id
large_stringlengths 9
16
| submitter
large_stringlengths 3
64
⌀ | authors
large_stringlengths 5
20.7k
| title
large_stringlengths 5
245
| comments
large_stringlengths 1
482
⌀ | journal-ref
large_stringlengths 4
382
⌀ | doi
large_stringlengths 9
151
⌀ | report-no
large_stringlengths 2
509
⌀ | categories
large_stringlengths 5
78
| license
large_stringclasses 9
values | abstract
large_stringlengths 83
3.55k
| versions
large listlengths 1
21
| update_date
timestamp[ms]date 2007-05-23 00:00:00
2025-04-25 00:00:00
| authors_parsed
large listlengths 1
1.35k
| prompt
large_stringlengths 166
3.64k
| label
stringclasses 2
values | prob
float64 0.5
0.98
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1502.04868 | Rafael Boloix-Tortosa | Rafael Boloix-Tortosa, F. Javier Pay\'an-Somet, Eva Arias-de-Reyna and
Juan Jos\'e Murillo-Fuentes | Proper Complex Gaussian Processes for Regression | null | null | null | null | cs.LG stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Complex-valued signals are used in the modeling of many systems in
engineering and science, hence being of fundamental interest. Often, random
complex-valued signals are considered to be proper. A proper complex random
variable or process is uncorrelated with its complex conjugate. This assumption
is a good model of the underlying physics in many problems, and simplifies the
computations. While linear processing and neural networks have been widely
studied for these signals, the development of complex-valued nonlinear kernel
approaches remains an open problem. In this paper we propose Gaussian processes
for regression as a framework to develop 1) a solution for proper
complex-valued kernel regression and 2) the design of the reproducing kernel
for complex-valued inputs, using the convolutional approach for
cross-covariances. In this design we pay attention to preserve, in the complex
domain, the measure of similarity between near inputs. The hyperparameters of
the kernel are learned maximizing the marginal likelihood using Wirtinger
derivatives. Besides, the approach is connected to the multiple output learning
scenario. In the experiments included, we first solve a proper complex Gaussian
process where the cross-covariance does not cancel, a challenging scenario when
dealing with proper complex signals. Then we successfully use these novel
results to solve some problems previously proposed in the literature as
benchmarks, reporting a remarkable improvement in the estimation error.
| [
{
"version": "v1",
"created": "Tue, 17 Feb 2015 11:59:44 GMT"
},
{
"version": "v2",
"created": "Wed, 18 Feb 2015 09:33:34 GMT"
}
] | 2015-02-19T00:00:00 | [
[
"Boloix-Tortosa",
"Rafael",
""
],
[
"Payán-Somet",
"F. Javier",
""
],
[
"Arias-de-Reyna",
"Eva",
""
],
[
"Murillo-Fuentes",
"Juan José",
""
]
] | TITLE: Proper Complex Gaussian Processes for Regression
ABSTRACT: Complex-valued signals are used in the modeling of many systems in
engineering and science, hence being of fundamental interest. Often, random
complex-valued signals are considered to be proper. A proper complex random
variable or process is uncorrelated with its complex conjugate. This assumption
is a good model of the underlying physics in many problems, and simplifies the
computations. While linear processing and neural networks have been widely
studied for these signals, the development of complex-valued nonlinear kernel
approaches remains an open problem. In this paper we propose Gaussian processes
for regression as a framework to develop 1) a solution for proper
complex-valued kernel regression and 2) the design of the reproducing kernel
for complex-valued inputs, using the convolutional approach for
cross-covariances. In this design we pay attention to preserve, in the complex
domain, the measure of similarity between near inputs. The hyperparameters of
the kernel are learned maximizing the marginal likelihood using Wirtinger
derivatives. Besides, the approach is connected to the multiple output learning
scenario. In the experiments included, we first solve a proper complex Gaussian
process where the cross-covariance does not cancel, a challenging scenario when
dealing with proper complex signals. Then we successfully use these novel
results to solve some problems previously proposed in the literature as
benchmarks, reporting a remarkable improvement in the estimation error.
| no_new_dataset | 0.947527 |
1502.05167 | Mansaf Alam Dr | Kashish Ara Shakil, Shadma Anis and Mansaf Alam | Dengue disease prediction using weka data mining tool | null | null | null | null | cs.CY cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Dengue is a life threatening disease prevalent in several developed as well
as developing countries like India.In this paper we discuss various algorithm
approaches of data mining that have been utilized for dengue disease
prediction. Data mining is a well known technique used by health organizations
for classification of diseases such as dengue, diabetes and cancer in
bioinformatics research. In the proposed approach we have used WEKA with 10
cross validation to evaluate data and compare results. Weka has an extensive
collection of different machine learning and data mining algorithms. In this
paper we have firstly classified the dengue data set and then compared the
different data mining techniques in weka through Explorer, knowledge flow and
Experimenter interfaces. Furthermore in order to validate our approach we have
used a dengue dataset with 108 instances but weka used 99 rows and 18
attributes to determine the prediction of disease and their accuracy using
classifications of different algorithms to find out the best performance. The
main objective of this paper is to classify data and assist the users in
extracting useful information from data and easily identify a suitable
algorithm for accurate predictive model from it. From the findings of this
paper it can be concluded that Na\"ive Bayes and J48 are the best performance
algorithms for classified accuracy because they achieved maximum accuracy= 100%
with 99 correctly classified instances, maximum ROC = 1, had least mean
absolute error and it took minimum time for building this model through
Explorer and Knowledge flow results
| [
{
"version": "v1",
"created": "Wed, 18 Feb 2015 09:52:55 GMT"
}
] | 2015-02-19T00:00:00 | [
[
"Shakil",
"Kashish Ara",
""
],
[
"Anis",
"Shadma",
""
],
[
"Alam",
"Mansaf",
""
]
] | TITLE: Dengue disease prediction using weka data mining tool
ABSTRACT: Dengue is a life threatening disease prevalent in several developed as well
as developing countries like India.In this paper we discuss various algorithm
approaches of data mining that have been utilized for dengue disease
prediction. Data mining is a well known technique used by health organizations
for classification of diseases such as dengue, diabetes and cancer in
bioinformatics research. In the proposed approach we have used WEKA with 10
cross validation to evaluate data and compare results. Weka has an extensive
collection of different machine learning and data mining algorithms. In this
paper we have firstly classified the dengue data set and then compared the
different data mining techniques in weka through Explorer, knowledge flow and
Experimenter interfaces. Furthermore in order to validate our approach we have
used a dengue dataset with 108 instances but weka used 99 rows and 18
attributes to determine the prediction of disease and their accuracy using
classifications of different algorithms to find out the best performance. The
main objective of this paper is to classify data and assist the users in
extracting useful information from data and easily identify a suitable
algorithm for accurate predictive model from it. From the findings of this
paper it can be concluded that Na\"ive Bayes and J48 are the best performance
algorithms for classified accuracy because they achieved maximum accuracy= 100%
with 99 correctly classified instances, maximum ROC = 1, had least mean
absolute error and it took minimum time for building this model through
Explorer and Knowledge flow results
| no_new_dataset | 0.951953 |
1502.05212 | Gianluigi Cioca | Gianluigi Ciocca, Paolo Napoletano, Raimondo Schettini | IAT - Image Annotation Tool: Manual | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The annotation of image and video data of large datasets is a fundamental
task in multimedia information retrieval and computer vision applications. In
order to support the users during the image and video annotation process,
several software tools have been developed to provide them with a graphical
environment which helps drawing object contours, handling tracking information
and specifying object metadata. Here we introduce a preliminary version of the
image annotation tools developed at the Imaging and Vision Laboratory.
| [
{
"version": "v1",
"created": "Wed, 18 Feb 2015 13:11:46 GMT"
}
] | 2015-02-19T00:00:00 | [
[
"Ciocca",
"Gianluigi",
""
],
[
"Napoletano",
"Paolo",
""
],
[
"Schettini",
"Raimondo",
""
]
] | TITLE: IAT - Image Annotation Tool: Manual
ABSTRACT: The annotation of image and video data of large datasets is a fundamental
task in multimedia information retrieval and computer vision applications. In
order to support the users during the image and video annotation process,
several software tools have been developed to provide them with a graphical
environment which helps drawing object contours, handling tracking information
and specifying object metadata. Here we introduce a preliminary version of the
image annotation tools developed at the Imaging and Vision Laboratory.
| no_new_dataset | 0.952442 |
1502.05241 | Michael Dirnberger | Michael Dirnberger and Adrian Neumann and Tim Kehl | NEFI: Network Extraction From Images | null | null | null | null | cs.CV cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Networks and network-like structures are amongst the central building blocks
of many technological and biological systems. Given a mathematical graph
representation of a network, methods from graph theory enable a precise
investigation of its properties. Software for the analysis of graphs is widely
available and has been applied to graphs describing large scale networks such
as social networks, protein-interaction networks, etc. In these applications,
graph acquisition, i.e., the extraction of a mathematical graph from a network,
is relatively simple. However, for many network-like structures, e.g. leaf
venations, slime molds and mud cracks, data collection relies on images where
graph extraction requires domain-specific solutions or even manual. Here we
introduce Network Extraction From Images, NEFI, a software tool that
automatically extracts accurate graphs from images of a wide range of networks
originating in various domains. While there is previous work on graph
extraction from images, theoretical results are fully accessible only to an
expert audience and ready-to-use implementations for non-experts are rarely
available or insufficiently documented. NEFI provides a novel platform allowing
practitioners from many disciplines to easily extract graph representations
from images by supplying flexible tools from image processing, computer vision
and graph theory bundled in a convenient package. Thus, NEFI constitutes a
scalable alternative to tedious and error-prone manual graph extraction and
special purpose tools. We anticipate NEFI to enable the collection of larger
datasets by reducing the time spent on graph extraction. The analysis of these
new datasets may open up the possibility to gain new insights into the
structure and function of various types of networks. NEFI is open source and
available http://nefi.mpi-inf.mpg.de.
| [
{
"version": "v1",
"created": "Wed, 18 Feb 2015 14:20:25 GMT"
}
] | 2015-02-19T00:00:00 | [
[
"Dirnberger",
"Michael",
""
],
[
"Neumann",
"Adrian",
""
],
[
"Kehl",
"Tim",
""
]
] | TITLE: NEFI: Network Extraction From Images
ABSTRACT: Networks and network-like structures are amongst the central building blocks
of many technological and biological systems. Given a mathematical graph
representation of a network, methods from graph theory enable a precise
investigation of its properties. Software for the analysis of graphs is widely
available and has been applied to graphs describing large scale networks such
as social networks, protein-interaction networks, etc. In these applications,
graph acquisition, i.e., the extraction of a mathematical graph from a network,
is relatively simple. However, for many network-like structures, e.g. leaf
venations, slime molds and mud cracks, data collection relies on images where
graph extraction requires domain-specific solutions or even manual. Here we
introduce Network Extraction From Images, NEFI, a software tool that
automatically extracts accurate graphs from images of a wide range of networks
originating in various domains. While there is previous work on graph
extraction from images, theoretical results are fully accessible only to an
expert audience and ready-to-use implementations for non-experts are rarely
available or insufficiently documented. NEFI provides a novel platform allowing
practitioners from many disciplines to easily extract graph representations
from images by supplying flexible tools from image processing, computer vision
and graph theory bundled in a convenient package. Thus, NEFI constitutes a
scalable alternative to tedious and error-prone manual graph extraction and
special purpose tools. We anticipate NEFI to enable the collection of larger
datasets by reducing the time spent on graph extraction. The analysis of these
new datasets may open up the possibility to gain new insights into the
structure and function of various types of networks. NEFI is open source and
available http://nefi.mpi-inf.mpg.de.
| no_new_dataset | 0.935051 |
1502.04983 | Thanapong Intharah | Thanapong Intharah and Gabriel J. Brostow | Context Tricks for Cheap Semantic Segmentation | Supplementary material can be found at
http://www0.cs.ucl.ac.uk/staff/T.Intharah/research.html | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Accurate semantic labeling of image pixels is difficult because intra-class
variability is often greater than inter-class variability. In turn, fast
semantic segmentation is hard because accurate models are usually too
complicated to also run quickly at test-time. Our experience with building and
running semantic segmentation systems has also shown a reasonably obvious
bottleneck on model complexity, imposed by small training datasets. We
therefore propose two simple complementary strategies that leverage context to
give better semantic segmentation, while scaling up or down to train on
different-sized datasets.
As easy modifications for existing semantic segmentation algorithms, we
introduce Decorrelated Semantic Texton Forests, and the Context Sensitive Image
Level Prior. The proposed modifications are tested using a Semantic Texton
Forest (STF) system, and the modifications are validated on two standard
benchmark datasets, MSRC-21 and PascalVOC-2010. In Python based comparisons,
our system is insignificantly slower than STF at test-time, yet produces
superior semantic segmentations overall, with just push-button training.
| [
{
"version": "v1",
"created": "Tue, 17 Feb 2015 18:08:53 GMT"
}
] | 2015-02-18T00:00:00 | [
[
"Intharah",
"Thanapong",
""
],
[
"Brostow",
"Gabriel J.",
""
]
] | TITLE: Context Tricks for Cheap Semantic Segmentation
ABSTRACT: Accurate semantic labeling of image pixels is difficult because intra-class
variability is often greater than inter-class variability. In turn, fast
semantic segmentation is hard because accurate models are usually too
complicated to also run quickly at test-time. Our experience with building and
running semantic segmentation systems has also shown a reasonably obvious
bottleneck on model complexity, imposed by small training datasets. We
therefore propose two simple complementary strategies that leverage context to
give better semantic segmentation, while scaling up or down to train on
different-sized datasets.
As easy modifications for existing semantic segmentation algorithms, we
introduce Decorrelated Semantic Texton Forests, and the Context Sensitive Image
Level Prior. The proposed modifications are tested using a Semantic Texton
Forest (STF) system, and the modifications are validated on two standard
benchmark datasets, MSRC-21 and PascalVOC-2010. In Python based comparisons,
our system is insignificantly slower than STF at test-time, yet produces
superior semantic segmentations overall, with just push-button training.
| no_new_dataset | 0.949809 |
1212.0975 | Arya Iranmehr | Hamed Masnadi-Shirazi, Nuno Vasconcelos and Arya Iranmehr | Cost-Sensitive Support Vector Machines | 32 pages, 4 figures | null | null | null | cs.LG stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A new procedure for learning cost-sensitive SVM(CS-SVM) classifiers is
proposed. The SVM hinge loss is extended to the cost sensitive setting, and the
CS-SVM is derived as the minimizer of the associated risk. The extension of the
hinge loss draws on recent connections between risk minimization and
probability elicitation. These connections are generalized to cost-sensitive
classification, in a manner that guarantees consistency with the cost-sensitive
Bayes risk, and associated Bayes decision rule. This ensures that optimal
decision rules, under the new hinge loss, implement the Bayes-optimal
cost-sensitive classification boundary. Minimization of the new hinge loss is
shown to be a generalization of the classic SVM optimization problem, and can
be solved by identical procedures. The dual problem of CS-SVM is carefully
scrutinized by means of regularization theory and sensitivity analysis and the
CS-SVM algorithm is substantiated. The proposed algorithm is also extended to
cost-sensitive learning with example dependent costs. The minimum cost
sensitive risk is proposed as the performance measure and is connected to ROC
analysis through vector optimization. The resulting algorithm avoids the
shortcomings of previous approaches to cost-sensitive SVM design, and is shown
to have superior experimental performance on a large number of cost sensitive
and imbalanced datasets.
| [
{
"version": "v1",
"created": "Wed, 5 Dec 2012 09:24:11 GMT"
},
{
"version": "v2",
"created": "Sun, 15 Feb 2015 11:17:57 GMT"
}
] | 2015-02-17T00:00:00 | [
[
"Masnadi-Shirazi",
"Hamed",
""
],
[
"Vasconcelos",
"Nuno",
""
],
[
"Iranmehr",
"Arya",
""
]
] | TITLE: Cost-Sensitive Support Vector Machines
ABSTRACT: A new procedure for learning cost-sensitive SVM(CS-SVM) classifiers is
proposed. The SVM hinge loss is extended to the cost sensitive setting, and the
CS-SVM is derived as the minimizer of the associated risk. The extension of the
hinge loss draws on recent connections between risk minimization and
probability elicitation. These connections are generalized to cost-sensitive
classification, in a manner that guarantees consistency with the cost-sensitive
Bayes risk, and associated Bayes decision rule. This ensures that optimal
decision rules, under the new hinge loss, implement the Bayes-optimal
cost-sensitive classification boundary. Minimization of the new hinge loss is
shown to be a generalization of the classic SVM optimization problem, and can
be solved by identical procedures. The dual problem of CS-SVM is carefully
scrutinized by means of regularization theory and sensitivity analysis and the
CS-SVM algorithm is substantiated. The proposed algorithm is also extended to
cost-sensitive learning with example dependent costs. The minimum cost
sensitive risk is proposed as the performance measure and is connected to ROC
analysis through vector optimization. The resulting algorithm avoids the
shortcomings of previous approaches to cost-sensitive SVM design, and is shown
to have superior experimental performance on a large number of cost sensitive
and imbalanced datasets.
| no_new_dataset | 0.949248 |
1309.2168 | Pablo Gonz\'alez-Brevis Dr | Jacek Gondzio, Pablo Gonz\'alez-Brevis and Pedro Munari | Large-scale optimization with the primal-dual column generation method | 28 pages, 1 figure, minor revision, scaled CPU times | null | null | Technical Report ERGO 13-014 | math.OC cs.LG cs.NA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The primal-dual column generation method (PDCGM) is a general-purpose column
generation technique that relies on the primal-dual interior point method to
solve the restricted master problems. The use of this interior point method
variant allows to obtain suboptimal and well-centered dual solutions which
naturally stabilizes the column generation. As recently presented in the
literature, reductions in the number of calls to the oracle and in the CPU
times are typically observed when compared to the standard column generation,
which relies on extreme optimal dual solutions. However, these results are
based on relatively small problems obtained from linear relaxations of
combinatorial applications. In this paper, we investigate the behaviour of the
PDCGM in a broader context, namely when solving large-scale convex optimization
problems. We have selected applications that arise in important real-life
contexts such as data analysis (multiple kernel learning problem),
decision-making under uncertainty (two-stage stochastic programming problems)
and telecommunication and transportation networks (multicommodity network flow
problem). In the numerical experiments, we use publicly available benchmark
instances to compare the performance of the PDCGM against recent results for
different methods presented in the literature, which were the best available
results to date. The analysis of these results suggests that the PDCGM offers
an attractive alternative over specialized methods since it remains competitive
in terms of number of iterations and CPU times even for large-scale
optimization problems.
| [
{
"version": "v1",
"created": "Mon, 9 Sep 2013 14:19:10 GMT"
},
{
"version": "v2",
"created": "Mon, 16 Feb 2015 17:40:28 GMT"
}
] | 2015-02-17T00:00:00 | [
[
"Gondzio",
"Jacek",
""
],
[
"González-Brevis",
"Pablo",
""
],
[
"Munari",
"Pedro",
""
]
] | TITLE: Large-scale optimization with the primal-dual column generation method
ABSTRACT: The primal-dual column generation method (PDCGM) is a general-purpose column
generation technique that relies on the primal-dual interior point method to
solve the restricted master problems. The use of this interior point method
variant allows to obtain suboptimal and well-centered dual solutions which
naturally stabilizes the column generation. As recently presented in the
literature, reductions in the number of calls to the oracle and in the CPU
times are typically observed when compared to the standard column generation,
which relies on extreme optimal dual solutions. However, these results are
based on relatively small problems obtained from linear relaxations of
combinatorial applications. In this paper, we investigate the behaviour of the
PDCGM in a broader context, namely when solving large-scale convex optimization
problems. We have selected applications that arise in important real-life
contexts such as data analysis (multiple kernel learning problem),
decision-making under uncertainty (two-stage stochastic programming problems)
and telecommunication and transportation networks (multicommodity network flow
problem). In the numerical experiments, we use publicly available benchmark
instances to compare the performance of the PDCGM against recent results for
different methods presented in the literature, which were the best available
results to date. The analysis of these results suggests that the PDCGM offers
an attractive alternative over specialized methods since it remains competitive
in terms of number of iterations and CPU times even for large-scale
optimization problems.
| no_new_dataset | 0.947137 |
1406.7611 | Lutz Bornmann Dr. | Lutz Bornmann | Validity of altmetrics data for measuring societal impact: A study using
data from Altmetric and F1000Prime | null | null | null | null | cs.DL physics.soc-ph stat.AP | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Can altmetric data be validly used for the measurement of societal impact?
The current study seeks to answer this question with a comprehensive dataset
(about 100,000 records) from very disparate sources (F1000, Altmetric, and an
in-house database based on Web of Science). In the F1000 peer review system,
experts attach particular tags to scientific papers which indicate whether a
paper could be of interest for science or rather for other segments of society.
The results show that papers with the tag "good for teaching" do achieve higher
altmetric counts than papers without this tag - if the quality of the papers is
controlled. At the same time, a higher citation count is shown especially by
papers with a tag that is specifically scientifically oriented ("new finding").
The findings indicate that papers tailored for a readership outside the area of
research should lead to societal impact. If altmetric data is to be used for
the measurement of societal impact, the question arises of its normalization.
In bibliometrics, citations are normalized for the papers' subject area and
publication year. This study has taken a second analytic step involving a
possible normalization of altmetric data. As the results show there are
particular scientific topics which are of especial interest for a wide
audience. Since these more or less interesting topics are not completely
reflected in Thomson Reuters' journal sets, a normalization of altmetric data
should not be based on the level of subject categories, but on the level of
topics.
| [
{
"version": "v1",
"created": "Mon, 30 Jun 2014 06:19:24 GMT"
},
{
"version": "v2",
"created": "Mon, 16 Feb 2015 08:37:42 GMT"
}
] | 2015-02-17T00:00:00 | [
[
"Bornmann",
"Lutz",
""
]
] | TITLE: Validity of altmetrics data for measuring societal impact: A study using
data from Altmetric and F1000Prime
ABSTRACT: Can altmetric data be validly used for the measurement of societal impact?
The current study seeks to answer this question with a comprehensive dataset
(about 100,000 records) from very disparate sources (F1000, Altmetric, and an
in-house database based on Web of Science). In the F1000 peer review system,
experts attach particular tags to scientific papers which indicate whether a
paper could be of interest for science or rather for other segments of society.
The results show that papers with the tag "good for teaching" do achieve higher
altmetric counts than papers without this tag - if the quality of the papers is
controlled. At the same time, a higher citation count is shown especially by
papers with a tag that is specifically scientifically oriented ("new finding").
The findings indicate that papers tailored for a readership outside the area of
research should lead to societal impact. If altmetric data is to be used for
the measurement of societal impact, the question arises of its normalization.
In bibliometrics, citations are normalized for the papers' subject area and
publication year. This study has taken a second analytic step involving a
possible normalization of altmetric data. As the results show there are
particular scientific topics which are of especial interest for a wide
audience. Since these more or less interesting topics are not completely
reflected in Thomson Reuters' journal sets, a normalization of altmetric data
should not be based on the level of subject categories, but on the level of
topics.
| no_new_dataset | 0.932944 |
1409.2863 | Lutz Bornmann Dr. | Lutz Bornmann | Usefulness of altmetrics for measuring the broader impact of research: A
case study using data from PLOS (altmetrics) and F1000Prime (paper tags) | arXiv admin note: text overlap with arXiv:1406.7611 | null | null | null | cs.DL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Purpose: Whereas citation counts allow the measurement of the impact of
research on research itself, an important role in the measurement of the impact
of research on other parts of society is ascribed to altmetrics. The present
case study investigates the usefulness of altmetrics for measuring the broader
impact of research. Methods: This case study is essentially based on a dataset
with papers obtained from F1000. The dataset was augmented with altmetrics
(such as Twitter counts) which were provided by PLOS (the Public Library of
Science). In total, the case study covers a total of 1,082 papers. Findings:
The F1000 dataset contains tags on papers which were assigned intellectually by
experts and which can characterise a paper. The most interesting tag for
altmetric research is "good for teaching". This tag is assigned to papers which
could be of interest to a wider circle of readers than the peers in a
specialist area. Particularly on Facebook and Twitter, one could expect papers
with this tag to be mentioned more often than those without this tag. With
respect to the "good for teaching" tag, the results from regression models were
able to confirm these expectations: Papers with this tag show significantly
higher Facebook and Twitter counts than papers without this tag. This
association could not be seen with Mendeley or Figshare counts (that is with
counts from platforms which are chiefly of interest in a scientific context).
Conclusions: The results of the current study indicate that Facebook and
Twitter, but not Figshare or Mendeley, can provide indications of papers which
are of interest to a broader circle of readers (and not only for the peers in a
specialist area), and seem therefore be useful for societal impact measurement.
| [
{
"version": "v1",
"created": "Tue, 9 Sep 2014 08:05:37 GMT"
},
{
"version": "v2",
"created": "Mon, 16 Feb 2015 08:43:56 GMT"
}
] | 2015-02-17T00:00:00 | [
[
"Bornmann",
"Lutz",
""
]
] | TITLE: Usefulness of altmetrics for measuring the broader impact of research: A
case study using data from PLOS (altmetrics) and F1000Prime (paper tags)
ABSTRACT: Purpose: Whereas citation counts allow the measurement of the impact of
research on research itself, an important role in the measurement of the impact
of research on other parts of society is ascribed to altmetrics. The present
case study investigates the usefulness of altmetrics for measuring the broader
impact of research. Methods: This case study is essentially based on a dataset
with papers obtained from F1000. The dataset was augmented with altmetrics
(such as Twitter counts) which were provided by PLOS (the Public Library of
Science). In total, the case study covers a total of 1,082 papers. Findings:
The F1000 dataset contains tags on papers which were assigned intellectually by
experts and which can characterise a paper. The most interesting tag for
altmetric research is "good for teaching". This tag is assigned to papers which
could be of interest to a wider circle of readers than the peers in a
specialist area. Particularly on Facebook and Twitter, one could expect papers
with this tag to be mentioned more often than those without this tag. With
respect to the "good for teaching" tag, the results from regression models were
able to confirm these expectations: Papers with this tag show significantly
higher Facebook and Twitter counts than papers without this tag. This
association could not be seen with Mendeley or Figshare counts (that is with
counts from platforms which are chiefly of interest in a scientific context).
Conclusions: The results of the current study indicate that Facebook and
Twitter, but not Figshare or Mendeley, can provide indications of papers which
are of interest to a broader circle of readers (and not only for the peers in a
specialist area), and seem therefore be useful for societal impact measurement.
| no_new_dataset | 0.919643 |
1502.03536 | Vamsi Ithapu | Chris Hinrichs, Vamsi K Ithapu, Qinyuan Sun, Sterling C Johnson, Vikas
Singh | Speeding up Permutation Testing in Neuroimaging | NIPS 13 | Advances in neural information processing systems (2013), pp.
890-898 | null | null | stat.CO cs.AI stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Multiple hypothesis testing is a significant problem in nearly all
neuroimaging studies. In order to correct for this phenomena, we require a
reliable estimate of the Family-Wise Error Rate (FWER). The well known
Bonferroni correction method, while simple to implement, is quite conservative,
and can substantially under-power a study because it ignores dependencies
between test statistics. Permutation testing, on the other hand, is an exact,
non-parametric method of estimating the FWER for a given $\alpha$-threshold,
but for acceptably low thresholds the computational burden can be prohibitive.
In this paper, we show that permutation testing in fact amounts to populating
the columns of a very large matrix ${\bf P}$. By analyzing the spectrum of this
matrix, under certain conditions, we see that ${\bf P}$ has a low-rank plus a
low-variance residual decomposition which makes it suitable for highly
sub--sampled --- on the order of $0.5\%$ --- matrix completion methods. Based
on this observation, we propose a novel permutation testing methodology which
offers a large speedup, without sacrificing the fidelity of the estimated FWER.
Our evaluations on four different neuroimaging datasets show that a
computational speedup factor of roughly $50\times$ can be achieved while
recovering the FWER distribution up to very high accuracy. Further, we show
that the estimated $\alpha$-threshold is also recovered faithfully, and is
stable.
| [
{
"version": "v1",
"created": "Thu, 12 Feb 2015 04:30:06 GMT"
}
] | 2015-02-17T00:00:00 | [
[
"Hinrichs",
"Chris",
""
],
[
"Ithapu",
"Vamsi K",
""
],
[
"Sun",
"Qinyuan",
""
],
[
"Johnson",
"Sterling C",
""
],
[
"Singh",
"Vikas",
""
]
] | TITLE: Speeding up Permutation Testing in Neuroimaging
ABSTRACT: Multiple hypothesis testing is a significant problem in nearly all
neuroimaging studies. In order to correct for this phenomena, we require a
reliable estimate of the Family-Wise Error Rate (FWER). The well known
Bonferroni correction method, while simple to implement, is quite conservative,
and can substantially under-power a study because it ignores dependencies
between test statistics. Permutation testing, on the other hand, is an exact,
non-parametric method of estimating the FWER for a given $\alpha$-threshold,
but for acceptably low thresholds the computational burden can be prohibitive.
In this paper, we show that permutation testing in fact amounts to populating
the columns of a very large matrix ${\bf P}$. By analyzing the spectrum of this
matrix, under certain conditions, we see that ${\bf P}$ has a low-rank plus a
low-variance residual decomposition which makes it suitable for highly
sub--sampled --- on the order of $0.5\%$ --- matrix completion methods. Based
on this observation, we propose a novel permutation testing methodology which
offers a large speedup, without sacrificing the fidelity of the estimated FWER.
Our evaluations on four different neuroimaging datasets show that a
computational speedup factor of roughly $50\times$ can be achieved while
recovering the FWER distribution up to very high accuracy. Further, we show
that the estimated $\alpha$-threshold is also recovered faithfully, and is
stable.
| no_new_dataset | 0.941654 |
1502.04132 | Zhenzhong Lan | Zhenzhong Lan, Xuanchong Li, Ming Lin, Alexander G. Hauptmann | Long-short Term Motion Feature for Action Classification and Retrieval | arXiv admin note: text overlap with arXiv:1411.6660 | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose a method for representing motion information for video
classification and retrieval. We improve upon local descriptor based methods
that have been among the most popular and successful models for representing
videos. The desired local descriptors need to satisfy two requirements: 1) to
be representative, 2) to be discriminative. Therefore, they need to occur
frequently enough in the videos and to be be able to tell the difference among
different types of motions. To generate such local descriptors, the video
blocks they are based on must contain just the right amount of motion
information. However, current state-of-the-art local descriptor methods use
video blocks with a single fixed size, which is insufficient for covering
actions with varying speeds. In this paper, we introduce a long-short term
motion feature that generates descriptors from video blocks with multiple
lengths, thus covering motions with large speed variance. Experimental results
show that, albeit simple, our model achieves state-of-the-arts results on
several benchmark datasets.
| [
{
"version": "v1",
"created": "Fri, 13 Feb 2015 21:15:57 GMT"
}
] | 2015-02-17T00:00:00 | [
[
"Lan",
"Zhenzhong",
""
],
[
"Li",
"Xuanchong",
""
],
[
"Lin",
"Ming",
""
],
[
"Hauptmann",
"Alexander G.",
""
]
] | TITLE: Long-short Term Motion Feature for Action Classification and Retrieval
ABSTRACT: We propose a method for representing motion information for video
classification and retrieval. We improve upon local descriptor based methods
that have been among the most popular and successful models for representing
videos. The desired local descriptors need to satisfy two requirements: 1) to
be representative, 2) to be discriminative. Therefore, they need to occur
frequently enough in the videos and to be be able to tell the difference among
different types of motions. To generate such local descriptors, the video
blocks they are based on must contain just the right amount of motion
information. However, current state-of-the-art local descriptor methods use
video blocks with a single fixed size, which is insufficient for covering
actions with varying speeds. In this paper, we introduce a long-short term
motion feature that generates descriptors from video blocks with multiple
lengths, thus covering motions with large speed variance. Experimental results
show that, albeit simple, our model achieves state-of-the-arts results on
several benchmark datasets.
| no_new_dataset | 0.956063 |
1502.04220 | Can Lu | Can Lu, Jeffrey Xu Yu, Rong-Hua Li, Hao Wei | Exploring Hierarchies in Online Social Networks | null | null | null | null | cs.SI cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Social hierarchy (i.e., pyramid structure of societies) is a fundamental
concept in sociology and social network analysis. The importance of social
hierarchy in a social network is that the topological structure of the social
hierarchy is essential in both shaping the nature of social interactions
between individuals and unfolding the structure of the social networks. The
social hierarchy found in a social network can be utilized to improve the
accuracy of link prediction, provide better query results, rank web pages, and
study information flow and spread in complex networks. In this paper, we model
a social network as a directed graph G, and consider the social hierarchy as
DAG (directed acyclic graph) of G, denoted as GD. By DAG, all the vertices in G
can be partitioned into different levels, the vertices at the same level
represent a disjoint group in the social hierarchy, and all the edges in DAG
follow one direction. The main issue we study in this paper is how to find DAG
GD in G. The approach we take is to find GD by removing all possible cycles
from G such that G = U(G) + GD where U(G) is a maximum Eulerian subgraph which
contains all possible cycles. We give the reasons for doing so, investigate the
properties of GD found, and discuss the applications. In addition, we develop a
novel two-phase algorithm, called Greedy-&-Refine, which greedily computes an
Eulerian subgraph and then refines this greedy solution to find the maximum
Eulerian subgraph. We give a bound between the greedy solution and the optimal.
The quality of our greedy approach is high. We conduct comprehensive
experimental studies over 14 real-world datasets. The results show that our
algorithms are at least two orders of magnitude faster than the baseline
algorithm.
| [
{
"version": "v1",
"created": "Sat, 14 Feb 2015 16:02:00 GMT"
}
] | 2015-02-17T00:00:00 | [
[
"Lu",
"Can",
""
],
[
"Yu",
"Jeffrey Xu",
""
],
[
"Li",
"Rong-Hua",
""
],
[
"Wei",
"Hao",
""
]
] | TITLE: Exploring Hierarchies in Online Social Networks
ABSTRACT: Social hierarchy (i.e., pyramid structure of societies) is a fundamental
concept in sociology and social network analysis. The importance of social
hierarchy in a social network is that the topological structure of the social
hierarchy is essential in both shaping the nature of social interactions
between individuals and unfolding the structure of the social networks. The
social hierarchy found in a social network can be utilized to improve the
accuracy of link prediction, provide better query results, rank web pages, and
study information flow and spread in complex networks. In this paper, we model
a social network as a directed graph G, and consider the social hierarchy as
DAG (directed acyclic graph) of G, denoted as GD. By DAG, all the vertices in G
can be partitioned into different levels, the vertices at the same level
represent a disjoint group in the social hierarchy, and all the edges in DAG
follow one direction. The main issue we study in this paper is how to find DAG
GD in G. The approach we take is to find GD by removing all possible cycles
from G such that G = U(G) + GD where U(G) is a maximum Eulerian subgraph which
contains all possible cycles. We give the reasons for doing so, investigate the
properties of GD found, and discuss the applications. In addition, we develop a
novel two-phase algorithm, called Greedy-&-Refine, which greedily computes an
Eulerian subgraph and then refines this greedy solution to find the maximum
Eulerian subgraph. We give a bound between the greedy solution and the optimal.
The quality of our greedy approach is high. We conduct comprehensive
experimental studies over 14 real-world datasets. The results show that our
algorithms are at least two orders of magnitude faster than the baseline
algorithm.
| no_new_dataset | 0.949059 |
1310.6670 | Matteo Camilli M.Sc. | Carlo Bellettini, Matteo Camilli, Lorenzo Capra, Mattia Monga | Distributed CTL Model Checking in the Cloud | 8 pages | null | 10.1109/SYNASC.2014.52 | null | cs.SE cs.DC cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The recent extensive availability of "big data" platforms calls for a more
widespread adoption by the formal verification community. In fact, formal
verification requires high performance data processing software for extracting
knowledge from the unprecedented amount of data which come from analyzed
systems. Since cloud based computing resources have became easily accessible,
there is an opportunity for verification techniques and tools to undergo a deep
technological transition to exploit the new available architectures. This has
created an increasing interest in parallelizing and distributing verification
techniques. In this paper we introduce a distributed approach which exploits
techniques typically used by the "big data" community to enable verification of
Computation Tree Logic (CTL) formulas on very large state spaces using
distributed systems and cloud computing facilities. The outcome of several
tests performed on benchmark specifications are presented, thus showing the
convenience of the proposed approach.
| [
{
"version": "v1",
"created": "Thu, 24 Oct 2013 16:54:37 GMT"
}
] | 2015-02-16T00:00:00 | [
[
"Bellettini",
"Carlo",
""
],
[
"Camilli",
"Matteo",
""
],
[
"Capra",
"Lorenzo",
""
],
[
"Monga",
"Mattia",
""
]
] | TITLE: Distributed CTL Model Checking in the Cloud
ABSTRACT: The recent extensive availability of "big data" platforms calls for a more
widespread adoption by the formal verification community. In fact, formal
verification requires high performance data processing software for extracting
knowledge from the unprecedented amount of data which come from analyzed
systems. Since cloud based computing resources have became easily accessible,
there is an opportunity for verification techniques and tools to undergo a deep
technological transition to exploit the new available architectures. This has
created an increasing interest in parallelizing and distributing verification
techniques. In this paper we introduce a distributed approach which exploits
techniques typically used by the "big data" community to enable verification of
Computation Tree Logic (CTL) formulas on very large state spaces using
distributed systems and cloud computing facilities. The outcome of several
tests performed on benchmark specifications are presented, thus showing the
convenience of the proposed approach.
| no_new_dataset | 0.943138 |
1408.3873 | Lorenzo Livi | Lorenzo Livi, Antonello Rizzi, Alireza Sadeghian | Classifying sequences by the optimized dissimilarity space embedding
approach: a case study on the solubility analysis of the E. coli proteome | 10 pages, 49 references | null | 10.3233/IFS-151550 | null | cs.CV cs.AI physics.bio-ph q-bio.BM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We evaluate a version of the recently-proposed classification system named
Optimized Dissimilarity Space Embedding (ODSE) that operates in the input space
of sequences of generic objects. The ODSE system has been originally presented
as a classification system for patterns represented as labeled graphs. However,
since ODSE is founded on the dissimilarity space representation of the input
data, the classifier can be easily adapted to any input domain where it is
possible to define a meaningful dissimilarity measure. Here we demonstrate the
effectiveness of the ODSE classifier for sequences by considering an
application dealing with the recognition of the solubility degree of the
Escherichia coli proteome. Solubility, or analogously aggregation propensity,
is an important property of protein molecules, which is intimately related to
the mechanisms underlying the chemico-physical process of folding. Each protein
of our dataset is initially associated with a solubility degree and it is
represented as a sequence of symbols, denoting the 20 amino acid residues. The
herein obtained computational results, which we stress that have been achieved
with no context-dependent tuning of the ODSE system, confirm the validity and
generality of the ODSE-based approach for structured data classification.
| [
{
"version": "v1",
"created": "Sun, 17 Aug 2014 23:46:55 GMT"
},
{
"version": "v2",
"created": "Wed, 14 Jan 2015 21:20:19 GMT"
}
] | 2015-02-16T00:00:00 | [
[
"Livi",
"Lorenzo",
""
],
[
"Rizzi",
"Antonello",
""
],
[
"Sadeghian",
"Alireza",
""
]
] | TITLE: Classifying sequences by the optimized dissimilarity space embedding
approach: a case study on the solubility analysis of the E. coli proteome
ABSTRACT: We evaluate a version of the recently-proposed classification system named
Optimized Dissimilarity Space Embedding (ODSE) that operates in the input space
of sequences of generic objects. The ODSE system has been originally presented
as a classification system for patterns represented as labeled graphs. However,
since ODSE is founded on the dissimilarity space representation of the input
data, the classifier can be easily adapted to any input domain where it is
possible to define a meaningful dissimilarity measure. Here we demonstrate the
effectiveness of the ODSE classifier for sequences by considering an
application dealing with the recognition of the solubility degree of the
Escherichia coli proteome. Solubility, or analogously aggregation propensity,
is an important property of protein molecules, which is intimately related to
the mechanisms underlying the chemico-physical process of folding. Each protein
of our dataset is initially associated with a solubility degree and it is
represented as a sequence of symbols, denoting the 20 amino acid residues. The
herein obtained computational results, which we stress that have been achieved
with no context-dependent tuning of the ODSE system, confirm the validity and
generality of the ODSE-based approach for structured data classification.
| no_new_dataset | 0.939192 |
1409.2802 | William March | William B. March and George Biros | Far-Field Compression for Fast Kernel Summation Methods in High
Dimensions | 43 pages, 21 figures | null | null | null | cs.LG stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider fast kernel summations in high dimensions: given a large set of
points in $d$ dimensions (with $d \gg 3$) and a pair-potential function (the
{\em kernel} function), we compute a weighted sum of all pairwise kernel
interactions for each point in the set. Direct summation is equivalent to a
(dense) matrix-vector multiplication and scales quadratically with the number
of points. Fast kernel summation algorithms reduce this cost to log-linear or
linear complexity.
Treecodes and Fast Multipole Methods (FMMs) deliver tremendous speedups by
constructing approximate representations of interactions of points that are far
from each other. In algebraic terms, these representations correspond to
low-rank approximations of blocks of the overall interaction matrix. Existing
approaches require an excessive number of kernel evaluations with increasing
$d$ and number of points in the dataset.
To address this issue, we use a randomized algebraic approach in which we
first sample the rows of a block and then construct its approximate, low-rank
interpolative decomposition. We examine the feasibility of this approach
theoretically and experimentally. We provide a new theoretical result showing a
tighter bound on the reconstruction error from uniformly sampling rows than the
existing state-of-the-art. We demonstrate that our sampling approach is
competitive with existing (but prohibitively expensive) methods from the
literature. We also construct kernel matrices for the Laplacian, Gaussian, and
polynomial kernels -- all commonly used in physics and data analysis. We
explore the numerical properties of blocks of these matrices, and show that
they are amenable to our approach. Depending on the data set, our randomized
algorithm can successfully compute low rank approximations in high dimensions.
We report results for data sets with ambient dimensions from four to 1,000.
| [
{
"version": "v1",
"created": "Tue, 9 Sep 2014 16:28:40 GMT"
},
{
"version": "v2",
"created": "Fri, 13 Feb 2015 00:30:28 GMT"
}
] | 2015-02-16T00:00:00 | [
[
"March",
"William B.",
""
],
[
"Biros",
"George",
""
]
] | TITLE: Far-Field Compression for Fast Kernel Summation Methods in High
Dimensions
ABSTRACT: We consider fast kernel summations in high dimensions: given a large set of
points in $d$ dimensions (with $d \gg 3$) and a pair-potential function (the
{\em kernel} function), we compute a weighted sum of all pairwise kernel
interactions for each point in the set. Direct summation is equivalent to a
(dense) matrix-vector multiplication and scales quadratically with the number
of points. Fast kernel summation algorithms reduce this cost to log-linear or
linear complexity.
Treecodes and Fast Multipole Methods (FMMs) deliver tremendous speedups by
constructing approximate representations of interactions of points that are far
from each other. In algebraic terms, these representations correspond to
low-rank approximations of blocks of the overall interaction matrix. Existing
approaches require an excessive number of kernel evaluations with increasing
$d$ and number of points in the dataset.
To address this issue, we use a randomized algebraic approach in which we
first sample the rows of a block and then construct its approximate, low-rank
interpolative decomposition. We examine the feasibility of this approach
theoretically and experimentally. We provide a new theoretical result showing a
tighter bound on the reconstruction error from uniformly sampling rows than the
existing state-of-the-art. We demonstrate that our sampling approach is
competitive with existing (but prohibitively expensive) methods from the
literature. We also construct kernel matrices for the Laplacian, Gaussian, and
polynomial kernels -- all commonly used in physics and data analysis. We
explore the numerical properties of blocks of these matrices, and show that
they are amenable to our approach. Depending on the data set, our randomized
algorithm can successfully compute low rank approximations in high dimensions.
We report results for data sets with ambient dimensions from four to 1,000.
| no_new_dataset | 0.941708 |
1502.03845 | Alessandro Provetti | Biagio Bonasera, Emilio Ferrara, Giacomo Fiumara, Francesco Pagano,
Alessandro Provetti | Adaptive Search over Sorted Sets | 9 pages | Journal of Discrete Algorithms, Volume 30, 2015, pp. 128--133 | 10.1016/j.jda.2014.12.007 | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We revisit the classical algorithms for searching over sorted sets to
introduce an algorithm refinement, called Adaptive Search, that combines the
good features of Interpolation search and those of Binary search. W.r.t.
Interpolation search, only a constant number of extra comparisons is
introduced. Yet, under diverse input data distributions our algorithm shows
costs comparable to that of Interpolation search, i.e., O(log log n) while the
worst-case cost is always in O(log n), as with Binary search. On benchmarks
drawn from large datasets, both synthetic and real-life, Adaptive search scores
better times and lesser memory accesses even than Santoro and Sidney's
Interpolation-Binary search.
| [
{
"version": "v1",
"created": "Thu, 12 Feb 2015 22:12:54 GMT"
}
] | 2015-02-16T00:00:00 | [
[
"Bonasera",
"Biagio",
""
],
[
"Ferrara",
"Emilio",
""
],
[
"Fiumara",
"Giacomo",
""
],
[
"Pagano",
"Francesco",
""
],
[
"Provetti",
"Alessandro",
""
]
] | TITLE: Adaptive Search over Sorted Sets
ABSTRACT: We revisit the classical algorithms for searching over sorted sets to
introduce an algorithm refinement, called Adaptive Search, that combines the
good features of Interpolation search and those of Binary search. W.r.t.
Interpolation search, only a constant number of extra comparisons is
introduced. Yet, under diverse input data distributions our algorithm shows
costs comparable to that of Interpolation search, i.e., O(log log n) while the
worst-case cost is always in O(log n), as with Binary search. On benchmarks
drawn from large datasets, both synthetic and real-life, Adaptive search scores
better times and lesser memory accesses even than Santoro and Sidney's
Interpolation-Binary search.
| no_new_dataset | 0.950088 |
1502.03851 | Arash Vahdat | Mehran Khodabandeh, Arash Vahdat, Guang-Tong Zhou, Hossein
Hajimirsadeghi, Mehrsan Javan Roshtkhari, Greg Mori, Stephen Se | Discovering Human Interactions in Videos with Limited Data Labeling | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present a novel approach for discovering human interactions in videos.
Activity understanding techniques usually require a large number of labeled
examples, which are not available in many practical cases. Here, we focus on
recovering semantically meaningful clusters of human-human and human-object
interaction in an unsupervised fashion. A new iterative solution is introduced
based on Maximum Margin Clustering (MMC), which also accepts user feedback to
refine clusters. This is achieved by formulating the whole process as a unified
constrained latent max-margin clustering problem. Extensive experiments have
been carried out over three challenging datasets, Collective Activity, VIRAT,
and UT-interaction. Empirical results demonstrate that the proposed algorithm
can efficiently discover perfect semantic clusters of human interactions with
only a small amount of labeling effort.
| [
{
"version": "v1",
"created": "Thu, 12 Feb 2015 22:38:28 GMT"
}
] | 2015-02-16T00:00:00 | [
[
"Khodabandeh",
"Mehran",
""
],
[
"Vahdat",
"Arash",
""
],
[
"Zhou",
"Guang-Tong",
""
],
[
"Hajimirsadeghi",
"Hossein",
""
],
[
"Roshtkhari",
"Mehrsan Javan",
""
],
[
"Mori",
"Greg",
""
],
[
"Se",
"Stephen",
""
]
] | TITLE: Discovering Human Interactions in Videos with Limited Data Labeling
ABSTRACT: We present a novel approach for discovering human interactions in videos.
Activity understanding techniques usually require a large number of labeled
examples, which are not available in many practical cases. Here, we focus on
recovering semantically meaningful clusters of human-human and human-object
interaction in an unsupervised fashion. A new iterative solution is introduced
based on Maximum Margin Clustering (MMC), which also accepts user feedback to
refine clusters. This is achieved by formulating the whole process as a unified
constrained latent max-margin clustering problem. Extensive experiments have
been carried out over three challenging datasets, Collective Activity, VIRAT,
and UT-interaction. Empirical results demonstrate that the proposed algorithm
can efficiently discover perfect semantic clusters of human interactions with
only a small amount of labeling effort.
| no_new_dataset | 0.945751 |
1502.03879 | Weiya Ren | Weiya Ren | Semi-supervised Data Representation via Affinity Graph Learning | 10 pages,2 Tables. Written in Aug,2013 | null | null | null | cs.LG cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider the general problem of utilizing both labeled and unlabeled data
to improve data representation performance. A new semi-supervised learning
framework is proposed by combing manifold regularization and data
representation methods such as Non negative matrix factorization and sparse
coding. We adopt unsupervised data representation methods as the learning
machines because they do not depend on the labeled data, which can improve
machine's generation ability as much as possible. The proposed framework forms
the Laplacian regularizer through learning the affinity graph. We incorporate
the new Laplacian regularizer into the unsupervised data representation to
smooth the low dimensional representation of data and make use of label
information. Experimental results on several real benchmark datasets indicate
that our semi-supervised learning framework achieves encouraging results
compared with state-of-art methods.
| [
{
"version": "v1",
"created": "Fri, 13 Feb 2015 03:35:15 GMT"
}
] | 2015-02-16T00:00:00 | [
[
"Ren",
"Weiya",
""
]
] | TITLE: Semi-supervised Data Representation via Affinity Graph Learning
ABSTRACT: We consider the general problem of utilizing both labeled and unlabeled data
to improve data representation performance. A new semi-supervised learning
framework is proposed by combing manifold regularization and data
representation methods such as Non negative matrix factorization and sparse
coding. We adopt unsupervised data representation methods as the learning
machines because they do not depend on the labeled data, which can improve
machine's generation ability as much as possible. The proposed framework forms
the Laplacian regularizer through learning the affinity graph. We incorporate
the new Laplacian regularizer into the unsupervised data representation to
smooth the low dimensional representation of data and make use of label
information. Experimental results on several real benchmark datasets indicate
that our semi-supervised learning framework achieves encouraging results
compared with state-of-art methods.
| no_new_dataset | 0.948965 |
1502.04025 | Tilo Wettig | Paul Arts, Jacques Bloch, Peter Georg, Benjamin Glaessle, Simon
Heybrock, Yu Komatsubara, Robert Lohmayer, Simon Mages, Bernhard Mendl, Nils
Meyer, Alessio Parcianello, Dirk Pleiter, Florian Rappl, Mauro Rossi, Stefan
Solbrig, Giampietro Tecchiolli, Tilo Wettig, Gianpaolo Zanier | QPACE 2 and Domain Decomposition on the Intel Xeon Phi | plenary talk at Lattice 2014, to appear in the conference proceedings
PoS(LATTICE2014), 15 pages, 9 figures | null | null | null | cs.DC hep-lat physics.comp-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We give an overview of QPACE 2, which is a custom-designed supercomputer
based on Intel Xeon Phi processors, developed in a collaboration of Regensburg
University and Eurotech. We give some general recommendations for how to write
high-performance code for the Xeon Phi and then discuss our implementation of a
domain-decomposition-based solver and present a number of benchmarks.
| [
{
"version": "v1",
"created": "Fri, 13 Feb 2015 15:23:52 GMT"
}
] | 2015-02-16T00:00:00 | [
[
"Arts",
"Paul",
""
],
[
"Bloch",
"Jacques",
""
],
[
"Georg",
"Peter",
""
],
[
"Glaessle",
"Benjamin",
""
],
[
"Heybrock",
"Simon",
""
],
[
"Komatsubara",
"Yu",
""
],
[
"Lohmayer",
"Robert",
""
],
[
"Mages",
"Simon",
""
],
[
"Mendl",
"Bernhard",
""
],
[
"Meyer",
"Nils",
""
],
[
"Parcianello",
"Alessio",
""
],
[
"Pleiter",
"Dirk",
""
],
[
"Rappl",
"Florian",
""
],
[
"Rossi",
"Mauro",
""
],
[
"Solbrig",
"Stefan",
""
],
[
"Tecchiolli",
"Giampietro",
""
],
[
"Wettig",
"Tilo",
""
],
[
"Zanier",
"Gianpaolo",
""
]
] | TITLE: QPACE 2 and Domain Decomposition on the Intel Xeon Phi
ABSTRACT: We give an overview of QPACE 2, which is a custom-designed supercomputer
based on Intel Xeon Phi processors, developed in a collaboration of Regensburg
University and Eurotech. We give some general recommendations for how to write
high-performance code for the Xeon Phi and then discuss our implementation of a
domain-decomposition-based solver and present a number of benchmarks.
| no_new_dataset | 0.953535 |
1402.3144 | Marc Claesen | Marc Claesen, Frank De Smet, Johan A. K. Suykens, Bart De Moor | A Robust Ensemble Approach to Learn From Positive and Unlabeled Data
Using SVM Base Models | 34 pages, 6 figures, 6 tables. Accepted for publication in
Neurocomputing: Special Issue on Advances in Learning with Label Noise | null | 10.1016/j.neucom.2014.10.081 | null | stat.ML cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present a novel approach to learn binary classifiers when only positive
and unlabeled instances are available (PU learning). This problem is routinely
cast as a supervised task with label noise in the negative set. We use an
ensemble of SVM models trained on bootstrap resamples of the training data for
increased robustness against label noise. The approach can be considered in a
bagging framework which provides an intuitive explanation for its mechanics in
a semi-supervised setting. We compared our method to state-of-the-art
approaches in simulations using multiple public benchmark data sets. The
included benchmark comprises three settings with increasing label noise: (i)
fully supervised, (ii) PU learning and (iii) PU learning with false positives.
Our approach shows a marginal improvement over existing methods in the second
setting and a significant improvement in the third.
| [
{
"version": "v1",
"created": "Thu, 13 Feb 2014 14:18:17 GMT"
},
{
"version": "v2",
"created": "Tue, 21 Oct 2014 12:29:58 GMT"
}
] | 2015-02-13T00:00:00 | [
[
"Claesen",
"Marc",
""
],
[
"De Smet",
"Frank",
""
],
[
"Suykens",
"Johan A. K.",
""
],
[
"De Moor",
"Bart",
""
]
] | TITLE: A Robust Ensemble Approach to Learn From Positive and Unlabeled Data
Using SVM Base Models
ABSTRACT: We present a novel approach to learn binary classifiers when only positive
and unlabeled instances are available (PU learning). This problem is routinely
cast as a supervised task with label noise in the negative set. We use an
ensemble of SVM models trained on bootstrap resamples of the training data for
increased robustness against label noise. The approach can be considered in a
bagging framework which provides an intuitive explanation for its mechanics in
a semi-supervised setting. We compared our method to state-of-the-art
approaches in simulations using multiple public benchmark data sets. The
included benchmark comprises three settings with increasing label noise: (i)
fully supervised, (ii) PU learning and (iii) PU learning with false positives.
Our approach shows a marginal improvement over existing methods in the second
setting and a significant improvement in the third.
| no_new_dataset | 0.944434 |
1408.6615 | Shervin Minaee | Shervin Minaee and AmirAli Abdolrashidi | Multispectral Palmprint Recognition Using Textural Features | 5 pages, Published in IEEE Signal Processing in Medicine and Biology
Symposium 2014 | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In order to utilize identification to the best extent, we need robust and
fast algorithms and systems to process the data. Having palmprint as a reliable
and unique characteristic of every person, we extract and use its features
based on its geometry, lines and angles. There are countless ways to define
measures for the recognition task. To analyze a new point of view, we extracted
textural features and used them for palmprint recognition. Co-occurrence matrix
can be used for textural feature extraction. As classifiers, we have used the
minimum distance classifier (MDC) and the weighted majority voting system
(WMV). The proposed method is tested on a well-known multispectral palmprint
dataset of 6000 samples and an accuracy rate of 99.96-100% is obtained for most
scenarios which outperforms all previous works in multispectral palmprint
recognition.
| [
{
"version": "v1",
"created": "Thu, 28 Aug 2014 03:20:38 GMT"
},
{
"version": "v2",
"created": "Mon, 1 Sep 2014 04:49:30 GMT"
},
{
"version": "v3",
"created": "Thu, 12 Feb 2015 03:03:02 GMT"
}
] | 2015-02-13T00:00:00 | [
[
"Minaee",
"Shervin",
""
],
[
"Abdolrashidi",
"AmirAli",
""
]
] | TITLE: Multispectral Palmprint Recognition Using Textural Features
ABSTRACT: In order to utilize identification to the best extent, we need robust and
fast algorithms and systems to process the data. Having palmprint as a reliable
and unique characteristic of every person, we extract and use its features
based on its geometry, lines and angles. There are countless ways to define
measures for the recognition task. To analyze a new point of view, we extracted
textural features and used them for palmprint recognition. Co-occurrence matrix
can be used for textural feature extraction. As classifiers, we have used the
minimum distance classifier (MDC) and the weighted majority voting system
(WMV). The proposed method is tested on a well-known multispectral palmprint
dataset of 6000 samples and an accuracy rate of 99.96-100% is obtained for most
scenarios which outperforms all previous works in multispectral palmprint
recognition.
| no_new_dataset | 0.945399 |
1502.03556 | Md. Hanif Seddiqui | Md. Hanif Seddiqui, Rudra Pratap Deb Nath, Masaki Aono | An Efficient Metric of Automatic Weight Generation for Properties in
Instance Matching Technique | 17 pages, 5 figures, 3 tables, pp. 1-17, publication year 2015,
journal publication, vol. 6 number 1 | Journal of Web and Semantic Technology (IJWeST), vol.6 no.1, pp.
1-17 (2015) | 10.5121/ijwest.2015.6101 | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The proliferation of heterogeneous data sources of semantic knowledge base
intensifies the need of an automatic instance matching technique. However, the
efficiency of instance matching is often influenced by the weight of a property
associated to instances. Automatic weight generation is a non-trivial, however
an important task in instance matching technique. Therefore, identifying an
appropriate metric for generating weight for a property automatically is
nevertheless a formidable task. In this paper, we investigate an approach of
generating weights automatically by considering hypotheses: (1) the weight of a
property is directly proportional to the ratio of the number of its distinct
values to the number of instances contain the property, and (2) the weight is
also proportional to the ratio of the number of distinct values of a property
to the number of instances in a training dataset. The basic intuition behind
the use of our approach is the classical theory of information content that
infrequent words are more informative than frequent ones. Our mathematical
model derives a metric for generating property weights automatically, which is
applied in instance matching system to produce re-conciliated instances
efficiently. Our experiments and evaluations show the effectiveness of our
proposed metric of automatic weight generation for properties in an instance
matching technique.
| [
{
"version": "v1",
"created": "Thu, 12 Feb 2015 07:51:39 GMT"
}
] | 2015-02-13T00:00:00 | [
[
"Seddiqui",
"Md. Hanif",
""
],
[
"Nath",
"Rudra Pratap Deb",
""
],
[
"Aono",
"Masaki",
""
]
] | TITLE: An Efficient Metric of Automatic Weight Generation for Properties in
Instance Matching Technique
ABSTRACT: The proliferation of heterogeneous data sources of semantic knowledge base
intensifies the need of an automatic instance matching technique. However, the
efficiency of instance matching is often influenced by the weight of a property
associated to instances. Automatic weight generation is a non-trivial, however
an important task in instance matching technique. Therefore, identifying an
appropriate metric for generating weight for a property automatically is
nevertheless a formidable task. In this paper, we investigate an approach of
generating weights automatically by considering hypotheses: (1) the weight of a
property is directly proportional to the ratio of the number of its distinct
values to the number of instances contain the property, and (2) the weight is
also proportional to the ratio of the number of distinct values of a property
to the number of instances in a training dataset. The basic intuition behind
the use of our approach is the classical theory of information content that
infrequent words are more informative than frequent ones. Our mathematical
model derives a metric for generating property weights automatically, which is
applied in instance matching system to produce re-conciliated instances
efficiently. Our experiments and evaluations show the effectiveness of our
proposed metric of automatic weight generation for properties in an instance
matching technique.
| no_new_dataset | 0.953794 |
1502.00996 | Brian Thomas | Brian Thomas, Tim Jenness, Frossie Economou, Perry Greenfield, Paul
Hirst, David S. Berry, Erik Bray, Norman Gray, Demitri Muna, James Turner,
Miguel de Val-Borro, Juande Santander-Vela, David Shupe, John Good, G. Bruce
Berriman, Slava Kitaeff, Jonathan Fay, Omar Laurino, Anastasia Alexov, Walter
Landry, Joe Masters, Adam Brazier, Reinhold Schaaf, Kevin Edwards, Russell O.
Redman, Thomas R. Marsh, Ole Streicher, Pat Norris, Sergio Pascual, Matthew
Davie, Michael Droettboom, Thomas Robitaille, Riccardo Campana, Alex Hagen,
Paul Hartogh, Dominik Klaes, Matthew W. Craig, Derek Homeier | Learning from FITS: Limitations in use in modern astronomical research | null | null | 10.1016/j.ascom.2015.01.009 | null | astro-ph.IM cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The Flexible Image Transport System (FITS) standard has been a great boon to
astronomy, allowing observatories, scientists and the public to exchange
astronomical information easily. The FITS standard, however, is showing its
age. Developed in the late 1970s, the FITS authors made a number of
implementation choices that, while common at the time, are now seen to limit
its utility with modern data. The authors of the FITS standard could not
anticipate the challenges which we are facing today in astronomical computing.
Difficulties we now face include, but are not limited to, addressing the need
to handle an expanded range of specialized data product types (data models),
being more conducive to the networked exchange and storage of data, handling
very large datasets, and capturing significantly more complex metadata and data
relationships.
There are members of the community today who find some or all of these
limitations unworkable, and have decided to move ahead with storing data in
other formats. If this fragmentation continues, we risk abandoning the
advantages of broad interoperability, and ready archivability, that the FITS
format provides for astronomy. In this paper we detail some selected important
problems which exist within the FITS standard today. These problems may provide
insight into deeper underlying issues which reside in the format and we provide
a discussion of some lessons learned. It is not our intention here to prescribe
specific remedies to these issues; rather, it is to call attention of the FITS
and greater astronomical computing communities to these problems in the hope
that it will spur action to address them.
| [
{
"version": "v1",
"created": "Tue, 3 Feb 2015 20:27:29 GMT"
},
{
"version": "v2",
"created": "Tue, 10 Feb 2015 21:35:57 GMT"
}
] | 2015-02-12T00:00:00 | [
[
"Thomas",
"Brian",
""
],
[
"Jenness",
"Tim",
""
],
[
"Economou",
"Frossie",
""
],
[
"Greenfield",
"Perry",
""
],
[
"Hirst",
"Paul",
""
],
[
"Berry",
"David S.",
""
],
[
"Bray",
"Erik",
""
],
[
"Gray",
"Norman",
""
],
[
"Muna",
"Demitri",
""
],
[
"Turner",
"James",
""
],
[
"de Val-Borro",
"Miguel",
""
],
[
"Santander-Vela",
"Juande",
""
],
[
"Shupe",
"David",
""
],
[
"Good",
"John",
""
],
[
"Berriman",
"G. Bruce",
""
],
[
"Kitaeff",
"Slava",
""
],
[
"Fay",
"Jonathan",
""
],
[
"Laurino",
"Omar",
""
],
[
"Alexov",
"Anastasia",
""
],
[
"Landry",
"Walter",
""
],
[
"Masters",
"Joe",
""
],
[
"Brazier",
"Adam",
""
],
[
"Schaaf",
"Reinhold",
""
],
[
"Edwards",
"Kevin",
""
],
[
"Redman",
"Russell O.",
""
],
[
"Marsh",
"Thomas R.",
""
],
[
"Streicher",
"Ole",
""
],
[
"Norris",
"Pat",
""
],
[
"Pascual",
"Sergio",
""
],
[
"Davie",
"Matthew",
""
],
[
"Droettboom",
"Michael",
""
],
[
"Robitaille",
"Thomas",
""
],
[
"Campana",
"Riccardo",
""
],
[
"Hagen",
"Alex",
""
],
[
"Hartogh",
"Paul",
""
],
[
"Klaes",
"Dominik",
""
],
[
"Craig",
"Matthew W.",
""
],
[
"Homeier",
"Derek",
""
]
] | TITLE: Learning from FITS: Limitations in use in modern astronomical research
ABSTRACT: The Flexible Image Transport System (FITS) standard has been a great boon to
astronomy, allowing observatories, scientists and the public to exchange
astronomical information easily. The FITS standard, however, is showing its
age. Developed in the late 1970s, the FITS authors made a number of
implementation choices that, while common at the time, are now seen to limit
its utility with modern data. The authors of the FITS standard could not
anticipate the challenges which we are facing today in astronomical computing.
Difficulties we now face include, but are not limited to, addressing the need
to handle an expanded range of specialized data product types (data models),
being more conducive to the networked exchange and storage of data, handling
very large datasets, and capturing significantly more complex metadata and data
relationships.
There are members of the community today who find some or all of these
limitations unworkable, and have decided to move ahead with storing data in
other formats. If this fragmentation continues, we risk abandoning the
advantages of broad interoperability, and ready archivability, that the FITS
format provides for astronomy. In this paper we detail some selected important
problems which exist within the FITS standard today. These problems may provide
insight into deeper underlying issues which reside in the format and we provide
a discussion of some lessons learned. It is not our intention here to prescribe
specific remedies to these issues; rather, it is to call attention of the FITS
and greater astronomical computing communities to these problems in the hope
that it will spur action to address them.
| no_new_dataset | 0.938801 |
1502.02772 | Kean Lau Hong | Kean Hong Lau, Yong Haur Tay, Fook Loong Lo | A HMAX with LLC for visual recognition | 10 pages, 3 figures, 2 tables, 23 references | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Today's high performance deep artificial neural networks (ANNs) rely heavily
on parameter optimization, which is sequential in nature and even with a
powerful GPU, would have taken weeks to train them up for solving challenging
tasks [22]. HMAX [17] has demonstrated that a simple high performing network
could be obtained without heavy optimization. In this paper, we had improved on
the existing best HMAX neural network [12] in terms of structural simplicity
and performance. Our design replaces the L1 minimization sparse coding (SC)
with a locality-constrained linear coding (LLC) [20] which has a lower
computational demand. We also put the simple orientation filter bank back into
the front layer of the network replacing PCA. Our system's performance has
improved over the existing architecture and reached 79.0% on the challenging
Caltech-101 [7] dataset, which is state-of-the-art for ANNs (without transfer
learning). From our empirical data, the main contributors to our system's
performance include an introduction of partial signal whitening, a spot
detector, and a spatial pyramid matching (SPM) [14] layer.
| [
{
"version": "v1",
"created": "Tue, 10 Feb 2015 04:01:43 GMT"
},
{
"version": "v2",
"created": "Wed, 11 Feb 2015 04:40:20 GMT"
}
] | 2015-02-12T00:00:00 | [
[
"Lau",
"Kean Hong",
""
],
[
"Tay",
"Yong Haur",
""
],
[
"Lo",
"Fook Loong",
""
]
] | TITLE: A HMAX with LLC for visual recognition
ABSTRACT: Today's high performance deep artificial neural networks (ANNs) rely heavily
on parameter optimization, which is sequential in nature and even with a
powerful GPU, would have taken weeks to train them up for solving challenging
tasks [22]. HMAX [17] has demonstrated that a simple high performing network
could be obtained without heavy optimization. In this paper, we had improved on
the existing best HMAX neural network [12] in terms of structural simplicity
and performance. Our design replaces the L1 minimization sparse coding (SC)
with a locality-constrained linear coding (LLC) [20] which has a lower
computational demand. We also put the simple orientation filter bank back into
the front layer of the network replacing PCA. Our system's performance has
improved over the existing architecture and reached 79.0% on the challenging
Caltech-101 [7] dataset, which is state-of-the-art for ANNs (without transfer
learning). From our empirical data, the main contributors to our system's
performance include an introduction of partial signal whitening, a spot
detector, and a spatial pyramid matching (SPM) [14] layer.
| no_new_dataset | 0.945851 |
1502.03406 | Adeline Decuyper | Vincent D. Blondel, Adeline Decuyper, Gautier Krings | A survey of results on mobile phone datasets analysis | null | null | null | null | physics.soc-ph cs.SI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we review some advances made recently in the study of mobile
phone datasets. This area of research has emerged a decade ago, with the
increasing availability of large-scale anonymized datasets, and has grown into
a stand-alone topic. We will survey the contributions made so far on the social
networks that can be constructed with such data, the study of personal
mobility, geographical partitioning, urban planning, and help towards
development as well as security and privacy issues.
| [
{
"version": "v1",
"created": "Wed, 11 Feb 2015 18:58:12 GMT"
}
] | 2015-02-12T00:00:00 | [
[
"Blondel",
"Vincent D.",
""
],
[
"Decuyper",
"Adeline",
""
],
[
"Krings",
"Gautier",
""
]
] | TITLE: A survey of results on mobile phone datasets analysis
ABSTRACT: In this paper, we review some advances made recently in the study of mobile
phone datasets. This area of research has emerged a decade ago, with the
increasing availability of large-scale anonymized datasets, and has grown into
a stand-alone topic. We will survey the contributions made so far on the social
networks that can be constructed with such data, the study of personal
mobility, geographical partitioning, urban planning, and help towards
development as well as security and privacy issues.
| no_new_dataset | 0.942135 |
1502.03409 | Karl Ni | Karl Ni, Roger Pearce, Kofi Boakye, Brian Van Essen, Damian Borth,
Barry Chen, Eric Wang | Large-Scale Deep Learning on the YFCC100M Dataset | null | null | null | null | cs.LG cs.CV | http://creativecommons.org/licenses/publicdomain/ | We present a work-in-progress snapshot of learning with a 15 billion
parameter deep learning network on HPC architectures applied to the largest
publicly available natural image and video dataset released to-date. Recent
advancements in unsupervised deep neural networks suggest that scaling up such
networks in both model and training dataset size can yield significant
improvements in the learning of concepts at the highest layers. We train our
three-layer deep neural network on the Yahoo! Flickr Creative Commons 100M
dataset. The dataset comprises approximately 99.2 million images and 800,000
user-created videos from Yahoo's Flickr image and video sharing platform.
Training of our network takes eight days on 98 GPU nodes at the High
Performance Computing Center at Lawrence Livermore National Laboratory.
Encouraging preliminary results and future research directions are presented
and discussed.
| [
{
"version": "v1",
"created": "Wed, 11 Feb 2015 19:24:36 GMT"
}
] | 2015-02-12T00:00:00 | [
[
"Ni",
"Karl",
""
],
[
"Pearce",
"Roger",
""
],
[
"Boakye",
"Kofi",
""
],
[
"Van Essen",
"Brian",
""
],
[
"Borth",
"Damian",
""
],
[
"Chen",
"Barry",
""
],
[
"Wang",
"Eric",
""
]
] | TITLE: Large-Scale Deep Learning on the YFCC100M Dataset
ABSTRACT: We present a work-in-progress snapshot of learning with a 15 billion
parameter deep learning network on HPC architectures applied to the largest
publicly available natural image and video dataset released to-date. Recent
advancements in unsupervised deep neural networks suggest that scaling up such
networks in both model and training dataset size can yield significant
improvements in the learning of concepts at the highest layers. We train our
three-layer deep neural network on the Yahoo! Flickr Creative Commons 100M
dataset. The dataset comprises approximately 99.2 million images and 800,000
user-created videos from Yahoo's Flickr image and video sharing platform.
Training of our network takes eight days on 98 GPU nodes at the High
Performance Computing Center at Lawrence Livermore National Laboratory.
Encouraging preliminary results and future research directions are presented
and discussed.
| no_new_dataset | 0.928603 |
1404.7514 | Mihai Alexandru Petrovici | Mihai A. Petrovici, Bernhard Vogginger, Paul M\"uller, Oliver
Breitwieser, Mikael Lundqvist, Lyle Muller, Matthias Ehrlich, Alain Destexhe,
Anders Lansner, Ren\'e Sch\"uffny, Johannes Schemmel, Karlheinz Meier | Characterization and Compensation of Network-Level Anomalies in
Mixed-Signal Neuromorphic Modeling Platforms | null | PLOS ONE, October 10th 2014 | 10.1371/journal.pone.0108590 | null | q-bio.NC cond-mat.dis-nn cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Advancing the size and complexity of neural network models leads to an ever
increasing demand for computational resources for their simulation.
Neuromorphic devices offer a number of advantages over conventional computing
architectures, such as high emulation speed or low power consumption, but this
usually comes at the price of reduced configurability and precision. In this
article, we investigate the consequences of several such factors that are
common to neuromorphic devices, more specifically limited hardware resources,
limited parameter configurability and parameter variations. Our final aim is to
provide an array of methods for coping with such inevitable distortion
mechanisms. As a platform for testing our proposed strategies, we use an
executable system specification (ESS) of the BrainScaleS neuromorphic system,
which has been designed as a universal emulation back-end for neuroscientific
modeling. We address the most essential limitations of this device in detail
and study their effects on three prototypical benchmark network models within a
well-defined, systematic workflow. For each network model, we start by defining
quantifiable functionality measures by which we then assess the effects of
typical hardware-specific distortion mechanisms, both in idealized software
simulations and on the ESS. For those effects that cause unacceptable
deviations from the original network dynamics, we suggest generic compensation
mechanisms and demonstrate their effectiveness. Both the suggested workflow and
the investigated compensation mechanisms are largely back-end independent and
do not require additional hardware configurability beyond the one required to
emulate the benchmark networks in the first place. We hereby provide a generic
methodological environment for configurable neuromorphic devices that are
targeted at emulating large-scale, functional neural networks.
| [
{
"version": "v1",
"created": "Tue, 29 Apr 2014 20:20:13 GMT"
},
{
"version": "v2",
"created": "Tue, 10 Feb 2015 14:05:53 GMT"
}
] | 2015-02-11T00:00:00 | [
[
"Petrovici",
"Mihai A.",
""
],
[
"Vogginger",
"Bernhard",
""
],
[
"Müller",
"Paul",
""
],
[
"Breitwieser",
"Oliver",
""
],
[
"Lundqvist",
"Mikael",
""
],
[
"Muller",
"Lyle",
""
],
[
"Ehrlich",
"Matthias",
""
],
[
"Destexhe",
"Alain",
""
],
[
"Lansner",
"Anders",
""
],
[
"Schüffny",
"René",
""
],
[
"Schemmel",
"Johannes",
""
],
[
"Meier",
"Karlheinz",
""
]
] | TITLE: Characterization and Compensation of Network-Level Anomalies in
Mixed-Signal Neuromorphic Modeling Platforms
ABSTRACT: Advancing the size and complexity of neural network models leads to an ever
increasing demand for computational resources for their simulation.
Neuromorphic devices offer a number of advantages over conventional computing
architectures, such as high emulation speed or low power consumption, but this
usually comes at the price of reduced configurability and precision. In this
article, we investigate the consequences of several such factors that are
common to neuromorphic devices, more specifically limited hardware resources,
limited parameter configurability and parameter variations. Our final aim is to
provide an array of methods for coping with such inevitable distortion
mechanisms. As a platform for testing our proposed strategies, we use an
executable system specification (ESS) of the BrainScaleS neuromorphic system,
which has been designed as a universal emulation back-end for neuroscientific
modeling. We address the most essential limitations of this device in detail
and study their effects on three prototypical benchmark network models within a
well-defined, systematic workflow. For each network model, we start by defining
quantifiable functionality measures by which we then assess the effects of
typical hardware-specific distortion mechanisms, both in idealized software
simulations and on the ESS. For those effects that cause unacceptable
deviations from the original network dynamics, we suggest generic compensation
mechanisms and demonstrate their effectiveness. Both the suggested workflow and
the investigated compensation mechanisms are largely back-end independent and
do not require additional hardware configurability beyond the one required to
emulate the benchmark networks in the first place. We hereby provide a generic
methodological environment for configurable neuromorphic devices that are
targeted at emulating large-scale, functional neural networks.
| no_new_dataset | 0.949995 |
1502.02761 | Yujia Li | Yujia Li, Kevin Swersky and Richard Zemel | Generative Moment Matching Networks | null | null | null | null | cs.LG cs.AI stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider the problem of learning deep generative models from data. We
formulate a method that generates an independent sample via a single
feedforward pass through a multilayer perceptron, as in the recently proposed
generative adversarial networks (Goodfellow et al., 2014). Training a
generative adversarial network, however, requires careful optimization of a
difficult minimax program. Instead, we utilize a technique from statistical
hypothesis testing known as maximum mean discrepancy (MMD), which leads to a
simple objective that can be interpreted as matching all orders of statistics
between a dataset and samples from the model, and can be trained by
backpropagation. We further boost the performance of this approach by combining
our generative network with an auto-encoder network, using MMD to learn to
generate codes that can then be decoded to produce samples. We show that the
combination of these techniques yields excellent generative models compared to
baseline approaches as measured on MNIST and the Toronto Face Database.
| [
{
"version": "v1",
"created": "Tue, 10 Feb 2015 02:54:58 GMT"
}
] | 2015-02-11T00:00:00 | [
[
"Li",
"Yujia",
""
],
[
"Swersky",
"Kevin",
""
],
[
"Zemel",
"Richard",
""
]
] | TITLE: Generative Moment Matching Networks
ABSTRACT: We consider the problem of learning deep generative models from data. We
formulate a method that generates an independent sample via a single
feedforward pass through a multilayer perceptron, as in the recently proposed
generative adversarial networks (Goodfellow et al., 2014). Training a
generative adversarial network, however, requires careful optimization of a
difficult minimax program. Instead, we utilize a technique from statistical
hypothesis testing known as maximum mean discrepancy (MMD), which leads to a
simple objective that can be interpreted as matching all orders of statistics
between a dataset and samples from the model, and can be trained by
backpropagation. We further boost the performance of this approach by combining
our generative network with an auto-encoder network, using MMD to learn to
generate codes that can then be decoded to produce samples. We show that the
combination of these techniques yields excellent generative models compared to
baseline approaches as measured on MNIST and the Toronto Face Database.
| no_new_dataset | 0.944587 |
1502.02821 | Paul Doyle Dr. | Paul Doyle | Building a scalable global data processing pipeline for large
astronomical photometric datasets | PhD Thesis, Dublin Institute of Technology | null | null | null | astro-ph.IM cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Astronomical photometry is the science of measuring the flux of a celestial
object. Since its introduction, the CCD has been the principle method of
measuring flux to calculate the apparent magnitude of an object. Each CCD image
taken must go through a process of cleaning and calibration prior to its use.
As the number of research telescopes increases the overall computing resources
required for image processing also increases. Existing processing techniques
are primarily sequential in nature, requiring increasingly powerful servers,
faster disks and faster networks to process data. Existing High Performance
Computing solutions involving high capacity data centres are complex in design
and expensive to maintain, while providing resources primarily to high profile
science projects. This research describes three distributed pipeline
architectures, a virtualised cloud based IRAF, the Astronomical Compute Node
(ACN), a private cloud based pipeline, and NIMBUS, a globally distributed
system. The ACN pipeline processed data at a rate of 4 Terabytes per day
demonstrating data compression and upload to a central cloud storage service at
a rate faster than data generation. The primary contribution of this research
is NIMBUS, which is rapidly scalable, resilient to failure and capable of
processing CCD image data at a rate of hundreds of Terabytes per day. This
pipeline is implemented using a decentralised web queue to control the
compression of data, uploading of data to distributed web servers, and creating
web messages to identify the location of the data. Using distributed web queue
messages, images are downloaded by computing resources distributed around the
globe. Rigorous experimental evidence is presented verifying the horizontal
scalability of the system which has demonstrated a processing rate of 192
Terabytes per day with clear indications that higher processing rates are
possible.
| [
{
"version": "v1",
"created": "Tue, 10 Feb 2015 09:27:58 GMT"
}
] | 2015-02-11T00:00:00 | [
[
"Doyle",
"Paul",
""
]
] | TITLE: Building a scalable global data processing pipeline for large
astronomical photometric datasets
ABSTRACT: Astronomical photometry is the science of measuring the flux of a celestial
object. Since its introduction, the CCD has been the principle method of
measuring flux to calculate the apparent magnitude of an object. Each CCD image
taken must go through a process of cleaning and calibration prior to its use.
As the number of research telescopes increases the overall computing resources
required for image processing also increases. Existing processing techniques
are primarily sequential in nature, requiring increasingly powerful servers,
faster disks and faster networks to process data. Existing High Performance
Computing solutions involving high capacity data centres are complex in design
and expensive to maintain, while providing resources primarily to high profile
science projects. This research describes three distributed pipeline
architectures, a virtualised cloud based IRAF, the Astronomical Compute Node
(ACN), a private cloud based pipeline, and NIMBUS, a globally distributed
system. The ACN pipeline processed data at a rate of 4 Terabytes per day
demonstrating data compression and upload to a central cloud storage service at
a rate faster than data generation. The primary contribution of this research
is NIMBUS, which is rapidly scalable, resilient to failure and capable of
processing CCD image data at a rate of hundreds of Terabytes per day. This
pipeline is implemented using a decentralised web queue to control the
compression of data, uploading of data to distributed web servers, and creating
web messages to identify the location of the data. Using distributed web queue
messages, images are downloaded by computing resources distributed around the
globe. Rigorous experimental evidence is presented verifying the horizontal
scalability of the system which has demonstrated a processing rate of 192
Terabytes per day with clear indications that higher processing rates are
possible.
| no_new_dataset | 0.946498 |
1502.02852 | Daniel Gregorek | Daniel Gregorek, Robert Schmidt, Alberto Garcia-Ortiz | Transaction Level Analysis for a Clustered and Hardware-Enhanced Task
Manager on Homogeneous Many-Core Systems | Presented at HIP3ES, 2015 (arXiv: 1501.03064) | null | null | HIP3ES/2015/03 | cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The increasing parallelism of many-core systems demands for efficient
strategies for the run-time system management. Due to the large number of cores
the management overhead has a rising impact to the overall system performance.
This work analyzes a clustered infrastructure of dedicated hardware nodes to
manage a homogeneous many-core system. The hardware nodes implement a message
passing protocol and perform the task mapping and synchronization at run-time.
To make meaningful mapping decisions, the global management nodes employ a
workload status communication mechanism.
This paper discusses the design-space of the dedicated infrastructure by
means of task mapping use-cases and a parallel benchmark including
application-interference. We evaluate the architecture in terms of application
speedup and analyze the mechanism for the status communication. A comparison
versus centralized and fully-distributed configurations demonstrates the
reduction of the computation and communication management overhead for our
approach.
| [
{
"version": "v1",
"created": "Tue, 10 Feb 2015 10:56:50 GMT"
}
] | 2015-02-11T00:00:00 | [
[
"Gregorek",
"Daniel",
""
],
[
"Schmidt",
"Robert",
""
],
[
"Garcia-Ortiz",
"Alberto",
""
]
] | TITLE: Transaction Level Analysis for a Clustered and Hardware-Enhanced Task
Manager on Homogeneous Many-Core Systems
ABSTRACT: The increasing parallelism of many-core systems demands for efficient
strategies for the run-time system management. Due to the large number of cores
the management overhead has a rising impact to the overall system performance.
This work analyzes a clustered infrastructure of dedicated hardware nodes to
manage a homogeneous many-core system. The hardware nodes implement a message
passing protocol and perform the task mapping and synchronization at run-time.
To make meaningful mapping decisions, the global management nodes employ a
workload status communication mechanism.
This paper discusses the design-space of the dedicated infrastructure by
means of task mapping use-cases and a parallel benchmark including
application-interference. We evaluate the architecture in terms of application
speedup and analyze the mechanism for the status communication. A comparison
versus centralized and fully-distributed configurations demonstrates the
reduction of the computation and communication management overhead for our
approach.
| no_new_dataset | 0.945045 |
cs/0604054 | Maria Paola Bonacina | Alessandro Armando, Maria Paola Bonacina, Silvio Ranise, Stephan
Schulz | New results on rewrite-based satisfiability procedures | To appear in the ACM Transactions on Computational Logic, 49 pages | ACM Transactions on Computational Logic, 10(1):129-179, January
2009 | 10.1145/1459010.1459014 | RR 36/2005 | cs.AI cs.LO | null | Program analysis and verification require decision procedures to reason on
theories of data structures. Many problems can be reduced to the satisfiability
of sets of ground literals in theory T. If a sound and complete inference
system for first-order logic is guaranteed to terminate on T-satisfiability
problems, any theorem-proving strategy with that system and a fair search plan
is a T-satisfiability procedure. We prove termination of a rewrite-based
first-order engine on the theories of records, integer offsets, integer offsets
modulo and lists. We give a modularity theorem stating sufficient conditions
for termination on a combinations of theories, given termination on each. The
above theories, as well as others, satisfy these conditions. We introduce
several sets of benchmarks on these theories and their combinations, including
both parametric synthetic benchmarks to test scalability, and real-world
problems to test performances on huge sets of literals. We compare the
rewrite-based theorem prover E with the validity checkers CVC and CVC Lite.
Contrary to the folklore that a general-purpose prover cannot compete with
reasoners with built-in theories, the experiments are overall favorable to the
theorem prover, showing that not only the rewriting approach is elegant and
conceptually simple, but has important practical implications.
| [
{
"version": "v1",
"created": "Wed, 12 Apr 2006 19:53:24 GMT"
},
{
"version": "v2",
"created": "Wed, 22 Nov 2006 19:54:27 GMT"
},
{
"version": "v3",
"created": "Wed, 6 Jun 2007 17:15:23 GMT"
},
{
"version": "v4",
"created": "Sun, 1 Jun 2008 02:02:27 GMT"
}
] | 2015-02-11T00:00:00 | [
[
"Armando",
"Alessandro",
""
],
[
"Bonacina",
"Maria Paola",
""
],
[
"Ranise",
"Silvio",
""
],
[
"Schulz",
"Stephan",
""
]
] | TITLE: New results on rewrite-based satisfiability procedures
ABSTRACT: Program analysis and verification require decision procedures to reason on
theories of data structures. Many problems can be reduced to the satisfiability
of sets of ground literals in theory T. If a sound and complete inference
system for first-order logic is guaranteed to terminate on T-satisfiability
problems, any theorem-proving strategy with that system and a fair search plan
is a T-satisfiability procedure. We prove termination of a rewrite-based
first-order engine on the theories of records, integer offsets, integer offsets
modulo and lists. We give a modularity theorem stating sufficient conditions
for termination on a combinations of theories, given termination on each. The
above theories, as well as others, satisfy these conditions. We introduce
several sets of benchmarks on these theories and their combinations, including
both parametric synthetic benchmarks to test scalability, and real-world
problems to test performances on huge sets of literals. We compare the
rewrite-based theorem prover E with the validity checkers CVC and CVC Lite.
Contrary to the folklore that a general-purpose prover cannot compete with
reasoners with built-in theories, the experiments are overall favorable to the
theorem prover, showing that not only the rewriting approach is elegant and
conceptually simple, but has important practical implications.
| no_new_dataset | 0.941169 |
1407.8186 | Xiaoting Zhao | Xiaoting Zhao, Peter I. Frazier | Exploration vs. Exploitation in the Information Filtering Problem | 36 pages, 5 figures | null | null | null | math.OC cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider information filtering, in which we face a stream of items too
voluminous to process by hand (e.g., scientific articles, blog posts, emails),
and must rely on a computer system to automatically filter out irrelevant
items. Such systems face the exploration vs. exploitation tradeoff, in which it
may be beneficial to present an item despite a low probability of relevance,
just to learn about future items with similar content. We present a Bayesian
sequential decision-making model of this problem, show how it may be solved to
optimality using a decomposition to a collection of two-armed bandit problems,
and show structural results for the optimal policy. We show that the resulting
method is especially useful when facing the cold start problem, i.e., when
filtering items for new users without a long history of past interactions. We
then present an application of this information filtering method to a
historical dataset from the arXiv.org repository of scientific articles.
| [
{
"version": "v1",
"created": "Wed, 30 Jul 2014 20:00:11 GMT"
},
{
"version": "v2",
"created": "Tue, 2 Sep 2014 20:01:00 GMT"
},
{
"version": "v3",
"created": "Sun, 8 Feb 2015 21:03:08 GMT"
}
] | 2015-02-10T00:00:00 | [
[
"Zhao",
"Xiaoting",
""
],
[
"Frazier",
"Peter I.",
""
]
] | TITLE: Exploration vs. Exploitation in the Information Filtering Problem
ABSTRACT: We consider information filtering, in which we face a stream of items too
voluminous to process by hand (e.g., scientific articles, blog posts, emails),
and must rely on a computer system to automatically filter out irrelevant
items. Such systems face the exploration vs. exploitation tradeoff, in which it
may be beneficial to present an item despite a low probability of relevance,
just to learn about future items with similar content. We present a Bayesian
sequential decision-making model of this problem, show how it may be solved to
optimality using a decomposition to a collection of two-armed bandit problems,
and show structural results for the optimal policy. We show that the resulting
method is especially useful when facing the cold start problem, i.e., when
filtering items for new users without a long history of past interactions. We
then present an application of this information filtering method to a
historical dataset from the arXiv.org repository of scientific articles.
| no_new_dataset | 0.949856 |
1412.4446 | Pascal Germain | Hana Ajakan, Pascal Germain, Hugo Larochelle, Fran\c{c}ois Laviolette,
Mario Marchand | Domain-Adversarial Neural Networks | The first version of this paper was accepted at the "Second Workshop
on Transfer and Multi-Task Learning: Theory meets Practice" (NIPS 2014,
Montreal, Canada). See: https://sites.google.com/site/multitaskwsnips2014/ | null | null | null | stat.ML cs.LG cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We introduce a new representation learning algorithm suited to the context of
domain adaptation, in which data at training and test time come from similar
but different distributions. Our algorithm is directly inspired by theory on
domain adaptation suggesting that, for effective domain transfer to be
achieved, predictions must be made based on a data representation that cannot
discriminate between the training (source) and test (target) domains. We
propose a training objective that implements this idea in the context of a
neural network, whose hidden layer is trained to be predictive of the
classification task, but uninformative as to the domain of the input. Our
experiments on a sentiment analysis classification benchmark, where the target
domain data available at training time is unlabeled, show that our neural
network for domain adaption algorithm has better performance than either a
standard neural network or an SVM, even if trained on input features extracted
with the state-of-the-art marginalized stacked denoising autoencoders of Chen
et al. (2012).
| [
{
"version": "v1",
"created": "Mon, 15 Dec 2014 02:16:07 GMT"
},
{
"version": "v2",
"created": "Mon, 9 Feb 2015 17:52:03 GMT"
}
] | 2015-02-10T00:00:00 | [
[
"Ajakan",
"Hana",
""
],
[
"Germain",
"Pascal",
""
],
[
"Larochelle",
"Hugo",
""
],
[
"Laviolette",
"François",
""
],
[
"Marchand",
"Mario",
""
]
] | TITLE: Domain-Adversarial Neural Networks
ABSTRACT: We introduce a new representation learning algorithm suited to the context of
domain adaptation, in which data at training and test time come from similar
but different distributions. Our algorithm is directly inspired by theory on
domain adaptation suggesting that, for effective domain transfer to be
achieved, predictions must be made based on a data representation that cannot
discriminate between the training (source) and test (target) domains. We
propose a training objective that implements this idea in the context of a
neural network, whose hidden layer is trained to be predictive of the
classification task, but uninformative as to the domain of the input. Our
experiments on a sentiment analysis classification benchmark, where the target
domain data available at training time is unlabeled, show that our neural
network for domain adaption algorithm has better performance than either a
standard neural network or an SVM, even if trained on input features extracted
with the state-of-the-art marginalized stacked denoising autoencoders of Chen
et al. (2012).
| no_new_dataset | 0.947478 |
1501.03326 | Heiko Strathmann | Heiko Strathmann, Dino Sejdinovic, Mark Girolami | Unbiased Bayes for Big Data: Paths of Partial Posteriors | 18 pages, 10 figures | null | null | null | stat.ML cs.LG stat.ME | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A key quantity of interest in Bayesian inference are expectations of
functions with respect to a posterior distribution. Markov Chain Monte Carlo is
a fundamental tool to consistently compute these expectations via averaging
samples drawn from an approximate posterior. However, its feasibility is being
challenged in the era of so called Big Data as all data needs to be processed
in every iteration. Realising that such simulation is an unnecessarily hard
problem if the goal is estimation, we construct a computationally scalable
methodology that allows unbiased estimation of the required expectations --
without explicit simulation from the full posterior. The scheme's variance is
finite by construction and straightforward to control, leading to algorithms
that are provably unbiased and naturally arrive at a desired error tolerance.
This is achieved at an average computational complexity that is sub-linear in
the size of the dataset and its free parameters are easy to tune. We
demonstrate the utility and generality of the methodology on a range of common
statistical models applied to large-scale benchmark and real-world datasets.
| [
{
"version": "v1",
"created": "Wed, 14 Jan 2015 12:15:14 GMT"
},
{
"version": "v2",
"created": "Mon, 9 Feb 2015 16:21:20 GMT"
}
] | 2015-02-10T00:00:00 | [
[
"Strathmann",
"Heiko",
""
],
[
"Sejdinovic",
"Dino",
""
],
[
"Girolami",
"Mark",
""
]
] | TITLE: Unbiased Bayes for Big Data: Paths of Partial Posteriors
ABSTRACT: A key quantity of interest in Bayesian inference are expectations of
functions with respect to a posterior distribution. Markov Chain Monte Carlo is
a fundamental tool to consistently compute these expectations via averaging
samples drawn from an approximate posterior. However, its feasibility is being
challenged in the era of so called Big Data as all data needs to be processed
in every iteration. Realising that such simulation is an unnecessarily hard
problem if the goal is estimation, we construct a computationally scalable
methodology that allows unbiased estimation of the required expectations --
without explicit simulation from the full posterior. The scheme's variance is
finite by construction and straightforward to control, leading to algorithms
that are provably unbiased and naturally arrive at a desired error tolerance.
This is achieved at an average computational complexity that is sub-linear in
the size of the dataset and its free parameters are easy to tune. We
demonstrate the utility and generality of the methodology on a range of common
statistical models applied to large-scale benchmark and real-world datasets.
| no_new_dataset | 0.941115 |
1502.00558 | Marcelo Cicconet | Marcelo Cicconet, Davi Geiger, and Michael Werman | Complex-Valued Hough Transforms for Circles | The paper has been withdrawn since the authors concluded a more
comprehensive study on the choice of parameters needs to be performed | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper advocates the use of complex variables to represent votes in the
Hough transform for circle detection. Replacing the positive numbers
classically used in the parameter space of the Hough transforms by complex
numbers allows cancellation effects when adding up the votes. Cancellation and
the computation of shape likelihood via a complex number's magnitude square
lead to more robust solutions than the "classic" algorithms, as shown by
computational experiments on synthetic and real datasets.
| [
{
"version": "v1",
"created": "Mon, 2 Feb 2015 17:22:26 GMT"
},
{
"version": "v2",
"created": "Mon, 9 Feb 2015 19:38:58 GMT"
}
] | 2015-02-10T00:00:00 | [
[
"Cicconet",
"Marcelo",
""
],
[
"Geiger",
"Davi",
""
],
[
"Werman",
"Michael",
""
]
] | TITLE: Complex-Valued Hough Transforms for Circles
ABSTRACT: This paper advocates the use of complex variables to represent votes in the
Hough transform for circle detection. Replacing the positive numbers
classically used in the parameter space of the Hough transforms by complex
numbers allows cancellation effects when adding up the votes. Cancellation and
the computation of shape likelihood via a complex number's magnitude square
lead to more robust solutions than the "classic" algorithms, as shown by
computational experiments on synthetic and real datasets.
| no_new_dataset | 0.954393 |
1502.02072 | Bharath Ramsundar | Bharath Ramsundar, Steven Kearnes, Patrick Riley, Dale Webster, David
Konerding, Vijay Pande | Massively Multitask Networks for Drug Discovery | Preliminary work. Under review by the International Conference on
Machine Learning (ICML) | null | null | null | stat.ML cs.LG cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Massively multitask neural architectures provide a learning framework for
drug discovery that synthesizes information from many distinct biological
sources. To train these architectures at scale, we gather large amounts of data
from public sources to create a dataset of nearly 40 million measurements
across more than 200 biological targets. We investigate several aspects of the
multitask framework by performing a series of empirical studies and obtain some
interesting results: (1) massively multitask networks obtain predictive
accuracies significantly better than single-task methods, (2) the predictive
power of multitask networks improves as additional tasks and data are added,
(3) the total amount of data and the total number of tasks both contribute
significantly to multitask improvement, and (4) multitask networks afford
limited transferability to tasks not in the training set. Our results
underscore the need for greater data sharing and further algorithmic innovation
to accelerate the drug discovery process.
| [
{
"version": "v1",
"created": "Fri, 6 Feb 2015 23:04:01 GMT"
}
] | 2015-02-10T00:00:00 | [
[
"Ramsundar",
"Bharath",
""
],
[
"Kearnes",
"Steven",
""
],
[
"Riley",
"Patrick",
""
],
[
"Webster",
"Dale",
""
],
[
"Konerding",
"David",
""
],
[
"Pande",
"Vijay",
""
]
] | TITLE: Massively Multitask Networks for Drug Discovery
ABSTRACT: Massively multitask neural architectures provide a learning framework for
drug discovery that synthesizes information from many distinct biological
sources. To train these architectures at scale, we gather large amounts of data
from public sources to create a dataset of nearly 40 million measurements
across more than 200 biological targets. We investigate several aspects of the
multitask framework by performing a series of empirical studies and obtain some
interesting results: (1) massively multitask networks obtain predictive
accuracies significantly better than single-task methods, (2) the predictive
power of multitask networks improves as additional tasks and data are added,
(3) the total amount of data and the total number of tasks both contribute
significantly to multitask improvement, and (4) multitask networks afford
limited transferability to tasks not in the training set. Our results
underscore the need for greater data sharing and further algorithmic innovation
to accelerate the drug discovery process.
| no_new_dataset | 0.951594 |
1502.02134 | Derrick Wing Kwan Ng | Derrick Wing Kwan Ng, Yongpeng Wu, and Robert Schober | Power Efficient Resource Allocation for Full-Duplex Radio Distributed
Antenna Networks | Submitted for possible journal publication | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we study the resource allocation algorithm design for
distributed antenna multiuser networks with full-duplex (FD) radio base
stations (BSs) which enable simultaneous uplink and downlink communications.
The considered resource allocation algorithm design is formulated as an
optimization problem taking into account the antenna circuit power consumption
of the BSs and the quality of service (QoS) requirements of both uplink and
downlink users. We minimize the total network power consumption by jointly
optimizing the downlink beamformer, the uplink transmit power, and the antenna
selection. To overcome the intractability of the resulting problem, we
reformulate it as an optimization problem with decoupled binary selection
variables and non-convex constraints. The reformulated problem facilitates the
design of an iterative resource allocation algorithm which obtains an optimal
solution based on the generalized Bender's decomposition (GBD) and serves as a
benchmark scheme. Furthermore, to strike a balance between computational
complexity and system performance, a suboptimal algorithm with polynomial time
complexity is proposed. Simulation results illustrate that the proposed GBD
based iterative algorithm converges to the global optimal solution and the
suboptimal algorithm achieves a close-to-optimal performance. Our results also
demonstrate the trade-off between power efficiency and the number of active
transmit antennas when the circuit power consumption is taken into account. In
particular, activating an exceedingly large number of antennas may not be a
power efficient solution for reducing the total system power consumption. In
addition, our results reveal that FD systems facilitate significant power
savings compared to traditional half-duplex systems, despite the non-negligible
self-interference.
| [
{
"version": "v1",
"created": "Sat, 7 Feb 2015 12:50:13 GMT"
}
] | 2015-02-10T00:00:00 | [
[
"Ng",
"Derrick Wing Kwan",
""
],
[
"Wu",
"Yongpeng",
""
],
[
"Schober",
"Robert",
""
]
] | TITLE: Power Efficient Resource Allocation for Full-Duplex Radio Distributed
Antenna Networks
ABSTRACT: In this paper, we study the resource allocation algorithm design for
distributed antenna multiuser networks with full-duplex (FD) radio base
stations (BSs) which enable simultaneous uplink and downlink communications.
The considered resource allocation algorithm design is formulated as an
optimization problem taking into account the antenna circuit power consumption
of the BSs and the quality of service (QoS) requirements of both uplink and
downlink users. We minimize the total network power consumption by jointly
optimizing the downlink beamformer, the uplink transmit power, and the antenna
selection. To overcome the intractability of the resulting problem, we
reformulate it as an optimization problem with decoupled binary selection
variables and non-convex constraints. The reformulated problem facilitates the
design of an iterative resource allocation algorithm which obtains an optimal
solution based on the generalized Bender's decomposition (GBD) and serves as a
benchmark scheme. Furthermore, to strike a balance between computational
complexity and system performance, a suboptimal algorithm with polynomial time
complexity is proposed. Simulation results illustrate that the proposed GBD
based iterative algorithm converges to the global optimal solution and the
suboptimal algorithm achieves a close-to-optimal performance. Our results also
demonstrate the trade-off between power efficiency and the number of active
transmit antennas when the circuit power consumption is taken into account. In
particular, activating an exceedingly large number of antennas may not be a
power efficient solution for reducing the total system power consumption. In
addition, our results reveal that FD systems facilitate significant power
savings compared to traditional half-duplex systems, despite the non-negligible
self-interference.
| no_new_dataset | 0.948965 |
1502.02171 | Liang Zheng | Liang Zheng, Liyue Shen, Lu Tian, Shengjin Wang, Jiahao Bu, Qi Tian | Person Re-identification Meets Image Search | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | For long time, person re-identification and image search are two separately
studied tasks. However, for person re-identification, the effectiveness of
local features and the "query-search" mode make it well posed for image search
techniques.
In the light of recent advances in image search, this paper proposes to treat
person re-identification as an image search problem. Specifically, this paper
claims two major contributions. 1) By designing an unsupervised Bag-of-Words
representation, we are devoted to bridging the gap between the two tasks by
integrating techniques from image search in person re-identification. We show
that our system sets up an effective yet efficient baseline that is amenable to
further supervised/unsupervised improvements. 2) We contribute a new high
quality dataset which uses DPM detector and includes a number of distractor
images. Our dataset reaches closer to realistic settings, and new perspectives
are provided.
Compared with approaches that rely on feature-feature match, our method is
faster by over two orders of magnitude. Moreover, on three datasets, we report
competitive results compared with the state-of-the-art methods.
| [
{
"version": "v1",
"created": "Sat, 7 Feb 2015 18:56:35 GMT"
}
] | 2015-02-10T00:00:00 | [
[
"Zheng",
"Liang",
""
],
[
"Shen",
"Liyue",
""
],
[
"Tian",
"Lu",
""
],
[
"Wang",
"Shengjin",
""
],
[
"Bu",
"Jiahao",
""
],
[
"Tian",
"Qi",
""
]
] | TITLE: Person Re-identification Meets Image Search
ABSTRACT: For long time, person re-identification and image search are two separately
studied tasks. However, for person re-identification, the effectiveness of
local features and the "query-search" mode make it well posed for image search
techniques.
In the light of recent advances in image search, this paper proposes to treat
person re-identification as an image search problem. Specifically, this paper
claims two major contributions. 1) By designing an unsupervised Bag-of-Words
representation, we are devoted to bridging the gap between the two tasks by
integrating techniques from image search in person re-identification. We show
that our system sets up an effective yet efficient baseline that is amenable to
further supervised/unsupervised improvements. 2) We contribute a new high
quality dataset which uses DPM detector and includes a number of distractor
images. Our dataset reaches closer to realistic settings, and new perspectives
are provided.
Compared with approaches that rely on feature-feature match, our method is
faster by over two orders of magnitude. Moreover, on three datasets, we report
competitive results compared with the state-of-the-art methods.
| new_dataset | 0.958731 |
1502.02215 | Jobin Wilson | Jobin Wilson, Chitharanj Kachappilly, Rakesh Mohan, Prateek Kapadia,
Arun Soman, Santanu Chaudhury | Real World Applications of Machine Learning Techniques over Large Mobile
Subscriber Datasets | SE4ML: Software Engineering for Machine Learning (NIPS 2014 Workshop)
https://sites.google.com/site/software4ml/accepted-papers | null | null | null | cs.LG cs.CY cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Communication Service Providers (CSPs) are in a unique position to utilize
their vast transactional data assets generated from interactions of subscribers
with network elements as well as with other subscribers. CSPs could leverage
its data assets for a gamut of applications such as service personalization,
predictive offer management, loyalty management, revenue forecasting, network
capacity planning, product bundle optimization and churn management to gain
significant competitive advantage. However, due to the sheer data volume,
variety, velocity and veracity of mobile subscriber datasets, sophisticated
data analytics techniques and frameworks are necessary to derive actionable
insights in a useable timeframe. In this paper, we describe our journey from a
relational database management system (RDBMS) based campaign management
solution which allowed data scientists and marketers to use hand-written rules
for service personalization and targeted promotions to a distributed Big Data
Analytics platform, capable of performing large scale machine learning and data
mining to deliver real time service personalization, predictive modelling and
product optimization. Our work involves a careful blend of technology,
processes and best practices, which facilitate man-machine collaboration and
continuous experimentation to derive measurable economic value from data. Our
platform has a reach of more than 500 million mobile subscribers worldwide,
delivering over 1 billion personalized recommendations annually, processing a
total data volume of 64 Petabytes, corresponding to 8.5 trillion events.
| [
{
"version": "v1",
"created": "Sun, 8 Feb 2015 06:18:55 GMT"
}
] | 2015-02-10T00:00:00 | [
[
"Wilson",
"Jobin",
""
],
[
"Kachappilly",
"Chitharanj",
""
],
[
"Mohan",
"Rakesh",
""
],
[
"Kapadia",
"Prateek",
""
],
[
"Soman",
"Arun",
""
],
[
"Chaudhury",
"Santanu",
""
]
] | TITLE: Real World Applications of Machine Learning Techniques over Large Mobile
Subscriber Datasets
ABSTRACT: Communication Service Providers (CSPs) are in a unique position to utilize
their vast transactional data assets generated from interactions of subscribers
with network elements as well as with other subscribers. CSPs could leverage
its data assets for a gamut of applications such as service personalization,
predictive offer management, loyalty management, revenue forecasting, network
capacity planning, product bundle optimization and churn management to gain
significant competitive advantage. However, due to the sheer data volume,
variety, velocity and veracity of mobile subscriber datasets, sophisticated
data analytics techniques and frameworks are necessary to derive actionable
insights in a useable timeframe. In this paper, we describe our journey from a
relational database management system (RDBMS) based campaign management
solution which allowed data scientists and marketers to use hand-written rules
for service personalization and targeted promotions to a distributed Big Data
Analytics platform, capable of performing large scale machine learning and data
mining to deliver real time service personalization, predictive modelling and
product optimization. Our work involves a careful blend of technology,
processes and best practices, which facilitate man-machine collaboration and
continuous experimentation to derive measurable economic value from data. Our
platform has a reach of more than 500 million mobile subscribers worldwide,
delivering over 1 billion personalized recommendations annually, processing a
total data volume of 64 Petabytes, corresponding to 8.5 trillion events.
| no_new_dataset | 0.943034 |
1502.02407 | James J.Q. Yu | James J.Q. Yu and Victor O.K. Li | A Social Spider Algorithm for Global Optimization | null | null | null | null | cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The growing complexity of real-world problems has motivated computer
scientists to search for efficient problem-solving methods. Metaheuristics
based on evolutionary computation and swarm intelligence are outstanding
examples of nature-inspired solution techniques. Inspired by the social
spiders, we propose a novel Social Spider Algorithm to solve global
optimization problems. This algorithm is mainly based on the foraging strategy
of social spiders, utilizing the vibrations on the spider web to determine the
positions of preys. Different from the previously proposed swarm intelligence
algorithms, we introduce a new social animal foraging strategy model to solve
optimization problems. In addition, we perform preliminary parameter
sensitivity analysis for our proposed algorithm, developing guidelines for
choosing the parameter values. The Social Spider Algorithm is evaluated by a
series of widely-used benchmark functions, and our proposed algorithm has
superior performance compared with other state-of-the-art metaheuristics.
| [
{
"version": "v1",
"created": "Mon, 9 Feb 2015 09:46:40 GMT"
}
] | 2015-02-10T00:00:00 | [
[
"Yu",
"James J. Q.",
""
],
[
"Li",
"Victor O. K.",
""
]
] | TITLE: A Social Spider Algorithm for Global Optimization
ABSTRACT: The growing complexity of real-world problems has motivated computer
scientists to search for efficient problem-solving methods. Metaheuristics
based on evolutionary computation and swarm intelligence are outstanding
examples of nature-inspired solution techniques. Inspired by the social
spiders, we propose a novel Social Spider Algorithm to solve global
optimization problems. This algorithm is mainly based on the foraging strategy
of social spiders, utilizing the vibrations on the spider web to determine the
positions of preys. Different from the previously proposed swarm intelligence
algorithms, we introduce a new social animal foraging strategy model to solve
optimization problems. In addition, we perform preliminary parameter
sensitivity analysis for our proposed algorithm, developing guidelines for
choosing the parameter values. The Social Spider Algorithm is evaluated by a
series of widely-used benchmark functions, and our proposed algorithm has
superior performance compared with other state-of-the-art metaheuristics.
| no_new_dataset | 0.949435 |
1502.02448 | Tom Crick | Tom Crick and Benjamin A. Hall and Samin Ishtiaq | Dear CAV, We Need to Talk About Reproducibility | Submitted to the 27th International Conference on Computer Aided
Verification (CAV 2015); 9 pages, LaTeX | null | null | null | cs.LO cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | How many times have you tried to re-implement a past CAV tool paper, and
failed?
Reliably reproducing published scientific discoveries has been acknowledged
as a barrier to scientific progress for some time but there remains only a
small subset of software available to support the specific needs of the
research community (i.e. beyond generic tools such as source code
repositories). In this paper we propose an infrastructure for enabling
reproducibility in our community, by automating the build, unit testing and
benchmarking of research software.
| [
{
"version": "v1",
"created": "Mon, 9 Feb 2015 11:59:40 GMT"
}
] | 2015-02-10T00:00:00 | [
[
"Crick",
"Tom",
""
],
[
"Hall",
"Benjamin A.",
""
],
[
"Ishtiaq",
"Samin",
""
]
] | TITLE: Dear CAV, We Need to Talk About Reproducibility
ABSTRACT: How many times have you tried to re-implement a past CAV tool paper, and
failed?
Reliably reproducing published scientific discoveries has been acknowledged
as a barrier to scientific progress for some time but there remains only a
small subset of software available to support the specific needs of the
research community (i.e. beyond generic tools such as source code
repositories). In this paper we propose an infrastructure for enabling
reproducibility in our community, by automating the build, unit testing and
benchmarking of research software.
| no_new_dataset | 0.945751 |
1406.0167 | Saurabh Paul | Saurabh Paul, Malik Magdon-Ismail and Petros Drineas | Feature Selection for Linear SVM with Provable Guarantees | Appearing in Proceedings of 18th AISTATS, JMLR W&CP, vol 38, 2015 | null | null | null | stat.ML cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We give two provably accurate feature-selection techniques for the linear
SVM. The algorithms run in deterministic and randomized time respectively. Our
algorithms can be used in an unsupervised or supervised setting. The supervised
approach is based on sampling features from support vectors. We prove that the
margin in the feature space is preserved to within $\epsilon$-relative error of
the margin in the full feature space in the worst-case. In the unsupervised
setting, we also provide worst-case guarantees of the radius of the minimum
enclosing ball, thereby ensuring comparable generalization as in the full
feature space and resolving an open problem posed in Dasgupta et al. We present
extensive experiments on real-world datasets to support our theory and to
demonstrate that our method is competitive and often better than prior
state-of-the-art, for which there are no known provable guarantees.
| [
{
"version": "v1",
"created": "Sun, 1 Jun 2014 14:37:54 GMT"
},
{
"version": "v2",
"created": "Mon, 20 Oct 2014 14:20:00 GMT"
},
{
"version": "v3",
"created": "Fri, 6 Feb 2015 13:43:54 GMT"
}
] | 2015-02-09T00:00:00 | [
[
"Paul",
"Saurabh",
""
],
[
"Magdon-Ismail",
"Malik",
""
],
[
"Drineas",
"Petros",
""
]
] | TITLE: Feature Selection for Linear SVM with Provable Guarantees
ABSTRACT: We give two provably accurate feature-selection techniques for the linear
SVM. The algorithms run in deterministic and randomized time respectively. Our
algorithms can be used in an unsupervised or supervised setting. The supervised
approach is based on sampling features from support vectors. We prove that the
margin in the feature space is preserved to within $\epsilon$-relative error of
the margin in the full feature space in the worst-case. In the unsupervised
setting, we also provide worst-case guarantees of the radius of the minimum
enclosing ball, thereby ensuring comparable generalization as in the full
feature space and resolving an open problem posed in Dasgupta et al. We present
extensive experiments on real-world datasets to support our theory and to
demonstrate that our method is competitive and often better than prior
state-of-the-art, for which there are no known provable guarantees.
| no_new_dataset | 0.951188 |
1409.5181 | Zhilin Zhang | Zhilin Zhang, Zhouyue Pi, Benyuan Liu | TROIKA: A General Framework for Heart Rate Monitoring Using Wrist-Type
Photoplethysmographic Signals During Intensive Physical Exercise | Matlab codes and data are available at:
https://sites.google.com/site/researchbyzhang/ | IEEE Transactions on Biomedical Engineering, vol. 62, no. 2, pp.
522-531, February 2015 | 10.1109/TBME.2014.2359372 | null | cs.CY | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Heart rate monitoring using wrist-type photoplethysmographic (PPG) signals
during subjects' intensive exercise is a difficult problem, since the signals
are contaminated by extremely strong motion artifacts caused by subjects' hand
movements. So far few works have studied this problem. In this work, a general
framework, termed TROIKA, is proposed, which consists of signal decomposiTion
for denoising, sparse signal RecOnstructIon for high-resolution spectrum
estimation, and spectral peaK trAcking with verification. The TROIKA framework
has high estimation accuracy and is robust to strong motion artifacts. Many
variants can be straightforwardly derived from this framework. Experimental
results on datasets recorded from 12 subjects during fast running at the peak
speed of 15 km/hour showed that the average absolute error of heart rate
estimation was 2.34 beat per minute (BPM), and the Pearson correlation between
the estimates and the ground-truth of heart rate was 0.992. This framework is
of great values to wearable devices such as smart-watches which use PPG signals
to monitor heart rate for fitness.
| [
{
"version": "v1",
"created": "Thu, 18 Sep 2014 03:24:49 GMT"
},
{
"version": "v2",
"created": "Tue, 20 Jan 2015 07:47:00 GMT"
},
{
"version": "v3",
"created": "Fri, 6 Feb 2015 06:16:09 GMT"
}
] | 2015-02-09T00:00:00 | [
[
"Zhang",
"Zhilin",
""
],
[
"Pi",
"Zhouyue",
""
],
[
"Liu",
"Benyuan",
""
]
] | TITLE: TROIKA: A General Framework for Heart Rate Monitoring Using Wrist-Type
Photoplethysmographic Signals During Intensive Physical Exercise
ABSTRACT: Heart rate monitoring using wrist-type photoplethysmographic (PPG) signals
during subjects' intensive exercise is a difficult problem, since the signals
are contaminated by extremely strong motion artifacts caused by subjects' hand
movements. So far few works have studied this problem. In this work, a general
framework, termed TROIKA, is proposed, which consists of signal decomposiTion
for denoising, sparse signal RecOnstructIon for high-resolution spectrum
estimation, and spectral peaK trAcking with verification. The TROIKA framework
has high estimation accuracy and is robust to strong motion artifacts. Many
variants can be straightforwardly derived from this framework. Experimental
results on datasets recorded from 12 subjects during fast running at the peak
speed of 15 km/hour showed that the average absolute error of heart rate
estimation was 2.34 beat per minute (BPM), and the Pearson correlation between
the estimates and the ground-truth of heart rate was 0.992. This framework is
of great values to wearable devices such as smart-watches which use PPG signals
to monitor heart rate for fitness.
| no_new_dataset | 0.931463 |
1412.1145 | Victor Pan | Victor Y. Pan | Matrix Multiplication, Trilinear Decompositions, APA Algorithms, and
Summation | 16 pages, 2 figures | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Matrix multiplication (hereafter we use the acronym MM) is among the most
fundamental operations of modern computations. The efficiency of its
performance depends on various factors, in particular vectorization, data
movement and arithmetic complexity of the computations, but here we focus just
on the study of the arithmetic cost and the impact of this study on other areas
of modern computing. In the early 1970s it was expected that the
straightforward cubic time algorithm for MM will soon be accelerated to enable
MM in nearly quadratic arithmetic time, with some far fetched implications.
While pursuing this goal the mainstream research had its focus on the decrease
of the classical exponent 3 of the complexity of MM towards its lower bound 2,
disregarding the growth of the input size required to support this decrease.
Eventually, surprising combinations of novel ideas and sophisticated techniques
enabled the decrease of the exponent to its benchmark value of about 2.38, but
the supporting MM algorithms improved the straightforward one only for the
inputs of immense sizes. Meanwhile, the communication complexity, rather than
the arithmetic complexity, has become the bottleneck of computations in linear
algebra. This development may seem to undermine the value of the past and
future research aimed at the decrease of the arithmetic cost of MM, but we feel
that the study should be reassessed rather than closed and forgotten. We review
the old and new work in this area in the present day context, recall some major
techniques introduced in the study of MM, discuss their impact on the modern
theory and practice of computations for MM and beyond MM, and link one of these
techniques to some simple algorithms for inner product and summation.
| [
{
"version": "v1",
"created": "Wed, 3 Dec 2014 01:00:19 GMT"
},
{
"version": "v2",
"created": "Thu, 18 Dec 2014 14:07:37 GMT"
},
{
"version": "v3",
"created": "Thu, 5 Feb 2015 22:26:34 GMT"
}
] | 2015-02-09T00:00:00 | [
[
"Pan",
"Victor Y.",
""
]
] | TITLE: Matrix Multiplication, Trilinear Decompositions, APA Algorithms, and
Summation
ABSTRACT: Matrix multiplication (hereafter we use the acronym MM) is among the most
fundamental operations of modern computations. The efficiency of its
performance depends on various factors, in particular vectorization, data
movement and arithmetic complexity of the computations, but here we focus just
on the study of the arithmetic cost and the impact of this study on other areas
of modern computing. In the early 1970s it was expected that the
straightforward cubic time algorithm for MM will soon be accelerated to enable
MM in nearly quadratic arithmetic time, with some far fetched implications.
While pursuing this goal the mainstream research had its focus on the decrease
of the classical exponent 3 of the complexity of MM towards its lower bound 2,
disregarding the growth of the input size required to support this decrease.
Eventually, surprising combinations of novel ideas and sophisticated techniques
enabled the decrease of the exponent to its benchmark value of about 2.38, but
the supporting MM algorithms improved the straightforward one only for the
inputs of immense sizes. Meanwhile, the communication complexity, rather than
the arithmetic complexity, has become the bottleneck of computations in linear
algebra. This development may seem to undermine the value of the past and
future research aimed at the decrease of the arithmetic cost of MM, but we feel
that the study should be reassessed rather than closed and forgotten. We review
the old and new work in this area in the present day context, recall some major
techniques introduced in the study of MM, discuss their impact on the modern
theory and practice of computations for MM and beyond MM, and link one of these
techniques to some simple algorithms for inner product and summation.
| no_new_dataset | 0.941223 |
1502.01782 | Conrad Sanderson | Johanna Carvajal, Conrad Sanderson, Chris McCool, Brian C. Lovell | Multi-Action Recognition via Stochastic Modelling of Optical Flow and
Gradients | null | Workshop on Machine Learning for Sensory Data Analysis (MLSDA),
pp. 19-24, 2014 | 10.1145/2689746.2689748 | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we propose a novel approach to multi-action recognition that
performs joint segmentation and classification. This approach models each
action using a Gaussian mixture using robust low-dimensional action features.
Segmentation is achieved by performing classification on overlapping temporal
windows, which are then merged to produce the final result. This approach is
considerably less complicated than previous methods which use dynamic
programming or computationally expensive hidden Markov models (HMMs). Initial
experiments on a stitched version of the KTH dataset show that the proposed
approach achieves an accuracy of 78.3%, outperforming a recent HMM-based
approach which obtained 71.2%.
| [
{
"version": "v1",
"created": "Fri, 6 Feb 2015 03:30:10 GMT"
}
] | 2015-02-09T00:00:00 | [
[
"Carvajal",
"Johanna",
""
],
[
"Sanderson",
"Conrad",
""
],
[
"McCool",
"Chris",
""
],
[
"Lovell",
"Brian C.",
""
]
] | TITLE: Multi-Action Recognition via Stochastic Modelling of Optical Flow and
Gradients
ABSTRACT: In this paper we propose a novel approach to multi-action recognition that
performs joint segmentation and classification. This approach models each
action using a Gaussian mixture using robust low-dimensional action features.
Segmentation is achieved by performing classification on overlapping temporal
windows, which are then merged to produce the final result. This approach is
considerably less complicated than previous methods which use dynamic
programming or computationally expensive hidden Markov models (HMMs). Initial
experiments on a stitched version of the KTH dataset show that the proposed
approach achieves an accuracy of 78.3%, outperforming a recent HMM-based
approach which obtained 71.2%.
| no_new_dataset | 0.950869 |
1502.01801 | Sayan Mitra | Chuchu Fan and Sayan Mitra | Bounded Verification with On-the-Fly Discrepancy Computation | 24 pages | null | null | University of Illinois Urbana Champaign, Tech Report
UILU-ENG-15-2201 | cs.SY cs.NA math.NA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Simulation-based verification algorithms can provide formal safety guarantees
for nonlinear and hybrid systems. The previous algorithms rely on user provided
model annotations called discrepancy function, which are crucial for computing
reachtubes from simulations. In this paper, we eliminate this requirement by
presenting an algorithm for computing piece-wise exponential discrepancy
functions. The algorithm relies on computing local convergence or divergence
rates of trajectories along a simulation using a coarse over-approximation of
the reach set and bounding the maximal eigenvalue of the Jacobian over this
over-approximation. The resulting discrepancy function preserves the soundness
and the relative completeness of the verification algorithm. We also provide a
coordinate transformation method to improve the local estimates for the
convergence or divergence rates in practical examples. We extend the method to
get the input-to-state discrepancy of nonlinear dynamical systems which can be
used for compositional analysis. Our experiments show that the approach is
effective in terms of running time for several benchmark problems, scales
reasonably to larger dimensional systems, and compares favorably with respect
to available tools for nonlinear models.
| [
{
"version": "v1",
"created": "Fri, 6 Feb 2015 05:32:03 GMT"
}
] | 2015-02-09T00:00:00 | [
[
"Fan",
"Chuchu",
""
],
[
"Mitra",
"Sayan",
""
]
] | TITLE: Bounded Verification with On-the-Fly Discrepancy Computation
ABSTRACT: Simulation-based verification algorithms can provide formal safety guarantees
for nonlinear and hybrid systems. The previous algorithms rely on user provided
model annotations called discrepancy function, which are crucial for computing
reachtubes from simulations. In this paper, we eliminate this requirement by
presenting an algorithm for computing piece-wise exponential discrepancy
functions. The algorithm relies on computing local convergence or divergence
rates of trajectories along a simulation using a coarse over-approximation of
the reach set and bounding the maximal eigenvalue of the Jacobian over this
over-approximation. The resulting discrepancy function preserves the soundness
and the relative completeness of the verification algorithm. We also provide a
coordinate transformation method to improve the local estimates for the
convergence or divergence rates in practical examples. We extend the method to
get the input-to-state discrepancy of nonlinear dynamical systems which can be
used for compositional analysis. Our experiments show that the approach is
effective in terms of running time for several benchmark problems, scales
reasonably to larger dimensional systems, and compares favorably with respect
to available tools for nonlinear models.
| no_new_dataset | 0.945601 |
1502.01812 | Teng Li Dr. | Teng Li, Huan Chang, Meng Wang, Bingbing Ni, Richang Hong and
Shuicheng Yan | Crowded Scene Analysis: A Survey | 20 pages in IEEE Transactions on Circuits and Systems for Video
Technology, 2015 | null | 10.1109/TCSVT.2014.2358029 | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Automated scene analysis has been a topic of great interest in computer
vision and cognitive science. Recently, with the growth of crowd phenomena in
the real world, crowded scene analysis has attracted much attention. However,
the visual occlusions and ambiguities in crowded scenes, as well as the complex
behaviors and scene semantics, make the analysis a challenging task. In the
past few years, an increasing number of works on crowded scene analysis have
been reported, covering different aspects including crowd motion pattern
learning, crowd behavior and activity analysis, and anomaly detection in
crowds. This paper surveys the state-of-the-art techniques on this topic. We
first provide the background knowledge and the available features related to
crowded scenes. Then, existing models, popular algorithms, evaluation
protocols, as well as system performance are provided corresponding to
different aspects of crowded scene analysis. We also outline the available
datasets for performance evaluation. Finally, some research problems and
promising future directions are presented with discussions.
| [
{
"version": "v1",
"created": "Fri, 6 Feb 2015 06:36:12 GMT"
}
] | 2015-02-09T00:00:00 | [
[
"Li",
"Teng",
""
],
[
"Chang",
"Huan",
""
],
[
"Wang",
"Meng",
""
],
[
"Ni",
"Bingbing",
""
],
[
"Hong",
"Richang",
""
],
[
"Yan",
"Shuicheng",
""
]
] | TITLE: Crowded Scene Analysis: A Survey
ABSTRACT: Automated scene analysis has been a topic of great interest in computer
vision and cognitive science. Recently, with the growth of crowd phenomena in
the real world, crowded scene analysis has attracted much attention. However,
the visual occlusions and ambiguities in crowded scenes, as well as the complex
behaviors and scene semantics, make the analysis a challenging task. In the
past few years, an increasing number of works on crowded scene analysis have
been reported, covering different aspects including crowd motion pattern
learning, crowd behavior and activity analysis, and anomaly detection in
crowds. This paper surveys the state-of-the-art techniques on this topic. We
first provide the background knowledge and the available features related to
crowded scenes. Then, existing models, popular algorithms, evaluation
protocols, as well as system performance are provided corresponding to
different aspects of crowded scene analysis. We also outline the available
datasets for performance evaluation. Finally, some research problems and
promising future directions are presented with discussions.
| no_new_dataset | 0.949949 |
1502.01827 | Guang-Tong Zhou | Guang-Tong Zhou, Sung Ju Hwang, Mark Schmidt, Leonid Sigal and Greg
Mori | Hierarchical Maximum-Margin Clustering | null | null | null | null | cs.LG cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present a hierarchical maximum-margin clustering method for unsupervised
data analysis. Our method extends beyond flat maximum-margin clustering, and
performs clustering recursively in a top-down manner. We propose an effective
greedy splitting criteria for selecting which cluster to split next, and employ
regularizers that enforce feature sharing/competition for capturing data
semantics. Experimental results obtained on four standard datasets show that
our method outperforms flat and hierarchical clustering baselines, while
forming clean and semantically meaningful cluster hierarchies.
| [
{
"version": "v1",
"created": "Fri, 6 Feb 2015 08:37:55 GMT"
}
] | 2015-02-09T00:00:00 | [
[
"Zhou",
"Guang-Tong",
""
],
[
"Hwang",
"Sung Ju",
""
],
[
"Schmidt",
"Mark",
""
],
[
"Sigal",
"Leonid",
""
],
[
"Mori",
"Greg",
""
]
] | TITLE: Hierarchical Maximum-Margin Clustering
ABSTRACT: We present a hierarchical maximum-margin clustering method for unsupervised
data analysis. Our method extends beyond flat maximum-margin clustering, and
performs clustering recursively in a top-down manner. We propose an effective
greedy splitting criteria for selecting which cluster to split next, and employ
regularizers that enforce feature sharing/competition for capturing data
semantics. Experimental results obtained on four standard datasets show that
our method outperforms flat and hierarchical clustering baselines, while
forming clean and semantically meaningful cluster hierarchies.
| no_new_dataset | 0.949623 |
1502.01852 | Kaiming He | Kaiming He, Xiangyu Zhang, Shaoqing Ren, Jian Sun | Delving Deep into Rectifiers: Surpassing Human-Level Performance on
ImageNet Classification | null | null | null | null | cs.CV cs.AI cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Rectified activation units (rectifiers) are essential for state-of-the-art
neural networks. In this work, we study rectifier neural networks for image
classification from two aspects. First, we propose a Parametric Rectified
Linear Unit (PReLU) that generalizes the traditional rectified unit. PReLU
improves model fitting with nearly zero extra computational cost and little
overfitting risk. Second, we derive a robust initialization method that
particularly considers the rectifier nonlinearities. This method enables us to
train extremely deep rectified models directly from scratch and to investigate
deeper or wider network architectures. Based on our PReLU networks
(PReLU-nets), we achieve 4.94% top-5 test error on the ImageNet 2012
classification dataset. This is a 26% relative improvement over the ILSVRC 2014
winner (GoogLeNet, 6.66%). To our knowledge, our result is the first to surpass
human-level performance (5.1%, Russakovsky et al.) on this visual recognition
challenge.
| [
{
"version": "v1",
"created": "Fri, 6 Feb 2015 10:44:00 GMT"
}
] | 2015-02-09T00:00:00 | [
[
"He",
"Kaiming",
""
],
[
"Zhang",
"Xiangyu",
""
],
[
"Ren",
"Shaoqing",
""
],
[
"Sun",
"Jian",
""
]
] | TITLE: Delving Deep into Rectifiers: Surpassing Human-Level Performance on
ImageNet Classification
ABSTRACT: Rectified activation units (rectifiers) are essential for state-of-the-art
neural networks. In this work, we study rectifier neural networks for image
classification from two aspects. First, we propose a Parametric Rectified
Linear Unit (PReLU) that generalizes the traditional rectified unit. PReLU
improves model fitting with nearly zero extra computational cost and little
overfitting risk. Second, we derive a robust initialization method that
particularly considers the rectifier nonlinearities. This method enables us to
train extremely deep rectified models directly from scratch and to investigate
deeper or wider network architectures. Based on our PReLU networks
(PReLU-nets), we achieve 4.94% top-5 test error on the ImageNet 2012
classification dataset. This is a 26% relative improvement over the ILSVRC 2014
winner (GoogLeNet, 6.66%). To our knowledge, our result is the first to surpass
human-level performance (5.1%, Russakovsky et al.) on this visual recognition
challenge.
| no_new_dataset | 0.951594 |
1502.01972 | Michael Saint-Guillain | Michael Saint-Guillain, Yves Deville and Christine Solnon | A Multistage Stochastic Programming Approach to the Dynamic and
Stochastic VRPTW - Extended version | Extended version of the same-name study submitted for publication in
conference CPAIOR2015 | null | null | null | cs.AI cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider a dynamic vehicle routing problem with time windows and
stochastic customers (DS-VRPTW), such that customers may request for services
as vehicles have already started their tours. To solve this problem, the goal
is to provide a decision rule for choosing, at each time step, the next action
to perform in light of known requests and probabilistic knowledge on requests
likelihood. We introduce a new decision rule, called Global Stochastic
Assessment (GSA) rule for the DS-VRPTW, and we compare it with existing
decision rules, such as MSA. In particular, we show that GSA fully integrates
nonanticipativity constraints so that it leads to better decisions in our
stochastic context. We describe a new heuristic approach for efficiently
approximating our GSA rule. We introduce a new waiting strategy. Experiments on
dynamic and stochastic benchmarks, which include instances of different degrees
of dynamism, show that not only our approach is competitive with
state-of-the-art methods, but also enables to compute meaningful offline
solutions to fully dynamic problems where absolutely no a priori customer
request is provided.
| [
{
"version": "v1",
"created": "Fri, 6 Feb 2015 18:11:09 GMT"
}
] | 2015-02-09T00:00:00 | [
[
"Saint-Guillain",
"Michael",
""
],
[
"Deville",
"Yves",
""
],
[
"Solnon",
"Christine",
""
]
] | TITLE: A Multistage Stochastic Programming Approach to the Dynamic and
Stochastic VRPTW - Extended version
ABSTRACT: We consider a dynamic vehicle routing problem with time windows and
stochastic customers (DS-VRPTW), such that customers may request for services
as vehicles have already started their tours. To solve this problem, the goal
is to provide a decision rule for choosing, at each time step, the next action
to perform in light of known requests and probabilistic knowledge on requests
likelihood. We introduce a new decision rule, called Global Stochastic
Assessment (GSA) rule for the DS-VRPTW, and we compare it with existing
decision rules, such as MSA. In particular, we show that GSA fully integrates
nonanticipativity constraints so that it leads to better decisions in our
stochastic context. We describe a new heuristic approach for efficiently
approximating our GSA rule. We introduce a new waiting strategy. Experiments on
dynamic and stochastic benchmarks, which include instances of different degrees
of dynamism, show that not only our approach is competitive with
state-of-the-art methods, but also enables to compute meaningful offline
solutions to fully dynamic problems where absolutely no a priori customer
request is provided.
| no_new_dataset | 0.941007 |
1403.6025 | Ruven Pillay | Emmanuel Bertin, Ruven Pillay, Chiara Marmo | Web-Based Visualization of Very Large Scientific Astronomy Imagery | Published in Astronomy & Computing. IIPImage server available from
http://iipimage.sourceforge.net . Visiomatic code and demos available from
http://www.visiomatic.org/ | Astronomy and Computing, vol. 10, pp. 43-53, Apr. 2015 | 10.1016/j.ascom.2014.12.006 | null | astro-ph.IM cs.CE cs.MM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Visualizing and navigating through large astronomy images from a remote
location with current astronomy display tools can be a frustrating experience
in terms of speed and ergonomics, especially on mobile devices. In this paper,
we present a high performance, versatile and robust client-server system for
remote visualization and analysis of extremely large scientific images.
Applications of this work include survey image quality control, interactive
data query and exploration, citizen science, as well as public outreach. The
proposed software is entirely open source and is designed to be generic and
applicable to a variety of datasets. It provides access to floating point data
at terabyte scales, with the ability to precisely adjust image settings in
real-time. The proposed clients are light-weight, platform-independent web
applications built on standard HTML5 web technologies and compatible with both
touch and mouse-based devices. We put the system to the test and assess the
performance of the system and show that a single server can comfortably handle
more than a hundred simultaneous users accessing full precision 32 bit
astronomy data.
| [
{
"version": "v1",
"created": "Mon, 24 Mar 2014 16:24:57 GMT"
},
{
"version": "v2",
"created": "Fri, 9 Jan 2015 14:21:56 GMT"
},
{
"version": "v3",
"created": "Sun, 1 Feb 2015 22:29:40 GMT"
},
{
"version": "v4",
"created": "Thu, 5 Feb 2015 10:40:31 GMT"
}
] | 2015-02-06T00:00:00 | [
[
"Bertin",
"Emmanuel",
""
],
[
"Pillay",
"Ruven",
""
],
[
"Marmo",
"Chiara",
""
]
] | TITLE: Web-Based Visualization of Very Large Scientific Astronomy Imagery
ABSTRACT: Visualizing and navigating through large astronomy images from a remote
location with current astronomy display tools can be a frustrating experience
in terms of speed and ergonomics, especially on mobile devices. In this paper,
we present a high performance, versatile and robust client-server system for
remote visualization and analysis of extremely large scientific images.
Applications of this work include survey image quality control, interactive
data query and exploration, citizen science, as well as public outreach. The
proposed software is entirely open source and is designed to be generic and
applicable to a variety of datasets. It provides access to floating point data
at terabyte scales, with the ability to precisely adjust image settings in
real-time. The proposed clients are light-weight, platform-independent web
applications built on standard HTML5 web technologies and compatible with both
touch and mouse-based devices. We put the system to the test and assess the
performance of the system and show that a single server can comfortably handle
more than a hundred simultaneous users accessing full precision 32 bit
astronomy data.
| no_new_dataset | 0.943608 |
1410.6973 | Anna Choromanska | Mariusz Bojarski, Anna Choromanska, Krzysztof Choromanski, Yann LeCun | Differentially- and non-differentially-private random decision trees | null | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider supervised learning with random decision trees, where the tree
construction is completely random. The method is popularly used and works well
in practice despite the simplicity of the setting, but its statistical
mechanism is not yet well-understood. In this paper we provide strong
theoretical guarantees regarding learning with random decision trees. We
analyze and compare three different variants of the algorithm that have minimal
memory requirements: majority voting, threshold averaging and probabilistic
averaging. The random structure of the tree enables us to adapt these methods
to a differentially-private setting thus we also propose differentially-private
versions of all three schemes. We give upper-bounds on the generalization error
and mathematically explain how the accuracy depends on the number of random
decision trees. Furthermore, we prove that only logarithmic (in the size of the
dataset) number of independently selected random decision trees suffice to
correctly classify most of the data, even when differential-privacy guarantees
must be maintained. We empirically show that majority voting and threshold
averaging give the best accuracy, also for conservative users requiring high
privacy guarantees. Furthermore, we demonstrate that a simple majority voting
rule is an especially good candidate for the differentially-private classifier
since it is much less sensitive to the choice of forest parameters than other
methods.
| [
{
"version": "v1",
"created": "Sun, 26 Oct 2014 00:16:16 GMT"
},
{
"version": "v2",
"created": "Thu, 5 Feb 2015 20:48:11 GMT"
}
] | 2015-02-06T00:00:00 | [
[
"Bojarski",
"Mariusz",
""
],
[
"Choromanska",
"Anna",
""
],
[
"Choromanski",
"Krzysztof",
""
],
[
"LeCun",
"Yann",
""
]
] | TITLE: Differentially- and non-differentially-private random decision trees
ABSTRACT: We consider supervised learning with random decision trees, where the tree
construction is completely random. The method is popularly used and works well
in practice despite the simplicity of the setting, but its statistical
mechanism is not yet well-understood. In this paper we provide strong
theoretical guarantees regarding learning with random decision trees. We
analyze and compare three different variants of the algorithm that have minimal
memory requirements: majority voting, threshold averaging and probabilistic
averaging. The random structure of the tree enables us to adapt these methods
to a differentially-private setting thus we also propose differentially-private
versions of all three schemes. We give upper-bounds on the generalization error
and mathematically explain how the accuracy depends on the number of random
decision trees. Furthermore, we prove that only logarithmic (in the size of the
dataset) number of independently selected random decision trees suffice to
correctly classify most of the data, even when differential-privacy guarantees
must be maintained. We empirically show that majority voting and threshold
averaging give the best accuracy, also for conservative users requiring high
privacy guarantees. Furthermore, we demonstrate that a simple majority voting
rule is an especially good candidate for the differentially-private classifier
since it is much less sensitive to the choice of forest parameters than other
methods.
| no_new_dataset | 0.951549 |
1311.1266 | Diego Amancio | Diego R. Amancio and Osvaldo N. Oliveira Jr. and Luciano da F. Costa | Topological-collaborative approach for disambiguating authors' names in
collaborative networks | To appear in Scientometrics, 2014 | Scientometrics 102 (1), 465--485, 2015 | 10.1007/s11192-014-1381-9 | null | cs.SI physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Concepts and methods of complex networks have been employed to uncover
patterns in a myriad of complex systems. Unfortunately, the relevance and
significance of these patterns strongly depends on the reliability of the data
sets. In the study of collaboration networks, for instance, unavoidable noise
pervading author's collaboration datasets arises when authors share the same
name. To address this problem, we derive a hybrid approach based on authors'
collaboration patterns and on topological features of collaborative networks.
Our results show that the combination of strategies, in most cases, performs
better than the traditional approach which disregards topological features. We
also show that the main factor for improving the discriminability of homonymous
authors is the average distance between authors. Finally, we show that it is
possible to predict the weighting associated to each strategy compounding the
hybrid system by examining the discrimination obtained from the traditional
analysis of collaboration patterns. Once the methodology devised here is
generic, our approach is potentially useful to classify many other networked
systems governed by complex interactions.
| [
{
"version": "v1",
"created": "Wed, 6 Nov 2013 01:43:51 GMT"
},
{
"version": "v2",
"created": "Mon, 30 Jun 2014 16:01:45 GMT"
}
] | 2015-02-05T00:00:00 | [
[
"Amancio",
"Diego R.",
""
],
[
"Oliveira",
"Osvaldo N.",
"Jr."
],
[
"Costa",
"Luciano da F.",
""
]
] | TITLE: Topological-collaborative approach for disambiguating authors' names in
collaborative networks
ABSTRACT: Concepts and methods of complex networks have been employed to uncover
patterns in a myriad of complex systems. Unfortunately, the relevance and
significance of these patterns strongly depends on the reliability of the data
sets. In the study of collaboration networks, for instance, unavoidable noise
pervading author's collaboration datasets arises when authors share the same
name. To address this problem, we derive a hybrid approach based on authors'
collaboration patterns and on topological features of collaborative networks.
Our results show that the combination of strategies, in most cases, performs
better than the traditional approach which disregards topological features. We
also show that the main factor for improving the discriminability of homonymous
authors is the average distance between authors. Finally, we show that it is
possible to predict the weighting associated to each strategy compounding the
hybrid system by examining the discrimination obtained from the traditional
analysis of collaboration patterns. Once the methodology devised here is
generic, our approach is potentially useful to classify many other networked
systems governed by complex interactions.
| no_new_dataset | 0.946941 |
1403.2407 | Lorenzo Reyes | Andrey Bernstein (1), Lorenzo Reyes-Chamorro (2), Jean-Yves Le Boudec
(1) and Mario Paolone (2) ((1) Laboratory for Communications and Applications
2. \'Ecole Polytechnique F\'ed\'erale de Lausanne, (2) Distributed Electrical
Systems Laboratory. \'Ecole Polytechnique F\'ed\'erale de Lausanne) | A Composable Method for Real-Time Control of Active Distribution
Networks with Explicit Power Setpoints | 71 pages, 21 figures, 5 tables | null | null | null | cs.SY | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The conventional approach for the control of distribution networks, in the
presence of active generation and/or controllable loads and storage, involves a
combination of both frequency and voltage regulation at different time scales.
With the increased penetration of stochastic resources, distributed generation
and demand response, this approach shows severe limitations in both the optimal
and feasible operation of these networks, as well as in the aggregation of the
network resources for upper-layer power systems. An alternative approach is to
directly control the targeted grid by defining explicit and real-time setpoints
for active/reactive power absorptions/injections defined by a solution of a
specific optimization problem; but this quickly becomes intractable when
systems get large or diverse. In this paper, we address this problem and
propose a method for the explicit control of the grid status, based on a common
abstract model characterized by the main property of being composable. That is
to say, subsystems can be aggregated into virtual devices that hide their
internal complexity. Thus the proposed method can easily cope with systems of
any size or complexity. The framework is presented in this Part I, whilst in
Part II we illustrate its application to a CIGR\'E low voltage benchmark
microgrid. In particular, we provide implementation examples with respect to
typical devices connected to distribution networks and evaluate of the
performance and benefits of the proposed control framework.
| [
{
"version": "v1",
"created": "Fri, 7 Mar 2014 13:08:54 GMT"
},
{
"version": "v2",
"created": "Tue, 6 May 2014 15:16:04 GMT"
},
{
"version": "v3",
"created": "Mon, 11 Aug 2014 17:26:26 GMT"
},
{
"version": "v4",
"created": "Wed, 4 Feb 2015 00:09:54 GMT"
}
] | 2015-02-05T00:00:00 | [
[
"Bernstein",
"Andrey",
""
],
[
"Reyes-Chamorro",
"Lorenzo",
""
],
[
"Boudec",
"Jean-Yves Le",
""
],
[
"Paolone",
"Mario",
""
]
] | TITLE: A Composable Method for Real-Time Control of Active Distribution
Networks with Explicit Power Setpoints
ABSTRACT: The conventional approach for the control of distribution networks, in the
presence of active generation and/or controllable loads and storage, involves a
combination of both frequency and voltage regulation at different time scales.
With the increased penetration of stochastic resources, distributed generation
and demand response, this approach shows severe limitations in both the optimal
and feasible operation of these networks, as well as in the aggregation of the
network resources for upper-layer power systems. An alternative approach is to
directly control the targeted grid by defining explicit and real-time setpoints
for active/reactive power absorptions/injections defined by a solution of a
specific optimization problem; but this quickly becomes intractable when
systems get large or diverse. In this paper, we address this problem and
propose a method for the explicit control of the grid status, based on a common
abstract model characterized by the main property of being composable. That is
to say, subsystems can be aggregated into virtual devices that hide their
internal complexity. Thus the proposed method can easily cope with systems of
any size or complexity. The framework is presented in this Part I, whilst in
Part II we illustrate its application to a CIGR\'E low voltage benchmark
microgrid. In particular, we provide implementation examples with respect to
typical devices connected to distribution networks and evaluate of the
performance and benefits of the proposed control framework.
| no_new_dataset | 0.940953 |
1501.03396 | Davide Fransos | Luca Bruno and Davide Fransos | Sand transverse dune aerodynamics: 3D Coherent Flow Structures from a
computational study | null | null | null | null | physics.flu-dyn cs.CE physics.ao-ph physics.geo-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The engineering interest about dune fields is dictated by the their
interaction with a number of human infrastructures in arid environments. Sand
dunes dynamics is dictated by wind and its ability to induce sand erosion,
transport and deposition. A deep understanding of dune aerodynamics serves then
to ground effective strategies for the protection of human infrastructures from
sand, the so-called sand mitigation. Because of their simple geometry and their
frequent occurrence in desert area, transverse sand dunes are usually adopted
in literature as a benchmark to investigate dune aerodynamics by means of both
computational or experimental approaches, usually in nominally 2D setups. The
present study aims at evaluating 3D flow features in the wake of a idealised
transverse dune, if any, under different nominally 2D setup conditions by means
of computational simulations and to compare the obtained results with
experimental measurements available in literature.
| [
{
"version": "v1",
"created": "Sun, 11 Jan 2015 13:31:40 GMT"
},
{
"version": "v2",
"created": "Wed, 4 Feb 2015 12:03:15 GMT"
}
] | 2015-02-05T00:00:00 | [
[
"Bruno",
"Luca",
""
],
[
"Fransos",
"Davide",
""
]
] | TITLE: Sand transverse dune aerodynamics: 3D Coherent Flow Structures from a
computational study
ABSTRACT: The engineering interest about dune fields is dictated by the their
interaction with a number of human infrastructures in arid environments. Sand
dunes dynamics is dictated by wind and its ability to induce sand erosion,
transport and deposition. A deep understanding of dune aerodynamics serves then
to ground effective strategies for the protection of human infrastructures from
sand, the so-called sand mitigation. Because of their simple geometry and their
frequent occurrence in desert area, transverse sand dunes are usually adopted
in literature as a benchmark to investigate dune aerodynamics by means of both
computational or experimental approaches, usually in nominally 2D setups. The
present study aims at evaluating 3D flow features in the wake of a idealised
transverse dune, if any, under different nominally 2D setup conditions by means
of computational simulations and to compare the obtained results with
experimental measurements available in literature.
| no_new_dataset | 0.946448 |
1502.00254 | Ravi Kiran Sarvadevabhatla | Ravi Kiran Sarvadevabhatla and R. Venkatesh Babu | Freehand Sketch Recognition Using Deep Features | Submitted to ICIP-2015, 5 pages. Removed an erroneous claim regarding
a work cited in the paper | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Freehand sketches often contain sparse visual detail. In spite of the
sparsity, they are easily and consistently recognized by humans across
cultures, languages and age groups. Therefore, analyzing such sparse sketches
can aid our understanding of the neuro-cognitive processes involved in visual
representation and recognition. In the recent past, Convolutional Neural
Networks (CNNs) have emerged as a powerful framework for feature representation
and recognition for a variety of image domains. However, the domain of sketch
images has not been explored. This paper introduces a freehand sketch
recognition framework based on "deep" features extracted from CNNs. We use two
popular CNNs for our experiments -- Imagenet CNN and a modified version of
LeNet CNN. We evaluate our recognition framework on a publicly available
benchmark database containing thousands of freehand sketches depicting everyday
objects. Our results are an improvement over the existing state-of-the-art
accuracies by 3% - 11%. The effectiveness and relative compactness of our deep
features also make them an ideal candidate for related problems such as
sketch-based image retrieval. In addition, we provide a preliminary glimpse of
how such features can help identify crucial attributes (e.g. object-parts) of
the sketched objects.
| [
{
"version": "v1",
"created": "Sun, 1 Feb 2015 13:35:44 GMT"
},
{
"version": "v2",
"created": "Wed, 4 Feb 2015 14:41:15 GMT"
}
] | 2015-02-05T00:00:00 | [
[
"Sarvadevabhatla",
"Ravi Kiran",
""
],
[
"Babu",
"R. Venkatesh",
""
]
] | TITLE: Freehand Sketch Recognition Using Deep Features
ABSTRACT: Freehand sketches often contain sparse visual detail. In spite of the
sparsity, they are easily and consistently recognized by humans across
cultures, languages and age groups. Therefore, analyzing such sparse sketches
can aid our understanding of the neuro-cognitive processes involved in visual
representation and recognition. In the recent past, Convolutional Neural
Networks (CNNs) have emerged as a powerful framework for feature representation
and recognition for a variety of image domains. However, the domain of sketch
images has not been explored. This paper introduces a freehand sketch
recognition framework based on "deep" features extracted from CNNs. We use two
popular CNNs for our experiments -- Imagenet CNN and a modified version of
LeNet CNN. We evaluate our recognition framework on a publicly available
benchmark database containing thousands of freehand sketches depicting everyday
objects. Our results are an improvement over the existing state-of-the-art
accuracies by 3% - 11%. The effectiveness and relative compactness of our deep
features also make them an ideal candidate for related problems such as
sketch-based image retrieval. In addition, we provide a preliminary glimpse of
how such features can help identify crucial attributes (e.g. object-parts) of
the sketched objects.
| no_new_dataset | 0.945951 |
1305.0194 | Chantal Cherifi | Cihan Aksoy, Vincent Labatut, Chantal Cherifi, Jean-Fran\c{c}ois
Santucci | MATAWS: A Multimodal Approach for Automatic WS Semantic Annotation | null | In International Conference on Networked Digital Technologies,
Springer CCIS 136),China (2011) | 10.1007/978-3-642-22185-9_27 | null | cs.SE cs.CL cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Many recent works aim at developing methods and tools for the processing of
semantic Web services. In order to be properly tested, these tools must be
applied to an appropriate benchmark, taking the form of a collection of
semantic WS descriptions. However, all of the existing publicly available
collections are limited by their size or their realism (use of randomly
generated or resampled descriptions). Larger and realistic syntactic (WSDL)
collections exist, but their semantic annotation requires a certain level of
automation, due to the number of operations to be processed. In this article,
we propose a fully automatic method to semantically annotate such large WS
collections. Our approach is multimodal, in the sense it takes advantage of the
latent semantics present not only in the parameter names, but also in the type
names and structures. Concept-to-word association is performed by using Sigma,
a mapping of WordNet to the SUMO ontology. After having described in details
our annotation method, we apply it to the larger collection of real-world
syntactic WS descriptions we could find, and assess its efficiency.
| [
{
"version": "v1",
"created": "Wed, 1 May 2013 15:07:18 GMT"
}
] | 2015-02-04T00:00:00 | [
[
"Aksoy",
"Cihan",
""
],
[
"Labatut",
"Vincent",
""
],
[
"Cherifi",
"Chantal",
""
],
[
"Santucci",
"Jean-François",
""
]
] | TITLE: MATAWS: A Multimodal Approach for Automatic WS Semantic Annotation
ABSTRACT: Many recent works aim at developing methods and tools for the processing of
semantic Web services. In order to be properly tested, these tools must be
applied to an appropriate benchmark, taking the form of a collection of
semantic WS descriptions. However, all of the existing publicly available
collections are limited by their size or their realism (use of randomly
generated or resampled descriptions). Larger and realistic syntactic (WSDL)
collections exist, but their semantic annotation requires a certain level of
automation, due to the number of operations to be processed. In this article,
we propose a fully automatic method to semantically annotate such large WS
collections. Our approach is multimodal, in the sense it takes advantage of the
latent semantics present not only in the parameter names, but also in the type
names and structures. Concept-to-word association is performed by using Sigma,
a mapping of WordNet to the SUMO ontology. After having described in details
our annotation method, we apply it to the larger collection of real-world
syntactic WS descriptions we could find, and assess its efficiency.
| no_new_dataset | 0.946101 |
1502.00652 | Lubor Ladicky | \v{L}ubor Ladick\'y, Christian H\"ane and Marc Pollefeys | Learning the Matching Function | rejected from ACCV 2014 and probably from CVPR 2015 | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The matching function for the problem of stereo reconstruction or optical
flow has been traditionally designed as a function of the distance between the
features describing matched pixels. This approach works under assumption, that
the appearance of pixels in two stereo cameras or in two consecutive video
frames does not change dramatically. However, this might not be the case, if we
try to match pixels over a large interval of time.
In this paper we propose a method, which learns the matching function, that
automatically finds the space of allowed changes in visual appearance, such as
due to the motion blur, chromatic distortions, different colour calibration or
seasonal changes. Furthermore, it automatically learns the importance of
matching scores of contextual features at different relative locations and
scales. Proposed classifier gives reliable estimations of pixel disparities
already without any form of regularization.
We evaluated our method on two standard problems - stereo matching on KITTI
outdoor dataset, optical flow on Sintel data set, and on newly introduced
TimeLapse change detection dataset. Our algorithm obtained very promising
results comparable to the state-of-the-art.
| [
{
"version": "v1",
"created": "Mon, 2 Feb 2015 21:20:43 GMT"
}
] | 2015-02-04T00:00:00 | [
[
"Ladický",
"Ľubor",
""
],
[
"Häne",
"Christian",
""
],
[
"Pollefeys",
"Marc",
""
]
] | TITLE: Learning the Matching Function
ABSTRACT: The matching function for the problem of stereo reconstruction or optical
flow has been traditionally designed as a function of the distance between the
features describing matched pixels. This approach works under assumption, that
the appearance of pixels in two stereo cameras or in two consecutive video
frames does not change dramatically. However, this might not be the case, if we
try to match pixels over a large interval of time.
In this paper we propose a method, which learns the matching function, that
automatically finds the space of allowed changes in visual appearance, such as
due to the motion blur, chromatic distortions, different colour calibration or
seasonal changes. Furthermore, it automatically learns the importance of
matching scores of contextual features at different relative locations and
scales. Proposed classifier gives reliable estimations of pixel disparities
already without any form of regularization.
We evaluated our method on two standard problems - stereo matching on KITTI
outdoor dataset, optical flow on Sintel data set, and on newly introduced
TimeLapse change detection dataset. Our algorithm obtained very promising
results comparable to the state-of-the-art.
| no_new_dataset | 0.902952 |
1502.00712 | Liang Lin | Zhanglin Peng, Liang Lin, Ruimao Zhang, Jing Xu | Deep Boosting: Layered Feature Mining for General Image Classification | 6 pages, 4 figures, ICME 2014 | Multimedia and Expo (ICME), 2014 IEEE International Conference on
, vol., no., pp.1,6, 14-18 July 2014 | 10.1109/ICME.2014.6890323 | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Constructing effective representations is a critical but challenging problem
in multimedia understanding. The traditional handcraft features often rely on
domain knowledge, limiting the performances of exiting methods. This paper
discusses a novel computational architecture for general image feature mining,
which assembles the primitive filters (i.e. Gabor wavelets) into compositional
features in a layer-wise manner. In each layer, we produce a number of base
classifiers (i.e. regression stumps) associated with the generated features,
and discover informative compositions by using the boosting algorithm. The
output compositional features of each layer are treated as the base components
to build up the next layer. Our framework is able to generate expressive image
representations while inducing very discriminate functions for image
classification. The experiments are conducted on several public datasets, and
we demonstrate superior performances over state-of-the-art approaches.
| [
{
"version": "v1",
"created": "Tue, 3 Feb 2015 02:44:10 GMT"
}
] | 2015-02-04T00:00:00 | [
[
"Peng",
"Zhanglin",
""
],
[
"Lin",
"Liang",
""
],
[
"Zhang",
"Ruimao",
""
],
[
"Xu",
"Jing",
""
]
] | TITLE: Deep Boosting: Layered Feature Mining for General Image Classification
ABSTRACT: Constructing effective representations is a critical but challenging problem
in multimedia understanding. The traditional handcraft features often rely on
domain knowledge, limiting the performances of exiting methods. This paper
discusses a novel computational architecture for general image feature mining,
which assembles the primitive filters (i.e. Gabor wavelets) into compositional
features in a layer-wise manner. In each layer, we produce a number of base
classifiers (i.e. regression stumps) associated with the generated features,
and discover informative compositions by using the boosting algorithm. The
output compositional features of each layer are treated as the base components
to build up the next layer. Our framework is able to generate expressive image
representations while inducing very discriminate functions for image
classification. The experiments are conducted on several public datasets, and
we demonstrate superior performances over state-of-the-art approaches.
| no_new_dataset | 0.94868 |
1502.00717 | Hongyuan Zhu | Hongyuan Zhu, Fanman Meng, Jianfei Cai, Shijian Lu | Beyond Pixels: A Comprehensive Survey from Bottom-up to Semantic Image
Segmentation and Cosegmentation | submitted to Elsevier Journal of Visual Communications and Image
Representation | null | null | null | cs.CV | http://creativecommons.org/licenses/by-nc-sa/3.0/ | Image segmentation refers to the process to divide an image into
nonoverlapping meaningful regions according to human perception, which has
become a classic topic since the early ages of computer vision. A lot of
research has been conducted and has resulted in many applications. However,
while many segmentation algorithms exist, yet there are only a few sparse and
outdated summarizations available, an overview of the recent achievements and
issues is lacking. We aim to provide a comprehensive review of the recent
progress in this field. Covering 180 publications, we give an overview of broad
areas of segmentation topics including not only the classic bottom-up
approaches, but also the recent development in superpixel, interactive methods,
object proposals, semantic image parsing and image cosegmentation. In addition,
we also review the existing influential datasets and evaluation metrics.
Finally, we suggest some design flavors and research directions for future
research in image segmentation.
| [
{
"version": "v1",
"created": "Tue, 3 Feb 2015 03:00:52 GMT"
}
] | 2015-02-04T00:00:00 | [
[
"Zhu",
"Hongyuan",
""
],
[
"Meng",
"Fanman",
""
],
[
"Cai",
"Jianfei",
""
],
[
"Lu",
"Shijian",
""
]
] | TITLE: Beyond Pixels: A Comprehensive Survey from Bottom-up to Semantic Image
Segmentation and Cosegmentation
ABSTRACT: Image segmentation refers to the process to divide an image into
nonoverlapping meaningful regions according to human perception, which has
become a classic topic since the early ages of computer vision. A lot of
research has been conducted and has resulted in many applications. However,
while many segmentation algorithms exist, yet there are only a few sparse and
outdated summarizations available, an overview of the recent achievements and
issues is lacking. We aim to provide a comprehensive review of the recent
progress in this field. Covering 180 publications, we give an overview of broad
areas of segmentation topics including not only the classic bottom-up
approaches, but also the recent development in superpixel, interactive methods,
object proposals, semantic image parsing and image cosegmentation. In addition,
we also review the existing influential datasets and evaluation metrics.
Finally, we suggest some design flavors and research directions for future
research in image segmentation.
| no_new_dataset | 0.945701 |
1502.00725 | Hongwei Li | Hongwei Li and Qiang Liu | Cheaper and Better: Selecting Good Workers for Crowdsourcing | null | null | null | null | stat.ML cs.AI cs.LG stat.AP | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Crowdsourcing provides a popular paradigm for data collection at scale. We
study the problem of selecting subsets of workers from a given worker pool to
maximize the accuracy under a budget constraint. One natural question is
whether we should hire as many workers as the budget allows, or restrict on a
small number of top-quality workers. By theoretically analyzing the error rate
of a typical setting in crowdsourcing, we frame the worker selection problem
into a combinatorial optimization problem and propose an algorithm to solve it
efficiently. Empirical results on both simulated and real-world datasets show
that our algorithm is able to select a small number of high-quality workers,
and performs as good as, sometimes even better than, the much larger crowds as
the budget allows.
| [
{
"version": "v1",
"created": "Tue, 3 Feb 2015 03:45:48 GMT"
}
] | 2015-02-04T00:00:00 | [
[
"Li",
"Hongwei",
""
],
[
"Liu",
"Qiang",
""
]
] | TITLE: Cheaper and Better: Selecting Good Workers for Crowdsourcing
ABSTRACT: Crowdsourcing provides a popular paradigm for data collection at scale. We
study the problem of selecting subsets of workers from a given worker pool to
maximize the accuracy under a budget constraint. One natural question is
whether we should hire as many workers as the budget allows, or restrict on a
small number of top-quality workers. By theoretically analyzing the error rate
of a typical setting in crowdsourcing, we frame the worker selection problem
into a combinatorial optimization problem and propose an algorithm to solve it
efficiently. Empirical results on both simulated and real-world datasets show
that our algorithm is able to select a small number of high-quality workers,
and performs as good as, sometimes even better than, the much larger crowds as
the budget allows.
| no_new_dataset | 0.952442 |
1502.00739 | Liang Lin | Wei Yang, Ping Luo, Liang Lin | Clothing Co-Parsing by Joint Image Segmentation and Labeling | 8 pages, 5 figures, CVPR 2014 | Computer Vision and Pattern Recognition (CVPR), 2014 IEEE
Conference on , vol., no., pp.3182,3189, 23-28 June 2014 | 10.1109/CVPR.2014.407 | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper aims at developing an integrated system of clothing co-parsing, in
order to jointly parse a set of clothing images (unsegmented but annotated with
tags) into semantic configurations. We propose a data-driven framework
consisting of two phases of inference. The first phase, referred as "image
co-segmentation", iterates to extract consistent regions on images and jointly
refines the regions over all images by employing the exemplar-SVM (E-SVM)
technique [23]. In the second phase (i.e. "region co-labeling"), we construct a
multi-image graphical model by taking the segmented regions as vertices, and
incorporate several contexts of clothing configuration (e.g., item location and
mutual interactions). The joint label assignment can be solved using the
efficient Graph Cuts algorithm. In addition to evaluate our framework on the
Fashionista dataset [30], we construct a dataset called CCP consisting of 2098
high-resolution street fashion photos to demonstrate the performance of our
system. We achieve 90.29% / 88.23% segmentation accuracy and 65.52% / 63.89%
recognition rate on the Fashionista and the CCP datasets, respectively, which
are superior compared with state-of-the-art methods.
| [
{
"version": "v1",
"created": "Tue, 3 Feb 2015 04:59:41 GMT"
}
] | 2015-02-04T00:00:00 | [
[
"Yang",
"Wei",
""
],
[
"Luo",
"Ping",
""
],
[
"Lin",
"Liang",
""
]
] | TITLE: Clothing Co-Parsing by Joint Image Segmentation and Labeling
ABSTRACT: This paper aims at developing an integrated system of clothing co-parsing, in
order to jointly parse a set of clothing images (unsegmented but annotated with
tags) into semantic configurations. We propose a data-driven framework
consisting of two phases of inference. The first phase, referred as "image
co-segmentation", iterates to extract consistent regions on images and jointly
refines the regions over all images by employing the exemplar-SVM (E-SVM)
technique [23]. In the second phase (i.e. "region co-labeling"), we construct a
multi-image graphical model by taking the segmented regions as vertices, and
incorporate several contexts of clothing configuration (e.g., item location and
mutual interactions). The joint label assignment can be solved using the
efficient Graph Cuts algorithm. In addition to evaluate our framework on the
Fashionista dataset [30], we construct a dataset called CCP consisting of 2098
high-resolution street fashion photos to demonstrate the performance of our
system. We achieve 90.29% / 88.23% segmentation accuracy and 65.52% / 63.89%
recognition rate on the Fashionista and the CCP datasets, respectively, which
are superior compared with state-of-the-art methods.
| new_dataset | 0.956675 |
1502.00750 | Liang Lin | Xiaodan Liang, Qingxing Cao, Rui Huang, Liang Lin | Recognizing Focal Liver Lesions in Contrast-Enhanced Ultrasound with
Discriminatively Trained Spatio-Temporal Model | 5 pages, 1 figures | Biomedical Imaging (ISBI), 2014 IEEE 11th International Symposium
on , vol., no., pp.1184-1187, April 2014 | 10.1109/ISBI.2014.6868087 | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The aim of this study is to provide an automatic computational framework to
assist clinicians in diagnosing Focal Liver Lesions (FLLs) in
Contrast-Enhancement Ultrasound (CEUS). We represent FLLs in a CEUS video clip
as an ensemble of Region-of-Interests (ROIs), whose locations are modeled as
latent variables in a discriminative model. Different types of FLLs are
characterized by both spatial and temporal enhancement patterns of the ROIs.
The model is learned by iteratively inferring the optimal ROI locations and
optimizing the model parameters. To efficiently search the optimal spatial and
temporal locations of the ROIs, we propose a data-driven inference algorithm by
combining effective spatial and temporal pruning. The experiments show that our
method achieves promising results on the largest dataset in the literature (to
the best of our knowledge), which we have made publicly available.
| [
{
"version": "v1",
"created": "Tue, 3 Feb 2015 06:14:30 GMT"
}
] | 2015-02-04T00:00:00 | [
[
"Liang",
"Xiaodan",
""
],
[
"Cao",
"Qingxing",
""
],
[
"Huang",
"Rui",
""
],
[
"Lin",
"Liang",
""
]
] | TITLE: Recognizing Focal Liver Lesions in Contrast-Enhanced Ultrasound with
Discriminatively Trained Spatio-Temporal Model
ABSTRACT: The aim of this study is to provide an automatic computational framework to
assist clinicians in diagnosing Focal Liver Lesions (FLLs) in
Contrast-Enhancement Ultrasound (CEUS). We represent FLLs in a CEUS video clip
as an ensemble of Region-of-Interests (ROIs), whose locations are modeled as
latent variables in a discriminative model. Different types of FLLs are
characterized by both spatial and temporal enhancement patterns of the ROIs.
The model is learned by iteratively inferring the optimal ROI locations and
optimizing the model parameters. To efficiently search the optimal spatial and
temporal locations of the ROIs, we propose a data-driven inference algorithm by
combining effective spatial and temporal pruning. The experiments show that our
method achieves promising results on the largest dataset in the literature (to
the best of our knowledge), which we have made publicly available.
| no_new_dataset | 0.948632 |
1403.0388 | Mohammadzaman Zamani | Mohammadzaman Zamani, Hamid Beigy, and Amirreza Shaban | Cascading Randomized Weighted Majority: A New Online Ensemble Learning
Algorithm | 15 pages, 3 figures | null | null | null | stat.ML cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | With the increasing volume of data in the world, the best approach for
learning from this data is to exploit an online learning algorithm. Online
ensemble methods are online algorithms which take advantage of an ensemble of
classifiers to predict labels of data. Prediction with expert advice is a
well-studied problem in the online ensemble learning literature. The Weighted
Majority algorithm and the randomized weighted majority (RWM) are the most
well-known solutions to this problem, aiming to converge to the best expert.
Since among some expert, the best one does not necessarily have the minimum
error in all regions of data space, defining specific regions and converging to
the best expert in each of these regions will lead to a better result. In this
paper, we aim to resolve this defect of RWM algorithms by proposing a novel
online ensemble algorithm to the problem of prediction with expert advice. We
propose a cascading version of RWM to achieve not only better experimental
results but also a better error bound for sufficiently large datasets.
| [
{
"version": "v1",
"created": "Mon, 3 Mar 2014 11:05:10 GMT"
},
{
"version": "v2",
"created": "Fri, 5 Dec 2014 17:57:03 GMT"
},
{
"version": "v3",
"created": "Sun, 4 Jan 2015 03:01:38 GMT"
},
{
"version": "v4",
"created": "Mon, 2 Feb 2015 17:18:43 GMT"
}
] | 2015-02-03T00:00:00 | [
[
"Zamani",
"Mohammadzaman",
""
],
[
"Beigy",
"Hamid",
""
],
[
"Shaban",
"Amirreza",
""
]
] | TITLE: Cascading Randomized Weighted Majority: A New Online Ensemble Learning
Algorithm
ABSTRACT: With the increasing volume of data in the world, the best approach for
learning from this data is to exploit an online learning algorithm. Online
ensemble methods are online algorithms which take advantage of an ensemble of
classifiers to predict labels of data. Prediction with expert advice is a
well-studied problem in the online ensemble learning literature. The Weighted
Majority algorithm and the randomized weighted majority (RWM) are the most
well-known solutions to this problem, aiming to converge to the best expert.
Since among some expert, the best one does not necessarily have the minimum
error in all regions of data space, defining specific regions and converging to
the best expert in each of these regions will lead to a better result. In this
paper, we aim to resolve this defect of RWM algorithms by proposing a novel
online ensemble algorithm to the problem of prediction with expert advice. We
propose a cascading version of RWM to achieve not only better experimental
results but also a better error bound for sufficiently large datasets.
| no_new_dataset | 0.949342 |
1408.4910 | Kai Zhao | Kai Zhao, Mirco Musolesi, Pan Hui, Weixiong Rao and Sasu Tarkoma | Explaining the Power-law Distribution of Human Mobility Through
Transportation Modality Decomposition | null | null | null | null | physics.soc-ph cs.SI physics.data-an | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Human mobility has been empirically observed to exhibit Levy flight
characteristics and behaviour with power-law distributed jump size. The
fundamental mechanisms behind this behaviour has not yet been fully explained.
In this paper, we analyze urban human mobility and we propose to explain the
Levy walk behaviour observed in human mobility patterns by decomposing them
into different classes according to the different transportation modes, such as
Walk/Run, Bicycle, Train/Subway or Car/Taxi/Bus. Our analysis is based on two
real-life GPS datasets containing approximately 10 and 20 million GPS samples
with transportation mode information. We show that human mobility can be
modelled as a mixture of different transportation modes, and that these single
movement patterns can be approximated by a lognormal distribution rather than a
power-law distribution. Then, we demonstrate that the mixture of the decomposed
lognormal flight distributions associated with each modality is a power-law
distribution, providing an explanation to the emergence of Levy Walk patterns
that characterize human mobility patterns.
| [
{
"version": "v1",
"created": "Thu, 21 Aug 2014 08:19:19 GMT"
},
{
"version": "v2",
"created": "Mon, 8 Sep 2014 09:23:48 GMT"
},
{
"version": "v3",
"created": "Mon, 2 Feb 2015 08:30:34 GMT"
}
] | 2015-02-03T00:00:00 | [
[
"Zhao",
"Kai",
""
],
[
"Musolesi",
"Mirco",
""
],
[
"Hui",
"Pan",
""
],
[
"Rao",
"Weixiong",
""
],
[
"Tarkoma",
"Sasu",
""
]
] | TITLE: Explaining the Power-law Distribution of Human Mobility Through
Transportation Modality Decomposition
ABSTRACT: Human mobility has been empirically observed to exhibit Levy flight
characteristics and behaviour with power-law distributed jump size. The
fundamental mechanisms behind this behaviour has not yet been fully explained.
In this paper, we analyze urban human mobility and we propose to explain the
Levy walk behaviour observed in human mobility patterns by decomposing them
into different classes according to the different transportation modes, such as
Walk/Run, Bicycle, Train/Subway or Car/Taxi/Bus. Our analysis is based on two
real-life GPS datasets containing approximately 10 and 20 million GPS samples
with transportation mode information. We show that human mobility can be
modelled as a mixture of different transportation modes, and that these single
movement patterns can be approximated by a lognormal distribution rather than a
power-law distribution. Then, we demonstrate that the mixture of the decomposed
lognormal flight distributions associated with each modality is a power-law
distribution, providing an explanation to the emergence of Levy Walk patterns
that characterize human mobility patterns.
| no_new_dataset | 0.948775 |
1501.07093 | Mallenahalli Naresh Kumar Prof. Dr. | V. Sree Hari Rao and M. Naresh Kumar | Novel Approaches for Predicting Risk Factors of Atherosclerosis | 7 pages, 2 figures | Biomedical and Health Informatics, IEEE Journal of , vol.17, no.1,
pp.183,189, Jan. 2013 | 10.1109/TITB.2012.2227271 | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Coronary heart disease (CHD) caused by hardening of artery walls due to
cholesterol known as atherosclerosis is responsible for large number of deaths
world-wide. The disease progression is slow, asymptomatic and may lead to
sudden cardiac arrest, stroke or myocardial infraction. Presently, imaging
techniques are being employed to understand the molecular and metabolic
activity of atherosclerotic plaques to estimate the risk. Though imaging
methods are able to provide some information on plaque metabolism they lack the
required resolution and sensitivity for detection. In this paper we consider
the clinical observations and habits of individuals for predicting the risk
factors of CHD. The identification of risk factors helps in stratifying
patients for further intensive tests such as nuclear imaging or coronary
angiography. We present a novel approach for predicting the risk factors of
atherosclerosis with an in-built imputation algorithm and particle swarm
optimization (PSO). We compare the performance of our methodology with other
machine learning techniques on STULONG dataset which is based on longitudinal
study of middle aged individuals lasting for twenty years. Our methodology
powered by PSO search has identified physical inactivity as one of the risk
factor for the onset of atherosclerosis in addition to other already known
factors. The decision rules extracted by our methodology are able to predict
the risk factors with an accuracy of $99.73%$ which is higher than the
accuracies obtained by application of the state-of-the-art machine learning
techniques presently being employed in the identification of atherosclerosis
risk studies.
| [
{
"version": "v1",
"created": "Wed, 28 Jan 2015 13:26:02 GMT"
},
{
"version": "v2",
"created": "Sat, 31 Jan 2015 03:22:15 GMT"
}
] | 2015-02-03T00:00:00 | [
[
"Rao",
"V. Sree Hari",
""
],
[
"Kumar",
"M. Naresh",
""
]
] | TITLE: Novel Approaches for Predicting Risk Factors of Atherosclerosis
ABSTRACT: Coronary heart disease (CHD) caused by hardening of artery walls due to
cholesterol known as atherosclerosis is responsible for large number of deaths
world-wide. The disease progression is slow, asymptomatic and may lead to
sudden cardiac arrest, stroke or myocardial infraction. Presently, imaging
techniques are being employed to understand the molecular and metabolic
activity of atherosclerotic plaques to estimate the risk. Though imaging
methods are able to provide some information on plaque metabolism they lack the
required resolution and sensitivity for detection. In this paper we consider
the clinical observations and habits of individuals for predicting the risk
factors of CHD. The identification of risk factors helps in stratifying
patients for further intensive tests such as nuclear imaging or coronary
angiography. We present a novel approach for predicting the risk factors of
atherosclerosis with an in-built imputation algorithm and particle swarm
optimization (PSO). We compare the performance of our methodology with other
machine learning techniques on STULONG dataset which is based on longitudinal
study of middle aged individuals lasting for twenty years. Our methodology
powered by PSO search has identified physical inactivity as one of the risk
factor for the onset of atherosclerosis in addition to other already known
factors. The decision rules extracted by our methodology are able to predict
the risk factors with an accuracy of $99.73%$ which is higher than the
accuracies obtained by application of the state-of-the-art machine learning
techniques presently being employed in the identification of atherosclerosis
risk studies.
| no_new_dataset | 0.943815 |
1502.00030 | Sravanthi Bondugula | Sravanthi Bondugula, Varun Manjunatha, Larry S. Davis, David Doermann | SHOE: Supervised Hashing with Output Embeddings | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present a supervised binary encoding scheme for image retrieval that
learns projections by taking into account similarity between classes obtained
from output embeddings. Our motivation is that binary hash codes learned in
this way improve both the visual quality of retrieval results and existing
supervised hashing schemes. We employ a sequential greedy optimization that
learns relationship aware projections by minimizing the difference between
inner products of binary codes and output embedding vectors. We develop a joint
optimization framework to learn projections which improve the accuracy of
supervised hashing over the current state of the art with respect to standard
and sibling evaluation metrics. We further boost performance by applying the
supervised dimensionality reduction technique on kernelized input CNN features.
Experiments are performed on three datasets: CUB-2011, SUN-Attribute and
ImageNet ILSVRC 2010. As a by-product of our method, we show that using a
simple k-nn pooling classifier with our discriminative codes improves over the
complex classification models on fine grained datasets like CUB and offer an
impressive compression ratio of 1024 on CNN features.
| [
{
"version": "v1",
"created": "Fri, 30 Jan 2015 22:04:12 GMT"
}
] | 2015-02-03T00:00:00 | [
[
"Bondugula",
"Sravanthi",
""
],
[
"Manjunatha",
"Varun",
""
],
[
"Davis",
"Larry S.",
""
],
[
"Doermann",
"David",
""
]
] | TITLE: SHOE: Supervised Hashing with Output Embeddings
ABSTRACT: We present a supervised binary encoding scheme for image retrieval that
learns projections by taking into account similarity between classes obtained
from output embeddings. Our motivation is that binary hash codes learned in
this way improve both the visual quality of retrieval results and existing
supervised hashing schemes. We employ a sequential greedy optimization that
learns relationship aware projections by minimizing the difference between
inner products of binary codes and output embedding vectors. We develop a joint
optimization framework to learn projections which improve the accuracy of
supervised hashing over the current state of the art with respect to standard
and sibling evaluation metrics. We further boost performance by applying the
supervised dimensionality reduction technique on kernelized input CNN features.
Experiments are performed on three datasets: CUB-2011, SUN-Attribute and
ImageNet ILSVRC 2010. As a by-product of our method, we show that using a
simple k-nn pooling classifier with our discriminative codes improves over the
complex classification models on fine grained datasets like CUB and offer an
impressive compression ratio of 1024 on CNN features.
| no_new_dataset | 0.944434 |
1502.00046 | Davis King | Davis E. King | Max-Margin Object Detection | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Most object detection methods operate by applying a binary classifier to
sub-windows of an image, followed by a non-maximum suppression step where
detections on overlapping sub-windows are removed. Since the number of possible
sub-windows in even moderately sized image datasets is extremely large, the
classifier is typically learned from only a subset of the windows. This avoids
the computational difficulty of dealing with the entire set of sub-windows,
however, as we will show in this paper, it leads to sub-optimal detector
performance.
In particular, the main contribution of this paper is the introduction of a
new method, Max-Margin Object Detection (MMOD), for learning to detect objects
in images. This method does not perform any sub-sampling, but instead optimizes
over all sub-windows. MMOD can be used to improve any object detection method
which is linear in the learned parameters, such as HOG or bag-of-visual-word
models. Using this approach we show substantial performance gains on three
publicly available datasets. Strikingly, we show that a single rigid HOG filter
can outperform a state-of-the-art deformable part model on the Face Detection
Data Set and Benchmark when the HOG filter is learned via MMOD.
| [
{
"version": "v1",
"created": "Sat, 31 Jan 2015 00:32:34 GMT"
}
] | 2015-02-03T00:00:00 | [
[
"King",
"Davis E.",
""
]
] | TITLE: Max-Margin Object Detection
ABSTRACT: Most object detection methods operate by applying a binary classifier to
sub-windows of an image, followed by a non-maximum suppression step where
detections on overlapping sub-windows are removed. Since the number of possible
sub-windows in even moderately sized image datasets is extremely large, the
classifier is typically learned from only a subset of the windows. This avoids
the computational difficulty of dealing with the entire set of sub-windows,
however, as we will show in this paper, it leads to sub-optimal detector
performance.
In particular, the main contribution of this paper is the introduction of a
new method, Max-Margin Object Detection (MMOD), for learning to detect objects
in images. This method does not perform any sub-sampling, but instead optimizes
over all sub-windows. MMOD can be used to improve any object detection method
which is linear in the learned parameters, such as HOG or bag-of-visual-word
models. Using this approach we show substantial performance gains on three
publicly available datasets. Strikingly, we show that a single rigid HOG filter
can outperform a state-of-the-art deformable part model on the Face Detection
Data Set and Benchmark when the HOG filter is learned via MMOD.
| no_new_dataset | 0.945651 |
1502.00093 | Sotetsu Koyamada | Sotetsu Koyamada and Yumi Shikauchi and Ken Nakae and Masanori Koyama
and Shin Ishii | Deep learning of fMRI big data: a novel approach to subject-transfer
decoding | null | null | null | null | stat.ML cs.LG q-bio.NC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | As a technology to read brain states from measurable brain activities, brain
decoding are widely applied in industries and medical sciences. In spite of
high demands in these applications for a universal decoder that can be applied
to all individuals simultaneously, large variation in brain activities across
individuals has limited the scope of many studies to the development of
individual-specific decoders. In this study, we used deep neural network (DNN),
a nonlinear hierarchical model, to construct a subject-transfer decoder. Our
decoder is the first successful DNN-based subject-transfer decoder. When
applied to a large-scale functional magnetic resonance imaging (fMRI) database,
our DNN-based decoder achieved higher decoding accuracy than other baseline
methods, including support vector machine (SVM). In order to analyze the
knowledge acquired by this decoder, we applied principal sensitivity analysis
(PSA) to the decoder and visualized the discriminative features that are common
to all subjects in the dataset. Our PSA successfully visualized the
subject-independent features contributing to the subject-transferability of the
trained decoder.
| [
{
"version": "v1",
"created": "Sat, 31 Jan 2015 11:58:26 GMT"
}
] | 2015-02-03T00:00:00 | [
[
"Koyamada",
"Sotetsu",
""
],
[
"Shikauchi",
"Yumi",
""
],
[
"Nakae",
"Ken",
""
],
[
"Koyama",
"Masanori",
""
],
[
"Ishii",
"Shin",
""
]
] | TITLE: Deep learning of fMRI big data: a novel approach to subject-transfer
decoding
ABSTRACT: As a technology to read brain states from measurable brain activities, brain
decoding are widely applied in industries and medical sciences. In spite of
high demands in these applications for a universal decoder that can be applied
to all individuals simultaneously, large variation in brain activities across
individuals has limited the scope of many studies to the development of
individual-specific decoders. In this study, we used deep neural network (DNN),
a nonlinear hierarchical model, to construct a subject-transfer decoder. Our
decoder is the first successful DNN-based subject-transfer decoder. When
applied to a large-scale functional magnetic resonance imaging (fMRI) database,
our DNN-based decoder achieved higher decoding accuracy than other baseline
methods, including support vector machine (SVM). In order to analyze the
knowledge acquired by this decoder, we applied principal sensitivity analysis
(PSA) to the decoder and visualized the discriminative features that are common
to all subjects in the dataset. Our PSA successfully visualized the
subject-independent features contributing to the subject-transferability of the
trained decoder.
| no_new_dataset | 0.935169 |
1502.00141 | Mathieu Lagrange | Mathieu Lagrange, Gr\'egoire Lafay, Mathias Rossignol, Emmanouil
Benetos, Axel Roebel | An evaluation framework for event detection using a morphological model
of acoustic scenes | null | null | null | null | stat.ML cs.SD | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper introduces a model of environmental acoustic scenes which adopts a
morphological approach by ab-stracting temporal structures of acoustic scenes.
To demonstrate its potential, this model is employed to evaluate the
performance of a large set of acoustic events detection systems. This model
allows us to explicitly control key morphological aspects of the acoustic scene
and isolate their impact on the performance of the system under evaluation.
Thus, more information can be gained on the behavior of evaluated systems,
providing guidance for further improvements. The proposed model is validated
using submitted systems from the IEEE DCASE Challenge; results indicate that
the proposed scheme is able to successfully build datasets useful for
evaluating some aspects the performance of event detection systems, more
particularly their robustness to new listening conditions and the increasing
level of background sounds.
| [
{
"version": "v1",
"created": "Sat, 31 Jan 2015 18:12:34 GMT"
}
] | 2015-02-03T00:00:00 | [
[
"Lagrange",
"Mathieu",
""
],
[
"Lafay",
"Grégoire",
""
],
[
"Rossignol",
"Mathias",
""
],
[
"Benetos",
"Emmanouil",
""
],
[
"Roebel",
"Axel",
""
]
] | TITLE: An evaluation framework for event detection using a morphological model
of acoustic scenes
ABSTRACT: This paper introduces a model of environmental acoustic scenes which adopts a
morphological approach by ab-stracting temporal structures of acoustic scenes.
To demonstrate its potential, this model is employed to evaluate the
performance of a large set of acoustic events detection systems. This model
allows us to explicitly control key morphological aspects of the acoustic scene
and isolate their impact on the performance of the system under evaluation.
Thus, more information can be gained on the behavior of evaluated systems,
providing guidance for further improvements. The proposed model is validated
using submitted systems from the IEEE DCASE Challenge; results indicate that
the proposed scheme is able to successfully build datasets useful for
evaluating some aspects the performance of event detection systems, more
particularly their robustness to new listening conditions and the increasing
level of background sounds.
| no_new_dataset | 0.949295 |
1502.00166 | Marijn ten Thij | Marijn ten Thij, Tanneke Ouboter, Daniel Worm, Nelly Litvak, Hans van
den Berg and Sandjai Bhulai | Modelling of trends in Twitter using retweet graph dynamics | 16 pages, 5 figures, presented at WAW 2014 | Algorithms and Models for the Web Graph, 11th International
Workshop, WAW 2014, Beijing, China, December 17-18, 2014, Proceedings pp
132-147, Lecture Notes in Computer Science, Springer | 10.1007/978-3-319-13123-8_11 | null | cs.SI physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we model user behaviour in Twitter to capture the emergence of
trending topics. For this purpose, we first extensively analyse tweet datasets
of several different events. In particular, for these datasets, we construct
and investigate the retweet graphs. We find that the retweet graph for a
trending topic has a relatively dense largest connected component (LCC). Next,
based on the insights obtained from the analyses of the datasets, we design a
mathematical model that describes the evolution of a retweet graph by three
main parameters. We then quantify, analytically and by simulation, the
influence of the model parameters on the basic characteristics of the retweet
graph, such as the density of edges and the size and density of the LCC.
Finally, we put the model in practice, estimate its parameters and compare the
resulting behavior of the model to our datasets.
| [
{
"version": "v1",
"created": "Sat, 31 Jan 2015 21:45:17 GMT"
}
] | 2015-02-03T00:00:00 | [
[
"Thij",
"Marijn ten",
""
],
[
"Ouboter",
"Tanneke",
""
],
[
"Worm",
"Daniel",
""
],
[
"Litvak",
"Nelly",
""
],
[
"Berg",
"Hans van den",
""
],
[
"Bhulai",
"Sandjai",
""
]
] | TITLE: Modelling of trends in Twitter using retweet graph dynamics
ABSTRACT: In this paper we model user behaviour in Twitter to capture the emergence of
trending topics. For this purpose, we first extensively analyse tweet datasets
of several different events. In particular, for these datasets, we construct
and investigate the retweet graphs. We find that the retweet graph for a
trending topic has a relatively dense largest connected component (LCC). Next,
based on the insights obtained from the analyses of the datasets, we design a
mathematical model that describes the evolution of a retweet graph by three
main parameters. We then quantify, analytically and by simulation, the
influence of the model parameters on the basic characteristics of the retweet
graph, such as the density of edges and the size and density of the LCC.
Finally, we put the model in practice, estimate its parameters and compare the
resulting behavior of the model to our datasets.
| no_new_dataset | 0.950411 |
1502.00192 | Menglong Zhu | Menglong Zhu, Xiaowei Zhou, Kostas Daniilidis | Pose and Shape Estimation with Discriminatively Learned Parts | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We introduce a new approach for estimating the 3D pose and the 3D shape of an
object from a single image. Given a training set of view exemplars, we learn
and select appearance-based discriminative parts which are mapped onto the 3D
model from the training set through a facil- ity location optimization. The
training set of 3D models is summarized into a sparse set of shapes from which
we can generalize by linear combination. Given a test picture, we detect
hypotheses for each part. The main challenge is to select from these hypotheses
and compute the 3D pose and shape coefficients at the same time. To achieve
this, we optimize a function that minimizes simultaneously the geometric
reprojection error as well as the appearance matching of the parts. We apply
the alternating direction method of multipliers (ADMM) to minimize the
resulting convex function. We evaluate our approach on the Fine Grained 3D Car
dataset with superior performance in shape and pose errors. Our main and novel
contribution is the simultaneous solution for part localization, 3D pose and
shape by maximizing both geometric and appearance compatibility.
| [
{
"version": "v1",
"created": "Sun, 1 Feb 2015 04:09:23 GMT"
}
] | 2015-02-03T00:00:00 | [
[
"Zhu",
"Menglong",
""
],
[
"Zhou",
"Xiaowei",
""
],
[
"Daniilidis",
"Kostas",
""
]
] | TITLE: Pose and Shape Estimation with Discriminatively Learned Parts
ABSTRACT: We introduce a new approach for estimating the 3D pose and the 3D shape of an
object from a single image. Given a training set of view exemplars, we learn
and select appearance-based discriminative parts which are mapped onto the 3D
model from the training set through a facil- ity location optimization. The
training set of 3D models is summarized into a sparse set of shapes from which
we can generalize by linear combination. Given a test picture, we detect
hypotheses for each part. The main challenge is to select from these hypotheses
and compute the 3D pose and shape coefficients at the same time. To achieve
this, we optimize a function that minimizes simultaneously the geometric
reprojection error as well as the appearance matching of the parts. We apply
the alternating direction method of multipliers (ADMM) to minimize the
resulting convex function. We evaluate our approach on the Fine Grained 3D Car
dataset with superior performance in shape and pose errors. Our main and novel
contribution is the simultaneous solution for part localization, 3D pose and
shape by maximizing both geometric and appearance compatibility.
| no_new_dataset | 0.943919 |
1502.00194 | James J.Q. Yu | James J.Q. Yu, Albert Y.S. Lam, Victor O.K. Li | Real-Coded Chemical Reaction Optimization with Different Perturbation
Functions | null | null | 10.1109/CEC.2012.6252925 | null | cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Chemical Reaction Optimization (CRO) is a powerful metaheuristic which mimics
the interactions of molecules in chemical reactions to search for the global
optimum. The perturbation function greatly influences the performance of CRO on
solving different continuous problems. In this paper, we study four different
probability distributions, namely, the Gaussian distribution, the Cauchy
distribution, the exponential distribution, and a modified Rayleigh
distribution, for the perturbation function of CRO. Different distributions
have different impacts on the solutions. The distributions are tested by a set
of well-known benchmark functions and simulation results show that problems
with different characteristics have different preference on the distribution
function. Our study gives guidelines to design CRO for different types of
optimization problems.
| [
{
"version": "v1",
"created": "Sun, 1 Feb 2015 04:45:43 GMT"
}
] | 2015-02-03T00:00:00 | [
[
"Yu",
"James J. Q.",
""
],
[
"Lam",
"Albert Y. S.",
""
],
[
"Li",
"Victor O. K.",
""
]
] | TITLE: Real-Coded Chemical Reaction Optimization with Different Perturbation
Functions
ABSTRACT: Chemical Reaction Optimization (CRO) is a powerful metaheuristic which mimics
the interactions of molecules in chemical reactions to search for the global
optimum. The perturbation function greatly influences the performance of CRO on
solving different continuous problems. In this paper, we study four different
probability distributions, namely, the Gaussian distribution, the Cauchy
distribution, the exponential distribution, and a modified Rayleigh
distribution, for the perturbation function of CRO. Different distributions
have different impacts on the solutions. The distributions are tested by a set
of well-known benchmark functions and simulation results show that problems
with different characteristics have different preference on the distribution
function. Our study gives guidelines to design CRO for different types of
optimization problems.
| no_new_dataset | 0.950273 |
1502.00197 | James J.Q. Yu | James J.Q. Yu, Victor O.K. Li, Albert Y.S. Lam | An Inter-molecular Adaptive Collision Scheme for Chemical Reaction
Optimization | null | null | 10.1109/CEC.2014.6900234 | null | cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Optimization techniques are frequently applied in science and engineering
research and development. Evolutionary algorithms, as a kind of general-purpose
metaheuristic, have been shown to be very effective in solving a wide range of
optimization problems. A recently proposed chemical-reaction-inspired
metaheuristic, Chemical Reaction Optimization (CRO), has been applied to solve
many global optimization problems. However, the functionality of the
inter-molecular ineffective collision operator in the canonical CRO design
overlaps that of the on-wall ineffective collision operator, which can
potential impair the overall performance. In this paper we propose a new
inter-molecular ineffective collision operator for CRO for global optimization.
To fully utilize our newly proposed operator, we also design a scheme to adapt
the algorithm to optimization problems with different search space
characteristics. We analyze the performance of our proposed algorithm with a
number of widely used benchmark functions. The simulation results indicate that
the new algorithm has superior performance over the canonical CRO.
| [
{
"version": "v1",
"created": "Sun, 1 Feb 2015 04:53:48 GMT"
}
] | 2015-02-03T00:00:00 | [
[
"Yu",
"James J. Q.",
""
],
[
"Li",
"Victor O. K.",
""
],
[
"Lam",
"Albert Y. S.",
""
]
] | TITLE: An Inter-molecular Adaptive Collision Scheme for Chemical Reaction
Optimization
ABSTRACT: Optimization techniques are frequently applied in science and engineering
research and development. Evolutionary algorithms, as a kind of general-purpose
metaheuristic, have been shown to be very effective in solving a wide range of
optimization problems. A recently proposed chemical-reaction-inspired
metaheuristic, Chemical Reaction Optimization (CRO), has been applied to solve
many global optimization problems. However, the functionality of the
inter-molecular ineffective collision operator in the canonical CRO design
overlaps that of the on-wall ineffective collision operator, which can
potential impair the overall performance. In this paper we propose a new
inter-molecular ineffective collision operator for CRO for global optimization.
To fully utilize our newly proposed operator, we also design a scheme to adapt
the algorithm to optimization problems with different search space
characteristics. We analyze the performance of our proposed algorithm with a
number of widely used benchmark functions. The simulation results indicate that
the new algorithm has superior performance over the canonical CRO.
| no_new_dataset | 0.946547 |
1502.00199 | James J.Q. Yu | James J.Q. Yu, Albert Y.S. Lam, Victor O.K. Li | Chemical Reaction Optimization for the Set Covering Problem | null | null | 10.1109/CEC.2014.6900233 | null | cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The set covering problem (SCP) is one of the representative combinatorial
optimization problems, having many practical applications. This paper
investigates the development of an algorithm to solve SCP by employing chemical
reaction optimization (CRO), a general-purpose metaheuristic. It is tested on a
wide range of benchmark instances of SCP. The simulation results indicate that
this algorithm gives outstanding performance compared with other heuristics and
metaheuristics in solving SCP.
| [
{
"version": "v1",
"created": "Sun, 1 Feb 2015 04:56:13 GMT"
}
] | 2015-02-03T00:00:00 | [
[
"Yu",
"James J. Q.",
""
],
[
"Lam",
"Albert Y. S.",
""
],
[
"Li",
"Victor O. K.",
""
]
] | TITLE: Chemical Reaction Optimization for the Set Covering Problem
ABSTRACT: The set covering problem (SCP) is one of the representative combinatorial
optimization problems, having many practical applications. This paper
investigates the development of an algorithm to solve SCP by employing chemical
reaction optimization (CRO), a general-purpose metaheuristic. It is tested on a
wide range of benchmark instances of SCP. The simulation results indicate that
this algorithm gives outstanding performance compared with other heuristics and
metaheuristics in solving SCP.
| no_new_dataset | 0.950824 |
1502.00231 | Yishi Zhang | Zhijun Chen, Chaozhong Wu, Yishi Zhang, Zhen Huang, Bin Ran, Ming
Zhong, Nengchao Lyu | Feature Selection with Redundancy-complementariness Dispersion | 28 pages, 13 figures, 7 tables | null | null | null | cs.LG stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Feature selection has attracted significant attention in data mining and
machine learning in the past decades. Many existing feature selection methods
eliminate redundancy by measuring pairwise inter-correlation of features,
whereas the complementariness of features and higher inter-correlation among
more than two features are ignored. In this study, a modification item
concerning the complementariness of features is introduced in the evaluation
criterion of features. Additionally, in order to identify the interference
effect of already-selected False Positives (FPs), the
redundancy-complementariness dispersion is also taken into account to adjust
the measurement of pairwise inter-correlation of features. To illustrate the
effectiveness of proposed method, classification experiments are applied with
four frequently used classifiers on ten datasets. Classification results verify
the superiority of proposed method compared with five representative feature
selection methods.
| [
{
"version": "v1",
"created": "Sun, 1 Feb 2015 10:44:26 GMT"
}
] | 2015-02-03T00:00:00 | [
[
"Chen",
"Zhijun",
""
],
[
"Wu",
"Chaozhong",
""
],
[
"Zhang",
"Yishi",
""
],
[
"Huang",
"Zhen",
""
],
[
"Ran",
"Bin",
""
],
[
"Zhong",
"Ming",
""
],
[
"Lyu",
"Nengchao",
""
]
] | TITLE: Feature Selection with Redundancy-complementariness Dispersion
ABSTRACT: Feature selection has attracted significant attention in data mining and
machine learning in the past decades. Many existing feature selection methods
eliminate redundancy by measuring pairwise inter-correlation of features,
whereas the complementariness of features and higher inter-correlation among
more than two features are ignored. In this study, a modification item
concerning the complementariness of features is introduced in the evaluation
criterion of features. Additionally, in order to identify the interference
effect of already-selected False Positives (FPs), the
redundancy-complementariness dispersion is also taken into account to adjust
the measurement of pairwise inter-correlation of features. To illustrate the
effectiveness of proposed method, classification experiments are applied with
four frequently used classifiers on ten datasets. Classification results verify
the superiority of proposed method compared with five representative feature
selection methods.
| no_new_dataset | 0.949295 |
1502.00303 | Xianbiao Qi | Xianbiao Qi, Chun-Guang Li, Guoying Zhao, Xiaopeng Hong, Matti
Pietik\"ainen | Dynamic texture and scene classification by transferring deep image
features | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Dynamic texture and scene classification are two fundamental problems in
understanding natural video content. Extracting robust and effective features
is a crucial step towards solving these problems. However the existing
approaches suffer from the sensitivity to either varying illumination, or
viewpoint changing, or even camera motion, and/or the lack of spatial
information. Inspired by the success of deep structures in image
classification, we attempt to leverage a deep structure to extract feature for
dynamic texture and scene classification. To tackle with the challenges in
training a deep structure, we propose to transfer some prior knowledge from
image domain to video domain. To be specific, we propose to apply a
well-trained Convolutional Neural Network (ConvNet) as a mid-level feature
extractor to extract features from each frame, and then form a representation
of a video by concatenating the first and the second order statistics over the
mid-level features. We term this two-level feature extraction scheme as a
Transferred ConvNet Feature (TCoF). Moreover we explore two different
implementations of the TCoF scheme, i.e., the \textit{spatial} TCoF and the
\textit{temporal} TCoF, in which the mean-removed frames and the difference
between two adjacent frames are used as the inputs of the ConvNet,
respectively. We evaluate systematically the proposed spatial TCoF and the
temporal TCoF schemes on three benchmark data sets, including DynTex, YUPENN,
and Maryland, and demonstrate that the proposed approach yields superior
performance.
| [
{
"version": "v1",
"created": "Sun, 1 Feb 2015 20:22:00 GMT"
}
] | 2015-02-03T00:00:00 | [
[
"Qi",
"Xianbiao",
""
],
[
"Li",
"Chun-Guang",
""
],
[
"Zhao",
"Guoying",
""
],
[
"Hong",
"Xiaopeng",
""
],
[
"Pietikäinen",
"Matti",
""
]
] | TITLE: Dynamic texture and scene classification by transferring deep image
features
ABSTRACT: Dynamic texture and scene classification are two fundamental problems in
understanding natural video content. Extracting robust and effective features
is a crucial step towards solving these problems. However the existing
approaches suffer from the sensitivity to either varying illumination, or
viewpoint changing, or even camera motion, and/or the lack of spatial
information. Inspired by the success of deep structures in image
classification, we attempt to leverage a deep structure to extract feature for
dynamic texture and scene classification. To tackle with the challenges in
training a deep structure, we propose to transfer some prior knowledge from
image domain to video domain. To be specific, we propose to apply a
well-trained Convolutional Neural Network (ConvNet) as a mid-level feature
extractor to extract features from each frame, and then form a representation
of a video by concatenating the first and the second order statistics over the
mid-level features. We term this two-level feature extraction scheme as a
Transferred ConvNet Feature (TCoF). Moreover we explore two different
implementations of the TCoF scheme, i.e., the \textit{spatial} TCoF and the
\textit{temporal} TCoF, in which the mean-removed frames and the difference
between two adjacent frames are used as the inputs of the ConvNet,
respectively. We evaluate systematically the proposed spatial TCoF and the
temporal TCoF schemes on three benchmark data sets, including DynTex, YUPENN,
and Maryland, and demonstrate that the proposed approach yields superior
performance.
| no_new_dataset | 0.947284 |
1502.00341 | Liang Lin | Liang Lin, Xiaolong Wang, Wei Yang, Jian-Huang Lai | Discriminatively Trained And-Or Graph Models for Object Shape Detection | 15 pages, 14 figures, TPAMI 2014 | Pattern Analysis and Machine Intelligence, IEEE Transactions on ,
vol.PP, no.99, pp.1,1, 2014 | 10.1109/TPAMI.2014.2359888 | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we investigate a novel reconfigurable part-based model, namely
And-Or graph model, to recognize object shapes in images. Our proposed model
consists of four layers: leaf-nodes at the bottom are local classifiers for
detecting contour fragments; or-nodes above the leaf-nodes function as the
switches to activate their child leaf-nodes, making the model reconfigurable
during inference; and-nodes in a higher layer capture holistic shape
deformations; one root-node on the top, which is also an or-node, activates one
of its child and-nodes to deal with large global variations (e.g. different
poses and views). We propose a novel structural optimization algorithm to
discriminatively train the And-Or model from weakly annotated data. This
algorithm iteratively determines the model structures (e.g. the nodes and their
layouts) along with the parameter learning. On several challenging datasets,
our model demonstrates the effectiveness to perform robust shape-based object
detection against background clutter and outperforms the other state-of-the-art
approaches. We also release a new shape database with annotations, which
includes more than 1500 challenging shape instances, for recognition and
detection.
| [
{
"version": "v1",
"created": "Mon, 2 Feb 2015 02:04:01 GMT"
}
] | 2015-02-03T00:00:00 | [
[
"Lin",
"Liang",
""
],
[
"Wang",
"Xiaolong",
""
],
[
"Yang",
"Wei",
""
],
[
"Lai",
"Jian-Huang",
""
]
] | TITLE: Discriminatively Trained And-Or Graph Models for Object Shape Detection
ABSTRACT: In this paper, we investigate a novel reconfigurable part-based model, namely
And-Or graph model, to recognize object shapes in images. Our proposed model
consists of four layers: leaf-nodes at the bottom are local classifiers for
detecting contour fragments; or-nodes above the leaf-nodes function as the
switches to activate their child leaf-nodes, making the model reconfigurable
during inference; and-nodes in a higher layer capture holistic shape
deformations; one root-node on the top, which is also an or-node, activates one
of its child and-nodes to deal with large global variations (e.g. different
poses and views). We propose a novel structural optimization algorithm to
discriminatively train the And-Or model from weakly annotated data. This
algorithm iteratively determines the model structures (e.g. the nodes and their
layouts) along with the parameter learning. On several challenging datasets,
our model demonstrates the effectiveness to perform robust shape-based object
detection against background clutter and outperforms the other state-of-the-art
approaches. We also release a new shape database with annotations, which
includes more than 1500 challenging shape instances, for recognition and
detection.
| no_new_dataset | 0.904945 |
1502.00363 | Wangmeng Zuo | Wangmeng Zuo, Faqiang Wang, David Zhang, Liang Lin, Yuchi Huang, Deyu
Meng, Lei Zhang | Iterated Support Vector Machines for Distance Metric Learning | 14 pages, 10 figures | null | null | null | cs.LG cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Distance metric learning aims to learn from the given training data a valid
distance metric, with which the similarity between data samples can be more
effectively evaluated for classification. Metric learning is often formulated
as a convex or nonconvex optimization problem, while many existing metric
learning algorithms become inefficient for large scale problems. In this paper,
we formulate metric learning as a kernel classification problem, and solve it
by iterated training of support vector machines (SVM). The new formulation is
easy to implement, efficient in training, and tractable for large-scale
problems. Two novel metric learning models, namely Positive-semidefinite
Constrained Metric Learning (PCML) and Nonnegative-coefficient Constrained
Metric Learning (NCML), are developed. Both PCML and NCML can guarantee the
global optimality of their solutions. Experimental results on UCI dataset
classification, handwritten digit recognition, face verification and person
re-identification demonstrate that the proposed metric learning methods achieve
higher classification accuracy than state-of-the-art methods and they are
significantly more efficient in training.
| [
{
"version": "v1",
"created": "Mon, 2 Feb 2015 05:30:44 GMT"
}
] | 2015-02-03T00:00:00 | [
[
"Zuo",
"Wangmeng",
""
],
[
"Wang",
"Faqiang",
""
],
[
"Zhang",
"David",
""
],
[
"Lin",
"Liang",
""
],
[
"Huang",
"Yuchi",
""
],
[
"Meng",
"Deyu",
""
],
[
"Zhang",
"Lei",
""
]
] | TITLE: Iterated Support Vector Machines for Distance Metric Learning
ABSTRACT: Distance metric learning aims to learn from the given training data a valid
distance metric, with which the similarity between data samples can be more
effectively evaluated for classification. Metric learning is often formulated
as a convex or nonconvex optimization problem, while many existing metric
learning algorithms become inefficient for large scale problems. In this paper,
we formulate metric learning as a kernel classification problem, and solve it
by iterated training of support vector machines (SVM). The new formulation is
easy to implement, efficient in training, and tractable for large-scale
problems. Two novel metric learning models, namely Positive-semidefinite
Constrained Metric Learning (PCML) and Nonnegative-coefficient Constrained
Metric Learning (NCML), are developed. Both PCML and NCML can guarantee the
global optimality of their solutions. Experimental results on UCI dataset
classification, handwritten digit recognition, face verification and person
re-identification demonstrate that the proposed metric learning methods achieve
higher classification accuracy than state-of-the-art methods and they are
significantly more efficient in training.
| no_new_dataset | 0.951863 |
1502.00377 | Liang Lin | Liang Lin, Yongyi Lu, Yan Pan, Xiaowu Chen | Integrating Graph Partitioning and Matching for Trajectory Analysis in
Video Surveillance | 10 pages, 12 figures | Image Processing, IEEE Transactions on , vol.21, no.12,
pp.4844-4857, 2012 | 10.1109/TIP.2012.2211373 | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In order to track the moving objects in long range against occlusion,
interruption, and background clutter, this paper proposes a unified approach
for global trajectory analysis. Instead of the traditional frame-by-frame
tracking, our method recovers target trajectories based on a short sequence of
video frames, e.g. $15$ frames. We initially calculate a foreground map at each
frame, as obtained from a state-of-the-art background model. An attribute graph
is then extracted from the foreground map, where the graph vertices are image
primitives represented by the composite features. With this graph
representation, we pose trajectory analysis as a joint task of spatial graph
partitioning and temporal graph matching. The task can be formulated by
maximizing a posteriori under the Bayesian framework, in which we integrate the
spatio-temporal contexts and the appearance models. The probabilistic inference
is achieved by a data-driven Markov Chain Monte Carlo (MCMC) algorithm. Given a
peroid of observed frames, the algorithm simulates a ergodic and aperiodic
Markov Chain, and it visits a sequence of solution states in the joint space of
spatial graph partitioning and temporal graph matching. In the experiments, our
method is tested on several challenging videos from the public datasets of
visual surveillance, and it outperforms the state-of-the-art methods.
| [
{
"version": "v1",
"created": "Mon, 2 Feb 2015 06:52:47 GMT"
}
] | 2015-02-03T00:00:00 | [
[
"Lin",
"Liang",
""
],
[
"Lu",
"Yongyi",
""
],
[
"Pan",
"Yan",
""
],
[
"Chen",
"Xiaowu",
""
]
] | TITLE: Integrating Graph Partitioning and Matching for Trajectory Analysis in
Video Surveillance
ABSTRACT: In order to track the moving objects in long range against occlusion,
interruption, and background clutter, this paper proposes a unified approach
for global trajectory analysis. Instead of the traditional frame-by-frame
tracking, our method recovers target trajectories based on a short sequence of
video frames, e.g. $15$ frames. We initially calculate a foreground map at each
frame, as obtained from a state-of-the-art background model. An attribute graph
is then extracted from the foreground map, where the graph vertices are image
primitives represented by the composite features. With this graph
representation, we pose trajectory analysis as a joint task of spatial graph
partitioning and temporal graph matching. The task can be formulated by
maximizing a posteriori under the Bayesian framework, in which we integrate the
spatio-temporal contexts and the appearance models. The probabilistic inference
is achieved by a data-driven Markov Chain Monte Carlo (MCMC) algorithm. Given a
peroid of observed frames, the algorithm simulates a ergodic and aperiodic
Markov Chain, and it visits a sequence of solution states in the joint space of
spatial graph partitioning and temporal graph matching. In the experiments, our
method is tested on several challenging videos from the public datasets of
visual surveillance, and it outperforms the state-of-the-art methods.
| no_new_dataset | 0.951142 |
1502.00416 | Liang Lin | Bo Jiang, Yongyi Lu, Xiying Li, Liang Lin | Towards a solid solution of real-time fire and flame detection | 14 pages, 6 figures | Multimedia Tools and Applications, pp. 1380-7501, 2014 | 10.1007/s11042-014-2106-z | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Although the object detection and recognition has received growing attention
for decades, a robust fire and flame detection method is rarely explored. This
paper presents an empirical study, towards a general and solid approach to fast
detect fire and flame in videos, with the applications in video surveillance
and event retrieval. Our system consists of three cascaded steps: (1) candidate
regions proposing by a background model, (2) fire region classifying with
color-texture features and a dictionary of visual words, and (3) temporal
verifying. The experimental evaluation and analysis are done for each step. We
believe that it is a useful service to both academic research and real-world
application. In addition, we release the software of the proposed system with
the source code, as well as a public benchmark and data set, including 64 video
clips covered both indoor and outdoor scenes under different conditions. We
achieve an 82% Recall with 93% Precision on the data set, and greatly improve
the performance by state-of-the-arts methods.
| [
{
"version": "v1",
"created": "Mon, 2 Feb 2015 09:34:01 GMT"
}
] | 2015-02-03T00:00:00 | [
[
"Jiang",
"Bo",
""
],
[
"Lu",
"Yongyi",
""
],
[
"Li",
"Xiying",
""
],
[
"Lin",
"Liang",
""
]
] | TITLE: Towards a solid solution of real-time fire and flame detection
ABSTRACT: Although the object detection and recognition has received growing attention
for decades, a robust fire and flame detection method is rarely explored. This
paper presents an empirical study, towards a general and solid approach to fast
detect fire and flame in videos, with the applications in video surveillance
and event retrieval. Our system consists of three cascaded steps: (1) candidate
regions proposing by a background model, (2) fire region classifying with
color-texture features and a dictionary of visual words, and (3) temporal
verifying. The experimental evaluation and analysis are done for each step. We
believe that it is a useful service to both academic research and real-world
application. In addition, we release the software of the proposed system with
the source code, as well as a public benchmark and data set, including 64 video
clips covered both indoor and outdoor scenes under different conditions. We
achieve an 82% Recall with 93% Precision on the data set, and greatly improve
the performance by state-of-the-arts methods.
| new_dataset | 0.952882 |
1502.00512 | Will Williams | Will Williams, Niranjani Prasad, David Mrva, Tom Ash, Tony Robinson | Scaling Recurrent Neural Network Language Models | null | null | null | null | cs.CL cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper investigates the scaling properties of Recurrent Neural Network
Language Models (RNNLMs). We discuss how to train very large RNNs on GPUs and
address the questions of how RNNLMs scale with respect to model size,
training-set size, computational costs and memory. Our analysis shows that
despite being more costly to train, RNNLMs obtain much lower perplexities on
standard benchmarks than n-gram models. We train the largest known RNNs and
present relative word error rates gains of 18% on an ASR task. We also present
the new lowest perplexities on the recently released billion word language
modelling benchmark, 1 BLEU point gain on machine translation and a 17%
relative hit rate gain in word prediction.
| [
{
"version": "v1",
"created": "Mon, 2 Feb 2015 15:27:37 GMT"
}
] | 2015-02-03T00:00:00 | [
[
"Williams",
"Will",
""
],
[
"Prasad",
"Niranjani",
""
],
[
"Mrva",
"David",
""
],
[
"Ash",
"Tom",
""
],
[
"Robinson",
"Tony",
""
]
] | TITLE: Scaling Recurrent Neural Network Language Models
ABSTRACT: This paper investigates the scaling properties of Recurrent Neural Network
Language Models (RNNLMs). We discuss how to train very large RNNs on GPUs and
address the questions of how RNNLMs scale with respect to model size,
training-set size, computational costs and memory. Our analysis shows that
despite being more costly to train, RNNLMs obtain much lower perplexities on
standard benchmarks than n-gram models. We train the largest known RNNs and
present relative word error rates gains of 18% on an ASR task. We also present
the new lowest perplexities on the recently released billion word language
modelling benchmark, 1 BLEU point gain on machine translation and a 17%
relative hit rate gain in word prediction.
| no_new_dataset | 0.953665 |
1407.0316 | Mahito Sugiyama | Mahito Sugiyama, Felipe Llinares L\'opez, Niklas Kasenburg, Karsten M.
Borgwardt | Significant Subgraph Mining with Multiple Testing Correction | 18 pages, 5 figure, accepted to the 2015 SIAM International
Conference on Data Mining (SDM15) | null | null | null | stat.ME cs.LG stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The problem of finding itemsets that are statistically significantly enriched
in a class of transactions is complicated by the need to correct for multiple
hypothesis testing. Pruning untestable hypotheses was recently proposed as a
strategy for this task of significant itemset mining. It was shown to lead to
greater statistical power, the discovery of more truly significant itemsets,
than the standard Bonferroni correction on real-world datasets. An open
question, however, is whether this strategy of excluding untestable hypotheses
also leads to greater statistical power in subgraph mining, in which the number
of hypotheses is much larger than in itemset mining. Here we answer this
question by an empirical investigation on eight popular graph benchmark
datasets. We propose a new efficient search strategy, which always returns the
same solution as the state-of-the-art approach and is approximately two orders
of magnitude faster. Moreover, we exploit the dependence between subgraphs by
considering the effective number of tests and thereby further increase the
statistical power.
| [
{
"version": "v1",
"created": "Tue, 1 Jul 2014 16:53:51 GMT"
},
{
"version": "v2",
"created": "Sun, 6 Jul 2014 13:39:21 GMT"
},
{
"version": "v3",
"created": "Fri, 30 Jan 2015 16:11:17 GMT"
}
] | 2015-02-02T00:00:00 | [
[
"Sugiyama",
"Mahito",
""
],
[
"López",
"Felipe Llinares",
""
],
[
"Kasenburg",
"Niklas",
""
],
[
"Borgwardt",
"Karsten M.",
""
]
] | TITLE: Significant Subgraph Mining with Multiple Testing Correction
ABSTRACT: The problem of finding itemsets that are statistically significantly enriched
in a class of transactions is complicated by the need to correct for multiple
hypothesis testing. Pruning untestable hypotheses was recently proposed as a
strategy for this task of significant itemset mining. It was shown to lead to
greater statistical power, the discovery of more truly significant itemsets,
than the standard Bonferroni correction on real-world datasets. An open
question, however, is whether this strategy of excluding untestable hypotheses
also leads to greater statistical power in subgraph mining, in which the number
of hypotheses is much larger than in itemset mining. Here we answer this
question by an empirical investigation on eight popular graph benchmark
datasets. We propose a new efficient search strategy, which always returns the
same solution as the state-of-the-art approach and is approximately two orders
of magnitude faster. Moreover, we exploit the dependence between subgraphs by
considering the effective number of tests and thereby further increase the
statistical power.
| no_new_dataset | 0.953057 |
1409.0575 | Olga Russakovsky | Olga Russakovsky and Jia Deng and Hao Su and Jonathan Krause and
Sanjeev Satheesh and Sean Ma and Zhiheng Huang and Andrej Karpathy and Aditya
Khosla and Michael Bernstein and Alexander C. Berg and Li Fei-Fei | ImageNet Large Scale Visual Recognition Challenge | 43 pages, 16 figures. v3 includes additional comparisons with PASCAL
VOC (per-category comparisons in Table 3, distribution of localization
difficulty in Fig 16), a list of queries used for obtaining object detection
images (Appendix C), and some additional references | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The ImageNet Large Scale Visual Recognition Challenge is a benchmark in
object category classification and detection on hundreds of object categories
and millions of images. The challenge has been run annually from 2010 to
present, attracting participation from more than fifty institutions.
This paper describes the creation of this benchmark dataset and the advances
in object recognition that have been possible as a result. We discuss the
challenges of collecting large-scale ground truth annotation, highlight key
breakthroughs in categorical object recognition, provide a detailed analysis of
the current state of the field of large-scale image classification and object
detection, and compare the state-of-the-art computer vision accuracy with human
accuracy. We conclude with lessons learned in the five years of the challenge,
and propose future directions and improvements.
| [
{
"version": "v1",
"created": "Mon, 1 Sep 2014 22:29:38 GMT"
},
{
"version": "v2",
"created": "Mon, 1 Dec 2014 01:08:31 GMT"
},
{
"version": "v3",
"created": "Fri, 30 Jan 2015 01:23:59 GMT"
}
] | 2015-02-02T00:00:00 | [
[
"Russakovsky",
"Olga",
""
],
[
"Deng",
"Jia",
""
],
[
"Su",
"Hao",
""
],
[
"Krause",
"Jonathan",
""
],
[
"Satheesh",
"Sanjeev",
""
],
[
"Ma",
"Sean",
""
],
[
"Huang",
"Zhiheng",
""
],
[
"Karpathy",
"Andrej",
""
],
[
"Khosla",
"Aditya",
""
],
[
"Bernstein",
"Michael",
""
],
[
"Berg",
"Alexander C.",
""
],
[
"Fei-Fei",
"Li",
""
]
] | TITLE: ImageNet Large Scale Visual Recognition Challenge
ABSTRACT: The ImageNet Large Scale Visual Recognition Challenge is a benchmark in
object category classification and detection on hundreds of object categories
and millions of images. The challenge has been run annually from 2010 to
present, attracting participation from more than fifty institutions.
This paper describes the creation of this benchmark dataset and the advances
in object recognition that have been possible as a result. We discuss the
challenges of collecting large-scale ground truth annotation, highlight key
breakthroughs in categorical object recognition, provide a detailed analysis of
the current state of the field of large-scale image classification and object
detection, and compare the state-of-the-art computer vision accuracy with human
accuracy. We conclude with lessons learned in the five years of the challenge,
and propose future directions and improvements.
| new_dataset | 0.810629 |
1411.6243 | Xu Sun | Xu Sun | Structure Regularization for Structured Prediction: Theories and
Experiments | null | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | While there are many studies on weight regularization, the study on structure
regularization is rare. Many existing systems on structured prediction focus on
increasing the level of structural dependencies within the model. However, this
trend could have been misdirected, because our study suggests that complex
structures are actually harmful to generalization ability in structured
prediction. To control structure-based overfitting, we propose a structure
regularization framework via \emph{structure decomposition}, which decomposes
training samples into mini-samples with simpler structures, deriving a model
with better generalization power. We show both theoretically and empirically
that structure regularization can effectively control overfitting risk and lead
to better accuracy. As a by-product, the proposed method can also substantially
accelerate the training speed. The method and the theoretical results can apply
to general graphical models with arbitrary structures. Experiments on
well-known tasks demonstrate that our method can easily beat the benchmark
systems on those highly-competitive tasks, achieving state-of-the-art
accuracies yet with substantially faster training speed.
| [
{
"version": "v1",
"created": "Sun, 23 Nov 2014 14:11:01 GMT"
},
{
"version": "v2",
"created": "Fri, 30 Jan 2015 07:41:21 GMT"
}
] | 2015-02-02T00:00:00 | [
[
"Sun",
"Xu",
""
]
] | TITLE: Structure Regularization for Structured Prediction: Theories and
Experiments
ABSTRACT: While there are many studies on weight regularization, the study on structure
regularization is rare. Many existing systems on structured prediction focus on
increasing the level of structural dependencies within the model. However, this
trend could have been misdirected, because our study suggests that complex
structures are actually harmful to generalization ability in structured
prediction. To control structure-based overfitting, we propose a structure
regularization framework via \emph{structure decomposition}, which decomposes
training samples into mini-samples with simpler structures, deriving a model
with better generalization power. We show both theoretically and empirically
that structure regularization can effectively control overfitting risk and lead
to better accuracy. As a by-product, the proposed method can also substantially
accelerate the training speed. The method and the theoretical results can apply
to general graphical models with arbitrary structures. Experiments on
well-known tasks demonstrate that our method can easily beat the benchmark
systems on those highly-competitive tasks, achieving state-of-the-art
accuracies yet with substantially faster training speed.
| no_new_dataset | 0.944893 |
1501.05703 | Ning Zhang | Ning Zhang, Manohar Paluri, Yaniv Taigman, Rob Fergus, Lubomir Bourdev | Beyond Frontal Faces: Improving Person Recognition Using Multiple Cues | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We explore the task of recognizing peoples' identities in photo albums in an
unconstrained setting. To facilitate this, we introduce the new People In Photo
Albums (PIPA) dataset, consisting of over 60000 instances of 2000 individuals
collected from public Flickr photo albums. With only about half of the person
images containing a frontal face, the recognition task is very challenging due
to the large variations in pose, clothing, camera viewpoint, image resolution
and illumination. We propose the Pose Invariant PErson Recognition (PIPER)
method, which accumulates the cues of poselet-level person recognizers trained
by deep convolutional networks to discount for the pose variations, combined
with a face recognizer and a global recognizer. Experiments on three different
settings confirm that in our unconstrained setup PIPER significantly improves
on the performance of DeepFace, which is one of the best face recognizers as
measured on the LFW dataset.
| [
{
"version": "v1",
"created": "Fri, 23 Jan 2015 02:35:01 GMT"
},
{
"version": "v2",
"created": "Fri, 30 Jan 2015 18:48:27 GMT"
}
] | 2015-02-02T00:00:00 | [
[
"Zhang",
"Ning",
""
],
[
"Paluri",
"Manohar",
""
],
[
"Taigman",
"Yaniv",
""
],
[
"Fergus",
"Rob",
""
],
[
"Bourdev",
"Lubomir",
""
]
] | TITLE: Beyond Frontal Faces: Improving Person Recognition Using Multiple Cues
ABSTRACT: We explore the task of recognizing peoples' identities in photo albums in an
unconstrained setting. To facilitate this, we introduce the new People In Photo
Albums (PIPA) dataset, consisting of over 60000 instances of 2000 individuals
collected from public Flickr photo albums. With only about half of the person
images containing a frontal face, the recognition task is very challenging due
to the large variations in pose, clothing, camera viewpoint, image resolution
and illumination. We propose the Pose Invariant PErson Recognition (PIPER)
method, which accumulates the cues of poselet-level person recognizers trained
by deep convolutional networks to discount for the pose variations, combined
with a face recognizer and a global recognizer. Experiments on three different
settings confirm that in our unconstrained setup PIPER significantly improves
on the performance of DeepFace, which is one of the best face recognizers as
measured on the LFW dataset.
| new_dataset | 0.958654 |
1501.07716 | Dominik Kowald | Paul Seitlinger, Dominik Kowald, Simone Kopeinik, Ilire
Hasani-Mavriqi, Tobias Ley, Elisabeth Lex | Attention Please! A Hybrid Resource Recommender Mimicking
Attention-Interpretation Dynamics | Submitted to WWW'15 WebScience Track | null | null | null | cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Classic resource recommenders like Collaborative Filtering (CF) treat users
as being just another entity, neglecting non-linear user-resource dynamics
shaping attention and interpretation. In this paper, we propose a novel hybrid
recommendation strategy that refines CF by capturing these dynamics. The
evaluation results reveal that our approach substantially improves CF and,
depending on the dataset, successfully competes with a computationally much
more expensive Matrix Factorization variant.
| [
{
"version": "v1",
"created": "Fri, 30 Jan 2015 09:55:24 GMT"
}
] | 2015-02-02T00:00:00 | [
[
"Seitlinger",
"Paul",
""
],
[
"Kowald",
"Dominik",
""
],
[
"Kopeinik",
"Simone",
""
],
[
"Hasani-Mavriqi",
"Ilire",
""
],
[
"Ley",
"Tobias",
""
],
[
"Lex",
"Elisabeth",
""
]
] | TITLE: Attention Please! A Hybrid Resource Recommender Mimicking
Attention-Interpretation Dynamics
ABSTRACT: Classic resource recommenders like Collaborative Filtering (CF) treat users
as being just another entity, neglecting non-linear user-resource dynamics
shaping attention and interpretation. In this paper, we propose a novel hybrid
recommendation strategy that refines CF by capturing these dynamics. The
evaluation results reveal that our approach substantially improves CF and,
depending on the dataset, successfully competes with a computationally much
more expensive Matrix Factorization variant.
| no_new_dataset | 0.947672 |
1408.1987 | Hong Xing | Hong Xing, Liang Liu, Rui Zhang | Secrecy Wireless Information and Power Transfer in Fading Wiretap
Channel | to appear in IEEE Transactions on Vehicular Technology | null | 10.1109/TVT.2015.2395725 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Simultaneous wireless information and power transfer (SWIPT) has recently
drawn significant interests for its dual use of radio signals to provide
wireless data and energy access at the same time. However, a challenging
secrecy communication issue arises as the messages sent to the information
receivers (IRs) may be eavesdropped by the energy receivers (ERs), which are
presumed to harvest energy only from the received signals. To tackle this
problem, we propose in this paper an artificial noise (AN) aided transmission
scheme to facilitate the secrecy information transmission to IRs and yet meet
the energy harvesting requirement for ERs, under the assumption that the AN can
be cancelled at IRs but not at ERs. Specifically, the proposed scheme splits
the transmit power into two parts, to send the confidential message to the IR
and an AN to interfere with the ER, respectively. Under a simplified three-node
wiretap channel setup, the transmit power allocations and power splitting
ratios over fading channels are jointly optimized to minimize the outage
probability for delay-limited secrecy information transmission, or to maximize
the average rate for no-delay-limited secrecy information transmission, subject
to a combination of average and peak power constraints at the transmitter as
well as an average energy harvesting constraint at the ER. Both the secrecy
outage probability minimization and average rate maximization problems are
shown to be non-convex, for each of which we propose the optimal solution based
on the dual decomposition as well as suboptimal solution based on the
alternating optimization. Furthermore, two benchmark schemes are introduced for
comparison. Finally, the performances of proposed schemes are evaluated by
simulations in terms of various trade-offs for wireless (secrecy) information
versus energy transmissions.
| [
{
"version": "v1",
"created": "Fri, 8 Aug 2014 21:27:46 GMT"
},
{
"version": "v2",
"created": "Wed, 28 Jan 2015 23:40:41 GMT"
}
] | 2015-01-30T00:00:00 | [
[
"Xing",
"Hong",
""
],
[
"Liu",
"Liang",
""
],
[
"Zhang",
"Rui",
""
]
] | TITLE: Secrecy Wireless Information and Power Transfer in Fading Wiretap
Channel
ABSTRACT: Simultaneous wireless information and power transfer (SWIPT) has recently
drawn significant interests for its dual use of radio signals to provide
wireless data and energy access at the same time. However, a challenging
secrecy communication issue arises as the messages sent to the information
receivers (IRs) may be eavesdropped by the energy receivers (ERs), which are
presumed to harvest energy only from the received signals. To tackle this
problem, we propose in this paper an artificial noise (AN) aided transmission
scheme to facilitate the secrecy information transmission to IRs and yet meet
the energy harvesting requirement for ERs, under the assumption that the AN can
be cancelled at IRs but not at ERs. Specifically, the proposed scheme splits
the transmit power into two parts, to send the confidential message to the IR
and an AN to interfere with the ER, respectively. Under a simplified three-node
wiretap channel setup, the transmit power allocations and power splitting
ratios over fading channels are jointly optimized to minimize the outage
probability for delay-limited secrecy information transmission, or to maximize
the average rate for no-delay-limited secrecy information transmission, subject
to a combination of average and peak power constraints at the transmitter as
well as an average energy harvesting constraint at the ER. Both the secrecy
outage probability minimization and average rate maximization problems are
shown to be non-convex, for each of which we propose the optimal solution based
on the dual decomposition as well as suboptimal solution based on the
alternating optimization. Furthermore, two benchmark schemes are introduced for
comparison. Finally, the performances of proposed schemes are evaluated by
simulations in terms of various trade-offs for wireless (secrecy) information
versus energy transmissions.
| no_new_dataset | 0.953535 |
1501.07250 | Alejandro Torre\~no | Alejandro Torre\~no, Eva Onaindia, \'Oscar Sapena | FMAP: Distributed Cooperative Multi-Agent Planning | 21 pages, 11 figures | Applied Intelligence, Volume 41, Issue 2, pp. 606-626, Year 2014 | 10.1007/s10489-014-0540-2 | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper proposes FMAP (Forward Multi-Agent Planning), a fully-distributed
multi-agent planning method that integrates planning and coordination. Although
FMAP is specifically aimed at solving problems that require cooperation among
agents, the flexibility of the domain-independent planning model allows FMAP to
tackle multi-agent planning tasks of any type. In FMAP, agents jointly explore
the plan space by building up refinement plans through a complete and flexible
forward-chaining partial-order planner. The search is guided by $h_{DTG}$, a
novel heuristic function that is based on the concepts of Domain Transition
Graph and frontier state and is optimized to evaluate plans in distributed
environments. Agents in FMAP apply an advanced privacy model that allows them
to adequately keep private information while communicating only the data of the
refinement plans that is relevant to each of the participating agents.
Experimental results show that FMAP is a general-purpose approach that
efficiently solves tightly-coupled domains that have specialized agents and
cooperative goals as well as loosely-coupled problems. Specifically, the
empirical evaluation shows that FMAP outperforms current MAP systems at solving
complex planning tasks that are adapted from the International Planning
Competition benchmarks.
| [
{
"version": "v1",
"created": "Wed, 28 Jan 2015 19:38:35 GMT"
}
] | 2015-01-30T00:00:00 | [
[
"Torreño",
"Alejandro",
""
],
[
"Onaindia",
"Eva",
""
],
[
"Sapena",
"Óscar",
""
]
] | TITLE: FMAP: Distributed Cooperative Multi-Agent Planning
ABSTRACT: This paper proposes FMAP (Forward Multi-Agent Planning), a fully-distributed
multi-agent planning method that integrates planning and coordination. Although
FMAP is specifically aimed at solving problems that require cooperation among
agents, the flexibility of the domain-independent planning model allows FMAP to
tackle multi-agent planning tasks of any type. In FMAP, agents jointly explore
the plan space by building up refinement plans through a complete and flexible
forward-chaining partial-order planner. The search is guided by $h_{DTG}$, a
novel heuristic function that is based on the concepts of Domain Transition
Graph and frontier state and is optimized to evaluate plans in distributed
environments. Agents in FMAP apply an advanced privacy model that allows them
to adequately keep private information while communicating only the data of the
refinement plans that is relevant to each of the participating agents.
Experimental results show that FMAP is a general-purpose approach that
efficiently solves tightly-coupled domains that have specialized agents and
cooperative goals as well as loosely-coupled problems. Specifically, the
empirical evaluation shows that FMAP outperforms current MAP systems at solving
complex planning tasks that are adapted from the International Planning
Competition benchmarks.
| no_new_dataset | 0.944382 |
1501.07304 | Miriam Redi | Miriam Redi, Nikhil Rasiwasia, Gaurav Aggarwal, Alejandro Jaimes | The Beauty of Capturing Faces: Rating the Quality of Digital Portraits | FG 2015, 8 pages | null | null | null | cs.CV cs.CY cs.MM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Digital portrait photographs are everywhere, and while the number of face
pictures keeps growing, not much work has been done to on automatic portrait
beauty assessment. In this paper, we design a specific framework to
automatically evaluate the beauty of digital portraits. To this end, we procure
a large dataset of face images annotated not only with aesthetic scores but
also with information about the traits of the subject portrayed. We design a
set of visual features based on portrait photography literature, and
extensively analyze their relation with portrait beauty, exposing interesting
findings about what makes a portrait beautiful. We find that the beauty of a
portrait is linked to its artistic value, and independent from age, race and
gender of the subject. We also show that a classifier trained with our features
to separate beautiful portraits from non-beautiful portraits outperforms
generic aesthetic classifiers.
| [
{
"version": "v1",
"created": "Wed, 28 Jan 2015 22:51:23 GMT"
}
] | 2015-01-30T00:00:00 | [
[
"Redi",
"Miriam",
""
],
[
"Rasiwasia",
"Nikhil",
""
],
[
"Aggarwal",
"Gaurav",
""
],
[
"Jaimes",
"Alejandro",
""
]
] | TITLE: The Beauty of Capturing Faces: Rating the Quality of Digital Portraits
ABSTRACT: Digital portrait photographs are everywhere, and while the number of face
pictures keeps growing, not much work has been done to on automatic portrait
beauty assessment. In this paper, we design a specific framework to
automatically evaluate the beauty of digital portraits. To this end, we procure
a large dataset of face images annotated not only with aesthetic scores but
also with information about the traits of the subject portrayed. We design a
set of visual features based on portrait photography literature, and
extensively analyze their relation with portrait beauty, exposing interesting
findings about what makes a portrait beautiful. We find that the beauty of a
portrait is linked to its artistic value, and independent from age, race and
gender of the subject. We also show that a classifier trained with our features
to separate beautiful portraits from non-beautiful portraits outperforms
generic aesthetic classifiers.
| new_dataset | 0.956836 |
1501.07323 | Peng Wang | Peng Wang, Guoqiang Mao, Zihuai Lin, Ming Ding, Weifa Liang, Xiaohu
Ge, and Zhiyun Lin | Performance Analysis of Raptor Codes under Maximum-Likelihood (ML)
Decoding | 28 pages and 5 figures | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Raptor codes have been widely used in many multimedia broadcast/multicast
applications. However, our understanding of Raptor codes is still incomplete
due to the insufficient amount of theoretical work on the performance analysis
of Raptor codes, particularly under maximum-likelihood (ML) decoding, which
provides an optimal benchmark on the system performance for the other decoding
schemes to compare against. For the first time, this paper provides an upper
bound and a lower bound, on the packet error performance of Raptor codes under
ML decoding, which is measured by the probability that all source packets can
be successfully decoded by a receiver with a given number of successfully
received coded packets. Simulations are conducted to validate the accuracy of
the analysis. More specifically, Raptor codes with different degree
distribution and pre-coders, are evaluated using the derived bounds with high
accuracy.
| [
{
"version": "v1",
"created": "Thu, 29 Jan 2015 01:16:46 GMT"
}
] | 2015-01-30T00:00:00 | [
[
"Wang",
"Peng",
""
],
[
"Mao",
"Guoqiang",
""
],
[
"Lin",
"Zihuai",
""
],
[
"Ding",
"Ming",
""
],
[
"Liang",
"Weifa",
""
],
[
"Ge",
"Xiaohu",
""
],
[
"Lin",
"Zhiyun",
""
]
] | TITLE: Performance Analysis of Raptor Codes under Maximum-Likelihood (ML)
Decoding
ABSTRACT: Raptor codes have been widely used in many multimedia broadcast/multicast
applications. However, our understanding of Raptor codes is still incomplete
due to the insufficient amount of theoretical work on the performance analysis
of Raptor codes, particularly under maximum-likelihood (ML) decoding, which
provides an optimal benchmark on the system performance for the other decoding
schemes to compare against. For the first time, this paper provides an upper
bound and a lower bound, on the packet error performance of Raptor codes under
ML decoding, which is measured by the probability that all source packets can
be successfully decoded by a receiver with a given number of successfully
received coded packets. Simulations are conducted to validate the accuracy of
the analysis. More specifically, Raptor codes with different degree
distribution and pre-coders, are evaluated using the derived bounds with high
accuracy.
| no_new_dataset | 0.948346 |
1501.07420 | Smruti Ranjan Sarangi | Smruti R. Sarangi, Rajshekar Kalayappan, Prathmesh Kallurkar, Seep
Goel | Tejas Simulator : Validation against Hardware | 3 pages, 2 figures | null | null | null | cs.AR | http://creativecommons.org/licenses/by-nc-sa/3.0/ | In this report we show results that validate the Tejas architectural
simulator against native hardware. We report mean error rates of 11.45% and
18.77% for the SPEC2006 and Splash2 benchmark suites respectively. These error
rates are competitive and in most cases better than the numbers reported by
other contemporary simulators.
| [
{
"version": "v1",
"created": "Thu, 29 Jan 2015 11:44:47 GMT"
}
] | 2015-01-30T00:00:00 | [
[
"Sarangi",
"Smruti R.",
""
],
[
"Kalayappan",
"Rajshekar",
""
],
[
"Kallurkar",
"Prathmesh",
""
],
[
"Goel",
"Seep",
""
]
] | TITLE: Tejas Simulator : Validation against Hardware
ABSTRACT: In this report we show results that validate the Tejas architectural
simulator against native hardware. We report mean error rates of 11.45% and
18.77% for the SPEC2006 and Splash2 benchmark suites respectively. These error
rates are competitive and in most cases better than the numbers reported by
other contemporary simulators.
| no_new_dataset | 0.956227 |
1501.07467 | Hamed Zamani | Hamed Zamani, Azadeh Shakery, Pooya Moradi | Regression and Learning to Rank Aggregation for User Engagement
Evaluation | In Proceedings of the 2014 ACM Recommender Systems Challenge,
RecSysChallenge '14 | null | 10.1145/2668067.2668077 | null | cs.IR cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | User engagement refers to the amount of interaction an instance (e.g., tweet,
news, and forum post) achieves. Ranking the items in social media websites
based on the amount of user participation in them, can be used in different
applications, such as recommender systems. In this paper, we consider a tweet
containing a rating for a movie as an instance and focus on ranking the
instances of each user based on their engagement, i.e., the total number of
retweets and favorites it will gain.
For this task, we define several features which can be extracted from the
meta-data of each tweet. The features are partitioned into three categories:
user-based, movie-based, and tweet-based. We show that in order to obtain good
results, features from all categories should be considered. We exploit
regression and learning to rank methods to rank the tweets and propose to
aggregate the results of regression and learning to rank methods to achieve
better performance. We have run our experiments on an extended version of
MovieTweeting dataset provided by ACM RecSys Challenge 2014. The results show
that learning to rank approach outperforms most of the regression models and
the combination can improve the performance significantly.
| [
{
"version": "v1",
"created": "Thu, 29 Jan 2015 14:54:12 GMT"
}
] | 2015-01-30T00:00:00 | [
[
"Zamani",
"Hamed",
""
],
[
"Shakery",
"Azadeh",
""
],
[
"Moradi",
"Pooya",
""
]
] | TITLE: Regression and Learning to Rank Aggregation for User Engagement
Evaluation
ABSTRACT: User engagement refers to the amount of interaction an instance (e.g., tweet,
news, and forum post) achieves. Ranking the items in social media websites
based on the amount of user participation in them, can be used in different
applications, such as recommender systems. In this paper, we consider a tweet
containing a rating for a movie as an instance and focus on ranking the
instances of each user based on their engagement, i.e., the total number of
retweets and favorites it will gain.
For this task, we define several features which can be extracted from the
meta-data of each tweet. The features are partitioned into three categories:
user-based, movie-based, and tweet-based. We show that in order to obtain good
results, features from all categories should be considered. We exploit
regression and learning to rank methods to rank the tweets and propose to
aggregate the results of regression and learning to rank methods to achieve
better performance. We have run our experiments on an extended version of
MovieTweeting dataset provided by ACM RecSys Challenge 2014. The results show
that learning to rank approach outperforms most of the regression models and
the combination can improve the performance significantly.
| no_new_dataset | 0.944228 |
1501.05382 | Wenjuan Gong | Wenjuan Gong and Yongzhen Huang and Jordi Gonzalez and and Liang Wang | Enhanced Mixtures of Part Model for Human Pose Estimation | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Mixture of parts model has been successfully applied to 2D human pose
estimation problem either as explicitly trained body part model or as latent
variables for the whole human body model. Mixture of parts model usually
utilize tree structure for representing relations between body parts. Tree
structures facilitate training and referencing of the model but could not deal
with double counting problems, which hinder its applications in 3D pose
estimation. While most of work targeted to solve these problems tend to modify
the tree models or the optimization target. We incorporate other cues from
input features. For example, in surveillance environments, human silhouettes
can be extracted relative easily although not flawlessly. In this condition, we
can combine extracted human blobs with histogram of gradient feature, which is
commonly used in mixture of parts model for training body part templates. The
method can be easily extend to other candidate features under our generalized
framework. We show 2D body part detection results on a public available
dataset: HumanEva dataset. Furthermore, a 2D to 3D pose estimator is trained
with Gaussian process regression model and 2D body part detections from the
proposed method is fed to the estimator, thus 3D poses are predictable given
new 2D body part detections. We also show results of 3D pose estimation on
HumanEva dataset.
| [
{
"version": "v1",
"created": "Thu, 22 Jan 2015 03:54:15 GMT"
},
{
"version": "v2",
"created": "Wed, 28 Jan 2015 08:16:55 GMT"
}
] | 2015-01-29T00:00:00 | [
[
"Gong",
"Wenjuan",
""
],
[
"Huang",
"Yongzhen",
""
],
[
"Gonzalez",
"Jordi",
""
],
[
"Wang",
"and Liang",
""
]
] | TITLE: Enhanced Mixtures of Part Model for Human Pose Estimation
ABSTRACT: Mixture of parts model has been successfully applied to 2D human pose
estimation problem either as explicitly trained body part model or as latent
variables for the whole human body model. Mixture of parts model usually
utilize tree structure for representing relations between body parts. Tree
structures facilitate training and referencing of the model but could not deal
with double counting problems, which hinder its applications in 3D pose
estimation. While most of work targeted to solve these problems tend to modify
the tree models or the optimization target. We incorporate other cues from
input features. For example, in surveillance environments, human silhouettes
can be extracted relative easily although not flawlessly. In this condition, we
can combine extracted human blobs with histogram of gradient feature, which is
commonly used in mixture of parts model for training body part templates. The
method can be easily extend to other candidate features under our generalized
framework. We show 2D body part detection results on a public available
dataset: HumanEva dataset. Furthermore, a 2D to 3D pose estimator is trained
with Gaussian process regression model and 2D body part detections from the
proposed method is fed to the estimator, thus 3D poses are predictable given
new 2D body part detections. We also show results of 3D pose estimation on
HumanEva dataset.
| no_new_dataset | 0.946399 |
1501.06993 | Youjie Zhou | Youjie Zhou and Hongkai Yu and Song Wang | Feature Sampling Strategies for Action Recognition | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Although dense local spatial-temporal features with bag-of-features
representation achieve state-of-the-art performance for action recognition, the
huge feature number and feature size prevent current methods from scaling up to
real size problems. In this work, we investigate different types of feature
sampling strategies for action recognition, namely dense sampling, uniformly
random sampling and selective sampling. We propose two effective selective
sampling methods using object proposal techniques. Experiments conducted on a
large video dataset show that we are able to achieve better average recognition
accuracy using 25% less features, through one of proposed selective sampling
methods, and even remain comparable accuracy while discarding 70% features.
| [
{
"version": "v1",
"created": "Wed, 28 Jan 2015 05:41:07 GMT"
}
] | 2015-01-29T00:00:00 | [
[
"Zhou",
"Youjie",
""
],
[
"Yu",
"Hongkai",
""
],
[
"Wang",
"Song",
""
]
] | TITLE: Feature Sampling Strategies for Action Recognition
ABSTRACT: Although dense local spatial-temporal features with bag-of-features
representation achieve state-of-the-art performance for action recognition, the
huge feature number and feature size prevent current methods from scaling up to
real size problems. In this work, we investigate different types of feature
sampling strategies for action recognition, namely dense sampling, uniformly
random sampling and selective sampling. We propose two effective selective
sampling methods using object proposal techniques. Experiments conducted on a
large video dataset show that we are able to achieve better average recognition
accuracy using 25% less features, through one of proposed selective sampling
methods, and even remain comparable accuracy while discarding 70% features.
| no_new_dataset | 0.948537 |
1501.07020 | Alireza Khoshkbarforoushha | Alireza Khoshkbarforoushha, Rajiv Ranjan, Raj Gaire, Prem P.
Jayaraman, John Hosking, Ehsan Abbasnejad | Resource Usage Estimation of Data Stream Processing Workloads in
Datacenter Clouds | Working Paper | null | null | null | cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Real-time computation of data streams over affordable virtualized
infrastructure resources is an important form of data in motion processing
architecture. However, processing such data streams while ensuring strict
guarantees on quality of services is problematic due to: (i) uncertain stream
arrival pattern; (ii) need of processing different types of continuous queries;
and (iii) variable resource consumption behavior of continuous queries. Recent
work has explored the use of statistical techniques for resource estimation of
SQL queries and OLTP workloads. All these techniques approximate resource usage
for each query as a single point value. However, in data stream processing
workloads in which data flows through the graph of operators endlessly and
poses performance and resource demand fluctuations, the single point resource
estimation is inadequate. Because it is neither expressive enough nor does it
capture the multi-modal nature of the target data. To this end, we present a
novel technique which uses mixture density networks, a combined structure of
neural networks and mixture models, to estimate the whole spectrum of resource
usage as probability density functions. The proposed approach is a flexible and
convenient means of modeling unknown distribution models. We have validated the
models using both the linear road benchmark and the TPC-H, observing high
accuracy under a number of error metrics: mean-square error, continuous ranked
probability score, and negative log predictive density.
| [
{
"version": "v1",
"created": "Wed, 28 Jan 2015 08:11:10 GMT"
}
] | 2015-01-29T00:00:00 | [
[
"Khoshkbarforoushha",
"Alireza",
""
],
[
"Ranjan",
"Rajiv",
""
],
[
"Gaire",
"Raj",
""
],
[
"Jayaraman",
"Prem P.",
""
],
[
"Hosking",
"John",
""
],
[
"Abbasnejad",
"Ehsan",
""
]
] | TITLE: Resource Usage Estimation of Data Stream Processing Workloads in
Datacenter Clouds
ABSTRACT: Real-time computation of data streams over affordable virtualized
infrastructure resources is an important form of data in motion processing
architecture. However, processing such data streams while ensuring strict
guarantees on quality of services is problematic due to: (i) uncertain stream
arrival pattern; (ii) need of processing different types of continuous queries;
and (iii) variable resource consumption behavior of continuous queries. Recent
work has explored the use of statistical techniques for resource estimation of
SQL queries and OLTP workloads. All these techniques approximate resource usage
for each query as a single point value. However, in data stream processing
workloads in which data flows through the graph of operators endlessly and
poses performance and resource demand fluctuations, the single point resource
estimation is inadequate. Because it is neither expressive enough nor does it
capture the multi-modal nature of the target data. To this end, we present a
novel technique which uses mixture density networks, a combined structure of
neural networks and mixture models, to estimate the whole spectrum of resource
usage as probability density functions. The proposed approach is a flexible and
convenient means of modeling unknown distribution models. We have validated the
models using both the linear road benchmark and the TPC-H, observing high
accuracy under a number of error metrics: mean-square error, continuous ranked
probability score, and negative log predictive density.
| no_new_dataset | 0.943815 |
1501.07184 | Zehra Meral Ozsoyoglu | Shi Qiao, Z. Meral Ozsoyoglu | One Size Does not Fit All: When to Use Signature-based Pruning to
Improve Template Matching for RDF graphs | null | null | null | null | cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Signature-based pruning is broadly accepted as an effective way to improve
query performance of graph template matching on general labeled graphs. Most
existing techniques which utilize signature-based pruning claim its benefits on
all datasets and queries. However, the effectiveness of signature-based pruning
varies greatly among different RDF datasets and highly related with their
dataset characteristics. We observe that the performance benefits from
signature-based pruning depend not only on the size of the RDF graphs, but also
the underlying graph structure and the complexity of queries. This motivates us
to propose a flexible RDF querying framework, called RDF-h, which selectively
utilizes signature-based pruning by evaluating the characteristics of RDF
datasets and query templates. Scalability and efficiency of RDF-h is
demonstrated in experimental results using both real and synthetic datasets.
Keywords: RDF, Graph Template Matching, Signature-based Pruning
| [
{
"version": "v1",
"created": "Wed, 28 Jan 2015 16:49:18 GMT"
}
] | 2015-01-29T00:00:00 | [
[
"Qiao",
"Shi",
""
],
[
"Ozsoyoglu",
"Z. Meral",
""
]
] | TITLE: One Size Does not Fit All: When to Use Signature-based Pruning to
Improve Template Matching for RDF graphs
ABSTRACT: Signature-based pruning is broadly accepted as an effective way to improve
query performance of graph template matching on general labeled graphs. Most
existing techniques which utilize signature-based pruning claim its benefits on
all datasets and queries. However, the effectiveness of signature-based pruning
varies greatly among different RDF datasets and highly related with their
dataset characteristics. We observe that the performance benefits from
signature-based pruning depend not only on the size of the RDF graphs, but also
the underlying graph structure and the complexity of queries. This motivates us
to propose a flexible RDF querying framework, called RDF-h, which selectively
utilizes signature-based pruning by evaluating the characteristics of RDF
datasets and query templates. Scalability and efficiency of RDF-h is
demonstrated in experimental results using both real and synthetic datasets.
Keywords: RDF, Graph Template Matching, Signature-based Pruning
| no_new_dataset | 0.94887 |
1501.07203 | Walter Quattrociocchi | Michela Del Vicario, Qian Zhang, Alessandro Bessi, Fabiana Zollo,
Antonio Scala, Guido Caldarelli, Walter Quattrociocchi | Structural Patterns of the Occupy Movement on Facebook | null | null | null | null | cs.SI cs.HC physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this work we study a peculiar example of social organization on Facebook:
the Occupy Movement -- i.e., an international protest movement against social
and economic inequality organized online at a city level. We consider 179 US
Facebook public pages during the time period between September 2011 and
February 2013. The dataset includes 618K active users and 753K posts that
received about 5.2M likes and 1.1M comments. By labeling user according to
their interaction patterns on pages -- e.g., a user is considered to be
polarized if she has at least the 95% of her likes on a specific page -- we
find that activities are not locally coordinated by geographically close pages,
but are driven by pages linked to major US cities that act as hubs within the
various groups. Such a pattern is verified even by extracting the backbone
structure -- i.e., filtering statistically relevant weight heterogeneities --
for both the pages-reshares and the pages-common users networks.
| [
{
"version": "v1",
"created": "Wed, 28 Jan 2015 17:23:59 GMT"
}
] | 2015-01-29T00:00:00 | [
[
"Del Vicario",
"Michela",
""
],
[
"Zhang",
"Qian",
""
],
[
"Bessi",
"Alessandro",
""
],
[
"Zollo",
"Fabiana",
""
],
[
"Scala",
"Antonio",
""
],
[
"Caldarelli",
"Guido",
""
],
[
"Quattrociocchi",
"Walter",
""
]
] | TITLE: Structural Patterns of the Occupy Movement on Facebook
ABSTRACT: In this work we study a peculiar example of social organization on Facebook:
the Occupy Movement -- i.e., an international protest movement against social
and economic inequality organized online at a city level. We consider 179 US
Facebook public pages during the time period between September 2011 and
February 2013. The dataset includes 618K active users and 753K posts that
received about 5.2M likes and 1.1M comments. By labeling user according to
their interaction patterns on pages -- e.g., a user is considered to be
polarized if she has at least the 95% of her likes on a specific page -- we
find that activities are not locally coordinated by geographically close pages,
but are driven by pages linked to major US cities that act as hubs within the
various groups. Such a pattern is verified even by extracting the backbone
structure -- i.e., filtering statistically relevant weight heterogeneities --
for both the pages-reshares and the pages-common users networks.
| no_new_dataset | 0.855127 |
1409.2080 | Pierre Bellec | P. Bellec and Y. Benhajali and F. Carbonell and C. Dansereau and G.
Albouy and M. Pelland and C. Craddock and O. Collignon and J. Doyon and E.
Stip and P. Orban | Multiscale statistical testing for connectome-wide association studies
in fMRI | 54 pages, 12 main figures, 1 main table, 10 supplementary figures, 1
supplementary table | null | null | null | q-bio.QM cs.CV stat.AP | http://creativecommons.org/licenses/by/3.0/ | Alterations in brain connectivity have been associated with a variety of
clinical disorders using functional magnetic resonance imaging (fMRI). We
investigated empirically how the number of brain parcels (or scale) impacted
the results of a mass univariate general linear model (GLM) on connectomes. The
brain parcels used as nodes in the connectome analysis were functionnally
defined by a group cluster analysis. We first validated that a classic
Benjamini-Hochberg procedure with parametric GLM tests did control
appropriately the false-discovery rate (FDR) at a given scale. We then observed
on realistic simulations that there was no substantial inflation of the FDR
across scales, as long as the FDR was controlled independently within each
scale, and the presence of true associations could be established using an
omnibus permutation test combining all scales. Second, we observed both on
simulations and on three real resting-state fMRI datasets (schizophrenia,
congenital blindness, motor practice) that the rate of discovery varied
markedly as a function of scales, and was relatively higher for low scales,
below 25. Despite the differences in discovery rate, the statistical maps
derived at different scales were generally very consistent in the three real
datasets. Some seeds still showed effects better observed around 50,
illustrating the potential benefits of multiscale analysis. On real data, the
statistical maps agreed well with the existing literature. Overall, our results
support that the multiscale GLM connectome analysis with FDR is statistically
valid and can capture biologically meaningful effects in a variety of
experimental conditions.
| [
{
"version": "v1",
"created": "Sun, 7 Sep 2014 04:07:22 GMT"
},
{
"version": "v2",
"created": "Mon, 26 Jan 2015 21:00:45 GMT"
}
] | 2015-01-28T00:00:00 | [
[
"Bellec",
"P.",
""
],
[
"Benhajali",
"Y.",
""
],
[
"Carbonell",
"F.",
""
],
[
"Dansereau",
"C.",
""
],
[
"Albouy",
"G.",
""
],
[
"Pelland",
"M.",
""
],
[
"Craddock",
"C.",
""
],
[
"Collignon",
"O.",
""
],
[
"Doyon",
"J.",
""
],
[
"Stip",
"E.",
""
],
[
"Orban",
"P.",
""
]
] | TITLE: Multiscale statistical testing for connectome-wide association studies
in fMRI
ABSTRACT: Alterations in brain connectivity have been associated with a variety of
clinical disorders using functional magnetic resonance imaging (fMRI). We
investigated empirically how the number of brain parcels (or scale) impacted
the results of a mass univariate general linear model (GLM) on connectomes. The
brain parcels used as nodes in the connectome analysis were functionnally
defined by a group cluster analysis. We first validated that a classic
Benjamini-Hochberg procedure with parametric GLM tests did control
appropriately the false-discovery rate (FDR) at a given scale. We then observed
on realistic simulations that there was no substantial inflation of the FDR
across scales, as long as the FDR was controlled independently within each
scale, and the presence of true associations could be established using an
omnibus permutation test combining all scales. Second, we observed both on
simulations and on three real resting-state fMRI datasets (schizophrenia,
congenital blindness, motor practice) that the rate of discovery varied
markedly as a function of scales, and was relatively higher for low scales,
below 25. Despite the differences in discovery rate, the statistical maps
derived at different scales were generally very consistent in the three real
datasets. Some seeds still showed effects better observed around 50,
illustrating the potential benefits of multiscale analysis. On real data, the
statistical maps agreed well with the existing literature. Overall, our results
support that the multiscale GLM connectome analysis with FDR is statistically
valid and can capture biologically meaningful effects in a variety of
experimental conditions.
| no_new_dataset | 0.951594 |
1412.3409 | Christopher Clark | Christopher Clark and Amos Storkey | Teaching Deep Convolutional Neural Networks to Play Go | 9 pages, 8 figures, 5 tables. Corrected typos, minor adjustment to
table format | null | null | null | cs.AI cs.LG cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Mastering the game of Go has remained a long standing challenge to the field
of AI. Modern computer Go systems rely on processing millions of possible
future positions to play well, but intuitively a stronger and more 'humanlike'
way to play the game would be to rely on pattern recognition abilities rather
then brute force computation. Following this sentiment, we train deep
convolutional neural networks to play Go by training them to predict the moves
made by expert Go players. To solve this problem we introduce a number of novel
techniques, including a method of tying weights in the network to 'hard code'
symmetries that are expect to exist in the target function, and demonstrate in
an ablation study they considerably improve performance. Our final networks are
able to achieve move prediction accuracies of 41.1% and 44.4% on two different
Go datasets, surpassing previous state of the art on this task by significant
margins. Additionally, while previous move prediction programs have not yielded
strong Go playing programs, we show that the networks trained in this work
acquired high levels of skill. Our convolutional neural networks can
consistently defeat the well known Go program GNU Go, indicating it is state of
the art among programs that do not use Monte Carlo Tree Search. It is also able
to win some games against state of the art Go playing program Fuego while using
a fraction of the play time. This success at playing Go indicates high level
principles of the game were learned.
| [
{
"version": "v1",
"created": "Wed, 10 Dec 2014 18:59:43 GMT"
},
{
"version": "v2",
"created": "Tue, 27 Jan 2015 10:31:31 GMT"
}
] | 2015-01-28T00:00:00 | [
[
"Clark",
"Christopher",
""
],
[
"Storkey",
"Amos",
""
]
] | TITLE: Teaching Deep Convolutional Neural Networks to Play Go
ABSTRACT: Mastering the game of Go has remained a long standing challenge to the field
of AI. Modern computer Go systems rely on processing millions of possible
future positions to play well, but intuitively a stronger and more 'humanlike'
way to play the game would be to rely on pattern recognition abilities rather
then brute force computation. Following this sentiment, we train deep
convolutional neural networks to play Go by training them to predict the moves
made by expert Go players. To solve this problem we introduce a number of novel
techniques, including a method of tying weights in the network to 'hard code'
symmetries that are expect to exist in the target function, and demonstrate in
an ablation study they considerably improve performance. Our final networks are
able to achieve move prediction accuracies of 41.1% and 44.4% on two different
Go datasets, surpassing previous state of the art on this task by significant
margins. Additionally, while previous move prediction programs have not yielded
strong Go playing programs, we show that the networks trained in this work
acquired high levels of skill. Our convolutional neural networks can
consistently defeat the well known Go program GNU Go, indicating it is state of
the art among programs that do not use Monte Carlo Tree Search. It is also able
to win some games against state of the art Go playing program Fuego while using
a fraction of the play time. This success at playing Go indicates high level
principles of the game were learned.
| no_new_dataset | 0.942929 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.