id
large_stringlengths 9
16
| submitter
large_stringlengths 3
64
⌀ | authors
large_stringlengths 5
20.7k
| title
large_stringlengths 5
245
| comments
large_stringlengths 1
482
⌀ | journal-ref
large_stringlengths 4
382
⌀ | doi
large_stringlengths 9
151
⌀ | report-no
large_stringlengths 2
509
⌀ | categories
large_stringlengths 5
78
| license
large_stringclasses 9
values | abstract
large_stringlengths 83
3.55k
| versions
large listlengths 1
21
| update_date
timestamp[ms]date 2007-05-23 00:00:00
2025-04-25 00:00:00
| authors_parsed
large listlengths 1
1.35k
| prompt
large_stringlengths 166
3.64k
| label
stringclasses 2
values | prob
float64 0.5
0.98
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1001.0592 | Georgios Zervas | John W. Byers, Michael Mitzenmacher, Georgios Zervas | Information Asymmetries in Pay-Per-Bid Auctions: How Swoopo Makes Bank | 48 pages, 21 figures | null | null | null | cs.GT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Innovative auction methods can be exploited to increase profits, with
Shubik's famous "dollar auction" perhaps being the most widely known example.
Recently, some mainstream e-commerce web sites have apparently achieved the
same end on a much broader scale, by using "pay-per-bid" auctions to sell
items, from video games to bars of gold. In these auctions, bidders incur a
cost for placing each bid in addition to (or sometimes in lieu of) the winner's
final purchase cost. Thus even when a winner's purchase cost is a small
fraction of the item's intrinsic value, the auctioneer can still profit
handsomely from the bid fees. Our work provides novel analyses for these
auctions, based on both modeling and datasets derived from auctions at
Swoopo.com, the leading pay-per-bid auction site. While previous modeling work
predicts profit-free equilibria, we analyze the impact of information asymmetry
broadly, as well as Swoopo features such as bidpacks and the Swoop It Now
option specifically, to quantify the effects of imperfect information in these
auctions. We find that even small asymmetries across players (cheaper bids,
better estimates of other players' intent, different valuations of items,
committed players willing to play "chicken") can increase the auction duration
well beyond that predicted by previous work and thus skew the auctioneer's
profit disproportionately. Finally, we discuss our findings in the context of a
dataset of thousands of live auctions we observed on Swoopo, which enables us
also to examine behavioral factors, such as the power of aggressive bidding.
Ultimately, our findings show that even with fully rational players, if players
overlook or are unaware any of these factors, the result is outsized profits
for pay-per-bid auctioneers.
| [
{
"version": "v1",
"created": "Tue, 5 Jan 2010 16:31:06 GMT"
},
{
"version": "v2",
"created": "Wed, 13 Jan 2010 19:58:07 GMT"
},
{
"version": "v3",
"created": "Tue, 30 Mar 2010 21:51:26 GMT"
}
] | 2015-03-13T00:00:00 | [
[
"Byers",
"John W.",
""
],
[
"Mitzenmacher",
"Michael",
""
],
[
"Zervas",
"Georgios",
""
]
] | TITLE: Information Asymmetries in Pay-Per-Bid Auctions: How Swoopo Makes Bank
ABSTRACT: Innovative auction methods can be exploited to increase profits, with
Shubik's famous "dollar auction" perhaps being the most widely known example.
Recently, some mainstream e-commerce web sites have apparently achieved the
same end on a much broader scale, by using "pay-per-bid" auctions to sell
items, from video games to bars of gold. In these auctions, bidders incur a
cost for placing each bid in addition to (or sometimes in lieu of) the winner's
final purchase cost. Thus even when a winner's purchase cost is a small
fraction of the item's intrinsic value, the auctioneer can still profit
handsomely from the bid fees. Our work provides novel analyses for these
auctions, based on both modeling and datasets derived from auctions at
Swoopo.com, the leading pay-per-bid auction site. While previous modeling work
predicts profit-free equilibria, we analyze the impact of information asymmetry
broadly, as well as Swoopo features such as bidpacks and the Swoop It Now
option specifically, to quantify the effects of imperfect information in these
auctions. We find that even small asymmetries across players (cheaper bids,
better estimates of other players' intent, different valuations of items,
committed players willing to play "chicken") can increase the auction duration
well beyond that predicted by previous work and thus skew the auctioneer's
profit disproportionately. Finally, we discuss our findings in the context of a
dataset of thousands of live auctions we observed on Swoopo, which enables us
also to examine behavioral factors, such as the power of aggressive bidding.
Ultimately, our findings show that even with fully rational players, if players
overlook or are unaware any of these factors, the result is outsized profits
for pay-per-bid auctioneers.
| no_new_dataset | 0.842669 |
1003.5956 | Lihong Li | Lihong Li and Wei Chu and John Langford and Xuanhui Wang | Unbiased Offline Evaluation of Contextual-bandit-based News Article
Recommendation Algorithms | 10 pages, 7 figures, revised from the published version at the WSDM
2011 conference | null | 10.1145/1935826.1935878 | null | cs.LG cs.AI cs.RO stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Contextual bandit algorithms have become popular for online recommendation
systems such as Digg, Yahoo! Buzz, and news recommendation in general.
\emph{Offline} evaluation of the effectiveness of new algorithms in these
applications is critical for protecting online user experiences but very
challenging due to their "partial-label" nature. Common practice is to create a
simulator which simulates the online environment for the problem at hand and
then run an algorithm against this simulator. However, creating simulator
itself is often difficult and modeling bias is usually unavoidably introduced.
In this paper, we introduce a \emph{replay} methodology for contextual bandit
algorithm evaluation. Different from simulator-based approaches, our method is
completely data-driven and very easy to adapt to different applications. More
importantly, our method can provide provably unbiased evaluations. Our
empirical results on a large-scale news article recommendation dataset
collected from Yahoo! Front Page conform well with our theoretical results.
Furthermore, comparisons between our offline replay and online bucket
evaluation of several contextual bandit algorithms show accuracy and
effectiveness of our offline evaluation method.
| [
{
"version": "v1",
"created": "Wed, 31 Mar 2010 01:20:07 GMT"
},
{
"version": "v2",
"created": "Thu, 1 Mar 2012 23:33:07 GMT"
}
] | 2015-03-13T00:00:00 | [
[
"Li",
"Lihong",
""
],
[
"Chu",
"Wei",
""
],
[
"Langford",
"John",
""
],
[
"Wang",
"Xuanhui",
""
]
] | TITLE: Unbiased Offline Evaluation of Contextual-bandit-based News Article
Recommendation Algorithms
ABSTRACT: Contextual bandit algorithms have become popular for online recommendation
systems such as Digg, Yahoo! Buzz, and news recommendation in general.
\emph{Offline} evaluation of the effectiveness of new algorithms in these
applications is critical for protecting online user experiences but very
challenging due to their "partial-label" nature. Common practice is to create a
simulator which simulates the online environment for the problem at hand and
then run an algorithm against this simulator. However, creating simulator
itself is often difficult and modeling bias is usually unavoidably introduced.
In this paper, we introduce a \emph{replay} methodology for contextual bandit
algorithm evaluation. Different from simulator-based approaches, our method is
completely data-driven and very easy to adapt to different applications. More
importantly, our method can provide provably unbiased evaluations. Our
empirical results on a large-scale news article recommendation dataset
collected from Yahoo! Front Page conform well with our theoretical results.
Furthermore, comparisons between our offline replay and online bucket
evaluation of several contextual bandit algorithms show accuracy and
effectiveness of our offline evaluation method.
| no_new_dataset | 0.947527 |
1110.3655 | Jorge Silva L | Jorge Luiz e Silva and Joelmir Jose Lopes and Bruno de Abreu Silva and
Antonio Carlos Fernandes da Silva | Accelerating Algorithms using a Dataflow Graph in a Reconfigurable
System | 13 pages, 8 figures, 1 listing, 1 algorithm, 1 Table | null | null | null | cs.AR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, the acceleration of algorithms using a design of a field
programmable gate array (FPGA) as a prototype of a static dataflow architecture
is discussed. The static dataflow architecture using operators interconnected
by parallel buses was implemented. Accelerating algorithms using a dataflow
graph in a reconfigurable system shows the potential for high computation
rates. The results of benchmarks implemented using the static dataflow
architecture are reported at the end of this paper.
| [
{
"version": "v1",
"created": "Mon, 17 Oct 2011 13:00:10 GMT"
}
] | 2015-03-13T00:00:00 | [
[
"Silva",
"Jorge Luiz e",
""
],
[
"Lopes",
"Joelmir Jose",
""
],
[
"Silva",
"Bruno de Abreu",
""
],
[
"da Silva",
"Antonio Carlos Fernandes",
""
]
] | TITLE: Accelerating Algorithms using a Dataflow Graph in a Reconfigurable
System
ABSTRACT: In this paper, the acceleration of algorithms using a design of a field
programmable gate array (FPGA) as a prototype of a static dataflow architecture
is discussed. The static dataflow architecture using operators interconnected
by parallel buses was implemented. Accelerating algorithms using a dataflow
graph in a reconfigurable system shows the potential for high computation
rates. The results of benchmarks implemented using the static dataflow
architecture are reported at the end of this paper.
| no_new_dataset | 0.942029 |
1111.4930 | Arka Ghosh | Arka Ghosh | Comparative study of Financial Time Series Prediction by Artificial
Neural Network with Gradient Descent Learning | null | International Journal Of Scientific & Engineering Research
ISSN-2229-5518 Volume 3 Issue 1 January2012 | null | null | cs.NE cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Financial forecasting is an example of a signal processing problem which is
challenging due to Small sample sizes, high noise, non-stationarity, and
non-linearity,but fast forecasting of stock market price is very important for
strategic business planning.Present study is aimed to develop a comparative
predictive model with Feedforward Multilayer Artificial Neural Network &
Recurrent Time Delay Neural Network for the Financial Timeseries
Prediction.This study is developed with the help of historical stockprice
dataset made available by GoogleFinance.To develop this prediction model
Backpropagation method with Gradient Descent learning has been
implemented.Finally the Neural Net, learned with said algorithm is found to be
skillful predictor for non-stationary noisy Financial Timeseries.
| [
{
"version": "v1",
"created": "Mon, 21 Nov 2011 16:58:58 GMT"
},
{
"version": "v2",
"created": "Tue, 31 Jan 2012 08:09:57 GMT"
}
] | 2015-03-13T00:00:00 | [
[
"Ghosh",
"Arka",
""
]
] | TITLE: Comparative study of Financial Time Series Prediction by Artificial
Neural Network with Gradient Descent Learning
ABSTRACT: Financial forecasting is an example of a signal processing problem which is
challenging due to Small sample sizes, high noise, non-stationarity, and
non-linearity,but fast forecasting of stock market price is very important for
strategic business planning.Present study is aimed to develop a comparative
predictive model with Feedforward Multilayer Artificial Neural Network &
Recurrent Time Delay Neural Network for the Financial Timeseries
Prediction.This study is developed with the help of historical stockprice
dataset made available by GoogleFinance.To develop this prediction model
Backpropagation method with Gradient Descent learning has been
implemented.Finally the Neural Net, learned with said algorithm is found to be
skillful predictor for non-stationary noisy Financial Timeseries.
| no_new_dataset | 0.944944 |
1202.2518 | Liang Wang | Wang Liang | Segmenting DNA sequence into `words' | 12 pages,2 figures | null | null | null | q-bio.GN cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper presents a novel method to segment/decode DNA sequences based on
n-grams statistical language model. Firstly, we find the length of most DNA
'words' is 12 to 15 bps by analyzing the genomes of 12 model species. Then we
design an unsupervised probability based approach to segment the DNA sequences.
The benchmark of segmenting method is also proposed.
| [
{
"version": "v1",
"created": "Sun, 12 Feb 2012 11:23:38 GMT"
},
{
"version": "v2",
"created": "Thu, 23 Feb 2012 02:39:32 GMT"
},
{
"version": "v3",
"created": "Tue, 2 Oct 2012 12:49:43 GMT"
},
{
"version": "v4",
"created": "Sat, 22 Jun 2013 10:14:11 GMT"
}
] | 2015-03-13T00:00:00 | [
[
"Liang",
"Wang",
""
]
] | TITLE: Segmenting DNA sequence into `words'
ABSTRACT: This paper presents a novel method to segment/decode DNA sequences based on
n-grams statistical language model. Firstly, we find the length of most DNA
'words' is 12 to 15 bps by analyzing the genomes of 12 model species. Then we
design an unsupervised probability based approach to segment the DNA sequences.
The benchmark of segmenting method is also proposed.
| no_new_dataset | 0.949809 |
1202.3884 | Dinesh Dileep Gaurav | Dinesh Dileep Gaurav and Renu Ramesh | A feature extraction technique based on character geometry for character
recognition | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper describes a geometry based technique for feature extraction
applicable to segmentation-based word recognition systems. The proposed system
extracts the geometric features of the character contour. This features are
based on the basic line types that forms the character skeleton. The system
gives a feature vector as its output. The feature vectors so generated from a
training set, were then used to train a pattern recognition engine based on
Neural Networks so that the system can be benchmarked.
| [
{
"version": "v1",
"created": "Fri, 17 Feb 2012 11:41:28 GMT"
}
] | 2015-03-13T00:00:00 | [
[
"Gaurav",
"Dinesh Dileep",
""
],
[
"Ramesh",
"Renu",
""
]
] | TITLE: A feature extraction technique based on character geometry for character
recognition
ABSTRACT: This paper describes a geometry based technique for feature extraction
applicable to segmentation-based word recognition systems. The proposed system
extracts the geometric features of the character contour. This features are
based on the basic line types that forms the character skeleton. The system
gives a feature vector as its output. The feature vectors so generated from a
training set, were then used to train a pattern recognition engine based on
Neural Networks so that the system can be benchmarked.
| no_new_dataset | 0.954223 |
1207.4570 | Farzad Parseh | Farzad Parseh, Davood Karimzadgan Moghaddam, Mir Mohsen Pedram,
Rohollah Esmaeli Manesh, Mohammad (behdad) Jamshidi | Presentation an Approach for Optimization of Semantic Web Language Based
on the Document Structure | 7 pages, 8 figures, 2 Tables | IJCSI International Journal of Computer Science Issues, Vol. 9,
Issue 3, No 1, May 2012 ISSN (Online): 1694-0814 | null | null | cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Pattern tree are based on integrated rules which are equal to a combination
of some points connected to each other in a hierarchical structure, called
Enquiry Hierarchical (EH). The main operation in pattern enquiry seeking is to
locate the steps that match the given EH in the dataset. A point of algorithms
has offered for EH matching; but the majority of this algorithms seeks all of
the enquiry steps to access all EHs in the dataset. A few algorithms such as
seek only steps that satisfy end points of EH. All of above algorithms are
trying to locate a way just for investigating direct testing of steps and to
locate the answer of enquiry, directly via these points. In this paper, we
describe a novel algorithm to locate the answer of enquiry without access to
real point of the dataset blindly. In this algorithm, first, the enquiry will
be executed on enquiry schema and this leads to a schema. Using this plan, it
will be clear how to seek end steps and how to achieve enquiry dataset, before
seeking of the dataset steps. Therefore, none of dataset steps will be seek
blindly.
| [
{
"version": "v1",
"created": "Thu, 19 Jul 2012 07:14:15 GMT"
},
{
"version": "v2",
"created": "Sat, 21 Jul 2012 05:05:20 GMT"
}
] | 2015-03-13T00:00:00 | [
[
"Parseh",
"Farzad",
"",
"behdad"
],
[
"Moghaddam",
"Davood Karimzadgan",
"",
"behdad"
],
[
"Pedram",
"Mir Mohsen",
"",
"behdad"
],
[
"Manesh",
"Rohollah Esmaeli",
"",
"behdad"
],
[
"Mohammad",
"",
"",
"behdad"
],
[
"Jamshidi",
"",
""
]
] | TITLE: Presentation an Approach for Optimization of Semantic Web Language Based
on the Document Structure
ABSTRACT: Pattern tree are based on integrated rules which are equal to a combination
of some points connected to each other in a hierarchical structure, called
Enquiry Hierarchical (EH). The main operation in pattern enquiry seeking is to
locate the steps that match the given EH in the dataset. A point of algorithms
has offered for EH matching; but the majority of this algorithms seeks all of
the enquiry steps to access all EHs in the dataset. A few algorithms such as
seek only steps that satisfy end points of EH. All of above algorithms are
trying to locate a way just for investigating direct testing of steps and to
locate the answer of enquiry, directly via these points. In this paper, we
describe a novel algorithm to locate the answer of enquiry without access to
real point of the dataset blindly. In this algorithm, first, the enquiry will
be executed on enquiry schema and this leads to a schema. Using this plan, it
will be clear how to seek end steps and how to achieve enquiry dataset, before
seeking of the dataset steps. Therefore, none of dataset steps will be seek
blindly.
| no_new_dataset | 0.941439 |
1208.4809 | Husnabad Venkateswara Reddy | H. Venkateswara Reddy, Dr.S.Viswanadha Raju, B.Ramasubba Reddy | Comparing N-Node Set Importance Representative results with Node
Importance Representative results for Categorical Clustering: An exploratory
study | 16 pages, 4 figures, 3 equations | null | null | null | cs.DB | http://creativecommons.org/licenses/by/3.0/ | The proportionate increase in the size of the data with increase in space
implies that clustering a very large data set becomes difficult and is a time
consuming process.Sampling is one important technique to scale down the size of
dataset and to improve the efficiency of clustering. After sampling allocating
unlabeled objects into proper clusters is impossible in the categorical
domain.To address the problem, Chen employed a method called MAximal
Representative Data Labeling to allocate each unlabeled data point to the
appropriate cluster based on Node Importance Representative and N-Node
Importance Representative algorithms. This paper took off from Chen s
investigation and analyzed and compared the results of NIR and NNIR leading to
the conclusion that the two processes contradict each other when it comes to
finding the resemblance between an unlabeled data point and a cluster.A new and
better way of solving the problem was arrived at that finds resemblance between
unlabeled data point within all clusters, while also providing maximal
resemblance for allocation of data in the required cluster.
| [
{
"version": "v1",
"created": "Thu, 23 Aug 2012 17:32:32 GMT"
}
] | 2015-03-13T00:00:00 | [
[
"Reddy",
"H. Venkateswara",
""
],
[
"Raju",
"Dr. S. Viswanadha",
""
],
[
"Reddy",
"B. Ramasubba",
""
]
] | TITLE: Comparing N-Node Set Importance Representative results with Node
Importance Representative results for Categorical Clustering: An exploratory
study
ABSTRACT: The proportionate increase in the size of the data with increase in space
implies that clustering a very large data set becomes difficult and is a time
consuming process.Sampling is one important technique to scale down the size of
dataset and to improve the efficiency of clustering. After sampling allocating
unlabeled objects into proper clusters is impossible in the categorical
domain.To address the problem, Chen employed a method called MAximal
Representative Data Labeling to allocate each unlabeled data point to the
appropriate cluster based on Node Importance Representative and N-Node
Importance Representative algorithms. This paper took off from Chen s
investigation and analyzed and compared the results of NIR and NNIR leading to
the conclusion that the two processes contradict each other when it comes to
finding the resemblance between an unlabeled data point and a cluster.A new and
better way of solving the problem was arrived at that finds resemblance between
unlabeled data point within all clusters, while also providing maximal
resemblance for allocation of data in the required cluster.
| no_new_dataset | 0.955194 |
1209.1983 | Frank Meyer | Frank Meyer, Fran\c{c}oise Fessant, Fabrice Cl\'erot, Eric Gaussier | Toward a New Protocol to Evaluate Recommender Systems | 6 pages. arXiv admin note: text overlap with arXiv:1203.4487 | null | null | null | cs.IR cs.PF | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we propose an approach to analyze the performance and the
added value of automatic recommender systems in an industrial context. We show
that recommender systems are multifaceted and can be organized around 4
structuring functions: help users to decide, help users to compare, help users
to discover, help users to explore. A global off line protocol is then proposed
to evaluate recommender systems. This protocol is based on the definition of
appropriate evaluation measures for each aforementioned function. The
evaluation protocol is discussed from the perspective of the usefulness and
trust of the recommendation. A new measure called Average Measure of Impact is
introduced. This measure evaluates the impact of the personalized
recommendation. We experiment with two classical methods, K-Nearest Neighbors
(KNN) and Matrix Factorization (MF), using the well known dataset: Netflix. A
segmentation of both users and items is proposed to finely analyze where the
algorithms perform well or badly. We show that the performance is strongly
dependent on the segments and that there is no clear correlation between the
RMSE and the quality of the recommendation.
| [
{
"version": "v1",
"created": "Mon, 10 Sep 2012 13:27:23 GMT"
}
] | 2015-03-13T00:00:00 | [
[
"Meyer",
"Frank",
""
],
[
"Fessant",
"Françoise",
""
],
[
"Clérot",
"Fabrice",
""
],
[
"Gaussier",
"Eric",
""
]
] | TITLE: Toward a New Protocol to Evaluate Recommender Systems
ABSTRACT: In this paper, we propose an approach to analyze the performance and the
added value of automatic recommender systems in an industrial context. We show
that recommender systems are multifaceted and can be organized around 4
structuring functions: help users to decide, help users to compare, help users
to discover, help users to explore. A global off line protocol is then proposed
to evaluate recommender systems. This protocol is based on the definition of
appropriate evaluation measures for each aforementioned function. The
evaluation protocol is discussed from the perspective of the usefulness and
trust of the recommendation. A new measure called Average Measure of Impact is
introduced. This measure evaluates the impact of the personalized
recommendation. We experiment with two classical methods, K-Nearest Neighbors
(KNN) and Matrix Factorization (MF), using the well known dataset: Netflix. A
segmentation of both users and items is proposed to finely analyze where the
algorithms perform well or badly. We show that the performance is strongly
dependent on the segments and that there is no clear correlation between the
RMSE and the quality of the recommendation.
| no_new_dataset | 0.940953 |
1211.6496 | Naushad UzZaman Naushad UzZaman | Naushad UzZaman, Roi Blanco, Michael Matthews | TwitterPaul: Extracting and Aggregating Twitter Predictions | Check out the blog post with a summary and Prediction Retrieval
information here: http://bitly.com/TwitterPaul | null | null | null | cs.SI cs.AI physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper introduces TwitterPaul, a system designed to make use of Social
Media data to help to predict game outcomes for the 2010 FIFA World Cup
tournament. To this end, we extracted over 538K mentions to football games from
a large sample of tweets that occurred during the World Cup, and we classified
into different types with a precision of up to 88%. The different mentions were
aggregated in order to make predictions about the outcomes of the actual games.
We attempt to learn which Twitter users are accurate predictors and explore
several techniques in order to exploit this information to make more accurate
predictions. We compare our results to strong baselines and against the betting
line (prediction market) and found that the quality of extractions is more
important than the quantity, suggesting that high precision methods working on
a medium-sized dataset are preferable over low precision methods that use a
larger amount of data. Finally, by aggregating some classes of predictions, the
system performance is close to the one of the betting line. Furthermore, we
believe that this domain independent framework can help to predict other
sports, elections, product release dates and other future events that people
talk about in social media.
| [
{
"version": "v1",
"created": "Wed, 28 Nov 2012 01:33:21 GMT"
},
{
"version": "v2",
"created": "Fri, 30 Nov 2012 16:55:53 GMT"
}
] | 2015-03-13T00:00:00 | [
[
"UzZaman",
"Naushad",
""
],
[
"Blanco",
"Roi",
""
],
[
"Matthews",
"Michael",
""
]
] | TITLE: TwitterPaul: Extracting and Aggregating Twitter Predictions
ABSTRACT: This paper introduces TwitterPaul, a system designed to make use of Social
Media data to help to predict game outcomes for the 2010 FIFA World Cup
tournament. To this end, we extracted over 538K mentions to football games from
a large sample of tweets that occurred during the World Cup, and we classified
into different types with a precision of up to 88%. The different mentions were
aggregated in order to make predictions about the outcomes of the actual games.
We attempt to learn which Twitter users are accurate predictors and explore
several techniques in order to exploit this information to make more accurate
predictions. We compare our results to strong baselines and against the betting
line (prediction market) and found that the quality of extractions is more
important than the quantity, suggesting that high precision methods working on
a medium-sized dataset are preferable over low precision methods that use a
larger amount of data. Finally, by aggregating some classes of predictions, the
system performance is close to the one of the betting line. Furthermore, we
believe that this domain independent framework can help to predict other
sports, elections, product release dates and other future events that people
talk about in social media.
| no_new_dataset | 0.951323 |
1303.6163 | Juan Nunez-Iglesias | Juan Nunez-Iglesias, Ryan Kennedy, Toufiq Parag, Jianbo Shi, Dmitri B.
Chklovskii | Machine learning of hierarchical clustering to segment 2D and 3D images | 15 pages, 8 figures | PLoS ONE, 2013, 8(8): e71715 | 10.1371/journal.pone.0071715 | null | cs.CV cs.LG | http://creativecommons.org/licenses/by/3.0/ | We aim to improve segmentation through the use of machine learning tools
during region agglomeration. We propose an active learning approach for
performing hierarchical agglomerative segmentation from superpixels. Our method
combines multiple features at all scales of the agglomerative process, works
for data with an arbitrary number of dimensions, and scales to very large
datasets. We advocate the use of variation of information to measure
segmentation accuracy, particularly in 3D electron microscopy (EM) images of
neural tissue, and using this metric demonstrate an improvement over competing
algorithms in EM and natural images.
| [
{
"version": "v1",
"created": "Mon, 25 Mar 2013 15:20:09 GMT"
},
{
"version": "v2",
"created": "Mon, 13 May 2013 17:37:05 GMT"
},
{
"version": "v3",
"created": "Tue, 23 Jul 2013 11:15:25 GMT"
}
] | 2015-03-13T00:00:00 | [
[
"Nunez-Iglesias",
"Juan",
""
],
[
"Kennedy",
"Ryan",
""
],
[
"Parag",
"Toufiq",
""
],
[
"Shi",
"Jianbo",
""
],
[
"Chklovskii",
"Dmitri B.",
""
]
] | TITLE: Machine learning of hierarchical clustering to segment 2D and 3D images
ABSTRACT: We aim to improve segmentation through the use of machine learning tools
during region agglomeration. We propose an active learning approach for
performing hierarchical agglomerative segmentation from superpixels. Our method
combines multiple features at all scales of the agglomerative process, works
for data with an arbitrary number of dimensions, and scales to very large
datasets. We advocate the use of variation of information to measure
segmentation accuracy, particularly in 3D electron microscopy (EM) images of
neural tissue, and using this metric demonstrate an improvement over competing
algorithms in EM and natural images.
| no_new_dataset | 0.953837 |
1501.02598 | Angeliki Lazaridou | Angeliki Lazaridou, Nghia The Pham, Marco Baroni | Combining Language and Vision with a Multimodal Skip-gram Model | accepted at NAACL 2015, camera ready version, 11 pages | null | null | null | cs.CL cs.CV cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We extend the SKIP-GRAM model of Mikolov et al. (2013a) by taking visual
information into account. Like SKIP-GRAM, our multimodal models (MMSKIP-GRAM)
build vector-based word representations by learning to predict linguistic
contexts in text corpora. However, for a restricted set of words, the models
are also exposed to visual representations of the objects they denote
(extracted from natural images), and must predict linguistic and visual
features jointly. The MMSKIP-GRAM models achieve good performance on a variety
of semantic benchmarks. Moreover, since they propagate visual information to
all words, we use them to improve image labeling and retrieval in the zero-shot
setup, where the test concepts are never seen during model training. Finally,
the MMSKIP-GRAM models discover intriguing visual properties of abstract words,
paving the way to realistic implementations of embodied theories of meaning.
| [
{
"version": "v1",
"created": "Mon, 12 Jan 2015 10:48:32 GMT"
},
{
"version": "v2",
"created": "Tue, 13 Jan 2015 09:37:08 GMT"
},
{
"version": "v3",
"created": "Thu, 12 Mar 2015 09:47:33 GMT"
}
] | 2015-03-13T00:00:00 | [
[
"Lazaridou",
"Angeliki",
""
],
[
"Pham",
"Nghia The",
""
],
[
"Baroni",
"Marco",
""
]
] | TITLE: Combining Language and Vision with a Multimodal Skip-gram Model
ABSTRACT: We extend the SKIP-GRAM model of Mikolov et al. (2013a) by taking visual
information into account. Like SKIP-GRAM, our multimodal models (MMSKIP-GRAM)
build vector-based word representations by learning to predict linguistic
contexts in text corpora. However, for a restricted set of words, the models
are also exposed to visual representations of the objects they denote
(extracted from natural images), and must predict linguistic and visual
features jointly. The MMSKIP-GRAM models achieve good performance on a variety
of semantic benchmarks. Moreover, since they propagate visual information to
all words, we use them to improve image labeling and retrieval in the zero-shot
setup, where the test concepts are never seen during model training. Finally,
the MMSKIP-GRAM models discover intriguing visual properties of abstract words,
paving the way to realistic implementations of embodied theories of meaning.
| no_new_dataset | 0.943452 |
1503.03506 | Christian Wachinger | Christian Wachinger and Polina Golland | Diverse Landmark Sampling from Determinantal Point Processes for
Scalable Manifold Learning | null | null | null | null | cs.LG cs.AI cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | High computational costs of manifold learning prohibit its application for
large point sets. A common strategy to overcome this problem is to perform
dimensionality reduction on selected landmarks and to successively embed the
entire dataset with the Nystr\"om method. The two main challenges that arise
are: (i) the landmarks selected in non-Euclidean geometries must result in a
low reconstruction error, (ii) the graph constructed from sparsely sampled
landmarks must approximate the manifold well. We propose the sampling of
landmarks from determinantal distributions on non-Euclidean spaces. Since
current determinantal sampling algorithms have the same complexity as those for
manifold learning, we present an efficient approximation running in linear
time. Further, we recover the local geometry after the sparsification by
assigning each landmark a local covariance matrix, estimated from the original
point set. The resulting neighborhood selection based on the Bhattacharyya
distance improves the embedding of sparsely sampled manifolds. Our experiments
show a significant performance improvement compared to state-of-the-art
landmark selection techniques.
| [
{
"version": "v1",
"created": "Wed, 11 Mar 2015 21:09:28 GMT"
}
] | 2015-03-13T00:00:00 | [
[
"Wachinger",
"Christian",
""
],
[
"Golland",
"Polina",
""
]
] | TITLE: Diverse Landmark Sampling from Determinantal Point Processes for
Scalable Manifold Learning
ABSTRACT: High computational costs of manifold learning prohibit its application for
large point sets. A common strategy to overcome this problem is to perform
dimensionality reduction on selected landmarks and to successively embed the
entire dataset with the Nystr\"om method. The two main challenges that arise
are: (i) the landmarks selected in non-Euclidean geometries must result in a
low reconstruction error, (ii) the graph constructed from sparsely sampled
landmarks must approximate the manifold well. We propose the sampling of
landmarks from determinantal distributions on non-Euclidean spaces. Since
current determinantal sampling algorithms have the same complexity as those for
manifold learning, we present an efficient approximation running in linear
time. Further, we recover the local geometry after the sparsification by
assigning each landmark a local covariance matrix, estimated from the original
point set. The resulting neighborhood selection based on the Bhattacharyya
distance improves the embedding of sparsely sampled manifolds. Our experiments
show a significant performance improvement compared to state-of-the-art
landmark selection techniques.
| no_new_dataset | 0.951006 |
1503.03524 | Mohamed Kafsi | Mohamed Kafsi, Henriette Cramer, Bart Thomee and David A. Shamma | Describing and Understanding Neighborhood Characteristics through Online
Social Media | Accepted in WWW 2015, 2015, Florence, Italy | null | 10.1145/2736277.2741133 | ACM 978-1-4503-3469-3/15/05 | stat.ML cs.SI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Geotagged data can be used to describe regions in the world and discover
local themes. However, not all data produced within a region is necessarily
specifically descriptive of that area. To surface the content that is
characteristic for a region, we present the geographical hierarchy model (GHM),
a probabilistic model based on the assumption that data observed in a region is
a random mixture of content that pertains to different levels of a hierarchy.
We apply the GHM to a dataset of 8 million Flickr photos in order to
discriminate between content (i.e., tags) that specifically characterizes a
region (e.g., neighborhood) and content that characterizes surrounding areas or
more general themes. Knowledge of the discriminative and non-discriminative
terms used throughout the hierarchy enables us to quantify the uniqueness of a
given region and to compare similar but distant regions. Our evaluation
demonstrates that our model improves upon traditional Naive Bayes
classification by 47% and hierarchical TF-IDF by 27%. We further highlight the
differences and commonalities with human reasoning about what is locally
characteristic for a neighborhood, distilled from ten interviews and a survey
that covered themes such as time, events, and prior regional knowledge
| [
{
"version": "v1",
"created": "Wed, 11 Mar 2015 22:13:38 GMT"
}
] | 2015-03-13T00:00:00 | [
[
"Kafsi",
"Mohamed",
""
],
[
"Cramer",
"Henriette",
""
],
[
"Thomee",
"Bart",
""
],
[
"Shamma",
"David A.",
""
]
] | TITLE: Describing and Understanding Neighborhood Characteristics through Online
Social Media
ABSTRACT: Geotagged data can be used to describe regions in the world and discover
local themes. However, not all data produced within a region is necessarily
specifically descriptive of that area. To surface the content that is
characteristic for a region, we present the geographical hierarchy model (GHM),
a probabilistic model based on the assumption that data observed in a region is
a random mixture of content that pertains to different levels of a hierarchy.
We apply the GHM to a dataset of 8 million Flickr photos in order to
discriminate between content (i.e., tags) that specifically characterizes a
region (e.g., neighborhood) and content that characterizes surrounding areas or
more general themes. Knowledge of the discriminative and non-discriminative
terms used throughout the hierarchy enables us to quantify the uniqueness of a
given region and to compare similar but distant regions. Our evaluation
demonstrates that our model improves upon traditional Naive Bayes
classification by 47% and hierarchical TF-IDF by 27%. We further highlight the
differences and commonalities with human reasoning about what is locally
characteristic for a neighborhood, distilled from ten interviews and a survey
that covered themes such as time, events, and prior regional knowledge
| no_new_dataset | 0.947817 |
1503.03607 | Najva Izadpanah | Najva Izadpanah | A divisive hierarchical clustering-based method for indexing image
information | null | Signal & Image Processing : An International Journal (SIPIJ)
Vol.6, No.1, February 2015 | null | null | cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In most practical applications of image retrieval, high-dimensional feature
vectors are required, but current multi-dimensional indexing structures lose
their efficiency with growth of dimensions. Our goal is to propose a divisive
hierarchical clustering-based multi-dimensional indexing structure which is
efficient in high-dimensional feature spaces. A projection pursuit method has
been used for finding a component of the data, which data's projections onto it
maximizes the approximation of negentropy for preparing essential information
in order to partitioning of the data space. Various tests and experimental
results on high-dimensional datasets indicate the performance of proposed
method in comparison with others.
| [
{
"version": "v1",
"created": "Thu, 12 Mar 2015 06:51:06 GMT"
}
] | 2015-03-13T00:00:00 | [
[
"Izadpanah",
"Najva",
""
]
] | TITLE: A divisive hierarchical clustering-based method for indexing image
information
ABSTRACT: In most practical applications of image retrieval, high-dimensional feature
vectors are required, but current multi-dimensional indexing structures lose
their efficiency with growth of dimensions. Our goal is to propose a divisive
hierarchical clustering-based multi-dimensional indexing structure which is
efficient in high-dimensional feature spaces. A projection pursuit method has
been used for finding a component of the data, which data's projections onto it
maximizes the approximation of negentropy for preparing essential information
in order to partitioning of the data space. Various tests and experimental
results on high-dimensional datasets indicate the performance of proposed
method in comparison with others.
| no_new_dataset | 0.952442 |
1503.03650 | Weiqing Wang | Weiqing Wang, Hongzhi Yin, Ling Chen, Yizhou Sun, Shazia Sadiq,
Xiaofang Zhou | Geo-SAGE: A Geographical Sparse Additive Generative Model for Spatial
Item Recommendation | 10 pages, 15 figures | null | null | null | cs.IR cs.DB cs.SI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | With the rapid development of location-based social networks (LBSNs), spatial
item recommendation has become an important means to help people discover
attractive and interesting venues and events, especially when users travel out
of town. However, this recommendation is very challenging compared to the
traditional recommender systems. A user can visit only a limited number of
spatial items, leading to a very sparse user-item matrix. Most of the items
visited by a user are located within a short distance from where he/she lives,
which makes it hard to recommend items when the user travels to a far away
place. Moreover, user interests and behavior patterns may vary dramatically
across different geographical regions. In light of this, we propose Geo-SAGE, a
geographical sparse additive generative model for spatial item recommendation
in this paper. Geo-SAGE considers both user personal interests and the
preference of the crowd in the target region, by exploiting both the
co-occurrence pattern of spatial items and the content of spatial items. To
further alleviate the data sparsity issue, Geo-SAGE exploits the geographical
correlation by smoothing the crowd's preferences over a well-designed spatial
index structure called spatial pyramid. We conduct extensive experiments to
evaluate the performance of our Geo-SAGE model on two real large-scale
datasets. The experimental results clearly demonstrate our Geo-SAGE model
outperforms the state-of-the-art in the two tasks of both out-of-town and
home-town recommendations.
| [
{
"version": "v1",
"created": "Thu, 12 Mar 2015 09:44:11 GMT"
}
] | 2015-03-13T00:00:00 | [
[
"Wang",
"Weiqing",
""
],
[
"Yin",
"Hongzhi",
""
],
[
"Chen",
"Ling",
""
],
[
"Sun",
"Yizhou",
""
],
[
"Sadiq",
"Shazia",
""
],
[
"Zhou",
"Xiaofang",
""
]
] | TITLE: Geo-SAGE: A Geographical Sparse Additive Generative Model for Spatial
Item Recommendation
ABSTRACT: With the rapid development of location-based social networks (LBSNs), spatial
item recommendation has become an important means to help people discover
attractive and interesting venues and events, especially when users travel out
of town. However, this recommendation is very challenging compared to the
traditional recommender systems. A user can visit only a limited number of
spatial items, leading to a very sparse user-item matrix. Most of the items
visited by a user are located within a short distance from where he/she lives,
which makes it hard to recommend items when the user travels to a far away
place. Moreover, user interests and behavior patterns may vary dramatically
across different geographical regions. In light of this, we propose Geo-SAGE, a
geographical sparse additive generative model for spatial item recommendation
in this paper. Geo-SAGE considers both user personal interests and the
preference of the crowd in the target region, by exploiting both the
co-occurrence pattern of spatial items and the content of spatial items. To
further alleviate the data sparsity issue, Geo-SAGE exploits the geographical
correlation by smoothing the crowd's preferences over a well-designed spatial
index structure called spatial pyramid. We conduct extensive experiments to
evaluate the performance of our Geo-SAGE model on two real large-scale
datasets. The experimental results clearly demonstrate our Geo-SAGE model
outperforms the state-of-the-art in the two tasks of both out-of-town and
home-town recommendations.
| no_new_dataset | 0.950824 |
1307.6365 | Josif Grabocka | Josif Grabocka, Martin Wistuba, Lars Schmidt-Thieme | Time-Series Classification Through Histograms of Symbolic Polynomials | null | null | 10.1109/TKDE.2014.2377746 | null | cs.AI cs.DB cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Time-series classification has attracted considerable research attention due
to the various domains where time-series data are observed, ranging from
medicine to econometrics. Traditionally, the focus of time-series
classification has been on short time-series data composed of a unique pattern
with intraclass pattern distortions and variations, while recently there have
been attempts to focus on longer series composed of various local patterns.
This study presents a novel method which can detect local patterns in long
time-series via fitting local polynomial functions of arbitrary degrees. The
coefficients of the polynomial functions are converted to symbolic words via
equivolume discretizations of the coefficients' distributions. The symbolic
polynomial words enable the detection of similar local patterns by assigning
the same words to similar polynomials. Moreover, a histogram of the frequencies
of the words is constructed from each time-series' bag of words. Each row of
the histogram enables a new representation for the series and symbolize the
existence of local patterns and their frequencies. Experimental evidence
demonstrates outstanding results of our method compared to the state-of-art
baselines, by exhibiting the best classification accuracies in all the datasets
and having statistically significant improvements in the absolute majority of
experiments.
| [
{
"version": "v1",
"created": "Wed, 24 Jul 2013 10:07:50 GMT"
},
{
"version": "v2",
"created": "Thu, 25 Jul 2013 03:40:27 GMT"
},
{
"version": "v3",
"created": "Wed, 31 Jul 2013 10:58:02 GMT"
},
{
"version": "v4",
"created": "Mon, 23 Dec 2013 22:26:35 GMT"
}
] | 2015-03-12T00:00:00 | [
[
"Grabocka",
"Josif",
""
],
[
"Wistuba",
"Martin",
""
],
[
"Schmidt-Thieme",
"Lars",
""
]
] | TITLE: Time-Series Classification Through Histograms of Symbolic Polynomials
ABSTRACT: Time-series classification has attracted considerable research attention due
to the various domains where time-series data are observed, ranging from
medicine to econometrics. Traditionally, the focus of time-series
classification has been on short time-series data composed of a unique pattern
with intraclass pattern distortions and variations, while recently there have
been attempts to focus on longer series composed of various local patterns.
This study presents a novel method which can detect local patterns in long
time-series via fitting local polynomial functions of arbitrary degrees. The
coefficients of the polynomial functions are converted to symbolic words via
equivolume discretizations of the coefficients' distributions. The symbolic
polynomial words enable the detection of similar local patterns by assigning
the same words to similar polynomials. Moreover, a histogram of the frequencies
of the words is constructed from each time-series' bag of words. Each row of
the histogram enables a new representation for the series and symbolize the
existence of local patterns and their frequencies. Experimental evidence
demonstrates outstanding results of our method compared to the state-of-art
baselines, by exhibiting the best classification accuracies in all the datasets
and having statistically significant improvements in the absolute majority of
experiments.
| no_new_dataset | 0.949201 |
1312.6712 | Josif Grabocka | Josif Grabocka, Lars Schmidt-Thieme | Invariant Factorization Of Time-Series | null | null | 10.1007/s10618-014-0364-z | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Time-series classification is an important domain of machine learning and a
plethora of methods have been developed for the task. In comparison to existing
approaches, this study presents a novel method which decomposes a time-series
dataset into latent patterns and membership weights of local segments to those
patterns. The process is formalized as a constrained objective function and a
tailored stochastic coordinate descent optimization is applied. The time-series
are projected to a new feature representation consisting of the sums of the
membership weights, which captures frequencies of local patterns. Features from
various sliding window sizes are concatenated in order to encapsulate the
interaction of patterns from different sizes. Finally, a large-scale
experimental comparison against 6 state of the art baselines and 43 real life
datasets is conducted. The proposed method outperforms all the baselines with
statistically significant margins in terms of prediction accuracy.
| [
{
"version": "v1",
"created": "Mon, 23 Dec 2013 22:15:59 GMT"
}
] | 2015-03-12T00:00:00 | [
[
"Grabocka",
"Josif",
""
],
[
"Schmidt-Thieme",
"Lars",
""
]
] | TITLE: Invariant Factorization Of Time-Series
ABSTRACT: Time-series classification is an important domain of machine learning and a
plethora of methods have been developed for the task. In comparison to existing
approaches, this study presents a novel method which decomposes a time-series
dataset into latent patterns and membership weights of local segments to those
patterns. The process is formalized as a constrained objective function and a
tailored stochastic coordinate descent optimization is applied. The time-series
are projected to a new feature representation consisting of the sums of the
membership weights, which captures frequencies of local patterns. Features from
various sliding window sizes are concatenated in order to encapsulate the
interaction of patterns from different sizes. Finally, a large-scale
experimental comparison against 6 state of the art baselines and 43 real life
datasets is conducted. The proposed method outperforms all the baselines with
statistically significant margins in terms of prediction accuracy.
| no_new_dataset | 0.943919 |
1405.1681 | Chinh Dang | Chinh Dang, Hayder Radha | Representative Selection for Big Data via Sparse Graph and Geodesic
Grassmann Manifold Distance | This paper has been withdrawn by the author due to lacking details | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper addresses the problem of identifying a very small subset of data
points that belong to a significantly larger massive dataset (i.e., Big Data).
The small number of selected data points must adequately represent and
faithfully characterize the massive Big Data. Such identification process is
known as representative selection [19]. We propose a novel representative
selection framework by generating an l1 norm sparse graph for a given Big-Data
dataset. The Big Data is partitioned recursively into clusters using a spectral
clustering algorithm on the generated sparse graph. We consider each cluster as
one point in a Grassmann manifold, and measure the geodesic distance among
these points. The distances are further analyzed using a min-max algorithm [1]
to extract an optimal subset of clusters. Finally, by considering a sparse
subgraph of each selected cluster, we detect a representative using principal
component centrality [11]. We refer to the proposed representative selection
framework as a Sparse Graph and Grassmann Manifold (SGGM) based approach. To
validate the proposed SGGM framework, we apply it onto the problem of video
summarization where only few video frames, known as key frames, are selected
among a much longer video sequence. A comparison of the results obtained by the
proposed algorithm with the ground truth, which is agreed by multiple human
judges, and with some state-of-the-art methods clearly indicates the viability
of the SGGM framework.
| [
{
"version": "v1",
"created": "Wed, 7 May 2014 17:57:25 GMT"
},
{
"version": "v2",
"created": "Wed, 11 Mar 2015 13:57:52 GMT"
}
] | 2015-03-12T00:00:00 | [
[
"Dang",
"Chinh",
""
],
[
"Radha",
"Hayder",
""
]
] | TITLE: Representative Selection for Big Data via Sparse Graph and Geodesic
Grassmann Manifold Distance
ABSTRACT: This paper addresses the problem of identifying a very small subset of data
points that belong to a significantly larger massive dataset (i.e., Big Data).
The small number of selected data points must adequately represent and
faithfully characterize the massive Big Data. Such identification process is
known as representative selection [19]. We propose a novel representative
selection framework by generating an l1 norm sparse graph for a given Big-Data
dataset. The Big Data is partitioned recursively into clusters using a spectral
clustering algorithm on the generated sparse graph. We consider each cluster as
one point in a Grassmann manifold, and measure the geodesic distance among
these points. The distances are further analyzed using a min-max algorithm [1]
to extract an optimal subset of clusters. Finally, by considering a sparse
subgraph of each selected cluster, we detect a representative using principal
component centrality [11]. We refer to the proposed representative selection
framework as a Sparse Graph and Grassmann Manifold (SGGM) based approach. To
validate the proposed SGGM framework, we apply it onto the problem of video
summarization where only few video frames, known as key frames, are selected
among a much longer video sequence. A comparison of the results obtained by the
proposed algorithm with the ground truth, which is agreed by multiple human
judges, and with some state-of-the-art methods clearly indicates the viability
of the SGGM framework.
| no_new_dataset | 0.948585 |
1410.2686 | F. Ozgur Catak | Ferhat \"Ozg\"ur \c{C}atak | Polarization Measurement of High Dimensional Social Media Messages With
Support Vector Machine Algorithm Using Mapreduce | 12 pages, in Turkish | null | null | null | cs.LG cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this article, we propose a new Support Vector Machine (SVM) training
algorithm based on distributed MapReduce technique. In literature, there are a
lots of research that shows us SVM has highest generalization property among
classification algorithms used in machine learning area. Also, SVM classifier
model is not affected by correlations of the features. But SVM uses quadratic
optimization techniques in its training phase. The SVM algorithm is formulated
as quadratic optimization problem. Quadratic optimization problem has $O(m^3)$
time and $O(m^2)$ space complexity, where m is the training set size. The
computation time of SVM training is quadratic in the number of training
instances. In this reason, SVM is not a suitable classification algorithm for
large scale dataset classification. To solve this training problem we developed
a new distributed MapReduce method developed. Accordingly, (i) SVM algorithm is
trained in distributed dataset individually; (ii) then merge all support
vectors of classifier model in every trained node; and (iii) iterate these two
steps until the classifier model converges to the optimal classifier function.
In the implementation phase, large scale social media dataset is presented in
TFxIDF matrix. The matrix is used for sentiment analysis to get polarization
value. Two and three class models are created for classification method.
Confusion matrices of each classification model are presented in tables. Social
media messages corpus consists of 108 public and 66 private universities
messages in Turkey. Twitter is used for source of corpus. Twitter user messages
are collected using Twitter Streaming API. Results are shown in graphics and
tables.
| [
{
"version": "v1",
"created": "Fri, 10 Oct 2014 06:42:25 GMT"
},
{
"version": "v2",
"created": "Wed, 11 Mar 2015 05:56:51 GMT"
}
] | 2015-03-12T00:00:00 | [
[
"Çatak",
"Ferhat Özgür",
""
]
] | TITLE: Polarization Measurement of High Dimensional Social Media Messages With
Support Vector Machine Algorithm Using Mapreduce
ABSTRACT: In this article, we propose a new Support Vector Machine (SVM) training
algorithm based on distributed MapReduce technique. In literature, there are a
lots of research that shows us SVM has highest generalization property among
classification algorithms used in machine learning area. Also, SVM classifier
model is not affected by correlations of the features. But SVM uses quadratic
optimization techniques in its training phase. The SVM algorithm is formulated
as quadratic optimization problem. Quadratic optimization problem has $O(m^3)$
time and $O(m^2)$ space complexity, where m is the training set size. The
computation time of SVM training is quadratic in the number of training
instances. In this reason, SVM is not a suitable classification algorithm for
large scale dataset classification. To solve this training problem we developed
a new distributed MapReduce method developed. Accordingly, (i) SVM algorithm is
trained in distributed dataset individually; (ii) then merge all support
vectors of classifier model in every trained node; and (iii) iterate these two
steps until the classifier model converges to the optimal classifier function.
In the implementation phase, large scale social media dataset is presented in
TFxIDF matrix. The matrix is used for sentiment analysis to get polarization
value. Two and three class models are created for classification method.
Confusion matrices of each classification model are presented in tables. Social
media messages corpus consists of 108 public and 66 private universities
messages in Turkey. Twitter is used for source of corpus. Twitter user messages
are collected using Twitter Streaming API. Results are shown in graphics and
tables.
| no_new_dataset | 0.951774 |
1503.03163 | Yanwei Fu | Xi Zhang, Yanwei Fu, Andi Zang, Leonid Sigal, Gady Agam | Learning Classifiers from Synthetic Data Using a Multichannel
Autoencoder | 10 pages | null | null | null | cs.CV cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose a method for using synthetic data to help learning classifiers.
Synthetic data, even is generated based on real data, normally results in a
shift from the distribution of real data in feature space. To bridge the gap
between the real and synthetic data, and jointly learn from synthetic and real
data, this paper proposes a Multichannel Autoencoder(MCAE). We show that by
suing MCAE, it is possible to learn a better feature representation for
classification. To evaluate the proposed approach, we conduct experiments on
two types of datasets. Experimental results on two datasets validate the
efficiency of our MCAE model and our methodology of generating synthetic data.
| [
{
"version": "v1",
"created": "Wed, 11 Mar 2015 03:31:53 GMT"
}
] | 2015-03-12T00:00:00 | [
[
"Zhang",
"Xi",
""
],
[
"Fu",
"Yanwei",
""
],
[
"Zang",
"Andi",
""
],
[
"Sigal",
"Leonid",
""
],
[
"Agam",
"Gady",
""
]
] | TITLE: Learning Classifiers from Synthetic Data Using a Multichannel
Autoencoder
ABSTRACT: We propose a method for using synthetic data to help learning classifiers.
Synthetic data, even is generated based on real data, normally results in a
shift from the distribution of real data in feature space. To bridge the gap
between the real and synthetic data, and jointly learn from synthetic and real
data, this paper proposes a Multichannel Autoencoder(MCAE). We show that by
suing MCAE, it is possible to learn a better feature representation for
classification. To evaluate the proposed approach, we conduct experiments on
two types of datasets. Experimental results on two datasets validate the
efficiency of our MCAE model and our methodology of generating synthetic data.
| no_new_dataset | 0.952926 |
1503.03168 | Kalyani Desikan | G. Hannah Grace, Kalyani Desikan | Experimental Estimation of Number of Clusters Based on Cluster Quality | 12 pages, 9 figures | Journal of mathematics and computer science, Vol12 (2014), 304-315 | null | null | cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Text Clustering is a text mining technique which divides the given set of
text documents into significant clusters. It is used for organizing a huge
number of text documents into a well-organized form. In the majority of the
clustering algorithms, the number of clusters must be specified apriori, which
is a drawback of these algorithms. The aim of this paper is to show
experimentally how to determine the number of clusters based on cluster
quality. Since partitional clustering algorithms are well-suited for clustering
large document datasets, we have confined our analysis to a partitional
clustering algorithm.
| [
{
"version": "v1",
"created": "Tue, 10 Mar 2015 10:34:06 GMT"
}
] | 2015-03-12T00:00:00 | [
[
"Grace",
"G. Hannah",
""
],
[
"Desikan",
"Kalyani",
""
]
] | TITLE: Experimental Estimation of Number of Clusters Based on Cluster Quality
ABSTRACT: Text Clustering is a text mining technique which divides the given set of
text documents into significant clusters. It is used for organizing a huge
number of text documents into a well-organized form. In the majority of the
clustering algorithms, the number of clusters must be specified apriori, which
is a drawback of these algorithms. The aim of this paper is to show
experimentally how to determine the number of clusters based on cluster
quality. Since partitional clustering algorithms are well-suited for clustering
large document datasets, we have confined our analysis to a partitional
clustering algorithm.
| no_new_dataset | 0.949482 |
1503.03199 | Tatsuro Kawamoto | Tatsuro Kawamoto | Persistence of activity on Twitter triggered by a natural disaster: A
data analysis | 2 pages, 3 figures | null | null | null | physics.soc-ph cs.SI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this note, we list the results of a simple analysis of a Twitter dataset:
the complete dataset of Japanese tweets in the 1-week period after the Great
East Japan earthquake, which occurred on March 11, 2011. Our data analysis
shows how people reacted to the earthquake on Twitter and how some users went
inactive in the long-term.
| [
{
"version": "v1",
"created": "Wed, 11 Mar 2015 07:31:19 GMT"
}
] | 2015-03-12T00:00:00 | [
[
"Kawamoto",
"Tatsuro",
""
]
] | TITLE: Persistence of activity on Twitter triggered by a natural disaster: A
data analysis
ABSTRACT: In this note, we list the results of a simple analysis of a Twitter dataset:
the complete dataset of Japanese tweets in the 1-week period after the Great
East Japan earthquake, which occurred on March 11, 2011. Our data analysis
shows how people reacted to the earthquake on Twitter and how some users went
inactive in the long-term.
| no_new_dataset | 0.925769 |
1503.03238 | Josif Grabocka | Josif Grabocka, Martin Wistuba, Lars Schmidt-Thieme | Scalable Discovery of Time-Series Shapelets | Under review in the journal "Knowledge and Information Systems"
(KAIS) | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Time-series classification is an important problem for the data mining
community due to the wide range of application domains involving time-series
data. A recent paradigm, called shapelets, represents patterns that are highly
predictive for the target variable. Shapelets are discovered by measuring the
prediction accuracy of a set of potential (shapelet) candidates. The candidates
typically consist of all the segments of a dataset, therefore, the discovery of
shapelets is computationally expensive. This paper proposes a novel method that
avoids measuring the prediction accuracy of similar candidates in Euclidean
distance space, through an online clustering pruning technique. In addition,
our algorithm incorporates a supervised shapelet selection that filters out
only those candidates that improve classification accuracy. Empirical evidence
on 45 datasets from the UCR collection demonstrate that our method is 3-4
orders of magnitudes faster than the fastest existing shapelet-discovery
method, while providing better prediction accuracy.
| [
{
"version": "v1",
"created": "Wed, 11 Mar 2015 09:38:49 GMT"
}
] | 2015-03-12T00:00:00 | [
[
"Grabocka",
"Josif",
""
],
[
"Wistuba",
"Martin",
""
],
[
"Schmidt-Thieme",
"Lars",
""
]
] | TITLE: Scalable Discovery of Time-Series Shapelets
ABSTRACT: Time-series classification is an important problem for the data mining
community due to the wide range of application domains involving time-series
data. A recent paradigm, called shapelets, represents patterns that are highly
predictive for the target variable. Shapelets are discovered by measuring the
prediction accuracy of a set of potential (shapelet) candidates. The candidates
typically consist of all the segments of a dataset, therefore, the discovery of
shapelets is computationally expensive. This paper proposes a novel method that
avoids measuring the prediction accuracy of similar candidates in Euclidean
distance space, through an online clustering pruning technique. In addition,
our algorithm incorporates a supervised shapelet selection that filters out
only those candidates that improve classification accuracy. Empirical evidence
on 45 datasets from the UCR collection demonstrate that our method is 3-4
orders of magnitudes faster than the fastest existing shapelet-discovery
method, while providing better prediction accuracy.
| no_new_dataset | 0.953013 |
1503.03261 | Jeff Jones Dr | Jeff Jones, Andrew Adamatzky | Approximation of Statistical Analysis and Estimation by Morphological
Adaptation in a Model of Slime Mould | null | null | null | null | cs.ET | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | True slime mould Physarum polycephalum approximates a range of complex
computations via growth and adaptation of its proto- plasmic transport network,
stimulating a large body of recent research into how such a simple organism can
perform such complex feats. The properties of networks constructed by slime
mould are known to be in- fluenced by the local distribution of stimuli within
its environment. But can the morphological adaptation of slime mould yield any
information about the global statistical properties of its environment? We
explore this possibility using a particle based model of slime mould. We
demonstrate how morphological adaptation in blobs of virtual slime mould may be
used as a simple computational mechanism that can coarsely approx- imate
statistical analysis, estimation and tracking. Preliminary results include the
approximation of the geometric centroid of 2D shapes, ap- proximation of
arithmetic mean from spatially represented sorted and unsorted data
distributions, and the estimation and dynamical tracking of moving object
position in the presence of noise contaminated input stimuli. The results
suggest that it is possible to utilise collectives of very simple components
with limited individual computational ability (for ex- ample swarms of simple
robotic devices) to extract statistical features from complex datasets by means
of material adaptation and sensorial fusion.
| [
{
"version": "v1",
"created": "Wed, 11 Mar 2015 10:33:00 GMT"
}
] | 2015-03-12T00:00:00 | [
[
"Jones",
"Jeff",
""
],
[
"Adamatzky",
"Andrew",
""
]
] | TITLE: Approximation of Statistical Analysis and Estimation by Morphological
Adaptation in a Model of Slime Mould
ABSTRACT: True slime mould Physarum polycephalum approximates a range of complex
computations via growth and adaptation of its proto- plasmic transport network,
stimulating a large body of recent research into how such a simple organism can
perform such complex feats. The properties of networks constructed by slime
mould are known to be in- fluenced by the local distribution of stimuli within
its environment. But can the morphological adaptation of slime mould yield any
information about the global statistical properties of its environment? We
explore this possibility using a particle based model of slime mould. We
demonstrate how morphological adaptation in blobs of virtual slime mould may be
used as a simple computational mechanism that can coarsely approx- imate
statistical analysis, estimation and tracking. Preliminary results include the
approximation of the geometric centroid of 2D shapes, ap- proximation of
arithmetic mean from spatially represented sorted and unsorted data
distributions, and the estimation and dynamical tracking of moving object
position in the presence of noise contaminated input stimuli. The results
suggest that it is possible to utilise collectives of very simple components
with limited individual computational ability (for ex- ample swarms of simple
robotic devices) to extract statistical features from complex datasets by means
of material adaptation and sensorial fusion.
| no_new_dataset | 0.949809 |
1503.03264 | Jeff Jones Dr | Jeff Jones, Andrew Adamatzky | Material Approximation of Data Smoothing and Spline Curves Inspired by
Slime Mould | null | null | null | null | cs.ET | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Using a particle model of Physarum displaying emer- gent morphological
adaptation behaviour we demonstrate how a minimal approach to collective
material computation may be used to transform and summarise properties of
spatially represented datasets. We find that the virtual material relaxes more
strongly to high-frequency changes in data which can be used for the smoothing
(or filtering) of data by ap- proximating moving average and low-pass filters
in 1D datasets. The relaxation and minimisation properties of the model enable
the spatial computation of B-spline curves (approximating splines) in 2D
datasets. Both clamped and unclamped spline curves, of open and closed shapes,
can be represented and the degree of spline curvature corresponds to the
relaxation time of the material. The material computation of spline curves also
includes novel quasi-mechanical properties including unwind- ing of the shape
between control points and a preferential adhesion to longer, straighter paths.
Interpolating splines could not directly be ap- proximated due to the formation
and evolution of Steiner points at nar- row vertices, but were approximated
after rectilinear pre-processing of the source data. This pre-processing was
further simplified by transform- ing the original data to contain the material
inside the polyline. These exemplar results expand the repertoire of spatially
represented uncon- ventional computing devices by demonstrating a simple,
collective and distributed approach to data and curve smoothing.
| [
{
"version": "v1",
"created": "Wed, 11 Mar 2015 10:36:48 GMT"
}
] | 2015-03-12T00:00:00 | [
[
"Jones",
"Jeff",
""
],
[
"Adamatzky",
"Andrew",
""
]
] | TITLE: Material Approximation of Data Smoothing and Spline Curves Inspired by
Slime Mould
ABSTRACT: Using a particle model of Physarum displaying emer- gent morphological
adaptation behaviour we demonstrate how a minimal approach to collective
material computation may be used to transform and summarise properties of
spatially represented datasets. We find that the virtual material relaxes more
strongly to high-frequency changes in data which can be used for the smoothing
(or filtering) of data by ap- proximating moving average and low-pass filters
in 1D datasets. The relaxation and minimisation properties of the model enable
the spatial computation of B-spline curves (approximating splines) in 2D
datasets. Both clamped and unclamped spline curves, of open and closed shapes,
can be represented and the degree of spline curvature corresponds to the
relaxation time of the material. The material computation of spline curves also
includes novel quasi-mechanical properties including unwind- ing of the shape
between control points and a preferential adhesion to longer, straighter paths.
Interpolating splines could not directly be ap- proximated due to the formation
and evolution of Steiner points at nar- row vertices, but were approximated
after rectilinear pre-processing of the source data. This pre-processing was
further simplified by transform- ing the original data to contain the material
inside the polyline. These exemplar results expand the repertoire of spatially
represented uncon- ventional computing devices by demonstrating a simple,
collective and distributed approach to data and curve smoothing.
| no_new_dataset | 0.950778 |
1503.03270 | Vandna Bhalla Ms | Vandna Bhalla, Santanu Chaudhury, Arihant Jain | A Novel Hybrid CNN-AIS Visual Pattern Recognition Engine | null | null | null | null | cs.CV | http://creativecommons.org/licenses/by/3.0/ | Machine learning methods are used today for most recognition problems.
Convolutional Neural Networks (CNN) have time and again proved successful for
many image processing tasks primarily for their architecture. In this paper we
propose to apply CNN to small data sets like for example, personal albums or
other similar environs where the size of training dataset is a limitation,
within the framework of a proposed hybrid CNN-AIS model. We use Artificial
Immune System Principles to enhance small size of training data set. A layer of
Clonal Selection is added to the local filtering and max pooling of CNN
Architecture. The proposed Architecture is evaluated using the standard MNIST
dataset by limiting the data size and also with a small personal data sample
belonging to two different classes. Experimental results show that the proposed
hybrid CNN-AIS based recognition engine works well when the size of training
data is limited in size
| [
{
"version": "v1",
"created": "Wed, 11 Mar 2015 10:58:25 GMT"
}
] | 2015-03-12T00:00:00 | [
[
"Bhalla",
"Vandna",
""
],
[
"Chaudhury",
"Santanu",
""
],
[
"Jain",
"Arihant",
""
]
] | TITLE: A Novel Hybrid CNN-AIS Visual Pattern Recognition Engine
ABSTRACT: Machine learning methods are used today for most recognition problems.
Convolutional Neural Networks (CNN) have time and again proved successful for
many image processing tasks primarily for their architecture. In this paper we
propose to apply CNN to small data sets like for example, personal albums or
other similar environs where the size of training dataset is a limitation,
within the framework of a proposed hybrid CNN-AIS model. We use Artificial
Immune System Principles to enhance small size of training data set. A layer of
Clonal Selection is added to the local filtering and max pooling of CNN
Architecture. The proposed Architecture is evaluated using the standard MNIST
dataset by limiting the data size and also with a small personal data sample
belonging to two different classes. Experimental results show that the proposed
hybrid CNN-AIS based recognition engine works well when the size of training
data is limited in size
| no_new_dataset | 0.948965 |
1503.03355 | Evangelos Papalexakis | Evangelos E. Papalexakis | Automatic Unsupervised Tensor Mining with Quality Assessment | null | null | null | null | stat.ML cs.LG cs.NA stat.AP | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A popular tool for unsupervised modelling and mining multi-aspect data is
tensor decomposition. In an exploratory setting, where and no labels or ground
truth are available how can we automatically decide how many components to
extract? How can we assess the quality of our results, so that a domain expert
can factor this quality measure in the interpretation of our results? In this
paper, we introduce AutoTen, a novel automatic unsupervised tensor mining
algorithm with minimal user intervention, which leverages and improves upon
heuristics that assess the result quality. We extensively evaluate AutoTen's
performance on synthetic data, outperforming existing baselines on this very
hard problem. Finally, we apply AutoTen on a variety of real datasets,
providing insights and discoveries. We view this work as a step towards a fully
automated, unsupervised tensor mining tool that can be easily adopted by
practitioners in academia and industry.
| [
{
"version": "v1",
"created": "Wed, 11 Mar 2015 14:34:46 GMT"
}
] | 2015-03-12T00:00:00 | [
[
"Papalexakis",
"Evangelos E.",
""
]
] | TITLE: Automatic Unsupervised Tensor Mining with Quality Assessment
ABSTRACT: A popular tool for unsupervised modelling and mining multi-aspect data is
tensor decomposition. In an exploratory setting, where and no labels or ground
truth are available how can we automatically decide how many components to
extract? How can we assess the quality of our results, so that a domain expert
can factor this quality measure in the interpretation of our results? In this
paper, we introduce AutoTen, a novel automatic unsupervised tensor mining
algorithm with minimal user intervention, which leverages and improves upon
heuristics that assess the result quality. We extensively evaluate AutoTen's
performance on synthetic data, outperforming existing baselines on this very
hard problem. Finally, we apply AutoTen on a variety of real datasets,
providing insights and discoveries. We view this work as a step towards a fully
automated, unsupervised tensor mining tool that can be easily adopted by
practitioners in academia and industry.
| no_new_dataset | 0.946349 |
1503.01596 | Sungjin Ahn | Sungjin Ahn, Anoop Korattikara, Nathan Liu, Suju Rajan, Max Welling | Large-Scale Distributed Bayesian Matrix Factorization using Stochastic
Gradient MCMC | null | null | null | null | cs.LG stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Despite having various attractive qualities such as high prediction accuracy
and the ability to quantify uncertainty and avoid over-fitting, Bayesian Matrix
Factorization has not been widely adopted because of the prohibitive cost of
inference. In this paper, we propose a scalable distributed Bayesian matrix
factorization algorithm using stochastic gradient MCMC. Our algorithm, based on
Distributed Stochastic Gradient Langevin Dynamics, can not only match the
prediction accuracy of standard MCMC methods like Gibbs sampling, but at the
same time is as fast and simple as stochastic gradient descent. In our
experiments, we show that our algorithm can achieve the same level of
prediction accuracy as Gibbs sampling an order of magnitude faster. We also
show that our method reduces the prediction error as fast as distributed
stochastic gradient descent, achieving a 4.1% improvement in RMSE for the
Netflix dataset and an 1.8% for the Yahoo music dataset.
| [
{
"version": "v1",
"created": "Thu, 5 Mar 2015 10:17:16 GMT"
},
{
"version": "v2",
"created": "Tue, 10 Mar 2015 02:28:41 GMT"
}
] | 2015-03-11T00:00:00 | [
[
"Ahn",
"Sungjin",
""
],
[
"Korattikara",
"Anoop",
""
],
[
"Liu",
"Nathan",
""
],
[
"Rajan",
"Suju",
""
],
[
"Welling",
"Max",
""
]
] | TITLE: Large-Scale Distributed Bayesian Matrix Factorization using Stochastic
Gradient MCMC
ABSTRACT: Despite having various attractive qualities such as high prediction accuracy
and the ability to quantify uncertainty and avoid over-fitting, Bayesian Matrix
Factorization has not been widely adopted because of the prohibitive cost of
inference. In this paper, we propose a scalable distributed Bayesian matrix
factorization algorithm using stochastic gradient MCMC. Our algorithm, based on
Distributed Stochastic Gradient Langevin Dynamics, can not only match the
prediction accuracy of standard MCMC methods like Gibbs sampling, but at the
same time is as fast and simple as stochastic gradient descent. In our
experiments, we show that our algorithm can achieve the same level of
prediction accuracy as Gibbs sampling an order of magnitude faster. We also
show that our method reduces the prediction error as fast as distributed
stochastic gradient descent, achieving a 4.1% improvement in RMSE for the
Netflix dataset and an 1.8% for the Yahoo music dataset.
| no_new_dataset | 0.953837 |
1503.02940 | Gabriela Montoya | Gabriela Montoya, Hala Skaf-Molli, Pascal Molli, Maria-Esther Vidal | Efficient Query Processing for SPARQL Federations with Replicated
Fragments | null | null | null | null | cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Low reliability and availability of public SPARQL endpoints prevent
real-world applications from exploiting all the potential of these querying
infras-tructures. Fragmenting data on servers can improve data availability but
degrades performance. Replicating fragments can offer new tradeoff between
performance and availability. We propose FEDRA, a framework for querying Linked
Data that takes advantage of client-side data replication, and performs a
source selection algorithm that aims to reduce the number of selected public
SPARQL endpoints, execution time, and intermediate results. FEDRA has been
implemented on the state-of-the-art query engines ANAPSID and FedX, and
empirically evaluated on a variety of real-world datasets.
| [
{
"version": "v1",
"created": "Tue, 10 Mar 2015 14:57:26 GMT"
}
] | 2015-03-11T00:00:00 | [
[
"Montoya",
"Gabriela",
""
],
[
"Skaf-Molli",
"Hala",
""
],
[
"Molli",
"Pascal",
""
],
[
"Vidal",
"Maria-Esther",
""
]
] | TITLE: Efficient Query Processing for SPARQL Federations with Replicated
Fragments
ABSTRACT: Low reliability and availability of public SPARQL endpoints prevent
real-world applications from exploiting all the potential of these querying
infras-tructures. Fragmenting data on servers can improve data availability but
degrades performance. Replicating fragments can offer new tradeoff between
performance and availability. We propose FEDRA, a framework for querying Linked
Data that takes advantage of client-side data replication, and performs a
source selection algorithm that aims to reduce the number of selected public
SPARQL endpoints, execution time, and intermediate results. FEDRA has been
implemented on the state-of-the-art query engines ANAPSID and FedX, and
empirically evaluated on a variety of real-world datasets.
| no_new_dataset | 0.942454 |
1503.02974 | Matthew Wade | Matthew J. Wade and Thomas P. Curtis and Russell J. Davenport | Modelling Computational Resources for Next Generation Sequencing
Bioinformatics Analysis of 16S rRNA Samples | 23 pages, 8 figures | null | null | null | q-bio.GN cs.CE cs.PF | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In the rapidly evolving domain of next generation sequencing and
bioinformatics analysis, data generation is one aspect that is increasing at a
concomitant rate. The burden associated with processing large amounts of
sequencing data has emphasised the need to allocate sufficient computing
resources to complete analyses in the shortest possible time with manageable
and predictable costs. A novel method for predicting time to completion for a
popular bioinformatics software (QIIME), was developed using key variables
characteristic of the input data assumed to impact processing time. Multiple
Linear Regression models were developed to determine run time for two denoising
algorithms and a general bioinformatics pipeline. The models were able to
accurately predict clock time for denoising sequences from a naturally
assembled community dataset, but not an artificial community. Speedup and
efficiency tests for AmpliconNoise also highlighted that caution was needed
when allocating resources for parallel processing of data. Accurate modelling
of computational processing time using easily measurable predictors can assist
NGS analysts in determining resource requirements for bioinformatics software
and pipelines. Whilst demonstrated on a specific group of scripts, the
methodology can be extended to encompass other packages running on multiple
architectures, either in parallel or sequentially.
| [
{
"version": "v1",
"created": "Tue, 10 Mar 2015 16:18:57 GMT"
}
] | 2015-03-11T00:00:00 | [
[
"Wade",
"Matthew J.",
""
],
[
"Curtis",
"Thomas P.",
""
],
[
"Davenport",
"Russell J.",
""
]
] | TITLE: Modelling Computational Resources for Next Generation Sequencing
Bioinformatics Analysis of 16S rRNA Samples
ABSTRACT: In the rapidly evolving domain of next generation sequencing and
bioinformatics analysis, data generation is one aspect that is increasing at a
concomitant rate. The burden associated with processing large amounts of
sequencing data has emphasised the need to allocate sufficient computing
resources to complete analyses in the shortest possible time with manageable
and predictable costs. A novel method for predicting time to completion for a
popular bioinformatics software (QIIME), was developed using key variables
characteristic of the input data assumed to impact processing time. Multiple
Linear Regression models were developed to determine run time for two denoising
algorithms and a general bioinformatics pipeline. The models were able to
accurately predict clock time for denoising sequences from a naturally
assembled community dataset, but not an artificial community. Speedup and
efficiency tests for AmpliconNoise also highlighted that caution was needed
when allocating resources for parallel processing of data. Accurate modelling
of computational processing time using easily measurable predictors can assist
NGS analysts in determining resource requirements for bioinformatics software
and pipelines. Whilst demonstrated on a specific group of scripts, the
methodology can be extended to encompass other packages running on multiple
architectures, either in parallel or sequentially.
| no_new_dataset | 0.945045 |
1503.03021 | Anastasios Noulas Anastasios Noulas | Vsevolod Salnikov, Renaud Lambiotte, Anastasios Noulas, Cecilia
Mascolo | OpenStreetCab: Exploiting Taxi Mobility Patterns in New York City to
Reduce Commuter Costs | in NetMob 2015 | null | null | null | cs.SI cs.CY physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The rise of Uber as the global alternative taxi operator has attracted a lot
of interest recently. Aside from the media headlines which discuss the new
phenomenon, e.g. on how it has disrupted the traditional transportation
industry, policy makers, economists, citizens and scientists have engaged in a
discussion that is centred around the means to integrate the new generation of
the sharing economy services in urban ecosystems. In this work, we aim to shed
new light on the discussion, by taking advantage of a publicly available
longitudinal dataset that describes the mobility of yellow taxis in New York
City. In addition to movement, this data contains information on the fares paid
by the taxi customers for each trip. As a result we are given the opportunity
to provide a first head to head comparison between the iconic yellow taxi and
its modern competitor, Uber, in one of the world's largest metropolitan
centres. We identify situations when Uber X, the cheapest version of the Uber
taxi service, tends to be more expensive than yellow taxis for the same
journey. We also demonstrate how Uber's economic model effectively takes
advantage of well known patterns in human movement. Finally, we take our
analysis a step further by proposing a new mobile application that compares
taxi prices in the city to facilitate traveller's taxi choices, hoping to
ultimately to lead to a reduction of commuter costs. Our study provides a case
on how big datasets that become public can improve urban services for consumers
by offering the opportunity for transparency in economic sectors that lack up
to date regulations.
| [
{
"version": "v1",
"created": "Tue, 10 Mar 2015 18:12:14 GMT"
}
] | 2015-03-11T00:00:00 | [
[
"Salnikov",
"Vsevolod",
""
],
[
"Lambiotte",
"Renaud",
""
],
[
"Noulas",
"Anastasios",
""
],
[
"Mascolo",
"Cecilia",
""
]
] | TITLE: OpenStreetCab: Exploiting Taxi Mobility Patterns in New York City to
Reduce Commuter Costs
ABSTRACT: The rise of Uber as the global alternative taxi operator has attracted a lot
of interest recently. Aside from the media headlines which discuss the new
phenomenon, e.g. on how it has disrupted the traditional transportation
industry, policy makers, economists, citizens and scientists have engaged in a
discussion that is centred around the means to integrate the new generation of
the sharing economy services in urban ecosystems. In this work, we aim to shed
new light on the discussion, by taking advantage of a publicly available
longitudinal dataset that describes the mobility of yellow taxis in New York
City. In addition to movement, this data contains information on the fares paid
by the taxi customers for each trip. As a result we are given the opportunity
to provide a first head to head comparison between the iconic yellow taxi and
its modern competitor, Uber, in one of the world's largest metropolitan
centres. We identify situations when Uber X, the cheapest version of the Uber
taxi service, tends to be more expensive than yellow taxis for the same
journey. We also demonstrate how Uber's economic model effectively takes
advantage of well known patterns in human movement. Finally, we take our
analysis a step further by proposing a new mobile application that compares
taxi prices in the city to facilitate traveller's taxi choices, hoping to
ultimately to lead to a reduction of commuter costs. Our study provides a case
on how big datasets that become public can improve urban services for consumers
by offering the opportunity for transparency in economic sectors that lack up
to date regulations.
| new_dataset | 0.574421 |
1411.1091 | Jonathan Long | Jonathan Long, Ning Zhang, Trevor Darrell | Do Convnets Learn Correspondence? | null | null | null | null | cs.CV cs.LG cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Convolutional neural nets (convnets) trained from massive labeled datasets
have substantially improved the state-of-the-art in image classification and
object detection. However, visual understanding requires establishing
correspondence on a finer level than object category. Given their large pooling
regions and training from whole-image labels, it is not clear that convnets
derive their success from an accurate correspondence model which could be used
for precise localization. In this paper, we study the effectiveness of convnet
activation features for tasks requiring correspondence. We present evidence
that convnet features localize at a much finer scale than their receptive field
sizes, that they can be used to perform intraclass alignment as well as
conventional hand-engineered features, and that they outperform conventional
features in keypoint prediction on objects from PASCAL VOC 2011.
| [
{
"version": "v1",
"created": "Tue, 4 Nov 2014 21:35:55 GMT"
}
] | 2015-03-10T00:00:00 | [
[
"Long",
"Jonathan",
""
],
[
"Zhang",
"Ning",
""
],
[
"Darrell",
"Trevor",
""
]
] | TITLE: Do Convnets Learn Correspondence?
ABSTRACT: Convolutional neural nets (convnets) trained from massive labeled datasets
have substantially improved the state-of-the-art in image classification and
object detection. However, visual understanding requires establishing
correspondence on a finer level than object category. Given their large pooling
regions and training from whole-image labels, it is not clear that convnets
derive their success from an accurate correspondence model which could be used
for precise localization. In this paper, we study the effectiveness of convnet
activation features for tasks requiring correspondence. We present evidence
that convnet features localize at a much finer scale than their receptive field
sizes, that they can be used to perform intraclass alignment as well as
conventional hand-engineered features, and that they outperform conventional
features in keypoint prediction on objects from PASCAL VOC 2011.
| no_new_dataset | 0.952131 |
1502.00068 | Ameet Talwalkar | Evan R. Sparks, Ameet Talwalkar, Michael J. Franklin, Michael I.
Jordan, Tim Kraska | TuPAQ: An Efficient Planner for Large-scale Predictive Analytic Queries | null | null | null | null | cs.DB cs.DC cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The proliferation of massive datasets combined with the development of
sophisticated analytical techniques have enabled a wide variety of novel
applications such as improved product recommendations, automatic image tagging,
and improved speech-driven interfaces. These and many other applications can be
supported by Predictive Analytic Queries (PAQs). A major obstacle to supporting
PAQs is the challenging and expensive process of identifying and training an
appropriate predictive model. Recent efforts aiming to automate this process
have focused on single node implementations and have assumed that model
training itself is a black box, thus limiting the effectiveness of such
approaches on large-scale problems. In this work, we build upon these recent
efforts and propose an integrated PAQ planning architecture that combines
advanced model search techniques, bandit resource allocation via runtime
algorithm introspection, and physical optimization via batching. The result is
TuPAQ, a component of the MLbase system, which solves the PAQ planning problem
with comparable quality to exhaustive strategies but an order of magnitude more
efficiently than the standard baseline approach, and can scale to models
trained on terabytes of data across hundreds of machines.
| [
{
"version": "v1",
"created": "Sat, 31 Jan 2015 04:51:58 GMT"
},
{
"version": "v2",
"created": "Sun, 8 Mar 2015 22:02:24 GMT"
}
] | 2015-03-10T00:00:00 | [
[
"Sparks",
"Evan R.",
""
],
[
"Talwalkar",
"Ameet",
""
],
[
"Franklin",
"Michael J.",
""
],
[
"Jordan",
"Michael I.",
""
],
[
"Kraska",
"Tim",
""
]
] | TITLE: TuPAQ: An Efficient Planner for Large-scale Predictive Analytic Queries
ABSTRACT: The proliferation of massive datasets combined with the development of
sophisticated analytical techniques have enabled a wide variety of novel
applications such as improved product recommendations, automatic image tagging,
and improved speech-driven interfaces. These and many other applications can be
supported by Predictive Analytic Queries (PAQs). A major obstacle to supporting
PAQs is the challenging and expensive process of identifying and training an
appropriate predictive model. Recent efforts aiming to automate this process
have focused on single node implementations and have assumed that model
training itself is a black box, thus limiting the effectiveness of such
approaches on large-scale problems. In this work, we build upon these recent
efforts and propose an integrated PAQ planning architecture that combines
advanced model search techniques, bandit resource allocation via runtime
algorithm introspection, and physical optimization via batching. The result is
TuPAQ, a component of the MLbase system, which solves the PAQ planning problem
with comparable quality to exhaustive strategies but an order of magnitude more
efficiently than the standard baseline approach, and can scale to models
trained on terabytes of data across hundreds of machines.
| no_new_dataset | 0.944177 |
1503.02216 | Yuning Yang | Yuning Yang, Siamak Mehrkanoon and Johan A.K. Suykens | Higher order Matching Pursuit for Low Rank Tensor Learning | null | null | null | null | stat.ML cs.LG math.OC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Low rank tensor learning, such as tensor completion and multilinear multitask
learning, has received much attention in recent years. In this paper, we
propose higher order matching pursuit for low rank tensor learning problems
with a convex or a nonconvex cost function, which is a generalization of the
matching pursuit type methods. At each iteration, the main cost of the proposed
methods is only to compute a rank-one tensor, which can be done efficiently,
making the proposed methods scalable to large scale problems. Moreover, storing
the resulting rank-one tensors is of low storage requirement, which can help to
break the curse of dimensionality. The linear convergence rate of the proposed
methods is established in various circumstances. Along with the main methods,
we also provide a method of low computational complexity for approximately
computing the rank-one tensors, with provable approximation ratio, which helps
to improve the efficiency of the main methods and to analyze the convergence
rate. Experimental results on synthetic as well as real datasets verify the
efficiency and effectiveness of the proposed methods.
| [
{
"version": "v1",
"created": "Sat, 7 Mar 2015 21:38:07 GMT"
}
] | 2015-03-10T00:00:00 | [
[
"Yang",
"Yuning",
""
],
[
"Mehrkanoon",
"Siamak",
""
],
[
"Suykens",
"Johan A. K.",
""
]
] | TITLE: Higher order Matching Pursuit for Low Rank Tensor Learning
ABSTRACT: Low rank tensor learning, such as tensor completion and multilinear multitask
learning, has received much attention in recent years. In this paper, we
propose higher order matching pursuit for low rank tensor learning problems
with a convex or a nonconvex cost function, which is a generalization of the
matching pursuit type methods. At each iteration, the main cost of the proposed
methods is only to compute a rank-one tensor, which can be done efficiently,
making the proposed methods scalable to large scale problems. Moreover, storing
the resulting rank-one tensors is of low storage requirement, which can help to
break the curse of dimensionality. The linear convergence rate of the proposed
methods is established in various circumstances. Along with the main methods,
we also provide a method of low computational complexity for approximately
computing the rank-one tensors, with provable approximation ratio, which helps
to improve the efficiency of the main methods and to analyze the convergence
rate. Experimental results on synthetic as well as real datasets verify the
efficiency and effectiveness of the proposed methods.
| no_new_dataset | 0.94868 |
1503.02351 | Alexander Schwing | Alexander G. Schwing and Raquel Urtasun | Fully Connected Deep Structured Networks | null | null | null | null | cs.CV cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Convolutional neural networks with many layers have recently been shown to
achieve excellent results on many high-level tasks such as image
classification, object detection and more recently also semantic segmentation.
Particularly for semantic segmentation, a two-stage procedure is often
employed. Hereby, convolutional networks are trained to provide good local
pixel-wise features for the second step being traditionally a more global
graphical model. In this work we unify this two-stage process into a single
joint training algorithm. We demonstrate our method on the semantic image
segmentation task and show encouraging results on the challenging PASCAL VOC
2012 dataset.
| [
{
"version": "v1",
"created": "Mon, 9 Mar 2015 01:08:00 GMT"
}
] | 2015-03-10T00:00:00 | [
[
"Schwing",
"Alexander G.",
""
],
[
"Urtasun",
"Raquel",
""
]
] | TITLE: Fully Connected Deep Structured Networks
ABSTRACT: Convolutional neural networks with many layers have recently been shown to
achieve excellent results on many high-level tasks such as image
classification, object detection and more recently also semantic segmentation.
Particularly for semantic segmentation, a two-stage procedure is often
employed. Hereby, convolutional networks are trained to provide good local
pixel-wise features for the second step being traditionally a more global
graphical model. In this work we unify this two-stage process into a single
joint training algorithm. We demonstrate our method on the semantic image
segmentation task and show encouraging results on the challenging PASCAL VOC
2012 dataset.
| no_new_dataset | 0.954984 |
1402.4279 | Ingmar Schuster | Ingmar Schuster | A Bayesian Model of node interaction in networks | null | null | null | null | cs.LG stat.ME stat.ML | http://creativecommons.org/licenses/by-nc-sa/3.0/ | We are concerned with modeling the strength of links in networks by taking
into account how often those links are used. Link usage is a strong indicator
of how closely two nodes are related, but existing network models in Bayesian
Statistics and Machine Learning are able to predict only wether a link exists
at all. As priors for latent attributes of network nodes we explore the Chinese
Restaurant Process (CRP) and a multivariate Gaussian with fixed dimensionality.
The model is applied to a social network dataset and a word coocurrence
dataset.
| [
{
"version": "v1",
"created": "Tue, 18 Feb 2014 10:34:41 GMT"
},
{
"version": "v2",
"created": "Fri, 6 Mar 2015 10:22:12 GMT"
}
] | 2015-03-09T00:00:00 | [
[
"Schuster",
"Ingmar",
""
]
] | TITLE: A Bayesian Model of node interaction in networks
ABSTRACT: We are concerned with modeling the strength of links in networks by taking
into account how often those links are used. Link usage is a strong indicator
of how closely two nodes are related, but existing network models in Bayesian
Statistics and Machine Learning are able to predict only wether a link exists
at all. As priors for latent attributes of network nodes we explore the Chinese
Restaurant Process (CRP) and a multivariate Gaussian with fixed dimensionality.
The model is applied to a social network dataset and a word coocurrence
dataset.
| no_new_dataset | 0.950088 |
1503.01812 | Vanessa Ayala-Rivera | Vanessa Ayala-Rivera, Patrick McDonagh, Thomas Cerqueus, Liam Murphy | Ontology-Based Quality Evaluation of Value Generalization Hierarchies
for Data Anonymization | 18 pages, 7 figures, presented in the Privacy in Statistical
Databases Conference 2014 (Ibiza, Spain) | null | null | null | cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In privacy-preserving data publishing, approaches using Value Generalization
Hierarchies (VGHs) form an important class of anonymization algorithms. VGHs
play a key role in the utility of published datasets as they dictate how the
anonymization of the data occurs. For categorical attributes, it is imperative
to preserve the semantics of the original data in order to achieve a higher
utility. Despite this, semantics have not being formally considered in the
specification of VGHs. Moreover, there are no methods that allow the users to
assess the quality of their VGH. In this paper, we propose a measurement
scheme, based on ontologies, to quantitatively evaluate the quality of VGHs, in
terms of semantic consistency and taxonomic organization, with the aim of
producing higher-quality anonymizations. We demonstrate, through a case study,
how our evaluation scheme can be used to compare the quality of multiple VGHs
and can help to identify faulty VGHs.
| [
{
"version": "v1",
"created": "Thu, 5 Mar 2015 22:58:19 GMT"
}
] | 2015-03-09T00:00:00 | [
[
"Ayala-Rivera",
"Vanessa",
""
],
[
"McDonagh",
"Patrick",
""
],
[
"Cerqueus",
"Thomas",
""
],
[
"Murphy",
"Liam",
""
]
] | TITLE: Ontology-Based Quality Evaluation of Value Generalization Hierarchies
for Data Anonymization
ABSTRACT: In privacy-preserving data publishing, approaches using Value Generalization
Hierarchies (VGHs) form an important class of anonymization algorithms. VGHs
play a key role in the utility of published datasets as they dictate how the
anonymization of the data occurs. For categorical attributes, it is imperative
to preserve the semantics of the original data in order to achieve a higher
utility. Despite this, semantics have not being formally considered in the
specification of VGHs. Moreover, there are no methods that allow the users to
assess the quality of their VGH. In this paper, we propose a measurement
scheme, based on ontologies, to quantitatively evaluate the quality of VGHs, in
terms of semantic consistency and taxonomic organization, with the aim of
producing higher-quality anonymizations. We demonstrate, through a case study,
how our evaluation scheme can be used to compare the quality of multiple VGHs
and can help to identify faulty VGHs.
| no_new_dataset | 0.949295 |
1503.01820 | Ninghang Hu | Ninghang Hu, Gwenn Englebienne, Zhongyu Lou, and Ben Kr\"ose | Latent Hierarchical Model for Activity Recognition | null | null | null | null | cs.RO cs.AI cs.CV cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present a novel hierarchical model for human activity recognition. In
contrast to approaches that successively recognize actions and activities, our
approach jointly models actions and activities in a unified framework, and
their labels are simultaneously predicted. The model is embedded with a latent
layer that is able to capture a richer class of contextual information in both
state-state and observation-state pairs. Although loops are present in the
model, the model has an overall linear-chain structure, where the exact
inference is tractable. Therefore, the model is very efficient in both
inference and learning. The parameters of the graphical model are learned with
a Structured Support Vector Machine (Structured-SVM). A data-driven approach is
used to initialize the latent variables; therefore, no manual labeling for the
latent states is required. The experimental results from using two benchmark
datasets show that our model outperforms the state-of-the-art approach, and our
model is computationally more efficient.
| [
{
"version": "v1",
"created": "Fri, 6 Mar 2015 00:05:12 GMT"
}
] | 2015-03-09T00:00:00 | [
[
"Hu",
"Ninghang",
""
],
[
"Englebienne",
"Gwenn",
""
],
[
"Lou",
"Zhongyu",
""
],
[
"Kröse",
"Ben",
""
]
] | TITLE: Latent Hierarchical Model for Activity Recognition
ABSTRACT: We present a novel hierarchical model for human activity recognition. In
contrast to approaches that successively recognize actions and activities, our
approach jointly models actions and activities in a unified framework, and
their labels are simultaneously predicted. The model is embedded with a latent
layer that is able to capture a richer class of contextual information in both
state-state and observation-state pairs. Although loops are present in the
model, the model has an overall linear-chain structure, where the exact
inference is tractable. Therefore, the model is very efficient in both
inference and learning. The parameters of the graphical model are learned with
a Structured Support Vector Machine (Structured-SVM). A data-driven approach is
used to initialize the latent variables; therefore, no manual labeling for the
latent states is required. The experimental results from using two benchmark
datasets show that our model outperforms the state-of-the-art approach, and our
model is computationally more efficient.
| no_new_dataset | 0.949059 |
1503.01918 | Matej Kristan | Matej Kristan, Vildana Sulic, Stanislav Kovacic, Janez Pers | Fast image-based obstacle detection from unmanned surface vehicles | This is an extended version of the ACCV2014 paper [Kristan et al.,
2014] submitted to a journal. [Kristan et al., 2014] M. Kristan, J. Pers, V.
Sulic, S. Kovacic, A graphical model for rapid obstacle image-map estimation
from unmanned surface vehicles, in Proc. Asian Conf. Computer Vision, 2014 | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Obstacle detection plays an important role in unmanned surface vehicles
(USV). The USVs operate in highly diverse environments in which an obstacle may
be a floating piece of wood, a scuba diver, a pier, or a part of a shoreline,
which presents a significant challenge to continuous detection from images
taken onboard. This paper addresses the problem of online detection by
constrained unsupervised segmentation. To this end, a new graphical model is
proposed that affords a fast and continuous obstacle image-map estimation from
a single video stream captured onboard a USV. The model accounts for the
semantic structure of marine environment as observed from USV by imposing weak
structural constraints. A Markov random field framework is adopted and a highly
efficient algorithm for simultaneous optimization of model parameters and
segmentation mask estimation is derived. Our approach does not require
computationally intensive extraction of texture features and comfortably runs
in real-time. The algorithm is tested on a new, challenging, dataset for
segmentation and obstacle detection in marine environments, which is the
largest annotated dataset of its kind. Results on this dataset show that our
model outperforms the related approaches, while requiring a fraction of
computational effort.
| [
{
"version": "v1",
"created": "Fri, 6 Mar 2015 11:21:07 GMT"
}
] | 2015-03-09T00:00:00 | [
[
"Kristan",
"Matej",
""
],
[
"Sulic",
"Vildana",
""
],
[
"Kovacic",
"Stanislav",
""
],
[
"Pers",
"Janez",
""
]
] | TITLE: Fast image-based obstacle detection from unmanned surface vehicles
ABSTRACT: Obstacle detection plays an important role in unmanned surface vehicles
(USV). The USVs operate in highly diverse environments in which an obstacle may
be a floating piece of wood, a scuba diver, a pier, or a part of a shoreline,
which presents a significant challenge to continuous detection from images
taken onboard. This paper addresses the problem of online detection by
constrained unsupervised segmentation. To this end, a new graphical model is
proposed that affords a fast and continuous obstacle image-map estimation from
a single video stream captured onboard a USV. The model accounts for the
semantic structure of marine environment as observed from USV by imposing weak
structural constraints. A Markov random field framework is adopted and a highly
efficient algorithm for simultaneous optimization of model parameters and
segmentation mask estimation is derived. Our approach does not require
computationally intensive extraction of texture features and comfortably runs
in real-time. The algorithm is tested on a new, challenging, dataset for
segmentation and obstacle detection in marine environments, which is the
largest annotated dataset of its kind. Results on this dataset show that our
model outperforms the related approaches, while requiring a fraction of
computational effort.
| new_dataset | 0.966632 |
1503.02031 | Vivek Kulkarni | Prateek Jain, Vivek Kulkarni, Abhradeep Thakurta, Oliver Williams | To Drop or Not to Drop: Robustness, Consistency and Differential Privacy
Properties of Dropout | Currently under review for ICML 2015 | null | null | null | cs.LG cs.NE stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Training deep belief networks (DBNs) requires optimizing a non-convex
function with an extremely large number of parameters. Naturally, existing
gradient descent (GD) based methods are prone to arbitrarily poor local minima.
In this paper, we rigorously show that such local minima can be avoided (upto
an approximation error) by using the dropout technique, a widely used heuristic
in this domain. In particular, we show that by randomly dropping a few nodes of
a one-hidden layer neural network, the training objective function, up to a
certain approximation error, decreases by a multiplicative factor.
On the flip side, we show that for training convex empirical risk minimizers
(ERM), dropout in fact acts as a "stabilizer" or regularizer. That is, a simple
dropout based GD method for convex ERMs is stable in the face of arbitrary
changes to any one of the training points. Using the above assertion, we show
that dropout provides fast rates for generalization error in learning (convex)
generalized linear models (GLM). Moreover, using the above mentioned stability
properties of dropout, we design dropout based differentially private
algorithms for solving ERMs. The learned GLM thus, preserves privacy of each of
the individual training points while providing accurate predictions for new
test points. Finally, we empirically validate our stability assertions for
dropout in the context of convex ERMs and show that surprisingly, dropout
significantly outperforms (in terms of prediction accuracy) the L2
regularization based methods for several benchmark datasets.
| [
{
"version": "v1",
"created": "Fri, 6 Mar 2015 18:39:53 GMT"
}
] | 2015-03-09T00:00:00 | [
[
"Jain",
"Prateek",
""
],
[
"Kulkarni",
"Vivek",
""
],
[
"Thakurta",
"Abhradeep",
""
],
[
"Williams",
"Oliver",
""
]
] | TITLE: To Drop or Not to Drop: Robustness, Consistency and Differential Privacy
Properties of Dropout
ABSTRACT: Training deep belief networks (DBNs) requires optimizing a non-convex
function with an extremely large number of parameters. Naturally, existing
gradient descent (GD) based methods are prone to arbitrarily poor local minima.
In this paper, we rigorously show that such local minima can be avoided (upto
an approximation error) by using the dropout technique, a widely used heuristic
in this domain. In particular, we show that by randomly dropping a few nodes of
a one-hidden layer neural network, the training objective function, up to a
certain approximation error, decreases by a multiplicative factor.
On the flip side, we show that for training convex empirical risk minimizers
(ERM), dropout in fact acts as a "stabilizer" or regularizer. That is, a simple
dropout based GD method for convex ERMs is stable in the face of arbitrary
changes to any one of the training points. Using the above assertion, we show
that dropout provides fast rates for generalization error in learning (convex)
generalized linear models (GLM). Moreover, using the above mentioned stability
properties of dropout, we design dropout based differentially private
algorithms for solving ERMs. The learned GLM thus, preserves privacy of each of
the individual training points while providing accurate predictions for new
test points. Finally, we empirically validate our stability assertions for
dropout in the context of convex ERMs and show that surprisingly, dropout
significantly outperforms (in terms of prediction accuracy) the L2
regularization based methods for several benchmark datasets.
| no_new_dataset | 0.946597 |
1401.6330 | Li Dong | Li Dong, Furu Wei, Shujie Liu, Ming Zhou, Ke Xu | A Statistical Parsing Framework for Sentiment Classification | Accepted by Computational Linguistics | null | null | null | cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present a statistical parsing framework for sentence-level sentiment
classification in this article. Unlike previous works that employ syntactic
parsing results for sentiment analysis, we develop a statistical parser to
directly analyze the sentiment structure of a sentence. We show that
complicated phenomena in sentiment analysis (e.g., negation, intensification,
and contrast) can be handled the same as simple and straightforward sentiment
expressions in a unified and probabilistic way. We formulate the sentiment
grammar upon Context-Free Grammars (CFGs), and provide a formal description of
the sentiment parsing framework. We develop the parsing model to obtain
possible sentiment parse trees for a sentence, from which the polarity model is
proposed to derive the sentiment strength and polarity, and the ranking model
is dedicated to selecting the best sentiment tree. We train the parser directly
from examples of sentences annotated only with sentiment polarity labels but
without any syntactic annotations or polarity annotations of constituents
within sentences. Therefore we can obtain training data easily. In particular,
we train a sentiment parser, s.parser, from a large amount of review sentences
with users' ratings as rough sentiment polarity labels. Extensive experiments
on existing benchmark datasets show significant improvements over baseline
sentiment classification approaches.
| [
{
"version": "v1",
"created": "Fri, 24 Jan 2014 12:56:36 GMT"
},
{
"version": "v2",
"created": "Thu, 5 Mar 2015 05:26:13 GMT"
}
] | 2015-03-06T00:00:00 | [
[
"Dong",
"Li",
""
],
[
"Wei",
"Furu",
""
],
[
"Liu",
"Shujie",
""
],
[
"Zhou",
"Ming",
""
],
[
"Xu",
"Ke",
""
]
] | TITLE: A Statistical Parsing Framework for Sentiment Classification
ABSTRACT: We present a statistical parsing framework for sentence-level sentiment
classification in this article. Unlike previous works that employ syntactic
parsing results for sentiment analysis, we develop a statistical parser to
directly analyze the sentiment structure of a sentence. We show that
complicated phenomena in sentiment analysis (e.g., negation, intensification,
and contrast) can be handled the same as simple and straightforward sentiment
expressions in a unified and probabilistic way. We formulate the sentiment
grammar upon Context-Free Grammars (CFGs), and provide a formal description of
the sentiment parsing framework. We develop the parsing model to obtain
possible sentiment parse trees for a sentence, from which the polarity model is
proposed to derive the sentiment strength and polarity, and the ranking model
is dedicated to selecting the best sentiment tree. We train the parser directly
from examples of sentences annotated only with sentiment polarity labels but
without any syntactic annotations or polarity annotations of constituents
within sentences. Therefore we can obtain training data easily. In particular,
we train a sentiment parser, s.parser, from a large amount of review sentences
with users' ratings as rough sentiment polarity labels. Extensive experiments
on existing benchmark datasets show significant improvements over baseline
sentiment classification approaches.
| no_new_dataset | 0.951908 |
1406.4625 | Bobak Shahriari | Bobak Shahriari and Ziyu Wang and Matthew W. Hoffman and Alexandre
Bouchard-C\^ot\'e and Nando de Freitas | An Entropy Search Portfolio for Bayesian Optimization | 10 pages, 5 figures | null | null | null | stat.ML cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Bayesian optimization is a sample-efficient method for black-box global
optimization. How- ever, the performance of a Bayesian optimization method very
much depends on its exploration strategy, i.e. the choice of acquisition
function, and it is not clear a priori which choice will result in superior
performance. While portfolio methods provide an effective, principled way of
combining a collection of acquisition functions, they are often based on
measures of past performance which can be misleading. To address this issue, we
introduce the Entropy Search Portfolio (ESP): a novel approach to portfolio
construction which is motivated by information theoretic considerations. We
show that ESP outperforms existing portfolio methods on several real and
synthetic problems, including geostatistical datasets and simulated control
tasks. We not only show that ESP is able to offer performance as good as the
best, but unknown, acquisition function, but surprisingly it often gives better
performance. Finally, over a wide range of conditions we find that ESP is
robust to the inclusion of poor acquisition functions.
| [
{
"version": "v1",
"created": "Wed, 18 Jun 2014 07:26:08 GMT"
},
{
"version": "v2",
"created": "Mon, 27 Oct 2014 23:58:14 GMT"
},
{
"version": "v3",
"created": "Thu, 30 Oct 2014 15:54:56 GMT"
},
{
"version": "v4",
"created": "Wed, 4 Mar 2015 21:25:31 GMT"
}
] | 2015-03-06T00:00:00 | [
[
"Shahriari",
"Bobak",
""
],
[
"Wang",
"Ziyu",
""
],
[
"Hoffman",
"Matthew W.",
""
],
[
"Bouchard-Côté",
"Alexandre",
""
],
[
"de Freitas",
"Nando",
""
]
] | TITLE: An Entropy Search Portfolio for Bayesian Optimization
ABSTRACT: Bayesian optimization is a sample-efficient method for black-box global
optimization. How- ever, the performance of a Bayesian optimization method very
much depends on its exploration strategy, i.e. the choice of acquisition
function, and it is not clear a priori which choice will result in superior
performance. While portfolio methods provide an effective, principled way of
combining a collection of acquisition functions, they are often based on
measures of past performance which can be misleading. To address this issue, we
introduce the Entropy Search Portfolio (ESP): a novel approach to portfolio
construction which is motivated by information theoretic considerations. We
show that ESP outperforms existing portfolio methods on several real and
synthetic problems, including geostatistical datasets and simulated control
tasks. We not only show that ESP is able to offer performance as good as the
best, but unknown, acquisition function, but surprisingly it often gives better
performance. Finally, over a wide range of conditions we find that ESP is
robust to the inclusion of poor acquisition functions.
| no_new_dataset | 0.934991 |
1410.8060 | Paolo Zuliani | Fedor Shmarov, Paolo Zuliani | ProbReach: Verified Probabilistic Delta-Reachability for Stochastic
Hybrid Systems | HSCC 2015 | null | null | null | cs.LO cs.SY | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present ProbReach, a tool for verifying probabilistic reachability for
stochastic hybrid systems, i.e., computing the probability that the system
reaches an unsafe region of the state space. In particular, ProbReach will
compute an arbitrarily small interval which is guaranteed to contain the
required probability. Standard (non-probabilistic) reachability is undecidable
even for linear hybrid systems. In ProbReach we adopt the weaker notion of
delta-reachability, in which the unsafe region is overapproximated by a
user-defined parameter (delta). This choice leads to false alarms, but also
makes the reachability problem decidable for virtually any hybrid system. In
ProbReach we have implemented a probabilistic version of delta-reachability
that is suited for hybrid systems whose stochastic behaviour is given in terms
of random initial conditions. In this paper we introduce the capabilities of
ProbReach, give an overview of the parallel implementation, and present results
for several benchmarks involving highly non-linear hybrid systems.
| [
{
"version": "v1",
"created": "Wed, 29 Oct 2014 17:09:06 GMT"
},
{
"version": "v2",
"created": "Fri, 31 Oct 2014 21:28:30 GMT"
},
{
"version": "v3",
"created": "Thu, 5 Mar 2015 11:29:15 GMT"
}
] | 2015-03-06T00:00:00 | [
[
"Shmarov",
"Fedor",
""
],
[
"Zuliani",
"Paolo",
""
]
] | TITLE: ProbReach: Verified Probabilistic Delta-Reachability for Stochastic
Hybrid Systems
ABSTRACT: We present ProbReach, a tool for verifying probabilistic reachability for
stochastic hybrid systems, i.e., computing the probability that the system
reaches an unsafe region of the state space. In particular, ProbReach will
compute an arbitrarily small interval which is guaranteed to contain the
required probability. Standard (non-probabilistic) reachability is undecidable
even for linear hybrid systems. In ProbReach we adopt the weaker notion of
delta-reachability, in which the unsafe region is overapproximated by a
user-defined parameter (delta). This choice leads to false alarms, but also
makes the reachability problem decidable for virtually any hybrid system. In
ProbReach we have implemented a probabilistic version of delta-reachability
that is suited for hybrid systems whose stochastic behaviour is given in terms
of random initial conditions. In this paper we introduce the capabilities of
ProbReach, give an overview of the parallel implementation, and present results
for several benchmarks involving highly non-linear hybrid systems.
| no_new_dataset | 0.945399 |
1503.01508 | Xiangxin Zhu | Xiangxin Zhu, Carl Vondrick, Charless Fowlkes, Deva Ramanan | Do We Need More Training Data? | null | null | 10.1007/s11263-015-0812-2 | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Datasets for training object recognition systems are steadily increasing in
size. This paper investigates the question of whether existing detectors will
continue to improve as data grows, or saturate in performance due to limited
model complexity and the Bayes risk associated with the feature spaces in which
they operate. We focus on the popular paradigm of discriminatively trained
templates defined on oriented gradient features. We investigate the performance
of mixtures of templates as the number of mixture components and the amount of
training data grows. Surprisingly, even with proper treatment of regularization
and "outliers", the performance of classic mixture models appears to saturate
quickly ($\sim$10 templates and $\sim$100 positive training examples per
template). This is not a limitation of the feature space as compositional
mixtures that share template parameters via parts and that can synthesize new
templates not encountered during training yield significantly better
performance. Based on our analysis, we conjecture that the greatest gains in
detection performance will continue to derive from improved representations and
learning algorithms that can make efficient use of large datasets.
| [
{
"version": "v1",
"created": "Thu, 5 Mar 2015 01:51:12 GMT"
}
] | 2015-03-06T00:00:00 | [
[
"Zhu",
"Xiangxin",
""
],
[
"Vondrick",
"Carl",
""
],
[
"Fowlkes",
"Charless",
""
],
[
"Ramanan",
"Deva",
""
]
] | TITLE: Do We Need More Training Data?
ABSTRACT: Datasets for training object recognition systems are steadily increasing in
size. This paper investigates the question of whether existing detectors will
continue to improve as data grows, or saturate in performance due to limited
model complexity and the Bayes risk associated with the feature spaces in which
they operate. We focus on the popular paradigm of discriminatively trained
templates defined on oriented gradient features. We investigate the performance
of mixtures of templates as the number of mixture components and the amount of
training data grows. Surprisingly, even with proper treatment of regularization
and "outliers", the performance of classic mixture models appears to saturate
quickly ($\sim$10 templates and $\sim$100 positive training examples per
template). This is not a limitation of the feature space as compositional
mixtures that share template parameters via parts and that can synthesize new
templates not encountered during training yield significantly better
performance. Based on our analysis, we conjecture that the greatest gains in
detection performance will continue to derive from improved representations and
learning algorithms that can make efficient use of large datasets.
| no_new_dataset | 0.947186 |
1503.01538 | Natalia Bilenko | Natalia Y. Bilenko and Jack L. Gallant | Pyrcca: regularized kernel canonical correlation analysis in Python and
its applications to neuroimaging | null | null | null | null | q-bio.QM cs.CV stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Canonical correlation analysis (CCA) is a valuable method for interpreting
cross-covariance across related datasets of different dimensionality. There are
many potential applications of CCA to neuroimaging data analysis. For instance,
CCA can be used for finding functional similarities across fMRI datasets
collected from multiple subjects without resampling individual datasets to a
template anatomy. In this paper, we introduce Pyrcca, an open-source Python
module for executing CCA between two or more datasets. Pyrcca can be used to
implement CCA with or without regularization, and with or without linear or a
Gaussian kernelization of the datasets. We demonstrate an application of CCA
implemented with Pyrcca to neuroimaging data analysis. We use CCA to find a
data-driven set of functional response patterns that are similar across
individual subjects in a natural movie experiment. We then demonstrate how this
set of response patterns discovered by CCA can be used to accurately predict
subject responses to novel natural movie stimuli.
| [
{
"version": "v1",
"created": "Thu, 5 Mar 2015 04:57:22 GMT"
}
] | 2015-03-06T00:00:00 | [
[
"Bilenko",
"Natalia Y.",
""
],
[
"Gallant",
"Jack L.",
""
]
] | TITLE: Pyrcca: regularized kernel canonical correlation analysis in Python and
its applications to neuroimaging
ABSTRACT: Canonical correlation analysis (CCA) is a valuable method for interpreting
cross-covariance across related datasets of different dimensionality. There are
many potential applications of CCA to neuroimaging data analysis. For instance,
CCA can be used for finding functional similarities across fMRI datasets
collected from multiple subjects without resampling individual datasets to a
template anatomy. In this paper, we introduce Pyrcca, an open-source Python
module for executing CCA between two or more datasets. Pyrcca can be used to
implement CCA with or without regularization, and with or without linear or a
Gaussian kernelization of the datasets. We demonstrate an application of CCA
implemented with Pyrcca to neuroimaging data analysis. We use CCA to find a
data-driven set of functional response patterns that are similar across
individual subjects in a natural movie experiment. We then demonstrate how this
set of response patterns discovered by CCA can be used to accurately predict
subject responses to novel natural movie stimuli.
| no_new_dataset | 0.939081 |
1503.01543 | Chunhua Shen | Sakrapee Paisitkriangkrai, Chunhua Shen, Anton van den Hengel | Learning to rank in person re-identification with metric ensembles | 10 pages | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose an effective structured learning based approach to the problem of
person re-identification which outperforms the current state-of-the-art on most
benchmark data sets evaluated. Our framework is built on the basis of multiple
low-level hand-crafted and high-level visual features. We then formulate two
optimization algorithms, which directly optimize evaluation measures commonly
used in person re-identification, also known as the Cumulative Matching
Characteristic (CMC) curve. Our new approach is practical to many real-world
surveillance applications as the re-identification performance can be
concentrated in the range of most practical importance. The combination of
these factors leads to a person re-identification system which outperforms most
existing algorithms. More importantly, we advance state-of-the-art results on
person re-identification by improving the rank-$1$ recognition rates from
$40\%$ to $50\%$ on the iLIDS benchmark, $16\%$ to $18\%$ on the PRID2011
benchmark, $43\%$ to $46\%$ on the VIPeR benchmark, $34\%$ to $53\%$ on the
CUHK01 benchmark and $21\%$ to $62\%$ on the CUHK03 benchmark.
| [
{
"version": "v1",
"created": "Thu, 5 Mar 2015 05:25:57 GMT"
}
] | 2015-03-06T00:00:00 | [
[
"Paisitkriangkrai",
"Sakrapee",
""
],
[
"Shen",
"Chunhua",
""
],
[
"Hengel",
"Anton van den",
""
]
] | TITLE: Learning to rank in person re-identification with metric ensembles
ABSTRACT: We propose an effective structured learning based approach to the problem of
person re-identification which outperforms the current state-of-the-art on most
benchmark data sets evaluated. Our framework is built on the basis of multiple
low-level hand-crafted and high-level visual features. We then formulate two
optimization algorithms, which directly optimize evaluation measures commonly
used in person re-identification, also known as the Cumulative Matching
Characteristic (CMC) curve. Our new approach is practical to many real-world
surveillance applications as the re-identification performance can be
concentrated in the range of most practical importance. The combination of
these factors leads to a person re-identification system which outperforms most
existing algorithms. More importantly, we advance state-of-the-art results on
person re-identification by improving the rank-$1$ recognition rates from
$40\%$ to $50\%$ on the iLIDS benchmark, $16\%$ to $18\%$ on the PRID2011
benchmark, $43\%$ to $46\%$ on the VIPeR benchmark, $34\%$ to $53\%$ on the
CUHK01 benchmark and $21\%$ to $62\%$ on the CUHK03 benchmark.
| no_new_dataset | 0.946745 |
1503.01647 | Zhangyang Wang | Zhangyang Wang, Xianming Liu, Shiyu Chang, Jiayu Zhou, Guo-Jun Qi,
Thomas S. Huang | Decentralized Recommender Systems | null | null | null | null | cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper proposes a decentralized recommender system by formulating the
popular collaborative filleting (CF) model into a decentralized matrix
completion form over a set of users. In such a way, data storages and
computations are fully distributed. Each user could exchange limited
information with its local neighborhood, and thus it avoids the centralized
fusion. Advantages of the proposed system include a protection on user privacy,
as well as better scalability and robustness. We compare our proposed algorithm
with several state-of-the-art algorithms on the FlickerUserFavor dataset, and
demonstrate that the decentralized algorithm can gain a competitive performance
to others.
| [
{
"version": "v1",
"created": "Thu, 5 Mar 2015 14:34:02 GMT"
}
] | 2015-03-06T00:00:00 | [
[
"Wang",
"Zhangyang",
""
],
[
"Liu",
"Xianming",
""
],
[
"Chang",
"Shiyu",
""
],
[
"Zhou",
"Jiayu",
""
],
[
"Qi",
"Guo-Jun",
""
],
[
"Huang",
"Thomas S.",
""
]
] | TITLE: Decentralized Recommender Systems
ABSTRACT: This paper proposes a decentralized recommender system by formulating the
popular collaborative filleting (CF) model into a decentralized matrix
completion form over a set of users. In such a way, data storages and
computations are fully distributed. Each user could exchange limited
information with its local neighborhood, and thus it avoids the centralized
fusion. Advantages of the proposed system include a protection on user privacy,
as well as better scalability and robustness. We compare our proposed algorithm
with several state-of-the-art algorithms on the FlickerUserFavor dataset, and
demonstrate that the decentralized algorithm can gain a competitive performance
to others.
| no_new_dataset | 0.949059 |
1503.01657 | Rui Zeng | Rui Zeng, Jiasong Wu, Zhuhong Shao, Yang Chen, Lotfi Senhadji,
Huazhong Shu | Color Image Classification via Quaternion Principal Component Analysis
Network | 9 figures,5 tables | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The Principal Component Analysis Network (PCANet), which is one of the
recently proposed deep learning architectures, achieves the state-of-the-art
classification accuracy in various databases. However, the performance of
PCANet may be degraded when dealing with color images. In this paper, a
Quaternion Principal Component Analysis Network (QPCANet), which is an
extension of PCANet, is proposed for color images classification. Compared to
PCANet, the proposed QPCANet takes into account the spatial distribution
information of color images and ensures larger amount of intra-class invariance
of color images. Experiments conducted on different color image datasets such
as Caltech-101, UC Merced Land Use, Georgia Tech face and CURet have revealed
that the proposed QPCANet achieves higher classification accuracy than PCANet.
| [
{
"version": "v1",
"created": "Thu, 5 Mar 2015 15:12:28 GMT"
}
] | 2015-03-06T00:00:00 | [
[
"Zeng",
"Rui",
""
],
[
"Wu",
"Jiasong",
""
],
[
"Shao",
"Zhuhong",
""
],
[
"Chen",
"Yang",
""
],
[
"Senhadji",
"Lotfi",
""
],
[
"Shu",
"Huazhong",
""
]
] | TITLE: Color Image Classification via Quaternion Principal Component Analysis
Network
ABSTRACT: The Principal Component Analysis Network (PCANet), which is one of the
recently proposed deep learning architectures, achieves the state-of-the-art
classification accuracy in various databases. However, the performance of
PCANet may be degraded when dealing with color images. In this paper, a
Quaternion Principal Component Analysis Network (QPCANet), which is an
extension of PCANet, is proposed for color images classification. Compared to
PCANet, the proposed QPCANet takes into account the spatial distribution
information of color images and ensures larger amount of intra-class invariance
of color images. Experiments conducted on different color image datasets such
as Caltech-101, UC Merced Land Use, Georgia Tech face and CURet have revealed
that the proposed QPCANet achieves higher classification accuracy than PCANet.
| no_new_dataset | 0.952838 |
1503.01737 | Ping Li | Ping Li | Min-Max Kernels | null | null | null | null | stat.ML cs.LG stat.CO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The min-max kernel is a generalization of the popular resemblance kernel
(which is designed for binary data). In this paper, we demonstrate, through an
extensive classification study using kernel machines, that the min-max kernel
often provides an effective measure of similarity for nonnegative data. As the
min-max kernel is nonlinear and might be difficult to be used for industrial
applications with massive data, we show that the min-max kernel can be
linearized via hashing techniques. This allows practitioners to apply min-max
kernel to large-scale applications using well matured linear algorithms such as
linear SVM or logistic regression.
The previous remarkable work on consistent weighted sampling (CWS) produces
samples in the form of ($i^*, t^*$) where the $i^*$ records the location (and
in fact also the weights) information analogous to the samples produced by
classical minwise hashing on binary data. Because the $t^*$ is theoretically
unbounded, it was not immediately clear how to effectively implement CWS for
building large-scale linear classifiers. In this paper, we provide a simple
solution by discarding $t^*$ (which we refer to as the "0-bit" scheme). Via an
extensive empirical study, we show that this 0-bit scheme does not lose
essential information. We then apply the "0-bit" CWS for building linear
classifiers to approximate min-max kernel classifiers, as extensively validated
on a wide range of publicly available classification datasets. We expect this
work will generate interests among data mining practitioners who would like to
efficiently utilize the nonlinear information of non-binary and nonnegative
data.
| [
{
"version": "v1",
"created": "Thu, 5 Mar 2015 19:29:03 GMT"
}
] | 2015-03-06T00:00:00 | [
[
"Li",
"Ping",
""
]
] | TITLE: Min-Max Kernels
ABSTRACT: The min-max kernel is a generalization of the popular resemblance kernel
(which is designed for binary data). In this paper, we demonstrate, through an
extensive classification study using kernel machines, that the min-max kernel
often provides an effective measure of similarity for nonnegative data. As the
min-max kernel is nonlinear and might be difficult to be used for industrial
applications with massive data, we show that the min-max kernel can be
linearized via hashing techniques. This allows practitioners to apply min-max
kernel to large-scale applications using well matured linear algorithms such as
linear SVM or logistic regression.
The previous remarkable work on consistent weighted sampling (CWS) produces
samples in the form of ($i^*, t^*$) where the $i^*$ records the location (and
in fact also the weights) information analogous to the samples produced by
classical minwise hashing on binary data. Because the $t^*$ is theoretically
unbounded, it was not immediately clear how to effectively implement CWS for
building large-scale linear classifiers. In this paper, we provide a simple
solution by discarding $t^*$ (which we refer to as the "0-bit" scheme). Via an
extensive empirical study, we show that this 0-bit scheme does not lose
essential information. We then apply the "0-bit" CWS for building linear
classifiers to approximate min-max kernel classifiers, as extensively validated
on a wide range of publicly available classification datasets. We expect this
work will generate interests among data mining practitioners who would like to
efficiently utilize the nonlinear information of non-binary and nonnegative
data.
| no_new_dataset | 0.947235 |
1503.01156 | David Felber | David Felber and Rafail Ostrovsky | A randomized online quantile summary in $O(\frac{1}{\varepsilon} \log
\frac{1}{\varepsilon})$ words | slight fixes to version submitted to ICALP 2015--mistake in time
complexity, and a few minor numeric miscalculations in section 3 | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A quantile summary is a data structure that approximates to
$\varepsilon$-relative error the order statistics of a much larger underlying
dataset.
In this paper we develop a randomized online quantile summary for the cash
register data input model and comparison data domain model that uses
$O(\frac{1}{\varepsilon} \log \frac{1}{\varepsilon})$ words of memory. This
improves upon the previous best upper bound of $O(\frac{1}{\varepsilon}
\log^{3/2} \frac{1}{\varepsilon})$ by Agarwal et. al. (PODS 2012). Further, by
a lower bound of Hung and Ting (FAW 2010) no deterministic summary for the
comparison model can outperform our randomized summary in terms of space
complexity. Lastly, our summary has the nice property that
$O(\frac{1}{\varepsilon} \log \frac{1}{\varepsilon})$ words suffice to ensure
that the success probability is $1 - e^{-\text{poly}(1/\varepsilon)}$.
| [
{
"version": "v1",
"created": "Tue, 3 Mar 2015 22:58:55 GMT"
}
] | 2015-03-05T00:00:00 | [
[
"Felber",
"David",
""
],
[
"Ostrovsky",
"Rafail",
""
]
] | TITLE: A randomized online quantile summary in $O(\frac{1}{\varepsilon} \log
\frac{1}{\varepsilon})$ words
ABSTRACT: A quantile summary is a data structure that approximates to
$\varepsilon$-relative error the order statistics of a much larger underlying
dataset.
In this paper we develop a randomized online quantile summary for the cash
register data input model and comparison data domain model that uses
$O(\frac{1}{\varepsilon} \log \frac{1}{\varepsilon})$ words of memory. This
improves upon the previous best upper bound of $O(\frac{1}{\varepsilon}
\log^{3/2} \frac{1}{\varepsilon})$ by Agarwal et. al. (PODS 2012). Further, by
a lower bound of Hung and Ting (FAW 2010) no deterministic summary for the
comparison model can outperform our randomized summary in terms of space
complexity. Lastly, our summary has the nice property that
$O(\frac{1}{\varepsilon} \log \frac{1}{\varepsilon})$ words suffice to ensure
that the success probability is $1 - e^{-\text{poly}(1/\varepsilon)}$.
| no_new_dataset | 0.944485 |
1503.01210 | Borhan Sanandaji | Borhan M. Sanandaji, Akin Tascikaraoglu, Kameshwar Poolla, and Pravin
Varaiya | Low-dimensional Models in Spatio-Temporal Wind Speed Forecasting | Initially submitted for review to the 2015 American Control
Conference on September 22, 2014; Accepted for publication on January 22,
2015 | null | null | null | cs.SY stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Integrating wind power into the grid is challenging because of its random
nature. Integration is facilitated with accurate short-term forecasts of wind
power. The paper presents a spatio-temporal wind speed forecasting algorithm
that incorporates the time series data of a target station and data of
surrounding stations. Inspired by Compressive Sensing (CS) and
structured-sparse recovery algorithms, we claim that there usually exists an
intrinsic low-dimensional structure governing a large collection of stations
that should be exploited. We cast the forecasting problem as recovery of a
block-sparse signal $\boldsymbol{x}$ from a set of linear equations
$\boldsymbol{b} = A\boldsymbol{x}$ for which we propose novel structure-sparse
recovery algorithms. Results of a case study in the east coast show that the
proposed Compressive Spatio-Temporal Wind Speed Forecasting (CST-WSF) algorithm
significantly improves the short-term forecasts compared to a set of
widely-used benchmark models.
| [
{
"version": "v1",
"created": "Wed, 4 Mar 2015 04:00:19 GMT"
}
] | 2015-03-05T00:00:00 | [
[
"Sanandaji",
"Borhan M.",
""
],
[
"Tascikaraoglu",
"Akin",
""
],
[
"Poolla",
"Kameshwar",
""
],
[
"Varaiya",
"Pravin",
""
]
] | TITLE: Low-dimensional Models in Spatio-Temporal Wind Speed Forecasting
ABSTRACT: Integrating wind power into the grid is challenging because of its random
nature. Integration is facilitated with accurate short-term forecasts of wind
power. The paper presents a spatio-temporal wind speed forecasting algorithm
that incorporates the time series data of a target station and data of
surrounding stations. Inspired by Compressive Sensing (CS) and
structured-sparse recovery algorithms, we claim that there usually exists an
intrinsic low-dimensional structure governing a large collection of stations
that should be exploited. We cast the forecasting problem as recovery of a
block-sparse signal $\boldsymbol{x}$ from a set of linear equations
$\boldsymbol{b} = A\boldsymbol{x}$ for which we propose novel structure-sparse
recovery algorithms. Results of a case study in the east coast show that the
proposed Compressive Spatio-Temporal Wind Speed Forecasting (CST-WSF) algorithm
significantly improves the short-term forecasts compared to a set of
widely-used benchmark models.
| no_new_dataset | 0.940898 |
1503.01228 | Kui Tang | Kui Tang, Nicholas Ruozzi, David Belanger, Tony Jebara | Bethe Learning of Conditional Random Fields via MAP Decoding | 19 pages (9 supplementary), 10 figures (3 supplementary) | null | null | null | cs.LG cs.CV stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Many machine learning tasks can be formulated in terms of predicting
structured outputs. In frameworks such as the structured support vector machine
(SVM-Struct) and the structured perceptron, discriminative functions are
learned by iteratively applying efficient maximum a posteriori (MAP) decoding.
However, maximum likelihood estimation (MLE) of probabilistic models over these
same structured spaces requires computing partition functions, which is
generally intractable. This paper presents a method for learning discrete
exponential family models using the Bethe approximation to the MLE. Remarkably,
this problem also reduces to iterative (MAP) decoding. This connection emerges
by combining the Bethe approximation with a Frank-Wolfe (FW) algorithm on a
convex dual objective which circumvents the intractable partition function. The
result is a new single loop algorithm MLE-Struct, which is substantially more
efficient than previous double-loop methods for approximate maximum likelihood
estimation. Our algorithm outperforms existing methods in experiments involving
image segmentation, matching problems from vision, and a new dataset of
university roommate assignments.
| [
{
"version": "v1",
"created": "Wed, 4 Mar 2015 05:41:29 GMT"
}
] | 2015-03-05T00:00:00 | [
[
"Tang",
"Kui",
""
],
[
"Ruozzi",
"Nicholas",
""
],
[
"Belanger",
"David",
""
],
[
"Jebara",
"Tony",
""
]
] | TITLE: Bethe Learning of Conditional Random Fields via MAP Decoding
ABSTRACT: Many machine learning tasks can be formulated in terms of predicting
structured outputs. In frameworks such as the structured support vector machine
(SVM-Struct) and the structured perceptron, discriminative functions are
learned by iteratively applying efficient maximum a posteriori (MAP) decoding.
However, maximum likelihood estimation (MLE) of probabilistic models over these
same structured spaces requires computing partition functions, which is
generally intractable. This paper presents a method for learning discrete
exponential family models using the Bethe approximation to the MLE. Remarkably,
this problem also reduces to iterative (MAP) decoding. This connection emerges
by combining the Bethe approximation with a Frank-Wolfe (FW) algorithm on a
convex dual objective which circumvents the intractable partition function. The
result is a new single loop algorithm MLE-Struct, which is substantially more
efficient than previous double-loop methods for approximate maximum likelihood
estimation. Our algorithm outperforms existing methods in experiments involving
image segmentation, matching problems from vision, and a new dataset of
university roommate assignments.
| new_dataset | 0.967808 |
1503.01393 | Mete Ozay | Mete Ozay, Krzysztof Walas, Ales Leonardis | A Hierarchical Approach for Joint Multi-view Object Pose Estimation and
Categorization | 7 Figures | Proceedings of IEEE International Conference on Robotics and
Automation (ICRA), pp. 5480 - 5487, Hong Kong, 2014 | 10.1109/ICRA.2014.6907665 | null | cs.CV cs.RO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose a joint object pose estimation and categorization approach which
extracts information about object poses and categories from the object parts
and compositions constructed at different layers of a hierarchical object
representation algorithm, namely Learned Hierarchy of Parts (LHOP). In the
proposed approach, we first employ the LHOP to learn hierarchical part
libraries which represent entity parts and compositions across different object
categories and views. Then, we extract statistical and geometric features from
the part realizations of the objects in the images in order to represent the
information about object pose and category at each different layer of the
hierarchy. Unlike the traditional approaches which consider specific layers of
the hierarchies in order to extract information to perform specific tasks, we
combine the information extracted at different layers to solve a joint object
pose estimation and categorization problem using distributed optimization
algorithms. We examine the proposed generative-discriminative learning approach
and the algorithms on two benchmark 2-D multi-view image datasets. The proposed
approach and the algorithms outperform state-of-the-art classification,
regression and feature extraction algorithms. In addition, the experimental
results shed light on the relationship between object categorization, pose
estimation and the part realizations observed at different layers of the
hierarchy.
| [
{
"version": "v1",
"created": "Wed, 4 Mar 2015 17:17:48 GMT"
}
] | 2015-03-05T00:00:00 | [
[
"Ozay",
"Mete",
""
],
[
"Walas",
"Krzysztof",
""
],
[
"Leonardis",
"Ales",
""
]
] | TITLE: A Hierarchical Approach for Joint Multi-view Object Pose Estimation and
Categorization
ABSTRACT: We propose a joint object pose estimation and categorization approach which
extracts information about object poses and categories from the object parts
and compositions constructed at different layers of a hierarchical object
representation algorithm, namely Learned Hierarchy of Parts (LHOP). In the
proposed approach, we first employ the LHOP to learn hierarchical part
libraries which represent entity parts and compositions across different object
categories and views. Then, we extract statistical and geometric features from
the part realizations of the objects in the images in order to represent the
information about object pose and category at each different layer of the
hierarchy. Unlike the traditional approaches which consider specific layers of
the hierarchies in order to extract information to perform specific tasks, we
combine the information extracted at different layers to solve a joint object
pose estimation and categorization problem using distributed optimization
algorithms. We examine the proposed generative-discriminative learning approach
and the algorithms on two benchmark 2-D multi-view image datasets. The proposed
approach and the algorithms outperform state-of-the-art classification,
regression and feature extraction algorithms. In addition, the experimental
results shed light on the relationship between object categorization, pose
estimation and the part realizations observed at different layers of the
hierarchy.
| no_new_dataset | 0.946001 |
1412.8504 | Diego Amancio | Diego R. Amancio | Probing the topological properties of complex networks modeling short
written texts | null | PLoS ONE 10(2): e0118394, 2015 | 10.1371/journal.pone.0118394 | null | cs.CL physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In recent years, graph theory has been widely employed to probe several
language properties. More specifically, the so-called word adjacency model has
been proven useful for tackling several practical problems, especially those
relying on textual stylistic analysis. The most common approach to treat texts
as networks has simply considered either large pieces of texts or entire books.
This approach has certainly worked well -- many informative discoveries have
been made this way -- but it raises an uncomfortable question: could there be
important topological patterns in small pieces of texts? To address this
problem, the topological properties of subtexts sampled from entire books was
probed. Statistical analyzes performed on a dataset comprising 50 novels
revealed that most of the traditional topological measurements are stable for
short subtexts. When the performance of the authorship recognition task was
analyzed, it was found that a proper sampling yields a discriminability similar
to the one found with full texts. Surprisingly, the support vector machine
classification based on the characterization of short texts outperformed the
one performed with entire books. These findings suggest that a local
topological analysis of large documents might improve its global
characterization. Most importantly, it was verified, as a proof of principle,
that short texts can be analyzed with the methods and concepts of complex
networks. As a consequence, the techniques described here can be extended in a
straightforward fashion to analyze texts as time-varying complex networks.
| [
{
"version": "v1",
"created": "Mon, 29 Dec 2014 23:09:13 GMT"
}
] | 2015-03-04T00:00:00 | [
[
"Amancio",
"Diego R.",
""
]
] | TITLE: Probing the topological properties of complex networks modeling short
written texts
ABSTRACT: In recent years, graph theory has been widely employed to probe several
language properties. More specifically, the so-called word adjacency model has
been proven useful for tackling several practical problems, especially those
relying on textual stylistic analysis. The most common approach to treat texts
as networks has simply considered either large pieces of texts or entire books.
This approach has certainly worked well -- many informative discoveries have
been made this way -- but it raises an uncomfortable question: could there be
important topological patterns in small pieces of texts? To address this
problem, the topological properties of subtexts sampled from entire books was
probed. Statistical analyzes performed on a dataset comprising 50 novels
revealed that most of the traditional topological measurements are stable for
short subtexts. When the performance of the authorship recognition task was
analyzed, it was found that a proper sampling yields a discriminability similar
to the one found with full texts. Surprisingly, the support vector machine
classification based on the characterization of short texts outperformed the
one performed with entire books. These findings suggest that a local
topological analysis of large documents might improve its global
characterization. Most importantly, it was verified, as a proof of principle,
that short texts can be analyzed with the methods and concepts of complex
networks. As a consequence, the techniques described here can be extended in a
straightforward fashion to analyze texts as time-varying complex networks.
| no_new_dataset | 0.934694 |
1501.04560 | Yanwei Fu | Yanwei Fu, Timothy M. Hospedales, Tao Xiang and Shaogang Gong | Transductive Multi-view Zero-Shot Learning | accepted by IEEE TPAMI, more info and longer report will be available
in :http://www.eecs.qmul.ac.uk/~yf300/embedding/index.html | null | 10.1109/TPAMI.2015.2408354 | null | cs.CV cs.DS cs.MM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Most existing zero-shot learning approaches exploit transfer learning via an
intermediate-level semantic representation shared between an annotated
auxiliary dataset and a target dataset with different classes and no
annotation. A projection from a low-level feature space to the semantic
representation space is learned from the auxiliary dataset and is applied
without adaptation to the target dataset. In this paper we identify two
inherent limitations with these approaches. First, due to having disjoint and
potentially unrelated classes, the projection functions learned from the
auxiliary dataset/domain are biased when applied directly to the target
dataset/domain. We call this problem the projection domain shift problem and
propose a novel framework, transductive multi-view embedding, to solve it. The
second limitation is the prototype sparsity problem which refers to the fact
that for each target class, only a single prototype is available for zero-shot
learning given a semantic representation. To overcome this problem, a novel
heterogeneous multi-view hypergraph label propagation method is formulated for
zero-shot learning in the transductive embedding space. It effectively exploits
the complementary information offered by different semantic representations and
takes advantage of the manifold structures of multiple representation spaces in
a coherent manner. We demonstrate through extensive experiments that the
proposed approach (1) rectifies the projection shift between the auxiliary and
target domains, (2) exploits the complementarity of multiple semantic
representations, (3) significantly outperforms existing methods for both
zero-shot and N-shot recognition on three image and video benchmark datasets,
and (4) enables novel cross-view annotation tasks.
| [
{
"version": "v1",
"created": "Mon, 19 Jan 2015 17:04:11 GMT"
},
{
"version": "v2",
"created": "Tue, 3 Mar 2015 04:43:44 GMT"
}
] | 2015-03-04T00:00:00 | [
[
"Fu",
"Yanwei",
""
],
[
"Hospedales",
"Timothy M.",
""
],
[
"Xiang",
"Tao",
""
],
[
"Gong",
"Shaogang",
""
]
] | TITLE: Transductive Multi-view Zero-Shot Learning
ABSTRACT: Most existing zero-shot learning approaches exploit transfer learning via an
intermediate-level semantic representation shared between an annotated
auxiliary dataset and a target dataset with different classes and no
annotation. A projection from a low-level feature space to the semantic
representation space is learned from the auxiliary dataset and is applied
without adaptation to the target dataset. In this paper we identify two
inherent limitations with these approaches. First, due to having disjoint and
potentially unrelated classes, the projection functions learned from the
auxiliary dataset/domain are biased when applied directly to the target
dataset/domain. We call this problem the projection domain shift problem and
propose a novel framework, transductive multi-view embedding, to solve it. The
second limitation is the prototype sparsity problem which refers to the fact
that for each target class, only a single prototype is available for zero-shot
learning given a semantic representation. To overcome this problem, a novel
heterogeneous multi-view hypergraph label propagation method is formulated for
zero-shot learning in the transductive embedding space. It effectively exploits
the complementary information offered by different semantic representations and
takes advantage of the manifold structures of multiple representation spaces in
a coherent manner. We demonstrate through extensive experiments that the
proposed approach (1) rectifies the projection shift between the auxiliary and
target domains, (2) exploits the complementarity of multiple semantic
representations, (3) significantly outperforms existing methods for both
zero-shot and N-shot recognition on three image and video benchmark datasets,
and (4) enables novel cross-view annotation tasks.
| no_new_dataset | 0.946843 |
1502.06797 | Christian David | Albert Cohen (LPMC), Ronald Devore (TAMU) | Approximation of high-dimensional parametric PDEs | null | null | null | null | math.AP cs.NA math.NA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Parametrized families of PDEs arise in various contexts such as inverse
problems, control and optimization, risk assessment, and uncertainty
quantification. In most of these applications, the number of parameters is
large or perhaps even infinite. Thus, the development of numerical methods for
these parametric problems is faced with the possible curse of dimensionality.
This article is directed at (i) identifying and understanding which properties
of parametric equations allow one to avoid this curse and (ii) developing and
analyzing effective numerical methodd which fully exploit these properties and,
in turn, are immune to the growth in dimensionality. The first part of this
article studies the smoothness and approximability of the solution map, that
is, the map $a\mapsto u(a)$ where $a$ is the parameter value and $u(a)$ is the
corresponding solution to the PDE. It is shown that for many relevant
parametric PDEs, the parametric smoothness of this map is typically holomorphic
and also highly anisotropic in that the relevant parameters are of widely
varying importance in describing the solution. These two properties are then
exploited to establish convergence rates of $n$-term approximations to the
solution map for which each term is separable in the parametric and physical
variables. These results reveal that, at least on a theoretical level, the
solution map can be well approximated by discretizations of moderate
complexity, thereby showing how the curse of dimensionality is broken. This
theoretical analysis is carried out through concepts of approximation theory
such as best $n$-term approximation, sparsity, and $n$-widths. These notions
determine a priori the best possible performance of numerical methods and thus
serve as a benchmark for concrete algorithms. The second part of this article
turns to the development of numerical algorithms based on the theoretically
established sparse separable approximations. The numerical methods studied fall
into two general categories. The first uses polynomial expansions in terms of
the parameters to approximate the solution map. The second one searches for
suitable low dimensional spaces for simultaneously approximating all members of
the parametric family. The numerical implementation of these approaches is
carried out through adaptive and greedy algorithms. An a priori analysis of the
performance of these algorithms establishes how well they meet the theoretical
benchmarks.
| [
{
"version": "v1",
"created": "Tue, 24 Feb 2015 13:10:32 GMT"
},
{
"version": "v2",
"created": "Tue, 3 Mar 2015 14:09:11 GMT"
}
] | 2015-03-04T00:00:00 | [
[
"Cohen",
"Albert",
"",
"LPMC"
],
[
"Devore",
"Ronald",
"",
"TAMU"
]
] | TITLE: Approximation of high-dimensional parametric PDEs
ABSTRACT: Parametrized families of PDEs arise in various contexts such as inverse
problems, control and optimization, risk assessment, and uncertainty
quantification. In most of these applications, the number of parameters is
large or perhaps even infinite. Thus, the development of numerical methods for
these parametric problems is faced with the possible curse of dimensionality.
This article is directed at (i) identifying and understanding which properties
of parametric equations allow one to avoid this curse and (ii) developing and
analyzing effective numerical methodd which fully exploit these properties and,
in turn, are immune to the growth in dimensionality. The first part of this
article studies the smoothness and approximability of the solution map, that
is, the map $a\mapsto u(a)$ where $a$ is the parameter value and $u(a)$ is the
corresponding solution to the PDE. It is shown that for many relevant
parametric PDEs, the parametric smoothness of this map is typically holomorphic
and also highly anisotropic in that the relevant parameters are of widely
varying importance in describing the solution. These two properties are then
exploited to establish convergence rates of $n$-term approximations to the
solution map for which each term is separable in the parametric and physical
variables. These results reveal that, at least on a theoretical level, the
solution map can be well approximated by discretizations of moderate
complexity, thereby showing how the curse of dimensionality is broken. This
theoretical analysis is carried out through concepts of approximation theory
such as best $n$-term approximation, sparsity, and $n$-widths. These notions
determine a priori the best possible performance of numerical methods and thus
serve as a benchmark for concrete algorithms. The second part of this article
turns to the development of numerical algorithms based on the theoretically
established sparse separable approximations. The numerical methods studied fall
into two general categories. The first uses polynomial expansions in terms of
the parameters to approximate the solution map. The second one searches for
suitable low dimensional spaces for simultaneously approximating all members of
the parametric family. The numerical implementation of these approaches is
carried out through adaptive and greedy algorithms. An a priori analysis of the
performance of these algorithms establishes how well they meet the theoretical
benchmarks.
| no_new_dataset | 0.939637 |
1503.00787 | Davide Modolo | Davide Modolo, Alexander Vezhnevets, Vittorio Ferrari | Context Forest for efficient object detection with large mixture models | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present Context Forest (ConF), a technique for predicting properties of
the objects in an image based on its global appearance. Compared to standard
nearest-neighbour techniques, ConF is more accurate, fast and memory efficient.
We train ConF to predict which aspects of an object class are likely to appear
in a given image (e.g. which viewpoint). This enables to speed-up
multi-component object detectors, by automatically selecting the most relevant
components to run on that image. This is particularly useful for detectors
trained from large datasets, which typically need many components to fully
absorb the data and reach their peak performance. ConF provides a speed-up of
2x for the DPM detector [1] and of 10x for the EE-SVM detector [2]. To show
ConF's generality, we also train it to predict at which locations objects are
likely to appear in an image. Incorporating this information in the detector
score improves mAP performance by about 2% by removing false positive
detections in unlikely locations.
| [
{
"version": "v1",
"created": "Tue, 3 Mar 2015 00:20:58 GMT"
}
] | 2015-03-04T00:00:00 | [
[
"Modolo",
"Davide",
""
],
[
"Vezhnevets",
"Alexander",
""
],
[
"Ferrari",
"Vittorio",
""
]
] | TITLE: Context Forest for efficient object detection with large mixture models
ABSTRACT: We present Context Forest (ConF), a technique for predicting properties of
the objects in an image based on its global appearance. Compared to standard
nearest-neighbour techniques, ConF is more accurate, fast and memory efficient.
We train ConF to predict which aspects of an object class are likely to appear
in a given image (e.g. which viewpoint). This enables to speed-up
multi-component object detectors, by automatically selecting the most relevant
components to run on that image. This is particularly useful for detectors
trained from large datasets, which typically need many components to fully
absorb the data and reach their peak performance. ConF provides a speed-up of
2x for the DPM detector [1] and of 10x for the EE-SVM detector [2]. To show
ConF's generality, we also train it to predict at which locations objects are
likely to appear in an image. Incorporating this information in the detector
score improves mAP performance by about 2% by removing false positive
detections in unlikely locations.
| no_new_dataset | 0.953837 |
1503.00849 | Sutanay Choudhury | Sutanay Choudhury, Lawrence Holder, George Chin, Khushbu Agarwal, John
Feo | A Selectivity based approach to Continuous Pattern Detection in
Streaming Graphs | in 18th International Conference on Extending Database Technology
(EDBT) (2015) | null | null | null | cs.DB | http://creativecommons.org/licenses/publicdomain/ | Cyber security is one of the most significant technical challenges in current
times. Detecting adversarial activities, prevention of theft of intellectual
properties and customer data is a high priority for corporations and government
agencies around the world. Cyber defenders need to analyze massive-scale,
high-resolution network flows to identify, categorize, and mitigate attacks
involving networks spanning institutional and national boundaries. Many of the
cyber attacks can be described as subgraph patterns, with prominent examples
being insider infiltrations (path queries), denial of service (parallel paths)
and malicious spreads (tree queries). This motivates us to explore subgraph
matching on streaming graphs in a continuous setting. The novelty of our work
lies in using the subgraph distributional statistics collected from the
streaming graph to determine the query processing strategy. We introduce a
"Lazy Search" algorithm where the search strategy is decided on a
vertex-to-vertex basis depending on the likelihood of a match in the vertex
neighborhood. We also propose a metric named "Relative Selectivity" that is
used to select between different query processing strategies. Our experiments
performed on real online news, network traffic stream and a synthetic social
network benchmark demonstrate 10-100x speedups over selectivity agnostic
approaches.
| [
{
"version": "v1",
"created": "Tue, 3 Mar 2015 08:11:27 GMT"
}
] | 2015-03-04T00:00:00 | [
[
"Choudhury",
"Sutanay",
""
],
[
"Holder",
"Lawrence",
""
],
[
"Chin",
"George",
""
],
[
"Agarwal",
"Khushbu",
""
],
[
"Feo",
"John",
""
]
] | TITLE: A Selectivity based approach to Continuous Pattern Detection in
Streaming Graphs
ABSTRACT: Cyber security is one of the most significant technical challenges in current
times. Detecting adversarial activities, prevention of theft of intellectual
properties and customer data is a high priority for corporations and government
agencies around the world. Cyber defenders need to analyze massive-scale,
high-resolution network flows to identify, categorize, and mitigate attacks
involving networks spanning institutional and national boundaries. Many of the
cyber attacks can be described as subgraph patterns, with prominent examples
being insider infiltrations (path queries), denial of service (parallel paths)
and malicious spreads (tree queries). This motivates us to explore subgraph
matching on streaming graphs in a continuous setting. The novelty of our work
lies in using the subgraph distributional statistics collected from the
streaming graph to determine the query processing strategy. We introduce a
"Lazy Search" algorithm where the search strategy is decided on a
vertex-to-vertex basis depending on the likelihood of a match in the vertex
neighborhood. We also propose a metric named "Relative Selectivity" that is
used to select between different query processing strategies. Our experiments
performed on real online news, network traffic stream and a synthetic social
network benchmark demonstrate 10-100x speedups over selectivity agnostic
approaches.
| no_new_dataset | 0.941385 |
1503.00923 | Prasant Misra | Prasant Misra, Vasanth Rajaraman, Kumaresh Dhotrad, Jay Warrior,
Yogesh Simmhan | An Interoperable Realization of Smart Cities with Plug and Play based
Device Management | arXiv admin note: text overlap with arXiv:1502.00797 | null | null | null | cs.SY | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The primal problem with Internet of Things (IoT) solutions for smart cities
is the lack of interoperability at various levels, and more predominately at
the device level. While there exist multitude of platforms from multiple
manufacturers, the existing ecosystem still remains highly closed. In this
paper, we propose SNaaS or Sensor/Network as a Service: a service layer that
enables the creation of the plug-n-play infrastructure, across platforms from
multiple vendors, necessary for interoperability and successful deployment of
large-scale city wide systems. In order to correctly position the new service
layer, we present a high level reference IoT architecture for smart city
implementations, and follow it up with the workflow details of SNaaS along with
preliminary microbenchmarks.
| [
{
"version": "v1",
"created": "Tue, 3 Mar 2015 12:46:12 GMT"
}
] | 2015-03-04T00:00:00 | [
[
"Misra",
"Prasant",
""
],
[
"Rajaraman",
"Vasanth",
""
],
[
"Dhotrad",
"Kumaresh",
""
],
[
"Warrior",
"Jay",
""
],
[
"Simmhan",
"Yogesh",
""
]
] | TITLE: An Interoperable Realization of Smart Cities with Plug and Play based
Device Management
ABSTRACT: The primal problem with Internet of Things (IoT) solutions for smart cities
is the lack of interoperability at various levels, and more predominately at
the device level. While there exist multitude of platforms from multiple
manufacturers, the existing ecosystem still remains highly closed. In this
paper, we propose SNaaS or Sensor/Network as a Service: a service layer that
enables the creation of the plug-n-play infrastructure, across platforms from
multiple vendors, necessary for interoperability and successful deployment of
large-scale city wide systems. In order to correctly position the new service
layer, we present a high level reference IoT architecture for smart city
implementations, and follow it up with the workflow details of SNaaS along with
preliminary microbenchmarks.
| no_new_dataset | 0.947769 |
1503.00980 | Jin-Kao Hao | Xiangjing Lai and Jin-Kao Hao | On memetic search for the max-mean dispersion problem | 22 pages | null | null | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Given a set $V$ of $n$ elements and a distance matrix $[d_{ij}]_{n\times n}$
among elements, the max-mean dispersion problem (MaxMeanDP) consists in
selecting a subset $M$ from $V$ such that the mean dispersion (or distance)
among the selected elements is maximized. Being a useful model to formulate
several relevant applications, MaxMeanDP is known to be NP-hard and thus
computationally difficult. In this paper, we present a highly effective memetic
algorithm for MaxMeanDP which relies on solution recombination and local
optimization to find high quality solutions. Computational experiments on the
set of 160 benchmark instances with up to 1000 elements commonly used in the
literature show that the proposed algorithm improves or matches the published
best known results for all instances in a short computing time, with only one
exception, while achieving a high success rate of 100\%. In particular, we
improve 59 previous best results out of the 60 most challenging instances.
Results on a set of 40 new large instances with 3000 and 5000 elements are also
presented. The key ingredients of the proposed algorithm are investigated to
shed light on how they affect the performance of the algorithm.
| [
{
"version": "v1",
"created": "Tue, 3 Mar 2015 15:43:36 GMT"
}
] | 2015-03-04T00:00:00 | [
[
"Lai",
"Xiangjing",
""
],
[
"Hao",
"Jin-Kao",
""
]
] | TITLE: On memetic search for the max-mean dispersion problem
ABSTRACT: Given a set $V$ of $n$ elements and a distance matrix $[d_{ij}]_{n\times n}$
among elements, the max-mean dispersion problem (MaxMeanDP) consists in
selecting a subset $M$ from $V$ such that the mean dispersion (or distance)
among the selected elements is maximized. Being a useful model to formulate
several relevant applications, MaxMeanDP is known to be NP-hard and thus
computationally difficult. In this paper, we present a highly effective memetic
algorithm for MaxMeanDP which relies on solution recombination and local
optimization to find high quality solutions. Computational experiments on the
set of 160 benchmark instances with up to 1000 elements commonly used in the
literature show that the proposed algorithm improves or matches the published
best known results for all instances in a short computing time, with only one
exception, while achieving a high success rate of 100\%. In particular, we
improve 59 previous best results out of the 60 most challenging instances.
Results on a set of 40 new large instances with 3000 and 5000 elements are also
presented. The key ingredients of the proposed algorithm are investigated to
shed light on how they affect the performance of the algorithm.
| no_new_dataset | 0.940844 |
1503.01070 | Atousa Torabi | Atousa Torabi, Christopher Pal, Hugo Larochelle, Aaron Courville | Using Descriptive Video Services to Create a Large Data Source for Video
Annotation Research | 7 pages | null | null | null | cs.CV cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this work, we introduce a dataset of video annotated with high quality
natural language phrases describing the visual content in a given segment of
time. Our dataset is based on the Descriptive Video Service (DVS) that is now
encoded on many digital media products such as DVDs. DVS is an audio narration
describing the visual elements and actions in a movie for the visually
impaired. It is temporally aligned with the movie and mixed with the original
movie soundtrack. We describe an automatic DVS segmentation and alignment
method for movies, that enables us to scale up the collection of a DVS-derived
dataset with minimal human intervention. Using this method, we have collected
the largest DVS-derived dataset for video description of which we are aware.
Our dataset currently includes over 84.6 hours of paired video/sentences from
92 DVDs and is growing.
| [
{
"version": "v1",
"created": "Tue, 3 Mar 2015 19:22:01 GMT"
}
] | 2015-03-04T00:00:00 | [
[
"Torabi",
"Atousa",
""
],
[
"Pal",
"Christopher",
""
],
[
"Larochelle",
"Hugo",
""
],
[
"Courville",
"Aaron",
""
]
] | TITLE: Using Descriptive Video Services to Create a Large Data Source for Video
Annotation Research
ABSTRACT: In this work, we introduce a dataset of video annotated with high quality
natural language phrases describing the visual content in a given segment of
time. Our dataset is based on the Descriptive Video Service (DVS) that is now
encoded on many digital media products such as DVDs. DVS is an audio narration
describing the visual elements and actions in a movie for the visually
impaired. It is temporally aligned with the movie and mixed with the original
movie soundtrack. We describe an automatic DVS segmentation and alignment
method for movies, that enables us to scale up the collection of a DVS-derived
dataset with minimal human intervention. Using this method, we have collected
the largest DVS-derived dataset for video description of which we are aware.
Our dataset currently includes over 84.6 hours of paired video/sentences from
92 DVDs and is growing.
| new_dataset | 0.955194 |
1412.6558 | David Sussillo | David Sussillo, L.F. Abbott | Random Walk Initialization for Training Very Deep Feedforward Networks | 10 pages, 4 figures | null | null | null | cs.NE cs.LG stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Training very deep networks is an important open problem in machine learning.
One of many difficulties is that the norm of the back-propagated error gradient
can grow or decay exponentially. Here we show that training very deep
feed-forward networks (FFNs) is not as difficult as previously thought. Unlike
when back-propagation is applied to a recurrent network, application to an FFN
amounts to multiplying the error gradient by a different random matrix at each
layer. We show that the successive application of correctly scaled random
matrices to an initial vector results in a random walk of the log of the norm
of the resulting vectors, and we compute the scaling that makes this walk
unbiased. The variance of the random walk grows only linearly with network
depth and is inversely proportional to the size of each layer. Practically,
this implies a gradient whose log-norm scales with the square root of the
network depth and shows that the vanishing gradient problem can be mitigated by
increasing the width of the layers. Mathematical analyses and experimental
results using stochastic gradient descent to optimize tasks related to the
MNIST and TIMIT datasets are provided to support these claims. Equations for
the optimal matrix scaling are provided for the linear and ReLU cases.
| [
{
"version": "v1",
"created": "Fri, 19 Dec 2014 23:24:53 GMT"
},
{
"version": "v2",
"created": "Wed, 14 Jan 2015 21:28:29 GMT"
},
{
"version": "v3",
"created": "Fri, 27 Feb 2015 22:28:32 GMT"
}
] | 2015-03-03T00:00:00 | [
[
"Sussillo",
"David",
""
],
[
"Abbott",
"L. F.",
""
]
] | TITLE: Random Walk Initialization for Training Very Deep Feedforward Networks
ABSTRACT: Training very deep networks is an important open problem in machine learning.
One of many difficulties is that the norm of the back-propagated error gradient
can grow or decay exponentially. Here we show that training very deep
feed-forward networks (FFNs) is not as difficult as previously thought. Unlike
when back-propagation is applied to a recurrent network, application to an FFN
amounts to multiplying the error gradient by a different random matrix at each
layer. We show that the successive application of correctly scaled random
matrices to an initial vector results in a random walk of the log of the norm
of the resulting vectors, and we compute the scaling that makes this walk
unbiased. The variance of the random walk grows only linearly with network
depth and is inversely proportional to the size of each layer. Practically,
this implies a gradient whose log-norm scales with the square root of the
network depth and shows that the vanishing gradient problem can be mitigated by
increasing the width of the layers. Mathematical analyses and experimental
results using stochastic gradient descent to optimize tasks related to the
MNIST and TIMIT datasets are provided to support these claims. Equations for
the optimal matrix scaling are provided for the linear and ReLU cases.
| no_new_dataset | 0.948775 |
1412.7190 | Mathieu Aubry | Francisco Massa, Mathieu Aubry, Renaud Marlet | Convolutional Neural Networks for joint object detection and pose
estimation: A comparative study | null | null | null | null | cs.CV cs.LG cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we study the application of convolutional neural networks for
jointly detecting objects depicted in still images and estimating their 3D
pose. We identify different feature representations of oriented objects, and
energies that lead a network to learn this representations. The choice of the
representation is crucial since the pose of an object has a natural, continuous
structure while its category is a discrete variable. We evaluate the different
approaches on the joint object detection and pose estimation task of the
Pascal3D+ benchmark using Average Viewpoint Precision. We show that a
classification approach on discretized viewpoints achieves state-of-the-art
performance for joint object detection and pose estimation, and significantly
outperforms existing baselines on this benchmark.
| [
{
"version": "v1",
"created": "Mon, 22 Dec 2014 22:26:26 GMT"
},
{
"version": "v2",
"created": "Fri, 2 Jan 2015 16:43:41 GMT"
},
{
"version": "v3",
"created": "Sat, 7 Feb 2015 05:27:24 GMT"
},
{
"version": "v4",
"created": "Sat, 28 Feb 2015 05:15:45 GMT"
}
] | 2015-03-03T00:00:00 | [
[
"Massa",
"Francisco",
""
],
[
"Aubry",
"Mathieu",
""
],
[
"Marlet",
"Renaud",
""
]
] | TITLE: Convolutional Neural Networks for joint object detection and pose
estimation: A comparative study
ABSTRACT: In this paper we study the application of convolutional neural networks for
jointly detecting objects depicted in still images and estimating their 3D
pose. We identify different feature representations of oriented objects, and
energies that lead a network to learn this representations. The choice of the
representation is crucial since the pose of an object has a natural, continuous
structure while its category is a discrete variable. We evaluate the different
approaches on the joint object detection and pose estimation task of the
Pascal3D+ benchmark using Average Viewpoint Precision. We show that a
classification approach on discretized viewpoints achieves state-of-the-art
performance for joint object detection and pose estimation, and significantly
outperforms existing baselines on this benchmark.
| no_new_dataset | 0.950273 |
1503.00038 | Md Amran Siddiqui | Md Amran Siddiqui, Alan Fern, Thomas G. Dietterich and Weng-Keen Wong | Sequential Feature Explanations for Anomaly Detection | 9 pages, 4 figures and submitted to KDD 2015 | null | null | null | cs.AI cs.LG stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In many applications, an anomaly detection system presents the most anomalous
data instance to a human analyst, who then must determine whether the instance
is truly of interest (e.g. a threat in a security setting). Unfortunately, most
anomaly detectors provide no explanation about why an instance was considered
anomalous, leaving the analyst with no guidance about where to begin the
investigation. To address this issue, we study the problems of computing and
evaluating sequential feature explanations (SFEs) for anomaly detectors. An SFE
of an anomaly is a sequence of features, which are presented to the analyst one
at a time (in order) until the information contained in the highlighted
features is enough for the analyst to make a confident judgement about the
anomaly. Since analyst effort is related to the amount of information that they
consider in an investigation, an explanation's quality is related to the number
of features that must be revealed to attain confidence. One of our main
contributions is to present a novel framework for large scale quantitative
evaluations of SFEs, where the quality measure is based on analyst effort. To
do this we construct anomaly detection benchmarks from real data sets along
with artificial experts that can be simulated for evaluation. Our second
contribution is to evaluate several novel explanation approaches within the
framework and on traditional anomaly detection benchmarks, offering several
insights into the approaches.
| [
{
"version": "v1",
"created": "Sat, 28 Feb 2015 00:04:11 GMT"
}
] | 2015-03-03T00:00:00 | [
[
"Siddiqui",
"Md Amran",
""
],
[
"Fern",
"Alan",
""
],
[
"Dietterich",
"Thomas G.",
""
],
[
"Wong",
"Weng-Keen",
""
]
] | TITLE: Sequential Feature Explanations for Anomaly Detection
ABSTRACT: In many applications, an anomaly detection system presents the most anomalous
data instance to a human analyst, who then must determine whether the instance
is truly of interest (e.g. a threat in a security setting). Unfortunately, most
anomaly detectors provide no explanation about why an instance was considered
anomalous, leaving the analyst with no guidance about where to begin the
investigation. To address this issue, we study the problems of computing and
evaluating sequential feature explanations (SFEs) for anomaly detectors. An SFE
of an anomaly is a sequence of features, which are presented to the analyst one
at a time (in order) until the information contained in the highlighted
features is enough for the analyst to make a confident judgement about the
anomaly. Since analyst effort is related to the amount of information that they
consider in an investigation, an explanation's quality is related to the number
of features that must be revealed to attain confidence. One of our main
contributions is to present a novel framework for large scale quantitative
evaluations of SFEs, where the quality measure is based on analyst effort. To
do this we construct anomaly detection benchmarks from real data sets along
with artificial experts that can be simulated for evaluation. Our second
contribution is to evaluate several novel explanation approaches within the
framework and on traditional anomaly detection benchmarks, offering several
insights into the approaches.
| no_new_dataset | 0.949153 |
1503.00064 | Sanja Fidler | Dahua Lin, Chen Kong, Sanja Fidler, Raquel Urtasun | Generating Multi-Sentence Lingual Descriptions of Indoor Scenes | null | null | null | null | cs.CV cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper proposes a novel framework for generating lingual descriptions of
indoor scenes. Whereas substantial efforts have been made to tackle this
problem, previous approaches focusing primarily on generating a single sentence
for each image, which is not sufficient for describing complex scenes. We
attempt to go beyond this, by generating coherent descriptions with multiple
sentences. Our approach is distinguished from conventional ones in several
aspects: (1) a 3D visual parsing system that jointly infers objects,
attributes, and relations; (2) a generative grammar learned automatically from
training text; and (3) a text generation algorithm that takes into account the
coherence among sentences. Experiments on the augmented NYU-v2 dataset show
that our framework can generate natural descriptions with substantially higher
ROGUE scores compared to those produced by the baseline.
| [
{
"version": "v1",
"created": "Sat, 28 Feb 2015 04:26:21 GMT"
}
] | 2015-03-03T00:00:00 | [
[
"Lin",
"Dahua",
""
],
[
"Kong",
"Chen",
""
],
[
"Fidler",
"Sanja",
""
],
[
"Urtasun",
"Raquel",
""
]
] | TITLE: Generating Multi-Sentence Lingual Descriptions of Indoor Scenes
ABSTRACT: This paper proposes a novel framework for generating lingual descriptions of
indoor scenes. Whereas substantial efforts have been made to tackle this
problem, previous approaches focusing primarily on generating a single sentence
for each image, which is not sufficient for describing complex scenes. We
attempt to go beyond this, by generating coherent descriptions with multiple
sentences. Our approach is distinguished from conventional ones in several
aspects: (1) a 3D visual parsing system that jointly infers objects,
attributes, and relations; (2) a generative grammar learned automatically from
training text; and (3) a text generation algorithm that takes into account the
coherence among sentences. Experiments on the augmented NYU-v2 dataset show
that our framework can generate natural descriptions with substantially higher
ROGUE scores compared to those produced by the baseline.
| no_new_dataset | 0.951188 |
1503.00591 | Xu Zhang | Xu Zhang, Felix Xinnan Yu, Shih-Fu Chang, Shengjin Wang | Deep Transfer Network: Unsupervised Domain Adaptation | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Domain adaptation aims at training a classifier in one dataset and applying
it to a related but not identical dataset. One successfully used framework of
domain adaptation is to learn a transformation to match both the distribution
of the features (marginal distribution), and the distribution of the labels
given features (conditional distribution). In this paper, we propose a new
domain adaptation framework named Deep Transfer Network (DTN), where the highly
flexible deep neural networks are used to implement such a distribution
matching process.
This is achieved by two types of layers in DTN: the shared feature extraction
layers which learn a shared feature subspace in which the marginal
distributions of the source and the target samples are drawn close, and the
discrimination layers which match conditional distributions by classifier
transduction. We also show that DTN has a computation complexity linear to the
number of training samples, making it suitable to large-scale problems. By
combining the best paradigms in both worlds (deep neural networks in
recognition, and matching marginal and conditional distributions in domain
adaptation), we demonstrate by extensive experiments that DTN improves
significantly over former methods in both execution time and classification
accuracy.
| [
{
"version": "v1",
"created": "Mon, 2 Mar 2015 16:17:06 GMT"
}
] | 2015-03-03T00:00:00 | [
[
"Zhang",
"Xu",
""
],
[
"Yu",
"Felix Xinnan",
""
],
[
"Chang",
"Shih-Fu",
""
],
[
"Wang",
"Shengjin",
""
]
] | TITLE: Deep Transfer Network: Unsupervised Domain Adaptation
ABSTRACT: Domain adaptation aims at training a classifier in one dataset and applying
it to a related but not identical dataset. One successfully used framework of
domain adaptation is to learn a transformation to match both the distribution
of the features (marginal distribution), and the distribution of the labels
given features (conditional distribution). In this paper, we propose a new
domain adaptation framework named Deep Transfer Network (DTN), where the highly
flexible deep neural networks are used to implement such a distribution
matching process.
This is achieved by two types of layers in DTN: the shared feature extraction
layers which learn a shared feature subspace in which the marginal
distributions of the source and the target samples are drawn close, and the
discrimination layers which match conditional distributions by classifier
transduction. We also show that DTN has a computation complexity linear to the
number of training samples, making it suitable to large-scale problems. By
combining the best paradigms in both worlds (deep neural networks in
recognition, and matching marginal and conditional distributions in domain
adaptation), we demonstrate by extensive experiments that DTN improves
significantly over former methods in both execution time and classification
accuracy.
| no_new_dataset | 0.950457 |
1503.00687 | Miguel \'A. Carreira-Perpi\~n\'an | Miguel \'A. Carreira-Perpi\~n\'an | A review of mean-shift algorithms for clustering | 28 pages, 9 figures. Invited book chapter to appear in the CRC
Handbook of Cluster Analysis (eds. Roberto Rocci, Fionn Murtagh, Marina Meila
and Christian Hennig) | null | null | null | cs.LG cs.CV stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A natural way to characterize the cluster structure of a dataset is by
finding regions containing a high density of data. This can be done in a
nonparametric way with a kernel density estimate, whose modes and hence
clusters can be found using mean-shift algorithms. We describe the theory and
practice behind clustering based on kernel density estimates and mean-shift
algorithms. We discuss the blurring and non-blurring versions of mean-shift;
theoretical results about mean-shift algorithms and Gaussian mixtures;
relations with scale-space theory, spectral clustering and other algorithms;
extensions to tracking, to manifold and graph data, and to manifold denoising;
K-modes and Laplacian K-modes algorithms; acceleration strategies for large
datasets; and applications to image segmentation, manifold denoising and
multivalued regression.
| [
{
"version": "v1",
"created": "Mon, 2 Mar 2015 20:09:14 GMT"
}
] | 2015-03-03T00:00:00 | [
[
"Carreira-Perpiñán",
"Miguel Á.",
""
]
] | TITLE: A review of mean-shift algorithms for clustering
ABSTRACT: A natural way to characterize the cluster structure of a dataset is by
finding regions containing a high density of data. This can be done in a
nonparametric way with a kernel density estimate, whose modes and hence
clusters can be found using mean-shift algorithms. We describe the theory and
practice behind clustering based on kernel density estimates and mean-shift
algorithms. We discuss the blurring and non-blurring versions of mean-shift;
theoretical results about mean-shift algorithms and Gaussian mixtures;
relations with scale-space theory, spectral clustering and other algorithms;
extensions to tracking, to manifold and graph data, and to manifold denoising;
K-modes and Laplacian K-modes algorithms; acceleration strategies for large
datasets; and applications to image segmentation, manifold denoising and
multivalued regression.
| no_new_dataset | 0.946745 |
1503.00711 | Rachel Gauci | Rachel Gauci | Smelling out Code Clones: Clone Detection Tool Evaluation and
Corresponding Challenges | 8 pages, 2 figures | null | null | null | cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Software clones have been an active area of research for the past two
decades. However, although numerous clone detection tools are now available,
only a small fraction of the literature has focused on tool evaluation, and
this is in fact still an open problem. This is mostly due to the fact that
standard information retrieval metrics such as recall and precision require a
priori knowledge of clones already in the system. Detection tools also
typically have a large number of parameters which are difficult to fine-tune
for optimal performance on a particular software system, and different outputs
produced by different tools add to the complexity of comparing one tool to
another. In this review, we further explore the reasons why tool evaluation is
still an open challenge, and present the current tools and frameworks targeted
at mitigating these problems, focusing on the current standard benchmarks used
to evaluate modern clone detection tools, and also presenting a recent method
aimed at finding optimal tool configurations.
| [
{
"version": "v1",
"created": "Mon, 2 Mar 2015 20:59:40 GMT"
}
] | 2015-03-03T00:00:00 | [
[
"Gauci",
"Rachel",
""
]
] | TITLE: Smelling out Code Clones: Clone Detection Tool Evaluation and
Corresponding Challenges
ABSTRACT: Software clones have been an active area of research for the past two
decades. However, although numerous clone detection tools are now available,
only a small fraction of the literature has focused on tool evaluation, and
this is in fact still an open problem. This is mostly due to the fact that
standard information retrieval metrics such as recall and precision require a
priori knowledge of clones already in the system. Detection tools also
typically have a large number of parameters which are difficult to fine-tune
for optimal performance on a particular software system, and different outputs
produced by different tools add to the complexity of comparing one tool to
another. In this review, we further explore the reasons why tool evaluation is
still an open challenge, and present the current tools and frameworks targeted
at mitigating these problems, focusing on the current standard benchmarks used
to evaluate modern clone detection tools, and also presenting a recent method
aimed at finding optimal tool configurations.
| no_new_dataset | 0.945701 |
1409.7495 | Yaroslav Ganin | Yaroslav Ganin, Victor Lempitsky | Unsupervised Domain Adaptation by Backpropagation | null | null | null | null | stat.ML cs.LG cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Top-performing deep architectures are trained on massive amounts of labeled
data. In the absence of labeled data for a certain task, domain adaptation
often provides an attractive option given that labeled data of similar nature
but from a different domain (e.g. synthetic images) are available. Here, we
propose a new approach to domain adaptation in deep architectures that can be
trained on large amount of labeled data from the source domain and large amount
of unlabeled data from the target domain (no labeled target-domain data is
necessary).
As the training progresses, the approach promotes the emergence of "deep"
features that are (i) discriminative for the main learning task on the source
domain and (ii) invariant with respect to the shift between the domains. We
show that this adaptation behaviour can be achieved in almost any feed-forward
model by augmenting it with few standard layers and a simple new gradient
reversal layer. The resulting augmented architecture can be trained using
standard backpropagation.
Overall, the approach can be implemented with little effort using any of the
deep-learning packages. The method performs very well in a series of image
classification experiments, achieving adaptation effect in the presence of big
domain shifts and outperforming previous state-of-the-art on Office datasets.
| [
{
"version": "v1",
"created": "Fri, 26 Sep 2014 08:22:21 GMT"
},
{
"version": "v2",
"created": "Fri, 27 Feb 2015 14:54:37 GMT"
}
] | 2015-03-02T00:00:00 | [
[
"Ganin",
"Yaroslav",
""
],
[
"Lempitsky",
"Victor",
""
]
] | TITLE: Unsupervised Domain Adaptation by Backpropagation
ABSTRACT: Top-performing deep architectures are trained on massive amounts of labeled
data. In the absence of labeled data for a certain task, domain adaptation
often provides an attractive option given that labeled data of similar nature
but from a different domain (e.g. synthetic images) are available. Here, we
propose a new approach to domain adaptation in deep architectures that can be
trained on large amount of labeled data from the source domain and large amount
of unlabeled data from the target domain (no labeled target-domain data is
necessary).
As the training progresses, the approach promotes the emergence of "deep"
features that are (i) discriminative for the main learning task on the source
domain and (ii) invariant with respect to the shift between the domains. We
show that this adaptation behaviour can be achieved in almost any feed-forward
model by augmenting it with few standard layers and a simple new gradient
reversal layer. The resulting augmented architecture can be trained using
standard backpropagation.
Overall, the approach can be implemented with little effort using any of the
deep-learning packages. The method performs very well in a series of image
classification experiments, achieving adaptation effect in the presence of big
domain shifts and outperforming previous state-of-the-art on Office datasets.
| no_new_dataset | 0.947817 |
1502.07802 | Zongyuan Ge | ZongYuan Ge, Chris McCool, Conrad Sanderson, Peter Corke | Modelling Local Deep Convolutional Neural Network Features to Improve
Fine-Grained Image Classification | 5 pages, three figures | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose a local modelling approach using deep convolutional neural
networks (CNNs) for fine-grained image classification. Recently, deep CNNs
trained from large datasets have considerably improved the performance of
object recognition. However, to date there has been limited work using these
deep CNNs as local feature extractors. This partly stems from CNNs having
internal representations which are high dimensional, thereby making such
representations difficult to model using stochastic models. To overcome this
issue, we propose to reduce the dimensionality of one of the internal fully
connected layers, in conjunction with layer-restricted retraining to avoid
retraining the entire network. The distribution of low-dimensional features
obtained from the modified layer is then modelled using a Gaussian mixture
model. Comparative experiments show that considerable performance improvements
can be achieved on the challenging Fish and UEC FOOD-100 datasets.
| [
{
"version": "v1",
"created": "Fri, 27 Feb 2015 02:04:57 GMT"
}
] | 2015-03-02T00:00:00 | [
[
"Ge",
"ZongYuan",
""
],
[
"McCool",
"Chris",
""
],
[
"Sanderson",
"Conrad",
""
],
[
"Corke",
"Peter",
""
]
] | TITLE: Modelling Local Deep Convolutional Neural Network Features to Improve
Fine-Grained Image Classification
ABSTRACT: We propose a local modelling approach using deep convolutional neural
networks (CNNs) for fine-grained image classification. Recently, deep CNNs
trained from large datasets have considerably improved the performance of
object recognition. However, to date there has been limited work using these
deep CNNs as local feature extractors. This partly stems from CNNs having
internal representations which are high dimensional, thereby making such
representations difficult to model using stochastic models. To overcome this
issue, we propose to reduce the dimensionality of one of the internal fully
connected layers, in conjunction with layer-restricted retraining to avoid
retraining the entire network. The distribution of low-dimensional features
obtained from the modified layer is then modelled using a Gaussian mixture
model. Comparative experiments show that considerable performance improvements
can be achieved on the challenging Fish and UEC FOOD-100 datasets.
| no_new_dataset | 0.949059 |
1502.07812 | Kwangsu Lee | Kwangsu Lee, Jong Hwan Park, Dong Hoon Lee | Anonymous HIBE with Short Ciphertexts: Full Security in Prime Order
Groups | 31 pages, 1 figure | Designs, Codes and Cryptography, vol. 74, no. 2, pp. 395-425, Feb.
2015 | 10.1007/s10623-013-9868-6 | null | cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Anonymous Hierarchical Identity-Based Encryption (HIBE) is an extension of
Identity-Based Encryption (IBE), and it provides not only a message hiding
property but also an identity hiding property. Anonymous HIBE schemes can be
applicable to anonymous communication systems and public key encryption systems
with keyword searching. However, previous anonymous HIBE schemes have some
disadvantages that the security was proven in the weaker model, the size of
ciphertexts is not short, or the construction was based on composite order
bilinear groups. In this paper, we propose the first efficient anonymous HIBE
scheme with short ciphertexts in prime order (asymmetric) bilinear groups, and
prove its security in the full model with an efficient reduction. To achieve
this, we use the dual system encryption methodology of Waters. We also present
the benchmark results of our scheme by measuring the performance of our
implementation.
| [
{
"version": "v1",
"created": "Fri, 27 Feb 2015 03:31:04 GMT"
}
] | 2015-03-02T00:00:00 | [
[
"Lee",
"Kwangsu",
""
],
[
"Park",
"Jong Hwan",
""
],
[
"Lee",
"Dong Hoon",
""
]
] | TITLE: Anonymous HIBE with Short Ciphertexts: Full Security in Prime Order
Groups
ABSTRACT: Anonymous Hierarchical Identity-Based Encryption (HIBE) is an extension of
Identity-Based Encryption (IBE), and it provides not only a message hiding
property but also an identity hiding property. Anonymous HIBE schemes can be
applicable to anonymous communication systems and public key encryption systems
with keyword searching. However, previous anonymous HIBE schemes have some
disadvantages that the security was proven in the weaker model, the size of
ciphertexts is not short, or the construction was based on composite order
bilinear groups. In this paper, we propose the first efficient anonymous HIBE
scheme with short ciphertexts in prime order (asymmetric) bilinear groups, and
prove its security in the full model with an efficient reduction. To achieve
this, we use the dual system encryption methodology of Waters. We also present
the benchmark results of our scheme by measuring the performance of our
implementation.
| no_new_dataset | 0.945147 |
1502.08039 | Jihun Hamm | Jihun Hamm, Mikhail Belkin | Probabilistic Zero-shot Classification with Semantic Rankings | null | null | null | null | cs.LG cs.AI cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we propose a non-metric ranking-based representation of
semantic similarity that allows natural aggregation of semantic information
from multiple heterogeneous sources. We apply the ranking-based representation
to zero-shot learning problems, and present deterministic and probabilistic
zero-shot classifiers which can be built from pre-trained classifiers without
retraining. We demonstrate their the advantages on two large real-world image
datasets. In particular, we show that aggregating different sources of semantic
information, including crowd-sourcing, leads to more accurate classification.
| [
{
"version": "v1",
"created": "Fri, 27 Feb 2015 20:00:53 GMT"
}
] | 2015-03-02T00:00:00 | [
[
"Hamm",
"Jihun",
""
],
[
"Belkin",
"Mikhail",
""
]
] | TITLE: Probabilistic Zero-shot Classification with Semantic Rankings
ABSTRACT: In this paper we propose a non-metric ranking-based representation of
semantic similarity that allows natural aggregation of semantic information
from multiple heterogeneous sources. We apply the ranking-based representation
to zero-shot learning problems, and present deterministic and probabilistic
zero-shot classifiers which can be built from pre-trained classifiers without
retraining. We demonstrate their the advantages on two large real-world image
datasets. In particular, we show that aggregating different sources of semantic
information, including crowd-sourcing, leads to more accurate classification.
| no_new_dataset | 0.948917 |
1502.08046 | Piotr Plonski | Piotr P{\l}o\'nski, Dorota Stefan, Robert Sulej, Krzysztof Zaremba | Image Segmentation in Liquid Argon Time Projection Chamber Detector | 10 pages, 4 figures, 2 tables | null | null | null | cs.CV hep-ex | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The Liquid Argon Time Projection Chamber (LAr-TPC) detectors provide
excellent imaging and particle identification ability for studying neutrinos.
An efficient and automatic reconstruction procedures are required to exploit
potential of this imaging technology. Herein, a novel method for segmentation
of images from LAr-TPC detectors is presented. The proposed approach computes a
feature descriptor for each pixel in the image, which characterizes amplitude
distribution in pixel and its neighbourhood. The supervised classifier is
employed to distinguish between pixels representing particle's track and noise.
The classifier is trained and evaluated on the hand-labeled dataset. The
proposed approach can be a preprocessing step for reconstructing algorithms
working directly on detector images.
| [
{
"version": "v1",
"created": "Fri, 27 Feb 2015 20:32:35 GMT"
}
] | 2015-03-02T00:00:00 | [
[
"Płoński",
"Piotr",
""
],
[
"Stefan",
"Dorota",
""
],
[
"Sulej",
"Robert",
""
],
[
"Zaremba",
"Krzysztof",
""
]
] | TITLE: Image Segmentation in Liquid Argon Time Projection Chamber Detector
ABSTRACT: The Liquid Argon Time Projection Chamber (LAr-TPC) detectors provide
excellent imaging and particle identification ability for studying neutrinos.
An efficient and automatic reconstruction procedures are required to exploit
potential of this imaging technology. Herein, a novel method for segmentation
of images from LAr-TPC detectors is presented. The proposed approach computes a
feature descriptor for each pixel in the image, which characterizes amplitude
distribution in pixel and its neighbourhood. The supervised classifier is
employed to distinguish between pixels representing particle's track and noise.
The classifier is trained and evaluated on the hand-labeled dataset. The
proposed approach can be a preprocessing step for reconstructing algorithms
working directly on detector images.
| no_new_dataset | 0.956634 |
1502.04981 | Mete Ozay | Mete Ozay | Semi-supervised Segmentation Fusion of Multi-spectral and Aerial Images | A version of the manuscript was published in ICPR 2014 | Proc. 22nd International Conference on Pattern Recognition, pp.
3839-3844, Stockholm, 2014 | 10.1109/ICPR.2014.659 | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A Semi-supervised Segmentation Fusion algorithm is proposed using consensus
and distributed learning. The aim of Unsupervised Segmentation Fusion (USF) is
to achieve a consensus among different segmentation outputs obtained from
different segmentation algorithms by computing an approximate solution to the
NP problem with less computational complexity. Semi-supervision is incorporated
in USF using a new algorithm called Semi-supervised Segmentation Fusion (SSSF).
In SSSF, side information about the co-occurrence of pixels in the same or
different segments is formulated as the constraints of a convex optimization
problem. The results of the experiments employed on artificial and real-world
benchmark multi-spectral and aerial images show that the proposed algorithms
perform better than the individual state-of-the art segmentation algorithms.
| [
{
"version": "v1",
"created": "Tue, 17 Feb 2015 18:01:13 GMT"
},
{
"version": "v2",
"created": "Thu, 26 Feb 2015 00:11:44 GMT"
}
] | 2015-02-27T00:00:00 | [
[
"Ozay",
"Mete",
""
]
] | TITLE: Semi-supervised Segmentation Fusion of Multi-spectral and Aerial Images
ABSTRACT: A Semi-supervised Segmentation Fusion algorithm is proposed using consensus
and distributed learning. The aim of Unsupervised Segmentation Fusion (USF) is
to achieve a consensus among different segmentation outputs obtained from
different segmentation algorithms by computing an approximate solution to the
NP problem with less computational complexity. Semi-supervision is incorporated
in USF using a new algorithm called Semi-supervised Segmentation Fusion (SSSF).
In SSSF, side information about the co-occurrence of pixels in the same or
different segments is formulated as the constraints of a convex optimization
problem. The results of the experiments employed on artificial and real-world
benchmark multi-spectral and aerial images show that the proposed algorithms
perform better than the individual state-of-the art segmentation algorithms.
| no_new_dataset | 0.951051 |
1502.06682 | Chih-Ya Shen | Chih-Ya Shen, De-Nian Yang, Wang-Chien Lee, Ming-Syan Chen | Maximizing Friend-Making Likelihood for Social Activity Organization | null | null | null | null | cs.SI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The social presence theory in social psychology suggests that
computer-mediated online interactions are inferior to face-to-face, in-person
interactions. In this paper, we consider the scenarios of organizing in person
friend-making social activities via online social networks (OSNs) and formulate
a new research problem, namely, Hop-bounded Maximum Group Friending (HMGF), by
modeling both existing friendships and the likelihood of new friend making. To
find a set of attendees for socialization activities, HMGF is unique and
challenging due to the interplay of the group size, the constraint on existing
friendships and the objective function on the likelihood of friend making. We
prove that HMGF is NP-Hard, and no approximation algorithm exists unless P =
NP. We then propose an error-bounded approximation algorithm to efficiently
obtain the solutions very close to the optimal solutions. We conduct a user
study to validate our problem formulation and per- form extensive experiments
on real datasets to demonstrate the efficiency and effectiveness of our
proposed algorithm.
| [
{
"version": "v1",
"created": "Tue, 24 Feb 2015 03:16:33 GMT"
},
{
"version": "v2",
"created": "Thu, 26 Feb 2015 15:31:34 GMT"
}
] | 2015-02-27T00:00:00 | [
[
"Shen",
"Chih-Ya",
""
],
[
"Yang",
"De-Nian",
""
],
[
"Lee",
"Wang-Chien",
""
],
[
"Chen",
"Ming-Syan",
""
]
] | TITLE: Maximizing Friend-Making Likelihood for Social Activity Organization
ABSTRACT: The social presence theory in social psychology suggests that
computer-mediated online interactions are inferior to face-to-face, in-person
interactions. In this paper, we consider the scenarios of organizing in person
friend-making social activities via online social networks (OSNs) and formulate
a new research problem, namely, Hop-bounded Maximum Group Friending (HMGF), by
modeling both existing friendships and the likelihood of new friend making. To
find a set of attendees for socialization activities, HMGF is unique and
challenging due to the interplay of the group size, the constraint on existing
friendships and the objective function on the likelihood of friend making. We
prove that HMGF is NP-Hard, and no approximation algorithm exists unless P =
NP. We then propose an error-bounded approximation algorithm to efficiently
obtain the solutions very close to the optimal solutions. We conduct a user
study to validate our problem formulation and per- form extensive experiments
on real datasets to demonstrate the efficiency and effectiveness of our
proposed algorithm.
| no_new_dataset | 0.946151 |
1502.07447 | Mehmet Ali Arslan | Mehmet Ali Arslan, Flavius Gruian, Krzysztof Kuchcinski | A Comparative Study of Scheduling Techniques for Multimedia Applications
on SIMD Pipelines | Presented at DATE Friday Workshop on Heterogeneous Architectures and
Design Methods for Embedded Image Systems (HIS 2015) (arXiv:1502.07241) | null | null | DATEHIS/2015/02 | cs.DC cs.PL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Parallel architectures are essential in order to take advantage of the
parallelism inherent in streaming applications. One particular branch of these
employ hardware SIMD pipelines. In this paper, we analyse several scheduling
techniques, namely ad hoc overlapped execution, modulo scheduling and modulo
scheduling with unrolling, all of which aim to efficiently utilize the special
architecture design. Our investigation focuses on improving throughput while
analysing other metrics that are important for streaming applications, such as
register pressure, buffer sizes and code size. Through experiments conducted on
several media benchmarks, we present and discuss trade-offs involved when
selecting any one of these scheduling techniques.
| [
{
"version": "v1",
"created": "Thu, 26 Feb 2015 06:15:23 GMT"
}
] | 2015-02-27T00:00:00 | [
[
"Arslan",
"Mehmet Ali",
""
],
[
"Gruian",
"Flavius",
""
],
[
"Kuchcinski",
"Krzysztof",
""
]
] | TITLE: A Comparative Study of Scheduling Techniques for Multimedia Applications
on SIMD Pipelines
ABSTRACT: Parallel architectures are essential in order to take advantage of the
parallelism inherent in streaming applications. One particular branch of these
employ hardware SIMD pipelines. In this paper, we analyse several scheduling
techniques, namely ad hoc overlapped execution, modulo scheduling and modulo
scheduling with unrolling, all of which aim to efficiently utilize the special
architecture design. Our investigation focuses on improving throughput while
analysing other metrics that are important for streaming applications, such as
register pressure, buffer sizes and code size. Through experiments conducted on
several media benchmarks, we present and discuss trade-offs involved when
selecting any one of these scheduling techniques.
| no_new_dataset | 0.950088 |
1502.07504 | Attia Nehar | Attia Nehar and Djelloul Ziadi and Hadda Cherroun | Rational Kernels for Arabic Stemming and Text Classification | 12 pages | null | null | null | cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we address the problems of Arabic Text Classification and
stemming using Transducers and Rational Kernels. We introduce a new stemming
technique based on the use of Arabic patterns (Pattern Based Stemmer). Patterns
are modelled using transducers and stemming is done without depending on any
dictionary. Using transducers for stemming, documents are transformed into
finite state transducers. This document representation allows us to use and
explore rational kernels as a framework for Arabic Text Classification.
Stemming experiments are conducted on three word collections and classification
experiments are done on the Saudi Press Agency dataset. Results show that our
approach, when compared with other approaches, is promising specially in terms
of Accuracy, Recall and F1.
| [
{
"version": "v1",
"created": "Thu, 26 Feb 2015 11:09:59 GMT"
}
] | 2015-02-27T00:00:00 | [
[
"Nehar",
"Attia",
""
],
[
"Ziadi",
"Djelloul",
""
],
[
"Cherroun",
"Hadda",
""
]
] | TITLE: Rational Kernels for Arabic Stemming and Text Classification
ABSTRACT: In this paper, we address the problems of Arabic Text Classification and
stemming using Transducers and Rational Kernels. We introduce a new stemming
technique based on the use of Arabic patterns (Pattern Based Stemmer). Patterns
are modelled using transducers and stemming is done without depending on any
dictionary. Using transducers for stemming, documents are transformed into
finite state transducers. This document representation allows us to use and
explore rational kernels as a framework for Arabic Text Classification.
Stemming experiments are conducted on three word collections and classification
experiments are done on the Saudi Press Agency dataset. Results show that our
approach, when compared with other approaches, is promising specially in terms
of Accuracy, Recall and F1.
| no_new_dataset | 0.953275 |
1502.05224 | Yun Gu | Yun Gu, Haoyang Xue, Jie Yang | Cross-Modality Hashing with Partial Correspondence | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Learning a hashing function for cross-media search is very desirable due to
its low storage cost and fast query speed. However, the data crawled from
Internet cannot always guarantee good correspondence among different modalities
which affects the learning for hashing function. In this paper, we focus on
cross-modal hashing with partially corresponded data. The data without full
correspondence are made in use to enhance the hashing performance. The
experiments on Wiki and NUS-WIDE datasets demonstrates that the proposed method
outperforms some state-of-the-art hashing approaches with fewer correspondence
information.
| [
{
"version": "v1",
"created": "Wed, 18 Feb 2015 13:41:23 GMT"
},
{
"version": "v2",
"created": "Wed, 25 Feb 2015 12:13:47 GMT"
}
] | 2015-02-26T00:00:00 | [
[
"Gu",
"Yun",
""
],
[
"Xue",
"Haoyang",
""
],
[
"Yang",
"Jie",
""
]
] | TITLE: Cross-Modality Hashing with Partial Correspondence
ABSTRACT: Learning a hashing function for cross-media search is very desirable due to
its low storage cost and fast query speed. However, the data crawled from
Internet cannot always guarantee good correspondence among different modalities
which affects the learning for hashing function. In this paper, we focus on
cross-modal hashing with partially corresponded data. The data without full
correspondence are made in use to enhance the hashing performance. The
experiments on Wiki and NUS-WIDE datasets demonstrates that the proposed method
outperforms some state-of-the-art hashing approaches with fewer correspondence
information.
| no_new_dataset | 0.952353 |
1402.3163 | Xiaohao Yang | Xiaohao Yang and Pavol Juhas and Christopher L. Farrow and Simon J. L.
Billinge | xPDFsuite: an end-to-end software solution for high throughput pair
distribution function transformation, visualization and analysis | 3 pages, 2 figures | null | null | null | cond-mat.mtrl-sci cs.HC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The xPDFsuite software program is described. It is for processing and
analyzing atomic pair distribution functions (PDF) from X-ray powder
diffraction data. It provides a convenient GUI for SrXplanr and PDFgetX3,
allowing the users to easily obtain 1D diffraction pattern from raw 2D
diffraction images and then transform them to PDFs. It also bundles PDFgui
which allows the users to create structure models and fit to the experiment
data. It is specially useful for working with large numbers of datasets such as
from high throughout measurements. Some of the key features are: real time PDF
transformation and plotting; 2D waterfall, false color heatmap, and 3D contour
plotting for multiple datasets; static and dynamic mask editing; geometric
calibration of powder diffraction image; configurations and project saving and
loading; Pearson correlation analysis on selected datasets; written in Python
and support multiple platforms.
| [
{
"version": "v1",
"created": "Thu, 13 Feb 2014 14:55:14 GMT"
},
{
"version": "v2",
"created": "Tue, 25 Feb 2014 04:01:14 GMT"
},
{
"version": "v3",
"created": "Mon, 23 Feb 2015 21:13:21 GMT"
}
] | 2015-02-25T00:00:00 | [
[
"Yang",
"Xiaohao",
""
],
[
"Juhas",
"Pavol",
""
],
[
"Farrow",
"Christopher L.",
""
],
[
"Billinge",
"Simon J. L.",
""
]
] | TITLE: xPDFsuite: an end-to-end software solution for high throughput pair
distribution function transformation, visualization and analysis
ABSTRACT: The xPDFsuite software program is described. It is for processing and
analyzing atomic pair distribution functions (PDF) from X-ray powder
diffraction data. It provides a convenient GUI for SrXplanr and PDFgetX3,
allowing the users to easily obtain 1D diffraction pattern from raw 2D
diffraction images and then transform them to PDFs. It also bundles PDFgui
which allows the users to create structure models and fit to the experiment
data. It is specially useful for working with large numbers of datasets such as
from high throughout measurements. Some of the key features are: real time PDF
transformation and plotting; 2D waterfall, false color heatmap, and 3D contour
plotting for multiple datasets; static and dynamic mask editing; geometric
calibration of powder diffraction image; configurations and project saving and
loading; Pearson correlation analysis on selected datasets; written in Python
and support multiple platforms.
| no_new_dataset | 0.947866 |
1502.06657 | Sahin Geyik | Sahin Cem Geyik, Abhishek Saxena, Ali Dasdan | Multi-Touch Attribution Based Budget Allocation in Online Advertising | This paper has been published in ADKDD 2014, August 24, New York
City, New York, U.S.A | null | null | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Budget allocation in online advertising deals with distributing the campaign
(insertion order) level budgets to different sub-campaigns which employ
different targeting criteria and may perform differently in terms of
return-on-investment (ROI). In this paper, we present the efforts at Turn on
how to best allocate campaign budget so that the advertiser or campaign-level
ROI is maximized. To do this, it is crucial to be able to correctly determine
the performance of sub-campaigns. This determination is highly related to the
action-attribution problem, i.e. to be able to find out the set of ads, and
hence the sub-campaigns that provided them to a user, that an action should be
attributed to. For this purpose, we employ both last-touch (last ad gets all
credit) and multi-touch (many ads share the credit) attribution methodologies.
We present the algorithms deployed at Turn for the attribution problem, as well
as their parallel implementation on the large advertiser performance datasets.
We conclude the paper with our empirical comparison of last-touch and
multi-touch attribution-based budget allocation in a real online advertising
setting.
| [
{
"version": "v1",
"created": "Tue, 24 Feb 2015 00:09:05 GMT"
}
] | 2015-02-25T00:00:00 | [
[
"Geyik",
"Sahin Cem",
""
],
[
"Saxena",
"Abhishek",
""
],
[
"Dasdan",
"Ali",
""
]
] | TITLE: Multi-Touch Attribution Based Budget Allocation in Online Advertising
ABSTRACT: Budget allocation in online advertising deals with distributing the campaign
(insertion order) level budgets to different sub-campaigns which employ
different targeting criteria and may perform differently in terms of
return-on-investment (ROI). In this paper, we present the efforts at Turn on
how to best allocate campaign budget so that the advertiser or campaign-level
ROI is maximized. To do this, it is crucial to be able to correctly determine
the performance of sub-campaigns. This determination is highly related to the
action-attribution problem, i.e. to be able to find out the set of ads, and
hence the sub-campaigns that provided them to a user, that an action should be
attributed to. For this purpose, we employ both last-touch (last ad gets all
credit) and multi-touch (many ads share the credit) attribution methodologies.
We present the algorithms deployed at Turn for the attribution problem, as well
as their parallel implementation on the large advertiser performance datasets.
We conclude the paper with our empirical comparison of last-touch and
multi-touch attribution-based budget allocation in a real online advertising
setting.
| no_new_dataset | 0.945851 |
1502.06671 | Pinghui Wang Dr. | Pinghui Wang and John C.S. Lui and Don Towsley | Minfer: Inferring Motif Statistics From Sampled Edges | null | null | null | null | cs.SI physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Characterizing motif (i.e., locally connected subgraph patterns) statistics
is important for understanding complex networks such as online social networks
and communication networks. Previous work made the strong assumption that the
graph topology of interest is known, and that the dataset either fits into main
memory or stored on disks such that it is not expensive to obtain all neighbors
of any given node. In practice, researchers have to deal with the situation
where the graph topology is unknown, either because the graph is dynamic, or
because it is expensive to collect and store all topological and meta
information on disk. Hence, what is available to researchers is only a snapshot
of the graph generated by sampling edges from the graph at random, which we
called a "RESampled graph". Clearly, a RESampled graph's motif statistics may
be quite different from the underlying original graph. To solve this challenge,
we propose a framework and implement a system called Minfer, which can take the
given RESampled graph and accurately infer the underlying graph's motif
statistics. We also use Fisher information to bound the error of our estimates.
Experiments using large scale datasets show that our method to be accurate.
| [
{
"version": "v1",
"created": "Tue, 24 Feb 2015 01:43:59 GMT"
}
] | 2015-02-25T00:00:00 | [
[
"Wang",
"Pinghui",
""
],
[
"Lui",
"John C. S.",
""
],
[
"Towsley",
"Don",
""
]
] | TITLE: Minfer: Inferring Motif Statistics From Sampled Edges
ABSTRACT: Characterizing motif (i.e., locally connected subgraph patterns) statistics
is important for understanding complex networks such as online social networks
and communication networks. Previous work made the strong assumption that the
graph topology of interest is known, and that the dataset either fits into main
memory or stored on disks such that it is not expensive to obtain all neighbors
of any given node. In practice, researchers have to deal with the situation
where the graph topology is unknown, either because the graph is dynamic, or
because it is expensive to collect and store all topological and meta
information on disk. Hence, what is available to researchers is only a snapshot
of the graph generated by sampling edges from the graph at random, which we
called a "RESampled graph". Clearly, a RESampled graph's motif statistics may
be quite different from the underlying original graph. To solve this challenge,
we propose a framework and implement a system called Minfer, which can take the
given RESampled graph and accurately infer the underlying graph's motif
statistics. We also use Fisher information to bound the error of our estimates.
Experiments using large scale datasets show that our method to be accurate.
| no_new_dataset | 0.945298 |
1502.06703 | Smitha M.L. | B.H. Shekar, Smitha M.L., P. Shivakumara | Discrete Wavelet Transform and Gradient Difference based approach for
text localization in videos | Fifth International Conference on Signals and Image Processing, IEEE,
DOI 10.1109/ICSIP.2014.50, pp. 280-284, held at BNMIT, Bangalore in January
2014 | null | 10.1109/ICSIP.2014.50 | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The text detection and localization is important for video analysis and
understanding. The scene text in video contains semantic information and thus
can contribute significantly to video retrieval and understanding. However,
most of the approaches detect scene text in still images or single video frame.
Videos differ from images in temporal redundancy. This paper proposes a novel
hybrid method to robustly localize the texts in natural scene images and videos
based on fusion of discrete wavelet transform and gradient difference. A set of
rules and geometric properties have been devised to localize the actual text
regions. Then, morphological operation is performed to generate the text
regions and finally the connected component analysis is employed to localize
the text in a video frame. The experimental results obtained on publicly
available standard ICDAR 2003 and Hua dataset illustrate that the proposed
method can accurately detect and localize texts of various sizes, fonts and
colors. The experimentation on huge collection of video databases reveal the
suitability of the proposed method to video databases.
| [
{
"version": "v1",
"created": "Tue, 24 Feb 2015 07:46:34 GMT"
}
] | 2015-02-25T00:00:00 | [
[
"Shekar",
"B. H.",
""
],
[
"L.",
"Smitha M.",
""
],
[
"Shivakumara",
"P.",
""
]
] | TITLE: Discrete Wavelet Transform and Gradient Difference based approach for
text localization in videos
ABSTRACT: The text detection and localization is important for video analysis and
understanding. The scene text in video contains semantic information and thus
can contribute significantly to video retrieval and understanding. However,
most of the approaches detect scene text in still images or single video frame.
Videos differ from images in temporal redundancy. This paper proposes a novel
hybrid method to robustly localize the texts in natural scene images and videos
based on fusion of discrete wavelet transform and gradient difference. A set of
rules and geometric properties have been devised to localize the actual text
regions. Then, morphological operation is performed to generate the text
regions and finally the connected component analysis is employed to localize
the text in a video frame. The experimental results obtained on publicly
available standard ICDAR 2003 and Hua dataset illustrate that the proposed
method can accurately detect and localize texts of various sizes, fonts and
colors. The experimentation on huge collection of video databases reveal the
suitability of the proposed method to video databases.
| no_new_dataset | 0.953319 |
1502.06757 | Lse Lse | Mart\'in Dias (INRIA Lille - Nord Europe), Alberto Bacchelli, Georgios
Gousios, Damien Cassou (INRIA Lille - Nord Europe), St\'ephane Ducasse (INRIA
Lille - Nord Europe) | Untangling Fine-Grained Code Changes | null | null | null | null | cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | After working for some time, developers commit their code changes to a
version control system. When doing so, they often bundle unrelated changes
(e.g., bug fix and refactoring) in a single commit, thus creating a so-called
tangled commit. Sharing tangled commits is problematic because it makes review,
reversion, and integration of these commits harder and historical analyses of
the project less reliable. Researchers have worked at untangling existing
commits, i.e., finding which part of a commit relates to which task. In this
paper, we contribute to this line of work in two ways: (1) A publicly available
dataset of untangled code changes, created with the help of two developers who
accurately split their code changes into self contained tasks over a period of
four months; (2) a novel approach, EpiceaUntangler, to help developers share
untangled commits (aka. atomic commits) by using fine-grained code change
information. EpiceaUntangler is based and tested on the publicly available
dataset, and further evaluated by deploying it to 7 developers, who used it for
2 weeks. We recorded a median success rate of 91% and average one of 75%, in
automatically creating clusters of untangled fine-grained code changes.
| [
{
"version": "v1",
"created": "Tue, 24 Feb 2015 10:50:13 GMT"
}
] | 2015-02-25T00:00:00 | [
[
"Dias",
"Martín",
"",
"INRIA Lille - Nord Europe"
],
[
"Bacchelli",
"Alberto",
"",
"INRIA Lille - Nord Europe"
],
[
"Gousios",
"Georgios",
"",
"INRIA Lille - Nord Europe"
],
[
"Cassou",
"Damien",
"",
"INRIA Lille - Nord Europe"
],
[
"Ducasse",
"Stéphane",
"",
"INRIA\n Lille - Nord Europe"
]
] | TITLE: Untangling Fine-Grained Code Changes
ABSTRACT: After working for some time, developers commit their code changes to a
version control system. When doing so, they often bundle unrelated changes
(e.g., bug fix and refactoring) in a single commit, thus creating a so-called
tangled commit. Sharing tangled commits is problematic because it makes review,
reversion, and integration of these commits harder and historical analyses of
the project less reliable. Researchers have worked at untangling existing
commits, i.e., finding which part of a commit relates to which task. In this
paper, we contribute to this line of work in two ways: (1) A publicly available
dataset of untangled code changes, created with the help of two developers who
accurately split their code changes into self contained tasks over a period of
four months; (2) a novel approach, EpiceaUntangler, to help developers share
untangled commits (aka. atomic commits) by using fine-grained code change
information. EpiceaUntangler is based and tested on the publicly available
dataset, and further evaluated by deploying it to 7 developers, who used it for
2 weeks. We recorded a median success rate of 91% and average one of 75%, in
automatically creating clusters of untangled fine-grained code changes.
| no_new_dataset | 0.562567 |
1502.06796 | Seunghoon Hong | Seunghoon Hong, Tackgeun You, Suha Kwak, Bohyung Han | Online Tracking by Learning Discriminative Saliency Map with
Convolutional Neural Network | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose an online visual tracking algorithm by learning discriminative
saliency map using Convolutional Neural Network (CNN). Given a CNN pre-trained
on a large-scale image repository in offline, our algorithm takes outputs from
hidden layers of the network as feature descriptors since they show excellent
representation performance in various general visual recognition problems. The
features are used to learn discriminative target appearance models using an
online Support Vector Machine (SVM). In addition, we construct target-specific
saliency map by backpropagating CNN features with guidance of the SVM, and
obtain the final tracking result in each frame based on the appearance model
generatively constructed with the saliency map. Since the saliency map
visualizes spatial configuration of target effectively, it improves target
localization accuracy and enable us to achieve pixel-level target segmentation.
We verify the effectiveness of our tracking algorithm through extensive
experiment on a challenging benchmark, where our method illustrates outstanding
performance compared to the state-of-the-art tracking algorithms.
| [
{
"version": "v1",
"created": "Tue, 24 Feb 2015 13:10:32 GMT"
}
] | 2015-02-25T00:00:00 | [
[
"Hong",
"Seunghoon",
""
],
[
"You",
"Tackgeun",
""
],
[
"Kwak",
"Suha",
""
],
[
"Han",
"Bohyung",
""
]
] | TITLE: Online Tracking by Learning Discriminative Saliency Map with
Convolutional Neural Network
ABSTRACT: We propose an online visual tracking algorithm by learning discriminative
saliency map using Convolutional Neural Network (CNN). Given a CNN pre-trained
on a large-scale image repository in offline, our algorithm takes outputs from
hidden layers of the network as feature descriptors since they show excellent
representation performance in various general visual recognition problems. The
features are used to learn discriminative target appearance models using an
online Support Vector Machine (SVM). In addition, we construct target-specific
saliency map by backpropagating CNN features with guidance of the SVM, and
obtain the final tracking result in each frame based on the appearance model
generatively constructed with the saliency map. Since the saliency map
visualizes spatial configuration of target effectively, it improves target
localization accuracy and enable us to achieve pixel-level target segmentation.
We verify the effectiveness of our tracking algorithm through extensive
experiment on a challenging benchmark, where our method illustrates outstanding
performance compared to the state-of-the-art tracking algorithms.
| no_new_dataset | 0.951639 |
1502.06823 | Theodoros Rekatsinas | Theodoros Rekatsinas, Amol Deshpande and Aditya Parameswaran | CrowdGather: Entity Extraction over Structured Domains | null | null | null | null | cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Crowdsourced entity extraction is often used to acquire data for many
applications, including recommendation systems, construction of aggregated
listings and directories, and knowledge base construction. Current solutions
focus on entity extraction using a single query, e.g., only using "give me
another restaurant", when assembling a list of all restaurants. Due to the cost
of human labor, solutions that focus on a single query can be highly
impractical.
In this paper, we leverage the fact that entity extraction often focuses on
{\em structured domains}, i.e., domains that are described by a collection of
attributes, each potentially exhibiting hierarchical structure. Given such a
domain, we enable a richer space of queries, e.g., "give me another Moroccan
restaurant in Manhattan that does takeout". Naturally, enabling a richer space
of queries comes with a host of issues, especially since many queries return
empty answers. We develop new statistical tools that enable us to reason about
the gain of issuing {\em additional queries} given little to no information,
and show how we can exploit the overlaps across the results of queries for
different points of the data domain to obtain accurate estimates of the gain.
We cast the problem of {\em budgeted entity extraction} over large domains as
an adaptive optimization problem that seeks to maximize the number of extracted
entities, while minimizing the overall extraction costs. We evaluate our
techniques with experiments on both synthetic and real-world datasets,
demonstrating a yield of up to 4X over competing approaches for the same
budget.
| [
{
"version": "v1",
"created": "Tue, 24 Feb 2015 14:41:15 GMT"
}
] | 2015-02-25T00:00:00 | [
[
"Rekatsinas",
"Theodoros",
""
],
[
"Deshpande",
"Amol",
""
],
[
"Parameswaran",
"Aditya",
""
]
] | TITLE: CrowdGather: Entity Extraction over Structured Domains
ABSTRACT: Crowdsourced entity extraction is often used to acquire data for many
applications, including recommendation systems, construction of aggregated
listings and directories, and knowledge base construction. Current solutions
focus on entity extraction using a single query, e.g., only using "give me
another restaurant", when assembling a list of all restaurants. Due to the cost
of human labor, solutions that focus on a single query can be highly
impractical.
In this paper, we leverage the fact that entity extraction often focuses on
{\em structured domains}, i.e., domains that are described by a collection of
attributes, each potentially exhibiting hierarchical structure. Given such a
domain, we enable a richer space of queries, e.g., "give me another Moroccan
restaurant in Manhattan that does takeout". Naturally, enabling a richer space
of queries comes with a host of issues, especially since many queries return
empty answers. We develop new statistical tools that enable us to reason about
the gain of issuing {\em additional queries} given little to no information,
and show how we can exploit the overlaps across the results of queries for
different points of the data domain to obtain accurate estimates of the gain.
We cast the problem of {\em budgeted entity extraction} over large domains as
an adaptive optimization problem that seeks to maximize the number of extracted
entities, while minimizing the overall extraction costs. We evaluate our
techniques with experiments on both synthetic and real-world datasets,
demonstrating a yield of up to 4X over competing approaches for the same
budget.
| no_new_dataset | 0.941493 |
1306.0239 | Yichuan Tang | Yichuan Tang | Deep Learning using Linear Support Vector Machines | Contribution to the ICML 2013 Challenges in Representation Learning
Workshop | null | null | null | cs.LG stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Recently, fully-connected and convolutional neural networks have been trained
to achieve state-of-the-art performance on a wide variety of tasks such as
speech recognition, image classification, natural language processing, and
bioinformatics. For classification tasks, most of these "deep learning" models
employ the softmax activation function for prediction and minimize
cross-entropy loss. In this paper, we demonstrate a small but consistent
advantage of replacing the softmax layer with a linear support vector machine.
Learning minimizes a margin-based loss instead of the cross-entropy loss. While
there have been various combinations of neural nets and SVMs in prior art, our
results using L2-SVMs show that by simply replacing softmax with linear SVMs
gives significant gains on popular deep learning datasets MNIST, CIFAR-10, and
the ICML 2013 Representation Learning Workshop's face expression recognition
challenge.
| [
{
"version": "v1",
"created": "Sun, 2 Jun 2013 18:46:58 GMT"
},
{
"version": "v2",
"created": "Tue, 9 Jul 2013 21:30:59 GMT"
},
{
"version": "v3",
"created": "Mon, 23 Dec 2013 21:16:45 GMT"
},
{
"version": "v4",
"created": "Sat, 21 Feb 2015 16:58:39 GMT"
}
] | 2015-02-24T00:00:00 | [
[
"Tang",
"Yichuan",
""
]
] | TITLE: Deep Learning using Linear Support Vector Machines
ABSTRACT: Recently, fully-connected and convolutional neural networks have been trained
to achieve state-of-the-art performance on a wide variety of tasks such as
speech recognition, image classification, natural language processing, and
bioinformatics. For classification tasks, most of these "deep learning" models
employ the softmax activation function for prediction and minimize
cross-entropy loss. In this paper, we demonstrate a small but consistent
advantage of replacing the softmax layer with a linear support vector machine.
Learning minimizes a margin-based loss instead of the cross-entropy loss. While
there have been various combinations of neural nets and SVMs in prior art, our
results using L2-SVMs show that by simply replacing softmax with linear SVMs
gives significant gains on popular deep learning datasets MNIST, CIFAR-10, and
the ICML 2013 Representation Learning Workshop's face expression recognition
challenge.
| no_new_dataset | 0.950319 |
1312.6110 | Yichuan Tang | Yichuan Tang, Nitish Srivastava, Ruslan Salakhutdinov | Learning Generative Models with Visual Attention | In the proceedings of Neural Information Processing Systems, 2014 | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Attention has long been proposed by psychologists as important for
effectively dealing with the enormous sensory stimulus available in the
neocortex. Inspired by the visual attention models in computational
neuroscience and the need of object-centric data for generative models, we
describe for generative learning framework using attentional mechanisms.
Attentional mechanisms can propagate signals from region of interest in a scene
to an aligned canonical representation, where generative modeling takes place.
By ignoring background clutter, generative models can concentrate their
resources on the object of interest. Our model is a proper graphical model
where the 2D Similarity transformation is a part of the top-down process. A
ConvNet is employed to provide good initializations during posterior inference
which is based on Hamiltonian Monte Carlo. Upon learning images of faces, our
model can robustly attend to face regions of novel test subjects. More
importantly, our model can learn generative models of new faces from a novel
dataset of large images where the face locations are not known.
| [
{
"version": "v1",
"created": "Fri, 20 Dec 2013 20:50:43 GMT"
},
{
"version": "v2",
"created": "Mon, 30 Dec 2013 16:49:43 GMT"
},
{
"version": "v3",
"created": "Sat, 21 Feb 2015 22:21:15 GMT"
}
] | 2015-02-24T00:00:00 | [
[
"Tang",
"Yichuan",
""
],
[
"Srivastava",
"Nitish",
""
],
[
"Salakhutdinov",
"Ruslan",
""
]
] | TITLE: Learning Generative Models with Visual Attention
ABSTRACT: Attention has long been proposed by psychologists as important for
effectively dealing with the enormous sensory stimulus available in the
neocortex. Inspired by the visual attention models in computational
neuroscience and the need of object-centric data for generative models, we
describe for generative learning framework using attentional mechanisms.
Attentional mechanisms can propagate signals from region of interest in a scene
to an aligned canonical representation, where generative modeling takes place.
By ignoring background clutter, generative models can concentrate their
resources on the object of interest. Our model is a proper graphical model
where the 2D Similarity transformation is a part of the top-down process. A
ConvNet is employed to provide good initializations during posterior inference
which is based on Hamiltonian Monte Carlo. Upon learning images of faces, our
model can robustly attend to face regions of novel test subjects. More
importantly, our model can learn generative models of new faces from a novel
dataset of large images where the face locations are not known.
| no_new_dataset | 0.910942 |
1405.0312 | Piotr Doll\'ar | Tsung-Yi Lin, Michael Maire, Serge Belongie, Lubomir Bourdev, Ross
Girshick, James Hays, Pietro Perona, Deva Ramanan, C. Lawrence Zitnick, Piotr
Doll\'ar | Microsoft COCO: Common Objects in Context | 1) updated annotation pipeline description and figures; 2) added new
section describing datasets splits; 3) updated author list | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present a new dataset with the goal of advancing the state-of-the-art in
object recognition by placing the question of object recognition in the context
of the broader question of scene understanding. This is achieved by gathering
images of complex everyday scenes containing common objects in their natural
context. Objects are labeled using per-instance segmentations to aid in precise
object localization. Our dataset contains photos of 91 objects types that would
be easily recognizable by a 4 year old. With a total of 2.5 million labeled
instances in 328k images, the creation of our dataset drew upon extensive crowd
worker involvement via novel user interfaces for category detection, instance
spotting and instance segmentation. We present a detailed statistical analysis
of the dataset in comparison to PASCAL, ImageNet, and SUN. Finally, we provide
baseline performance analysis for bounding box and segmentation detection
results using a Deformable Parts Model.
| [
{
"version": "v1",
"created": "Thu, 1 May 2014 21:43:32 GMT"
},
{
"version": "v2",
"created": "Sat, 5 Jul 2014 18:39:56 GMT"
},
{
"version": "v3",
"created": "Sat, 21 Feb 2015 01:48:49 GMT"
}
] | 2015-02-24T00:00:00 | [
[
"Lin",
"Tsung-Yi",
""
],
[
"Maire",
"Michael",
""
],
[
"Belongie",
"Serge",
""
],
[
"Bourdev",
"Lubomir",
""
],
[
"Girshick",
"Ross",
""
],
[
"Hays",
"James",
""
],
[
"Perona",
"Pietro",
""
],
[
"Ramanan",
"Deva",
""
],
[
"Zitnick",
"C. Lawrence",
""
],
[
"Dollár",
"Piotr",
""
]
] | TITLE: Microsoft COCO: Common Objects in Context
ABSTRACT: We present a new dataset with the goal of advancing the state-of-the-art in
object recognition by placing the question of object recognition in the context
of the broader question of scene understanding. This is achieved by gathering
images of complex everyday scenes containing common objects in their natural
context. Objects are labeled using per-instance segmentations to aid in precise
object localization. Our dataset contains photos of 91 objects types that would
be easily recognizable by a 4 year old. With a total of 2.5 million labeled
instances in 328k images, the creation of our dataset drew upon extensive crowd
worker involvement via novel user interfaces for category detection, instance
spotting and instance segmentation. We present a detailed statistical analysis
of the dataset in comparison to PASCAL, ImageNet, and SUN. Finally, we provide
baseline performance analysis for bounding box and segmentation detection
results using a Deformable Parts Model.
| new_dataset | 0.956104 |
1412.6039 | Xin Yuan | Yunchen Pu, Xin Yuan and Lawrence Carin | Generative Deep Deconvolutional Learning | 21 pages, 9 figures, revised version for ICLR 2015 | null | null | null | stat.ML cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A generative Bayesian model is developed for deep (multi-layer) convolutional
dictionary learning. A novel probabilistic pooling operation is integrated into
the deep model, yielding efficient bottom-up and top-down probabilistic
learning. After learning the deep convolutional dictionary, testing is
implemented via deconvolutional inference. To speed up this inference, a new
statistical approach is proposed to project the top-layer dictionary elements
to the data level. Following this, only one layer of deconvolution is required
during testing. Experimental results demonstrate powerful capabilities of the
model to learn multi-layer features from images. Excellent classification
results are obtained on both the MNIST and Caltech 101 datasets.
| [
{
"version": "v1",
"created": "Thu, 18 Dec 2014 20:01:38 GMT"
},
{
"version": "v2",
"created": "Fri, 19 Dec 2014 17:21:36 GMT"
},
{
"version": "v3",
"created": "Sun, 22 Feb 2015 18:13:29 GMT"
}
] | 2015-02-24T00:00:00 | [
[
"Pu",
"Yunchen",
""
],
[
"Yuan",
"Xin",
""
],
[
"Carin",
"Lawrence",
""
]
] | TITLE: Generative Deep Deconvolutional Learning
ABSTRACT: A generative Bayesian model is developed for deep (multi-layer) convolutional
dictionary learning. A novel probabilistic pooling operation is integrated into
the deep model, yielding efficient bottom-up and top-down probabilistic
learning. After learning the deep convolutional dictionary, testing is
implemented via deconvolutional inference. To speed up this inference, a new
statistical approach is proposed to project the top-layer dictionary elements
to the data level. Following this, only one layer of deconvolution is required
during testing. Experimental results demonstrate powerful capabilities of the
model to learn multi-layer features from images. Excellent classification
results are obtained on both the MNIST and Caltech 101 datasets.
| no_new_dataset | 0.951233 |
1502.06064 | Ken Miura | Ken Miura, Tetsuaki Mano, Atsushi Kanehira, Yuichiro Tsuchiya and
Tatsuya Harada | MILJS : Brand New JavaScript Libraries for Matrix Calculation and
Machine Learning | null | null | null | null | stat.ML cs.LG cs.MS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | MILJS is a collection of state-of-the-art, platform-independent, scalable,
fast JavaScript libraries for matrix calculation and machine learning. Our core
library offering a matrix calculation is called Sushi, which exhibits far
better performance than any other leading machine learning libraries written in
JavaScript. Especially, our matrix multiplication is 177 times faster than the
fastest JavaScript benchmark. Based on Sushi, a machine learning library called
Tempura is provided, which supports various algorithms widely used in machine
learning research. We also provide Soba as a visualization library. The
implementations of our libraries are clearly written, properly documented and
thus can are easy to get started with, as long as there is a web browser. These
libraries are available from http://mil-tokyo.github.io/ under the MIT license.
| [
{
"version": "v1",
"created": "Sat, 21 Feb 2015 04:29:41 GMT"
}
] | 2015-02-24T00:00:00 | [
[
"Miura",
"Ken",
""
],
[
"Mano",
"Tetsuaki",
""
],
[
"Kanehira",
"Atsushi",
""
],
[
"Tsuchiya",
"Yuichiro",
""
],
[
"Harada",
"Tatsuya",
""
]
] | TITLE: MILJS : Brand New JavaScript Libraries for Matrix Calculation and
Machine Learning
ABSTRACT: MILJS is a collection of state-of-the-art, platform-independent, scalable,
fast JavaScript libraries for matrix calculation and machine learning. Our core
library offering a matrix calculation is called Sushi, which exhibits far
better performance than any other leading machine learning libraries written in
JavaScript. Especially, our matrix multiplication is 177 times faster than the
fastest JavaScript benchmark. Based on Sushi, a machine learning library called
Tempura is provided, which supports various algorithms widely used in machine
learning research. We also provide Soba as a visualization library. The
implementations of our libraries are clearly written, properly documented and
thus can are easy to get started with, as long as there is a web browser. These
libraries are available from http://mil-tokyo.github.io/ under the MIT license.
| no_new_dataset | 0.939025 |
1502.06086 | Suyash Gupta | Suyash Gupta, Rahul Shrivastava and V. Krishna Nandivada | DCAFE: Dynamic load-balanced loop Chunking & Aggressive Finish
Elimination for Recursive Task Parallel Programs | null | null | null | null | cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we present two symbiotic optimizations to optimize recursive
task parallel (RTP) programs by reducing the task creation and termination
overheads. Our first optimization Aggressive Finish-Elimination (AFE) helps
reduce the redundant join operations to a large extent. The second optimization
Dynamic Load-Balanced loop Chunking (DLBC) extends the prior work on loop
chunking to decide on the number of parallel tasks based on the number of
available worker threads, at runtime. Further, we discuss the impact of
exceptions on our optimizations and extend them to handle RTP programs that may
throw exceptions. We implemented DCAFE (= DLBC+AFE) in the X10v2.3 compiler and
tested it over a set of benchmark kernels on two different hardwares (a 16-core
Intel system and a 64-core AMD system). With respect to the base X10 compiler
extended with loop-chunking of Nandivada et al [Nandivada et
al.(2013)Nandivada, Shirako, Zhao, and Sarkar](LC), DCAFE achieved a geometric
mean speed up of 5.75x and 4.16x on the Intel and AMD system, respectively. We
also present an evaluation with respect to the energy consumption on the Intel
system and show that on average, compared to the LC versions, the DCAFE
versions consume 71.2% less energy.
| [
{
"version": "v1",
"created": "Sat, 21 Feb 2015 08:18:43 GMT"
}
] | 2015-02-24T00:00:00 | [
[
"Gupta",
"Suyash",
""
],
[
"Shrivastava",
"Rahul",
""
],
[
"Nandivada",
"V. Krishna",
""
]
] | TITLE: DCAFE: Dynamic load-balanced loop Chunking & Aggressive Finish
Elimination for Recursive Task Parallel Programs
ABSTRACT: In this paper, we present two symbiotic optimizations to optimize recursive
task parallel (RTP) programs by reducing the task creation and termination
overheads. Our first optimization Aggressive Finish-Elimination (AFE) helps
reduce the redundant join operations to a large extent. The second optimization
Dynamic Load-Balanced loop Chunking (DLBC) extends the prior work on loop
chunking to decide on the number of parallel tasks based on the number of
available worker threads, at runtime. Further, we discuss the impact of
exceptions on our optimizations and extend them to handle RTP programs that may
throw exceptions. We implemented DCAFE (= DLBC+AFE) in the X10v2.3 compiler and
tested it over a set of benchmark kernels on two different hardwares (a 16-core
Intel system and a 64-core AMD system). With respect to the base X10 compiler
extended with loop-chunking of Nandivada et al [Nandivada et
al.(2013)Nandivada, Shirako, Zhao, and Sarkar](LC), DCAFE achieved a geometric
mean speed up of 5.75x and 4.16x on the Intel and AMD system, respectively. We
also present an evaluation with respect to the energy consumption on the Intel
system and show that on average, compared to the LC versions, the DCAFE
versions consume 71.2% less energy.
| no_new_dataset | 0.942823 |
1502.06219 | Smitha M.L. | B.H. Shekar, Smitha M.L. | Video Text Localization with an emphasis on Edge Features | 8 pages, Eighth International Conference on Image and Signal
Processing, Elsevier Publications, ISBN: 9789351072522, pp: 324-330, held at
UVCE, Bangalore in July 2014. arXiv admin note: text overlap with
arXiv:1502.03913 | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The text detection and localization plays a major role in video analysis and
understanding. The scene text embedded in video consist of high-level semantics
and hence contributes significantly to visual content analysis and retrieval.
This paper proposes a novel method to robustly localize the texts in natural
scene images and videos based on sobel edge emphasizing approach. The input
image is preprocessed and edge emphasis is done to detect the text clusters.
Further, a set of rules have been devised using morphological operators for
false positive elimination and connected component analysis is performed to
detect the text regions and hence text localization is performed. The
experimental results obtained on publicly available standard datasets
illustrate that the proposed method can detect and localize the texts of
various sizes, fonts and colors.
| [
{
"version": "v1",
"created": "Sun, 22 Feb 2015 12:32:18 GMT"
}
] | 2015-02-24T00:00:00 | [
[
"Shekar",
"B. H.",
""
],
[
"L.",
"Smitha M.",
""
]
] | TITLE: Video Text Localization with an emphasis on Edge Features
ABSTRACT: The text detection and localization plays a major role in video analysis and
understanding. The scene text embedded in video consist of high-level semantics
and hence contributes significantly to visual content analysis and retrieval.
This paper proposes a novel method to robustly localize the texts in natural
scene images and videos based on sobel edge emphasizing approach. The input
image is preprocessed and edge emphasis is done to detect the text clusters.
Further, a set of rules have been devised using morphological operators for
false positive elimination and connected component analysis is performed to
detect the text regions and hence text localization is performed. The
experimental results obtained on publicly available standard datasets
illustrate that the proposed method can detect and localize the texts of
various sizes, fonts and colors.
| no_new_dataset | 0.953751 |
1502.06235 | Borislav Antic | Borislav Anti\'c and Bj\"orn Ommer | Spatio-temporal Video Parsing for Abnormality Detection | 15 pages, 12 figures, 3 tables | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Abnormality detection in video poses particular challenges due to the
infinite size of the class of all irregular objects and behaviors. Thus no (or
by far not enough) abnormal training samples are available and we need to find
abnormalities in test data without actually knowing what they are.
Nevertheless, the prevailing concept of the field is to directly search for
individual abnormal local patches or image regions independent of another. To
address this problem, we propose a method for joint detection of abnormalities
in videos by spatio-temporal video parsing. The goal of video parsing is to
find a set of indispensable normal spatio-temporal object hypotheses that
jointly explain all the foreground of a video, while, at the same time, being
supported by normal training samples. Consequently, we avoid a direct detection
of abnormalities and discover them indirectly as those hypotheses which are
needed for covering the foreground without finding an explanation for
themselves by normal samples. Abnormalities are localized by MAP inference in a
graphical model and we solve it efficiently by formulating it as a convex
optimization problem. We experimentally evaluate our approach on several
challenging benchmark sets, improving over the state-of-the-art on all standard
benchmarks both in terms of abnormality classification and localization.
| [
{
"version": "v1",
"created": "Sun, 22 Feb 2015 14:54:02 GMT"
}
] | 2015-02-24T00:00:00 | [
[
"Antić",
"Borislav",
""
],
[
"Ommer",
"Björn",
""
]
] | TITLE: Spatio-temporal Video Parsing for Abnormality Detection
ABSTRACT: Abnormality detection in video poses particular challenges due to the
infinite size of the class of all irregular objects and behaviors. Thus no (or
by far not enough) abnormal training samples are available and we need to find
abnormalities in test data without actually knowing what they are.
Nevertheless, the prevailing concept of the field is to directly search for
individual abnormal local patches or image regions independent of another. To
address this problem, we propose a method for joint detection of abnormalities
in videos by spatio-temporal video parsing. The goal of video parsing is to
find a set of indispensable normal spatio-temporal object hypotheses that
jointly explain all the foreground of a video, while, at the same time, being
supported by normal training samples. Consequently, we avoid a direct detection
of abnormalities and discover them indirectly as those hypotheses which are
needed for covering the foreground without finding an explanation for
themselves by normal samples. Abnormalities are localized by MAP inference in a
graphical model and we solve it efficiently by formulating it as a convex
optimization problem. We experimentally evaluate our approach on several
challenging benchmark sets, improving over the state-of-the-art on all standard
benchmarks both in terms of abnormality classification and localization.
| no_new_dataset | 0.951323 |
1502.06344 | Erik Rodner | Clemens-Alexander Brust, Sven Sickert, Marcel Simon, Erik Rodner,
Joachim Denzler | Convolutional Patch Networks with Spatial Prior for Road Detection and
Urban Scene Understanding | VISAPP 2015 paper | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Classifying single image patches is important in many different applications,
such as road detection or scene understanding. In this paper, we present
convolutional patch networks, which are convolutional networks learned to
distinguish different image patches and which can be used for pixel-wise
labeling. We also show how to incorporate spatial information of the patch as
an input to the network, which allows for learning spatial priors for certain
categories jointly with an appearance model. In particular, we focus on road
detection and urban scene understanding, two application areas where we are
able to achieve state-of-the-art results on the KITTI as well as on the
LabelMeFacade dataset.
Furthermore, our paper offers a guideline for people working in the area and
desperately wandering through all the painstaking details that render training
CNs on image patches extremely difficult.
| [
{
"version": "v1",
"created": "Mon, 23 Feb 2015 08:47:37 GMT"
}
] | 2015-02-24T00:00:00 | [
[
"Brust",
"Clemens-Alexander",
""
],
[
"Sickert",
"Sven",
""
],
[
"Simon",
"Marcel",
""
],
[
"Rodner",
"Erik",
""
],
[
"Denzler",
"Joachim",
""
]
] | TITLE: Convolutional Patch Networks with Spatial Prior for Road Detection and
Urban Scene Understanding
ABSTRACT: Classifying single image patches is important in many different applications,
such as road detection or scene understanding. In this paper, we present
convolutional patch networks, which are convolutional networks learned to
distinguish different image patches and which can be used for pixel-wise
labeling. We also show how to incorporate spatial information of the patch as
an input to the network, which allows for learning spatial priors for certain
categories jointly with an appearance model. In particular, we focus on road
detection and urban scene understanding, two application areas where we are
able to achieve state-of-the-art results on the KITTI as well as on the
LabelMeFacade dataset.
Furthermore, our paper offers a guideline for people working in the area and
desperately wandering through all the painstaking details that render training
CNs on image patches extremely difficult.
| no_new_dataset | 0.949342 |
1502.03913 | Smitha M.L. | B.H. Shekar, Smitha M.L | Skeleton Matching based approach for Text Localization in Scene Images | 10 pages, 8 figures, Eighth International Conference on Image and
Signal Processing,Elsevier Publications,pp: 145-153, held at UVCE, Bangalore
in July 2014. ISBN: 9789351072522 | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we propose a skeleton matching based approach which aids in
text localization in scene images. The input image is preprocessed and
segmented into blocks using connected component analysis. We obtain the
skeleton of the segmented block using morphology based approach. The
skeletonized images are compared with the trained templates in the database to
categorize into text and non-text blocks. Further, the newly designed
geometrical rules and morphological operations are employed on the detected
text blocks for scene text localization. The experimental results obtained on
publicly available standard datasets illustrate that the proposed method can
detect and localize the texts of various sizes, fonts and colors.
| [
{
"version": "v1",
"created": "Fri, 13 Feb 2015 08:42:00 GMT"
}
] | 2015-02-23T00:00:00 | [
[
"Shekar",
"B. H.",
""
],
[
"L",
"Smitha M.",
""
]
] | TITLE: Skeleton Matching based approach for Text Localization in Scene Images
ABSTRACT: In this paper, we propose a skeleton matching based approach which aids in
text localization in scene images. The input image is preprocessed and
segmented into blocks using connected component analysis. We obtain the
skeleton of the segmented block using morphology based approach. The
skeletonized images are compared with the trained templates in the database to
categorize into text and non-text blocks. Further, the newly designed
geometrical rules and morphological operations are employed on the detected
text blocks for scene text localization. The experimental results obtained on
publicly available standard datasets illustrate that the proposed method can
detect and localize the texts of various sizes, fonts and colors.
| no_new_dataset | 0.956917 |
1502.03918 | Smitha M.L. | B.H. Shekar, Smitha M.L | Gradient Difference based approach for Text Localization in Compressed
domain | 11 pages, Second International Conference on Emerging Research in
Computing, Information, Communications and Applications, Elsevier
Publications, ISBN: 9789351072638, vol. III, pp: 299-308, held at NMIT,
Bangalore August 2014 | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we propose a gradient difference based approach to text
localization in videos and scene images. The input video frame/ image is first
compressed using multilevel 2-D wavelet transform. The edge information of the
reconstructed image is found which is further used for finding the maximum
gradient difference between the pixels and then the boundaries of the detected
text blocks are computed using zero crossing technique. We perform logical AND
operation of the text blocks obtained by gradient difference and the zero
crossing technique followed by connected component analysis to eliminate the
false positives. Finally, the morphological dilation operation is employed on
the detected text blocks for scene text localization. The experimental results
obtained on publicly available standard datasets illustrate that the proposed
method can detect and localize the texts of various sizes, fonts and colors.
| [
{
"version": "v1",
"created": "Fri, 13 Feb 2015 09:08:35 GMT"
}
] | 2015-02-23T00:00:00 | [
[
"Shekar",
"B. H.",
""
],
[
"L",
"Smitha M.",
""
]
] | TITLE: Gradient Difference based approach for Text Localization in Compressed
domain
ABSTRACT: In this paper, we propose a gradient difference based approach to text
localization in videos and scene images. The input video frame/ image is first
compressed using multilevel 2-D wavelet transform. The edge information of the
reconstructed image is found which is further used for finding the maximum
gradient difference between the pixels and then the boundaries of the detected
text blocks are computed using zero crossing technique. We perform logical AND
operation of the text blocks obtained by gradient difference and the zero
crossing technique followed by connected component analysis to eliminate the
false positives. Finally, the morphological dilation operation is employed on
the detected text blocks for scene text localization. The experimental results
obtained on publicly available standard datasets illustrate that the proposed
method can detect and localize the texts of various sizes, fonts and colors.
| no_new_dataset | 0.956104 |
1502.05925 | Feng Nan | Feng Nan, Joseph Wang, Venkatesh Saligrama | Feature-Budgeted Random Forest | null | null | null | null | stat.ML cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We seek decision rules for prediction-time cost reduction, where complete
data is available for training, but during prediction-time, each feature can
only be acquired for an additional cost. We propose a novel random forest
algorithm to minimize prediction error for a user-specified {\it average}
feature acquisition budget. While random forests yield strong generalization
performance, they do not explicitly account for feature costs and furthermore
require low correlation among trees, which amplifies costs. Our random forest
grows trees with low acquisition cost and high strength based on greedy minimax
cost-weighted-impurity splits. Theoretically, we establish near-optimal
acquisition cost guarantees for our algorithm. Empirically, on a number of
benchmark datasets we demonstrate superior accuracy-cost curves against
state-of-the-art prediction-time algorithms.
| [
{
"version": "v1",
"created": "Fri, 20 Feb 2015 16:42:40 GMT"
}
] | 2015-02-23T00:00:00 | [
[
"Nan",
"Feng",
""
],
[
"Wang",
"Joseph",
""
],
[
"Saligrama",
"Venkatesh",
""
]
] | TITLE: Feature-Budgeted Random Forest
ABSTRACT: We seek decision rules for prediction-time cost reduction, where complete
data is available for training, but during prediction-time, each feature can
only be acquired for an additional cost. We propose a novel random forest
algorithm to minimize prediction error for a user-specified {\it average}
feature acquisition budget. While random forests yield strong generalization
performance, they do not explicitly account for feature costs and furthermore
require low correlation among trees, which amplifies costs. Our random forest
grows trees with low acquisition cost and high strength based on greedy minimax
cost-weighted-impurity splits. Theoretically, we establish near-optimal
acquisition cost guarantees for our algorithm. Empirically, on a number of
benchmark datasets we demonstrate superior accuracy-cost curves against
state-of-the-art prediction-time algorithms.
| no_new_dataset | 0.945197 |
1502.04272 | Alex James Dr | Joshin John Mathew and Alex Pappachen James | Spatial Stimuli Gradient Sketch Model | accepted for publication in IEEE Signal Processing Letters, 2015 | Volume: 22 Issue: 9 On page(s): 1336-1339, 2015 | 10.1109/LSP.2015.2404827 | null | cs.CV | http://creativecommons.org/licenses/by-nc-sa/3.0/ | The inability of automated edge detection methods inspired from primal sketch
models to accurately calculate object edges under the influence of pixel noise
is an open problem. Extending the principles of image perception i.e.
Weber-Fechner law, and Sheperd similarity law, we propose a new edge detection
method and formulation that use perceived brightness and neighbourhood
similarity calculations in the determination of robust object edges. The
robustness of the detected edges is benchmark against Sobel, SIS, Kirsch, and
Prewitt edge detection methods in an example face recognition problem showing
statistically significant improvement in recognition accuracy and pixel noise
tolerance.
| [
{
"version": "v1",
"created": "Sun, 15 Feb 2015 02:42:56 GMT"
}
] | 2015-02-20T00:00:00 | [
[
"Mathew",
"Joshin John",
""
],
[
"James",
"Alex Pappachen",
""
]
] | TITLE: Spatial Stimuli Gradient Sketch Model
ABSTRACT: The inability of automated edge detection methods inspired from primal sketch
models to accurately calculate object edges under the influence of pixel noise
is an open problem. Extending the principles of image perception i.e.
Weber-Fechner law, and Sheperd similarity law, we propose a new edge detection
method and formulation that use perceived brightness and neighbourhood
similarity calculations in the determination of robust object edges. The
robustness of the detected edges is benchmark against Sobel, SIS, Kirsch, and
Prewitt edge detection methods in an example face recognition problem showing
statistically significant improvement in recognition accuracy and pixel noise
tolerance.
| no_new_dataset | 0.951908 |
1502.05461 | Carl Vondrick | Carl Vondrick, Aditya Khosla, Hamed Pirsiavash, Tomasz Malisiewicz,
Antonio Torralba | Visualizing Object Detection Features | In submission to IJCV | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We introduce algorithms to visualize feature spaces used by object detectors.
Our method works by inverting a visual feature back to multiple natural images.
We found that these visualizations allow us to analyze object detection systems
in new ways and gain new insight into the detector's failures. For example,
when we visualize the features for high scoring false alarms, we discovered
that, although they are clearly wrong in image space, they do look deceptively
similar to true positives in feature space. This result suggests that many of
these false alarms are caused by our choice of feature space, and supports that
creating a better learning algorithm or building bigger datasets is unlikely to
correct these errors. By visualizing feature spaces, we can gain a more
intuitive understanding of recognition systems.
| [
{
"version": "v1",
"created": "Thu, 19 Feb 2015 04:11:14 GMT"
}
] | 2015-02-20T00:00:00 | [
[
"Vondrick",
"Carl",
""
],
[
"Khosla",
"Aditya",
""
],
[
"Pirsiavash",
"Hamed",
""
],
[
"Malisiewicz",
"Tomasz",
""
],
[
"Torralba",
"Antonio",
""
]
] | TITLE: Visualizing Object Detection Features
ABSTRACT: We introduce algorithms to visualize feature spaces used by object detectors.
Our method works by inverting a visual feature back to multiple natural images.
We found that these visualizations allow us to analyze object detection systems
in new ways and gain new insight into the detector's failures. For example,
when we visualize the features for high scoring false alarms, we discovered
that, although they are clearly wrong in image space, they do look deceptively
similar to true positives in feature space. This result suggests that many of
these false alarms are caused by our choice of feature space, and supports that
creating a better learning algorithm or building bigger datasets is unlikely to
correct these errors. By visualizing feature spaces, we can gain a more
intuitive understanding of recognition systems.
| no_new_dataset | 0.951729 |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.