id
large_string | submitter
large_string | authors
large_string | title
large_string | comments
large_string | journal-ref
large_string | doi
large_string | report-no
large_string | categories
large_string | license
large_string | abstract
large_string | versions
large list | update_date
timestamp[ms] | authors_parsed
large list | prompt
large_string |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1501.00436 | Sebasti\'an Basterrech | Sebasti\'an Basterrech and Enrique Alba and V\'aclav Sn\'a\v{s}el | An Experimental Analysis of the Echo State Network Initialization Using
the Particle Swarm Optimization | IEEE Sixth World Congress on Nature and Biologically Inspired
Computing (NaBIC2014), Porto, Portugal, July 30-August 1, 2014 | null | null | null | cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This article introduces a robust hybrid method for solving supervised
learning tasks, which uses the Echo State Network (ESN) model and the Particle
Swarm Optimization (PSO) algorithm. An ESN is a Recurrent Neural Network with
the hidden-hidden weights fixed in the learning process. The recurrent part of
the network stores the input information in internal states of the network.
Another structure forms a free-memory method used as supervised learning tool.
The setting procedure for initializing the recurrent structure of the ESN model
can impact on the model performance. On the other hand, the PSO has been shown
to be a successful technique for finding optimal points in complex spaces.
Here, we present an approach to use the PSO for finding some initial
hidden-hidden weights of the ESN model. We present empirical results that
compare the canonical ESN model with this hybrid method on a wide range of
benchmark problems.
| [
{
"version": "v1",
"created": "Fri, 2 Jan 2015 16:49:29 GMT"
}
] | 2015-01-05T00:00:00 | [
[
"Basterrech",
"Sebastián",
""
],
[
"Alba",
"Enrique",
""
],
[
"Snášel",
"Václav",
""
]
] | TITLE: An Experimental Analysis of the Echo State Network Initialization Using
the Particle Swarm Optimization
ABSTRACT: This article introduces a robust hybrid method for solving supervised
learning tasks, which uses the Echo State Network (ESN) model and the Particle
Swarm Optimization (PSO) algorithm. An ESN is a Recurrent Neural Network with
the hidden-hidden weights fixed in the learning process. The recurrent part of
the network stores the input information in internal states of the network.
Another structure forms a free-memory method used as supervised learning tool.
The setting procedure for initializing the recurrent structure of the ESN model
can impact on the model performance. On the other hand, the PSO has been shown
to be a successful technique for finding optimal points in complex spaces.
Here, we present an approach to use the PSO for finding some initial
hidden-hidden weights of the ESN model. We present empirical results that
compare the canonical ESN model with this hybrid method on a wide range of
benchmark problems.
|
1407.6251 | Philip Lenz | Philip Lenz, Andreas Geiger, Raquel Urtasun | FollowMe: Efficient Online Min-Cost Flow Tracking with Bounded Memory
and Computation | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | One of the most popular approaches to multi-target tracking is
tracking-by-detection. Current min-cost flow algorithms which solve the data
association problem optimally have three main drawbacks: they are
computationally expensive, they assume that the whole video is given as a
batch, and they scale badly in memory and computation with the length of the
video sequence. In this paper, we address each of these issues, resulting in a
computationally and memory-bounded solution. First, we introduce a dynamic
version of the successive shortest-path algorithm which solves the data
association problem optimally while reusing computation, resulting in
significantly faster inference than standard solvers. Second, we address the
optimal solution to the data association problem when dealing with an incoming
stream of data (i.e., online setting). Finally, we present our main
contribution which is an approximate online solution with bounded memory and
computation which is capable of handling videos of arbitrarily length while
performing tracking in real time. We demonstrate the effectiveness of our
algorithms on the KITTI and PETS2009 benchmarks and show state-of-the-art
performance, while being significantly faster than existing solvers.
| [
{
"version": "v1",
"created": "Wed, 23 Jul 2014 15:07:12 GMT"
},
{
"version": "v2",
"created": "Thu, 25 Dec 2014 14:15:01 GMT"
}
] | 2014-12-30T00:00:00 | [
[
"Lenz",
"Philip",
""
],
[
"Geiger",
"Andreas",
""
],
[
"Urtasun",
"Raquel",
""
]
] | TITLE: FollowMe: Efficient Online Min-Cost Flow Tracking with Bounded Memory
and Computation
ABSTRACT: One of the most popular approaches to multi-target tracking is
tracking-by-detection. Current min-cost flow algorithms which solve the data
association problem optimally have three main drawbacks: they are
computationally expensive, they assume that the whole video is given as a
batch, and they scale badly in memory and computation with the length of the
video sequence. In this paper, we address each of these issues, resulting in a
computationally and memory-bounded solution. First, we introduce a dynamic
version of the successive shortest-path algorithm which solves the data
association problem optimally while reusing computation, resulting in
significantly faster inference than standard solvers. Second, we address the
optimal solution to the data association problem when dealing with an incoming
stream of data (i.e., online setting). Finally, we present our main
contribution which is an approximate online solution with bounded memory and
computation which is capable of handling videos of arbitrarily length while
performing tracking in real time. We demonstrate the effectiveness of our
algorithms on the KITTI and PETS2009 benchmarks and show state-of-the-art
performance, while being significantly faster than existing solvers.
|
1412.7242 | Chengyao Shen | Chengyao Shen, Xun Huang and Qi Zhao | Learning of Proto-object Representations via Fixations on Low Resolution | This paper has been withdrawn by the author due to incompletion of
the submission | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | While previous researches in eye fixation prediction typically rely on
integrating low-level features (e.g. color, edge) to form a saliency map,
recently it has been found that the structural organization of these features
into a proto-object representation can play a more significant role. In this
work, we present a computational framework based on deep network to demonstrate
that proto-object representations can be learned from low-resolution image
patches from fixation regions. We advocate the use of low-resolution inputs in
this work due to the following reasons: (1) Proto-objects are computed in
parallel over an entire visual field (2) People can perceive or recognize
objects well even it is in low resolution. (3) Fixations from lower resolution
images can predict fixations on higher resolution images. In the proposed
computational model, we extract multi-scale image patches on fixation regions
from eye fixation datasets, resize them to low resolution and feed them into a
hierarchical. With layer-wise unsupervised feature learning, we find that many
proto-objects like features responsive to different shapes of object blobs are
learned out. Visualizations also show that these features are selective to
potential objects in the scene and the responses of these features work well in
predicting eye fixations on the images when combined with learned weights.
| [
{
"version": "v1",
"created": "Tue, 23 Dec 2014 03:14:21 GMT"
},
{
"version": "v2",
"created": "Sat, 27 Dec 2014 08:29:00 GMT"
}
] | 2014-12-30T00:00:00 | [
[
"Shen",
"Chengyao",
""
],
[
"Huang",
"Xun",
""
],
[
"Zhao",
"Qi",
""
]
] | TITLE: Learning of Proto-object Representations via Fixations on Low Resolution
ABSTRACT: While previous researches in eye fixation prediction typically rely on
integrating low-level features (e.g. color, edge) to form a saliency map,
recently it has been found that the structural organization of these features
into a proto-object representation can play a more significant role. In this
work, we present a computational framework based on deep network to demonstrate
that proto-object representations can be learned from low-resolution image
patches from fixation regions. We advocate the use of low-resolution inputs in
this work due to the following reasons: (1) Proto-objects are computed in
parallel over an entire visual field (2) People can perceive or recognize
objects well even it is in low resolution. (3) Fixations from lower resolution
images can predict fixations on higher resolution images. In the proposed
computational model, we extract multi-scale image patches on fixation regions
from eye fixation datasets, resize them to low resolution and feed them into a
hierarchical. With layer-wise unsupervised feature learning, we find that many
proto-objects like features responsive to different shapes of object blobs are
learned out. Visualizations also show that these features are selective to
potential objects in the scene and the responses of these features work well in
predicting eye fixations on the images when combined with learned weights.
|
1412.7782 | Roshan Ragel | MAC Jiffriya, MAC Akmal Jahan, and Roshan G. Ragel | Plagiarism Detection on Electronic Text based Assignments using Vector
Space Model (ICIAfS14) | appears in The 7th International Conference on Information and
Automation for Sustainability (ICIAfS) 2014 | null | null | null | cs.IR cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Plagiarism is known as illegal use of others' part of work or whole work as
one's own in any field such as art, poetry, literature, cinema, research and
other creative forms of study. Plagiarism is one of the important issues in
academic and research fields and giving more concern in academic systems. The
situation is even worse with the availability of ample resources on the web.
This paper focuses on an effective plagiarism detection tool on identifying
suitable intra-corpal plagiarism detection for text based assignments by
comparing unigram, bigram, trigram of vector space model with cosine similarity
measure. Manually evaluated, labelled dataset was tested using unigram, bigram
and trigram vector. Even though trigram vector consumes comparatively more
time, it shows better results with the labelled data. In addition, the selected
trigram vector space model with cosine similarity measure is compared with
tri-gram sequence matching technique with Jaccard measure. In the results,
cosine similarity score shows slightly higher values than the other. Because,
it focuses on giving more weight for terms that do not frequently exist in the
dataset and cosine similarity measure using trigram technique is more
preferable than the other. Therefore, we present our new tool and it could be
used as an effective tool to evaluate text based electronic assignments and
minimize the plagiarism among students.
| [
{
"version": "v1",
"created": "Thu, 25 Dec 2014 03:54:01 GMT"
}
] | 2014-12-30T00:00:00 | [
[
"Jiffriya",
"MAC",
""
],
[
"Jahan",
"MAC Akmal",
""
],
[
"Ragel",
"Roshan G.",
""
]
] | TITLE: Plagiarism Detection on Electronic Text based Assignments using Vector
Space Model (ICIAfS14)
ABSTRACT: Plagiarism is known as illegal use of others' part of work or whole work as
one's own in any field such as art, poetry, literature, cinema, research and
other creative forms of study. Plagiarism is one of the important issues in
academic and research fields and giving more concern in academic systems. The
situation is even worse with the availability of ample resources on the web.
This paper focuses on an effective plagiarism detection tool on identifying
suitable intra-corpal plagiarism detection for text based assignments by
comparing unigram, bigram, trigram of vector space model with cosine similarity
measure. Manually evaluated, labelled dataset was tested using unigram, bigram
and trigram vector. Even though trigram vector consumes comparatively more
time, it shows better results with the labelled data. In addition, the selected
trigram vector space model with cosine similarity measure is compared with
tri-gram sequence matching technique with Jaccard measure. In the results,
cosine similarity score shows slightly higher values than the other. Because,
it focuses on giving more weight for terms that do not frequently exist in the
dataset and cosine similarity measure using trigram technique is more
preferable than the other. Therefore, we present our new tool and it could be
used as an effective tool to evaluate text based electronic assignments and
minimize the plagiarism among students.
|
1412.7789 | Roshan Ragel | Vajira Thambawita, Roshan Ragel and Dhammika Elkaduwe | To Use or Not to Use: Graphics Processing Units for Pattern Matching
Algorithms | appears in The 7th International Conference on Information and
Automation for Sustainability (ICIAfS) 2014 | null | null | null | cs.DC cs.PF | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | String matching is an important part in today's computer applications and
Aho-Corasick algorithm is one of the main string matching algorithms used to
accomplish this. This paper discusses that when can the GPUs be used for string
matching applications using the Aho-Corasick algorithm as a benchmark. We have
to identify the best unit to run our string matching algorithm according to the
performance of our devices and the applications. Sometimes CPU gives better
performance than GPU and sometimes GPU gives better performance than CPU.
Therefore, identifying this critical point is significant task for researchers
who are using GPUs to improve the performance of their string matching
applications based on string matching algorithms.
| [
{
"version": "v1",
"created": "Thu, 25 Dec 2014 05:27:49 GMT"
}
] | 2014-12-30T00:00:00 | [
[
"Thambawita",
"Vajira",
""
],
[
"Ragel",
"Roshan",
""
],
[
"Elkaduwe",
"Dhammika",
""
]
] | TITLE: To Use or Not to Use: Graphics Processing Units for Pattern Matching
Algorithms
ABSTRACT: String matching is an important part in today's computer applications and
Aho-Corasick algorithm is one of the main string matching algorithms used to
accomplish this. This paper discusses that when can the GPUs be used for string
matching applications using the Aho-Corasick algorithm as a benchmark. We have
to identify the best unit to run our string matching algorithm according to the
performance of our devices and the applications. Sometimes CPU gives better
performance than GPU and sometimes GPU gives better performance than CPU.
Therefore, identifying this critical point is significant task for researchers
who are using GPUs to improve the performance of their string matching
applications based on string matching algorithms.
|
1412.7851 | Odemir Bruno PhD | Jo\~ao Batista Florindo and Odemir Martinez Bruno | Fractal descriptors based on the probability dimension: a texture
analysis and classification approach | 7 pages, 6 figures. arXiv admin note: text overlap with
arXiv:1205.2821 | Pattern Recognition Letters, Volume 42, Pages 107-114, 2014 | 10.1016/j.patrec.2014.01.009 | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this work, we propose a novel technique for obtaining descriptors of
gray-level texture images. The descriptors are provided by applying a
multiscale transform to the fractal dimension of the image estimated through
the probability (Voss) method. The effectiveness of the descriptors is verified
in a classification task using benchmark over texture datasets. The results
obtained demonstrate the efficiency of the proposed method as a tool for the
description and discrimination of texture images.
| [
{
"version": "v1",
"created": "Thu, 25 Dec 2014 18:50:31 GMT"
}
] | 2014-12-30T00:00:00 | [
[
"Florindo",
"João Batista",
""
],
[
"Bruno",
"Odemir Martinez",
""
]
] | TITLE: Fractal descriptors based on the probability dimension: a texture
analysis and classification approach
ABSTRACT: In this work, we propose a novel technique for obtaining descriptors of
gray-level texture images. The descriptors are provided by applying a
multiscale transform to the fractal dimension of the image estimated through
the probability (Voss) method. The effectiveness of the descriptors is verified
in a classification task using benchmark over texture datasets. The results
obtained demonstrate the efficiency of the proposed method as a tool for the
description and discrimination of texture images.
|
1412.7880 | Odemir Bruno PhD | Marcos W. S. Oliveira and Dalcimar Casanova and Jo\~ao B. Florindo and
Odemir Martinez Bruno | Enhancing fractal descriptors on images by combining boundary and
interior of Minkowski dilation | 6 pages 3 figures | Physica A, Volume 416, Pages 41-48, 2014 | 10.1016/j.physa.2014.07.074 | null | physics.data-an cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This work proposes to obtain novel fractal descriptors from gray-level
texture images by combining information from interior and boundary measures of
the Minkowski dilation applied to the texture surface. At first, the image is
converted into a surface where the height of each point is the gray intensity
of the respective pixel in that position in the image. Thus, this surface is
morphologically dilated by spheres. The radius of such spheres is ranged within
an interval and the volume and the external area of the dilated structure are
computed for each radius. The final descriptors are given by such measures
concatenated and subject to a canonical transform to reduce the dimensionality.
The proposal is an enhancement to the classical Bouligand-Minkowski fractal
descriptors, where only the volume (interior) information is considered. As
different structures may have the same volume, but not the same area, the
proposal yields to more rich descriptors as confirmed by results on the
classification of benchmark databases.
| [
{
"version": "v1",
"created": "Fri, 26 Dec 2014 02:13:04 GMT"
}
] | 2014-12-30T00:00:00 | [
[
"Oliveira",
"Marcos W. S.",
""
],
[
"Casanova",
"Dalcimar",
""
],
[
"Florindo",
"João B.",
""
],
[
"Bruno",
"Odemir Martinez",
""
]
] | TITLE: Enhancing fractal descriptors on images by combining boundary and
interior of Minkowski dilation
ABSTRACT: This work proposes to obtain novel fractal descriptors from gray-level
texture images by combining information from interior and boundary measures of
the Minkowski dilation applied to the texture surface. At first, the image is
converted into a surface where the height of each point is the gray intensity
of the respective pixel in that position in the image. Thus, this surface is
morphologically dilated by spheres. The radius of such spheres is ranged within
an interval and the volume and the external area of the dilated structure are
computed for each radius. The final descriptors are given by such measures
concatenated and subject to a canonical transform to reduce the dimensionality.
The proposal is an enhancement to the classical Bouligand-Minkowski fractal
descriptors, where only the volume (interior) information is considered. As
different structures may have the same volume, but not the same area, the
proposal yields to more rich descriptors as confirmed by results on the
classification of benchmark databases.
|
1412.7963 | Odemir Bruno PhD | Jo\~ao B. Florindo, Odemir M. Bruno | Texture analysis by multi-resolution fractal descriptors | 8 pages, 6 figures | Expert Systems with Applications, Volume 40, Issue 10, Pages
4022-4028, 2013 | 10.1016/j.eswa.2013.01.007 | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This work proposes a texture descriptor based on fractal theory. The method
is based on the Bouligand-Minkowski descriptors. We decompose the original
image recursively into 4 equal parts. In each recursion step, we estimate the
average and the deviation of the Bouligand-Minkowski descriptors computed over
each part. Thus, we extract entropy features from both average and deviation.
The proposed descriptors are provided by the concatenation of such measures.
The method is tested in a classification experiment under well known datasets,
that is, Brodatz and Vistex. The results demonstrate that the proposed
technique achieves better results than classical and state-of-the-art texture
descriptors, such as Gabor-wavelets and co-occurrence matrix.
| [
{
"version": "v1",
"created": "Fri, 26 Dec 2014 17:45:41 GMT"
}
] | 2014-12-30T00:00:00 | [
[
"Florindo",
"João B.",
""
],
[
"Bruno",
"Odemir M.",
""
]
] | TITLE: Texture analysis by multi-resolution fractal descriptors
ABSTRACT: This work proposes a texture descriptor based on fractal theory. The method
is based on the Bouligand-Minkowski descriptors. We decompose the original
image recursively into 4 equal parts. In each recursion step, we estimate the
average and the deviation of the Bouligand-Minkowski descriptors computed over
each part. Thus, we extract entropy features from both average and deviation.
The proposed descriptors are provided by the concatenation of such measures.
The method is tested in a classification experiment under well known datasets,
that is, Brodatz and Vistex. The results demonstrate that the proposed
technique achieves better results than classical and state-of-the-art texture
descriptors, such as Gabor-wavelets and co-occurrence matrix.
|
1412.7990 | Ernesto Diaz-Aviles | Ernesto Diaz-Aviles, Hoang Thanh Lam, Fabio Pinelli, Stefano Braghin,
Yiannis Gkoufas, Michele Berlingerio, and Francesco Calabrese | Predicting User Engagement in Twitter with Collaborative Ranking | RecSysChallenge'14 at RecSys 2014, October 10, 2014, Foster City, CA,
USA | In Proceedings of the 2014 Recommender Systems Challenge
(RecSysChallenge'14). ACM, New York, NY, USA, , Pages 41 , 6 pages | 10.1145/2668067.2668072 | null | cs.IR cs.CY cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Collaborative Filtering (CF) is a core component of popular web-based
services such as Amazon, YouTube, Netflix, and Twitter. Most applications use
CF to recommend a small set of items to the user. For instance, YouTube
presents to a user a list of top-n videos she would likely watch next based on
her rating and viewing history. Current methods of CF evaluation have been
focused on assessing the quality of a predicted rating or the ranking
performance for top-n recommended items. However, restricting the recommender
system evaluation to these two aspects is rather limiting and neglects other
dimensions that could better characterize a well-perceived recommendation. In
this paper, instead of optimizing rating or top-n recommendation, we focus on
the task of predicting which items generate the highest user engagement. In
particular, we use Twitter as our testbed and cast the problem as a
Collaborative Ranking task where the rich features extracted from the metadata
of the tweets help to complement the transaction information limited to user
ids, item ids, ratings and timestamps. We learn a scoring function that
directly optimizes the user engagement in terms of nDCG@10 on the predicted
ranking. Experiments conducted on an extended version of the MovieTweetings
dataset, released as part of the RecSys Challenge 2014, show the effectiveness
of our approach.
| [
{
"version": "v1",
"created": "Fri, 26 Dec 2014 21:00:14 GMT"
}
] | 2014-12-30T00:00:00 | [
[
"Diaz-Aviles",
"Ernesto",
""
],
[
"Lam",
"Hoang Thanh",
""
],
[
"Pinelli",
"Fabio",
""
],
[
"Braghin",
"Stefano",
""
],
[
"Gkoufas",
"Yiannis",
""
],
[
"Berlingerio",
"Michele",
""
],
[
"Calabrese",
"Francesco",
""
]
] | TITLE: Predicting User Engagement in Twitter with Collaborative Ranking
ABSTRACT: Collaborative Filtering (CF) is a core component of popular web-based
services such as Amazon, YouTube, Netflix, and Twitter. Most applications use
CF to recommend a small set of items to the user. For instance, YouTube
presents to a user a list of top-n videos she would likely watch next based on
her rating and viewing history. Current methods of CF evaluation have been
focused on assessing the quality of a predicted rating or the ranking
performance for top-n recommended items. However, restricting the recommender
system evaluation to these two aspects is rather limiting and neglects other
dimensions that could better characterize a well-perceived recommendation. In
this paper, instead of optimizing rating or top-n recommendation, we focus on
the task of predicting which items generate the highest user engagement. In
particular, we use Twitter as our testbed and cast the problem as a
Collaborative Ranking task where the rich features extracted from the metadata
of the tweets help to complement the transaction information limited to user
ids, item ids, ratings and timestamps. We learn a scoring function that
directly optimizes the user engagement in terms of nDCG@10 on the predicted
ranking. Experiments conducted on an extended version of the MovieTweetings
dataset, released as part of the RecSys Challenge 2014, show the effectiveness
of our approach.
|
1412.8070 | Artiom Kovnatsky Artiom Kovnatsky | Artiom Kovnatsky, Michael M. Bronstein, Xavier Bresson, Pierre
Vandergheynst | Functional correspondence by matrix completion | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we consider the problem of finding dense intrinsic
correspondence between manifolds using the recently introduced functional
framework. We pose the functional correspondence problem as matrix completion
with manifold geometric structure and inducing functional localization with the
$L_1$ norm. We discuss efficient numerical procedures for the solution of our
problem. Our method compares favorably to the accuracy of state-of-the-art
correspondence algorithms on non-rigid shape matching benchmarks, and is
especially advantageous in settings when only scarce data is available.
| [
{
"version": "v1",
"created": "Sat, 27 Dec 2014 17:53:06 GMT"
}
] | 2014-12-30T00:00:00 | [
[
"Kovnatsky",
"Artiom",
""
],
[
"Bronstein",
"Michael M.",
""
],
[
"Bresson",
"Xavier",
""
],
[
"Vandergheynst",
"Pierre",
""
]
] | TITLE: Functional correspondence by matrix completion
ABSTRACT: In this paper, we consider the problem of finding dense intrinsic
correspondence between manifolds using the recently introduced functional
framework. We pose the functional correspondence problem as matrix completion
with manifold geometric structure and inducing functional localization with the
$L_1$ norm. We discuss efficient numerical procedures for the solution of our
problem. Our method compares favorably to the accuracy of state-of-the-art
correspondence algorithms on non-rigid shape matching benchmarks, and is
especially advantageous in settings when only scarce data is available.
|
1412.8099 | Rathipriya R | R. Rathipriya, K. Thangavel | Extraction of Web Usage Profiles using Simulated Annealing Based
Biclustering Approach | null | null | null | null | cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, the Simulated Annealing (SA) based biclustering approach is
proposed in which SA is used as an optimization tool for biclustering of web
usage data to identify the optimal user profile from the given web usage data.
Extracted biclusters are consists of correlated users whose usage behaviors are
similar across the subset of web pages of a web site where as these users are
uncorrelated for remaining pages of a web site. These results are very useful
in web personalization so that it communicates better with its users and for
making customized prediction. Also useful for providing customized web service
too. Experiment was conducted on the real web usage dataset called CTI dataset.
Results show that proposed SA based biclustering approach can extract highly
correlated user groups from the preprocessed web usage data.
| [
{
"version": "v1",
"created": "Mon, 1 Dec 2014 10:06:25 GMT"
}
] | 2014-12-30T00:00:00 | [
[
"Rathipriya",
"R.",
""
],
[
"Thangavel",
"K.",
""
]
] | TITLE: Extraction of Web Usage Profiles using Simulated Annealing Based
Biclustering Approach
ABSTRACT: In this paper, the Simulated Annealing (SA) based biclustering approach is
proposed in which SA is used as an optimization tool for biclustering of web
usage data to identify the optimal user profile from the given web usage data.
Extracted biclusters are consists of correlated users whose usage behaviors are
similar across the subset of web pages of a web site where as these users are
uncorrelated for remaining pages of a web site. These results are very useful
in web personalization so that it communicates better with its users and for
making customized prediction. Also useful for providing customized web service
too. Experiment was conducted on the real web usage dataset called CTI dataset.
Results show that proposed SA based biclustering approach can extract highly
correlated user groups from the preprocessed web usage data.
|
1412.8104 | Natarajan Meghanathan | Natarajan Meghanathan | Performance Comparison of Minimum Hop vs. Minimum Edge Based Multicast
Routing under Different Mobility Models for Mobile Ad hoc Networks | 14 pages, 17 figures | International Journal of Wireless and Mobile Networks, 3(3):1-14,
June 2011 | null | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The high-level contribution of this paper is to establish benchmarks for the
minimum hop count per source-receiver path and the minimum number of edges per
tree for multicast routing in mobile ad hoc networks (MANETs) under different
mobility models. In this pursuit, we explore the tradeoffs between these two
routing strategies with respect to hop count, number of edges and lifetime per
multicast tree with respect to the Random Waypoint, City Section and Manhattan
mobility models. We employ the Breadth First Search algorithm and the Minimum
Steiner Tree heuristic for determining a sequence of minimum hop and minimum
edge trees respectively. While both the minimum hop and minimum edge trees
exist for a relatively longer time under the Manhattan mobility model; the
number of edges per tree and the hop count per source-receiver path are
relatively low under the Random Waypoint model. For all the three mobility
models, the minimum edge trees have a longer lifetime compared to the minimum
hop trees and the difference in lifetime increases with increase in network
density and/or the multicast group size. Multicast trees determined under the
City Section model incur fewer edges and lower hop count compared to the
Manhattan mobility model.
| [
{
"version": "v1",
"created": "Sun, 7 Dec 2014 20:48:15 GMT"
}
] | 2014-12-30T00:00:00 | [
[
"Meghanathan",
"Natarajan",
""
]
] | TITLE: Performance Comparison of Minimum Hop vs. Minimum Edge Based Multicast
Routing under Different Mobility Models for Mobile Ad hoc Networks
ABSTRACT: The high-level contribution of this paper is to establish benchmarks for the
minimum hop count per source-receiver path and the minimum number of edges per
tree for multicast routing in mobile ad hoc networks (MANETs) under different
mobility models. In this pursuit, we explore the tradeoffs between these two
routing strategies with respect to hop count, number of edges and lifetime per
multicast tree with respect to the Random Waypoint, City Section and Manhattan
mobility models. We employ the Breadth First Search algorithm and the Minimum
Steiner Tree heuristic for determining a sequence of minimum hop and minimum
edge trees respectively. While both the minimum hop and minimum edge trees
exist for a relatively longer time under the Manhattan mobility model; the
number of edges per tree and the hop count per source-receiver path are
relatively low under the Random Waypoint model. For all the three mobility
models, the minimum edge trees have a longer lifetime compared to the minimum
hop trees and the difference in lifetime increases with increase in network
density and/or the multicast group size. Multicast trees determined under the
City Section model incur fewer edges and lower hop count compared to the
Manhattan mobility model.
|
1412.8118 | Lanbo Zhang | Lanbo Zhang and Yi Zhang | Hierarchical Bayesian Models with Factorization for Content-Based
Recommendation | null | null | null | null | cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Most existing content-based filtering approaches learn user profiles
independently without capturing the similarity among users. Bayesian
hierarchical models \cite{Zhang:Efficient} learn user profiles jointly and have
the advantage of being able to borrow discriminative information from other
users through a Bayesian prior. However, the standard Bayesian hierarchical
models assume all user profiles are generated from the same prior. Considering
the diversity of user interests, this assumption could be improved by
introducing more flexibility. Besides, most existing content-based filtering
approaches implicitly assume that each user profile corresponds to exactly one
user interest and fail to capture a user's multiple interests (information
needs).
In this paper, we present a flexible Bayesian hierarchical modeling approach
to model both commonality and diversity among users as well as individual
users' multiple interests. We propose two models each with different
assumptions, and the proposed models are called Discriminative Factored Prior
Models (DFPM). In our models, each user profile is modeled as a discriminative
classifier with a factored model as its prior, and different factors contribute
in different levels to each user profile. Compared with existing content-based
filtering models, DFPM are interesting because they can 1) borrow
discriminative criteria of other users while learning a particular user profile
through the factored prior; 2) trade off well between diversity and commonality
among users; and 3) handle the challenging classification situation where each
class contains multiple concepts. The experimental results on a dataset
collected from real users on digg.com show that our models significantly
outperform the baseline models of L-2 regularized logistic regression and
traditional Bayesian hierarchical model with logistic regression.
| [
{
"version": "v1",
"created": "Sun, 28 Dec 2014 06:07:48 GMT"
}
] | 2014-12-30T00:00:00 | [
[
"Zhang",
"Lanbo",
""
],
[
"Zhang",
"Yi",
""
]
] | TITLE: Hierarchical Bayesian Models with Factorization for Content-Based
Recommendation
ABSTRACT: Most existing content-based filtering approaches learn user profiles
independently without capturing the similarity among users. Bayesian
hierarchical models \cite{Zhang:Efficient} learn user profiles jointly and have
the advantage of being able to borrow discriminative information from other
users through a Bayesian prior. However, the standard Bayesian hierarchical
models assume all user profiles are generated from the same prior. Considering
the diversity of user interests, this assumption could be improved by
introducing more flexibility. Besides, most existing content-based filtering
approaches implicitly assume that each user profile corresponds to exactly one
user interest and fail to capture a user's multiple interests (information
needs).
In this paper, we present a flexible Bayesian hierarchical modeling approach
to model both commonality and diversity among users as well as individual
users' multiple interests. We propose two models each with different
assumptions, and the proposed models are called Discriminative Factored Prior
Models (DFPM). In our models, each user profile is modeled as a discriminative
classifier with a factored model as its prior, and different factors contribute
in different levels to each user profile. Compared with existing content-based
filtering models, DFPM are interesting because they can 1) borrow
discriminative criteria of other users while learning a particular user profile
through the factored prior; 2) trade off well between diversity and commonality
among users; and 3) handle the challenging classification situation where each
class contains multiple concepts. The experimental results on a dataset
collected from real users on digg.com show that our models significantly
outperform the baseline models of L-2 regularized logistic regression and
traditional Bayesian hierarchical model with logistic regression.
|
1412.8120 | Amlan Kusum | Amlan Kusum, Iulian Neamtiu and Rajiv Gupta | Adapting Graph Application Performance via Alternate Data Structure
Representation | Part of ADAPT Workshop proceedings, 2015 (arXiv:1412.2347) | null | null | ADAPT/2015/03 | cs.PL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Graph processing is used extensively in areas from social networking mining
to web indexing. We demonstrate that the performance and dependability of such
applications critically hinges on the graph data structure used, because a
fixed, compile-time choice of data structure can lead to poor performance or
applications unable to complete. To address this problem, we introduce an
approach that helps programmers transform regular, off-the-shelf graph
applications into adaptive, more dependable applications where adaptations are
performed via runtime selection from alternate data structure representations.
Using our approach, applications dynamically adapt to the input graph's
characteristics and changes in available memory so they continue to run when
faced with adverse conditions such as low memory. Experiments with graph
algorithms on real-world (e.g., Wikipedia metadata, Gnutella topology) and
synthetic graph datasets show that our adaptive applications run to completion
with lower execution time and/or memory utilization in comparison to their
non-adaptive versions.
| [
{
"version": "v1",
"created": "Sun, 28 Dec 2014 06:49:23 GMT"
}
] | 2014-12-30T00:00:00 | [
[
"Kusum",
"Amlan",
""
],
[
"Neamtiu",
"Iulian",
""
],
[
"Gupta",
"Rajiv",
""
]
] | TITLE: Adapting Graph Application Performance via Alternate Data Structure
Representation
ABSTRACT: Graph processing is used extensively in areas from social networking mining
to web indexing. We demonstrate that the performance and dependability of such
applications critically hinges on the graph data structure used, because a
fixed, compile-time choice of data structure can lead to poor performance or
applications unable to complete. To address this problem, we introduce an
approach that helps programmers transform regular, off-the-shelf graph
applications into adaptive, more dependable applications where adaptations are
performed via runtime selection from alternate data structure representations.
Using our approach, applications dynamically adapt to the input graph's
characteristics and changes in available memory so they continue to run when
faced with adverse conditions such as low memory. Experiments with graph
algorithms on real-world (e.g., Wikipedia metadata, Gnutella topology) and
synthetic graph datasets show that our adaptive applications run to completion
with lower execution time and/or memory utilization in comparison to their
non-adaptive versions.
|
1412.8341 | Pavel H\'ala | Pavel H\'ala | Spectral classification using convolutional neural networks | 71 pages, 50 figures, Master's thesis, Masaryk University | null | null | null | cs.CV astro-ph.IM cs.NE | http://creativecommons.org/licenses/by/3.0/ | There is a great need for accurate and autonomous spectral classification
methods in astrophysics. This thesis is about training a convolutional neural
network (ConvNet) to recognize an object class (quasar, star or galaxy) from
one-dimension spectra only. Author developed several scripts and C programs for
datasets preparation, preprocessing and postprocessing of the data. EBLearn
library (developed by Pierre Sermanet and Yann LeCun) was used to create
ConvNets. Application on dataset of more than 60000 spectra yielded success
rate of nearly 95%. This thesis conclusively proved great potential of
convolutional neural networks and deep learning methods in astrophysics.
| [
{
"version": "v1",
"created": "Mon, 29 Dec 2014 13:47:06 GMT"
}
] | 2014-12-30T00:00:00 | [
[
"Hála",
"Pavel",
""
]
] | TITLE: Spectral classification using convolutional neural networks
ABSTRACT: There is a great need for accurate and autonomous spectral classification
methods in astrophysics. This thesis is about training a convolutional neural
network (ConvNet) to recognize an object class (quasar, star or galaxy) from
one-dimension spectra only. Author developed several scripts and C programs for
datasets preparation, preprocessing and postprocessing of the data. EBLearn
library (developed by Pierre Sermanet and Yann LeCun) was used to create
ConvNets. Application on dataset of more than 60000 spectra yielded success
rate of nearly 95%. This thesis conclusively proved great potential of
convolutional neural networks and deep learning methods in astrophysics.
|
1412.7584 | Zhanglong Ji | Zhanglong Ji, Zachary C. Lipton, Charles Elkan | Differential Privacy and Machine Learning: a Survey and Review | null | null | null | null | cs.LG cs.CR cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The objective of machine learning is to extract useful information from data,
while privacy is preserved by concealing information. Thus it seems hard to
reconcile these competing interests. However, they frequently must be balanced
when mining sensitive data. For example, medical research represents an
important application where it is necessary both to extract useful information
and protect patient privacy. One way to resolve the conflict is to extract
general characteristics of whole populations without disclosing the private
information of individuals.
In this paper, we consider differential privacy, one of the most popular and
powerful definitions of privacy. We explore the interplay between machine
learning and differential privacy, namely privacy-preserving machine learning
algorithms and learning-based data release mechanisms. We also describe some
theoretical results that address what can be learned differentially privately
and upper bounds of loss functions for differentially private algorithms.
Finally, we present some open questions, including how to incorporate public
data, how to deal with missing data in private datasets, and whether, as the
number of observed samples grows arbitrarily large, differentially private
machine learning algorithms can be achieved at no cost to utility as compared
to corresponding non-differentially private algorithms.
| [
{
"version": "v1",
"created": "Wed, 24 Dec 2014 01:51:06 GMT"
}
] | 2014-12-25T00:00:00 | [
[
"Ji",
"Zhanglong",
""
],
[
"Lipton",
"Zachary C.",
""
],
[
"Elkan",
"Charles",
""
]
] | TITLE: Differential Privacy and Machine Learning: a Survey and Review
ABSTRACT: The objective of machine learning is to extract useful information from data,
while privacy is preserved by concealing information. Thus it seems hard to
reconcile these competing interests. However, they frequently must be balanced
when mining sensitive data. For example, medical research represents an
important application where it is necessary both to extract useful information
and protect patient privacy. One way to resolve the conflict is to extract
general characteristics of whole populations without disclosing the private
information of individuals.
In this paper, we consider differential privacy, one of the most popular and
powerful definitions of privacy. We explore the interplay between machine
learning and differential privacy, namely privacy-preserving machine learning
algorithms and learning-based data release mechanisms. We also describe some
theoretical results that address what can be learned differentially privately
and upper bounds of loss functions for differentially private algorithms.
Finally, we present some open questions, including how to incorporate public
data, how to deal with missing data in private datasets, and whether, as the
number of observed samples grows arbitrarily large, differentially private
machine learning algorithms can be achieved at no cost to utility as compared
to corresponding non-differentially private algorithms.
|
1412.6821 | Roland Kwitt | Jan Reininghaus, Stefan Huber, Ulrich Bauer, Roland Kwitt | A Stable Multi-Scale Kernel for Topological Machine Learning | null | null | null | null | stat.ML cs.CV cs.LG math.AT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Topological data analysis offers a rich source of valuable information to
study vision problems. Yet, so far we lack a theoretically sound connection to
popular kernel-based learning techniques, such as kernel SVMs or kernel PCA. In
this work, we establish such a connection by designing a multi-scale kernel for
persistence diagrams, a stable summary representation of topological features
in data. We show that this kernel is positive definite and prove its stability
with respect to the 1-Wasserstein distance. Experiments on two benchmark
datasets for 3D shape classification/retrieval and texture recognition show
considerable performance gains of the proposed method compared to an
alternative approach that is based on the recently introduced persistence
landscapes.
| [
{
"version": "v1",
"created": "Sun, 21 Dec 2014 19:17:08 GMT"
}
] | 2014-12-24T00:00:00 | [
[
"Reininghaus",
"Jan",
""
],
[
"Huber",
"Stefan",
""
],
[
"Bauer",
"Ulrich",
""
],
[
"Kwitt",
"Roland",
""
]
] | TITLE: A Stable Multi-Scale Kernel for Topological Machine Learning
ABSTRACT: Topological data analysis offers a rich source of valuable information to
study vision problems. Yet, so far we lack a theoretically sound connection to
popular kernel-based learning techniques, such as kernel SVMs or kernel PCA. In
this work, we establish such a connection by designing a multi-scale kernel for
persistence diagrams, a stable summary representation of topological features
in data. We show that this kernel is positive definite and prove its stability
with respect to the 1-Wasserstein distance. Experiments on two benchmark
datasets for 3D shape classification/retrieval and texture recognition show
considerable performance gains of the proposed method compared to an
alternative approach that is based on the recently introduced persistence
landscapes.
|
1209.3686 | Barzan Mozafari | Barzan Mozafari, Purnamrita Sarkar, Michael J. Franklin, Michael I.
Jordan, Samuel Madden | Active Learning for Crowd-Sourced Databases | A shorter version of this manuscript has been published in
Proceedings of Very Large Data Bases 2015, entitled "Scaling Up
Crowd-Sourcing to Very Large Datasets: A Case for Active Learning" | null | null | null | cs.LG cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Crowd-sourcing has become a popular means of acquiring labeled data for a
wide variety of tasks where humans are more accurate than computers, e.g.,
labeling images, matching objects, or analyzing sentiment. However, relying
solely on the crowd is often impractical even for data sets with thousands of
items, due to time and cost constraints of acquiring human input (which cost
pennies and minutes per label). In this paper, we propose algorithms for
integrating machine learning into crowd-sourced databases, with the goal of
allowing crowd-sourcing applications to scale, i.e., to handle larger datasets
at lower costs. The key observation is that, in many of the above tasks, humans
and machine learning algorithms can be complementary, as humans are often more
accurate but slow and expensive, while algorithms are usually less accurate,
but faster and cheaper.
Based on this observation, we present two new active learning algorithms to
combine humans and algorithms together in a crowd-sourced database. Our
algorithms are based on the theory of non-parametric bootstrap, which makes our
results applicable to a broad class of machine learning models. Our results, on
three real-life datasets collected with Amazon's Mechanical Turk, and on 15
well-known UCI data sets, show that our methods on average ask humans to label
one to two orders of magnitude fewer items to achieve the same accuracy as a
baseline that labels random images, and two to eight times fewer questions than
previous active learning schemes.
| [
{
"version": "v1",
"created": "Mon, 17 Sep 2012 15:21:06 GMT"
},
{
"version": "v2",
"created": "Mon, 3 Dec 2012 15:45:55 GMT"
},
{
"version": "v3",
"created": "Thu, 13 Dec 2012 18:20:04 GMT"
},
{
"version": "v4",
"created": "Sat, 20 Dec 2014 08:56:15 GMT"
}
] | 2014-12-23T00:00:00 | [
[
"Mozafari",
"Barzan",
""
],
[
"Sarkar",
"Purnamrita",
""
],
[
"Franklin",
"Michael J.",
""
],
[
"Jordan",
"Michael I.",
""
],
[
"Madden",
"Samuel",
""
]
] | TITLE: Active Learning for Crowd-Sourced Databases
ABSTRACT: Crowd-sourcing has become a popular means of acquiring labeled data for a
wide variety of tasks where humans are more accurate than computers, e.g.,
labeling images, matching objects, or analyzing sentiment. However, relying
solely on the crowd is often impractical even for data sets with thousands of
items, due to time and cost constraints of acquiring human input (which cost
pennies and minutes per label). In this paper, we propose algorithms for
integrating machine learning into crowd-sourced databases, with the goal of
allowing crowd-sourcing applications to scale, i.e., to handle larger datasets
at lower costs. The key observation is that, in many of the above tasks, humans
and machine learning algorithms can be complementary, as humans are often more
accurate but slow and expensive, while algorithms are usually less accurate,
but faster and cheaper.
Based on this observation, we present two new active learning algorithms to
combine humans and algorithms together in a crowd-sourced database. Our
algorithms are based on the theory of non-parametric bootstrap, which makes our
results applicable to a broad class of machine learning models. Our results, on
three real-life datasets collected with Amazon's Mechanical Turk, and on 15
well-known UCI data sets, show that our methods on average ask humans to label
one to two orders of magnitude fewer items to achieve the same accuracy as a
baseline that labels random images, and two to eight times fewer questions than
previous active learning schemes.
|
1304.5409 | Carsten Gottschlich | Carsten Gottschlich and Stephan Huckemann | Separating the Real from the Synthetic: Minutiae Histograms as
Fingerprints of Fingerprints | null | IET Biometrics, vol. 3, no. 4, pp. 291-301, Dec. 2014 | 10.1049/iet-bmt.2013.0065 | null | cs.CV cs.AI cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this study we show that by the current state-of-the-art synthetically
generated fingerprints can easily be discriminated from real fingerprints. We
propose a method based on second order extended minutiae histograms (MHs) which
can distinguish between real and synthetic prints with very high accuracy. MHs
provide a fixed-length feature vector for a fingerprint which are invariant
under rotation and translation. This 'test of realness' can be applied to
synthetic fingerprints produced by any method. In this work, tests are
conducted on the 12 publicly available databases of FVC2000, FVC2002 and
FVC2004 which are well established benchmarks for evaluating the performance of
fingerprint recognition algorithms; 3 of these 12 databases consist of
artificial fingerprints generated by the SFinGe software. Additionally, we
evaluate the discriminative performance on a database of synthetic fingerprints
generated by the software of Bicz versus real fingerprint images. We conclude
with suggestions for the improvement of synthetic fingerprint generation.
| [
{
"version": "v1",
"created": "Fri, 19 Apr 2013 13:21:13 GMT"
},
{
"version": "v2",
"created": "Thu, 30 Jan 2014 11:28:08 GMT"
},
{
"version": "v3",
"created": "Wed, 15 Oct 2014 14:04:46 GMT"
}
] | 2014-12-23T00:00:00 | [
[
"Gottschlich",
"Carsten",
""
],
[
"Huckemann",
"Stephan",
""
]
] | TITLE: Separating the Real from the Synthetic: Minutiae Histograms as
Fingerprints of Fingerprints
ABSTRACT: In this study we show that by the current state-of-the-art synthetically
generated fingerprints can easily be discriminated from real fingerprints. We
propose a method based on second order extended minutiae histograms (MHs) which
can distinguish between real and synthetic prints with very high accuracy. MHs
provide a fixed-length feature vector for a fingerprint which are invariant
under rotation and translation. This 'test of realness' can be applied to
synthetic fingerprints produced by any method. In this work, tests are
conducted on the 12 publicly available databases of FVC2000, FVC2002 and
FVC2004 which are well established benchmarks for evaluating the performance of
fingerprint recognition algorithms; 3 of these 12 databases consist of
artificial fingerprints generated by the SFinGe software. Additionally, we
evaluate the discriminative performance on a database of synthetic fingerprints
generated by the software of Bicz versus real fingerprint images. We conclude
with suggestions for the improvement of synthetic fingerprint generation.
|
1404.3840 | Chaochao Lu | Chaochao Lu, Xiaoou Tang | Surpassing Human-Level Face Verification Performance on LFW with
GaussianFace | Appearing in Proceedings of the 29th AAAI Conference on Artificial
Intelligence (AAAI-15), Oral Presentation | null | null | null | cs.CV cs.LG stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Face verification remains a challenging problem in very complex conditions
with large variations such as pose, illumination, expression, and occlusions.
This problem is exacerbated when we rely unrealistically on a single training
data source, which is often insufficient to cover the intrinsically complex
face variations. This paper proposes a principled multi-task learning approach
based on Discriminative Gaussian Process Latent Variable Model, named
GaussianFace, to enrich the diversity of training data. In comparison to
existing methods, our model exploits additional data from multiple
source-domains to improve the generalization performance of face verification
in an unknown target-domain. Importantly, our model can adapt automatically to
complex data distributions, and therefore can well capture complex face
variations inherent in multiple sources. Extensive experiments demonstrate the
effectiveness of the proposed model in learning from diverse data sources and
generalize to unseen domain. Specifically, the accuracy of our algorithm
achieves an impressive accuracy rate of 98.52% on the well-known and
challenging Labeled Faces in the Wild (LFW) benchmark. For the first time, the
human-level performance in face verification (97.53%) on LFW is surpassed.
| [
{
"version": "v1",
"created": "Tue, 15 Apr 2014 07:51:23 GMT"
},
{
"version": "v2",
"created": "Mon, 16 Jun 2014 14:37:38 GMT"
},
{
"version": "v3",
"created": "Sat, 20 Dec 2014 03:37:36 GMT"
}
] | 2014-12-23T00:00:00 | [
[
"Lu",
"Chaochao",
""
],
[
"Tang",
"Xiaoou",
""
]
] | TITLE: Surpassing Human-Level Face Verification Performance on LFW with
GaussianFace
ABSTRACT: Face verification remains a challenging problem in very complex conditions
with large variations such as pose, illumination, expression, and occlusions.
This problem is exacerbated when we rely unrealistically on a single training
data source, which is often insufficient to cover the intrinsically complex
face variations. This paper proposes a principled multi-task learning approach
based on Discriminative Gaussian Process Latent Variable Model, named
GaussianFace, to enrich the diversity of training data. In comparison to
existing methods, our model exploits additional data from multiple
source-domains to improve the generalization performance of face verification
in an unknown target-domain. Importantly, our model can adapt automatically to
complex data distributions, and therefore can well capture complex face
variations inherent in multiple sources. Extensive experiments demonstrate the
effectiveness of the proposed model in learning from diverse data sources and
generalize to unseen domain. Specifically, the accuracy of our algorithm
achieves an impressive accuracy rate of 98.52% on the well-known and
challenging Labeled Faces in the Wild (LFW) benchmark. For the first time, the
human-level performance in face verification (97.53%) on LFW is surpassed.
|
1412.6570 | Changchun Zhang | Robert C. Qiu | The Foundation of Big Data: Experiments, Formulation, and Applications | null | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The central theme of this talk is to promote the non-asymptotic statistical
viewpoint in the context of massive datasets. The classical viewpoint breaks
down when the data size becomes large.
| [
{
"version": "v1",
"created": "Sat, 20 Dec 2014 01:14:55 GMT"
}
] | 2014-12-23T00:00:00 | [
[
"Qiu",
"Robert C.",
""
]
] | TITLE: The Foundation of Big Data: Experiments, Formulation, and Applications
ABSTRACT: The central theme of this talk is to promote the non-asymptotic statistical
viewpoint in the context of massive datasets. The classical viewpoint breaks
down when the data size becomes large.
|
1412.6734 | Aviv Tamar | Aviv Tamar, Panos Toulis, Shie Mannor, Edoardo M. Airoldi | Implicit Temporal Differences | null | null | null | null | stat.ML cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In reinforcement learning, the TD($\lambda$) algorithm is a fundamental
policy evaluation method with an efficient online implementation that is
suitable for large-scale problems. One practical drawback of TD($\lambda$) is
its sensitivity to the choice of the step-size. It is an empirically well-known
fact that a large step-size leads to fast convergence, at the cost of higher
variance and risk of instability. In this work, we introduce the implicit
TD($\lambda$) algorithm which has the same function and computational cost as
TD($\lambda$), but is significantly more stable. We provide a theoretical
explanation of this stability and an empirical evaluation of implicit
TD($\lambda$) on typical benchmark tasks. Our results show that implicit
TD($\lambda$) outperforms standard TD($\lambda$) and a state-of-the-art method
that automatically tunes the step-size, and thus shows promise for wide
applicability.
| [
{
"version": "v1",
"created": "Sun, 21 Dec 2014 06:53:15 GMT"
}
] | 2014-12-23T00:00:00 | [
[
"Tamar",
"Aviv",
""
],
[
"Toulis",
"Panos",
""
],
[
"Mannor",
"Shie",
""
],
[
"Airoldi",
"Edoardo M.",
""
]
] | TITLE: Implicit Temporal Differences
ABSTRACT: In reinforcement learning, the TD($\lambda$) algorithm is a fundamental
policy evaluation method with an efficient online implementation that is
suitable for large-scale problems. One practical drawback of TD($\lambda$) is
its sensitivity to the choice of the step-size. It is an empirically well-known
fact that a large step-size leads to fast convergence, at the cost of higher
variance and risk of instability. In this work, we introduce the implicit
TD($\lambda$) algorithm which has the same function and computational cost as
TD($\lambda$), but is significantly more stable. We provide a theoretical
explanation of this stability and an empirical evaluation of implicit
TD($\lambda$) on typical benchmark tasks. Our results show that implicit
TD($\lambda$) outperforms standard TD($\lambda$) and a state-of-the-art method
that automatically tunes the step-size, and thus shows promise for wide
applicability.
|
1412.6791 | Anoop Katti | Anoop Katti, Anurag Mittal | Mixture of Parts Revisited: Expressive Part Interactions for Pose
Estimation | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Part-based models with restrictive tree-structured interactions for the Human
Pose Estimation problem, leaves many part interactions unhandled. Two of the
most common and strong manifestations of such unhandled interactions are
self-occlusion among the parts and the confusion in the localization of the
non-adjacent symmetric parts. By handling the self-occlusion in a data
efficient manner, we improve the performance of the basic Mixture of Parts
model by a large margin, especially on uncommon poses. Through addressing the
confusion in the symmetric limb localization using a combination of two
complementing trees, we improve the performance on all the parts by atmost
doubling the running time. Finally, we show that the combination of the two
solutions improves the results. We report results that are equivalent to the
state-of-the-art on two standard datasets. Because of maintaining the
tree-structured interactions and only part-level modeling of the base Mixture
of Parts model, this is achieved in time that is much less than the best
performing part-based model.
| [
{
"version": "v1",
"created": "Sun, 21 Dec 2014 14:48:41 GMT"
}
] | 2014-12-23T00:00:00 | [
[
"Katti",
"Anoop",
""
],
[
"Mittal",
"Anurag",
""
]
] | TITLE: Mixture of Parts Revisited: Expressive Part Interactions for Pose
Estimation
ABSTRACT: Part-based models with restrictive tree-structured interactions for the Human
Pose Estimation problem, leaves many part interactions unhandled. Two of the
most common and strong manifestations of such unhandled interactions are
self-occlusion among the parts and the confusion in the localization of the
non-adjacent symmetric parts. By handling the self-occlusion in a data
efficient manner, we improve the performance of the basic Mixture of Parts
model by a large margin, especially on uncommon poses. Through addressing the
confusion in the symmetric limb localization using a combination of two
complementing trees, we improve the performance on all the parts by atmost
doubling the running time. Finally, we show that the combination of the two
solutions improves the results. We report results that are equivalent to the
state-of-the-art on two standard datasets. Because of maintaining the
tree-structured interactions and only part-level modeling of the base Mixture
of Parts model, this is achieved in time that is much less than the best
performing part-based model.
|
1412.6883 | Mahdi Nasrullah Al-Ameen | Mahdi Nasrullah Al-Ameen and Matthew Wright | iPersea : The Improved Persea with Sybil Detection Mechanism | 10 pages | null | null | null | cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | P2P systems are highly susceptible to Sybil attacks, in which an attacker
creates a large number of identities and uses them to control a substantial
fraction of the system. Persea is the most recent approach towards designing a
social network based Sybil-resistant DHT. Unlike prior Sybil-resistant P2P
systems based on social networks, Persea does not rely on two key assumptions:
(i) that the social network is fast mixing, and (ii) that there is a small
ratio of attack edges to honest peers. Both assumptions have been shown to be
unreliable in real social networks. The hierarchical distribution of node IDs
in Persea confines a large attacker botnet to a considerably smaller region of
the ID space than in a normal P2P system and its replication mechanism lets a
peer to retrieve the desired results even if a given region is occupied by
attackers. However, Persea system suffers from certain limitations, since it
cannot handle the scenario, where the malicious target returns an incorrect
result instead of just ignoring the lookup request. In this paper, we address
this major limitation of Persea through a Sybil detection mechanism built on
top of Persea system, which accommodates inspection lookup, a specially
designed lookup scheme to detect the Sybil nodes based on their responses to
the lookup query. We design a scheme to filter those detected Sybils to ensure
the participation of honest nodes on the lookup path during regular DHT lookup.
Since the malicious nodes are opt-out from the lookup path in our system, they
cannot return any incorrect result during regular lookup. We evaluate our
system in simulations with social network datasets and the results show that
catster, the largest network in our simulation with 149700 nodes and 5449275
edges, gains 100% lookup success rate, even when the number of attack edges is
equal to the number of benign peers in the network.
| [
{
"version": "v1",
"created": "Mon, 22 Dec 2014 06:25:49 GMT"
}
] | 2014-12-23T00:00:00 | [
[
"Al-Ameen",
"Mahdi Nasrullah",
""
],
[
"Wright",
"Matthew",
""
]
] | TITLE: iPersea : The Improved Persea with Sybil Detection Mechanism
ABSTRACT: P2P systems are highly susceptible to Sybil attacks, in which an attacker
creates a large number of identities and uses them to control a substantial
fraction of the system. Persea is the most recent approach towards designing a
social network based Sybil-resistant DHT. Unlike prior Sybil-resistant P2P
systems based on social networks, Persea does not rely on two key assumptions:
(i) that the social network is fast mixing, and (ii) that there is a small
ratio of attack edges to honest peers. Both assumptions have been shown to be
unreliable in real social networks. The hierarchical distribution of node IDs
in Persea confines a large attacker botnet to a considerably smaller region of
the ID space than in a normal P2P system and its replication mechanism lets a
peer to retrieve the desired results even if a given region is occupied by
attackers. However, Persea system suffers from certain limitations, since it
cannot handle the scenario, where the malicious target returns an incorrect
result instead of just ignoring the lookup request. In this paper, we address
this major limitation of Persea through a Sybil detection mechanism built on
top of Persea system, which accommodates inspection lookup, a specially
designed lookup scheme to detect the Sybil nodes based on their responses to
the lookup query. We design a scheme to filter those detected Sybils to ensure
the participation of honest nodes on the lookup path during regular DHT lookup.
Since the malicious nodes are opt-out from the lookup path in our system, they
cannot return any incorrect result during regular lookup. We evaluate our
system in simulations with social network datasets and the results show that
catster, the largest network in our simulation with 149700 nodes and 5449275
edges, gains 100% lookup success rate, even when the number of attack edges is
equal to the number of benign peers in the network.
|
1412.6986 | Tarek Abdelrahman | Tianyi David Han, Tarek S. Abdelrahman | Automatic Tuning of Local Memory Use on GPGPUs | Part of ADAPT Workshop proceedings, 2015 (arXiv:1412.2347) | null | null | ADAPT/2015/04 | cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The use of local memory is important to improve the performance of OpenCL
programs. However, its use may not always benefit performance, depending on
various application characteristics, and there is no simple heuristic for
deciding when to use it. We develop a machine learning model to decide if the
optimization is beneficial or not. We train the model with millions of
synthetic benchmarks and show that it can predict if the optimization should be
applied for a single array, in both synthetic and real benchmarks, with high
accuracy.
| [
{
"version": "v1",
"created": "Mon, 22 Dec 2014 14:06:37 GMT"
}
] | 2014-12-23T00:00:00 | [
[
"Han",
"Tianyi David",
""
],
[
"Abdelrahman",
"Tarek S.",
""
]
] | TITLE: Automatic Tuning of Local Memory Use on GPGPUs
ABSTRACT: The use of local memory is important to improve the performance of OpenCL
programs. However, its use may not always benefit performance, depending on
various application characteristics, and there is no simple heuristic for
deciding when to use it. We develop a machine learning model to decide if the
optimization is beneficial or not. We train the model with millions of
synthetic benchmarks and show that it can predict if the optimization should be
applied for a single array, in both synthetic and real benchmarks, with high
accuracy.
|
1412.6124 | Jianyu Wang | Jianyu Wang and Alan Yuille | Semantic Part Segmentation using Compositional Model combining Shape and
Appearance | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we study the problem of semantic part segmentation for
animals. This is more challenging than standard object detection, object
segmentation and pose estimation tasks because semantic parts of animals often
have similar appearance and highly varying shapes. To tackle these challenges,
we build a mixture of compositional models to represent the object boundary and
the boundaries of semantic parts. And we incorporate edge, appearance, and
semantic part cues into the compositional model. Given part-level segmentation
annotation, we develop a novel algorithm to learn a mixture of compositional
models under various poses and viewpoints for certain animal classes.
Furthermore, a linear complexity algorithm is offered for efficient inference
of the compositional model using dynamic programming. We evaluate our method
for horse and cow using a newly annotated dataset on Pascal VOC 2010 which has
pixelwise part labels. Experimental results demonstrate the effectiveness of
our method.
| [
{
"version": "v1",
"created": "Thu, 18 Dec 2014 21:27:38 GMT"
}
] | 2014-12-22T00:00:00 | [
[
"Wang",
"Jianyu",
""
],
[
"Yuille",
"Alan",
""
]
] | TITLE: Semantic Part Segmentation using Compositional Model combining Shape and
Appearance
ABSTRACT: In this paper, we study the problem of semantic part segmentation for
animals. This is more challenging than standard object detection, object
segmentation and pose estimation tasks because semantic parts of animals often
have similar appearance and highly varying shapes. To tackle these challenges,
we build a mixture of compositional models to represent the object boundary and
the boundaries of semantic parts. And we incorporate edge, appearance, and
semantic part cues into the compositional model. Given part-level segmentation
annotation, we develop a novel algorithm to learn a mixture of compositional
models under various poses and viewpoints for certain animal classes.
Furthermore, a linear complexity algorithm is offered for efficient inference
of the compositional model using dynamic programming. We evaluate our method
for horse and cow using a newly annotated dataset on Pascal VOC 2010 which has
pixelwise part labels. Experimental results demonstrate the effectiveness of
our method.
|
1412.6154 | Ana Romero | Ana Romero, Julio Rubio, Francis Sergeraert | Effective persistent homology of digital images | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, three Computational Topology methods (namely effective
homology, persistent homology and discrete vector fields) are mixed together to
produce algorithms for homological digital image processing. The algorithms
have been implemented as extensions of the Kenzo system and have shown a good
performance when applied on some actual images extracted from a public dataset.
| [
{
"version": "v1",
"created": "Mon, 6 Oct 2014 11:45:07 GMT"
}
] | 2014-12-22T00:00:00 | [
[
"Romero",
"Ana",
""
],
[
"Rubio",
"Julio",
""
],
[
"Sergeraert",
"Francis",
""
]
] | TITLE: Effective persistent homology of digital images
ABSTRACT: In this paper, three Computational Topology methods (namely effective
homology, persistent homology and discrete vector fields) are mixed together to
produce algorithms for homological digital image processing. The algorithms
have been implemented as extensions of the Kenzo system and have shown a good
performance when applied on some actual images extracted from a public dataset.
|
1412.6170 | Francesco Lettich | Francesco Lettich, Salvatore Orlando and Claudio Silvestri | Manycore processing of repeated k-NN queries over massive moving objects
observations | null | null | null | null | cs.DC cs.DB cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The ability to timely process significant amounts of continuously updated
spatial data is mandatory for an increasing number of applications. In this
paper we focus on a specific data-intensive problem concerning the repeated
processing of huge amounts of k nearest neighbours (k-NN) queries over massive
sets of moving objects, where the spatial extents of queries and the position
of objects are continuously modified over time. In particular, we propose a
novel hybrid CPU/GPU pipeline that significantly accelerate query processing
thanks to a combination of ad-hoc data structures and non-trivial memory access
patterns. To the best of our knowledge this is the first work that exploits
GPUs to efficiently solve repeated k-NN queries over massive sets of
continuously moving objects, even characterized by highly skewed spatial
distributions. In comparison with state-of-the-art sequential CPU-based
implementations, our method highlights significant speedups in the order of
10x-20x, depending on the datasets, even when considering cheap GPUs.
| [
{
"version": "v1",
"created": "Thu, 18 Dec 2014 22:43:28 GMT"
}
] | 2014-12-22T00:00:00 | [
[
"Lettich",
"Francesco",
""
],
[
"Orlando",
"Salvatore",
""
],
[
"Silvestri",
"Claudio",
""
]
] | TITLE: Manycore processing of repeated k-NN queries over massive moving objects
observations
ABSTRACT: The ability to timely process significant amounts of continuously updated
spatial data is mandatory for an increasing number of applications. In this
paper we focus on a specific data-intensive problem concerning the repeated
processing of huge amounts of k nearest neighbours (k-NN) queries over massive
sets of moving objects, where the spatial extents of queries and the position
of objects are continuously modified over time. In particular, we propose a
novel hybrid CPU/GPU pipeline that significantly accelerate query processing
thanks to a combination of ad-hoc data structures and non-trivial memory access
patterns. To the best of our knowledge this is the first work that exploits
GPUs to efficiently solve repeated k-NN queries over massive sets of
continuously moving objects, even characterized by highly skewed spatial
distributions. In comparison with state-of-the-art sequential CPU-based
implementations, our method highlights significant speedups in the order of
10x-20x, depending on the datasets, even when considering cheap GPUs.
|
1412.6257 | Alexander Kalmanovich | Alexander Kalmanovich and Gal Chechik | Gradual training of deep denoising auto encoders | null | null | null | null | cs.LG cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Stacked denoising auto encoders (DAEs) are well known to learn useful deep
representations, which can be used to improve supervised training by
initializing a deep network. We investigate a training scheme of a deep DAE,
where DAE layers are gradually added and keep adapting as additional layers are
added. We show that in the regime of mid-sized datasets, this gradual training
provides a small but consistent improvement over stacked training in both
reconstruction quality and classification error over stacked training on MNIST
and CIFAR datasets.
| [
{
"version": "v1",
"created": "Fri, 19 Dec 2014 09:30:33 GMT"
}
] | 2014-12-22T00:00:00 | [
[
"Kalmanovich",
"Alexander",
""
],
[
"Chechik",
"Gal",
""
]
] | TITLE: Gradual training of deep denoising auto encoders
ABSTRACT: Stacked denoising auto encoders (DAEs) are well known to learn useful deep
representations, which can be used to improve supervised training by
initializing a deep network. We investigate a training scheme of a deep DAE,
where DAE layers are gradually added and keep adapting as additional layers are
added. We show that in the regime of mid-sized datasets, this gradual training
provides a small but consistent improvement over stacked training in both
reconstruction quality and classification error over stacked training on MNIST
and CIFAR datasets.
|
1412.6264 | Taraka Rama Kasicheyanula | Taraka Rama K | Supertagging: Introduction, learning, and application | null | null | null | null | cs.CL | http://creativecommons.org/licenses/by-nc-sa/3.0/ | Supertagging is an approach originally developed by Bangalore and Joshi
(1999) to improve the parsing efficiency. In the beginning, the scholars used
small training datasets and somewhat na\"ive smoothing techniques to learn the
probability distributions of supertags. Since its inception, the applicability
of Supertags has been explored for TAG (tree-adjoining grammar) formalism as
well as other related yet, different formalisms such as CCG. This article will
try to summarize the various chapters, relevant to statistical parsing, from
the most recent edited book volume (Bangalore and Joshi, 2010). The chapters
were selected so as to blend the learning of supertags, its integration into
full-scale parsing, and in semantic parsing.
| [
{
"version": "v1",
"created": "Fri, 19 Dec 2014 09:53:57 GMT"
}
] | 2014-12-22T00:00:00 | [
[
"K",
"Taraka Rama",
""
]
] | TITLE: Supertagging: Introduction, learning, and application
ABSTRACT: Supertagging is an approach originally developed by Bangalore and Joshi
(1999) to improve the parsing efficiency. In the beginning, the scholars used
small training datasets and somewhat na\"ive smoothing techniques to learn the
probability distributions of supertags. Since its inception, the applicability
of Supertags has been explored for TAG (tree-adjoining grammar) formalism as
well as other related yet, different formalisms such as CCG. This article will
try to summarize the various chapters, relevant to statistical parsing, from
the most recent edited book volume (Bangalore and Joshi, 2010). The chapters
were selected so as to blend the learning of supertags, its integration into
full-scale parsing, and in semantic parsing.
|
1412.6402 | Pierre de Buyl | Rebecca R. Murphy, Sophie E. Jackson, David Klenerman | pyFRET: A Python Library for Single Molecule Fluorescence Data Analysis | Part of the Proceedings of the 7th European Conference on Python in
Science (EuroSciPy 2014), Pierre de Buyl and Nelle Varoquaux editors, (2014) | null | null | euroscipy-proceedings2014-10 | cs.CE physics.bio-ph q-bio.BM | http://creativecommons.org/licenses/by/3.0/ | Single molecule F\"orster resonance energy transfer (smFRET) is a powerful
experimental technique for studying the properties of individual biological
molecules in solution. However, as adoption of smFRET techniques becomes more
widespread, the lack of available software, whether open source or commercial,
for data analysis, is becoming a significant issue. Here, we present pyFRET, an
open source Python package for the analysis of data from single-molecule
fluorescence experiments from freely diffusing biomolecules. The package
provides methods for the complete analysis of a smFRET dataset, from burst
selection and denoising, through data visualisation and model fitting. We
provide support for both continuous excitation and alternating laser excitation
(ALEX) data analysis. pyFRET is available as a package downloadable from the
Python Package Index (PyPI) under the open source three-clause BSD licence,
together with links to extensive documentation and tutorials, including example
usage and test data. Additional documentation including tutorials is hosted
independently on ReadTheDocs. The code is available from the free hosting site
Bitbucket. Through distribution of this software, we hope to lower the barrier
for the adoption of smFRET experiments by other research groups and we
encourage others to contribute modules for specific analysis needs.
| [
{
"version": "v1",
"created": "Fri, 19 Dec 2014 16:00:31 GMT"
}
] | 2014-12-22T00:00:00 | [
[
"Murphy",
"Rebecca R.",
""
],
[
"Jackson",
"Sophie E.",
""
],
[
"Klenerman",
"David",
""
]
] | TITLE: pyFRET: A Python Library for Single Molecule Fluorescence Data Analysis
ABSTRACT: Single molecule F\"orster resonance energy transfer (smFRET) is a powerful
experimental technique for studying the properties of individual biological
molecules in solution. However, as adoption of smFRET techniques becomes more
widespread, the lack of available software, whether open source or commercial,
for data analysis, is becoming a significant issue. Here, we present pyFRET, an
open source Python package for the analysis of data from single-molecule
fluorescence experiments from freely diffusing biomolecules. The package
provides methods for the complete analysis of a smFRET dataset, from burst
selection and denoising, through data visualisation and model fitting. We
provide support for both continuous excitation and alternating laser excitation
(ALEX) data analysis. pyFRET is available as a package downloadable from the
Python Package Index (PyPI) under the open source three-clause BSD licence,
together with links to extensive documentation and tutorials, including example
usage and test data. Additional documentation including tutorials is hosted
independently on ReadTheDocs. The code is available from the free hosting site
Bitbucket. Through distribution of this software, we hope to lower the barrier
for the adoption of smFRET experiments by other research groups and we
encourage others to contribute modules for specific analysis needs.
|
1412.6493 | Zichao Yang | Zichao Yang and Alexander J. Smola and Le Song and Andrew Gordon
Wilson | A la Carte - Learning Fast Kernels | null | null | null | null | cs.LG stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Kernel methods have great promise for learning rich statistical
representations of large modern datasets. However, compared to neural networks,
kernel methods have been perceived as lacking in scalability and flexibility.
We introduce a family of fast, flexible, lightly parametrized and general
purpose kernel learning methods, derived from Fastfood basis function
expansions. We provide mechanisms to learn the properties of groups of spectral
frequencies in these expansions, which require only O(mlogd) time and O(m)
memory, for m basis functions and d input dimensions. We show that the proposed
methods can learn a wide class of kernels, outperforming the alternatives in
accuracy, speed, and memory consumption.
| [
{
"version": "v1",
"created": "Fri, 19 Dec 2014 19:27:21 GMT"
}
] | 2014-12-22T00:00:00 | [
[
"Yang",
"Zichao",
""
],
[
"Smola",
"Alexander J.",
""
],
[
"Song",
"Le",
""
],
[
"Wilson",
"Andrew Gordon",
""
]
] | TITLE: A la Carte - Learning Fast Kernels
ABSTRACT: Kernel methods have great promise for learning rich statistical
representations of large modern datasets. However, compared to neural networks,
kernel methods have been perceived as lacking in scalability and flexibility.
We introduce a family of fast, flexible, lightly parametrized and general
purpose kernel learning methods, derived from Fastfood basis function
expansions. We provide mechanisms to learn the properties of groups of spectral
frequencies in these expansions, which require only O(mlogd) time and O(m)
memory, for m basis functions and d input dimensions. We show that the proposed
methods can learn a wide class of kernels, outperforming the alternatives in
accuracy, speed, and memory consumption.
|
1303.1624 | Conrad Sanderson | Yongkang Wong, Mehrtash T. Harandi, Conrad Sanderson | On Robust Face Recognition via Sparse Encoding: the Good, the Bad, and
the Ugly | null | IET Biometrics, Vol. 3, No. 4, pp. 176-189, 2014 | 10.1049/iet-bmt.2013.0033 | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In the field of face recognition, Sparse Representation (SR) has received
considerable attention during the past few years. Most of the relevant
literature focuses on holistic descriptors in closed-set identification
applications. The underlying assumption in SR-based methods is that each class
in the gallery has sufficient samples and the query lies on the subspace
spanned by the gallery of the same class. Unfortunately, such assumption is
easily violated in the more challenging face verification scenario, where an
algorithm is required to determine if two faces (where one or both have not
been seen before) belong to the same person. In this paper, we first discuss
why previous attempts with SR might not be applicable to verification problems.
We then propose an alternative approach to face verification via SR.
Specifically, we propose to use explicit SR encoding on local image patches
rather than the entire face. The obtained sparse signals are pooled via
averaging to form multiple region descriptors, which are then concatenated to
form an overall face descriptor. Due to the deliberate loss spatial relations
within each region (caused by averaging), the resulting descriptor is robust to
misalignment & various image deformations. Within the proposed framework, we
evaluate several SR encoding techniques: l1-minimisation, Sparse Autoencoder
Neural Network (SANN), and an implicit probabilistic technique based on
Gaussian Mixture Models. Thorough experiments on AR, FERET, exYaleB, BANCA and
ChokePoint datasets show that the proposed local SR approach obtains
considerably better and more robust performance than several previous
state-of-the-art holistic SR methods, in both verification and closed-set
identification problems. The experiments also show that l1-minimisation based
encoding has a considerably higher computational than the other techniques, but
leads to higher recognition rates.
| [
{
"version": "v1",
"created": "Thu, 7 Mar 2013 09:30:10 GMT"
}
] | 2014-12-19T00:00:00 | [
[
"Wong",
"Yongkang",
""
],
[
"Harandi",
"Mehrtash T.",
""
],
[
"Sanderson",
"Conrad",
""
]
] | TITLE: On Robust Face Recognition via Sparse Encoding: the Good, the Bad, and
the Ugly
ABSTRACT: In the field of face recognition, Sparse Representation (SR) has received
considerable attention during the past few years. Most of the relevant
literature focuses on holistic descriptors in closed-set identification
applications. The underlying assumption in SR-based methods is that each class
in the gallery has sufficient samples and the query lies on the subspace
spanned by the gallery of the same class. Unfortunately, such assumption is
easily violated in the more challenging face verification scenario, where an
algorithm is required to determine if two faces (where one or both have not
been seen before) belong to the same person. In this paper, we first discuss
why previous attempts with SR might not be applicable to verification problems.
We then propose an alternative approach to face verification via SR.
Specifically, we propose to use explicit SR encoding on local image patches
rather than the entire face. The obtained sparse signals are pooled via
averaging to form multiple region descriptors, which are then concatenated to
form an overall face descriptor. Due to the deliberate loss spatial relations
within each region (caused by averaging), the resulting descriptor is robust to
misalignment & various image deformations. Within the proposed framework, we
evaluate several SR encoding techniques: l1-minimisation, Sparse Autoencoder
Neural Network (SANN), and an implicit probabilistic technique based on
Gaussian Mixture Models. Thorough experiments on AR, FERET, exYaleB, BANCA and
ChokePoint datasets show that the proposed local SR approach obtains
considerably better and more robust performance than several previous
state-of-the-art holistic SR methods, in both verification and closed-set
identification problems. The experiments also show that l1-minimisation based
encoding has a considerably higher computational than the other techniques, but
leads to higher recognition rates.
|
1412.3506 | Jose M. Alvarez | Jose M. Alvarez and Theo Gevers and Antonio M. Lopez | Road Detection by One-Class Color Classification: Dataset and
Experiments | 10 pages | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Detecting traversable road areas ahead a moving vehicle is a key process for
modern autonomous driving systems. A common approach to road detection consists
of exploiting color features to classify pixels as road or background. These
algorithms reduce the effect of lighting variations and weather conditions by
exploiting the discriminant/invariant properties of different color
representations. Furthermore, the lack of labeled datasets has motivated the
development of algorithms performing on single images based on the assumption
that the bottom part of the image belongs to the road surface.
In this paper, we first introduce a dataset of road images taken at different
times and in different scenarios using an onboard camera. Then, we devise a
simple online algorithm and conduct an exhaustive evaluation of different
classifiers and the effect of using different color representation to
characterize pixels.
| [
{
"version": "v1",
"created": "Thu, 11 Dec 2014 00:31:37 GMT"
},
{
"version": "v2",
"created": "Thu, 18 Dec 2014 00:57:36 GMT"
}
] | 2014-12-19T00:00:00 | [
[
"Alvarez",
"Jose M.",
""
],
[
"Gevers",
"Theo",
""
],
[
"Lopez",
"Antonio M.",
""
]
] | TITLE: Road Detection by One-Class Color Classification: Dataset and
Experiments
ABSTRACT: Detecting traversable road areas ahead a moving vehicle is a key process for
modern autonomous driving systems. A common approach to road detection consists
of exploiting color features to classify pixels as road or background. These
algorithms reduce the effect of lighting variations and weather conditions by
exploiting the discriminant/invariant properties of different color
representations. Furthermore, the lack of labeled datasets has motivated the
development of algorithms performing on single images based on the assumption
that the bottom part of the image belongs to the road surface.
In this paper, we first introduce a dataset of road images taken at different
times and in different scenarios using an onboard camera. Then, we devise a
simple online algorithm and conduct an exhaustive evaluation of different
classifiers and the effect of using different color representation to
characterize pixels.
|
1412.4973 | Somnath Sikdar | Jan Dreier and Philipp Kuinke and Rafael Przybylski and Felix Reidl
and Peter Rossmanith and Somnath Sikdar | Overlapping Communities in Social Networks | null | null | null | null | cs.SI physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Complex networks can be typically broken down into groups or modules.
Discovering this "community structure" is an important step in studying the
large-scale structure of networks. Many algorithms have been proposed for
community detection and benchmarks have been created to evaluate their
performance. Typically algorithms for community detection either partition the
graph (non-overlapping communities) or find node covers (overlapping
communities).
In this paper, we propose a particularly simple semi-supervised learning
algorithm for finding out communities. In essence, given the community
information of a small number of "seed nodes", the method uses random walks
from the seed nodes to uncover the community information of the whole network.
The algorithm runs in time $O(k \cdot m \cdot \log n)$, where $m$ is the number
of edges; $n$ the number of links; and $k$ the number of communities in the
network. In sparse networks with $m = O(n)$ and a constant number of
communities, this running time is almost linear in the size of the network.
Another important feature of our algorithm is that it can be used for either
non-overlapping or overlapping communities.
We test our algorithm using the LFR benchmark created by Lancichinetti,
Fortunato, and Radicchi specifically for the purpose of evaluating such
algorithms. Our algorithm can compete with the best of algorithms for both
non-overlapping and overlapping communities as found in the comprehensive study
of Lancichinetti and Fortunato.
| [
{
"version": "v1",
"created": "Tue, 16 Dec 2014 12:18:52 GMT"
},
{
"version": "v2",
"created": "Thu, 18 Dec 2014 14:52:46 GMT"
}
] | 2014-12-19T00:00:00 | [
[
"Dreier",
"Jan",
""
],
[
"Kuinke",
"Philipp",
""
],
[
"Przybylski",
"Rafael",
""
],
[
"Reidl",
"Felix",
""
],
[
"Rossmanith",
"Peter",
""
],
[
"Sikdar",
"Somnath",
""
]
] | TITLE: Overlapping Communities in Social Networks
ABSTRACT: Complex networks can be typically broken down into groups or modules.
Discovering this "community structure" is an important step in studying the
large-scale structure of networks. Many algorithms have been proposed for
community detection and benchmarks have been created to evaluate their
performance. Typically algorithms for community detection either partition the
graph (non-overlapping communities) or find node covers (overlapping
communities).
In this paper, we propose a particularly simple semi-supervised learning
algorithm for finding out communities. In essence, given the community
information of a small number of "seed nodes", the method uses random walks
from the seed nodes to uncover the community information of the whole network.
The algorithm runs in time $O(k \cdot m \cdot \log n)$, where $m$ is the number
of edges; $n$ the number of links; and $k$ the number of communities in the
network. In sparse networks with $m = O(n)$ and a constant number of
communities, this running time is almost linear in the size of the network.
Another important feature of our algorithm is that it can be used for either
non-overlapping or overlapping communities.
We test our algorithm using the LFR benchmark created by Lancichinetti,
Fortunato, and Radicchi specifically for the purpose of evaluating such
algorithms. Our algorithm can compete with the best of algorithms for both
non-overlapping and overlapping communities as found in the comprehensive study
of Lancichinetti and Fortunato.
|
1412.5617 | Shuang Song | Shuang Song, Kamalika Chaudhuri, Anand D. Sarwate | Learning from Data with Heterogeneous Noise using SGD | null | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider learning from data of variable quality that may be obtained from
different heterogeneous sources. Addressing learning from heterogeneous data in
its full generality is a challenging problem. In this paper, we adopt instead a
model in which data is observed through heterogeneous noise, where the noise
level reflects the quality of the data source. We study how to use stochastic
gradient algorithms to learn in this model. Our study is motivated by two
concrete examples where this problem arises naturally: learning with local
differential privacy based on data from multiple sources with different privacy
requirements, and learning from data with labels of variable quality.
The main contribution of this paper is to identify how heterogeneous noise
impacts performance. We show that given two datasets with heterogeneous noise,
the order in which to use them in standard SGD depends on the learning rate. We
propose a method for changing the learning rate as a function of the
heterogeneity, and prove new regret bounds for our method in two cases of
interest. Experiments on real data show that our method performs better than
using a single learning rate and using only the less noisy of the two datasets
when the noise level is low to moderate.
| [
{
"version": "v1",
"created": "Wed, 17 Dec 2014 21:15:06 GMT"
}
] | 2014-12-19T00:00:00 | [
[
"Song",
"Shuang",
""
],
[
"Chaudhuri",
"Kamalika",
""
],
[
"Sarwate",
"Anand D.",
""
]
] | TITLE: Learning from Data with Heterogeneous Noise using SGD
ABSTRACT: We consider learning from data of variable quality that may be obtained from
different heterogeneous sources. Addressing learning from heterogeneous data in
its full generality is a challenging problem. In this paper, we adopt instead a
model in which data is observed through heterogeneous noise, where the noise
level reflects the quality of the data source. We study how to use stochastic
gradient algorithms to learn in this model. Our study is motivated by two
concrete examples where this problem arises naturally: learning with local
differential privacy based on data from multiple sources with different privacy
requirements, and learning from data with labels of variable quality.
The main contribution of this paper is to identify how heterogeneous noise
impacts performance. We show that given two datasets with heterogeneous noise,
the order in which to use them in standard SGD depends on the learning rate. We
propose a method for changing the learning rate as a function of the
heterogeneity, and prove new regret bounds for our method in two cases of
interest. Experiments on real data show that our method performs better than
using a single learning rate and using only the less noisy of the two datasets
when the noise level is low to moderate.
|
1412.5627 | Fabricio Martins Lopes | Bruno Mendes Moro Conque and Andr\'e Yoshiaki Kashiwabara and
Fabr\'icio Martins Lopes | Feature extraction from complex networks: A case of study in genomic
sequences classification | 8 pages | null | null | null | cs.CE cs.LG q-bio.QM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This work presents a new approach for classification of genomic sequences
from measurements of complex networks and information theory. For this, it is
considered the nucleotides, dinucleotides and trinucleotides of a genomic
sequence. For each of them, the entropy, sum entropy and maximum entropy values
are calculated.For each of them is also generated a network, in which the nodes
are the nucleotides, dinucleotides or trinucleotides and its edges are
estimated by observing the respective adjacency among them in the genomic
sequence. In this way, it is generated three networks, for which measures of
complex networks are extracted.These measures together with measures of
information theory comprise a feature vector representing a genomic sequence.
Thus, the feature vector is used for classification by methods such as SVM,
MultiLayer Perceptron, J48, IBK, Naive Bayes and Random Forest in order to
evaluate the proposed approach.It was adopted coding sequences, intergenic
sequences and TSS (Transcriptional Starter Sites) as datasets, for which the
better results were obtained by the Random Forest with 91.2%, followed by J48
with 89.1% and SVM with 84.8% of accuracy. These results indicate that the new
approach of feature extraction has its value, reaching good levels of
classification even considering only the genomic sequences, i.e., no other a
priori knowledge about them is considered.
| [
{
"version": "v1",
"created": "Wed, 17 Dec 2014 21:31:51 GMT"
}
] | 2014-12-19T00:00:00 | [
[
"Conque",
"Bruno Mendes Moro",
""
],
[
"Kashiwabara",
"André Yoshiaki",
""
],
[
"Lopes",
"Fabrício Martins",
""
]
] | TITLE: Feature extraction from complex networks: A case of study in genomic
sequences classification
ABSTRACT: This work presents a new approach for classification of genomic sequences
from measurements of complex networks and information theory. For this, it is
considered the nucleotides, dinucleotides and trinucleotides of a genomic
sequence. For each of them, the entropy, sum entropy and maximum entropy values
are calculated.For each of them is also generated a network, in which the nodes
are the nucleotides, dinucleotides or trinucleotides and its edges are
estimated by observing the respective adjacency among them in the genomic
sequence. In this way, it is generated three networks, for which measures of
complex networks are extracted.These measures together with measures of
information theory comprise a feature vector representing a genomic sequence.
Thus, the feature vector is used for classification by methods such as SVM,
MultiLayer Perceptron, J48, IBK, Naive Bayes and Random Forest in order to
evaluate the proposed approach.It was adopted coding sequences, intergenic
sequences and TSS (Transcriptional Starter Sites) as datasets, for which the
better results were obtained by the Random Forest with 91.2%, followed by J48
with 89.1% and SVM with 84.8% of accuracy. These results indicate that the new
approach of feature extraction has its value, reaching good levels of
classification even considering only the genomic sequences, i.e., no other a
priori knowledge about them is considered.
|
1412.5710 | Jiaqi Zhao | Jiaqi Zhao, Vitor Basto Fernandes, Licheng Jiao, Iryna Yevseyeva, Asep
Maulana, Rui Li, Thomas B\"ack, and Michael T. M. Emmerich | Multiobjective Optimization of Classifiers by Means of 3-D Convex Hull
Based Evolutionary Algorithm | 32 pages, 26 figures | null | null | null | cs.NE cs.LG | http://creativecommons.org/licenses/by/3.0/ | Finding a good classifier is a multiobjective optimization problem with
different error rates and the costs to be minimized. The receiver operating
characteristic is widely used in the machine learning community to analyze the
performance of parametric classifiers or sets of Pareto optimal classifiers. In
order to directly compare two sets of classifiers the area (or volume) under
the convex hull can be used as a scalar indicator for the performance of a set
of classifiers in receiver operating characteristic space.
Recently, the convex hull based multiobjective genetic programming algorithm
was proposed and successfully applied to maximize the convex hull area for
binary classification problems. The contribution of this paper is to extend
this algorithm for dealing with higher dimensional problem formulations. In
particular, we discuss problems where parsimony (or classifier complexity) is
stated as a third objective and multi-class classification with three different
true classification rates to be maximized.
The design of the algorithm proposed in this paper is inspired by
indicator-based evolutionary algorithms, where first a performance indicator
for a solution set is established and then a selection operator is designed
that complies with the performance indicator. In this case, the performance
indicator will be the volume under the convex hull. The algorithm is tested and
analyzed in a proof of concept study on different benchmarks that are designed
for measuring its capability to capture relevant parts of a convex hull.
Further benchmark and application studies on email classification and feature
selection round up the analysis and assess robustness and usefulness of the new
algorithm in real world settings.
| [
{
"version": "v1",
"created": "Thu, 18 Dec 2014 03:01:10 GMT"
}
] | 2014-12-19T00:00:00 | [
[
"Zhao",
"Jiaqi",
""
],
[
"Fernandes",
"Vitor Basto",
""
],
[
"Jiao",
"Licheng",
""
],
[
"Yevseyeva",
"Iryna",
""
],
[
"Maulana",
"Asep",
""
],
[
"Li",
"Rui",
""
],
[
"Bäck",
"Thomas",
""
],
[
"Emmerich",
"Michael T. M.",
""
]
] | TITLE: Multiobjective Optimization of Classifiers by Means of 3-D Convex Hull
Based Evolutionary Algorithm
ABSTRACT: Finding a good classifier is a multiobjective optimization problem with
different error rates and the costs to be minimized. The receiver operating
characteristic is widely used in the machine learning community to analyze the
performance of parametric classifiers or sets of Pareto optimal classifiers. In
order to directly compare two sets of classifiers the area (or volume) under
the convex hull can be used as a scalar indicator for the performance of a set
of classifiers in receiver operating characteristic space.
Recently, the convex hull based multiobjective genetic programming algorithm
was proposed and successfully applied to maximize the convex hull area for
binary classification problems. The contribution of this paper is to extend
this algorithm for dealing with higher dimensional problem formulations. In
particular, we discuss problems where parsimony (or classifier complexity) is
stated as a third objective and multi-class classification with three different
true classification rates to be maximized.
The design of the algorithm proposed in this paper is inspired by
indicator-based evolutionary algorithms, where first a performance indicator
for a solution set is established and then a selection operator is designed
that complies with the performance indicator. In this case, the performance
indicator will be the volume under the convex hull. The algorithm is tested and
analyzed in a proof of concept study on different benchmarks that are designed
for measuring its capability to capture relevant parts of a convex hull.
Further benchmark and application studies on email classification and feature
selection round up the analysis and assess robustness and usefulness of the new
algorithm in real world settings.
|
1412.5720 | David Budden | Madison Flannery, David M Budden and Alexandre Mendes | FlexDM: Enabling robust and reliable parallel data mining using WEKA | 4 pages, 2 figures | null | null | null | cs.MS cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Performing massive data mining experiments with multiple datasets and methods
is a common task faced by most bioinformatics and computational biology
laboratories. WEKA is a machine learning package designed to facilitate this
task by providing tools that allow researchers to select from several
classification methods and specific test strategies. Despite its popularity,
the current WEKA environment for batch experiments, namely Experimenter, has
four limitations that impact its usability: the selection of value ranges for
methods options lacks flexibility and is not intuitive; there is no support for
parallelisation when running large-scale data mining tasks; the XML schema is
difficult to read, necessitating the use of the Experimenter's graphical user
interface for generation and modification; and robustness is limited by the
fact that results are not saved until the last test has concluded.
FlexDM implements an interface to WEKA to run batch processing tasks in a
simple and intuitive way. In a short and easy-to-understand XML file, one can
define hundreds of tests to be performed on several datasets. FlexDM also
allows those tests to be executed asynchronously in parallel to take advantage
of multi-core processors, significantly increasing usability and productivity.
Results are saved incrementally for better robustness and reliability.
FlexDM is implemented in Java and runs on Windows, Linux and OSX. As we
encourage other researchers to explore and adopt our software, FlexDM is made
available as a pre-configured bootable reference environment. All code,
supporting documentation and usage examples are also available for download at
http://sourceforge.net/projects/flexdm.
| [
{
"version": "v1",
"created": "Thu, 18 Dec 2014 05:07:44 GMT"
}
] | 2014-12-19T00:00:00 | [
[
"Flannery",
"Madison",
""
],
[
"Budden",
"David M",
""
],
[
"Mendes",
"Alexandre",
""
]
] | TITLE: FlexDM: Enabling robust and reliable parallel data mining using WEKA
ABSTRACT: Performing massive data mining experiments with multiple datasets and methods
is a common task faced by most bioinformatics and computational biology
laboratories. WEKA is a machine learning package designed to facilitate this
task by providing tools that allow researchers to select from several
classification methods and specific test strategies. Despite its popularity,
the current WEKA environment for batch experiments, namely Experimenter, has
four limitations that impact its usability: the selection of value ranges for
methods options lacks flexibility and is not intuitive; there is no support for
parallelisation when running large-scale data mining tasks; the XML schema is
difficult to read, necessitating the use of the Experimenter's graphical user
interface for generation and modification; and robustness is limited by the
fact that results are not saved until the last test has concluded.
FlexDM implements an interface to WEKA to run batch processing tasks in a
simple and intuitive way. In a short and easy-to-understand XML file, one can
define hundreds of tests to be performed on several datasets. FlexDM also
allows those tests to be executed asynchronously in parallel to take advantage
of multi-core processors, significantly increasing usability and productivity.
Results are saved incrementally for better robustness and reliability.
FlexDM is implemented in Java and runs on Windows, Linux and OSX. As we
encourage other researchers to explore and adopt our software, FlexDM is made
available as a pre-configured bootable reference environment. All code,
supporting documentation and usage examples are also available for download at
http://sourceforge.net/projects/flexdm.
|
1412.5949 | Pengtao Xie | Pengtao Xie and Eric Xing | Large Scale Distributed Distance Metric Learning | null | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In large scale machine learning and data mining problems with high feature
dimensionality, the Euclidean distance between data points can be
uninformative, and Distance Metric Learning (DML) is often desired to learn a
proper similarity measure (using side information such as example data pairs
being similar or dissimilar). However, high dimensionality and large volume of
pairwise constraints in modern big data can lead to prohibitive computational
cost for both the original DML formulation in Xing et al. (2002) and later
extensions. In this paper, we present a distributed algorithm for DML, and a
large-scale implementation on a parameter server architecture. Our approach
builds on a parallelizable reformulation of Xing et al. (2002), and an
asynchronous stochastic gradient descent optimization procedure. To our
knowledge, this is the first distributed solution to DML, and we show that, on
a system with 256 CPU cores, our program is able to complete a DML task on a
dataset with 1 million data points, 22-thousand features, and 200 million
labeled data pairs, in 15 hours; and the learned metric shows great
effectiveness in properly measuring distances.
| [
{
"version": "v1",
"created": "Thu, 18 Dec 2014 17:14:34 GMT"
}
] | 2014-12-19T00:00:00 | [
[
"Xie",
"Pengtao",
""
],
[
"Xing",
"Eric",
""
]
] | TITLE: Large Scale Distributed Distance Metric Learning
ABSTRACT: In large scale machine learning and data mining problems with high feature
dimensionality, the Euclidean distance between data points can be
uninformative, and Distance Metric Learning (DML) is often desired to learn a
proper similarity measure (using side information such as example data pairs
being similar or dissimilar). However, high dimensionality and large volume of
pairwise constraints in modern big data can lead to prohibitive computational
cost for both the original DML formulation in Xing et al. (2002) and later
extensions. In this paper, we present a distributed algorithm for DML, and a
large-scale implementation on a parameter server architecture. Our approach
builds on a parallelizable reformulation of Xing et al. (2002), and an
asynchronous stochastic gradient descent optimization procedure. To our
knowledge, this is the first distributed solution to DML, and we show that, on
a system with 256 CPU cores, our program is able to complete a DML task on a
dataset with 1 million data points, 22-thousand features, and 200 million
labeled data pairs, in 15 hours; and the learned metric shows great
effectiveness in properly measuring distances.
|
1412.5968 | Andrew Lan | Andrew S. Lan, Christoph Studer, Richard G. Baraniuk | Quantized Matrix Completion for Personalized Learning | null | In Proc. 7th Intl. Conf. on Educational Data Mining, pages
280-283, July 2014 | null | null | stat.ML cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The recently proposed SPARse Factor Analysis (SPARFA) framework for
personalized learning performs factor analysis on ordinal or binary-valued
(e.g., correct/incorrect) graded learner responses to questions. The underlying
factors are termed "concepts" (or knowledge components) and are used for
learning analytics (LA), the estimation of learner concept-knowledge profiles,
and for content analytics (CA), the estimation of question-concept associations
and question difficulties. While SPARFA is a powerful tool for LA and CA, it
requires a number of algorithm parameters (including the number of concepts),
which are difficult to determine in practice. In this paper, we propose
SPARFA-Lite, a convex optimization-based method for LA that builds on matrix
completion, which only requires a single algorithm parameter and enables us to
automatically identify the required number of concepts. Using a variety of
educational datasets, we demonstrate that SPARFALite (i) achieves comparable
performance in predicting unobserved learner responses to existing methods,
including item response theory (IRT) and SPARFA, and (ii) is computationally
more efficient.
| [
{
"version": "v1",
"created": "Thu, 18 Dec 2014 17:48:17 GMT"
}
] | 2014-12-19T00:00:00 | [
[
"Lan",
"Andrew S.",
""
],
[
"Studer",
"Christoph",
""
],
[
"Baraniuk",
"Richard G.",
""
]
] | TITLE: Quantized Matrix Completion for Personalized Learning
ABSTRACT: The recently proposed SPARse Factor Analysis (SPARFA) framework for
personalized learning performs factor analysis on ordinal or binary-valued
(e.g., correct/incorrect) graded learner responses to questions. The underlying
factors are termed "concepts" (or knowledge components) and are used for
learning analytics (LA), the estimation of learner concept-knowledge profiles,
and for content analytics (CA), the estimation of question-concept associations
and question difficulties. While SPARFA is a powerful tool for LA and CA, it
requires a number of algorithm parameters (including the number of concepts),
which are difficult to determine in practice. In this paper, we propose
SPARFA-Lite, a convex optimization-based method for LA that builds on matrix
completion, which only requires a single algorithm parameter and enables us to
automatically identify the required number of concepts. Using a variety of
educational datasets, we demonstrate that SPARFALite (i) achieves comparable
performance in predicting unobserved learner responses to existing methods,
including item response theory (IRT) and SPARFA, and (ii) is computationally
more efficient.
|
1412.5984 | Swakkhar Shatabda | Muktadir Hossain, Tajkia Tasnim, Swakkhar Shatabda and Dewan M. Farid | Stochastic Local Search for Pattern Set Mining | The 8th International Conference on Software, Knowledge, Information
Management and Applications (SKIMA 2014) | null | null | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Local search methods can quickly find good quality solutions in cases where
systematic search methods might take a large amount of time. Moreover, in the
context of pattern set mining, exhaustive search methods are not applicable due
to the large search space they have to explore. In this paper, we propose the
application of stochastic local search to solve the pattern set mining.
Specifically, to the task of concept learning. We applied a number of local
search algorithms on a standard benchmark instances for pattern set mining and
the results show the potentials for further exploration.
| [
{
"version": "v1",
"created": "Thu, 18 Dec 2014 18:16:52 GMT"
}
] | 2014-12-19T00:00:00 | [
[
"Hossain",
"Muktadir",
""
],
[
"Tasnim",
"Tajkia",
""
],
[
"Shatabda",
"Swakkhar",
""
],
[
"Farid",
"Dewan M.",
""
]
] | TITLE: Stochastic Local Search for Pattern Set Mining
ABSTRACT: Local search methods can quickly find good quality solutions in cases where
systematic search methods might take a large amount of time. Moreover, in the
context of pattern set mining, exhaustive search methods are not applicable due
to the large search space they have to explore. In this paper, we propose the
application of stochastic local search to solve the pattern set mining.
Specifically, to the task of concept learning. We applied a number of local
search algorithms on a standard benchmark instances for pattern set mining and
the results show the potentials for further exploration.
|
1412.6018 | Rachada Kongkachandra Asst.Prof.Dr. | Sirisak Visessenee, Sanparith Marukatat, and Rachada Kongkachandra | Automatic Training Data Synthesis for Handwriting Recognition Using the
Structural Crossing-Over Technique | 8 pages, 6 figures | International Journal of Artificial Intelligence & Applications
(IJAIA), Vol. 5, No. 5, September 2014 | null | null | cs.CV cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The paper presents a novel technique called "Structural Crossing-Over" to
synthesize qualified data for training machine learning-based handwriting
recognition. The proposed technique can provide a greater variety of patterns
of training data than the existing approaches such as elastic distortion and
tangent-based affine transformation. A couple of training characters are
chosen, then they are analyzed by their similar and different structures, and
finally are crossed over to generate the new characters. The experiments are
set to compare the performances of tangent-based affine transformation and the
proposed approach in terms of the variety of generated characters and percent
of recognition errors. The standard MNIST corpus including 60,000 training
characters and 10,000 test characters is employed in the experiments. The
proposed technique uses 1,000 characters to synthesize 60,000 characters, and
then uses these data to train and test the benchmark handwriting recognition
system that exploits Histogram of Gradient (HOG) as features and Support Vector
Machine (SVM) as recognizer. The experimental result yields 8.06% of errors. It
significantly outperforms the tangent-based affine transformation and the
original MNIST training data, which are 11.74% and 16.55%, respectively.
| [
{
"version": "v1",
"created": "Thu, 9 Oct 2014 04:32:20 GMT"
}
] | 2014-12-19T00:00:00 | [
[
"Visessenee",
"Sirisak",
""
],
[
"Marukatat",
"Sanparith",
""
],
[
"Kongkachandra",
"Rachada",
""
]
] | TITLE: Automatic Training Data Synthesis for Handwriting Recognition Using the
Structural Crossing-Over Technique
ABSTRACT: The paper presents a novel technique called "Structural Crossing-Over" to
synthesize qualified data for training machine learning-based handwriting
recognition. The proposed technique can provide a greater variety of patterns
of training data than the existing approaches such as elastic distortion and
tangent-based affine transformation. A couple of training characters are
chosen, then they are analyzed by their similar and different structures, and
finally are crossed over to generate the new characters. The experiments are
set to compare the performances of tangent-based affine transformation and the
proposed approach in terms of the variety of generated characters and percent
of recognition errors. The standard MNIST corpus including 60,000 training
characters and 10,000 test characters is employed in the experiments. The
proposed technique uses 1,000 characters to synthesize 60,000 characters, and
then uses these data to train and test the benchmark handwriting recognition
system that exploits Histogram of Gradient (HOG) as features and Support Vector
Machine (SVM) as recognizer. The experimental result yields 8.06% of errors. It
significantly outperforms the tangent-based affine transformation and the
original MNIST training data, which are 11.74% and 16.55%, respectively.
|
1302.0296 | Navid Naderializadeh | Navid Naderializadeh, A. Salman Avestimehr | Interference Networks with No CSIT: Impact of Topology | Accepted for Publication in IEEE Transactions on Information Theory | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider partially-connected $K$-user interference networks, where the
transmitters have no knowledge about the channel gain values, but they are
aware of network topology (or connectivity). We introduce several linear
algebraic and graph theoretic concepts to derive new topology-based outer
bounds and inner bounds on the symmetric degrees-of-freedom (DoF) of these
networks. We evaluate our bounds for two classes of networks to demonstrate
their tightness for most networks in these classes, quantify the gain of our
inner bounds over benchmark interference management strategies, and illustrate
the effect of network topology on these gains.
| [
{
"version": "v1",
"created": "Fri, 1 Feb 2013 21:22:16 GMT"
},
{
"version": "v2",
"created": "Wed, 17 Dec 2014 07:45:20 GMT"
}
] | 2014-12-18T00:00:00 | [
[
"Naderializadeh",
"Navid",
""
],
[
"Avestimehr",
"A. Salman",
""
]
] | TITLE: Interference Networks with No CSIT: Impact of Topology
ABSTRACT: We consider partially-connected $K$-user interference networks, where the
transmitters have no knowledge about the channel gain values, but they are
aware of network topology (or connectivity). We introduce several linear
algebraic and graph theoretic concepts to derive new topology-based outer
bounds and inner bounds on the symmetric degrees-of-freedom (DoF) of these
networks. We evaluate our bounds for two classes of networks to demonstrate
their tightness for most networks in these classes, quantify the gain of our
inner bounds over benchmark interference management strategies, and illustrate
the effect of network topology on these gains.
|
1309.4796 | Lijun Peng | Lijun Peng, Luis Carvalho | Bayesian Degree-Corrected Stochastic Blockmodels for Community Detection | 23 pages, 9 figures | null | null | null | stat.ME cs.SI physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Community detection in networks has drawn much attention in diverse fields,
especially social sciences. Given its significance, there has been a large body
of literature with approaches from many fields. Here we present a statistical
framework that is representative, extensible, and that yields an estimator with
good properties. Our proposed approach considers a stochastic blockmodel based
on a logistic regression formulation with node correction terms. We follow a
Bayesian approach that explicitly captures the community behavior via prior
specification. We further adopt a data augmentation strategy with latent
Polya-Gamma variables to obtain posterior samples. We conduct inference based
on a principled, canonically mapped centroid estimator that formally addresses
label non-identifiability and captures representative community assignments. We
demonstrate the proposed model and estimation on real-world as well as
simulated benchmark networks and show that the proposed model and estimator are
more flexible, representative, and yield smaller error rates when compared to
the MAP estimator from classical degree-corrected stochastic blockmodels.
| [
{
"version": "v1",
"created": "Wed, 18 Sep 2013 21:14:45 GMT"
},
{
"version": "v2",
"created": "Wed, 17 Dec 2014 17:50:02 GMT"
}
] | 2014-12-18T00:00:00 | [
[
"Peng",
"Lijun",
""
],
[
"Carvalho",
"Luis",
""
]
] | TITLE: Bayesian Degree-Corrected Stochastic Blockmodels for Community Detection
ABSTRACT: Community detection in networks has drawn much attention in diverse fields,
especially social sciences. Given its significance, there has been a large body
of literature with approaches from many fields. Here we present a statistical
framework that is representative, extensible, and that yields an estimator with
good properties. Our proposed approach considers a stochastic blockmodel based
on a logistic regression formulation with node correction terms. We follow a
Bayesian approach that explicitly captures the community behavior via prior
specification. We further adopt a data augmentation strategy with latent
Polya-Gamma variables to obtain posterior samples. We conduct inference based
on a principled, canonically mapped centroid estimator that formally addresses
label non-identifiability and captures representative community assignments. We
demonstrate the proposed model and estimation on real-world as well as
simulated benchmark networks and show that the proposed model and estimator are
more flexible, representative, and yield smaller error rates when compared to
the MAP estimator from classical degree-corrected stochastic blockmodels.
|
1412.5448 | Micka\"el Poussevin | Micka\"el Poussevin and Vincent Guigue and Patrick Gallinari | Extended Recommendation Framework: Generating the Text of a User Review
as a Personalized Summary | null | null | null | null | cs.IR cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose to augment rating based recommender systems by providing the user
with additional information which might help him in his choice or in the
understanding of the recommendation. We consider here as a new task, the
generation of personalized reviews associated to items. We use an extractive
summary formulation for generating these reviews. We also show that the two
information sources, ratings and items could be used both for estimating
ratings and for generating summaries, leading to improved performance for each
system compared to the use of a single source. Besides these two contributions,
we show how a personalized polarity classifier can integrate the rating and
textual aspects. Overall, the proposed system offers the user three
personalized hints for a recommendation: rating, text and polarity. We evaluate
these three components on two datasets using appropriate measures for each
task.
| [
{
"version": "v1",
"created": "Wed, 17 Dec 2014 15:46:28 GMT"
}
] | 2014-12-18T00:00:00 | [
[
"Poussevin",
"Mickaël",
""
],
[
"Guigue",
"Vincent",
""
],
[
"Gallinari",
"Patrick",
""
]
] | TITLE: Extended Recommendation Framework: Generating the Text of a User Review
as a Personalized Summary
ABSTRACT: We propose to augment rating based recommender systems by providing the user
with additional information which might help him in his choice or in the
understanding of the recommendation. We consider here as a new task, the
generation of personalized reviews associated to items. We use an extractive
summary formulation for generating these reviews. We also show that the two
information sources, ratings and items could be used both for estimating
ratings and for generating summaries, leading to improved performance for each
system compared to the use of a single source. Besides these two contributions,
we show how a personalized polarity classifier can integrate the rating and
textual aspects. Overall, the proposed system offers the user three
personalized hints for a recommendation: rating, text and polarity. We evaluate
these three components on two datasets using appropriate measures for each
task.
|
1412.5488 | Ashirbani Saha | Ashirbani Saha, Q. M. Jonathan Wu | Full-reference image quality assessment by combining global and local
distortion measures | 31 pages, 8 figures, 2 tables | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Full-reference image quality assessment (FR-IQA) techniques compare a
reference and a distorted/test image and predict the perceptual quality of the
test image in terms of a scalar value representing an objective score. The
evaluation of FR-IQA techniques is carried out by comparing the objective
scores from the techniques with the subjective scores (obtained from human
observers) provided in the image databases used for the IQA. Hence, we
reasonably assume that the goal of a human observer is to rate the distortion
present in the test image. The goal oriented tasks are processed by the human
visual system (HVS) through top-down processing which actively searches for
local distortions driven by the goal. Therefore local distortion measures in an
image are important for the top-down processing. At the same time, bottom-up
processing also takes place signifying spontaneous visual functions in the HVS.
To account for this, global perceptual features can be used. Therefore, we
hypothesize that the resulting objective score for an image can be derived from
the combination of local and global distortion measures calculated from the
reference and test images. We calculate the local distortion by measuring the
local correlation differences from the gradient and contrast information. For
global distortion, dissimilarity of the saliency maps computed from a bottom-up
model of saliency is used. The motivation behind the proposed approach has been
thoroughly discussed, accompanied by an intuitive analysis. Finally,
experiments are conducted in six benchmark databases suggesting the
effectiveness of the proposed approach that achieves competitive performance
with the state-of-the-art methods providing an improvement in the overall
performance.
| [
{
"version": "v1",
"created": "Wed, 17 Dec 2014 17:15:12 GMT"
}
] | 2014-12-18T00:00:00 | [
[
"Saha",
"Ashirbani",
""
],
[
"Wu",
"Q. M. Jonathan",
""
]
] | TITLE: Full-reference image quality assessment by combining global and local
distortion measures
ABSTRACT: Full-reference image quality assessment (FR-IQA) techniques compare a
reference and a distorted/test image and predict the perceptual quality of the
test image in terms of a scalar value representing an objective score. The
evaluation of FR-IQA techniques is carried out by comparing the objective
scores from the techniques with the subjective scores (obtained from human
observers) provided in the image databases used for the IQA. Hence, we
reasonably assume that the goal of a human observer is to rate the distortion
present in the test image. The goal oriented tasks are processed by the human
visual system (HVS) through top-down processing which actively searches for
local distortions driven by the goal. Therefore local distortion measures in an
image are important for the top-down processing. At the same time, bottom-up
processing also takes place signifying spontaneous visual functions in the HVS.
To account for this, global perceptual features can be used. Therefore, we
hypothesize that the resulting objective score for an image can be derived from
the combination of local and global distortion measures calculated from the
reference and test images. We calculate the local distortion by measuring the
local correlation differences from the gradient and contrast information. For
global distortion, dissimilarity of the saliency maps computed from a bottom-up
model of saliency is used. The motivation behind the proposed approach has been
thoroughly discussed, accompanied by an intuitive analysis. Finally,
experiments are conducted in six benchmark databases suggesting the
effectiveness of the proposed approach that achieves competitive performance
with the state-of-the-art methods providing an improvement in the overall
performance.
|
1412.5513 | Engelbert Mephu Nguifo | Cyrine Arouri, Engelbert Mephu Nguifo, Sabeur Aridhi, C\'ecile
Roucelle, Gaelle Bonnet-Loosli, Norbert Tsopz\'e | Towards a constructive multilayer perceptron for regression task using
non-parametric clustering. A case study of Photo-Z redshift reconstruction | null | null | null | null | cs.NE cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The choice of architecture of artificial neuron network (ANN) is still a
challenging task that users face every time. It greatly affects the accuracy of
the built network. In fact there is no optimal method that is applicable to
various implementations at the same time. In this paper we propose a method to
construct ANN based on clustering, that resolves the problems of random and ad
hoc approaches for multilayer ANN architecture. Our method can be applied to
regression problems. Experimental results obtained with different datasets,
reveals the efficiency of our method.
| [
{
"version": "v1",
"created": "Wed, 17 Dec 2014 18:36:23 GMT"
}
] | 2014-12-18T00:00:00 | [
[
"Arouri",
"Cyrine",
""
],
[
"Nguifo",
"Engelbert Mephu",
""
],
[
"Aridhi",
"Sabeur",
""
],
[
"Roucelle",
"Cécile",
""
],
[
"Bonnet-Loosli",
"Gaelle",
""
],
[
"Tsopzé",
"Norbert",
""
]
] | TITLE: Towards a constructive multilayer perceptron for regression task using
non-parametric clustering. A case study of Photo-Z redshift reconstruction
ABSTRACT: The choice of architecture of artificial neuron network (ANN) is still a
challenging task that users face every time. It greatly affects the accuracy of
the built network. In fact there is no optimal method that is applicable to
various implementations at the same time. In this paper we propose a method to
construct ANN based on clustering, that resolves the problems of random and ad
hoc approaches for multilayer ANN architecture. Our method can be applied to
regression problems. Experimental results obtained with different datasets,
reveals the efficiency of our method.
|
1411.4044 | Todor Ivanov | Todor Ivanov, Raik Niemann, Sead Izberovic, Marten Rosselli, Karsten
Tolle, Roberto V. Zicari | Benchmarking DataStax Enterprise/Cassandra with HiBench | arXiv admin note: substantial text overlap with arXiv:1411.3811 | null | null | Technical Report No. 2014-2 | cs.DC cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This report evaluates the new analytical capabilities of DataStax Enterprise
(DSE) [1] through the use of standard Hadoop workloads. In particular, we run
experiments with CPU and I/O bound micro-benchmarks as well as OLAP-style
analytical query workloads. The performed tests should show that DSE is capable
of successfully executing Hadoop applications without the need to adapt them
for the underlying Cassandra distributed storage system [2]. Due to the
Cassandra File System (CFS) [3], which supports the Hadoop Distributed File
System API, Hadoop stack applications should seamlessly run in DSE. The report
is structured as follows: Section 2 provides a brief description of the
technologies involved in our study. An overview of our used hardware and
software components of the experimental environment is given in Section 3. Our
benchmark methodology is defined in Section 4. The performed experiments
together with the evaluation of the results are presented in Section 5.
Finally, Section 6 concludes with lessons learned.
| [
{
"version": "v1",
"created": "Fri, 14 Nov 2014 07:17:54 GMT"
},
{
"version": "v2",
"created": "Tue, 16 Dec 2014 14:34:47 GMT"
}
] | 2014-12-17T00:00:00 | [
[
"Ivanov",
"Todor",
""
],
[
"Niemann",
"Raik",
""
],
[
"Izberovic",
"Sead",
""
],
[
"Rosselli",
"Marten",
""
],
[
"Tolle",
"Karsten",
""
],
[
"Zicari",
"Roberto V.",
""
]
] | TITLE: Benchmarking DataStax Enterprise/Cassandra with HiBench
ABSTRACT: This report evaluates the new analytical capabilities of DataStax Enterprise
(DSE) [1] through the use of standard Hadoop workloads. In particular, we run
experiments with CPU and I/O bound micro-benchmarks as well as OLAP-style
analytical query workloads. The performed tests should show that DSE is capable
of successfully executing Hadoop applications without the need to adapt them
for the underlying Cassandra distributed storage system [2]. Due to the
Cassandra File System (CFS) [3], which supports the Hadoop Distributed File
System API, Hadoop stack applications should seamlessly run in DSE. The report
is structured as follows: Section 2 provides a brief description of the
technologies involved in our study. An overview of our used hardware and
software components of the experimental environment is given in Section 3. Our
benchmark methodology is defined in Section 4. The performed experiments
together with the evaluation of the results are presented in Section 5.
Finally, Section 6 concludes with lessons learned.
|
1412.4842 | Mingjie Tang | Mingjie Tang, Ruby Y.Tahboub, Walid G.Are, Mikhail J. Atallah,
Qutaibah M. Malluhi, Mourad Ouzzani, and Yasin N. Silva | Similarity Group-by Operators for Multi-dimensional Relational Data | submit to TKDE | null | null | null | cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The SQL group-by operator plays an important role in summarizing and
aggregating large datasets in a data analytic stack.While the standard group-by
operator, which is based on equality, is useful in several applications,
allowing similarity aware grouping provides a more realistic view on real-world
data that could lead to better insights. The Similarity SQL-based Group-By
operator (SGB, for short) extends the semantics of the standard SQL Group-by by
grouping data with similar but not necessarily equal values. While existing
similarity-based grouping operators efficiently materialize this approximate
semantics, they primarily focus on one-dimensional attributes and treat
multidimensional attributes independently. However, correlated attributes, such
as in spatial data, are processed independently, and hence, groups in the
multidimensional space are not detected properly. To address this problem, we
introduce two new SGB operators for multidimensional data. The first operator
is the clique (or distance-to-all) SGB, where all the tuples in a group are
within some distance from each other. The second operator is the
distance-to-any SGB, where a tuple belongs to a group if the tuple is within
some distance from any other tuple in the group. We implement and test the new
SGB operators and their algorithms inside PostgreSQL. The overhead introduced
by these operators proves to be minimal and the execution times are comparable
to those of the standard Group-by. The experimental study, based on TPC-H and a
social check-in data, demonstrates that the proposed algorithms can achieve up
to three orders of magnitude enhancement in performance over baseline methods
developed to solve the same problem.
| [
{
"version": "v1",
"created": "Tue, 16 Dec 2014 00:27:52 GMT"
}
] | 2014-12-17T00:00:00 | [
[
"Tang",
"Mingjie",
""
],
[
"Tahboub",
"Ruby Y.",
""
],
[
"Are",
"Walid G.",
""
],
[
"Atallah",
"Mikhail J.",
""
],
[
"Malluhi",
"Qutaibah M.",
""
],
[
"Ouzzani",
"Mourad",
""
],
[
"Silva",
"Yasin N.",
""
]
] | TITLE: Similarity Group-by Operators for Multi-dimensional Relational Data
ABSTRACT: The SQL group-by operator plays an important role in summarizing and
aggregating large datasets in a data analytic stack.While the standard group-by
operator, which is based on equality, is useful in several applications,
allowing similarity aware grouping provides a more realistic view on real-world
data that could lead to better insights. The Similarity SQL-based Group-By
operator (SGB, for short) extends the semantics of the standard SQL Group-by by
grouping data with similar but not necessarily equal values. While existing
similarity-based grouping operators efficiently materialize this approximate
semantics, they primarily focus on one-dimensional attributes and treat
multidimensional attributes independently. However, correlated attributes, such
as in spatial data, are processed independently, and hence, groups in the
multidimensional space are not detected properly. To address this problem, we
introduce two new SGB operators for multidimensional data. The first operator
is the clique (or distance-to-all) SGB, where all the tuples in a group are
within some distance from each other. The second operator is the
distance-to-any SGB, where a tuple belongs to a group if the tuple is within
some distance from any other tuple in the group. We implement and test the new
SGB operators and their algorithms inside PostgreSQL. The overhead introduced
by these operators proves to be minimal and the execution times are comparable
to those of the standard Group-by. The experimental study, based on TPC-H and a
social check-in data, demonstrates that the proposed algorithms can achieve up
to three orders of magnitude enhancement in performance over baseline methods
developed to solve the same problem.
|
1412.4864 | Philip Bachman | Philip Bachman and Ouais Alsharif and Doina Precup | Learning with Pseudo-Ensembles | To appear in Advances in Neural Information Processing Systems 27
(NIPS 2014), Advances in Neural Information Processing Systems 27, Dec. 2014 | null | null | null | stat.ML cs.LG cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We formalize the notion of a pseudo-ensemble, a (possibly infinite)
collection of child models spawned from a parent model by perturbing it
according to some noise process. E.g., dropout (Hinton et. al, 2012) in a deep
neural network trains a pseudo-ensemble of child subnetworks generated by
randomly masking nodes in the parent network. We present a novel regularizer
based on making the behavior of a pseudo-ensemble robust with respect to the
noise process generating it. In the fully-supervised setting, our regularizer
matches the performance of dropout. But, unlike dropout, our regularizer
naturally extends to the semi-supervised setting, where it produces
state-of-the-art results. We provide a case study in which we transform the
Recursive Neural Tensor Network of (Socher et. al, 2013) into a
pseudo-ensemble, which significantly improves its performance on a real-world
sentiment analysis benchmark.
| [
{
"version": "v1",
"created": "Tue, 16 Dec 2014 02:55:05 GMT"
}
] | 2014-12-17T00:00:00 | [
[
"Bachman",
"Philip",
""
],
[
"Alsharif",
"Ouais",
""
],
[
"Precup",
"Doina",
""
]
] | TITLE: Learning with Pseudo-Ensembles
ABSTRACT: We formalize the notion of a pseudo-ensemble, a (possibly infinite)
collection of child models spawned from a parent model by perturbing it
according to some noise process. E.g., dropout (Hinton et. al, 2012) in a deep
neural network trains a pseudo-ensemble of child subnetworks generated by
randomly masking nodes in the parent network. We present a novel regularizer
based on making the behavior of a pseudo-ensemble robust with respect to the
noise process generating it. In the fully-supervised setting, our regularizer
matches the performance of dropout. But, unlike dropout, our regularizer
naturally extends to the semi-supervised setting, where it produces
state-of-the-art results. We provide a case study in which we transform the
Recursive Neural Tensor Network of (Socher et. al, 2013) into a
pseudo-ensemble, which significantly improves its performance on a real-world
sentiment analysis benchmark.
|
1412.4967 | Anthony Knittel | Anthony Knittel, Alan Blair | Sparse, guided feature connections in an Abstract Deep Network | null | null | null | null | cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present a technique for developing a network of re-used features, where
the topology is formed using a coarse learning method, that allows
gradient-descent fine tuning, known as an Abstract Deep Network (ADN). New
features are built based on observed co-occurrences, and the network is
maintained using a selection process related to evolutionary algorithms. This
allows coarse ex- ploration of the problem space, effective for irregular
domains, while gradient descent allows pre- cise solutions. Accuracy on
standard UCI and Protein-Structure Prediction problems is comparable with
benchmark SVM and optimized GBML approaches, and shows scalability for
addressing large problems. The discrete implementation is symbolic, allowing
interpretability, while the continuous method using fine-tuning shows improved
accuracy. The binary multiplexer problem is explored, as an irregular domain
that does not support gradient descent learning, showing solution to the bench-
mark 135-bit problem. A convolutional implementation is demonstrated on image
classification, showing an error-rate of 0.79% on the MNIST problem, without a
pre-defined topology. The ADN system provides a method for developing a very
sparse, deep feature topology, based on observed relationships between
features, that is able to find solutions in irregular domains, and initialize a
network prior to gradient descent learning.
| [
{
"version": "v1",
"created": "Tue, 16 Dec 2014 12:04:35 GMT"
}
] | 2014-12-17T00:00:00 | [
[
"Knittel",
"Anthony",
""
],
[
"Blair",
"Alan",
""
]
] | TITLE: Sparse, guided feature connections in an Abstract Deep Network
ABSTRACT: We present a technique for developing a network of re-used features, where
the topology is formed using a coarse learning method, that allows
gradient-descent fine tuning, known as an Abstract Deep Network (ADN). New
features are built based on observed co-occurrences, and the network is
maintained using a selection process related to evolutionary algorithms. This
allows coarse ex- ploration of the problem space, effective for irregular
domains, while gradient descent allows pre- cise solutions. Accuracy on
standard UCI and Protein-Structure Prediction problems is comparable with
benchmark SVM and optimized GBML approaches, and shows scalability for
addressing large problems. The discrete implementation is symbolic, allowing
interpretability, while the continuous method using fine-tuning shows improved
accuracy. The binary multiplexer problem is explored, as an irregular domain
that does not support gradient descent learning, showing solution to the bench-
mark 135-bit problem. A convolutional implementation is demonstrated on image
classification, showing an error-rate of 0.79% on the MNIST problem, without a
pre-defined topology. The ADN system provides a method for developing a very
sparse, deep feature topology, based on observed relationships between
features, that is able to find solutions in irregular domains, and initialize a
network prior to gradient descent learning.
|
1412.5067 | Anton Eremeev | A. V. Eremeev, Ju. V. Kovalenko | Analysis of Optimal Recombination in Genetic Algorithm for a Scheduling
Problem with Setups | 13 pages, in Russian | null | null | null | cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we perform an experimental study of optimal recombination
operator for makespan minimization problem on single machine with
sequence-dependent setup times ($1|s_{vu}|C_{\max}$). The computational
experiment on benchmark problems from TSPLIB library indicates practical
applicability of optimal recombination in crossover operator of genetic
algorithm for $1|s_{vu}|C_{\max}$.
| [
{
"version": "v1",
"created": "Tue, 16 Dec 2014 16:29:34 GMT"
}
] | 2014-12-17T00:00:00 | [
[
"Eremeev",
"A. V.",
""
],
[
"Kovalenko",
"Ju. V.",
""
]
] | TITLE: Analysis of Optimal Recombination in Genetic Algorithm for a Scheduling
Problem with Setups
ABSTRACT: In this paper, we perform an experimental study of optimal recombination
operator for makespan minimization problem on single machine with
sequence-dependent setup times ($1|s_{vu}|C_{\max}$). The computational
experiment on benchmark problems from TSPLIB library indicates practical
applicability of optimal recombination in crossover operator of genetic
algorithm for $1|s_{vu}|C_{\max}$.
|
1412.5104 | Angjoo Kanazawa | Angjoo Kanazawa, Abhishek Sharma, David Jacobs | Locally Scale-Invariant Convolutional Neural Networks | Deep Learning and Representation Learning Workshop: NIPS 2014 | null | null | null | cs.CV cs.LG cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Convolutional Neural Networks (ConvNets) have shown excellent results on many
visual classification tasks. With the exception of ImageNet, these datasets are
carefully crafted such that objects are well-aligned at similar scales.
Naturally, the feature learning problem gets more challenging as the amount of
variation in the data increases, as the models have to learn to be invariant to
certain changes in appearance. Recent results on the ImageNet dataset show that
given enough data, ConvNets can learn such invariances producing very
discriminative features [1]. But could we do more: use less parameters, less
data, learn more discriminative features, if certain invariances were built
into the learning process? In this paper we present a simple model that allows
ConvNets to learn features in a locally scale-invariant manner without
increasing the number of model parameters. We show on a modified MNIST dataset
that when faced with scale variation, building in scale-invariance allows
ConvNets to learn more discriminative features with reduced chances of
over-fitting.
| [
{
"version": "v1",
"created": "Tue, 16 Dec 2014 18:09:34 GMT"
}
] | 2014-12-17T00:00:00 | [
[
"Kanazawa",
"Angjoo",
""
],
[
"Sharma",
"Abhishek",
""
],
[
"Jacobs",
"David",
""
]
] | TITLE: Locally Scale-Invariant Convolutional Neural Networks
ABSTRACT: Convolutional Neural Networks (ConvNets) have shown excellent results on many
visual classification tasks. With the exception of ImageNet, these datasets are
carefully crafted such that objects are well-aligned at similar scales.
Naturally, the feature learning problem gets more challenging as the amount of
variation in the data increases, as the models have to learn to be invariant to
certain changes in appearance. Recent results on the ImageNet dataset show that
given enough data, ConvNets can learn such invariances producing very
discriminative features [1]. But could we do more: use less parameters, less
data, learn more discriminative features, if certain invariances were built
into the learning process? In this paper we present a simple model that allows
ConvNets to learn features in a locally scale-invariant manner without
increasing the number of model parameters. We show on a modified MNIST dataset
that when faced with scale variation, building in scale-invariance allows
ConvNets to learn more discriminative features with reduced chances of
over-fitting.
|
1409.3215 | Ilya Sutskever | Ilya Sutskever and Oriol Vinyals and Quoc V. Le | Sequence to Sequence Learning with Neural Networks | 9 pages | null | null | null | cs.CL cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Deep Neural Networks (DNNs) are powerful models that have achieved excellent
performance on difficult learning tasks. Although DNNs work well whenever large
labeled training sets are available, they cannot be used to map sequences to
sequences. In this paper, we present a general end-to-end approach to sequence
learning that makes minimal assumptions on the sequence structure. Our method
uses a multilayered Long Short-Term Memory (LSTM) to map the input sequence to
a vector of a fixed dimensionality, and then another deep LSTM to decode the
target sequence from the vector. Our main result is that on an English to
French translation task from the WMT'14 dataset, the translations produced by
the LSTM achieve a BLEU score of 34.8 on the entire test set, where the LSTM's
BLEU score was penalized on out-of-vocabulary words. Additionally, the LSTM did
not have difficulty on long sentences. For comparison, a phrase-based SMT
system achieves a BLEU score of 33.3 on the same dataset. When we used the LSTM
to rerank the 1000 hypotheses produced by the aforementioned SMT system, its
BLEU score increases to 36.5, which is close to the previous best result on
this task. The LSTM also learned sensible phrase and sentence representations
that are sensitive to word order and are relatively invariant to the active and
the passive voice. Finally, we found that reversing the order of the words in
all source sentences (but not target sentences) improved the LSTM's performance
markedly, because doing so introduced many short term dependencies between the
source and the target sentence which made the optimization problem easier.
| [
{
"version": "v1",
"created": "Wed, 10 Sep 2014 19:55:35 GMT"
},
{
"version": "v2",
"created": "Wed, 29 Oct 2014 12:13:17 GMT"
},
{
"version": "v3",
"created": "Sun, 14 Dec 2014 20:59:51 GMT"
}
] | 2014-12-16T00:00:00 | [
[
"Sutskever",
"Ilya",
""
],
[
"Vinyals",
"Oriol",
""
],
[
"Le",
"Quoc V.",
""
]
] | TITLE: Sequence to Sequence Learning with Neural Networks
ABSTRACT: Deep Neural Networks (DNNs) are powerful models that have achieved excellent
performance on difficult learning tasks. Although DNNs work well whenever large
labeled training sets are available, they cannot be used to map sequences to
sequences. In this paper, we present a general end-to-end approach to sequence
learning that makes minimal assumptions on the sequence structure. Our method
uses a multilayered Long Short-Term Memory (LSTM) to map the input sequence to
a vector of a fixed dimensionality, and then another deep LSTM to decode the
target sequence from the vector. Our main result is that on an English to
French translation task from the WMT'14 dataset, the translations produced by
the LSTM achieve a BLEU score of 34.8 on the entire test set, where the LSTM's
BLEU score was penalized on out-of-vocabulary words. Additionally, the LSTM did
not have difficulty on long sentences. For comparison, a phrase-based SMT
system achieves a BLEU score of 33.3 on the same dataset. When we used the LSTM
to rerank the 1000 hypotheses produced by the aforementioned SMT system, its
BLEU score increases to 36.5, which is close to the previous best result on
this task. The LSTM also learned sensible phrase and sentence representations
that are sensitive to word order and are relatively invariant to the active and
the passive voice. Finally, we found that reversing the order of the words in
all source sentences (but not target sentences) improved the LSTM's performance
markedly, because doing so introduced many short term dependencies between the
source and the target sentence which made the optimization problem easier.
|
1412.4183 | Eugene Borovikov | Eugene Borovikov | A survey of modern optical character recognition techniques | Technical report surveying OCR/ICR and document understanding methods
as of 2004.It contains 38 pages, numerous figures, 93 references, and
provides a table of contents | null | null | null | cs.CV | http://creativecommons.org/licenses/publicdomain/ | This report explores the latest advances in the field of digital document
recognition. With the focus on printed document imagery, we discuss the major
developments in optical character recognition (OCR) and document image
enhancement/restoration in application to Latin and non-Latin scripts. In
addition, we review and discuss the available technologies for hand-written
document recognition. In this report, we also provide some company-accumulated
benchmark results on available OCR engines.
| [
{
"version": "v1",
"created": "Sat, 13 Dec 2014 02:39:09 GMT"
}
] | 2014-12-16T00:00:00 | [
[
"Borovikov",
"Eugene",
""
]
] | TITLE: A survey of modern optical character recognition techniques
ABSTRACT: This report explores the latest advances in the field of digital document
recognition. With the focus on printed document imagery, we discuss the major
developments in optical character recognition (OCR) and document image
enhancement/restoration in application to Latin and non-Latin scripts. In
addition, we review and discuss the available technologies for hand-written
document recognition. In this report, we also provide some company-accumulated
benchmark results on available OCR engines.
|
1412.4196 | Yuanting Hu | Yuan-Ting Hu and Yen-Yu Lin and Hsin-Yi Chen and Kuang-Jui Hsu and
Bing-Yu Chen | Descriptor Ensemble: An Unsupervised Approach to Descriptor Fusion in
the Homography Space | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | With the aim to improve the performance of feature matching, we present an
unsupervised approach to fuse various local descriptors in the space of
homographies. Inspired by the observation that the homographies of correct
feature correspondences vary smoothly along the spatial domain, our approach
stands on the unsupervised nature of feature matching, and can select a good
descriptor for matching each feature point. Specifically, the homography space
serves as the common domain, in which a correspondence obtained by any
descriptor is considered as a point, for integrating various heterogeneous
descriptors. Both geometric coherence and spatial continuity among
correspondences are considered via computing their geodesic distances in the
space. In this way, mutual verification across different descriptors is
allowed, and correct correspondences will be highlighted with a high degree of
consistency (i.e., short geodesic distances here). It follows that one-class
SVM can be applied to identifying these correct correspondences, and boosts the
performance of feature matching. The proposed approach is comprehensively
compared with the state-of-the-art approaches, and evaluated on four benchmarks
of image matching. The promising results manifest its effectiveness.
| [
{
"version": "v1",
"created": "Sat, 13 Dec 2014 06:39:04 GMT"
}
] | 2014-12-16T00:00:00 | [
[
"Hu",
"Yuan-Ting",
""
],
[
"Lin",
"Yen-Yu",
""
],
[
"Chen",
"Hsin-Yi",
""
],
[
"Hsu",
"Kuang-Jui",
""
],
[
"Chen",
"Bing-Yu",
""
]
] | TITLE: Descriptor Ensemble: An Unsupervised Approach to Descriptor Fusion in
the Homography Space
ABSTRACT: With the aim to improve the performance of feature matching, we present an
unsupervised approach to fuse various local descriptors in the space of
homographies. Inspired by the observation that the homographies of correct
feature correspondences vary smoothly along the spatial domain, our approach
stands on the unsupervised nature of feature matching, and can select a good
descriptor for matching each feature point. Specifically, the homography space
serves as the common domain, in which a correspondence obtained by any
descriptor is considered as a point, for integrating various heterogeneous
descriptors. Both geometric coherence and spatial continuity among
correspondences are considered via computing their geodesic distances in the
space. In this way, mutual verification across different descriptors is
allowed, and correct correspondences will be highlighted with a high degree of
consistency (i.e., short geodesic distances here). It follows that one-class
SVM can be applied to identifying these correct correspondences, and boosts the
performance of feature matching. The proposed approach is comprehensively
compared with the state-of-the-art approaches, and evaluated on four benchmarks
of image matching. The promising results manifest its effectiveness.
|
1412.4378 | Bharath Kumar Samanthula | Bharath K. Samanthula, Fang-Yu Rao, Elisa Bertino, Xun Yi, Dongxi Liu | Privacy-Preserving and Outsourced Multi-User k-Means Clustering | 16 pages, 2 figures, 5 tables | null | null | null | cs.CR cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Many techniques for privacy-preserving data mining (PPDM) have been
investigated over the past decade. Often, the entities involved in the data
mining process are end-users or organizations with limited computing and
storage resources. As a result, such entities may want to refrain from
participating in the PPDM process. To overcome this issue and to take many
other benefits of cloud computing, outsourcing PPDM tasks to the cloud
environment has recently gained special attention. We consider the scenario
where n entities outsource their databases (in encrypted format) to the cloud
and ask the cloud to perform the clustering task on their combined data in a
privacy-preserving manner. We term such a process as privacy-preserving and
outsourced distributed clustering (PPODC). In this paper, we propose a novel
and efficient solution to the PPODC problem based on k-means clustering
algorithm. The main novelty of our solution lies in avoiding the secure
division operations required in computing cluster centers altogether through an
efficient transformation technique. Our solution builds the clusters securely
in an iterative fashion and returns the final cluster centers to all entities
when a pre-determined termination condition holds. The proposed solution
protects data confidentiality of all the participating entities under the
standard semi-honest model. To the best of our knowledge, ours is the first
work to discuss and propose a comprehensive solution to the PPODC problem that
incurs negligible cost on the participating entities. We theoretically estimate
both the computation and communication costs of the proposed protocol and also
demonstrate its practical value through experiments on a real dataset.
| [
{
"version": "v1",
"created": "Sun, 14 Dec 2014 16:54:26 GMT"
}
] | 2014-12-16T00:00:00 | [
[
"Samanthula",
"Bharath K.",
""
],
[
"Rao",
"Fang-Yu",
""
],
[
"Bertino",
"Elisa",
""
],
[
"Yi",
"Xun",
""
],
[
"Liu",
"Dongxi",
""
]
] | TITLE: Privacy-Preserving and Outsourced Multi-User k-Means Clustering
ABSTRACT: Many techniques for privacy-preserving data mining (PPDM) have been
investigated over the past decade. Often, the entities involved in the data
mining process are end-users or organizations with limited computing and
storage resources. As a result, such entities may want to refrain from
participating in the PPDM process. To overcome this issue and to take many
other benefits of cloud computing, outsourcing PPDM tasks to the cloud
environment has recently gained special attention. We consider the scenario
where n entities outsource their databases (in encrypted format) to the cloud
and ask the cloud to perform the clustering task on their combined data in a
privacy-preserving manner. We term such a process as privacy-preserving and
outsourced distributed clustering (PPODC). In this paper, we propose a novel
and efficient solution to the PPODC problem based on k-means clustering
algorithm. The main novelty of our solution lies in avoiding the secure
division operations required in computing cluster centers altogether through an
efficient transformation technique. Our solution builds the clusters securely
in an iterative fashion and returns the final cluster centers to all entities
when a pre-determined termination condition holds. The proposed solution
protects data confidentiality of all the participating entities under the
standard semi-honest model. To the best of our knowledge, ours is the first
work to discuss and propose a comprehensive solution to the PPODC problem that
incurs negligible cost on the participating entities. We theoretically estimate
both the computation and communication costs of the proposed protocol and also
demonstrate its practical value through experiments on a real dataset.
|
1412.4682 | Mykola Pechenizkiy | Erik Tromp and Mykola Pechenizkiy | Rule-based Emotion Detection on Social Media: Putting Tweets on
Plutchik's Wheel | null | null | null | null | cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study sentiment analysis beyond the typical granularity of polarity and
instead use Plutchik's wheel of emotions model. We introduce RBEM-Emo as an
extension to the Rule-Based Emission Model algorithm to deduce such emotions
from human-written messages. We evaluate our approach on two different datasets
and compare its performance with the current state-of-the-art techniques for
emotion detection, including a recursive auto-encoder. The results of the
experimental study suggest that RBEM-Emo is a promising approach advancing the
current state-of-the-art in emotion detection.
| [
{
"version": "v1",
"created": "Mon, 15 Dec 2014 17:20:47 GMT"
}
] | 2014-12-16T00:00:00 | [
[
"Tromp",
"Erik",
""
],
[
"Pechenizkiy",
"Mykola",
""
]
] | TITLE: Rule-based Emotion Detection on Social Media: Putting Tweets on
Plutchik's Wheel
ABSTRACT: We study sentiment analysis beyond the typical granularity of polarity and
instead use Plutchik's wheel of emotions model. We introduce RBEM-Emo as an
extension to the Rule-Based Emission Model algorithm to deduce such emotions
from human-written messages. We evaluate our approach on two different datasets
and compare its performance with the current state-of-the-art techniques for
emotion detection, including a recursive auto-encoder. The results of the
experimental study suggest that RBEM-Emo is a promising approach advancing the
current state-of-the-art in emotion detection.
|
1412.4726 | Rustam Tagiew | Rustam Tagiew and Dmitry I. Ignatov and Fadi Amroush | Experimental economics for web mining | 3 pages, 2 tables | null | null | null | cs.CE cs.CY | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper offers a step towards research infrastructure, which makes data
from experimental economics efficiently usable for analysis of web data. We
believe that regularities of human behavior found in experimental data also
emerge in real world web data. A format for data from experiments is suggested,
which enables its publication as open data. Once standardized datasets of
experiments are available on-line, web mining can take advantages from this
data. Further, the questions about the order of causalities arisen from web
data analysis can inspire new experiment setups.
| [
{
"version": "v1",
"created": "Mon, 15 Dec 2014 19:09:48 GMT"
}
] | 2014-12-16T00:00:00 | [
[
"Tagiew",
"Rustam",
""
],
[
"Ignatov",
"Dmitry I.",
""
],
[
"Amroush",
"Fadi",
""
]
] | TITLE: Experimental economics for web mining
ABSTRACT: This paper offers a step towards research infrastructure, which makes data
from experimental economics efficiently usable for analysis of web data. We
believe that regularities of human behavior found in experimental data also
emerge in real world web data. A format for data from experiments is suggested,
which enables its publication as open data. Once standardized datasets of
experiments are available on-line, web mining can take advantages from this
data. Further, the questions about the order of causalities arisen from web
data analysis can inspire new experiment setups.
|
1412.4754 | Yuxiao Dong | Yuxiao Dong, Reid A. Johnson, Nitesh V. Chawla | Will This Paper Increase Your h-index? Scientific Impact Prediction | Proc. of the 8th ACM International Conference on Web Search and Data
Mining (WSDM'15) | null | 10.1145/2684822.2685314 | null | cs.SI cs.DL physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Scientific impact plays a central role in the evaluation of the output of
scholars, departments, and institutions. A widely used measure of scientific
impact is citations, with a growing body of literature focused on predicting
the number of citations obtained by any given publication. The effectiveness of
such predictions, however, is fundamentally limited by the power-law
distribution of citations, whereby publications with few citations are
extremely common and publications with many citations are relatively rare.
Given this limitation, in this work we instead address a related question asked
by many academic researchers in the course of writing a paper, namely: "Will
this paper increase my h-index?" Using a real academic dataset with over 1.7
million authors, 2 million papers, and 8 million citation relationships from
the premier online academic service ArnetMiner, we formalize a novel scientific
impact prediction problem to examine several factors that can drive a paper to
increase the primary author's h-index. We find that the researcher's authority
on the publication topic and the venue in which the paper is published are
crucial factors to the increase of the primary author's h-index, while the
topic popularity and the co-authors' h-indices are of surprisingly little
relevance. By leveraging relevant factors, we find a greater than 87.5%
potential predictability for whether a paper will contribute to an author's
h-index within five years. As a further experiment, we generate a
self-prediction for this paper, estimating that there is a 76% probability that
it will contribute to the h-index of the co-author with the highest current
h-index in five years. We conclude that our findings on the quantification of
scientific impact can help researchers to expand their influence and more
effectively leverage their position of "standing on the shoulders of giants."
| [
{
"version": "v1",
"created": "Mon, 15 Dec 2014 20:36:00 GMT"
}
] | 2014-12-16T00:00:00 | [
[
"Dong",
"Yuxiao",
""
],
[
"Johnson",
"Reid A.",
""
],
[
"Chawla",
"Nitesh V.",
""
]
] | TITLE: Will This Paper Increase Your h-index? Scientific Impact Prediction
ABSTRACT: Scientific impact plays a central role in the evaluation of the output of
scholars, departments, and institutions. A widely used measure of scientific
impact is citations, with a growing body of literature focused on predicting
the number of citations obtained by any given publication. The effectiveness of
such predictions, however, is fundamentally limited by the power-law
distribution of citations, whereby publications with few citations are
extremely common and publications with many citations are relatively rare.
Given this limitation, in this work we instead address a related question asked
by many academic researchers in the course of writing a paper, namely: "Will
this paper increase my h-index?" Using a real academic dataset with over 1.7
million authors, 2 million papers, and 8 million citation relationships from
the premier online academic service ArnetMiner, we formalize a novel scientific
impact prediction problem to examine several factors that can drive a paper to
increase the primary author's h-index. We find that the researcher's authority
on the publication topic and the venue in which the paper is published are
crucial factors to the increase of the primary author's h-index, while the
topic popularity and the co-authors' h-indices are of surprisingly little
relevance. By leveraging relevant factors, we find a greater than 87.5%
potential predictability for whether a paper will contribute to an author's
h-index within five years. As a further experiment, we generate a
self-prediction for this paper, estimating that there is a 76% probability that
it will contribute to the h-index of the co-author with the highest current
h-index in five years. We conclude that our findings on the quantification of
scientific impact can help researchers to expand their influence and more
effectively leverage their position of "standing on the shoulders of giants."
|
1412.3898 | Lu Yu | Lu Yu and Junming Huang and Chuang Liu and Zike Zhang | ILCR: Item-based Latent Factors for Sparse Collaborative Retrieval | 10 pages, conference | null | null | null | cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Interactions between search and recommendation have recently attracted
significant attention, and several studies have shown that many potential
applications involve with a joint problem of producing recommendations to users
with respect to a given query, termed $Collaborative$ $Retrieval$ (CR).
Successful algorithms designed for CR should be potentially flexible at dealing
with the sparsity challenges since the setup of collaborative retrieval
associates with a given $query$ $\times$ $user$ $\times$ $item$ tensor instead
of traditional $user$ $\times$ $item$ matrix. Recently, several works are
proposed to study CR task from users' perspective. In this paper, we aim to
sufficiently explore the sophisticated relationship of each $query$ $\times$
$user$ $\times$ $item$ triple from items' perspective. By integrating
item-based collaborative information for this joint task, we present an
alternative factorized model that could better evaluate the ranks of those
items with sparse information for the given query-user pair. In addition, we
suggest to employ a recently proposed scalable ranking learning algorithm,
namely BPR, to optimize the state-of-the-art approach, $Latent$ $Collaborative$
$Retrieval$ model, instead of the original learning algorithm. The experimental
results on two real-world datasets, (i.e. \emph{Last.fm}, \emph{Yelp}),
demonstrate the efficiency and effectiveness of our proposed approach.
| [
{
"version": "v1",
"created": "Fri, 12 Dec 2014 06:32:47 GMT"
}
] | 2014-12-15T00:00:00 | [
[
"Yu",
"Lu",
""
],
[
"Huang",
"Junming",
""
],
[
"Liu",
"Chuang",
""
],
[
"Zhang",
"Zike",
""
]
] | TITLE: ILCR: Item-based Latent Factors for Sparse Collaborative Retrieval
ABSTRACT: Interactions between search and recommendation have recently attracted
significant attention, and several studies have shown that many potential
applications involve with a joint problem of producing recommendations to users
with respect to a given query, termed $Collaborative$ $Retrieval$ (CR).
Successful algorithms designed for CR should be potentially flexible at dealing
with the sparsity challenges since the setup of collaborative retrieval
associates with a given $query$ $\times$ $user$ $\times$ $item$ tensor instead
of traditional $user$ $\times$ $item$ matrix. Recently, several works are
proposed to study CR task from users' perspective. In this paper, we aim to
sufficiently explore the sophisticated relationship of each $query$ $\times$
$user$ $\times$ $item$ triple from items' perspective. By integrating
item-based collaborative information for this joint task, we present an
alternative factorized model that could better evaluate the ranks of those
items with sparse information for the given query-user pair. In addition, we
suggest to employ a recently proposed scalable ranking learning algorithm,
namely BPR, to optimize the state-of-the-art approach, $Latent$ $Collaborative$
$Retrieval$ model, instead of the original learning algorithm. The experimental
results on two real-world datasets, (i.e. \emph{Last.fm}, \emph{Yelp}),
demonstrate the efficiency and effectiveness of our proposed approach.
|
1412.3919 | Alexandre Abraham | Alexandre Abraham (NEUROSPIN, INRIA Saclay - Ile de France), Fabian
Pedregosa (INRIA Saclay - Ile de France), Michael Eickenberg (LNAO, INRIA
Saclay - Ile de France), Philippe Gervais (NEUROSPIN, INRIA Saclay - Ile de
France, LNAO), Andreas Muller, Jean Kossaifi, Alexandre Gramfort (NEUROSPIN,
LTCI), Bertrand Thirion (NEUROSPIN, INRIA Saclay - Ile de France), G\"ael
Varoquaux (NEUROSPIN, INRIA Saclay - Ile de France, LNAO) | Machine Learning for Neuroimaging with Scikit-Learn | Frontiers in neuroscience, Frontiers Research Foundation, 2013, pp.15 | null | null | null | cs.LG cs.CV stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Statistical machine learning methods are increasingly used for neuroimaging
data analysis. Their main virtue is their ability to model high-dimensional
datasets, e.g. multivariate analysis of activation images or resting-state time
series. Supervised learning is typically used in decoding or encoding settings
to relate brain images to behavioral or clinical observations, while
unsupervised learning can uncover hidden structures in sets of images (e.g.
resting state functional MRI) or find sub-populations in large cohorts. By
considering different functional neuroimaging applications, we illustrate how
scikit-learn, a Python machine learning library, can be used to perform some
key analysis steps. Scikit-learn contains a very large set of statistical
learning algorithms, both supervised and unsupervised, and its application to
neuroimaging data provides a versatile tool to study the brain.
| [
{
"version": "v1",
"created": "Fri, 12 Dec 2014 08:38:35 GMT"
}
] | 2014-12-15T00:00:00 | [
[
"Abraham",
"Alexandre",
"",
"NEUROSPIN, INRIA Saclay - Ile de France"
],
[
"Pedregosa",
"Fabian",
"",
"INRIA Saclay - Ile de France"
],
[
"Eickenberg",
"Michael",
"",
"LNAO, INRIA\n Saclay - Ile de France"
],
[
"Gervais",
"Philippe",
"",
"NEUROSPIN, INRIA Saclay - Ile de\n France, LNAO"
],
[
"Muller",
"Andreas",
"",
"NEUROSPIN,\n LTCI"
],
[
"Kossaifi",
"Jean",
"",
"NEUROSPIN,\n LTCI"
],
[
"Gramfort",
"Alexandre",
"",
"NEUROSPIN,\n LTCI"
],
[
"Thirion",
"Bertrand",
"",
"NEUROSPIN, INRIA Saclay - Ile de France"
],
[
"Varoquaux",
"Gäel",
"",
"NEUROSPIN, INRIA Saclay - Ile de France, LNAO"
]
] | TITLE: Machine Learning for Neuroimaging with Scikit-Learn
ABSTRACT: Statistical machine learning methods are increasingly used for neuroimaging
data analysis. Their main virtue is their ability to model high-dimensional
datasets, e.g. multivariate analysis of activation images or resting-state time
series. Supervised learning is typically used in decoding or encoding settings
to relate brain images to behavioral or clinical observations, while
unsupervised learning can uncover hidden structures in sets of images (e.g.
resting state functional MRI) or find sub-populations in large cohorts. By
considering different functional neuroimaging applications, we illustrate how
scikit-learn, a Python machine learning library, can be used to perform some
key analysis steps. Scikit-learn contains a very large set of statistical
learning algorithms, both supervised and unsupervised, and its application to
neuroimaging data provides a versatile tool to study the brain.
|
1412.4042 | D\'aniel Kondor Mr | D\'aniel Kondor, Istv\'an Csabai, J\'anos Sz\"ule, M\'arton P\'osfai,
G\'abor Vattay | Inferring the interplay of network structure and market effects in
Bitcoin | project website: http://www.vo.elte.hu/bitcoin | New J. Phys. 16 (2014) 125003 | 10.1088/1367-2630/16/12/125003 | null | physics.soc-ph cs.SI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A main focus in economics research is understanding the time series of prices
of goods and assets. While statistical models using only the properties of the
time series itself have been successful in many aspects, we expect to gain a
better understanding of the phenomena involved if we can model the underlying
system of interacting agents. In this article, we consider the history of
Bitcoin, a novel digital currency system, for which the complete list of
transactions is available for analysis. Using this dataset, we reconstruct the
transaction network between users and analyze changes in the structure of the
subgraph induced by the most active users. Our approach is based on the
unsupervised identification of important features of the time variation of the
network. Applying the widely used method of Principal Component Analysis to the
matrix constructed from snapshots of the network at different times, we are
able to show how structural changes in the network accompany significant
changes in the exchange price of bitcoins.
| [
{
"version": "v1",
"created": "Fri, 12 Dec 2014 16:31:24 GMT"
}
] | 2014-12-15T00:00:00 | [
[
"Kondor",
"Dániel",
""
],
[
"Csabai",
"István",
""
],
[
"Szüle",
"János",
""
],
[
"Pósfai",
"Márton",
""
],
[
"Vattay",
"Gábor",
""
]
] | TITLE: Inferring the interplay of network structure and market effects in
Bitcoin
ABSTRACT: A main focus in economics research is understanding the time series of prices
of goods and assets. While statistical models using only the properties of the
time series itself have been successful in many aspects, we expect to gain a
better understanding of the phenomena involved if we can model the underlying
system of interacting agents. In this article, we consider the history of
Bitcoin, a novel digital currency system, for which the complete list of
transactions is available for analysis. Using this dataset, we reconstruct the
transaction network between users and analyze changes in the structure of the
subgraph induced by the most active users. Our approach is based on the
unsupervised identification of important features of the time variation of the
network. Applying the widely used method of Principal Component Analysis to the
matrix constructed from snapshots of the network at different times, we are
able to show how structural changes in the network accompany significant
changes in the exchange price of bitcoins.
|
1412.4102 | Chunyu Wang | Chunyu Wang, John Flynn, Yizhou Wang, Alan L. Yuille | Representing Data by a Mixture of Activated Simplices | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present a new model which represents data as a mixture of simplices.
Simplices are geometric structures that generalize triangles. We give a simple
geometric understanding that allows us to learn a simplicial structure
efficiently. Our method requires that the data are unit normalized (and thus
lie on the unit sphere). We show that under this restriction, building a model
with simplices amounts to constructing a convex hull inside the sphere whose
boundary facets is close to the data. We call the boundary facets of the convex
hull that are close to the data Activated Simplices. While the total number of
bases used to build the simplices is a parameter of the model, the dimensions
of the individual activated simplices are learned from the data. Simplices can
have different dimensions, which facilitates modeling of inhomogeneous data
sources. The simplicial structure is bounded --- this is appropriate for
modeling data with constraints, such as human elbows can not bend more than 180
degrees. The simplices are easy to interpret and extremes within the data can
be discovered among the vertices. The method provides good reconstruction and
regularization. It supports good nearest neighbor classification and it allows
realistic generative models to be constructed. It achieves state-of-the-art
results on benchmark datasets, including 3D poses and digits.
| [
{
"version": "v1",
"created": "Fri, 12 Dec 2014 20:12:40 GMT"
}
] | 2014-12-15T00:00:00 | [
[
"Wang",
"Chunyu",
""
],
[
"Flynn",
"John",
""
],
[
"Wang",
"Yizhou",
""
],
[
"Yuille",
"Alan L.",
""
]
] | TITLE: Representing Data by a Mixture of Activated Simplices
ABSTRACT: We present a new model which represents data as a mixture of simplices.
Simplices are geometric structures that generalize triangles. We give a simple
geometric understanding that allows us to learn a simplicial structure
efficiently. Our method requires that the data are unit normalized (and thus
lie on the unit sphere). We show that under this restriction, building a model
with simplices amounts to constructing a convex hull inside the sphere whose
boundary facets is close to the data. We call the boundary facets of the convex
hull that are close to the data Activated Simplices. While the total number of
bases used to build the simplices is a parameter of the model, the dimensions
of the individual activated simplices are learned from the data. Simplices can
have different dimensions, which facilitates modeling of inhomogeneous data
sources. The simplicial structure is bounded --- this is appropriate for
modeling data with constraints, such as human elbows can not bend more than 180
degrees. The simplices are easy to interpret and extremes within the data can
be discovered among the vertices. The method provides good reconstruction and
regularization. It supports good nearest neighbor classification and it allows
realistic generative models to be constructed. It achieves state-of-the-art
results on benchmark datasets, including 3D poses and digits.
|
1309.3421 | Yanshan Wang | Yanshan Wang, Jae-Sung Lee, In-Chan Choi | Indexing by Latent Dirichlet Allocation and Ensemble Model | Accepted by the Journal of American Society for Information Science
and Technology (JASIST) | null | null | null | cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The contribution of this paper is two-fold. First, we present Indexing by
Latent Dirichlet Allocation (LDI), an automatic document indexing method. The
probability distributions in LDI utilize those in Latent Dirichlet Allocation
(LDA), a generative topic model that has been previously used in applications
for document retrieval tasks. However, the ad hoc applications, or their
variants with smoothing techniques as prompted by previous studies in LDA-based
language modeling, result in unsatisfactory performance as the document
representations do not accurately reflect concept space. To improve
performance, we introduce a new definition of document probability vectors in
the context of LDA and present a novel scheme for automatic document indexing
based on LDA. Second, we propose an Ensemble Model (EnM) for document
retrieval. The EnM combines basis indexing models by assigning different
weights and attempts to uncover the optimal weights to maximize the Mean
Average Precision (MAP). To solve the optimization problem, we propose an
algorithm, EnM.B, which is derived based on the boosting method. The results of
our computational experiments on benchmark data sets indicate that both the
proposed approaches are viable options for document retrieval.
| [
{
"version": "v1",
"created": "Fri, 13 Sep 2013 10:37:47 GMT"
},
{
"version": "v2",
"created": "Thu, 28 Nov 2013 11:37:58 GMT"
},
{
"version": "v3",
"created": "Tue, 14 Oct 2014 07:41:46 GMT"
},
{
"version": "v4",
"created": "Tue, 21 Oct 2014 12:57:14 GMT"
},
{
"version": "v5",
"created": "Mon, 8 Dec 2014 08:27:49 GMT"
},
{
"version": "v6",
"created": "Thu, 11 Dec 2014 05:18:32 GMT"
}
] | 2014-12-12T00:00:00 | [
[
"Wang",
"Yanshan",
""
],
[
"Lee",
"Jae-Sung",
""
],
[
"Choi",
"In-Chan",
""
]
] | TITLE: Indexing by Latent Dirichlet Allocation and Ensemble Model
ABSTRACT: The contribution of this paper is two-fold. First, we present Indexing by
Latent Dirichlet Allocation (LDI), an automatic document indexing method. The
probability distributions in LDI utilize those in Latent Dirichlet Allocation
(LDA), a generative topic model that has been previously used in applications
for document retrieval tasks. However, the ad hoc applications, or their
variants with smoothing techniques as prompted by previous studies in LDA-based
language modeling, result in unsatisfactory performance as the document
representations do not accurately reflect concept space. To improve
performance, we introduce a new definition of document probability vectors in
the context of LDA and present a novel scheme for automatic document indexing
based on LDA. Second, we propose an Ensemble Model (EnM) for document
retrieval. The EnM combines basis indexing models by assigning different
weights and attempts to uncover the optimal weights to maximize the Mean
Average Precision (MAP). To solve the optimization problem, we propose an
algorithm, EnM.B, which is derived based on the boosting method. The results of
our computational experiments on benchmark data sets indicate that both the
proposed approaches are viable options for document retrieval.
|
1406.0146 | Darko Hric | Darko Hric, Richard K. Darst, Santo Fortunato | Community detection in networks: Structural communities versus ground
truth | 21 pages, 19 figures | Phys. Rev. E 90, 062805 (2014) | 10.1103/PhysRevE.90.062805 | null | physics.soc-ph cs.IR cs.SI q-bio.QM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Algorithms to find communities in networks rely just on structural
information and search for cohesive subsets of nodes. On the other hand, most
scholars implicitly or explicitly assume that structural communities represent
groups of nodes with similar (non-topological) properties or functions. This
hypothesis could not be verified, so far, because of the lack of network
datasets with information on the classification of the nodes. We show that
traditional community detection methods fail to find the metadata groups in
many large networks. Our results show that there is a marked separation between
structural communities and metadata groups, in line with recent findings. That
means that either our current modeling of community structure has to be
substantially modified, or that metadata groups may not be recoverable from
topology alone.
| [
{
"version": "v1",
"created": "Sun, 1 Jun 2014 09:06:16 GMT"
},
{
"version": "v2",
"created": "Thu, 11 Dec 2014 18:08:15 GMT"
}
] | 2014-12-12T00:00:00 | [
[
"Hric",
"Darko",
""
],
[
"Darst",
"Richard K.",
""
],
[
"Fortunato",
"Santo",
""
]
] | TITLE: Community detection in networks: Structural communities versus ground
truth
ABSTRACT: Algorithms to find communities in networks rely just on structural
information and search for cohesive subsets of nodes. On the other hand, most
scholars implicitly or explicitly assume that structural communities represent
groups of nodes with similar (non-topological) properties or functions. This
hypothesis could not be verified, so far, because of the lack of network
datasets with information on the classification of the nodes. We show that
traditional community detection methods fail to find the metadata groups in
many large networks. Our results show that there is a marked separation between
structural communities and metadata groups, in line with recent findings. That
means that either our current modeling of community structure has to be
substantially modified, or that metadata groups may not be recoverable from
topology alone.
|
1412.3474 | Eric Tzeng | Eric Tzeng, Judy Hoffman, Ning Zhang, Kate Saenko, Trevor Darrell | Deep Domain Confusion: Maximizing for Domain Invariance | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Recent reports suggest that a generic supervised deep CNN model trained on a
large-scale dataset reduces, but does not remove, dataset bias on a standard
benchmark. Fine-tuning deep models in a new domain can require a significant
amount of data, which for many applications is simply not available. We propose
a new CNN architecture which introduces an adaptation layer and an additional
domain confusion loss, to learn a representation that is both semantically
meaningful and domain invariant. We additionally show that a domain confusion
metric can be used for model selection to determine the dimension of an
adaptation layer and the best position for the layer in the CNN architecture.
Our proposed adaptation method offers empirical performance which exceeds
previously published results on a standard benchmark visual domain adaptation
task.
| [
{
"version": "v1",
"created": "Wed, 10 Dec 2014 21:20:54 GMT"
}
] | 2014-12-12T00:00:00 | [
[
"Tzeng",
"Eric",
""
],
[
"Hoffman",
"Judy",
""
],
[
"Zhang",
"Ning",
""
],
[
"Saenko",
"Kate",
""
],
[
"Darrell",
"Trevor",
""
]
] | TITLE: Deep Domain Confusion: Maximizing for Domain Invariance
ABSTRACT: Recent reports suggest that a generic supervised deep CNN model trained on a
large-scale dataset reduces, but does not remove, dataset bias on a standard
benchmark. Fine-tuning deep models in a new domain can require a significant
amount of data, which for many applications is simply not available. We propose
a new CNN architecture which introduces an adaptation layer and an additional
domain confusion loss, to learn a representation that is both semantically
meaningful and domain invariant. We additionally show that a domain confusion
metric can be used for model selection to determine the dimension of an
adaptation layer and the best position for the layer in the CNN architecture.
Our proposed adaptation method offers empirical performance which exceeds
previously published results on a standard benchmark visual domain adaptation
task.
|
1412.3684 | Soren Goyal | Soren Goyal, Paul Benjamin | Object Recognition Using Deep Neural Networks: A Survey | null | null | null | null | cs.CV cs.LG cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Recognition of objects using Deep Neural Networks is an active area of
research and many breakthroughs have been made in the last few years. The paper
attempts to indicate how far this field has progressed. The paper briefly
describes the history of research in Neural Networks and describe several of
the recent advances in this field. The performances of recently developed
Neural Network Algorithm over benchmark datasets have been tabulated. Finally,
some the applications of this field have been provided.
| [
{
"version": "v1",
"created": "Wed, 10 Dec 2014 18:23:13 GMT"
}
] | 2014-12-12T00:00:00 | [
[
"Goyal",
"Soren",
""
],
[
"Benjamin",
"Paul",
""
]
] | TITLE: Object Recognition Using Deep Neural Networks: A Survey
ABSTRACT: Recognition of objects using Deep Neural Networks is an active area of
research and many breakthroughs have been made in the last few years. The paper
attempts to indicate how far this field has progressed. The paper briefly
describes the history of research in Neural Networks and describe several of
the recent advances in this field. The performances of recently developed
Neural Network Algorithm over benchmark datasets have been tabulated. Finally,
some the applications of this field have been provided.
|
1402.5450 | Nicholas Rotella | Nicholas Rotella, Michael Bloesch, Ludovic Righetti and Stefan Schaal | State Estimation for a Humanoid Robot | IROS 2014 Submission, IEEE/RSJ International Conference on
Intelligent Robots and Systems (2014) 952-958 | null | 10.1109/IROS.2014.6942674 | null | cs.RO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper introduces a framework for state estimation on a humanoid robot
platform using only common proprioceptive sensors and knowledge of leg
kinematics. The presented approach extends that detailed in [1] on a quadruped
platform by incorporating the rotational constraints imposed by the humanoid's
flat feet. As in previous work, the proposed Extended Kalman Filter (EKF)
accommodates contact switching and makes no assumptions about gait or terrain,
making it applicable on any humanoid platform for use in any task. The filter
employs a sensor-based prediction model which uses inertial data from an IMU
and corrects for integrated error using a kinematics-based measurement model
which relies on joint encoders and a kinematic model to determine the relative
position and orientation of the feet. A nonlinear observability analysis is
performed on both the original and updated filters and it is concluded that the
new filter significantly simplifies singular cases and improves the
observability characteristics of the system. Results on simulated walking and
squatting datasets demonstrate the performance gain of the flat-foot filter as
well as confirm the results of the presented observability analysis.
| [
{
"version": "v1",
"created": "Fri, 21 Feb 2014 23:35:34 GMT"
},
{
"version": "v2",
"created": "Wed, 10 Dec 2014 20:42:58 GMT"
}
] | 2014-12-11T00:00:00 | [
[
"Rotella",
"Nicholas",
""
],
[
"Bloesch",
"Michael",
""
],
[
"Righetti",
"Ludovic",
""
],
[
"Schaal",
"Stefan",
""
]
] | TITLE: State Estimation for a Humanoid Robot
ABSTRACT: This paper introduces a framework for state estimation on a humanoid robot
platform using only common proprioceptive sensors and knowledge of leg
kinematics. The presented approach extends that detailed in [1] on a quadruped
platform by incorporating the rotational constraints imposed by the humanoid's
flat feet. As in previous work, the proposed Extended Kalman Filter (EKF)
accommodates contact switching and makes no assumptions about gait or terrain,
making it applicable on any humanoid platform for use in any task. The filter
employs a sensor-based prediction model which uses inertial data from an IMU
and corrects for integrated error using a kinematics-based measurement model
which relies on joint encoders and a kinematic model to determine the relative
position and orientation of the feet. A nonlinear observability analysis is
performed on both the original and updated filters and it is concluded that the
new filter significantly simplifies singular cases and improves the
observability characteristics of the system. Results on simulated walking and
squatting datasets demonstrate the performance gain of the flat-foot filter as
well as confirm the results of the presented observability analysis.
|
1412.3161 | Xiaoyu Wang | Xiaoyu Wang, Tianbao Yang, Guobin Chen, Yuanqing Lin | Object-centric Sampling for Fine-grained Image Classification | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper proposes to go beyond the state-of-the-art deep convolutional
neural network (CNN) by incorporating the information from object detection,
focusing on dealing with fine-grained image classification. Unfortunately, CNN
suffers from over-fiting when it is trained on existing fine-grained image
classification benchmarks, which typically only consist of less than a few tens
of thousands training images. Therefore, we first construct a large-scale
fine-grained car recognition dataset that consists of 333 car classes with more
than 150 thousand training images. With this large-scale dataset, we are able
to build a strong baseline for CNN with top-1 classification accuracy of 81.6%.
One major challenge in fine-grained image classification is that many classes
are very similar to each other while having large within-class variation. One
contributing factor to the within-class variation is cluttered image
background. However, the existing CNN training takes uniform window sampling
over the image, acting as blind on the location of the object of interest. In
contrast, this paper proposes an \emph{object-centric sampling} (OCS) scheme
that samples image windows based on the object location information. The
challenge in using the location information lies in how to design powerful
object detector and how to handle the imperfectness of detection results. To
that end, we design a saliency-aware object detection approach specific for the
setting of fine-grained image classification, and the uncertainty of detection
results are naturally handled in our OCS scheme. Our framework is demonstrated
to be very effective, improving top-1 accuracy to 89.3% (from 81.6%) on the
large-scale fine-grained car classification dataset.
| [
{
"version": "v1",
"created": "Wed, 10 Dec 2014 00:28:49 GMT"
}
] | 2014-12-11T00:00:00 | [
[
"Wang",
"Xiaoyu",
""
],
[
"Yang",
"Tianbao",
""
],
[
"Chen",
"Guobin",
""
],
[
"Lin",
"Yuanqing",
""
]
] | TITLE: Object-centric Sampling for Fine-grained Image Classification
ABSTRACT: This paper proposes to go beyond the state-of-the-art deep convolutional
neural network (CNN) by incorporating the information from object detection,
focusing on dealing with fine-grained image classification. Unfortunately, CNN
suffers from over-fiting when it is trained on existing fine-grained image
classification benchmarks, which typically only consist of less than a few tens
of thousands training images. Therefore, we first construct a large-scale
fine-grained car recognition dataset that consists of 333 car classes with more
than 150 thousand training images. With this large-scale dataset, we are able
to build a strong baseline for CNN with top-1 classification accuracy of 81.6%.
One major challenge in fine-grained image classification is that many classes
are very similar to each other while having large within-class variation. One
contributing factor to the within-class variation is cluttered image
background. However, the existing CNN training takes uniform window sampling
over the image, acting as blind on the location of the object of interest. In
contrast, this paper proposes an \emph{object-centric sampling} (OCS) scheme
that samples image windows based on the object location information. The
challenge in using the location information lies in how to design powerful
object detector and how to handle the imperfectness of detection results. To
that end, we design a saliency-aware object detection approach specific for the
setting of fine-grained image classification, and the uncertainty of detection
results are naturally handled in our OCS scheme. Our framework is demonstrated
to be very effective, improving top-1 accuracy to 89.3% (from 81.6%) on the
large-scale fine-grained car classification dataset.
|
1412.3333 | Patrick Prosser | Frod Prefect, Patrick Prosser | Empirical Algorithmics: draw your own conclusions | arXiv admin note: text overlap with arXiv:1207.4616 | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In an empirical comparisons of algorithms we might compare run times over a
set of benchmark problems to decide which one is fastest, i.e. an algorithmic
horse race. Ideally we would like to download source code for the algorithms,
compile and then run on our machine. Sometimes code isn't available to download
and sometimes resource isn't available to implement all the algorithms we want
to study. To get round this, published results are rescaled, a technique
endorsed by DIMACS, and those rescaled results included in a new study. This
technique is frequently used when presenting new algorithms for the maximum
clique problem. We demonstrate that this is unsafe, and that if carelessly used
may allow us to draw conflicting conclusions from our empirical study.
| [
{
"version": "v1",
"created": "Wed, 10 Dec 2014 15:11:05 GMT"
}
] | 2014-12-11T00:00:00 | [
[
"Prefect",
"Frod",
""
],
[
"Prosser",
"Patrick",
""
]
] | TITLE: Empirical Algorithmics: draw your own conclusions
ABSTRACT: In an empirical comparisons of algorithms we might compare run times over a
set of benchmark problems to decide which one is fastest, i.e. an algorithmic
horse race. Ideally we would like to download source code for the algorithms,
compile and then run on our machine. Sometimes code isn't available to download
and sometimes resource isn't available to implement all the algorithms we want
to study. To get round this, published results are rescaled, a technique
endorsed by DIMACS, and those rescaled results included in a new study. This
technique is frequently used when presenting new algorithms for the maximum
clique problem. We demonstrate that this is unsafe, and that if carelessly used
may allow us to draw conflicting conclusions from our empirical study.
|
1412.3352 | Neda Pourali | Neda Pourali | Web image annotation by diffusion maps manifold learning algorithm | 11 pages, 8 figures | null | 10.5121/ijfcst.2014.4606 | null | cs.CV cs.IR cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Automatic image annotation is one of the most challenging problems in machine
vision areas. The goal of this task is to predict number of keywords
automatically for images captured in real data. Many methods are based on
visual features in order to calculate similarities between image samples. But
the computation cost of these approaches is very high. These methods require
many training samples to be stored in memory. To lessen this burden, a number
of techniques have been developed to reduce the number of features in a
dataset. Manifold learning is a popular approach to nonlinear dimensionality
reduction. In this paper, we investigate Diffusion maps manifold learning
method for web image auto-annotation task. Diffusion maps manifold learning
method is used to reduce the dimension of some visual features. Extensive
experiments and analysis on NUS-WIDE-LITE web image dataset with different
visual features show how this manifold learning dimensionality reduction method
can be applied effectively to image annotation.
| [
{
"version": "v1",
"created": "Mon, 8 Dec 2014 10:38:28 GMT"
}
] | 2014-12-11T00:00:00 | [
[
"Pourali",
"Neda",
""
]
] | TITLE: Web image annotation by diffusion maps manifold learning algorithm
ABSTRACT: Automatic image annotation is one of the most challenging problems in machine
vision areas. The goal of this task is to predict number of keywords
automatically for images captured in real data. Many methods are based on
visual features in order to calculate similarities between image samples. But
the computation cost of these approaches is very high. These methods require
many training samples to be stored in memory. To lessen this burden, a number
of techniques have been developed to reduce the number of features in a
dataset. Manifold learning is a popular approach to nonlinear dimensionality
reduction. In this paper, we investigate Diffusion maps manifold learning
method for web image auto-annotation task. Diffusion maps manifold learning
method is used to reduce the dimension of some visual features. Extensive
experiments and analysis on NUS-WIDE-LITE web image dataset with different
visual features show how this manifold learning dimensionality reduction method
can be applied effectively to image annotation.
|
1406.2227 | Max Jaderberg | Max Jaderberg, Karen Simonyan, Andrea Vedaldi, Andrew Zisserman | Synthetic Data and Artificial Neural Networks for Natural Scene Text
Recognition | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this work we present a framework for the recognition of natural scene
text. Our framework does not require any human-labelled data, and performs word
recognition on the whole image holistically, departing from the character based
recognition systems of the past. The deep neural network models at the centre
of this framework are trained solely on data produced by a synthetic text
generation engine -- synthetic data that is highly realistic and sufficient to
replace real data, giving us infinite amounts of training data. This excess of
data exposes new possibilities for word recognition models, and here we
consider three models, each one "reading" words in a different way: via 90k-way
dictionary encoding, character sequence encoding, and bag-of-N-grams encoding.
In the scenarios of language based and completely unconstrained text
recognition we greatly improve upon state-of-the-art performance on standard
datasets, using our fast, simple machinery and requiring zero data-acquisition
costs.
| [
{
"version": "v1",
"created": "Mon, 9 Jun 2014 15:53:33 GMT"
},
{
"version": "v2",
"created": "Tue, 10 Jun 2014 03:10:35 GMT"
},
{
"version": "v3",
"created": "Mon, 6 Oct 2014 16:08:24 GMT"
},
{
"version": "v4",
"created": "Tue, 9 Dec 2014 11:22:59 GMT"
}
] | 2014-12-10T00:00:00 | [
[
"Jaderberg",
"Max",
""
],
[
"Simonyan",
"Karen",
""
],
[
"Vedaldi",
"Andrea",
""
],
[
"Zisserman",
"Andrew",
""
]
] | TITLE: Synthetic Data and Artificial Neural Networks for Natural Scene Text
Recognition
ABSTRACT: In this work we present a framework for the recognition of natural scene
text. Our framework does not require any human-labelled data, and performs word
recognition on the whole image holistically, departing from the character based
recognition systems of the past. The deep neural network models at the centre
of this framework are trained solely on data produced by a synthetic text
generation engine -- synthetic data that is highly realistic and sufficient to
replace real data, giving us infinite amounts of training data. This excess of
data exposes new possibilities for word recognition models, and here we
consider three models, each one "reading" words in a different way: via 90k-way
dictionary encoding, character sequence encoding, and bag-of-N-grams encoding.
In the scenarios of language based and completely unconstrained text
recognition we greatly improve upon state-of-the-art performance on standard
datasets, using our fast, simple machinery and requiring zero data-acquisition
costs.
|
1410.5772 | Lutz Bornmann Dr. | Lutz Bornmann, Werner Marx | Methods for the generation of normalized citation impact scores in
bibliometrics: Which method best reflects the judgements of experts? | Accepted for publication in the Journal of Informetrics | null | null | null | cs.DL stat.OT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Evaluative bibliometrics compares the citation impact of researchers,
research groups and institutions with each other across time scales and
disciplines. Both factors - discipline and period - have an influence on the
citation count which is independent of the quality of the publication.
Normalizing the citation impact of papers for these two factors started in the
mid-1980s. Since then, a range of different methods have been presented for
producing normalized citation impact scores. The current study uses a data set
of over 50,000 records to test which of the methods so far presented correlate
better with the assessment of papers by peers. The peer assessments come from
F1000Prime - a post-publication peer review system of the biomedical
literature. Of the normalized indicators, the current study involves not only
cited-side indicators, such as the mean normalized citation score, but also
citing-side indicators. As the results show, the correlations of the indicators
with the peer assessments all turn out to be very similar. Since F1000 focuses
on biomedicine, it is important that the results of this study are validated by
other studies based on datasets from other disciplines or (ideally) based on
multi-disciplinary datasets.
| [
{
"version": "v1",
"created": "Mon, 20 Oct 2014 07:57:32 GMT"
},
{
"version": "v2",
"created": "Tue, 9 Dec 2014 10:58:06 GMT"
}
] | 2014-12-10T00:00:00 | [
[
"Bornmann",
"Lutz",
""
],
[
"Marx",
"Werner",
""
]
] | TITLE: Methods for the generation of normalized citation impact scores in
bibliometrics: Which method best reflects the judgements of experts?
ABSTRACT: Evaluative bibliometrics compares the citation impact of researchers,
research groups and institutions with each other across time scales and
disciplines. Both factors - discipline and period - have an influence on the
citation count which is independent of the quality of the publication.
Normalizing the citation impact of papers for these two factors started in the
mid-1980s. Since then, a range of different methods have been presented for
producing normalized citation impact scores. The current study uses a data set
of over 50,000 records to test which of the methods so far presented correlate
better with the assessment of papers by peers. The peer assessments come from
F1000Prime - a post-publication peer review system of the biomedical
literature. Of the normalized indicators, the current study involves not only
cited-side indicators, such as the mean normalized citation score, but also
citing-side indicators. As the results show, the correlations of the indicators
with the peer assessments all turn out to be very similar. Since F1000 focuses
on biomedicine, it is important that the results of this study are validated by
other studies based on datasets from other disciplines or (ideally) based on
multi-disciplinary datasets.
|
1410.7835 | Zhensong Qian | Oliver Schulte, Zhensong Qian, Arthur E. Kirkpatrick, Xiaoqian Yin,
Yan Sun | Fast Learning of Relational Dependency Networks | 17 pages, 2 figures, 3 tables, Accepted as long paper by ILP 2014,
September 14- 16th, Nancy, France. Added the Appendix: Proof of Consistency
Characterization | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A Relational Dependency Network (RDN) is a directed graphical model widely
used for multi-relational data. These networks allow cyclic dependencies,
necessary to represent relational autocorrelations. We describe an approach for
learning both the RDN's structure and its parameters, given an input relational
database: First learn a Bayesian network (BN), then transform the Bayesian
network to an RDN. Thus fast Bayes net learning can provide fast RDN learning.
The BN-to-RDN transform comprises a simple, local adjustment of the Bayes net
structure and a closed-form transform of the Bayes net parameters. This method
can learn an RDN for a dataset with a million tuples in minutes. We empirically
compare our approach to state-of-the art RDN learning methods that use
functional gradient boosting, on five benchmark datasets. Learning RDNs via BNs
scales much better to large datasets than learning RDNs with boosting, and
provides competitive accuracy in predictions.
| [
{
"version": "v1",
"created": "Tue, 28 Oct 2014 23:14:56 GMT"
},
{
"version": "v2",
"created": "Tue, 9 Dec 2014 01:07:36 GMT"
}
] | 2014-12-10T00:00:00 | [
[
"Schulte",
"Oliver",
""
],
[
"Qian",
"Zhensong",
""
],
[
"Kirkpatrick",
"Arthur E.",
""
],
[
"Yin",
"Xiaoqian",
""
],
[
"Sun",
"Yan",
""
]
] | TITLE: Fast Learning of Relational Dependency Networks
ABSTRACT: A Relational Dependency Network (RDN) is a directed graphical model widely
used for multi-relational data. These networks allow cyclic dependencies,
necessary to represent relational autocorrelations. We describe an approach for
learning both the RDN's structure and its parameters, given an input relational
database: First learn a Bayesian network (BN), then transform the Bayesian
network to an RDN. Thus fast Bayes net learning can provide fast RDN learning.
The BN-to-RDN transform comprises a simple, local adjustment of the Bayes net
structure and a closed-form transform of the Bayes net parameters. This method
can learn an RDN for a dataset with a million tuples in minutes. We empirically
compare our approach to state-of-the art RDN learning methods that use
functional gradient boosting, on five benchmark datasets. Learning RDNs via BNs
scales much better to large datasets than learning RDNs with boosting, and
provides competitive accuracy in predictions.
|
1412.2066 | Charless Fowlkes | Shaofei Wang and Charless C. Fowlkes | Learning Multi-target Tracking with Quadratic Object Interactions | null | null | null | null | cs.CV cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We describe a model for multi-target tracking based on associating
collections of candidate detections across frames of a video. In order to model
pairwise interactions between different tracks, such as suppression of
overlapping tracks and contextual cues about co-occurence of different objects,
we augment a standard min-cost flow objective with quadratic terms between
detection variables. We learn the parameters of this model using structured
prediction and a loss function which approximates the multi-target tracking
accuracy. We evaluate two different approaches to finding an optimal set of
tracks under model objective based on an LP relaxation and a novel greedy
extension to dynamic programming that handles pairwise interactions. We find
the greedy algorithm achieves equivalent performance to the LP relaxation while
being 2-7x faster than a commercial solver. The resulting model with learned
parameters outperforms existing methods across several categories on the KITTI
tracking benchmark.
| [
{
"version": "v1",
"created": "Fri, 5 Dec 2014 17:04:35 GMT"
},
{
"version": "v2",
"created": "Tue, 9 Dec 2014 05:25:44 GMT"
}
] | 2014-12-10T00:00:00 | [
[
"Wang",
"Shaofei",
""
],
[
"Fowlkes",
"Charless C.",
""
]
] | TITLE: Learning Multi-target Tracking with Quadratic Object Interactions
ABSTRACT: We describe a model for multi-target tracking based on associating
collections of candidate detections across frames of a video. In order to model
pairwise interactions between different tracks, such as suppression of
overlapping tracks and contextual cues about co-occurence of different objects,
we augment a standard min-cost flow objective with quadratic terms between
detection variables. We learn the parameters of this model using structured
prediction and a loss function which approximates the multi-target tracking
accuracy. We evaluate two different approaches to finding an optimal set of
tracks under model objective based on an LP relaxation and a novel greedy
extension to dynamic programming that handles pairwise interactions. We find
the greedy algorithm achieves equivalent performance to the LP relaxation while
being 2-7x faster than a commercial solver. The resulting model with learned
parameters outperforms existing methods across several categories on the KITTI
tracking benchmark.
|
1412.3040 | Albert Kim | Albert Kim, Eric Blais, Aditya Parameswaran, Piotr Indyk, Sam Madden,
Ronitt Rubinfeld | Rapid Sampling for Visualizations with Ordering Guarantees | Tech Report. 17 pages. Condensed version to appear in VLDB Vol. 8 No.
5 | null | null | null | cs.DB | http://creativecommons.org/licenses/by-nc-sa/3.0/ | Visualizations are frequently used as a means to understand trends and gather
insights from datasets, but often take a long time to generate. In this paper,
we focus on the problem of rapidly generating approximate visualizations while
preserving crucial visual proper- ties of interest to analysts. Our primary
focus will be on sampling algorithms that preserve the visual property of
ordering; our techniques will also apply to some other visual properties. For
instance, our algorithms can be used to generate an approximate visualization
of a bar chart very rapidly, where the comparisons between any two bars are
correct. We formally show that our sampling algorithms are generally applicable
and provably optimal in theory, in that they do not take more samples than
necessary to generate the visualizations with ordering guarantees. They also
work well in practice, correctly ordering output groups while taking orders of
magnitude fewer samples and much less time than conventional sampling schemes.
| [
{
"version": "v1",
"created": "Tue, 9 Dec 2014 18:08:26 GMT"
}
] | 2014-12-10T00:00:00 | [
[
"Kim",
"Albert",
""
],
[
"Blais",
"Eric",
""
],
[
"Parameswaran",
"Aditya",
""
],
[
"Indyk",
"Piotr",
""
],
[
"Madden",
"Sam",
""
],
[
"Rubinfeld",
"Ronitt",
""
]
] | TITLE: Rapid Sampling for Visualizations with Ordering Guarantees
ABSTRACT: Visualizations are frequently used as a means to understand trends and gather
insights from datasets, but often take a long time to generate. In this paper,
we focus on the problem of rapidly generating approximate visualizations while
preserving crucial visual proper- ties of interest to analysts. Our primary
focus will be on sampling algorithms that preserve the visual property of
ordering; our techniques will also apply to some other visual properties. For
instance, our algorithms can be used to generate an approximate visualization
of a bar chart very rapidly, where the comparisons between any two bars are
correct. We formally show that our sampling algorithms are generally applicable
and provably optimal in theory, in that they do not take more samples than
necessary to generate the visualizations with ordering guarantees. They also
work well in practice, correctly ordering output groups while taking orders of
magnitude fewer samples and much less time than conventional sampling schemes.
|
1406.1485 | Li Yao | Tapani Raiko, Li Yao, Kyunghyun Cho and Yoshua Bengio | Iterative Neural Autoregressive Distribution Estimator (NADE-k) | Accepted at Neural Information Processing Systems (NIPS) 2014 | null | null | null | stat.ML cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Training of the neural autoregressive density estimator (NADE) can be viewed
as doing one step of probabilistic inference on missing values in data. We
propose a new model that extends this inference scheme to multiple steps,
arguing that it is easier to learn to improve a reconstruction in $k$ steps
rather than to learn to reconstruct in a single inference step. The proposed
model is an unsupervised building block for deep learning that combines the
desirable properties of NADE and multi-predictive training: (1) Its test
likelihood can be computed analytically, (2) it is easy to generate independent
samples from it, and (3) it uses an inference engine that is a superset of
variational inference for Boltzmann machines. The proposed NADE-k is
competitive with the state-of-the-art in density estimation on the two datasets
tested.
| [
{
"version": "v1",
"created": "Thu, 5 Jun 2014 19:13:51 GMT"
},
{
"version": "v2",
"created": "Wed, 11 Jun 2014 11:28:36 GMT"
},
{
"version": "v3",
"created": "Sat, 6 Dec 2014 00:22:00 GMT"
}
] | 2014-12-09T00:00:00 | [
[
"Raiko",
"Tapani",
""
],
[
"Yao",
"Li",
""
],
[
"Cho",
"Kyunghyun",
""
],
[
"Bengio",
"Yoshua",
""
]
] | TITLE: Iterative Neural Autoregressive Distribution Estimator (NADE-k)
ABSTRACT: Training of the neural autoregressive density estimator (NADE) can be viewed
as doing one step of probabilistic inference on missing values in data. We
propose a new model that extends this inference scheme to multiple steps,
arguing that it is easier to learn to improve a reconstruction in $k$ steps
rather than to learn to reconstruct in a single inference step. The proposed
model is an unsupervised building block for deep learning that combines the
desirable properties of NADE and multi-predictive training: (1) Its test
likelihood can be computed analytically, (2) it is easy to generate independent
samples from it, and (3) it uses an inference engine that is a superset of
variational inference for Boltzmann machines. The proposed NADE-k is
competitive with the state-of-the-art in density estimation on the two datasets
tested.
|
1411.1792 | Jason Yosinski | Jason Yosinski, Jeff Clune, Yoshua Bengio, Hod Lipson | How transferable are features in deep neural networks? | To appear in Advances in Neural Information Processing Systems 27
(NIPS 2014) | Advances in Neural Information Processing Systems 27, pages
3320-3328. Dec. 2014 | null | null | cs.LG cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Many deep neural networks trained on natural images exhibit a curious
phenomenon in common: on the first layer they learn features similar to Gabor
filters and color blobs. Such first-layer features appear not to be specific to
a particular dataset or task, but general in that they are applicable to many
datasets and tasks. Features must eventually transition from general to
specific by the last layer of the network, but this transition has not been
studied extensively. In this paper we experimentally quantify the generality
versus specificity of neurons in each layer of a deep convolutional neural
network and report a few surprising results. Transferability is negatively
affected by two distinct issues: (1) the specialization of higher layer neurons
to their original task at the expense of performance on the target task, which
was expected, and (2) optimization difficulties related to splitting networks
between co-adapted neurons, which was not expected. In an example network
trained on ImageNet, we demonstrate that either of these two issues may
dominate, depending on whether features are transferred from the bottom,
middle, or top of the network. We also document that the transferability of
features decreases as the distance between the base task and target task
increases, but that transferring features even from distant tasks can be better
than using random features. A final surprising result is that initializing a
network with transferred features from almost any number of layers can produce
a boost to generalization that lingers even after fine-tuning to the target
dataset.
| [
{
"version": "v1",
"created": "Thu, 6 Nov 2014 23:09:37 GMT"
}
] | 2014-12-09T00:00:00 | [
[
"Yosinski",
"Jason",
""
],
[
"Clune",
"Jeff",
""
],
[
"Bengio",
"Yoshua",
""
],
[
"Lipson",
"Hod",
""
]
] | TITLE: How transferable are features in deep neural networks?
ABSTRACT: Many deep neural networks trained on natural images exhibit a curious
phenomenon in common: on the first layer they learn features similar to Gabor
filters and color blobs. Such first-layer features appear not to be specific to
a particular dataset or task, but general in that they are applicable to many
datasets and tasks. Features must eventually transition from general to
specific by the last layer of the network, but this transition has not been
studied extensively. In this paper we experimentally quantify the generality
versus specificity of neurons in each layer of a deep convolutional neural
network and report a few surprising results. Transferability is negatively
affected by two distinct issues: (1) the specialization of higher layer neurons
to their original task at the expense of performance on the target task, which
was expected, and (2) optimization difficulties related to splitting networks
between co-adapted neurons, which was not expected. In an example network
trained on ImageNet, we demonstrate that either of these two issues may
dominate, depending on whether features are transferred from the bottom,
middle, or top of the network. We also document that the transferability of
features decreases as the distance between the base task and target task
increases, but that transferring features even from distant tasks can be better
than using random features. A final surprising result is that initializing a
network with transferred features from almost any number of layers can produce
a boost to generalization that lingers even after fine-tuning to the target
dataset.
|
1412.2485 | Vikram Nathan | Vikram Nathan, Sharath Raghvendra | Accurate Streaming Support Vector Machines | 2 figures, 8 pages | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A widely-used tool for binary classification is the Support Vector Machine
(SVM), a supervised learning technique that finds the "maximum margin" linear
separator between the two classes. While SVMs have been well studied in the
batch (offline) setting, there is considerably less work on the streaming
(online) setting, which requires only a single pass over the data using
sub-linear space. Existing streaming algorithms are not yet competitive with
the batch implementation. In this paper, we use the formulation of the SVM as a
minimum enclosing ball (MEB) problem to provide a streaming SVM algorithm based
off of the blurred ball cover originally proposed by Agarwal and Sharathkumar.
Our implementation consistently outperforms existing streaming SVM approaches
and provides higher accuracies than libSVM on several datasets, thus making it
competitive with the standard SVM batch implementation.
| [
{
"version": "v1",
"created": "Mon, 8 Dec 2014 08:46:07 GMT"
}
] | 2014-12-09T00:00:00 | [
[
"Nathan",
"Vikram",
""
],
[
"Raghvendra",
"Sharath",
""
]
] | TITLE: Accurate Streaming Support Vector Machines
ABSTRACT: A widely-used tool for binary classification is the Support Vector Machine
(SVM), a supervised learning technique that finds the "maximum margin" linear
separator between the two classes. While SVMs have been well studied in the
batch (offline) setting, there is considerably less work on the streaming
(online) setting, which requires only a single pass over the data using
sub-linear space. Existing streaming algorithms are not yet competitive with
the batch implementation. In this paper, we use the formulation of the SVM as a
minimum enclosing ball (MEB) problem to provide a streaming SVM algorithm based
off of the blurred ball cover originally proposed by Agarwal and Sharathkumar.
Our implementation consistently outperforms existing streaming SVM approaches
and provides higher accuracies than libSVM on several datasets, thus making it
competitive with the standard SVM batch implementation.
|
1412.2697 | Hocine Cherifi | Abdelkaher Ait Abdelouahad, Mohammed El Hassouni, Hocine Cherifi, and
Driss Aboutajdine | Image quality assessment measure based on natural image statistics in
the Tetrolet domain | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper deals with a reduced reference (RR) image quality measure based on
natural image statistics modeling. For this purpose, Tetrolet transform is used
since it provides a convenient way to capture local geometric structures. This
transform is applied to both reference and distorted images. Then, Gaussian
Scale Mixture (GSM) is proposed to model subbands in order to take account
statistical dependencies between tetrolet coefficients. In order to quantify
the visual degradation, a measure based on Kullback Leibler Divergence (KLD) is
provided. The proposed measure was tested on the Cornell VCL A-57 dataset and
compared with other measures according to FR-TV1 VQEG framework.
| [
{
"version": "v1",
"created": "Mon, 8 Dec 2014 18:48:26 GMT"
}
] | 2014-12-09T00:00:00 | [
[
"Abdelouahad",
"Abdelkaher Ait",
""
],
[
"Hassouni",
"Mohammed El",
""
],
[
"Cherifi",
"Hocine",
""
],
[
"Aboutajdine",
"Driss",
""
]
] | TITLE: Image quality assessment measure based on natural image statistics in
the Tetrolet domain
ABSTRACT: This paper deals with a reduced reference (RR) image quality measure based on
natural image statistics modeling. For this purpose, Tetrolet transform is used
since it provides a convenient way to capture local geometric structures. This
transform is applied to both reference and distorted images. Then, Gaussian
Scale Mixture (GSM) is proposed to model subbands in order to take account
statistical dependencies between tetrolet coefficients. In order to quantify
the visual degradation, a measure based on Kullback Leibler Divergence (KLD) is
provided. The proposed measure was tested on the Cornell VCL A-57 dataset and
compared with other measures according to FR-TV1 VQEG framework.
|
1412.2716 | Paul Ginsparg | Daniel T. Citron and Paul Ginsparg | Patterns of Text Reuse in a Scientific Corpus | 6 pages, plus 10 pages of supplementary material. To appear in PNAS
(online 8 Dec 2014) | null | 10.1073/pnas.1415135111 | null | cs.DL physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider the incidence of text "reuse" by researchers, via a systematic
pairwise comparison of the text content of all articles deposited to arXiv.org
from 1991--2012. We measure the global frequencies of three classes of text
reuse, and measure how chronic text reuse is distributed among authors in the
dataset. We infer a baseline for accepted practice, perhaps surprisingly
permissive compared with other societal contexts, and a clearly delineated set
of aberrant authors. We find a negative correlation between the amount of
reused text in an article and its influence, as measured by subsequent
citations. Finally, we consider the distribution of countries of origin of
articles containing large amounts of reused text.
| [
{
"version": "v1",
"created": "Mon, 8 Dec 2014 20:01:17 GMT"
}
] | 2014-12-09T00:00:00 | [
[
"Citron",
"Daniel T.",
""
],
[
"Ginsparg",
"Paul",
""
]
] | TITLE: Patterns of Text Reuse in a Scientific Corpus
ABSTRACT: We consider the incidence of text "reuse" by researchers, via a systematic
pairwise comparison of the text content of all articles deposited to arXiv.org
from 1991--2012. We measure the global frequencies of three classes of text
reuse, and measure how chronic text reuse is distributed among authors in the
dataset. We infer a baseline for accepted practice, perhaps surprisingly
permissive compared with other societal contexts, and a clearly delineated set
of aberrant authors. We find a negative correlation between the amount of
reused text in an article and its influence, as measured by subsequent
citations. Finally, we consider the distribution of countries of origin of
articles containing large amounts of reused text.
|
1404.7467 | Fangfang Li | Fangfang Li, Guandong Xu, Longbing Cao | Coupled Matrix Factorization within Non-IID Context | 12 pages submitted to PAKDD 2015 | null | null | null | cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Recommender systems research has experienced different stages such as from
user preference understanding to content analysis. Typical recommendation
algorithms were built on the following bases: (1) assuming users and items are
IID, namely independent and identically distributed, and (2) focusing on
specific aspects such as user preferences or contents. In reality, complex
recommendation tasks involve and request (1) personalized outcomes to tailor
heterogeneous subjective preferences; and (2) explicit and implicit objective
coupling relationships between users, items, and ratings to be considered as
intrinsic forces driving preferences. This inevitably involves the non-IID
complexity and the need of combining subjective preference with objective
couplings hidden in recommendation applications. In this paper, we propose a
novel generic coupled matrix factorization (CMF) model by incorporating non-IID
coupling relations between users and items. Such couplings integrate the
intra-coupled interactions within an attribute and inter-coupled interactions
among different attributes. Experimental results on two open data sets
demonstrate that the user/item couplings can be effectively applied in RS and
CMF outperforms the benchmark methods.
| [
{
"version": "v1",
"created": "Tue, 8 Apr 2014 02:10:16 GMT"
},
{
"version": "v2",
"created": "Thu, 4 Dec 2014 23:29:33 GMT"
}
] | 2014-12-08T00:00:00 | [
[
"Li",
"Fangfang",
""
],
[
"Xu",
"Guandong",
""
],
[
"Cao",
"Longbing",
""
]
] | TITLE: Coupled Matrix Factorization within Non-IID Context
ABSTRACT: Recommender systems research has experienced different stages such as from
user preference understanding to content analysis. Typical recommendation
algorithms were built on the following bases: (1) assuming users and items are
IID, namely independent and identically distributed, and (2) focusing on
specific aspects such as user preferences or contents. In reality, complex
recommendation tasks involve and request (1) personalized outcomes to tailor
heterogeneous subjective preferences; and (2) explicit and implicit objective
coupling relationships between users, items, and ratings to be considered as
intrinsic forces driving preferences. This inevitably involves the non-IID
complexity and the need of combining subjective preference with objective
couplings hidden in recommendation applications. In this paper, we propose a
novel generic coupled matrix factorization (CMF) model by incorporating non-IID
coupling relations between users and items. Such couplings integrate the
intra-coupled interactions within an attribute and inter-coupled interactions
among different attributes. Experimental results on two open data sets
demonstrate that the user/item couplings can be effectively applied in RS and
CMF outperforms the benchmark methods.
|
1410.7454 | Neeraj Dhungel | Neeraj Dhungel, Gustavo Carneiro, Andrew P. Bradley | Deep Structured learning for mass segmentation from Mammograms | 4 pages, 2 figures | null | null | null | cs.CV | http://creativecommons.org/licenses/by/3.0/ | In this paper, we present a novel method for the segmentation of breast
masses from mammograms exploring structured and deep learning. Specifically,
using structured support vector machine (SSVM), we formulate a model that
combines different types of potential functions, including one that classifies
image regions using deep learning. Our main goal with this work is to show the
accuracy and efficiency improvements that these relatively new techniques can
provide for the segmentation of breast masses from mammograms. We also propose
an easily reproducible quantitative analysis to as- sess the performance of
breast mass segmentation methodologies based on widely accepted accuracy and
running time measurements on public datasets, which will facilitate further
comparisons for this segmentation problem. In particular, we use two publicly
available datasets (DDSM-BCRP and INbreast) and propose the computa- tion of
the running time taken for the methodology to produce a mass segmentation given
an input image and the use of the Dice index to quantitatively measure the
segmentation accuracy. For both databases, we show that our proposed
methodology produces competitive results in terms of accuracy and running time.
| [
{
"version": "v1",
"created": "Mon, 27 Oct 2014 22:44:26 GMT"
},
{
"version": "v2",
"created": "Fri, 5 Dec 2014 01:21:39 GMT"
}
] | 2014-12-08T00:00:00 | [
[
"Dhungel",
"Neeraj",
""
],
[
"Carneiro",
"Gustavo",
""
],
[
"Bradley",
"Andrew P.",
""
]
] | TITLE: Deep Structured learning for mass segmentation from Mammograms
ABSTRACT: In this paper, we present a novel method for the segmentation of breast
masses from mammograms exploring structured and deep learning. Specifically,
using structured support vector machine (SSVM), we formulate a model that
combines different types of potential functions, including one that classifies
image regions using deep learning. Our main goal with this work is to show the
accuracy and efficiency improvements that these relatively new techniques can
provide for the segmentation of breast masses from mammograms. We also propose
an easily reproducible quantitative analysis to as- sess the performance of
breast mass segmentation methodologies based on widely accepted accuracy and
running time measurements on public datasets, which will facilitate further
comparisons for this segmentation problem. In particular, we use two publicly
available datasets (DDSM-BCRP and INbreast) and propose the computa- tion of
the running time taken for the methodology to produce a mass segmentation given
an input image and the use of the Dice index to quantitatively measure the
segmentation accuracy. For both databases, we show that our proposed
methodology produces competitive results in terms of accuracy and running time.
|
1412.1842 | Max Jaderberg | Max Jaderberg, Karen Simonyan, Andrea Vedaldi, Andrew Zisserman | Reading Text in the Wild with Convolutional Neural Networks | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this work we present an end-to-end system for text spotting -- localising
and recognising text in natural scene images -- and text based image retrieval.
This system is based on a region proposal mechanism for detection and deep
convolutional neural networks for recognition. Our pipeline uses a novel
combination of complementary proposal generation techniques to ensure high
recall, and a fast subsequent filtering stage for improving precision. For the
recognition and ranking of proposals, we train very large convolutional neural
networks to perform word recognition on the whole proposal region at the same
time, departing from the character classifier based systems of the past. These
networks are trained solely on data produced by a synthetic text generation
engine, requiring no human labelled data.
Analysing the stages of our pipeline, we show state-of-the-art performance
throughout. We perform rigorous experiments across a number of standard
end-to-end text spotting benchmarks and text-based image retrieval datasets,
showing a large improvement over all previous methods. Finally, we demonstrate
a real-world application of our text spotting system to allow thousands of
hours of news footage to be instantly searchable via a text query.
| [
{
"version": "v1",
"created": "Thu, 4 Dec 2014 21:14:59 GMT"
}
] | 2014-12-08T00:00:00 | [
[
"Jaderberg",
"Max",
""
],
[
"Simonyan",
"Karen",
""
],
[
"Vedaldi",
"Andrea",
""
],
[
"Zisserman",
"Andrew",
""
]
] | TITLE: Reading Text in the Wild with Convolutional Neural Networks
ABSTRACT: In this work we present an end-to-end system for text spotting -- localising
and recognising text in natural scene images -- and text based image retrieval.
This system is based on a region proposal mechanism for detection and deep
convolutional neural networks for recognition. Our pipeline uses a novel
combination of complementary proposal generation techniques to ensure high
recall, and a fast subsequent filtering stage for improving precision. For the
recognition and ranking of proposals, we train very large convolutional neural
networks to perform word recognition on the whole proposal region at the same
time, departing from the character classifier based systems of the past. These
networks are trained solely on data produced by a synthetic text generation
engine, requiring no human labelled data.
Analysing the stages of our pipeline, we show state-of-the-art performance
throughout. We perform rigorous experiments across a number of standard
end-to-end text spotting benchmarks and text-based image retrieval datasets,
showing a large improvement over all previous methods. Finally, we demonstrate
a real-world application of our text spotting system to allow thousands of
hours of news footage to be instantly searchable via a text query.
|
1412.1888 | Rafi Muhammad | Muhammad Rafi, Farnaz Amin, Mohammad Shahid Shaikh | Document clustering using graph based document representation with
constraints | null | null | null | null | cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Document clustering is an unsupervised approach in which a large collection
of documents (corpus) is subdivided into smaller, meaningful, identifiable, and
verifiable sub-groups (clusters). Meaningful representation of documents and
implicitly identifying the patterns, on which this separation is performed, is
the challenging part of document clustering. We have proposed a document
clustering technique using graph based document representation with
constraints. A graph data structure can easily capture the non-linear
relationships of nodes, document contains various feature terms that can be
non-linearly connected hence a graph can easily represents this information.
Constrains, are explicit conditions for document clustering where background
knowledge is use to set the direction for Linking or Not-Linking a set of
documents for a target clusters, thus guiding the clustering process. We deemed
clustering is an ill-define problem, there can be many clustering results.
Background knowledge can be used to drive the clustering algorithm in the right
direction. We have proposed three different types of constraints, Instance
level, corpus level and cluster level constraints. A new algorithm Constrained
HAC is also proposed which will incorporate Instance level constraints as prior
knowledge; it will guide the clustering process leading to better results.
Extensive set of experiments have been performed on both synthetic and standard
document clustering datasets, results are compared on standard clustering
measures like: purity, entropy and F-measure. Results clearly establish that
our proposed approach leads to improvement in cluster quality.
| [
{
"version": "v1",
"created": "Fri, 5 Dec 2014 03:47:34 GMT"
}
] | 2014-12-08T00:00:00 | [
[
"Rafi",
"Muhammad",
""
],
[
"Amin",
"Farnaz",
""
],
[
"Shaikh",
"Mohammad Shahid",
""
]
] | TITLE: Document clustering using graph based document representation with
constraints
ABSTRACT: Document clustering is an unsupervised approach in which a large collection
of documents (corpus) is subdivided into smaller, meaningful, identifiable, and
verifiable sub-groups (clusters). Meaningful representation of documents and
implicitly identifying the patterns, on which this separation is performed, is
the challenging part of document clustering. We have proposed a document
clustering technique using graph based document representation with
constraints. A graph data structure can easily capture the non-linear
relationships of nodes, document contains various feature terms that can be
non-linearly connected hence a graph can easily represents this information.
Constrains, are explicit conditions for document clustering where background
knowledge is use to set the direction for Linking or Not-Linking a set of
documents for a target clusters, thus guiding the clustering process. We deemed
clustering is an ill-define problem, there can be many clustering results.
Background knowledge can be used to drive the clustering algorithm in the right
direction. We have proposed three different types of constraints, Instance
level, corpus level and cluster level constraints. A new algorithm Constrained
HAC is also proposed which will incorporate Instance level constraints as prior
knowledge; it will guide the clustering process leading to better results.
Extensive set of experiments have been performed on both synthetic and standard
document clustering datasets, results are compared on standard clustering
measures like: purity, entropy and F-measure. Results clearly establish that
our proposed approach leads to improvement in cluster quality.
|
1412.1908 | Rui Zhao | Rui Zhao, Wanli Ouyang, Xiaogang Wang | Person Re-identification by Saliency Learning | This manuscript has 14 pages with 25 figures, and a preliminary
version was published in ICCV 2013 | null | null | null | cs.CV | http://creativecommons.org/licenses/by-nc-sa/3.0/ | Human eyes can recognize person identities based on small salient regions,
i.e. human saliency is distinctive and reliable in pedestrian matching across
disjoint camera views. However, such valuable information is often hidden when
computing similarities of pedestrian images with existing approaches. Inspired
by our user study result of human perception on human saliency, we propose a
novel perspective for person re-identification based on learning human saliency
and matching saliency distribution. The proposed saliency learning and matching
framework consists of four steps: (1) To handle misalignment caused by drastic
viewpoint change and pose variations, we apply adjacency constrained patch
matching to build dense correspondence between image pairs. (2) We propose two
alternative methods, i.e. K-Nearest Neighbors and One-class SVM, to estimate a
saliency score for each image patch, through which distinctive features stand
out without using identity labels in the training procedure. (3) saliency
matching is proposed based on patch matching. Matching patches with
inconsistent saliency brings penalty, and images of the same identity are
recognized by minimizing the saliency matching cost. (4) Furthermore, saliency
matching is tightly integrated with patch matching in a unified structural
RankSVM learning framework. The effectiveness of our approach is validated on
the VIPeR dataset and the CUHK01 dataset. Our approach outperforms the
state-of-the-art person re-identification methods on both datasets.
| [
{
"version": "v1",
"created": "Fri, 5 Dec 2014 07:33:48 GMT"
}
] | 2014-12-08T00:00:00 | [
[
"Zhao",
"Rui",
""
],
[
"Ouyang",
"Wanli",
""
],
[
"Wang",
"Xiaogang",
""
]
] | TITLE: Person Re-identification by Saliency Learning
ABSTRACT: Human eyes can recognize person identities based on small salient regions,
i.e. human saliency is distinctive and reliable in pedestrian matching across
disjoint camera views. However, such valuable information is often hidden when
computing similarities of pedestrian images with existing approaches. Inspired
by our user study result of human perception on human saliency, we propose a
novel perspective for person re-identification based on learning human saliency
and matching saliency distribution. The proposed saliency learning and matching
framework consists of four steps: (1) To handle misalignment caused by drastic
viewpoint change and pose variations, we apply adjacency constrained patch
matching to build dense correspondence between image pairs. (2) We propose two
alternative methods, i.e. K-Nearest Neighbors and One-class SVM, to estimate a
saliency score for each image patch, through which distinctive features stand
out without using identity labels in the training procedure. (3) saliency
matching is proposed based on patch matching. Matching patches with
inconsistent saliency brings penalty, and images of the same identity are
recognized by minimizing the saliency matching cost. (4) Furthermore, saliency
matching is tightly integrated with patch matching in a unified structural
RankSVM learning framework. The effectiveness of our approach is validated on
the VIPeR dataset and the CUHK01 dataset. Our approach outperforms the
state-of-the-art person re-identification methods on both datasets.
|
1412.1947 | Aditya AV Sastry Mr. | Aditya AV Sastry and Kalyan Netti | A parallel sampling based clustering | null | null | null | null | cs.LG | http://creativecommons.org/licenses/publicdomain/ | The problem of automatically clustering data is an age old problem. People
have created numerous algorithms to tackle this problem. The execution time of
any of this algorithm grows with the number of input points and the number of
cluster centers required. To reduce the number of input points we could average
the points locally and use the means or the local centers as the input for
clustering. However since the required number of local centers is very high,
running the clustering algorithm on the entire dataset to obtain these
representational points is very time consuming. To remedy this problem, in this
paper we are proposing two subclustering schemes where by we subdivide the
dataset into smaller sets and run the clustering algorithm on the smaller
datasets to obtain the required number of datapoints to run our clustering
algorithm with. As we are subdividing the given dataset, we could run
clustering algorithm on each smaller piece of the dataset in parallel. We found
that both parallel and serial execution of this method to be much faster than
the original clustering algorithm and error in running the clustering algorithm
on a reduced set to be very less.
| [
{
"version": "v1",
"created": "Fri, 5 Dec 2014 10:50:31 GMT"
}
] | 2014-12-08T00:00:00 | [
[
"Sastry",
"Aditya AV",
""
],
[
"Netti",
"Kalyan",
""
]
] | TITLE: A parallel sampling based clustering
ABSTRACT: The problem of automatically clustering data is an age old problem. People
have created numerous algorithms to tackle this problem. The execution time of
any of this algorithm grows with the number of input points and the number of
cluster centers required. To reduce the number of input points we could average
the points locally and use the means or the local centers as the input for
clustering. However since the required number of local centers is very high,
running the clustering algorithm on the entire dataset to obtain these
representational points is very time consuming. To remedy this problem, in this
paper we are proposing two subclustering schemes where by we subdivide the
dataset into smaller sets and run the clustering algorithm on the smaller
datasets to obtain the required number of datapoints to run our clustering
algorithm with. As we are subdividing the given dataset, we could run
clustering algorithm on each smaller piece of the dataset in parallel. We found
that both parallel and serial execution of this method to be much faster than
the original clustering algorithm and error in running the clustering algorithm
on a reduced set to be very less.
|
1306.3534 | Ashish Vulimiri | Ashish Vulimiri, P. Brighten Godfrey, Sri Varsha Gorge, Zitian Liu and
Scott Shenker | A cost-benefit analysis of low latency via added utilization | null | null | null | null | cs.NI cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Several recently proposed techniques achieve latency reduction by trading it
off for some amount of additional bandwidth usage. But how would one quantify
whether the tradeoff is actually beneficial in a given system? We develop an
economic cost vs. benefit analysis for answering this question. We use the
analysis to derive a benchmark for wide-area client-server applications, and
demonstrate how it can be applied to reason about a particular latency saving
technique --- redundant DNS requests.
| [
{
"version": "v1",
"created": "Sat, 15 Jun 2013 00:31:56 GMT"
},
{
"version": "v2",
"created": "Mon, 10 Nov 2014 16:56:41 GMT"
},
{
"version": "v3",
"created": "Fri, 14 Nov 2014 12:38:20 GMT"
},
{
"version": "v4",
"created": "Thu, 4 Dec 2014 20:53:48 GMT"
}
] | 2014-12-05T00:00:00 | [
[
"Vulimiri",
"Ashish",
""
],
[
"Godfrey",
"P. Brighten",
""
],
[
"Gorge",
"Sri Varsha",
""
],
[
"Liu",
"Zitian",
""
],
[
"Shenker",
"Scott",
""
]
] | TITLE: A cost-benefit analysis of low latency via added utilization
ABSTRACT: Several recently proposed techniques achieve latency reduction by trading it
off for some amount of additional bandwidth usage. But how would one quantify
whether the tradeoff is actually beneficial in a given system? We develop an
economic cost vs. benefit analysis for answering this question. We use the
analysis to derive a benchmark for wide-area client-server applications, and
demonstrate how it can be applied to reason about a particular latency saving
technique --- redundant DNS requests.
|
1404.1602 | James Pallister | James Pallister, Kerstin Eder, Simon J. Hollis, Jeremy Bennett | A high-level model of embedded flash energy consumption | null | null | 10.1145/2656106.2656108 | null | cs.AR | http://creativecommons.org/licenses/by-nc-sa/3.0/ | The alignment of code in the flash memory of deeply embedded SoCs can have a
large impact on the total energy consumption of a computation. We investigate
the effect of code alignment in six SoCs and find that a large proportion of
this energy (up to 15% of total SoC energy consumption) can be saved by changes
to the alignment.
A flexible model is created to predict the read-access energy consumption of
flash memory on deeply embedded SoCs, where code is executed in place. This
model uses the instruction level memory accesses performed by the processor to
calculate the flash energy consumption of a sequence of instructions. We derive
the model parameters for five SoCs and validate them. The error is as low as
5%, with a 11% average normalized RMS deviation overall.
The scope for using this model to optimize code alignment is explored across
a range of benchmarks and SoCs. Analysis shows that over 30% of loops can be
better aligned. This can significantly reduce energy while increasing code size
by less than 4%. We conclude that this effect has potential as an effective
optimization, saving significant energy in deeply embedded SoCs.
| [
{
"version": "v1",
"created": "Sun, 6 Apr 2014 17:34:23 GMT"
},
{
"version": "v2",
"created": "Wed, 23 Apr 2014 08:53:35 GMT"
}
] | 2014-12-05T00:00:00 | [
[
"Pallister",
"James",
""
],
[
"Eder",
"Kerstin",
""
],
[
"Hollis",
"Simon J.",
""
],
[
"Bennett",
"Jeremy",
""
]
] | TITLE: A high-level model of embedded flash energy consumption
ABSTRACT: The alignment of code in the flash memory of deeply embedded SoCs can have a
large impact on the total energy consumption of a computation. We investigate
the effect of code alignment in six SoCs and find that a large proportion of
this energy (up to 15% of total SoC energy consumption) can be saved by changes
to the alignment.
A flexible model is created to predict the read-access energy consumption of
flash memory on deeply embedded SoCs, where code is executed in place. This
model uses the instruction level memory accesses performed by the processor to
calculate the flash energy consumption of a sequence of instructions. We derive
the model parameters for five SoCs and validate them. The error is as low as
5%, with a 11% average normalized RMS deviation overall.
The scope for using this model to optimize code alignment is explored across
a range of benchmarks and SoCs. Analysis shows that over 30% of loops can be
better aligned. This can significantly reduce energy while increasing code size
by less than 4%. We conclude that this effect has potential as an effective
optimization, saving significant energy in deeply embedded SoCs.
|
1409.1801 | Stephen Plaza | Stephen M. Plaza, Toufiq Parag, Gary B. Huang, Donald J. Olbris,
Mathew A. Saunders, Patricia K. Rivlin | Annotating Synapses in Large EM Datasets | null | null | null | null | q-bio.QM cs.CV q-bio.NC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Reconstructing neuronal circuits at the level of synapses is a central
problem in neuroscience and becoming a focus of the emerging field of
connectomics. To date, electron microscopy (EM) is the most proven technique
for identifying and quantifying synaptic connections. As advances in EM make
acquiring larger datasets possible, subsequent manual synapse identification
({\em i.e.}, proofreading) for deciphering a connectome becomes a major time
bottleneck. Here we introduce a large-scale, high-throughput, and
semi-automated methodology to efficiently identify synapses. We successfully
applied our methodology to the Drosophila medulla optic lobe, annotating many
more synapses than previous connectome efforts. Our approaches are extensible
and will make the often complicated process of synapse identification
accessible to a wider-community of potential proofreaders.
| [
{
"version": "v1",
"created": "Fri, 5 Sep 2014 13:52:47 GMT"
},
{
"version": "v2",
"created": "Thu, 4 Dec 2014 16:18:01 GMT"
}
] | 2014-12-05T00:00:00 | [
[
"Plaza",
"Stephen M.",
""
],
[
"Parag",
"Toufiq",
""
],
[
"Huang",
"Gary B.",
""
],
[
"Olbris",
"Donald J.",
""
],
[
"Saunders",
"Mathew A.",
""
],
[
"Rivlin",
"Patricia K.",
""
]
] | TITLE: Annotating Synapses in Large EM Datasets
ABSTRACT: Reconstructing neuronal circuits at the level of synapses is a central
problem in neuroscience and becoming a focus of the emerging field of
connectomics. To date, electron microscopy (EM) is the most proven technique
for identifying and quantifying synaptic connections. As advances in EM make
acquiring larger datasets possible, subsequent manual synapse identification
({\em i.e.}, proofreading) for deciphering a connectome becomes a major time
bottleneck. Here we introduce a large-scale, high-throughput, and
semi-automated methodology to efficiently identify synapses. We successfully
applied our methodology to the Drosophila medulla optic lobe, annotating many
more synapses than previous connectome efforts. Our approaches are extensible
and will make the often complicated process of synapse identification
accessible to a wider-community of potential proofreaders.
|
1412.1602 | Jan Chorowski | Jan Chorowski, Dzmitry Bahdanau, Kyunghyun Cho, Yoshua Bengio | End-to-end Continuous Speech Recognition using Attention-based Recurrent
NN: First Results | As accepted to: Deep Learning and Representation Learning Workshop,
NIPS 2014 | null | null | null | cs.NE cs.LG stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We replace the Hidden Markov Model (HMM) which is traditionally used in in
continuous speech recognition with a bi-directional recurrent neural network
encoder coupled to a recurrent neural network decoder that directly emits a
stream of phonemes. The alignment between the input and output sequences is
established using an attention mechanism: the decoder emits each symbol based
on a context created with a subset of input symbols elected by the attention
mechanism. We report initial results demonstrating that this new approach
achieves phoneme error rates that are comparable to the state-of-the-art
HMM-based decoders, on the TIMIT dataset.
| [
{
"version": "v1",
"created": "Thu, 4 Dec 2014 10:00:19 GMT"
}
] | 2014-12-05T00:00:00 | [
[
"Chorowski",
"Jan",
""
],
[
"Bahdanau",
"Dzmitry",
""
],
[
"Cho",
"Kyunghyun",
""
],
[
"Bengio",
"Yoshua",
""
]
] | TITLE: End-to-end Continuous Speech Recognition using Attention-based Recurrent
NN: First Results
ABSTRACT: We replace the Hidden Markov Model (HMM) which is traditionally used in in
continuous speech recognition with a bi-directional recurrent neural network
encoder coupled to a recurrent neural network decoder that directly emits a
stream of phonemes. The alignment between the input and output sequences is
established using an attention mechanism: the decoder emits each symbol based
on a context created with a subset of input symbols elected by the attention
mechanism. We report initial results demonstrating that this new approach
achieves phoneme error rates that are comparable to the state-of-the-art
HMM-based decoders, on the TIMIT dataset.
|
1412.1632 | Lei Yu | Lei Yu, Karl Moritz Hermann, Phil Blunsom and Stephen Pulman | Deep Learning for Answer Sentence Selection | 9 pages, accepted by NIPS deep learning workshop | null | null | null | cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Answer sentence selection is the task of identifying sentences that contain
the answer to a given question. This is an important problem in its own right
as well as in the larger context of open domain question answering. We propose
a novel approach to solving this task via means of distributed representations,
and learn to match questions with answers by considering their semantic
encoding. This contrasts prior work on this task, which typically relies on
classifiers with large numbers of hand-crafted syntactic and semantic features
and various external resources. Our approach does not require any feature
engineering nor does it involve specialist linguistic data, making this model
easily applicable to a wide range of domains and languages. Experimental
results on a standard benchmark dataset from TREC demonstrate that---despite
its simplicity---our model matches state of the art performance on the answer
sentence selection task.
| [
{
"version": "v1",
"created": "Thu, 4 Dec 2014 11:53:02 GMT"
}
] | 2014-12-05T00:00:00 | [
[
"Yu",
"Lei",
""
],
[
"Hermann",
"Karl Moritz",
""
],
[
"Blunsom",
"Phil",
""
],
[
"Pulman",
"Stephen",
""
]
] | TITLE: Deep Learning for Answer Sentence Selection
ABSTRACT: Answer sentence selection is the task of identifying sentences that contain
the answer to a given question. This is an important problem in its own right
as well as in the larger context of open domain question answering. We propose
a novel approach to solving this task via means of distributed representations,
and learn to match questions with answers by considering their semantic
encoding. This contrasts prior work on this task, which typically relies on
classifiers with large numbers of hand-crafted syntactic and semantic features
and various external resources. Our approach does not require any feature
engineering nor does it involve specialist linguistic data, making this model
easily applicable to a wide range of domains and languages. Experimental
results on a standard benchmark dataset from TREC demonstrate that---despite
its simplicity---our model matches state of the art performance on the answer
sentence selection task.
|
1412.1710 | Kaiming He | Kaiming He, Jian Sun | Convolutional Neural Networks at Constrained Time Cost | 8-page technical report | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Though recent advanced convolutional neural networks (CNNs) have been
improving the image recognition accuracy, the models are getting more complex
and time-consuming. For real-world applications in industrial and commercial
scenarios, engineers and developers are often faced with the requirement of
constrained time budget. In this paper, we investigate the accuracy of CNNs
under constrained time cost. Under this constraint, the designs of the network
architectures should exhibit as trade-offs among the factors like depth,
numbers of filters, filter sizes, etc. With a series of controlled comparisons,
we progressively modify a baseline model while preserving its time complexity.
This is also helpful for understanding the importance of the factors in network
designs. We present an architecture that achieves very competitive accuracy in
the ImageNet dataset (11.8% top-5 error, 10-view test), yet is 20% faster than
"AlexNet" (16.0% top-5 error, 10-view test).
| [
{
"version": "v1",
"created": "Thu, 4 Dec 2014 16:00:47 GMT"
}
] | 2014-12-05T00:00:00 | [
[
"He",
"Kaiming",
""
],
[
"Sun",
"Jian",
""
]
] | TITLE: Convolutional Neural Networks at Constrained Time Cost
ABSTRACT: Though recent advanced convolutional neural networks (CNNs) have been
improving the image recognition accuracy, the models are getting more complex
and time-consuming. For real-world applications in industrial and commercial
scenarios, engineers and developers are often faced with the requirement of
constrained time budget. In this paper, we investigate the accuracy of CNNs
under constrained time cost. Under this constraint, the designs of the network
architectures should exhibit as trade-offs among the factors like depth,
numbers of filters, filter sizes, etc. With a series of controlled comparisons,
we progressively modify a baseline model while preserving its time complexity.
This is also helpful for understanding the importance of the factors in network
designs. We present an architecture that achieves very competitive accuracy in
the ImageNet dataset (11.8% top-5 error, 10-view test), yet is 20% faster than
"AlexNet" (16.0% top-5 error, 10-view test).
|
1412.1717 | Dhagash Mehta | Joseph Cleveland, Jeffrey Dzugan, Jonathan D. Hauenstein, Ian Haywood,
Dhagash Mehta, Anthony Morse, Leonardo Robol and Taylor Schlenk | Certified counting of roots of random univariate polynomials | 28 pages, 16 figures | null | null | null | math.NA cs.NA hep-th nlin.CD | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A challenging problem in computational mathematics is to compute roots of a
high-degree univariate random polynomial. We combine an efficient
multiprecision implementation for solving high-degree random polynomials with
two certification methods, namely Smale's $\alpha$-theory and one based on
Gerschgorin's theorem, for showing that a given numerical approximation is in
the quadratic convergence region of Newton's method of some exact solution.
With this combination, we can certifiably count the number of real roots of
random polynomials. We quantify the difference between the two certification
procedures and list the salient features of both of them. After benchmarking on
random polynomials where the coefficients are drawn from the Gaussian
distribution, we obtain novel experimental results for the Cauchy distribution
case.
| [
{
"version": "v1",
"created": "Thu, 4 Dec 2014 16:20:06 GMT"
}
] | 2014-12-05T00:00:00 | [
[
"Cleveland",
"Joseph",
""
],
[
"Dzugan",
"Jeffrey",
""
],
[
"Hauenstein",
"Jonathan D.",
""
],
[
"Haywood",
"Ian",
""
],
[
"Mehta",
"Dhagash",
""
],
[
"Morse",
"Anthony",
""
],
[
"Robol",
"Leonardo",
""
],
[
"Schlenk",
"Taylor",
""
]
] | TITLE: Certified counting of roots of random univariate polynomials
ABSTRACT: A challenging problem in computational mathematics is to compute roots of a
high-degree univariate random polynomial. We combine an efficient
multiprecision implementation for solving high-degree random polynomials with
two certification methods, namely Smale's $\alpha$-theory and one based on
Gerschgorin's theorem, for showing that a given numerical approximation is in
the quadratic convergence region of Newton's method of some exact solution.
With this combination, we can certifiably count the number of real roots of
random polynomials. We quantify the difference between the two certification
procedures and list the salient features of both of them. After benchmarking on
random polynomials where the coefficients are drawn from the Gaussian
distribution, we obtain novel experimental results for the Cauchy distribution
case.
|
1412.1788 | Francis Bach | Felipe Yanez (LIENS, INRIA Paris - Rocquencourt), Francis Bach (LIENS,
INRIA Paris - Rocquencourt) | Primal-Dual Algorithms for Non-negative Matrix Factorization with the
Kullback-Leibler Divergence | null | null | null | null | cs.LG math.OC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Non-negative matrix factorization (NMF) approximates a given matrix as a
product of two non-negative matrices. Multiplicative algorithms deliver
reliable results, but they show slow convergence for high-dimensional data and
may be stuck away from local minima. Gradient descent methods have better
behavior, but only apply to smooth losses such as the least-squares loss. In
this article, we propose a first-order primal-dual algorithm for non-negative
decomposition problems (where one factor is fixed) with the KL divergence,
based on the Chambolle-Pock algorithm. All required computations may be
obtained in closed form and we provide an efficient heuristic way to select
step-sizes. By using alternating optimization, our algorithm readily extends to
NMF and, on synthetic examples, face recognition or music source separation
datasets, it is either faster than existing algorithms, or leads to improved
local optima, or both.
| [
{
"version": "v1",
"created": "Thu, 4 Dec 2014 19:56:02 GMT"
}
] | 2014-12-05T00:00:00 | [
[
"Yanez",
"Felipe",
"",
"LIENS, INRIA Paris - Rocquencourt"
],
[
"Bach",
"Francis",
"",
"LIENS,\n INRIA Paris - Rocquencourt"
]
] | TITLE: Primal-Dual Algorithms for Non-negative Matrix Factorization with the
Kullback-Leibler Divergence
ABSTRACT: Non-negative matrix factorization (NMF) approximates a given matrix as a
product of two non-negative matrices. Multiplicative algorithms deliver
reliable results, but they show slow convergence for high-dimensional data and
may be stuck away from local minima. Gradient descent methods have better
behavior, but only apply to smooth losses such as the least-squares loss. In
this article, we propose a first-order primal-dual algorithm for non-negative
decomposition problems (where one factor is fixed) with the KL divergence,
based on the Chambolle-Pock algorithm. All required computations may be
obtained in closed form and we provide an efficient heuristic way to select
step-sizes. By using alternating optimization, our algorithm readily extends to
NMF and, on synthetic examples, face recognition or music source separation
datasets, it is either faster than existing algorithms, or leads to improved
local optima, or both.
|
1309.5643 | Veronika Cheplygina | Veronika Cheplygina, David M. J. Tax, and Marco Loog | Multiple Instance Learning with Bag Dissimilarities | Pattern Recognition, in press | Pattern Recognition 48.1 (2015): 264-275 | 10.1016/j.patcog.2014.07.022 | null | stat.ML cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Multiple instance learning (MIL) is concerned with learning from sets (bags)
of objects (instances), where the individual instance labels are ambiguous. In
this setting, supervised learning cannot be applied directly. Often,
specialized MIL methods learn by making additional assumptions about the
relationship of the bag labels and instance labels. Such assumptions may fit a
particular dataset, but do not generalize to the whole range of MIL problems.
Other MIL methods shift the focus of assumptions from the labels to the overall
(dis)similarity of bags, and therefore learn from bags directly. We propose to
represent each bag by a vector of its dissimilarities to other bags in the
training set, and treat these dissimilarities as a feature representation. We
show several alternatives to define a dissimilarity between bags and discuss
which definitions are more suitable for particular MIL problems. The
experimental results show that the proposed approach is computationally
inexpensive, yet very competitive with state-of-the-art algorithms on a wide
range of MIL datasets.
| [
{
"version": "v1",
"created": "Sun, 22 Sep 2013 20:24:50 GMT"
},
{
"version": "v2",
"created": "Thu, 6 Feb 2014 13:13:11 GMT"
},
{
"version": "v3",
"created": "Tue, 12 Aug 2014 09:04:32 GMT"
}
] | 2014-12-04T00:00:00 | [
[
"Cheplygina",
"Veronika",
""
],
[
"Tax",
"David M. J.",
""
],
[
"Loog",
"Marco",
""
]
] | TITLE: Multiple Instance Learning with Bag Dissimilarities
ABSTRACT: Multiple instance learning (MIL) is concerned with learning from sets (bags)
of objects (instances), where the individual instance labels are ambiguous. In
this setting, supervised learning cannot be applied directly. Often,
specialized MIL methods learn by making additional assumptions about the
relationship of the bag labels and instance labels. Such assumptions may fit a
particular dataset, but do not generalize to the whole range of MIL problems.
Other MIL methods shift the focus of assumptions from the labels to the overall
(dis)similarity of bags, and therefore learn from bags directly. We propose to
represent each bag by a vector of its dissimilarities to other bags in the
training set, and treat these dissimilarities as a feature representation. We
show several alternatives to define a dissimilarity between bags and discuss
which definitions are more suitable for particular MIL problems. The
experimental results show that the proposed approach is computationally
inexpensive, yet very competitive with state-of-the-art algorithms on a wide
range of MIL datasets.
|
1406.2348 | Szymon Grabowski | Szymon Grabowski, Marcin Raniszewski | Sampling the suffix array with minimizers | One new SamSAMi variant; extended experimental results | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Sampling (evenly) the suffixes from the suffix array is an old idea trading
the pattern search time for reduced index space. A few years ago Claude et al.
showed an alphabet sampling scheme allowing for more efficient pattern searches
compared to the sparse suffix array, for long enough patterns. A drawback of
their approach is the requirement that sought patterns need to contain at least
one character from the chosen subalphabet. In this work we propose an
alternative suffix sampling approach with only a minimum pattern length as a
requirement, which seems more convenient in practice. Experiments show that our
algorithm achieves competitive time-space tradeoffs on most standard benchmark
data.
| [
{
"version": "v1",
"created": "Mon, 9 Jun 2014 20:36:01 GMT"
},
{
"version": "v2",
"created": "Wed, 3 Dec 2014 19:39:41 GMT"
}
] | 2014-12-04T00:00:00 | [
[
"Grabowski",
"Szymon",
""
],
[
"Raniszewski",
"Marcin",
""
]
] | TITLE: Sampling the suffix array with minimizers
ABSTRACT: Sampling (evenly) the suffixes from the suffix array is an old idea trading
the pattern search time for reduced index space. A few years ago Claude et al.
showed an alphabet sampling scheme allowing for more efficient pattern searches
compared to the sparse suffix array, for long enough patterns. A drawback of
their approach is the requirement that sought patterns need to contain at least
one character from the chosen subalphabet. In this work we propose an
alternative suffix sampling approach with only a minimum pattern length as a
requirement, which seems more convenient in practice. Experiments show that our
algorithm achieves competitive time-space tradeoffs on most standard benchmark
data.
|
1410.4345 | Joel Akeret | Joel Akeret, Lukas Gamper, Adam Amara, Alexandre Refregier (ETH
Zurich) | HOPE: A Python Just-In-Time compiler for astrophysical computations | Accepted for publication in Astronomy and Computing. 14 pages, 1
figure. The code is available at http://hope.phys.ethz.ch | null | null | null | astro-ph.IM cs.MS cs.PL physics.comp-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The Python programming language is becoming increasingly popular for
scientific applications due to its simplicity, versatility, and the broad range
of its libraries. A drawback of this dynamic language, however, is its low
runtime performance which limits its applicability for large simulations and
for the analysis of large data sets, as is common in astrophysics and
cosmology. While various frameworks have been developed to address this
limitation, most focus on covering the complete language set, and either force
the user to alter the code or are not able to reach the full speed of an
optimised native compiled language. In order to combine the ease of Python and
the speed of C++, we developed HOPE, a specialised Python just-in-time (JIT)
compiler designed for numerical astrophysical applications. HOPE focuses on a
subset of the language and is able to translate Python code into C++ while
performing numerical optimisation on mathematical expressions at runtime. To
enable the JIT compilation, the user only needs to add a decorator to the
function definition. We assess the performance of HOPE by performing a series
of benchmarks and compare its execution speed with that of plain Python, C++
and the other existing frameworks. We find that HOPE improves the performance
compared to plain Python by a factor of 2 to 120, achieves speeds comparable to
that of C++, and often exceeds the speed of the existing solutions. We discuss
the differences between HOPE and the other frameworks, as well as future
extensions of its capabilities. The fully documented HOPE package is available
at http://hope.phys.ethz.ch and is published under the GPLv3 license on PyPI
and GitHub.
| [
{
"version": "v1",
"created": "Thu, 16 Oct 2014 09:28:18 GMT"
},
{
"version": "v2",
"created": "Wed, 3 Dec 2014 15:08:33 GMT"
}
] | 2014-12-04T00:00:00 | [
[
"Akeret",
"Joel",
"",
"ETH\n Zurich"
],
[
"Gamper",
"Lukas",
"",
"ETH\n Zurich"
],
[
"Amara",
"Adam",
"",
"ETH\n Zurich"
],
[
"Refregier",
"Alexandre",
"",
"ETH\n Zurich"
]
] | TITLE: HOPE: A Python Just-In-Time compiler for astrophysical computations
ABSTRACT: The Python programming language is becoming increasingly popular for
scientific applications due to its simplicity, versatility, and the broad range
of its libraries. A drawback of this dynamic language, however, is its low
runtime performance which limits its applicability for large simulations and
for the analysis of large data sets, as is common in astrophysics and
cosmology. While various frameworks have been developed to address this
limitation, most focus on covering the complete language set, and either force
the user to alter the code or are not able to reach the full speed of an
optimised native compiled language. In order to combine the ease of Python and
the speed of C++, we developed HOPE, a specialised Python just-in-time (JIT)
compiler designed for numerical astrophysical applications. HOPE focuses on a
subset of the language and is able to translate Python code into C++ while
performing numerical optimisation on mathematical expressions at runtime. To
enable the JIT compilation, the user only needs to add a decorator to the
function definition. We assess the performance of HOPE by performing a series
of benchmarks and compare its execution speed with that of plain Python, C++
and the other existing frameworks. We find that HOPE improves the performance
compared to plain Python by a factor of 2 to 120, achieves speeds comparable to
that of C++, and often exceeds the speed of the existing solutions. We discuss
the differences between HOPE and the other frameworks, as well as future
extensions of its capabilities. The fully documented HOPE package is available
at http://hope.phys.ethz.ch and is published under the GPLv3 license on PyPI
and GitHub.
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.