id
large_stringlengths
9
16
submitter
large_stringlengths
3
64
authors
large_stringlengths
5
20.7k
title
large_stringlengths
5
245
comments
large_stringlengths
1
482
journal-ref
large_stringlengths
4
382
doi
large_stringlengths
9
151
report-no
large_stringlengths
2
509
categories
large_stringlengths
5
78
license
large_stringclasses
9 values
abstract
large_stringlengths
83
3.55k
versions
large listlengths
1
21
update_date
timestamp[ms]date
2007-05-23 00:00:00
2025-04-25 00:00:00
authors_parsed
large listlengths
1
1.35k
prompt
large_stringlengths
166
3.64k
label
stringclasses
2 values
prob
float64
0.5
0.98
1504.04558
Quanzeng You
Quanzeng You, Sumit Bhatia, Jiebo Luo
A Picture Tells a Thousand Words -- About You! User Interest Profiling from User Generated Visual Content
7 pages, 6 Figures, 4 Tables
null
null
null
cs.SI cs.IR cs.MM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Inference of online social network users' attributes and interests has been an active research topic. Accurate identification of users' attributes and interests is crucial for improving the performance of personalization and recommender systems. Most of the existing works have focused on textual content generated by the users and have successfully used it for predicting users' interests and other identifying attributes. However, little attention has been paid to user generated visual content (images) that is becoming increasingly popular and pervasive in recent times. We posit that images posted by users on online social networks are a reflection of topics they are interested in and propose an approach to infer user attributes from images posted by them. We analyze the content of individual images and then aggregate the image-level knowledge to infer user-level interest distribution. We employ image-level similarity to propagate the label information between images, as well as utilize the image category information derived from the user created organization structure to further propagate the category-level knowledge for all images. A real life social network dataset created from Pinterest is used for evaluation and the experimental results demonstrate the effectiveness of our proposed approach.
[ { "version": "v1", "created": "Fri, 17 Apr 2015 16:28:35 GMT" } ]
2015-04-21T00:00:00
[ [ "You", "Quanzeng", "" ], [ "Bhatia", "Sumit", "" ], [ "Luo", "Jiebo", "" ] ]
TITLE: A Picture Tells a Thousand Words -- About You! User Interest Profiling from User Generated Visual Content ABSTRACT: Inference of online social network users' attributes and interests has been an active research topic. Accurate identification of users' attributes and interests is crucial for improving the performance of personalization and recommender systems. Most of the existing works have focused on textual content generated by the users and have successfully used it for predicting users' interests and other identifying attributes. However, little attention has been paid to user generated visual content (images) that is becoming increasingly popular and pervasive in recent times. We posit that images posted by users on online social networks are a reflection of topics they are interested in and propose an approach to infer user attributes from images posted by them. We analyze the content of individual images and then aggregate the image-level knowledge to infer user-level interest distribution. We employ image-level similarity to propagate the label information between images, as well as utilize the image category information derived from the user created organization structure to further propagate the category-level knowledge for all images. A real life social network dataset created from Pinterest is used for evaluation and the experimental results demonstrate the effectiveness of our proposed approach.
no_new_dataset
0.914901
1504.04596
Yadong Zhu
Yadong Zhu, Yanyan Lan, Jiafeng Guo, Xueqi Cheng
Structural Learning of Diverse Ranking
Discriminant Function, Diversity Feature, Learning Framework
null
null
null
cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Relevance and diversity are both crucial criteria for an effective search system. In this paper, we propose a unified learning framework for simultaneously optimizing both relevance and diversity. Specifically, the problem is formalized as a structural learning framework optimizing Diversity-Correlated Evaluation Measures (DCEM), such as ERR-IA, a-NDCG and NRBP. Within this framework, the discriminant function is defined to be a bi-criteria objective maximizing the sum of the relevance scores and dissimilarities (or diversity) among the documents. Relevance and diversity features are utilized to define the relevance scores and dissimilarities, respectively. Compared with traditional methods, the advantages of our approach lie in that: (1) Directly optimizing DCEM as the loss function is more fundamental for the task; (2) Our framework does not rely on explicit diversity information such as subtopics, thus is more adaptive to real application; (3) The representation of diversity as the feature-based scoring function is more flexible to incorporate rich diversity-based features into the learning framework. Extensive experiments on the public TREC datasets show that our approach significantly outperforms state-of-the-art diversification approaches, which validate the above advantages.
[ { "version": "v1", "created": "Fri, 17 Apr 2015 18:23:16 GMT" }, { "version": "v2", "created": "Mon, 20 Apr 2015 09:59:00 GMT" } ]
2015-04-21T00:00:00
[ [ "Zhu", "Yadong", "" ], [ "Lan", "Yanyan", "" ], [ "Guo", "Jiafeng", "" ], [ "Cheng", "Xueqi", "" ] ]
TITLE: Structural Learning of Diverse Ranking ABSTRACT: Relevance and diversity are both crucial criteria for an effective search system. In this paper, we propose a unified learning framework for simultaneously optimizing both relevance and diversity. Specifically, the problem is formalized as a structural learning framework optimizing Diversity-Correlated Evaluation Measures (DCEM), such as ERR-IA, a-NDCG and NRBP. Within this framework, the discriminant function is defined to be a bi-criteria objective maximizing the sum of the relevance scores and dissimilarities (or diversity) among the documents. Relevance and diversity features are utilized to define the relevance scores and dissimilarities, respectively. Compared with traditional methods, the advantages of our approach lie in that: (1) Directly optimizing DCEM as the loss function is more fundamental for the task; (2) Our framework does not rely on explicit diversity information such as subtopics, thus is more adaptive to real application; (3) The representation of diversity as the feature-based scoring function is more flexible to incorporate rich diversity-based features into the learning framework. Extensive experiments on the public TREC datasets show that our approach significantly outperforms state-of-the-art diversification approaches, which validate the above advantages.
no_new_dataset
0.946794
1504.04646
Kwetishe Danjuma
Kwetishe Joro Danjuma
Performance Evaluation of Machine Learning Algorithms in Post-operative Life Expectancy in the Lung Cancer Patients
11 pages, 3 figures, 2 tables, ISSN (Print): 1694-0814 | ISSN (Online): 1694-0784
IJCSI International Journal of Computer Science Issues, Volume 12, Issue 2, March 2015
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The nature of clinical data makes it difficult to quickly select, tune and apply machine learning algorithms to clinical prognosis. As a result, a lot of time is spent searching for the most appropriate machine learning algorithms applicable in clinical prognosis that contains either binary-valued or multi-valued attributes. The study set out to identify and evaluate the performance of machine learning classification schemes applied in clinical prognosis of post-operative life expectancy in the lung cancer patients. Multilayer Perceptron, J48, and the Naive Bayes algorithms were used to train and test models on Thoracic Surgery datasets obtained from the University of California Irvine machine learning repository. Stratified 10-fold cross-validation was used to evaluate baseline performance accuracy of the classifiers. The comparative analysis shows that multilayer perceptron performed best with classification accuracy of 82.3%, J48 came out second with classification accuracy of 81.8%, and Naive Bayes came out the worst with classification accuracy of 74.4%. The quality and outcome of the chosen machine learning algorithms depends on the ingenuity of the clinical miner.
[ { "version": "v1", "created": "Fri, 17 Apr 2015 22:05:34 GMT" } ]
2015-04-21T00:00:00
[ [ "Danjuma", "Kwetishe Joro", "" ] ]
TITLE: Performance Evaluation of Machine Learning Algorithms in Post-operative Life Expectancy in the Lung Cancer Patients ABSTRACT: The nature of clinical data makes it difficult to quickly select, tune and apply machine learning algorithms to clinical prognosis. As a result, a lot of time is spent searching for the most appropriate machine learning algorithms applicable in clinical prognosis that contains either binary-valued or multi-valued attributes. The study set out to identify and evaluate the performance of machine learning classification schemes applied in clinical prognosis of post-operative life expectancy in the lung cancer patients. Multilayer Perceptron, J48, and the Naive Bayes algorithms were used to train and test models on Thoracic Surgery datasets obtained from the University of California Irvine machine learning repository. Stratified 10-fold cross-validation was used to evaluate baseline performance accuracy of the classifiers. The comparative analysis shows that multilayer perceptron performed best with classification accuracy of 82.3%, J48 came out second with classification accuracy of 81.8%, and Naive Bayes came out the worst with classification accuracy of 74.4%. The quality and outcome of the chosen machine learning algorithms depends on the ingenuity of the clinical miner.
no_new_dataset
0.946941
1504.04730
Sourav Bhattacharya
Sourav Bhattacharya and Otto Huhta and N. Asokan
LookAhead: Augmenting Crowdsourced Website Reputation Systems With Predictive Modeling
12 pages
null
null
null
cs.CR cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Unsafe websites consist of malicious as well as inappropriate sites, such as those hosting questionable or offensive content. Website reputation systems are intended to help ordinary users steer away from these unsafe sites. However, the process of assigning safety ratings for websites typically involves humans. Consequently it is time consuming, costly and not scalable. This has resulted in two major problems: (i) a significant proportion of the web space remains unrated and (ii) there is an unacceptable time lag before new websites are rated. In this paper, we show that by leveraging structural and content-based properties of websites, it is possible to reliably and efficiently predict their safety ratings, thereby mitigating both problems. We demonstrate the effectiveness of our approach using four datasets of up to 90,000 websites. We use ratings from Web of Trust (WOT), a popular crowdsourced web reputation system, as ground truth. We propose a novel ensemble classification technique that makes opportunistic use of available structural and content properties of webpages to predict their eventual ratings in two dimensions used by WOT: trustworthiness and child safety. Ours is the first classification system to predict such subjective ratings and the same approach works equally well in identifying malicious websites. Across all datasets, our classification performs well with average F$_1$-score in the 74--90\% range.
[ { "version": "v1", "created": "Sat, 18 Apr 2015 15:13:13 GMT" } ]
2015-04-21T00:00:00
[ [ "Bhattacharya", "Sourav", "" ], [ "Huhta", "Otto", "" ], [ "Asokan", "N.", "" ] ]
TITLE: LookAhead: Augmenting Crowdsourced Website Reputation Systems With Predictive Modeling ABSTRACT: Unsafe websites consist of malicious as well as inappropriate sites, such as those hosting questionable or offensive content. Website reputation systems are intended to help ordinary users steer away from these unsafe sites. However, the process of assigning safety ratings for websites typically involves humans. Consequently it is time consuming, costly and not scalable. This has resulted in two major problems: (i) a significant proportion of the web space remains unrated and (ii) there is an unacceptable time lag before new websites are rated. In this paper, we show that by leveraging structural and content-based properties of websites, it is possible to reliably and efficiently predict their safety ratings, thereby mitigating both problems. We demonstrate the effectiveness of our approach using four datasets of up to 90,000 websites. We use ratings from Web of Trust (WOT), a popular crowdsourced web reputation system, as ground truth. We propose a novel ensemble classification technique that makes opportunistic use of available structural and content properties of webpages to predict their eventual ratings in two dimensions used by WOT: trustworthiness and child safety. Ours is the first classification system to predict such subjective ratings and the same approach works equally well in identifying malicious websites. Across all datasets, our classification performs well with average F$_1$-score in the 74--90\% range.
no_new_dataset
0.949716
1504.04739
Wojciech Czarnecki
Rafal Jozefowicz, Wojciech Marian Czarnecki
Fast optimization of Multithreshold Entropy Linear Classifier
Presented at Theoretical Foundations of Machine Learning 2015 (http://tfml.gmum.net), final version published in Schedae Informaticae Journal
null
10.4467/20838476SI.14.005.3022
null
cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Multithreshold Entropy Linear Classifier (MELC) is a density based model which searches for a linear projection maximizing the Cauchy-Schwarz Divergence of dataset kernel density estimation. Despite its good empirical results, one of its drawbacks is the optimization speed. In this paper we analyze how one can speed it up through solving an approximate problem. We analyze two methods, both similar to the approximate solutions of the Kernel Density Estimation querying and provide adaptive schemes for selecting a crucial parameters based on user-specified acceptable error. Furthermore we show how one can exploit well known conjugate gradients and L-BFGS optimizers despite the fact that the original optimization problem should be solved on the sphere. All above methods and modifications are tested on 10 real life datasets from UCI repository to confirm their practical usability.
[ { "version": "v1", "created": "Sat, 18 Apr 2015 16:19:22 GMT" } ]
2015-04-21T00:00:00
[ [ "Jozefowicz", "Rafal", "" ], [ "Czarnecki", "Wojciech Marian", "" ] ]
TITLE: Fast optimization of Multithreshold Entropy Linear Classifier ABSTRACT: Multithreshold Entropy Linear Classifier (MELC) is a density based model which searches for a linear projection maximizing the Cauchy-Schwarz Divergence of dataset kernel density estimation. Despite its good empirical results, one of its drawbacks is the optimization speed. In this paper we analyze how one can speed it up through solving an approximate problem. We analyze two methods, both similar to the approximate solutions of the Kernel Density Estimation querying and provide adaptive schemes for selecting a crucial parameters based on user-specified acceptable error. Furthermore we show how one can exploit well known conjugate gradients and L-BFGS optimizers despite the fact that the original optimization problem should be solved on the sphere. All above methods and modifications are tested on 10 real life datasets from UCI repository to confirm their practical usability.
no_new_dataset
0.94743
1504.04740
Wojciech Czarnecki
Wojciech Marian Czarnecki
On the consistency of Multithreshold Entropy Linear Classifier
Presented at Theoretical Foundations of Machine Learning 2015 (http://tfml.gmum.net), final version published in Schedae Informaticae Journal
null
10.4467/20838476SI.15.012.3034
null
cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Multithreshold Entropy Linear Classifier (MELC) is a recent classifier idea which employs information theoretic concept in order to create a multithreshold maximum margin model. In this paper we analyze its consistency over multithreshold linear models and show that its objective function upper bounds the amount of misclassified points in a similar manner like hinge loss does in support vector machines. For further confirmation we also conduct some numerical experiments on five datasets.
[ { "version": "v1", "created": "Sat, 18 Apr 2015 16:29:26 GMT" } ]
2015-04-21T00:00:00
[ [ "Czarnecki", "Wojciech Marian", "" ] ]
TITLE: On the consistency of Multithreshold Entropy Linear Classifier ABSTRACT: Multithreshold Entropy Linear Classifier (MELC) is a recent classifier idea which employs information theoretic concept in order to create a multithreshold maximum margin model. In this paper we analyze its consistency over multithreshold linear models and show that its objective function upper bounds the amount of misclassified points in a similar manner like hinge loss does in support vector machines. For further confirmation we also conduct some numerical experiments on five datasets.
no_new_dataset
0.955693
1504.04788
Wenlin Chen
Wenlin Chen and James T. Wilson and Stephen Tyree and Kilian Q. Weinberger and Yixin Chen
Compressing Neural Networks with the Hashing Trick
null
null
null
null
cs.LG cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
As deep nets are increasingly used in applications suited for mobile devices, a fundamental dilemma becomes apparent: the trend in deep learning is to grow models to absorb ever-increasing data set sizes; however mobile devices are designed with very little memory and cannot store such large models. We present a novel network architecture, HashedNets, that exploits inherent redundancy in neural networks to achieve drastic reductions in model sizes. HashedNets uses a low-cost hash function to randomly group connection weights into hash buckets, and all connections within the same hash bucket share a single parameter value. These parameters are tuned to adjust to the HashedNets weight sharing architecture with standard backprop during training. Our hashing procedure introduces no additional memory overhead, and we demonstrate on several benchmark data sets that HashedNets shrink the storage requirements of neural networks substantially while mostly preserving generalization performance.
[ { "version": "v1", "created": "Sun, 19 Apr 2015 04:24:15 GMT" } ]
2015-04-21T00:00:00
[ [ "Chen", "Wenlin", "" ], [ "Wilson", "James T.", "" ], [ "Tyree", "Stephen", "" ], [ "Weinberger", "Kilian Q.", "" ], [ "Chen", "Yixin", "" ] ]
TITLE: Compressing Neural Networks with the Hashing Trick ABSTRACT: As deep nets are increasingly used in applications suited for mobile devices, a fundamental dilemma becomes apparent: the trend in deep learning is to grow models to absorb ever-increasing data set sizes; however mobile devices are designed with very little memory and cannot store such large models. We present a novel network architecture, HashedNets, that exploits inherent redundancy in neural networks to achieve drastic reductions in model sizes. HashedNets uses a low-cost hash function to randomly group connection weights into hash buckets, and all connections within the same hash bucket share a single parameter value. These parameters are tuned to adjust to the HashedNets weight sharing architecture with standard backprop during training. Our hashing procedure introduces no additional memory overhead, and we demonstrate on several benchmark data sets that HashedNets shrink the storage requirements of neural networks substantially while mostly preserving generalization performance.
no_new_dataset
0.94474
1504.04871
Sukrit Shankar
Sukrit Shankar, Vikas K. Garg, Roberto Cipolla
DEEP-CARVING: Discovering Visual Attributes by Carving Deep Neural Nets
10 pages, 8 figures, CVPR 2015
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Most of the approaches for discovering visual attributes in images demand significant supervision, which is cumbersome to obtain. In this paper, we aim to discover visual attributes in a weakly supervised setting that is commonly encountered with contemporary image search engines. Deep Convolutional Neural Networks (CNNs) have enjoyed remarkable success in vision applications recently. However, in a weakly supervised scenario, widely used CNN training procedures do not learn a robust model for predicting multiple attribute labels simultaneously. The primary reason is that the attributes highly co-occur within the training data. To ameliorate this limitation, we propose Deep-Carving, a novel training procedure with CNNs, that helps the net efficiently carve itself for the task of multiple attribute prediction. During training, the responses of the feature maps are exploited in an ingenious way to provide the net with multiple pseudo-labels (for training images) for subsequent iterations. The process is repeated periodically after a fixed number of iterations, and enables the net carve itself iteratively for efficiently disentangling features. Additionally, we contribute a noun-adjective pairing inspired Natural Scenes Attributes Dataset to the research community, CAMIT - NSAD, containing a number of co-occurring attributes within a noun category. We describe, in detail, salient aspects of this dataset. Our experiments on CAMIT-NSAD and the SUN Attributes Dataset, with weak supervision, clearly demonstrate that the Deep-Carved CNNs consistently achieve considerable improvement in the precision of attribute prediction over popular baseline methods.
[ { "version": "v1", "created": "Sun, 19 Apr 2015 18:56:52 GMT" } ]
2015-04-21T00:00:00
[ [ "Shankar", "Sukrit", "" ], [ "Garg", "Vikas K.", "" ], [ "Cipolla", "Roberto", "" ] ]
TITLE: DEEP-CARVING: Discovering Visual Attributes by Carving Deep Neural Nets ABSTRACT: Most of the approaches for discovering visual attributes in images demand significant supervision, which is cumbersome to obtain. In this paper, we aim to discover visual attributes in a weakly supervised setting that is commonly encountered with contemporary image search engines. Deep Convolutional Neural Networks (CNNs) have enjoyed remarkable success in vision applications recently. However, in a weakly supervised scenario, widely used CNN training procedures do not learn a robust model for predicting multiple attribute labels simultaneously. The primary reason is that the attributes highly co-occur within the training data. To ameliorate this limitation, we propose Deep-Carving, a novel training procedure with CNNs, that helps the net efficiently carve itself for the task of multiple attribute prediction. During training, the responses of the feature maps are exploited in an ingenious way to provide the net with multiple pseudo-labels (for training images) for subsequent iterations. The process is repeated periodically after a fixed number of iterations, and enables the net carve itself iteratively for efficiently disentangling features. Additionally, we contribute a noun-adjective pairing inspired Natural Scenes Attributes Dataset to the research community, CAMIT - NSAD, containing a number of co-occurring attributes within a noun category. We describe, in detail, salient aspects of this dataset. Our experiments on CAMIT-NSAD and the SUN Attributes Dataset, with weak supervision, clearly demonstrate that the Deep-Carved CNNs consistently achieve considerable improvement in the precision of attribute prediction over popular baseline methods.
no_new_dataset
0.717631
1504.04923
Chunhua Shen
Ruizhi Qiao, Lingqiao Liu, Chunhua Shen, and Anton von den Hengel
Learning discriminative trajectorylet detector sets for accurate skeleton-based action recognition
10 pages
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The introduction of low-cost RGB-D sensors has promoted the research in skeleton-based human action recognition. Devising a representation suitable for characterising actions on the basis of noisy skeleton sequences remains a challenge, however. We here provide two insights into this challenge. First, we show that the discriminative information of a skeleton sequence usually resides in a short temporal interval and we propose a simple-but-effective local descriptor called trajectorylet to capture the static and kinematic information within this interval. Second, we further propose to encode each trajectorylet with a discriminative trajectorylet detector set which is selected from a large number of candidate detectors trained through exemplar-SVMs. The action-level representation is obtained by pooling trajectorylet encodings. Evaluating on standard datasets acquired from the Kinect sensor, it is demonstrated that our method obtains superior results over existing approaches under various experimental setups.
[ { "version": "v1", "created": "Mon, 20 Apr 2015 02:41:03 GMT" } ]
2015-04-21T00:00:00
[ [ "Qiao", "Ruizhi", "" ], [ "Liu", "Lingqiao", "" ], [ "Shen", "Chunhua", "" ], [ "Hengel", "Anton von den", "" ] ]
TITLE: Learning discriminative trajectorylet detector sets for accurate skeleton-based action recognition ABSTRACT: The introduction of low-cost RGB-D sensors has promoted the research in skeleton-based human action recognition. Devising a representation suitable for characterising actions on the basis of noisy skeleton sequences remains a challenge, however. We here provide two insights into this challenge. First, we show that the discriminative information of a skeleton sequence usually resides in a short temporal interval and we propose a simple-but-effective local descriptor called trajectorylet to capture the static and kinematic information within this interval. Second, we further propose to encode each trajectorylet with a discriminative trajectorylet detector set which is selected from a large number of candidate detectors trained through exemplar-SVMs. The action-level representation is obtained by pooling trajectorylet encodings. Evaluating on standard datasets acquired from the Kinect sensor, it is demonstrated that our method obtains superior results over existing approaches under various experimental setups.
no_new_dataset
0.944228
1504.04945
Yadong Zhu
Yadong Zhu, Yanyan Lan, Jiafeng Guo, Xueqi Cheng
Topic-focused Dynamic Information Filtering in Social Media
null
null
null
null
cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
With the quick development of online social media such as twitter or sina weibo in china, many users usually track hot topics to satisfy their desired information need. For a hot topic, new opinions or ideas will be continuously produced in the form of online data stream. In this scenario, how to effectively filter and display information for a certain topic dynamically, will be a critical problem. We call the problem as Topic-focused Dynamic Information Filtering (denoted as TDIF for short) in social media. In this paper, we start open discussions on such application problems. We first analyze the properties of the TDIF problem, which usually contains several typical requirements: relevance, diversity, recency and confidence. Recency means that users want to follow the recent opinions or news. Additionally, the confidence of information must be taken into consideration. How to balance these factors properly in online data stream is very important and challenging. We propose a dynamic preservation strategy on the basis of an existing feature-based utility function, to solve the TDIF problem. Additionally, we propose new dynamic diversity measures, to get a more reasonable evaluation for such application problems. Extensive exploratory experiments have been conducted on TREC public twitter dataset, and the experimental results validate the effectiveness of our approach.
[ { "version": "v1", "created": "Mon, 20 Apr 2015 06:12:06 GMT" } ]
2015-04-21T00:00:00
[ [ "Zhu", "Yadong", "" ], [ "Lan", "Yanyan", "" ], [ "Guo", "Jiafeng", "" ], [ "Cheng", "Xueqi", "" ] ]
TITLE: Topic-focused Dynamic Information Filtering in Social Media ABSTRACT: With the quick development of online social media such as twitter or sina weibo in china, many users usually track hot topics to satisfy their desired information need. For a hot topic, new opinions or ideas will be continuously produced in the form of online data stream. In this scenario, how to effectively filter and display information for a certain topic dynamically, will be a critical problem. We call the problem as Topic-focused Dynamic Information Filtering (denoted as TDIF for short) in social media. In this paper, we start open discussions on such application problems. We first analyze the properties of the TDIF problem, which usually contains several typical requirements: relevance, diversity, recency and confidence. Recency means that users want to follow the recent opinions or news. Additionally, the confidence of information must be taken into consideration. How to balance these factors properly in online data stream is very important and challenging. We propose a dynamic preservation strategy on the basis of an existing feature-based utility function, to solve the TDIF problem. Additionally, we propose new dynamic diversity measures, to get a more reasonable evaluation for such application problems. Extensive exploratory experiments have been conducted on TREC public twitter dataset, and the experimental results validate the effectiveness of our approach.
no_new_dataset
0.952131
1504.05035
Wangmeng Zuo
Xiaohe Wu, Wangmeng Zuo, Yuanyuan Zhu, Liang Lin
F-SVM: Combination of Feature Transformation and SVM Learning via Convex Relaxation
11 pages, 5 figures
null
null
null
cs.LG cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The generalization error bound of support vector machine (SVM) depends on the ratio of radius and margin, while standard SVM only considers the maximization of the margin but ignores the minimization of the radius. Several approaches have been proposed to integrate radius and margin for joint learning of feature transformation and SVM classifier. However, most of them either require the form of the transformation matrix to be diagonal, or are non-convex and computationally expensive. In this paper, we suggest a novel approximation for the radius of minimum enclosing ball (MEB) in feature space, and then propose a convex radius-margin based SVM model for joint learning of feature transformation and SVM classifier, i.e., F-SVM. An alternating minimization method is adopted to solve the F-SVM model, where the feature transformation is updatedvia gradient descent and the classifier is updated by employing the existing SVM solver. By incorporating with kernel principal component analysis, F-SVM is further extended for joint learning of nonlinear transformation and classifier. Experimental results on the UCI machine learning datasets and the LFW face datasets show that F-SVM outperforms the standard SVM and the existing radius-margin based SVMs, e.g., RMM, R-SVM+ and R-SVM+{\mu}.
[ { "version": "v1", "created": "Mon, 20 Apr 2015 12:36:50 GMT" } ]
2015-04-21T00:00:00
[ [ "Wu", "Xiaohe", "" ], [ "Zuo", "Wangmeng", "" ], [ "Zhu", "Yuanyuan", "" ], [ "Lin", "Liang", "" ] ]
TITLE: F-SVM: Combination of Feature Transformation and SVM Learning via Convex Relaxation ABSTRACT: The generalization error bound of support vector machine (SVM) depends on the ratio of radius and margin, while standard SVM only considers the maximization of the margin but ignores the minimization of the radius. Several approaches have been proposed to integrate radius and margin for joint learning of feature transformation and SVM classifier. However, most of them either require the form of the transformation matrix to be diagonal, or are non-convex and computationally expensive. In this paper, we suggest a novel approximation for the radius of minimum enclosing ball (MEB) in feature space, and then propose a convex radius-margin based SVM model for joint learning of feature transformation and SVM classifier, i.e., F-SVM. An alternating minimization method is adopted to solve the F-SVM model, where the feature transformation is updatedvia gradient descent and the classifier is updated by employing the existing SVM solver. By incorporating with kernel principal component analysis, F-SVM is further extended for joint learning of nonlinear transformation and classifier. Experimental results on the UCI machine learning datasets and the LFW face datasets show that F-SVM outperforms the standard SVM and the existing radius-margin based SVMs, e.g., RMM, R-SVM+ and R-SVM+{\mu}.
no_new_dataset
0.954265
1305.1495
Lorenzo Del Castello
Alessandro Attanasi, Andrea Cavagna, Lorenzo Del Castello, Irene Giardina, Asja Jelic, Stefania Melillo, Leonardo Parisi, Fabio Pellacini, Edward Shen, Edmondo Silvestri, Massimiliano Viale
GReTA - a novel Global and Recursive Tracking Algorithm in three dimensions
13 pages, 6 figures, 3 tables. Version 3 was slightly shortened, and new comprative results on the public datasets (thermal infrared videos of flying bats) by Z. Wu and coworkers (2014) were included. in A. Attanasi et al., "GReTA - A Novel Global and Recursive Tracking Algorithm in Three Dimensions", IEEE Trans. Pattern Anal. Mach. Intell., vol.37 (2015)
null
10.1109/TPAMI.2015.2414427
null
q-bio.QM cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Tracking multiple moving targets allows quantitative measure of the dynamic behavior in systems as diverse as animal groups in biology, turbulence in fluid dynamics and crowd and traffic control. In three dimensions, tracking several targets becomes increasingly hard since optical occlusions are very likely, i.e. two featureless targets frequently overlap for several frames. Occlusions are particularly frequent in biological groups such as bird flocks, fish schools, and insect swarms, a fact that has severely limited collective animal behavior field studies in the past. This paper presents a 3D tracking method that is robust in the case of severe occlusions. To ensure robustness, we adopt a global optimization approach that works on all objects and frames at once. To achieve practicality and scalability, we employ a divide and conquer formulation, thanks to which the computational complexity of the problem is reduced by orders of magnitude. We tested our algorithm with synthetic data, with experimental data of bird flocks and insect swarms and with public benchmark datasets, and show that our system yields high quality trajectories for hundreds of moving targets with severe overlap. The results obtained on very heterogeneous data show the potential applicability of our method to the most diverse experimental situations.
[ { "version": "v1", "created": "Tue, 7 May 2013 12:45:30 GMT" }, { "version": "v2", "created": "Thu, 24 Apr 2014 14:55:59 GMT" }, { "version": "v3", "created": "Fri, 17 Apr 2015 16:36:59 GMT" } ]
2015-04-20T00:00:00
[ [ "Attanasi", "Alessandro", "" ], [ "Cavagna", "Andrea", "" ], [ "Del Castello", "Lorenzo", "" ], [ "Giardina", "Irene", "" ], [ "Jelic", "Asja", "" ], [ "Melillo", "Stefania", "" ], [ "Parisi", "Leonardo", "" ], [ "Pellacini", "Fabio", "" ], [ "Shen", "Edward", "" ], [ "Silvestri", "Edmondo", "" ], [ "Viale", "Massimiliano", "" ] ]
TITLE: GReTA - a novel Global and Recursive Tracking Algorithm in three dimensions ABSTRACT: Tracking multiple moving targets allows quantitative measure of the dynamic behavior in systems as diverse as animal groups in biology, turbulence in fluid dynamics and crowd and traffic control. In three dimensions, tracking several targets becomes increasingly hard since optical occlusions are very likely, i.e. two featureless targets frequently overlap for several frames. Occlusions are particularly frequent in biological groups such as bird flocks, fish schools, and insect swarms, a fact that has severely limited collective animal behavior field studies in the past. This paper presents a 3D tracking method that is robust in the case of severe occlusions. To ensure robustness, we adopt a global optimization approach that works on all objects and frames at once. To achieve practicality and scalability, we employ a divide and conquer formulation, thanks to which the computational complexity of the problem is reduced by orders of magnitude. We tested our algorithm with synthetic data, with experimental data of bird flocks and insect swarms and with public benchmark datasets, and show that our system yields high quality trajectories for hundreds of moving targets with severe overlap. The results obtained on very heterogeneous data show the potential applicability of our method to the most diverse experimental situations.
no_new_dataset
0.950869
1408.5661
Keisuke Yamazaki
Keisuke Yamazaki
Asymptotic Accuracy of Bayesian Estimation for a Single Latent Variable
28 pages, 3 figures
null
null
null
stat.ML cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In data science and machine learning, hierarchical parametric models, such as mixture models, are often used. They contain two kinds of variables: observable variables, which represent the parts of the data that can be directly measured, and latent variables, which represent the underlying processes that generate the data. Although there has been an increase in research on the estimation accuracy for observable variables, the theoretical analysis of estimating latent variables has not been thoroughly investigated. In a previous study, we determined the accuracy of a Bayes estimation for the joint probability of the latent variables in a dataset, and we proved that the Bayes method is asymptotically more accurate than the maximum-likelihood method. However, the accuracy of the Bayes estimation for a single latent variable remains unknown. In the present paper, we derive the asymptotic expansions of the error functions, which are defined by the Kullback-Leibler divergence, for two types of single-variable estimations when the statistical regularity is satisfied. Our results indicate that the accuracies of the Bayes and maximum-likelihood methods are asymptotically equivalent and clarify that the Bayes method is only advantageous for multivariable estimations.
[ { "version": "v1", "created": "Mon, 25 Aug 2014 04:44:53 GMT" }, { "version": "v2", "created": "Tue, 27 Jan 2015 04:00:06 GMT" }, { "version": "v3", "created": "Fri, 17 Apr 2015 06:59:26 GMT" } ]
2015-04-20T00:00:00
[ [ "Yamazaki", "Keisuke", "" ] ]
TITLE: Asymptotic Accuracy of Bayesian Estimation for a Single Latent Variable ABSTRACT: In data science and machine learning, hierarchical parametric models, such as mixture models, are often used. They contain two kinds of variables: observable variables, which represent the parts of the data that can be directly measured, and latent variables, which represent the underlying processes that generate the data. Although there has been an increase in research on the estimation accuracy for observable variables, the theoretical analysis of estimating latent variables has not been thoroughly investigated. In a previous study, we determined the accuracy of a Bayes estimation for the joint probability of the latent variables in a dataset, and we proved that the Bayes method is asymptotically more accurate than the maximum-likelihood method. However, the accuracy of the Bayes estimation for a single latent variable remains unknown. In the present paper, we derive the asymptotic expansions of the error functions, which are defined by the Kullback-Leibler divergence, for two types of single-variable estimations when the statistical regularity is satisfied. Our results indicate that the accuracies of the Bayes and maximum-likelihood methods are asymptotically equivalent and clarify that the Bayes method is only advantageous for multivariable estimations.
no_new_dataset
0.947914
1410.8151
Ahmet Iscen
Ahmet Iscen, Giorgos Tolias, Philippe-Henri Gosselin, Herv\'e J\'egou
A comparison of dense region detectors for image search and fine-grained classification
Accepted to IEEE Transactions on Image Processing
null
10.1109/TIP.2015.2423557
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider a pipeline for image classification or search based on coding approaches like Bag of Words or Fisher vectors. In this context, the most common approach is to extract the image patches regularly in a dense manner on several scales. This paper proposes and evaluates alternative choices to extract patches densely. Beyond simple strategies derived from regular interest region detectors, we propose approaches based on super-pixels, edges, and a bank of Zernike filters used as detectors. The different approaches are evaluated on recent image retrieval and fine-grain classification benchmarks. Our results show that the regular dense detector is outperformed by other methods in most situations, leading us to improve the state of the art in comparable setups on standard retrieval and fined-grain benchmarks. As a byproduct of our study, we show that existing methods for blob and super-pixel extraction achieve high accuracy if the patches are extracted along the edges and not around the detected regions.
[ { "version": "v1", "created": "Wed, 29 Oct 2014 20:18:41 GMT" }, { "version": "v2", "created": "Thu, 26 Feb 2015 12:56:39 GMT" }, { "version": "v3", "created": "Fri, 17 Apr 2015 18:36:17 GMT" } ]
2015-04-20T00:00:00
[ [ "Iscen", "Ahmet", "" ], [ "Tolias", "Giorgos", "" ], [ "Gosselin", "Philippe-Henri", "" ], [ "Jégou", "Hervé", "" ] ]
TITLE: A comparison of dense region detectors for image search and fine-grained classification ABSTRACT: We consider a pipeline for image classification or search based on coding approaches like Bag of Words or Fisher vectors. In this context, the most common approach is to extract the image patches regularly in a dense manner on several scales. This paper proposes and evaluates alternative choices to extract patches densely. Beyond simple strategies derived from regular interest region detectors, we propose approaches based on super-pixels, edges, and a bank of Zernike filters used as detectors. The different approaches are evaluated on recent image retrieval and fine-grain classification benchmarks. Our results show that the regular dense detector is outperformed by other methods in most situations, leading us to improve the state of the art in comparable setups on standard retrieval and fined-grain benchmarks. As a byproduct of our study, we show that existing methods for blob and super-pixel extraction achieve high accuracy if the patches are extracted along the edges and not around the detected regions.
no_new_dataset
0.953013
1412.5083
Qiang Qiu
Qiang Qiu, Guillermo Sapiro, Alex Bronstein
Random Forests Can Hash
null
null
null
null
cs.CV cs.IR cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Hash codes are a very efficient data representation needed to be able to cope with the ever growing amounts of data. We introduce a random forest semantic hashing scheme with information-theoretic code aggregation, showing for the first time how random forest, a technique that together with deep learning have shown spectacular results in classification, can also be extended to large-scale retrieval. Traditional random forest fails to enforce the consistency of hashes generated from each tree for the same class data, i.e., to preserve the underlying similarity, and it also lacks a principled way for code aggregation across trees. We start with a simple hashing scheme, where independently trained random trees in a forest are acting as hashing functions. We the propose a subspace model as the splitting function, and show that it enforces the hash consistency in a tree for data from the same class. We also introduce an information-theoretic approach for aggregating codes of individual trees into a single hash code, producing a near-optimal unique hash for each class. Experiments on large-scale public datasets are presented, showing that the proposed approach significantly outperforms state-of-the-art hashing methods for retrieval tasks.
[ { "version": "v1", "created": "Tue, 16 Dec 2014 17:02:18 GMT" }, { "version": "v2", "created": "Tue, 24 Feb 2015 18:26:12 GMT" }, { "version": "v3", "created": "Fri, 17 Apr 2015 01:00:24 GMT" } ]
2015-04-20T00:00:00
[ [ "Qiu", "Qiang", "" ], [ "Sapiro", "Guillermo", "" ], [ "Bronstein", "Alex", "" ] ]
TITLE: Random Forests Can Hash ABSTRACT: Hash codes are a very efficient data representation needed to be able to cope with the ever growing amounts of data. We introduce a random forest semantic hashing scheme with information-theoretic code aggregation, showing for the first time how random forest, a technique that together with deep learning have shown spectacular results in classification, can also be extended to large-scale retrieval. Traditional random forest fails to enforce the consistency of hashes generated from each tree for the same class data, i.e., to preserve the underlying similarity, and it also lacks a principled way for code aggregation across trees. We start with a simple hashing scheme, where independently trained random trees in a forest are acting as hashing functions. We the propose a subspace model as the splitting function, and show that it enforces the hash consistency in a tree for data from the same class. We also introduce an information-theoretic approach for aggregating codes of individual trees into a single hash code, producing a near-optimal unique hash for each class. Experiments on large-scale public datasets are presented, showing that the proposed approach significantly outperforms state-of-the-art hashing methods for retrieval tasks.
no_new_dataset
0.949435
1503.05787
Tobias Isenberg
Maarten H. Everts, Henk Bekker, Jos B.T.M. Roerdink, and Tobias Isenberg
Interactive Illustrative Line Styles and Line Style Transfer Functions for Flow Visualization
Extended version of a short paper at Pacific Graphics 2011 (http://dx.doi.org/10.2312/PE/PG/PG2011short/105-110)
null
null
null
cs.GR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a flexible illustrative line style model for the visualization of streamline data. Our model partitions view-oriented line strips into parallel bands whose basic visual properties can be controlled independently. We thus extend previous line stylization techniques specifically for visualization purposes by allowing the parametrization of these bands based on the local line data attributes. Moreover, our approach supports emphasis and abstraction by introducing line style transfer functions that map local line attribute values to complete line styles. With a flexible GPU implementation of this line style model we enable the interactive exploration of visual representations of streamlines. We demonstrate the effectiveness of our model by applying it to 3D flow field datasets.
[ { "version": "v1", "created": "Thu, 19 Mar 2015 14:53:55 GMT" }, { "version": "v2", "created": "Fri, 17 Apr 2015 14:01:50 GMT" } ]
2015-04-20T00:00:00
[ [ "Everts", "Maarten H.", "" ], [ "Bekker", "Henk", "" ], [ "Roerdink", "Jos B. T. M.", "" ], [ "Isenberg", "Tobias", "" ] ]
TITLE: Interactive Illustrative Line Styles and Line Style Transfer Functions for Flow Visualization ABSTRACT: We present a flexible illustrative line style model for the visualization of streamline data. Our model partitions view-oriented line strips into parallel bands whose basic visual properties can be controlled independently. We thus extend previous line stylization techniques specifically for visualization purposes by allowing the parametrization of these bands based on the local line data attributes. Moreover, our approach supports emphasis and abstraction by introducing line style transfer functions that map local line attribute values to complete line styles. With a flexible GPU implementation of this line style model we enable the interactive exploration of visual representations of streamlines. We demonstrate the effectiveness of our model by applying it to 3D flow field datasets.
no_new_dataset
0.948394
1504.04531
Nicolas Dobigeon
Laetitia Loncan, Luis B. Almeida, Jos\'e M. Bioucas-Dias, Xavier Briottet, Jocelyn Chanussot, Nicolas Dobigeon, Sophie Fabre, Wenzhi Liao, Giorgio A. Licciardi, Miguel Sim\~oes, Jean-Yves Tourneret, Miguel A. Veganzones, Gemine Vivone, Qi Wei and Naoto Yokoya
Hyperspectral pansharpening: a review
null
null
null
null
cs.CV physics.data-an stat.AP
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Pansharpening aims at fusing a panchromatic image with a multispectral one, to generate an image with the high spatial resolution of the former and the high spectral resolution of the latter. In the last decade, many algorithms have been presented in the literature for pansharpening using multispectral data. With the increasing availability of hyperspectral systems, these methods are now being adapted to hyperspectral images. In this work, we compare new pansharpening techniques designed for hyperspectral data with some of the state of the art methods for multispectral pansharpening, which have been adapted for hyperspectral data. Eleven methods from different classes (component substitution, multiresolution analysis, hybrid, Bayesian and matrix factorization) are analyzed. These methods are applied to three datasets and their effectiveness and robustness are evaluated with widely used performance indicators. In addition, all the pansharpening techniques considered in this paper have been implemented in a MATLAB toolbox that is made available to the community.
[ { "version": "v1", "created": "Fri, 17 Apr 2015 15:07:11 GMT" } ]
2015-04-20T00:00:00
[ [ "Loncan", "Laetitia", "" ], [ "Almeida", "Luis B.", "" ], [ "Bioucas-Dias", "José M.", "" ], [ "Briottet", "Xavier", "" ], [ "Chanussot", "Jocelyn", "" ], [ "Dobigeon", "Nicolas", "" ], [ "Fabre", "Sophie", "" ], [ "Liao", "Wenzhi", "" ], [ "Licciardi", "Giorgio A.", "" ], [ "Simões", "Miguel", "" ], [ "Tourneret", "Jean-Yves", "" ], [ "Veganzones", "Miguel A.", "" ], [ "Vivone", "Gemine", "" ], [ "Wei", "Qi", "" ], [ "Yokoya", "Naoto", "" ] ]
TITLE: Hyperspectral pansharpening: a review ABSTRACT: Pansharpening aims at fusing a panchromatic image with a multispectral one, to generate an image with the high spatial resolution of the former and the high spectral resolution of the latter. In the last decade, many algorithms have been presented in the literature for pansharpening using multispectral data. With the increasing availability of hyperspectral systems, these methods are now being adapted to hyperspectral images. In this work, we compare new pansharpening techniques designed for hyperspectral data with some of the state of the art methods for multispectral pansharpening, which have been adapted for hyperspectral data. Eleven methods from different classes (component substitution, multiresolution analysis, hybrid, Bayesian and matrix factorization) are analyzed. These methods are applied to three datasets and their effectiveness and robustness are evaluated with widely used performance indicators. In addition, all the pansharpening techniques considered in this paper have been implemented in a MATLAB toolbox that is made available to the community.
no_new_dataset
0.952175
1504.04548
Simone Bianco
Simone Bianco, Claudio Cusano, Raimondo Schettini
Color Constancy Using CNNs
Accepted at DeepVision: Deep Learning in Computer Vision 2015 (CVPR 2015 workshop)
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this work we describe a Convolutional Neural Network (CNN) to accurately predict the scene illumination. Taking image patches as input, the CNN works in the spatial domain without using hand-crafted features that are employed by most previous methods. The network consists of one convolutional layer with max pooling, one fully connected layer and three output nodes. Within the network structure, feature learning and regression are integrated into one optimization process, which leads to a more effective model for estimating scene illumination. This approach achieves state-of-the-art performance on a standard dataset of RAW images. Preliminary experiments on images with spatially varying illumination demonstrate the stability of the local illuminant estimation ability of our CNN.
[ { "version": "v1", "created": "Fri, 17 Apr 2015 15:51:07 GMT" } ]
2015-04-20T00:00:00
[ [ "Bianco", "Simone", "" ], [ "Cusano", "Claudio", "" ], [ "Schettini", "Raimondo", "" ] ]
TITLE: Color Constancy Using CNNs ABSTRACT: In this work we describe a Convolutional Neural Network (CNN) to accurately predict the scene illumination. Taking image patches as input, the CNN works in the spatial domain without using hand-crafted features that are employed by most previous methods. The network consists of one convolutional layer with max pooling, one fully connected layer and three output nodes. Within the network structure, feature learning and regression are integrated into one optimization process, which leads to a more effective model for estimating scene illumination. This approach achieves state-of-the-art performance on a standard dataset of RAW images. Preliminary experiments on images with spatially varying illumination demonstrate the stability of the local illuminant estimation ability of our CNN.
no_new_dataset
0.948489
1504.04588
James-A. Goulet
James-A. Goulet
The Nataf-Beta Random Field Classifier: An Extension of the Beta Conjugate Prior to Classification Problems
17 pages, 4 figures, Submitted for publication in the Journal of Machine Learning Research
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents the Nataf-Beta Random Field Classifier, a discriminative approach that extends the applicability of the Beta conjugate prior to classification problems. The approach's key feature is to model the probability of a class conditional on attribute values as a random field whose marginals are Beta distributed, and where the parameters of marginals are themselves described by random fields. Although the classification accuracy of the approach proposed does not statistically outperform the best accuracies reported in the literature, it ranks among the top tier for the six benchmark datasets tested. The Nataf-Beta Random Field Classifier is suited as a general purpose classification approach for real-continuous and real-integer attribute value problems.
[ { "version": "v1", "created": "Fri, 17 Apr 2015 17:32:00 GMT" } ]
2015-04-20T00:00:00
[ [ "Goulet", "James-A.", "" ] ]
TITLE: The Nataf-Beta Random Field Classifier: An Extension of the Beta Conjugate Prior to Classification Problems ABSTRACT: This paper presents the Nataf-Beta Random Field Classifier, a discriminative approach that extends the applicability of the Beta conjugate prior to classification problems. The approach's key feature is to model the probability of a class conditional on attribute values as a random field whose marginals are Beta distributed, and where the parameters of marginals are themselves described by random fields. Although the classification accuracy of the approach proposed does not statistically outperform the best accuracies reported in the literature, it ranks among the top tier for the six benchmark datasets tested. The Nataf-Beta Random Field Classifier is suited as a general purpose classification approach for real-continuous and real-integer attribute value problems.
no_new_dataset
0.952397
1409.0940
Haim Avron
Vikas Sindhwani and Haim Avron
High-performance Kernel Machines with Implicit Distributed Optimization and Randomization
Work presented at MMDS 2014 (June 2014) and JSM 2014
null
null
null
stat.ML cs.DC cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In order to fully utilize "big data", it is often required to use "big models". Such models tend to grow with the complexity and size of the training data, and do not make strong parametric assumptions upfront on the nature of the underlying statistical dependencies. Kernel methods fit this need well, as they constitute a versatile and principled statistical methodology for solving a wide range of non-parametric modelling problems. However, their high computational costs (in storage and time) pose a significant barrier to their widespread adoption in big data applications. We propose an algorithmic framework and high-performance implementation for massive-scale training of kernel-based statistical models, based on combining two key technical ingredients: (i) distributed general purpose convex optimization, and (ii) the use of randomization to improve the scalability of kernel methods. Our approach is based on a block-splitting variant of the Alternating Directions Method of Multipliers, carefully reconfigured to handle very large random feature matrices, while exploiting hybrid parallelism typically found in modern clusters of multicore machines. Our implementation supports a variety of statistical learning tasks by enabling several loss functions, regularization schemes, kernels, and layers of randomized approximations for both dense and sparse datasets, in a highly extensible framework. We evaluate the ability of our framework to learn models on data from applications, and provide a comparison against existing sequential and parallel libraries.
[ { "version": "v1", "created": "Wed, 3 Sep 2014 02:28:51 GMT" }, { "version": "v2", "created": "Tue, 23 Dec 2014 21:38:15 GMT" }, { "version": "v3", "created": "Thu, 16 Apr 2015 18:06:53 GMT" } ]
2015-04-17T00:00:00
[ [ "Sindhwani", "Vikas", "" ], [ "Avron", "Haim", "" ] ]
TITLE: High-performance Kernel Machines with Implicit Distributed Optimization and Randomization ABSTRACT: In order to fully utilize "big data", it is often required to use "big models". Such models tend to grow with the complexity and size of the training data, and do not make strong parametric assumptions upfront on the nature of the underlying statistical dependencies. Kernel methods fit this need well, as they constitute a versatile and principled statistical methodology for solving a wide range of non-parametric modelling problems. However, their high computational costs (in storage and time) pose a significant barrier to their widespread adoption in big data applications. We propose an algorithmic framework and high-performance implementation for massive-scale training of kernel-based statistical models, based on combining two key technical ingredients: (i) distributed general purpose convex optimization, and (ii) the use of randomization to improve the scalability of kernel methods. Our approach is based on a block-splitting variant of the Alternating Directions Method of Multipliers, carefully reconfigured to handle very large random feature matrices, while exploiting hybrid parallelism typically found in modern clusters of multicore machines. Our implementation supports a variety of statistical learning tasks by enabling several loss functions, regularization schemes, kernels, and layers of randomized approximations for both dense and sparse datasets, in a highly extensible framework. We evaluate the ability of our framework to learn models on data from applications, and provide a comparison against existing sequential and parallel libraries.
no_new_dataset
0.940353
1502.05337
Emiliano De Cristofaro
Julien Freudiger and Emiliano De Cristofaro and Alex Brito
Controlled Data Sharing for Collaborative Predictive Blacklisting
A preliminary version of this paper appears in DIMVA 2015. This is the full version. arXiv admin note: substantial text overlap with arXiv:1403.2123
null
null
null
cs.CR cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Although sharing data across organizations is often advocated as a promising way to enhance cybersecurity, collaborative initiatives are rarely put into practice owing to confidentiality, trust, and liability challenges. In this paper, we investigate whether collaborative threat mitigation can be realized via a controlled data sharing approach, whereby organizations make informed decisions as to whether or not, and how much, to share. Using appropriate cryptographic tools, entities can estimate the benefits of collaboration and agree on what to share in a privacy-preserving way, without having to disclose their datasets. We focus on collaborative predictive blacklisting, i.e., forecasting attack sources based on one's logs and those contributed by other organizations. We study the impact of different sharing strategies by experimenting on a real-world dataset of two billion suspicious IP addresses collected from Dshield over two months. We find that controlled data sharing yields up to 105% accuracy improvement on average, while also reducing the false positive rate.
[ { "version": "v1", "created": "Wed, 18 Feb 2015 18:48:56 GMT" }, { "version": "v2", "created": "Thu, 16 Apr 2015 09:09:16 GMT" } ]
2015-04-17T00:00:00
[ [ "Freudiger", "Julien", "" ], [ "De Cristofaro", "Emiliano", "" ], [ "Brito", "Alex", "" ] ]
TITLE: Controlled Data Sharing for Collaborative Predictive Blacklisting ABSTRACT: Although sharing data across organizations is often advocated as a promising way to enhance cybersecurity, collaborative initiatives are rarely put into practice owing to confidentiality, trust, and liability challenges. In this paper, we investigate whether collaborative threat mitigation can be realized via a controlled data sharing approach, whereby organizations make informed decisions as to whether or not, and how much, to share. Using appropriate cryptographic tools, entities can estimate the benefits of collaboration and agree on what to share in a privacy-preserving way, without having to disclose their datasets. We focus on collaborative predictive blacklisting, i.e., forecasting attack sources based on one's logs and those contributed by other organizations. We study the impact of different sharing strategies by experimenting on a real-world dataset of two billion suspicious IP addresses collected from Dshield over two months. We find that controlled data sharing yields up to 105% accuracy improvement on average, while also reducing the false positive rate.
no_new_dataset
0.847968
1503.01224
Chunhua Shen
Peng Wang, Yuanzhouhan Cao, Chunhua Shen, Lingqiao Liu, Heng Tao Shen
Temporal Pyramid Pooling Based Convolutional Neural Networks for Action Recognition
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Encouraged by the success of Convolutional Neural Networks (CNNs) in image classification, recently much effort is spent on applying CNNs to video based action recognition problems. One challenge is that video contains a varying number of frames which is incompatible to the standard input format of CNNs. Existing methods handle this issue either by directly sampling a fixed number of frames or bypassing this issue by introducing a 3D convolutional layer which conducts convolution in spatial-temporal domain. To solve this issue, here we propose a novel network structure which allows an arbitrary number of frames as the network input. The key of our solution is to introduce a module consisting of an encoding layer and a temporal pyramid pooling layer. The encoding layer maps the activation from previous layers to a feature vector suitable for pooling while the temporal pyramid pooling layer converts multiple frame-level activations into a fixed-length video-level representation. In addition, we adopt a feature concatenation layer which combines appearance information and motion information. Compared with the frame sampling strategy, our method avoids the risk of missing any important frames. Compared with the 3D convolutional method which requires a huge video dataset for network training, our model can be learned on a small target dataset because we can leverage the off-the-shelf image-level CNN for model parameter initialization. Experiments on two challenging datasets, Hollywood2 and HMDB51, demonstrate that our method achieves superior performance over state-of-the-art methods while requiring much fewer training data.
[ { "version": "v1", "created": "Wed, 4 Mar 2015 05:18:18 GMT" }, { "version": "v2", "created": "Thu, 16 Apr 2015 12:18:46 GMT" } ]
2015-04-17T00:00:00
[ [ "Wang", "Peng", "" ], [ "Cao", "Yuanzhouhan", "" ], [ "Shen", "Chunhua", "" ], [ "Liu", "Lingqiao", "" ], [ "Shen", "Heng Tao", "" ] ]
TITLE: Temporal Pyramid Pooling Based Convolutional Neural Networks for Action Recognition ABSTRACT: Encouraged by the success of Convolutional Neural Networks (CNNs) in image classification, recently much effort is spent on applying CNNs to video based action recognition problems. One challenge is that video contains a varying number of frames which is incompatible to the standard input format of CNNs. Existing methods handle this issue either by directly sampling a fixed number of frames or bypassing this issue by introducing a 3D convolutional layer which conducts convolution in spatial-temporal domain. To solve this issue, here we propose a novel network structure which allows an arbitrary number of frames as the network input. The key of our solution is to introduce a module consisting of an encoding layer and a temporal pyramid pooling layer. The encoding layer maps the activation from previous layers to a feature vector suitable for pooling while the temporal pyramid pooling layer converts multiple frame-level activations into a fixed-length video-level representation. In addition, we adopt a feature concatenation layer which combines appearance information and motion information. Compared with the frame sampling strategy, our method avoids the risk of missing any important frames. Compared with the 3D convolutional method which requires a huge video dataset for network training, our model can be learned on a small target dataset because we can leverage the off-the-shelf image-level CNN for model parameter initialization. Experiments on two challenging datasets, Hollywood2 and HMDB51, demonstrate that our method achieves superior performance over state-of-the-art methods while requiring much fewer training data.
no_new_dataset
0.951639
1504.03641
Sergey Zagoruyko
Sergey Zagoruyko and Nikos Komodakis
Learning to Compare Image Patches via Convolutional Neural Networks
CVPR 2015
null
null
null
cs.CV cs.LG cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we show how to learn directly from image data (i.e., without resorting to manually-designed features) a general similarity function for comparing image patches, which is a task of fundamental importance for many computer vision problems. To encode such a function, we opt for a CNN-based model that is trained to account for a wide variety of changes in image appearance. To that end, we explore and study multiple neural network architectures, which are specifically adapted to this task. We show that such an approach can significantly outperform the state-of-the-art on several problems and benchmark datasets.
[ { "version": "v1", "created": "Tue, 14 Apr 2015 17:53:51 GMT" } ]
2015-04-17T00:00:00
[ [ "Zagoruyko", "Sergey", "" ], [ "Komodakis", "Nikos", "" ] ]
TITLE: Learning to Compare Image Patches via Convolutional Neural Networks ABSTRACT: In this paper we show how to learn directly from image data (i.e., without resorting to manually-designed features) a general similarity function for comparing image patches, which is a task of fundamental importance for many computer vision problems. To encode such a function, we opt for a CNN-based model that is trained to account for a wide variety of changes in image appearance. To that end, we explore and study multiple neural network architectures, which are specifically adapted to this task. We show that such an approach can significantly outperform the state-of-the-art on several problems and benchmark datasets.
no_new_dataset
0.949576
1504.04054
Xin Yuan
Yunchen Pu, Xin Yuan, Lawrence Carin
A Generative Model for Deep Convolutional Learning
3 pages, 1 figure, ICLR workshop
null
null
null
stat.ML cs.LG cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A generative model is developed for deep (multi-layered) convolutional dictionary learning. A novel probabilistic pooling operation is integrated into the deep model, yielding efficient bottom-up (pretraining) and top-down (refinement) probabilistic learning. Experimental results demonstrate powerful capabilities of the model to learn multi-layer features from images, and excellent classification results are obtained on the MNIST and Caltech 101 datasets.
[ { "version": "v1", "created": "Wed, 15 Apr 2015 21:31:58 GMT" } ]
2015-04-17T00:00:00
[ [ "Pu", "Yunchen", "" ], [ "Yuan", "Xin", "" ], [ "Carin", "Lawrence", "" ] ]
TITLE: A Generative Model for Deep Convolutional Learning ABSTRACT: A generative model is developed for deep (multi-layered) convolutional dictionary learning. A novel probabilistic pooling operation is integrated into the deep model, yielding efficient bottom-up (pretraining) and top-down (refinement) probabilistic learning. Experimental results demonstrate powerful capabilities of the model to learn multi-layer features from images, and excellent classification results are obtained on the MNIST and Caltech 101 datasets.
no_new_dataset
0.946892
1504.04208
Andrea Scharnhorst
Rob Koopman, Shenghui Wang, Andrea Scharnhorst
Contextualization of topics - browsing through terms, authors, journals and cluster allocations
proceedings of the ISSI 2015 conference (accepted)
null
null
null
cs.DL cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper builds on an innovative Information Retrieval tool, Ariadne. The tool has been developed as an interactive network visualization and browsing tool for large-scale bibliographic databases. It basically allows to gain insights into a topic by contextualizing a search query (Koopman et al., 2015). In this paper, we apply the Ariadne tool to a far smaller dataset of 111,616 documents in astronomy and astrophysics. Labeled as the Berlin dataset, this data have been used by several research teams to apply and later compare different clustering algorithms. The quest for this team effort is how to delineate topics. This paper contributes to this challenge in two different ways. First, we produce one of the different cluster solution and second, we use Ariadne (the method behind it, and the interface - called LittleAriadne) to display cluster solutions of the different group members. By providing a tool that allows the visual inspection of the similarity of article clusters produced by different algorithms, we present a complementary approach to other possible means of comparison. More particular, we discuss how we can - with LittleAriadne - browse through the network of topical terms, authors, journals and cluster solutions in the Berlin dataset and compare cluster solutions as well as see their context.
[ { "version": "v1", "created": "Thu, 16 Apr 2015 12:38:10 GMT" } ]
2015-04-17T00:00:00
[ [ "Koopman", "Rob", "" ], [ "Wang", "Shenghui", "" ], [ "Scharnhorst", "Andrea", "" ] ]
TITLE: Contextualization of topics - browsing through terms, authors, journals and cluster allocations ABSTRACT: This paper builds on an innovative Information Retrieval tool, Ariadne. The tool has been developed as an interactive network visualization and browsing tool for large-scale bibliographic databases. It basically allows to gain insights into a topic by contextualizing a search query (Koopman et al., 2015). In this paper, we apply the Ariadne tool to a far smaller dataset of 111,616 documents in astronomy and astrophysics. Labeled as the Berlin dataset, this data have been used by several research teams to apply and later compare different clustering algorithms. The quest for this team effort is how to delineate topics. This paper contributes to this challenge in two different ways. First, we produce one of the different cluster solution and second, we use Ariadne (the method behind it, and the interface - called LittleAriadne) to display cluster solutions of the different group members. By providing a tool that allows the visual inspection of the similarity of article clusters produced by different algorithms, we present a complementary approach to other possible means of comparison. More particular, we discuss how we can - with LittleAriadne - browse through the network of topical terms, authors, journals and cluster solutions in the Berlin dataset and compare cluster solutions as well as see their context.
no_new_dataset
0.888227
1406.5670
Zhirong Wu
Zhirong Wu, Shuran Song, Aditya Khosla, Fisher Yu, Linguang Zhang, Xiaoou Tang, Jianxiong Xiao
3D ShapeNets: A Deep Representation for Volumetric Shapes
to be appeared in CVPR 2015
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
3D shape is a crucial but heavily underutilized cue in today's computer vision systems, mostly due to the lack of a good generic shape representation. With the recent availability of inexpensive 2.5D depth sensors (e.g. Microsoft Kinect), it is becoming increasingly important to have a powerful 3D shape representation in the loop. Apart from category recognition, recovering full 3D shapes from view-based 2.5D depth maps is also a critical part of visual understanding. To this end, we propose to represent a geometric 3D shape as a probability distribution of binary variables on a 3D voxel grid, using a Convolutional Deep Belief Network. Our model, 3D ShapeNets, learns the distribution of complex 3D shapes across different object categories and arbitrary poses from raw CAD data, and discovers hierarchical compositional part representations automatically. It naturally supports joint object recognition and shape completion from 2.5D depth maps, and it enables active object recognition through view planning. To train our 3D deep learning model, we construct ModelNet -- a large-scale 3D CAD model dataset. Extensive experiments show that our 3D deep representation enables significant performance improvement over the-state-of-the-arts in a variety of tasks.
[ { "version": "v1", "created": "Sun, 22 Jun 2014 03:31:52 GMT" }, { "version": "v2", "created": "Mon, 1 Sep 2014 04:59:49 GMT" }, { "version": "v3", "created": "Wed, 15 Apr 2015 16:46:05 GMT" } ]
2015-04-16T00:00:00
[ [ "Wu", "Zhirong", "" ], [ "Song", "Shuran", "" ], [ "Khosla", "Aditya", "" ], [ "Yu", "Fisher", "" ], [ "Zhang", "Linguang", "" ], [ "Tang", "Xiaoou", "" ], [ "Xiao", "Jianxiong", "" ] ]
TITLE: 3D ShapeNets: A Deep Representation for Volumetric Shapes ABSTRACT: 3D shape is a crucial but heavily underutilized cue in today's computer vision systems, mostly due to the lack of a good generic shape representation. With the recent availability of inexpensive 2.5D depth sensors (e.g. Microsoft Kinect), it is becoming increasingly important to have a powerful 3D shape representation in the loop. Apart from category recognition, recovering full 3D shapes from view-based 2.5D depth maps is also a critical part of visual understanding. To this end, we propose to represent a geometric 3D shape as a probability distribution of binary variables on a 3D voxel grid, using a Convolutional Deep Belief Network. Our model, 3D ShapeNets, learns the distribution of complex 3D shapes across different object categories and arbitrary poses from raw CAD data, and discovers hierarchical compositional part representations automatically. It naturally supports joint object recognition and shape completion from 2.5D depth maps, and it enables active object recognition through view planning. To train our 3D deep learning model, we construct ModelNet -- a large-scale 3D CAD model dataset. Extensive experiments show that our 3D deep representation enables significant performance improvement over the-state-of-the-arts in a variety of tasks.
new_dataset
0.902352
1410.6910
Thomas Kreuz
Thomas Kreuz and Mario Mulansky and Nebojsa Bozanic
SPIKY: A graphical user interface for monitoring spike train synchrony
15 pages, 7 figures
null
null
null
physics.data-an cs.MS cs.SE physics.bio-ph physics.med-ph q-bio.NC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Techniques for recording large-scale neuronal spiking activity are developing very fast. This leads to an increasing demand for algorithms capable of analyzing large amounts of experimental spike train data. One of the most crucial and demanding tasks is the identification of similarity patterns with a very high temporal resolution and across different spatial scales. To address this task, in recent years three time-resolved measures of spike train synchrony have been proposed, the ISI-distance, the SPIKE-distance, and event synchronization. The Matlab source codes for calculating and visualizing these measures have been made publicly available. However, due to the many different possible representations of the results the use of these codes is rather complicated and their application requires some basic knowledge of Matlab. Thus it became desirable to provide a more user-friendly and interactive interface. Here we address this need and present SPIKY, a graphical user interface which facilitates the application of time-resolved measures of spike train synchrony to both simulated and real data. SPIKY includes implementations of the ISI-distance, the SPIKE-distance and SPIKE-synchronization (an improved and simplified extension of event synchronization) which have been optimized with respect to computation speed and memory demand. It also comprises a spike train generator and an event detector which makes it capable of analyzing continuous data. Finally, the SPIKY package includes additional complementary programs aimed at the analysis of large numbers of datasets and the estimation of significance levels.
[ { "version": "v1", "created": "Sat, 25 Oct 2014 11:02:26 GMT" }, { "version": "v2", "created": "Sat, 24 Jan 2015 22:29:28 GMT" }, { "version": "v3", "created": "Wed, 15 Apr 2015 16:40:11 GMT" } ]
2015-04-16T00:00:00
[ [ "Kreuz", "Thomas", "" ], [ "Mulansky", "Mario", "" ], [ "Bozanic", "Nebojsa", "" ] ]
TITLE: SPIKY: A graphical user interface for monitoring spike train synchrony ABSTRACT: Techniques for recording large-scale neuronal spiking activity are developing very fast. This leads to an increasing demand for algorithms capable of analyzing large amounts of experimental spike train data. One of the most crucial and demanding tasks is the identification of similarity patterns with a very high temporal resolution and across different spatial scales. To address this task, in recent years three time-resolved measures of spike train synchrony have been proposed, the ISI-distance, the SPIKE-distance, and event synchronization. The Matlab source codes for calculating and visualizing these measures have been made publicly available. However, due to the many different possible representations of the results the use of these codes is rather complicated and their application requires some basic knowledge of Matlab. Thus it became desirable to provide a more user-friendly and interactive interface. Here we address this need and present SPIKY, a graphical user interface which facilitates the application of time-resolved measures of spike train synchrony to both simulated and real data. SPIKY includes implementations of the ISI-distance, the SPIKE-distance and SPIKE-synchronization (an improved and simplified extension of event synchronization) which have been optimized with respect to computation speed and memory demand. It also comprises a spike train generator and an event detector which makes it capable of analyzing continuous data. Finally, the SPIKY package includes additional complementary programs aimed at the analysis of large numbers of datasets and the estimation of significance levels.
no_new_dataset
0.942242
1412.6596
Scott Reed
Scott Reed, Honglak Lee, Dragomir Anguelov, Christian Szegedy, Dumitru Erhan, Andrew Rabinovich
Training Deep Neural Networks on Noisy Labels with Bootstrapping
null
null
null
null
cs.CV cs.LG cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Current state-of-the-art deep learning systems for visual object recognition and detection use purely supervised training with regularization such as dropout to avoid overfitting. The performance depends critically on the amount of labeled examples, and in current practice the labels are assumed to be unambiguous and accurate. However, this assumption often does not hold; e.g. in recognition, class labels may be missing; in detection, objects in the image may not be localized; and in general, the labeling may be subjective. In this work we propose a generic way to handle noisy and incomplete labeling by augmenting the prediction objective with a notion of consistency. We consider a prediction consistent if the same prediction is made given similar percepts, where the notion of similarity is between deep network features computed from the input data. In experiments we demonstrate that our approach yields substantial robustness to label noise on several datasets. On MNIST handwritten digits, we show that our model is robust to label corruption. On the Toronto Face Database, we show that our model handles well the case of subjective labels in emotion recognition, achieving state-of-the- art results, and can also benefit from unlabeled face images with no modification to our method. On the ILSVRC2014 detection challenge data, we show that our approach extends to very deep networks, high resolution images and structured outputs, and results in improved scalable detection.
[ { "version": "v1", "created": "Sat, 20 Dec 2014 04:11:33 GMT" }, { "version": "v2", "created": "Sat, 7 Feb 2015 22:30:39 GMT" }, { "version": "v3", "created": "Wed, 15 Apr 2015 19:48:37 GMT" } ]
2015-04-16T00:00:00
[ [ "Reed", "Scott", "" ], [ "Lee", "Honglak", "" ], [ "Anguelov", "Dragomir", "" ], [ "Szegedy", "Christian", "" ], [ "Erhan", "Dumitru", "" ], [ "Rabinovich", "Andrew", "" ] ]
TITLE: Training Deep Neural Networks on Noisy Labels with Bootstrapping ABSTRACT: Current state-of-the-art deep learning systems for visual object recognition and detection use purely supervised training with regularization such as dropout to avoid overfitting. The performance depends critically on the amount of labeled examples, and in current practice the labels are assumed to be unambiguous and accurate. However, this assumption often does not hold; e.g. in recognition, class labels may be missing; in detection, objects in the image may not be localized; and in general, the labeling may be subjective. In this work we propose a generic way to handle noisy and incomplete labeling by augmenting the prediction objective with a notion of consistency. We consider a prediction consistent if the same prediction is made given similar percepts, where the notion of similarity is between deep network features computed from the input data. In experiments we demonstrate that our approach yields substantial robustness to label noise on several datasets. On MNIST handwritten digits, we show that our model is robust to label corruption. On the Toronto Face Database, we show that our model handles well the case of subjective labels in emotion recognition, achieving state-of-the- art results, and can also benefit from unlabeled face images with no modification to our method. On the ILSVRC2014 detection challenge data, we show that our approach extends to very deep networks, high resolution images and structured outputs, and results in improved scalable detection.
no_new_dataset
0.944382
1504.03961
Tao Chen
Tao Chen, Rami Bahsoon and Xin Yao
Online QoS Modeling in the Cloud: A Hybrid and Adaptive Multi-Learners Approach
In the proceeding of the 7th IEEE/ACM International Conference on Utility and Cloud Computing (UCC), London, UK, 2014
null
10.1109/UCC.2014.42
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Given the on-demand nature of cloud computing, managing cloud-based services requires accurate modeling for the correlation between their Quality of Service (QoS) and cloud configurations/resources. The resulted models need to cope with the dynamic fluctuation of QoS sensitivity and interference. However, existing QoS modeling in the cloud are limited in terms of both accuracy and applicability due to their static and semi- dynamic nature. In this paper, we present a fully dynamic multi- learners approach for automated and online QoS modeling in the cloud. We contribute to a hybrid learners solution, which improves accuracy while keeping model complexity adequate. To determine the inputs of QoS model at runtime, we partition the inputs space into two sub-spaces, each of which applies different symmetric uncertainty based selection techniques, and we then combine the sub-spaces results. The learners are also adaptive; they simultaneously allow several machine learning algorithms to model QoS function and dynamically select the best model for prediction on the fly. We experimentally evaluate our models using RUBiS benchmark and realistic FIFA 98 workload. The results show that our multi-learners approach is more accurate and effective in contrast to the other state-of-the-art approaches.
[ { "version": "v1", "created": "Wed, 15 Apr 2015 16:35:40 GMT" } ]
2015-04-16T00:00:00
[ [ "Chen", "Tao", "" ], [ "Bahsoon", "Rami", "" ], [ "Yao", "Xin", "" ] ]
TITLE: Online QoS Modeling in the Cloud: A Hybrid and Adaptive Multi-Learners Approach ABSTRACT: Given the on-demand nature of cloud computing, managing cloud-based services requires accurate modeling for the correlation between their Quality of Service (QoS) and cloud configurations/resources. The resulted models need to cope with the dynamic fluctuation of QoS sensitivity and interference. However, existing QoS modeling in the cloud are limited in terms of both accuracy and applicability due to their static and semi- dynamic nature. In this paper, we present a fully dynamic multi- learners approach for automated and online QoS modeling in the cloud. We contribute to a hybrid learners solution, which improves accuracy while keeping model complexity adequate. To determine the inputs of QoS model at runtime, we partition the inputs space into two sub-spaces, each of which applies different symmetric uncertainty based selection techniques, and we then combine the sub-spaces results. The learners are also adaptive; they simultaneously allow several machine learning algorithms to model QoS function and dynamically select the best model for prediction on the fly. We experimentally evaluate our models using RUBiS benchmark and realistic FIFA 98 workload. The results show that our multi-learners approach is more accurate and effective in contrast to the other state-of-the-art approaches.
no_new_dataset
0.947332
1404.3708
Yuxiao Dong
Yuxiao Dong, Jie Tang, Nitesh Chawla, Tiancheng Lou, Yang Yang, Bai Wang
Inferring Social Status and Rich Club Effects in Enterprise Communication Networks
13 pages, 4 figures
PLoS ONE 10(3): e0119446. 2015
10.1371/journal.pone.0119446
null
cs.SI cs.AI physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Social status, defined as the relative rank or position that an individual holds in a social hierarchy, is known to be among the most important motivating forces in social behaviors. In this paper, we consider the notion of status from the perspective of a position or title held by a person in an enterprise. We study the intersection of social status and social networks in an enterprise. We study whether enterprise communication logs can help reveal how social interactions and individual status manifest themselves in social networks. To that end, we use two enterprise datasets with three communication channels --- voice call, short message, and email --- to demonstrate the social-behavioral differences among individuals with different status. We have several interesting findings and based on these findings we also develop a model to predict social status. On the individual level, high-status individuals are more likely to be spanned as structural holes by linking to people in parts of the enterprise networks that are otherwise not well connected to one another. On the community level, the principle of homophily, social balance and clique theory generally indicate a "rich club" maintained by high-status individuals, in the sense that this community is much more connected, balanced and dense. Our model can predict social status of individuals with 93% accuracy.
[ { "version": "v1", "created": "Mon, 14 Apr 2014 19:32:08 GMT" }, { "version": "v2", "created": "Tue, 15 Apr 2014 01:25:26 GMT" }, { "version": "v3", "created": "Wed, 16 Apr 2014 20:12:21 GMT" }, { "version": "v4", "created": "Tue, 14 Apr 2015 19:44:47 GMT" } ]
2015-04-15T00:00:00
[ [ "Dong", "Yuxiao", "" ], [ "Tang", "Jie", "" ], [ "Chawla", "Nitesh", "" ], [ "Lou", "Tiancheng", "" ], [ "Yang", "Yang", "" ], [ "Wang", "Bai", "" ] ]
TITLE: Inferring Social Status and Rich Club Effects in Enterprise Communication Networks ABSTRACT: Social status, defined as the relative rank or position that an individual holds in a social hierarchy, is known to be among the most important motivating forces in social behaviors. In this paper, we consider the notion of status from the perspective of a position or title held by a person in an enterprise. We study the intersection of social status and social networks in an enterprise. We study whether enterprise communication logs can help reveal how social interactions and individual status manifest themselves in social networks. To that end, we use two enterprise datasets with three communication channels --- voice call, short message, and email --- to demonstrate the social-behavioral differences among individuals with different status. We have several interesting findings and based on these findings we also develop a model to predict social status. On the individual level, high-status individuals are more likely to be spanned as structural holes by linking to people in parts of the enterprise networks that are otherwise not well connected to one another. On the community level, the principle of homophily, social balance and clique theory generally indicate a "rich club" maintained by high-status individuals, in the sense that this community is much more connected, balanced and dense. Our model can predict social status of individuals with 93% accuracy.
no_new_dataset
0.945701
1411.4894
Ayan Chakrabarti
Ayan Chakrabarti, Ying Xiong, Steven J. Gortler, Todd Zickler
Low-level Vision by Consensus in a Spatial Hierarchy of Regions
Accepted to CVPR 2015. Project page: http://www.ttic.edu/chakrabarti/consensus/
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce a multi-scale framework for low-level vision, where the goal is estimating physical scene values from image data---such as depth from stereo image pairs. The framework uses a dense, overlapping set of image regions at multiple scales and a "local model," such as a slanted-plane model for stereo disparity, that is expected to be valid piecewise across the visual field. Estimation is cast as optimization over a dichotomous mixture of variables, simultaneously determining which regions are inliers with respect to the local model (binary variables) and the correct co-ordinates in the local model space for each inlying region (continuous variables). When the regions are organized into a multi-scale hierarchy, optimization can occur in an efficient and parallel architecture, where distributed computational units iteratively perform calculations and share information through sparse connections between parents and children. The framework performs well on a standard benchmark for binocular stereo, and it produces a distributional scene representation that is appropriate for combining with higher-level reasoning and other low-level cues.
[ { "version": "v1", "created": "Tue, 18 Nov 2014 16:23:06 GMT" }, { "version": "v2", "created": "Tue, 14 Apr 2015 15:57:52 GMT" } ]
2015-04-15T00:00:00
[ [ "Chakrabarti", "Ayan", "" ], [ "Xiong", "Ying", "" ], [ "Gortler", "Steven J.", "" ], [ "Zickler", "Todd", "" ] ]
TITLE: Low-level Vision by Consensus in a Spatial Hierarchy of Regions ABSTRACT: We introduce a multi-scale framework for low-level vision, where the goal is estimating physical scene values from image data---such as depth from stereo image pairs. The framework uses a dense, overlapping set of image regions at multiple scales and a "local model," such as a slanted-plane model for stereo disparity, that is expected to be valid piecewise across the visual field. Estimation is cast as optimization over a dichotomous mixture of variables, simultaneously determining which regions are inliers with respect to the local model (binary variables) and the correct co-ordinates in the local model space for each inlying region (continuous variables). When the regions are organized into a multi-scale hierarchy, optimization can occur in an efficient and parallel architecture, where distributed computational units iteratively perform calculations and share information through sparse connections between parents and children. The framework performs well on a standard benchmark for binocular stereo, and it produces a distributional scene representation that is appropriate for combining with higher-level reasoning and other low-level cues.
no_new_dataset
0.951233
1412.0623
Sean Bell
Sean Bell and Paul Upchurch and Noah Snavely and Kavita Bala
Material Recognition in the Wild with the Materials in Context Database
CVPR 2015. Sean Bell and Paul Upchurch contributed equally
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recognizing materials in real-world images is a challenging task. Real-world materials have rich surface texture, geometry, lighting conditions, and clutter, which combine to make the problem particularly difficult. In this paper, we introduce a new, large-scale, open dataset of materials in the wild, the Materials in Context Database (MINC), and combine this dataset with deep learning to achieve material recognition and segmentation of images in the wild. MINC is an order of magnitude larger than previous material databases, while being more diverse and well-sampled across its 23 categories. Using MINC, we train convolutional neural networks (CNNs) for two tasks: classifying materials from patches, and simultaneous material recognition and segmentation in full images. For patch-based classification on MINC we found that the best performing CNN architectures can achieve 85.2% mean class accuracy. We convert these trained CNN classifiers into an efficient fully convolutional framework combined with a fully connected conditional random field (CRF) to predict the material at every pixel in an image, achieving 73.1% mean class accuracy. Our experiments demonstrate that having a large, well-sampled dataset such as MINC is crucial for real-world material recognition and segmentation.
[ { "version": "v1", "created": "Mon, 1 Dec 2014 20:11:44 GMT" }, { "version": "v2", "created": "Tue, 14 Apr 2015 05:29:32 GMT" } ]
2015-04-15T00:00:00
[ [ "Bell", "Sean", "" ], [ "Upchurch", "Paul", "" ], [ "Snavely", "Noah", "" ], [ "Bala", "Kavita", "" ] ]
TITLE: Material Recognition in the Wild with the Materials in Context Database ABSTRACT: Recognizing materials in real-world images is a challenging task. Real-world materials have rich surface texture, geometry, lighting conditions, and clutter, which combine to make the problem particularly difficult. In this paper, we introduce a new, large-scale, open dataset of materials in the wild, the Materials in Context Database (MINC), and combine this dataset with deep learning to achieve material recognition and segmentation of images in the wild. MINC is an order of magnitude larger than previous material databases, while being more diverse and well-sampled across its 23 categories. Using MINC, we train convolutional neural networks (CNNs) for two tasks: classifying materials from patches, and simultaneous material recognition and segmentation in full images. For patch-based classification on MINC we found that the best performing CNN architectures can achieve 85.2% mean class accuracy. We convert these trained CNN classifiers into an efficient fully convolutional framework combined with a fully connected conditional random field (CRF) to predict the material at every pixel in an image, achieving 73.1% mean class accuracy. Our experiments demonstrate that having a large, well-sampled dataset such as MINC is crucial for real-world material recognition and segmentation.
new_dataset
0.962883
1412.2306
Andrej Karpathy
Andrej Karpathy, Li Fei-Fei
Deep Visual-Semantic Alignments for Generating Image Descriptions
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a model that generates natural language descriptions of images and their regions. Our approach leverages datasets of images and their sentence descriptions to learn about the inter-modal correspondences between language and visual data. Our alignment model is based on a novel combination of Convolutional Neural Networks over image regions, bidirectional Recurrent Neural Networks over sentences, and a structured objective that aligns the two modalities through a multimodal embedding. We then describe a Multimodal Recurrent Neural Network architecture that uses the inferred alignments to learn to generate novel descriptions of image regions. We demonstrate that our alignment model produces state of the art results in retrieval experiments on Flickr8K, Flickr30K and MSCOCO datasets. We then show that the generated descriptions significantly outperform retrieval baselines on both full images and on a new dataset of region-level annotations.
[ { "version": "v1", "created": "Sun, 7 Dec 2014 02:36:07 GMT" }, { "version": "v2", "created": "Tue, 14 Apr 2015 05:02:53 GMT" } ]
2015-04-15T00:00:00
[ [ "Karpathy", "Andrej", "" ], [ "Fei-Fei", "Li", "" ] ]
TITLE: Deep Visual-Semantic Alignments for Generating Image Descriptions ABSTRACT: We present a model that generates natural language descriptions of images and their regions. Our approach leverages datasets of images and their sentence descriptions to learn about the inter-modal correspondences between language and visual data. Our alignment model is based on a novel combination of Convolutional Neural Networks over image regions, bidirectional Recurrent Neural Networks over sentences, and a structured objective that aligns the two modalities through a multimodal embedding. We then describe a Multimodal Recurrent Neural Network architecture that uses the inferred alignments to learn to generate novel descriptions of image regions. We demonstrate that our alignment model produces state of the art results in retrieval experiments on Flickr8K, Flickr30K and MSCOCO datasets. We then show that the generated descriptions significantly outperform retrieval baselines on both full images and on a new dataset of region-level annotations.
new_dataset
0.951323
1412.3709
Abel Gonzalez-Garcia
Abel Gonzalez-Garcia, Alexander Vezhnevets, Vittorio Ferrari
An active search strategy for efficient object class detection
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Object class detectors typically apply a window classifier to all the windows in a large set, either in a sliding window manner or using object proposals. In this paper, we develop an active search strategy that sequentially chooses the next window to evaluate based on all the information gathered before. This results in a substantial reduction in the number of classifier evaluations and in a more elegant approach in general. Our search strategy is guided by two forces. First, we exploit context as the statistical relation between the appearance of a window and its location relative to the object, as observed in the training set. This enables to jump across distant regions in the image (e.g. observing a sky region suggests that cars might be far below) and is done efficiently in a Random Forest framework. Second, we exploit the score of the classifier to attract the search to promising areas surrounding a highly scored window, and to keep away from areas near low scored ones. Our search strategy can be applied on top of any classifier as it treats it as a black-box. In experiments with R-CNN on the challenging SUN2012 dataset, our method matches the detection accuracy of evaluating all windows independently, while evaluating 9x fewer windows.
[ { "version": "v1", "created": "Thu, 11 Dec 2014 16:23:38 GMT" }, { "version": "v2", "created": "Tue, 14 Apr 2015 11:29:51 GMT" } ]
2015-04-15T00:00:00
[ [ "Gonzalez-Garcia", "Abel", "" ], [ "Vezhnevets", "Alexander", "" ], [ "Ferrari", "Vittorio", "" ] ]
TITLE: An active search strategy for efficient object class detection ABSTRACT: Object class detectors typically apply a window classifier to all the windows in a large set, either in a sliding window manner or using object proposals. In this paper, we develop an active search strategy that sequentially chooses the next window to evaluate based on all the information gathered before. This results in a substantial reduction in the number of classifier evaluations and in a more elegant approach in general. Our search strategy is guided by two forces. First, we exploit context as the statistical relation between the appearance of a window and its location relative to the object, as observed in the training set. This enables to jump across distant regions in the image (e.g. observing a sky region suggests that cars might be far below) and is done efficiently in a Random Forest framework. Second, we exploit the score of the classifier to attract the search to promising areas surrounding a highly scored window, and to keep away from areas near low scored ones. Our search strategy can be applied on top of any classifier as it treats it as a black-box. In experiments with R-CNN on the challenging SUN2012 dataset, our method matches the detection accuracy of evaluating all windows independently, while evaluating 9x fewer windows.
no_new_dataset
0.951684
1412.6599
Kevin Bache
Kevin Bache, Dennis DeCoste, Padhraic Smyth
Hot Swapping for Online Adaptation of Optimization Hyperparameters
Submission to ICLR 2015
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We describe a general framework for online adaptation of optimization hyperparameters by `hot swapping' their values during learning. We investigate this approach in the context of adaptive learning rate selection using an explore-exploit strategy from the multi-armed bandit literature. Experiments on a benchmark neural network show that the hot swapping approach leads to consistently better solutions compared to well-known alternatives such as AdaDelta and stochastic gradient with exhaustive hyperparameter search.
[ { "version": "v1", "created": "Sat, 20 Dec 2014 04:36:28 GMT" }, { "version": "v2", "created": "Sat, 28 Feb 2015 05:18:18 GMT" }, { "version": "v3", "created": "Mon, 13 Apr 2015 23:28:01 GMT" } ]
2015-04-15T00:00:00
[ [ "Bache", "Kevin", "" ], [ "DeCoste", "Dennis", "" ], [ "Smyth", "Padhraic", "" ] ]
TITLE: Hot Swapping for Online Adaptation of Optimization Hyperparameters ABSTRACT: We describe a general framework for online adaptation of optimization hyperparameters by `hot swapping' their values during learning. We investigate this approach in the context of adaptive learning rate selection using an explore-exploit strategy from the multi-armed bandit literature. Experiments on a benchmark neural network show that the hot swapping approach leads to consistently better solutions compared to well-known alternatives such as AdaDelta and stochastic gradient with exhaustive hyperparameter search.
no_new_dataset
0.948537
1501.00100
Marco Gramaglia
Marco Gramaglia and Marco Fiore
On the anonymizability of mobile traffic datasets
null
null
null
null
cs.CY cs.CR
http://creativecommons.org/licenses/by-nc-sa/3.0/
Preserving user privacy is paramount when it comes to publicly disclosed datasets that contain fine-grained data about large populations. The problem is especially critical in the case of mobile traffic datasets collected by cellular operators, as they feature elevate subscriber trajectory uniqueness and they are resistant to anonymization through spatiotemporal generalization. In this work, we investigate the $k$-anonymizability of trajectories in two large-scale mobile traffic datasets, by means of a novel dedicated measure. Our results are in agreement with those of previous analyses, however they also provide additional insights on the reasons behind the poor anonimizability of mobile traffic datasets. As such, our study is a step forward in the direction of a more robust dataset anonymization.
[ { "version": "v1", "created": "Wed, 31 Dec 2014 09:53:31 GMT" }, { "version": "v2", "created": "Tue, 14 Apr 2015 09:35:41 GMT" } ]
2015-04-15T00:00:00
[ [ "Gramaglia", "Marco", "" ], [ "Fiore", "Marco", "" ] ]
TITLE: On the anonymizability of mobile traffic datasets ABSTRACT: Preserving user privacy is paramount when it comes to publicly disclosed datasets that contain fine-grained data about large populations. The problem is especially critical in the case of mobile traffic datasets collected by cellular operators, as they feature elevate subscriber trajectory uniqueness and they are resistant to anonymization through spatiotemporal generalization. In this work, we investigate the $k$-anonymizability of trajectories in two large-scale mobile traffic datasets, by means of a novel dedicated measure. Our results are in agreement with those of previous analyses, however they also provide additional insights on the reasons behind the poor anonimizability of mobile traffic datasets. As such, our study is a step forward in the direction of a more robust dataset anonymization.
no_new_dataset
0.952264
1502.01916
Daniel Lemire
Wayne Xin Zhao, Xudong Zhang, Daniel Lemire, Dongdong Shan, Jian-Yun Nie, Hongfei Yan, Ji-Rong Wen
A General SIMD-based Approach to Accelerating Compression Algorithms
null
ACM Trans. Inf. Syst. 33, 3, Article 15 (March 2015)
10.1145/2735629
null
cs.IR
http://creativecommons.org/licenses/by/3.0/
Compression algorithms are important for data oriented tasks, especially in the era of Big Data. Modern processors equipped with powerful SIMD instruction sets, provide us an opportunity for achieving better compression performance. Previous research has shown that SIMD-based optimizations can multiply decoding speeds. Following these pioneering studies, we propose a general approach to accelerate compression algorithms. By instantiating the approach, we have developed several novel integer compression algorithms, called Group-Simple, Group-Scheme, Group-AFOR, and Group-PFD, and implemented their corresponding vectorized versions. We evaluate the proposed algorithms on two public TREC datasets, a Wikipedia dataset and a Twitter dataset. With competitive compression ratios and encoding speeds, our SIMD-based algorithms outperform state-of-the-art non-vectorized algorithms with respect to decoding speeds.
[ { "version": "v1", "created": "Fri, 6 Feb 2015 15:11:47 GMT" } ]
2015-04-15T00:00:00
[ [ "Zhao", "Wayne Xin", "" ], [ "Zhang", "Xudong", "" ], [ "Lemire", "Daniel", "" ], [ "Shan", "Dongdong", "" ], [ "Nie", "Jian-Yun", "" ], [ "Yan", "Hongfei", "" ], [ "Wen", "Ji-Rong", "" ] ]
TITLE: A General SIMD-based Approach to Accelerating Compression Algorithms ABSTRACT: Compression algorithms are important for data oriented tasks, especially in the era of Big Data. Modern processors equipped with powerful SIMD instruction sets, provide us an opportunity for achieving better compression performance. Previous research has shown that SIMD-based optimizations can multiply decoding speeds. Following these pioneering studies, we propose a general approach to accelerate compression algorithms. By instantiating the approach, we have developed several novel integer compression algorithms, called Group-Simple, Group-Scheme, Group-AFOR, and Group-PFD, and implemented their corresponding vectorized versions. We evaluate the proposed algorithms on two public TREC datasets, a Wikipedia dataset and a Twitter dataset. With competitive compression ratios and encoding speeds, our SIMD-based algorithms outperform state-of-the-art non-vectorized algorithms with respect to decoding speeds.
no_new_dataset
0.934275
1504.03154
Carlo Ciliberto
Giulia Pasquale, Carlo Ciliberto, Francesca Odone, Lorenzo Rosasco and Lorenzo Natale
Real-world Object Recognition with Off-the-shelf Deep Conv Nets: How Many Objects can iCub Learn?
18 pages, 9 figures, 3 tables
null
null
null
cs.RO cs.CV cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The ability to visually recognize objects is a fundamental skill for robotics systems. Indeed, a large variety of tasks involving manipulation, navigation or interaction with other agents, deeply depends on the accurate understanding of the visual scene. Yet, at the time being, robots are lacking good visual perceptual systems, which often become the main bottleneck preventing the use of autonomous agents for real-world applications. Lately in computer vision, systems that learn suitable visual representations and based on multi-layer deep convolutional networks are showing remarkable performance in tasks such as large-scale visual recognition and image retrieval. To this regard, it is natural to ask whether such remarkable performance would generalize also to the robotic setting. In this paper we investigate such possibility, while taking further steps in developing a computational vision system to be embedded on a robotic platform, the iCub humanoid robot. In particular, we release a new dataset ({\sc iCubWorld28}) that we use as a benchmark to address the question: {\it how many objects can iCub recognize?} Our study is developed in a learning framework which reflects the typical visual experience of a humanoid robot like the iCub. Experiments shed interesting insights on the strength and weaknesses of current computer vision approaches applied in real robotic settings.
[ { "version": "v1", "created": "Mon, 13 Apr 2015 12:45:09 GMT" }, { "version": "v2", "created": "Tue, 14 Apr 2015 05:56:01 GMT" } ]
2015-04-15T00:00:00
[ [ "Pasquale", "Giulia", "" ], [ "Ciliberto", "Carlo", "" ], [ "Odone", "Francesca", "" ], [ "Rosasco", "Lorenzo", "" ], [ "Natale", "Lorenzo", "" ] ]
TITLE: Real-world Object Recognition with Off-the-shelf Deep Conv Nets: How Many Objects can iCub Learn? ABSTRACT: The ability to visually recognize objects is a fundamental skill for robotics systems. Indeed, a large variety of tasks involving manipulation, navigation or interaction with other agents, deeply depends on the accurate understanding of the visual scene. Yet, at the time being, robots are lacking good visual perceptual systems, which often become the main bottleneck preventing the use of autonomous agents for real-world applications. Lately in computer vision, systems that learn suitable visual representations and based on multi-layer deep convolutional networks are showing remarkable performance in tasks such as large-scale visual recognition and image retrieval. To this regard, it is natural to ask whether such remarkable performance would generalize also to the robotic setting. In this paper we investigate such possibility, while taking further steps in developing a computational vision system to be embedded on a robotic platform, the iCub humanoid robot. In particular, we release a new dataset ({\sc iCubWorld28}) that we use as a benchmark to address the question: {\it how many objects can iCub recognize?} Our study is developed in a learning framework which reflects the typical visual experience of a humanoid robot like the iCub. Experiments shed interesting insights on the strength and weaknesses of current computer vision approaches applied in real robotic settings.
new_dataset
0.960249
1504.03415
Darshana Wickramarachchi Mr
D. C. Wickramarachchi, B. L. Robertson, M. Reale, C. J. Price and J. Brown
HHCART: An Oblique Decision Tree
13 Pages, 1 Figure, 4 Tables, 1 Algorithm
null
null
null
stat.ML cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Decision trees are a popular technique in statistical data classification. They recursively partition the feature space into disjoint sub-regions until each sub-region becomes homogeneous with respect to a particular class. The basic Classification and Regression Tree (CART) algorithm partitions the feature space using axis parallel splits. When the true decision boundaries are not aligned with the feature axes, this approach can produce a complicated boundary structure. Oblique decision trees use oblique decision boundaries to potentially simplify the boundary structure. The major limitation of this approach is that the tree induction algorithm is computationally expensive. In this article we present a new decision tree algorithm, called HHCART. The method utilizes a series of Householder matrices to reflect the training data at each node during the tree construction. Each reflection is based on the directions of the eigenvectors from each classes' covariance matrix. Considering axis parallel splits in the reflected training data provides an efficient way of finding oblique splits in the unreflected training data. Experimental results show that the accuracy and size of the HHCART trees are comparable with some benchmark methods in the literature. The appealing feature of HHCART is that it can handle both qualitative and quantitative features in the same oblique split.
[ { "version": "v1", "created": "Tue, 14 Apr 2015 04:04:00 GMT" } ]
2015-04-15T00:00:00
[ [ "Wickramarachchi", "D. C.", "" ], [ "Robertson", "B. L.", "" ], [ "Reale", "M.", "" ], [ "Price", "C. J.", "" ], [ "Brown", "J.", "" ] ]
TITLE: HHCART: An Oblique Decision Tree ABSTRACT: Decision trees are a popular technique in statistical data classification. They recursively partition the feature space into disjoint sub-regions until each sub-region becomes homogeneous with respect to a particular class. The basic Classification and Regression Tree (CART) algorithm partitions the feature space using axis parallel splits. When the true decision boundaries are not aligned with the feature axes, this approach can produce a complicated boundary structure. Oblique decision trees use oblique decision boundaries to potentially simplify the boundary structure. The major limitation of this approach is that the tree induction algorithm is computationally expensive. In this article we present a new decision tree algorithm, called HHCART. The method utilizes a series of Householder matrices to reflect the training data at each node during the tree construction. Each reflection is based on the directions of the eigenvectors from each classes' covariance matrix. Considering axis parallel splits in the reflected training data provides an efficient way of finding oblique splits in the unreflected training data. Experimental results show that the accuracy and size of the HHCART trees are comparable with some benchmark methods in the literature. The appealing feature of HHCART is that it can handle both qualitative and quantitative features in the same oblique split.
no_new_dataset
0.94887
1504.03425
Iftekhar Naim
Iftekhar Naim, M. Iftekhar Tanveer, Daniel Gildea, Mohammed (Ehsan) Hoque
Automated Analysis and Prediction of Job Interview Performance
14 pages, 8 figures, 6 tables
null
null
null
cs.HC cs.AI cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a computational framework for automatically quantifying verbal and nonverbal behaviors in the context of job interviews. The proposed framework is trained by analyzing the videos of 138 interview sessions with 69 internship-seeking undergraduates at the Massachusetts Institute of Technology (MIT). Our automated analysis includes facial expressions (e.g., smiles, head gestures, facial tracking points), language (e.g., word counts, topic modeling), and prosodic information (e.g., pitch, intonation, and pauses) of the interviewees. The ground truth labels are derived by taking a weighted average over the ratings of 9 independent judges. Our framework can automatically predict the ratings for interview traits such as excitement, friendliness, and engagement with correlation coefficients of 0.75 or higher, and can quantify the relative importance of prosody, language, and facial expressions. By analyzing the relative feature weights learned by the regression models, our framework recommends to speak more fluently, use less filler words, speak as "we" (vs. "I"), use more unique words, and smile more. We also find that the students who were rated highly while answering the first interview question were also rated highly overall (i.e., first impression matters). Finally, our MIT Interview dataset will be made available to other researchers to further validate and expand our findings.
[ { "version": "v1", "created": "Tue, 14 Apr 2015 05:49:26 GMT" } ]
2015-04-15T00:00:00
[ [ "Naim", "Iftekhar", "", "Ehsan" ], [ "Tanveer", "M. Iftekhar", "", "Ehsan" ], [ "Gildea", "Daniel", "", "Ehsan" ], [ "Mohammed", "", "", "Ehsan" ], [ "Hoque", "", "" ] ]
TITLE: Automated Analysis and Prediction of Job Interview Performance ABSTRACT: We present a computational framework for automatically quantifying verbal and nonverbal behaviors in the context of job interviews. The proposed framework is trained by analyzing the videos of 138 interview sessions with 69 internship-seeking undergraduates at the Massachusetts Institute of Technology (MIT). Our automated analysis includes facial expressions (e.g., smiles, head gestures, facial tracking points), language (e.g., word counts, topic modeling), and prosodic information (e.g., pitch, intonation, and pauses) of the interviewees. The ground truth labels are derived by taking a weighted average over the ratings of 9 independent judges. Our framework can automatically predict the ratings for interview traits such as excitement, friendliness, and engagement with correlation coefficients of 0.75 or higher, and can quantify the relative importance of prosody, language, and facial expressions. By analyzing the relative feature weights learned by the regression models, our framework recommends to speak more fluently, use less filler words, speak as "we" (vs. "I"), use more unique words, and smile more. We also find that the students who were rated highly while answering the first interview question were also rated highly overall (i.e., first impression matters). Finally, our MIT Interview dataset will be made available to other researchers to further validate and expand our findings.
new_dataset
0.953622
1504.03504
Fang Wang
Fang Wang, Le Kang, Yi Li
Sketch-based 3D Shape Retrieval using Convolutional Neural Networks
CVPR 2015
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Retrieving 3D models from 2D human sketches has received considerable attention in the areas of graphics, image retrieval, and computer vision. Almost always in state of the art approaches a large amount of "best views" are computed for 3D models, with the hope that the query sketch matches one of these 2D projections of 3D models using predefined features. We argue that this two stage approach (view selection -- matching) is pragmatic but also problematic because the "best views" are subjective and ambiguous, which makes the matching inputs obscure. This imprecise nature of matching further makes it challenging to choose features manually. Instead of relying on the elusive concept of "best views" and the hand-crafted features, we propose to define our views using a minimalism approach and learn features for both sketches and views. Specifically, we drastically reduce the number of views to only two predefined directions for the whole dataset. Then, we learn two Siamese Convolutional Neural Networks (CNNs), one for the views and one for the sketches. The loss function is defined on the within-domain as well as the cross-domain similarities. Our experiments on three benchmark datasets demonstrate that our method is significantly better than state of the art approaches, and outperforms them in all conventional metrics.
[ { "version": "v1", "created": "Tue, 14 Apr 2015 11:55:45 GMT" } ]
2015-04-15T00:00:00
[ [ "Wang", "Fang", "" ], [ "Kang", "Le", "" ], [ "Li", "Yi", "" ] ]
TITLE: Sketch-based 3D Shape Retrieval using Convolutional Neural Networks ABSTRACT: Retrieving 3D models from 2D human sketches has received considerable attention in the areas of graphics, image retrieval, and computer vision. Almost always in state of the art approaches a large amount of "best views" are computed for 3D models, with the hope that the query sketch matches one of these 2D projections of 3D models using predefined features. We argue that this two stage approach (view selection -- matching) is pragmatic but also problematic because the "best views" are subjective and ambiguous, which makes the matching inputs obscure. This imprecise nature of matching further makes it challenging to choose features manually. Instead of relying on the elusive concept of "best views" and the hand-crafted features, we propose to define our views using a minimalism approach and learn features for both sketches and views. Specifically, we drastically reduce the number of views to only two predefined directions for the whole dataset. Then, we learn two Siamese Convolutional Neural Networks (CNNs), one for the views and one for the sketches. The loss function is defined on the within-domain as well as the cross-domain similarities. Our experiments on three benchmark datasets demonstrate that our method is significantly better than state of the art approaches, and outperforms them in all conventional metrics.
no_new_dataset
0.949012
1504.03522
Lukas Neumann
Luk\'a\v{s} Neumann, Ji\v{r}\'i Matas
Efficient Scene Text Localization and Recognition with Local Character Refinement
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
An unconstrained end-to-end text localization and recognition method is presented. The method detects initial text hypothesis in a single pass by an efficient region-based method and subsequently refines the text hypothesis using a more robust local text model, which deviates from the common assumption of region-based methods that all characters are detected as connected components. Additionally, a novel feature based on character stroke area estimation is introduced. The feature is efficiently computed from a region distance map, it is invariant to scaling and rotations and allows to efficiently detect text regions regardless of what portion of text they capture. The method runs in real time and achieves state-of-the-art text localization and recognition results on the ICDAR 2013 Robust Reading dataset.
[ { "version": "v1", "created": "Tue, 14 Apr 2015 12:42:56 GMT" } ]
2015-04-15T00:00:00
[ [ "Neumann", "Lukáš", "" ], [ "Matas", "Jiří", "" ] ]
TITLE: Efficient Scene Text Localization and Recognition with Local Character Refinement ABSTRACT: An unconstrained end-to-end text localization and recognition method is presented. The method detects initial text hypothesis in a single pass by an efficient region-based method and subsequently refines the text hypothesis using a more robust local text model, which deviates from the common assumption of region-based methods that all characters are detected as connected components. Additionally, a novel feature based on character stroke area estimation is introduced. The feature is efficiently computed from a region distance map, it is invariant to scaling and rotations and allows to efficiently detect text regions regardless of what portion of text they capture. The method runs in real time and achieves state-of-the-art text localization and recognition results on the ICDAR 2013 Robust Reading dataset.
no_new_dataset
0.94868
1504.03659
Azad Dehghan Mr
Azad Dehghan
Temporal ordering of clinical events
null
null
null
null
cs.CL cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This report describes a minimalistic set of methods engineered to anchor clinical events onto a temporal space. Specifically, we describe methods to extract clinical events (e.g., Problems, Treatments and Tests), temporal expressions (i.e., time, date, duration, and frequency), and temporal links (e.g., Before, After, Overlap) between events and temporal entities. These methods are developed and validated using high quality datasets.
[ { "version": "v1", "created": "Tue, 14 Apr 2015 18:48:58 GMT" } ]
2015-04-15T00:00:00
[ [ "Dehghan", "Azad", "" ] ]
TITLE: Temporal ordering of clinical events ABSTRACT: This report describes a minimalistic set of methods engineered to anchor clinical events onto a temporal space. Specifically, we describe methods to extract clinical events (e.g., Problems, Treatments and Tests), temporal expressions (i.e., time, date, duration, and frequency), and temporal links (e.g., Before, After, Overlap) between events and temporal entities. These methods are developed and validated using high quality datasets.
no_new_dataset
0.946448
1409.3518
Do-kyum Kim
Do-kyum Kim, Geoffrey M. Voelker, Lawrence K. Saul
Topic Modeling of Hierarchical Corpora
null
null
null
null
stat.ML cs.IR cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study the problem of topic modeling in corpora whose documents are organized in a multi-level hierarchy. We explore a parametric approach to this problem, assuming that the number of topics is known or can be estimated by cross-validation. The models we consider can be viewed as special (finite-dimensional) instances of hierarchical Dirichlet processes (HDPs). For these models we show that there exists a simple variational approximation for probabilistic inference. The approximation relies on a previously unexploited inequality that handles the conditional dependence between Dirichlet latent variables in adjacent levels of the model's hierarchy. We compare our approach to existing implementations of nonparametric HDPs. On several benchmarks we find that our approach is faster than Gibbs sampling and able to learn more predictive models than existing variational methods. Finally, we demonstrate the large-scale viability of our approach on two newly available corpora from researchers in computer security---one with 350,000 documents and over 6,000 internal subcategories, the other with a five-level deep hierarchy.
[ { "version": "v1", "created": "Thu, 11 Sep 2014 18:00:59 GMT" }, { "version": "v2", "created": "Mon, 13 Apr 2015 06:29:46 GMT" } ]
2015-04-14T00:00:00
[ [ "Kim", "Do-kyum", "" ], [ "Voelker", "Geoffrey M.", "" ], [ "Saul", "Lawrence K.", "" ] ]
TITLE: Topic Modeling of Hierarchical Corpora ABSTRACT: We study the problem of topic modeling in corpora whose documents are organized in a multi-level hierarchy. We explore a parametric approach to this problem, assuming that the number of topics is known or can be estimated by cross-validation. The models we consider can be viewed as special (finite-dimensional) instances of hierarchical Dirichlet processes (HDPs). For these models we show that there exists a simple variational approximation for probabilistic inference. The approximation relies on a previously unexploited inequality that handles the conditional dependence between Dirichlet latent variables in adjacent levels of the model's hierarchy. We compare our approach to existing implementations of nonparametric HDPs. On several benchmarks we find that our approach is faster than Gibbs sampling and able to learn more predictive models than existing variational methods. Finally, we demonstrate the large-scale viability of our approach on two newly available corpora from researchers in computer security---one with 350,000 documents and over 6,000 internal subcategories, the other with a five-level deep hierarchy.
no_new_dataset
0.945096
1412.6597
Tom Paine
Tom Le Paine, Pooya Khorrami, Wei Han, Thomas S. Huang
An Analysis of Unsupervised Pre-training in Light of Recent Advances
Accepted as a workshop contribution to ICLR 2015
null
null
null
cs.CV cs.LG cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Convolutional neural networks perform well on object recognition because of a number of recent advances: rectified linear units (ReLUs), data augmentation, dropout, and large labelled datasets. Unsupervised data has been proposed as another way to improve performance. Unfortunately, unsupervised pre-training is not used by state-of-the-art methods leading to the following question: Is unsupervised pre-training still useful given recent advances? If so, when? We answer this in three parts: we 1) develop an unsupervised method that incorporates ReLUs and recent unsupervised regularization techniques, 2) analyze the benefits of unsupervised pre-training compared to data augmentation and dropout on CIFAR-10 while varying the ratio of unsupervised to supervised samples, 3) verify our findings on STL-10. We discover unsupervised pre-training, as expected, helps when the ratio of unsupervised to supervised samples is high, and surprisingly, hurts when the ratio is low. We also use unsupervised pre-training with additional color augmentation to achieve near state-of-the-art performance on STL-10.
[ { "version": "v1", "created": "Sat, 20 Dec 2014 04:20:55 GMT" }, { "version": "v2", "created": "Tue, 27 Jan 2015 22:03:40 GMT" }, { "version": "v3", "created": "Mon, 2 Mar 2015 21:05:34 GMT" }, { "version": "v4", "created": "Fri, 10 Apr 2015 21:26:31 GMT" } ]
2015-04-14T00:00:00
[ [ "Paine", "Tom Le", "" ], [ "Khorrami", "Pooya", "" ], [ "Han", "Wei", "" ], [ "Huang", "Thomas S.", "" ] ]
TITLE: An Analysis of Unsupervised Pre-training in Light of Recent Advances ABSTRACT: Convolutional neural networks perform well on object recognition because of a number of recent advances: rectified linear units (ReLUs), data augmentation, dropout, and large labelled datasets. Unsupervised data has been proposed as another way to improve performance. Unfortunately, unsupervised pre-training is not used by state-of-the-art methods leading to the following question: Is unsupervised pre-training still useful given recent advances? If so, when? We answer this in three parts: we 1) develop an unsupervised method that incorporates ReLUs and recent unsupervised regularization techniques, 2) analyze the benefits of unsupervised pre-training compared to data augmentation and dropout on CIFAR-10 while varying the ratio of unsupervised to supervised samples, 3) verify our findings on STL-10. We discover unsupervised pre-training, as expected, helps when the ratio of unsupervised to supervised samples is high, and surprisingly, hurts when the ratio is low. We also use unsupervised pre-training with additional color augmentation to achieve near state-of-the-art performance on STL-10.
no_new_dataset
0.945399
1412.6806
Alexey Dosovitskiy
Jost Tobias Springenberg, Alexey Dosovitskiy, Thomas Brox, Martin Riedmiller
Striving for Simplicity: The All Convolutional Net
accepted to ICLR-2015 workshop track; no changes other than style
null
null
null
cs.LG cs.CV cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Most modern convolutional neural networks (CNNs) used for object recognition are built using the same principles: Alternating convolution and max-pooling layers followed by a small number of fully connected layers. We re-evaluate the state of the art for object recognition from small images with convolutional networks, questioning the necessity of different components in the pipeline. We find that max-pooling can simply be replaced by a convolutional layer with increased stride without loss in accuracy on several image recognition benchmarks. Following this finding -- and building on other recent work for finding simple network structures -- we propose a new architecture that consists solely of convolutional layers and yields competitive or state of the art performance on several object recognition datasets (CIFAR-10, CIFAR-100, ImageNet). To analyze the network we introduce a new variant of the "deconvolution approach" for visualizing features learned by CNNs, which can be applied to a broader range of network structures than existing approaches.
[ { "version": "v1", "created": "Sun, 21 Dec 2014 16:16:37 GMT" }, { "version": "v2", "created": "Mon, 2 Mar 2015 21:44:06 GMT" }, { "version": "v3", "created": "Mon, 13 Apr 2015 07:58:17 GMT" } ]
2015-04-14T00:00:00
[ [ "Springenberg", "Jost Tobias", "" ], [ "Dosovitskiy", "Alexey", "" ], [ "Brox", "Thomas", "" ], [ "Riedmiller", "Martin", "" ] ]
TITLE: Striving for Simplicity: The All Convolutional Net ABSTRACT: Most modern convolutional neural networks (CNNs) used for object recognition are built using the same principles: Alternating convolution and max-pooling layers followed by a small number of fully connected layers. We re-evaluate the state of the art for object recognition from small images with convolutional networks, questioning the necessity of different components in the pipeline. We find that max-pooling can simply be replaced by a convolutional layer with increased stride without loss in accuracy on several image recognition benchmarks. Following this finding -- and building on other recent work for finding simple network structures -- we propose a new architecture that consists solely of convolutional layers and yields competitive or state of the art performance on several object recognition datasets (CIFAR-10, CIFAR-100, ImageNet). To analyze the network we introduce a new variant of the "deconvolution approach" for visualizing features learned by CNNs, which can be applied to a broader range of network structures than existing approaches.
no_new_dataset
0.949529
1412.8419
Pedro O. Pinheiro
Remi Lebret and Pedro O. Pinheiro and Ronan Collobert
Simple Image Description Generator via a Linear Phrase-Based Approach
Accepted as a workshop paper at ICLR 2015
null
null
null
cs.CL cs.CV cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Generating a novel textual description of an image is an interesting problem that connects computer vision and natural language processing. In this paper, we present a simple model that is able to generate descriptive sentences given a sample image. This model has a strong focus on the syntax of the descriptions. We train a purely bilinear model that learns a metric between an image representation (generated from a previously trained Convolutional Neural Network) and phrases that are used to described them. The system is then able to infer phrases from a given image sample. Based on caption syntax statistics, we propose a simple language model that can produce relevant descriptions for a given test image using the phrases inferred. Our approach, which is considerably simpler than state-of-the-art models, achieves comparable results on the recently release Microsoft COCO dataset.
[ { "version": "v1", "created": "Mon, 29 Dec 2014 18:43:10 GMT" }, { "version": "v2", "created": "Wed, 18 Mar 2015 05:09:13 GMT" }, { "version": "v3", "created": "Sat, 11 Apr 2015 03:53:26 GMT" } ]
2015-04-14T00:00:00
[ [ "Lebret", "Remi", "" ], [ "Pinheiro", "Pedro O.", "" ], [ "Collobert", "Ronan", "" ] ]
TITLE: Simple Image Description Generator via a Linear Phrase-Based Approach ABSTRACT: Generating a novel textual description of an image is an interesting problem that connects computer vision and natural language processing. In this paper, we present a simple model that is able to generate descriptive sentences given a sample image. This model has a strong focus on the syntax of the descriptions. We train a purely bilinear model that learns a metric between an image representation (generated from a previously trained Convolutional Neural Network) and phrases that are used to described them. The system is then able to infer phrases from a given image sample. Based on caption syntax statistics, we propose a simple language model that can produce relevant descriptions for a given test image using the phrases inferred. Our approach, which is considerably simpler than state-of-the-art models, achieves comparable results on the recently release Microsoft COCO dataset.
no_new_dataset
0.944587
1501.07180
Liliang Zhang
Liliang Zhang, Liang Lin, Xian Wu, Shengyong Ding, Lei Zhang
End-to-End Photo-Sketch Generation via Fully Convolutional Representation Learning
8 pages, 6 figures. Proceeding in ACM International Conference on Multimedia Retrieval (ICMR), 2015
null
10.1145/2671188.2749321
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Sketch-based face recognition is an interesting task in vision and multimedia research, yet it is quite challenging due to the great difference between face photos and sketches. In this paper, we propose a novel approach for photo-sketch generation, aiming to automatically transform face photos into detail-preserving personal sketches. Unlike the traditional models synthesizing sketches based on a dictionary of exemplars, we develop a fully convolutional network to learn the end-to-end photo-sketch mapping. Our approach takes whole face photos as inputs and directly generates the corresponding sketch images with efficient inference and learning, in which the architecture are stacked by only convolutional kernels of very small sizes. To well capture the person identity during the photo-sketch transformation, we define our optimization objective in the form of joint generative-discriminative minimization. In particular, a discriminative regularization term is incorporated into the photo-sketch generation, enhancing the discriminability of the generated person sketches against other individuals. Extensive experiments on several standard benchmarks suggest that our approach outperforms other state-of-the-art methods in both photo-sketch generation and face sketch verification.
[ { "version": "v1", "created": "Wed, 28 Jan 2015 16:32:53 GMT" }, { "version": "v2", "created": "Sat, 11 Apr 2015 14:28:21 GMT" } ]
2015-04-14T00:00:00
[ [ "Zhang", "Liliang", "" ], [ "Lin", "Liang", "" ], [ "Wu", "Xian", "" ], [ "Ding", "Shengyong", "" ], [ "Zhang", "Lei", "" ] ]
TITLE: End-to-End Photo-Sketch Generation via Fully Convolutional Representation Learning ABSTRACT: Sketch-based face recognition is an interesting task in vision and multimedia research, yet it is quite challenging due to the great difference between face photos and sketches. In this paper, we propose a novel approach for photo-sketch generation, aiming to automatically transform face photos into detail-preserving personal sketches. Unlike the traditional models synthesizing sketches based on a dictionary of exemplars, we develop a fully convolutional network to learn the end-to-end photo-sketch mapping. Our approach takes whole face photos as inputs and directly generates the corresponding sketch images with efficient inference and learning, in which the architecture are stacked by only convolutional kernels of very small sizes. To well capture the person identity during the photo-sketch transformation, we define our optimization objective in the form of joint generative-discriminative minimization. In particular, a discriminative regularization term is incorporated into the photo-sketch generation, enhancing the discriminability of the generated person sketches against other individuals. Extensive experiments on several standard benchmarks suggest that our approach outperforms other state-of-the-art methods in both photo-sketch generation and face sketch verification.
no_new_dataset
0.948442
1502.07645
Yu-Xiang Wang
Yu-Xiang Wang, Stephen E. Fienberg, Alex Smola
Privacy for Free: Posterior Sampling and Stochastic Gradient Monte Carlo
null
null
null
null
stat.ML cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the problem of Bayesian learning on sensitive datasets and present two simple but somewhat surprising results that connect Bayesian learning to "differential privacy:, a cryptographic approach to protect individual-level privacy while permiting database-level utility. Specifically, we show that that under standard assumptions, getting one single sample from a posterior distribution is differentially private "for free". We will see that estimator is statistically consistent, near optimal and computationally tractable whenever the Bayesian model of interest is consistent, optimal and tractable. Similarly but separately, we show that a recent line of works that use stochastic gradient for Hybrid Monte Carlo (HMC) sampling also preserve differentially privacy with minor or no modifications of the algorithmic procedure at all, these observations lead to an "anytime" algorithm for Bayesian learning under privacy constraint. We demonstrate that it performs much better than the state-of-the-art differential private methods on synthetic and real datasets.
[ { "version": "v1", "created": "Thu, 26 Feb 2015 17:38:47 GMT" }, { "version": "v2", "created": "Sun, 12 Apr 2015 02:53:05 GMT" } ]
2015-04-14T00:00:00
[ [ "Wang", "Yu-Xiang", "" ], [ "Fienberg", "Stephen E.", "" ], [ "Smola", "Alex", "" ] ]
TITLE: Privacy for Free: Posterior Sampling and Stochastic Gradient Monte Carlo ABSTRACT: We consider the problem of Bayesian learning on sensitive datasets and present two simple but somewhat surprising results that connect Bayesian learning to "differential privacy:, a cryptographic approach to protect individual-level privacy while permiting database-level utility. Specifically, we show that that under standard assumptions, getting one single sample from a posterior distribution is differentially private "for free". We will see that estimator is statistically consistent, near optimal and computationally tractable whenever the Bayesian model of interest is consistent, optimal and tractable. Similarly but separately, we show that a recent line of works that use stochastic gradient for Hybrid Monte Carlo (HMC) sampling also preserve differentially privacy with minor or no modifications of the algorithmic procedure at all, these observations lead to an "anytime" algorithm for Bayesian learning under privacy constraint. We demonstrate that it performs much better than the state-of-the-art differential private methods on synthetic and real datasets.
no_new_dataset
0.947914
1503.02801
Jiaming Xu
Jiaming Xu, Bo Xu, Guanhua Tian, Jun Zhao, Fangyuan Wang, Hongwei Hao
Short Text Hashing Improved by Integrating Multi-Granularity Topics and Tags
12 pages, accepted at CICLing 2015
null
10.1007/978-3-319-18111-0_33
null
cs.IR cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Due to computational and storage efficiencies of compact binary codes, hashing has been widely used for large-scale similarity search. Unfortunately, many existing hashing methods based on observed keyword features are not effective for short texts due to the sparseness and shortness. Recently, some researchers try to utilize latent topics of certain granularity to preserve semantic similarity in hash codes beyond keyword matching. However, topics of certain granularity are not adequate to represent the intrinsic semantic information. In this paper, we present a novel unified approach for short text Hashing using Multi-granularity Topics and Tags, dubbed HMTT. In particular, we propose a selection method to choose the optimal multi-granularity topics depending on the type of dataset, and design two distinct hashing strategies to incorporate multi-granularity topics. We also propose a simple and effective method to exploit tags to enhance the similarity of related texts. We carry out extensive experiments on one short text dataset as well as on one normal text dataset. The results demonstrate that our approach is effective and significantly outperforms baselines on several evaluation metrics.
[ { "version": "v1", "created": "Tue, 10 Mar 2015 07:51:59 GMT" } ]
2015-04-14T00:00:00
[ [ "Xu", "Jiaming", "" ], [ "Xu", "Bo", "" ], [ "Tian", "Guanhua", "" ], [ "Zhao", "Jun", "" ], [ "Wang", "Fangyuan", "" ], [ "Hao", "Hongwei", "" ] ]
TITLE: Short Text Hashing Improved by Integrating Multi-Granularity Topics and Tags ABSTRACT: Due to computational and storage efficiencies of compact binary codes, hashing has been widely used for large-scale similarity search. Unfortunately, many existing hashing methods based on observed keyword features are not effective for short texts due to the sparseness and shortness. Recently, some researchers try to utilize latent topics of certain granularity to preserve semantic similarity in hash codes beyond keyword matching. However, topics of certain granularity are not adequate to represent the intrinsic semantic information. In this paper, we present a novel unified approach for short text Hashing using Multi-granularity Topics and Tags, dubbed HMTT. In particular, we propose a selection method to choose the optimal multi-granularity topics depending on the type of dataset, and design two distinct hashing strategies to incorporate multi-granularity topics. We also propose a simple and effective method to exploit tags to enhance the similarity of related texts. We carry out extensive experiments on one short text dataset as well as on one normal text dataset. The results demonstrate that our approach is effective and significantly outperforms baselines on several evaluation metrics.
no_new_dataset
0.944893
1503.06813
Tarek El-Gaaly
Haopeng Zhang, Tarek El-Gaaly, Ahmed Elgammal, Zhiguo Jiang
Factorization of View-Object Manifolds for Joint Object Recognition and Pose Estimation
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Due to large variations in shape, appearance, and viewing conditions, object recognition is a key precursory challenge in the fields of object manipulation and robotic/AI visual reasoning in general. Recognizing object categories, particular instances of objects and viewpoints/poses of objects are three critical subproblems robots must solve in order to accurately grasp/manipulate objects and reason about their environments. Multi-view images of the same object lie on intrinsic low-dimensional manifolds in descriptor spaces (e.g. visual/depth descriptor spaces). These object manifolds share the same topology despite being geometrically different. Each object manifold can be represented as a deformed version of a unified manifold. The object manifolds can thus be parameterized by its homeomorphic mapping/reconstruction from the unified manifold. In this work, we develop a novel framework to jointly solve the three challenging recognition sub-problems, by explicitly modeling the deformations of object manifolds and factorizing it in a view-invariant space for recognition. We perform extensive experiments on several challenging datasets and achieve state-of-the-art results.
[ { "version": "v1", "created": "Mon, 23 Mar 2015 20:05:36 GMT" }, { "version": "v2", "created": "Mon, 13 Apr 2015 02:59:41 GMT" } ]
2015-04-14T00:00:00
[ [ "Zhang", "Haopeng", "" ], [ "El-Gaaly", "Tarek", "" ], [ "Elgammal", "Ahmed", "" ], [ "Jiang", "Zhiguo", "" ] ]
TITLE: Factorization of View-Object Manifolds for Joint Object Recognition and Pose Estimation ABSTRACT: Due to large variations in shape, appearance, and viewing conditions, object recognition is a key precursory challenge in the fields of object manipulation and robotic/AI visual reasoning in general. Recognizing object categories, particular instances of objects and viewpoints/poses of objects are three critical subproblems robots must solve in order to accurately grasp/manipulate objects and reason about their environments. Multi-view images of the same object lie on intrinsic low-dimensional manifolds in descriptor spaces (e.g. visual/depth descriptor spaces). These object manifolds share the same topology despite being geometrically different. Each object manifold can be represented as a deformed version of a unified manifold. The object manifolds can thus be parameterized by its homeomorphic mapping/reconstruction from the unified manifold. In this work, we develop a novel framework to jointly solve the three challenging recognition sub-problems, by explicitly modeling the deformations of object manifolds and factorizing it in a view-invariant space for recognition. We perform extensive experiments on several challenging datasets and achieve state-of-the-art results.
no_new_dataset
0.948917
1503.08909
George Toderici
Joe Yue-Hei Ng and Matthew Hausknecht and Sudheendra Vijayanarasimhan and Oriol Vinyals and Rajat Monga and George Toderici
Beyond Short Snippets: Deep Networks for Video Classification
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Convolutional neural networks (CNNs) have been extensively applied for image recognition problems giving state-of-the-art results on recognition, detection, segmentation and retrieval. In this work we propose and evaluate several deep neural network architectures to combine image information across a video over longer time periods than previously attempted. We propose two methods capable of handling full length videos. The first method explores various convolutional temporal feature pooling architectures, examining the various design choices which need to be made when adapting a CNN for this task. The second proposed method explicitly models the video as an ordered sequence of frames. For this purpose we employ a recurrent neural network that uses Long Short-Term Memory (LSTM) cells which are connected to the output of the underlying CNN. Our best networks exhibit significant performance improvements over previously published results on the Sports 1 million dataset (73.1% vs. 60.9%) and the UCF-101 datasets with (88.6% vs. 88.0%) and without additional optical flow information (82.6% vs. 72.8%).
[ { "version": "v1", "created": "Tue, 31 Mar 2015 04:34:12 GMT" }, { "version": "v2", "created": "Mon, 13 Apr 2015 19:44:25 GMT" } ]
2015-04-14T00:00:00
[ [ "Ng", "Joe Yue-Hei", "" ], [ "Hausknecht", "Matthew", "" ], [ "Vijayanarasimhan", "Sudheendra", "" ], [ "Vinyals", "Oriol", "" ], [ "Monga", "Rajat", "" ], [ "Toderici", "George", "" ] ]
TITLE: Beyond Short Snippets: Deep Networks for Video Classification ABSTRACT: Convolutional neural networks (CNNs) have been extensively applied for image recognition problems giving state-of-the-art results on recognition, detection, segmentation and retrieval. In this work we propose and evaluate several deep neural network architectures to combine image information across a video over longer time periods than previously attempted. We propose two methods capable of handling full length videos. The first method explores various convolutional temporal feature pooling architectures, examining the various design choices which need to be made when adapting a CNN for this task. The second proposed method explicitly models the video as an ordered sequence of frames. For this purpose we employ a recurrent neural network that uses Long Short-Term Memory (LSTM) cells which are connected to the output of the underlying CNN. Our best networks exhibit significant performance improvements over previously published results on the Sports 1 million dataset (73.1% vs. 60.9%) and the UCF-101 datasets with (88.6% vs. 88.0%) and without additional optical flow information (82.6% vs. 72.8%).
no_new_dataset
0.953622
1504.00591
Jonathan Beard
Jonathan C. Beard and Roger D. Chamberlain
Run Time Approximation of Non-blocking Service Rates for Streaming Systems
technical report
null
null
null
cs.PF
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Stream processing is a compute paradigm that promises safe and efficient parallelism. Modern big-data problems are often well suited for stream processing's throughput-oriented nature. Realization of efficient stream processing requires monitoring and optimization of multiple communications links. Most techniques to optimize these links use queueing network models or network flow models, which require some idea of the actual execution rate of each independent compute kernel within the system. What we want to know is how fast can each kernel process data independent of other communicating kernels. This is known as the "service rate" of the kernel within the queueing literature. Current approaches to divining service rates are static. Modern workloads, however, are often dynamic. Shared cloud systems also present applications with highly dynamic execution environments (multiple users, hardware migration, etc.). It is therefore desirable to continuously re-tune an application during run time (online) in response to changing conditions. Our approach enables online service rate monitoring under most conditions, obviating the need for reliance on steady state predictions for what are probably non-steady state phenomena. First, some of the difficulties associated with online service rate determination are examined. Second, the algorithm to approximate the online non-blocking service rate is described. Lastly, the algorithm is implemented within the open source RaftLib framework for validation using a simple microbenchmark as well as two full streaming applications.
[ { "version": "v1", "created": "Thu, 2 Apr 2015 15:47:19 GMT" }, { "version": "v2", "created": "Mon, 13 Apr 2015 00:08:31 GMT" } ]
2015-04-14T00:00:00
[ [ "Beard", "Jonathan C.", "" ], [ "Chamberlain", "Roger D.", "" ] ]
TITLE: Run Time Approximation of Non-blocking Service Rates for Streaming Systems ABSTRACT: Stream processing is a compute paradigm that promises safe and efficient parallelism. Modern big-data problems are often well suited for stream processing's throughput-oriented nature. Realization of efficient stream processing requires monitoring and optimization of multiple communications links. Most techniques to optimize these links use queueing network models or network flow models, which require some idea of the actual execution rate of each independent compute kernel within the system. What we want to know is how fast can each kernel process data independent of other communicating kernels. This is known as the "service rate" of the kernel within the queueing literature. Current approaches to divining service rates are static. Modern workloads, however, are often dynamic. Shared cloud systems also present applications with highly dynamic execution environments (multiple users, hardware migration, etc.). It is therefore desirable to continuously re-tune an application during run time (online) in response to changing conditions. Our approach enables online service rate monitoring under most conditions, obviating the need for reliance on steady state predictions for what are probably non-steady state phenomena. First, some of the difficulties associated with online service rate determination are examined. Second, the algorithm to approximate the online non-blocking service rate is described. Lastly, the algorithm is implemented within the open source RaftLib framework for validation using a simple microbenchmark as well as two full streaming applications.
no_new_dataset
0.940517
1504.02886
Minghua Xia
Minghua Xia and Sonia A\"issa
Fundamental Relations Between Reactive and Proactive Relay-Selection Strategies
4 pages, to appear in IEEE Communications Letters
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Two major relay-selection strategies widely applied in cooperative decode-and-forward (DF) relaying networks, namely, reactive relay selection (RRS) and proactive relay selection (PRS), are generally looked upon as independent and studied separately. In this paper, RRS and PRS are proven to be equivalent with respect to the end-to-end outage probability from the first principle, i.e. their respective relay-selection criteria. On the other hand, RRS is shown to be superior to PRS with respect to the end-to-end symbol error rate. Afterwards, a case study of a general DF relaying system, subject to co-channel interferences and additive white Gaussian noise at both the relaying nodes and the destination, is performed to explicitly illustrate the aforementioned outage equivalence. These fundamental relations provide intuitive yet insightful performance benchmarks for comparing various applications of these two relay-selection strategies.
[ { "version": "v1", "created": "Sat, 11 Apr 2015 15:14:48 GMT" } ]
2015-04-14T00:00:00
[ [ "Xia", "Minghua", "" ], [ "Aïssa", "Sonia", "" ] ]
TITLE: Fundamental Relations Between Reactive and Proactive Relay-Selection Strategies ABSTRACT: Two major relay-selection strategies widely applied in cooperative decode-and-forward (DF) relaying networks, namely, reactive relay selection (RRS) and proactive relay selection (PRS), are generally looked upon as independent and studied separately. In this paper, RRS and PRS are proven to be equivalent with respect to the end-to-end outage probability from the first principle, i.e. their respective relay-selection criteria. On the other hand, RRS is shown to be superior to PRS with respect to the end-to-end symbol error rate. Afterwards, a case study of a general DF relaying system, subject to co-channel interferences and additive white Gaussian noise at both the relaying nodes and the destination, is performed to explicitly illustrate the aforementioned outage equivalence. These fundamental relations provide intuitive yet insightful performance benchmarks for comparing various applications of these two relay-selection strategies.
no_new_dataset
0.952131
1504.02902
Alexander Kalmanovich
Alexander Kalmanovich and Gal Chechik
Gradual Training Method for Denoising Auto Encoders
arXiv admin note: substantial text overlap with arXiv:1412.6257
null
null
null
cs.LG cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Stacked denoising auto encoders (DAEs) are well known to learn useful deep representations, which can be used to improve supervised training by initializing a deep network. We investigate a training scheme of a deep DAE, where DAE layers are gradually added and keep adapting as additional layers are added. We show that in the regime of mid-sized datasets, this gradual training provides a small but consistent improvement over stacked training in both reconstruction quality and classification error over stacked training on MNIST and CIFAR datasets.
[ { "version": "v1", "created": "Sat, 11 Apr 2015 17:51:41 GMT" } ]
2015-04-14T00:00:00
[ [ "Kalmanovich", "Alexander", "" ], [ "Chechik", "Gal", "" ] ]
TITLE: Gradual Training Method for Denoising Auto Encoders ABSTRACT: Stacked denoising auto encoders (DAEs) are well known to learn useful deep representations, which can be used to improve supervised training by initializing a deep network. We investigate a training scheme of a deep DAE, where DAE layers are gradually added and keep adapting as additional layers are added. We show that in the regime of mid-sized datasets, this gradual training provides a small but consistent improvement over stacked training in both reconstruction quality and classification error over stacked training on MNIST and CIFAR datasets.
no_new_dataset
0.949482
1504.02975
F. Ozgur Catak
Ferhat \"Ozg\"ur \c{C}atak
Classification with Extreme Learning Machine and Ensemble Algorithms Over Randomly Partitioned Data
In Turkish, SIU
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this age of Big Data, machine learning based data mining methods are extensively used to inspect large scale data sets. Deriving applicable predictive modeling from these type of data sets is a challenging obstacle because of their high complexity. Opportunity with high data availability levels, automated classification of data sets has become a critical and complicated function. In this paper, the power of applying MapReduce based Distributed AdaBoosting of Extreme Learning Machine (ELM) are explored to build reliable predictive bag of classification models. Thus, (i) dataset ensembles are build; (ii) ELM algorithm is used to build weak classification models; and (iii) build a strong classification model from a set of weak classification models. This training model is applied to the publicly available knowledge discovery and data mining datasets.
[ { "version": "v1", "created": "Sun, 12 Apr 2015 14:03:25 GMT" } ]
2015-04-14T00:00:00
[ [ "Çatak", "Ferhat Özgür", "" ] ]
TITLE: Classification with Extreme Learning Machine and Ensemble Algorithms Over Randomly Partitioned Data ABSTRACT: In this age of Big Data, machine learning based data mining methods are extensively used to inspect large scale data sets. Deriving applicable predictive modeling from these type of data sets is a challenging obstacle because of their high complexity. Opportunity with high data availability levels, automated classification of data sets has become a critical and complicated function. In this paper, the power of applying MapReduce based Distributed AdaBoosting of Extreme Learning Machine (ELM) are explored to build reliable predictive bag of classification models. Thus, (i) dataset ensembles are build; (ii) ELM algorithm is used to build weak classification models; and (iii) build a strong classification model from a set of weak classification models. This training model is applied to the publicly available knowledge discovery and data mining datasets.
no_new_dataset
0.94545
1301.1275
Luca Allodi
Luca Allodi, Fabio Massacci
My Software has a Vulnerability, should I worry?
12 pages, 4 figures
ACM TISSEC Vol 17 Issue 1, 2014
10.1145/2630069
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
(U.S) Rule-based policies to mitigate software risk suggest to use the CVSS score to measure the individual vulnerability risk and act accordingly: an HIGH CVSS score according to the NVD (National (U.S.) Vulnerability Database) is therefore translated into a "Yes". A key issue is whether such rule is economically sensible, in particular if reported vulnerabilities have been actually exploited in the wild, and whether the risk score do actually match the risk of actual exploitation. We compare the NVD dataset with two additional datasets, the EDB for the white market of vulnerabilities (such as those present in Metasploit), and the EKITS for the exploits traded in the black market. We benchmark them against Symantec's threat explorer dataset (SYM) of actual exploit in the wild. We analyze the whole spectrum of CVSS submetrics and use these characteristics to perform a case-controlled analysis of CVSS scores (similar to those used to link lung cancer and smoking) to test its reliability as a risk factor for actual exploitation. We conclude that (a) fixing just because a high CVSS score in NVD only yields negligible risk reduction, (b) the additional existence of proof of concepts exploits (e.g. in EDB) may yield some additional but not large risk reduction, (c) fixing in response to presence in black markets yields the equivalent risk reduction of wearing safety belt in cars (you might also die but still..). On the negative side, our study shows that as industry we miss a metric with high specificity (ruling out vulns for which we shouldn't worry). In order to address the feedback from BlackHat 2013's audience, the final revision (V3) provides additional data in Appendix A detailing how the control variables in the study affect the results.
[ { "version": "v1", "created": "Mon, 7 Jan 2013 17:32:36 GMT" }, { "version": "v2", "created": "Mon, 5 Aug 2013 21:09:41 GMT" }, { "version": "v3", "created": "Tue, 24 Sep 2013 14:05:27 GMT" } ]
2015-04-13T00:00:00
[ [ "Allodi", "Luca", "" ], [ "Massacci", "Fabio", "" ] ]
TITLE: My Software has a Vulnerability, should I worry? ABSTRACT: (U.S) Rule-based policies to mitigate software risk suggest to use the CVSS score to measure the individual vulnerability risk and act accordingly: an HIGH CVSS score according to the NVD (National (U.S.) Vulnerability Database) is therefore translated into a "Yes". A key issue is whether such rule is economically sensible, in particular if reported vulnerabilities have been actually exploited in the wild, and whether the risk score do actually match the risk of actual exploitation. We compare the NVD dataset with two additional datasets, the EDB for the white market of vulnerabilities (such as those present in Metasploit), and the EKITS for the exploits traded in the black market. We benchmark them against Symantec's threat explorer dataset (SYM) of actual exploit in the wild. We analyze the whole spectrum of CVSS submetrics and use these characteristics to perform a case-controlled analysis of CVSS scores (similar to those used to link lung cancer and smoking) to test its reliability as a risk factor for actual exploitation. We conclude that (a) fixing just because a high CVSS score in NVD only yields negligible risk reduction, (b) the additional existence of proof of concepts exploits (e.g. in EDB) may yield some additional but not large risk reduction, (c) fixing in response to presence in black markets yields the equivalent risk reduction of wearing safety belt in cars (you might also die but still..). On the negative side, our study shows that as industry we miss a metric with high specificity (ruling out vulns for which we shouldn't worry). In order to address the feedback from BlackHat 2013's audience, the final revision (V3) provides additional data in Appendix A detailing how the control variables in the study affect the results.
no_new_dataset
0.902995
1406.2080
Sainbayar Sukhbaatar
Sainbayar Sukhbaatar, Joan Bruna, Manohar Paluri, Lubomir Bourdev and Rob Fergus
Training Convolutional Networks with Noisy Labels
Accepted as a workshop contribution at ICLR 2015
null
null
null
cs.CV cs.LG cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The availability of large labeled datasets has allowed Convolutional Network models to achieve impressive recognition results. However, in many settings manual annotation of the data is impractical; instead our data has noisy labels, i.e. there is some freely available label for each image which may or may not be accurate. In this paper, we explore the performance of discriminatively-trained Convnets when trained on such noisy data. We introduce an extra noise layer into the network which adapts the network outputs to match the noisy label distribution. The parameters of this noise layer can be estimated as part of the training process and involve simple modifications to current training infrastructures for deep networks. We demonstrate the approaches on several datasets, including large scale experiments on the ImageNet classification benchmark.
[ { "version": "v1", "created": "Mon, 9 Jun 2014 05:45:12 GMT" }, { "version": "v2", "created": "Sat, 20 Dec 2014 21:10:03 GMT" }, { "version": "v3", "created": "Tue, 3 Mar 2015 21:13:47 GMT" }, { "version": "v4", "created": "Fri, 10 Apr 2015 16:44:00 GMT" } ]
2015-04-13T00:00:00
[ [ "Sukhbaatar", "Sainbayar", "" ], [ "Bruna", "Joan", "" ], [ "Paluri", "Manohar", "" ], [ "Bourdev", "Lubomir", "" ], [ "Fergus", "Rob", "" ] ]
TITLE: Training Convolutional Networks with Noisy Labels ABSTRACT: The availability of large labeled datasets has allowed Convolutional Network models to achieve impressive recognition results. However, in many settings manual annotation of the data is impractical; instead our data has noisy labels, i.e. there is some freely available label for each image which may or may not be accurate. In this paper, we explore the performance of discriminatively-trained Convnets when trained on such noisy data. We introduce an extra noise layer into the network which adapts the network outputs to match the noisy label distribution. The parameters of this noise layer can be estimated as part of the training process and involve simple modifications to current training infrastructures for deep networks. We demonstrate the approaches on several datasets, including large scale experiments on the ImageNet classification benchmark.
no_new_dataset
0.948822
1409.1556
Karen Simonyan
Karen Simonyan, Andrew Zisserman
Very Deep Convolutional Networks for Large-Scale Image Recognition
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this work we investigate the effect of the convolutional network depth on its accuracy in the large-scale image recognition setting. Our main contribution is a thorough evaluation of networks of increasing depth using an architecture with very small (3x3) convolution filters, which shows that a significant improvement on the prior-art configurations can be achieved by pushing the depth to 16-19 weight layers. These findings were the basis of our ImageNet Challenge 2014 submission, where our team secured the first and the second places in the localisation and classification tracks respectively. We also show that our representations generalise well to other datasets, where they achieve state-of-the-art results. We have made our two best-performing ConvNet models publicly available to facilitate further research on the use of deep visual representations in computer vision.
[ { "version": "v1", "created": "Thu, 4 Sep 2014 19:48:04 GMT" }, { "version": "v2", "created": "Mon, 15 Sep 2014 19:58:29 GMT" }, { "version": "v3", "created": "Tue, 18 Nov 2014 20:43:11 GMT" }, { "version": "v4", "created": "Fri, 19 Dec 2014 20:01:21 GMT" }, { "version": "v5", "created": "Tue, 23 Dec 2014 20:05:00 GMT" }, { "version": "v6", "created": "Fri, 10 Apr 2015 16:25:04 GMT" } ]
2015-04-13T00:00:00
[ [ "Simonyan", "Karen", "" ], [ "Zisserman", "Andrew", "" ] ]
TITLE: Very Deep Convolutional Networks for Large-Scale Image Recognition ABSTRACT: In this work we investigate the effect of the convolutional network depth on its accuracy in the large-scale image recognition setting. Our main contribution is a thorough evaluation of networks of increasing depth using an architecture with very small (3x3) convolution filters, which shows that a significant improvement on the prior-art configurations can be achieved by pushing the depth to 16-19 weight layers. These findings were the basis of our ImageNet Challenge 2014 submission, where our team secured the first and the second places in the localisation and classification tracks respectively. We also show that our representations generalise well to other datasets, where they achieve state-of-the-art results. We have made our two best-performing ConvNet models publicly available to facilitate further research on the use of deep visual representations in computer vision.
no_new_dataset
0.951639
1410.1165
Rupesh Kumar Srivastava
Rupesh Kumar Srivastava, Jonathan Masci, Faustino Gomez, J\"urgen Schmidhuber
Understanding Locally Competitive Networks
9 pages + 2 supplementary, Accepted to ICLR 2015 Conference track
null
null
null
cs.NE cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recently proposed neural network activation functions such as rectified linear, maxout, and local winner-take-all have allowed for faster and more effective training of deep neural architectures on large and complex datasets. The common trait among these functions is that they implement local competition between small groups of computational units within a layer, so that only part of the network is activated for any given input pattern. In this paper, we attempt to visualize and understand this self-modularization, and suggest a unified explanation for the beneficial properties of such networks. We also show how our insights can be directly useful for efficiently performing retrieval over large datasets using neural networks.
[ { "version": "v1", "created": "Sun, 5 Oct 2014 14:46:47 GMT" }, { "version": "v2", "created": "Mon, 22 Dec 2014 20:07:17 GMT" }, { "version": "v3", "created": "Thu, 9 Apr 2015 01:22:49 GMT" } ]
2015-04-13T00:00:00
[ [ "Srivastava", "Rupesh Kumar", "" ], [ "Masci", "Jonathan", "" ], [ "Gomez", "Faustino", "" ], [ "Schmidhuber", "Jürgen", "" ] ]
TITLE: Understanding Locally Competitive Networks ABSTRACT: Recently proposed neural network activation functions such as rectified linear, maxout, and local winner-take-all have allowed for faster and more effective training of deep neural architectures on large and complex datasets. The common trait among these functions is that they implement local competition between small groups of computational units within a layer, so that only part of the network is activated for any given input pattern. In this paper, we attempt to visualize and understand this self-modularization, and suggest a unified explanation for the beneficial properties of such networks. We also show how our insights can be directly useful for efficiently performing retrieval over large datasets using neural networks.
no_new_dataset
0.94801
1410.8516
Laurent Dinh
Laurent Dinh, David Krueger and Yoshua Bengio
NICE: Non-linear Independent Components Estimation
11 pages and 2 pages Appendix, workshop paper at ICLR 2015
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a deep learning framework for modeling complex high-dimensional densities called Non-linear Independent Component Estimation (NICE). It is based on the idea that a good representation is one in which the data has a distribution that is easy to model. For this purpose, a non-linear deterministic transformation of the data is learned that maps it to a latent space so as to make the transformed data conform to a factorized distribution, i.e., resulting in independent latent variables. We parametrize this transformation so that computing the Jacobian determinant and inverse transform is trivial, yet we maintain the ability to learn complex non-linear transformations, via a composition of simple building blocks, each based on a deep neural network. The training criterion is simply the exact log-likelihood, which is tractable. Unbiased ancestral sampling is also easy. We show that this approach yields good generative models on four image datasets and can be used for inpainting.
[ { "version": "v1", "created": "Thu, 30 Oct 2014 19:44:20 GMT" }, { "version": "v2", "created": "Fri, 19 Dec 2014 22:40:18 GMT" }, { "version": "v3", "created": "Tue, 6 Jan 2015 18:10:44 GMT" }, { "version": "v4", "created": "Mon, 9 Mar 2015 18:06:58 GMT" }, { "version": "v5", "created": "Thu, 12 Mar 2015 06:25:20 GMT" }, { "version": "v6", "created": "Fri, 10 Apr 2015 12:27:56 GMT" } ]
2015-04-13T00:00:00
[ [ "Dinh", "Laurent", "" ], [ "Krueger", "David", "" ], [ "Bengio", "Yoshua", "" ] ]
TITLE: NICE: Non-linear Independent Components Estimation ABSTRACT: We propose a deep learning framework for modeling complex high-dimensional densities called Non-linear Independent Component Estimation (NICE). It is based on the idea that a good representation is one in which the data has a distribution that is easy to model. For this purpose, a non-linear deterministic transformation of the data is learned that maps it to a latent space so as to make the transformed data conform to a factorized distribution, i.e., resulting in independent latent variables. We parametrize this transformation so that computing the Jacobian determinant and inverse transform is trivial, yet we maintain the ability to learn complex non-linear transformations, via a composition of simple building blocks, each based on a deep neural network. The training criterion is simply the exact log-likelihood, which is tractable. Unbiased ancestral sampling is also easy. We show that this approach yields good generative models on four image datasets and can be used for inpainting.
no_new_dataset
0.944638
1412.5903
Max Jaderberg
Max Jaderberg, Karen Simonyan, Andrea Vedaldi, Andrew Zisserman
Deep Structured Output Learning for Unconstrained Text Recognition
arXiv admin note: text overlap with arXiv:1406.2227
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We develop a representation suitable for the unconstrained recognition of words in natural images: the general case of no fixed lexicon and unknown length. To this end we propose a convolutional neural network (CNN) based architecture which incorporates a Conditional Random Field (CRF) graphical model, taking the whole word image as a single input. The unaries of the CRF are provided by a CNN that predicts characters at each position of the output, while higher order terms are provided by another CNN that detects the presence of N-grams. We show that this entire model (CRF, character predictor, N-gram predictor) can be jointly optimised by back-propagating the structured output loss, essentially requiring the system to perform multi-task learning, and training uses purely synthetically generated data. The resulting model is a more accurate system on standard real-world text recognition benchmarks than character prediction alone, setting a benchmark for systems that have not been trained on a particular lexicon. In addition, our model achieves state-of-the-art accuracy in lexicon-constrained scenarios, without being specifically modelled for constrained recognition. To test the generalisation of our model, we also perform experiments with random alpha-numeric strings to evaluate the method when no visual language model is applicable.
[ { "version": "v1", "created": "Thu, 18 Dec 2014 15:49:46 GMT" }, { "version": "v2", "created": "Fri, 19 Dec 2014 17:37:37 GMT" }, { "version": "v3", "created": "Mon, 22 Dec 2014 19:56:48 GMT" }, { "version": "v4", "created": "Tue, 23 Dec 2014 13:17:59 GMT" }, { "version": "v5", "created": "Fri, 10 Apr 2015 15:36:01 GMT" } ]
2015-04-13T00:00:00
[ [ "Jaderberg", "Max", "" ], [ "Simonyan", "Karen", "" ], [ "Vedaldi", "Andrea", "" ], [ "Zisserman", "Andrew", "" ] ]
TITLE: Deep Structured Output Learning for Unconstrained Text Recognition ABSTRACT: We develop a representation suitable for the unconstrained recognition of words in natural images: the general case of no fixed lexicon and unknown length. To this end we propose a convolutional neural network (CNN) based architecture which incorporates a Conditional Random Field (CRF) graphical model, taking the whole word image as a single input. The unaries of the CRF are provided by a CNN that predicts characters at each position of the output, while higher order terms are provided by another CNN that detects the presence of N-grams. We show that this entire model (CRF, character predictor, N-gram predictor) can be jointly optimised by back-propagating the structured output loss, essentially requiring the system to perform multi-task learning, and training uses purely synthetically generated data. The resulting model is a more accurate system on standard real-world text recognition benchmarks than character prediction alone, setting a benchmark for systems that have not been trained on a particular lexicon. In addition, our model achieves state-of-the-art accuracy in lexicon-constrained scenarios, without being specifically modelled for constrained recognition. To test the generalisation of our model, we also perform experiments with random alpha-numeric strings to evaluate the method when no visual language model is applicable.
no_new_dataset
0.949389
1503.05032
Weifeng Liu
Weifeng Liu, Brian Vinter
CSR5: An Efficient Storage Format for Cross-Platform Sparse Matrix-Vector Multiplication
12 pages, 10 figures, In Proceedings of the 29th ACM International Conference on Supercomputing (ICS '15)
null
null
null
cs.MS cs.DC math.NA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Sparse matrix-vector multiplication (SpMV) is a fundamental building block for numerous applications. In this paper, we propose CSR5 (Compressed Sparse Row 5), a new storage format, which offers high-throughput SpMV on various platforms including CPUs, GPUs and Xeon Phi. First, the CSR5 format is insensitive to the sparsity structure of the input matrix. Thus the single format can support an SpMV algorithm that is efficient both for regular matrices and for irregular matrices. Furthermore, we show that the overhead of the format conversion from the CSR to the CSR5 can be as low as the cost of a few SpMV operations. We compare the CSR5-based SpMV algorithm with 11 state-of-the-art formats and algorithms on four mainstream processors using 14 regular and 10 irregular matrices as a benchmark suite. For the 14 regular matrices in the suite, we achieve comparable or better performance over the previous work. For the 10 irregular matrices, the CSR5 obtains average performance improvement of 17.6\%, 28.5\%, 173.0\% and 293.3\% (up to 213.3\%, 153.6\%, 405.1\% and 943.3\%) over the best existing work on dual-socket Intel CPUs, an nVidia GPU, an AMD GPU and an Intel Xeon Phi, respectively. For real-world applications such as a solver with only tens of iterations, the CSR5 format can be more practical because of its low-overhead for format conversion. The source code of this work is downloadable at https://github.com/bhSPARSE/Benchmark_SpMV_using_CSR5
[ { "version": "v1", "created": "Tue, 17 Mar 2015 13:18:49 GMT" }, { "version": "v2", "created": "Thu, 9 Apr 2015 21:28:03 GMT" } ]
2015-04-13T00:00:00
[ [ "Liu", "Weifeng", "" ], [ "Vinter", "Brian", "" ] ]
TITLE: CSR5: An Efficient Storage Format for Cross-Platform Sparse Matrix-Vector Multiplication ABSTRACT: Sparse matrix-vector multiplication (SpMV) is a fundamental building block for numerous applications. In this paper, we propose CSR5 (Compressed Sparse Row 5), a new storage format, which offers high-throughput SpMV on various platforms including CPUs, GPUs and Xeon Phi. First, the CSR5 format is insensitive to the sparsity structure of the input matrix. Thus the single format can support an SpMV algorithm that is efficient both for regular matrices and for irregular matrices. Furthermore, we show that the overhead of the format conversion from the CSR to the CSR5 can be as low as the cost of a few SpMV operations. We compare the CSR5-based SpMV algorithm with 11 state-of-the-art formats and algorithms on four mainstream processors using 14 regular and 10 irregular matrices as a benchmark suite. For the 14 regular matrices in the suite, we achieve comparable or better performance over the previous work. For the 10 irregular matrices, the CSR5 obtains average performance improvement of 17.6\%, 28.5\%, 173.0\% and 293.3\% (up to 213.3\%, 153.6\%, 405.1\% and 943.3\%) over the best existing work on dual-socket Intel CPUs, an nVidia GPU, an AMD GPU and an Intel Xeon Phi, respectively. For real-world applications such as a solver with only tens of iterations, the CSR5 format can be more practical because of its low-overhead for format conversion. The source code of this work is downloadable at https://github.com/bhSPARSE/Benchmark_SpMV_using_CSR5
no_new_dataset
0.94256
1503.08663
Guanbin Li
Guanbin Li and Yizhou Yu
Visual Saliency Based on Multiscale Deep Features
To appear in CVPR 2015
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Visual saliency is a fundamental problem in both cognitive and computational sciences, including computer vision. In this CVPR 2015 paper, we discover that a high-quality visual saliency model can be trained with multiscale features extracted using a popular deep learning architecture, convolutional neural networks (CNNs), which have had many successes in visual recognition tasks. For learning such saliency models, we introduce a neural network architecture, which has fully connected layers on top of CNNs responsible for extracting features at three different scales. We then propose a refinement method to enhance the spatial coherence of our saliency results. Finally, aggregating multiple saliency maps computed for different levels of image segmentation can further boost the performance, yielding saliency maps better than those generated from a single segmentation. To promote further research and evaluation of visual saliency models, we also construct a new large database of 4447 challenging images and their pixelwise saliency annotation. Experimental results demonstrate that our proposed method is capable of achieving state-of-the-art performance on all public benchmarks, improving the F-Measure by 5.0% and 13.2% respectively on the MSRA-B dataset and our new dataset (HKU-IS), and lowering the mean absolute error by 5.7% and 35.1% respectively on these two datasets.
[ { "version": "v1", "created": "Mon, 30 Mar 2015 13:21:09 GMT" }, { "version": "v2", "created": "Tue, 31 Mar 2015 05:21:02 GMT" }, { "version": "v3", "created": "Fri, 10 Apr 2015 06:40:46 GMT" } ]
2015-04-13T00:00:00
[ [ "Li", "Guanbin", "" ], [ "Yu", "Yizhou", "" ] ]
TITLE: Visual Saliency Based on Multiscale Deep Features ABSTRACT: Visual saliency is a fundamental problem in both cognitive and computational sciences, including computer vision. In this CVPR 2015 paper, we discover that a high-quality visual saliency model can be trained with multiscale features extracted using a popular deep learning architecture, convolutional neural networks (CNNs), which have had many successes in visual recognition tasks. For learning such saliency models, we introduce a neural network architecture, which has fully connected layers on top of CNNs responsible for extracting features at three different scales. We then propose a refinement method to enhance the spatial coherence of our saliency results. Finally, aggregating multiple saliency maps computed for different levels of image segmentation can further boost the performance, yielding saliency maps better than those generated from a single segmentation. To promote further research and evaluation of visual saliency models, we also construct a new large database of 4447 challenging images and their pixelwise saliency annotation. Experimental results demonstrate that our proposed method is capable of achieving state-of-the-art performance on all public benchmarks, improving the F-Measure by 5.0% and 13.2% respectively on the MSRA-B dataset and our new dataset (HKU-IS), and lowering the mean absolute error by 5.7% and 35.1% respectively on these two datasets.
new_dataset
0.961893
1504.02564
Ragesh Jaiswal
Anup Bhattacharya, Ragesh Jaiswal, Amit Kumar
Faster Algorithms for the Constrained k-means Problem
null
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The classical center based clustering problems such as $k$-means/median/center assume that the optimal clusters satisfy the locality property that the points in the same cluster are close to each other. A number of clustering problems arise in machine learning where the optimal clusters do not follow such a locality property. Consider a variant of the $k$-means problem that may be regarded as a general version of such problems. Here, the optimal clusters $O_1, ..., O_k$ are an arbitrary partition of the dataset and the goal is to output $k$-centers $c_1, ..., c_k$ such that the objective function $\sum_{i=1}^{k} \sum_{x \in O_{i}} ||x - c_{i}||^2$ is minimized. It is not difficult to argue that any algorithm (without knowing the optimal clusters) that outputs a single set of $k$ centers, will not behave well as far as optimizing the above objective function is concerned. However, this does not rule out the existence of algorithms that output a list of such $k$ centers such that at least one of these $k$ centers behaves well. Given an error parameter $\varepsilon > 0$, let $\ell$ denote the size of the smallest list of $k$-centers such that at least one of the $k$-centers gives a $(1+\varepsilon)$ approximation w.r.t. the objective function above. In this paper, we show an upper bound on $\ell$ by giving a randomized algorithm that outputs a list of $2^{\tilde{O}(k/\varepsilon)}$ $k$-centers. We also give a closely matching lower bound of $2^{\tilde{\Omega}(k/\sqrt{\varepsilon})}$. Moreover, our algorithm runs in time $O \left(n d \cdot 2^{\tilde{O}(k/\varepsilon)} \right)$. This is a significant improvement over the previous result of Ding and Xu who gave an algorithm with running time $O \left(n d \cdot (\log{n})^{k} \cdot 2^{poly(k/\varepsilon)} \right)$ and output a list of size $O \left((\log{n})^k \cdot 2^{poly(k/\varepsilon)} \right)$.
[ { "version": "v1", "created": "Fri, 10 Apr 2015 07:03:58 GMT" } ]
2015-04-13T00:00:00
[ [ "Bhattacharya", "Anup", "" ], [ "Jaiswal", "Ragesh", "" ], [ "Kumar", "Amit", "" ] ]
TITLE: Faster Algorithms for the Constrained k-means Problem ABSTRACT: The classical center based clustering problems such as $k$-means/median/center assume that the optimal clusters satisfy the locality property that the points in the same cluster are close to each other. A number of clustering problems arise in machine learning where the optimal clusters do not follow such a locality property. Consider a variant of the $k$-means problem that may be regarded as a general version of such problems. Here, the optimal clusters $O_1, ..., O_k$ are an arbitrary partition of the dataset and the goal is to output $k$-centers $c_1, ..., c_k$ such that the objective function $\sum_{i=1}^{k} \sum_{x \in O_{i}} ||x - c_{i}||^2$ is minimized. It is not difficult to argue that any algorithm (without knowing the optimal clusters) that outputs a single set of $k$ centers, will not behave well as far as optimizing the above objective function is concerned. However, this does not rule out the existence of algorithms that output a list of such $k$ centers such that at least one of these $k$ centers behaves well. Given an error parameter $\varepsilon > 0$, let $\ell$ denote the size of the smallest list of $k$-centers such that at least one of the $k$-centers gives a $(1+\varepsilon)$ approximation w.r.t. the objective function above. In this paper, we show an upper bound on $\ell$ by giving a randomized algorithm that outputs a list of $2^{\tilde{O}(k/\varepsilon)}$ $k$-centers. We also give a closely matching lower bound of $2^{\tilde{\Omega}(k/\sqrt{\varepsilon})}$. Moreover, our algorithm runs in time $O \left(n d \cdot 2^{\tilde{O}(k/\varepsilon)} \right)$. This is a significant improvement over the previous result of Ding and Xu who gave an algorithm with running time $O \left(n d \cdot (\log{n})^{k} \cdot 2^{poly(k/\varepsilon)} \right)$ and output a list of size $O \left((\log{n})^k \cdot 2^{poly(k/\varepsilon)} \right)$.
no_new_dataset
0.946101
1504.02696
Xinyan Yan
Xinyan Yan, Vadim Indelman, Byron Boots
Incremental Sparse GP Regression for Continuous-time Trajectory Estimation & Mapping
10 pages, 10 figures
null
null
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recent work on simultaneous trajectory estimation and mapping (STEAM) for mobile robots has found success by representing the trajectory as a Gaussian process. Gaussian processes can represent a continuous-time trajectory, elegantly handle asynchronous and sparse measurements, and allow the robot to query the trajectory to recover its estimated position at any time of interest. A major drawback of this approach is that STEAM is formulated as a batch estimation problem. In this paper we provide the critical extensions necessary to transform the existing batch algorithm into an extremely efficient incremental algorithm. In particular, we are able to vastly speed up the solution time through efficient variable reordering and incremental sparse updates, which we believe will greatly increase the practicality of Gaussian process methods for robot mapping and localization. Finally, we demonstrate the approach and its advantages on both synthetic and real datasets.
[ { "version": "v1", "created": "Fri, 10 Apr 2015 14:47:25 GMT" } ]
2015-04-13T00:00:00
[ [ "Yan", "Xinyan", "" ], [ "Indelman", "Vadim", "" ], [ "Boots", "Byron", "" ] ]
TITLE: Incremental Sparse GP Regression for Continuous-time Trajectory Estimation & Mapping ABSTRACT: Recent work on simultaneous trajectory estimation and mapping (STEAM) for mobile robots has found success by representing the trajectory as a Gaussian process. Gaussian processes can represent a continuous-time trajectory, elegantly handle asynchronous and sparse measurements, and allow the robot to query the trajectory to recover its estimated position at any time of interest. A major drawback of this approach is that STEAM is formulated as a batch estimation problem. In this paper we provide the critical extensions necessary to transform the existing batch algorithm into an extremely efficient incremental algorithm. In particular, we are able to vastly speed up the solution time through efficient variable reordering and incremental sparse updates, which we believe will greatly increase the practicality of Gaussian process methods for robot mapping and localization. Finally, we demonstrate the approach and its advantages on both synthetic and real datasets.
no_new_dataset
0.946646
1504.02764
Roozbeh Mottaghi
Roozbeh Mottaghi, Yu Xiang, Silvio Savarese
A Coarse-to-Fine Model for 3D Pose Estimation and Sub-category Recognition
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Despite the fact that object detection, 3D pose estimation, and sub-category recognition are highly correlated tasks, they are usually addressed independently from each other because of the huge space of parameters. To jointly model all of these tasks, we propose a coarse-to-fine hierarchical representation, where each level of the hierarchy represents objects at a different level of granularity. The hierarchical representation prevents performance loss, which is often caused by the increase in the number of parameters (as we consider more tasks to model), and the joint modelling enables resolving ambiguities that exist in independent modelling of these tasks. We augment PASCAL3D+ dataset with annotations for these tasks and show that our hierarchical model is effective in joint modelling of object detection, 3D pose estimation, and sub-category recognition.
[ { "version": "v1", "created": "Fri, 10 Apr 2015 19:18:59 GMT" } ]
2015-04-13T00:00:00
[ [ "Mottaghi", "Roozbeh", "" ], [ "Xiang", "Yu", "" ], [ "Savarese", "Silvio", "" ] ]
TITLE: A Coarse-to-Fine Model for 3D Pose Estimation and Sub-category Recognition ABSTRACT: Despite the fact that object detection, 3D pose estimation, and sub-category recognition are highly correlated tasks, they are usually addressed independently from each other because of the huge space of parameters. To jointly model all of these tasks, we propose a coarse-to-fine hierarchical representation, where each level of the hierarchy represents objects at a different level of granularity. The hierarchical representation prevents performance loss, which is often caused by the increase in the number of parameters (as we consider more tasks to model), and the joint modelling enables resolving ambiguities that exist in independent modelling of these tasks. We augment PASCAL3D+ dataset with annotations for these tasks and show that our hierarchical model is effective in joint modelling of object detection, 3D pose estimation, and sub-category recognition.
no_new_dataset
0.947088
1406.2989
Mathias Berglund
Tapani Raiko, Mathias Berglund, Guillaume Alain, Laurent Dinh
Techniques for Learning Binary Stochastic Feedforward Neural Networks
null
null
null
null
stat.ML cs.LG cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Stochastic binary hidden units in a multi-layer perceptron (MLP) network give at least three potential benefits when compared to deterministic MLP networks. (1) They allow to learn one-to-many type of mappings. (2) They can be used in structured prediction problems, where modeling the internal structure of the output is important. (3) Stochasticity has been shown to be an excellent regularizer, which makes generalization performance potentially better in general. However, training stochastic networks is considerably more difficult. We study training using M samples of hidden activations per input. We show that the case M=1 leads to a fundamentally different behavior where the network tries to avoid stochasticity. We propose two new estimators for the training gradient and propose benchmark tests for comparing training algorithms. Our experiments confirm that training stochastic networks is difficult and show that the proposed two estimators perform favorably among all the five known estimators.
[ { "version": "v1", "created": "Wed, 11 Jun 2014 18:29:27 GMT" }, { "version": "v2", "created": "Fri, 19 Dec 2014 13:37:05 GMT" }, { "version": "v3", "created": "Thu, 9 Apr 2015 12:58:06 GMT" } ]
2015-04-10T00:00:00
[ [ "Raiko", "Tapani", "" ], [ "Berglund", "Mathias", "" ], [ "Alain", "Guillaume", "" ], [ "Dinh", "Laurent", "" ] ]
TITLE: Techniques for Learning Binary Stochastic Feedforward Neural Networks ABSTRACT: Stochastic binary hidden units in a multi-layer perceptron (MLP) network give at least three potential benefits when compared to deterministic MLP networks. (1) They allow to learn one-to-many type of mappings. (2) They can be used in structured prediction problems, where modeling the internal structure of the output is important. (3) Stochasticity has been shown to be an excellent regularizer, which makes generalization performance potentially better in general. However, training stochastic networks is considerably more difficult. We study training using M samples of hidden activations per input. We show that the case M=1 leads to a fundamentally different behavior where the network tries to avoid stochasticity. We propose two new estimators for the training gradient and propose benchmark tests for comparing training algorithms. Our experiments confirm that training stochastic networks is difficult and show that the proposed two estimators perform favorably among all the five known estimators.
no_new_dataset
0.950134
1408.1054
Wojciech Czarnecki
Wojciech Marian Czarnecki, Jacek Tabor
Multithreshold Entropy Linear Classifier
null
null
10.1016/j.eswa.2015.03.007
null
cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Linear classifiers separate the data with a hyperplane. In this paper we focus on the novel method of construction of multithreshold linear classifier, which separates the data with multiple parallel hyperplanes. Proposed model is based on the information theory concepts -- namely Renyi's quadratic entropy and Cauchy-Schwarz divergence. We begin with some general properties, including data scale invariance. Then we prove that our method is a multithreshold large margin classifier, which shows the analogy to the SVM, while in the same time works with much broader class of hypotheses. What is also interesting, proposed method is aimed at the maximization of the balanced quality measure (such as Matthew's Correlation Coefficient) as opposed to very common maximization of the accuracy. This feature comes directly from the optimization problem statement and is further confirmed by the experiments on the UCI datasets. It appears, that our Multithreshold Entropy Linear Classifier (MELC) obtaines similar or higher scores than the ones given by SVM on both synthetic and real data. We show how proposed approach can be benefitial for the cheminformatics in the task of ligands activity prediction, where despite better classification results, MELC gives some additional insight into the data structure (classes of underrepresented chemical compunds).
[ { "version": "v1", "created": "Mon, 4 Aug 2014 18:01:29 GMT" } ]
2015-04-10T00:00:00
[ [ "Czarnecki", "Wojciech Marian", "" ], [ "Tabor", "Jacek", "" ] ]
TITLE: Multithreshold Entropy Linear Classifier ABSTRACT: Linear classifiers separate the data with a hyperplane. In this paper we focus on the novel method of construction of multithreshold linear classifier, which separates the data with multiple parallel hyperplanes. Proposed model is based on the information theory concepts -- namely Renyi's quadratic entropy and Cauchy-Schwarz divergence. We begin with some general properties, including data scale invariance. Then we prove that our method is a multithreshold large margin classifier, which shows the analogy to the SVM, while in the same time works with much broader class of hypotheses. What is also interesting, proposed method is aimed at the maximization of the balanced quality measure (such as Matthew's Correlation Coefficient) as opposed to very common maximization of the accuracy. This feature comes directly from the optimization problem statement and is further confirmed by the experiments on the UCI datasets. It appears, that our Multithreshold Entropy Linear Classifier (MELC) obtaines similar or higher scores than the ones given by SVM on both synthetic and real data. We show how proposed approach can be benefitial for the cheminformatics in the task of ligands activity prediction, where despite better classification results, MELC gives some additional insight into the data structure (classes of underrepresented chemical compunds).
no_new_dataset
0.948965
1412.6296
Jifeng Dai
Jifeng Dai, Yang Lu, Ying-Nian Wu
Generative Modeling of Convolutional Neural Networks
null
null
null
null
cs.CV cs.LG cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The convolutional neural networks (CNNs) have proven to be a powerful tool for discriminative learning. Recently researchers have also started to show interest in the generative aspects of CNNs in order to gain a deeper understanding of what they have learned and how to further improve them. This paper investigates generative modeling of CNNs. The main contributions include: (1) We construct a generative model for the CNN in the form of exponential tilting of a reference distribution. (2) We propose a generative gradient for pre-training CNNs by a non-parametric importance sampling scheme, which is fundamentally different from the commonly used discriminative gradient, and yet has the same computational architecture and cost as the latter. (3) We propose a generative visualization method for the CNNs by sampling from an explicit parametric image distribution. The proposed visualization method can directly draw synthetic samples for any given node in a trained CNN by the Hamiltonian Monte Carlo (HMC) algorithm, without resorting to any extra hold-out images. Experiments on the challenging ImageNet benchmark show that the proposed generative gradient pre-training consistently helps improve the performances of CNNs, and the proposed generative visualization method generates meaningful and varied samples of synthetic images from a large-scale deep CNN.
[ { "version": "v1", "created": "Fri, 19 Dec 2014 11:34:37 GMT" }, { "version": "v2", "created": "Thu, 9 Apr 2015 15:07:06 GMT" } ]
2015-04-10T00:00:00
[ [ "Dai", "Jifeng", "" ], [ "Lu", "Yang", "" ], [ "Wu", "Ying-Nian", "" ] ]
TITLE: Generative Modeling of Convolutional Neural Networks ABSTRACT: The convolutional neural networks (CNNs) have proven to be a powerful tool for discriminative learning. Recently researchers have also started to show interest in the generative aspects of CNNs in order to gain a deeper understanding of what they have learned and how to further improve them. This paper investigates generative modeling of CNNs. The main contributions include: (1) We construct a generative model for the CNN in the form of exponential tilting of a reference distribution. (2) We propose a generative gradient for pre-training CNNs by a non-parametric importance sampling scheme, which is fundamentally different from the commonly used discriminative gradient, and yet has the same computational architecture and cost as the latter. (3) We propose a generative visualization method for the CNNs by sampling from an explicit parametric image distribution. The proposed visualization method can directly draw synthetic samples for any given node in a trained CNN by the Hamiltonian Monte Carlo (HMC) algorithm, without resorting to any extra hold-out images. Experiments on the challenging ImageNet benchmark show that the proposed generative gradient pre-training consistently helps improve the performances of CNNs, and the proposed generative visualization method generates meaningful and varied samples of synthetic images from a large-scale deep CNN.
no_new_dataset
0.951639
1412.7009
Jan Rudy
Jan Rudy, Graham Taylor
Generative Class-conditional Autoencoders
null
null
null
null
cs.NE cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recent work by Bengio et al. (2013) proposes a sampling procedure for denoising autoencoders which involves learning the transition operator of a Markov chain. The transition operator is typically unimodal, which limits its capacity to model complex data. In order to perform efficient sampling from conditional distributions, we extend this work, both theoretically and algorithmically, to gated autoencoders (Memisevic, 2013), The proposed model is able to generate convincing class-conditional samples when trained on both the MNIST and TFD datasets.
[ { "version": "v1", "created": "Mon, 22 Dec 2014 14:57:05 GMT" }, { "version": "v2", "created": "Sat, 28 Feb 2015 00:16:55 GMT" }, { "version": "v3", "created": "Thu, 9 Apr 2015 01:54:33 GMT" } ]
2015-04-10T00:00:00
[ [ "Rudy", "Jan", "" ], [ "Taylor", "Graham", "" ] ]
TITLE: Generative Class-conditional Autoencoders ABSTRACT: Recent work by Bengio et al. (2013) proposes a sampling procedure for denoising autoencoders which involves learning the transition operator of a Markov chain. The transition operator is typically unimodal, which limits its capacity to model complex data. In order to perform efficient sampling from conditional distributions, we extend this work, both theoretically and algorithmically, to gated autoencoders (Memisevic, 2013), The proposed model is able to generate convincing class-conditional samples when trained on both the MNIST and TFD datasets.
no_new_dataset
0.949809
1502.01423
Chen Fang
Chen Fang, Hailin Jin, Jianchao Yang, Zhe Lin
Collaborative Feature Learning from Social Media
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Image feature representation plays an essential role in image recognition and related tasks. The current state-of-the-art feature learning paradigm is supervised learning from labeled data. However, this paradigm requires large-scale category labels, which limits its applicability to domains where labels are hard to obtain. In this paper, we propose a new data-driven feature learning paradigm which does not rely on category labels. Instead, we learn from user behavior data collected on social media. Concretely, we use the image relationship discovered in the latent space from the user behavior data to guide the image feature learning. We collect a large-scale image and user behavior dataset from Behance.net. The dataset consists of 1.9 million images and over 300 million view records from 1.9 million users. We validate our feature learning paradigm on this dataset and find that the learned feature significantly outperforms the state-of-the-art image features in learning better image similarities. We also show that the learned feature performs competitively on various recognition benchmarks.
[ { "version": "v1", "created": "Thu, 5 Feb 2015 03:32:19 GMT" }, { "version": "v2", "created": "Sat, 4 Apr 2015 19:27:33 GMT" }, { "version": "v3", "created": "Thu, 9 Apr 2015 18:36:54 GMT" } ]
2015-04-10T00:00:00
[ [ "Fang", "Chen", "" ], [ "Jin", "Hailin", "" ], [ "Yang", "Jianchao", "" ], [ "Lin", "Zhe", "" ] ]
TITLE: Collaborative Feature Learning from Social Media ABSTRACT: Image feature representation plays an essential role in image recognition and related tasks. The current state-of-the-art feature learning paradigm is supervised learning from labeled data. However, this paradigm requires large-scale category labels, which limits its applicability to domains where labels are hard to obtain. In this paper, we propose a new data-driven feature learning paradigm which does not rely on category labels. Instead, we learn from user behavior data collected on social media. Concretely, we use the image relationship discovered in the latent space from the user behavior data to guide the image feature learning. We collect a large-scale image and user behavior dataset from Behance.net. The dataset consists of 1.9 million images and over 300 million view records from 1.9 million users. We validate our feature learning paradigm on this dataset and find that the learned feature significantly outperforms the state-of-the-art image features in learning better image similarities. We also show that the learned feature performs competitively on various recognition benchmarks.
new_dataset
0.91181
1502.03671
R\'emi Lebret
R\'emi Lebret, Pedro O. Pinheiro, Ronan Collobert
Phrase-based Image Captioning
null
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Generating a novel textual description of an image is an interesting problem that connects computer vision and natural language processing. In this paper, we present a simple model that is able to generate descriptive sentences given a sample image. This model has a strong focus on the syntax of the descriptions. We train a purely bilinear model that learns a metric between an image representation (generated from a previously trained Convolutional Neural Network) and phrases that are used to described them. The system is then able to infer phrases from a given image sample. Based on caption syntax statistics, we propose a simple language model that can produce relevant descriptions for a given test image using the phrases inferred. Our approach, which is considerably simpler than state-of-the-art models, achieves comparable results in two popular datasets for the task: Flickr30k and the recently proposed Microsoft COCO.
[ { "version": "v1", "created": "Thu, 12 Feb 2015 14:17:15 GMT" }, { "version": "v2", "created": "Thu, 9 Apr 2015 09:48:52 GMT" } ]
2015-04-10T00:00:00
[ [ "Lebret", "Rémi", "" ], [ "Pinheiro", "Pedro O.", "" ], [ "Collobert", "Ronan", "" ] ]
TITLE: Phrase-based Image Captioning ABSTRACT: Generating a novel textual description of an image is an interesting problem that connects computer vision and natural language processing. In this paper, we present a simple model that is able to generate descriptive sentences given a sample image. This model has a strong focus on the syntax of the descriptions. We train a purely bilinear model that learns a metric between an image representation (generated from a previously trained Convolutional Neural Network) and phrases that are used to described them. The system is then able to infer phrases from a given image sample. Based on caption syntax statistics, we propose a simple language model that can produce relevant descriptions for a given test image using the phrases inferred. Our approach, which is considerably simpler than state-of-the-art models, achieves comparable results in two popular datasets for the task: Flickr30k and the recently proposed Microsoft COCO.
no_new_dataset
0.949201
1504.02147
Thomas Goldstein
Tom Goldstein, Gavin Taylor, Kawika Barabin, Kent Sayre
Unwrapping ADMM: Efficient Distributed Computing via Transpose Reduction
null
null
null
null
cs.DC cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recent approaches to distributed model fitting rely heavily on consensus ADMM, where each node solves small sub-problems using only local data. We propose iterative methods that solve {\em global} sub-problems over an entire distributed dataset. This is possible using transpose reduction strategies that allow a single node to solve least-squares over massive datasets without putting all the data in one place. This results in simple iterative methods that avoid the expensive inner loops required for consensus methods. To demonstrate the efficiency of this approach, we fit linear classifiers and sparse linear models to datasets over 5 Tb in size using a distributed implementation with over 7000 cores in far less time than previous approaches.
[ { "version": "v1", "created": "Wed, 8 Apr 2015 22:35:18 GMT" } ]
2015-04-10T00:00:00
[ [ "Goldstein", "Tom", "" ], [ "Taylor", "Gavin", "" ], [ "Barabin", "Kawika", "" ], [ "Sayre", "Kent", "" ] ]
TITLE: Unwrapping ADMM: Efficient Distributed Computing via Transpose Reduction ABSTRACT: Recent approaches to distributed model fitting rely heavily on consensus ADMM, where each node solves small sub-problems using only local data. We propose iterative methods that solve {\em global} sub-problems over an entire distributed dataset. This is possible using transpose reduction strategies that allow a single node to solve least-squares over massive datasets without putting all the data in one place. This results in simple iterative methods that avoid the expensive inner loops required for consensus methods. To demonstrate the efficiency of this approach, we fit linear classifiers and sparse linear models to datasets over 5 Tb in size using a distributed implementation with over 7000 cores in far less time than previous approaches.
no_new_dataset
0.946498
1504.02305
Haewoon Kwak
Haewoon Kwak and Jeremy Blackburn and Seungyeop Han
Exploring Cyberbullying and Other Toxic Behavior in Team Competition Online Games
CHI'15
null
null
null
cs.CY cs.HC cs.MM cs.SI physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this work we explore cyberbullying and other toxic behavior in team competition online games. Using a dataset of over 10 million player reports on 1.46 million toxic players along with corresponding crowdsourced decisions, we test several hypotheses drawn from theories explaining toxic behavior. Besides providing large-scale, empirical based understanding of toxic behavior, our work can be used as a basis for building systems to detect, prevent, and counter-act toxic behavior.
[ { "version": "v1", "created": "Thu, 9 Apr 2015 13:33:58 GMT" } ]
2015-04-10T00:00:00
[ [ "Kwak", "Haewoon", "" ], [ "Blackburn", "Jeremy", "" ], [ "Han", "Seungyeop", "" ] ]
TITLE: Exploring Cyberbullying and Other Toxic Behavior in Team Competition Online Games ABSTRACT: In this work we explore cyberbullying and other toxic behavior in team competition online games. Using a dataset of over 10 million player reports on 1.46 million toxic players along with corresponding crowdsourced decisions, we test several hypotheses drawn from theories explaining toxic behavior. Besides providing large-scale, empirical based understanding of toxic behavior, our work can be used as a basis for building systems to detect, prevent, and counter-act toxic behavior.
no_new_dataset
0.835819
1504.02340
Wongun Choi
Wongun Choi
Near-Online Multi-target Tracking with Aggregated Local Flow Descriptor
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we focus on the two key aspects of multiple target tracking problem: 1) designing an accurate affinity measure to associate detections and 2) implementing an efficient and accurate (near) online multiple target tracking algorithm. As the first contribution, we introduce a novel Aggregated Local Flow Descriptor (ALFD) that encodes the relative motion pattern between a pair of temporally distant detections using long term interest point trajectories (IPTs). Leveraging on the IPTs, the ALFD provides a robust affinity measure for estimating the likelihood of matching detections regardless of the application scenarios. As another contribution, we present a Near-Online Multi-target Tracking (NOMT) algorithm. The tracking problem is formulated as a data-association between targets and detections in a temporal window, that is performed repeatedly at every frame. While being efficient, NOMT achieves robustness via integrating multiple cues including ALFD metric, target dynamics, appearance similarity, and long term trajectory regularization into the model. Our ablative analysis verifies the superiority of the ALFD metric over the other conventional affinity metrics. We run a comprehensive experimental evaluation on two challenging tracking datasets, KITTI and MOT datasets. The NOMT method combined with ALFD metric achieves the best accuracy in both datasets with significant margins (about 10% higher MOTA) over the state-of-the-arts.
[ { "version": "v1", "created": "Thu, 9 Apr 2015 14:57:32 GMT" } ]
2015-04-10T00:00:00
[ [ "Choi", "Wongun", "" ] ]
TITLE: Near-Online Multi-target Tracking with Aggregated Local Flow Descriptor ABSTRACT: In this paper, we focus on the two key aspects of multiple target tracking problem: 1) designing an accurate affinity measure to associate detections and 2) implementing an efficient and accurate (near) online multiple target tracking algorithm. As the first contribution, we introduce a novel Aggregated Local Flow Descriptor (ALFD) that encodes the relative motion pattern between a pair of temporally distant detections using long term interest point trajectories (IPTs). Leveraging on the IPTs, the ALFD provides a robust affinity measure for estimating the likelihood of matching detections regardless of the application scenarios. As another contribution, we present a Near-Online Multi-target Tracking (NOMT) algorithm. The tracking problem is formulated as a data-association between targets and detections in a temporal window, that is performed repeatedly at every frame. While being efficient, NOMT achieves robustness via integrating multiple cues including ALFD metric, target dynamics, appearance similarity, and long term trajectory regularization into the model. Our ablative analysis verifies the superiority of the ALFD metric over the other conventional affinity metrics. We run a comprehensive experimental evaluation on two challenging tracking datasets, KITTI and MOT datasets. The NOMT method combined with ALFD metric achieves the best accuracy in both datasets with significant margins (about 10% higher MOTA) over the state-of-the-arts.
no_new_dataset
0.945399
1504.02356
Xavier Gir\'o-i-Nieto
Eva Mohedano, Amaia Salvador, Sergi Porta, Xavier Gir\'o-i-Nieto, Graham Healy, Kevin McGuinness, Noel O'Connor and Alan F. Smeaton
Exploring EEG for Object Detection and Retrieval
This preprint is the full version of a short paper accepted in the ACM International Conference on Multimedia Retrieval (ICMR) 2015 (Shanghai, China)
null
null
null
cs.HC cs.CV cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper explores the potential for using Brain Computer Interfaces (BCI) as a relevance feedback mechanism in content-based image retrieval. We investigate if it is possible to capture useful EEG signals to detect if relevant objects are present in a dataset of realistic and complex images. We perform several experiments using a rapid serial visual presentation (RSVP) of images at different rates (5Hz and 10Hz) on 8 users with different degrees of familiarization with BCI and the dataset. We then use the feedback from the BCI and mouse-based interfaces to retrieve localized objects in a subset of TRECVid images. We show that it is indeed possible to detect such objects in complex images and, also, that users with previous knowledge on the dataset or experience with the RSVP outperform others. When the users have limited time to annotate the images (100 seconds in our experiments) both interfaces are comparable in performance. Comparing our best users in a retrieval task, we found that EEG-based relevance feedback outperforms mouse-based feedback. The realistic and complex image dataset differentiates our work from previous studies on EEG for image retrieval.
[ { "version": "v1", "created": "Thu, 9 Apr 2015 15:43:52 GMT" } ]
2015-04-10T00:00:00
[ [ "Mohedano", "Eva", "" ], [ "Salvador", "Amaia", "" ], [ "Porta", "Sergi", "" ], [ "Giró-i-Nieto", "Xavier", "" ], [ "Healy", "Graham", "" ], [ "McGuinness", "Kevin", "" ], [ "O'Connor", "Noel", "" ], [ "Smeaton", "Alan F.", "" ] ]
TITLE: Exploring EEG for Object Detection and Retrieval ABSTRACT: This paper explores the potential for using Brain Computer Interfaces (BCI) as a relevance feedback mechanism in content-based image retrieval. We investigate if it is possible to capture useful EEG signals to detect if relevant objects are present in a dataset of realistic and complex images. We perform several experiments using a rapid serial visual presentation (RSVP) of images at different rates (5Hz and 10Hz) on 8 users with different degrees of familiarization with BCI and the dataset. We then use the feedback from the BCI and mouse-based interfaces to retrieve localized objects in a subset of TRECVid images. We show that it is indeed possible to detect such objects in complex images and, also, that users with previous knowledge on the dataset or experience with the RSVP outperform others. When the users have limited time to annotate the images (100 seconds in our experiments) both interfaces are comparable in performance. Comparing our best users in a retrieval task, we found that EEG-based relevance feedback outperforms mouse-based feedback. The realistic and complex image dataset differentiates our work from previous studies on EEG for image retrieval.
no_new_dataset
0.940353
1504.02363
Ke Zhang
Ke Zhang, Konstantinos Pelechrinis, Theodoros Lappas
Analyzing and Modeling Special Offer Campaigns in Location-based Social Networks
in The 9th International AAAI Conference on Web and Social Media (ICWSM 2015)
null
null
null
cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The proliferation of mobile handheld devices in combination with the technological advancements in mobile computing has led to a number of innovative services that make use of the location information available on such devices. Traditional yellow pages websites have now moved to mobile platforms, giving the opportunity to local businesses and potential, near-by, customers to connect. These platforms can offer an affordable advertisement channel to local businesses. One of the mechanisms offered by location-based social networks (LBSNs) allows businesses to provide special offers to their customers that connect through the platform. We collect a large time-series dataset from approximately 14 million venues on Foursquare and analyze the performance of such campaigns using randomization techniques and (non-parametric) hypothesis testing with statistical bootstrapping. Our main finding indicates that this type of promotions are not as effective as anecdote success stories might suggest. Finally, we design classifiers by extracting three different types of features that are able to provide an educated decision on whether a special offer campaign for a local business will succeed or not both in short and long term.
[ { "version": "v1", "created": "Thu, 9 Apr 2015 16:26:40 GMT" } ]
2015-04-10T00:00:00
[ [ "Zhang", "Ke", "" ], [ "Pelechrinis", "Konstantinos", "" ], [ "Lappas", "Theodoros", "" ] ]
TITLE: Analyzing and Modeling Special Offer Campaigns in Location-based Social Networks ABSTRACT: The proliferation of mobile handheld devices in combination with the technological advancements in mobile computing has led to a number of innovative services that make use of the location information available on such devices. Traditional yellow pages websites have now moved to mobile platforms, giving the opportunity to local businesses and potential, near-by, customers to connect. These platforms can offer an affordable advertisement channel to local businesses. One of the mechanisms offered by location-based social networks (LBSNs) allows businesses to provide special offers to their customers that connect through the platform. We collect a large time-series dataset from approximately 14 million venues on Foursquare and analyze the performance of such campaigns using randomization techniques and (non-parametric) hypothesis testing with statistical bootstrapping. Our main finding indicates that this type of promotions are not as effective as anecdote success stories might suggest. Finally, we design classifiers by extracting three different types of features that are able to provide an educated decision on whether a special offer campaign for a local business will succeed or not both in short and long term.
no_new_dataset
0.933613
1504.00941
Quoc Le
Quoc V. Le, Navdeep Jaitly, Geoffrey E. Hinton
A Simple Way to Initialize Recurrent Networks of Rectified Linear Units
null
null
null
null
cs.NE cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Learning long term dependencies in recurrent networks is difficult due to vanishing and exploding gradients. To overcome this difficulty, researchers have developed sophisticated optimization techniques and network architectures. In this paper, we propose a simpler solution that use recurrent neural networks composed of rectified linear units. Key to our solution is the use of the identity matrix or its scaled version to initialize the recurrent weight matrix. We find that our solution is comparable to LSTM on our four benchmarks: two toy problems involving long-range temporal structures, a large language modeling problem and a benchmark speech recognition problem.
[ { "version": "v1", "created": "Fri, 3 Apr 2015 21:22:52 GMT" }, { "version": "v2", "created": "Tue, 7 Apr 2015 22:39:18 GMT" } ]
2015-04-09T00:00:00
[ [ "Le", "Quoc V.", "" ], [ "Jaitly", "Navdeep", "" ], [ "Hinton", "Geoffrey E.", "" ] ]
TITLE: A Simple Way to Initialize Recurrent Networks of Rectified Linear Units ABSTRACT: Learning long term dependencies in recurrent networks is difficult due to vanishing and exploding gradients. To overcome this difficulty, researchers have developed sophisticated optimization techniques and network architectures. In this paper, we propose a simpler solution that use recurrent neural networks composed of rectified linear units. Key to our solution is the use of the identity matrix or its scaled version to initialize the recurrent weight matrix. We find that our solution is comparable to LSTM on our four benchmarks: two toy problems involving long-range temporal structures, a large language modeling problem and a benchmark speech recognition problem.
no_new_dataset
0.954095
1504.01446
Vasil S. Denchev
Vasil S. Denchev, Nan Ding, Shin Matsushima, S.V.N. Vishwanathan, Hartmut Neven
Totally Corrective Boosting with Cardinality Penalization
null
null
null
null
cs.LG quant-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a totally corrective boosting algorithm with explicit cardinality regularization. The resulting combinatorial optimization problems are not known to be efficiently solvable with existing classical methods, but emerging quantum optimization technology gives hope for achieving sparser models in practice. In order to demonstrate the utility of our algorithm, we use a distributed classical heuristic optimizer as a stand-in for quantum hardware. Even though this evaluation methodology incurs large time and resource costs on classical computing machinery, it allows us to gauge the potential gains in generalization performance and sparsity of the resulting boosted ensembles. Our experimental results on public data sets commonly used for benchmarking of boosting algorithms decidedly demonstrate the existence of such advantages. If actual quantum optimization were to be used with this algorithm in the future, we would expect equivalent or superior results at much smaller time and energy costs during training. Moreover, studying cardinality-penalized boosting also sheds light on why unregularized boosting algorithms with early stopping often yield better results than their counterparts with explicit convex regularization: Early stopping performs suboptimal cardinality regularization. The results that we present here indicate it is beneficial to explicitly solve the combinatorial problem still left open at early termination.
[ { "version": "v1", "created": "Tue, 7 Apr 2015 00:50:30 GMT" } ]
2015-04-09T00:00:00
[ [ "Denchev", "Vasil S.", "" ], [ "Ding", "Nan", "" ], [ "Matsushima", "Shin", "" ], [ "Vishwanathan", "S. V. N.", "" ], [ "Neven", "Hartmut", "" ] ]
TITLE: Totally Corrective Boosting with Cardinality Penalization ABSTRACT: We propose a totally corrective boosting algorithm with explicit cardinality regularization. The resulting combinatorial optimization problems are not known to be efficiently solvable with existing classical methods, but emerging quantum optimization technology gives hope for achieving sparser models in practice. In order to demonstrate the utility of our algorithm, we use a distributed classical heuristic optimizer as a stand-in for quantum hardware. Even though this evaluation methodology incurs large time and resource costs on classical computing machinery, it allows us to gauge the potential gains in generalization performance and sparsity of the resulting boosted ensembles. Our experimental results on public data sets commonly used for benchmarking of boosting algorithms decidedly demonstrate the existence of such advantages. If actual quantum optimization were to be used with this algorithm in the future, we would expect equivalent or superior results at much smaller time and energy costs during training. Moreover, studying cardinality-penalized boosting also sheds light on why unregularized boosting algorithms with early stopping often yield better results than their counterparts with explicit convex regularization: Early stopping performs suboptimal cardinality regularization. The results that we present here indicate it is beneficial to explicitly solve the combinatorial problem still left open at early termination.
no_new_dataset
0.942135
1504.01781
Tiep Mai
Tiep Mai, Deepak Ajwani and Alessandra Sala
Profiling user activities with minimal traffic traces
null
null
null
null
cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Understanding user behavior is essential to personalize and enrich a user's online experience. While there are significant benefits to be accrued from the pursuit of personalized services based on a fine-grained behavioral analysis, care must be taken to address user privacy concerns. In this paper, we consider the use of web traces with truncated URLs - each URL is trimmed to only contain the web domain - for this purpose. While such truncation removes the fine-grained sensitive information, it also strips the data of many features that are crucial to the profiling of user activity. We show how to overcome the severe handicap of lack of crucial features for the purpose of filtering out the URLs representing a user activity from the noisy network traffic trace (including advertisement, spam, analytics, webscripts) with high accuracy. This activity profiling with truncated URLs enables the network operators to provide personalized services while mitigating privacy concerns by storing and sharing only truncated traffic traces. In order to offset the accuracy loss due to truncation, our statistical methodology leverages specialized features extracted from a group of consecutive URLs that represent a micro user action like web click, chat reply, etc., which we call bursts. These bursts, in turn, are detected by a novel algorithm which is based on our observed characteristics of the inter-arrival time of HTTP records. We present an extensive experimental evaluation on a real dataset of mobile web traces, consisting of more than 130 million records, representing the browsing activities of 10,000 users over a period of 30 days. Our results show that the proposed methodology achieves around 90% accuracy in segregating URLs representing user activities from non-representative URLs.
[ { "version": "v1", "created": "Tue, 7 Apr 2015 23:29:23 GMT" } ]
2015-04-09T00:00:00
[ [ "Mai", "Tiep", "" ], [ "Ajwani", "Deepak", "" ], [ "Sala", "Alessandra", "" ] ]
TITLE: Profiling user activities with minimal traffic traces ABSTRACT: Understanding user behavior is essential to personalize and enrich a user's online experience. While there are significant benefits to be accrued from the pursuit of personalized services based on a fine-grained behavioral analysis, care must be taken to address user privacy concerns. In this paper, we consider the use of web traces with truncated URLs - each URL is trimmed to only contain the web domain - for this purpose. While such truncation removes the fine-grained sensitive information, it also strips the data of many features that are crucial to the profiling of user activity. We show how to overcome the severe handicap of lack of crucial features for the purpose of filtering out the URLs representing a user activity from the noisy network traffic trace (including advertisement, spam, analytics, webscripts) with high accuracy. This activity profiling with truncated URLs enables the network operators to provide personalized services while mitigating privacy concerns by storing and sharing only truncated traffic traces. In order to offset the accuracy loss due to truncation, our statistical methodology leverages specialized features extracted from a group of consecutive URLs that represent a micro user action like web click, chat reply, etc., which we call bursts. These bursts, in turn, are detected by a novel algorithm which is based on our observed characteristics of the inter-arrival time of HTTP records. We present an extensive experimental evaluation on a real dataset of mobile web traces, consisting of more than 130 million records, representing the browsing activities of 10,000 users over a period of 30 days. Our results show that the proposed methodology achieves around 90% accuracy in segregating URLs representing user activities from non-representative URLs.
new_dataset
0.958148
1504.01807
Junbin Gao Professor
Boyue Wang and Yongli Hu and Junbin Gao and Yanfeng Sun and Baocai Yin
Low Rank Representation on Grassmann Manifolds: An Extrinsic Perspective
9 pages
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Many computer vision algorithms employ subspace models to represent data. The Low-rank representation (LRR) has been successfully applied in subspace clustering for which data are clustered according to their subspace structures. The possibility of extending LRR on Grassmann manifold is explored in this paper. Rather than directly embedding Grassmann manifold into a symmetric matrix space, an extrinsic view is taken by building the self-representation of LRR over the tangent space of each Grassmannian point. A new algorithm for solving the proposed Grassmannian LRR model is designed and implemented. Several clustering experiments are conducted on handwritten digits dataset, dynamic texture video clips and YouTube celebrity face video data. The experimental results show our method outperforms a number of existing methods.
[ { "version": "v1", "created": "Wed, 8 Apr 2015 02:38:04 GMT" } ]
2015-04-09T00:00:00
[ [ "Wang", "Boyue", "" ], [ "Hu", "Yongli", "" ], [ "Gao", "Junbin", "" ], [ "Sun", "Yanfeng", "" ], [ "Yin", "Baocai", "" ] ]
TITLE: Low Rank Representation on Grassmann Manifolds: An Extrinsic Perspective ABSTRACT: Many computer vision algorithms employ subspace models to represent data. The Low-rank representation (LRR) has been successfully applied in subspace clustering for which data are clustered according to their subspace structures. The possibility of extending LRR on Grassmann manifold is explored in this paper. Rather than directly embedding Grassmann manifold into a symmetric matrix space, an extrinsic view is taken by building the self-representation of LRR over the tangent space of each Grassmannian point. A new algorithm for solving the proposed Grassmannian LRR model is designed and implemented. Several clustering experiments are conducted on handwritten digits dataset, dynamic texture video clips and YouTube celebrity face video data. The experimental results show our method outperforms a number of existing methods.
no_new_dataset
0.947478
1504.01840
Yegor Tkachenko
Yegor Tkachenko
Autonomous CRM Control via CLV Approximation with Deep Reinforcement Learning in Discrete and Continuous Action Space
13 pages, 8 figures
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The paper outlines a framework for autonomous control of a CRM (customer relationship management) system. First, it explores how a modified version of the widely accepted Recency-Frequency-Monetary Value system of metrics can be used to define the state space of clients or donors. Second, it describes a procedure to determine the optimal direct marketing action in discrete and continuous action space for the given individual, based on his position in the state space. The procedure involves the use of model-free Q-learning to train a deep neural network that relates a client's position in the state space to rewards associated with possible marketing actions. The estimated value function over the client state space can be interpreted as customer lifetime value, and thus allows for a quick plug-in estimation of CLV for a given client. Experimental results are presented, based on KDD Cup 1998 mailing dataset of donation solicitations.
[ { "version": "v1", "created": "Wed, 8 Apr 2015 06:22:44 GMT" } ]
2015-04-09T00:00:00
[ [ "Tkachenko", "Yegor", "" ] ]
TITLE: Autonomous CRM Control via CLV Approximation with Deep Reinforcement Learning in Discrete and Continuous Action Space ABSTRACT: The paper outlines a framework for autonomous control of a CRM (customer relationship management) system. First, it explores how a modified version of the widely accepted Recency-Frequency-Monetary Value system of metrics can be used to define the state space of clients or donors. Second, it describes a procedure to determine the optimal direct marketing action in discrete and continuous action space for the given individual, based on his position in the state space. The procedure involves the use of model-free Q-learning to train a deep neural network that relates a client's position in the state space to rewards associated with possible marketing actions. The estimated value function over the client state space can be interpreted as customer lifetime value, and thus allows for a quick plug-in estimation of CLV for a given client. Experimental results are presented, based on KDD Cup 1998 mailing dataset of donation solicitations.
no_new_dataset
0.947575
1504.01920
Zuxuan Wu
Hao Ye, Zuxuan Wu, Rui-Wei Zhao, Xi Wang, Yu-Gang Jiang, Xiangyang Xue
Evaluating Two-Stream CNN for Video Classification
ACM ICMR'15
null
10.1145/2671188.2749406
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Videos contain very rich semantic information. Traditional hand-crafted features are known to be inadequate in analyzing complex video semantics. Inspired by the huge success of the deep learning methods in analyzing image, audio and text data, significant efforts are recently being devoted to the design of deep nets for video analytics. Among the many practical needs, classifying videos (or video clips) based on their major semantic categories (e.g., "skiing") is useful in many applications. In this paper, we conduct an in-depth study to investigate important implementation options that may affect the performance of deep nets on video classification. Our evaluations are conducted on top of a recent two-stream convolutional neural network (CNN) pipeline, which uses both static frames and motion optical flows, and has demonstrated competitive performance against the state-of-the-art methods. In order to gain insights and to arrive at a practical guideline, many important options are studied, including network architectures, model fusion, learning parameters and the final prediction methods. Based on the evaluations, very competitive results are attained on two popular video classification benchmarks. We hope that the discussions and conclusions from this work can help researchers in related fields to quickly set up a good basis for further investigations along this very promising direction.
[ { "version": "v1", "created": "Wed, 8 Apr 2015 11:29:21 GMT" } ]
2015-04-09T00:00:00
[ [ "Ye", "Hao", "" ], [ "Wu", "Zuxuan", "" ], [ "Zhao", "Rui-Wei", "" ], [ "Wang", "Xi", "" ], [ "Jiang", "Yu-Gang", "" ], [ "Xue", "Xiangyang", "" ] ]
TITLE: Evaluating Two-Stream CNN for Video Classification ABSTRACT: Videos contain very rich semantic information. Traditional hand-crafted features are known to be inadequate in analyzing complex video semantics. Inspired by the huge success of the deep learning methods in analyzing image, audio and text data, significant efforts are recently being devoted to the design of deep nets for video analytics. Among the many practical needs, classifying videos (or video clips) based on their major semantic categories (e.g., "skiing") is useful in many applications. In this paper, we conduct an in-depth study to investigate important implementation options that may affect the performance of deep nets on video classification. Our evaluations are conducted on top of a recent two-stream convolutional neural network (CNN) pipeline, which uses both static frames and motion optical flows, and has demonstrated competitive performance against the state-of-the-art methods. In order to gain insights and to arrive at a practical guideline, many important options are studied, including network architectures, model fusion, learning parameters and the final prediction methods. Based on the evaluations, very competitive results are attained on two popular video classification benchmarks. We hope that the discussions and conclusions from this work can help researchers in related fields to quickly set up a good basis for further investigations along this very promising direction.
no_new_dataset
0.944638
1504.01942
Laura Leal Taix\'e
Laura Leal-Taix\'e and Anton Milan and Ian Reid and Stefan Roth and Konrad Schindler
MOTChallenge 2015: Towards a Benchmark for Multi-Target Tracking
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In the recent past, the computer vision community has developed centralized benchmarks for the performance evaluation of a variety of tasks, including generic object and pedestrian detection, 3D reconstruction, optical flow, single-object short-term tracking, and stereo estimation. Despite potential pitfalls of such benchmarks, they have proved to be extremely helpful to advance the state of the art in the respective area. Interestingly, there has been rather limited work on the standardization of quantitative benchmarks for multiple target tracking. One of the few exceptions is the well-known PETS dataset, targeted primarily at surveillance applications. Despite being widely used, it is often applied inconsistently, for example involving using different subsets of the available data, different ways of training the models, or differing evaluation scripts. This paper describes our work toward a novel multiple object tracking benchmark aimed to address such issues. We discuss the challenges of creating such a framework, collecting existing and new data, gathering state-of-the-art methods to be tested on the datasets, and finally creating a unified evaluation system. With MOTChallenge we aim to pave the way toward a unified evaluation framework for a more meaningful quantification of multi-target tracking.
[ { "version": "v1", "created": "Wed, 8 Apr 2015 12:56:38 GMT" } ]
2015-04-09T00:00:00
[ [ "Leal-Taixé", "Laura", "" ], [ "Milan", "Anton", "" ], [ "Reid", "Ian", "" ], [ "Roth", "Stefan", "" ], [ "Schindler", "Konrad", "" ] ]
TITLE: MOTChallenge 2015: Towards a Benchmark for Multi-Target Tracking ABSTRACT: In the recent past, the computer vision community has developed centralized benchmarks for the performance evaluation of a variety of tasks, including generic object and pedestrian detection, 3D reconstruction, optical flow, single-object short-term tracking, and stereo estimation. Despite potential pitfalls of such benchmarks, they have proved to be extremely helpful to advance the state of the art in the respective area. Interestingly, there has been rather limited work on the standardization of quantitative benchmarks for multiple target tracking. One of the few exceptions is the well-known PETS dataset, targeted primarily at surveillance applications. Despite being widely used, it is often applied inconsistently, for example involving using different subsets of the available data, different ways of training the models, or differing evaluation scripts. This paper describes our work toward a novel multiple object tracking benchmark aimed to address such issues. We discuss the challenges of creating such a framework, collecting existing and new data, gathering state-of-the-art methods to be tested on the datasets, and finally creating a unified evaluation system. With MOTChallenge we aim to pave the way toward a unified evaluation framework for a more meaningful quantification of multi-target tracking.
no_new_dataset
0.882276
1504.01957
Tony Tsang
Tony Tsang
Video Contents Prior Storing Server for Optical Access Network
10 pages. in March 2015, Volume 7. Number 1 International Journal of Computer Networks & Communications (IJCNC) March 2015, Volume 7
null
null
null
cs.NI cs.MM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
One of the most important multimedia applications is Internet protocol TV (IPTV) for next-generation networks. IPTV provides triple-play services that require high-speed access networks with the functions of multicasting and quality of service (QoS) guarantees. Among optical access networks, Ethernet passive optical networks (EPONs) are regarded as among the best solutions to meet higher bandwidth demands. In this paper, we propose a new architecture for multicasting live IPTV traffic in optical access network. The proposed mechanism involves assigning a unique logical link identifier to each IPTV channel. To manage multicasting, a prior storing server in the optical line terminal (OLT) and in each optical network unit (ONU) is constructed. In this work, we propose a partial prior storing strategy that considers the changes in the popularity of the video content segments over time and the access patterns of the users to compute the utility of the objects in the prior storage. We also propose to partition the prior storage to avoid the eviction of the popular objects (those not accessed frequently) by the unpopular ones which are accessed with higher frequency. The popularity distribution and ageing of popularity are measured from two online datasets and use the parameters in simulations. Simulation results show that our proposed architecture can improve the system performance and QoS parameters in terms of packet delay, jitter and packet loss.
[ { "version": "v1", "created": "Wed, 8 Apr 2015 13:29:12 GMT" } ]
2015-04-09T00:00:00
[ [ "Tsang", "Tony", "" ] ]
TITLE: Video Contents Prior Storing Server for Optical Access Network ABSTRACT: One of the most important multimedia applications is Internet protocol TV (IPTV) for next-generation networks. IPTV provides triple-play services that require high-speed access networks with the functions of multicasting and quality of service (QoS) guarantees. Among optical access networks, Ethernet passive optical networks (EPONs) are regarded as among the best solutions to meet higher bandwidth demands. In this paper, we propose a new architecture for multicasting live IPTV traffic in optical access network. The proposed mechanism involves assigning a unique logical link identifier to each IPTV channel. To manage multicasting, a prior storing server in the optical line terminal (OLT) and in each optical network unit (ONU) is constructed. In this work, we propose a partial prior storing strategy that considers the changes in the popularity of the video content segments over time and the access patterns of the users to compute the utility of the objects in the prior storage. We also propose to partition the prior storage to avoid the eviction of the popular objects (those not accessed frequently) by the unpopular ones which are accessed with higher frequency. The popularity distribution and ageing of popularity are measured from two online datasets and use the parameters in simulations. Simulation results show that our proposed architecture can improve the system performance and QoS parameters in terms of packet delay, jitter and packet loss.
no_new_dataset
0.953449
1411.3715
Daniele Barchiesi
Daniele Barchiesi, Dimitrios Giannoulis, Dan Stowell, Mark D. Plumbley
Acoustic Scene Classification
null
IEEE Signal Processing Magazine 32(3) (May 2015) 16-34
10.1109/MSP.2014.2326181
null
cs.SD cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this article we present an account of the state-of-the-art in acoustic scene classification (ASC), the task of classifying environments from the sounds they produce. Starting from a historical review of previous research in this area, we define a general framework for ASC and present different imple- mentations of its components. We then describe a range of different algorithms submitted for a data challenge that was held to provide a general and fair benchmark for ASC techniques. The dataset recorded for this purpose is presented, along with the performance metrics that are used to evaluate the algorithms and statistical significance tests to compare the submitted methods. We use a baseline method that employs MFCCS, GMMS and a maximum likelihood criterion as a benchmark, and only find sufficient evidence to conclude that three algorithms significantly outperform it. We also evaluate the human classification accuracy in performing a similar classification task. The best performing algorithm achieves a mean accuracy that matches the median accuracy obtained by humans, and common pairs of classes are misclassified by both computers and humans. However, all acoustic scenes are correctly classified by at least some individuals, while there are scenes that are misclassified by all algorithms.
[ { "version": "v1", "created": "Thu, 13 Nov 2014 16:03:09 GMT" } ]
2015-04-08T00:00:00
[ [ "Barchiesi", "Daniele", "" ], [ "Giannoulis", "Dimitrios", "" ], [ "Stowell", "Dan", "" ], [ "Plumbley", "Mark D.", "" ] ]
TITLE: Acoustic Scene Classification ABSTRACT: In this article we present an account of the state-of-the-art in acoustic scene classification (ASC), the task of classifying environments from the sounds they produce. Starting from a historical review of previous research in this area, we define a general framework for ASC and present different imple- mentations of its components. We then describe a range of different algorithms submitted for a data challenge that was held to provide a general and fair benchmark for ASC techniques. The dataset recorded for this purpose is presented, along with the performance metrics that are used to evaluate the algorithms and statistical significance tests to compare the submitted methods. We use a baseline method that employs MFCCS, GMMS and a maximum likelihood criterion as a benchmark, and only find sufficient evidence to conclude that three algorithms significantly outperform it. We also evaluate the human classification accuracy in performing a similar classification task. The best performing algorithm achieves a mean accuracy that matches the median accuracy obtained by humans, and common pairs of classes are misclassified by both computers and humans. However, all acoustic scenes are correctly classified by at least some individuals, while there are scenes that are misclassified by all algorithms.
new_dataset
0.973062
1412.6615
Levent Sagun
Levent Sagun, V. Ugur Guney, Gerard Ben Arous, Yann LeCun
Explorations on high dimensional landscapes
11 pages, 8 figures, workshop contribution at ICLR 2015
null
null
null
stat.ML cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Finding minima of a real valued non-convex function over a high dimensional space is a major challenge in science. We provide evidence that some such functions that are defined on high dimensional domains have a narrow band of values whose pre-image contains the bulk of its critical points. This is in contrast with the low dimensional picture in which this band is wide. Our simulations agree with the previous theoretical work on spin glasses that proves the existence of such a band when the dimension of the domain tends to infinity. Furthermore our experiments on teacher-student networks with the MNIST dataset establish a similar phenomenon in deep networks. We finally observe that both the gradient descent and the stochastic gradient descent methods can reach this level within the same number of steps.
[ { "version": "v1", "created": "Sat, 20 Dec 2014 06:57:12 GMT" }, { "version": "v2", "created": "Thu, 25 Dec 2014 01:29:56 GMT" }, { "version": "v3", "created": "Mon, 2 Mar 2015 10:08:16 GMT" }, { "version": "v4", "created": "Mon, 6 Apr 2015 21:47:50 GMT" } ]
2015-04-08T00:00:00
[ [ "Sagun", "Levent", "" ], [ "Guney", "V. Ugur", "" ], [ "Arous", "Gerard Ben", "" ], [ "LeCun", "Yann", "" ] ]
TITLE: Explorations on high dimensional landscapes ABSTRACT: Finding minima of a real valued non-convex function over a high dimensional space is a major challenge in science. We provide evidence that some such functions that are defined on high dimensional domains have a narrow band of values whose pre-image contains the bulk of its critical points. This is in contrast with the low dimensional picture in which this band is wide. Our simulations agree with the previous theoretical work on spin glasses that proves the existence of such a band when the dimension of the domain tends to infinity. Furthermore our experiments on teacher-student networks with the MNIST dataset establish a similar phenomenon in deep networks. We finally observe that both the gradient descent and the stochastic gradient descent methods can reach this level within the same number of steps.
no_new_dataset
0.951414
1504.01383
Cristian Danescu-Niculescu-Mizil
Vlad Niculae, Caroline Suen, Justine Zhang, Cristian Danescu-Niculescu-Mizil, Jure Leskovec
QUOTUS: The Structure of Political Media Coverage as Revealed by Quoting Patterns
To appear in the Proceedings of WWW 2015. 11pp, 10 fig. Interactive visualization, data, and other info available at http://snap.stanford.edu/quotus/
null
null
null
cs.CL cs.SI physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Given the extremely large pool of events and stories available, media outlets need to focus on a subset of issues and aspects to convey to their audience. Outlets are often accused of exhibiting a systematic bias in this selection process, with different outlets portraying different versions of reality. However, in the absence of objective measures and empirical evidence, the direction and extent of systematicity remains widely disputed. In this paper we propose a framework based on quoting patterns for quantifying and characterizing the degree to which media outlets exhibit systematic bias. We apply this framework to a massive dataset of news articles spanning the six years of Obama's presidency and all of his speeches, and reveal that a systematic pattern does indeed emerge from the outlet's quoting behavior. Moreover, we show that this pattern can be successfully exploited in an unsupervised prediction setting, to determine which new quotes an outlet will select to broadcast. By encoding bias patterns in a low-rank space we provide an analysis of the structure of political media coverage. This reveals a latent media bias space that aligns surprisingly well with political ideology and outlet type. A linguistic analysis exposes striking differences across these latent dimensions, showing how the different types of media outlets portray different realities even when reporting on the same events. For example, outlets mapped to the mainstream conservative side of the latent space focus on quotes that portray a presidential persona disproportionately characterized by negativity.
[ { "version": "v1", "created": "Mon, 6 Apr 2015 20:00:28 GMT" } ]
2015-04-08T00:00:00
[ [ "Niculae", "Vlad", "" ], [ "Suen", "Caroline", "" ], [ "Zhang", "Justine", "" ], [ "Danescu-Niculescu-Mizil", "Cristian", "" ], [ "Leskovec", "Jure", "" ] ]
TITLE: QUOTUS: The Structure of Political Media Coverage as Revealed by Quoting Patterns ABSTRACT: Given the extremely large pool of events and stories available, media outlets need to focus on a subset of issues and aspects to convey to their audience. Outlets are often accused of exhibiting a systematic bias in this selection process, with different outlets portraying different versions of reality. However, in the absence of objective measures and empirical evidence, the direction and extent of systematicity remains widely disputed. In this paper we propose a framework based on quoting patterns for quantifying and characterizing the degree to which media outlets exhibit systematic bias. We apply this framework to a massive dataset of news articles spanning the six years of Obama's presidency and all of his speeches, and reveal that a systematic pattern does indeed emerge from the outlet's quoting behavior. Moreover, we show that this pattern can be successfully exploited in an unsupervised prediction setting, to determine which new quotes an outlet will select to broadcast. By encoding bias patterns in a low-rank space we provide an analysis of the structure of political media coverage. This reveals a latent media bias space that aligns surprisingly well with political ideology and outlet type. A linguistic analysis exposes striking differences across these latent dimensions, showing how the different types of media outlets portray different realities even when reporting on the same events. For example, outlets mapped to the mainstream conservative side of the latent space focus on quotes that portray a presidential persona disproportionately characterized by negativity.
no_new_dataset
0.945551
1504.01561
Zuxuan Wu
Zuxuan Wu, Xi Wang, Yu-Gang Jiang, Hao Ye, Xiangyang Xue
Modeling Spatial-Temporal Clues in a Hybrid Deep Learning Framework for Video Classification
null
null
null
null
cs.CV cs.MM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Classifying videos according to content semantics is an important problem with a wide range of applications. In this paper, we propose a hybrid deep learning framework for video classification, which is able to model static spatial information, short-term motion, as well as long-term temporal clues in the videos. Specifically, the spatial and the short-term motion features are extracted separately by two Convolutional Neural Networks (CNN). These two types of CNN-based features are then combined in a regularized feature fusion network for classification, which is able to learn and utilize feature relationships for improved performance. In addition, Long Short Term Memory (LSTM) networks are applied on top of the two features to further model longer-term temporal clues. The main contribution of this work is the hybrid learning framework that can model several important aspects of the video data. We also show that (1) combining the spatial and the short-term motion features in the regularized fusion network is better than direct classification and fusion using the CNN with a softmax layer, and (2) the sequence-based LSTM is highly complementary to the traditional classification strategy without considering the temporal frame orders. Extensive experiments are conducted on two popular and challenging benchmarks, the UCF-101 Human Actions and the Columbia Consumer Videos (CCV). On both benchmarks, our framework achieves to-date the best reported performance: $91.3\%$ on the UCF-101 and $83.5\%$ on the CCV.
[ { "version": "v1", "created": "Tue, 7 Apr 2015 11:53:46 GMT" } ]
2015-04-08T00:00:00
[ [ "Wu", "Zuxuan", "" ], [ "Wang", "Xi", "" ], [ "Jiang", "Yu-Gang", "" ], [ "Ye", "Hao", "" ], [ "Xue", "Xiangyang", "" ] ]
TITLE: Modeling Spatial-Temporal Clues in a Hybrid Deep Learning Framework for Video Classification ABSTRACT: Classifying videos according to content semantics is an important problem with a wide range of applications. In this paper, we propose a hybrid deep learning framework for video classification, which is able to model static spatial information, short-term motion, as well as long-term temporal clues in the videos. Specifically, the spatial and the short-term motion features are extracted separately by two Convolutional Neural Networks (CNN). These two types of CNN-based features are then combined in a regularized feature fusion network for classification, which is able to learn and utilize feature relationships for improved performance. In addition, Long Short Term Memory (LSTM) networks are applied on top of the two features to further model longer-term temporal clues. The main contribution of this work is the hybrid learning framework that can model several important aspects of the video data. We also show that (1) combining the spatial and the short-term motion features in the regularized fusion network is better than direct classification and fusion using the CNN with a softmax layer, and (2) the sequence-based LSTM is highly complementary to the traditional classification strategy without considering the temporal frame orders. Extensive experiments are conducted on two popular and challenging benchmarks, the UCF-101 Human Actions and the Columbia Consumer Videos (CCV). On both benchmarks, our framework achieves to-date the best reported performance: $91.3\%$ on the UCF-101 and $83.5\%$ on the CCV.
no_new_dataset
0.950273
1504.01650
Adam Strzelecki
Piotr Bialas and Adam Strzelecki
Benchmarking the cost of thread divergence in CUDA
null
null
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
All modern processors include a set of vector instructions. While this gives a tremendous boost to the performance, it requires a vectorized code that can take advantage of such instructions. As an ideal vectorization is hard to achieve in practice, one has to decide when different instructions may be applied to different elements of the vector operand. This is especially important in implicit vectorization as in NVIDIA CUDA Single Instruction Multiple Threads (SIMT) model, where the vectorization details are hidden from the programmer. In order to assess the costs incurred by incompletely vectorized code, we have developed a micro-benchmark that measures the characteristics of the CUDA thread divergence model on different architectures focusing on the loops performance.
[ { "version": "v1", "created": "Tue, 7 Apr 2015 15:53:48 GMT" } ]
2015-04-08T00:00:00
[ [ "Bialas", "Piotr", "" ], [ "Strzelecki", "Adam", "" ] ]
TITLE: Benchmarking the cost of thread divergence in CUDA ABSTRACT: All modern processors include a set of vector instructions. While this gives a tremendous boost to the performance, it requires a vectorized code that can take advantage of such instructions. As an ideal vectorization is hard to achieve in practice, one has to decide when different instructions may be applied to different elements of the vector operand. This is especially important in implicit vectorization as in NVIDIA CUDA Single Instruction Multiple Threads (SIMT) model, where the vectorization details are hidden from the programmer. In order to assess the costs incurred by incompletely vectorized code, we have developed a micro-benchmark that measures the characteristics of the CUDA thread divergence model on different architectures focusing on the loops performance.
no_new_dataset
0.875148
1504.01684
Miao Fan
Miao Fan, Qiang Zhou, Thomas Fang Zheng and Ralph Grishman
Large Margin Nearest Neighbor Embedding for Knowledge Representation
arXiv admin note: text overlap with arXiv:1503.08155
null
null
null
cs.AI cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Traditional way of storing facts in triplets ({\it head\_entity, relation, tail\_entity}), abbreviated as ({\it h, r, t}), makes the knowledge intuitively displayed and easily acquired by mankind, but hardly computed or even reasoned by AI machines. Inspired by the success in applying {\it Distributed Representations} to AI-related fields, recent studies expect to represent each entity and relation with a unique low-dimensional embedding, which is different from the symbolic and atomic framework of displaying knowledge in triplets. In this way, the knowledge computing and reasoning can be essentially facilitated by means of a simple {\it vector calculation}, i.e. ${\bf h} + {\bf r} \approx {\bf t}$. We thus contribute an effective model to learn better embeddings satisfying the formula by pulling the positive tail entities ${\bf t^{+}}$ to get together and close to {\bf h} + {\bf r} ({\it Nearest Neighbor}), and simultaneously pushing the negatives ${\bf t^{-}}$ away from the positives ${\bf t^{+}}$ via keeping a {\it Large Margin}. We also design a corresponding learning algorithm to efficiently find the optimal solution based on {\it Stochastic Gradient Descent} in iterative fashion. Quantitative experiments illustrate that our approach can achieve the state-of-the-art performance, compared with several latest methods on some benchmark datasets for two classical applications, i.e. {\it Link prediction} and {\it Triplet classification}. Moreover, we analyze the parameter complexities among all the evaluated models, and analytical results indicate that our model needs fewer computational resources on outperforming the other methods.
[ { "version": "v1", "created": "Tue, 7 Apr 2015 17:50:31 GMT" } ]
2015-04-08T00:00:00
[ [ "Fan", "Miao", "" ], [ "Zhou", "Qiang", "" ], [ "Zheng", "Thomas Fang", "" ], [ "Grishman", "Ralph", "" ] ]
TITLE: Large Margin Nearest Neighbor Embedding for Knowledge Representation ABSTRACT: Traditional way of storing facts in triplets ({\it head\_entity, relation, tail\_entity}), abbreviated as ({\it h, r, t}), makes the knowledge intuitively displayed and easily acquired by mankind, but hardly computed or even reasoned by AI machines. Inspired by the success in applying {\it Distributed Representations} to AI-related fields, recent studies expect to represent each entity and relation with a unique low-dimensional embedding, which is different from the symbolic and atomic framework of displaying knowledge in triplets. In this way, the knowledge computing and reasoning can be essentially facilitated by means of a simple {\it vector calculation}, i.e. ${\bf h} + {\bf r} \approx {\bf t}$. We thus contribute an effective model to learn better embeddings satisfying the formula by pulling the positive tail entities ${\bf t^{+}}$ to get together and close to {\bf h} + {\bf r} ({\it Nearest Neighbor}), and simultaneously pushing the negatives ${\bf t^{-}}$ away from the positives ${\bf t^{+}}$ via keeping a {\it Large Margin}. We also design a corresponding learning algorithm to efficiently find the optimal solution based on {\it Stochastic Gradient Descent} in iterative fashion. Quantitative experiments illustrate that our approach can achieve the state-of-the-art performance, compared with several latest methods on some benchmark datasets for two classical applications, i.e. {\it Link prediction} and {\it Triplet classification}. Moreover, we analyze the parameter complexities among all the evaluated models, and analytical results indicate that our model needs fewer computational resources on outperforming the other methods.
no_new_dataset
0.949623
1504.01697
Alex Gittens
Jiyan Yang and Alex Gittens
Tensor machines for learning target-specific polynomial features
19 pages, 4 color figures, 2 tables. Submitted to ECML 2015
null
null
null
cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recent years have demonstrated that using random feature maps can significantly decrease the training and testing times of kernel-based algorithms without significantly lowering their accuracy. Regrettably, because random features are target-agnostic, typically thousands of such features are necessary to achieve acceptable accuracies. In this work, we consider the problem of learning a small number of explicit polynomial features. Our approach, named Tensor Machines, finds a parsimonious set of features by optimizing over the hypothesis class introduced by Kar and Karnick for random feature maps in a target-specific manner. Exploiting a natural connection between polynomials and tensors, we provide bounds on the generalization error of Tensor Machines. Empirically, Tensor Machines behave favorably on several real-world datasets compared to other state-of-the-art techniques for learning polynomial features, and deliver significantly more parsimonious models.
[ { "version": "v1", "created": "Tue, 7 Apr 2015 18:21:37 GMT" } ]
2015-04-08T00:00:00
[ [ "Yang", "Jiyan", "" ], [ "Gittens", "Alex", "" ] ]
TITLE: Tensor machines for learning target-specific polynomial features ABSTRACT: Recent years have demonstrated that using random feature maps can significantly decrease the training and testing times of kernel-based algorithms without significantly lowering their accuracy. Regrettably, because random features are target-agnostic, typically thousands of such features are necessary to achieve acceptable accuracies. In this work, we consider the problem of learning a small number of explicit polynomial features. Our approach, named Tensor Machines, finds a parsimonious set of features by optimizing over the hypothesis class introduced by Kar and Karnick for random feature maps in a target-specific manner. Exploiting a natural connection between polynomials and tensors, we provide bounds on the generalization error of Tensor Machines. Empirically, Tensor Machines behave favorably on several real-world datasets compared to other state-of-the-art techniques for learning polynomial features, and deliver significantly more parsimonious models.
no_new_dataset
0.947381
1411.1455
Saravanan Thirumuruganathan
Md Farhadur Rahman, Weimo Liu, Saravanan Thirumuruganathan, Nan Zhang, Gautam Das
Rank-Based Inference over Web Databases
null
null
null
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In recent years, there has been much research in Ranked Retrieval model in structured databases, especially those in web databases. With this model, a search query returns top-k tuples according to not just exact matches of selection conditions, but a suitable ranking function. This paper studies a novel problem on the privacy implications of database ranking. The motivation is a novel yet serious privacy leakage we found on real-world web databases which is caused by the ranking function design. Many such databases feature private attributes - e.g., a social network allows users to specify certain attributes as only visible to him/herself, but not to others. While these websites generally respect the privacy settings by not directly displaying private attribute values in search query answers, many of them nevertheless take into account such private attributes in the ranking function design. The conventional belief might be that tuple ranks alone are not enough to reveal the private attribute values. Our investigation, however, shows that this is not the case in reality. To address the problem, we introduce a taxonomy of the problem space with two dimensions, (1) the type of query interface and (2) the capability of adversaries. For each subspace, we develop a novel technique which either guarantees the successful inference of private attributes, or does so for a significant portion of real-world tuples. We demonstrate the effectiveness and efficiency of our techniques through theoretical analysis, extensive experiments over real-world datasets, as well as successful online attacks over websites with tens to hundreds of millions of users - e.g., Amazon Goodreads and Renren.com.
[ { "version": "v1", "created": "Thu, 6 Nov 2014 00:06:44 GMT" }, { "version": "v2", "created": "Tue, 11 Nov 2014 00:36:10 GMT" }, { "version": "v3", "created": "Mon, 2 Feb 2015 07:37:56 GMT" }, { "version": "v4", "created": "Mon, 6 Apr 2015 02:03:27 GMT" } ]
2015-04-07T00:00:00
[ [ "Rahman", "Md Farhadur", "" ], [ "Liu", "Weimo", "" ], [ "Thirumuruganathan", "Saravanan", "" ], [ "Zhang", "Nan", "" ], [ "Das", "Gautam", "" ] ]
TITLE: Rank-Based Inference over Web Databases ABSTRACT: In recent years, there has been much research in Ranked Retrieval model in structured databases, especially those in web databases. With this model, a search query returns top-k tuples according to not just exact matches of selection conditions, but a suitable ranking function. This paper studies a novel problem on the privacy implications of database ranking. The motivation is a novel yet serious privacy leakage we found on real-world web databases which is caused by the ranking function design. Many such databases feature private attributes - e.g., a social network allows users to specify certain attributes as only visible to him/herself, but not to others. While these websites generally respect the privacy settings by not directly displaying private attribute values in search query answers, many of them nevertheless take into account such private attributes in the ranking function design. The conventional belief might be that tuple ranks alone are not enough to reveal the private attribute values. Our investigation, however, shows that this is not the case in reality. To address the problem, we introduce a taxonomy of the problem space with two dimensions, (1) the type of query interface and (2) the capability of adversaries. For each subspace, we develop a novel technique which either guarantees the successful inference of private attributes, or does so for a significant portion of real-world tuples. We demonstrate the effectiveness and efficiency of our techniques through theoretical analysis, extensive experiments over real-world datasets, as well as successful online attacks over websites with tens to hundreds of millions of users - e.g., Amazon Goodreads and Renren.com.
no_new_dataset
0.946101
1504.00325
C. Lawrence Zitnick
Xinlei Chen, Hao Fang, Tsung-Yi Lin, Ramakrishna Vedantam, Saurabh Gupta, Piotr Dollar, C. Lawrence Zitnick
Microsoft COCO Captions: Data Collection and Evaluation Server
arXiv admin note: text overlap with arXiv:1411.4952
null
null
null
cs.CV cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we describe the Microsoft COCO Caption dataset and evaluation server. When completed, the dataset will contain over one and a half million captions describing over 330,000 images. For the training and validation images, five independent human generated captions will be provided. To ensure consistency in evaluation of automatic caption generation algorithms, an evaluation server is used. The evaluation server receives candidate captions and scores them using several popular metrics, including BLEU, METEOR, ROUGE and CIDEr. Instructions for using the evaluation server are provided.
[ { "version": "v1", "created": "Wed, 1 Apr 2015 18:13:43 GMT" }, { "version": "v2", "created": "Fri, 3 Apr 2015 20:21:16 GMT" } ]
2015-04-07T00:00:00
[ [ "Chen", "Xinlei", "" ], [ "Fang", "Hao", "" ], [ "Lin", "Tsung-Yi", "" ], [ "Vedantam", "Ramakrishna", "" ], [ "Gupta", "Saurabh", "" ], [ "Dollar", "Piotr", "" ], [ "Zitnick", "C. Lawrence", "" ] ]
TITLE: Microsoft COCO Captions: Data Collection and Evaluation Server ABSTRACT: In this paper we describe the Microsoft COCO Caption dataset and evaluation server. When completed, the dataset will contain over one and a half million captions describing over 330,000 images. For the training and validation images, five independent human generated captions will be provided. To ensure consistency in evaluation of automatic caption generation algorithms, an evaluation server is used. The evaluation server receives candidate captions and scores them using several popular metrics, including BLEU, METEOR, ROUGE and CIDEr. Instructions for using the evaluation server are provided.
no_new_dataset
0.939582
1504.01020
Arupratan Ray
Arupratan Ray (1), Debmalya Mandal (2), Y. Narahari (1) ((1) Department of Computer Science and Automation, Indian Institute of Science, Bangalore, India, (2) Harvard School of Engineering and Applied Sciences, Cambridge, MA)
Profit Maximizing Prior-free Multi-unit Procurement Auctions with Capacitated Sellers
16 pages, short version of the paper to be published in the Proceedings of International Conference on Autonomous Agents and Multiagent Systems 2015
null
null
null
cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we derive bounds for profit maximizing prior-free procurement auctions where a buyer wishes to procure multiple units of a homogeneous item from n sellers who are strategic about their per unit valuation. The buyer earns the profit by reselling these units in an external consumer market. The paper looks at three scenarios of increasing complexity. First, we look at unit capacity sellers where per unit valuation is private information of each seller and the revenue curve is concave. For this setting, we define two benchmarks. We show that no randomized prior free auction can be constant competitive against any of these two benchmarks. However, for a lightly constrained benchmark we design a prior-free auction PEPA (Profit Extracting Procurement Auction) which is 4-competitive and we show this bound is tight. Second, we study a setting where the sellers have non-unit capacities that are common knowledge and derive similar results. In particular, we propose a prior free auction PEPAC (Profit Extracting Procurement Auction with Capacity) which is truthful for any concave revenue curve. Third, we obtain results in the inherently harder bi-dimensional case where per unit valuation as well as capacities are private information of the sellers. We show that PEPAC is truthful and constant competitive for the specific case of linear revenue curves. We believe that this paper represents the first set of results on single dimensional and bi-dimensional profit maximizing prior-free multi-unit procurement auctions.
[ { "version": "v1", "created": "Sat, 4 Apr 2015 16:48:13 GMT" } ]
2015-04-07T00:00:00
[ [ "Ray", "Arupratan", "" ], [ "Mandal", "Debmalya", "" ], [ "Narahari", "Y.", "" ] ]
TITLE: Profit Maximizing Prior-free Multi-unit Procurement Auctions with Capacitated Sellers ABSTRACT: In this paper, we derive bounds for profit maximizing prior-free procurement auctions where a buyer wishes to procure multiple units of a homogeneous item from n sellers who are strategic about their per unit valuation. The buyer earns the profit by reselling these units in an external consumer market. The paper looks at three scenarios of increasing complexity. First, we look at unit capacity sellers where per unit valuation is private information of each seller and the revenue curve is concave. For this setting, we define two benchmarks. We show that no randomized prior free auction can be constant competitive against any of these two benchmarks. However, for a lightly constrained benchmark we design a prior-free auction PEPA (Profit Extracting Procurement Auction) which is 4-competitive and we show this bound is tight. Second, we study a setting where the sellers have non-unit capacities that are common knowledge and derive similar results. In particular, we propose a prior free auction PEPAC (Profit Extracting Procurement Auction with Capacity) which is truthful for any concave revenue curve. Third, we obtain results in the inherently harder bi-dimensional case where per unit valuation as well as capacities are private information of the sellers. We show that PEPAC is truthful and constant competitive for the specific case of linear revenue curves. We believe that this paper represents the first set of results on single dimensional and bi-dimensional profit maximizing prior-free multi-unit procurement auctions.
no_new_dataset
0.941922
1504.01142
Nam-phuong Nguyen
Nam-phuong Nguyen, Siavash Mirarab, Keerthana Kumar, Tandy Warnow
Ultra-large alignments using Phylogeny-aware Profiles
Online supplemental materials and data are available at http://www.cs.utexas.edu/users/phylo/software/upp/
null
null
null
q-bio.GN cs.CE cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Many biological questions, including the estimation of deep evolutionary histories and the detection of remote homology between protein sequences, rely upon multiple sequence alignments (MSAs) and phylogenetic trees of large datasets. However, accurate large-scale multiple sequence alignment is very difficult, especially when the dataset contains fragmentary sequences. We present UPP, an MSA method that uses a new machine learning technique - the Ensemble of Hidden Markov Models - that we propose here. UPP produces highly accurate alignments for both nucleotide and amino acid sequences, even on ultra-large datasets or datasets containing fragmentary sequences. UPP is available at https://github.com/smirarab/sepp.
[ { "version": "v1", "created": "Sun, 5 Apr 2015 17:15:38 GMT" } ]
2015-04-07T00:00:00
[ [ "Nguyen", "Nam-phuong", "" ], [ "Mirarab", "Siavash", "" ], [ "Kumar", "Keerthana", "" ], [ "Warnow", "Tandy", "" ] ]
TITLE: Ultra-large alignments using Phylogeny-aware Profiles ABSTRACT: Many biological questions, including the estimation of deep evolutionary histories and the detection of remote homology between protein sequences, rely upon multiple sequence alignments (MSAs) and phylogenetic trees of large datasets. However, accurate large-scale multiple sequence alignment is very difficult, especially when the dataset contains fragmentary sequences. We present UPP, an MSA method that uses a new machine learning technique - the Ensemble of Hidden Markov Models - that we propose here. UPP produces highly accurate alignments for both nucleotide and amino acid sequences, even on ultra-large datasets or datasets containing fragmentary sequences. UPP is available at https://github.com/smirarab/sepp.
no_new_dataset
0.951997
1504.01220
Xiaodan Liang
Si Liu and Xiaodan Liang and Luoqi Liu and Xiaohui Shen and Jianchao Yang and Changsheng Xu and Liang Lin and Xiaochun Cao and Shuicheng Yan
Matching-CNN Meets KNN: Quasi-Parametric Human Parsing
This manuscript is the accepted version for CVPR 2015
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Both parametric and non-parametric approaches have demonstrated encouraging performances in the human parsing task, namely segmenting a human image into several semantic regions (e.g., hat, bag, left arm, face). In this work, we aim to develop a new solution with the advantages of both methodologies, namely supervision from annotated data and the flexibility to use newly annotated (possibly uncommon) images, and present a quasi-parametric human parsing model. Under the classic K Nearest Neighbor (KNN)-based nonparametric framework, the parametric Matching Convolutional Neural Network (M-CNN) is proposed to predict the matching confidence and displacements of the best matched region in the testing image for a particular semantic region in one KNN image. Given a testing image, we first retrieve its KNN images from the annotated/manually-parsed human image corpus. Then each semantic region in each KNN image is matched with confidence to the testing image using M-CNN, and the matched regions from all KNN images are further fused, followed by a superpixel smoothing procedure to obtain the ultimate human parsing result. The M-CNN differs from the classic CNN in that the tailored cross image matching filters are introduced to characterize the matching between the testing image and the semantic region of a KNN image. The cross image matching filters are defined at different convolutional layers, each aiming to capture a particular range of displacements. Comprehensive evaluations over a large dataset with 7,700 annotated human images well demonstrate the significant performance gain from the quasi-parametric model over the state-of-the-arts, for the human parsing task.
[ { "version": "v1", "created": "Mon, 6 Apr 2015 07:20:02 GMT" } ]
2015-04-07T00:00:00
[ [ "Liu", "Si", "" ], [ "Liang", "Xiaodan", "" ], [ "Liu", "Luoqi", "" ], [ "Shen", "Xiaohui", "" ], [ "Yang", "Jianchao", "" ], [ "Xu", "Changsheng", "" ], [ "Lin", "Liang", "" ], [ "Cao", "Xiaochun", "" ], [ "Yan", "Shuicheng", "" ] ]
TITLE: Matching-CNN Meets KNN: Quasi-Parametric Human Parsing ABSTRACT: Both parametric and non-parametric approaches have demonstrated encouraging performances in the human parsing task, namely segmenting a human image into several semantic regions (e.g., hat, bag, left arm, face). In this work, we aim to develop a new solution with the advantages of both methodologies, namely supervision from annotated data and the flexibility to use newly annotated (possibly uncommon) images, and present a quasi-parametric human parsing model. Under the classic K Nearest Neighbor (KNN)-based nonparametric framework, the parametric Matching Convolutional Neural Network (M-CNN) is proposed to predict the matching confidence and displacements of the best matched region in the testing image for a particular semantic region in one KNN image. Given a testing image, we first retrieve its KNN images from the annotated/manually-parsed human image corpus. Then each semantic region in each KNN image is matched with confidence to the testing image using M-CNN, and the matched regions from all KNN images are further fused, followed by a superpixel smoothing procedure to obtain the ultimate human parsing result. The M-CNN differs from the classic CNN in that the tailored cross image matching filters are introduced to characterize the matching between the testing image and the semantic region of a KNN image. The cross image matching filters are defined at different convolutional layers, each aiming to capture a particular range of displacements. Comprehensive evaluations over a large dataset with 7,700 annotated human images well demonstrate the significant performance gain from the quasi-parametric model over the state-of-the-arts, for the human parsing task.
no_new_dataset
0.951097
1504.01304
Yuzhen Ye
Yuzhen Ye and Haixu Tang
Utilizing de Bruijn graph of metagenome assembly for metatranscriptome analysis
8 pages, 4 figures, accepted in RECOMB-Seq 2015, under consideration in Bioinformatics (a special issue for RECOMB-Seq/CBB)
null
null
null
q-bio.GN cs.CE cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Metagenomics research has accelerated the studies of microbial organisms, providing insights into the composition and potential functionality of various microbial communities. Metatranscriptomics (studies of the transcripts from a mixture of microbial species) and other meta-omics approaches hold even greater promise for providing additional insights into functional and regulatory characteristics of the microbial communities. Current metatranscriptomics projects are often carried out without matched metagenomic datasets (of the same microbial communities). For the projects that produce both metatranscriptomic and metagenomic datasets, their analyses are often not integrated. Metagenome assemblies are far from perfect, partially explaining why metagenome assemblies are not used for the analysis of metatranscriptomic datasets. Here we report a reads mapping algorithm for mapping of short reads onto a de Bruijn graph of assemblies. A hash table of junction k-mers (k-mers spanning branching structures in the de Bruijn graph) is used to facilitate fast mapping of reads to the graph. We developed an application of this mapping algorithm: a reference based approach to metatranscriptome assembly using graphs of metagenome assembly as the reference. Our results show that this new approach (called TAG) helps to assemble substantially more transcripts that otherwise would have been missed or truncated because of the fragmented nature of the reference metagenome. TAG was implemented in C++ and has been tested extensively on the linux platform. It is available for download as open source at http://omics.informatics.indiana.edu/TAG.
[ { "version": "v1", "created": "Mon, 6 Apr 2015 15:17:29 GMT" } ]
2015-04-07T00:00:00
[ [ "Ye", "Yuzhen", "" ], [ "Tang", "Haixu", "" ] ]
TITLE: Utilizing de Bruijn graph of metagenome assembly for metatranscriptome analysis ABSTRACT: Metagenomics research has accelerated the studies of microbial organisms, providing insights into the composition and potential functionality of various microbial communities. Metatranscriptomics (studies of the transcripts from a mixture of microbial species) and other meta-omics approaches hold even greater promise for providing additional insights into functional and regulatory characteristics of the microbial communities. Current metatranscriptomics projects are often carried out without matched metagenomic datasets (of the same microbial communities). For the projects that produce both metatranscriptomic and metagenomic datasets, their analyses are often not integrated. Metagenome assemblies are far from perfect, partially explaining why metagenome assemblies are not used for the analysis of metatranscriptomic datasets. Here we report a reads mapping algorithm for mapping of short reads onto a de Bruijn graph of assemblies. A hash table of junction k-mers (k-mers spanning branching structures in the de Bruijn graph) is used to facilitate fast mapping of reads to the graph. We developed an application of this mapping algorithm: a reference based approach to metatranscriptome assembly using graphs of metagenome assembly as the reference. Our results show that this new approach (called TAG) helps to assemble substantially more transcripts that otherwise would have been missed or truncated because of the fragmented nature of the reference metagenome. TAG was implemented in C++ and has been tested extensively on the linux platform. It is available for download as open source at http://omics.informatics.indiana.edu/TAG.
no_new_dataset
0.944382
1412.1897
Anh Nguyen
Anh Nguyen, Jason Yosinski, Jeff Clune
Deep Neural Networks are Easily Fooled: High Confidence Predictions for Unrecognizable Images
To appear at CVPR 2015
null
null
null
cs.CV cs.AI cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Deep neural networks (DNNs) have recently been achieving state-of-the-art performance on a variety of pattern-recognition tasks, most notably visual classification problems. Given that DNNs are now able to classify objects in images with near-human-level performance, questions naturally arise as to what differences remain between computer and human vision. A recent study revealed that changing an image (e.g. of a lion) in a way imperceptible to humans can cause a DNN to label the image as something else entirely (e.g. mislabeling a lion a library). Here we show a related result: it is easy to produce images that are completely unrecognizable to humans, but that state-of-the-art DNNs believe to be recognizable objects with 99.99% confidence (e.g. labeling with certainty that white noise static is a lion). Specifically, we take convolutional neural networks trained to perform well on either the ImageNet or MNIST datasets and then find images with evolutionary algorithms or gradient ascent that DNNs label with high confidence as belonging to each dataset class. It is possible to produce images totally unrecognizable to human eyes that DNNs believe with near certainty are familiar objects, which we call "fooling images" (more generally, fooling examples). Our results shed light on interesting differences between human vision and current DNNs, and raise questions about the generality of DNN computer vision.
[ { "version": "v1", "created": "Fri, 5 Dec 2014 05:29:43 GMT" }, { "version": "v2", "created": "Thu, 18 Dec 2014 22:27:00 GMT" }, { "version": "v3", "created": "Tue, 3 Mar 2015 16:41:04 GMT" }, { "version": "v4", "created": "Thu, 2 Apr 2015 23:12:56 GMT" } ]
2015-04-06T00:00:00
[ [ "Nguyen", "Anh", "" ], [ "Yosinski", "Jason", "" ], [ "Clune", "Jeff", "" ] ]
TITLE: Deep Neural Networks are Easily Fooled: High Confidence Predictions for Unrecognizable Images ABSTRACT: Deep neural networks (DNNs) have recently been achieving state-of-the-art performance on a variety of pattern-recognition tasks, most notably visual classification problems. Given that DNNs are now able to classify objects in images with near-human-level performance, questions naturally arise as to what differences remain between computer and human vision. A recent study revealed that changing an image (e.g. of a lion) in a way imperceptible to humans can cause a DNN to label the image as something else entirely (e.g. mislabeling a lion a library). Here we show a related result: it is easy to produce images that are completely unrecognizable to humans, but that state-of-the-art DNNs believe to be recognizable objects with 99.99% confidence (e.g. labeling with certainty that white noise static is a lion). Specifically, we take convolutional neural networks trained to perform well on either the ImageNet or MNIST datasets and then find images with evolutionary algorithms or gradient ascent that DNNs label with high confidence as belonging to each dataset class. It is possible to produce images totally unrecognizable to human eyes that DNNs believe with near certainty are familiar objects, which we call "fooling images" (more generally, fooling examples). Our results shed light on interesting differences between human vision and current DNNs, and raise questions about the generality of DNN computer vision.
no_new_dataset
0.939692