id
large_stringlengths
9
16
submitter
large_stringlengths
3
64
authors
large_stringlengths
5
20.7k
title
large_stringlengths
5
245
comments
large_stringlengths
1
482
journal-ref
large_stringlengths
4
382
doi
large_stringlengths
9
151
report-no
large_stringlengths
2
509
categories
large_stringlengths
5
78
license
large_stringclasses
9 values
abstract
large_stringlengths
83
3.55k
versions
large listlengths
1
21
update_date
timestamp[ms]date
2007-05-23 00:00:00
2025-04-25 00:00:00
authors_parsed
large listlengths
1
1.35k
prompt
large_stringlengths
166
3.64k
label
stringclasses
2 values
prob
float64
0.5
0.98
1502.04623
Ivo Danihelka
Karol Gregor, Ivo Danihelka, Alex Graves, Danilo Jimenez Rezende, Daan Wierstra
DRAW: A Recurrent Neural Network For Image Generation
null
null
null
null
cs.CV cs.LG cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper introduces the Deep Recurrent Attentive Writer (DRAW) neural network architecture for image generation. DRAW networks combine a novel spatial attention mechanism that mimics the foveation of the human eye, with a sequential variational auto-encoding framework that allows for the iterative construction of complex images. The system substantially improves on the state of the art for generative models on MNIST, and, when trained on the Street View House Numbers dataset, it generates images that cannot be distinguished from real data with the naked eye.
[ { "version": "v1", "created": "Mon, 16 Feb 2015 16:48:56 GMT" }, { "version": "v2", "created": "Wed, 20 May 2015 15:29:42 GMT" } ]
2015-05-21T00:00:00
[ [ "Gregor", "Karol", "" ], [ "Danihelka", "Ivo", "" ], [ "Graves", "Alex", "" ], [ "Rezende", "Danilo Jimenez", "" ], [ "Wierstra", "Daan", "" ] ]
TITLE: DRAW: A Recurrent Neural Network For Image Generation ABSTRACT: This paper introduces the Deep Recurrent Attentive Writer (DRAW) neural network architecture for image generation. DRAW networks combine a novel spatial attention mechanism that mimics the foveation of the human eye, with a sequential variational auto-encoding framework that allows for the iterative construction of complex images. The system substantially improves on the state of the art for generative models on MNIST, and, when trained on the Street View House Numbers dataset, it generates images that cannot be distinguished from real data with the naked eye.
no_new_dataset
0.953057
1504.06755
Pingmei Xu
Pingmei Xu, Krista A Ehinger, Yinda Zhang, Adam Finkelstein, Sanjeev R. Kulkarni, Jianxiong Xiao
TurkerGaze: Crowdsourcing Saliency with Webcam based Eye Tracking
9 pages, 14 figures
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Traditional eye tracking requires specialized hardware, which means collecting gaze data from many observers is expensive, tedious and slow. Therefore, existing saliency prediction datasets are order-of-magnitudes smaller than typical datasets for other vision recognition tasks. The small size of these datasets limits the potential for training data intensive algorithms, and causes overfitting in benchmark evaluation. To address this deficiency, this paper introduces a webcam-based gaze tracking system that supports large-scale, crowdsourced eye tracking deployed on Amazon Mechanical Turk (AMTurk). By a combination of careful algorithm and gaming protocol design, our system obtains eye tracking data for saliency prediction comparable to data gathered in a traditional lab setting, with relatively lower cost and less effort on the part of the researchers. Using this tool, we build a saliency dataset for a large number of natural images. We will open-source our tool and provide a web server where researchers can upload their images to get eye tracking results from AMTurk.
[ { "version": "v1", "created": "Sat, 25 Apr 2015 19:26:47 GMT" }, { "version": "v2", "created": "Wed, 20 May 2015 18:51:23 GMT" } ]
2015-05-21T00:00:00
[ [ "Xu", "Pingmei", "" ], [ "Ehinger", "Krista A", "" ], [ "Zhang", "Yinda", "" ], [ "Finkelstein", "Adam", "" ], [ "Kulkarni", "Sanjeev R.", "" ], [ "Xiao", "Jianxiong", "" ] ]
TITLE: TurkerGaze: Crowdsourcing Saliency with Webcam based Eye Tracking ABSTRACT: Traditional eye tracking requires specialized hardware, which means collecting gaze data from many observers is expensive, tedious and slow. Therefore, existing saliency prediction datasets are order-of-magnitudes smaller than typical datasets for other vision recognition tasks. The small size of these datasets limits the potential for training data intensive algorithms, and causes overfitting in benchmark evaluation. To address this deficiency, this paper introduces a webcam-based gaze tracking system that supports large-scale, crowdsourced eye tracking deployed on Amazon Mechanical Turk (AMTurk). By a combination of careful algorithm and gaming protocol design, our system obtains eye tracking data for saliency prediction comparable to data gathered in a traditional lab setting, with relatively lower cost and less effort on the part of the researchers. Using this tool, we build a saliency dataset for a large number of natural images. We will open-source our tool and provide a web server where researchers can upload their images to get eye tracking results from AMTurk.
new_dataset
0.947137
1505.05208
Raajen Patel
Raajen Patel, Thomas A. Goldstein, Eva L. Dyer, Azalia Mirhoseini, and Richard G. Baraniuk
oASIS: Adaptive Column Sampling for Kernel Matrix Approximation
null
null
null
null
stat.ML cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Kernel matrices (e.g. Gram or similarity matrices) are essential for many state-of-the-art approaches to classification, clustering, and dimensionality reduction. For large datasets, the cost of forming and factoring such kernel matrices becomes intractable. To address this challenge, we introduce a new adaptive sampling algorithm called Accelerated Sequential Incoherence Selection (oASIS) that samples columns without explicitly computing the entire kernel matrix. We provide conditions under which oASIS is guaranteed to exactly recover the kernel matrix with an optimal number of columns selected. Numerical experiments on both synthetic and real-world datasets demonstrate that oASIS achieves performance comparable to state-of-the-art adaptive sampling methods at a fraction of the computational cost. The low runtime complexity of oASIS and its low memory footprint enable the solution of large problems that are simply intractable using other adaptive methods.
[ { "version": "v1", "created": "Tue, 19 May 2015 23:12:01 GMT" } ]
2015-05-21T00:00:00
[ [ "Patel", "Raajen", "" ], [ "Goldstein", "Thomas A.", "" ], [ "Dyer", "Eva L.", "" ], [ "Mirhoseini", "Azalia", "" ], [ "Baraniuk", "Richard G.", "" ] ]
TITLE: oASIS: Adaptive Column Sampling for Kernel Matrix Approximation ABSTRACT: Kernel matrices (e.g. Gram or similarity matrices) are essential for many state-of-the-art approaches to classification, clustering, and dimensionality reduction. For large datasets, the cost of forming and factoring such kernel matrices becomes intractable. To address this challenge, we introduce a new adaptive sampling algorithm called Accelerated Sequential Incoherence Selection (oASIS) that samples columns without explicitly computing the entire kernel matrix. We provide conditions under which oASIS is guaranteed to exactly recover the kernel matrix with an optimal number of columns selected. Numerical experiments on both synthetic and real-world datasets demonstrate that oASIS achieves performance comparable to state-of-the-art adaptive sampling methods at a fraction of the computational cost. The low runtime complexity of oASIS and its low memory footprint enable the solution of large problems that are simply intractable using other adaptive methods.
no_new_dataset
0.944485
1505.05211
Souvik Bhattacherjee
Souvik Bhattacherjee and Amit Chavan and Silu Huang and Amol Deshpande and Aditya Parameswaran
Principles of Dataset Versioning: Exploring the Recreation/Storage Tradeoff
null
null
null
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The relative ease of collaborative data science and analysis has led to a proliferation of many thousands or millions of $versions$ of the same datasets in many scientific and commercial domains, acquired or constructed at various stages of data analysis across many users, and often over long periods of time. Managing, storing, and recreating these dataset versions is a non-trivial task. The fundamental challenge here is the $storage-recreation\;trade-off$: the more storage we use, the faster it is to recreate or retrieve versions, while the less storage we use, the slower it is to recreate or retrieve versions. Despite the fundamental nature of this problem, there has been a surprisingly little amount of work on it. In this paper, we study this trade-off in a principled manner: we formulate six problems under various settings, trading off these quantities in various ways, demonstrate that most of the problems are intractable, and propose a suite of inexpensive heuristics drawing from techniques in delay-constrained scheduling, and spanning tree literature, to solve these problems. We have built a prototype version management system, that aims to serve as a foundation to our DATAHUB system for facilitating collaborative data science. We demonstrate, via extensive experiments, that our proposed heuristics provide efficient solutions in practical dataset versioning scenarios.
[ { "version": "v1", "created": "Tue, 19 May 2015 23:45:05 GMT" } ]
2015-05-21T00:00:00
[ [ "Bhattacherjee", "Souvik", "" ], [ "Chavan", "Amit", "" ], [ "Huang", "Silu", "" ], [ "Deshpande", "Amol", "" ], [ "Parameswaran", "Aditya", "" ] ]
TITLE: Principles of Dataset Versioning: Exploring the Recreation/Storage Tradeoff ABSTRACT: The relative ease of collaborative data science and analysis has led to a proliferation of many thousands or millions of $versions$ of the same datasets in many scientific and commercial domains, acquired or constructed at various stages of data analysis across many users, and often over long periods of time. Managing, storing, and recreating these dataset versions is a non-trivial task. The fundamental challenge here is the $storage-recreation\;trade-off$: the more storage we use, the faster it is to recreate or retrieve versions, while the less storage we use, the slower it is to recreate or retrieve versions. Despite the fundamental nature of this problem, there has been a surprisingly little amount of work on it. In this paper, we study this trade-off in a principled manner: we formulate six problems under various settings, trading off these quantities in various ways, demonstrate that most of the problems are intractable, and propose a suite of inexpensive heuristics drawing from techniques in delay-constrained scheduling, and spanning tree literature, to solve these problems. We have built a prototype version management system, that aims to serve as a foundation to our DATAHUB system for facilitating collaborative data science. We demonstrate, via extensive experiments, that our proposed heuristics provide efficient solutions in practical dataset versioning scenarios.
no_new_dataset
0.944382
1505.05225
Lihua Guo
Guo Lihua, Li Fudi
Image aesthetic evaluation using paralleled deep convolution neural network
7 pages, 6 figures, 9 tables
null
null
null
cs.CV cs.MM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Image aesthetic evaluation has attracted much attention in recent years. Image aesthetic evaluation methods heavily depend on the effective aesthetic feature. Traditional meth-ods always extract hand-crafted features. However, these hand-crafted features are always designed to adapt particu-lar datasets, and extraction of them needs special design. Rather than extracting hand-crafted features, an automati-cally learn of aesthetic features based on deep convolutional neural network (DCNN) is first adopt in this paper. As we all know, when the training dataset is given, the DCNN architecture with high complexity may meet the over-fitting problem. On the other side, the DCNN architecture with low complexity would not efficiently extract effective features. For these reasons, we further propose a paralleled convolutional neural network (PDCNN) with multi-level structures to automatically adapt to the training dataset. Experimental results show that our proposed PDCNN architecture achieves better performance than other traditional methods.
[ { "version": "v1", "created": "Wed, 20 May 2015 02:03:23 GMT" } ]
2015-05-21T00:00:00
[ [ "Lihua", "Guo", "" ], [ "Fudi", "Li", "" ] ]
TITLE: Image aesthetic evaluation using paralleled deep convolution neural network ABSTRACT: Image aesthetic evaluation has attracted much attention in recent years. Image aesthetic evaluation methods heavily depend on the effective aesthetic feature. Traditional meth-ods always extract hand-crafted features. However, these hand-crafted features are always designed to adapt particu-lar datasets, and extraction of them needs special design. Rather than extracting hand-crafted features, an automati-cally learn of aesthetic features based on deep convolutional neural network (DCNN) is first adopt in this paper. As we all know, when the training dataset is given, the DCNN architecture with high complexity may meet the over-fitting problem. On the other side, the DCNN architecture with low complexity would not efficiently extract effective features. For these reasons, we further propose a paralleled convolutional neural network (PDCNN) with multi-level structures to automatically adapt to the training dataset. Experimental results show that our proposed PDCNN architecture achieves better performance than other traditional methods.
no_new_dataset
0.951549
1505.05232
Songfan Yang
Songfan Yang, Deva Ramanan
Multi-scale recognition with DAG-CNNs
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We explore multi-scale convolutional neural nets (CNNs) for image classification. Contemporary approaches extract features from a single output layer. By extracting features from multiple layers, one can simultaneously reason about high, mid, and low-level features during classification. The resulting multi-scale architecture can itself be seen as a feed-forward model that is structured as a directed acyclic graph (DAG-CNNs). We use DAG-CNNs to learn a set of multiscale features that can be effectively shared between coarse and fine-grained classification tasks. While fine-tuning such models helps performance, we show that even "off-the-self" multiscale features perform quite well. We present extensive analysis and demonstrate state-of-the-art classification performance on three standard scene benchmarks (SUN397, MIT67, and Scene15). In terms of the heavily benchmarked MIT67 and Scene15 datasets, our results reduce the lowest previously-reported error by 23.9% and 9.5%, respectively.
[ { "version": "v1", "created": "Wed, 20 May 2015 02:52:07 GMT" } ]
2015-05-21T00:00:00
[ [ "Yang", "Songfan", "" ], [ "Ramanan", "Deva", "" ] ]
TITLE: Multi-scale recognition with DAG-CNNs ABSTRACT: We explore multi-scale convolutional neural nets (CNNs) for image classification. Contemporary approaches extract features from a single output layer. By extracting features from multiple layers, one can simultaneously reason about high, mid, and low-level features during classification. The resulting multi-scale architecture can itself be seen as a feed-forward model that is structured as a directed acyclic graph (DAG-CNNs). We use DAG-CNNs to learn a set of multiscale features that can be effectively shared between coarse and fine-grained classification tasks. While fine-tuning such models helps performance, we show that even "off-the-self" multiscale features perform quite well. We present extensive analysis and demonstrate state-of-the-art classification performance on three standard scene benchmarks (SUN397, MIT67, and Scene15). In terms of the heavily benchmarked MIT67 and Scene15 datasets, our results reduce the lowest previously-reported error by 23.9% and 9.5%, respectively.
no_new_dataset
0.947817
1505.05322
Ai Munandar Tb
Azhari SN and Tb. Ai Munandar
Unsupervised Neural Network-Naive Bayes Model for Grouping Data Regional Development Results
6 pages
International Journal of Computer Applications, Volume 104, No 15, October 2014
null
null
cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Determination quadrant development has an important role in order to determine the achievement of the development of a district, in terms of the sector's gross regional domestic product (GDP). The process of determining the quadrant development typically uses Klassen rules based on its sector GDP. This study aims to provide a new approach in the conduct of regional development quadrant clustering using cluster techniques. Clustering is performed based on the average value of the growth and development of a district contribution compared with the average value and contribution of the development of the province based on data in comparison with a year of data to be compared. Testing models of clustering, performed on a dataset of two provinces, namely Banten (as a data testing) and Central Java (as the training data), to see the accuracy of the classification model proposed. The proposed model consists of two learning methods in it, namely unsupervised (Self Organizing Map / SOM-NN) method and supervised (Naive Bayess). SOM-NN method is used as a learning engine to generate training data for the target Class that will be used in the machine learning Naive Bayess. The results showed the clustering accuracy rate of the model was 98.1%, while the clustering accuracy rate of the model results compared to manual analysis shows the accuracy of the typology Klassen smaller, ie 29.63%. On one side, clustering results of the proposed model is influenced by the number and keagaraman data sets used.
[ { "version": "v1", "created": "Wed, 20 May 2015 11:22:18 GMT" } ]
2015-05-21T00:00:00
[ [ "SN", "Azhari", "" ], [ "Munandar", "Tb. Ai", "" ] ]
TITLE: Unsupervised Neural Network-Naive Bayes Model for Grouping Data Regional Development Results ABSTRACT: Determination quadrant development has an important role in order to determine the achievement of the development of a district, in terms of the sector's gross regional domestic product (GDP). The process of determining the quadrant development typically uses Klassen rules based on its sector GDP. This study aims to provide a new approach in the conduct of regional development quadrant clustering using cluster techniques. Clustering is performed based on the average value of the growth and development of a district contribution compared with the average value and contribution of the development of the province based on data in comparison with a year of data to be compared. Testing models of clustering, performed on a dataset of two provinces, namely Banten (as a data testing) and Central Java (as the training data), to see the accuracy of the classification model proposed. The proposed model consists of two learning methods in it, namely unsupervised (Self Organizing Map / SOM-NN) method and supervised (Naive Bayess). SOM-NN method is used as a learning engine to generate training data for the target Class that will be used in the machine learning Naive Bayess. The results showed the clustering accuracy rate of the model was 98.1%, while the clustering accuracy rate of the model results compared to manual analysis shows the accuracy of the typology Klassen smaller, ie 29.63%. On one side, clustering results of the proposed model is influenced by the number and keagaraman data sets used.
no_new_dataset
0.954351
1505.05338
Poorna Dasgupta
Poorna Banerjee Dasgupta
Algorithmic Analysis of Edge Ranking and Profiling for MTF Determination of an Imaging System
3 pages, Published with International Journal of Computer Trends and Technology (IJCTT), Volume-23 Number-1, 2015
International Journal of Computer Trends and Technology (IJCTT) V23(1):46-48, May 2015
10.14445/22312803/IJCTT-V23P110
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Edge detection is one of the most principal techniques for detecting discontinuities in the gray levels of image pixels. The Modulation Transfer Function (MTF) is one of the main criteria for assessing imaging quality and is a parameter frequently used for measuring the sharpness of an imaging system. In order to determine the MTF, it is essential to determine the best edge from the target image so that an edge profile can be developed and then the line spread function and hence the MTF, can be computed accordingly. For regular image sizes, the human visual system is adept enough to identify suitable edges from the image. But considering huge image datasets, such as those obtained from satellites, the image size may range in few gigabytes and in such a case, manual inspection of images for determination of the best suitable edge is not plausible and hence, edge profiling tasks have to be automated. This paper presents a novel, yet simple, algorithm for edge ranking and detection from image data-sets for MTF computation, which is ideal for automation on vectorised graphical processing units.
[ { "version": "v1", "created": "Wed, 20 May 2015 12:12:48 GMT" } ]
2015-05-21T00:00:00
[ [ "Dasgupta", "Poorna Banerjee", "" ] ]
TITLE: Algorithmic Analysis of Edge Ranking and Profiling for MTF Determination of an Imaging System ABSTRACT: Edge detection is one of the most principal techniques for detecting discontinuities in the gray levels of image pixels. The Modulation Transfer Function (MTF) is one of the main criteria for assessing imaging quality and is a parameter frequently used for measuring the sharpness of an imaging system. In order to determine the MTF, it is essential to determine the best edge from the target image so that an edge profile can be developed and then the line spread function and hence the MTF, can be computed accordingly. For regular image sizes, the human visual system is adept enough to identify suitable edges from the image. But considering huge image datasets, such as those obtained from satellites, the image size may range in few gigabytes and in such a case, manual inspection of images for determination of the best suitable edge is not plausible and hence, edge profiling tasks have to be automated. This paper presents a novel, yet simple, algorithm for edge ranking and detection from image data-sets for MTF computation, which is ideal for automation on vectorised graphical processing units.
no_new_dataset
0.947817
1505.05354
Lianwen Jin
Weixin Yang, Lianwen Jin, Dacheng Tao, Zecheng Xie, Ziyong Feng
DropSample: A New Training Method to Enhance Deep Convolutional Neural Networks for Large-Scale Unconstrained Handwritten Chinese Character Recognition
18 pages, 8 figures, 5 tables
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Inspired by the theory of Leitners learning box from the field of psychology, we propose DropSample, a new method for training deep convolutional neural networks (DCNNs), and apply it to large-scale online handwritten Chinese character recognition (HCCR). According to the principle of DropSample, each training sample is associated with a quota function that is dynamically adjusted on the basis of the classification confidence given by the DCNN softmax output. After a learning iteration, samples with low confidence will have a higher probability of being selected as training data in the next iteration; in contrast, well-trained and well-recognized samples with very high confidence will have a lower probability of being involved in the next training iteration and can be gradually eliminated. As a result, the learning process becomes more efficient as it progresses. Furthermore, we investigate the use of domain-specific knowledge to enhance the performance of DCNN by adding a domain knowledge layer before the traditional CNN. By adopting DropSample together with different types of domain-specific knowledge, the accuracy of HCCR can be improved efficiently. Experiments on the CASIA-OLHDWB 1.0, CASIA-OLHWDB 1.1, and ICDAR 2013 online HCCR competition datasets yield outstanding recognition rates of 97.33%, 97.06%, and 97.51% respectively, all of which are significantly better than the previous best results reported in the literature.
[ { "version": "v1", "created": "Wed, 20 May 2015 13:08:57 GMT" } ]
2015-05-21T00:00:00
[ [ "Yang", "Weixin", "" ], [ "Jin", "Lianwen", "" ], [ "Tao", "Dacheng", "" ], [ "Xie", "Zecheng", "" ], [ "Feng", "Ziyong", "" ] ]
TITLE: DropSample: A New Training Method to Enhance Deep Convolutional Neural Networks for Large-Scale Unconstrained Handwritten Chinese Character Recognition ABSTRACT: Inspired by the theory of Leitners learning box from the field of psychology, we propose DropSample, a new method for training deep convolutional neural networks (DCNNs), and apply it to large-scale online handwritten Chinese character recognition (HCCR). According to the principle of DropSample, each training sample is associated with a quota function that is dynamically adjusted on the basis of the classification confidence given by the DCNN softmax output. After a learning iteration, samples with low confidence will have a higher probability of being selected as training data in the next iteration; in contrast, well-trained and well-recognized samples with very high confidence will have a lower probability of being involved in the next training iteration and can be gradually eliminated. As a result, the learning process becomes more efficient as it progresses. Furthermore, we investigate the use of domain-specific knowledge to enhance the performance of DCNN by adding a domain knowledge layer before the traditional CNN. By adopting DropSample together with different types of domain-specific knowledge, the accuracy of HCCR can be improved efficiently. Experiments on the CASIA-OLHDWB 1.0, CASIA-OLHWDB 1.1, and ICDAR 2013 online HCCR competition datasets yield outstanding recognition rates of 97.33%, 97.06%, and 97.51% respectively, all of which are significantly better than the previous best results reported in the literature.
no_new_dataset
0.948585
1010.1015
Keith Wiley
Keith Wiley, Andrew Connolly, Jeff Gardner, Simon Krughof, Magdalena Balazinska, Bill Howe, YongChul Kwon and YingYi Bu
Astronomy in the Cloud: Using MapReduce for Image Coaddition
31 pages, 11 figures, 2 tables
null
10.1086/658877
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In the coming decade, astronomical surveys of the sky will generate tens of terabytes of images and detect hundreds of millions of sources every night. The study of these sources will involve computation challenges such as anomaly detection and classification, and moving object tracking. Since such studies benefit from the highest quality data, methods such as image coaddition (stacking) will be a critical preprocessing step prior to scientific investigation. With a requirement that these images be analyzed on a nightly basis to identify moving sources or transient objects, these data streams present many computational challenges. Given the quantity of data involved, the computational load of these problems can only be addressed by distributing the workload over a large number of nodes. However, the high data throughput demanded by these applications may present scalability challenges for certain storage architectures. One scalable data-processing method that has emerged in recent years is MapReduce, and in this paper we focus on its popular open-source implementation called Hadoop. In the Hadoop framework, the data is partitioned among storage attached directly to worker nodes, and the processing workload is scheduled in parallel on the nodes that contain the required input data. A further motivation for using Hadoop is that it allows us to exploit cloud computing resources, e.g., Amazon's EC2. We report on our experience implementing a scalable image-processing pipeline for the SDSS imaging database using Hadoop. This multi-terabyte imaging dataset provides a good testbed for algorithm development since its scope and structure approximate future surveys. First, we describe MapReduce and how we adapted image coaddition to the MapReduce framework. Then we describe a number of optimizations to our basic approach and report experimental results comparing their performance.
[ { "version": "v1", "created": "Tue, 5 Oct 2010 20:35:53 GMT" } ]
2015-05-20T00:00:00
[ [ "Wiley", "Keith", "" ], [ "Connolly", "Andrew", "" ], [ "Gardner", "Jeff", "" ], [ "Krughof", "Simon", "" ], [ "Balazinska", "Magdalena", "" ], [ "Howe", "Bill", "" ], [ "Kwon", "YongChul", "" ], [ "Bu", "YingYi", "" ] ]
TITLE: Astronomy in the Cloud: Using MapReduce for Image Coaddition ABSTRACT: In the coming decade, astronomical surveys of the sky will generate tens of terabytes of images and detect hundreds of millions of sources every night. The study of these sources will involve computation challenges such as anomaly detection and classification, and moving object tracking. Since such studies benefit from the highest quality data, methods such as image coaddition (stacking) will be a critical preprocessing step prior to scientific investigation. With a requirement that these images be analyzed on a nightly basis to identify moving sources or transient objects, these data streams present many computational challenges. Given the quantity of data involved, the computational load of these problems can only be addressed by distributing the workload over a large number of nodes. However, the high data throughput demanded by these applications may present scalability challenges for certain storage architectures. One scalable data-processing method that has emerged in recent years is MapReduce, and in this paper we focus on its popular open-source implementation called Hadoop. In the Hadoop framework, the data is partitioned among storage attached directly to worker nodes, and the processing workload is scheduled in parallel on the nodes that contain the required input data. A further motivation for using Hadoop is that it allows us to exploit cloud computing resources, e.g., Amazon's EC2. We report on our experience implementing a scalable image-processing pipeline for the SDSS imaging database using Hadoop. This multi-terabyte imaging dataset provides a good testbed for algorithm development since its scope and structure approximate future surveys. First, we describe MapReduce and how we adapted image coaddition to the MapReduce framework. Then we describe a number of optimizations to our basic approach and report experimental results comparing their performance.
no_new_dataset
0.938857
1011.6268
Marija Mitrovic
Marija Mitrovi\'c, Georgios Paltoglou and Bosiljka Tadi\'c
Quantitative Analysis of Bloggers Collective Behavior Powered by Emotions
null
null
10.1088/1742-5468/2011/02/P02005
0143821
physics.soc-ph cond-mat.stat-mech cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Large-scale data resulting from users online interactions provide the ultimate source of information to study emergent social phenomena on the Web. From individual actions of users to observable collective behaviors, different mechanisms involving emotions expressed in the posted text play a role. Here we combine approaches of statistical physics with machine-learning methods of text analysis to study emergence of the emotional behavior among Web users. Mapping the high-resolution data from digg.com onto bipartite network of users and their comments onto posted stories, we identify user communities centered around certain popular posts and determine emotional contents of the related comments by the emotion-classifier developed for this type of texts. Applied over different time periods, this framework reveals strong correlations between the excess of negative emotions and the evolution of communities. We observe avalanches of emotional comments exhibiting significant self-organized critical behavior and temporal correlations. To explore robustness of these critical states, we design a network automaton model on realistic network connections and several control parameters, which can be inferred from the dataset. Dissemination of emotions by a small fraction of very active users appears to critically tune the collective states.
[ { "version": "v1", "created": "Mon, 29 Nov 2010 15:36:39 GMT" } ]
2015-05-20T00:00:00
[ [ "Mitrović", "Marija", "" ], [ "Paltoglou", "Georgios", "" ], [ "Tadić", "Bosiljka", "" ] ]
TITLE: Quantitative Analysis of Bloggers Collective Behavior Powered by Emotions ABSTRACT: Large-scale data resulting from users online interactions provide the ultimate source of information to study emergent social phenomena on the Web. From individual actions of users to observable collective behaviors, different mechanisms involving emotions expressed in the posted text play a role. Here we combine approaches of statistical physics with machine-learning methods of text analysis to study emergence of the emotional behavior among Web users. Mapping the high-resolution data from digg.com onto bipartite network of users and their comments onto posted stories, we identify user communities centered around certain popular posts and determine emotional contents of the related comments by the emotion-classifier developed for this type of texts. Applied over different time periods, this framework reveals strong correlations between the excess of negative emotions and the evolution of communities. We observe avalanches of emotional comments exhibiting significant self-organized critical behavior and temporal correlations. To explore robustness of these critical states, we design a network automaton model on realistic network connections and several control parameters, which can be inferred from the dataset. Dissemination of emotions by a small fraction of very active users appears to critically tune the collective states.
no_new_dataset
0.940079
1012.1184
Lei Zhang Dr.
Weisheng Dong, Lei Zhang, Guangming Shi, Xiaolin Wu
Image Deblurring and Super-resolution by Adaptive Sparse Domain Selection and Adaptive Regularization
35 pages. This paper is under review in IEEE TIP
null
10.1109/TIP.2011.2108306
null
cs.CV cs.MM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
As a powerful statistical image modeling technique, sparse representation has been successfully used in various image restoration applications. The success of sparse representation owes to the development of l1-norm optimization techniques, and the fact that natural images are intrinsically sparse in some domain. The image restoration quality largely depends on whether the employed sparse domain can represent well the underlying image. Considering that the contents can vary significantly across different images or different patches in a single image, we propose to learn various sets of bases from a pre-collected dataset of example image patches, and then for a given patch to be processed, one set of bases are adaptively selected to characterize the local sparse domain. We further introduce two adaptive regularization terms into the sparse representation framework. First, a set of autoregressive (AR) models are learned from the dataset of example image patches. The best fitted AR models to a given patch are adaptively selected to regularize the image local structures. Second, the image non-local self-similarity is introduced as another regularization term. In addition, the sparsity regularization parameter is adaptively estimated for better image restoration performance. Extensive experiments on image deblurring and super-resolution validate that by using adaptive sparse domain selection and adaptive regularization, the proposed method achieves much better results than many state-of-the-art algorithms in terms of both PSNR and visual perception.
[ { "version": "v1", "created": "Mon, 6 Dec 2010 14:37:14 GMT" } ]
2015-05-20T00:00:00
[ [ "Dong", "Weisheng", "" ], [ "Zhang", "Lei", "" ], [ "Shi", "Guangming", "" ], [ "Wu", "Xiaolin", "" ] ]
TITLE: Image Deblurring and Super-resolution by Adaptive Sparse Domain Selection and Adaptive Regularization ABSTRACT: As a powerful statistical image modeling technique, sparse representation has been successfully used in various image restoration applications. The success of sparse representation owes to the development of l1-norm optimization techniques, and the fact that natural images are intrinsically sparse in some domain. The image restoration quality largely depends on whether the employed sparse domain can represent well the underlying image. Considering that the contents can vary significantly across different images or different patches in a single image, we propose to learn various sets of bases from a pre-collected dataset of example image patches, and then for a given patch to be processed, one set of bases are adaptively selected to characterize the local sparse domain. We further introduce two adaptive regularization terms into the sparse representation framework. First, a set of autoregressive (AR) models are learned from the dataset of example image patches. The best fitted AR models to a given patch are adaptively selected to regularize the image local structures. Second, the image non-local self-similarity is introduced as another regularization term. In addition, the sparsity regularization parameter is adaptively estimated for better image restoration performance. Extensive experiments on image deblurring and super-resolution validate that by using adaptive sparse domain selection and adaptive regularization, the proposed method achieves much better results than many state-of-the-art algorithms in terms of both PSNR and visual perception.
no_new_dataset
0.948632
1401.4529
Bal\'azs Hidasi
Bal\'azs Hidasi, Domonkos Tikk
General factorization framework for context-aware recommendations
The final publication is available at Springer via http://dx.doi.org/10.1007/s10618-015-0417-y. Data Mining and Knowledge Discovery, 2015
null
10.1007/s10618-015-0417-y
null
cs.IR cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Context-aware recommendation algorithms focus on refining recommendations by considering additional information, available to the system. This topic has gained a lot of attention recently. Among others, several factorization methods were proposed to solve the problem, although most of them assume explicit feedback which strongly limits their real-world applicability. While these algorithms apply various loss functions and optimization strategies, the preference modeling under context is less explored due to the lack of tools allowing for easy experimentation with various models. As context dimensions are introduced beyond users and items, the space of possible preference models and the importance of proper modeling largely increases. In this paper we propose a General Factorization Framework (GFF), a single flexible algorithm that takes the preference model as an input and computes latent feature matrices for the input dimensions. GFF allows us to easily experiment with various linear models on any context-aware recommendation task, be it explicit or implicit feedback based. The scaling properties makes it usable under real life circumstances as well. We demonstrate the framework's potential by exploring various preference models on a 4-dimensional context-aware problem with contexts that are available for almost any real life datasets. We show in our experiments -- performed on five real life, implicit feedback datasets -- that proper preference modelling significantly increases recommendation accuracy, and previously unused models outperform the traditional ones. Novel models in GFF also outperform state-of-the-art factorization algorithms. We also extend the method to be fully compliant to the Multidimensional Dataspace Model, one of the most extensive data models of context-enriched data. Extended GFF allows the seamless incorporation of information into the fac[truncated]
[ { "version": "v1", "created": "Sat, 18 Jan 2014 11:13:26 GMT" }, { "version": "v2", "created": "Tue, 19 May 2015 11:50:22 GMT" } ]
2015-05-20T00:00:00
[ [ "Hidasi", "Balázs", "" ], [ "Tikk", "Domonkos", "" ] ]
TITLE: General factorization framework for context-aware recommendations ABSTRACT: Context-aware recommendation algorithms focus on refining recommendations by considering additional information, available to the system. This topic has gained a lot of attention recently. Among others, several factorization methods were proposed to solve the problem, although most of them assume explicit feedback which strongly limits their real-world applicability. While these algorithms apply various loss functions and optimization strategies, the preference modeling under context is less explored due to the lack of tools allowing for easy experimentation with various models. As context dimensions are introduced beyond users and items, the space of possible preference models and the importance of proper modeling largely increases. In this paper we propose a General Factorization Framework (GFF), a single flexible algorithm that takes the preference model as an input and computes latent feature matrices for the input dimensions. GFF allows us to easily experiment with various linear models on any context-aware recommendation task, be it explicit or implicit feedback based. The scaling properties makes it usable under real life circumstances as well. We demonstrate the framework's potential by exploring various preference models on a 4-dimensional context-aware problem with contexts that are available for almost any real life datasets. We show in our experiments -- performed on five real life, implicit feedback datasets -- that proper preference modelling significantly increases recommendation accuracy, and previously unused models outperform the traditional ones. Novel models in GFF also outperform state-of-the-art factorization algorithms. We also extend the method to be fully compliant to the Multidimensional Dataspace Model, one of the most extensive data models of context-enriched data. Extended GFF allows the seamless incorporation of information into the fac[truncated]
no_new_dataset
0.947672
1501.07320
Arun Tejasvi Chaganty
Volodymyr Kuleshov and Arun Tejasvi Chaganty and Percy Liang
Tensor Factorization via Matrix Factorization
Appearing in Proceedings of the 18th International Conference on Artificial Intelligence and Statistics (AISTATS) 2015, San Diego, CA, USA. JMLR: W&CP volume 38
null
null
null
cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Tensor factorization arises in many machine learning applications, such knowledge base modeling and parameter estimation in latent variable models. However, numerical methods for tensor factorization have not reached the level of maturity of matrix factorization methods. In this paper, we propose a new method for CP tensor factorization that uses random projections to reduce the problem to simultaneous matrix diagonalization. Our method is conceptually simple and also applies to non-orthogonal and asymmetric tensors of arbitrary order. We prove that a small number random projections essentially preserves the spectral information in the tensor, allowing us to remove the dependence on the eigengap that plagued earlier tensor-to-matrix reductions. Experimentally, our method outperforms existing tensor factorization methods on both simulated data and two real datasets.
[ { "version": "v1", "created": "Thu, 29 Jan 2015 01:01:34 GMT" }, { "version": "v2", "created": "Mon, 18 May 2015 21:53:34 GMT" } ]
2015-05-20T00:00:00
[ [ "Kuleshov", "Volodymyr", "" ], [ "Chaganty", "Arun Tejasvi", "" ], [ "Liang", "Percy", "" ] ]
TITLE: Tensor Factorization via Matrix Factorization ABSTRACT: Tensor factorization arises in many machine learning applications, such knowledge base modeling and parameter estimation in latent variable models. However, numerical methods for tensor factorization have not reached the level of maturity of matrix factorization methods. In this paper, we propose a new method for CP tensor factorization that uses random projections to reduce the problem to simultaneous matrix diagonalization. Our method is conceptually simple and also applies to non-orthogonal and asymmetric tensors of arbitrary order. We prove that a small number random projections essentially preserves the spectral information in the tensor, allowing us to remove the dependence on the eigengap that plagued earlier tensor-to-matrix reductions. Experimentally, our method outperforms existing tensor factorization methods on both simulated data and two real datasets.
no_new_dataset
0.950134
1505.04803
Yong Jae Lee
Yong Jae Lee and Kristen Grauman
Predicting Important Objects for Egocentric Video Summarization
Published in the International Journal of Computer Vision (IJCV), January 2015
null
10.1007/s11263-014-0794-5
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a video summarization approach for egocentric or "wearable" camera data. Given hours of video, the proposed method produces a compact storyboard summary of the camera wearer's day. In contrast to traditional keyframe selection techniques, the resulting summary focuses on the most important objects and people with which the camera wearer interacts. To accomplish this, we develop region cues indicative of high-level saliency in egocentric video---such as the nearness to hands, gaze, and frequency of occurrence---and learn a regressor to predict the relative importance of any new region based on these cues. Using these predictions and a simple form of temporal event detection, our method selects frames for the storyboard that reflect the key object-driven happenings. We adjust the compactness of the final summary given either an importance selection criterion or a length budget; for the latter, we design an efficient dynamic programming solution that accounts for importance, visual uniqueness, and temporal displacement. Critically, the approach is neither camera-wearer-specific nor object-specific; that means the learned importance metric need not be trained for a given user or context, and it can predict the importance of objects and people that have never been seen previously. Our results on two egocentric video datasets show the method's promise relative to existing techniques for saliency and summarization.
[ { "version": "v1", "created": "Mon, 18 May 2015 20:07:20 GMT" } ]
2015-05-20T00:00:00
[ [ "Lee", "Yong Jae", "" ], [ "Grauman", "Kristen", "" ] ]
TITLE: Predicting Important Objects for Egocentric Video Summarization ABSTRACT: We present a video summarization approach for egocentric or "wearable" camera data. Given hours of video, the proposed method produces a compact storyboard summary of the camera wearer's day. In contrast to traditional keyframe selection techniques, the resulting summary focuses on the most important objects and people with which the camera wearer interacts. To accomplish this, we develop region cues indicative of high-level saliency in egocentric video---such as the nearness to hands, gaze, and frequency of occurrence---and learn a regressor to predict the relative importance of any new region based on these cues. Using these predictions and a simple form of temporal event detection, our method selects frames for the storyboard that reflect the key object-driven happenings. We adjust the compactness of the final summary given either an importance selection criterion or a length budget; for the latter, we design an efficient dynamic programming solution that accounts for importance, visual uniqueness, and temporal displacement. Critically, the approach is neither camera-wearer-specific nor object-specific; that means the learned importance metric need not be trained for a given user or context, and it can predict the importance of objects and people that have never been seen previously. Our results on two egocentric video datasets show the method's promise relative to existing techniques for saliency and summarization.
no_new_dataset
0.955068
1505.04873
Lior Talker
Lior Talker and Yael Moses and Ilan Shimshoni
Have a Look at What I See
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a method for guiding a photographer to rotate her/his smartphone camera to obtain an image that overlaps with another image of the same scene. The other image is taken by another photographer from a different viewpoint. Our method is applicable even when the images do not have overlapping fields of view. Straightforward applications of our method include sharing attention to regions of interest for social purposes, or adding missing images to improve structure for motion results. Our solution uses additional images of the scene, which are often available since many people use their smartphone cameras regularly. These images may be available online from other photographers who are present at the scene. Our method avoids 3D scene reconstruction; it relies instead on a new representation that consists of the spatial orders of the scene points on two axes, x and y. This representation allows a sequence of points to be chosen efficiently and projected onto the photographers images, using epipolar point transfer. Overlaying these epipolar lines on the live preview of the camera produces a convenient interface to guide the user. The method was tested on challenging datasets of images and succeeded in guiding a photographer from one view to a non-overlapping destination view.
[ { "version": "v1", "created": "Tue, 19 May 2015 04:49:46 GMT" } ]
2015-05-20T00:00:00
[ [ "Talker", "Lior", "" ], [ "Moses", "Yael", "" ], [ "Shimshoni", "Ilan", "" ] ]
TITLE: Have a Look at What I See ABSTRACT: We propose a method for guiding a photographer to rotate her/his smartphone camera to obtain an image that overlaps with another image of the same scene. The other image is taken by another photographer from a different viewpoint. Our method is applicable even when the images do not have overlapping fields of view. Straightforward applications of our method include sharing attention to regions of interest for social purposes, or adding missing images to improve structure for motion results. Our solution uses additional images of the scene, which are often available since many people use their smartphone cameras regularly. These images may be available online from other photographers who are present at the scene. Our method avoids 3D scene reconstruction; it relies instead on a new representation that consists of the spatial orders of the scene points on two axes, x and y. This representation allows a sequence of points to be chosen efficiently and projected onto the photographers images, using epipolar point transfer. Overlaying these epipolar lines on the live preview of the camera produces a convenient interface to guide the user. The method was tested on challenging datasets of images and succeeded in guiding a photographer from one view to a non-overlapping destination view.
no_new_dataset
0.942454
1505.04880
Nasser Ghadiri
Amin Beiranvand and Nasser Ghadiri
ADQUEX: Adaptive Processing of Federated Queries over Linked Data based on Tuple Routing
null
null
null
null
cs.DC cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Due to the distribution of linked data across the web, the methods that process federated queries through a distributed approach are more attractive to the users and have gained more prosperity. In distributed processing of federated queries, we need methods and procedures to execute the query in an optimal manner. Most of the existing methods perform the optimization task based on some statistical information, whereas the query processor does not have precise statistical information about their properties, since the data sources are autonomous. When precise statistics are not available, the possibility of wrong estimations will highly increase, and may lead to inefficient execution of the query at runtime. Another problem of the existing methods is that in the optimization phase, they assume that runtime conditions of query execution are stable, while the environment in which federated queries are executed over linked data is dynamic and non-predictable. By considering these two problems, there is a great potential for exploiting the federated query processing techniques in an adaptive manner. In this paper, an adaptive method is proposed for processing federated queries over linked data, based on the concept of routing the tuples. The proposed method, named ADQUEX, is able to execute the query effectively without any prior statistical information. This method can change the query execution plan at runtime so that less intermediate results are produced. It can also adapt the execution plan to new situation if unpredicted network latencies arise. Extensive evaluation of our method by running real queries over well-known linked datasets shows very good results especially for complex queries.
[ { "version": "v1", "created": "Tue, 19 May 2015 05:51:27 GMT" } ]
2015-05-20T00:00:00
[ [ "Beiranvand", "Amin", "" ], [ "Ghadiri", "Nasser", "" ] ]
TITLE: ADQUEX: Adaptive Processing of Federated Queries over Linked Data based on Tuple Routing ABSTRACT: Due to the distribution of linked data across the web, the methods that process federated queries through a distributed approach are more attractive to the users and have gained more prosperity. In distributed processing of federated queries, we need methods and procedures to execute the query in an optimal manner. Most of the existing methods perform the optimization task based on some statistical information, whereas the query processor does not have precise statistical information about their properties, since the data sources are autonomous. When precise statistics are not available, the possibility of wrong estimations will highly increase, and may lead to inefficient execution of the query at runtime. Another problem of the existing methods is that in the optimization phase, they assume that runtime conditions of query execution are stable, while the environment in which federated queries are executed over linked data is dynamic and non-predictable. By considering these two problems, there is a great potential for exploiting the federated query processing techniques in an adaptive manner. In this paper, an adaptive method is proposed for processing federated queries over linked data, based on the concept of routing the tuples. The proposed method, named ADQUEX, is able to execute the query effectively without any prior statistical information. This method can change the query execution plan at runtime so that less intermediate results are produced. It can also adapt the execution plan to new situation if unpredicted network latencies arise. Extensive evaluation of our method by running real queries over well-known linked datasets shows very good results especially for complex queries.
no_new_dataset
0.937897
1505.04922
Lianwen Jin
Weixin Yang, Lianwen Jin, Manfei Liu
Character-level Chinese Writer Identification using Path Signature Feature, DropStroke and Deep CNN
5 pages, 4 figures, 2 tables. Manuscript is accepted to appear in ICDAR 2015
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Most existing online writer-identification systems require that the text content is supplied in advance and rely on separately designed features and classifiers. The identifications are based on lines of text, entire paragraphs, or entire documents; however, these materials are not always available. In this paper, we introduce a path-signature feature to an end-to-end text-independent writer-identification system with a deep convolutional neural network (DCNN). Because deep models require a considerable amount of data to achieve good performance, we propose a data-augmentation method named DropStroke to enrich personal handwriting. Experiments were conducted on online handwritten Chinese characters from the CASIA-OLHWDB1.0 dataset, which consists of 3,866 classes from 420 writers. For each writer, we only used 200 samples for training and the remaining 3,666. The results reveal that the path-signature feature is useful for writer identification, and the proposed DropStroke technique enhances the generalization and significantly improves performance.
[ { "version": "v1", "created": "Tue, 19 May 2015 09:25:46 GMT" } ]
2015-05-20T00:00:00
[ [ "Yang", "Weixin", "" ], [ "Jin", "Lianwen", "" ], [ "Liu", "Manfei", "" ] ]
TITLE: Character-level Chinese Writer Identification using Path Signature Feature, DropStroke and Deep CNN ABSTRACT: Most existing online writer-identification systems require that the text content is supplied in advance and rely on separately designed features and classifiers. The identifications are based on lines of text, entire paragraphs, or entire documents; however, these materials are not always available. In this paper, we introduce a path-signature feature to an end-to-end text-independent writer-identification system with a deep convolutional neural network (DCNN). Because deep models require a considerable amount of data to achieve good performance, we propose a data-augmentation method named DropStroke to enrich personal handwriting. Experiments were conducted on online handwritten Chinese characters from the CASIA-OLHWDB1.0 dataset, which consists of 3,866 classes from 420 writers. For each writer, we only used 200 samples for training and the remaining 3,666. The results reveal that the path-signature feature is useful for writer identification, and the proposed DropStroke technique enhances the generalization and significantly improves performance.
no_new_dataset
0.948632
1505.04925
Lianwen Jin
Zhuoyao Zhong, Lianwen Jin, Zecheng Xie
High Performance Offline Handwritten Chinese Character Recognition Using GoogLeNet and Directional Feature Maps
5 pages, 4 figures, 2 tables. Manuscript is accepted to appear in ICDAR 2015
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Just like its great success in solving many computer vision problems, the convolutional neural networks (CNN) provided new end-to-end approach to handwritten Chinese character recognition (HCCR) with very promising results in recent years. However, previous CNNs so far proposed for HCCR were neither deep enough nor slim enough. We show in this paper that, a deeper architecture can benefit HCCR a lot to achieve higher performance, meanwhile can be designed with less parameters. We also show that the traditional feature extraction methods, such as Gabor or gradient feature maps, are still useful for enhancing the performance of CNN. We design a streamlined version of GoogLeNet [13], which was original proposed for image classification in recent years with very deep architecture, for HCCR (denoted as HCCR-GoogLeNet). The HCCR-GoogLeNet we used is 19 layers deep but involves with only 7.26 million parameters. Experiments were conducted using the ICDAR 2013 offline HCCR competition dataset. It has been shown that with the proper incorporation with traditional directional feature maps, the proposed single and ensemble HCCR-GoogLeNet models achieve new state of the art recognition accuracy of 96.35% and 96.74%, respectively, outperforming previous best result with significant gap.
[ { "version": "v1", "created": "Tue, 19 May 2015 09:32:54 GMT" } ]
2015-05-20T00:00:00
[ [ "Zhong", "Zhuoyao", "" ], [ "Jin", "Lianwen", "" ], [ "Xie", "Zecheng", "" ] ]
TITLE: High Performance Offline Handwritten Chinese Character Recognition Using GoogLeNet and Directional Feature Maps ABSTRACT: Just like its great success in solving many computer vision problems, the convolutional neural networks (CNN) provided new end-to-end approach to handwritten Chinese character recognition (HCCR) with very promising results in recent years. However, previous CNNs so far proposed for HCCR were neither deep enough nor slim enough. We show in this paper that, a deeper architecture can benefit HCCR a lot to achieve higher performance, meanwhile can be designed with less parameters. We also show that the traditional feature extraction methods, such as Gabor or gradient feature maps, are still useful for enhancing the performance of CNN. We design a streamlined version of GoogLeNet [13], which was original proposed for image classification in recent years with very deep architecture, for HCCR (denoted as HCCR-GoogLeNet). The HCCR-GoogLeNet we used is 19 layers deep but involves with only 7.26 million parameters. Experiments were conducted using the ICDAR 2013 offline HCCR competition dataset. It has been shown that with the proper incorporation with traditional directional feature maps, the proposed single and ensemble HCCR-GoogLeNet models achieve new state of the art recognition accuracy of 96.35% and 96.74%, respectively, outperforming previous best result with significant gap.
no_new_dataset
0.947381
1505.05136
Nicolas Turenne
Nicolas Turenne
A Table-Binning Approach for Visualizing the Past
null
null
null
null
cs.IR cs.DB cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Large amounts of data are available due to low-cost and high-capacity data storage equipments. We propose a data exploration/visualization method for tabular multi-dimensional, time-varying datasets to present selected items in their global context. The approach is simple and uses a rank-based visualization and a pattern matching functionality based on temporal profiles. Ranking categories can be specified in a flexible way and are used instead of actual values (value reduction into bins) and plotting it over time in an unevenly quantized representation. Patterns that emerge are matched against a set of eight predefined temporal profiles. The graphical summarization of large-scale temporal data is proposed and applicability is tested qualitatively on about eight data sets and the approach is compared to classic line plots and SAX representation
[ { "version": "v1", "created": "Mon, 27 Apr 2015 11:15:39 GMT" } ]
2015-05-20T00:00:00
[ [ "Turenne", "Nicolas", "" ] ]
TITLE: A Table-Binning Approach for Visualizing the Past ABSTRACT: Large amounts of data are available due to low-cost and high-capacity data storage equipments. We propose a data exploration/visualization method for tabular multi-dimensional, time-varying datasets to present selected items in their global context. The approach is simple and uses a rank-based visualization and a pattern matching functionality based on temporal profiles. Ranking categories can be specified in a flexible way and are used instead of actual values (value reduction into bins) and plotting it over time in an unevenly quantized representation. Patterns that emerge are matched against a set of eight predefined temporal profiles. The graphical summarization of large-scale temporal data is proposed and applicability is tested qualitatively on about eight data sets and the approach is compared to classic line plots and SAX representation
no_new_dataset
0.948058
1005.5227
Michael Schreiber
Michael Schreiber
Twenty Hirsch index variants and other indicators giving more or less preference to highly cited papers
19 pages, including 6 tables and 3 figures accepted for publication in Annalen der Physik Berlin
Ann. Phys. (Berlin) 522, 536-554 (2010)
10.1002/andp.201000046
null
physics.soc-ph cs.DL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Hirsch index or h-index is widely used to quantify the impact of an individual's scientific research output, determining the highest number h of a scientist's papers that received at least h citations. Several variants of the index have been proposed in order to give more or less preference to highly cited papers. I analyse the citation records of 26 physicists discussing various suggestions, in particular A, e, f, g, h(2), h_w, h_T, \hbar, m, {\pi}, R, s, t, w, and maxprod. The total number of all and of all cited publications as well as the highest and the average number of citations are also compared. Advantages and disadvantages of these indices and indicators are discussed. Correlation coefficients are determined quantifying which indices and indicators yield similar and which yield more deviating rankings of the 26 datasets. For 6 datasets the determination of the indices and indicators is visualized.
[ { "version": "v1", "created": "Fri, 28 May 2010 07:08:09 GMT" } ]
2015-05-19T00:00:00
[ [ "Schreiber", "Michael", "" ] ]
TITLE: Twenty Hirsch index variants and other indicators giving more or less preference to highly cited papers ABSTRACT: The Hirsch index or h-index is widely used to quantify the impact of an individual's scientific research output, determining the highest number h of a scientist's papers that received at least h citations. Several variants of the index have been proposed in order to give more or less preference to highly cited papers. I analyse the citation records of 26 physicists discussing various suggestions, in particular A, e, f, g, h(2), h_w, h_T, \hbar, m, {\pi}, R, s, t, w, and maxprod. The total number of all and of all cited publications as well as the highest and the average number of citations are also compared. Advantages and disadvantages of these indices and indicators are discussed. Correlation coefficients are determined quantifying which indices and indicators yield similar and which yield more deviating rankings of the 26 datasets. For 6 datasets the determination of the indices and indicators is visualized.
no_new_dataset
0.952042
1006.4828
Vamsi Kundeti
Vamsi Kundeti and Sanguthevar Rajasekaran and Hieu Dinh
An Efficient Algorithm For Chinese Postman Walk on Bi-directed de Bruijn Graphs
null
null
10.1007/978-3-642-17458-2_16
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Sequence assembly from short reads is an important problem in biology. It is known that solving the sequence assembly problem exactly on a bi-directed de Bruijn graph or a string graph is intractable. However finding a Shortest Double stranded DNA string (SDDNA) containing all the k-long words in the reads seems to be a good heuristic to get close to the original genome. This problem is equivalent to finding a cyclic Chinese Postman (CP) walk on the underlying un-weighted bi-directed de Bruijn graph built from the reads. The Chinese Postman walk Problem (CPP) is solved by reducing it to a general bi-directed flow on this graph which runs in O(|E|2 log2(|V |)) time. In this paper we show that the cyclic CPP on bi-directed graphs can be solved without reducing it to bi-directed flow. We present a ?(p(|V | + |E|) log(|V |) + (dmaxp)3) time algorithm to solve the cyclic CPP on a weighted bi-directed de Bruijn graph, where p = max{|{v|din(v) - dout(v) > 0}|, |{v|din(v) - dout(v) < 0}|} and dmax = max{|din(v) - dout(v)}. Our algorithm performs asymptotically better than the bidirected flow algorithm when the number of imbalanced nodes p is much less than the nodes in the bi-directed graph. From our experimental results on various datasets, we have noticed that the value of p/|V | lies between 0.08% and 0.13% with 95% probability.
[ { "version": "v1", "created": "Thu, 24 Jun 2010 16:35:47 GMT" } ]
2015-05-19T00:00:00
[ [ "Kundeti", "Vamsi", "" ], [ "Rajasekaran", "Sanguthevar", "" ], [ "Dinh", "Hieu", "" ] ]
TITLE: An Efficient Algorithm For Chinese Postman Walk on Bi-directed de Bruijn Graphs ABSTRACT: Sequence assembly from short reads is an important problem in biology. It is known that solving the sequence assembly problem exactly on a bi-directed de Bruijn graph or a string graph is intractable. However finding a Shortest Double stranded DNA string (SDDNA) containing all the k-long words in the reads seems to be a good heuristic to get close to the original genome. This problem is equivalent to finding a cyclic Chinese Postman (CP) walk on the underlying un-weighted bi-directed de Bruijn graph built from the reads. The Chinese Postman walk Problem (CPP) is solved by reducing it to a general bi-directed flow on this graph which runs in O(|E|2 log2(|V |)) time. In this paper we show that the cyclic CPP on bi-directed graphs can be solved without reducing it to bi-directed flow. We present a ?(p(|V | + |E|) log(|V |) + (dmaxp)3) time algorithm to solve the cyclic CPP on a weighted bi-directed de Bruijn graph, where p = max{|{v|din(v) - dout(v) > 0}|, |{v|din(v) - dout(v) < 0}|} and dmax = max{|din(v) - dout(v)}. Our algorithm performs asymptotically better than the bidirected flow algorithm when the number of imbalanced nodes p is much less than the nodes in the bi-directed graph. From our experimental results on various datasets, we have noticed that the value of p/|V | lies between 0.08% and 0.13% with 95% probability.
no_new_dataset
0.952838
1404.1653
Zi-Ke Zhang Dr.
Lu Yu, Chuang Liu, Zi-Ke Zhang
Multi-Linear Interactive Matrix Factorization
null
null
null
null
cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recommender systems, which can significantly help users find their interested items from the information era, has attracted an increasing attention from both the scientific and application society. One of the widest applied recommendation methods is the Matrix Factorization (MF). However, most of MF based approaches focus on the user-item rating matrix, but ignoring the ingredients which may have significant influence on users' preferences on items. In this paper, we propose a multi-linear interactive MF algorithm (MLIMF) to model the interactions between the users and each event associated with their final decisions. Our model considers not only the user-item rating information but also the pairwise interactions based on some empirically supported factors. In addition, we compared the proposed model with three typical other methods: user-based collaborative filtering (UCF), item-based collaborative filtering (ICF) and regularized MF (RMF). Experimental results on two real-world datasets, \emph{MovieLens} 1M and \emph{MovieLens} 100k, show that our method performs much better than other three methods in the accuracy of recommendation. This work may shed some light on the in-depth understanding of modeling user online behaviors and the consequent decisions.
[ { "version": "v1", "created": "Mon, 7 Apr 2014 04:39:14 GMT" }, { "version": "v2", "created": "Mon, 18 May 2015 06:05:02 GMT" } ]
2015-05-19T00:00:00
[ [ "Yu", "Lu", "" ], [ "Liu", "Chuang", "" ], [ "Zhang", "Zi-Ke", "" ] ]
TITLE: Multi-Linear Interactive Matrix Factorization ABSTRACT: Recommender systems, which can significantly help users find their interested items from the information era, has attracted an increasing attention from both the scientific and application society. One of the widest applied recommendation methods is the Matrix Factorization (MF). However, most of MF based approaches focus on the user-item rating matrix, but ignoring the ingredients which may have significant influence on users' preferences on items. In this paper, we propose a multi-linear interactive MF algorithm (MLIMF) to model the interactions between the users and each event associated with their final decisions. Our model considers not only the user-item rating information but also the pairwise interactions based on some empirically supported factors. In addition, we compared the proposed model with three typical other methods: user-based collaborative filtering (UCF), item-based collaborative filtering (ICF) and regularized MF (RMF). Experimental results on two real-world datasets, \emph{MovieLens} 1M and \emph{MovieLens} 100k, show that our method performs much better than other three methods in the accuracy of recommendation. This work may shed some light on the in-depth understanding of modeling user online behaviors and the consequent decisions.
no_new_dataset
0.946941
1407.2433
Peter Foster
Peter Foster, Simon Dixon, Anssi Klapuri
Identifying Cover Songs Using Information-Theoretic Measures of Similarity
13 pages, 5 figures, 4 tables. v3: Accepted version
IEEE/ACM Transactions on Audio, Speech, and Language Processing, vol. 23 no. 6, pp. 993-1005, 2015
10.1109/TASLP.2015.2416655
null
cs.IR cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper investigates methods for quantifying similarity between audio signals, specifically for the task of of cover song detection. We consider an information-theoretic approach, where we compute pairwise measures of predictability between time series. We compare discrete-valued approaches operating on quantised audio features, to continuous-valued approaches. In the discrete case, we propose a method for computing the normalised compression distance, where we account for correlation between time series. In the continuous case, we propose to compute information-based measures of similarity as statistics of the prediction error between time series. We evaluate our methods on two cover song identification tasks using a data set comprised of 300 Jazz standards and using the Million Song Dataset. For both datasets, we observe that continuous-valued approaches outperform discrete-valued approaches. We consider approaches to estimating the normalised compression distance (NCD) based on string compression and prediction, where we observe that our proposed normalised compression distance with alignment (NCDA) improves average performance over NCD, for sequential compression algorithms. Finally, we demonstrate that continuous-valued distances may be combined to improve performance with respect to baseline approaches. Using a large-scale filter-and-refine approach, we demonstrate state-of-the-art performance for cover song identification using the Million Song Dataset.
[ { "version": "v1", "created": "Wed, 9 Jul 2014 11:04:15 GMT" }, { "version": "v2", "created": "Thu, 10 Jul 2014 00:53:47 GMT" }, { "version": "v3", "created": "Sun, 17 May 2015 15:53:43 GMT" } ]
2015-05-19T00:00:00
[ [ "Foster", "Peter", "" ], [ "Dixon", "Simon", "" ], [ "Klapuri", "Anssi", "" ] ]
TITLE: Identifying Cover Songs Using Information-Theoretic Measures of Similarity ABSTRACT: This paper investigates methods for quantifying similarity between audio signals, specifically for the task of of cover song detection. We consider an information-theoretic approach, where we compute pairwise measures of predictability between time series. We compare discrete-valued approaches operating on quantised audio features, to continuous-valued approaches. In the discrete case, we propose a method for computing the normalised compression distance, where we account for correlation between time series. In the continuous case, we propose to compute information-based measures of similarity as statistics of the prediction error between time series. We evaluate our methods on two cover song identification tasks using a data set comprised of 300 Jazz standards and using the Million Song Dataset. For both datasets, we observe that continuous-valued approaches outperform discrete-valued approaches. We consider approaches to estimating the normalised compression distance (NCD) based on string compression and prediction, where we observe that our proposed normalised compression distance with alignment (NCDA) improves average performance over NCD, for sequential compression algorithms. Finally, we demonstrate that continuous-valued distances may be combined to improve performance with respect to baseline approaches. Using a large-scale filter-and-refine approach, we demonstrate state-of-the-art performance for cover song identification using the Million Song Dataset.
no_new_dataset
0.939526
1412.4458
Hang Li
Hang Li, Chuan Huang, Fuad Alsaadi, Abdullah M. Dobaie, and Shuguang Cui
Opportunistic Multi-Channel Access in Heterogeneous 5G Network with Renewable Energy Supplies
28 pages, 8 figures
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A heterogeneous system, where small networks (e.g., small cell or WiFi) boost the system throughput under the umbrella of a large network (e.g., large cell), is a promising architecture for the 5G wireless communication networks, where green and sustainable communication is also a key aspect. Renewable energy based communication via energy harvesting (EH) devices is one of such green technology candidates. In this paper, we study an uplink transmission scenario under a heterogeneous network hierarchy, where each mobile user (MU) is powered by a sustainable energy supply, capable of both deterministic access to the large network via one private channel, and dynamic access to a small network with certain probability via one common channel shared by multiple MUs. Considering a general EH model, i.e., energy arrivals are time-correlated, we study an opportunistic transmission scheme and aim to maximize the average throughput for each MU, which jointly exploits the statistics and current states of the private channel, common channel, battery level, and EH rate. Applying a simple yet efficient "save-then-transmit" scheme, the throughput maximization problem is cast as a "rate-of-return" optimal stopping problem. The optimal stopping rule is proved to has a time-dependent threshold-based structure for the case with general Markovian system dynamics, and degrades to a pure threshold policy for the case with independent and identically distributed system dynamics. As performance benchmarks, the optimal power allocation scheme with conventional power supplies is also examined. Finally, numerical results are presented, and a new concept of "EH diversity" is discussed.
[ { "version": "v1", "created": "Mon, 15 Dec 2014 04:25:57 GMT" }, { "version": "v2", "created": "Tue, 6 Jan 2015 04:01:06 GMT" }, { "version": "v3", "created": "Sat, 16 May 2015 15:11:53 GMT" } ]
2015-05-19T00:00:00
[ [ "Li", "Hang", "" ], [ "Huang", "Chuan", "" ], [ "Alsaadi", "Fuad", "" ], [ "Dobaie", "Abdullah M.", "" ], [ "Cui", "Shuguang", "" ] ]
TITLE: Opportunistic Multi-Channel Access in Heterogeneous 5G Network with Renewable Energy Supplies ABSTRACT: A heterogeneous system, where small networks (e.g., small cell or WiFi) boost the system throughput under the umbrella of a large network (e.g., large cell), is a promising architecture for the 5G wireless communication networks, where green and sustainable communication is also a key aspect. Renewable energy based communication via energy harvesting (EH) devices is one of such green technology candidates. In this paper, we study an uplink transmission scenario under a heterogeneous network hierarchy, where each mobile user (MU) is powered by a sustainable energy supply, capable of both deterministic access to the large network via one private channel, and dynamic access to a small network with certain probability via one common channel shared by multiple MUs. Considering a general EH model, i.e., energy arrivals are time-correlated, we study an opportunistic transmission scheme and aim to maximize the average throughput for each MU, which jointly exploits the statistics and current states of the private channel, common channel, battery level, and EH rate. Applying a simple yet efficient "save-then-transmit" scheme, the throughput maximization problem is cast as a "rate-of-return" optimal stopping problem. The optimal stopping rule is proved to has a time-dependent threshold-based structure for the case with general Markovian system dynamics, and degrades to a pure threshold policy for the case with independent and identically distributed system dynamics. As performance benchmarks, the optimal power allocation scheme with conventional power supplies is also examined. Finally, numerical results are presented, and a new concept of "EH diversity" is discussed.
no_new_dataset
0.953665
1501.07645
Sachin Talathi
Sachin S. Talathi
Hyper-parameter optimization of Deep Convolutional Networks for object recognition
4 pages, 1 figure, 3 tables, Submitted to ICIP 2015
null
null
null
cs.CV cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recently sequential model based optimization (SMBO) has emerged as a promising hyper-parameter optimization strategy in machine learning. In this work, we investigate SMBO to identify architecture hyper-parameters of deep convolution networks (DCNs) object recognition. We propose a simple SMBO strategy that starts from a set of random initial DCN architectures to generate new architectures, which on training perform well on a given dataset. Using the proposed SMBO strategy we are able to identify a number of DCN architectures that produce results that are comparable to state-of-the-art results on object recognition benchmarks.
[ { "version": "v1", "created": "Fri, 30 Jan 2015 02:08:51 GMT" }, { "version": "v2", "created": "Sun, 17 May 2015 03:32:22 GMT" } ]
2015-05-19T00:00:00
[ [ "Talathi", "Sachin S.", "" ] ]
TITLE: Hyper-parameter optimization of Deep Convolutional Networks for object recognition ABSTRACT: Recently sequential model based optimization (SMBO) has emerged as a promising hyper-parameter optimization strategy in machine learning. In this work, we investigate SMBO to identify architecture hyper-parameters of deep convolution networks (DCNs) object recognition. We propose a simple SMBO strategy that starts from a set of random initial DCN architectures to generate new architectures, which on training perform well on a given dataset. Using the proposed SMBO strategy we are able to identify a number of DCN architectures that produce results that are comparable to state-of-the-art results on object recognition benchmarks.
no_new_dataset
0.954052
1504.02531
Zhimin Gao
Zhimin Gao, Lei Wang, Luping Zhou, Jianjia Zhang
HEp-2 Cell Image Classification with Deep Convolutional Neural Networks
32 pages
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Efficient Human Epithelial-2 (HEp-2) cell image classification can facilitate the diagnosis of many autoimmune diseases. This paper presents an automatic framework for this classification task, by utilizing the deep convolutional neural networks (CNNs) which have recently attracted intensive attention in visual recognition. This paper elaborates the important components of this framework, discusses multiple key factors that impact the efficiency of training a deep CNN, and systematically compares this framework with the well-established image classification models in the literature. Experiments on benchmark datasets show that i) the proposed framework can effectively outperform existing models by properly applying data augmentation; ii) our CNN-based framework demonstrates excellent adaptability across different datasets, which is highly desirable for classification under varying laboratory settings. Our system is ranked high in the cell image classification competition hosted by ICPR 2014.
[ { "version": "v1", "created": "Fri, 10 Apr 2015 01:58:17 GMT" }, { "version": "v2", "created": "Mon, 18 May 2015 01:12:12 GMT" } ]
2015-05-19T00:00:00
[ [ "Gao", "Zhimin", "" ], [ "Wang", "Lei", "" ], [ "Zhou", "Luping", "" ], [ "Zhang", "Jianjia", "" ] ]
TITLE: HEp-2 Cell Image Classification with Deep Convolutional Neural Networks ABSTRACT: Efficient Human Epithelial-2 (HEp-2) cell image classification can facilitate the diagnosis of many autoimmune diseases. This paper presents an automatic framework for this classification task, by utilizing the deep convolutional neural networks (CNNs) which have recently attracted intensive attention in visual recognition. This paper elaborates the important components of this framework, discusses multiple key factors that impact the efficiency of training a deep CNN, and systematically compares this framework with the well-established image classification models in the literature. Experiments on benchmark datasets show that i) the proposed framework can effectively outperform existing models by properly applying data augmentation; ii) our CNN-based framework demonstrates excellent adaptability across different datasets, which is highly desirable for classification under varying laboratory settings. Our system is ranked high in the cell image classification competition hosted by ICPR 2014.
no_new_dataset
0.952397
1504.06236
Arman Shokrollahi
Amir Sheikhahmadi, Mohammad A. Nematbakhsh, and Arman Shokrollahi
Improving detection of influential nodes in complex networks
17 pages, 8 figures, 5 tables . . . accepted for publication in Physica A: Statistical Mechanics and its Applications
null
10.1016/j.physa.2015.04.035
null
cs.SI physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recently an increasing amount of research is devoted to the question of how the most influential nodes (seeds) can be found effectively in a complex network. There are a number of measures proposed for this purpose, for instance, high-degree centrality measure reflects the importance of the network topology and has a reasonable runtime performance to find a set of nodes with highest degree, but they do not have a satisfactory dissemination potentiality in the network due to having many common neighbors ($\mbox{CN}^{(1)}$) and common neighbors of neighbors ($\mbox{CN}^{(2)}$). This flaw holds in other measures as well. In this paper, we compare high-degree centrality measure with other well-known measures using ten datasets in order to find a proportion for the common seeds in the seed sets obtained by them. We, thereof, propose an improved high-degree centrality measure (named DegreeDistance) and improve it to enhance accuracy in two phases, FIDD and SIDD, by putting a threshold on the number of common neighbors of already-selected seed nodes and a non-seed node which is under investigation to be selected as a seed as well as considering the influence score of seed nodes directly or through their common neighbors over the non-seed node. To evaluate the accuracy and runtime performance of DegreeDistance, FIDD, and SIDD, they are applied to eight large-scale networks and it finally turns out that SIDD dramatically outperforms other well-known measures and evinces comparatively more accurate performance in identifying the most influential nodes.
[ { "version": "v1", "created": "Thu, 23 Apr 2015 16:01:35 GMT" }, { "version": "v2", "created": "Fri, 24 Apr 2015 08:10:49 GMT" } ]
2015-05-19T00:00:00
[ [ "Sheikhahmadi", "Amir", "" ], [ "Nematbakhsh", "Mohammad A.", "" ], [ "Shokrollahi", "Arman", "" ] ]
TITLE: Improving detection of influential nodes in complex networks ABSTRACT: Recently an increasing amount of research is devoted to the question of how the most influential nodes (seeds) can be found effectively in a complex network. There are a number of measures proposed for this purpose, for instance, high-degree centrality measure reflects the importance of the network topology and has a reasonable runtime performance to find a set of nodes with highest degree, but they do not have a satisfactory dissemination potentiality in the network due to having many common neighbors ($\mbox{CN}^{(1)}$) and common neighbors of neighbors ($\mbox{CN}^{(2)}$). This flaw holds in other measures as well. In this paper, we compare high-degree centrality measure with other well-known measures using ten datasets in order to find a proportion for the common seeds in the seed sets obtained by them. We, thereof, propose an improved high-degree centrality measure (named DegreeDistance) and improve it to enhance accuracy in two phases, FIDD and SIDD, by putting a threshold on the number of common neighbors of already-selected seed nodes and a non-seed node which is under investigation to be selected as a seed as well as considering the influence score of seed nodes directly or through their common neighbors over the non-seed node. To evaluate the accuracy and runtime performance of DegreeDistance, FIDD, and SIDD, they are applied to eight large-scale networks and it finally turns out that SIDD dramatically outperforms other well-known measures and evinces comparatively more accurate performance in identifying the most influential nodes.
no_new_dataset
0.951997
1505.04134
Georgios Rokos
Georgios Rokos and Gerard J. Gorman and Paul H. J. Kelly
An Interrupt-Driven Work-Sharing For-Loop Scheduler
null
null
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we present a parallel for-loop scheduler which is based on work-stealing principles but runs under a completely cooperative scheme. POSIX signals are used by idle threads to interrupt left-behind workers, which in turn decide what portion of their workload can be given to the requester. We call this scheme Interrupt-Driven Work-Sharing (IDWS). This article describes how IDWS works, how it can be integrated into any POSIX-compliant OpenMP implementation and how a user can manually replace OpenMP parallel for-loops with IDWS in existing POSIX-compliant C++ applications. Additionally, we measure its performance using both a synthetic benchmark with varying distributions of workload across the iteration space and a real-life application on Sandy Bridge and Xeon Phi systems. Regardless the workload distribution and the underlying hardware, IDWS is always the best or among the best-performing strategies, providing a good all-around solution to the scheduling-choice dilemma.
[ { "version": "v1", "created": "Fri, 15 May 2015 17:30:17 GMT" }, { "version": "v2", "created": "Mon, 18 May 2015 16:04:00 GMT" } ]
2015-05-19T00:00:00
[ [ "Rokos", "Georgios", "" ], [ "Gorman", "Gerard J.", "" ], [ "Kelly", "Paul H. J.", "" ] ]
TITLE: An Interrupt-Driven Work-Sharing For-Loop Scheduler ABSTRACT: In this paper we present a parallel for-loop scheduler which is based on work-stealing principles but runs under a completely cooperative scheme. POSIX signals are used by idle threads to interrupt left-behind workers, which in turn decide what portion of their workload can be given to the requester. We call this scheme Interrupt-Driven Work-Sharing (IDWS). This article describes how IDWS works, how it can be integrated into any POSIX-compliant OpenMP implementation and how a user can manually replace OpenMP parallel for-loops with IDWS in existing POSIX-compliant C++ applications. Additionally, we measure its performance using both a synthetic benchmark with varying distributions of workload across the iteration space and a real-life application on Sandy Bridge and Xeon Phi systems. Regardless the workload distribution and the underlying hardware, IDWS is always the best or among the best-performing strategies, providing a good all-around solution to the scheduling-choice dilemma.
no_new_dataset
0.941601
1505.04198
Matthias Poloczek
Bert Besser and Matthias Poloczek
Greedy Matching: Guarantees and Limitations
29 pages, 8 figures
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Since Tinhofer proposed the MinGreedy algorithm for maximum cardinality matching in 1984, several experimental studies found the randomized algorithm to perform excellently for various classes of random graphs and benchmark instances. In contrast, only few analytical results are known. We show that MinGreedy cannot improve on the trivial approximation ratio 1/2 whp., even for bipartite graphs. Our hard inputs seem to require a small number of high-degree nodes. This motivates an investigation of greedy algorithms on graphs with maximum degree D: We show that MinGreedy achieves a (D-1)/(2D-3)-approximation for graphs with D=3 and for D-regular graphs, and a guarantee of (D-1/2)/(2D-2) for graphs with maximum degree D. Interestingly, our bounds even hold for the deterministic MinGreedy that breaks all ties arbitrarily. Moreover, we investigate the limitations of the greedy paradigm, using the model of priority algorithms introduced by Borodin, Nielsen, and Rackoff. We study deterministic priority algorithms and prove a (D-1)/(2D-3)-inapproximability result for graphs with maximum degree D; thus, these greedy algorithms do not achieve a 1/2+eps-approximation and in particular the 2/3-approximation obtained by the deterministic MinGreedy for D=3 is optimal in this class. For k-uniform hypergraphs we show a tight 1/k-inapproximability bound. We also study fully randomized priority algorithms and give a 5/6-inapproximability bound. Thus, they cannot compete with matching algorithms of other paradigms.
[ { "version": "v1", "created": "Fri, 15 May 2015 20:26:21 GMT" } ]
2015-05-19T00:00:00
[ [ "Besser", "Bert", "" ], [ "Poloczek", "Matthias", "" ] ]
TITLE: Greedy Matching: Guarantees and Limitations ABSTRACT: Since Tinhofer proposed the MinGreedy algorithm for maximum cardinality matching in 1984, several experimental studies found the randomized algorithm to perform excellently for various classes of random graphs and benchmark instances. In contrast, only few analytical results are known. We show that MinGreedy cannot improve on the trivial approximation ratio 1/2 whp., even for bipartite graphs. Our hard inputs seem to require a small number of high-degree nodes. This motivates an investigation of greedy algorithms on graphs with maximum degree D: We show that MinGreedy achieves a (D-1)/(2D-3)-approximation for graphs with D=3 and for D-regular graphs, and a guarantee of (D-1/2)/(2D-2) for graphs with maximum degree D. Interestingly, our bounds even hold for the deterministic MinGreedy that breaks all ties arbitrarily. Moreover, we investigate the limitations of the greedy paradigm, using the model of priority algorithms introduced by Borodin, Nielsen, and Rackoff. We study deterministic priority algorithms and prove a (D-1)/(2D-3)-inapproximability result for graphs with maximum degree D; thus, these greedy algorithms do not achieve a 1/2+eps-approximation and in particular the 2/3-approximation obtained by the deterministic MinGreedy for D=3 is optimal in this class. For k-uniform hypergraphs we show a tight 1/k-inapproximability bound. We also study fully randomized priority algorithms and give a 5/6-inapproximability bound. Thus, they cannot compete with matching algorithms of other paradigms.
no_new_dataset
0.945349
1505.04243
Paul Grigas
Robert M. Freund, Paul Grigas, Rahul Mazumder
A New Perspective on Boosting in Linear Regression via Subgradient Optimization and Relatives
null
null
null
null
math.ST cs.LG math.OC stat.ML stat.TH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we analyze boosting algorithms in linear regression from a new perspective: that of modern first-order methods in convex optimization. We show that classic boosting algorithms in linear regression, namely the incremental forward stagewise algorithm (FS$_\varepsilon$) and least squares boosting (LS-Boost($\varepsilon$)), can be viewed as subgradient descent to minimize the loss function defined as the maximum absolute correlation between the features and residuals. We also propose a modification of FS$_\varepsilon$ that yields an algorithm for the Lasso, and that may be easily extended to an algorithm that computes the Lasso path for different values of the regularization parameter. Furthermore, we show that these new algorithms for the Lasso may also be interpreted as the same master algorithm (subgradient descent), applied to a regularized version of the maximum absolute correlation loss function. We derive novel, comprehensive computational guarantees for several boosting algorithms in linear regression (including LS-Boost($\varepsilon$) and FS$_\varepsilon$) by using techniques of modern first-order methods in convex optimization. Our computational guarantees inform us about the statistical properties of boosting algorithms. In particular they provide, for the first time, a precise theoretical description of the amount of data-fidelity and regularization imparted by running a boosting algorithm with a prespecified learning rate for a fixed but arbitrary number of iterations, for any dataset.
[ { "version": "v1", "created": "Sat, 16 May 2015 04:23:08 GMT" } ]
2015-05-19T00:00:00
[ [ "Freund", "Robert M.", "" ], [ "Grigas", "Paul", "" ], [ "Mazumder", "Rahul", "" ] ]
TITLE: A New Perspective on Boosting in Linear Regression via Subgradient Optimization and Relatives ABSTRACT: In this paper we analyze boosting algorithms in linear regression from a new perspective: that of modern first-order methods in convex optimization. We show that classic boosting algorithms in linear regression, namely the incremental forward stagewise algorithm (FS$_\varepsilon$) and least squares boosting (LS-Boost($\varepsilon$)), can be viewed as subgradient descent to minimize the loss function defined as the maximum absolute correlation between the features and residuals. We also propose a modification of FS$_\varepsilon$ that yields an algorithm for the Lasso, and that may be easily extended to an algorithm that computes the Lasso path for different values of the regularization parameter. Furthermore, we show that these new algorithms for the Lasso may also be interpreted as the same master algorithm (subgradient descent), applied to a regularized version of the maximum absolute correlation loss function. We derive novel, comprehensive computational guarantees for several boosting algorithms in linear regression (including LS-Boost($\varepsilon$) and FS$_\varepsilon$) by using techniques of modern first-order methods in convex optimization. Our computational guarantees inform us about the statistical properties of boosting algorithms. In particular they provide, for the first time, a precise theoretical description of the amount of data-fidelity and regularization imparted by running a boosting algorithm with a prespecified learning rate for a fixed but arbitrary number of iterations, for any dataset.
no_new_dataset
0.944536
1505.04286
Harry Commin PhD
Harry Commin
Robust Real-time Extraction of Fiducial Facial Feature Points using Haar-like Features
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we explore methods of robustly extracting fiducial facial feature points - an important process for numerous facial image processing tasks. We consider various methods to first detect face, then facial features and finally salient facial feature points. Colour-based models are analysed and their overall unsuitability for this task is summarised. The bulk of the report is then dedicated to proposing a learning-based method centred on the Viola-Jones algorithm. The specific difficulties and considerations relating to feature point detection are laid out in this context and a novel approach is established to address these issues. On a sequence of clear and unobstructed face images, our proposed system achieves average detection rates of over 90%. Then, using a more varied sample dataset, we identify some possible areas for future development of our system.
[ { "version": "v1", "created": "Sat, 16 May 2015 15:41:21 GMT" } ]
2015-05-19T00:00:00
[ [ "Commin", "Harry", "" ] ]
TITLE: Robust Real-time Extraction of Fiducial Facial Feature Points using Haar-like Features ABSTRACT: In this paper, we explore methods of robustly extracting fiducial facial feature points - an important process for numerous facial image processing tasks. We consider various methods to first detect face, then facial features and finally salient facial feature points. Colour-based models are analysed and their overall unsuitability for this task is summarised. The bulk of the report is then dedicated to proposing a learning-based method centred on the Viola-Jones algorithm. The specific difficulties and considerations relating to feature point detection are laid out in this context and a novel approach is established to address these issues. On a sequence of clear and unobstructed face images, our proposed system achieves average detection rates of over 90%. Then, using a more varied sample dataset, we identify some possible areas for future development of our system.
no_new_dataset
0.945651
1505.04366
Seunghoon Hong
Hyeonwoo Noh, Seunghoon Hong, Bohyung Han
Learning Deconvolution Network for Semantic Segmentation
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a novel semantic segmentation algorithm by learning a deconvolution network. We learn the network on top of the convolutional layers adopted from VGG 16-layer net. The deconvolution network is composed of deconvolution and unpooling layers, which identify pixel-wise class labels and predict segmentation masks. We apply the trained network to each proposal in an input image, and construct the final semantic segmentation map by combining the results from all proposals in a simple manner. The proposed algorithm mitigates the limitations of the existing methods based on fully convolutional networks by integrating deep deconvolution network and proposal-wise prediction; our segmentation method typically identifies detailed structures and handles objects in multiple scales naturally. Our network demonstrates outstanding performance in PASCAL VOC 2012 dataset, and we achieve the best accuracy (72.5%) among the methods trained with no external data through ensemble with the fully convolutional network.
[ { "version": "v1", "created": "Sun, 17 May 2015 07:33:28 GMT" } ]
2015-05-19T00:00:00
[ [ "Noh", "Hyeonwoo", "" ], [ "Hong", "Seunghoon", "" ], [ "Han", "Bohyung", "" ] ]
TITLE: Learning Deconvolution Network for Semantic Segmentation ABSTRACT: We propose a novel semantic segmentation algorithm by learning a deconvolution network. We learn the network on top of the convolutional layers adopted from VGG 16-layer net. The deconvolution network is composed of deconvolution and unpooling layers, which identify pixel-wise class labels and predict segmentation masks. We apply the trained network to each proposal in an input image, and construct the final semantic segmentation map by combining the results from all proposals in a simple manner. The proposed algorithm mitigates the limitations of the existing methods based on fully convolutional networks by integrating deep deconvolution network and proposal-wise prediction; our segmentation method typically identifies detailed structures and handles objects in multiple scales naturally. Our network demonstrates outstanding performance in PASCAL VOC 2012 dataset, and we achieve the best accuracy (72.5%) among the methods trained with no external data through ensemble with the fully convolutional network.
no_new_dataset
0.951459
1505.04420
Miryam de Lhoneux
Miryam de Lhoneux
CCG Parsing and Multiword Expressions
MSc thesis, The University of Edinburgh, 2014, School of Informatics, MSc Artificial Intelligence
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This thesis presents a study about the integration of information about Multiword Expressions (MWEs) into parsing with Combinatory Categorial Grammar (CCG). We build on previous work which has shown the benefit of adding information about MWEs to syntactic parsing by implementing a similar pipeline with CCG parsing. More specifically, we collapse MWEs to one token in training and test data in CCGbank, a corpus which contains sentences annotated with CCG derivations. Our collapsing algorithm however can only deal with MWEs when they form a constituent in the data which is one of the limitations of our approach. We study the effect of collapsing training and test data. A parsing effect can be obtained if collapsed data help the parser in its decisions and a training effect can be obtained if training on the collapsed data improves results. We also collapse the gold standard and show that our model significantly outperforms the baseline model on our gold standard, which indicates that there is a training effect. We show that the baseline model performs significantly better on our gold standard when the data are collapsed before parsing than when the data are collapsed after parsing which indicates that there is a parsing effect. We show that these results can lead to improved performance on the non-collapsed standard benchmark although we fail to show that it does so significantly. We conclude that despite the limited settings, there are noticeable improvements from using MWEs in parsing. We discuss ways in which the incorporation of MWEs into parsing can be improved and hypothesize that this will lead to more substantial results. We finally show that turning the MWE recognition part of the pipeline into an experimental part is a useful thing to do as we obtain different results with different recognizers.
[ { "version": "v1", "created": "Sun, 17 May 2015 17:26:36 GMT" } ]
2015-05-19T00:00:00
[ [ "de Lhoneux", "Miryam", "" ] ]
TITLE: CCG Parsing and Multiword Expressions ABSTRACT: This thesis presents a study about the integration of information about Multiword Expressions (MWEs) into parsing with Combinatory Categorial Grammar (CCG). We build on previous work which has shown the benefit of adding information about MWEs to syntactic parsing by implementing a similar pipeline with CCG parsing. More specifically, we collapse MWEs to one token in training and test data in CCGbank, a corpus which contains sentences annotated with CCG derivations. Our collapsing algorithm however can only deal with MWEs when they form a constituent in the data which is one of the limitations of our approach. We study the effect of collapsing training and test data. A parsing effect can be obtained if collapsed data help the parser in its decisions and a training effect can be obtained if training on the collapsed data improves results. We also collapse the gold standard and show that our model significantly outperforms the baseline model on our gold standard, which indicates that there is a training effect. We show that the baseline model performs significantly better on our gold standard when the data are collapsed before parsing than when the data are collapsed after parsing which indicates that there is a parsing effect. We show that these results can lead to improved performance on the non-collapsed standard benchmark although we fail to show that it does so significantly. We conclude that despite the limited settings, there are noticeable improvements from using MWEs in parsing. We discuss ways in which the incorporation of MWEs into parsing can be improved and hypothesize that this will lead to more substantial results. We finally show that turning the MWE recognition part of the pipeline into an experimental part is a useful thing to do as we obtain different results with different recognizers.
no_new_dataset
0.940735
1505.04427
Zhenzhong Lan
Zhenzhong Lan, Dezhong Yao, Ming Lin, Shoou-I Yu, Alexander Hauptmann
The Best of Both Worlds: Combining Data-independent and Data-driven Approaches for Action Recognition
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Motivated by the success of data-driven convolutional neural networks (CNNs) in object recognition on static images, researchers are working hard towards developing CNN equivalents for learning video features. However, learning video features globally has proven to be quite a challenge due to its high dimensionality, the lack of labelled data and the difficulty in processing large-scale video data. Therefore, we propose to leverage effective techniques from both data-driven and data-independent approaches to improve action recognition system. Our contribution is three-fold. First, we propose a two-stream Stacked Convolutional Independent Subspace Analysis (ConvISA) architecture to show that unsupervised learning methods can significantly boost the performance of traditional local features extracted from data-independent models. Second, we demonstrate that by learning on video volumes detected by Improved Dense Trajectory (IDT), we can seamlessly combine our novel local descriptors with hand-crafted descriptors. Thus we can utilize available feature enhancing techniques developed for hand-crafted descriptors. Finally, similar to multi-class classification framework in CNNs, we propose a training-free re-ranking technique that exploits the relationship among action classes to improve the overall performance. Our experimental results on four benchmark action recognition datasets show significantly improved performance.
[ { "version": "v1", "created": "Sun, 17 May 2015 17:54:38 GMT" } ]
2015-05-19T00:00:00
[ [ "Lan", "Zhenzhong", "" ], [ "Yao", "Dezhong", "" ], [ "Lin", "Ming", "" ], [ "Yu", "Shoou-I", "" ], [ "Hauptmann", "Alexander", "" ] ]
TITLE: The Best of Both Worlds: Combining Data-independent and Data-driven Approaches for Action Recognition ABSTRACT: Motivated by the success of data-driven convolutional neural networks (CNNs) in object recognition on static images, researchers are working hard towards developing CNN equivalents for learning video features. However, learning video features globally has proven to be quite a challenge due to its high dimensionality, the lack of labelled data and the difficulty in processing large-scale video data. Therefore, we propose to leverage effective techniques from both data-driven and data-independent approaches to improve action recognition system. Our contribution is three-fold. First, we propose a two-stream Stacked Convolutional Independent Subspace Analysis (ConvISA) architecture to show that unsupervised learning methods can significantly boost the performance of traditional local features extracted from data-independent models. Second, we demonstrate that by learning on video volumes detected by Improved Dense Trajectory (IDT), we can seamlessly combine our novel local descriptors with hand-crafted descriptors. Thus we can utilize available feature enhancing techniques developed for hand-crafted descriptors. Finally, similar to multi-class classification framework in CNNs, we propose a training-free re-ranking technique that exploits the relationship among action classes to improve the overall performance. Our experimental results on four benchmark action recognition datasets show significantly improved performance.
no_new_dataset
0.948728
1505.04474
Saurabh Gupta
Saurabh Gupta and Jitendra Malik
Visual Semantic Role Labeling
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we introduce the problem of Visual Semantic Role Labeling: given an image we want to detect people doing actions and localize the objects of interaction. Classical approaches to action recognition either study the task of action classification at the image or video clip level or at best produce a bounding box around the person doing the action. We believe such an output is inadequate and a complete understanding can only come when we are able to associate objects in the scene to the different semantic roles of the action. To enable progress towards this goal, we annotate a dataset of 16K people instances in 10K images with actions they are doing and associate objects in the scene with different semantic roles for each action. Finally, we provide a set of baseline algorithms for this task and analyze error modes providing directions for future work.
[ { "version": "v1", "created": "Sun, 17 May 2015 23:21:35 GMT" } ]
2015-05-19T00:00:00
[ [ "Gupta", "Saurabh", "" ], [ "Malik", "Jitendra", "" ] ]
TITLE: Visual Semantic Role Labeling ABSTRACT: In this paper we introduce the problem of Visual Semantic Role Labeling: given an image we want to detect people doing actions and localize the objects of interaction. Classical approaches to action recognition either study the task of action classification at the image or video clip level or at best produce a bounding box around the person doing the action. We believe such an output is inadequate and a complete understanding can only come when we are able to associate objects in the scene to the different semantic roles of the action. To enable progress towards this goal, we annotate a dataset of 16K people instances in 10K images with actions they are doing and associate objects in the scene with different semantic roles for each action. Finally, we provide a set of baseline algorithms for this task and analyze error modes providing directions for future work.
no_new_dataset
0.927166
1505.04636
Alex Smola J
Mu Li, Dave G. Andersen, Alexander J. Smola
Graph Partitioning via Parallel Submodular Approximation to Accelerate Distributed Machine Learning
null
null
null
null
cs.DC cs.AI cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Distributed computing excels at processing large scale data, but the communication cost for synchronizing the shared parameters may slow down the overall performance. Fortunately, the interactions between parameter and data in many problems are sparse, which admits efficient partition in order to reduce the communication overhead. In this paper, we formulate data placement as a graph partitioning problem. We propose a distributed partitioning algorithm. We give both theoretical guarantees and a highly efficient implementation. We also provide a highly efficient implementation of the algorithm and demonstrate its promising results on both text datasets and social networks. We show that the proposed algorithm leads to 1.6x speedup of a state-of-the-start distributed machine learning system by eliminating 90\% of the network communication.
[ { "version": "v1", "created": "Mon, 18 May 2015 13:43:46 GMT" } ]
2015-05-19T00:00:00
[ [ "Li", "Mu", "" ], [ "Andersen", "Dave G.", "" ], [ "Smola", "Alexander J.", "" ] ]
TITLE: Graph Partitioning via Parallel Submodular Approximation to Accelerate Distributed Machine Learning ABSTRACT: Distributed computing excels at processing large scale data, but the communication cost for synchronizing the shared parameters may slow down the overall performance. Fortunately, the interactions between parameter and data in many problems are sparse, which admits efficient partition in order to reduce the communication overhead. In this paper, we formulate data placement as a graph partitioning problem. We propose a distributed partitioning algorithm. We give both theoretical guarantees and a highly efficient implementation. We also provide a highly efficient implementation of the algorithm and demonstrate its promising results on both text datasets and social networks. We show that the proposed algorithm leads to 1.6x speedup of a state-of-the-start distributed machine learning system by eliminating 90\% of the network communication.
no_new_dataset
0.945601
1003.1931
Zi-Ke Zhang Mr.
Zi-Ke Zhang, Chuang Liu
Hypergraph model of social tagging networks
7 pages,7 figures, 32 references
J. Stat. Mech. (2010) P100005
10.1088/1742-5468/2010/10/P10005
null
physics.soc-ph cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The past few years have witnessed the great success of a new family of paradigms, so-called folksonomy, which allows users to freely associate tags to resources and efficiently manage them. In order to uncover the underlying structures and user behaviors in folksonomy, in this paper, we propose an evolutionary hypergrah model to explain the emerging statistical properties. The present model introduces a novel mechanism that one can not only assign tags to resources, but also retrieve resources via collaborative tags. We then compare the model with a real-world dataset: \emph{Del.icio.us}. Indeed, the present model shows considerable agreement with the empirical data in following aspects: power-law hyperdegree distributions, negtive correlation between clustering coefficients and hyperdegrees, and small average distances. Furthermore, the model indicates that most tagging behaviors are motivated by labeling tags to resources, and tags play a significant role in effectively retrieving interesting resources and making acquaintance with congenial friends. The proposed model may shed some light on the in-depth understanding of the structure and function of folksonomy.
[ { "version": "v1", "created": "Tue, 9 Mar 2010 17:03:41 GMT" } ]
2015-05-18T00:00:00
[ [ "Zhang", "Zi-Ke", "" ], [ "Liu", "Chuang", "" ] ]
TITLE: Hypergraph model of social tagging networks ABSTRACT: The past few years have witnessed the great success of a new family of paradigms, so-called folksonomy, which allows users to freely associate tags to resources and efficiently manage them. In order to uncover the underlying structures and user behaviors in folksonomy, in this paper, we propose an evolutionary hypergrah model to explain the emerging statistical properties. The present model introduces a novel mechanism that one can not only assign tags to resources, but also retrieve resources via collaborative tags. We then compare the model with a real-world dataset: \emph{Del.icio.us}. Indeed, the present model shows considerable agreement with the empirical data in following aspects: power-law hyperdegree distributions, negtive correlation between clustering coefficients and hyperdegrees, and small average distances. Furthermore, the model indicates that most tagging behaviors are motivated by labeling tags to resources, and tags play a significant role in effectively retrieving interesting resources and making acquaintance with congenial friends. The proposed model may shed some light on the in-depth understanding of the structure and function of folksonomy.
no_new_dataset
0.928797
1306.1461
Bob Sturm
Bob L. Sturm
The GTZAN dataset: Its contents, its faults, their effects on evaluation, and its future use
29 pages, 7 figures, 6 tables, 128 references
null
10.1080/09298215.2014.894533
null
cs.SD
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The GTZAN dataset appears in at least 100 published works, and is the most-used public dataset for evaluation in machine listening research for music genre recognition (MGR). Our recent work, however, shows GTZAN has several faults (repetitions, mislabelings, and distortions), which challenge the interpretability of any result derived using it. In this article, we disprove the claims that all MGR systems are affected in the same ways by these faults, and that the performances of MGR systems in GTZAN are still meaningfully comparable since they all face the same faults. We identify and analyze the contents of GTZAN, and provide a catalog of its faults. We review how GTZAN has been used in MGR research, and find few indications that its faults have been known and considered. Finally, we rigorously study the effects of its faults on evaluating five different MGR systems. The lesson is not to banish GTZAN, but to use it with consideration of its contents.
[ { "version": "v1", "created": "Thu, 6 Jun 2013 16:30:44 GMT" }, { "version": "v2", "created": "Fri, 7 Jun 2013 16:57:39 GMT" } ]
2015-05-18T00:00:00
[ [ "Sturm", "Bob L.", "" ] ]
TITLE: The GTZAN dataset: Its contents, its faults, their effects on evaluation, and its future use ABSTRACT: The GTZAN dataset appears in at least 100 published works, and is the most-used public dataset for evaluation in machine listening research for music genre recognition (MGR). Our recent work, however, shows GTZAN has several faults (repetitions, mislabelings, and distortions), which challenge the interpretability of any result derived using it. In this article, we disprove the claims that all MGR systems are affected in the same ways by these faults, and that the performances of MGR systems in GTZAN are still meaningfully comparable since they all face the same faults. We identify and analyze the contents of GTZAN, and provide a catalog of its faults. We review how GTZAN has been used in MGR research, and find few indications that its faults have been known and considered. Finally, we rigorously study the effects of its faults on evaluating five different MGR systems. The lesson is not to banish GTZAN, but to use it with consideration of its contents.
no_new_dataset
0.919931
1505.03358
Miriam Redi
Rossano Schifanella, Miriam Redi, Luca Aiello
An Image is Worth More than a Thousand Favorites: Surfacing the Hidden Beauty of Flickr Pictures
ICWSM 2015
null
null
null
cs.SI cs.CV cs.CY cs.MM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The dynamics of attention in social media tend to obey power laws. Attention concentrates on a relatively small number of popular items and neglecting the vast majority of content produced by the crowd. Although popularity can be an indication of the perceived value of an item within its community, previous research has hinted to the fact that popularity is distinct from intrinsic quality. As a result, content with low visibility but high quality lurks in the tail of the popularity distribution. This phenomenon can be particularly evident in the case of photo-sharing communities, where valuable photographers who are not highly engaged in online social interactions contribute with high-quality pictures that remain unseen. We propose to use a computer vision method to surface beautiful pictures from the immense pool of near-zero-popularity items, and we test it on a large dataset of creative-commons photos on Flickr. By gathering a large crowdsourced ground truth of aesthetics scores for Flickr images, we show that our method retrieves photos whose median perceived beauty score is equal to the most popular ones, and whose average is lower by only 1.5%.
[ { "version": "v1", "created": "Wed, 13 May 2015 12:40:24 GMT" }, { "version": "v2", "created": "Fri, 15 May 2015 10:05:34 GMT" } ]
2015-05-18T00:00:00
[ [ "Schifanella", "Rossano", "" ], [ "Redi", "Miriam", "" ], [ "Aiello", "Luca", "" ] ]
TITLE: An Image is Worth More than a Thousand Favorites: Surfacing the Hidden Beauty of Flickr Pictures ABSTRACT: The dynamics of attention in social media tend to obey power laws. Attention concentrates on a relatively small number of popular items and neglecting the vast majority of content produced by the crowd. Although popularity can be an indication of the perceived value of an item within its community, previous research has hinted to the fact that popularity is distinct from intrinsic quality. As a result, content with low visibility but high quality lurks in the tail of the popularity distribution. This phenomenon can be particularly evident in the case of photo-sharing communities, where valuable photographers who are not highly engaged in online social interactions contribute with high-quality pictures that remain unseen. We propose to use a computer vision method to surface beautiful pictures from the immense pool of near-zero-popularity items, and we test it on a large dataset of creative-commons photos on Flickr. By gathering a large crowdsourced ground truth of aesthetics scores for Flickr images, we show that our method retrieves photos whose median perceived beauty score is equal to the most popular ones, and whose average is lower by only 1.5%.
no_new_dataset
0.93233
1505.03873
Kevin Tang
Kevin Tang and Manohar Paluri and Li Fei-Fei and Rob Fergus and Lubomir Bourdev
Improving Image Classification with Location Context
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
With the widespread availability of cellphones and cameras that have GPS capabilities, it is common for images being uploaded to the Internet today to have GPS coordinates associated with them. In addition to research that tries to predict GPS coordinates from visual features, this also opens up the door to problems that are conditioned on the availability of GPS coordinates. In this work, we tackle the problem of performing image classification with location context, in which we are given the GPS coordinates for images in both the train and test phases. We explore different ways of encoding and extracting features from the GPS coordinates, and show how to naturally incorporate these features into a Convolutional Neural Network (CNN), the current state-of-the-art for most image classification and recognition problems. We also show how it is possible to simultaneously learn the optimal pooling radii for a subset of our features within the CNN framework. To evaluate our model and to help promote research in this area, we identify a set of location-sensitive concepts and annotate a subset of the Yahoo Flickr Creative Commons 100M dataset that has GPS coordinates with these concepts, which we make publicly available. By leveraging location context, we are able to achieve almost a 7% gain in mean average precision.
[ { "version": "v1", "created": "Thu, 14 May 2015 20:13:34 GMT" } ]
2015-05-18T00:00:00
[ [ "Tang", "Kevin", "" ], [ "Paluri", "Manohar", "" ], [ "Fei-Fei", "Li", "" ], [ "Fergus", "Rob", "" ], [ "Bourdev", "Lubomir", "" ] ]
TITLE: Improving Image Classification with Location Context ABSTRACT: With the widespread availability of cellphones and cameras that have GPS capabilities, it is common for images being uploaded to the Internet today to have GPS coordinates associated with them. In addition to research that tries to predict GPS coordinates from visual features, this also opens up the door to problems that are conditioned on the availability of GPS coordinates. In this work, we tackle the problem of performing image classification with location context, in which we are given the GPS coordinates for images in both the train and test phases. We explore different ways of encoding and extracting features from the GPS coordinates, and show how to naturally incorporate these features into a Convolutional Neural Network (CNN), the current state-of-the-art for most image classification and recognition problems. We also show how it is possible to simultaneously learn the optimal pooling radii for a subset of our features within the CNN framework. To evaluate our model and to help promote research in this area, we identify a set of location-sensitive concepts and annotate a subset of the Yahoo Flickr Creative Commons 100M dataset that has GPS coordinates with these concepts, which we make publicly available. By leveraging location context, we are able to achieve almost a 7% gain in mean average precision.
no_new_dataset
0.946794
1505.03899
Josef Spjut
Jean Sung, Sebastian Krupa, Andrew Fishberg, Josef Spjut
An Approach to Data Prefetching Using 2-Dimensional Selection Criteria
4 pages, 5 figures, submitted to Second Data Prefetching Championship
null
null
null
cs.AR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose an approach to data memory prefetching which augments the standard prefetch buffer with selection criteria based on performance and usage pattern of a given instruction. This approach is built on top of a pattern matching based prefetcher, specifically one which can choose between a stream, a stride, or a stream followed by a stride. We track the most recently called instructions to make a decision on the quantity of data to prefetch next. The decision is based on the frequency with which these instructions are called and the hit/miss rate of the prefetcher. In our approach, we separate the amount of data to prefetch into three categories: a high degree, a standard degree and a low degree. We ran tests on different values for the high prefetch degree, standard prefetch degree and low prefetch degree to determine that the most optimal combination was 1, 4, 8 lines respectively. The 2 dimensional selection criteria improved the performance of the prefetcher by up to 9.5% over the first data prefetching championship winner. Unfortunately performance also fell by as much as 14%, but remained similar on average across all of the benchmarks we tested.
[ { "version": "v1", "created": "Thu, 14 May 2015 21:57:26 GMT" } ]
2015-05-18T00:00:00
[ [ "Sung", "Jean", "" ], [ "Krupa", "Sebastian", "" ], [ "Fishberg", "Andrew", "" ], [ "Spjut", "Josef", "" ] ]
TITLE: An Approach to Data Prefetching Using 2-Dimensional Selection Criteria ABSTRACT: We propose an approach to data memory prefetching which augments the standard prefetch buffer with selection criteria based on performance and usage pattern of a given instruction. This approach is built on top of a pattern matching based prefetcher, specifically one which can choose between a stream, a stride, or a stream followed by a stride. We track the most recently called instructions to make a decision on the quantity of data to prefetch next. The decision is based on the frequency with which these instructions are called and the hit/miss rate of the prefetcher. In our approach, we separate the amount of data to prefetch into three categories: a high degree, a standard degree and a low degree. We ran tests on different values for the high prefetch degree, standard prefetch degree and low prefetch degree to determine that the most optimal combination was 1, 4, 8 lines respectively. The 2 dimensional selection criteria improved the performance of the prefetcher by up to 9.5% over the first data prefetching championship winner. Unfortunately performance also fell by as much as 14%, but remained similar on average across all of the benchmarks we tested.
no_new_dataset
0.948394
1505.04098
Kris Hauser
Kris Hauser and Yilun Zhou
Asymptotically Optimal Planning by Feasible Kinodynamic Planning in State-Cost Space
null
null
null
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents an equivalence between feasible kinodynamic planning and optimal kinodynamic planning, in that any optimal planning problem can be transformed into a series of feasible planning problems in a state-cost space whose solutions approach the optimum. This transformation gives rise to a meta-algorithm that produces an asymptotically optimal planner, given any feasible kinodynamic planner as a subroutine. The meta-algorithm is proven to be asymptotically optimal, and a formula is derived relating expected running time and solution suboptimality. It is directly applicable to a wide range of optimal planning problems because it does not resort to the use of steering functions or numerical boundary-value problem solvers. On a set of benchmark problems, it is demonstrated to perform, using the EST and RRT algorithms as subroutines, at a superior or comparable level to related planners.
[ { "version": "v1", "created": "Fri, 15 May 2015 15:39:58 GMT" } ]
2015-05-18T00:00:00
[ [ "Hauser", "Kris", "" ], [ "Zhou", "Yilun", "" ] ]
TITLE: Asymptotically Optimal Planning by Feasible Kinodynamic Planning in State-Cost Space ABSTRACT: This paper presents an equivalence between feasible kinodynamic planning and optimal kinodynamic planning, in that any optimal planning problem can be transformed into a series of feasible planning problems in a state-cost space whose solutions approach the optimum. This transformation gives rise to a meta-algorithm that produces an asymptotically optimal planner, given any feasible kinodynamic planner as a subroutine. The meta-algorithm is proven to be asymptotically optimal, and a formula is derived relating expected running time and solution suboptimality. It is directly applicable to a wide range of optimal planning problems because it does not resort to the use of steering functions or numerical boundary-value problem solvers. On a set of benchmark problems, it is demonstrated to perform, using the EST and RRT algorithms as subroutines, at a superior or comparable level to related planners.
no_new_dataset
0.947672
1503.03957
Prabhjot Singh
Prabhjot Singh, Sumit Dhawan, Shubham Agarwal, Narina Thakur
Implementation of an efficient Fuzzy Logic based Information Retrieval System
arXiv admin note: substantial text overlap with http://ntz-develop.blogspot.in/ , http://www.micsymposium.org/mics2012/submissions/mics2012_submission_8.pdf , http://www.slideshare.net/JeffreyStricklandPhD/predictive-modeling-and-analytics-selectchapters-41304405 by other authors
null
null
null
cs.IR
http://creativecommons.org/licenses/by/3.0/
This paper exemplifies the implementation of an efficient Information Retrieval (IR) System to compute the similarity between a dataset and a query using Fuzzy Logic. TREC dataset has been used for the same purpose. The dataset is parsed to generate keywords index which is used for the similarity comparison with the user query. Each query is assigned a score value based on its fuzzy similarity with the index keywords. The relevant documents are retrieved based on the score value. The performance and accuracy of the proposed fuzzy similarity model is compared with Cosine similarity model using Precision-Recall curves. The results prove the dominance of Fuzzy Similarity based IR system.
[ { "version": "v1", "created": "Fri, 13 Mar 2015 05:21:02 GMT" } ]
2015-05-15T00:00:00
[ [ "Singh", "Prabhjot", "" ], [ "Dhawan", "Sumit", "" ], [ "Agarwal", "Shubham", "" ], [ "Thakur", "Narina", "" ] ]
TITLE: Implementation of an efficient Fuzzy Logic based Information Retrieval System ABSTRACT: This paper exemplifies the implementation of an efficient Information Retrieval (IR) System to compute the similarity between a dataset and a query using Fuzzy Logic. TREC dataset has been used for the same purpose. The dataset is parsed to generate keywords index which is used for the similarity comparison with the user query. Each query is assigned a score value based on its fuzzy similarity with the index keywords. The relevant documents are retrieved based on the score value. The performance and accuracy of the proposed fuzzy similarity model is compared with Cosine similarity model using Precision-Recall curves. The results prove the dominance of Fuzzy Similarity based IR system.
no_new_dataset
0.949482
1504.05457
Yury Kashnitsky
Yury Kashnitsky, Sergei O. Kuznetsov
Graphlet-based lazy associative graph classification
This paper has been withdrawn by the author due to the incomplete set of necessary definitions and experiments
null
null
null
cs.DS cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The paper addresses the graph classification problem and introduces a modification of the lazy associative classification method to efficiently handle intersections of graphs. Graph intersections are approximated with all common subgraphs up to a fixed size similarly to what is done with graphlet kernels. We explain the idea of the algorithm with a toy example and describe our experiments with a predictive toxicology dataset.
[ { "version": "v1", "created": "Tue, 21 Apr 2015 15:12:45 GMT" }, { "version": "v2", "created": "Wed, 13 May 2015 20:46:47 GMT" } ]
2015-05-15T00:00:00
[ [ "Kashnitsky", "Yury", "" ], [ "Kuznetsov", "Sergei O.", "" ] ]
TITLE: Graphlet-based lazy associative graph classification ABSTRACT: The paper addresses the graph classification problem and introduces a modification of the lazy associative classification method to efficiently handle intersections of graphs. Graph intersections are approximated with all common subgraphs up to a fixed size similarly to what is done with graphlet kernels. We explain the idea of the algorithm with a toy example and describe our experiments with a predictive toxicology dataset.
no_new_dataset
0.940953
1505.03581
Ali Borji
Ali Borji, Laurent Itti
CAT2000: A Large Scale Fixation Dataset for Boosting Saliency Research
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Saliency modeling has been an active research area in computer vision for about two decades. Existing state of the art models perform very well in predicting where people look in natural scenes. There is, however, the risk that these models may have been overfitting themselves to available small scale biased datasets, thus trapping the progress in a local minimum. To gain a deeper insight regarding current issues in saliency modeling and to better gauge progress, we recorded eye movements of 120 observers while they freely viewed a large number of naturalistic and artificial images. Our stimuli includes 4000 images; 200 from each of 20 categories covering different types of scenes such as Cartoons, Art, Objects, Low resolution images, Indoor, Outdoor, Jumbled, Random, and Line drawings. We analyze some basic properties of this dataset and compare some successful models. We believe that our dataset opens new challenges for the next generation of saliency models and helps conduct behavioral studies on bottom-up visual attention.
[ { "version": "v1", "created": "Thu, 14 May 2015 00:34:43 GMT" } ]
2015-05-15T00:00:00
[ [ "Borji", "Ali", "" ], [ "Itti", "Laurent", "" ] ]
TITLE: CAT2000: A Large Scale Fixation Dataset for Boosting Saliency Research ABSTRACT: Saliency modeling has been an active research area in computer vision for about two decades. Existing state of the art models perform very well in predicting where people look in natural scenes. There is, however, the risk that these models may have been overfitting themselves to available small scale biased datasets, thus trapping the progress in a local minimum. To gain a deeper insight regarding current issues in saliency modeling and to better gauge progress, we recorded eye movements of 120 observers while they freely viewed a large number of naturalistic and artificial images. Our stimuli includes 4000 images; 200 from each of 20 categories covering different types of scenes such as Cartoons, Art, Objects, Low resolution images, Indoor, Outdoor, Jumbled, Random, and Line drawings. We analyze some basic properties of this dataset and compare some successful models. We believe that our dataset opens new challenges for the next generation of saliency models and helps conduct behavioral studies on bottom-up visual attention.
new_dataset
0.961929
0910.0767
Serena Bradde
M. Bailly-Bechet, S. Bradde, A. Braunstein, A. Flaxman, L. Foini, R. Zecchina
Clustering with shallow trees
11 pages, 7 figures
J. Stat. Mech. (2009) P12010
10.1088/1742-5468/2009/12/P12010
null
cond-mat.dis-nn cs.DS q-bio.QM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a new method for hierarchical clustering based on the optimisation of a cost function over trees of limited depth, and we derive a message--passing method that allows to solve it efficiently. The method and algorithm can be interpreted as a natural interpolation between two well-known approaches, namely single linkage and the recently presented Affinity Propagation. We analyze with this general scheme three biological/medical structured datasets (human population based on genetic information, proteins based on sequences and verbal autopsies) and show that the interpolation technique provides new insight.
[ { "version": "v1", "created": "Mon, 5 Oct 2009 14:13:25 GMT" }, { "version": "v2", "created": "Mon, 23 Nov 2009 15:44:29 GMT" } ]
2015-05-14T00:00:00
[ [ "Bailly-Bechet", "M.", "" ], [ "Bradde", "S.", "" ], [ "Braunstein", "A.", "" ], [ "Flaxman", "A.", "" ], [ "Foini", "L.", "" ], [ "Zecchina", "R.", "" ] ]
TITLE: Clustering with shallow trees ABSTRACT: We propose a new method for hierarchical clustering based on the optimisation of a cost function over trees of limited depth, and we derive a message--passing method that allows to solve it efficiently. The method and algorithm can be interpreted as a natural interpolation between two well-known approaches, namely single linkage and the recently presented Affinity Propagation. We analyze with this general scheme three biological/medical structured datasets (human population based on genetic information, proteins based on sequences and verbal autopsies) and show that the interpolation technique provides new insight.
no_new_dataset
0.948537
0911.4416
Arijit Laha Ph.D.
Arijit Laha, Nikhil R. Pal, and J. Das
Land cover classification using fuzzy rules and aggregation of contextual information through evidence theory
14 pages, 2 figures
IEEE Transactions on Geoscience and Remote Sensing, Vol. 44, No. 6, pp. 1633-1642, June 2006
10.1109/TGRS.2006.864391
null
cs.CV cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Land cover classification using multispectral satellite image is a very challenging task with numerous practical applications. We propose a multi-stage classifier that involves fuzzy rule extraction from the training data and then generation of a possibilistic label vector for each pixel using the fuzzy rule base. To exploit the spatial correlation of land cover types we propose four different information aggregation methods which use the possibilistic class label of a pixel and those of its eight spatial neighbors for making the final classification decision. Three of the aggregation methods use Dempster-Shafer theory of evidence while the remaining one is modeled after the fuzzy k-NN rule. The proposed methods are tested with two benchmark seven channel satellite images and the results are found to be quite satisfactory. They are also compared with a Markov random field (MRF) model-based contextual classification method and found to perform consistently better.
[ { "version": "v1", "created": "Mon, 23 Nov 2009 14:33:27 GMT" } ]
2015-05-14T00:00:00
[ [ "Laha", "Arijit", "" ], [ "Pal", "Nikhil R.", "" ], [ "Das", "J.", "" ] ]
TITLE: Land cover classification using fuzzy rules and aggregation of contextual information through evidence theory ABSTRACT: Land cover classification using multispectral satellite image is a very challenging task with numerous practical applications. We propose a multi-stage classifier that involves fuzzy rule extraction from the training data and then generation of a possibilistic label vector for each pixel using the fuzzy rule base. To exploit the spatial correlation of land cover types we propose four different information aggregation methods which use the possibilistic class label of a pixel and those of its eight spatial neighbors for making the final classification decision. Three of the aggregation methods use Dempster-Shafer theory of evidence while the remaining one is modeled after the fuzzy k-NN rule. The proposed methods are tested with two benchmark seven channel satellite images and the results are found to be quite satisfactory. They are also compared with a Markov random field (MRF) model-based contextual classification method and found to perform consistently better.
no_new_dataset
0.950824
0912.2826
Floriana Gargiulo
Floriana Gargiulo, Sonia Ternes, Sylvie Huet, Guillaume Deffuant
An iterative approach for generating statistically realistic populations of households
16 oages, 11 figures
null
10.1371/journal.pone.0008828
null
cs.MA cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Background: Many different simulation frameworks, in different topics, need to treat realistic datasets to initialize and calibrate the system. A precise reproduction of initial states is extremely important to obtain reliable forecast from the model. Methodology/Principal Findings: This paper proposes an algorithm to create an artificial population where individuals are described by their age, and are gathered in households respecting a variety of statistical constraints (distribution of household types, sizes, age of household head, difference of age between partners and among parents and children). Such a population is often the initial state of microsimulation or (agent) individual-based models. To get a realistic distribution of households is often very important, because this distribution has an impact on the demographic evolution. Usual techniques from microsimulation approach cross different sources of aggregated data for generating individuals. In our case the number of combinations of different households (types, sizes, age of participants) makes it computationally difficult to use directly such methods. Hence we developed a specific algorithm to make the problem more easily tractable. Conclusions/Significance: We generate the populations of two pilot municipalities in Auvergne region (France), to illustrate the approach. The generated populations show a good agreement with the available statistical datasets (not used for the generation) and are obtained in a reasonable computational time.
[ { "version": "v1", "created": "Tue, 15 Dec 2009 09:28:33 GMT" } ]
2015-05-14T00:00:00
[ [ "Gargiulo", "Floriana", "" ], [ "Ternes", "Sonia", "" ], [ "Huet", "Sylvie", "" ], [ "Deffuant", "Guillaume", "" ] ]
TITLE: An iterative approach for generating statistically realistic populations of households ABSTRACT: Background: Many different simulation frameworks, in different topics, need to treat realistic datasets to initialize and calibrate the system. A precise reproduction of initial states is extremely important to obtain reliable forecast from the model. Methodology/Principal Findings: This paper proposes an algorithm to create an artificial population where individuals are described by their age, and are gathered in households respecting a variety of statistical constraints (distribution of household types, sizes, age of household head, difference of age between partners and among parents and children). Such a population is often the initial state of microsimulation or (agent) individual-based models. To get a realistic distribution of households is often very important, because this distribution has an impact on the demographic evolution. Usual techniques from microsimulation approach cross different sources of aggregated data for generating individuals. In our case the number of combinations of different households (types, sizes, age of participants) makes it computationally difficult to use directly such methods. Hence we developed a specific algorithm to make the problem more easily tractable. Conclusions/Significance: We generate the populations of two pilot municipalities in Auvergne region (France), to illustrate the approach. The generated populations show a good agreement with the available statistical datasets (not used for the generation) and are obtained in a reasonable computational time.
no_new_dataset
0.949529
1503.05214
Tarek Elgamal
Tarek Elgamal, Mohamed Hefeeda
Analysis of PCA Algorithms in Distributed Environments
null
null
null
null
cs.DC cs.LG cs.NA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Classical machine learning algorithms often face scalability bottlenecks when they are applied to large-scale data. Such algorithms were designed to work with small data that is assumed to fit in the memory of one machine. In this report, we analyze different methods for computing an important machine learing algorithm, namely Principal Component Analysis (PCA), and we comment on its limitations in supporting large datasets. The methods are analyzed and compared across two important metrics: time complexity and communication complexity. We consider the worst-case scenarios for both metrics, and we identify the software libraries that implement each method. The analysis in this report helps researchers and engineers in (i) understanding the main bottlenecks for scalability in different PCA algorithms, (ii) choosing the most appropriate method and software library for a given application and data set characteristics, and (iii) designing new scalable PCA algorithms.
[ { "version": "v1", "created": "Tue, 17 Mar 2015 20:38:15 GMT" }, { "version": "v2", "created": "Wed, 13 May 2015 12:05:02 GMT" } ]
2015-05-14T00:00:00
[ [ "Elgamal", "Tarek", "" ], [ "Hefeeda", "Mohamed", "" ] ]
TITLE: Analysis of PCA Algorithms in Distributed Environments ABSTRACT: Classical machine learning algorithms often face scalability bottlenecks when they are applied to large-scale data. Such algorithms were designed to work with small data that is assumed to fit in the memory of one machine. In this report, we analyze different methods for computing an important machine learing algorithm, namely Principal Component Analysis (PCA), and we comment on its limitations in supporting large datasets. The methods are analyzed and compared across two important metrics: time complexity and communication complexity. We consider the worst-case scenarios for both metrics, and we identify the software libraries that implement each method. The analysis in this report helps researchers and engineers in (i) understanding the main bottlenecks for scalability in different PCA algorithms, (ii) choosing the most appropriate method and software library for a given application and data set characteristics, and (iii) designing new scalable PCA algorithms.
no_new_dataset
0.952926
1505.01919
Puja Gupta
Puja Gupta
Characterization of Performance Anomalies in Hadoop
null
null
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
With the huge variety of data and equally large-scale systems, there is not a unique execution setting for these systems which can guarantee the best performance for each query. In this project, we tried so study the impact of different execution settings on execution time of workloads by varying them one at a time. Using the data from these experiments, a decision tree was built where each internal node represents the execution parameter, each branch represents value chosen for the parameter and each leaf node represents a range for execution time in minutes. The attribute in the decision tree to split the dataset on is selected based on the maximum information gain or lowest entropy. Once the tree is trained with the training samples, this tree can be used to get approximate range for the expected execution time. When the actual execution time differs from this expected value, a performance anomaly can be detected. For a test dataset with 400 samples, 99% of samples had actual execution time in the range predicted time by the decision tree. Also on analyzing the constructed tree, an idea about what configuration can give better performance for a given workload can be obtained. Initial experiments suggest that the impact an execution parameter can have on the target attribute (here execution time) can be related to the distance of that feature node from the root of the constructed decision tree. From initial results the percent change in the values of the target attribute for various value of the feature node which is closer to the root is 6 times larger than when that same iii feature node is away from the root node. This observation will depend on how well the decision tree was trained and may not be true for every case.
[ { "version": "v1", "created": "Fri, 8 May 2015 03:24:33 GMT" }, { "version": "v2", "created": "Wed, 13 May 2015 03:50:26 GMT" } ]
2015-05-14T00:00:00
[ [ "Gupta", "Puja", "" ] ]
TITLE: Characterization of Performance Anomalies in Hadoop ABSTRACT: With the huge variety of data and equally large-scale systems, there is not a unique execution setting for these systems which can guarantee the best performance for each query. In this project, we tried so study the impact of different execution settings on execution time of workloads by varying them one at a time. Using the data from these experiments, a decision tree was built where each internal node represents the execution parameter, each branch represents value chosen for the parameter and each leaf node represents a range for execution time in minutes. The attribute in the decision tree to split the dataset on is selected based on the maximum information gain or lowest entropy. Once the tree is trained with the training samples, this tree can be used to get approximate range for the expected execution time. When the actual execution time differs from this expected value, a performance anomaly can be detected. For a test dataset with 400 samples, 99% of samples had actual execution time in the range predicted time by the decision tree. Also on analyzing the constructed tree, an idea about what configuration can give better performance for a given workload can be obtained. Initial experiments suggest that the impact an execution parameter can have on the target attribute (here execution time) can be related to the distance of that feature node from the root of the constructed decision tree. From initial results the percent change in the values of the target attribute for various value of the feature node which is closer to the root is 6 times larger than when that same iii feature node is away from the root node. This observation will depend on how well the decision tree was trained and may not be true for every case.
no_new_dataset
0.955361
1505.02212
Yakir Reshef
Yakir A. Reshef, David N. Reshef, Pardis C. Sabeti, Michael M. Mitzenmacher
Equitability, interval estimation, and statistical power
Yakir A. Reshef and David N. Reshef are co-first authors, Pardis C. Sabeti and Michael M. Mitzenmacher are co-last authors. This paper, together with arXiv:1505.02212, subsumes arXiv:1408.4908
null
null
null
math.ST cs.LG q-bio.QM stat.ME stat.ML stat.TH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
For analysis of a high-dimensional dataset, a common approach is to test a null hypothesis of statistical independence on all variable pairs using a non-parametric measure of dependence. However, because this approach attempts to identify any non-trivial relationship no matter how weak, it often identifies too many relationships to be useful. What is needed is a way of identifying a smaller set of relationships that merit detailed further analysis. Here we formally present and characterize equitability, a property of measures of dependence that aims to overcome this challenge. Notionally, an equitable statistic is a statistic that, given some measure of noise, assigns similar scores to equally noisy relationships of different types [Reshef et al. 2011]. We begin by formalizing this idea via a new object called the interpretable interval, which functions as an interval estimate of the amount of noise in a relationship of unknown type. We define an equitable statistic as one with small interpretable intervals. We then draw on the equivalence of interval estimation and hypothesis testing to show that under moderate assumptions an equitable statistic is one that yields well powered tests for distinguishing not only between trivial and non-trivial relationships of all kinds but also between non-trivial relationships of different strengths. This means that equitability allows us to specify a threshold relationship strength $x_0$ and to search for relationships of all kinds with strength greater than $x_0$. Thus, equitability can be thought of as a strengthening of power against independence that enables fruitful analysis of data sets with a small number of strong, interesting relationships and a large number of weaker ones. We conclude with a demonstration of how our two equivalent characterizations of equitability can be used to evaluate the equitability of a statistic in practice.
[ { "version": "v1", "created": "Sat, 9 May 2015 00:31:23 GMT" }, { "version": "v2", "created": "Tue, 12 May 2015 20:05:17 GMT" } ]
2015-05-14T00:00:00
[ [ "Reshef", "Yakir A.", "" ], [ "Reshef", "David N.", "" ], [ "Sabeti", "Pardis C.", "" ], [ "Mitzenmacher", "Michael M.", "" ] ]
TITLE: Equitability, interval estimation, and statistical power ABSTRACT: For analysis of a high-dimensional dataset, a common approach is to test a null hypothesis of statistical independence on all variable pairs using a non-parametric measure of dependence. However, because this approach attempts to identify any non-trivial relationship no matter how weak, it often identifies too many relationships to be useful. What is needed is a way of identifying a smaller set of relationships that merit detailed further analysis. Here we formally present and characterize equitability, a property of measures of dependence that aims to overcome this challenge. Notionally, an equitable statistic is a statistic that, given some measure of noise, assigns similar scores to equally noisy relationships of different types [Reshef et al. 2011]. We begin by formalizing this idea via a new object called the interpretable interval, which functions as an interval estimate of the amount of noise in a relationship of unknown type. We define an equitable statistic as one with small interpretable intervals. We then draw on the equivalence of interval estimation and hypothesis testing to show that under moderate assumptions an equitable statistic is one that yields well powered tests for distinguishing not only between trivial and non-trivial relationships of all kinds but also between non-trivial relationships of different strengths. This means that equitability allows us to specify a threshold relationship strength $x_0$ and to search for relationships of all kinds with strength greater than $x_0$. Thus, equitability can be thought of as a strengthening of power against independence that enables fruitful analysis of data sets with a small number of strong, interesting relationships and a large number of weaker ones. We conclude with a demonstration of how our two equivalent characterizations of equitability can be used to evaluate the equitability of a statistic in practice.
no_new_dataset
0.938407
1505.02867
Charles Mathy
Charles Mathy, Nate Derbinsky, Jos\'e Bento, Jonathan Rosenthal and Jonathan Yedidia
The Boundary Forest Algorithm for Online Supervised and Unsupervised Learning
7 pages, 4 figs, 1 page supp. info
Proc. of the 29th AAAI Conference on Artificial Intelligence (AAAI), 2864-2870. Austin, TX, USA. (2015)
null
null
cs.LG cs.DS cs.IR stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We describe a new instance-based learning algorithm called the Boundary Forest (BF) algorithm, that can be used for supervised and unsupervised learning. The algorithm builds a forest of trees whose nodes store previously seen examples. It can be shown data points one at a time and updates itself incrementally, hence it is naturally online. Few instance-based algorithms have this property while being simultaneously fast, which the BF is. This is crucial for applications where one needs to respond to input data in real time. The number of children of each node is not set beforehand but obtained from the training procedure, which makes the algorithm very flexible with regards to what data manifolds it can learn. We test its generalization performance and speed on a range of benchmark datasets and detail in which settings it outperforms the state of the art. Empirically we find that training time scales as O(DNlog(N)) and testing as O(Dlog(N)), where D is the dimensionality and N the amount of data,
[ { "version": "v1", "created": "Tue, 12 May 2015 03:45:11 GMT" } ]
2015-05-14T00:00:00
[ [ "Mathy", "Charles", "" ], [ "Derbinsky", "Nate", "" ], [ "Bento", "José", "" ], [ "Rosenthal", "Jonathan", "" ], [ "Yedidia", "Jonathan", "" ] ]
TITLE: The Boundary Forest Algorithm for Online Supervised and Unsupervised Learning ABSTRACT: We describe a new instance-based learning algorithm called the Boundary Forest (BF) algorithm, that can be used for supervised and unsupervised learning. The algorithm builds a forest of trees whose nodes store previously seen examples. It can be shown data points one at a time and updates itself incrementally, hence it is naturally online. Few instance-based algorithms have this property while being simultaneously fast, which the BF is. This is crucial for applications where one needs to respond to input data in real time. The number of children of each node is not set beforehand but obtained from the training procedure, which makes the algorithm very flexible with regards to what data manifolds it can learn. We test its generalization performance and speed on a range of benchmark datasets and detail in which settings it outperforms the state of the art. Empirically we find that training time scales as O(DNlog(N)) and testing as O(Dlog(N)), where D is the dimensionality and N the amount of data,
no_new_dataset
0.946151
1505.02973
Konstantinos Tserpes
Evangelos Psomakelis, Konstantinos Tserpes, Dimosthenis Anagnostopoulos, Theodora Varvarigou
Comparing methods for Twitter Sentiment Analysis
5 pages, 1 figure, 6th Conference on Knowledge Discovery and Information Retrieval 2014, Rome, Italy
null
null
null
cs.CL cs.IR cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This work extends the set of works which deal with the popular problem of sentiment analysis in Twitter. It investigates the most popular document ("tweet") representation methods which feed sentiment evaluation mechanisms. In particular, we study the bag-of-words, n-grams and n-gram graphs approaches and for each of them we evaluate the performance of a lexicon-based and 7 learning-based classification algorithms (namely SVM, Na\"ive Bayesian Networks, Logistic Regression, Multilayer Perceptrons, Best-First Trees, Functional Trees and C4.5) as well as their combinations, using a set of 4451 manually annotated tweets. The results demonstrate the superiority of learning-based methods and in particular of n-gram graphs approaches for predicting the sentiment of tweets. They also show that the combinatory approach has impressive effects on n-grams, raising the confidence up to 83.15% on the 5-Grams, using majority vote and a balanced dataset (equal number of positive, negative and neutral tweets for training). In the n-gram graph cases the improvement was small to none, reaching 94.52% on the 4-gram graphs, using Orthodromic distance and a threshold of 0.001.
[ { "version": "v1", "created": "Tue, 12 May 2015 12:05:19 GMT" } ]
2015-05-14T00:00:00
[ [ "Psomakelis", "Evangelos", "" ], [ "Tserpes", "Konstantinos", "" ], [ "Anagnostopoulos", "Dimosthenis", "" ], [ "Varvarigou", "Theodora", "" ] ]
TITLE: Comparing methods for Twitter Sentiment Analysis ABSTRACT: This work extends the set of works which deal with the popular problem of sentiment analysis in Twitter. It investigates the most popular document ("tweet") representation methods which feed sentiment evaluation mechanisms. In particular, we study the bag-of-words, n-grams and n-gram graphs approaches and for each of them we evaluate the performance of a lexicon-based and 7 learning-based classification algorithms (namely SVM, Na\"ive Bayesian Networks, Logistic Regression, Multilayer Perceptrons, Best-First Trees, Functional Trees and C4.5) as well as their combinations, using a set of 4451 manually annotated tweets. The results demonstrate the superiority of learning-based methods and in particular of n-gram graphs approaches for predicting the sentiment of tweets. They also show that the combinatory approach has impressive effects on n-grams, raising the confidence up to 83.15% on the 5-Grams, using majority vote and a balanced dataset (equal number of positive, negative and neutral tweets for training). In the n-gram graph cases the improvement was small to none, reaching 94.52% on the 4-gram graphs, using Orthodromic distance and a threshold of 0.001.
no_new_dataset
0.946001
1505.03229
Ikuro Sato
Ikuro Sato, Hiroki Nishimura, Kensuke Yokoi
APAC: Augmented PAttern Classification with Neural Networks
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Deep neural networks have been exhibiting splendid accuracies in many of visual pattern classification problems. Many of the state-of-the-art methods employ a technique known as data augmentation at the training stage. This paper addresses an issue of decision rule for classifiers trained with augmented data. Our method is named as APAC: the Augmented PAttern Classification, which is a way of classification using the optimal decision rule for augmented data learning. Discussion of methods of data augmentation is not our primary focus. We show clear evidences that APAC gives far better generalization performance than the traditional way of class prediction in several experiments. Our convolutional neural network model with APAC achieved a state-of-the-art accuracy on the MNIST dataset among non-ensemble classifiers. Even our multilayer perceptron model beats some of the convolutional models with recently invented stochastic regularization techniques on the CIFAR-10 dataset.
[ { "version": "v1", "created": "Wed, 13 May 2015 03:33:29 GMT" } ]
2015-05-14T00:00:00
[ [ "Sato", "Ikuro", "" ], [ "Nishimura", "Hiroki", "" ], [ "Yokoi", "Kensuke", "" ] ]
TITLE: APAC: Augmented PAttern Classification with Neural Networks ABSTRACT: Deep neural networks have been exhibiting splendid accuracies in many of visual pattern classification problems. Many of the state-of-the-art methods employ a technique known as data augmentation at the training stage. This paper addresses an issue of decision rule for classifiers trained with augmented data. Our method is named as APAC: the Augmented PAttern Classification, which is a way of classification using the optimal decision rule for augmented data learning. Discussion of methods of data augmentation is not our primary focus. We show clear evidences that APAC gives far better generalization performance than the traditional way of class prediction in several experiments. Our convolutional neural network model with APAC achieved a state-of-the-art accuracy on the MNIST dataset among non-ensemble classifiers. Even our multilayer perceptron model beats some of the convolutional models with recently invented stochastic regularization techniques on the CIFAR-10 dataset.
no_new_dataset
0.947672
1505.03236
Jensi
R. Jensi and G. Wiselin Jiji
Hybrid data clustering approach using K-Means and Flower Pollination Algorithm
11 pages, Journal. Advanced Computational Intelligence: An International Journal (ACII), Vol.2, No.2, April 2015
null
null
null
cs.LG cs.IR cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Data clustering is a technique for clustering set of objects into known number of groups. Several approaches are widely applied to data clustering so that objects within the clusters are similar and objects in different clusters are far away from each other. K-Means, is one of the familiar center based clustering algorithms since implementation is very easy and fast convergence. However, K-Means algorithm suffers from initialization, hence trapped in local optima. Flower Pollination Algorithm (FPA) is the global optimization technique, which avoids trapping in local optimum solution. In this paper, a novel hybrid data clustering approach using Flower Pollination Algorithm and K-Means (FPAKM) is proposed. The proposed algorithm results are compared with K-Means and FPA on eight datasets. From the experimental results, FPAKM is better than FPA and K-Means.
[ { "version": "v1", "created": "Wed, 13 May 2015 04:24:50 GMT" } ]
2015-05-14T00:00:00
[ [ "Jensi", "R.", "" ], [ "Jiji", "G. Wiselin", "" ] ]
TITLE: Hybrid data clustering approach using K-Means and Flower Pollination Algorithm ABSTRACT: Data clustering is a technique for clustering set of objects into known number of groups. Several approaches are widely applied to data clustering so that objects within the clusters are similar and objects in different clusters are far away from each other. K-Means, is one of the familiar center based clustering algorithms since implementation is very easy and fast convergence. However, K-Means algorithm suffers from initialization, hence trapped in local optima. Flower Pollination Algorithm (FPA) is the global optimization technique, which avoids trapping in local optimum solution. In this paper, a novel hybrid data clustering approach using Flower Pollination Algorithm and K-Means (FPAKM) is proposed. The proposed algorithm results are compared with K-Means and FPA on eight datasets. From the experimental results, FPAKM is better than FPA and K-Means.
no_new_dataset
0.951006
1505.03329
Jelena Milosevic
Jelena Milosevic, Alberto Ferrante, Miroslaw Malek
A general practitioner or a specialist for your infected smartphone?
2 pages poster, IEEE Symposium on Security and Privacy, San Jose, USA, May 2015
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
With explosive growth in the number of mobile devices, the mobile malware is rapidly spreading as well, and the number of encountered malware families is increasing. Existing solutions, which are mainly based on one malware detector running on the phone or in the cloud, are no longer effective. Main problem lies in the fact that it might be impossible to create a unique mobile malware detector that would be able to detect different malware families with high accuracy, being at the same time lightweight enough not to drain battery quickly and fast enough to give results of detection promptly. The proposed approach to mobile malware detection is analogous to general practitioner versus specialist approach to dealing with a medical problem. Similarly to a general practitioner that, based on indicative symptoms identifies potential illnesses and sends the patient to an appropriate specialist, our detection system distinguishes among symptoms representing different malware families and, once the symptoms are detected, it triggers specific analyses. A system monitoring application operates in the same way as a general practitioner. It is able to distinguish between different symptoms and trigger appropriate detection mechanisms. As an analogy to different specialists, an ensemble of detectors, each of which specifically trained for a particular malware family, is used. The main challenge of the approach is to define representative symptoms of different malware families and train detectors accordingly to them. The main goal of the poster is to foster discussion on the most representative symptoms of different malware families and to discuss initial results in this area obtained by using Malware Genome project dataset.
[ { "version": "v1", "created": "Wed, 13 May 2015 11:09:52 GMT" } ]
2015-05-14T00:00:00
[ [ "Milosevic", "Jelena", "" ], [ "Ferrante", "Alberto", "" ], [ "Malek", "Miroslaw", "" ] ]
TITLE: A general practitioner or a specialist for your infected smartphone? ABSTRACT: With explosive growth in the number of mobile devices, the mobile malware is rapidly spreading as well, and the number of encountered malware families is increasing. Existing solutions, which are mainly based on one malware detector running on the phone or in the cloud, are no longer effective. Main problem lies in the fact that it might be impossible to create a unique mobile malware detector that would be able to detect different malware families with high accuracy, being at the same time lightweight enough not to drain battery quickly and fast enough to give results of detection promptly. The proposed approach to mobile malware detection is analogous to general practitioner versus specialist approach to dealing with a medical problem. Similarly to a general practitioner that, based on indicative symptoms identifies potential illnesses and sends the patient to an appropriate specialist, our detection system distinguishes among symptoms representing different malware families and, once the symptoms are detected, it triggers specific analyses. A system monitoring application operates in the same way as a general practitioner. It is able to distinguish between different symptoms and trigger appropriate detection mechanisms. As an analogy to different specialists, an ensemble of detectors, each of which specifically trained for a particular malware family, is used. The main challenge of the approach is to define representative symptoms of different malware families and train detectors accordingly to them. The main goal of the poster is to foster discussion on the most representative symptoms of different malware families and to discuss initial results in this area obtained by using Malware Genome project dataset.
no_new_dataset
0.922412
0812.0743
Qiang Li
Qiang Li, Yan He, Jing-ping Jiang
A Novel Clustering Algorithm Based on Quantum Games
19 pages, 5 figures, 5 tables
2009 J. Phys. A: Math. Theor. 42 445303
10.1088/1751-8113/42/44/445303
null
cs.LG cs.AI cs.CV cs.GT cs.MA cs.NE quant-ph
http://creativecommons.org/licenses/by-nc-sa/3.0/
Enormous successes have been made by quantum algorithms during the last decade. In this paper, we combine the quantum game with the problem of data clustering, and then develop a quantum-game-based clustering algorithm, in which data points in a dataset are considered as players who can make decisions and implement quantum strategies in quantum games. After each round of a quantum game, each player's expected payoff is calculated. Later, he uses a link-removing-and-rewiring (LRR) function to change his neighbors and adjust the strength of links connecting to them in order to maximize his payoff. Further, algorithms are discussed and analyzed in two cases of strategies, two payoff matrixes and two LRR functions. Consequently, the simulation results have demonstrated that data points in datasets are clustered reasonably and efficiently, and the clustering algorithms have fast rates of convergence. Moreover, the comparison with other algorithms also provides an indication of the effectiveness of the proposed approach.
[ { "version": "v1", "created": "Wed, 3 Dec 2008 15:46:03 GMT" }, { "version": "v2", "created": "Sat, 10 Oct 2009 09:10:36 GMT" } ]
2015-05-13T00:00:00
[ [ "Li", "Qiang", "" ], [ "He", "Yan", "" ], [ "Jiang", "Jing-ping", "" ] ]
TITLE: A Novel Clustering Algorithm Based on Quantum Games ABSTRACT: Enormous successes have been made by quantum algorithms during the last decade. In this paper, we combine the quantum game with the problem of data clustering, and then develop a quantum-game-based clustering algorithm, in which data points in a dataset are considered as players who can make decisions and implement quantum strategies in quantum games. After each round of a quantum game, each player's expected payoff is calculated. Later, he uses a link-removing-and-rewiring (LRR) function to change his neighbors and adjust the strength of links connecting to them in order to maximize his payoff. Further, algorithms are discussed and analyzed in two cases of strategies, two payoff matrixes and two LRR functions. Consequently, the simulation results have demonstrated that data points in datasets are clustered reasonably and efficiently, and the clustering algorithms have fast rates of convergence. Moreover, the comparison with other algorithms also provides an indication of the effectiveness of the proposed approach.
no_new_dataset
0.950595
0906.2914
Michal Zerola
Michal Zerola, J\'er\^ome Lauret, Roman Bart\'ak and Michal \v{S}umbera
Efficient Multi-site Data Movement Using Constraint Programming for Data Hungry Science
To appear in proceedings of Computing in High Energy and Nuclear Physics 2009
null
10.1088/1742-6596/219/6/062069
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
For the past decade, HENP experiments have been heading towards a distributed computing model in an effort to concurrently process tasks over enormous data sets that have been increasing in size as a function of time. In order to optimize all available resources (geographically spread) and minimize the processing time, it is necessary to face also the question of efficient data transfers and placements. A key question is whether the time penalty for moving the data to the computational resources is worth the presumed gain. Onward to the truly distributed task scheduling we present the technique using a Constraint Programming (CP) approach. The CP technique schedules data transfers from multiple resources considering all available paths of diverse characteristic (capacity, sharing and storage) having minimum user's waiting time as an objective. We introduce a model for planning data transfers to a single destination (data transfer) as well as its extension for an optimal data set spreading strategy (data placement). Several enhancements for a solver of the CP model will be shown, leading to a faster schedule computation time using symmetry breaking, branch cutting, well studied principles from job-shop scheduling field and several heuristics. Finally, we will present the design and implementation of a corner-stone application aimed at moving datasets according to the schedule. Results will include comparison of performance and trade-off between CP techniques and a Peer-2-Peer model from simulation framework as well as the real case scenario taken from a practical usage of a CP scheduler.
[ { "version": "v1", "created": "Tue, 16 Jun 2009 12:33:25 GMT" }, { "version": "v2", "created": "Thu, 18 Jun 2009 19:20:05 GMT" } ]
2015-05-13T00:00:00
[ [ "Zerola", "Michal", "" ], [ "Lauret", "Jérôme", "" ], [ "Barták", "Roman", "" ], [ "Šumbera", "Michal", "" ] ]
TITLE: Efficient Multi-site Data Movement Using Constraint Programming for Data Hungry Science ABSTRACT: For the past decade, HENP experiments have been heading towards a distributed computing model in an effort to concurrently process tasks over enormous data sets that have been increasing in size as a function of time. In order to optimize all available resources (geographically spread) and minimize the processing time, it is necessary to face also the question of efficient data transfers and placements. A key question is whether the time penalty for moving the data to the computational resources is worth the presumed gain. Onward to the truly distributed task scheduling we present the technique using a Constraint Programming (CP) approach. The CP technique schedules data transfers from multiple resources considering all available paths of diverse characteristic (capacity, sharing and storage) having minimum user's waiting time as an objective. We introduce a model for planning data transfers to a single destination (data transfer) as well as its extension for an optimal data set spreading strategy (data placement). Several enhancements for a solver of the CP model will be shown, leading to a faster schedule computation time using symmetry breaking, branch cutting, well studied principles from job-shop scheduling field and several heuristics. Finally, we will present the design and implementation of a corner-stone application aimed at moving datasets according to the schedule. Results will include comparison of performance and trade-off between CP techniques and a Peer-2-Peer model from simulation framework as well as the real case scenario taken from a practical usage of a CP scheduler.
no_new_dataset
0.946695
0907.1228
Jianguo Liu
Jian-Guo Liu, Tao Zhou, Zhao-Guo Xuan, Hong-An Che, Bing-Hong Wang, Yi-Cheng Zhang
Degree correlation effect of bipartite network on personalized recommendation
9 pages, 3 figures
IJMPC 21(01) 2010 137-147
10.1142/S0129183110014999
null
physics.data-an cs.IR physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, by introducing a new user similarity index base on the diffusion process, we propose a modified collaborative filtering (MCF) algorithm, which has remarkably higher accuracy than the standard collaborative filtering. In the proposed algorithm, the degree correlation between users and objects is taken into account and embedded into the similarity index by a tunable parameter. The numerical simulation on a benchmark data set shows that the algorithmic accuracy of the MCF, measured by the average ranking score, is further improved by 18.19% in the optimal case. In addition, two significant criteria of algorithmic performance, diversity and popularity, are also taken into account. Numerical results show that the presented algorithm can provide more diverse and less popular recommendations, for example, when the recommendation list contains 10 objects, the diversity, measured by the hamming distance, is improved by 21.90%.
[ { "version": "v1", "created": "Tue, 7 Jul 2009 14:20:47 GMT" } ]
2015-05-13T00:00:00
[ [ "Liu", "Jian-Guo", "" ], [ "Zhou", "Tao", "" ], [ "Xuan", "Zhao-Guo", "" ], [ "Che", "Hong-An", "" ], [ "Wang", "Bing-Hong", "" ], [ "Zhang", "Yi-Cheng", "" ] ]
TITLE: Degree correlation effect of bipartite network on personalized recommendation ABSTRACT: In this paper, by introducing a new user similarity index base on the diffusion process, we propose a modified collaborative filtering (MCF) algorithm, which has remarkably higher accuracy than the standard collaborative filtering. In the proposed algorithm, the degree correlation between users and objects is taken into account and embedded into the similarity index by a tunable parameter. The numerical simulation on a benchmark data set shows that the algorithmic accuracy of the MCF, measured by the average ranking score, is further improved by 18.19% in the optimal case. In addition, two significant criteria of algorithmic performance, diversity and popularity, are also taken into account. Numerical results show that the presented algorithm can provide more diverse and less popular recommendations, for example, when the recommendation list contains 10 objects, the diversity, measured by the hamming distance, is improved by 21.90%.
no_new_dataset
0.950686
1412.6071
Benjamin Graham
Benjamin Graham
Fractional Max-Pooling
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Convolutional networks almost always incorporate some form of spatial pooling, and very often it is alpha times alpha max-pooling with alpha=2. Max-pooling act on the hidden layers of the network, reducing their size by an integer multiplicative factor alpha. The amazing by-product of discarding 75% of your data is that you build into the network a degree of invariance with respect to translations and elastic distortions. However, if you simply alternate convolutional layers with max-pooling layers, performance is limited due to the rapid reduction in spatial size, and the disjoint nature of the pooling regions. We have formulated a fractional version of max-pooling where alpha is allowed to take non-integer values. Our version of max-pooling is stochastic as there are lots of different ways of constructing suitable pooling regions. We find that our form of fractional max-pooling reduces overfitting on a variety of datasets: for instance, we improve on the state-of-the art for CIFAR-100 without even using dropout.
[ { "version": "v1", "created": "Thu, 18 Dec 2014 20:45:11 GMT" }, { "version": "v2", "created": "Mon, 22 Dec 2014 11:06:35 GMT" }, { "version": "v3", "created": "Mon, 2 Mar 2015 20:06:22 GMT" }, { "version": "v4", "created": "Tue, 12 May 2015 06:36:11 GMT" } ]
2015-05-13T00:00:00
[ [ "Graham", "Benjamin", "" ] ]
TITLE: Fractional Max-Pooling ABSTRACT: Convolutional networks almost always incorporate some form of spatial pooling, and very often it is alpha times alpha max-pooling with alpha=2. Max-pooling act on the hidden layers of the network, reducing their size by an integer multiplicative factor alpha. The amazing by-product of discarding 75% of your data is that you build into the network a degree of invariance with respect to translations and elastic distortions. However, if you simply alternate convolutional layers with max-pooling layers, performance is limited due to the rapid reduction in spatial size, and the disjoint nature of the pooling regions. We have formulated a fractional version of max-pooling where alpha is allowed to take non-integer values. Our version of max-pooling is stochastic as there are lots of different ways of constructing suitable pooling regions. We find that our form of fractional max-pooling reduces overfitting on a variety of datasets: for instance, we improve on the state-of-the art for CIFAR-100 without even using dropout.
no_new_dataset
0.947088
1412.6857
Tyng-Luh Liu
Jyh-Jing Hwang and Tyng-Luh Liu
Contour Detection Using Cost-Sensitive Convolutional Neural Networks
9 pages, 3 figures
null
null
null
cs.CV cs.LG cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We address the problem of contour detection via per-pixel classifications of edge point. To facilitate the process, the proposed approach leverages with DenseNet, an efficient implementation of multiscale convolutional neural networks (CNNs), to extract an informative feature vector for each pixel and uses an SVM classifier to accomplish contour detection. The main challenge lies in adapting a pre-trained per-image CNN model for yielding per-pixel image features. We propose to base on the DenseNet architecture to achieve pixelwise fine-tuning and then consider a cost-sensitive strategy to further improve the learning with a small dataset of edge and non-edge image patches. In the experiment of contour detection, we look into the effectiveness of combining per-pixel features from different CNN layers and obtain comparable performances to the state-of-the-art on BSDS500.
[ { "version": "v1", "created": "Mon, 22 Dec 2014 01:16:50 GMT" }, { "version": "v2", "created": "Wed, 24 Dec 2014 14:37:27 GMT" }, { "version": "v3", "created": "Thu, 15 Jan 2015 15:01:16 GMT" }, { "version": "v4", "created": "Sat, 28 Feb 2015 07:37:54 GMT" }, { "version": "v5", "created": "Tue, 12 May 2015 08:42:42 GMT" } ]
2015-05-13T00:00:00
[ [ "Hwang", "Jyh-Jing", "" ], [ "Liu", "Tyng-Luh", "" ] ]
TITLE: Contour Detection Using Cost-Sensitive Convolutional Neural Networks ABSTRACT: We address the problem of contour detection via per-pixel classifications of edge point. To facilitate the process, the proposed approach leverages with DenseNet, an efficient implementation of multiscale convolutional neural networks (CNNs), to extract an informative feature vector for each pixel and uses an SVM classifier to accomplish contour detection. The main challenge lies in adapting a pre-trained per-image CNN model for yielding per-pixel image features. We propose to base on the DenseNet architecture to achieve pixelwise fine-tuning and then consider a cost-sensitive strategy to further improve the learning with a small dataset of edge and non-edge image patches. In the experiment of contour detection, we look into the effectiveness of combining per-pixel features from different CNN layers and obtain comparable performances to the state-of-the-art on BSDS500.
no_new_dataset
0.946349
1504.06603
Dmytro Mishkin
Dmytro Mishkin and Jiri Matas and Michal Perdoch and Karel Lenc
WxBS: Wide Baseline Stereo Generalizations
Descriptor and detector evaluation expanded
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We have presented a new problem -- the wide multiple baseline stereo (WxBS) -- which considers matching of images that simultaneously differ in more than one image acquisition factor such as viewpoint, illumination, sensor type or where object appearance changes significantly, e.g. over time. A new dataset with the ground truth for evaluation of matching algorithms has been introduced and will be made public. We have extensively tested a large set of popular and recent detectors and descriptors and show than the combination of RootSIFT and HalfRootSIFT as descriptors with MSER and Hessian-Affine detectors works best for many different nuisance factors. We show that simple adaptive thresholding improves Hessian-Affine, DoG, MSER (and possibly other) detectors and allows to use them on infrared and low contrast images. A novel matching algorithm for addressing the WxBS problem has been introduced. We have shown experimentally that the WxBS-M matcher dominantes the state-of-the-art methods both on both the new and existing datasets.
[ { "version": "v1", "created": "Fri, 24 Apr 2015 19:19:04 GMT" }, { "version": "v2", "created": "Tue, 12 May 2015 14:42:53 GMT" } ]
2015-05-13T00:00:00
[ [ "Mishkin", "Dmytro", "" ], [ "Matas", "Jiri", "" ], [ "Perdoch", "Michal", "" ], [ "Lenc", "Karel", "" ] ]
TITLE: WxBS: Wide Baseline Stereo Generalizations ABSTRACT: We have presented a new problem -- the wide multiple baseline stereo (WxBS) -- which considers matching of images that simultaneously differ in more than one image acquisition factor such as viewpoint, illumination, sensor type or where object appearance changes significantly, e.g. over time. A new dataset with the ground truth for evaluation of matching algorithms has been introduced and will be made public. We have extensively tested a large set of popular and recent detectors and descriptors and show than the combination of RootSIFT and HalfRootSIFT as descriptors with MSER and Hessian-Affine detectors works best for many different nuisance factors. We show that simple adaptive thresholding improves Hessian-Affine, DoG, MSER (and possibly other) detectors and allows to use them on infrared and low contrast images. A novel matching algorithm for addressing the WxBS problem has been introduced. We have shown experimentally that the WxBS-M matcher dominantes the state-of-the-art methods both on both the new and existing datasets.
new_dataset
0.958226
1504.07751
Zhiguo Ding
Peng Xu, Zhiguo Ding, Xuchu Dai and H. Vincent Poor
NOMA: An Information Theoretic Perspective
One typo in Eq. (3) in v1 has been corrected
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this letter, the performance of non-orthogonal multiple access (NOMA) is investigated from an information theoretic perspective. The relationships among the capacity region of broadcast channels and two rate regions achieved by NOMA and time-division multiple access (TDMA) are illustrated first. Then, the performance of NOMA is evaluated by considering TDMA as the benchmark, where both the sum rate and the individual user rates are used as the criteria. In a wireless downlink scenario with user pairing, the developed analytical results show that NOMA can outperform TDMA not only for the sum rate but also for each user's individual rate, particularly when the difference between the users' channels is large.
[ { "version": "v1", "created": "Wed, 29 Apr 2015 08:01:19 GMT" }, { "version": "v2", "created": "Tue, 12 May 2015 10:16:59 GMT" } ]
2015-05-13T00:00:00
[ [ "Xu", "Peng", "" ], [ "Ding", "Zhiguo", "" ], [ "Dai", "Xuchu", "" ], [ "Poor", "H. Vincent", "" ] ]
TITLE: NOMA: An Information Theoretic Perspective ABSTRACT: In this letter, the performance of non-orthogonal multiple access (NOMA) is investigated from an information theoretic perspective. The relationships among the capacity region of broadcast channels and two rate regions achieved by NOMA and time-division multiple access (TDMA) are illustrated first. Then, the performance of NOMA is evaluated by considering TDMA as the benchmark, where both the sum rate and the individual user rates are used as the criteria. In a wireless downlink scenario with user pairing, the developed analytical results show that NOMA can outperform TDMA not only for the sum rate but also for each user's individual rate, particularly when the difference between the users' channels is large.
no_new_dataset
0.946001
1505.02982
Baoguang Shi
Baoguang Shi, Cong Yao, Chengquan Zhang, Xiaowei Guo, Feiyue Huang, Xiang Bai
Automatic Script Identification in the Wild
5 pages, 7 figures, submitted to ICDAR 2015
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
With the rapid increase of transnational communication and cooperation, people frequently encounter multilingual scenarios in various situations. In this paper, we are concerned with a relatively new problem: script identification at word or line levels in natural scenes. A large-scale dataset with a great quantity of natural images and 10 types of widely used languages is constructed and released. In allusion to the challenges in script identification in real-world scenarios, a deep learning based algorithm is proposed. The experiments on the proposed dataset demonstrate that our algorithm achieves superior performance, compared with conventional image classification methods, such as the original CNN architecture and LLC.
[ { "version": "v1", "created": "Tue, 12 May 2015 12:38:30 GMT" } ]
2015-05-13T00:00:00
[ [ "Shi", "Baoguang", "" ], [ "Yao", "Cong", "" ], [ "Zhang", "Chengquan", "" ], [ "Guo", "Xiaowei", "" ], [ "Huang", "Feiyue", "" ], [ "Bai", "Xiang", "" ] ]
TITLE: Automatic Script Identification in the Wild ABSTRACT: With the rapid increase of transnational communication and cooperation, people frequently encounter multilingual scenarios in various situations. In this paper, we are concerned with a relatively new problem: script identification at word or line levels in natural scenes. A large-scale dataset with a great quantity of natural images and 10 types of widely used languages is constructed and released. In allusion to the challenges in script identification in real-world scenarios, a deep learning based algorithm is proposed. The experiments on the proposed dataset demonstrate that our algorithm achieves superior performance, compared with conventional image classification methods, such as the original CNN architecture and LLC.
new_dataset
0.955899
1505.03008
Lovro \v{S}ubelj
Dalibor Fiala, Lovro \v{S}ubelj, Slavko \v{Z}itnik, Marko Bajec
Do PageRank-based author rankings outperform simple citation counts?
28 pages, 5 figures, 6 tables
J. Infometr. 9(2), 334-348 (2015)
10.1016/j.joi.2015.02.008
null
cs.DL cs.SI physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The basic indicators of a researcher's productivity and impact are still the number of publications and their citation counts. These metrics are clear, straightforward, and easy to obtain. When a ranking of scholars is needed, for instance in grant, award, or promotion procedures, their use is the fastest and cheapest way of prioritizing some scientists over others. However, due to their nature, there is a danger of oversimplifying scientific achievements. Therefore, many other indicators have been proposed including the usage of the PageRank algorithm known for the ranking of webpages and its modifications suited to citation networks. Nevertheless, this recursive method is computationally expensive and even if it has the advantage of favouring prestige over popularity, its application should be well justified, particularly when compared to the standard citation counts. In this study, we analyze three large datasets of computer science papers in the categories of artificial intelligence, software engineering, and theory and methods and apply 12 different ranking methods to the citation networks of authors. We compare the resulting rankings with self-compiled lists of outstanding researchers selected as frequent editorial board members of prestigious journals in the field and conclude that there is no evidence of PageRank-based methods outperforming simple citation counts.
[ { "version": "v1", "created": "Tue, 12 May 2015 13:59:30 GMT" } ]
2015-05-13T00:00:00
[ [ "Fiala", "Dalibor", "" ], [ "Šubelj", "Lovro", "" ], [ "Žitnik", "Slavko", "" ], [ "Bajec", "Marko", "" ] ]
TITLE: Do PageRank-based author rankings outperform simple citation counts? ABSTRACT: The basic indicators of a researcher's productivity and impact are still the number of publications and their citation counts. These metrics are clear, straightforward, and easy to obtain. When a ranking of scholars is needed, for instance in grant, award, or promotion procedures, their use is the fastest and cheapest way of prioritizing some scientists over others. However, due to their nature, there is a danger of oversimplifying scientific achievements. Therefore, many other indicators have been proposed including the usage of the PageRank algorithm known for the ranking of webpages and its modifications suited to citation networks. Nevertheless, this recursive method is computationally expensive and even if it has the advantage of favouring prestige over popularity, its application should be well justified, particularly when compared to the standard citation counts. In this study, we analyze three large datasets of computer science papers in the categories of artificial intelligence, software engineering, and theory and methods and apply 12 different ranking methods to the citation networks of authors. We compare the resulting rankings with self-compiled lists of outstanding researchers selected as frequent editorial board members of prestigious journals in the field and conclude that there is no evidence of PageRank-based methods outperforming simple citation counts.
no_new_dataset
0.941277
1412.2227
Ravi Venkatesan
R. C. Venkatesan and A. Plastino
Hellmann-Feynman connection for the relative Fisher information
29 pages, 2 figures. Article to Appear in Annals of Physics. R. C. Venkatesan, A. Plastino, Hellmann-Feynman connection for the relative Fisher information, Annals of Physics (2015), http://dx.doi.org/10.1016/j.aop.2015.04.021
null
null
null
cond-mat.stat-mech cs.IT math-ph math.IT math.MP physics.data-an
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The $(i)$ reciprocity relations for the relative Fisher information (RFI, hereafter) and $(ii)$ a generalized RFI-Euler theorem, are self-consistently derived from the Hellmann-Feynman theorem. These new reciprocity relations generalize the RFI-Euler theorem and constitute the basis for building up a mathematical Legendre transform structure (LTS, hereafter), akin to that of thermodynamics, that underlies the RFI scenario. This demonstrates the possibility of translating the entire mathematical structure of thermodynamics into a RFI-based theoretical framework. Virial theorems play a prominent role in this endeavor, as a Schr\"odinger-like equation can be associated to the RFI. Lagrange multipliers are determined invoking the RFI-LTS link and the quantum mechanical virial theorem. An appropriate ansatz allows for the inference of probability density functions (pdf's, hereafter) and energy-eigenvalues of the above mentioned Schr\"odinger-like equation. The energy-eigenvalues obtained here via inference are benchmarked against established theoretical and numerical results. A principled theoretical basis to reconstruct the RFI-framework from the FIM framework is established. Numerical examples for exemplary cases are provided.
[ { "version": "v1", "created": "Sat, 6 Dec 2014 11:54:57 GMT" }, { "version": "v2", "created": "Tue, 9 Dec 2014 05:41:59 GMT" }, { "version": "v3", "created": "Thu, 19 Mar 2015 14:53:02 GMT" }, { "version": "v4", "created": "Sun, 10 May 2015 14:35:24 GMT" } ]
2015-05-12T00:00:00
[ [ "Venkatesan", "R. C.", "" ], [ "Plastino", "A.", "" ] ]
TITLE: Hellmann-Feynman connection for the relative Fisher information ABSTRACT: The $(i)$ reciprocity relations for the relative Fisher information (RFI, hereafter) and $(ii)$ a generalized RFI-Euler theorem, are self-consistently derived from the Hellmann-Feynman theorem. These new reciprocity relations generalize the RFI-Euler theorem and constitute the basis for building up a mathematical Legendre transform structure (LTS, hereafter), akin to that of thermodynamics, that underlies the RFI scenario. This demonstrates the possibility of translating the entire mathematical structure of thermodynamics into a RFI-based theoretical framework. Virial theorems play a prominent role in this endeavor, as a Schr\"odinger-like equation can be associated to the RFI. Lagrange multipliers are determined invoking the RFI-LTS link and the quantum mechanical virial theorem. An appropriate ansatz allows for the inference of probability density functions (pdf's, hereafter) and energy-eigenvalues of the above mentioned Schr\"odinger-like equation. The energy-eigenvalues obtained here via inference are benchmarked against established theoretical and numerical results. A principled theoretical basis to reconstruct the RFI-framework from the FIM framework is established. Numerical examples for exemplary cases are provided.
no_new_dataset
0.945651
1505.01709
Piotr Br\'odka
Stanis{\l}aw Saganowski, Bogdan Gliwa, Piotr Br\'odka, Anna Zygmunt, Przemys{\l}aw Kazienko, Jaros{\l}aw Ko\'zlak
Predicting Community Evolution in Social Networks
Entropy 2015, 17, 1-x manuscripts; doi:10.3390/e170x000x 46 pages
Entropy 2015, 17, 3053-3096
10.3390/e17053053
null
cs.SI physics.soc-ph
http://creativecommons.org/licenses/by/3.0/
Nowadays, sustained development of different social media can be observed worldwide. One of the relevant research domains intensively explored recently is analysis of social communities existing in social media as well as prediction of their future evolution taking into account collected historical evolution chains. These evolution chains proposed in the paper contain group states in the previous time frames and its historical transitions that were identified using one out of two methods: Stable Group Changes Identification (SGCI) and Group Evolution Discovery (GED). Based on the observed evolution chains of various length, structural network features are extracted, validated and selected as well as used to learn classification models. The experimental studies were performed on three real datasets with different profile: DBLP, Facebook and Polish blogosphere. The process of group prediction was analysed with respect to different classifiers as well as various descriptive feature sets extracted from evolution chains of different length. The results revealed that, in general, the longer evolution chains the better predictive abilities of the classification models. However, chains of length 3 to 7 enabled the GED-based method to almost reach its maximum possible prediction quality. For SGCI, this value was at the level of 3 to 5 last periods.
[ { "version": "v1", "created": "Thu, 7 May 2015 14:03:47 GMT" } ]
2015-05-12T00:00:00
[ [ "Saganowski", "Stanisław", "" ], [ "Gliwa", "Bogdan", "" ], [ "Bródka", "Piotr", "" ], [ "Zygmunt", "Anna", "" ], [ "Kazienko", "Przemysław", "" ], [ "Koźlak", "Jarosław", "" ] ]
TITLE: Predicting Community Evolution in Social Networks ABSTRACT: Nowadays, sustained development of different social media can be observed worldwide. One of the relevant research domains intensively explored recently is analysis of social communities existing in social media as well as prediction of their future evolution taking into account collected historical evolution chains. These evolution chains proposed in the paper contain group states in the previous time frames and its historical transitions that were identified using one out of two methods: Stable Group Changes Identification (SGCI) and Group Evolution Discovery (GED). Based on the observed evolution chains of various length, structural network features are extracted, validated and selected as well as used to learn classification models. The experimental studies were performed on three real datasets with different profile: DBLP, Facebook and Polish blogosphere. The process of group prediction was analysed with respect to different classifiers as well as various descriptive feature sets extracted from evolution chains of different length. The results revealed that, in general, the longer evolution chains the better predictive abilities of the classification models. However, chains of length 3 to 7 enabled the GED-based method to almost reach its maximum possible prediction quality. For SGCI, this value was at the level of 3 to 5 last periods.
no_new_dataset
0.945851
1505.02269
Zongyuan Ge
Zongyuan Ge and Christopher Mccool and Conrad Sanderson and Peter Corke
Subset Feature Learning for Fine-Grained Category Classification
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Fine-grained categorisation has been a challenging problem due to small inter-class variation, large intra-class variation and low number of training images. We propose a learning system which first clusters visually similar classes and then learns deep convolutional neural network features specific to each subset. Experiments on the popular fine-grained Caltech-UCSD bird dataset show that the proposed method outperforms recent fine-grained categorisation methods under the most difficult setting: no bounding boxes are presented at test time. It achieves a mean accuracy of 77.5%, compared to the previous best performance of 73.2%. We also show that progressive transfer learning allows us to first learn domain-generic features (for bird classification) which can then be adapted to specific set of bird classes, yielding improvements in accuracy.
[ { "version": "v1", "created": "Sat, 9 May 2015 13:25:24 GMT" } ]
2015-05-12T00:00:00
[ [ "Ge", "Zongyuan", "" ], [ "Mccool", "Christopher", "" ], [ "Sanderson", "Conrad", "" ], [ "Corke", "Peter", "" ] ]
TITLE: Subset Feature Learning for Fine-Grained Category Classification ABSTRACT: Fine-grained categorisation has been a challenging problem due to small inter-class variation, large intra-class variation and low number of training images. We propose a learning system which first clusters visually similar classes and then learns deep convolutional neural network features specific to each subset. Experiments on the popular fine-grained Caltech-UCSD bird dataset show that the proposed method outperforms recent fine-grained categorisation methods under the most difficult setting: no bounding boxes are presented at test time. It achieves a mean accuracy of 77.5%, compared to the previous best performance of 73.2%. We also show that progressive transfer learning allows us to first learn domain-generic features (for bird classification) which can then be adapted to specific set of bird classes, yielding improvements in accuracy.
no_new_dataset
0.951997
1505.02377
Renjie Liao
Renjie Liao, Jianping Shi, Ziyang Ma, Jun Zhu and Jiaya Jia
Bounded-Distortion Metric Learning
null
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Metric learning aims to embed one metric space into another to benefit tasks like classification and clustering. Although a greatly distorted metric space has a high degree of freedom to fit training data, it is prone to overfitting and numerical inaccuracy. This paper presents {\it bounded-distortion metric learning} (BDML), a new metric learning framework which amounts to finding an optimal Mahalanobis metric space with a bounded-distortion constraint. An efficient solver based on the multiplicative weights update method is proposed. Moreover, we generalize BDML to pseudo-metric learning and devise the semidefinite relaxation and a randomized algorithm to approximately solve it. We further provide theoretical analysis to show that distortion is a key ingredient for stability and generalization ability of our BDML algorithm. Extensive experiments on several benchmark datasets yield promising results.
[ { "version": "v1", "created": "Sun, 10 May 2015 13:27:36 GMT" } ]
2015-05-12T00:00:00
[ [ "Liao", "Renjie", "" ], [ "Shi", "Jianping", "" ], [ "Ma", "Ziyang", "" ], [ "Zhu", "Jun", "" ], [ "Jia", "Jiaya", "" ] ]
TITLE: Bounded-Distortion Metric Learning ABSTRACT: Metric learning aims to embed one metric space into another to benefit tasks like classification and clustering. Although a greatly distorted metric space has a high degree of freedom to fit training data, it is prone to overfitting and numerical inaccuracy. This paper presents {\it bounded-distortion metric learning} (BDML), a new metric learning framework which amounts to finding an optimal Mahalanobis metric space with a bounded-distortion constraint. An efficient solver based on the multiplicative weights update method is proposed. Moreover, we generalize BDML to pseudo-metric learning and devise the semidefinite relaxation and a randomized algorithm to approximately solve it. We further provide theoretical analysis to show that distortion is a key ingredient for stability and generalization ability of our BDML algorithm. Extensive experiments on several benchmark datasets yield promising results.
no_new_dataset
0.947235
1505.02496
Liwei Wang
Liwei Wang, Chen-Yu Lee, Zhuowen Tu, Svetlana Lazebnik
Training Deeper Convolutional Networks with Deep Supervision
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
One of the most promising ways of improving the performance of deep convolutional neural networks is by increasing the number of convolutional layers. However, adding layers makes training more difficult and computationally expensive. In order to train deeper networks, we propose to add auxiliary supervision branches after certain intermediate layers during training. We formulate a simple rule of thumb to determine where these branches should be added. The resulting deeply supervised structure makes the training much easier and also produces better classification results on ImageNet and the recently released, larger MIT Places dataset
[ { "version": "v1", "created": "Mon, 11 May 2015 06:26:46 GMT" } ]
2015-05-12T00:00:00
[ [ "Wang", "Liwei", "" ], [ "Lee", "Chen-Yu", "" ], [ "Tu", "Zhuowen", "" ], [ "Lazebnik", "Svetlana", "" ] ]
TITLE: Training Deeper Convolutional Networks with Deep Supervision ABSTRACT: One of the most promising ways of improving the performance of deep convolutional neural networks is by increasing the number of convolutional layers. However, adding layers makes training more difficult and computationally expensive. In order to train deeper networks, we propose to add auxiliary supervision branches after certain intermediate layers during training. We formulate a simple rule of thumb to determine where these branches should be added. The resulting deeply supervised structure makes the training much easier and also produces better classification results on ImageNet and the recently released, larger MIT Places dataset
no_new_dataset
0.955775
1505.02505
Lihua Guo
Guo Lihua and Guo Chenggan
A Two-Layer Local Constrained Sparse Coding Method for Fine-Grained Visual Categorization
19 pages, 12 figures, 8 tables
null
null
null
cs.CV
http://creativecommons.org/licenses/by/3.0/
Fine-grained categories are more difficulty distinguished than generic categories due to the similarity of inter-class and the diversity of intra-class. Therefore, the fine-grained visual categorization (FGVC) is considered as one of challenge problems in computer vision recently. A new feature learning framework, which is based on a two-layer local constrained sparse coding architecture, is proposed in this paper. The two-layer architecture is introduced for learning intermediate-level features, and the local constrained term is applied to guarantee the local smooth of coding coefficients. For extracting more discriminative information, local orientation histograms are the input of sparse coding instead of raw pixels. Moreover, a quick dictionary updating process is derived to further improve the training speed. Two experimental results show that our method achieves 85.29% accuracy on the Oxford 102 flowers dataset and 67.8% accuracy on the CUB-200-2011 bird dataset, and the performance of our framework is highly competitive with existing literatures.
[ { "version": "v1", "created": "Mon, 11 May 2015 07:34:35 GMT" } ]
2015-05-12T00:00:00
[ [ "Lihua", "Guo", "" ], [ "Chenggan", "Guo", "" ] ]
TITLE: A Two-Layer Local Constrained Sparse Coding Method for Fine-Grained Visual Categorization ABSTRACT: Fine-grained categories are more difficulty distinguished than generic categories due to the similarity of inter-class and the diversity of intra-class. Therefore, the fine-grained visual categorization (FGVC) is considered as one of challenge problems in computer vision recently. A new feature learning framework, which is based on a two-layer local constrained sparse coding architecture, is proposed in this paper. The two-layer architecture is introduced for learning intermediate-level features, and the local constrained term is applied to guarantee the local smooth of coding coefficients. For extracting more discriminative information, local orientation histograms are the input of sparse coding instead of raw pixels. Moreover, a quick dictionary updating process is derived to further improve the training speed. Two experimental results show that our method achieves 85.29% accuracy on the Oxford 102 flowers dataset and 67.8% accuracy on the CUB-200-2011 bird dataset, and the performance of our framework is highly competitive with existing literatures.
no_new_dataset
0.95222
1505.02729
Nakul Verma
Nakul Verma and Kristin Branson
Sample complexity of learning Mahalanobis distance metrics
26 pages, 1 figure
null
null
null
cs.LG cs.AI stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Metric learning seeks a transformation of the feature space that enhances prediction quality for the given task at hand. In this work we provide PAC-style sample complexity rates for supervised metric learning. We give matching lower- and upper-bounds showing that the sample complexity scales with the representation dimension when no assumptions are made about the underlying data distribution. However, by leveraging the structure of the data distribution, we show that one can achieve rates that are fine-tuned to a specific notion of intrinsic complexity for a given dataset. Our analysis reveals that augmenting the metric learning optimization criterion with a simple norm-based regularization can help adapt to a dataset's intrinsic complexity, yielding better generalization. Experiments on benchmark datasets validate our analysis and show that regularizing the metric can help discern the signal even when the data contains high amounts of noise.
[ { "version": "v1", "created": "Mon, 11 May 2015 18:55:42 GMT" } ]
2015-05-12T00:00:00
[ [ "Verma", "Nakul", "" ], [ "Branson", "Kristin", "" ] ]
TITLE: Sample complexity of learning Mahalanobis distance metrics ABSTRACT: Metric learning seeks a transformation of the feature space that enhances prediction quality for the given task at hand. In this work we provide PAC-style sample complexity rates for supervised metric learning. We give matching lower- and upper-bounds showing that the sample complexity scales with the representation dimension when no assumptions are made about the underlying data distribution. However, by leveraging the structure of the data distribution, we show that one can achieve rates that are fine-tuned to a specific notion of intrinsic complexity for a given dataset. Our analysis reveals that augmenting the metric learning optimization criterion with a simple norm-based regularization can help adapt to a dataset's intrinsic complexity, yielding better generalization. Experiments on benchmark datasets validate our analysis and show that regularizing the metric can help discern the signal even when the data contains high amounts of noise.
no_new_dataset
0.946399
1412.6504
Katerina Fragkiadaki
Katerina Fragkiadaki and Pablo Arbelaez and Panna Felsen and Jitendra Malik
Learning to Segment Moving Objects in Videos
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We segment moving objects in videos by ranking spatio-temporal segment proposals according to "moving objectness": how likely they are to contain a moving object. In each video frame, we compute segment proposals using multiple figure-ground segmentations on per frame motion boundaries. We rank them with a Moving Objectness Detector trained on image and motion fields to detect moving objects and discard over/under segmentations or background parts of the scene. We extend the top ranked segments into spatio-temporal tubes using random walkers on motion affinities of dense point trajectories. Our final tube ranking consistently outperforms previous segmentation methods in the two largest video segmentation benchmarks currently available, for any number of proposals. Further, our per frame moving object proposals increase the detection rate up to 7\% over previous state-of-the-art static proposal methods.
[ { "version": "v1", "created": "Fri, 19 Dec 2014 20:01:16 GMT" }, { "version": "v2", "created": "Fri, 8 May 2015 02:05:52 GMT" } ]
2015-05-11T00:00:00
[ [ "Fragkiadaki", "Katerina", "" ], [ "Arbelaez", "Pablo", "" ], [ "Felsen", "Panna", "" ], [ "Malik", "Jitendra", "" ] ]
TITLE: Learning to Segment Moving Objects in Videos ABSTRACT: We segment moving objects in videos by ranking spatio-temporal segment proposals according to "moving objectness": how likely they are to contain a moving object. In each video frame, we compute segment proposals using multiple figure-ground segmentations on per frame motion boundaries. We rank them with a Moving Objectness Detector trained on image and motion fields to detect moving objects and discard over/under segmentations or background parts of the scene. We extend the top ranked segments into spatio-temporal tubes using random walkers on motion affinities of dense point trajectories. Our final tube ranking consistently outperforms previous segmentation methods in the two largest video segmentation benchmarks currently available, for any number of proposals. Further, our per frame moving object proposals increase the detection rate up to 7\% over previous state-of-the-art static proposal methods.
no_new_dataset
0.955527
1503.04144
Shengxin Zha
Shengxin Zha, Florian Luisier, Walter Andrews, Nitish Srivastava, Ruslan Salakhutdinov
Exploiting Image-trained CNN Architectures for Unconstrained Video Classification
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We conduct an in-depth exploration of different strategies for doing event detection in videos using convolutional neural networks (CNNs) trained for image classification. We study different ways of performing spatial and temporal pooling, feature normalization, choice of CNN layers as well as choice of classifiers. Making judicious choices along these dimensions led to a very significant increase in performance over more naive approaches that have been used till now. We evaluate our approach on the challenging TRECVID MED'14 dataset with two popular CNN architectures pretrained on ImageNet. On this MED'14 dataset, our methods, based entirely on image-trained CNN features, can outperform several state-of-the-art non-CNN models. Our proposed late fusion of CNN- and motion-based features can further increase the mean average precision (mAP) on MED'14 from 34.95% to 38.74%. The fusion approach achieves the state-of-the-art classification performance on the challenging UCF-101 dataset.
[ { "version": "v1", "created": "Fri, 13 Mar 2015 17:00:53 GMT" }, { "version": "v2", "created": "Mon, 16 Mar 2015 00:53:49 GMT" }, { "version": "v3", "created": "Fri, 8 May 2015 01:54:08 GMT" } ]
2015-05-11T00:00:00
[ [ "Zha", "Shengxin", "" ], [ "Luisier", "Florian", "" ], [ "Andrews", "Walter", "" ], [ "Srivastava", "Nitish", "" ], [ "Salakhutdinov", "Ruslan", "" ] ]
TITLE: Exploiting Image-trained CNN Architectures for Unconstrained Video Classification ABSTRACT: We conduct an in-depth exploration of different strategies for doing event detection in videos using convolutional neural networks (CNNs) trained for image classification. We study different ways of performing spatial and temporal pooling, feature normalization, choice of CNN layers as well as choice of classifiers. Making judicious choices along these dimensions led to a very significant increase in performance over more naive approaches that have been used till now. We evaluate our approach on the challenging TRECVID MED'14 dataset with two popular CNN architectures pretrained on ImageNet. On this MED'14 dataset, our methods, based entirely on image-trained CNN features, can outperform several state-of-the-art non-CNN models. Our proposed late fusion of CNN- and motion-based features can further increase the mean average precision (mAP) on MED'14 from 34.95% to 38.74%. The fusion approach achieves the state-of-the-art classification performance on the challenging UCF-101 dataset.
no_new_dataset
0.949623
1503.08039
Hui-Jia Li
Hui-Jia Li and J J.Daniels
Social significance of community structure: Statistical view
This paper has been withdrawn by the author due to a crucial sign error in equation (17) and high overlapping rate
Physical Review E, 91(1), 012801, 2015
10.1103/PhysRevE.91.012801
null
physics.soc-ph cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Community structure analysis is a powerful tool for social networks, which can simplify their topological and functional analysis considerably. However, since community detection methods have random factors and real social networks obtained from complex systems always contain error edges, evaluating the significance of community structure partitioned is an urgent and important question. In this paper, integrating the specific characteristics of real society, we present a novel framework analyzing the significance of social community specially. The dynamics of social interactions are modeled by identifying social leaders and corresponding hierarchical structures. Instead of a direct comparison with the average outcome of a random model, we compute the similarity of a given node with the leader by the number of common neighbors. To determine the membership vector, an efficient community detection algorithm is proposed based on the position of nodes and their corresponding leaders. Then, using log-likelihood score, the tightness of community can be derived. Based on the distribution of community tightness, we establish a new connection between $p$-value theory and network analysis and then get a novel statistical form significance measure. Finally, the framework is applied to both benchmark networks and real social networks. Experimental results show that our work can be used in many fields, such as determining the optimal number of communities, analyzing the social significance of a given community, comparing the performance among various algorithms and so on.
[ { "version": "v1", "created": "Fri, 27 Mar 2015 12:09:12 GMT" }, { "version": "v2", "created": "Fri, 8 May 2015 15:58:38 GMT" } ]
2015-05-11T00:00:00
[ [ "Li", "Hui-Jia", "" ], [ "Daniels", "J J.", "" ] ]
TITLE: Social significance of community structure: Statistical view ABSTRACT: Community structure analysis is a powerful tool for social networks, which can simplify their topological and functional analysis considerably. However, since community detection methods have random factors and real social networks obtained from complex systems always contain error edges, evaluating the significance of community structure partitioned is an urgent and important question. In this paper, integrating the specific characteristics of real society, we present a novel framework analyzing the significance of social community specially. The dynamics of social interactions are modeled by identifying social leaders and corresponding hierarchical structures. Instead of a direct comparison with the average outcome of a random model, we compute the similarity of a given node with the leader by the number of common neighbors. To determine the membership vector, an efficient community detection algorithm is proposed based on the position of nodes and their corresponding leaders. Then, using log-likelihood score, the tightness of community can be derived. Based on the distribution of community tightness, we establish a new connection between $p$-value theory and network analysis and then get a novel statistical form significance measure. Finally, the framework is applied to both benchmark networks and real social networks. Experimental results show that our work can be used in many fields, such as determining the optimal number of communities, analyzing the social significance of a given community, comparing the performance among various algorithms and so on.
no_new_dataset
0.946349
1505.01589
Li Shen
Li Shen, Teck Wee Chua, Karianto Leman
Shadow Optimization from Structured Deep Edge Detection
8 pages. CVPR 2015
null
null
null
cs.CV
http://creativecommons.org/licenses/by-nc-sa/3.0/
Local structures of shadow boundaries as well as complex interactions of image regions remain largely unexploited by previous shadow detection approaches. In this paper, we present a novel learning-based framework for shadow region recovery from a single image. We exploit the local structures of shadow edges by using a structured CNN learning framework. We show that using the structured label information in the classification can improve the local consistency of the results and avoid spurious labelling. We further propose and formulate a shadow/bright measure to model the complex interactions among image regions. The shadow and bright measures of each patch are computed from the shadow edges detected in the image. Using the global interaction constraints on patches, we formulate a least-square optimization problem for shadow recovery that can be solved efficiently. Our shadow recovery method achieves state-of-the-art results on the major shadow benchmark databases collected under various conditions.
[ { "version": "v1", "created": "Thu, 7 May 2015 05:07:11 GMT" }, { "version": "v2", "created": "Fri, 8 May 2015 06:42:48 GMT" } ]
2015-05-11T00:00:00
[ [ "Shen", "Li", "" ], [ "Chua", "Teck Wee", "" ], [ "Leman", "Karianto", "" ] ]
TITLE: Shadow Optimization from Structured Deep Edge Detection ABSTRACT: Local structures of shadow boundaries as well as complex interactions of image regions remain largely unexploited by previous shadow detection approaches. In this paper, we present a novel learning-based framework for shadow region recovery from a single image. We exploit the local structures of shadow edges by using a structured CNN learning framework. We show that using the structured label information in the classification can improve the local consistency of the results and avoid spurious labelling. We further propose and formulate a shadow/bright measure to model the complex interactions among image regions. The shadow and bright measures of each patch are computed from the shadow edges detected in the image. Using the global interaction constraints on patches, we formulate a least-square optimization problem for shadow recovery that can be solved efficiently. Our shadow recovery method achieves state-of-the-art results on the major shadow benchmark databases collected under various conditions.
no_new_dataset
0.944587
1505.01866
K. V. Rashmi
K. V. Rashmi and Ran Gilad-Bachrach
DART: Dropouts meet Multiple Additive Regression Trees
AIStats 2015
null
null
null
cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Multiple Additive Regression Trees (MART), an ensemble model of boosted regression trees, is known to deliver high prediction accuracy for diverse tasks, and it is widely used in practice. However, it suffers an issue which we call over-specialization, wherein trees added at later iterations tend to impact the prediction of only a few instances, and make negligible contribution towards the remaining instances. This negatively affects the performance of the model on unseen data, and also makes the model over-sensitive to the contributions of the few, initially added tress. We show that the commonly used tool to address this issue, that of shrinkage, alleviates the problem only to a certain extent and the fundamental issue of over-specialization still remains. In this work, we explore a different approach to address the problem that of employing dropouts, a tool that has been recently proposed in the context of learning deep neural networks. We propose a novel way of employing dropouts in MART, resulting in the DART algorithm. We evaluate DART on ranking, regression and classification tasks, using large scale, publicly available datasets, and show that DART outperforms MART in each of the tasks, with a significant margin. We also show that DART overcomes the issue of over-specialization to a considerable extent.
[ { "version": "v1", "created": "Thu, 7 May 2015 20:38:48 GMT" } ]
2015-05-11T00:00:00
[ [ "Rashmi", "K. V.", "" ], [ "Gilad-Bachrach", "Ran", "" ] ]
TITLE: DART: Dropouts meet Multiple Additive Regression Trees ABSTRACT: Multiple Additive Regression Trees (MART), an ensemble model of boosted regression trees, is known to deliver high prediction accuracy for diverse tasks, and it is widely used in practice. However, it suffers an issue which we call over-specialization, wherein trees added at later iterations tend to impact the prediction of only a few instances, and make negligible contribution towards the remaining instances. This negatively affects the performance of the model on unseen data, and also makes the model over-sensitive to the contributions of the few, initially added tress. We show that the commonly used tool to address this issue, that of shrinkage, alleviates the problem only to a certain extent and the fundamental issue of over-specialization still remains. In this work, we explore a different approach to address the problem that of employing dropouts, a tool that has been recently proposed in the context of learning deep neural networks. We propose a novel way of employing dropouts in MART, resulting in the DART algorithm. We evaluate DART on ranking, regression and classification tasks, using large scale, publicly available datasets, and show that DART outperforms MART in each of the tasks, with a significant margin. We also show that DART overcomes the issue of over-specialization to a considerable extent.
no_new_dataset
0.949763
1505.02000
Matthew Lai
Matthew Lai
Deep Learning for Medical Image Segmentation
null
null
null
null
cs.LG cs.AI cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This report provides an overview of the current state of the art deep learning architectures and optimisation techniques, and uses the ADNI hippocampus MRI dataset as an example to compare the effectiveness and efficiency of different convolutional architectures on the task of patch-based 3-dimensional hippocampal segmentation, which is important in the diagnosis of Alzheimer's Disease. We found that a slightly unconventional "stacked 2D" approach provides much better classification performance than simple 2D patches without requiring significantly more computational power. We also examined the popular "tri-planar" approach used in some recently published studies, and found that it provides much better results than the 2D approaches, but also with a moderate increase in computational power requirement. Finally, we evaluated a full 3D convolutional architecture, and found that it provides marginally better results than the tri-planar approach, but at the cost of a very significant increase in computational power requirement.
[ { "version": "v1", "created": "Fri, 8 May 2015 11:35:53 GMT" } ]
2015-05-11T00:00:00
[ [ "Lai", "Matthew", "" ] ]
TITLE: Deep Learning for Medical Image Segmentation ABSTRACT: This report provides an overview of the current state of the art deep learning architectures and optimisation techniques, and uses the ADNI hippocampus MRI dataset as an example to compare the effectiveness and efficiency of different convolutional architectures on the task of patch-based 3-dimensional hippocampal segmentation, which is important in the diagnosis of Alzheimer's Disease. We found that a slightly unconventional "stacked 2D" approach provides much better classification performance than simple 2D patches without requiring significantly more computational power. We also examined the popular "tri-planar" approach used in some recently published studies, and found that it provides much better results than the 2D approaches, but also with a moderate increase in computational power requirement. Finally, we evaluated a full 3D convolutional architecture, and found that it provides marginally better results than the tri-planar approach, but at the cost of a very significant increase in computational power requirement.
no_new_dataset
0.953405
1505.02056
Junchen Jiang
Junchen Jiang and Vyas Sekar and Yi Sun
DDA: Cross-Session Throughput Prediction with Applications to Video Bitrate Selection
null
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
User experience of video streaming could be greatly improved by selecting a high-yet-sustainable initial video bitrate, and it is therefore critical to accurately predict throughput before a video session starts. Inspired by previous studies that show similarity among throughput of similar sessions (e.g., those sharing same bottleneck link), we argue for a cross-session prediction approach, where throughput measured on other sessions is used to predict the throughput of a new session. In this paper, we study the challenges of cross-session throughput prediction, develop an accurate throughput predictor called DDA, and evaluate the performance of the predictor with real-world datasets. We show that DDA can predict throughput more accurately than simple predictors and conventional machine learning algorithms; e.g., DDA's 80%ile prediction error of DDA is > 50% lower than other algorithms. We also show that this improved accuracy enables video players to select a higher sustainable initial bitrate; e.g., compared to initial bitrate without prediction, DDA leads to 4x higher average bitrate.
[ { "version": "v1", "created": "Fri, 8 May 2015 14:51:12 GMT" } ]
2015-05-11T00:00:00
[ [ "Jiang", "Junchen", "" ], [ "Sekar", "Vyas", "" ], [ "Sun", "Yi", "" ] ]
TITLE: DDA: Cross-Session Throughput Prediction with Applications to Video Bitrate Selection ABSTRACT: User experience of video streaming could be greatly improved by selecting a high-yet-sustainable initial video bitrate, and it is therefore critical to accurately predict throughput before a video session starts. Inspired by previous studies that show similarity among throughput of similar sessions (e.g., those sharing same bottleneck link), we argue for a cross-session prediction approach, where throughput measured on other sessions is used to predict the throughput of a new session. In this paper, we study the challenges of cross-session throughput prediction, develop an accurate throughput predictor called DDA, and evaluate the performance of the predictor with real-world datasets. We show that DDA can predict throughput more accurately than simple predictors and conventional machine learning algorithms; e.g., DDA's 80%ile prediction error of DDA is > 50% lower than other algorithms. We also show that this improved accuracy enables video players to select a higher sustainable initial bitrate; e.g., compared to initial bitrate without prediction, DDA leads to 4x higher average bitrate.
no_new_dataset
0.948822
1411.6069
Abhishek Kar
Abhishek Kar, Shubham Tulsiani, Jo\~ao Carreira, Jitendra Malik
Category-Specific Object Reconstruction from a Single Image
First two authors contributed equally. To appear at CVPR 2015
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Object reconstruction from a single image -- in the wild -- is a problem where we can make progress and get meaningful results today. This is the main message of this paper, which introduces an automated pipeline with pixels as inputs and 3D surfaces of various rigid categories as outputs in images of realistic scenes. At the core of our approach are deformable 3D models that can be learned from 2D annotations available in existing object detection datasets, that can be driven by noisy automatic object segmentations and which we complement with a bottom-up module for recovering high-frequency shape details. We perform a comprehensive quantitative analysis and ablation study of our approach using the recently introduced PASCAL 3D+ dataset and show very encouraging automatic reconstructions on PASCAL VOC.
[ { "version": "v1", "created": "Sat, 22 Nov 2014 03:15:29 GMT" }, { "version": "v2", "created": "Wed, 6 May 2015 21:42:41 GMT" } ]
2015-05-08T00:00:00
[ [ "Kar", "Abhishek", "" ], [ "Tulsiani", "Shubham", "" ], [ "Carreira", "João", "" ], [ "Malik", "Jitendra", "" ] ]
TITLE: Category-Specific Object Reconstruction from a Single Image ABSTRACT: Object reconstruction from a single image -- in the wild -- is a problem where we can make progress and get meaningful results today. This is the main message of this paper, which introduces an automated pipeline with pixels as inputs and 3D surfaces of various rigid categories as outputs in images of realistic scenes. At the core of our approach are deformable 3D models that can be learned from 2D annotations available in existing object detection datasets, that can be driven by noisy automatic object segmentations and which we complement with a bottom-up module for recovering high-frequency shape details. We perform a comprehensive quantitative analysis and ablation study of our approach using the recently introduced PASCAL 3D+ dataset and show very encouraging automatic reconstructions on PASCAL VOC.
no_new_dataset
0.813609
1504.06378
James Supancic III
James Steven Supancic III, Gregory Rogez, Yi Yang, Jamie Shotton, Deva Ramanan
Depth-based hand pose estimation: methods, data, and challenges
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Hand pose estimation has matured rapidly in recent years. The introduction of commodity depth sensors and a multitude of practical applications have spurred new advances. We provide an extensive analysis of the state-of-the-art, focusing on hand pose estimation from a single depth frame. To do so, we have implemented a considerable number of systems, and will release all software and evaluation code. We summarize important conclusions here: (1) Pose estimation appears roughly solved for scenes with isolated hands. However, methods still struggle to analyze cluttered scenes where hands may be interacting with nearby objects and surfaces. To spur further progress we introduce a challenging new dataset with diverse, cluttered scenes. (2) Many methods evaluate themselves with disparate criteria, making comparisons difficult. We define a consistent evaluation criteria, rigorously motivated by human experiments. (3) We introduce a simple nearest-neighbor baseline that outperforms most existing systems. This implies that most systems do not generalize beyond their training sets. This also reinforces the under-appreciated point that training data is as important as the model itself. We conclude with directions for future progress.
[ { "version": "v1", "created": "Fri, 24 Apr 2015 02:37:37 GMT" }, { "version": "v2", "created": "Wed, 6 May 2015 20:31:57 GMT" } ]
2015-05-08T00:00:00
[ [ "Supancic", "James Steven", "III" ], [ "Rogez", "Gregory", "" ], [ "Yang", "Yi", "" ], [ "Shotton", "Jamie", "" ], [ "Ramanan", "Deva", "" ] ]
TITLE: Depth-based hand pose estimation: methods, data, and challenges ABSTRACT: Hand pose estimation has matured rapidly in recent years. The introduction of commodity depth sensors and a multitude of practical applications have spurred new advances. We provide an extensive analysis of the state-of-the-art, focusing on hand pose estimation from a single depth frame. To do so, we have implemented a considerable number of systems, and will release all software and evaluation code. We summarize important conclusions here: (1) Pose estimation appears roughly solved for scenes with isolated hands. However, methods still struggle to analyze cluttered scenes where hands may be interacting with nearby objects and surfaces. To spur further progress we introduce a challenging new dataset with diverse, cluttered scenes. (2) Many methods evaluate themselves with disparate criteria, making comparisons difficult. We define a consistent evaluation criteria, rigorously motivated by human experiments. (3) We introduce a simple nearest-neighbor baseline that outperforms most existing systems. This implies that most systems do not generalize beyond their training sets. This also reinforces the under-appreciated point that training data is as important as the model itself. We conclude with directions for future progress.
new_dataset
0.961534
1505.01547
Gordon J Ross
Gordon J Ross and Tim Jones
Understanding the Heavy Tailed Dynamics in Human Behavior
9 pages in Physical Review E, 2015
null
null
null
physics.soc-ph cs.SI stat.AP
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The recent availability of electronic datasets containing large volumes of communication data has made it possible to study human behavior on a larger scale than ever before. From this, it has been discovered that across a diverse range of data sets, the inter-event times between consecutive communication events obey heavy tailed power law dynamics. Explaining this has proved controversial, and two distinct hypotheses have emerged. The first holds that these power laws are fundamental, and arise from the mechanisms such as priority queuing that humans use to schedule tasks. The second holds that they are a statistical artifact which only occur in aggregated data when features such as circadian rhythms and burstiness are ignored. We use a large social media data set to test these hypotheses, and find that although models that incorporate circadian rhythms and burstiness do explain part of the observed heavy tails, there is residual unexplained heavy tail behavior which suggests a more fundamental cause. Based on this, we develop a new quantitative model of human behavior which improves on existing approaches, and gives insight into the mechanisms underlying human interactions.
[ { "version": "v1", "created": "Thu, 7 May 2015 00:12:24 GMT" } ]
2015-05-08T00:00:00
[ [ "Ross", "Gordon J", "" ], [ "Jones", "Tim", "" ] ]
TITLE: Understanding the Heavy Tailed Dynamics in Human Behavior ABSTRACT: The recent availability of electronic datasets containing large volumes of communication data has made it possible to study human behavior on a larger scale than ever before. From this, it has been discovered that across a diverse range of data sets, the inter-event times between consecutive communication events obey heavy tailed power law dynamics. Explaining this has proved controversial, and two distinct hypotheses have emerged. The first holds that these power laws are fundamental, and arise from the mechanisms such as priority queuing that humans use to schedule tasks. The second holds that they are a statistical artifact which only occur in aggregated data when features such as circadian rhythms and burstiness are ignored. We use a large social media data set to test these hypotheses, and find that although models that incorporate circadian rhythms and burstiness do explain part of the observed heavy tails, there is residual unexplained heavy tail behavior which suggests a more fundamental cause. Based on this, we develop a new quantitative model of human behavior which improves on existing approaches, and gives insight into the mechanisms underlying human interactions.
no_new_dataset
0.949809
1505.01560
Tam Nguyen
Tam V. Nguyen, Canyi Lu, Jose Sepulveda, Shuicheng Yan
Adaptive Nonparametric Image Parsing
11 pages
null
null
null
cs.CV
http://creativecommons.org/licenses/by/3.0/
In this paper, we present an adaptive nonparametric solution to the image parsing task, namely annotating each image pixel with its corresponding category label. For a given test image, first, a locality-aware retrieval set is extracted from the training data based on super-pixel matching similarities, which are augmented with feature extraction for better differentiation of local super-pixels. Then, the category of each super-pixel is initialized by the majority vote of the $k$-nearest-neighbor super-pixels in the retrieval set. Instead of fixing $k$ as in traditional non-parametric approaches, here we propose a novel adaptive nonparametric approach which determines the sample-specific k for each test image. In particular, $k$ is adaptively set to be the number of the fewest nearest super-pixels which the images in the retrieval set can use to get the best category prediction. Finally, the initial super-pixel labels are further refined by contextual smoothing. Extensive experiments on challenging datasets demonstrate the superiority of the new solution over other state-of-the-art nonparametric solutions.
[ { "version": "v1", "created": "Thu, 7 May 2015 02:28:32 GMT" } ]
2015-05-08T00:00:00
[ [ "Nguyen", "Tam V.", "" ], [ "Lu", "Canyi", "" ], [ "Sepulveda", "Jose", "" ], [ "Yan", "Shuicheng", "" ] ]
TITLE: Adaptive Nonparametric Image Parsing ABSTRACT: In this paper, we present an adaptive nonparametric solution to the image parsing task, namely annotating each image pixel with its corresponding category label. For a given test image, first, a locality-aware retrieval set is extracted from the training data based on super-pixel matching similarities, which are augmented with feature extraction for better differentiation of local super-pixels. Then, the category of each super-pixel is initialized by the majority vote of the $k$-nearest-neighbor super-pixels in the retrieval set. Instead of fixing $k$ as in traditional non-parametric approaches, here we propose a novel adaptive nonparametric approach which determines the sample-specific k for each test image. In particular, $k$ is adaptively set to be the number of the fewest nearest super-pixels which the images in the retrieval set can use to get the best category prediction. Finally, the initial super-pixel labels are further refined by contextual smoothing. Extensive experiments on challenging datasets demonstrate the superiority of the new solution over other state-of-the-art nonparametric solutions.
no_new_dataset
0.948632
1505.01802
Nagarajan Natarajan
Nagarajan Natarajan, Oluwasanmi Koyejo, Pradeep Ravikumar, Inderjit S. Dhillon
Optimal Decision-Theoretic Classification Using Non-Decomposable Performance Metrics
null
null
null
null
cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We provide a general theoretical analysis of expected out-of-sample utility, also referred to as decision-theoretic classification, for non-decomposable binary classification metrics such as F-measure and Jaccard coefficient. Our key result is that the expected out-of-sample utility for many performance metrics is provably optimized by a classifier which is equivalent to a signed thresholding of the conditional probability of the positive class. Our analysis bridges a gap in the literature on binary classification, revealed in light of recent results for non-decomposable metrics in population utility maximization style classification. Our results identify checkable properties of a performance metric which are sufficient to guarantee a probability ranking principle. We propose consistent estimators for optimal expected out-of-sample classification. As a consequence of the probability ranking principle, computational requirements can be reduced from exponential to cubic complexity in the general case, and further reduced to quadratic complexity in special cases. We provide empirical results on simulated and benchmark datasets evaluating the performance of the proposed algorithms for decision-theoretic classification and comparing them to baseline and state-of-the-art methods in population utility maximization for non-decomposable metrics.
[ { "version": "v1", "created": "Thu, 7 May 2015 18:19:24 GMT" } ]
2015-05-08T00:00:00
[ [ "Natarajan", "Nagarajan", "" ], [ "Koyejo", "Oluwasanmi", "" ], [ "Ravikumar", "Pradeep", "" ], [ "Dhillon", "Inderjit S.", "" ] ]
TITLE: Optimal Decision-Theoretic Classification Using Non-Decomposable Performance Metrics ABSTRACT: We provide a general theoretical analysis of expected out-of-sample utility, also referred to as decision-theoretic classification, for non-decomposable binary classification metrics such as F-measure and Jaccard coefficient. Our key result is that the expected out-of-sample utility for many performance metrics is provably optimized by a classifier which is equivalent to a signed thresholding of the conditional probability of the positive class. Our analysis bridges a gap in the literature on binary classification, revealed in light of recent results for non-decomposable metrics in population utility maximization style classification. Our results identify checkable properties of a performance metric which are sufficient to guarantee a probability ranking principle. We propose consistent estimators for optimal expected out-of-sample classification. As a consequence of the probability ranking principle, computational requirements can be reduced from exponential to cubic complexity in the general case, and further reduced to quadratic complexity in special cases. We provide empirical results on simulated and benchmark datasets evaluating the performance of the proposed algorithms for decision-theoretic classification and comparing them to baseline and state-of-the-art methods in population utility maximization for non-decomposable metrics.
no_new_dataset
0.945951
1310.3567
Adam Vaughan
Adam Vaughan and Stanislav V. Bohac
An Extreme Learning Machine Approach to Predicting Near Chaotic HCCI Combustion Phasing in Real-Time
11 pages, 7 figures, minor revision (added implementation details and video link), submitted to Neural Networks
null
null
null
cs.LG cs.CE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Fuel efficient Homogeneous Charge Compression Ignition (HCCI) engine combustion timing predictions must contend with non-linear chemistry, non-linear physics, period doubling bifurcation(s), turbulent mixing, model parameters that can drift day-to-day, and air-fuel mixture state information that cannot typically be resolved on a cycle-to-cycle basis, especially during transients. In previous work, an abstract cycle-to-cycle mapping function coupled with $\epsilon$-Support Vector Regression was shown to predict experimentally observed cycle-to-cycle combustion timing over a wide range of engine conditions, despite some of the aforementioned difficulties. The main limitation of the previous approach was that a partially acausual randomly sampled training dataset was used to train proof of concept offline predictions. The objective of this paper is to address this limitation by proposing a new online adaptive Extreme Learning Machine (ELM) extension named Weighted Ring-ELM. This extension enables fully causal combustion timing predictions at randomly chosen engine set points, and is shown to achieve results that are as good as or better than the previous offline method. The broader objective of this approach is to enable a new class of real-time model predictive control strategies for high variability HCCI and, ultimately, to bring HCCI's low engine-out NOx and reduced CO2 emissions to production engines.
[ { "version": "v1", "created": "Mon, 14 Oct 2013 06:00:31 GMT" }, { "version": "v2", "created": "Wed, 24 Sep 2014 16:52:27 GMT" }, { "version": "v3", "created": "Tue, 5 May 2015 20:23:49 GMT" } ]
2015-05-07T00:00:00
[ [ "Vaughan", "Adam", "" ], [ "Bohac", "Stanislav V.", "" ] ]
TITLE: An Extreme Learning Machine Approach to Predicting Near Chaotic HCCI Combustion Phasing in Real-Time ABSTRACT: Fuel efficient Homogeneous Charge Compression Ignition (HCCI) engine combustion timing predictions must contend with non-linear chemistry, non-linear physics, period doubling bifurcation(s), turbulent mixing, model parameters that can drift day-to-day, and air-fuel mixture state information that cannot typically be resolved on a cycle-to-cycle basis, especially during transients. In previous work, an abstract cycle-to-cycle mapping function coupled with $\epsilon$-Support Vector Regression was shown to predict experimentally observed cycle-to-cycle combustion timing over a wide range of engine conditions, despite some of the aforementioned difficulties. The main limitation of the previous approach was that a partially acausual randomly sampled training dataset was used to train proof of concept offline predictions. The objective of this paper is to address this limitation by proposing a new online adaptive Extreme Learning Machine (ELM) extension named Weighted Ring-ELM. This extension enables fully causal combustion timing predictions at randomly chosen engine set points, and is shown to achieve results that are as good as or better than the previous offline method. The broader objective of this approach is to enable a new class of real-time model predictive control strategies for high variability HCCI and, ultimately, to bring HCCI's low engine-out NOx and reduced CO2 emissions to production engines.
no_new_dataset
0.947088
1412.6505
Michael S. Ryoo
M. S. Ryoo, Brandon Rothrock, Larry Matthies
Pooled Motion Features for First-Person Videos
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we present a new feature representation for first-person videos. In first-person video understanding (e.g., activity recognition), it is very important to capture both entire scene dynamics (i.e., egomotion) and salient local motion observed in videos. We describe a representation framework based on time series pooling, which is designed to abstract short-term/long-term changes in feature descriptor elements. The idea is to keep track of how descriptor values are changing over time and summarize them to represent motion in the activity video. The framework is general, handling any types of per-frame feature descriptors including conventional motion descriptors like histogram of optical flows (HOF) as well as appearance descriptors from more recent convolutional neural networks (CNN). We experimentally confirm that our approach clearly outperforms previous feature representations including bag-of-visual-words and improved Fisher vector (IFV) when using identical underlying feature descriptors. We also confirm that our feature representation has superior performance to existing state-of-the-art features like local spatio-temporal features and Improved Trajectory Features (originally developed for 3rd-person videos) when handling first-person videos. Multiple first-person activity datasets were tested under various settings to confirm these findings.
[ { "version": "v1", "created": "Fri, 19 Dec 2014 20:03:00 GMT" }, { "version": "v2", "created": "Wed, 6 May 2015 19:16:08 GMT" } ]
2015-05-07T00:00:00
[ [ "Ryoo", "M. S.", "" ], [ "Rothrock", "Brandon", "" ], [ "Matthies", "Larry", "" ] ]
TITLE: Pooled Motion Features for First-Person Videos ABSTRACT: In this paper, we present a new feature representation for first-person videos. In first-person video understanding (e.g., activity recognition), it is very important to capture both entire scene dynamics (i.e., egomotion) and salient local motion observed in videos. We describe a representation framework based on time series pooling, which is designed to abstract short-term/long-term changes in feature descriptor elements. The idea is to keep track of how descriptor values are changing over time and summarize them to represent motion in the activity video. The framework is general, handling any types of per-frame feature descriptors including conventional motion descriptors like histogram of optical flows (HOF) as well as appearance descriptors from more recent convolutional neural networks (CNN). We experimentally confirm that our approach clearly outperforms previous feature representations including bag-of-visual-words and improved Fisher vector (IFV) when using identical underlying feature descriptors. We also confirm that our feature representation has superior performance to existing state-of-the-art features like local spatio-temporal features and Improved Trajectory Features (originally developed for 3rd-person videos) when handling first-person videos. Multiple first-person activity datasets were tested under various settings to confirm these findings.
no_new_dataset
0.949342
1501.00334
Xiaoxian Tang
Jose Israel Rodriguez and Xiaoxian Tang
Data-Discriminants of Likelihood Equations
2 tables
null
null
null
cs.SC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Maximum likelihood estimation (MLE) is a fundamental computational problem in statistics. The problem is to maximize the likelihood function with respect to given data on a statistical model. An algebraic approach to this problem is to solve a very structured parameterized polynomial system called likelihood equations. For general choices of data, the number of complex solutions to the likelihood equations is finite and called the ML-degree of the model. The only solutions to the likelihood equations that are statistically meaningful are the real/positive solutions. However, the number of real/positive solutions is not characterized by the ML-degree. We use discriminants to classify data according to the number of real/positive solutions of the likelihood equations. We call these discriminants data-discriminants (DD). We develop a probabilistic algorithm for computing DDs. Experimental results show that, for the benchmarks we have tried, the probabilistic algorithm is more efficient than the standard elimination algorithm. Based on the computational results, we discuss the real root classification problem for the 3 by 3 symmetric matrix~model.
[ { "version": "v1", "created": "Fri, 2 Jan 2015 01:55:37 GMT" }, { "version": "v2", "created": "Mon, 5 Jan 2015 11:00:10 GMT" }, { "version": "v3", "created": "Fri, 9 Jan 2015 08:28:44 GMT" }, { "version": "v4", "created": "Tue, 20 Jan 2015 02:42:51 GMT" }, { "version": "v5", "created": "Wed, 6 May 2015 00:45:37 GMT" } ]
2015-05-07T00:00:00
[ [ "Rodriguez", "Jose Israel", "" ], [ "Tang", "Xiaoxian", "" ] ]
TITLE: Data-Discriminants of Likelihood Equations ABSTRACT: Maximum likelihood estimation (MLE) is a fundamental computational problem in statistics. The problem is to maximize the likelihood function with respect to given data on a statistical model. An algebraic approach to this problem is to solve a very structured parameterized polynomial system called likelihood equations. For general choices of data, the number of complex solutions to the likelihood equations is finite and called the ML-degree of the model. The only solutions to the likelihood equations that are statistically meaningful are the real/positive solutions. However, the number of real/positive solutions is not characterized by the ML-degree. We use discriminants to classify data according to the number of real/positive solutions of the likelihood equations. We call these discriminants data-discriminants (DD). We develop a probabilistic algorithm for computing DDs. Experimental results show that, for the benchmarks we have tried, the probabilistic algorithm is more efficient than the standard elimination algorithm. Based on the computational results, we discuss the real root classification problem for the 3 by 3 symmetric matrix~model.
no_new_dataset
0.949576
1505.01173
Hui Jiang
Hengyue Pan, Bo Wang and Hui Jiang
Deep Learning for Object Saliency Detection and Image Segmentation
9 pages, 126 figures, technical report
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we propose several novel deep learning methods for object saliency detection based on the powerful convolutional neural networks. In our approach, we use a gradient descent method to iteratively modify an input image based on the pixel-wise gradients to reduce a cost function measuring the class-specific objectness of the image. The pixel-wise gradients can be efficiently computed using the back-propagation algorithm. The discrepancy between the modified image and the original one may be used as a saliency map for the image. Moreover, we have further proposed several new training methods to learn saliency-specific convolutional nets for object saliency detection, in order to leverage the available pixel-wise segmentation information. Our methods are extremely computationally efficient (processing 20-40 images per second in one GPU). In this work, we use the computed saliency maps for image segmentation. Experimental results on two benchmark tasks, namely Microsoft COCO and Pascal VOC 2012, have shown that our proposed methods can generate high-quality salience maps, clearly outperforming many existing methods. In particular, our approaches excel in handling many difficult images, which contain complex background, highly-variable salient objects, multiple objects, and/or very small salient objects.
[ { "version": "v1", "created": "Tue, 5 May 2015 20:03:07 GMT" } ]
2015-05-07T00:00:00
[ [ "Pan", "Hengyue", "" ], [ "Wang", "Bo", "" ], [ "Jiang", "Hui", "" ] ]
TITLE: Deep Learning for Object Saliency Detection and Image Segmentation ABSTRACT: In this paper, we propose several novel deep learning methods for object saliency detection based on the powerful convolutional neural networks. In our approach, we use a gradient descent method to iteratively modify an input image based on the pixel-wise gradients to reduce a cost function measuring the class-specific objectness of the image. The pixel-wise gradients can be efficiently computed using the back-propagation algorithm. The discrepancy between the modified image and the original one may be used as a saliency map for the image. Moreover, we have further proposed several new training methods to learn saliency-specific convolutional nets for object saliency detection, in order to leverage the available pixel-wise segmentation information. Our methods are extremely computationally efficient (processing 20-40 images per second in one GPU). In this work, we use the computed saliency maps for image segmentation. Experimental results on two benchmark tasks, namely Microsoft COCO and Pascal VOC 2012, have shown that our proposed methods can generate high-quality salience maps, clearly outperforming many existing methods. In particular, our approaches excel in handling many difficult images, which contain complex background, highly-variable salient objects, multiple objects, and/or very small salient objects.
no_new_dataset
0.946051
1505.01210
Lars Bonnichsen
Lars F. Bonnichsen, Christian W. Probst, Sven Karlsson
Implementation of BT-trees
null
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This document presents the full implementation details of BT-trees, a highly efficient ordered map, and an evaluation which compares BT-trees with unordered maps. BT- trees are often much faster than other ordered maps, and have comparable performance to unordered map implementations. However, in benchmarks which favor unordered maps, BT-trees are not faster than the fastest unordered map implementations we know of.
[ { "version": "v1", "created": "Tue, 5 May 2015 22:40:19 GMT" } ]
2015-05-07T00:00:00
[ [ "Bonnichsen", "Lars F.", "" ], [ "Probst", "Christian W.", "" ], [ "Karlsson", "Sven", "" ] ]
TITLE: Implementation of BT-trees ABSTRACT: This document presents the full implementation details of BT-trees, a highly efficient ordered map, and an evaluation which compares BT-trees with unordered maps. BT- trees are often much faster than other ordered maps, and have comparable performance to unordered map implementations. However, in benchmarks which favor unordered maps, BT-trees are not faster than the fastest unordered map implementations we know of.
no_new_dataset
0.947866
1505.01257
Tatiana Tommasi
Tatiana Tommasi, Novi Patricia, Barbara Caputo, Tinne Tuytelaars
A Deeper Look at Dataset Bias
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The presence of a bias in each image data collection has recently attracted a lot of attention in the computer vision community showing the limits in generalization of any learning method trained on a specific dataset. At the same time, with the rapid development of deep learning architectures, the activation values of Convolutional Neural Networks (CNN) are emerging as reliable and robust image descriptors. In this paper we propose to verify the potential of the DeCAF features when facing the dataset bias problem. We conduct a series of analyses looking at how existing datasets differ among each other and verifying the performance of existing debiasing methods under different representations. We learn important lessons on which part of the dataset bias problem can be considered solved and which open questions still need to be tackled.
[ { "version": "v1", "created": "Wed, 6 May 2015 06:19:23 GMT" } ]
2015-05-07T00:00:00
[ [ "Tommasi", "Tatiana", "" ], [ "Patricia", "Novi", "" ], [ "Caputo", "Barbara", "" ], [ "Tuytelaars", "Tinne", "" ] ]
TITLE: A Deeper Look at Dataset Bias ABSTRACT: The presence of a bias in each image data collection has recently attracted a lot of attention in the computer vision community showing the limits in generalization of any learning method trained on a specific dataset. At the same time, with the rapid development of deep learning architectures, the activation values of Convolutional Neural Networks (CNN) are emerging as reliable and robust image descriptors. In this paper we propose to verify the potential of the DeCAF features when facing the dataset bias problem. We conduct a series of analyses looking at how existing datasets differ among each other and verifying the performance of existing debiasing methods under different representations. We learn important lessons on which part of the dataset bias problem can be considered solved and which open questions still need to be tackled.
no_new_dataset
0.942665
1505.01350
Ozgur Yilmaz
Ozgur Yilmaz
Classification of Occluded Objects using Fast Recurrent Processing
arXiv admin note: text overlap with arXiv:1409.8576 by other authors
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recurrent neural networks are powerful tools for handling incomplete data problems in computer vision, thanks to their significant generative capabilities. However, the computational demand for these algorithms is too high to work in real time, without specialized hardware or software solutions. In this paper, we propose a framework for augmenting recurrent processing capabilities into a feedforward network without sacrificing much from computational efficiency. We assume a mixture model and generate samples of the last hidden layer according to the class decisions of the output layer, modify the hidden layer activity using the samples, and propagate to lower layers. For visual occlusion problem, the iterative procedure emulates feedforward-feedback loop, filling-in the missing hidden layer activity with meaningful representations. The proposed algorithm is tested on a widely used dataset, and shown to achieve 2$\times$ improvement in classification accuracy for occluded objects. When compared to Restricted Boltzmann Machines, our algorithm shows superior performance for occluded object classification.
[ { "version": "v1", "created": "Wed, 6 May 2015 12:58:58 GMT" } ]
2015-05-07T00:00:00
[ [ "Yilmaz", "Ozgur", "" ] ]
TITLE: Classification of Occluded Objects using Fast Recurrent Processing ABSTRACT: Recurrent neural networks are powerful tools for handling incomplete data problems in computer vision, thanks to their significant generative capabilities. However, the computational demand for these algorithms is too high to work in real time, without specialized hardware or software solutions. In this paper, we propose a framework for augmenting recurrent processing capabilities into a feedforward network without sacrificing much from computational efficiency. We assume a mixture model and generate samples of the last hidden layer according to the class decisions of the output layer, modify the hidden layer activity using the samples, and propagate to lower layers. For visual occlusion problem, the iterative procedure emulates feedforward-feedback loop, filling-in the missing hidden layer activity with meaningful representations. The proposed algorithm is tested on a widely used dataset, and shown to achieve 2$\times$ improvement in classification accuracy for occluded objects. When compared to Restricted Boltzmann Machines, our algorithm shows superior performance for occluded object classification.
no_new_dataset
0.949059
1505.01474
Robyn Ffrancon
Robyn Ffrancon
Retaining Experience and Growing Solutions
null
null
null
null
cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Generally, when genetic programming (GP) is used for function synthesis any valuable experience gained by the system is lost from one problem to the next, even when the problems are closely related. With the aim of developing a system which retains beneficial experience from problem to problem, this paper introduces the novel Node-by-Node Growth Solver (NNGS) algorithm which features a component, called the controller, which can be adapted and improved for use across a set of related problems. NNGS grows a single solution tree from root to leaves. Using semantic backpropagation and acting locally on each node in turn, the algorithm employs the controller to assign subsequent child nodes until a fully formed solution is generated. The aim of this paper is to pave a path towards the use of a neural network as the controller component and also, separately, towards the use of meta-GP as a mechanism for improving the controller component. A proof-of-concept controller is discussed which demonstrates the success and potential of the NNGS algorithm. In this case, the controller constitutes a set of hand written rules which can be used to deterministically and greedily solve standard Boolean function synthesis benchmarks. Even before employing machine learning to improve the controller, the algorithm vastly outperforms other well known recent algorithms on run times, maintains comparable solution sizes, and has a 100% success rate on all Boolean function synthesis benchmarks tested so far.
[ { "version": "v1", "created": "Wed, 6 May 2015 19:40:26 GMT" } ]
2015-05-07T00:00:00
[ [ "Ffrancon", "Robyn", "" ] ]
TITLE: Retaining Experience and Growing Solutions ABSTRACT: Generally, when genetic programming (GP) is used for function synthesis any valuable experience gained by the system is lost from one problem to the next, even when the problems are closely related. With the aim of developing a system which retains beneficial experience from problem to problem, this paper introduces the novel Node-by-Node Growth Solver (NNGS) algorithm which features a component, called the controller, which can be adapted and improved for use across a set of related problems. NNGS grows a single solution tree from root to leaves. Using semantic backpropagation and acting locally on each node in turn, the algorithm employs the controller to assign subsequent child nodes until a fully formed solution is generated. The aim of this paper is to pave a path towards the use of a neural network as the controller component and also, separately, towards the use of meta-GP as a mechanism for improving the controller component. A proof-of-concept controller is discussed which demonstrates the success and potential of the NNGS algorithm. In this case, the controller constitutes a set of hand written rules which can be used to deterministically and greedily solve standard Boolean function synthesis benchmarks. Even before employing machine learning to improve the controller, the algorithm vastly outperforms other well known recent algorithms on run times, maintains comparable solution sizes, and has a 100% success rate on all Boolean function synthesis benchmarks tested so far.
no_new_dataset
0.941708
1301.3516
Mateusz Malinowski
Mateusz Malinowski and Mario Fritz
Learnable Pooling Regions for Image Classification
null
null
null
null
cs.CV cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Biologically inspired, from the early HMAX model to Spatial Pyramid Matching, pooling has played an important role in visual recognition pipelines. Spatial pooling, by grouping of local codes, equips these methods with a certain degree of robustness to translation and deformation yet preserving important spatial information. Despite the predominance of this approach in current recognition systems, we have seen little progress to fully adapt the pooling strategy to the task at hand. This paper proposes a model for learning task dependent pooling scheme -- including previously proposed hand-crafted pooling schemes as a particular instantiation. In our work, we investigate the role of different regularization terms showing that the smooth regularization term is crucial to achieve strong performance using the presented architecture. Finally, we propose an efficient and parallel method to train the model. Our experiments show improved performance over hand-crafted pooling schemes on the CIFAR-10 and CIFAR-100 datasets -- in particular improving the state-of-the-art to 56.29% on the latter.
[ { "version": "v1", "created": "Tue, 15 Jan 2013 22:15:06 GMT" }, { "version": "v2", "created": "Tue, 6 Aug 2013 13:51:04 GMT" }, { "version": "v3", "created": "Tue, 5 May 2015 18:12:46 GMT" } ]
2015-05-06T00:00:00
[ [ "Malinowski", "Mateusz", "" ], [ "Fritz", "Mario", "" ] ]
TITLE: Learnable Pooling Regions for Image Classification ABSTRACT: Biologically inspired, from the early HMAX model to Spatial Pyramid Matching, pooling has played an important role in visual recognition pipelines. Spatial pooling, by grouping of local codes, equips these methods with a certain degree of robustness to translation and deformation yet preserving important spatial information. Despite the predominance of this approach in current recognition systems, we have seen little progress to fully adapt the pooling strategy to the task at hand. This paper proposes a model for learning task dependent pooling scheme -- including previously proposed hand-crafted pooling schemes as a particular instantiation. In our work, we investigate the role of different regularization terms showing that the smooth regularization term is crucial to achieve strong performance using the presented architecture. Finally, we propose an efficient and parallel method to train the model. Our experiments show improved performance over hand-crafted pooling schemes on the CIFAR-10 and CIFAR-100 datasets -- in particular improving the state-of-the-art to 56.29% on the latter.
no_new_dataset
0.943138
1410.0210
Mateusz Malinowski
Mateusz Malinowski and Mario Fritz
A Multi-World Approach to Question Answering about Real-World Scenes based on Uncertain Input
Published in NIPS 2014
null
null
null
cs.AI cs.CL cs.CV cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a method for automatically answering questions about images by bringing together recent advances from natural language processing and computer vision. We combine discrete reasoning with uncertain predictions by a multi-world approach that represents uncertainty about the perceived world in a bayesian framework. Our approach can handle human questions of high complexity about realistic scenes and replies with range of answer like counts, object classes, instances and lists of them. The system is directly trained from question-answer pairs. We establish a first benchmark for this task that can be seen as a modern attempt at a visual turing test.
[ { "version": "v1", "created": "Wed, 1 Oct 2014 12:59:16 GMT" }, { "version": "v2", "created": "Wed, 29 Oct 2014 16:29:44 GMT" }, { "version": "v3", "created": "Tue, 11 Nov 2014 12:13:18 GMT" }, { "version": "v4", "created": "Tue, 5 May 2015 17:39:10 GMT" } ]
2015-05-06T00:00:00
[ [ "Malinowski", "Mateusz", "" ], [ "Fritz", "Mario", "" ] ]
TITLE: A Multi-World Approach to Question Answering about Real-World Scenes based on Uncertain Input ABSTRACT: We propose a method for automatically answering questions about images by bringing together recent advances from natural language processing and computer vision. We combine discrete reasoning with uncertain predictions by a multi-world approach that represents uncertainty about the perceived world in a bayesian framework. Our approach can handle human questions of high complexity about realistic scenes and replies with range of answer like counts, object classes, instances and lists of them. The system is directly trained from question-answer pairs. We establish a first benchmark for this task that can be seen as a modern attempt at a visual turing test.
new_dataset
0.878783
1411.5190
Mateusz Malinowski
Mateusz Malinowski and Mario Fritz
A Pooling Approach to Modelling Spatial Relations for Image Retrieval and Annotation
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Over the last two decades we have witnessed strong progress on modeling visual object classes, scenes and attributes that have significantly contributed to automated image understanding. On the other hand, surprisingly little progress has been made on incorporating a spatial representation and reasoning in the inference process. In this work, we propose a pooling interpretation of spatial relations and show how it improves image retrieval and annotations tasks involving spatial language. Due to the complexity of the spatial language, we argue for a learning-based approach that acquires a representation of spatial relations by learning parameters of the pooling operator. We show improvements on previous work on two datasets and two different tasks as well as provide additional insights on a new dataset with an explicit focus on spatial relations.
[ { "version": "v1", "created": "Wed, 19 Nov 2014 11:44:24 GMT" }, { "version": "v2", "created": "Tue, 5 May 2015 17:55:23 GMT" } ]
2015-05-06T00:00:00
[ [ "Malinowski", "Mateusz", "" ], [ "Fritz", "Mario", "" ] ]
TITLE: A Pooling Approach to Modelling Spatial Relations for Image Retrieval and Annotation ABSTRACT: Over the last two decades we have witnessed strong progress on modeling visual object classes, scenes and attributes that have significantly contributed to automated image understanding. On the other hand, surprisingly little progress has been made on incorporating a spatial representation and reasoning in the inference process. In this work, we propose a pooling interpretation of spatial relations and show how it improves image retrieval and annotations tasks involving spatial language. Due to the complexity of the spatial language, we argue for a learning-based approach that acquires a representation of spatial relations by learning parameters of the pooling operator. We show improvements on previous work on two datasets and two different tasks as well as provide additional insights on a new dataset with an explicit focus on spatial relations.
new_dataset
0.608798
1412.8556
Jingming Dong
Jingming Dong, Stefano Soatto
Domain-Size Pooling in Local Descriptors: DSP-SIFT
Extended version of the CVPR 2015 paper. Technical Report UCLA CSD 140022
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce a simple modification of local image descriptors, such as SIFT, based on pooling gradient orientations across different domain sizes, in addition to spatial locations. The resulting descriptor, which we call DSP-SIFT, outperforms other methods in wide-baseline matching benchmarks, including those based on convolutional neural networks, despite having the same dimension of SIFT and requiring no training.
[ { "version": "v1", "created": "Tue, 30 Dec 2014 03:49:47 GMT" }, { "version": "v2", "created": "Sat, 28 Feb 2015 20:36:01 GMT" }, { "version": "v3", "created": "Tue, 5 May 2015 05:36:05 GMT" } ]
2015-05-06T00:00:00
[ [ "Dong", "Jingming", "" ], [ "Soatto", "Stefano", "" ] ]
TITLE: Domain-Size Pooling in Local Descriptors: DSP-SIFT ABSTRACT: We introduce a simple modification of local image descriptors, such as SIFT, based on pooling gradient orientations across different domain sizes, in addition to spatial locations. The resulting descriptor, which we call DSP-SIFT, outperforms other methods in wide-baseline matching benchmarks, including those based on convolutional neural networks, despite having the same dimension of SIFT and requiring no training.
no_new_dataset
0.953057
1504.06451
Marios Meimaris
Marios Meimaris, George Papastefanatos, Christos Pateritsas, Theodora Galani and Yannis Stavrakas
A Framework for Managing Evolving Information Resources on the Data Web
arXiv admin note: text overlap with arXiv:1504.01891
null
null
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The web of data has brought forth the need to preserve and sustain evolving information within linked datasets; however, a basic requirement of data preservation is the maintenance of the datasets' structural characteristics as well. As open data are often found using different and/or heterogeneous data models and schemata from one source to another, there is a need to reconcile these mismatches and provide common denominations of interpretation on a multitude of levels, in order to be able to preserve and manage the evolution of the generated resources. In this paper, we present a linked data approach for the preservation and archiving of open heterogeneous datasets that evolve through time, at both the structural and the semantic layer. We first propose a set of re-quirements for modelling evolving linked datasets. We then proceed on concep-tualizing a modelling framework for evolving entities and place these in a 2x2 model space that consists of the semantic and the temporal dimensions.
[ { "version": "v1", "created": "Fri, 24 Apr 2015 10:02:01 GMT" }, { "version": "v2", "created": "Tue, 5 May 2015 14:43:54 GMT" } ]
2015-05-06T00:00:00
[ [ "Meimaris", "Marios", "" ], [ "Papastefanatos", "George", "" ], [ "Pateritsas", "Christos", "" ], [ "Galani", "Theodora", "" ], [ "Stavrakas", "Yannis", "" ] ]
TITLE: A Framework for Managing Evolving Information Resources on the Data Web ABSTRACT: The web of data has brought forth the need to preserve and sustain evolving information within linked datasets; however, a basic requirement of data preservation is the maintenance of the datasets' structural characteristics as well. As open data are often found using different and/or heterogeneous data models and schemata from one source to another, there is a need to reconcile these mismatches and provide common denominations of interpretation on a multitude of levels, in order to be able to preserve and manage the evolution of the generated resources. In this paper, we present a linked data approach for the preservation and archiving of open heterogeneous datasets that evolve through time, at both the structural and the semantic layer. We first propose a set of re-quirements for modelling evolving linked datasets. We then proceed on concep-tualizing a modelling framework for evolving entities and place these in a 2x2 model space that consists of the semantic and the temporal dimensions.
no_new_dataset
0.943034
1505.00796
Stefanie Haustein
Stefanie Haustein, Timothy D. Bowman and Rodrigo Costas
When is an article actually published? An analysis of online availability, publication, and indexation dates
accepted for presentation at 15th International Conference on Scientometrics and Informetrics (ISSI) 2015
null
null
null
cs.DL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
With the acceleration of scholarly communication in the digital era, the publication year is no longer a sufficient level of time aggregation for bibliometric and social media indicators. Papers are increasingly cited before they have been officially published in a journal issue and mentioned on Twitter within days of online availability. In order to find a suitable proxy for the day of online publication allowing for the computation of more accurate benchmarks and fine-grained citation and social media event windows, various dates are compared for a set of 58,896 papers published by Nature Publishing Group, PLOS, Springer and Wiley-Blackwell in 2012. Dates include the online date provided by the publishers, the month of the journal issue, the Web of Science indexing date, the date of the first tweet mentioning the paper as well as the Altmetric.com publication and first-seen dates. Comparing these dates, the analysis reveals that large differences exist between publishers, leading to the conclusion that more transparency and standardization is needed in the reporting of publication dates. The date on which the fixed journal article (Version of Record) is first made available on the publisher's website is proposed as a consistent definition of the online date.
[ { "version": "v1", "created": "Mon, 4 May 2015 20:07:47 GMT" } ]
2015-05-06T00:00:00
[ [ "Haustein", "Stefanie", "" ], [ "Bowman", "Timothy D.", "" ], [ "Costas", "Rodrigo", "" ] ]
TITLE: When is an article actually published? An analysis of online availability, publication, and indexation dates ABSTRACT: With the acceleration of scholarly communication in the digital era, the publication year is no longer a sufficient level of time aggregation for bibliometric and social media indicators. Papers are increasingly cited before they have been officially published in a journal issue and mentioned on Twitter within days of online availability. In order to find a suitable proxy for the day of online publication allowing for the computation of more accurate benchmarks and fine-grained citation and social media event windows, various dates are compared for a set of 58,896 papers published by Nature Publishing Group, PLOS, Springer and Wiley-Blackwell in 2012. Dates include the online date provided by the publishers, the month of the journal issue, the Web of Science indexing date, the date of the first tweet mentioning the paper as well as the Altmetric.com publication and first-seen dates. Comparing these dates, the analysis reveals that large differences exist between publishers, leading to the conclusion that more transparency and standardization is needed in the reporting of publication dates. The date on which the fixed journal article (Version of Record) is first made available on the publisher's website is proposed as a consistent definition of the online date.
no_new_dataset
0.945096
1505.00824
Eva Dyer
Eva L. Dyer, Tom A. Goldstein, Raajen Patel, Konrad P. Kording, and Richard G. Baraniuk
Self-Expressive Decompositions for Matrix Approximation and Clustering
11 pages, 7 figures
null
null
null
cs.IT cs.CV cs.LG math.IT stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Data-aware methods for dimensionality reduction and matrix decomposition aim to find low-dimensional structure in a collection of data. Classical approaches discover such structure by learning a basis that can efficiently express the collection. Recently, "self expression", the idea of using a small subset of data vectors to represent the full collection, has been developed as an alternative to learning. Here, we introduce a scalable method for computing sparse SElf-Expressive Decompositions (SEED). SEED is a greedy method that constructs a basis by sequentially selecting incoherent vectors from the dataset. After forming a basis from a subset of vectors in the dataset, SEED then computes a sparse representation of the dataset with respect to this basis. We develop sufficient conditions under which SEED exactly represents low rank matrices and vectors sampled from a unions of independent subspaces. We show how SEED can be used in applications ranging from matrix approximation and denoising to clustering, and apply it to numerous real-world datasets. Our results demonstrate that SEED is an attractive low-complexity alternative to other sparse matrix factorization approaches such as sparse PCA and self-expressive methods for clustering.
[ { "version": "v1", "created": "Mon, 4 May 2015 21:56:54 GMT" } ]
2015-05-06T00:00:00
[ [ "Dyer", "Eva L.", "" ], [ "Goldstein", "Tom A.", "" ], [ "Patel", "Raajen", "" ], [ "Kording", "Konrad P.", "" ], [ "Baraniuk", "Richard G.", "" ] ]
TITLE: Self-Expressive Decompositions for Matrix Approximation and Clustering ABSTRACT: Data-aware methods for dimensionality reduction and matrix decomposition aim to find low-dimensional structure in a collection of data. Classical approaches discover such structure by learning a basis that can efficiently express the collection. Recently, "self expression", the idea of using a small subset of data vectors to represent the full collection, has been developed as an alternative to learning. Here, we introduce a scalable method for computing sparse SElf-Expressive Decompositions (SEED). SEED is a greedy method that constructs a basis by sequentially selecting incoherent vectors from the dataset. After forming a basis from a subset of vectors in the dataset, SEED then computes a sparse representation of the dataset with respect to this basis. We develop sufficient conditions under which SEED exactly represents low rank matrices and vectors sampled from a unions of independent subspaces. We show how SEED can be used in applications ranging from matrix approximation and denoising to clustering, and apply it to numerous real-world datasets. Our results demonstrate that SEED is an attractive low-complexity alternative to other sparse matrix factorization approaches such as sparse PCA and self-expressive methods for clustering.
no_new_dataset
0.941061