tree induction using information entropy
15 pages, 7 figures, 4 tables, International Journal of Information Sciences and Techniques (IJIST) Vol.3, No.1, January 2013
null
10.5121/ijist.2013.3103
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Classification is widely used technique in the data mining domain, where scalability and efficiency are the immediate problems in classification algorithms for large databases. We suggest improvements to the existing C4.5 decision tree algorithm. In this paper attribute oriented induction (AOI) and relevance analysis are incorporated with concept hierarchys knowledge and HeightBalancePriority algorithm for construction of decision tree along with Multi level mining. The assignment of priorities to attributes is done by evaluating information entropy, at different levels of abstraction for building decision tree using HeightBalancePriority algorithm. Modified DMQL queries are used to understand and explore the shortcomings of the decision trees generated by C4.5 classifier for education dataset and the results are compared with the proposed approach.
[ { "version": "v1", "created": "Mon, 11 Feb 2013 10:29:17 GMT" } ]
2013-02-12T00:00:00
[ [ "Ali", "Mohd Mahmood", "" ], [ "Qaseem", "Mohd S", "" ], [ "Rajamani", "Lakshmi", "" ], [ "Govardhan", "A", "" ] ]
TITLE: Extracting useful rules through improved decision tree induction using information entropy ABSTRACT: Classification is widely used technique in the data mining domain, where scalability and efficiency are the immediate problems in classification algorithms for large databases. We suggest improvements to the existing C4.5 decision tree algorithm. In this paper attribute oriented induction (AOI) and relevance analysis are incorporated with concept hierarchys knowledge and HeightBalancePriority algorithm for construction of decision tree along with Multi level mining. The assignment of priorities to attributes is done by evaluating information entropy, at different levels of abstraction for building decision tree using HeightBalancePriority algorithm. Modified DMQL queries are used to understand and explore the shortcomings of the decision trees generated by C4.5 classifier for education dataset and the results are compared with the proposed approach.
no_new_dataset
0.711418
1302.2576
Oluwasanmi Koyejo
Oluwasanmi Koyejo and Cheng Lee and Joydeep Ghosh
The trace norm constrained matrix-variate Gaussian process for multitask bipartite ranking
14 pages, 9 figures, 5 tables
null
null
null
cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a novel hierarchical model for multitask bipartite ranking. The proposed approach combines a matrix-variate Gaussian process with a generative model for task-wise bipartite ranking. In addition, we employ a novel trace constrained variational inference approach to impose low rank structure on the posterior matrix-variate Gaussian process. The resulting posterior covariance function is derived in closed form, and the posterior mean function is the solution to a matrix-variate regression with a novel spectral elastic net regularizer. Further, we show that variational inference for the trace constrained matrix-variate Gaussian process combined with maximum likelihood parameter estimation for the bipartite ranking model is jointly convex. Our motivating application is the prioritization of candidate disease genes. The goal of this task is to aid the identification of unobserved associations between human genes and diseases using a small set of observed associations as well as kernels induced by gene-gene interaction networks and disease ontologies. Our experimental results illustrate the performance of the proposed model on real world datasets. Moreover, we find that the resulting low rank solution improves the computational scalability of training and testing as compared to baseline models.
[ { "version": "v1", "created": "Mon, 11 Feb 2013 19:16:25 GMT" } ]
2013-02-12T00:00:00
[ [ "Koyejo", "Oluwasanmi", "" ], [ "Lee", "Cheng", "" ], [ "Ghosh", "Joydeep", "" ] ]
TITLE: The trace norm constrained matrix-variate Gaussian process for multitask bipartite ranking ABSTRACT: We propose a novel hierarchical model for multitask bipartite ranking. The proposed approach combines a matrix-variate Gaussian process with a generative model for task-wise bipartite ranking. In addition, we employ a novel trace constrained variational inference approach to impose low rank structure on the posterior matrix-variate Gaussian process. The resulting posterior covariance function is derived in closed form, and the posterior mean function is the solution to a matrix-variate regression with a novel spectral elastic net regularizer. Further, we show that variational inference for the trace constrained matrix-variate Gaussian process combined with maximum likelihood parameter estimation for the bipartite ranking model is jointly convex. Our motivating application is the prioritization of candidate disease genes. The goal of this task is to aid the identification of unobserved associations between human genes and diseases using a small set of observed associations as well as kernels induced by gene-gene interaction networks and disease ontologies. Our experimental results illustrate the performance of the proposed model on real world datasets. Moreover, we find that the resulting low rank solution improves the computational scalability of training and testing as compared to baseline models.
no_new_dataset
0.711437
1302.1954
Zheng Li
Zheng Li and Liam O'Brien and He Zhang and Rainbow Cai
On a Catalogue of Metrics for Evaluating Commercial Cloud Services
10 pages, Proceedings of the 13th ACM/IEEE International Conference on Grid Computing (Grid 2012), pp. 164-173, Beijing, China, September 20-23, 2012
null
10.1109/Grid.2012.15
null
cs.DC cs.PF
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Given the continually increasing amount of commercial Cloud services in the market, evaluation of different services plays a significant role in cost-benefit analysis or decision making for choosing Cloud Computing. In particular, employing suitable metrics is essential in evaluation implementations. However, to the best of our knowledge, there is not any systematic discussion about metrics for evaluating Cloud services. By using the method of Systematic Literature Review (SLR), we have collected the de facto metrics adopted in the existing Cloud services evaluation work. The collected metrics were arranged following different Cloud service features to be evaluated, which essentially constructed an evaluation metrics catalogue, as shown in this paper. This metrics catalogue can be used to facilitate the future practice and research in the area of Cloud services evaluation. Moreover, considering metrics selection is a prerequisite of benchmark selection in evaluation implementations, this work also supplements the existing research in benchmarking the commercial Cloud services.
[ { "version": "v1", "created": "Fri, 8 Feb 2013 07:10:19 GMT" } ]
2013-02-11T00:00:00
[ [ "Li", "Zheng", "" ], [ "O'Brien", "Liam", "" ], [ "Zhang", "He", "" ], [ "Cai", "Rainbow", "" ] ]
TITLE: On a Catalogue of Metrics for Evaluating Commercial Cloud Services ABSTRACT: Given the continually increasing amount of commercial Cloud services in the market, evaluation of different services plays a significant role in cost-benefit analysis or decision making for choosing Cloud Computing. In particular, employing suitable metrics is essential in evaluation implementations. However, to the best of our knowledge, there is not any systematic discussion about metrics for evaluating Cloud services. By using the method of Systematic Literature Review (SLR), we have collected the de facto metrics adopted in the existing Cloud services evaluation work. The collected metrics were arranged following different Cloud service features to be evaluated, which essentially constructed an evaluation metrics catalogue, as shown in this paper. This metrics catalogue can be used to facilitate the future practice and research in the area of Cloud services evaluation. Moreover, considering metrics selection is a prerequisite of benchmark selection in evaluation implementations, this work also supplements the existing research in benchmarking the commercial Cloud services.
no_new_dataset
0.701751
1302.0439
Paul Shearer
Paul Shearer, Anna C. Gilbert, Alfred O. Hero III
Correcting Camera Shake by Incremental Sparse Approximation
5 pages, 3 figures. Conference submission
null
null
null
cs.CV cs.GR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The problem of deblurring an image when the blur kernel is unknown remains challenging after decades of work. Recently there has been rapid progress on correcting irregular blur patterns caused by camera shake, but there is still much room for improvement. We propose a new blind deconvolution method using incremental sparse edge approximation to recover images blurred by camera shake. We estimate the blur kernel first from only the strongest edges in the image, then gradually refine this estimate by allowing for weaker and weaker edges. Our method competes with the benchmark deblurring performance of the state-of-the-art while being significantly faster and easier to generalize.
[ { "version": "v1", "created": "Sun, 3 Feb 2013 00:46:11 GMT" }, { "version": "v2", "created": "Thu, 7 Feb 2013 14:34:17 GMT" } ]
2013-02-08T00:00:00
[ [ "Shearer", "Paul", "" ], [ "Gilbert", "Anna C.", "" ], [ "Hero", "Alfred O.", "III" ] ]
TITLE: Correcting Camera Shake by Incremental Sparse Approximation ABSTRACT: The problem of deblurring an image when the blur kernel is unknown remains challenging after decades of work. Recently there has been rapid progress on correcting irregular blur patterns caused by camera shake, but there is still much room for improvement. We propose a new blind deconvolution method using incremental sparse edge approximation to recover images blurred by camera shake. We estimate the blur kernel first from only the strongest edges in the image, then gradually refine this estimate by allowing for weaker and weaker edges. Our method competes with the benchmark deblurring performance of the state-of-the-art while being significantly faster and easier to generalize.
no_new_dataset
0.709233
1302.1529
TongSheng Chu
TongSheng Chu, Yang Xiang
Exploring Parallelism in Learning Belief Networks
Appears in Proceedings of the Thirteenth Conference on Uncertainty in Artificial Intelligence (UAI1997)
null
null
UAI-P-1997-PG-90-98
cs.AI cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
It has been shown that a class of probabilistic domain models cannot be learned correctly by several existing algorithms which employ a single-link look ahead search. When a multi-link look ahead search is used, the computational complexity of the learning algorithm increases. We study how to use parallelism to tackle the increased complexity in learning such models and to speed up learning in large domains. An algorithm is proposed to decompose the learning task for parallel processing. A further task decomposition is used to balance load among processors and to increase the speed-up and efficiency. For learning from very large datasets, we present a regrouping of the available processors such that slow data access through file can be replaced by fast memory access. Our implementation in a parallel computer demonstrates the effectiveness of the algorithm.
[ { "version": "v1", "created": "Wed, 6 Feb 2013 15:54:31 GMT" } ]
2013-02-08T00:00:00
[ [ "Chu", "TongSheng", "" ], [ "Xiang", "Yang", "" ] ]
TITLE: Exploring Parallelism in Learning Belief Networks ABSTRACT: It has been shown that a class of probabilistic domain models cannot be learned correctly by several existing algorithms which employ a single-link look ahead search. When a multi-link look ahead search is used, the computational complexity of the learning algorithm increases. We study how to use parallelism to tackle the increased complexity in learning such models and to speed up learning in large domains. An algorithm is proposed to decompose the learning task for parallel processing. A further task decomposition is used to balance load among processors and to increase the speed-up and efficiency. For learning from very large datasets, we present a regrouping of the available processors such that slow data access through file can be replaced by fast memory access. Our implementation in a parallel computer demonstrates the effectiveness of the algorithm.
no_new_dataset
0.707007
1302.1591
Charng-Da Lu
Charng-Da Lu
Automatically Mining Program Build Information via Signature Matching
null
null
null
null
cs.SE
http://creativecommons.org/licenses/by/3.0/
Program build information, such as compilers and libraries used, is vitally important in an auditing and benchmarking framework for HPC systems. We have developed a tool to automatically extract this information using signature-based detection, a common strategy employed by anti-virus software to search for known patterns of data within the program binaries. We formulate the patterns from various "features" embedded in the program binaries, and the experiment shows that our tool can successfully identify many different compilers, libraries, and their versions.
[ { "version": "v1", "created": "Wed, 6 Feb 2013 21:45:34 GMT" } ]
2013-02-08T00:00:00
[ [ "Lu", "Charng-Da", "" ] ]
TITLE: Automatically Mining Program Build Information via Signature Matching ABSTRACT: Program build information, such as compilers and libraries used, is vitally important in an auditing and benchmarking framework for HPC systems. We have developed a tool to automatically extract this information using signature-based detection, a common strategy employed by anti-virus software to search for known patterns of data within the program binaries. We formulate the patterns from various "features" embedded in the program binaries, and the experiment shows that our tool can successfully identify many different compilers, libraries, and their versions.
no_new_dataset
0.706437
1109.4920
Reza Farrahi Moghaddam
Reza Farrahi Moghaddam and Mohamed Cheriet
Beyond pixels and regions: A non local patch means (NLPM) method for content-level restoration, enhancement, and reconstruction of degraded document images
This paper has been withdrawn by the author to avoid duplication on the DBLP bibliography
Pattern Recognition 44 (2011) 363-374
10.1016/j.patcog.2010.07.027
null
cs.CV cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A patch-based non-local restoration and reconstruction method for preprocessing degraded document images is introduced. The method collects relative data from the whole input image, while the image data are first represented by a content-level descriptor based on patches. This patch-equivalent representation of the input image is then corrected based on similar patches identified using a modified genetic algorithm (GA) resulting in a low computational load. The corrected patch-equivalent is then converted to the output restored image. The fact that the method uses the patches at the content level allows it to incorporate high-level restoration in an objective and self-sufficient way. The method has been applied to several degraded document images, including the DIBCO'09 contest dataset with promising results.
[ { "version": "v1", "created": "Thu, 22 Sep 2011 19:24:58 GMT" }, { "version": "v2", "created": "Fri, 7 Oct 2011 16:46:52 GMT" }, { "version": "v3", "created": "Tue, 8 Nov 2011 22:33:13 GMT" } ]
2013-02-07T00:00:00
[ [ "Moghaddam", "Reza Farrahi", "" ], [ "Cheriet", "Mohamed", "" ] ]
TITLE: Beyond pixels and regions: A non local patch means (NLPM) method for content-level restoration, enhancement, and reconstruction of degraded document images ABSTRACT: A patch-based non-local restoration and reconstruction method for preprocessing degraded document images is introduced. The method collects relative data from the whole input image, while the image data are first represented by a content-level descriptor based on patches. This patch-equivalent representation of the input image is then corrected based on similar patches identified using a modified genetic algorithm (GA) resulting in a low computational load. The corrected patch-equivalent is then converted to the output restored image. The fact that the method uses the patches at the content level allows it to incorporate high-level restoration in an objective and self-sufficient way. The method has been applied to several degraded document images, including the DIBCO'09 contest dataset with promising results.
no_new_dataset
0.710478
1302.1007
Firas Ajil Jassim
Firas Ajil Jassim
Image Denoising Using Interquartile Range Filter with Local Averaging
5 pages, 8 figures, 2 tables
International Journal of Soft Computing and Engineering (IJSCE) ISSN: 2231-2307, Volume-2, Issue-6, January 2013
null
null
cs.CV
http://creativecommons.org/licenses/by/3.0/
Image denoising is one of the fundamental problems in image processing. In this paper, a novel approach to suppress noise from the image is conducted by applying the interquartile range (IQR) which is one of the statistical methods used to detect outlier effect from a dataset. A window of size kXk was implemented to support IQR filter. Each pixel outside the IQR range of the kXk window is treated as noisy pixel. The estimation of the noisy pixels was obtained by local averaging. The essential advantage of applying IQR filter is to preserve edge sharpness better of the original image. A variety of test images have been used to support the proposed filter and PSNR was calculated and compared with median filter. The experimental results on standard test images demonstrate this filter is simpler and better performing than median filter.
[ { "version": "v1", "created": "Tue, 5 Feb 2013 12:02:53 GMT" } ]
2013-02-06T00:00:00
[ [ "Jassim", "Firas Ajil", "" ] ]
TITLE: Image Denoising Using Interquartile Range Filter with Local Averaging ABSTRACT: Image denoising is one of the fundamental problems in image processing. In this paper, a novel approach to suppress noise from the image is conducted by applying the interquartile range (IQR) which is one of the statistical methods used to detect outlier effect from a dataset. A window of size kXk was implemented to support IQR filter. Each pixel outside the IQR range of the kXk window is treated as noisy pixel. The estimation of the noisy pixels was obtained by local averaging. The essential advantage of applying IQR filter is to preserve edge sharpness better of the original image. A variety of test images have been used to support the proposed filter and PSNR was calculated and compared with median filter. The experimental results on standard test images demonstrate this filter is simpler and better performing than median filter.
no_new_dataset
0.709416
1302.1078
Erik Saule
Erik Saule, Kamer Kaya, Umit V. Catalyurek
Performance Evaluation of Sparse Matrix Multiplication Kernels on Intel Xeon Phi
null
null
null
null
cs.PF cs.AR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Intel Xeon Phi is a recently released high-performance coprocessor which features 61 cores each supporting 4 hardware threads with 512-bit wide SIMD registers achieving a peak theoretical performance of 1Tflop/s in double precision. Many scientific applications involve operations on large sparse matrices such as linear solvers, eigensolver, and graph mining algorithms. The core of most of these applications involves the multiplication of a large, sparse matrix with a dense vector (SpMV). In this paper, we investigate the performance of the Xeon Phi coprocessor for SpMV. We first provide a comprehensive introduction to this new architecture and analyze its peak performance with a number of micro benchmarks. Although the design of a Xeon Phi core is not much different than those of the cores in modern processors, its large number of cores and hyperthreading capability allow many application to saturate the available memory bandwidth, which is not the case for many cutting-edge processors. Yet, our performance studies show that it is the memory latency not the bandwidth which creates a bottleneck for SpMV on this architecture. Finally, our experiments show that Xeon Phi's sparse kernel performance is very promising and even better than that of cutting-edge general purpose processors and GPUs.
[ { "version": "v1", "created": "Tue, 5 Feb 2013 16:06:15 GMT" } ]
2013-02-06T00:00:00
[ [ "Saule", "Erik", "" ], [ "Kaya", "Kamer", "" ], [ "Catalyurek", "Umit V.", "" ] ]
TITLE: Performance Evaluation of Sparse Matrix Multiplication Kernels on Intel Xeon Phi ABSTRACT: Intel Xeon Phi is a recently released high-performance coprocessor which features 61 cores each supporting 4 hardware threads with 512-bit wide SIMD registers achieving a peak theoretical performance of 1Tflop/s in double precision. Many scientific applications involve operations on large sparse matrices such as linear solvers, eigensolver, and graph mining algorithms. The core of most of these applications involves the multiplication of a large, sparse matrix with a dense vector (SpMV). In this paper, we investigate the performance of the Xeon Phi coprocessor for SpMV. We first provide a comprehensive introduction to this new architecture and analyze its peak performance with a number of micro benchmarks. Although the design of a Xeon Phi core is not much different than those of the cores in modern processors, its large number of cores and hyperthreading capability allow many application to saturate the available memory bandwidth, which is not the case for many cutting-edge processors. Yet, our performance studies show that it is the memory latency not the bandwidth which creates a bottleneck for SpMV on this architecture. Finally, our experiments show that Xeon Phi's sparse kernel performance is very promising and even better than that of cutting-edge general purpose processors and GPUs.
no_new_dataset
0.708213