id
large_stringlengths 9
16
| submitter
large_stringlengths 3
64
⌀ | authors
large_stringlengths 5
20.2k
| title
large_stringlengths 5
245
| comments
large_stringlengths 1
482
⌀ | journal-ref
large_stringlengths 4
382
⌀ | doi
large_stringlengths 9
151
⌀ | report-no
large_stringlengths 2
509
⌀ | categories
large_stringlengths 5
78
| license
large_stringclasses 9
values | abstract
large_stringlengths 83
3.55k
| versions
large listlengths 1
21
| update_date
timestamp[ms]date 2007-05-23 00:00:00
2025-05-30 00:00:00
| authors_parsed
large listlengths 1
1.35k
| prompt
large_stringlengths 166
3.64k
| label
stringclasses 2
values | prob
float64 0.5
0.73
|
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1212.2823
|
Shuran Song
|
Shuran Song, Jianxiong Xiao
|
Tracking Revisited using RGBD Camera: Baseline and Benchmark
| null | null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Although there has been significant progress in the past decade,tracking is
still a very challenging computer vision task, due to problems such as
occlusion and model drift.Recently, the increased popularity of depth sensors
e.g. Microsoft Kinect has made it easy to obtain depth data at low cost.This
may be a game changer for tracking, since depth information can be used to
prevent model drift and handle occlusion.In this paper, we construct a
benchmark dataset of 100 RGBD videos with high diversity, including deformable
objects, various occlusion conditions and moving cameras. We propose a very
simple but strong baseline model for RGBD tracking, and present a quantitative
comparison of several state-of-the-art tracking algorithms.Experimental results
show that including depth information and reasoning about occlusion
significantly improves tracking performance. The datasets, evaluation details,
source code for the baseline algorithm, and instructions for submitting new
models will be made available online after acceptance.
|
[
{
"version": "v1",
"created": "Wed, 12 Dec 2012 14:02:41 GMT"
}
] | 2012-12-13T00:00:00
|
[
[
"Song",
"Shuran",
""
],
[
"Xiao",
"Jianxiong",
""
]
] |
TITLE: Tracking Revisited using RGBD Camera: Baseline and Benchmark
ABSTRACT: Although there has been significant progress in the past decade,tracking is
still a very challenging computer vision task, due to problems such as
occlusion and model drift.Recently, the increased popularity of depth sensors
e.g. Microsoft Kinect has made it easy to obtain depth data at low cost.This
may be a game changer for tracking, since depth information can be used to
prevent model drift and handle occlusion.In this paper, we construct a
benchmark dataset of 100 RGBD videos with high diversity, including deformable
objects, various occlusion conditions and moving cameras. We propose a very
simple but strong baseline model for RGBD tracking, and present a quantitative
comparison of several state-of-the-art tracking algorithms.Experimental results
show that including depth information and reasoning about occlusion
significantly improves tracking performance. The datasets, evaluation details,
source code for the baseline algorithm, and instructions for submitting new
models will be made available online after acceptance.
|
new_dataset
| 0.714584
|
1212.2825
|
Elias Koutsoupias
|
Elias Koutsoupias, Stefano Leonardi, and Tim Roughgarden
|
Near-Optimal Multi-Unit Auctions with Ordered Bidders
| null | null | null | null |
cs.GT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We construct prior-free auctions with constant-factor approximation
guarantees with ordered bidders, in both unlimited and limited supply settings.
We compare the expected revenue of our auctions on a bid vector to the monotone
price benchmark, the maximum revenue that can be obtained from a bid vector
using supply-respecting prices that are nonincreasing in the bidder ordering
and bounded above by the second-highest bid. As a consequence, our auctions are
simultaneously near-optimal in a wide range of Bayesian multi-unit
environments.
|
[
{
"version": "v1",
"created": "Wed, 12 Dec 2012 14:14:40 GMT"
}
] | 2012-12-13T00:00:00
|
[
[
"Koutsoupias",
"Elias",
""
],
[
"Leonardi",
"Stefano",
""
],
[
"Roughgarden",
"Tim",
""
]
] |
TITLE: Near-Optimal Multi-Unit Auctions with Ordered Bidders
ABSTRACT: We construct prior-free auctions with constant-factor approximation
guarantees with ordered bidders, in both unlimited and limited supply settings.
We compare the expected revenue of our auctions on a bid vector to the monotone
price benchmark, the maximum revenue that can be obtained from a bid vector
using supply-respecting prices that are nonincreasing in the bidder ordering
and bounded above by the second-highest bid. As a consequence, our auctions are
simultaneously near-optimal in a wide range of Bayesian multi-unit
environments.
|
no_new_dataset
| 0.7082
|
1212.2281
|
Ashok Kumar ps
|
Ashok kumar.P.S, G.Mahadevan, Gopal Krishna.C
|
Recapitulation of Web Services based on Tree Structure
|
5pages,3 figures, 2 tables, IJCA conference
|
ACCTHPCA, June 2012
| null | null |
cs.SE cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The Recapitulation of Web service is an approach for the effective
integration of distributed, heterogeneous and autonomous applications to build
more Structured and value added services. Web services selection algorithms are
required to find and select the best services. A QoS is a benchmark to select
the best service for the task of composition. The importance of the web
services selection algorithm is to maximize the QoS of the web services
recapitulation using complex service provider's (CSP) QoS requirement
parameters. This paper have discussed about different Web service
Service-offers. We have classified the CSP's requirements defined on the QoS
and Service-offers based on its structure. We have proposed a tree structure to
represent the CSP's requirement to be defined based on the multiple QoS
properties.
|
[
{
"version": "v1",
"created": "Tue, 11 Dec 2012 02:24:13 GMT"
}
] | 2012-12-12T00:00:00
|
[
[
"S",
"Ashok kumar. P.",
""
],
[
"Mahadevan",
"G.",
""
],
[
"C",
"Gopal Krishna.",
""
]
] |
TITLE: Recapitulation of Web Services based on Tree Structure
ABSTRACT: The Recapitulation of Web service is an approach for the effective
integration of distributed, heterogeneous and autonomous applications to build
more Structured and value added services. Web services selection algorithms are
required to find and select the best services. A QoS is a benchmark to select
the best service for the task of composition. The importance of the web
services selection algorithm is to maximize the QoS of the web services
recapitulation using complex service provider's (CSP) QoS requirement
parameters. This paper have discussed about different Web service
Service-offers. We have classified the CSP's requirements defined on the QoS
and Service-offers based on its structure. We have proposed a tree structure to
represent the CSP's requirement to be defined based on the multiple QoS
properties.
|
no_new_dataset
| 0.710478
|
1212.2455
|
David Allen
|
David Allen, Adnan Darwiche
|
New Advances in Inference by Recursive Conditioning
|
Appears in Proceedings of the Nineteenth Conference on Uncertainty in
Artificial Intelligence (UAI2003)
| null | null |
UAI-P-2003-PG-2-10
|
cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Recursive Conditioning (RC) was introduced recently as the first any-space
algorithm for inference in Bayesian networks which can trade time for space by
varying the size of its cache at the increment needed to store a floating point
number. Under full caching, RC has an asymptotic time and space complexity
which is comparable to mainstream algorithms based on variable elimination and
clustering (exponential in the network treewidth and linear in its size). We
show two main results about RC in this paper. First, we show that its actual
space requirements under full caching are much more modest than those needed by
mainstream methods and study the implications of this finding. Second, we show
that RC can effectively deal with determinism in Bayesian networks by employing
standard logical techniques, such as unit resolution, allowing a significant
reduction in its time requirements in certain cases. We illustrate our results
using a number of benchmark networks, including the very challenging ones that
arise in genetic linkage analysis.
|
[
{
"version": "v1",
"created": "Fri, 19 Oct 2012 15:03:22 GMT"
}
] | 2012-12-12T00:00:00
|
[
[
"Allen",
"David",
""
],
[
"Darwiche",
"Adnan",
""
]
] |
TITLE: New Advances in Inference by Recursive Conditioning
ABSTRACT: Recursive Conditioning (RC) was introduced recently as the first any-space
algorithm for inference in Bayesian networks which can trade time for space by
varying the size of its cache at the increment needed to store a floating point
number. Under full caching, RC has an asymptotic time and space complexity
which is comparable to mainstream algorithms based on variable elimination and
clustering (exponential in the network treewidth and linear in its size). We
show two main results about RC in this paper. First, we show that its actual
space requirements under full caching are much more modest than those needed by
mainstream methods and study the implications of this finding. Second, we show
that RC can effectively deal with determinism in Bayesian networks by employing
standard logical techniques, such as unit resolution, allowing a significant
reduction in its time requirements in certain cases. We illustrate our results
using a number of benchmark networks, including the very challenging ones that
arise in genetic linkage analysis.
|
no_new_dataset
| 0.711067
|
1212.2468
|
David Maxwell Chickering
|
David Maxwell Chickering, Christopher Meek, David Heckerman
|
Large-Sample Learning of Bayesian Networks is NP-Hard
|
Appears in Proceedings of the Nineteenth Conference on Uncertainty in
Artificial Intelligence (UAI2003)
| null | null |
UAI-P-2003-PG-124-133
|
cs.LG cs.AI stat.ML
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we provide new complexity results for algorithms that learn
discrete-variable Bayesian networks from data. Our results apply whenever the
learning algorithm uses a scoring criterion that favors the simplest model able
to represent the generative distribution exactly. Our results therefore hold
whenever the learning algorithm uses a consistent scoring criterion and is
applied to a sufficiently large dataset. We show that identifying high-scoring
structures is hard, even when we are given an independence oracle, an inference
oracle, and/or an information oracle. Our negative results also apply to the
learning of discrete-variable Bayesian networks in which each node has at most
k parents, for all k > 3.
|
[
{
"version": "v1",
"created": "Fri, 19 Oct 2012 15:04:28 GMT"
}
] | 2012-12-12T00:00:00
|
[
[
"Chickering",
"David Maxwell",
""
],
[
"Meek",
"Christopher",
""
],
[
"Heckerman",
"David",
""
]
] |
TITLE: Large-Sample Learning of Bayesian Networks is NP-Hard
ABSTRACT: In this paper, we provide new complexity results for algorithms that learn
discrete-variable Bayesian networks from data. Our results apply whenever the
learning algorithm uses a scoring criterion that favors the simplest model able
to represent the generative distribution exactly. Our results therefore hold
whenever the learning algorithm uses a consistent scoring criterion and is
applied to a sufficiently large dataset. We show that identifying high-scoring
structures is hard, even when we are given an independence oracle, an inference
oracle, and/or an information oracle. Our negative results also apply to the
learning of discrete-variable Bayesian networks in which each node has at most
k parents, for all k > 3.
|
no_new_dataset
| 0.712851
|
1212.2478
|
Rong Jin
|
Rong Jin, Luo Si, ChengXiang Zhai
|
Preference-based Graphic Models for Collaborative Filtering
|
Appears in Proceedings of the Nineteenth Conference on Uncertainty in
Artificial Intelligence (UAI2003)
| null | null |
UAI-P-2003-PG-329-336
|
cs.IR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Collaborative filtering is a very useful general technique for exploiting the
preference patterns of a group of users to predict the utility of items to a
particular user. Previous research has studied several probabilistic graphic
models for collaborative filtering with promising results. However, while these
models have succeeded in capturing the similarity among users and items in one
way or the other, none of them has considered the fact that users with similar
interests in items can have very different rating patterns; some users tend to
assign a higher rating to all items than other users. In this paper, we propose
and study of two new graphic models that address the distinction between user
preferences and ratings. In one model, called the decoupled model, we introduce
two different variables to decouple a users preferences FROM his ratings. IN
the other, called the preference model, we model the orderings OF items
preferred BY a USER, rather than the USERs numerical ratings of items.
Empirical study over two datasets of movie ratings shows that appropriate
modeling of the distinction between user preferences and ratings improves the
performance substantially and consistently. Specifically, the proposed
decoupled model outperforms all five existing approaches that we compare with
significantly, but the preference model is not very successful. These results
suggest that explicit modeling of the underlying user preferences is very
important for collaborative filtering, but we can not afford ignoring the
rating information completely.
|
[
{
"version": "v1",
"created": "Fri, 19 Oct 2012 15:06:09 GMT"
}
] | 2012-12-12T00:00:00
|
[
[
"Jin",
"Rong",
""
],
[
"Si",
"Luo",
""
],
[
"Zhai",
"ChengXiang",
""
]
] |
TITLE: Preference-based Graphic Models for Collaborative Filtering
ABSTRACT: Collaborative filtering is a very useful general technique for exploiting the
preference patterns of a group of users to predict the utility of items to a
particular user. Previous research has studied several probabilistic graphic
models for collaborative filtering with promising results. However, while these
models have succeeded in capturing the similarity among users and items in one
way or the other, none of them has considered the fact that users with similar
interests in items can have very different rating patterns; some users tend to
assign a higher rating to all items than other users. In this paper, we propose
and study of two new graphic models that address the distinction between user
preferences and ratings. In one model, called the decoupled model, we introduce
two different variables to decouple a users preferences FROM his ratings. IN
the other, called the preference model, we model the orderings OF items
preferred BY a USER, rather than the USERs numerical ratings of items.
Empirical study over two datasets of movie ratings shows that appropriate
modeling of the distinction between user preferences and ratings improves the
performance substantially and consistently. Specifically, the proposed
decoupled model outperforms all five existing approaches that we compare with
significantly, but the preference model is not very successful. These results
suggest that explicit modeling of the underlying user preferences is very
important for collaborative filtering, but we can not afford ignoring the
rating information completely.
|
no_new_dataset
| 0.709856
|
1212.2483
|
Amir Globerson
|
Amir Globerson, Gal Chechik, Naftali Tishby
|
Sufficient Dimensionality Reduction with Irrelevant Statistics
|
Appears in Proceedings of the Nineteenth Conference on Uncertainty in
Artificial Intelligence (UAI2003)
| null | null |
UAI-P-2003-PG-281-288
|
cs.LG stat.ML
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The problem of finding a reduced dimensionality representation of categorical
variables while preserving their most relevant characteristics is fundamental
for the analysis of complex data. Specifically, given a co-occurrence matrix of
two variables, one often seeks a compact representation of one variable which
preserves information about the other variable. We have recently introduced
``Sufficient Dimensionality Reduction' [GT-2003], a method that extracts
continuous reduced dimensional features whose measurements (i.e., expectation
values) capture maximal mutual information among the variables. However, such
measurements often capture information that is irrelevant for a given task.
Widely known examples are illumination conditions, which are irrelevant as
features for face recognition, writing style which is irrelevant as a feature
for content classification, and intonation which is irrelevant as a feature for
speech recognition. Such irrelevance cannot be deduced apriori, since it
depends on the details of the task, and is thus inherently ill defined in the
purely unsupervised case. Separating relevant from irrelevant features can be
achieved using additional side data that contains such irrelevant structures.
This approach was taken in [CT-2002], extending the information bottleneck
method, which uses clustering to compress the data. Here we use this
side-information framework to identify features whose measurements are
maximally informative for the original data set, but carry as little
information as possible on a side data set. In statistical terms this can be
understood as extracting statistics which are maximally sufficient for the
original dataset, while simultaneously maximally ancillary for the side
dataset. We formulate this tradeoff as a constrained optimization problem and
characterize its solutions. We then derive a gradient descent algorithm for
this problem, which is based on the Generalized Iterative Scaling method for
finding maximum entropy distributions. The method is demonstrated on synthetic
data, as well as on real face recognition datasets, and is shown to outperform
standard methods such as oriented PCA.
|
[
{
"version": "v1",
"created": "Fri, 19 Oct 2012 15:05:46 GMT"
}
] | 2012-12-12T00:00:00
|
[
[
"Globerson",
"Amir",
""
],
[
"Chechik",
"Gal",
""
],
[
"Tishby",
"Naftali",
""
]
] |
TITLE: Sufficient Dimensionality Reduction with Irrelevant Statistics
ABSTRACT: The problem of finding a reduced dimensionality representation of categorical
variables while preserving their most relevant characteristics is fundamental
for the analysis of complex data. Specifically, given a co-occurrence matrix of
two variables, one often seeks a compact representation of one variable which
preserves information about the other variable. We have recently introduced
``Sufficient Dimensionality Reduction' [GT-2003], a method that extracts
continuous reduced dimensional features whose measurements (i.e., expectation
values) capture maximal mutual information among the variables. However, such
measurements often capture information that is irrelevant for a given task.
Widely known examples are illumination conditions, which are irrelevant as
features for face recognition, writing style which is irrelevant as a feature
for content classification, and intonation which is irrelevant as a feature for
speech recognition. Such irrelevance cannot be deduced apriori, since it
depends on the details of the task, and is thus inherently ill defined in the
purely unsupervised case. Separating relevant from irrelevant features can be
achieved using additional side data that contains such irrelevant structures.
This approach was taken in [CT-2002], extending the information bottleneck
method, which uses clustering to compress the data. Here we use this
side-information framework to identify features whose measurements are
maximally informative for the original data set, but carry as little
information as possible on a side data set. In statistical terms this can be
understood as extracting statistics which are maximally sufficient for the
original dataset, while simultaneously maximally ancillary for the side
dataset. We formulate this tradeoff as a constrained optimization problem and
characterize its solutions. We then derive a gradient descent algorithm for
this problem, which is based on the Generalized Iterative Scaling method for
finding maximum entropy distributions. The method is demonstrated on synthetic
data, as well as on real face recognition datasets, and is shown to outperform
standard methods such as oriented PCA.
|
no_new_dataset
| 0.707771
|
1212.2546
|
Jonathan Masci
|
Jonathan Masci and Jes\'us Angulo and J\"urgen Schmidhuber
|
A Learning Framework for Morphological Operators using Counter-Harmonic
Mean
|
Submitted to ISMM'13
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present a novel framework for learning morphological operators using
counter-harmonic mean. It combines concepts from morphology and convolutional
neural networks. A thorough experimental validation analyzes basic
morphological operators dilation and erosion, opening and closing, as well as
the much more complex top-hat transform, for which we report a real-world
application from the steel industry. Using online learning and stochastic
gradient descent, our system learns both the structuring element and the
composition of operators. It scales well to large datasets and online settings.
|
[
{
"version": "v1",
"created": "Tue, 11 Dec 2012 17:29:04 GMT"
}
] | 2012-12-12T00:00:00
|
[
[
"Masci",
"Jonathan",
""
],
[
"Angulo",
"Jesús",
""
],
[
"Schmidhuber",
"Jürgen",
""
]
] |
TITLE: A Learning Framework for Morphological Operators using Counter-Harmonic
Mean
ABSTRACT: We present a novel framework for learning morphological operators using
counter-harmonic mean. It combines concepts from morphology and convolutional
neural networks. A thorough experimental validation analyzes basic
morphological operators dilation and erosion, opening and closing, as well as
the much more complex top-hat transform, for which we report a real-world
application from the steel industry. Using online learning and stochastic
gradient descent, our system learns both the structuring element and the
composition of operators. It scales well to large datasets and online settings.
|
no_new_dataset
| 0.710666
|
1212.2573
|
K. S. Sesh Kumar
|
K. S. Sesh Kumar (LIENS, INRIA Paris - Rocquencourt), Francis Bach
(LIENS, INRIA Paris - Rocquencourt)
|
Convex Relaxations for Learning Bounded Treewidth Decomposable Graphs
| null | null | null | null |
cs.LG cs.DS stat.ML
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We consider the problem of learning the structure of undirected graphical
models with bounded treewidth, within the maximum likelihood framework. This is
an NP-hard problem and most approaches consider local search techniques. In
this paper, we pose it as a combinatorial optimization problem, which is then
relaxed to a convex optimization problem that involves searching over the
forest and hyperforest polytopes with special structures, independently. A
supergradient method is used to solve the dual problem, with a run-time
complexity of $O(k^3 n^{k+2} \log n)$ for each iteration, where $n$ is the
number of variables and $k$ is a bound on the treewidth. We compare our
approach to state-of-the-art methods on synthetic datasets and classical
benchmarks, showing the gains of the novel convex approach.
|
[
{
"version": "v1",
"created": "Tue, 11 Dec 2012 18:22:31 GMT"
}
] | 2012-12-12T00:00:00
|
[
[
"Kumar",
"K. S. Sesh",
"",
"LIENS, INRIA Paris - Rocquencourt"
],
[
"Bach",
"Francis",
"",
"LIENS, INRIA Paris - Rocquencourt"
]
] |
TITLE: Convex Relaxations for Learning Bounded Treewidth Decomposable Graphs
ABSTRACT: We consider the problem of learning the structure of undirected graphical
models with bounded treewidth, within the maximum likelihood framework. This is
an NP-hard problem and most approaches consider local search techniques. In
this paper, we pose it as a combinatorial optimization problem, which is then
relaxed to a convex optimization problem that involves searching over the
forest and hyperforest polytopes with special structures, independently. A
supergradient method is used to solve the dual problem, with a run-time
complexity of $O(k^3 n^{k+2} \log n)$ for each iteration, where $n$ is the
number of variables and $k$ is a bound on the treewidth. We compare our
approach to state-of-the-art methods on synthetic datasets and classical
benchmarks, showing the gains of the novel convex approach.
|
no_new_dataset
| 0.709177
|
1212.1909
|
Luay Nakhleh
|
Yun Yu and Luay Nakhleh
|
Fast Algorithms for Reconciliation under Hybridization and Incomplete
Lineage Sorting
| null | null | null | null |
q-bio.PE cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Reconciling a gene tree with a species tree is an important task that reveals
much about the evolution of genes, genomes, and species, as well as about the
molecular function of genes. A wide array of computational tools have been
devised for this task under certain evolutionary events such as hybridization,
gene duplication/loss, or incomplete lineage sorting. Work on reconciling gene
tree with species phylogenies under two or more of these events have also begun
to emerge. Our group recently devised both parsimony and probabilistic
frameworks for reconciling a gene tree with a phylogenetic network, thus
allowing for the detection of hybridization in the presence of incomplete
lineage sorting. While the frameworks were general and could handle any
topology, they are computationally intensive, rendering their application to
large datasets infeasible. In this paper, we present two novel approaches to
address the computational challenges of the two frameworks that are based on
the concept of ancestral configurations. Our approaches still compute exact
solutions while improving the computational time by up to five orders of
magnitude. These substantial gains in speed scale the applicability of these
unified reconciliation frameworks to much larger data sets. We discuss how the
topological features of the gene tree and phylogenetic network may affect the
performance of the new algorithms. We have implemented the algorithms in our
PhyloNet software package, which is publicly available in open source.
|
[
{
"version": "v1",
"created": "Sun, 9 Dec 2012 18:12:55 GMT"
}
] | 2012-12-11T00:00:00
|
[
[
"Yu",
"Yun",
""
],
[
"Nakhleh",
"Luay",
""
]
] |
TITLE: Fast Algorithms for Reconciliation under Hybridization and Incomplete
Lineage Sorting
ABSTRACT: Reconciling a gene tree with a species tree is an important task that reveals
much about the evolution of genes, genomes, and species, as well as about the
molecular function of genes. A wide array of computational tools have been
devised for this task under certain evolutionary events such as hybridization,
gene duplication/loss, or incomplete lineage sorting. Work on reconciling gene
tree with species phylogenies under two or more of these events have also begun
to emerge. Our group recently devised both parsimony and probabilistic
frameworks for reconciling a gene tree with a phylogenetic network, thus
allowing for the detection of hybridization in the presence of incomplete
lineage sorting. While the frameworks were general and could handle any
topology, they are computationally intensive, rendering their application to
large datasets infeasible. In this paper, we present two novel approaches to
address the computational challenges of the two frameworks that are based on
the concept of ancestral configurations. Our approaches still compute exact
solutions while improving the computational time by up to five orders of
magnitude. These substantial gains in speed scale the applicability of these
unified reconciliation frameworks to much larger data sets. We discuss how the
topological features of the gene tree and phylogenetic network may affect the
performance of the new algorithms. We have implemented the algorithms in our
PhyloNet software package, which is publicly available in open source.
|
no_new_dataset
| 0.710823
|
1212.1936
|
Nicolas Boulanger-Lewandowski
|
Nicolas Boulanger-Lewandowski, Yoshua Bengio and Pascal Vincent
|
High-dimensional sequence transduction
| null | null | null | null |
cs.LG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We investigate the problem of transforming an input sequence into a
high-dimensional output sequence in order to transcribe polyphonic audio music
into symbolic notation. We introduce a probabilistic model based on a recurrent
neural network that is able to learn realistic output distributions given the
input and we devise an efficient algorithm to search for the global mode of
that distribution. The resulting method produces musically plausible
transcriptions even under high levels of noise and drastically outperforms
previous state-of-the-art approaches on five datasets of synthesized sounds and
real recordings, approximately halving the test error rate.
|
[
{
"version": "v1",
"created": "Sun, 9 Dec 2012 23:28:02 GMT"
}
] | 2012-12-11T00:00:00
|
[
[
"Boulanger-Lewandowski",
"Nicolas",
""
],
[
"Bengio",
"Yoshua",
""
],
[
"Vincent",
"Pascal",
""
]
] |
TITLE: High-dimensional sequence transduction
ABSTRACT: We investigate the problem of transforming an input sequence into a
high-dimensional output sequence in order to transcribe polyphonic audio music
into symbolic notation. We introduce a probabilistic model based on a recurrent
neural network that is able to learn realistic output distributions given the
input and we devise an efficient algorithm to search for the global mode of
that distribution. The resulting method produces musically plausible
transcriptions even under high levels of noise and drastically outperforms
previous state-of-the-art approaches on five datasets of synthesized sounds and
real recordings, approximately halving the test error rate.
|
no_new_dataset
| 0.710666
|
1212.1633
|
Andrei Bulatov
|
Cong Wang and Andrei A. Bulatov
|
Inferring Attitude in Online Social Networks Based On Quadratic
Correlation
|
18 pages, 3 figures
| null | null | null |
cs.SI physics.soc-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The structure of an online social network in most cases cannot be described
just by links between its members. We study online social networks, in which
members may have certain attitude, positive or negative toward each other, and
so the network consists of a mixture of both positive and negative
relationships. Our goal is to predict the sign of a given relationship based on
the evidences provided in the current snapshot of the network. More precisely,
using machine learning techniques we develop a model that after being trained
on a particular network predicts the sign of an unknown or hidden link. The
model uses relationships and influences from peers as evidences for the guess,
however, the set of peers used is not predefined but rather learned during the
training process. We use quadratic correlation between peer members to train
the predictor. The model is tested on popular online datasets such as Epinions,
Slashdot, and Wikipedia. In many cases it shows almost perfect prediction
accuracy. Moreover, our model can also be efficiently updated as the
underlaying social network evolves.
|
[
{
"version": "v1",
"created": "Fri, 7 Dec 2012 15:45:35 GMT"
}
] | 2012-12-10T00:00:00
|
[
[
"Wang",
"Cong",
""
],
[
"Bulatov",
"Andrei A.",
""
]
] |
TITLE: Inferring Attitude in Online Social Networks Based On Quadratic
Correlation
ABSTRACT: The structure of an online social network in most cases cannot be described
just by links between its members. We study online social networks, in which
members may have certain attitude, positive or negative toward each other, and
so the network consists of a mixture of both positive and negative
relationships. Our goal is to predict the sign of a given relationship based on
the evidences provided in the current snapshot of the network. More precisely,
using machine learning techniques we develop a model that after being trained
on a particular network predicts the sign of an unknown or hidden link. The
model uses relationships and influences from peers as evidences for the guess,
however, the set of peers used is not predefined but rather learned during the
training process. We use quadratic correlation between peer members to train
the predictor. The model is tested on popular online datasets such as Epinions,
Slashdot, and Wikipedia. In many cases it shows almost perfect prediction
accuracy. Moreover, our model can also be efficiently updated as the
underlaying social network evolves.
|
no_new_dataset
| 0.709422
|
1211.6086
|
Kang Zhao
|
Kang Zhao, Greta Greer, Baojun Qiu, Prasenjit Mitra, Kenneth Portier,
and John Yen
|
Finding influential users of an online health community: a new metric
based on sentiment influence
|
Working paper
| null | null | null |
cs.SI cs.CY physics.soc-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
What characterizes influential users in online health communities (OHCs)? We
hypothesize that (1) the emotional support received by OHC members can be
assessed from their sentiment ex-pressed in online interactions, and (2) such
assessments can help to identify influential OHC members. Through text mining
and sentiment analysis of users' online interactions, we propose a novel metric
that directly measures a user's ability to affect the sentiment of others.
Using dataset from an OHC, we demonstrate that this metric is highly effective
in identifying influential users. In addition, combining the metric with other
traditional measures further improves the identification of influential users.
This study can facilitate online community management and advance our
understanding of social influence in OHCs.
|
[
{
"version": "v1",
"created": "Mon, 26 Nov 2012 20:37:00 GMT"
},
{
"version": "v2",
"created": "Wed, 5 Dec 2012 23:12:05 GMT"
}
] | 2012-12-07T00:00:00
|
[
[
"Zhao",
"Kang",
""
],
[
"Greer",
"Greta",
""
],
[
"Qiu",
"Baojun",
""
],
[
"Mitra",
"Prasenjit",
""
],
[
"Portier",
"Kenneth",
""
],
[
"Yen",
"John",
""
]
] |
TITLE: Finding influential users of an online health community: a new metric
based on sentiment influence
ABSTRACT: What characterizes influential users in online health communities (OHCs)? We
hypothesize that (1) the emotional support received by OHC members can be
assessed from their sentiment ex-pressed in online interactions, and (2) such
assessments can help to identify influential OHC members. Through text mining
and sentiment analysis of users' online interactions, we propose a novel metric
that directly measures a user's ability to affect the sentiment of others.
Using dataset from an OHC, we demonstrate that this metric is highly effective
in identifying influential users. In addition, combining the metric with other
traditional measures further improves the identification of influential users.
This study can facilitate online community management and advance our
understanding of social influence in OHCs.
|
no_new_dataset
| 0.710019
|
1212.0888
|
Roozbeh Rajabi
|
Roozbeh Rajabi, Hassan Ghassemian
|
Unmixing of Hyperspectral Data Using Robust Statistics-based NMF
|
4 pages, conference
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Mixed pixels are presented in hyperspectral images due to low spatial
resolution of hyperspectral sensors. Spectral unmixing decomposes mixed pixels
spectra into endmembers spectra and abundance fractions. In this paper using of
robust statistics-based nonnegative matrix factorization (RNMF) for spectral
unmixing of hyperspectral data is investigated. RNMF uses a robust cost
function and iterative updating procedure, so is not sensitive to outliers.
This method has been applied to simulated data using USGS spectral library,
AVIRIS and ROSIS datasets. Unmixing results are compared to traditional NMF
method based on SAD and AAD measures. Results demonstrate that this method can
be used efficiently for hyperspectral unmixing purposes.
|
[
{
"version": "v1",
"created": "Tue, 4 Dec 2012 21:59:35 GMT"
}
] | 2012-12-06T00:00:00
|
[
[
"Rajabi",
"Roozbeh",
""
],
[
"Ghassemian",
"Hassan",
""
]
] |
TITLE: Unmixing of Hyperspectral Data Using Robust Statistics-based NMF
ABSTRACT: Mixed pixels are presented in hyperspectral images due to low spatial
resolution of hyperspectral sensors. Spectral unmixing decomposes mixed pixels
spectra into endmembers spectra and abundance fractions. In this paper using of
robust statistics-based nonnegative matrix factorization (RNMF) for spectral
unmixing of hyperspectral data is investigated. RNMF uses a robust cost
function and iterative updating procedure, so is not sensitive to outliers.
This method has been applied to simulated data using USGS spectral library,
AVIRIS and ROSIS datasets. Unmixing results are compared to traditional NMF
method based on SAD and AAD measures. Results demonstrate that this method can
be used efficiently for hyperspectral unmixing purposes.
|
no_new_dataset
| 0.710434
|
1212.1037
|
Tushar Rao Mr.
|
Tushar Rao (NSIT-Delhi) and Saket Srivastava (IIIT-Delhi)
|
Modeling Movements in Oil, Gold, Forex and Market Indices using Search
Volume Index and Twitter Sentiments
|
10 pages, 4 figures, 9 Tables
| null | null |
IIITD-TR-2012-005
|
cs.CE cs.SI q-fin.GN
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Study of the forecasting models using large scale microblog discussions and
the search behavior data can provide a good insight for better understanding
the market movements. In this work we collected a dataset of 2 million tweets
and search volume index (SVI from Google) for a period of June 2010 to
September 2011. We perform a study over a set of comprehensive causative
relationships and developed a unified approach to a model for various market
securities like equity (Dow Jones Industrial Average-DJIA and NASDAQ-100),
commodity markets (oil and gold) and Euro Forex rates. We also investigate the
lagged and statistically causative relations of Twitter sentiments developed
during active trading days and market inactive days in combination with the
search behavior of public before any change in the prices/ indices. Our results
show extent of lagged significance with high correlation value upto 0.82
between search volumes and gold price in USD. We find weekly accuracy in
direction (up and down prediction) uptil 94.3% for DJIA and 90% for NASDAQ-100
with significant reduction in mean average percentage error for all the
forecasting models.
|
[
{
"version": "v1",
"created": "Wed, 5 Dec 2012 14:28:40 GMT"
}
] | 2012-12-06T00:00:00
|
[
[
"Rao",
"Tushar",
"",
"NSIT-Delhi"
],
[
"Srivastava",
"Saket",
"",
"IIIT-Delhi"
]
] |
TITLE: Modeling Movements in Oil, Gold, Forex and Market Indices using Search
Volume Index and Twitter Sentiments
ABSTRACT: Study of the forecasting models using large scale microblog discussions and
the search behavior data can provide a good insight for better understanding
the market movements. In this work we collected a dataset of 2 million tweets
and search volume index (SVI from Google) for a period of June 2010 to
September 2011. We perform a study over a set of comprehensive causative
relationships and developed a unified approach to a model for various market
securities like equity (Dow Jones Industrial Average-DJIA and NASDAQ-100),
commodity markets (oil and gold) and Euro Forex rates. We also investigate the
lagged and statistically causative relations of Twitter sentiments developed
during active trading days and market inactive days in combination with the
search behavior of public before any change in the prices/ indices. Our results
show extent of lagged significance with high correlation value upto 0.82
between search volumes and gold price in USD. We find weekly accuracy in
direction (up and down prediction) uptil 94.3% for DJIA and 90% for NASDAQ-100
with significant reduction in mean average percentage error for all the
forecasting models.
|
new_dataset
| 0.646711
|
1212.1100
|
Jim Smith Dr
|
J. E. Smith, P. Caleb-Solly, M. A. Tahir, D. Sannen, H. van-Brussel
|
Making Early Predictions of the Accuracy of Machine Learning
Applications
|
35 pagers, 12 figures
| null | null | null |
cs.LG cs.AI stat.ML
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The accuracy of machine learning systems is a widely studied research topic.
Established techniques such as cross-validation predict the accuracy on unseen
data of the classifier produced by applying a given learning method to a given
training data set. However, they do not predict whether incurring the cost of
obtaining more data and undergoing further training will lead to higher
accuracy. In this paper we investigate techniques for making such early
predictions. We note that when a machine learning algorithm is presented with a
training set the classifier produced, and hence its error, will depend on the
characteristics of the algorithm, on training set's size, and also on its
specific composition. In particular we hypothesise that if a number of
classifiers are produced, and their observed error is decomposed into bias and
variance terms, then although these components may behave differently, their
behaviour may be predictable.
We test our hypothesis by building models that, given a measurement taken
from the classifier created from a limited number of samples, predict the
values that would be measured from the classifier produced when the full data
set is presented. We create separate models for bias, variance and total error.
Our models are built from the results of applying ten different machine
learning algorithms to a range of data sets, and tested with "unseen"
algorithms and datasets. We analyse the results for various numbers of initial
training samples, and total dataset sizes. Results show that our predictions
are very highly correlated with the values observed after undertaking the extra
training. Finally we consider the more complex case where an ensemble of
heterogeneous classifiers is trained, and show how we can accurately estimate
an upper bound on the accuracy achievable after further training.
|
[
{
"version": "v1",
"created": "Wed, 5 Dec 2012 17:07:39 GMT"
}
] | 2012-12-06T00:00:00
|
[
[
"Smith",
"J. E.",
""
],
[
"Caleb-Solly",
"P.",
""
],
[
"Tahir",
"M. A.",
""
],
[
"Sannen",
"D.",
""
],
[
"van-Brussel",
"H.",
""
]
] |
TITLE: Making Early Predictions of the Accuracy of Machine Learning
Applications
ABSTRACT: The accuracy of machine learning systems is a widely studied research topic.
Established techniques such as cross-validation predict the accuracy on unseen
data of the classifier produced by applying a given learning method to a given
training data set. However, they do not predict whether incurring the cost of
obtaining more data and undergoing further training will lead to higher
accuracy. In this paper we investigate techniques for making such early
predictions. We note that when a machine learning algorithm is presented with a
training set the classifier produced, and hence its error, will depend on the
characteristics of the algorithm, on training set's size, and also on its
specific composition. In particular we hypothesise that if a number of
classifiers are produced, and their observed error is decomposed into bias and
variance terms, then although these components may behave differently, their
behaviour may be predictable.
We test our hypothesis by building models that, given a measurement taken
from the classifier created from a limited number of samples, predict the
values that would be measured from the classifier produced when the full data
set is presented. We create separate models for bias, variance and total error.
Our models are built from the results of applying ten different machine
learning algorithms to a range of data sets, and tested with "unseen"
algorithms and datasets. We analyse the results for various numbers of initial
training samples, and total dataset sizes. Results show that our predictions
are very highly correlated with the values observed after undertaking the extra
training. Finally we consider the more complex case where an ensemble of
heterogeneous classifiers is trained, and show how we can accurately estimate
an upper bound on the accuracy achievable after further training.
|
no_new_dataset
| 0.709025
|
1212.1131
|
Lior Rokach
|
Gilad Katz, Guy Shani, Bracha Shapira, Lior Rokach
|
Using Wikipedia to Boost SVD Recommender Systems
| null | null | null | null |
cs.LG cs.IR stat.ML
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Singular Value Decomposition (SVD) has been used successfully in recent years
in the area of recommender systems. In this paper we present how this model can
be extended to consider both user ratings and information from Wikipedia. By
mapping items to Wikipedia pages and quantifying their similarity, we are able
to use this information in order to improve recommendation accuracy, especially
when the sparsity is high. Another advantage of the proposed approach is the
fact that it can be easily integrated into any other SVD implementation,
regardless of additional parameters that may have been added to it. Preliminary
experimental results on the MovieLens dataset are encouraging.
|
[
{
"version": "v1",
"created": "Wed, 5 Dec 2012 19:03:39 GMT"
}
] | 2012-12-06T00:00:00
|
[
[
"Katz",
"Gilad",
""
],
[
"Shani",
"Guy",
""
],
[
"Shapira",
"Bracha",
""
],
[
"Rokach",
"Lior",
""
]
] |
TITLE: Using Wikipedia to Boost SVD Recommender Systems
ABSTRACT: Singular Value Decomposition (SVD) has been used successfully in recent years
in the area of recommender systems. In this paper we present how this model can
be extended to consider both user ratings and information from Wikipedia. By
mapping items to Wikipedia pages and quantifying their similarity, we are able
to use this information in order to improve recommendation accuracy, especially
when the sparsity is high. Another advantage of the proposed approach is the
fact that it can be easily integrated into any other SVD implementation,
regardless of additional parameters that may have been added to it. Preliminary
experimental results on the MovieLens dataset are encouraging.
|
no_new_dataset
| 0.711638
|
1212.0763
|
Modou Gueye M.
|
Modou Gueye, Talel Abdessalem, Hubert Naacke
|
Dynamic recommender system : using cluster-based biases to improve the
accuracy of the predictions
|
31 pages, 7 figures
| null | null | null |
cs.LG cs.DB cs.IR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
It is today accepted that matrix factorization models allow a high quality of
rating prediction in recommender systems. However, a major drawback of matrix
factorization is its static nature that results in a progressive declining of
the accuracy of the predictions after each factorization. This is due to the
fact that the new obtained ratings are not taken into account until a new
factorization is computed, which can not be done very often because of the high
cost of matrix factorization.
In this paper, aiming at improving the accuracy of recommender systems, we
propose a cluster-based matrix factorization technique that enables online
integration of new ratings. Thus, we significantly enhance the obtained
predictions between two matrix factorizations. We use finer-grained user biases
by clustering similar items into groups, and allocating in these groups a bias
to each user. The experiments we did on large datasets demonstrated the
efficiency of our approach.
|
[
{
"version": "v1",
"created": "Mon, 3 Dec 2012 13:00:27 GMT"
}
] | 2012-12-05T00:00:00
|
[
[
"Gueye",
"Modou",
""
],
[
"Abdessalem",
"Talel",
""
],
[
"Naacke",
"Hubert",
""
]
] |
TITLE: Dynamic recommender system : using cluster-based biases to improve the
accuracy of the predictions
ABSTRACT: It is today accepted that matrix factorization models allow a high quality of
rating prediction in recommender systems. However, a major drawback of matrix
factorization is its static nature that results in a progressive declining of
the accuracy of the predictions after each factorization. This is due to the
fact that the new obtained ratings are not taken into account until a new
factorization is computed, which can not be done very often because of the high
cost of matrix factorization.
In this paper, aiming at improving the accuracy of recommender systems, we
propose a cluster-based matrix factorization technique that enables online
integration of new ratings. Thus, we significantly enhance the obtained
predictions between two matrix factorizations. We use finer-grained user biases
by clustering similar items into groups, and allocating in these groups a bias
to each user. The experiments we did on large datasets demonstrated the
efficiency of our approach.
|
no_new_dataset
| 0.709453
|
1212.0030
|
Andrew Habib
|
Osama Khalil, Andrew Habib
|
Viewpoint Invariant Object Detector
| null | null | null | null |
cs.CV
|
http://creativecommons.org/licenses/by/3.0/
|
Object Detection is the task of identifying the existence of an object class
instance and locating it within an image. Difficulties in handling high
intra-class variations constitute major obstacles to achieving high performance
on standard benchmark datasets (scale, viewpoint, lighting conditions and
orientation variations provide good examples). Suggested model aims at
providing more robustness to detecting objects suffering severe distortion due
to < 60{\deg} viewpoint changes. In addition, several model computational
bottlenecks have been resolved leading to a significant increase in the model
performance (speed and space) without compromising the resulting accuracy.
Finally, we produced two illustrative applications showing the potential of the
object detection technology being deployed in real life applications; namely
content-based image search and content-based video search.
|
[
{
"version": "v1",
"created": "Fri, 30 Nov 2012 22:35:19 GMT"
}
] | 2012-12-04T00:00:00
|
[
[
"Khalil",
"Osama",
""
],
[
"Habib",
"Andrew",
""
]
] |
TITLE: Viewpoint Invariant Object Detector
ABSTRACT: Object Detection is the task of identifying the existence of an object class
instance and locating it within an image. Difficulties in handling high
intra-class variations constitute major obstacles to achieving high performance
on standard benchmark datasets (scale, viewpoint, lighting conditions and
orientation variations provide good examples). Suggested model aims at
providing more robustness to detecting objects suffering severe distortion due
to < 60{\deg} viewpoint changes. In addition, several model computational
bottlenecks have been resolved leading to a significant increase in the model
performance (speed and space) without compromising the resulting accuracy.
Finally, we produced two illustrative applications showing the potential of the
object detection technology being deployed in real life applications; namely
content-based image search and content-based video search.
|
no_new_dataset
| 0.710791
|
1212.0087
|
Nader Jelassi
|
Mohamed Nader Jelassi and Sadok Ben Yahia and Engelbert Mephu Nguifo
|
A scalable mining of frequent quadratic concepts in d-folksonomies
| null | null | null | null |
cs.SI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Folksonomy mining is grasping the interest of web 2.0 community since it
represents the core data of social resource sharing systems. However, a
scrutiny of the related works interested in mining folksonomies unveils that
the time stamp dimension has not been considered. For example, the wealthy
number of works dedicated to mining tri-concepts from folksonomies did not take
into account time dimension. In this paper, we will consider a folksonomy
commonly composed of triples <users, tags, resources> and we shall consider the
time as a new dimension. We motivate our approach by highlighting the battery
of potential applications. Then, we present the foundations for mining
quadri-concepts, provide a formal definition of the problem and introduce a new
efficient algorithm, called QUADRICONS for its solution to allow for mining
folksonomies in time, i.e., d-folksonomies. We also introduce a new closure
operator that splits the induced search space into equivalence classes whose
smallest elements are the quadri-minimal generators. Carried out experiments on
large-scale real-world datasets highlight good performances of our algorithm.
|
[
{
"version": "v1",
"created": "Sat, 1 Dec 2012 09:16:35 GMT"
}
] | 2012-12-04T00:00:00
|
[
[
"Jelassi",
"Mohamed Nader",
""
],
[
"Yahia",
"Sadok Ben",
""
],
[
"Nguifo",
"Engelbert Mephu",
""
]
] |
TITLE: A scalable mining of frequent quadratic concepts in d-folksonomies
ABSTRACT: Folksonomy mining is grasping the interest of web 2.0 community since it
represents the core data of social resource sharing systems. However, a
scrutiny of the related works interested in mining folksonomies unveils that
the time stamp dimension has not been considered. For example, the wealthy
number of works dedicated to mining tri-concepts from folksonomies did not take
into account time dimension. In this paper, we will consider a folksonomy
commonly composed of triples <users, tags, resources> and we shall consider the
time as a new dimension. We motivate our approach by highlighting the battery
of potential applications. Then, we present the foundations for mining
quadri-concepts, provide a formal definition of the problem and introduce a new
efficient algorithm, called QUADRICONS for its solution to allow for mining
folksonomies in time, i.e., d-folksonomies. We also introduce a new closure
operator that splits the induced search space into equivalence classes whose
smallest elements are the quadri-minimal generators. Carried out experiments on
large-scale real-world datasets highlight good performances of our algorithm.
|
no_new_dataset
| 0.707777
|
1212.0141
|
Yiye Ruan
|
Hemant Purohit and Yiye Ruan and David Fuhry and Srinivasan
Parthasarathy and Amit Sheth
|
On the Role of Social Identity and Cohesion in Characterizing Online
Social Communities
| null | null | null | null |
cs.SI physics.soc-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Two prevailing theories for explaining social group or community structure
are cohesion and identity. The social cohesion approach posits that social
groups arise out of an aggregation of individuals that have mutual
interpersonal attraction as they share common characteristics. These
characteristics can range from common interests to kinship ties and from social
values to ethnic backgrounds. In contrast, the social identity approach posits
that an individual is likely to join a group based on an intrinsic
self-evaluation at a cognitive or perceptual level. In other words group
members typically share an awareness of a common category membership.
In this work we seek to understand the role of these two contrasting theories
in explaining the behavior and stability of social communities in Twitter. A
specific focal point of our work is to understand the role of these theories in
disparate contexts ranging from disaster response to socio-political activism.
We extract social identity and social cohesion features-of-interest for large
scale datasets of five real-world events and examine the effectiveness of such
features in capturing behavioral characteristics and the stability of groups.
We also propose a novel measure of social group sustainability based on the
divergence in group discussion. Our main findings are: 1) Sharing of social
identities (especially physical location) among group members has a positive
impact on group sustainability, 2) Structural cohesion (represented by high
group density and low average shortest path length) is a strong indicator of
group sustainability, and 3) Event characteristics play a role in shaping group
sustainability, as social groups in transient events behave differently from
groups in events that last longer.
|
[
{
"version": "v1",
"created": "Sat, 1 Dec 2012 18:03:33 GMT"
}
] | 2012-12-04T00:00:00
|
[
[
"Purohit",
"Hemant",
""
],
[
"Ruan",
"Yiye",
""
],
[
"Fuhry",
"David",
""
],
[
"Parthasarathy",
"Srinivasan",
""
],
[
"Sheth",
"Amit",
""
]
] |
TITLE: On the Role of Social Identity and Cohesion in Characterizing Online
Social Communities
ABSTRACT: Two prevailing theories for explaining social group or community structure
are cohesion and identity. The social cohesion approach posits that social
groups arise out of an aggregation of individuals that have mutual
interpersonal attraction as they share common characteristics. These
characteristics can range from common interests to kinship ties and from social
values to ethnic backgrounds. In contrast, the social identity approach posits
that an individual is likely to join a group based on an intrinsic
self-evaluation at a cognitive or perceptual level. In other words group
members typically share an awareness of a common category membership.
In this work we seek to understand the role of these two contrasting theories
in explaining the behavior and stability of social communities in Twitter. A
specific focal point of our work is to understand the role of these theories in
disparate contexts ranging from disaster response to socio-political activism.
We extract social identity and social cohesion features-of-interest for large
scale datasets of five real-world events and examine the effectiveness of such
features in capturing behavioral characteristics and the stability of groups.
We also propose a novel measure of social group sustainability based on the
divergence in group discussion. Our main findings are: 1) Sharing of social
identities (especially physical location) among group members has a positive
impact on group sustainability, 2) Structural cohesion (represented by high
group density and low average shortest path length) is a strong indicator of
group sustainability, and 3) Event characteristics play a role in shaping group
sustainability, as social groups in transient events behave differently from
groups in events that last longer.
|
no_new_dataset
| 0.709617
|
1212.0146
|
Yiye Ruan
|
Yiye Ruan and David Fuhry and Srinivasan Parthasarathy
|
Efficient Community Detection in Large Networks using Content and Links
| null | null | null | null |
cs.SI physics.soc-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper we discuss a very simple approach of combining content and link
information in graph structures for the purpose of community discovery, a
fundamental task in network analysis. Our approach hinges on the basic
intuition that many networks contain noise in the link structure and that
content information can help strengthen the community signal. This enables ones
to eliminate the impact of noise (false positives and false negatives), which
is particularly prevalent in online social networks and Web-scale information
networks.
Specifically we introduce a measure of signal strength between two nodes in
the network by fusing their link strength with content similarity. Link
strength is estimated based on whether the link is likely (with high
probability) to reside within a community. Content similarity is estimated
through cosine similarity or Jaccard coefficient. We discuss a simple mechanism
for fusing content and link similarity. We then present a biased edge sampling
procedure which retains edges that are locally relevant for each graph node.
The resulting backbone graph can be clustered using standard community
discovery algorithms such as Metis and Markov clustering.
Through extensive experiments on multiple real-world datasets (Flickr,
Wikipedia and CiteSeer) with varying sizes and characteristics, we demonstrate
the effectiveness and efficiency of our methods over state-of-the-art learning
and mining approaches several of which also attempt to combine link and content
analysis for the purposes of community discovery. Specifically we always find a
qualitative benefit when combining content with link analysis. Additionally our
biased graph sampling approach realizes a quantitative benefit in that it is
typically several orders of magnitude faster than competing approaches.
|
[
{
"version": "v1",
"created": "Sat, 1 Dec 2012 18:41:34 GMT"
}
] | 2012-12-04T00:00:00
|
[
[
"Ruan",
"Yiye",
""
],
[
"Fuhry",
"David",
""
],
[
"Parthasarathy",
"Srinivasan",
""
]
] |
TITLE: Efficient Community Detection in Large Networks using Content and Links
ABSTRACT: In this paper we discuss a very simple approach of combining content and link
information in graph structures for the purpose of community discovery, a
fundamental task in network analysis. Our approach hinges on the basic
intuition that many networks contain noise in the link structure and that
content information can help strengthen the community signal. This enables ones
to eliminate the impact of noise (false positives and false negatives), which
is particularly prevalent in online social networks and Web-scale information
networks.
Specifically we introduce a measure of signal strength between two nodes in
the network by fusing their link strength with content similarity. Link
strength is estimated based on whether the link is likely (with high
probability) to reside within a community. Content similarity is estimated
through cosine similarity or Jaccard coefficient. We discuss a simple mechanism
for fusing content and link similarity. We then present a biased edge sampling
procedure which retains edges that are locally relevant for each graph node.
The resulting backbone graph can be clustered using standard community
discovery algorithms such as Metis and Markov clustering.
Through extensive experiments on multiple real-world datasets (Flickr,
Wikipedia and CiteSeer) with varying sizes and characteristics, we demonstrate
the effectiveness and efficiency of our methods over state-of-the-art learning
and mining approaches several of which also attempt to combine link and content
analysis for the purposes of community discovery. Specifically we always find a
qualitative benefit when combining content with link analysis. Additionally our
biased graph sampling approach realizes a quantitative benefit in that it is
typically several orders of magnitude faster than competing approaches.
|
no_new_dataset
| 0.710465
|
1212.0317
|
M HM Krishna Prasad Dr
|
B. Adinarayana Reddy, O. Srinivasa Rao and M. H. M. Krishna Prasad
|
An Improved UP-Growth High Utility Itemset Mining
|
(0975 8887)
|
International Journal of Computer Applications Volume 58, No.2,
2012, 25-28
|
10.5120/9255-3424
| null |
cs.DB
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Efficient discovery of frequent itemsets in large datasets is a crucial task
of data mining. In recent years, several approaches have been proposed for
generating high utility patterns, they arise the problems of producing a large
number of candidate itemsets for high utility itemsets and probably degrades
mining performance in terms of speed and space. Recently proposed compact tree
structure, viz., UP Tree, maintains the information of transactions and
itemsets, facilitate the mining performance and avoid scanning original
database repeatedly. In this paper, UP Tree (Utility Pattern Tree) is adopted,
which scans database only twice to obtain candidate items and manage them in an
efficient data structured way. Applying UP Tree to the UP Growth takes more
execution time for Phase II. Hence this paper presents modified algorithm
aiming to reduce the execution time by effectively identifying high utility
itemsets.
|
[
{
"version": "v1",
"created": "Mon, 3 Dec 2012 08:50:50 GMT"
}
] | 2012-12-04T00:00:00
|
[
[
"Reddy",
"B. Adinarayana",
""
],
[
"Rao",
"O. Srinivasa",
""
],
[
"Prasad",
"M. H. M. Krishna",
""
]
] |
TITLE: An Improved UP-Growth High Utility Itemset Mining
ABSTRACT: Efficient discovery of frequent itemsets in large datasets is a crucial task
of data mining. In recent years, several approaches have been proposed for
generating high utility patterns, they arise the problems of producing a large
number of candidate itemsets for high utility itemsets and probably degrades
mining performance in terms of speed and space. Recently proposed compact tree
structure, viz., UP Tree, maintains the information of transactions and
itemsets, facilitate the mining performance and avoid scanning original
database repeatedly. In this paper, UP Tree (Utility Pattern Tree) is adopted,
which scans database only twice to obtain candidate items and manage them in an
efficient data structured way. Applying UP Tree to the UP Growth takes more
execution time for Phase II. Hence this paper presents modified algorithm
aiming to reduce the execution time by effectively identifying high utility
itemsets.
|
no_new_dataset
| 0.713276
|
1212.0402
|
Khurram Soomro
|
Khurram Soomro, Amir Roshan Zamir and Mubarak Shah
|
UCF101: A Dataset of 101 Human Actions Classes From Videos in The Wild
| null | null | null |
CRCV-TR-12-01
|
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We introduce UCF101 which is currently the largest dataset of human actions.
It consists of 101 action classes, over 13k clips and 27 hours of video data.
The database consists of realistic user uploaded videos containing camera
motion and cluttered background. Additionally, we provide baseline action
recognition results on this new dataset using standard bag of words approach
with overall performance of 44.5%. To the best of our knowledge, UCF101 is
currently the most challenging dataset of actions due to its large number of
classes, large number of clips and also unconstrained nature of such clips.
|
[
{
"version": "v1",
"created": "Mon, 3 Dec 2012 14:45:31 GMT"
}
] | 2012-12-04T00:00:00
|
[
[
"Soomro",
"Khurram",
""
],
[
"Zamir",
"Amir Roshan",
""
],
[
"Shah",
"Mubarak",
""
]
] |
TITLE: UCF101: A Dataset of 101 Human Actions Classes From Videos in The Wild
ABSTRACT: We introduce UCF101 which is currently the largest dataset of human actions.
It consists of 101 action classes, over 13k clips and 27 hours of video data.
The database consists of realistic user uploaded videos containing camera
motion and cluttered background. Additionally, we provide baseline action
recognition results on this new dataset using standard bag of words approach
with overall performance of 44.5%. To the best of our knowledge, UCF101 is
currently the most challenging dataset of actions due to its large number of
classes, large number of clips and also unconstrained nature of such clips.
|
new_dataset
| 0.711982
|
1211.3375
|
Stephan Seufert
|
Stephan Seufert, Avishek Anand, Srikanta Bedathur, Gerhard Weikum
|
High-Performance Reachability Query Processing under Index Size
Restrictions
|
30 pages
| null | null | null |
cs.DB cs.SI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we propose a scalable and highly efficient index structure for
the reachability problem over graphs. We build on the well-known node interval
labeling scheme where the set of vertices reachable from a particular node is
compactly encoded as a collection of node identifier ranges. We impose an
explicit bound on the size of the index and flexibly assign approximate
reachability ranges to nodes of the graph such that the number of index probes
to answer a query is minimized. The resulting tunable index structure generates
a better range labeling if the space budget is increased, thus providing a
direct control over the trade off between index size and the query processing
performance. By using a fast recursive querying method in conjunction with our
index structure, we show that in practice, reachability queries can be answered
in the order of microseconds on an off-the-shelf computer - even for the case
of massive-scale real world graphs. Our claims are supported by an extensive
set of experimental results using a multitude of benchmark and real-world
web-scale graph datasets.
|
[
{
"version": "v1",
"created": "Wed, 14 Nov 2012 18:28:28 GMT"
},
{
"version": "v2",
"created": "Mon, 19 Nov 2012 16:06:19 GMT"
},
{
"version": "v3",
"created": "Mon, 26 Nov 2012 14:13:28 GMT"
},
{
"version": "v4",
"created": "Wed, 28 Nov 2012 09:40:31 GMT"
},
{
"version": "v5",
"created": "Thu, 29 Nov 2012 21:28:22 GMT"
}
] | 2012-12-03T00:00:00
|
[
[
"Seufert",
"Stephan",
""
],
[
"Anand",
"Avishek",
""
],
[
"Bedathur",
"Srikanta",
""
],
[
"Weikum",
"Gerhard",
""
]
] |
TITLE: High-Performance Reachability Query Processing under Index Size
Restrictions
ABSTRACT: In this paper, we propose a scalable and highly efficient index structure for
the reachability problem over graphs. We build on the well-known node interval
labeling scheme where the set of vertices reachable from a particular node is
compactly encoded as a collection of node identifier ranges. We impose an
explicit bound on the size of the index and flexibly assign approximate
reachability ranges to nodes of the graph such that the number of index probes
to answer a query is minimized. The resulting tunable index structure generates
a better range labeling if the space budget is increased, thus providing a
direct control over the trade off between index size and the query processing
performance. By using a fast recursive querying method in conjunction with our
index structure, we show that in practice, reachability queries can be answered
in the order of microseconds on an off-the-shelf computer - even for the case
of massive-scale real world graphs. Our claims are supported by an extensive
set of experimental results using a multitude of benchmark and real-world
web-scale graph datasets.
|
no_new_dataset
| 0.709447
|
1211.6851
|
Chiheb-Eddine Ben n'cir C.B.N'cir
|
Chiheb-Eddine Ben N'Cir and Nadia Essoussi
|
Classification Recouvrante Bas\'ee sur les M\'ethodes \`a Noyau
|
Les 43\`emes Journ\'ees de Statistique
|
Les 43\`emes Journ\'ees de Statistique 2011
| null | null |
cs.LG stat.CO stat.ME stat.ML
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Overlapping clustering problem is an important learning issue in which
clusters are not mutually exclusive and each object may belongs simultaneously
to several clusters. This paper presents a kernel based method that produces
overlapping clusters on a high feature space using mercer kernel techniques to
improve separability of input patterns. The proposed method, called
OKM-K(Overlapping $k$-means based kernel method), extends OKM (Overlapping
$k$-means) method to produce overlapping schemes. Experiments are performed on
overlapping dataset and empirical results obtained with OKM-K outperform
results obtained with OKM.
|
[
{
"version": "v1",
"created": "Thu, 29 Nov 2012 09:22:19 GMT"
}
] | 2012-11-30T00:00:00
|
[
[
"N'Cir",
"Chiheb-Eddine Ben",
""
],
[
"Essoussi",
"Nadia",
""
]
] |
TITLE: Classification Recouvrante Bas\'ee sur les M\'ethodes \`a Noyau
ABSTRACT: Overlapping clustering problem is an important learning issue in which
clusters are not mutually exclusive and each object may belongs simultaneously
to several clusters. This paper presents a kernel based method that produces
overlapping clusters on a high feature space using mercer kernel techniques to
improve separability of input patterns. The proposed method, called
OKM-K(Overlapping $k$-means based kernel method), extends OKM (Overlapping
$k$-means) method to produce overlapping schemes. Experiments are performed on
overlapping dataset and empirical results obtained with OKM-K outperform
results obtained with OKM.
|
no_new_dataset
| 0.710038
|
1211.6859
|
Chiheb-Eddine Ben n'cir C.B.N'cir
|
Chiheb-Eddine Ben N'Cir and Nadia Essoussi and Patrice Bertrand
|
Overlapping clustering based on kernel similarity metric
|
Second Meeting on Statistics and Data Mining 2010
|
Second Meeting on Statistics and Data Mining Second Meeting on
Statistics and Data Mining March 11-12, 2010
| null | null |
stat.ML cs.LG stat.ME
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Producing overlapping schemes is a major issue in clustering. Recent proposed
overlapping methods relies on the search of an optimal covering and are based
on different metrics, such as Euclidean distance and I-Divergence, used to
measure closeness between observations. In this paper, we propose the use of
another measure for overlapping clustering based on a kernel similarity metric
.We also estimate the number of overlapped clusters using the Gram matrix.
Experiments on both Iris and EachMovie datasets show the correctness of the
estimation of number of clusters and show that measure based on kernel
similarity metric improves the precision, recall and f-measure in overlapping
clustering.
|
[
{
"version": "v1",
"created": "Thu, 29 Nov 2012 09:35:30 GMT"
}
] | 2012-11-30T00:00:00
|
[
[
"N'Cir",
"Chiheb-Eddine Ben",
""
],
[
"Essoussi",
"Nadia",
""
],
[
"Bertrand",
"Patrice",
""
]
] |
TITLE: Overlapping clustering based on kernel similarity metric
ABSTRACT: Producing overlapping schemes is a major issue in clustering. Recent proposed
overlapping methods relies on the search of an optimal covering and are based
on different metrics, such as Euclidean distance and I-Divergence, used to
measure closeness between observations. In this paper, we propose the use of
another measure for overlapping clustering based on a kernel similarity metric
.We also estimate the number of overlapped clusters using the Gram matrix.
Experiments on both Iris and EachMovie datasets show the correctness of the
estimation of number of clusters and show that measure based on kernel
similarity metric improves the precision, recall and f-measure in overlapping
clustering.
|
no_new_dataset
| 0.712476
|
1211.2881
|
Junyoung Chung
|
Junyoung Chung, Donghoon Lee, Youngjoo Seo, and Chang D. Yoo
|
Deep Attribute Networks
|
This paper has been withdrawn by the author due to a crucial
grammatical errors
| null | null | null |
cs.CV cs.LG stat.ML
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Obtaining compact and discriminative features is one of the major challenges
in many of the real-world image classification tasks such as face verification
and object recognition. One possible approach is to represent input image on
the basis of high-level features that carry semantic meaning which humans can
understand. In this paper, a model coined deep attribute network (DAN) is
proposed to address this issue. For an input image, the model outputs the
attributes of the input image without performing any classification. The
efficacy of the proposed model is evaluated on unconstrained face verification
and real-world object recognition tasks using the LFW and the a-PASCAL
datasets. We demonstrate the potential of deep learning for attribute-based
classification by showing comparable results with existing state-of-the-art
results. Once properly trained, the DAN is fast and does away with calculating
low-level features which are maybe unreliable and computationally expensive.
|
[
{
"version": "v1",
"created": "Tue, 13 Nov 2012 03:41:31 GMT"
},
{
"version": "v2",
"created": "Tue, 20 Nov 2012 11:30:46 GMT"
},
{
"version": "v3",
"created": "Wed, 28 Nov 2012 08:39:03 GMT"
}
] | 2012-11-29T00:00:00
|
[
[
"Chung",
"Junyoung",
""
],
[
"Lee",
"Donghoon",
""
],
[
"Seo",
"Youngjoo",
""
],
[
"Yoo",
"Chang D.",
""
]
] |
TITLE: Deep Attribute Networks
ABSTRACT: Obtaining compact and discriminative features is one of the major challenges
in many of the real-world image classification tasks such as face verification
and object recognition. One possible approach is to represent input image on
the basis of high-level features that carry semantic meaning which humans can
understand. In this paper, a model coined deep attribute network (DAN) is
proposed to address this issue. For an input image, the model outputs the
attributes of the input image without performing any classification. The
efficacy of the proposed model is evaluated on unconstrained face verification
and real-world object recognition tasks using the LFW and the a-PASCAL
datasets. We demonstrate the potential of deep learning for attribute-based
classification by showing comparable results with existing state-of-the-art
results. Once properly trained, the DAN is fast and does away with calculating
low-level features which are maybe unreliable and computationally expensive.
|
no_new_dataset
| 0.710641
|
1211.4864
|
Salman Habib
|
Salman Habib, Vitali Morozov, Hal Finkel, Adrian Pope, Katrin
Heitmann, Kalyan Kumaran, Tom Peterka, Joe Insley, David Daniel, Patricia
Fasel, Nicholas Frontiere, and Zarija Lukic
|
The Universe at Extreme Scale: Multi-Petaflop Sky Simulation on the BG/Q
|
11 pages, 11 figures, final version of paper for talk presented at
SC12
| null | null | null |
cs.DC astro-ph.CO astro-ph.IM cs.PF physics.comp-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Remarkable observational advances have established a compelling
cross-validated model of the Universe. Yet, two key pillars of this model --
dark matter and dark energy -- remain mysterious. Sky surveys that map billions
of galaxies to explore the `Dark Universe', demand a corresponding
extreme-scale simulation capability; the HACC (Hybrid/Hardware Accelerated
Cosmology Code) framework has been designed to deliver this level of
performance now, and into the future. With its novel algorithmic structure,
HACC allows flexible tuning across diverse architectures, including accelerated
and multi-core systems.
On the IBM BG/Q, HACC attains unprecedented scalable performance -- currently
13.94 PFlops at 69.2% of peak and 90% parallel efficiency on 1,572,864 cores
with an equal number of MPI ranks, and a concurrency of 6.3 million. This level
of performance was achieved at extreme problem sizes, including a benchmark run
with more than 3.6 trillion particles, significantly larger than any
cosmological simulation yet performed.
|
[
{
"version": "v1",
"created": "Mon, 19 Nov 2012 23:23:22 GMT"
}
] | 2012-11-28T00:00:00
|
[
[
"Habib",
"Salman",
""
],
[
"Morozov",
"Vitali",
""
],
[
"Finkel",
"Hal",
""
],
[
"Pope",
"Adrian",
""
],
[
"Heitmann",
"Katrin",
""
],
[
"Kumaran",
"Kalyan",
""
],
[
"Peterka",
"Tom",
""
],
[
"Insley",
"Joe",
""
],
[
"Daniel",
"David",
""
],
[
"Fasel",
"Patricia",
""
],
[
"Frontiere",
"Nicholas",
""
],
[
"Lukic",
"Zarija",
""
]
] |
TITLE: The Universe at Extreme Scale: Multi-Petaflop Sky Simulation on the BG/Q
ABSTRACT: Remarkable observational advances have established a compelling
cross-validated model of the Universe. Yet, two key pillars of this model --
dark matter and dark energy -- remain mysterious. Sky surveys that map billions
of galaxies to explore the `Dark Universe', demand a corresponding
extreme-scale simulation capability; the HACC (Hybrid/Hardware Accelerated
Cosmology Code) framework has been designed to deliver this level of
performance now, and into the future. With its novel algorithmic structure,
HACC allows flexible tuning across diverse architectures, including accelerated
and multi-core systems.
On the IBM BG/Q, HACC attains unprecedented scalable performance -- currently
13.94 PFlops at 69.2% of peak and 90% parallel efficiency on 1,572,864 cores
with an equal number of MPI ranks, and a concurrency of 6.3 million. This level
of performance was achieved at extreme problem sizes, including a benchmark run
with more than 3.6 trillion particles, significantly larger than any
cosmological simulation yet performed.
|
no_new_dataset
| 0.707152
|
1208.3665
|
Christian Riess
|
Vincent Christlein, Christian Riess, Johannes Jordan, Corinna Riess
and Elli Angelopoulou
|
An Evaluation of Popular Copy-Move Forgery Detection Approaches
|
Main paper: 14 pages, supplemental material: 12 pages, main paper
appeared in IEEE Transaction on Information Forensics and Security
|
IEEE Transactions on Information Forensics and Security, volume 7,
number 6, 2012, pp. 1841-1854
|
10.1109/TIFS.2012.2218597
| null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A copy-move forgery is created by copying and pasting content within the same
image, and potentially post-processing it. In recent years, the detection of
copy-move forgeries has become one of the most actively researched topics in
blind image forensics. A considerable number of different algorithms have been
proposed focusing on different types of postprocessed copies. In this paper, we
aim to answer which copy-move forgery detection algorithms and processing steps
(e.g., matching, filtering, outlier detection, affine transformation
estimation) perform best in various postprocessing scenarios. The focus of our
analysis is to evaluate the performance of previously proposed feature sets. We
achieve this by casting existing algorithms in a common pipeline. In this
paper, we examined the 15 most prominent feature sets. We analyzed the
detection performance on a per-image basis and on a per-pixel basis. We created
a challenging real-world copy-move dataset, and a software framework for
systematic image manipulation. Experiments show, that the keypoint-based
features SIFT and SURF, as well as the block-based DCT, DWT, KPCA, PCA and
Zernike features perform very well. These feature sets exhibit the best
robustness against various noise sources and downsampling, while reliably
identifying the copied regions.
|
[
{
"version": "v1",
"created": "Fri, 17 Aug 2012 19:41:23 GMT"
},
{
"version": "v2",
"created": "Mon, 26 Nov 2012 20:53:51 GMT"
}
] | 2012-11-27T00:00:00
|
[
[
"Christlein",
"Vincent",
""
],
[
"Riess",
"Christian",
""
],
[
"Jordan",
"Johannes",
""
],
[
"Riess",
"Corinna",
""
],
[
"Angelopoulou",
"Elli",
""
]
] |
TITLE: An Evaluation of Popular Copy-Move Forgery Detection Approaches
ABSTRACT: A copy-move forgery is created by copying and pasting content within the same
image, and potentially post-processing it. In recent years, the detection of
copy-move forgeries has become one of the most actively researched topics in
blind image forensics. A considerable number of different algorithms have been
proposed focusing on different types of postprocessed copies. In this paper, we
aim to answer which copy-move forgery detection algorithms and processing steps
(e.g., matching, filtering, outlier detection, affine transformation
estimation) perform best in various postprocessing scenarios. The focus of our
analysis is to evaluate the performance of previously proposed feature sets. We
achieve this by casting existing algorithms in a common pipeline. In this
paper, we examined the 15 most prominent feature sets. We analyzed the
detection performance on a per-image basis and on a per-pixel basis. We created
a challenging real-world copy-move dataset, and a software framework for
systematic image manipulation. Experiments show, that the keypoint-based
features SIFT and SURF, as well as the block-based DCT, DWT, KPCA, PCA and
Zernike features perform very well. These feature sets exhibit the best
robustness against various noise sources and downsampling, while reliably
identifying the copied regions.
|
new_dataset
| 0.71202
|
1211.5625
|
Sriganesh Srihari Dr
|
Sriganesh Srihari, Hon Wai Leong
|
A survey of computational methods for protein complex prediction from
protein interaction networks
|
27 pages, 5 figures, 4 tables
|
Srihari, S., Leong, HW., J Bioinform Comput Biol 11(2): 1230002,
2013
|
10.1142/S021972001230002X
| null |
cs.CE q-bio.MN
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Complexes of physically interacting proteins are one of the fundamental
functional units responsible for driving key biological mechanisms within the
cell. Their identification is therefore necessary not only to understand
complex formation but also the higher level organization of the cell. With the
advent of high-throughput techniques in molecular biology, significant amount
of physical interaction data has been cataloged from organisms such as yeast,
which has in turn fueled computational approaches to systematically mine
complexes from the network of physical interactions among proteins (PPI
network). In this survey, we review, classify and evaluate some of the key
computational methods developed till date for the identification of protein
complexes from PPI networks. We present two insightful taxonomies that reflect
how these methods have evolved over the years towards improving automated
complex prediction. We also discuss some open challenges facing accurate
reconstruction of complexes, the crucial ones being presence of high proportion
of errors and noise in current high-throughput datasets and some key aspects
overlooked by current complex detection methods. We hope this review will not
only help to condense the history of computational complex detection for easy
reference, but also provide valuable insights to drive further research in this
area.
|
[
{
"version": "v1",
"created": "Sat, 24 Nov 2012 00:30:33 GMT"
}
] | 2012-11-27T00:00:00
|
[
[
"Srihari",
"Sriganesh",
""
],
[
"Leong",
"Hon Wai",
""
]
] |
TITLE: A survey of computational methods for protein complex prediction from
protein interaction networks
ABSTRACT: Complexes of physically interacting proteins are one of the fundamental
functional units responsible for driving key biological mechanisms within the
cell. Their identification is therefore necessary not only to understand
complex formation but also the higher level organization of the cell. With the
advent of high-throughput techniques in molecular biology, significant amount
of physical interaction data has been cataloged from organisms such as yeast,
which has in turn fueled computational approaches to systematically mine
complexes from the network of physical interactions among proteins (PPI
network). In this survey, we review, classify and evaluate some of the key
computational methods developed till date for the identification of protein
complexes from PPI networks. We present two insightful taxonomies that reflect
how these methods have evolved over the years towards improving automated
complex prediction. We also discuss some open challenges facing accurate
reconstruction of complexes, the crucial ones being presence of high proportion
of errors and noise in current high-throughput datasets and some key aspects
overlooked by current complex detection methods. We hope this review will not
only help to condense the history of computational complex detection for easy
reference, but also provide valuable insights to drive further research in this
area.
|
no_new_dataset
| 0.708011
|
1211.5817
|
Seyed-Mehdi-Reza Beheshti
|
Seyed-Mehdi-Reza Beheshti, Sherif Sakr, Boualem Benatallah, Hamid Reza
Motahari-Nezhad
|
Extending SPARQL to Support Entity Grouping and Path Queries
|
23 pages. arXiv admin note: text overlap with arXiv:1211.5009
| null | null |
UNSW-CSE-TR-1019
|
cs.DB
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The ability to efficiently find relevant subgraphs and paths in a large graph
to a given query is important in many applications including scientific data
analysis, social networks, and business intelligence. Currently, there is
little support and no efficient approaches for expressing and executing such
queries. This paper proposes a data model and a query language to address this
problem. The contributions include supporting the construction and selection
of: (i) folder nodes, representing a set of related entities, and (ii) path
nodes, representing a set of paths in which a path is the transitive
relationship of two or more entities in the graph. Folders and paths can be
stored and used for future queries. We introduce FPSPARQL which is an extension
of the SPARQL supporting folder and path nodes. We have implemented a query
engine that supports FPSPARQL and the evaluation results shows its viability
and efficiency for querying large graph datasets.
|
[
{
"version": "v1",
"created": "Wed, 21 Nov 2012 10:55:36 GMT"
}
] | 2012-11-27T00:00:00
|
[
[
"Beheshti",
"Seyed-Mehdi-Reza",
""
],
[
"Sakr",
"Sherif",
""
],
[
"Benatallah",
"Boualem",
""
],
[
"Motahari-Nezhad",
"Hamid Reza",
""
]
] |
TITLE: Extending SPARQL to Support Entity Grouping and Path Queries
ABSTRACT: The ability to efficiently find relevant subgraphs and paths in a large graph
to a given query is important in many applications including scientific data
analysis, social networks, and business intelligence. Currently, there is
little support and no efficient approaches for expressing and executing such
queries. This paper proposes a data model and a query language to address this
problem. The contributions include supporting the construction and selection
of: (i) folder nodes, representing a set of related entities, and (ii) path
nodes, representing a set of paths in which a path is the transitive
relationship of two or more entities in the graph. Folders and paths can be
stored and used for future queries. We introduce FPSPARQL which is an extension
of the SPARQL supporting folder and path nodes. We have implemented a query
engine that supports FPSPARQL and the evaluation results shows its viability
and efficiency for querying large graph datasets.
|
no_new_dataset
| 0.708799
|
1211.5820
|
Erjia Yan
|
Erjia Yan, Ying Ding, Blaise Cronin, Loet Leydesdorff
|
A bird's-eye view of scientific trading: Dependency relations among
fields of science
| null | null | null | null |
cs.DL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We use a trading metaphor to study knowledge transfer in the sciences as well
as the social sciences. The metaphor comprises four dimensions: (a) Discipline
Self-dependence, (b) Knowledge Exports/Imports, (c) Scientific Trading
Dynamics, and (d) Scientific Trading Impact. This framework is applied to a
dataset of 221 Web of Science subject categories. We find that: (i) the
Scientific Trading Impact and Dynamics of Materials Science And Transportation
Science have increased; (ii) Biomedical Disciplines, Physics, And Mathematics
are significant knowledge exporters, as is Statistics & Probability; (iii) in
the social sciences, Economics, Business, Psychology, Management, And Sociology
are important knowledge exporters; (iv) Discipline Self-dependence is
associated with specialized domains which have ties to professional practice
(e.g., Law, Ophthalmology, Dentistry, Oral Surgery & Medicine, Psychology,
Psychoanalysis, Veterinary Sciences, And Nursing).
|
[
{
"version": "v1",
"created": "Sun, 25 Nov 2012 23:22:05 GMT"
}
] | 2012-11-27T00:00:00
|
[
[
"Yan",
"Erjia",
""
],
[
"Ding",
"Ying",
""
],
[
"Cronin",
"Blaise",
""
],
[
"Leydesdorff",
"Loet",
""
]
] |
TITLE: A bird's-eye view of scientific trading: Dependency relations among
fields of science
ABSTRACT: We use a trading metaphor to study knowledge transfer in the sciences as well
as the social sciences. The metaphor comprises four dimensions: (a) Discipline
Self-dependence, (b) Knowledge Exports/Imports, (c) Scientific Trading
Dynamics, and (d) Scientific Trading Impact. This framework is applied to a
dataset of 221 Web of Science subject categories. We find that: (i) the
Scientific Trading Impact and Dynamics of Materials Science And Transportation
Science have increased; (ii) Biomedical Disciplines, Physics, And Mathematics
are significant knowledge exporters, as is Statistics & Probability; (iii) in
the social sciences, Economics, Business, Psychology, Management, And Sociology
are important knowledge exporters; (iv) Discipline Self-dependence is
associated with specialized domains which have ties to professional practice
(e.g., Law, Ophthalmology, Dentistry, Oral Surgery & Medicine, Psychology,
Psychoanalysis, Veterinary Sciences, And Nursing).
|
no_new_dataset
| 0.707196
|
1211.0191
|
Branko Ristic
|
Branko Ristic, Jamie Sherrah and \'Angel F. Garc\'ia-Fern\'andez
|
Performance Evaluation of Random Set Based Pedestrian Tracking
Algorithms
|
6 pages, 3 figures
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The paper evaluates the error performance of three random finite set based
multi-object trackers in the context of pedestrian video tracking. The
evaluation is carried out using a publicly available video dataset of 4500
frames (town centre street) for which the ground truth is available. The input
to all pedestrian tracking algorithms is an identical set of head and body
detections, obtained using the Histogram of Oriented Gradients (HOG) detector.
The tracking error is measured using the recently proposed OSPA metric for
tracks, adopted as the only known mathematically rigorous metric for measuring
the distance between two sets of tracks. A comparative analysis is presented
under various conditions.
|
[
{
"version": "v1",
"created": "Thu, 25 Oct 2012 23:21:46 GMT"
}
] | 2012-11-26T00:00:00
|
[
[
"Ristic",
"Branko",
""
],
[
"Sherrah",
"Jamie",
""
],
[
"García-Fernández",
"Ángel F.",
""
]
] |
TITLE: Performance Evaluation of Random Set Based Pedestrian Tracking
Algorithms
ABSTRACT: The paper evaluates the error performance of three random finite set based
multi-object trackers in the context of pedestrian video tracking. The
evaluation is carried out using a publicly available video dataset of 4500
frames (town centre street) for which the ground truth is available. The input
to all pedestrian tracking algorithms is an identical set of head and body
detections, obtained using the Histogram of Oriented Gradients (HOG) detector.
The tracking error is measured using the recently proposed OSPA metric for
tracks, adopted as the only known mathematically rigorous metric for measuring
the distance between two sets of tracks. A comparative analysis is presented
under various conditions.
|
no_new_dataset
| 0.706431
|
1211.5520
|
Ashish Tendulkar Dr
|
Vivekanand Samant, Arvind Hulgeri, Alfonso Valencia, Ashish V.
Tendulkar
|
Accurate Demarcation of Protein Domain Linkers based on Structural
Analysis of Linker Probable Region
|
18 pages, 2 figures
|
International Journal of Computational Biology, 0001:01-19, 2012
| null | null |
cs.CE q-bio.BM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In multi-domain proteins, the domains are connected by a flexible
unstructured region called as protein domain linker. The accurate demarcation
of these linkers holds a key to understanding of their biochemical and
evolutionary attributes. This knowledge helps in designing a suitable linker
for engineering stable multi-domain chimeric proteins. Here we propose a novel
method for the demarcation of the linker based on a three-dimensional protein
structure and a domain definition. The proposed method is based on biological
knowledge about structural flexibility of the linkers. We performed structural
analysis on a linker probable region (LPR) around domain boundary points of
known SCOP domains. The LPR was described using a set of overlapping peptide
fragments of fixed size. Each peptide fragment was then described by geometric
invariants (GIs) and subjected to clustering process where the fragments
corresponding to actual linker come up as outliers. We then discover the actual
linkers by finding the longest continuous stretch of outlier fragments from
LPRs. This method was evaluated on a benchmark dataset of 51 continuous
multi-domain proteins, where it achieves F1 score of 0.745 (0.83 precision and
0.66 recall). When the method was applied on 725 continuous multi-domain
proteins, it was able to identify novel linkers that were not reported
previously. This method can be used in combination with supervised / sequence
based linker prediction methods for accurate linker demarcation.
|
[
{
"version": "v1",
"created": "Fri, 23 Nov 2012 14:53:54 GMT"
}
] | 2012-11-26T00:00:00
|
[
[
"Samant",
"Vivekanand",
""
],
[
"Hulgeri",
"Arvind",
""
],
[
"Valencia",
"Alfonso",
""
],
[
"Tendulkar",
"Ashish V.",
""
]
] |
TITLE: Accurate Demarcation of Protein Domain Linkers based on Structural
Analysis of Linker Probable Region
ABSTRACT: In multi-domain proteins, the domains are connected by a flexible
unstructured region called as protein domain linker. The accurate demarcation
of these linkers holds a key to understanding of their biochemical and
evolutionary attributes. This knowledge helps in designing a suitable linker
for engineering stable multi-domain chimeric proteins. Here we propose a novel
method for the demarcation of the linker based on a three-dimensional protein
structure and a domain definition. The proposed method is based on biological
knowledge about structural flexibility of the linkers. We performed structural
analysis on a linker probable region (LPR) around domain boundary points of
known SCOP domains. The LPR was described using a set of overlapping peptide
fragments of fixed size. Each peptide fragment was then described by geometric
invariants (GIs) and subjected to clustering process where the fragments
corresponding to actual linker come up as outliers. We then discover the actual
linkers by finding the longest continuous stretch of outlier fragments from
LPRs. This method was evaluated on a benchmark dataset of 51 continuous
multi-domain proteins, where it achieves F1 score of 0.745 (0.83 precision and
0.66 recall). When the method was applied on 725 continuous multi-domain
proteins, it was able to identify novel linkers that were not reported
previously. This method can be used in combination with supervised / sequence
based linker prediction methods for accurate linker demarcation.
|
no_new_dataset
| 0.697016
|
1211.5590
|
Pascal Lamblin
|
Fr\'ed\'eric Bastien, Pascal Lamblin, Razvan Pascanu, James Bergstra,
Ian Goodfellow, Arnaud Bergeron, Nicolas Bouchard, David Warde-Farley, Yoshua
Bengio
|
Theano: new features and speed improvements
|
Presented at the Deep Learning Workshop, NIPS 2012
| null | null | null |
cs.SC cs.LG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Theano is a linear algebra compiler that optimizes a user's
symbolically-specified mathematical computations to produce efficient low-level
implementations. In this paper, we present new features and efficiency
improvements to Theano, and benchmarks demonstrating Theano's performance
relative to Torch7, a recently introduced machine learning library, and to
RNNLM, a C++ library targeted at recurrent neural networks.
|
[
{
"version": "v1",
"created": "Fri, 23 Nov 2012 20:42:41 GMT"
}
] | 2012-11-26T00:00:00
|
[
[
"Bastien",
"Frédéric",
""
],
[
"Lamblin",
"Pascal",
""
],
[
"Pascanu",
"Razvan",
""
],
[
"Bergstra",
"James",
""
],
[
"Goodfellow",
"Ian",
""
],
[
"Bergeron",
"Arnaud",
""
],
[
"Bouchard",
"Nicolas",
""
],
[
"Warde-Farley",
"David",
""
],
[
"Bengio",
"Yoshua",
""
]
] |
TITLE: Theano: new features and speed improvements
ABSTRACT: Theano is a linear algebra compiler that optimizes a user's
symbolically-specified mathematical computations to produce efficient low-level
implementations. In this paper, we present new features and efficiency
improvements to Theano, and benchmarks demonstrating Theano's performance
relative to Torch7, a recently introduced machine learning library, and to
RNNLM, a C++ library targeted at recurrent neural networks.
|
no_new_dataset
| 0.708862
|
1211.3882
|
Oliver Obst
|
Edward Moore, Oliver Obst, Mikhail Prokopenko, Peter Wang, Jason Held
|
Gliders2012: Development and Competition Results
|
10 pages
| null | null | null |
cs.AI cs.MA cs.RO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The RoboCup 2D Simulation League incorporates several challenging features,
setting a benchmark for Artificial Intelligence (AI). In this paper we describe
some of the ideas and tools around the development of our team, Gliders2012. In
our description, we focus on the evaluation function as one of our central
mechanisms for action selection. We also point to a new framework for watching
log files in a web browser that we release for use and further development by
the RoboCup community. Finally, we also summarize results of the group and
final matches we played during RoboCup 2012, with Gliders2012 finishing 4th out
of 19 teams.
|
[
{
"version": "v1",
"created": "Fri, 16 Nov 2012 13:20:59 GMT"
},
{
"version": "v2",
"created": "Wed, 21 Nov 2012 04:03:21 GMT"
}
] | 2012-11-22T00:00:00
|
[
[
"Moore",
"Edward",
""
],
[
"Obst",
"Oliver",
""
],
[
"Prokopenko",
"Mikhail",
""
],
[
"Wang",
"Peter",
""
],
[
"Held",
"Jason",
""
]
] |
TITLE: Gliders2012: Development and Competition Results
ABSTRACT: The RoboCup 2D Simulation League incorporates several challenging features,
setting a benchmark for Artificial Intelligence (AI). In this paper we describe
some of the ideas and tools around the development of our team, Gliders2012. In
our description, we focus on the evaluation function as one of our central
mechanisms for action selection. We also point to a new framework for watching
log files in a web browser that we release for use and further development by
the RoboCup community. Finally, we also summarize results of the group and
final matches we played during RoboCup 2012, with Gliders2012 finishing 4th out
of 19 teams.
|
no_new_dataset
| 0.701291
|
1211.4888
|
Tuhin Sahai
|
Tuhin Sahai, Stefan Klus and Michael Dellnitz
|
A Traveling Salesman Learns Bayesian Networks
| null | null | null | null |
cs.LG stat.ML
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Structure learning of Bayesian networks is an important problem that arises
in numerous machine learning applications. In this work, we present a novel
approach for learning the structure of Bayesian networks using the solution of
an appropriately constructed traveling salesman problem. In our approach, one
computes an optimal ordering (partially ordered set) of random variables using
methods for the traveling salesman problem. This ordering significantly reduces
the search space for the subsequent greedy optimization that computes the final
structure of the Bayesian network. We demonstrate our approach of learning
Bayesian networks on real world census and weather datasets. In both cases, we
demonstrate that the approach very accurately captures dependencies between
random variables. We check the accuracy of the predictions based on independent
studies in both application domains.
|
[
{
"version": "v1",
"created": "Tue, 20 Nov 2012 21:50:22 GMT"
}
] | 2012-11-22T00:00:00
|
[
[
"Sahai",
"Tuhin",
""
],
[
"Klus",
"Stefan",
""
],
[
"Dellnitz",
"Michael",
""
]
] |
TITLE: A Traveling Salesman Learns Bayesian Networks
ABSTRACT: Structure learning of Bayesian networks is an important problem that arises
in numerous machine learning applications. In this work, we present a novel
approach for learning the structure of Bayesian networks using the solution of
an appropriately constructed traveling salesman problem. In our approach, one
computes an optimal ordering (partially ordered set) of random variables using
methods for the traveling salesman problem. This ordering significantly reduces
the search space for the subsequent greedy optimization that computes the final
structure of the Bayesian network. We demonstrate our approach of learning
Bayesian networks on real world census and weather datasets. In both cases, we
demonstrate that the approach very accurately captures dependencies between
random variables. We check the accuracy of the predictions based on independent
studies in both application domains.
|
no_new_dataset
| 0.713594
|
1211.4290
|
Wojciech Golab
|
Muntasir Raihan Rahman, Wojciech Golab, Alvin AuYoung, Kimberly
Keeton, Jay J. Wylie
|
Toward a Principled Framework for Benchmarking Consistency
| null | null | null | null |
cs.DC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Large-scale key-value storage systems sacrifice consistency in the interest
of dependability (i.e., partition tolerance and availability), as well as
performance (i.e., latency). Such systems provide eventual
consistency,which---to this point---has been difficult to quantify in real
systems. Given the many implementations and deployments of
eventually-consistent systems (e.g., NoSQL systems), attempts have been made to
measure this consistency empirically, but they suffer from important drawbacks.
For example, state-of-the art consistency benchmarks exercise the system only
in restricted ways and disrupt the workload, which limits their accuracy.
In this paper, we take the position that a consistency benchmark should paint
a comprehensive picture of the relationship between the storage system under
consideration, the workload, the pattern of failures, and the consistency
observed by clients. To illustrate our point, we first survey prior efforts to
quantify eventual consistency. We then present a benchmarking technique that
overcomes the shortcomings of existing techniques to measure the consistency
observed by clients as they execute the workload under consideration. This
method is versatile and minimally disruptive to the system under test. As a
proof of concept, we demonstrate this tool on Cassandra.
|
[
{
"version": "v1",
"created": "Mon, 19 Nov 2012 02:59:53 GMT"
},
{
"version": "v2",
"created": "Tue, 20 Nov 2012 02:25:27 GMT"
}
] | 2012-11-21T00:00:00
|
[
[
"Rahman",
"Muntasir Raihan",
""
],
[
"Golab",
"Wojciech",
""
],
[
"AuYoung",
"Alvin",
""
],
[
"Keeton",
"Kimberly",
""
],
[
"Wylie",
"Jay J.",
""
]
] |
TITLE: Toward a Principled Framework for Benchmarking Consistency
ABSTRACT: Large-scale key-value storage systems sacrifice consistency in the interest
of dependability (i.e., partition tolerance and availability), as well as
performance (i.e., latency). Such systems provide eventual
consistency,which---to this point---has been difficult to quantify in real
systems. Given the many implementations and deployments of
eventually-consistent systems (e.g., NoSQL systems), attempts have been made to
measure this consistency empirically, but they suffer from important drawbacks.
For example, state-of-the art consistency benchmarks exercise the system only
in restricted ways and disrupt the workload, which limits their accuracy.
In this paper, we take the position that a consistency benchmark should paint
a comprehensive picture of the relationship between the storage system under
consideration, the workload, the pattern of failures, and the consistency
observed by clients. To illustrate our point, we first survey prior efforts to
quantify eventual consistency. We then present a benchmarking technique that
overcomes the shortcomings of existing techniques to measure the consistency
observed by clients as they execute the workload under consideration. This
method is versatile and minimally disruptive to the system under test. As a
proof of concept, we demonstrate this tool on Cassandra.
|
no_new_dataset
| 0.707847
|
1211.4658
|
Monowar Bhuyan H
|
Monowar H. Bhuyan, Sarat Saharia, and Dhruba Kr Bhattacharyya
|
An Effective Method for Fingerprint Classification
|
9 pages, 7 figures, 6 tables referred journal publication. arXiv
admin note: substantial text overlap with arXiv:1211.4503
|
International A. Journal of e-Technology, Vol. 1, No. 3, pp.
89-97, January, 2010
| null | null |
cs.CV cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper presents an effective method for fingerprint classification using
data mining approach. Initially, it generates a numeric code sequence for each
fingerprint image based on the ridge flow patterns. Then for each class, a seed
is selected by using a frequent itemsets generation technique. These seeds are
subsequently used for clustering the fingerprint images. The proposed method
was tested and evaluated in terms of several real-life datasets and a
significant improvement in reducing the misclassification errors has been
noticed in comparison to its other counterparts.
|
[
{
"version": "v1",
"created": "Tue, 20 Nov 2012 03:25:57 GMT"
}
] | 2012-11-21T00:00:00
|
[
[
"Bhuyan",
"Monowar H.",
""
],
[
"Saharia",
"Sarat",
""
],
[
"Bhattacharyya",
"Dhruba Kr",
""
]
] |
TITLE: An Effective Method for Fingerprint Classification
ABSTRACT: This paper presents an effective method for fingerprint classification using
data mining approach. Initially, it generates a numeric code sequence for each
fingerprint image based on the ridge flow patterns. Then for each class, a seed
is selected by using a frequent itemsets generation technique. These seeds are
subsequently used for clustering the fingerprint images. The proposed method
was tested and evaluated in terms of several real-life datasets and a
significant improvement in reducing the misclassification errors has been
noticed in comparison to its other counterparts.
|
no_new_dataset
| 0.714192
|
1211.4142
|
Shaina Race
|
Ralph Abbey, Jeremy Diepenbrock, Amy Langville, Carl Meyer, Shaina
Race, Dexin Zhou
|
Data Clustering via Principal Direction Gap Partitioning
| null | null | null | null |
stat.ML cs.LG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We explore the geometrical interpretation of the PCA based clustering
algorithm Principal Direction Divisive Partitioning (PDDP). We give several
examples where this algorithm breaks down, and suggest a new method, gap
partitioning, which takes into account natural gaps in the data between
clusters. Geometric features of the PCA space are derived and illustrated and
experimental results are given which show our method is comparable on the
datasets used in the original paper on PDDP.
|
[
{
"version": "v1",
"created": "Sat, 17 Nov 2012 18:28:30 GMT"
}
] | 2012-11-20T00:00:00
|
[
[
"Abbey",
"Ralph",
""
],
[
"Diepenbrock",
"Jeremy",
""
],
[
"Langville",
"Amy",
""
],
[
"Meyer",
"Carl",
""
],
[
"Race",
"Shaina",
""
],
[
"Zhou",
"Dexin",
""
]
] |
TITLE: Data Clustering via Principal Direction Gap Partitioning
ABSTRACT: We explore the geometrical interpretation of the PCA based clustering
algorithm Principal Direction Divisive Partitioning (PDDP). We give several
examples where this algorithm breaks down, and suggest a new method, gap
partitioning, which takes into account natural gaps in the data between
clusters. Geometric features of the PCA space are derived and illustrated and
experimental results are given which show our method is comparable on the
datasets used in the original paper on PDDP.
|
no_new_dataset
| 0.712839
|
1211.4332
|
Ye Liang
|
Ye Liang
|
Real root refinements for univariate polynomial equations
|
8 pages
| null | null | null |
cs.NA
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Real root finding of polynomial equations is a basic problem in computer
algebra. This task is usually divided into two parts: isolation and refinement.
In this paper, we propose two algorithms LZ1 and LZ2 to refine real roots of
univariate polynomial equations. Our algorithms combine Newton's method and the
secant method to bound the unique solution in an interval of a monotonic convex
isolation (MCI) of a polynomial, and have quadratic and cubic convergence
rates, respectively. To avoid the swell of coefficients and speed up the
computation, we implement the two algorithms by using the floating-point
interval method in Maple15 with the package intpakX. Experiments show that our
methods are effective and much faster than the function RefineBox in the
software Maple15 on benchmark polynomials.
|
[
{
"version": "v1",
"created": "Mon, 19 Nov 2012 08:30:30 GMT"
}
] | 2012-11-20T00:00:00
|
[
[
"Liang",
"Ye",
""
]
] |
TITLE: Real root refinements for univariate polynomial equations
ABSTRACT: Real root finding of polynomial equations is a basic problem in computer
algebra. This task is usually divided into two parts: isolation and refinement.
In this paper, we propose two algorithms LZ1 and LZ2 to refine real roots of
univariate polynomial equations. Our algorithms combine Newton's method and the
secant method to bound the unique solution in an interval of a monotonic convex
isolation (MCI) of a polynomial, and have quadratic and cubic convergence
rates, respectively. To avoid the swell of coefficients and speed up the
computation, we implement the two algorithms by using the floating-point
interval method in Maple15 with the package intpakX. Experiments show that our
methods are effective and much faster than the function RefineBox in the
software Maple15 on benchmark polynomials.
|
no_new_dataset
| 0.70978
|
1211.4503
|
Monowar Bhuyan H
|
Monowar H. Bhuyan and D. K. Bhattacharyya
|
An Effective Fingerprint Classification and Search Method
|
10 pages, 8 figures, 6 tables, referred journal publication
|
International Journal of Computer Science and Network Security,
Vol. 9, No.11, pp. 39-48, 2009
| null | null |
cs.CV cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper presents an effective fingerprint classification method designed
based on a hierarchical agglomerative clustering technique. The performance of
the technique was evaluated in terms of several real-life datasets and a
significant improvement in reducing the misclassification error has been
noticed. This paper also presents a query based faster fingerprint search
method over the clustered fingerprint databases. The retrieval accuracy of the
search method has been found effective in light of several real-life databases.
|
[
{
"version": "v1",
"created": "Mon, 19 Nov 2012 17:13:26 GMT"
}
] | 2012-11-20T00:00:00
|
[
[
"Bhuyan",
"Monowar H.",
""
],
[
"Bhattacharyya",
"D. K.",
""
]
] |
TITLE: An Effective Fingerprint Classification and Search Method
ABSTRACT: This paper presents an effective fingerprint classification method designed
based on a hierarchical agglomerative clustering technique. The performance of
the technique was evaluated in terms of several real-life datasets and a
significant improvement in reducing the misclassification error has been
noticed. This paper also presents a query based faster fingerprint search
method over the clustered fingerprint databases. The retrieval accuracy of the
search method has been found effective in light of several real-life databases.
|
no_new_dataset
| 0.71222
|
1211.4521
|
Tyler Clemons Mr
|
Tyler Clemons, S. M. Faisal, Shirish Tatikonda, Charu Aggarawl, and
Srinivasan Parthasarathy
|
Hash in a Flash: Hash Tables for Solid State Devices
|
16 pages 10 figures
| null | null | null |
cs.DB cs.DS cs.IR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In recent years, information retrieval algorithms have taken center stage for
extracting important data in ever larger datasets. Advances in hardware
technology have lead to the increasingly wide spread use of flash storage
devices. Such devices have clear benefits over traditional hard drives in terms
of latency of access, bandwidth and random access capabilities particularly
when reading data. There are however some interesting trade-offs to consider
when leveraging the advanced features of such devices. On a relative scale
writing to such devices can be expensive. This is because typical flash devices
(NAND technology) are updated in blocks. A minor update to a given block
requires the entire block to be erased, followed by a re-writing of the block.
On the other hand, sequential writes can be two orders of magnitude faster than
random writes. In addition, random writes are degrading to the life of the
flash drive, since each block can support only a limited number of erasures.
TF-IDF can be implemented using a counting hash table. In general, hash tables
are a particularly challenging case for the flash drive because this data
structure is inherently dependent upon the randomness of the hash function, as
opposed to the spatial locality of the data. This makes it difficult to avoid
the random writes incurred during the construction of the counting hash table
for TF-IDF. In this paper, we will study the design landscape for the
development of a hash table for flash storage devices. We demonstrate how to
effectively design a hash table with two related hash functions, one of which
exhibits a data placement property with respect to the other. Specifically, we
focus on three designs based on this general philosophy and evaluate the
trade-offs among them along the axes of query performance, insert and update
times and I/O time through an implementation of the TF-IDF algorithm.
|
[
{
"version": "v1",
"created": "Mon, 19 Nov 2012 17:55:01 GMT"
}
] | 2012-11-20T00:00:00
|
[
[
"Clemons",
"Tyler",
""
],
[
"Faisal",
"S. M.",
""
],
[
"Tatikonda",
"Shirish",
""
],
[
"Aggarawl",
"Charu",
""
],
[
"Parthasarathy",
"Srinivasan",
""
]
] |
TITLE: Hash in a Flash: Hash Tables for Solid State Devices
ABSTRACT: In recent years, information retrieval algorithms have taken center stage for
extracting important data in ever larger datasets. Advances in hardware
technology have lead to the increasingly wide spread use of flash storage
devices. Such devices have clear benefits over traditional hard drives in terms
of latency of access, bandwidth and random access capabilities particularly
when reading data. There are however some interesting trade-offs to consider
when leveraging the advanced features of such devices. On a relative scale
writing to such devices can be expensive. This is because typical flash devices
(NAND technology) are updated in blocks. A minor update to a given block
requires the entire block to be erased, followed by a re-writing of the block.
On the other hand, sequential writes can be two orders of magnitude faster than
random writes. In addition, random writes are degrading to the life of the
flash drive, since each block can support only a limited number of erasures.
TF-IDF can be implemented using a counting hash table. In general, hash tables
are a particularly challenging case for the flash drive because this data
structure is inherently dependent upon the randomness of the hash function, as
opposed to the spatial locality of the data. This makes it difficult to avoid
the random writes incurred during the construction of the counting hash table
for TF-IDF. In this paper, we will study the design landscape for the
development of a hash table for flash storage devices. We demonstrate how to
effectively design a hash table with two related hash functions, one of which
exhibits a data placement property with respect to the other. Specifically, we
focus on three designs based on this general philosophy and evaluate the
trade-offs among them along the axes of query performance, insert and update
times and I/O time through an implementation of the TF-IDF algorithm.
|
no_new_dataset
| 0.706817
|
1211.4552
|
Gabriel Synnaeve
|
Gabriel Synnaeve (LIG, LPPA), Pierre Bessiere (LPPA)
|
A Dataset for StarCraft AI \& an Example of Armies Clustering
|
Artificial Intelligence in Adversarial Real-Time Games 2012, Palo
Alto : United States (2012)
| null | null | null |
cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper advocates the exploration of the full state of recorded real-time
strategy (RTS) games, by human or robotic players, to discover how to reason
about tactics and strategy. We present a dataset of StarCraft games
encompassing the most of the games' state (not only player's orders). We
explain one of the possible usages of this dataset by clustering armies on
their compositions. This reduction of armies compositions to mixtures of
Gaussian allow for strategic reasoning at the level of the components. We
evaluated this clustering method by predicting the outcomes of battles based on
armies compositions' mixtures components
|
[
{
"version": "v1",
"created": "Mon, 19 Nov 2012 20:18:43 GMT"
}
] | 2012-11-20T00:00:00
|
[
[
"Synnaeve",
"Gabriel",
"",
"LIG, LPPA"
],
[
"Bessiere",
"Pierre",
"",
"LPPA"
]
] |
TITLE: A Dataset for StarCraft AI \& an Example of Armies Clustering
ABSTRACT: This paper advocates the exploration of the full state of recorded real-time
strategy (RTS) games, by human or robotic players, to discover how to reason
about tactics and strategy. We present a dataset of StarCraft games
encompassing the most of the games' state (not only player's orders). We
explain one of the possible usages of this dataset by clustering armies on
their compositions. This reduction of armies compositions to mixtures of
Gaussian allow for strategic reasoning at the level of the components. We
evaluated this clustering method by predicting the outcomes of battles based on
armies compositions' mixtures components
|
new_dataset
| 0.712657
|
1011.4104
|
Andri Mirzal
|
Andri Mirzal
|
Clustering and Latent Semantic Indexing Aspects of the Singular Value
Decomposition
|
38 pages, submitted to Pattern Recognition
| null | null | null |
cs.LG cs.NA math.SP
|
http://creativecommons.org/licenses/by-nc-sa/3.0/
|
This paper discusses clustering and latent semantic indexing (LSI) aspects of
the singular value decomposition (SVD). The purpose of this paper is twofold.
The first is to give an explanation on how and why the singular vectors can be
used in clustering. And the second is to show that the two seemingly unrelated
SVD aspects actually originate from the same source: related vertices tend to
be more clustered in the graph representation of lower rank approximate matrix
using the SVD than in the original semantic graph. Accordingly, the SVD can
improve retrieval performance of an information retrieval system since queries
made to the approximate matrix can retrieve more relevant documents and filter
out more irrelevant documents than the same queries made to the original
matrix. By utilizing this fact, we will devise an LSI algorithm that mimicks
SVD capability in clustering related vertices. Convergence analysis shows that
the algorithm is convergent and produces a unique solution for each input.
Experimental results using some standard datasets in LSI research show that
retrieval performances of the algorithm are comparable to the SVD's. In
addition, the algorithm is more practical and easier to use because there is no
need to determine decomposition rank which is crucial in driving retrieval
performance of the SVD.
|
[
{
"version": "v1",
"created": "Wed, 17 Nov 2010 23:39:12 GMT"
},
{
"version": "v2",
"created": "Wed, 9 Mar 2011 18:56:56 GMT"
},
{
"version": "v3",
"created": "Wed, 17 Oct 2012 08:41:06 GMT"
},
{
"version": "v4",
"created": "Fri, 16 Nov 2012 04:26:29 GMT"
}
] | 2012-11-19T00:00:00
|
[
[
"Mirzal",
"Andri",
""
]
] |
TITLE: Clustering and Latent Semantic Indexing Aspects of the Singular Value
Decomposition
ABSTRACT: This paper discusses clustering and latent semantic indexing (LSI) aspects of
the singular value decomposition (SVD). The purpose of this paper is twofold.
The first is to give an explanation on how and why the singular vectors can be
used in clustering. And the second is to show that the two seemingly unrelated
SVD aspects actually originate from the same source: related vertices tend to
be more clustered in the graph representation of lower rank approximate matrix
using the SVD than in the original semantic graph. Accordingly, the SVD can
improve retrieval performance of an information retrieval system since queries
made to the approximate matrix can retrieve more relevant documents and filter
out more irrelevant documents than the same queries made to the original
matrix. By utilizing this fact, we will devise an LSI algorithm that mimicks
SVD capability in clustering related vertices. Convergence analysis shows that
the algorithm is convergent and produces a unique solution for each input.
Experimental results using some standard datasets in LSI research show that
retrieval performances of the algorithm are comparable to the SVD's. In
addition, the algorithm is more practical and easier to use because there is no
need to determine decomposition rank which is crucial in driving retrieval
performance of the SVD.
|
no_new_dataset
| 0.710396
|
1211.3444
|
Deanna Needell
|
B. Cung, T. Jin, J. Ramirez, A. Thompson, C. Boutsidis and D. Needell
|
Spectral Clustering: An empirical study of Approximation Algorithms and
its Application to the Attrition Problem
| null | null | null | null |
cs.LG math.NA stat.ML
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Clustering is the problem of separating a set of objects into groups (called
clusters) so that objects within the same cluster are more similar to each
other than to those in different clusters. Spectral clustering is a now
well-known method for clustering which utilizes the spectrum of the data
similarity matrix to perform this separation. Since the method relies on
solving an eigenvector problem, it is computationally expensive for large
datasets. To overcome this constraint, approximation methods have been
developed which aim to reduce running time while maintaining accurate
classification. In this article, we summarize and experimentally evaluate
several approximation methods for spectral clustering. From an applications
standpoint, we employ spectral clustering to solve the so-called attrition
problem, where one aims to identify from a set of employees those who are
likely to voluntarily leave the company from those who are not. Our study sheds
light on the empirical performance of existing approximate spectral clustering
methods and shows the applicability of these methods in an important business
optimization related problem.
|
[
{
"version": "v1",
"created": "Wed, 14 Nov 2012 22:05:09 GMT"
}
] | 2012-11-16T00:00:00
|
[
[
"Cung",
"B.",
""
],
[
"Jin",
"T.",
""
],
[
"Ramirez",
"J.",
""
],
[
"Thompson",
"A.",
""
],
[
"Boutsidis",
"C.",
""
],
[
"Needell",
"D.",
""
]
] |
TITLE: Spectral Clustering: An empirical study of Approximation Algorithms and
its Application to the Attrition Problem
ABSTRACT: Clustering is the problem of separating a set of objects into groups (called
clusters) so that objects within the same cluster are more similar to each
other than to those in different clusters. Spectral clustering is a now
well-known method for clustering which utilizes the spectrum of the data
similarity matrix to perform this separation. Since the method relies on
solving an eigenvector problem, it is computationally expensive for large
datasets. To overcome this constraint, approximation methods have been
developed which aim to reduce running time while maintaining accurate
classification. In this article, we summarize and experimentally evaluate
several approximation methods for spectral clustering. From an applications
standpoint, we employ spectral clustering to solve the so-called attrition
problem, where one aims to identify from a set of employees those who are
likely to voluntarily leave the company from those who are not. Our study sheds
light on the empirical performance of existing approximate spectral clustering
methods and shows the applicability of these methods in an important business
optimization related problem.
|
no_new_dataset
| 0.708377
|
1011.4558
|
Gabriel Kerneis
|
Gabriel Kerneis (PPS), Juliusz Chroboczek (PPS)
|
Continuation-Passing C: compiling threads to events through
continuations
|
Higher-Order and Symbolic Computation (2012). arXiv admin note:
substantial text overlap with arXiv:1202.3247
|
Higher-Order and Symbolic Computation 24(3): 239-279 (2011)
|
10.1007/s10990-012-9084-5
| null |
cs.PL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we introduce Continuation Passing C (CPC), a programming
language for concurrent systems in which native and cooperative threads are
unified and presented to the programmer as a single abstraction. The CPC
compiler uses a compilation technique, based on the CPS transform, that yields
efficient code and an extremely lightweight representation for contexts. We
provide a proof of the correctness of our compilation scheme. We show in
particular that lambda-lifting, a common compilation technique for functional
languages, is also correct in an imperative language like C, under some
conditions enforced by the CPC compiler. The current CPC compiler is mature
enough to write substantial programs such as Hekate, a highly concurrent
BitTorrent seeder. Our benchmark results show that CPC is as efficient, while
using significantly less space, as the most efficient thread libraries
available.
|
[
{
"version": "v1",
"created": "Sat, 20 Nov 2010 07:35:14 GMT"
},
{
"version": "v2",
"created": "Mon, 20 Feb 2012 08:11:11 GMT"
},
{
"version": "v3",
"created": "Thu, 5 Jul 2012 19:40:57 GMT"
}
] | 2012-11-15T00:00:00
|
[
[
"Kerneis",
"Gabriel",
"",
"PPS"
],
[
"Chroboczek",
"Juliusz",
"",
"PPS"
]
] |
TITLE: Continuation-Passing C: compiling threads to events through
continuations
ABSTRACT: In this paper, we introduce Continuation Passing C (CPC), a programming
language for concurrent systems in which native and cooperative threads are
unified and presented to the programmer as a single abstraction. The CPC
compiler uses a compilation technique, based on the CPS transform, that yields
efficient code and an extremely lightweight representation for contexts. We
provide a proof of the correctness of our compilation scheme. We show in
particular that lambda-lifting, a common compilation technique for functional
languages, is also correct in an imperative language like C, under some
conditions enforced by the CPC compiler. The current CPC compiler is mature
enough to write substantial programs such as Hekate, a highly concurrent
BitTorrent seeder. Our benchmark results show that CPC is as efficient, while
using significantly less space, as the most efficient thread libraries
available.
|
no_new_dataset
| 0.705189
|
1202.2745
|
Dan Ciresan
|
Dan Cire\c{s}an, Ueli Meier, Juergen Schmidhuber
|
Multi-column Deep Neural Networks for Image Classification
|
20 pages, 14 figures, 8 tables
|
CVPR 2012, p. 3642-3649
| null |
IDSIA-04-12
|
cs.CV cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Traditional methods of computer vision and machine learning cannot match
human performance on tasks such as the recognition of handwritten digits or
traffic signs. Our biologically plausible deep artificial neural network
architectures can. Small (often minimal) receptive fields of convolutional
winner-take-all neurons yield large network depth, resulting in roughly as many
sparsely connected neural layers as found in mammals between retina and visual
cortex. Only winner neurons are trained. Several deep neural columns become
experts on inputs preprocessed in different ways; their predictions are
averaged. Graphics cards allow for fast training. On the very competitive MNIST
handwriting benchmark, our method is the first to achieve near-human
performance. On a traffic sign recognition benchmark it outperforms humans by a
factor of two. We also improve the state-of-the-art on a plethora of common
image classification benchmarks.
|
[
{
"version": "v1",
"created": "Mon, 13 Feb 2012 14:35:41 GMT"
}
] | 2012-11-15T00:00:00
|
[
[
"Cireşan",
"Dan",
""
],
[
"Meier",
"Ueli",
""
],
[
"Schmidhuber",
"Juergen",
""
]
] |
TITLE: Multi-column Deep Neural Networks for Image Classification
ABSTRACT: Traditional methods of computer vision and machine learning cannot match
human performance on tasks such as the recognition of handwritten digits or
traffic signs. Our biologically plausible deep artificial neural network
architectures can. Small (often minimal) receptive fields of convolutional
winner-take-all neurons yield large network depth, resulting in roughly as many
sparsely connected neural layers as found in mammals between retina and visual
cortex. Only winner neurons are trained. Several deep neural columns become
experts on inputs preprocessed in different ways; their predictions are
averaged. Graphics cards allow for fast training. On the very competitive MNIST
handwriting benchmark, our method is the first to achieve near-human
performance. On a traffic sign recognition benchmark it outperforms humans by a
factor of two. We also improve the state-of-the-art on a plethora of common
image classification benchmarks.
|
no_new_dataset
| 0.708824
|
1203.5387
|
Vibhor Rastogi
|
Vibhor Rastogi, Ashwin Machanavajjhala, Laukik Chitnis, Anish Das
Sarma
|
Finding Connected Components on Map-reduce in Logarithmic Rounds
| null | null | null | null |
cs.DS cs.DB
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Given a large graph G = (V,E) with millions of nodes and edges, how do we
compute its connected components efficiently? Recent work addresses this
problem in map-reduce, where a fundamental trade-off exists between the number
of map-reduce rounds and the communication of each round. Denoting d the
diameter of the graph, and n the number of nodes in the largest component, all
prior map-reduce techniques either require d rounds, or require about n|V| +
|E| communication per round. We propose two randomized map-reduce algorithms --
(i) Hash-Greater-To-Min, which provably requires at most 3log(n) rounds with
high probability, and at most 2(|V| + |E|) communication per round, and (ii)
Hash-to-Min, which has a worse theoretical complexity, but in practice
completes in at most 2log(d) rounds and 3(|V| + |E|) communication per rounds.
Our techniques for connected components can be applied to clustering as well.
We propose a novel algorithm for agglomerative single linkage clustering in
map-reduce. This is the first algorithm that can provably compute a clustering
in at most O(log(n)) rounds, where n is the size of the largest cluster. We
show the effectiveness of all our algorithms through detailed experiments on
large synthetic as well as real-world datasets.
|
[
{
"version": "v1",
"created": "Sat, 24 Mar 2012 05:16:27 GMT"
},
{
"version": "v2",
"created": "Tue, 13 Nov 2012 01:50:51 GMT"
}
] | 2012-11-14T00:00:00
|
[
[
"Rastogi",
"Vibhor",
""
],
[
"Machanavajjhala",
"Ashwin",
""
],
[
"Chitnis",
"Laukik",
""
],
[
"Sarma",
"Anish Das",
""
]
] |
TITLE: Finding Connected Components on Map-reduce in Logarithmic Rounds
ABSTRACT: Given a large graph G = (V,E) with millions of nodes and edges, how do we
compute its connected components efficiently? Recent work addresses this
problem in map-reduce, where a fundamental trade-off exists between the number
of map-reduce rounds and the communication of each round. Denoting d the
diameter of the graph, and n the number of nodes in the largest component, all
prior map-reduce techniques either require d rounds, or require about n|V| +
|E| communication per round. We propose two randomized map-reduce algorithms --
(i) Hash-Greater-To-Min, which provably requires at most 3log(n) rounds with
high probability, and at most 2(|V| + |E|) communication per round, and (ii)
Hash-to-Min, which has a worse theoretical complexity, but in practice
completes in at most 2log(d) rounds and 3(|V| + |E|) communication per rounds.
Our techniques for connected components can be applied to clustering as well.
We propose a novel algorithm for agglomerative single linkage clustering in
map-reduce. This is the first algorithm that can provably compute a clustering
in at most O(log(n)) rounds, where n is the size of the largest cluster. We
show the effectiveness of all our algorithms through detailed experiments on
large synthetic as well as real-world datasets.
|
no_new_dataset
| 0.709007
|
1209.4506
|
Duy Truong
|
Truong Vinh Truong Duy and Taisuke Ozaki
|
A three-dimensional domain decomposition method for large-scale DFT
electronic structure calculations
| null | null | null | null |
cond-mat.mtrl-sci cs.CE cs.DC physics.comp-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
With tens of petaflops supercomputers already in operation and exaflops
machines expected to appear within the next 10 years, efficient parallel
computational methods are required to take advantage of such extreme-scale
machines. In this paper, we present a three-dimensional domain decomposition
scheme for enabling large-scale electronic calculations based on density
functional theory (DFT) on massively parallel computers. It is composed of two
methods: (i) atom decomposition method and (ii) grid decomposition method. In
the former, we develop a modified recursive bisection method based on inertia
tensor moment to reorder the atoms along a principal axis so that atoms that
are close in real space are also close on the axis to ensure data locality. The
atoms are then divided into sub-domains depending on their projections onto the
principal axis in a balanced way among the processes. In the latter, we define
four data structures for the partitioning of grids that are carefully
constructed to make data locality consistent with that of the clustered atoms
for minimizing data communications between the processes. We also propose a
decomposition method for solving the Poisson equation using three-dimensional
FFT in Hartree potential calculation, which is shown to be better than a
previously proposed parallelization method based on a two-dimensional
decomposition in terms of communication efficiency. For evaluation, we perform
benchmark calculations with our open-source DFT code, OpenMX, paying particular
attention to the O(N) Krylov subspace method. The results show that our scheme
exhibits good strong and weak scaling properties, with the parallel efficiency
at 131,072 cores being 67.7% compared to the baseline of 16,384 cores with
131,072 diamond atoms on the K computer.
|
[
{
"version": "v1",
"created": "Thu, 20 Sep 2012 12:22:04 GMT"
}
] | 2012-11-13T00:00:00
|
[
[
"Duy",
"Truong Vinh Truong",
""
],
[
"Ozaki",
"Taisuke",
""
]
] |
TITLE: A three-dimensional domain decomposition method for large-scale DFT
electronic structure calculations
ABSTRACT: With tens of petaflops supercomputers already in operation and exaflops
machines expected to appear within the next 10 years, efficient parallel
computational methods are required to take advantage of such extreme-scale
machines. In this paper, we present a three-dimensional domain decomposition
scheme for enabling large-scale electronic calculations based on density
functional theory (DFT) on massively parallel computers. It is composed of two
methods: (i) atom decomposition method and (ii) grid decomposition method. In
the former, we develop a modified recursive bisection method based on inertia
tensor moment to reorder the atoms along a principal axis so that atoms that
are close in real space are also close on the axis to ensure data locality. The
atoms are then divided into sub-domains depending on their projections onto the
principal axis in a balanced way among the processes. In the latter, we define
four data structures for the partitioning of grids that are carefully
constructed to make data locality consistent with that of the clustered atoms
for minimizing data communications between the processes. We also propose a
decomposition method for solving the Poisson equation using three-dimensional
FFT in Hartree potential calculation, which is shown to be better than a
previously proposed parallelization method based on a two-dimensional
decomposition in terms of communication efficiency. For evaluation, we perform
benchmark calculations with our open-source DFT code, OpenMX, paying particular
attention to the O(N) Krylov subspace method. The results show that our scheme
exhibits good strong and weak scaling properties, with the parallel efficiency
at 131,072 cores being 67.7% compared to the baseline of 16,384 cores with
131,072 diamond atoms on the K computer.
|
no_new_dataset
| 0.710616
|
1211.2399
|
Rustam Tagiew
|
Rustam Tagiew
|
Mining Determinism in Human Strategic Behavior
|
8 pages, no figures, EEML 2012
|
Experimental Economics and Machine Learning 2012, CEUR-WS Vol-870,
urn:nbn:de:0074-870-0
| null | null |
cs.GT cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This work lies in the fusion of experimental economics and data mining. It
continues author's previous work on mining behaviour rules of human subjects
from experimental data, where game-theoretic predictions partially fail to
work. Game-theoretic predictions aka equilibria only tend to success with
experienced subjects on specific games, what is rarely given. Apart from game
theory, contemporary experimental economics offers a number of alternative
models. In relevant literature, these models are always biased by psychological
and near-psychological theories and are claimed to be proven by the data. This
work introduces a data mining approach to the problem without using vast
psychological background. Apart from determinism, no other biases are regarded.
Two datasets from different human subject experiments are taken for evaluation.
The first one is a repeated mixed strategy zero sum game and the second -
repeated ultimatum game. As result, the way of mining deterministic
regularities in human strategic behaviour is described and evaluated. As future
work, the design of a new representation formalism is discussed.
|
[
{
"version": "v1",
"created": "Sun, 11 Nov 2012 11:27:01 GMT"
}
] | 2012-11-13T00:00:00
|
[
[
"Tagiew",
"Rustam",
""
]
] |
TITLE: Mining Determinism in Human Strategic Behavior
ABSTRACT: This work lies in the fusion of experimental economics and data mining. It
continues author's previous work on mining behaviour rules of human subjects
from experimental data, where game-theoretic predictions partially fail to
work. Game-theoretic predictions aka equilibria only tend to success with
experienced subjects on specific games, what is rarely given. Apart from game
theory, contemporary experimental economics offers a number of alternative
models. In relevant literature, these models are always biased by psychological
and near-psychological theories and are claimed to be proven by the data. This
work introduces a data mining approach to the problem without using vast
psychological background. Apart from determinism, no other biases are regarded.
Two datasets from different human subject experiments are taken for evaluation.
The first one is a repeated mixed strategy zero sum game and the second -
repeated ultimatum game. As result, the way of mining deterministic
regularities in human strategic behaviour is described and evaluated. As future
work, the design of a new representation formalism is discussed.
|
no_new_dataset
| 0.710025
|
1211.2556
|
Fatai Anifowose
|
Fatai Adesina Anifowose
|
A Comparative Study of Gaussian Mixture Model and Radial Basis Function
for Voice Recognition
|
9 pages, 10 figures; International Journal of Advanced Computer
Science and Applications (IJACSA), Vol. 1, No.3, September 2010
| null | null | null |
cs.LG cs.CV stat.ML
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A comparative study of the application of Gaussian Mixture Model (GMM) and
Radial Basis Function (RBF) in biometric recognition of voice has been carried
out and presented. The application of machine learning techniques to biometric
authentication and recognition problems has gained a widespread acceptance. In
this research, a GMM model was trained, using Expectation Maximization (EM)
algorithm, on a dataset containing 10 classes of vowels and the model was used
to predict the appropriate classes using a validation dataset. For experimental
validity, the model was compared to the performance of two different versions
of RBF model using the same learning and validation datasets. The results
showed very close recognition accuracy between the GMM and the standard RBF
model, but with GMM performing better than the standard RBF by less than 1% and
the two models outperformed similar models reported in literature. The DTREG
version of RBF outperformed the other two models by producing 94.8% recognition
accuracy. In terms of recognition time, the standard RBF was found to be the
fastest among the three models.
|
[
{
"version": "v1",
"created": "Mon, 12 Nov 2012 10:42:58 GMT"
}
] | 2012-11-13T00:00:00
|
[
[
"Anifowose",
"Fatai Adesina",
""
]
] |
TITLE: A Comparative Study of Gaussian Mixture Model and Radial Basis Function
for Voice Recognition
ABSTRACT: A comparative study of the application of Gaussian Mixture Model (GMM) and
Radial Basis Function (RBF) in biometric recognition of voice has been carried
out and presented. The application of machine learning techniques to biometric
authentication and recognition problems has gained a widespread acceptance. In
this research, a GMM model was trained, using Expectation Maximization (EM)
algorithm, on a dataset containing 10 classes of vowels and the model was used
to predict the appropriate classes using a validation dataset. For experimental
validity, the model was compared to the performance of two different versions
of RBF model using the same learning and validation datasets. The results
showed very close recognition accuracy between the GMM and the standard RBF
model, but with GMM performing better than the standard RBF by less than 1% and
the two models outperformed similar models reported in literature. The DTREG
version of RBF outperformed the other two models by producing 94.8% recognition
accuracy. In terms of recognition time, the standard RBF was found to be the
fastest among the three models.
|
no_new_dataset
| 0.710051
|
1211.2038
|
Krishnahari Thouti
|
Krishnahari Thouti, S. R. Sathe
|
Comparison of OpenMP & OpenCL Parallel Processing Technologies
|
6 pages, 7 figures;
http://thesai.org/Downloads/Volume3No4/Paper_10-Comparison_of_OpenMP_OpenCL_Parallel_Processing_Technologies.pdf
|
International Journal of Advanced Computer Science and
Applications (IJACSA), Volume 3, issue 4, 2012, 56-61
| null | null |
cs.DC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper presents a comparison of OpenMP and OpenCL based on the parallel
implementation of algorithms from various fields of computer applications. The
focus of our study is on the performance of benchmark comparing OpenMP and
OpenCL. We observed that OpenCL programming model is a good option for mapping
threads on different processing cores. Balancing all available cores and
allocating sufficient amount of work among all computing units, can lead to
improved performance. In our simulation, we used Fedora operating system; a
system with Intel Xeon Dual core processor having thread count 24 coupled with
NVIDIA Quadro FX 3800 as graphical processing unit.
|
[
{
"version": "v1",
"created": "Fri, 9 Nov 2012 04:27:32 GMT"
}
] | 2012-11-12T00:00:00
|
[
[
"Thouti",
"Krishnahari",
""
],
[
"Sathe",
"S. R.",
""
]
] |
TITLE: Comparison of OpenMP & OpenCL Parallel Processing Technologies
ABSTRACT: This paper presents a comparison of OpenMP and OpenCL based on the parallel
implementation of algorithms from various fields of computer applications. The
focus of our study is on the performance of benchmark comparing OpenMP and
OpenCL. We observed that OpenCL programming model is a good option for mapping
threads on different processing cores. Balancing all available cores and
allocating sufficient amount of work among all computing units, can lead to
improved performance. In our simulation, we used Fedora operating system; a
system with Intel Xeon Dual core processor having thread count 24 coupled with
NVIDIA Quadro FX 3800 as graphical processing unit.
|
no_new_dataset
| 0.710446
|
1211.2041
|
Yuan Yao
|
Yuan Yao, Hanghang Tong, Xifeng Yan, Feng Xu, Jian Lu
|
MaTrust: An Effective Multi-Aspect Trust Inference Model
| null | null | null | null |
cs.DB cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Trust is a fundamental concept in many real-world applications such as
e-commerce and peer-to-peer networks. In these applications, users can generate
local opinions about the counterparts based on direct experiences, and these
opinions can then be aggregated to build trust among unknown users. The
mechanism to build new trust relationships based on existing ones is referred
to as trust inference. State-of-the-art trust inference approaches employ the
transitivity property of trust by propagating trust along connected users. In
this paper, we propose a novel trust inference model (MaTrust) by exploring an
equally important property of trust, i.e., the multi-aspect property. MaTrust
directly characterizes multiple latent factors for each trustor and trustee
from the locally-generated trust relationships. Furthermore, it can naturally
incorporate prior knowledge as specified factors. These factors in turn serve
as the basis to infer the unseen trustworthiness scores. Experimental
evaluations on real data sets show that the proposed MaTrust significantly
outperforms several benchmark trust inference models in both effectiveness and
efficiency.
|
[
{
"version": "v1",
"created": "Fri, 9 Nov 2012 04:46:47 GMT"
}
] | 2012-11-12T00:00:00
|
[
[
"Yao",
"Yuan",
""
],
[
"Tong",
"Hanghang",
""
],
[
"Yan",
"Xifeng",
""
],
[
"Xu",
"Feng",
""
],
[
"Lu",
"Jian",
""
]
] |
TITLE: MaTrust: An Effective Multi-Aspect Trust Inference Model
ABSTRACT: Trust is a fundamental concept in many real-world applications such as
e-commerce and peer-to-peer networks. In these applications, users can generate
local opinions about the counterparts based on direct experiences, and these
opinions can then be aggregated to build trust among unknown users. The
mechanism to build new trust relationships based on existing ones is referred
to as trust inference. State-of-the-art trust inference approaches employ the
transitivity property of trust by propagating trust along connected users. In
this paper, we propose a novel trust inference model (MaTrust) by exploring an
equally important property of trust, i.e., the multi-aspect property. MaTrust
directly characterizes multiple latent factors for each trustor and trustee
from the locally-generated trust relationships. Furthermore, it can naturally
incorporate prior knowledge as specified factors. These factors in turn serve
as the basis to infer the unseen trustworthiness scores. Experimental
evaluations on real data sets show that the proposed MaTrust significantly
outperforms several benchmark trust inference models in both effectiveness and
efficiency.
|
no_new_dataset
| 0.710189
|
1211.1752
|
Abhishek Anand Abhishek
|
Abhishek Anand and Sherwin Li
|
3D Scene Grammar for Parsing RGB-D Pointclouds
| null | null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We pose 3D scene-understanding as a problem of parsing in a grammar. A
grammar helps us capture the compositional structure of real-word objects,
e.g., a chair is composed of a seat, a back-rest and some legs. Having multiple
rules for an object helps us capture structural variations in objects, e.g., a
chair can optionally also have arm-rests. Finally, having rules to capture
composition at different levels helps us formulate the entire scene-processing
pipeline as a single problem of finding most likely parse-tree---small segments
combine to form parts of objects, parts to objects and objects to a scene. We
attach a generative probability model to our grammar by having a
feature-dependent probability function for every rule. We evaluated it by
extracting labels for every segment and comparing the results with the
state-of-the-art segment-labeling algorithm. Our algorithm was outperformed by
the state-or-the-art method. But, Our model can be trained very efficiently
(within seconds), and it scales only linearly in with the number of rules in
the grammar. Also, we think that this is an important problem for the 3D vision
community. So, we are releasing our dataset and related code.
|
[
{
"version": "v1",
"created": "Thu, 8 Nov 2012 03:11:53 GMT"
}
] | 2012-11-09T00:00:00
|
[
[
"Anand",
"Abhishek",
""
],
[
"Li",
"Sherwin",
""
]
] |
TITLE: 3D Scene Grammar for Parsing RGB-D Pointclouds
ABSTRACT: We pose 3D scene-understanding as a problem of parsing in a grammar. A
grammar helps us capture the compositional structure of real-word objects,
e.g., a chair is composed of a seat, a back-rest and some legs. Having multiple
rules for an object helps us capture structural variations in objects, e.g., a
chair can optionally also have arm-rests. Finally, having rules to capture
composition at different levels helps us formulate the entire scene-processing
pipeline as a single problem of finding most likely parse-tree---small segments
combine to form parts of objects, parts to objects and objects to a scene. We
attach a generative probability model to our grammar by having a
feature-dependent probability function for every rule. We evaluated it by
extracting labels for every segment and comparing the results with the
state-of-the-art segment-labeling algorithm. Our algorithm was outperformed by
the state-or-the-art method. But, Our model can be trained very efficiently
(within seconds), and it scales only linearly in with the number of rules in
the grammar. Also, we think that this is an important problem for the 3D vision
community. So, we are releasing our dataset and related code.
|
new_dataset
| 0.70576
|
1208.2448
|
Yong Zeng
|
Yong Zeng, Zhifeng Bao, Guoliang Li, Tok Wang Ling, Jiaheng Lu
|
Breaking Out The XML MisMatch Trap
|
The article is already withdrawn
| null | null | null |
cs.DB
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In keyword search, when user cannot get what she wants, query refinement is
needed and reason can be various. We first give a thorough categorization of
the reason, then focus on solving one category of query refinement problem in
the context of XML keyword search, where what user searches for does not exist
in the data. We refer to it as the MisMatch problem in this paper. Then we
propose a practical way to detect the MisMatch problem and generate helpful
suggestions to users. Our approach can be viewed as a post-processing job of
query evaluation, and has three main features: (1) it adopts both the suggested
queries and their sample results as the output to user, helping user judge
whether the MisMatch problem is solved without consuming all query results; (2)
it is portable in the sense that it can work with any LCA-based matching
semantics and orthogonal to the choice of result retrieval method adopted; (3)
it is lightweight in the way that it occupies a very small proportion of the
whole query evaluation time. Extensive experiments on three real datasets
verify the effectiveness, efficiency and scalability of our approach. An online
XML keyword search engine called XClear that embeds the MisMatch problem
detector and suggester has been built.
|
[
{
"version": "v1",
"created": "Sun, 12 Aug 2012 18:51:23 GMT"
},
{
"version": "v2",
"created": "Tue, 6 Nov 2012 03:09:15 GMT"
},
{
"version": "v3",
"created": "Wed, 7 Nov 2012 07:34:13 GMT"
}
] | 2012-11-08T00:00:00
|
[
[
"Zeng",
"Yong",
""
],
[
"Bao",
"Zhifeng",
""
],
[
"Li",
"Guoliang",
""
],
[
"Ling",
"Tok Wang",
""
],
[
"Lu",
"Jiaheng",
""
]
] |
TITLE: Breaking Out The XML MisMatch Trap
ABSTRACT: In keyword search, when user cannot get what she wants, query refinement is
needed and reason can be various. We first give a thorough categorization of
the reason, then focus on solving one category of query refinement problem in
the context of XML keyword search, where what user searches for does not exist
in the data. We refer to it as the MisMatch problem in this paper. Then we
propose a practical way to detect the MisMatch problem and generate helpful
suggestions to users. Our approach can be viewed as a post-processing job of
query evaluation, and has three main features: (1) it adopts both the suggested
queries and their sample results as the output to user, helping user judge
whether the MisMatch problem is solved without consuming all query results; (2)
it is portable in the sense that it can work with any LCA-based matching
semantics and orthogonal to the choice of result retrieval method adopted; (3)
it is lightweight in the way that it occupies a very small proportion of the
whole query evaluation time. Extensive experiments on three real datasets
verify the effectiveness, efficiency and scalability of our approach. An online
XML keyword search engine called XClear that embeds the MisMatch problem
detector and suggester has been built.
|
no_new_dataset
| 0.707556
|
1211.1581
|
Volker Weinberg
|
Volker Weinberg
|
Data-parallel programming with Intel Array Building Blocks (ArBB)
|
13 pages, 7 figures, PRACE Whitepaper
| null | null | null |
cs.PF cs.PL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Intel Array Building Blocks is a high-level data-parallel programming
environment designed to produce scalable and portable results on existing and
upcoming multi- and many-core platforms.
We have chosen several mathematical kernels - a dense matrix-matrix
multiplication, a sparse matrix-vector multiplication, a 1-D complex FFT and a
conjugate gradients solver - as synthetic benchmarks and representatives of
scientific codes and ported them to ArBB. This whitepaper describes the ArBB
ports and presents performance and scaling measurements on the Westmere-EX
based system SuperMIG at LRZ in comparison with OpenMP and MKL.
|
[
{
"version": "v1",
"created": "Wed, 7 Nov 2012 16:00:28 GMT"
}
] | 2012-11-08T00:00:00
|
[
[
"Weinberg",
"Volker",
""
]
] |
TITLE: Data-parallel programming with Intel Array Building Blocks (ArBB)
ABSTRACT: Intel Array Building Blocks is a high-level data-parallel programming
environment designed to produce scalable and portable results on existing and
upcoming multi- and many-core platforms.
We have chosen several mathematical kernels - a dense matrix-matrix
multiplication, a sparse matrix-vector multiplication, a 1-D complex FFT and a
conjugate gradients solver - as synthetic benchmarks and representatives of
scientific codes and ported them to ArBB. This whitepaper describes the ArBB
ports and presents performance and scaling measurements on the Westmere-EX
based system SuperMIG at LRZ in comparison with OpenMP and MKL.
|
no_new_dataset
| 0.70779
|
2304.04256
|
Libo Qin
|
Wenbo Pan, Qiguang Chen, Xiao Xu, Wanxiang Che, Libo Qin
|
A Preliminary Evaluation of ChatGPT for Zero-shot Dialogue Understanding
|
Technical Report
| null | null | null |
cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Zero-shot dialogue understanding aims to enable dialogue to track the user's
needs without any training data, which has gained increasing attention. In this
work, we investigate the understanding ability of ChatGPT for zero-shot
dialogue understanding tasks including spoken language understanding (SLU) and
dialogue state tracking (DST). Experimental results on four popular benchmarks
reveal the great potential of ChatGPT for zero-shot dialogue understanding. In
addition, extensive analysis shows that ChatGPT benefits from the multi-turn
interactive prompt in the DST task but struggles to perform slot filling for
SLU. Finally, we summarize several unexpected behaviors of ChatGPT in dialogue
understanding tasks, hoping to provide some insights for future research on
building zero-shot dialogue understanding systems with Large Language Models
(LLMs).
|
[
{
"version": "v1",
"created": "Sun, 9 Apr 2023 15:28:36 GMT"
}
] | 2023-04-11T00:00:00
|
[
[
"Pan",
"Wenbo",
""
],
[
"Chen",
"Qiguang",
""
],
[
"Xu",
"Xiao",
""
],
[
"Che",
"Wanxiang",
""
],
[
"Qin",
"Libo",
""
]
] |
TITLE: A Preliminary Evaluation of ChatGPT for Zero-shot Dialogue Understanding
ABSTRACT: Zero-shot dialogue understanding aims to enable dialogue to track the user's
needs without any training data, which has gained increasing attention. In this
work, we investigate the understanding ability of ChatGPT for zero-shot
dialogue understanding tasks including spoken language understanding (SLU) and
dialogue state tracking (DST). Experimental results on four popular benchmarks
reveal the great potential of ChatGPT for zero-shot dialogue understanding. In
addition, extensive analysis shows that ChatGPT benefits from the multi-turn
interactive prompt in the DST task but struggles to perform slot filling for
SLU. Finally, we summarize several unexpected behaviors of ChatGPT in dialogue
understanding tasks, hoping to provide some insights for future research on
building zero-shot dialogue understanding systems with Large Language Models
(LLMs).
|
no_new_dataset
| 0.710823
|
2304.04259
|
Amir Nazemi
|
Amir Nazemi, Zeyad Moustafa, Paul Fieguth
|
CLVOS23: A Long Video Object Segmentation Dataset for Continual Learning
| null | null | null | null |
cs.CV cs.LG
|
http://creativecommons.org/licenses/by-nc-sa/4.0/
|
Continual learning in real-world scenarios is a major challenge. A general
continual learning model should have a constant memory size and no predefined
task boundaries, as is the case in semi-supervised Video Object Segmentation
(VOS), where continual learning challenges particularly present themselves in
working on long video sequences. In this article, we first formulate the
problem of semi-supervised VOS, specifically online VOS, as a continual
learning problem, and then secondly provide a public VOS dataset, CLVOS23,
focusing on continual learning. Finally, we propose and implement a
regularization-based continual learning approach on LWL, an existing online VOS
baseline, to demonstrate the efficacy of continual learning when applied to
online VOS and to establish a CLVOS23 baseline. We apply the proposed baseline
to the Long Videos dataset as well as to two short video VOS datasets, DAVIS16
and DAVIS17. To the best of our knowledge, this is the first time that VOS has
been defined and addressed as a continual learning problem.
|
[
{
"version": "v1",
"created": "Sun, 9 Apr 2023 15:33:07 GMT"
}
] | 2023-04-11T00:00:00
|
[
[
"Nazemi",
"Amir",
""
],
[
"Moustafa",
"Zeyad",
""
],
[
"Fieguth",
"Paul",
""
]
] |
TITLE: CLVOS23: A Long Video Object Segmentation Dataset for Continual Learning
ABSTRACT: Continual learning in real-world scenarios is a major challenge. A general
continual learning model should have a constant memory size and no predefined
task boundaries, as is the case in semi-supervised Video Object Segmentation
(VOS), where continual learning challenges particularly present themselves in
working on long video sequences. In this article, we first formulate the
problem of semi-supervised VOS, specifically online VOS, as a continual
learning problem, and then secondly provide a public VOS dataset, CLVOS23,
focusing on continual learning. Finally, we propose and implement a
regularization-based continual learning approach on LWL, an existing online VOS
baseline, to demonstrate the efficacy of continual learning when applied to
online VOS and to establish a CLVOS23 baseline. We apply the proposed baseline
to the Long Videos dataset as well as to two short video VOS datasets, DAVIS16
and DAVIS17. To the best of our knowledge, this is the first time that VOS has
been defined and addressed as a continual learning problem.
|
no_new_dataset
| 0.642461
|
2304.04269
|
Xuan Ju
|
Xuan Ju, Ailing Zeng, Chenchen Zhao, Jianan Wang, Lei Zhang, Qiang Xu
|
HumanSD: A Native Skeleton-Guided Diffusion Model for Human Image
Generation
| null | null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Controllable human image generation (HIG) has numerous real-life
applications. State-of-the-art solutions, such as ControlNet and T2I-Adapter,
introduce an additional learnable branch on top of the frozen pre-trained
stable diffusion (SD) model, which can enforce various conditions, including
skeleton guidance of HIG. While such a plug-and-play approach is appealing, the
inevitable and uncertain conflicts between the original images produced from
the frozen SD branch and the given condition incur significant challenges for
the learnable branch, which essentially conducts image feature editing for
condition enforcement. In this work, we propose a native skeleton-guided
diffusion model for controllable HIG called HumanSD. Instead of performing
image editing with dual-branch diffusion, we fine-tune the original SD model
using a novel heatmap-guided denoising loss. This strategy effectively and
efficiently strengthens the given skeleton condition during model training
while mitigating the catastrophic forgetting effects. HumanSD is fine-tuned on
the assembly of three large-scale human-centric datasets with text-image-pose
information, two of which are established in this work. As shown in Figure 1,
HumanSD outperforms ControlNet in terms of accurate pose control and image
quality, particularly when the given skeleton guidance is sophisticated.
|
[
{
"version": "v1",
"created": "Sun, 9 Apr 2023 16:21:43 GMT"
}
] | 2023-04-11T00:00:00
|
[
[
"Ju",
"Xuan",
""
],
[
"Zeng",
"Ailing",
""
],
[
"Zhao",
"Chenchen",
""
],
[
"Wang",
"Jianan",
""
],
[
"Zhang",
"Lei",
""
],
[
"Xu",
"Qiang",
""
]
] |
TITLE: HumanSD: A Native Skeleton-Guided Diffusion Model for Human Image
Generation
ABSTRACT: Controllable human image generation (HIG) has numerous real-life
applications. State-of-the-art solutions, such as ControlNet and T2I-Adapter,
introduce an additional learnable branch on top of the frozen pre-trained
stable diffusion (SD) model, which can enforce various conditions, including
skeleton guidance of HIG. While such a plug-and-play approach is appealing, the
inevitable and uncertain conflicts between the original images produced from
the frozen SD branch and the given condition incur significant challenges for
the learnable branch, which essentially conducts image feature editing for
condition enforcement. In this work, we propose a native skeleton-guided
diffusion model for controllable HIG called HumanSD. Instead of performing
image editing with dual-branch diffusion, we fine-tune the original SD model
using a novel heatmap-guided denoising loss. This strategy effectively and
efficiently strengthens the given skeleton condition during model training
while mitigating the catastrophic forgetting effects. HumanSD is fine-tuned on
the assembly of three large-scale human-centric datasets with text-image-pose
information, two of which are established in this work. As shown in Figure 1,
HumanSD outperforms ControlNet in terms of accurate pose control and image
quality, particularly when the given skeleton guidance is sophisticated.
|
no_new_dataset
| 0.710653
|
2304.04271
|
Karan Aggarwal
|
Karan Aggarwal, Jaideep Srivastava
|
Embarrassingly Simple MixUp for Time-series
| null | null | null | null |
cs.LG cs.AI
|
http://creativecommons.org/licenses/by/4.0/
|
Labeling time series data is an expensive task because of domain expertise
and dynamic nature of the data. Hence, we often have to deal with limited
labeled data settings. Data augmentation techniques have been successfully
deployed in domains like computer vision to exploit the use of existing labeled
data. We adapt one of the most commonly used technique called MixUp, in the
time series domain. Our proposed, MixUp++ and LatentMixUp++, use simple
modifications to perform interpolation in raw time series and classification
model's latent space, respectively. We also extend these methods with
semi-supervised learning to exploit unlabeled data. We observe significant
improvements of 1\% - 15\% on time series classification on two public
datasets, for both low labeled data as well as high labeled data regimes, with
LatentMixUp++.
|
[
{
"version": "v1",
"created": "Sun, 9 Apr 2023 16:34:06 GMT"
}
] | 2023-04-11T00:00:00
|
[
[
"Aggarwal",
"Karan",
""
],
[
"Srivastava",
"Jaideep",
""
]
] |
TITLE: Embarrassingly Simple MixUp for Time-series
ABSTRACT: Labeling time series data is an expensive task because of domain expertise
and dynamic nature of the data. Hence, we often have to deal with limited
labeled data settings. Data augmentation techniques have been successfully
deployed in domains like computer vision to exploit the use of existing labeled
data. We adapt one of the most commonly used technique called MixUp, in the
time series domain. Our proposed, MixUp++ and LatentMixUp++, use simple
modifications to perform interpolation in raw time series and classification
model's latent space, respectively. We also extend these methods with
semi-supervised learning to exploit unlabeled data. We observe significant
improvements of 1\% - 15\% on time series classification on two public
datasets, for both low labeled data as well as high labeled data regimes, with
LatentMixUp++.
|
no_new_dataset
| 0.712614
|
2304.04280
|
Yanis Labrak
|
Yanis Labrak, Adrien Bazoge, Richard Dufour, Mickael Rouvier, Emmanuel
Morin, B\'eatrice Daille, Pierre-Antoine Gourraud
|
FrenchMedMCQA: A French Multiple-Choice Question Answering Dataset for
Medical domain
| null |
Proceedings of the 13th International Workshop on Health Text
Mining and Information Analysis (LOUHI 2022)
| null | null |
cs.CL cs.AI
|
http://creativecommons.org/publicdomain/zero/1.0/
|
This paper introduces FrenchMedMCQA, the first publicly available
Multiple-Choice Question Answering (MCQA) dataset in French for medical domain.
It is composed of 3,105 questions taken from real exams of the French medical
specialization diploma in pharmacy, mixing single and multiple answers. Each
instance of the dataset contains an identifier, a question, five possible
answers and their manual correction(s). We also propose first baseline models
to automatically process this MCQA task in order to report on the current
performances and to highlight the difficulty of the task. A detailed analysis
of the results showed that it is necessary to have representations adapted to
the medical domain or to the MCQA task: in our case, English specialized models
yielded better results than generic French ones, even though FrenchMedMCQA is
in French. Corpus, models and tools are available online.
|
[
{
"version": "v1",
"created": "Sun, 9 Apr 2023 16:57:40 GMT"
}
] | 2023-04-11T00:00:00
|
[
[
"Labrak",
"Yanis",
""
],
[
"Bazoge",
"Adrien",
""
],
[
"Dufour",
"Richard",
""
],
[
"Rouvier",
"Mickael",
""
],
[
"Morin",
"Emmanuel",
""
],
[
"Daille",
"Béatrice",
""
],
[
"Gourraud",
"Pierre-Antoine",
""
]
] |
TITLE: FrenchMedMCQA: A French Multiple-Choice Question Answering Dataset for
Medical domain
ABSTRACT: This paper introduces FrenchMedMCQA, the first publicly available
Multiple-Choice Question Answering (MCQA) dataset in French for medical domain.
It is composed of 3,105 questions taken from real exams of the French medical
specialization diploma in pharmacy, mixing single and multiple answers. Each
instance of the dataset contains an identifier, a question, five possible
answers and their manual correction(s). We also propose first baseline models
to automatically process this MCQA task in order to report on the current
performances and to highlight the difficulty of the task. A detailed analysis
of the results showed that it is necessary to have representations adapted to
the medical domain or to the MCQA task: in our case, English specialized models
yielded better results than generic French ones, even though FrenchMedMCQA is
in French. Corpus, models and tools are available online.
|
new_dataset
| 0.715989
|
2304.04290
|
Sodiq Adewole
|
David Fuentes, Diana McSpadden and Sodiq Adewole
|
Distributed Conditional GAN (discGAN) For Synthetic Healthcare Data
Generation
| null | null | null | null |
cs.LG cs.AI
|
http://creativecommons.org/publicdomain/zero/1.0/
|
In this paper, we propose a distributed Generative Adversarial Networks
(discGANs) to generate synthetic tabular data specific to the healthcare
domain. While using GANs to generate images has been well studied, little to no
attention has been given to generation of tabular data. Modeling distributions
of discrete and continuous tabular data is a non-trivial task with high
utility. We applied discGAN to model non-Gaussian multi-modal healthcare data.
We generated 249,000 synthetic records from original 2,027 eICU dataset. We
evaluated the performance of the model using machine learning efficacy, the
Kolmogorov-Smirnov (KS) test for continuous variables and chi-squared test for
discrete variables. Our results show that discGAN was able to generate data
with distributions similar to the real data.
|
[
{
"version": "v1",
"created": "Sun, 9 Apr 2023 18:35:05 GMT"
}
] | 2023-04-11T00:00:00
|
[
[
"Fuentes",
"David",
""
],
[
"McSpadden",
"Diana",
""
],
[
"Adewole",
"Sodiq",
""
]
] |
TITLE: Distributed Conditional GAN (discGAN) For Synthetic Healthcare Data
Generation
ABSTRACT: In this paper, we propose a distributed Generative Adversarial Networks
(discGANs) to generate synthetic tabular data specific to the healthcare
domain. While using GANs to generate images has been well studied, little to no
attention has been given to generation of tabular data. Modeling distributions
of discrete and continuous tabular data is a non-trivial task with high
utility. We applied discGAN to model non-Gaussian multi-modal healthcare data.
We generated 249,000 synthetic records from original 2,027 eICU dataset. We
evaluated the performance of the model using machine learning efficacy, the
Kolmogorov-Smirnov (KS) test for continuous variables and chi-squared test for
discrete variables. Our results show that discGAN was able to generate data
with distributions similar to the real data.
|
no_new_dataset
| 0.711425
|
2304.04291
|
Ivan Ferreira
|
Ivan Ferreira-Chacua, Ardiansyah Koeshidayatullah
|
ForamViT-GAN: Exploring New Paradigms in Deep Learning for
Micropaleontological Image Analysis
| null | null | null | null |
cs.CV eess.IV
|
http://creativecommons.org/licenses/by/4.0/
|
Micropaleontology in geosciences focuses on studying the evolution of
microfossils (e.g., foraminifera) through geological records to reconstruct
past environmental and climatic conditions. This field heavily relies on visual
recognition of microfossil features, making it suitable for computer vision
technology, specifically deep convolutional neural networks (CNNs), to automate
and optimize microfossil identification and classification. However, the
application of deep learning in micropaleontology is hindered by limited
availability of high-quality, high-resolution labeled fossil images and the
significant manual labeling effort required by experts. To address these
challenges, we propose a novel deep learning workflow combining hierarchical
vision transformers with style-based generative adversarial network algorithms
to efficiently acquire and synthetically generate realistic high-resolution
labeled datasets of micropaleontology in large volumes. Our study shows that
this workflow can generate high-resolution images with a high signal-to-noise
ratio (39.1 dB) and realistic synthetic images with a Frechet inception
distance similarity score of 14.88. Additionally, our workflow provides a large
volume of self-labeled datasets for model benchmarking and various downstream
visual tasks, including fossil classification and segmentation. For the first
time, we performed few-shot semantic segmentation of different foraminifera
chambers on both generated and synthetic images with high accuracy. This novel
meta-learning approach is only possible with the availability of
high-resolution, high-volume labeled datasets. Our deep learning-based workflow
shows promise in advancing and optimizing micropaleontological research and
other visual-dependent geological analyses.
|
[
{
"version": "v1",
"created": "Sun, 9 Apr 2023 18:49:38 GMT"
}
] | 2023-04-11T00:00:00
|
[
[
"Ferreira-Chacua",
"Ivan",
""
],
[
"Koeshidayatullah",
"Ardiansyah",
""
]
] |
TITLE: ForamViT-GAN: Exploring New Paradigms in Deep Learning for
Micropaleontological Image Analysis
ABSTRACT: Micropaleontology in geosciences focuses on studying the evolution of
microfossils (e.g., foraminifera) through geological records to reconstruct
past environmental and climatic conditions. This field heavily relies on visual
recognition of microfossil features, making it suitable for computer vision
technology, specifically deep convolutional neural networks (CNNs), to automate
and optimize microfossil identification and classification. However, the
application of deep learning in micropaleontology is hindered by limited
availability of high-quality, high-resolution labeled fossil images and the
significant manual labeling effort required by experts. To address these
challenges, we propose a novel deep learning workflow combining hierarchical
vision transformers with style-based generative adversarial network algorithms
to efficiently acquire and synthetically generate realistic high-resolution
labeled datasets of micropaleontology in large volumes. Our study shows that
this workflow can generate high-resolution images with a high signal-to-noise
ratio (39.1 dB) and realistic synthetic images with a Frechet inception
distance similarity score of 14.88. Additionally, our workflow provides a large
volume of self-labeled datasets for model benchmarking and various downstream
visual tasks, including fossil classification and segmentation. For the first
time, we performed few-shot semantic segmentation of different foraminifera
chambers on both generated and synthetic images with high accuracy. This novel
meta-learning approach is only possible with the availability of
high-resolution, high-volume labeled datasets. Our deep learning-based workflow
shows promise in advancing and optimizing micropaleontological research and
other visual-dependent geological analyses.
|
no_new_dataset
| 0.711588
|
2304.04297
|
Tekin Bicer
|
Anakha V Babu, Tekin Bicer, Saugat Kandel, Tao Zhou, Daniel J. Ching,
Steven Henke, Sini\v{s}a Veseli, Ryan Chard, Antonino Miceli, Mathew Joseph
Cherukara
|
AI-assisted Automated Workflow for Real-time X-ray Ptychography Data
Analysis via Federated Resources
|
7 pages, 1 figure, to be published in High Performance Computing for
Imaging Conference, Electronic Imaging (HPCI 2023)
| null | null | null |
cs.CV cs.DC eess.IV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present an end-to-end automated workflow that uses large-scale remote
compute resources and an embedded GPU platform at the edge to enable
AI/ML-accelerated real-time analysis of data collected for x-ray ptychography.
Ptychography is a lensless method that is being used to image samples through a
simultaneous numerical inversion of a large number of diffraction patterns from
adjacent overlapping scan positions. This acquisition method can enable
nanoscale imaging with x-rays and electrons, but this often requires very large
experimental datasets and commensurately high turnaround times, which can limit
experimental capabilities such as real-time experimental steering and
low-latency monitoring. In this work, we introduce a software system that can
automate ptychography data analysis tasks. We accelerate the data analysis
pipeline by using a modified version of PtychoNN -- an ML-based approach to
solve phase retrieval problem that shows two orders of magnitude speedup
compared to traditional iterative methods. Further, our system coordinates and
overlaps different data analysis tasks to minimize synchronization overhead
between different stages of the workflow. We evaluate our workflow system with
real-world experimental workloads from the 26ID beamline at Advanced Photon
Source and ThetaGPU cluster at Argonne Leadership Computing Resources.
|
[
{
"version": "v1",
"created": "Sun, 9 Apr 2023 19:11:04 GMT"
}
] | 2023-04-11T00:00:00
|
[
[
"Babu",
"Anakha V",
""
],
[
"Bicer",
"Tekin",
""
],
[
"Kandel",
"Saugat",
""
],
[
"Zhou",
"Tao",
""
],
[
"Ching",
"Daniel J.",
""
],
[
"Henke",
"Steven",
""
],
[
"Veseli",
"Siniša",
""
],
[
"Chard",
"Ryan",
""
],
[
"Miceli",
"Antonino",
""
],
[
"Cherukara",
"Mathew Joseph",
""
]
] |
TITLE: AI-assisted Automated Workflow for Real-time X-ray Ptychography Data
Analysis via Federated Resources
ABSTRACT: We present an end-to-end automated workflow that uses large-scale remote
compute resources and an embedded GPU platform at the edge to enable
AI/ML-accelerated real-time analysis of data collected for x-ray ptychography.
Ptychography is a lensless method that is being used to image samples through a
simultaneous numerical inversion of a large number of diffraction patterns from
adjacent overlapping scan positions. This acquisition method can enable
nanoscale imaging with x-rays and electrons, but this often requires very large
experimental datasets and commensurately high turnaround times, which can limit
experimental capabilities such as real-time experimental steering and
low-latency monitoring. In this work, we introduce a software system that can
automate ptychography data analysis tasks. We accelerate the data analysis
pipeline by using a modified version of PtychoNN -- an ML-based approach to
solve phase retrieval problem that shows two orders of magnitude speedup
compared to traditional iterative methods. Further, our system coordinates and
overlaps different data analysis tasks to minimize synchronization overhead
between different stages of the workflow. We evaluate our workflow system with
real-world experimental workloads from the 26ID beamline at Advanced Photon
Source and ThetaGPU cluster at Argonne Leadership Computing Resources.
|
no_new_dataset
| 0.710672
|
2304.04325
|
Shiyang Lu
|
Shiyang Lu, Yunfu Deng, Abdeslam Boularias, Kostas Bekris
|
Self-Supervised Learning of Object Segmentation from Unlabeled RGB-D
Videos
| null | null | null | null |
cs.CV cs.RO
|
http://creativecommons.org/licenses/by/4.0/
|
This work proposes a self-supervised learning system for segmenting rigid
objects in RGB images. The proposed pipeline is trained on unlabeled RGB-D
videos of static objects, which can be captured with a camera carried by a
mobile robot. A key feature of the self-supervised training process is a
graph-matching algorithm that operates on the over-segmentation output of the
point cloud that is reconstructed from each video. The graph matching, along
with point cloud registration, is able to find reoccurring object patterns
across videos and combine them into 3D object pseudo labels, even under
occlusions or different viewing angles. Projected 2D object masks from 3D
pseudo labels are used to train a pixel-wise feature extractor through
contrastive learning. During online inference, a clustering method uses the
learned features to cluster foreground pixels into object segments. Experiments
highlight the method's effectiveness on both real and synthetic video datasets,
which include cluttered scenes of tabletop objects. The proposed method
outperforms existing unsupervised methods for object segmentation by a large
margin.
|
[
{
"version": "v1",
"created": "Sun, 9 Apr 2023 23:13:39 GMT"
}
] | 2023-04-11T00:00:00
|
[
[
"Lu",
"Shiyang",
""
],
[
"Deng",
"Yunfu",
""
],
[
"Boularias",
"Abdeslam",
""
],
[
"Bekris",
"Kostas",
""
]
] |
TITLE: Self-Supervised Learning of Object Segmentation from Unlabeled RGB-D
Videos
ABSTRACT: This work proposes a self-supervised learning system for segmenting rigid
objects in RGB images. The proposed pipeline is trained on unlabeled RGB-D
videos of static objects, which can be captured with a camera carried by a
mobile robot. A key feature of the self-supervised training process is a
graph-matching algorithm that operates on the over-segmentation output of the
point cloud that is reconstructed from each video. The graph matching, along
with point cloud registration, is able to find reoccurring object patterns
across videos and combine them into 3D object pseudo labels, even under
occlusions or different viewing angles. Projected 2D object masks from 3D
pseudo labels are used to train a pixel-wise feature extractor through
contrastive learning. During online inference, a clustering method uses the
learned features to cluster foreground pixels into object segments. Experiments
highlight the method's effectiveness on both real and synthetic video datasets,
which include cluttered scenes of tabletop objects. The proposed method
outperforms existing unsupervised methods for object segmentation by a large
margin.
|
no_new_dataset
| 0.709208
|
2304.04330
|
Da Xu
|
Da Xu, Bo Yang
|
Pretrained Embeddings for E-commerce Machine Learning: When it Fails and
Why?
| null | null |
10.1145/3543873.3587669
| null |
cs.LG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The use of pretrained embeddings has become widespread in modern e-commerce
machine learning (ML) systems. In practice, however, we have encountered
several key issues when using pretrained embedding in a real-world production
system, many of which cannot be fully explained by current knowledge.
Unfortunately, we find that there is a lack of a thorough understanding of how
pre-trained embeddings work, especially their intrinsic properties and
interactions with downstream tasks. Consequently, it becomes challenging to
make interactive and scalable decisions regarding the use of pre-trained
embeddings in practice.
Our investigation leads to two significant discoveries about using pretrained
embeddings in e-commerce applications. Firstly, we find that the design of the
pretraining and downstream models, particularly how they encode and decode
information via embedding vectors, can have a profound impact. Secondly, we
establish a principled perspective of pre-trained embeddings via the lens of
kernel analysis, which can be used to evaluate their predictability,
interactively and scalably. These findings help to address the practical
challenges we faced and offer valuable guidance for successful adoption of
pretrained embeddings in real-world production. Our conclusions are backed by
solid theoretical reasoning, benchmark experiments, as well as online testings.
|
[
{
"version": "v1",
"created": "Sun, 9 Apr 2023 23:55:47 GMT"
}
] | 2023-04-11T00:00:00
|
[
[
"Xu",
"Da",
""
],
[
"Yang",
"Bo",
""
]
] |
TITLE: Pretrained Embeddings for E-commerce Machine Learning: When it Fails and
Why?
ABSTRACT: The use of pretrained embeddings has become widespread in modern e-commerce
machine learning (ML) systems. In practice, however, we have encountered
several key issues when using pretrained embedding in a real-world production
system, many of which cannot be fully explained by current knowledge.
Unfortunately, we find that there is a lack of a thorough understanding of how
pre-trained embeddings work, especially their intrinsic properties and
interactions with downstream tasks. Consequently, it becomes challenging to
make interactive and scalable decisions regarding the use of pre-trained
embeddings in practice.
Our investigation leads to two significant discoveries about using pretrained
embeddings in e-commerce applications. Firstly, we find that the design of the
pretraining and downstream models, particularly how they encode and decode
information via embedding vectors, can have a profound impact. Secondly, we
establish a principled perspective of pre-trained embeddings via the lens of
kernel analysis, which can be used to evaluate their predictability,
interactively and scalably. These findings help to address the practical
challenges we faced and offer valuable guidance for successful adoption of
pretrained embeddings in real-world production. Our conclusions are backed by
solid theoretical reasoning, benchmark experiments, as well as online testings.
|
no_new_dataset
| 0.706431
|
2304.04333
|
Mohammad Khalid Jawed
|
Shivam K Panda, Yongkyu Lee, M. Khalid Jawed
|
Agronav: Autonomous Navigation Framework for Agricultural Robots and
Vehicles using Semantic Segmentation and Semantic Line Detection
| null | null | null | null |
cs.CV
|
http://creativecommons.org/licenses/by/4.0/
|
The successful implementation of vision-based navigation in agricultural
fields hinges upon two critical components: 1) the accurate identification of
key components within the scene, and 2) the identification of lanes through the
detection of boundary lines that separate the crops from the traversable
ground. We propose Agronav, an end-to-end vision-based autonomous navigation
framework, which outputs the centerline from the input image by sequentially
processing it through semantic segmentation and semantic line detection models.
We also present Agroscapes, a pixel-level annotated dataset collected across
six different crops, captured from varying heights and angles. This ensures
that the framework trained on Agroscapes is generalizable across both ground
and aerial robotic platforms. Codes, models and dataset will be released at
\href{https://github.com/shivamkumarpanda/agronav}{github.com/shivamkumarpanda/agronav}.
|
[
{
"version": "v1",
"created": "Mon, 10 Apr 2023 00:06:14 GMT"
}
] | 2023-04-11T00:00:00
|
[
[
"Panda",
"Shivam K",
""
],
[
"Lee",
"Yongkyu",
""
],
[
"Jawed",
"M. Khalid",
""
]
] |
TITLE: Agronav: Autonomous Navigation Framework for Agricultural Robots and
Vehicles using Semantic Segmentation and Semantic Line Detection
ABSTRACT: The successful implementation of vision-based navigation in agricultural
fields hinges upon two critical components: 1) the accurate identification of
key components within the scene, and 2) the identification of lanes through the
detection of boundary lines that separate the crops from the traversable
ground. We propose Agronav, an end-to-end vision-based autonomous navigation
framework, which outputs the centerline from the input image by sequentially
processing it through semantic segmentation and semantic line detection models.
We also present Agroscapes, a pixel-level annotated dataset collected across
six different crops, captured from varying heights and angles. This ensures
that the framework trained on Agroscapes is generalizable across both ground
and aerial robotic platforms. Codes, models and dataset will be released at
\href{https://github.com/shivamkumarpanda/agronav}{github.com/shivamkumarpanda/agronav}.
|
new_dataset
| 0.714005
|
2304.04344
|
Nikita Starodubcev
|
Nikita Starodubcev, Dmitry Baranchuk, Valentin Khrulkov and Artem
Babenko
|
Towards Real-time Text-driven Image Manipulation with Unconditional
Diffusion Models
| null | null | null | null |
cs.CV cs.LG
|
http://creativecommons.org/licenses/by/4.0/
|
Recent advances in diffusion models enable many powerful instruments for
image editing. One of these instruments is text-driven image manipulations:
editing semantic attributes of an image according to the provided text
description. % Popular text-conditional diffusion models offer various
high-quality image manipulation methods for a broad range of text prompts.
Existing diffusion-based methods already achieve high-quality image
manipulations for a broad range of text prompts. However, in practice, these
methods require high computation costs even with a high-end GPU. This greatly
limits potential real-world applications of diffusion-based image editing,
especially when running on user devices.
In this paper, we address efficiency of the recent text-driven editing
methods based on unconditional diffusion models and develop a novel algorithm
that learns image manipulations 4.5-10 times faster and applies them 8 times
faster. We carefully evaluate the visual quality and expressiveness of our
approach on multiple datasets using human annotators. Our experiments
demonstrate that our algorithm achieves the quality of much more expensive
methods. Finally, we show that our approach can adapt the pretrained model to
the user-specified image and text description on the fly just for 4 seconds. In
this setting, we notice that more compact unconditional diffusion models can be
considered as a rational alternative to the popular text-conditional
counterparts.
|
[
{
"version": "v1",
"created": "Mon, 10 Apr 2023 01:21:56 GMT"
}
] | 2023-04-11T00:00:00
|
[
[
"Starodubcev",
"Nikita",
""
],
[
"Baranchuk",
"Dmitry",
""
],
[
"Khrulkov",
"Valentin",
""
],
[
"Babenko",
"Artem",
""
]
] |
TITLE: Towards Real-time Text-driven Image Manipulation with Unconditional
Diffusion Models
ABSTRACT: Recent advances in diffusion models enable many powerful instruments for
image editing. One of these instruments is text-driven image manipulations:
editing semantic attributes of an image according to the provided text
description. % Popular text-conditional diffusion models offer various
high-quality image manipulation methods for a broad range of text prompts.
Existing diffusion-based methods already achieve high-quality image
manipulations for a broad range of text prompts. However, in practice, these
methods require high computation costs even with a high-end GPU. This greatly
limits potential real-world applications of diffusion-based image editing,
especially when running on user devices.
In this paper, we address efficiency of the recent text-driven editing
methods based on unconditional diffusion models and develop a novel algorithm
that learns image manipulations 4.5-10 times faster and applies them 8 times
faster. We carefully evaluate the visual quality and expressiveness of our
approach on multiple datasets using human annotators. Our experiments
demonstrate that our algorithm achieves the quality of much more expensive
methods. Finally, we show that our approach can adapt the pretrained model to
the user-specified image and text description on the fly just for 4 seconds. In
this setting, we notice that more compact unconditional diffusion models can be
considered as a rational alternative to the popular text-conditional
counterparts.
|
no_new_dataset
| 0.711005
|
2304.04346
|
Dengwang Tang
|
Dengwang Tang, Ashutosh Nayyar, Rahul Jain
|
A Novel Point-based Algorithm for Multi-agent Control Using the Common
Information Approach
|
11 pages, 4 figures
| null | null | null |
cs.AI cs.MA cs.SY eess.SY math.OC
|
http://creativecommons.org/licenses/by-sa/4.0/
|
The Common Information (CI) approach provides a systematic way to transform a
multi-agent stochastic control problem to a single-agent partially observed
Markov decision problem (POMDP) called the coordinator's POMDP. However, such a
POMDP can be hard to solve due to its extraordinarily large action space. We
propose a new algorithm for multi-agent stochastic control problems, called
coordinator's heuristic search value iteration (CHSVI), that combines the CI
approach and point-based POMDP algorithms for large action spaces. We
demonstrate the algorithm through optimally solving several benchmark problems.
|
[
{
"version": "v1",
"created": "Mon, 10 Apr 2023 01:27:43 GMT"
}
] | 2023-04-11T00:00:00
|
[
[
"Tang",
"Dengwang",
""
],
[
"Nayyar",
"Ashutosh",
""
],
[
"Jain",
"Rahul",
""
]
] |
TITLE: A Novel Point-based Algorithm for Multi-agent Control Using the Common
Information Approach
ABSTRACT: The Common Information (CI) approach provides a systematic way to transform a
multi-agent stochastic control problem to a single-agent partially observed
Markov decision problem (POMDP) called the coordinator's POMDP. However, such a
POMDP can be hard to solve due to its extraordinarily large action space. We
propose a new algorithm for multi-agent stochastic control problems, called
coordinator's heuristic search value iteration (CHSVI), that combines the CI
approach and point-based POMDP algorithms for large action spaces. We
demonstrate the algorithm through optimally solving several benchmark problems.
|
no_new_dataset
| 0.709447
|
2304.04358
|
Hongjin Qian
|
Hongjing Qian, Yutao Zhu, Zhicheng Dou, Haoqi Gu, Xinyu Zhang, Zheng
Liu, Ruofei Lai, Zhao Cao, Jian-Yun Nie and Ji-Rong Wen
|
WebBrain: Learning to Generate Factually Correct Articles for Queries by
Grounding on Large Web Corpus
|
Codes in https://github.com/qhjqhj00/WebBrain
| null | null | null |
cs.CL cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we introduce a new NLP task -- generating short factual
articles with references for queries by mining supporting evidence from the
Web. In this task, called WebBrain, the ultimate goal is to generate a fluent,
informative, and factually-correct short article (e.g., a Wikipedia article)
for a factual query unseen in Wikipedia. To enable experiments on WebBrain, we
construct a large-scale dataset WebBrain-Raw by extracting English Wikipedia
articles and their crawlable Wikipedia references. WebBrain-Raw is ten times
larger than the previous biggest peer dataset, which can greatly benefit the
research community. From WebBrain-Raw, we construct two task-specific datasets:
WebBrain-R and WebBrain-G, which are used to train in-domain retriever and
generator, respectively. Besides, we empirically analyze the performances of
the current state-of-the-art NLP techniques on WebBrain and introduce a new
framework ReGen, which enhances the generation factualness by improved evidence
retrieval and task-specific pre-training for generation. Experiment results
show that ReGen outperforms all baselines in both automatic and human
evaluations.
|
[
{
"version": "v1",
"created": "Mon, 10 Apr 2023 02:55:48 GMT"
}
] | 2023-04-11T00:00:00
|
[
[
"Qian",
"Hongjing",
""
],
[
"Zhu",
"Yutao",
""
],
[
"Dou",
"Zhicheng",
""
],
[
"Gu",
"Haoqi",
""
],
[
"Zhang",
"Xinyu",
""
],
[
"Liu",
"Zheng",
""
],
[
"Lai",
"Ruofei",
""
],
[
"Cao",
"Zhao",
""
],
[
"Nie",
"Jian-Yun",
""
],
[
"Wen",
"Ji-Rong",
""
]
] |
TITLE: WebBrain: Learning to Generate Factually Correct Articles for Queries by
Grounding on Large Web Corpus
ABSTRACT: In this paper, we introduce a new NLP task -- generating short factual
articles with references for queries by mining supporting evidence from the
Web. In this task, called WebBrain, the ultimate goal is to generate a fluent,
informative, and factually-correct short article (e.g., a Wikipedia article)
for a factual query unseen in Wikipedia. To enable experiments on WebBrain, we
construct a large-scale dataset WebBrain-Raw by extracting English Wikipedia
articles and their crawlable Wikipedia references. WebBrain-Raw is ten times
larger than the previous biggest peer dataset, which can greatly benefit the
research community. From WebBrain-Raw, we construct two task-specific datasets:
WebBrain-R and WebBrain-G, which are used to train in-domain retriever and
generator, respectively. Besides, we empirically analyze the performances of
the current state-of-the-art NLP techniques on WebBrain and introduce a new
framework ReGen, which enhances the generation factualness by improved evidence
retrieval and task-specific pre-training for generation. Experiment results
show that ReGen outperforms all baselines in both automatic and human
evaluations.
|
new_dataset
| 0.715666
|
2304.04362
|
Yulun Tian
|
Yulun Tian, Yun Chang, Long Quang, Arthur Schang, Carlos Nieto-Granda,
Jonathan P. How, Luca Carlone
|
Resilient and Distributed Multi-Robot Visual SLAM: Datasets,
Experiments, and Lessons Learned
|
8 pages, 9 figures
| null | null | null |
cs.RO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper revisits Kimera-Multi, a distributed multi-robot Simultaneous
Localization and Mapping (SLAM) system, towards the goal of deployment in the
real world. In particular, this paper has three main contributions. First, we
describe improvements to Kimera-Multi to make it resilient to large-scale
real-world deployments, with particular emphasis on handling intermittent and
unreliable communication. Second, we collect and release challenging
multi-robot benchmarking datasets obtained during live experiments conducted on
the MIT campus, with accurate reference trajectories and maps for evaluation.
The datasets include up to 8 robots traversing long distances (up to 8 km) and
feature many challenging elements such as severe visual ambiguities (e.g., in
underground tunnels and hallways), mixed indoor and outdoor trajectories with
different lighting conditions, and dynamic entities (e.g., pedestrians and
cars). Lastly, we evaluate the resilience of Kimera-Multi under different
communication scenarios, and provide a quantitative comparison with a
centralized baseline system. Based on the results from both live experiments
and subsequent analysis, we discuss the strengths and weaknesses of
Kimera-Multi, and suggest future directions for both algorithm and system
design. We release the source code of Kimera-Multi and all datasets to
facilitate further research towards the reliable real-world deployment of
multi-robot SLAM systems.
|
[
{
"version": "v1",
"created": "Mon, 10 Apr 2023 03:06:11 GMT"
}
] | 2023-04-11T00:00:00
|
[
[
"Tian",
"Yulun",
""
],
[
"Chang",
"Yun",
""
],
[
"Quang",
"Long",
""
],
[
"Schang",
"Arthur",
""
],
[
"Nieto-Granda",
"Carlos",
""
],
[
"How",
"Jonathan P.",
""
],
[
"Carlone",
"Luca",
""
]
] |
TITLE: Resilient and Distributed Multi-Robot Visual SLAM: Datasets,
Experiments, and Lessons Learned
ABSTRACT: This paper revisits Kimera-Multi, a distributed multi-robot Simultaneous
Localization and Mapping (SLAM) system, towards the goal of deployment in the
real world. In particular, this paper has three main contributions. First, we
describe improvements to Kimera-Multi to make it resilient to large-scale
real-world deployments, with particular emphasis on handling intermittent and
unreliable communication. Second, we collect and release challenging
multi-robot benchmarking datasets obtained during live experiments conducted on
the MIT campus, with accurate reference trajectories and maps for evaluation.
The datasets include up to 8 robots traversing long distances (up to 8 km) and
feature many challenging elements such as severe visual ambiguities (e.g., in
underground tunnels and hallways), mixed indoor and outdoor trajectories with
different lighting conditions, and dynamic entities (e.g., pedestrians and
cars). Lastly, we evaluate the resilience of Kimera-Multi under different
communication scenarios, and provide a quantitative comparison with a
centralized baseline system. Based on the results from both live experiments
and subsequent analysis, we discuss the strengths and weaknesses of
Kimera-Multi, and suggest future directions for both algorithm and system
design. We release the source code of Kimera-Multi and all datasets to
facilitate further research towards the reliable real-world deployment of
multi-robot SLAM systems.
|
new_dataset
| 0.626296
|
2304.04368
|
Wenyun Li
|
Wenyun Li, Guo Zhong, Xingyu Lu, Chi-Man Pun
|
Locality Preserving Multiview Graph Hashing for Large Scale Remote
Sensing Image Search
|
5 pages,icassp accepted
| null | null | null |
cs.CV
|
http://creativecommons.org/licenses/by-sa/4.0/
|
Hashing is very popular for remote sensing image search. This article
proposes a multiview hashing with learnable parameters to retrieve the queried
images for a large-scale remote sensing dataset. Existing methods always
neglect that real-world remote sensing data lies on a low-dimensional manifold
embedded in high-dimensional ambient space. Unlike previous methods, this
article proposes to learn the consensus compact codes in a view-specific
low-dimensional subspace. Furthermore, we have added a hyperparameter learnable
module to avoid complex parameter tuning. In order to prove the effectiveness
of our method, we carried out experiments on three widely used remote sensing
data sets and compared them with seven state-of-the-art methods. Extensive
experiments show that the proposed method can achieve competitive results
compared to the other method.
|
[
{
"version": "v1",
"created": "Mon, 10 Apr 2023 03:39:30 GMT"
}
] | 2023-04-11T00:00:00
|
[
[
"Li",
"Wenyun",
""
],
[
"Zhong",
"Guo",
""
],
[
"Lu",
"Xingyu",
""
],
[
"Pun",
"Chi-Man",
""
]
] |
TITLE: Locality Preserving Multiview Graph Hashing for Large Scale Remote
Sensing Image Search
ABSTRACT: Hashing is very popular for remote sensing image search. This article
proposes a multiview hashing with learnable parameters to retrieve the queried
images for a large-scale remote sensing dataset. Existing methods always
neglect that real-world remote sensing data lies on a low-dimensional manifold
embedded in high-dimensional ambient space. Unlike previous methods, this
article proposes to learn the consensus compact codes in a view-specific
low-dimensional subspace. Furthermore, we have added a hyperparameter learnable
module to avoid complex parameter tuning. In order to prove the effectiveness
of our method, we carried out experiments on three widely used remote sensing
data sets and compared them with seven state-of-the-art methods. Extensive
experiments show that the proposed method can achieve competitive results
compared to the other method.
|
no_new_dataset
| 0.711005
|
2304.04376
|
Weijia Wu
|
Weijia Wu, Yuzhong Zhao, Zhuang Li, Jiahong Li, Mike Zheng Shou,
Umapada Pal, Dimosthenis Karatzas, Xiang Bai
|
ICDAR 2023 Video Text Reading Competition for Dense and Small Text
| null |
ICDAR 2023 competition
| null | null |
cs.CV
|
http://creativecommons.org/licenses/by/4.0/
|
Recently, video text detection, tracking, and recognition in natural scenes
are becoming very popular in the computer vision community. However, most
existing algorithms and benchmarks focus on common text cases (e.g., normal
size, density) and single scenarios, while ignoring extreme video text
challenges, i.e., dense and small text in various scenarios. In this
competition report, we establish a video text reading benchmark, DSText, which
focuses on dense and small text reading challenges in the video with various
scenarios. Compared with the previous datasets, the proposed dataset mainly
include three new challenges: 1) Dense video texts, a new challenge for video
text spotter. 2) High-proportioned small texts. 3) Various new scenarios, e.g.,
Game, sports, etc. The proposed DSText includes 100 video clips from 12 open
scenarios, supporting two tasks (i.e., video text tracking (Task 1) and
end-to-end video text spotting (Task 2)). During the competition period (opened
on 15th February 2023 and closed on 20th March 2023), a total of 24 teams
participated in the three proposed tasks with around 30 valid submissions,
respectively. In this article, we describe detailed statistical information of
the dataset, tasks, evaluation protocols and the results summaries of the ICDAR
2023 on DSText competition. Moreover, we hope the benchmark will promise video
text research in the community.
|
[
{
"version": "v1",
"created": "Mon, 10 Apr 2023 04:20:34 GMT"
}
] | 2023-04-11T00:00:00
|
[
[
"Wu",
"Weijia",
""
],
[
"Zhao",
"Yuzhong",
""
],
[
"Li",
"Zhuang",
""
],
[
"Li",
"Jiahong",
""
],
[
"Shou",
"Mike Zheng",
""
],
[
"Pal",
"Umapada",
""
],
[
"Karatzas",
"Dimosthenis",
""
],
[
"Bai",
"Xiang",
""
]
] |
TITLE: ICDAR 2023 Video Text Reading Competition for Dense and Small Text
ABSTRACT: Recently, video text detection, tracking, and recognition in natural scenes
are becoming very popular in the computer vision community. However, most
existing algorithms and benchmarks focus on common text cases (e.g., normal
size, density) and single scenarios, while ignoring extreme video text
challenges, i.e., dense and small text in various scenarios. In this
competition report, we establish a video text reading benchmark, DSText, which
focuses on dense and small text reading challenges in the video with various
scenarios. Compared with the previous datasets, the proposed dataset mainly
include three new challenges: 1) Dense video texts, a new challenge for video
text spotter. 2) High-proportioned small texts. 3) Various new scenarios, e.g.,
Game, sports, etc. The proposed DSText includes 100 video clips from 12 open
scenarios, supporting two tasks (i.e., video text tracking (Task 1) and
end-to-end video text spotting (Task 2)). During the competition period (opened
on 15th February 2023 and closed on 20th March 2023), a total of 24 teams
participated in the three proposed tasks with around 30 valid submissions,
respectively. In this article, we describe detailed statistical information of
the dataset, tasks, evaluation protocols and the results summaries of the ICDAR
2023 on DSText competition. Moreover, we hope the benchmark will promise video
text research in the community.
|
new_dataset
| 0.719374
|
2304.04386
|
Nitish Shukla
|
Nitish Shukla, Sudipta Banerjee
|
Generating Adversarial Attacks in the Latent Space
| null | null | null | null |
cs.LG cs.CR cs.CV
|
http://creativecommons.org/licenses/by/4.0/
|
Adversarial attacks in the input (pixel) space typically incorporate noise
margins such as $L_1$ or $L_{\infty}$-norm to produce imperceptibly perturbed
data that confound deep learning networks. Such noise margins confine the
magnitude of permissible noise. In this work, we propose injecting adversarial
perturbations in the latent (feature) space using a generative adversarial
network, removing the need for margin-based priors. Experiments on MNIST,
CIFAR10, Fashion-MNIST, CIFAR100 and Stanford Dogs datasets support the
effectiveness of the proposed method in generating adversarial attacks in the
latent space while ensuring a high degree of visual realism with respect to
pixel-based adversarial attack methods.
|
[
{
"version": "v1",
"created": "Mon, 10 Apr 2023 05:11:59 GMT"
}
] | 2023-04-11T00:00:00
|
[
[
"Shukla",
"Nitish",
""
],
[
"Banerjee",
"Sudipta",
""
]
] |
TITLE: Generating Adversarial Attacks in the Latent Space
ABSTRACT: Adversarial attacks in the input (pixel) space typically incorporate noise
margins such as $L_1$ or $L_{\infty}$-norm to produce imperceptibly perturbed
data that confound deep learning networks. Such noise margins confine the
magnitude of permissible noise. In this work, we propose injecting adversarial
perturbations in the latent (feature) space using a generative adversarial
network, removing the need for margin-based priors. Experiments on MNIST,
CIFAR10, Fashion-MNIST, CIFAR100 and Stanford Dogs datasets support the
effectiveness of the proposed method in generating adversarial attacks in the
latent space while ensuring a high degree of visual realism with respect to
pixel-based adversarial attack methods.
|
no_new_dataset
| 0.713032
|
2304.04387
|
Pengzhan Zhao
|
Pengzhan Zhao, Xiongfei Wu, Zhuo Li, Jianjun Zhao
|
QChecker: Detecting Bugs in Quantum Programs via Static Analysis
|
This paper will be appeared in the proceedings of the 4th
International Workshop on Quantum Software Engineering (Q-SE 2023) on May 14,
2023
| null | null | null |
cs.SE cs.PL
|
http://creativecommons.org/licenses/by/4.0/
|
Static analysis is the process of analyzing software code without executing
the software. It can help find bugs and potential problems in software that may
only appear at runtime. Although many static analysis tools have been developed
for classical software, due to the nature of quantum programs, these existing
tools are unsuitable for analyzing quantum programs. This paper presents
QChecker, a static analysis tool that supports finding bugs in quantum programs
in Qiskit. QChecker consists of two main modules: a module for extracting
program information based on abstract syntax tree (AST), and a module for
detecting bugs based on patterns. We evaluate the performance of QChecker using
the Bugs4Q benchmark. The evaluation results show that QChecker can effectively
detect various bugs in quantum programs.
|
[
{
"version": "v1",
"created": "Mon, 10 Apr 2023 05:15:34 GMT"
}
] | 2023-04-11T00:00:00
|
[
[
"Zhao",
"Pengzhan",
""
],
[
"Wu",
"Xiongfei",
""
],
[
"Li",
"Zhuo",
""
],
[
"Zhao",
"Jianjun",
""
]
] |
TITLE: QChecker: Detecting Bugs in Quantum Programs via Static Analysis
ABSTRACT: Static analysis is the process of analyzing software code without executing
the software. It can help find bugs and potential problems in software that may
only appear at runtime. Although many static analysis tools have been developed
for classical software, due to the nature of quantum programs, these existing
tools are unsuitable for analyzing quantum programs. This paper presents
QChecker, a static analysis tool that supports finding bugs in quantum programs
in Qiskit. QChecker consists of two main modules: a module for extracting
program information based on abstract syntax tree (AST), and a module for
detecting bugs based on patterns. We evaluate the performance of QChecker using
the Bugs4Q benchmark. The evaluation results show that QChecker can effectively
detect various bugs in quantum programs.
|
no_new_dataset
| 0.702556
|
2304.04407
|
Xianghong Xu
|
Xianghong Xu, Zhibing Zhao, Tieying Zhang, Rong Kang, Luming Sun,
Jianjun Chen,
|
COOOL: A Learning-To-Rank Approach for SQL Hint Recommendations
| null | null | null | null |
cs.DB
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Query optimization is a pivotal part of every database management system
(DBMS) since it determines the efficiency of query execution. Numerous works
have introduced Machine Learning (ML) techniques to cost modeling, cardinality
estimation, and end-to-end learned optimizer, but few of them are proven
practical due to long training time, lack of interpretability, and integration
cost. A recent study provides a practical method to optimize queries by
recommending per-query hints but it suffers from two inherited problems. First,
it follows the regression framework to predict the absolute latency of each
query plan, which is very challenging because the latencies of query plans for
a certain query may span multiple orders of magnitude. Second, it requires
training a model for each dataset, which restricts the application of the
trained models in practice. In this paper, we propose COOOL to predict Cost
Orders of query plans to cOOperate with DBMS by Learning-To-Rank. Instead of
estimating absolute costs, COOOL uses ranking-based approaches to compute
relative ranking scores of the costs of query plans. We show that COOOL is
theoretically valid to distinguish query plans with different latencies. We
implement COOOL on PostgreSQL, and extensive experiments on
join-order-benchmark and TPC-H data demonstrate that COOOL outperforms
PostgreSQL and state-of-the-art methods on single-dataset tasks as well as a
unified model for multiple-dataset tasks. Our experiments also shed some light
on why COOOL outperforms regression approaches from the representation learning
perspective, which may guide future research.
|
[
{
"version": "v1",
"created": "Mon, 10 Apr 2023 06:34:50 GMT"
}
] | 2023-04-11T00:00:00
|
[
[
"Xu",
"Xianghong",
""
],
[
"Zhao",
"Zhibing",
""
],
[
"Zhang",
"Tieying",
""
],
[
"Kang",
"Rong",
""
],
[
"Sun",
"Luming",
""
],
[
"Chen",
"Jianjun",
""
]
] |
TITLE: COOOL: A Learning-To-Rank Approach for SQL Hint Recommendations
ABSTRACT: Query optimization is a pivotal part of every database management system
(DBMS) since it determines the efficiency of query execution. Numerous works
have introduced Machine Learning (ML) techniques to cost modeling, cardinality
estimation, and end-to-end learned optimizer, but few of them are proven
practical due to long training time, lack of interpretability, and integration
cost. A recent study provides a practical method to optimize queries by
recommending per-query hints but it suffers from two inherited problems. First,
it follows the regression framework to predict the absolute latency of each
query plan, which is very challenging because the latencies of query plans for
a certain query may span multiple orders of magnitude. Second, it requires
training a model for each dataset, which restricts the application of the
trained models in practice. In this paper, we propose COOOL to predict Cost
Orders of query plans to cOOperate with DBMS by Learning-To-Rank. Instead of
estimating absolute costs, COOOL uses ranking-based approaches to compute
relative ranking scores of the costs of query plans. We show that COOOL is
theoretically valid to distinguish query plans with different latencies. We
implement COOOL on PostgreSQL, and extensive experiments on
join-order-benchmark and TPC-H data demonstrate that COOOL outperforms
PostgreSQL and state-of-the-art methods on single-dataset tasks as well as a
unified model for multiple-dataset tasks. Our experiments also shed some light
on why COOOL outperforms regression approaches from the representation learning
perspective, which may guide future research.
|
no_new_dataset
| 0.708213
|
2304.04408
|
Huiwei Lin
|
Huiwei Lin, Baoquan Zhang, Shanshan Feng, Xutao Li, Yunming Ye
|
PCR: Proxy-based Contrastive Replay for Online Class-Incremental
Continual Learning
|
To appear in CVPR 2023. 10 pages, 8 figures and 3 tables
|
Proceedings of the IEEE/CVF Conference on Computer Vision and
Pattern Recognition, 2023
| null | null |
cs.CV cs.AI cs.LG
|
http://creativecommons.org/licenses/by/4.0/
|
Online class-incremental continual learning is a specific task of continual
learning. It aims to continuously learn new classes from data stream and the
samples of data stream are seen only once, which suffers from the catastrophic
forgetting issue, i.e., forgetting historical knowledge of old classes.
Existing replay-based methods effectively alleviate this issue by saving and
replaying part of old data in a proxy-based or contrastive-based replay manner.
Although these two replay manners are effective, the former would incline to
new classes due to class imbalance issues, and the latter is unstable and hard
to converge because of the limited number of samples. In this paper, we conduct
a comprehensive analysis of these two replay manners and find that they can be
complementary. Inspired by this finding, we propose a novel replay-based method
called proxy-based contrastive replay (PCR). The key operation is to replace
the contrastive samples of anchors with corresponding proxies in the
contrastive-based way. It alleviates the phenomenon of catastrophic forgetting
by effectively addressing the imbalance issue, as well as keeps a faster
convergence of the model. We conduct extensive experiments on three real-world
benchmark datasets, and empirical results consistently demonstrate the
superiority of PCR over various state-of-the-art methods.
|
[
{
"version": "v1",
"created": "Mon, 10 Apr 2023 06:35:19 GMT"
}
] | 2023-04-11T00:00:00
|
[
[
"Lin",
"Huiwei",
""
],
[
"Zhang",
"Baoquan",
""
],
[
"Feng",
"Shanshan",
""
],
[
"Li",
"Xutao",
""
],
[
"Ye",
"Yunming",
""
]
] |
TITLE: PCR: Proxy-based Contrastive Replay for Online Class-Incremental
Continual Learning
ABSTRACT: Online class-incremental continual learning is a specific task of continual
learning. It aims to continuously learn new classes from data stream and the
samples of data stream are seen only once, which suffers from the catastrophic
forgetting issue, i.e., forgetting historical knowledge of old classes.
Existing replay-based methods effectively alleviate this issue by saving and
replaying part of old data in a proxy-based or contrastive-based replay manner.
Although these two replay manners are effective, the former would incline to
new classes due to class imbalance issues, and the latter is unstable and hard
to converge because of the limited number of samples. In this paper, we conduct
a comprehensive analysis of these two replay manners and find that they can be
complementary. Inspired by this finding, we propose a novel replay-based method
called proxy-based contrastive replay (PCR). The key operation is to replace
the contrastive samples of anchors with corresponding proxies in the
contrastive-based way. It alleviates the phenomenon of catastrophic forgetting
by effectively addressing the imbalance issue, as well as keeps a faster
convergence of the model. We conduct extensive experiments on three real-world
benchmark datasets, and empirical results consistently demonstrate the
superiority of PCR over various state-of-the-art methods.
|
no_new_dataset
| 0.710465
|
2304.04437
|
Tobias Baumgartner
|
Tobias Baumgartner and Stefanie Klatt
|
Monocular 3D Human Pose Estimation for Sports Broadcasts using Partial
Sports Field Registration
|
accept at "9th International Workshop on Computer Vision in Sports
(CVsports) at CVPR 2023"
| null | null | null |
cs.CV
|
http://creativecommons.org/licenses/by/4.0/
|
The filming of sporting events projects and flattens the movement of athletes
in the world onto a 2D broadcast image. The pixel locations of joints in these
images can be detected with high validity. Recovering the actual 3D movement of
the limbs (kinematics) of the athletes requires lifting these 2D pixel
locations back into a third dimension, implying a certain scene geometry. The
well-known line markings of sports fields allow for the calibration of the
camera and for determining the actual geometry of the scene. Close-up shots of
athletes are required to extract detailed kinematics, which in turn obfuscates
the pertinent field markers for camera calibration. We suggest partial sports
field registration, which determines a set of scene-consistent camera
calibrations up to a single degree of freedom. Through joint optimization of 3D
pose estimation and camera calibration, we demonstrate the successful
extraction of 3D running kinematics on a 400m track. In this work, we combine
advances in 2D human pose estimation and camera calibration via partial sports
field registration to demonstrate an avenue for collecting valid large-scale
kinematic datasets. We generate a synthetic dataset of more than 10k images in
Unreal Engine 5 with different viewpoints, running styles, and body types, to
show the limitations of existing monocular 3D HPE methods. Synthetic data and
code are available at https://github.com/tobibaum/PartialSportsFieldReg_3DHPE.
|
[
{
"version": "v1",
"created": "Mon, 10 Apr 2023 07:41:44 GMT"
}
] | 2023-04-11T00:00:00
|
[
[
"Baumgartner",
"Tobias",
""
],
[
"Klatt",
"Stefanie",
""
]
] |
TITLE: Monocular 3D Human Pose Estimation for Sports Broadcasts using Partial
Sports Field Registration
ABSTRACT: The filming of sporting events projects and flattens the movement of athletes
in the world onto a 2D broadcast image. The pixel locations of joints in these
images can be detected with high validity. Recovering the actual 3D movement of
the limbs (kinematics) of the athletes requires lifting these 2D pixel
locations back into a third dimension, implying a certain scene geometry. The
well-known line markings of sports fields allow for the calibration of the
camera and for determining the actual geometry of the scene. Close-up shots of
athletes are required to extract detailed kinematics, which in turn obfuscates
the pertinent field markers for camera calibration. We suggest partial sports
field registration, which determines a set of scene-consistent camera
calibrations up to a single degree of freedom. Through joint optimization of 3D
pose estimation and camera calibration, we demonstrate the successful
extraction of 3D running kinematics on a 400m track. In this work, we combine
advances in 2D human pose estimation and camera calibration via partial sports
field registration to demonstrate an avenue for collecting valid large-scale
kinematic datasets. We generate a synthetic dataset of more than 10k images in
Unreal Engine 5 with different viewpoints, running styles, and body types, to
show the limitations of existing monocular 3D HPE methods. Synthetic data and
code are available at https://github.com/tobibaum/PartialSportsFieldReg_3DHPE.
|
new_dataset
| 0.712995
|
2304.04442
|
Boyang Li
|
Boyang Li and Yingqian Wang and Longguang Wang and Fei Zhang and Ting
Liu and Zaiping Lin and Wei An and Yulan Guo
|
Monte Carlo Linear Clustering with Single-Point Supervision is Enough
for Infrared Small Target Detection
| null | null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Single-frame infrared small target (SIRST) detection aims at separating small
targets from clutter backgrounds on infrared images. Recently, deep learning
based methods have achieved promising performance on SIRST detection, but at
the cost of a large amount of training data with expensive pixel-level
annotations. To reduce the annotation burden, we propose the first method to
achieve SIRST detection with single-point supervision. The core idea of this
work is to recover the per-pixel mask of each target from the given single
point label by using clustering approaches, which looks simple but is indeed
challenging since targets are always insalient and accompanied with background
clutters. To handle this issue, we introduce randomness to the clustering
process by adding noise to the input images, and then obtain much more reliable
pseudo masks by averaging the clustered results. Thanks to this "Monte Carlo"
clustering approach, our method can accurately recover pseudo masks and thus
turn arbitrary fully supervised SIRST detection networks into weakly supervised
ones with only single point annotation. Experiments on four datasets
demonstrate that our method can be applied to existing SIRST detection networks
to achieve comparable performance with their fully supervised counterparts,
which reveals that single-point supervision is strong enough for SIRST
detection. Our code will be available at:
https://github.com/YeRen123455/SIRST-Single-Point-Supervision.
|
[
{
"version": "v1",
"created": "Mon, 10 Apr 2023 08:04:05 GMT"
}
] | 2023-04-11T00:00:00
|
[
[
"Li",
"Boyang",
""
],
[
"Wang",
"Yingqian",
""
],
[
"Wang",
"Longguang",
""
],
[
"Zhang",
"Fei",
""
],
[
"Liu",
"Ting",
""
],
[
"Lin",
"Zaiping",
""
],
[
"An",
"Wei",
""
],
[
"Guo",
"Yulan",
""
]
] |
TITLE: Monte Carlo Linear Clustering with Single-Point Supervision is Enough
for Infrared Small Target Detection
ABSTRACT: Single-frame infrared small target (SIRST) detection aims at separating small
targets from clutter backgrounds on infrared images. Recently, deep learning
based methods have achieved promising performance on SIRST detection, but at
the cost of a large amount of training data with expensive pixel-level
annotations. To reduce the annotation burden, we propose the first method to
achieve SIRST detection with single-point supervision. The core idea of this
work is to recover the per-pixel mask of each target from the given single
point label by using clustering approaches, which looks simple but is indeed
challenging since targets are always insalient and accompanied with background
clutters. To handle this issue, we introduce randomness to the clustering
process by adding noise to the input images, and then obtain much more reliable
pseudo masks by averaging the clustered results. Thanks to this "Monte Carlo"
clustering approach, our method can accurately recover pseudo masks and thus
turn arbitrary fully supervised SIRST detection networks into weakly supervised
ones with only single point annotation. Experiments on four datasets
demonstrate that our method can be applied to existing SIRST detection networks
to achieve comparable performance with their fully supervised counterparts,
which reveals that single-point supervision is strong enough for SIRST
detection. Our code will be available at:
https://github.com/YeRen123455/SIRST-Single-Point-Supervision.
|
no_new_dataset
| 0.711425
|
2304.04446
|
Jinxian Liu
|
Jinxian Liu, Ye Chen, Bingbing Ni, Jiyao Mao, Zhenbo Yu
|
Inferring Fluid Dynamics via Inverse Rendering
| null | null | null | null |
cs.CV cs.GR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Humans have a strong intuitive understanding of physical processes such as
fluid falling by just a glimpse of such a scene picture, i.e., quickly derived
from our immersive visual experiences in memory. This work achieves such a
photo-to-fluid-dynamics reconstruction functionality learned from unannotated
videos, without any supervision of ground-truth fluid dynamics. In a nutshell,
a differentiable Euler simulator modeled with a ConvNet-based pressure
projection solver, is integrated with a volumetric renderer, supporting
end-to-end/coherent differentiable dynamic simulation and rendering. By
endowing each sampled point with a fluid volume value, we derive a NeRF-like
differentiable renderer dedicated from fluid data; and thanks to this
volume-augmented representation, fluid dynamics could be inversely inferred
from the error signal between the rendered result and ground-truth video frame
(i.e., inverse rendering). Experiments on our generated Fluid Fall datasets and
DPI Dam Break dataset are conducted to demonstrate both effectiveness and
generalization ability of our method.
|
[
{
"version": "v1",
"created": "Mon, 10 Apr 2023 08:23:17 GMT"
}
] | 2023-04-11T00:00:00
|
[
[
"Liu",
"Jinxian",
""
],
[
"Chen",
"Ye",
""
],
[
"Ni",
"Bingbing",
""
],
[
"Mao",
"Jiyao",
""
],
[
"Yu",
"Zhenbo",
""
]
] |
TITLE: Inferring Fluid Dynamics via Inverse Rendering
ABSTRACT: Humans have a strong intuitive understanding of physical processes such as
fluid falling by just a glimpse of such a scene picture, i.e., quickly derived
from our immersive visual experiences in memory. This work achieves such a
photo-to-fluid-dynamics reconstruction functionality learned from unannotated
videos, without any supervision of ground-truth fluid dynamics. In a nutshell,
a differentiable Euler simulator modeled with a ConvNet-based pressure
projection solver, is integrated with a volumetric renderer, supporting
end-to-end/coherent differentiable dynamic simulation and rendering. By
endowing each sampled point with a fluid volume value, we derive a NeRF-like
differentiable renderer dedicated from fluid data; and thanks to this
volume-augmented representation, fluid dynamics could be inversely inferred
from the error signal between the rendered result and ground-truth video frame
(i.e., inverse rendering). Experiments on our generated Fluid Fall datasets and
DPI Dam Break dataset are conducted to demonstrate both effectiveness and
generalization ability of our method.
|
no_new_dataset
| 0.575051
|
2304.04461
|
Agus Gunawan
|
Agus Gunawan, Soo Ye Kim, Hyeonjun Sim, Jae-Ho Lee, Munchurl Kim
|
Modernizing Old Photos Using Multiple References via Photorealistic
Style Transfer
|
Accepted to CVPR 2023. Website:
https://kaist-viclab.github.io/old-photo-modernization
| null | null | null |
cs.CV cs.GR
|
http://creativecommons.org/licenses/by/4.0/
|
This paper firstly presents old photo modernization using multiple references
by performing stylization and enhancement in a unified manner. In order to
modernize old photos, we propose a novel multi-reference-based old photo
modernization (MROPM) framework consisting of a network MROPM-Net and a novel
synthetic data generation scheme. MROPM-Net stylizes old photos using multiple
references via photorealistic style transfer (PST) and further enhances the
results to produce modern-looking images. Meanwhile, the synthetic data
generation scheme trains the network to effectively utilize multiple references
to perform modernization. To evaluate the performance, we propose a new old
photos benchmark dataset (CHD) consisting of diverse natural indoor and outdoor
scenes. Extensive experiments show that the proposed method outperforms other
baselines in performing modernization on real old photos, even though no old
photos were used during training. Moreover, our method can appropriately select
styles from multiple references for each semantic region in the old photo to
further improve the modernization performance.
|
[
{
"version": "v1",
"created": "Mon, 10 Apr 2023 09:01:20 GMT"
}
] | 2023-04-11T00:00:00
|
[
[
"Gunawan",
"Agus",
""
],
[
"Kim",
"Soo Ye",
""
],
[
"Sim",
"Hyeonjun",
""
],
[
"Lee",
"Jae-Ho",
""
],
[
"Kim",
"Munchurl",
""
]
] |
TITLE: Modernizing Old Photos Using Multiple References via Photorealistic
Style Transfer
ABSTRACT: This paper firstly presents old photo modernization using multiple references
by performing stylization and enhancement in a unified manner. In order to
modernize old photos, we propose a novel multi-reference-based old photo
modernization (MROPM) framework consisting of a network MROPM-Net and a novel
synthetic data generation scheme. MROPM-Net stylizes old photos using multiple
references via photorealistic style transfer (PST) and further enhances the
results to produce modern-looking images. Meanwhile, the synthetic data
generation scheme trains the network to effectively utilize multiple references
to perform modernization. To evaluate the performance, we propose a new old
photos benchmark dataset (CHD) consisting of diverse natural indoor and outdoor
scenes. Extensive experiments show that the proposed method outperforms other
baselines in performing modernization on real old photos, even though no old
photos were used during training. Moreover, our method can appropriately select
styles from multiple references for each semantic region in the old photo to
further improve the modernization performance.
|
new_dataset
| 0.711224
|
2304.04462
|
Weisong Zhao
|
Weisong Zhao, Xiangyu Zhu, Kaiwen Guo, Xiao-Yu Zhang, Zhen Lei
|
Grouped Knowledge Distillation for Deep Face Recognition
|
9 pages, 2 figures, 7 tables, accepted by AAAI 2023
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Compared with the feature-based distillation methods, logits distillation can
liberalize the requirements of consistent feature dimension between teacher and
student networks, while the performance is deemed inferior in face recognition.
One major challenge is that the light-weight student network has difficulty
fitting the target logits due to its low model capacity, which is attributed to
the significant number of identities in face recognition. Therefore, we seek to
probe the target logits to extract the primary knowledge related to face
identity, and discard the others, to make the distillation more achievable for
the student network. Specifically, there is a tail group with near-zero values
in the prediction, containing minor knowledge for distillation. To provide a
clear perspective of its impact, we first partition the logits into two groups,
i.e., Primary Group and Secondary Group, according to the cumulative
probability of the softened prediction. Then, we reorganize the Knowledge
Distillation (KD) loss of grouped logits into three parts, i.e., Primary-KD,
Secondary-KD, and Binary-KD. Primary-KD refers to distilling the primary
knowledge from the teacher, Secondary-KD aims to refine minor knowledge but
increases the difficulty of distillation, and Binary-KD ensures the consistency
of knowledge distribution between teacher and student. We experimentally found
that (1) Primary-KD and Binary-KD are indispensable for KD, and (2)
Secondary-KD is the culprit restricting KD at the bottleneck. Therefore, we
propose a Grouped Knowledge Distillation (GKD) that retains the Primary-KD and
Binary-KD but omits Secondary-KD in the ultimate KD loss calculation. Extensive
experimental results on popular face recognition benchmarks demonstrate the
superiority of proposed GKD over state-of-the-art methods.
|
[
{
"version": "v1",
"created": "Mon, 10 Apr 2023 09:04:38 GMT"
}
] | 2023-04-11T00:00:00
|
[
[
"Zhao",
"Weisong",
""
],
[
"Zhu",
"Xiangyu",
""
],
[
"Guo",
"Kaiwen",
""
],
[
"Zhang",
"Xiao-Yu",
""
],
[
"Lei",
"Zhen",
""
]
] |
TITLE: Grouped Knowledge Distillation for Deep Face Recognition
ABSTRACT: Compared with the feature-based distillation methods, logits distillation can
liberalize the requirements of consistent feature dimension between teacher and
student networks, while the performance is deemed inferior in face recognition.
One major challenge is that the light-weight student network has difficulty
fitting the target logits due to its low model capacity, which is attributed to
the significant number of identities in face recognition. Therefore, we seek to
probe the target logits to extract the primary knowledge related to face
identity, and discard the others, to make the distillation more achievable for
the student network. Specifically, there is a tail group with near-zero values
in the prediction, containing minor knowledge for distillation. To provide a
clear perspective of its impact, we first partition the logits into two groups,
i.e., Primary Group and Secondary Group, according to the cumulative
probability of the softened prediction. Then, we reorganize the Knowledge
Distillation (KD) loss of grouped logits into three parts, i.e., Primary-KD,
Secondary-KD, and Binary-KD. Primary-KD refers to distilling the primary
knowledge from the teacher, Secondary-KD aims to refine minor knowledge but
increases the difficulty of distillation, and Binary-KD ensures the consistency
of knowledge distribution between teacher and student. We experimentally found
that (1) Primary-KD and Binary-KD are indispensable for KD, and (2)
Secondary-KD is the culprit restricting KD at the bottleneck. Therefore, we
propose a Grouped Knowledge Distillation (GKD) that retains the Primary-KD and
Binary-KD but omits Secondary-KD in the ultimate KD loss calculation. Extensive
experimental results on popular face recognition benchmarks demonstrate the
superiority of proposed GKD over state-of-the-art methods.
|
no_new_dataset
| 0.707209
|
2304.04472
|
Daniel Ortega
|
Daniel Ortega, Sarina Meyer, Antje Schweitzer and Ngoc Thang Vu
|
Modeling Speaker-Listener Interaction for Backchannel Prediction
|
Published in IWSDS 2023
| null | null | null |
cs.CL
|
http://creativecommons.org/licenses/by-nc-nd/4.0/
|
We present our latest findings on backchannel modeling novelly motivated by
the canonical use of the minimal responses Yeah and Uh-huh in English and their
correspondent tokens in German, and the effect of encoding the speaker-listener
interaction. Backchanneling theories emphasize the active and continuous role
of the listener in the course of the conversation, their effects on the
speaker's subsequent talk, and the consequent dynamic speaker-listener
interaction. Therefore, we propose a neural-based acoustic backchannel
classifier on minimal responses by processing acoustic features from the
speaker speech, capturing and imitating listeners' backchanneling behavior, and
encoding speaker-listener interaction. Our experimental results on the
Switchboard and GECO datasets reveal that in almost all tested scenarios the
speaker or listener behavior embeddings help the model make more accurate
backchannel predictions. More importantly, a proper interaction encoding
strategy, i.e., combining the speaker and listener embeddings, leads to the
best performance on both datasets in terms of F1-score.
|
[
{
"version": "v1",
"created": "Mon, 10 Apr 2023 09:22:06 GMT"
}
] | 2023-04-11T00:00:00
|
[
[
"Ortega",
"Daniel",
""
],
[
"Meyer",
"Sarina",
""
],
[
"Schweitzer",
"Antje",
""
],
[
"Vu",
"Ngoc Thang",
""
]
] |
TITLE: Modeling Speaker-Listener Interaction for Backchannel Prediction
ABSTRACT: We present our latest findings on backchannel modeling novelly motivated by
the canonical use of the minimal responses Yeah and Uh-huh in English and their
correspondent tokens in German, and the effect of encoding the speaker-listener
interaction. Backchanneling theories emphasize the active and continuous role
of the listener in the course of the conversation, their effects on the
speaker's subsequent talk, and the consequent dynamic speaker-listener
interaction. Therefore, we propose a neural-based acoustic backchannel
classifier on minimal responses by processing acoustic features from the
speaker speech, capturing and imitating listeners' backchanneling behavior, and
encoding speaker-listener interaction. Our experimental results on the
Switchboard and GECO datasets reveal that in almost all tested scenarios the
speaker or listener behavior embeddings help the model make more accurate
backchannel predictions. More importantly, a proper interaction encoding
strategy, i.e., combining the speaker and listener embeddings, leads to the
best performance on both datasets in terms of F1-score.
|
no_new_dataset
| 0.710201
|
2304.04478
|
Daniel Ortega
|
Daniel Ortega, Chia-Yu Li, Ngoc Thang Vu
|
Oh, Jeez! or Uh-huh? A Listener-aware Backchannel Predictor on ASR
Transcriptions
|
Published in ICASSP 2020
| null | null | null |
cs.CL cs.SD eess.AS
|
http://creativecommons.org/licenses/by-nc-sa/4.0/
|
This paper presents our latest investigation on modeling backchannel in
conversations. Motivated by a proactive backchanneling theory, we aim at
developing a system which acts as a proactive listener by inserting
backchannels, such as continuers and assessment, to influence speakers. Our
model takes into account not only lexical and acoustic cues, but also
introduces the simple and novel idea of using listener embeddings to mimic
different backchanneling behaviours. Our experimental results on the
Switchboard benchmark dataset reveal that acoustic cues are more important than
lexical cues in this task and their combination with listener embeddings works
best on both, manual transcriptions and automatically generated transcriptions.
|
[
{
"version": "v1",
"created": "Mon, 10 Apr 2023 09:33:29 GMT"
}
] | 2023-04-11T00:00:00
|
[
[
"Ortega",
"Daniel",
""
],
[
"Li",
"Chia-Yu",
""
],
[
"Vu",
"Ngoc Thang",
""
]
] |
TITLE: Oh, Jeez! or Uh-huh? A Listener-aware Backchannel Predictor on ASR
Transcriptions
ABSTRACT: This paper presents our latest investigation on modeling backchannel in
conversations. Motivated by a proactive backchanneling theory, we aim at
developing a system which acts as a proactive listener by inserting
backchannels, such as continuers and assessment, to influence speakers. Our
model takes into account not only lexical and acoustic cues, but also
introduces the simple and novel idea of using listener embeddings to mimic
different backchanneling behaviours. Our experimental results on the
Switchboard benchmark dataset reveal that acoustic cues are more important than
lexical cues in this task and their combination with listener embeddings works
best on both, manual transcriptions and automatically generated transcriptions.
|
no_new_dataset
| 0.710226
|
2304.04503
|
Pau Gall\'es Ravent\'os
|
Pau Gall\'es, Xi Chen
|
Head-tail Loss: A simple function for Oriented Object Detection and
Anchor-free models
| null | null | null | null |
cs.CV cs.AI cs.LG
|
http://creativecommons.org/licenses/by-nc-sa/4.0/
|
This paper presents a new loss function for the prediction of oriented
bounding boxes, named head-tail-loss. The loss function consists in minimizing
the distance between the prediction and the annotation of two key points that
are representing the annotation of the object. The first point is the center
point and the second is the head of the object. However, for the second point,
the minimum distance between the prediction and either the head or tail of the
groundtruth is used. On this way, either prediction is valid (with the head
pointing to the tail or the tail pointing to the head). At the end the
importance is to detect the direction of the object but not its heading. The
new loss function has been evaluated on the DOTA and HRSC2016 datasets and has
shown potential for elongated objects such as ships and also for other types of
objects with different shapes.
|
[
{
"version": "v1",
"created": "Mon, 10 Apr 2023 10:46:12 GMT"
}
] | 2023-04-11T00:00:00
|
[
[
"Gallés",
"Pau",
""
],
[
"Chen",
"Xi",
""
]
] |
TITLE: Head-tail Loss: A simple function for Oriented Object Detection and
Anchor-free models
ABSTRACT: This paper presents a new loss function for the prediction of oriented
bounding boxes, named head-tail-loss. The loss function consists in minimizing
the distance between the prediction and the annotation of two key points that
are representing the annotation of the object. The first point is the center
point and the second is the head of the object. However, for the second point,
the minimum distance between the prediction and either the head or tail of the
groundtruth is used. On this way, either prediction is valid (with the head
pointing to the tail or the tail pointing to the head). At the end the
importance is to detect the direction of the object but not its heading. The
new loss function has been evaluated on the DOTA and HRSC2016 datasets and has
shown potential for elongated objects such as ships and also for other types of
objects with different shapes.
|
no_new_dataset
| 0.71086
|
2304.04514
|
Jianhua Han
|
Lewei Yao, Jianhua Han, Xiaodan Liang, Dan Xu, Wei Zhang, Zhenguo Li,
Hang Xu
|
DetCLIPv2: Scalable Open-Vocabulary Object Detection Pre-training via
Word-Region Alignment
|
Accepted to CVPR2023
| null | null | null |
cs.CV
|
http://creativecommons.org/licenses/by-nc-sa/4.0/
|
This paper presents DetCLIPv2, an efficient and scalable training framework
that incorporates large-scale image-text pairs to achieve open-vocabulary
object detection (OVD). Unlike previous OVD frameworks that typically rely on a
pre-trained vision-language model (e.g., CLIP) or exploit image-text pairs via
a pseudo labeling process, DetCLIPv2 directly learns the fine-grained
word-region alignment from massive image-text pairs in an end-to-end manner. To
accomplish this, we employ a maximum word-region similarity between region
proposals and textual words to guide the contrastive objective. To enable the
model to gain localization capability while learning broad concepts, DetCLIPv2
is trained with a hybrid supervision from detection, grounding and image-text
pair data under a unified data formulation. By jointly training with an
alternating scheme and adopting low-resolution input for image-text pairs,
DetCLIPv2 exploits image-text pair data efficiently and effectively: DetCLIPv2
utilizes 13X more image-text pairs than DetCLIP with a similar training time
and improves performance. With 13M image-text pairs for pre-training, DetCLIPv2
demonstrates superior open-vocabulary detection performance, e.g., DetCLIPv2
with Swin-T backbone achieves 40.4% zero-shot AP on the LVIS benchmark, which
outperforms previous works GLIP/GLIPv2/DetCLIP by 14.4/11.4/4.5% AP,
respectively, and even beats its fully-supervised counterpart by a large
margin.
|
[
{
"version": "v1",
"created": "Mon, 10 Apr 2023 11:08:15 GMT"
}
] | 2023-04-11T00:00:00
|
[
[
"Yao",
"Lewei",
""
],
[
"Han",
"Jianhua",
""
],
[
"Liang",
"Xiaodan",
""
],
[
"Xu",
"Dan",
""
],
[
"Zhang",
"Wei",
""
],
[
"Li",
"Zhenguo",
""
],
[
"Xu",
"Hang",
""
]
] |
TITLE: DetCLIPv2: Scalable Open-Vocabulary Object Detection Pre-training via
Word-Region Alignment
ABSTRACT: This paper presents DetCLIPv2, an efficient and scalable training framework
that incorporates large-scale image-text pairs to achieve open-vocabulary
object detection (OVD). Unlike previous OVD frameworks that typically rely on a
pre-trained vision-language model (e.g., CLIP) or exploit image-text pairs via
a pseudo labeling process, DetCLIPv2 directly learns the fine-grained
word-region alignment from massive image-text pairs in an end-to-end manner. To
accomplish this, we employ a maximum word-region similarity between region
proposals and textual words to guide the contrastive objective. To enable the
model to gain localization capability while learning broad concepts, DetCLIPv2
is trained with a hybrid supervision from detection, grounding and image-text
pair data under a unified data formulation. By jointly training with an
alternating scheme and adopting low-resolution input for image-text pairs,
DetCLIPv2 exploits image-text pair data efficiently and effectively: DetCLIPv2
utilizes 13X more image-text pairs than DetCLIP with a similar training time
and improves performance. With 13M image-text pairs for pre-training, DetCLIPv2
demonstrates superior open-vocabulary detection performance, e.g., DetCLIPv2
with Swin-T backbone achieves 40.4% zero-shot AP on the LVIS benchmark, which
outperforms previous works GLIP/GLIPv2/DetCLIP by 14.4/11.4/4.5% AP,
respectively, and even beats its fully-supervised counterpart by a large
margin.
|
no_new_dataset
| 0.710446
|
2304.04515
|
Wei Hua
|
Wei Hua, Dingkang Liang, Jingyu Li, Xiaolong Liu, Zhikang Zou,
Xiaoqing Ye, Xiang Bai
|
SOOD: Towards Semi-Supervised Oriented Object Detection
|
Accepted to CVPR 2023. Code will be available at
https://github.com/HamPerdredes/SOOD
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Semi-Supervised Object Detection (SSOD), aiming to explore unlabeled data for
boosting object detectors, has become an active task in recent years. However,
existing SSOD approaches mainly focus on horizontal objects, leaving
multi-oriented objects that are common in aerial images unexplored. This paper
proposes a novel Semi-supervised Oriented Object Detection model, termed SOOD,
built upon the mainstream pseudo-labeling framework. Towards oriented objects
in aerial scenes, we design two loss functions to provide better supervision.
Focusing on the orientations of objects, the first loss regularizes the
consistency between each pseudo-label-prediction pair (includes a prediction
and its corresponding pseudo label) with adaptive weights based on their
orientation gap. Focusing on the layout of an image, the second loss
regularizes the similarity and explicitly builds the many-to-many relation
between the sets of pseudo-labels and predictions. Such a global consistency
constraint can further boost semi-supervised learning. Our experiments show
that when trained with the two proposed losses, SOOD surpasses the
state-of-the-art SSOD methods under various settings on the DOTA-v1.5
benchmark. The code will be available at https://github.com/HamPerdredes/SOOD.
|
[
{
"version": "v1",
"created": "Mon, 10 Apr 2023 11:10:42 GMT"
}
] | 2023-04-11T00:00:00
|
[
[
"Hua",
"Wei",
""
],
[
"Liang",
"Dingkang",
""
],
[
"Li",
"Jingyu",
""
],
[
"Liu",
"Xiaolong",
""
],
[
"Zou",
"Zhikang",
""
],
[
"Ye",
"Xiaoqing",
""
],
[
"Bai",
"Xiang",
""
]
] |
TITLE: SOOD: Towards Semi-Supervised Oriented Object Detection
ABSTRACT: Semi-Supervised Object Detection (SSOD), aiming to explore unlabeled data for
boosting object detectors, has become an active task in recent years. However,
existing SSOD approaches mainly focus on horizontal objects, leaving
multi-oriented objects that are common in aerial images unexplored. This paper
proposes a novel Semi-supervised Oriented Object Detection model, termed SOOD,
built upon the mainstream pseudo-labeling framework. Towards oriented objects
in aerial scenes, we design two loss functions to provide better supervision.
Focusing on the orientations of objects, the first loss regularizes the
consistency between each pseudo-label-prediction pair (includes a prediction
and its corresponding pseudo label) with adaptive weights based on their
orientation gap. Focusing on the layout of an image, the second loss
regularizes the similarity and explicitly builds the many-to-many relation
between the sets of pseudo-labels and predictions. Such a global consistency
constraint can further boost semi-supervised learning. Our experiments show
that when trained with the two proposed losses, SOOD surpasses the
state-of-the-art SSOD methods under various settings on the DOTA-v1.5
benchmark. The code will be available at https://github.com/HamPerdredes/SOOD.
|
no_new_dataset
| 0.710603
|
2304.04523
|
Junnan Jiang
|
Yuyang Tu, Junnan Jiang, Shuang Li, Norman Hendrich, Miao Li, Jianwei
Zhang
|
PoseFusion: Robust Object-in-Hand Pose Estimation with SelectLSTM
| null | null | null | null |
cs.RO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Accurate estimation of the relative pose between an object and a robot hand
is critical for many manipulation tasks. However, most of the existing
object-in-hand pose datasets use two-finger grippers and also assume that the
object remains fixed in the hand without any relative movements, which is not
representative of real-world scenarios. To address this issue, a 6D
object-in-hand pose dataset is proposed using a teleoperation method with an
anthropomorphic Shadow Dexterous hand. Our dataset comprises RGB-D images,
proprioception and tactile data, covering diverse grasping poses, finger
contact states, and object occlusions. To overcome the significant hand
occlusion and limited tactile sensor contact in real-world scenarios, we
propose PoseFusion, a hybrid multi-modal fusion approach that integrates the
information from visual and tactile perception channels. PoseFusion generates
three candidate object poses from three estimators (tactile only, visual only,
and visuo-tactile fusion), which are then filtered by a SelectLSTM network to
select the optimal pose, avoiding inferior fusion poses resulting from modality
collapse. Extensive experiments demonstrate the robustness and advantages of
our framework. All data and codes are available on the project website:
https://elevenjiang1.github.io/ObjectInHand-Dataset/
|
[
{
"version": "v1",
"created": "Mon, 10 Apr 2023 11:38:52 GMT"
}
] | 2023-04-11T00:00:00
|
[
[
"Tu",
"Yuyang",
""
],
[
"Jiang",
"Junnan",
""
],
[
"Li",
"Shuang",
""
],
[
"Hendrich",
"Norman",
""
],
[
"Li",
"Miao",
""
],
[
"Zhang",
"Jianwei",
""
]
] |
TITLE: PoseFusion: Robust Object-in-Hand Pose Estimation with SelectLSTM
ABSTRACT: Accurate estimation of the relative pose between an object and a robot hand
is critical for many manipulation tasks. However, most of the existing
object-in-hand pose datasets use two-finger grippers and also assume that the
object remains fixed in the hand without any relative movements, which is not
representative of real-world scenarios. To address this issue, a 6D
object-in-hand pose dataset is proposed using a teleoperation method with an
anthropomorphic Shadow Dexterous hand. Our dataset comprises RGB-D images,
proprioception and tactile data, covering diverse grasping poses, finger
contact states, and object occlusions. To overcome the significant hand
occlusion and limited tactile sensor contact in real-world scenarios, we
propose PoseFusion, a hybrid multi-modal fusion approach that integrates the
information from visual and tactile perception channels. PoseFusion generates
three candidate object poses from three estimators (tactile only, visual only,
and visuo-tactile fusion), which are then filtered by a SelectLSTM network to
select the optimal pose, avoiding inferior fusion poses resulting from modality
collapse. Extensive experiments demonstrate the robustness and advantages of
our framework. All data and codes are available on the project website:
https://elevenjiang1.github.io/ObjectInHand-Dataset/
|
new_dataset
| 0.721397
|
2304.04529
|
Xiaofeng Pan
|
Ming Li, Naiyin Liu, Xiaofeng Pan, Yang Huang, Ningning Li, Yingmin
Su, Chengjun Mao, and Bo Cao
|
FAN: Fatigue-Aware Network for Click-Through Rate Prediction in
E-commerce Recommendation
| null | null | null | null |
cs.IR cs.HC cs.LG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Since clicks usually contain heavy noise, increasing research efforts have
been devoted to modeling implicit negative user behaviors (i.e., non-clicks).
However, they either rely on explicit negative user behaviors (e.g., dislikes)
or simply treat non-clicks as negative feedback, failing to learn negative user
interests comprehensively. In such situations, users may experience fatigue
because of seeing too many similar recommendations. In this paper, we propose
Fatigue-Aware Network (FAN), a novel CTR model that directly perceives user
fatigue from non-clicks. Specifically, we first apply Fourier Transformation to
the time series generated from non-clicks, obtaining its frequency spectrum
which contains comprehensive information about user fatigue. Then the frequency
spectrum is modulated by category information of the target item to model the
bias that both the upper bound of fatigue and users' patience is different for
different categories. Moreover, a gating network is adopted to model the
confidence of user fatigue and an auxiliary task is designed to guide the
learning of user fatigue, so we can obtain a well-learned fatigue
representation and combine it with user interests for the final CTR prediction.
Experimental results on real-world datasets validate the superiority of FAN and
online A/B tests also show FAN outperforms representative CTR models
significantly.
|
[
{
"version": "v1",
"created": "Mon, 10 Apr 2023 11:58:42 GMT"
}
] | 2023-04-11T00:00:00
|
[
[
"Li",
"Ming",
""
],
[
"Liu",
"Naiyin",
""
],
[
"Pan",
"Xiaofeng",
""
],
[
"Huang",
"Yang",
""
],
[
"Li",
"Ningning",
""
],
[
"Su",
"Yingmin",
""
],
[
"Mao",
"Chengjun",
""
],
[
"Cao",
"Bo",
""
]
] |
TITLE: FAN: Fatigue-Aware Network for Click-Through Rate Prediction in
E-commerce Recommendation
ABSTRACT: Since clicks usually contain heavy noise, increasing research efforts have
been devoted to modeling implicit negative user behaviors (i.e., non-clicks).
However, they either rely on explicit negative user behaviors (e.g., dislikes)
or simply treat non-clicks as negative feedback, failing to learn negative user
interests comprehensively. In such situations, users may experience fatigue
because of seeing too many similar recommendations. In this paper, we propose
Fatigue-Aware Network (FAN), a novel CTR model that directly perceives user
fatigue from non-clicks. Specifically, we first apply Fourier Transformation to
the time series generated from non-clicks, obtaining its frequency spectrum
which contains comprehensive information about user fatigue. Then the frequency
spectrum is modulated by category information of the target item to model the
bias that both the upper bound of fatigue and users' patience is different for
different categories. Moreover, a gating network is adopted to model the
confidence of user fatigue and an auxiliary task is designed to guide the
learning of user fatigue, so we can obtain a well-learned fatigue
representation and combine it with user interests for the final CTR prediction.
Experimental results on real-world datasets validate the superiority of FAN and
online A/B tests also show FAN outperforms representative CTR models
significantly.
|
no_new_dataset
| 0.710603
|
2304.04537
|
Ali Nazari
|
Mahsa Soleimani, Ali Nazari and Mohsen Ebrahimi Moghaddam
|
Deepfake Detection of Occluded Images Using a Patch-based Approach
| null | null | null | null |
cs.CV
|
http://creativecommons.org/licenses/by-nc-sa/4.0/
|
DeepFake involves the use of deep learning and artificial intelligence
techniques to produce or change video and image contents typically generated by
GANs. Moreover, it can be misused and leads to fictitious news, ethical and
financial crimes, and also affects the performance of facial recognition
systems. Thus, detection of real or fake images is significant specially to
authenticate originality of people's images or videos. One of the most
important challenges in this topic is obstruction that decreases the system
precision. In this study, we present a deep learning approach using the entire
face and face patches to distinguish real/fake images in the presence of
obstruction with a three-path decision: first entire-face reasoning, second a
decision based on the concatenation of feature vectors of face patches, and
third a majority vote decision based on these features. To test our approach,
new datasets including real and fake images are created. For producing fake
images, StyleGAN and StyleGAN2 are trained by FFHQ images and also StarGAN and
PGGAN are trained by CelebA images. The CelebA and FFHQ datasets are used as
real images. The proposed approach reaches higher results in early epochs than
other methods and increases the SoTA results by 0.4\%-7.9\% in the different
built data-sets. Also, we have shown in experimental results that weighing the
patches may improve accuracy.
|
[
{
"version": "v1",
"created": "Mon, 10 Apr 2023 12:12:14 GMT"
}
] | 2023-04-11T00:00:00
|
[
[
"Soleimani",
"Mahsa",
""
],
[
"Nazari",
"Ali",
""
],
[
"Moghaddam",
"Mohsen Ebrahimi",
""
]
] |
TITLE: Deepfake Detection of Occluded Images Using a Patch-based Approach
ABSTRACT: DeepFake involves the use of deep learning and artificial intelligence
techniques to produce or change video and image contents typically generated by
GANs. Moreover, it can be misused and leads to fictitious news, ethical and
financial crimes, and also affects the performance of facial recognition
systems. Thus, detection of real or fake images is significant specially to
authenticate originality of people's images or videos. One of the most
important challenges in this topic is obstruction that decreases the system
precision. In this study, we present a deep learning approach using the entire
face and face patches to distinguish real/fake images in the presence of
obstruction with a three-path decision: first entire-face reasoning, second a
decision based on the concatenation of feature vectors of face patches, and
third a majority vote decision based on these features. To test our approach,
new datasets including real and fake images are created. For producing fake
images, StyleGAN and StyleGAN2 are trained by FFHQ images and also StarGAN and
PGGAN are trained by CelebA images. The CelebA and FFHQ datasets are used as
real images. The proposed approach reaches higher results in early epochs than
other methods and increases the SoTA results by 0.4\%-7.9\% in the different
built data-sets. Also, we have shown in experimental results that weighing the
patches may improve accuracy.
|
new_dataset
| 0.716063
|
2304.04540
|
Zhaowen Li
|
Zhaowen Li, Xu Zhao, Peigeng Ding, Zongxin Gao, Yuting Yang, Ming
Tang, Jinqiao Wang
|
FreConv: Frequency Branch-and-Integration Convolutional Networks
|
Accepted by ICME2023
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Recent researches indicate that utilizing the frequency information of input
data can enhance the performance of networks. However, the existing popular
convolutional structure is not designed specifically for utilizing the
frequency information contained in datasets. In this paper, we propose a novel
and effective module, named FreConv (frequency branch-and-integration
convolution), to replace the vanilla convolution. FreConv adopts a dual-branch
architecture to extract and integrate high- and low-frequency information. In
the high-frequency branch, a derivative-filter-like architecture is designed to
extract the high-frequency information while a light extractor is employed in
the low-frequency branch because the low-frequency information is usually
redundant. FreConv is able to exploit the frequency information of input data
in a more reasonable way to enhance feature representation ability and reduce
the memory and computational cost significantly. Without any bells and
whistles, experimental results on various tasks demonstrate that
FreConv-equipped networks consistently outperform state-of-the-art baselines.
|
[
{
"version": "v1",
"created": "Mon, 10 Apr 2023 12:24:14 GMT"
}
] | 2023-04-11T00:00:00
|
[
[
"Li",
"Zhaowen",
""
],
[
"Zhao",
"Xu",
""
],
[
"Ding",
"Peigeng",
""
],
[
"Gao",
"Zongxin",
""
],
[
"Yang",
"Yuting",
""
],
[
"Tang",
"Ming",
""
],
[
"Wang",
"Jinqiao",
""
]
] |
TITLE: FreConv: Frequency Branch-and-Integration Convolutional Networks
ABSTRACT: Recent researches indicate that utilizing the frequency information of input
data can enhance the performance of networks. However, the existing popular
convolutional structure is not designed specifically for utilizing the
frequency information contained in datasets. In this paper, we propose a novel
and effective module, named FreConv (frequency branch-and-integration
convolution), to replace the vanilla convolution. FreConv adopts a dual-branch
architecture to extract and integrate high- and low-frequency information. In
the high-frequency branch, a derivative-filter-like architecture is designed to
extract the high-frequency information while a light extractor is employed in
the low-frequency branch because the low-frequency information is usually
redundant. FreConv is able to exploit the frequency information of input data
in a more reasonable way to enhance feature representation ability and reduce
the memory and computational cost significantly. Without any bells and
whistles, experimental results on various tasks demonstrate that
FreConv-equipped networks consistently outperform state-of-the-art baselines.
|
no_new_dataset
| 0.711268
|
2304.04545
|
Kuntai Cai
|
Kuntai Cai, Xiaokui Xiao, Graham Cormode
|
PrivLava: Synthesizing Relational Data with Foreign Keys under
Differential Privacy
|
This is an extended version of a SIGMOD 2023 paper
| null | null | null |
cs.DB
|
http://creativecommons.org/licenses/by/4.0/
|
Answering database queries while preserving privacy is an important problem
that has attracted considerable research attention in recent years. A canonical
approach to this problem is to use synthetic data. That is, we replace the
input database R with a synthetic database R* that preserves the
characteristics of R, and use R* to answer queries. Existing solutions for
relational data synthesis, however, either fail to provide strong privacy
protection, or assume that R contains a single relation. In addition, it is
challenging to extend the existing single-relation solutions to the case of
multiple relations, because they are unable to model the complex correlations
induced by the foreign keys. Therefore, multi-relational data synthesis with
strong privacy guarantees is an open problem. In this paper, we address the
above open problem by proposing PrivLava, the first solution for synthesizing
relational data with foreign keys under differential privacy, a rigorous
privacy framework widely adopted in both academia and industry. The key idea of
PrivLava is to model the data distribution in R using graphical models, with
latent variables included to capture the inter-relational correlations caused
by foreign keys. We show that PrivLava supports arbitrary foreign key
references that form a directed acyclic graph, and is able to tackle the common
case when R contains a mixture of public and private relations. Extensive
experiments on census data sets and the TPC-H benchmark demonstrate that
PrivLava significantly outperforms its competitors in terms of the accuracy of
aggregate queries processed on the synthetic data.
|
[
{
"version": "v1",
"created": "Mon, 10 Apr 2023 12:32:27 GMT"
}
] | 2023-04-11T00:00:00
|
[
[
"Cai",
"Kuntai",
""
],
[
"Xiao",
"Xiaokui",
""
],
[
"Cormode",
"Graham",
""
]
] |
TITLE: PrivLava: Synthesizing Relational Data with Foreign Keys under
Differential Privacy
ABSTRACT: Answering database queries while preserving privacy is an important problem
that has attracted considerable research attention in recent years. A canonical
approach to this problem is to use synthetic data. That is, we replace the
input database R with a synthetic database R* that preserves the
characteristics of R, and use R* to answer queries. Existing solutions for
relational data synthesis, however, either fail to provide strong privacy
protection, or assume that R contains a single relation. In addition, it is
challenging to extend the existing single-relation solutions to the case of
multiple relations, because they are unable to model the complex correlations
induced by the foreign keys. Therefore, multi-relational data synthesis with
strong privacy guarantees is an open problem. In this paper, we address the
above open problem by proposing PrivLava, the first solution for synthesizing
relational data with foreign keys under differential privacy, a rigorous
privacy framework widely adopted in both academia and industry. The key idea of
PrivLava is to model the data distribution in R using graphical models, with
latent variables included to capture the inter-relational correlations caused
by foreign keys. We show that PrivLava supports arbitrary foreign key
references that form a directed acyclic graph, and is able to tackle the common
case when R contains a mixture of public and private relations. Extensive
experiments on census data sets and the TPC-H benchmark demonstrate that
PrivLava significantly outperforms its competitors in terms of the accuracy of
aggregate queries processed on the synthetic data.
|
no_new_dataset
| 0.710176
|
2304.04567
|
Yilong Yang
|
Yilong Yang, Srinandan Dasmahapatra, Sasan Mahmoodi
|
ADS_UNet: A Nested UNet for Histopathology Image Segmentation
|
To be published in Expert Systems With Applications
| null | null | null |
eess.IV cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The UNet model consists of fully convolutional network (FCN) layers arranged
as contracting encoder and upsampling decoder maps. Nested arrangements of
these encoder and decoder maps give rise to extensions of the UNet model, such
as UNete and UNet++. Other refinements include constraining the outputs of the
convolutional layers to discriminate between segment labels when trained end to
end, a property called deep supervision. This reduces feature diversity in
these nested UNet models despite their large parameter space. Furthermore, for
texture segmentation, pixel correlations at multiple scales contribute to the
classification task; hence, explicit deep supervision of shallower layers is
likely to enhance performance. In this paper, we propose ADS UNet, a stage-wise
additive training algorithm that incorporates resource-efficient deep
supervision in shallower layers and takes performance-weighted combinations of
the sub-UNets to create the segmentation model. We provide empirical evidence
on three histopathology datasets to support the claim that the proposed ADS
UNet reduces correlations between constituent features and improves performance
while being more resource efficient. We demonstrate that ADS_UNet outperforms
state-of-the-art Transformer-based models by 1.08 and 0.6 points on CRAG and
BCSS datasets, and yet requires only 37% of GPU consumption and 34% of training
time as that required by Transformers.
|
[
{
"version": "v1",
"created": "Mon, 10 Apr 2023 13:08:48 GMT"
}
] | 2023-04-11T00:00:00
|
[
[
"Yang",
"Yilong",
""
],
[
"Dasmahapatra",
"Srinandan",
""
],
[
"Mahmoodi",
"Sasan",
""
]
] |
TITLE: ADS_UNet: A Nested UNet for Histopathology Image Segmentation
ABSTRACT: The UNet model consists of fully convolutional network (FCN) layers arranged
as contracting encoder and upsampling decoder maps. Nested arrangements of
these encoder and decoder maps give rise to extensions of the UNet model, such
as UNete and UNet++. Other refinements include constraining the outputs of the
convolutional layers to discriminate between segment labels when trained end to
end, a property called deep supervision. This reduces feature diversity in
these nested UNet models despite their large parameter space. Furthermore, for
texture segmentation, pixel correlations at multiple scales contribute to the
classification task; hence, explicit deep supervision of shallower layers is
likely to enhance performance. In this paper, we propose ADS UNet, a stage-wise
additive training algorithm that incorporates resource-efficient deep
supervision in shallower layers and takes performance-weighted combinations of
the sub-UNets to create the segmentation model. We provide empirical evidence
on three histopathology datasets to support the claim that the proposed ADS
UNet reduces correlations between constituent features and improves performance
while being more resource efficient. We demonstrate that ADS_UNet outperforms
state-of-the-art Transformer-based models by 1.08 and 0.6 points on CRAG and
BCSS datasets, and yet requires only 37% of GPU consumption and 34% of training
time as that required by Transformers.
|
no_new_dataset
| 0.710245
|
2304.04581
|
Ziyang Chen
|
Ziyang Chen, Yongsheng Pan, Yong Xia
|
Reconstruction-driven Dynamic Refinement based Unsupervised Domain
Adaptation for Joint Optic Disc and Cup Segmentation
| null | null | null | null |
eess.IV cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Glaucoma is one of the leading causes of irreversible blindness. Segmentation
of optic disc (OD) and optic cup (OC) on fundus images is a crucial step in
glaucoma screening. Although many deep learning models have been constructed
for this task, it remains challenging to train an OD/OC segmentation model that
could be deployed successfully to different healthcare centers. The
difficulties mainly comes from the domain shift issue, i.e., the fundus images
collected at these centers usually vary greatly in the tone, contrast, and
brightness. To address this issue, in this paper, we propose a novel
unsupervised domain adaptation (UDA) method called Reconstruction-driven
Dynamic Refinement Network (RDR-Net), where we employ a due-path segmentation
backbone for simultaneous edge detection and region prediction and design three
modules to alleviate the domain gap. The reconstruction alignment (RA) module
uses a variational auto-encoder (VAE) to reconstruct the input image and thus
boosts the image representation ability of the network in a self-supervised
way. It also uses a style-consistency constraint to force the network to retain
more domain-invariant information. The low-level feature refinement (LFR)
module employs input-specific dynamic convolutions to suppress the
domain-variant information in the obtained low-level features. The
prediction-map alignment (PMA) module elaborates the entropy-driven adversarial
learning to encourage the network to generate source-like boundaries and
regions. We evaluated our RDR-Net against state-of-the-art solutions on four
public fundus image datasets. Our results indicate that RDR-Net is superior to
competing models in both segmentation performance and generalization ability
|
[
{
"version": "v1",
"created": "Mon, 10 Apr 2023 13:33:13 GMT"
}
] | 2023-04-11T00:00:00
|
[
[
"Chen",
"Ziyang",
""
],
[
"Pan",
"Yongsheng",
""
],
[
"Xia",
"Yong",
""
]
] |
TITLE: Reconstruction-driven Dynamic Refinement based Unsupervised Domain
Adaptation for Joint Optic Disc and Cup Segmentation
ABSTRACT: Glaucoma is one of the leading causes of irreversible blindness. Segmentation
of optic disc (OD) and optic cup (OC) on fundus images is a crucial step in
glaucoma screening. Although many deep learning models have been constructed
for this task, it remains challenging to train an OD/OC segmentation model that
could be deployed successfully to different healthcare centers. The
difficulties mainly comes from the domain shift issue, i.e., the fundus images
collected at these centers usually vary greatly in the tone, contrast, and
brightness. To address this issue, in this paper, we propose a novel
unsupervised domain adaptation (UDA) method called Reconstruction-driven
Dynamic Refinement Network (RDR-Net), where we employ a due-path segmentation
backbone for simultaneous edge detection and region prediction and design three
modules to alleviate the domain gap. The reconstruction alignment (RA) module
uses a variational auto-encoder (VAE) to reconstruct the input image and thus
boosts the image representation ability of the network in a self-supervised
way. It also uses a style-consistency constraint to force the network to retain
more domain-invariant information. The low-level feature refinement (LFR)
module employs input-specific dynamic convolutions to suppress the
domain-variant information in the obtained low-level features. The
prediction-map alignment (PMA) module elaborates the entropy-driven adversarial
learning to encourage the network to generate source-like boundaries and
regions. We evaluated our RDR-Net against state-of-the-art solutions on four
public fundus image datasets. Our results indicate that RDR-Net is superior to
competing models in both segmentation performance and generalization ability
|
no_new_dataset
| 0.711437
|
2304.04595
|
Yilong Yang
|
Yilong Yang, Srinandan Dasmahapatra, Sasan Mahmoodi
|
Scale-Equivariant UNet for Histopathology Image Segmentation
|
This paper was accepted by GeoMedIA 2022
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Digital histopathology slides are scanned and viewed under different
magnifications and stored as images at different resolutions. Convolutional
Neural Networks (CNNs) trained on such images at a given scale fail to
generalise to those at different scales. This inability is often addressed by
augmenting training data with re-scaled images, allowing a model with
sufficient capacity to learn the requisite patterns. Alternatively, designing
CNN filters to be scale-equivariant frees up model capacity to learn
discriminative features. In this paper, we propose the Scale-Equivariant UNet
(SEUNet) for image segmentation by building on scale-space theory. The SEUNet
contains groups of filters that are linear combinations of Gaussian basis
filters, whose scale parameters are trainable but constrained to span disjoint
scales through the layers of the network. Extensive experiments on a nuclei
segmentation dataset and a tissue type segmentation dataset demonstrate that
our method outperforms other approaches, with much fewer trainable parameters.
|
[
{
"version": "v1",
"created": "Mon, 10 Apr 2023 14:03:08 GMT"
}
] | 2023-04-11T00:00:00
|
[
[
"Yang",
"Yilong",
""
],
[
"Dasmahapatra",
"Srinandan",
""
],
[
"Mahmoodi",
"Sasan",
""
]
] |
TITLE: Scale-Equivariant UNet for Histopathology Image Segmentation
ABSTRACT: Digital histopathology slides are scanned and viewed under different
magnifications and stored as images at different resolutions. Convolutional
Neural Networks (CNNs) trained on such images at a given scale fail to
generalise to those at different scales. This inability is often addressed by
augmenting training data with re-scaled images, allowing a model with
sufficient capacity to learn the requisite patterns. Alternatively, designing
CNN filters to be scale-equivariant frees up model capacity to learn
discriminative features. In this paper, we propose the Scale-Equivariant UNet
(SEUNet) for image segmentation by building on scale-space theory. The SEUNet
contains groups of filters that are linear combinations of Gaussian basis
filters, whose scale parameters are trainable but constrained to span disjoint
scales through the layers of the network. Extensive experiments on a nuclei
segmentation dataset and a tissue type segmentation dataset demonstrate that
our method outperforms other approaches, with much fewer trainable parameters.
|
no_new_dataset
| 0.711262
|
2304.04600
|
Yilong Yang
|
Yilong Yang, Srinandan Dasmahapatra, Sasan Mahmoodi
|
Rotation-Scale Equivariant Steerable Filters
|
Accepted by MIDL 2023
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Incorporating either rotation equivariance or scale equivariance into CNNs
has proved to be effective in improving models' generalization performance.
However, jointly integrating rotation and scale equivariance into CNNs has not
been widely explored. Digital histology imaging of biopsy tissue can be
captured at arbitrary orientation and magnification and stored at different
resolutions, resulting in cells appearing in different scales. When
conventional CNNs are applied to histopathology image analysis, the
generalization performance of models is limited because 1) a part of the
parameters of filters are trained to fit rotation transformation, thus
decreasing the capability of learning other discriminative features; 2)
fixed-size filters trained on images at a given scale fail to generalize to
those at different scales. To deal with these issues, we propose the
Rotation-Scale Equivariant Steerable Filter (RSESF), which incorporates
steerable filters and scale-space theory. The RSESF contains copies of filters
that are linear combinations of Gaussian filters, whose direction is controlled
by directional derivatives and whose scale parameters are trainable but
constrained to span disjoint scales in successive layers of the network.
Extensive experiments on two gland segmentation datasets demonstrate that our
method outperforms other approaches, with much fewer trainable parameters and
fewer GPU resources required. The source code is available at:
https://github.com/ynulonger/RSESF.
|
[
{
"version": "v1",
"created": "Mon, 10 Apr 2023 14:13:56 GMT"
}
] | 2023-04-11T00:00:00
|
[
[
"Yang",
"Yilong",
""
],
[
"Dasmahapatra",
"Srinandan",
""
],
[
"Mahmoodi",
"Sasan",
""
]
] |
TITLE: Rotation-Scale Equivariant Steerable Filters
ABSTRACT: Incorporating either rotation equivariance or scale equivariance into CNNs
has proved to be effective in improving models' generalization performance.
However, jointly integrating rotation and scale equivariance into CNNs has not
been widely explored. Digital histology imaging of biopsy tissue can be
captured at arbitrary orientation and magnification and stored at different
resolutions, resulting in cells appearing in different scales. When
conventional CNNs are applied to histopathology image analysis, the
generalization performance of models is limited because 1) a part of the
parameters of filters are trained to fit rotation transformation, thus
decreasing the capability of learning other discriminative features; 2)
fixed-size filters trained on images at a given scale fail to generalize to
those at different scales. To deal with these issues, we propose the
Rotation-Scale Equivariant Steerable Filter (RSESF), which incorporates
steerable filters and scale-space theory. The RSESF contains copies of filters
that are linear combinations of Gaussian filters, whose direction is controlled
by directional derivatives and whose scale parameters are trainable but
constrained to span disjoint scales in successive layers of the network.
Extensive experiments on two gland segmentation datasets demonstrate that our
method outperforms other approaches, with much fewer trainable parameters and
fewer GPU resources required. The source code is available at:
https://github.com/ynulonger/RSESF.
|
no_new_dataset
| 0.710785
|
2304.04606
|
Abraham Smith
|
Abraham George Smith, Denis Kutn\'ar, Ivan Richter Vogelius, Sune
Darkner and Jens Petersen
|
Localise to segment: crop to improve organ at risk segmentation accuracy
| null | null | null | null |
eess.IV cs.CV
|
http://creativecommons.org/licenses/by/4.0/
|
Increased organ at risk segmentation accuracy is required to reduce cost and
complications for patients receiving radiotherapy treatment. Some deep learning
methods for the segmentation of organs at risk use a two stage process where a
localisation network first crops an image to the relevant region and then a
locally specialised network segments the cropped organ of interest. We
investigate the accuracy improvements brought about by such a localisation
stage by comparing to a single-stage baseline network trained on full
resolution images. We find that localisation approaches can improve both
training time and stability and a two stage process involving both a
localisation and organ segmentation network provides a significant increase in
segmentation accuracy for the spleen, pancreas and heart from the Medical
Segmentation Decathlon dataset. We also observe increased benefits of
localisation for smaller organs. Source code that recreates the main results is
available at \href{https://github.com/Abe404/localise_to_segment}{this https
URL}.
|
[
{
"version": "v1",
"created": "Mon, 10 Apr 2023 14:22:10 GMT"
}
] | 2023-04-11T00:00:00
|
[
[
"Smith",
"Abraham George",
""
],
[
"Kutnár",
"Denis",
""
],
[
"Vogelius",
"Ivan Richter",
""
],
[
"Darkner",
"Sune",
""
],
[
"Petersen",
"Jens",
""
]
] |
TITLE: Localise to segment: crop to improve organ at risk segmentation accuracy
ABSTRACT: Increased organ at risk segmentation accuracy is required to reduce cost and
complications for patients receiving radiotherapy treatment. Some deep learning
methods for the segmentation of organs at risk use a two stage process where a
localisation network first crops an image to the relevant region and then a
locally specialised network segments the cropped organ of interest. We
investigate the accuracy improvements brought about by such a localisation
stage by comparing to a single-stage baseline network trained on full
resolution images. We find that localisation approaches can improve both
training time and stability and a two stage process involving both a
localisation and organ segmentation network provides a significant increase in
segmentation accuracy for the spleen, pancreas and heart from the Medical
Segmentation Decathlon dataset. We also observe increased benefits of
localisation for smaller organs. Source code that recreates the main results is
available at \href{https://github.com/Abe404/localise_to_segment}{this https
URL}.
|
no_new_dataset
| 0.712795
|
2304.04610
|
Debashish Roy
|
Debashish Roy, Manish Shrivastava
|
Attention at SemEval-2023 Task 10: Explainable Detection of Online
Sexism (EDOS)
| null | null | null | null |
cs.CL
|
http://creativecommons.org/licenses/by/4.0/
|
In this paper, we have worked on interpretability, trust, and understanding
of the decisions made by models in the form of classification tasks. The task
is divided into 3 subtasks. The first task consists of determining Binary
Sexism Detection. The second task describes the Category of Sexism. The third
task describes a more Fine-grained Category of Sexism. Our work explores
solving these tasks as a classification problem by fine-tuning
transformer-based architecture. We have performed several experiments with our
architecture, including combining multiple transformers, using domain adaptive
pretraining on the unlabelled dataset provided by Reddit and Gab, Joint
learning, and taking different layers of transformers as input to a
classification head. Our system (with team name Attention) was able to achieve
a macro F1 score of 0.839 for task A, 0.5835 macro F1 score for task B and
0.3356 macro F1 score for task C at the Codalab SemEval Competition. Later we
improved the accuracy of Task B to 0.6228 and Task C to 0.3693 in the test set.
|
[
{
"version": "v1",
"created": "Mon, 10 Apr 2023 14:24:52 GMT"
}
] | 2023-04-11T00:00:00
|
[
[
"Roy",
"Debashish",
""
],
[
"Shrivastava",
"Manish",
""
]
] |
TITLE: Attention at SemEval-2023 Task 10: Explainable Detection of Online
Sexism (EDOS)
ABSTRACT: In this paper, we have worked on interpretability, trust, and understanding
of the decisions made by models in the form of classification tasks. The task
is divided into 3 subtasks. The first task consists of determining Binary
Sexism Detection. The second task describes the Category of Sexism. The third
task describes a more Fine-grained Category of Sexism. Our work explores
solving these tasks as a classification problem by fine-tuning
transformer-based architecture. We have performed several experiments with our
architecture, including combining multiple transformers, using domain adaptive
pretraining on the unlabelled dataset provided by Reddit and Gab, Joint
learning, and taking different layers of transformers as input to a
classification head. Our system (with team name Attention) was able to achieve
a macro F1 score of 0.839 for task A, 0.5835 macro F1 score for task B and
0.3356 macro F1 score for task C at the Codalab SemEval Competition. Later we
improved the accuracy of Task B to 0.6228 and Task C to 0.3693 in the test set.
|
no_new_dataset
| 0.709849
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.