id
large_stringlengths
9
16
submitter
large_stringlengths
3
64
authors
large_stringlengths
5
20.7k
title
large_stringlengths
5
245
comments
large_stringlengths
1
482
journal-ref
large_stringlengths
4
382
doi
large_stringlengths
9
151
report-no
large_stringlengths
2
509
categories
large_stringlengths
5
78
license
large_stringclasses
9 values
abstract
large_stringlengths
83
3.55k
versions
large listlengths
1
21
update_date
timestamp[ms]date
2007-05-23 00:00:00
2025-04-25 00:00:00
authors_parsed
large listlengths
1
1.35k
prompt
large_stringlengths
166
3.64k
label
stringclasses
2 values
prob
float64
0.5
0.98
1506.01115
Alexandros-Stavros Iliopoulos
Alexandros-Stavros Iliopoulos, Tiancheng Liu, Xiaobai Sun
Hyperspectral Image Classification and Clutter Detection via Multiple Structural Embeddings and Dimension Reductions
13 pages, 6 figures (30 images), submitted to International Conference on Computer Vision (ICCV) 2015
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a new and effective approach for Hyperspectral Image (HSI) classification and clutter detection, overcoming a few long-standing challenges presented by HSI data characteristics. Residing in a high-dimensional spectral attribute space, HSI data samples are known to be strongly correlated in their spectral signatures, exhibit nonlinear structure due to several physical laws, and contain uncertainty and noise from multiple sources. In the presented approach, we generate an adaptive, structurally enriched representation environment, and employ the locally linear embedding (LLE) in it. There are two structure layers external to LLE. One is feature space embedding: the HSI data attributes are embedded into a discriminatory feature space where spatio-spectral coherence and distinctive structures are distilled and exploited to mitigate various difficulties encountered in the native hyperspectral attribute space. The other structure layer encloses the ranges of algorithmic parameters for LLE and feature embedding, and supports a multiplexing and integrating scheme for contending with multi-source uncertainty. Experiments on two commonly used HSI datasets with a small number of learning samples have rendered remarkably high-accuracy classification results, as well as distinctive maps of detected clutter regions.
[ { "version": "v1", "created": "Wed, 3 Jun 2015 04:04:43 GMT" } ]
2015-06-04T00:00:00
[ [ "Iliopoulos", "Alexandros-Stavros", "" ], [ "Liu", "Tiancheng", "" ], [ "Sun", "Xiaobai", "" ] ]
TITLE: Hyperspectral Image Classification and Clutter Detection via Multiple Structural Embeddings and Dimension Reductions ABSTRACT: We present a new and effective approach for Hyperspectral Image (HSI) classification and clutter detection, overcoming a few long-standing challenges presented by HSI data characteristics. Residing in a high-dimensional spectral attribute space, HSI data samples are known to be strongly correlated in their spectral signatures, exhibit nonlinear structure due to several physical laws, and contain uncertainty and noise from multiple sources. In the presented approach, we generate an adaptive, structurally enriched representation environment, and employ the locally linear embedding (LLE) in it. There are two structure layers external to LLE. One is feature space embedding: the HSI data attributes are embedded into a discriminatory feature space where spatio-spectral coherence and distinctive structures are distilled and exploited to mitigate various difficulties encountered in the native hyperspectral attribute space. The other structure layer encloses the ranges of algorithmic parameters for LLE and feature embedding, and supports a multiplexing and integrating scheme for contending with multi-source uncertainty. Experiments on two commonly used HSI datasets with a small number of learning samples have rendered remarkably high-accuracy classification results, as well as distinctive maps of detected clutter regions.
no_new_dataset
0.947624
1506.01125
Zhun Zhong
Zhun Zhong, Zongmin Li, Runlin Li, Xiaoxia Sun
Unsupervised domain adaption dictionary learning for visual recognition
5 pages, 3 figures, ICIP 2015
null
null
null
cs.CV
http://creativecommons.org/licenses/by/3.0/
Over the last years, dictionary learning method has been extensively applied to deal with various computer vision recognition applications, and produced state-of-the-art results. However, when the data instances of a target domain have a different distribution than that of a source domain, the dictionary learning method may fail to perform well. In this paper, we address the cross-domain visual recognition problem and propose a simple but effective unsupervised domain adaption approach, where labeled data are only from source domain. In order to bring the original data in source and target domain into the same distribution, the proposed method forcing nearest coupled data between source and target domain to have identical sparse representations while jointly learning dictionaries for each domain, where the learned dictionaries can reconstruct original data in source and target domain respectively. So that sparse representations of original data can be used to perform visual recognition tasks. We demonstrate the effectiveness of our approach on standard datasets. Our method performs on par or better than competitive state-of-the-art methods.
[ { "version": "v1", "created": "Wed, 3 Jun 2015 05:21:37 GMT" } ]
2015-06-04T00:00:00
[ [ "Zhong", "Zhun", "" ], [ "Li", "Zongmin", "" ], [ "Li", "Runlin", "" ], [ "Sun", "Xiaoxia", "" ] ]
TITLE: Unsupervised domain adaption dictionary learning for visual recognition ABSTRACT: Over the last years, dictionary learning method has been extensively applied to deal with various computer vision recognition applications, and produced state-of-the-art results. However, when the data instances of a target domain have a different distribution than that of a source domain, the dictionary learning method may fail to perform well. In this paper, we address the cross-domain visual recognition problem and propose a simple but effective unsupervised domain adaption approach, where labeled data are only from source domain. In order to bring the original data in source and target domain into the same distribution, the proposed method forcing nearest coupled data between source and target domain to have identical sparse representations while jointly learning dictionaries for each domain, where the learned dictionaries can reconstruct original data in source and target domain respectively. So that sparse representations of original data can be used to perform visual recognition tasks. We demonstrate the effectiveness of our approach on standard datasets. Our method performs on par or better than competitive state-of-the-art methods.
no_new_dataset
0.952086
1506.01151
Mathieu Aubry
Mathieu Aubry and Bryan Russell
Understanding deep features with computer-generated imagery
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce an approach for analyzing the variation of features generated by convolutional neural networks (CNNs) with respect to scene factors that occur in natural images. Such factors may include object style, 3D viewpoint, color, and scene lighting configuration. Our approach analyzes CNN feature responses corresponding to different scene factors by controlling for them via rendering using a large database of 3D CAD models. The rendered images are presented to a trained CNN and responses for different layers are studied with respect to the input scene factors. We perform a decomposition of the responses based on knowledge of the input scene factors and analyze the resulting components. In particular, we quantify their relative importance in the CNN responses and visualize them using principal component analysis. We show qualitative and quantitative results of our study on three CNNs trained on large image datasets: AlexNet, Places, and Oxford VGG. We observe important differences across the networks and CNN layers for different scene factors and object categories. Finally, we demonstrate that our analysis based on computer-generated imagery translates to the network representation of natural images.
[ { "version": "v1", "created": "Wed, 3 Jun 2015 07:41:14 GMT" } ]
2015-06-04T00:00:00
[ [ "Aubry", "Mathieu", "" ], [ "Russell", "Bryan", "" ] ]
TITLE: Understanding deep features with computer-generated imagery ABSTRACT: We introduce an approach for analyzing the variation of features generated by convolutional neural networks (CNNs) with respect to scene factors that occur in natural images. Such factors may include object style, 3D viewpoint, color, and scene lighting configuration. Our approach analyzes CNN feature responses corresponding to different scene factors by controlling for them via rendering using a large database of 3D CAD models. The rendered images are presented to a trained CNN and responses for different layers are studied with respect to the input scene factors. We perform a decomposition of the responses based on knowledge of the input scene factors and analyze the resulting components. In particular, we quantify their relative importance in the CNN responses and visualize them using principal component analysis. We show qualitative and quantitative results of our study on three CNNs trained on large image datasets: AlexNet, Places, and Oxford VGG. We observe important differences across the networks and CNN layers for different scene factors and object categories. Finally, we demonstrate that our analysis based on computer-generated imagery translates to the network representation of natural images.
no_new_dataset
0.948537
1506.01330
Xiaojun Chang
Sen Wang, Feiping Nie, Xiaojun Chang, Lina Yao, Xue Li, Quan Z. Sheng
Unsupervised Feature Analysis with Class Margin Optimization
Accepted by European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases, ECML/PKDD 2015
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Unsupervised feature selection has been always attracting research attention in the communities of machine learning and data mining for decades. In this paper, we propose an unsupervised feature selection method seeking a feature coefficient matrix to select the most distinctive features. Specifically, our proposed algorithm integrates the Maximum Margin Criterion with a sparsity-based model into a joint framework, where the class margin and feature correlation are taken into account at the same time. To maximize the total data separability while preserving minimized within-class scatter simultaneously, we propose to embed Kmeans into the framework generating pseudo class label information in a scenario of unsupervised feature selection. Meanwhile, a sparsity-based model, ` 2 ,p-norm, is imposed to the regularization term to effectively discover the sparse structures of the feature coefficient matrix. In this way, noisy and irrelevant features are removed by ruling out those features whose corresponding coefficients are zeros. To alleviate the local optimum problem that is caused by random initializations of K-means, a convergence guaranteed algorithm with an updating strategy for the clustering indicator matrix, is proposed to iteractively chase the optimal solution. Performance evaluation is extensively conducted over six benchmark data sets. From plenty of experimental results, it is demonstrated that our method has superior performance against all other compared approaches.
[ { "version": "v1", "created": "Wed, 3 Jun 2015 17:49:52 GMT" } ]
2015-06-04T00:00:00
[ [ "Wang", "Sen", "" ], [ "Nie", "Feiping", "" ], [ "Chang", "Xiaojun", "" ], [ "Yao", "Lina", "" ], [ "Li", "Xue", "" ], [ "Sheng", "Quan Z.", "" ] ]
TITLE: Unsupervised Feature Analysis with Class Margin Optimization ABSTRACT: Unsupervised feature selection has been always attracting research attention in the communities of machine learning and data mining for decades. In this paper, we propose an unsupervised feature selection method seeking a feature coefficient matrix to select the most distinctive features. Specifically, our proposed algorithm integrates the Maximum Margin Criterion with a sparsity-based model into a joint framework, where the class margin and feature correlation are taken into account at the same time. To maximize the total data separability while preserving minimized within-class scatter simultaneously, we propose to embed Kmeans into the framework generating pseudo class label information in a scenario of unsupervised feature selection. Meanwhile, a sparsity-based model, ` 2 ,p-norm, is imposed to the regularization term to effectively discover the sparse structures of the feature coefficient matrix. In this way, noisy and irrelevant features are removed by ruling out those features whose corresponding coefficients are zeros. To alleviate the local optimum problem that is caused by random initializations of K-means, a convergence guaranteed algorithm with an updating strategy for the clustering indicator matrix, is proposed to iteractively chase the optimal solution. Performance evaluation is extensively conducted over six benchmark data sets. From plenty of experimental results, it is demonstrated that our method has superior performance against all other compared approaches.
no_new_dataset
0.947284
1111.5612
Vijayaraghavan Thirumalai
Vijayaraghavan Thirumalai, and Pascal Frossard
Distributed Representation of Geometrically Correlated Images with Compressed Linear Measurements
null
null
10.1109/TIP.2012.2188035
null
cs.CV cs.MM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper addresses the problem of distributed coding of images whose correlation is driven by the motion of objects or positioning of the vision sensors. It concentrates on the problem where images are encoded with compressed linear measurements. We propose a geometry-based correlation model in order to describe the common information in pairs of images. We assume that the constitutive components of natural images can be captured by visual features that undergo local transformations (e.g., translation) in different images. We first identify prominent visual features by computing a sparse approximation of a reference image with a dictionary of geometric basis functions. We then pose a regularized optimization problem to estimate the corresponding features in correlated images given by quantized linear measurements. The estimated features have to comply with the compressed information and to represent consistent transformation between images. The correlation model is given by the relative geometric transformations between corresponding features. We then propose an efficient joint decoding algorithm that estimates the compressed images such that they stay consistent with both the quantized measurements and the correlation model. Experimental results show that the proposed algorithm effectively estimates the correlation between images in multi-view datasets. In addition, the proposed algorithm provides effective decoding performance that compares advantageously to independent coding solutions as well as state-of-the-art distributed coding schemes based on disparity learning.
[ { "version": "v1", "created": "Wed, 23 Nov 2011 15:54:23 GMT" } ]
2015-06-03T00:00:00
[ [ "Thirumalai", "Vijayaraghavan", "" ], [ "Frossard", "Pascal", "" ] ]
TITLE: Distributed Representation of Geometrically Correlated Images with Compressed Linear Measurements ABSTRACT: This paper addresses the problem of distributed coding of images whose correlation is driven by the motion of objects or positioning of the vision sensors. It concentrates on the problem where images are encoded with compressed linear measurements. We propose a geometry-based correlation model in order to describe the common information in pairs of images. We assume that the constitutive components of natural images can be captured by visual features that undergo local transformations (e.g., translation) in different images. We first identify prominent visual features by computing a sparse approximation of a reference image with a dictionary of geometric basis functions. We then pose a regularized optimization problem to estimate the corresponding features in correlated images given by quantized linear measurements. The estimated features have to comply with the compressed information and to represent consistent transformation between images. The correlation model is given by the relative geometric transformations between corresponding features. We then propose an efficient joint decoding algorithm that estimates the compressed images such that they stay consistent with both the quantized measurements and the correlation model. Experimental results show that the proposed algorithm effectively estimates the correlation between images in multi-view datasets. In addition, the proposed algorithm provides effective decoding performance that compares advantageously to independent coding solutions as well as state-of-the-art distributed coding schemes based on disparity learning.
no_new_dataset
0.945147
1112.1224
Emanuele Massaro
E. Massaro, A. Guazzini, F. Bagnoli and P. Li\`o
Information dynamics algorithm for detecting communities in networks
Submitted to "Communication in Nonlinear Science and Numerical Simulation"
null
10.1016/j.cnsns.2012.03.023
null
physics.soc-ph cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The problem of community detection is relevant in many scientific disciplines, from social science to statistical physics. Given the impact of community detection in many areas, such as psychology and social sciences, we have addressed the issue of modifying existing well performing algorithms by incorporating elements of the domain application fields, i.e. domain-inspired. We have focused on a psychology and social network - inspired approach which may be useful for further strengthening the link between social network studies and mathematics of community detection. Here we introduce a community-detection algorithm derived from the van Dongen's Markov Cluster algorithm (MCL) method by considering networks' nodes as agents capable to take decisions. In this framework we have introduced a memory factor to mimic a typical human behavior such as the oblivion effect. The method is based on information diffusion and it includes a non-linear processing phase. We test our method on two classical community benchmark and on computer generated networks with known community structure. Our approach has three important features: the capacity of detecting overlapping communities, the capability of identifying communities from an individual point of view and the fine tuning the community detectability with respect to prior knowledge of the data. Finally we discuss how to use a Shannon entropy measure for parameter estimation in complex networks.
[ { "version": "v1", "created": "Tue, 6 Dec 2011 10:45:27 GMT" } ]
2015-06-03T00:00:00
[ [ "Massaro", "E.", "" ], [ "Guazzini", "A.", "" ], [ "Bagnoli", "F.", "" ], [ "Liò", "P.", "" ] ]
TITLE: Information dynamics algorithm for detecting communities in networks ABSTRACT: The problem of community detection is relevant in many scientific disciplines, from social science to statistical physics. Given the impact of community detection in many areas, such as psychology and social sciences, we have addressed the issue of modifying existing well performing algorithms by incorporating elements of the domain application fields, i.e. domain-inspired. We have focused on a psychology and social network - inspired approach which may be useful for further strengthening the link between social network studies and mathematics of community detection. Here we introduce a community-detection algorithm derived from the van Dongen's Markov Cluster algorithm (MCL) method by considering networks' nodes as agents capable to take decisions. In this framework we have introduced a memory factor to mimic a typical human behavior such as the oblivion effect. The method is based on information diffusion and it includes a non-linear processing phase. We test our method on two classical community benchmark and on computer generated networks with known community structure. Our approach has three important features: the capacity of detecting overlapping communities, the capability of identifying communities from an individual point of view and the fine tuning the community detectability with respect to prior knowledge of the data. Finally we discuss how to use a Shannon entropy measure for parameter estimation in complex networks.
no_new_dataset
0.944536
1112.2392
Jianguo Liu
Jian-Guo Liu, Tao Zhou, Qiang Guo
Information filtering via biased heat conduction
4 pages, 3 figures
Phys. Rev. E 87 (2011) 037101
10.1103/PhysRevE.84.037101
null
physics.data-an cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Heat conduction process has recently found its application in personalized recommendation [T. Zhou \emph{et al.}, PNAS 107, 4511 (2010)], which is of high diversity but low accuracy. By decreasing the temperatures of small-degree objects, we present an improved algorithm, called biased heat conduction (BHC), which could simultaneously enhance the accuracy and diversity. Extensive experimental analyses demonstrate that the accuracy on MovieLens, Netflix and Delicious datasets could be improved by 43.5%, 55.4% and 19.2% compared with the standard heat conduction algorithm, and the diversity is also increased or approximately unchanged. Further statistical analyses suggest that the present algorithm could simultaneously identify users' mainstream and special tastes, resulting in better performance than the standard heat conduction algorithm. This work provides a creditable way for highly efficient information filtering.
[ { "version": "v1", "created": "Sun, 11 Dec 2011 20:18:22 GMT" } ]
2015-06-03T00:00:00
[ [ "Liu", "Jian-Guo", "" ], [ "Zhou", "Tao", "" ], [ "Guo", "Qiang", "" ] ]
TITLE: Information filtering via biased heat conduction ABSTRACT: Heat conduction process has recently found its application in personalized recommendation [T. Zhou \emph{et al.}, PNAS 107, 4511 (2010)], which is of high diversity but low accuracy. By decreasing the temperatures of small-degree objects, we present an improved algorithm, called biased heat conduction (BHC), which could simultaneously enhance the accuracy and diversity. Extensive experimental analyses demonstrate that the accuracy on MovieLens, Netflix and Delicious datasets could be improved by 43.5%, 55.4% and 19.2% compared with the standard heat conduction algorithm, and the diversity is also increased or approximately unchanged. Further statistical analyses suggest that the present algorithm could simultaneously identify users' mainstream and special tastes, resulting in better performance than the standard heat conduction algorithm. This work provides a creditable way for highly efficient information filtering.
no_new_dataset
0.951188
1407.7443
Saurabh Joshi
Saurabh Joshi and Daniel Kroening
Property-Driven Fence Insertion using Reorder Bounded Model Checking
18 pages, 3 figures, 4 algorithms. Version change reason : new set of results and publication ready version of FM 2015
null
10.1007/978-3-319-19249-9_19
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Modern architectures provide weaker memory consistency guarantees than sequential consistency. These weaker guarantees allow programs to exhibit behaviours where the program statements appear to have executed out of program order. Fortunately, modern architectures provide memory barriers (fences) to enforce the program order between a pair of statements if needed. Due to the intricate semantics of weak memory models, the placement of fences is challenging even for experienced programmers. Too few fences lead to bugs whereas overuse of fences results in performance degradation. This motivates automated placement of fences. Tools that restore sequential consistency in the program may insert more fences than necessary for the program to be correct. Therefore, we propose a property-driven technique that introduces "reorder-bounded exploration" to identify the smallest number of program locations for fence placement. We implemented our technique on top of CBMC; however, in principle, our technique is generic enough to be used with any model checker. Our experimental results show that our technique is faster and solves more instances of relevant benchmarks as compared to earlier approaches.
[ { "version": "v1", "created": "Mon, 28 Jul 2014 15:27:10 GMT" }, { "version": "v2", "created": "Tue, 9 Dec 2014 18:21:28 GMT" }, { "version": "v3", "created": "Mon, 1 Jun 2015 20:39:01 GMT" } ]
2015-06-03T00:00:00
[ [ "Joshi", "Saurabh", "" ], [ "Kroening", "Daniel", "" ] ]
TITLE: Property-Driven Fence Insertion using Reorder Bounded Model Checking ABSTRACT: Modern architectures provide weaker memory consistency guarantees than sequential consistency. These weaker guarantees allow programs to exhibit behaviours where the program statements appear to have executed out of program order. Fortunately, modern architectures provide memory barriers (fences) to enforce the program order between a pair of statements if needed. Due to the intricate semantics of weak memory models, the placement of fences is challenging even for experienced programmers. Too few fences lead to bugs whereas overuse of fences results in performance degradation. This motivates automated placement of fences. Tools that restore sequential consistency in the program may insert more fences than necessary for the program to be correct. Therefore, we propose a property-driven technique that introduces "reorder-bounded exploration" to identify the smallest number of program locations for fence placement. We implemented our technique on top of CBMC; however, in principle, our technique is generic enough to be used with any model checker. Our experimental results show that our technique is faster and solves more instances of relevant benchmarks as compared to earlier approaches.
no_new_dataset
0.949295
1506.00765
Rongrong Ji Rongrong Ji
Zheng Cai, Donglin Cao, Rongrong Ji
Video (GIF) Sentiment Analysis using Large-Scale Mid-Level Ontology
null
null
null
null
cs.MM cs.CL cs.IR
http://creativecommons.org/licenses/by/3.0/
With faster connection speed, Internet users are now making social network a huge reservoir of texts, images and video clips (GIF). Sentiment analysis for such online platform can be used to predict political elections, evaluates economic indicators and so on. However, GIF sentiment analysis is quite challenging, not only because it hinges on spatio-temporal visual contentabstraction, but also for the relationship between such abstraction and final sentiment remains unknown.In this paper, we dedicated to find out such relationship.We proposed a SentiPairSequence basedspatiotemporal visual sentiment ontology, which forms the midlevel representations for GIFsentiment. The establishment process of SentiPair contains two steps. First, we construct the Synset Forest to define the semantic tree structure of visual sentiment label elements. Then, through theSynset Forest, we organically select and combine sentiment label elements to form a mid-level visual sentiment representation. Our experiments indicate that SentiPair outperforms other competing mid-level attributes. Using SentiPair, our analysis frameworkcan achieve satisfying prediction accuracy (72.6%). We also opened ourdataset (GSO-2015) to the research community. GSO-2015 contains more than 6,000 manually annotated GIFs out of more than 40,000 candidates. Each is labeled with both sentiment and SentiPair Sequence.
[ { "version": "v1", "created": "Tue, 2 Jun 2015 06:31:57 GMT" } ]
2015-06-03T00:00:00
[ [ "Cai", "Zheng", "" ], [ "Cao", "Donglin", "" ], [ "Ji", "Rongrong", "" ] ]
TITLE: Video (GIF) Sentiment Analysis using Large-Scale Mid-Level Ontology ABSTRACT: With faster connection speed, Internet users are now making social network a huge reservoir of texts, images and video clips (GIF). Sentiment analysis for such online platform can be used to predict political elections, evaluates economic indicators and so on. However, GIF sentiment analysis is quite challenging, not only because it hinges on spatio-temporal visual contentabstraction, but also for the relationship between such abstraction and final sentiment remains unknown.In this paper, we dedicated to find out such relationship.We proposed a SentiPairSequence basedspatiotemporal visual sentiment ontology, which forms the midlevel representations for GIFsentiment. The establishment process of SentiPair contains two steps. First, we construct the Synset Forest to define the semantic tree structure of visual sentiment label elements. Then, through theSynset Forest, we organically select and combine sentiment label elements to form a mid-level visual sentiment representation. Our experiments indicate that SentiPair outperforms other competing mid-level attributes. Using SentiPair, our analysis frameworkcan achieve satisfying prediction accuracy (72.6%). We also opened ourdataset (GSO-2015) to the research community. GSO-2015 contains more than 6,000 manually annotated GIFs out of more than 40,000 candidates. Each is labeled with both sentiment and SentiPair Sequence.
new_dataset
0.952706
1506.00770
Carlos Herrera-Yag\"ue
C. Herrera-Yag\"ue, C.M. Schneider, T. Couronn\'e, Z. Smoreda, R.M. Benito, P.J. Zufiria and M.C. Gonz\'alez
The anatomy of urban social networks and its implications in the searchability problem
null
null
null
null
physics.soc-ph cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The appearance of large geolocated communication datasets has recently increased our understanding of how social networks relate to their physical space. However, many recurrently reported properties, such as the spatial clustering of network communities, have not yet been systematically tested at different scales. In this work we analyze the social network structure of over 25 million phone users from three countries at three different scales: country, provinces and cities. We consistently find that this last urban scenario presents significant differences to common knowledge about social networks. First, the emergence of a giant component in the network seems to be controlled by whether or not the network spans over the entire urban border, almost independently of the population or geographic extension of the city. Second, urban communities are much less geographically clustered than expected. These two findings shed new light on the widely-studied searchability in self-organized networks. By exhaustive simulation of decentralized search strategies we conclude that urban networks are searchable not through geographical proximity as their country-wide counterparts, but through an homophily-driven community structure.
[ { "version": "v1", "created": "Tue, 2 Jun 2015 06:48:16 GMT" } ]
2015-06-03T00:00:00
[ [ "Herrera-Yagüe", "C.", "" ], [ "Schneider", "C. M.", "" ], [ "Couronné", "T.", "" ], [ "Smoreda", "Z.", "" ], [ "Benito", "R. M.", "" ], [ "Zufiria", "P. J.", "" ], [ "González", "M. C.", "" ] ]
TITLE: The anatomy of urban social networks and its implications in the searchability problem ABSTRACT: The appearance of large geolocated communication datasets has recently increased our understanding of how social networks relate to their physical space. However, many recurrently reported properties, such as the spatial clustering of network communities, have not yet been systematically tested at different scales. In this work we analyze the social network structure of over 25 million phone users from three countries at three different scales: country, provinces and cities. We consistently find that this last urban scenario presents significant differences to common knowledge about social networks. First, the emergence of a giant component in the network seems to be controlled by whether or not the network spans over the entire urban border, almost independently of the population or geographic extension of the city. Second, urban communities are much less geographically clustered than expected. These two findings shed new light on the widely-studied searchability in self-organized networks. By exhaustive simulation of decentralized search strategies we conclude that urban networks are searchable not through geographical proximity as their country-wide counterparts, but through an homophily-driven community structure.
no_new_dataset
0.942612
1506.00893
Joana C\^orte-Real
Joana C\^orte-Real and Theofrastos Mantadelis and In\^es Dutra and Ricardo Rocha
SkILL - a Stochastic Inductive Logic Learner
null
null
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Probabilistic Inductive Logic Programming (PILP) is a rel- atively unexplored area of Statistical Relational Learning which extends classic Inductive Logic Programming (ILP). This work introduces SkILL, a Stochastic Inductive Logic Learner, which takes probabilistic annotated data and produces First Order Logic theories. Data in several domains such as medicine and bioinformatics have an inherent degree of uncer- tainty, that can be used to produce models closer to reality. SkILL can not only use this type of probabilistic data to extract non-trivial knowl- edge from databases, but it also addresses efficiency issues by introducing a novel, efficient and effective search strategy to guide the search in PILP environments. The capabilities of SkILL are demonstrated in three dif- ferent datasets: (i) a synthetic toy example used to validate the system, (ii) a probabilistic adaptation of a well-known biological metabolism ap- plication, and (iii) a real world medical dataset in the breast cancer domain. Results show that SkILL can perform as well as a deterministic ILP learner, while also being able to incorporate probabilistic knowledge that would otherwise not be considered.
[ { "version": "v1", "created": "Tue, 2 Jun 2015 14:10:02 GMT" } ]
2015-06-03T00:00:00
[ [ "Côrte-Real", "Joana", "" ], [ "Mantadelis", "Theofrastos", "" ], [ "Dutra", "Inês", "" ], [ "Rocha", "Ricardo", "" ] ]
TITLE: SkILL - a Stochastic Inductive Logic Learner ABSTRACT: Probabilistic Inductive Logic Programming (PILP) is a rel- atively unexplored area of Statistical Relational Learning which extends classic Inductive Logic Programming (ILP). This work introduces SkILL, a Stochastic Inductive Logic Learner, which takes probabilistic annotated data and produces First Order Logic theories. Data in several domains such as medicine and bioinformatics have an inherent degree of uncer- tainty, that can be used to produce models closer to reality. SkILL can not only use this type of probabilistic data to extract non-trivial knowl- edge from databases, but it also addresses efficiency issues by introducing a novel, efficient and effective search strategy to guide the search in PILP environments. The capabilities of SkILL are demonstrated in three dif- ferent datasets: (i) a synthetic toy example used to validate the system, (ii) a probabilistic adaptation of a well-known biological metabolism ap- plication, and (iii) a real world medical dataset in the breast cancer domain. Results show that SkILL can perform as well as a deterministic ILP learner, while also being able to incorporate probabilistic knowledge that would otherwise not be considered.
no_new_dataset
0.69766
1506.00999
Antoine Bordes
Alberto Garcia-Duran, Antoine Bordes, Nicolas Usunier, Yves Grandvalet
Combining Two And Three-Way Embeddings Models for Link Prediction in Knowledge Bases
26 pages
null
null
null
cs.AI cs.CL cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper tackles the problem of endogenous link prediction for Knowledge Base completion. Knowledge Bases can be represented as directed graphs whose nodes correspond to entities and edges to relationships. Previous attempts either consist of powerful systems with high capacity to model complex connectivity patterns, which unfortunately usually end up overfitting on rare relationships, or in approaches that trade capacity for simplicity in order to fairly model all relationships, frequent or not. In this paper, we propose Tatec a happy medium obtained by complementing a high-capacity model with a simpler one, both pre-trained separately and then combined. We present several variants of this model with different kinds of regularization and combination strategies and show that this approach outperforms existing methods on different types of relationships by achieving state-of-the-art results on four benchmarks of the literature.
[ { "version": "v1", "created": "Tue, 2 Jun 2015 19:34:19 GMT" } ]
2015-06-03T00:00:00
[ [ "Garcia-Duran", "Alberto", "" ], [ "Bordes", "Antoine", "" ], [ "Usunier", "Nicolas", "" ], [ "Grandvalet", "Yves", "" ] ]
TITLE: Combining Two And Three-Way Embeddings Models for Link Prediction in Knowledge Bases ABSTRACT: This paper tackles the problem of endogenous link prediction for Knowledge Base completion. Knowledge Bases can be represented as directed graphs whose nodes correspond to entities and edges to relationships. Previous attempts either consist of powerful systems with high capacity to model complex connectivity patterns, which unfortunately usually end up overfitting on rare relationships, or in approaches that trade capacity for simplicity in order to fairly model all relationships, frequent or not. In this paper, we propose Tatec a happy medium obtained by complementing a high-capacity model with a simpler one, both pre-trained separately and then combined. We present several variants of this model with different kinds of regularization and combination strategies and show that this approach outperforms existing methods on different types of relationships by achieving state-of-the-art results on four benchmarks of the literature.
no_new_dataset
0.945096
1401.8269
Peter Turney
Peter D. Turney and Saif M. Mohammad
Experiments with Three Approaches to Recognizing Lexical Entailment
to appear in Natural Language Engineering
Natural Language Engineering, 21 (3), (2015), 437-476
10.1017/S1351324913000387
null
cs.CL cs.AI cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Inference in natural language often involves recognizing lexical entailment (RLE); that is, identifying whether one word entails another. For example, "buy" entails "own". Two general strategies for RLE have been proposed: One strategy is to manually construct an asymmetric similarity measure for context vectors (directional similarity) and another is to treat RLE as a problem of learning to recognize semantic relations using supervised machine learning techniques (relation classification). In this paper, we experiment with two recent state-of-the-art representatives of the two general strategies. The first approach is an asymmetric similarity measure (an instance of the directional similarity strategy), designed to capture the degree to which the contexts of a word, a, form a subset of the contexts of another word, b. The second approach (an instance of the relation classification strategy) represents a word pair, a:b, with a feature vector that is the concatenation of the context vectors of a and b, and then applies supervised learning to a training set of labeled feature vectors. Additionally, we introduce a third approach that is a new instance of the relation classification strategy. The third approach represents a word pair, a:b, with a feature vector in which the features are the differences in the similarities of a and b to a set of reference words. All three approaches use vector space models (VSMs) of semantics, based on word-context matrices. We perform an extensive evaluation of the three approaches using three different datasets. The proposed new approach (similarity differences) performs significantly better than the other two approaches on some datasets and there is no dataset for which it is significantly worse. Our results suggest it is beneficial to make connections between the research in lexical entailment and the research in semantic relation classification.
[ { "version": "v1", "created": "Fri, 31 Jan 2014 19:42:19 GMT" } ]
2015-06-02T00:00:00
[ [ "Turney", "Peter D.", "" ], [ "Mohammad", "Saif M.", "" ] ]
TITLE: Experiments with Three Approaches to Recognizing Lexical Entailment ABSTRACT: Inference in natural language often involves recognizing lexical entailment (RLE); that is, identifying whether one word entails another. For example, "buy" entails "own". Two general strategies for RLE have been proposed: One strategy is to manually construct an asymmetric similarity measure for context vectors (directional similarity) and another is to treat RLE as a problem of learning to recognize semantic relations using supervised machine learning techniques (relation classification). In this paper, we experiment with two recent state-of-the-art representatives of the two general strategies. The first approach is an asymmetric similarity measure (an instance of the directional similarity strategy), designed to capture the degree to which the contexts of a word, a, form a subset of the contexts of another word, b. The second approach (an instance of the relation classification strategy) represents a word pair, a:b, with a feature vector that is the concatenation of the context vectors of a and b, and then applies supervised learning to a training set of labeled feature vectors. Additionally, we introduce a third approach that is a new instance of the relation classification strategy. The third approach represents a word pair, a:b, with a feature vector in which the features are the differences in the similarities of a and b to a set of reference words. All three approaches use vector space models (VSMs) of semantics, based on word-context matrices. We perform an extensive evaluation of the three approaches using three different datasets. The proposed new approach (similarity differences) performs significantly better than the other two approaches on some datasets and there is no dataset for which it is significantly worse. Our results suggest it is beneficial to make connections between the research in lexical entailment and the research in semantic relation classification.
no_new_dataset
0.949389
1409.7480
Mohamed Elhoseiny Mohamed Elhoseiny
Mohamed Elhoseiny, Ahmed Elgammal
Generalized Twin Gaussian Processes using Sharma-Mittal Divergence
This work got accepted for Publication in the Machine Learning Journal 2015. The work is scheduled for presentation at ECML-PKDD 2015 journal track papers
null
null
null
cs.LG cs.CV stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
There has been a growing interest in mutual information measures due to their wide range of applications in Machine Learning and Computer Vision. In this paper, we present a generalized structured regression framework based on Shama-Mittal divergence, a relative entropy measure, which is introduced to the Machine Learning community in this work. Sharma-Mittal (SM) divergence is a generalized mutual information measure for the widely used R\'enyi, Tsallis, Bhattacharyya, and Kullback-Leibler (KL) relative entropies. Specifically, we study Sharma-Mittal divergence as a cost function in the context of the Twin Gaussian Processes (TGP)~\citep{Bo:2010}, which generalizes over the KL-divergence without computational penalty. We show interesting properties of Sharma-Mittal TGP (SMTGP) through a theoretical analysis, which covers missing insights in the traditional TGP formulation. However, we generalize this theory based on SM-divergence instead of KL-divergence which is a special case. Experimentally, we evaluated the proposed SMTGP framework on several datasets. The results show that SMTGP reaches better predictions than KL-based TGP, since it offers a bigger class of models through its parameters that we learn from the data.
[ { "version": "v1", "created": "Fri, 26 Sep 2014 06:46:38 GMT" }, { "version": "v2", "created": "Wed, 1 Oct 2014 13:32:50 GMT" }, { "version": "v3", "created": "Fri, 3 Oct 2014 03:54:41 GMT" }, { "version": "v4", "created": "Mon, 6 Oct 2014 03:47:51 GMT" }, { "version": "v5", "created": "Mon, 1 Jun 2015 06:30:29 GMT" } ]
2015-06-02T00:00:00
[ [ "Elhoseiny", "Mohamed", "" ], [ "Elgammal", "Ahmed", "" ] ]
TITLE: Generalized Twin Gaussian Processes using Sharma-Mittal Divergence ABSTRACT: There has been a growing interest in mutual information measures due to their wide range of applications in Machine Learning and Computer Vision. In this paper, we present a generalized structured regression framework based on Shama-Mittal divergence, a relative entropy measure, which is introduced to the Machine Learning community in this work. Sharma-Mittal (SM) divergence is a generalized mutual information measure for the widely used R\'enyi, Tsallis, Bhattacharyya, and Kullback-Leibler (KL) relative entropies. Specifically, we study Sharma-Mittal divergence as a cost function in the context of the Twin Gaussian Processes (TGP)~\citep{Bo:2010}, which generalizes over the KL-divergence without computational penalty. We show interesting properties of Sharma-Mittal TGP (SMTGP) through a theoretical analysis, which covers missing insights in the traditional TGP formulation. However, we generalize this theory based on SM-divergence instead of KL-divergence which is a special case. Experimentally, we evaluated the proposed SMTGP framework on several datasets. The results show that SMTGP reaches better predictions than KL-based TGP, since it offers a bigger class of models through its parameters that we learn from the data.
no_new_dataset
0.948537
1412.2197
Liangliang Cao
Liangliang Cao and Chang Wang
Practice in Synonym Extraction at Large Scale
This paper has been withdrawn by the author since the experimental results are not good enough
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Synonym extraction is an important task in natural language processing and often used as a submodule in query expansion, question answering and other applications. Automatic synonym extractor is highly preferred for large scale applications. Previous studies in synonym extraction are most limited to small scale datasets. In this paper, we build a large dataset with 3.4 million synonym/non-synonym pairs to capture the challenges in real world scenarios. We proposed (1) a new cost function to accommodate the unbalanced learning problem, and (2) a feature learning based deep neural network to model the complicated relationships in synonym pairs. We compare several different approaches based on SVMs and neural networks, and find out a novel feature learning based neural network outperforms the methods with hand-assigned features. Specifically, the best performance of our model surpasses the SVM baseline with a significant 97\% relative improvement.
[ { "version": "v1", "created": "Sat, 6 Dec 2014 04:40:18 GMT" }, { "version": "v2", "created": "Thu, 18 Dec 2014 16:49:44 GMT" }, { "version": "v3", "created": "Mon, 1 Jun 2015 19:55:17 GMT" } ]
2015-06-02T00:00:00
[ [ "Cao", "Liangliang", "" ], [ "Wang", "Chang", "" ] ]
TITLE: Practice in Synonym Extraction at Large Scale ABSTRACT: Synonym extraction is an important task in natural language processing and often used as a submodule in query expansion, question answering and other applications. Automatic synonym extractor is highly preferred for large scale applications. Previous studies in synonym extraction are most limited to small scale datasets. In this paper, we build a large dataset with 3.4 million synonym/non-synonym pairs to capture the challenges in real world scenarios. We proposed (1) a new cost function to accommodate the unbalanced learning problem, and (2) a feature learning based deep neural network to model the complicated relationships in synonym pairs. We compare several different approaches based on SVMs and neural networks, and find out a novel feature learning based neural network outperforms the methods with hand-assigned features. Specifically, the best performance of our model surpasses the SVM baseline with a significant 97\% relative improvement.
new_dataset
0.961244
1503.06772
Abigail Jacobs
Abigail Z. Jacobs, Samuel F. Way, Johan Ugander and Aaron Clauset
Assembling thefacebook: Using heterogeneity to understand online social network assembly
13 pages, 11 figures, Proceedings of the 7th Annual ACM Web Science Conference (WebSci), 2015
null
10.1145/2786451.2786477
null
cs.SI physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Online social networks represent a popular and diverse class of social media systems. Despite this variety, each of these systems undergoes a general process of online social network assembly, which represents the complicated and heterogeneous changes that transform newly born systems into mature platforms. However, little is known about this process. For example, how much of a network's assembly is driven by simple growth? How does a network's structure change as it matures? How does network structure vary with adoption rates and user heterogeneity, and do these properties play different roles at different points in the assembly? We investigate these and other questions using a unique dataset of online connections among the roughly one million users at the first 100 colleges admitted to Facebook, captured just 20 months after its launch. We first show that different vintages and adoption rates across this population of networks reveal temporal dynamics of the assembly process, and that assembly is only loosely related to network growth. We then exploit natural experiments embedded in this dataset and complementary data obtained via Internet archaeology to show that different subnetworks matured at different rates toward similar end states. These results shed light on the processes and patterns of online social network assembly, and may facilitate more effective design for online social systems.
[ { "version": "v1", "created": "Mon, 23 Mar 2015 19:13:27 GMT" }, { "version": "v2", "created": "Sun, 31 May 2015 20:24:02 GMT" } ]
2015-06-02T00:00:00
[ [ "Jacobs", "Abigail Z.", "" ], [ "Way", "Samuel F.", "" ], [ "Ugander", "Johan", "" ], [ "Clauset", "Aaron", "" ] ]
TITLE: Assembling thefacebook: Using heterogeneity to understand online social network assembly ABSTRACT: Online social networks represent a popular and diverse class of social media systems. Despite this variety, each of these systems undergoes a general process of online social network assembly, which represents the complicated and heterogeneous changes that transform newly born systems into mature platforms. However, little is known about this process. For example, how much of a network's assembly is driven by simple growth? How does a network's structure change as it matures? How does network structure vary with adoption rates and user heterogeneity, and do these properties play different roles at different points in the assembly? We investigate these and other questions using a unique dataset of online connections among the roughly one million users at the first 100 colleges admitted to Facebook, captured just 20 months after its launch. We first show that different vintages and adoption rates across this population of networks reveal temporal dynamics of the assembly process, and that assembly is only loosely related to network growth. We then exploit natural experiments embedded in this dataset and complementary data obtained via Internet archaeology to show that different subnetworks matured at different rates toward similar end states. These results shed light on the processes and patterns of online social network assembly, and may facilitate more effective design for online social systems.
new_dataset
0.747386
1504.00905
Jose Lopez
Jose A. Lopez, Octavia Camps, Mario Sznaier
Robust Anomaly Detection Using Semidefinite Programming
13 pages, 11 figures
null
null
null
math.OC cs.CV cs.LG cs.SY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents a new approach, based on polynomial optimization and the method of moments, to the problem of anomaly detection. The proposed technique only requires information about the statistical moments of the normal-state distribution of the features of interest and compares favorably with existing approaches (such as Parzen windows and 1-class SVM). In addition, it provides a succinct description of the normal state. Thus, it leads to a substantial simplification of the the anomaly detection problem when working with higher dimensional datasets.
[ { "version": "v1", "created": "Fri, 3 Apr 2015 18:20:36 GMT" }, { "version": "v2", "created": "Sat, 30 May 2015 15:58:36 GMT" } ]
2015-06-02T00:00:00
[ [ "Lopez", "Jose A.", "" ], [ "Camps", "Octavia", "" ], [ "Sznaier", "Mario", "" ] ]
TITLE: Robust Anomaly Detection Using Semidefinite Programming ABSTRACT: This paper presents a new approach, based on polynomial optimization and the method of moments, to the problem of anomaly detection. The proposed technique only requires information about the statistical moments of the normal-state distribution of the features of interest and compares favorably with existing approaches (such as Parzen windows and 1-class SVM). In addition, it provides a succinct description of the normal state. Thus, it leads to a substantial simplification of the the anomaly detection problem when working with higher dimensional datasets.
no_new_dataset
0.950686
1506.00022
Xiaohan Zhao
Xiaohan Zhao, Qingyun Liu, Lin Zhou, Haitao Zheng and Ben Y. Zhao
Graph Watermarks
16 pages, 14 figures, full version
null
null
null
cs.CR cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
From network topologies to online social networks, many of today's most sensitive datasets are captured in large graphs. A significant challenge facing owners of these datasets is how to share sensitive graphs with collaborators and authorized users, e.g. network topologies with network equipment vendors or Facebook's social graphs with academic collaborators. Current tools can provide limited node or edge privacy, but require modifications to the graph that significantly reduce its utility. In this work, we propose a new alternative in the form of graph watermarks. Graph watermarks are small graphs tailor-made for a given graph dataset, a secure graph key, and a secure user key. To share a sensitive graph G with a collaborator C, the owner generates a watermark graph W using G, the graph key, and C's key as input, and embeds W into G to form G'. If G' is leaked by C,its owner can reliably determine if the watermark W generated for C does in fact reside inside G', thereby proving C is responsible for the leak. Graph watermarks serve both as a deterrent against data leakage and a method of recourse after a leak. We provide robust schemes for creating, embedding and extracting watermarks, and use analysis and experiments on large, real graphs to show that they are unique and difficult to forge. We study the robustness of graph watermarks against both single and powerful colluding attacker models, then propose and empirically evaluate mechanisms to dramatically improve resilience.
[ { "version": "v1", "created": "Fri, 29 May 2015 20:29:04 GMT" } ]
2015-06-02T00:00:00
[ [ "Zhao", "Xiaohan", "" ], [ "Liu", "Qingyun", "" ], [ "Zhou", "Lin", "" ], [ "Zheng", "Haitao", "" ], [ "Zhao", "Ben Y.", "" ] ]
TITLE: Graph Watermarks ABSTRACT: From network topologies to online social networks, many of today's most sensitive datasets are captured in large graphs. A significant challenge facing owners of these datasets is how to share sensitive graphs with collaborators and authorized users, e.g. network topologies with network equipment vendors or Facebook's social graphs with academic collaborators. Current tools can provide limited node or edge privacy, but require modifications to the graph that significantly reduce its utility. In this work, we propose a new alternative in the form of graph watermarks. Graph watermarks are small graphs tailor-made for a given graph dataset, a secure graph key, and a secure user key. To share a sensitive graph G with a collaborator C, the owner generates a watermark graph W using G, the graph key, and C's key as input, and embeds W into G to form G'. If G' is leaked by C,its owner can reliably determine if the watermark W generated for C does in fact reside inside G', thereby proving C is responsible for the leak. Graph watermarks serve both as a deterrent against data leakage and a method of recourse after a leak. We provide robust schemes for creating, embedding and extracting watermarks, and use analysis and experiments on large, real graphs to show that they are unique and difficult to forge. We study the robustness of graph watermarks against both single and powerful colluding attacker models, then propose and empirically evaluate mechanisms to dramatically improve resilience.
no_new_dataset
0.934873
1506.00102
Pau Bellot
Pau Bellot, Patrick E. Meyer
Efficient combination of pairswise feature networks
JMLR: Workshop and Conference Proceedings, 2014 Connectomics (ECML 2014)
null
null
null
stat.ML cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents a novel method for the reconstruction of a neural network connectivity using calcium fluorescence data. We introduce a fast unsupervised method to integrate different networks that reconstructs structural connectivity from neuron activity. Our method improves the state-of-the-art reconstruction method General Transfer Entropy (GTE). We are able to better eliminate indirect links, improving therefore the quality of the network via a normalization and ensemble process of GTE and three new informative features. The approach is based on a simple combination of networks, which is remarkably fast. The performance of our approach is benchmarked on simulated time series provided at the connectomics challenge and also submitted at the public competition.
[ { "version": "v1", "created": "Sat, 30 May 2015 10:31:31 GMT" } ]
2015-06-02T00:00:00
[ [ "Bellot", "Pau", "" ], [ "Meyer", "Patrick E.", "" ] ]
TITLE: Efficient combination of pairswise feature networks ABSTRACT: This paper presents a novel method for the reconstruction of a neural network connectivity using calcium fluorescence data. We introduce a fast unsupervised method to integrate different networks that reconstructs structural connectivity from neuron activity. Our method improves the state-of-the-art reconstruction method General Transfer Entropy (GTE). We are able to better eliminate indirect links, improving therefore the quality of the network via a normalization and ensemble process of GTE and three new informative features. The approach is based on a simple combination of networks, which is remarkably fast. The performance of our approach is benchmarked on simulated time series provided at the connectomics challenge and also submitted at the public competition.
no_new_dataset
0.949342
1506.00176
Lianwen Jin
Liquan Qiu, Lianwen Jin, Ruifen Dai, Yuxiang Zhang, Lei Li
An Open Source Testing Tool for Evaluating Handwriting Input Methods
5 pages, 3 figures, 11 tables. Accepted to appear at ICDAR 2015
null
null
null
cs.HC cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents an open source tool for testing the recognition accuracy of Chinese handwriting input methods. The tool consists of two modules, namely the PC and Android mobile client. The PC client reads handwritten samples in the computer, and transfers them individually to the Android client in accordance with the socket communication protocol. After the Android client receives the data, it simulates the handwriting on screen of client device, and triggers the corresponding handwriting recognition method. The recognition accuracy is recorded by the Android client. We present the design principles and describe the implementation of the test platform. We construct several test datasets for evaluating different handwriting recognition systems, and conduct an objective and comprehensive test using six Chinese handwriting input methods with five datasets. The test results for the recognition accuracy are then compared and analyzed.
[ { "version": "v1", "created": "Sat, 30 May 2015 22:35:55 GMT" } ]
2015-06-02T00:00:00
[ [ "Qiu", "Liquan", "" ], [ "Jin", "Lianwen", "" ], [ "Dai", "Ruifen", "" ], [ "Zhang", "Yuxiang", "" ], [ "Li", "Lei", "" ] ]
TITLE: An Open Source Testing Tool for Evaluating Handwriting Input Methods ABSTRACT: This paper presents an open source tool for testing the recognition accuracy of Chinese handwriting input methods. The tool consists of two modules, namely the PC and Android mobile client. The PC client reads handwritten samples in the computer, and transfers them individually to the Android client in accordance with the socket communication protocol. After the Android client receives the data, it simulates the handwriting on screen of client device, and triggers the corresponding handwriting recognition method. The recognition accuracy is recorded by the Android client. We present the design principles and describe the implementation of the test platform. We construct several test datasets for evaluating different handwriting recognition systems, and conduct an objective and comprehensive test using six Chinese handwriting input methods with five datasets. The test results for the recognition accuracy are then compared and analyzed.
new_dataset
0.953275
1506.00195
Kaisheng Yao
Baolin Peng and Kaisheng Yao
Recurrent Neural Networks with External Memory for Language Understanding
submitted to Interspeech 2015
null
null
null
cs.CL cs.AI cs.LG cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recurrent Neural Networks (RNNs) have become increasingly popular for the task of language understanding. In this task, a semantic tagger is deployed to associate a semantic label to each word in an input sequence. The success of RNN may be attributed to its ability to memorize long-term dependence that relates the current-time semantic label prediction to the observations many time instances away. However, the memory capacity of simple RNNs is limited because of the gradient vanishing and exploding problem. We propose to use an external memory to improve memorization capability of RNNs. We conducted experiments on the ATIS dataset, and observed that the proposed model was able to achieve the state-of-the-art results. We compare our proposed model with alternative models and report analysis results that may provide insights for future research.
[ { "version": "v1", "created": "Sun, 31 May 2015 05:10:03 GMT" } ]
2015-06-02T00:00:00
[ [ "Peng", "Baolin", "" ], [ "Yao", "Kaisheng", "" ] ]
TITLE: Recurrent Neural Networks with External Memory for Language Understanding ABSTRACT: Recurrent Neural Networks (RNNs) have become increasingly popular for the task of language understanding. In this task, a semantic tagger is deployed to associate a semantic label to each word in an input sequence. The success of RNN may be attributed to its ability to memorize long-term dependence that relates the current-time semantic label prediction to the observations many time instances away. However, the memory capacity of simple RNNs is limited because of the gradient vanishing and exploding problem. We propose to use an external memory to improve memorization capability of RNNs. We conducted experiments on the ATIS dataset, and observed that the proposed model was able to achieve the state-of-the-art results. We compare our proposed model with alternative models and report analysis results that may provide insights for future research.
no_new_dataset
0.944689
1506.00242
Zhiwei Steven Wu
Michael Kearns, Aaron Roth, Zhiwei Steven Wu, Grigory Yaroslavtsev
Privacy for the Protected (Only)
null
null
null
null
cs.DS cs.CR cs.CY cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Motivated by tensions between data privacy for individual citizens, and societal priorities such as counterterrorism and the containment of infectious disease, we introduce a computational model that distinguishes between parties for whom privacy is explicitly protected, and those for whom it is not (the targeted subpopulation). The goal is the development of algorithms that can effectively identify and take action upon members of the targeted subpopulation in a way that minimally compromises the privacy of the protected, while simultaneously limiting the expense of distinguishing members of the two groups via costly mechanisms such as surveillance, background checks, or medical testing. Within this framework, we provide provably privacy-preserving algorithms for targeted search in social networks. These algorithms are natural variants of common graph search methods, and ensure privacy for the protected by the careful injection of noise in the prioritization of potential targets. We validate the utility of our algorithms with extensive computational experiments on two large-scale social network datasets.
[ { "version": "v1", "created": "Sun, 31 May 2015 14:47:27 GMT" } ]
2015-06-02T00:00:00
[ [ "Kearns", "Michael", "" ], [ "Roth", "Aaron", "" ], [ "Wu", "Zhiwei Steven", "" ], [ "Yaroslavtsev", "Grigory", "" ] ]
TITLE: Privacy for the Protected (Only) ABSTRACT: Motivated by tensions between data privacy for individual citizens, and societal priorities such as counterterrorism and the containment of infectious disease, we introduce a computational model that distinguishes between parties for whom privacy is explicitly protected, and those for whom it is not (the targeted subpopulation). The goal is the development of algorithms that can effectively identify and take action upon members of the targeted subpopulation in a way that minimally compromises the privacy of the protected, while simultaneously limiting the expense of distinguishing members of the two groups via costly mechanisms such as surveillance, background checks, or medical testing. Within this framework, we provide provably privacy-preserving algorithms for targeted search in social networks. These algorithms are natural variants of common graph search methods, and ensure privacy for the protected by the careful injection of noise in the prioritization of potential targets. We validate the utility of our algorithms with extensive computational experiments on two large-scale social network datasets.
no_new_dataset
0.949295
1506.00278
Licheng Yu
Licheng Yu, Eunbyung Park, Alexander C. Berg, and Tamara L. Berg
Visual Madlibs: Fill in the blank Image Generation and Question Answering
10 pages; 8 figures; 4 tables
null
null
null
cs.CV cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we introduce a new dataset consisting of 360,001 focused natural language descriptions for 10,738 images. This dataset, the Visual Madlibs dataset, is collected using automatically produced fill-in-the-blank templates designed to gather targeted descriptions about: people and objects, their appearances, activities, and interactions, as well as inferences about the general scene or its broader context. We provide several analyses of the Visual Madlibs dataset and demonstrate its applicability to two new description generation tasks: focused description generation, and multiple-choice question-answering for images. Experiments using joint-embedding and deep learning methods show promising results on these tasks.
[ { "version": "v1", "created": "Sun, 31 May 2015 19:39:44 GMT" } ]
2015-06-02T00:00:00
[ [ "Yu", "Licheng", "" ], [ "Park", "Eunbyung", "" ], [ "Berg", "Alexander C.", "" ], [ "Berg", "Tamara L.", "" ] ]
TITLE: Visual Madlibs: Fill in the blank Image Generation and Question Answering ABSTRACT: In this paper, we introduce a new dataset consisting of 360,001 focused natural language descriptions for 10,738 images. This dataset, the Visual Madlibs dataset, is collected using automatically produced fill-in-the-blank templates designed to gather targeted descriptions about: people and objects, their appearances, activities, and interactions, as well as inferences about the general scene or its broader context. We provide several analyses of the Visual Madlibs dataset and demonstrate its applicability to two new description generation tasks: focused description generation, and multiple-choice question-answering for images. Experiments using joint-embedding and deep learning methods show promising results on these tasks.
new_dataset
0.957873
1506.00323
Anastasia Podosinnikova
Anastasia Podosinnikova, Simon Setzer, and Matthias Hein
Robust PCA: Optimization of the Robust Reconstruction Error over the Stiefel Manifold
long version of GCPR 2014 paper
null
null
null
stat.ML cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
It is well known that Principal Component Analysis (PCA) is strongly affected by outliers and a lot of effort has been put into robustification of PCA. In this paper we present a new algorithm for robust PCA minimizing the trimmed reconstruction error. By directly minimizing over the Stiefel manifold, we avoid deflation as often used by projection pursuit methods. In distinction to other methods for robust PCA, our method has no free parameter and is computationally very efficient. We illustrate the performance on various datasets including an application to background modeling and subtraction. Our method performs better or similar to current state-of-the-art methods while being faster.
[ { "version": "v1", "created": "Mon, 1 Jun 2015 01:57:15 GMT" } ]
2015-06-02T00:00:00
[ [ "Podosinnikova", "Anastasia", "" ], [ "Setzer", "Simon", "" ], [ "Hein", "Matthias", "" ] ]
TITLE: Robust PCA: Optimization of the Robust Reconstruction Error over the Stiefel Manifold ABSTRACT: It is well known that Principal Component Analysis (PCA) is strongly affected by outliers and a lot of effort has been put into robustification of PCA. In this paper we present a new algorithm for robust PCA minimizing the trimmed reconstruction error. By directly minimizing over the Stiefel manifold, we avoid deflation as often used by projection pursuit methods. In distinction to other methods for robust PCA, our method has no free parameter and is computationally very efficient. We illustrate the performance on various datasets including an application to background modeling and subtraction. Our method performs better or similar to current state-of-the-art methods while being faster.
no_new_dataset
0.951594
1506.00327
Zhiguang Wang
Zhiguang Wang and Tim Oates
Imaging Time-Series to Improve Classification and Imputation
Accepted by IJCAI-2015 ML track
null
null
null
cs.LG cs.NE stat.ML
http://creativecommons.org/licenses/by/3.0/
Inspired by recent successes of deep learning in computer vision, we propose a novel framework for encoding time series as different types of images, namely, Gramian Angular Summation/Difference Fields (GASF/GADF) and Markov Transition Fields (MTF). This enables the use of techniques from computer vision for time series classification and imputation. We used Tiled Convolutional Neural Networks (tiled CNNs) on 20 standard datasets to learn high-level features from the individual and compound GASF-GADF-MTF images. Our approaches achieve highly competitive results when compared to nine of the current best time series classification approaches. Inspired by the bijection property of GASF on 0/1 rescaled data, we train Denoised Auto-encoders (DA) on the GASF images of four standard and one synthesized compound dataset. The imputation MSE on test data is reduced by 12.18%-48.02% when compared to using the raw data. An analysis of the features and weights learned via tiled CNNs and DAs explains why the approaches work.
[ { "version": "v1", "created": "Mon, 1 Jun 2015 02:17:06 GMT" } ]
2015-06-02T00:00:00
[ [ "Wang", "Zhiguang", "" ], [ "Oates", "Tim", "" ] ]
TITLE: Imaging Time-Series to Improve Classification and Imputation ABSTRACT: Inspired by recent successes of deep learning in computer vision, we propose a novel framework for encoding time series as different types of images, namely, Gramian Angular Summation/Difference Fields (GASF/GADF) and Markov Transition Fields (MTF). This enables the use of techniques from computer vision for time series classification and imputation. We used Tiled Convolutional Neural Networks (tiled CNNs) on 20 standard datasets to learn high-level features from the individual and compound GASF-GADF-MTF images. Our approaches achieve highly competitive results when compared to nine of the current best time series classification approaches. Inspired by the bijection property of GASF on 0/1 rescaled data, we train Denoised Auto-encoders (DA) on the GASF images of four standard and one synthesized compound dataset. The imputation MSE on test data is reduced by 12.18%-48.02% when compared to using the raw data. An analysis of the features and weights learned via tiled CNNs and DAs explains why the approaches work.
no_new_dataset
0.940626
1506.00481
Weilin Huang
Weilin Huang and Hujun Yin
Robust Face Recognition with Structural Binary Gradient Patterns
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents a computationally efficient yet powerful binary framework for robust facial representation based on image gradients. It is termed as structural binary gradient patterns (SBGP). To discover underlying local structures in the gradient domain, we compute image gradients from multiple directions and simplify them into a set of binary strings. The SBGP is derived from certain types of these binary strings that have meaningful local structures and are capable of resembling fundamental textural information. They detect micro orientational edges and possess strong orientation and locality capabilities, thus enabling great discrimination. The SBGP also benefits from the advantages of the gradient domain and exhibits profound robustness against illumination variations. The binary strategy realized by pixel correlations in a small neighborhood substantially simplifies the computational complexity and achieves extremely efficient processing with only 0.0032s in Matlab for a typical face image. Furthermore, the discrimination power of the SBGP can be enhanced on a set of defined orientational image gradient magnitudes, further enforcing locality and orientation. Results of extensive experiments on various benchmark databases illustrate significant improvements of the SBGP based representations over the existing state-of-the-art local descriptors in the terms of discrimination, robustness and complexity. Codes for the SBGP methods will be available at http://www.eee.manchester.ac.uk/research/groups/sisp/software/.
[ { "version": "v1", "created": "Mon, 1 Jun 2015 12:57:07 GMT" } ]
2015-06-02T00:00:00
[ [ "Huang", "Weilin", "" ], [ "Yin", "Hujun", "" ] ]
TITLE: Robust Face Recognition with Structural Binary Gradient Patterns ABSTRACT: This paper presents a computationally efficient yet powerful binary framework for robust facial representation based on image gradients. It is termed as structural binary gradient patterns (SBGP). To discover underlying local structures in the gradient domain, we compute image gradients from multiple directions and simplify them into a set of binary strings. The SBGP is derived from certain types of these binary strings that have meaningful local structures and are capable of resembling fundamental textural information. They detect micro orientational edges and possess strong orientation and locality capabilities, thus enabling great discrimination. The SBGP also benefits from the advantages of the gradient domain and exhibits profound robustness against illumination variations. The binary strategy realized by pixel correlations in a small neighborhood substantially simplifies the computational complexity and achieves extremely efficient processing with only 0.0032s in Matlab for a typical face image. Furthermore, the discrimination power of the SBGP can be enhanced on a set of defined orientational image gradient magnitudes, further enforcing locality and orientation. Results of extensive experiments on various benchmark databases illustrate significant improvements of the SBGP based representations over the existing state-of-the-art local descriptors in the terms of discrimination, robustness and complexity. Codes for the SBGP methods will be available at http://www.eee.manchester.ac.uk/research/groups/sisp/software/.
no_new_dataset
0.943764
1506.00527
Gianluigi Ciocca
Simone Bianco, Gianluigi Ciocca
User Preferences Modeling and Learning for Pleasing Photo Collage Generation
To be published in ACM Transactions on Multimedia Computing, Communications, and Applications (TOMM)
null
null
null
cs.MM cs.CV cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we consider how to automatically create pleasing photo collages created by placing a set of images on a limited canvas area. The task is formulated as an optimization problem. Differently from existing state-of-the-art approaches, we here exploit subjective experiments to model and learn pleasantness from user preferences. To this end, we design an experimental framework for the identification of the criteria that need to be taken into account to generate a pleasing photo collage. Five different thematic photo datasets are used to create collages using state-of-the-art criteria. A first subjective experiment where several subjects evaluated the collages, emphasizes that different criteria are involved in the subjective definition of pleasantness. We then identify new global and local criteria and design algorithms to quantify them. The relative importance of these criteria are automatically learned by exploiting the user preferences, and new collages are generated. To validate our framework, we performed several psycho-visual experiments involving different users. The results shows that the proposed framework allows to learn a novel computational model which effectively encodes an inter-user definition of pleasantness. The learned definition of pleasantness generalizes well to new photo datasets of different themes and sizes not used in the learning. Moreover, compared with two state of the art approaches, the collages created using our framework are preferred by the majority of the users.
[ { "version": "v1", "created": "Mon, 1 Jun 2015 15:20:29 GMT" } ]
2015-06-02T00:00:00
[ [ "Bianco", "Simone", "" ], [ "Ciocca", "Gianluigi", "" ] ]
TITLE: User Preferences Modeling and Learning for Pleasing Photo Collage Generation ABSTRACT: In this paper we consider how to automatically create pleasing photo collages created by placing a set of images on a limited canvas area. The task is formulated as an optimization problem. Differently from existing state-of-the-art approaches, we here exploit subjective experiments to model and learn pleasantness from user preferences. To this end, we design an experimental framework for the identification of the criteria that need to be taken into account to generate a pleasing photo collage. Five different thematic photo datasets are used to create collages using state-of-the-art criteria. A first subjective experiment where several subjects evaluated the collages, emphasizes that different criteria are involved in the subjective definition of pleasantness. We then identify new global and local criteria and design algorithms to quantify them. The relative importance of these criteria are automatically learned by exploiting the user preferences, and new collages are generated. To validate our framework, we performed several psycho-visual experiments involving different users. The results shows that the proposed framework allows to learn a novel computational model which effectively encodes an inter-user definition of pleasantness. The learned definition of pleasantness generalizes well to new photo datasets of different themes and sizes not used in the learning. Moreover, compared with two state of the art approaches, the collages created using our framework are preferred by the majority of the users.
no_new_dataset
0.942029
1506.00528
Liangliang Cao
Chang Wang, Liangliang Cao, Bowen Zhou
Medical Synonym Extraction with Concept Space Models
7 pages, to appear in IJCAI 2015
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we present a novel approach for medical synonym extraction. We aim to integrate the term embedding with the medical domain knowledge for healthcare applications. One advantage of our method is that it is very scalable. Experiments on a dataset with more than 1M term pairs show that the proposed approach outperforms the baseline approaches by a large margin.
[ { "version": "v1", "created": "Mon, 1 Jun 2015 15:21:00 GMT" } ]
2015-06-02T00:00:00
[ [ "Wang", "Chang", "" ], [ "Cao", "Liangliang", "" ], [ "Zhou", "Bowen", "" ] ]
TITLE: Medical Synonym Extraction with Concept Space Models ABSTRACT: In this paper, we present a novel approach for medical synonym extraction. We aim to integrate the term embedding with the medical domain knowledge for healthcare applications. One advantage of our method is that it is very scalable. Experiments on a dataset with more than 1M term pairs show that the proposed approach outperforms the baseline approaches by a large margin.
no_new_dataset
0.940898
1506.00619
Bart van Merri\"enboer
Bart van Merri\"enboer, Dzmitry Bahdanau, Vincent Dumoulin, Dmitriy Serdyuk, David Warde-Farley, Jan Chorowski, Yoshua Bengio
Blocks and Fuel: Frameworks for deep learning
null
null
null
null
cs.LG cs.NE stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce two Python frameworks to train neural networks on large datasets: Blocks and Fuel. Blocks is based on Theano, a linear algebra compiler with CUDA-support. It facilitates the training of complex neural network models by providing parametrized Theano operations, attaching metadata to Theano's symbolic computational graph, and providing an extensive set of utilities to assist training the networks, e.g. training algorithms, logging, monitoring, visualization, and serialization. Fuel provides a standard format for machine learning datasets. It allows the user to easily iterate over large datasets, performing many types of pre-processing on the fly.
[ { "version": "v1", "created": "Mon, 1 Jun 2015 19:28:27 GMT" } ]
2015-06-02T00:00:00
[ [ "van Merriënboer", "Bart", "" ], [ "Bahdanau", "Dzmitry", "" ], [ "Dumoulin", "Vincent", "" ], [ "Serdyuk", "Dmitriy", "" ], [ "Warde-Farley", "David", "" ], [ "Chorowski", "Jan", "" ], [ "Bengio", "Yoshua", "" ] ]
TITLE: Blocks and Fuel: Frameworks for deep learning ABSTRACT: We introduce two Python frameworks to train neural networks on large datasets: Blocks and Fuel. Blocks is based on Theano, a linear algebra compiler with CUDA-support. It facilitates the training of complex neural network models by providing parametrized Theano operations, attaching metadata to Theano's symbolic computational graph, and providing an extensive set of utilities to assist training the networks, e.g. training algorithms, logging, monitoring, visualization, and serialization. Fuel provides a standard format for machine learning datasets. It allows the user to easily iterate over large datasets, performing many types of pre-processing on the fly.
no_new_dataset
0.94256
1411.0352
Maxime Chevalier-Boisvert
Maxime Chevalier-Boisvert, Marc Feeley
Simple and Effective Type Check Removal through Lazy Basic Block Versioning
null
null
null
null
cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Dynamically typed programming languages such as JavaScript and Python defer type checking to run time. In order to maximize performance, dynamic language VM implementations must attempt to eliminate redundant dynamic type checks. However, type inference analyses are often costly and involve tradeoffs between compilation time and resulting precision. This has lead to the creation of increasingly complex multi-tiered VM architectures. This paper introduces lazy basic block versioning, a simple JIT compilation technique which effectively removes redundant type checks from critical code paths. This novel approach lazily generates type-specialized versions of basic blocks on-the-fly while propagating context-dependent type information. This does not require the use of costly program analyses, is not restricted by the precision limitations of traditional type analyses and avoids the implementation complexity of speculative optimization techniques. We have implemented intraprocedural lazy basic block versioning in a JavaScript JIT compiler. This approach is compared with a classical flow-based type analysis. Lazy basic block versioning performs as well or better on all benchmarks. On average, 71% of type tests are eliminated, yielding speedups of up to 50%. We also show that our implementation generates more efficient machine code than TraceMonkey, a tracing JIT compiler for JavaScript, on several benchmarks. The combination of implementation simplicity, low algorithmic complexity and good run time performance makes basic block versioning attractive for baseline JIT compilers.
[ { "version": "v1", "created": "Mon, 3 Nov 2014 03:46:18 GMT" }, { "version": "v2", "created": "Fri, 29 May 2015 18:06:07 GMT" } ]
2015-06-01T00:00:00
[ [ "Chevalier-Boisvert", "Maxime", "" ], [ "Feeley", "Marc", "" ] ]
TITLE: Simple and Effective Type Check Removal through Lazy Basic Block Versioning ABSTRACT: Dynamically typed programming languages such as JavaScript and Python defer type checking to run time. In order to maximize performance, dynamic language VM implementations must attempt to eliminate redundant dynamic type checks. However, type inference analyses are often costly and involve tradeoffs between compilation time and resulting precision. This has lead to the creation of increasingly complex multi-tiered VM architectures. This paper introduces lazy basic block versioning, a simple JIT compilation technique which effectively removes redundant type checks from critical code paths. This novel approach lazily generates type-specialized versions of basic blocks on-the-fly while propagating context-dependent type information. This does not require the use of costly program analyses, is not restricted by the precision limitations of traditional type analyses and avoids the implementation complexity of speculative optimization techniques. We have implemented intraprocedural lazy basic block versioning in a JavaScript JIT compiler. This approach is compared with a classical flow-based type analysis. Lazy basic block versioning performs as well or better on all benchmarks. On average, 71% of type tests are eliminated, yielding speedups of up to 50%. We also show that our implementation generates more efficient machine code than TraceMonkey, a tracing JIT compiler for JavaScript, on several benchmarks. The combination of implementation simplicity, low algorithmic complexity and good run time performance makes basic block versioning attractive for baseline JIT compilers.
no_new_dataset
0.941868
1412.7259
Dong Wang
Dong Wang and Xiaoyang Tan
Unsupervised Feature Learning with C-SVDDNet
null
null
null
null
cs.CV cs.LG cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we investigate the problem of learning feature representation from unlabeled data using a single-layer K-means network. A K-means network maps the input data into a feature representation by finding the nearest centroid for each input point, which has attracted researchers' great attention recently due to its simplicity, effectiveness, and scalability. However, one drawback of this feature mapping is that it tends to be unreliable when the training data contains noise. To address this issue, we propose a SVDD based feature learning algorithm that describes the density and distribution of each cluster from K-means with an SVDD ball for more robust feature representation. For this purpose, we present a new SVDD algorithm called C-SVDD that centers the SVDD ball towards the mode of local density of each cluster, and we show that the objective of C-SVDD can be solved very efficiently as a linear programming problem. Additionally, traditional unsupervised feature learning methods usually take an average or sum of local representations to obtain global representation which ignore spatial relationship among them. To use spatial information we propose a global representation with a variant of SIFT descriptor. The architecture is also extended with multiple receptive field scales and multiple pooling sizes. Extensive experiments on several popular object recognition benchmarks, such as STL-10, MINST, Holiday and Copydays shows that the proposed C-SVDDNet method yields comparable or better performance than that of the previous state of the art methods.
[ { "version": "v1", "created": "Tue, 23 Dec 2014 05:56:50 GMT" }, { "version": "v2", "created": "Mon, 12 Jan 2015 05:31:03 GMT" }, { "version": "v3", "created": "Fri, 29 May 2015 09:50:54 GMT" } ]
2015-06-01T00:00:00
[ [ "Wang", "Dong", "" ], [ "Tan", "Xiaoyang", "" ] ]
TITLE: Unsupervised Feature Learning with C-SVDDNet ABSTRACT: In this paper, we investigate the problem of learning feature representation from unlabeled data using a single-layer K-means network. A K-means network maps the input data into a feature representation by finding the nearest centroid for each input point, which has attracted researchers' great attention recently due to its simplicity, effectiveness, and scalability. However, one drawback of this feature mapping is that it tends to be unreliable when the training data contains noise. To address this issue, we propose a SVDD based feature learning algorithm that describes the density and distribution of each cluster from K-means with an SVDD ball for more robust feature representation. For this purpose, we present a new SVDD algorithm called C-SVDD that centers the SVDD ball towards the mode of local density of each cluster, and we show that the objective of C-SVDD can be solved very efficiently as a linear programming problem. Additionally, traditional unsupervised feature learning methods usually take an average or sum of local representations to obtain global representation which ignore spatial relationship among them. To use spatial information we propose a global representation with a variant of SIFT descriptor. The architecture is also extended with multiple receptive field scales and multiple pooling sizes. Extensive experiments on several popular object recognition benchmarks, such as STL-10, MINST, Holiday and Copydays shows that the proposed C-SVDDNet method yields comparable or better performance than that of the previous state of the art methods.
no_new_dataset
0.943608
1501.04870
Luca Martino
J. Read, L. Martino, P. Olmos, D. Luengo
Scalable Multi-Output Label Prediction: From Classifier Chains to Classifier Trellises
(accepted in Pattern Recognition)
Pattern Recognition, Volume 48, Issue 6, 2015, Pages 2096-2109
10.1016/j.patcog.2015.01.004
null
stat.ML cs.CV cs.DS cs.LG stat.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Multi-output inference tasks, such as multi-label classification, have become increasingly important in recent years. A popular method for multi-label classification is classifier chains, in which the predictions of individual classifiers are cascaded along a chain, thus taking into account inter-label dependencies and improving the overall performance. Several varieties of classifier chain methods have been introduced, and many of them perform very competitively across a wide range of benchmark datasets. However, scalability limitations become apparent on larger datasets when modeling a fully-cascaded chain. In particular, the methods' strategies for discovering and modeling a good chain structure constitutes a mayor computational bottleneck. In this paper, we present the classifier trellis (CT) method for scalable multi-label classification. We compare CT with several recently proposed classifier chain methods to show that it occupies an important niche: it is highly competitive on standard multi-label problems, yet it can also scale up to thousands or even tens of thousands of labels.
[ { "version": "v1", "created": "Tue, 20 Jan 2015 16:33:40 GMT" } ]
2015-06-01T00:00:00
[ [ "Read", "J.", "" ], [ "Martino", "L.", "" ], [ "Olmos", "P.", "" ], [ "Luengo", "D.", "" ] ]
TITLE: Scalable Multi-Output Label Prediction: From Classifier Chains to Classifier Trellises ABSTRACT: Multi-output inference tasks, such as multi-label classification, have become increasingly important in recent years. A popular method for multi-label classification is classifier chains, in which the predictions of individual classifiers are cascaded along a chain, thus taking into account inter-label dependencies and improving the overall performance. Several varieties of classifier chain methods have been introduced, and many of them perform very competitively across a wide range of benchmark datasets. However, scalability limitations become apparent on larger datasets when modeling a fully-cascaded chain. In particular, the methods' strategies for discovering and modeling a good chain structure constitutes a mayor computational bottleneck. In this paper, we present the classifier trellis (CT) method for scalable multi-label classification. We compare CT with several recently proposed classifier chain methods to show that it occupies an important niche: it is highly competitive on standard multi-label problems, yet it can also scale up to thousands or even tens of thousands of labels.
no_new_dataset
0.946101
1505.07922
Junshi Huang
Junshi Huang, Rogerio S. Feris, Qiang Chen, Shuicheng Yan
Cross-domain Image Retrieval with a Dual Attribute-aware Ranking Network
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We address the problem of cross-domain image retrieval, considering the following practical application: given a user photo depicting a clothing image, our goal is to retrieve the same or attribute-similar clothing items from online shopping stores. This is a challenging problem due to the large discrepancy between online shopping images, usually taken in ideal lighting/pose/background conditions, and user photos captured in uncontrolled conditions. To address this problem, we propose a Dual Attribute-aware Ranking Network (DARN) for retrieval feature learning. More specifically, DARN consists of two sub-networks, one for each domain, whose retrieval feature representations are driven by semantic attribute learning. We show that this attribute-guided learning is a key factor for retrieval accuracy improvement. In addition, to further align with the nature of the retrieval problem, we impose a triplet visual similarity constraint for learning to rank across the two sub-networks. Another contribution of our work is a large-scale dataset which makes the network learning feasible. We exploit customer review websites to crawl a large set of online shopping images and corresponding offline user photos with fine-grained clothing attributes, i.e., around 450,000 online shopping images and about 90,000 exact offline counterpart images of those online ones. All these images are collected from real-world consumer websites reflecting the diversity of the data modality, which makes this dataset unique and rare in the academic community. We extensively evaluate the retrieval performance of networks in different configurations. The top-20 retrieval accuracy is doubled when using the proposed DARN other than the current popular solution using pre-trained CNN features only (0.570 vs. 0.268).
[ { "version": "v1", "created": "Fri, 29 May 2015 04:46:37 GMT" } ]
2015-06-01T00:00:00
[ [ "Huang", "Junshi", "" ], [ "Feris", "Rogerio S.", "" ], [ "Chen", "Qiang", "" ], [ "Yan", "Shuicheng", "" ] ]
TITLE: Cross-domain Image Retrieval with a Dual Attribute-aware Ranking Network ABSTRACT: We address the problem of cross-domain image retrieval, considering the following practical application: given a user photo depicting a clothing image, our goal is to retrieve the same or attribute-similar clothing items from online shopping stores. This is a challenging problem due to the large discrepancy between online shopping images, usually taken in ideal lighting/pose/background conditions, and user photos captured in uncontrolled conditions. To address this problem, we propose a Dual Attribute-aware Ranking Network (DARN) for retrieval feature learning. More specifically, DARN consists of two sub-networks, one for each domain, whose retrieval feature representations are driven by semantic attribute learning. We show that this attribute-guided learning is a key factor for retrieval accuracy improvement. In addition, to further align with the nature of the retrieval problem, we impose a triplet visual similarity constraint for learning to rank across the two sub-networks. Another contribution of our work is a large-scale dataset which makes the network learning feasible. We exploit customer review websites to crawl a large set of online shopping images and corresponding offline user photos with fine-grained clothing attributes, i.e., around 450,000 online shopping images and about 90,000 exact offline counterpart images of those online ones. All these images are collected from real-world consumer websites reflecting the diversity of the data modality, which makes this dataset unique and rare in the academic community. We extensively evaluate the retrieval performance of networks in different configurations. The top-20 retrieval accuracy is doubled when using the proposed DARN other than the current popular solution using pre-trained CNN features only (0.570 vs. 0.268).
no_new_dataset
0.93784
1505.07930
Tam Nguyen
Tam V. Nguyen, Jose Sepulveda
Salient Object Detection via Augmented Hypotheses
IJCAI 2015 paper
null
null
null
cs.CV
http://creativecommons.org/licenses/by/3.0/
In this paper, we propose using \textit{augmented hypotheses} which consider objectness, foreground and compactness for salient object detection. Our algorithm consists of four basic steps. First, our method generates the objectness map via objectness hypotheses. Based on the objectness map, we estimate the foreground margin and compute the corresponding foreground map which prefers the foreground objects. From the objectness map and the foreground map, the compactness map is formed to favor the compact objects. We then derive a saliency measure that produces a pixel-accurate saliency map which uniformly covers the objects of interest and consistently separates fore- and background. We finally evaluate the proposed framework on two challenging datasets, MSRA-1000 and iCoSeg. Our extensive experimental results show that our method outperforms state-of-the-art approaches.
[ { "version": "v1", "created": "Fri, 29 May 2015 06:03:57 GMT" } ]
2015-06-01T00:00:00
[ [ "Nguyen", "Tam V.", "" ], [ "Sepulveda", "Jose", "" ] ]
TITLE: Salient Object Detection via Augmented Hypotheses ABSTRACT: In this paper, we propose using \textit{augmented hypotheses} which consider objectness, foreground and compactness for salient object detection. Our algorithm consists of four basic steps. First, our method generates the objectness map via objectness hypotheses. Based on the objectness map, we estimate the foreground margin and compute the corresponding foreground map which prefers the foreground objects. From the objectness map and the foreground map, the compactness map is formed to favor the compact objects. We then derive a saliency measure that produces a pixel-accurate saliency map which uniformly covers the objects of interest and consistently separates fore- and background. We finally evaluate the proposed framework on two challenging datasets, MSRA-1000 and iCoSeg. Our extensive experimental results show that our method outperforms state-of-the-art approaches.
no_new_dataset
0.951997
1505.07931
Xuefeng Yang
Xuefeng Yang, Kezhi Mao
Supervised Fine Tuning for Word Embedding with Integrated Knowledge
null
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Learning vector representation for words is an important research field which may benefit many natural language processing tasks. Two limitations exist in nearly all available models, which are the bias caused by the context definition and the lack of knowledge utilization. They are difficult to tackle because these algorithms are essentially unsupervised learning approaches. Inspired by deep learning, the authors propose a supervised framework for learning vector representation of words to provide additional supervised fine tuning after unsupervised learning. The framework is knowledge rich approacher and compatible with any numerical vectors word representation. The authors perform both intrinsic evaluation like attributional and relational similarity prediction and extrinsic evaluations like the sentence completion and sentiment analysis. Experiments results on 6 embeddings and 4 tasks with 10 datasets show that the proposed fine tuning framework may significantly improve the quality of the vector representation of words.
[ { "version": "v1", "created": "Fri, 29 May 2015 06:11:00 GMT" } ]
2015-06-01T00:00:00
[ [ "Yang", "Xuefeng", "" ], [ "Mao", "Kezhi", "" ] ]
TITLE: Supervised Fine Tuning for Word Embedding with Integrated Knowledge ABSTRACT: Learning vector representation for words is an important research field which may benefit many natural language processing tasks. Two limitations exist in nearly all available models, which are the bias caused by the context definition and the lack of knowledge utilization. They are difficult to tackle because these algorithms are essentially unsupervised learning approaches. Inspired by deep learning, the authors propose a supervised framework for learning vector representation of words to provide additional supervised fine tuning after unsupervised learning. The framework is knowledge rich approacher and compatible with any numerical vectors word representation. The authors perform both intrinsic evaluation like attributional and relational similarity prediction and extrinsic evaluations like the sentence completion and sentiment analysis. Experiments results on 6 embeddings and 4 tasks with 10 datasets show that the proposed fine tuning framework may significantly improve the quality of the vector representation of words.
no_new_dataset
0.948822
1505.07987
Thomas Gransden
Thomas Gransden and Neil Walkinshaw and Rajeev Raman
SEPIA: Search for Proofs Using Inferred Automata
To appear at 25th International Conference on Automated Deduction
null
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper describes SEPIA, a tool for automated proof generation in Coq. SEPIA combines model inference with interactive theorem proving. Existing proof corpora are modelled using state-based models inferred from tactic sequences. These can then be traversed automatically to identify proofs. The SEPIA system is described and its performance evaluated on three Coq datasets. Our results show that SEPIA provides a useful complement to existing automated tactics in Coq.
[ { "version": "v1", "created": "Fri, 29 May 2015 10:39:44 GMT" } ]
2015-06-01T00:00:00
[ [ "Gransden", "Thomas", "" ], [ "Walkinshaw", "Neil", "" ], [ "Raman", "Rajeev", "" ] ]
TITLE: SEPIA: Search for Proofs Using Inferred Automata ABSTRACT: This paper describes SEPIA, a tool for automated proof generation in Coq. SEPIA combines model inference with interactive theorem proving. Existing proof corpora are modelled using state-based models inferred from tactic sequences. These can then be traversed automatically to identify proofs. The SEPIA system is described and its performance evaluated on three Coq datasets. Our results show that SEPIA provides a useful complement to existing automated tactics in Coq.
no_new_dataset
0.94474
1110.3649
Yaron Lipman
D. Boyer and Y. Lipman and E. St. Clair and J. Puente and T. Funkhouser and B. Patel and J. Jernvall and I. Daubechies
Algorithms to automatically quantify the geometric similarity of anatomical surfaces
Changes with respect to v1, v2: an Erratum was added, correcting the references for one of the three datasets. Note that the datasets and code for this paper can be obtained from the Data Conservancy (see Download column on v1, v2)
PNAS 2011 108 (45) 18221-18226
10.1073/pnas.1112822108
null
math.NA cs.CV cs.GR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We describe new approaches for distances between pairs of 2-dimensional surfaces (embedded in 3-dimensional space) that use local structures and global information contained in inter-structure geometric relationships. We present algorithms to automatically determine these distances as well as geometric correspondences. This is motivated by the aspiration of students of natural science to understand the continuity of form that unites the diversity of life. At present, scientists using physical traits to study evolutionary relationships among living and extinct animals analyze data extracted from carefully defined anatomical correspondence points (landmarks). Identifying and recording these landmarks is time consuming and can be done accurately only by trained morphologists. This renders these studies inaccessible to non-morphologists, and causes phenomics to lag behind genomics in elucidating evolutionary patterns. Unlike other algorithms presented for morphological correspondences our approach does not require any preliminary marking of special features or landmarks by the user. It also differs from other seminal work in computational geometry in that our algorithms are polynomial in nature and thus faster, making pairwise comparisons feasible for significantly larger numbers of digitized surfaces. We illustrate our approach using three datasets representing teeth and different bones of primates and humans, and show that it leads to highly accurate results.
[ { "version": "v1", "created": "Mon, 17 Oct 2011 12:23:30 GMT" }, { "version": "v2", "created": "Tue, 18 Oct 2011 09:16:12 GMT" }, { "version": "v3", "created": "Thu, 15 Mar 2012 13:36:16 GMT" } ]
2015-05-30T00:00:00
[ [ "Boyer", "D.", "" ], [ "Lipman", "Y.", "" ], [ "Clair", "E. St.", "" ], [ "Puente", "J.", "" ], [ "Funkhouser", "T.", "" ], [ "Patel", "B.", "" ], [ "Jernvall", "J.", "" ], [ "Daubechies", "I.", "" ] ]
TITLE: Algorithms to automatically quantify the geometric similarity of anatomical surfaces ABSTRACT: We describe new approaches for distances between pairs of 2-dimensional surfaces (embedded in 3-dimensional space) that use local structures and global information contained in inter-structure geometric relationships. We present algorithms to automatically determine these distances as well as geometric correspondences. This is motivated by the aspiration of students of natural science to understand the continuity of form that unites the diversity of life. At present, scientists using physical traits to study evolutionary relationships among living and extinct animals analyze data extracted from carefully defined anatomical correspondence points (landmarks). Identifying and recording these landmarks is time consuming and can be done accurately only by trained morphologists. This renders these studies inaccessible to non-morphologists, and causes phenomics to lag behind genomics in elucidating evolutionary patterns. Unlike other algorithms presented for morphological correspondences our approach does not require any preliminary marking of special features or landmarks by the user. It also differs from other seminal work in computational geometry in that our algorithms are polynomial in nature and thus faster, making pairwise comparisons feasible for significantly larger numbers of digitized surfaces. We illustrate our approach using three datasets representing teeth and different bones of primates and humans, and show that it leads to highly accurate results.
no_new_dataset
0.950824
1110.4784
Matthieu Cristelli
Ilaria Bordino, Stefano Battiston, Guido Caldarelli, Matthieu Cristelli, Antti Ukkonen, Ingmar Weber
Web search queries can predict stock market volumes
29 pages, 11 figures, 11 tables + Supporting Information
null
10.1371/journal.pone.0040014
null
q-fin.ST cs.LG physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We live in a computerized and networked society where many of our actions leave a digital trace and affect other people's actions. This has lead to the emergence of a new data-driven research field: mathematical methods of computer science, statistical physics and sociometry provide insights on a wide range of disciplines ranging from social science to human mobility. A recent important discovery is that query volumes (i.e., the number of requests submitted by users to search engines on the www) can be used to track and, in some cases, to anticipate the dynamics of social phenomena. Successful exemples include unemployment levels, car and home sales, and epidemics spreading. Few recent works applied this approach to stock prices and market sentiment. However, it remains unclear if trends in financial markets can be anticipated by the collective wisdom of on-line users on the web. Here we show that trading volumes of stocks traded in NASDAQ-100 are correlated with the volumes of queries related to the same stocks. In particular, query volumes anticipate in many cases peaks of trading by one day or more. Our analysis is carried out on a unique dataset of queries, submitted to an important web search engine, which enable us to investigate also the user behavior. We show that the query volume dynamics emerges from the collective but seemingly uncoordinated activity of many users. These findings contribute to the debate on the identification of early warnings of financial systemic risk, based on the activity of users of the www.
[ { "version": "v1", "created": "Fri, 21 Oct 2011 13:15:59 GMT" }, { "version": "v2", "created": "Wed, 28 Mar 2012 14:07:49 GMT" }, { "version": "v3", "created": "Mon, 4 Jun 2012 15:42:35 GMT" } ]
2015-05-30T00:00:00
[ [ "Bordino", "Ilaria", "" ], [ "Battiston", "Stefano", "" ], [ "Caldarelli", "Guido", "" ], [ "Cristelli", "Matthieu", "" ], [ "Ukkonen", "Antti", "" ], [ "Weber", "Ingmar", "" ] ]
TITLE: Web search queries can predict stock market volumes ABSTRACT: We live in a computerized and networked society where many of our actions leave a digital trace and affect other people's actions. This has lead to the emergence of a new data-driven research field: mathematical methods of computer science, statistical physics and sociometry provide insights on a wide range of disciplines ranging from social science to human mobility. A recent important discovery is that query volumes (i.e., the number of requests submitted by users to search engines on the www) can be used to track and, in some cases, to anticipate the dynamics of social phenomena. Successful exemples include unemployment levels, car and home sales, and epidemics spreading. Few recent works applied this approach to stock prices and market sentiment. However, it remains unclear if trends in financial markets can be anticipated by the collective wisdom of on-line users on the web. Here we show that trading volumes of stocks traded in NASDAQ-100 are correlated with the volumes of queries related to the same stocks. In particular, query volumes anticipate in many cases peaks of trading by one day or more. Our analysis is carried out on a unique dataset of queries, submitted to an important web search engine, which enable us to investigate also the user behavior. We show that the query volume dynamics emerges from the collective but seemingly uncoordinated activity of many users. These findings contribute to the debate on the identification of early warnings of financial systemic risk, based on the activity of users of the www.
new_dataset
0.789071
1404.4888
Isadora Nun Ms
Isadora Nun, Karim Pichara, Pavlos Protopapas, Dae-Won Kim
Supervised detection of anomalous light-curves in massive astronomical catalogs
16 pages, 18 figures, published in The Astrophysical Journal
2014, ApJ, 793, 23
10.1088/0004-637X/793/1/23
null
cs.CE astro-ph.IM cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The development of synoptic sky surveys has led to a massive amount of data for which resources needed for analysis are beyond human capabilities. To process this information and to extract all possible knowledge, machine learning techniques become necessary. Here we present a new method to automatically discover unknown variable objects in large astronomical catalogs. With the aim of taking full advantage of all the information we have about known objects, our method is based on a supervised algorithm. In particular, we train a random forest classifier using known variability classes of objects and obtain votes for each of the objects in the training set. We then model this voting distribution with a Bayesian network and obtain the joint voting distribution among the training objects. Consequently, an unknown object is considered as an outlier insofar it has a low joint probability. Our method is suitable for exploring massive datasets given that the training process is performed offline. We tested our algorithm on 20 millions light-curves from the MACHO catalog and generated a list of anomalous candidates. We divided the candidates into two main classes of outliers: artifacts and intrinsic outliers. Artifacts were principally due to air mass variation, seasonal variation, bad calibration or instrumental errors and were consequently removed from our outlier list and added to the training set. After retraining, we selected about 4000 objects, which we passed to a post analysis stage by perfoming a cross-match with all publicly available catalogs. Within these candidates we identified certain known but rare objects such as eclipsing Cepheids, blue variables, cataclysmic variables and X-ray sources. For some outliers there were no additional information. Among them we identified three unknown variability types and few individual outliers that will be followed up for a deeper analysis.
[ { "version": "v1", "created": "Fri, 18 Apr 2014 21:12:13 GMT" }, { "version": "v2", "created": "Wed, 3 Sep 2014 15:50:49 GMT" }, { "version": "v3", "created": "Wed, 27 May 2015 21:27:11 GMT" } ]
2015-05-29T00:00:00
[ [ "Nun", "Isadora", "" ], [ "Pichara", "Karim", "" ], [ "Protopapas", "Pavlos", "" ], [ "Kim", "Dae-Won", "" ] ]
TITLE: Supervised detection of anomalous light-curves in massive astronomical catalogs ABSTRACT: The development of synoptic sky surveys has led to a massive amount of data for which resources needed for analysis are beyond human capabilities. To process this information and to extract all possible knowledge, machine learning techniques become necessary. Here we present a new method to automatically discover unknown variable objects in large astronomical catalogs. With the aim of taking full advantage of all the information we have about known objects, our method is based on a supervised algorithm. In particular, we train a random forest classifier using known variability classes of objects and obtain votes for each of the objects in the training set. We then model this voting distribution with a Bayesian network and obtain the joint voting distribution among the training objects. Consequently, an unknown object is considered as an outlier insofar it has a low joint probability. Our method is suitable for exploring massive datasets given that the training process is performed offline. We tested our algorithm on 20 millions light-curves from the MACHO catalog and generated a list of anomalous candidates. We divided the candidates into two main classes of outliers: artifacts and intrinsic outliers. Artifacts were principally due to air mass variation, seasonal variation, bad calibration or instrumental errors and were consequently removed from our outlier list and added to the training set. After retraining, we selected about 4000 objects, which we passed to a post analysis stage by perfoming a cross-match with all publicly available catalogs. Within these candidates we identified certain known but rare objects such as eclipsing Cepheids, blue variables, cataclysmic variables and X-ray sources. For some outliers there were no additional information. Among them we identified three unknown variability types and few individual outliers that will be followed up for a deeper analysis.
no_new_dataset
0.942981
1410.3560
Ryan Rossi
Ryan A. Rossi and Nesreen K. Ahmed
NetworkRepository: An Interactive Data Repository with Multi-scale Visual Analytics
AAAI 2015 DT
null
null
null
cs.DL cs.HC cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Network Repository (NR) is the first interactive data repository with a web-based platform for visual interactive analytics. Unlike other data repositories (e.g., UCI ML Data Repository, and SNAP), the network data repository (networkrepository.com) allows users to not only download, but to interactively analyze and visualize such data using our web-based interactive graph analytics platform. Users can in real-time analyze, visualize, compare, and explore data along many different dimensions. The aim of NR is to make it easy to discover key insights into the data extremely fast with little effort while also providing a medium for users to share data, visualizations, and insights. Other key factors that differentiate NR from the current data repositories is the number of graph datasets, their size, and variety. While other data repositories are static, they also lack a means for users to collaboratively discuss a particular dataset, corrections, or challenges with using the data for certain applications. In contrast, we have incorporated many social and collaborative aspects into NR in hopes of further facilitating scientific research (e.g., users can discuss each graph, post observations, visualizations, etc.).
[ { "version": "v1", "created": "Tue, 14 Oct 2014 03:35:37 GMT" }, { "version": "v2", "created": "Thu, 28 May 2015 19:58:23 GMT" } ]
2015-05-29T00:00:00
[ [ "Rossi", "Ryan A.", "" ], [ "Ahmed", "Nesreen K.", "" ] ]
TITLE: NetworkRepository: An Interactive Data Repository with Multi-scale Visual Analytics ABSTRACT: Network Repository (NR) is the first interactive data repository with a web-based platform for visual interactive analytics. Unlike other data repositories (e.g., UCI ML Data Repository, and SNAP), the network data repository (networkrepository.com) allows users to not only download, but to interactively analyze and visualize such data using our web-based interactive graph analytics platform. Users can in real-time analyze, visualize, compare, and explore data along many different dimensions. The aim of NR is to make it easy to discover key insights into the data extremely fast with little effort while also providing a medium for users to share data, visualizations, and insights. Other key factors that differentiate NR from the current data repositories is the number of graph datasets, their size, and variety. While other data repositories are static, they also lack a means for users to collaboratively discuss a particular dataset, corrections, or challenges with using the data for certain applications. In contrast, we have incorporated many social and collaborative aspects into NR in hopes of further facilitating scientific research (e.g., users can discuss each graph, post observations, visualizations, etc.).
no_new_dataset
0.948394
1504.06662
Arvind Neelakantan
Arvind Neelakantan, Benjamin Roth and Andrew McCallum
Compositional Vector Space Models for Knowledge Base Completion
The 53rd Annual Meeting of the Association for Computational Linguistics and The 7th International Joint Conference of the Asian Federation of Natural Language Processing, 2015
null
null
null
cs.CL stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Knowledge base (KB) completion adds new facts to a KB by making inferences from existing facts, for example by inferring with high likelihood nationality(X,Y) from bornIn(X,Y). Most previous methods infer simple one-hop relational synonyms like this, or use as evidence a multi-hop relational path treated as an atomic feature, like bornIn(X,Z) -> containedIn(Z,Y). This paper presents an approach that reasons about conjunctions of multi-hop relations non-atomically, composing the implications of a path using a recursive neural network (RNN) that takes as inputs vector embeddings of the binary relation in the path. Not only does this allow us to generalize to paths unseen at training time, but also, with a single high-capacity RNN, to predict new relation types not seen when the compositional model was trained (zero-shot learning). We assemble a new dataset of over 52M relational triples, and show that our method improves over a traditional classifier by 11%, and a method leveraging pre-trained embeddings by 7%.
[ { "version": "v1", "created": "Fri, 24 Apr 2015 23:06:10 GMT" }, { "version": "v2", "created": "Wed, 27 May 2015 21:23:45 GMT" } ]
2015-05-29T00:00:00
[ [ "Neelakantan", "Arvind", "" ], [ "Roth", "Benjamin", "" ], [ "McCallum", "Andrew", "" ] ]
TITLE: Compositional Vector Space Models for Knowledge Base Completion ABSTRACT: Knowledge base (KB) completion adds new facts to a KB by making inferences from existing facts, for example by inferring with high likelihood nationality(X,Y) from bornIn(X,Y). Most previous methods infer simple one-hop relational synonyms like this, or use as evidence a multi-hop relational path treated as an atomic feature, like bornIn(X,Z) -> containedIn(Z,Y). This paper presents an approach that reasons about conjunctions of multi-hop relations non-atomically, composing the implications of a path using a recursive neural network (RNN) that takes as inputs vector embeddings of the binary relation in the path. Not only does this allow us to generalize to paths unseen at training time, but also, with a single high-capacity RNN, to predict new relation types not seen when the compositional model was trained (zero-shot learning). We assemble a new dataset of over 52M relational triples, and show that our method improves over a traditional classifier by 11%, and a method leveraging pre-trained embeddings by 7%.
new_dataset
0.950457
1505.02137
Mohamed Amer
Mohamed R. Amer, Behjat Siddiquie, Amir Tamrakar, David A. Salter, Brian Lande, Darius Mehri and Ajay Divakaran
Human Social Interaction Modeling Using Temporal Deep Networks
null
null
null
null
cs.CY cs.LG
http://creativecommons.org/licenses/by-nc-sa/3.0/
We present a novel approach to computational modeling of social interactions based on modeling of essential social interaction predicates (ESIPs) such as joint attention and entrainment. Based on sound social psychological theory and methodology, we collect a new "Tower Game" dataset consisting of audio-visual capture of dyadic interactions labeled with the ESIPs. We expect this dataset to provide a new avenue for research in computational social interaction modeling. We propose a novel joint Discriminative Conditional Restricted Boltzmann Machine (DCRBM) model that combines a discriminative component with the generative power of CRBMs. Such a combination enables us to uncover actionable constituents of the ESIPs in two steps. First, we train the DCRBM model on the labeled data and get accurate (76\%-49\% across various ESIPs) detection of the predicates. Second, we exploit the generative capability of DCRBMs to activate the trained model so as to generate the lower-level data corresponding to the specific ESIP that closely matches the actual training data (with mean square error 0.01-0.1 for generating 100 frames). We are thus able to decompose the ESIPs into their constituent actionable behaviors. Such a purely computational determination of how to establish an ESIP such as engagement is unprecedented.
[ { "version": "v1", "created": "Wed, 6 May 2015 18:17:56 GMT" }, { "version": "v2", "created": "Thu, 28 May 2015 16:05:07 GMT" } ]
2015-05-29T00:00:00
[ [ "Amer", "Mohamed R.", "" ], [ "Siddiquie", "Behjat", "" ], [ "Tamrakar", "Amir", "" ], [ "Salter", "David A.", "" ], [ "Lande", "Brian", "" ], [ "Mehri", "Darius", "" ], [ "Divakaran", "Ajay", "" ] ]
TITLE: Human Social Interaction Modeling Using Temporal Deep Networks ABSTRACT: We present a novel approach to computational modeling of social interactions based on modeling of essential social interaction predicates (ESIPs) such as joint attention and entrainment. Based on sound social psychological theory and methodology, we collect a new "Tower Game" dataset consisting of audio-visual capture of dyadic interactions labeled with the ESIPs. We expect this dataset to provide a new avenue for research in computational social interaction modeling. We propose a novel joint Discriminative Conditional Restricted Boltzmann Machine (DCRBM) model that combines a discriminative component with the generative power of CRBMs. Such a combination enables us to uncover actionable constituents of the ESIPs in two steps. First, we train the DCRBM model on the labeled data and get accurate (76\%-49\% across various ESIPs) detection of the predicates. Second, we exploit the generative capability of DCRBMs to activate the trained model so as to generate the lower-level data corresponding to the specific ESIP that closely matches the actual training data (with mean square error 0.01-0.1 for generating 100 frames). We are thus able to decompose the ESIPs into their constituent actionable behaviors. Such a purely computational determination of how to establish an ESIP such as engagement is unprecedented.
new_dataset
0.959913
1505.07499
Reza Shokri
Vincent Bindschaedler and Reza Shokri
Privacy through Fake yet Semantically Real Traces
null
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Camouflaging data by generating fake information is a well-known obfuscation technique for protecting data privacy. In this paper, we focus on a very sensitive and increasingly exposed type of data: location data. There are two main scenarios in which fake traces are of extreme value to preserve location privacy: publishing datasets of location trajectories, and using location-based services. Despite advances in protecting (location) data privacy, there is no quantitative method to evaluate how realistic a synthetic trace is, and how much utility and privacy it provides in each scenario. Also, the lack of a methodology to generate privacy-preserving fake traces is evident. In this paper, we fill this gap and propose the first statistical metric and model to generate fake location traces such that both the utility of data and the privacy of users are preserved. We build upon the fact that, although geographically they visit distinct locations, people have strongly semantically similar mobility patterns, for example, their transition pattern across activities (e.g., working, driving, staying at home) is similar. We define a statistical metric and propose an algorithm that automatically discovers the hidden semantic similarities between locations from a bag of real location traces as seeds, without requiring any initial semantic annotations. We guarantee that fake traces are geographically dissimilar to their seeds, so they do not leak sensitive location information. We also protect contributors to seed traces against membership attacks. Interleaving fake traces with mobile users' traces is a prominent location privacy defense mechanism. We quantitatively show the effectiveness of our methodology in protecting against localization inference attacks while preserving utility of sharing/publishing traces.
[ { "version": "v1", "created": "Wed, 27 May 2015 21:48:59 GMT" } ]
2015-05-29T00:00:00
[ [ "Bindschaedler", "Vincent", "" ], [ "Shokri", "Reza", "" ] ]
TITLE: Privacy through Fake yet Semantically Real Traces ABSTRACT: Camouflaging data by generating fake information is a well-known obfuscation technique for protecting data privacy. In this paper, we focus on a very sensitive and increasingly exposed type of data: location data. There are two main scenarios in which fake traces are of extreme value to preserve location privacy: publishing datasets of location trajectories, and using location-based services. Despite advances in protecting (location) data privacy, there is no quantitative method to evaluate how realistic a synthetic trace is, and how much utility and privacy it provides in each scenario. Also, the lack of a methodology to generate privacy-preserving fake traces is evident. In this paper, we fill this gap and propose the first statistical metric and model to generate fake location traces such that both the utility of data and the privacy of users are preserved. We build upon the fact that, although geographically they visit distinct locations, people have strongly semantically similar mobility patterns, for example, their transition pattern across activities (e.g., working, driving, staying at home) is similar. We define a statistical metric and propose an algorithm that automatically discovers the hidden semantic similarities between locations from a bag of real location traces as seeds, without requiring any initial semantic annotations. We guarantee that fake traces are geographically dissimilar to their seeds, so they do not leak sensitive location information. We also protect contributors to seed traces against membership attacks. Interleaving fake traces with mobile users' traces is a prominent location privacy defense mechanism. We quantitatively show the effectiveness of our methodology in protecting against localization inference attacks while preserving utility of sharing/publishing traces.
no_new_dataset
0.951459
1505.07690
Remco Duits
Michiel Janssen, Remco Duits, Marcel Breeuwer
Invertible Orientation Scores of 3D Images
ssvm 2015 published version in LNCS contains a mistake (a switch notation spherical angles) that is corrected in this arxiv version
null
null
null
math.NA cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The enhancement and detection of elongated structures in noisy image data is relevant for many biomedical applications. To handle complex crossing structures in 2D images, 2D orientation scores were introduced, which already showed their use in a variety of applications. Here we extend this work to 3D orientation scores. First, we construct the orientation score from a given dataset, which is achieved by an invertible coherent state type of transform. For this transformation we introduce 3D versions of the 2D cake-wavelets, which are complex wavelets that can simultaneously detect oriented structures and oriented edges. For efficient implementation of the different steps in the wavelet creation we use a spherical harmonic transform. Finally, we show some first results of practical applications of 3D orientation scores.
[ { "version": "v1", "created": "Thu, 28 May 2015 13:52:41 GMT" } ]
2015-05-29T00:00:00
[ [ "Janssen", "Michiel", "" ], [ "Duits", "Remco", "" ], [ "Breeuwer", "Marcel", "" ] ]
TITLE: Invertible Orientation Scores of 3D Images ABSTRACT: The enhancement and detection of elongated structures in noisy image data is relevant for many biomedical applications. To handle complex crossing structures in 2D images, 2D orientation scores were introduced, which already showed their use in a variety of applications. Here we extend this work to 3D orientation scores. First, we construct the orientation score from a given dataset, which is achieved by an invertible coherent state type of transform. For this transformation we introduce 3D versions of the 2D cake-wavelets, which are complex wavelets that can simultaneously detect oriented structures and oriented edges. For efficient implementation of the different steps in the wavelet creation we use a spherical harmonic transform. Finally, we show some first results of practical applications of 3D orientation scores.
no_new_dataset
0.946597
1505.07716
Johannes Doerfert
Johannes Doerfert, Kevin Streit, Sebastian Hack and Zino Benaissa
Polly's Polyhedral Scheduling in the Presence of Reductions
Presented at the IMPACT15 workshop
null
null
null
cs.PL cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The polyhedral model provides a powerful mathematical abstraction to enable effective optimization of loop nests with respect to a given optimization goal, e.g., exploiting parallelism. Unexploited reduction properties are a frequent reason for polyhedral optimizers to assume parallelism prohibiting dependences. To our knowledge, no polyhedral loop optimizer available in any production compiler provides support for reductions. In this paper, we show that leveraging the parallelism of reductions can lead to a significant performance increase. We give a precise, dependence based, definition of reductions and discuss ways to extend polyhedral optimization to exploit the associativity and commutativity of reduction computations. We have implemented a reduction-enabled scheduling approach in the Polly polyhedral optimizer and evaluate it on the standard Polybench 3.2 benchmark suite. We were able to detect and model all 52 arithmetic reductions and achieve speedups up to 2.21$\times$ on a quad core machine by exploiting the multidimensional reduction in the BiCG benchmark.
[ { "version": "v1", "created": "Thu, 28 May 2015 15:05:46 GMT" } ]
2015-05-29T00:00:00
[ [ "Doerfert", "Johannes", "" ], [ "Streit", "Kevin", "" ], [ "Hack", "Sebastian", "" ], [ "Benaissa", "Zino", "" ] ]
TITLE: Polly's Polyhedral Scheduling in the Presence of Reductions ABSTRACT: The polyhedral model provides a powerful mathematical abstraction to enable effective optimization of loop nests with respect to a given optimization goal, e.g., exploiting parallelism. Unexploited reduction properties are a frequent reason for polyhedral optimizers to assume parallelism prohibiting dependences. To our knowledge, no polyhedral loop optimizer available in any production compiler provides support for reductions. In this paper, we show that leveraging the parallelism of reductions can lead to a significant performance increase. We give a precise, dependence based, definition of reductions and discuss ways to extend polyhedral optimization to exploit the associativity and commutativity of reduction computations. We have implemented a reduction-enabled scheduling approach in the Polly polyhedral optimizer and evaluate it on the standard Polybench 3.2 benchmark suite. We were able to detect and model all 52 arithmetic reductions and achieve speedups up to 2.21$\times$ on a quad core machine by exploiting the multidimensional reduction in the BiCG benchmark.
no_new_dataset
0.942348
1104.5578
Conrad Lee
Conrad Lee, Fergal Reid, Aaron McDaid, Neil Hurley
Seeding for pervasively overlapping communities
8 Pages
null
10.1103/PhysRevE.83.066107
null
physics.soc-ph cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In some social and biological networks, the majority of nodes belong to multiple communities. It has recently been shown that a number of the algorithms that are designed to detect overlapping communities do not perform well in such highly overlapping settings. Here, we consider one class of these algorithms, those which optimize a local fitness measure, typically by using a greedy heuristic to expand a seed into a community. We perform synthetic benchmarks which indicate that an appropriate seeding strategy becomes increasingly important as the extent of community overlap increases. We find that distinct cliques provide the best seeds. We find further support for this seeding strategy with benchmarks on a Facebook network and the yeast interactome.
[ { "version": "v1", "created": "Fri, 29 Apr 2011 09:21:33 GMT" } ]
2015-05-28T00:00:00
[ [ "Lee", "Conrad", "" ], [ "Reid", "Fergal", "" ], [ "McDaid", "Aaron", "" ], [ "Hurley", "Neil", "" ] ]
TITLE: Seeding for pervasively overlapping communities ABSTRACT: In some social and biological networks, the majority of nodes belong to multiple communities. It has recently been shown that a number of the algorithms that are designed to detect overlapping communities do not perform well in such highly overlapping settings. Here, we consider one class of these algorithms, those which optimize a local fitness measure, typically by using a greedy heuristic to expand a seed into a community. We perform synthetic benchmarks which indicate that an appropriate seeding strategy becomes increasingly important as the extent of community overlap increases. We find that distinct cliques provide the best seeds. We find further support for this seeding strategy with benchmarks on a Facebook network and the yeast interactome.
no_new_dataset
0.950549
1105.0819
Pierpaolo Vivo
Simone Pigolotti, Sebastian Bernhardsson, Jeppe Juul, Gorm Galster, Pierpaolo Vivo
Equilibrium strategy and population-size effects in lowest unique bid auctions
6 pag. - 7 figs - added Supplementary Material. Changed affiliations. Published version
Phys. Rev. Lett. 108, 088701 (2012)
10.1103/PhysRevLett.108.088701
null
cs.GT physics.soc-ph q-fin.GN
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In lowest unique bid auctions, $N$ players bid for an item. The winner is whoever places the \emph{lowest} bid, provided that it is also unique. We use a grand canonical approach to derive an analytical expression for the equilibrium distribution of strategies. We then study the properties of the solution as a function of the mean number of players, and compare them with a large dataset of internet auctions. The theory agrees with the data with striking accuracy for small population size $N$, while for larger $N$ a qualitatively different distribution is observed. We interpret this result as the emergence of two different regimes, one in which adaptation is feasible and one in which it is not. Our results question the actual possibility of a large population to adapt and find the optimal strategy when participating in a collective game.
[ { "version": "v1", "created": "Sat, 30 Apr 2011 10:09:03 GMT" }, { "version": "v2", "created": "Fri, 9 Dec 2011 12:15:39 GMT" }, { "version": "v3", "created": "Sat, 25 Feb 2012 15:03:56 GMT" } ]
2015-05-28T00:00:00
[ [ "Pigolotti", "Simone", "" ], [ "Bernhardsson", "Sebastian", "" ], [ "Juul", "Jeppe", "" ], [ "Galster", "Gorm", "" ], [ "Vivo", "Pierpaolo", "" ] ]
TITLE: Equilibrium strategy and population-size effects in lowest unique bid auctions ABSTRACT: In lowest unique bid auctions, $N$ players bid for an item. The winner is whoever places the \emph{lowest} bid, provided that it is also unique. We use a grand canonical approach to derive an analytical expression for the equilibrium distribution of strategies. We then study the properties of the solution as a function of the mean number of players, and compare them with a large dataset of internet auctions. The theory agrees with the data with striking accuracy for small population size $N$, while for larger $N$ a qualitatively different distribution is observed. We interpret this result as the emergence of two different regimes, one in which adaptation is feasible and one in which it is not. Our results question the actual possibility of a large population to adapt and find the optimal strategy when participating in a collective game.
no_new_dataset
0.945951
1107.4218
Maurizio Serva
Maurizio Serva
The settlement of Madagascar: what dialects and languages can tell
We find out the area and the modalities of the settlement of Madagascar by Indonesian colonizers around 650 CE. Results are obtained comparing 23 Malagasy dialects with Malay and Maanyan languages
null
10.1371/journal.pone.0030666
null
cs.CL q-bio.PE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The dialects of Madagascar belong to the Greater Barito East group of the Austronesian family and it is widely accepted that the Island was colonized by Indonesian sailors after a maritime trek which probably took place around 650 CE. The language most closely related to Malagasy dialects is Maanyan but also Malay is strongly related especially for what concerns navigation terms. Since the Maanyan Dayaks live along the Barito river in Kalimantan (Borneo) and they do not possess the necessary skill for long maritime navigation, probably they were brought as subordinates by Malay sailors. In a recent paper we compared 23 different Malagasy dialects in order to determine the time and the landing area of the first colonization. In this research we use new data and new methods to confirm that the landing took place on the south-east coast of the Island. Furthermore, we are able to state here that it is unlikely that there were multiple settlements and, therefore, colonization consisted in a single founding event. To reach our goal we find out the internal kinship relations among all the 23 Malagasy dialects and we also find out the different kinship degrees of the 23 dialects versus Malay and Maanyan. The method used is an automated version of the lexicostatistic approach. The data concerning Madagascar were collected by the author at the beginning of 2010 and consist of Swadesh lists of 200 items for 23 dialects covering all areas of the Island. The lists for Maanyan and Malay were obtained from published datasets integrated by author's interviews.
[ { "version": "v1", "created": "Thu, 21 Jul 2011 10:02:31 GMT" } ]
2015-05-28T00:00:00
[ [ "Serva", "Maurizio", "" ] ]
TITLE: The settlement of Madagascar: what dialects and languages can tell ABSTRACT: The dialects of Madagascar belong to the Greater Barito East group of the Austronesian family and it is widely accepted that the Island was colonized by Indonesian sailors after a maritime trek which probably took place around 650 CE. The language most closely related to Malagasy dialects is Maanyan but also Malay is strongly related especially for what concerns navigation terms. Since the Maanyan Dayaks live along the Barito river in Kalimantan (Borneo) and they do not possess the necessary skill for long maritime navigation, probably they were brought as subordinates by Malay sailors. In a recent paper we compared 23 different Malagasy dialects in order to determine the time and the landing area of the first colonization. In this research we use new data and new methods to confirm that the landing took place on the south-east coast of the Island. Furthermore, we are able to state here that it is unlikely that there were multiple settlements and, therefore, colonization consisted in a single founding event. To reach our goal we find out the internal kinship relations among all the 23 Malagasy dialects and we also find out the different kinship degrees of the 23 dialects versus Malay and Maanyan. The method used is an automated version of the lexicostatistic approach. The data concerning Madagascar were collected by the author at the beginning of 2010 and consist of Swadesh lists of 200 items for 23 dialects covering all areas of the Island. The lists for Maanyan and Malay were obtained from published datasets integrated by author's interviews.
no_new_dataset
0.883437
1412.5335
Gr\'egoire Mesnil
Gr\'egoire Mesnil, Tomas Mikolov, Marc'Aurelio Ranzato, Yoshua Bengio
Ensemble of Generative and Discriminative Techniques for Sentiment Analysis of Movie Reviews
null
null
null
null
cs.CL cs.IR cs.LG cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Sentiment analysis is a common task in natural language processing that aims to detect polarity of a text document (typically a consumer review). In the simplest settings, we discriminate only between positive and negative sentiment, turning the task into a standard binary classification problem. We compare several ma- chine learning approaches to this problem, and combine them to achieve the best possible results. We show how to use for this task the standard generative lan- guage models, which are slightly complementary to the state of the art techniques. We achieve strong results on a well-known dataset of IMDB movie reviews. Our results are easily reproducible, as we publish also the code needed to repeat the experiments. This should simplify further advance of the state of the art, as other researchers can combine their techniques with ours with little effort.
[ { "version": "v1", "created": "Wed, 17 Dec 2014 11:02:04 GMT" }, { "version": "v2", "created": "Thu, 18 Dec 2014 14:17:16 GMT" }, { "version": "v3", "created": "Fri, 19 Dec 2014 11:36:14 GMT" }, { "version": "v4", "created": "Tue, 3 Feb 2015 20:03:35 GMT" }, { "version": "v5", "created": "Wed, 4 Feb 2015 05:17:55 GMT" }, { "version": "v6", "created": "Thu, 16 Apr 2015 14:26:14 GMT" }, { "version": "v7", "created": "Wed, 27 May 2015 06:40:09 GMT" } ]
2015-05-28T00:00:00
[ [ "Mesnil", "Grégoire", "" ], [ "Mikolov", "Tomas", "" ], [ "Ranzato", "Marc'Aurelio", "" ], [ "Bengio", "Yoshua", "" ] ]
TITLE: Ensemble of Generative and Discriminative Techniques for Sentiment Analysis of Movie Reviews ABSTRACT: Sentiment analysis is a common task in natural language processing that aims to detect polarity of a text document (typically a consumer review). In the simplest settings, we discriminate only between positive and negative sentiment, turning the task into a standard binary classification problem. We compare several ma- chine learning approaches to this problem, and combine them to achieve the best possible results. We show how to use for this task the standard generative lan- guage models, which are slightly complementary to the state of the art techniques. We achieve strong results on a well-known dataset of IMDB movie reviews. Our results are easily reproducible, as we publish also the code needed to repeat the experiments. This should simplify further advance of the state of the art, as other researchers can combine their techniques with ours with little effort.
no_new_dataset
0.948585
1502.02791
Mingsheng Long
Mingsheng Long, Yue Cao, Jianmin Wang, Michael I. Jordan
Learning Transferable Features with Deep Adaptation Networks
null
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recent studies reveal that a deep neural network can learn transferable features which generalize well to novel tasks for domain adaptation. However, as deep features eventually transition from general to specific along the network, the feature transferability drops significantly in higher layers with increasing domain discrepancy. Hence, it is important to formally reduce the dataset bias and enhance the transferability in task-specific layers. In this paper, we propose a new Deep Adaptation Network (DAN) architecture, which generalizes deep convolutional neural network to the domain adaptation scenario. In DAN, hidden representations of all task-specific layers are embedded in a reproducing kernel Hilbert space where the mean embeddings of different domain distributions can be explicitly matched. The domain discrepancy is further reduced using an optimal multi-kernel selection method for mean embedding matching. DAN can learn transferable features with statistical guarantees, and can scale linearly by unbiased estimate of kernel embedding. Extensive empirical evidence shows that the proposed architecture yields state-of-the-art image classification error rates on standard domain adaptation benchmarks.
[ { "version": "v1", "created": "Tue, 10 Feb 2015 06:01:30 GMT" }, { "version": "v2", "created": "Wed, 27 May 2015 05:28:35 GMT" } ]
2015-05-28T00:00:00
[ [ "Long", "Mingsheng", "" ], [ "Cao", "Yue", "" ], [ "Wang", "Jianmin", "" ], [ "Jordan", "Michael I.", "" ] ]
TITLE: Learning Transferable Features with Deep Adaptation Networks ABSTRACT: Recent studies reveal that a deep neural network can learn transferable features which generalize well to novel tasks for domain adaptation. However, as deep features eventually transition from general to specific along the network, the feature transferability drops significantly in higher layers with increasing domain discrepancy. Hence, it is important to formally reduce the dataset bias and enhance the transferability in task-specific layers. In this paper, we propose a new Deep Adaptation Network (DAN) architecture, which generalizes deep convolutional neural network to the domain adaptation scenario. In DAN, hidden representations of all task-specific layers are embedded in a reproducing kernel Hilbert space where the mean embeddings of different domain distributions can be explicitly matched. The domain discrepancy is further reduced using an optimal multi-kernel selection method for mean embedding matching. DAN can learn transferable features with statistical guarantees, and can scale linearly by unbiased estimate of kernel embedding. Extensive empirical evidence shows that the proposed architecture yields state-of-the-art image classification error rates on standard domain adaptation benchmarks.
no_new_dataset
0.94699
1505.07130
Kemele M. Endris
Kemele M. Endris, Sidra Faisal, Fabrizio Orlandi, S\"oren Auer, Simon Scerri
Interest-based RDF Update Propagation
16 pages, Keywords: Change Propagation, Dataset Dynamics, Linked Data, Replication
null
null
null
cs.DC cs.DB cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Many LOD datasets, such as DBpedia and LinkedGeoData, are voluminous and process large amounts of requests from diverse applications. Many data products and services rely on full or partial local LOD replications to ensure faster querying and processing. While such replicas enhance the flexibility of information sharing and integration infrastructures, they also introduce data duplication with all the associated undesirable consequences. Given the evolving nature of the original and authoritative datasets, to ensure consistent and up-to-date replicas frequent replacements are required at a great cost. In this paper, we introduce an approach for interest-based RDF update propagation, which propagates only interesting parts of updates from the source to the target dataset. Effectively, this enables remote applications to `subscribe' to relevant datasets and consistently reflect the necessary changes locally without the need to frequently replace the entire dataset (or a relevant subset). Our approach is based on a formal definition for graph-pattern-based interest expressions that is used to filter interesting parts of updates from the source. We implement the approach in the iRap framework and perform a comprehensive evaluation based on DBpedia Live updates, to confirm the validity and value of our approach.
[ { "version": "v1", "created": "Tue, 26 May 2015 20:36:42 GMT" } ]
2015-05-28T00:00:00
[ [ "Endris", "Kemele M.", "" ], [ "Faisal", "Sidra", "" ], [ "Orlandi", "Fabrizio", "" ], [ "Auer", "Sören", "" ], [ "Scerri", "Simon", "" ] ]
TITLE: Interest-based RDF Update Propagation ABSTRACT: Many LOD datasets, such as DBpedia and LinkedGeoData, are voluminous and process large amounts of requests from diverse applications. Many data products and services rely on full or partial local LOD replications to ensure faster querying and processing. While such replicas enhance the flexibility of information sharing and integration infrastructures, they also introduce data duplication with all the associated undesirable consequences. Given the evolving nature of the original and authoritative datasets, to ensure consistent and up-to-date replicas frequent replacements are required at a great cost. In this paper, we introduce an approach for interest-based RDF update propagation, which propagates only interesting parts of updates from the source to the target dataset. Effectively, this enables remote applications to `subscribe' to relevant datasets and consistently reflect the necessary changes locally without the need to frequently replace the entire dataset (or a relevant subset). Our approach is based on a formal definition for graph-pattern-based interest expressions that is used to filter interesting parts of updates from the source. We implement the approach in the iRap framework and perform a comprehensive evaluation based on DBpedia Live updates, to confirm the validity and value of our approach.
no_new_dataset
0.951323
1505.07184
Danushka Bollegala
Danushka Bollegala and Takanori Maehara and Ken-ichi Kawarabayashi
Unsupervised Cross-Domain Word Representation Learning
53rd Annual Meeting of the Association for Computational Linguistics and the 7th International Joint Conferences on Natural Language Processing of the Asian Federation of Natural Language Processing
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Meaning of a word varies from one domain to another. Despite this important domain dependence in word semantics, existing word representation learning methods are bound to a single domain. Given a pair of \emph{source}-\emph{target} domains, we propose an unsupervised method for learning domain-specific word representations that accurately capture the domain-specific aspects of word semantics. First, we select a subset of frequent words that occur in both domains as \emph{pivots}. Next, we optimize an objective function that enforces two constraints: (a) for both source and target domain documents, pivots that appear in a document must accurately predict the co-occurring non-pivots, and (b) word representations learnt for pivots must be similar in the two domains. Moreover, we propose a method to perform domain adaptation using the learnt word representations. Our proposed method significantly outperforms competitive baselines including the state-of-the-art domain-insensitive word representations, and reports best sentiment classification accuracies for all domain-pairs in a benchmark dataset.
[ { "version": "v1", "created": "Wed, 27 May 2015 04:02:56 GMT" } ]
2015-05-28T00:00:00
[ [ "Bollegala", "Danushka", "" ], [ "Maehara", "Takanori", "" ], [ "Kawarabayashi", "Ken-ichi", "" ] ]
TITLE: Unsupervised Cross-Domain Word Representation Learning ABSTRACT: Meaning of a word varies from one domain to another. Despite this important domain dependence in word semantics, existing word representation learning methods are bound to a single domain. Given a pair of \emph{source}-\emph{target} domains, we propose an unsupervised method for learning domain-specific word representations that accurately capture the domain-specific aspects of word semantics. First, we select a subset of frequent words that occur in both domains as \emph{pivots}. Next, we optimize an objective function that enforces two constraints: (a) for both source and target domain documents, pivots that appear in a document must accurately predict the co-occurring non-pivots, and (b) word representations learnt for pivots must be similar in the two domains. Moreover, we propose a method to perform domain adaptation using the learnt word representations. Our proposed method significantly outperforms competitive baselines including the state-of-the-art domain-insensitive word representations, and reports best sentiment classification accuracies for all domain-pairs in a benchmark dataset.
no_new_dataset
0.945751
1505.07188
Peng Liu
Peng Liu and Saeed Gazor and Il-Min Kim and Dong In Kim
Energy Harvesting Noncoherent Cooperative Communications
null
null
null
null
cs.IT math.IT
http://creativecommons.org/licenses/by-nc-sa/3.0/
This paper investigates simultaneous wireless information and power transfer (SWIPT) in energy harvesting (EH) relay systems. Unlike existing SWIPT schemes requiring the channel state information (CSI) for coherent information delivery, we propose a noncoherent SWIPT framework for decode-and-forward (DF) relay systems bypassing the need for CSI and consequently saving energy in the network. The proposed SWIPT framework embraces power-splitting noncoherent DF (PS-NcDF) and time-switching noncoherent DF (TS-NcDF) in a unified form, and supports arbitrary M-ary noncoherent frequency-shift keying (FSK) and differential phase-shift keying (DPSK). Exact (noncoherent) maximum-likelihood detectors (MLDs) for PS-NcDF and TS-NcDF are developed in a unified form, which involves integral evaluations yet serves as the optimum performance benchmark for noncoherent SWIPT. To reduce the computational cost of the exact MLDs, we also propose closed-form approximate MLDs achieving near-optimum performance, thus serving as a practical solution for noncoherent SWIPT. Numerical results demonstrate a performance tradeoff between the first and second hops through the adjustment of time switching or power splitting parameters, whose optimal values minimizing the symbol-error rate (SER) are strictly between 0 and 1. We demonstrate that M-FSK results in a significant energy saving over M-DPSK for M >= 8; thus M-FSK may be more suitable for EH relay systems.
[ { "version": "v1", "created": "Wed, 27 May 2015 04:59:11 GMT" } ]
2015-05-28T00:00:00
[ [ "Liu", "Peng", "" ], [ "Gazor", "Saeed", "" ], [ "Kim", "Il-Min", "" ], [ "Kim", "Dong In", "" ] ]
TITLE: Energy Harvesting Noncoherent Cooperative Communications ABSTRACT: This paper investigates simultaneous wireless information and power transfer (SWIPT) in energy harvesting (EH) relay systems. Unlike existing SWIPT schemes requiring the channel state information (CSI) for coherent information delivery, we propose a noncoherent SWIPT framework for decode-and-forward (DF) relay systems bypassing the need for CSI and consequently saving energy in the network. The proposed SWIPT framework embraces power-splitting noncoherent DF (PS-NcDF) and time-switching noncoherent DF (TS-NcDF) in a unified form, and supports arbitrary M-ary noncoherent frequency-shift keying (FSK) and differential phase-shift keying (DPSK). Exact (noncoherent) maximum-likelihood detectors (MLDs) for PS-NcDF and TS-NcDF are developed in a unified form, which involves integral evaluations yet serves as the optimum performance benchmark for noncoherent SWIPT. To reduce the computational cost of the exact MLDs, we also propose closed-form approximate MLDs achieving near-optimum performance, thus serving as a practical solution for noncoherent SWIPT. Numerical results demonstrate a performance tradeoff between the first and second hops through the adjustment of time switching or power splitting parameters, whose optimal values minimizing the symbol-error rate (SER) are strictly between 0 and 1. We demonstrate that M-FSK results in a significant energy saving over M-DPSK for M >= 8; thus M-FSK may be more suitable for EH relay systems.
no_new_dataset
0.947624
1505.07193
Linyun Yu
Linyun Yu, Peng Cui, Fei Wang, Chaoming Song, Shiqiang Yang
From Micro to Macro: Uncovering and Predicting Information Cascading Process with Behavioral Dynamics
10 pages, 11 figures
null
null
null
cs.SI physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Cascades are ubiquitous in various network environments. How to predict these cascades is highly nontrivial in several vital applications, such as viral marketing, epidemic prevention and traffic management. Most previous works mainly focus on predicting the final cascade sizes. As cascades are typical dynamic processes, it is always interesting and important to predict the cascade size at any time, or predict the time when a cascade will reach a certain size (e.g. an threshold for outbreak). In this paper, we unify all these tasks into a fundamental problem: cascading process prediction. That is, given the early stage of a cascade, how to predict its cumulative cascade size of any later time? For such a challenging problem, how to understand the micro mechanism that drives and generates the macro phenomenons (i.e. cascading proceese) is essential. Here we introduce behavioral dynamics as the micro mechanism to describe the dynamic process of a node's neighbors get infected by a cascade after this node get infected (i.e. one-hop subcascades). Through data-driven analysis, we find out the common principles and patterns lying in behavioral dynamics and propose a novel Networked Weibull Regression model for behavioral dynamics modeling. After that we propose a novel method for predicting cascading processes by effectively aggregating behavioral dynamics, and propose a scalable solution to approximate the cascading process with a theoretical guarantee. We extensively evaluate the proposed method on a large scale social network dataset. The results demonstrate that the proposed method can significantly outperform other state-of-the-art baselines in multiple tasks including cascade size prediction, outbreak time prediction and cascading process prediction.
[ { "version": "v1", "created": "Wed, 27 May 2015 05:30:33 GMT" } ]
2015-05-28T00:00:00
[ [ "Yu", "Linyun", "" ], [ "Cui", "Peng", "" ], [ "Wang", "Fei", "" ], [ "Song", "Chaoming", "" ], [ "Yang", "Shiqiang", "" ] ]
TITLE: From Micro to Macro: Uncovering and Predicting Information Cascading Process with Behavioral Dynamics ABSTRACT: Cascades are ubiquitous in various network environments. How to predict these cascades is highly nontrivial in several vital applications, such as viral marketing, epidemic prevention and traffic management. Most previous works mainly focus on predicting the final cascade sizes. As cascades are typical dynamic processes, it is always interesting and important to predict the cascade size at any time, or predict the time when a cascade will reach a certain size (e.g. an threshold for outbreak). In this paper, we unify all these tasks into a fundamental problem: cascading process prediction. That is, given the early stage of a cascade, how to predict its cumulative cascade size of any later time? For such a challenging problem, how to understand the micro mechanism that drives and generates the macro phenomenons (i.e. cascading proceese) is essential. Here we introduce behavioral dynamics as the micro mechanism to describe the dynamic process of a node's neighbors get infected by a cascade after this node get infected (i.e. one-hop subcascades). Through data-driven analysis, we find out the common principles and patterns lying in behavioral dynamics and propose a novel Networked Weibull Regression model for behavioral dynamics modeling. After that we propose a novel method for predicting cascading processes by effectively aggregating behavioral dynamics, and propose a scalable solution to approximate the cascading process with a theoretical guarantee. We extensively evaluate the proposed method on a large scale social network dataset. The results demonstrate that the proposed method can significantly outperform other state-of-the-art baselines in multiple tasks including cascade size prediction, outbreak time prediction and cascading process prediction.
no_new_dataset
0.947137
1505.07254
Oliver Mason
Naoise Holohan, Doug Leith and Oliver Mason
Differentially Private Response Mechanisms on Categorical Data
null
null
null
null
cs.DM cs.CR math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study mechanisms for differential privacy on finite datasets. By deriving \emph{sufficient sets} for differential privacy we obtain necessary and sufficient conditions for differential privacy, a tight lower bound on the maximal expected error of a discrete mechanism and a characterisation of the optimal mechanism which minimises the maximal expected error within the class of mechanisms considered.
[ { "version": "v1", "created": "Wed, 27 May 2015 10:16:57 GMT" } ]
2015-05-28T00:00:00
[ [ "Holohan", "Naoise", "" ], [ "Leith", "Doug", "" ], [ "Mason", "Oliver", "" ] ]
TITLE: Differentially Private Response Mechanisms on Categorical Data ABSTRACT: We study mechanisms for differential privacy on finite datasets. By deriving \emph{sufficient sets} for differential privacy we obtain necessary and sufficient conditions for differential privacy, a tight lower bound on the maximal expected error of a discrete mechanism and a characterisation of the optimal mechanism which minimises the maximal expected error within the class of mechanisms considered.
no_new_dataset
0.940898
1505.07293
Vijay Badrinarayanan
Vijay Badrinarayanan, Ankur Handa, Roberto Cipolla
SegNet: A Deep Convolutional Encoder-Decoder Architecture for Robust Semantic Pixel-Wise Labelling
This version was first submitted to CVPR' 15 on November 14, 2014 with paper Id 1468. A similar architecture was proposed more recently on May 17, 2015, see http://arxiv.org/pdf/1505.04366.pdf
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a novel deep architecture, SegNet, for semantic pixel wise image labelling. SegNet has several attractive properties; (i) it only requires forward evaluation of a fully learnt function to obtain smooth label predictions, (ii) with increasing depth, a larger context is considered for pixel labelling which improves accuracy, and (iii) it is easy to visualise the effect of feature activation(s) in the pixel label space at any depth. SegNet is composed of a stack of encoders followed by a corresponding decoder stack which feeds into a soft-max classification layer. The decoders help map low resolution feature maps at the output of the encoder stack to full input image size feature maps. This addresses an important drawback of recent deep learning approaches which have adopted networks designed for object categorization for pixel wise labelling. These methods lack a mechanism to map deep layer feature maps to input dimensions. They resort to ad hoc methods to upsample features, e.g. by replication. This results in noisy predictions and also restricts the number of pooling layers in order to avoid too much upsampling and thus reduces spatial context. SegNet overcomes these problems by learning to map encoder outputs to image pixel labels. We test the performance of SegNet on outdoor RGB scenes from CamVid, KITTI and indoor scenes from the NYU dataset. Our results show that SegNet achieves state-of-the-art performance even without use of additional cues such as depth, video frames or post-processing with CRF models.
[ { "version": "v1", "created": "Wed, 27 May 2015 12:54:17 GMT" } ]
2015-05-28T00:00:00
[ [ "Badrinarayanan", "Vijay", "" ], [ "Handa", "Ankur", "" ], [ "Cipolla", "Roberto", "" ] ]
TITLE: SegNet: A Deep Convolutional Encoder-Decoder Architecture for Robust Semantic Pixel-Wise Labelling ABSTRACT: We propose a novel deep architecture, SegNet, for semantic pixel wise image labelling. SegNet has several attractive properties; (i) it only requires forward evaluation of a fully learnt function to obtain smooth label predictions, (ii) with increasing depth, a larger context is considered for pixel labelling which improves accuracy, and (iii) it is easy to visualise the effect of feature activation(s) in the pixel label space at any depth. SegNet is composed of a stack of encoders followed by a corresponding decoder stack which feeds into a soft-max classification layer. The decoders help map low resolution feature maps at the output of the encoder stack to full input image size feature maps. This addresses an important drawback of recent deep learning approaches which have adopted networks designed for object categorization for pixel wise labelling. These methods lack a mechanism to map deep layer feature maps to input dimensions. They resort to ad hoc methods to upsample features, e.g. by replication. This results in noisy predictions and also restricts the number of pooling layers in order to avoid too much upsampling and thus reduces spatial context. SegNet overcomes these problems by learning to map encoder outputs to image pixel labels. We test the performance of SegNet on outdoor RGB scenes from CamVid, KITTI and indoor scenes from the NYU dataset. Our results show that SegNet achieves state-of-the-art performance even without use of additional cues such as depth, video frames or post-processing with CRF models.
no_new_dataset
0.945349
1505.07310
Md. Iftekhar Tanveer
M. Iftekhar Tanveer
Use of Laplacian Projection Technique for Summarizing Likert Scale Annotations
null
null
null
null
cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Summarizing Likert scale ratings from human annotators is an important step for collecting human judgments. In this project we study a novel, graph theoretic method for this purpose. We also analyze a few interesting properties for this approach using real annotation datasets.
[ { "version": "v1", "created": "Tue, 26 May 2015 15:45:00 GMT" } ]
2015-05-28T00:00:00
[ [ "Tanveer", "M. Iftekhar", "" ] ]
TITLE: Use of Laplacian Projection Technique for Summarizing Likert Scale Annotations ABSTRACT: Summarizing Likert scale ratings from human annotators is an important step for collecting human judgments. In this project we study a novel, graph theoretic method for this purpose. We also analyze a few interesting properties for this approach using real annotation datasets.
no_new_dataset
0.953013
1505.07428
Manuel L\'opez-Antequera
Ruben Gomez-Ojeda, Manuel Lopez-Antequera, Nicolai Petkov, Javier Gonzalez-Jimenez
Training a Convolutional Neural Network for Appearance-Invariant Place Recognition
null
null
null
null
cs.CV cs.LG cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Place recognition is one of the most challenging problems in computer vision, and has become a key part in mobile robotics and autonomous driving applications for performing loop closure in visual SLAM systems. Moreover, the difficulty of recognizing a revisited location increases with appearance changes caused, for instance, by weather or illumination variations, which hinders the long-term application of such algorithms in real environments. In this paper we present a convolutional neural network (CNN), trained for the first time with the purpose of recognizing revisited locations under severe appearance changes, which maps images to a low dimensional space where Euclidean distances represent place dissimilarity. In order for the network to learn the desired invariances, we train it with triplets of images selected from datasets which present a challenging variability in visual appearance. The triplets are selected in such way that two samples are from the same location and the third one is taken from a different place. We validate our system through extensive experimentation, where we demonstrate better performance than state-of-art algorithms in a number of popular datasets.
[ { "version": "v1", "created": "Wed, 27 May 2015 18:21:54 GMT" } ]
2015-05-28T00:00:00
[ [ "Gomez-Ojeda", "Ruben", "" ], [ "Lopez-Antequera", "Manuel", "" ], [ "Petkov", "Nicolai", "" ], [ "Gonzalez-Jimenez", "Javier", "" ] ]
TITLE: Training a Convolutional Neural Network for Appearance-Invariant Place Recognition ABSTRACT: Place recognition is one of the most challenging problems in computer vision, and has become a key part in mobile robotics and autonomous driving applications for performing loop closure in visual SLAM systems. Moreover, the difficulty of recognizing a revisited location increases with appearance changes caused, for instance, by weather or illumination variations, which hinders the long-term application of such algorithms in real environments. In this paper we present a convolutional neural network (CNN), trained for the first time with the purpose of recognizing revisited locations under severe appearance changes, which maps images to a low dimensional space where Euclidean distances represent place dissimilarity. In order for the network to learn the desired invariances, we train it with triplets of images selected from datasets which present a challenging variability in visual appearance. The triplets are selected in such way that two samples are from the same location and the third one is taken from a different place. We validate our system through extensive experimentation, where we demonstrate better performance than state-of-art algorithms in a number of popular datasets.
no_new_dataset
0.954308
1101.4749
Osman G\"unay
Osman Gunay and Behcet Ugur Toreyin and Kivanc Kose and A. Enis Cetin
Online Adaptive Decision Fusion Framework Based on Entropic Projections onto Convex Sets with Application to Wildfire Detection in Video
10 pages, 7 figures
null
10.1117/1.3595426
null
cs.CV cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, an Entropy functional based online Adaptive Decision Fusion (EADF) framework is developed for image analysis and computer vision applications. In this framework, it is assumed that the compound algorithm consists of several sub-algorithms each of which yielding its own decision as a real number centered around zero, representing the confidence level of that particular sub-algorithm. Decision values are linearly combined with weights which are updated online according to an active fusion method based on performing entropic projections onto convex sets describing sub-algorithms. It is assumed that there is an oracle, who is usually a human operator, providing feedback to the decision fusion method. A video based wildfire detection system is developed to evaluate the performance of the algorithm in handling the problems where data arrives sequentially. In this case, the oracle is the security guard of the forest lookout tower verifying the decision of the combined algorithm. Simulation results are presented. The EADF framework is also tested with a standard dataset.
[ { "version": "v1", "created": "Tue, 25 Jan 2011 09:11:49 GMT" } ]
2015-05-27T00:00:00
[ [ "Gunay", "Osman", "" ], [ "Toreyin", "Behcet Ugur", "" ], [ "Kose", "Kivanc", "" ], [ "Cetin", "A. Enis", "" ] ]
TITLE: Online Adaptive Decision Fusion Framework Based on Entropic Projections onto Convex Sets with Application to Wildfire Detection in Video ABSTRACT: In this paper, an Entropy functional based online Adaptive Decision Fusion (EADF) framework is developed for image analysis and computer vision applications. In this framework, it is assumed that the compound algorithm consists of several sub-algorithms each of which yielding its own decision as a real number centered around zero, representing the confidence level of that particular sub-algorithm. Decision values are linearly combined with weights which are updated online according to an active fusion method based on performing entropic projections onto convex sets describing sub-algorithms. It is assumed that there is an oracle, who is usually a human operator, providing feedback to the decision fusion method. A video based wildfire detection system is developed to evaluate the performance of the algorithm in handling the problems where data arrives sequentially. In this case, the oracle is the security guard of the forest lookout tower verifying the decision of the combined algorithm. Simulation results are presented. The EADF framework is also tested with a standard dataset.
no_new_dataset
0.946646
1102.3260
Simona Cocco
Simona Cocco (LPS), R\'emi Monasson (LPTENS)
Adaptive Cluster Expansion for Inferring Boltzmann Machines with Noisy Data
Accepted for publication in Physical Review Letters (2011)
null
10.1103/PhysRevLett.106.090601
null
physics.data-an cond-mat.stat-mech cs.LG q-bio.NC q-bio.QM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce a procedure to infer the interactions among a set of binary variables, based on their sampled frequencies and pairwise correlations. The algorithm builds the clusters of variables contributing most to the entropy of the inferred Ising model, and rejects the small contributions due to the sampling noise. Our procedure successfully recovers benchmark Ising models even at criticality and in the low temperature phase, and is applied to neurobiological data.
[ { "version": "v1", "created": "Wed, 16 Feb 2011 08:15:42 GMT" } ]
2015-05-27T00:00:00
[ [ "Cocco", "Simona", "", "LPS" ], [ "Monasson", "Rémi", "", "LPTENS" ] ]
TITLE: Adaptive Cluster Expansion for Inferring Boltzmann Machines with Noisy Data ABSTRACT: We introduce a procedure to infer the interactions among a set of binary variables, based on their sampled frequencies and pairwise correlations. The algorithm builds the clusters of variables contributing most to the entropy of the inferred Ising model, and rejects the small contributions due to the sampling noise. Our procedure successfully recovers benchmark Ising models even at criticality and in the low temperature phase, and is applied to neurobiological data.
no_new_dataset
0.950411
1103.3397
Gergely Tib\'ely
Gergely Tib\'ely
Criterions for locally dense subgraphs
Revised version. 26 pages, 8 figures, 1 table
null
10.1016/j.physa.2011.09.040
null
physics.soc-ph cs.SI physics.comp-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Community detection is one of the most investigated problems in the field of complex networks. Although several methods were proposed, there is still no precise definition of communities. As a step towards a definition, I highlight two necessary properties of communities, separation and internal cohesion, the latter being a new concept. I propose a local method of community detection based on two-dimensional local optimization, which I tested on common benchmarks and on the word association database.
[ { "version": "v1", "created": "Thu, 17 Mar 2011 12:48:40 GMT" }, { "version": "v2", "created": "Tue, 23 Aug 2011 22:08:22 GMT" }, { "version": "v3", "created": "Thu, 25 Aug 2011 09:35:30 GMT" } ]
2015-05-27T00:00:00
[ [ "Tibély", "Gergely", "" ] ]
TITLE: Criterions for locally dense subgraphs ABSTRACT: Community detection is one of the most investigated problems in the field of complex networks. Although several methods were proposed, there is still no precise definition of communities. As a step towards a definition, I highlight two necessary properties of communities, separation and internal cohesion, the latter being a new concept. I propose a local method of community detection based on two-dimensional local optimization, which I tested on common benchmarks and on the word association database.
no_new_dataset
0.949482
1103.5479
Deanna Needell
Yonina C. Eldar, Deanna Needell, Yaniv Plan
Unicity conditions for low-rank matrix recovery
null
null
10.1117/12.891933
null
math.NA cs.IT cs.SY math.IT math.OC math.PR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Low-rank matrix recovery addresses the problem of recovering an unknown low-rank matrix from few linear measurements. Nuclear-norm minimization is a tractible approach with a recent surge of strong theoretical backing. Analagous to the theory of compressed sensing, these results have required random measurements. For example, m >= Cnr Gaussian measurements are sufficient to recover any rank-r n x n matrix with high probability. In this paper we address the theoretical question of how many measurements are needed via any method whatsoever --- tractible or not. We show that for a family of random measurement ensembles, m >= 4nr - 4r^2 measurements are sufficient to guarantee that no rank-2r matrix lies in the null space of the measurement operator with probability one. This is a necessary and sufficient condition to ensure uniform recovery of all rank-r matrices by rank minimization. Furthermore, this value of $m$ precisely matches the dimension of the manifold of all rank-2r matrices. We also prove that for a fixed rank-r matrix, m >= 2nr - r^2 + 1 random measurements are enough to guarantee recovery using rank minimization. These results give a benchmark to which we may compare the efficacy of nuclear-norm minimization.
[ { "version": "v1", "created": "Mon, 28 Mar 2011 20:36:03 GMT" } ]
2015-05-27T00:00:00
[ [ "Eldar", "Yonina C.", "" ], [ "Needell", "Deanna", "" ], [ "Plan", "Yaniv", "" ] ]
TITLE: Unicity conditions for low-rank matrix recovery ABSTRACT: Low-rank matrix recovery addresses the problem of recovering an unknown low-rank matrix from few linear measurements. Nuclear-norm minimization is a tractible approach with a recent surge of strong theoretical backing. Analagous to the theory of compressed sensing, these results have required random measurements. For example, m >= Cnr Gaussian measurements are sufficient to recover any rank-r n x n matrix with high probability. In this paper we address the theoretical question of how many measurements are needed via any method whatsoever --- tractible or not. We show that for a family of random measurement ensembles, m >= 4nr - 4r^2 measurements are sufficient to guarantee that no rank-2r matrix lies in the null space of the measurement operator with probability one. This is a necessary and sufficient condition to ensure uniform recovery of all rank-r matrices by rank minimization. Furthermore, this value of $m$ precisely matches the dimension of the manifold of all rank-2r matrices. We also prove that for a fixed rank-r matrix, m >= 2nr - r^2 + 1 random measurements are enough to guarantee recovery using rank minimization. These results give a benchmark to which we may compare the efficacy of nuclear-norm minimization.
no_new_dataset
0.951818
1104.4512
Vassilis Kekatos
Pedro A. Forero, Vassilis Kekatos, Georgios B. Giannakis
Robust Clustering Using Outlier-Sparsity Regularization
Submitted to IEEE Trans. on PAMI
null
10.1109/TSP.2012.2196696
null
stat.ML cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Notwithstanding the popularity of conventional clustering algorithms such as K-means and probabilistic clustering, their clustering results are sensitive to the presence of outliers in the data. Even a few outliers can compromise the ability of these algorithms to identify meaningful hidden structures rendering their outcome unreliable. This paper develops robust clustering algorithms that not only aim to cluster the data, but also to identify the outliers. The novel approaches rely on the infrequent presence of outliers in the data which translates to sparsity in a judiciously chosen domain. Capitalizing on the sparsity in the outlier domain, outlier-aware robust K-means and probabilistic clustering approaches are proposed. Their novelty lies on identifying outliers while effecting sparsity in the outlier domain through carefully chosen regularization. A block coordinate descent approach is developed to obtain iterative algorithms with convergence guarantees and small excess computational complexity with respect to their non-robust counterparts. Kernelized versions of the robust clustering algorithms are also developed to efficiently handle high-dimensional data, identify nonlinearly separable clusters, or even cluster objects that are not represented by vectors. Numerical tests on both synthetic and real datasets validate the performance and applicability of the novel algorithms.
[ { "version": "v1", "created": "Fri, 22 Apr 2011 22:01:14 GMT" } ]
2015-05-27T00:00:00
[ [ "Forero", "Pedro A.", "" ], [ "Kekatos", "Vassilis", "" ], [ "Giannakis", "Georgios B.", "" ] ]
TITLE: Robust Clustering Using Outlier-Sparsity Regularization ABSTRACT: Notwithstanding the popularity of conventional clustering algorithms such as K-means and probabilistic clustering, their clustering results are sensitive to the presence of outliers in the data. Even a few outliers can compromise the ability of these algorithms to identify meaningful hidden structures rendering their outcome unreliable. This paper develops robust clustering algorithms that not only aim to cluster the data, but also to identify the outliers. The novel approaches rely on the infrequent presence of outliers in the data which translates to sparsity in a judiciously chosen domain. Capitalizing on the sparsity in the outlier domain, outlier-aware robust K-means and probabilistic clustering approaches are proposed. Their novelty lies on identifying outliers while effecting sparsity in the outlier domain through carefully chosen regularization. A block coordinate descent approach is developed to obtain iterative algorithms with convergence guarantees and small excess computational complexity with respect to their non-robust counterparts. Kernelized versions of the robust clustering algorithms are also developed to efficiently handle high-dimensional data, identify nonlinearly separable clusters, or even cluster objects that are not represented by vectors. Numerical tests on both synthetic and real datasets validate the performance and applicability of the novel algorithms.
no_new_dataset
0.951729
1410.4871
Herwig Wendt
S\'ebastien Combrexelle, Herwig Wendt, Nicolas Dobigeon, Jean-Yves Tourneret, Steve McLaughlin and Patrice Abry
Bayesian estimation of the multifractality parameter for image texture using a Whittle approximation
null
IEEE T. Image Proces., vol. 24, no. 8, pp. 2540-2551, Aug. 2015
10.1109/TIP.2015.2426021
null
physics.data-an cs.CV stat.ME
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Texture characterization is a central element in many image processing applications. Multifractal analysis is a useful signal and image processing tool, yet, the accurate estimation of multifractal parameters for image texture remains a challenge. This is due in the main to the fact that current estimation procedures consist of performing linear regressions across frequency scales of the two-dimensional (2D) dyadic wavelet transform, for which only a few such scales are computable for images. The strongly non-Gaussian nature of multifractal processes, combined with their complicated dependence structure, makes it difficult to develop suitable models for parameter estimation. Here, we propose a Bayesian procedure that addresses the difficulties in the estimation of the multifractality parameter. The originality of the procedure is threefold: The construction of a generic semi-parametric statistical model for the logarithm of wavelet leaders; the formulation of Bayesian estimators that are associated with this model and the set of parameter values admitted by multifractal theory; the exploitation of a suitable Whittle approximation within the Bayesian model which enables the otherwise infeasible evaluation of the posterior distribution associated with the model. Performance is assessed numerically for several 2D multifractal processes, for several image sizes and a large range of process parameters. The procedure yields significant benefits over current benchmark estimators in terms of estimation performance and ability to discriminate between the two most commonly used classes of multifractal process models. The gains in performance are particularly pronounced for small image sizes, notably enabling for the first time the analysis of image patches as small as 64x64 pixels.
[ { "version": "v1", "created": "Fri, 17 Oct 2014 21:32:28 GMT" }, { "version": "v2", "created": "Thu, 9 Apr 2015 09:13:28 GMT" } ]
2015-05-27T00:00:00
[ [ "Combrexelle", "Sébastien", "" ], [ "Wendt", "Herwig", "" ], [ "Dobigeon", "Nicolas", "" ], [ "Tourneret", "Jean-Yves", "" ], [ "McLaughlin", "Steve", "" ], [ "Abry", "Patrice", "" ] ]
TITLE: Bayesian estimation of the multifractality parameter for image texture using a Whittle approximation ABSTRACT: Texture characterization is a central element in many image processing applications. Multifractal analysis is a useful signal and image processing tool, yet, the accurate estimation of multifractal parameters for image texture remains a challenge. This is due in the main to the fact that current estimation procedures consist of performing linear regressions across frequency scales of the two-dimensional (2D) dyadic wavelet transform, for which only a few such scales are computable for images. The strongly non-Gaussian nature of multifractal processes, combined with their complicated dependence structure, makes it difficult to develop suitable models for parameter estimation. Here, we propose a Bayesian procedure that addresses the difficulties in the estimation of the multifractality parameter. The originality of the procedure is threefold: The construction of a generic semi-parametric statistical model for the logarithm of wavelet leaders; the formulation of Bayesian estimators that are associated with this model and the set of parameter values admitted by multifractal theory; the exploitation of a suitable Whittle approximation within the Bayesian model which enables the otherwise infeasible evaluation of the posterior distribution associated with the model. Performance is assessed numerically for several 2D multifractal processes, for several image sizes and a large range of process parameters. The procedure yields significant benefits over current benchmark estimators in terms of estimation performance and ability to discriminate between the two most commonly used classes of multifractal process models. The gains in performance are particularly pronounced for small image sizes, notably enabling for the first time the analysis of image patches as small as 64x64 pixels.
no_new_dataset
0.950503
1505.06751
Ayad Ghany Ismaeel
Ayad Ghany Ismaeel, Raghad Zuhair Yousif
Novel Mining of Cancer via Mutation in Tumor Protein P53 using Quick Propagation Network
6 Pages, 9 figures, 2 Table
International Journal of Computer Science and Electronics Engineering IJCSEE, Volume 3, Issue 2, 2015
null
null
cs.CE
http://creativecommons.org/licenses/by/3.0/
There is multiple databases contain datasets of TP53 gene and its tumor protein P53 which believed to be involved in over 50% of human cancers cases, these databases are rich as datasets covered all mutations caused diseases (cancers), but they haven't efficient mining method can classify and diagnosis mutations patient's then predict the cancer of that patient. This paper proposed a novel mining of cancer via mutations because there is no mining method before offers friendly, effective and flexible predict or diagnosis of cancers via using whole common database of TP53 gene (tumor protein P53) as dataset and selecting a minimum number of fields in training and testing quick propagation algorithm which supporting this miming method. Simulating quick propagation network for the train dataset shows results the Correlation (0.9999), R-squared (0.9998) and mean of Absolute Relative Error (0.0029), while the training for the ALL datasets (train, test and validation dataset) have results the Correlation (0.9993), R-squared (0.9987) and mean of Absolute Relative Error (0.0057).
[ { "version": "v1", "created": "Wed, 20 May 2015 15:46:45 GMT" } ]
2015-05-27T00:00:00
[ [ "Ismaeel", "Ayad Ghany", "" ], [ "Yousif", "Raghad Zuhair", "" ] ]
TITLE: Novel Mining of Cancer via Mutation in Tumor Protein P53 using Quick Propagation Network ABSTRACT: There is multiple databases contain datasets of TP53 gene and its tumor protein P53 which believed to be involved in over 50% of human cancers cases, these databases are rich as datasets covered all mutations caused diseases (cancers), but they haven't efficient mining method can classify and diagnosis mutations patient's then predict the cancer of that patient. This paper proposed a novel mining of cancer via mutations because there is no mining method before offers friendly, effective and flexible predict or diagnosis of cancers via using whole common database of TP53 gene (tumor protein P53) as dataset and selecting a minimum number of fields in training and testing quick propagation algorithm which supporting this miming method. Simulating quick propagation network for the train dataset shows results the Correlation (0.9999), R-squared (0.9998) and mean of Absolute Relative Error (0.0029), while the training for the ALL datasets (train, test and validation dataset) have results the Correlation (0.9993), R-squared (0.9987) and mean of Absolute Relative Error (0.0057).
no_new_dataset
0.946051
1505.06800
Baochang Zhang
Lei Wang, Baochang Zhang
Boosting-like Deep Learning For Pedestrian Detection
9 pages,7 figures
null
null
null
cs.CV cs.LG cs.NE
http://creativecommons.org/licenses/by-nc-sa/3.0/
This paper proposes boosting-like deep learning (BDL) framework for pedestrian detection. Due to overtraining on the limited training samples, overfitting is a major problem of deep learning. We incorporate a boosting-like technique into deep learning to weigh the training samples, and thus prevent overtraining in the iterative process. We theoretically give the details of derivation of our algorithm, and report the experimental results on open data sets showing that BDL achieves a better stable performance than the state-of-the-arts. Our approach achieves 15.85% and 3.81% reduction in the average miss rate compared with ACF and JointDeep on the largest Caltech benchmark dataset, respectively.
[ { "version": "v1", "created": "Tue, 26 May 2015 03:52:52 GMT" } ]
2015-05-27T00:00:00
[ [ "Wang", "Lei", "" ], [ "Zhang", "Baochang", "" ] ]
TITLE: Boosting-like Deep Learning For Pedestrian Detection ABSTRACT: This paper proposes boosting-like deep learning (BDL) framework for pedestrian detection. Due to overtraining on the limited training samples, overfitting is a major problem of deep learning. We incorporate a boosting-like technique into deep learning to weigh the training samples, and thus prevent overtraining in the iterative process. We theoretically give the details of derivation of our algorithm, and report the experimental results on open data sets showing that BDL achieves a better stable performance than the state-of-the-arts. Our approach achieves 15.85% and 3.81% reduction in the average miss rate compared with ACF and JointDeep on the largest Caltech benchmark dataset, respectively.
no_new_dataset
0.948917
1505.06812
Purushottam Kar
Harikrishna Narasimhan and Purushottam Kar and Prateek Jain
Optimizing Non-decomposable Performance Measures: A Tale of Two Classes
To appear in proceedings of the 32nd International Conference on Machine Learning (ICML 2015)
Journal of Machine Learning Research, W&CP 37 (2015)
null
null
stat.ML cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Modern classification problems frequently present mild to severe label imbalance as well as specific requirements on classification characteristics, and require optimizing performance measures that are non-decomposable over the dataset, such as F-measure. Such measures have spurred much interest and pose specific challenges to learning algorithms since their non-additive nature precludes a direct application of well-studied large scale optimization methods such as stochastic gradient descent. In this paper we reveal that for two large families of performance measures that can be expressed as functions of true positive/negative rates, it is indeed possible to implement point stochastic updates. The families we consider are concave and pseudo-linear functions of TPR, TNR which cover several popularly used performance measures such as F-measure, G-mean and H-mean. Our core contribution is an adaptive linearization scheme for these families, using which we develop optimization techniques that enable truly point-based stochastic updates. For concave performance measures we propose SPADE, a stochastic primal dual solver; for pseudo-linear measures we propose STAMP, a stochastic alternate maximization procedure. Both methods have crisp convergence guarantees, demonstrate significant speedups over existing methods - often by an order of magnitude or more, and give similar or more accurate predictions on test data.
[ { "version": "v1", "created": "Tue, 26 May 2015 05:59:33 GMT" } ]
2015-05-27T00:00:00
[ [ "Narasimhan", "Harikrishna", "" ], [ "Kar", "Purushottam", "" ], [ "Jain", "Prateek", "" ] ]
TITLE: Optimizing Non-decomposable Performance Measures: A Tale of Two Classes ABSTRACT: Modern classification problems frequently present mild to severe label imbalance as well as specific requirements on classification characteristics, and require optimizing performance measures that are non-decomposable over the dataset, such as F-measure. Such measures have spurred much interest and pose specific challenges to learning algorithms since their non-additive nature precludes a direct application of well-studied large scale optimization methods such as stochastic gradient descent. In this paper we reveal that for two large families of performance measures that can be expressed as functions of true positive/negative rates, it is indeed possible to implement point stochastic updates. The families we consider are concave and pseudo-linear functions of TPR, TNR which cover several popularly used performance measures such as F-measure, G-mean and H-mean. Our core contribution is an adaptive linearization scheme for these families, using which we develop optimization techniques that enable truly point-based stochastic updates. For concave performance measures we propose SPADE, a stochastic primal dual solver; for pseudo-linear measures we propose STAMP, a stochastic alternate maximization procedure. Both methods have crisp convergence guarantees, demonstrate significant speedups over existing methods - often by an order of magnitude or more, and give similar or more accurate predictions on test data.
no_new_dataset
0.941115
1505.06814
Francesco Palmieri A. N.
Francesco A. N. Palmieri and Amedeo Buonanno
Discrete Independent Component Analysis (DICA) with Belief Propagation
Sumbitted for publication (May 2015)
null
null
null
cs.CV cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We apply belief propagation to a Bayesian bipartite graph composed of discrete independent hidden variables and discrete visible variables. The network is the Discrete counterpart of Independent Component Analysis (DICA) and it is manipulated in a factor graph form for inference and learning. A full set of simulations is reported for character images from the MNIST dataset. The results show that the factorial code implemented by the sources contributes to build a good generative model for the data that can be used in various inference modes.
[ { "version": "v1", "created": "Tue, 26 May 2015 06:02:05 GMT" } ]
2015-05-27T00:00:00
[ [ "Palmieri", "Francesco A. N.", "" ], [ "Buonanno", "Amedeo", "" ] ]
TITLE: Discrete Independent Component Analysis (DICA) with Belief Propagation ABSTRACT: We apply belief propagation to a Bayesian bipartite graph composed of discrete independent hidden variables and discrete visible variables. The network is the Discrete counterpart of Independent Component Analysis (DICA) and it is manipulated in a factor graph form for inference and learning. A full set of simulations is reported for character images from the MNIST dataset. The results show that the factorial code implemented by the sources contributes to build a good generative model for the data that can be used in various inference modes.
no_new_dataset
0.947381
1505.06872
Wanling Gao
Wanling Gao, Chunjie Luo, Jianfeng Zhan, Hainan Ye, Xiwen He, Lei Wang, Yuqing Zhu and Xinhui Tian
Identifying Dwarfs Workloads in Big Data Analytics
null
null
null
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Big data benchmarking is particularly important and provides applicable yardsticks for evaluating booming big data systems. However, wide coverage and great complexity of big data computing impose big challenges on big data benchmarking. How can we construct a benchmark suite using a minimum set of units of computation to represent diversity of big data analytics workloads? Big data dwarfs are abstractions of extracting frequently appearing operations in big data computing. One dwarf represents one unit of computation, and big data workloads are decomposed into one or more dwarfs. Furthermore, dwarfs workloads rather than vast real workloads are more cost-efficient and representative to evaluate big data systems. In this paper, we extensively investigate six most important or emerging application domains i.e. search engine, social network, e-commerce, multimedia, bioinformatics and astronomy. After analyzing forty representative algorithms, we single out eight dwarfs workloads in big data analytics other than OLAP, which are linear algebra, sampling, logic operations, transform operations, set operations, graph operations, statistic operations and sort.
[ { "version": "v1", "created": "Tue, 26 May 2015 09:38:08 GMT" } ]
2015-05-27T00:00:00
[ [ "Gao", "Wanling", "" ], [ "Luo", "Chunjie", "" ], [ "Zhan", "Jianfeng", "" ], [ "Ye", "Hainan", "" ], [ "He", "Xiwen", "" ], [ "Wang", "Lei", "" ], [ "Zhu", "Yuqing", "" ], [ "Tian", "Xinhui", "" ] ]
TITLE: Identifying Dwarfs Workloads in Big Data Analytics ABSTRACT: Big data benchmarking is particularly important and provides applicable yardsticks for evaluating booming big data systems. However, wide coverage and great complexity of big data computing impose big challenges on big data benchmarking. How can we construct a benchmark suite using a minimum set of units of computation to represent diversity of big data analytics workloads? Big data dwarfs are abstractions of extracting frequently appearing operations in big data computing. One dwarf represents one unit of computation, and big data workloads are decomposed into one or more dwarfs. Furthermore, dwarfs workloads rather than vast real workloads are more cost-efficient and representative to evaluate big data systems. In this paper, we extensively investigate six most important or emerging application domains i.e. search engine, social network, e-commerce, multimedia, bioinformatics and astronomy. After analyzing forty representative algorithms, we single out eight dwarfs workloads in big data analytics other than OLAP, which are linear algebra, sampling, logic operations, transform operations, set operations, graph operations, statistic operations and sort.
no_new_dataset
0.942929
1505.06907
Andreas Gr\"unauer
Andreas Gr\"unauer and Markus Vincze
Using Dimension Reduction to Improve the Classification of High-dimensional Data
Presented at OAGM Workshop, 2015 (arXiv:1505.01065)
null
null
OAGM/2015/09
cs.LG cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this work we show that the classification performance of high-dimensional structural MRI data with only a small set of training examples is improved by the usage of dimension reduction methods. We assessed two different dimension reduction variants: feature selection by ANOVA F-test and feature transformation by PCA. On the reduced datasets, we applied common learning algorithms using 5-fold cross-validation. Training, tuning of the hyperparameters, as well as the performance evaluation of the classifiers was conducted using two different performance measures: Accuracy, and Receiver Operating Characteristic curve (AUC). Our hypothesis is supported by experimental results.
[ { "version": "v1", "created": "Tue, 26 May 2015 11:33:04 GMT" } ]
2015-05-27T00:00:00
[ [ "Grünauer", "Andreas", "" ], [ "Vincze", "Markus", "" ] ]
TITLE: Using Dimension Reduction to Improve the Classification of High-dimensional Data ABSTRACT: In this work we show that the classification performance of high-dimensional structural MRI data with only a small set of training examples is improved by the usage of dimension reduction methods. We assessed two different dimension reduction variants: feature selection by ANOVA F-test and feature transformation by PCA. On the reduced datasets, we applied common learning algorithms using 5-fold cross-validation. Training, tuning of the hyperparameters, as well as the performance evaluation of the classifiers was conducted using two different performance measures: Accuracy, and Receiver Operating Characteristic curve (AUC). Our hypothesis is supported by experimental results.
no_new_dataset
0.953013
1505.06915
Jean-Philippe Vert
K\'evin Vervier (CBIO), Pierre Mah\'e, Maud Tournoud, Jean-Baptiste Veyrieras, Jean-Philippe Vert (CBIO)
Large-scale Machine Learning for Metagenomics Sequence Classification
null
null
null
null
q-bio.QM cs.CE cs.LG q-bio.GN stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Metagenomics characterizes the taxonomic diversity of microbial communities by sequencing DNA directly from an environmental sample. One of the main challenges in metagenomics data analysis is the binning step, where each sequenced read is assigned to a taxonomic clade. Due to the large volume of metagenomics datasets, binning methods need fast and accurate algorithms that can operate with reasonable computing requirements. While standard alignment-based methods provide state-of-the-art performance, compositional approaches that assign a taxonomic class to a DNA read based on the k-mers it contains have the potential to provide faster solutions. In this work, we investigate the potential of modern, large-scale machine learning implementations for taxonomic affectation of next-generation sequencing reads based on their k-mers profile. We show that machine learning-based compositional approaches benefit from increasing the number of fragments sampled from reference genome to tune their parameters, up to a coverage of about 10, and from increasing the k-mer size to about 12. Tuning these models involves training a machine learning model on about 10 8 samples in 10 7 dimensions, which is out of reach of standard soft-wares but can be done efficiently with modern implementations for large-scale machine learning. The resulting models are competitive in terms of accuracy with well-established alignment tools for problems involving a small to moderate number of candidate species, and for reasonable amounts of sequencing errors. We show, however, that compositional approaches are still limited in their ability to deal with problems involving a greater number of species, and more sensitive to sequencing errors. We finally confirm that compositional approach achieve faster prediction times, with a gain of 3 to 15 times with respect to the BWA-MEM short read mapper, depending on the number of candidate species and the level of sequencing noise.
[ { "version": "v1", "created": "Tue, 26 May 2015 12:02:04 GMT" } ]
2015-05-27T00:00:00
[ [ "Vervier", "Kévin", "", "CBIO" ], [ "Mahé", "Pierre", "", "CBIO" ], [ "Tournoud", "Maud", "", "CBIO" ], [ "Veyrieras", "Jean-Baptiste", "", "CBIO" ], [ "Vert", "Jean-Philippe", "", "CBIO" ] ]
TITLE: Large-scale Machine Learning for Metagenomics Sequence Classification ABSTRACT: Metagenomics characterizes the taxonomic diversity of microbial communities by sequencing DNA directly from an environmental sample. One of the main challenges in metagenomics data analysis is the binning step, where each sequenced read is assigned to a taxonomic clade. Due to the large volume of metagenomics datasets, binning methods need fast and accurate algorithms that can operate with reasonable computing requirements. While standard alignment-based methods provide state-of-the-art performance, compositional approaches that assign a taxonomic class to a DNA read based on the k-mers it contains have the potential to provide faster solutions. In this work, we investigate the potential of modern, large-scale machine learning implementations for taxonomic affectation of next-generation sequencing reads based on their k-mers profile. We show that machine learning-based compositional approaches benefit from increasing the number of fragments sampled from reference genome to tune their parameters, up to a coverage of about 10, and from increasing the k-mer size to about 12. Tuning these models involves training a machine learning model on about 10 8 samples in 10 7 dimensions, which is out of reach of standard soft-wares but can be done efficiently with modern implementations for large-scale machine learning. The resulting models are competitive in terms of accuracy with well-established alignment tools for problems involving a small to moderate number of candidate species, and for reasonable amounts of sequencing errors. We show, however, that compositional approaches are still limited in their ability to deal with problems involving a greater number of species, and more sensitive to sequencing errors. We finally confirm that compositional approach achieve faster prediction times, with a gain of 3 to 15 times with respect to the BWA-MEM short read mapper, depending on the number of candidate species and the level of sequencing noise.
no_new_dataset
0.948394
1505.06918
Roman Lutz
Roman Lutz
Fantasy Football Prediction
class project, 7 pages (1 sources, 1 appendix)
null
null
null
cs.LG
http://creativecommons.org/licenses/by/3.0/
The ubiquity of professional sports and specifically the NFL have lead to an increase in popularity for Fantasy Football. Users have many tools at their disposal: statistics, predictions, rankings of experts and even recommendations of peers. There are issues with all of these, though. Especially since many people pay money to play, the prediction tools should be enhanced as they provide unbiased and easy-to-use assistance for users. This paper provides and discusses approaches to predict Fantasy Football scores of Quarterbacks with relatively limited data. In addition to that, it includes several suggestions on how the data could be enhanced to achieve better results. The dataset consists only of game data from the last six NFL seasons. I used two different methods to predict the Fantasy Football scores of NFL players: Support Vector Regression (SVR) and Neural Networks. The results of both are promising given the limited data that was used.
[ { "version": "v1", "created": "Tue, 26 May 2015 12:14:56 GMT" } ]
2015-05-27T00:00:00
[ [ "Lutz", "Roman", "" ] ]
TITLE: Fantasy Football Prediction ABSTRACT: The ubiquity of professional sports and specifically the NFL have lead to an increase in popularity for Fantasy Football. Users have many tools at their disposal: statistics, predictions, rankings of experts and even recommendations of peers. There are issues with all of these, though. Especially since many people pay money to play, the prediction tools should be enhanced as they provide unbiased and easy-to-use assistance for users. This paper provides and discusses approaches to predict Fantasy Football scores of Quarterbacks with relatively limited data. In addition to that, it includes several suggestions on how the data could be enhanced to achieve better results. The dataset consists only of game data from the last six NFL seasons. I used two different methods to predict the Fantasy Football scores of NFL players: Support Vector Regression (SVR) and Neural Networks. The results of both are promising given the limited data that was used.
no_new_dataset
0.950503
1505.06999
Luis Ortiz
Joshua Belanich and Luis E. Ortiz
Some Open Problems in Optimal AdaBoost and Decision Stumps
4 pages, rejected from COLT15 Open Problems May 19, 2015 (submitted April 21, 2015; original 3 pages in COLT-conference format)
null
null
null
cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The significance of the study of the theoretical and practical properties of AdaBoost is unquestionable, given its simplicity, wide practical use, and effectiveness on real-world datasets. Here we present a few open problems regarding the behavior of "Optimal AdaBoost," a term coined by Rudin, Daubechies, and Schapire in 2004 to label the simple version of the standard AdaBoost algorithm in which the weak learner that AdaBoost uses always outputs the weak classifier with lowest weighted error among the respective hypothesis class of weak classifiers implicit in the weak learner. We concentrate on the standard, "vanilla" version of Optimal AdaBoost for binary classification that results from using an exponential-loss upper bound on the misclassification training error. We present two types of open problems. One deals with general weak hypotheses. The other deals with the particular case of decision stumps, as often and commonly used in practice. Answers to the open problems can have immediate significant impact to (1) cementing previously established results on asymptotic convergence properties of Optimal AdaBoost, for finite datasets, which in turn can be the start to any convergence-rate analysis; (2) understanding the weak-hypotheses class of effective decision stumps generated from data, which we have empirically observed to be significantly smaller than the typically obtained class, as well as the effect on the weak learner's running time and previously established improved bounds on the generalization performance of Optimal AdaBoost classifiers; and (3) shedding some light on the "self control" that AdaBoost tends to exhibit in practice.
[ { "version": "v1", "created": "Tue, 26 May 2015 15:18:33 GMT" } ]
2015-05-27T00:00:00
[ [ "Belanich", "Joshua", "" ], [ "Ortiz", "Luis E.", "" ] ]
TITLE: Some Open Problems in Optimal AdaBoost and Decision Stumps ABSTRACT: The significance of the study of the theoretical and practical properties of AdaBoost is unquestionable, given its simplicity, wide practical use, and effectiveness on real-world datasets. Here we present a few open problems regarding the behavior of "Optimal AdaBoost," a term coined by Rudin, Daubechies, and Schapire in 2004 to label the simple version of the standard AdaBoost algorithm in which the weak learner that AdaBoost uses always outputs the weak classifier with lowest weighted error among the respective hypothesis class of weak classifiers implicit in the weak learner. We concentrate on the standard, "vanilla" version of Optimal AdaBoost for binary classification that results from using an exponential-loss upper bound on the misclassification training error. We present two types of open problems. One deals with general weak hypotheses. The other deals with the particular case of decision stumps, as often and commonly used in practice. Answers to the open problems can have immediate significant impact to (1) cementing previously established results on asymptotic convergence properties of Optimal AdaBoost, for finite datasets, which in turn can be the start to any convergence-rate analysis; (2) understanding the weak-hypotheses class of effective decision stumps generated from data, which we have empirically observed to be significantly smaller than the typically obtained class, as well as the effect on the weak learner's running time and previously established improved bounds on the generalization performance of Optimal AdaBoost classifiers; and (3) shedding some light on the "self control" that AdaBoost tends to exhibit in practice.
no_new_dataset
0.94366
1406.4923
Jeremy Kepner
Jeremy Kepner, William Arcand, David Bestor, Bill Bergeron, Chansup Byun, Vijay Gadepally, Matthew Hubbell, Peter Michaleas, Julie Mullen, Andrew Prout, Albert Reuther, Antonio Rosa, Charles Yee (MIT)
Achieving 100,000,000 database inserts per second using Accumulo and D4M
6 pages; to appear in IEEE High Performance Extreme Computing (HPEC) 2014
null
10.1109/HPEC.2014.7040945
null
cs.DB astro-ph.IM cs.CE cs.DC cs.MS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Apache Accumulo database is an open source relaxed consistency database that is widely used for government applications. Accumulo is designed to deliver high performance on unstructured data such as graphs of network data. This paper tests the performance of Accumulo using data from the Graph500 benchmark. The Dynamic Distributed Dimensional Data Model (D4M) software is used to implement the benchmark on a 216-node cluster running the MIT SuperCloud software stack. A peak performance of over 100,000,000 database inserts per second was achieved which is 100x larger than the highest previously published value for any other database. The performance scales linearly with the number of ingest clients, number of database servers, and data size. The performance was achieved by adapting several supercomputing techniques to this application: distributed arrays, domain decomposition, adaptive load balancing, and single-program-multiple-data programming.
[ { "version": "v1", "created": "Thu, 19 Jun 2014 00:44:12 GMT" } ]
2015-05-26T00:00:00
[ [ "Kepner", "Jeremy", "", "MIT" ], [ "Arcand", "William", "", "MIT" ], [ "Bestor", "David", "", "MIT" ], [ "Bergeron", "Bill", "", "MIT" ], [ "Byun", "Chansup", "", "MIT" ], [ "Gadepally", "Vijay", "", "MIT" ], [ "Hubbell", "Matthew", "", "MIT" ], [ "Michaleas", "Peter", "", "MIT" ], [ "Mullen", "Julie", "", "MIT" ], [ "Prout", "Andrew", "", "MIT" ], [ "Reuther", "Albert", "", "MIT" ], [ "Rosa", "Antonio", "", "MIT" ], [ "Yee", "Charles", "", "MIT" ] ]
TITLE: Achieving 100,000,000 database inserts per second using Accumulo and D4M ABSTRACT: The Apache Accumulo database is an open source relaxed consistency database that is widely used for government applications. Accumulo is designed to deliver high performance on unstructured data such as graphs of network data. This paper tests the performance of Accumulo using data from the Graph500 benchmark. The Dynamic Distributed Dimensional Data Model (D4M) software is used to implement the benchmark on a 216-node cluster running the MIT SuperCloud software stack. A peak performance of over 100,000,000 database inserts per second was achieved which is 100x larger than the highest previously published value for any other database. The performance scales linearly with the number of ingest clients, number of database servers, and data size. The performance was achieved by adapting several supercomputing techniques to this application: distributed arrays, domain decomposition, adaptive load balancing, and single-program-multiple-data programming.
no_new_dataset
0.946843
1407.3859
Jeremy Kepner
Jeremy Kepner, Christian Anderson, William Arcand, David Bestor, Bill Bergeron, Chansup Byun, Matthew Hubbell, Peter Michaleas, Julie Mullen, David O'Gwynn, Andrew Prout, Albert Reuther, Antonio Rosa, Charles Yee (MIT)
D4M 2.0 Schema: A General Purpose High Performance Schema for the Accumulo Database
6 pages; IEEE HPEC 2013
null
10.1109/HPEC.2013.6670318
null
cs.DB astro-ph.IM cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Non-traditional, relaxed consistency, triple store databases are the backbone of many web companies (e.g., Google Big Table, Amazon Dynamo, and Facebook Cassandra). The Apache Accumulo database is a high performance open source relaxed consistency database that is widely used for government applications. Obtaining the full benefits of Accumulo requires using novel schemas. The Dynamic Distributed Dimensional Data Model (D4M)[http://d4m.mit.edu] provides a uniform mathematical framework based on associative arrays that encompasses both traditional (i.e., SQL) and non-traditional databases. For non-traditional databases D4M naturally leads to a general purpose schema that can be used to fully index and rapidly query every unique string in a dataset. The D4M 2.0 Schema has been applied with little or no customization to cyber, bioinformatics, scientific citation, free text, and social media data. The D4M 2.0 Schema is simple, requires minimal parsing, and achieves the highest published Accumulo ingest rates. The benefits of the D4M 2.0 Schema are independent of the D4M interface. Any interface to Accumulo can achieve these benefits by using the D4M 2.0 Schema
[ { "version": "v1", "created": "Tue, 15 Jul 2014 01:54:45 GMT" } ]
2015-05-26T00:00:00
[ [ "Kepner", "Jeremy", "", "MIT" ], [ "Anderson", "Christian", "", "MIT" ], [ "Arcand", "William", "", "MIT" ], [ "Bestor", "David", "", "MIT" ], [ "Bergeron", "Bill", "", "MIT" ], [ "Byun", "Chansup", "", "MIT" ], [ "Hubbell", "Matthew", "", "MIT" ], [ "Michaleas", "Peter", "", "MIT" ], [ "Mullen", "Julie", "", "MIT" ], [ "O'Gwynn", "David", "", "MIT" ], [ "Prout", "Andrew", "", "MIT" ], [ "Reuther", "Albert", "", "MIT" ], [ "Rosa", "Antonio", "", "MIT" ], [ "Yee", "Charles", "", "MIT" ] ]
TITLE: D4M 2.0 Schema: A General Purpose High Performance Schema for the Accumulo Database ABSTRACT: Non-traditional, relaxed consistency, triple store databases are the backbone of many web companies (e.g., Google Big Table, Amazon Dynamo, and Facebook Cassandra). The Apache Accumulo database is a high performance open source relaxed consistency database that is widely used for government applications. Obtaining the full benefits of Accumulo requires using novel schemas. The Dynamic Distributed Dimensional Data Model (D4M)[http://d4m.mit.edu] provides a uniform mathematical framework based on associative arrays that encompasses both traditional (i.e., SQL) and non-traditional databases. For non-traditional databases D4M naturally leads to a general purpose schema that can be used to fully index and rapidly query every unique string in a dataset. The D4M 2.0 Schema has been applied with little or no customization to cyber, bioinformatics, scientific citation, free text, and social media data. The D4M 2.0 Schema is simple, requires minimal parsing, and achieves the highest published Accumulo ingest rates. The benefits of the D4M 2.0 Schema are independent of the D4M interface. Any interface to Accumulo can achieve these benefits by using the D4M 2.0 Schema
no_new_dataset
0.949153
1412.1740
Matthew Kusner
Matt J. Kusner, Nicholas I. Kolkin, Stephen Tyree, Kilian Q. Weinberger
Image Data Compression for Covariance and Histogram Descriptors
null
null
null
null
stat.ML cs.CV cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Covariance and histogram image descriptors provide an effective way to capture information about images. Both excel when used in combination with special purpose distance metrics. For covariance descriptors these metrics measure the distance along the non-Euclidean Riemannian manifold of symmetric positive definite matrices. For histogram descriptors the Earth Mover's distance measures the optimal transport between two histograms. Although more precise, these distance metrics are very expensive to compute, making them impractical in many applications, even for data sets of only a few thousand examples. In this paper we present two methods to compress the size of covariance and histogram datasets with only marginal increases in test error for k-nearest neighbor classification. Specifically, we show that we can reduce data sets to 16% and in some cases as little as 2% of their original size, while approximately matching the test error of kNN classification on the full training set. In fact, because the compressed set is learned in a supervised fashion, it sometimes even outperforms the full data set, while requiring only a fraction of the space and drastically reducing test-time computation.
[ { "version": "v1", "created": "Thu, 4 Dec 2014 17:22:22 GMT" }, { "version": "v2", "created": "Sat, 23 May 2015 17:07:59 GMT" } ]
2015-05-26T00:00:00
[ [ "Kusner", "Matt J.", "" ], [ "Kolkin", "Nicholas I.", "" ], [ "Tyree", "Stephen", "" ], [ "Weinberger", "Kilian Q.", "" ] ]
TITLE: Image Data Compression for Covariance and Histogram Descriptors ABSTRACT: Covariance and histogram image descriptors provide an effective way to capture information about images. Both excel when used in combination with special purpose distance metrics. For covariance descriptors these metrics measure the distance along the non-Euclidean Riemannian manifold of symmetric positive definite matrices. For histogram descriptors the Earth Mover's distance measures the optimal transport between two histograms. Although more precise, these distance metrics are very expensive to compute, making them impractical in many applications, even for data sets of only a few thousand examples. In this paper we present two methods to compress the size of covariance and histogram datasets with only marginal increases in test error for k-nearest neighbor classification. Specifically, we show that we can reduce data sets to 16% and in some cases as little as 2% of their original size, while approximately matching the test error of kNN classification on the full training set. In fact, because the compressed set is learned in a supervised fashion, it sometimes even outperforms the full data set, while requiring only a fraction of the space and drastically reducing test-time computation.
no_new_dataset
0.950227
1502.01911
Mehdi Mortazawi Molu
Mehdi M. Molu and Alister Burr and Norbert Goertz
Statistical Analysis of Multi-Antenna Relay Systems and Power Allocation Algorithms in a Relay with Partial Channel State Information
null
null
10.1109/TWC.2015.2432768
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The performance of a dual-hop MIMO relay network is studied in this paper. The relay is assumed to have access to the statistical channel state information of its preceding and following channels and it is assumed that fading at the antennas of the relay is correlated. The cumulative density function (cdf) of the received SNR at the destination is first studied and closed-form expressions are derived for the asymptotic cases of the fully-correlated and non-correlated scenarios; moreover, the statistical characteristics of the SNR are further studied and an approximate cdf of the SNR is derived for arbitrary correlation. The cdf is a multipartite function which does not easily lend itself to further mathematical calculations, e.g., rate optimization. However, we use it to propose a simple power allocation algorithm which we call "proportional power allocation". The algorithm is explained in detail for the case of two antennas and three antennas at the relay and the extension of the algorithm to a relay with an arbitrary number of the antennas is discussed. Although the proposed method is not claimed to be optimal, the result is indistinguishable from the benchmark obtained using exhaustive search. The simplicity of the algorithm combined with its precision is indeed attractive from the practical point of view.
[ { "version": "v1", "created": "Fri, 6 Feb 2015 15:03:10 GMT" }, { "version": "v2", "created": "Sat, 2 May 2015 13:03:06 GMT" } ]
2015-05-26T00:00:00
[ [ "Molu", "Mehdi M.", "" ], [ "Burr", "Alister", "" ], [ "Goertz", "Norbert", "" ] ]
TITLE: Statistical Analysis of Multi-Antenna Relay Systems and Power Allocation Algorithms in a Relay with Partial Channel State Information ABSTRACT: The performance of a dual-hop MIMO relay network is studied in this paper. The relay is assumed to have access to the statistical channel state information of its preceding and following channels and it is assumed that fading at the antennas of the relay is correlated. The cumulative density function (cdf) of the received SNR at the destination is first studied and closed-form expressions are derived for the asymptotic cases of the fully-correlated and non-correlated scenarios; moreover, the statistical characteristics of the SNR are further studied and an approximate cdf of the SNR is derived for arbitrary correlation. The cdf is a multipartite function which does not easily lend itself to further mathematical calculations, e.g., rate optimization. However, we use it to propose a simple power allocation algorithm which we call "proportional power allocation". The algorithm is explained in detail for the case of two antennas and three antennas at the relay and the extension of the algorithm to a relay with an arbitrary number of the antennas is discussed. Although the proposed method is not claimed to be optimal, the result is indistinguishable from the benchmark obtained using exhaustive search. The simplicity of the algorithm combined with its precision is indeed attractive from the practical point of view.
no_new_dataset
0.95018
1504.06580
Cicero dos Santos
Cicero Nogueira dos Santos, Bing Xiang, Bowen Zhou
Classifying Relations by Ranking with Convolutional Neural Networks
Accepted as a long paper in the 53rd Annual Meeting of the Association for Computational Linguistics (ACL 2015)
null
null
null
cs.CL cs.LG cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Relation classification is an important semantic processing task for which state-ofthe-art systems still rely on costly handcrafted features. In this work we tackle the relation classification task using a convolutional neural network that performs classification by ranking (CR-CNN). We propose a new pairwise ranking loss function that makes it easy to reduce the impact of artificial classes. We perform experiments using the the SemEval-2010 Task 8 dataset, which is designed for the task of classifying the relationship between two nominals marked in a sentence. Using CRCNN, we outperform the state-of-the-art for this dataset and achieve a F1 of 84.1 without using any costly handcrafted features. Additionally, our experimental results show that: (1) our approach is more effective than CNN followed by a softmax classifier; (2) omitting the representation of the artificial class Other improves both precision and recall; and (3) using only word embeddings as input features is enough to achieve state-of-the-art results if we consider only the text between the two target nominals.
[ { "version": "v1", "created": "Fri, 24 Apr 2015 17:50:33 GMT" }, { "version": "v2", "created": "Sun, 24 May 2015 13:58:05 GMT" } ]
2015-05-26T00:00:00
[ [ "Santos", "Cicero Nogueira dos", "" ], [ "Xiang", "Bing", "" ], [ "Zhou", "Bowen", "" ] ]
TITLE: Classifying Relations by Ranking with Convolutional Neural Networks ABSTRACT: Relation classification is an important semantic processing task for which state-ofthe-art systems still rely on costly handcrafted features. In this work we tackle the relation classification task using a convolutional neural network that performs classification by ranking (CR-CNN). We propose a new pairwise ranking loss function that makes it easy to reduce the impact of artificial classes. We perform experiments using the the SemEval-2010 Task 8 dataset, which is designed for the task of classifying the relationship between two nominals marked in a sentence. Using CRCNN, we outperform the state-of-the-art for this dataset and achieve a F1 of 84.1 without using any costly handcrafted features. Additionally, our experimental results show that: (1) our approach is more effective than CNN followed by a softmax classifier; (2) omitting the representation of the artificial class Other improves both precision and recall; and (3) using only word embeddings as input features is enough to achieve state-of-the-art results if we consider only the text between the two target nominals.
no_new_dataset
0.946646
1505.06249
Alexandre Drouin
Alexandre Drouin, S\'ebastien Gigu\`ere, Maxime D\'eraspe, Fran\c{c}ois Laviolette, Mario Marchand, Jacques Corbeil
Greedy Biomarker Discovery in the Genome with Applications to Antimicrobial Resistance
Peer-reviewed and accepted for an oral presentation in the Greed is Great workshop at the International Conference on Machine Learning, Lille, France, 2015
null
null
null
q-bio.GN cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Set Covering Machine (SCM) is a greedy learning algorithm that produces sparse classifiers. We extend the SCM for datasets that contain a huge number of features. The whole genetic material of living organisms is an example of such a case, where the number of feature exceeds 10^7. Three human pathogens were used to evaluate the performance of the SCM at predicting antimicrobial resistance. Our results show that the SCM compares favorably in terms of sparsity and accuracy against L1 and L2 regularized Support Vector Machines and CART decision trees. Moreover, the SCM was the only algorithm that could consider the full feature space. For all other algorithms, the latter had to be filtered as a preprocessing step.
[ { "version": "v1", "created": "Fri, 22 May 2015 23:29:40 GMT" } ]
2015-05-26T00:00:00
[ [ "Drouin", "Alexandre", "" ], [ "Giguère", "Sébastien", "" ], [ "Déraspe", "Maxime", "" ], [ "Laviolette", "François", "" ], [ "Marchand", "Mario", "" ], [ "Corbeil", "Jacques", "" ] ]
TITLE: Greedy Biomarker Discovery in the Genome with Applications to Antimicrobial Resistance ABSTRACT: The Set Covering Machine (SCM) is a greedy learning algorithm that produces sparse classifiers. We extend the SCM for datasets that contain a huge number of features. The whole genetic material of living organisms is an example of such a case, where the number of feature exceeds 10^7. Three human pathogens were used to evaluate the performance of the SCM at predicting antimicrobial resistance. Our results show that the SCM compares favorably in terms of sparsity and accuracy against L1 and L2 regularized Support Vector Machines and CART decision trees. Moreover, the SCM was the only algorithm that could consider the full feature space. For all other algorithms, the latter had to be filtered as a preprocessing step.
no_new_dataset
0.952309
1505.06250
George Toderici
Balakrishnan Varadarajan and George Toderici and Sudheendra Vijayanarasimhan and Apostol Natsev
Efficient Large Scale Video Classification
null
null
null
null
cs.CV cs.MM cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Video classification has advanced tremendously over the recent years. A large part of the improvements in video classification had to do with the work done by the image classification community and the use of deep convolutional networks (CNNs) which produce competitive results with hand- crafted motion features. These networks were adapted to use video frames in various ways and have yielded state of the art classification results. We present two methods that build on this work, and scale it up to work with millions of videos and hundreds of thousands of classes while maintaining a low computational cost. In the context of large scale video processing, training CNNs on video frames is extremely time consuming, due to the large number of frames involved. We propose to avoid this problem by training CNNs on either YouTube thumbnails or Flickr images, and then using these networks' outputs as features for other higher level classifiers. We discuss the challenges of achieving this and propose two models for frame-level and video-level classification. The first is a highly efficient mixture of experts while the latter is based on long short term memory neural networks. We present results on the Sports-1M video dataset (1 million videos, 487 classes) and on a new dataset which has 12 million videos and 150,000 labels.
[ { "version": "v1", "created": "Fri, 22 May 2015 23:45:32 GMT" } ]
2015-05-26T00:00:00
[ [ "Varadarajan", "Balakrishnan", "" ], [ "Toderici", "George", "" ], [ "Vijayanarasimhan", "Sudheendra", "" ], [ "Natsev", "Apostol", "" ] ]
TITLE: Efficient Large Scale Video Classification ABSTRACT: Video classification has advanced tremendously over the recent years. A large part of the improvements in video classification had to do with the work done by the image classification community and the use of deep convolutional networks (CNNs) which produce competitive results with hand- crafted motion features. These networks were adapted to use video frames in various ways and have yielded state of the art classification results. We present two methods that build on this work, and scale it up to work with millions of videos and hundreds of thousands of classes while maintaining a low computational cost. In the context of large scale video processing, training CNNs on video frames is extremely time consuming, due to the large number of frames involved. We propose to avoid this problem by training CNNs on either YouTube thumbnails or Flickr images, and then using these networks' outputs as features for other higher level classifiers. We discuss the challenges of achieving this and propose two models for frame-level and video-level classification. The first is a highly efficient mixture of experts while the latter is based on long short term memory neural networks. We present results on the Sports-1M video dataset (1 million videos, 487 classes) and on a new dataset which has 12 million videos and 150,000 labels.
new_dataset
0.962427
1505.06485
Syama Sundar Rangapuram
Syama Sundar Rangapuram and Matthias Hein
Constrained 1-Spectral Clustering
Long version of paper accepted at AISTATS 2012
null
null
null
stat.ML cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
An important form of prior information in clustering comes in form of cannot-link and must-link constraints. We present a generalization of the popular spectral clustering technique which integrates such constraints. Motivated by the recently proposed $1$-spectral clustering for the unconstrained problem, our method is based on a tight relaxation of the constrained normalized cut into a continuous optimization problem. Opposite to all other methods which have been suggested for constrained spectral clustering, we can always guarantee to satisfy all constraints. Moreover, our soft formulation allows to optimize a trade-off between normalized cut and the number of violated constraints. An efficient implementation is provided which scales to large datasets. We outperform consistently all other proposed methods in the experiments.
[ { "version": "v1", "created": "Sun, 24 May 2015 21:25:44 GMT" } ]
2015-05-26T00:00:00
[ [ "Rangapuram", "Syama Sundar", "" ], [ "Hein", "Matthias", "" ] ]
TITLE: Constrained 1-Spectral Clustering ABSTRACT: An important form of prior information in clustering comes in form of cannot-link and must-link constraints. We present a generalization of the popular spectral clustering technique which integrates such constraints. Motivated by the recently proposed $1$-spectral clustering for the unconstrained problem, our method is based on a tight relaxation of the constrained normalized cut into a continuous optimization problem. Opposite to all other methods which have been suggested for constrained spectral clustering, we can always guarantee to satisfy all constraints. Moreover, our soft formulation allows to optimize a trade-off between normalized cut and the number of violated constraints. An efficient implementation is provided which scales to large datasets. We outperform consistently all other proposed methods in the experiments.
no_new_dataset
0.944689
1505.06531
Tsu-Wei Chen
Tsu-Wei Chen, Meena Abdelmaseeh, Daniel Stashuk
Affine and Regional Dynamic Time Warpng
null
null
null
null
cs.CV cs.CE cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Pointwise matches between two time series are of great importance in time series analysis, and dynamic time warping (DTW) is known to provide generally reasonable matches. There are situations where time series alignment should be invariant to scaling and offset in amplitude or where local regions of the considered time series should be strongly reflected in pointwise matches. Two different variants of DTW, affine DTW (ADTW) and regional DTW (RDTW), are proposed to handle scaling and offset in amplitude and provide regional emphasis respectively. Furthermore, ADTW and RDTW can be combined in two different ways to generate alignments that incorporate advantages from both methods, where the affine model can be applied either globally to the entire time series or locally to each region. The proposed alignment methods outperform DTW on specific simulated datasets, and one-nearest-neighbor classifiers using their associated difference measures are competitive with the difference measures associated with state-of-the-art alignment methods on real datasets.
[ { "version": "v1", "created": "Mon, 25 May 2015 03:23:31 GMT" } ]
2015-05-26T00:00:00
[ [ "Chen", "Tsu-Wei", "" ], [ "Abdelmaseeh", "Meena", "" ], [ "Stashuk", "Daniel", "" ] ]
TITLE: Affine and Regional Dynamic Time Warpng ABSTRACT: Pointwise matches between two time series are of great importance in time series analysis, and dynamic time warping (DTW) is known to provide generally reasonable matches. There are situations where time series alignment should be invariant to scaling and offset in amplitude or where local regions of the considered time series should be strongly reflected in pointwise matches. Two different variants of DTW, affine DTW (ADTW) and regional DTW (RDTW), are proposed to handle scaling and offset in amplitude and provide regional emphasis respectively. Furthermore, ADTW and RDTW can be combined in two different ways to generate alignments that incorporate advantages from both methods, where the affine model can be applied either globally to the entire time series or locally to each region. The proposed alignment methods outperform DTW on specific simulated datasets, and one-nearest-neighbor classifiers using their associated difference measures are competitive with the difference measures associated with state-of-the-art alignment methods on real datasets.
no_new_dataset
0.953188
1505.06532
Ali Jahanian
Ali Jahanian, S. V. N. Vishwanathan, Jan P. Allebach
Colors $-$Messengers of Concepts: Visual Design Mining for Learning Color Semantics
null
null
null
null
cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper studies the concept of color semantics by modeling a dataset of magazine cover designs, evaluating the model via crowdsourcing, and demonstrating several prototypes that facilitate color-related design tasks. We investigate a probabilistic generative modeling framework that expresses semantic concepts as a combination of color and word distributions $-$color-word topics. We adopt an extension to Latent Dirichlet Allocation (LDA) topic modeling called LDA-dual to infer a set of color-word topics over a corpus of 2,654 magazine covers spanning 71 distinct titles and 12 genres. While LDA models text documents as distributions over word topics, we model magazine covers as distributions over color-word topics. The results of our crowdsourced experiments confirm that the model is able to successfully discover the associations between colors and linguistic concepts. Finally, we demonstrate several simple prototypes that apply the learned model to color palette recommendation, design example retrieval, image retrieval, image color selection, and image recoloring.
[ { "version": "v1", "created": "Mon, 25 May 2015 03:34:46 GMT" } ]
2015-05-26T00:00:00
[ [ "Jahanian", "Ali", "" ], [ "Vishwanathan", "S. V. N.", "" ], [ "Allebach", "Jan P.", "" ] ]
TITLE: Colors $-$Messengers of Concepts: Visual Design Mining for Learning Color Semantics ABSTRACT: This paper studies the concept of color semantics by modeling a dataset of magazine cover designs, evaluating the model via crowdsourcing, and demonstrating several prototypes that facilitate color-related design tasks. We investigate a probabilistic generative modeling framework that expresses semantic concepts as a combination of color and word distributions $-$color-word topics. We adopt an extension to Latent Dirichlet Allocation (LDA) topic modeling called LDA-dual to infer a set of color-word topics over a corpus of 2,654 magazine covers spanning 71 distinct titles and 12 genres. While LDA models text documents as distributions over word topics, we model magazine covers as distributions over color-word topics. The results of our crowdsourced experiments confirm that the model is able to successfully discover the associations between colors and linguistic concepts. Finally, we demonstrate several simple prototypes that apply the learned model to color palette recommendation, design example retrieval, image retrieval, image color selection, and image recoloring.
no_new_dataset
0.943138
1505.06538
J Massey Cashore
J. Massey Cashore, Xiaoting Zhao, Alexander A. Alemi, Yujia Liu, Peter I. Frazier
Clustering via Content-Augmented Stochastic Blockmodels
null
null
null
null
stat.ML cs.LG cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Much of the data being created on the web contains interactions between users and items. Stochastic blockmodels, and other methods for community detection and clustering of bipartite graphs, can infer latent user communities and latent item clusters from this interaction data. These methods, however, typically ignore the items' contents and the information they provide about item clusters, despite the tendency of items in the same latent cluster to share commonalities in content. We introduce content-augmented stochastic blockmodels (CASB), which use item content together with user-item interaction data to enhance the user communities and item clusters learned. Comparisons to several state-of-the-art benchmark methods, on datasets arising from scientists interacting with scientific articles, show that content-augmented stochastic blockmodels provide highly accurate clusters with respect to metrics representative of the underlying community structure.
[ { "version": "v1", "created": "Mon, 25 May 2015 04:19:12 GMT" } ]
2015-05-26T00:00:00
[ [ "Cashore", "J. Massey", "" ], [ "Zhao", "Xiaoting", "" ], [ "Alemi", "Alexander A.", "" ], [ "Liu", "Yujia", "" ], [ "Frazier", "Peter I.", "" ] ]
TITLE: Clustering via Content-Augmented Stochastic Blockmodels ABSTRACT: Much of the data being created on the web contains interactions between users and items. Stochastic blockmodels, and other methods for community detection and clustering of bipartite graphs, can infer latent user communities and latent item clusters from this interaction data. These methods, however, typically ignore the items' contents and the information they provide about item clusters, despite the tendency of items in the same latent cluster to share commonalities in content. We introduce content-augmented stochastic blockmodels (CASB), which use item content together with user-item interaction data to enhance the user communities and item clusters learned. Comparisons to several state-of-the-art benchmark methods, on datasets arising from scientists interacting with scientific articles, show that content-augmented stochastic blockmodels provide highly accurate clusters with respect to metrics representative of the underlying community structure.
no_new_dataset
0.946794
1505.05921
Katherine Driggs-Campbell
Katherine Driggs-Campbell and Ruzena Bajcsy
Identifying Modes of Intent from Driver Behaviors in Dynamic Environments
Submitted to ITSC 2015
null
null
null
cs.SY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In light of growing attention of intelligent vehicle systems, we propose developing a driver model that uses a hybrid system formulation to capture the intent of the driver. This model hopes to capture human driving behavior in a way that can be utilized by semi- and fully autonomous systems in heterogeneous environments. We consider a discrete set of high level goals or intent modes, that is designed to encompass the decision making process of the human. A driver model is derived using a dataset of lane changes collected in a realistic driving simulator, in which the driver actively labels data to give us insight into her intent. By building the labeled dataset, we are able to utilize classification tools to build the driver model using features of based on her perception of the environment, and achieve high accuracy in identifying driver intent. Multiple algorithms are presented and compared on the dataset, and a comparison of the varying behaviors between drivers is drawn. Using this modeling methodology, we present a model that can be used to assess driver behaviors and to develop human-inspired safety metrics that can be utilized in intelligent vehicular systems.
[ { "version": "v1", "created": "Thu, 21 May 2015 23:19:09 GMT" } ]
2015-05-25T00:00:00
[ [ "Driggs-Campbell", "Katherine", "" ], [ "Bajcsy", "Ruzena", "" ] ]
TITLE: Identifying Modes of Intent from Driver Behaviors in Dynamic Environments ABSTRACT: In light of growing attention of intelligent vehicle systems, we propose developing a driver model that uses a hybrid system formulation to capture the intent of the driver. This model hopes to capture human driving behavior in a way that can be utilized by semi- and fully autonomous systems in heterogeneous environments. We consider a discrete set of high level goals or intent modes, that is designed to encompass the decision making process of the human. A driver model is derived using a dataset of lane changes collected in a realistic driving simulator, in which the driver actively labels data to give us insight into her intent. By building the labeled dataset, we are able to utilize classification tools to build the driver model using features of based on her perception of the environment, and achieve high accuracy in identifying driver intent. Multiple algorithms are presented and compared on the dataset, and a comparison of the varying behaviors between drivers is drawn. Using this modeling methodology, we present a model that can be used to assess driver behaviors and to develop human-inspired safety metrics that can be utilized in intelligent vehicular systems.
new_dataset
0.9598
1505.05957
Tianmin Shu
Tianmin Shu, Dan Xie, Brandon Rothrock, Sinisa Todorovic, Song-Chun Zhu
Joint Inference of Groups, Events and Human Roles in Aerial Videos
CVPR 2015 Oral Presentation
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
With the advent of drones, aerial video analysis becomes increasingly important; yet, it has received scant attention in the literature. This paper addresses a new problem of parsing low-resolution aerial videos of large spatial areas, in terms of 1) grouping, 2) recognizing events and 3) assigning roles to people engaged in events. We propose a novel framework aimed at conducting joint inference of the above tasks, as reasoning about each in isolation typically fails in our setting. Given noisy tracklets of people and detections of large objects and scene surfaces (e.g., building, grass), we use a spatiotemporal AND-OR graph to drive our joint inference, using Markov Chain Monte Carlo and dynamic programming. We also introduce a new formalism of spatiotemporal templates characterizing latent sub-events. For evaluation, we have collected and released a new aerial videos dataset using a hex-rotor flying over picnic areas rich with group events. Our results demonstrate that we successfully address above inference tasks under challenging conditions.
[ { "version": "v1", "created": "Fri, 22 May 2015 05:59:18 GMT" } ]
2015-05-25T00:00:00
[ [ "Shu", "Tianmin", "" ], [ "Xie", "Dan", "" ], [ "Rothrock", "Brandon", "" ], [ "Todorovic", "Sinisa", "" ], [ "Zhu", "Song-Chun", "" ] ]
TITLE: Joint Inference of Groups, Events and Human Roles in Aerial Videos ABSTRACT: With the advent of drones, aerial video analysis becomes increasingly important; yet, it has received scant attention in the literature. This paper addresses a new problem of parsing low-resolution aerial videos of large spatial areas, in terms of 1) grouping, 2) recognizing events and 3) assigning roles to people engaged in events. We propose a novel framework aimed at conducting joint inference of the above tasks, as reasoning about each in isolation typically fails in our setting. Given noisy tracklets of people and detections of large objects and scene surfaces (e.g., building, grass), we use a spatiotemporal AND-OR graph to drive our joint inference, using Markov Chain Monte Carlo and dynamic programming. We also introduce a new formalism of spatiotemporal templates characterizing latent sub-events. For evaluation, we have collected and released a new aerial videos dataset using a hex-rotor flying over picnic areas rich with group events. Our results demonstrate that we successfully address above inference tasks under challenging conditions.
new_dataset
0.954942
1505.06169
Emma Strubell
Emma Strubell, Luke Vilnis, Kate Silverstein, Andrew McCallum
Learning Dynamic Feature Selection for Fast Sequential Prediction
Appears in The 53rd Annual Meeting of the Association for Computational Linguistics, Beijing, China, July 2015
null
null
null
cs.CL cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present paired learning and inference algorithms for significantly reducing computation and increasing speed of the vector dot products in the classifiers that are at the heart of many NLP components. This is accomplished by partitioning the features into a sequence of templates which are ordered such that high confidence can often be reached using only a small fraction of all features. Parameter estimation is arranged to maximize accuracy and early confidence in this sequence. Our approach is simpler and better suited to NLP than other related cascade methods. We present experiments in left-to-right part-of-speech tagging, named entity recognition, and transition-based dependency parsing. On the typical benchmarking datasets we can preserve POS tagging accuracy above 97% and parsing LAS above 88.5% both with over a five-fold reduction in run-time, and NER F1 above 88 with more than 2x increase in speed.
[ { "version": "v1", "created": "Fri, 22 May 2015 18:28:21 GMT" } ]
2015-05-25T00:00:00
[ [ "Strubell", "Emma", "" ], [ "Vilnis", "Luke", "" ], [ "Silverstein", "Kate", "" ], [ "McCallum", "Andrew", "" ] ]
TITLE: Learning Dynamic Feature Selection for Fast Sequential Prediction ABSTRACT: We present paired learning and inference algorithms for significantly reducing computation and increasing speed of the vector dot products in the classifiers that are at the heart of many NLP components. This is accomplished by partitioning the features into a sequence of templates which are ordered such that high confidence can often be reached using only a small fraction of all features. Parameter estimation is arranged to maximize accuracy and early confidence in this sequence. Our approach is simpler and better suited to NLP than other related cascade methods. We present experiments in left-to-right part-of-speech tagging, named entity recognition, and transition-based dependency parsing. On the typical benchmarking datasets we can preserve POS tagging accuracy above 97% and parsing LAS above 88.5% both with over a five-fold reduction in run-time, and NER F1 above 88 with more than 2x increase in speed.
no_new_dataset
0.945751
1401.4489
Devansh Arpit
Devansh Arpit, Ifeoma Nwogu, Gaurav Srivastava, Venu Govindaraju
An Analysis of Random Projections in Cancelable Biometrics
null
null
null
null
cs.CV cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
With increasing concerns about security, the need for highly secure physical biometrics-based authentication systems utilizing \emph{cancelable biometric} technologies is on the rise. Because the problem of cancelable template generation deals with the trade-off between template security and matching performance, many state-of-the-art algorithms successful in generating high quality cancelable biometrics all have random projection as one of their early processing steps. This paper therefore presents a formal analysis of why random projections is an essential step in cancelable biometrics. By formally defining the notion of an \textit{Independent Subspace Structure} for datasets, it can be shown that random projection preserves the subspace structure of data vectors generated from a union of independent linear subspaces. The bound on the minimum number of random vectors required for this to hold is also derived and is shown to depend logarithmically on the number of data samples, not only in independent subspaces but in disjoint subspace settings as well. The theoretical analysis presented is supported in detail with empirical results on real-world face recognition datasets.
[ { "version": "v1", "created": "Fri, 17 Jan 2014 23:21:56 GMT" }, { "version": "v2", "created": "Wed, 5 Feb 2014 02:57:25 GMT" }, { "version": "v3", "created": "Fri, 14 Nov 2014 02:38:09 GMT" } ]
2015-05-22T00:00:00
[ [ "Arpit", "Devansh", "" ], [ "Nwogu", "Ifeoma", "" ], [ "Srivastava", "Gaurav", "" ], [ "Govindaraju", "Venu", "" ] ]
TITLE: An Analysis of Random Projections in Cancelable Biometrics ABSTRACT: With increasing concerns about security, the need for highly secure physical biometrics-based authentication systems utilizing \emph{cancelable biometric} technologies is on the rise. Because the problem of cancelable template generation deals with the trade-off between template security and matching performance, many state-of-the-art algorithms successful in generating high quality cancelable biometrics all have random projection as one of their early processing steps. This paper therefore presents a formal analysis of why random projections is an essential step in cancelable biometrics. By formally defining the notion of an \textit{Independent Subspace Structure} for datasets, it can be shown that random projection preserves the subspace structure of data vectors generated from a union of independent linear subspaces. The bound on the minimum number of random vectors required for this to hold is also derived and is shown to depend logarithmically on the number of data samples, not only in independent subspaces but in disjoint subspace settings as well. The theoretical analysis presented is supported in detail with empirical results on real-world face recognition datasets.
no_new_dataset
0.948251
1407.7073
Weinan Zhang
Weinan Zhang, Shuai Yuan, Jun Wang, Xuehua Shen
Real-Time Bidding Benchmarking with iPinYou Dataset
UCL Technical Report 2014
null
null
null
cs.GT cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Being an emerging paradigm for display advertising, Real-Time Bidding (RTB) drives the focus of the bidding strategy from context to users' interest by computing a bid for each impression in real time. The data mining work and particularly the bidding strategy development becomes crucial in this performance-driven business. However, researchers in computational advertising area have been suffering from lack of publicly available benchmark datasets, which are essential to compare different algorithms and systems. Fortunately, a leading Chinese advertising technology company iPinYou decided to release the dataset used in its global RTB algorithm competition in 2013. The dataset includes logs of ad auctions, bids, impressions, clicks, and final conversions. These logs reflect the market environment as well as form a complete path of users' responses from advertisers' perspective. This dataset directly supports the experiments of some important research problems such as bid optimisation and CTR estimation. To the best of our knowledge, this is the first publicly available dataset on RTB display advertising. Thus, they are valuable for reproducible research and understanding the whole RTB ecosystem. In this paper, we first provide the detailed statistical analysis of this dataset. Then we introduce the research problem of bid optimisation in RTB and the simple yet comprehensive evaluation protocol. Besides, a series of benchmark experiments are also conducted, including both click-through rate (CTR) estimation and bid optimisation.
[ { "version": "v1", "created": "Fri, 25 Jul 2014 23:20:29 GMT" }, { "version": "v2", "created": "Fri, 1 Aug 2014 11:22:17 GMT" }, { "version": "v3", "created": "Thu, 21 May 2015 18:20:30 GMT" } ]
2015-05-22T00:00:00
[ [ "Zhang", "Weinan", "" ], [ "Yuan", "Shuai", "" ], [ "Wang", "Jun", "" ], [ "Shen", "Xuehua", "" ] ]
TITLE: Real-Time Bidding Benchmarking with iPinYou Dataset ABSTRACT: Being an emerging paradigm for display advertising, Real-Time Bidding (RTB) drives the focus of the bidding strategy from context to users' interest by computing a bid for each impression in real time. The data mining work and particularly the bidding strategy development becomes crucial in this performance-driven business. However, researchers in computational advertising area have been suffering from lack of publicly available benchmark datasets, which are essential to compare different algorithms and systems. Fortunately, a leading Chinese advertising technology company iPinYou decided to release the dataset used in its global RTB algorithm competition in 2013. The dataset includes logs of ad auctions, bids, impressions, clicks, and final conversions. These logs reflect the market environment as well as form a complete path of users' responses from advertisers' perspective. This dataset directly supports the experiments of some important research problems such as bid optimisation and CTR estimation. To the best of our knowledge, this is the first publicly available dataset on RTB display advertising. Thus, they are valuable for reproducible research and understanding the whole RTB ecosystem. In this paper, we first provide the detailed statistical analysis of this dataset. Then we introduce the research problem of bid optimisation in RTB and the simple yet comprehensive evaluation protocol. Besides, a series of benchmark experiments are also conducted, including both click-through rate (CTR) estimation and bid optimisation.
new_dataset
0.96793
1502.01602
Donn Morrison
V\'aclav Bel\'ak, Afra Mashhadi, Alessandra Sala, Donn Morrison
Phantom cascades: The effect of hidden nodes on information diffusion
Preprint submitted to Elsevier Computer Communications
null
null
null
cs.SI physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Research on information diffusion generally assumes complete knowledge of the underlying network. However, in the presence of factors such as increasing privacy awareness, restrictions on application programming interfaces (APIs) and sampling strategies, this assumption rarely holds in the real world which in turn leads to an underestimation of the size of information cascades. In this work we study the effect of hidden network structure on information diffusion processes. We characterise information cascades through activation paths traversing visible and hidden parts of the network. We quantify diffusion estimation error while varying the amount of hidden structure in five empirical and synthetic network datasets and demonstrate the effect of topological properties on this error. Finally, we suggest practical recommendations for practitioners and propose a model to predict the cascade size with minimal information regarding the underlying network.
[ { "version": "v1", "created": "Thu, 5 Feb 2015 15:13:33 GMT" }, { "version": "v2", "created": "Thu, 21 May 2015 13:34:14 GMT" } ]
2015-05-22T00:00:00
[ [ "Belák", "Václav", "" ], [ "Mashhadi", "Afra", "" ], [ "Sala", "Alessandra", "" ], [ "Morrison", "Donn", "" ] ]
TITLE: Phantom cascades: The effect of hidden nodes on information diffusion ABSTRACT: Research on information diffusion generally assumes complete knowledge of the underlying network. However, in the presence of factors such as increasing privacy awareness, restrictions on application programming interfaces (APIs) and sampling strategies, this assumption rarely holds in the real world which in turn leads to an underestimation of the size of information cascades. In this work we study the effect of hidden network structure on information diffusion processes. We characterise information cascades through activation paths traversing visible and hidden parts of the network. We quantify diffusion estimation error while varying the amount of hidden structure in five empirical and synthetic network datasets and demonstrate the effect of topological properties on this error. Finally, we suggest practical recommendations for practitioners and propose a model to predict the cascade size with minimal information regarding the underlying network.
no_new_dataset
0.951233
1503.00756
Marco Stronati
Konstantinos Chatzikokolakis, Catuscia Palamidessi, Marco Stronati
Constructing elastic distinguishability metrics for location privacy
null
null
10.1515/popets-2015-0023
null
cs.CR
http://creativecommons.org/licenses/by/3.0/
With the increasing popularity of hand-held devices, location-based applications and services have access to accurate and real-time location information, raising serious privacy concerns for their users. The recently introduced notion of geo-indistinguishability tries to address this problem by adapting the well-known concept of differential privacy to the area of location-based systems. Although geo-indistinguishability presents various appealing aspects, it has the problem of treating space in a uniform way, imposing the addition of the same amount of noise everywhere on the map. In this paper we propose a novel elastic distinguishability metric that warps the geometrical distance, capturing the different degrees of density of each area. As a consequence, the obtained mechanism adapts the level of noise while achieving the same degree of privacy everywhere. We also show how such an elastic metric can easily incorporate the concept of a "geographic fence" that is commonly employed to protect the highly recurrent locations of a user, such as his home or work. We perform an extensive evaluation of our technique by building an elastic metric for Paris' wide metropolitan area, using semantic information from the OpenStreetMap database. We compare the resulting mechanism against the Planar Laplace mechanism satisfying standard geo-indistinguishability, using two real-world datasets from the Gowalla and Brightkite location-based social networks. The results show that the elastic mechanism adapts well to the semantics of each area, adjusting the noise as we move outside the city center, hence offering better overall privacy.
[ { "version": "v1", "created": "Mon, 2 Mar 2015 21:32:11 GMT" }, { "version": "v2", "created": "Thu, 21 May 2015 09:39:47 GMT" } ]
2015-05-22T00:00:00
[ [ "Chatzikokolakis", "Konstantinos", "" ], [ "Palamidessi", "Catuscia", "" ], [ "Stronati", "Marco", "" ] ]
TITLE: Constructing elastic distinguishability metrics for location privacy ABSTRACT: With the increasing popularity of hand-held devices, location-based applications and services have access to accurate and real-time location information, raising serious privacy concerns for their users. The recently introduced notion of geo-indistinguishability tries to address this problem by adapting the well-known concept of differential privacy to the area of location-based systems. Although geo-indistinguishability presents various appealing aspects, it has the problem of treating space in a uniform way, imposing the addition of the same amount of noise everywhere on the map. In this paper we propose a novel elastic distinguishability metric that warps the geometrical distance, capturing the different degrees of density of each area. As a consequence, the obtained mechanism adapts the level of noise while achieving the same degree of privacy everywhere. We also show how such an elastic metric can easily incorporate the concept of a "geographic fence" that is commonly employed to protect the highly recurrent locations of a user, such as his home or work. We perform an extensive evaluation of our technique by building an elastic metric for Paris' wide metropolitan area, using semantic information from the OpenStreetMap database. We compare the resulting mechanism against the Planar Laplace mechanism satisfying standard geo-indistinguishability, using two real-world datasets from the Gowalla and Brightkite location-based social networks. The results show that the elastic mechanism adapts well to the semantics of each area, adjusting the noise as we move outside the city center, hence offering better overall privacy.
no_new_dataset
0.949248
1505.05641
Hao Su
Hao Su, Charles R. Qi, Yangyan Li, Leonidas Guibas
Render for CNN: Viewpoint Estimation in Images Using CNNs Trained with Rendered 3D Model Views
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Object viewpoint estimation from 2D images is an essential task in computer vision. However, two issues hinder its progress: scarcity of training data with viewpoint annotations, and a lack of powerful features. Inspired by the growing availability of 3D models, we propose a framework to address both issues by combining render-based image synthesis and CNNs. We believe that 3D models have the potential in generating a large number of images of high variation, which can be well exploited by deep CNN with a high learning capacity. Towards this goal, we propose a scalable and overfit-resistant image synthesis pipeline, together with a novel CNN specifically tailored for the viewpoint estimation task. Experimentally, we show that the viewpoint estimation from our pipeline can significantly outperform state-of-the-art methods on PASCAL 3D+ benchmark.
[ { "version": "v1", "created": "Thu, 21 May 2015 08:16:06 GMT" } ]
2015-05-22T00:00:00
[ [ "Su", "Hao", "" ], [ "Qi", "Charles R.", "" ], [ "Li", "Yangyan", "" ], [ "Guibas", "Leonidas", "" ] ]
TITLE: Render for CNN: Viewpoint Estimation in Images Using CNNs Trained with Rendered 3D Model Views ABSTRACT: Object viewpoint estimation from 2D images is an essential task in computer vision. However, two issues hinder its progress: scarcity of training data with viewpoint annotations, and a lack of powerful features. Inspired by the growing availability of 3D models, we propose a framework to address both issues by combining render-based image synthesis and CNNs. We believe that 3D models have the potential in generating a large number of images of high variation, which can be well exploited by deep CNN with a high learning capacity. Towards this goal, we propose a scalable and overfit-resistant image synthesis pipeline, together with a novel CNN specifically tailored for the viewpoint estimation task. Experimentally, we show that the viewpoint estimation from our pipeline can significantly outperform state-of-the-art methods on PASCAL 3D+ benchmark.
no_new_dataset
0.947235
1505.05667
Xipeng Qiu
Chenxi Zhu, Xipeng Qiu, Xinchi Chen, Xuanjing Huang
A Re-ranking Model for Dependency Parser with Recursive Convolutional Neural Network
null
null
null
null
cs.CL cs.LG cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this work, we address the problem to model all the nodes (words or phrases) in a dependency tree with the dense representations. We propose a recursive convolutional neural network (RCNN) architecture to capture syntactic and compositional-semantic representations of phrases and words in a dependency tree. Different with the original recursive neural network, we introduce the convolution and pooling layers, which can model a variety of compositions by the feature maps and choose the most informative compositions by the pooling layers. Based on RCNN, we use a discriminative model to re-rank a $k$-best list of candidate dependency parsing trees. The experiments show that RCNN is very effective to improve the state-of-the-art dependency parsing on both English and Chinese datasets.
[ { "version": "v1", "created": "Thu, 21 May 2015 10:23:10 GMT" } ]
2015-05-22T00:00:00
[ [ "Zhu", "Chenxi", "" ], [ "Qiu", "Xipeng", "" ], [ "Chen", "Xinchi", "" ], [ "Huang", "Xuanjing", "" ] ]
TITLE: A Re-ranking Model for Dependency Parser with Recursive Convolutional Neural Network ABSTRACT: In this work, we address the problem to model all the nodes (words or phrases) in a dependency tree with the dense representations. We propose a recursive convolutional neural network (RCNN) architecture to capture syntactic and compositional-semantic representations of phrases and words in a dependency tree. Different with the original recursive neural network, we introduce the convolution and pooling layers, which can model a variety of compositions by the feature maps and choose the most informative compositions by the pooling layers. Based on RCNN, we use a discriminative model to re-rank a $k$-best list of candidate dependency parsing trees. The experiments show that RCNN is very effective to improve the state-of-the-art dependency parsing on both English and Chinese datasets.
no_new_dataset
0.950595
1505.05723
Indre Zliobaite
Indre Zliobaite
On the relation between accuracy and fairness in binary classification
Accepted for presentation to the 2nd workshop on Fairness, Accountability, and Transparency in Machine Learning (http://www.fatml.org/)
null
null
null
cs.LG cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Our study revisits the problem of accuracy-fairness tradeoff in binary classification. We argue that comparison of non-discriminatory classifiers needs to account for different rates of positive predictions, otherwise conclusions about performance may be misleading, because accuracy and discrimination of naive baselines on the same dataset vary with different rates of positive predictions. We provide methodological recommendations for sound comparison of non-discriminatory classifiers, and present a brief theoretical and empirical analysis of tradeoffs between accuracy and non-discrimination.
[ { "version": "v1", "created": "Thu, 21 May 2015 13:20:06 GMT" } ]
2015-05-22T00:00:00
[ [ "Zliobaite", "Indre", "" ] ]
TITLE: On the relation between accuracy and fairness in binary classification ABSTRACT: Our study revisits the problem of accuracy-fairness tradeoff in binary classification. We argue that comparison of non-discriminatory classifiers needs to account for different rates of positive predictions, otherwise conclusions about performance may be misleading, because accuracy and discrimination of naive baselines on the same dataset vary with different rates of positive predictions. We provide methodological recommendations for sound comparison of non-discriminatory classifiers, and present a brief theoretical and empirical analysis of tradeoffs between accuracy and non-discrimination.
no_new_dataset
0.944331
1505.05747
Franziska Wegner
Thomas Leibfried, Tamara Mchedlidze, Nico Meyer-H\"ubner, Martin N\"ollenburg, Ignaz Rutter, Peter Sanders, Dorothea Wagner, Franziska Wegner
Operating Power Grids with Few Flow Control Buses
extended version of an ACM e-Energy 2015 poster/workshop paper
null
null
null
cs.SY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Future power grids will offer enhanced controllability due to the increased availability of power flow control units (FACTS). As the installation of control units in the grid is an expensive investment, we are interested in using few controllers to achieve high controllability. In particular, two questions arise: How many flow control buses are necessary to obtain globally optimal power flows? And if fewer flow control buses are available, what can we achieve with them? Using steady state IEEE benchmark data sets, we explore experimentally that already a small number of controllers placed at certain grid buses suffices to achieve globally optimal power flows. We present a graph-theoretic explanation for this behavior. To answer the second question we perform a set of experiments that explore the existence and costs of feasible power flow solutions at increased loads with respect to the number of flow control buses in the grid. We observe that adding a small number of flow control buses reduces the flow costs and extends the existence of feasible solutions at increased load.
[ { "version": "v1", "created": "Thu, 21 May 2015 14:13:11 GMT" } ]
2015-05-22T00:00:00
[ [ "Leibfried", "Thomas", "" ], [ "Mchedlidze", "Tamara", "" ], [ "Meyer-Hübner", "Nico", "" ], [ "Nöllenburg", "Martin", "" ], [ "Rutter", "Ignaz", "" ], [ "Sanders", "Peter", "" ], [ "Wagner", "Dorothea", "" ], [ "Wegner", "Franziska", "" ] ]
TITLE: Operating Power Grids with Few Flow Control Buses ABSTRACT: Future power grids will offer enhanced controllability due to the increased availability of power flow control units (FACTS). As the installation of control units in the grid is an expensive investment, we are interested in using few controllers to achieve high controllability. In particular, two questions arise: How many flow control buses are necessary to obtain globally optimal power flows? And if fewer flow control buses are available, what can we achieve with them? Using steady state IEEE benchmark data sets, we explore experimentally that already a small number of controllers placed at certain grid buses suffices to achieve globally optimal power flows. We present a graph-theoretic explanation for this behavior. To answer the second question we perform a set of experiments that explore the existence and costs of feasible power flow solutions at increased loads with respect to the number of flow control buses in the grid. We observe that adding a small number of flow control buses reduces the flow costs and extends the existence of feasible solutions at increased load.
no_new_dataset
0.950041
1505.05753
Mario Fritz
Iaroslav Shcherbatyi, Andreas Bulling, Mario Fritz
GazeDPM: Early Integration of Gaze Information in Deformable Part Models
null
null
null
null
cs.CV cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
An increasing number of works explore collaborative human-computer systems in which human gaze is used to enhance computer vision systems. For object detection these efforts were so far restricted to late integration approaches that have inherent limitations, such as increased precision without increase in recall. We propose an early integration approach in a deformable part model, which constitutes a joint formulation over gaze and visual data. We show that our GazeDPM method improves over the state-of-the-art DPM baseline by 4% and a recent method for gaze-supported object detection by 3% on the public POET dataset. Our approach additionally provides introspection of the learnt models, can reveal salient image structures, and allows us to investigate the interplay between gaze attracting and repelling areas, the importance of view-specific models, as well as viewers' personal biases in gaze patterns. We finally study important practical aspects of our approach, such as the impact of using saliency maps instead of real fixations, the impact of the number of fixations, as well as robustness to gaze estimation error.
[ { "version": "v1", "created": "Thu, 21 May 2015 14:39:51 GMT" } ]
2015-05-22T00:00:00
[ [ "Shcherbatyi", "Iaroslav", "" ], [ "Bulling", "Andreas", "" ], [ "Fritz", "Mario", "" ] ]
TITLE: GazeDPM: Early Integration of Gaze Information in Deformable Part Models ABSTRACT: An increasing number of works explore collaborative human-computer systems in which human gaze is used to enhance computer vision systems. For object detection these efforts were so far restricted to late integration approaches that have inherent limitations, such as increased precision without increase in recall. We propose an early integration approach in a deformable part model, which constitutes a joint formulation over gaze and visual data. We show that our GazeDPM method improves over the state-of-the-art DPM baseline by 4% and a recent method for gaze-supported object detection by 3% on the public POET dataset. Our approach additionally provides introspection of the learnt models, can reveal salient image structures, and allows us to investigate the interplay between gaze attracting and repelling areas, the importance of view-specific models, as well as viewers' personal biases in gaze patterns. We finally study important practical aspects of our approach, such as the impact of using saliency maps instead of real fixations, the impact of the number of fixations, as well as robustness to gaze estimation error.
no_new_dataset
0.946695
1505.05798
Haitham Bou Ammar PhD
Haitham Bou Ammar, Rasul Tutunov, Eric Eaton
Safe Policy Search for Lifelong Reinforcement Learning with Sublinear Regret
null
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Lifelong reinforcement learning provides a promising framework for developing versatile agents that can accumulate knowledge over a lifetime of experience and rapidly learn new tasks by building upon prior knowledge. However, current lifelong learning methods exhibit non-vanishing regret as the amount of experience increases and include limitations that can lead to suboptimal or unsafe control policies. To address these issues, we develop a lifelong policy gradient learner that operates in an adversarial set- ting to learn multiple tasks online while enforcing safety constraints on the learned policies. We demonstrate, for the first time, sublinear regret for lifelong policy search, and validate our algorithm on several benchmark dynamical systems and an application to quadrotor control.
[ { "version": "v1", "created": "Thu, 21 May 2015 17:24:57 GMT" } ]
2015-05-22T00:00:00
[ [ "Ammar", "Haitham Bou", "" ], [ "Tutunov", "Rasul", "" ], [ "Eaton", "Eric", "" ] ]
TITLE: Safe Policy Search for Lifelong Reinforcement Learning with Sublinear Regret ABSTRACT: Lifelong reinforcement learning provides a promising framework for developing versatile agents that can accumulate knowledge over a lifetime of experience and rapidly learn new tasks by building upon prior knowledge. However, current lifelong learning methods exhibit non-vanishing regret as the amount of experience increases and include limitations that can lead to suboptimal or unsafe control policies. To address these issues, we develop a lifelong policy gradient learner that operates in an adversarial set- ting to learn multiple tasks online while enforcing safety constraints on the learned policies. We demonstrate, for the first time, sublinear regret for lifelong policy search, and validate our algorithm on several benchmark dynamical systems and an application to quadrotor control.
no_new_dataset
0.947817
1505.05832
Vinayak Prabhu
Jyotirmoy V. Deshmukh, Rupak Majumdar, Vinayak S. Prabhu
Quantifying Conformance using the Skorokhod Metric (full version)
Full version of CAV 2015 paper
null
null
null
cs.SY cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The conformance testing problem for dynamical systems asks, given two dynamical models (e.g., as Simulink diagrams), whether their behaviors are "close" to each other. In the semi-formal approach to conformance testing, the two systems are simulated on a large set of tests, and a metric, defined on pairs of real-valued, real-timed trajectories, is used to determine a lower bound on the distance. We show how the Skorkhod metric on continuous dynamical systems can be used as the foundation for conformance testing of complex dynamical models. The Skorokhod metric allows for both state value mismatches and timing distortions, and is thus well suited for checking conformance between idealized models of dynamical systems and their implementations. We demonstrate the robustness of the system conformance quantification by proving a \emph{transference theorem}: trajectories close under the Skorokhod metric satisfy "close" logical properties. Specifically, we show the result for the timed linear time logic \TLTL augmented with a rich class of temporal and spatial constraint predicates. We provide a window-based streaming algorithm to compute the Skorokhod metric, and use it as a basis for a conformance testing tool for Simulink. We experimentally demonstrate the effectiveness of our tool in finding discrepant behaviors on a set of control system benchmarks, including an industrial challenge problem.
[ { "version": "v1", "created": "Thu, 21 May 2015 18:42:33 GMT" } ]
2015-05-22T00:00:00
[ [ "Deshmukh", "Jyotirmoy V.", "" ], [ "Majumdar", "Rupak", "" ], [ "Prabhu", "Vinayak S.", "" ] ]
TITLE: Quantifying Conformance using the Skorokhod Metric (full version) ABSTRACT: The conformance testing problem for dynamical systems asks, given two dynamical models (e.g., as Simulink diagrams), whether their behaviors are "close" to each other. In the semi-formal approach to conformance testing, the two systems are simulated on a large set of tests, and a metric, defined on pairs of real-valued, real-timed trajectories, is used to determine a lower bound on the distance. We show how the Skorkhod metric on continuous dynamical systems can be used as the foundation for conformance testing of complex dynamical models. The Skorokhod metric allows for both state value mismatches and timing distortions, and is thus well suited for checking conformance between idealized models of dynamical systems and their implementations. We demonstrate the robustness of the system conformance quantification by proving a \emph{transference theorem}: trajectories close under the Skorokhod metric satisfy "close" logical properties. Specifically, we show the result for the timed linear time logic \TLTL augmented with a rich class of temporal and spatial constraint predicates. We provide a window-based streaming algorithm to compute the Skorokhod metric, and use it as a basis for a conformance testing tool for Simulink. We experimentally demonstrate the effectiveness of our tool in finding discrepant behaviors on a set of control system benchmarks, including an industrial challenge problem.
no_new_dataset
0.944434
1505.05868
Arjun Radhakrishna
Rajeev Alur, Pavol Cerny, Arjun Radhakrishna
Synthesis through Unification
null
null
null
null
cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Given a specification and a set of candidate programs (program space), the program synthesis problem is to find a candidate program that satisfies the specification. We present the synthesis through unification (STUN) approach, which is an extension of the counter-example guided inductive synthesis (CEGIS) approach. In CEGIS, the synthesizer maintains a subset S of inputs and a candidate program Prog that is correct for S. The synthesizer repeatedly checks if there exists a counter-example input c such that the execution of Prog is incorrect on c. If so, the synthesizer enlarges S to include c, and picks a program from the program space that is correct for the new set S. The STUN approach extends CEGIS with the idea that given a program Prog that is correct for a subset of inputs, the synthesizer can try to find a program Prog' that is correct for the rest of the inputs. If Prog and Prog' can be unified into a program in the program space, then a solution has been found. We present a generic synthesis procedure based on the STUN approach and specialize it for three different domains by providing the appropriate unification operators. We implemented these specializations in prototype tools, and we show that our tools often per- forms significantly better on standard benchmarks than a tool based on a pure CEGIS approach.
[ { "version": "v1", "created": "Thu, 21 May 2015 19:58:46 GMT" } ]
2015-05-22T00:00:00
[ [ "Alur", "Rajeev", "" ], [ "Cerny", "Pavol", "" ], [ "Radhakrishna", "Arjun", "" ] ]
TITLE: Synthesis through Unification ABSTRACT: Given a specification and a set of candidate programs (program space), the program synthesis problem is to find a candidate program that satisfies the specification. We present the synthesis through unification (STUN) approach, which is an extension of the counter-example guided inductive synthesis (CEGIS) approach. In CEGIS, the synthesizer maintains a subset S of inputs and a candidate program Prog that is correct for S. The synthesizer repeatedly checks if there exists a counter-example input c such that the execution of Prog is incorrect on c. If so, the synthesizer enlarges S to include c, and picks a program from the program space that is correct for the new set S. The STUN approach extends CEGIS with the idea that given a program Prog that is correct for a subset of inputs, the synthesizer can try to find a program Prog' that is correct for the rest of the inputs. If Prog and Prog' can be unified into a program in the program space, then a solution has been found. We present a generic synthesis procedure based on the STUN approach and specialize it for three different domains by providing the appropriate unification operators. We implemented these specializations in prototype tools, and we show that our tools often per- forms significantly better on standard benchmarks than a tool based on a pure CEGIS approach.
no_new_dataset
0.942612
1409.4450
Giovanni Luca Ciampaglia
Giovanni Luca Ciampaglia, Alessandro Flammini, Filippo Menczer
The production of information in the attention economy
14 pages, 3 figures, 1 table
null
10.1038/srep09452
Giovanni Luca Ciampaglia, Alessandro Flammini & Filippo Menczer Scientific Reports 5, Article number: 9452 (2015)
physics.soc-ph cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Online traces of human activity offer novel opportunities to study the dynamics of complex knowledge exchange networks, and in particular how the relationship between demand and supply of information is mediated by competition for our limited individual attention. The emergent patterns of collective attention determine what new information is generated and consumed. Can we measure the relationship between demand and supply for new information about a topic? Here we propose a normalization method to compare attention bursts statistics across topics that have an heterogeneous distribution of attention. Through analysis of a massive dataset on traffic to Wikipedia, we find that the production of new knowledge is associated to significant shifts of collective attention, which we take as a proxy for its demand. What we observe is consistent with a scenario in which the allocation of attention toward a topic stimulates the demand for information about it, and in turn the supply of further novel information. Our attempt to quantify demand and supply of information, and our finding about their temporal ordering, may lead to the development of the fundamental laws of the attention economy, and a better understanding of the social exchange of knowledge in online and offline information networks.
[ { "version": "v1", "created": "Mon, 15 Sep 2014 21:13:35 GMT" } ]
2015-05-21T00:00:00
[ [ "Ciampaglia", "Giovanni Luca", "" ], [ "Flammini", "Alessandro", "" ], [ "Menczer", "Filippo", "" ] ]
TITLE: The production of information in the attention economy ABSTRACT: Online traces of human activity offer novel opportunities to study the dynamics of complex knowledge exchange networks, and in particular how the relationship between demand and supply of information is mediated by competition for our limited individual attention. The emergent patterns of collective attention determine what new information is generated and consumed. Can we measure the relationship between demand and supply for new information about a topic? Here we propose a normalization method to compare attention bursts statistics across topics that have an heterogeneous distribution of attention. Through analysis of a massive dataset on traffic to Wikipedia, we find that the production of new knowledge is associated to significant shifts of collective attention, which we take as a proxy for its demand. What we observe is consistent with a scenario in which the allocation of attention toward a topic stimulates the demand for information about it, and in turn the supply of further novel information. Our attempt to quantify demand and supply of information, and our finding about their temporal ordering, may lead to the development of the fundamental laws of the attention economy, and a better understanding of the social exchange of knowledge in online and offline information networks.
no_new_dataset
0.936981