id
large_stringlengths
9
16
submitter
large_stringlengths
3
64
authors
large_stringlengths
5
20.7k
title
large_stringlengths
5
245
comments
large_stringlengths
1
482
journal-ref
large_stringlengths
4
382
doi
large_stringlengths
9
151
report-no
large_stringlengths
2
509
categories
large_stringlengths
5
78
license
large_stringclasses
9 values
abstract
large_stringlengths
83
3.55k
versions
large listlengths
1
21
update_date
timestamp[ms]date
2007-05-23 00:00:00
2025-04-25 00:00:00
authors_parsed
large listlengths
1
1.35k
prompt
large_stringlengths
166
3.64k
label
stringclasses
2 values
prob
float64
0.5
0.98
1001.0592
Georgios Zervas
John W. Byers, Michael Mitzenmacher, Georgios Zervas
Information Asymmetries in Pay-Per-Bid Auctions: How Swoopo Makes Bank
48 pages, 21 figures
null
null
null
cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Innovative auction methods can be exploited to increase profits, with Shubik's famous "dollar auction" perhaps being the most widely known example. Recently, some mainstream e-commerce web sites have apparently achieved the same end on a much broader scale, by using "pay-per-bid" auctions to sell items, from video games to bars of gold. In these auctions, bidders incur a cost for placing each bid in addition to (or sometimes in lieu of) the winner's final purchase cost. Thus even when a winner's purchase cost is a small fraction of the item's intrinsic value, the auctioneer can still profit handsomely from the bid fees. Our work provides novel analyses for these auctions, based on both modeling and datasets derived from auctions at Swoopo.com, the leading pay-per-bid auction site. While previous modeling work predicts profit-free equilibria, we analyze the impact of information asymmetry broadly, as well as Swoopo features such as bidpacks and the Swoop It Now option specifically, to quantify the effects of imperfect information in these auctions. We find that even small asymmetries across players (cheaper bids, better estimates of other players' intent, different valuations of items, committed players willing to play "chicken") can increase the auction duration well beyond that predicted by previous work and thus skew the auctioneer's profit disproportionately. Finally, we discuss our findings in the context of a dataset of thousands of live auctions we observed on Swoopo, which enables us also to examine behavioral factors, such as the power of aggressive bidding. Ultimately, our findings show that even with fully rational players, if players overlook or are unaware any of these factors, the result is outsized profits for pay-per-bid auctioneers.
[ { "version": "v1", "created": "Tue, 5 Jan 2010 16:31:06 GMT" }, { "version": "v2", "created": "Wed, 13 Jan 2010 19:58:07 GMT" }, { "version": "v3", "created": "Tue, 30 Mar 2010 21:51:26 GMT" } ]
2015-03-13T00:00:00
[ [ "Byers", "John W.", "" ], [ "Mitzenmacher", "Michael", "" ], [ "Zervas", "Georgios", "" ] ]
TITLE: Information Asymmetries in Pay-Per-Bid Auctions: How Swoopo Makes Bank ABSTRACT: Innovative auction methods can be exploited to increase profits, with Shubik's famous "dollar auction" perhaps being the most widely known example. Recently, some mainstream e-commerce web sites have apparently achieved the same end on a much broader scale, by using "pay-per-bid" auctions to sell items, from video games to bars of gold. In these auctions, bidders incur a cost for placing each bid in addition to (or sometimes in lieu of) the winner's final purchase cost. Thus even when a winner's purchase cost is a small fraction of the item's intrinsic value, the auctioneer can still profit handsomely from the bid fees. Our work provides novel analyses for these auctions, based on both modeling and datasets derived from auctions at Swoopo.com, the leading pay-per-bid auction site. While previous modeling work predicts profit-free equilibria, we analyze the impact of information asymmetry broadly, as well as Swoopo features such as bidpacks and the Swoop It Now option specifically, to quantify the effects of imperfect information in these auctions. We find that even small asymmetries across players (cheaper bids, better estimates of other players' intent, different valuations of items, committed players willing to play "chicken") can increase the auction duration well beyond that predicted by previous work and thus skew the auctioneer's profit disproportionately. Finally, we discuss our findings in the context of a dataset of thousands of live auctions we observed on Swoopo, which enables us also to examine behavioral factors, such as the power of aggressive bidding. Ultimately, our findings show that even with fully rational players, if players overlook or are unaware any of these factors, the result is outsized profits for pay-per-bid auctioneers.
no_new_dataset
0.842669
1003.5956
Lihong Li
Lihong Li and Wei Chu and John Langford and Xuanhui Wang
Unbiased Offline Evaluation of Contextual-bandit-based News Article Recommendation Algorithms
10 pages, 7 figures, revised from the published version at the WSDM 2011 conference
null
10.1145/1935826.1935878
null
cs.LG cs.AI cs.RO stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Contextual bandit algorithms have become popular for online recommendation systems such as Digg, Yahoo! Buzz, and news recommendation in general. \emph{Offline} evaluation of the effectiveness of new algorithms in these applications is critical for protecting online user experiences but very challenging due to their "partial-label" nature. Common practice is to create a simulator which simulates the online environment for the problem at hand and then run an algorithm against this simulator. However, creating simulator itself is often difficult and modeling bias is usually unavoidably introduced. In this paper, we introduce a \emph{replay} methodology for contextual bandit algorithm evaluation. Different from simulator-based approaches, our method is completely data-driven and very easy to adapt to different applications. More importantly, our method can provide provably unbiased evaluations. Our empirical results on a large-scale news article recommendation dataset collected from Yahoo! Front Page conform well with our theoretical results. Furthermore, comparisons between our offline replay and online bucket evaluation of several contextual bandit algorithms show accuracy and effectiveness of our offline evaluation method.
[ { "version": "v1", "created": "Wed, 31 Mar 2010 01:20:07 GMT" }, { "version": "v2", "created": "Thu, 1 Mar 2012 23:33:07 GMT" } ]
2015-03-13T00:00:00
[ [ "Li", "Lihong", "" ], [ "Chu", "Wei", "" ], [ "Langford", "John", "" ], [ "Wang", "Xuanhui", "" ] ]
TITLE: Unbiased Offline Evaluation of Contextual-bandit-based News Article Recommendation Algorithms ABSTRACT: Contextual bandit algorithms have become popular for online recommendation systems such as Digg, Yahoo! Buzz, and news recommendation in general. \emph{Offline} evaluation of the effectiveness of new algorithms in these applications is critical for protecting online user experiences but very challenging due to their "partial-label" nature. Common practice is to create a simulator which simulates the online environment for the problem at hand and then run an algorithm against this simulator. However, creating simulator itself is often difficult and modeling bias is usually unavoidably introduced. In this paper, we introduce a \emph{replay} methodology for contextual bandit algorithm evaluation. Different from simulator-based approaches, our method is completely data-driven and very easy to adapt to different applications. More importantly, our method can provide provably unbiased evaluations. Our empirical results on a large-scale news article recommendation dataset collected from Yahoo! Front Page conform well with our theoretical results. Furthermore, comparisons between our offline replay and online bucket evaluation of several contextual bandit algorithms show accuracy and effectiveness of our offline evaluation method.
no_new_dataset
0.947527
1110.3655
Jorge Silva L
Jorge Luiz e Silva and Joelmir Jose Lopes and Bruno de Abreu Silva and Antonio Carlos Fernandes da Silva
Accelerating Algorithms using a Dataflow Graph in a Reconfigurable System
13 pages, 8 figures, 1 listing, 1 algorithm, 1 Table
null
null
null
cs.AR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, the acceleration of algorithms using a design of a field programmable gate array (FPGA) as a prototype of a static dataflow architecture is discussed. The static dataflow architecture using operators interconnected by parallel buses was implemented. Accelerating algorithms using a dataflow graph in a reconfigurable system shows the potential for high computation rates. The results of benchmarks implemented using the static dataflow architecture are reported at the end of this paper.
[ { "version": "v1", "created": "Mon, 17 Oct 2011 13:00:10 GMT" } ]
2015-03-13T00:00:00
[ [ "Silva", "Jorge Luiz e", "" ], [ "Lopes", "Joelmir Jose", "" ], [ "Silva", "Bruno de Abreu", "" ], [ "da Silva", "Antonio Carlos Fernandes", "" ] ]
TITLE: Accelerating Algorithms using a Dataflow Graph in a Reconfigurable System ABSTRACT: In this paper, the acceleration of algorithms using a design of a field programmable gate array (FPGA) as a prototype of a static dataflow architecture is discussed. The static dataflow architecture using operators interconnected by parallel buses was implemented. Accelerating algorithms using a dataflow graph in a reconfigurable system shows the potential for high computation rates. The results of benchmarks implemented using the static dataflow architecture are reported at the end of this paper.
no_new_dataset
0.942029
1111.4930
Arka Ghosh
Arka Ghosh
Comparative study of Financial Time Series Prediction by Artificial Neural Network with Gradient Descent Learning
null
International Journal Of Scientific & Engineering Research ISSN-2229-5518 Volume 3 Issue 1 January2012
null
null
cs.NE cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Financial forecasting is an example of a signal processing problem which is challenging due to Small sample sizes, high noise, non-stationarity, and non-linearity,but fast forecasting of stock market price is very important for strategic business planning.Present study is aimed to develop a comparative predictive model with Feedforward Multilayer Artificial Neural Network & Recurrent Time Delay Neural Network for the Financial Timeseries Prediction.This study is developed with the help of historical stockprice dataset made available by GoogleFinance.To develop this prediction model Backpropagation method with Gradient Descent learning has been implemented.Finally the Neural Net, learned with said algorithm is found to be skillful predictor for non-stationary noisy Financial Timeseries.
[ { "version": "v1", "created": "Mon, 21 Nov 2011 16:58:58 GMT" }, { "version": "v2", "created": "Tue, 31 Jan 2012 08:09:57 GMT" } ]
2015-03-13T00:00:00
[ [ "Ghosh", "Arka", "" ] ]
TITLE: Comparative study of Financial Time Series Prediction by Artificial Neural Network with Gradient Descent Learning ABSTRACT: Financial forecasting is an example of a signal processing problem which is challenging due to Small sample sizes, high noise, non-stationarity, and non-linearity,but fast forecasting of stock market price is very important for strategic business planning.Present study is aimed to develop a comparative predictive model with Feedforward Multilayer Artificial Neural Network & Recurrent Time Delay Neural Network for the Financial Timeseries Prediction.This study is developed with the help of historical stockprice dataset made available by GoogleFinance.To develop this prediction model Backpropagation method with Gradient Descent learning has been implemented.Finally the Neural Net, learned with said algorithm is found to be skillful predictor for non-stationary noisy Financial Timeseries.
no_new_dataset
0.944944
1202.2518
Liang Wang
Wang Liang
Segmenting DNA sequence into `words'
12 pages,2 figures
null
null
null
q-bio.GN cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents a novel method to segment/decode DNA sequences based on n-grams statistical language model. Firstly, we find the length of most DNA 'words' is 12 to 15 bps by analyzing the genomes of 12 model species. Then we design an unsupervised probability based approach to segment the DNA sequences. The benchmark of segmenting method is also proposed.
[ { "version": "v1", "created": "Sun, 12 Feb 2012 11:23:38 GMT" }, { "version": "v2", "created": "Thu, 23 Feb 2012 02:39:32 GMT" }, { "version": "v3", "created": "Tue, 2 Oct 2012 12:49:43 GMT" }, { "version": "v4", "created": "Sat, 22 Jun 2013 10:14:11 GMT" } ]
2015-03-13T00:00:00
[ [ "Liang", "Wang", "" ] ]
TITLE: Segmenting DNA sequence into `words' ABSTRACT: This paper presents a novel method to segment/decode DNA sequences based on n-grams statistical language model. Firstly, we find the length of most DNA 'words' is 12 to 15 bps by analyzing the genomes of 12 model species. Then we design an unsupervised probability based approach to segment the DNA sequences. The benchmark of segmenting method is also proposed.
no_new_dataset
0.949809
1202.3884
Dinesh Dileep Gaurav
Dinesh Dileep Gaurav and Renu Ramesh
A feature extraction technique based on character geometry for character recognition
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper describes a geometry based technique for feature extraction applicable to segmentation-based word recognition systems. The proposed system extracts the geometric features of the character contour. This features are based on the basic line types that forms the character skeleton. The system gives a feature vector as its output. The feature vectors so generated from a training set, were then used to train a pattern recognition engine based on Neural Networks so that the system can be benchmarked.
[ { "version": "v1", "created": "Fri, 17 Feb 2012 11:41:28 GMT" } ]
2015-03-13T00:00:00
[ [ "Gaurav", "Dinesh Dileep", "" ], [ "Ramesh", "Renu", "" ] ]
TITLE: A feature extraction technique based on character geometry for character recognition ABSTRACT: This paper describes a geometry based technique for feature extraction applicable to segmentation-based word recognition systems. The proposed system extracts the geometric features of the character contour. This features are based on the basic line types that forms the character skeleton. The system gives a feature vector as its output. The feature vectors so generated from a training set, were then used to train a pattern recognition engine based on Neural Networks so that the system can be benchmarked.
no_new_dataset
0.954223
1207.4570
Farzad Parseh
Farzad Parseh, Davood Karimzadgan Moghaddam, Mir Mohsen Pedram, Rohollah Esmaeli Manesh, Mohammad (behdad) Jamshidi
Presentation an Approach for Optimization of Semantic Web Language Based on the Document Structure
7 pages, 8 figures, 2 Tables
IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 3, No 1, May 2012 ISSN (Online): 1694-0814
null
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Pattern tree are based on integrated rules which are equal to a combination of some points connected to each other in a hierarchical structure, called Enquiry Hierarchical (EH). The main operation in pattern enquiry seeking is to locate the steps that match the given EH in the dataset. A point of algorithms has offered for EH matching; but the majority of this algorithms seeks all of the enquiry steps to access all EHs in the dataset. A few algorithms such as seek only steps that satisfy end points of EH. All of above algorithms are trying to locate a way just for investigating direct testing of steps and to locate the answer of enquiry, directly via these points. In this paper, we describe a novel algorithm to locate the answer of enquiry without access to real point of the dataset blindly. In this algorithm, first, the enquiry will be executed on enquiry schema and this leads to a schema. Using this plan, it will be clear how to seek end steps and how to achieve enquiry dataset, before seeking of the dataset steps. Therefore, none of dataset steps will be seek blindly.
[ { "version": "v1", "created": "Thu, 19 Jul 2012 07:14:15 GMT" }, { "version": "v2", "created": "Sat, 21 Jul 2012 05:05:20 GMT" } ]
2015-03-13T00:00:00
[ [ "Parseh", "Farzad", "", "behdad" ], [ "Moghaddam", "Davood Karimzadgan", "", "behdad" ], [ "Pedram", "Mir Mohsen", "", "behdad" ], [ "Manesh", "Rohollah Esmaeli", "", "behdad" ], [ "Mohammad", "", "", "behdad" ], [ "Jamshidi", "", "" ] ]
TITLE: Presentation an Approach for Optimization of Semantic Web Language Based on the Document Structure ABSTRACT: Pattern tree are based on integrated rules which are equal to a combination of some points connected to each other in a hierarchical structure, called Enquiry Hierarchical (EH). The main operation in pattern enquiry seeking is to locate the steps that match the given EH in the dataset. A point of algorithms has offered for EH matching; but the majority of this algorithms seeks all of the enquiry steps to access all EHs in the dataset. A few algorithms such as seek only steps that satisfy end points of EH. All of above algorithms are trying to locate a way just for investigating direct testing of steps and to locate the answer of enquiry, directly via these points. In this paper, we describe a novel algorithm to locate the answer of enquiry without access to real point of the dataset blindly. In this algorithm, first, the enquiry will be executed on enquiry schema and this leads to a schema. Using this plan, it will be clear how to seek end steps and how to achieve enquiry dataset, before seeking of the dataset steps. Therefore, none of dataset steps will be seek blindly.
no_new_dataset
0.941439
1208.4809
Husnabad Venkateswara Reddy
H. Venkateswara Reddy, Dr.S.Viswanadha Raju, B.Ramasubba Reddy
Comparing N-Node Set Importance Representative results with Node Importance Representative results for Categorical Clustering: An exploratory study
16 pages, 4 figures, 3 equations
null
null
null
cs.DB
http://creativecommons.org/licenses/by/3.0/
The proportionate increase in the size of the data with increase in space implies that clustering a very large data set becomes difficult and is a time consuming process.Sampling is one important technique to scale down the size of dataset and to improve the efficiency of clustering. After sampling allocating unlabeled objects into proper clusters is impossible in the categorical domain.To address the problem, Chen employed a method called MAximal Representative Data Labeling to allocate each unlabeled data point to the appropriate cluster based on Node Importance Representative and N-Node Importance Representative algorithms. This paper took off from Chen s investigation and analyzed and compared the results of NIR and NNIR leading to the conclusion that the two processes contradict each other when it comes to finding the resemblance between an unlabeled data point and a cluster.A new and better way of solving the problem was arrived at that finds resemblance between unlabeled data point within all clusters, while also providing maximal resemblance for allocation of data in the required cluster.
[ { "version": "v1", "created": "Thu, 23 Aug 2012 17:32:32 GMT" } ]
2015-03-13T00:00:00
[ [ "Reddy", "H. Venkateswara", "" ], [ "Raju", "Dr. S. Viswanadha", "" ], [ "Reddy", "B. Ramasubba", "" ] ]
TITLE: Comparing N-Node Set Importance Representative results with Node Importance Representative results for Categorical Clustering: An exploratory study ABSTRACT: The proportionate increase in the size of the data with increase in space implies that clustering a very large data set becomes difficult and is a time consuming process.Sampling is one important technique to scale down the size of dataset and to improve the efficiency of clustering. After sampling allocating unlabeled objects into proper clusters is impossible in the categorical domain.To address the problem, Chen employed a method called MAximal Representative Data Labeling to allocate each unlabeled data point to the appropriate cluster based on Node Importance Representative and N-Node Importance Representative algorithms. This paper took off from Chen s investigation and analyzed and compared the results of NIR and NNIR leading to the conclusion that the two processes contradict each other when it comes to finding the resemblance between an unlabeled data point and a cluster.A new and better way of solving the problem was arrived at that finds resemblance between unlabeled data point within all clusters, while also providing maximal resemblance for allocation of data in the required cluster.
no_new_dataset
0.955194
1209.1983
Frank Meyer
Frank Meyer, Fran\c{c}oise Fessant, Fabrice Cl\'erot, Eric Gaussier
Toward a New Protocol to Evaluate Recommender Systems
6 pages. arXiv admin note: text overlap with arXiv:1203.4487
null
null
null
cs.IR cs.PF
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we propose an approach to analyze the performance and the added value of automatic recommender systems in an industrial context. We show that recommender systems are multifaceted and can be organized around 4 structuring functions: help users to decide, help users to compare, help users to discover, help users to explore. A global off line protocol is then proposed to evaluate recommender systems. This protocol is based on the definition of appropriate evaluation measures for each aforementioned function. The evaluation protocol is discussed from the perspective of the usefulness and trust of the recommendation. A new measure called Average Measure of Impact is introduced. This measure evaluates the impact of the personalized recommendation. We experiment with two classical methods, K-Nearest Neighbors (KNN) and Matrix Factorization (MF), using the well known dataset: Netflix. A segmentation of both users and items is proposed to finely analyze where the algorithms perform well or badly. We show that the performance is strongly dependent on the segments and that there is no clear correlation between the RMSE and the quality of the recommendation.
[ { "version": "v1", "created": "Mon, 10 Sep 2012 13:27:23 GMT" } ]
2015-03-13T00:00:00
[ [ "Meyer", "Frank", "" ], [ "Fessant", "Françoise", "" ], [ "Clérot", "Fabrice", "" ], [ "Gaussier", "Eric", "" ] ]
TITLE: Toward a New Protocol to Evaluate Recommender Systems ABSTRACT: In this paper, we propose an approach to analyze the performance and the added value of automatic recommender systems in an industrial context. We show that recommender systems are multifaceted and can be organized around 4 structuring functions: help users to decide, help users to compare, help users to discover, help users to explore. A global off line protocol is then proposed to evaluate recommender systems. This protocol is based on the definition of appropriate evaluation measures for each aforementioned function. The evaluation protocol is discussed from the perspective of the usefulness and trust of the recommendation. A new measure called Average Measure of Impact is introduced. This measure evaluates the impact of the personalized recommendation. We experiment with two classical methods, K-Nearest Neighbors (KNN) and Matrix Factorization (MF), using the well known dataset: Netflix. A segmentation of both users and items is proposed to finely analyze where the algorithms perform well or badly. We show that the performance is strongly dependent on the segments and that there is no clear correlation between the RMSE and the quality of the recommendation.
no_new_dataset
0.940953
1211.6496
Naushad UzZaman Naushad UzZaman
Naushad UzZaman, Roi Blanco, Michael Matthews
TwitterPaul: Extracting and Aggregating Twitter Predictions
Check out the blog post with a summary and Prediction Retrieval information here: http://bitly.com/TwitterPaul
null
null
null
cs.SI cs.AI physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper introduces TwitterPaul, a system designed to make use of Social Media data to help to predict game outcomes for the 2010 FIFA World Cup tournament. To this end, we extracted over 538K mentions to football games from a large sample of tweets that occurred during the World Cup, and we classified into different types with a precision of up to 88%. The different mentions were aggregated in order to make predictions about the outcomes of the actual games. We attempt to learn which Twitter users are accurate predictors and explore several techniques in order to exploit this information to make more accurate predictions. We compare our results to strong baselines and against the betting line (prediction market) and found that the quality of extractions is more important than the quantity, suggesting that high precision methods working on a medium-sized dataset are preferable over low precision methods that use a larger amount of data. Finally, by aggregating some classes of predictions, the system performance is close to the one of the betting line. Furthermore, we believe that this domain independent framework can help to predict other sports, elections, product release dates and other future events that people talk about in social media.
[ { "version": "v1", "created": "Wed, 28 Nov 2012 01:33:21 GMT" }, { "version": "v2", "created": "Fri, 30 Nov 2012 16:55:53 GMT" } ]
2015-03-13T00:00:00
[ [ "UzZaman", "Naushad", "" ], [ "Blanco", "Roi", "" ], [ "Matthews", "Michael", "" ] ]
TITLE: TwitterPaul: Extracting and Aggregating Twitter Predictions ABSTRACT: This paper introduces TwitterPaul, a system designed to make use of Social Media data to help to predict game outcomes for the 2010 FIFA World Cup tournament. To this end, we extracted over 538K mentions to football games from a large sample of tweets that occurred during the World Cup, and we classified into different types with a precision of up to 88%. The different mentions were aggregated in order to make predictions about the outcomes of the actual games. We attempt to learn which Twitter users are accurate predictors and explore several techniques in order to exploit this information to make more accurate predictions. We compare our results to strong baselines and against the betting line (prediction market) and found that the quality of extractions is more important than the quantity, suggesting that high precision methods working on a medium-sized dataset are preferable over low precision methods that use a larger amount of data. Finally, by aggregating some classes of predictions, the system performance is close to the one of the betting line. Furthermore, we believe that this domain independent framework can help to predict other sports, elections, product release dates and other future events that people talk about in social media.
no_new_dataset
0.951323
1303.6163
Juan Nunez-Iglesias
Juan Nunez-Iglesias, Ryan Kennedy, Toufiq Parag, Jianbo Shi, Dmitri B. Chklovskii
Machine learning of hierarchical clustering to segment 2D and 3D images
15 pages, 8 figures
PLoS ONE, 2013, 8(8): e71715
10.1371/journal.pone.0071715
null
cs.CV cs.LG
http://creativecommons.org/licenses/by/3.0/
We aim to improve segmentation through the use of machine learning tools during region agglomeration. We propose an active learning approach for performing hierarchical agglomerative segmentation from superpixels. Our method combines multiple features at all scales of the agglomerative process, works for data with an arbitrary number of dimensions, and scales to very large datasets. We advocate the use of variation of information to measure segmentation accuracy, particularly in 3D electron microscopy (EM) images of neural tissue, and using this metric demonstrate an improvement over competing algorithms in EM and natural images.
[ { "version": "v1", "created": "Mon, 25 Mar 2013 15:20:09 GMT" }, { "version": "v2", "created": "Mon, 13 May 2013 17:37:05 GMT" }, { "version": "v3", "created": "Tue, 23 Jul 2013 11:15:25 GMT" } ]
2015-03-13T00:00:00
[ [ "Nunez-Iglesias", "Juan", "" ], [ "Kennedy", "Ryan", "" ], [ "Parag", "Toufiq", "" ], [ "Shi", "Jianbo", "" ], [ "Chklovskii", "Dmitri B.", "" ] ]
TITLE: Machine learning of hierarchical clustering to segment 2D and 3D images ABSTRACT: We aim to improve segmentation through the use of machine learning tools during region agglomeration. We propose an active learning approach for performing hierarchical agglomerative segmentation from superpixels. Our method combines multiple features at all scales of the agglomerative process, works for data with an arbitrary number of dimensions, and scales to very large datasets. We advocate the use of variation of information to measure segmentation accuracy, particularly in 3D electron microscopy (EM) images of neural tissue, and using this metric demonstrate an improvement over competing algorithms in EM and natural images.
no_new_dataset
0.953837
1501.02598
Angeliki Lazaridou
Angeliki Lazaridou, Nghia The Pham, Marco Baroni
Combining Language and Vision with a Multimodal Skip-gram Model
accepted at NAACL 2015, camera ready version, 11 pages
null
null
null
cs.CL cs.CV cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We extend the SKIP-GRAM model of Mikolov et al. (2013a) by taking visual information into account. Like SKIP-GRAM, our multimodal models (MMSKIP-GRAM) build vector-based word representations by learning to predict linguistic contexts in text corpora. However, for a restricted set of words, the models are also exposed to visual representations of the objects they denote (extracted from natural images), and must predict linguistic and visual features jointly. The MMSKIP-GRAM models achieve good performance on a variety of semantic benchmarks. Moreover, since they propagate visual information to all words, we use them to improve image labeling and retrieval in the zero-shot setup, where the test concepts are never seen during model training. Finally, the MMSKIP-GRAM models discover intriguing visual properties of abstract words, paving the way to realistic implementations of embodied theories of meaning.
[ { "version": "v1", "created": "Mon, 12 Jan 2015 10:48:32 GMT" }, { "version": "v2", "created": "Tue, 13 Jan 2015 09:37:08 GMT" }, { "version": "v3", "created": "Thu, 12 Mar 2015 09:47:33 GMT" } ]
2015-03-13T00:00:00
[ [ "Lazaridou", "Angeliki", "" ], [ "Pham", "Nghia The", "" ], [ "Baroni", "Marco", "" ] ]
TITLE: Combining Language and Vision with a Multimodal Skip-gram Model ABSTRACT: We extend the SKIP-GRAM model of Mikolov et al. (2013a) by taking visual information into account. Like SKIP-GRAM, our multimodal models (MMSKIP-GRAM) build vector-based word representations by learning to predict linguistic contexts in text corpora. However, for a restricted set of words, the models are also exposed to visual representations of the objects they denote (extracted from natural images), and must predict linguistic and visual features jointly. The MMSKIP-GRAM models achieve good performance on a variety of semantic benchmarks. Moreover, since they propagate visual information to all words, we use them to improve image labeling and retrieval in the zero-shot setup, where the test concepts are never seen during model training. Finally, the MMSKIP-GRAM models discover intriguing visual properties of abstract words, paving the way to realistic implementations of embodied theories of meaning.
no_new_dataset
0.943452
1503.03506
Christian Wachinger
Christian Wachinger and Polina Golland
Diverse Landmark Sampling from Determinantal Point Processes for Scalable Manifold Learning
null
null
null
null
cs.LG cs.AI cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
High computational costs of manifold learning prohibit its application for large point sets. A common strategy to overcome this problem is to perform dimensionality reduction on selected landmarks and to successively embed the entire dataset with the Nystr\"om method. The two main challenges that arise are: (i) the landmarks selected in non-Euclidean geometries must result in a low reconstruction error, (ii) the graph constructed from sparsely sampled landmarks must approximate the manifold well. We propose the sampling of landmarks from determinantal distributions on non-Euclidean spaces. Since current determinantal sampling algorithms have the same complexity as those for manifold learning, we present an efficient approximation running in linear time. Further, we recover the local geometry after the sparsification by assigning each landmark a local covariance matrix, estimated from the original point set. The resulting neighborhood selection based on the Bhattacharyya distance improves the embedding of sparsely sampled manifolds. Our experiments show a significant performance improvement compared to state-of-the-art landmark selection techniques.
[ { "version": "v1", "created": "Wed, 11 Mar 2015 21:09:28 GMT" } ]
2015-03-13T00:00:00
[ [ "Wachinger", "Christian", "" ], [ "Golland", "Polina", "" ] ]
TITLE: Diverse Landmark Sampling from Determinantal Point Processes for Scalable Manifold Learning ABSTRACT: High computational costs of manifold learning prohibit its application for large point sets. A common strategy to overcome this problem is to perform dimensionality reduction on selected landmarks and to successively embed the entire dataset with the Nystr\"om method. The two main challenges that arise are: (i) the landmarks selected in non-Euclidean geometries must result in a low reconstruction error, (ii) the graph constructed from sparsely sampled landmarks must approximate the manifold well. We propose the sampling of landmarks from determinantal distributions on non-Euclidean spaces. Since current determinantal sampling algorithms have the same complexity as those for manifold learning, we present an efficient approximation running in linear time. Further, we recover the local geometry after the sparsification by assigning each landmark a local covariance matrix, estimated from the original point set. The resulting neighborhood selection based on the Bhattacharyya distance improves the embedding of sparsely sampled manifolds. Our experiments show a significant performance improvement compared to state-of-the-art landmark selection techniques.
no_new_dataset
0.951006
1503.03524
Mohamed Kafsi
Mohamed Kafsi, Henriette Cramer, Bart Thomee and David A. Shamma
Describing and Understanding Neighborhood Characteristics through Online Social Media
Accepted in WWW 2015, 2015, Florence, Italy
null
10.1145/2736277.2741133
ACM 978-1-4503-3469-3/15/05
stat.ML cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Geotagged data can be used to describe regions in the world and discover local themes. However, not all data produced within a region is necessarily specifically descriptive of that area. To surface the content that is characteristic for a region, we present the geographical hierarchy model (GHM), a probabilistic model based on the assumption that data observed in a region is a random mixture of content that pertains to different levels of a hierarchy. We apply the GHM to a dataset of 8 million Flickr photos in order to discriminate between content (i.e., tags) that specifically characterizes a region (e.g., neighborhood) and content that characterizes surrounding areas or more general themes. Knowledge of the discriminative and non-discriminative terms used throughout the hierarchy enables us to quantify the uniqueness of a given region and to compare similar but distant regions. Our evaluation demonstrates that our model improves upon traditional Naive Bayes classification by 47% and hierarchical TF-IDF by 27%. We further highlight the differences and commonalities with human reasoning about what is locally characteristic for a neighborhood, distilled from ten interviews and a survey that covered themes such as time, events, and prior regional knowledge
[ { "version": "v1", "created": "Wed, 11 Mar 2015 22:13:38 GMT" } ]
2015-03-13T00:00:00
[ [ "Kafsi", "Mohamed", "" ], [ "Cramer", "Henriette", "" ], [ "Thomee", "Bart", "" ], [ "Shamma", "David A.", "" ] ]
TITLE: Describing and Understanding Neighborhood Characteristics through Online Social Media ABSTRACT: Geotagged data can be used to describe regions in the world and discover local themes. However, not all data produced within a region is necessarily specifically descriptive of that area. To surface the content that is characteristic for a region, we present the geographical hierarchy model (GHM), a probabilistic model based on the assumption that data observed in a region is a random mixture of content that pertains to different levels of a hierarchy. We apply the GHM to a dataset of 8 million Flickr photos in order to discriminate between content (i.e., tags) that specifically characterizes a region (e.g., neighborhood) and content that characterizes surrounding areas or more general themes. Knowledge of the discriminative and non-discriminative terms used throughout the hierarchy enables us to quantify the uniqueness of a given region and to compare similar but distant regions. Our evaluation demonstrates that our model improves upon traditional Naive Bayes classification by 47% and hierarchical TF-IDF by 27%. We further highlight the differences and commonalities with human reasoning about what is locally characteristic for a neighborhood, distilled from ten interviews and a survey that covered themes such as time, events, and prior regional knowledge
no_new_dataset
0.947817
1503.03607
Najva Izadpanah
Najva Izadpanah
A divisive hierarchical clustering-based method for indexing image information
null
Signal & Image Processing : An International Journal (SIPIJ) Vol.6, No.1, February 2015
null
null
cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In most practical applications of image retrieval, high-dimensional feature vectors are required, but current multi-dimensional indexing structures lose their efficiency with growth of dimensions. Our goal is to propose a divisive hierarchical clustering-based multi-dimensional indexing structure which is efficient in high-dimensional feature spaces. A projection pursuit method has been used for finding a component of the data, which data's projections onto it maximizes the approximation of negentropy for preparing essential information in order to partitioning of the data space. Various tests and experimental results on high-dimensional datasets indicate the performance of proposed method in comparison with others.
[ { "version": "v1", "created": "Thu, 12 Mar 2015 06:51:06 GMT" } ]
2015-03-13T00:00:00
[ [ "Izadpanah", "Najva", "" ] ]
TITLE: A divisive hierarchical clustering-based method for indexing image information ABSTRACT: In most practical applications of image retrieval, high-dimensional feature vectors are required, but current multi-dimensional indexing structures lose their efficiency with growth of dimensions. Our goal is to propose a divisive hierarchical clustering-based multi-dimensional indexing structure which is efficient in high-dimensional feature spaces. A projection pursuit method has been used for finding a component of the data, which data's projections onto it maximizes the approximation of negentropy for preparing essential information in order to partitioning of the data space. Various tests and experimental results on high-dimensional datasets indicate the performance of proposed method in comparison with others.
no_new_dataset
0.952442
1503.03650
Weiqing Wang
Weiqing Wang, Hongzhi Yin, Ling Chen, Yizhou Sun, Shazia Sadiq, Xiaofang Zhou
Geo-SAGE: A Geographical Sparse Additive Generative Model for Spatial Item Recommendation
10 pages, 15 figures
null
null
null
cs.IR cs.DB cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
With the rapid development of location-based social networks (LBSNs), spatial item recommendation has become an important means to help people discover attractive and interesting venues and events, especially when users travel out of town. However, this recommendation is very challenging compared to the traditional recommender systems. A user can visit only a limited number of spatial items, leading to a very sparse user-item matrix. Most of the items visited by a user are located within a short distance from where he/she lives, which makes it hard to recommend items when the user travels to a far away place. Moreover, user interests and behavior patterns may vary dramatically across different geographical regions. In light of this, we propose Geo-SAGE, a geographical sparse additive generative model for spatial item recommendation in this paper. Geo-SAGE considers both user personal interests and the preference of the crowd in the target region, by exploiting both the co-occurrence pattern of spatial items and the content of spatial items. To further alleviate the data sparsity issue, Geo-SAGE exploits the geographical correlation by smoothing the crowd's preferences over a well-designed spatial index structure called spatial pyramid. We conduct extensive experiments to evaluate the performance of our Geo-SAGE model on two real large-scale datasets. The experimental results clearly demonstrate our Geo-SAGE model outperforms the state-of-the-art in the two tasks of both out-of-town and home-town recommendations.
[ { "version": "v1", "created": "Thu, 12 Mar 2015 09:44:11 GMT" } ]
2015-03-13T00:00:00
[ [ "Wang", "Weiqing", "" ], [ "Yin", "Hongzhi", "" ], [ "Chen", "Ling", "" ], [ "Sun", "Yizhou", "" ], [ "Sadiq", "Shazia", "" ], [ "Zhou", "Xiaofang", "" ] ]
TITLE: Geo-SAGE: A Geographical Sparse Additive Generative Model for Spatial Item Recommendation ABSTRACT: With the rapid development of location-based social networks (LBSNs), spatial item recommendation has become an important means to help people discover attractive and interesting venues and events, especially when users travel out of town. However, this recommendation is very challenging compared to the traditional recommender systems. A user can visit only a limited number of spatial items, leading to a very sparse user-item matrix. Most of the items visited by a user are located within a short distance from where he/she lives, which makes it hard to recommend items when the user travels to a far away place. Moreover, user interests and behavior patterns may vary dramatically across different geographical regions. In light of this, we propose Geo-SAGE, a geographical sparse additive generative model for spatial item recommendation in this paper. Geo-SAGE considers both user personal interests and the preference of the crowd in the target region, by exploiting both the co-occurrence pattern of spatial items and the content of spatial items. To further alleviate the data sparsity issue, Geo-SAGE exploits the geographical correlation by smoothing the crowd's preferences over a well-designed spatial index structure called spatial pyramid. We conduct extensive experiments to evaluate the performance of our Geo-SAGE model on two real large-scale datasets. The experimental results clearly demonstrate our Geo-SAGE model outperforms the state-of-the-art in the two tasks of both out-of-town and home-town recommendations.
no_new_dataset
0.950824
1307.6365
Josif Grabocka
Josif Grabocka, Martin Wistuba, Lars Schmidt-Thieme
Time-Series Classification Through Histograms of Symbolic Polynomials
null
null
10.1109/TKDE.2014.2377746
null
cs.AI cs.DB cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Time-series classification has attracted considerable research attention due to the various domains where time-series data are observed, ranging from medicine to econometrics. Traditionally, the focus of time-series classification has been on short time-series data composed of a unique pattern with intraclass pattern distortions and variations, while recently there have been attempts to focus on longer series composed of various local patterns. This study presents a novel method which can detect local patterns in long time-series via fitting local polynomial functions of arbitrary degrees. The coefficients of the polynomial functions are converted to symbolic words via equivolume discretizations of the coefficients' distributions. The symbolic polynomial words enable the detection of similar local patterns by assigning the same words to similar polynomials. Moreover, a histogram of the frequencies of the words is constructed from each time-series' bag of words. Each row of the histogram enables a new representation for the series and symbolize the existence of local patterns and their frequencies. Experimental evidence demonstrates outstanding results of our method compared to the state-of-art baselines, by exhibiting the best classification accuracies in all the datasets and having statistically significant improvements in the absolute majority of experiments.
[ { "version": "v1", "created": "Wed, 24 Jul 2013 10:07:50 GMT" }, { "version": "v2", "created": "Thu, 25 Jul 2013 03:40:27 GMT" }, { "version": "v3", "created": "Wed, 31 Jul 2013 10:58:02 GMT" }, { "version": "v4", "created": "Mon, 23 Dec 2013 22:26:35 GMT" } ]
2015-03-12T00:00:00
[ [ "Grabocka", "Josif", "" ], [ "Wistuba", "Martin", "" ], [ "Schmidt-Thieme", "Lars", "" ] ]
TITLE: Time-Series Classification Through Histograms of Symbolic Polynomials ABSTRACT: Time-series classification has attracted considerable research attention due to the various domains where time-series data are observed, ranging from medicine to econometrics. Traditionally, the focus of time-series classification has been on short time-series data composed of a unique pattern with intraclass pattern distortions and variations, while recently there have been attempts to focus on longer series composed of various local patterns. This study presents a novel method which can detect local patterns in long time-series via fitting local polynomial functions of arbitrary degrees. The coefficients of the polynomial functions are converted to symbolic words via equivolume discretizations of the coefficients' distributions. The symbolic polynomial words enable the detection of similar local patterns by assigning the same words to similar polynomials. Moreover, a histogram of the frequencies of the words is constructed from each time-series' bag of words. Each row of the histogram enables a new representation for the series and symbolize the existence of local patterns and their frequencies. Experimental evidence demonstrates outstanding results of our method compared to the state-of-art baselines, by exhibiting the best classification accuracies in all the datasets and having statistically significant improvements in the absolute majority of experiments.
no_new_dataset
0.949201
1312.6712
Josif Grabocka
Josif Grabocka, Lars Schmidt-Thieme
Invariant Factorization Of Time-Series
null
null
10.1007/s10618-014-0364-z
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Time-series classification is an important domain of machine learning and a plethora of methods have been developed for the task. In comparison to existing approaches, this study presents a novel method which decomposes a time-series dataset into latent patterns and membership weights of local segments to those patterns. The process is formalized as a constrained objective function and a tailored stochastic coordinate descent optimization is applied. The time-series are projected to a new feature representation consisting of the sums of the membership weights, which captures frequencies of local patterns. Features from various sliding window sizes are concatenated in order to encapsulate the interaction of patterns from different sizes. Finally, a large-scale experimental comparison against 6 state of the art baselines and 43 real life datasets is conducted. The proposed method outperforms all the baselines with statistically significant margins in terms of prediction accuracy.
[ { "version": "v1", "created": "Mon, 23 Dec 2013 22:15:59 GMT" } ]
2015-03-12T00:00:00
[ [ "Grabocka", "Josif", "" ], [ "Schmidt-Thieme", "Lars", "" ] ]
TITLE: Invariant Factorization Of Time-Series ABSTRACT: Time-series classification is an important domain of machine learning and a plethora of methods have been developed for the task. In comparison to existing approaches, this study presents a novel method which decomposes a time-series dataset into latent patterns and membership weights of local segments to those patterns. The process is formalized as a constrained objective function and a tailored stochastic coordinate descent optimization is applied. The time-series are projected to a new feature representation consisting of the sums of the membership weights, which captures frequencies of local patterns. Features from various sliding window sizes are concatenated in order to encapsulate the interaction of patterns from different sizes. Finally, a large-scale experimental comparison against 6 state of the art baselines and 43 real life datasets is conducted. The proposed method outperforms all the baselines with statistically significant margins in terms of prediction accuracy.
no_new_dataset
0.943919
1405.1681
Chinh Dang
Chinh Dang, Hayder Radha
Representative Selection for Big Data via Sparse Graph and Geodesic Grassmann Manifold Distance
This paper has been withdrawn by the author due to lacking details
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper addresses the problem of identifying a very small subset of data points that belong to a significantly larger massive dataset (i.e., Big Data). The small number of selected data points must adequately represent and faithfully characterize the massive Big Data. Such identification process is known as representative selection [19]. We propose a novel representative selection framework by generating an l1 norm sparse graph for a given Big-Data dataset. The Big Data is partitioned recursively into clusters using a spectral clustering algorithm on the generated sparse graph. We consider each cluster as one point in a Grassmann manifold, and measure the geodesic distance among these points. The distances are further analyzed using a min-max algorithm [1] to extract an optimal subset of clusters. Finally, by considering a sparse subgraph of each selected cluster, we detect a representative using principal component centrality [11]. We refer to the proposed representative selection framework as a Sparse Graph and Grassmann Manifold (SGGM) based approach. To validate the proposed SGGM framework, we apply it onto the problem of video summarization where only few video frames, known as key frames, are selected among a much longer video sequence. A comparison of the results obtained by the proposed algorithm with the ground truth, which is agreed by multiple human judges, and with some state-of-the-art methods clearly indicates the viability of the SGGM framework.
[ { "version": "v1", "created": "Wed, 7 May 2014 17:57:25 GMT" }, { "version": "v2", "created": "Wed, 11 Mar 2015 13:57:52 GMT" } ]
2015-03-12T00:00:00
[ [ "Dang", "Chinh", "" ], [ "Radha", "Hayder", "" ] ]
TITLE: Representative Selection for Big Data via Sparse Graph and Geodesic Grassmann Manifold Distance ABSTRACT: This paper addresses the problem of identifying a very small subset of data points that belong to a significantly larger massive dataset (i.e., Big Data). The small number of selected data points must adequately represent and faithfully characterize the massive Big Data. Such identification process is known as representative selection [19]. We propose a novel representative selection framework by generating an l1 norm sparse graph for a given Big-Data dataset. The Big Data is partitioned recursively into clusters using a spectral clustering algorithm on the generated sparse graph. We consider each cluster as one point in a Grassmann manifold, and measure the geodesic distance among these points. The distances are further analyzed using a min-max algorithm [1] to extract an optimal subset of clusters. Finally, by considering a sparse subgraph of each selected cluster, we detect a representative using principal component centrality [11]. We refer to the proposed representative selection framework as a Sparse Graph and Grassmann Manifold (SGGM) based approach. To validate the proposed SGGM framework, we apply it onto the problem of video summarization where only few video frames, known as key frames, are selected among a much longer video sequence. A comparison of the results obtained by the proposed algorithm with the ground truth, which is agreed by multiple human judges, and with some state-of-the-art methods clearly indicates the viability of the SGGM framework.
no_new_dataset
0.948585
1410.2686
F. Ozgur Catak
Ferhat \"Ozg\"ur \c{C}atak
Polarization Measurement of High Dimensional Social Media Messages With Support Vector Machine Algorithm Using Mapreduce
12 pages, in Turkish
null
null
null
cs.LG cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this article, we propose a new Support Vector Machine (SVM) training algorithm based on distributed MapReduce technique. In literature, there are a lots of research that shows us SVM has highest generalization property among classification algorithms used in machine learning area. Also, SVM classifier model is not affected by correlations of the features. But SVM uses quadratic optimization techniques in its training phase. The SVM algorithm is formulated as quadratic optimization problem. Quadratic optimization problem has $O(m^3)$ time and $O(m^2)$ space complexity, where m is the training set size. The computation time of SVM training is quadratic in the number of training instances. In this reason, SVM is not a suitable classification algorithm for large scale dataset classification. To solve this training problem we developed a new distributed MapReduce method developed. Accordingly, (i) SVM algorithm is trained in distributed dataset individually; (ii) then merge all support vectors of classifier model in every trained node; and (iii) iterate these two steps until the classifier model converges to the optimal classifier function. In the implementation phase, large scale social media dataset is presented in TFxIDF matrix. The matrix is used for sentiment analysis to get polarization value. Two and three class models are created for classification method. Confusion matrices of each classification model are presented in tables. Social media messages corpus consists of 108 public and 66 private universities messages in Turkey. Twitter is used for source of corpus. Twitter user messages are collected using Twitter Streaming API. Results are shown in graphics and tables.
[ { "version": "v1", "created": "Fri, 10 Oct 2014 06:42:25 GMT" }, { "version": "v2", "created": "Wed, 11 Mar 2015 05:56:51 GMT" } ]
2015-03-12T00:00:00
[ [ "Çatak", "Ferhat Özgür", "" ] ]
TITLE: Polarization Measurement of High Dimensional Social Media Messages With Support Vector Machine Algorithm Using Mapreduce ABSTRACT: In this article, we propose a new Support Vector Machine (SVM) training algorithm based on distributed MapReduce technique. In literature, there are a lots of research that shows us SVM has highest generalization property among classification algorithms used in machine learning area. Also, SVM classifier model is not affected by correlations of the features. But SVM uses quadratic optimization techniques in its training phase. The SVM algorithm is formulated as quadratic optimization problem. Quadratic optimization problem has $O(m^3)$ time and $O(m^2)$ space complexity, where m is the training set size. The computation time of SVM training is quadratic in the number of training instances. In this reason, SVM is not a suitable classification algorithm for large scale dataset classification. To solve this training problem we developed a new distributed MapReduce method developed. Accordingly, (i) SVM algorithm is trained in distributed dataset individually; (ii) then merge all support vectors of classifier model in every trained node; and (iii) iterate these two steps until the classifier model converges to the optimal classifier function. In the implementation phase, large scale social media dataset is presented in TFxIDF matrix. The matrix is used for sentiment analysis to get polarization value. Two and three class models are created for classification method. Confusion matrices of each classification model are presented in tables. Social media messages corpus consists of 108 public and 66 private universities messages in Turkey. Twitter is used for source of corpus. Twitter user messages are collected using Twitter Streaming API. Results are shown in graphics and tables.
no_new_dataset
0.951774
1503.03163
Yanwei Fu
Xi Zhang, Yanwei Fu, Andi Zang, Leonid Sigal, Gady Agam
Learning Classifiers from Synthetic Data Using a Multichannel Autoencoder
10 pages
null
null
null
cs.CV cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a method for using synthetic data to help learning classifiers. Synthetic data, even is generated based on real data, normally results in a shift from the distribution of real data in feature space. To bridge the gap between the real and synthetic data, and jointly learn from synthetic and real data, this paper proposes a Multichannel Autoencoder(MCAE). We show that by suing MCAE, it is possible to learn a better feature representation for classification. To evaluate the proposed approach, we conduct experiments on two types of datasets. Experimental results on two datasets validate the efficiency of our MCAE model and our methodology of generating synthetic data.
[ { "version": "v1", "created": "Wed, 11 Mar 2015 03:31:53 GMT" } ]
2015-03-12T00:00:00
[ [ "Zhang", "Xi", "" ], [ "Fu", "Yanwei", "" ], [ "Zang", "Andi", "" ], [ "Sigal", "Leonid", "" ], [ "Agam", "Gady", "" ] ]
TITLE: Learning Classifiers from Synthetic Data Using a Multichannel Autoencoder ABSTRACT: We propose a method for using synthetic data to help learning classifiers. Synthetic data, even is generated based on real data, normally results in a shift from the distribution of real data in feature space. To bridge the gap between the real and synthetic data, and jointly learn from synthetic and real data, this paper proposes a Multichannel Autoencoder(MCAE). We show that by suing MCAE, it is possible to learn a better feature representation for classification. To evaluate the proposed approach, we conduct experiments on two types of datasets. Experimental results on two datasets validate the efficiency of our MCAE model and our methodology of generating synthetic data.
no_new_dataset
0.952926
1503.03168
Kalyani Desikan
G. Hannah Grace, Kalyani Desikan
Experimental Estimation of Number of Clusters Based on Cluster Quality
12 pages, 9 figures
Journal of mathematics and computer science, Vol12 (2014), 304-315
null
null
cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Text Clustering is a text mining technique which divides the given set of text documents into significant clusters. It is used for organizing a huge number of text documents into a well-organized form. In the majority of the clustering algorithms, the number of clusters must be specified apriori, which is a drawback of these algorithms. The aim of this paper is to show experimentally how to determine the number of clusters based on cluster quality. Since partitional clustering algorithms are well-suited for clustering large document datasets, we have confined our analysis to a partitional clustering algorithm.
[ { "version": "v1", "created": "Tue, 10 Mar 2015 10:34:06 GMT" } ]
2015-03-12T00:00:00
[ [ "Grace", "G. Hannah", "" ], [ "Desikan", "Kalyani", "" ] ]
TITLE: Experimental Estimation of Number of Clusters Based on Cluster Quality ABSTRACT: Text Clustering is a text mining technique which divides the given set of text documents into significant clusters. It is used for organizing a huge number of text documents into a well-organized form. In the majority of the clustering algorithms, the number of clusters must be specified apriori, which is a drawback of these algorithms. The aim of this paper is to show experimentally how to determine the number of clusters based on cluster quality. Since partitional clustering algorithms are well-suited for clustering large document datasets, we have confined our analysis to a partitional clustering algorithm.
no_new_dataset
0.949482
1503.03199
Tatsuro Kawamoto
Tatsuro Kawamoto
Persistence of activity on Twitter triggered by a natural disaster: A data analysis
2 pages, 3 figures
null
null
null
physics.soc-ph cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this note, we list the results of a simple analysis of a Twitter dataset: the complete dataset of Japanese tweets in the 1-week period after the Great East Japan earthquake, which occurred on March 11, 2011. Our data analysis shows how people reacted to the earthquake on Twitter and how some users went inactive in the long-term.
[ { "version": "v1", "created": "Wed, 11 Mar 2015 07:31:19 GMT" } ]
2015-03-12T00:00:00
[ [ "Kawamoto", "Tatsuro", "" ] ]
TITLE: Persistence of activity on Twitter triggered by a natural disaster: A data analysis ABSTRACT: In this note, we list the results of a simple analysis of a Twitter dataset: the complete dataset of Japanese tweets in the 1-week period after the Great East Japan earthquake, which occurred on March 11, 2011. Our data analysis shows how people reacted to the earthquake on Twitter and how some users went inactive in the long-term.
no_new_dataset
0.925769
1503.03238
Josif Grabocka
Josif Grabocka, Martin Wistuba, Lars Schmidt-Thieme
Scalable Discovery of Time-Series Shapelets
Under review in the journal "Knowledge and Information Systems" (KAIS)
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Time-series classification is an important problem for the data mining community due to the wide range of application domains involving time-series data. A recent paradigm, called shapelets, represents patterns that are highly predictive for the target variable. Shapelets are discovered by measuring the prediction accuracy of a set of potential (shapelet) candidates. The candidates typically consist of all the segments of a dataset, therefore, the discovery of shapelets is computationally expensive. This paper proposes a novel method that avoids measuring the prediction accuracy of similar candidates in Euclidean distance space, through an online clustering pruning technique. In addition, our algorithm incorporates a supervised shapelet selection that filters out only those candidates that improve classification accuracy. Empirical evidence on 45 datasets from the UCR collection demonstrate that our method is 3-4 orders of magnitudes faster than the fastest existing shapelet-discovery method, while providing better prediction accuracy.
[ { "version": "v1", "created": "Wed, 11 Mar 2015 09:38:49 GMT" } ]
2015-03-12T00:00:00
[ [ "Grabocka", "Josif", "" ], [ "Wistuba", "Martin", "" ], [ "Schmidt-Thieme", "Lars", "" ] ]
TITLE: Scalable Discovery of Time-Series Shapelets ABSTRACT: Time-series classification is an important problem for the data mining community due to the wide range of application domains involving time-series data. A recent paradigm, called shapelets, represents patterns that are highly predictive for the target variable. Shapelets are discovered by measuring the prediction accuracy of a set of potential (shapelet) candidates. The candidates typically consist of all the segments of a dataset, therefore, the discovery of shapelets is computationally expensive. This paper proposes a novel method that avoids measuring the prediction accuracy of similar candidates in Euclidean distance space, through an online clustering pruning technique. In addition, our algorithm incorporates a supervised shapelet selection that filters out only those candidates that improve classification accuracy. Empirical evidence on 45 datasets from the UCR collection demonstrate that our method is 3-4 orders of magnitudes faster than the fastest existing shapelet-discovery method, while providing better prediction accuracy.
no_new_dataset
0.953013
1503.03261
Jeff Jones Dr
Jeff Jones, Andrew Adamatzky
Approximation of Statistical Analysis and Estimation by Morphological Adaptation in a Model of Slime Mould
null
null
null
null
cs.ET
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
True slime mould Physarum polycephalum approximates a range of complex computations via growth and adaptation of its proto- plasmic transport network, stimulating a large body of recent research into how such a simple organism can perform such complex feats. The properties of networks constructed by slime mould are known to be in- fluenced by the local distribution of stimuli within its environment. But can the morphological adaptation of slime mould yield any information about the global statistical properties of its environment? We explore this possibility using a particle based model of slime mould. We demonstrate how morphological adaptation in blobs of virtual slime mould may be used as a simple computational mechanism that can coarsely approx- imate statistical analysis, estimation and tracking. Preliminary results include the approximation of the geometric centroid of 2D shapes, ap- proximation of arithmetic mean from spatially represented sorted and unsorted data distributions, and the estimation and dynamical tracking of moving object position in the presence of noise contaminated input stimuli. The results suggest that it is possible to utilise collectives of very simple components with limited individual computational ability (for ex- ample swarms of simple robotic devices) to extract statistical features from complex datasets by means of material adaptation and sensorial fusion.
[ { "version": "v1", "created": "Wed, 11 Mar 2015 10:33:00 GMT" } ]
2015-03-12T00:00:00
[ [ "Jones", "Jeff", "" ], [ "Adamatzky", "Andrew", "" ] ]
TITLE: Approximation of Statistical Analysis and Estimation by Morphological Adaptation in a Model of Slime Mould ABSTRACT: True slime mould Physarum polycephalum approximates a range of complex computations via growth and adaptation of its proto- plasmic transport network, stimulating a large body of recent research into how such a simple organism can perform such complex feats. The properties of networks constructed by slime mould are known to be in- fluenced by the local distribution of stimuli within its environment. But can the morphological adaptation of slime mould yield any information about the global statistical properties of its environment? We explore this possibility using a particle based model of slime mould. We demonstrate how morphological adaptation in blobs of virtual slime mould may be used as a simple computational mechanism that can coarsely approx- imate statistical analysis, estimation and tracking. Preliminary results include the approximation of the geometric centroid of 2D shapes, ap- proximation of arithmetic mean from spatially represented sorted and unsorted data distributions, and the estimation and dynamical tracking of moving object position in the presence of noise contaminated input stimuli. The results suggest that it is possible to utilise collectives of very simple components with limited individual computational ability (for ex- ample swarms of simple robotic devices) to extract statistical features from complex datasets by means of material adaptation and sensorial fusion.
no_new_dataset
0.949809
1503.03264
Jeff Jones Dr
Jeff Jones, Andrew Adamatzky
Material Approximation of Data Smoothing and Spline Curves Inspired by Slime Mould
null
null
null
null
cs.ET
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Using a particle model of Physarum displaying emer- gent morphological adaptation behaviour we demonstrate how a minimal approach to collective material computation may be used to transform and summarise properties of spatially represented datasets. We find that the virtual material relaxes more strongly to high-frequency changes in data which can be used for the smoothing (or filtering) of data by ap- proximating moving average and low-pass filters in 1D datasets. The relaxation and minimisation properties of the model enable the spatial computation of B-spline curves (approximating splines) in 2D datasets. Both clamped and unclamped spline curves, of open and closed shapes, can be represented and the degree of spline curvature corresponds to the relaxation time of the material. The material computation of spline curves also includes novel quasi-mechanical properties including unwind- ing of the shape between control points and a preferential adhesion to longer, straighter paths. Interpolating splines could not directly be ap- proximated due to the formation and evolution of Steiner points at nar- row vertices, but were approximated after rectilinear pre-processing of the source data. This pre-processing was further simplified by transform- ing the original data to contain the material inside the polyline. These exemplar results expand the repertoire of spatially represented uncon- ventional computing devices by demonstrating a simple, collective and distributed approach to data and curve smoothing.
[ { "version": "v1", "created": "Wed, 11 Mar 2015 10:36:48 GMT" } ]
2015-03-12T00:00:00
[ [ "Jones", "Jeff", "" ], [ "Adamatzky", "Andrew", "" ] ]
TITLE: Material Approximation of Data Smoothing and Spline Curves Inspired by Slime Mould ABSTRACT: Using a particle model of Physarum displaying emer- gent morphological adaptation behaviour we demonstrate how a minimal approach to collective material computation may be used to transform and summarise properties of spatially represented datasets. We find that the virtual material relaxes more strongly to high-frequency changes in data which can be used for the smoothing (or filtering) of data by ap- proximating moving average and low-pass filters in 1D datasets. The relaxation and minimisation properties of the model enable the spatial computation of B-spline curves (approximating splines) in 2D datasets. Both clamped and unclamped spline curves, of open and closed shapes, can be represented and the degree of spline curvature corresponds to the relaxation time of the material. The material computation of spline curves also includes novel quasi-mechanical properties including unwind- ing of the shape between control points and a preferential adhesion to longer, straighter paths. Interpolating splines could not directly be ap- proximated due to the formation and evolution of Steiner points at nar- row vertices, but were approximated after rectilinear pre-processing of the source data. This pre-processing was further simplified by transform- ing the original data to contain the material inside the polyline. These exemplar results expand the repertoire of spatially represented uncon- ventional computing devices by demonstrating a simple, collective and distributed approach to data and curve smoothing.
no_new_dataset
0.950778
1503.03270
Vandna Bhalla Ms
Vandna Bhalla, Santanu Chaudhury, Arihant Jain
A Novel Hybrid CNN-AIS Visual Pattern Recognition Engine
null
null
null
null
cs.CV
http://creativecommons.org/licenses/by/3.0/
Machine learning methods are used today for most recognition problems. Convolutional Neural Networks (CNN) have time and again proved successful for many image processing tasks primarily for their architecture. In this paper we propose to apply CNN to small data sets like for example, personal albums or other similar environs where the size of training dataset is a limitation, within the framework of a proposed hybrid CNN-AIS model. We use Artificial Immune System Principles to enhance small size of training data set. A layer of Clonal Selection is added to the local filtering and max pooling of CNN Architecture. The proposed Architecture is evaluated using the standard MNIST dataset by limiting the data size and also with a small personal data sample belonging to two different classes. Experimental results show that the proposed hybrid CNN-AIS based recognition engine works well when the size of training data is limited in size
[ { "version": "v1", "created": "Wed, 11 Mar 2015 10:58:25 GMT" } ]
2015-03-12T00:00:00
[ [ "Bhalla", "Vandna", "" ], [ "Chaudhury", "Santanu", "" ], [ "Jain", "Arihant", "" ] ]
TITLE: A Novel Hybrid CNN-AIS Visual Pattern Recognition Engine ABSTRACT: Machine learning methods are used today for most recognition problems. Convolutional Neural Networks (CNN) have time and again proved successful for many image processing tasks primarily for their architecture. In this paper we propose to apply CNN to small data sets like for example, personal albums or other similar environs where the size of training dataset is a limitation, within the framework of a proposed hybrid CNN-AIS model. We use Artificial Immune System Principles to enhance small size of training data set. A layer of Clonal Selection is added to the local filtering and max pooling of CNN Architecture. The proposed Architecture is evaluated using the standard MNIST dataset by limiting the data size and also with a small personal data sample belonging to two different classes. Experimental results show that the proposed hybrid CNN-AIS based recognition engine works well when the size of training data is limited in size
no_new_dataset
0.948965
1503.03355
Evangelos Papalexakis
Evangelos E. Papalexakis
Automatic Unsupervised Tensor Mining with Quality Assessment
null
null
null
null
stat.ML cs.LG cs.NA stat.AP
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A popular tool for unsupervised modelling and mining multi-aspect data is tensor decomposition. In an exploratory setting, where and no labels or ground truth are available how can we automatically decide how many components to extract? How can we assess the quality of our results, so that a domain expert can factor this quality measure in the interpretation of our results? In this paper, we introduce AutoTen, a novel automatic unsupervised tensor mining algorithm with minimal user intervention, which leverages and improves upon heuristics that assess the result quality. We extensively evaluate AutoTen's performance on synthetic data, outperforming existing baselines on this very hard problem. Finally, we apply AutoTen on a variety of real datasets, providing insights and discoveries. We view this work as a step towards a fully automated, unsupervised tensor mining tool that can be easily adopted by practitioners in academia and industry.
[ { "version": "v1", "created": "Wed, 11 Mar 2015 14:34:46 GMT" } ]
2015-03-12T00:00:00
[ [ "Papalexakis", "Evangelos E.", "" ] ]
TITLE: Automatic Unsupervised Tensor Mining with Quality Assessment ABSTRACT: A popular tool for unsupervised modelling and mining multi-aspect data is tensor decomposition. In an exploratory setting, where and no labels or ground truth are available how can we automatically decide how many components to extract? How can we assess the quality of our results, so that a domain expert can factor this quality measure in the interpretation of our results? In this paper, we introduce AutoTen, a novel automatic unsupervised tensor mining algorithm with minimal user intervention, which leverages and improves upon heuristics that assess the result quality. We extensively evaluate AutoTen's performance on synthetic data, outperforming existing baselines on this very hard problem. Finally, we apply AutoTen on a variety of real datasets, providing insights and discoveries. We view this work as a step towards a fully automated, unsupervised tensor mining tool that can be easily adopted by practitioners in academia and industry.
no_new_dataset
0.946349
1503.01596
Sungjin Ahn
Sungjin Ahn, Anoop Korattikara, Nathan Liu, Suju Rajan, Max Welling
Large-Scale Distributed Bayesian Matrix Factorization using Stochastic Gradient MCMC
null
null
null
null
cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Despite having various attractive qualities such as high prediction accuracy and the ability to quantify uncertainty and avoid over-fitting, Bayesian Matrix Factorization has not been widely adopted because of the prohibitive cost of inference. In this paper, we propose a scalable distributed Bayesian matrix factorization algorithm using stochastic gradient MCMC. Our algorithm, based on Distributed Stochastic Gradient Langevin Dynamics, can not only match the prediction accuracy of standard MCMC methods like Gibbs sampling, but at the same time is as fast and simple as stochastic gradient descent. In our experiments, we show that our algorithm can achieve the same level of prediction accuracy as Gibbs sampling an order of magnitude faster. We also show that our method reduces the prediction error as fast as distributed stochastic gradient descent, achieving a 4.1% improvement in RMSE for the Netflix dataset and an 1.8% for the Yahoo music dataset.
[ { "version": "v1", "created": "Thu, 5 Mar 2015 10:17:16 GMT" }, { "version": "v2", "created": "Tue, 10 Mar 2015 02:28:41 GMT" } ]
2015-03-11T00:00:00
[ [ "Ahn", "Sungjin", "" ], [ "Korattikara", "Anoop", "" ], [ "Liu", "Nathan", "" ], [ "Rajan", "Suju", "" ], [ "Welling", "Max", "" ] ]
TITLE: Large-Scale Distributed Bayesian Matrix Factorization using Stochastic Gradient MCMC ABSTRACT: Despite having various attractive qualities such as high prediction accuracy and the ability to quantify uncertainty and avoid over-fitting, Bayesian Matrix Factorization has not been widely adopted because of the prohibitive cost of inference. In this paper, we propose a scalable distributed Bayesian matrix factorization algorithm using stochastic gradient MCMC. Our algorithm, based on Distributed Stochastic Gradient Langevin Dynamics, can not only match the prediction accuracy of standard MCMC methods like Gibbs sampling, but at the same time is as fast and simple as stochastic gradient descent. In our experiments, we show that our algorithm can achieve the same level of prediction accuracy as Gibbs sampling an order of magnitude faster. We also show that our method reduces the prediction error as fast as distributed stochastic gradient descent, achieving a 4.1% improvement in RMSE for the Netflix dataset and an 1.8% for the Yahoo music dataset.
no_new_dataset
0.953837
1503.02940
Gabriela Montoya
Gabriela Montoya, Hala Skaf-Molli, Pascal Molli, Maria-Esther Vidal
Efficient Query Processing for SPARQL Federations with Replicated Fragments
null
null
null
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Low reliability and availability of public SPARQL endpoints prevent real-world applications from exploiting all the potential of these querying infras-tructures. Fragmenting data on servers can improve data availability but degrades performance. Replicating fragments can offer new tradeoff between performance and availability. We propose FEDRA, a framework for querying Linked Data that takes advantage of client-side data replication, and performs a source selection algorithm that aims to reduce the number of selected public SPARQL endpoints, execution time, and intermediate results. FEDRA has been implemented on the state-of-the-art query engines ANAPSID and FedX, and empirically evaluated on a variety of real-world datasets.
[ { "version": "v1", "created": "Tue, 10 Mar 2015 14:57:26 GMT" } ]
2015-03-11T00:00:00
[ [ "Montoya", "Gabriela", "" ], [ "Skaf-Molli", "Hala", "" ], [ "Molli", "Pascal", "" ], [ "Vidal", "Maria-Esther", "" ] ]
TITLE: Efficient Query Processing for SPARQL Federations with Replicated Fragments ABSTRACT: Low reliability and availability of public SPARQL endpoints prevent real-world applications from exploiting all the potential of these querying infras-tructures. Fragmenting data on servers can improve data availability but degrades performance. Replicating fragments can offer new tradeoff between performance and availability. We propose FEDRA, a framework for querying Linked Data that takes advantage of client-side data replication, and performs a source selection algorithm that aims to reduce the number of selected public SPARQL endpoints, execution time, and intermediate results. FEDRA has been implemented on the state-of-the-art query engines ANAPSID and FedX, and empirically evaluated on a variety of real-world datasets.
no_new_dataset
0.942454
1503.02974
Matthew Wade
Matthew J. Wade and Thomas P. Curtis and Russell J. Davenport
Modelling Computational Resources for Next Generation Sequencing Bioinformatics Analysis of 16S rRNA Samples
23 pages, 8 figures
null
null
null
q-bio.GN cs.CE cs.PF
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In the rapidly evolving domain of next generation sequencing and bioinformatics analysis, data generation is one aspect that is increasing at a concomitant rate. The burden associated with processing large amounts of sequencing data has emphasised the need to allocate sufficient computing resources to complete analyses in the shortest possible time with manageable and predictable costs. A novel method for predicting time to completion for a popular bioinformatics software (QIIME), was developed using key variables characteristic of the input data assumed to impact processing time. Multiple Linear Regression models were developed to determine run time for two denoising algorithms and a general bioinformatics pipeline. The models were able to accurately predict clock time for denoising sequences from a naturally assembled community dataset, but not an artificial community. Speedup and efficiency tests for AmpliconNoise also highlighted that caution was needed when allocating resources for parallel processing of data. Accurate modelling of computational processing time using easily measurable predictors can assist NGS analysts in determining resource requirements for bioinformatics software and pipelines. Whilst demonstrated on a specific group of scripts, the methodology can be extended to encompass other packages running on multiple architectures, either in parallel or sequentially.
[ { "version": "v1", "created": "Tue, 10 Mar 2015 16:18:57 GMT" } ]
2015-03-11T00:00:00
[ [ "Wade", "Matthew J.", "" ], [ "Curtis", "Thomas P.", "" ], [ "Davenport", "Russell J.", "" ] ]
TITLE: Modelling Computational Resources for Next Generation Sequencing Bioinformatics Analysis of 16S rRNA Samples ABSTRACT: In the rapidly evolving domain of next generation sequencing and bioinformatics analysis, data generation is one aspect that is increasing at a concomitant rate. The burden associated with processing large amounts of sequencing data has emphasised the need to allocate sufficient computing resources to complete analyses in the shortest possible time with manageable and predictable costs. A novel method for predicting time to completion for a popular bioinformatics software (QIIME), was developed using key variables characteristic of the input data assumed to impact processing time. Multiple Linear Regression models were developed to determine run time for two denoising algorithms and a general bioinformatics pipeline. The models were able to accurately predict clock time for denoising sequences from a naturally assembled community dataset, but not an artificial community. Speedup and efficiency tests for AmpliconNoise also highlighted that caution was needed when allocating resources for parallel processing of data. Accurate modelling of computational processing time using easily measurable predictors can assist NGS analysts in determining resource requirements for bioinformatics software and pipelines. Whilst demonstrated on a specific group of scripts, the methodology can be extended to encompass other packages running on multiple architectures, either in parallel or sequentially.
no_new_dataset
0.945045
1503.03021
Anastasios Noulas Anastasios Noulas
Vsevolod Salnikov, Renaud Lambiotte, Anastasios Noulas, Cecilia Mascolo
OpenStreetCab: Exploiting Taxi Mobility Patterns in New York City to Reduce Commuter Costs
in NetMob 2015
null
null
null
cs.SI cs.CY physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The rise of Uber as the global alternative taxi operator has attracted a lot of interest recently. Aside from the media headlines which discuss the new phenomenon, e.g. on how it has disrupted the traditional transportation industry, policy makers, economists, citizens and scientists have engaged in a discussion that is centred around the means to integrate the new generation of the sharing economy services in urban ecosystems. In this work, we aim to shed new light on the discussion, by taking advantage of a publicly available longitudinal dataset that describes the mobility of yellow taxis in New York City. In addition to movement, this data contains information on the fares paid by the taxi customers for each trip. As a result we are given the opportunity to provide a first head to head comparison between the iconic yellow taxi and its modern competitor, Uber, in one of the world's largest metropolitan centres. We identify situations when Uber X, the cheapest version of the Uber taxi service, tends to be more expensive than yellow taxis for the same journey. We also demonstrate how Uber's economic model effectively takes advantage of well known patterns in human movement. Finally, we take our analysis a step further by proposing a new mobile application that compares taxi prices in the city to facilitate traveller's taxi choices, hoping to ultimately to lead to a reduction of commuter costs. Our study provides a case on how big datasets that become public can improve urban services for consumers by offering the opportunity for transparency in economic sectors that lack up to date regulations.
[ { "version": "v1", "created": "Tue, 10 Mar 2015 18:12:14 GMT" } ]
2015-03-11T00:00:00
[ [ "Salnikov", "Vsevolod", "" ], [ "Lambiotte", "Renaud", "" ], [ "Noulas", "Anastasios", "" ], [ "Mascolo", "Cecilia", "" ] ]
TITLE: OpenStreetCab: Exploiting Taxi Mobility Patterns in New York City to Reduce Commuter Costs ABSTRACT: The rise of Uber as the global alternative taxi operator has attracted a lot of interest recently. Aside from the media headlines which discuss the new phenomenon, e.g. on how it has disrupted the traditional transportation industry, policy makers, economists, citizens and scientists have engaged in a discussion that is centred around the means to integrate the new generation of the sharing economy services in urban ecosystems. In this work, we aim to shed new light on the discussion, by taking advantage of a publicly available longitudinal dataset that describes the mobility of yellow taxis in New York City. In addition to movement, this data contains information on the fares paid by the taxi customers for each trip. As a result we are given the opportunity to provide a first head to head comparison between the iconic yellow taxi and its modern competitor, Uber, in one of the world's largest metropolitan centres. We identify situations when Uber X, the cheapest version of the Uber taxi service, tends to be more expensive than yellow taxis for the same journey. We also demonstrate how Uber's economic model effectively takes advantage of well known patterns in human movement. Finally, we take our analysis a step further by proposing a new mobile application that compares taxi prices in the city to facilitate traveller's taxi choices, hoping to ultimately to lead to a reduction of commuter costs. Our study provides a case on how big datasets that become public can improve urban services for consumers by offering the opportunity for transparency in economic sectors that lack up to date regulations.
new_dataset
0.574421
1411.1091
Jonathan Long
Jonathan Long, Ning Zhang, Trevor Darrell
Do Convnets Learn Correspondence?
null
null
null
null
cs.CV cs.LG cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Convolutional neural nets (convnets) trained from massive labeled datasets have substantially improved the state-of-the-art in image classification and object detection. However, visual understanding requires establishing correspondence on a finer level than object category. Given their large pooling regions and training from whole-image labels, it is not clear that convnets derive their success from an accurate correspondence model which could be used for precise localization. In this paper, we study the effectiveness of convnet activation features for tasks requiring correspondence. We present evidence that convnet features localize at a much finer scale than their receptive field sizes, that they can be used to perform intraclass alignment as well as conventional hand-engineered features, and that they outperform conventional features in keypoint prediction on objects from PASCAL VOC 2011.
[ { "version": "v1", "created": "Tue, 4 Nov 2014 21:35:55 GMT" } ]
2015-03-10T00:00:00
[ [ "Long", "Jonathan", "" ], [ "Zhang", "Ning", "" ], [ "Darrell", "Trevor", "" ] ]
TITLE: Do Convnets Learn Correspondence? ABSTRACT: Convolutional neural nets (convnets) trained from massive labeled datasets have substantially improved the state-of-the-art in image classification and object detection. However, visual understanding requires establishing correspondence on a finer level than object category. Given their large pooling regions and training from whole-image labels, it is not clear that convnets derive their success from an accurate correspondence model which could be used for precise localization. In this paper, we study the effectiveness of convnet activation features for tasks requiring correspondence. We present evidence that convnet features localize at a much finer scale than their receptive field sizes, that they can be used to perform intraclass alignment as well as conventional hand-engineered features, and that they outperform conventional features in keypoint prediction on objects from PASCAL VOC 2011.
no_new_dataset
0.952131
1502.00068
Ameet Talwalkar
Evan R. Sparks, Ameet Talwalkar, Michael J. Franklin, Michael I. Jordan, Tim Kraska
TuPAQ: An Efficient Planner for Large-scale Predictive Analytic Queries
null
null
null
null
cs.DB cs.DC cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The proliferation of massive datasets combined with the development of sophisticated analytical techniques have enabled a wide variety of novel applications such as improved product recommendations, automatic image tagging, and improved speech-driven interfaces. These and many other applications can be supported by Predictive Analytic Queries (PAQs). A major obstacle to supporting PAQs is the challenging and expensive process of identifying and training an appropriate predictive model. Recent efforts aiming to automate this process have focused on single node implementations and have assumed that model training itself is a black box, thus limiting the effectiveness of such approaches on large-scale problems. In this work, we build upon these recent efforts and propose an integrated PAQ planning architecture that combines advanced model search techniques, bandit resource allocation via runtime algorithm introspection, and physical optimization via batching. The result is TuPAQ, a component of the MLbase system, which solves the PAQ planning problem with comparable quality to exhaustive strategies but an order of magnitude more efficiently than the standard baseline approach, and can scale to models trained on terabytes of data across hundreds of machines.
[ { "version": "v1", "created": "Sat, 31 Jan 2015 04:51:58 GMT" }, { "version": "v2", "created": "Sun, 8 Mar 2015 22:02:24 GMT" } ]
2015-03-10T00:00:00
[ [ "Sparks", "Evan R.", "" ], [ "Talwalkar", "Ameet", "" ], [ "Franklin", "Michael J.", "" ], [ "Jordan", "Michael I.", "" ], [ "Kraska", "Tim", "" ] ]
TITLE: TuPAQ: An Efficient Planner for Large-scale Predictive Analytic Queries ABSTRACT: The proliferation of massive datasets combined with the development of sophisticated analytical techniques have enabled a wide variety of novel applications such as improved product recommendations, automatic image tagging, and improved speech-driven interfaces. These and many other applications can be supported by Predictive Analytic Queries (PAQs). A major obstacle to supporting PAQs is the challenging and expensive process of identifying and training an appropriate predictive model. Recent efforts aiming to automate this process have focused on single node implementations and have assumed that model training itself is a black box, thus limiting the effectiveness of such approaches on large-scale problems. In this work, we build upon these recent efforts and propose an integrated PAQ planning architecture that combines advanced model search techniques, bandit resource allocation via runtime algorithm introspection, and physical optimization via batching. The result is TuPAQ, a component of the MLbase system, which solves the PAQ planning problem with comparable quality to exhaustive strategies but an order of magnitude more efficiently than the standard baseline approach, and can scale to models trained on terabytes of data across hundreds of machines.
no_new_dataset
0.944177
1503.02216
Yuning Yang
Yuning Yang, Siamak Mehrkanoon and Johan A.K. Suykens
Higher order Matching Pursuit for Low Rank Tensor Learning
null
null
null
null
stat.ML cs.LG math.OC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Low rank tensor learning, such as tensor completion and multilinear multitask learning, has received much attention in recent years. In this paper, we propose higher order matching pursuit for low rank tensor learning problems with a convex or a nonconvex cost function, which is a generalization of the matching pursuit type methods. At each iteration, the main cost of the proposed methods is only to compute a rank-one tensor, which can be done efficiently, making the proposed methods scalable to large scale problems. Moreover, storing the resulting rank-one tensors is of low storage requirement, which can help to break the curse of dimensionality. The linear convergence rate of the proposed methods is established in various circumstances. Along with the main methods, we also provide a method of low computational complexity for approximately computing the rank-one tensors, with provable approximation ratio, which helps to improve the efficiency of the main methods and to analyze the convergence rate. Experimental results on synthetic as well as real datasets verify the efficiency and effectiveness of the proposed methods.
[ { "version": "v1", "created": "Sat, 7 Mar 2015 21:38:07 GMT" } ]
2015-03-10T00:00:00
[ [ "Yang", "Yuning", "" ], [ "Mehrkanoon", "Siamak", "" ], [ "Suykens", "Johan A. K.", "" ] ]
TITLE: Higher order Matching Pursuit for Low Rank Tensor Learning ABSTRACT: Low rank tensor learning, such as tensor completion and multilinear multitask learning, has received much attention in recent years. In this paper, we propose higher order matching pursuit for low rank tensor learning problems with a convex or a nonconvex cost function, which is a generalization of the matching pursuit type methods. At each iteration, the main cost of the proposed methods is only to compute a rank-one tensor, which can be done efficiently, making the proposed methods scalable to large scale problems. Moreover, storing the resulting rank-one tensors is of low storage requirement, which can help to break the curse of dimensionality. The linear convergence rate of the proposed methods is established in various circumstances. Along with the main methods, we also provide a method of low computational complexity for approximately computing the rank-one tensors, with provable approximation ratio, which helps to improve the efficiency of the main methods and to analyze the convergence rate. Experimental results on synthetic as well as real datasets verify the efficiency and effectiveness of the proposed methods.
no_new_dataset
0.94868
1503.02351
Alexander Schwing
Alexander G. Schwing and Raquel Urtasun
Fully Connected Deep Structured Networks
null
null
null
null
cs.CV cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Convolutional neural networks with many layers have recently been shown to achieve excellent results on many high-level tasks such as image classification, object detection and more recently also semantic segmentation. Particularly for semantic segmentation, a two-stage procedure is often employed. Hereby, convolutional networks are trained to provide good local pixel-wise features for the second step being traditionally a more global graphical model. In this work we unify this two-stage process into a single joint training algorithm. We demonstrate our method on the semantic image segmentation task and show encouraging results on the challenging PASCAL VOC 2012 dataset.
[ { "version": "v1", "created": "Mon, 9 Mar 2015 01:08:00 GMT" } ]
2015-03-10T00:00:00
[ [ "Schwing", "Alexander G.", "" ], [ "Urtasun", "Raquel", "" ] ]
TITLE: Fully Connected Deep Structured Networks ABSTRACT: Convolutional neural networks with many layers have recently been shown to achieve excellent results on many high-level tasks such as image classification, object detection and more recently also semantic segmentation. Particularly for semantic segmentation, a two-stage procedure is often employed. Hereby, convolutional networks are trained to provide good local pixel-wise features for the second step being traditionally a more global graphical model. In this work we unify this two-stage process into a single joint training algorithm. We demonstrate our method on the semantic image segmentation task and show encouraging results on the challenging PASCAL VOC 2012 dataset.
no_new_dataset
0.954984
1402.4279
Ingmar Schuster
Ingmar Schuster
A Bayesian Model of node interaction in networks
null
null
null
null
cs.LG stat.ME stat.ML
http://creativecommons.org/licenses/by-nc-sa/3.0/
We are concerned with modeling the strength of links in networks by taking into account how often those links are used. Link usage is a strong indicator of how closely two nodes are related, but existing network models in Bayesian Statistics and Machine Learning are able to predict only wether a link exists at all. As priors for latent attributes of network nodes we explore the Chinese Restaurant Process (CRP) and a multivariate Gaussian with fixed dimensionality. The model is applied to a social network dataset and a word coocurrence dataset.
[ { "version": "v1", "created": "Tue, 18 Feb 2014 10:34:41 GMT" }, { "version": "v2", "created": "Fri, 6 Mar 2015 10:22:12 GMT" } ]
2015-03-09T00:00:00
[ [ "Schuster", "Ingmar", "" ] ]
TITLE: A Bayesian Model of node interaction in networks ABSTRACT: We are concerned with modeling the strength of links in networks by taking into account how often those links are used. Link usage is a strong indicator of how closely two nodes are related, but existing network models in Bayesian Statistics and Machine Learning are able to predict only wether a link exists at all. As priors for latent attributes of network nodes we explore the Chinese Restaurant Process (CRP) and a multivariate Gaussian with fixed dimensionality. The model is applied to a social network dataset and a word coocurrence dataset.
no_new_dataset
0.950088
1503.01812
Vanessa Ayala-Rivera
Vanessa Ayala-Rivera, Patrick McDonagh, Thomas Cerqueus, Liam Murphy
Ontology-Based Quality Evaluation of Value Generalization Hierarchies for Data Anonymization
18 pages, 7 figures, presented in the Privacy in Statistical Databases Conference 2014 (Ibiza, Spain)
null
null
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In privacy-preserving data publishing, approaches using Value Generalization Hierarchies (VGHs) form an important class of anonymization algorithms. VGHs play a key role in the utility of published datasets as they dictate how the anonymization of the data occurs. For categorical attributes, it is imperative to preserve the semantics of the original data in order to achieve a higher utility. Despite this, semantics have not being formally considered in the specification of VGHs. Moreover, there are no methods that allow the users to assess the quality of their VGH. In this paper, we propose a measurement scheme, based on ontologies, to quantitatively evaluate the quality of VGHs, in terms of semantic consistency and taxonomic organization, with the aim of producing higher-quality anonymizations. We demonstrate, through a case study, how our evaluation scheme can be used to compare the quality of multiple VGHs and can help to identify faulty VGHs.
[ { "version": "v1", "created": "Thu, 5 Mar 2015 22:58:19 GMT" } ]
2015-03-09T00:00:00
[ [ "Ayala-Rivera", "Vanessa", "" ], [ "McDonagh", "Patrick", "" ], [ "Cerqueus", "Thomas", "" ], [ "Murphy", "Liam", "" ] ]
TITLE: Ontology-Based Quality Evaluation of Value Generalization Hierarchies for Data Anonymization ABSTRACT: In privacy-preserving data publishing, approaches using Value Generalization Hierarchies (VGHs) form an important class of anonymization algorithms. VGHs play a key role in the utility of published datasets as they dictate how the anonymization of the data occurs. For categorical attributes, it is imperative to preserve the semantics of the original data in order to achieve a higher utility. Despite this, semantics have not being formally considered in the specification of VGHs. Moreover, there are no methods that allow the users to assess the quality of their VGH. In this paper, we propose a measurement scheme, based on ontologies, to quantitatively evaluate the quality of VGHs, in terms of semantic consistency and taxonomic organization, with the aim of producing higher-quality anonymizations. We demonstrate, through a case study, how our evaluation scheme can be used to compare the quality of multiple VGHs and can help to identify faulty VGHs.
no_new_dataset
0.949295
1503.01820
Ninghang Hu
Ninghang Hu, Gwenn Englebienne, Zhongyu Lou, and Ben Kr\"ose
Latent Hierarchical Model for Activity Recognition
null
null
null
null
cs.RO cs.AI cs.CV cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a novel hierarchical model for human activity recognition. In contrast to approaches that successively recognize actions and activities, our approach jointly models actions and activities in a unified framework, and their labels are simultaneously predicted. The model is embedded with a latent layer that is able to capture a richer class of contextual information in both state-state and observation-state pairs. Although loops are present in the model, the model has an overall linear-chain structure, where the exact inference is tractable. Therefore, the model is very efficient in both inference and learning. The parameters of the graphical model are learned with a Structured Support Vector Machine (Structured-SVM). A data-driven approach is used to initialize the latent variables; therefore, no manual labeling for the latent states is required. The experimental results from using two benchmark datasets show that our model outperforms the state-of-the-art approach, and our model is computationally more efficient.
[ { "version": "v1", "created": "Fri, 6 Mar 2015 00:05:12 GMT" } ]
2015-03-09T00:00:00
[ [ "Hu", "Ninghang", "" ], [ "Englebienne", "Gwenn", "" ], [ "Lou", "Zhongyu", "" ], [ "Kröse", "Ben", "" ] ]
TITLE: Latent Hierarchical Model for Activity Recognition ABSTRACT: We present a novel hierarchical model for human activity recognition. In contrast to approaches that successively recognize actions and activities, our approach jointly models actions and activities in a unified framework, and their labels are simultaneously predicted. The model is embedded with a latent layer that is able to capture a richer class of contextual information in both state-state and observation-state pairs. Although loops are present in the model, the model has an overall linear-chain structure, where the exact inference is tractable. Therefore, the model is very efficient in both inference and learning. The parameters of the graphical model are learned with a Structured Support Vector Machine (Structured-SVM). A data-driven approach is used to initialize the latent variables; therefore, no manual labeling for the latent states is required. The experimental results from using two benchmark datasets show that our model outperforms the state-of-the-art approach, and our model is computationally more efficient.
no_new_dataset
0.949059
1503.01918
Matej Kristan
Matej Kristan, Vildana Sulic, Stanislav Kovacic, Janez Pers
Fast image-based obstacle detection from unmanned surface vehicles
This is an extended version of the ACCV2014 paper [Kristan et al., 2014] submitted to a journal. [Kristan et al., 2014] M. Kristan, J. Pers, V. Sulic, S. Kovacic, A graphical model for rapid obstacle image-map estimation from unmanned surface vehicles, in Proc. Asian Conf. Computer Vision, 2014
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Obstacle detection plays an important role in unmanned surface vehicles (USV). The USVs operate in highly diverse environments in which an obstacle may be a floating piece of wood, a scuba diver, a pier, or a part of a shoreline, which presents a significant challenge to continuous detection from images taken onboard. This paper addresses the problem of online detection by constrained unsupervised segmentation. To this end, a new graphical model is proposed that affords a fast and continuous obstacle image-map estimation from a single video stream captured onboard a USV. The model accounts for the semantic structure of marine environment as observed from USV by imposing weak structural constraints. A Markov random field framework is adopted and a highly efficient algorithm for simultaneous optimization of model parameters and segmentation mask estimation is derived. Our approach does not require computationally intensive extraction of texture features and comfortably runs in real-time. The algorithm is tested on a new, challenging, dataset for segmentation and obstacle detection in marine environments, which is the largest annotated dataset of its kind. Results on this dataset show that our model outperforms the related approaches, while requiring a fraction of computational effort.
[ { "version": "v1", "created": "Fri, 6 Mar 2015 11:21:07 GMT" } ]
2015-03-09T00:00:00
[ [ "Kristan", "Matej", "" ], [ "Sulic", "Vildana", "" ], [ "Kovacic", "Stanislav", "" ], [ "Pers", "Janez", "" ] ]
TITLE: Fast image-based obstacle detection from unmanned surface vehicles ABSTRACT: Obstacle detection plays an important role in unmanned surface vehicles (USV). The USVs operate in highly diverse environments in which an obstacle may be a floating piece of wood, a scuba diver, a pier, or a part of a shoreline, which presents a significant challenge to continuous detection from images taken onboard. This paper addresses the problem of online detection by constrained unsupervised segmentation. To this end, a new graphical model is proposed that affords a fast and continuous obstacle image-map estimation from a single video stream captured onboard a USV. The model accounts for the semantic structure of marine environment as observed from USV by imposing weak structural constraints. A Markov random field framework is adopted and a highly efficient algorithm for simultaneous optimization of model parameters and segmentation mask estimation is derived. Our approach does not require computationally intensive extraction of texture features and comfortably runs in real-time. The algorithm is tested on a new, challenging, dataset for segmentation and obstacle detection in marine environments, which is the largest annotated dataset of its kind. Results on this dataset show that our model outperforms the related approaches, while requiring a fraction of computational effort.
new_dataset
0.966632
1503.02031
Vivek Kulkarni
Prateek Jain, Vivek Kulkarni, Abhradeep Thakurta, Oliver Williams
To Drop or Not to Drop: Robustness, Consistency and Differential Privacy Properties of Dropout
Currently under review for ICML 2015
null
null
null
cs.LG cs.NE stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Training deep belief networks (DBNs) requires optimizing a non-convex function with an extremely large number of parameters. Naturally, existing gradient descent (GD) based methods are prone to arbitrarily poor local minima. In this paper, we rigorously show that such local minima can be avoided (upto an approximation error) by using the dropout technique, a widely used heuristic in this domain. In particular, we show that by randomly dropping a few nodes of a one-hidden layer neural network, the training objective function, up to a certain approximation error, decreases by a multiplicative factor. On the flip side, we show that for training convex empirical risk minimizers (ERM), dropout in fact acts as a "stabilizer" or regularizer. That is, a simple dropout based GD method for convex ERMs is stable in the face of arbitrary changes to any one of the training points. Using the above assertion, we show that dropout provides fast rates for generalization error in learning (convex) generalized linear models (GLM). Moreover, using the above mentioned stability properties of dropout, we design dropout based differentially private algorithms for solving ERMs. The learned GLM thus, preserves privacy of each of the individual training points while providing accurate predictions for new test points. Finally, we empirically validate our stability assertions for dropout in the context of convex ERMs and show that surprisingly, dropout significantly outperforms (in terms of prediction accuracy) the L2 regularization based methods for several benchmark datasets.
[ { "version": "v1", "created": "Fri, 6 Mar 2015 18:39:53 GMT" } ]
2015-03-09T00:00:00
[ [ "Jain", "Prateek", "" ], [ "Kulkarni", "Vivek", "" ], [ "Thakurta", "Abhradeep", "" ], [ "Williams", "Oliver", "" ] ]
TITLE: To Drop or Not to Drop: Robustness, Consistency and Differential Privacy Properties of Dropout ABSTRACT: Training deep belief networks (DBNs) requires optimizing a non-convex function with an extremely large number of parameters. Naturally, existing gradient descent (GD) based methods are prone to arbitrarily poor local minima. In this paper, we rigorously show that such local minima can be avoided (upto an approximation error) by using the dropout technique, a widely used heuristic in this domain. In particular, we show that by randomly dropping a few nodes of a one-hidden layer neural network, the training objective function, up to a certain approximation error, decreases by a multiplicative factor. On the flip side, we show that for training convex empirical risk minimizers (ERM), dropout in fact acts as a "stabilizer" or regularizer. That is, a simple dropout based GD method for convex ERMs is stable in the face of arbitrary changes to any one of the training points. Using the above assertion, we show that dropout provides fast rates for generalization error in learning (convex) generalized linear models (GLM). Moreover, using the above mentioned stability properties of dropout, we design dropout based differentially private algorithms for solving ERMs. The learned GLM thus, preserves privacy of each of the individual training points while providing accurate predictions for new test points. Finally, we empirically validate our stability assertions for dropout in the context of convex ERMs and show that surprisingly, dropout significantly outperforms (in terms of prediction accuracy) the L2 regularization based methods for several benchmark datasets.
no_new_dataset
0.946597
1401.6330
Li Dong
Li Dong, Furu Wei, Shujie Liu, Ming Zhou, Ke Xu
A Statistical Parsing Framework for Sentiment Classification
Accepted by Computational Linguistics
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a statistical parsing framework for sentence-level sentiment classification in this article. Unlike previous works that employ syntactic parsing results for sentiment analysis, we develop a statistical parser to directly analyze the sentiment structure of a sentence. We show that complicated phenomena in sentiment analysis (e.g., negation, intensification, and contrast) can be handled the same as simple and straightforward sentiment expressions in a unified and probabilistic way. We formulate the sentiment grammar upon Context-Free Grammars (CFGs), and provide a formal description of the sentiment parsing framework. We develop the parsing model to obtain possible sentiment parse trees for a sentence, from which the polarity model is proposed to derive the sentiment strength and polarity, and the ranking model is dedicated to selecting the best sentiment tree. We train the parser directly from examples of sentences annotated only with sentiment polarity labels but without any syntactic annotations or polarity annotations of constituents within sentences. Therefore we can obtain training data easily. In particular, we train a sentiment parser, s.parser, from a large amount of review sentences with users' ratings as rough sentiment polarity labels. Extensive experiments on existing benchmark datasets show significant improvements over baseline sentiment classification approaches.
[ { "version": "v1", "created": "Fri, 24 Jan 2014 12:56:36 GMT" }, { "version": "v2", "created": "Thu, 5 Mar 2015 05:26:13 GMT" } ]
2015-03-06T00:00:00
[ [ "Dong", "Li", "" ], [ "Wei", "Furu", "" ], [ "Liu", "Shujie", "" ], [ "Zhou", "Ming", "" ], [ "Xu", "Ke", "" ] ]
TITLE: A Statistical Parsing Framework for Sentiment Classification ABSTRACT: We present a statistical parsing framework for sentence-level sentiment classification in this article. Unlike previous works that employ syntactic parsing results for sentiment analysis, we develop a statistical parser to directly analyze the sentiment structure of a sentence. We show that complicated phenomena in sentiment analysis (e.g., negation, intensification, and contrast) can be handled the same as simple and straightforward sentiment expressions in a unified and probabilistic way. We formulate the sentiment grammar upon Context-Free Grammars (CFGs), and provide a formal description of the sentiment parsing framework. We develop the parsing model to obtain possible sentiment parse trees for a sentence, from which the polarity model is proposed to derive the sentiment strength and polarity, and the ranking model is dedicated to selecting the best sentiment tree. We train the parser directly from examples of sentences annotated only with sentiment polarity labels but without any syntactic annotations or polarity annotations of constituents within sentences. Therefore we can obtain training data easily. In particular, we train a sentiment parser, s.parser, from a large amount of review sentences with users' ratings as rough sentiment polarity labels. Extensive experiments on existing benchmark datasets show significant improvements over baseline sentiment classification approaches.
no_new_dataset
0.951908
1406.4625
Bobak Shahriari
Bobak Shahriari and Ziyu Wang and Matthew W. Hoffman and Alexandre Bouchard-C\^ot\'e and Nando de Freitas
An Entropy Search Portfolio for Bayesian Optimization
10 pages, 5 figures
null
null
null
stat.ML cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Bayesian optimization is a sample-efficient method for black-box global optimization. How- ever, the performance of a Bayesian optimization method very much depends on its exploration strategy, i.e. the choice of acquisition function, and it is not clear a priori which choice will result in superior performance. While portfolio methods provide an effective, principled way of combining a collection of acquisition functions, they are often based on measures of past performance which can be misleading. To address this issue, we introduce the Entropy Search Portfolio (ESP): a novel approach to portfolio construction which is motivated by information theoretic considerations. We show that ESP outperforms existing portfolio methods on several real and synthetic problems, including geostatistical datasets and simulated control tasks. We not only show that ESP is able to offer performance as good as the best, but unknown, acquisition function, but surprisingly it often gives better performance. Finally, over a wide range of conditions we find that ESP is robust to the inclusion of poor acquisition functions.
[ { "version": "v1", "created": "Wed, 18 Jun 2014 07:26:08 GMT" }, { "version": "v2", "created": "Mon, 27 Oct 2014 23:58:14 GMT" }, { "version": "v3", "created": "Thu, 30 Oct 2014 15:54:56 GMT" }, { "version": "v4", "created": "Wed, 4 Mar 2015 21:25:31 GMT" } ]
2015-03-06T00:00:00
[ [ "Shahriari", "Bobak", "" ], [ "Wang", "Ziyu", "" ], [ "Hoffman", "Matthew W.", "" ], [ "Bouchard-Côté", "Alexandre", "" ], [ "de Freitas", "Nando", "" ] ]
TITLE: An Entropy Search Portfolio for Bayesian Optimization ABSTRACT: Bayesian optimization is a sample-efficient method for black-box global optimization. How- ever, the performance of a Bayesian optimization method very much depends on its exploration strategy, i.e. the choice of acquisition function, and it is not clear a priori which choice will result in superior performance. While portfolio methods provide an effective, principled way of combining a collection of acquisition functions, they are often based on measures of past performance which can be misleading. To address this issue, we introduce the Entropy Search Portfolio (ESP): a novel approach to portfolio construction which is motivated by information theoretic considerations. We show that ESP outperforms existing portfolio methods on several real and synthetic problems, including geostatistical datasets and simulated control tasks. We not only show that ESP is able to offer performance as good as the best, but unknown, acquisition function, but surprisingly it often gives better performance. Finally, over a wide range of conditions we find that ESP is robust to the inclusion of poor acquisition functions.
no_new_dataset
0.934991
1410.8060
Paolo Zuliani
Fedor Shmarov, Paolo Zuliani
ProbReach: Verified Probabilistic Delta-Reachability for Stochastic Hybrid Systems
HSCC 2015
null
null
null
cs.LO cs.SY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present ProbReach, a tool for verifying probabilistic reachability for stochastic hybrid systems, i.e., computing the probability that the system reaches an unsafe region of the state space. In particular, ProbReach will compute an arbitrarily small interval which is guaranteed to contain the required probability. Standard (non-probabilistic) reachability is undecidable even for linear hybrid systems. In ProbReach we adopt the weaker notion of delta-reachability, in which the unsafe region is overapproximated by a user-defined parameter (delta). This choice leads to false alarms, but also makes the reachability problem decidable for virtually any hybrid system. In ProbReach we have implemented a probabilistic version of delta-reachability that is suited for hybrid systems whose stochastic behaviour is given in terms of random initial conditions. In this paper we introduce the capabilities of ProbReach, give an overview of the parallel implementation, and present results for several benchmarks involving highly non-linear hybrid systems.
[ { "version": "v1", "created": "Wed, 29 Oct 2014 17:09:06 GMT" }, { "version": "v2", "created": "Fri, 31 Oct 2014 21:28:30 GMT" }, { "version": "v3", "created": "Thu, 5 Mar 2015 11:29:15 GMT" } ]
2015-03-06T00:00:00
[ [ "Shmarov", "Fedor", "" ], [ "Zuliani", "Paolo", "" ] ]
TITLE: ProbReach: Verified Probabilistic Delta-Reachability for Stochastic Hybrid Systems ABSTRACT: We present ProbReach, a tool for verifying probabilistic reachability for stochastic hybrid systems, i.e., computing the probability that the system reaches an unsafe region of the state space. In particular, ProbReach will compute an arbitrarily small interval which is guaranteed to contain the required probability. Standard (non-probabilistic) reachability is undecidable even for linear hybrid systems. In ProbReach we adopt the weaker notion of delta-reachability, in which the unsafe region is overapproximated by a user-defined parameter (delta). This choice leads to false alarms, but also makes the reachability problem decidable for virtually any hybrid system. In ProbReach we have implemented a probabilistic version of delta-reachability that is suited for hybrid systems whose stochastic behaviour is given in terms of random initial conditions. In this paper we introduce the capabilities of ProbReach, give an overview of the parallel implementation, and present results for several benchmarks involving highly non-linear hybrid systems.
no_new_dataset
0.945399
1503.01508
Xiangxin Zhu
Xiangxin Zhu, Carl Vondrick, Charless Fowlkes, Deva Ramanan
Do We Need More Training Data?
null
null
10.1007/s11263-015-0812-2
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Datasets for training object recognition systems are steadily increasing in size. This paper investigates the question of whether existing detectors will continue to improve as data grows, or saturate in performance due to limited model complexity and the Bayes risk associated with the feature spaces in which they operate. We focus on the popular paradigm of discriminatively trained templates defined on oriented gradient features. We investigate the performance of mixtures of templates as the number of mixture components and the amount of training data grows. Surprisingly, even with proper treatment of regularization and "outliers", the performance of classic mixture models appears to saturate quickly ($\sim$10 templates and $\sim$100 positive training examples per template). This is not a limitation of the feature space as compositional mixtures that share template parameters via parts and that can synthesize new templates not encountered during training yield significantly better performance. Based on our analysis, we conjecture that the greatest gains in detection performance will continue to derive from improved representations and learning algorithms that can make efficient use of large datasets.
[ { "version": "v1", "created": "Thu, 5 Mar 2015 01:51:12 GMT" } ]
2015-03-06T00:00:00
[ [ "Zhu", "Xiangxin", "" ], [ "Vondrick", "Carl", "" ], [ "Fowlkes", "Charless", "" ], [ "Ramanan", "Deva", "" ] ]
TITLE: Do We Need More Training Data? ABSTRACT: Datasets for training object recognition systems are steadily increasing in size. This paper investigates the question of whether existing detectors will continue to improve as data grows, or saturate in performance due to limited model complexity and the Bayes risk associated with the feature spaces in which they operate. We focus on the popular paradigm of discriminatively trained templates defined on oriented gradient features. We investigate the performance of mixtures of templates as the number of mixture components and the amount of training data grows. Surprisingly, even with proper treatment of regularization and "outliers", the performance of classic mixture models appears to saturate quickly ($\sim$10 templates and $\sim$100 positive training examples per template). This is not a limitation of the feature space as compositional mixtures that share template parameters via parts and that can synthesize new templates not encountered during training yield significantly better performance. Based on our analysis, we conjecture that the greatest gains in detection performance will continue to derive from improved representations and learning algorithms that can make efficient use of large datasets.
no_new_dataset
0.947186
1503.01538
Natalia Bilenko
Natalia Y. Bilenko and Jack L. Gallant
Pyrcca: regularized kernel canonical correlation analysis in Python and its applications to neuroimaging
null
null
null
null
q-bio.QM cs.CV stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Canonical correlation analysis (CCA) is a valuable method for interpreting cross-covariance across related datasets of different dimensionality. There are many potential applications of CCA to neuroimaging data analysis. For instance, CCA can be used for finding functional similarities across fMRI datasets collected from multiple subjects without resampling individual datasets to a template anatomy. In this paper, we introduce Pyrcca, an open-source Python module for executing CCA between two or more datasets. Pyrcca can be used to implement CCA with or without regularization, and with or without linear or a Gaussian kernelization of the datasets. We demonstrate an application of CCA implemented with Pyrcca to neuroimaging data analysis. We use CCA to find a data-driven set of functional response patterns that are similar across individual subjects in a natural movie experiment. We then demonstrate how this set of response patterns discovered by CCA can be used to accurately predict subject responses to novel natural movie stimuli.
[ { "version": "v1", "created": "Thu, 5 Mar 2015 04:57:22 GMT" } ]
2015-03-06T00:00:00
[ [ "Bilenko", "Natalia Y.", "" ], [ "Gallant", "Jack L.", "" ] ]
TITLE: Pyrcca: regularized kernel canonical correlation analysis in Python and its applications to neuroimaging ABSTRACT: Canonical correlation analysis (CCA) is a valuable method for interpreting cross-covariance across related datasets of different dimensionality. There are many potential applications of CCA to neuroimaging data analysis. For instance, CCA can be used for finding functional similarities across fMRI datasets collected from multiple subjects without resampling individual datasets to a template anatomy. In this paper, we introduce Pyrcca, an open-source Python module for executing CCA between two or more datasets. Pyrcca can be used to implement CCA with or without regularization, and with or without linear or a Gaussian kernelization of the datasets. We demonstrate an application of CCA implemented with Pyrcca to neuroimaging data analysis. We use CCA to find a data-driven set of functional response patterns that are similar across individual subjects in a natural movie experiment. We then demonstrate how this set of response patterns discovered by CCA can be used to accurately predict subject responses to novel natural movie stimuli.
no_new_dataset
0.939081
1503.01543
Chunhua Shen
Sakrapee Paisitkriangkrai, Chunhua Shen, Anton van den Hengel
Learning to rank in person re-identification with metric ensembles
10 pages
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose an effective structured learning based approach to the problem of person re-identification which outperforms the current state-of-the-art on most benchmark data sets evaluated. Our framework is built on the basis of multiple low-level hand-crafted and high-level visual features. We then formulate two optimization algorithms, which directly optimize evaluation measures commonly used in person re-identification, also known as the Cumulative Matching Characteristic (CMC) curve. Our new approach is practical to many real-world surveillance applications as the re-identification performance can be concentrated in the range of most practical importance. The combination of these factors leads to a person re-identification system which outperforms most existing algorithms. More importantly, we advance state-of-the-art results on person re-identification by improving the rank-$1$ recognition rates from $40\%$ to $50\%$ on the iLIDS benchmark, $16\%$ to $18\%$ on the PRID2011 benchmark, $43\%$ to $46\%$ on the VIPeR benchmark, $34\%$ to $53\%$ on the CUHK01 benchmark and $21\%$ to $62\%$ on the CUHK03 benchmark.
[ { "version": "v1", "created": "Thu, 5 Mar 2015 05:25:57 GMT" } ]
2015-03-06T00:00:00
[ [ "Paisitkriangkrai", "Sakrapee", "" ], [ "Shen", "Chunhua", "" ], [ "Hengel", "Anton van den", "" ] ]
TITLE: Learning to rank in person re-identification with metric ensembles ABSTRACT: We propose an effective structured learning based approach to the problem of person re-identification which outperforms the current state-of-the-art on most benchmark data sets evaluated. Our framework is built on the basis of multiple low-level hand-crafted and high-level visual features. We then formulate two optimization algorithms, which directly optimize evaluation measures commonly used in person re-identification, also known as the Cumulative Matching Characteristic (CMC) curve. Our new approach is practical to many real-world surveillance applications as the re-identification performance can be concentrated in the range of most practical importance. The combination of these factors leads to a person re-identification system which outperforms most existing algorithms. More importantly, we advance state-of-the-art results on person re-identification by improving the rank-$1$ recognition rates from $40\%$ to $50\%$ on the iLIDS benchmark, $16\%$ to $18\%$ on the PRID2011 benchmark, $43\%$ to $46\%$ on the VIPeR benchmark, $34\%$ to $53\%$ on the CUHK01 benchmark and $21\%$ to $62\%$ on the CUHK03 benchmark.
no_new_dataset
0.946745
1503.01647
Zhangyang Wang
Zhangyang Wang, Xianming Liu, Shiyu Chang, Jiayu Zhou, Guo-Jun Qi, Thomas S. Huang
Decentralized Recommender Systems
null
null
null
null
cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper proposes a decentralized recommender system by formulating the popular collaborative filleting (CF) model into a decentralized matrix completion form over a set of users. In such a way, data storages and computations are fully distributed. Each user could exchange limited information with its local neighborhood, and thus it avoids the centralized fusion. Advantages of the proposed system include a protection on user privacy, as well as better scalability and robustness. We compare our proposed algorithm with several state-of-the-art algorithms on the FlickerUserFavor dataset, and demonstrate that the decentralized algorithm can gain a competitive performance to others.
[ { "version": "v1", "created": "Thu, 5 Mar 2015 14:34:02 GMT" } ]
2015-03-06T00:00:00
[ [ "Wang", "Zhangyang", "" ], [ "Liu", "Xianming", "" ], [ "Chang", "Shiyu", "" ], [ "Zhou", "Jiayu", "" ], [ "Qi", "Guo-Jun", "" ], [ "Huang", "Thomas S.", "" ] ]
TITLE: Decentralized Recommender Systems ABSTRACT: This paper proposes a decentralized recommender system by formulating the popular collaborative filleting (CF) model into a decentralized matrix completion form over a set of users. In such a way, data storages and computations are fully distributed. Each user could exchange limited information with its local neighborhood, and thus it avoids the centralized fusion. Advantages of the proposed system include a protection on user privacy, as well as better scalability and robustness. We compare our proposed algorithm with several state-of-the-art algorithms on the FlickerUserFavor dataset, and demonstrate that the decentralized algorithm can gain a competitive performance to others.
no_new_dataset
0.949059
1503.01657
Rui Zeng
Rui Zeng, Jiasong Wu, Zhuhong Shao, Yang Chen, Lotfi Senhadji, Huazhong Shu
Color Image Classification via Quaternion Principal Component Analysis Network
9 figures,5 tables
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Principal Component Analysis Network (PCANet), which is one of the recently proposed deep learning architectures, achieves the state-of-the-art classification accuracy in various databases. However, the performance of PCANet may be degraded when dealing with color images. In this paper, a Quaternion Principal Component Analysis Network (QPCANet), which is an extension of PCANet, is proposed for color images classification. Compared to PCANet, the proposed QPCANet takes into account the spatial distribution information of color images and ensures larger amount of intra-class invariance of color images. Experiments conducted on different color image datasets such as Caltech-101, UC Merced Land Use, Georgia Tech face and CURet have revealed that the proposed QPCANet achieves higher classification accuracy than PCANet.
[ { "version": "v1", "created": "Thu, 5 Mar 2015 15:12:28 GMT" } ]
2015-03-06T00:00:00
[ [ "Zeng", "Rui", "" ], [ "Wu", "Jiasong", "" ], [ "Shao", "Zhuhong", "" ], [ "Chen", "Yang", "" ], [ "Senhadji", "Lotfi", "" ], [ "Shu", "Huazhong", "" ] ]
TITLE: Color Image Classification via Quaternion Principal Component Analysis Network ABSTRACT: The Principal Component Analysis Network (PCANet), which is one of the recently proposed deep learning architectures, achieves the state-of-the-art classification accuracy in various databases. However, the performance of PCANet may be degraded when dealing with color images. In this paper, a Quaternion Principal Component Analysis Network (QPCANet), which is an extension of PCANet, is proposed for color images classification. Compared to PCANet, the proposed QPCANet takes into account the spatial distribution information of color images and ensures larger amount of intra-class invariance of color images. Experiments conducted on different color image datasets such as Caltech-101, UC Merced Land Use, Georgia Tech face and CURet have revealed that the proposed QPCANet achieves higher classification accuracy than PCANet.
no_new_dataset
0.952838
1503.01737
Ping Li
Ping Li
Min-Max Kernels
null
null
null
null
stat.ML cs.LG stat.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The min-max kernel is a generalization of the popular resemblance kernel (which is designed for binary data). In this paper, we demonstrate, through an extensive classification study using kernel machines, that the min-max kernel often provides an effective measure of similarity for nonnegative data. As the min-max kernel is nonlinear and might be difficult to be used for industrial applications with massive data, we show that the min-max kernel can be linearized via hashing techniques. This allows practitioners to apply min-max kernel to large-scale applications using well matured linear algorithms such as linear SVM or logistic regression. The previous remarkable work on consistent weighted sampling (CWS) produces samples in the form of ($i^*, t^*$) where the $i^*$ records the location (and in fact also the weights) information analogous to the samples produced by classical minwise hashing on binary data. Because the $t^*$ is theoretically unbounded, it was not immediately clear how to effectively implement CWS for building large-scale linear classifiers. In this paper, we provide a simple solution by discarding $t^*$ (which we refer to as the "0-bit" scheme). Via an extensive empirical study, we show that this 0-bit scheme does not lose essential information. We then apply the "0-bit" CWS for building linear classifiers to approximate min-max kernel classifiers, as extensively validated on a wide range of publicly available classification datasets. We expect this work will generate interests among data mining practitioners who would like to efficiently utilize the nonlinear information of non-binary and nonnegative data.
[ { "version": "v1", "created": "Thu, 5 Mar 2015 19:29:03 GMT" } ]
2015-03-06T00:00:00
[ [ "Li", "Ping", "" ] ]
TITLE: Min-Max Kernels ABSTRACT: The min-max kernel is a generalization of the popular resemblance kernel (which is designed for binary data). In this paper, we demonstrate, through an extensive classification study using kernel machines, that the min-max kernel often provides an effective measure of similarity for nonnegative data. As the min-max kernel is nonlinear and might be difficult to be used for industrial applications with massive data, we show that the min-max kernel can be linearized via hashing techniques. This allows practitioners to apply min-max kernel to large-scale applications using well matured linear algorithms such as linear SVM or logistic regression. The previous remarkable work on consistent weighted sampling (CWS) produces samples in the form of ($i^*, t^*$) where the $i^*$ records the location (and in fact also the weights) information analogous to the samples produced by classical minwise hashing on binary data. Because the $t^*$ is theoretically unbounded, it was not immediately clear how to effectively implement CWS for building large-scale linear classifiers. In this paper, we provide a simple solution by discarding $t^*$ (which we refer to as the "0-bit" scheme). Via an extensive empirical study, we show that this 0-bit scheme does not lose essential information. We then apply the "0-bit" CWS for building linear classifiers to approximate min-max kernel classifiers, as extensively validated on a wide range of publicly available classification datasets. We expect this work will generate interests among data mining practitioners who would like to efficiently utilize the nonlinear information of non-binary and nonnegative data.
no_new_dataset
0.947235
1503.01156
David Felber
David Felber and Rafail Ostrovsky
A randomized online quantile summary in $O(\frac{1}{\varepsilon} \log \frac{1}{\varepsilon})$ words
slight fixes to version submitted to ICALP 2015--mistake in time complexity, and a few minor numeric miscalculations in section 3
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A quantile summary is a data structure that approximates to $\varepsilon$-relative error the order statistics of a much larger underlying dataset. In this paper we develop a randomized online quantile summary for the cash register data input model and comparison data domain model that uses $O(\frac{1}{\varepsilon} \log \frac{1}{\varepsilon})$ words of memory. This improves upon the previous best upper bound of $O(\frac{1}{\varepsilon} \log^{3/2} \frac{1}{\varepsilon})$ by Agarwal et. al. (PODS 2012). Further, by a lower bound of Hung and Ting (FAW 2010) no deterministic summary for the comparison model can outperform our randomized summary in terms of space complexity. Lastly, our summary has the nice property that $O(\frac{1}{\varepsilon} \log \frac{1}{\varepsilon})$ words suffice to ensure that the success probability is $1 - e^{-\text{poly}(1/\varepsilon)}$.
[ { "version": "v1", "created": "Tue, 3 Mar 2015 22:58:55 GMT" } ]
2015-03-05T00:00:00
[ [ "Felber", "David", "" ], [ "Ostrovsky", "Rafail", "" ] ]
TITLE: A randomized online quantile summary in $O(\frac{1}{\varepsilon} \log \frac{1}{\varepsilon})$ words ABSTRACT: A quantile summary is a data structure that approximates to $\varepsilon$-relative error the order statistics of a much larger underlying dataset. In this paper we develop a randomized online quantile summary for the cash register data input model and comparison data domain model that uses $O(\frac{1}{\varepsilon} \log \frac{1}{\varepsilon})$ words of memory. This improves upon the previous best upper bound of $O(\frac{1}{\varepsilon} \log^{3/2} \frac{1}{\varepsilon})$ by Agarwal et. al. (PODS 2012). Further, by a lower bound of Hung and Ting (FAW 2010) no deterministic summary for the comparison model can outperform our randomized summary in terms of space complexity. Lastly, our summary has the nice property that $O(\frac{1}{\varepsilon} \log \frac{1}{\varepsilon})$ words suffice to ensure that the success probability is $1 - e^{-\text{poly}(1/\varepsilon)}$.
no_new_dataset
0.944485
1503.01210
Borhan Sanandaji
Borhan M. Sanandaji, Akin Tascikaraoglu, Kameshwar Poolla, and Pravin Varaiya
Low-dimensional Models in Spatio-Temporal Wind Speed Forecasting
Initially submitted for review to the 2015 American Control Conference on September 22, 2014; Accepted for publication on January 22, 2015
null
null
null
cs.SY stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Integrating wind power into the grid is challenging because of its random nature. Integration is facilitated with accurate short-term forecasts of wind power. The paper presents a spatio-temporal wind speed forecasting algorithm that incorporates the time series data of a target station and data of surrounding stations. Inspired by Compressive Sensing (CS) and structured-sparse recovery algorithms, we claim that there usually exists an intrinsic low-dimensional structure governing a large collection of stations that should be exploited. We cast the forecasting problem as recovery of a block-sparse signal $\boldsymbol{x}$ from a set of linear equations $\boldsymbol{b} = A\boldsymbol{x}$ for which we propose novel structure-sparse recovery algorithms. Results of a case study in the east coast show that the proposed Compressive Spatio-Temporal Wind Speed Forecasting (CST-WSF) algorithm significantly improves the short-term forecasts compared to a set of widely-used benchmark models.
[ { "version": "v1", "created": "Wed, 4 Mar 2015 04:00:19 GMT" } ]
2015-03-05T00:00:00
[ [ "Sanandaji", "Borhan M.", "" ], [ "Tascikaraoglu", "Akin", "" ], [ "Poolla", "Kameshwar", "" ], [ "Varaiya", "Pravin", "" ] ]
TITLE: Low-dimensional Models in Spatio-Temporal Wind Speed Forecasting ABSTRACT: Integrating wind power into the grid is challenging because of its random nature. Integration is facilitated with accurate short-term forecasts of wind power. The paper presents a spatio-temporal wind speed forecasting algorithm that incorporates the time series data of a target station and data of surrounding stations. Inspired by Compressive Sensing (CS) and structured-sparse recovery algorithms, we claim that there usually exists an intrinsic low-dimensional structure governing a large collection of stations that should be exploited. We cast the forecasting problem as recovery of a block-sparse signal $\boldsymbol{x}$ from a set of linear equations $\boldsymbol{b} = A\boldsymbol{x}$ for which we propose novel structure-sparse recovery algorithms. Results of a case study in the east coast show that the proposed Compressive Spatio-Temporal Wind Speed Forecasting (CST-WSF) algorithm significantly improves the short-term forecasts compared to a set of widely-used benchmark models.
no_new_dataset
0.940898
1503.01228
Kui Tang
Kui Tang, Nicholas Ruozzi, David Belanger, Tony Jebara
Bethe Learning of Conditional Random Fields via MAP Decoding
19 pages (9 supplementary), 10 figures (3 supplementary)
null
null
null
cs.LG cs.CV stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Many machine learning tasks can be formulated in terms of predicting structured outputs. In frameworks such as the structured support vector machine (SVM-Struct) and the structured perceptron, discriminative functions are learned by iteratively applying efficient maximum a posteriori (MAP) decoding. However, maximum likelihood estimation (MLE) of probabilistic models over these same structured spaces requires computing partition functions, which is generally intractable. This paper presents a method for learning discrete exponential family models using the Bethe approximation to the MLE. Remarkably, this problem also reduces to iterative (MAP) decoding. This connection emerges by combining the Bethe approximation with a Frank-Wolfe (FW) algorithm on a convex dual objective which circumvents the intractable partition function. The result is a new single loop algorithm MLE-Struct, which is substantially more efficient than previous double-loop methods for approximate maximum likelihood estimation. Our algorithm outperforms existing methods in experiments involving image segmentation, matching problems from vision, and a new dataset of university roommate assignments.
[ { "version": "v1", "created": "Wed, 4 Mar 2015 05:41:29 GMT" } ]
2015-03-05T00:00:00
[ [ "Tang", "Kui", "" ], [ "Ruozzi", "Nicholas", "" ], [ "Belanger", "David", "" ], [ "Jebara", "Tony", "" ] ]
TITLE: Bethe Learning of Conditional Random Fields via MAP Decoding ABSTRACT: Many machine learning tasks can be formulated in terms of predicting structured outputs. In frameworks such as the structured support vector machine (SVM-Struct) and the structured perceptron, discriminative functions are learned by iteratively applying efficient maximum a posteriori (MAP) decoding. However, maximum likelihood estimation (MLE) of probabilistic models over these same structured spaces requires computing partition functions, which is generally intractable. This paper presents a method for learning discrete exponential family models using the Bethe approximation to the MLE. Remarkably, this problem also reduces to iterative (MAP) decoding. This connection emerges by combining the Bethe approximation with a Frank-Wolfe (FW) algorithm on a convex dual objective which circumvents the intractable partition function. The result is a new single loop algorithm MLE-Struct, which is substantially more efficient than previous double-loop methods for approximate maximum likelihood estimation. Our algorithm outperforms existing methods in experiments involving image segmentation, matching problems from vision, and a new dataset of university roommate assignments.
new_dataset
0.967808
1503.01393
Mete Ozay
Mete Ozay, Krzysztof Walas, Ales Leonardis
A Hierarchical Approach for Joint Multi-view Object Pose Estimation and Categorization
7 Figures
Proceedings of IEEE International Conference on Robotics and Automation (ICRA), pp. 5480 - 5487, Hong Kong, 2014
10.1109/ICRA.2014.6907665
null
cs.CV cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a joint object pose estimation and categorization approach which extracts information about object poses and categories from the object parts and compositions constructed at different layers of a hierarchical object representation algorithm, namely Learned Hierarchy of Parts (LHOP). In the proposed approach, we first employ the LHOP to learn hierarchical part libraries which represent entity parts and compositions across different object categories and views. Then, we extract statistical and geometric features from the part realizations of the objects in the images in order to represent the information about object pose and category at each different layer of the hierarchy. Unlike the traditional approaches which consider specific layers of the hierarchies in order to extract information to perform specific tasks, we combine the information extracted at different layers to solve a joint object pose estimation and categorization problem using distributed optimization algorithms. We examine the proposed generative-discriminative learning approach and the algorithms on two benchmark 2-D multi-view image datasets. The proposed approach and the algorithms outperform state-of-the-art classification, regression and feature extraction algorithms. In addition, the experimental results shed light on the relationship between object categorization, pose estimation and the part realizations observed at different layers of the hierarchy.
[ { "version": "v1", "created": "Wed, 4 Mar 2015 17:17:48 GMT" } ]
2015-03-05T00:00:00
[ [ "Ozay", "Mete", "" ], [ "Walas", "Krzysztof", "" ], [ "Leonardis", "Ales", "" ] ]
TITLE: A Hierarchical Approach for Joint Multi-view Object Pose Estimation and Categorization ABSTRACT: We propose a joint object pose estimation and categorization approach which extracts information about object poses and categories from the object parts and compositions constructed at different layers of a hierarchical object representation algorithm, namely Learned Hierarchy of Parts (LHOP). In the proposed approach, we first employ the LHOP to learn hierarchical part libraries which represent entity parts and compositions across different object categories and views. Then, we extract statistical and geometric features from the part realizations of the objects in the images in order to represent the information about object pose and category at each different layer of the hierarchy. Unlike the traditional approaches which consider specific layers of the hierarchies in order to extract information to perform specific tasks, we combine the information extracted at different layers to solve a joint object pose estimation and categorization problem using distributed optimization algorithms. We examine the proposed generative-discriminative learning approach and the algorithms on two benchmark 2-D multi-view image datasets. The proposed approach and the algorithms outperform state-of-the-art classification, regression and feature extraction algorithms. In addition, the experimental results shed light on the relationship between object categorization, pose estimation and the part realizations observed at different layers of the hierarchy.
no_new_dataset
0.946001
1412.8504
Diego Amancio
Diego R. Amancio
Probing the topological properties of complex networks modeling short written texts
null
PLoS ONE 10(2): e0118394, 2015
10.1371/journal.pone.0118394
null
cs.CL physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In recent years, graph theory has been widely employed to probe several language properties. More specifically, the so-called word adjacency model has been proven useful for tackling several practical problems, especially those relying on textual stylistic analysis. The most common approach to treat texts as networks has simply considered either large pieces of texts or entire books. This approach has certainly worked well -- many informative discoveries have been made this way -- but it raises an uncomfortable question: could there be important topological patterns in small pieces of texts? To address this problem, the topological properties of subtexts sampled from entire books was probed. Statistical analyzes performed on a dataset comprising 50 novels revealed that most of the traditional topological measurements are stable for short subtexts. When the performance of the authorship recognition task was analyzed, it was found that a proper sampling yields a discriminability similar to the one found with full texts. Surprisingly, the support vector machine classification based on the characterization of short texts outperformed the one performed with entire books. These findings suggest that a local topological analysis of large documents might improve its global characterization. Most importantly, it was verified, as a proof of principle, that short texts can be analyzed with the methods and concepts of complex networks. As a consequence, the techniques described here can be extended in a straightforward fashion to analyze texts as time-varying complex networks.
[ { "version": "v1", "created": "Mon, 29 Dec 2014 23:09:13 GMT" } ]
2015-03-04T00:00:00
[ [ "Amancio", "Diego R.", "" ] ]
TITLE: Probing the topological properties of complex networks modeling short written texts ABSTRACT: In recent years, graph theory has been widely employed to probe several language properties. More specifically, the so-called word adjacency model has been proven useful for tackling several practical problems, especially those relying on textual stylistic analysis. The most common approach to treat texts as networks has simply considered either large pieces of texts or entire books. This approach has certainly worked well -- many informative discoveries have been made this way -- but it raises an uncomfortable question: could there be important topological patterns in small pieces of texts? To address this problem, the topological properties of subtexts sampled from entire books was probed. Statistical analyzes performed on a dataset comprising 50 novels revealed that most of the traditional topological measurements are stable for short subtexts. When the performance of the authorship recognition task was analyzed, it was found that a proper sampling yields a discriminability similar to the one found with full texts. Surprisingly, the support vector machine classification based on the characterization of short texts outperformed the one performed with entire books. These findings suggest that a local topological analysis of large documents might improve its global characterization. Most importantly, it was verified, as a proof of principle, that short texts can be analyzed with the methods and concepts of complex networks. As a consequence, the techniques described here can be extended in a straightforward fashion to analyze texts as time-varying complex networks.
no_new_dataset
0.934694
1501.04560
Yanwei Fu
Yanwei Fu, Timothy M. Hospedales, Tao Xiang and Shaogang Gong
Transductive Multi-view Zero-Shot Learning
accepted by IEEE TPAMI, more info and longer report will be available in :http://www.eecs.qmul.ac.uk/~yf300/embedding/index.html
null
10.1109/TPAMI.2015.2408354
null
cs.CV cs.DS cs.MM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Most existing zero-shot learning approaches exploit transfer learning via an intermediate-level semantic representation shared between an annotated auxiliary dataset and a target dataset with different classes and no annotation. A projection from a low-level feature space to the semantic representation space is learned from the auxiliary dataset and is applied without adaptation to the target dataset. In this paper we identify two inherent limitations with these approaches. First, due to having disjoint and potentially unrelated classes, the projection functions learned from the auxiliary dataset/domain are biased when applied directly to the target dataset/domain. We call this problem the projection domain shift problem and propose a novel framework, transductive multi-view embedding, to solve it. The second limitation is the prototype sparsity problem which refers to the fact that for each target class, only a single prototype is available for zero-shot learning given a semantic representation. To overcome this problem, a novel heterogeneous multi-view hypergraph label propagation method is formulated for zero-shot learning in the transductive embedding space. It effectively exploits the complementary information offered by different semantic representations and takes advantage of the manifold structures of multiple representation spaces in a coherent manner. We demonstrate through extensive experiments that the proposed approach (1) rectifies the projection shift between the auxiliary and target domains, (2) exploits the complementarity of multiple semantic representations, (3) significantly outperforms existing methods for both zero-shot and N-shot recognition on three image and video benchmark datasets, and (4) enables novel cross-view annotation tasks.
[ { "version": "v1", "created": "Mon, 19 Jan 2015 17:04:11 GMT" }, { "version": "v2", "created": "Tue, 3 Mar 2015 04:43:44 GMT" } ]
2015-03-04T00:00:00
[ [ "Fu", "Yanwei", "" ], [ "Hospedales", "Timothy M.", "" ], [ "Xiang", "Tao", "" ], [ "Gong", "Shaogang", "" ] ]
TITLE: Transductive Multi-view Zero-Shot Learning ABSTRACT: Most existing zero-shot learning approaches exploit transfer learning via an intermediate-level semantic representation shared between an annotated auxiliary dataset and a target dataset with different classes and no annotation. A projection from a low-level feature space to the semantic representation space is learned from the auxiliary dataset and is applied without adaptation to the target dataset. In this paper we identify two inherent limitations with these approaches. First, due to having disjoint and potentially unrelated classes, the projection functions learned from the auxiliary dataset/domain are biased when applied directly to the target dataset/domain. We call this problem the projection domain shift problem and propose a novel framework, transductive multi-view embedding, to solve it. The second limitation is the prototype sparsity problem which refers to the fact that for each target class, only a single prototype is available for zero-shot learning given a semantic representation. To overcome this problem, a novel heterogeneous multi-view hypergraph label propagation method is formulated for zero-shot learning in the transductive embedding space. It effectively exploits the complementary information offered by different semantic representations and takes advantage of the manifold structures of multiple representation spaces in a coherent manner. We demonstrate through extensive experiments that the proposed approach (1) rectifies the projection shift between the auxiliary and target domains, (2) exploits the complementarity of multiple semantic representations, (3) significantly outperforms existing methods for both zero-shot and N-shot recognition on three image and video benchmark datasets, and (4) enables novel cross-view annotation tasks.
no_new_dataset
0.946843
1502.06797
Christian David
Albert Cohen (LPMC), Ronald Devore (TAMU)
Approximation of high-dimensional parametric PDEs
null
null
null
null
math.AP cs.NA math.NA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Parametrized families of PDEs arise in various contexts such as inverse problems, control and optimization, risk assessment, and uncertainty quantification. In most of these applications, the number of parameters is large or perhaps even infinite. Thus, the development of numerical methods for these parametric problems is faced with the possible curse of dimensionality. This article is directed at (i) identifying and understanding which properties of parametric equations allow one to avoid this curse and (ii) developing and analyzing effective numerical methodd which fully exploit these properties and, in turn, are immune to the growth in dimensionality. The first part of this article studies the smoothness and approximability of the solution map, that is, the map $a\mapsto u(a)$ where $a$ is the parameter value and $u(a)$ is the corresponding solution to the PDE. It is shown that for many relevant parametric PDEs, the parametric smoothness of this map is typically holomorphic and also highly anisotropic in that the relevant parameters are of widely varying importance in describing the solution. These two properties are then exploited to establish convergence rates of $n$-term approximations to the solution map for which each term is separable in the parametric and physical variables. These results reveal that, at least on a theoretical level, the solution map can be well approximated by discretizations of moderate complexity, thereby showing how the curse of dimensionality is broken. This theoretical analysis is carried out through concepts of approximation theory such as best $n$-term approximation, sparsity, and $n$-widths. These notions determine a priori the best possible performance of numerical methods and thus serve as a benchmark for concrete algorithms. The second part of this article turns to the development of numerical algorithms based on the theoretically established sparse separable approximations. The numerical methods studied fall into two general categories. The first uses polynomial expansions in terms of the parameters to approximate the solution map. The second one searches for suitable low dimensional spaces for simultaneously approximating all members of the parametric family. The numerical implementation of these approaches is carried out through adaptive and greedy algorithms. An a priori analysis of the performance of these algorithms establishes how well they meet the theoretical benchmarks.
[ { "version": "v1", "created": "Tue, 24 Feb 2015 13:10:32 GMT" }, { "version": "v2", "created": "Tue, 3 Mar 2015 14:09:11 GMT" } ]
2015-03-04T00:00:00
[ [ "Cohen", "Albert", "", "LPMC" ], [ "Devore", "Ronald", "", "TAMU" ] ]
TITLE: Approximation of high-dimensional parametric PDEs ABSTRACT: Parametrized families of PDEs arise in various contexts such as inverse problems, control and optimization, risk assessment, and uncertainty quantification. In most of these applications, the number of parameters is large or perhaps even infinite. Thus, the development of numerical methods for these parametric problems is faced with the possible curse of dimensionality. This article is directed at (i) identifying and understanding which properties of parametric equations allow one to avoid this curse and (ii) developing and analyzing effective numerical methodd which fully exploit these properties and, in turn, are immune to the growth in dimensionality. The first part of this article studies the smoothness and approximability of the solution map, that is, the map $a\mapsto u(a)$ where $a$ is the parameter value and $u(a)$ is the corresponding solution to the PDE. It is shown that for many relevant parametric PDEs, the parametric smoothness of this map is typically holomorphic and also highly anisotropic in that the relevant parameters are of widely varying importance in describing the solution. These two properties are then exploited to establish convergence rates of $n$-term approximations to the solution map for which each term is separable in the parametric and physical variables. These results reveal that, at least on a theoretical level, the solution map can be well approximated by discretizations of moderate complexity, thereby showing how the curse of dimensionality is broken. This theoretical analysis is carried out through concepts of approximation theory such as best $n$-term approximation, sparsity, and $n$-widths. These notions determine a priori the best possible performance of numerical methods and thus serve as a benchmark for concrete algorithms. The second part of this article turns to the development of numerical algorithms based on the theoretically established sparse separable approximations. The numerical methods studied fall into two general categories. The first uses polynomial expansions in terms of the parameters to approximate the solution map. The second one searches for suitable low dimensional spaces for simultaneously approximating all members of the parametric family. The numerical implementation of these approaches is carried out through adaptive and greedy algorithms. An a priori analysis of the performance of these algorithms establishes how well they meet the theoretical benchmarks.
no_new_dataset
0.939637
1503.00787
Davide Modolo
Davide Modolo, Alexander Vezhnevets, Vittorio Ferrari
Context Forest for efficient object detection with large mixture models
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present Context Forest (ConF), a technique for predicting properties of the objects in an image based on its global appearance. Compared to standard nearest-neighbour techniques, ConF is more accurate, fast and memory efficient. We train ConF to predict which aspects of an object class are likely to appear in a given image (e.g. which viewpoint). This enables to speed-up multi-component object detectors, by automatically selecting the most relevant components to run on that image. This is particularly useful for detectors trained from large datasets, which typically need many components to fully absorb the data and reach their peak performance. ConF provides a speed-up of 2x for the DPM detector [1] and of 10x for the EE-SVM detector [2]. To show ConF's generality, we also train it to predict at which locations objects are likely to appear in an image. Incorporating this information in the detector score improves mAP performance by about 2% by removing false positive detections in unlikely locations.
[ { "version": "v1", "created": "Tue, 3 Mar 2015 00:20:58 GMT" } ]
2015-03-04T00:00:00
[ [ "Modolo", "Davide", "" ], [ "Vezhnevets", "Alexander", "" ], [ "Ferrari", "Vittorio", "" ] ]
TITLE: Context Forest for efficient object detection with large mixture models ABSTRACT: We present Context Forest (ConF), a technique for predicting properties of the objects in an image based on its global appearance. Compared to standard nearest-neighbour techniques, ConF is more accurate, fast and memory efficient. We train ConF to predict which aspects of an object class are likely to appear in a given image (e.g. which viewpoint). This enables to speed-up multi-component object detectors, by automatically selecting the most relevant components to run on that image. This is particularly useful for detectors trained from large datasets, which typically need many components to fully absorb the data and reach their peak performance. ConF provides a speed-up of 2x for the DPM detector [1] and of 10x for the EE-SVM detector [2]. To show ConF's generality, we also train it to predict at which locations objects are likely to appear in an image. Incorporating this information in the detector score improves mAP performance by about 2% by removing false positive detections in unlikely locations.
no_new_dataset
0.953837
1503.00849
Sutanay Choudhury
Sutanay Choudhury, Lawrence Holder, George Chin, Khushbu Agarwal, John Feo
A Selectivity based approach to Continuous Pattern Detection in Streaming Graphs
in 18th International Conference on Extending Database Technology (EDBT) (2015)
null
null
null
cs.DB
http://creativecommons.org/licenses/publicdomain/
Cyber security is one of the most significant technical challenges in current times. Detecting adversarial activities, prevention of theft of intellectual properties and customer data is a high priority for corporations and government agencies around the world. Cyber defenders need to analyze massive-scale, high-resolution network flows to identify, categorize, and mitigate attacks involving networks spanning institutional and national boundaries. Many of the cyber attacks can be described as subgraph patterns, with prominent examples being insider infiltrations (path queries), denial of service (parallel paths) and malicious spreads (tree queries). This motivates us to explore subgraph matching on streaming graphs in a continuous setting. The novelty of our work lies in using the subgraph distributional statistics collected from the streaming graph to determine the query processing strategy. We introduce a "Lazy Search" algorithm where the search strategy is decided on a vertex-to-vertex basis depending on the likelihood of a match in the vertex neighborhood. We also propose a metric named "Relative Selectivity" that is used to select between different query processing strategies. Our experiments performed on real online news, network traffic stream and a synthetic social network benchmark demonstrate 10-100x speedups over selectivity agnostic approaches.
[ { "version": "v1", "created": "Tue, 3 Mar 2015 08:11:27 GMT" } ]
2015-03-04T00:00:00
[ [ "Choudhury", "Sutanay", "" ], [ "Holder", "Lawrence", "" ], [ "Chin", "George", "" ], [ "Agarwal", "Khushbu", "" ], [ "Feo", "John", "" ] ]
TITLE: A Selectivity based approach to Continuous Pattern Detection in Streaming Graphs ABSTRACT: Cyber security is one of the most significant technical challenges in current times. Detecting adversarial activities, prevention of theft of intellectual properties and customer data is a high priority for corporations and government agencies around the world. Cyber defenders need to analyze massive-scale, high-resolution network flows to identify, categorize, and mitigate attacks involving networks spanning institutional and national boundaries. Many of the cyber attacks can be described as subgraph patterns, with prominent examples being insider infiltrations (path queries), denial of service (parallel paths) and malicious spreads (tree queries). This motivates us to explore subgraph matching on streaming graphs in a continuous setting. The novelty of our work lies in using the subgraph distributional statistics collected from the streaming graph to determine the query processing strategy. We introduce a "Lazy Search" algorithm where the search strategy is decided on a vertex-to-vertex basis depending on the likelihood of a match in the vertex neighborhood. We also propose a metric named "Relative Selectivity" that is used to select between different query processing strategies. Our experiments performed on real online news, network traffic stream and a synthetic social network benchmark demonstrate 10-100x speedups over selectivity agnostic approaches.
no_new_dataset
0.941385
1503.00923
Prasant Misra
Prasant Misra, Vasanth Rajaraman, Kumaresh Dhotrad, Jay Warrior, Yogesh Simmhan
An Interoperable Realization of Smart Cities with Plug and Play based Device Management
arXiv admin note: text overlap with arXiv:1502.00797
null
null
null
cs.SY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The primal problem with Internet of Things (IoT) solutions for smart cities is the lack of interoperability at various levels, and more predominately at the device level. While there exist multitude of platforms from multiple manufacturers, the existing ecosystem still remains highly closed. In this paper, we propose SNaaS or Sensor/Network as a Service: a service layer that enables the creation of the plug-n-play infrastructure, across platforms from multiple vendors, necessary for interoperability and successful deployment of large-scale city wide systems. In order to correctly position the new service layer, we present a high level reference IoT architecture for smart city implementations, and follow it up with the workflow details of SNaaS along with preliminary microbenchmarks.
[ { "version": "v1", "created": "Tue, 3 Mar 2015 12:46:12 GMT" } ]
2015-03-04T00:00:00
[ [ "Misra", "Prasant", "" ], [ "Rajaraman", "Vasanth", "" ], [ "Dhotrad", "Kumaresh", "" ], [ "Warrior", "Jay", "" ], [ "Simmhan", "Yogesh", "" ] ]
TITLE: An Interoperable Realization of Smart Cities with Plug and Play based Device Management ABSTRACT: The primal problem with Internet of Things (IoT) solutions for smart cities is the lack of interoperability at various levels, and more predominately at the device level. While there exist multitude of platforms from multiple manufacturers, the existing ecosystem still remains highly closed. In this paper, we propose SNaaS or Sensor/Network as a Service: a service layer that enables the creation of the plug-n-play infrastructure, across platforms from multiple vendors, necessary for interoperability and successful deployment of large-scale city wide systems. In order to correctly position the new service layer, we present a high level reference IoT architecture for smart city implementations, and follow it up with the workflow details of SNaaS along with preliminary microbenchmarks.
no_new_dataset
0.947769
1503.00980
Jin-Kao Hao
Xiangjing Lai and Jin-Kao Hao
On memetic search for the max-mean dispersion problem
22 pages
null
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Given a set $V$ of $n$ elements and a distance matrix $[d_{ij}]_{n\times n}$ among elements, the max-mean dispersion problem (MaxMeanDP) consists in selecting a subset $M$ from $V$ such that the mean dispersion (or distance) among the selected elements is maximized. Being a useful model to formulate several relevant applications, MaxMeanDP is known to be NP-hard and thus computationally difficult. In this paper, we present a highly effective memetic algorithm for MaxMeanDP which relies on solution recombination and local optimization to find high quality solutions. Computational experiments on the set of 160 benchmark instances with up to 1000 elements commonly used in the literature show that the proposed algorithm improves or matches the published best known results for all instances in a short computing time, with only one exception, while achieving a high success rate of 100\%. In particular, we improve 59 previous best results out of the 60 most challenging instances. Results on a set of 40 new large instances with 3000 and 5000 elements are also presented. The key ingredients of the proposed algorithm are investigated to shed light on how they affect the performance of the algorithm.
[ { "version": "v1", "created": "Tue, 3 Mar 2015 15:43:36 GMT" } ]
2015-03-04T00:00:00
[ [ "Lai", "Xiangjing", "" ], [ "Hao", "Jin-Kao", "" ] ]
TITLE: On memetic search for the max-mean dispersion problem ABSTRACT: Given a set $V$ of $n$ elements and a distance matrix $[d_{ij}]_{n\times n}$ among elements, the max-mean dispersion problem (MaxMeanDP) consists in selecting a subset $M$ from $V$ such that the mean dispersion (or distance) among the selected elements is maximized. Being a useful model to formulate several relevant applications, MaxMeanDP is known to be NP-hard and thus computationally difficult. In this paper, we present a highly effective memetic algorithm for MaxMeanDP which relies on solution recombination and local optimization to find high quality solutions. Computational experiments on the set of 160 benchmark instances with up to 1000 elements commonly used in the literature show that the proposed algorithm improves or matches the published best known results for all instances in a short computing time, with only one exception, while achieving a high success rate of 100\%. In particular, we improve 59 previous best results out of the 60 most challenging instances. Results on a set of 40 new large instances with 3000 and 5000 elements are also presented. The key ingredients of the proposed algorithm are investigated to shed light on how they affect the performance of the algorithm.
no_new_dataset
0.940844
1503.01070
Atousa Torabi
Atousa Torabi, Christopher Pal, Hugo Larochelle, Aaron Courville
Using Descriptive Video Services to Create a Large Data Source for Video Annotation Research
7 pages
null
null
null
cs.CV cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this work, we introduce a dataset of video annotated with high quality natural language phrases describing the visual content in a given segment of time. Our dataset is based on the Descriptive Video Service (DVS) that is now encoded on many digital media products such as DVDs. DVS is an audio narration describing the visual elements and actions in a movie for the visually impaired. It is temporally aligned with the movie and mixed with the original movie soundtrack. We describe an automatic DVS segmentation and alignment method for movies, that enables us to scale up the collection of a DVS-derived dataset with minimal human intervention. Using this method, we have collected the largest DVS-derived dataset for video description of which we are aware. Our dataset currently includes over 84.6 hours of paired video/sentences from 92 DVDs and is growing.
[ { "version": "v1", "created": "Tue, 3 Mar 2015 19:22:01 GMT" } ]
2015-03-04T00:00:00
[ [ "Torabi", "Atousa", "" ], [ "Pal", "Christopher", "" ], [ "Larochelle", "Hugo", "" ], [ "Courville", "Aaron", "" ] ]
TITLE: Using Descriptive Video Services to Create a Large Data Source for Video Annotation Research ABSTRACT: In this work, we introduce a dataset of video annotated with high quality natural language phrases describing the visual content in a given segment of time. Our dataset is based on the Descriptive Video Service (DVS) that is now encoded on many digital media products such as DVDs. DVS is an audio narration describing the visual elements and actions in a movie for the visually impaired. It is temporally aligned with the movie and mixed with the original movie soundtrack. We describe an automatic DVS segmentation and alignment method for movies, that enables us to scale up the collection of a DVS-derived dataset with minimal human intervention. Using this method, we have collected the largest DVS-derived dataset for video description of which we are aware. Our dataset currently includes over 84.6 hours of paired video/sentences from 92 DVDs and is growing.
new_dataset
0.955194
1412.6558
David Sussillo
David Sussillo, L.F. Abbott
Random Walk Initialization for Training Very Deep Feedforward Networks
10 pages, 4 figures
null
null
null
cs.NE cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Training very deep networks is an important open problem in machine learning. One of many difficulties is that the norm of the back-propagated error gradient can grow or decay exponentially. Here we show that training very deep feed-forward networks (FFNs) is not as difficult as previously thought. Unlike when back-propagation is applied to a recurrent network, application to an FFN amounts to multiplying the error gradient by a different random matrix at each layer. We show that the successive application of correctly scaled random matrices to an initial vector results in a random walk of the log of the norm of the resulting vectors, and we compute the scaling that makes this walk unbiased. The variance of the random walk grows only linearly with network depth and is inversely proportional to the size of each layer. Practically, this implies a gradient whose log-norm scales with the square root of the network depth and shows that the vanishing gradient problem can be mitigated by increasing the width of the layers. Mathematical analyses and experimental results using stochastic gradient descent to optimize tasks related to the MNIST and TIMIT datasets are provided to support these claims. Equations for the optimal matrix scaling are provided for the linear and ReLU cases.
[ { "version": "v1", "created": "Fri, 19 Dec 2014 23:24:53 GMT" }, { "version": "v2", "created": "Wed, 14 Jan 2015 21:28:29 GMT" }, { "version": "v3", "created": "Fri, 27 Feb 2015 22:28:32 GMT" } ]
2015-03-03T00:00:00
[ [ "Sussillo", "David", "" ], [ "Abbott", "L. F.", "" ] ]
TITLE: Random Walk Initialization for Training Very Deep Feedforward Networks ABSTRACT: Training very deep networks is an important open problem in machine learning. One of many difficulties is that the norm of the back-propagated error gradient can grow or decay exponentially. Here we show that training very deep feed-forward networks (FFNs) is not as difficult as previously thought. Unlike when back-propagation is applied to a recurrent network, application to an FFN amounts to multiplying the error gradient by a different random matrix at each layer. We show that the successive application of correctly scaled random matrices to an initial vector results in a random walk of the log of the norm of the resulting vectors, and we compute the scaling that makes this walk unbiased. The variance of the random walk grows only linearly with network depth and is inversely proportional to the size of each layer. Practically, this implies a gradient whose log-norm scales with the square root of the network depth and shows that the vanishing gradient problem can be mitigated by increasing the width of the layers. Mathematical analyses and experimental results using stochastic gradient descent to optimize tasks related to the MNIST and TIMIT datasets are provided to support these claims. Equations for the optimal matrix scaling are provided for the linear and ReLU cases.
no_new_dataset
0.948775
1412.7190
Mathieu Aubry
Francisco Massa, Mathieu Aubry, Renaud Marlet
Convolutional Neural Networks for joint object detection and pose estimation: A comparative study
null
null
null
null
cs.CV cs.LG cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we study the application of convolutional neural networks for jointly detecting objects depicted in still images and estimating their 3D pose. We identify different feature representations of oriented objects, and energies that lead a network to learn this representations. The choice of the representation is crucial since the pose of an object has a natural, continuous structure while its category is a discrete variable. We evaluate the different approaches on the joint object detection and pose estimation task of the Pascal3D+ benchmark using Average Viewpoint Precision. We show that a classification approach on discretized viewpoints achieves state-of-the-art performance for joint object detection and pose estimation, and significantly outperforms existing baselines on this benchmark.
[ { "version": "v1", "created": "Mon, 22 Dec 2014 22:26:26 GMT" }, { "version": "v2", "created": "Fri, 2 Jan 2015 16:43:41 GMT" }, { "version": "v3", "created": "Sat, 7 Feb 2015 05:27:24 GMT" }, { "version": "v4", "created": "Sat, 28 Feb 2015 05:15:45 GMT" } ]
2015-03-03T00:00:00
[ [ "Massa", "Francisco", "" ], [ "Aubry", "Mathieu", "" ], [ "Marlet", "Renaud", "" ] ]
TITLE: Convolutional Neural Networks for joint object detection and pose estimation: A comparative study ABSTRACT: In this paper we study the application of convolutional neural networks for jointly detecting objects depicted in still images and estimating their 3D pose. We identify different feature representations of oriented objects, and energies that lead a network to learn this representations. The choice of the representation is crucial since the pose of an object has a natural, continuous structure while its category is a discrete variable. We evaluate the different approaches on the joint object detection and pose estimation task of the Pascal3D+ benchmark using Average Viewpoint Precision. We show that a classification approach on discretized viewpoints achieves state-of-the-art performance for joint object detection and pose estimation, and significantly outperforms existing baselines on this benchmark.
no_new_dataset
0.950273
1503.00038
Md Amran Siddiqui
Md Amran Siddiqui, Alan Fern, Thomas G. Dietterich and Weng-Keen Wong
Sequential Feature Explanations for Anomaly Detection
9 pages, 4 figures and submitted to KDD 2015
null
null
null
cs.AI cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In many applications, an anomaly detection system presents the most anomalous data instance to a human analyst, who then must determine whether the instance is truly of interest (e.g. a threat in a security setting). Unfortunately, most anomaly detectors provide no explanation about why an instance was considered anomalous, leaving the analyst with no guidance about where to begin the investigation. To address this issue, we study the problems of computing and evaluating sequential feature explanations (SFEs) for anomaly detectors. An SFE of an anomaly is a sequence of features, which are presented to the analyst one at a time (in order) until the information contained in the highlighted features is enough for the analyst to make a confident judgement about the anomaly. Since analyst effort is related to the amount of information that they consider in an investigation, an explanation's quality is related to the number of features that must be revealed to attain confidence. One of our main contributions is to present a novel framework for large scale quantitative evaluations of SFEs, where the quality measure is based on analyst effort. To do this we construct anomaly detection benchmarks from real data sets along with artificial experts that can be simulated for evaluation. Our second contribution is to evaluate several novel explanation approaches within the framework and on traditional anomaly detection benchmarks, offering several insights into the approaches.
[ { "version": "v1", "created": "Sat, 28 Feb 2015 00:04:11 GMT" } ]
2015-03-03T00:00:00
[ [ "Siddiqui", "Md Amran", "" ], [ "Fern", "Alan", "" ], [ "Dietterich", "Thomas G.", "" ], [ "Wong", "Weng-Keen", "" ] ]
TITLE: Sequential Feature Explanations for Anomaly Detection ABSTRACT: In many applications, an anomaly detection system presents the most anomalous data instance to a human analyst, who then must determine whether the instance is truly of interest (e.g. a threat in a security setting). Unfortunately, most anomaly detectors provide no explanation about why an instance was considered anomalous, leaving the analyst with no guidance about where to begin the investigation. To address this issue, we study the problems of computing and evaluating sequential feature explanations (SFEs) for anomaly detectors. An SFE of an anomaly is a sequence of features, which are presented to the analyst one at a time (in order) until the information contained in the highlighted features is enough for the analyst to make a confident judgement about the anomaly. Since analyst effort is related to the amount of information that they consider in an investigation, an explanation's quality is related to the number of features that must be revealed to attain confidence. One of our main contributions is to present a novel framework for large scale quantitative evaluations of SFEs, where the quality measure is based on analyst effort. To do this we construct anomaly detection benchmarks from real data sets along with artificial experts that can be simulated for evaluation. Our second contribution is to evaluate several novel explanation approaches within the framework and on traditional anomaly detection benchmarks, offering several insights into the approaches.
no_new_dataset
0.949153
1503.00064
Sanja Fidler
Dahua Lin, Chen Kong, Sanja Fidler, Raquel Urtasun
Generating Multi-Sentence Lingual Descriptions of Indoor Scenes
null
null
null
null
cs.CV cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper proposes a novel framework for generating lingual descriptions of indoor scenes. Whereas substantial efforts have been made to tackle this problem, previous approaches focusing primarily on generating a single sentence for each image, which is not sufficient for describing complex scenes. We attempt to go beyond this, by generating coherent descriptions with multiple sentences. Our approach is distinguished from conventional ones in several aspects: (1) a 3D visual parsing system that jointly infers objects, attributes, and relations; (2) a generative grammar learned automatically from training text; and (3) a text generation algorithm that takes into account the coherence among sentences. Experiments on the augmented NYU-v2 dataset show that our framework can generate natural descriptions with substantially higher ROGUE scores compared to those produced by the baseline.
[ { "version": "v1", "created": "Sat, 28 Feb 2015 04:26:21 GMT" } ]
2015-03-03T00:00:00
[ [ "Lin", "Dahua", "" ], [ "Kong", "Chen", "" ], [ "Fidler", "Sanja", "" ], [ "Urtasun", "Raquel", "" ] ]
TITLE: Generating Multi-Sentence Lingual Descriptions of Indoor Scenes ABSTRACT: This paper proposes a novel framework for generating lingual descriptions of indoor scenes. Whereas substantial efforts have been made to tackle this problem, previous approaches focusing primarily on generating a single sentence for each image, which is not sufficient for describing complex scenes. We attempt to go beyond this, by generating coherent descriptions with multiple sentences. Our approach is distinguished from conventional ones in several aspects: (1) a 3D visual parsing system that jointly infers objects, attributes, and relations; (2) a generative grammar learned automatically from training text; and (3) a text generation algorithm that takes into account the coherence among sentences. Experiments on the augmented NYU-v2 dataset show that our framework can generate natural descriptions with substantially higher ROGUE scores compared to those produced by the baseline.
no_new_dataset
0.951188
1503.00591
Xu Zhang
Xu Zhang, Felix Xinnan Yu, Shih-Fu Chang, Shengjin Wang
Deep Transfer Network: Unsupervised Domain Adaptation
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Domain adaptation aims at training a classifier in one dataset and applying it to a related but not identical dataset. One successfully used framework of domain adaptation is to learn a transformation to match both the distribution of the features (marginal distribution), and the distribution of the labels given features (conditional distribution). In this paper, we propose a new domain adaptation framework named Deep Transfer Network (DTN), where the highly flexible deep neural networks are used to implement such a distribution matching process. This is achieved by two types of layers in DTN: the shared feature extraction layers which learn a shared feature subspace in which the marginal distributions of the source and the target samples are drawn close, and the discrimination layers which match conditional distributions by classifier transduction. We also show that DTN has a computation complexity linear to the number of training samples, making it suitable to large-scale problems. By combining the best paradigms in both worlds (deep neural networks in recognition, and matching marginal and conditional distributions in domain adaptation), we demonstrate by extensive experiments that DTN improves significantly over former methods in both execution time and classification accuracy.
[ { "version": "v1", "created": "Mon, 2 Mar 2015 16:17:06 GMT" } ]
2015-03-03T00:00:00
[ [ "Zhang", "Xu", "" ], [ "Yu", "Felix Xinnan", "" ], [ "Chang", "Shih-Fu", "" ], [ "Wang", "Shengjin", "" ] ]
TITLE: Deep Transfer Network: Unsupervised Domain Adaptation ABSTRACT: Domain adaptation aims at training a classifier in one dataset and applying it to a related but not identical dataset. One successfully used framework of domain adaptation is to learn a transformation to match both the distribution of the features (marginal distribution), and the distribution of the labels given features (conditional distribution). In this paper, we propose a new domain adaptation framework named Deep Transfer Network (DTN), where the highly flexible deep neural networks are used to implement such a distribution matching process. This is achieved by two types of layers in DTN: the shared feature extraction layers which learn a shared feature subspace in which the marginal distributions of the source and the target samples are drawn close, and the discrimination layers which match conditional distributions by classifier transduction. We also show that DTN has a computation complexity linear to the number of training samples, making it suitable to large-scale problems. By combining the best paradigms in both worlds (deep neural networks in recognition, and matching marginal and conditional distributions in domain adaptation), we demonstrate by extensive experiments that DTN improves significantly over former methods in both execution time and classification accuracy.
no_new_dataset
0.950457
1503.00687
Miguel \'A. Carreira-Perpi\~n\'an
Miguel \'A. Carreira-Perpi\~n\'an
A review of mean-shift algorithms for clustering
28 pages, 9 figures. Invited book chapter to appear in the CRC Handbook of Cluster Analysis (eds. Roberto Rocci, Fionn Murtagh, Marina Meila and Christian Hennig)
null
null
null
cs.LG cs.CV stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A natural way to characterize the cluster structure of a dataset is by finding regions containing a high density of data. This can be done in a nonparametric way with a kernel density estimate, whose modes and hence clusters can be found using mean-shift algorithms. We describe the theory and practice behind clustering based on kernel density estimates and mean-shift algorithms. We discuss the blurring and non-blurring versions of mean-shift; theoretical results about mean-shift algorithms and Gaussian mixtures; relations with scale-space theory, spectral clustering and other algorithms; extensions to tracking, to manifold and graph data, and to manifold denoising; K-modes and Laplacian K-modes algorithms; acceleration strategies for large datasets; and applications to image segmentation, manifold denoising and multivalued regression.
[ { "version": "v1", "created": "Mon, 2 Mar 2015 20:09:14 GMT" } ]
2015-03-03T00:00:00
[ [ "Carreira-Perpiñán", "Miguel Á.", "" ] ]
TITLE: A review of mean-shift algorithms for clustering ABSTRACT: A natural way to characterize the cluster structure of a dataset is by finding regions containing a high density of data. This can be done in a nonparametric way with a kernel density estimate, whose modes and hence clusters can be found using mean-shift algorithms. We describe the theory and practice behind clustering based on kernel density estimates and mean-shift algorithms. We discuss the blurring and non-blurring versions of mean-shift; theoretical results about mean-shift algorithms and Gaussian mixtures; relations with scale-space theory, spectral clustering and other algorithms; extensions to tracking, to manifold and graph data, and to manifold denoising; K-modes and Laplacian K-modes algorithms; acceleration strategies for large datasets; and applications to image segmentation, manifold denoising and multivalued regression.
no_new_dataset
0.946745
1503.00711
Rachel Gauci
Rachel Gauci
Smelling out Code Clones: Clone Detection Tool Evaluation and Corresponding Challenges
8 pages, 2 figures
null
null
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Software clones have been an active area of research for the past two decades. However, although numerous clone detection tools are now available, only a small fraction of the literature has focused on tool evaluation, and this is in fact still an open problem. This is mostly due to the fact that standard information retrieval metrics such as recall and precision require a priori knowledge of clones already in the system. Detection tools also typically have a large number of parameters which are difficult to fine-tune for optimal performance on a particular software system, and different outputs produced by different tools add to the complexity of comparing one tool to another. In this review, we further explore the reasons why tool evaluation is still an open challenge, and present the current tools and frameworks targeted at mitigating these problems, focusing on the current standard benchmarks used to evaluate modern clone detection tools, and also presenting a recent method aimed at finding optimal tool configurations.
[ { "version": "v1", "created": "Mon, 2 Mar 2015 20:59:40 GMT" } ]
2015-03-03T00:00:00
[ [ "Gauci", "Rachel", "" ] ]
TITLE: Smelling out Code Clones: Clone Detection Tool Evaluation and Corresponding Challenges ABSTRACT: Software clones have been an active area of research for the past two decades. However, although numerous clone detection tools are now available, only a small fraction of the literature has focused on tool evaluation, and this is in fact still an open problem. This is mostly due to the fact that standard information retrieval metrics such as recall and precision require a priori knowledge of clones already in the system. Detection tools also typically have a large number of parameters which are difficult to fine-tune for optimal performance on a particular software system, and different outputs produced by different tools add to the complexity of comparing one tool to another. In this review, we further explore the reasons why tool evaluation is still an open challenge, and present the current tools and frameworks targeted at mitigating these problems, focusing on the current standard benchmarks used to evaluate modern clone detection tools, and also presenting a recent method aimed at finding optimal tool configurations.
no_new_dataset
0.945701
1409.7495
Yaroslav Ganin
Yaroslav Ganin, Victor Lempitsky
Unsupervised Domain Adaptation by Backpropagation
null
null
null
null
stat.ML cs.LG cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Top-performing deep architectures are trained on massive amounts of labeled data. In the absence of labeled data for a certain task, domain adaptation often provides an attractive option given that labeled data of similar nature but from a different domain (e.g. synthetic images) are available. Here, we propose a new approach to domain adaptation in deep architectures that can be trained on large amount of labeled data from the source domain and large amount of unlabeled data from the target domain (no labeled target-domain data is necessary). As the training progresses, the approach promotes the emergence of "deep" features that are (i) discriminative for the main learning task on the source domain and (ii) invariant with respect to the shift between the domains. We show that this adaptation behaviour can be achieved in almost any feed-forward model by augmenting it with few standard layers and a simple new gradient reversal layer. The resulting augmented architecture can be trained using standard backpropagation. Overall, the approach can be implemented with little effort using any of the deep-learning packages. The method performs very well in a series of image classification experiments, achieving adaptation effect in the presence of big domain shifts and outperforming previous state-of-the-art on Office datasets.
[ { "version": "v1", "created": "Fri, 26 Sep 2014 08:22:21 GMT" }, { "version": "v2", "created": "Fri, 27 Feb 2015 14:54:37 GMT" } ]
2015-03-02T00:00:00
[ [ "Ganin", "Yaroslav", "" ], [ "Lempitsky", "Victor", "" ] ]
TITLE: Unsupervised Domain Adaptation by Backpropagation ABSTRACT: Top-performing deep architectures are trained on massive amounts of labeled data. In the absence of labeled data for a certain task, domain adaptation often provides an attractive option given that labeled data of similar nature but from a different domain (e.g. synthetic images) are available. Here, we propose a new approach to domain adaptation in deep architectures that can be trained on large amount of labeled data from the source domain and large amount of unlabeled data from the target domain (no labeled target-domain data is necessary). As the training progresses, the approach promotes the emergence of "deep" features that are (i) discriminative for the main learning task on the source domain and (ii) invariant with respect to the shift between the domains. We show that this adaptation behaviour can be achieved in almost any feed-forward model by augmenting it with few standard layers and a simple new gradient reversal layer. The resulting augmented architecture can be trained using standard backpropagation. Overall, the approach can be implemented with little effort using any of the deep-learning packages. The method performs very well in a series of image classification experiments, achieving adaptation effect in the presence of big domain shifts and outperforming previous state-of-the-art on Office datasets.
no_new_dataset
0.947817
1502.07802
Zongyuan Ge
ZongYuan Ge, Chris McCool, Conrad Sanderson, Peter Corke
Modelling Local Deep Convolutional Neural Network Features to Improve Fine-Grained Image Classification
5 pages, three figures
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a local modelling approach using deep convolutional neural networks (CNNs) for fine-grained image classification. Recently, deep CNNs trained from large datasets have considerably improved the performance of object recognition. However, to date there has been limited work using these deep CNNs as local feature extractors. This partly stems from CNNs having internal representations which are high dimensional, thereby making such representations difficult to model using stochastic models. To overcome this issue, we propose to reduce the dimensionality of one of the internal fully connected layers, in conjunction with layer-restricted retraining to avoid retraining the entire network. The distribution of low-dimensional features obtained from the modified layer is then modelled using a Gaussian mixture model. Comparative experiments show that considerable performance improvements can be achieved on the challenging Fish and UEC FOOD-100 datasets.
[ { "version": "v1", "created": "Fri, 27 Feb 2015 02:04:57 GMT" } ]
2015-03-02T00:00:00
[ [ "Ge", "ZongYuan", "" ], [ "McCool", "Chris", "" ], [ "Sanderson", "Conrad", "" ], [ "Corke", "Peter", "" ] ]
TITLE: Modelling Local Deep Convolutional Neural Network Features to Improve Fine-Grained Image Classification ABSTRACT: We propose a local modelling approach using deep convolutional neural networks (CNNs) for fine-grained image classification. Recently, deep CNNs trained from large datasets have considerably improved the performance of object recognition. However, to date there has been limited work using these deep CNNs as local feature extractors. This partly stems from CNNs having internal representations which are high dimensional, thereby making such representations difficult to model using stochastic models. To overcome this issue, we propose to reduce the dimensionality of one of the internal fully connected layers, in conjunction with layer-restricted retraining to avoid retraining the entire network. The distribution of low-dimensional features obtained from the modified layer is then modelled using a Gaussian mixture model. Comparative experiments show that considerable performance improvements can be achieved on the challenging Fish and UEC FOOD-100 datasets.
no_new_dataset
0.949059
1502.07812
Kwangsu Lee
Kwangsu Lee, Jong Hwan Park, Dong Hoon Lee
Anonymous HIBE with Short Ciphertexts: Full Security in Prime Order Groups
31 pages, 1 figure
Designs, Codes and Cryptography, vol. 74, no. 2, pp. 395-425, Feb. 2015
10.1007/s10623-013-9868-6
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Anonymous Hierarchical Identity-Based Encryption (HIBE) is an extension of Identity-Based Encryption (IBE), and it provides not only a message hiding property but also an identity hiding property. Anonymous HIBE schemes can be applicable to anonymous communication systems and public key encryption systems with keyword searching. However, previous anonymous HIBE schemes have some disadvantages that the security was proven in the weaker model, the size of ciphertexts is not short, or the construction was based on composite order bilinear groups. In this paper, we propose the first efficient anonymous HIBE scheme with short ciphertexts in prime order (asymmetric) bilinear groups, and prove its security in the full model with an efficient reduction. To achieve this, we use the dual system encryption methodology of Waters. We also present the benchmark results of our scheme by measuring the performance of our implementation.
[ { "version": "v1", "created": "Fri, 27 Feb 2015 03:31:04 GMT" } ]
2015-03-02T00:00:00
[ [ "Lee", "Kwangsu", "" ], [ "Park", "Jong Hwan", "" ], [ "Lee", "Dong Hoon", "" ] ]
TITLE: Anonymous HIBE with Short Ciphertexts: Full Security in Prime Order Groups ABSTRACT: Anonymous Hierarchical Identity-Based Encryption (HIBE) is an extension of Identity-Based Encryption (IBE), and it provides not only a message hiding property but also an identity hiding property. Anonymous HIBE schemes can be applicable to anonymous communication systems and public key encryption systems with keyword searching. However, previous anonymous HIBE schemes have some disadvantages that the security was proven in the weaker model, the size of ciphertexts is not short, or the construction was based on composite order bilinear groups. In this paper, we propose the first efficient anonymous HIBE scheme with short ciphertexts in prime order (asymmetric) bilinear groups, and prove its security in the full model with an efficient reduction. To achieve this, we use the dual system encryption methodology of Waters. We also present the benchmark results of our scheme by measuring the performance of our implementation.
no_new_dataset
0.945147
1502.08039
Jihun Hamm
Jihun Hamm, Mikhail Belkin
Probabilistic Zero-shot Classification with Semantic Rankings
null
null
null
null
cs.LG cs.AI cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we propose a non-metric ranking-based representation of semantic similarity that allows natural aggregation of semantic information from multiple heterogeneous sources. We apply the ranking-based representation to zero-shot learning problems, and present deterministic and probabilistic zero-shot classifiers which can be built from pre-trained classifiers without retraining. We demonstrate their the advantages on two large real-world image datasets. In particular, we show that aggregating different sources of semantic information, including crowd-sourcing, leads to more accurate classification.
[ { "version": "v1", "created": "Fri, 27 Feb 2015 20:00:53 GMT" } ]
2015-03-02T00:00:00
[ [ "Hamm", "Jihun", "" ], [ "Belkin", "Mikhail", "" ] ]
TITLE: Probabilistic Zero-shot Classification with Semantic Rankings ABSTRACT: In this paper we propose a non-metric ranking-based representation of semantic similarity that allows natural aggregation of semantic information from multiple heterogeneous sources. We apply the ranking-based representation to zero-shot learning problems, and present deterministic and probabilistic zero-shot classifiers which can be built from pre-trained classifiers without retraining. We demonstrate their the advantages on two large real-world image datasets. In particular, we show that aggregating different sources of semantic information, including crowd-sourcing, leads to more accurate classification.
no_new_dataset
0.948917
1502.08046
Piotr Plonski
Piotr P{\l}o\'nski, Dorota Stefan, Robert Sulej, Krzysztof Zaremba
Image Segmentation in Liquid Argon Time Projection Chamber Detector
10 pages, 4 figures, 2 tables
null
null
null
cs.CV hep-ex
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Liquid Argon Time Projection Chamber (LAr-TPC) detectors provide excellent imaging and particle identification ability for studying neutrinos. An efficient and automatic reconstruction procedures are required to exploit potential of this imaging technology. Herein, a novel method for segmentation of images from LAr-TPC detectors is presented. The proposed approach computes a feature descriptor for each pixel in the image, which characterizes amplitude distribution in pixel and its neighbourhood. The supervised classifier is employed to distinguish between pixels representing particle's track and noise. The classifier is trained and evaluated on the hand-labeled dataset. The proposed approach can be a preprocessing step for reconstructing algorithms working directly on detector images.
[ { "version": "v1", "created": "Fri, 27 Feb 2015 20:32:35 GMT" } ]
2015-03-02T00:00:00
[ [ "Płoński", "Piotr", "" ], [ "Stefan", "Dorota", "" ], [ "Sulej", "Robert", "" ], [ "Zaremba", "Krzysztof", "" ] ]
TITLE: Image Segmentation in Liquid Argon Time Projection Chamber Detector ABSTRACT: The Liquid Argon Time Projection Chamber (LAr-TPC) detectors provide excellent imaging and particle identification ability for studying neutrinos. An efficient and automatic reconstruction procedures are required to exploit potential of this imaging technology. Herein, a novel method for segmentation of images from LAr-TPC detectors is presented. The proposed approach computes a feature descriptor for each pixel in the image, which characterizes amplitude distribution in pixel and its neighbourhood. The supervised classifier is employed to distinguish between pixels representing particle's track and noise. The classifier is trained and evaluated on the hand-labeled dataset. The proposed approach can be a preprocessing step for reconstructing algorithms working directly on detector images.
no_new_dataset
0.956634
1502.04981
Mete Ozay
Mete Ozay
Semi-supervised Segmentation Fusion of Multi-spectral and Aerial Images
A version of the manuscript was published in ICPR 2014
Proc. 22nd International Conference on Pattern Recognition, pp. 3839-3844, Stockholm, 2014
10.1109/ICPR.2014.659
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A Semi-supervised Segmentation Fusion algorithm is proposed using consensus and distributed learning. The aim of Unsupervised Segmentation Fusion (USF) is to achieve a consensus among different segmentation outputs obtained from different segmentation algorithms by computing an approximate solution to the NP problem with less computational complexity. Semi-supervision is incorporated in USF using a new algorithm called Semi-supervised Segmentation Fusion (SSSF). In SSSF, side information about the co-occurrence of pixels in the same or different segments is formulated as the constraints of a convex optimization problem. The results of the experiments employed on artificial and real-world benchmark multi-spectral and aerial images show that the proposed algorithms perform better than the individual state-of-the art segmentation algorithms.
[ { "version": "v1", "created": "Tue, 17 Feb 2015 18:01:13 GMT" }, { "version": "v2", "created": "Thu, 26 Feb 2015 00:11:44 GMT" } ]
2015-02-27T00:00:00
[ [ "Ozay", "Mete", "" ] ]
TITLE: Semi-supervised Segmentation Fusion of Multi-spectral and Aerial Images ABSTRACT: A Semi-supervised Segmentation Fusion algorithm is proposed using consensus and distributed learning. The aim of Unsupervised Segmentation Fusion (USF) is to achieve a consensus among different segmentation outputs obtained from different segmentation algorithms by computing an approximate solution to the NP problem with less computational complexity. Semi-supervision is incorporated in USF using a new algorithm called Semi-supervised Segmentation Fusion (SSSF). In SSSF, side information about the co-occurrence of pixels in the same or different segments is formulated as the constraints of a convex optimization problem. The results of the experiments employed on artificial and real-world benchmark multi-spectral and aerial images show that the proposed algorithms perform better than the individual state-of-the art segmentation algorithms.
no_new_dataset
0.951051
1502.06682
Chih-Ya Shen
Chih-Ya Shen, De-Nian Yang, Wang-Chien Lee, Ming-Syan Chen
Maximizing Friend-Making Likelihood for Social Activity Organization
null
null
null
null
cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The social presence theory in social psychology suggests that computer-mediated online interactions are inferior to face-to-face, in-person interactions. In this paper, we consider the scenarios of organizing in person friend-making social activities via online social networks (OSNs) and formulate a new research problem, namely, Hop-bounded Maximum Group Friending (HMGF), by modeling both existing friendships and the likelihood of new friend making. To find a set of attendees for socialization activities, HMGF is unique and challenging due to the interplay of the group size, the constraint on existing friendships and the objective function on the likelihood of friend making. We prove that HMGF is NP-Hard, and no approximation algorithm exists unless P = NP. We then propose an error-bounded approximation algorithm to efficiently obtain the solutions very close to the optimal solutions. We conduct a user study to validate our problem formulation and per- form extensive experiments on real datasets to demonstrate the efficiency and effectiveness of our proposed algorithm.
[ { "version": "v1", "created": "Tue, 24 Feb 2015 03:16:33 GMT" }, { "version": "v2", "created": "Thu, 26 Feb 2015 15:31:34 GMT" } ]
2015-02-27T00:00:00
[ [ "Shen", "Chih-Ya", "" ], [ "Yang", "De-Nian", "" ], [ "Lee", "Wang-Chien", "" ], [ "Chen", "Ming-Syan", "" ] ]
TITLE: Maximizing Friend-Making Likelihood for Social Activity Organization ABSTRACT: The social presence theory in social psychology suggests that computer-mediated online interactions are inferior to face-to-face, in-person interactions. In this paper, we consider the scenarios of organizing in person friend-making social activities via online social networks (OSNs) and formulate a new research problem, namely, Hop-bounded Maximum Group Friending (HMGF), by modeling both existing friendships and the likelihood of new friend making. To find a set of attendees for socialization activities, HMGF is unique and challenging due to the interplay of the group size, the constraint on existing friendships and the objective function on the likelihood of friend making. We prove that HMGF is NP-Hard, and no approximation algorithm exists unless P = NP. We then propose an error-bounded approximation algorithm to efficiently obtain the solutions very close to the optimal solutions. We conduct a user study to validate our problem formulation and per- form extensive experiments on real datasets to demonstrate the efficiency and effectiveness of our proposed algorithm.
no_new_dataset
0.946151
1502.07447
Mehmet Ali Arslan
Mehmet Ali Arslan, Flavius Gruian, Krzysztof Kuchcinski
A Comparative Study of Scheduling Techniques for Multimedia Applications on SIMD Pipelines
Presented at DATE Friday Workshop on Heterogeneous Architectures and Design Methods for Embedded Image Systems (HIS 2015) (arXiv:1502.07241)
null
null
DATEHIS/2015/02
cs.DC cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Parallel architectures are essential in order to take advantage of the parallelism inherent in streaming applications. One particular branch of these employ hardware SIMD pipelines. In this paper, we analyse several scheduling techniques, namely ad hoc overlapped execution, modulo scheduling and modulo scheduling with unrolling, all of which aim to efficiently utilize the special architecture design. Our investigation focuses on improving throughput while analysing other metrics that are important for streaming applications, such as register pressure, buffer sizes and code size. Through experiments conducted on several media benchmarks, we present and discuss trade-offs involved when selecting any one of these scheduling techniques.
[ { "version": "v1", "created": "Thu, 26 Feb 2015 06:15:23 GMT" } ]
2015-02-27T00:00:00
[ [ "Arslan", "Mehmet Ali", "" ], [ "Gruian", "Flavius", "" ], [ "Kuchcinski", "Krzysztof", "" ] ]
TITLE: A Comparative Study of Scheduling Techniques for Multimedia Applications on SIMD Pipelines ABSTRACT: Parallel architectures are essential in order to take advantage of the parallelism inherent in streaming applications. One particular branch of these employ hardware SIMD pipelines. In this paper, we analyse several scheduling techniques, namely ad hoc overlapped execution, modulo scheduling and modulo scheduling with unrolling, all of which aim to efficiently utilize the special architecture design. Our investigation focuses on improving throughput while analysing other metrics that are important for streaming applications, such as register pressure, buffer sizes and code size. Through experiments conducted on several media benchmarks, we present and discuss trade-offs involved when selecting any one of these scheduling techniques.
no_new_dataset
0.950088
1502.07504
Attia Nehar
Attia Nehar and Djelloul Ziadi and Hadda Cherroun
Rational Kernels for Arabic Stemming and Text Classification
12 pages
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we address the problems of Arabic Text Classification and stemming using Transducers and Rational Kernels. We introduce a new stemming technique based on the use of Arabic patterns (Pattern Based Stemmer). Patterns are modelled using transducers and stemming is done without depending on any dictionary. Using transducers for stemming, documents are transformed into finite state transducers. This document representation allows us to use and explore rational kernels as a framework for Arabic Text Classification. Stemming experiments are conducted on three word collections and classification experiments are done on the Saudi Press Agency dataset. Results show that our approach, when compared with other approaches, is promising specially in terms of Accuracy, Recall and F1.
[ { "version": "v1", "created": "Thu, 26 Feb 2015 11:09:59 GMT" } ]
2015-02-27T00:00:00
[ [ "Nehar", "Attia", "" ], [ "Ziadi", "Djelloul", "" ], [ "Cherroun", "Hadda", "" ] ]
TITLE: Rational Kernels for Arabic Stemming and Text Classification ABSTRACT: In this paper, we address the problems of Arabic Text Classification and stemming using Transducers and Rational Kernels. We introduce a new stemming technique based on the use of Arabic patterns (Pattern Based Stemmer). Patterns are modelled using transducers and stemming is done without depending on any dictionary. Using transducers for stemming, documents are transformed into finite state transducers. This document representation allows us to use and explore rational kernels as a framework for Arabic Text Classification. Stemming experiments are conducted on three word collections and classification experiments are done on the Saudi Press Agency dataset. Results show that our approach, when compared with other approaches, is promising specially in terms of Accuracy, Recall and F1.
no_new_dataset
0.953275
1502.05224
Yun Gu
Yun Gu, Haoyang Xue, Jie Yang
Cross-Modality Hashing with Partial Correspondence
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Learning a hashing function for cross-media search is very desirable due to its low storage cost and fast query speed. However, the data crawled from Internet cannot always guarantee good correspondence among different modalities which affects the learning for hashing function. In this paper, we focus on cross-modal hashing with partially corresponded data. The data without full correspondence are made in use to enhance the hashing performance. The experiments on Wiki and NUS-WIDE datasets demonstrates that the proposed method outperforms some state-of-the-art hashing approaches with fewer correspondence information.
[ { "version": "v1", "created": "Wed, 18 Feb 2015 13:41:23 GMT" }, { "version": "v2", "created": "Wed, 25 Feb 2015 12:13:47 GMT" } ]
2015-02-26T00:00:00
[ [ "Gu", "Yun", "" ], [ "Xue", "Haoyang", "" ], [ "Yang", "Jie", "" ] ]
TITLE: Cross-Modality Hashing with Partial Correspondence ABSTRACT: Learning a hashing function for cross-media search is very desirable due to its low storage cost and fast query speed. However, the data crawled from Internet cannot always guarantee good correspondence among different modalities which affects the learning for hashing function. In this paper, we focus on cross-modal hashing with partially corresponded data. The data without full correspondence are made in use to enhance the hashing performance. The experiments on Wiki and NUS-WIDE datasets demonstrates that the proposed method outperforms some state-of-the-art hashing approaches with fewer correspondence information.
no_new_dataset
0.952353
1402.3163
Xiaohao Yang
Xiaohao Yang and Pavol Juhas and Christopher L. Farrow and Simon J. L. Billinge
xPDFsuite: an end-to-end software solution for high throughput pair distribution function transformation, visualization and analysis
3 pages, 2 figures
null
null
null
cond-mat.mtrl-sci cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The xPDFsuite software program is described. It is for processing and analyzing atomic pair distribution functions (PDF) from X-ray powder diffraction data. It provides a convenient GUI for SrXplanr and PDFgetX3, allowing the users to easily obtain 1D diffraction pattern from raw 2D diffraction images and then transform them to PDFs. It also bundles PDFgui which allows the users to create structure models and fit to the experiment data. It is specially useful for working with large numbers of datasets such as from high throughout measurements. Some of the key features are: real time PDF transformation and plotting; 2D waterfall, false color heatmap, and 3D contour plotting for multiple datasets; static and dynamic mask editing; geometric calibration of powder diffraction image; configurations and project saving and loading; Pearson correlation analysis on selected datasets; written in Python and support multiple platforms.
[ { "version": "v1", "created": "Thu, 13 Feb 2014 14:55:14 GMT" }, { "version": "v2", "created": "Tue, 25 Feb 2014 04:01:14 GMT" }, { "version": "v3", "created": "Mon, 23 Feb 2015 21:13:21 GMT" } ]
2015-02-25T00:00:00
[ [ "Yang", "Xiaohao", "" ], [ "Juhas", "Pavol", "" ], [ "Farrow", "Christopher L.", "" ], [ "Billinge", "Simon J. L.", "" ] ]
TITLE: xPDFsuite: an end-to-end software solution for high throughput pair distribution function transformation, visualization and analysis ABSTRACT: The xPDFsuite software program is described. It is for processing and analyzing atomic pair distribution functions (PDF) from X-ray powder diffraction data. It provides a convenient GUI for SrXplanr and PDFgetX3, allowing the users to easily obtain 1D diffraction pattern from raw 2D diffraction images and then transform them to PDFs. It also bundles PDFgui which allows the users to create structure models and fit to the experiment data. It is specially useful for working with large numbers of datasets such as from high throughout measurements. Some of the key features are: real time PDF transformation and plotting; 2D waterfall, false color heatmap, and 3D contour plotting for multiple datasets; static and dynamic mask editing; geometric calibration of powder diffraction image; configurations and project saving and loading; Pearson correlation analysis on selected datasets; written in Python and support multiple platforms.
no_new_dataset
0.947866
1502.06657
Sahin Geyik
Sahin Cem Geyik, Abhishek Saxena, Ali Dasdan
Multi-Touch Attribution Based Budget Allocation in Online Advertising
This paper has been published in ADKDD 2014, August 24, New York City, New York, U.S.A
null
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Budget allocation in online advertising deals with distributing the campaign (insertion order) level budgets to different sub-campaigns which employ different targeting criteria and may perform differently in terms of return-on-investment (ROI). In this paper, we present the efforts at Turn on how to best allocate campaign budget so that the advertiser or campaign-level ROI is maximized. To do this, it is crucial to be able to correctly determine the performance of sub-campaigns. This determination is highly related to the action-attribution problem, i.e. to be able to find out the set of ads, and hence the sub-campaigns that provided them to a user, that an action should be attributed to. For this purpose, we employ both last-touch (last ad gets all credit) and multi-touch (many ads share the credit) attribution methodologies. We present the algorithms deployed at Turn for the attribution problem, as well as their parallel implementation on the large advertiser performance datasets. We conclude the paper with our empirical comparison of last-touch and multi-touch attribution-based budget allocation in a real online advertising setting.
[ { "version": "v1", "created": "Tue, 24 Feb 2015 00:09:05 GMT" } ]
2015-02-25T00:00:00
[ [ "Geyik", "Sahin Cem", "" ], [ "Saxena", "Abhishek", "" ], [ "Dasdan", "Ali", "" ] ]
TITLE: Multi-Touch Attribution Based Budget Allocation in Online Advertising ABSTRACT: Budget allocation in online advertising deals with distributing the campaign (insertion order) level budgets to different sub-campaigns which employ different targeting criteria and may perform differently in terms of return-on-investment (ROI). In this paper, we present the efforts at Turn on how to best allocate campaign budget so that the advertiser or campaign-level ROI is maximized. To do this, it is crucial to be able to correctly determine the performance of sub-campaigns. This determination is highly related to the action-attribution problem, i.e. to be able to find out the set of ads, and hence the sub-campaigns that provided them to a user, that an action should be attributed to. For this purpose, we employ both last-touch (last ad gets all credit) and multi-touch (many ads share the credit) attribution methodologies. We present the algorithms deployed at Turn for the attribution problem, as well as their parallel implementation on the large advertiser performance datasets. We conclude the paper with our empirical comparison of last-touch and multi-touch attribution-based budget allocation in a real online advertising setting.
no_new_dataset
0.945851
1502.06671
Pinghui Wang Dr.
Pinghui Wang and John C.S. Lui and Don Towsley
Minfer: Inferring Motif Statistics From Sampled Edges
null
null
null
null
cs.SI physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Characterizing motif (i.e., locally connected subgraph patterns) statistics is important for understanding complex networks such as online social networks and communication networks. Previous work made the strong assumption that the graph topology of interest is known, and that the dataset either fits into main memory or stored on disks such that it is not expensive to obtain all neighbors of any given node. In practice, researchers have to deal with the situation where the graph topology is unknown, either because the graph is dynamic, or because it is expensive to collect and store all topological and meta information on disk. Hence, what is available to researchers is only a snapshot of the graph generated by sampling edges from the graph at random, which we called a "RESampled graph". Clearly, a RESampled graph's motif statistics may be quite different from the underlying original graph. To solve this challenge, we propose a framework and implement a system called Minfer, which can take the given RESampled graph and accurately infer the underlying graph's motif statistics. We also use Fisher information to bound the error of our estimates. Experiments using large scale datasets show that our method to be accurate.
[ { "version": "v1", "created": "Tue, 24 Feb 2015 01:43:59 GMT" } ]
2015-02-25T00:00:00
[ [ "Wang", "Pinghui", "" ], [ "Lui", "John C. S.", "" ], [ "Towsley", "Don", "" ] ]
TITLE: Minfer: Inferring Motif Statistics From Sampled Edges ABSTRACT: Characterizing motif (i.e., locally connected subgraph patterns) statistics is important for understanding complex networks such as online social networks and communication networks. Previous work made the strong assumption that the graph topology of interest is known, and that the dataset either fits into main memory or stored on disks such that it is not expensive to obtain all neighbors of any given node. In practice, researchers have to deal with the situation where the graph topology is unknown, either because the graph is dynamic, or because it is expensive to collect and store all topological and meta information on disk. Hence, what is available to researchers is only a snapshot of the graph generated by sampling edges from the graph at random, which we called a "RESampled graph". Clearly, a RESampled graph's motif statistics may be quite different from the underlying original graph. To solve this challenge, we propose a framework and implement a system called Minfer, which can take the given RESampled graph and accurately infer the underlying graph's motif statistics. We also use Fisher information to bound the error of our estimates. Experiments using large scale datasets show that our method to be accurate.
no_new_dataset
0.945298
1502.06703
Smitha M.L.
B.H. Shekar, Smitha M.L., P. Shivakumara
Discrete Wavelet Transform and Gradient Difference based approach for text localization in videos
Fifth International Conference on Signals and Image Processing, IEEE, DOI 10.1109/ICSIP.2014.50, pp. 280-284, held at BNMIT, Bangalore in January 2014
null
10.1109/ICSIP.2014.50
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The text detection and localization is important for video analysis and understanding. The scene text in video contains semantic information and thus can contribute significantly to video retrieval and understanding. However, most of the approaches detect scene text in still images or single video frame. Videos differ from images in temporal redundancy. This paper proposes a novel hybrid method to robustly localize the texts in natural scene images and videos based on fusion of discrete wavelet transform and gradient difference. A set of rules and geometric properties have been devised to localize the actual text regions. Then, morphological operation is performed to generate the text regions and finally the connected component analysis is employed to localize the text in a video frame. The experimental results obtained on publicly available standard ICDAR 2003 and Hua dataset illustrate that the proposed method can accurately detect and localize texts of various sizes, fonts and colors. The experimentation on huge collection of video databases reveal the suitability of the proposed method to video databases.
[ { "version": "v1", "created": "Tue, 24 Feb 2015 07:46:34 GMT" } ]
2015-02-25T00:00:00
[ [ "Shekar", "B. H.", "" ], [ "L.", "Smitha M.", "" ], [ "Shivakumara", "P.", "" ] ]
TITLE: Discrete Wavelet Transform and Gradient Difference based approach for text localization in videos ABSTRACT: The text detection and localization is important for video analysis and understanding. The scene text in video contains semantic information and thus can contribute significantly to video retrieval and understanding. However, most of the approaches detect scene text in still images or single video frame. Videos differ from images in temporal redundancy. This paper proposes a novel hybrid method to robustly localize the texts in natural scene images and videos based on fusion of discrete wavelet transform and gradient difference. A set of rules and geometric properties have been devised to localize the actual text regions. Then, morphological operation is performed to generate the text regions and finally the connected component analysis is employed to localize the text in a video frame. The experimental results obtained on publicly available standard ICDAR 2003 and Hua dataset illustrate that the proposed method can accurately detect and localize texts of various sizes, fonts and colors. The experimentation on huge collection of video databases reveal the suitability of the proposed method to video databases.
no_new_dataset
0.953319
1502.06757
Lse Lse
Mart\'in Dias (INRIA Lille - Nord Europe), Alberto Bacchelli, Georgios Gousios, Damien Cassou (INRIA Lille - Nord Europe), St\'ephane Ducasse (INRIA Lille - Nord Europe)
Untangling Fine-Grained Code Changes
null
null
null
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
After working for some time, developers commit their code changes to a version control system. When doing so, they often bundle unrelated changes (e.g., bug fix and refactoring) in a single commit, thus creating a so-called tangled commit. Sharing tangled commits is problematic because it makes review, reversion, and integration of these commits harder and historical analyses of the project less reliable. Researchers have worked at untangling existing commits, i.e., finding which part of a commit relates to which task. In this paper, we contribute to this line of work in two ways: (1) A publicly available dataset of untangled code changes, created with the help of two developers who accurately split their code changes into self contained tasks over a period of four months; (2) a novel approach, EpiceaUntangler, to help developers share untangled commits (aka. atomic commits) by using fine-grained code change information. EpiceaUntangler is based and tested on the publicly available dataset, and further evaluated by deploying it to 7 developers, who used it for 2 weeks. We recorded a median success rate of 91% and average one of 75%, in automatically creating clusters of untangled fine-grained code changes.
[ { "version": "v1", "created": "Tue, 24 Feb 2015 10:50:13 GMT" } ]
2015-02-25T00:00:00
[ [ "Dias", "Martín", "", "INRIA Lille - Nord Europe" ], [ "Bacchelli", "Alberto", "", "INRIA Lille - Nord Europe" ], [ "Gousios", "Georgios", "", "INRIA Lille - Nord Europe" ], [ "Cassou", "Damien", "", "INRIA Lille - Nord Europe" ], [ "Ducasse", "Stéphane", "", "INRIA\n Lille - Nord Europe" ] ]
TITLE: Untangling Fine-Grained Code Changes ABSTRACT: After working for some time, developers commit their code changes to a version control system. When doing so, they often bundle unrelated changes (e.g., bug fix and refactoring) in a single commit, thus creating a so-called tangled commit. Sharing tangled commits is problematic because it makes review, reversion, and integration of these commits harder and historical analyses of the project less reliable. Researchers have worked at untangling existing commits, i.e., finding which part of a commit relates to which task. In this paper, we contribute to this line of work in two ways: (1) A publicly available dataset of untangled code changes, created with the help of two developers who accurately split their code changes into self contained tasks over a period of four months; (2) a novel approach, EpiceaUntangler, to help developers share untangled commits (aka. atomic commits) by using fine-grained code change information. EpiceaUntangler is based and tested on the publicly available dataset, and further evaluated by deploying it to 7 developers, who used it for 2 weeks. We recorded a median success rate of 91% and average one of 75%, in automatically creating clusters of untangled fine-grained code changes.
no_new_dataset
0.562567
1502.06796
Seunghoon Hong
Seunghoon Hong, Tackgeun You, Suha Kwak, Bohyung Han
Online Tracking by Learning Discriminative Saliency Map with Convolutional Neural Network
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose an online visual tracking algorithm by learning discriminative saliency map using Convolutional Neural Network (CNN). Given a CNN pre-trained on a large-scale image repository in offline, our algorithm takes outputs from hidden layers of the network as feature descriptors since they show excellent representation performance in various general visual recognition problems. The features are used to learn discriminative target appearance models using an online Support Vector Machine (SVM). In addition, we construct target-specific saliency map by backpropagating CNN features with guidance of the SVM, and obtain the final tracking result in each frame based on the appearance model generatively constructed with the saliency map. Since the saliency map visualizes spatial configuration of target effectively, it improves target localization accuracy and enable us to achieve pixel-level target segmentation. We verify the effectiveness of our tracking algorithm through extensive experiment on a challenging benchmark, where our method illustrates outstanding performance compared to the state-of-the-art tracking algorithms.
[ { "version": "v1", "created": "Tue, 24 Feb 2015 13:10:32 GMT" } ]
2015-02-25T00:00:00
[ [ "Hong", "Seunghoon", "" ], [ "You", "Tackgeun", "" ], [ "Kwak", "Suha", "" ], [ "Han", "Bohyung", "" ] ]
TITLE: Online Tracking by Learning Discriminative Saliency Map with Convolutional Neural Network ABSTRACT: We propose an online visual tracking algorithm by learning discriminative saliency map using Convolutional Neural Network (CNN). Given a CNN pre-trained on a large-scale image repository in offline, our algorithm takes outputs from hidden layers of the network as feature descriptors since they show excellent representation performance in various general visual recognition problems. The features are used to learn discriminative target appearance models using an online Support Vector Machine (SVM). In addition, we construct target-specific saliency map by backpropagating CNN features with guidance of the SVM, and obtain the final tracking result in each frame based on the appearance model generatively constructed with the saliency map. Since the saliency map visualizes spatial configuration of target effectively, it improves target localization accuracy and enable us to achieve pixel-level target segmentation. We verify the effectiveness of our tracking algorithm through extensive experiment on a challenging benchmark, where our method illustrates outstanding performance compared to the state-of-the-art tracking algorithms.
no_new_dataset
0.951639
1502.06823
Theodoros Rekatsinas
Theodoros Rekatsinas, Amol Deshpande and Aditya Parameswaran
CrowdGather: Entity Extraction over Structured Domains
null
null
null
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Crowdsourced entity extraction is often used to acquire data for many applications, including recommendation systems, construction of aggregated listings and directories, and knowledge base construction. Current solutions focus on entity extraction using a single query, e.g., only using "give me another restaurant", when assembling a list of all restaurants. Due to the cost of human labor, solutions that focus on a single query can be highly impractical. In this paper, we leverage the fact that entity extraction often focuses on {\em structured domains}, i.e., domains that are described by a collection of attributes, each potentially exhibiting hierarchical structure. Given such a domain, we enable a richer space of queries, e.g., "give me another Moroccan restaurant in Manhattan that does takeout". Naturally, enabling a richer space of queries comes with a host of issues, especially since many queries return empty answers. We develop new statistical tools that enable us to reason about the gain of issuing {\em additional queries} given little to no information, and show how we can exploit the overlaps across the results of queries for different points of the data domain to obtain accurate estimates of the gain. We cast the problem of {\em budgeted entity extraction} over large domains as an adaptive optimization problem that seeks to maximize the number of extracted entities, while minimizing the overall extraction costs. We evaluate our techniques with experiments on both synthetic and real-world datasets, demonstrating a yield of up to 4X over competing approaches for the same budget.
[ { "version": "v1", "created": "Tue, 24 Feb 2015 14:41:15 GMT" } ]
2015-02-25T00:00:00
[ [ "Rekatsinas", "Theodoros", "" ], [ "Deshpande", "Amol", "" ], [ "Parameswaran", "Aditya", "" ] ]
TITLE: CrowdGather: Entity Extraction over Structured Domains ABSTRACT: Crowdsourced entity extraction is often used to acquire data for many applications, including recommendation systems, construction of aggregated listings and directories, and knowledge base construction. Current solutions focus on entity extraction using a single query, e.g., only using "give me another restaurant", when assembling a list of all restaurants. Due to the cost of human labor, solutions that focus on a single query can be highly impractical. In this paper, we leverage the fact that entity extraction often focuses on {\em structured domains}, i.e., domains that are described by a collection of attributes, each potentially exhibiting hierarchical structure. Given such a domain, we enable a richer space of queries, e.g., "give me another Moroccan restaurant in Manhattan that does takeout". Naturally, enabling a richer space of queries comes with a host of issues, especially since many queries return empty answers. We develop new statistical tools that enable us to reason about the gain of issuing {\em additional queries} given little to no information, and show how we can exploit the overlaps across the results of queries for different points of the data domain to obtain accurate estimates of the gain. We cast the problem of {\em budgeted entity extraction} over large domains as an adaptive optimization problem that seeks to maximize the number of extracted entities, while minimizing the overall extraction costs. We evaluate our techniques with experiments on both synthetic and real-world datasets, demonstrating a yield of up to 4X over competing approaches for the same budget.
no_new_dataset
0.941493
1306.0239
Yichuan Tang
Yichuan Tang
Deep Learning using Linear Support Vector Machines
Contribution to the ICML 2013 Challenges in Representation Learning Workshop
null
null
null
cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recently, fully-connected and convolutional neural networks have been trained to achieve state-of-the-art performance on a wide variety of tasks such as speech recognition, image classification, natural language processing, and bioinformatics. For classification tasks, most of these "deep learning" models employ the softmax activation function for prediction and minimize cross-entropy loss. In this paper, we demonstrate a small but consistent advantage of replacing the softmax layer with a linear support vector machine. Learning minimizes a margin-based loss instead of the cross-entropy loss. While there have been various combinations of neural nets and SVMs in prior art, our results using L2-SVMs show that by simply replacing softmax with linear SVMs gives significant gains on popular deep learning datasets MNIST, CIFAR-10, and the ICML 2013 Representation Learning Workshop's face expression recognition challenge.
[ { "version": "v1", "created": "Sun, 2 Jun 2013 18:46:58 GMT" }, { "version": "v2", "created": "Tue, 9 Jul 2013 21:30:59 GMT" }, { "version": "v3", "created": "Mon, 23 Dec 2013 21:16:45 GMT" }, { "version": "v4", "created": "Sat, 21 Feb 2015 16:58:39 GMT" } ]
2015-02-24T00:00:00
[ [ "Tang", "Yichuan", "" ] ]
TITLE: Deep Learning using Linear Support Vector Machines ABSTRACT: Recently, fully-connected and convolutional neural networks have been trained to achieve state-of-the-art performance on a wide variety of tasks such as speech recognition, image classification, natural language processing, and bioinformatics. For classification tasks, most of these "deep learning" models employ the softmax activation function for prediction and minimize cross-entropy loss. In this paper, we demonstrate a small but consistent advantage of replacing the softmax layer with a linear support vector machine. Learning minimizes a margin-based loss instead of the cross-entropy loss. While there have been various combinations of neural nets and SVMs in prior art, our results using L2-SVMs show that by simply replacing softmax with linear SVMs gives significant gains on popular deep learning datasets MNIST, CIFAR-10, and the ICML 2013 Representation Learning Workshop's face expression recognition challenge.
no_new_dataset
0.950319
1312.6110
Yichuan Tang
Yichuan Tang, Nitish Srivastava, Ruslan Salakhutdinov
Learning Generative Models with Visual Attention
In the proceedings of Neural Information Processing Systems, 2014
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Attention has long been proposed by psychologists as important for effectively dealing with the enormous sensory stimulus available in the neocortex. Inspired by the visual attention models in computational neuroscience and the need of object-centric data for generative models, we describe for generative learning framework using attentional mechanisms. Attentional mechanisms can propagate signals from region of interest in a scene to an aligned canonical representation, where generative modeling takes place. By ignoring background clutter, generative models can concentrate their resources on the object of interest. Our model is a proper graphical model where the 2D Similarity transformation is a part of the top-down process. A ConvNet is employed to provide good initializations during posterior inference which is based on Hamiltonian Monte Carlo. Upon learning images of faces, our model can robustly attend to face regions of novel test subjects. More importantly, our model can learn generative models of new faces from a novel dataset of large images where the face locations are not known.
[ { "version": "v1", "created": "Fri, 20 Dec 2013 20:50:43 GMT" }, { "version": "v2", "created": "Mon, 30 Dec 2013 16:49:43 GMT" }, { "version": "v3", "created": "Sat, 21 Feb 2015 22:21:15 GMT" } ]
2015-02-24T00:00:00
[ [ "Tang", "Yichuan", "" ], [ "Srivastava", "Nitish", "" ], [ "Salakhutdinov", "Ruslan", "" ] ]
TITLE: Learning Generative Models with Visual Attention ABSTRACT: Attention has long been proposed by psychologists as important for effectively dealing with the enormous sensory stimulus available in the neocortex. Inspired by the visual attention models in computational neuroscience and the need of object-centric data for generative models, we describe for generative learning framework using attentional mechanisms. Attentional mechanisms can propagate signals from region of interest in a scene to an aligned canonical representation, where generative modeling takes place. By ignoring background clutter, generative models can concentrate their resources on the object of interest. Our model is a proper graphical model where the 2D Similarity transformation is a part of the top-down process. A ConvNet is employed to provide good initializations during posterior inference which is based on Hamiltonian Monte Carlo. Upon learning images of faces, our model can robustly attend to face regions of novel test subjects. More importantly, our model can learn generative models of new faces from a novel dataset of large images where the face locations are not known.
no_new_dataset
0.910942
1405.0312
Piotr Doll\'ar
Tsung-Yi Lin, Michael Maire, Serge Belongie, Lubomir Bourdev, Ross Girshick, James Hays, Pietro Perona, Deva Ramanan, C. Lawrence Zitnick, Piotr Doll\'ar
Microsoft COCO: Common Objects in Context
1) updated annotation pipeline description and figures; 2) added new section describing datasets splits; 3) updated author list
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a new dataset with the goal of advancing the state-of-the-art in object recognition by placing the question of object recognition in the context of the broader question of scene understanding. This is achieved by gathering images of complex everyday scenes containing common objects in their natural context. Objects are labeled using per-instance segmentations to aid in precise object localization. Our dataset contains photos of 91 objects types that would be easily recognizable by a 4 year old. With a total of 2.5 million labeled instances in 328k images, the creation of our dataset drew upon extensive crowd worker involvement via novel user interfaces for category detection, instance spotting and instance segmentation. We present a detailed statistical analysis of the dataset in comparison to PASCAL, ImageNet, and SUN. Finally, we provide baseline performance analysis for bounding box and segmentation detection results using a Deformable Parts Model.
[ { "version": "v1", "created": "Thu, 1 May 2014 21:43:32 GMT" }, { "version": "v2", "created": "Sat, 5 Jul 2014 18:39:56 GMT" }, { "version": "v3", "created": "Sat, 21 Feb 2015 01:48:49 GMT" } ]
2015-02-24T00:00:00
[ [ "Lin", "Tsung-Yi", "" ], [ "Maire", "Michael", "" ], [ "Belongie", "Serge", "" ], [ "Bourdev", "Lubomir", "" ], [ "Girshick", "Ross", "" ], [ "Hays", "James", "" ], [ "Perona", "Pietro", "" ], [ "Ramanan", "Deva", "" ], [ "Zitnick", "C. Lawrence", "" ], [ "Dollár", "Piotr", "" ] ]
TITLE: Microsoft COCO: Common Objects in Context ABSTRACT: We present a new dataset with the goal of advancing the state-of-the-art in object recognition by placing the question of object recognition in the context of the broader question of scene understanding. This is achieved by gathering images of complex everyday scenes containing common objects in their natural context. Objects are labeled using per-instance segmentations to aid in precise object localization. Our dataset contains photos of 91 objects types that would be easily recognizable by a 4 year old. With a total of 2.5 million labeled instances in 328k images, the creation of our dataset drew upon extensive crowd worker involvement via novel user interfaces for category detection, instance spotting and instance segmentation. We present a detailed statistical analysis of the dataset in comparison to PASCAL, ImageNet, and SUN. Finally, we provide baseline performance analysis for bounding box and segmentation detection results using a Deformable Parts Model.
new_dataset
0.956104
1412.6039
Xin Yuan
Yunchen Pu, Xin Yuan and Lawrence Carin
Generative Deep Deconvolutional Learning
21 pages, 9 figures, revised version for ICLR 2015
null
null
null
stat.ML cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A generative Bayesian model is developed for deep (multi-layer) convolutional dictionary learning. A novel probabilistic pooling operation is integrated into the deep model, yielding efficient bottom-up and top-down probabilistic learning. After learning the deep convolutional dictionary, testing is implemented via deconvolutional inference. To speed up this inference, a new statistical approach is proposed to project the top-layer dictionary elements to the data level. Following this, only one layer of deconvolution is required during testing. Experimental results demonstrate powerful capabilities of the model to learn multi-layer features from images. Excellent classification results are obtained on both the MNIST and Caltech 101 datasets.
[ { "version": "v1", "created": "Thu, 18 Dec 2014 20:01:38 GMT" }, { "version": "v2", "created": "Fri, 19 Dec 2014 17:21:36 GMT" }, { "version": "v3", "created": "Sun, 22 Feb 2015 18:13:29 GMT" } ]
2015-02-24T00:00:00
[ [ "Pu", "Yunchen", "" ], [ "Yuan", "Xin", "" ], [ "Carin", "Lawrence", "" ] ]
TITLE: Generative Deep Deconvolutional Learning ABSTRACT: A generative Bayesian model is developed for deep (multi-layer) convolutional dictionary learning. A novel probabilistic pooling operation is integrated into the deep model, yielding efficient bottom-up and top-down probabilistic learning. After learning the deep convolutional dictionary, testing is implemented via deconvolutional inference. To speed up this inference, a new statistical approach is proposed to project the top-layer dictionary elements to the data level. Following this, only one layer of deconvolution is required during testing. Experimental results demonstrate powerful capabilities of the model to learn multi-layer features from images. Excellent classification results are obtained on both the MNIST and Caltech 101 datasets.
no_new_dataset
0.951233
1502.06064
Ken Miura
Ken Miura, Tetsuaki Mano, Atsushi Kanehira, Yuichiro Tsuchiya and Tatsuya Harada
MILJS : Brand New JavaScript Libraries for Matrix Calculation and Machine Learning
null
null
null
null
stat.ML cs.LG cs.MS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
MILJS is a collection of state-of-the-art, platform-independent, scalable, fast JavaScript libraries for matrix calculation and machine learning. Our core library offering a matrix calculation is called Sushi, which exhibits far better performance than any other leading machine learning libraries written in JavaScript. Especially, our matrix multiplication is 177 times faster than the fastest JavaScript benchmark. Based on Sushi, a machine learning library called Tempura is provided, which supports various algorithms widely used in machine learning research. We also provide Soba as a visualization library. The implementations of our libraries are clearly written, properly documented and thus can are easy to get started with, as long as there is a web browser. These libraries are available from http://mil-tokyo.github.io/ under the MIT license.
[ { "version": "v1", "created": "Sat, 21 Feb 2015 04:29:41 GMT" } ]
2015-02-24T00:00:00
[ [ "Miura", "Ken", "" ], [ "Mano", "Tetsuaki", "" ], [ "Kanehira", "Atsushi", "" ], [ "Tsuchiya", "Yuichiro", "" ], [ "Harada", "Tatsuya", "" ] ]
TITLE: MILJS : Brand New JavaScript Libraries for Matrix Calculation and Machine Learning ABSTRACT: MILJS is a collection of state-of-the-art, platform-independent, scalable, fast JavaScript libraries for matrix calculation and machine learning. Our core library offering a matrix calculation is called Sushi, which exhibits far better performance than any other leading machine learning libraries written in JavaScript. Especially, our matrix multiplication is 177 times faster than the fastest JavaScript benchmark. Based on Sushi, a machine learning library called Tempura is provided, which supports various algorithms widely used in machine learning research. We also provide Soba as a visualization library. The implementations of our libraries are clearly written, properly documented and thus can are easy to get started with, as long as there is a web browser. These libraries are available from http://mil-tokyo.github.io/ under the MIT license.
no_new_dataset
0.939025
1502.06086
Suyash Gupta
Suyash Gupta, Rahul Shrivastava and V. Krishna Nandivada
DCAFE: Dynamic load-balanced loop Chunking & Aggressive Finish Elimination for Recursive Task Parallel Programs
null
null
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we present two symbiotic optimizations to optimize recursive task parallel (RTP) programs by reducing the task creation and termination overheads. Our first optimization Aggressive Finish-Elimination (AFE) helps reduce the redundant join operations to a large extent. The second optimization Dynamic Load-Balanced loop Chunking (DLBC) extends the prior work on loop chunking to decide on the number of parallel tasks based on the number of available worker threads, at runtime. Further, we discuss the impact of exceptions on our optimizations and extend them to handle RTP programs that may throw exceptions. We implemented DCAFE (= DLBC+AFE) in the X10v2.3 compiler and tested it over a set of benchmark kernels on two different hardwares (a 16-core Intel system and a 64-core AMD system). With respect to the base X10 compiler extended with loop-chunking of Nandivada et al [Nandivada et al.(2013)Nandivada, Shirako, Zhao, and Sarkar](LC), DCAFE achieved a geometric mean speed up of 5.75x and 4.16x on the Intel and AMD system, respectively. We also present an evaluation with respect to the energy consumption on the Intel system and show that on average, compared to the LC versions, the DCAFE versions consume 71.2% less energy.
[ { "version": "v1", "created": "Sat, 21 Feb 2015 08:18:43 GMT" } ]
2015-02-24T00:00:00
[ [ "Gupta", "Suyash", "" ], [ "Shrivastava", "Rahul", "" ], [ "Nandivada", "V. Krishna", "" ] ]
TITLE: DCAFE: Dynamic load-balanced loop Chunking & Aggressive Finish Elimination for Recursive Task Parallel Programs ABSTRACT: In this paper, we present two symbiotic optimizations to optimize recursive task parallel (RTP) programs by reducing the task creation and termination overheads. Our first optimization Aggressive Finish-Elimination (AFE) helps reduce the redundant join operations to a large extent. The second optimization Dynamic Load-Balanced loop Chunking (DLBC) extends the prior work on loop chunking to decide on the number of parallel tasks based on the number of available worker threads, at runtime. Further, we discuss the impact of exceptions on our optimizations and extend them to handle RTP programs that may throw exceptions. We implemented DCAFE (= DLBC+AFE) in the X10v2.3 compiler and tested it over a set of benchmark kernels on two different hardwares (a 16-core Intel system and a 64-core AMD system). With respect to the base X10 compiler extended with loop-chunking of Nandivada et al [Nandivada et al.(2013)Nandivada, Shirako, Zhao, and Sarkar](LC), DCAFE achieved a geometric mean speed up of 5.75x and 4.16x on the Intel and AMD system, respectively. We also present an evaluation with respect to the energy consumption on the Intel system and show that on average, compared to the LC versions, the DCAFE versions consume 71.2% less energy.
no_new_dataset
0.942823
1502.06219
Smitha M.L.
B.H. Shekar, Smitha M.L.
Video Text Localization with an emphasis on Edge Features
8 pages, Eighth International Conference on Image and Signal Processing, Elsevier Publications, ISBN: 9789351072522, pp: 324-330, held at UVCE, Bangalore in July 2014. arXiv admin note: text overlap with arXiv:1502.03913
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The text detection and localization plays a major role in video analysis and understanding. The scene text embedded in video consist of high-level semantics and hence contributes significantly to visual content analysis and retrieval. This paper proposes a novel method to robustly localize the texts in natural scene images and videos based on sobel edge emphasizing approach. The input image is preprocessed and edge emphasis is done to detect the text clusters. Further, a set of rules have been devised using morphological operators for false positive elimination and connected component analysis is performed to detect the text regions and hence text localization is performed. The experimental results obtained on publicly available standard datasets illustrate that the proposed method can detect and localize the texts of various sizes, fonts and colors.
[ { "version": "v1", "created": "Sun, 22 Feb 2015 12:32:18 GMT" } ]
2015-02-24T00:00:00
[ [ "Shekar", "B. H.", "" ], [ "L.", "Smitha M.", "" ] ]
TITLE: Video Text Localization with an emphasis on Edge Features ABSTRACT: The text detection and localization plays a major role in video analysis and understanding. The scene text embedded in video consist of high-level semantics and hence contributes significantly to visual content analysis and retrieval. This paper proposes a novel method to robustly localize the texts in natural scene images and videos based on sobel edge emphasizing approach. The input image is preprocessed and edge emphasis is done to detect the text clusters. Further, a set of rules have been devised using morphological operators for false positive elimination and connected component analysis is performed to detect the text regions and hence text localization is performed. The experimental results obtained on publicly available standard datasets illustrate that the proposed method can detect and localize the texts of various sizes, fonts and colors.
no_new_dataset
0.953751
1502.06235
Borislav Antic
Borislav Anti\'c and Bj\"orn Ommer
Spatio-temporal Video Parsing for Abnormality Detection
15 pages, 12 figures, 3 tables
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Abnormality detection in video poses particular challenges due to the infinite size of the class of all irregular objects and behaviors. Thus no (or by far not enough) abnormal training samples are available and we need to find abnormalities in test data without actually knowing what they are. Nevertheless, the prevailing concept of the field is to directly search for individual abnormal local patches or image regions independent of another. To address this problem, we propose a method for joint detection of abnormalities in videos by spatio-temporal video parsing. The goal of video parsing is to find a set of indispensable normal spatio-temporal object hypotheses that jointly explain all the foreground of a video, while, at the same time, being supported by normal training samples. Consequently, we avoid a direct detection of abnormalities and discover them indirectly as those hypotheses which are needed for covering the foreground without finding an explanation for themselves by normal samples. Abnormalities are localized by MAP inference in a graphical model and we solve it efficiently by formulating it as a convex optimization problem. We experimentally evaluate our approach on several challenging benchmark sets, improving over the state-of-the-art on all standard benchmarks both in terms of abnormality classification and localization.
[ { "version": "v1", "created": "Sun, 22 Feb 2015 14:54:02 GMT" } ]
2015-02-24T00:00:00
[ [ "Antić", "Borislav", "" ], [ "Ommer", "Björn", "" ] ]
TITLE: Spatio-temporal Video Parsing for Abnormality Detection ABSTRACT: Abnormality detection in video poses particular challenges due to the infinite size of the class of all irregular objects and behaviors. Thus no (or by far not enough) abnormal training samples are available and we need to find abnormalities in test data without actually knowing what they are. Nevertheless, the prevailing concept of the field is to directly search for individual abnormal local patches or image regions independent of another. To address this problem, we propose a method for joint detection of abnormalities in videos by spatio-temporal video parsing. The goal of video parsing is to find a set of indispensable normal spatio-temporal object hypotheses that jointly explain all the foreground of a video, while, at the same time, being supported by normal training samples. Consequently, we avoid a direct detection of abnormalities and discover them indirectly as those hypotheses which are needed for covering the foreground without finding an explanation for themselves by normal samples. Abnormalities are localized by MAP inference in a graphical model and we solve it efficiently by formulating it as a convex optimization problem. We experimentally evaluate our approach on several challenging benchmark sets, improving over the state-of-the-art on all standard benchmarks both in terms of abnormality classification and localization.
no_new_dataset
0.951323
1502.06344
Erik Rodner
Clemens-Alexander Brust, Sven Sickert, Marcel Simon, Erik Rodner, Joachim Denzler
Convolutional Patch Networks with Spatial Prior for Road Detection and Urban Scene Understanding
VISAPP 2015 paper
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Classifying single image patches is important in many different applications, such as road detection or scene understanding. In this paper, we present convolutional patch networks, which are convolutional networks learned to distinguish different image patches and which can be used for pixel-wise labeling. We also show how to incorporate spatial information of the patch as an input to the network, which allows for learning spatial priors for certain categories jointly with an appearance model. In particular, we focus on road detection and urban scene understanding, two application areas where we are able to achieve state-of-the-art results on the KITTI as well as on the LabelMeFacade dataset. Furthermore, our paper offers a guideline for people working in the area and desperately wandering through all the painstaking details that render training CNs on image patches extremely difficult.
[ { "version": "v1", "created": "Mon, 23 Feb 2015 08:47:37 GMT" } ]
2015-02-24T00:00:00
[ [ "Brust", "Clemens-Alexander", "" ], [ "Sickert", "Sven", "" ], [ "Simon", "Marcel", "" ], [ "Rodner", "Erik", "" ], [ "Denzler", "Joachim", "" ] ]
TITLE: Convolutional Patch Networks with Spatial Prior for Road Detection and Urban Scene Understanding ABSTRACT: Classifying single image patches is important in many different applications, such as road detection or scene understanding. In this paper, we present convolutional patch networks, which are convolutional networks learned to distinguish different image patches and which can be used for pixel-wise labeling. We also show how to incorporate spatial information of the patch as an input to the network, which allows for learning spatial priors for certain categories jointly with an appearance model. In particular, we focus on road detection and urban scene understanding, two application areas where we are able to achieve state-of-the-art results on the KITTI as well as on the LabelMeFacade dataset. Furthermore, our paper offers a guideline for people working in the area and desperately wandering through all the painstaking details that render training CNs on image patches extremely difficult.
no_new_dataset
0.949342
1502.03913
Smitha M.L.
B.H. Shekar, Smitha M.L
Skeleton Matching based approach for Text Localization in Scene Images
10 pages, 8 figures, Eighth International Conference on Image and Signal Processing,Elsevier Publications,pp: 145-153, held at UVCE, Bangalore in July 2014. ISBN: 9789351072522
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we propose a skeleton matching based approach which aids in text localization in scene images. The input image is preprocessed and segmented into blocks using connected component analysis. We obtain the skeleton of the segmented block using morphology based approach. The skeletonized images are compared with the trained templates in the database to categorize into text and non-text blocks. Further, the newly designed geometrical rules and morphological operations are employed on the detected text blocks for scene text localization. The experimental results obtained on publicly available standard datasets illustrate that the proposed method can detect and localize the texts of various sizes, fonts and colors.
[ { "version": "v1", "created": "Fri, 13 Feb 2015 08:42:00 GMT" } ]
2015-02-23T00:00:00
[ [ "Shekar", "B. H.", "" ], [ "L", "Smitha M.", "" ] ]
TITLE: Skeleton Matching based approach for Text Localization in Scene Images ABSTRACT: In this paper, we propose a skeleton matching based approach which aids in text localization in scene images. The input image is preprocessed and segmented into blocks using connected component analysis. We obtain the skeleton of the segmented block using morphology based approach. The skeletonized images are compared with the trained templates in the database to categorize into text and non-text blocks. Further, the newly designed geometrical rules and morphological operations are employed on the detected text blocks for scene text localization. The experimental results obtained on publicly available standard datasets illustrate that the proposed method can detect and localize the texts of various sizes, fonts and colors.
no_new_dataset
0.956917
1502.03918
Smitha M.L.
B.H. Shekar, Smitha M.L
Gradient Difference based approach for Text Localization in Compressed domain
11 pages, Second International Conference on Emerging Research in Computing, Information, Communications and Applications, Elsevier Publications, ISBN: 9789351072638, vol. III, pp: 299-308, held at NMIT, Bangalore August 2014
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we propose a gradient difference based approach to text localization in videos and scene images. The input video frame/ image is first compressed using multilevel 2-D wavelet transform. The edge information of the reconstructed image is found which is further used for finding the maximum gradient difference between the pixels and then the boundaries of the detected text blocks are computed using zero crossing technique. We perform logical AND operation of the text blocks obtained by gradient difference and the zero crossing technique followed by connected component analysis to eliminate the false positives. Finally, the morphological dilation operation is employed on the detected text blocks for scene text localization. The experimental results obtained on publicly available standard datasets illustrate that the proposed method can detect and localize the texts of various sizes, fonts and colors.
[ { "version": "v1", "created": "Fri, 13 Feb 2015 09:08:35 GMT" } ]
2015-02-23T00:00:00
[ [ "Shekar", "B. H.", "" ], [ "L", "Smitha M.", "" ] ]
TITLE: Gradient Difference based approach for Text Localization in Compressed domain ABSTRACT: In this paper, we propose a gradient difference based approach to text localization in videos and scene images. The input video frame/ image is first compressed using multilevel 2-D wavelet transform. The edge information of the reconstructed image is found which is further used for finding the maximum gradient difference between the pixels and then the boundaries of the detected text blocks are computed using zero crossing technique. We perform logical AND operation of the text blocks obtained by gradient difference and the zero crossing technique followed by connected component analysis to eliminate the false positives. Finally, the morphological dilation operation is employed on the detected text blocks for scene text localization. The experimental results obtained on publicly available standard datasets illustrate that the proposed method can detect and localize the texts of various sizes, fonts and colors.
no_new_dataset
0.956104
1502.05925
Feng Nan
Feng Nan, Joseph Wang, Venkatesh Saligrama
Feature-Budgeted Random Forest
null
null
null
null
stat.ML cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We seek decision rules for prediction-time cost reduction, where complete data is available for training, but during prediction-time, each feature can only be acquired for an additional cost. We propose a novel random forest algorithm to minimize prediction error for a user-specified {\it average} feature acquisition budget. While random forests yield strong generalization performance, they do not explicitly account for feature costs and furthermore require low correlation among trees, which amplifies costs. Our random forest grows trees with low acquisition cost and high strength based on greedy minimax cost-weighted-impurity splits. Theoretically, we establish near-optimal acquisition cost guarantees for our algorithm. Empirically, on a number of benchmark datasets we demonstrate superior accuracy-cost curves against state-of-the-art prediction-time algorithms.
[ { "version": "v1", "created": "Fri, 20 Feb 2015 16:42:40 GMT" } ]
2015-02-23T00:00:00
[ [ "Nan", "Feng", "" ], [ "Wang", "Joseph", "" ], [ "Saligrama", "Venkatesh", "" ] ]
TITLE: Feature-Budgeted Random Forest ABSTRACT: We seek decision rules for prediction-time cost reduction, where complete data is available for training, but during prediction-time, each feature can only be acquired for an additional cost. We propose a novel random forest algorithm to minimize prediction error for a user-specified {\it average} feature acquisition budget. While random forests yield strong generalization performance, they do not explicitly account for feature costs and furthermore require low correlation among trees, which amplifies costs. Our random forest grows trees with low acquisition cost and high strength based on greedy minimax cost-weighted-impurity splits. Theoretically, we establish near-optimal acquisition cost guarantees for our algorithm. Empirically, on a number of benchmark datasets we demonstrate superior accuracy-cost curves against state-of-the-art prediction-time algorithms.
no_new_dataset
0.945197
1502.04272
Alex James Dr
Joshin John Mathew and Alex Pappachen James
Spatial Stimuli Gradient Sketch Model
accepted for publication in IEEE Signal Processing Letters, 2015
Volume: 22 Issue: 9 On page(s): 1336-1339, 2015
10.1109/LSP.2015.2404827
null
cs.CV
http://creativecommons.org/licenses/by-nc-sa/3.0/
The inability of automated edge detection methods inspired from primal sketch models to accurately calculate object edges under the influence of pixel noise is an open problem. Extending the principles of image perception i.e. Weber-Fechner law, and Sheperd similarity law, we propose a new edge detection method and formulation that use perceived brightness and neighbourhood similarity calculations in the determination of robust object edges. The robustness of the detected edges is benchmark against Sobel, SIS, Kirsch, and Prewitt edge detection methods in an example face recognition problem showing statistically significant improvement in recognition accuracy and pixel noise tolerance.
[ { "version": "v1", "created": "Sun, 15 Feb 2015 02:42:56 GMT" } ]
2015-02-20T00:00:00
[ [ "Mathew", "Joshin John", "" ], [ "James", "Alex Pappachen", "" ] ]
TITLE: Spatial Stimuli Gradient Sketch Model ABSTRACT: The inability of automated edge detection methods inspired from primal sketch models to accurately calculate object edges under the influence of pixel noise is an open problem. Extending the principles of image perception i.e. Weber-Fechner law, and Sheperd similarity law, we propose a new edge detection method and formulation that use perceived brightness and neighbourhood similarity calculations in the determination of robust object edges. The robustness of the detected edges is benchmark against Sobel, SIS, Kirsch, and Prewitt edge detection methods in an example face recognition problem showing statistically significant improvement in recognition accuracy and pixel noise tolerance.
no_new_dataset
0.951908
1502.05461
Carl Vondrick
Carl Vondrick, Aditya Khosla, Hamed Pirsiavash, Tomasz Malisiewicz, Antonio Torralba
Visualizing Object Detection Features
In submission to IJCV
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce algorithms to visualize feature spaces used by object detectors. Our method works by inverting a visual feature back to multiple natural images. We found that these visualizations allow us to analyze object detection systems in new ways and gain new insight into the detector's failures. For example, when we visualize the features for high scoring false alarms, we discovered that, although they are clearly wrong in image space, they do look deceptively similar to true positives in feature space. This result suggests that many of these false alarms are caused by our choice of feature space, and supports that creating a better learning algorithm or building bigger datasets is unlikely to correct these errors. By visualizing feature spaces, we can gain a more intuitive understanding of recognition systems.
[ { "version": "v1", "created": "Thu, 19 Feb 2015 04:11:14 GMT" } ]
2015-02-20T00:00:00
[ [ "Vondrick", "Carl", "" ], [ "Khosla", "Aditya", "" ], [ "Pirsiavash", "Hamed", "" ], [ "Malisiewicz", "Tomasz", "" ], [ "Torralba", "Antonio", "" ] ]
TITLE: Visualizing Object Detection Features ABSTRACT: We introduce algorithms to visualize feature spaces used by object detectors. Our method works by inverting a visual feature back to multiple natural images. We found that these visualizations allow us to analyze object detection systems in new ways and gain new insight into the detector's failures. For example, when we visualize the features for high scoring false alarms, we discovered that, although they are clearly wrong in image space, they do look deceptively similar to true positives in feature space. This result suggests that many of these false alarms are caused by our choice of feature space, and supports that creating a better learning algorithm or building bigger datasets is unlikely to correct these errors. By visualizing feature spaces, we can gain a more intuitive understanding of recognition systems.
no_new_dataset
0.951729