id
large_stringlengths 9
16
| submitter
large_stringlengths 3
64
⌀ | authors
large_stringlengths 5
20.7k
| title
large_stringlengths 5
245
| comments
large_stringlengths 1
482
⌀ | journal-ref
large_stringlengths 4
382
⌀ | doi
large_stringlengths 9
151
⌀ | report-no
large_stringlengths 2
509
⌀ | categories
large_stringlengths 5
78
| license
large_stringclasses 9
values | abstract
large_stringlengths 83
3.55k
| versions
large listlengths 1
21
| update_date
timestamp[ms]date 2007-05-23 00:00:00
2025-04-25 00:00:00
| authors_parsed
large listlengths 1
1.35k
| prompt
large_stringlengths 166
3.64k
| label
stringclasses 2
values | prob
float64 0.5
0.98
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1208.2547 | Lexing Xie | Yanxiang Wang, Hari Sundaram, Lexing Xie | Social Event Detection with Interaction Graph Modeling | ACM Multimedia 2012 | null | null | null | cs.SI cs.IR cs.MM physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper focuses on detecting social, physical-world events from photos
posted on social media sites. The problem is important: cheap media capture
devices have significantly increased the number of photos shared on these
sites. The main contribution of this paper is to incorporate online social
interaction features in the detection of physical events. We believe that
online social interaction reflect important signals among the participants on
the "social affinity" of two photos, thereby helping event detection. We
compute social affinity via a random-walk on a social interaction graph to
determine similarity between two photos on the graph. We train a support vector
machine classifier to combine the social affinity between photos and
photo-centric metadata including time, location, tags and description.
Incremental clustering is then used to group photos to event clusters. We have
very good results on two large scale real-world datasets: Upcoming and
MediaEval. We show an improvement between 0.06-0.10 in F1 on these datasets.
| [
{
"version": "v1",
"created": "Mon, 13 Aug 2012 11:20:05 GMT"
}
] | 2015-03-20T00:00:00 | [
[
"Wang",
"Yanxiang",
""
],
[
"Sundaram",
"Hari",
""
],
[
"Xie",
"Lexing",
""
]
] | TITLE: Social Event Detection with Interaction Graph Modeling
ABSTRACT: This paper focuses on detecting social, physical-world events from photos
posted on social media sites. The problem is important: cheap media capture
devices have significantly increased the number of photos shared on these
sites. The main contribution of this paper is to incorporate online social
interaction features in the detection of physical events. We believe that
online social interaction reflect important signals among the participants on
the "social affinity" of two photos, thereby helping event detection. We
compute social affinity via a random-walk on a social interaction graph to
determine similarity between two photos on the graph. We train a support vector
machine classifier to combine the social affinity between photos and
photo-centric metadata including time, location, tags and description.
Incremental clustering is then used to group photos to event clusters. We have
very good results on two large scale real-world datasets: Upcoming and
MediaEval. We show an improvement between 0.06-0.10 in F1 on these datasets.
| no_new_dataset | 0.950503 |
1208.3687 | Qiang Qiu | Qiang Qiu, Vishal M. Patel, Rama Chellappa | Information-theoretic Dictionary Learning for Image Classification | null | null | null | null | cs.CV cs.IT math.IT stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present a two-stage approach for learning dictionaries for object
classification tasks based on the principle of information maximization. The
proposed method seeks a dictionary that is compact, discriminative, and
generative. In the first stage, dictionary atoms are selected from an initial
dictionary by maximizing the mutual information measure on dictionary
compactness, discrimination and reconstruction. In the second stage, the
selected dictionary atoms are updated for improved reconstructive and
discriminative power using a simple gradient ascent algorithm on mutual
information. Experiments using real datasets demonstrate the effectiveness of
our approach for image classification tasks.
| [
{
"version": "v1",
"created": "Fri, 17 Aug 2012 20:38:56 GMT"
}
] | 2015-03-20T00:00:00 | [
[
"Qiu",
"Qiang",
""
],
[
"Patel",
"Vishal M.",
""
],
[
"Chellappa",
"Rama",
""
]
] | TITLE: Information-theoretic Dictionary Learning for Image Classification
ABSTRACT: We present a two-stage approach for learning dictionaries for object
classification tasks based on the principle of information maximization. The
proposed method seeks a dictionary that is compact, discriminative, and
generative. In the first stage, dictionary atoms are selected from an initial
dictionary by maximizing the mutual information measure on dictionary
compactness, discrimination and reconstruction. In the second stage, the
selected dictionary atoms are updated for improved reconstructive and
discriminative power using a simple gradient ascent algorithm on mutual
information. Experiments using real datasets demonstrate the effectiveness of
our approach for image classification tasks.
| no_new_dataset | 0.951233 |
1208.4434 | Roman Vetter | Roman Vetter, Norbert Stoop, Thomas Jenni, Falk K. Wittel, Hans J.
Herrmann | Subdivision Shell Elements with Anisotropic Growth | 20 pages, 12 figures, 1 table | Int. J. Numer. Meth. Eng. 95, 791-810 (2013) | 10.1002/nme.4536 | null | cs.NA cs.CE physics.comp-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A thin shell finite element approach based on Loop's subdivision surfaces is
proposed, capable of dealing with large deformations and anisotropic growth. To
this end, the Kirchhoff-Love theory of thin shells is derived and extended to
allow for arbitrary in-plane growth. The simplicity and computational
efficiency of the subdivision thin shell elements is outstanding, which is
demonstrated on a few standard loading benchmarks. With this powerful tool at
hand, we demonstrate the broad range of possible applications by numerical
solution of several growth scenarios, ranging from the uniform growth of a
sphere, to boundary instabilities induced by large anisotropic growth. Finally,
it is shown that the problem of a slowly and uniformly growing sheet confined
in a fixed hollow sphere is equivalent to the inverse process where a sheet of
fixed size is slowly crumpled in a shrinking hollow sphere in the frictionless,
quasi-static, elastic limit.
| [
{
"version": "v1",
"created": "Wed, 22 Aug 2012 07:18:44 GMT"
},
{
"version": "v2",
"created": "Wed, 27 Mar 2013 17:14:45 GMT"
}
] | 2015-03-20T00:00:00 | [
[
"Vetter",
"Roman",
""
],
[
"Stoop",
"Norbert",
""
],
[
"Jenni",
"Thomas",
""
],
[
"Wittel",
"Falk K.",
""
],
[
"Herrmann",
"Hans J.",
""
]
] | TITLE: Subdivision Shell Elements with Anisotropic Growth
ABSTRACT: A thin shell finite element approach based on Loop's subdivision surfaces is
proposed, capable of dealing with large deformations and anisotropic growth. To
this end, the Kirchhoff-Love theory of thin shells is derived and extended to
allow for arbitrary in-plane growth. The simplicity and computational
efficiency of the subdivision thin shell elements is outstanding, which is
demonstrated on a few standard loading benchmarks. With this powerful tool at
hand, we demonstrate the broad range of possible applications by numerical
solution of several growth scenarios, ranging from the uniform growth of a
sphere, to boundary instabilities induced by large anisotropic growth. Finally,
it is shown that the problem of a slowly and uniformly growing sheet confined
in a fixed hollow sphere is equivalent to the inverse process where a sheet of
fixed size is slowly crumpled in a shrinking hollow sphere in the frictionless,
quasi-static, elastic limit.
| no_new_dataset | 0.949576 |
1208.4773 | Tobias Jung | Tobias Jung, Louis Wehenkel, Damien Ernst, Francis Maes | Optimized Look-Ahead Tree Policies: A Bridge Between Look-Ahead Tree
Policies and Direct Policy Search | In Submission | null | null | null | cs.SY cs.AI cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Direct policy search (DPS) and look-ahead tree (LT) policies are two widely
used classes of techniques to produce high performance policies for sequential
decision-making problems. To make DPS approaches work well, one crucial issue
is to select an appropriate space of parameterized policies with respect to the
targeted problem. A fundamental issue in LT approaches is that, to take good
decisions, such policies must develop very large look-ahead trees which may
require excessive online computational resources. In this paper, we propose a
new hybrid policy learning scheme that lies at the intersection of DPS and LT,
in which the policy is an algorithm that develops a small look-ahead tree in a
directed way, guided by a node scoring function that is learned through DPS.
The LT-based representation is shown to be a versatile way of representing
policies in a DPS scheme, while at the same time, DPS enables to significantly
reduce the size of the look-ahead trees that are required to take high-quality
decisions.
We experimentally compare our method with two other state-of-the-art DPS
techniques and four common LT policies on four benchmark domains and show that
it combines the advantages of the two techniques from which it originates. In
particular, we show that our method: (1) produces overall better performing
policies than both pure DPS and pure LT policies, (2) requires a substantially
smaller number of policy evaluations than other DPS techniques, (3) is easy to
tune and (4) results in policies that are quite robust with respect to
perturbations of the initial conditions.
| [
{
"version": "v1",
"created": "Thu, 23 Aug 2012 14:48:52 GMT"
}
] | 2015-03-20T00:00:00 | [
[
"Jung",
"Tobias",
""
],
[
"Wehenkel",
"Louis",
""
],
[
"Ernst",
"Damien",
""
],
[
"Maes",
"Francis",
""
]
] | TITLE: Optimized Look-Ahead Tree Policies: A Bridge Between Look-Ahead Tree
Policies and Direct Policy Search
ABSTRACT: Direct policy search (DPS) and look-ahead tree (LT) policies are two widely
used classes of techniques to produce high performance policies for sequential
decision-making problems. To make DPS approaches work well, one crucial issue
is to select an appropriate space of parameterized policies with respect to the
targeted problem. A fundamental issue in LT approaches is that, to take good
decisions, such policies must develop very large look-ahead trees which may
require excessive online computational resources. In this paper, we propose a
new hybrid policy learning scheme that lies at the intersection of DPS and LT,
in which the policy is an algorithm that develops a small look-ahead tree in a
directed way, guided by a node scoring function that is learned through DPS.
The LT-based representation is shown to be a versatile way of representing
policies in a DPS scheme, while at the same time, DPS enables to significantly
reduce the size of the look-ahead trees that are required to take high-quality
decisions.
We experimentally compare our method with two other state-of-the-art DPS
techniques and four common LT policies on four benchmark domains and show that
it combines the advantages of the two techniques from which it originates. In
particular, we show that our method: (1) produces overall better performing
policies than both pure DPS and pure LT policies, (2) requires a substantially
smaller number of policy evaluations than other DPS techniques, (3) is easy to
tune and (4) results in policies that are quite robust with respect to
perturbations of the initial conditions.
| no_new_dataset | 0.945096 |
1312.1431 | Miles Lubin | Miles Lubin and Iain Dunning | Computing in Operations Research using Julia | Source code included in supplement | null | 10.1287/ijoc.2014.0623 | null | math.OC cs.NA cs.PL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The state of numerical computing is currently characterized by a divide
between highly efficient yet typically cumbersome low-level languages such as
C, C++, and Fortran and highly expressive yet typically slow high-level
languages such as Python and MATLAB. This paper explores how Julia, a modern
programming language for numerical computing which claims to bridge this divide
by incorporating recent advances in language and compiler design (such as
just-in-time compilation), can be used for implementing software and algorithms
fundamental to the field of operations research, with a focus on mathematical
optimization. In particular, we demonstrate algebraic modeling for linear and
nonlinear optimization and a partial implementation of a practical simplex
code. Extensive cross-language benchmarks suggest that Julia is capable of
obtaining state-of-the-art performance.
| [
{
"version": "v1",
"created": "Thu, 5 Dec 2013 04:29:20 GMT"
}
] | 2015-03-20T00:00:00 | [
[
"Lubin",
"Miles",
""
],
[
"Dunning",
"Iain",
""
]
] | TITLE: Computing in Operations Research using Julia
ABSTRACT: The state of numerical computing is currently characterized by a divide
between highly efficient yet typically cumbersome low-level languages such as
C, C++, and Fortran and highly expressive yet typically slow high-level
languages such as Python and MATLAB. This paper explores how Julia, a modern
programming language for numerical computing which claims to bridge this divide
by incorporating recent advances in language and compiler design (such as
just-in-time compilation), can be used for implementing software and algorithms
fundamental to the field of operations research, with a focus on mathematical
optimization. In particular, we demonstrate algebraic modeling for linear and
nonlinear optimization and a partial implementation of a practical simplex
code. Extensive cross-language benchmarks suggest that Julia is capable of
obtaining state-of-the-art performance.
| no_new_dataset | 0.938181 |
1503.05784 | Alfredo Cobo | Alfredo Cobo, Denis Parra, Jaime Nav\'on | Identifying Relevant Messages in a Twitter-based Citizen Channel for
Natural Disaster Situations | null | null | null | null | cs.SI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | During recent years the online social networks (in particular Twitter) have
become an important alternative information channel to traditional media during
natural disasters, but the amount and diversity of messages poses the challenge
of information overload to end users. The goal of our research is to develop an
automatic classifier of tweets to feed a mobile application that reduces the
difficulties that citizens face to get relevant information during natural
disasters. In this paper, we present in detail the process to build a
classifier that filters tweets relevant and non-relevant to an earthquake. By
using a dataset from the Chilean earthquake of 2010, we first build and
validate a ground truth, and then we contribute by presenting in detail the
effect of class imbalance and dimensionality reduction over 5 classifiers. We
show how the performance of these models is affected by these variables,
providing important considerations at the moment of building these systems.
| [
{
"version": "v1",
"created": "Wed, 18 Mar 2015 14:10:10 GMT"
}
] | 2015-03-20T00:00:00 | [
[
"Cobo",
"Alfredo",
""
],
[
"Parra",
"Denis",
""
],
[
"Navón",
"Jaime",
""
]
] | TITLE: Identifying Relevant Messages in a Twitter-based Citizen Channel for
Natural Disaster Situations
ABSTRACT: During recent years the online social networks (in particular Twitter) have
become an important alternative information channel to traditional media during
natural disasters, but the amount and diversity of messages poses the challenge
of information overload to end users. The goal of our research is to develop an
automatic classifier of tweets to feed a mobile application that reduces the
difficulties that citizens face to get relevant information during natural
disasters. In this paper, we present in detail the process to build a
classifier that filters tweets relevant and non-relevant to an earthquake. By
using a dataset from the Chilean earthquake of 2010, we first build and
validate a ground truth, and then we contribute by presenting in detail the
effect of class imbalance and dimensionality reduction over 5 classifiers. We
show how the performance of these models is affected by these variables,
providing important considerations at the moment of building these systems.
| no_new_dataset | 0.955693 |
1102.4374 | Benjamin Rubinstein | Arvind Narayanan, Elaine Shi, Benjamin I. P. Rubinstein | Link Prediction by De-anonymization: How We Won the Kaggle Social
Network Challenge | 11 pages, 13 figures; submitted to IJCNN'2011 | null | null | null | cs.CR cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper describes the winning entry to the IJCNN 2011 Social Network
Challenge run by Kaggle.com. The goal of the contest was to promote research on
real-world link prediction, and the dataset was a graph obtained by crawling
the popular Flickr social photo sharing website, with user identities scrubbed.
By de-anonymizing much of the competition test set using our own Flickr crawl,
we were able to effectively game the competition. Our attack represents a new
application of de-anonymization to gaming machine learning contests, suggesting
changes in how future competitions should be run.
We introduce a new simulated annealing-based weighted graph matching
algorithm for the seeding step of de-anonymization. We also show how to combine
de-anonymization with link prediction---the latter is required to achieve good
performance on the portion of the test set not de-anonymized---for example by
training the predictor on the de-anonymized portion of the test set, and
combining probabilistic predictions from de-anonymization and link prediction.
| [
{
"version": "v1",
"created": "Tue, 22 Feb 2011 00:11:14 GMT"
}
] | 2015-03-19T00:00:00 | [
[
"Narayanan",
"Arvind",
""
],
[
"Shi",
"Elaine",
""
],
[
"Rubinstein",
"Benjamin I. P.",
""
]
] | TITLE: Link Prediction by De-anonymization: How We Won the Kaggle Social
Network Challenge
ABSTRACT: This paper describes the winning entry to the IJCNN 2011 Social Network
Challenge run by Kaggle.com. The goal of the contest was to promote research on
real-world link prediction, and the dataset was a graph obtained by crawling
the popular Flickr social photo sharing website, with user identities scrubbed.
By de-anonymizing much of the competition test set using our own Flickr crawl,
we were able to effectively game the competition. Our attack represents a new
application of de-anonymization to gaming machine learning contests, suggesting
changes in how future competitions should be run.
We introduce a new simulated annealing-based weighted graph matching
algorithm for the seeding step of de-anonymization. We also show how to combine
de-anonymization with link prediction---the latter is required to achieve good
performance on the portion of the test set not de-anonymized---for example by
training the predictor on the de-anonymized portion of the test set, and
combining probabilistic predictions from de-anonymization and link prediction.
| no_new_dataset | 0.942771 |
1103.1013 | Qi Mao | Qi Mao, Ivor W. Tsang | A Feature Selection Method for Multivariate Performance Measures | null | IEEE Transactions on Pattern Analysis and Machine Intelligence,
2012 | 10.1109/TPAMI.2012.266 | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Feature selection with specific multivariate performance measures is the key
to the success of many applications, such as image retrieval and text
classification. The existing feature selection methods are usually designed for
classification error. In this paper, we propose a generalized sparse
regularizer. Based on the proposed regularizer, we present a unified feature
selection framework for general loss functions. In particular, we study the
novel feature selection paradigm by optimizing multivariate performance
measures. The resultant formulation is a challenging problem for
high-dimensional data. Hence, a two-layer cutting plane algorithm is proposed
to solve this problem, and the convergence is presented. In addition, we adapt
the proposed method to optimize multivariate measures for multiple instance
learning problems. The analyses by comparing with the state-of-the-art feature
selection methods show that the proposed method is superior to others.
Extensive experiments on large-scale and high-dimensional real world datasets
show that the proposed method outperforms $l_1$-SVM and SVM-RFE when choosing a
small subset of features, and achieves significantly improved performances over
SVM$^{perf}$ in terms of $F_1$-score.
| [
{
"version": "v1",
"created": "Sat, 5 Mar 2011 07:10:41 GMT"
},
{
"version": "v2",
"created": "Sat, 4 May 2013 14:48:06 GMT"
}
] | 2015-03-19T00:00:00 | [
[
"Mao",
"Qi",
""
],
[
"Tsang",
"Ivor W.",
""
]
] | TITLE: A Feature Selection Method for Multivariate Performance Measures
ABSTRACT: Feature selection with specific multivariate performance measures is the key
to the success of many applications, such as image retrieval and text
classification. The existing feature selection methods are usually designed for
classification error. In this paper, we propose a generalized sparse
regularizer. Based on the proposed regularizer, we present a unified feature
selection framework for general loss functions. In particular, we study the
novel feature selection paradigm by optimizing multivariate performance
measures. The resultant formulation is a challenging problem for
high-dimensional data. Hence, a two-layer cutting plane algorithm is proposed
to solve this problem, and the convergence is presented. In addition, we adapt
the proposed method to optimize multivariate measures for multiple instance
learning problems. The analyses by comparing with the state-of-the-art feature
selection methods show that the proposed method is superior to others.
Extensive experiments on large-scale and high-dimensional real world datasets
show that the proposed method outperforms $l_1$-SVM and SVM-RFE when choosing a
small subset of features, and achieves significantly improved performances over
SVM$^{perf}$ in terms of $F_1$-score.
| no_new_dataset | 0.945298 |
1103.2215 | Xin Liu | Xin Liu and Anwitaman Datta and Krzysztof Rzadca | Trust beyond reputation: A computational trust model based on
stereotypes | null | null | null | null | cs.CR cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Models of computational trust support users in taking decisions. They are
commonly used to guide users' judgements in online auction sites; or to
determine quality of contributions in Web 2.0 sites. However, most existing
systems require historical information about the past behavior of the specific
agent being judged. In contrast, in real life, to anticipate and to predict a
stranger's actions in absence of the knowledge of such behavioral history, we
often use our "instinct"- essentially stereotypes developed from our past
interactions with other "similar" persons. In this paper, we propose
StereoTrust, a computational trust model inspired by stereotypes as used in
real-life. A stereotype contains certain features of agents and an expected
outcome of the transaction. When facing a stranger, an agent derives its trust
by aggregating stereotypes matching the stranger's profile. Since stereotypes
are formed locally, recommendations stem from the trustor's own personal
experiences and perspective. Historical behavioral information, when available,
can be used to refine the analysis. According to our experiments using
Epinions.com dataset, StereoTrust compares favorably with existing trust models
that use different kinds of information and more complete historical
information.
| [
{
"version": "v1",
"created": "Fri, 11 Mar 2011 08:15:07 GMT"
},
{
"version": "v2",
"created": "Thu, 5 May 2011 03:50:46 GMT"
},
{
"version": "v3",
"created": "Sun, 15 Jul 2012 14:07:02 GMT"
}
] | 2015-03-19T00:00:00 | [
[
"Liu",
"Xin",
""
],
[
"Datta",
"Anwitaman",
""
],
[
"Rzadca",
"Krzysztof",
""
]
] | TITLE: Trust beyond reputation: A computational trust model based on
stereotypes
ABSTRACT: Models of computational trust support users in taking decisions. They are
commonly used to guide users' judgements in online auction sites; or to
determine quality of contributions in Web 2.0 sites. However, most existing
systems require historical information about the past behavior of the specific
agent being judged. In contrast, in real life, to anticipate and to predict a
stranger's actions in absence of the knowledge of such behavioral history, we
often use our "instinct"- essentially stereotypes developed from our past
interactions with other "similar" persons. In this paper, we propose
StereoTrust, a computational trust model inspired by stereotypes as used in
real-life. A stereotype contains certain features of agents and an expected
outcome of the transaction. When facing a stranger, an agent derives its trust
by aggregating stereotypes matching the stranger's profile. Since stereotypes
are formed locally, recommendations stem from the trustor's own personal
experiences and perspective. Historical behavioral information, when available,
can be used to refine the analysis. According to our experiments using
Epinions.com dataset, StereoTrust compares favorably with existing trust models
that use different kinds of information and more complete historical
information.
| no_new_dataset | 0.945197 |
1103.3225 | Lars Bergstrom | Lars Bergstrom | Measuring NUMA effects with the STREAM benchmark | null | null | null | null | cs.PF | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Modern high-end machines feature multiple processor packages, each of which
contains multiple independent cores and integrated memory controllers connected
directly to dedicated physical RAM. These packages are connected via a shared
bus, creating a system with a heterogeneous memory hierarchy. Since this shared
bus has less bandwidth than the sum of the links to memory, aggregate memory
bandwidth is higher when parallel threads all access memory local to their
processor package than when they access memory attached to a remote package.
But, the impact of this heterogeneous memory architecture is not easily
understood from vendor benchmarks. Even where these measurements are available,
they provide only best-case memory throughput. This work presents a series of
modifications to the well-known STREAM benchmark to measure the effects of NUMA
on both a 48-core AMD Opteron machine and a 32-core Intel Xeon machine.
| [
{
"version": "v1",
"created": "Wed, 16 Mar 2011 16:37:49 GMT"
}
] | 2015-03-19T00:00:00 | [
[
"Bergstrom",
"Lars",
""
]
] | TITLE: Measuring NUMA effects with the STREAM benchmark
ABSTRACT: Modern high-end machines feature multiple processor packages, each of which
contains multiple independent cores and integrated memory controllers connected
directly to dedicated physical RAM. These packages are connected via a shared
bus, creating a system with a heterogeneous memory hierarchy. Since this shared
bus has less bandwidth than the sum of the links to memory, aggregate memory
bandwidth is higher when parallel threads all access memory local to their
processor package than when they access memory attached to a remote package.
But, the impact of this heterogeneous memory architecture is not easily
understood from vendor benchmarks. Even where these measurements are available,
they provide only best-case memory throughput. This work presents a series of
modifications to the well-known STREAM benchmark to measure the effects of NUMA
on both a 48-core AMD Opteron machine and a 32-core Intel Xeon machine.
| no_new_dataset | 0.9357 |
1104.1472 | X.P. Xu | Xiaopeng Xu, Xiaochun Zhang | Gaussian Affine Feature Detector | A paper about two dimension image signal detection, including
position, length, width, height, orentation | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A new method is proposed to get image features' geometric information. Using
Gaussian as an input signal, a theoretical optimal solution to calculate
feature's affine shape is proposed. Based on analytic result of a feature
model, the method is different from conventional iterative approaches. From the
model, feature's parameters such as position, orientation, background
luminance, contrast, area and aspect ratio can be extracted. Tested with
synthesized and benchmark data, the method achieves or outperforms existing
approaches in term of accuracy, speed and stability. The method can detect
small, long or thin objects precisely, and works well under general conditions,
such as for low contrast, blurred or noisy images.
| [
{
"version": "v1",
"created": "Fri, 8 Apr 2011 03:15:43 GMT"
}
] | 2015-03-19T00:00:00 | [
[
"Xu",
"Xiaopeng",
""
],
[
"Zhang",
"Xiaochun",
""
]
] | TITLE: Gaussian Affine Feature Detector
ABSTRACT: A new method is proposed to get image features' geometric information. Using
Gaussian as an input signal, a theoretical optimal solution to calculate
feature's affine shape is proposed. Based on analytic result of a feature
model, the method is different from conventional iterative approaches. From the
model, feature's parameters such as position, orientation, background
luminance, contrast, area and aspect ratio can be extracted. Tested with
synthesized and benchmark data, the method achieves or outperforms existing
approaches in term of accuracy, speed and stability. The method can detect
small, long or thin objects precisely, and works well under general conditions,
such as for low contrast, blurred or noisy images.
| no_new_dataset | 0.948058 |
1104.1493 | Tetsufumi Tanamoto | Tetsufumi Tanamoto, Hideyuki Sugiyama, Tomoaki Inokuchi, Takao
Marukame, Mizue Ishikawa, Kazutaka Ikegami and Yoshiaki Saito | Scalability of spin FPGA: A Reconfigurable Architecture based on spin
MOSFET | 3 pages, 7 figures | J. Appl. Phys. 109, 07C312 (2011) | 10.1063/1.3537923 | null | cond-mat.mes-hall cs.AR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Scalability of Field Programmable Gate Array (FPGA) using spin MOSFET (spin
FPGA) with magnetocurrent (MC) ratio in the range of 100% to 1000% is discussed
for the first time. Area and speed of million-gate spin FPGA are numerically
benchmarked with CMOS FPGA for 22nm, 32nm and 45nm technologies including 20%
transistor size variation. We show that area is reduced and speed is increased
in spin FPGA owing to the nonvolatile memory function of spin MOSFET.
| [
{
"version": "v1",
"created": "Fri, 8 Apr 2011 06:24:47 GMT"
}
] | 2015-03-19T00:00:00 | [
[
"Tanamoto",
"Tetsufumi",
""
],
[
"Sugiyama",
"Hideyuki",
""
],
[
"Inokuchi",
"Tomoaki",
""
],
[
"Marukame",
"Takao",
""
],
[
"Ishikawa",
"Mizue",
""
],
[
"Ikegami",
"Kazutaka",
""
],
[
"Saito",
"Yoshiaki",
""
]
] | TITLE: Scalability of spin FPGA: A Reconfigurable Architecture based on spin
MOSFET
ABSTRACT: Scalability of Field Programmable Gate Array (FPGA) using spin MOSFET (spin
FPGA) with magnetocurrent (MC) ratio in the range of 100% to 1000% is discussed
for the first time. Area and speed of million-gate spin FPGA are numerically
benchmarked with CMOS FPGA for 22nm, 32nm and 45nm technologies including 20%
transistor size variation. We show that area is reduced and speed is increased
in spin FPGA owing to the nonvolatile memory function of spin MOSFET.
| no_new_dataset | 0.951594 |
1104.2079 | Kim Nguyen | V\'eronique Benzaken and Giuseppe Castagna and Dario Colazzo and Kim
Nguyen | Optimizing XML querying using type-based document projection | 65 pages A4 format | null | null | null | cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | XML data projection (or pruning) is a natural optimization for main memory
query engines: given a query Q over a document D, the subtrees of D that are
not necessary to evaluate Q are pruned, thus producing a smaller document D';
the query Q is then executed on D', hence avoiding to allocate and process
nodes that will never be reached by Q. In this article, we propose a new
approach, based on types, that greatly improves current solutions. Besides
providing comparable or greater precision and far lesser pruning overhead, our
solution ---unlike current approaches--- takes into account backward axes,
predicates, and can be applied to multiple queries rather than just to single
ones. A side contribution is a new type system for XPath able to handle
backward axes. The soundness of our approach is formally proved. Furthermore,
we prove that the approach is also complete (i.e., yields the best possible
type-driven pruning) for a relevant class of queries and Schemas. We further
validate our approach using the XMark and XPathMark benchmarks and show that
pruning not only improves the main memory query engine's performances (as
expected) but also those of state of the art native XML databases.
| [
{
"version": "v1",
"created": "Mon, 11 Apr 2011 22:32:31 GMT"
}
] | 2015-03-19T00:00:00 | [
[
"Benzaken",
"Véronique",
""
],
[
"Castagna",
"Giuseppe",
""
],
[
"Colazzo",
"Dario",
""
],
[
"Nguyen",
"Kim",
""
]
] | TITLE: Optimizing XML querying using type-based document projection
ABSTRACT: XML data projection (or pruning) is a natural optimization for main memory
query engines: given a query Q over a document D, the subtrees of D that are
not necessary to evaluate Q are pruned, thus producing a smaller document D';
the query Q is then executed on D', hence avoiding to allocate and process
nodes that will never be reached by Q. In this article, we propose a new
approach, based on types, that greatly improves current solutions. Besides
providing comparable or greater precision and far lesser pruning overhead, our
solution ---unlike current approaches--- takes into account backward axes,
predicates, and can be applied to multiple queries rather than just to single
ones. A side contribution is a new type system for XPath able to handle
backward axes. The soundness of our approach is formally proved. Furthermore,
we prove that the approach is also complete (i.e., yields the best possible
type-driven pruning) for a relevant class of queries and Schemas. We further
validate our approach using the XMark and XPathMark benchmarks and show that
pruning not only improves the main memory query engine's performances (as
expected) but also those of state of the art native XML databases.
| no_new_dataset | 0.942242 |
1104.2086 | Slav Petrov | Slav Petrov, Dipanjan Das and Ryan McDonald | A Universal Part-of-Speech Tagset | null | null | null | null | cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | To facilitate future research in unsupervised induction of syntactic
structure and to standardize best-practices, we propose a tagset that consists
of twelve universal part-of-speech categories. In addition to the tagset, we
develop a mapping from 25 different treebank tagsets to this universal set. As
a result, when combined with the original treebank data, this universal tagset
and mapping produce a dataset consisting of common parts-of-speech for 22
different languages. We highlight the use of this resource via two experiments,
including one that reports competitive accuracies for unsupervised grammar
induction without gold standard part-of-speech tags.
| [
{
"version": "v1",
"created": "Mon, 11 Apr 2011 23:06:54 GMT"
}
] | 2015-03-19T00:00:00 | [
[
"Petrov",
"Slav",
""
],
[
"Das",
"Dipanjan",
""
],
[
"McDonald",
"Ryan",
""
]
] | TITLE: A Universal Part-of-Speech Tagset
ABSTRACT: To facilitate future research in unsupervised induction of syntactic
structure and to standardize best-practices, we propose a tagset that consists
of twelve universal part-of-speech categories. In addition to the tagset, we
develop a mapping from 25 different treebank tagsets to this universal set. As
a result, when combined with the original treebank data, this universal tagset
and mapping produce a dataset consisting of common parts-of-speech for 22
different languages. We highlight the use of this resource via two experiments,
including one that reports competitive accuracies for unsupervised grammar
induction without gold standard part-of-speech tags.
| new_dataset | 0.953708 |
1104.3590 | Brian Karrer | Brian Ball, Brian Karrer, and M. E. J. Newman | An efficient and principled method for detecting communities in networks | 14 pages, 5 figures, 1 table | Phys. Rev. E 84, 036103 (2011) | 10.1103/PhysRevE.84.036103 | null | cs.SI cond-mat.stat-mech physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A fundamental problem in the analysis of network data is the detection of
network communities, groups of densely interconnected nodes, which may be
overlapping or disjoint. Here we describe a method for finding overlapping
communities based on a principled statistical approach using generative network
models. We show how the method can be implemented using a fast, closed-form
expectation-maximization algorithm that allows us to analyze networks of
millions of nodes in reasonable running times. We test the method both on
real-world networks and on synthetic benchmarks and find that it gives results
competitive with previous methods. We also show that the same approach can be
used to extract nonoverlapping community divisions via a relaxation method, and
demonstrate that the algorithm is competitively fast and accurate for the
nonoverlapping problem.
| [
{
"version": "v1",
"created": "Mon, 18 Apr 2011 21:10:50 GMT"
}
] | 2015-03-19T00:00:00 | [
[
"Ball",
"Brian",
""
],
[
"Karrer",
"Brian",
""
],
[
"Newman",
"M. E. J.",
""
]
] | TITLE: An efficient and principled method for detecting communities in networks
ABSTRACT: A fundamental problem in the analysis of network data is the detection of
network communities, groups of densely interconnected nodes, which may be
overlapping or disjoint. Here we describe a method for finding overlapping
communities based on a principled statistical approach using generative network
models. We show how the method can be implemented using a fast, closed-form
expectation-maximization algorithm that allows us to analyze networks of
millions of nodes in reasonable running times. We test the method both on
real-world networks and on synthetic benchmarks and find that it gives results
competitive with previous methods. We also show that the same approach can be
used to extract nonoverlapping community divisions via a relaxation method, and
demonstrate that the algorithm is competitively fast and accurate for the
nonoverlapping problem.
| no_new_dataset | 0.949201 |
1104.4617 | Michael Codish | Amit Metodi and Michael Codish and Vitaly Lagoon and Peter J. Stuckey | Boolean Equi-propagation for Optimized SAT Encoding | null | null | null | null | cs.AI cs.DS cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present an approach to propagation based solving, Boolean
equi-propagation, where constraints are modelled as propagators of information
about equalities between Boolean literals. Propagation based solving applies
this information as a form of partial evaluation resulting in optimized SAT
encodings. We demonstrate for a variety of benchmarks that our approach results
in smaller CNF encodings and leads to speed-ups in solving times.
| [
{
"version": "v1",
"created": "Sun, 24 Apr 2011 10:39:07 GMT"
}
] | 2015-03-19T00:00:00 | [
[
"Metodi",
"Amit",
""
],
[
"Codish",
"Michael",
""
],
[
"Lagoon",
"Vitaly",
""
],
[
"Stuckey",
"Peter J.",
""
]
] | TITLE: Boolean Equi-propagation for Optimized SAT Encoding
ABSTRACT: We present an approach to propagation based solving, Boolean
equi-propagation, where constraints are modelled as propagators of information
about equalities between Boolean literals. Propagation based solving applies
this information as a form of partial evaluation resulting in optimized SAT
encodings. We demonstrate for a variety of benchmarks that our approach results
in smaller CNF encodings and leads to speed-ups in solving times.
| no_new_dataset | 0.950457 |
1104.4704 | Chunhua Shen | Chunhua Shen, Junae Kim, Lei Wang, Anton van den Hengel | Positive Semidefinite Metric Learning Using Boosting-like Algorithms | 30 pages, appearing in Journal of Machine Learning Research | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The success of many machine learning and pattern recognition methods relies
heavily upon the identification of an appropriate distance metric on the input
data. It is often beneficial to learn such a metric from the input training
data, instead of using a default one such as the Euclidean distance. In this
work, we propose a boosting-based technique, termed BoostMetric, for learning a
quadratic Mahalanobis distance metric. Learning a valid Mahalanobis distance
metric requires enforcing the constraint that the matrix parameter to the
metric remains positive definite. Semidefinite programming is often used to
enforce this constraint, but does not scale well and easy to implement.
BoostMetric is instead based on the observation that any positive semidefinite
matrix can be decomposed into a linear combination of trace-one rank-one
matrices. BoostMetric thus uses rank-one positive semidefinite matrices as weak
learners within an efficient and scalable boosting-based learning process. The
resulting methods are easy to implement, efficient, and can accommodate various
types of constraints. We extend traditional boosting algorithms in that its
weak learner is a positive semidefinite matrix with trace and rank being one
rather than a classifier or regressor. Experiments on various datasets
demonstrate that the proposed algorithms compare favorably to those
state-of-the-art methods in terms of classification accuracy and running time.
| [
{
"version": "v1",
"created": "Mon, 25 Apr 2011 10:38:03 GMT"
},
{
"version": "v2",
"created": "Thu, 12 Apr 2012 05:56:40 GMT"
}
] | 2015-03-19T00:00:00 | [
[
"Shen",
"Chunhua",
""
],
[
"Kim",
"Junae",
""
],
[
"Wang",
"Lei",
""
],
[
"Hengel",
"Anton van den",
""
]
] | TITLE: Positive Semidefinite Metric Learning Using Boosting-like Algorithms
ABSTRACT: The success of many machine learning and pattern recognition methods relies
heavily upon the identification of an appropriate distance metric on the input
data. It is often beneficial to learn such a metric from the input training
data, instead of using a default one such as the Euclidean distance. In this
work, we propose a boosting-based technique, termed BoostMetric, for learning a
quadratic Mahalanobis distance metric. Learning a valid Mahalanobis distance
metric requires enforcing the constraint that the matrix parameter to the
metric remains positive definite. Semidefinite programming is often used to
enforce this constraint, but does not scale well and easy to implement.
BoostMetric is instead based on the observation that any positive semidefinite
matrix can be decomposed into a linear combination of trace-one rank-one
matrices. BoostMetric thus uses rank-one positive semidefinite matrices as weak
learners within an efficient and scalable boosting-based learning process. The
resulting methods are easy to implement, efficient, and can accommodate various
types of constraints. We extend traditional boosting algorithms in that its
weak learner is a positive semidefinite matrix with trace and rank being one
rather than a classifier or regressor. Experiments on various datasets
demonstrate that the proposed algorithms compare favorably to those
state-of-the-art methods in terms of classification accuracy and running time.
| no_new_dataset | 0.946843 |
1104.4954 | Michael Sagraloff | Pavel Emeliyanenko, Michael Sagraloff | On the Complexity of Solving a Bivariate Polynomial System | null | null | null | null | cs.SC cs.CG cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study the complexity of computing the real solutions of a bivariate
polynomial system using the recently proposed algorithm BISOLVE. BISOLVE is a
classical elimination method which first projects the solutions of a system
onto the $x$- and $y$-axes and, then, selects the actual solutions from the so
induced candidate set. However, unlike similar algorithms, BISOLVE requires no
genericity assumption on the input nor it needs any change of the coordinate
system. Furthermore, extensive benchmarks from \cite{bes-bisolve-2011} confirm
that the algorithm outperforms state of the art approaches by a large factor.
In this work, we show that, for two polynomials $f,g\in\mathbb{Z}[x,y]$ of
total degree at most $n$ with integer coefficients bounded by $2^\tau$, BISOLVE
computes isolating boxes for all real solutions of the system $f=g=0$ using
$\Otilde(n^8\tau^{2})$ bit operations, thereby improving the previous record
bound by a factor of at least $n^{2}$.
| [
{
"version": "v1",
"created": "Tue, 26 Apr 2011 15:57:43 GMT"
}
] | 2015-03-19T00:00:00 | [
[
"Emeliyanenko",
"Pavel",
""
],
[
"Sagraloff",
"Michael",
""
]
] | TITLE: On the Complexity of Solving a Bivariate Polynomial System
ABSTRACT: We study the complexity of computing the real solutions of a bivariate
polynomial system using the recently proposed algorithm BISOLVE. BISOLVE is a
classical elimination method which first projects the solutions of a system
onto the $x$- and $y$-axes and, then, selects the actual solutions from the so
induced candidate set. However, unlike similar algorithms, BISOLVE requires no
genericity assumption on the input nor it needs any change of the coordinate
system. Furthermore, extensive benchmarks from \cite{bes-bisolve-2011} confirm
that the algorithm outperforms state of the art approaches by a large factor.
In this work, we show that, for two polynomials $f,g\in\mathbb{Z}[x,y]$ of
total degree at most $n$ with integer coefficients bounded by $2^\tau$, BISOLVE
computes isolating boxes for all real solutions of the system $f=g=0$ using
$\Otilde(n^8\tau^{2})$ bit operations, thereby improving the previous record
bound by a factor of at least $n^{2}$.
| no_new_dataset | 0.940353 |
1105.0903 | Georgios Zervas | John W. Byers, Michael Mitzenmacher, Michalis Potamias, and Georgios
Zervas | A Month in the Life of Groupon | 6 pages | null | 10.1016/j.elerap.2012.11.006 | null | cs.SI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Groupon has become the latest Internet sensation, providing daily deals to
customers in the form of discount offers for restaurants, ticketed events,
appliances, services, and other items. We undertake a study of the economics of
daily deals on the web, based on a dataset we compiled by monitoring Groupon
over several weeks. We use our dataset to characterize Groupon deal purchases,
and to glean insights about Groupon's operational strategy. Our focus is on
purchase incentives. For the primary purchase incentive, price, our regression
model indicates that demand for coupons is relatively inelastic, allowing room
for price-based revenue optimization. More interestingly, mining our dataset,
we find evidence that Groupon customers are sensitive to other, "soft",
incentives, e.g., deal scheduling and duration, deal featuring, and limited
inventory. Our analysis points to the importance of considering incentives
other than price in optimizing deal sites and similar systems.
| [
{
"version": "v1",
"created": "Wed, 4 May 2011 19:25:21 GMT"
}
] | 2015-03-19T00:00:00 | [
[
"Byers",
"John W.",
""
],
[
"Mitzenmacher",
"Michael",
""
],
[
"Potamias",
"Michalis",
""
],
[
"Zervas",
"Georgios",
""
]
] | TITLE: A Month in the Life of Groupon
ABSTRACT: Groupon has become the latest Internet sensation, providing daily deals to
customers in the form of discount offers for restaurants, ticketed events,
appliances, services, and other items. We undertake a study of the economics of
daily deals on the web, based on a dataset we compiled by monitoring Groupon
over several weeks. We use our dataset to characterize Groupon deal purchases,
and to glean insights about Groupon's operational strategy. Our focus is on
purchase incentives. For the primary purchase incentive, price, our regression
model indicates that demand for coupons is relatively inelastic, allowing room
for price-based revenue optimization. More interestingly, mining our dataset,
we find evidence that Groupon customers are sensitive to other, "soft",
incentives, e.g., deal scheduling and duration, deal featuring, and limited
inventory. Our analysis points to the importance of considering incentives
other than price in optimizing deal sites and similar systems.
| no_new_dataset | 0.864368 |
1105.3232 | Sokol Kosta | Sokol Kosta, Andrius Aucinas, Pan Hui, Richard Mortier, Xinwen Zhang | Unleashing the Power of Mobile Cloud Computing using ThinkAir | 17 pages | null | null | null | cs.DC cs.NI cs.OS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Smartphones have exploded in popularity in recent years, becoming ever more
sophisticated and capable. As a result, developers worldwide are building
increasingly complex applications that require ever increasing amounts of
computational power and energy. In this paper we propose ThinkAir, a framework
that makes it simple for developers to migrate their smartphone applications to
the cloud. ThinkAir exploits the concept of smartphone virtualization in the
cloud and provides method level computation offloading. Advancing on previous
works, it focuses on the elasticity and scalability of the server side and
enhances the power of mobile cloud computing by parallelizing method execution
using multiple Virtual Machine (VM) images. We evaluate the system using a
range of benchmarks starting from simple micro-benchmarks to more complex
applications. First, we show that the execution time and energy consumption
decrease two orders of magnitude for the N-queens puzzle and one order of
magnitude for a face detection and a virus scan application, using cloud
offloading. We then show that if a task is parallelizable, the user can request
more than one VM to execute it, and these VMs will be provided dynamically. In
fact, by exploiting parallelization, we achieve a greater reduction on the
execution time and energy consumption for the previous applications. Finally,
we use a memory-hungry image combiner tool to demonstrate that applications can
dynamically request VMs with more computational power in order to meet their
computational requirements.
| [
{
"version": "v1",
"created": "Mon, 16 May 2011 21:45:54 GMT"
}
] | 2015-03-19T00:00:00 | [
[
"Kosta",
"Sokol",
""
],
[
"Aucinas",
"Andrius",
""
],
[
"Hui",
"Pan",
""
],
[
"Mortier",
"Richard",
""
],
[
"Zhang",
"Xinwen",
""
]
] | TITLE: Unleashing the Power of Mobile Cloud Computing using ThinkAir
ABSTRACT: Smartphones have exploded in popularity in recent years, becoming ever more
sophisticated and capable. As a result, developers worldwide are building
increasingly complex applications that require ever increasing amounts of
computational power and energy. In this paper we propose ThinkAir, a framework
that makes it simple for developers to migrate their smartphone applications to
the cloud. ThinkAir exploits the concept of smartphone virtualization in the
cloud and provides method level computation offloading. Advancing on previous
works, it focuses on the elasticity and scalability of the server side and
enhances the power of mobile cloud computing by parallelizing method execution
using multiple Virtual Machine (VM) images. We evaluate the system using a
range of benchmarks starting from simple micro-benchmarks to more complex
applications. First, we show that the execution time and energy consumption
decrease two orders of magnitude for the N-queens puzzle and one order of
magnitude for a face detection and a virus scan application, using cloud
offloading. We then show that if a task is parallelizable, the user can request
more than one VM to execute it, and these VMs will be provided dynamically. In
fact, by exploiting parallelization, we achieve a greater reduction on the
execution time and energy consumption for the previous applications. Finally,
we use a memory-hungry image combiner tool to demonstrate that applications can
dynamically request VMs with more computational power in order to meet their
computational requirements.
| no_new_dataset | 0.948585 |
1105.4385 | Ping Li | Ping Li and Joshua Moore and Christian Konig | b-Bit Minwise Hashing for Large-Scale Linear SVM | null | null | null | null | cs.LG stat.AP stat.CO stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we propose to (seamlessly) integrate b-bit minwise hashing
with linear SVM to substantially improve the training (and testing) efficiency
using much smaller memory, with essentially no loss of accuracy. Theoretically,
we prove that the resemblance matrix, the minwise hashing matrix, and the b-bit
minwise hashing matrix are all positive definite matrices (kernels).
Interestingly, our proof for the positive definiteness of the b-bit minwise
hashing kernel naturally suggests a simple strategy to integrate b-bit hashing
with linear SVM. Our technique is particularly useful when the data can not fit
in memory, which is an increasingly critical issue in large-scale machine
learning. Our preliminary experimental results on a publicly available webspam
dataset (350K samples and 16 million dimensions) verified the effectiveness of
our algorithm. For example, the training time was reduced to merely a few
seconds. In addition, our technique can be easily extended to many other linear
and nonlinear machine learning applications such as logistic regression.
| [
{
"version": "v1",
"created": "Mon, 23 May 2011 01:56:24 GMT"
}
] | 2015-03-19T00:00:00 | [
[
"Li",
"Ping",
""
],
[
"Moore",
"Joshua",
""
],
[
"Konig",
"Christian",
""
]
] | TITLE: b-Bit Minwise Hashing for Large-Scale Linear SVM
ABSTRACT: In this paper, we propose to (seamlessly) integrate b-bit minwise hashing
with linear SVM to substantially improve the training (and testing) efficiency
using much smaller memory, with essentially no loss of accuracy. Theoretically,
we prove that the resemblance matrix, the minwise hashing matrix, and the b-bit
minwise hashing matrix are all positive definite matrices (kernels).
Interestingly, our proof for the positive definiteness of the b-bit minwise
hashing kernel naturally suggests a simple strategy to integrate b-bit hashing
with linear SVM. Our technique is particularly useful when the data can not fit
in memory, which is an increasingly critical issue in large-scale machine
learning. Our preliminary experimental results on a publicly available webspam
dataset (350K samples and 16 million dimensions) verified the effectiveness of
our algorithm. For example, the training time was reduced to merely a few
seconds. In addition, our technique can be easily extended to many other linear
and nonlinear machine learning applications such as logistic regression.
| no_new_dataset | 0.954351 |
1105.5196 | Jason Weston | Jason Weston, Samy Bengio, Philippe Hamel | Large-Scale Music Annotation and Retrieval: Learning to Rank in Joint
Semantic Spaces | null | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Music prediction tasks range from predicting tags given a song or clip of
audio, predicting the name of the artist, or predicting related songs given a
song, clip, artist name or tag. That is, we are interested in every semantic
relationship between the different musical concepts in our database. In
realistically sized databases, the number of songs is measured in the hundreds
of thousands or more, and the number of artists in the tens of thousands or
more, providing a considerable challenge to standard machine learning
techniques. In this work, we propose a method that scales to such datasets
which attempts to capture the semantic similarities between the database items
by modeling audio, artist names, and tags in a single low-dimensional semantic
space. This choice of space is learnt by optimizing the set of prediction tasks
of interest jointly using multi-task learning. Our method both outperforms
baseline methods and, in comparison to them, is faster and consumes less
memory. We then demonstrate how our method learns an interpretable model, where
the semantic space captures well the similarities of interest.
| [
{
"version": "v1",
"created": "Thu, 26 May 2011 03:41:47 GMT"
}
] | 2015-03-19T00:00:00 | [
[
"Weston",
"Jason",
""
],
[
"Bengio",
"Samy",
""
],
[
"Hamel",
"Philippe",
""
]
] | TITLE: Large-Scale Music Annotation and Retrieval: Learning to Rank in Joint
Semantic Spaces
ABSTRACT: Music prediction tasks range from predicting tags given a song or clip of
audio, predicting the name of the artist, or predicting related songs given a
song, clip, artist name or tag. That is, we are interested in every semantic
relationship between the different musical concepts in our database. In
realistically sized databases, the number of songs is measured in the hundreds
of thousands or more, and the number of artists in the tens of thousands or
more, providing a considerable challenge to standard machine learning
techniques. In this work, we propose a method that scales to such datasets
which attempts to capture the semantic similarities between the database items
by modeling audio, artist names, and tags in a single low-dimensional semantic
space. This choice of space is learnt by optimizing the set of prediction tasks
of interest jointly using multi-task learning. Our method both outperforms
baseline methods and, in comparison to them, is faster and consumes less
memory. We then demonstrate how our method learns an interpretable model, where
the semantic space captures well the similarities of interest.
| no_new_dataset | 0.944944 |
1105.5881 | Mingyu Chen | Mingyu Chen, David A. Bader | On the random access performance of Cell Broadband Engine with graph
analysis application | 8 pages, 10 figures | null | null | null | cs.CE cs.PF | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The Cell Broad Engine (BE) Processor has unique memory access architecture
besides its powerful computing engines. Many computing-intensive applications
have been ported to Cell/BE successfully. But memory-intensive applications are
rarely investigated except for several micro benchmarks. Since Cell/BE has
powerful software visible DMA engine, this paper studies on whether Cell/BE is
suit for applica- tions with large amount of random memory accesses. Two
benchmarks, GUPS and SSCA#2, are used. The latter is a rather complex one that
in representative of real world graph analysis applications. We find both
benchmarks have good performance on Cell/BE based IBM QS20/22. Com- pared with
2 conventional multi-processor systems with the same core/thread number, GUPS
is about 40-80% fast and SSCA#2 about 17-30% fast. The dynamic load balanc- ing
and software pipeline for optimizing SSCA#2 are intro- duced. Based on the
experiment, the potential of Cell/BE for random access is analyzed in detail as
well as its limita- tions of memory controller, atomic engine and TLB manage-
ment.Our research shows although more programming effort are needed, Cell/BE
has the potencial for irregular memory access applications.
| [
{
"version": "v1",
"created": "Mon, 30 May 2011 07:07:59 GMT"
},
{
"version": "v2",
"created": "Sun, 5 Jun 2011 07:10:43 GMT"
}
] | 2015-03-19T00:00:00 | [
[
"Chen",
"Mingyu",
""
],
[
"Bader",
"David A.",
""
]
] | TITLE: On the random access performance of Cell Broadband Engine with graph
analysis application
ABSTRACT: The Cell Broad Engine (BE) Processor has unique memory access architecture
besides its powerful computing engines. Many computing-intensive applications
have been ported to Cell/BE successfully. But memory-intensive applications are
rarely investigated except for several micro benchmarks. Since Cell/BE has
powerful software visible DMA engine, this paper studies on whether Cell/BE is
suit for applica- tions with large amount of random memory accesses. Two
benchmarks, GUPS and SSCA#2, are used. The latter is a rather complex one that
in representative of real world graph analysis applications. We find both
benchmarks have good performance on Cell/BE based IBM QS20/22. Com- pared with
2 conventional multi-processor systems with the same core/thread number, GUPS
is about 40-80% fast and SSCA#2 about 17-30% fast. The dynamic load balanc- ing
and software pipeline for optimizing SSCA#2 are intro- duced. Based on the
experiment, the potential of Cell/BE for random access is analyzed in detail as
well as its limita- tions of memory controller, atomic engine and TLB manage-
ment.Our research shows although more programming effort are needed, Cell/BE
has the potencial for irregular memory access applications.
| no_new_dataset | 0.946349 |
1106.0987 | Junping Zhang | Junping Zhang and Ziyu Xie and Stan Z. Li | Nearest Prime Simplicial Complex for Object Recognition | 16pages, 6 figures | null | null | null | cs.LG cs.AI cs.CG cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The structure representation of data distribution plays an important role in
understanding the underlying mechanism of generating data. In this paper, we
propose nearest prime simplicial complex approaches (NSC) by utilizing
persistent homology to capture such structures. Assuming that each class is
represented with a prime simplicial complex, we classify unlabeled samples
based on the nearest projection distances from the samples to the simplicial
complexes. We also extend the extrapolation ability of these complexes with a
projection constraint term. Experiments in simulated and practical datasets
indicate that compared with several published algorithms, the proposed NSC
approaches achieve promising performance without losing the structure
representation.
| [
{
"version": "v1",
"created": "Mon, 6 Jun 2011 08:32:16 GMT"
}
] | 2015-03-19T00:00:00 | [
[
"Zhang",
"Junping",
""
],
[
"Xie",
"Ziyu",
""
],
[
"Li",
"Stan Z.",
""
]
] | TITLE: Nearest Prime Simplicial Complex for Object Recognition
ABSTRACT: The structure representation of data distribution plays an important role in
understanding the underlying mechanism of generating data. In this paper, we
propose nearest prime simplicial complex approaches (NSC) by utilizing
persistent homology to capture such structures. Assuming that each class is
represented with a prime simplicial complex, we classify unlabeled samples
based on the nearest projection distances from the samples to the simplicial
complexes. We also extend the extrapolation ability of these complexes with a
projection constraint term. Experiments in simulated and practical datasets
indicate that compared with several published algorithms, the proposed NSC
approaches achieve promising performance without losing the structure
representation.
| no_new_dataset | 0.950869 |
1107.1697 | Aiyou Chen | Aiyou Chen, Jin Cao, Larry Shepp and Tuan Nguyen | Distinct counting with a self-learning bitmap | Journal of the American Statistical Association (accepted) | null | null | null | stat.CO cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Counting the number of distinct elements (cardinality) in a dataset is a
fundamental problem in database management. In recent years, due to many of its
modern applications, there has been significant interest to address the
distinct counting problem in a data stream setting, where each incoming data
can be seen only once and cannot be stored for long periods of time. Many
probabilistic approaches based on either sampling or sketching have been
proposed in the computer science literature, that only require limited
computing and memory resources. However, the performances of these methods are
not scale-invariant, in the sense that their relative root mean square
estimation errors (RRMSE) depend on the unknown cardinalities. This is not
desirable in many applications where cardinalities can be very dynamic or
inhomogeneous and many cardinalities need to be estimated. In this paper, we
develop a novel approach, called self-learning bitmap (S-bitmap) that is
scale-invariant for cardinalities in a specified range. S-bitmap uses a binary
vector whose entries are updated from 0 to 1 by an adaptive sampling process
for inferring the unknown cardinality, where the sampling rates are reduced
sequentially as more and more entries change from 0 to 1. We prove rigorously
that the S-bitmap estimate is not only unbiased but scale-invariant. We
demonstrate that to achieve a small RRMSE value of $\epsilon$ or less, our
approach requires significantly less memory and consumes similar or less
operations than state-of-the-art methods for many common practice cardinality
scales. Both simulation and experimental studies are reported.
| [
{
"version": "v1",
"created": "Fri, 8 Jul 2011 18:50:16 GMT"
}
] | 2015-03-19T00:00:00 | [
[
"Chen",
"Aiyou",
""
],
[
"Cao",
"Jin",
""
],
[
"Shepp",
"Larry",
""
],
[
"Nguyen",
"Tuan",
""
]
] | TITLE: Distinct counting with a self-learning bitmap
ABSTRACT: Counting the number of distinct elements (cardinality) in a dataset is a
fundamental problem in database management. In recent years, due to many of its
modern applications, there has been significant interest to address the
distinct counting problem in a data stream setting, where each incoming data
can be seen only once and cannot be stored for long periods of time. Many
probabilistic approaches based on either sampling or sketching have been
proposed in the computer science literature, that only require limited
computing and memory resources. However, the performances of these methods are
not scale-invariant, in the sense that their relative root mean square
estimation errors (RRMSE) depend on the unknown cardinalities. This is not
desirable in many applications where cardinalities can be very dynamic or
inhomogeneous and many cardinalities need to be estimated. In this paper, we
develop a novel approach, called self-learning bitmap (S-bitmap) that is
scale-invariant for cardinalities in a specified range. S-bitmap uses a binary
vector whose entries are updated from 0 to 1 by an adaptive sampling process
for inferring the unknown cardinality, where the sampling rates are reduced
sequentially as more and more entries change from 0 to 1. We prove rigorously
that the S-bitmap estimate is not only unbiased but scale-invariant. We
demonstrate that to achieve a small RRMSE value of $\epsilon$ or less, our
approach requires significantly less memory and consumes similar or less
operations than state-of-the-art methods for many common practice cardinality
scales. Both simulation and experimental studies are reported.
| no_new_dataset | 0.947381 |
1107.1805 | Maksims Volkovs | Maksims N. Volkovs, Hugo Larochelle, Richard S. Zemel | Loss-sensitive Training of Probabilistic Conditional Random Fields | null | null | null | null | stat.ML cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider the problem of training probabilistic conditional random fields
(CRFs) in the context of a task where performance is measured using a specific
loss function. While maximum likelihood is the most common approach to training
CRFs, it ignores the inherent structure of the task's loss function. We
describe alternatives to maximum likelihood which take that loss into account.
These include a novel adaptation of a loss upper bound from the structured SVMs
literature to the CRF context, as well as a new loss-inspired KL divergence
objective which relies on the probabilistic nature of CRFs. These
loss-sensitive objectives are compared to maximum likelihood using ranking as a
benchmark task. This comparison confirms the importance of incorporating loss
information in the probabilistic training of CRFs, with the loss-inspired KL
outperforming all other objectives.
| [
{
"version": "v1",
"created": "Sat, 9 Jul 2011 17:58:46 GMT"
}
] | 2015-03-19T00:00:00 | [
[
"Volkovs",
"Maksims N.",
""
],
[
"Larochelle",
"Hugo",
""
],
[
"Zemel",
"Richard S.",
""
]
] | TITLE: Loss-sensitive Training of Probabilistic Conditional Random Fields
ABSTRACT: We consider the problem of training probabilistic conditional random fields
(CRFs) in the context of a task where performance is measured using a specific
loss function. While maximum likelihood is the most common approach to training
CRFs, it ignores the inherent structure of the task's loss function. We
describe alternatives to maximum likelihood which take that loss into account.
These include a novel adaptation of a loss upper bound from the structured SVMs
literature to the CRF context, as well as a new loss-inspired KL divergence
objective which relies on the probabilistic nature of CRFs. These
loss-sensitive objectives are compared to maximum likelihood using ranking as a
benchmark task. This comparison confirms the importance of incorporating loss
information in the probabilistic training of CRFs, with the loss-inspired KL
outperforming all other objectives.
| no_new_dataset | 0.951504 |
1107.2031 | Shishir Nagaraja | Shishir Nagaraja, Amir Houmansadr, Pratch Piyawongwisal, Vijit Singh,
Pragya Agarwal, Nikita Borisov | Stegobot: construction of an unobservable communication network
leveraging social behavior | Information Hiding, unobservability, anonymity, botnet | null | null | null | cs.CR cs.NI cs.SI physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose the construction of an unobservable communications network using
social networks. The communication endpoints are vertices on a social network.
Probabilistically unobservable communication channels are built by leveraging
image steganography and the social image sharing behavior of users. All
communication takes place along the edges of a social network overlay
connecting friends. We show that such a network can provide decent bandwidth
even with a far from optimal routing mechanism such as restricted flooding. We
show that such a network is indeed usable by constructing a botnet on top of
it, called Stegobot. It is designed to spread via social malware attacks and
steal information from its victims. Unlike conventional botnets, Stegobot
traffic does not introduce new communication endpoints between bots. We
analyzed a real-world dataset of image sharing between members of an online
social network. Analysis of Stegobot's network throughput indicates that
stealthy as it is, it is also functionally powerful -- capable of channeling
fair quantities of sensitive data from its victims to the botmaster at tens of
megabytes every month.
| [
{
"version": "v1",
"created": "Mon, 11 Jul 2011 13:56:15 GMT"
}
] | 2015-03-19T00:00:00 | [
[
"Nagaraja",
"Shishir",
""
],
[
"Houmansadr",
"Amir",
""
],
[
"Piyawongwisal",
"Pratch",
""
],
[
"Singh",
"Vijit",
""
],
[
"Agarwal",
"Pragya",
""
],
[
"Borisov",
"Nikita",
""
]
] | TITLE: Stegobot: construction of an unobservable communication network
leveraging social behavior
ABSTRACT: We propose the construction of an unobservable communications network using
social networks. The communication endpoints are vertices on a social network.
Probabilistically unobservable communication channels are built by leveraging
image steganography and the social image sharing behavior of users. All
communication takes place along the edges of a social network overlay
connecting friends. We show that such a network can provide decent bandwidth
even with a far from optimal routing mechanism such as restricted flooding. We
show that such a network is indeed usable by constructing a botnet on top of
it, called Stegobot. It is designed to spread via social malware attacks and
steal information from its victims. Unlike conventional botnets, Stegobot
traffic does not introduce new communication endpoints between bots. We
analyzed a real-world dataset of image sharing between members of an online
social network. Analysis of Stegobot's network throughput indicates that
stealthy as it is, it is also functionally powerful -- capable of channeling
fair quantities of sensitive data from its victims to the botmaster at tens of
megabytes every month.
| no_new_dataset | 0.904819 |
1107.3606 | Hideaki Kimura | Hideaki Kimura, Carleton Coffrin, Alexander Rasin, Stanley B. Zdonik | Optimizing Index Deployment Order for Evolving OLAP (Extended Version) | null | null | null | null | cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Query workloads and database schemas in OLAP applications are becoming
increasingly complex. Moreover, the queries and the schemas have to continually
\textit{evolve} to address business requirements. During such repetitive
transitions, the \textit{order} of index deployment has to be considered while
designing the physical schemas such as indexes and MVs.
An effective index deployment ordering can produce (1) a prompt query runtime
improvement and (2) a reduced total deployment time. Both of these are
essential qualities of design tools for quickly evolving databases, but
optimizing the problem is challenging because of complex index interactions and
a factorial number of possible solutions.
We formulate the problem in a mathematical model and study several techniques
for solving the index ordering problem. We demonstrate that Constraint
Programming (CP) is a more flexible and efficient platform to solve the problem
than other methods such as mixed integer programming and A* search. In addition
to exact search techniques, we also studied local search algorithms to find
near optimal solution very quickly.
Our empirical analysis on the TPC-H dataset shows that our pruning techniques
can reduce the size of the search space by tens of orders of magnitude. Using
the TPC-DS dataset, we verify that our local search algorithm is a highly
scalable and stable method for quickly finding a near-optimal solution.
| [
{
"version": "v1",
"created": "Tue, 19 Jul 2011 01:52:52 GMT"
},
{
"version": "v2",
"created": "Wed, 20 Jul 2011 00:25:35 GMT"
},
{
"version": "v3",
"created": "Wed, 1 Feb 2012 15:46:22 GMT"
}
] | 2015-03-19T00:00:00 | [
[
"Kimura",
"Hideaki",
""
],
[
"Coffrin",
"Carleton",
""
],
[
"Rasin",
"Alexander",
""
],
[
"Zdonik",
"Stanley B.",
""
]
] | TITLE: Optimizing Index Deployment Order for Evolving OLAP (Extended Version)
ABSTRACT: Query workloads and database schemas in OLAP applications are becoming
increasingly complex. Moreover, the queries and the schemas have to continually
\textit{evolve} to address business requirements. During such repetitive
transitions, the \textit{order} of index deployment has to be considered while
designing the physical schemas such as indexes and MVs.
An effective index deployment ordering can produce (1) a prompt query runtime
improvement and (2) a reduced total deployment time. Both of these are
essential qualities of design tools for quickly evolving databases, but
optimizing the problem is challenging because of complex index interactions and
a factorial number of possible solutions.
We formulate the problem in a mathematical model and study several techniques
for solving the index ordering problem. We demonstrate that Constraint
Programming (CP) is a more flexible and efficient platform to solve the problem
than other methods such as mixed integer programming and A* search. In addition
to exact search techniques, we also studied local search algorithms to find
near optimal solution very quickly.
Our empirical analysis on the TPC-H dataset shows that our pruning techniques
can reduce the size of the search space by tens of orders of magnitude. Using
the TPC-DS dataset, we verify that our local search algorithm is a highly
scalable and stable method for quickly finding a near-optimal solution.
| no_new_dataset | 0.94366 |
1107.4526 | Dario Maggiorini | Sabrina Gaito, Dario Maggiorini, Gian Paolo Rossi | Leveraging Bus Mobility to Enable Communications in Urban Areas | 14 pages, 13 figures, 4 tables | null | null | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper shows that the deployment of an opportunistic network on any
public transportation system leads to obtain a scalable and efficient urban
communication platform. We use the term Bus Switched Networks (BSNs) to
indicate this urban backbone that complements the services of 3G networks and
enables to meet the application level requirements for a large class of
applications by ensuring high delivery ratio and acceptable delays under
different conditions of packet load. We sustain these arguments by providing
three contributions. The first contribution is a novel and lightweight
probabilistic routing protocol for BSN which we prove to be highly effective in
satisfying the loose QoS required by urban-wide delay-tolerant information
services. The second contribution is the proposal of URBeS, an analysis
platform that, given a specific city served by public transportation, produces
real bus mobility traces and traffic analysis for any given routing protocol.
The last contribution is an extensive benchmark analysis on three real cities
which have been selected to explore geo and structural diversity.
| [
{
"version": "v1",
"created": "Fri, 22 Jul 2011 14:30:19 GMT"
}
] | 2015-03-19T00:00:00 | [
[
"Gaito",
"Sabrina",
""
],
[
"Maggiorini",
"Dario",
""
],
[
"Rossi",
"Gian Paolo",
""
]
] | TITLE: Leveraging Bus Mobility to Enable Communications in Urban Areas
ABSTRACT: This paper shows that the deployment of an opportunistic network on any
public transportation system leads to obtain a scalable and efficient urban
communication platform. We use the term Bus Switched Networks (BSNs) to
indicate this urban backbone that complements the services of 3G networks and
enables to meet the application level requirements for a large class of
applications by ensuring high delivery ratio and acceptable delays under
different conditions of packet load. We sustain these arguments by providing
three contributions. The first contribution is a novel and lightweight
probabilistic routing protocol for BSN which we prove to be highly effective in
satisfying the loose QoS required by urban-wide delay-tolerant information
services. The second contribution is the proposal of URBeS, an analysis
platform that, given a specific city served by public transportation, produces
real bus mobility traces and traffic analysis for any given routing protocol.
The last contribution is an extensive benchmark analysis on three real cities
which have been selected to explore geo and structural diversity.
| no_new_dataset | 0.945147 |
1108.1122 | Yaniv Taigman | Yaniv Taigman and Lior Wolf | Leveraging Billions of Faces to Overcome Performance Barriers in
Unconstrained Face Recognition | 7 pages | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We employ the face recognition technology developed in house at face.com to a
well accepted benchmark and show that without any tuning we are able to
considerably surpass state of the art results. Much of the improvement is
concentrated in the high-valued performance point of zero false positive
matches, where the obtained recall rate almost doubles the best reported result
to date. We discuss the various components and innovations of our system that
enable this significant performance gap. These components include extensive
utilization of an accurate 3D reconstructed shape model dealing with challenges
arising from pose and illumination. In addition, discriminative models based on
billions of faces are used in order to overcome aging and facial expression as
well as low light and overexposure. Finally, we identify a challenging set of
identification queries that might provide useful focus for future research.
| [
{
"version": "v1",
"created": "Thu, 4 Aug 2011 15:51:19 GMT"
}
] | 2015-03-19T00:00:00 | [
[
"Taigman",
"Yaniv",
""
],
[
"Wolf",
"Lior",
""
]
] | TITLE: Leveraging Billions of Faces to Overcome Performance Barriers in
Unconstrained Face Recognition
ABSTRACT: We employ the face recognition technology developed in house at face.com to a
well accepted benchmark and show that without any tuning we are able to
considerably surpass state of the art results. Much of the improvement is
concentrated in the high-valued performance point of zero false positive
matches, where the obtained recall rate almost doubles the best reported result
to date. We discuss the various components and innovations of our system that
enable this significant performance gap. These components include extensive
utilization of an accurate 3D reconstructed shape model dealing with challenges
arising from pose and illumination. In addition, discriminative models based on
billions of faces are used in order to overcome aging and facial expression as
well as low light and overexposure. Finally, we identify a challenging set of
identification queries that might provide useful focus for future research.
| no_new_dataset | 0.946001 |
1108.3605 | Adrian Barbu | Adrian Barbu | Hierarchical Object Parsing from Structured Noisy Point Clouds | 13 pages, 16 figures | null | 10.1109/TPAMI.2012.262 | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Object parsing and segmentation from point clouds are challenging tasks
because the relevant data is available only as thin structures along object
boundaries or other features, and is corrupted by large amounts of noise. To
handle this kind of data, flexible shape models are desired that can accurately
follow the object boundaries. Popular models such as Active Shape and Active
Appearance models lack the necessary flexibility for this task, while recent
approaches such as the Recursive Compositional Models make model
simplifications in order to obtain computational guarantees. This paper
investigates a hierarchical Bayesian model of shape and appearance in a
generative setting. The input data is explained by an object parsing layer,
which is a deformation of a hidden PCA shape model with Gaussian prior. The
paper also introduces a novel efficient inference algorithm that uses informed
data-driven proposals to initialize local searches for the hidden variables.
Applied to the problem of object parsing from structured point clouds such as
edge detection images, the proposed approach obtains state of the art parsing
errors on two standard datasets without using any intensity information.
| [
{
"version": "v1",
"created": "Thu, 18 Aug 2011 02:11:34 GMT"
},
{
"version": "v2",
"created": "Sat, 15 Sep 2012 14:24:08 GMT"
}
] | 2015-03-19T00:00:00 | [
[
"Barbu",
"Adrian",
""
]
] | TITLE: Hierarchical Object Parsing from Structured Noisy Point Clouds
ABSTRACT: Object parsing and segmentation from point clouds are challenging tasks
because the relevant data is available only as thin structures along object
boundaries or other features, and is corrupted by large amounts of noise. To
handle this kind of data, flexible shape models are desired that can accurately
follow the object boundaries. Popular models such as Active Shape and Active
Appearance models lack the necessary flexibility for this task, while recent
approaches such as the Recursive Compositional Models make model
simplifications in order to obtain computational guarantees. This paper
investigates a hierarchical Bayesian model of shape and appearance in a
generative setting. The input data is explained by an object parsing layer,
which is a deformation of a hidden PCA shape model with Gaussian prior. The
paper also introduces a novel efficient inference algorithm that uses informed
data-driven proposals to initialize local searches for the hidden variables.
Applied to the problem of object parsing from structured point clouds such as
edge detection images, the proposed approach obtains state of the art parsing
errors on two standard datasets without using any intensity information.
| no_new_dataset | 0.950641 |
1109.1530 | Georgios Zervas | John W. Byers, Michael Mitzenmacher, Georgios Zervas | Daily Deals: Prediction, Social Diffusion, and Reputational
Ramifications | 15 pages, 9 tables, 11 figures | null | null | null | cs.SI physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Daily deal sites have become the latest Internet sensation, providing
discounted offers to customers for restaurants, ticketed events, services, and
other items. We begin by undertaking a study of the economics of daily deals on
the web, based on a dataset we compiled by monitoring Groupon and LivingSocial
sales in 20 large cities over several months. We use this dataset to
characterize deal purchases; glean insights about operational strategies of
these firms; and evaluate customers' sensitivity to factors such as price, deal
scheduling, and limited inventory. We then marry our daily deals dataset with
additional datasets we compiled from Facebook and Yelp users to study the
interplay between social networks and daily deal sites. First, by studying user
activity on Facebook while a deal is running, we provide evidence that daily
deal sites benefit from significant word-of-mouth effects during sales events,
consistent with results predicted by cascade models. Second, we consider the
effects of daily deals on the longer-term reputation of merchants, based on
their Yelp reviews before and after they run a daily deal. Our analysis shows
that while the number of reviews increases significantly due to daily deals,
average rating scores from reviewers who mention daily deals are 10% lower than
scores of their peers on average.
| [
{
"version": "v1",
"created": "Wed, 7 Sep 2011 18:29:30 GMT"
}
] | 2015-03-19T00:00:00 | [
[
"Byers",
"John W.",
""
],
[
"Mitzenmacher",
"Michael",
""
],
[
"Zervas",
"Georgios",
""
]
] | TITLE: Daily Deals: Prediction, Social Diffusion, and Reputational
Ramifications
ABSTRACT: Daily deal sites have become the latest Internet sensation, providing
discounted offers to customers for restaurants, ticketed events, services, and
other items. We begin by undertaking a study of the economics of daily deals on
the web, based on a dataset we compiled by monitoring Groupon and LivingSocial
sales in 20 large cities over several months. We use this dataset to
characterize deal purchases; glean insights about operational strategies of
these firms; and evaluate customers' sensitivity to factors such as price, deal
scheduling, and limited inventory. We then marry our daily deals dataset with
additional datasets we compiled from Facebook and Yelp users to study the
interplay between social networks and daily deal sites. First, by studying user
activity on Facebook while a deal is running, we provide evidence that daily
deal sites benefit from significant word-of-mouth effects during sales events,
consistent with results predicted by cascade models. Second, we consider the
effects of daily deals on the longer-term reputation of merchants, based on
their Yelp reviews before and after they run a daily deal. Our analysis shows
that while the number of reviews increases significantly due to daily deals,
average rating scores from reviewers who mention daily deals are 10% lower than
scores of their peers on average.
| no_new_dataset | 0.913058 |
1109.1966 | Timothy Hunter | Timothy Hunter, Pieter Abbeel, and Alexandre Bayen | The path inference filter: model-based low-latency map matching of probe
vehicle data | Preprint, 23 pages and 23 figures | null | 10.1016/j.trb.2013.03.008 | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider the problem of reconstructing vehicle trajectories from sparse
sequences of GPS points, for which the sampling interval is between 10 seconds
and 2 minutes. We introduce a new class of algorithms, called altogether path
inference filter (PIF), that maps GPS data in real time, for a variety of
trade-offs and scenarios, and with a high throughput. Numerous prior approaches
in map-matching can be shown to be special cases of the path inference filter
presented in this article. We present an efficient procedure for automatically
training the filter on new data, with or without ground truth observations. The
framework is evaluated on a large San Francisco taxi dataset and is shown to
improve upon the current state of the art. This filter also provides insights
about driving patterns of drivers. The path inference filter has been deployed
at an industrial scale inside the Mobile Millennium traffic information system,
and is used to map fleets of data in San Francisco, Sacramento, Stockholm and
Porto.
| [
{
"version": "v1",
"created": "Fri, 9 Sep 2011 11:12:35 GMT"
},
{
"version": "v2",
"created": "Wed, 20 Jun 2012 17:12:40 GMT"
}
] | 2015-03-19T00:00:00 | [
[
"Hunter",
"Timothy",
""
],
[
"Abbeel",
"Pieter",
""
],
[
"Bayen",
"Alexandre",
""
]
] | TITLE: The path inference filter: model-based low-latency map matching of probe
vehicle data
ABSTRACT: We consider the problem of reconstructing vehicle trajectories from sparse
sequences of GPS points, for which the sampling interval is between 10 seconds
and 2 minutes. We introduce a new class of algorithms, called altogether path
inference filter (PIF), that maps GPS data in real time, for a variety of
trade-offs and scenarios, and with a high throughput. Numerous prior approaches
in map-matching can be shown to be special cases of the path inference filter
presented in this article. We present an efficient procedure for automatically
training the filter on new data, with or without ground truth observations. The
framework is evaluated on a large San Francisco taxi dataset and is shown to
improve upon the current state of the art. This filter also provides insights
about driving patterns of drivers. The path inference filter has been deployed
at an industrial scale inside the Mobile Millennium traffic information system,
and is used to map fleets of data in San Francisco, Sacramento, Stockholm and
Porto.
| no_new_dataset | 0.949949 |
1109.3791 | Fangfei Zhou | Fangfei Zhou, Liang Zhang, Eric Franco, Richard Revis, Alan Mislove,
Ravi Sundaram | WebCloud: Recruiting web browsers for content distribution | This paper is withdraw by the author because we don't want to make it
publicly available for now | null | null | null | cs.SI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We are at the beginning of a shift in how content is created and exchanged
over the web. While content was previously created primarily by a small set of
entities, today, individual users -- empowered by devices like digital cameras
and services like online social networks -- are creating content that
represents a significant fraction of Internet traffic. As a result, content
today is increasingly generated and exchanged at the edge of the network.
Unfortunately, the existing techniques and infrastructure that are still used
to serve this content, such as centralized content distribution networks, are
ill-suited for these new patterns of content exchange. In this paper, we take a
first step towards addressing this situation by introducing WebCloud, a content
distribution system for online social networking sites that works by re-
purposing web browsers to help serve content. In other words, when a user
browses content, WebCloud tries to fetch it from one of that user's friend's
browsers, instead of from the social networking site. The result is a more
direct exchange of content ; essentially, WebCloud leverages the spatial and
temporal locality of interest between social network users. Because WebCloud is
built using techniques already present in many web browsers, it can be applied
today to many social networking sites. We demonstrate the practicality of
WebCloud with microbenchmarks, simulations, and a prototype deployment.
| [
{
"version": "v1",
"created": "Sat, 17 Sep 2011 15:28:07 GMT"
},
{
"version": "v2",
"created": "Wed, 21 Sep 2011 21:12:24 GMT"
}
] | 2015-03-19T00:00:00 | [
[
"Zhou",
"Fangfei",
""
],
[
"Zhang",
"Liang",
""
],
[
"Franco",
"Eric",
""
],
[
"Revis",
"Richard",
""
],
[
"Mislove",
"Alan",
""
],
[
"Sundaram",
"Ravi",
""
]
] | TITLE: WebCloud: Recruiting web browsers for content distribution
ABSTRACT: We are at the beginning of a shift in how content is created and exchanged
over the web. While content was previously created primarily by a small set of
entities, today, individual users -- empowered by devices like digital cameras
and services like online social networks -- are creating content that
represents a significant fraction of Internet traffic. As a result, content
today is increasingly generated and exchanged at the edge of the network.
Unfortunately, the existing techniques and infrastructure that are still used
to serve this content, such as centralized content distribution networks, are
ill-suited for these new patterns of content exchange. In this paper, we take a
first step towards addressing this situation by introducing WebCloud, a content
distribution system for online social networking sites that works by re-
purposing web browsers to help serve content. In other words, when a user
browses content, WebCloud tries to fetch it from one of that user's friend's
browsers, instead of from the social networking site. The result is a more
direct exchange of content ; essentially, WebCloud leverages the spatial and
temporal locality of interest between social network users. Because WebCloud is
built using techniques already present in many web browsers, it can be applied
today to many social networking sites. We demonstrate the practicality of
WebCloud with microbenchmarks, simulations, and a prototype deployment.
| no_new_dataset | 0.935405 |
1109.4684 | Zhiwu Lu | Zhiwu Lu, Horace H.S. Ip, Yuxin Peng | Exhaustive and Efficient Constraint Propagation: A Semi-Supervised
Learning Perspective and Its Applications | The short version of this paper appears as oral paper in ECCV 2010 | International Journal of Computer Vision (IJCV), 2012 | 10.1007/s11263-012-0602-z | null | cs.AI cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper presents a novel pairwise constraint propagation approach by
decomposing the challenging constraint propagation problem into a set of
independent semi-supervised learning subproblems which can be solved in
quadratic time using label propagation based on k-nearest neighbor graphs.
Considering that this time cost is proportional to the number of all possible
pairwise constraints, our approach actually provides an efficient solution for
exhaustively propagating pairwise constraints throughout the entire dataset.
The resulting exhaustive set of propagated pairwise constraints are further
used to adjust the similarity matrix for constrained spectral clustering. Other
than the traditional constraint propagation on single-source data, our approach
is also extended to more challenging constraint propagation on multi-source
data where each pairwise constraint is defined over a pair of data points from
different sources. This multi-source constraint propagation has an important
application to cross-modal multimedia retrieval. Extensive results have shown
the superior performance of our approach.
| [
{
"version": "v1",
"created": "Thu, 22 Sep 2011 00:56:22 GMT"
}
] | 2015-03-19T00:00:00 | [
[
"Lu",
"Zhiwu",
""
],
[
"Ip",
"Horace H. S.",
""
],
[
"Peng",
"Yuxin",
""
]
] | TITLE: Exhaustive and Efficient Constraint Propagation: A Semi-Supervised
Learning Perspective and Its Applications
ABSTRACT: This paper presents a novel pairwise constraint propagation approach by
decomposing the challenging constraint propagation problem into a set of
independent semi-supervised learning subproblems which can be solved in
quadratic time using label propagation based on k-nearest neighbor graphs.
Considering that this time cost is proportional to the number of all possible
pairwise constraints, our approach actually provides an efficient solution for
exhaustively propagating pairwise constraints throughout the entire dataset.
The resulting exhaustive set of propagated pairwise constraints are further
used to adjust the similarity matrix for constrained spectral clustering. Other
than the traditional constraint propagation on single-source data, our approach
is also extended to more challenging constraint propagation on multi-source
data where each pairwise constraint is defined over a pair of data points from
different sources. This multi-source constraint propagation has an important
application to cross-modal multimedia retrieval. Extensive results have shown
the superior performance of our approach.
| no_new_dataset | 0.945197 |
1109.4979 | Zhiwu Lu | Zhiwu Lu, Yuxin Peng | Latent Semantic Learning with Structured Sparse Representation for Human
Action Recognition | The short version of this paper appears in ICCV 2011 | null | 10.1016/j.patcog.2012.09.027 | null | cs.MM cs.AI cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper proposes a novel latent semantic learning method for extracting
high-level features (i.e. latent semantics) from a large vocabulary of abundant
mid-level features (i.e. visual keywords) with structured sparse
representation, which can help to bridge the semantic gap in the challenging
task of human action recognition. To discover the manifold structure of
midlevel features, we develop a spectral embedding approach to latent semantic
learning based on L1-graph, without the need to tune any parameter for graph
construction as a key step of manifold learning. More importantly, we construct
the L1-graph with structured sparse representation, which can be obtained by
structured sparse coding with its structured sparsity ensured by novel L1-norm
hypergraph regularization over mid-level features. In the new embedding space,
we learn latent semantics automatically from abundant mid-level features
through spectral clustering. The learnt latent semantics can be readily used
for human action recognition with SVM by defining a histogram intersection
kernel. Different from the traditional latent semantic analysis based on topic
models, our latent semantic learning method can explore the manifold structure
of mid-level features in both L1-graph construction and spectral embedding,
which results in compact but discriminative high-level features. The
experimental results on the commonly used KTH action dataset and unconstrained
YouTube action dataset show the superior performance of our method.
| [
{
"version": "v1",
"created": "Fri, 23 Sep 2011 00:39:51 GMT"
}
] | 2015-03-19T00:00:00 | [
[
"Lu",
"Zhiwu",
""
],
[
"Peng",
"Yuxin",
""
]
] | TITLE: Latent Semantic Learning with Structured Sparse Representation for Human
Action Recognition
ABSTRACT: This paper proposes a novel latent semantic learning method for extracting
high-level features (i.e. latent semantics) from a large vocabulary of abundant
mid-level features (i.e. visual keywords) with structured sparse
representation, which can help to bridge the semantic gap in the challenging
task of human action recognition. To discover the manifold structure of
midlevel features, we develop a spectral embedding approach to latent semantic
learning based on L1-graph, without the need to tune any parameter for graph
construction as a key step of manifold learning. More importantly, we construct
the L1-graph with structured sparse representation, which can be obtained by
structured sparse coding with its structured sparsity ensured by novel L1-norm
hypergraph regularization over mid-level features. In the new embedding space,
we learn latent semantics automatically from abundant mid-level features
through spectral clustering. The learnt latent semantics can be readily used
for human action recognition with SVM by defining a histogram intersection
kernel. Different from the traditional latent semantic analysis based on topic
models, our latent semantic learning method can explore the manifold structure
of mid-level features in both L1-graph construction and spectral embedding,
which results in compact but discriminative high-level features. The
experimental results on the commonly used KTH action dataset and unconstrained
YouTube action dataset show the superior performance of our method.
| no_new_dataset | 0.946941 |
1109.6073 | Julian Heinrich | Julian Heinrich, Yuan Luo, Arthur E. Kirkpatrick, Hao Zhang, Daniel
Weiskopf | Evaluation of a Bundling Technique for Parallel Coordinates | null | null | null | TR-2011-08 | cs.GR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We describe a technique for bundled curve representations in
parallel-coordinates plots and present a controlled user study evaluating their
effectiveness. Replacing the traditional C^0 polygonal lines by C^1 continuous
piecewise Bezier curves makes it easier to visually trace data points through
each coordinate axis. The resulting Bezier curves can then be bundled to
visualize data with given cluster structures. Curve bundles are efficient to
compute, provide visual separation between data clusters, reduce visual
clutter, and present a clearer overview of the dataset. A controlled user study
with 14 participants confirmed the effectiveness of curve bundling for
parallel-coordinates visualization: 1) compared to polygonal lines, it is
equally capable of revealing correlations between neighboring data attributes;
2) its geometric cues can be effective in displaying cluster information. For
some datasets curve bundling allows the color perceptual channel to be applied
to other data attributes, while for complex cluster patterns, bundling and
color can represent clustering far more clearly than either alone.
| [
{
"version": "v1",
"created": "Wed, 28 Sep 2011 01:44:43 GMT"
}
] | 2015-03-19T00:00:00 | [
[
"Heinrich",
"Julian",
""
],
[
"Luo",
"Yuan",
""
],
[
"Kirkpatrick",
"Arthur E.",
""
],
[
"Zhang",
"Hao",
""
],
[
"Weiskopf",
"Daniel",
""
]
] | TITLE: Evaluation of a Bundling Technique for Parallel Coordinates
ABSTRACT: We describe a technique for bundled curve representations in
parallel-coordinates plots and present a controlled user study evaluating their
effectiveness. Replacing the traditional C^0 polygonal lines by C^1 continuous
piecewise Bezier curves makes it easier to visually trace data points through
each coordinate axis. The resulting Bezier curves can then be bundled to
visualize data with given cluster structures. Curve bundles are efficient to
compute, provide visual separation between data clusters, reduce visual
clutter, and present a clearer overview of the dataset. A controlled user study
with 14 participants confirmed the effectiveness of curve bundling for
parallel-coordinates visualization: 1) compared to polygonal lines, it is
equally capable of revealing correlations between neighboring data attributes;
2) its geometric cues can be effective in displaying cluster information. For
some datasets curve bundling allows the color perceptual channel to be applied
to other data attributes, while for complex cluster patterns, bundling and
color can represent clustering far more clearly than either alone.
| no_new_dataset | 0.951908 |
1111.0753 | Sourav Dutta | Sourav Dutta, Souvik Bhattacherjee and Ankur Narang | Towards "Intelligent Compression" in Streams: A Biased Reservoir
Sampling based Bloom Filter Approach | 11 pages, 8 figures, 5 tables | null | null | IBM TechReport RI11015 | cs.IR cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | With the explosion of information stored world-wide,data intensive computing
has become a central area of research.Efficient management and processing of
this massively exponential amount of data from diverse sources,such as
telecommunication call data records,online transaction records,etc.,has become
a necessity.Removing redundancy from such huge(multi-billion records) datasets
resulting in resource and compute efficiency for downstream processing
constitutes an important area of study. "Intelligent compression" or
deduplication in streaming scenarios,for precise identification and elimination
of duplicates from the unbounded datastream is a greater challenge given the
realtime nature of data arrival.Stable Bloom Filters(SBF) address this problem
to a certain extent.However,SBF suffers from a high false negative rate(FNR)
and slow convergence rate,thereby rendering it inefficient for applications
with low FNR tolerance.In this paper, we present a novel Reservoir Sampling
based Bloom Filter,(RSBF) data structure,based on the combined concepts of
reservoir sampling and Bloom filters for approximate detection of duplicates in
data streams.Using detailed theoretical analysis we prove analytical bounds on
its false positive rate(FPR),false negative rate(FNR) and convergence rates
with low memory requirements.We show that RSBF offers the currently lowest FN
and convergence rates,and are better than those of SBF while using the same
memory.Using empirical analysis on real-world datasets(3 million records) and
synthetic datasets with around 1 billion records,we demonstrate upto 2x
improvement in FNR with better convergence rates as compared to SBF,while
exhibiting comparable FPR.To the best of our knowledge,this is the first
attempt to integrate reservoir sampling method with Bloom filters for
deduplication in streaming scenarios.
| [
{
"version": "v1",
"created": "Thu, 3 Nov 2011 08:45:44 GMT"
}
] | 2015-03-19T00:00:00 | [
[
"Dutta",
"Sourav",
""
],
[
"Bhattacherjee",
"Souvik",
""
],
[
"Narang",
"Ankur",
""
]
] | TITLE: Towards "Intelligent Compression" in Streams: A Biased Reservoir
Sampling based Bloom Filter Approach
ABSTRACT: With the explosion of information stored world-wide,data intensive computing
has become a central area of research.Efficient management and processing of
this massively exponential amount of data from diverse sources,such as
telecommunication call data records,online transaction records,etc.,has become
a necessity.Removing redundancy from such huge(multi-billion records) datasets
resulting in resource and compute efficiency for downstream processing
constitutes an important area of study. "Intelligent compression" or
deduplication in streaming scenarios,for precise identification and elimination
of duplicates from the unbounded datastream is a greater challenge given the
realtime nature of data arrival.Stable Bloom Filters(SBF) address this problem
to a certain extent.However,SBF suffers from a high false negative rate(FNR)
and slow convergence rate,thereby rendering it inefficient for applications
with low FNR tolerance.In this paper, we present a novel Reservoir Sampling
based Bloom Filter,(RSBF) data structure,based on the combined concepts of
reservoir sampling and Bloom filters for approximate detection of duplicates in
data streams.Using detailed theoretical analysis we prove analytical bounds on
its false positive rate(FPR),false negative rate(FNR) and convergence rates
with low memory requirements.We show that RSBF offers the currently lowest FN
and convergence rates,and are better than those of SBF while using the same
memory.Using empirical analysis on real-world datasets(3 million records) and
synthetic datasets with around 1 billion records,we demonstrate upto 2x
improvement in FNR with better convergence rates as compared to SBF,while
exhibiting comparable FPR.To the best of our knowledge,this is the first
attempt to integrate reservoir sampling method with Bloom filters for
deduplication in streaming scenarios.
| no_new_dataset | 0.950134 |
1111.1497 | Rishiraj Saha Roy | Rishiraj Saha Roy, Niloy Ganguly, Monojit Choudhury and Srivatsan
Laxman | An IR-based Evaluation Framework for Web Search Query Segmentation | null | null | null | null | cs.IR | http://creativecommons.org/licenses/by/3.0/ | This paper presents the first evaluation framework for Web search query
segmentation based directly on IR performance. In the past, segmentation
strategies were mainly validated against manual annotations. Our work shows
that the goodness of a segmentation algorithm as judged through evaluation
against a handful of human annotated segmentations hardly reflects its
effectiveness in an IR-based setup. In fact, state-of the-art algorithms are
shown to perform as good as, and sometimes even better than human annotations
-- a fact masked by previous validations. The proposed framework also provides
us an objective understanding of the gap between the present best and the best
possible segmentation algorithm. We draw these conclusions based on an
extensive evaluation of six segmentation strategies, including three most
recent algorithms, vis-a-vis segmentations from three human annotators. The
evaluation framework also gives insights about which segments should be
necessarily detected by an algorithm for achieving the best retrieval results.
The meticulously constructed dataset used in our experiments has been made
public for use by the research community.
| [
{
"version": "v1",
"created": "Mon, 7 Nov 2011 07:26:27 GMT"
},
{
"version": "v2",
"created": "Sun, 18 Dec 2011 17:33:28 GMT"
},
{
"version": "v3",
"created": "Tue, 20 Dec 2011 11:22:38 GMT"
},
{
"version": "v4",
"created": "Tue, 18 Sep 2012 03:26:22 GMT"
}
] | 2015-03-19T00:00:00 | [
[
"Roy",
"Rishiraj Saha",
""
],
[
"Ganguly",
"Niloy",
""
],
[
"Choudhury",
"Monojit",
""
],
[
"Laxman",
"Srivatsan",
""
]
] | TITLE: An IR-based Evaluation Framework for Web Search Query Segmentation
ABSTRACT: This paper presents the first evaluation framework for Web search query
segmentation based directly on IR performance. In the past, segmentation
strategies were mainly validated against manual annotations. Our work shows
that the goodness of a segmentation algorithm as judged through evaluation
against a handful of human annotated segmentations hardly reflects its
effectiveness in an IR-based setup. In fact, state-of the-art algorithms are
shown to perform as good as, and sometimes even better than human annotations
-- a fact masked by previous validations. The proposed framework also provides
us an objective understanding of the gap between the present best and the best
possible segmentation algorithm. We draw these conclusions based on an
extensive evaluation of six segmentation strategies, including three most
recent algorithms, vis-a-vis segmentations from three human annotators. The
evaluation framework also gives insights about which segments should be
necessarily detected by an algorithm for achieving the best retrieval results.
The meticulously constructed dataset used in our experiments has been made
public for use by the research community.
| new_dataset | 0.953837 |
1111.2451 | Ay\c{c}a \"Oz\c{c}elikkale | Ay\c{c}a \"Oz\c{c}elikkale, Serdar Y\"uksel, Haldun M. Ozaktas | Unitary Precoding and Basis Dependency of MMSE Performance for Gaussian
Erasure Channels | Accepted for publication in IEEE Transactions on Information Theory | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider the transmission of a Gaussian vector source over a
multi-dimensional Gaussian channel where a random or a fixed subset of the
channel outputs are erased. Within the setup where the only encoding operation
allowed is a linear unitary transformation on the source, we investigate the
MMSE performance, both in average, and also in terms of guarantees that hold
with high probability as a function of the system parameters. Under the
performance criterion of average MMSE, necessary conditions that should be
satisfied by the optimal unitary encoders are established and explicit
solutions for a class of settings are presented. For random sampling of signals
that have a low number of degrees of freedom, we present MMSE bounds that hold
with high probability. Our results illustrate how the spread of the eigenvalue
distribution and the unitary transformation contribute to these performance
guarantees. The performance of the discrete Fourier transform (DFT) is also
investigated. As a benchmark, we investigate the equidistant sampling of
circularly wide-sense stationary (c.w.s.s.) signals, and present the explicit
error expression that quantifies the effects of the sampling rate and the
eigenvalue distribution of the covariance matrix of the signal.
These findings may be useful in understanding the geometric dependence of
signal uncertainty in a stochastic process. In particular, unlike information
theoretic measures such as entropy, we highlight the basis dependence of
uncertainty in a signal with another perspective. The unitary encoding space
restriction exhibits the most and least favorable signal bases for estimation.
| [
{
"version": "v1",
"created": "Thu, 10 Nov 2011 11:52:40 GMT"
},
{
"version": "v2",
"created": "Fri, 16 Nov 2012 14:29:21 GMT"
},
{
"version": "v3",
"created": "Thu, 28 Nov 2013 13:27:06 GMT"
},
{
"version": "v4",
"created": "Sat, 13 Sep 2014 11:26:17 GMT"
}
] | 2015-03-19T00:00:00 | [
[
"Özçelikkale",
"Ayça",
""
],
[
"Yüksel",
"Serdar",
""
],
[
"Ozaktas",
"Haldun M.",
""
]
] | TITLE: Unitary Precoding and Basis Dependency of MMSE Performance for Gaussian
Erasure Channels
ABSTRACT: We consider the transmission of a Gaussian vector source over a
multi-dimensional Gaussian channel where a random or a fixed subset of the
channel outputs are erased. Within the setup where the only encoding operation
allowed is a linear unitary transformation on the source, we investigate the
MMSE performance, both in average, and also in terms of guarantees that hold
with high probability as a function of the system parameters. Under the
performance criterion of average MMSE, necessary conditions that should be
satisfied by the optimal unitary encoders are established and explicit
solutions for a class of settings are presented. For random sampling of signals
that have a low number of degrees of freedom, we present MMSE bounds that hold
with high probability. Our results illustrate how the spread of the eigenvalue
distribution and the unitary transformation contribute to these performance
guarantees. The performance of the discrete Fourier transform (DFT) is also
investigated. As a benchmark, we investigate the equidistant sampling of
circularly wide-sense stationary (c.w.s.s.) signals, and present the explicit
error expression that quantifies the effects of the sampling rate and the
eigenvalue distribution of the covariance matrix of the signal.
These findings may be useful in understanding the geometric dependence of
signal uncertainty in a stochastic process. In particular, unlike information
theoretic measures such as entropy, we highlight the basis dependence of
uncertainty in a signal with another perspective. The unitary encoding space
restriction exhibits the most and least favorable signal bases for estimation.
| no_new_dataset | 0.948965 |
1111.4297 | Cheng Chen | Cheng Chen, Kui Wu, Venkatesh Srinivasan, Xudong Zhang | Battling the Internet Water Army: Detection of Hidden Paid Posters | 10 pages, 13 figures | null | null | null | cs.SI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We initiate a systematic study to help distinguish a special group of online
users, called hidden paid posters, or termed "Internet water army" in China,
from the legitimate ones. On the Internet, the paid posters represent a new
type of online job opportunity. They get paid for posting comments and new
threads or articles on different online communities and websites for some
hidden purposes, e.g., to influence the opinion of other people towards certain
social events or business markets. Though an interesting strategy in business
marketing, paid posters may create a significant negative effect on the online
communities, since the information from paid posters is usually not
trustworthy. When two competitive companies hire paid posters to post fake news
or negative comments about each other, normal online users may feel overwhelmed
and find it difficult to put any trust in the information they acquire from the
Internet. In this paper, we thoroughly investigate the behavioral pattern of
online paid posters based on real-world trace data. We design and validate a
new detection mechanism, using both non-semantic analysis and semantic
analysis, to identify potential online paid posters. Our test results with
real-world datasets show a very promising performance.
| [
{
"version": "v1",
"created": "Fri, 18 Nov 2011 08:21:58 GMT"
}
] | 2015-03-19T00:00:00 | [
[
"Chen",
"Cheng",
""
],
[
"Wu",
"Kui",
""
],
[
"Srinivasan",
"Venkatesh",
""
],
[
"Zhang",
"Xudong",
""
]
] | TITLE: Battling the Internet Water Army: Detection of Hidden Paid Posters
ABSTRACT: We initiate a systematic study to help distinguish a special group of online
users, called hidden paid posters, or termed "Internet water army" in China,
from the legitimate ones. On the Internet, the paid posters represent a new
type of online job opportunity. They get paid for posting comments and new
threads or articles on different online communities and websites for some
hidden purposes, e.g., to influence the opinion of other people towards certain
social events or business markets. Though an interesting strategy in business
marketing, paid posters may create a significant negative effect on the online
communities, since the information from paid posters is usually not
trustworthy. When two competitive companies hire paid posters to post fake news
or negative comments about each other, normal online users may feel overwhelmed
and find it difficult to put any trust in the information they acquire from the
Internet. In this paper, we thoroughly investigate the behavioral pattern of
online paid posters based on real-world trace data. We design and validate a
new detection mechanism, using both non-semantic analysis and semantic
analysis, to identify potential online paid posters. Our test results with
real-world datasets show a very promising performance.
| no_new_dataset | 0.943764 |
1111.6937 | Matteo Riondato | Matteo Riondato and Eli Upfal | Efficient Discovery of Association Rules and Frequent Itemsets through
Sampling with Tight Performance Guarantees | 19 pages, 7 figures. A shorter version of this paper appeared in the
proceedings of ECML PKDD 2012 | null | null | null | cs.DS cs.DB cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The tasks of extracting (top-$K$) Frequent Itemsets (FI's) and Association
Rules (AR's) are fundamental primitives in data mining and database
applications. Exact algorithms for these problems exist and are widely used,
but their running time is hindered by the need of scanning the entire dataset,
possibly multiple times. High quality approximations of FI's and AR's are
sufficient for most practical uses, and a number of recent works explored the
application of sampling for fast discovery of approximate solutions to the
problems. However, these works do not provide satisfactory performance
guarantees on the quality of the approximation, due to the difficulty of
bounding the probability of under- or over-sampling any one of an unknown
number of frequent itemsets. In this work we circumvent this issue by applying
the statistical concept of \emph{Vapnik-Chervonenkis (VC) dimension} to develop
a novel technique for providing tight bounds on the sample size that guarantees
approximation within user-specified parameters. Our technique applies both to
absolute and to relative approximations of (top-$K$) FI's and AR's. The
resulting sample size is linearly dependent on the VC-dimension of a range
space associated with the dataset to be mined. The main theoretical
contribution of this work is a proof that the VC-dimension of this range space
is upper bounded by an easy-to-compute characteristic quantity of the dataset
which we call \emph{d-index}, and is the maximum integer $d$ such that the
dataset contains at least $d$ transactions of length at least $d$ such that no
one of them is a superset of or equal to another. We show that this bound is
strict for a large class of datasets.
| [
{
"version": "v1",
"created": "Tue, 29 Nov 2011 19:11:50 GMT"
},
{
"version": "v2",
"created": "Wed, 30 Nov 2011 14:45:50 GMT"
},
{
"version": "v3",
"created": "Tue, 24 Apr 2012 02:39:09 GMT"
},
{
"version": "v4",
"created": "Thu, 21 Jun 2012 12:56:59 GMT"
},
{
"version": "v5",
"created": "Mon, 10 Dec 2012 20:07:02 GMT"
},
{
"version": "v6",
"created": "Fri, 22 Feb 2013 14:32:31 GMT"
}
] | 2015-03-19T00:00:00 | [
[
"Riondato",
"Matteo",
""
],
[
"Upfal",
"Eli",
""
]
] | TITLE: Efficient Discovery of Association Rules and Frequent Itemsets through
Sampling with Tight Performance Guarantees
ABSTRACT: The tasks of extracting (top-$K$) Frequent Itemsets (FI's) and Association
Rules (AR's) are fundamental primitives in data mining and database
applications. Exact algorithms for these problems exist and are widely used,
but their running time is hindered by the need of scanning the entire dataset,
possibly multiple times. High quality approximations of FI's and AR's are
sufficient for most practical uses, and a number of recent works explored the
application of sampling for fast discovery of approximate solutions to the
problems. However, these works do not provide satisfactory performance
guarantees on the quality of the approximation, due to the difficulty of
bounding the probability of under- or over-sampling any one of an unknown
number of frequent itemsets. In this work we circumvent this issue by applying
the statistical concept of \emph{Vapnik-Chervonenkis (VC) dimension} to develop
a novel technique for providing tight bounds on the sample size that guarantees
approximation within user-specified parameters. Our technique applies both to
absolute and to relative approximations of (top-$K$) FI's and AR's. The
resulting sample size is linearly dependent on the VC-dimension of a range
space associated with the dataset to be mined. The main theoretical
contribution of this work is a proof that the VC-dimension of this range space
is upper bounded by an easy-to-compute characteristic quantity of the dataset
which we call \emph{d-index}, and is the maximum integer $d$ such that the
dataset contains at least $d$ transactions of length at least $d$ such that no
one of them is a superset of or equal to another. We show that this bound is
strict for a large class of datasets.
| no_new_dataset | 0.943452 |
1112.0564 | Ayan Chaudhury | Amlan Chakrabarti, Susmita Sur-Kolay, Ayan Chaudhury | Linear Nearest Neighbor Synthesis of Reversible Circuits by Graph
Partitioning | null | null | null | null | cs.ET quant-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Linear Nearest Neighbor (LNN) synthesis in reversible circuits has emerged as
an important issue in terms of technological implementation for quantum
computation. The objective is to obtain a LNN architecture with minimum gate
cost. As achieving optimal synthesis is a hard problem, heuristic methods have
been proposed in recent literature. In this work we present a graph
partitioning based approach for LNN synthesis with reduction in circuit cost.
In particular, the number of SWAP gates required to convert a given gate-level
quantum circuit to its equivalent LNN configuration is minimized. Our algorithm
determines the reordering of indices of the qubit line(s) for both single
control and multiple controlled gates. Experimental results for placing the
target qubits of Multiple Controlled Toffoli (MCT) library of benchmark
circuits show a significant reduction in gate count and quantum gate cost
compared to those of related research works.
| [
{
"version": "v1",
"created": "Fri, 2 Dec 2011 16:30:08 GMT"
},
{
"version": "v2",
"created": "Thu, 27 Dec 2012 03:02:39 GMT"
}
] | 2015-03-19T00:00:00 | [
[
"Chakrabarti",
"Amlan",
""
],
[
"Sur-Kolay",
"Susmita",
""
],
[
"Chaudhury",
"Ayan",
""
]
] | TITLE: Linear Nearest Neighbor Synthesis of Reversible Circuits by Graph
Partitioning
ABSTRACT: Linear Nearest Neighbor (LNN) synthesis in reversible circuits has emerged as
an important issue in terms of technological implementation for quantum
computation. The objective is to obtain a LNN architecture with minimum gate
cost. As achieving optimal synthesis is a hard problem, heuristic methods have
been proposed in recent literature. In this work we present a graph
partitioning based approach for LNN synthesis with reduction in circuit cost.
In particular, the number of SWAP gates required to convert a given gate-level
quantum circuit to its equivalent LNN configuration is minimized. Our algorithm
determines the reordering of indices of the qubit line(s) for both single
control and multiple controlled gates. Experimental results for placing the
target qubits of Multiple Controlled Toffoli (MCT) library of benchmark
circuits show a significant reduction in gate count and quantum gate cost
compared to those of related research works.
| no_new_dataset | 0.951549 |
1112.1245 | Mikael Vejdemo-Johansson | David Lipsky, Primoz Skraba, Mikael Vejdemo-Johansson | A spectral sequence for parallelized persistence | 15 pages, 10 figures, submitted to the ACM Symposium on Computational
Geometry | null | null | null | cs.CG cs.DC math.AT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We approach the problem of the computation of persistent homology for large
datasets by a divide-and-conquer strategy. Dividing the total space into
separate but overlapping components, we are able to limit the total memory
residency for any part of the computation, while not degrading the overall
complexity much. Locally computed persistence information is then merged from
the components and their intersections using a spectral sequence generalizing
the Mayer-Vietoris long exact sequence.
We describe the Mayer-Vietoris spectral sequence and give details on how to
compute with it. This allows us to merge local homological data into the global
persistent homology. Furthermore, we detail how the classical topology
constructions inherent in the spectral sequence adapt to a persistence
perspective, as well as describe the techniques from computational commutative
algebra necessary for this extension.
The resulting computational scheme suggests a parallelization scheme, and we
discuss the communication steps involved in this scheme. Furthermore, the
computational scheme can also serve as a guideline for which parts of the
boundary matrix manipulation need to co-exist in primary memory at any given
time allowing for stratified memory access in single-core computation. The
spectral sequence viewpoint also provides easy proofs of a homology nerve lemma
as well as a persistent homology nerve lemma. In addition, the algebraic tools
we develop to approch persistent homology provide a purely algebraic
formulation of kernel, image and cokernel persistence (D. Cohen-Steiner, H.
Edelsbrunner, J. Harer, and D. Morozov. Persistent homology for kernels,
images, and cokernels. In Proceedings of the twentieth Annual ACM-SIAM
Symposium on Discrete Algorithms, pages 1011-1020. Society for Industrial and
Applied Mathematics, 2009.)
| [
{
"version": "v1",
"created": "Tue, 6 Dec 2011 12:01:16 GMT"
}
] | 2015-03-19T00:00:00 | [
[
"Lipsky",
"David",
""
],
[
"Skraba",
"Primoz",
""
],
[
"Vejdemo-Johansson",
"Mikael",
""
]
] | TITLE: A spectral sequence for parallelized persistence
ABSTRACT: We approach the problem of the computation of persistent homology for large
datasets by a divide-and-conquer strategy. Dividing the total space into
separate but overlapping components, we are able to limit the total memory
residency for any part of the computation, while not degrading the overall
complexity much. Locally computed persistence information is then merged from
the components and their intersections using a spectral sequence generalizing
the Mayer-Vietoris long exact sequence.
We describe the Mayer-Vietoris spectral sequence and give details on how to
compute with it. This allows us to merge local homological data into the global
persistent homology. Furthermore, we detail how the classical topology
constructions inherent in the spectral sequence adapt to a persistence
perspective, as well as describe the techniques from computational commutative
algebra necessary for this extension.
The resulting computational scheme suggests a parallelization scheme, and we
discuss the communication steps involved in this scheme. Furthermore, the
computational scheme can also serve as a guideline for which parts of the
boundary matrix manipulation need to co-exist in primary memory at any given
time allowing for stratified memory access in single-core computation. The
spectral sequence viewpoint also provides easy proofs of a homology nerve lemma
as well as a persistent homology nerve lemma. In addition, the algebraic tools
we develop to approch persistent homology provide a purely algebraic
formulation of kernel, image and cokernel persistence (D. Cohen-Steiner, H.
Edelsbrunner, J. Harer, and D. Morozov. Persistent homology for kernels,
images, and cokernels. In Proceedings of the twentieth Annual ACM-SIAM
Symposium on Discrete Algorithms, pages 1011-1020. Society for Industrial and
Applied Mathematics, 2009.)
| no_new_dataset | 0.946001 |
1112.5404 | Purushottam Kar | Purushottam Kar and Prateek Jain | Similarity-based Learning via Data Driven Embeddings | To appear in the proceedings of NIPS 2011, 14 pages | null | null | null | cs.LG stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider the problem of classification using similarity/distance functions
over data. Specifically, we propose a framework for defining the goodness of a
(dis)similarity function with respect to a given learning task and propose
algorithms that have guaranteed generalization properties when working with
such good functions. Our framework unifies and generalizes the frameworks
proposed by [Balcan-Blum ICML 2006] and [Wang et al ICML 2007]. An attractive
feature of our framework is its adaptability to data - we do not promote a
fixed notion of goodness but rather let data dictate it. We show, by giving
theoretical guarantees that the goodness criterion best suited to a problem can
itself be learned which makes our approach applicable to a variety of domains
and problems. We propose a landmarking-based approach to obtaining a classifier
from such learned goodness criteria. We then provide a novel diversity based
heuristic to perform task-driven selection of landmark points instead of random
selection. We demonstrate the effectiveness of our goodness criteria learning
method as well as the landmark selection heuristic on a variety of
similarity-based learning datasets and benchmark UCI datasets on which our
method consistently outperforms existing approaches by a significant margin.
| [
{
"version": "v1",
"created": "Thu, 22 Dec 2011 18:08:27 GMT"
}
] | 2015-03-19T00:00:00 | [
[
"Kar",
"Purushottam",
""
],
[
"Jain",
"Prateek",
""
]
] | TITLE: Similarity-based Learning via Data Driven Embeddings
ABSTRACT: We consider the problem of classification using similarity/distance functions
over data. Specifically, we propose a framework for defining the goodness of a
(dis)similarity function with respect to a given learning task and propose
algorithms that have guaranteed generalization properties when working with
such good functions. Our framework unifies and generalizes the frameworks
proposed by [Balcan-Blum ICML 2006] and [Wang et al ICML 2007]. An attractive
feature of our framework is its adaptability to data - we do not promote a
fixed notion of goodness but rather let data dictate it. We show, by giving
theoretical guarantees that the goodness criterion best suited to a problem can
itself be learned which makes our approach applicable to a variety of domains
and problems. We propose a landmarking-based approach to obtaining a classifier
from such learned goodness criteria. We then provide a novel diversity based
heuristic to perform task-driven selection of landmark points instead of random
selection. We demonstrate the effectiveness of our goodness criteria learning
method as well as the landmark selection heuristic on a variety of
similarity-based learning datasets and benchmark UCI datasets on which our
method consistently outperforms existing approaches by a significant margin.
| no_new_dataset | 0.946695 |
1201.0233 | Marina Barsky | Marina Barsky, Sangkyum Kim, Tim Weninger, Jiawei Han | Mining Flipping Correlations from Large Datasets with Taxonomies | VLDB2012 | Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 4, pp.
370-381 (2011) | null | null | cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we introduce a new type of pattern -- a flipping correlation
pattern. The flipping patterns are obtained from contrasting the correlations
between items at different levels of abstraction. They represent surprising
correlations, both positive and negative, which are specific for a given
abstraction level, and which "flip" from positive to negative and vice versa
when items are generalized to a higher level of abstraction. We design an
efficient algorithm for finding flipping correlations, the Flipper algorithm,
which outperforms naive pattern mining methods by several orders of magnitude.
We apply Flipper to real-life datasets and show that the discovered patterns
are non-redundant, surprising and actionable. Flipper finds strong contrasting
correlations in itemsets with low-to-medium support, while existing techniques
cannot handle the pattern discovery in this frequency range.
| [
{
"version": "v1",
"created": "Sat, 31 Dec 2011 05:36:29 GMT"
}
] | 2015-03-19T00:00:00 | [
[
"Barsky",
"Marina",
""
],
[
"Kim",
"Sangkyum",
""
],
[
"Weninger",
"Tim",
""
],
[
"Han",
"Jiawei",
""
]
] | TITLE: Mining Flipping Correlations from Large Datasets with Taxonomies
ABSTRACT: In this paper we introduce a new type of pattern -- a flipping correlation
pattern. The flipping patterns are obtained from contrasting the correlations
between items at different levels of abstraction. They represent surprising
correlations, both positive and negative, which are specific for a given
abstraction level, and which "flip" from positive to negative and vice versa
when items are generalized to a higher level of abstraction. We design an
efficient algorithm for finding flipping correlations, the Flipper algorithm,
which outperforms naive pattern mining methods by several orders of magnitude.
We apply Flipper to real-life datasets and show that the discovered patterns
are non-redundant, surprising and actionable. Flipper finds strong contrasting
correlations in itemsets with low-to-medium support, while existing techniques
cannot handle the pattern discovery in this frequency range.
| no_new_dataset | 0.949248 |
1407.1425 | Junhao Zhang | Junhao Zhang, Tongfei Chen, Junfeng Hu | On the relationship between Gaussian stochastic blockmodels and label
propagation algorithms | 22 pages, 17 figures | J. Stat. Mech. (2015) P03009 | 10.1088/1742-5468/2015/03/P03009 | null | cs.SI physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The problem of community detection receives great attention in recent years.
Many methods have been proposed to discover communities in networks. In this
paper, we propose a Gaussian stochastic blockmodel that uses Gaussian
distributions to fit weight of edges in networks for non-overlapping community
detection. The maximum likelihood estimation of this model has the same
objective function as general label propagation with node preference. The node
preference of a specific vertex turns out to be a value proportional to the
intra-community eigenvector centrality (the corresponding entry in principal
eigenvector of the adjacency matrix of the subgraph inside that vertex's
community) under maximum likelihood estimation. Additionally, the maximum
likelihood estimation of a constrained version of our model is highly related
to another extension of label propagation algorithm, namely, the label
propagation algorithm under constraint. Experiments show that the proposed
Gaussian stochastic blockmodel performs well on various benchmark networks.
| [
{
"version": "v1",
"created": "Sat, 5 Jul 2014 18:28:09 GMT"
},
{
"version": "v2",
"created": "Wed, 24 Sep 2014 15:06:07 GMT"
},
{
"version": "v3",
"created": "Wed, 24 Dec 2014 09:49:36 GMT"
},
{
"version": "v4",
"created": "Tue, 27 Jan 2015 11:34:49 GMT"
}
] | 2015-03-19T00:00:00 | [
[
"Zhang",
"Junhao",
""
],
[
"Chen",
"Tongfei",
""
],
[
"Hu",
"Junfeng",
""
]
] | TITLE: On the relationship between Gaussian stochastic blockmodels and label
propagation algorithms
ABSTRACT: The problem of community detection receives great attention in recent years.
Many methods have been proposed to discover communities in networks. In this
paper, we propose a Gaussian stochastic blockmodel that uses Gaussian
distributions to fit weight of edges in networks for non-overlapping community
detection. The maximum likelihood estimation of this model has the same
objective function as general label propagation with node preference. The node
preference of a specific vertex turns out to be a value proportional to the
intra-community eigenvector centrality (the corresponding entry in principal
eigenvector of the adjacency matrix of the subgraph inside that vertex's
community) under maximum likelihood estimation. Additionally, the maximum
likelihood estimation of a constrained version of our model is highly related
to another extension of label propagation algorithm, namely, the label
propagation algorithm under constraint. Experiments show that the proposed
Gaussian stochastic blockmodel performs well on various benchmark networks.
| no_new_dataset | 0.951504 |
1409.5021 | Pengtao Xie | Pengtao Xie and Eric Xing | CryptGraph: Privacy Preserving Graph Analytics on Encrypted Graph | null | null | null | null | cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Many graph mining and analysis services have been deployed on the cloud,
which can alleviate users from the burden of implementing and maintaining graph
algorithms. However, putting graph analytics on the cloud can invade users'
privacy. To solve this problem, we propose CryptGraph, which runs graph
analytics on encrypted graph to preserve the privacy of both users' graph data
and the analytic results. In CryptGraph, users encrypt their graphs before
uploading them to the cloud. The cloud runs graph analysis on the encrypted
graphs and obtains results which are also in encrypted form that the cloud
cannot decipher. During the process of computing, the encrypted graphs are
never decrypted on the cloud side. The encrypted results are sent back to users
and users perform the decryption to obtain the plaintext results. In this
process, users' graphs and the analytics results are both encrypted and the
cloud knows neither of them. Thereby, users' privacy can be strongly protected.
Meanwhile, with the help of homomorphic encryption, the results analyzed from
the encrypted graphs are guaranteed to be correct. In this paper, we present
how to encrypt a graph using homomorphic encryption and how to query the
structure of an encrypted graph by computing polynomials. To solve the problem
that certain operations are not executable on encrypted graphs, we propose hard
computation outsourcing to seek help from users. Using two graph algorithms as
examples, we show how to apply our methods to perform analytics on encrypted
graphs. Experiments on two datasets demonstrate the correctness and feasibility
of our methods.
| [
{
"version": "v1",
"created": "Wed, 17 Sep 2014 15:11:06 GMT"
},
{
"version": "v2",
"created": "Wed, 18 Mar 2015 16:12:46 GMT"
}
] | 2015-03-19T00:00:00 | [
[
"Xie",
"Pengtao",
""
],
[
"Xing",
"Eric",
""
]
] | TITLE: CryptGraph: Privacy Preserving Graph Analytics on Encrypted Graph
ABSTRACT: Many graph mining and analysis services have been deployed on the cloud,
which can alleviate users from the burden of implementing and maintaining graph
algorithms. However, putting graph analytics on the cloud can invade users'
privacy. To solve this problem, we propose CryptGraph, which runs graph
analytics on encrypted graph to preserve the privacy of both users' graph data
and the analytic results. In CryptGraph, users encrypt their graphs before
uploading them to the cloud. The cloud runs graph analysis on the encrypted
graphs and obtains results which are also in encrypted form that the cloud
cannot decipher. During the process of computing, the encrypted graphs are
never decrypted on the cloud side. The encrypted results are sent back to users
and users perform the decryption to obtain the plaintext results. In this
process, users' graphs and the analytics results are both encrypted and the
cloud knows neither of them. Thereby, users' privacy can be strongly protected.
Meanwhile, with the help of homomorphic encryption, the results analyzed from
the encrypted graphs are guaranteed to be correct. In this paper, we present
how to encrypt a graph using homomorphic encryption and how to query the
structure of an encrypted graph by computing polynomials. To solve the problem
that certain operations are not executable on encrypted graphs, we propose hard
computation outsourcing to seek help from users. Using two graph algorithms as
examples, we show how to apply our methods to perform analytics on encrypted
graphs. Experiments on two datasets demonstrate the correctness and feasibility
of our methods.
| no_new_dataset | 0.951142 |
1411.4351 | Jacob Eisenstein | Vinodh Krishnan and Jacob Eisenstein | "You're Mr. Lebowski, I'm the Dude": Inducing Address Term Formality in
Signed Social Networks | In Proceedings of NAACL-HLT 2015 | null | null | null | cs.SI physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present an unsupervised model for inducing signed social networks from the
content exchanged across network edges. Inference in this model solves three
problems simultaneously: (1) identifying the sign of each edge; (2)
characterizing the distribution over content for each edge type; (3) estimating
weights for triadic features that map to theoretical models such as structural
balance. We apply this model to the problem of inducing the social function of
address terms, such as 'Madame', 'comrade', and 'dude'. On a dataset of movie
scripts, our system obtains a coherent clustering of address terms, while at
the same time making intuitively plausible judgments of the formality of social
relations in each film. As an additional contribution, we provide a
bootstrapping technique for identifying and tagging address terms in dialogue.
| [
{
"version": "v1",
"created": "Mon, 17 Nov 2014 03:33:27 GMT"
},
{
"version": "v2",
"created": "Tue, 17 Mar 2015 22:20:22 GMT"
}
] | 2015-03-19T00:00:00 | [
[
"Krishnan",
"Vinodh",
""
],
[
"Eisenstein",
"Jacob",
""
]
] | TITLE: "You're Mr. Lebowski, I'm the Dude": Inducing Address Term Formality in
Signed Social Networks
ABSTRACT: We present an unsupervised model for inducing signed social networks from the
content exchanged across network edges. Inference in this model solves three
problems simultaneously: (1) identifying the sign of each edge; (2)
characterizing the distribution over content for each edge type; (3) estimating
weights for triadic features that map to theoretical models such as structural
balance. We apply this model to the problem of inducing the social function of
address terms, such as 'Madame', 'comrade', and 'dude'. On a dataset of movie
scripts, our system obtains a coherent clustering of address terms, while at
the same time making intuitively plausible judgments of the formality of social
relations in each film. As an additional contribution, we provide a
bootstrapping technique for identifying and tagging address terms in dialogue.
| no_new_dataset | 0.949809 |
1503.02675 | Clemens Arth | Clemens Arth, Christian Pirchheim, Jonathan Ventura, Vincent Lepetit | Global 6DOF Pose Estimation from Untextured 2D City Models | 9 pages excluding supplementary material | null | null | null | cs.CV | http://creativecommons.org/licenses/by/3.0/ | We propose a method for estimating the 3D pose for the camera of a mobile
device in outdoor conditions, using only an untextured 2D model. Previous
methods compute only a relative pose using a SLAM algorithm, or require many
registered images, which are cumbersome to acquire. By contrast, our method
returns an accurate, absolute camera pose in an absolute referential using
simple 2D+height maps, which are broadly available, to refine a first estimate
of the pose provided by the device's sensors. We show how to first estimate the
camera absolute orientation from straight line segments, and then how to
estimate the translation by aligning the 2D map with a semantic segmentation of
the input image. We demonstrate the robustness and accuracy of our approach on
a challenging dataset.
| [
{
"version": "v1",
"created": "Mon, 9 Mar 2015 20:18:19 GMT"
},
{
"version": "v2",
"created": "Wed, 18 Mar 2015 12:11:35 GMT"
}
] | 2015-03-19T00:00:00 | [
[
"Arth",
"Clemens",
""
],
[
"Pirchheim",
"Christian",
""
],
[
"Ventura",
"Jonathan",
""
],
[
"Lepetit",
"Vincent",
""
]
] | TITLE: Global 6DOF Pose Estimation from Untextured 2D City Models
ABSTRACT: We propose a method for estimating the 3D pose for the camera of a mobile
device in outdoor conditions, using only an untextured 2D model. Previous
methods compute only a relative pose using a SLAM algorithm, or require many
registered images, which are cumbersome to acquire. By contrast, our method
returns an accurate, absolute camera pose in an absolute referential using
simple 2D+height maps, which are broadly available, to refine a first estimate
of the pose provided by the device's sensors. We show how to first estimate the
camera absolute orientation from straight line segments, and then how to
estimate the translation by aligning the 2D map with a semantic segmentation of
the input image. We demonstrate the robustness and accuracy of our approach on
a challenging dataset.
| no_new_dataset | 0.948585 |
1503.05187 | Khaled Fawagreh | Khaled Fawagreh, Mohamad Medhat Gaber, Eyad Elyan | An Outlier Detection-based Tree Selection Approach to Extreme Pruning of
Random Forests | 21 pages, 4 Figures. arXiv admin note: substantial text overlap with
arXiv:1503.04996 | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Random Forest (RF) is an ensemble classification technique that was developed
by Breiman over a decade ago. Compared with other ensemble techniques, it has
proved its accuracy and superiority. Many researchers, however, believe that
there is still room for enhancing and improving its performance in terms of
predictive accuracy. This explains why, over the past decade, there have been
many extensions of RF where each extension employed a variety of techniques and
strategies to improve certain aspect(s) of RF. Since it has been proven
empirically that ensembles tend to yield better results when there is a
significant diversity among the constituent models, the objective of this paper
is twofolds. First, it investigates how an unsupervised learning technique,
namely, Local Outlier Factor (LOF) can be used to identify diverse trees in the
RF. Second, trees with the highest LOF scores are then used to produce an
extension of RF termed LOFB-DRF that is much smaller in size than RF, and yet
performs at least as good as RF, but mostly exhibits higher performance in
terms of accuracy. The latter refers to a known technique called ensemble
pruning. Experimental results on 10 real datasets prove the superiority of our
proposed extension over the traditional RF. Unprecedented pruning levels
reaching 99% have been achieved at the time of boosting the predictive accuracy
of the ensemble. The notably high pruning level makes the technique a good
candidate for real-time applications.
| [
{
"version": "v1",
"created": "Tue, 17 Mar 2015 11:05:31 GMT"
}
] | 2015-03-19T00:00:00 | [
[
"Fawagreh",
"Khaled",
""
],
[
"Gaber",
"Mohamad Medhat",
""
],
[
"Elyan",
"Eyad",
""
]
] | TITLE: An Outlier Detection-based Tree Selection Approach to Extreme Pruning of
Random Forests
ABSTRACT: Random Forest (RF) is an ensemble classification technique that was developed
by Breiman over a decade ago. Compared with other ensemble techniques, it has
proved its accuracy and superiority. Many researchers, however, believe that
there is still room for enhancing and improving its performance in terms of
predictive accuracy. This explains why, over the past decade, there have been
many extensions of RF where each extension employed a variety of techniques and
strategies to improve certain aspect(s) of RF. Since it has been proven
empirically that ensembles tend to yield better results when there is a
significant diversity among the constituent models, the objective of this paper
is twofolds. First, it investigates how an unsupervised learning technique,
namely, Local Outlier Factor (LOF) can be used to identify diverse trees in the
RF. Second, trees with the highest LOF scores are then used to produce an
extension of RF termed LOFB-DRF that is much smaller in size than RF, and yet
performs at least as good as RF, but mostly exhibits higher performance in
terms of accuracy. The latter refers to a known technique called ensemble
pruning. Experimental results on 10 real datasets prove the superiority of our
proposed extension over the traditional RF. Unprecedented pruning levels
reaching 99% have been achieved at the time of boosting the predictive accuracy
of the ensemble. The notably high pruning level makes the technique a good
candidate for real-time applications.
| no_new_dataset | 0.948537 |
1503.05296 | Omar Al-Jarrah | O. Y. Al-Jarrah, P. D. Yoo, S Muhaidat, G. K. Karagiannidis, and K.
Taha | Efficient Machine Learning for Big Data: A Review | null | null | null | null | cs.LG cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | With the emerging technologies and all associated devices, it is predicted
that massive amount of data will be created in the next few years, in fact, as
much as 90% of current data were created in the last couple of years,a trend
that will continue for the foreseeable future. Sustainable computing studies
the process by which computer engineer/scientist designs computers and
associated subsystems efficiently and effectively with minimal impact on the
environment. However, current intelligent machine-learning systems are
performance driven, the focus is on the predictive/classification accuracy,
based on known properties learned from the training samples. For instance, most
machine-learning-based nonparametric models are known to require high
computational cost in order to find the global optima. With the learning task
in a large dataset, the number of hidden nodes within the network will
therefore increase significantly, which eventually leads to an exponential rise
in computational complexity. This paper thus reviews the theoretical and
experimental data-modeling literature, in large-scale data-intensive fields,
relating to: (1) model efficiency, including computational requirements in
learning, and data-intensive areas structure and design, and introduces (2) new
algorithmic approaches with the least memory requirements and processing to
minimize computational cost, while maintaining/improving its
predictive/classification accuracy and stability.
| [
{
"version": "v1",
"created": "Wed, 18 Mar 2015 07:56:12 GMT"
}
] | 2015-03-19T00:00:00 | [
[
"Al-Jarrah",
"O. Y.",
""
],
[
"Yoo",
"P. D.",
""
],
[
"Muhaidat",
"S",
""
],
[
"Karagiannidis",
"G. K.",
""
],
[
"Taha",
"K.",
""
]
] | TITLE: Efficient Machine Learning for Big Data: A Review
ABSTRACT: With the emerging technologies and all associated devices, it is predicted
that massive amount of data will be created in the next few years, in fact, as
much as 90% of current data were created in the last couple of years,a trend
that will continue for the foreseeable future. Sustainable computing studies
the process by which computer engineer/scientist designs computers and
associated subsystems efficiently and effectively with minimal impact on the
environment. However, current intelligent machine-learning systems are
performance driven, the focus is on the predictive/classification accuracy,
based on known properties learned from the training samples. For instance, most
machine-learning-based nonparametric models are known to require high
computational cost in order to find the global optima. With the learning task
in a large dataset, the number of hidden nodes within the network will
therefore increase significantly, which eventually leads to an exponential rise
in computational complexity. This paper thus reviews the theoretical and
experimental data-modeling literature, in large-scale data-intensive fields,
relating to: (1) model efficiency, including computational requirements in
learning, and data-intensive areas structure and design, and introduces (2) new
algorithmic approaches with the least memory requirements and processing to
minimize computational cost, while maintaining/improving its
predictive/classification accuracy and stability.
| no_new_dataset | 0.941654 |
1503.05426 | Danilo Giordano DG | Danilo Giordano, Stefano Traverso, Luigi Grimaudo, Marco Mellia, Elena
Baralis, Alok Tongaonkar and Sabyasachi Saha | YouLighter: An Unsupervised Methodology to Unveil YouTube CDN Changes | null | null | null | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | YouTube relies on a massively distributed Content Delivery Network (CDN) to
stream the billions of videos in its catalogue. Unfortunately, very little
information about the design of such CDN is available. This, combined with the
pervasiveness of YouTube, poses a big challenge for Internet Service Providers
(ISPs), which are compelled to optimize end-users' Quality of Experience (QoE)
while having no control on the CDN decisions.
This paper presents YouLighter, an unsupervised technique to identify changes
in the YouTube CDN. YouLighter leverages only passive measurements to cluster
co-located identical caches into edge-nodes. This automatically unveils the
structure of YouTube's CDN. Further, we propose a new metric, called
Constellation Distance, that compares the clustering obtained from two
different time snapshots, to pinpoint sudden changes. While several approaches
allow comparison between the clustering results from the same dataset, no
technique allows to measure the similarity of clusters from different datasets.
Hence, we develop a novel methodology, based on the Constellation Distance, to
solve this problem.
By running YouLighter over 10-month long traces obtained from two ISPs in
different countries, we pinpoint both sudden changes in edge-node allocation,
and small alterations to the cache allocation policies which actually impair
the QoE that the end-users perceive.
| [
{
"version": "v1",
"created": "Wed, 18 Mar 2015 14:30:47 GMT"
}
] | 2015-03-19T00:00:00 | [
[
"Giordano",
"Danilo",
""
],
[
"Traverso",
"Stefano",
""
],
[
"Grimaudo",
"Luigi",
""
],
[
"Mellia",
"Marco",
""
],
[
"Baralis",
"Elena",
""
],
[
"Tongaonkar",
"Alok",
""
],
[
"Saha",
"Sabyasachi",
""
]
] | TITLE: YouLighter: An Unsupervised Methodology to Unveil YouTube CDN Changes
ABSTRACT: YouTube relies on a massively distributed Content Delivery Network (CDN) to
stream the billions of videos in its catalogue. Unfortunately, very little
information about the design of such CDN is available. This, combined with the
pervasiveness of YouTube, poses a big challenge for Internet Service Providers
(ISPs), which are compelled to optimize end-users' Quality of Experience (QoE)
while having no control on the CDN decisions.
This paper presents YouLighter, an unsupervised technique to identify changes
in the YouTube CDN. YouLighter leverages only passive measurements to cluster
co-located identical caches into edge-nodes. This automatically unveils the
structure of YouTube's CDN. Further, we propose a new metric, called
Constellation Distance, that compares the clustering obtained from two
different time snapshots, to pinpoint sudden changes. While several approaches
allow comparison between the clustering results from the same dataset, no
technique allows to measure the similarity of clusters from different datasets.
Hence, we develop a novel methodology, based on the Constellation Distance, to
solve this problem.
By running YouLighter over 10-month long traces obtained from two ISPs in
different countries, we pinpoint both sudden changes in edge-node allocation,
and small alterations to the cache allocation policies which actually impair
the QoE that the end-users perceive.
| no_new_dataset | 0.948489 |
1503.05471 | Danila Doroshin | Danila Doroshin, Alexander Yamshinin, Nikolay Lubimov, Marina
Nastasenko, Mikhail Kotov, Maxim Tkachenko | Shared latent subspace modelling within Gaussian-Binary Restricted
Boltzmann Machines for NIST i-Vector Challenge 2014 | 5 pages, 3 figures, submitted to Interspeech 2015 | null | null | null | cs.LG cs.NE cs.SD stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper presents a novel approach to speaker subspace modelling based on
Gaussian-Binary Restricted Boltzmann Machines (GRBM). The proposed model is
based on the idea of shared factors as in the Probabilistic Linear Discriminant
Analysis (PLDA). GRBM hidden layer is divided into speaker and channel factors,
herein the speaker factor is shared over all vectors of the speaker. Then
Maximum Likelihood Parameter Estimation (MLE) for proposed model is introduced.
Various new scoring techniques for speaker verification using GRBM are
proposed. The results for NIST i-vector Challenge 2014 dataset are presented.
| [
{
"version": "v1",
"created": "Wed, 18 Mar 2015 16:28:18 GMT"
}
] | 2015-03-19T00:00:00 | [
[
"Doroshin",
"Danila",
""
],
[
"Yamshinin",
"Alexander",
""
],
[
"Lubimov",
"Nikolay",
""
],
[
"Nastasenko",
"Marina",
""
],
[
"Kotov",
"Mikhail",
""
],
[
"Tkachenko",
"Maxim",
""
]
] | TITLE: Shared latent subspace modelling within Gaussian-Binary Restricted
Boltzmann Machines for NIST i-Vector Challenge 2014
ABSTRACT: This paper presents a novel approach to speaker subspace modelling based on
Gaussian-Binary Restricted Boltzmann Machines (GRBM). The proposed model is
based on the idea of shared factors as in the Probabilistic Linear Discriminant
Analysis (PLDA). GRBM hidden layer is divided into speaker and channel factors,
herein the speaker factor is shared over all vectors of the speaker. Then
Maximum Likelihood Parameter Estimation (MLE) for proposed model is introduced.
Various new scoring techniques for speaker verification using GRBM are
proposed. The results for NIST i-vector Challenge 2014 dataset are presented.
| no_new_dataset | 0.949902 |
1503.05543 | Alexander Alemi | Alexander A Alemi, Paul Ginsparg | Text Segmentation based on Semantic Word Embeddings | 10 pages, 4 figures. KDD2015 submission | null | null | null | cs.CL cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We explore the use of semantic word embeddings in text segmentation
algorithms, including the C99 segmentation algorithm and new algorithms
inspired by the distributed word vector representation. By developing a general
framework for discussing a class of segmentation objectives, we study the
effectiveness of greedy versus exact optimization approaches and suggest a new
iterative refinement technique for improving the performance of greedy
strategies. We compare our results to known benchmarks, using known metrics. We
demonstrate state-of-the-art performance for an untrained method with our
Content Vector Segmentation (CVS) on the Choi test set. Finally, we apply the
segmentation procedure to an in-the-wild dataset consisting of text extracted
from scholarly articles in the arXiv.org database.
| [
{
"version": "v1",
"created": "Wed, 18 Mar 2015 19:44:06 GMT"
}
] | 2015-03-19T00:00:00 | [
[
"Alemi",
"Alexander A",
""
],
[
"Ginsparg",
"Paul",
""
]
] | TITLE: Text Segmentation based on Semantic Word Embeddings
ABSTRACT: We explore the use of semantic word embeddings in text segmentation
algorithms, including the C99 segmentation algorithm and new algorithms
inspired by the distributed word vector representation. By developing a general
framework for discussing a class of segmentation objectives, we study the
effectiveness of greedy versus exact optimization approaches and suggest a new
iterative refinement technique for improving the performance of greedy
strategies. We compare our results to known benchmarks, using known metrics. We
demonstrate state-of-the-art performance for an untrained method with our
Content Vector Segmentation (CVS) on the Choi test set. Finally, we apply the
segmentation procedure to an in-the-wild dataset consisting of text extracted
from scholarly articles in the arXiv.org database.
| no_new_dataset | 0.938857 |
1101.5097 | Morten M{\o}rup | Morten M{\o}rup, Mikkel N. Schmidt, Lars Kai Hansen | Infinite Multiple Membership Relational Modeling for Complex Networks | 8 pages, 4 figures | null | null | null | cs.SI cs.LG physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Learning latent structure in complex networks has become an important problem
fueled by many types of networked data originating from practically all fields
of science. In this paper, we propose a new non-parametric Bayesian
multiple-membership latent feature model for networks. Contrary to existing
multiple-membership models that scale quadratically in the number of vertices
the proposed model scales linearly in the number of links admitting
multiple-membership analysis in large scale networks. We demonstrate a
connection between the single membership relational model and multiple
membership models and show on "real" size benchmark network data that
accounting for multiple memberships improves the learning of latent structure
as measured by link prediction while explicitly accounting for multiple
membership result in a more compact representation of the latent structure of
networks.
| [
{
"version": "v1",
"created": "Wed, 26 Jan 2011 16:15:22 GMT"
}
] | 2015-03-18T00:00:00 | [
[
"Mørup",
"Morten",
""
],
[
"Schmidt",
"Mikkel N.",
""
],
[
"Hansen",
"Lars Kai",
""
]
] | TITLE: Infinite Multiple Membership Relational Modeling for Complex Networks
ABSTRACT: Learning latent structure in complex networks has become an important problem
fueled by many types of networked data originating from practically all fields
of science. In this paper, we propose a new non-parametric Bayesian
multiple-membership latent feature model for networks. Contrary to existing
multiple-membership models that scale quadratically in the number of vertices
the proposed model scales linearly in the number of links admitting
multiple-membership analysis in large scale networks. We demonstrate a
connection between the single membership relational model and multiple
membership models and show on "real" size benchmark network data that
accounting for multiple memberships improves the learning of latent structure
as measured by link prediction while explicitly accounting for multiple
membership result in a more compact representation of the latent structure of
networks.
| no_new_dataset | 0.951188 |
1102.1027 | Alaa Abi Haidar | Alaa Abi-Haidar and Luis M. Rocha | Collective Classification of Textual Documents by Guided
Self-Organization in T-Cell Cross-Regulation Dynamics | null | Evolutionary Intelligence. 2011. Volume 4, Number 2, 69-80 | 10.1007/s12065-011-0052-5 | null | cs.IR cs.AI cs.LG nlin.AO q-bio.OT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present and study an agent-based model of T-Cell cross-regulation in the
adaptive immune system, which we apply to binary classification. Our method
expands an existing analytical model of T-cell cross-regulation (Carneiro et
al. in Immunol Rev 216(1):48-68, 2007) that was used to study the
self-organizing dynamics of a single population of T-Cells in interaction with
an idealized antigen presenting cell capable of presenting a single antigen.
With agent-based modeling we are able to study the self-organizing dynamics of
multiple populations of distinct T-cells which interact via antigen presenting
cells that present hundreds of distinct antigens. Moreover, we show that such
self-organizing dynamics can be guided to produce an effective binary
classification of antigens, which is competitive with existing machine learning
methods when applied to biomedical text classification. More specifically, here
we test our model on a dataset of publicly available full-text biomedical
articles provided by the BioCreative challenge (Krallinger in The biocreative
ii. 5 challenge overview, p 19, 2009). We study the robustness of our model's
parameter configurations, and show that it leads to encouraging results
comparable to state-of-the-art classifiers. Our results help us understand both
T-cell cross-regulation as a general principle of guided self-organization, as
well as its applicability to document classification. Therefore, we show that
our bio-inspired algorithm is a promising novel method for biomedical article
classification and for binary document classification in general.
| [
{
"version": "v1",
"created": "Fri, 4 Feb 2011 22:10:45 GMT"
}
] | 2015-03-18T00:00:00 | [
[
"Abi-Haidar",
"Alaa",
""
],
[
"Rocha",
"Luis M.",
""
]
] | TITLE: Collective Classification of Textual Documents by Guided
Self-Organization in T-Cell Cross-Regulation Dynamics
ABSTRACT: We present and study an agent-based model of T-Cell cross-regulation in the
adaptive immune system, which we apply to binary classification. Our method
expands an existing analytical model of T-cell cross-regulation (Carneiro et
al. in Immunol Rev 216(1):48-68, 2007) that was used to study the
self-organizing dynamics of a single population of T-Cells in interaction with
an idealized antigen presenting cell capable of presenting a single antigen.
With agent-based modeling we are able to study the self-organizing dynamics of
multiple populations of distinct T-cells which interact via antigen presenting
cells that present hundreds of distinct antigens. Moreover, we show that such
self-organizing dynamics can be guided to produce an effective binary
classification of antigens, which is competitive with existing machine learning
methods when applied to biomedical text classification. More specifically, here
we test our model on a dataset of publicly available full-text biomedical
articles provided by the BioCreative challenge (Krallinger in The biocreative
ii. 5 challenge overview, p 19, 2009). We study the robustness of our model's
parameter configurations, and show that it leads to encouraging results
comparable to state-of-the-art classifiers. Our results help us understand both
T-cell cross-regulation as a general principle of guided self-organization, as
well as its applicability to document classification. Therefore, we show that
our bio-inspired algorithm is a promising novel method for biomedical article
classification and for binary document classification in general.
| no_new_dataset | 0.944434 |
1102.1465 | Adrian Barbu | Adrian Barbu, Nathan Lay | An Introduction to Artificial Prediction Markets for Classification | 29 pages, 8 figures | Journal of Machine Learning Research, 13, 2177-2204, 2012 | null | null | stat.ML cs.LG math.ST stat.TH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Prediction markets are used in real life to predict outcomes of interest such
as presidential elections. This paper presents a mathematical theory of
artificial prediction markets for supervised learning of conditional
probability estimators. The artificial prediction market is a novel method for
fusing the prediction information of features or trained classifiers, where the
fusion result is the contract price on the possible outcomes. The market can be
trained online by updating the participants' budgets using training examples.
Inspired by the real prediction markets, the equations that govern the market
are derived from simple and reasonable assumptions. Efficient numerical
algorithms are presented for solving these equations. The obtained artificial
prediction market is shown to be a maximum likelihood estimator. It generalizes
linear aggregation, existent in boosting and random forest, as well as logistic
regression and some kernel methods. Furthermore, the market mechanism allows
the aggregation of specialized classifiers that participate only on specific
instances. Experimental comparisons show that the artificial prediction markets
often outperform random forest and implicit online learning on synthetic data
and real UCI datasets. Moreover, an extensive evaluation for pelvic and
abdominal lymph node detection in CT data shows that the prediction market
improves adaboost's detection rate from 79.6% to 81.2% at 3 false
positives/volume.
| [
{
"version": "v1",
"created": "Mon, 7 Feb 2011 23:25:47 GMT"
},
{
"version": "v2",
"created": "Wed, 9 Feb 2011 15:48:12 GMT"
},
{
"version": "v3",
"created": "Mon, 14 Feb 2011 21:02:49 GMT"
},
{
"version": "v4",
"created": "Thu, 22 Sep 2011 20:23:30 GMT"
},
{
"version": "v5",
"created": "Sun, 26 Feb 2012 21:54:27 GMT"
},
{
"version": "v6",
"created": "Mon, 9 Jul 2012 19:24:19 GMT"
}
] | 2015-03-18T00:00:00 | [
[
"Barbu",
"Adrian",
""
],
[
"Lay",
"Nathan",
""
]
] | TITLE: An Introduction to Artificial Prediction Markets for Classification
ABSTRACT: Prediction markets are used in real life to predict outcomes of interest such
as presidential elections. This paper presents a mathematical theory of
artificial prediction markets for supervised learning of conditional
probability estimators. The artificial prediction market is a novel method for
fusing the prediction information of features or trained classifiers, where the
fusion result is the contract price on the possible outcomes. The market can be
trained online by updating the participants' budgets using training examples.
Inspired by the real prediction markets, the equations that govern the market
are derived from simple and reasonable assumptions. Efficient numerical
algorithms are presented for solving these equations. The obtained artificial
prediction market is shown to be a maximum likelihood estimator. It generalizes
linear aggregation, existent in boosting and random forest, as well as logistic
regression and some kernel methods. Furthermore, the market mechanism allows
the aggregation of specialized classifiers that participate only on specific
instances. Experimental comparisons show that the artificial prediction markets
often outperform random forest and implicit online learning on synthetic data
and real UCI datasets. Moreover, an extensive evaluation for pelvic and
abdominal lymph node detection in CT data shows that the prediction market
improves adaboost's detection rate from 79.6% to 81.2% at 3 false
positives/volume.
| no_new_dataset | 0.948585 |
1102.2808 | Chun Wei Seah | Chun-Wei Seah, Ivor W. Tsang, Yew-Soon Ong | Transductive Ordinal Regression | null | IEEE Transactions on Neural Networks and Learning Systems,
23(7):1074 - 1086, 2012 | 10.1109/TNNLS.2012.2198240 | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Ordinal regression is commonly formulated as a multi-class problem with
ordinal constraints. The challenge of designing accurate classifiers for
ordinal regression generally increases with the number of classes involved, due
to the large number of labeled patterns that are needed. The availability of
ordinal class labels, however, is often costly to calibrate or difficult to
obtain. Unlabeled patterns, on the other hand, often exist in much greater
abundance and are freely available. To take benefits from the abundance of
unlabeled patterns, we present a novel transductive learning paradigm for
ordinal regression in this paper, namely Transductive Ordinal Regression (TOR).
The key challenge of the present study lies in the precise estimation of both
the ordinal class label of the unlabeled data and the decision functions of the
ordinal classes, simultaneously. The core elements of the proposed TOR include
an objective function that caters to several commonly used loss functions
casted in transductive settings, for general ordinal regression. A label
swapping scheme that facilitates a strictly monotonic decrease in the objective
function value is also introduced. Extensive numerical studies on commonly used
benchmark datasets including the real world sentiment prediction problem are
then presented to showcase the characteristics and efficacies of the proposed
transductive ordinal regression. Further, comparisons to recent
state-of-the-art ordinal regression methods demonstrate the introduced
transductive learning paradigm for ordinal regression led to the robust and
improved performance.
| [
{
"version": "v1",
"created": "Mon, 14 Feb 2011 15:53:06 GMT"
},
{
"version": "v2",
"created": "Tue, 15 Feb 2011 12:46:46 GMT"
},
{
"version": "v3",
"created": "Thu, 30 Aug 2012 02:23:16 GMT"
},
{
"version": "v4",
"created": "Fri, 31 Aug 2012 02:54:05 GMT"
},
{
"version": "v5",
"created": "Mon, 3 Sep 2012 02:17:30 GMT"
}
] | 2015-03-18T00:00:00 | [
[
"Seah",
"Chun-Wei",
""
],
[
"Tsang",
"Ivor W.",
""
],
[
"Ong",
"Yew-Soon",
""
]
] | TITLE: Transductive Ordinal Regression
ABSTRACT: Ordinal regression is commonly formulated as a multi-class problem with
ordinal constraints. The challenge of designing accurate classifiers for
ordinal regression generally increases with the number of classes involved, due
to the large number of labeled patterns that are needed. The availability of
ordinal class labels, however, is often costly to calibrate or difficult to
obtain. Unlabeled patterns, on the other hand, often exist in much greater
abundance and are freely available. To take benefits from the abundance of
unlabeled patterns, we present a novel transductive learning paradigm for
ordinal regression in this paper, namely Transductive Ordinal Regression (TOR).
The key challenge of the present study lies in the precise estimation of both
the ordinal class label of the unlabeled data and the decision functions of the
ordinal classes, simultaneously. The core elements of the proposed TOR include
an objective function that caters to several commonly used loss functions
casted in transductive settings, for general ordinal regression. A label
swapping scheme that facilitates a strictly monotonic decrease in the objective
function value is also introduced. Extensive numerical studies on commonly used
benchmark datasets including the real world sentiment prediction problem are
then presented to showcase the characteristics and efficacies of the proposed
transductive ordinal regression. Further, comparisons to recent
state-of-the-art ordinal regression methods demonstrate the introduced
transductive learning paradigm for ordinal regression led to the robust and
improved performance.
| no_new_dataset | 0.951323 |
1410.7376 | Nicholas Rhinehart | Nicholas Rhinehart, Jiaji Zhou, Martial Hebert, J. Andrew Bagnell | Visual Chunking: A List Prediction Framework for Region-Based Object
Detection | to appear at ICRA 2015 | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider detecting objects in an image by iteratively selecting from a set
of arbitrarily shaped candidate regions. Our generic approach, which we term
visual chunking, reasons about the locations of multiple object instances in an
image while expressively describing object boundaries. We design an
optimization criterion for measuring the performance of a list of such
detections as a natural extension to a common per-instance metric. We present
an efficient algorithm with provable performance for building a high-quality
list of detections from any candidate set of region-based proposals. We also
develop a simple class-specific algorithm to generate a candidate region
instance in near-linear time in the number of low-level superpixels that
outperforms other region generating methods. In order to make predictions on
novel images at testing time without access to ground truth, we develop
learning approaches to emulate these algorithms' behaviors. We demonstrate that
our new approach outperforms sophisticated baselines on benchmark datasets.
| [
{
"version": "v1",
"created": "Mon, 27 Oct 2014 19:54:41 GMT"
},
{
"version": "v2",
"created": "Mon, 16 Mar 2015 21:20:12 GMT"
}
] | 2015-03-18T00:00:00 | [
[
"Rhinehart",
"Nicholas",
""
],
[
"Zhou",
"Jiaji",
""
],
[
"Hebert",
"Martial",
""
],
[
"Bagnell",
"J. Andrew",
""
]
] | TITLE: Visual Chunking: A List Prediction Framework for Region-Based Object
Detection
ABSTRACT: We consider detecting objects in an image by iteratively selecting from a set
of arbitrarily shaped candidate regions. Our generic approach, which we term
visual chunking, reasons about the locations of multiple object instances in an
image while expressively describing object boundaries. We design an
optimization criterion for measuring the performance of a list of such
detections as a natural extension to a common per-instance metric. We present
an efficient algorithm with provable performance for building a high-quality
list of detections from any candidate set of region-based proposals. We also
develop a simple class-specific algorithm to generate a candidate region
instance in near-linear time in the number of low-level superpixels that
outperforms other region generating methods. In order to make predictions on
novel images at testing time without access to ground truth, we develop
learning approaches to emulate these algorithms' behaviors. We demonstrate that
our new approach outperforms sophisticated baselines on benchmark datasets.
| no_new_dataset | 0.944689 |
1502.07979 | Anastasios Noulas Anastasios Noulas | Anastasios Noulas, Blake Shaw, Renaud Lambiotte, Cecilia Mascolo | Topological Properties and Temporal Dynamics of Place Networks in Urban
Environments | null | null | null | null | cs.SI physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Understanding the spatial networks formed by the trajectories of mobile users
can be beneficial to applications ranging from epidemiology to local search.
Despite the potential for impact in a number of fields, several aspects of
human mobility networks remain largely unexplored due to the lack of
large-scale data at a fine spatiotemporal resolution. Using a longitudinal
dataset from the location-based service Foursquare, we perform an empirical
analysis of the topological properties of place networks and note their
resemblance to online social networks in terms of heavy-tailed degree
distributions, triadic closure mechanisms and the small world property. Unlike
social networks however, place networks present a mixture of connectivity
trends in terms of assortativity that are surprisingly similar to those of the
web graph. We take advantage of additional semantic information to interpret
how nodes that take on functional roles such as `travel hub', or `food spot'
behave in these networks. Finally, motivated by the large volume of new links
appearing in place networks over time, we formulate the classic link prediction
problem in this new domain. We propose a novel variant of gravity models that
brings together three essential elements of inter-place connectivity in urban
environments: network-level interactions, human mobility dynamics, and
geographic distance. We evaluate this model and find it outperforms a number of
baseline predictors and supervised learning algorithms on a task of predicting
new links in a sample of one hundred popular cities.
| [
{
"version": "v1",
"created": "Fri, 27 Feb 2015 17:30:16 GMT"
},
{
"version": "v2",
"created": "Tue, 17 Mar 2015 14:03:02 GMT"
}
] | 2015-03-18T00:00:00 | [
[
"Noulas",
"Anastasios",
""
],
[
"Shaw",
"Blake",
""
],
[
"Lambiotte",
"Renaud",
""
],
[
"Mascolo",
"Cecilia",
""
]
] | TITLE: Topological Properties and Temporal Dynamics of Place Networks in Urban
Environments
ABSTRACT: Understanding the spatial networks formed by the trajectories of mobile users
can be beneficial to applications ranging from epidemiology to local search.
Despite the potential for impact in a number of fields, several aspects of
human mobility networks remain largely unexplored due to the lack of
large-scale data at a fine spatiotemporal resolution. Using a longitudinal
dataset from the location-based service Foursquare, we perform an empirical
analysis of the topological properties of place networks and note their
resemblance to online social networks in terms of heavy-tailed degree
distributions, triadic closure mechanisms and the small world property. Unlike
social networks however, place networks present a mixture of connectivity
trends in terms of assortativity that are surprisingly similar to those of the
web graph. We take advantage of additional semantic information to interpret
how nodes that take on functional roles such as `travel hub', or `food spot'
behave in these networks. Finally, motivated by the large volume of new links
appearing in place networks over time, we formulate the classic link prediction
problem in this new domain. We propose a novel variant of gravity models that
brings together three essential elements of inter-place connectivity in urban
environments: network-level interactions, human mobility dynamics, and
geographic distance. We evaluate this model and find it outperforms a number of
baseline predictors and supervised learning algorithms on a task of predicting
new links in a sample of one hundred popular cities.
| no_new_dataset | 0.943971 |
1503.04598 | Reza Sabzevari | Reza Sabzevari, Vittori Murino, and Alessio Del Bue | PiMPeR: Piecewise Dense 3D Reconstruction from Multi-View and
Multi-Illumination Images | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we address the problem of dense 3D reconstruction from
multiple view images subject to strong lighting variations. In this regard, a
new piecewise framework is proposed to explicitly take into account the change
of illumination across several wide-baseline images. Unlike multi-view stereo
and multi-view photometric stereo methods, this pipeline deals with
wide-baseline images that are uncalibrated, in terms of both camera parameters
and lighting conditions. Such a scenario is meant to avoid use of any specific
imaging setup and provide a tool for normal users without any expertise. To the
best of our knowledge, this paper presents the first work that deals with such
unconstrained setting. We propose a coarse-to-fine approach, in which a coarse
mesh is first created using a set of geometric constraints and, then, fine
details are recovered by exploiting photometric properties of the scene.
Augmenting the fine details on the coarse mesh is done via a final optimization
step. Note that the method does not provide a generic solution for multi-view
photometric stereo problem but it relaxes several common assumptions of this
problem. The approach scales very well in size given its piecewise nature,
dealing with large scale optimization and with severe missing data. Experiments
on a benchmark dataset Robot data-set show the method performance against 3D
ground truth.
| [
{
"version": "v1",
"created": "Mon, 16 Mar 2015 10:51:08 GMT"
},
{
"version": "v2",
"created": "Tue, 17 Mar 2015 12:59:24 GMT"
}
] | 2015-03-18T00:00:00 | [
[
"Sabzevari",
"Reza",
""
],
[
"Murino",
"Vittori",
""
],
[
"Del Bue",
"Alessio",
""
]
] | TITLE: PiMPeR: Piecewise Dense 3D Reconstruction from Multi-View and
Multi-Illumination Images
ABSTRACT: In this paper, we address the problem of dense 3D reconstruction from
multiple view images subject to strong lighting variations. In this regard, a
new piecewise framework is proposed to explicitly take into account the change
of illumination across several wide-baseline images. Unlike multi-view stereo
and multi-view photometric stereo methods, this pipeline deals with
wide-baseline images that are uncalibrated, in terms of both camera parameters
and lighting conditions. Such a scenario is meant to avoid use of any specific
imaging setup and provide a tool for normal users without any expertise. To the
best of our knowledge, this paper presents the first work that deals with such
unconstrained setting. We propose a coarse-to-fine approach, in which a coarse
mesh is first created using a set of geometric constraints and, then, fine
details are recovered by exploiting photometric properties of the scene.
Augmenting the fine details on the coarse mesh is done via a final optimization
step. Note that the method does not provide a generic solution for multi-view
photometric stereo problem but it relaxes several common assumptions of this
problem. The approach scales very well in size given its piecewise nature,
dealing with large scale optimization and with severe missing data. Experiments
on a benchmark dataset Robot data-set show the method performance against 3D
ground truth.
| no_new_dataset | 0.947478 |
1503.04864 | Fay\c{c}al Hamdi | Fay\c{c}al Hamdi, Nathalie Abadie, B\'en\'edicte Bucher and
Abdelfettah Feliachi | GeomRDF: A Geodata Converter with a Fine-Grained Structured
Representation of Geometry in the Web | 12 pages, 2 figures, the 1st International Workshop on Geospatial
Linked Data (GeoLD 2014) - SEMANTiCS 2014 | null | null | null | cs.DB cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In recent years, with the advent of the web of data, a growing number of
national mapping agencies tend to publish their geospatial data as Linked Data.
However, differences between traditional GIS data models and Linked Data model
can make the publication process more complicated. Besides, it may require, to
be done, the setting of several parameters and some expertise in the semantic
web technologies. In addition, the use of standards like GeoSPARQL (or ad hoc
predicates) is mandatory to perform spatial queries on published geospatial
data. In this paper, we present GeomRDF, a tool that helps users to convert
spatial data from traditional GIS formats to RDF model easily. It generates
geometries represented as GeoSPARQL WKT literal but also as structured
geometries that can be exploited by using only the RDF query language, SPARQL.
GeomRDF was implemented as a module in the RDF publication platform Datalift. A
validation of GeomRDF has been realized against the French administrative units
dataset (provided by IGN France).
| [
{
"version": "v1",
"created": "Mon, 16 Mar 2015 21:35:18 GMT"
}
] | 2015-03-18T00:00:00 | [
[
"Hamdi",
"Fayçal",
""
],
[
"Abadie",
"Nathalie",
""
],
[
"Bucher",
"Bénédicte",
""
],
[
"Feliachi",
"Abdelfettah",
""
]
] | TITLE: GeomRDF: A Geodata Converter with a Fine-Grained Structured
Representation of Geometry in the Web
ABSTRACT: In recent years, with the advent of the web of data, a growing number of
national mapping agencies tend to publish their geospatial data as Linked Data.
However, differences between traditional GIS data models and Linked Data model
can make the publication process more complicated. Besides, it may require, to
be done, the setting of several parameters and some expertise in the semantic
web technologies. In addition, the use of standards like GeoSPARQL (or ad hoc
predicates) is mandatory to perform spatial queries on published geospatial
data. In this paper, we present GeomRDF, a tool that helps users to convert
spatial data from traditional GIS formats to RDF model easily. It generates
geometries represented as GeoSPARQL WKT literal but also as structured
geometries that can be exploited by using only the RDF query language, SPARQL.
GeomRDF was implemented as a module in the RDF publication platform Datalift. A
validation of GeomRDF has been realized against the French administrative units
dataset (provided by IGN France).
| no_new_dataset | 0.946843 |
1503.04927 | Qingbo Hu | Qingbo Hu and Sihong Xie and Shuyang Lin and Senzhang Wang and Philip
Yu | CENI: a Hybrid Framework for Efficiently Inferring Information Networks | Full-length version of the paper with the same title published in
ICWSM 2015 | null | null | null | cs.SI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Nowadays, the message diffusion links among users or websites drive the
development of countless innovative applications. However, in reality, it is
easier for us to observe the timestamps when different nodes in the network
react on a message, while the connections empowering the diffusion of the
message remain hidden. This motivates recent extensive studies on the network
inference problem: unveiling the edges from the records of messages
disseminated through them. Existing solutions are computationally expensive,
which motivates us to develop an efficient two-step general framework,
Clustering Embedded Network Inference (CENI). CENI integrates clustering
strategies to improve the efficiency of network inference. By clustering nodes
directly on the timelines of messages, we propose two naive implementations of
CENI: Infection-centric CENI and Cascade-centric CENI. Additionally, we point
out the critical dimension problem of CENI: instead of one-dimensional
timelines, we need to first project the nodes to an Euclidean space of certain
dimension before clustering. A CENI adopting clustering method on the projected
space can better preserve the structure hidden in the cascades, and generate
more accurately inferred links. This insight sheds light on other related work
attempting to discover or utilize the latent cluster structure in the
disseminated messages. By addressing the critical dimension problem, we propose
the third implementation of the CENI framework: Projection-based CENI. Through
extensive experiments on two real datasets, we show that the three CENI models
only need around 20% $\sim$ 50% of the running time of state-of-the-art
methods. Moreover, the inferred edges of Projection-based CENI preserves or
even outperforms the effectiveness of state-of-the-art methods.
| [
{
"version": "v1",
"created": "Tue, 17 Mar 2015 05:47:49 GMT"
}
] | 2015-03-18T00:00:00 | [
[
"Hu",
"Qingbo",
""
],
[
"Xie",
"Sihong",
""
],
[
"Lin",
"Shuyang",
""
],
[
"Wang",
"Senzhang",
""
],
[
"Yu",
"Philip",
""
]
] | TITLE: CENI: a Hybrid Framework for Efficiently Inferring Information Networks
ABSTRACT: Nowadays, the message diffusion links among users or websites drive the
development of countless innovative applications. However, in reality, it is
easier for us to observe the timestamps when different nodes in the network
react on a message, while the connections empowering the diffusion of the
message remain hidden. This motivates recent extensive studies on the network
inference problem: unveiling the edges from the records of messages
disseminated through them. Existing solutions are computationally expensive,
which motivates us to develop an efficient two-step general framework,
Clustering Embedded Network Inference (CENI). CENI integrates clustering
strategies to improve the efficiency of network inference. By clustering nodes
directly on the timelines of messages, we propose two naive implementations of
CENI: Infection-centric CENI and Cascade-centric CENI. Additionally, we point
out the critical dimension problem of CENI: instead of one-dimensional
timelines, we need to first project the nodes to an Euclidean space of certain
dimension before clustering. A CENI adopting clustering method on the projected
space can better preserve the structure hidden in the cascades, and generate
more accurately inferred links. This insight sheds light on other related work
attempting to discover or utilize the latent cluster structure in the
disseminated messages. By addressing the critical dimension problem, we propose
the third implementation of the CENI framework: Projection-based CENI. Through
extensive experiments on two real datasets, we show that the three CENI models
only need around 20% $\sim$ 50% of the running time of state-of-the-art
methods. Moreover, the inferred edges of Projection-based CENI preserves or
even outperforms the effectiveness of state-of-the-art methods.
| no_new_dataset | 0.943919 |
1503.04996 | Khaled Fawagreh | Khaled Fawagreh, Mohamad Medhat Gaber, Eyad Elyan | On Extreme Pruning of Random Forest Ensembles for Real-time Predictive
Applications | 10 pages, 4 Figures | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Random Forest (RF) is an ensemble supervised machine learning technique that
was developed by Breiman over a decade ago. Compared with other ensemble
techniques, it has proved its accuracy and superiority. Many researchers,
however, believe that there is still room for enhancing and improving its
performance accuracy. This explains why, over the past decade, there have been
many extensions of RF where each extension employed a variety of techniques and
strategies to improve certain aspect(s) of RF. Since it has been proven
empiricallthat ensembles tend to yield better results when there is a
significant diversity among the constituent models, the objective of this paper
is twofold. First, it investigates how data clustering (a well known diversity
technique) can be applied to identify groups of similar decision trees in an RF
in order to eliminate redundant trees by selecting a representative from each
group (cluster). Second, these likely diverse representatives are then used to
produce an extension of RF termed CLUB-DRF that is much smaller in size than
RF, and yet performs at least as good as RF, and mostly exhibits higher
performance in terms of accuracy. The latter refers to a known technique called
ensemble pruning. Experimental results on 15 real datasets from the UCI
repository prove the superiority of our proposed extension over the traditional
RF. Most of our experiments achieved at least 95% or above pruning level while
retaining or outperforming the RF accuracy.
| [
{
"version": "v1",
"created": "Tue, 17 Mar 2015 11:01:37 GMT"
}
] | 2015-03-18T00:00:00 | [
[
"Fawagreh",
"Khaled",
""
],
[
"Gaber",
"Mohamad Medhat",
""
],
[
"Elyan",
"Eyad",
""
]
] | TITLE: On Extreme Pruning of Random Forest Ensembles for Real-time Predictive
Applications
ABSTRACT: Random Forest (RF) is an ensemble supervised machine learning technique that
was developed by Breiman over a decade ago. Compared with other ensemble
techniques, it has proved its accuracy and superiority. Many researchers,
however, believe that there is still room for enhancing and improving its
performance accuracy. This explains why, over the past decade, there have been
many extensions of RF where each extension employed a variety of techniques and
strategies to improve certain aspect(s) of RF. Since it has been proven
empiricallthat ensembles tend to yield better results when there is a
significant diversity among the constituent models, the objective of this paper
is twofold. First, it investigates how data clustering (a well known diversity
technique) can be applied to identify groups of similar decision trees in an RF
in order to eliminate redundant trees by selecting a representative from each
group (cluster). Second, these likely diverse representatives are then used to
produce an extension of RF termed CLUB-DRF that is much smaller in size than
RF, and yet performs at least as good as RF, and mostly exhibits higher
performance in terms of accuracy. The latter refers to a known technique called
ensemble pruning. Experimental results on 15 real datasets from the UCI
repository prove the superiority of our proposed extension over the traditional
RF. Most of our experiments achieved at least 95% or above pruning level while
retaining or outperforming the RF accuracy.
| no_new_dataset | 0.949949 |
1503.05018 | Martin Wistuba | Martin Wistuba, Josif Grabocka, Lars Schmidt-Thieme | Ultra-Fast Shapelets for Time Series Classification | Preprint submitted to Journal of Data & Knowledge Engineering January
24, 2015 | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Time series shapelets are discriminative subsequences and their similarity to
a time series can be used for time series classification. Since the discovery
of time series shapelets is costly in terms of time, the applicability on long
or multivariate time series is difficult. In this work we propose Ultra-Fast
Shapelets that uses a number of random shapelets. It is shown that Ultra-Fast
Shapelets yield the same prediction quality as current state-of-the-art
shapelet-based time series classifiers that carefully select the shapelets by
being by up to three orders of magnitudes. Since this method allows a
ultra-fast shapelet discovery, using shapelets for long multivariate time
series classification becomes feasible.
A method for using shapelets for multivariate time series is proposed and
Ultra-Fast Shapelets is proven to be successful in comparison to
state-of-the-art multivariate time series classifiers on 15 multivariate time
series datasets from various domains. Finally, time series derivatives that
have proven to be useful for other time series classifiers are investigated for
the shapelet-based classifiers. It is shown that they have a positive impact
and that they are easy to integrate with a simple preprocessing step, without
the need of adapting the shapelet discovery algorithm.
| [
{
"version": "v1",
"created": "Tue, 17 Mar 2015 12:41:30 GMT"
}
] | 2015-03-18T00:00:00 | [
[
"Wistuba",
"Martin",
""
],
[
"Grabocka",
"Josif",
""
],
[
"Schmidt-Thieme",
"Lars",
""
]
] | TITLE: Ultra-Fast Shapelets for Time Series Classification
ABSTRACT: Time series shapelets are discriminative subsequences and their similarity to
a time series can be used for time series classification. Since the discovery
of time series shapelets is costly in terms of time, the applicability on long
or multivariate time series is difficult. In this work we propose Ultra-Fast
Shapelets that uses a number of random shapelets. It is shown that Ultra-Fast
Shapelets yield the same prediction quality as current state-of-the-art
shapelet-based time series classifiers that carefully select the shapelets by
being by up to three orders of magnitudes. Since this method allows a
ultra-fast shapelet discovery, using shapelets for long multivariate time
series classification becomes feasible.
A method for using shapelets for multivariate time series is proposed and
Ultra-Fast Shapelets is proven to be successful in comparison to
state-of-the-art multivariate time series classifiers on 15 multivariate time
series datasets from various domains. Finally, time series derivatives that
have proven to be useful for other time series classifiers are investigated for
the shapelet-based classifiers. It is shown that they have a positive impact
and that they are easy to integrate with a simple preprocessing step, without
the need of adapting the shapelet discovery algorithm.
| no_new_dataset | 0.952618 |
1503.05038 | Bojan Pepikj | Bojan Pepik, Michael Stark, Peter Gehler, Tobias Ritschel, Bernt
Schiele | 3D Object Class Detection in the Wild | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Object class detection has been a synonym for 2D bounding box localization
for the longest time, fueled by the success of powerful statistical learning
techniques, combined with robust image representations. Only recently, there
has been a growing interest in revisiting the promise of computer vision from
the early days: to precisely delineate the contents of a visual scene, object
by object, in 3D. In this paper, we draw from recent advances in object
detection and 2D-3D object lifting in order to design an object class detector
that is particularly tailored towards 3D object class detection. Our 3D object
class detection method consists of several stages gradually enriching the
object detection output with object viewpoint, keypoints and 3D shape
estimates. Following careful design, in each stage it constantly improves the
performance and achieves state-ofthe-art performance in simultaneous 2D
bounding box and viewpoint estimation on the challenging Pascal3D+ dataset.
| [
{
"version": "v1",
"created": "Tue, 17 Mar 2015 13:34:22 GMT"
}
] | 2015-03-18T00:00:00 | [
[
"Pepik",
"Bojan",
""
],
[
"Stark",
"Michael",
""
],
[
"Gehler",
"Peter",
""
],
[
"Ritschel",
"Tobias",
""
],
[
"Schiele",
"Bernt",
""
]
] | TITLE: 3D Object Class Detection in the Wild
ABSTRACT: Object class detection has been a synonym for 2D bounding box localization
for the longest time, fueled by the success of powerful statistical learning
techniques, combined with robust image representations. Only recently, there
has been a growing interest in revisiting the promise of computer vision from
the early days: to precisely delineate the contents of a visual scene, object
by object, in 3D. In this paper, we draw from recent advances in object
detection and 2D-3D object lifting in order to design an object class detector
that is particularly tailored towards 3D object class detection. Our 3D object
class detection method consists of several stages gradually enriching the
object detection output with object viewpoint, keypoints and 3D shape
estimates. Following careful design, in each stage it constantly improves the
performance and achieves state-ofthe-art performance in simultaneous 2D
bounding box and viewpoint estimation on the challenging Pascal3D+ dataset.
| no_new_dataset | 0.948822 |
1503.05123 | Manuel Amunategui | Manuel Amunategui, Tristan Markwell, Yelena Rozenfeld | Prediction Using Note Text: Synthetic Feature Creation with word2vec | 13 pages including appendix | null | null | null | cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | word2vec affords a simple yet powerful approach of extracting quantitative
variables from unstructured textual data. Over half of healthcare data is
unstructured and therefore hard to model without involved expertise in data
engineering and natural language processing. word2vec can serve as a bridge to
quickly gather intelligence from such data sources.
In this study, we ran 650 megabytes of unstructured, medical chart notes from
the Providence Health & Services electronic medical record through word2vec. We
used two different approaches in creating predictive variables and tested them
on the risk of readmission for patients with COPD (Chronic Obstructive Lung
Disease). As a comparative benchmark, we ran the same test using the LACE risk
model (a single score based on length of stay, acuity, comorbid conditions, and
emergency department visits).
Using only free text and mathematical might, we found word2vec comparable to
LACE in predicting the risk of readmission of COPD patients.
| [
{
"version": "v1",
"created": "Tue, 17 Mar 2015 17:04:27 GMT"
}
] | 2015-03-18T00:00:00 | [
[
"Amunategui",
"Manuel",
""
],
[
"Markwell",
"Tristan",
""
],
[
"Rozenfeld",
"Yelena",
""
]
] | TITLE: Prediction Using Note Text: Synthetic Feature Creation with word2vec
ABSTRACT: word2vec affords a simple yet powerful approach of extracting quantitative
variables from unstructured textual data. Over half of healthcare data is
unstructured and therefore hard to model without involved expertise in data
engineering and natural language processing. word2vec can serve as a bridge to
quickly gather intelligence from such data sources.
In this study, we ran 650 megabytes of unstructured, medical chart notes from
the Providence Health & Services electronic medical record through word2vec. We
used two different approaches in creating predictive variables and tested them
on the risk of readmission for patients with COPD (Chronic Obstructive Lung
Disease). As a comparative benchmark, we ran the same test using the LACE risk
model (a single score based on length of stay, acuity, comorbid conditions, and
emergency department visits).
Using only free text and mathematical might, we found word2vec comparable to
LACE in predicting the risk of readmission of COPD patients.
| no_new_dataset | 0.931338 |
1503.05157 | Jeremy Debattista | Jeremy Debattista, Santiago Londo\~no, Christoph Lange, S\"oren Auer | Quality Assessment of Linked Datasets using Probabilistic Approximation | 15 pages, 2 figures, To appear in ESWC 2015 proceedings | null | null | null | cs.DB cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | With the increasing application of Linked Open Data, assessing the quality of
datasets by computing quality metrics becomes an issue of crucial importance.
For large and evolving datasets, an exact, deterministic computation of the
quality metrics is too time consuming or expensive. We employ probabilistic
techniques such as Reservoir Sampling, Bloom Filters and Clustering Coefficient
estimation for implementing a broad set of data quality metrics in an
approximate but sufficiently accurate way. Our implementation is integrated in
the comprehensive data quality assessment framework Luzzu. We evaluated its
performance and accuracy on Linked Open Datasets of broad relevance.
| [
{
"version": "v1",
"created": "Tue, 17 Mar 2015 18:39:22 GMT"
}
] | 2015-03-18T00:00:00 | [
[
"Debattista",
"Jeremy",
""
],
[
"Londoño",
"Santiago",
""
],
[
"Lange",
"Christoph",
""
],
[
"Auer",
"Sören",
""
]
] | TITLE: Quality Assessment of Linked Datasets using Probabilistic Approximation
ABSTRACT: With the increasing application of Linked Open Data, assessing the quality of
datasets by computing quality metrics becomes an issue of crucial importance.
For large and evolving datasets, an exact, deterministic computation of the
quality metrics is too time consuming or expensive. We employ probabilistic
techniques such as Reservoir Sampling, Bloom Filters and Clustering Coefficient
estimation for implementing a broad set of data quality metrics in an
approximate but sufficiently accurate way. Our implementation is integrated in
the comprehensive data quality assessment framework Luzzu. We evaluated its
performance and accuracy on Linked Open Datasets of broad relevance.
| no_new_dataset | 0.951818 |
1004.5168 | Charles Clarke | Gordon V. Cormack, Mark D. Smucker, and Charles L. A. Clarke | Efficient and Effective Spam Filtering and Re-ranking for Large Web
Datasets | null | null | null | null | cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The TREC 2009 web ad hoc and relevance feedback tasks used a new document
collection, the ClueWeb09 dataset, which was crawled from the general Web in
early 2009. This dataset contains 1 billion web pages, a substantial fraction
of which are spam --- pages designed to deceive search engines so as to deliver
an unwanted payload. We examine the effect of spam on the results of the TREC
2009 web ad hoc and relevance feedback tasks, which used the ClueWeb09 dataset.
We show that a simple content-based classifier with minimal training is
efficient enough to rank the "spamminess" of every page in the dataset using a
standard personal computer in 48 hours, and effective enough to yield
significant and substantive improvements in the fixed-cutoff precision (estP10)
as well as rank measures (estR-Precision, StatMAP, MAP) of nearly all submitted
runs. Moreover, using a set of "honeypot" queries the labeling of training data
may be reduced to an entirely automatic process. The results of classical
information retrieval methods are particularly enhanced by filtering --- from
among the worst to among the best.
| [
{
"version": "v1",
"created": "Thu, 29 Apr 2010 00:54:25 GMT"
}
] | 2015-03-17T00:00:00 | [
[
"Cormack",
"Gordon V.",
""
],
[
"Smucker",
"Mark D.",
""
],
[
"Clarke",
"Charles L. A.",
""
]
] | TITLE: Efficient and Effective Spam Filtering and Re-ranking for Large Web
Datasets
ABSTRACT: The TREC 2009 web ad hoc and relevance feedback tasks used a new document
collection, the ClueWeb09 dataset, which was crawled from the general Web in
early 2009. This dataset contains 1 billion web pages, a substantial fraction
of which are spam --- pages designed to deceive search engines so as to deliver
an unwanted payload. We examine the effect of spam on the results of the TREC
2009 web ad hoc and relevance feedback tasks, which used the ClueWeb09 dataset.
We show that a simple content-based classifier with minimal training is
efficient enough to rank the "spamminess" of every page in the dataset using a
standard personal computer in 48 hours, and effective enough to yield
significant and substantive improvements in the fixed-cutoff precision (estP10)
as well as rank measures (estR-Precision, StatMAP, MAP) of nearly all submitted
runs. Moreover, using a set of "honeypot" queries the labeling of training data
may be reduced to an entirely automatic process. The results of classical
information retrieval methods are particularly enhanced by filtering --- from
among the worst to among the best.
| new_dataset | 0.881666 |
1004.5437 | Richard Brent | Richard P. Brent | Parallel algorithms in linear algebra | 17 pages. An old Technical Report, submitted for archival purposes.
For further details see http://wwwmaths.anu.edu.au/~brent/pub/pub128.html | Algorithms and Architectures: Proceedings of the Second NEC
Research Symposium (edited by T. Ishiguro), SIAM, Philadelphia, 1993, 54-72 | null | Technical Report TR-CS-91-06, Computer Sciences Laboratory,
Australian National University, Canberra, August 1991, 17 pages | cs.DS cs.NA math.NA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This report provides an introduction to algorithms for fundamental linear
algebra problems on various parallel computer architectures, with the emphasis
on distributed-memory MIMD machines. To illustrate the basic concepts and key
issues, we consider the problem of parallel solution of a nonsingular linear
system by Gaussian elimination with partial pivoting. This problem has come to
be regarded as a benchmark for the performance of parallel machines. We
consider its appropriateness as a benchmark, its communication requirements,
and schemes for data distribution to facilitate communication and load
balancing. In addition, we describe some parallel algorithms for orthogonal
(QR) factorization and the singular value decomposition (SVD).
| [
{
"version": "v1",
"created": "Fri, 30 Apr 2010 02:30:36 GMT"
}
] | 2015-03-17T00:00:00 | [
[
"Brent",
"Richard P.",
""
]
] | TITLE: Parallel algorithms in linear algebra
ABSTRACT: This report provides an introduction to algorithms for fundamental linear
algebra problems on various parallel computer architectures, with the emphasis
on distributed-memory MIMD machines. To illustrate the basic concepts and key
issues, we consider the problem of parallel solution of a nonsingular linear
system by Gaussian elimination with partial pivoting. This problem has come to
be regarded as a benchmark for the performance of parallel machines. We
consider its appropriateness as a benchmark, its communication requirements,
and schemes for data distribution to facilitate communication and load
balancing. In addition, we describe some parallel algorithms for orthogonal
(QR) factorization and the singular value decomposition (SVD).
| no_new_dataset | 0.942242 |
1005.1860 | Gavin Taylor | Marek Petrik, Gavin Taylor, Ron Parr, Shlomo Zilberstein | Feature Selection Using Regularization in Approximate Linear Programs
for Markov Decision Processes | Technical report corresponding to the ICML2010 submission of the same
name | null | null | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Approximate dynamic programming has been used successfully in a large variety
of domains, but it relies on a small set of provided approximation features to
calculate solutions reliably. Large and rich sets of features can cause
existing algorithms to overfit because of a limited number of samples. We
address this shortcoming using $L_1$ regularization in approximate linear
programming. Because the proposed method can automatically select the
appropriate richness of features, its performance does not degrade with an
increasing number of features. These results rely on new and stronger sampling
bounds for regularized approximate linear programs. We also propose a
computationally efficient homotopy method. The empirical evaluation of the
approach shows that the proposed method performs well on simple MDPs and
standard benchmark problems.
| [
{
"version": "v1",
"created": "Tue, 11 May 2010 15:24:36 GMT"
},
{
"version": "v2",
"created": "Thu, 20 May 2010 14:19:17 GMT"
}
] | 2015-03-17T00:00:00 | [
[
"Petrik",
"Marek",
""
],
[
"Taylor",
"Gavin",
""
],
[
"Parr",
"Ron",
""
],
[
"Zilberstein",
"Shlomo",
""
]
] | TITLE: Feature Selection Using Regularization in Approximate Linear Programs
for Markov Decision Processes
ABSTRACT: Approximate dynamic programming has been used successfully in a large variety
of domains, but it relies on a small set of provided approximation features to
calculate solutions reliably. Large and rich sets of features can cause
existing algorithms to overfit because of a limited number of samples. We
address this shortcoming using $L_1$ regularization in approximate linear
programming. Because the proposed method can automatically select the
appropriate richness of features, its performance does not degrade with an
increasing number of features. These results rely on new and stronger sampling
bounds for regularized approximate linear programs. We also propose a
computationally efficient homotopy method. The empirical evaluation of the
approach shows that the proposed method performs well on simple MDPs and
standard benchmark problems.
| no_new_dataset | 0.94474 |
1005.2882 | Nadjib Lazaar | Nadjib Lazaar (INRIA - IRISA), Arnaud Gotlieb (INRIA - IRISA), Lebbah
Yahia | On Testing Constraint Programs | null | null | null | RR-7291 | cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The success of several constraint-based modeling languages such as OPL, ZINC,
or COMET, appeals for better software engineering practices, particularly in
the testing phase. This paper introduces a testing framework enabling automated
test case generation for constraint programming. We propose a general framework
of constraint program development which supposes that a first declarative and
simple constraint model is available from the problem specifications analysis.
Then, this model is refined using classical techniques such as constraint
reformulation, surrogate and global constraint addition, or symmetry-breaking
to form an improved constraint model that must be thoroughly tested before
being used to address real-sized problems. We think that most of the faults are
introduced in this refinement step and propose a process which takes the first
declarative model as an oracle for detecting non-conformities. We derive
practical test purposes from this process to generate automatically test data
that exhibit non-conformities. We implemented this approach in a new tool
called CPTEST that was used to automatically detect non-conformities on two
classical benchmark programs, namely the Golomb rulers and the car-sequencing
problem.
| [
{
"version": "v1",
"created": "Mon, 17 May 2010 11:15:17 GMT"
}
] | 2015-03-17T00:00:00 | [
[
"Lazaar",
"Nadjib",
"",
"INRIA - IRISA"
],
[
"Gotlieb",
"Arnaud",
"",
"INRIA - IRISA"
],
[
"Yahia",
"Lebbah",
""
]
] | TITLE: On Testing Constraint Programs
ABSTRACT: The success of several constraint-based modeling languages such as OPL, ZINC,
or COMET, appeals for better software engineering practices, particularly in
the testing phase. This paper introduces a testing framework enabling automated
test case generation for constraint programming. We propose a general framework
of constraint program development which supposes that a first declarative and
simple constraint model is available from the problem specifications analysis.
Then, this model is refined using classical techniques such as constraint
reformulation, surrogate and global constraint addition, or symmetry-breaking
to form an improved constraint model that must be thoroughly tested before
being used to address real-sized problems. We think that most of the faults are
introduced in this refinement step and propose a process which takes the first
declarative model as an oracle for detecting non-conformities. We derive
practical test purposes from this process to generate automatically test data
that exhibit non-conformities. We implemented this approach in a new tool
called CPTEST that was used to automatically detect non-conformities on two
classical benchmark programs, namely the Golomb rulers and the car-sequencing
problem.
| no_new_dataset | 0.940079 |
1005.4298 | Sameer Singh | Sameer Singh and Michael Wick and Andrew McCallum | Distantly Labeling Data for Large Scale Cross-Document Coreference | 16 pages, submitted to ECML 2010 | null | null | null | cs.AI cs.IR cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Cross-document coreference, the problem of resolving entity mentions across
multi-document collections, is crucial to automated knowledge base construction
and data mining tasks. However, the scarcity of large labeled data sets has
hindered supervised machine learning research for this task. In this paper we
develop and demonstrate an approach based on ``distantly-labeling'' a data set
from which we can train a discriminative cross-document coreference model. In
particular we build a dataset of more than a million people mentions extracted
from 3.5 years of New York Times articles, leverage Wikipedia for distant
labeling with a generative model (and measure the reliability of such
labeling); then we train and evaluate a conditional random field coreference
model that has factors on cross-document entities as well as mention-pairs.
This coreference model obtains high accuracy in resolving mentions and entities
that are not present in the training data, indicating applicability to
non-Wikipedia data. Given the large amount of data, our work is also an
exercise demonstrating the scalability of our approach.
| [
{
"version": "v1",
"created": "Mon, 24 May 2010 10:35:50 GMT"
}
] | 2015-03-17T00:00:00 | [
[
"Singh",
"Sameer",
""
],
[
"Wick",
"Michael",
""
],
[
"McCallum",
"Andrew",
""
]
] | TITLE: Distantly Labeling Data for Large Scale Cross-Document Coreference
ABSTRACT: Cross-document coreference, the problem of resolving entity mentions across
multi-document collections, is crucial to automated knowledge base construction
and data mining tasks. However, the scarcity of large labeled data sets has
hindered supervised machine learning research for this task. In this paper we
develop and demonstrate an approach based on ``distantly-labeling'' a data set
from which we can train a discriminative cross-document coreference model. In
particular we build a dataset of more than a million people mentions extracted
from 3.5 years of New York Times articles, leverage Wikipedia for distant
labeling with a generative model (and measure the reliability of such
labeling); then we train and evaluate a conditional random field coreference
model that has factors on cross-document entities as well as mention-pairs.
This coreference model obtains high accuracy in resolving mentions and entities
that are not present in the training data, indicating applicability to
non-Wikipedia data. Given the large amount of data, our work is also an
exercise demonstrating the scalability of our approach.
| new_dataset | 0.957477 |
1006.0234 | Manuel Gomez Rodriguez | Manuel Gomez-Rodriguez, Jure Leskovec, Andreas Krause | Inferring Networks of Diffusion and Influence | Short version appeared in ACM SIGKDD International Conference on
Knowledge Discovery and Data Mining (KDD), 2010. Long version submitted to
ACM Transactions on Knowledge Discovery from Data (TKDD) | null | null | null | cs.DS cs.SI physics.soc-ph stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Information diffusion and virus propagation are fundamental processes taking
place in networks. While it is often possible to directly observe when nodes
become infected with a virus or adopt the information, observing individual
transmissions (i.e., who infects whom, or who influences whom) is typically
very difficult. Furthermore, in many applications, the underlying network over
which the diffusions and propagations spread is actually unobserved. We tackle
these challenges by developing a method for tracing paths of diffusion and
influence through networks and inferring the networks over which contagions
propagate. Given the times when nodes adopt pieces of information or become
infected, we identify the optimal network that best explains the observed
infection times. Since the optimization problem is NP-hard to solve exactly, we
develop an efficient approximation algorithm that scales to large datasets and
finds provably near-optimal networks.
We demonstrate the effectiveness of our approach by tracing information
diffusion in a set of 170 million blogs and news articles over a one year
period to infer how information flows through the online media space. We find
that the diffusion network of news for the top 1,000 media sites and blogs
tends to have a core-periphery structure with a small set of core media sites
that diffuse information to the rest of the Web. These sites tend to have
stable circles of influence with more general news media sites acting as
connectors between them.
| [
{
"version": "v1",
"created": "Tue, 1 Jun 2010 20:02:31 GMT"
},
{
"version": "v2",
"created": "Tue, 7 Dec 2010 20:35:08 GMT"
},
{
"version": "v3",
"created": "Sun, 23 Oct 2011 18:56:10 GMT"
}
] | 2015-03-17T00:00:00 | [
[
"Gomez-Rodriguez",
"Manuel",
""
],
[
"Leskovec",
"Jure",
""
],
[
"Krause",
"Andreas",
""
]
] | TITLE: Inferring Networks of Diffusion and Influence
ABSTRACT: Information diffusion and virus propagation are fundamental processes taking
place in networks. While it is often possible to directly observe when nodes
become infected with a virus or adopt the information, observing individual
transmissions (i.e., who infects whom, or who influences whom) is typically
very difficult. Furthermore, in many applications, the underlying network over
which the diffusions and propagations spread is actually unobserved. We tackle
these challenges by developing a method for tracing paths of diffusion and
influence through networks and inferring the networks over which contagions
propagate. Given the times when nodes adopt pieces of information or become
infected, we identify the optimal network that best explains the observed
infection times. Since the optimization problem is NP-hard to solve exactly, we
develop an efficient approximation algorithm that scales to large datasets and
finds provably near-optimal networks.
We demonstrate the effectiveness of our approach by tracing information
diffusion in a set of 170 million blogs and news articles over a one year
period to infer how information flows through the online media space. We find
that the diffusion network of news for the top 1,000 media sites and blogs
tends to have a core-periphery structure with a small set of core media sites
that diffuse information to the rest of the Web. These sites tend to have
stable circles of influence with more general news media sites acting as
connectors between them.
| no_new_dataset | 0.951369 |
1010.1526 | Zoltan Prekopcsak | Zolt\'an Prekopcs\'ak and Daniel Lemire | Time Series Classification by Class-Specific Mahalanobis Distance
Measures | null | Advances in Data Analysis and Classification 6 (3), 2012 | 10.1007/s11634-012-0110-6 | null | cs.LG | http://creativecommons.org/licenses/by/3.0/ | To classify time series by nearest neighbors, we need to specify or learn one
or several distance measures. We consider variations of the Mahalanobis
distance measures which rely on the inverse covariance matrix of the data.
Unfortunately --- for time series data --- the covariance matrix has often low
rank. To alleviate this problem we can either use a pseudoinverse, covariance
shrinking or limit the matrix to its diagonal. We review these alternatives and
benchmark them against competitive methods such as the related Large Margin
Nearest Neighbor Classification (LMNN) and the Dynamic Time Warping (DTW)
distance. As we expected, we find that the DTW is superior, but the Mahalanobis
distance measures are one to two orders of magnitude faster. To get best
results with Mahalanobis distance measures, we recommend learning one distance
measure per class using either covariance shrinking or the diagonal approach.
| [
{
"version": "v1",
"created": "Thu, 7 Oct 2010 19:48:23 GMT"
},
{
"version": "v2",
"created": "Sat, 16 Apr 2011 01:25:57 GMT"
},
{
"version": "v3",
"created": "Mon, 27 Jun 2011 09:20:28 GMT"
},
{
"version": "v4",
"created": "Fri, 30 Dec 2011 22:21:45 GMT"
},
{
"version": "v5",
"created": "Tue, 22 May 2012 10:02:44 GMT"
},
{
"version": "v6",
"created": "Mon, 2 Jul 2012 20:57:01 GMT"
}
] | 2015-03-17T00:00:00 | [
[
"Prekopcsák",
"Zoltán",
""
],
[
"Lemire",
"Daniel",
""
]
] | TITLE: Time Series Classification by Class-Specific Mahalanobis Distance
Measures
ABSTRACT: To classify time series by nearest neighbors, we need to specify or learn one
or several distance measures. We consider variations of the Mahalanobis
distance measures which rely on the inverse covariance matrix of the data.
Unfortunately --- for time series data --- the covariance matrix has often low
rank. To alleviate this problem we can either use a pseudoinverse, covariance
shrinking or limit the matrix to its diagonal. We review these alternatives and
benchmark them against competitive methods such as the related Large Margin
Nearest Neighbor Classification (LMNN) and the Dynamic Time Warping (DTW)
distance. As we expected, we find that the DTW is superior, but the Mahalanobis
distance measures are one to two orders of magnitude faster. To get best
results with Mahalanobis distance measures, we recommend learning one distance
measure per class using either covariance shrinking or the diagonal approach.
| no_new_dataset | 0.955402 |
1010.2148 | Angela Bonifati | Angela Bonifati, Giansalvatore Mecca, Domenica Sileo and Gianvito
Summa | Ontological Matchmaking in Recommender Systems | 28 pages, 8 figures | null | null | null | cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The electronic marketplace offers great potential for the recommendation of
supplies. In the so called recommender systems, it is crucial to apply
matchmaking strategies that faithfully satisfy the predicates specified in the
demand, and take into account as much as possible the user preferences. We
focus on real-life ontology-driven matchmaking scenarios and identify a number
of challenges, being inspired by such scenarios. A key challenge is that of
presenting the results to the users in an understandable and clear-cut fashion
in order to facilitate the analysis of the results. Indeed, such scenarios
evoke the opportunity to rank and group the results according to specific
criteria. A further challenge consists of presenting the results to the user in
an asynchronous fashion, i.e. the 'push' mode, along with the 'pull' mode, in
which the user explicitly issues a query, and displays the results. Moreover,
an important issue to consider in real-life cases is the possibility of
submitting a query to multiple providers, and collecting the various results.
We have designed and implemented an ontology-based matchmaking system that
suitably addresses the above challenges. We have conducted a comprehensive
experimental study, in order to investigate the usability of the system, the
performance and the effectiveness of the matchmaking strategies with real
ontological datasets.
| [
{
"version": "v1",
"created": "Mon, 11 Oct 2010 16:22:43 GMT"
}
] | 2015-03-17T00:00:00 | [
[
"Bonifati",
"Angela",
""
],
[
"Mecca",
"Giansalvatore",
""
],
[
"Sileo",
"Domenica",
""
],
[
"Summa",
"Gianvito",
""
]
] | TITLE: Ontological Matchmaking in Recommender Systems
ABSTRACT: The electronic marketplace offers great potential for the recommendation of
supplies. In the so called recommender systems, it is crucial to apply
matchmaking strategies that faithfully satisfy the predicates specified in the
demand, and take into account as much as possible the user preferences. We
focus on real-life ontology-driven matchmaking scenarios and identify a number
of challenges, being inspired by such scenarios. A key challenge is that of
presenting the results to the users in an understandable and clear-cut fashion
in order to facilitate the analysis of the results. Indeed, such scenarios
evoke the opportunity to rank and group the results according to specific
criteria. A further challenge consists of presenting the results to the user in
an asynchronous fashion, i.e. the 'push' mode, along with the 'pull' mode, in
which the user explicitly issues a query, and displays the results. Moreover,
an important issue to consider in real-life cases is the possibility of
submitting a query to multiple providers, and collecting the various results.
We have designed and implemented an ontology-based matchmaking system that
suitably addresses the above challenges. We have conducted a comprehensive
experimental study, in order to investigate the usability of the system, the
performance and the effectiveness of the matchmaking strategies with real
ontological datasets.
| no_new_dataset | 0.9434 |
1010.5511 | Peter Stobbe | Peter Stobbe, Andreas Krause | Efficient Minimization of Decomposable Submodular Functions | Expanded version of paper for Neural Information Processing Systems
2010 | null | null | null | cs.LG math.OC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Many combinatorial problems arising in machine learning can be reduced to the
problem of minimizing a submodular function. Submodular functions are a natural
discrete analog of convex functions, and can be minimized in strongly
polynomial time. Unfortunately, state-of-the-art algorithms for general
submodular minimization are intractable for larger problems. In this paper, we
introduce a novel subclass of submodular minimization problems that we call
decomposable. Decomposable submodular functions are those that can be
represented as sums of concave functions applied to modular functions. We
develop an algorithm, SLG, that can efficiently minimize decomposable
submodular functions with tens of thousands of variables. Our algorithm
exploits recent results in smoothed convex minimization. We apply SLG to
synthetic benchmarks and a joint classification-and-segmentation task, and show
that it outperforms the state-of-the-art general purpose submodular
minimization algorithms by several orders of magnitude.
| [
{
"version": "v1",
"created": "Tue, 26 Oct 2010 20:23:39 GMT"
}
] | 2015-03-17T00:00:00 | [
[
"Stobbe",
"Peter",
""
],
[
"Krause",
"Andreas",
""
]
] | TITLE: Efficient Minimization of Decomposable Submodular Functions
ABSTRACT: Many combinatorial problems arising in machine learning can be reduced to the
problem of minimizing a submodular function. Submodular functions are a natural
discrete analog of convex functions, and can be minimized in strongly
polynomial time. Unfortunately, state-of-the-art algorithms for general
submodular minimization are intractable for larger problems. In this paper, we
introduce a novel subclass of submodular minimization problems that we call
decomposable. Decomposable submodular functions are those that can be
represented as sums of concave functions applied to modular functions. We
develop an algorithm, SLG, that can efficiently minimize decomposable
submodular functions with tens of thousands of variables. Our algorithm
exploits recent results in smoothed convex minimization. We apply SLG to
synthetic benchmarks and a joint classification-and-segmentation task, and show
that it outperforms the state-of-the-art general purpose submodular
minimization algorithms by several orders of magnitude.
| no_new_dataset | 0.941547 |
1011.0686 | Stephane Ross | Stephane Ross, Geoffrey J. Gordon, J. Andrew Bagnell | A Reduction of Imitation Learning and Structured Prediction to No-Regret
Online Learning | Appearing in the 14th International Conference on Artificial
Intelligence and Statistics (AISTATS 2011) | null | null | null | cs.LG cs.AI stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Sequential prediction problems such as imitation learning, where future
observations depend on previous predictions (actions), violate the common
i.i.d. assumptions made in statistical learning. This leads to poor performance
in theory and often in practice. Some recent approaches provide stronger
guarantees in this setting, but remain somewhat unsatisfactory as they train
either non-stationary or stochastic policies and require a large number of
iterations. In this paper, we propose a new iterative algorithm, which trains a
stationary deterministic policy, that can be seen as a no regret algorithm in
an online learning setting. We show that any such no regret algorithm, combined
with additional reduction assumptions, must find a policy with good performance
under the distribution of observations it induces in such sequential settings.
We demonstrate that this new approach outperforms previous approaches on two
challenging imitation learning problems and a benchmark sequence labeling
problem.
| [
{
"version": "v1",
"created": "Tue, 2 Nov 2010 17:55:55 GMT"
},
{
"version": "v2",
"created": "Wed, 3 Nov 2010 15:59:19 GMT"
},
{
"version": "v3",
"created": "Wed, 16 Mar 2011 18:51:21 GMT"
}
] | 2015-03-17T00:00:00 | [
[
"Ross",
"Stephane",
""
],
[
"Gordon",
"Geoffrey J.",
""
],
[
"Bagnell",
"J. Andrew",
""
]
] | TITLE: A Reduction of Imitation Learning and Structured Prediction to No-Regret
Online Learning
ABSTRACT: Sequential prediction problems such as imitation learning, where future
observations depend on previous predictions (actions), violate the common
i.i.d. assumptions made in statistical learning. This leads to poor performance
in theory and often in practice. Some recent approaches provide stronger
guarantees in this setting, but remain somewhat unsatisfactory as they train
either non-stationary or stochastic policies and require a large number of
iterations. In this paper, we propose a new iterative algorithm, which trains a
stationary deterministic policy, that can be seen as a no regret algorithm in
an online learning setting. We show that any such no regret algorithm, combined
with additional reduction assumptions, must find a policy with good performance
under the distribution of observations it induces in such sequential settings.
We demonstrate that this new approach outperforms previous approaches on two
challenging imitation learning problems and a benchmark sequence labeling
problem.
| no_new_dataset | 0.948394 |
1011.3557 | Kristina Lerman | Anon Plangprasopchok, Kristina Lerman, Lise Getoor | A Probabilistic Approach for Learning Folksonomies from Structured Data | In Proceedings of the 4th ACM Web Search and Data Mining Conference
(WSDM) | null | null | null | cs.AI cs.CY cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Learning structured representations has emerged as an important problem in
many domains, including document and Web data mining, bioinformatics, and image
analysis. One approach to learning complex structures is to integrate many
smaller, incomplete and noisy structure fragments. In this work, we present an
unsupervised probabilistic approach that extends affinity propagation to
combine the small ontological fragments into a collection of integrated,
consistent, and larger folksonomies. This is a challenging task because the
method must aggregate similar structures while avoiding structural
inconsistencies and handling noise. We validate the approach on a real-world
social media dataset, comprised of shallow personal hierarchies specified by
many individual users, collected from the photosharing website Flickr. Our
empirical results show that our proposed approach is able to construct deeper
and denser structures, compared to an approach using only the standard affinity
propagation algorithm. Additionally, the approach yields better overall
integration quality than a state-of-the-art approach based on incremental
relational clustering.
| [
{
"version": "v1",
"created": "Tue, 16 Nov 2010 00:46:31 GMT"
}
] | 2015-03-17T00:00:00 | [
[
"Plangprasopchok",
"Anon",
""
],
[
"Lerman",
"Kristina",
""
],
[
"Getoor",
"Lise",
""
]
] | TITLE: A Probabilistic Approach for Learning Folksonomies from Structured Data
ABSTRACT: Learning structured representations has emerged as an important problem in
many domains, including document and Web data mining, bioinformatics, and image
analysis. One approach to learning complex structures is to integrate many
smaller, incomplete and noisy structure fragments. In this work, we present an
unsupervised probabilistic approach that extends affinity propagation to
combine the small ontological fragments into a collection of integrated,
consistent, and larger folksonomies. This is a challenging task because the
method must aggregate similar structures while avoiding structural
inconsistencies and handling noise. We validate the approach on a real-world
social media dataset, comprised of shallow personal hierarchies specified by
many individual users, collected from the photosharing website Flickr. Our
empirical results show that our proposed approach is able to construct deeper
and denser structures, compared to an approach using only the standard affinity
propagation algorithm. Additionally, the approach yields better overall
integration quality than a state-of-the-art approach based on incremental
relational clustering.
| new_dataset | 0.644225 |
1012.0452 | Umer Salim | Umer Salim and Dirk Slock | Average Minimum Transmit Power to achieve SINR Targets: Performance
Comparison of Various User Selection Algorithms | null | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In multi-user communication from one base station (BS) to multiple users, the
problem of minimizing the transmit power to achieve some target guaranteed
performance (rates) at users has been well investigated in the literature.
Similarly various user selection algorithms have been proposed and analyzed
when the BS has to transmit to a subset of the users in the system, mostly for
the objective of the sum rate maximization.
We study the joint problem of minimizing the transmit power at the BS to
achieve specific signal-to-interference-and-noise ratio (SINR) targets at users
in conjunction with user scheduling. The general analytical results for the
average transmit power required to meet guaranteed performance at the users'
side are difficult to obtain even without user selection due to joint
optimization required over beamforming vectors and power allocation scalars. We
study the transmit power minimization problem with various user selection
algorithms, namely semi-orthogonal user selection (SUS), norm-based user
selection (NUS) and angle-based user selection (AUS). When the SINR targets to
achieve are relatively large, the average minimum transmit power expressions
are derived for NUS and SUS for any number of users. For the special case when
only two users are selected, similar expressions are further derived for AUS
and a performance upper bound which serves to benchmark the performance of
other selection schemes. Simulation results performed under various settings
indicate that SUS is by far the better user selection criterion.
| [
{
"version": "v1",
"created": "Thu, 2 Dec 2010 15:29:28 GMT"
}
] | 2015-03-17T00:00:00 | [
[
"Salim",
"Umer",
""
],
[
"Slock",
"Dirk",
""
]
] | TITLE: Average Minimum Transmit Power to achieve SINR Targets: Performance
Comparison of Various User Selection Algorithms
ABSTRACT: In multi-user communication from one base station (BS) to multiple users, the
problem of minimizing the transmit power to achieve some target guaranteed
performance (rates) at users has been well investigated in the literature.
Similarly various user selection algorithms have been proposed and analyzed
when the BS has to transmit to a subset of the users in the system, mostly for
the objective of the sum rate maximization.
We study the joint problem of minimizing the transmit power at the BS to
achieve specific signal-to-interference-and-noise ratio (SINR) targets at users
in conjunction with user scheduling. The general analytical results for the
average transmit power required to meet guaranteed performance at the users'
side are difficult to obtain even without user selection due to joint
optimization required over beamforming vectors and power allocation scalars. We
study the transmit power minimization problem with various user selection
algorithms, namely semi-orthogonal user selection (SUS), norm-based user
selection (NUS) and angle-based user selection (AUS). When the SINR targets to
achieve are relatively large, the average minimum transmit power expressions
are derived for NUS and SUS for any number of users. For the special case when
only two users are selected, similar expressions are further derived for AUS
and a performance upper bound which serves to benchmark the performance of
other selection schemes. Simulation results performed under various settings
indicate that SUS is by far the better user selection criterion.
| no_new_dataset | 0.945096 |
1012.1269 | Frank Havemann | Frank Havemann, Michael Heinz, Alexander Struck and Jochen Gl\"aser | Identification of overlapping communities and their hierarchy by locally
calculating community-changing resolution levels | 25 pages, 10 figures | Journal of Statistical Mechanics: Theory and Experiment (2011)
P01023 | 10.1088/1742-5468/2011/01/P01023 | null | physics.data-an cs.SI physics.soc-ph | http://creativecommons.org/licenses/by-nc-sa/3.0/ | We propose a new local, deterministic and parameter-free algorithm that
detects fuzzy and crisp overlapping communities in a weighted network and
simultaneously reveals their hierarchy. Using a local fitness function, the
algorithm greedily expands natural communities of seeds until the whole graph
is covered. The hierarchy of communities is obtained analytically by
calculating resolution levels at which communities grow rather than numerically
by testing different resolution levels. This analytic procedure is not only
more exact than its numerical alternatives such as LFM and GCE but also much
faster. Critical resolution levels can be identified by searching for intervals
in which large changes of the resolution do not lead to growth of communities.
We tested our algorithm on benchmark graphs and on a network of 492 papers in
information science. Combined with a specific post-processing, the algorithm
gives much more precise results on LFR benchmarks with high overlap compared to
other algorithms and performs very similar to GCE.
| [
{
"version": "v1",
"created": "Mon, 6 Dec 2010 18:13:04 GMT"
}
] | 2015-03-17T00:00:00 | [
[
"Havemann",
"Frank",
""
],
[
"Heinz",
"Michael",
""
],
[
"Struck",
"Alexander",
""
],
[
"Gläser",
"Jochen",
""
]
] | TITLE: Identification of overlapping communities and their hierarchy by locally
calculating community-changing resolution levels
ABSTRACT: We propose a new local, deterministic and parameter-free algorithm that
detects fuzzy and crisp overlapping communities in a weighted network and
simultaneously reveals their hierarchy. Using a local fitness function, the
algorithm greedily expands natural communities of seeds until the whole graph
is covered. The hierarchy of communities is obtained analytically by
calculating resolution levels at which communities grow rather than numerically
by testing different resolution levels. This analytic procedure is not only
more exact than its numerical alternatives such as LFM and GCE but also much
faster. Critical resolution levels can be identified by searching for intervals
in which large changes of the resolution do not lead to growth of communities.
We tested our algorithm on benchmark graphs and on a network of 492 papers in
information science. Combined with a specific post-processing, the algorithm
gives much more precise results on LFR benchmarks with high overlap compared to
other algorithms and performs very similar to GCE.
| no_new_dataset | 0.951908 |
1012.4571 | Yannis Sismanis | Yannis Sismanis | How I won the "Chess Ratings - Elo vs the Rest of the World" Competition | null | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This article discusses in detail the rating system that won the kaggle
competition "Chess Ratings: Elo vs the rest of the world". The competition
provided a historical dataset of outcomes for chess games, and aimed to
discover whether novel approaches can predict the outcomes of future games,
more accurately than the well-known Elo rating system. The winning rating
system, called Elo++ in the rest of the article, builds upon the Elo rating
system. Like Elo, Elo++ uses a single rating per player and predicts the
outcome of a game, by using a logistic curve over the difference in ratings of
the players. The major component of Elo++ is a regularization technique that
avoids overfitting these ratings. The dataset of chess games and outcomes is
relatively small and one has to be careful not to draw "too many conclusions"
out of the limited data. Many approaches tested in the competition showed signs
of such an overfitting. The leader-board was dominated by attempts that did a
very good job on a small test dataset, but couldn't generalize well on the
private hold-out dataset. The Elo++ regularization takes into account the
number of games per player, the recency of these games and the ratings of the
opponents. Finally, Elo++ employs a stochastic gradient descent scheme for
training the ratings, and uses only two global parameters (white's advantage
and regularization constant) that are optimized using cross-validation.
| [
{
"version": "v1",
"created": "Tue, 21 Dec 2010 09:11:53 GMT"
}
] | 2015-03-17T00:00:00 | [
[
"Sismanis",
"Yannis",
""
]
] | TITLE: How I won the "Chess Ratings - Elo vs the Rest of the World" Competition
ABSTRACT: This article discusses in detail the rating system that won the kaggle
competition "Chess Ratings: Elo vs the rest of the world". The competition
provided a historical dataset of outcomes for chess games, and aimed to
discover whether novel approaches can predict the outcomes of future games,
more accurately than the well-known Elo rating system. The winning rating
system, called Elo++ in the rest of the article, builds upon the Elo rating
system. Like Elo, Elo++ uses a single rating per player and predicts the
outcome of a game, by using a logistic curve over the difference in ratings of
the players. The major component of Elo++ is a regularization technique that
avoids overfitting these ratings. The dataset of chess games and outcomes is
relatively small and one has to be careful not to draw "too many conclusions"
out of the limited data. Many approaches tested in the competition showed signs
of such an overfitting. The leader-board was dominated by attempts that did a
very good job on a small test dataset, but couldn't generalize well on the
private hold-out dataset. The Elo++ regularization takes into account the
number of games per player, the recency of these games and the ratings of the
opponents. Finally, Elo++ employs a stochastic gradient descent scheme for
training the ratings, and uses only two global parameters (white's advantage
and regularization constant) that are optimized using cross-validation.
| no_new_dataset | 0.950732 |
1012.5379 | Bram Reps | Bram Reps, Wim Vanroose and Hisham bin Zubair | GMRES-based multigrid for the complex scaled preconditoner for the
indefinite Helmholtz equation | null | null | null | null | cs.NA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Multigrid preconditioners and solvers for the indefinite Helmholtz equation
suffer from non-stability of the stationary smoothers due to the indefinite
spectrum of the operator. In this paper we explore GMRES as a replacement for
the stationary smoothers of the standard multigrid method. This results in a
robust and efficient solver for a complex shifted or stretched Helmholtz
problem that can be used as a preconditioner. Very few GMRES iterations are
required on each level to build a good multigrid method. The convergence
behavior is compared to a theoretically derived stable polynomial smoother. We
test this method on some benchmark problems and report on the observed
convergence behavior.
| [
{
"version": "v1",
"created": "Fri, 24 Dec 2010 10:13:47 GMT"
},
{
"version": "v2",
"created": "Wed, 8 May 2013 08:54:58 GMT"
}
] | 2015-03-17T00:00:00 | [
[
"Reps",
"Bram",
""
],
[
"Vanroose",
"Wim",
""
],
[
"Zubair",
"Hisham bin",
""
]
] | TITLE: GMRES-based multigrid for the complex scaled preconditoner for the
indefinite Helmholtz equation
ABSTRACT: Multigrid preconditioners and solvers for the indefinite Helmholtz equation
suffer from non-stability of the stationary smoothers due to the indefinite
spectrum of the operator. In this paper we explore GMRES as a replacement for
the stationary smoothers of the standard multigrid method. This results in a
robust and efficient solver for a complex shifted or stretched Helmholtz
problem that can be used as a preconditioner. Very few GMRES iterations are
required on each level to build a good multigrid method. The convergence
behavior is compared to a theoretically derived stable polynomial smoother. We
test this method on some benchmark problems and report on the observed
convergence behavior.
| no_new_dataset | 0.944536 |
1101.0080 | Hiroshi Sakamoto | Naoya Kishiue, Masaya Nakahara, Shirou Maruyama, Hiroshi Sakamoto | A Searchable Compressed Edit-Sensitive Parsing | 16 pages, 14 figures | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Practical data structures for the edit-sensitive parsing (ESP) are proposed.
Given a string S, its ESP tree is equivalent to a context-free grammar G
generating just S, which is represented by a DAG. Using the succinct data
structures for trees and permutations, G is decomposed to two LOUDS bit strings
and single array in (1+\epsilon)n\log n+4n+o(n) bits for any 0<\epsilon <1 and
the number n of variables in G. The time to count occurrences of P in S is in
O(\frac{1}{\epsilon}(m\log n+occ_c(\log m\log u)), whereas m = |P|, u = |S|,
and occ_c is the number of occurrences of a maximal common subtree in ESPs of P
and S. The efficiency of the proposed index is evaluated by the experiments
conducted on several benchmarks complying with the other compressed indexes.
| [
{
"version": "v1",
"created": "Thu, 30 Dec 2010 13:04:56 GMT"
},
{
"version": "v2",
"created": "Tue, 4 Jan 2011 16:29:59 GMT"
},
{
"version": "v3",
"created": "Sun, 9 Jan 2011 21:41:02 GMT"
}
] | 2015-03-17T00:00:00 | [
[
"Kishiue",
"Naoya",
""
],
[
"Nakahara",
"Masaya",
""
],
[
"Maruyama",
"Shirou",
""
],
[
"Sakamoto",
"Hiroshi",
""
]
] | TITLE: A Searchable Compressed Edit-Sensitive Parsing
ABSTRACT: Practical data structures for the edit-sensitive parsing (ESP) are proposed.
Given a string S, its ESP tree is equivalent to a context-free grammar G
generating just S, which is represented by a DAG. Using the succinct data
structures for trees and permutations, G is decomposed to two LOUDS bit strings
and single array in (1+\epsilon)n\log n+4n+o(n) bits for any 0<\epsilon <1 and
the number n of variables in G. The time to count occurrences of P in S is in
O(\frac{1}{\epsilon}(m\log n+occ_c(\log m\log u)), whereas m = |P|, u = |S|,
and occ_c is the number of occurrences of a maximal common subtree in ESPs of P
and S. The efficiency of the proposed index is evaluated by the experiments
conducted on several benchmarks complying with the other compressed indexes.
| no_new_dataset | 0.939748 |
1101.2604 | Wahbeh Qardaji | Ninghui Li, Wahbeh Qardaji, Dong Su | On Sampling, Anonymization, and Differential Privacy: Or,
k-Anonymization Meets Differential Privacy | null | null | null | null | cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper aims at answering the following two questions in
privacy-preserving data analysis and publishing: What formal privacy guarantee
(if any) does $k$-anonymization provide? How to benefit from the adversary's
uncertainty about the data? We have found that random sampling provides a
connection that helps answer these two questions, as sampling can create
uncertainty. The main result of the paper is that $k$-anonymization, when done
"safely", and when preceded with a random sampling step, satisfies
$(\epsilon,\delta)$-differential privacy with reasonable parameters. This
result illustrates that "hiding in a crowd of $k$" indeed offers some privacy
guarantees. This result also suggests an alternative approach to output
perturbation for satisfying differential privacy: namely, adding a random
sampling step in the beginning and pruning results that are too sensitive to
change of a single tuple. Regarding the second question, we provide both
positive and negative results. On the positive side, we show that adding a
random-sampling pre-processing step to a differentially-private algorithm can
greatly amplify the level of privacy protection. Hence, when given a dataset
resulted from sampling, one can utilize a much large privacy budget. On the
negative side, any privacy notion that takes advantage of the adversary's
uncertainty likely does not compose. We discuss what these results imply in
practice.
| [
{
"version": "v1",
"created": "Thu, 13 Jan 2011 16:18:23 GMT"
},
{
"version": "v2",
"created": "Tue, 21 Jun 2011 02:37:02 GMT"
}
] | 2015-03-17T00:00:00 | [
[
"Li",
"Ninghui",
""
],
[
"Qardaji",
"Wahbeh",
""
],
[
"Su",
"Dong",
""
]
] | TITLE: On Sampling, Anonymization, and Differential Privacy: Or,
k-Anonymization Meets Differential Privacy
ABSTRACT: This paper aims at answering the following two questions in
privacy-preserving data analysis and publishing: What formal privacy guarantee
(if any) does $k$-anonymization provide? How to benefit from the adversary's
uncertainty about the data? We have found that random sampling provides a
connection that helps answer these two questions, as sampling can create
uncertainty. The main result of the paper is that $k$-anonymization, when done
"safely", and when preceded with a random sampling step, satisfies
$(\epsilon,\delta)$-differential privacy with reasonable parameters. This
result illustrates that "hiding in a crowd of $k$" indeed offers some privacy
guarantees. This result also suggests an alternative approach to output
perturbation for satisfying differential privacy: namely, adding a random
sampling step in the beginning and pruning results that are too sensitive to
change of a single tuple. Regarding the second question, we provide both
positive and negative results. On the positive side, we show that adding a
random-sampling pre-processing step to a differentially-private algorithm can
greatly amplify the level of privacy protection. Hence, when given a dataset
resulted from sampling, one can utilize a much large privacy budget. On the
negative side, any privacy notion that takes advantage of the adversary's
uncertainty likely does not compose. We discuss what these results imply in
practice.
| no_new_dataset | 0.947527 |
1101.3594 | Donghui Yan | Donghui Yan, Peng Gong, Aiyou Chen and Liheng Zhong | Classification under Data Contamination with Application to Remote
Sensing Image Mis-registration | 23 pages, 10 figures | null | null | null | stat.ME cs.LG stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This work is motivated by the problem of image mis-registration in remote
sensing and we are interested in determining the resulting loss in the accuracy
of pattern classification. A statistical formulation is given where we propose
to use data contamination to model and understand the phenomenon of image
mis-registration. This model is widely applicable to many other types of errors
as well, for example, measurement errors and gross errors etc. The impact of
data contamination on classification is studied under a statistical learning
theoretical framework. A closed-form asymptotic bound is established for the
resulting loss in classification accuracy, which is less than
$\epsilon/(1-\epsilon)$ for data contamination of an amount of $\epsilon$. Our
bound is sharper than similar bounds in the domain adaptation literature and,
unlike such bounds, it applies to classifiers with an infinite
Vapnik-Chervonekis (VC) dimension. Extensive simulations have been conducted on
both synthetic and real datasets under various types of data contamination,
including label flipping, feature swapping and the replacement of feature
values with data generated from a random source such as a Gaussian or Cauchy
distribution. Our simulation results show that the bound we derive is fairly
tight.
| [
{
"version": "v1",
"created": "Wed, 19 Jan 2011 00:41:43 GMT"
},
{
"version": "v2",
"created": "Thu, 5 Jan 2012 18:04:10 GMT"
}
] | 2015-03-17T00:00:00 | [
[
"Yan",
"Donghui",
""
],
[
"Gong",
"Peng",
""
],
[
"Chen",
"Aiyou",
""
],
[
"Zhong",
"Liheng",
""
]
] | TITLE: Classification under Data Contamination with Application to Remote
Sensing Image Mis-registration
ABSTRACT: This work is motivated by the problem of image mis-registration in remote
sensing and we are interested in determining the resulting loss in the accuracy
of pattern classification. A statistical formulation is given where we propose
to use data contamination to model and understand the phenomenon of image
mis-registration. This model is widely applicable to many other types of errors
as well, for example, measurement errors and gross errors etc. The impact of
data contamination on classification is studied under a statistical learning
theoretical framework. A closed-form asymptotic bound is established for the
resulting loss in classification accuracy, which is less than
$\epsilon/(1-\epsilon)$ for data contamination of an amount of $\epsilon$. Our
bound is sharper than similar bounds in the domain adaptation literature and,
unlike such bounds, it applies to classifiers with an infinite
Vapnik-Chervonekis (VC) dimension. Extensive simulations have been conducted on
both synthetic and real datasets under various types of data contamination,
including label flipping, feature swapping and the replacement of feature
values with data generated from a random source such as a Gaussian or Cauchy
distribution. Our simulation results show that the bound we derive is fairly
tight.
| no_new_dataset | 0.949106 |
1403.3515 | Kieran Greer Dr | Kieran Greer | Concept Trees: Building Dynamic Concepts from Semi-Structured Data using
Nature-Inspired Methods | Pre-print | Q. Zhu, A.T Azar (eds.), Complex system modelling and control
through intelligent soft computations, Studies in Fuzziness and Soft
Computing, Springer-Verlag, Germany, Vol. 319, pp. 221 - 252, 2014 | null | null | cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper describes a method for creating structure from heterogeneous
sources, as part of an information database, or more specifically, a 'concept
base'. Structures called 'concept trees' can grow from the semi-structured
sources when consistent sequences of concepts are presented. They might be
considered to be dynamic databases, possibly a variation on the distributed
Agent-Based or Cellular Automata models, or even related to Markov models.
Semantic comparison of text is required, but the trees can be built more, from
automatic knowledge and statistical feedback. This reduced model might also be
attractive for security or privacy reasons, as not all of the potential data
gets saved. The construction process maintains the key requirement of
generality, allowing it to be used as part of a generic framework. The nature
of the method also means that some level of optimisation or normalisation of
the information will occur. This gives comparisons with databases or
knowledge-bases, but a database system would firstly model its environment or
datasets and then populate the database with instance values. The concept base
deals with a more uncertain environment and therefore cannot fully model it
beforehand. The model itself therefore evolves over time. Similar to databases,
it also needs a good indexing system, where the construction process provides
memory and indexing structures. These allow for more complex concepts to be
automatically created, stored and retrieved, possibly as part of a more
cognitive model. There are also some arguments, or more abstract ideas, for
merging physical-world laws into these automatic processes.
| [
{
"version": "v1",
"created": "Fri, 14 Mar 2014 09:38:01 GMT"
},
{
"version": "v2",
"created": "Mon, 23 Jun 2014 17:07:10 GMT"
}
] | 2015-03-17T00:00:00 | [
[
"Greer",
"Kieran",
""
]
] | TITLE: Concept Trees: Building Dynamic Concepts from Semi-Structured Data using
Nature-Inspired Methods
ABSTRACT: This paper describes a method for creating structure from heterogeneous
sources, as part of an information database, or more specifically, a 'concept
base'. Structures called 'concept trees' can grow from the semi-structured
sources when consistent sequences of concepts are presented. They might be
considered to be dynamic databases, possibly a variation on the distributed
Agent-Based or Cellular Automata models, or even related to Markov models.
Semantic comparison of text is required, but the trees can be built more, from
automatic knowledge and statistical feedback. This reduced model might also be
attractive for security or privacy reasons, as not all of the potential data
gets saved. The construction process maintains the key requirement of
generality, allowing it to be used as part of a generic framework. The nature
of the method also means that some level of optimisation or normalisation of
the information will occur. This gives comparisons with databases or
knowledge-bases, but a database system would firstly model its environment or
datasets and then populate the database with instance values. The concept base
deals with a more uncertain environment and therefore cannot fully model it
beforehand. The model itself therefore evolves over time. Similar to databases,
it also needs a good indexing system, where the construction process provides
memory and indexing structures. These allow for more complex concepts to be
automatically created, stored and retrieved, possibly as part of a more
cognitive model. There are also some arguments, or more abstract ideas, for
merging physical-world laws into these automatic processes.
| no_new_dataset | 0.941439 |
1407.1571 | Jonathan Ullman | Jonathan Ullman | Private Multiplicative Weights Beyond Linear Queries | null | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A wide variety of fundamental data analyses in machine learning, such as
linear and logistic regression, require minimizing a convex function defined by
the data. Since the data may contain sensitive information about individuals,
and these analyses can leak that sensitive information, it is important to be
able to solve convex minimization in a privacy-preserving way.
A series of recent results show how to accurately solve a single convex
minimization problem in a differentially private manner. However, the same data
is often analyzed repeatedly, and little is known about solving multiple convex
minimization problems with differential privacy. For simpler data analyses,
such as linear queries, there are remarkable differentially private algorithms
such as the private multiplicative weights mechanism (Hardt and Rothblum, FOCS
2010) that accurately answer exponentially many distinct queries. In this work,
we extend these results to the case of convex minimization and show how to give
accurate and differentially private solutions to *exponentially many* convex
minimization problems on a sensitive dataset.
| [
{
"version": "v1",
"created": "Mon, 7 Jul 2014 02:51:37 GMT"
},
{
"version": "v2",
"created": "Fri, 26 Sep 2014 18:43:19 GMT"
},
{
"version": "v3",
"created": "Sat, 14 Mar 2015 19:21:33 GMT"
}
] | 2015-03-17T00:00:00 | [
[
"Ullman",
"Jonathan",
""
]
] | TITLE: Private Multiplicative Weights Beyond Linear Queries
ABSTRACT: A wide variety of fundamental data analyses in machine learning, such as
linear and logistic regression, require minimizing a convex function defined by
the data. Since the data may contain sensitive information about individuals,
and these analyses can leak that sensitive information, it is important to be
able to solve convex minimization in a privacy-preserving way.
A series of recent results show how to accurately solve a single convex
minimization problem in a differentially private manner. However, the same data
is often analyzed repeatedly, and little is known about solving multiple convex
minimization problems with differential privacy. For simpler data analyses,
such as linear queries, there are remarkable differentially private algorithms
such as the private multiplicative weights mechanism (Hardt and Rothblum, FOCS
2010) that accurately answer exponentially many distinct queries. In this work,
we extend these results to the case of convex minimization and show how to give
accurate and differentially private solutions to *exponentially many* convex
minimization problems on a sensitive dataset.
| no_new_dataset | 0.94801 |
1411.4726 | Reza Rawassizadeh | Reza Rawassizadeh and Elaheh Momeni and Prajna Shetty | Scalable Mining of Daily Behavioral Patterns in Context Sensing Life-Log
Data | 10 pages, 6 figures, 2 tables | null | null | null | cs.HC cs.CY | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Despite the advent of wearable devices and the proliferation of smartphones,
there still is no ideal platform that can continuously sense and precisely
collect all available contextual information. Ideally, mobile sensing data
collection approaches should deal with uncertainty and data loss originating
from software and hardware restrictions. We have conducted life logging data
collection experiments from 35 users and created a rich dataset (9.26 million
records) to represent the real-world deployment issues of mobile sensing
systems. We create a novel set of algorithms to identify human behavioral
motifs while considering the uncertainty of collected data objects. Our work
benefits from combinations of sensors available on a device and identifies
behavioral patterns with a temporal granularity similar to human time
perception. Employing a combination of sensors rather than focusing on only one
sensor can handle uncertainty by neglecting sensor data that is not available
and focusing instead on available data. Moreover, by experimenting on two real,
large datasets, we demonstrate that using a sliding window significantly
improves the scalability of our algorithms, which can be used by applications
for small devices, such as smartphones and wearables.
| [
{
"version": "v1",
"created": "Tue, 18 Nov 2014 03:33:10 GMT"
},
{
"version": "v2",
"created": "Mon, 16 Feb 2015 04:29:09 GMT"
},
{
"version": "v3",
"created": "Mon, 16 Mar 2015 14:57:48 GMT"
}
] | 2015-03-17T00:00:00 | [
[
"Rawassizadeh",
"Reza",
""
],
[
"Momeni",
"Elaheh",
""
],
[
"Shetty",
"Prajna",
""
]
] | TITLE: Scalable Mining of Daily Behavioral Patterns in Context Sensing Life-Log
Data
ABSTRACT: Despite the advent of wearable devices and the proliferation of smartphones,
there still is no ideal platform that can continuously sense and precisely
collect all available contextual information. Ideally, mobile sensing data
collection approaches should deal with uncertainty and data loss originating
from software and hardware restrictions. We have conducted life logging data
collection experiments from 35 users and created a rich dataset (9.26 million
records) to represent the real-world deployment issues of mobile sensing
systems. We create a novel set of algorithms to identify human behavioral
motifs while considering the uncertainty of collected data objects. Our work
benefits from combinations of sensors available on a device and identifies
behavioral patterns with a temporal granularity similar to human time
perception. Employing a combination of sensors rather than focusing on only one
sensor can handle uncertainty by neglecting sensor data that is not available
and focusing instead on available data. Moreover, by experimenting on two real,
large datasets, we demonstrate that using a sliding window significantly
improves the scalability of our algorithms, which can be used by applications
for small devices, such as smartphones and wearables.
| new_dataset | 0.961822 |
1503.04250 | Julia Bernd | Julia Bernd, Damian Borth, Benjamin Elizalde, Gerald Friedland,
Heather Gallagher, Luke Gottlieb, Adam Janin, Sara Karabashlieva, Jocelyn
Takahashi, Jennifer Won | The YLI-MED Corpus: Characteristics, Procedures, and Plans | 47 pages; 3 figures; 25 tables. Also published as ICSI Technical
Report TR-15-001 | null | null | TR-15-001 | cs.MM cs.CL | http://creativecommons.org/licenses/by/3.0/ | The YLI Multimedia Event Detection corpus is a public-domain index of videos
with annotations and computed features, specialized for research in multimedia
event detection (MED), i.e., automatically identifying what's happening in a
video by analyzing the audio and visual content. The videos indexed in the
YLI-MED corpus are a subset of the larger YLI feature corpus, which is being
developed by the International Computer Science Institute and Lawrence
Livermore National Laboratory based on the Yahoo Flickr Creative Commons 100
Million (YFCC100M) dataset. The videos in YLI-MED are categorized as depicting
one of ten target events, or no target event, and are annotated for additional
attributes like language spoken and whether the video has a musical score. The
annotations also include degree of annotator agreement and average annotator
confidence scores for the event categorization of each video. Version 1.0 of
YLI-MED includes 1823 "positive" videos that depict the target events and
48,138 "negative" videos, as well as 177 supplementary videos that are similar
to event videos but are not positive examples. Our goal in producing YLI-MED is
to be as open about our data and procedures as possible. This report describes
the procedures used to collect the corpus; gives detailed descriptive
statistics about the corpus makeup (and how video attributes affected
annotators' judgments); discusses possible biases in the corpus introduced by
our procedural choices and compares it with the most similar existing dataset,
TRECVID MED's HAVIC corpus; and gives an overview of our future plans for
expanding the annotation effort.
| [
{
"version": "v1",
"created": "Fri, 13 Mar 2015 23:36:42 GMT"
}
] | 2015-03-17T00:00:00 | [
[
"Bernd",
"Julia",
""
],
[
"Borth",
"Damian",
""
],
[
"Elizalde",
"Benjamin",
""
],
[
"Friedland",
"Gerald",
""
],
[
"Gallagher",
"Heather",
""
],
[
"Gottlieb",
"Luke",
""
],
[
"Janin",
"Adam",
""
],
[
"Karabashlieva",
"Sara",
""
],
[
"Takahashi",
"Jocelyn",
""
],
[
"Won",
"Jennifer",
""
]
] | TITLE: The YLI-MED Corpus: Characteristics, Procedures, and Plans
ABSTRACT: The YLI Multimedia Event Detection corpus is a public-domain index of videos
with annotations and computed features, specialized for research in multimedia
event detection (MED), i.e., automatically identifying what's happening in a
video by analyzing the audio and visual content. The videos indexed in the
YLI-MED corpus are a subset of the larger YLI feature corpus, which is being
developed by the International Computer Science Institute and Lawrence
Livermore National Laboratory based on the Yahoo Flickr Creative Commons 100
Million (YFCC100M) dataset. The videos in YLI-MED are categorized as depicting
one of ten target events, or no target event, and are annotated for additional
attributes like language spoken and whether the video has a musical score. The
annotations also include degree of annotator agreement and average annotator
confidence scores for the event categorization of each video. Version 1.0 of
YLI-MED includes 1823 "positive" videos that depict the target events and
48,138 "negative" videos, as well as 177 supplementary videos that are similar
to event videos but are not positive examples. Our goal in producing YLI-MED is
to be as open about our data and procedures as possible. This report describes
the procedures used to collect the corpus; gives detailed descriptive
statistics about the corpus makeup (and how video attributes affected
annotators' judgments); discusses possible biases in the corpus introduced by
our procedural choices and compares it with the most similar existing dataset,
TRECVID MED's HAVIC corpus; and gives an overview of our future plans for
expanding the annotation effort.
| no_new_dataset | 0.885186 |
1503.04608 | Aleksandar Dimovski | Aleksandar S. Dimovski, Claus Brabrand, Andrzej W\k{a}sowski | Variability Abstractions: Trading Precision for Speed in Family-Based
Analyses (Extended Version) | 50 pages, 10 figures | null | null | null | cs.PL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Family-based (lifted) data-flow analysis for Software Product Lines (SPLs) is
capable of analyzing all valid products (variants) without generating any of
them explicitly. It takes as input only the common code base, which encodes all
variants of a SPL, and produces analysis results corresponding to all variants.
However, the computational cost of the lifted analysis still depends inherently
on the number of variants (which is exponential in the number of features, in
the worst case). For a large number of features, the lifted analysis may be too
costly or even infeasible. In this paper, we introduce variability abstractions
defined as Galois connections and use abstract interpretation as a formal
method for the calculational-based derivation of approximate (abstracted)
lifted analyses of SPL programs, which are sound by construction. Moreover,
given an abstraction we define a syntactic transformation that translates any
SPL program into an abstracted version of it, such that the analysis of the
abstracted SPL coincides with the corresponding abstracted analysis of the
original SPL. We implement the transformation in a tool, reconfigurator that
works on Object-Oriented Java program families, and evaluate the practicality
of this approach on three Java SPL benchmarks.
| [
{
"version": "v1",
"created": "Mon, 16 Mar 2015 11:16:36 GMT"
}
] | 2015-03-17T00:00:00 | [
[
"Dimovski",
"Aleksandar S.",
""
],
[
"Brabrand",
"Claus",
""
],
[
"Wąsowski",
"Andrzej",
""
]
] | TITLE: Variability Abstractions: Trading Precision for Speed in Family-Based
Analyses (Extended Version)
ABSTRACT: Family-based (lifted) data-flow analysis for Software Product Lines (SPLs) is
capable of analyzing all valid products (variants) without generating any of
them explicitly. It takes as input only the common code base, which encodes all
variants of a SPL, and produces analysis results corresponding to all variants.
However, the computational cost of the lifted analysis still depends inherently
on the number of variants (which is exponential in the number of features, in
the worst case). For a large number of features, the lifted analysis may be too
costly or even infeasible. In this paper, we introduce variability abstractions
defined as Galois connections and use abstract interpretation as a formal
method for the calculational-based derivation of approximate (abstracted)
lifted analyses of SPL programs, which are sound by construction. Moreover,
given an abstraction we define a syntactic transformation that translates any
SPL program into an abstracted version of it, such that the analysis of the
abstracted SPL coincides with the corresponding abstracted analysis of the
original SPL. We implement the transformation in a tool, reconfigurator that
works on Object-Oriented Java program families, and evaluate the practicality
of this approach on three Java SPL benchmarks.
| no_new_dataset | 0.947332 |
1410.0260 | William March | William B. March, Bo Xiao, George Biros | ASKIT: Approximate Skeletonization Kernel-Independent Treecode in High
Dimensions | 22 pages, 6 figures | null | null | null | cs.DS cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present a fast algorithm for kernel summation problems in high-dimensions.
These problems appear in computational physics, numerical approximation,
non-parametric statistics, and machine learning. In our context, the sums
depend on a kernel function that is a pair potential defined on a dataset of
points in a high-dimensional Euclidean space. A direct evaluation of the sum
scales quadratically with the number of points. Fast kernel summation methods
can reduce this cost to linear complexity, but the constants involved do not
scale well with the dimensionality of the dataset.
The main algorithmic components of fast kernel summation algorithms are the
separation of the kernel sum between near and far field (which is the basis for
pruning) and the efficient and accurate approximation of the far field.
We introduce novel methods for pruning and approximating the far field. Our
far field approximation requires only kernel evaluations and does not use
analytic expansions. Pruning is not done using bounding boxes but rather
combinatorially using a sparsified nearest-neighbor graph of the input. The
time complexity of our algorithm depends linearly on the ambient dimension. The
error in the algorithm depends on the low-rank approximability of the far
field, which in turn depends on the kernel function and on the intrinsic
dimensionality of the distribution of the points. The error of the far field
approximation does not depend on the ambient dimension.
We present the new algorithm along with experimental results that demonstrate
its performance. We report results for Gaussian kernel sums for 100 million
points in 64 dimensions, for one million points in 1000 dimensions, and for
problems in which the Gaussian kernel has a variable bandwidth. To the best of
our knowledge, all of these experiments are impossible or prohibitively
expensive with existing fast kernel summation methods.
| [
{
"version": "v1",
"created": "Wed, 1 Oct 2014 15:41:11 GMT"
},
{
"version": "v2",
"created": "Fri, 23 Jan 2015 22:38:05 GMT"
},
{
"version": "v3",
"created": "Fri, 13 Mar 2015 17:31:21 GMT"
}
] | 2015-03-16T00:00:00 | [
[
"March",
"William B.",
""
],
[
"Xiao",
"Bo",
""
],
[
"Biros",
"George",
""
]
] | TITLE: ASKIT: Approximate Skeletonization Kernel-Independent Treecode in High
Dimensions
ABSTRACT: We present a fast algorithm for kernel summation problems in high-dimensions.
These problems appear in computational physics, numerical approximation,
non-parametric statistics, and machine learning. In our context, the sums
depend on a kernel function that is a pair potential defined on a dataset of
points in a high-dimensional Euclidean space. A direct evaluation of the sum
scales quadratically with the number of points. Fast kernel summation methods
can reduce this cost to linear complexity, but the constants involved do not
scale well with the dimensionality of the dataset.
The main algorithmic components of fast kernel summation algorithms are the
separation of the kernel sum between near and far field (which is the basis for
pruning) and the efficient and accurate approximation of the far field.
We introduce novel methods for pruning and approximating the far field. Our
far field approximation requires only kernel evaluations and does not use
analytic expansions. Pruning is not done using bounding boxes but rather
combinatorially using a sparsified nearest-neighbor graph of the input. The
time complexity of our algorithm depends linearly on the ambient dimension. The
error in the algorithm depends on the low-rank approximability of the far
field, which in turn depends on the kernel function and on the intrinsic
dimensionality of the distribution of the points. The error of the far field
approximation does not depend on the ambient dimension.
We present the new algorithm along with experimental results that demonstrate
its performance. We report results for Gaussian kernel sums for 100 million
points in 64 dimensions, for one million points in 1000 dimensions, and for
problems in which the Gaussian kernel has a variable bandwidth. To the best of
our knowledge, all of these experiments are impossible or prohibitively
expensive with existing fast kernel summation methods.
| no_new_dataset | 0.949012 |
1503.02761 | Ava Bargi | Ava Bargi, Richard Yi Da Xu, Massimo Piccardi | An Adaptive Online HDP-HMM for Segmentation and Classification of
Sequential Data | 23 pages, 9 figures and 4 tables | null | null | null | stat.ML cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In the recent years, the desire and need to understand sequential data has
been increasing, with particular interest in sequential contexts such as
patient monitoring, understanding daily activities, video surveillance, stock
market and the like. Along with the constant flow of data, it is critical to
classify and segment the observations on-the-fly, without being limited to a
rigid number of classes. In addition, the model needs to be capable of updating
its parameters to comply with possible evolutions. This interesting problem,
however, is not adequately addressed in the literature since many studies focus
on offline classification over a pre-defined class set. In this paper, we
propose a principled solution to this gap by introducing an adaptive online
system based on Markov switching models with hierarchical Dirichlet process
priors. This infinite adaptive online approach is capable of segmenting and
classifying the sequential data over unlimited number of classes, while meeting
the memory and delay constraints of streaming contexts. The model is further
enhanced by introducing a learning rate, responsible for balancing the extent
to which the model sustains its previous learning (parameters) or adapts to the
new streaming observations. Experimental results on several variants of
stationary and evolving synthetic data and two video datasets, TUM Assistive
Kitchen and collatedWeizmann, show remarkable performance in segmentation and
classification, particularly for evolutionary sequences with changing
distributions and/or containing new, unseen classes.
| [
{
"version": "v1",
"created": "Tue, 10 Mar 2015 03:27:34 GMT"
},
{
"version": "v2",
"created": "Fri, 13 Mar 2015 01:36:18 GMT"
}
] | 2015-03-16T00:00:00 | [
[
"Bargi",
"Ava",
""
],
[
"Da Xu",
"Richard Yi",
""
],
[
"Piccardi",
"Massimo",
""
]
] | TITLE: An Adaptive Online HDP-HMM for Segmentation and Classification of
Sequential Data
ABSTRACT: In the recent years, the desire and need to understand sequential data has
been increasing, with particular interest in sequential contexts such as
patient monitoring, understanding daily activities, video surveillance, stock
market and the like. Along with the constant flow of data, it is critical to
classify and segment the observations on-the-fly, without being limited to a
rigid number of classes. In addition, the model needs to be capable of updating
its parameters to comply with possible evolutions. This interesting problem,
however, is not adequately addressed in the literature since many studies focus
on offline classification over a pre-defined class set. In this paper, we
propose a principled solution to this gap by introducing an adaptive online
system based on Markov switching models with hierarchical Dirichlet process
priors. This infinite adaptive online approach is capable of segmenting and
classifying the sequential data over unlimited number of classes, while meeting
the memory and delay constraints of streaming contexts. The model is further
enhanced by introducing a learning rate, responsible for balancing the extent
to which the model sustains its previous learning (parameters) or adapts to the
new streaming observations. Experimental results on several variants of
stationary and evolving synthetic data and two video datasets, TUM Assistive
Kitchen and collatedWeizmann, show remarkable performance in segmentation and
classification, particularly for evolutionary sequences with changing
distributions and/or containing new, unseen classes.
| no_new_dataset | 0.9463 |
1503.04055 | Bas Jansen | Bas Jansen | Enron versus EUSES: A Comparison of Two Spreadsheet Corpora | In Proceedings of the 2nd Workshop on Software Engineering Methods in
Spreadsheets | null | null | null | cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Spreadsheets are widely used within companies and often form the basis for
business decisions. Numerous cases are known where incorrect information in
spreadsheets has lead to incorrect decisions. Such cases underline the
relevance of research on the professional use of spreadsheets.
Recently a new dataset became available for research, containing over 15.000
business spreadsheets that were extracted from the Enron E-mail Archive. With
this dataset, we 1) aim to obtain a thorough understanding of the
characteristics of spreadsheets used within companies, and 2) compare the
characteristics of the Enron spreadsheets with the EUSES corpus which is the
existing state of the art set of spreadsheets that is frequently used in
spreadsheet studies.
Our analysis shows that 1) the majority of spreadsheets are not large in
terms of worksheets and formulas, do not have a high degree of coupling, and
their formulas are relatively simple; 2) the spreadsheets from the EUSES corpus
are, with respect to the measured characteristics, quite similar to the Enron
spreadsheets.
| [
{
"version": "v1",
"created": "Fri, 13 Mar 2015 13:27:32 GMT"
}
] | 2015-03-16T00:00:00 | [
[
"Jansen",
"Bas",
""
]
] | TITLE: Enron versus EUSES: A Comparison of Two Spreadsheet Corpora
ABSTRACT: Spreadsheets are widely used within companies and often form the basis for
business decisions. Numerous cases are known where incorrect information in
spreadsheets has lead to incorrect decisions. Such cases underline the
relevance of research on the professional use of spreadsheets.
Recently a new dataset became available for research, containing over 15.000
business spreadsheets that were extracted from the Enron E-mail Archive. With
this dataset, we 1) aim to obtain a thorough understanding of the
characteristics of spreadsheets used within companies, and 2) compare the
characteristics of the Enron spreadsheets with the EUSES corpus which is the
existing state of the art set of spreadsheets that is frequently used in
spreadsheet studies.
Our analysis shows that 1) the majority of spreadsheets are not large in
terms of worksheets and formulas, do not have a high degree of coupling, and
their formulas are relatively simple; 2) the spreadsheets from the EUSES corpus
are, with respect to the measured characteristics, quite similar to the Enron
spreadsheets.
| new_dataset | 0.959535 |
1503.04065 | Praveen Kulkarni | Praveen Kulkarni, Joaquin Zepeda, Frederic Jurie, Patrick Perez and
Louis Chevallier | Hybrid multi-layer Deep CNN/Aggregator feature for image classification | Accepted in ICASSP 2015 conference, 5 pages including reference, 4
figures and 2 tables | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Deep Convolutional Neural Networks (DCNN) have established a remarkable
performance benchmark in the field of image classification, displacing
classical approaches based on hand-tailored aggregations of local descriptors.
Yet DCNNs impose high computational burdens both at training and at testing
time, and training them requires collecting and annotating large amounts of
training data. Supervised adaptation methods have been proposed in the
literature that partially re-learn a transferred DCNN structure from a new
target dataset. Yet these require expensive bounding-box annotations and are
still computationally expensive to learn. In this paper, we address these
shortcomings of DCNN adaptation schemes by proposing a hybrid approach that
combines conventional, unsupervised aggregators such as Bag-of-Words (BoW),
with the DCNN pipeline by treating the output of intermediate layers as densely
extracted local descriptors.
We test a variant of our approach that uses only intermediate DCNN layers on
the standard PASCAL VOC 2007 dataset and show performance significantly higher
than the standard BoW model and comparable to Fisher vector aggregation but
with a feature that is 150 times smaller. A second variant of our approach that
includes the fully connected DCNN layers significantly outperforms Fisher
vector schemes and performs comparably to DCNN approaches adapted to Pascal VOC
2007, yet at only a small fraction of the training and testing cost.
| [
{
"version": "v1",
"created": "Fri, 13 Mar 2015 13:49:26 GMT"
}
] | 2015-03-16T00:00:00 | [
[
"Kulkarni",
"Praveen",
""
],
[
"Zepeda",
"Joaquin",
""
],
[
"Jurie",
"Frederic",
""
],
[
"Perez",
"Patrick",
""
],
[
"Chevallier",
"Louis",
""
]
] | TITLE: Hybrid multi-layer Deep CNN/Aggregator feature for image classification
ABSTRACT: Deep Convolutional Neural Networks (DCNN) have established a remarkable
performance benchmark in the field of image classification, displacing
classical approaches based on hand-tailored aggregations of local descriptors.
Yet DCNNs impose high computational burdens both at training and at testing
time, and training them requires collecting and annotating large amounts of
training data. Supervised adaptation methods have been proposed in the
literature that partially re-learn a transferred DCNN structure from a new
target dataset. Yet these require expensive bounding-box annotations and are
still computationally expensive to learn. In this paper, we address these
shortcomings of DCNN adaptation schemes by proposing a hybrid approach that
combines conventional, unsupervised aggregators such as Bag-of-Words (BoW),
with the DCNN pipeline by treating the output of intermediate layers as densely
extracted local descriptors.
We test a variant of our approach that uses only intermediate DCNN layers on
the standard PASCAL VOC 2007 dataset and show performance significantly higher
than the standard BoW model and comparable to Fisher vector aggregation but
with a feature that is 150 times smaller. A second variant of our approach that
includes the fully connected DCNN layers significantly outperforms Fisher
vector schemes and performs comparably to DCNN approaches adapted to Pascal VOC
2007, yet at only a small fraction of the training and testing cost.
| no_new_dataset | 0.947137 |
1503.04115 | Nam Le | Nam Do-Hoang Le | Sparse Code Formation with Linear Inhibition | Technical report, 4 pages | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Sparse code formation in the primary visual cortex (V1) has been inspiration
for many state-of-the-art visual recognition systems. To stimulate this
behavior, networks are trained networks under mathematical constraint of
sparsity or selectivity. In this paper, the authors exploit another approach
which uses lateral interconnections in feature learning networks. However,
instead of adding direct lateral interconnections among neurons, we introduce
an inhibitory layer placed right after normal encoding layer. This idea
overcomes the challenge of computational cost and complexity on lateral
networks while preserving crucial objective of sparse code formation. To
demonstrate this idea, we use sparse autoencoder as normal encoding layer and
apply inhibitory layer. Early experiments in visual recognition show relative
improvements over traditional approach on CIFAR-10 dataset. Moreover, simple
installment and training process using Hebbian rule allow inhibitory layer to
be integrated into existing networks, which enables further analysis in the
future.
| [
{
"version": "v1",
"created": "Fri, 13 Mar 2015 15:45:11 GMT"
}
] | 2015-03-16T00:00:00 | [
[
"Le",
"Nam Do-Hoang",
""
]
] | TITLE: Sparse Code Formation with Linear Inhibition
ABSTRACT: Sparse code formation in the primary visual cortex (V1) has been inspiration
for many state-of-the-art visual recognition systems. To stimulate this
behavior, networks are trained networks under mathematical constraint of
sparsity or selectivity. In this paper, the authors exploit another approach
which uses lateral interconnections in feature learning networks. However,
instead of adding direct lateral interconnections among neurons, we introduce
an inhibitory layer placed right after normal encoding layer. This idea
overcomes the challenge of computational cost and complexity on lateral
networks while preserving crucial objective of sparse code formation. To
demonstrate this idea, we use sparse autoencoder as normal encoding layer and
apply inhibitory layer. Early experiments in visual recognition show relative
improvements over traditional approach on CIFAR-10 dataset. Moreover, simple
installment and training process using Hebbian rule allow inhibitory layer to
be integrated into existing networks, which enables further analysis in the
future.
| no_new_dataset | 0.951997 |
1004.0995 | David Doty | David Doty, Matthew J. Patitz, Dustin Reishus, Robert T. Schweller,
Scott M. Summers | Strong Fault-Tolerance for Self-Assembly with Fuzzy Temperature | null | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider the problem of fault-tolerance in nanoscale algorithmic
self-assembly. We employ a variant of Winfree's abstract Tile Assembly Model
(aTAM), the two-handed aTAM, in which square "tiles" -- a model of molecules
constructed from DNA for the purpose of engineering self-assembled
nanostructures -- aggregate according to specific binding sites of varying
strengths, and in which large aggregations of tiles may attach to each other,
in contrast to the seeded aTAM, in which tiles aggregate one at a time to a
single specially-designated "seed" assembly. We focus on a major cause of
errors in tile-based self-assembly: that of unintended growth due to "weak"
strength-1 bonds, which if allowed to persist, may be stabilized by subsequent
attachment of neighboring tiles in the sense that at least energy 2 is now
required to break apart the resulting assembly; i.e., the errant assembly is
stable at temperature 2. We study a common self-assembly benchmark problem,
that of assembling an n x n square using O(log n) unique tile types, under the
two-handed model of self-assembly. Our main result achieves a much stronger
notion of fault-tolerance than those achieved previously. Arbitrary strength-1
growth is allowed (i.e., the temperature is "fuzzy" and may drift from 2 to 1
for arbitrarily long); however, any assembly that grows sufficiently to become
stable at temperature 2 is guaranteed to assemble at temperature 2 into the
correct final assembly of an n x n square. In other words, errors due to
insufficient attachment, which is the cause of errors studied in earlier papers
on fault-tolerance, are prevented absolutely in our main construction, rather
than only with high probability and for sufficiently small structures, as in
previous fault-tolerance studies.
| [
{
"version": "v1",
"created": "Wed, 7 Apr 2010 02:21:21 GMT"
}
] | 2015-03-14T00:00:00 | [
[
"Doty",
"David",
""
],
[
"Patitz",
"Matthew J.",
""
],
[
"Reishus",
"Dustin",
""
],
[
"Schweller",
"Robert T.",
""
],
[
"Summers",
"Scott M.",
""
]
] | TITLE: Strong Fault-Tolerance for Self-Assembly with Fuzzy Temperature
ABSTRACT: We consider the problem of fault-tolerance in nanoscale algorithmic
self-assembly. We employ a variant of Winfree's abstract Tile Assembly Model
(aTAM), the two-handed aTAM, in which square "tiles" -- a model of molecules
constructed from DNA for the purpose of engineering self-assembled
nanostructures -- aggregate according to specific binding sites of varying
strengths, and in which large aggregations of tiles may attach to each other,
in contrast to the seeded aTAM, in which tiles aggregate one at a time to a
single specially-designated "seed" assembly. We focus on a major cause of
errors in tile-based self-assembly: that of unintended growth due to "weak"
strength-1 bonds, which if allowed to persist, may be stabilized by subsequent
attachment of neighboring tiles in the sense that at least energy 2 is now
required to break apart the resulting assembly; i.e., the errant assembly is
stable at temperature 2. We study a common self-assembly benchmark problem,
that of assembling an n x n square using O(log n) unique tile types, under the
two-handed model of self-assembly. Our main result achieves a much stronger
notion of fault-tolerance than those achieved previously. Arbitrary strength-1
growth is allowed (i.e., the temperature is "fuzzy" and may drift from 2 to 1
for arbitrarily long); however, any assembly that grows sufficiently to become
stable at temperature 2 is guaranteed to assemble at temperature 2 into the
correct final assembly of an n x n square. In other words, errors due to
insufficient attachment, which is the cause of errors studied in earlier papers
on fault-tolerance, are prevented absolutely in our main construction, rather
than only with high probability and for sufficiently small structures, as in
previous fault-tolerance studies.
| no_new_dataset | 0.947672 |
0812.2636 | Tobias Friedrich | Karl Bringmann, Tobias Friedrich | Approximating the least hypervolume contributor: NP-hard in general, but
fast in practice | 22 pages, to appear in Theoretical Computer Science | null | 10.1016/j.tcs.2010.09.026 | null | cs.DS cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The hypervolume indicator is an increasingly popular set measure to compare
the quality of two Pareto sets. The basic ingredient of most hypervolume
indicator based optimization algorithms is the calculation of the hypervolume
contribution of single solutions regarding a Pareto set. We show that exact
calculation of the hypervolume contribution is #P-hard while its approximation
is NP-hard. The same holds for the calculation of the minimal contribution. We
also prove that it is NP-hard to decide whether a solution has the least
hypervolume contribution. Even deciding whether the contribution of a solution
is at most $(1+\eps)$ times the minimal contribution is NP-hard. This implies
that it is neither possible to efficiently find the least contributing solution
(unless $P = NP$) nor to approximate it (unless $NP = BPP$).
Nevertheless, in the second part of the paper we present a fast approximation
algorithm for this problem. We prove that for arbitrarily given $\eps,\delta>0$
it calculates a solution with contribution at most $(1+\eps)$ times the minimal
contribution with probability at least $(1-\delta)$. Though it cannot run in
polynomial time for all instances, it performs extremely fast on various
benchmark datasets. The algorithm solves very large problem instances which are
intractable for exact algorithms (e.g., 10000 solutions in 100 dimensions)
within a few seconds.
| [
{
"version": "v1",
"created": "Sun, 14 Dec 2008 13:57:10 GMT"
},
{
"version": "v2",
"created": "Fri, 24 Sep 2010 20:43:10 GMT"
}
] | 2015-03-13T00:00:00 | [
[
"Bringmann",
"Karl",
""
],
[
"Friedrich",
"Tobias",
""
]
] | TITLE: Approximating the least hypervolume contributor: NP-hard in general, but
fast in practice
ABSTRACT: The hypervolume indicator is an increasingly popular set measure to compare
the quality of two Pareto sets. The basic ingredient of most hypervolume
indicator based optimization algorithms is the calculation of the hypervolume
contribution of single solutions regarding a Pareto set. We show that exact
calculation of the hypervolume contribution is #P-hard while its approximation
is NP-hard. The same holds for the calculation of the minimal contribution. We
also prove that it is NP-hard to decide whether a solution has the least
hypervolume contribution. Even deciding whether the contribution of a solution
is at most $(1+\eps)$ times the minimal contribution is NP-hard. This implies
that it is neither possible to efficiently find the least contributing solution
(unless $P = NP$) nor to approximate it (unless $NP = BPP$).
Nevertheless, in the second part of the paper we present a fast approximation
algorithm for this problem. We prove that for arbitrarily given $\eps,\delta>0$
it calculates a solution with contribution at most $(1+\eps)$ times the minimal
contribution with probability at least $(1-\delta)$. Though it cannot run in
polynomial time for all instances, it performs extremely fast on various
benchmark datasets. The algorithm solves very large problem instances which are
intractable for exact algorithms (e.g., 10000 solutions in 100 dimensions)
within a few seconds.
| no_new_dataset | 0.942295 |
0905.3582 | Yoshiharu Maeno | Yoshiharu Maeno | Profiling of a network behind an infectious disease outbreak | null | Physica A vol.389, pp.4755-4768 (2010) | 10.1016/j.physa.2010.07.014 | null | cs.AI q-bio.PE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Stochasticity and spatial heterogeneity are of great interest recently in
studying the spread of an infectious disease. The presented method solves an
inverse problem to discover the effectively decisive topology of a
heterogeneous network and reveal the transmission parameters which govern the
stochastic spreads over the network from a dataset on an infectious disease
outbreak in the early growth phase. Populations in a combination of
epidemiological compartment models and a meta-population network model are
described by stochastic differential equations. Probability density functions
are derived from the equations and used for the maximal likelihood estimation
of the topology and parameters. The method is tested with computationally
synthesized datasets and the WHO dataset on SARS outbreak.
| [
{
"version": "v1",
"created": "Thu, 21 May 2009 23:19:41 GMT"
},
{
"version": "v2",
"created": "Fri, 5 Jun 2009 10:35:14 GMT"
},
{
"version": "v3",
"created": "Fri, 29 Jan 2010 08:52:00 GMT"
},
{
"version": "v4",
"created": "Wed, 31 Mar 2010 03:17:35 GMT"
},
{
"version": "v5",
"created": "Mon, 14 Jun 2010 14:06:11 GMT"
}
] | 2015-03-13T00:00:00 | [
[
"Maeno",
"Yoshiharu",
""
]
] | TITLE: Profiling of a network behind an infectious disease outbreak
ABSTRACT: Stochasticity and spatial heterogeneity are of great interest recently in
studying the spread of an infectious disease. The presented method solves an
inverse problem to discover the effectively decisive topology of a
heterogeneous network and reveal the transmission parameters which govern the
stochastic spreads over the network from a dataset on an infectious disease
outbreak in the early growth phase. Populations in a combination of
epidemiological compartment models and a meta-population network model are
described by stochastic differential equations. Probability density functions
are derived from the equations and used for the maximal likelihood estimation
of the topology and parameters. The method is tested with computationally
synthesized datasets and the WHO dataset on SARS outbreak.
| no_new_dataset | 0.949435 |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.